Advanced search Help
Clear all search criteria
Only 2/3! You are seeing results from the Public Collection, not the complete Full Collection. Sign in to search everything (see eligibility).
-
Military Changes to the Unified Command Plan: Background and Issues for Congress [June 21, 1999]
From the Abstract: "Changing threats to U.S. national security concern Members and committees in Congress; terrorism, weapons of mass destruction, national missile defense, and space issues are new challenges the Department of Defense faces. A key tool to address these concerns has been the Unified Command Plan (UCP), which organizes U.S. military forces geographically and functionally for activities in peace and war. Congress has played a role in shaping this executive document in the past, and may wish to do so again in the future. This report describes the UCP, relevant past legislation, emerging threats, and options and issues for Congress. For discussion of U.S. forces under multinational command arrangements, see CRS [Congressional Research Service] Report 94-887, 'U.S. Forces and Multinational Commands: PDD [Presidential Decision Directive]-25 and Precedents.' This report may be updated as events warrant."
Library of Congress. Congressional Research Service
Story, William C., Jr.
1999-06-21
-
Teaching Intelligence Studies at Colleges and Universities
"The teaching of intelligence at growing numbers of our colleges and universities--the teaching of its place, structure and practice in our democracy--offers the welcome prospect that growing numbers of young Americans will become attracted to the field. It offers the prospect that, increasingly, the very best of the coming generation's talents and capabilities will participate in the contributions of intelligence to the survival, security and well-being of the Nation. Indeed--if you will bear with a parochial aside--that once in the field, we will have occasion to welcome them to their professional, graduate studies at this college. Today's program, and the conference papers available to you as contributions to the program, will give us a look at where the teaching of intelligence is today and where it is tending in the future. The product from today's presentations and discussions, the proceedings flowing from this work, should increase our understanding of how better to nurture this phenomenon so as to bring the very finest young American men and women into the intelligence ranks--national, theater and tactical--in the years ahead."
Joint Military Intelligence College (U.S.)
1999-06-18
-
Study Report: Water Consumption Planning Factors
"The last comprehensive water consumption planning factors study was conducted in 1983 and revised in 1988 and 1994. The US Army requires current, accurate planning factors to determine force structure and for combat planning. Force structure developers must determine the number and types of units required to support the total Army in world-wide commitments. Combat planners must determine the number and type units required to support specific operational plans and establish a phased deployment plan to ensure that support is available for deploying forces. This study revisited the factors currently in force, and challenged proponents of water consuming processes to validate or revise those factors."
U.S. Army Combined Arms Center
1999-06-15
-
Authority of the United States to Enter Settlements Limiting the Future Exercise of Executive Branch Discretion, Memorandum for Raymond C. Fisher, Associate Attorney General [June 15, 1999]
"Attorney General may enter into settlements that would limit the future exercise of executive branch discretion when that discretion has been conferred upon the executive branch pursuant to statute and there exists no independent statutory limitation on the authority of the executive branch to so limit the future exercise of that discretion. The Attorney General's power to enter into settlements that would limit the future exercise of discretion that has been conferred upon the executive branch directly by the Constitution is constrained by the very constitutional provisions that vest discretionary authority in the President and therefore necessarily preclude the President from subjecting the exercise of that discretion to the control of the other party to a settlement or to judicial enforcement. Article III of the Constitution does not preclude the executive branch from entering into judicially enforceable discretion limiting settlements as a general matter or bar federal courts from entering consent decrees that limit executive branch discretion whenever such decrees purport to provide broader relief than a court could have awarded pursuant to an ordinary injunction. Article III limitations may arise, however, when, for example, the terms of the governmental promise are too amorphous to be susceptible to Article III federal judicial enforcement. Although there may be sound policy reasons to reaffirm Attorney General Meese's 1986 policy regulating the use of discretion limiting settlements, the concerns that led to its adoption do not, in general, amount to legally binding limitations on the scope of the executive branch's power to settle litigation in a manner that may limit the future exercise of executive branch discretion."
United States. Department of Justice. Office of Legal Counsel
1999-06-15
-
Note on Mapping User-Oriented Security Policies to Complex Mechanisms and Services
"The quality of service framework in a heterogeneous computer network environment may provide users and applications with a wide range of security mechanisms and services. We propose a simplified user security interface and a method for mapping this interface to complex underlying security mechanisms and services. Additionally, we illustrate a mechanism for mapping multiple security policies to the same user security interface."
