Advanced search Help
Clear all search criteria
Only 2/3! You are seeing results from the Public Collection, not the complete Full Collection. Sign in to search everything (see eligibility).
-
Joint Tactics, Techniques, and Procedures for Mortuary Affairs in Joint Operations
"This publication establishes joint doctrine and provides joint tactics, techniques, and procedures (JTTP) for mortuary affairs in joint operations to a joint force commander (JFC) and staff. It outlines procedures for the search, recovery, evacuation (to include tracking of remains), tentative identification, processing, and/or temporary interment of remains in theaters of operations. This JTTP addresses decontamination procedures for handling contaminated remains and provides for the handling of personal effects of deceased and missing personnel."
United States. Joint Chiefs of Staff
1996-08-28
-
Field Manual 100-6: Information Operations
This manual addresses the operational context of information operations (IO), relevant terminology, and the environment of information operations. It supports battle command and provides guidelines for commanders that conduct IO to support all phases of the force-projection operating environment, including
planning and executing early entry and force-projection operations in joint and multinational settings. Military operations occur in peace and war. The traditional focus when discussing information and C2 was electronic warfare (EW), electronic countermeasure (ECM), and electronic counter countermeasure (ECCM) operations that take place during war. The focus of this manual is on command and control warfare (C2 W), public affairs (PA), and civil affairs (CA). All are operations that the Army currently uses to gain and maintain information dominance as well as effective C2. Successful operations require effective C2 to transform military capabilities into applied military power. The more effective the force's C2 system, the more completely its capabilities can be realized in peace or war. As the Army's capstone doctrine for IO, this manual supports soldiers and leaders that execute IO to support military operations. Not only does the doctrine herein provide commanders and their staffs with guidance to conduct information operations, it also serves as the foundation for development of US Army tactics, techniques, and procedures (TTP) manuals. It is also the foundation to refine existing training support packages (TSPs), mission training plans (MTPs), training center and unit exercises, and service school curricula. The manual provides a basis to examine organizations and materiel developments applicable to IO.
United States. Department of the Army
1996-08-27
-
Department of Defense Joint Technical Architecture: Version 1.0
"The JTA identifies a common set of mandatory information technology standards and guidelines to be used in all new and upgraded C4I acquisitions across DoD. The JTA standards are to be used for sending and receiving information (information transfer standards such as Internet Protocol suite), for understanding the information (information content and format standards such as data elements, or image interpretation standards) and for processing that information The JTA also includes a common human-computer interface and rules for protecting the information (i.e., information system security standards."
United States. Department of Defense
1996-08-22
-
Flame, Riot Control Agents and Herbicide Operations
"The US has renounced first use of herbicides in war except under regulations applicable to domestic use or for control of vegetation within US bases and installations and around their immediate perimeters. The US has renounced the first use of RCAs in war. US forces will only use RCAs in war in defensive modes to save lives as approved by the President. In wartime, use of RCAs outside the war zone is authorized as prescribed for peacetime. For RCA and herbicide use, war is any period of armed conflict no matter how it may be characterized, including declared and undeclared war, counterinsurgency, and any other uses of armed forces in engagements between US military forces and foreign military or paramilitary forces. Armed conflict is conflict between states in which at least one party has resorted to the use of armed force to achieve its aims. It also may involve conflict between a state and uniformed or non-uniformed groups within that state, such as organized resistance groups. Commanders must recognize that, while the US does not consider herbicides and riot control agents to be chemical weapons, some other countries do not draw a distinction. Commanders must consider international ramifications and Rules of Engagement before recommending the use of herbicides or RCAs. The Secretary of the Army, as Executive Agent for the Department of Defense for civil disturbance operations, has issued instructions governing the use of RCAs in civil disturbances in the US, the Commonwealth of Puerto Rico, and US possessions and territories."
