Advanced search Help
Clear all search criteria
Only 2/3! You are seeing results from the Public Collection, not the complete Full Collection. Sign in to search everything (see eligibility).
-
Suspect Letter and Package Indicators
This document is a diagram from Bureau of Alcohol, Tobacco, and Firearms providing guidance on how to identify suspect letters and packages for explosive devices.
United States. Bureau of Alcohol, Tobacco, and Firearms
1995-06
-
Weapons of Mass Destruction: Reducing the Threat From the Former Soviet Union: An Update
"As you know, Congress has had an ongoing interest in the effectiveness of U.S. efforts to reduce the threat posed by weapons of mass destruction in the former Soviet Union (FSU). In response to your requests, we have assessed the Cooperative Threat Reduction (CTR) program's planning and funding status and recent progress in addressing CTR objectives in the FSU, that is, the safe and secure elimination of nuclear, chemical, and other weapons of mass destruction (including missiles and other strategic delivery vehicles); improving controls over nuclear weapons and materials; and promoting demilitarization projects."
United States. General Accounting Office
1995-06
-
Handling Critical System Requirements in Adaptive Systems
"Computer systems implementing mission-critical applications typically must be capable of adapting to and responding to events and changes in the operational environment. To accomplish this, a system often will have to make dynamic tradeoffs in meeting its various and often conflicting objectives: for example, security and availability. In this final report, we describe a general framework within which multiple critical system properties can be specified, multiple requirements can be jointly considered, and conflicts can be resolved. We give examples to illustrate how the framework can be useful, and suggest future work on the application of the framework."
Rome Laboratory (Griffiss Air Force Base, N.Y.)
Gong, Li; Lunt, Teresa
1995-06
-
Research Advances in Handling Adaptive Security
"Static computer security policies may sometimes be inadequate for two reasons: (1) the high-level objectives of the security policy, and the approach to enforcing that policy, may change over time; and (2) the computer system itself may change its structure or configuration. The goal of this project was to study dynamic security that takes into account these two kinds of changes. The report gives the results of our study of these issues. We address the fundamental conflict between functionality and security that arises when the security policy must change dynamically. We suggest mechanisms for implementing dynamic security policies, and methods for analyzing the consequences (dynamic lattices). We introduce task-based dynamic policies. We present a foundational model of need-to-know. For systems that must adapt and change their configurations dynamically, we identify a way of decomposing an adaptive system that provides a systematic way of analyzing its security and ensuring that security is maintained after and during adaptations. We describe a method for performing security risk analysis of an adaptive system. We sketch a way of providing tool support for the risk analysis."
Rome Laboratory (Griffiss Air Force Base, N.Y.)
Hird, Geoffrey R.; McCullough, Daryl; Brackin, Stephen
1995-06
-
Profile Series Peru: Human Rights and Political Developments through December 1994
"Peru is a country experiencing profound economic and political transition. Of the calamities that may befall a nation, Peru has suffered a disproportionate share over the past fifteen years, falling victim to a cycle of political upheaval and economic disruption. More than half of the population suffers extreme poverty. Fourteen years of political violence have taken over 20,000 lives, caused billions of dollars in material damage, and displaced more than half a million people. A cholera epidemic has killed thousands of Peruvians since 1991. Peru has been labeled one of the poorest and most violent nations in South America. Since 1980, successive Peruvian governments have fought a brutal war againsSt endero Luminoso (Shining Path), a violent, self-proclaimed Marxist movement which seeks to overthrow the government. In the course of the conflict, both the guerrillas and government security forces have committed grave violations of human rights. Sendero has employed both targeted and indiscriminate violence to terrorize the government and the population. Despite the September 1992 capture of Sendero's leader, Abimael Guzmán, the guerrillas continue to carry out attacks, though at a significantly reduced level. […], Nevertheless, disturbing levels of violence persist, with the government demonstrating greater willingness to sacrifice the rights to due process and civil liberties of citizens -- and to tolerate abuses committed against them by security forces -- in order to advance its military and related political objectives. Despite these apparent improvements, Peruvians continue to suffer one of the worst situations of political violence in the hemisphere."
