SEARCH THE HSDL
Set an Alert to get future results
Results 1021 - 1050 (of 141,961) sorted by relevance sort by date
Only 2/3! You are seeing results from the Public Collection, not the complete Full Collection. Sign in to search everything (see eligibility).
-
Report on Allied Contribution to the Common Defense: A Report to the United States Congress by the Secretary of Defense (1997)The March 1997 Report on Allied Contribution to the Common Defense presents the Department of Defense assessment of the relative contributions toward common defense and mutual security made by the NATO nations, key U.S. allies in the Pacific such as Japan and the Republic of Korea, and the countries of the Gulf Cooperation Council (GCC). Under legislative provisions dating to the Defense Authorization Act of 1981 (P.L. 96-342, Section 1006), the Department of Defense is required to compare the defense burdens borne by the United States and our allies, explain disparities, and describe efforts to eliminate such disparities. The Defense Authorization Act of 1997 (P.L. 104-201, Section 1084) updates the earlier reporting requirement by recognizing that there are multiple and diverse ways in which allies may share the responsibility for mutual security objectives. The report contains three chapters that include the U.S. responsibility sharing policy, key allies (NATO, Pacific, and GCC), and an assessment of country contributions (i.e. the defense spending as a percent of GDP, multinational military activities, cost sharing, and foreign assistance) by each country. The NATO countries listed include Belgium, Canada, Denmark, France, Germany, Greece, Italy, Luxembourg, the Netherlands, Norway, Portugal, Spain, Turkey, the United Kingdom, and the United States. The pacific allies include Japan and the Republic of Korea, and the Gulf Cooperation Council that includes Bahrain, Kuwait, Oman, Qatar, Saudi Arabia, and the U.A.E.United States. Department of Defense1997-03-01
-
Instruments of CounterterrorismCounterterrorism, which involves an array of activities that exceed the term "counterterrorism," includes effective use of diplomacy, law enforcement, financial controls, military power, and intelligence gathering, says Paul R. Pillar, a national intelligence officer for the Near East and South Asia with the National Intelligence Council. "Every counterterrorist instrument is difficult to use. Using them well together is even more difficult. But using them all is critical in the fight against terrorism." Every tool used in the fight against terrorism has something to contribute, but also significant limits to what it can accomplish. Thus, counterterrorism requires using all the tools available, because no one of them can do the job. Just as terrorism itself is multifaceted, so too must be the campaign against it. The limitations of diplomacy as a counterterrorist tool are obvious. Terrorists do not change their behavior in direct response to a treaty or U.N. resolution. But diplomacy supports all of the other tools, whether by broadening the moral force behind them or providing an international legal framework for their use. The instruments discussed here must be well coordinated. Used together wisely, they produce a whole that is greater than the sum of the parts. If not well coordinated, they can work at cross-purposes. Enforcement of criminal law may get in the way of intelligence collection, for example, and military action could disrupt either law enforcement or intelligence gathering. The United States accomplishes day-to-day coordination through sub-cabinet committees, cross assignment of personnel, and other formal and informal mechanisms centered in the National Security Council and involving the Departments of State, Defense, Justice, and Treasury, the intelligence agencies, and other elements. The best arrangements for coordinating counterterrorism will vary from one government to another, but effective coordination should reflect three principles. One is that all of the relevant ministries or agencies -- including those responsible for military affairs, internal security, intelligence, and foreign affairs -- need to be involved. Second, leadership should come from the center, such as a cabinet office or equivalent to the U.S. National Security Council. And third, the various offices involved need to develop everyday habits of working together that will become second nature and pay off during a crisis.United States. Department of State2001-11
-
Terrorism: U.S. Policies and Counterterrorism Measures"The war we are waging will be a long struggle with many dimensions," says Ambassador Francis X. Taylor, the State Department's Coordinator for Counterterrorism. "Our goal is to eliminate the international terrorist threat to people, installations, and other interests." The attacks of September 11, 2001 may have been conceived as a blow against America, but in reality they were attacks against all of humanity and civilization itself. The war we are waging will be a long struggle with many dimensions. Our goal is to eliminate the international terrorist threat to people, installations, and other interests. We will do this by: smoking out terrorists from their hiding places; draining the swamp where terrorists find safe haven; pressuring states to stop supporting terrorism; preventing planned