Advanced search Help
Searching for terms: ALL (electromagnetic AND incident) in: full text and any metadata
Clear all search criteria
Only 2/3! You are seeing results from the Public Collection, not the complete Full Collection. Sign in to search everything (see eligibility).
-
Approach to Evaluating and Implementing EMP Protection Requirements for Communication Centers
"We examine the problem of protecting communication centers against the threat of high-altitude nuclear electromagnetic pulses (EMP). Because such EMP could damage components in an unprotected facility, we describe an approach to develop a set of minimum requirements so that effective hardening procedures can be designed and implemented. Our approach includes evaluation of currently recommended protection practices, cost analyses, and development of test requirements, plans, and facilities."
Lawrence Livermore National Laboratory
Deadrick, F. J.; Cabayan, H. S.; Martin, L. C. (Leroy C.)
1979-05-01
-
Interim Guidelines for Hospital Response to Mass Casualties from a Radiological Incident
In the event of a terrorist attack involving nuclear or radiological agents, it is one of CDC's missions to insure that our nation is well prepared to respond. In an effort to fulfill this goal, CDC, in collaboration with representatives of local and state health and radiation protection departments and many medical and radiological professional organizations, has identified practical strategies that hospitals can refer to in preparing for and responding to a radiological terrorism event involving mass casualties. The guidance focuses on six key areas: (1) notification and communication, which emphasizes the importance of hospitals working with their communities and public health agencies on developing emergency communication plans; (2) triage; (3) patient management, including decontamination, treatment, care of special populations, discharge and follow up, and patient mental health concerns; (4) healthcare provider protection, including staff training and practitioner mental health concerns; (5) surveillance, and (6) community planning.
Centers for Disease Control and Prevention (U.S.)
Spano, Marie A.; Smith, James M., Ph.D.
2003-12
-
High Performance Computing contributions to DoD Mission Success 1998
High Performance Computing (HPC) is a key, enabling technology that is essential to assure that U.S. Forces maintain dominance on the battlefield with minimal risk to life, even against numerically superior forces. Tracing requirements from the President's National Security Strategy to our National Military Strategy as defined by the Military Services, Joint Chiefs of Staff, and the warfighting Commanders in Chief (ClNCs), one common denominator prevails-the need for militarily superior technology. Technology is a key discriminator in our deterrence of conflicts; failing to deter aggression, technology can be the difference between success and failure on the battlefield. HPC enables advanced modeling and simulation concepts and capabilities that can be used to assess the value of individual components or new weapon systems' projected performance levels. Data collected from modeling and simulation will assist milestone decisions by pointing to research, development, test and evaluation (RDT&E) of most value to the warfighter. Through the use of HPC resources for example, it is possible to simulate the capabilities of a new weapon system and to measure that system's impact on existing tactics and the predicted outcome of a military engagement (using tens of thousands of entity types). As a result, senior DoD leadership will have data to assist in the decision-making process as early as possible. These data will provide information about whether to proceed, modify, or cancel a program and where to best invest our RDT&E resources. Other mission-critical areas that could be greatly improved by advanced modeling and simulations using HPC include ocean modeling and weather prediction, bomb damage assessment, water tampering determinations, modeling of radio frequency systems and antenna designs, environmental impacts/ cleanup, and counter-proliferation and counter-terrorism scenarios.
United States. Department of Defense
1998-05
-
NATO Advanced Research Workshop on the Optics of Cosmic Dust
Biological warfare (BW) agents are a prime concern to both military and civilian personnel because of both their lethality and the resulting terror they would inflict upon a population. Dc testing and identifying aerosols are a primary objective of the US DoD and many other institutions worldwide. Light scattering may provide an automated means of rapidly detecting and identifying potentially lethal aerosols real-time without the use of chemical reagents or expensive maintenance. Since organic particles tend to fluoresce, many detector systems have focused on measuring this property to identify potentially harmful particles to raise an alarm. However, because fluorescence signals tend to be weak and smooth, it is difficult to differentiate among species of biological particles. Natural backgrounds vary widely and may cause false alarms. For this reason, other information is needed about the particle system that may be gathered from the elastic scattering spectrum. One property of 3W agents is that when they are aerosolized, they tend to aggregate into clusters. From the scattering signal, it might be possible to characterize the individual spores making up the cluster to help in the identification. However, again it is essential to be aware of the natural background signals caused by dust, diesel fumes, pollen, etc. and to develop methods to distinguish between these particles and the particles of concern.
