Advanced search Help
Clear all search criteria
Only 2/3! You are seeing results from the Public Collection, not the complete Full Collection. Sign in to search everything (see eligibility).
-
Abu ' Ata' Al-Sharqi Reports from Afghanistan (English Translation)
This document is a, "description of a letter written by Abu ' Ata' al-Sharqi of the Jihadwal camp in Afghanistan." This author discusses and references, "an attack on a Sunni mosque [as well as] various [other] conflicts surrounding the al-Faroog training camp [between the members of al-Qa'ida and other fighters [in regards to the] al'Furkan project." Abu `Ata' al-Sharqi also share[s] some [of his] thoughts about how the group can become more involved [and] establish a stronger presence in Tajikistan."
Combating Terrorism Center (U.S.)
1994-09-04
-
Risk Communications and the Chemical Stockpile Emergency-Preparedness Program
"The Source Book has been developed for the Chemical Stockpile Emergency Preparedness Program (CSEPP) in support of the training course on risk communications. The purpose of the document is to provide a fairly comprehensive document on risk communication research and recommended practices, especially as they relate to the CSEPP. In a world of increasing risks, appropriate and continual dialogue with affected publics about risks should be one of the foremost concerns of public agencies, especially those involved in risk communications for the CSEPP. How that information is interpreted or modified by existing beliefs remains problematical. To enhance risk communication efforts, we need communications of risks in a language easily understood by the majority of publics. Effective public participation also depends substantially upon the development of indigenous technical and analytic resources and upon the institutional means to act upon and incorporate that increased knowledge."
United States. Federal Emergency Management Agency
Sorensen, John H.; Vogt, Barbara M.
1994-09
-
Layman's Look at Orbital Debris
From the thesis abstract: "Artificial space debris is a new and threatening reality. This thesis examines the requirement of acknowledging this threat as one of the major considerations in the design of Low Earth Orbit (LEO) satellites. The paper commences with a comprehensive view of the issue; the facts of the case are presented. It is necessary to understand the physical fundamentals of this multi-faceted problem in order to view it as a genuine threat to satellites. Following this introduction, an overview of how the problem is currently approached, from a political and technical standpoint, is discussed. Strategies for coping with the space debris issue are then presented. From these, the paper focuses on the most promising prospect for the future. It highlights the need for new and responsible satellite design philosophies in order to deal with the uncertainties of the LEO environment. The research effort concludes that space debris considerations must be incorporated at the earliest phases of a satellite's design efforts, and must be a continuing commitment throughout the operational life of a satellite."
Naval Postgraduate School (U.S.)
Sanchezcastellanos, Armando R.
1994-09
-
IR Missile (Spin-Scan and Con-Scan Seekers) Countermeasures
From the thesis abstract: "In the combat scenario where the infrared missile is an almost continuous threat during the operation, fighter aircraft are currently quite susceptible to being killed in attacks by infrared missiles. Theoretical analysis applied to an encounter simulation seems to indicate that it is possible to use the infrared Active Jammer and the expendable decoy (flare) to defeat the infrared missile (spin-scan and con-scan seekers). The theoretical analysis of a simplified case of a spin-scan and con-scan reticle with amplitude modulation, frequency modulation and phase modulation leads to expressions for the targets' positions, as seen by the missile seeker, under no-jamming condition. The signal waveforms consist of target radiation power failing on the reticle and the reticle modulation function. We apply signal processing techniques to the modulated signal to determine the tracking error rate under no-jamming, active jamming and flare jamming different conditions, and by comparing with the unjammed tracking error rate, to determine the differences and effectiveness of jamming. The analytical result is simulated by means of a simulation program (MATLAB), which evaluates the change in the missile LOS (line of sight ) rotation rate and the impact on the missile guidance operation. The analysis indicated successful jamming in the different jamming source situations. Following the jamming analysis, one can use the result to do further operational analysis as in OT&E (operation test and evaluation) and to evaluate the operational effectiveness of the jammers and to develop operational tactics to further increase the survivability of the fighter aircraft in the combat situation."
