Advanced search Help
Clear all search criteria
Only 2/3! You are seeing results from the Public Collection, not the complete Full Collection. Sign in to search everything (see eligibility).
-
Background Data Measures for Predicting Security Risks: Assessment of Differential Moderators
"The performance of any organization is contingent on the integrity and responsibility of its employees. Employees who provide competitors or, for that matter, other government(s), with sensitive information may cause untold financial damage and the loss of lives and livelihood. A leader who makes decisions that hurt long-term growth to get a bonus harms not only the people employed by the organization but also the organization's future economic growth. These observations point to a major problem confronting government and industry: How can we ensure employee integrity and control these socially destructive acts? In light of these observations, the intent of the present study was two-fold. First, to provide additional evidence for the validity of a general model describing the personal characteristics contributing to the propensity for destructive acts. Second, to identify the life events that contribute to the expression of these characteristics and development of the propensity for destructive acts. It was hoped that these measures might be used in screening job applicants and monitoring the risk level of current employees."
Defense Personnel Security Research Center (U.S.)
Mumford, Michael D.; O'Connor, Jennifer; Gessner, Theodore L.
1994-01
-
Research Paper: The Challenge of Mass Asylum
This research paper discusses conditions of asylum and the issues with how the term refugee is defined. It also deals with the issue of potential acute mass asylum flows from Haiti, Cuba, China, or elsewhere and what should be done about the possibility of such mass asylum flows. The author concludes paper with ten recommendations that the U.S. Commission on Immigration Reform should consider and discuss.
U.S. Commission on Immigration Reform
Keely, Charles B.
1994-01
-
Reconsideration of Prior Opinion Concerning Land-Grant Colleges: Memorandum for James S. Gilliland, General Counsel, Department of Agriculture [December 23, 1993]
"This responds to your request that this Office reconsider our opinion that West Virginia may designate West Virginia State College (State College) as the beneficiary of appropriated funds under the Second Morrill Act, Act of August 30, 1890, ch. 841, 26 Stat. 417 (codified as amended at 7 U.S.C. §§ 321-326, 328), and that, upon such designation, State College would become eligible to receive appropriated funds for agricultural research and extension under 7 U.S.C. §§ 3221, 3222, and 3223. After reviewing the matter once more, we hereby withdraw our original opinion in favor of the revised views expressed in this memorandum. As explained below, we adhere to our earlier conclusion that West Virginia may validly designate State College as the beneficiary of appropriated funds under the Second Morrill Act. We reverse, however, our original conclusion that West Virginia's designation of State College as a Second Morrill Act beneficiary made that school eligible for funds appropriated pursuant to 7 U.S.C. §§ 3221, 3222, 3223 and similar statutes. (Following the usage of Agriculture, we shall refer to these statutes collectively as the '1890 derivative statutes.') Rather, we conclude that State College is not eligible for funds under the 1890 derivative statutes."
United States. Department of Justice. Office of Legal Counsel
1993-12-23
-
Admissibility of Alien Amnesty Application Information in Prosecutions of Third Parties: Memorandum for the Inspector General, Department of Justice [December 22, 1993]
"This memorandum responds to your request for our legal opinion on whether the confidentiality provisions of 8 U.S.C. § 1255a(c)(5) bar Justice Department prosecutors from introducing evidence consisting of information submitted as part of an illegal alien's application for amnesty in a criminal prosecution of a third party. We conclude that (1) the introduction of such evidence is generally barred under the plain language of the statute but (2) it is not barred by the statute in the prosecution of third parties for crimes (e.g., the acceptance of a bribe by a government official for approving a false amnesty application) that facilitate or are closely related to the false amnesty application violations covered by 8 U.S.C. § 1255a(c)(6). It should also be noted that a defendant who is not himself the alien whose amnesty application file is used in violation of the statute would not likely have standing to move for suppression of (c)(5) information. However, Justice Department use of amnesty application information is also subject to a specific regulation promulgated by INS, and that regulation limits use against third parties to the prosecution of persons who have 'created or supplied a false writing or document for use in [an amnesty application].' 8 C.F.R. § 245a.2(t)(3), (4) (1993). We believe that language would generally allow use of (c)(5) material to prosecute INS employees who take bribes to approve false amnesty applications, based on the reasoning that such an employee participates in the creation of falsified documents used in an amnesty application."
