Advanced search Help
Clear all search criteria
Only 2/3! You are seeing results from the Public Collection, not the complete Full Collection. Sign in to search everything (see eligibility).
-
Capabilities-Based Munitions Requirements (CBMR) Process
This instruction, under Secretary of Defense 'Defense Planning Guidance,' current edition, implements policy, assigns responsibilities, and prescribes procedures for the CBMR process. This process guides the Military Departments in developing munitions procurement requirements as articulated in the Defense Planning Guidance.
United States. Office of the Assistant Secretary of Defense (Acquisition & Logistics)
Kress, A.
1995-07-21
-
Threat Control through Arms Control
"Arms control is threat control. It is national defense by cheaper means. Every foreign weapon eliminated is a weapon the United States no longer needs to counter. In military, diplomatic, and budgetary terms, arms control is an essential component of sound national security strategy for the 1990s and beyond. Arms control has not been successful every time in every situation. But arms control can frequently address threats unreachable by military force. If viewed as a 'weapon' for removing threats, arms control is staggeringly cost-effective. America is far more secure with it than without it." This report by the U.S. Arms Control and Disarmament Agency assesses the adherence of the U.S. and other nations to arms control, nonproliferation, and disarmament agreements.
United States. Arms Control and Disarmament Agency
1995-07-13
-
Nuclear Emergency Search Team: Assessment Team Report July 12, 1995
"The Nevada Operations Office of the U. S. Department of Energy initiated and chartered this evaluation of the Nuclear Emergency Search Team (NEST) program to assess the strong and weak points of the program: to determine the current capability of NEST to respond to nuclear incidents; assess the problems and strengths of the technical functions of the NEST program; evaluate the management structure; and assess the problems and strengths of the interagency agreements and postures of the NEST program. At the specific request of the Deputy Assistant Secretary for Military Application and Stockpile Support (DP-20), DOE/HQ, the scope of the study was expanded to include an evaluation of the NEST mission today and in the future based upon trends in national and international events and to determine whether the NEST program is properly structured and prepared to respond effectively to those changing conditions. The study was conducted during the period from February through June 1995. [...]. Existing policies, procedures, and relevant background documentation and information was examined in some depth. Interviews were conducted with 65 individuals from a representative cross section of all management, technical and logistical support functions associated with the NEST program as well as other participating organizations and agencies. [...]. In order to avoid limitations on the distribution and use of this report, classified information related to technical capabilities such as detection ranges and techniques associated with diagnostics and disablement have not been included."
United States. Department of Energy
1995-07-12
-
Study of Standby Water Fees/User Fees for Fire Sprinkler System Connections to Water Mains
"Standby water fees/user fees for fire sprinkler system connections to water mains, levied by water utility agencies, were being challenged as excessive and unwarranted by fire protection organizations. Most water utility agencies claimed a right to charge standby water fees/user fees and believed they were reasonable and justified. The purpose of the research was to identify and evaluate the issues on both sides of the debate and to formulate recommendations. Historical and descriptive research methodology was use to answer these questions: 1. Which states have proposed or enacted legislation or rules regulating standby water fees/user fees? 2. What is a reasonable standby water fee/user fee? 3. What services do water utility agencies provide to justify their standby water fees/user fees? 4. What alternatives are available to water utility agencies that depend on the revenue generated by standby water fees/user fees?"
National Fire Academy
Wood, Thomas R.
1995-07
-
Threat Assessment: An Approach to Prevent Targeted Violence
"In the past 5 years, violent crimes involving stalking, workplace violence, and attacks or threatened attacks on public figures and officials have been prominent in the news. Law enforcement and security professionals are turning to prevention as an important component of control strategy. This Research in Action discusses operational and investigative tools and approaches that can be effectively used to recognize, evaluate, and manage the risks of targeted violence before crimes occur."
National Institute of Justice (U.S.)
Holden, Gwen A.; Vossekuil, Bryan; Fein, Robert A.
