Advanced search Help
Clear all search criteria
Only 2/3! You are seeing results from the Public Collection, not the complete Full Collection. Sign in to search everything (see eligibility).
-
Radioactive Waste Management in the USSR: A Review of Unclassified Sources, 1963-1990
"The Soviet Union operates a vast and growing radioactive waste management system. Detailed information on this system is rare and a general overall picture only emerges after a review of a great deal of literature. Poor waste management practices and slow implementation of environmental restoration activities have caused a great deal of national concern. The release of information on the cause and extent of an accident involving high-level waste at the Kyshtym production reactor site in 1957, as well as other contamination at the site, serve to highlight past Soviet waste management practices. As a result, the area of waste management is now receiving greater emphasis, and more public disclosures. […] Millions of curies of liquid low- and intermediate-level wastes have been disposed of by well injection into underground areas where they were supposedly contained by watertight rock strata. Sane gaseous wastes were also disposed of by well injection. This practice is not referred to in recent literature and thus may not be widely used today. Rather, it appears that these waste streams are now first treated to reduce volume, and then solidified using bitumen or concrete. These solidified liquid wastes from Soviet nuclear power reactor operations, along with solid wastes, are disposed of in shallow-land burial sites located at most large power reactor stations."
United States. Department of Energy
Schneider, K. J.; Bradley, Don J.
1990-03
-
Health Evaluation Report 87-376-2018; U.S. Department of Justice United States Marshals Service Washington, D.C.
"On July 29, 1987, the National Institute for Occupation Safety and Health (NIOSH) received a request for a Health Hazard Evaluation from the United States Marshals Service (hereinafter referred to as the Marshals Service) in Washington D.C. The Marshals Service requested NIOSH's assistance in testing the efficacy of recent renovations to the ventilation system of their indoor firing range."
Centers for Disease Control and Prevention (U.S.); National Institute for Occupational Safety and Health
Reh, Christopher M.; Klein, Matthew K.
1990-03
-
Nuclear and NBC Contamination Survivability of Medical Materiel
"The purpose of this paper is to provide military personnel and contractors involved in the development and acquisition of military equipment with background information pertaining to Nuclear, Biological, and Chemical (NBC) contamination survivability. Two categories of threat environments identified as Nuclear Weapons Effects (NWE) and NBC contamination are thoroughly described as well as the NBC terminology, protective measures, engineering practices, and organizational responsibilities that must be considered during materiel acquisition. The content in this paper was consolidated from the vast number of military standards (MIL-STDs), data item descriptions (DIDs), Army Regulations (ARs), Quadripartite Standardization Agreements (OSTAGs) and other military documents that concern nuclear and NBC contamination and survivability as well as the input of the U.S. Army Nuclear and Chemical Agency, U.S. Army Laboratory Command and the U.S. Army Chemical Research, Development, and Engineering Center."
U.S. Army Medical Materiel Development Activity
Comer, K. Allen; Zajac, Andrew J.; Wright, William P.
1990-03
-
CERTS: A Comparative Evaluation Method for Risk Management Methodologies and Tools
"This thesis develops a comparative evaluation method for computer security risk management methodologies and tools. The subjective biases inherent to current comparison practices are reduced by measuring unique characteristics of computer security risk management methodologies. Standardized criteria are established and described by attributes which in turn are defined by metrics that measure the characteristics. The suitability of a method or tool to a particular organizational situation can then be analyzed objectively. Additionally, our evaluation method facilitates the comparison of methodologies and tools to each other. As a demonstration of its effectiveness, our method is applied to four distinct risk management methodologies and four risk management tools. Alternative models for utilizing the evaluation method are presented as well as possible directions for their application. Without an adequate means of comparing and evaluating risk management decision-making methodologies, the metadecision (the selection of a risk management method or tool) becomes arbitrary and capricious, thereby making an inappropriate selection more likely. Selection of an inappropriate method or tool could lead to excessive costs, misdirected efforts, and the loss of assets. The systematic and standard comparison method developed in this thesis resolves that problem."
Naval Postgraduate School (U.S.)
