Advanced search Help
Clear all search criteria
Only 2/3! You are seeing results from the Public Collection, not the complete Full Collection. Sign in to search everything (see eligibility).
-
Searching Pagers Incident to Arrest
"Basic fourth amendment principles apply to the search of pagers and the retrieval of messages within them. Law enforcement officers confront an explosion of rapidly changing technology used by criminals to facilitate their illegal activities. What is new today becomes commonplace overnight. The proliferation in the use of paging devices by the innocent and criminal alike is one example. Often, law enforcement officers find these devices on or near an arrestee. Messages within pagers seized from suspects during an arrest may provide incriminating information or valuable leads. Only recently have trends emerged from court decisions that provide law enforcement with guidance on what may be done with pagers seized incident to arrest. This article first addresses why most courts have concluded that electronic surveillance statutes do not govern the search of pagers incident to arrest. It then discusses the analysis courts have applied in reviewing the search of pagers seized incident to arrest. Generally, courts apply traditional fourth amendment search-and-seizure principles by first determining whether a search occurred and then addressing whether the search was reasonable."
United States. Federal Bureau of Investigation
Regini, Lisa A.
1997-01
-
Media Interviews: A Systematic Approach for Success
"Law enforcement officials, when asked their opinions of today's news reporters, predictably reply with such words as 'insensitive,' 'arrogant,' 'untrustworthy,' and 'sensational.' Rarely are the words 'useful' or 'necessary' included in their responses. In contrast, reporters and editors from both print and electronic news agencies, when asked to describe the police in the 1990s, unanimously voice their opinions using such terms as 'clannish,' 'secretive,' 'incompetent,' and worse. The words 'professional' and 'trustworthy' almost certainly never make the list. Such stereotypical characterizations from both sides do little to promote mutually beneficial relations. In fact, the attitude of police officials and the media toward one another deprives an important third party, namely, the public, of clear accounts of what it needs to know to make reasoned judgments on law enforcement's impact on the community. In the arena of police-media relations, one of the primary goals of any law enforcement agency should be to help ensure the accurate reporting of information that the public needs to know. While administrators can employ a number of strategies toward this end, there is no substitute for a proactive attitude based on sound preparation. This article addresses the need for good police-media relations, offers a strategy to improve relations, and then presents a seven-step systematic approach that administrators can use to prepare for media interviews."
United States. Federal Bureau of Investigation
Vance, James L.
1997-02
-
Carnivals: Law Enforcement on the Midway
"By planning ahead for carnivals, administrators can avert many of the problems that they pose to law enforcement. For most people, carnivals conjure up pleasant thoughts of fun and games, cotton candy, amusement rides, and side-shows. Law enforcement officers, on the other hand, often think of the dust and dirt, long hours, lost children, rowdy teens, intoxicated individuals, blaring music, and blinding lights. Their superiors find themselves concentrating on the costs of policing carnivals and the personnel shortages they cause. Despite the pressing problems they raise for law enforcement, carnivals have their place in American culture. Carnivals have been in existence since 1893 as an offshoot of the Chicago World's Fair. They have endured the last 100 years and will continue to do so. This article unveils the 'carnie's' world. It looks at the behind-the-scenes operations of owners and operators and suggests ways for law enforcement personnel to protect citizens, and themselves, from becoming victims on the midway."
United States. Federal Bureau of Investigation
Walstad, Bruce
1997-02
-
Riot Response: An Innovative Approach
"Over the centuries, organized societies often have spawned violent civil disturbances. Countless civil uprisings have been motivated by personal, religious, or political purposes, and many have prompted significant societal changes. Recent decades witnessed race riots across the United States in the 1960s, protests over American involvement in Vietnam in the 1970s, abortion clinic demonstrations in the 1980s, and disturbances stemming from allegations of police brutality in the 1990s. The assorted techniques used by modern law enforcement to quell civil disturbances have been used for many years with varying degrees of effectiveness. After any significant civil disturbance in which large-scale property damage, loss of life, or both occur, law enforcement agencies are held accountable. Often, departments face a catch-22 situation: rapid and aggressive police action garners allegations of overreacting, whereas a limited police response in hopes that the incident will calm down on its own brings accusations of incompetence. Clearly, the police need new strategies for dealing with civil disturbances. As the city of Los Angeles was burning in the wake of the Rodney King verdicts, members of the San Diego, California, Police Department SWAT Special Response Team began developing new methods of extinguishing the violent behavior of an unruly populace. They eventually adopted two techniques-the Augmented Skirmish Line and the Tango Team. These offer law enforcement agencies innovative ways to quell such disturbances."
