Advanced search Help
Clear all search criteria
Only 2/3! You are seeing results from the Public Collection, not the complete Full Collection. Sign in to search everything (see eligibility).
-
Briefing on Boundaries of Justice: Immigration Policies Post-September 11th
The U.S. Commission on Civil Rights (Commission) held a public briefing on October 12, 2001, on United States immigration policies in the aftermath of recent terrorist activities. The briefing examined the civil rights implications of these attacks on the evolution of this nation's immigration policies, practices, and laws. There were three panels of speakers. Panel one consisted of representatives from community organizations who provided accounts from their constituents; panel two consisted of legal experts and scholars; and panel three consisted of representatives from two federal agencies: the Immigration and Naturalization Service (INS) and the Department of Transportation (DOT).
Panelists discussed issues of harassment, discrimination, and other possible infringements of civil rights resulting from fears of recent terrorism. They discussed proposed civil rights implications of anti-terrorism legislation as well as examined the concerns about the federal government's role in implementing proper security procedures at airports and protecting civil rights in the process. Panelists spoke about racial, ethnic, and religious profiling in times of heightened concern about national security and reviewed current and proposed immigration detention policies in the anti-terrorism legislation. They also made recommendations on how the Commission could be involved in combating discrimination in the wake of the terrorist attacks.
United States Commission on Civil Rights
2001-10-12
-
New Craft of Intelligence: Achieving Asymmetric Advantage in the Face of Nontraditional Threats
This monograph is the third in the Strategic Studies Institute's "Studies in Asymmetry" Series. In it, the author examines two paradigm shifts--one in relation to the threat and a second in relation to intelligence methods-- while offering a new model for threat analysis and a new model for intelligence operations in support to policy, acquisition, and command engaged in nontraditional asymmetric warfare. He concludes with an examination of the Revolution in Military Affairs and the need for a Revolution in Intelligence Affairs.
Army War College (U.S.). Strategic Studies Institute
Steele, Robert David, 1952-
2002-02
-
Preparing for Asymmetry: As Seen Through the Lens of Joint Vision 2020
Since the mid-1990s, the concept of strategic asymmetry has begun to receive serious attention from the U.S. Department of Defense (DoD). The 1997 Quadrennial Defense Review, for instance, stated, "U.S. dominance in the conventional military arena may encourage adversaries to use . . . asymmetric means to attack our forces and interests overseas and Americans at home." But while American strategists and defense leaders sense the importance of strategy asymmetry, much analytical work remains to be done before it is fully understood. The author assesses the revisions to Joint Vision 2020, DOD's roadmap to the future, that must be undertaken in order to prepare for asymmetric challenges.
United States. Department of Defense
Applegate, Melissa A.
2001-09
-
Strikes on Terrorist-Related Facilities in Afghanistan and Sudan: August 20, 1998
Links related to U.S. strikes on Afghanistan and Sudan in 1998. Information on these strikes come form the President, Secretary of State and additional information comes from the Travel Department and Background Information.
United States. Department of State
1998
-
DARPA Fact File: A Compendium of Darpa Programs
"DARPA's charter is to prevent technological surprise from harming U.S. national security by sponsoring revolutionary and innovative high-payoff research. This document provides short summaries of selected DARPA programs in FY 2002 and FY 2003, and it is intended as a ready reference for those interested in DARPA's research portfolio. To better illustrate the goals of the programs, the programs have been grouped into three broad areas, each
with various sub-areas: National Level Problems, Operational Dominance, High-Risk, High-Payoff Technologies."
United States. Department of Defense
2002-04
-
Secretary of State's Advisory Panel Report on Overseas Security, June 1998
"In convening the Advisory Panel on Overseas Security, the Secretary of State outlined the scope and dimension of the security problems that confront the United States in continuing to do diplomatic business overseas as well as in providing adequate reciprocal protection for foreigners stationed or visiting the United States on diplomatic business. With the cooperation of a wide range of U.S. Government domestic and foreign affairs agencies, the Panel has examined the issues that relate to diplomatic security in the U.S and overseas.
This report addresses questions of organization within the Department, professionalism of those executing security responsibilities, international diplomacy to thwart terrorism, the protection of foreign dignitaries and missions, certain intelligence and alerting processes, physical security standards, and the substantial building program that is required."
