Advanced search Help
Clear all search criteria
Only 2/3! You are seeing results from the Public Collection, not the complete Full Collection. Sign in to search everything (see eligibility).
-
AF Instruction 14-108: General Defense Intelligence Program (GDIP) Sytems Requirements Development Process
This instruction implements Air Force Policy Directive (AFPD) 14-1, "Intelligence Management". This AFI is only applicable to the General Defense Intelligence Program (GDIP), and does not impact any other National Foreign Intelligence Program (NFIP). Consolidated Cryptologic Program (CCP) requirements must follow National Security Agency (NSA) instructions in NSA 5000, "Acquisition Management for ACAT I-III Requirements" and NSA/CSS 10-67, "Acquisition Management of Small Computer Assets for Small Computer Purchases". This instruction provides guidance and procedures on how to develop and process a GDIP Requirement Need Statement (GRNS) that may result in appropriation funding. It implements AFI 10-601, "Mission Needs and Operational Requirements", and AFI 65-601 Volume 1, "Budget Guidance and Procedures". AFI 65-601, Volume 1 contains rules and procedures for using Air Force appropriated funds and should be used with the other volumes of AFI 65-601. This instruction provides guidance for all personnel who manage, review, or approve, use of GDIP funds appropriated to the Air Force. This instruction does not apply to the Air National Guard, Air Force Reserves, or any other program unless specifically mentioned in this regulation. This publication is available digitally on the SAF/AAD WWW site at: http://afpubs.hq.af.mil.
United States. Department of the Air Force
1998-06-01
-
21st Century First Responder: The Vision
"The threat of an event involving weapons of mass destruction (WMD) is greater today than ever before. Despite the promise of new technologies and upgraded security measures, indications are that we are not prepared to meet this threat. In an emergency, medical and emergency service communities will play a critical role and will require the best training and response equipment available. Unfortunately, the latest military response equipment is not currently available for all domestic responders. In addition, there is a lack of information concerning what response equipment is needed to satisfy multiple emergency response demands. This paper identifies some of the basic needs of the ultimate 21st century domestic first responder and suggests technology uses and response equipment that will aid the responders in carrying out their duties during a time of crisis. This paper also presents a concept for the short-term, identifying some of the available technologies that can be configured into a response system. This research also exposes gaps in technology, suggesting potential areas for further research and development, and provides a vision for the future first responder. This vision must be anticipated, planned for, designed, integrated and developed so that we will be ready before the event happens."
United States. Department of Energy
Probasco, Kathleen M.; Mogle, Robert D.
1998-06
-
Appointment of Vice Chair of Federal Reserve Board to Serve Concurrently as Chair of the District of Columbia Financial Responsibility and Management Assistance Authority: Memorandum for the Counsel to the President [June 1, 1998]
"You have asked for our views on whether the President may appoint Alice Rivlin to be Chair of the District of Columbia Financial Responsibility and Management Assistance Authority (the 'Authority'), while Dr. Rivlin continues to serve in her current capacity as Vice Chair and a member of the Board of Governors of the Federal Reserve System (the 'Federal Reserve Board'). Upon review of the federal conflict of interest statutes, the prohibition on compensation for dual offices, and the requirements of the Federal Reserve Act, we conclude that the relevant statutory authorities do not prohibit the proposed appointment, but that Dr. Rivlin must continue to perform her duties as Vice Chair of the Federal Reserve Board on a full-time basis. She would thus have to work with the Federal Reserve Board and its General Counsel to ensure compliance with the Federal Reserve Act."
United States. Department of Justice. Office of Legal Counsel
1998-06-01
-
Leaders' Guide for Contingency Operations: The Human Dimension
"This guide provides Army leaders with lessons learned that are vital to their success in contingency operations. Leaders can increase their effectiveness by addressing the issues discussed in this guide and implementing the relevant recommendations. The 13 issues presented here emerged repeatedly as problem areas in several contingency operations. They are 'people' issues (as opposed to tactical, technical, or strategic ones) and arise from the demands of contingency operations. The issues are based on feedback from soldiers and leaders who have participated in recent contingency operations. They reflect perceptions of experiences both prior to and during deployments. They also reflect areas that were successful as well as those that needed improvement.
