Advanced search Help
Clear all search criteria
Only 2/3! You are seeing results from the Public Collection, not the complete Full Collection. Sign in to search everything (see eligibility).
-
America's War on Drugs: Who's Winning?
Recently, Congress, the literary community, and the public at large have come to reconsider the war on drugs. There are many opinions regarding alternatives to this pseudo war or new measures to be taken in the war effort, but the ongoing effort itself has escaped evaluation (to determine if the United States is winning this campaign). The intent of this thesis, then, is to explore the objectives of the war on drugs, and to determine if America is winning. This work concludes that the current drug war is failing. The emphasis (supply or demand) and the methodology (interdiction, etc.) need to be reconsidered; and, a new plan which has the support of political and enforcement leadership must be made--its objectives should be made clear, and its goals should be meaningful, measureable and achieveable.
Naval Postgraduate School (U.S.)
Diaz, Mary Lu A.
1995-12
-
Nuclear Proliferation from the Former Soviet Union and the Effects of U. S. Economic Incentives
This paper examines the United States' role in stemming nuclear proliferation from the states of the Former Soviet Union. Proliferation from the FSU is a critical danger to the world. Because of the breakdown of many of the security structures within the FSU which formerly ensured the safety of their weapons of mass destruction (WMD) and related material, the danger is very real. The implementation of the START treaties has also generated a great deal of excess fissile material. Because of the economic conditions in the FSU, there is rising crime concerning the sale and distribution of this material. Finally, this paper examines the U.S. role in decreasing the danger of nuclear catastrophe caused by the lack of control. The primary force used in this effort is the Cooperative Threat Reduction Act (CTR) - better know as the Nunn-Lugar Program - which was initiated in 1991 immediately after the failed coup attempt in Moscow. The paper examines in broad scope the types of efforts that CTR supports and gives examples of how that money is being spent. The paper takes the position that the CTR is extremely important to the vital interests of the United States. Recommendations are then given to enhance this vital program.
Army War College (U.S.)
Zimmerman, Craig L.
1996
-
Afghanistan: Russian Embassy Official Claims Iran Interfering more than Pakistan, November 30, 1995
"According to an unnamed official at the Russian Embassy in Pakistan, the Pakistani government continues to provide the Taliban with 'modest financial assistance,' logistics support, fuel, military training and chooses to ignore a 'booming smuggling trade - mostly electronics,' that creates huge profits for the Taliban. In spite of this support from Pakistan, the source claims the Taliban's funding mostly comes from Afghan traders and that aid from Pakistan to the Taliban is much more conservative than aid from Iran to the Rabbani government."
United States. Department of State
1995-11-30
-
Information Age Terrorism: Toward Cyberterror
The growing ubiquity of computers and their associated networks is propelling the world into the information age. Computers may revolutionize terrorism in the same manner that they have revolutionized everyday life. Terrorism in the information age will consist of conventional terrorism, in which classic weapons (explosives, guns, etc.) will be used to destroy property and kill victims in the physical world; technoterrorism, in which classic weapons will be used to destroy infrastructure targets and cause a disruption in cyberspace; and cyberterrorism, where new weapons (malicious software, electromagnetic and micowave weapons) will operate to destroy data in cyberspace to cause a disruption in the physical world. The advent of cyberterrorism may force a shift in the definition of terrorism to include both disruption and violence in cyberspace in the same manner as physical destruction and violence. Through the use of new technology, terrorist groups may have fewer members, yet still have a global reach. The increasing power of computers may lower the threshold of state sponsorship to a point where poor states can become sponsors and rich states are no longer necessary for terrorist groups to carry out complex attacks. This thesis explores the shift toward information warfare across the conflict spectrum and its implications for terrorism. By examining the similarities and differences with past conventional terrorism, policymakers will be able to place information age terrorism into a known framework and begin to address the problem.
Naval Postgraduate School (U.S.)