United States. Marine Corps
1996-08-19
-
Contractor Access to Information from Interstate Identification Index: Memorandum Opinion for the Deputy Attorney General [August 15, 1996]
"This responds to your request for our opinion concerning whether private contractors retained by the Office of Personnel Management ('OPM') to conduct or assist in conducting background investigations of government employees (or prospective employees) may be granted access to the criminal history records of those employees that are maintained in the Interstate Identification Index system ('III'). In particular, you have asked (1) whether OPM may provide designated contractors with particular information gleaned by OPM from III system records that OPM concludes will assist the contractor in performing background investigations; or, more expansively, (2) whether the contractors may themselves be granted direct on-line access to all III records necessary to perform the required background investigations. Based upon the factual circumstances outlined below, we conclude that both of the proposed arrangements would be lawful. Our conclusion with respect to the second alternative is based on the understanding that direct contractor access to the III system will be subject to effective mechanisms to guard against exceeding authorized access, including contractual restrictions and systems for monitoring the identity of records accessed by contractor personnel through the III system."
United States. Department of Justice. Office of Legal Counsel
1996-08-15
-
Conventional Arms Transfers to Developing Nations, 1988-1995 [August 15, 1996]
"Developing nations continue to be the primary focus of foreign arms sales activity by weapons suppliers. During the years 1988-1995, the value of arms transfer agreements with developing nations comprised, on average, 69.4% of all such agreements worldwide. More recently, arms transfer agreements have declined generally, but those with developing nations still constituted 63.4% of all such agreements globally from 1992-1995. The value of all arms transfer agreements with developing nations in 1995 was $15.4 billion. This was the lowest yearly total, in real terms, for any of the years during the 1988-1995 period. The value of new arms transfer agreements with developing nations has declined for five consecutive years since 1990 when arms agreements rose during the Persian Gulf war. By contrast, in 1995, the value of all arms deliveries to developing nations ($21.6 billion in constant 1995 dollars) was the first increase in deliveries values from the previous year during the 1988-1995 period. The United States has been the predominant arms supplier to developing nations during the period from 1992-1995. During these years, the United States accounted for 45.3% of the value of all arms transfer agreements with developing nations ($40.6 billion in constant 1995 dollars). France, the second leading supplier during this period, made $18.8 billion in arms transfer agreements (in constant 1995 dollars) or nearly 21% of all developing world agreements."
Library of Congress. Congressional Research Service
Grimmett, Richard F.
1996-08-15
-
Khobar Towers Bombing Incident: Staff Report
"The terrorist bombing that killed 19 American military personnel, wounded more than 200 others, and harmed hundreds more Saudi soldiers and civilians in and around the Khobar Towers complex in Dhahran, Saudi Arabia on June 25, 1996 exposed more than the physical vulnerability of Americans serving abroad. It exposed the shortcomings of a U.S. intelligence apparatus that left Americans unprepared for the threat that confronted them. It exposed significant problems of continuity and cohesion in the units deployed for Operation Southern Watch. And it exposed the risks to U.S. military personnel deployed on contingency operations where political and cultural sensitivities of the host country are significant factors."
United States. Congress. House. Committee on National Security
1996-08-14
-
Public Law 104-182: Safe Drinking Water Act Amendments of 1996
"An Act to reauthorize and amend title XIV of the Public Health Service Act (commonly known as the 'Safe Drinking Water Act'), and for other purposes."
United States. Government Printing Office
1996-08-06
-
Unification of the United States Armed Forces: Implementing the 1986 Department of Defense Reorganization Act
The author provides an assessment of the intended and actual effects of the Goldwater-Nichols Department of Defense Reorganization Act. As the 10th anniversary of the passage of the Act approaches, it is expedient to review the Act's principal objectives, measure the extent to which they have been achieved, and identify future actions which would further the Act's fundamental purposes. The author's critical analysis ends with the conclusion that the Department of Defense and the nation have benefited from the implementation of this Act.
Army War College (U.S.). Strategic Studies Institute
Lovelace, Douglas C.
1996-08-06
-
Armed Services Blood Program (ASBP) Operational Procedures
This document contains the operational procedures required to implement the Armed Services Blood Program. The manual contains a detailed list of responsibilities, procedures and definitions.
United States. Department of Defense
1996-08-05?