Two overarching themes underlie the leadership lessons learned presented in this guide. The first theme is the need to anticipate and adapt to change. Changes often occur due to differences: (a) from garrison to the operation, (b) across different operations, and (c) at different points during the same operation. Leaders need to recognize that these changes will occur, understand the reasons for the changes, and help soldiers to adapt to the
changes. The second theme involves communication between leaders and soldiers. There is a clear need for more and better communication during contingency operations. Frequently the challenge is simply recognizing: (a) what message needs to be communicated, (b) who needs to hear it, (c) when they should hear it, and (d) the appropriate mode of communicating it."
U.S. Army Research Institute for the Behavioral and Social Sciences
1998-06
-
Federal Programs Offering Non-Structural Flood Recovery and Floodplain Management Alternatives
"This handbook begins with a discussion of the three non-structural strategies, and a listing of programs that support each one. This discussion is followed by summaries of the programs, ordered alphabetically and including their objectives, eligibility, cost-sharing requirements, available funding, and other important information. Index A provides a table cross-referencing the available Federal programs by type of assistance offered and agency. Index B provides a list of acronyms and abbreviations."
United States. Department of Homeland Security
1998-06
-
Health Hazard Evaluation Report 97-0304-2695; Racine Fire Department Racine, Wisconsin
"On September 5, 1997, the National Institute for Occupational Safety and Health (NIOSH) received a request from fire fighters of the Racine Fire Department to conduct a health hazard evaluation (HHE) of diesel exhaust exposure at fire stations within the city of Racine, Wisconsin. Health concerns indicated on the request included headaches and concerns about the possible carcinogenic risk associated with exposure to diesel exhaust. In response to the request, NIOSH investigators conducted an industrial hygiene evaluation at two fire stations on November 12 and 13, 1997. Environmental monitoring was conducted for components of diesel exhaust including nitrogen oxide (NO), nitrogen dioxide (NO2 ), elemental carbon (EC), and miscellaneous hydrocarbons. Personal breathing zone (PBZ) and area air samples were collected for EC at each station. Area samples were collected in the kitchen, apparatus bay, and in the fire fighters' sleeping quarters. Additionally, one background EC sample was collected outside of each station as a comparative measure. Exhaust ventilation flow rates were also measured to estimate air changes per hour in apparatus bays."
Centers for Disease Control and Prevention (U.S.); National Institute for Occupational Safety and Health
Roegner, Kevin C.; Echt, Alan
1998-06
-
Community Policing In Action: Lessons From an Observational Study
"Community policing--a relatively recent addition to law enforcement--aims to increase interaction and cooperation between local police and the people and neighborhoods they serve. Its goals are to reduce and prevent crime and to increase feelings of safety among residents. Passage of the Violent Crime Control and Law Enforcement Act of 1994 brought Federal support for implementing and evaluating many community policing programs."
United States. Office of Justice Programs
Parks, Roger B.; Worden, Robert E.; Mastrofski, Stephen D.
1998-06
-
CANUSWEST: Annex I: A Plan for Response to Oil and Hazardous Material Spills Along the Inland Border Between British Columbia, Canada and the United States
The U.S. Environmental Protection Agency and Environment Canada recognize that there is a high probability that there will be a spill or other release of oil or hazardous materials along the common border between Canada and the United States. In July of 1994 the Administrator of EPA and the Minister for the Department of Environment signed the Canada-United States Joint Inland Pollution Contingency Plan, which provides for co-operative measures for dealing with accidental and unauthorized releases of pollutants that cause or may cause damage to the environment along the shared inland boundary and that may constitute a threat to the public health, property or welfare. The Canada-United States Joint Inland Pollution Contingency Plan aims to provide an international coordination mechanism to ensure appropriate and effective cooperative preparedness, reporting, and response measures between Canada and the United States when a chemical accident occurs along the shared inland boundaries. The purpose of the plan is to specify the process, which would be used to activate federal government response on either side of the border, and to facilitate an effective joint response with state/provincial, local and where appropriate Tribal/Aboriginal people.
