Advanced search Help
Clear all search criteria
Only 2/3! You are seeing results from the Public Collection, not the complete Full Collection. Sign in to search everything (see eligibility).
-
S. Hrg. 106-297: Extremist Movements and their Threat to the United States: Hearing before the Subcommittee on Near Eastern and South Asian Affairs of the Committee on Foreign Relations, United States Senate, One Hundred Sixth Congress, First Session, November 2, 1999
S. HRG. 106-297: Testimony addresses the sources of anti-Western extremism, what keeps it alive, where we are now, and what policies the United States should be pursuing to deal with this threat. Statements, letters, and material submitted for the record include those of the following: Milton Bearden, Mansoor Ijaz, Michael Krepon, Michael A. Sheehan, and S. Frederick Starr.
United States. Government Printing Office
2000
-
S. Hrg. 106-565: Russian Intelligence Activities Directed at Department of State: Hearing before the Committee on Foreign Relations, United States Senate, One Hundred Sixth Congress, Second Session, February 10, 2000
S. Hrg. 106-565: Testimony discusses security issues related to the US State Department, following the revelation of a bug planted by Russians in the Secretary of State's office. Senator Grams expresses concern that the State Department has become a soft target for foreign intelligence services, because of a lack of security consciousness in the State Department culture. Statement included is that of David G. Carpenter.
United States. Government Printing Office
2000
-
S. Hrg. 106-298: Crisis in Pakistan: Hearing before the Subcommittee on Near Eastern and South Asian Affairs of the Committee on Foreign Affairs, United States Senate, One Hundred Sixth Congress, First Session, October 14, 1999
S. HRG. 106-298: Testimony discusses US policy toward Pakistan after the Sharif Government's overthrow, including sanctions imposed under the Pressler amendment, and methods for restoring democracy in Pakistan. Statement of Karl Frederick Inderfurth is included.
United States. Government Printing Office
2000
-
SLOC Security in the Asia Pacific
The economic development of Asian Pacific countries in the passing two to three decades has been closely related to seaborne trade, and the importance of sea lines of communication (SLOC). SLOC security is now one of the priorities in regional countries' strategic thinking and policy making. However, SLOC insecurities do exist, and the problems therein do not warrant optimistic views. Factors affecting SLOC security include: the unstable political relationship among regional countries; different interpretation over the freedom of the seas principle; islands' sovereignty disputes and overlapping maritime jurisdictional claims; the emerging naval build-up; and non-traditional threats such as pollution, piracy, drug-trafficking, etc. China attaches much importance to SLOC security, and would play a positive role in the safeguarding of SLOC together with other regional countries. However, China needs to make sustained efforts to let the world community believe its sincerity in maintaining SLOC security.
Asia-Pacific Center for Security Studies
Matano, Kagechika
2000
-
FBI Law Enforcement Bulletin: December 1999
This issue provides an article discussing how law enforcement officers must become familiar with the methods available to gather evidence abroad and bring international criminals to justice. It also includes an article about understanding subjects with paranoid Schizophrenia, as well as an article about vehicle stops involving extremist group members. Regular departments provide information on official negligence, task force training, and the FBI Leadership Fellows Program.
United States. Federal Bureau of Investigation
1999-12
-
Hazard Communication Guidelines for Compliance
OSHA's Hazard Communication Standard (HCS) is based on a simple concept--that employees have both a need and a right to know the hazards and identities of the chemicals they are exposed to when working. They also need to know what protective measures are available to prevent adverse effects from occurring. OSHA designed the HCS to provide employees with the information they need to know. Knowledge acquired under the HCS will help employers provide safer workplaces for their employees. When employees have information about the chemicals being used, they can take steps to reduce exposures, substitute less hazardous materials, and establish proper work practices. These efforts will help prevent the occurrence of work-related illnesses and injuries caused by chemicals.
United States. Occupational Safety and Health Administration
Jeffress, Charles N.
2000
-
Random Gunfire Problems and Gunshot Detection Systems
This Research in Brief summarizes the findings of field studies of two gunshot
detection systems: Trilon Technology's ShotSpotter(TM) system, which has operated
in Redwood City, California, since early 1996, and Alliant Techsystems
Inc.'s SECURES(TM) system, installed for 2 months in 1996 in a neighborhood
with high levels of random gunfire in Dallas, Texas. This Research in Brief
also outlines how the police used the gunshot detection system in Dallas and
what officers working in the test sites think of the technology.
National Institute of Justice (U.S.)
