Advanced search Help
Clear all search criteria
Only 2/3! You are seeing results from the Public Collection, not the complete Full Collection. Sign in to search everything (see eligibility).
-
Training Circular 3-10: Commander's Tactical NBC Handbook
Training Circular 3-10 provides commanders of battalion and brigade-sized units with the tactics, techniques and procedures (TTP) to train and operate under nuclear, biological, and chemical (NBC) conditions. Ultimately, the focus of this manual is to take the mystery and fear out of NBC defense. Leaders and soldiers must develop confidence in their equipment and in their own ability to both survive and operate effectively while wearing MOPP gear.
United States. Department of Defense
1994-09-29
-
Leaders' Manual for Combat Stress Control
"This field manual (FM) provides information for all leaders and staff on the control of combat stressors and the prevention of stress casualties. It identifies the leaders' responsibilities for controlling stress and recognizing the effects of stress on their personnel. It reviews Army operational doctrine for war and operations other than war. It identifies likely stressors and recommends actions for leaders to implement for the prevention and management of stress. The manual describes the positive and negative combat stress behavior associated with stress and provides leader actions to minimize battle fatigue risk factors. It provides the many different military branches and disciplines with a common conceptual framework, knowledge base, and vocabulary so they work together toward controlling stress. It provides information on how stressors and the stress process interact to improve or disrupt military performance. It identifies the supporting role of special staffs such as the chaplain and the Judge Advocate General. This manual also identifies the responsibilities of medical personnel for prevention, treatment, and management
of battle fatigue and stress-related casualties."
United States. Department of the Army
1994-09-29
-
Field Manual 3-7: NBC Field Handbook
This manual, FM 3-7, is designed as a guide to help the chemical soldier at battalion level and below in NBC defense. It details the NBC warning and reporting system, and how to locate, identify, and operate in and around NBC contamination. This manual is designed to be an easy-to-read, step-by-step manual depicting the manual method of calculating NBC defense procedures useful for the field soldier. A more detailed discussion of NBC defensive measures may be found in: FM 3-3, Chemical and Biological Contamination Avoidance; FM 3-3-1, Nuclear Contamination Avoidance; FM 3-4, NBC Protection; FM 3-4-1, Fixed Site Protection; FM 3-5, NBC Decontamination; FM 3-11, Flame Field Expedients. Chemical soldiers must be familiar with and be able to apply the information in this manual.
United States. Department of Defense
1994-09-29
-
Executive Order 12930: Measures to Restrict the Participation by the United States Persons in Weapons Proliferation Activities
This executive order declares a national emergency to deal with the threat of the proliferation of nuclear, biological, and chemical weapons. "The Secretary of Commerce, in consultation with the Secretary of State, is hereby authorized and directed to take such actions, including the promulgation of rules, regulations, and amendments thereto, as may be necessary to continue to regulate the activities of United States persons in order to prevent their participation in activities that could contribute to the proliferation of weapons of mass destruction and the means of their delivery, as provided in the Export Administration Regulations, set forth at 15 CFR Parts 768-799 (1994)."
United States. Office of the Federal Register
Clinton, Bill, 1946-
1994-09-29
-
Leader's Manual for Combat Stress Control
This field manual (FM) provides information for all leaders and staff on the control of combat stressors and the prevention of stress casualties. It identifies the leaders' responsibilities for controlling stress and recognizing the effects of stress on their personnel. It reviews Army operational doctrine for war and operations other than war. It identifies likely stressors and recommends actions for leaders to implement for the prevention and management of stress. The manual describes the positive and negative combat stress behavior associated with stress and provides leader actions to minimize battle fatigue risk factors. It provides the many different military branches and disciplines with a common conceptual framework, knowledge base, and vocabulary so they work together toward controlling stress. It provides information on how stressors and the stress process interact to improve or disrupt military performance. It identifies the supporting role of special staffs such as the chaplain and the Judge Advocate General. This manual also identifies the responsibilities of medical personnel for prevention, treatment, and management of battle fatigue and stress-related casualties.