United States. Immigration and Naturalization Service; INS Resource Information Center
1995-06
-
Motivations for Nuclear Terrorism in the United States
The demise of bipolarity created new security concerns for the United States. Terrorism now thrives in the new world environment. While much has been written on terrorism, the specter of nuclear terrorism in the United States has received little attention. Nuclear terrorism cannot be looked at through the traditional nuclear weapons paradigm nor can it be viewed within the confines
of traditional terrorism paradigm. There are currently two perspectives of nuclear terrorism: the optimists, who do not see it as a threat, and the pessimists, who see it as inevitable. Each view has its merits but neither alone can explain this security concern. Merging of the two views is required
to understand the motivational considerations behind this potentially horrific problem. A brief history of U.S. policies on nuclear weapons and terrorism is offered to explain why there has not been a U.S. policy on nuclear terrorism. A better understanding of the nuclear terrorist mindset is required if effective policies are to be developed.
Naval Postgraduate School (U.S.)
DiPaolo, Peter Joseph
1995-06
-
Vigilant and Invincible
'Vigilant and Invincible' was the motto of the U.S. Army Air Defense Command, or ARADCOM. From the first deployment of World War II-vintage antiaircraft guns in 1950 to the inactivation of the last NIKE HERCULES missile system in 1974, ARADCOM provided a deterrent to the Soviet strategic bomber threat for the U.S. homeland. During this period, the Army built, operated, improved and then dismantled a vast network of defenses. These defenses protected the nation's capital, key industrial areas, ports, atomic weapon production facilities and Strategic Air Command (SAC) bases from air attack. World War II generated a tremendous leap in military technology, especially in strategic bombers, air-breathing missiles like the German V-I, ballistic missiles like the German V-2, jet-powered airplanes and atomic bombs. These advances in technology, combined with the Soviet Union's threat of world domination in the post-war years, caused the United States to take action to prevent yet another war this century. And if deterrence failed, the objective was to limit the damage to its citizenry and war-making capability. During the final months of World War II, several major defense contractors studied the likelihood that evolving technologies could produce guided missiles to intercept bombers and surface-to-surface missiles. One of these projects, called NIKE after the Greek goddess of victory, would grow to a full deployment of more than 240 missile sites in the United States. Operating these sites were nearly 45,000 active duty and National Guard soldiers. ARADCOM controlled these missiles and antiaircraft guns and a vast network of command centers to communicate with them. This research will view ARADCOM in the light of various threats, and also of national and military events of the times. Threat-wise, the Soviet Union dominated the scene; its bombers and ballistic missiles.
U.S. Army Space and Missile Defense Command
Moeller, Stephen P.
1995-06
-
Canada, Getting It Right This Time: The 1994 Defence White Paper
The author of this paper argues that Canadian defense policy and strategy traditionally have been made in "times of penury." During the Cold War, Canadian policy was one of "strategy of commitment," and since the end of the Cold War, that policy, a "strategy of choice" as set forth in the 1994 Defence White Paper, seeks to provide a role for defense which more closely matches commitments with capabilities.
Army War College (U.S.). Strategic Studies Institute
Sokolsky, Joel J., 1953-
1995-05-31
-
Japanese Maritime Defense Capability in the Post Cold War Era
"This thesis analyzes the defense capability of Japan Maritime Self-Defense Force (JMSDF) in the post-Cold War era. The primary research question is: 'What changes will and should be expected for JMSDF after the collapse of the former Soviet Union?' To answer this question, I reviewed the defense capability buildup program during Cold-War, and made briefly analyzed the relationships among the Asian- Pacific countries, including U.S. Pacific forces and Russia. I also conducted a cost/benefit and personnel analysis of the current fleet configuration and a proposed new configuration. These alternatives may require drastic changes in public attitudes based on serious discussions among the Japanese people and politicians, and a tighter Japan-U.S. relationship on both economic issues and national security burden sharing."
Naval Postgraduate School (U.S.)