United States. Federal Bureau of Investigation
Hubbs, Ken
1997-01
-
National Communications System's Management of 2005 Gulf Coast Hurricanes Mission Assignment Funding
"This report addresses the strengths and weaknesses of the National Communications System's (NCS') management of mission assignment funding from the Federal Emergency Management Agency (FEMA). It is based on interviews with employees and officials of relevant agencies and institutions, direct observations, and a review of applicable documents. [...] Regis & Associates, PC, under contract with the U.S. Department of Homeland Security, Office of Inspector General, reviewed the National Communications System's management processes and internal controls for implementing Federal Emergency Management Agency (FEMA)-issued mission assignments related to the 2005 Gulf Coast Hurricanes disaster relief efforts. FEMA is authorized to task other federal agencies, including components within U.S. Department of Homeland Security, with needed expertise to carry out specific disaster relief activities. Our objective was to determine whether the National Communications System had properly designed and implemented management processes and internal controls over the funds it received for the specific mission assignments. The National Communications System reacted quickly to restore emergency telecommunications services to the affected areas. However, it did not initially have a full understanding of its procurement and financial management responsibilities under the mission assignments. It leveraged ongoing business arrangements with the Federal Communications Commission, the U.S. General Services Administration, and the U.S. Department of Defense for certain tasks, but experienced significant delays in getting key support contracts executed. The delayed execution of support contracts, in turn, delayed contractor billings and some of the National Communications System's billings for reimbursement from FEMA."
United States. Department of Homeland Security. Office of Inspector General
2009-02
-
Preparedness Resources for Healthcare Facilities [website]
This website, created by the Centers for Disease Control, "provides all-hazards resources intended for individuals at healthcare facilities tasked with ensuring that their facility is as prepared as possible for an emergency. The healthcare facilities targeted by this page include hospitals, long-term acute and chronic care facilities, outpatient clinics and urgent care facilities, physicians' offices, and pediatric offices and hospitals."
Centers for Disease Control and Prevention (U.S.)
-
Principles of Strategic Communication for a New Global Commons
"At the highest level of national strategy, 'strategic communication' is defined as the highest layer within the communication climate through which U.S. Senior leaders can promulgate national themes and messages and use the principles of strategic communication to keep the peace and win at war. The most effective approach to understanding the principles of strategic communication is the dialogic model of communication. Thirteen core principles of strategic communication are synthesized from the tenets of dialogic communication, the principles of war, and the strategy development process. These principles can underpin national strategy and may help achieve U.S. national objectives at the lowest risk and with the highest benefit. Applying the principles of strategic communication to help realize these ends and objectives, however, requires the USG to inculcate these principles into their strategies and plans (ends), resource the needed capabilities (ways), and use the methods (means) that can best achieve the goals. The ways and means of the DOD may not be postured to support the strategic communication construct and apply the SC principles across its range of military operations. The DOD and USG may wish to assess their current SC resources and their alignment with national strategy so they can help thoroughly and effectively integrate all instruments of national power. In international diplomacy and war, a national strategy shaped by strategic communication principles may be an effective way to understand yourself and your enemies and to win, preferably without fighting, as Sun Tzu would urge, or with only the minimum necessary violence, as Clausewitz would agree."
Naval War College (U.S.)
Perry, Robert L.
