Advanced search Help
Clear all search criteria
Only 2/3! You are seeing results from the Public Collection, not the complete Full Collection. Sign in to search everything (see eligibility).
-
Patterns of International Terrorism: 1980
This document is an appendix to S. 873: A Bill to Strengthen Federal Programs and Policies for Combating International and Domestic Terrorism; the Convention on the Physical Protection of Nuclear Material (Exec. H, 96-2); the International Convention against the Taking of Hostages (Exec. N, 96-2), Hearing before the Committee on Foreign Relations, United States Congress, Ninety Seventh Congress, First Session, June 10, 1981. "International terrorism resulted in more casualties in 1980 than in any year since the analysis of statistics related to terrorism began in 1968. The total number of events last year was also high-second only to 1978. Established patterns of striking at targets in industrialized democracies and attacking symbols of Western power continued into 1980. Americans remained the primary targets of international terrorism, with nearly two out of every five incidents involving US citizens or property. Terrorist events aimed at causing casualties, especially assassinations, increased over previous years. Over 30 percent of the attacks in 1980 resulted in at least one casualty. Last year marked the first year that a large number of deadly terrorist attacks were carried out by national governments. The Libyan Government's assassination campaign against dissidents living in Europe and the exchange of terrorist attacks on diplomats in the Middle East were the most noteworthy examples of government-sponsored terrorism. There was a sharp increase in right-wing terrorist activity in Europe. The attacks at the Munich Oktoberfest and at the railroad station in Bologna, Italy, rank among the worst terrorist incidents ever recorded."
United States. Central Intelligence Agency
1980-12-31
-
Policing in Cincinnati, Ohio: Official Policy vs. Civilian Reality
"This report is a product of the continuing concern of the Ohio Advisory Committee with the administration of justice in Ohio. In particular, the Committee is concerned with how justice is administered to minorities, both racial and cultural, as well as to women and poor people. The present study of the Cincinnati Police Division has focused on use of force, distribution of services, and employment of minorities and women. In addition, involvement of the State and Federal Government is reviewed along with selected national issues in policing and proposed solutions to current problems. The Committee investigated the Cincinnati Police Division over an 18-month period. The Division itself provided a wealth of data covering official policies and procedures. In addition, the Committee held a two-day fact-finding meeting on June 28-29, 1979 at which civilians as individuals and as representatives of community organizations presented their concerns about police practices in Cincinnati. Police officials and officers, local and county enforcement personnel, city administrators and legislators, and the Mayor participated in the fact-finding meeting as well."
United States Commission on Civil Rights
1981-01
-
Executive Order 12260: Agreement on Government Procurement
"The obligations of the Agreement on Government Procurement (Agreement on Government Procurement, General Agreement on tariffs and Trade, 12 April 1979, Geneva (GATT 1979)) apply to any procurement of eligible products by the Executive agencies listed in the Annex to this Order (eligible products are defined in Section 308 of the Trade Agreements Act of 1979; 19 U.S.C. 2518(4)). Such procurement shall be in accord with the policies and procedures of the Office of Federal Procurement Policy (41 U.S.C. 401 et seq.). The United States Trade Representative, hereinafter referred to as the Trade Representative, shall be responsible for interpretation of the Agreement. The Trade Representative shall seek the advice of the inter-agency organization established under Section 242(a) of the Trade expansion Act of 1962 (19 U.S.C. 1872(a)) and consult with affected Executive agencies, including the Office of Federal Procurement Policy."
United States. Office of the Federal Register
Carter, Jimmy, 1924-
1980-12-31
-
Committee Print 29: Ailing Defense Industrial Base: Unready for Crisis, Report of the Defense Industrial Base Panel of the Committee on Armed Services, House of Representatives, Ninety-Sixth Congress, Second Session, December 31, 1980
"This is the final report of the Defense Industrial Base Panel entitled [sic] 'The Ailing Defense Industrial Base: Unready for Crisis.' In preparing the report, the panel held 13 days of hearings, including 4 days of field hearings, and took testimony from 34 witnesses. The panel finds that there has been a serious decline in the nation's defense industrial capability that places our national security in jeopardy. An alarming erosion of crucial industrial elements, coupled with a mushrooming dependence on foreign sources for critical materials, is endangering our defense posture at its very foundation. It has been my privilege to chair this examination of one of the nation's most important national resources, our defense industrial capability. "
United States. Government Printing Office
1980-12-31
-
Proposed Changes in Federal Matching And Maintenance of Effort Requirements for State and Local Governments
"Federal matching and maintenance of effort requirements do not often effectively promote the Federal interest of enhancing the fiscal and management commitments of State and local governments to Federal programs. While more stringent Federal requirements would promote these Federal fiscal and managerial objectives, they would screen out needy grantees from participating in the program, thus jeopardizing the ability of the intergovernmental grant system to provide services of national interest on a nationwide basis. Also, by encumbering State and local funds in a growing number of federally funded areas, the requirements induce distortion of State and local budget priorities and may promote fiscal stress as well. GAO recommends that matching requirements be strengthened but used more sparingly and only where a clearly articulated Federal interest does not conflict with the broader purposes of Federal programs themselves. Maintenance of effort requirements serve a clear, primary Federal interest, but should be changed to more effectively prevent fiscal substitution while not penalizing bona fide State and local spending reductions."