United States. Department of the Army
1994-09-29
-
Guideline for the Use of Advanced Authentication Technology Alternatives
This Guideline describes the primary alternative methods for verifying the identities of computer system users, and provides recommendations to Federal agencies and departments for the acquisition and use of technology which supports these methods. Although the traditional approach to authentication relies primarily on passwords, it is clear that password-only authentication often fails to provide an adequate level of protection. Stronger authentication techniques become increasingly more important as information processing evolves toward an open systems environment. Modern technology has produced authentication tokens and biometric devices which are reliable, practical, and cost-effective. Passwords, tokens, and biometrics can be used in various combinations to provide far greater assurance in the authentication process than can be attained with passwords alone.
National Institute of Standards and Technology (U.S.)
1994-09-28
-
Letter to the Honorable Tim Valentine and the Honorable Tom Lewis, Committee on Science, Space, and Technology, from Allen Li, RAND Associate Director of Transportation Issues, discussing Aviation Security, September 27, 1994
Pursuant to a legislative requirement, GAO reviewed Federal Aviation Administration's (FAA) efforts to comply with the Aviation Security Improvement Act and develop and implement new security technologies. GAO noted that: (1) FAA did not meet Congress' goal to deploy new security technology at airports by November 1993; (2) although several explosive detection devices could improve airport security, technical problems have slowed their development; (3) considerable time will be needed to implement the new technologies at high-threat domestic and international airports; (4) although improving aircraft survivability through blast resistant luggage containers and hardened structures shows promise, it is uncertain when these technologies will be in widespread use; (5) FAA needs to improve its certification process for new explosive detection devices because its current process does not adequately test the new systems to ensure their performance and reliability; (6) FAA does not believe that on-site testing should be part of the certification process, since such testing will likely add time and costs to the process; (7) airport testing may enable FAA to gain the confidence of the airline industry; (8) FAA believes that the airline industry should evaluate the software used in new explosive detection devices, since these systems rely heavily on software to indicate the presence of explosive devices; and (9) the costs to acquire new security technology could range from $250,000 to over $1 million per device.
United States. General Accounting Office
1994-09-27
-
Proliferation and the Former Soviet Union
This report, the fifth publication from OTA's assessment on the proliferation of weapons of mass destruction, examines the whole range of consequences for proliferation of the Soviet Union's breakup. One effect may be the erosion of international nonproliferation treaty regimes. In spite of the continuing desire of most of the newly independent states of the former Soviet Union to support nonproliferation goals, these states face severe internal challenges; social and economic disruption are rampant and the degree of central governmental control over activities nominally within their jurisdictions is often questionable. Of particular concern are economic hardship and low morale among many individuals with access to vital weapon information or sensitive facilities, a situation aggravated by as yet inadequate national systems to account for and secure nuclear materials, to control exports, and to police borders. Given the severity of the problems facing Russia and the other newly independent states, the United States and other Western powers may have only marginal ability to influence the overall course of events there. This study describes how U.S. assistance may reduce specific proliferation risks in the former Soviet Union. The consequences of failure to stem these risks provide a strong incentive for the United States to help the newly independent states address them.
