Advanced search Help
Clear all search criteria
Only 2/3! You are seeing results from the Public Collection, not the complete Full Collection. Sign in to search everything (see eligibility).
-
Women in the Military: Bibliography in Brief [May 14, 1991]
"This bibliography presents literature on the participation of women in the U.S. armed forces. It includes discussions of the combat restriction, the mobilization of women during Operation Desert Storm, and the demographics of women's participation in the military. The focus is on literature from 1988 to the present but several older works have been included to insure historical coverage of the issue."
Library of Congress. Congressional Research Service
Shapiro, Sherry B., 1952-
1991-05-14
-
National Security Directive 58: Chemical Weapons Convention Initiative
From the text of National Security Directive (NSD) 58: "The recent conflict in the Persian Gulf brought into play once again the threat of chemical weapons (CW). It demonstrated in the most graphic terms that unscrupulous regimes can and will threaten entire populations with these weapons of terror as long as we permit them to exist. The circumstances of that conflict renew and reinforce my conviction, shared by responsible leaders around the world, that chemical weapons must be banned. Our best hope for getting us firmly on the path to that goal is the Chemical Weapons Convention (CWC) under negotiation in Geneva. The United States is the only country that can provide the leadership necessary to achieve an early conclusion to a CWC that serves our interests. Accordingly, I have decided that the U.S. will take new initiatives to accelerates the negotiations in Geneva, and to provide stronger incentives to states to follow the American lead by committing themselves to becoming parties to an effective Convention and to carrying out its requirements strictly."
United States. White House Office
1991-05-10
-
National Security Directive 57: U.S. Port Security Program
In National Security Directive (NSD) 57, President H.W. Bush directs that "measures be taken to control the access of foreign flag vessels to U.S. ports and internal waters. The objectives of this control are as follows: 1. Protect U.S. vessels, ports, harbors, and waterfront facilities from sabotage or other activities intended to hazard their safety. 2. Protect sensitive operations and U.S. defense facilities in waterfront areas from espionage and intelligence collection. 3. Protect U.S. national interests defined in terms of foreign policy considerations: Examples would include limiting port access for countries that sponsor international terrorism or as a reciprocal response to limitations in access for U.S. vessels. 4. Protect the exercise of U.S. maritime rights and high seas freedoms from international interference by specific vessels."
United States. White House Office
1991-05-07
-
Historical Perspective of Special Operations Forces as an Instrument of Strategy
"This study investigates the historical utility of Special Operations Forces (SOF) as instruments of national military strategy. The research concept employs the study of a representative historical example of each of the five current doctrinal SOF missions. The intent is to both assess the effectiveness of the SOF efforts at the time that they occurred, and to derive continuing themes, if appropriate, for SOF strategic employment in the future. The study concludes that SOF strategic employment, as represented by the operations examined, has, been largely effective, though not without setbacks. Further, there are operational and organizational components that repeatedly are central to success. Among these are the close integration of military operations into the larger political context, the early provision of appropriate external support resources, and the presence of sufficient and appropriately trained special operators to complete the assigned mission. While these components do not represent a checklist for the success of a strategic SOF operation, they do represent realities that historical experience suggests will be of continuing importance."
U.S. Army Command and General Staff College
Jones, Gregg D.
1991-05-06
-
DoD Directive 5100.41: Executive Agent Responsibilities for the National Communications System (NCS)
"In this directive the President established the National Communications System (NCS). The NCS consists of the telecommunications assets of the Federal Government organizations represented on the interagency NCS Committee of Principals and an administrative structure consisting of the Executive Agent, the Manager, and the NCS Committee of Principals. The President further directed that the Secretary of Defense serve as Executive Agent for the NCS. This directive outlines NCS responsibilities and its method of organization."
United States. Department of Defense
1991-05-01
-
Verification Technologies: Managing Research and Development for Cooperative Arms Control Monitoring Measures
Cooperative monitoring measures, including on-site inspections, are now a regular feature of international arms control agreements. The Intermediate Nuclear Forces (INF) Treaty, the Threshold Test Ban Treaty, the Conventional Forces in Europe Treaty, the prospective Strategic Arms Reduction Talks (START) Treaty, and the proposed Chemical Weapons Convention all contain such measures. This new element of arms control verification is likely to be a part of any future arms control arrangements in which the United States becomes involved. How well prepared are we for this new era? This report examines the management of the research and development process from which the new technologies are emerging and identifies a range of organizational options that might help improve the balance of research emphasis.
