Advanced search Help
Clear all search criteria
Only 2/3! You are seeing results from the Public Collection, not the complete Full Collection. Sign in to search everything (see eligibility).
-
Fire Shelter Deployment Investigative Report: Clover Fire
This document is the investigative report of the 1988 Clover Fire Shelter Deployment Incident. This report provides specific details on the events leading up to the fire, the fire itself as well as post incident recommendations and interviews.
United States. Department of the Interior
Dimont, Howard; Holder, Steve
1988-10-05
-
U.S. Army Medical Research Institute of Infectious Diseases: Annual Progress Report, Fiscal Year 1988
This is a report of progress on the research program of the U.S. Army Medical Research Institute of Infectious Diseases on Medical Defense against Biological Agent for Fiscal Year 1988.
U.S. Army Medical Research Institute of Infectious Diseases
1988-10-01
-
U.S. Fire Administration/Technical Report Series: Sprinklers Control Arson Fires in Rack-Storage Warehouse
This document looks at an arson case that took place in a warehouse in Mt. Prospect (IL). In this incident, the overhead sprinkler system operation and quick fire department response limited losses.
United States. Office of Homeland Security; United States Fire Administration
1988-10
-
Psychological Strategies for Low-Intensity Conflict
"The process of psychological operations (PSYOP) requires a whole state of mind rather than thinking in terms of a specific action or reaction. The ultimate objective in PSYOP is to assist in the application of power by one nation acting on another nation to influence the minds of the people and enhance the achievement of national goals. The greatest need for effective PSYOP today is in the area of low-intensity conflict (LIC), an area in which the probability of US involvement is very high for the remainder of this century. Low-intensity conflict is a spectrum of conflict where success cannot be measured in terms of battles won, hills taken, or bodies counted. Rather, success will be measured in terms of political objectives achieved without the protracted involvement of US combat forces. While it is a spectrum of conflict in which conventional warfighting strategies are not likely to work, it is an area where psychological strategies can contribute immensely to a national strategy. The author firmly believes the proper employment of PSYOP may actually preclude the necessity for the commitment of combat forces in some LIC activities."
Army-Air Force Center for Low Intensity Conflict (U.S.)
Yang, Philip S.
1988-10
-
Hurricane Evacuation Behavioral Assumptions for Massachusetts
"This document is accompanied by a lengthier report titled Hurricane Evacuation Behavior in the Middle Atlantic and Northeast States, referred to hereafter as the 'Main Report'. That volume provides background information relevant to understanding the following discussion. In particular the Main Report describes methodology and data which form the basis for many of the recommendations included in this volume. On occasion this report will make reference to 'MR-Fig. x', meaning a particular figure in the Main Report. Sample survey results for Wareham are reported in this document, but the reader should be aware that they are included as 'tests' of the general response model's applicability to Wareham rather than to provide actual figures for evacuation planning. Even for Wareham response in future hurricanes could be considerably different than .that observed in Gloria."
United States. Army. Corps of Engineers
Hazards Management Group, Inc.
1988-10
-
Evaluation of a Long Range Particle-in-Cell Transport and Diffusion Model Based on an Analysis of the Chernobyl Reactor Accident
"Work described in this presentation was accomplished over an eighteen month period after the Chernobyl accident, during which time model calculations were compared to environmental measurements supplied by the WHO as well as several individual countries. Results of these calculations and comparisons to measurements have been published in several reports with the most complete description of these studies provided by Lange, 1988. Using the source term data shown in Table 1, the spatial distribution of material released from the Chernobyl reactor is shown by Figure 1. After four days (Figure 1.b) material is moving in three major directions: (1) the lowest layer, within the first 1500m, is dispersed over Eastern Europe and Scandinavia, (2) another large collection of particles located above about 4 km are moving toward the Middle East, and (3) the third group of particles are moving east toward Japan. By day 10 (Figure 1.d) material has reached the western United States and is spreading over most of the Northern Hemisphere with the exception of eastern North America"
Lawrence Livermore National Laboratory
Dickerson, Marvin H.; Lange, Rolf
1988-10
-
DoD Directive 5210.41: Security Policy for Protecting Nuclear Weapons
"It is DoD policy to protect nuclear weapons from loss, theft, sabotage, unauthorized use, and unauthorized or accidental damage or destruction. The policy in this Directive is provided for a peacetime environment. While adherence to prescribed security procedures during wartime may be impractical, particularly in a combat theatre, the same peacetime philosophy for protecting nuclear weapons remains in effect. However, in times of transition to war and during wartime, commanders are expected to use those resources available to them to provide security for weapons and to ensure their survivability. Security shall be considered early during the research, development, and acquisition of nuclear weapon systems and the modernization and updating of existing systems. DoD Components participating in the acquisition and development process shall provide a security concept of operations for new or modernized systems to the Under Secretary of Defense for Policy (USD(P)) for approval before the Milestone II/Full-Scale Development decision described in DoD Directive 5000.1 (reference (d)) and DoD Instruction 5000.2 (reference (e))."