2008-06-06
-
Strategic Culture and Violent Non-State Actors: Weapons of Mass Destruction and Asymmetrical Operations Concepts and Cases
"In this Occasional Paper, Jim Smith lays out a conceptual basis and a series of templates for guiding analysis of culture and violent non-state actors. These templates focus on analysis of WMD acquisition and use, and on culturally driven operational campaigns. While the two follow on case studies did not specifically apply those templates, they proceeded from the same conceptual foundation, and they are certainly compatible with the intent of Smith's guidelines. Mark Long applies cultural analysis of radical Islam and al-Qaida in discussing the many factors and influences involved in the core al-Qaida group's WMD decisions. His work graphically demonstrates the complexity of such decisions for that core group, and suggests that what many may find as counter-intuitive caution plays a major role here. And Tom Johnson, in examining a tribal insurgent psychological campaign in Afghanistan, demonstrates that traditional beliefs, myths and stories, and behavioral influences can be manipulated for significant effect in countering our efforts to gain stability and legitimacy for the Afghan government. Together these papers underscore the central role of culture in analyzing and understanding non-state adversaries."
USAF Institute for National Security Studies
Smith, James M.; Johnson, Thomas H.; Long, Jerry Mark
2008-02
-
Synthetic Drug Control Strategy: A Focus on Methamphetamine and Prescription Drug Abuse
"The President's National Drug Control Strategy describes the Administration's strategic approach for reducing illicit drug use in the United States. The Administration's Synthetic Drug Control Strategy is a companion to the National Strategy. […].The Synthetics Strategy adheres to the following outline. Following this introduction, it describes the state of the illicit markets for methamphetamine and controlled substance prescription drugs, including progress made over the last several years. It then sets targets for reduced numbers in three principal categories: illicit methamphetamine use, domestic methamphetamine laboratories, and the illicit use of controlled substance prescription drugs. This portion explains the fundamental principles and insights guiding the Synthetics Strategy and describes how performance goals will be measured. Next, the document describes the strategy itself, explaining how, given the current state of the illicit synthetic drug market, the Administration will meet targets for use and production by the end of 2008. Here, both supply reduction and demand reduction activities are addressed for both methamphetamine use and controlled substance prescription drug abuse. Finally, the end of the document addresses the problem of responding to the aftermath of methamphetamine production. Improving our knowledge about the health and environmental consequences of methamphetamine labs is critically important toward improving the safety and security of Americans, including the children who are found in or near toxic laboratories."
United States. Department of Justice; United States. Department of Health and Human Services; United States. Office of National Drug Control Policy
2006-05
-
Evaluating Security and Quality of Service Considerations in Critical Infrastructure Communication Networks
"This thesis demonstrates the benefits of utility communication based on Internet technology, some dangers in using Internet technology in establishing a utility intranet connecting protection and control systems, and compares three different approaches to making reservations for routing traffic in the utility intranet based on different levels of background traffic. A model of expected background traffic on a national utility intranet is presented. The Utility Communication Architecture 2.0 and the International Electrotechnical Commission (IEC) 61850 began laying the groundwork in 2002 in establishing an infrastructure allowing power substations, program logic controllers, remote terminal units, intelligent electronic devices, and other devices to effectively and efficiently communicate over a utility intranet that is based on Internet standards using commercial of the shelf (COTS) components. This intranet will almost certainly be based on Internet standards due to their widespread use, low cost, and easy migration path over time. Even though it's based on Internet technology the utility intranet will allow utilities to connect to one another without exposing them to threats from the Internet. This will provide utilities with the needed insight into other areas of the power grid enabling them to better manage its operation. The Electrical Power Communication Synchronization Simulator (EPOCHS) is used in this thesis to run simulations that models network traffic over a power infrastructure in order to show the effects of using different protocols, bandwidth reservations, and varying levels of background traffic will have on the quality of service of intranet traffic, with the end result of improving the insight the different regions of the utility intranet will have with each other. EPOCHS provides the required simulation environment needed to integrate a network simulator with an electromechanical power simulator to run the simulations."
Air Force Institute of Technology (U.S.). Graduate School of Engineering and Management
Roberts, Gregory R.
