157 Matching Results

Search Results

Advanced search parameters have been applied.

International biosecurity symposium : securing high consequence pathogens and toxins : symposium summary.

Description: The National Nuclear Security Administration (NNSA) Office of Nonproliferation Policy sponsored an international biosecurity symposium at Sandia National Laboratories (SNL). The event, entitled 'Securing High Consequence Pathogens and Toxins', took place from February 1 to February 6, 2004 and was hosted by Dr. Reynolds M. Salerno, Principal Member of the Technical Staff and Program Manager of the Biosecurity program at Sandia. Over 60 bioscience and policy experts from 14 countries gathered to discuss biosecurity, a strategy aimed at preventing the theft and sabotage of dangerous pathogens and toxins from bioscience facilities. Presentations delivered during the symposium were interspersed with targeted discussions that elucidated, among other things, the need for subsequent regional workshops on biosecurity, and a desire for additional work toward developing international biosecurity guidelines.
Date: June 1, 2004
Partner: UNT Libraries Government Documents Department

Open literature review of threats including sabotage and theft of fissile material transport in Japan.

Description: This report is a review of open literature concerning threats including sabotage and theft related to fissile material transport in Japan. It is intended to aid Japanese officials in the development of a design basis threat. This threat includes the external threats of the terrorist, criminal, and extremist, and the insider threats of the disgruntled employee, the employee forced into cooperation via coercion, the psychotic employee, and the criminal employee. Examination of the external terrorist threat considers Japanese demographics, known terrorist groups in Japan, and the international relations of Japan. Demographically, Japan has a relatively homogenous population, both ethnically and religiously. Japan is a relatively peaceful nation, but its history illustrates that it is not immune to terrorism. It has a history of domestic terrorism and the open literature points to the Red Army, Aum Shinrikyo, Chukaku-Ha, and Seikijuku. Japan supports the United States in its war on terrorism and in Iraq, which may make Japan a target for both international and domestic terrorists. Crime appears to remain low in Japan; however sources note that the foreign crime rate is increasing as the number of foreign nationals in the country increases. Antinuclear groups' recent foci have been nuclear reprocessing technology, transportation of MOX fuel, and possible related nuclear proliferation issues. The insider threat is first defined by the threat of the disgruntled employee. This threat can be determined by studying the history of Japan's employment system, where Keiretsu have provided company stability and lifetime employment. Recent economic difficulties and an increase of corporate crime, due to sole reliability on the honor code, have begun to erode employee loyalty.
Date: June 1, 2005
Creator: Cochran, John Russell; Furaus, James Phillip & Marincel, Michelle K.
Partner: UNT Libraries Government Documents Department

Summary and results of the joint WMD-DAC/Alameda County bioterrorism response plan exercise.

Description: On June 12,2003, the Alameda County Public Health Department and Sandia National Laboratories/CA jointly conducted an exercise that used a Weapons of Mass Destruction-Decision Analysis Center (WMD-DAC) bioterrorism attack simulation to test the effectiveness of the county's emergency response plan. The exercise was driven by an assumed release (in the vicinity of the Berkeley Marina), and subsequent spread, of a small quantity of aerosolized, weapons-grade anthrax spores. The simulation used several key WMD-DAC capabilities, namely: (1) integration with an atmospheric dispersion model to calculate expected dose levels in the affected areas, (2) a individual-tracking capability for both infected and non-infected persons as they made decisions, sought treatment, and received prophylaxis drugs, and (3) a user interface that allows exercise participants to affect the scenario evolution and outcome. The analysis of the county's response plan included documenting and reviewing the decisions made by participants during the exercise. Twenty-six local and regional officials representing the health care system, emergency medical services and law enforcement were involved in responding to the simulated attack. The results of this joint effort include lessons learned both by the Alameda County officials regarding implementation of their bioterrorism response plan and by the Sandia representatives about conducting exercises of this type. These observations are reviewed in this report, and they form a basis for providing a better understanding of group/individual decision processes and for identifying effective communication options among decision makers.
Date: November 1, 2003
Creator: Manley, Dawn Kataoka; Lipkin, Joel; West, Todd H.; Tam, Ricky; Hirano, Howard H. & Ammerlahn, Heidi R.
Partner: UNT Libraries Government Documents Department

EVALUATION METHODOLOGY FOR PROLIFERATION RESISTANCE AND PHYSICAL PROTECTION OF GENERATION IV NUCLEAR ENERGY SYSTEMS: AN OVERVIEW.