U.S. Army Research Laboratory
Videen, Gordon
2001-11
-
Investigating the Effects of Higher Spatial Resolution on Benthic Classification Accuracy at Midway Atoll
"Effective monitoring of coral reefs is important for ecological and economic reasons, and satellite remote sensing has been shown to be useful for mapping and monitoring these ecosystems. This thesis will compare 2 multispectral systems and investigate the effects of increased spatial resolution on benthic classifications in the highly heterogeneous coral reef environment of Midway Atoll. It will evaluate the utility of QuickBird's increased spatial resolution compared to IKONOS imagery in the same study area at multiple scales. Previous studies (e.g., Mumby and Edwards, 2002; Capolsini et al., 2003; Wang et al., 2004; Benefeild et al., 2007) comparing various satellite sensors suggest that greater spatial resolution should lead to more accurate classifications, but a direct comparison of QuickBird and IKONOS sensors has not been carried out in marine environments. Light interactions in marine environments are complex and add difficulty to spectral discrimination, producing more variable results in classification accuracy than in terrestrial environments. This research does not find any significant improvements in thematic mapping accuracy of benthic environment from QuickBird's higher spatial resolution satellite imagery. Additionally, a cost benefit analysis did not show a decisive advantage in choosing either imagery type for the application of monitoring the extent, biodiversity, and health of coral reef habitats."
Naval Postgraduate School (U.S.)
Arledge, Richard K.; Hatcher, Ervin B.
2008-09
-
Review of Recent Laser Illumination Events in the Aviation Environment
"Flight crewmember exposure to laser light, while operating an aircraft at night, has resulted in glare, flashblindness, and afterimage. Temporary visual impairment and the distraction, disorientation, and discomfort that can accompany it often result in hazardous situations. A database of aviation reports involving laser illumination of flight crewmembers has been established and maintained at the Civil Aerospace Medical Institute. A review of recent laser illumination reports was initiated to investigate the significance of these events."
United States. Federal Aviation Administration
Nakagawara, Van B.; Wood, Kathryn J. (Of Federal Aviation Administration); Montgomery, Ronald W.
2006-10-16?
-
Computer Attack and Cyberterrorism: Vulnerabilities and Policy Issues for Congress [Updated April 1, 2005]
"Many international terrorist groups now actively use computers and the Internet to communicate, and several may develop or acquire the necessary technical skills to direct a coordinated attack against computers in the United States. A cyberattack intended to harm the U.S. economy would likely target computers that operate the civilian critical infrastructure and government agencies. However, there is disagreement among some observers about whether a coordinated cyberattack against the U.S. critical infrastructure could be extremely harmful, or even whether computers operating the civilian critical infrastructure actually offer an effective target for furthering terrorists goals. While there is no published evidence that terrorist organizations are currently planning a coordinated attack against computers, computer system vulnerabilities persist worldwide, and initiators of the random cyberattacks that plague computers on the Internet remain largely unknown. Reports from security organizations show that random attacks are now increasingly implemented through use of automated tools, called 'bots', that direct large numbers of compromised computers to launch attacks through the Internet as swarms. The growing trend toward the use of more automated attack tools has also overwhelmed some of the current methodologies used for tracking Internet cyberattacks. This report provides background information for three types of attacks against computers (cyberattack, physical attack, and electromagnetic attack), and discusses related vulnerabilities for each type of attack. The report also describes the possible effects of a coordinated cyberattack, or computer network attack (CNA), against U.S. infrastructure computers, along with possible technical capabilities of international terrorists."