2008-03-01
-
Stabilizing Critical Infrastructure Tour Lengths
"While the aerospace expeditionary force (AEF) tour length works well for most personnel supporting a deployment, there are specific areas where the concept is more detrimental than beneficial. Tour lengths in those areas should be reconsidered. The Air Force Scientific Advisory Board defines the aerospace expeditionary force as an adaptable and rapidly employable set of air and space assets that provide the President, Secretary of Defense and combatant commanders with options for missions ranging from humanitarian airlift to combat operations. The AEF concept has ten prepackaged combat units, using airmen assigned to a regular unit, which rotate every three months over a fifteen-month period. Currently, there are airmen serving in critical career fields (i.e., intelligence, security, combat engineering) that are remaining beyond the normal 90-day cycle, extending their tours up to 179 days. As AEF units rotate, key functions lose expertise vital to long-term US goals. One example is USCENTCOM's Combined Air Operation Center, located on Al Udeid Air Base, Qatar. There is a mixture of tour lengths--normally one-year tours for senior leadership and 90-120 day tours for staff. This CAOC supports the combined force commander's objectives for three disparate geographical areas-- Afghanistan, Iraq, and Horn of Africa."
Air University (U.S.)
2004
-
Congressional Budget Office Cost Estimate: S. 2842: Aging Water Infrastructure and Maintenance Act
This Cost Estimate published by the Congressional Budget Office (CBO) examines Senate Bill 2842: Aging Water Infrastructure and Maintenance Act. "S. 2842 would authorize the Secretary of the Interior, acting through the Bureau of Reclamation, to inspect certain water facilities that are close to urban areas. In the event that the structural safety of a facility is at risk, the Secretary would be authorized to carry out certain operation and maintenance activities at the facility. Based on information from the bureau and assuming appropriation of the necessary amounts, CBO estimates that implementing S. 2842 would cost $189 million over the 2009-2013 period."
United States. Congressional Budget Office
2008-11-05
-
Congressional Budget Office Cost Estimate: S. 2974: Arkansas Valley Conduit Act of 2008
This Cost Estimate published by the Congressional Budget Office (CBO) provides insight into the financial impact of Senate Bill 2974: Arkansas Valley Conduit Act of 2008. "The estimated cost of building the Arkansas Valley Conduit is about $300 million, and if funds are appropriated by the Congress to build the project, its beneficiaries would be required under current law to reimburse the federal government for the entire cost of the project. S. 2974 would change the cost-sharing arrangements for the planned project and reduce the obligation to pay for the entire cost of the Arkansas Valley Conduit. By authorizing the use of excess receipts from the Fryingpan-Arkansas Project as an offset for a portion of the capital costs of the Arkansas Valley Conduit, S. 2974 would result in a reduction of receipts that would otherwise be paid by the users of the Arkansas Valley Conduit. However, that loss would only occur if funds are appropriated to construct the Arkansas Valley Conduit and would not begin until construction is complete after 2018. Hence, enacting this provision would not affect offsetting receipts over the 2009-2018 period."
United States. Congressional Budget Office
2008-11-05
-
Defense Imperatives for the New Administration
"It has been more than two generations since the presidency transitioned with American troops engaged in significant combat operations-a deployment begun in the aftermath of the September 11, 2001 attacks. Beyond the current military engagements in Iraq and Afghanistan, the nation faces other equally important national security challenges. These include nuclear proliferation, the potential for other regional conflicts into which we could be drawn, and the spread of militarily relevant technology even beyond nation-states. The incoming leadership must be prepared to deal with the most pressing issues facing the Department of Defense today. The pressing issues described herein are daunting and may seem all-inclusive, but they are only a fraction of the defense challenges facing the new administration. This report describes just those issues that the next Secretary of Defense should place at the top of the agenda-issues that will require the attention of the Commander-in-Chief, and, if left unresolved, could lead to future military failure. This report offers recommendations drawn from report prepared by the Defense Science Board, an advisory body to the Secretary of Defense, which address topics at the confluence of technology, policy, and management."