Sakagami, Syojiro
1995-06
-
Competition and Conflict: Water Management in the Jordan River Basin
With the end of the Cold War, and the predictability of bi-polar power arrangements, the shape of global security will be required to change to face the emerging threats of the future. Changes to the global environment, through pollution, unrestrained population growth, and over-exploitation of existing resources, will be among these future threats. Regional security arrangements will be essential to controlling these threats, which know no territorial boundaries. It is the threat of conflict over water, in areas of scarce supply and surging populations, that forms the framework of analysis for this paper. One area in particular, the Jordan River basin, on the western Arabian Peninsula, is one of the most arid, populated regions on earth. Since the partitioning of the Arabian Peninsula, and the inclusion of a Jewish homeland in Palestine, this region has experienced conflict over water. This paper examines the situation in the region in terms of historical conflict over water, past attempts to manage supplies on a regional basis, and possible solutions to mitigate the potential for future conflict.
Naval Postgraduate School (U.S.)
Hill, Mary P.
1995-06
-
Examination of the Stabilized Rate Setting Process Within the Defense Business Operations Fund
"The Defense Business Operations Fund (DBOF) utilizes a system to stabilized rates in order to facilitate orderly budget planning and execution by DBOF customers. This thesis examines the process of rate setting. Data from a number of budget years is examined in order to analyze the fluctuation pattern of the rates from year to year. The extent of the fluctuation and their underlying causes will be addressed. Background information includes an explanation of DBOF, how it operates, the activities that it encompasses, as well as its strengths and weaknesses."
Naval Postgraduate School (U.S.)
Friend, Gregory C.
1995-06
-
Is Counterproliferation Compatible with Nonproliferation? Rethinking the Defense Counterproliferation Initiative
"This thesis examines the compatibility of the Defense Counterproliferation Initiative (CPI) with the nuclear nonproliferation regime. The idea of using military means to combat the acquisition and use of weapons of mass destruction by regional adversaries has created controversy from its inception. Skeptics worried that counterproliferation would undermine nonproliferation, rather than enhance it as the Defense Department claimed. This research examines how counterproliferation affects the various treaties and policies that make up the nonproliferation regime. Then, it examines each element of the CPI, considering its purpose, progress made to date, and the operational limitations which are already coming to light. Finally, and most importantly, it examines the tensions which counterproliferation has created, not only with nonproliferation, but for U.S. foreign policy as a whole. It concludes that counterproliferation is compatible with nonproliferation and provides recommendations to help provide the United States with the military means to combat proliferation, while ensuring a strong and enduring nonproliferation regime."
Naval Postgraduate School (U.S.)
McColl, Angus A.
1995-06
-
National Security: Impact of China's Military Modernization in the Pacific Region, Report to Congressional Committees
"With the end of the Cold War, the Asia-Pacific region faces an uncertain security environment. China, once viewed as a counterweight to Soviet aggression, is now viewed as a country that aspires to fill the role of the leading regional power. China is pursuing long-range military modernization that emphasizes the upgrading of its air and naval power and a realignment of its force structure. These actions and China's lack of openness on military matters have raised questions about its intentions. GAO undertook a study of China's military modernization due to numerous, and often conflicting, reports of a military buildup in China. GAO's objectives during this study were to assess the nature and purpose of China's military modernization, and compare China's military modernization efforts with those of other Asian nations. GAO's work is intended to assist the Congress in decisions it faces concerning China and the region. […] China has begun to modernize its military by acquiring some new weapon systems, restructuring its forces, and improving its training. Since 1989, the official Chinese defense budget increased annually at a double digit pace, but our analysis revealed that when adjusted for inflation there has been almost no real growth in the official defense budget. Major categories of defense spending, such as weapons acquisitions and research and development, however, are not part of the official budget."
United States. General Accounting Office
1995-06
-
Doctrine for Command, Control, Communications, and Computer (C4) Systems Support to Joint Operations
"This publication is the keystone document for the command, control, communications, and computer (C4) systems series of publications. Subordinate publications provide more detailed technical discussions of C4 systems. This publication identifies approved doctrine for C4 systems support to joint operations and outlines the responsibilities of Services, agencies, and combatant commands with respect to ensuring effective C4 support to commanders. It addresses how C4 systems support the commanders of joint forces in the conduct of joint operations, including, in general terms, how systems are to be configured, deployed, and employed. This document describes the role of command, control, communications, and computer (C4) systems; outlines the objectives and components; provides basic C4 systems principles; explains C4 systems configuration and infrastructure; discusses the planning process and employment responsibilities; outlines joint and multinational standardization and procedures; and covers the global C4 infrastructure."