terrorist attacks; and bolstering the capabilities of our friends and allies to combat terrorism. The nations of the world are banding together to eliminate the terrorism scourge. Numerous multilateral organizations have issued declarations of support, including the United Nations, the European Union, the Organization of American States, the Organization for African Unity, the Organization of the Islamic Conference, and the Asia-Pacific Economic Cooperation forum, and many others have expressed their strong solidarity. Many challenges lie ahead. Maintaining the international coalition will be one. However, in the months that have elapsed since these nations proclaimed their solidarity against terrorism, the coalition has gotten stronger. Another challenge will be to counter the notion held in some quarters that Osama bin Laden is some type of hero and that the United States is somehow the aggressor. The author believes, that, through active public diplomacy, we can effectively convey the message that bin Laden is evil, and his actions are a manifestation of evil. Moreover, the United States has no designs on foreign real estate. We are not an invading force. But we will forcefully attack the terrorist network that represents a threat to us all. The horrific events of September 11 require a broad based, long-term strategic campaign, in concert with the nations of the world that abhor terrorism. Together we will root out and bring to justice those that use terrorism. We are in for a long haul. As President Bush has told the world: "Whether we bring our enemies to justice, or bring justice to our enemies, justice will be done."United States. Department of StatePillar, Paul R., 1947-2001-11
-
Mass Casualty Disasters: A Survey"A mass casualty disaster (MCD) is a fearful possibility for the United States. Researchers have projected that a catastrophic earthquake in a major metropolitan area could result in thousands of casualties and injuries. This research project examines this Nation's capability to medically respond to such devastating disasters. This project's goal was to examine MCD response based on the attitudes and opinions of senior governmental representatives who would direct the medical response to an MCD. Surveys were mailed to senior representatives from the Public Health Service (PHS), Department of Defense (DOD), Department of Veterans Affairs (DVA) and the Federal Emergency Management Agency (FEMA). Surveys were also mailed to a sample of state emergency coordinators and local medical coordinators in geographic areas most subject to a catastrophic earthquake or hurricane. Questions in the survey focused on what medical assistance could be provided, what governmental level will provide them, how rapidly, and whether there will be sufficient quantity and quality to meet expected needs. This survey focused on developing baseline information concerning this nation's capabilities to respond to an MCD and on the perceived needs and capabilities as understood by those who would be called upon to respond. Responses to this survey center around the perceived lack of resource capability or lack of ability to get the resources to the MCD scene in time to meet requirements."Industrial College of the Armed Forces (U.S.)Glick, Jeffrey A.1997
-
Islam a Threat to the West? Maybe (Maybe Not)"Christendom, for most of the past millennium and a half, denoted mainly white Christians from the Urals to the Atlantic. By the middle of the lat century and as it became increasingly more secularized, Christendom became known dimply as Europe. 'Europe discovered, named, and in a sense made American.' Although other races and cultures participated in the creation of America, in the eyes of the rest of the world, Europeans dominated in the giving of religion, language, and customs. Together these two became the West, the most influential power of the last four centuries. Today, the West feels the influence of a 'new' power-Islam-and this change is frightening not only ordinary men, but even the intelligentsia. The goal of this paper is to review the academic arguments concerning the threat of Islam, increase the reader's knowledge of Islam, dispel the fear that Islam is the new 'evil empire,' and challenge Western policy makers to reconsider their concerns about the threat of Islam." The author focuses on African, Arab and Persian Islam.Industrial College of the Armed Forces (U.S.)Frahler, Donald A.1994
-
National Security Implications of Transnational Economic Activity"This paper discusses the impact of regional trading arrangements (RTA's), multinational corporations (MNC's, and transnational financial activity on U.S. national security. The National Security Strategy (January 1993) is used as the framework to define U.S. security interests and objectives. The size and importance of the U.S. economy to the world economy is recognized, as is the significance of global economic interdependence. Each transnational economic activity is presented in turn. The nature and scope of the activity is explained followed by analysis of its potential contributions to U.S. national security. Issues associated with the activity are then presented. In those instances where recommendations or counterpoints to the issues are relevant they are also presented. Three policy recommendations are made regarding the transnational economic activities analyzed: development of regional trading arrangements that comply with the GATT; U.S. support of international regulation of multinational corporation investment and taxation; and strengthening of the U.S. national economy in order to be a world class player in transnational financial activity."Industrial College of the Armed Forces (U.S.)Wismann, Joseph B.1993
