Advanced search Help
Clear all search criteria
Only 2/3! You are seeing results from the Public Collection, not the complete Full Collection. Sign in to search everything (see eligibility).
-
Technical Information Bulletin 99-2: Relationships of Popular Transmission Characteristics to Perceived Quality for Digital Video Over ATM
Managing video quality and its delivery, especially during NS/EP events, requires a coordinated effort between network design, video codec design, and network operating practice. Four sets of standards impact the ability of ATM networks to deliver quality video and provide for NS/EP preferences: MPEG-2 video communication standards, ITU-T transport protocol standards, ATM standards, and network carrier standard operating practices. There is a need for an overarching standard or set of standards that define the relationship between MPEG-2 traffic generation, traffic transport, and ATM switching. Creation of this overarching standard would highlight deficiencies within the underlying standards, i.e., MPEG-2, ITU-T, and ATM, thereby leading to their eventual enhancement. In so doing, traffic management for commercial and NS/EP-related traffic would improve with an overall benefit to video quality. Finally, there will be a need for network quality standards and standard network operating procedures within the network operators. The number of switches and the quality of the bearer channels have significant impact upon video quality. Therefore, network organization has significant implications to congestion management. Network quality standards would define the expected behavior of these networks. Quality standards would lead to uniform network design and operating practice in much the same way as AT&T's "Notes on Direct Distance Dialing" and Bell Telephone's technical publications defined high-quality practices within the telephone network years ago.
National Communications System (U.S.). Office of the Manager
Ragsdale, Gary L.; Lynch, Gerard P.
1999-01
-
Proceedings of the First Joint Services Workshop on Biological Mass Spectrometry, 28-30 July 1997, Baltimore, Maryland
"The first Joint Services Workshop on Biological Mass Spectrometry was held 28-30 July 1997, at the Hyatt Regency, Baltimore, MD. The workshop was organized by the U.S. Army Edgewood Research, Development, and Engineering Center (ERDEC)* and co-sponsored by the U.S. Navy and U.S. Air Force. The overall objective of the workshop was to bring together experts and practitioners for a review of the state-of-the-art in biological mass spectrometry and related technologies to serve as the basis for the generation of a program strategy for the development of next-generation biological mass spectrometers. Such mass spectrometer systems will have significant impact not only on chemical/biological defense but also on environmental and food monitoring, the health industry, and various research and industrial endeavors. The workshop addressed a range of issues related to the development of automated, integrated mass spectrometers based on leading edge methodologies for the characterization, analysis, and identification of biological materials. Particular attention was given to applications of electrospray ionization (ESI) and matrix-assisted laser desorption ionization (MALDI), interface of separation methods, biological sample handling/processing, and potential biomarker classes. These Proceedings compile summaries of a majority of technical presentations made during the conference portion of the workshop."
Edgewood Chemical Biological Center
Krishnamurthy, Thaiya; Long, S. R; Snyder, A. P.
1999-01
-
Transnational Threats 101
"Although we have faced transna- tional and asymmetric threats since the birth of our nation, many intelligence professionals and operators still do not understand the terms and concepts involved. This article will explain these threats, why we care, what we (collectively) are doing about them, and what you can and should be doing as an intelligence professional. These threats are not new, what is new is our recent focus on them as priorities. I will also show that we have an adequate structure in place to address these threats, but should be doing more to educate our- selves, our soldiers, and our supported commanders. This education must include mechanisms for better information sharing as well as adjustments to our doctrine and the way we present this doctrine relative to the asymmetrical battlefield and transnational threats."
United States. Department of Defense
Chenery, John T.
1999-01
-
Proposed Modeling Protocol for Evaluating Information Attacks
"The essence of an information attack is to alter, either by intrusion into and manipulation of a database or by deception, the scenario under which a target mind or organization evaluates and selects future courses of action. The aim is to influence the actions of the target. The method is alteration of the perceived desirability or expected payoff of specific courses of action. This alteration of the information in possession of the target can be described as alteration of the perceived reality under which the target operates. Probable success by an attacker in altering the target's perceived behavior, given a successful manipulation of the target's information, has, in the past, been subjective. A modeling protocol based on the use of game theory is proposed that may, in certain cases, allow optimization of the scenario, or reality, imposed on the target to force the choice of a desired course of action. It should also allow a quantitative estimate of the likelihood of the target's adopting a given course of action. This tool can be used to estimate friendly susceptibility to information attack."