Description: This paper provides an overview of the methodology approach developed by the Generation IV International Forum Expert Group on Proliferation Resistance & Physical Protection for evaluation of Proliferation Resistance and Physical Protection robustness of Generation IV nuclear energy systems options. The methodology considers a set of alternative systems and evaluates their resistance or robustness to a collection of potential threats. For the challenges considered, the response of the system to these challenges is assessed and expressed in terms of outcomes. The challenges to the system are given by the threats posed by potential proliferant States and sub-national adversaries on the nuclear systems. The characteristics of the Generation IV systems, both technical and institutional, are used to evaluate their response to the threats and determine their resistance against the proliferation threats and robustness against sabotage and theft threats. System response encompasses three main elements: (1) System Element Identification. The nuclear energy system is decomposed into smaller elements (subsystems) at a level amenable to further analysis. (2) Target Identification and Categorization. A systematic process is used to identify and select representative targets for different categories of pathways, within each system element, that actors (proliferant States or adversaries) might choose to use or attack. (3) Pathway Identification and Refinement. Pathways are defined as potential sequences of events and actions followed by the proliferant State or adversary to achieve its objectives (proliferation, theft or sabotage). For each target, individual pathway segments are developed through a systematic process, analyzed at a high level, and screened where possible. Segments are connected into full pathways and analyzed in detail. The outcomes of the system response are expressed in terms of PR&PP measures. Measures are high-level characteristics of a pathway that include information important to the evaluation methodology users and to the decisions of a proliferant State or ...
Date: March 1, 2006
Creator: BARI, R. & AL., ET
Partner: UNT Libraries Government Documents Department

Low-Cost, Robust, Threat-Aware Wireless Sensor Network for Assuring the Nation's Energy Infrastructure

Description: In lieu of performing laboratory testing, Eaton Corporation and Oak Ridge National Laboratories (ORNL) conducted an additional field test in March 2007 at ORNL facilities. The results of this test summarized in the report entitled 'DE-FC26-04NT42071, Final Technical Report' submitted to the Department of Energy on June 27, 2007.
Date: March 30, 2007
Creator: Rentel, Carlos H. & Marshall, Peter J.
Partner: UNT Libraries Government Documents Department

A systematic method for identifying vital areas at complex nuclear facilities.

Description: Identifying the areas to be protected is an important part of the development of measures for physical protection against sabotage at complex nuclear facilities. In June 1999, the International Atomic Energy Agency published INFCIRC/225/Rev.4, 'The Physical Protection of Nuclear Material and Nuclear Facilities.' This guidance recommends that 'Safety specialists, in close cooperation with physical protection specialists, should evaluate the consequences of malevolent acts, considered in the context of the State's design basis threat, to identify nuclear material, or the minimum complement of equipment, systems or devices to be protected against sabotage.' This report presents a structured, transparent approach for identifying the areas that contain this minimum complement of equipment, systems, and devices to be protected against sabotage that is applicable to complex nuclear facilities. The method builds upon safety analyses to develop sabotage fault trees that reflect sabotage scenarios that could cause unacceptable radiological consequences. The sabotage actions represented in the fault trees are linked to the areas from which they can be accomplished. The fault tree is then transformed (by negation) into its dual, the protection location tree, which reflects the sabotage actions that must be prevented in order to prevent unacceptable radiological consequences. The minimum path sets of this fault tree dual yield, through the area linkage, sets of areas, each of which contains nuclear material, or a minimum complement of equipment, systems or devices that, if protected, will prevent sabotage. This method also provides guidance for the selection of the minimum path set that permits optimization of the trade-offs among physical protection effectiveness, safety impact, cost and operational impact.
Date: May 1, 2005
Creator: Beck, David Franklin & Hockert, John
Partner: UNT Libraries Government Documents Department

Influence of time-dependent factors in the evaluation of critical infrastructure protection measures.