Littleton, Matthew J.
1995-12
-
Training Guide for Hate Crime Data Collection
"The material in this training guide is intended to assist law enforcement agencies in the task of establishing a hate crime training program for their personnel. It provides suggested model reporting procedures, as well as training aids for sensitizing street officers to the hate crime problem. Further training material can be obtained from the organizations listed in Appendix A, captioned 'Organizations Offering Information Concerning Anti-Bias Education.' Assistance in these matters may also be requested from the nearest regional office of the Community Relations Service (CRS) of the Department of Justice (DOJ). (See Appendix D for list of regional CRS/DOJ offices.)"
United States. Federal Bureau of Investigation. Criminal Justice Information Services Division
1996
-
Test and Evaluation Plan for Screener Proficiency Evaluation and Reporting System (SPEARS) Threat Image Projection
"This document is the Test and Evaluation Plan (TEP) to evaluate the effectiveness of the threat image projection training and testing component of the Screener Proficiency Evaluation and Reporting System (SPEARS). This TEP is for the test and evaluation of the EG&G Astrophysics Linescan Training and Testing (TnT) system and will focus on determining its effectiveness in meeting the requirements set forth in the Critical Operational Issues and Criteria and Critical Technical Issues and Criteria provided by the Federal Aviation Administration. The test and evaluation will be conducted at the Los Anqeles International Airport. The results will be analyzed and become part of a later document."
United States. Federal Aviation Administration
Fobes, J. L.; McAnulty, D. Michael
1995-12
-
United States Department of State: Congressional Presentation for Foreign Operations, Fiscal Year 1997
"Following World War II, America chose a path of engagement, which made possible the construction of a more secure, democratic, and prosperous world. Standing on its principles and learning from past mistakes, America prevailed in the face of the formidable communist threat. To meet the challenges of the next century and to build an even safer world for our children, we must plot a similar course marked by vision and steadfastness of purpose. Just as American leadership was critical to global peace, stability, and economic progress in the twentieth century, it will remain so in the twenty-first. Our leadership is likely to be even more relevant in the new information age as our world becomes even smaller and more interdependent. In this era of new challenges and opportunities, our security and economic well-being will depend on global events and trends which we can choose to lead or to follow. If we fail to exercise our leadership now, we will pay an enormous price later. Recently, American leadership has spurred major successes in places such as the New Independent States, the Middle East, Bosnia, Haiti, and South Africa. It has strengthened democracy, reduced the risk of nuclear proliferation, expanded world prosperity, and countered the threats of environmental degradation, unbridled population growth, drug trafficking, and terrorism."
United States. Department of State
1996
-
Criminal Acts against Civil Aviation, 1996
"'Criminal Acts Against Civil Aviation' is a publication of the Federal Aviation Administration's Office of Civil Aviation Security. This document has been published each year since 1986. 'Criminal Act' records incidents that have taken place against civil aviation aircraft and interests worldwide. Incidents are summarized in regional geographic overviews. Feature articles focus on case histories or on specific aviation-related issues. Incidents are also sorted into one of seven categories and compared over a five year period. In addition, charts and graphs are located throughout the publication to provide a visual display of what is being reported. The cutoff date for information to be included in this report is December 31, 1996. The information contained in this publication is derived from a variety of foreign and domestic sources. In many cases, however, specific details of a particular incident, especially those occurring outside the United States, may not be available. While the FAA makes every effort to provide complete and accurate information, it is not always possible to verify accounts of some incidents. The FAA maintains records of aircraft hijackings, bombing attacks, and other significant criminal acts against civil and general aviation interests worldwide, which are used to compile this report. Offenses such as these represent serious threats to aviation safety and, in those incidents involving U.S. air carriers or facilities outside the United States, are often intended as symbolic attacks against the United States. Hijacking and commandeering incidents are viewed within the context of the U.S. Federal criminal statute (49 USC 1472 (i)), which defines air piracy as any seizure or exercise of control, by force or violence or threat of force or violence, or by any other form of intimidation, and with wrongful intent, of any aircraft. This report does not distinguish between an act of air piracy and an attempted act of air piracy for statistical purposes."