United States. Joint Chiefs of Staff
1995-05-30
-
DoD Directive 3020.26: Continuity of Operations (COOP) Policy and Planning
This Directive updates responsibilities to ensure effective performance of critical DoD missions and continuation of mission-essential functions during emergencies.
United States. Department of Defense
1995-05-26
-
Amateur-built Aircraft and Ultralight Flight Testing Handbook
"This advisory circular (AC) sets forth suggestions and safety related recommendations to assist amateur and ultralight builders in developing individualized aircraft flight test plans. [...] This AC's purpose is the following: (1) To make amateur-built/ultralight aircraft pilots aware that test flying an aircraft is a critical undertaking, which should be approached with thorough planning, skill, and common sense. (2) To provide recommendations and suggestions that can be combined with other sources on test flying (e.g., the aircraft plan/kit manufacturer's flight testing instructions, other flight testing data). This will assist the amateur/ultralight owner to develop a detailed flight test plan, tailored for their aircraft and resources."
United States. Federal Aviation Administration
1995-05-24
-
Air Traffic Services in Operations Other Than War
Operations other than war are not new to Army Aviation or ATS. The mission may
be peacekeeping, nation assistance, support for insurgency and counterinsurgency, noncombatant evacuation, or humanitarian aid and disaster relief. Whatever the mission, complex situations are likely to occur. Operations other than war center on national assistance. Interagency or host-nation airspace control authorities should become self-supporting once these operations are successful.
United States. Department of the Army
1995-05-22
-
Critical Analysis of the I MEF Intelligence Performance in the 1991 Persian Gulf War
Prior to Desert Storm, the I MEF theoretical capability to conduct intelligence operations appeared considerable. Despite no doctrinal foundation, the newly established Surveillance, Reconnaissance, Intelligence Group (SRIG) seemed capable of providing commanders with credible combat support. By the beginning of Desert Storm, major CINC imposed restrictions, changes to the MEF operations plan, and an immaturely developed SRIG severely challenged MEF intelligence planners. Although the CINC had significantly relaxed pre-G-Day restrictions by the start of Desert Storm, some were still in place to hamper MEF intelligence operations. Also, manpower and systems support within the MEF G-2 and the CENTCOM J-2 Staff contributed to a debilitating dissemination bottleneck that existed throughout the campaign. Conclusion. I MEF did not have the doctrinal foundation and existing structure to effectively fulfill the intelligence needs of a reinforced MEF in a land campaign. Also, training, manning, systems support and other deficiencies contributed significantly to the MEF G-2's and the 1st SRIG's inability to effectively respond to the intelligence requirements of commanders at all levels. As a result of post war analysis, the Marine Corps plans to improve its intelligence apparatus by developing pertinent doctrine, enhancing educational opportunities, modernizing support systems and reshaping the manpower structure.
Marine Corps Command and Staff College (U.S.)
Coia, Raymond E.
1995-05-22
-
Use of Covert Paramilitary Activity as a Policy Tool: An Analysis of Operations Conducted by the United States Central Intelligence Agency, 1949-1951
Research Question: Was the return worth the investment for those covert paramilitary operations conducted by the United States Central Intelligence Agency at the outset of the Cold War? Discussion: This evaluation of covert paramilitary operations conducted by the CIA in the very early years of the Cold War period is a combination of pure cost-benefit analysis and a more subjective evaluation of return on investment. Included is a collection of brief case studies of OSS operations during World War II, for they established the precedence for conducting similar activity during the Cold War. There were significant differences, however, between the CIA's "operating environment" in the late 1940's and early 1950's and the wartime situation OSS officers operated within several years earlier. Success of post-war operations depended to a large degree on the ability of US policy officials and CIA paramilitary specialists to recognize the changes and adjust accordingly. Conclusions: From a pure cost-benefit perspective, covert paramilitary action conducted by the CIA between the end of World War II and the Korean conflict was a complete failure… Cost was not a factor, and US policy officials felt that the need to maintain some form of pressure on the Communists outweighed the risk of fallout from failed covert activity. Although individual covert paramilitary operations failed to achieve objectives, the cumulative effect was constant pressure on the Communist perimeter. These operations provided the CIA with a wealth of lessons learned, which paramilitary officers applied in subsequent successful paramilitary operations during the 1950's such as Guatemala and Iran.