Naval Postgraduate School (U.S.). Center for Information Systems Security Studies and Research
Irvine, Cynthia E.; Levin, Timothy
1999-06-15
-
Combating Terrorism: Observations on Growth in Federal Programs, Statement of Mark E. Gebicke, Director, National Security Preparedness Issues, National Security and International Affairs Division, Testimony before the Subcommittee on Oversight, Investigations, and Emergency Management, Committee on Transportation and Infrastructure, House of Representatives
The President's budget request for fiscal year 2000 includes about $10 billion to combat terrorism. About $1.4 billion of that amount was earmarked for dealing with weapons of mass destruction, according to the Office of Management and Budget. This testimony focuses on three issues. First, GAO briefly describes the foreign- and domestic-origin terrorism threats, as it understands them from intelligence analyses, and discusses issues surrounding the emerging threat of terrorist attacks involving chemical, biological, radiological, or nuclear weapons. Second, GAO discusses the growth in federal programs to train and equip local "first responders"--police, fire, and emergency medical services--and the expansion of federal response teams to deal with terrorist attacks involving weapons of mass destruction. Finally, GAO discusses efforts to better manage the federal response to terrorism and opportunities for additional focus and direction.
United States. General Accounting Office
1999-06-09
-
Combating Terrorism: Analysis of Potential Emergency Response Equipment and Sustainment Costs, Report to Congressional Requesters
The Defense Department and others are authorized to provide training, equipment, and advice to civilian emergency response personnel to help them respond to a possible terrorist attack involving chemical, biological, or nuclear weapons. GAO reported last year that some local jurisdictions were buying equipment without the benefit of formal threat and risk assessments based on valid threat data. In the absence of defined requirements, this report determines the potential cost of equipping and maintaining the capability of cities to respond to a terrorist incident involving weapons of mass destruction. GAO (1) provides the views of federal, state, and local officials on equipment that they believed would be needed to respond to such an incident and (2) determines the potential procurement and sustainment costs of these items.
United States. General Accounting Office
1999-06-09
-
Serial No. 106-85: Developments in the Middle East: Hearing before the Committee on International Relations, House of Representatives One Hundred Sixth Congress, First Session, June 8, 1999
On June 8, 1999, the House of Representatives Committee on International Relations convenes to discuss and hear testimony regarding Developments in the Middle East. Testifying is Martin Indyk, the Assistant Secretary for Near Eastern Affairs at the US Department of State. Chairman Benjamin Gilman explains that "With the election of Ehud Barak as Israel's Prime Minister-elect, many expect Israeli-Palestinian negotiations to resume fairly quickly", that "Iran's actions on a variety of issues continue to be of grave concern to many of us", that Iraq is implementing new oil policies, and that in Egypt Hosni Mubarak was nominated for a forth 6-year term. Ranking Minority Member Gedjenson pointedly wants to know who is in control of Jezzin, and what Mr. Indyk thinks of Prsident Asad in Syria. Martin Indyk testifies to all these concerns, saying that "If Israel's negotiating partners are ready to respond, we believe it will be possible to resume negotiations on all tracks", that "Saddam Hussein's defiance of the U.N. Security Council threatens to destabilize the Gulf while exacting a heavy price from the Iraqi people", that "President Khatami's election in Iran in the recent local elections there has made it clear that a significant majority of the Iranian people support political liberalization", and that "extremism is now on the defensive in Algeria and Egypt". He answers questions about predictions for stability in the Middle East and American policy and programs in the region.
United States. Government Printing Office
1999-06-08
-
Trends in Background Issues of Applicants for Access to Classified Information
"Before an employee of the Department of Defense is allowed access to classified information, a background investigation is conducted by the Defense Investigative Service (DIS). The purpose of the investigation is to determine whether issues related to loyalty, reliability, and trustworthiness are present in the person's background. Two major background areas of concern are general suitability issues and loyalty issues. Suitability issues are alcohol use, drug use, criminal conduct, financial responsibility, emotional/mental issues, sexual misconduct and falsification. Loyalty issues are allegiance to the United States, foreign connection, and foreign preferences. A third area, security incidents, is concerned with responsibility for handling classified information. The DIS conducts investigations on three populations of DOD employees: military, both active and reserve; Federal civilians; and defense contractors. Between 1987 and 1996, DIS performed quality assurance by reviewing a sample of issue cases."