U.S. Army Research Laboratory
Brand, John H., II
1999-01
-
IS-288: Role of Voluntary Agencies in Emergency Management, Student Manual
This manual is designed to accompany "IS-288: The Role of Voluntary Agencies in Emergency Management," an independent study course sponsored by FEMA's Emergency Management Institute. "Unit One: Introduction to Disaster Relief Voluntary Agencies provides an overview of voluntary agencies and describes the unique strengths that voluntary agencies bring to any disaster relief operation; Unit Two: History of Disaster Relief Voluntary Agencies identifies historical milestones that contributed to the development of voluntary agencies in the U.S. […]; Unit Three: Roles and Services of Disaster Relief Voluntary Agencies describes the roles and services that voluntary agencies may provide throughout each phase of the emergency management cycle. […]; Unit Four: Working Together explains the importance of coordination between the different voluntary agencies and between voluntary agencies and their emergency management partners. This unit also explains the role and responsibilities of different organizations, committees, and positions that support collaboration among voluntary agencies. […]. Appendix A includes a list of acronyms and their definitions that are included throughout the course. Appendix B includes a list of current NVOAD member agencies, including contact persons, addresses, telephone and fax numbers, and e-mail addresses. Appendix C contains detailed steps for developing a state or local Voluntary Organizations Active in Disaster (VOAD). Appendix D includes a list of recommended readings to help you continue learning after completing the course. Appendix E lists the answers to the course pretest and Check Your Memory sections at the end of each unit. Appendix F includes the course final examination."
United States. Federal Emergency Management Agency; Emergency Management Institute (U.S.)
1999-01
-
Weaponization Of Space: Understanding Strategic and Technological Inevitabilities
"It is inevitable that mankind will weaponize space and equally likely that this will take place in the next thirty years. The United States is in the early stages of a transition from using space assets to support combat operations on the surface of the earth to using space assets to conduct combat operations in space, from space, and through space. This paper discusses factors driving the United States to take its first steps to weaponize space. It is time for the Air Force to build the doctrinal framework for combat operations in, from, and through space that will guide the technological development of space assets just as the doctrine of strategic bombardment guided Air Force thought and aircraft development prior to World War II. This paper discusses the transition from an air to a space force by examining required changes to Air Force doctrine in terms of the framework of its six core competencies in order to prepare the Air Force to organize, train, and equip aerospace forces for conducting combat operations in space." -- Abstract
Air University (U.S.). Air War College
Bell, Thomas D.
1999-01
-
Report of the Accountability Review Boards on the Embassy Bombings in Nairobi and Dar es Salaam on August 7, 1998
The two terrorist bombings in Nairobi and Dar es Salaam resulted in the deaths of over 220 persons and injuries to more than 4,000 people. Twelve American USG employees and family members and 40 Kenyan and Tanzanian USG employees were among those killed. Both chanceries and several other buildings were severely damaged or destroyed. The FBI investigation of criminal suspects in the attacks is ongoing. Having completed an extensive review in Washington, Nairobi and Dar Es Salaam, the Boards were most disturbed at two interconnected issues: first, the inadequacy of resources to provide security against terrorist attacks and, second, the relative low priority accorded security concerns throughout the US government -- by the Department, other agencies in general, and on the part of many employees both in Washington and in the field. Saving lives and adequately addressing our security vulnerabilities on a sustained basis must be given a higher priority by all those involved if we are to prevent such tragedies in the future.