Marine Corps Command and Staff College (U.S.)
Berger, D. H.
1995-05-22
-
Fiduciary Obligations Regarding Bureau of Prisons Commissary Fund: Memorandum for the Assistant Attorney General, Civil Division [May 22, 1995]
"Because the Randolph-Sheppard Memorandum mischaracterizes the Commissary Fund as a common law trust and suggests that, as trustee, the BOP has a fiduciary obligation to federal prison inmates to expend Commissary Fund income in accordance with the terms of the trust, see Randolph-Sheppard Memorandum at 4, 10, we disavow those aspects of the opinion which analyze the Commissary Fund under general trust law principles. Instead, for the reasons stated below, we conclude that 31 U.S.C. § 1321 and its accompanying Department of Justice ('DOJ') regulations do not impose a fiduciary obligation on the BOP to expend Commissary Fund moneys only in accordance with the terms of the Commissary Fund. Although we recognize that the trust fund analysis contained in our Sheppard-Randolph Memorandum was based to some degree on our interpretation of a memorandum attachment to a letter for Honorable Elmer B. Staats, Comptroller General of the United States, General Accounting Office, from Frank M. Wozencraft, Assistant Attorney General, Office of Legal Counsel, Re: Set-Offs Against Prisoners' Trust Funds (Aug. 23, 1968)('Prisoners' Trust Fund Memorandum'), we nonetheless reaffirm the analysis presented in the Prisoners' Trust Fund Memorandum. However, we limit the memorandum's applicability solely to those 'trust funds' established under 31 U.S.C. § 1321 that do impose fiduciary obligations on the United States."
United States. Department of Justice. Office of Legal Counsel
1995-05-22
-
USAF and Technological Asymmetry: A Critique of Current Air Power Theory and Doctrine
"This monograph examines the question of whether the United States Air Force (USAF) is too reliant upon technological asymmetry. It examines four possible paths to over-reliance and then surveys Air Force doctrine and air power theory. The study then assesses that doctrine and theory in light of potential over-reliance on technological asymmetry. The analysis shows that the USAF is over-reliant on technological asymmetry. The current air power theory and doctrine of strategic attack requires technology to replace some aspects of human decision making, technology to replace strategy (to a degree), the elimination of fog and friction, and certainty regarding enemy reactions in order to be effective. These assumptions, which are the foundation of the theory, require careful and rigorous examination - which the Air Force has not yet accomplished. Over-reliance on technological asymmetry raises fundamental concerns, and USAF thinkers must address these concerns in order to make the theory and doctrine truly viable."
U.S. Army Command and General Staff College. School of Advanced Military Studies
Wilhelm, Karen S.
1995-05-19
-
Humanitarian Assistance Response Ready Forces
From the abstract: "This monograph explores the need to identify humanitarian assistance response ready groups. The increasing number of humanitarian assistance missions performed by the US military indicates the need to identify response ready groups. Response ready groups form the initial reaction forces responding to humanitarian assistance missions. The planning factors impacting on the decision to determine response ready groups include the Crisis Action Planning system, joint task force organizational dynamics, and assessments of the operational environment. Additionally, the monograph addresses the impact of SOPs [Standard Operating Procedures], TPFDDL [Time Phased Force Deployment Data Lists] validation procedures, and deployment priorities. Four recent humanitarian assistance operations form the basis for identifying the core response forces. The impact of identifying forces early is presented. The monograph concludes that the benefits of early identification outweigh any costs. The monograph also addresses the validity of using historical examples to determine core capabilities or units. It also addresses the need to periodically update the response force ready group list to account for force modernization improvements in unit capabilities."