1995-07
-
Electronic Surveillance in a Digital Age
"Lawlessness and terrorism present new challenges to our society as the 21st Century approaches. Electronic surveillance is an invaluable tool in America's arsenal to fight crime in this era of high-speed, global communications. Digital communications technology has recently outpaced the ability of the law enforcement agencies to implement court authorized wiretaps easily and effectively. To address this problem, the 103d Congress enacted the Communications Assistance for Law Enforcement Act (P.L. [Public Law] 103-414). This Act invokes the assistance of the telecommunications industry to provide technological solutions for accessing call information and call content for law enforcement agencies when legally authorized to do so. The law enforcement community and the telecommunications industry are currently working collaboratively on solutions to implement the requirement of the Act. On September 27, 1994, Congressman Michael G. Oxley, a member or OTA's [Office of Technology Assessment] Technology Assessment Board, requested that OTA consider the technical aspects of implementing the law that will affect the ultimate cost to the government, the industry, and the rate payers. This background paper reviews the progress of the industry and the law enforcement agencies in implementing the Act since its approval in October 1994. OTA extends its thanks to the Alliance for Telecommunications Industry Solutions (ATIS) that sponsors the Electronic Communications Service Providers (ECSP) committee, which is the forum for the collaborative efforts of the industry and law enforcement in seeking solutions for complying with the requirements of the Act. Without the willful cooperation of the ECSP, OTA would likely not have been able to accurately compile the information contained in this background paper."
United States. Congress. Office of Technology Assessment
1995-07
-
Orientation to Community Disaster Exercises: The Exercise Design Game
This document contains an independent study workbook which provides information to assist in designing an disaster exercise game. The document includes an explanation of types of exercises, exercise requirements, and exercise designs.
United States. Federal Emergency Management Agency
1995-07
-
Human Radiation Studies: Remembering the Early Years, Oral History of Biophysicist Cornelius A. Tobias, Ph.D.
From the Office of Scientific and Technical Information abstract: "Dr. Cornelius A. Tobias was interviewed by representatives of US DOE [Department of Energy] Office of Human Radiation Experiments (OHRE). He was chosen for this interview because of his extensive biophysics and medical physics research activities while he was employed by the University of California, Berkeley and San Francisco and at the Donner Laboratory. He discusses his involvement in wartime studies of effects of high altitude on aviators, carbon monoxide with radioactive tracers, blood studies with radioactive iron, human use committees, heavy-ion research with the Bevatron, boron isotope research, classified research involving human subjects, heavy-particle radiography, heavy- particle beams and medical research, and pituitary irradiation studies."
United States. Department of Energy
1995-07
-
Education Policy Issues: Statistical Perspectives, Gangs and Victimization at School
"Public concern over violent juvenile behavior has intensified in recent years, especially in regard to safety inside schools. Included among the National Education Goals is a strong commitment to providing children with learning environments that are free of violence. Yet there are very limited data about the causes of either juvenile street violence or school-related crime. Journalists frequently blame street violence on the influence of gangs. This issue brief looks at the relationship between gang presence in schools and students' reports of victimization and fear."
National Center for Education Statistics; United States. Office of Educational Research and Improvement
Ralph, John H.; Colopy, Kelly W.; McRae, Christine
1995-07
-
Ballistic Missile Defense: The Need for a National Debate
There is a strong consensus in the United States concerning the need for active defenses against theater ballistic missiles, defined as missiles with a range of 3,500 km or less. This consensus was forged in the Gulf War, when Iraq launched conventionally-armed missiles at Israel and Saudi Arabia one striking a U.S. barracks, causing one-quarter of the U.S. combat fatalities of the conflict. Iraqi missiles were derived from the 1950's-vintage Scud-B missiles previously provided by the Soviet Union. The political and military utility of even these relatively crude missiles was not lost on other states who would use force to achieve their own territorial and political objectives.
