Advanced search Help
Clear all search criteria
Only 2/3! You are seeing results from the Public Collection, not the complete Full Collection. Sign in to search everything (see eligibility).
-
Maritime Boundary: United States-Venezuela
"On March 28, 1978, the Governments of the United States of America and the Republic of Venezuela signed an agreement delimiting a maritime boundary in the east-central Caribbean Sea. Instruments of ratification were exchanged and the treaty entered into force on November 24, 1980. [...] This treaty is the first United States maritime boundary that has entered into force since implementation of the 200-nautical-mile US fishery conservation zone on March 1, 1977."
United States. Department of State. Bureau of Oceans and International Environmental and Scientific Affairs
Smith, Robert W.
1980-12-16
-
Department of Defense Directive 5220.22: DoD Industrial Security Program
This Directive: A. Implements Executive Order 10865, February 20, 1960 within the department of Defense. B. Reissues DoD Directive 5220.22, July 30, 1965 and assigns overall responsibility for policy and administration of the Defense Industrial Security program (DISP). C. Ensures that classified information released to industry is properly safeguarded. DoD directive 5220.22, July 30, 1965 is hereby superseded and canceled.
United States. Department of Defense
1980-12-08
-
Emergency Preparedness for Nuclear Electric Generating Facilities in Foreign Countries: A Brief Survey of Practices
"This report summarizes the emergency plans for accidents at nuclear power plants in Germany, Sweden, Switzerland, the United Kingdom, Canada, and France. Soviet Union documents were examined, but no published information was found on the subject. The study of foreign plans was to determine what U.S. planners might learn that could be useful to them. Plans of the foreign countries were published before the nuclear accident at Three Mile Island and reflected a generally accepted premise that a serious nuclear emergency would never occur. Therefore, there are few ideas of immediate use to U.S. planners. Most countries have since begun to re-examine their emergency planning. The study also discusses the emergency action levels, warning systems, evacuation management and procedures, and public information and education for people living near nuclear power plants and defines roles of nuclear facility operators and roles of the government."
U.S. Nuclear Regulatory Commission
Schuller, C. R. (C. Richard); Marcus, A. A.; Huelshoff, M.
1980-12
-
After the Fire! Returning to Normal [December 1980]
"Recovering from a fire may take a long time and many of the things you have to do will be new to you. This pamphlet introduces some of the information you may need in the coming days." This document includes information on replacing lost items, dealing with personal injury related to a fire, and figuring out the total cost of a fire.
United States. Federal Emergency Management Agency
1980-12
-
Development of Decision Aids for Counter-Terrorist Applications
"Terrorist attacks in the United States and other industrialized nations have increased greatly in recent years. Primary targets for these activities have included Department of Defense (DOD) installations, both in the U.S. and abroad. More sophisticated weapons and tactics have led to a high success rate for terrorist activities."
United States. Defense Advanced Research Projects Agency
O'Connor, Michael F.; Sticha, Paul J.
1980-12
-
Soviet Union, Iran and Pakistan in the 1990's: Security Implications for the United States
"The Soviet invasion of Afghanistan, a Muslim, nonaligned Third World buffer state located on the Soviet border but outside the core zone of Soviet security, may mark a watershed in Soviet policy toward Iran or Pakistan. The western dependence on Persian Gulf oil, the severe internal challenges which will face Iran and Pakistan in the 1990's, and the possibility of rising Soviet challenges and threats will require an unprecedented US/allied response."
Army War College (U.S.). Strategic Studies Institute
Darius, Robert G.
1980-11-07
-
Criteria for Preparation and Evaluation of Radiological Emergency Response Plans and Preparedness in Support of Nuclear Power Plants [1980]
"The purpose of this document is to provide a common reference and guidance source for: [1.] State and local governments and nuclear facility operators in the development of radiological emergency response plans and preparedness in support of nuclear power plants. [2.] Federal Emergency Management Agency (FEMA), Nuclear Regulatory Commission (NRC), and other Federal agency personnel engaged in the review of State, local government and licensee plans and preparedness. [3.] The Federal Emergency Management Agency, the Nuclear Regulatory Commission and other Federal agencies in the development of the National Radiological Emergency Preparedness Plan."
U.S. Nuclear Regulatory Commission; United States. Federal Emergency Management Agency
1980-11
-
Public Law 96-456: Classified Information Procedures Act
"The court, upon a sufficient showing, may authorize the United States to delete specified items of classified information from documents to be made available to the defendant through discovery under the Federal Rules of Criminal Procedure, to substitute a summary of the information for such classified documents, or to substitute a statement admitting relevant facts that the classified information would tend to prove. The court may permit the United States to make a request for such authorization in the form of a written statement to be inspected by the court alone. If the court enters an order granting relief following such an ex parte showing, the entire text of the statement of the United States shall be sealed and preserved in the records of the court to be made available to the appellate court in the event of an appeal."