Library of Congress. Congressional Research Service
Wilson, Clay
2005-04-01
-
Emergency Support Function #2 - Communications Annex [January 2008]
"Emergency Support Function (ESF) #2 - Communications supports the restoration of the communications infrastructure, facilitates the recovery of systems and applications from cyber attacks, and coordinates Federal communications support to response efforts during incidents requiring a coordinated Federal response (hereafter referred to as 'incidents'). This ESF implements the provisions of the Office of Science and Technology Policy (OSTP) National Plan for Telecommunications Support in Non-Wartime Emergencies (NPTS). ESF #2 also provides communications support to Federal, State, tribal, and local governments and first responders when their systems have been impacted, and provides communications and information technology (IT) support to the Joint Field Office (JFO) and JFO field teams. With the rapid convergence of communications and IT, the National Communications System (NCS) and the National Cyber Security Division (NCSD) work closely to coordinate the ESF #2 response to cyber incidents. This convergence requires increased synchronization of effort and capabilities between the communications and IT sectors to facilitate ESF #2's ability to respond to all types of incidents."
United States. Federal Emergency Management Agency
2008-01
-
Human Response to Nuclear and Advanced Technology Weapons Effects
"The purpose of this study is to help the system survivability analyst estimate hardness requirements for systems exposed to nuclear weapons and advanced technology weapons (ATWs). The system survivability analyst is often asked to make quick, order-of-magnitude estimates on the hardness requirements for existing or proposed systems based upon human responses to the effects of nuclear weapons and ATWs. While the analyst may have training in mathematics or engineering, few have specific training in human response to ionizing and non- ionizing radiation. As a result, system survivability analysts have had difficulty answering mission survivability questions that are related to human survivability. The intent of this report is to identity the general range of human survivability to nuclear weapons and ATWs and to provide simple example calculations and scenarios that can give the reader rough estimates of the effects of these weapons. While high-powered microwave (HPM) and laser weapons are considered in this report, the main emphasis is on nuclear weapons and their ionizing radiation effects."
Armstrong Laboratory (U.S.); United States. Air Force Materiel Command
Coleman, Julie L.
1996-05
-
Healthcare Challenges After Radiological Incidents Q&A
"On July 11, 2018, ASPR TRACIE [Office of the Assistant Secretary for Preparedness and Response Technical Resources, Assistance Center, and Information Exchange] held a webinar discussing the impact of radiological incidents on health and healthcare, and planning strategies related to different incidents. The speakers also shared guidance and lessons learned from recent exercises and research in assessing, triaging, treating, and following-up on casualties of radiological and nuclear emergencies. The presentation and recording from this webinar are now available. The link to the recording is on the title page of the presentation; you will need to enter you email address prior to viewing. Due to time constraints, speakers were not able to respond to all of the questions received during the Question and Answer (Q&A) portion of the webinar. ASPR TRACIE sent remaining questions to panelists and their answers are provided below."
United States. Department of Health and Human Services. Office of the Assistant Secretary for Preparedness and Response
DeAtley, Craig A.; Buddemeier, Brooke R.; Case, Cullen
2018-07-11
-
Simulation of Wireless Propagation and Jamming in a High-Rise Building
"Wireless Local Area Networks (WLANs) extend the usage of wired LANs from specific places within a building to the many mobile users whether in the building or outside. The wireless data is not only used by authorized users but also might be intercepted and altered by other unauthorized users. Therefore, the power of the transmitter is kept as low as possible to make it difficult for the others to intercept the signal. In the absence of interception, adversaries might attempt to jam the signal so that the network cannot operate properly. The purpose of present study is to investigate the effects of noise jamming against a WLAN in a high-rise building. The building model was created by Rhino, a well known Windows-based computer drawing software. The jamming effects are simulated using Urbana. The LAN transmitter operates with an omni-directional antenna and 100 mW of power. The noise jammer has variable power levels of 10 W and 100 W. It uses a directional antenna. The signal to jam-ratio (SJR) is computed for several floors in the building to determine if the jammer will disrupt the WLAN."
Naval Postgraduate School (U.S.)