United States. Defense Science Board
2008-08
-
Army without Doctrine: The Evolution of US Army Tactics in the Absence of Doctrine, 1779 to 1847
"This thesis examines how the United States (US) Army conducted operations and adapted their tactics during the Indian wars of 1779, through the Second Seminole War, and ending in 1847. During this period, the US Army lacked a comprehensive written doctrine that captured how the Army fought its wars, so those skills and techniques could be passed down for subsequent conflicts against Native Americans. This caused the US Army to rely on the experiences gathered from past Indian conflicts as well as the existing texts and publications from contemporary military theorists, such as Henri Jomini and Dennis Hart Mahan. The thesis examines three periods to prove the thesis: the colonial period from 1620 through 1794, the establishment of Indian policies from 1794 through 1831, and the Second Seminole War, which lasted from 1835 to1842. The scope of the thesis concludes with Dennis Hart Mahan's publication of An Elementary Treatise on Advanced Guard, Out-Post, and Detachment Service of Troops With the Essential Principles of Strategy and Grand Tactics. Mahan's textbook became de facto doctrine due to its combination of military theory, inclusion of past US Army experiences in Indian warfare and its acceptance as a training text for US Army officers at the US Military Academy at West Point. This text is the end result of over one-hundred years of American military experience and evolution under fire, proving that the US Army can, and did, succeed against its enemies without formal doctrine."
U.S. Army Command and General Staff College
Harvey, Conrad E.
2007-06-15
-
FY2008 Supplemental Appropriations Justification: Department of State & U.S. Agency for International Development
This document presents the "Supplemental Appropriations Justification" from the Department of State and the U.S. Agency for International Development for fiscal year 2008. It provides numbers and overviews of these appropriations towards combating terror.
United States. Department of State
2008
-
Non-Lethal Weapons: Considerations for the Joint Force Commander
"The allure of non-lethal weapons has continued to grow, and will only accelerate as the United States continues to confront complex irregular combat scenarios, often in urban environments. Despite their promise, numerous concerns about their development and use have been raised by persons both in and out of the military. While all the concerns deserve consideration, this paper discusses the issues raised primarily by those outside the military. The concerns raised need to be addressed by everyone in the non-lethal weapons community, from the most senior policy-makers to the most junior soldier employing them. This paper focuses on what the operational commander can do to attend to potential complaints against non-lethal weapons. It is the thesis of this paper that properly crafted Rules of Engagement are one tool that the operational commander can use. General guidelines for use when developing Rules of Engagement are offered to minimize the concerns raised and help ensure the legitimacy of both the weapons employed and the United States."
Naval War College (U.S.). Joint Military Operations Department
Voetberg, Jeffrey W.
2007-10-05
-
Next Generation Air Transportation System: Status of Key Issues Associated with the Transition to NextGen, Statement of Gerald L. Dillingham, Ph.D., Director, Physical Infrastructure Issues, Testimony before the Committee on Science and Technology, House of Representatives
"To prepare for forecasted air traffic growth, the Federal Aviation Administration (FAA), in partnership with other federal agencies and the aviation industry, is planning and implementing the Next Generation Air Transportation System (NextGen), a new, satellite-based air traffic management system that is expected to increase the safety and enhance the capacity of the air transport system. NextGen will replace the current radar-based air traffic control (ATC) system. Within FAA, the Air Traffic Organization (ATO) is responsible for implementing the transition to NextGen, and ATO's Joint Planning and Development Office (JPDO) is coordinating efforts to plan for this transition, including developing a 20-year research and development (R&D) agenda for NextGen. JPDO has drafted three basic planning documents for NextGen--a Concept of Operations, an Enterprise Architecture, and an Integrated Work Plan (IWP). This testimony responds to six questions about NextGen and JPDO raised by the House Committee on Science and Technology, and addresses two related challenges identified by GAO. The statement is based on recent related GAO reports and testimonies, including a report issued today that reflects GAO's analysis of interviews with 25 key NextGen stakeholders about progress and challenges involved in the transition to NextGen."
United States. Government Accountability Office
Dillingham, Gerald L.
2008-09-11
-
Finding Victims of Human Trafficking
"This study responds to a congressional mandate to (1) identify victims and potential victims of domestic trafficking; (2) determine whether victims have been identified as such by law enforcement; and (3) explore differences between sex trafficking and unlawful commercial sex. It examines human trafficking experiences among a random sample of 60 counties across the United States. Study findings emphasize both confusion about how human trafficking is defined and a general lack of awareness of the issue. In states with anti-trafficking statutes, 44 percent of law enforcement respondents and 50 percent of prosecutors report that their states do not have or they are not aware of having anti-trafficking legislation. In general, law enforcement, prosecutors, and service providers respondents could not: (1) differentiate between severe and non severe forms of human trafficking; (2) distinguish trafficking from smuggling; (3) differentiate domestic and international trafficking; (4) identify types of trafficking (sexual and labor), or (5) state the elements of trafficking. Until these ambiguities are removed (e.g., what is not "severe" trafficking), it will be difficult to inform the public and key stakeholders about what to look for and how to address it."