Defense Personnel Security Research Center (U.S.)
Carney, Ralph M.
1999-06-07
-
Screening of Personnel Security Investigations
"With the downsizing of the military departments, there is increasing pressure to reduce costs and eliminate non-value added and redundant activities. In the personnel security arena, this has translated into the adoption of a risk management philosophy. The cost of personnel security procedures must be balanced against the degree to which they reduce risk. The focus of this paper is empirically to examine whether the screening of personnel security investigations by the Defense Investigative Service (DIS) makes sense from a risk management perspective...The primary aim of this study was to examine, from a risk management perspective, the feasibility of having DIS screen favorable cases. Of interest was whether the potential cost avoidance derived from a screening program would be outweighed by possible negative impacts on the personnel security determination process. The results were provided for consideration by policy makers in making a decision whether or not to adopt such screening procedures."
Defense Personnel Security Research Center (U.S.)
Crawford, Kent S.; Riedel, James A.
1999-06-07
-
Preparing for Battle: Learning Lessons in the U.S. Army During World War I
"This thesis examines how well the United States Army of World War I prepared for battle by learning the lessons of modern combat from other nations engaged in war. Armies prepare for war during peace. However, the true validation of doctrine weapons, organization, and training developed in peacetime is war. Hostilities between the Allied and Central Powers raged for three years before the Unites States declared war. This period provided the U.S. Army a unique opportunity to observe how technologies and techniques were effectively employed by French, British, and German commanders. The question this thesis attempts to answer is: How well did the United States Army apply the experiences of the belligerent nations from 1914 to 1917 in preparing the American Expeditionary Force (AEF) for combat in the European Theater? The thesis starts with a discussion of pre-war Army developments from the Russo- Japanese War of 1904-05 through the last U.S. military action before the declaration of war, the Punitive Expedition to Mexico. The evolution of warfare through French, British, and German experience is described followed by a discussion of the observations of modern warfare by military professionals and how US Army doctrinal publications and operations planning reflected these changes. The thesis then analyzes U.S. battlefield performance and influences upon the formation of U.S. doctrine."
U.S. Army Command and General Staff College
Cullen, Glen T.
1999-06-04
-
Ancient Chinese Precedents in 'China's National Defense'
From the thesis abstract: "The purpose of this paper is to analyze the strategy embodied in China's 1998 White Paper titled China's National Defense and compare it with the strategic concepts contained in a number of military classics from ancient China. The assumption is that since China's political and military leaders state openly that their strategy is based on traditional Chinese strategic concepts, a study of ancient classics on strategy may provide a deeper understanding of the strategy embodied in China's National Defense. Such an understanding will be of value to United States military strategists as they deal with the China of today and tomorrow. The results of this study did find ancient precedents in the strategy outlined by China's National Defense. The most prevalent strategic precedents include the concepts of: gaining popular support for the national government, pursuing economic development to satisfy the population, developing a strong military to deter/defeat internal and external threats, and preferring the use of peaceful means to solve conflicts rather than using military force."
U.S. Army Command and General Staff College. School of Advanced Military Studies
Geddis, Robert B.
1999-06-04
-
Chemical and Biological Defense of Ports of Debarkation: What Actions are Being Taken and How Effective are They?
"Operation Desert Shield displayed to the world what the U.S. and allied coalition forces could do given six months to flow combat power into ports unopposed. Recent studies commissioned by the Joint Staff concluded that the U.S. military will not have that luxury in the future. This conclusion compels the U.S. to reevaluate its airport and seaport of debarkation (APOD, SPOD) chemical and biological (CB) defense and consequence management strategy. Military analysts believe that a CB strike on the PODs will not rule out U.S. victory as long as the U.S. is willing to endure a prolonged conflict with significant casualties. This study explains the process needed to avoid paying this unnecessary price. An enemy CB attack on a POD during force projection presents a complex situation that demands significant advance preparation. The CB threat comes in many forms and the threat analysis process must be modified to identify each one. Only then can vulnerabilities be accurately assessed and mitigated. The current battlefield vulnerability analysis process, if applied to PODs, would result in a grossly inaccurate effect analysis. Defending against and recovering from a CB attack in the PODs are paramount for the preservation of U.S. strategy and the lives of U.S. service personnel."
U.S. Army Command and General Staff College
Murray, Daniel S.