United States. Environmental Protection Agency
1998-06
-
Health Effects of Embedded Depleted Uranium Fragments (Armed Forces Radiobiology Research Institute Workshop, 15 November 1996)
During Operation Desert Storm (ODS) friendly-fire incidents resulted in patients wounded from embedded fragments of depleted uranium (DU) metal. Existing fragment removal
guidelines dictated fragments be left in place unless they were a present or future threat to health. An Armed Forces Radiobiology Research Institute (AFRRI) 1993 review of the potential health effects of allowing DU fragments to remain in place found no compelling evidence to warrant a change in the fragment removal policies. However, sufficient uncertainties existed concerning the health effects of embedded DU fragments to warrant implementation
of both patient follow-up and toxicological research programs. The Department of Veterans Affairs (DVA) is conducting a joint DoD/DVA patient
monitoring effort; and the DoD is funding a DU research program at AFRRI and at the Inhalation Toxicology Research Institute (ITRI). A meeting of these groups was held at AFRRI 15 November 1996 to review research efforts to date. This
report is a summary of the eight research efforts presented at the workshop.
Armed Forces Radiobiology Research Institute (U.S.)
1998-06
-
Secretary of State's Advisory Panel Report on Overseas Security, June 1998
"In convening the Advisory Panel on Overseas Security, the Secretary of State outlined the scope and dimension of the security problems that confront the United States in continuing to do diplomatic business overseas as well as in providing adequate reciprocal protection for foreigners stationed or visiting the United States on diplomatic business. With the cooperation of a wide range of U.S. Government domestic and foreign affairs agencies, the Panel has examined the issues that relate to diplomatic security in the U.S and overseas.
This report addresses questions of organization within the Department, professionalism of those executing security responsibilities, international diplomacy to thwart terrorism, the protection of foreign dignitaries and missions, certain intelligence and alerting processes, physical security standards, and the substantial building program that is required."
United States. Department of State
1998-06
-
Public Safety Wireless Network: Digital Land Mobile Radio (DLMR) Security Problem Statement
"This problem statement narrative, presented by the Public Safety Wireless Network (PSWN) program, highlights emerging security issues associated with evolving Public Safety radio communications systems. This narrative addresses the vital need for security from an infrastructure protection perspective, explains the cause of new security threats and vulnerabilities, and highlights the security challenges that face the public safety community. National Performance Review (NPR) recommendation IT04, the Public Safety Wireless Network (PSWN) Management Plan, Executive Order 13010, NPR Action Item A06, and the final report from the President's Commission on Critical Infrastructure Protection (PCCIP) have brought to the forefront of national efforts the protection of the evolving public safety communications infrastructure. Evolving public safety digital land mobile radio (DLMR) systems are envisioned as operating as large automated information systems (AIS) with open interfaces providing digital-based interconnectivity with other systems and subsystems. While the latest DLMR technology will increase the efficiency and effectiveness of public safety communications, a host of security risks could be introduced unless effective mitigating actions are undertaken based on security awareness and understanding. Most importantly, digital radio systems must be configured and managed in a way that will provide adequate protection from computer-based threats. Because the majority of DLMR systems now being rolled out across the country are not undergoing any form of security assurance process, the Public Safety Wireless Network (PSWN) program faces the challenge of investigating and addressing the security issues of the public safety communications infrastructure. The security-related issues facing the PSWN program are the lack of: an understanding of the security threats, vulnerabilities, and risks associated with the evolving DLMR systems; clearly specified communications security needs for public safety organizations; security standards or guidelines applicable to DLMR systems; and an understanding of the tools and techniques available to secure these systems."
United States. Department of Justice; United States. Department of the Treasury
1998-06
-
IRC on Your Dime? What You Really Need to Know about Internet Relay Chat, CIAC-2318
The purpose of this paper is to describe recent trends CIAC has encountered while working with sites that have been compromised. Frequently, the intruders set up and run Internet Relay Chat (IRC) to exchange information and to show off their success at having compromised a site. Invariably, this protocol consumes bandwidth, uses CPU cycles and is a source of embarrassment for the site. This paper focuses on these negative aspects of IRC and concedes that one can cite numerous examples where IRC is used in a positive manner.