United States. Department of State
1999-01
-
International Game '99: Crisis in South Asia, 28-30 January 1999
"The primary purpose of this game was to explore international approaches for dealing with crises involving the threat and use of nuclear weapons. To do so, the game engaged mid- to high-level participants from fifteen countries in a United Nations Security Council setting. The scenario examined tensions between India and Pakistan. Participants agreed that accident and miscalculation are the most likely triggers that could result in a nuclear exchange on the sub-continent. Resort to tactical nuclear weapons is especially likely if a country perceives that its sovereignty is seriously threatened. Participants also asserted that if the international community fails to resolve serious cross-border tensions, and only attempts, on the brink of conflict, to search for solutions, it must bear some responsibility for the suffering that results. Some players expressed a preference for handling such matters bilaterally, others indicated a preference for a regional resolution; but, for the most part, participants understood that a crisis involving the potential use of nuclear weapons is an international problem. Moralist, pragmatist, and fatalist positions were all represented in the game. Few players believed, however, that the world would be denuclearized in the near term, if ever. Nuclear weapons are like smoke in a bottle; once released, it is impossible to put it back in."
Naval War College (U.S.)
Hayes, Bradd C.
1999-01
-
Improving Firefighter Communications: Special Report
"Several recent incidents involving firefighter fatalities demonstrate that, despite technological advances in two-way radio communications, important information is not always adequately communicated on the fireground or emergency incident scene. Inadequate communication has a definite negative impact on the safety of emergency personnel and may contribute to injuries or deaths of firefighters, rescue workers, and civilians. Inadequate fireground communication is repeatedly cited as a contributing factor in many of the incidents reported through the United States Fire Administration Major Fires Investigation Project. This fact, coupled with the limited availability of research on such an important topic, prompted the United States Fire Administration (USFA) to study some of the potential causes of communication breakdown, and to provide recommendations that will help departments improve their operational communications. While the findings contained in this special report are primarily oriented toward the municipal fire service, this does not diminish their potential relevance to other firefighters and emergency responders. With respect to communicating in high-stress environments, numerous parallels exist across public safety and related disciplines. Some of the ideas presented here are drawn from the experiences of wildland firefighters, airline flight crews, and military personnel."
United States Fire Administration
1999-01
-
Citizen Fire Academies as a Marketing Tool
"With the introduction of tax caps, right sizing and the ever-increasing task of doing more with less, public service organizations are faced with fierce competition while vying for their share of budget dollars. Traditional government services have been placed under the microscope and have been held to a higher standard of fiscal accountability, while having to justify their services and the cost of providing those services. The Fitchburg Fire Department needed to justify all aspects of providing emergency services. The purpose of the research was to identify the need and develop a marketing tool that justified of the day-to-day operations, annual budget, and capital expenditures. An additional purpose was to develop a Citizen Fire Academy. Specific research questions answered were: 1. What are the major disadvantages of not having a marketing/public education tool for the fire department? 2. What are the major advantages of having a Citizen Fire Academy as a marketing/public education tool? 3. What other advantages (to internal customers) would a marketing/public education tool, such as a Citizen Fire Academy, cultivate within the fire department? Historical research was conducted through literature review, personal correspondence, and interviews. Evaluative research was conducted by the acquisition of model citizen fire academies. Action research was conducted in the form of the development of a model citizens fire academy."
National Fire Academy
Fulmer, David B.
1999-01
-
Natural Hazards: Minimizing the Effects, Recent USGS Success Stories
This document discusses United States Geological Service success stories with regards to natural hazards. "USGS Warns San Francisco Residents of Landslide Dangers - In early 1998 during record-breaking El Niño storms, the USGS provided emergency workers in the 10-county San Francisco Bay region with maps of landslide hazard areas and realtime warnings of increased landslide risks. No loss of life occurred from these landslides, compared to 25 killed in comparable storms in 1982. […]Flood Warnings Protect People - As floods ravaged many areas of the United States in 1998, USGS personnel maintained a nationwide system of more than 7,000 stream gages. These gages provide accurate, timely information on water levels, which the National Weather Service uses to issue local and regional flood warnings. Local officials also use stream-gage data to make timely decisions about evacuating people in flood-prone areas."