United States. Government Printing Office; United States. Congress. Office of Technology Assessment
1994-09-23
-
Chemical Stockpile Emergency Preparedness Program (CSEPP) Pueblo Community Full Scale Exercise 1994: Exercise Report [Pubeblo Depot Activity, CO; August 18, 1994]
"The Pueblo Community Full Scale Exercise 1994 (Pueblo FSX 94) was conducted on August 18, 1994. This exercise was designed and conducted under the auspices of the Chemical Stockpile Emergency Preparedness Program (CSEPP) for the Pueblo Depot Activity (PUDA), the State of Colorado, and Pueblo County. The last CSEPP exercise conducted for the Pueblo Community was a Direction and Control Exercise (DCX) conducted in August 1993. The requirement for conducting CSEPP exercises was established in the August 1988 Memorandum of Understanding between the Army and the Federal Emergency Management Agency (FEMA) (and reaffirmed in a Joint Memorandum for Record on January 19, 1993). Objectives used for the FSX (see Table 1) are contained in the 'Chemical Stockpile Emergency Preparedness Program Exercise Program Document, Part II', dated January 9, 1992. Exercise design, planning, and reporting guidance is contained in the revised 'Chemical Stockpile Emergency Preparedness Program Exercises' document, dated February 23, 1994. The Pueblo Exercise Planning Team was responsible for all aspects of the Pueblo FSX 94 planning. All participating jurisdictions were represented on the team which was co-chaired by representatives from the U.S. Army Defense Ammunition Center and School (USADACS) and FEMA Region VIII. The Co-Chairs from these two organizations also served as the Exercise Co-Directors."
United States. Federal Emergency Management Agency; United States. Department of the Army
1994-09-21
-
Presidential Decision Directive: U.S. Nuclear Posture and Policy on Nuclear Arms Control Beyond the START I and START II Treaties
From the Document: "This Presidential Decision Directive establishes and directs the implementation U.S. nuclear posture and policy on nuclear arms control beyond the START [Strategic Arms Reduction Treaty] I and START II Treaties."
United States. White House Office; National Security Council (U.S.)
1994-09-21
-
Presidential Decision Directive 29: Security Policy Coordination
From the Document: "The Director of Central Intelligence and Secretary of Defense's Joint Security Commission identified four principles which should guide the formulation, evaluation and oversight of our security policy: our security policies and services must realistically match the threats we face and must be sufficiently flexible to facilitate change as the threats evolve; our security policies and practices must be consistent and enable us to allocate scarce resources effectively; our security standards and procedures must result in the fair and equitable treatment of all Americans upon whom we rely to guard our nation's security, and; our security policies, practices and procedures must provide the security we need at a price we can afford."
United States. White House Office
Clinton, Bill, 1946-
1994-09-16
-
Organization Manual
"This manual prescribes the pattern of organization for the Coast Guard and fixes the areas of responsibility which the Commandant has assigned to subordinate components."
United States. Coast Guard
1994-09-15
-
Standard Security Label for Information Transfer
Information Transfer security labels convey information used by protocol entities to determine how to handle data communicated between open systems. Information on a security label can be used to control access, specify protective measures, and determine handling restrictions required by a communications security policy. This standard defines security label syntax for information exchanged over data networks and provides encodings of that syntax for use at the Application and Network Layers. The syntactic constructs defined in this standard are intended to be used along with semantics provided by the authority establishing the security policy for the protection of the information exchanged. A separate NIST document, referenced in an informative appendix, defines a Computer Security Objects Register (CSOR) that serves as a repository for label semantics.
National Institute of Standards and Technology (U.S.)
1994-09-06
-
Abu ' Ata' Al-Sharqi Reports from Afghanistan (English Translation)
This document is a, "description of a letter written by Abu ' Ata' al-Sharqi of the Jihadwal camp in Afghanistan." This author discusses and references, "an attack on a Sunni mosque [as well as] various [other] conflicts surrounding the al-Faroog training camp [between the members of al-Qa'ida and other fighters [in regards to the] al'Furkan project." Abu `Ata' al-Sharqi also share[s] some [of his] thoughts about how the group can become more involved [and] establish a stronger presence in Tajikistan."
Combating Terrorism Center (U.S.)
1994-09-04
-
Risk Communications and the Chemical Stockpile Emergency-Preparedness Program
"The Source Book has been developed for the Chemical Stockpile Emergency Preparedness Program (CSEPP) in support of the training course on risk communications. The purpose of the document is to provide a fairly comprehensive document on risk communication research and recommended practices, especially as they relate to the CSEPP. In a world of increasing risks, appropriate and continual dialogue with affected publics about risks should be one of the foremost concerns of public agencies, especially those involved in risk communications for the CSEPP. How that information is interpreted or modified by existing beliefs remains problematical. To enhance risk communication efforts, we need communications of risks in a language easily understood by the majority of publics. Effective public participation also depends substantially upon the development of indigenous technical and analytic resources and upon the institutional means to act upon and incorporate that increased knowledge."