Garrabrants, William M.; Ellis, Alfred W., III
1990-03
-
Characteristics of User-Generated Passwords
"Access control based on the verification of a person's identity is commonly used in information system/computer installations. The most widely used mechanism for access control to information systems is passwords. Passwords can be machine-generated using a list of words stored in a memory bank, machine-generated using a sophisticated algorithm to create a pseudo-random combination of characters or they can be user-generated. User-generated passwords typically take on the characteristics of some type of meaningful detail that is simple in structure and easy to remember Memorability and security pose a difficult trade-off in password generation. On one hand a system security administrator wants passwords that are unpredictable, frequently changed and provide the greatest degree of system security achievable. Users, on the other hand, want passwords that are simple and easy to remember. If passwords are chosen to make them difficult to guess, they may become difficult to remember. When they become difficult to remember they are likely to be written down. Once written down a compromise to security occurs because users tend to store them in insecure places. This thesis looks at user-generated password characteristics. Of particular interest is how password selection, memorability and predictability are affected by the number of characters in a password, the importance and sensitivity of a users data. a users work location, how a password was chosen, the frequency of changing a password and the frequency of logging on to a system with a password."
Naval Postgraduate School (U.S.)
Sawyer, Darren Antwon
1990-03
-
TSG Guidelines for Computerized Telephone Systems
"This standard was prepared by the Telephone Security Group (TSG). The charter members of the TSG are: Department of the Air Force, Department of the Army. Central Intelligence Agency. Defense Intelligence Agency Department of Energy, Federal Bureau of Investigation, Department of the Navy. National Security Agency, US Secret Service, and Department of State. The TSG is the primary technical and policy resource in the US Intelligence Community for all aspects of the TSCM (technical surveillance countermeasures) program involving telephone systems. The TSG standards contain guidance for providing on-hook security to telephone systems in areas where sensitive government information is discussed. Implementation of TSG standards neither prevents the application of more stringent requirements nor satisfies the requirements of other security programs such as TEMPEST. COMSEC, or OPSEC. This standard establishes requirements for planning, installing, maintaining, and managing a computerized telephone system (CTS). The requirements established in this standard are necessary in order to achieve on-hook audio security for computerized telephones located in sensitive discussion areas. For a CTS conforming to this standard, all protected on-hook telephones will be completely isolated from all transmission media and wires that are physically unprotected. This standard requires that the isolation for most telephones be achieved in the CTS itself."
United States. National Security Agency
1990-03
-
FM 34-3: Intelligence Analysis
"This publication describes the processes, procedures, and techniques used to produce all-source intelligence. It focuses on intelligence production at echelons at corps and below and amplifies the doctrine contained in FM 34-1. It provides guidance for intelligence staff officers, warrant officers. NCOs, and intelligence analysts at all skill levels. It is designed for use by the active Army and reserve components (RC)."
United States. Department of the Army
1990-03
-
National Security Strategy of the United States [1990]
This report outlines the direction the United States will take to protect the legacy of the postwar era while enabling us to help shape a new era, 'one that moves beyond containment and that will take us into the next century'.
United States. White House Office
1990-03
-
International Terrorism and Third World Conflict
"Terrorist incidents during the 1980s drove the Reagan Administration to adopt a series of policy initiatives to combat the threat. The US combating terrorism policy as stated in the 'Vice President's Task Force Report on Combating Terrorism' has enjoyed some success in dealing with the international terrorist threat. Terrorist activities no longer dominate today's headlines. However, logic would dictate that the U.S. is enjoying a temporary lull in overt terrorist acts directed against our interests and that the terrorism genie in not dead but merely resting. Demise of superpower influence during 1990s will most likely lead to increased regional instabilities and smaller but more intense disagreements--an atmosphere ripe for the use of terrorism. State sponsored terrorism, classical terrorist groups, and terrorism used as a tactic by insurgents and the drug cartel will flourish in this environment."
Air University (U.S.). Air War College; United States. Air Force
Tieman, Larry W.
1990-03
-
Role of Strategic Planning in the Evolution of Command and Control Systems
"This thesis examines the role that strategic planning plays in the evolution of Command and Control (C2) systems by defining both C2 and strategic planning and showing the, interfaces between them. It goes on to show how the View of the threat in the years to come influence the implementation of C2 systems. Furthermore, the author challenges the traditional strategic thought on threat assessment which views the threat primarily as a massive Warsaw Pact attack on Central Europe or an all-out Soviet nuclear attack. The future threat, projected ten to twenty years out is examined and expanded to include more likely scenarios the U.S. military may face including: drug trafficking, low intensity conflict in the Persian Gulf, and ballistic missile proliferation. From these emerging threats, the author recommends what C2 system technology the Department of Defense DOD) should pursue."