United States. Government Printing Office
United States. Congress. Office of Technology Assessment
1991-05
-
United States Fire Administration Technical Report Series: Massive Leak of Liquified Chlorine Gas Henderson, Nevada
A massive leak of chlorine gas sent over 200 persons to a local hospital and required the evacuation of an estimated 2,400 people.
United States Fire Administration
Routley, J. Gordon
1991-05?
-
United States Fire Administration/Technical Report Series: Massive Leak of Liquified Chlorine Gas
"The reports are sent to fire magazines and are distributed at national and regional fire meetings. The International Association of Fire Chiefs assists USFA [United States Fire Administration] in disseminating the findings throughout the fire service. On a continuing basis the reports are available on request from USFA; announcements of their availability are published widely in fire journals and newsletters. This body of work provides detailed information on the nature of the fire problem for policymakers who must decide on allocations of resources between fire and other pressing problems, and within the fire service to improve codes and code enforcement, training, public fire education, building technology, and other related areas The Fire Administration, which has no regulatory authority, sends an experienced fire investigator into a community after a major incident only after having conferred with the local fire authorities to insure that USFA's assistance and presence would be supportive and would in no way interfere with any review of the incident they are themselves conducting. The intent is not to arrive during the event or even immediately after, but rather after the dust settles, so that a complete and objective review of all the important aspects of the incident can be made. Local authorities review USFA's report while it is in draft. The USFA investigator or team is available to local authorities should they wish to request technical assistance for their own investigation."
United States. Federal Emergency Management Agency; United States Fire Administration
1991-05
-
Disaster Assistance: Supplemental Information on Hurricane Hugo in South Carolina, Report to the Honerable Ernest F. Hollings, U.S. Senate
"To assist victims of Hurricane Hugo, FEMA [Federal Emergency Management Agency] provided temporary housing assistance to about 30,000 victims in South Carolina, which included providing grants to homeowners and renters or providing mobile homes. FEMA met many of the requests for temporary housing assistance within 1 week after it began accepting applications. For example, FEMA provided disaster victims with grants to rent housing or make repairs to their homes.Some families began occupying FEMA mobile homes about 1 month after the disaster was declared. FEMA continued to move families into mobile homes until April 1990. As part of our review, we contacted county emergency management officials in the 24 South Carolina counties declared as disaster areas to determine how well their disaster-related needs were met. Most of the officials said that their counties' needs were met. However, an official from one county told us that a slow response by the state greatly hindered the county's ability to respond. In this case, the state government did not promptly respond to a request for assistance to clean up a gasoline spill. Further, officials of five other counties told us that slow or unfilled requests placed with the state somewhat hindered their abilities to respond to the disaster. None of the county emergency management officials we interviewed indicated that their requests for public assistance (requests to restore publicly owned roads, buildings, or other similar facilities) were delayed or deferred because they could not pay their share of the cost of such projects."
United States. General Accounting Office
1991-05
-
Physical Security Program
This Regulation is issued under the authority of DoD Directive 5200.8, "Security of DoD Installations and Resources" (April 25, 1991). It prescribes standards and policy relating to the physical protection of military installations and assets of the Department of Defense. It is understood that the review of existing physical security plans and operational concepts will take 1 year, with security upgrades extending through the fiscal year Defense plan in accordance with the methods in Chapter 2 of this Regulation.
United States. Department of Defense
1991-05
-
National Security Directive 56: National Security Emergency Preparedness Telecommunications Funding
In National Security Directive (NSD) 56, President H.W. Bush directs that "implementation and recurring costs for national level NESP [National Security Emergency Preparedness] telecommunications programs shall be shared by Defense and FEMA. Defense, as the Executive Agent for the National Communications System (NCS), shall fund all pre-implementations costs for national level NSEP telecommunications programs. Participation by federal agencies in the National Communications System will continue to be in accordance with the provisions of Executive Order 12472."
United States. White House Office
1991-04-30
-
Drug War on the Southwest Border: What Role 'High Tech'?