-
H. Rept. 104-749: Investigation into the Activities of Federal Law Enforcement Agencies toward the Branch Davidians, Thirteenth Report together with Additional and Dissenting Views, August 2, 1996
"From April 1995 to May 1996, the Subcommittee on Crime of the House Committee on the Judiciary and the Subcommittee on National Security, International Affairs, and Criminal Justice of the House Committee on Government Reform and Oversight jointly conducted an investigation into the actions of the Federal agencies involved in law enforcement activities near Waco, TX in late 1992 and early 1993 toward a group known as the Branch Davidians. As part of that investigation, the subcommittees held 10 days of public hearings. During the course of those hearings, more than 100 witnesses appeared and gave testimony concerning all aspects of the government's actions. The subcommittees also reviewed thousands of documents requested from and provided by the agencies involved in these actions. Additionally, the subcommittees met with others who were involved in these actions or who offered additional information or opinions concerning them. This report is the final product of that investigation. It summarizes the most important facts about the key issues of these activities considered by the subcommittees. The report also sets forth the subcommittees' findings with respect to many disputed issues and to new facts uncovered during the investigation. Finally, the report makes recommendations in order to prevent the mistakes that occurred at Waco from reoccurring in future law enforcement operations."
United States. Congress. House. Committee on Government Reform (1999-2006); United States. Congress. House. Committee on the Judiciary
1996-08-02
-
Aviation Security: Immediate Action Needed to Improve Security, Statement of Keith O. Fultz, Assistant Comptroller General, Resources, Community, and Economic Development Division, Testimony before the Committee on Commerce, Science, and Transportation, U.S. Senate
Aviation is and will remain an attractive target for terrorists. The 1988 terrorist bombing of Pan Am flight 103, which killed 270 people, and the more recent, but as yet unexplained, explosion aboard TWA flight 800 have shaken the public's confidence in the safety and the security of air travel. The General Accounting Office (GAO) testified that the threat of terrorism against the United States has increased and that aviation is and will remain an attractive target for terrorists. Although the Federal Aviation Administration (FAA) has mandated additional security procedures as the threat of terrorism has changed, domestic and international aviation systems remain vulnerable. For example, conventional X-ray screening of checked baggage has limitations and offers little protection against moderately sophisticated bombs. Explosive detection devices are commercially available for checked and carry-on luggage and could improve security, but all the devices have shortcomings. Some of the devices are already in use in foreign countries. Other devices are in various stages of development. A mix of technology and procedures will likely be needed to improve security.
United States. General Accounting Office
1996-08-01
-
Space Operations: Through The Looking Glass (Global Area Strike System)
From the thesis abstract: "America's capability to operate in space is increasing with every passing day. Space operations are already recognized as a crucial part of all American military operations. Military space operations may be indirect, through such staples as navigation, communications, and surveillance/reconnaissance support to the war fighter, or direct, through development and fielding of a range of responsive directed energy and kinetic energy weapons. A modest fleet of flexible, mission-tailored transatmospheric vehicles (TAVs) has an important place in any thoughtful space operations architecture, providing the only conceivable way to insert human presence rapidly into the fast-breaking crises of 2025. Space represents the future--a future in which aerospace power will increasingly be projected through space systems. This paper advocates a 'system-of-systems' architecture for an American global space-strike capability in 2025. This architecture recognizes the importance of the global information network (surveillance and reconnaissance combined with the intelligence system), the military command and control system, the perennial space 'utilities' (communications, navigation, and weather), and a robust readiness and sustainment system to enable the fielding of space-based or space-borne weapon systems. The weapon system itself is described as a smaller system-of-systems composed of the weapon, its platform, and a primarily off-board surveillance, acquisition, and tracking/battle damage assessment capability provided through the global information network."
Air University (U.S.). Air War College
Varni, Jamie G. G.; Powers, Gregory M.; Crawford, Dan S.
1996-08
-
US Military Force and Operations Other than War: Necessary Questions to Avoid Strategic Failure
"Though our current doctrine for employment of military force relies heavily on Clausewitz's concepts (center of gravity, culminating point, sphere of influence of victory, etc.), world conflicts decreasingly are resolved by nation states wielding traditional military force in traditional ways. Future war will become increasingly complex at all levels. Tactically, technology may relegate direct action to highly trained, highly sophisticated special operations forces. The high cost of conventional ground warfare may reduce standing forces worldwide. Operationally, success in war in the information age may depend on the careful integration of not only military but also of other forces. Strategic influence may be wielded by, and may more often have to contend with an increasingly number of important nonstate players. Indeed, competition may replace conflict with preparation for war that is constant and more important than conduct of war. Preventive war may take new forms, and states may be forced to use their military forces boldly to ensure the (relatively) uninterrupted 'commerce' of the information age. Questions of when, where, and how to employ US military force will become increasingly difficult. The day may arrive when Clausewitz's most quoted dictum, 'War is an instrument of policy,' becomes his only idea still in vogue. Nevertheless, his most overlooked correlation will grow in importance also: There are some political aims for which military force is not appropriate. Ultimately, strategic decision makers must accurately determine 'the kind of war on which they are embarking; neither mistaking it for, nor trying to turn it into, something which is alien to its nature.'"