United States. Department of State
1998-06
-
Thematic Summary of a Symposium on Security and the Design of Public Buildings
America is confronting individuals and organizations that have the financing, training,
motivation, equipment, and materials to strike at U.S. interests anywhere in the world. The methods of attack vary from assassinations to truck bombs
and could include weapons of mass destruction. And, while the network of international terrorist leader Usama bin Ladin is well financed, many other terrorist groups are discovering that
they can carry out missions with modest funds, minimal organization, cheap information, and easily accessible weaponry. Whereas
symbolism and convenience were once the high priorities in embassy design, security and safety have now moved to the top.
United States. Department of State
1999-11-30
-
Hello? Who's Listening In? Wireless Security Basics
Presentation given at the GSA/FTS Network Services Conference 2002, April 15-18, 2002, Orlando, Florida. Contents of presentation include: History of 802.11, Wireless Basics, 802.11b Security Issues, Countermeasures, Hacking Wireless, and Solutions
United States. Federal Technology Service
2002-04-15
-
Transnational Threats: Blending Law Enforcement and Military Strategies
"On February 2-3, 2000, the U.S. Army War College, the Triangle Institute for Security Studies, and the Duke University Center for Law, Ethics, and National Security co-sponsored a conference in Chapel Hill, North Carolina. The conference examined transnational threats, including terrorism involving weapons of mass destruction, cyber threats to the national infrastructure, and international organized crime. The goal was to evaluate the seriousness of such threats and discuss strategies for dealing with them. In particular, the conference sought to address the question of how military and law enforcement could blend their strategies to better counter transnational threats. A secondary purpose was to clarify the role of the military in meeting challenges that transcend national borders and threaten our national interests. This book highlights some of the main issues and themes that ran through the conference. After looking at the various threats and undertaking a risk assessment, the report considers the unique aspects of transnational threats, and then identifies the key challenges facing the United States, paying particular attention to the role of the military. The book concludes with discussions of some of the steps that should be taken to secure ourselves against transnational threats."
Army War College (U.S.). Strategic Studies Institute
Pumphrey, Carolyn W. (Carolyn Wilson), 1955-
2002-11
-
Information Revolution and National Security
The effects of the information revolution are particularly profound in the realm of national security strategy. They are creating new opportunities for those who master them. The U.S. military, for instance, is exploring ways to seize information superiority during conflicts and thus gain decisive advantages over its opponents. But the information revolution also creates new security threats and vulnerabilities. No nation has made more effective use of the information revolution than the United States, but none is more dependent on information technology. To protect American security, then, military leaders and defense policymakers must understand the information revolution. The essays in this volume are intended to contribute to such an understanding. They grew from a December 1999 conference co-sponsored by the U.S. Army War College Strategic Studies Institute and the University of Pittsburgh Matthew B. Ridgway Center for International Security Studies. The conference brought together some of the foremost members of the academic strategic studies community with representatives of the U.S. Government and U.S. military. As could be expected when examining a topic as complex as the relationship between the information revolution and national security, the presentations and discussions were far-ranging, covering such issues as the global implications of the information revolution, the need for a national information security strategy, and the role of information in U.S. military operations. While many more questions emerged than answers, the conference did suggest some vital tasks that military leaders and defense policymakers must undertake.
Army War College (U.S.). Strategic Studies Institute
Copeland, Thomas E.
2000-08
-
Challenges of China: Australian Perceptions and Reactions
A rapid worsening of Sino-Australian relations in 1996 provided the new Coalition government in Canberra with a clear practical demonstration of the importance of China. China's irritation with Australia had increased in March when an Australian government statement expressed support for the U.S. intervention in the Taiwan Strait crisis. In June 1996, Chinese Minister for Trade Wu Yi expressed "strong concern" over Australia's sudden decision to discontinue its Development Import Finance Facility (DIFF) aid program. China was one of several Asian nations with joint projects that were jeopardized by the DIFF cancellation. China's annoyance with Australia increased in July 1996 after Australia voiced concerns over the fate of democracy and human rights in a post-handover Hong Kong and over China's July nuclear test on the eve of a testing moratorium. Australian Defense Minister Ian McLachlan suggested that China's actions during the Taiwan Strait crisis, its claims in the South China Sea, and its "newly assertive international posture" were destablizing to the region.