Naval Postgraduate School (U.S.)
Chang, Ting Li
1994-09
-
Environment: DOD's New Environmental Security Strategy Faces Barriers, Report to Congressional Requesters
"Pursuant to a congressional request, GAO [General Accounting Office] provided information on the Department of Defense's (DOD) environmental security strategy, focusing on changes made to the DOD organizational structure for environmental management. GAO found that: (1) the revised DOD strategy for protecting the environment focuses on cleanup, compliance, conservation, pollution prevention, and technology; (2) in order to successfully implement its new environmental strategy, DOD will need to improve its cooperation with other agencies, overcome constraints in implementing environmental regulations, and develop better environmental funding methods; (3) in May 1993, DOD created the Office of Environmental Security to focus on specific environmental issues, and implement its environmental strategy; (4) Congress has directed DOD to realign and justify the office's operating and administrative costs separately in future budget submissions, reduce and hold the operating and administrative budget to $366,000, and limit travel costs to $27,000; (5) future DOD environmental budgets will not be fully realigned because DOD has not separately budgeted or justified its environmental management activities; (6) the Office has agreed to reduce its budget request by $366,000 because the former environmental office supplied Congress with incorrect data on the office's total cost; (7) DOD travel costs are expected to exceed the report limit by $63,000; and (8) the Deputy Under Secretary of Defense has met with congressional staff and reached agreement on the funding limits."
United States. General Accounting Office
1994-09
-
Global Proliferation-Dynamics, Acquisition Strategies, and Responses: Volume 2-Nuclear Proliferation
"The proliferation of nuclear weapons, as well as their associated missile delivery systems, is increasingly acknowledged to be one of the most important threats to U.S. security and global stability in the emerging post-Cold War world. Prepared for the Defense Nuclear Agency (DNA), this report: a. Assesses the current proliferation situation, including incentives and disincentives for acquisition, current outcomes, and future trends. b. Highlights different weapons acquisition strategies that countries have pursued and continue to pursue. c. Describes current policies to contain, cap or rollback, or deal with proliferation. d. Identifies key policy challenges as well as new initiatives to help strengthen U.S. efforts. e. Identifies areas in which the Department of Defense (DoD) may be able to make significant contributions to U.S. nonproliferation efforts."
United States. Defense Nuclear Agency
Dunn, Lewis A.; Bailey, Charles; Bernstein, Paul I.
1994-09
-
Health Hazard Evaluation Report 92-147-2456; Federal Bureau of Investigation Washington, D.C.
"In February 1992, the National Institute for Occupational Safety and Health (NIOSH) received a request for a health hazard evaluation (HHE) from a management representative of the Federal Bureau of Investigation (FBI) in Washington, D.C. The request was submitted because of concern about possible health hazards due to the exposure of fingerprint specialists to many of the chemicals that they use in processing latent fingerprints. NIOSH evaluated potential exposures to ethyl-2-cyanoacrylate, petroleum ether, iodine, acetone, titanium dioxide, and carbon black in the fingerprint laboratories and at a simulated crime scene. The laboratories were equipped with exhaust hoods, but there was no exhaust ventilation available at the simulated crime scene. NIOSH investigators also evaluated an argon laser that was used by fingerprint specialists to examine objects for visible fingerprints"
Centers for Disease Control and Prevention (U.S.); National Institute for Occupational Safety and Health
Barsan, Michael E.; Bresler, Faye T.
1994-09
-
Health Hazard Evaluation Report 88-0290-2460; Pittsburgh Bureau of Fire Pittsburgh, Pennsylvania
"On June 2, 1988, the International Association of Fire Fighters' (IAFF) Department of Health and Safety requested the National Institute for Occupational Safety and Health (NIOSH) to conduct a Health Hazard Evaluation (HHE) on behalf of their Local #1 in Pittsburgh, Pennsylvania. The request was to evaluate the noise exposure levels found in the activities of the Pittsburgh Bureau of Fire (PBF) and to assess the amount of hearing loss among current fire fighters in the department."