Air University (U.S.). Air War College
Estilow, R.A.
1996-08
-
Joint Force Quarterly: Summer 1996, Issue 12 [August 1996]
"NDU Press produces Joint Force Quarterly in concert with ongoing education and research at National Defense University in support of the Secretary of Defense and the Chairman of the Joint Chiefs of Staff. JFQ is the Chairman's joint military and security studies journal designed to inform and educate national security professionals on joint and integrated operations; whole of government contributions to national security policy and strategy; homeland security; and developments in training and joint military education to better equip America's military and security apparatus to meet tomorrow's challenges while protecting freedom today."
National Defense University. Institute for National Strategic Studies
1996-08
-
Church Burning and Bombing: Laws Against Destruction of Places of Worship in Selected Nations
From the Abstract: "This report describes the various approaches by which selected countries deal with arson attacks made against places of worship. It covers the aggravating circumstances that control the level of punishment, ranging from one year in prison to the death penalty."
Law Library of Congress (U.S.)
Nay, Robert L.; Zeldin, Wendy I.; Blumer, Thomas J., 1937-
1996-08
-
Defensive Information Warfare
This treatise on defensive information warfare reviews one immediate, if narrowly focused challenge. The threat of information attacks, that is, "attacks on decision makers, the information and information-based processes they rely on, and their means of communicating their decisions," currently exists. With actual and potential practitioners covering a broad spectrum of sophistication and resources, it's a phenomenon which cannot be denied. In a very real sense, a new answer has emerged to a fundamental question in international politics: "What are the capabilities of the players?" This overview of defensive information warfare (IW-D) is the result of an effort, undertaken at the request of the Deputy Secretary of Defense, to provide background material to participants in a series of interagency meetings to explore the nature of the problem and to identify areas of potential collaboration. This material, in briefing form, was provided to key decision makers in the Department of Defense and other agencies.
National Defense University. Institute for National Strategic Studies
Alberts, David S. (David Stephen), 1942-
1996-08
-
Information Operations: A New War-Fighting Capability
In its most basic form, commanders have always performed the functions of observe, orient, decide, and act (OODA Loop) to prosecute military operations. As with Alexander the Great, history shows the military commander who best analyzes, decides, and controls the speed of the engagement prevails in nearly every conflict. To master the OODA Loop, military leaders have pushed technology to obtain more information. Ironically, this situation now leads to the requirement to solve two fundamental challenges if the United States expects to maintain air and space dominance in 2025. First, the proliferation of un-integrated military war-fighting architectures gives the commander potentially conflicting perspectives of the battle space. Second, the explosion of available information creates an environment of mental overload leading to flawed decision making. Failure to master these challenges critically weakens the military instrument of power. This paper presents a solution to these challenges by confronting commanders as they employ future airpower forces.
Air University (U.S.). Press
Bethel, Scott A.; Osborne, William B.; Chew, Nolen R.
1996-08
-
Noncitizens in the Federal Criminal Justice System, 1984-94 - Bureau of Justice Statistics Special Report
"The number of noncitizens processed in the Federal criminal justice system increased an average 10% annually from 1984 to 1994. During 1984, 3,462 noncitizens were prosecuted in U.S. district courts; during 1994, more than 10,000 were prosecuted. The greatest part of this increase occurred between 1986 and 1989, when the number increased by almost 6,000. Since 1989 the number has remained fairly stable. In contrast to the substantial increase in the number of noncitizens prosecuted, the overall Federal criminal caseload increased at a much slower rate between 1984 and 1994 - an average of less than 2% annually. During 1984 approximately 49,000 defendants were prosecuted in U.S. district courts; during 1994 approximately 59,000 were prosecuted."