Travis, Jeremy
1999-12
-
Protecting Global Utilities: Safeguarding the Next Millenium's Space-Based Public Services
Article begins by defining Global Utilities as "Civil, military, or commercial systems - some or all of which are based in space - that provide communication, environmental, position, image, location, timing, or other vital technical services or data to global users." Cuurrently no physical system exists for protecting these global utilities. What if threat comes from nongovernment organizations, terrorist groups, or an adversarial nation? What if we are unable to identify the sources of the offense? Treaties and sanctions may not prove so effective. We will need some other source of protection. Author argues that protecting global utilities is a natural extension of the Air Force mission to protect other high-value airborne assets; it is also an extension of the DOD protection of all friendly assets. Major topics discussed in article include Why Protect Global Utilities?, Who Should Protect Global Utilities?, and Where Should We Place the Protection?
United States. Department of the Air Force
Carlson, Bruce
2000
-
DOE Limited Standard: Hazard Analysis Reports for Nuclear Explosive Operations
This technical standard applies to the conduct of hazard analyses and preparation of hazard analysis reports (HARs) for nuclear explosive operations (NEOs) conducted by the Department of Energy (DOE). This standard addresses operation-specific HARs and their interface with facility safety basis
documents (Safety Analysis Reports [SARs] or other DOE-approved safety basis documents). The purpose of this technical standard is to clarify the requirements and provide guidance for conducting hazard analyses and preparing HARs for NEOs and associated activities. It is intended to supplement the guidance contained in DOE Guide 452.2A-1A, "IMPLEMENTATION GUIDE FOR
DOE ORDER 452.2A, SAFETY OF NUCLEAR EXPLOSIVE OPERATIONS."
United States. Department of Energy
1999-12
-
Summary Report: National Health Surveillance System Workshop
On October 3, 2000, the Defense Threat Reduction Agency's Advanced Systems and Concepts Office (ASCO) and the Centers for Disease Control and Prevention (CDC) co-sponsored a workshop aimed at identifying the essential elements of a national health surveillance system. There were a variety of participants, spanning the local, state and national public and animal health communities. Based on the workshop discussions, there are some near-term actions that can move ahead the process of developing a national health surveillance system: Assess in detail the advantages and disadvantages of the three types of surveillance methods discussed: syndromic, data mining, and rapid diagnostics; develop requirements and an approach for addressing the problems associated with each; identify and benchmark current surveillance programs, including the Laboratory Response Network for Bioterrorism, in both the public health and animal health communities; identify and promulgate lessons learned; use this as a point of departure for developing initial standards for syndromic definitions and informatics; identify biological agents for which surveillance should be conducted; establish expert groups to determine thresholds for reporting on each agent; and define the range of required medical and non-medical data sources. For example, environmental health agencies may have useful data related to possible disease outbreaks, as might schools (i.e., absentee information) and insurance companies.
United States. Defense Threat Reduction Agency; Centers for Disease Control and Prevention (U.S.)
2000
-
Networked Information Systems: Protecting Against the Threat 2000
The explosion in affordable computing power and the rapid expansion of interconnected, publicly accessible networks has dramatically altered the way sensitive personal, financial, or proprietary information is acquired, processed, distributed, shared, stored and retrieved. The advances that have made this possible have simultaniously increased the risk that this information may be compromised, manipulated, stolen, or lost. This has created a paradox. We now have the dilemma of choosing between the advantages of using networks, weighed against the probability of becoming a victim of cyber thieves. Although this paradox remains, the decision has already been astoundingly made in the favor of using the networks, and people have become dependent on these networks. This 14 page booklet regarding this issue was developed by the NACIC with this background in mind.
United States. Office of the National Counterintelligence Executive
2000
-
Military Responses to State-Sponsored Terrorism: Re-Thinking Deterrence and Coercion Theory
The face of conflict is changing. The breakup of the former Soviet Union has changed the balance of power from a bi-polar world to a uni-polar one. This change in the world's power structure has presented the United States with new challenges. The purpose of this thesis is to explore one of these challenges, state-sponsored terrorism, and the range of military responses that might be used to deter states from sponsoring terrorism or coercing states into ceasing their sponsorship. This thesis uses conventional deterrence and coercion theory, as well as comparative case studies to analyze the utility of deterrence and coercion against state-sponsored terrorism. In doing so a framework that can be applied to state sponsors of terrorism was developed to determine if a strategy of deterrence or coercion could alter a state's behavior. The findings of this thesis suggest that a determined coercive strategy is more likely to work against state-sponsored terrorism than a strategy of deterrence. Finally, the thesis provides a model, a taxonomy of coercion that recommends using lethal and non-lethal options in overt and covert operations as the means to modify the behavior of states that sponsor terrorism.