United States. Department of Defense
1988-09-23
-
Computer Security Subsystem Interpretation of the TCSEC
This document provides interpretations of the Department of Defense Trusted
Computer System Evaluation Criteria (DoD 5200.28-STD or TCSEC) for computer
security subsystems. A computer security subsystem (subsystem) is defined,
herein, as hardware, firmware and/or software which can be added to a computer
system to enhance the security of the overall system. A subsystem's primary
utility is to increase the security of a computer system. The computer system
that the subsystem is to protect is referred to as the protected system in
this Interpretation. When incorporated into a system environment, evaluated computer security subsystems may be very effective in reducing or eliminating certain types of vulnerabilities whenever entire evaluated systems are unavailable or impractical.
United States. Department of Defense
1988-09-16
-
Criteria for Preparation and Evaluation of Radiological Emergency Response Plans and Preparedness in Support of Nuclear Power Plants: Criteria for Utility Offsite Planning and Preparedness Final Report
The Nuclear Regulatory Commission and the Federal Emergency Management Agency have added a supplement to NUREG-0654/FEMA-REP-l, Rev. 1 that provides guidance for the development, review, and evaluation of utility offsite radiological emergency response planning and preparedness for those situations in which State and/or local governments decline to participate in emergency planning. While this guidance primarily applies to plants that do not have full-power operating licenses, it does have relevance to operating nuclear power plants.
United States. Federal Emergency Management Agency
1988-09-01?
-
Compilation of LIC References and Bibliography: Volume II
"All the entries in this compilation are to some degree, LIC-related [Low Intensity Conflict] and fall into two categories: Part I, Bibliographical Recommendations, which, with few exceptions, consist of about 90 references to articles, books, and papers; and Part II, Summaries of CLIC [Center for Low Intensity Conflict] Papers, which comprise a valuable adjunct to this bibliography, because of the Papers pertinence to LIC. The theory behind the compilation is one of gathering the knowledge of some of the experts on LIC and making it available to others also involved in strengthening the nation's capability to face the LIC threat. The entries in this compilation afford in information on theory, technology, and military and civilian organizations directly concerned with LIC. The wish is that these entries offer a good grounding in the complexities and demands of LIC to anyone who uses them appropriately."
Army-Air Force Center for Low Intensity Conflict (U.S.)
Crouch, Thomas W.
1988-09
-
Technical Data Report: Tri-State Hurricane Property Loss and Contingency Planning Study Phase I
This study was conducted to quantitatively estimate the property damages that could occur from potential hurricanes striking the most vulnerable areas of the central gulf coast of Florida, Alabama, and Mississippi. This phase of study identified the locations within each county that are highly vulnerable to the destructive forces of hurricanes and provided quantitative estimates of potential damages within those locations.
United States. National Oceanic and Atmospheric Administration
1988-09
-
Tri-State Hurricane Property Loss Study: Technical Data Report for Alabama, Florida, and Mississippi
"This is a technical data report that presents the results of the first phase of a two-phase program. The purpose of this phase of the study is to estimate the property damages that could occur from potential hurricanes striking the most vulnerable areas [Alabama, Florida, and Mississippi] of the central gulf coast. [...] Quantitative property loss estimates are necessary to form the basis for hurricane recovery plans prepared at the state and local levels. To plan for recovery or to determine potential future mitigation measures against potential losses from hurricanes, governmental agencies must first have an awareness of the location and magnitude of quiescent hurricane hazards. This phase of study identifies the locations within each county that are highly vulnerable to the destructive forces of hurricanes and provides quantitative estimates of potential damages within those locations. The results of this phase of study also makes possible a more reliable instrument by which the location(s) and extent of the geographic area of study to be performed under Phase II can be determined."