United States. Government Printing Office
1980-10-15
-
Urban Fire Education: Seattle Case Study
"A major goal of the Office of Planning and Education (OPE), U.S. Fire Administration, is to identify effective local fire education programs and strategies, and distribute information about them nationwide. Other fire personnel can then choose to apply or adapt the programs and strategies to their own localities and needs. This case study is part of OPE's information sharing effort. Specifically, the study describes the fire education programs of the Seattle Fire Department. This department's comprehensive approach to fire education focuses on arson prevention and control as well as on general fire safety. It includes four major elements: Code Red, a program that promptly delivers a fire safety message to residents in a neighborhood that has recently experienced a fire; Fire Prevention Programs, special presentations designed to meet the needs of particular businesses and groups of citizens; School and Fire Safe Education, a program that reaches all 37,000 elementary school children in Seattle each year; and Arson Prevention Activities, a variety of public education and awareness efforts that have contributed to a 44 percent reduction in arson in Seattle since 1974."
United States. Federal Emergency Management Agency
Saily, Mary
1980-10
-
Lanchester-Type Models of Warfare, Volume II
This monograph is a comprehensive treatise on Lanchester-type models of warfare, i.e. differential-equation models of attrition in force-on-force combat operations. Its goal is to provide an introduction to and current- state-of-the-art overview of Lanchester-type models of warfare as well as a comprehensive and unified in-depth treatment of them. Both deterministic as well as stochastic models are considered. Such models have been widely used in the United States and elsewhere for the modeling of force-on-force attrition over the complete spectrum of combat operations, from combat between platoon-sized units through theater-level air-ground combat. This material should be of interest primarily to individuals concerned with defense planning, quantitative aspects of military analysis, military OR, war gaming, or combat modeling, although it may also be of interest to the reader concerned with the modeling and analysis of other dynamic systems. It should also be of interest to the concerned citizen who is interested in the foundations for defense analysis and has the appropriate technical background.
Naval Postgraduate School (U.S.)
Taylor, James G.
1980-10
-
Lanchester-Type Models of Warfare, Volume I
This monograph is a comprehensive treatise on Lanchester-type models of warfare, i.e. differential-equation models of attrition in force-on-force combat operations. Its goal is to provide an introduction to and current- state-of-the-art overview of Lanchester-type models of warfare as well as a comprehensive and unified in-depth treatment of them. Both deterministic as well as stochastic models are considered. Such models have been widely used in the United States and elsewhere for the modeling of force-on-force attrition over the complete spectrum of combat operations, from combat between platoon-sized units through theater-level air-ground combat. This material should be of interest primarily to individuals concerned with defense planning, quantitative aspects of military analysis, military OR, war gaming, or combat modeling, although it may also be of interest to the reader concerned with the modeling and analysis of other dynamic systems. It should also be of interest to the concerned citizen who is interested in the foundations for defense analysis and has the appropriate technical background.
Naval Postgraduate School (U.S.)
Taylor, James G.
1980-10
-
Department of the Interior Departmental Manual, Part 190: Emergency Preparedness, Chapter 1: Basic Organizational Arrangements
This U.S. Department of the Interior Departmental Manual, Part 190, Emergency Preparedness, Chapter 1 outlines the purpose, The Federal Structure for Emergency Preparedness, and The Interior Structure for Emergency Preparedness. This document 8/22/80 #3596 replaces 8/22/80 #2290.
United States. Department of the Interior
1980-08-22
-
Control of Weapon Data
It is necessary to differentiate between the handling of weapon data and other specialized or technical data because of its direct relationship to our nation's defense. The provisions of the Atomic Energy Act stipulate the control and dissemination of Restricted Data to assure the common defense and security. Weapon data is always Restricted Data, or Formerly Restricted Data, specifically that portion concerning the design, manufacture, or utilization of atomic weapons.
United States. Department of Energy
1980-08-01
-
Atlantic Hurricane Season of 1979
"This general summary of the 1979 hurricane season includes highlights of the season, comparisons of activity in recent years with long-term averages, and comments on large-scale atmospheric features that prevailed during the season and their impact on storm tracks. Finally, there are accounts of individual storms, which give meteorological details and the influence of synoptic features on their tracks and intensity."