Naval Postgraduate School (U.S.)
Bellon, Timothy E.
1999-12
-
U.S. Terrorism Policy Towards Sudan: Blinded by Islamic Fundamentalism?
Sudan is currently ruled by a government that was put in place by a 1989 military coup that overthrew a democratically elected government. The U.S. considers Sudan an Islamic Fundamentalist regime because National Islamic Front (NIF) members hold key positions in the government In 1993 the U.S. imposed unilateral diplomatic and economic sanctions against Sudan for allegedly harboring terrorist organizations. This thesis assesses U.S. policy towards Sudan with respect to terrorism. It reviews current policies and argues that key strategic interests are being neglected. The U.S. tends to equate Islamic Fundamentalism with its more radical element terrorism, which significantly influences U.S. policy towards Sudan. Currently the terrorism policy of the US is based on countering state-sponsored terrorism while the more significant threat is from a new breed of well-funded terrorists who operate independently of states. Instead of isolating Sudan for harboring such individuals, the U.S. should take advantage of Sudan's influence with loosely knit Islamic groups. America's inability to effectively deal with the evolving terrorism threat as reflected in its policy toward Sudan, re resents a serious vacuum in its ability to provide for its national security.
Naval Postgraduate School (U.S.)
Harris, Robert A.
1999-12
-
Flexibility of the Incident Command System to Respond to Domestic Terrorism
This thesis argues that the current Incident Command System (ICS) is inadequate for activating the National Guard Military Support Detachment - Rapid Assessment Initial Detection (RAID) Teams, which are vital for responding to domestic terrorism. The current ICS does not allow first responders to contact National Guard units directly during a WMD incident. First responders must send a request via their Emergency Operation Center (EOC), through the State Emergency Management Division (EMD), to the state Governor's office for approval. The Governor can then activate the National Guard to respond to the incident. This process is unnecessarily time-consuming. Serious jurisdictional issues and "turf wars" may emerge between first responders and RAID teams, at precisely the time when close coordination is most necessary. RAID teams should be recognized as operational units, and given the ability to initiate their response plan upon receipt of an alert from the local EOC. With the approval of the RAID team's higher headquarters they may then deploy. Appendix A provides a guide to suggested changes in existing regulations. This thesis also proposes changes in education and training that should help alleviate other problems associated with rapid response, including the risk of jurisdictional conflicts and "Good Samaritan" casualties.
Naval Postgraduate School (U.S.)
Favero, Gerald T.
1999-12
-
National Institute of Justice 1998 Annual Report to Congress
The National Institute of Justice 1998 Annual Report to Congress summarizes NIJ's role, operation, and overall achievements during fiscal year 1998. NIJ in Brief, describes NIJ's organization, financial data, growth in funding, and collaborative activities. Overview of the Year synthesizes NIJ accomplishments in 1998 in the areas of basic research, applied research, and new technology. This section also contains a section on NIJ's continuously increasing Web presence as part of its outreach and dissemination efforts. Selected Highlights presents a review of NIJ's research and development activities for 1998, including making communities safer (Arrestee Drug Abuse Monitoring), taking steps to prevent crime (safety for women and families), finding multilevel partnerships to effectively solve problems (collaboration at the local level), and exploring issues of special concern (youth and crime). Finally, two appendices list awards and publications made during 1998 on behalf of NIJ.
National Institute of Justice (U.S.)
1999-12
-
Middle East Security Issues: In the Shadow of Weapons of Mass Destruction Proliferation
"The Middle East is a WMD war waiting to happen. Such a conflict would harm US allies and US interests; it needs to be avoided. Or, if WMD warfare occurs, such a conflict needs to be limited and the United States and allied forces need to be prepared to cope with the effects. The authors of this study address important questions that demand an answer if US national security policy is to be well informed. Chapter one summarizes the nuclear, biological, and chemical weapons capabilities and missile systems of Egypt, Iran, Iraq, Israel, Libya, and Syria. Chapter two looks at both the conventional and WMD military balance between the states in the region. This chapter also looks at the volume of arms transfers to each state in the region and the impact on its military capacity and the balance of power. Chapter three concludes that "the fact that the Middle East has not been among the success stories in curbing the spread of nuclear weapons is not surprising." Chapter four is on the same subject from the perspective of an independent Israeli analyst, Avner Cohen. Cohen sees a long-term trend in the Arab world to accept Israeli existence and see it as a state with which the Arabs must deal. Chapter five focuses more narrowly on the Egyptian-Israeli Confrontation over the Nuclear Nonproliferation Treaty. The author contrasts Egypt's changing approach to the Israeli nuclear weapons possession, alternatively ignoring it and then challenging it."