United States. Department of Justice. Office of Legal Counsel
1993-12-22
-
DoD Directive 5230.16: Nuclear Accident and Incident Public Affairs (PA) Guidance
This Directive reissues DoD Directive 5230.16, February 7, 1983 to update DoD policy, responsibilities, and procedures for the prompt release of information to the public in the interest of public safety, and to prevent public alarms in the event of accidents or significant incidents involving nuclear weapons or nuclear components, radioactive material, nuclear weapon launch or transport vehicles (when a nuclear weapon is aboard), or nuclear reactors under DoD control. Updates DoD policy, responsibilities, and procedures during an improvised nuclear device (IND) incident.
United States. Department of Defense
1993-12-20
-
Forts and Blockhouses: Field Fortification in the Rear Area
"This monograph examines US Army doctrine concerning field fortifications in the rear area, and determines whether this doctrine is appropriate based upon the rear area requirements of the Army's keystone doctrinal manual, FM 100-5, Operations. The 1993 version of FM 100-5 provides for a force projection Army in place of the forward deployed Army of the Cold War. In the forward deployed Army, allies provided rear area security assistance, and rear areas were on friendly territory. In force projection operations, however, US forces may receive little rear are assistance, and rear areas may be on neutral or hostile territory. One response to these increased challenges is to fortify the rear area."
U.S. Army Command and General Staff College
Steffan, Grant D.
1993-12-20
-
Clarification of Prior Opinion Regarding Borrowing by Bank Examiners: Memorandum for the General Counsel, Board of Governors, Federal Reserve System [December 20, 1993]
"This responds to your request that we clarify an aspect of an opinion previously issued by this Office respecting 18 U.S.C. § 213, which prohibits a bank examiner from borrowing from any Federal Reserve member bank or other covered entity that he examines, or any person connected therewith. See 'Memorandum Opinion for the Secretary of the Board, Federal Reserve Board', 6 Op. O.L.C. 509 (1982) ('1982 opinion'). Specifically, you have asked us whether footnote 8 from that opinion should be construed to mean that 18 U.S.C. § 213 prohibits bank examiners from receiving loans or credit from affiliates of member banks that they have examined in all cases where such affiliates are under 'common control' with the bank, or where the two entities have a common majority of corporate officers or directors. We conclude that such a construction is not required by the statute, except where the affiliated bank is serving as a conduit or 'front' for the implementation of a loan that is actually being extended due to the direction, instigation, or influence of the member bank or person connected therewith."
United States. Department of Justice. Office of Legal Counsel
1993-12-20
-
Tactical Methods For Combatting Insurgencies
From the document abstract: "This monograph assesses U.S. Army light infantry battalions training for conducting counterinsurgency operations. Military forces should be trained and ready for counterinsurgency warfare because they might be committed to fight in an insurgency. Army training doctrine requires units to identify their mission essential tasks and then train to execute those tasks. The light infantry battalions' mission essential task lists are analyzed to determine if training on those tasks prepares the infantry battalions to conduct counterinsurgency operations. The research methodology involved studying revolutionary warfare, historical experiences, counterinsurgency theory, and U. S. doctrine for combating insurgencies. An analysis based on the nature of the insurgency and U.S. Army doctrine determines the criteria used to evaluate the mission essential tasks of the light infantry battalions. Although training on the light infantry battalions' mission essential tasks prepare those units for a conventional conflict, training on their mission essential tasks will not prepare those units for unconventional counterinsurgency warfare. The light infantry battalions need additional training on specified tasks and on the nature of insurgencies to conduct counterinsurgency operations. The current infantry battalions' mission essential task lists are not comprehensive for counterinsurgency operations. The battalions' mission essential task lists need additional tasks such as cordon and search, search and attack, area ambush, encirclement, movement security, civil military operations, and training of indigenous forces. U.S. Army light infantry battalions require extensive training prior to commitment into counterinsurgency warfare."
U.S. Army Command and General Staff College. School of Advanced Military Studies
Heritage, Gregory M.
1993-12-19
-
Doctrinal Functions of Intelligence: Are They Applicable to Peacekeeping and Peace Enforcement Operations?