United States. Transportation Security Administration
1996
-
Security for the Internet Protocol
"Lack of widely available security is hindering the growth of the Internet, particularly for commercial users. Two security mechanisms have been designed for use with IPv4 and IPv6. They are an integral component of the IPv6 design but can also optionally work with IPv4. The first mechanism provides source host authentication and information integrity protection without confidentiality and should be exportable and widely deployable. The second mechanism protects the confidentiality of packet contents through the use of encryption. Both mechanisms are designed to be independent of any particular cryptographic algorithm so that new algorithms can be supported in the future without any change to the basic protocols."
Naval Research Laboratory (U.S.)
Atkinson, Randall J.
1995-11-30
-
Planning for Disaster Debris
"This guide highlights the need for communities to plan for the cleanup of debris after a major natural disaster. Based on lessons learned from communities that have experienced such disasters, this guide contains information to help communities prepare for and recover more quickly from the increased solid waste generated by a natural disaster. […] Every year natural disasters, such as fires, floods, earthquakes, hurricanes, and tornadoes, challenge American communities. These natural disasters have generated large amounts of debris, causing considerable disposal challenges for local public officials. If you answer yes to any of the following questions, your community could benefit from the advice and information presented in this guide. […] In the past, debris from disasters was simply buried or burned in the community. As demonstrated by recent disasters, burying or burning debris as a means of waste management may not be acceptable. Citizens do not want to inhale the smoke from open burning. Municipalities do not want to risk contamination of drinking water and soil from uncontrolled burial of debris. Under normal circumstances, much municipal solid waste is recycled. The remainder is disposed of in sanitary landfills or in sophisticated combustors, both of which are equipped with devices to control pollutants. Often, however, these standard waste disposal options are not sufficient to handle the overwhelming amount of debris left after a disaster. Further adding to the disposal dilemma is the fact that many municipalities are reluctant to overburden or deplete their existing disposal capacity with disaster debris." This guide was updated in March 2008.
United States. Environmental Protection Agency
1995-12
-
New Germany and Nuclear Weapons: Options for the Future
"This article first explores the issue of whether German motivations for obtaining nuclear weapons in the future exist or may develop by discussing the historical background regarding German attitudes about nuclear policy - the past German motivations and resulting debates over obtaining nuclear weapons. Second, it examines possible motivations in terms of the changed security concerns brought by the end of the cold war. What are the various security scenarios and plausible options and, in turn, their related effects on German nuclear decisions? Third, this article analyzes the influence of nonsecurity motivations. These motivations may stem from German efforts at producing an integrated political and cultural identity (i.e., political community) as part of the ongoing unification process. Can these nonsecurity aspects also act as an impetus for German desires to become a nuclear power? Last, this article includes overall conclusions and possible policy implications for the United States and the US Air Force."
USAF Institute for National Security Studies
Gose, Mark N.
1996
-
Air Sampling Sensors, the Open Skies Treaty, and Verifying the Chemical Weapons Convention
This thesis examines a novel proposal to join two separate arms control measures to achieve unique counterproliferation benefits. The Open Skies Treaty (OST) is a confidence-building measure between the states of NATO and the former Warsaw Pact. It allows aircraft equipped with sensors to overfly neighboring countries to monitor security-related activities. The Chemical Weapons Convention (CWC) attempts to eliminate an entire category of weapons of mass destruction. It is verified through reporting procedures and on-site inspections. OST overflights could be used to verify the CWC, aiding CWC inspectors to plan their inspections. This cross-treaty measure could be enhanced further with the addition of air sampling sensors capable of testing for chemical weapons production, creating inter-treaty synergy. Once these two pacts enter into force and prove their efficacy for arms control, this proposal for inter-treaty coordination will receive more attention. Obstacles for this inter-treaty coordination include the lack of formal mechanisms in either treaty for a complementary role and the lack of political impetus to effect it. This coordination is a logical progression for arms control.