National Defense University. Institute for National Strategic Studies
Wesley, Michael, 1968-
2001
-
China's Precarious Balance: Cohesiveness and Stability in a Fast-Changing Society
Concerns about China's political and social stability figure prominently in Western governments' formulation of policy toward Beijing. Unlike a strong, stable, but less-than-friendly China, an unstable (and presumably weak) China presents a different set of strategic and political challenges to Western policymakers. Instability makes it difficult to protect some of the important interests that have been pursued by the West during the last two decades (such as improvements in human rights, governance, and access to the Chinese market). Internally, political instability usually triggers large-scale violence and loss of government authority. In the case of China, which has a large arsenal of weapons of mass destruction, a likely fallout from such instability would be ineffective control regimes over the exports of such weapons and related technologies.
National Defense University. Institute for National Strategic Studies
Pei, Minxin
2001
-
Challenges for Sino-U.S.Relations: Issues and Problems
As the world enters a new century and the new millennium, so too does the configuration of world powers. The multipolarization of the world and the globalization of the economy are introducing new international factors. In the post-Cold War era, major powers are readjusting and realigning their relationships. The developed countries, especially the U.S., are enjoying a relatively stable period of economic growth and making progress in science and technology. The information revolution has made the world a more integrated one. Along with these developments are changes in people's mindsets -- mentalities as well as ideas. Another prominent development is the increase of the numbers of nonstate or superstate players, regional organizations, nongovernmental organizations (NGOs), and multinational corporations. Finally, the disintegration of the former Soviet Union is forcing the U.S. to redefine its strategic defense and China policy. Sino-U.S. relations have a strong international context because of other regional and global factors. The direction that the relationship takes will directly affect peace and economic development around the world and in the Asia-Pacific region in particular. Given the commonality of some goals and difference between China and the U.S., there exist both positive and negative possibilities for their relationship in the years ahead.
National Defense University. Institute for National Strategic Studies
Yang, Jiemian
2001
-
Defense White Papers in the Americas: A Comparative Analysis
In preparation for the October 2000 Defense Ministerial of the Americas (DMA) in Manaus Brazil and at the request of the Office of the Secretary of Defense, the Institute for National Strategic Studies (INSS) studied the global trend toward the creation of Defense White Papers. The study aimed to understand the nature of these documents in order to prepare the U.S. delegation to discuss the tendency in Latin America and the Caribbean during the DMA. The INSS study team found no agreement about what constitutes a 'white paper' other than each is a consensus statement on a topic. The team examined 15 defense documents worldwide and interviewed participants in the development process and independent analysts. The results suggest that the formative, often difficult, process through which governments must move to solidify their approach to national security defense policy, and the structure to implement it and build consensus for it is the essential part of a 'white paper,' providing a constructive experience that benefits the country. Governments tended not to want a template for this process, although at the working level there is some interest in the experience of other states. Defense White Papers become highly stylized nationalistic documents that reflect a state's unique domestic circumstances and international geopolitical situation. The attached chart provides an overview comparison of the Defense White Paper processes of Canada, the United States, Argentina, Brazil, Chile and South Africa. Past efforts by U.S. agencies to design templates have
National Defense University. Institute for National Strategic Studies
Cope, John A.; Denny, Laura L.
2002
-
Supporting Our Troops Abroad and Increasing Safety at Home: Today's Presidential Action
This is a press release from the White House regarding President George W. Bush's submittal of a wartime budget to Congress. Supplies background on the proposal and justifies allocation of funds.
United States. White House Office
2003-03-25
-
Jihadi Groups, Nuclear Pakistan, and the New Great Game
For the United States and other nations concerned with security in South and Central Asia, one of the most ominous trends has been the growing influence of Jihadist groups in Pakistan which feel obligated to wage holy war against everything that they perceive as non-Islamic. Their objective would be a Pakistani government similar to the Taliban regime in Afghanistan. The danger this would pose to regional stability and U.S. interests is clear. The author assesses Jihadi groups from the framework of a new "Great Game" for influence in Central Asia involving an array of states. He argues that, if this competition leads to increased violence, outside states including the United States could be drawn in. On the other hand, if the region stabilizes, it could provide solid economic and political partners for the United States. A well-designed American strategy, Ahrari contends, might help avoid crises or catastrophe.