United States. Federal Emergency Management Agency
Sorensen, John H.; Vogt, Barbara M.
1994-09
-
Layman's Look at Orbital Debris
From the thesis abstract: "Artificial space debris is a new and threatening reality. This thesis examines the requirement of acknowledging this threat as one of the major considerations in the design of Low Earth Orbit (LEO) satellites. The paper commences with a comprehensive view of the issue; the facts of the case are presented. It is necessary to understand the physical fundamentals of this multi-faceted problem in order to view it as a genuine threat to satellites. Following this introduction, an overview of how the problem is currently approached, from a political and technical standpoint, is discussed. Strategies for coping with the space debris issue are then presented. From these, the paper focuses on the most promising prospect for the future. It highlights the need for new and responsible satellite design philosophies in order to deal with the uncertainties of the LEO environment. The research effort concludes that space debris considerations must be incorporated at the earliest phases of a satellite's design efforts, and must be a continuing commitment throughout the operational life of a satellite."
Naval Postgraduate School (U.S.)
Sanchezcastellanos, Armando R.
1994-09
-
IR Missile (Spin-Scan and Con-Scan Seekers) Countermeasures
From the thesis abstract: "In the combat scenario where the infrared missile is an almost continuous threat during the operation, fighter aircraft are currently quite susceptible to being killed in attacks by infrared missiles. Theoretical analysis applied to an encounter simulation seems to indicate that it is possible to use the infrared Active Jammer and the expendable decoy (flare) to defeat the infrared missile (spin-scan and con-scan seekers). The theoretical analysis of a simplified case of a spin-scan and con-scan reticle with amplitude modulation, frequency modulation and phase modulation leads to expressions for the targets' positions, as seen by the missile seeker, under no-jamming condition. The signal waveforms consist of target radiation power failing on the reticle and the reticle modulation function. We apply signal processing techniques to the modulated signal to determine the tracking error rate under no-jamming, active jamming and flare jamming different conditions, and by comparing with the unjammed tracking error rate, to determine the differences and effectiveness of jamming. The analytical result is simulated by means of a simulation program (MATLAB), which evaluates the change in the missile LOS (line of sight ) rotation rate and the impact on the missile guidance operation. The analysis indicated successful jamming in the different jamming source situations. Following the jamming analysis, one can use the result to do further operational analysis as in OT&E (operation test and evaluation) and to evaluate the operational effectiveness of the jammers and to develop operational tactics to further increase the survivability of the fighter aircraft in the combat situation."
Naval Postgraduate School (U.S.)
Chang, Ting Li
1994-09
-
Environment: DOD's New Environmental Security Strategy Faces Barriers, Report to Congressional Requesters
"Pursuant to a congressional request, GAO [General Accounting Office] provided information on the Department of Defense's (DOD) environmental security strategy, focusing on changes made to the DOD organizational structure for environmental management. GAO found that: (1) the revised DOD strategy for protecting the environment focuses on cleanup, compliance, conservation, pollution prevention, and technology; (2) in order to successfully implement its new environmental strategy, DOD will need to improve its cooperation with other agencies, overcome constraints in implementing environmental regulations, and develop better environmental funding methods; (3) in May 1993, DOD created the Office of Environmental Security to focus on specific environmental issues, and implement its environmental strategy; (4) Congress has directed DOD to realign and justify the office's operating and administrative costs separately in future budget submissions, reduce and hold the operating and administrative budget to $366,000, and limit travel costs to $27,000; (5) future DOD environmental budgets will not be fully realigned because DOD has not separately budgeted or justified its environmental management activities; (6) the Office has agreed to reduce its budget request by $366,000 because the former environmental office supplied Congress with incorrect data on the office's total cost; (7) DOD travel costs are expected to exceed the report limit by $63,000; and (8) the Deputy Under Secretary of Defense has met with congressional staff and reached agreement on the funding limits."