United States. General Accounting Office
1980-12-23
-
Brief History of U.S. Immigration Policy [December 22, 1980]
"U.S. immigration policy has been shaped not only by the perceived needs of this country, but by the needs and aspirations of the immigrants themselves. This paper reviews the major streams of immigration to the United States in the context of the country's changing views of immigration."
Library of Congress. Congressional Research Service
Vialet, Joyce C.
1980-12-22
-
Maritime Boundary: United States-Venezuela
"On March 28, 1978, the Governments of the United States of America and the Republic of Venezuela signed an agreement delimiting a maritime boundary in the east-central Caribbean Sea. Instruments of ratification were exchanged and the treaty entered into force on November 24, 1980. [...] This treaty is the first United States maritime boundary that has entered into force since implementation of the 200-nautical-mile US fishery conservation zone on March 1, 1977."
United States. Department of State. Bureau of Oceans and International Environmental and Scientific Affairs
Smith, Robert W.
1980-12-16
-
Department of Defense Directive 5220.22: DoD Industrial Security Program
This Directive: A. Implements Executive Order 10865, February 20, 1960 within the department of Defense. B. Reissues DoD Directive 5220.22, July 30, 1965 and assigns overall responsibility for policy and administration of the Defense Industrial Security program (DISP). C. Ensures that classified information released to industry is properly safeguarded. DoD directive 5220.22, July 30, 1965 is hereby superseded and canceled.
United States. Department of Defense
1980-12-08
-
Emergency Preparedness for Nuclear Electric Generating Facilities in Foreign Countries: A Brief Survey of Practices
"This report summarizes the emergency plans for accidents at nuclear power plants in Germany, Sweden, Switzerland, the United Kingdom, Canada, and France. Soviet Union documents were examined, but no published information was found on the subject. The study of foreign plans was to determine what U.S. planners might learn that could be useful to them. Plans of the foreign countries were published before the nuclear accident at Three Mile Island and reflected a generally accepted premise that a serious nuclear emergency would never occur. Therefore, there are few ideas of immediate use to U.S. planners. Most countries have since begun to re-examine their emergency planning. The study also discusses the emergency action levels, warning systems, evacuation management and procedures, and public information and education for people living near nuclear power plants and defines roles of nuclear facility operators and roles of the government."
U.S. Nuclear Regulatory Commission
Schuller, C. R. (C. Richard); Marcus, A. A.; Huelshoff, M.
1980-12
-
After the Fire! Returning to Normal [December 1980]
"Recovering from a fire may take a long time and many of the things you have to do will be new to you. This pamphlet introduces some of the information you may need in the coming days." This document includes information on replacing lost items, dealing with personal injury related to a fire, and figuring out the total cost of a fire.
United States. Federal Emergency Management Agency
1980-12
-
Development of Decision Aids for Counter-Terrorist Applications
"Terrorist attacks in the United States and other industrialized nations have increased greatly in recent years. Primary targets for these activities have included Department of Defense (DOD) installations, both in the U.S. and abroad. More sophisticated weapons and tactics have led to a high success rate for terrorist activities."
United States. Defense Advanced Research Projects Agency
O'Connor, Michael F.; Sticha, Paul J.
1980-12
-
Soviet Union, Iran and Pakistan in the 1990's: Security Implications for the United States
"The Soviet invasion of Afghanistan, a Muslim, nonaligned Third World buffer state located on the Soviet border but outside the core zone of Soviet security, may mark a watershed in Soviet policy toward Iran or Pakistan. The western dependence on Persian Gulf oil, the severe internal challenges which will face Iran and Pakistan in the 1990's, and the possibility of rising Soviet challenges and threats will require an unprecedented US/allied response."