Description: The examination of which protective measures are the most appropriate to be implemented in order to prevent, protect against, respond to, and recover from attacks on critical infrastructures and key resources typically involves a comparison of the consequences that could occur when the protective measure is implemented to those that could occur when it is not. This report describes a framework for evaluation that provides some additional capabilities for comparing optional protective measures. It illustrates some potentially important time-dependent factors, such as the implementation rate, that affect the relative pros and cons associated with widespread implementation of protective measures. It presents example results from the use of protective measures, such as detectors and pretrained responders, for an illustrative biological incident. Results show that the choice of an alternative measure can depend on whether or not policy and financial support can be maintained for extended periods of time. Choice of a time horizon greatly influences the comparison of alternatives.
Date: March 28, 2008
Creator: Buehring, W. A.; Samsa, M. E. & Sciences, Decision and Information
Partner: UNT Libraries Government Documents Department

Generation IV PR and PP Methods and Applications

Description: This paper presents an evaluation methodology for proliferation resistance and physical protection (PR&PP) of Generation IV nuclear energy systems (NESs). For a proposed NES design, the methodology defines a set of challenges, analyzes system response to these challenges, and assesses outcomes. The challenges to the NES are the threats posed by potential actors (proliferant States or sub-national adversaries). The characteristics of Generation IV systems, both technical and institutional, are used to evaluate the response of the system and determine its resistance against proliferation threats and robustness against sabotage and terrorism threats. The outcomes of the system response are expressed in terms of six measures for PR and three measures for PP, which are the high-level PR&PP characteristics of the NES. The methodology is organized to allow evaluations to be performed at the earliest stages of system design and to become more detailed and more representative as design progresses. Uncertainty of results are recognized and incorporated into the evaluation at all stages. The results are intended for three types of users: system designers, program policy makers, and external stakeholders. Particular current relevant activities will be discussed in this regard. The methodology has been illustrated in a series of demonstration and case studies and these will be summarized in the paper.
Date: October 13, 2008
Creator: Bari, R. A.
Partner: UNT Libraries Government Documents Department

Expanding the Security Dimension of Surety

Description: A small effort was conducted at Sandia National Laboratories to explore the use of a number of modern analytic technologies in the assessment of terrorist actions and to predict trends. This work focuses on Bayesian networks as a means of capturing correlations between groups, tactics, and targets. The data that was used as a test of the methodology was obtained by using a special parsing algorithm written in JAVA to create records in a database from information articles captured electronically. As a vulnerability assessment technique the approach proved very useful. The technology also proved to be a valuable development medium because of the ability to integrate blocks of information into a deployed network rather than waiting to fully deploy only after all relevant information has been assembled.
Date: October 1, 1999
Creator: SENGLAUB, MICHAEL E.
Partner: UNT Libraries Government Documents Department

Threats to financial system security

Description: The financial system in the United States is slowly migrating from the bricks and mortar of banks on the city square to branch banks, ATM`s, and now direct linkage through computers to the home. Much work has been devoted to the security problems inherent in protecting property and people. The impact of attacks on the information aspects of the financial system has, however, received less attention. Awareness is raised through publicized events such as the junk bond fraud perpetrated by Milken or gross mismanagement in the failure of the Barings Bank through unsupervised trading activities by Leeson in Singapore. These events, although seemingly large (financial losses may be on the order of several billion dollars), are but small contributors to the estimated $114 billion loss to all types of financial fraud in 1993. Most of the losses can be traced to the contribution of many small attacks perpetrated against a variety of vulnerable components and systems. This paper explores the magnitude of these financial system losses and identifies new areas for security to be applied to high consequence events.
Date: June 1, 1997
Creator: McGovern, D.E.
Partner: UNT Libraries Government Documents Department

The Internet information infrastructure: Terrorist tool or architecture for information defense?

Description: The Internet is a culmination of information age technologies and an agent of change. As with any infrastructure, dependency upon the so-called global information infrastructure creates vulnerabilities. Moreover, unlike physical infrastructures, the Internet is a multi-use technology. While information technologies, such as the Internet, can be utilized as a tool of terror, these same technologies can facilitate the implementation of solutions to mitigate the threat. In this vein, this paper analyzes the multifaceted nature of the Internet information infrastructure and argues that policymakers should concentrate on the solutions it provides rather than the vulnerabilities it creates. Minimizing risks and realizing possibilities in the information age will require institutional activities that translate, exploit and convert information technologies into positive solutions. What follows is a discussion of the Internet information infrastructure as it relates to increasing vulnerabilities and positive potential. The following four applications of the Internet will be addressed: as the infrastructure for information competence; as a terrorist tool; as the terrorist`s target; and as an architecture for rapid response.
Date: December 1, 1998
Creator: Kadner, S.; Turpen, E. & Rees, B.
Partner: UNT Libraries Government Documents Department