Centers for Disease Control and Prevention (U.S.); National Institute for Occupational Safety and Health
Tubbs, Randy L. (Randy Lloyd)
1994-09
-
Managing Water for Drought
"This guidebook was produced as part of the National Study of Water Management During Drought, which was managed by the Institute for Water Resources (IWR) of the U.S. Army Corps of Engineers. The guidebook is based on the experiences, research, and critical analysis of the over one hundred professionals who worked directly on the National Drought Study, and the many others who criticized and improved the case studies in which these methods were tested. […] This report summarizes the method of Many components of the DPS approach are improving water management during drought time-proven methods and ideas derived from developed during the four year National federal water planning experience and Study of Water Management During research, modified to reflect the importance Drought. The method was tested and refined of non-federal, non-structural responses to in four field studies in different parts of the droughts. The most visible innovation of country, in which teams of water managers the National Drought Study is the use of and users worked together to reduce drought stakeholders collaboratively built 'shared impacts. In each case, the situations are vision (computer) models' of their water complex, involving many different uses of management environments. The DPS water. Because such important state and method also encourages the use of alternative local responsibilities are involved, only a dispute resolution techniques and new joint cooperative approach between state and statistical methods that can provide additional federal agencies could provide satisfactory information on the expected severity and answers. These cooperative field studies were frequency of droughts. What is most called 'Drought Preparedness Studies' (DPS) significant is that all of this has been and the approach, the 'DPS method.'"
Institute for Water Resources (U.S.)
Werick, William J.; Whipple, William, Jr.
1994-09
-
Military Applicant Security Screening (MASS): Systems Development and Evaluation
From the Foreword: "The present study couples instruments and procedures developed in previous research with computer technology, to design a computer-administered security screening system entitled Military Applicant Security Screening (MASS). In this report the authors describe the two major components of MASS, the screening questionnaire and the computer structure for questionnaire administration. Also described are the results of a field test of MASS with Navy enlisted personnel. The positive results from this test resulted in a decision by the Navy to implement MASS nationwide at all Military Entrance Processing Stations (MEPS)."
Defense Personnel Security Research Center (U.S.)
Wiskoff, Martin F.; Zimmerman, Ray A.
1994-09
-
Assessing the Potential for Civil-Military Integration: Technologies, Processes, and Practices
Government officials and private sector executives have advocated the integration of the defense and commercial sectors (often termed civil-military integration or CMI). The claimed benefits of CM I include cost savings, increased technology transfer, and an increase the number of potential defense suppliers. A CM I strategy, however, demands extensive modification of acquisition laws and regulations, and concerns over potential costs and risks such modifications have hindered change. Although several congressional and administration initiatives have been launched to promote integration, to date, much of the defense base remains isolated and the promised benefits of integration remain elusive. This assessment found that greater CMI is possible. It confirms the potential for cost savings and increased technology transfer, but analysis indicates such savings are likely to be less, and slower to realize, than many previous studies have suggested. Even so, cost savings even a few percent of total defense technology and industrial spending would amount to billions of dollars in overall savings that might be used to meet other vital defense needs. The most important benefit of increased CMI may be the preservation of a viable defense technology and industrial capability in an increasingly fiscally constrained environment. Increased CMI appears essential if defense is to take advantage of rapidly developing commercial technologies.
United States. Government Printing Office
United States. Congress. Office of Technology Assessment
1994-09
-
Taxonomy of Computer Program Security Flaws, with Examples
"An organized record of actual flaws can be useful to computer system designers, programmers, analysts, administrators, and users. This paper provides a taxonomy for computer program security flaws together with an appendix that carefully documents 50 actual security flaws. These flaws have all been described previously in the open literature, but in widely separated places. For those new to the field of computer security, they provide a good introduction to the characteristics of security flaws and how they can arise. Because these flaws were not randomly selected from a valid statistical sample of such flaws, we make no strong claims concerning the likely distribution of actual security flaws within the taxonomy. However, this method of organizing security flaw data can help those who have custody of more representative samples to organize them and to focus their efforts to remove and, eventually, to prevent the introduction of security flaws."