Lawrence Livermore National Laboratory
Rayome, Jerry
1998-06
-
EPA/OSHA Joint Chemical Accident Investigation Report, Shell Chemical Company, Deer Park, Texas
This report from the Environmental Protection Agency and Occupational Safety and Health Administration discusses the explosion and fire at the Shell Chemical Company Complex in Deer Park, Texas, that occurred on June 22, 1997, response to the accident, the investigation, analyses, and identifies the root causes and the contributing factors of the accident. "An explosion and fire took place at the Shell Chemical Company Complex in Deer Park, Texas, on June 22, 1997, resulting in injuries, public sheltering, closure of transportation routes, and property damage both on and off site. EPA and OSHA undertook an investigation of this accident because of its severity, its effects on workers and the public, the desire to identify those root causes and contributing factors of the event that may have broad applicability to industry, and the potential to develop recommendations and lessons learned to prevent future accidents of this type. This investigation was conducted in conjunction with an investigation by OSHA to determine if violations of occupational safety and health laws had occurred. […] The JCAIT developed recommendations addressing the root and contributing causes to prevent a recurrence or similar event at this and other facilities."
United States. Environmental Protection Agency; United States. Occupational Safety and Health Administration
1998-06
-
Overcoming the ABM Treaty: Paths to National Missile Defense
Some of the most heated debates taking place on Capitol Hill surround a proposed American national missile defense system. The debate is not new. For twenty years, the Anti-Ballistic Missile (ABM) Treaty and its underlying acceptance of mutual assured destruction (MAD) enjoyed widespread support among U.S. leaders. Events of the early 1990s shook support for America's "no missile defense" posture to its very core. The fall of the Soviet Union, the proliferation of weapons of mass destruction (WMD) and ballistic missile technology, and the Gulf War presented new challenges to existing strategic doctrine. As a result, a renewed push for a U.S. National Missile Defense (NMD) system began in earnest, and a new round of debates began over the utility of the bilateral ABM Treaty in a multilateral post-Cold War international environment This thesis identifies four distinct paths which the United States could follow in addressing the NMD-ABM Treaty debate. Each path is characterized by distinct factors which historically have influenced past ABM system debates. The most likely path to NMD that the United States is following, based on these driving factors, is identified. The potential implications which this prevalent NMD path may have on U.S. Navy force structure and planning is also addressed. Understanding how the current NMD debate is structured and driven enables one to discern which path to NMD deployment the United States is on. This realization can help shape future force planning considerations.
Naval Postgraduate School (U.S.)
Keenan, Joseph M., Jr.
1998-06
-
Terrorism and Organized Crime: The Alliance of Tomorrow? How to Counter a Possible Future Threat
While in the post-Cold War era threats to international security have become less direct and apocalyptic, they are today more diffuse and insidious. With the probability of large scale, high intensity conflicts decreasing during the l990s, terrorism and transnational organized crime --each in itself-- constitute an increasing and serious threat to the national security of affected nations. Any alliance of these two criminal phenomena is likely to cause a disproportional increase of the overall threat. The thesis, while following an analytical/inductive approach, tries to identity the rationale for such alliances. Although aims and objectives of terrorists and organized criminal groups are different by nature, alliances of convenience have already formed in the past. With globalization apparently working in the favor of terrorists and organized crime, it seems to be only a question of time before they begin merging and start working jointly. Since those criminal organizations tend to exploit the weaknesses of international cooperation by increasingly operating in the transnational sphere, any attempt at a successtul counter-strategy has to meet this threat where it originates. Against this background, international cooperation of law enforcement agencies becomes increasingly important - "Internal Security", it seems, acquires a transnational dimension.
Naval Postgraduate School (U.S.)
Morbach, Gernot W.