1999-06-04
-
Role of ABRI in the Post-Suharto Era
"This thesis investigates the future role of the ABRI (Angkatan Bersenjata Republik lndonesia or Armed Forces of the Republic of Indonesia) in the post-Suharto era. It examines the factors which influence the sociopolitical role of the ABRI and postulates possible models for this role within the time frame of five to ten years from the end of Suharto's rule in Indonesia. Based on the change in the sociopolitical role, this thesis identifies the effects on other component roles of the ABRI including external defense, internal security, law enforcement, business involvement, and peacekeeping. It also highlights a roadmap linking observed events in lndonesia to the likely model which will be adopted by the ABRI in the future."
U.S. Army Command and General Staff College
Lee, Tan Chong
1999-06-04
-
Improving the Kansas State Emergency Management System
From the thesis abstract: "Through examination of case studies of past emergency and disaster events occurring in Kansas, Indiana, and North Dakota, recommendations have been derived designed to improve the efficiency of the Kansas Division of Emergency Management. The specific characteristics of emergency management examined within this study are the organization, functions and authority of the three state emergency management agencies. The efficiency of the three emergency management agencies examined in this study are assessed within four aspects of emergency management: preparedness, response, recovery, and mitigation. Emergency management organizations have three different kinds of organizational arrangements: (1) the emergency management director reports directly to the state's governor; (2) the emergency management director reports to the State Adjutant General; and (3) the emergency management director reports to a cabinet level official, such as the public safety director. The Kansas Division of Emergency Management is one of twenty-two states in which the state emergency manager reports directly to the Adjutant General. Indiana and North Dakota were selected for two reasons: (1) both Indiana and North Dakota have experienced significant similar types of natural disasters as has Kansas since 1990; and (2) Indiana's agency is of the type in which the emergency management director reports directly to the governor, providing a different perspective into emergency management. The North Dakota emergency management director reports to the Adjutant General providing insight into a similar emergency management system. The recommendations submitted in this study may increase the efficiency of the Kansas Division of Emergency Management Agency as well as that of other state's emergency management agencies. Recommendations are limited to the scope of this study but may serve to cultivate additional improvements in all facets of emergency management."
U.S. Army Command and General Staff College
Webster, James D.
1999-06-04
-
Century of Foreign Military Intervention: Security Implications of Foreign Area Competency
From the thesis abstract: "This study assesses the evolution of foreign area expertise in the U.S. armed forces during the twentieth century. It focuses on the development of foreign area officer (FAO) programs as the services adapted to incremental requirements for regional expertise, particularly so in the post-Cold War era. This study describes the background of each service's FAO program and investigates the individual progress made by each service in developing foreign area competency commensurate to current and anticipated missions. It assesses the confluence of FAO program objectives with service and national military objectives. This study concludes that the foreign area expertise capabilities in the services as of April 1999 are not equal to the levels required to support the National Security Strategy and the National Military Strategy objectives effectively. That said, this study shows that the Department of Defense has demonstrated both unprecedented recognition of the deficit in foreign area expertise and the resolve to develop capabilities commensurate to requirements. Furthermore, the study also reveals that the process for developing this expertise is well underway, although the individual services differ significantly in their approaches and levels of commitment."
U.S. Army Command and General Staff College
Piontek, Joseph W.
1999-06-04
-
Joint Doctrine for Nonlethal Weapons
From the thesis abstract: "This study investigates whether the armed forces of the United States need joint doctrine for nonlethal weapons. The U.S. Department of Defense is gradually increasing its commitment of fiscal and manpower resources to the development of nonlethal technology; however, published information that provides guidance on how and under what conditions to employ the technology is scarce. In particular, joint doctrine for nonlethal weapons has not been developed. Joint doctrine is only one of several methods that can be used to provide operational commanders with guidance on the employment of an emerging technology. This study, therefore, focuses on identifying the optimum method for enhancing the combat effectiveness of U.S. military forces. Using a descriptive and qualitative analysis approach, the study examines the purpose and functions of joint doctrine; the capabilities provided by nonlethal technology in support of national military objectives; and the current status of published information relating to the operational employment of nonlethal weapons. The study concludes that joint doctrine for nonlethal weapons, by addressing a critical warfighting void, will improve the combat effectiveness of U.S. military forces. The study recommends that the Chairman of the Joint Chiefs of Staff publish this doctrine by 2003 and proposes specific topics to be included."