"This study focuses on the potential uses of new technologies on the Southwest border to detect narcotics traffickers and illegal aliens. Specifically, the authors of the assessment--all students at the National War College--were asked by the Immigration and Naturalization Service to evaluate the possible role of remotely piloted vehicles and unmanned ground vehicles equipped with modern sensors in the effort to control the U.S.-Mexican border in the 218-mile Tucson sector patrolled by the United States Border Patrol. In carrying out this assessment, the authors traveled to Huntsville, Alabama, to discuss current sensor technology with the U.S. military's Joint Project Office charged with developing sensors and appropriate ground and air platforms. They also visited the El Paso Intelligence Center run by the Department of Justice at Fort Bliss. While in El Paso, they also talked with officials at Operation Alliance, tasked with coordinating anti-drug efforts along the Southwest border, and with Joint Task Force Six (JTF-6), a military liaison unit at Fort Bliss whose function is to coordinate military assistance to anti-narcotics units along the Southwest border. One member of the team traveled to Mexico City for talks with Embassy officials and the resident Immigration and Naturalization Service Agent in Charge to discuss Mexican reactions to enhanced sensor deployment. The study team also traveled twice during a six week period to Tucson, Arizona, for talks with Drug Enforcement officials and the Border Patrol."
National Defense University
Cason, James
1991-05
-
DoD 5200.08-R: Physical Security Program [Updated April 9, 2007]
"In accordance with the requirements of DoD Instruction 5200.08, (Reference (b)), this Regulation implements DoD policies and minimum standards for the physical protection of DoD personnel, installations, operations, and related resources."
United States. Department of Defense
1991-05
-
NIOSH Health Hazard Evaluation Report on the Exxon/Valdez Alaska Oil Spill
"In April, 1989, NIOSH was asked by the Laborer's International Union of North America, the Alaska State Health Department, and the U.S. Coast Guard to conduct a health hazard evaluation during the cleanup of the oil spill that occurred in Prince William Sound on March 24, 1989. In response, NIOSH investigators made three field trips to Alaska. During the first trip, April 25-30, 1989, two NIOSH investigators, an occupational health physician and an epidemiologist, participated in a meeting convened by the Commissioner of Labor, Alaska Department of Labor (AKDOL) following his announcement that the cleanup was a 'hazardous waste operation'. The meeting focused on the appropriate content of worker training courses and the amount of training hours necessary to adequately prepare the workers involved in the cleanup. Worker training is one of the required provisions of the Alaska and Federal Hazardous Waste Regulations; these regulations specified 24 hours of training at that time. The NIOSH team also had the opportunity to visit some beach cleanup sites during this trip. […] This final report includes the pertinent information contained in earlier letters and presents the industrial hygiene data, including exposure monitoring data obtained during the course of this health hazard evaluation. There is also a brief discussion on illness and injury surveillance; however, attempts to collect this type of information were largely unsuccessful."
National Institute for Occupational Safety and Health
1991-05
-
Measuring Department of Defense Effectiveness in Counternarcotics Support
"This paper will explore measurements of effectiveness for the Department of Defense's current and projected roles in providing support to Drug Law Enforcement Agencies in counternarcotics operations. The scope of this study is a rather broad look at capabilities of the Department of Defense; including not only the active components, but also Reserve and National Guard contributions. The paper begins with a brief introduction into factors which led to the Department of Defense's involvement in counternarcotics. The second section provides a detailed discussion of studies that clarify and amplify the suggested measures in the recommendation section. Included is information from discussions with Commander in Chief Southern Command, the Deputy Commander of Joint Task Force Six, representatives of the National Guard Bureau and the various services, and the results of the surveys with the Governors, National Guard Adjutants General, and drug law enforcement agencies. The last section is a list of recommended methods of measuring the Department of Defense counternarcotics support effectiveness."
Army War College (U.S.)
Dunkelberger, Thomas E.
1991-04-28
-
No More Vietnams: CORDS as a Model for Counterinsurgency Campaign Design
From the thesis abstract: "This monograph examines the Civil Operations and Revolutionary Development Support (CORDS) program in Vietnam as a potential model for the design of modern campaigns targeted against revolutionary guerrilla insurgencies. The Vietnam War ended in failure; yet it represents America's most recent major effort against a guerrilla insurgency. Because U.S. vital strategic interests are likely to be threatened by insurgent movements in the future, an analysis of our record in countering the Vietcong insurgency demands attention. Although the U.S. failed to develop a viable counterstrategy to the Maoist revolutionary guerrilla strategy of North Vietnam ('dau tranh'), CORDS was a step in the right direction, albeit too late. CORDS effectively tied together the myriad of existing political, informational, economic, and military pacification programs into a synergistic whole. Based on a high degree of bureaucratic and organizational flexibility, CORDS enjoyed a respectable degree of success in countering the Vietcong insurgency. In this regard, CORDS provides us with a good model for the design of counterinsurgency campaigns. It also demonstrates that counter insurgency efforts are more than just a military undertaking. Therefore, this paper recommends that the United States develop a national counterinsurgency policy on the CORDS model. DOD would be the lead agent in its development, with DOS being a primary contributor[.]"