National Hurricane Center (2012- )
1980-07
-
Guidelines for Security of Computer Applications
Security decisions should be an integral part of the entire planning, development, and operation of a computer application. This guideline describes the technical and managerial decisions that should be made in order to assure that adequate controls are included in new and existing computer applications to protect them from natural and human-made hazards and to assure that critical functions are performed correctly and with no harmful side effects. The multifaceted nature of computer security is described, and differences in security objectives, sensitivity levels, and vulnerabilities that must be considered are identified. Fundamental security controls such as data validation, user identity verification, authorization, journaling, variance detection, and encryption are discussed as well as security-related decisions that should be made at each stage in the life cycle of a computer application. These include questions about security feasibility and risk assessment that should be asked during initial planning, decisions that should be made during the design, programming and testing phases, controls that should be enforced during the development process, and security provisions that should be enforced during the day-to-day operation of the system.
United States. Department of Commerce
1980-06-30
-
Research into the Free Crystalline Silica Content of Mount St. Helens Ash
This report presents the findings of free silica in ash falling in Washington State from Mt. St. Helens. According to the report, researchers do not believe that short term exposure to the ash by the general population poses a significant health hazard. LLIS Core Capability: 1980: Mount St. Helens Volcanic Eruption; Public Health; Environmental Protection; Environmental Protection
United States. Federal Emergency Management Agency
1980-06-06?
-
Countermeasures to an Initial Surprise Attack Through the Analysis of Historical Examples
From the theses abstract: "This study attempts to deduce the countermeasures to an initial surprise attack through the analysis of historical examples. The research reveals that the defender must eliminate vulnerable timing in his reaction capabilities and develop his own doctrine, organization, and material based on his national character, terrain, climate, and the enemy's doctrine. To cope with the attacker's main attack directed toward an unexpected place, the defender capabilities must secure flexibility which could cope with any enemy Once the attacker has attacked, the defender's command structure should exactly identify the attacker's attempt as early as possible. To respond quickly to enemy's attempt, the defender should possess quick reaction capabilities and to respond effectively to the attacker's overpowering concentration of force and his speed of maneuver, the defender's maximum efforts must be focused on absorbing the attacker's attack momentum. Any countermeasure could not be accomplished without the soldiers' high morale. Those deduced countermeasures could be considered conceptual guidance in preparing for a surprise attack. The actual, substantial, and precise countermeasures should be researched, developed, and actualized nationally within the specific environments involved."
U.S. Army Command and General Staff College
Yoo, Je Hyun
1980-06-06
-
Nuclear Proliferation and Civilian Nuclear Power: Report of the Nonproliferation Alternative Systems Assessment Program
"The purpose of this volume is to assess the proliferation vulnerabilities of the present deployment of civilian nuclear-power systems within the current nonproliferation regime and, in light of their prospective deployment, to consider technical and institutional measures and alternatives which may contribute to an improved regime in which nuclear power could play a significant part. An assessment of these measures must include consideration of their nonproliferation effectiveness as well as their bearing upon energy security, and their operational, economic, and political implications. The nature of these considerations can provide some measure of their likely acceptability to various nations. While any final assessment of such measures and alternatives would have to examine the circumstances particular to each nation, it is hoped that the more generic assessments conducted here will be useful in suggesting guidelines for developing an improved nonproliferation regime which also helps to meet nuclear-energy needs."
United States. Department of Energy
1980-06
-
Design and Implementation of the Memory Manager for a Secure Archival Storage System
"This thesis presents a detailed design and implementation of a memory manger for a kernel technology based secure archival storage system (SASS). The memory manger is a part of the non-distributed portion of the Security Kernel, and is solely responsible for proper management of both the main memory (random access) and the secondary storage (direct access) of the system. The memory manager is designed for implementation on the ZILOG Z8000 microprocessor in a multi-processor environment. The loop free design structure, based upon levels of abstraction, and a segment aliasing scheme for information confinement are essential elements of the overall system security provided by the SASS."
Naval Postgraduate School (U.S.)
Gary, Alan V.; Moore, Edmund E.
1980-06
-
Study of Federal Immigration Policies and Practices in Southern California
"The California Advisory Committee submits this report of its study on Federal immigration policies and practices in southern California as part of its responsibility to advise the Commission on civil rights issues within this State. The purpose of the Advisory Committee's study was to supplement the Commission's national immigration effort and to document the effect of Federal immigration policies and practices on rights of minority aliens and U.S. citizens in southern California. The Advisory Committee held open meetings June 15 and 16, 1978, in Los Angeles and June 26, 1978, in San Diego to collect public testimony on immigration issues. The Advisory Committee invited representatives of community group to discuss their concerns and representatives of the U.S. Immigration and Naturalization Service to discuss their respective responsibilities for enforcing and administering Federal immigration laws. One basic finding of this report is that immigration enforcement efforts by the Federal Government are applied unequally to persons of Hispanic descent, thus affecting both constitutional and civil rights of aliens and U.S. citizens. A second major finding is that public service responsibilities within the Immigration and Naturalization Service are not emphasized to the same degree as enforcement functions."