United States. General Accounting Office
1994-09
-
Global Proliferation-Dynamics, Acquisition Strategies, and Responses: Volume 2-Nuclear Proliferation
"The proliferation of nuclear weapons, as well as their associated missile delivery systems, is increasingly acknowledged to be one of the most important threats to U.S. security and global stability in the emerging post-Cold War world. Prepared for the Defense Nuclear Agency (DNA), this report: a. Assesses the current proliferation situation, including incentives and disincentives for acquisition, current outcomes, and future trends. b. Highlights different weapons acquisition strategies that countries have pursued and continue to pursue. c. Describes current policies to contain, cap or rollback, or deal with proliferation. d. Identifies key policy challenges as well as new initiatives to help strengthen U.S. efforts. e. Identifies areas in which the Department of Defense (DoD) may be able to make significant contributions to U.S. nonproliferation efforts."
United States. Defense Nuclear Agency
Dunn, Lewis A.; Bailey, Charles; Bernstein, Paul I.
1994-09
-
Health Hazard Evaluation Report 92-147-2456; Federal Bureau of Investigation Washington, D.C.
"In February 1992, the National Institute for Occupational Safety and Health (NIOSH) received a request for a health hazard evaluation (HHE) from a management representative of the Federal Bureau of Investigation (FBI) in Washington, D.C. The request was submitted because of concern about possible health hazards due to the exposure of fingerprint specialists to many of the chemicals that they use in processing latent fingerprints. NIOSH evaluated potential exposures to ethyl-2-cyanoacrylate, petroleum ether, iodine, acetone, titanium dioxide, and carbon black in the fingerprint laboratories and at a simulated crime scene. The laboratories were equipped with exhaust hoods, but there was no exhaust ventilation available at the simulated crime scene. NIOSH investigators also evaluated an argon laser that was used by fingerprint specialists to examine objects for visible fingerprints"
Centers for Disease Control and Prevention (U.S.); National Institute for Occupational Safety and Health
Barsan, Michael E.; Bresler, Faye T.
1994-09
-
Health Hazard Evaluation Report 88-0290-2460; Pittsburgh Bureau of Fire Pittsburgh, Pennsylvania
"On June 2, 1988, the International Association of Fire Fighters' (IAFF) Department of Health and Safety requested the National Institute for Occupational Safety and Health (NIOSH) to conduct a Health Hazard Evaluation (HHE) on behalf of their Local #1 in Pittsburgh, Pennsylvania. The request was to evaluate the noise exposure levels found in the activities of the Pittsburgh Bureau of Fire (PBF) and to assess the amount of hearing loss among current fire fighters in the department."
Centers for Disease Control and Prevention (U.S.); National Institute for Occupational Safety and Health
Tubbs, Randy L. (Randy Lloyd)
1994-09
-
Managing Water for Drought
"This guidebook was produced as part of the National Study of Water Management During Drought, which was managed by the Institute for Water Resources (IWR) of the U.S. Army Corps of Engineers. The guidebook is based on the experiences, research, and critical analysis of the over one hundred professionals who worked directly on the National Drought Study, and the many others who criticized and improved the case studies in which these methods were tested. […] This report summarizes the method of Many components of the DPS approach are improving water management during drought time-proven methods and ideas derived from developed during the four year National federal water planning experience and Study of Water Management During research, modified to reflect the importance Drought. The method was tested and refined of non-federal, non-structural responses to in four field studies in different parts of the droughts. The most visible innovation of country, in which teams of water managers the National Drought Study is the use of and users worked together to reduce drought stakeholders collaboratively built 'shared impacts. In each case, the situations are vision (computer) models' of their water complex, involving many different uses of management environments. The DPS water. Because such important state and method also encourages the use of alternative local responsibilities are involved, only a dispute resolution techniques and new joint cooperative approach between state and statistical methods that can provide additional federal agencies could provide satisfactory information on the expected severity and answers. These cooperative field studies were frequency of droughts. What is most called 'Drought Preparedness Studies' (DPS) significant is that all of this has been and the approach, the 'DPS method.'"
