U.S. troops handed security control of the area to Iraqi troops and police last week.
Due to its significance to Jews, Israel demanded full security control over the tomb.
In its latest iteration, S.1712 would create a new National Security Control List (NSCL).
British troops, which have been based in Basra, handed security control to Iraqi troops and police late last year.
As you saw in Iraq, there was a gradual ceding of security control and lead to the Iraq security forces.
Iraqi troops often take the lead in security patrols, as 13 of 18 provinces now are under Iraqi security control.
However, he said 2014 was the existing target date in the military strategy for the handover of security control to Afghan forces.
BBC: Afghanistan aid spending boost expected to be announced
During the national security meeting Sunday, Afghan leaders also solidified plans to carry out the second phase of plans for coalition forces to cede security control to Afghan forces across the country.
They fulfill real front-line business roles but, in dialogue with us, add that indispensable and invaluable perspective on where the real business value is that needs protecting, as well as what degree of security control imposes an acceptable burden on the business.
FORBES: For Stronger IT Security, Build Relationships, Not Walls
They're rewriting their own job descriptions, and they're doing so by fundamentally re-evaluating three critical issues: cost, security and control.
"The efficiencies the internet has brought in such as instant access to information have also created security and control issues too, " he said.
Today's IT leaders are rethinking issues of cost, security and control, and rewriting the IT job description by outsourcing contextual processes to reliable cloud vendors.
The report claimed there was too much emphasis on security and control at the prison and identified a need to focus "much more on the rehabilitation and resettlement of prisoners".
We have even refrained from making much-needed improvements to the stockpile's safety, security and control rather than risk having to undertake new designs that could only be validated by underground testing.
What may be left by the wayside until after the election - a budget blueprint, appropriations to run the government, immigration reform and border security, control of lobbyists, a minimum wage increase and health for senior citizens who missed a deadline for choosing a Medicare prescription plan.
By enabling a security architecture centered on data control, IT solves longstanding security problems through empowering the environment to protect sensitive data regardless of access method, device, network, ownership or location.
FORBES: Virtualization: A Solution For The Tablet Security Conundrum
Egypt's security forces regained control Sunday of Port Said, a vital northeastern port city.
Harrington currently serves as Director of the U.S. National Academy of Sciences Committee on International Security and Arms Control.
You can enable a personal device to access networks and services with security and full control of the IT department.
National Security forces strictly control visitors, and those who have seen the collateral are mostly people with press passes, or police and military badges.
Because 20 years after the end of the Cold War, the U.S.-Russian relationship has to be about more than just security and arms control.
WHITEHOUSE: President Obama & President Medvedev Joint Press Conference | The White House
Mr. SCOTT SAGAN (Director, Stanford University's Center for International Security and Arms Control): Sometimes they're interested in nuclear weapons because the United States is everybody's neighbor today.
But when you boil it down to its elements, the Internet of Things is, today, little more than an expansion of traditional telematics, security and asset control applications.
Following Wednesday's vote by Israel's security cabinet, control of northern Ghajar will be handed over to the UN Interim Force in Lebanon (Unifil), whose mandate is to keep peace in the tense border region.
Users simply designate one of their PCs as their "Cloud PC, " enabling them to use the available hard drive space on their own PC, giving them security and full control over their storage needs.
ENGADGET: Acer updating its AcerCloud service with full Android and iOS support
You are going to have companies that are not used to dealing with mobile technology, software development, application development, regulatory issues, security, and control, trying to scale an M2M platform on a global basis.
And of course, without effective security forces, the prime minister and the interior minister as well as the defense minister will not have instruments to control the security.
So I believe that the Iraqi government would still like more control of security.
应用推荐