1998-06
-
Special Operations Forces: Looking Forward
The article introduces the United States as the sole superpower. As such the U.S. is obligated to assist other countries in need or threatened by adversaries, as long as it's in our national interests. Future U.S. military involvement will not necessarily be driven by what our armed forces perceive to be a threat to our national security or interest, but how American society at large and our elected officials view threats, determine our national interests and how we wage war as a nation. Special operations forces today are global, joint and versatile. They operate world wide, with little fanfare, often in parts of the world where disease, poverty and civil strife riddle the countryside. They serve in extremely harsh, as well as permissive, environments, under the cover of darkness and increasingly, in the high-tech realm of cyberspace. They can operate as a cohesive joint service team or as a single service unit. A hallmark is frequent operations with coalition forces and other foreign militaries. Special operations forces support conventional forces in major conflicts, and they respond to conflicts or crises such as insurgencies, subversion, sabotage, narcotics trafficking and terrorism. They are not structured or expected to win wars single- handedly, but they can help prevent and deter them. As part of a theater joint task force, they can enable conventional forces to achieve victory. By anticipating changes in world development, analyzing our special operations force employment trends and examining American societal and cultural trends, will help prepare special operations forces for the future. Also in preparing for the future means considering what DoD's expectations will be for the use and role of special operations forces. General Shelton expects we will need special operations forces more th% ever in traditional roles, but they must also prepare for nontraditional environments and more sophisticated threats.
United States. Defense Modeling and Simulation Office
Shelton, Henry H.; Douglas, Michael W.
1998-06
-
Oslo and the Middle East Peace Process: The Negotiating Dilemma
With the increased threat posed by terrorism and the growth of rogue states' the importance of achieving a lasting peace in the Middle East is greater than ever. However, the peace begun in Madrid in 1991 and marked by the historic 1993 Oslo Accord between Israel and the PLO has floundered. This thesis provides a means for understanding the failure of the current peace process by analyzing why Israel and the PLO agreed to the terms of Oslo. While Israel was motivated by the opportunity to solve its security and political dilemmas on acceptable terms, the PLO was motivated primarily by concerns of organizational survival. The Oslo process departs from other successful settlements in two ways. First, Oslo focused on short-term arrangements, without consensus on the nature of the final outcome. An examination of successful settlements shows that the parties agreed to the outlines of a final settlement prior to commencing formal negotiations. Second, the vast imbalance of power between the two parties has made Oslo a hegemonic peace, which itself perpetuates instability in both the weaker and stronger states. Only parties enjoying a relative balance of power have concluded successful peace settlements in the Middle East. Given these structural anomalies, I conclude that the Oslo peace process will not achieve a lasting,peace between Israel and the Palestinians.
Naval Postgraduate School (U.S.)
Chatham, Robert L.
1998-06
-
Applying the Multiple Public Good Model for Establishing a Security Policy for Hungary
"This study was written with an aim to suggest a security policy approach for Hungary after becoming a member of NATO. The formulation of the country's security policy started with examination of security threats in general and analysis of Hungary's close security environment in particular. The analysis revealed that the threat of large scale military aggression has disappeared. However, other types of security challenges--economic crises, ethnic hostilities, environmental pollution, proliferation of weapons of mass destruction--prevailed, and the military concerns of security has decreased in importance. The issues of globalization, and diversification of threat perception could be addressed by cultivating a portfolio of security provisions. The multiple public good model suggested by Mark A. Boyer, an associate professor of political science at University of Connecticut, for analyzing defense alliances was an appropriate approach to formulation of Hungary's security policy. Based on the results from the threat assessment and the suggestions of the multiple good model, Hungary's security policy was introduced as a portfolio of defense provisions which in turn was Hungary's contribution to the Alliance. The evidence of contribution to the collective defense was seen through an examination of Hungary's path toward acceptance into NATO and an analysis of domestic stakeholders. The suggested portfolio contained three particularly Important fields: economic cooperation as a means of spreading security eastward, handling the questions of ethnic minorities in neighboring countries, and modernization of the Hungarian Defense Force."
Naval Postgraduate School (U.S.)