Kaya, Yildirim
2005-09
-
Nuclear and NBC Contamination Survivability of Medical Materiel
"The purpose of this paper is to provide military personnel and contractors involved in the development and acquisition of military equipment with background information pertaining to Nuclear, Biological, and Chemical (NBC) contamination survivability. Two categories of threat environments identified as Nuclear Weapons Effects (NWE) and NBC contamination are thoroughly described as well as the NBC terminology, protective measures, engineering practices, and organizational responsibilities that must be considered during materiel acquisition. The content in this paper was consolidated from the vast number of military standards (MIL-STDs), data item descriptions (DIDs), Army Regulations (ARs), Quadripartite Standardization Agreements (OSTAGs) and other military documents that concern nuclear and NBC contamination and survivability as well as the input of the U.S. Army Nuclear and Chemical Agency, U.S. Army Laboratory Command and the U.S. Army Chemical Research, Development, and Engineering Center."
U.S. Army Medical Materiel Development Activity
Comer, K. Allen; Zajac, Andrew J.; Wright, William P.
1990-03
-
Information Operations Primer: Fundamentals of Information Operations [2011]
"This latest revision of the Information Operations Primer provides an overview of Department of Defense (DoD) Information Operations (IO) doctrine and organizations at the joint and individual service levels. It is primarily intended to serve students and staff of the U.S. Army War College as a ready reference for IO information extracted and summarized from a variety of sources. Wherever possible, Internet websites have been given to provide access to additional and more up-to-date information. This booklet is intentionally UNCLASSIFIED so that the material can be easily referenced during course work, while engaged in exercises, and later in subsequent assignments. This booklet begins with an overview of Information Operations, Strategic Communication and Cyberspace Operations. At each level it describes strategies or doctrine, agencies, organizations, and educational institutions dedicated to the information element of national power. Finally, the document concludes with an IO specific glossary and hyperlinks to information operations, cyberspace operations and strategic communication related websites. Readers will note that many of the concepts, documents, and organizations are 'works in progress' as DoD and the services strive to address the challenges of a rapidly changing IO environment. Thus, this summarization effort is on-going and continuous. Please address any suggested additions, revisions and/or corrections to the primary points of contact below for inclusion in subsequent editions."
Army War College (U.S.)
2011-11
-
Terrorism and Public Health Emergencies: A Reference Guide for Media - Radiation Emergencies
This guide provides information on nuclear and radiological events for the media. It includes an explanation of the differences between nuclear and, radiological events and how they might affect people, sources for additional information, and information on how to lessen the impact of radiation exposure.
United States. Department of Health and Human Services
2005-09-01?
-
Russian and Chinese Information Warfare: Theory and Practice [Presentation]
This presentation accompanies a paper on Russian and Chinese information operations. "Over the past ten years, Russia and China have developed concepts of information operations (IO) and information superiority (IS) that differ from their US counterpart. Russia divides its IO theory into two aspects: information-technical and information-psychological aspects. With respect to information superiority, the Russians believe the key is to maintain organization. Only when a force becomes disorganized does it lose its ability to maintain information superiority. China IO expert Dai Qingmin defined IO as "a series of operations with an information environment as the basic battlefield condition, with military information and an information system as the direct operational target, and with electronic warfare and a computer network war as the principal forms." China terms its network centric operations as "integrated network-electronic" warfare. China's focus in the area of information superiority is built around stratagems and control, with the latter receiving nearly as much attention as the former. These and other significant differences (to include a critique of US IO) will be highlighted for the symposium's attendees."
Command and Control Research Program (U.S.)
Thomas, Timothy L.
2004
-
Cyberspace: Devolution and Recovery
From the thesis abstract: "The following Strategic Research Paper (SRP) is a review of The National Strategy to Secure Cyberspace for the U.S. Army War College Master of Strategic Studies Degree. The purpose of this paper is to provide an objective review of the strategy, supporting initiatives, and other relevant material that will give the reader an introduction to this important segment of our infrastructure. Is the United States prepared to deal with a cyber attack on critical infrastructure and, more importantly, if and when an attack should occur, is there a reasonable expectation of a timely recovery? These are questions that must be addressed. To be thorough, this paper will provide an introduction to the notion of cyberspace, a mock scenario for an attack on cyber infrastructure, an analysis of the strategy and supporting initiatives, and present a conclusion."
Army War College (U.S.)