United States. Bureau of Justice Statistics
Scalia, John
1996-08
-
Harakat ul-Ansar: Increasing Threat to Western and Pakistani Interests, August 1996
"Possibly in an effort to avoid being placed on the list of state sponsors of terrorism, Pakistan is withdrawing some of its monetary support to Harakat ul-Ansar (HUA), which the CIA describes as 'as Islamic extremist organization that Pakistan supports in its proxy war against Indian forces in Kashmir.' The CIA is concerned over HUA's recent increase in its use of terrorist tactics against western targets and civilians and its efforts to reach out to sponsors of international terrorism such as Osama bin Laden and Mu'ammar Qadhafi, who 'may further encourage the group to attack US interests.'"
United States. Department of State
1996-08
-
Pentagon Building Security & Emergency Procedures Guide
This handout was prepared to assist DoD personnel located in the Pentagon
Building to understand security and emergency procedures and their roles
during an emergency, and to identify sources of assistance. Included is information on building access procedures; accepted identification cards; security awareness briefing with ten rules to remember; replacement building access pass information; visitor and escort procedure; building security hours; package inspection procedures; emergency threat response to receiving a threat, problem visitors, fire and smoke, and building fire alarm system; medical emergencies; civil disturbances; criminal incidents; individual protective measures; and how to be prepared for the unexpected. Also included is hostage incident information, NBC emergencies, bomb threats, facility information and evacuation information.
United States. Defense Protective Service
1996-08
-
Defense Transportation: Migration Systems Selected Without Adequate Analysis: Report to the Chairman, Subcommittee on Military Readiness, Committee on National Security, House of Representatives
This document shows the results of the GAO's review of the Department of Defense's (DoD) selection of transportation migration systems. Specifically, it evaluates whether Defense made proper and cost-effective transportation migration system selections. The selection of migration systems is par of Defense's Corporate Information Management (CIM) initiative - a department wide effort to improve operations and reduce costs by streamlining business processes, consolidating information systems, and standardizing and integrating data. For transportation, Defense plans to migrate from an inventory of about 130 systems. To date, 28 major migration systems have been selected, with additional minor selections still to be made.
United States. General Accounting Office
1996-08
-
Crime Prevention through Environmental Design and Community Policing
"Crime prevention today benefits from two strategies for protecting neighborhoods from crime and the fear of crime--Crime Prevention Through Environmental Design (CPTED) and community policing. CPTED programs, through design and management of the physical environment of buildings, residential neighborhoods, and business areas, increase public safety and reduce fear of crime. Community policing programs, by making police more visible and familiar to the people and with the physical environment of their beats, reinforce these efforts and promote police citizen partnerships to prevent crime and disorder. This Research in Action suggests several ways in which CPTED and community policing initiatives can be coordinated and integrated in a comprehensive approach to community security."
National Institute of Justice (U.S.)
Fleissner, Dan; Heinzelmann, Fred
1996-08
-
FinCEN Advisory: FATF-VII Report on Money Laundering Typologies, August 1996, Issue 4
The FinCEN Advisory "...is a recurring series designed for the financial, regulatory and law enforcement communities. Subsequent advisories will describe trends and developments related to money laundering and financial crime." In this issue of FinCEN: "The new era of financial globalization is altering the roles of the financial, regulatory and law enforcement communities--they must now work closely together to combat money laundering. The Financial Action Task Force (FATF), created by the G-7, is an international organization comprised of representatives of the financial, regulatory and law enforcement communities from 26 nations around the world, the European Commission and the Gulf Cooperation Council. It serves as the world leader in promoting the development of effective anti-money laundering controls and cooperation in counter-money laundering investigations among its membership and around the globe."
Financial Crimes Enforcement Network (U.S.)
1996-08
-
FinCEN Advisory: Court Interprets 'Safe Harbor' Provision, August 1996, Issue 5
The FinCEN Advisory "...is a recurring series designed for the financial, regulatory and law enforcement communities. Subsequent advisories will describe trends and developments related to money laundering and financial crime." In this issue of FinCEN: "Protection of financial institutions from liability to customers is an essential part of the United States' program for reporting suspicious activities. Congress created that protection in 1992 when it added a safe harbor from civil liability for reporting institutions to the Bank Secrecy Act (BSA). Now, in Merrill Lynch v. Green, a recent decision applying the protection, a federal court provides strong support for the statute, in a situation where a securities firm voluntarily reported a suspicious transaction."