When Materials Matter--Analyzing, Predicting, and Preventing Disasters

Description: The mission of the Architectural Surety{trademark} program at Sandia National Laboratories is to assure the performance of buildings, facilities, and other infrastructure systems under normal, abnormal, and malevolent threat conditions. Through educational outreach efforts in the classroom, at conferences, and presentations such as this one, public and professional awareness of the need to defuse and mitigate such threats is increased. Buildings, airports, utilities, and other kinds of infrastructure deteriorate over time, as evidenced most dramatically by the crumbling cities and aging buildings, bridges, and other facility systems. Natural disasters such as tornadoes, earthquakes, hurricanes, and flooding also stress the materials and structural elements of the built environment. In addition, criminals, vandals, and terrorists attack federal buildings, dams, bridges, tunnels, and other public and private facilities. Engineers and architects are beginning to systematically consider these threats during the design, construction, and retrofit phases of buildings and infrastructures and are recommending advanced research in new materials and techniques. Existing building codes and standards do not adequately address nor protect the infrastructure or the public from many of these emerging threats. The activities in Sandia National Laboratories' Architectural Surety{trademark} efforts take a risk management approach to enhancing the safety, security, and reliability of the constructed environment. The technologies and techniques developed during Sandia's 50 years as the nation's lead laboratory for nuclear weapons surety are now being applied to assessing and reducing the vulnerability of dams, to enhancing the safety and security of staff in foreign embassies, and assuring the reliability of other federal facilities. High consequence surety engineering and design brings together technological advancements, new material requirements, systems integration, and risk management to improve the safety, security, and reliability of the as-built environment. The thrust of this paper is the role that new materials can play in protecting the infrastructure. Retrofits of ...
Date: August 24, 2000
Creator: MATALUCCI,RUDOLPH V. & O'CONNOR,SHARON
Partner: UNT Libraries Government Documents Department

Nuclear material production cycle vulnerability analysis

Description: This paper discusses a method for rapidly and systematically identifying vulnerable equipment in a nuclear material or similar production process and ranking that equipment according to its attractiveness to a malevolent attacker. A multistep approach was used in the analysis. First, the entire production cycle was modeled as a flow diagram. This flow diagram was analyzed using graph theoretical methods to identify processes in the production cycle and their locations. Models of processes that were judged to be particularly vulnerable based on the cycle analysis then were developed in greater detail to identify equipment in that process that is vulnerable to intentional damage.
Date: July 1, 1996
Creator: Bott, T.F.
Partner: UNT Libraries Government Documents Department

US statutes for enforcement by security inspectors

Description: This document is one of a three volume set. BNL 52201 is titled `Selected Text of Atomic Energy Act Executive Orders and Other Laws of General Interest to Safeguards and Security Executives`, and it contains detailed information for use by executives. BNL 52202 is titled `U.S. Statutes of General Interest to Safeguards and Security Officers`, and contains less detail than BNL 52201. It is intended for use by officers. BNL 52203 is titled `U.S. Statutes for Enforcement by Security Inspectors`, and it contains statutes to be applied by uniformed security inspectors.
Date: December 1, 1995
Creator: Cadwell, J.J. & Ruger, C.J.
Partner: UNT Libraries Government Documents Department

Physical Vulnerability of Electric Systems to Natural Disasters and Sabotage

Description: This report offers an analysis of the vulnerability of electric power system specific equipment which is included in a separate appendix that is under classification review by the Department of Energy. This appendix will be made available only under appropriate safeguards by the Department of Energy.
Date: June 1990
Creator: United States. Congress. Office of Technology Assessment.
Partner: UNT Libraries Government Documents Department

ICPP radiological and toxicological sabotage analysis

Description: In June of 1993, the Department of Energy (DOE) issued Notice 5630.3A, {open_quotes}Protection of Departmental Facilities Against Radiological and Toxicological Sabotage,{close_quotes} which states that all significant radiological and toxicological hazards at Department facilities must be examined for potential sabotage. This analysis has been completed at the Idaho Chemical Processing Plant (ICPP). The ICPP radiological and toxicological hazards include spent government and commercial fuels, Special Nuclear Materials (SNM), high-level liquid wastes, high-level solid wastes, and process and decontamination chemicals. The analysis effort included identification and assessment of quantities of hazardous materials present at the facility; identification and ranking of hazardous material targets; development of worst case scenarios detailing possible sabotage actions and hazard releases; performance of vulnerability assessments using table top and computer methodologies on credible threat targets; evaluation of potential risks to the public, workers, and the environment; evaluation of sabotage risk reduction options; and selection of cost effective prevention and mitigation options.
Date: October 1, 1995
Creator: Kubiak, V.R. & Mortensen, F.G.
Partner: UNT Libraries Government Documents Department