Naval Postgraduate School (U.S.)
Mallick, Richard Lee
1990-03
-
International Drug Trafficking- A Growing National Security Concern for Low Intensity Conflict
"Since 1981, U.S. authorities repeatedly recognized international drug trafficking as a national security concern, domestic legal restrictions were lifted to allow military support to civil law enforcement agencies, and the U.S. armed forces provided increasingly unprecedented levels of assistance. However, the levels of drug abuse nationwide continue to increase, the drug threat from Third World and domestic sources continues to expand, and drug-related destabilizing events in the Third World may well serve as a catalyst for future low-intensity conflict (LIC). The U.S. military finds itself with an unwanted but legislated and formal mission--lead agency for air and maritime detection and monitoring of drug smuggling to the United States. Accordingly, formally stated national security concerns, the long-term nature of the drug problem, and the newly legislated U.S. military mission warrant a careful review of future domestic and overseas involvement in the war on drugs. Several significant and presently debated counterdrug issues deserve high-level consideration. These include the further possibilities for legislated changes that eliminate legal restrictions and increase the military role; expanded foreign involvement; organizational questions; and military budgeting/acquisition alternatives. This paper addresses these issues and their implications for our future Air Force."
Air University (U.S.). Air War College
Layton, Ronald A.
1990-03
-
On-Hook Telephone Audio Security Performance Specification
"This standard specifies the minimum required performance for a telephone that can be located in a sensitive discussion area without supplementary on-hook audio security measures. The technical performance requirements expressed in this standard are included as a part of the type-acceptance criteria lofts Standards 3 and 4."
United States. National Security Agency
1990-03
-
Introduction to Telephone Security
"The National Telecommunications Security (NTS) Working Group (WG), formerly known as the Telecommunications Security Group (TSG), is the primary technical and policy resource in the U.S. Intelligence Community (IC) for all aspects of the Technical Surveillance Countermeasures (TSCM) Program involving telephone systems located in areas where sensitive government information is discussed. TSG Standards will be replaced by and issued as Committee on National Security Systems Instructions (CNSSIs). Implementation of CNSS instructions/TSG standards neither prevents the application of more stringent requirements nor satisfies the requirements of other security programs such as TEMPEST, COMSEC, or OPSEC. TSG Standard 1 is an introduction to telephone security that provides general information linked to the existing TSG standards and re-issued as CNSS instructions."
United States. National Security Agency
1990-03
-
Maritime Boundary: Cuba-United States
"On December 16, 1977, the Governments of the United States of America and the Republic of Cuba signed an agreement delimiting a maritime boundary in the Straits of Florida and eastern Gulf of Mexico. The parties agreed to provisional application of the agreement, effective January 1, 1978, pending permanent entry into force of the agreement following the exchange of instruments of ratification. To date, this exchange has not occurred. Subsequent to the signing of this agreement Notes have been exchanged on six occasions (every two years) extending the provisional application of the agreement. The latest agreement occurred December 26, 1989. The text of the maritime boundary agreement is reproduced at Annex 1 of this report; a copy of the most recent exchange of notes extending the provisional application of the agreement is reprinted at Annex 2. [...] The 1977 negotiations leading to the maritime boundary agreement were one of the first formal and direct discussions the United States and Cuba held for many years. Each country had, in 1977, extended its maritime jurisdiction to 200 miles, Cuba claiming an exclusive economic zone, the United States claiming an exclusive fishing zone. Since the two countries are less than 400 miles apart there exists an area in the southern portion of the Straits of Florida and eastern Gulf of Mexico where their respective claims overlap."
United States. Department of State. Bureau of Oceans and International Environmental and Scientific Affairs
Smith, Robert W.
1990-02-21
-
Role of the National Guard in Drug Interdiction
"A National Strategy has been developed to combat the increasing illegal drug threat to the United States. The use of the military services by the Department of Defense to assist Federal, State, and local law enforcement agencies will offset advantages the illegal drug community has in trafficking and distribution of drugs into this country. The Secretary of Defense has directed the National Guard under Section 1105, Public Law 100-456, to provide support to law enforcement agencies in drug interdiction and eradication. The Chief, National Guard Bureau, has the responsibility to ensure that guidance from Congress is accomplished. The role of the military in support of Federal law enforcement agencies provides trained manpower and equipment necessary to - combat the 'war on drugs.' The purpose for the employment of the Army National Guard is to contribute the manpower, training, and logistical support for drug interdiction and eradication requirements. These are accomplished at the ports of entry, border crossings, customs warehouses, and on lands growing illegal plants. The examination of the military's capability, based on previous employments of the force in this role, will show a marked improvement in the reduction and threat of illegal drug use."