U.S. Army Command and General Staff College
Perry, Joseph M.
1999-06-04
-
U.S. Army and Doctrine for Weapons of Mass Destruction: Consequence Management Operations
From the thesis abstract: "As the nuclear threat between the United States and the Soviet Union has diminished, new threats now face the nation. The end of the Cold War world brought with it the unleashing of rogue states and terrorist organizations that no longer feel constrained by the superpowers. Coupled with the release of technology worldwide, no nation is risk free from attack on its own soil. While the threat of terrorism in of itself is not new, the threat of the use of weapons of mass destruction (WMD) on American soil creates a new risk to national security. Tasked by Congress, the Department of Defense developed programs and capabilities to deal with consequences of a WMD attack on US soil. This study conducts an analysis of the US Army's current WMD consequence management operations doctrine. The analysis is based on a model developed by Colonel Dennis M. Drew, a former Air Force officer who wrote numerous books and articles concerning military doctrine and strategy. The results of the analysis point to many shortcomings in current Army doctrine. Recommendations are provided to better prepare the Army to fulfill its role in consequence management operations."
U.S. Army Command and General Staff College
Jenkins, Sean M.
1999-06-04
-
Achieving Nuclear, Biological, and Chemical Defense Synergy Through Integrated Land-, Air-, and Space-Based Sensors and Analysis
This thesis presents a concept for a near-future application of an integrated land-, air-, and space-based system of sensors, detectors, and analysis to provide critical immediate warning, reporting, and situational updates of NBC attacks. It shows how much more efficient and effective this concept is as compared to the United States' current system of independent detectors and sensors operating separately at the various levels of command and control. Ultimately, it describes a concept that has a greater potential to achieve the United States' objective of convincing our enemies that NBC weapons will be ineffective against us. The U.S. Counter-Proliferation Initiative is the overarching strategy for countering the WMD threat. It focuses on prevention of the proliferation of weapons of mass destruction, deterrence of their use, and defense measures countering use. While these three arms of the Counter- Proliferation Initiative currently exist in separate operational bodies, they have yet to be linked in a way that will combine and, consequently, strengthen their efforts. What they lack is a system that allows all three elements of this initiative to operate simultaneously and synergistically to nullify the risk or loss of personnel and material from weapons of mass destruction usage. This thesis presents a concept to achieve this critically needed synergy.
U.S. Army Command and General Staff College
King, William E.
1999-06-04
-
Application of Aspects of Unconventional Warfare: Tools for Engaging the Current and Future Threat Trends of the Post-Cold War Environment
"This study investigates the aspects and nature of unconventional warfare operations from pre-Cold War, Cold War, and post-Cold War environments. The case studies examined are: unconventional warfare operations in the Philippines (World War II), unconventional warfare operations with the Contra Rebels, and unconventional operations during Operation Uphold Democracy. Critical factors are identified for each Operation. By analyzing the critical aspects of case studies spanning a full range of periods and operational environments, parallels and trends are established. The threat trends expected in the post-Cold War environment are established and parallel aspects of conventional warfare are evaluated against them. The post-Cold War environment promises to be one of ambiguity and asymmetry, with Special Forces soldiers working through and with indigenous forces. To be successful in this environment, Special Forces soldiers must be technically and tactically proficient, with an emphasis on indirect skills. Indirect skills enable SF soldiers to be flexible and adaptive to fluid changes in the operational and political environment. Primarily, the human element must be amplified. By focusing on cross-cultural communications, linguistics, interpersonal, human intelligence, and training skills, SF training will produce competent and versatile unconventional warriors capable of meeting the diverse threats expected in the post-Cold War environment."
U.S. Army Command and General Staff College
Johnson, Ronald M.
1999-06-04
-
Encryption: Impact on Law Enforcement
Encryption is extremely beneficial when used legitimately to protect commercially sensitive information and communications. The law enforcement community, both domestically and abroad, is extremely concerned about the serious threat posed by the proliferation and use of robust encryption products that do not allow for the immediate, lawful access to the plaintext of encrypted, criminally-related communications and electronically stored data in accordance with strict legal requirements and procedures. The potential use of such commercially-available encryption products by a vast array of criminals and terrorists to conceal their criminal communications and information poses an extremely serious threat to public safety and national security. Law enforcement fully supports a balanced encryption policy that satisfies both the commercial needs of industry for robust encryption while at the same time satisfying law enforcement's public safety and national security needs. Robust, commercially available encryption products, which include some type of recoverable capability that allows for immediate, lawful access to plaintext is clearly the best method to achieve the goals of both industry and law enforcement.