National Center for Combating Terrorism Strategic Plan, September 2003

Description: National Center for Combating Terrorism Strategic Plan is to document the mission, vision, and goals for success; define the build plan; and describe initiatives that support the U.S. Department of Homeland Security, U.S. Department of Defense, U.S. Department of Energy, U.S. Department of Justice, intelligence community, National Governors Association, and other organizations or departments with combating terrorism training, testing, and technology responsibilities.
Date: September 2003
Creator: Bechtel Nevada
Partner: UNT Libraries Government Documents Department

The Nature of the Bioterrorism Threat

Description: This analysis provides an overview of the nature of the bioterrorism threat. It identifies potential CDC Class A biological agents that are likely candidates for use in a terrorist incident and describes the known sources of vulnerability. The paper also summarizes S&T resources/needs and assesses response options for achieving effective biodefense against terrorist threats.
Date: February 25, 2003
Creator: Regens, J. L.
Partner: UNT Libraries Government Documents Department

The War on Terrorism and What We Can Learn from our War with Fire

Description: The highly leveraged, asymmetric attacks of September 11th have launched the nation on a vast ''War on Terrorism''. Now that our vulnerabilities and the enemies' objectives and determination have been demonstrated, we find ourselves rapidly immersed in a huge, complex problem that is virtually devoid of true understanding while being swamped with resources and proposed technologies for solutions. How do we win this war? How do we make sure that we are making the proper investments? What things or freedoms or rights do we have to give up to win? Where do we even start? In analyzing this problem, many similarities to mankind's battle with uncontrolled fire and the threat it presented to society were noted. Major fires throughout history have destroyed whole cities and caused massive loss of life and property. Solutions were devised that have gradually, over several hundred years, reduced this threat to a level that allows us to co-exist with the threat of fire by applying constant vigilance and investments in fire protection, but without living in constant fear and dread from fire. We have created a multi-pronged approach to fire protection that involves both government and individuals in the prevention, mitigation, and response to fires. Fire protection has become a virtually unnoticed constant in our daily lives; we will have to do the same for terrorism. This paper discusses the history of fire protection and draws analogies to our War on Terrorism. We have, as a society, tackled and successfully conquered a problem as big as terrorism. From this battle, we can learn and take comfort.
Date: July 1, 2002
Creator: WHITLEY, JOHN B. & YONAS, GEROLD
Partner: UNT Libraries Government Documents Department

Vital area identification for U.S. Nuclear Regulatory Commission nuclear power reactor licensees and new reactor applicants.

Description: U.S. Nuclear Regulatory Commission nuclear power plant licensees and new reactor applicants are required to provide protection of their plants against radiological sabotage, including the placement of vital equipment in vital areas. This document describes a systematic process for the identification of the minimum set of areas that must be designated as vital areas in order to ensure that all radiological sabotage scenarios are prevented. Vital area identification involves the use of logic models to systematically identify all of the malicious acts or combinations of malicious acts that could lead to radiological sabotage. The models available in the plant probabilistic risk assessment and other safety analyses provide a great deal of the information and basic model structure needed for the sabotage logic model. Once the sabotage logic model is developed, the events (or malicious acts) in the model are replaced with the areas in which the events can be accomplished. This sabotage area logic model is then analyzed to identify the target sets (combinations of areas the adversary must visit to cause radiological sabotage) and the candidate vital area sets (combinations of areas that must be protected against adversary access to prevent radiological sabotage). Any one of the candidate vital area sets can be selected for protection. Appropriate selection criteria will allow the licensee or new reactor applicant to minimize the impacts of vital area protection measures on plant safety, cost, operations, or other factors of concern.
Date: September 1, 2008
Creator: Whitehead, Donnie Wayne & Varnado, G. Bruce
Partner: UNT Libraries Government Documents Department

The effect of terrorism on public confidence : an exploratory study.