United States. National Oceanic and Atmospheric Administration; United States. Army. Corps of Engineers
United States. Army. Corps of Engineers. Mobile District
1988-09
-
Nuclear Health and Safety: DOE Needs to Take Further Actions to Ensure Safe Transportation of Radioactive Materials, Report to the Chairman, Committee on Governmental Affairs, U.S. Senate
"Annually, the Department of Energy (DOE) makes thousands of shipments of radioactive materials as part of its national defense responsibilities. Federal regulators consider the required containers, or 'packages,' enclosing the radioactive materials to be the primary protection against serious hazards to human health, property, and the environment while the materials are in transit. These packages fall into three categories: strong, tight containers used to ship materials with very low levels of radioactivity, Type A packages used for materials with higher levels of radioactivity but which present a very small hazard, and Type B packages used for highly hazardous materials with radioactivity exceeding Type A package levels. The Chairman of the Senate Committee on Governmental Affairs asked GAO to determine whether DOE is effectively self-regulating its transportation of high-level radioactive materials. To do this, GAO centered its work on the adequacy of DOE'S actions to resolve previous safety concerns regarding non-weapons packages and the extent to which problems exist with DOE'S certification of packages for transporting nuclear weapons materials."
United States. Government Accountability Office
1988-09
-
Psychological and Behavioral Responses to a Chemical and Biological Warfare Environment: Final Recommendations
In this present world climate, chemical and biological warfare (CBW) is a realistic threat to U.S. Air Force personnel. Medical care for conventional and chemical casualties in the CBW environment requires individual protection, group protection, and decontamination as well as supply and patient transfer through contaminated areas. CBW stirs terror in individuals both because of the particular psychological fears it arouses and the tremendous difficulties presented by the need to continue to operate after an attack. Recommendations derived from CBW research cover the issues of command (e.g., maintenance of communications and morale, and command policy in the face of mass casualties), medical care (e.g., alcohol use as a risk factor in CBW environment, low dose exposures, internal SCPS-M management, and unique stressors of the CBW environment), performance (e.g., group responses to contamination and isolation effects on performance), and training (e.g., unit reconstitution following heavy losses, grief leadership, buddy care, development of first aid capability within squadrons, crews, and work units, maintenance of cohesion in flying and ground crews, and training for commanders in command posts). These recommendations should serve as the basis for the development of command policy, training scenarios, medical command and medical care procedures and the direction of future research in this area.
Uniformed Services University of the Health Sciences. Department of Psychiatry
Ursano, Robert J., 1947-
1988-09
-
Texas National Guard: Unit Climate Survey Pilot Project
"As part of the ongoing collaborative study efforts to assess unit climate in active duty, reserve, and National Guard units, a pilot project was conducted with personnel from the Texas National Guard. Members of the 49th Armor Division 149th Attack Helicopter Battalion (AHB) and the 36th Aviation company participated during their training exercises."
United States. Army Health Services Command
Bell, Richard.; Mangelsdorff, A. David
1988-08
-
Patterns of Global Terrorism: 1987
This document produced by the State Department in August 1988 provides graphs and analysis of international terrorist acts for the year of 1987. Topics discussed include trends, states that support terrorism, the numbers of total deaths from acts of terrorism, geographic distribution of acts from 1968 to 1987, and a breakdown of the nationality of victims of terrorist attacks.
United States. Department of State
1988-08
-
Analysis Report on Firefighter Fatalities [1987]
"The purpose of this study is to analyze the circumstances surrounding firefighter fatalities in the United States in 1987 in an attempt to identify potential means for reducing the number of deaths that occur each year. In addition to the 1987 findings, this study will also include special analyses of particular recurring scenarios, using NFPA's [National Fire Protection Association] data base of fire fighter fatalities from 1978 through 1987."
United States Fire Administration
National Fire Protection Association. Fire Analysis and Research Division
1988-08
-
Security Policy for Uniform Protection of Intelligence Processed in Automated Information Systems and Networks
The purpose of this directive is to establish long-term (year 2000) goals and near-term (year 1992) requirements intended to improve the security of U.S.
intelligence processed in AISs, and networks with respect to its possible compromise (1) due to penetration by hostile intelligence services, (2) by otherwise legitimate users who gain access to data or processes for which they are not authorized, or (3) as a result of inadequate security design,
implementation, or operation. The directive also assigns policy execution roles and responsibilities, and establishes a procedural framework within which they are to be implemented. Specific guidance is provided in the Security
Manual for Uniform Protection of Intelligence Processed in Automated Information Systems and Networks (Security Manual), a supplement to this directive. Additional security measures may be established by the accrediting authority if deemed appropriate. Such measures should also be in accordance with other DCIDs listed in references 9 to 13 in Annex A of the Security Manual. The provisions contained in the Security Manual have the same force as this directive.