-
North-South Conflict and Its Implications for U.S. National SecurityThe majority of Third World countries face numerous obstacles to development and are wrestling with ways to derive more benefit from the international economic system. With the disintegration of postwar economic consensus, economic issues have reemerged as the primary source of conflict between the North (developed market economies of Japan, Western Europe and North America) and the South or Third World (less developed economies of Africa, Asia and Latin America). This paper will examine the North-South Conflict and its implications for U.S. National Security. Specifically, it will address the source of the conflict -- obstacles to economic development of the Third World. Chapter 2 will describe the nature of the conflict and identify the critical components that may endanger U.S. interests. Chapter 3 will identify and analyze policy options designed to reduce or neutralize the economic threats posed to U.S. national security by this conflict. Chapter 4 will offer recommendations for national security decision-makers to improve the international economic balance with resulting assurance in our nation's security.Industrial College of the Armed Forces (U.S.)Dupont, Martin E.1993
-
DoD Space Based Requirements: Increasing DoD Access to Space"Despite aggressive plans for the exploitation of space for military purposes, the potential of space to provide secure communications, tactical targeting, intelligence, positioning, weather and other support functions remains virtually untapped. While there have been major successes in certain areas such as geopositioning, the experience of Desert Shield/Storm has demonstrated that far more capability will be needed to effectively support contingency operations and global reach. While the Air Force has concentrated on providing satellite support for high priority command and control communications, intelligence and other direct combat operations, the area of combat service support has not been adequately addressed by any of the services, either in planning or the budget process." This report indicates that contingency operations require global capability and states that DoD must establish an effective process to meet requirements including the establishment of a efficient and routine launch process. The author also reviews the commercial space launch industry and launch service market and discusses the current DOD launch facilities and operations. She then examines the impact of government contract practices and presents technological and acquisition alternatives and makes recommendations for how DoD can maximize the returns on its investments by revamping current practices and procedures, modernizing old launch facilities instead of investing in new ones, learning from commercial industries about how to implement cost control practices, and by continuing to fund research into technological advancements.Industrial College of the Armed Forces (U.S.)Kelly, Mary D.1993
-
Joint Tactics, Techniques, and Procedures for Joint Intelligence Preparation of the BattlespaceThis publication establishes doctrinal guidance and joint tactics, techniques, and procedures (JTTP) for use by joint intelligence organizations in preparing joint intelligence preparation of the battlespace (JIPB) products. The focus is on the JIPB process, in which analyses of the battlespace environment and adversary are combined in order to identify and analyze possible adversary courses of action (COAs). It describes how adversary and friendly COAs are evaluated and wargamed to support the joint force commander's (JFC's) decision making process. This publication is geared primarily towards preparatory intelligence analysis for operational level force-on-force confrontations. It also addresses how the JIPB process can be tailored to specific joint force planning activities and military operations other than war.United States. Joint Chiefs of Staff2000-05-24
-
Joint Intelligence Support to Military OperationsThis publication establishes doctrinal guidance on the provision of intelligence products, services, and support to joint operations. It provides the fundamentals of joint intelligence operations, addressing organization of joint intelligence forces, responsibilities, and command relationships. The focus will be joint intelligence support to combatant commanders revolving around the phases of the intelligence cycle: planning and direction, collection, processing and exploitation, production; dissemination and integration and evaluation. Finally, personnel, physical, operations and communications security considerations will be addressed.United States. Joint Chiefs of Staff1996-11-20
-