National Institute of Justice (U.S.)
2008-09
-
Spring 2006: Industry Study: Information Technology Industry
"The U.S. Information Technology (IT) industry is both a specific industry and a foundational element for all other major industries. While the industry is strong and can support current National Security Strategy (NSS) requirements, the U.S. must address upcoming challenges to continue enabling and protecting our current and future strategic capabilities. By building and promoting relationships among government, industry and academia, the U.S. government (USG) can overcome the challenges of maintaining a strong IT workforce, protecting critical infrastructures and technologies, managing our intellectual property rights, and transforming our industrial-based military to continue leading the world in innovation and technological superiority."
Industrial College of the Armed Forces (U.S.)
2006
-
Non-Offensive Defense and Nonviolence Response to Terrorism
"The end of the Cold War and the events of 9/11 have provided strategic planners with unprecedented challenges and opportunities. One such challenge is how to deal with an elusive enemy that has no recognizable territory or organized army; yet has shown a remarkable resilience against traditional military firepower. On the other hand, the post-Cold War era has provided us with enormous peace dividends that can be utilized to enhance the quality of life for millions of people around the world. However, if these dividends are spent on unsound and archaic tactics to defeat the new enemy, we will squander an historic opportunity for our flawed strategies. This project provides the strategic leaders with an alternative approach to traditional military thinking of Offensive Defense and pre-emptive violent strikes. It describes the viability of Non-Offensive Defense and nonviolence strategy for creation of a sustainable and just world Peace."
Army War College (U.S.)
Mahmood, Najib
2008-03-15
-
Joint Improvised Explosive Device Defeat Organization: Anomaly or Future Roadmap
"Asymmetric threats and capabilities have long characterized the conduct of war and every era seems to have its own incarnation. Exemplars include the phalanx, longbow, and recently Improvised Explosive Devices (IEDs). The national response to the dramatic increase in IEDs in the current conflict began as a small cell in 2003. Within four years, the response evolved into the Joint IED Defeat Organization which is currently a $3 billion, 300-person organization answerable to the Deputy Undersecretary for Defense, but coordinating the activity of thousands. JIEDDO itself has been compared to a 'Manhattan-style' project. This paper provides historical perspective through case studies while exploring other analogs such as the North Atlantic shipping tragedy in WWII. More important, discerning patterns that emerge offers glimpses on how we should respond to future threats. Does the JIEDDO model represent a single point in time or does it provide a representative guide for solving difficult issues that cross service, material, agency, and national lines? Solutions to asymmetric threats have perceived single answers or 'silver bullet' approaches, but in reality require integration across a wide domain. This is not only a contemporary assessment of JIEDDO, but a comment echoed at the close of World War II."
Army War College (U.S.)
Sadowski, Robert W.
2008-03-15
-
Combating Terrorism Technology Support Office: 2006 Review
"[Combating Terrorism Technology Support Office (CTTSO)] products share few common threads. Some of the projects that you will read about in the pages that follow are designed for first responders while some are designed for embassies or our warfighters abroad. Costs range from $20 to hundreds of thousands of dollars. Some systems can fit in the palm of your hand; others require a C-17 for air transport. But each of these products, despite their varied appearance, is designed to provide a specific capability to a front-line defender. The one constant is that they all allow the United States to fight and defeat the threats of terrorism. This report offers an overview of the purpose and organization of the CTTSO, as well as the subgroups of the technical support working group, which focus on blast effects and mitigation; chemical biological, radiological, and nuclear countermeasures; concept development; explosives detection; improvised device defeat; infrastructure protection; investigative support and forensics; physical security; surveillance, collection, and operations support; tactical operations support; training technology development; and very important person protection. The report also addresses projects and missions in the areas of explosive ordnance disposal/low-intensity conflict and irregular warfare support."