Army War College (U.S.)
Silva, Manuel F.
1990-02-20
-
Executive Order 12703: Support for East European Democracy (SEED) Program
"By the authority vested in me as President by the Constitution and laws of the United States of America, including the Support for East European Democracy (SED) Act (P.L. 101-179, herinafter referred to as the "Act") and section 301 of Title 3 of the United States Code, it is hereby ordered as follows:"
United States. Office of the Federal Register
Bush, George, 1924-
1990-02-20
-
Role of Military Working Dogs in Low Intensity Conflict
"The purpose of this paper is to examine the current military working dog (MWD) program, its historical roots, and the possibility for expansion of the program in future. Current service MWD programs will be discussed, as well as possible models for change. The primary focus of this paper will be on the potential roles that MWDs perform in helping the United States-armed forces and those of our friends a allies engaged in low intensity conflict situations/environments. It must a be kept in mind, that as our service manpower end strengths decline, our military missions will remain. This requires careful examination of all resources and combat multipliers available, to include MWDs."
Army-Air Force Center for Low Intensity Conflict (U.S.)
Thornton, William H.
1990-02
-
Health Evaluation Report 86-138-2017; Memphis Fire Department Memphis, Tennessee
"In November, 1985, the International Association of Fire Fighters (IAFF) requested assistance from the National Institute for Occupational Safety and Health (NIOSH) on behalf of their Local 1784 in Memphis, Tennessee to conduct a Health Hazard Evaluation (HHE) at the Memphis Fire Department (MFD). The request concerned the hearing levels and noise exposures of fire fighters who were assigned to two fire stations serving the Memphis International Airport. There was concern that these fire fighters were at a greater risk of accruing hearing loss because of the addition of aircraft noise to their occupational noise exposures. The city of Memphis and the MFD also requested NIOSH to investigate other fire stations in Memphis, not influenced by the airport, for noise exposures and hearing ability among more of the fire fighters."
Centers for Disease Control and Prevention (U.S.); National Institute for Occupational Safety and Health
Tubbs, Randy L. (Randy Lloyd)
1990-02
-
Hazardous Materials: Inadequate Safeguards Over Sales Pose Health and Environmental Dangers, Report to Congressional Requesters
"The Department of Defense (DoD) and the General Services Administration (GSA) have sold hazardous materials to buyers who have improperly stored and/or used them, creating potential dangers to humans and the environment. As a result of the recent discoveries of improperly stored hazardous materials in California, the Chairman, Subcommittee on Environment, Energy, and Natural Resources, House Committee on Government Operations, and the Chairman, Subcommittee on Legislative, House Committee on Appropriations, requested that GAO determine whether DoD and GSA were ensuring that hazardous materials were sold only to buyers that could properly transport, handle, use, store, and, if necessary, dispose of the materials as hazardous waste."
United States. Government Accountability Office
1990-02
-
S. Rept. 101-236: Oversight Over Intelligence Activities, Report, January 29, 1990
"The Committee feels it is important to enhance the public's confidence in U.S. Intelligence oversight through a comprehensive proves of Congressional oversight of the Intelligence Community's activities. Since so much of our work is conducted in secret, the job of reporting to the Senate and the nation is far more difficult than is the task of other oversight committees of the Congress. The Committee continued to increase its oversight activities during the 99th Congress, ending the year with the preliminary investigation into the Iran-Contra affair. These 47 hearings consumed 103 hours. The Committee then issued its unclassified report entitled 'Preliminary Investigation into the Sale of Arms to Iran and Possible Diversion of Funds to the Nicaraguan Resistance' during the 100th Congress. Two unclassified reports were also published during the 99th Congress. The first, dealing with counterintelligence, was entitled 'Meeting the Espionage Challenge'; the second covered the special events in the Philippines and was called 'Crisis in the Philippines'. The following pages go into some detail on the primary issues that came before the Committee during the two years of the 99th Congress."