Naval Postgraduate School (U.S.)
Rowe, Gregory D.
1995-12
-
Research Paper: Temporary Migrants in the United States
Temporary migrants to the United States, known legally as non-immigrants, have grown in number and importance over the 1980s and 1990s. The Immigration Act of 1990 in particular instituted a number of changes that the U.S. Commission on Immigration Reform is evaluating for its final report to Congress in 1997. This volume represents a significant contribution to the fact-finding efforts undertaken by the Commission to understand the implementation and impact of these policies. Scholars and policymakers working in the immigration arena have long appreciated the complexity of the different categories of permanent admissions, but only now are they turning their attention to the oftentimes linked temporary system with its rather different complexities. In this volume, leading scholars examine the non-immigrant system's major visa categories for temporary workers and foreign students. The Commission solicited these authors' contributions to help the Commission identify major policy issues and their solutions. The introductory chapter summarizes the authors' observations and recommendations on a range of topics, from the overall system of non-immigrant admissions to the effects of specific visa categories on U.S. businesses and workers, as well as our universities and students. The chapters here, comprising one of the first collections of scholarly studies on the topic, offer considerable scope and a solid point of departure for policymakers evaluating the non-immigrant system.
U.S. Commission on Immigration Reform
Lowell, Briant Lindsay
1996
-
Patterns of Global Terrorism 1996: Asia Overview
Although terrorism remains a concern in East Asia, national reconciliation efforts in Cambodia and the Philippines, and successful prosecutions in Japan, have helped reduce the terrorist profile in the region. Continuing defections by Khmer Rouge troops in Cambodia have reduced their numbers considerably, although the Khmer Rouge is still considered active and dangerous. Talks between the Philippine Government and a major insurgent group there have resulted in a peace agreement, although another major insurgent group has continued attacks in the southern Philippines, and terrorist groups continue to plague that nation. In February the Philippines hosted an international conference on counterterrorism at Baguio, which was attended by representatives of 20 nations, including the United States. The prosecution of a series of leaders of the Aum Shinrikyo cult in Japan, based primarily on the 1995 sarin nerve gas attack in the Tokyo subway, and the continued pursuit of Aum leaders still at large have dealt a heavy blow to that group. Terrorist activities by the Free Papua Movement (OPM) in Indonesia and by insurgent groups in a number of East Asian countries continue to pose a threat. In South Asia, terrorist training camps located in Afghanistan remain open. The fate of the four Western hostages, who were kidnapped in July 1995 by Kashmiri militants believed to be associated with the Pakistan-based Harakat ul-Ansar (HUA), remains unknown. Reports from Kashmiri militant sources maintain that the hostages were killed in December 1995, although these reports have not been confirmed. In Sri Lanka, the Liberation Tigers of Tamil Eelam (LTTE) continued to carry out extremely violent attacks in its ongoing campaign to cripple the economy and target government officials. A truck bomb destroyed the Central Bank, killing some 90 persons and wounding hundreds more. A commuter train was bombed, and a bus was ambushed, killing more than 80. The LTTE continued to assassinate political opponents, both civilian and military. The Indian and Pakistani Governments each claim that the intelligence service of the other country sponsors bombings on its territory.
United States. Department of State
1996
-
International Terrorism In the Twenty-First Century
"The Cold War is over but international terrorism remains a threat across the globe and especially to the United States and its allies. When looking at the future of international terrorism, several key questions need to be answered. They are: Why won't the terrorist threat go away? Is terrorism truly a serious threat or just Western paranoia to maintain military and police budgets? Where should terrorist actions be expected and for what reasons? What will be the impact of terrorism on individual nation states and overall global stability? And finally, will peaceful resolution and responses to terrorism be possible or will anti-terrorism efforts merely begin another version of arms escalation, punitive actions, and repressive governmental endeavors? This chapter will explore the global role of terrorism in the twenty-first century, including anti-terrorism responses and the possible consequences to nation states when they respond to terrorist acts."