United States. Department of the Interior; Geological Survey (U.S.)
1999-01
-
Technical Information Bulletin 99-3: Gigabit Networking
Gigabit networking is expected to grow rapidly in popularity over the next several years. It is anticipated that as the communications infrastructure evolves to support gigabit speeds, new applications such as telemedicine, desktop videoconferencing, scientific modeling, and interactive telecollaboration will evolve to become important commonplace capabilities. These and many other bandwidth intensive applications have great potential to improve National Security/Emergency Preparedness (NS/EP)communications and event management activities. This report examines existing and emerging gigabit networking technologies, addresses issues associated with their applications, and discusses their applicability to NS/EP environments.
National Communications System (U.S.). Office of the Manager
1999-01
-
Technical Information Bulletin 99-1: Asynchronous Transfer Mode (ATM) Over Asymmetric Digital Subscriber Line (ASDL) Systems
Asymmetric Digital Subscriber Line (ADSL), a new modem technology currently being deployed, promises to provide enhanced and affordable access to the Internet, live video, and a wide variety of other multimedia broadband services over existing copper twisted-pair wirelines. Because of its capability to accommodate a broad range of traffic from diverse sources, support high data rates, and provide gains in bandwidth efficiency, Asynchronous Transfer Mode (ATM) is gaining broad acceptance as the preferred transport mode for broadband terrestrial communications. The key to successful transport of ATM traffic over ADSL is an end-to-end architecture that with protocol transparency ensures preservation of both the rate adaptive characteristics of the ADSL access medium, and the quality of service (QOS) guarantees of ATM. The ability of ATM over ADSL to provide seamless broadband access for remote users appears to have significant implications for planners and providers of national security and emergency preparedness (NS/EP) services. This report presents the results of an examination from a NS/EP perspective of selected technical interface/system considerations associated with the use of ADSL technology to provide access to the public switched telephone network (PSTN) for ATM traffic.
National Communications System (U.S.). Office of the Manager
1999-01
-
Iraq: U.S. Policy Options [Updated December 23, 1998]
From the Summary: "In the aftermath of the December 16-19 U.S.-British bombing campaign against Iraq (Operation Desert Fox), the United States continues to search for a sustainable and effective means of ending the threat posed by Iraq. Many in Congress believe that U.S. policy should focus primarily on removing Saddam Husayn from power. The Administration says it is working toward that outcome but that achieving it will be difficult. According to the Administration, near term U.S. policy should focus primarily on preventing any restart of Iraq's weapons of mass destruction (WMD) programs and on containing Iraq's ability to threaten its neighbors. This report will be updated to reflect regional, diplomatic, or legislative developments."
Library of Congress. Congressional Research Service
Katzman, Kenneth
1998-12-23
-
Cross Border Contingency Plan - U.S./Mexico Sister Cities: Laredo/Nuevo Laredo
"The municipalities of the city of Laredo, State of Texas, and the City of Nuevo Laredo, State of Tamaulipas, have recognized their need to cooperate with each other in times of local disasters. This plan between the two cities to meet emergencies and disasters will assure full and effective utilization of resources and manpower essential to the safety, care and welfare of all people, property and environment within the two Federal boundaries affected. These Standard Operating Procedures provide an outline of the immediate action to be taken by elected and appointed officials, and organization which would be involved dependent on the extent and nature of the disaster. This Cross Border Contingency Plan will become an annex to existing city, state, regional, and Federal plans and an emergency under this plan will be declared if the severity and geography of the event warrant outside support services."