Institute for Water Resources (U.S.)
Werick, William J.; Whipple, William, Jr.
1994-09
-
Military Applicant Security Screening (MASS): Systems Development and Evaluation
From the Foreword: "The present study couples instruments and procedures developed in previous research with computer technology, to design a computer-administered security screening system entitled Military Applicant Security Screening (MASS). In this report the authors describe the two major components of MASS, the screening questionnaire and the computer structure for questionnaire administration. Also described are the results of a field test of MASS with Navy enlisted personnel. The positive results from this test resulted in a decision by the Navy to implement MASS nationwide at all Military Entrance Processing Stations (MEPS)."
Defense Personnel Security Research Center (U.S.)
Wiskoff, Martin F.; Zimmerman, Ray A.
1994-09
-
Assessing the Potential for Civil-Military Integration: Technologies, Processes, and Practices
Government officials and private sector executives have advocated the integration of the defense and commercial sectors (often termed civil-military integration or CMI). The claimed benefits of CM I include cost savings, increased technology transfer, and an increase the number of potential defense suppliers. A CM I strategy, however, demands extensive modification of acquisition laws and regulations, and concerns over potential costs and risks such modifications have hindered change. Although several congressional and administration initiatives have been launched to promote integration, to date, much of the defense base remains isolated and the promised benefits of integration remain elusive. This assessment found that greater CMI is possible. It confirms the potential for cost savings and increased technology transfer, but analysis indicates such savings are likely to be less, and slower to realize, than many previous studies have suggested. Even so, cost savings even a few percent of total defense technology and industrial spending would amount to billions of dollars in overall savings that might be used to meet other vital defense needs. The most important benefit of increased CMI may be the preservation of a viable defense technology and industrial capability in an increasingly fiscally constrained environment. Increased CMI appears essential if defense is to take advantage of rapidly developing commercial technologies.
United States. Government Printing Office
United States. Congress. Office of Technology Assessment
1994-09
-
Taxonomy of Computer Program Security Flaws, with Examples
"An organized record of actual flaws can be useful to computer system designers, programmers, analysts, administrators, and users. This paper provides a taxonomy for computer program security flaws together with an appendix that carefully documents 50 actual security flaws. These flaws have all been described previously in the open literature, but in widely separated places. For those new to the field of computer security, they provide a good introduction to the characteristics of security flaws and how they can arise. Because these flaws were not randomly selected from a valid statistical sample of such flaws, we make no strong claims concerning the likely distribution of actual security flaws within the taxonomy. However, this method of organizing security flaw data can help those who have custody of more representative samples to organize them and to focus their efforts to remove and, eventually, to prevent the introduction of security flaws."
Naval Research Laboratory (U.S.)
Landwehr, Carl E.; Bull, Alan R.; McDermott, John P. . . .
1994-09
-
Nuclear Safety: International Assistance Efforts to Make Soviet-Designed Reactors Safer, Report to Congressional Requesters
"As of May 1994, about $785 million had been pledged to implement the G7 assistance plan, primarily for improving the safety of the Soviet-designed civil nuclear power reactors located in the former Soviet Union and in central and eastern Europe. A longer-term goal of the assistance program is to shut down the most dangerous nuclear power reactors and replace them with alternative energy sources. The plan also calls for improving nuclear regulatory agencies in those countries operating Soviet-designed reactors. As of May 1994, only about 7 percent of the projects, worth about $57 million, had been completed."