Army War College (U.S.). Strategic Studies Institute
Darius, Robert G.
1980-11-07
-
Criteria for Preparation and Evaluation of Radiological Emergency Response Plans and Preparedness in Support of Nuclear Power Plants [1980]
"The purpose of this document is to provide a common reference and guidance source for: [1.] State and local governments and nuclear facility operators in the development of radiological emergency response plans and preparedness in support of nuclear power plants. [2.] Federal Emergency Management Agency (FEMA), Nuclear Regulatory Commission (NRC), and other Federal agency personnel engaged in the review of State, local government and licensee plans and preparedness. [3.] The Federal Emergency Management Agency, the Nuclear Regulatory Commission and other Federal agencies in the development of the National Radiological Emergency Preparedness Plan."
U.S. Nuclear Regulatory Commission; United States. Federal Emergency Management Agency
1980-11
-
Public Law 96-456: Classified Information Procedures Act
"The court, upon a sufficient showing, may authorize the United States to delete specified items of classified information from documents to be made available to the defendant through discovery under the Federal Rules of Criminal Procedure, to substitute a summary of the information for such classified documents, or to substitute a statement admitting relevant facts that the classified information would tend to prove. The court may permit the United States to make a request for such authorization in the form of a written statement to be inspected by the court alone. If the court enters an order granting relief following such an ex parte showing, the entire text of the statement of the United States shall be sealed and preserved in the records of the court to be made available to the appellate court in the event of an appeal."
United States. Government Printing Office
1980-10-15
-
Urban Fire Education: Seattle Case Study
"A major goal of the Office of Planning and Education (OPE), U.S. Fire Administration, is to identify effective local fire education programs and strategies, and distribute information about them nationwide. Other fire personnel can then choose to apply or adapt the programs and strategies to their own localities and needs. This case study is part of OPE's information sharing effort. Specifically, the study describes the fire education programs of the Seattle Fire Department. This department's comprehensive approach to fire education focuses on arson prevention and control as well as on general fire safety. It includes four major elements: Code Red, a program that promptly delivers a fire safety message to residents in a neighborhood that has recently experienced a fire; Fire Prevention Programs, special presentations designed to meet the needs of particular businesses and groups of citizens; School and Fire Safe Education, a program that reaches all 37,000 elementary school children in Seattle each year; and Arson Prevention Activities, a variety of public education and awareness efforts that have contributed to a 44 percent reduction in arson in Seattle since 1974."
United States. Federal Emergency Management Agency
Saily, Mary
1980-10
-
Lanchester-Type Models of Warfare, Volume II
This monograph is a comprehensive treatise on Lanchester-type models of warfare, i.e. differential-equation models of attrition in force-on-force combat operations. Its goal is to provide an introduction to and current- state-of-the-art overview of Lanchester-type models of warfare as well as a comprehensive and unified in-depth treatment of them. Both deterministic as well as stochastic models are considered. Such models have been widely used in the United States and elsewhere for the modeling of force-on-force attrition over the complete spectrum of combat operations, from combat between platoon-sized units through theater-level air-ground combat. This material should be of interest primarily to individuals concerned with defense planning, quantitative aspects of military analysis, military OR, war gaming, or combat modeling, although it may also be of interest to the reader concerned with the modeling and analysis of other dynamic systems. It should also be of interest to the concerned citizen who is interested in the foundations for defense analysis and has the appropriate technical background.
Naval Postgraduate School (U.S.)
Taylor, James G.
1980-10
-
Lanchester-Type Models of Warfare, Volume I
This monograph is a comprehensive treatise on Lanchester-type models of warfare, i.e. differential-equation models of attrition in force-on-force combat operations. Its goal is to provide an introduction to and current- state-of-the-art overview of Lanchester-type models of warfare as well as a comprehensive and unified in-depth treatment of them. Both deterministic as well as stochastic models are considered. Such models have been widely used in the United States and elsewhere for the modeling of force-on-force attrition over the complete spectrum of combat operations, from combat between platoon-sized units through theater-level air-ground combat. This material should be of interest primarily to individuals concerned with defense planning, quantitative aspects of military analysis, military OR, war gaming, or combat modeling, although it may also be of interest to the reader concerned with the modeling and analysis of other dynamic systems. It should also be of interest to the concerned citizen who is interested in the foundations for defense analysis and has the appropriate technical background.