U.S. Army Command and General Staff College. School of Advanced Military Studies
Wells, Gordon M.
1991-04-28
-
DoD Directive 5200.8: Security of DoD Installation and Resources
This Directive reissues DoD Directive 5200.8, "Security of Military Installations and Resources," July 29, 1980 (hereby cancelled) and designates the military commanders of property or places under their commands, in accordance with Section Act of property or places under their command, in accordance with Section 797 or 501 U.S.C (Section 21 of the "Internal Security Act of 1950") (enclosure 1). Authorize the publication of DoD 5200.8-R, "Physical Security Program, " in accordance with reference DoD 5025.1-M, "DoD Directives System Procedures, " December 1990, authorized by DoD Directive 5025.1, December 23, 1988, to establish consistent minimum standards for the protection of DoD installations and resources. Replaces references DoD Instruction 5210.71, "Security of Selected Sensitive Inventory Items--Drugs, Abuse Items, and Precious Metals, " August 28, 1987 (hereby canceled) and DoD Directive 5210.73, "Security of DoD Communications facilities, " April 30, 1984 (hereby canceled), and incorporates necessary requirements of those DoD issuance into DoD 5200.8-R.
United States. Department of Defense
1991-04-25
-
Forest Service is Making Progress in Developing a Nationwide Geographic Information System: Statement of JayEtta Z. Hecker, Director, Resources, Community, and Economic Development Information Systems Information Management and Technology Division Before the Subcommittee on Interior and Related Agencies Committee on Appropriations House of Representatives
From the Testimony: "We appreciate this opportunity to testify on Forest Service action to develop integrated geographic information system (GIS) and administrative information system capabilities. As you requested, we will provide an overview of the progress the Service has made in addressing the major weaknesses of the GIS proposal we described in our testimony and report to the Subcommittee last year. As you recall, we concluded that the Service was not ready to acquire a nationwide GIS because required--and necessary--steps in its design and development were incomplete. Such steps are essential for controlling risks in the design and development of major information systems."
United States. General Accounting Office
1991-04-24
-
Impact of Terrorism on Air Force Logistics Command's Overseas Activities
"The incidence of international terrorism has been, increasing over time. Mary of these terrorist attacks have been directed against U.S. interests, personnel, and facilities abroad. The threat of future terrorist attacks has an impact on the work and quality of life of U.S. government personnel assigned overseas. To better understand the nature and scope of this issue, the authors first explore terrorism defining it, highlighting its principle causes, describing sample of active terrorist groups, and reviewing terrorist tactics and targets."
Air University (U.S.). Air War College; United States. Air Force
Callahan, Timothy P.; Mitchell, Robert N.
1991-04-23
-
Desert Shield and Desert Storm Implications for Future U.S. Force Requirements [April 19, 1991]
"Desert Shield and Desert Storm were spectacular successes by almost any standards. Postmortem specialists who attempt to extract 'lessons learned' from that experience nevertheless would be well advised to proceed cautiously, because campaigns against Iraq unfolded under conditions that may not again pertain. This preliminary assessment summarizes U.S. Army, Navy, Air Force, and Marine Corps performance during the recent war, then relates it to past experience and potential threats in ways that might help decision makers determine the most suitable characteristics of U .S. armed forces for the rest of this decade. […] Finally, the study is skeptical of contentions that Desert Shield and Desert Storm 'proved' the permanent ascendancy of any strategy, tactics, or armed service. Requisite forces and formulas might be quite different at future times and in dissimilar places."
Library of Congress. Congressional Research Service
Collins, John M., 1921-
1991-04-19
-
Executive Order 12759: Federal Energy Management
Executive Order 12759 outlines Federal energy efficiency goals for buildings and other facilities. Implementation strategies and outreach programs for fuel efficiency are also outlined.