Joint Tactics, Techniques, and Procedures for Intelligence Support to TargetingThis publication provides joint tactics, techniques, and procedures (JTTP) for joint intelligence organizations to implement the fundamental principles of Joint Publication (JP) 2-0, "Doctrine for Intelligence Support to Joint Operations", supporting the doctrinal guidance of JP 3-60, "Joint Doctrine for Targeting", across the range of military operations. This JTTP publication describes the relationships and procedures necessary for intelligence support to joint targeting (including the operations and intelligence relationships) and roles and responsibilities at the national, combatant command, subordinate joint force, and component levels. This publication describes intelligence processes and procedures supporting the joint force commander (JFC) throughout all phases of the targeting cycle.United States. Joint Chiefs of Staff2003-01-09
-
National Intelligence Support to Joint OperationsThis joint publication describes national intelligence organizations and their support to joint military operations. Also addressed is the special support and augmentation available for joint operations by national joint elements such as the Military Intelligence Board, the National Military Joint Intelligence Center, and National Intelligence Support Teams. This joint publication covers Service intelligence organizations and centers, as well as nonmilitary agencies and nongovernmental organizations. The recommended target audience for this joint publication is commanders and intelligence staffs of combatant commands, subordinate unified commands, joint task forces, combat support agencies, and supporting Service components.United States. Joint Chiefs of Staff1998-09-28
-
War Powers Resolution: A Troubled Past and Uncertain FuturePerhaps one of the least talked about, yet most controversial, pieces of legislation surrounding the interpretation of the Constitution is the War Powers Resolution. Supporters say the resolution is essential in order to maintain the intent of the Framers of the Constitution to avoid creating an "Imperial Presidency". Critics say its restrictions of Presidential authority as Commander-in-Chief are flagrantly unconstitutional. Still others see the resolution merely as an ineffective political tool with loopholes that allow each Branch to invoke or ignore it as circumstances necessitate. While the author's observation is that all three positions are well founded, the system of checks and balances upon which our government is founded must apply to the war-making decision process. The resolution was developed during the height of the Vietnam conflict and specifies conditions under which the President may commit armed forces to hostilities overseas. It also regulates the process under which the President shall consult with the Congress over the use of armed forces as well as the timeframe forces may remain engaged in hostilities without Congressional action. Yet after twenty years of implementation, the resolution still sparks great debate over its constitutionality, requirements, and effectiveness. This debate centers, not along party lines, but between the Executive and the Legislative Branches of the government. This paper presents the historical roots of the War Powers Resolution, examines why it was developed, discusses the long-standing controversies surrounding it, and concludes with suggestions by the author for making the resolution effective.Industrial College of the Armed Forces (U.S.)Grant, Douglas A.1993
-
Environment and SecurityThe following is an overview of the major scholarly arguments and U.S. government activities to date concerning environment and security ideas. This broad ranging treatment is intended to provide a baseline for discussions. Given this wide scope, no one academic argument or policy manifestation is treated with the attention each individually deserves. We divide the field into three main categories: (1) debates regarding environment and new definitions of security, (2) debates regarding environment and traditional definitions of security, and (3) debates regarding how security institutions affect the environment. Within each of these categories, we detail arguments from what we loosely refer to as the proponents and critics of the various conceptions. It should be emphasized that considerable diversity in opinion persists both within and among these three categories regarding the degree of "threats" and the prioritization of issues.United States. Department of EnergyDabelko, Geoffrey D.; Simmons, P. J., 1967-1998-07-14
-
Environmental Dimensions of National SecurityFor many readers, the concept of "environmental security," or the integration of environmental issues and national security considerations at a national policy level, may well be novel. It may even appear somewhat oxymoronic. It is, in fact, neither. Rather, it reflects recent history and trends, and the significant evolution of our knowledge of both fields. This is not to say that the concept is well understood--as the papers in this volume illustrate, that is a work in progress--or, for that matter, that the concept is even universally accepted as valid. There are those in both the environmentalist and security communities who view such integration with deep skepticism, even alarm. More broadly, however, it can be argued that the debate about the validity and meaning of environmental security is a part of, and a reflection of, a number of basic trends that, taken together, mark this post-Cold War period as one of fundamental change. It may therefore be useful to explore this broader landscape within which the integration of previously disparate policy areas may be (is?) occurring, and at least alert the reader to some of the developments in the environmental and national security policy arenas. Hopefully, this discussion will provide a context within which the following papers and reference material can be more easily understood.United States. Department of EnergyAllenby, Braden R.1998-07-14