United States. Department of Justice; United States. Federal Bureau of Investigation
1999-06-03
-
Executive Order 13123: Greening the Government Through Efficient Energy Management
"The Federal Government, as the Nation's largest energy consumer, shall significantly improve its energy management in order to save taxpayer dollars and reduce emissions that contribute to air pollution and global climate change. With more than 500,000 buildings, the Federal Government can lead the Nation in energy efficient building design, construction, and operation. As a major consumer that spends $200 billion annually on products and services, the Federal Government can promote energy efficiency, water conservation, and the use of renewable energy products, and help foster markets for emerging technologies. In encouraging effective energy management in the Federal Government, this order builds on work begun under EPACT and previous Executive orders."
United States. Office of the Federal Register
Clinton, Bill, 1946-
1999-06-03
-
Food Biotechnology in the United States: Science, Regulation, and Issues [June 2, 1999]
"This report provides basic information on the science of food biotechnology. It discusses regulatory policies and issues of concern about the use of biotechnology to modify foods through genetic engineering. It describes the scientific processes used and current products available. It explains how all three major federal agencies - the Food and Drug Administration, the U.S. Department of Agriculture, and the Environmental Protection Agency - regulate these foods. Consumers have expressed concerns about the uncertain long-term impact on public health and the environment particularly the consequences of cross pollination, the impact on eco-systems, and the development of resistance with the use of some bioengineered plant pesticides. Some critics also question the expanding market power of a few multinational companies, the growing unease in international trade relationships over the fast adoption by U.S. farmers of bioengineered crops, and the current federal structure by -which it is regulated. Others argue that food biotechnology will enhance crop yields, produce foods with novel characteristics, -while using fewer pesticides. This report will be updated periodically."
Library of Congress. Congressional Research Service
Vogt, Donna U.; Parish, Mickey Elton, 1952-
1999-06-02
-
AF Policy Directive 14-1: Intelligence Applications and Requirements Planning
This Policy Directive provides guidance for intelligence applications and requirements planning. It supercedes AFPD 14-1 from October 1995. This publication updates information and office symbols resulting from an Air Staff reorganization. The need to update this publication also stems from the recent publication of AFPD 10-22, "Intelligence, Surveillance, and Reconnaissance (ISR) Operations", which further delineated specific ISR responsibilities previously contained in this policy directive. This publication is available digitally on the AFDPO WWW site at: http://afpubs.hq.af.mil.
United States. Department of the Air Force
1999-06-01
-
Strategy-to-Task Resource Management: Application of Hierarchies in Defense Resource Planning
From the thesis abstract: "Current defense planning methods do not ensure a direct connection between national security objectives and military tasks. The Strategy-to-Task method provides a framework for solving this deficiency by establishing a hierarchy, starting from national objectives, through military objectives and missions to military tasks. Below these tasks, performance standards can be used for estimating the utility of a given task. This hierarchical approach helps decision-makers understand these important linkages. It could also serve as a framework for prioritizing the different tasks and contribute to better resource allocation, by analyzing different alternatives in a multi-attribute space. There are two decision-supporting methods for setting up priorities within this hierarchy of multi-attribute objectives. The first one, Multi-Attribute Utility Function Analysis, is a useful method for cases when performance standards can easily be established. This method could be used under both certainty and uncertainty and can address dependence and independence among the attributes or their utilities. The second method, the Analytic Hierarchy Process, could be used in cases when performance standards are difficult to establish, as is typically the case in the higher levels of the hierarchy. The hierarchical approach and the two methods are illustrated through the case of Hungary's participation in NATO peace-operations."
Naval Postgraduate School (U.S.)
Gaspar, Tamas S.