Developments since Desert Storm have confirmed that states seeking NBC weapons also seek increasingly capable ballistic missiles as their delivery system of choice. For example, Iran and Pakistan reportedly have been provided Chinese technology for M-9 and/ or M-11 missiles. North Korea has flight tested the 1000+ km-range No Dong-1, a missile with the potential to carry NBC warheads, and may have concluded agreements to provide the No Dong to Iran, Libya and Syria. Indeed, according to unofficial sources, the delivery of No-Dong missiles to Iran may already have begun. Such transfers could have profound implications for stability in the Middle East and Persian Gulf areas of vital U.S. interest.
National Defense University. Institute for National Strategic Studies
Joseph, Robert G.; Payne, Keith B.
1995-07
-
Terrorism: Foreign/International Legal Responses in Selected Foreign Countries
From the Document: "Terrorism: Foreign/International Legal Responses is a comprehensive survey of the rules dealing with antiterrorism activities in fourteen countries, including the relevant rules and agreements of international law and the European Union. Topics covered include state-sponsored terrorism, extraterritorial jurisdiction, control of suspected aliens, compensation of victims of terrorism, and innovative measures employed in dealing with terrorism."
Law Library of Congress (U.S.)
1995-07
-
Leadership for Change: Human Resource Development in the Federal Government
This report is a review of the federal workforce with recommendations to make government a more effective workforce through adapting technology and providing more effective training.
United States. Merit Systems Protection Board
1995-07
-
Next Enemy
"The Cold War offered military planners considerable strategic clarity the threat was known, and the problem was generating a force structure of sufficient size and sophistication to counter it. Today's military threats are varied and, for the most part, well below the level that even a shrinking U.S. force can handle comfortably. Threats ten to twenty years out, however, must be taken seriously because of the long time required to complete a major systems acquisition; to develop, test, and institutionalize new doctrine; and to accomplish the organizational innovations necessary to use both effectively. Future threats may be divided into four categories: peers, bullies, terrorism, and chaos. The threat environment twenty years hence is unlikely to be of one type. Nevertheless, framing the choices facing planners shows what the U.S. armed forces might look like if one or another type of threat were to become the predominant focus of the Defense Department."
National Defense University. Institute for National Strategic Studies
Libicki, Martin C.
1995-07
-
Ballistic Missile Defense: An Administration Perspective
"To begin with, the Clinton Administration believes, fundamentally, that deterrence still matters. Why? Is it because we think that Russia is going to attack us today, tonight, tomorrow, next week, next month? No, of course not. We're working very hard--across the board--in many areas, not the least of which are arms control, denuclearization and the Nunn-Lugar initiatives, to make sure that we continue to strengthen strategic stability and assist Russia in its democratic and economic reforms. But, a strategic partnership with Russia is not a 'for sure' conclusion yet. Thus, it is fundamental to this Administration's strategy that we are hedging against the requirement to reconstitute strategic deterrence in full form."
National Defense University. Institute for National Strategic Studies
Bell, Robert G.
1995-07
-
Money Laundering: Stakeholders View Recordkeeping Requirements for Cashier's Checks As Sufficient, Report to the Committee on Banking, Housing, and Urban Affairs, U.S. Senate, and the Committee on Banking and Financial Services, House of Representatives
"Criminal enterprises generate enormous amounts of cash. To make them easier to conceal and transport, some criminal enterprises convert illicit cash proceeds into monetary instruments, such as travelers checks, money orders, or cashiers checks. To combat this practice, Treasury, in implementing the requirements of BSA, requires financial institutions to report and maintain records of certain financial transactions. These reporting and recordkeeping requirements, which vary by the amount of the financial transaction, are intended to (1) assist law enforcement officials in criminal, tax, or regulatory investigations and proceedings and (2) help law enforcement officials identify suspicious and unusual financial transactions. To further assist law enforcement officials in their efforts to combat money laundering, financial institutions are urged by Treasury and federal financial industry regulators to develop an effective know-your-customer program. Know-your-customer programs are designed to encourage employees of financial institutions to become familiar with the banking practices of their customers so that they can recognize transactions that are outside the normal course of a customers business practices and report them as suspicious to the appropriate federal oversight agencies."