-
Arms Control Chronology: A History of International Efforts in Arms ControlThis document contains a timeline of the history of international efforts in arms control, beginning with the June 17, 1925 "Protocol for the Prohibition of the Use in War of Asphyxiating, Poisoning, or other Gases, and Bacteriological Methods of Warfare", known as the Geneva Protocol. The timeline extends through June 27, 1997 with the Conference on Disarmament approving a proposal to appoint a special coordinator who will seek to develop a mandate for negotiations on anti-personnel landmines. Australian ambassador John Campbell was named to the post.United States. Department of State1997-08
-
Civil Affairs: Reflections of the FutureIn a world of decreasing military confrontations, the U.S. military turns its attention increasingly to the restoration of war-torn infrastructures, such as rebuilding bridges, digging wells, and demining farmland. In a speech before the 1997 Worldwide Civil Affairs Conference, the assistant secretary of defense for special operations and low-intensity conflict, describes the civilian dimensions of today's military operations in many parts of the world. The recently completed Quadrennial Defense Review was a comprehensive review of U.S. defense needs through the turn of the century. As part of this review, Secretary of Defense William Cohen, articulated a clear vision for the Defense Department through the year 2015 and provided a blueprint for a strategy-based, balanced, and affordable defense program. Adhering to a national security strategy of engagement, we will continue to exercise strong leadership in the international community, using all dimensions of our capabilities to respond to the full spectrum of contingencies, to shape the international security environment, and to prepare now to meet the challenges of an uncertain future. These three components--respond, shape and prepare--represent the strategic basis for both the Quadrennial Defense Review and our future defense strategy. As we look to the future, it is critical that we maintain a presence and develop relationships in regions that are important to our national interest. Our challenge is to maintain an effective military presence throughout the world within a tighter budgetary environment. In order to do so, we must avoid high-cost solutions and seek greater international cooperation. Our civil affairs personnel allow us to do just that. The years ahead will be a time of testing for all of our armed forces. Pressure on the defense budget will place a premium on adaptability and our ability to accept change. I am confident that today's civil affairs forces have the creativity, versatility and professional skills to tackle new, unconventional tasks while maintaining their traditional skills, and that the civil affairs community will emerge strong in the coming decade, with a renewed sense of purpose in a changing world.United States Information AgencyHolmes, H. Allen, 1933-1997-07
-
Arms Control Fact Sheet: Review of Current Major Arms Control IssuesThe Chemical Weapons Convention (CWC) -- which entered into force on April 29, 1997, shortly after ratification by the U.S. Senate -- is a global treaty that bans an entire class of weapons of mass destruction. The Comprehensive Test Ban Treaty (CTBT), which bans all nuclear explosions, was negotiated in the Geneva Conference on Disarmament (CD) between January 1994 and August 1996 and opened for signature at the United Nations on September 24, 1996. President Clinton was the first to sign the treaty. As of July 8, 1997, 144 countries had signed, including all five nuclear weapons states. The basic provisions of the treaty are designed to: prevent the spread of nuclear weapons; provide assurance, through international safeguards, that peaceful nuclear activities in states that do not possess nuclear weapons will not be diverted to making such weapons; promote the peaceful uses of nuclear energy; and express the determination of the parties that the treaty should lead to further progress in comprehensive arms control and nuclear disarmament measures. The cornerstone of U.S. missile non-proliferation policy is the Missile Technology Control Regime (MTCR), which was formed in 1987 by the United States, Britain, Canada, Japan, then West Germany, Italy, and France. Today there are 28 member nations, and an increasing number of countries are unilaterally observing MTCR guidelines. Also discussed in this fact sheet is Ballistic Missile Defense (BMD).United States. Department of State1997-08
-