USAF Counterproliferation Center
Schneider, Barry R.
1999-12
-
Understanding the Safe Drinking Water Act
This document outlines roles and responsibilities, funding and assistance, compliance and enforcement, and public information of the Safe Drinking Water Act. The Safe Drinking Water Act (SDWA) was originally passed by Congress in 1974 to protect public health by regulating the nation's public drinking water supply. The law was amended in 1986 and 1996 and requires many actions to protect drinking water and its sources - rivers, lakes, reservoirs, springs, and ground water wells. (SDWA does not regulate private wells which serve fewer than 25 individuals.) SDWA authorizes the United States Environmental Protection Agency (USEPA) to set national health-based standards for drinking water to protect against both naturally-occurring and man-made contaminants that may be found in drinking water. USEPA, states, and water systems then work together to make sure that these standards are met.
United States. Environmental Protection Agency
1999-12
-
NIAID: Planning for the 21st Century
"NIAID [National Institute of Allergy and Infectious Diseases] implements a planning process to develop and select initiatives that solicit research applications to address special opportunities, gaps, and needs. The aim of the process is to maximize public benefit by (1) paying close attention to current public health needs and anticipating changes in those needs; (2) capitalizing on scientific opportunity, especially on those with the prospect of reducing the burden of disease; (3) ensuring the capacity for future work by sustaining a broad array of basic research and nurturing scientific talent; (4) collaborating within and beyond NIH; and (5) using federal resources to leverage and complement the activities of other sectors. Being apprised of activities conducted by other government agencies, non-government organizations, as well as the pharmaceutical and biotechnology industry, is crucial to setting meaningful priorities."
National Institute of Allergy and Infectious Diseases (U.S.)
2000
-
Chemical Biological Weapons: New Questions, New Answers
The words "chemical and biological weapons" (CBW) send a shiver down
most spines these days. With the end of the Cold War, the possibility of a
massive nuclear confrontation appears remote, so today many popular
doomsday scenarios center on the aggressive use of chemical or biological
warfare by rogue nations or terrorist groups. As exaggerated as some of the
accounts are, with CBW cast as the latest unseen, unstoppable enemy, the
threat posed by these weapons is all too real, and growing. Although most of the CBW agents involve often complex technical challenges
to be met before they can be effectively weaponized and
delivered to a target, those challenges can be overcome with the right
combination of expertise and resources. Even in crude form and delivered in
a crude fashion, CBW agents can have a devastating impact. This sobering
reality was realized on 20 March 1995, when members of the Aum Shinrikyo
religious cult released the nerve gas sarin in the Tokyo subway. Twelve
people were killed and more than 1,000 were hospitalized of the more than
5,000 who received medical attention. The material was impure and the
delivery method was extremely crude, but with that attack against civilians
during peacetime, and with the worldwide attention it received, CBW agents
graduated from being a concern of the battlefield to a potential nightmare of
our daily lives.
National Institutes of Health (U.S.)
Hood, Ernie
1999-12
-
Entangled in Southern Lebanon: Israel, Iran, Syria and Hizbollah
Israel invaded Lebanon in 1978 and 1982 with the intention of destroying the Palestinian Liberation Organization (PLO) infrastructure. Hizbollah filled the vacuum that was created by the removal of the PLO. In an effort to neutralize Hizbollah and obtain a secure northern border, the Israeli Defense Force (IDF) has undertaken many military operations that have appeared to be counter-productive. These operations have only served as a catalyst for "tit for tat" battles between the IDF and Hizbollah. The purpose of this thesis is to examine and analyze why Israel's military efforts in southern Lebanon have failed to achieve a secure and peaceful northern border and argue that the time is ripe to end the Israeli-Lebanon conflict via a diplomatic solution.
Naval Postgraduate School (U.S.)
Facey, Ian M., Sr.