Emery, Rodney
2011-03-23
-
Aviation Security: Immediate Action Needed to Improve Security, Statement of Keith O. Fultz, Assistant Comptroller General, Resources, Community, and Economic Development Division, Testimony before the Committee on Commerce, Science, and Transportation, U.S. Senate
Aviation is and will remain an attractive target for terrorists. The 1988 terrorist bombing of Pan Am flight 103, which killed 270 people, and the more recent, but as yet unexplained, explosion aboard TWA flight 800 have shaken the public's confidence in the safety and the security of air travel. The General Accounting Office (GAO) testified that the threat of terrorism against the United States has increased and that aviation is and will remain an attractive target for terrorists. Although the Federal Aviation Administration (FAA) has mandated additional security procedures as the threat of terrorism has changed, domestic and international aviation systems remain vulnerable. For example, conventional X-ray screening of checked baggage has limitations and offers little protection against moderately sophisticated bombs. Explosive detection devices are commercially available for checked and carry-on luggage and could improve security, but all the devices have shortcomings. Some of the devices are already in use in foreign countries. Other devices are in various stages of development. A mix of technology and procedures will likely be needed to improve security.
United States. General Accounting Office
1996-08-01
-
Chairman of the Joint Chiefs of Staff Notice 3500.01: 2015-2018 Chairman's Joint Training Guidance, October 30, 2014
"This notice provides the annual CJCS [Chairman of the Joint Chiefs of Staff] Joint Training Guidance to all DoD Components for the planning, execution, and assessment of joint individual and collective training for fiscal years (FYs) 2015 to 2018. As an element of the Joint Strategic Planning System, this guidance and the Combatant Commanders Exercise Engagement and Training Transformation (CE2T2) program goals and objectives (reference a) are intended to support development of FY 2016 Joint Training Plans (JTPs). This notice may also guide adjustments to FY 2015 JTP scheduled training events and objectives to address emerging operational concerns, high-interest training requirements (HITRs), and the Chairman' high-interest training issues (HITIs)."
United States. Office of the Chairman of the Joint Chiefs of Staff
2014-10-30
-
Advisory on the Application of Federal Laws to the Acquisition and Use of Technology to Detect and Mitigate Unmanned Aircraft Systems
From the Document: "The Federal Aviation Administration (FAA), Department of Justice (DOJ), Federal Communications Commission (FCC), and Department of Homeland Security (DHS) are issuing an advisory guidance document to assist non-federal public and private entities interested in using technical tools, systems, and capabilities to detect and mitigate Unmanned Aircraft Systems (UAS). The advisory is intended to provide an overview of potentially applicable federal laws and regulations, as well as some factors relevant to whether those laws may apply to particular actions or systems."
United States. Department of Justice; United States. Department of Transportation; United States. Federal Communications Commission . . .
2020-08
-
Modes in Chiral Core Planar Waveguides: Transition from Linear to Circular Polarization
The general solution for modes in an asymmetric planar waveguide with an isotropic chiral core is given in terms of a pair of parameters related to the eccentricity of the polarization ellipse for the transverse electric field. This formulation provides insight into the transition, with increasing chirality of the core, from TE/TM modes to right-handed (RHC) and left-handed (LHC) circular polarization modes. The mode properties as a function of waveguide thickness and of frequency are discussed in detail. In addition to the usual cutoff at a minimum thickness (and maximum wavelength), left-handed elliptical modes are found to experience a cutoff at a mode-dependent maximum thickness (and minimum wavelength). The limiting case of a symmetric waveguide is also discussed.
Naval Air Warfare Center (U.S.). Aircraft Division
Herman, Warren
1999
-
SAVER Market Survey: Handheld Metal Detectors [April 2014]
"Handheld metal detectors (HHMD), also known as security wands, are lightweight battery-powered devices designed to detect concealed items such as weapons or illicit contraband that contain metallic components. These highly portable detection units provide law enforcement and security professionals with a low-cost and effective means of screening individuals seeking access to a variety of locations including airports, private and government buildings, military installations, prisons, concert venues, and sporting events. To provide emergency responders with information on HHMDs, the System Assessment and Validation for Emergency Responders (SAVER) program conducted a market survey. This market survey report is based on information gathered from October 2013 to February 2014 from Internet research, industry publications, and a government issued Request for Information (RFI) that was posted on the Federal Business Opportunities website."