Civil-Military Relations in the Post-Cold War EraThe dean of the School of International Service at the American University in Washington, D.C., explores the changes in civilian-military relations since the end of the Cold War and looks ahead at what is needed to preserve this relationship. The military budget easily eclipses that of the next largest organization, be it a government ministry or a private corporation. What are the implications for civil-military relations worldwide, especially in democratizing countries with fragile political systems? Who is in charge? Does sufficient civilian control of the armed forces exist to guarantee that there will not be military interference with the overall workings of governments? While the primary purpose of the world's military forces continues to be the provision of national security, military downsizing has resulted in the assignment of new roles for the armed forces. These functions have ranged from supporting police efforts in maintaining internal order, to combating environmental deterioration, to providing basic health and education services, to constructing highways and bridges. Finally, and at least as important, military involvement in non-combat roles only can be seen as helpful for the consolidation of democracy if it does not harm the military's ability to carry out its core mission: providing for the nation's external security.United States Information AgencyGoodman, Louis Wolf1997-07
-
Fact Sheet: Banning Anti-Personnel LandminesPeople in 64 countries, mostly in the developing world, face a daily threat of being killed or maimed by the estimated 100 million landmines in place today. Anti-personnel landmines (APL) claim more than 25,000 casualties each year, obstruct economic development and keep displaced persons and refugees from returning home. Mines will remain a growing threat to civilian populations for decades unless action is taken now. To address this problem, on May 16, 1996, the President announced a new U.S. APL policy. This initiative sets out a clear path to a global ban on APL but ensures that as the United States pursues a ban, essential U.S. military requirements and commitments to our allies will be protected, as follows: Global Ban, Ban on Non-Self-Destructing APL, Self-Destructing APL, Annual Report, Alternatives to APL, and Expanding Demining Efforts. Steps remaining are gaining early agreement to begin to negotiate a ban on APL in the Conference on Disarmament and enhancing complementarity between work in the Conference on Disarmament and the "Ottawa Process;" developing alternatives so that the United States can end its reliance on APL as soon as possible; obtaining early entry-into-force of the Convention on Conventional Weapons amended Mines Protocol and expanding adherence to the Convention; continuing the expansion of humanitarian demining programs; and developing and fielding new mine detection and clearing technology.United States. Department of State1997-08
-
Emergency Planning Guidelines for American Businesses AbroadTopics covered include: crisis management; communications; evacuation planning; criminal acts, civil unrest and coups; natural disasters; epidemic and emergency care; planning for industrial accidents; citizens emergency services; and guidelines for emergency management services. The guidelines in this document are suggested to assist American organizations in the private sector and their personnel abroad in planning to meet their individual needs and circumstances. Individuals should ensure, however, that any approach chosen is best suited to their individual situation. Disasters can strike randomly and unpredictably. Preparing for emergencies is the focus of this booklet. It is essential to prepare for both those emergencies over which we have limited control and those over which we have no control. Application of preventive measures is also important to survival from catastrophic events. Contingency planning for emergencies should include the periods before, during, and after the incident. Each American business abroad must assume responsibility for the safety of their employees and assets through emergency planning. Emergency planning cannot be solely delegated to others, such as fire departments, medical personnel, or the government. However, cooperation and coordination with government emergency personnel is, of course useful, even though the degree of assistance will vary, depending on available resources etc. We must recognize that widespread chaos prevails following a major catastrophe, and we should not expect high-quality emergency service from usual providers. Emergency crews of all types are overwhelmed following a disaster. Utility services, such as telephones, electric power, and water and sewer facilities, will most often be disrupted. Finally, it is imperative that we adopt an attitude of continuous vigilance, especially in those situations where warning signs of imminent trouble are apparent. Examples of such events are political or military coups, and violent storms or floods that might indicate the need to evacuate. Hurricanes, tornadoes, and violent electrical storms are usually preceded by warnings. Hurried, last minute emergency planning is usually inadequate. Above all, avoid the attitude that "it will not happen to me."United States. Department of State. Bureau of Diplomatic Security1994-11
-