USAF Counterproliferation Center
Goldstein, Frank L., 1945-
1996
-
FBI and Domestic Counterterrorism: A Comparative Analysis
This thesis is an attempt to analyze the effectiveness of the Federal Bureau of Investigation (FBI) in countering domestic terrorism in comparison to other democracies. in the first chapter, there is an attempt to define terrorism by examining the historical development and early attempts at defining terrorism. The second chapter describes the history of the FBI and its early battles with domestic terrorists, including infringements up constitutional rights. The third chapter relates Israel's problems with domestic terrorism by outlining the professional development and tragic errors of the Shin Bet (Israel's domestic security service). Great Britain's attempts to crush the Irish Republican Army are the subject of the fourth chapter. The fifth chapter concludes by demonstrating that each country has sought to eliminate domestic terrorism but no matter what method is used; eventually, they are forced to negotiate with the terrorists.
Naval Postgraduate School (U.S.)
Fears, Karla P.
1995-12
-
United States National and Supporting Military Counterdrug Strategies: A History and Assessment
"The National Drug Control Strategy and supporting strategy of the Department of Defense guide the efforts the United States and the Services in counterdrug operations. This study examines the origins of the national strategy and how the supporting military strategy was developed to work within the framework produced by Presidents Bush and Clinton. It explores the degrees of success achieved over the eight years the two strategies have been in existence, proposes a focus on the economics of the drug source countries as the center of gravity in counterdrug strategies of the future, and offers considerations for how military strategy could more effectively complement national strategy."
Army War College (U.S.)
Stroberg, Jon E.
1996
-
Joint Transportation Rotorcraft (JTR): Its Contribution to Future Joint Warfare
"The Force XXI Army of the 21st Century will be composed of numerous mobile customers requiring frequent and near simultaneous servicing from limited inventories. Combine the new force with the expected greater velocity and asymmetry of the future battlespace and it becomes absolutely critical to move, redirect, and redistribute supplies at speeds never before envisioned. This study will explore the many contributions and efficiencies the JTR can bring to the future force."
Army War College (U.S.)
Burke, Donald S., Jr.
1996
-
Surprise Attack: The Case of the Yom-Kippur War
"The issue of strategic surprise and specially the subject of surprise attack are some of the most complex problems that policymakers, militaries and intelligence analysts have to face. This is particularly true for states such as Israel, as it was demonstrated during the Yom Kippur War in 1973. Israel was taken by surprise which effected the beginning of the war, as well as the final results. From the Israeli perspective the basic problem was rooted in the imbalance between the size of the Arab and the Israeli military and the asymmetry seen from a geographical perspective. The IDF (Israeli defense forces) is primarily based on reserve forces, whereas the Arab militaries are mainly active. Therefore the deployment of the Israeli reserves depends on early warning, a decision of mobilization and its execution. Moreover, Israel has no strategic depth and its vital objectives are very close to the borders. These factors indicate the significance of the surprise attack and the need for intelligence warning, as a fundamental issue in the national security doctrine."
Industrial College of the Armed Forces (U.S.)
Chorev, Moni
1996
-
Chokepoints: Maritime Economic Concerns in Southeast Asia
"To ensure unrestricted sea lines of communication (SLOCs) in Southeast Asia (SEA), the U.S. Navy is assigned the task of helping to maintain clear maritime passage through the sea lanes of the region. For many years, the prime concern was military, not economic, as the United States required secure maritime transport via SLOCs in case of war. Now the emphasis has shifted to the economic component of our national security, a policy reaffirmed when the United States announced it would not accept disruption of trade in the South China Sea. In March and again in May, 1995, Secretary of State Christopher warned quarreling claimants to the Spratly reefs not to interfere with international shipping. What is the economic logic behind the American stance on freedom of navigation for commercial shipping? For the U.S. a concern is: 'Who benefits from keeping sea lanes open, and how much do they benefit?' A related question is: 'Who would be hurt if the sea lanes were closed, and how much would it hurt them?'"