Army War College (U.S.). Strategic Studies Institute
Ahrari, Mohammed E.
2001-08
-
China's Defense Modernization: Aspirations and Capabilities
Assessing Beijing's defense modernization programs in the midst of increasing apprehension over the growth of China's military power is a daunting task. During the Cold War, despite some concern over the long-term implications for the United States, assessments were viewed through the prism of China's role in containing the Soviet Union. Improvements in Beijing's military power were seen as serving U.S. interests by requiring Moscow to divert resources from the possible confrontation with the North Atlantic Treaty Organization (NATO) alliance. By the mid-1990s, this perspective had shifted. Many observers perceived Beijing's confrontation with Taiwan and its aggressive, nationalistic approaches to territorial claims in the South China Sea as indicators of the belligerent policies China will pursue as economic enrichment and improvements in indigenous science and technology capabilities enhance its military power. Swelling defense budgets and military technology links with Russia, Israel, and Europe are viewed as giving China the potential to destabilize East Asia and challenge U.S. military preeminence. Analysts are divided by two factors in regards to the progress in defense modernization. The two factors are the changed perspective from which China's defense modernization is now viewed, and the differing estimates of the speed with which China can develop and produce weapons and technologies associated with the revolution in military affairs (RMA). The purpose of this essay is not to resolve these differences or bridge this divide. Rather, the differences will be identified to underscore the difficulties in assessing the progress China has made in two decades of defense modernization.
National Defense University. Institute for National Strategic Studies
Godwin, Paul H. B.
2001
-
Balancing U.S. Alliance and Chinese Cooperation: Korea's Emerging Security Challenge
Despite the beginning of the new millennium, some fundamental policy dilemmas in U.S. relations with China and Japan remain unsettled and have implications for Korean security. One of the principal foreign policy challenges for the United States during the 1990s has been how to give China implicit recognition for its rising status and influence and assuage its deep-seated suspicions that America's post-Cold War alliance with Japan was targeted at it, while at the same time offering Japan security commitments and credibility and strengthening the U.S.-Japan alliance.
National Defense University. Institute for National Strategic Studies
Kim, Taeho, 1960-
2001
-
China's National Insecurity: Old Challenges at the Dawn of the New Millennium
Foreigners and the Chinese themselves typically picture China's population as a vast monolithic Han majority, with a sprinkling of exotic minorities living along the country's borders. This understates China's tremendous cultural, geographic, and linguistic diversity -- in particular, the important cultural differences within the Han population. It also ignores the fact that China is officially a multinational country, with 56 recognized "nationalities." More important, recent events suggest that China may well be increasingly insecure regarding not only these official nationalities, but also national integration. China is seeing a resurgence of pride in local nationality and culture, most notably among southerners such as the Cantonese and Hakka. Chinese society is also under pressure from the officially recognized minorities, such as the Uyghurs and Tibetans. Cultural and linguistic cleavages could worsen in a China that is weakened by internal strife, inflation, uneven growth, or a post-Jiang struggle for succession. At the National Day celebrations in October 1999, commemorating 50 years of Communist Party rule, frequent calls for "National Unity" underscored the importance China's many ethnic populations will play in its national resurgence.
National Defense University. Institute for National Strategic Studies
Gladney, Dru C.
2001
-
Southeast Asian Security: A Regional Perspective
For Southeast Asia, as for the West, the end of the Cold War was a seminal event. The region had been a major Cold War battleground. Communism was a clear and present danger to the survival of regimes and, in the case of Cambodia, to the very existence of a people and culture. Marxism left its mark in the three wars and failed economies of Indochina; in the mid-1960s upheaval in Indonesia; as a contribution to societal disruption in Burma, Malaya, and the Philippines; and, even to a degree, in the militarization of some Southeast Asian polities. The collapse of Soviet power meant the withdrawal of the Russian Pacific Fleet back to port and the end of subventions to the Vietnamese economy. In 1989, the Vietnamese army ended its occupation of Cambodia. In the Philippines, the communist New People's Army began to ebb. The Khmer Rouge became politically isolated and ineffective in the early-1990s. Thus, for the first time, the Southeast Asian countries faced no major security threats from within or without the region.
National Defense University. Institute for National Strategic Studies
Ott, Marvin C.