System Assessment and Validation for Emergency Responders (SAVER); United States. Department of Homeland Security
2014-04
-
Addendum to Components for Evaluation of Direct-Reading Monitors for Gases and Vapors: Hazard Detection in First Responder Environments
"The 'Components for Evaluation of Direct-Reading Monitors for Gases and Vapors' (hereafter referred to as the Components document) [NIOSH 2012], presents methods to be used in evaluating direct-reading monitors for use in workplace compliance determinations. This 'Addendum to the Components' document expands the applicability of the 'Components' by presenting methods to be used in evaluating direct-reading monitors for hazard detection in First Responder environments, including those related to incidents involving weapons of mass destruction (WMD). The 'Addendum' contains a standardized test protocol and performance acceptance criteria for evaluating commercially available, direct-reading monitors in a style similar to the 'Components' document."
National Institute for Occupational Safety and Health; Centers for Disease Control and Prevention (U.S.)
2012-07
-
S. Hrg. 109-30: Terrorism and the EMP Threat to Homeland Security: Hearing before the Subcommittee on Terrorism, Technology and Homeland Security of the Committee on the Judiciary, United States Senate, One Hundred Ninth Congress, March 8, 2005
From the opening statement of Jon Kyl: "The subject, as I said, is the electromagnetic pulse and its potential impact as a tool of terrorism against the United States. An attack using EMP, which is a phenomenon created by the detonation of a nuclear weapon, could be devastating to this country and the public and Congress need to pay more attention to that danger. That is the reason for the hearing here today. Earlier this year, CIA Director Porter Goss gave chilling testimony about missing nuclear material from storage sites in Russia that may have found its way into terrorists' hands. FBI Director Mueller confirmed new intelligence that suggests that al Qaeda is trying to acquire and use weapons of mass destruction in some form against us. And the 9/11 Commission report stated that our biggest failure was one of imagination. No one imagined the terrorists would do what they did on September 11. I want to explore new and imaginative possibilities of terrorist attacks and methods, and that is why we are here today, to examine a possibility that poses a grave threat and a crippling impact to our way of life."
Statements, letters, and materials submitted for the record include those of the following: Jon Kyl, Peter Fonash, Peter Pry, and Lowell Wood.
United States. Government Printing Office
2005
-
Terrorism and the EMP Threat to Homeland Security
This hearing includes testimony on the electromagnetic pulse, which is an effect of the detonation of a nuclear device, and its potential impact as a tool of terrorism.
United States. Congress. Senate. Committee on the Judiciary
2005
-
Classification of Cyber Capabilities and Operations as Weapons, Means, or Methods of Warfare
From the Introduction: "The development of cyber capabilities with the potential for operational use on the battlefield predates consideration as to how international law applies to this new form of warfare. Indeed, the first government assessment of cyber operations in armed conflict came in a 1999 analysis by the Office of the General Counsel at the U.S. Department of Defense, which warned, '[i]t will not be . . . easy to apply existing international law principles to information attack, a term used to describe the use of electronic means to gain access to or change information in a targeted information system without necessarily damaging its physical components.' In particular, the assessment pointed to 'computer network attack, or in today's vernacular, the 'hacking' of another nation's computer systems.' By then, strategists and operators had been thinking about 'information warfare' for some time, with many heralding a 'revolution in military affairs.' In 1998, the Joint Chiefs of Staff published Joint Doctrine for Information Operations, which began the complex process of developing a doctrinal framework for such operations. As military structures and operations integrated cyber capabilities, the tendency was, and remains, 'normalization,' where practitioners incorporate terms and doctrine from existing military parlance and practice into the cyber context."
Naval War College (U.S.)
Biller, Jeffrey T.; Schmitt, Michael N.
2019
-
Department of Defense Dictionary of Military and Associated Terms (June 2015)
"The Joint Publication 1-02, 'Department of Defense Dictionary of Military and Associated Terms' sets forth standard US military and associated terminology to encompass the joint activity of the Armed Forces of the United States. These military and associated terms, together with their definitions, constitute approved Department of Defense (DOD) terminology for general use by all DOD components. […] This publication supplements standard English-language dictionaries and standardizes military and associated terminology to improve communication and mutual understanding within DOD, with other federal agencies, and among the United States and its allies."