United States Commission on Civil Rights
1980-06
-
Subversion: The Neglected Aspect of Computer Security
This thesis distinguishes three methods of attacking internal protection mechanisms of computers: inadvertent disclosure, penetration, and subversion. Subversion is shown to be the most attractive to the serious attacker. Subversion is characterized by three phases of operations: the inserting of trap doors and Trojan horses, the exercising of them, and the retrieval of the resultant unauthorized information. Insertion occurs over the entire life cycle of the system from the system design phase to the production phase. This thesis clarifies the high risk of using computer stems, particularly so-called 'trusted' subsystems for the protection of sensitive information. This leads to a basis for countermeasures based on the lifetime protection of security related system components combined with the application of adequate technology as exemplified in the security kernel concept.
Naval Postgraduate School (U.S.)
Myers, Philip A.
1980-06
-
DoD Directive 3025.1: Use of Military Resources During Peacetime Civil Emergencies within the United States, its Territories, and Possessions
"This Directive reissues reference (a), which establishes DoD policies, assigns responsibilities, and furnishes guidance for DoD support to civil authorities under peacetime civil emergency conditions within the United States."
United States. Department of Defense
1980-05-23
-
American Civil Defense 1945-1975: The Evolution of Programs and Policies
"This is a study of the evolution of civil defense policies and programs in the United States for the period 1945-1974. Written as a doctoral dissertation at the University of Virginia over a 3-year period (1978-1980), this study draws heavily on a large selection of executive and legislative branch hearings, reports, studies and government-sponsored research. It is reproduced in the belief that the information it contains will be of use to those conducting research in civil defense-related fields and to those responsible for the administration of civil defense programs."
United States. Federal Emergency Management Agency
Blanchard, B. Wayne
1980-05
-
Department of Defense Instruction 5030.36: Plan for the Security Control of Air Traffic and Air Navigation Aids, April 24, 1980
"This Instruction reissues reference (a), and transmits the revised 1975 SCATANA [Security Control of Air Traffic and Air Navigation Aids](enclosure 1) for information and guidance. SCATANA is an emergency preparedness plan that prescribes the joint action to be taken by appropriate elements of the Department of Defense, Federal Aviation Administration, and the Federal Communications Commission in the interest of national security to effect control of air traffic and air navigation aids under emergency conditions. Inquiries regarding this plan may be addressed to: North American Air Defense Command, Peterson Air Force Base, Colorado 80914."
United States. Department of Defense
1980-04-24
-
Declassification of the NRO
"In August 1980 the National Reconnaissance Office (NRO) will complete its second decade of successful operation, and can likely be accorded credit as the largest, longest, and most effective covert program in U.S. history. The systems designed, procured and operated by the NRO have played a major role in American national security, as well as in making possible strategic arms-control. This record of technical achievements and management effectiveness is both distinguished, and one which reflects well on those associated with the NRO. Since the 'declassification' of the National Security Agency in 1957 by publication of a three sentence description, the NRO presently remains the only major 'classified' element of the U.S. Intelligence Community, and in many ways a bureaucratic anomaly. In terms of its mission, there is nothing inherently more covert about the NRO than CIA's clandestine activities or the operations of NSA, both acknowledged QY the U.S. Government. Indeed, none of the 'abuses' associated with other elements of the Intelligence Community in the post-Watergate Congressional investigations can be associated with the NRO. As a practical matter, much about the NRO is an 'open secret.' The NRO name, mission, and several NRO programs have been the subject of increasing media discussion over the past several years, and the existence of the NRO is 'officially' confirmed by OSD (Public Affairs)."
United States. National Reconnaissance Office
1980-04-15
-
Computer Security Threat Monitoring and Surveillance
In computer installations in general, security audit trails, if taken, are rarely complete and almost never geared to the needs of the security officers whose responsibility it is to protect ADP assets. The balance of this report outlines the considerations and general design of a system, which provides an initial set of tools to computer system security officers for use in their jobs. The discussion does not suggest the elimination of any existing security audit data collection and distribution. Rather it suggests augmenting any such schemes with information for the security personnel directly involved.
National Institute of Standards and Technology (U.S.)