Naval Research Laboratory (U.S.)
Landwehr, Carl E.; Bull, Alan R.; McDermott, John P. . . .
1994-09
-
Nuclear Safety: International Assistance Efforts to Make Soviet-Designed Reactors Safer, Report to Congressional Requesters
"As of May 1994, about $785 million had been pledged to implement the G7 assistance plan, primarily for improving the safety of the Soviet-designed civil nuclear power reactors located in the former Soviet Union and in central and eastern Europe. A longer-term goal of the assistance program is to shut down the most dangerous nuclear power reactors and replace them with alternative energy sources. The plan also calls for improving nuclear regulatory agencies in those countries operating Soviet-designed reactors. As of May 1994, only about 7 percent of the projects, worth about $57 million, had been completed."
United States. Government Accountability Office
1994-09
-
Profile Series: Uzbekistan: Political Conditions in the Post-Soviet Era
"Unlike most of the former Soviet republics, in which governments have become more democratic and less able to control societal opposition, Uzbekistan's political structure and its level of governmental repression and control remain virtually unchanged from the Soviet era. Uzbekistan's president, Islam Karimov, was elected in the Soviet period. The ruling National Democratic Party automatically incorporated all members of the Uzbek Communist Party in its membership when it was created as a successor to the Communist Party. The Karimov government is extremely intolerant toward the opposition parties which were formed in the glasnost period preceding the collapse of the Soviet Union. The press is now rigidly censored. Human, civil and ethnic rights are abridged and restored solely at the whim of the government. Almost all of the opposition parties and movements formed before Uzbek independence have been banned, while human rights organizations have been harassed, their leaders jailed and convicted, often on unlikely criminal charges such as drug trafficking or assaulting a security officer. Individuals are more free now to practice religion than during the Soviet era -- as long as the government perceives their religious beliefs and practices to be apolitical. […]. Moreover, the Uzbek government actively represses those religious movements which are involved in, or perceived as involved in, political issues. […]. In summary, although the high level of repression in Uzbekistan affects most residents, those at greatest risk are those who either are involved in political opposition to the government (through secular ideological parties, human rights groups, or ethnic- or religious-based movements), or who are perceived by the government as being engaged in political opposition."
United States. Immigration and Naturalization Service; INS Resource Information Center
1994-09
-
Information Security and Privacy in Network Environments
"Information networks are changing the way we do business, educate our children, deliver government services, and dispense health care. Information technologies are intruding in our lives in both positive and negative ways. On the positive side, they provide windows to rich information resources throughout the world. They provide instantaneous communication of information that can be shared with all who are connected to the network. As businesses and government become more dependent on networked computer information, the more vulnerable we are to having private and confidential information fall into the hands of the unintended or unauthorized person. Thus appropriate institutional and technological safeguards are required for a broad range of personal, copyrighted, sensitive, or proprietary information. Otherwise, concerns for the security and privacy of networked information may limit the usefulness and acceptance of the global information infrastructure. This report was prepared in response to a request by the Senate Committee on Governmental Affairs and the House Subcommittee on Telecommunications and Finance. The report focuses on policy issues in three areas: national cryptography policy, including federal information processing standards and export controls, guidance on safeguarding unclassified information in federal agencies, and legal issues and information security, including electronic commerce, privacy, and intellectual property."
United States. Congress. Office of Technology Assessment
1994-09
-
NSC-68: Forging the Strategy of Containment
"As America emerged from World War II, it was evident that a new world order was taking shape, one unlike any that had come before it. In this new arrangement, the United States faced the prospect of having to share its status as a nuclear superpower with a hostile Soviet Union. In 1950 it fell to a small group of individuals in the Departments of State and Defense to devise a strategy capable of protecting American national interests. Paul Nitze, Director of the Policy Planning Staff at the Department of State at that time, was instrumental in shaping the strategy that emerged from this endeavor-the strategy of containment as embodied in the seminal strategic document of the Cold War era: NSC-68. Over the years, Ambassador Nitze's insights into both the strategy and the process by which it was developed have proven to be invaluable to successive classes at the National War College, where he has been a frequent lecturer since 1947. With the passing of the Cold War, as American leaders once again face the prospect of having to craft a strategy to protect national interests in a new environment, these insights take on new relevance. deserving of an even wider audience. This volume was conceived to satisfy that need."