1999-12
-
Final Report of the Defense Science Board Task Force on Globalization and Security
Globalization-the integration of the political, economic and cultural activities of geographically and/or nationally separated peoples-is not a discernible event or challenge, is not new, but it is accelerating. More importantly, globalization is largely irresistible. Thus, globalization is not a policy option, but a fact to which policymakers must adapt. Globalization has accelerated as a result of many positive factors, the most notable of which include: the collapse of communism and the end of the Cold War; the spread of capitalism and free trade; more rapid and global capital flows and more liberal financial markets; the liberalization of communications; international academic and scientific collaboration; and faster and more efficient forms of transportation. At the core of accelerated global integration-at once its principal cause and consequence-is the information revolution, which is knocking down once-formidable barriers of physical distance, blurring national boundaries and creating cross-border communities of all types.
United States. Defense Science Board
Hicks, Donald A.
1999-12
-
Exploratory Analysis of the Military Value of Information and Force
This thesis addresses the military value of information in conflict. It is composed of three complimentary experiments. The first experiment uses a simple contest to assess how military decision makers perceive and use information. The results of the experiment demonstrate that many military decision makers do not always use information optimally. Equally insightful, most military decision makers significantly overestimate the value of information compared to force advantage. The second experiment is an exploratory analysis of like naval surface forces and explores the value of information versus force advantage in modern naval surface combat using a computational model of naval missile combat. The results of the exploratory analysis of like naval forces suggest that increasing information advantage can enhance but occasionally may degrade a force's effectiveness. In contrast, increasing force advantage in the same conflict always enhances the combat effectiveness of the forces investigated. The third experiment analyzes a more realistic asymmetric scenario. In this case study, American aegis type ships engage more numerous coastal defense type forces. The results show the advantage of numbers even when the aegis type ships have virtually total information.
Naval Postgraduate School (U.S.)
McGunnigle, John, Jr.
1999-12
-
Future Ballistic Missile Requirements: A First Look
The Minuteman III, the mainstay of the United States' intercontinental ballistic missile (ICBM) force, was built with 1960's technology. Programs now underway should extend the system's life past 2020. What happens after that? The Defense Planning Guidance directs the Air Force to pursue Minuteman III replacement concepts, and recent studies agree a land-based nuclear deterrent will be needed indefinitely. The future system NOW KNOWN AS Minuteman IV (MM IV) could use a mix of existing and new hardware, and/or some combination of military and commercial components. The front end may resemble today's reentry system or it could carry a maneuvering reentry vehicle. Alternatively, the force structure of the future may employ a mix of ballistic and maneuvering front ends. Which options are pursued depends on factors including the threat, arms control agreements, and the ultimate service life of Minuteman III. Air Force Space Command's Directorate of Requirements initiated the Ballistic Missile Requirements (BMR) study in 1998 to document requirements for the 2020-2040 timeframe and provide options. The definition of requirements and options is key to focusing our research efforts and our dollars to field the most cost-effective deterrent ICBM force for the future.
U.S. Army Space and Missile Defense Command
Schaff, Jeff; Bille, Matt; Blalock, Lamberth
2000
-
National Historic Landmarks at the Millennium: A Report to Congress and the American People
This publication is a survey of national historic landmarks, and their current status as of 2001. Of the total landmarks, 137 are still threatened, and an additional 164 are on the watch list. Deterioration is the major problem afflicting NHLs, generally due to lack of funds for ongoing maintenance. Places that "possess exceptional value or quality in illustrating or interpreting the heritage of the United States" are designated National Historic Landmarks (NHLs) because they have meaning for all Americans. They are places where our nation's most significant historic events occurred, where prominent Americans worked or lived, that represent those ideas that shaped the nation, that provide important information about our past, or that are outstanding examples of design or construction.
United States. National Park Service
2000
-
Threat Warning for America's Critical Infrastructures
"The President's Commission on Critical Infrastructure Protection, Critical Foundations, was a report of a multi-agency effort to "study the critical infrastructures that constitute the life support systems of (the United States), determine their vulnerabilities, and propose a strategy for protecting them in the future".2 Spurred by this report, the President signed Presidential Decision Directive 63 which built upon the PCCIP's recommendations. In signing PDD-63, the President's intent was for the United States to "take all necessary measures to swiftly eliminate any significant vulnerability to both physical and cyber attacks on our critical infrastructures, including especially our cyber systems".3 One of the goals of PDD-63 was to create a national center to warn of significant infrastructure attacks, to include the detection and analysis of such attacks, with maximum participation from the private sector. This task fell to the FBI's National Infrastructure Protection Center (NIPC) to provide threat assessment, warning, vulnerability assessment, and law enforcement investigation and response.4 Now, nearly two years hence, these encompassing tasks are largely going undone while the NIPC focuses nearly all its resources on law enforcement investigation and response, with only minor Information Sharing and Analysis Center (ISAC) coordination. It is the purpose of this paper to show that national cyber threat warning measuresare important for protecting critical infrastructures. Further, this paper asserts that tactical and strategic cyber threat warning is inadequate and needs to be reassessed vis- -vis the role of the Department of Defense, the Intelligence Community, and the Justice Department."