United States. Environmental Protection Agency
1998-12-21
-
Appropriations for FY1999: Defense [December 18, 1998]
"Congress completed action on FY1999 defense authorization and appropriations bills on October 1. The House approved the conference report on the defense authorization bill (H.R. 3616) on September 24 and the Senate on October 1. The President signed the bill into law (P.L. 105-261) on October 17. The House approved the conference report on the defense appropriations bill (H.R. 4103) on September 28 and the Senate on September 29. The President signed the bill into law (P.L. 105-262) on October 17, as well. Later Congress approved additional funding for defense programs in the FY1999 Omnibus Consolidated and Emergency Supplemental Appropriations Act (H.R. 4328, P.L. 105-277), which the House approved on October 20 and the Senate on October 21, and which the President signed later that day. The authorization conference agreement resolved a number of contentious issues, include restrictions on technology transfers to China in the House bill; gender-integrated basic training, which the House wanted to restrict, while the Senate supported the current system; restrictions on base consolidation included in the Senate bill; options for producing tritium for nuclear weapons; and a few major weapons issues, including funding for the Theater High Altitude Area Defense (THAAD) system and Senate provisions requiring more testing of the F-22 fighter."
Library of Congress. Congressional Research Service
Daggett, Stephen
1998-12-18
-
OECD Trilog Plenary Symposium: Public Policy Issues in Global Freight Logistics
This is the fifth plenary symposium on public policy issues in global freight logistics conducted by the Organization for Economic Cooperation and Development (OECD). OECD's Trilateral Logistics Project, Trilog Project, is aimed at clarifying the public policy issues in global freight logistics and strengthening the public-private partnership in resolving freight-related problems throughout the world. On the first day of the symposium, opening addresses were presented, followed by sessions discussing the globalization of transport logistics, regional characteristics of freight logistics - government cooperation and coordination, and sectoral and industry characteristics of logistics - government support requirements. The second day sessions covered the following: improving the efficiency of intermodal transport and global logistics; financing national transport networks and links in support of global logistics; U.S. initiatives to improve system efficiency; human resource implications of changes in global logistics practices; performance measures, benchmarking, and data requirements in global logistics; and summaries and conclusions from moderators of panel presentations - recommendations for follow-up activities.
United States. Federal Highway Administration
1998-12-18
-
Security Implications of the Proliferation of Weapons of Mass Destruction in the Middle East
This monograph addresses the important question of the security implications for the nations of the region of the proliferation of weapons of mass destruction in the Middle East. The Strategic Studies Institute is pleased to offer the monograph as a contribution to the national security debate on this important issue. The author offers a unique perspective based on extensive interviews that he conducted in the region, and makes specific policy recommendations for U.S. military and civilian decisionmakers.
Army War College (U.S.). Strategic Studies Institute
Hajjar, Sami G., 1939-
1998-12-17
-
Security Implications of the Proliferation of Weapons of Mass Destruction (WMD) in the Middle East
This paper concerns the underlying dynamic of the proliferation of weapons of mass destruction (WMD) in the Middle East. It will seek to explain the quest to proliferation in terms of the interconnectivity and the region, the motivations of the major regional powers, and local perceptions as to the nature of security threats. Finally, the paper will discuss the implications of proliferation for U.S. policy toward the region that may require a shift in that policy.
United States Air Force Academy
Hajjar, Sami G., 1939-
1998-12-17
-
Blue Grass Community CSEPP Exercise 1998 [Richmond, KY; October 21, 1998]
"The Blue Grass Community CSEPP Exercise 1998 (Blue Grass CSEPP EX 98) was conducted on October 21, 1998 to demonstrate the emergency response capabilities of the Blue Grass CSEPP Community and to validate correction of findings identified during past CSEPP exercises. The requirement for conducting Chemical Stockpile Emergency Preparedness Program (CSEPP) exercises was established in the August 1988 Memorandum of Understanding (MOU) between the Federal Emergency Management Agency (FEMA) and the U.S. Army. Exercise design, planning, evaluation, and reporting guidance is contained in the 'Chemical Stockpile Emergency Preparedness Program Exercises' document, dated February 23, 1994, as amended by Change 1, dated June 1994, and Change 2, dated November 1995."