Description: A primary goal of terrorism is to instill a sense of fear and vulnerability in a population and to erode confidence in government and law enforcement agencies to protect citizens against future attacks. In recognition of its importance, the Department of Homeland Security includes public confidence as one of the metrics it uses to assess the consequences of terrorist attacks. Hence, several factors--including a detailed understanding of the variations in public confidence among individuals, by type of terrorist event, and as a function of time--are critical to developing this metric. In this exploratory study, a questionnaire was designed, tested, and administered to small groups of individuals to measure public confidence in the ability of federal, state, and local governments and their public safety agencies to prevent acts of terrorism. Data were collected from the groups before and after they watched mock television news broadcasts portraying a smallpox attack, a series of suicide bomber attacks, a refinery bombing, and cyber intrusions on financial institutions that resulted in identity theft and financial losses. Our findings include the following: (a) the subjects can be classified into at least three distinct groups on the basis of their baseline outlook--optimistic, pessimistic, and unaffected; (b) the subjects make discriminations in their interpretations of an event on the basis of the nature of a terrorist attack, the time horizon, and its impact; (c) the recovery of confidence after a terrorist event has an incubation period and typically does not return to its initial level in the long-term; (d) the patterns of recovery of confidence differ between the optimists and the pessimists; and (e) individuals are able to associate a monetary value with a loss or gain in confidence, and the value associated with a loss is greater than the value associated with a gain. These findings illustrate ...
Date: October 31, 2008
Creator: Berry, M. S.; Baldwin, T. E.; Samsa, M. E.; Ramaprasad, A. & Sciences, Decision and Information
Partner: UNT Libraries Government Documents Department

PACFEST : enabling technologies in the war on terrorism in the Pacific region.

Description: On October 22-24, 2003, about 40 experts involved in various aspects of homeland security from the United States and four other Pacific region countries meet in Kihei, Hawaii to engage in a free-wheeling discussion and brainstorm (a 'fest') of the role that technology could play in winning the war on terrorism in the Pacific region. The result of this exercise is a concise and relatively thorough definition of the terrorism problem in the Pacific region, emphasizing the issues unique to Island nations in the Pacific setting, along with an action plan for developing working demonstrators of advanced technological solutions to these issues. In this approach, the participants were asked to view the problem and their potential solutions from multiple perspectives, and then to identify barriers (especially social and policy barriers) to any proposed technological solution. The final step was to create a roadmap for further action. This roadmap includes plans to: (1) create a conceptual monitoring and tracking system for people and things moving around the region that would be 'scale free', and develop a simple concept demonstrator; (2) pursue the development of a system to improve local terrorism context information, perhaps through the creation of an information clearinghouse for Pacific law enforcement; (3) explore the implementation of a Hawaii based pilot system to explore hypothetical terrorist scenarios and the development of fusion and analysis tools to work with this data (Sandia); and (4) share information concerning the numerous activities ongoing at various organizations around the understanding and modeling of terrorist behavior.
Date: December 1, 2003
Creator: Moore, Judy Hennessey; Whitley, John B.; Sugimura, Tak (Maui High Performance Computing Center, Maui, HI) & Chellis, Craig (Pacific Disaster Center, Maui, HI)
Partner: UNT Libraries Government Documents Department

Improving tamper detection for hazardous waste security

Description: After September 11, waste managers are increasingly expected to provide improved levels of security for the hazardous materials in their charge. Many low-level wastes that previously had minimal or no security must now be well protected, while high-level wastes require even greater levels of security than previously employed. This demand for improved security comes, in many cases, without waste managers being provided the necessary additional funding, personnel, or security expertise. Contributing to the problem is the fact that--at least in our experience--waste managers often fail to appreciate certain types of security vulnerabilities. They frequently overlook or underestimate the security risks associated with disgruntled or compromised insiders, or the potential legal and political liabilities associated with nonexistent or ineffective security. Also frequently overlooked are potential threats from waste management critics who could resort to sabotage, vandalism, or civil disobedience for purposes of discrediting a waste management program.
Date: January 1, 2002
Creator: Johnston, R. G. (Roger G.); Garcia, A. R. E. (Anthony R. E.); Pacheco, A. N. (Adam N.); Trujillo, S. J. (Sonia J.); Martinez, R. K. (Ronald K.); Martinez, D. D. (Debbie D.) et al.
Partner: UNT Libraries Government Documents Department