United States. Government Accountability Office
1995-07
-
Perspective Series: Mexico Democracy and Human Rights
"This paper has been particularly written to address the information needs and issues of concern to U.S. Asylum Officers and other Immigration Officers." This paper addresses Mexico political history, the 1994 election, the structure of the government, president Zedillo's reforms, constitutional guarantees, security forces, corruption and impunity, electoral fraud, and more.
United States. Immigration and Naturalization Service; INS Resource Information Center
Reding, Andrew
1995-07
-
Initial Development of Selection Instruments for Evaluating Applicants as Potential Airline Passenger Baggage Screeners for Conventional X-Ray Technology
"Currently there is a paucity of research that has been conducted to improve the selection process for airline passenger baggage screener personnel. Careful selection of these personnel is important to obtain the best qualified personnel and to mitigate the characteristically high employee turnover rate that is associated with the training losses in this industry. This report describes the development and evaluation of two-computer cognitive instruments that were examined as possible selection tools. The results from a concurrent validity pilot study demonstrated a strong relationship between measures from the predictor instruments and selected performance criteria."
United States. Federal Aviation Administration
Fobes, J. L.; McAnulty, D. Michael
1995-07
-
Use of Computerized Mapping in Crime Control and Prevention Programs
"Computerized mapping has many crime prevention and control applications. Mapping software's unique ability to overlay disparate data sets makes it an excellent tool for identifying factors related to the multidimensional, multifaceted crime problem. On the basis of a literature review and telephone interviews, this Research in Action focuses on some organizations that use mapping technologies in crime control and prevention programs, assesses the overall utility of these technologies, and identifies some obstacles to increased use of mapping. Highlights of this discussion are as follows: For crime control and prevention, mapping software has two primary goals: to further an understanding of the nature and extent of criminal and social problems in a community, particularly the relationship between criminal activity and possible contributing factors, and to improve the allocation of resources to combat these problems. Mapping efforts for crime prevention and control rely on police department data, particularly call-for-service and incident data. Community groups and multiagency task forces also use geographic and demographic data from the Census Bureau, other State and local government agencies, or commercial vendors."
National Institute of Justice (U.S.)
Rich, Thomas F.
1995-07
-
U.N. Rapid Reaction Force? A Discussion of the Issues and Considerations for U.S. Policymakers [June 29, 1995]
"U.N. Secretary-General Boutros Boutros-Ghali recently called for Member States to consider creating a special U.N. force for U.N. peacekeeping operations. In a January 1995 report he proposed that the U.N. consider establishing a 'strategic reserve' rapid reaction force (RRF), perhaps of battalion-sized units, to deploy when emergency needs for peacekeeping troops arise. They would be stationed in their home countries, but would be trained to the standards, use the same operating procedures and equipment, participate in regular joint exercises, and otherwise be maintained at a high state of readiness in order to respond quickly to a U.N. call for their deployment. Although proposals for a U.N. force dedicated to peace operations were made by former presidents Bush and Reagan, and by presidential candidate William J. Clinton, the Clinton Administration backed away from the concept. In its May 1994 Presidential Decision Directive 25 (PDD-25), the Administration stated that the United States 'does not support a standing U.N. army ... ' The Clinton Administration supported, however, the establishment of the U.N. Standby Forces system, through which Member States formally commit individuals and units to be provided within a specified period of a U.N. request for peacekeeping assistance, in order to enable the U.N. to structure peacekeeping forces more effectively. […] Among the domestic political considerations of establishing an RRF is the possible reduction of congressional and other domestic input into the decision-making process on peacekeeping operations. Among the issues for the U.S. military is whether the U.N. would rely on the United States' unique lift capabilities to deploy the RRF."
Library of Congress. Congressional Research Service
Serafino, Nina M.