United States. Office of the Federal Register
Bush, George, 1924- 2018
1991-04-17
-
Threat Assessment: The Role of Vulnerabilities
From the thesis abstract: "Threat assessment is crucial in each step of thinking about military strategy. Identifying political and military objectives, deterring or fighting, taking the offensive or the defensive, pursuing annihilation or attrition, using the direct or the indirect approach -- each of these basic choices in military strategy depends primarily on the threat. Indeed, without an actual or potential threat, it would be impossible and pointless to construct a military strategy. A fundamental difficulty in threat assessment is that, paradoxically, it is not just the enemy situation that defines the threat. The 'friendly situation' also defines the threat. People naturally tend to focus on the adversary's capabilities and intentions in gauging the threat. But an adversary can be a threat only in relation to one's own situation. An accurate and complete threat assessment requires an accurate and complete assessment of both the enemy and friendly situation. To show the critical but elusive role of friendly vulnerabilities in threat assessment, the author first describes a framework for thinking about threats. He then applies this framework to the origins of the Korean War. The outbreak of the Korean War is relevant because it involved, and may even have resulted from, a threat assessment based on mistakes about friendly capabilities and intentions. Finally, the author use the Korean War example to say that self-awareness of vulnerabilities plays a dual role in threat assessment: people use vulnerabilities not only to calculate the threat level and prescribe a response to the threat, but also to describe the threat in the first place."
National War College (U.S.)
Myers, Col
1991-04-11
-
Air Defense at the Operational Level in the Down-Sized Army
"Despite events in the Middle East, the Army is faced with a force structure reduction of at least 25% and reductions in research, development, and acquisition accounts. Faced with these reductions, General Vuono has stated that we will maintain an Army with the proper force structure, fully modernized, well led, doctrinally sound, trained and with quality people. That will be a challenge for the Army but an even greater challenge for Air Defense. Air Defense has lagged behind the rest of the Army in modernization and in force structure at the corps level. The American Army has fought with virtual air superiority since the early days of World War II. We tend to focus on our most recent experience. There is concern that because the Air Force performed as advertised in Desert Storm, air defense will not have to be employed in its traditional role of defeating an enemy air breathing threat. The ineffectiveness of the Iraqi air threat does not mean you can ignore future threats. Failure to recognize potential future threats and to structure a force to counter that threat could be dangerous. As one speaker at the USAWC [United States Army War College] states, the greatest lesson from Desert Shield/Storm was that it happened. The purpose of this paper is to look at Air Defense Artillery's future requirements at the corps level in what has become the Army's primary focus-- contingency operations. The paper argues that while the organizational future of Air Defense appears to be well in hand, there is immediate attention required in liaison and coordination, in logistical support, and in doctrine."
Army War College (U.S.)
Carter, Jack W., Jr.
1991-04-05
-
Individual Ready Reserve (IRR): Present and Future Strategy
"In the 21st century the U.S. Army will face some major national security challenges. The Army must carefully determine the size and composition of its active and reserve forces. The Army will be limited in its military objectives by its force capabilities. In the next century the reserve component will be entrusted with more strategic responsibilities and a greater share for our nation's security. With these extraordinary responsibilities, the reserves must be able tc achieve their specific wartime objectives. Future fiscal and manpower constraints will require the Army to re-evaluate resources to maintain a potent and viable force. This force must ensure the highest state of readiness for the individual, the unit and the total force. This force must be deployable anywhere; and it must be trained to fight effectively. The ability of the military to meet its force requirements for mobilization will become a progressively difficult problem in the 21st century. As both the active forces' end strength and reserve units' end strength decline, another manpower pool will grow-the Individual Ready Reserve (IRR). Future levels of conflict will require the total force to quickly field a highly trained, technologically advanced and lethal force. This force will be greatly dependent on a highly trained and technologically proficient IRR force. The IRR soldier will emerge more and more as a partner in the nation's military and security interests. The IRR will then represent this country's largest pool of deployable pre-trained individual manpower. The significance of having this highly trained, rapidly deployable, large manpower pool will manifest itself in future defensive strategic planning."
Army War College (U.S.)
Chadwick, Allen
1991-04-05
-
Function of Human Intelligence for Low-Intensity Conflict
"This paper argues for improved human intelligence (HUMINT) support of U.S. efforts in low-intensity conflict (LIC). It is reasonable to assume that the United States will continue to be involved in such conflicts for the future. Conventional tactical and national technical intelligence capabilities are formidable and make meaningful contributions to LIC. However, HUMINT will remain a key source to assist our leaders in formulating appropriate responses to LIC. The case for the value of HUMINT in LIC is based on several principle considerations. First, the nature of LIC compared to peacetime competition, conflict, and war. Second, the application of intelligence to support operations in LIC across the operational continuum. Third, the unique contributions of human collection of information to advise decision-makers on responses to LIC. Fourth, the challenges now and in the future for our decision-makers and the intelligence community to meet the requirements of LIC. And last, recommendations to improve efficiency in planning, execution, and exploitation of all available intelligence resources."