United States. Government Printing Office
1990-01-29
-
Executive Order 12699: Seismic Safety of Federal and Federally Assisted or Regulated New Building Construction
"The purposes of these requirements are to reduce risks to the lives of occupants of buildings owned by the Federal Government and to persons who would be affected by the failures of Federal buildings in earthquakes, to improve the capability of essential Federal buildings to function during or after an earthquake, and to reduce earthquake losses of public buildings, all in a cost-effective manner. A building means any structure, fully or partially enclosed, used or intended for sheltering persons or property."
United States. Office of the Federal Register
Bush, George, 1924-
1990-01-05
-
U.S. Chemical Defense and the Third-World Threat
"This monograph discusses the United States Army's chemical defense posture in relation to the chemical warfare threat in the third-world. It seeks to determine if current U.S. chemical defense tactical doctrine is adequate to counter the expected threat, and practiced enough to develop proficient execution in the field. Following an overview of chemical warfare, the study reviews th e current chemical threat focusing on the third-world. It explores availability, proliferation, acquisition and development, means of employment, and factors limiting employment. After a discussion of U.S. chemical defense doctrine, the paper posits three scenarios of chemical use against Army forces in three environments: the jungles of Honduras, the desert plains of Lebanon, and the mountain passes of Korea. The study finds that the chemical threat in a jungle environment will be low, that in the mideast low to medium, and that in Korea high. Yet, in each of these third-world locations, regardless of the threat of use the probability of use, is not great. It argues that throughout military history chemical warfare has never lived up to its promise, and has never been tactically decisive. The paper concludes that the combination of the viable U.S. chemical defense doctrine with the non-decisive nature of tactical chemical weapons reduces the impact of battlefield chemicals, and that improved training will ensure this result."
U.S. Army Command and General Staff College. School of Advanced Military Studies
Schillare, Quentin W.
1990-01-04
-
Robert T. Stafford Disaster Relief and Emergency Assistance Act, Public Law 93-288, As Amended by Public Law 100-707 [Presentation]
This presentation from FEMA outlines the key features of Public Law 93-288 which provided the authority for the Federal government to respond to disasters and emergencies in order to provide assistance to save lives and protect public health, safety, and property.
United States. Federal Emergency Management Agency
1990
-
Operating Policies and Procedures Memorandum No. 90-5, (1) Applications Which Require Establishing Good Moral Character; and, (2) Filing Appeal Briefs in Detained Cases
"Pursuant to 8 C.F.R. §3.29, Filing Documents and Applications, all applications must be filed with the 0ffice of the Immigration Judge (OIJ) having administrative control over the Record of Proceeding (ROP) and . be accompanied by a fee receipt if applicable. […] In addition to the Immigration Judge's authority contained in 8 C.F.R. §3.29 to set and extend time limits for filing applications, this Operating Policies and Procedures Memorandum provides that where an application is filed by a respondent/applicant that requires establishing good moral character, the Immigration Judge may set and extend time limits for the completion of background investigation (s) or processing of the G-325 by the government."
United States. Department of Justice. Executive Office for Immigration Review
1990
-
Patterns of Global Terrorism: 1990
"The continuing decline in the number of international terrorist incidents during 1990 is encouraging. From a peak of 856 in 1988, the number of incidents decreased to 455 in 1990. Even more encouraging are the increasing counterterrorist cooperation among governments and our numerous successes in bringing the rule of law to bear on terrorists. As part of our overall counterterrorist strategy, the United States works with other governments to identify, apprehend, and prosecute terrorists. Many terrorist trials were successfully completed in 1990, and many more cases are still in progress. Through training provided under the Department of State's Anti-Terrorism Training Assistance Program, we have improved the ability of other governments to preempt, or to investigate and prosecute, terrorist attacks. The program has been extremely successful, and in 1990 for the first time law enforcement officials from the newly democratic East European states participated. Another important element of our counterterrorist effort, the Rewards for Terrorism Information Program, received a significant boost in 1990. This program provides rewards for information that leads to the 'prevention, frustration, or favorable resolution of terrorist acts against US persons or properties overseas.' Late in 1989, Congress increased the ceiling for an individual reward to $2 million. Rewards of more than $500,000 have been paid under this program. In 1990, the Air Transport Association (ATA) and the Air Line Pilots' Association (ALPA) matched the reward ceiling with $2 million to create a potential $4 million reward for information about attacks on civil aviation."