From the thesis abstract: "Today's Army finds itself increasingly involved in 'Operations Other Then War', specifically peacekeeping and peace enforcement operations. Effective intelligence support is essential for success in these operations. This monograph examines the doctrinal functions of intelligence and their applicability to peacekeeping and peace enforcement operations. The monograph first discusses the six doctrinal functions of intelligence; Indications and Warning, Intelligence Preparation of the Battlefield, Situation Development, Force Protection, Target Development/Target Acquisition, and Battle Damage Assessment. Next historical cases are examined to determine the tactical intelligence requirements during peacekeeping/peace enforcement. Finally, the functions of intelligence are compared to identified intelligence requirements to determine their applicability. This monograph concludes that the functions of intelligence are applicable to both peacekeeping and peace enforcement. However, traditional means to accomplish these functions are not effective in peacekeeping/peace enforcement. These operations require significant changes in the intelligence structure of the force, a reliance on human intelligence capability, and a intelligence focus that synthesizes military, political, and cultural aspects of the operation, into all intelligence analysis."
U.S. Army Command and General Staff College. School of Advanced Military Studies
Hunter, Jonathan B.
1993-12-17
-
Greening of Global Security: The U.S. Military and International Environmental Security
From the thesis abstract: "This thesis examines the roles and missions of the U.S. military, and compares them to potential international environmental conflicts. Five specific environmental issues are examined in detail: deforestation, fresh water, nuclear contamination, overpopulation, and ecological terrorism. Ten U.S. military roles are also examined in detail: communications, interdiction, enforcement, education and training, assistance, leadership, warfighting, surveillance, intelligence, and deterrence. Analysis reveals that the U.S. military can play a support role in the majority of the environmental conflict issues. Use of force roles apply to fewer of the environmental issues. The U.S. military's primary use of force role of warfighting applies only to one environmental issue."
Naval Postgraduate School (U.S.)
Carr, Roberta B.
1993-12-16
-
Military Handbook: Design Guidelines for Physical Security of Facilities
"This manual provides guidance to ensure that appropriate physical security considerations are included in the design of facilities. The pre-design phase, including physical security threats, arc discussed initially, followed by an overview of the design phase. Specific technical sections include exterior site physical security, building physical security, ballistic attack hardening, standoff weapon hardening, and bomb blast hardening."
United States. Department of Defense
1993-12-15
-
AF Instruction 14-103: Threat Recognition Training Program
This instruction implements AFPD 14-1, "Intelligence Management", and DIAM 57-25, "Coordination, Production, and Maintenance of Joint Recognition Materials" (copy available through the Defense Intelligence Agency [DIA]). This instruction details requirements and responsibilities for the US Air Force Recognition Training Program. This revision aligns the instruction with AFPD 14-1. This publication is available digitally on the SAF/AAD WWW site at: http://afpubs.hq.af.mil.
United States. Department of the Air Force
1993-12-10
-
Authority to Pay State and Local Taxes on Property After Entry of an Order of Forfeiture: Memorandum for Cary H. Copeland, Director and Chief Counsel, Executive Office for Asset Forfeiture, and James Knapp, Deputy Director, Asset Forfeiture Office, Criminal Division [December 9, 1993]
"You have requested advice on two matters: a proposed Directive from the Executive Office for Asset Forfeiture ('Directive') that would authorize payment of state and local taxes on some civilly forfeited property for which the court had notice of a state or local tax claim before the court entered an order of forfeiture, and a draft Memorandum from the Asset Forfeiture Office, Criminal Division, to the Attorney General ('AG Memo') concluding that the Attorney General may pay state and local taxes on criminally forfeited property (and proposing an Attorney General Order to delegate such authority to the Director of the Asset Forfeiture Office). The proposed Directive and the draft AG Memo both raise the question of the Attorney General's discretionary authority to pay taxes, for the period from the offense giving rise to forfeiture to the entry of an order of forfeiture, on property for which a court has already entered an order of forfeiture. […] We now conclude that payment of taxes on civilly forfeited property on the terms set forth in the proposed Directive would not be inconsistent with the civil forfeiture statute and would not exceed the Attorney General's equitable discretion under the civil forfeiture laws. We also conclude that payment of taxes on criminally forfeited property in the circumstances apparently envisioned by the draft AG Memo would not be unlawful under the criminal forfeiture laws or beyond the Attorney General's equitable, discretionary authority under such laws. In addition, we describe revisions to the draft AG Memo necessary to assure accuracy in its description of OLC [Office of Legal Counsel] advice."