Army War College (U.S.)
1991-04-03
-
International Terrorism Threats and How to Combat It
"International terrorism in recent decades has become a phenomenon which, although it cannot threaten the survival of states, can disrupt their national, political, economic and social process. International terrorism has attacked virtually every democracy, it threatens international travel, international commerce, international agreements, and it can threaten much more tomorrow. International terrorism has thrived on an atmosphere of weakness and disunity of the West. Terrorists and their supporters, sponsoring states, view the Western countries as uniquely vulnerable to their attacks. They know that the openness of Western societies affords them many possibilities for attack, and they assume that the West's humaneness and its emphasis on rule of law will inhibit a powerful response. This study provides main features of international terrorism in the last decade, a description of the major role of state-sponsored terrorism and the failure of Western nations to respond. Finally, the study concludes with set of recommendations to counterterrorism more efficiently."
Army War College (U.S.)
Bar-Maoz, Danny, 1948-
1991-04-03
-
Chemical Corps in Transition: Visioning for the Future
"It is 1991, and just like the late 1970's, the United States Army Chemical Corps is in the midst of a transition -one that will determine the viability of the Corps in the future. In the late 70's and the 80's, the Chemical Corps based its primary operational missions on the Soviet nuclear, biological and chemical threat. That threat is now diminishing and a new threat is emerging - the third world. There are many hard questions that have to be asked, difficult decisions to be made and some innovative visioning that has to take place if the Chemical Corps is to continue as a branch of the Army. This case study looks at the current and future threat, develops ideas for new missions, and provides concepts for near term priorities and long term vision. The conclusions are that the Chemical Corps should not face the future as a single mission, single role branch of the Army, rather - (1) the Corps requires multi-skilled soldiers who's skills can be applied across the operational continuum, (2) the Corps should take the lead in technology, developing multi-purpose units, systems and equipment to counter conventional threats and defend against nuclear, biological and chemical threats."
Army War College (U.S.)
Boesburg, John C.
1991-04-02
-
Chemical and Biological Warfare: A Selected Bibliography
Recent events in the Middle East have drawn the world's attention once again to the possibility of chemical and biological agents being used to wage war. To assist researchers in a better understanding of this type of warfare, the US Army War College Library presents Chemical and Biological Warfare: A Selected Bibliography. In general, the books, documents, and videos, all of which are readily available in the USAWC Library, were published since 1980; whereas the articles were selected from periodicals published after 1985. For convenience, USAWC library call numbers are added at the end of each entry.
Army War College (U.S.)
Shope, Virginia C.
1991-04
-
Media's Role in Combatting Terrorism
"The media's coverage of terrorist events has been, for some time, the source of a great deal of discussion, controversy and debate. What the media's proper role should be surfaces after each and every terrorist incident as if it were a new phenomenon. The issues are continually written about, discussed and debated but never solved. Technology, with its capability for on the scene instantaneous coverage, has only served to heighten this controversy. This study project reviews the issues surrounding the media's profit motives, first amendment rights, the public's right to know and the authorities/counterterrorist organization's requirement for secrecy. It also briefly reviews the hostages' families' right to privacy throughout the terrorist incident. Finally this study makes several recommendations which could help to bring this aging problem to closure."
Army War College (U.S.)
Drugley, Gary P.
1991-04-01
-
U.S.- Japan Security Alliance: Will it Survive in the New World Order?
From the thesis abstract: "When George Bush took office in January 1989, he spoke of a new world order. The characteristics of this new world order may be more physical than the ideological Cold War. Some characteristics are emerging--resurfacing of old rivalries, greater interdependence between major powers, more weapons of mass destruction, information revolution, and the ascendancy of economic power over military power to name a few. These changes mandate a review of old alliances designed to implement a national security strategy or containment. One candidate is the Treaty of Mutual Cooperation and Security between the United States and Japan commonly referred to as the U.S.-Japan Security Alliance. Now that the Cold War is over, is this treaty still relevant? Given Japan's economic miracle, should the United States continue to provide Japan's national security and protect Japan's vital interests? This paper examines the treaty from three perspectives: -Is the U.S.-Japan Security Alliance still relevant in the emerging world order from a military perspective?"
Army War College (U.S.)
Gilbert, Russell L.
1991-04-01