National Defense University
Thrasher, Paul W.
2000
-
Asymmetric Warfare: The Only Thing New is the Tactics
"This paper will show that asymmetric warfare is not new. What is new is the fact that technology provides an adversary the ability to strike at the United States itself. We are no longer invulnerable to attack on our shores. A review of military theory will show that changing the character and conduct of warfare does not change its nature. It will show how concern over asymmetric tactics has been addressed from the National Security Strategy through joint doctrine, and it will address how our national and military strategy is countering these tactics as they are identified. It will also indicate areas where greater emphasis needs to be placed and identify areas where risk or threats may exist that may not have been addressed."
National Defense University
Daley, Dan
2000
-
Survey of Electronic Cash, Electronic Banking, and Internet Gaming
FinCEN has been examining the potential regulatory and law enforcement challenges that may result as electronic payment systems continue to grow. This report discusses three distinct types of financial products and services that are technology-based: Electronic Cash, Electronic Banking, and Internet Gaming. Each of these products and services facilitates the electronic transfer of financial value, often in an immediate and secure fashion. These technology based financial products may also provide a degree of anonymity to the individuals conducting the transactions. For this reason, in addition to providing various benefits for legitimate commerce, these systems may create new vulnerabilities for financial crimes. FinCEN's approach to addressing these issues has been a two-step process: First is education, which is the primary purpose of this report. The nature and operating characteristics of these new financial systems must be understood; to do this, the organization maintains dialogue with members of the financial services industry. The second component of FinCEN's initiative on new payment technologies deals specifically with money laundering prevention. FinCEN relies upon its knowledge of existing money laundering techniques and methodologies to prevent the misuse of new payment systems for criminal purposes.
Financial Crimes Enforcement Network (U.S.)
2000
-
Remote Controlled Non-Lethal Weapons Applications
This paper, presented at the NDIA 16th Annual Security Technology Symposium in Williamsburg, Virginia on June 26-29, 2000 will discuss a variety of applications of remotely controlled Taser weapons for both military and non-military use. The weapons can be used for force protection, physical/facility security, tactical and operations security, and prison/corrections security. The paper is written and presented by a Tasertron employee. The author goes into detail on specifications for each of the weapons he discusses, and diagrams are included in the presentation.
Defense Technical Information Center (U.S.)
McNulty, J. F.
2000
-
U.S. Air Force Posture Statement 2000
The United States Air Force enters the 21st Century as the most powerful, swift and flexible military force in the world. Aerospace power was born in America with the Wright brothers and was proven decisive in combat by American commanders who understood the imperative of dominating the skies: Mitchell, MacArthur, Eisenhower, Nimitz, Arnold, and many more. Aerospace power became America's unique asymmetric advantage. For more than fifty years, the Air Force has been the nation's primary provider of aerospace power. Today, aerospace power gives the nation a strategic advantage and is its most rapid instrument of military choice. It is aerospace power that has made it possible for our nation to lead critical security commitments, while remaining ready to engage rapidly anywhere on the globe.
United States. Department of the Air Force
2000
-
Integrating Digitization in Multinational Operations
"In all its modern wars the United States has fought as a member of a multinational coalition. Multinational operations are a key component of the National Security Strategy of the United States, which is built on the imperative of engagement. Although prepared to act alone, many of America's security objectives are best achieved or can only be achieved through alliances and other formal security structures, or as the leader of an ad hoc coalition formed around a specific objective. Numerous friction points between member nations inherently complicate multinational operations. Technological asymmetry among the potential coalition partners creates additional friction points in an already complicated scenario. The rapid advances in information technologies and their application to tactical warfare further aggravate this situation. This monograph examines the research question, "Is the establishment of liaison teams a feasible solution to share information on the digital battlefield in multinational operations." The author determines that liaison teams represent only a part of a feasible solution to the problem. Technology transfers and training, supplemented by liaison teams, offers the optimal solution to a complicated problem."
U.S. Army Command and General Staff College
Danna, James W.
2000