United States. Department of Justice. Office of Legal Counsel
1993-12-09
-
Applicability of Executive Order No. 12674 to Personnel of Regional Fishery Management Councils: Memorandum to Ginger Lew, General Counsel, Department of Commerce [December 9, 1993]
This memorandum responds to your request for our opinion whether Executive Order No. 12674, 3 C.F.R. 215 (1989 Comp.) (Order), and the regulations implementing it apply to officials of the Regional Fishery Management Councils (Councils) established under the Magnuson Fishery Conservation and Management Act, 16 U.S.C. §§ 1801-1882 (Magnuson Act or FCMA). The officials in question are the Council members appointed by the Secretary of Commerce (Secretary) and the Councils' executive directors and administrative employees. We conclude that, under the unusual statutory scheme of the Magnuson Act, appointed Council members and the other Council personnel under consideration are not Executive Branch 'employees' subject to the Order."
United States. Department of Justice. Office of Legal Counsel
1993-12-09
-
Constitutionality of Vesting Magistrate Judges with Jurisdiction Over Asset Forfeiture Cases: Memorandum to Stef Cassella, Deputy Director, Policy and Litigation, Asset Forfeiture Office [December 6, 1993]
"You have asked whether Congress may constitutionally enact a statute requiring that asset forfeiture cases involving property valued below a certain level be heard by a United States Magistrate Judge rather than a United States District Judge. The limitations imposed by Article III forbid Congress to assign jurisdiction over such cases to a Magistrate Judge without the assent of the parties. Therefore, we must advise you that the provision you have described would be unconstitutional."
United States. Department of Justice. Office of Legal Counsel
1993-12-06
-
Tsunamis Affecting the West Coast of the United States: 1806-1992
From the Purpose: "This catalog of tsunamis affecting the west coast of the United States was compiled to provide a more accurate and complete information base on these phenomena for scientific and hazard mitigation purposes. The catalog builds on the section treating the west coast in 'United States Tsunamis, 1690 to 1988' (Lander and Lockridge, 1989). In the preparation of the earlier catalog many questions arose regarding tsunami events on the west coast of the United States that could not be answered without further research. Detailed description information is included to better characterize the tsunami hazard. A simple listing of the occurrence, maximum heights, number of casualties, and dollar losses is not adequate to fully understand the hazard. This understanding is a necessary but not always observed first step toward mitigation."
United States. National Oceanic and Atmospheric Administration
Kozuch, Michael J.; Lockridge, Patricia A.; Lander, James F.
1993-12
-
Executive Order 12884: Delegation of Functions Under the Freedom Support Act and Related Provisions of the Foreign Operations, Export Financing and Related Programs Appropriations Act
This executive order grants the Secretary of State, the International Development Cooperation Agency, the Secretary of Agriculture, and other agencies a number of functions.
United States. Office of the Federal Register
Clinton, Bill, 1946-
1993-12-01
-
Analysis of Cellular Telephone and INMARSAT Systems for Providing Radio Data Link Computer Communications for US Navy Vessels
From the thesis abstract: "This thesis examines radio frequency data link computer communications systems with emphasis on their potential application to ship/shore communications. Covered are two systems that experts believe hold the most promise for DoD [Department of Defense] application, International Maritime Satellite (INMARSAT) and cellular radiotelephones. An analysis of system capabilities, cost, and future potential is performed for each, and then the two systems are compared. In addition, a thorough discussion of the security issues for each system and final conclusions/recommendations are presented. The conclusions suggest that increased cellular radiotelephone usage vice INMARSAT by fleet units would optimize fleet readiness and improve supply system performance. Based on these conclusions, this author's recommendation is that all Navy ships be equipped with a cellular telephone system, while all aircraft carriers and amphibious aircraft carriers be equipped with both cellular and INMARSAT systems."
Naval Postgraduate School (U.S.)
Cooper, David L., Jr.
1993-12
-
Role of Telecommunications in Hate Crimes
"Racism and bigotry strike at the heart of those values that the United States cherishes in its society -- especially the fundamental tenet that all persons are created equal. Despite the progress that has been made over the last few decades, there unfortunately remain vestiges of racial, ethnic, or other types of prejudice in some Americans. In some instances, those prejudices run so deep that they motivate the commission of so-called 'hate crimes' -- crimes directed at individuals because of their race, religion, ethnicity, or sexual orientation. There has been concern that some are using telecommunications to advocate and encourage the commission of hate crimes. Because telecommunications by its nature involves expression (often combining images and sound), government's response to these concerns must be measured with respect to other cherished rights -- particularly those guaranteed by the First Amendment."