United States. Federal Emergency Management Agency; United States. Department of the Army
1998-12-17
-
Good Intentions or Good Targets? NBC Defense Considerations During Peace Operations
As recent history illustrates, future maintenance of world order and stability will require peace operations on a rather regular basis. The United States, reigning world superpower, will probably absorb its fair share of these missions. This monograph examines the unique missions of peacekeeping and peace enforcement and assesses whether or not current United States nuclear, biological and chemical (NBC) defense doctrine is applicable in peace operations. The monograph begins by documenting the relevant facts of the history of weapons of mass destruction (WMD), identifying the threat and examining possible relationships to peace operations. Although the employment of WMD during peace operations has not yet been confirmed, its potential use under these conditions should be seriously considered. Therefore, the monograph examined two case studies in which the potential for WMD employment was a possibility. The case studies include an overview of each operation, an analysis of the relevant WMD threat, and an identification of likely NBC defense requirements for a peace operation conducted in a NBC environment. Lastly, NBC defense doctrine is analyzed using the requirements identified in the case studies. The doctrinal functions of avoid, protect and restore were evaluated as to their applicability in peace operations. Specifically, does the doctrine satisfy the requirements of the tactical commander? The analysis identified a shortfall in NBC defense support to refugees and civilians involved in peace operations. The monograph closes with recommendations for mitigating the shortfall.
U.S. Army Command and General Staff College
Kimmell, Scott D.
1998-12-16
-
Intelligence Preparation of the Battlefield in Peace Operations: Is It Time for a Change?
Through the 1990s the U.S. armed forces engaged in peace operations in the former Yugoslavia. The predominance of the U.S. military and the lack of any true conventional peer opponent indicate the potential for commitment to similar situations in the future. This monograph investigates the applicability, relevance and analysis rendered by the current IPB model in peace operations. It will examine the question: Within the context of peace operations, is the current Intelligence Preparation of the Battlefield process an adequate tool to provide a common, relevant picture for the commander? The monograph begins by describing the context and intelligence requirements of peace operations. Peace Operations require a different approach than that outlined in FM 34-130, Intelligence Preparation of the Battlefield. FM 34-130 primarily focuses on combat operations and developing enemy courses of action. Rather than approach the problem using the current reductionist techniques used in IPB. Systems approach provides a potential answer to understanding the interaction between all factions involved in peace operations. The monograph therefore examines some concepts from systems theory that prove useful in understanding the dynamics of peace operations. These concepts are applied to case studies of recent operations conducted by the United States Army. Finally, modifications to the current IPB process are discussed. This monograph proposes changes to the current IPB model that provides additional insights into the motives and objectives of factions in a peace operation.
U.S. Army Command and General Staff College
Mikaloff, Robert S.
1998-12-16
-
Attacking Cell Phones With Sabots: Disintegration of an Asymmetrical Urban Threat in the Year 2025
In the light of a new emerging threat and its implication for an American Army exploring potential technologies and concepts for the year 2025; this monograph explores the following: Can the proposed Army after Next (AAN) tactical methods disintegrate an asymmetric enemy operating in an urban environment? The theory presented provides a useful tool to discover valid new approaches to counter asymmetric threats. Therefore, complexity theory and general systems theory form the foundation for understanding of disintegration theory as presented by Dr. James Schneider in his monograph: "Cybershock: Cybernetic Paralysis as a new form of Warfare." This monograph outlines the theoretical presuppositions and logic of disintegration theory to create a mental library of abstract concepts from which to generate viable tactical options to counter asymmetric urban threats. History then provides empirical evidence that adds pragmatism and validity to the more abstract concepts outlined by theory. The Battle of Mogadishu serves as a recent example.
U.S. Army Command and General Staff College
Green, Wayne A.
1998-12-16
-
When Does a 'Hacker' Become an 'Attacker?'