National Defense University. Institute for National Strategic Studies
Noer, John H.; Gregory, David
1996
-
Incident at Mischief Reef: Implications for the Philippines, China, and the United States
"The February 1995 Chinese occupation of the Philippine-claimed Mischief Reef in the South China Sea raised tensions throughout the region and heightened concern throughout much of the industrialized/maritime world. Instability or armed conflict in this key area, particularly involving the Republic of the Philippines, could affect important, if not vital, U.S. security and economic interests. This paper examines the implications of the Spratly Island Issue on U.S. interests in the South China Sea, emphasizing the U.S. bilateral treaty relationship with the Philippines. After briefly reviewing the historical background and the various players' probable intentions, several possible approaches are discussed that could reduce the likelihood of conflict and instability."
Army War College (U.S.)
Meyer, Stanley E.
1996
-
Dupe Checklist System: Resolution Procedures Manual
"The Resolution Procedures Manual is one of five security reference handbooks providing background information, guidelines and procedures regarding passenger questioning and resolutions in conjunction with the Dupe Checklist (DCS) Program. It is intended to be used for operational guidance and/or training activities. A passenger may be duped into carrying a bomb on board an aircraft under the following circumstances: (1) A bomb is placed in an unsuspecting passenger's unattended baggage; (2) An unsuspecting passenger is given a bag to transport on his/her flight. A bomb is concealed inside the bag; (3) An unsuspecting passenger is given an item or a package to transport on his/ her flight. The item/package contains a bomb: (4) An unsuspecting passenger is given a 'gift' just prior to the flight. The gift contains a bomb; (5) A passenger may believe that he/she is involved in some type of illegal activity. Such a passenger may believe that his/her bag contains contraband (e.g. drugs, gold, cash, or diamonds). The passenger is not aware of the true contents of his/her bag (a bomb); (6) A passenger who is a terrorist, or a terrorist group sympathizer, may believe he/she is transferring confidential material or an explosive to his/her destination. In reality the passenger is carrying a bomb setup to go off on his/her flight."
United States. Federal Aviation Administration
Fobes, J. L.
1995-12
-
Electromagnetic Bomb - a Weapon of Electrical Mass Destruction
"High Power Electromagnetic Pulse generation techniques and High Power Microwave technology have matured to the point where practical E-bombs (Electromagnetic bombs) are becoming technically feasible, with new applications in both Strategic and Tactical Information Warfare. The development of conventional E-bomb devices allows their use in non-nuclear confrontations. This paper discusses aspects of the technology base, weapon delivery techniques and proposes a doctrinal foundation for the use of such devices in warhead and bomb applications."
United States. Department of the Air Force
Kopp, Carlo
1996
-
Managing Innovation in Policing: The Untapped Potential of the Middle Manager
"Although conventional management thinking assumes that middle managers will subvert organizational strategic change, the power and responsibility to convert leaders words to organizational deeds place great innovation challenges in middle managers bailiwick. Whether middle managers are part of the problem or part of the solution is being tested by police agencies that have recently embraced community policing and problem solving as operating strategies. At issue is whether a critical mass of police middle managers can contribute productively so that strategic changes called for by chiefs to implement community policing permeate deeply and enduringly in the organization. A new book, prepared under a National Institute of Justice grant, concludes that middle managements power to affect change can be harnessed to advance community policing objectives by including those managers in planning, acknowledging their legitimate self-interests, and motivating their investment in long-range solutions that enhance community safety and security."