United States. National Telecommunications and Information Administration
1993-12
-
Counterproliferation Program Review Committee Annual Report to Congress: Executive Summary (1994)
In accordance with NDAA 94, this report provides a top-down overview of existing, planned and proposed capabilities and technologies, as well as a description of priorities, programmatic options and other issues. Other than Nunn-Lugar activities, this report specifically excludes activities and programs for dealing with extant weapons of mass destruction and the means to deliver them in the Former Soviet Union (FSU) and China, but does address non/counterproliferation activities and programs for dealing with issues germane to the proliferation of WMD through illicit export of materials, technology, and expertise from FSU states. The report discusses ongoing and planned Agency programs and activities that are unique to the non/counterproliferation problem as well as those that are strongly related. The funding summaries presented for these efforts are estimates. The report focuses on the non/counterproliferation capabilities to support US policy goals.
United States. Department of Defense
1994
-
Pending Crisis in North Africa
"The goal of the conference was to exchange views on regional security challenges, their underlying causes, and appropriate strategies for addressing them. Differing Tunisian and American perceptions of these challenges soon emerged. The American security concern is two-tiered: the shorter-term threat is the incremental spread of radical Islam, ultimately capturing the region, creating a tide of refugees in France, Italy, and Spain. The longer-term threat is the possibility that radical- leaning regimes would acquire weapons of mass destruction and that those regimes would disrupt the Middle East peace process. Other American concerns included controlling state-directed terrorism and the possible resurgence of dormant non-Islamic radicalism by anti- Western and anti-U.S. figures, such as Qadhafi. The Tunisian delegation emphasized three concerns: (1) the inherent vulnerability of Tunisia to unwanted external political and military influences, (2) the imperative of sustaining successful economic and social reform programs, and (3) the importance of playing a low-profile, intermediary role in regional affairs. "
National Defense University. Institute for National Strategic Studies
Lewis, William Hubert, 1928-
1994
-
Melting the Organizational Boundaries in Border Security: An Initiative for the 1990s
"The World Trade Center is bombed. Between two and four million illegal aliens are currently in the U.S. A ship laden with Chinese indentured servants runs aground in New York City. What is the common link? Do we have a border security system or not? Can we improve border security in a way that is consistent with the longstanding humanitarian traditions of this nation? This paper examines the history of border security and the contemporary situation. It reviews various 'fixes' to that system which have been proposed during the past fifteen years. Drawing upon the lessons learned from the case of Sheikh Omar Abdurrahrnan (the 'Blind Sheikh' of World Trade Center fame), the paper develops a proposal for 'reinventing' U.S. border security by establishing a Border Security Agency (BSA). This agency, which would report to the Attorney General, would absorb all immigration and customs responsibilities currently held by the Department of State, the Customs Service of the Treasury and the Immigration and Naturalization Service of the Department of Justice. The paper argues that establishing a BSA would help ensure a seamless and effective border security system which would operate from the embassy or consulate in which a visa is issued through port-of-entry processing in the United States."
Industrial College of the Armed Forces (U.S.)
Moss, Frank E.
1994
-
Role of the U.S. Government in Industrial Espionage
You can always find an article in the newspaper about military or political espionage, but only recently have we seen literature on other countries stealing our economic secrets. The fact is that they've been doing it for thousands of years - not just enemies, but allies as well. What if someone claimed that the American economy loses over $50 billion each year due to economic espionage by other nations. We must develop and implement intelligence policy to protect America's jobs and economy, while maintaining a delicate balance between government and business.
Industrial College of the Armed Forces (U.S.)
Stewart, Phillip
1994
-
Islam a Threat to the West? Maybe (Maybe Not)
"Christendom, for most of the past millennium and a half, denoted mainly white Christians from the Urals to the Atlantic. By the middle of the lat century and as it became increasingly more secularized, Christendom became known dimply as Europe. 'Europe discovered, named, and in a sense made American.' Although other races and cultures participated in the creation of America, in the eyes of the rest of the world, Europeans dominated in the giving of religion, language, and customs. Together these two became the West, the most influential power of the last four centuries. Today, the West feels the influence of a 'new' power-Islam-and this change is frightening not only ordinary men, but even the intelligentsia. The goal of this paper is to review the academic arguments concerning the threat of Islam, increase the reader's knowledge of Islam, dispel the fear that Islam is the new 'evil empire,' and challenge Western policy makers to reconsider their concerns about the threat of Islam." The author focuses on African, Arab and Persian Islam.
Industrial College of the Armed Forces (U.S.)
Frahler, Donald A.