From the thesis abstract: "The ability to defend the United States cyber sovereign territory is a must for the country to continue to enjoy relative freedom. The actual defense of this is far more difficult than the traditional defense of land, sea or air space. The Internet offers an environment of exponential growth in both technology and users. Couple this with an infantile and developing governing system and the Internet is both a conduit for use and a vehicle for attack. The history of cyber attack is key in determining the ability to defend and the mode in which to do it. By tracing the capabilities of adversaries, both internal and external, we can attempt to delineate the point where the electronic intrusion becomes alarming to the nation. Combine this understanding with a thorough knowledge of current methodologies and tools used for cyber attack and one has a good jump on 'knowing one's enemy.' Constraining, yet legitimizing, the effort of governments to fight the unbounded attack of cyber warriors are laws and agreements which attempt to lay ground rules for cyber utilization. Careful construction of these rules joined with vigilant international agreements can facilitate apprehension and thwarting of would-be attackers worldwide. Laws which are drafted without thought to the defense of information systems can be equally as damaging to the government that adopts them. This monograph concludes with the current efforts underway by the United States government and the Department of Defense in particular, Presidential Decision Directives 62 and 63 posture the United States for success in combating cyber aggression. The follow through by the legislative, judiciary branches and various departments will determine the success of this country in securing its national information infrastructure."
U.S. Army Command and General Staff College. School of Advanced Military Studies
Are, David C.
1998-12-16
-
Foreign Assistance: U.S. Assistance for Elementary and Preparatory Schools in the West Bank and Gaza Strip
GAO noted that: (1) for fiscal years 1996-1998, it estimated that U.S. assistance to United Nations Relief and Works Agency (UNRWA) elementary and preparatory schools in the West Bank and Gaza Strip totalled about $69 million; (2) the U.S. share of UNRWA's education budget for the West Bank and Gaza Strip accounted for $65.2 million; (3) the remainder was an Agency for International Development grant of $3.6 million for an UNRWA program involving school construction and maintenance activities; (4) no U.S. assistance was provided for Palestinian Authority (PA) schools; (5) U.S. assistance to UNRWA elementary and preparatory schools in Jordan, Lebanon, and Syria totalled about $61 million for fiscal years 1996-1998; (6) these funds represent the U.S. share of UNRWA's education budget and U.S. support for special funding projects under UNRWA's Peace Implementation Program; (7) the United States Information Agency (USIA) provided English language training for teachers in schools in the West Bank, Gaza, Jordan, Lebanon, and Syria, but USIA funding information was not readily available; (8) however, USIA noted that aggregate spending levels were small compared to the other funding activities; (9) an Overseas Private Investment Corporation (OPIC) official told GAO that no OPIC funds had been made available for elementary and preparatory schools in the region during fiscal years 1996-1998; (10) two private voluntary organizations operating in the region told GAO that none of their funds had been spent on activities benefiting PA elementary and preparatory schools; (11) they were also unaware of any other private voluntary organization in the region with such programs; (12) determining whether any textbooks used by UNRWA were those reviewed by the Center for Monitoring the Impact of Peace was beyond the scope of GAO's review; (13) however, UNRWA documentation shows it purchased PA textbooks as early as the 1995-1996 school year; (14) according to UNRWA, less than 2 percent of its education budget for the region was spent on textbooks in the current school year; (15) the U.S. proportional share of these expenses was about $791,000; and (16) the conference report on the Omnibus Consolidated and Emergency Supplemental Appropriations Act of 1999 directed that the Secretary of State submit a report to the House and Senate Appropriations Committees "specifying whether the content of the textbooks and curricula used by UNRWA contains anti-Semitic material" not later than 90 days after the act's enactment.
United States. General Accounting Office
1998-12-15
-
Department of Defense Directive 5210.55: Department of Defense Presidential Support Program
This Directive: 1. Reissues reference (a) to update policies and assign responsibilities. 2. Is implemented by reference (b) prescribing the procedures for the nomination, screening, selection, approval and continued evaluation of DoD military and civilian personnel, and contractor employees assigned to, or retained in Presidential support duties.