National Defense University. Institute for National Strategic Studies
Drew, S. Nelson; Nitze, Paul H.
1994-09
-
Virtual Reality and Technologies for Combat Simulation
Synthetic-environment technology is dual-use. Research funded by the Department of Defense (DoD) seeded the field. Now there is a large commercial market, and DoD is actively exploiting the dynamism and efficiency of that market. Advances in synthetic environment technologies such as computer image generation are reducing the costs of cockpit simulators and facilitating other applications. This paper describes technical challenges and discusses issues of validation, standardization, scalability, flexibility, effectiveness, cost-effectiveness, and infrastructure.
United States. Government Printing Office
United States. Congress. Office of Technology Assessment
1994-09
-
Preventing Injuries and Deaths of Fire Fighters
This document outlines precautions fire fighters should take to protect themselves from injury and/or death. The information should be brought to the attention of all U.S. fire fighters - including members of the largest metropolitan fire departments and the smallest rural volunteer fire departments. "The National Institute for Occupational Safety and Health (NIOSH) requests assistance in preventing injuries and deaths of U.S. fire fighters. A recent NIOSH investigation identified four factors essential to protecting fire fighters from injury and death: (1) following established fire-fighting policies and procedures, (2) implementing an adequate respirator maintenance program, (3) establishing fire fighter accountability at the fire scene, and (4) using personal alert safety system (PASS) devices at the fire scene. Deficiencies in any of these factors can create a life-threatening situation for fire fighters."
National Institute for Occupational Safety and Health; Centers for Disease Control and Prevention (U.S.)
1994-09
-
Research Paper: Desertification and Migration: Mexico and the United States
"The Commission on Immigration Reform [CIR] requested this preliminary study of environmental degradation related to unsustainable land and water use as one of the potential root causes of certain migration from Mexico to the United States. The findings contained in this report suggest that serious impairment of Mexico's agricultural lands may give rise to migration. As environmental degradation can often be addressed through targeted intervention, this report presents recommendations for future action by the Commission and/or Congress that go beyond reform of traditional migration policies and institutions. It identifies specific issues for further study and policy development as a first step in addressing Mexican migration related to desertification and offers some potential short- and long-term opportunities for development of environmental solutions."
U.S. Commission on Immigration Reform
Schwartz, Michelle Leighton; Notini, Jessica
1994-09
-
Test and Evaluation Report for the Manual Domestic Passive Profiling System (MDPPS)
"Increases in threat conditions can result in a requirement for additional security precautions at airports. These precautions are often resource intensive for the airlines. The cost of additional airport security systems, however, could be reduced if the number of passengers needing special security measures was minimized. This report discusses the results of increasing airport security by manually evaluating passenger 'profiles' to identify domestic travelers thought not to represent a threat."
United States. Federal Aviation Administration
Fobes, J. L.; Lofaro, Ronald J.
1994-09
-
Defense Science and Technology Strategy, September 1994
"Dramatic changes affect our national security posture. With the end of the Cold War have come heightened threats of regional conflicts, pro1iferation of weapons of mass destruction, and increased demand for peacekeeping and humanitarian missions. At the same time, force structure has been reduced, and development and production of new weapon systems has been sharply curtailed. In addition, our national economic security is challenged. Shrinking defense budgets dictate that we can no longer afford defense-funded, defense-unique solutions to our requirements. Furthermore, for an increasing number of defense-critical technologies, commercial demand, not defense demand, drives technical progress. The Defense Science and Technology Strategy is responsive to new threats, challenges, demands, and opportunities. Technological superiority remains essential, but it is no longer sufficient. Our vision contains two new elements that complement and extend it: affordable weaponry and enhanced economic security. Together they demand that the DoD pursue technology in new ways. We must utilize the economies of scale and technology innovation of commercial industry. We must improve productivity and reduce costs. Above all we must assure technological superiority."