1994
-
Automating Military Support to Civil Authorities
"This paper discusses how the Department of Defense can use automation in accomplishing its Military Support to Civil Authorities (MSCA) mission. It describes the successful implementation of a commercial, off-the-shelf graphical information software system at an Army level headquarters. Lessons learned from that experience demonstrate the feasibility of exporting a similar system to all headquarters responsible for MSCA. The final section of the paper suggests that the Federal Emergency Management Agency take the lead in promoting improvements in the automation environment for all organizations participating in disaster management."
Industrial College of the Armed Forces (U.S.)
Mayer-Kielmann, Michael
1994
-
Atmospheric Release Advisory Capability: Real-Time Modeling of Airborne Hazardous Materials
"The Atmospheric Release Advisory Capability (ARAC) at Lawrence Livermore National Laboratory is a centralized federal project for assessing atmospheric releases of hazardous materials in real time. Since ARAC began making assessments in 1974, the project has responded to over 60 domestic and international incidents. ARAC can model radiological accidents in the United States within 30 to 90 rein, using its operationally robust, three-dimensional atmospheric transport and dispersion models, extensive geophysical and dose-factor databases, meteorological data acquisition systems, and experienced staff. Although it was originally conceived and developed as an emergency response and assessment service for providing dose-assessment calculations after nuclear accidents, it has proven to be an extremely adaptable system, capable of being modified to respond also to nonradiological hazardous releases. In 1991, ARAC responded to three major events: the oil fires in Kuwait, the eruption of Mt. Pinatubo in the Philippines, and an herbicide spill into the upper Sacramento River in California. Modeling the atmospheric effects of these events added significantly to the range of problems that ARAC can address and demonstrated that the system can be adapted to assess and respond to concurrent, multiple, unrelated events at different locations."
Lawrence Livermore National Laboratory
Ellis, James S.; Foster, Kevin T.; Sullivan, Thomas J.
1993-12
-
Weapon Systems: United States Army 1994
The disintegration of the Soviet Union dramatically changed the world security environment. Instead of focusing on global conflict and the containment of a monolithic threat, U.S. strategy must now focus on the potential that smaller but far more numerous hot spots may quickly turn into threats to our national security. The National Military Strategy cites four dangers to that
Security Classification: (1) Proliferation of weapons of mass destruction; (2) Regional, ethnic, and religious threats to U.S. interests; (3) The possible failure of democratic reforms, especially in the former Soviet Union; and (4) The possible failure to build a strong and growing U.S. economy.
United States. Assistant Secretary of the Army (Research, Development, and Acquisition)
1994
-
Effects of Directed Energy Weapons
Effects of Directed Energy Weapons is an encyclopedic treatment of how Directed Energy Weapons work, how the energy of these weapons is propagated to the target, and how the weapon/beam-target interaction creates effects (damage) in the target. This is a technical exposition, written at the undergraduate physics and engineering level that could serve either as a text book or as a reference text for technical practitioners. The text addresses Kinetic Energy Weapons in addition to Lasers, Microwaves and Particle Beams.
National Defense University
Nielsen, Philip E.
1994
-
Against the Wind: Protecting Your Home from Hurricane Wind Damage
"During a hurricane, homes may be damaged or destroyed by high winds and high waves. Debris can break windows and doors, allowing high winds inside the home. In extreme storms, such as Hurricane Andrew, the force of the wind alone can cause weak places in your home to fail. After Hurricane Andrew, a team of experts examined homes that had failed and ones that had survived. They found four areas that should be checked for weakness--the roof, windows, doors, and if you have one, garage door. In this brochure, we discuss some things you can do to help make your home stronger before the next hurricane strikes. You may need to make some improvements or install temporary wind protection. It is important that you do these projects now, before a hurricane threatens. While these projects, if done correctly, can make your home safer during a hurricane, they are no guarantee that your home wont be damaged or even destroyed. If you are told by authorities to evacuate, do so immediately, even if you have taken these precautions."
United States. Federal Emergency Management Agency
1993-12
-
Significant Incidents of Political Violence against Americans 1994
"This chronology is designed to encompass major anti-U.S. incidents that occurred in 1993. Unfortunately, to keep this publication at the unclassified level, some incidents had to be omitted due to the sensitive nature of the information associated with them. The selection of incidents used in this study was based upon the following criteria: lethality, substantial, property damage, use of unusual tactics or weapons, and perceptibility of targets as U.S. or representative of U.S. interests."
United States. Department of State. Bureau of Diplomatic Security
1994