United States. Central Intelligence Agency
1988-07-19
-
Federal Emergency Management Agency, Office of Civil Defense: FY 1989 Congressional Civil Defense Testimony
This document contains the compiled testimony of Julius W. Becton, Craig Alderman, Billy J. Clack, and Avagene Moore of the Federal Emergency Management Agency's (FEMA) Office of Civil Defense on July 1988 before the U.S. House Armed Services Committee, Subcommittee on Military Installations and Facilities on the topic of FEMA's fiscal year 1989 civil defense authorization and appropriation requests.
United States. Federal Emergency Management Agency. Office of Civil Defense
Clack, Billy J.; Alderman, Craig; Becton, Julius W. . . .
1988-07
-
Missile Defense Alarm: The Genesis of Space-Based Infrared Early Warning
From the Preface: "Written over ten years ago, this history of the Missile Defense Alarm System, or MIDAS as the program generally was known, remained classified and for the most part confined to a file drawer. [...] This history encompasses the origin and early years of space-based infrared (IR) sensors employed to detect the launch of ballistic missiles and, in time, the flash of ordnance detonated on Earth and in the atmosphere. It addresses the people, institutions, ideas, and machines brought to the task and their relationship to each other over a twelve-year period at the height of the Cold War, between 1955 and 1967."
United States. National Reconnaissance Office
Hall, R. Cargill
1988-07
-
Groups and Organizations in War, Disasters, and Trauma
The Antarctic environment is one which provides information on the difficult task of living in a contained environment. The ability to sustain oneself in small group operations with little contact with the outside for various periods of time is critical to the operations of contained, protected environments such as the Survivable Collective Protection System (SCPS) in a chemical and biological warfare (CBW) environment. The provision of medical care following the nuclear disaster at Chernobyl is presented in this volume, providing information concerning the stresses and coping strategies after toxic exposure. The ways in which threats are perceived and the experience of risk is mediated through group values, culture, and symbols. Risk perception is an inherent aspect of the CBM experience of threat, fear, and terror, one which will influence leaders and troops alike. Acute stress reactions to conventional and CBW military threat, particularly classical forms such as combat stress reaction (CSR) and post-traumatic stress disorder (PTSD), are discussed with regard to the psychiatric treatment roles of the medic, the medical aid station, the field hospital and the rear echelon hospital. Lastly, the broad areas of responses to disasters and the development of psychiatric symptoms and the lack of symptoms in communities exposed to tragedies and disasters are examined.
Uniformed Services University of the Health Sciences. Department of Psychiatry
Ursano, Robert J., 1947-
1988-07
-
National Security Decision Directive 309: Nuclear Weapons Safety, Security and Control
National Security Decision Directive 309 assigns Department of Defense and Department of Energy responsibilities for nuclear weapons safety, security and control.
United States. White House Office
1988-06-27
-
Domestic Terrorism: Prevention Efforts in Selected Federal Courts and Mass Transit Systems, Report to the Chairman, Subcommittee on Civil and Constitutional Rights, Committee on the Judiciary, House of Representatives
"Terrorist acts in the United States have thus far been too few to raise serious public concern, but the nation faces the dilemma of maintaining an effective level of protection without curtailing civil liberties. Concerned that security measures imposed without thorough study and planning may lead to measures that could be unintentionally repressive of civil liberties, the Subcommittee on Civil and Constitutional Rights of the House Committee on the Judiciary asked GAO [Government Accounting Office] to describe what was being done to protect against terrorism in two selected domestic infrastructure components-the federal courts and mass transit systems. GAO'S study framework consisted of six elements: the roles and responsibilities of units and individuals involved; their perceptions of terrorism threats; the existence and quality of risk assessments; risk-reduction selection factors such as concern for civil liberties; implemented riskr-eduction strategies; and evaluations of performance, effectiveness, and intrusiveness. Since GAO sampled only seven sites, used a case-study design. and focused on protective measures, the findings cannot be generalized to all federal courts or mass transit systems or to the totality of U.S. antiterrorism activities."