United States. Department of State
1990
-
Tri-State Hurricane Property Loss and Contingency Planning Study Phase II: Executive Summary and Technical Data Report
This report presents the results of the Phase II of a two-phase program designed to demonstrate the effectiveness of various property damage mitigation measures from such storms along the central Gulf coast. This Phase II study was designed to assist local planners and decision makers with preparing local mitigation plans for their areas so that future damages to public and private property can be greatly reduced. The full report from phase I of this study series is also available on LLIS.gov.
United States. Army. Corps of Engineers
1990-01
-
Statistical Report United States Attorneys Office: Fiscal Year 1990
The charts and tables presented in this report reflect a statistical summary of the matters and cases handled by the United States Attorneys for fiscal year 1990.
Executive Office for U.S. Attorneys
1990?
-
Scientific Evidence in Courts-Martial: From the General Acceptance Standard to the Relevancy Approach
In courts-martial today, the use of a wide variety of scientific evidence has become routine. Counsel for either side may offer fingerprint or blood type evidence to indicate identity. Trial counsel use chemical analysis of blood or urine to prove recent drug use or intoxication. Behavioral analysis of victims is presented routinely as evidence of rape trauma or battered child syndrome. Truthfulness, or the lack thereof, theoretically can be demonstrated by polygraph examinations. The use of other newer types of scientific evidence someday may become just as routine. Apparently, scientists can now provide identity to nearly a mathematical certainty using DNA analysis. The use of radioimmunoassay analysis of hair suggests that drug usage can be detected for months, even years, after ingestion. As science advances, ever more creative means of producing evidence undoubtedly will be developed. In recent years the standard for the admissibility of scientific evidence in courts-martial has undergone significant change. This change can be described as the replacement of the general acceptance standard with the relevancy approach. The purpose of this article is to examine the development and acceptance of the relevancy approach in the federal and military courts, analyze its meaning, and attempt to provide a working model for its application in courts-martial. However, before turning to that approach an understanding of its predecessor, the general acceptance standard, is necessary. The underlying rationale for the general acceptance theory remains a consideration under the relevancy approach
Judge Advocate General's Legal Center and School (United States. Army)
Schmitt, Michael N.; Hatfield, Steven Arnold
1990
-
National Center for Post-Traumatic Stress Disorder: PTSD Research Quarterly [Spring 1990]
"Our inaugural issue of the PTSD [Post-Traumatic Stress Disorder] Research Quarterly contains an overview of articles that appeared during 1989. In this regard, it differs somewhat from future issues, which will focus on specific topic areas such as theory, biology, epidemiology, assessment/diagnosis, treatment, cross-cultural issues, and risk factors. Editorial choices were based largely on scientific merit, but other factors, such as an article's interest to the field, also influenced selection. In some cases we have included descriptive and clinical papers on important questions that we hope will be addressed rigorously in future research protocols. The 18 papers from 1989 abstracted in the following pages demonstrate the breadth and diversity of recent PTSD publications. In addition, we present (on pages 5-7) an additional 27 citations, as an annotated bibliography that should also interest our readers."
National Center for Post-Traumatic Stress Disorder (U.S.)
Friedman, Matthew J.
1990
-
Biological Aspects of PTSD: Laboratory and Clinical Research
"All research reviewed in this issue of the PTSD [Post-Traumatic Stress Disorder] Research Quarterly concerns laboratory and clinical findings on biological aspects of PTSD. In addition to abstracts and citations of peer-reviewed articles published since 1988, we have included citations of important papers presented at national scientific meetings during the past year. While recognizing the considerable difference between peer-reviewed and other data, we believe that PTSD researchers may benefit from our publicizing selected unpublished results. Because the 41 selected abstracts and citations are listed separately and because both lists are alphabetized, designated abstracts will be indicated by 'A' (e.g., van der Kolk et al., A), whereas citations will be indicated by 'C' (e.g., Kudler et al., C). [...] We conclude by citing three additional drug trials of interest. Famularo et al. (A) demonstrated the efficacy of propanolol with an off-on-off design in 11 children with PTSD. Wolf et al. (C) reported on two successful open trials of the anticonvulsant carbamazepine in combat veterans with PTSD and related those results to the kindling hypothesis of PTSD, and McDougle et al. (C) presented data on a successful open trial of fluoxetine, noting that global improvement was especially related to reduction of PTSD avoidant symptoms."
National Center for Post-Traumatic Stress Disorder (U.S.)
Schnurr, Paula P.; Friedman, Matthew J.
1990