National Institute of Justice (U.S.)
1995-12
-
Future Role and Structure of the Force XXI National Guard
"Preparation of the ground force build-up prior to DESERT STORM revealed severe deficiencies in National Guard 'Roundout' brigades training readiness. None of the three brigades which underwent an intensive 180 day train up were declared 'combat ready' prior to the outbreak of hostilities. This paper reviews the causes for the failure of National Guard maneuver brigades to maintain their training proficiency. It examines whether or not the policy of fielding combat National Guard brigade size units is realistic given the performance expectations of Force XXI. The paper outlines possible solutions which allows the National Guard to continue to play a valuable role in our nation's defense and at the same time fulfill an historic position within our country's citizenry."
Army War College (U.S.)
Hooper, Travis L.
1996
-
Construction Information for a Stronger Home
This Federal Emergency Management Agency [FEMA] report offers information on constructing a home to withstand natural disasters.
United States. Federal Emergency Management Agency
Ekroth, David C.; Rowbethaum, Jeff; Bornman, Charles
1995-12
-
Recording and Coding Guide for the Structure Inventory and Appraisal of the Nation's Bridges
"This Guide has been prepared for use by the States, Federal and other agencies in recording and coding the data elements that will comprise the National Bridge Inventory data base. By having a complete and thorough inventory, an accurate report can be made to the Congress on the number and state of the Nation's bridges. The Guide also provides the data necessary for the Federal Highway Administration (FHWA) and the Military Traffic Management Command to identify and classify the Strategic Highway Corridor Network and it's connectors for defense purposes. The coded items in this Guide are considered to be an integral part of the data base that can be used to meet several Federal reporting requirements, as well as part of the States' needs. These requirements are set forth in the National Bridge Inspection Standards (23 CFR 650.3) which are included as Appendix C. A complete, thorough, accurate, and compatible data base is the foundation of an effective bridge management system. Reports submitted in connection with the Highway Bridge Replacement and Rehabilitation Program and the National Bridge Inspection Program also are related to this Guide."
United States. Federal Highway Administration
1995-12
-
Proposed Deployment of United States Armed Forces into Bosnia: Memorandum Opinion for the Counsel to the President [November 30, 1995]
"This is to provide you with our analysis of whether the President, acting without specific statutory authorization, lawfully may introduce United States ground troops into Bosnia and Herzegovina ('Bosnia') to help the North Atlantic Treaty Organization ('NATO') ensure compliance with the recently negotiated peace agreement. We believe that the President may act unilaterally in the circumstances here."
United States. Department of Justice. Office of Legal Counsel
1995-11-30
-
Russian Views on Information-Based Warfare
Article attempts to define the Russian understanding of the term "information warfare" and explores the impact of the information revolution on the Russian military. Like the US, the Russian army is still discussing terminology, concepts, and policy, and has no authoritative definitions or doctrine to offer the international community. In fact, until it catches up with the West in the information technology arena, Russia may be content to use the nuclear deterrent to offset the possibility of anyone using an information operation against it. Such an option is dangerous for everyone. This article has one caveat. The Russian military officers who have openly addressed the subject of the military's information revolution do not official represent the Russian Ministry of Defense or General Staff. Therefore, this study avoids the phrase "the Russian military thinks" since it cites individual military or civilian analysts. The article presents a general outline of the Russian view of information warfare through the writings of various military and civilian figures. Author asserts that one of the easiest ways for the West to begin joint talks on information warfare with Russia is through the medium of a conference among academics or through an unofficial organization or club, such as Russia's International Information Academy.
United States. Department of the Air Force
Thomas, Timothy L.
1996
-
Public Law 104-58: Alaska Power Administration Asset Sale and Termination Act
"An Act to authorize and direct the Secretary of Energy to sell the Alaska Power Administration, and to authorize the export of Alaska North Slope crude oil, and for other purposes."
United States. Government Printing Office
1995-11-28