U.S. Army Command and General Staff College
Algermissen, Robert M.
1995-05-19
-
Operational Logistics, War, and Operations Other than War: What Applies?
From the thesis abstract: "This study assesses the role of operational logistics in a war environment and in an operations other than war (OOTW) environment by way of conducting a historical analysis of Desert Storm and humanitarian assistance operations in Somalia. A framework of campaign design elements is used to examine how operational logistics was integrated into each operation, and to what degree the design elements influenced the logistic support in the particular environment. Three conclusions stem from the research. One, the warfighting concept of operational logistics is transferrable when supporting certain operations other than war missions. The operational logistics functions apply, regardless of the environment in which it is executed. Therefore, from a functional approach, this study supports the idea that the operational level of war is applicable to the OOTW environment. The second conclusion is the construct of applying campaign design elements as criteria for measuring the integration and application of operational logistics was tested and found to be useful. It appears this use of criteria elements can serve as a template for operational logistics efforts both in war and peace, provided the functional aspect of the design element, vice the doctrinal 'pure' definition, be considered when applying it to the different environments. The final implication of this study is it reaffirms that as one progresses up the levels of war, the distinction between strategy and logistics erodes. Additionally, the peculiarities of the OOTW environment, especially as noted in the humanitarian relief efforts conducted in Somalia, are such that logistics may become the principal means of policy. This in turn, offers implications regarding the subordination of logistics to warfighting, whereby warfighting capability support logistics."
U.S. Army Command and General Staff College. School of Advanced Military Studies
Currie, James G.
1995-05-19
-
Mandatory Anthrax Vaccination in the Military
From the abstract: "Anthrax in the Military has been an ethical topic of heated discussion over the past decade. The anthrax vaccine was originally given to military members during the Gulf War in the early 1990s, many unaware of the vaccination they were given. Increased number of military members returned from the Gulf reporting unknown medical problems. The illness known as the Gulf War Syndrome was of debate to whether there was such illness or not. This also raised the possibility of whether the anthrax vaccine may have contributed to the illness; the Pentagon denies any truth to this claim."
U.S. Army Command and General Staff College
McGovern, Kathryn M.
1995-05-19
-
Islamic Fundamentalism. Considerations for the Operational Commander
With the removal of Cold War restraints, tne world is entering insurgency and revolution. Current U.S. counterinsurgency doctrine is codified in Joint Pub 3-07, Doctrine for Joint Operations in Low Intensity Conflict. This doctrine grew out of lessons learned in Viet Nam, where the communist opposition generally followed a Maoist pattern of revolution. Many of the new insurgencies, however, may be "Islamic Fundamentalist" in character. Based on examination of the Iranian Revolution and the ongoing Algerian uprising, it appears that Islamic insurgencies represent a significant threat to U.S. security and are substantially different in nature from the Maoist model. The key to a successful Islamic revolution is the ability of the radical clergy to first harness a mass revolt of the urban lower class, and then gain the support of the secular opposition. This may occur very quickly, as the existing religious infrastructure becomes the revolutionary organization. Patterns of operation may include use of religious symbolism as cover for revolutionary activities and use of suicide/high risk attacks on regime and western targets. The CINC may exploit these differences by attacking the cohesiveness of anti-government forces and minimizing cultural antagonism. Additionally, he must be prepared to conduct Noncombatant Evacuation Operations (NEO) on short notice, and institute effective anti-terrorism measures.
Naval War College (U.S.)
Rosbolt, P. K.
1995-05-16
-
Aviation Research: Perspectives on FAA's Efforts to Develop New Technology, Statement by Gerald L. Dillingham, Associate Director, Transportation and Telecommunications Issues Resources, Community, and Economic Development Division, Testimony before the Subcommittee on Technology, Committee on Science, House of Representatives
The Federal Aviation Administration's (FAA) research and development activities pay an important role in producing new technology to enhance the efficiency and the safety of the U.S. air traffic control system. But the agency continues to face challenges in developing new air traffic control and security technologies. Its overall program to develop new technology is in transition. Although GAO is encouraged by the reforms and the initiatives under way at FAA, it remains to be seen if they will improve the agency's ability to develop and ultimately deploy new technology.