United States. Department of Defense
1994-09
-
Rural Crime and Rural Policing
"Police practices vary from one area to another, and studying the varieties of police behavior can yield important insights into the role of law enforcement officers in a community. Most studies of variations in police behavior have been conducted in urban settings. Neglecting rural policing and rural crime might be justifiable if there is nothing about policing, crime, or the community in rural environments that precludes directly applying knowledge from urban areas. It is evident, however, that rural environments are distinct from urban environments in ways that affect policing, crime, and public policy. The following discussion examines what is known about rural crime, rural policing, and how they are shaped by the rural environment. It is obvious that rural policing is shaped by the nature of rural crime and the features that distinguish rural culture and rural life. Consequently, the discussion begins with a description of what is known about rural crime."
National Institute of Justice (U.S.)
Wells, L. Edward; Weisheit, Ralph A.; Falcone, David N.
1994-09
-
Coordination Policy for the NATO SEASPARROW Missile and the Rolling Airframe Missile using Dynamic Programming
"This thesis develops a dynamic program, the SEASPARROW Coordinated Assignment Model (SCAM), that determines the optimal coordinated assignment policy for the SEASPARROW missile in a shipboard self defense weapon configuration consisting of the NATO SEASPARROW Missile System, the Rolling Airframe Missile and the Phalanx Close-In Weapon System. Threat scenarios are described by the type of' anti-ship cruise missile, the number of threat missiles, the total duration of the arrival window and the relative spacing of targets within the threat stream. SCAM reveals that under various threat configurations it is often advantageous to fire the SEASPARROW at groups of threats in the target stream, rather than always the nearest threat, and fuflher that this policy is robust for a large set of threat scenarios."
Naval Postgraduate School (U.S.)
Drennan, Arthur Paul, III
1994-09
-
Reducing the Risks of Nonstructural Earthquake Damage: A Practical Guide
"This guide was developed to fulfill several different objectives and address a wide audience with varying needs. The primary intent is to explain the sources of nonstructural earthquake damage in simple terms and to provide information on effective methods of reducing the potential risks. The recommendations contained in this guide are intended to reduce the potential hazards but cannot completely eliminate them."
United States. Federal Emergency Management Agency
1994-09
-
Models for Proliferation Interdiction Response Analysis
"The proliferation of nuclear weapons poses a serious threat to the United States, its allies, and over-all world security. The United States seeks to dissuade or prevent new countries from acquiring nuclear weapons capabilities. This thesis constructs two models to aid decision makers in selecting strategies to interdict these proliferation efforts. The first, a 'what-if' PERT/CPM model, provides an overall picture of the proliferation process. The graphical display is used to select activities to interdict, and to analyze the outcome of the choices. The second, an optimal interdiction model, selects the optimal activities for interdiction subject to risk constraints. Several runs with different numbers of interdiction points were made to test the optimal interdiction model. These results are further analyzed with the aid of the IPER T /CPM model. The models, when used together, prove to be useful in selecting the optimal activities to interdict in the proliferation process."
Naval Postgraduate School (U.S.)
Reed, Brian
1994-09
-
Profile Series Russia: the Status of Jews in the Post-Soviet Era
"The status of Jews in Russia in the post-Soviet era is complex. The collapse of the Soviet Union has created new opportunities for Jews to practice their religion and culture. The kind of officially organized, state-sponsored discrimination that characterized the Soviet and tsarist eras, has virtually disappeared. Yet the climate of political and economic uncertainty in Russia has permitted the growth of anti-Semitism among individuals, parties, and organizations. Of equal importance, it is not always clear that the government is able -- or willing -- to take action against those who harass or physically attack Jews. For historical reasons, most Jews, like their Russian counterparts, are reluctant to report incidents of harassment or violence to government officials. Many police and lower level bureaucrats retained from the Soviet era have not received retraining in human rights or respect for the rule of law. […]. Although Jews who are religious, political or cultural activists may be more likely to be the targets of such attacks, Jews who have no known activist affiliations can also be at risk. Claims from Russian Jews must be assessed primarily on the basis of nationality, although religion and imputed political opinion (pro-democracy or anti-communism) may also be facets of the claim. Acts of harassment and violence against Jews are still sporadic in the post-Soviet era, but no-one is automatically at risk, or automatically safe from potential persecution: each case must be determined on a careful assessment of the applicant's own situation (and of those similarly situated, such as relatives, colleagues, friends, neighbors, etc.)."