United States. General Accounting Office
1988-06-23
-
Swimming Pool Chemical Plant Fire, Springfield, Massachusetts [June 17, 1988]
"One of the most challenging problems facing the fire service today is the combined fire and hazardous/toxic chemical incident. Decisions have to be made regarding the timing of fire fighting activities with respect to evacuation priorities. In many cases, a decision must be made as to whether or not to fight the fire at all. Where the chemicals or products involved are water reactive, fighting the fire may make matters worse, endangering the firefighters or the general population. Just such a situation presented itself to Chief Raymond Sullivan of the Springfield, Massachusetts Fire Department and the city's hazardous materials incident response team on Friday, June 17, 1988. The incident occurred in that part of an 87-year-old industrial building housing a company that produced water treatment chemicals for swimming pools. Rain leakage wetted chemicals that released chlorine along with sufficient heat to cause ignition of ordinary combustibles. In the course of the incident, large amounts of chlorine gas were released, triggering several levels of evacuation involving more than 6,000 people. The fire resulted in the collapse of a portion of the roof. The fire and corrosive action of the chlorine gas resulted in almost complete loss of the contents of both floors and caused significant structural damage prompting razing of the second floor. At the time this report was written it was not known whether the building would be reoccupied."
United States. Federal Emergency Management Agency; United States Fire Administration
Custer, Richard L. P.
1988-06-17?
-
National Security Decision Directive 308: FY 1988-1991 Nuclear Weapons Stockpile
National Security Decision Directive 308 approves FY 1988-1991 Nuclear Weapons Stockpile.
United States. White House Office
1988-06-13
-
Research Animals: Federal Costs for Care of the Silver Spring Monkeys, Report to Congressional Requesters
"Pursuant to a congressional request, GAO [General Accounting Office] provided information regarding a group of monkeys in a National Institutes of Health (NIH) research program, specifically: (1) care, transportation, litigation, and public relations costs after local police removed the monkeys from a private research firm and transferred them to NIH; (2) arrangements for reimbursement from the firm; (3) whether a proposal to build a new facility for the monkeys involved federal funds; and (4) whether the Department of Agriculture (USDA) inspected the grantee's facility prior to the monkeys' removal. GAO found that: (1) as of February 29, 1988, federal costs totaled $105,084, which included $93,404 for care, security, and administration, $2,675 for transportation, $21,600 for litigation, and $427 for public relations, less reimbursements of $13,022 from the grantee; (2) the grantee agreed to reimburse NIH for certain other costs; (3) private sources provided $42,750 for part of the care and transportation costs; (4) no federal funds were used to build facilities for the monkeys; and (5) USDA had inspected the facility yearly, but could not provide the inspection records."
United States. General Accounting Office
1988-06-03
-
Light Fighter Communication - On Today's Chemical Battlefield
From the thesis abstract: "The thesis problem is, 'How well does communication within the 'Light Fighter' force function on today's chemical battlefield.' Chapter 2 reviews the history of chemical warfare and the evolution of the Chemical Warfare Service (CWS). First, this study presents the significance of the thesis problem. Second, the Soviet offensive use of chemicals is reviewed. Third, documented uses of chemicals in today's Third World Countries is presented. Fourth, a baseline communication model is established as a basis for comparison. Fifth, a fictional scenario is presented to illustrate light forces conducting combat operations in a tropical climate. The lessons learned are mentioned on the basis of studies conducted by governmental agencies and as illustrated in the scenario."
U.S. Army Command and General Staff College
Hale, Thomas J.
1988-06-03
-
Arson Prosecution: Issues and Strategies
"This document is intended to provide concise practical and technical guidance on arson prosecution. It draws heavily on state arson prosecutors' guides and other literature. This overview is especially beneficial to arson investigators, prosecutors, law enforcement personnel, and judges."
United States Fire Administration
1988-06
-
Guide to Understanding Audit in Trusted Systems
This publication, "A Guide to Understanding Audit in Trusted Systems," is being issued by the National Computer Security Center (NCSC) under the authority of and in accordance with Department of Defense (DoD) Directive 5215.1. The guidelines described in this document provide a set of good practices related to the use of auditing in automatic data processing systems employed for processing classified and other sensitive information.
United States. Department of Defense
1988-06-01
-
Implementation of a Parallel Multilevel Secure Process
From the thesis abstract: "This thesis demonstrates an implementation of a parallel multilevel secure process. This is done within the framework of an electronic mail system. Security is implemented by GEMSOS [Gemini Standard Operating Systems], the operating system of the Gemini Trusted Computer Base. A brief history of computer secrecy is followed by a discussion of security kernels. Eventcounts and sequences are used to provide concurrency control and are covered in detail. The specifications for the system are based upon the requirements for a Headquarters of a hypothetical Marine Battalion in garrison."
Naval Postgraduate School (U.S.)
Pratt, David R.
1988-06