United States. Assistant Secretary of Defense for Special Operations and Low-Intensity Conflict
2006-01-01
-
2007 Information and Communications Technology Industry
"The Information & Communications Technology (ICT) industry provides enabling capability for all major industries. The US ICT industry leads the world but must overcome several near-term challenges if it hopes to retain its global leadership. Some of the key challenges include reforming H1-B visa allocations to maintain a strong US-based IT workforce, monitoring the on-going convergence of telephony, data, and video services, resolving the debate over Internet neutrality, and supporting the full implementation of the National Critical Infrastructure Protection Plan. This research paper suggests roles for the global community, the US government and US business to address these and other concerns. Lastly, a growing industry constituency is fostering a paradigm shift to a Service Oriented Architecture (SOA) which fundamentally alters delivery of ICT capability to end users."
Industrial College of the Armed Forces (U.S.)
Adamson, William G.; Bezwada, Raji
2007-01-01
-
U.S. Army War College Guide to Strategy
"The purpose of this volume is to present the Army War College's strategy formulation model to students and practitioners. This book serves as a guide to one method for the formulation, analysis and study of strategy--an approach which we have found to be useful in providing generations of strategists with the conceptual tools to think systematically, strategically, critically, creatively and big." Each chapter presents a major concept from the strategy formulation model. The chapters are as follows: A Primer in Strategy Development; Ethical Issues in War: An Overview; Some Basic Concepts and Approaches to the Study of International Politics; Persistence of Credibility: Interests, Threats and Planning for the Use of American Military Power; National Interest: From Abstraction to Strategy; Regional Studies and Global Strategy; National Power; National Security and the Interagency Process: Forward into the 21st Century; National Security Strategy: Documenting Strategic Vision; Why is Strategy Difficult?; Force Planning and U.S. Defense Policy; Toward an Understanding of Military Strategy; Strategic Risk; and Strategic Art: The New Discipline for 21st Century Leaders.
Army War College (U.S.)
Cerami, Joseph R.; Holcomb, James F., Jr.
2001-02
-
Persons Obtaining Legal Permanent Resident Status by Broad Class of Admission and Region and Country of Birth: Fiscal Year 2007
This data table from the U.S. Department of Homeland Security presents statistics on the number of people obtaining legal permanent resident status organized by broad class of admission and region and country of birth for the 2007 fiscal year.
United States. Department of Homeland Security
2008
-
Persons Obtaining Legal Permanent Resident Status by Broad Class of Admission and Region and Country of Last Residence: Fiscal Year 2007
This data table from the U.S. Department of Homeland Security presents statistics on the number of people obtaining legal permanent resident status organized by broad class of admission and region and country of last residence for the 2007 fiscal year.
United States. Department of Homeland Security
2008
-
President Bush Participates in Video Teleconference with President Karzai of Afghanistan, United States Provincial Reconstruction Team Leaders, National Guard Agriculture Development Team Representatives, and Afghan Governors [September 26, 2008]
This White House fact sheet is a conversation between President Georg W. Bush and Afghan President Hamid Karzai at the White House on September 26, 2008. President Karzai thanked President Bush for his U.S. support in Afghanistan and for U.S. special forces rescuing him during the liberation of Afghanistan.
United States. Office of the White House Press Secretary
2008-09-26
-
Table: Persons Obtaining Legal Permanent Resident Status by Broad Class of Admission and Selected Dempgraphic Characteristics: Fiscal Year 2007
This data table from the U.S. Department of Homeland Security presents statistics on the number of people obtaining legal permanent resident status organized by broad class of admission and selected demographic characteristics for the 2007 fiscal year.
United States. Department of Homeland Security
2008
-
Table: Immigrant Orphans Adopted by U.S. Citizens by Gender, Age, and Region and Country of Birth: Fiscal Year 2007
This data table from the U.S. Department of Homeland Security presents statistics on the number of immigrant orphans adopted by U.S. citizens organized by gender, age, and region and country of birth for the 2007 fiscal year.
United States. Department of Homeland Security
2008