1995-06-29
-
Legal Guidance on the Implications of the Supreme Court's Decision in Adarand Constructors, Inc. v. Peña: Memorandum to General Counsels [June 28, 1995]
"This memorandum sets forth preliminary legal guidance on the implications of the Supreme Court's recent decision in Adarand Constructors, Inc. v. Peña, 63 U.S.L.W. 4523 (U.S. June 12, 1995), which held that federal affirmative action programs that use racial and ethnic criteria as a basis for decisionmaking are subject to strict judicial scrutiny. The memorandum is not intended to serve as a definitive statement of what Adarand means for any particular affirmative action program. Nor does it consider the prudential and policy questions relevant to responding to Adarand. Rather, it is intended to provide a general overview of the Court's decision and the new standard for assessing the constitutionality of federal affirmative action programs. Our conclusions can be briefly summarized. Adarand made applicable to federal affirmative action programs the same standard of review, strict scrutiny, that City of Richmond v. J.A. Croson Co., 488 U.S. 469 (1989), applied to state and local affirmative action measures -- with the important caveat that, in this area, Congress may be entitled to greater deference than state and local governments. Although Adarand itself involved contracting, its holding is not confined to that context; rather, it is clear that strict scrutiny will now be applied by the courts in reviewing the federal government's use of race-based criteria in health, education, hiring, and other programs as well."
United States. Department of Justice. Office of Legal Counsel
1995-06-28
-
Department of Defense Directive 5100.85: Intelligence Systems Board (ISB)
"This Directive establishes a joint ISB (hereafter referred to as 'the Board') composed of representatives of the Secretary of Defense and the Director of Central Intelligence. The Board is to ensure the interoperability of automatic intelligence information systems is met effectively and efficiently, in a manner conducive to national security, and consistent with the authorities and duties of the Secretary of Defense and the Director of Central Intelligence under Title 10, United State Code; Title 50, United States Code; and Executive Order 12333, 'United States Intelligence Activities,' December 4, 1981."
United States. Department of Defense
1995-06-27
-
Netwar, It's Not Just for Hackers Anymore
"Network warfare (Netwar) is the latest tool in the Information Warfare toolbox. Where C2W targets the enemy's military electronic spectrum and provides defense against enemy C2W efforts, Netwar targets enemy computer networks that support both military and civilian functions (such as communications, logistics, transportation, and other computer controlled networks) in order to provide the operational commander with an additional tool to either prevent or win conflicts. Netwar also has defensive features, helping the operational commander defend against the inevitable enemy attack on friendly computer network systems."
Naval War College (U.S.)
Eisen, Stefan, 1954-
1995-06-22
-
Presidential Decision Directive 39: U.S. Policy on Counterterrorism
Presidential Directive 39 explains the U.S. policy on terrorism. "It is the policy of the United States to deter, defeat and respond vigorously to all terrorist attacks on our territory and against our citizens, or facilities, whether they occur domestically, in international waters or airspace or on foreign territory. The United States regards all such terrorism as a potential threat to national security as well as a criminal act and will apply all appropriate means to combat it."
United States. White House Office
Clinton, Bill, 1946-
1995-06-21
-
Presidential Decision Directive- (PDD) 39: US Policy on Counterterrorism
This is an unclassified version of President Clinton's Presidential Decision Directive (PDD) 39 that broadly outlines US policy on counterterrorism.
United States. White House Office
1995-06-21
-
Presidential Decision Directive 39: U.S. Policy on Counterterrorism [Audio]
This is an audio recording of the text of Presidential Decision Directive 39. Presidential Directive 39 explains the U.S. policy on terrorism. "It is the policy of the United States to deter, defeat and respond vigorously to all terrorist attacks on our territory and against our citizens, or facilities, whether they occur domestically, in international waters or airspace or on foreign territory. The United States regards all such terrorism as a potential threat to national security as well as a criminal act and will apply all appropriate means to combat it."
United States. White House Office
1995-06-21
-
Effects of a Presidential Pardon: Memorandum for the Pardon Attorney [June 19, 1995]
"This memorandum responds to your request for our opinion concerning whether a full and unconditional presidential pardon precludes the exercise of the authority to deport a convicted alien under 8 U.S.C. § 1251(a)(2), removes a state firearm disability arising as a result of conviction of a federal crime, or extends to the remission of court-ordered criminal restitution not yet received by the victim of the pardoned offender. We answer all three questions in the affirmative."