United States. Immigration and Naturalization Service; INS Resource Information Center
1994-09
-
Profile Series: Kazakhstan: Political Conditions in the Post-Soviet Era
"The country has become more polarized as many of the ethnic Russians and Russian speakers living in the Kazakh-majority southern region of the country are either relocating to the north (dominated by ethnic Russians), or are leaving Kazakhstan altogether. At present, however, tensions, discrimination, and political manipulations have not escalated into outright repression or violence against Russian speakers as a group. The government seems to discourage ethnic-based supremacist groups -- both Russian and Kazakh -- from both legitimate and illegitimate or violent activities. However, the situation is too volatile to predict with any certainty whether the government will maintain a mildly repressive but relatively peaceful status quo, or will either increase its level of repression or lose its ability to dampen potential opposition. It should also be noted that one exception to the generalization that ethnic tensions have not resulted in societal violence is the status of Russian-speaking Jews. From the late 1980s to the present, there have been credible reports of sporadic violent attacks by societal groups or individuals on Russian-speaking Jews. This report will focus almost entirely on the status of Russian speakers in Kazakhstan. This focus was not chosen because Russian speakers necessarily are (or are not) at greater risk of discrimination or harassment in Kazakhstan, but because they represent the overwhelming majority of applicants for asylum from Kazakhstan in the United States. The focus on Russian speakers should not be construed as a judgement [sic] of the relative merits of the cases of Russian speakers or other potential applicants for asylum."
United States. Immigration and Naturalization Service; INS Resource Information Center
1994-09
-
Executive Order 12924: Continuation of Export Control Regulations
"To the extent permitted by law, the provisions of the Export Administration Act of 1979, as amended, and the provisions for administration of the Export Administration Act of 1979, as amended, shall be carried out under this order so as to continue in full force and effect and amend, as necessary, the export control system heretofore maintained by the Export Administration regulations issued under the Export Administration Act of 1979, as amended. The delegations of authority set forth in Executive Order No. 12002 of July 7, 1977, as amended by Executive Order No. 12755 of March 12, 1991; Executive Order No. 12214 of May 2, 1980; Executive Order No. 12735 of November 16, 1990; and Executive Order No. 12851 of June 11, 1993, shall be incorporated in this order and shall apply to the exercise of authorities under this order."
United States. Office of the Federal Register
Clinton, Bill, 1946-
1994-08-19
-
Personnel Security Standards and Procedures Governing Eligibility for Access to Sensitive Compartmented Information (SCI)
The purpose of this directive is to enhance the security protection of SCI through the application of personnel security standards, procedures, and continuing security programs.
United States. Central Intelligence Agency
1994-08-12
-
Operations Other Than War (OOTW)
The world today is less volatile than at anytime in the recent past. Then tensions were high and the chance of armed conflict between allied and communist superpowers was a real threat. The dramatic end of the cold war has caused significant changes in the nation's domestic and foreign policies and priorities. During the cold war era, our national attention and military might were focused on the external threat and related issues. The Army is moving from a forward deployed to a force projection strategy. Additionally, there is an acute awareness of the need for increased military involvement in OOTW. FMs 100-19 and 100-23 emphasize the priority being placed on military involvement in noncombat operations. Additional umbrella doctrinal publications are on the horizon. These will embrace nontraditional roles of peacetime operations for the Army.
United States. Department of the Army
1994-08-11