United States. Department of Defense
1998-12-15
-
Civil-Military Crisis? Tocqueville's Theory of Civil-Military Relations
"This paper reviews the current debate on civil-military relations, outlining the mayor lines of argument. It then examines objective research data to evaluate the actual existence of a growing gap between military and society in the United States. It subsequently evaluates this evidence in light of Tocqueville's theoretical framework, set out in broader form in the author's overview of Tocqueville's comprehensive body of thought on military forces in democratic states. It concludes with some possible approaches that take into account the root causes of civil-military tension, in an attempt to escape the essentially a historical trap of viewing this problem (or any problem) as being unique to our times, and thus limiting the options available to address the issue. Why this topic? What is its connection to the national security policy process? Quite simply, policy is formulated and Implemented in a context. This context consists of several important dimensions, among them the economic, domestic political, and international spheres. Policy makers-presumed to be rational beings-attempt to anticipate environmental constraints. Consequently, their perceptions of the policy environment will affect policy formulation. In other words, the policy environment is operative well before implementation; understanding these environmental constraints may help explain policy choices. In this paper, I consider one aspect of the domestic political and social environment on both national security policy formulation and implementation. One of the most provocative descriptions of this environment is outlined in Tocqueville's 'Democracy in America', which deals with a broad range of issues ranging from politics to sociology to economics. This paper argues that Tocqueville's analysis raises serious issues with profound implications for the ability of democratic states to formulate and implement policy relevant to the civil-military relationship. Understanding the characteristics of this environmental constraint may help avoid pitfalls that could have grave consequences for society."
National War College (U.S.)
Neubauer, Martin
1998-12-14
-
Quadrennial Defense Review: Improving the Process to Improve the Product
"While many in Congress may have held out high hopes that the QDR [Quadrennial Defense Review] and NDP [National Defense Panel] would produce meaningful recommendations for change to meet the nation's future security requirements, the results have been disappointing. This paper will seek to explain that the shortcomings in the products from the QDR and NDP were, perhaps predictably, largely a result of the bureaucratic structure of the process used to conduct these two much-publicized defense reviews. Furthermore, this paper will offer recommendations for an alternative structure for the next QDR to increase the freedom and independence of its operations. This will improve the chances that the next review will take a truly 'fresh look' at defense and yield a more relevant report."
National War College (U.S.)
Snodgrass, David E.
1998-12-14
-
Force Protection after Khobar Towers: A Case Study
"This paper recounts the bombing of the Khobar Towers complex in Dhahran, Saudi Arabia, on 25 June 1996 during which 19 U.S. Air Force personnel were killed and over 500 wounded. The airmen were part of the U.S. Air Force's 4404th Wing (Provisional). The blast was heard as far as 20 miles away, but it reverberated most loudly in the American press and the halls of the Pentagon. How could it happen? Was the United States doing all it could to prevent such a tragic event? Was there a failure of individual responsibility? Was this an isolated incident or a systemic failure? Newspapers debated these questions for weeks, while the Department of Defense (DoD) searched for the same answers. One area that finds general agreement among members of the DoD is the dramatic change in the emphasis placed on the force protection program in the months after the bombing. Changes were made that dramatically affected the way all four services train and equip their forces, as well as the methods used by unified commanders when planning for and undertaking military operations. An entire paper could be devoted to the process of force protection as it has evolved since June of 1996. This paper instead examines the development of force protection policy within the DoD in the aftermath of the Khobar Towers bombing. Using the 'Practitioner's Framework' provided in the course, the bombing will serve as a case study in the national security decision making process."
National War College (U.S.)
Branigan, Matthew P.
1998-12-14
-
President's Decision to Attack Afghanistan and Sudan: Conflicting Decision Styles Yields Controversy and Criticism
From the thesis abstract: "On August 7, 1998, terrorist bombs exploded outside of the U.S. Embassies in Nairobi, Kenya and Dar es Salaam, Tanzania, killing over 250 persons. Over the course of the next two weeks, decision making processes were placed into motion cased upon the analysis of intelligence data. These processes culminated in President Clinton's decision to authorize J.S. military attacks against terrorist targets in Afghanistan and Sudan on August 21st. As could be expected, the President's decision to launch a retaliatory strike was met with both support and criticism. In this instance, however, a perceived requirement for secrecy caused confusion in, and thereby criticism from many of the national-level actors normally involved in such decisions. An examination of the process using two models for decision-making reveals several possible justifications for this criticism."
National War College (U.S.)
Gillies, Randolph S.
1998-12-14