United States. Department of Justice. Office of Legal Counsel
1995-06-19
-
Combatant Commander's Organizational View of Information Warfare and Command and Control Warfare
"Information warfare and Command and Control Warfare (C2W) are widely recognized as describing how the United States will fight its future wars. Of the two, information warfare remains undefined; whereas, C2W is finely detailed and fully defined in joint publications. Despite the inadequate information warfare definition, the combatant commanders have created an Information Warfare/C2W organizational cell built around the five elements of C2W (OPSEC, Deception, PSYOP, EW, and Destruction). From this stepping stone, the combatant commanders will evolve into a more comprehensive strategy to incorporate information warfare. An essential step to this evolution is the need for the combatant commander to fully understand the ramifications of the following Information Warfare/C2W issues and questions: 1) Why the United States must have a national information policy; 2) What organization should take the lead if the continental United States suffers a devastating, widespread information warfare attack; 3) What is the role of information warfare during peacetime; 4) Who should take the military information warfare lead; 5) Who should have the responsibility to prevent redundant information warfare programs; 6) What should the national security guidance be on black programs; and, 7) How should C2-protect programs be improved. When solved, these seven issues will dictate what future organization and role the military will have in information warfare. The key for the combatant commander is to comprehend these seven issues and seek to shape their solution."
Naval War College (U.S.)
Sexton, Joanne
1995-06-16
-
Joint Doctrine for Operations Other than War
This publication explains how military
operations other than war (MOOTW)
differ from large-scale, sustained combat
operations. It addresses purpose, principles,
types of operations and planning
considerations. A doctrinal basis is
provided for related joint tactics,
techniques, and procedures (JTTP)
publications which address specific types
of MOOTW.
United States. Joint Chiefs of Staff
1995-06-16
-
Operation Peace for Galilee: Operation Brilliance-Strategic Failure
"On 6 June 1982, Israel invaded the neighboring state of Lebanon in Operation 'Peace for Galilee'. The planning and execution of this invasion is examined from an operational-strategic perspective. Tasked with carrying out the invasion, the Israeli Defense Forces (IDF) prepared detailed operational plans which used the principles of warfare to maximize Israel's advantages while minimizing its disadvantages. Upon execution of the plan, IDF units overran south Lebanon in a matter of days in spite of arduous terrain and stiff resistance. However, what was to have been a three day operation stretched into two months of combat followed by a bloody three year occupation of Lebanon. The strategic failure of the IDF despite the brilliance of its operational and tactical performance provides a number of valuable operational lessons. First, regardless of operational excellence, strategic success is unlikely when military operations fail to support policy. Second, a failure to match political and military objectives can cause major problems in the execution of military operations. Moreover, when using military force to deal with a primarily political problem, the identification of an enemy center of gravity based solely on military operations will preclude strategic success. Finally, failure to recognize the culminating point of victory in a military operation can lead to strategic overextension, exhaustion, and eventual defeat."
Naval War College (U.S.)
Jacobs, Bradley M.
1995-06-16
-
Facing a Nuclear Armed Adversary in a Regional Contingency: Implications for the Joint Commander
From the thesis abstract: "Among the many challenges facing the United States military in the post-Cold War world, none would be more difficult or complex than facing a nuclear armed adversary in a regional contingency. One need only read today's headlines to acknowledge the validity of this threat and to contemplate the awesome responsibilities and risks that would be borne by a joint commander tasked to engage such an adversary. Despite years of experience conducting conventional operations and planning for Cold War nuclear contingencies, the nature of the new threat coupled with the unique destructive power and political implications of nuclear weapons will pose problems whose synergistic affect on the campaign is not yet clearly understood, and for which the commander is unprepared. The possibility of nuclear use will complicate campaign planning, affect course of action development and selection, and alter conventional war fighting doctrine and operations. The time is now for joint commanders to seriously consider and prepare for the nasty business of engaging a nuclear-armed regional adversary. Presidential tasking and deterrence credibility demand it."
Naval War College (U.S.). Joint Military Operations Department
Kehler, C. Robert (Claude Robert), 1952-
1995-06-16