United States. Government Accountability Office
1994-09
-
Profile Series: Uzbekistan: Political Conditions in the Post-Soviet Era
"Unlike most of the former Soviet republics, in which governments have become more democratic and less able to control societal opposition, Uzbekistan's political structure and its level of governmental repression and control remain virtually unchanged from the Soviet era. Uzbekistan's president, Islam Karimov, was elected in the Soviet period. The ruling National Democratic Party automatically incorporated all members of the Uzbek Communist Party in its membership when it was created as a successor to the Communist Party. The Karimov government is extremely intolerant toward the opposition parties which were formed in the glasnost period preceding the collapse of the Soviet Union. The press is now rigidly censored. Human, civil and ethnic rights are abridged and restored solely at the whim of the government. Almost all of the opposition parties and movements formed before Uzbek independence have been banned, while human rights organizations have been harassed, their leaders jailed and convicted, often on unlikely criminal charges such as drug trafficking or assaulting a security officer. Individuals are more free now to practice religion than during the Soviet era -- as long as the government perceives their religious beliefs and practices to be apolitical. […]. Moreover, the Uzbek government actively represses those religious movements which are involved in, or perceived as involved in, political issues. […]. In summary, although the high level of repression in Uzbekistan affects most residents, those at greatest risk are those who either are involved in political opposition to the government (through secular ideological parties, human rights groups, or ethnic- or religious-based movements), or who are perceived by the government as being engaged in political opposition."
United States. Immigration and Naturalization Service; INS Resource Information Center
1994-09
-
Information Security and Privacy in Network Environments
"Information networks are changing the way we do business, educate our children, deliver government services, and dispense health care. Information technologies are intruding in our lives in both positive and negative ways. On the positive side, they provide windows to rich information resources throughout the world. They provide instantaneous communication of information that can be shared with all who are connected to the network. As businesses and government become more dependent on networked computer information, the more vulnerable we are to having private and confidential information fall into the hands of the unintended or unauthorized person. Thus appropriate institutional and technological safeguards are required for a broad range of personal, copyrighted, sensitive, or proprietary information. Otherwise, concerns for the security and privacy of networked information may limit the usefulness and acceptance of the global information infrastructure. This report was prepared in response to a request by the Senate Committee on Governmental Affairs and the House Subcommittee on Telecommunications and Finance. The report focuses on policy issues in three areas: national cryptography policy, including federal information processing standards and export controls, guidance on safeguarding unclassified information in federal agencies, and legal issues and information security, including electronic commerce, privacy, and intellectual property."
United States. Congress. Office of Technology Assessment
1994-09
-
NSC-68: Forging the Strategy of Containment
"As America emerged from World War II, it was evident that a new world order was taking shape, one unlike any that had come before it. In this new arrangement, the United States faced the prospect of having to share its status as a nuclear superpower with a hostile Soviet Union. In 1950 it fell to a small group of individuals in the Departments of State and Defense to devise a strategy capable of protecting American national interests. Paul Nitze, Director of the Policy Planning Staff at the Department of State at that time, was instrumental in shaping the strategy that emerged from this endeavor-the strategy of containment as embodied in the seminal strategic document of the Cold War era: NSC-68. Over the years, Ambassador Nitze's insights into both the strategy and the process by which it was developed have proven to be invaluable to successive classes at the National War College, where he has been a frequent lecturer since 1947. With the passing of the Cold War, as American leaders once again face the prospect of having to craft a strategy to protect national interests in a new environment, these insights take on new relevance. deserving of an even wider audience. This volume was conceived to satisfy that need."
National Defense University. Institute for National Strategic Studies
Drew, S. Nelson; Nitze, Paul H.
1994-09
-
Virtual Reality and Technologies for Combat Simulation
Synthetic-environment technology is dual-use. Research funded by the Department of Defense (DoD) seeded the field. Now there is a large commercial market, and DoD is actively exploiting the dynamism and efficiency of that market. Advances in synthetic environment technologies such as computer image generation are reducing the costs of cockpit simulators and facilitating other applications. This paper describes technical challenges and discusses issues of validation, standardization, scalability, flexibility, effectiveness, cost-effectiveness, and infrastructure.
United States. Government Printing Office
United States. Congress. Office of Technology Assessment
1994-09