United States. Joint Chiefs of Staff
2015-06-15
-
Department of Defense Dictionary of Military and Associated Terms (November 2010)(As Amended Through 15 January 2016)
From the Preface: "The Joint Publication (JP) 1-02, 'Department of Defense Dictionary of Military and Associated Terms', sets forth standard US military and associated terminology to encompass the joint activity of the Armed Forces of the United States. These military and associated terms, together with their definitions, constitute approved Department of Defense (DOD) terminology for general use by all DOD components. […] This publication supplements standard English-language dictionaries and standardizes military and associated terminology to improve communication and mutual understanding within DOD, with other federal agencies, and among the United States and its allies."
United States. Joint Chiefs of Staff
2016-01-15
-
ESF #15 Space Weather Appendix
"The annex captures the roles and responsibilities of a space weather incident leading up to an impending extreme space weather event and the resulting threat of prolonged power outage that impacts critical infrastructure, the private sector, state, local, tribal, and territorial governments, communities, and individuals and families."
United States. Federal Emergency Management Agency
2016?
-
U.S. Fleet Cyber Command/TENTH Fleet Strategic Plan 2015-2020
"New warfighting platforms do not spring full-grown from their technical roots. They may appear initially as interesting oddities, such
as the first submarines. They may even start as 'enablers,' such as aviation's early reconnaissance balloons. Eventually, though,
in the hands of innovative operators they turn a corner to realize their full potential: they become formidable warfighting platforms,
which must be vigorously defended, as well as employed to strike adversaries when needed.
When a technology becomes a full-fledged warfighting platform, it does not abandon its initial purpose; instead it adopts a larger,
more inclusive purpose. The military that grasps this turning point soonest is the one that seizes the advantage.
The realm we call 'cyberspace' is undergoing exactly such a transformation, something Navy's senior leadership recognized a
while ago. Today our whole force is coming to understand these two truths: our mastery of cyberspace puts a hefty weapon in our
hands; and our reliance on cyberspace places a weighty vulnerability in our path.
Recent world events have underscored this two-edged quality of cyberspace. Our adversaries are flexing their muscles and have
proven the vulnerability of our assets - governmental, commercial, academic, and military - posing serious risks to our nation's
security and missions that we as a navy are executing around the globe every day.
Because of these facts, this strategic plan emphasizes the warfighting aspects of this command - both offensive and defensive -
while still recognizing the significant ways in which other warfighters rely on our effectiveness in the confluence of cyberspace, the
electromagnetic spectrum, and space.
Our successes in this domain will require smart, dedicated leaders - and a workforce no less smart and dedicated. Fortunately, we
have both. Still, in the face of increasing competition for talent and increasing technical requirements, diligence and innovation will
be required to maintain this edge.
Likewise, success will require close, purposeful collaboration across multiple partners in the military, government, academia,
industry, and other countries. This is something we are already doing - and we are looking forward to more of it."
United States. Department of Defense
2015
-
Information Operations Primer
"This latest revision of the Information Operations Primer provides an overview of Department of Defense (DoD) Information Operations (IO) doctrine and organizations at the joint and individual service levels. It is primarily intended to serve students and staff of the US Army War College as a ready reference for IO information extracted and summarized from a variety of sources. Wherever possible, Internet web sites have been given to provide access to additional and more up-to-date information. The booklet is intentionally UNCLASSIFIED so that the material can be easily referenced during course work, while engaged in exercises, and later in subsequent assignments. This booklet begins with an overview of Information Operations and Strategic Communication. (Note: as the emergent concept of Strategic Communication continues to assume increasing importance, the Primer has expanded to include discussion and input of this topic). Additionally, this year we have added an overview of cyberspace and cyberspace operations, which are now important emerging concepts. The booklet then goes from the national level to the Department of Defense, to the Combatant Command level and then finally to the service level. At each level it describes strategies or doctrine, agencies, organizations, and educational institutions dedicated to the information element of national power. Finally, the document concludes with an overview of Information Operations Condition (INFOCON) and an IO specific glossary."
Army War College (U.S.). Center for Strategic Leadership; Army War College (U.S.). Department of Military Strategy, Planning, and Operations
2009-11