2001
-
Regulatory Landscape Overview of the Impacts of Regulatory Agency Practices on Critical Infrastructure Protection
The purpose of this study is to provide an understanding of the relationship between protection of critical infrastructure and the regulatory environment in which the infrastructure operates. This understanding will allow policy makers to target key areas in the search for solutions to the problem of assuring protection of our nation's critical infrastructures.
United States. Critical Infrastructure Assurance Office
1997
-
Privacy Laws and the Employer-Employee Relationship: A 'Legal Foundations Study': Report 9 of 12: Report to the President's Commission on Critical Infrastructure Protection
"This paper examines what the Federal government should do, if anything, to ensure that appropriate legal means exist by which governments and the private sector can collect, retain and disseminate data or information integral to achieving infrastructure assurance objectives while respecting fundamental privacy concerns of individuals and the interests of state legislatures in protecting citizens' privacy. The paper explores the possibility of making available to owners and operators, for use in filling certain sensitive positions within the critical infrastructures, some of the techniques and methods currently used by the Federal government to screen employees for employment in certain sensitive positions."
United States. President's Commission on Critical Infrastructure Protection
1997
-
Proliferation and Nonproliferation in Ukraine: Implications for European and U.S. Security
Limiting nuclear proliferation is a vital goal of U.S. security policy. With this in mind, the Strategic Studies Institute cosponsored a conference at the University of Pittsburgh on March 16-17, 1994 to deal with the issues involved in achieving this objective. An additional U.S. objective is the stabilization of relationships among the members of the Commonwealth of Independent States. These two issues come together in Ukraine which, upon achieving independence, found itself in possession of nuclear missiles that were positioned in the former Soviet Union and on Ukraine's territory. Ukraine was reluctant to relinquish control of them for security reasons. This monograph, presented at the conference, seeks to explain why Ukraine originally sought to retain the weapons and then, in 1994, agreed to dismantle them in return for compensation and the very limited security guarantees that exist under the 1968 Non-Proliferation Treaty. The author also examines the nature of Russia's threat to Ukraine and the implications of the new agreement for U.S. policy vis-a-vis Ukraine and Russia.
Army War College (U.S.). Strategic Studies Institute
Blank, Stephen, 1950-
1994-07-01
-
Terrorism and CERT: Glossary
Nine page glossary of terms related to terrorism, relevant to Community Emergency Response Training (CERT) training modules.
United States. Federal Emergency Management Agency
-
CERT Terrorism Training Power Point Visuals
Power point visuals to accompany Community Emergency Response Team (CERT) Terrorism training manual.
United States. Federal Emergency Management Agency
-
Federal Response Plan Interim (9230.1-PL) January 2003
The Federal Response Plan (FRP) outlines how the Federal Government implements the Robert T. Stafford Disaster Relief and Emergency Assistance Act, as amended, to assist State and local governments when a major disaster or emergency overwhelms their ability to respond effectively to save lives; protect public health, safety, and property; and restore their communities. The FRP describes the policies, planning assumptions, concept of operations, response and recovery actions, and responsibilities of 25 Federal departments and agencies and the American Red Cross, that guide Federal operations following a Presidential declaration of a major disaster or emergency. The fundamental assumption is that recovery is a cooperative effort among Federal, State, local, and voluntary agencies and the private sector in partnership. This interim edition of the FRP reflects the passage of the Homeland Security Act of 2002 and the establishment of the Department of Homeland Security (DHS). This replaces the previous issuance of the FRP in April 1999. It is intended for use pending a thorough review and update by DHS, at which time a new edition of the FRP will be issued.
United States. Federal Emergency Management Agency
2003-01
-
Espionage Against the United States by American Citizens: 1947-2001
"PERSEREC developed an unclassified database of Americans involved in espionage against the United States since 1945, and in 1992 published a report on it entitled Americans Who Spied Against Their Country Since World War II. The goal of the original project was to analyze the cases in terms of themes and trends that would further our understanding of the phenomenon of espionage. Since 1992, further instances of espionage by American citizens have come to light, and we have continued to enter them into an espionage database. An updated analysis incorporating recent cases seemed useful. In this update we redefined the parameter of the database and of the report to include only Cold War cases, and we created a separate database with cases from the era of World War II. […] This unclassified study, like its predecessor in 1992, deals with individuals whose names and cases surfaced in open source materials. It is impossible to know how many more spies have been identified but whose cases remain classified, how many were identified but not prosecuted (often to prevent the release of information in open court), how many spied in the past and were not identified, or how many are spying at present and remain unidentified. Unfortunately for the student of espionage, government records include more cases of espionage than are described here, but access to these is classified and restricted to the relatively small, cleared community. This database represents the information that is publicly available; it is an open source subset of the larger universe of all espionage committed by American citizens."