United States. General Accounting Office
1995-05-16
-
Revolution in Military Affairs and Operational Maneuver from the Sea
From the thesis abstract: "A Revolution in Military Affairs [RMA] consists of technological advances, operational innovation, and organizational adaptation, all of which combine to transition to a new form of warfare. While there is debate on whether we are experience an RMA, there is no doubt that there are dramatic changes taking place that we need look at new ways of coping with. Operational Maneuver from the Sea [OMFTS] is a new concept which applies the principles of maneuver warfare to maritime power projection. With a few changes, OMFTS is an appropriate concept for leveraging new technologies and employing new organizations like Naval Expeditionary Forces in what may be new forms of warfare emerging from a RMA. While embedded in police statements at the highest levels of the Department of the Navy, OMFTS has yet to be implemented. The concepts of Composite Warfare Commander and Battlespace Dominance should be folded into OMFTS to provide a compelling vision for the future employment of Naval forces."
Naval War College (U.S.)
Huston, James V.
1995-05-16
-
Bill to Relocate United States Embassy from Tel Aviv to Jerusalem: Memorandum Opinion for the Counsel to the President [May 16, 1995]
"In general, because the venue at which diplomatic relations occur is itself often diplomatically significant, Congress may not impose on the President its own foreign policy judgments as to the particular sites at which the United States' diplomatic relations are to take place. More specifically, Congress cannot trammel the President's constitutional authority to conduct the Nation's foreign affairs and to recognize foreign governments by directing the relocation of an embassy. This is particularly true where, as here, the location of the embassy is not only of great significance in establishing the United States' relationship with a single country, but may well also determine our relations with an entire region of the world. Finally, to the extent that S. 770 is intended to affect recognition policy with respect to Jerusalem, it is inconsistent with the exclusivity of the President's recognition power."
United States. Department of Justice. Office of Legal Counsel
1995-05-16
-
Terrorism: National Security Policy and the Home Front
The 1995 bombing of the Federal Building in Oklahoma has highlighted the complexity of the phenomenon of political extremism. Until this occurred, The United States was focused on foreign terrorists, particularly the so-called Islamic fundamentalists. The Strategic Studies Institute, as part of their continuing investigation of the terrorist problem, held a conference in November 1994 at Georgia Tech, at which a number of terrorist-related issues were considered. The emphasis was on international terror, but the threat of domestic extremism also was examined. Included in this volume are three papers presented at the conference two are related to international terror, while one is concerned with the domestic variety and a concluding chapter. The Oklahoma City bombing suggests that most of the terrorism faced by the United States in the near future will be home-grown. There is the potential, though, that U.S. foreign policy will provoke terrorist attacks from foreign-backed groups. If this happens, the United States is not ready. Americans have grown accustomed to some of the costs of global engagement. Money and military casualties have been deemed acceptable burdens of world leadership, but Americans are not yet used to the idea that terrorism at home may be an additional cost of global engagement. Unfortunately, terrorists understand this. In the near future, they are likely to use this vulnerability and the growing multiculturalism of the United States in attempts to either deter U.S. activity or provoke it. Only wise and persistent leadership, exercised before terrorism at home reaches crisis proportions, can prevent it from paralyzing American involvement in world affairs.
Army War College (U.S.). Strategic Studies Institute
Pelletiere, Stephen C.
1995-05-15
-
Physical Security Plan
"The purpose of this document is to provide guidelines and procedures for implementing physical security measures at Headquarters, Military Sealift Command (MSC) and to define specific actions required to safeguard personnel, equipment (including Automated Information Systems (AIS) assets), facilities, material and documents from unauthorized access such as espionage, sabotage, theft or other unlawful acts. The mission of the Military Sealift Command (MSC) is to meet Department of Defense requirements by providing efficient sea transportation, combat-ready logistics forces and reliable special mission ships in peace and war. The document details the Security Office Staffing and Functions; Security Measures; Control Measures; Material Control; Physical Security Aids; Security Force; Terrorist Threat Conditions."
United States. Department of the Navy
1995-05-15