Kereki, Laszlo
1998-06
-
Making an Impact with Disaster Education - FEMA Community & Family Preparedness Conference
"Every year FEMA brings together emergency managers, American Red Cross volunteers, representatives from other government agencies and voluntary organizations, and leaders from business and the academic community to exchange information, form partnerships, and tackle the great challenges in disaster education. The event has been a catalyst in the development of a body of knowledge on how to conduct a successful community disaster education program. The American Red Cross -- FEMA's long-standing partner -- plays a major role in organizing and sponsoring the event. FEMA's 8th annual disaster education conference brought 80 disaster educators together at the Emergency Management Institute (EMI) in Emmitsburg, Maryland on June 9-12, 1998. Through group discussions, presentations, a public education fair, and various network building exercises, participants shared ideas and information around the theme, making an Impact with Disaster Education."
Emergency Management Institute (U.S.)
1998-06
-
Event Recorders for Rail Rapid Transit Systems
"The Federal Transit Administration, stimulated in part by a recommendation of the National Transportation Safety Board, is exploring the effectiveness and efficiency of using event recorders on rapid rail cars in recognition of NTSB's strong emphasis on the value of data derived from event recorders in rail accident investigations. This study presents and analyzes data, defines various aspects of using accident/incident event recorders, performs a cost, feasibility and benefit analysis, and identifies the technical requirements for these devices in rapid rail transit. Data from actual experience is used where available. Event recorders, defined in the broadest sense, are valuable for monitoring and diagnosis of equipment and system problems, for engineering and administrative management of system operations and system performance, as well as for accident and incident analysis. Several usable technologies are available. Costs of installing event recorders are likely to be different for older transit cars compared with those recently built. The lowest cost and least difficulty is incurred when these systems are installed during the construction of new cars. The assessment concludes that the greatest value accrues from a combination of recorder functions for operations, maintenance and diagnostics integrated with those needed for accident/incident investigation. The safety record in transit operations is good when compared to most other transportation modes, and it can be argued that accident investigation is often simpler for transit than, for example, for aviation and maritime applications. At the same time, the capture of complete, timely and accurate information for investigations, which recorders can provide, is highly beneficial."
United States. Department of Transportation
1998-06
-
DOE Exercise to Determine the Potential Impact of a Legally Binding BTWC Regime on DOE Sites
The Biological and Toxin Weapons Convention (BTWC) prohibits the stockpiling of biological materials in types or quantities not justifiable for protective, prophylactic, or other peaceful purposes. The parties to the Convention are discussing details of a legally binding regime for the BTWC, which will go beyond existing confidence building measures. The scope of this regime is unresolved, but may include a series of on-site measures designed, to varying degrees, to help enhance compliance with the BTWC. The Department of Energy Office of Nonproliferation and National Security (DOE/NN) planned and executed a mock BTWC inspection exercise at DOE, contractor and subcontractor laboratories in order to determine the potential impact of a legally binding regime for the BTWC on DOE biotechnology assets. Activities at DOE national laboratories related to refocusing missions and developing new markets has led to an increase in the number of complex arrangements with other government agencies, academia and the private sector. These complex arrangements can potentially increase the vulnerability of not only DOE assets, which are considerable, but those of partner institutions as well. The mock inspection was designed to test those vulnerabilities, and to examine several measures and issues that resulted from the Verification Experts (VEREX) process. The facilities participating in the mock inspection were the Inhalation Toxicology Research Institute (ITRI), the University of New Mexico (UNM) Department of Microbiology, and the Explosive Components Facility (ECF) at Sandia National Laboratories (SNL).
United States. Department of Energy
1998-06
-
Gangs, Extremists Groups, and the Military: Screening for Service
"The Security Research Center (SRC) of the Defense Security Service (DSS) is conducting a program of research addressing government and industry procedures for security prescreening. Considerable emphasis has been placed upon developing tools and procedures for prescreening personnel at the time of enlistment into the military services. The SRC was tasked by the Director of Accession Policy, ASD (Force Manpower Policy) to determine potential measures for identifying military personnel associated with gangs and extremist groups and to design procedures for screening members of such groups during the enlistment process. We reviewed the literature on gangs and extremist groups and examined actual incidents within military contexts. We also reviewed the military's current responses to the problem to include existing directives, policies and procedures. Particular attention was given to the prescreening of military applicants during the phases of the enlistment process. The report documents the strong efforts of the Armed Services to address the issues attending gang and extremist group members but also concludes that these efforts could be enhanced through better guidance to relevant military and civilian personnel. We present four main recommendations for improving the military's gang and extremist screening efforts and point to some areas for future research."