1999-06
-
Flourishing Craft: Teaching Intelligence Studies
"This Conference on Teaching Intelligence Studies at Colleges and Universities establishes another benchmark in the advancement of thought on the democratization of the concept of intelligence and of the intelligence calling. In the tradition of Sherman Kent's 'Strategic Intelligence for American World Policy' (1949) and Roger Hilsman's 'Strategic Intelligence and National Decisions' (1956), and in the spirit of Klaus Knorr's 'Foreign Intelligence and the Social Sciences', Research Monograph No. 17 (Princeton, NJ: Center of International Studies, 1964), this collection of papers highlights the convergence of academic and applied factions in the pursuit of intelligence professionalism. […] Authors in this volume merely represent the many others who harbor a boundless passion for learning and teaching about intelligence. Nearly all the authors come to the craft with years of experience in the application of intelligence principles and practices, usually but not always within government circles. Readers will note some very well-known names among these authors, and the College is pleased to count two of its own faculty among them. The Editor also notes that the next Occasional Paper in this series, 'Intelligence Essentials for Everyone', will continue the impulse toward convergence of government and private-sector reflection on the science and art of intelligence."
Joint Military Intelligence College (U.S.)
Swenson, Russell G.
1999-06
-
Benefits, Costs and Risks of Converting from Military Design Specifications to Commercial Performance Standards at a Commercial Laboratory
"In February 1996, Major General George E. Friel, Commander, U.S. Army Chemical, Biological Defense Command (CBDCOM) signed the first four waivers under his reinvention authority. These waivers allowed contractor laboratories to operate under commercial per Ordnance standards in their work with small quantities of chemical agents. Throughout the process of converting from detail specifications to performance specifications, performance parameters were measured. During the design of these performance metrics, there were no thoughts of recording the costs to each contractor laboratory while converting their plans and procedures. The business risks to the contractors were also not measured. This thesis investigates the benefits, costs and tasks of converting from detail specifications to performance standards in an environment of reinvention. Since reinvention and conversion to performance standards are major Department of Defense (DOD) thrusts, the investigation of related benefits, costs and risks is timely. The research includes a case study of one of the National Institutes involved in the conversion process. The Institute chosen is Midwest Research Institute (MRI) in Kansas City, Missouri."
Naval Postgraduate School (U.S.)
Poteet, Thomas L.
1999-06
-
Design and Construction of an Expandable Series Trans-Augmented Electromagnetic Railgun
From the thesis abstract: "Long range maritime land attack can be accomplished with today's chemically propelled munitions only by sacrificing responsiveness. Projectiles launched with electromagnetic forces can achieve velocities above 2-3 kilometers per second. The technical challenges to be overcome before electromagnetic launch can be considered practical for maritime land attack include development of high density pulsed power supplies, high current power switching and a long life launcher. To investigate electromagnetic launch technology a 1.2 meter railgun was constructed. It was designed to allow augmentation and various bore configurations. The railgun power unit consists of two 11 kV, 830 microfarads capacitors discharging through a 7 micro-H inductor coil. A crowbar circuit provides capacitor protection. Operational testing of the firing circuit, instrumentation, power unit, and launcher structure was satisfactory. The 7 micro-H coil induced currents within the power unit, which adversely effected triggering circuitry. The molybdenum projectiles initially tested proved disappointing due to their tendency to meld with the copper rails. An extended current pulse resulting from such a meld caused failure of the crowbar circuit, which curtailed further testing. The induction coil could safely be discarded, and a revised crowbar circuit will prevent further failure. Future operational testing will focus on alternative armature materials and designs and on operational methods."
Naval Postgraduate School (U.S.)
Lockwood, Michael R.
1999-06
-
United States Attorneys' Bulletin: Money Laundering, Volume 47 Number 3, June 1999
This edition of the United States Attorneys' Bulletin covers money laundering. The following articles are included: "Interview with Gerald E. McDowell"; "The Money Laundering Statutes"; "Using Suspicious Activity Reports: A Task Force Approach"; "Follow the Money"; "Using the Bank Secrecy Act"; "The Colombia Black Market Peso Exchange"; "Money Laundering and the Sentencing Guidelines"; "International Forfeiture Cooperation and Sharing of Confiscated Assets"; "Forfeiture for Money Laundering Offenses."
Executive Office for U.S. Attorneys
1999-06
-
Radiological Sources of Potential Exposure and/or Contamination
Technical Guide 238 summarizes sources of potential radiological exposures or contamination to military personnel from both civilian and military origin. Although, there is emphasis on sources that deployed soldiers may encounter, this guide is general enough to be used in non-deployment situations. Scenarios describing exposures to radiation or radioactive materials are presented. Some of these scenarios are illustrative and can aid in identifying and evaluating potential exposures. LLIS Core Capability: HazMat
U.S. Army Center for Health Promotion and Preventive Medicine
1999-06-01?