Financial Crimes Enforcement Network (U.S.)
1996-08
-
Firefighter Fatalities in the United States in 1995
"The specific objective of this study was to identify all of the on-duty firefighter fatalities that occurred in the United States in 1995, and to analyze the circumstances surrounding each occurrence. The study is intended to help identify approaches that could reduce the number of deaths in future years. In addition to the 1995 findings, this study includes a special analysis of the use of personal alert safety devices at fatal structure fires and a special report on several fatalities that occurred during technical rescue operations. This report continues a series of annual studies by the US Fire Administration of firefighter fatalities in the United States."
United States Fire Administration
TriData Corporation
1996-08
-
Emergency Medical Services, Agenda for the Future
"During the past 30 years, emergency medical services (EMS) in the United States have experienced explosive development and growth. […]. The EMS Agenda for the Future provides an opportunity to examine what has been learned during the past three decades and create a vision for the future. This opportunity comes at an important time, when those agencies, organizations, and individuals that affect EMS are evaluating its role in the context of a rapidly evolving health care system. The EMS Agenda for the Future project was supported by the National Highway Traffic Safety Administration and the Health Resources and Services Administration, Maternal and Child Health Bureau. This document focuses on aspects of EMS related to emergency care outside traditional health care facilities. It recognizes the changes occurring in the health care system of which EMS is a part. [...].This document serves as guidance for EMS providers, health care organizations and institutions, governmental agencies, and policy makers. They must be committed to improving the health of their communities and to ensuring that EMS efficiently contributes to that goal. They must invest the resources necessary to provide the nation's population with emergency health care that is reliably accessible, effective, subject to continuous evaluation, and integrated with the remainder of the health system. The EMS Agenda for the Future provides a vision for out-of-facility EMS. Achieving such a vision will require deliberate action and application of the knowledge gained during the past 30 year EMS experience. If pursued conscientiously, it will be an achievement with great benefits for all of society"
United States. Joint Program Office for Intelligent Transportation Systems
1996-08
-
Exec. Rept. 104-28: Extradition Treaty with Belgium and Supplementary Extradition Treaty with Belgium, Report to Accompany Treaty Docs. 104-7 and 104-8, July 30, 1996
From the Purpose: "Modern extradition treaties (1) identify the offenses for which extradition will be granted, (2) establish procedures to be followed in presenting extradition requests, (3) enumerate exceptions to the duty to extradite, (4) specify the evidence required to support a finding of a duty to extradite, and (5) set forth administrative provisions for bearing costs and legal representation." The document proceeds to outline the details of the Extradition Treaty Between the United States of America and the Kingdom of Belgium and the Supplementary Treaty on Extradition Between the United States of America and the Kingdom of Belgium to Promote the Repression of Terrorism.
United States. Government Publishing Office
1996-07-30
-
Exec. Rept. 104-27: Extradition Treaty with Hungary, Report to Accompany Treaty Doc. 104-5, July 30, 1996
From the Purpose: "Modern extradition treaties (1) identify the offenses for which extradition will be granted, (2) establish procedures to be followed in presenting extradition requests, (3) enumerate exceptions to the duty to extradite, (4) specify the evidence required to support a finding of a duty to extradite, and (5) set forth administrative provisions for bearing costs and legal representation." The document proceeds to outline the details of the specific extradition treaty between the United States of America and the Government of the Republic of Hungary.
United States. Government Publishing Office
1996-07-30
-
Exec. Rept. 104-32: Extradition Treaty with Switzerland, Report to Accompany Treaty Doc. 104-9, July 30, 1996
From the Purpose: "Modern extradition treaties (1) identify the offenses for which extradition will be granted, (2) establish procedures to be followed in presenting extradition requests, (3) enumerate exceptions to the duty to extradite, (4) specify the evidence required to support a finding of a duty to extradite, and (5) set forth administrative provisions for bearing costs and legal representation." This document proceeds to outline the details of the specific extradition treaty between the United States and Switzerland.
United States. Government Publishing Office
1996-07-30