Defense Personnel Security Research Center (U.S.)
Wiskoff, Martin F.; Flacks, Marc
1998-06
-
Critical Link: Financial Implications of National Security Threats
"For most of the past century, the Naval War College has helped the national security community examine potential consequences of a wide range of crisis scenarios. Historically military and diplomatic responses were the focus of these activities. Because the number and types of issues affecting national security continues to grow, however, national security is no longer the special enclave of diplomats and soldiers. It was less than a decade ago that economic issues were first addressed in the President's National Security Strategy, and they were shortly joined by environmental issues as challenges that could adversely affect the nation. In October 1997, the Naval War College, in partnership with Cantor Fitzgerald, conducted the initial Economic Security Exercise exploring the link between maritime security issues and global financial markets....The success of the first Economic Security Exercise encouraged both institutions to conduct a follow-on event in order to broaden and deepen the discussion. Like the initial Economic Security Exercise, this workshop brought together key figures from the national security, governmental, and financial communities to explore and test the relationships between international events, national security, and financial markets. Participants (see Appendix A) included currency, commodity, fixed income, and securities traders. The overall purposes of the exercise were to draw insights and, where possible, explore options about how the various communities can work together to mitigate the unexpected effects of crises."
Naval War College (U.S.)
Hayes, Bradd C.
1998-06
-
Some Potential Risks at Lower Levels of Strategic Nuclear Weapon Arsenals
"An examination of the some of the risks if both the U.S. and Russia were to reduce their strategic nuclear inventories in future arms control environments. The risks considered include: loss of deterrence, launch on warning, and breakout or cheating. Assumed weapon limits for both sides included START III and a limit of 800 warheads on each side."
United States. Arms Control and Disarmament Agency
Nyland, F. S.
1998-06
-
Reducing the Threat of Biological Weapons
"'WEAPONS of mass destruction' is a terrifying term. We all have mental images of the horrors of a nuclear attack, and photos of Kurdish and Iranian casualties of Iraqi chemical attacks attest to the devastation of chemical weapons. The third weapon of mass destruction--the biological weapon--has been around at least since the Middle Ages when soldiers catapulted the bodies of dead smallpox victims over fortress walls in the hope of infecting their enemies or at least demoralizing them... Biological agents are of concern in part because of the ease with which many of them can be manufactured, transported, and dispensed. And because of the lag time between a biological attack and the appearance of symptoms in those exposed, biological weapons could be devastating. Many biological agents are contagious, and during this lag time, infected persons could continue to spread the disease, further increasing its reach. Hundreds or even thousands of people could become sick or die if a biological attack were to occur in a major metropolitan area. With the knowledge that several nations have produced and perhaps also deployed biological warfare agents, Congress in 1996 passed the Defense Against Weapons of Mass Destruction Act, which authorizes the Department of Energy to establish a Chemical and Biological Weapons Nonproliferation Program. Under this and similar programs, Lawrence Livermore and other laboratories and institutions are working together to increase this country's capabilities to detect and respond to an attack by biological or chemical weapons."