Defense Personnel Security Research Center (U.S.)
Herbig, Katherine L. (Katherine Lydigsen); Wiskoff, Martin F.
2002-07
-
Getting to Know the President: CIA Breifings of Presidential Candidates: 1952-1992
This document will recount in unclassified form the circumstances under which the Agency established its relationships with successive presidents and to discuss, in general terms, the subjects about which they were briefed. An important issue to be faced by the Agency during each transition concerns how much information derived from sensitive human sources and technical collection efforts and regarding covert action programs should be included in the material given a president-elect, and when. Presidents in office are always informed of such programs, and careful attention is given to the timing, level of detail, and content of the presentation. And finally, concerning the substance of the support provided, there have been dramatic variations in the amount of tailored assistance the Agency has provided presidents-elect to prepare them for pre-inaugural planning and policy deliberations, speeches and press conferences, and, in particular, their meetings and communications with foreign statesmen.
Center for the Study of Intelligence (U.S.)
Helgerson, John L., 1944-
2003?
-
Sherman Kent and the Board of National Estimates: Collected Essays
Because of Sherman Kent's importance in the development of the American intelligence profession, the CIA History Staff is publishing this selection of his recently declassified writings on the occasion of the Conference on Estimating Soviet Military Power, 1950--1984, which Harvard University's Charles Warren Center for Studies in American History and the CIA's Center for the Study of Intelligence are cosponsoring in Cambridge in December 1994. After he retired as chairman of the Board of National Estimates at the end of 1967, Sherman Kent wrote a number of monographs on intelligence topics for the CIA History Staff. In recent years most of those that he published later in the CIA's classified quarterly journal, "Studies in Intelligence", have been declassified and made available to the public at the National Archives. Two of these works, however, are declassified and published for the first time in this volume. Kent left a single sealed typescript copy of his 1970 personal memoir, "The First Year of the Office of National Estimates: The Directorship of William L. Langer," for access only by permission of the author or the Chief or Deputy Chief of the History Staff. Those who read this essay--which Kent noted was "composed from memory 20 years after the fact"--will understand why he sequestered these unbuttoned comments on his Board of Estimates colleagues during his lifetime. The other previously classified and unpublished work is this volume's centerpiece, "The Law and Custom of the National Intelligence Estimate."
Center for the Study of Intelligence (U.S.)
2003
-
Arming Flight Crews Against Terrorist Acts: Hearing before the Aviation Subcommittee, Committee on Transportation and Infrastructure, United States House of Representatives One Hundred Seventh Congress, Second Session, May 2, 2002
The purpose of this hearing is to discuss issues associated with providing firearms and/or less-than-lethal weapons to flight crews for the purpose of defending aircraft against terrorist acts. Under section 126 of the Aviation and Transportation Security Act (P.L. 107-71), the Secretary of Transportation, with the approval of the Attorney General and the Secretary of State, may authorize members of a flight crew to carry less-than-lethal weapons in the interest of avoiding air piracy. TASERs have not been cleared for use on commercial aircraft. However, United Airlines has purchased several hundred M-26 TASER guns and intends to install them in lockboxes in the cockpits of all their planes. Several issues require more attention before TASERs can be approved for use on an aircraft in flight. Under section 128 of the Aviation and Transportation Security Act (P.L. 107-71), a pilot of a commercial air carrier may carry an approved firearm while operating an aircraft if he receives approval from the Under Secretary of Transportation for Security and his employer, and he has received proper training. The Transportation Security Administration has begun discussions on this issue with pilots groups, airlines and other interested parties; however, to date, no pilot has received approval to carry a firearm. Statements include those of Sarah V. Hart, Stephen A. Luckey, and Hank Krakowski.
United States. Congress. House. Committee on Transportation and Infrastructure
2002-05-02