Naval Postgraduate School (U.S.)
Taylor, James G.
1980-10
-
Department of the Interior Departmental Manual, Part 190: Emergency Preparedness, Chapter 1: Basic Organizational Arrangements
This U.S. Department of the Interior Departmental Manual, Part 190, Emergency Preparedness, Chapter 1 outlines the purpose, The Federal Structure for Emergency Preparedness, and The Interior Structure for Emergency Preparedness. This document 8/22/80 #3596 replaces 8/22/80 #2290.
United States. Department of the Interior
1980-08-22
-
Control of Weapon Data
It is necessary to differentiate between the handling of weapon data and other specialized or technical data because of its direct relationship to our nation's defense. The provisions of the Atomic Energy Act stipulate the control and dissemination of Restricted Data to assure the common defense and security. Weapon data is always Restricted Data, or Formerly Restricted Data, specifically that portion concerning the design, manufacture, or utilization of atomic weapons.
United States. Department of Energy
1980-08-01
-
Atlantic Hurricane Season of 1979
"This general summary of the 1979 hurricane season includes highlights of the season, comparisons of activity in recent years with long-term averages, and comments on large-scale atmospheric features that prevailed during the season and their impact on storm tracks. Finally, there are accounts of individual storms, which give meteorological details and the influence of synoptic features on their tracks and intensity."
National Hurricane Center (2012- )
1980-07
-
Guidelines for Security of Computer Applications
Security decisions should be an integral part of the entire planning, development, and operation of a computer application. This guideline describes the technical and managerial decisions that should be made in order to assure that adequate controls are included in new and existing computer applications to protect them from natural and human-made hazards and to assure that critical functions are performed correctly and with no harmful side effects. The multifaceted nature of computer security is described, and differences in security objectives, sensitivity levels, and vulnerabilities that must be considered are identified. Fundamental security controls such as data validation, user identity verification, authorization, journaling, variance detection, and encryption are discussed as well as security-related decisions that should be made at each stage in the life cycle of a computer application. These include questions about security feasibility and risk assessment that should be asked during initial planning, decisions that should be made during the design, programming and testing phases, controls that should be enforced during the development process, and security provisions that should be enforced during the day-to-day operation of the system.
United States. Department of Commerce
1980-06-30
-
Research into the Free Crystalline Silica Content of Mount St. Helens Ash
This report presents the findings of free silica in ash falling in Washington State from Mt. St. Helens. According to the report, researchers do not believe that short term exposure to the ash by the general population poses a significant health hazard. LLIS Core Capability: 1980: Mount St. Helens Volcanic Eruption; Public Health; Environmental Protection; Environmental Protection
United States. Federal Emergency Management Agency
1980-06-06?
-
Countermeasures to an Initial Surprise Attack Through the Analysis of Historical Examples
From the theses abstract: "This study attempts to deduce the countermeasures to an initial surprise attack through the analysis of historical examples. The research reveals that the defender must eliminate vulnerable timing in his reaction capabilities and develop his own doctrine, organization, and material based on his national character, terrain, climate, and the enemy's doctrine. To cope with the attacker's main attack directed toward an unexpected place, the defender capabilities must secure flexibility which could cope with any enemy Once the attacker has attacked, the defender's command structure should exactly identify the attacker's attempt as early as possible. To respond quickly to enemy's attempt, the defender should possess quick reaction capabilities and to respond effectively to the attacker's overpowering concentration of force and his speed of maneuver, the defender's maximum efforts must be focused on absorbing the attacker's attack momentum. Any countermeasure could not be accomplished without the soldiers' high morale. Those deduced countermeasures could be considered conceptual guidance in preparing for a surprise attack. The actual, substantial, and precise countermeasures should be researched, developed, and actualized nationally within the specific environments involved."
U.S. Army Command and General Staff College
Yoo, Je Hyun
1980-06-06
-
Nuclear Proliferation and Civilian Nuclear Power: Report of the Nonproliferation Alternative Systems Assessment Program
"The purpose of this volume is to assess the proliferation vulnerabilities of the present deployment of civilian nuclear-power systems within the current nonproliferation regime and, in light of their prospective deployment, to consider technical and institutional measures and alternatives which may contribute to an improved regime in which nuclear power could play a significant part. An assessment of these measures must include consideration of their nonproliferation effectiveness as well as their bearing upon energy security, and their operational, economic, and political implications. The nature of these considerations can provide some measure of their likely acceptability to various nations. While any final assessment of such measures and alternatives would have to examine the circumstances particular to each nation, it is hoped that the more generic assessments conducted here will be useful in suggesting guidelines for developing an improved nonproliferation regime which also helps to meet nuclear-energy needs."