Lawrence Livermore National Laboratory
Spring, Baker
1998-06
-
Immigration Statistics: Status of the Implementation of National Academy of Sciences' Recommendations, Report to Congressional Requesters
"The quality of immigration statistics has been a long-standing issue among experts in the public and private sectors. The National Academy of Sciences (NAS) issued two reports in which it made recommendations regarding the need to improve the collection and management of immigration statistics. The recommendations were directed to various federal organizations, including Congress, the Department of Justice (DOJ), Immigration and Naturalization Service (INS), Office of Management and Budget (OMB), and Bureau of the Census. This report responds to your request that we provide information on the implementation status of the major recommendations to Congress, the agencies, and OMB in these reports. Specifically, we summarized NAS recommendations and determined what, if any, action Congress, the agencies, and OMB took in response to the 13 major recommendations in the 1985 NAS report and all 6 recommendations in the 1996 NAS report. Also, in your request, you asked us to assess demographic, statistical information on the foreign-born population and federal policies affecting immigration statistics. As agreed with your Subcommittee, we will provide this information at a later date."
United States. General Accounting Office
1998-06
-
Wildfire Prevention Patrol Guide
"The use of our wildlands by people, living, working and recreating is increasing rapidly in today's world. Many areas that received light visitor use a few years ago, now experience large numbers of people over an extended recreational season. The increased use of our wildlands escalates the risk of fire ignitions which threaten and damage human life, homes, property and natural resources. The wildfire prevention strategies which are most effective dealing with these types of human ignitions fall within the categories of education and enforcement. The most effective implementation of these prevention actions occur immediately before, during or after these activities take place. For example, it is proven that the most effective prevention actions that reduce recreational campfire ignitions include posting signs at specific camping locations, educating the specific target or user group and conducting highly visible patrols during periods of high fire danger. The irony of this situation is that as human-use of our wildland areas has increased, agency patrols and presence in these use areas has often decreased-generally, as a result of increased operating costs and decreased agency staffing. The challenge to proactively prevent unwanted loss of life, property and natural resources then becomes 'Implement effective prevention patrols in high risk, hazard and value areas during periods of increased fire danger with limited resources.' This guide is designed to help you take this first step and develop the appropriate and effective patrol plan for your area. The challenge that may remain is to garner agency support for and implement a proactive prevention program."
National Wildfire Coordinating Group (U.S.)
1998-06
-
FBI Law Enforcement Bulletin: June 1998
This issue provides an article about the number of effective strategies to help police officers prevent alcohol abuse by underage drinkers. Another article examines how some criminals are turning computers into clandestine remote-controlled listening devices. The bulletin also includes an article about the multidisciplinary response to domestic violence, as well as an article addressing workplace privacy. Regular departments provide information on mobile data access, family violence, death row data, and unidentified victims.
United States. Federal Bureau of Investigation
1998-06
-
International Crime Control Strategy
International criminal activity has increased in scale and extent in the wake of globalization, becoming a complex worldwide threat. International criminals today engage in a wide range of illegal activities, including drug trafficking, terrorism, alien and contraband smuggling, fraud, extortion, money laundering, bribery, economic espionage, intellectual property theft, and counterfeiting. Many also resort to extreme violence to advance their criminal enterprises. International criminals ignore borders, except when seeking safe haven behind them. They move sums of money through the international financial system that are so huge they dwarf the combined economies of many nations. They are often organized in multi-crime businesses, and they have capitalized on growth in international communications and transportation to expand their criminal operations and form potent alliances. They threaten all nations, including our own. International crime is not only a law enforcement problem; it is a formidable and increasing threat to national and international security. This document discusses the corrosive activities of international criminals in the post-Cold War era, and how they no longer threaten particular countries or regions, but threaten the whole world.
National Security Council (U.S.)
1998-06
-
Bioterrorism as Public Health Threat
In addition to meeting the continuing threat of new and reemerging infectious diseases, public health officials must also prepare for the possible use of infectious agents as weapons by terrorists to further personal or political agendas. These were the conclusions of session panelists. The potential spectrum of bioterrorism ranges from hoaxes and use of non-mass casualty devices and agents by individuals and small groups to state-sponsered terrorism that employs classic biological warfare agents and can produce mass casualties. If released under ideal environmental circumstances, certain agents can infect hundreds of thousands of persons and cause many deaths. Such scenarios would present serious challenges for patient management and for prophylaxis of exposed persons; environmental contamination could provide a continuing threat to the population and generate panic in the community.
Centers for Disease Control and Prevention (U.S.)
Franz, David R.; McDade, Joseph E.
1998-06