1980-04-15
-
Executive Order 12208: Consultations on the Admission of Refugees
"To the Secretary of State and the Attorney General, or either of them, the functions of initiating and carrying out appropriate consultations with members of the Committees on the Judiciary of the Senate and of the House of Representatives for purposes of Sections 101(a)(42)(B) and 207 (a), (b), (d), and (e) of the Immigration and Nationality Act, as amended (8 U.S.C. 1101(a)(42)[B) and 1157 (a), (b), (d), and [e)). (b) To the United States Coordinator for Refugee Affairs, the functions of reporting and carrying on periodic discussions under section 207(d)[l) of the Immigration and Nationality Act, as amended. (a) The functions vested in the United States Coordinator for Refugee Affairs by Section 1-lOl(b) of this Order shall be carried out in consultation with the Secretary of State, the Attorney General, and the Secretary of Health, Education, and Welfare. (b) The United States Coordinator shall notify the Committees on the Judiciary of the Senate and of the House of Representatives that the Secretary of State and the Attorney General, or either of them, wish to consult for the purposes of Section 207 (a), (b), or (d) of the Immigration and Nationality Act, as amended. The United States Coordinator for Refugee Affairs shall, in accord with his responsibilities under Section 301 of the Refugee Act of 1980 (8 U.S.C. 1525), prepare for those Committees the information required by 207(e) of the Immigration and Nationality Act, as amended."
United States. Office of the Federal Register
Carter, Jimmy, 1924-
1980-04-15
-
Indirect Costs of Residential Fires
"This report presents national estimates of indirect losses resulting from residential fires in the United States, where indirect losses are defined as costs other than direct property damage. Estimates of such losses, which include medical costs, temporary housing costs, lost wages, and a number of other components, are developed on the basis of survey information from a stratified random sample of 883 households which had experienced fires approximately four months prior to being interviewed. Two loss measures are used in the analysis. The first, total indirect losses, includes all indirect costs to which it was possible to assign a monetary value. Such losses are estimated at between $220.3 million and $322.6 million per year, depending on alternative assumptions concerning the total number of residential fires occurring in the United States. The second loss measure, out-of-pocket costs borne directly by households affected by fires, is estimated at between $105 million and $153.8 million per year. All of these cost estimates are subject to considerable statistical sampling error due to the relatively small sample on which they are based. In particular, it is estimated that the sampling error could easily be as much as plus-or-minus 28 percent of the specific loss estimates. In addition, there is some possibility of downward biases in the estimates because of difficulties in locating households which had moved as a result of particularly serious fires and because, particularly in the case of fires involving serious injuries, some costs may not have been incurred by the time of the survey. While such downward biases are possible, however, attempts to check the survey-based loss estimates against independently derived figures from other sources suggest that the estimates described here are in all likelihood at least of the correct order of magnitude."
United States. Federal Emergency Management Agency; National Fire Data Center (U.S.)
Munson, Michael J.; Ohls, James C.
1980-04
-
National Estimates of Indirect Fire Costs
"The objective of this study was to develop a national estimate of indirect residential fire costs which, when combined with an estimate of direct losses based on fire department fire reports, would yield an accurate overall picture of total losses as the result of reported residential fires in the United States. Since fire department reports typically include in their dollar loss estimates only damage directly done to buildings and contents, the subject of the present study, indirect fire costs, was operationally defined to include all costs other than the value of damage directly done to structures and their contents. In particular, the following categories of indirect costs were considered: medical costs, temporary shelter costs, costs of missed work, extra meal costs, funeral costs, demolition costs, cost of legal fees, and other similar, miscellaneous cost items which are not included in those explicit categories. Three categories of indirect fire costs which had to be omitted from the cost calculations presented in this chapter should be noted. First, and perhaps most important, no attempt has been made to place a monetary value on the pain, both physical and psychological, experienced by fire victims and their friends and relatives as a result of the fires. Fires often have devastating nonmonetary impacts because of such factors as deaths, injuries, dislocation, loss of cherished and irreplaceable possessions, and trauma. Indeed, in many cases such costs may be greater in magnitude than those to which monetary values can be assigned."
United States. Federal Emergency Management Agency; United States Fire Administration
1980-04
-
International Terrorism in 1979
This research paper produced by the Central Intelligence Agency in April 1980 provides graphs and analysis of international terrorist acts for the year of 1979. Topics discussed include trends, the numbers of total deaths from acts of terrorism, geographic distribution of acts, state supported terrorism and a breakdown of the nationality of victims of terrorist attacks.
United States. Central Intelligence Agency
1980-04