United States. Department of Energy
1980-06
-
Design and Implementation of the Memory Manager for a Secure Archival Storage System
"This thesis presents a detailed design and implementation of a memory manger for a kernel technology based secure archival storage system (SASS). The memory manger is a part of the non-distributed portion of the Security Kernel, and is solely responsible for proper management of both the main memory (random access) and the secondary storage (direct access) of the system. The memory manager is designed for implementation on the ZILOG Z8000 microprocessor in a multi-processor environment. The loop free design structure, based upon levels of abstraction, and a segment aliasing scheme for information confinement are essential elements of the overall system security provided by the SASS."
Naval Postgraduate School (U.S.)
Gary, Alan V.; Moore, Edmund E.
1980-06
-
Study of Federal Immigration Policies and Practices in Southern California
"The California Advisory Committee submits this report of its study on Federal immigration policies and practices in southern California as part of its responsibility to advise the Commission on civil rights issues within this State. The purpose of the Advisory Committee's study was to supplement the Commission's national immigration effort and to document the effect of Federal immigration policies and practices on rights of minority aliens and U.S. citizens in southern California. The Advisory Committee held open meetings June 15 and 16, 1978, in Los Angeles and June 26, 1978, in San Diego to collect public testimony on immigration issues. The Advisory Committee invited representatives of community group to discuss their concerns and representatives of the U.S. Immigration and Naturalization Service to discuss their respective responsibilities for enforcing and administering Federal immigration laws. One basic finding of this report is that immigration enforcement efforts by the Federal Government are applied unequally to persons of Hispanic descent, thus affecting both constitutional and civil rights of aliens and U.S. citizens. A second major finding is that public service responsibilities within the Immigration and Naturalization Service are not emphasized to the same degree as enforcement functions."
United States Commission on Civil Rights
1980-06
-
Subversion: The Neglected Aspect of Computer Security
This thesis distinguishes three methods of attacking internal protection mechanisms of computers: inadvertent disclosure, penetration, and subversion. Subversion is shown to be the most attractive to the serious attacker. Subversion is characterized by three phases of operations: the inserting of trap doors and Trojan horses, the exercising of them, and the retrieval of the resultant unauthorized information. Insertion occurs over the entire life cycle of the system from the system design phase to the production phase. This thesis clarifies the high risk of using computer stems, particularly so-called 'trusted' subsystems for the protection of sensitive information. This leads to a basis for countermeasures based on the lifetime protection of security related system components combined with the application of adequate technology as exemplified in the security kernel concept.
Naval Postgraduate School (U.S.)
Myers, Philip A.
1980-06
-
DoD Directive 3025.1: Use of Military Resources During Peacetime Civil Emergencies within the United States, its Territories, and Possessions
"This Directive reissues reference (a), which establishes DoD policies, assigns responsibilities, and furnishes guidance for DoD support to civil authorities under peacetime civil emergency conditions within the United States."
United States. Department of Defense
1980-05-23
-
American Civil Defense 1945-1975: The Evolution of Programs and Policies
"This is a study of the evolution of civil defense policies and programs in the United States for the period 1945-1974. Written as a doctoral dissertation at the University of Virginia over a 3-year period (1978-1980), this study draws heavily on a large selection of executive and legislative branch hearings, reports, studies and government-sponsored research. It is reproduced in the belief that the information it contains will be of use to those conducting research in civil defense-related fields and to those responsible for the administration of civil defense programs."
United States. Federal Emergency Management Agency
Blanchard, B. Wayne
1980-05
-
Department of Defense Instruction 5030.36: Plan for the Security Control of Air Traffic and Air Navigation Aids, April 24, 1980
"This Instruction reissues reference (a), and transmits the revised 1975 SCATANA [Security Control of Air Traffic and Air Navigation Aids](enclosure 1) for information and guidance. SCATANA is an emergency preparedness plan that prescribes the joint action to be taken by appropriate elements of the Department of Defense, Federal Aviation Administration, and the Federal Communications Commission in the interest of national security to effect control of air traffic and air navigation aids under emergency conditions. Inquiries regarding this plan may be addressed to: North American Air Defense Command, Peterson Air Force Base, Colorado 80914."
United States. Department of Defense
1980-04-24