Political Violence Against Americans 2001Political Violence Against Americans is produced by the Bureau of Diplomatic Security's Office of Intelligence and Threat Analysis (DS/DSS/ITA) to provide readers with a comprehensive picture of the broad spectrum of political violence that American citizens and interests have encountered abroad on an annual basis. This publication encompasses major anti-U.S. incidents; how-ever, some incidents have been omitted due to the sensitive nature associated with them. This document reads like a fact sheet and is organized into the following sections: a statistical overview of 2001; Western Hemisphere affairs (WHA); Europe (EUR); Sub-Saharan Africa (AF); Near East (NEA); South Asia (SA); East Asia and Pacific (EAP); Americans in captivity: 2001; special report; suicide attacks against the World Trade Center Towers and the Pentagon; and Operation Enduring Freedom.United States. Department of State. Bureau of Diplomatic Security2002
-
Security Guidelines for American Enterprises AbroadThis booklet provides assistance in preparing us to face those emergencies we may encounter while living or traveling overseas. The guidelines which follow are suggested to assist American companies and their personnel abroad in planning to meet their individual needs and circumstances. Topics include: Preparing to travel; in transit; terrorism; overseas crisis planning; helping children adjust; security for children; evacuation; residential fire safety; and community participation in security. Although this booklet contains many tips for successful travel and residence abroad, it is by no means all inclusive. Additional information is available from a variety of sources, ranging from travel brochures, magazines, and books, to conversations with persons who have lived or traveled to your assigned country. You can never know too much about what you're getting into. Prior organization and preparation will significantly reduce your anxieties, lessen the shock of adjustment, and enable you to settle in with relative ease to a safe and enjoyable experience abroad.United States. Department of State. Bureau of Diplomatic Security1994-11
-
Security Guidelines for American Families Living AbroadThis publication is intended as a guideline for private sector personnel who travel and reside abroad. This booklet is a compilation of diverse security measures for consideration by American private sector employees and their families living and working outside the United States. Obviously, the implementation of security precautions described herein should be consistent with the level of risk currently existing in the foreign country of residence. Diverse political climates, local laws and customs, and a wide range of other variables make it impossible to apply standard security precautions worldwide. Levels of risk can change very rapidly, sometimes overnight, triggered by internal or external incidents or circumstances. It is advisable, therefore, to monitor continually the political climate and other factors which may impact the level of risk. Remember that establishing a family residence abroad requires much more security planning than a short-term visit to a foreign country for business or pleasure. It is essential that security precautions be kept under constant review so that they may be adapted to respond effectively to any changes in the level of risk. An inflexible security posture would be indicative of a disregard for the climate of risk and will almost certainly result in a lack of preparedness. Topics covered in this publication include: preliminary residential security planning; assessing the level of risk at overseas location; location of the residence; selection of residence; passport registration and other items to do after moving in; perimeter security; intrusion alarms and security lighting; extended absences from the residence; domestic hires--screening and responsibilities caution; family and company cars selection; auto travel; telephones; mail; banking and charge accounts; trash removal; quality of law enforcement protection; firearms in foreign countries; children's school; coups d'etat and emergency evacuations; social activities; spouse and dependent activity; watchdogs; recreation and exercise; illegal drugs and prescription medications; and lastly, bomb threats, bombings, extortion and kidnapping.United States. Department of State. Bureau of Diplomatic Security1994-11
-
Security Awareness Overseas: An OverviewWe gain a great sense of security and self confidence knowing we are prepared for potential crises. This booklet provides assistance in preparing us to face those emergencies we may encounter while living or traveling overseas. Many potential overseas crises may be eased or averted by taking the time to read and study the information that follows. Cultural misunderstandings and inadequate local support services often make crises abroad more intense than similar situations in the United States. Overseas, we must assume greater responsibility for our own safety. A rapidly changing political world has not lessened the attention one should pay to personal security when overseas. Natural disasters will continue, as will acts of terrorism. Indeed, one might expect increased incidents of civil unrest, some directed against Americans, as political situations remain unresolved. The guidelines which follow are suggested to assist American companies and their personnel abroad in planning to meet their individual needs and circumstances. Topics include: Preparing to travel; in transit; terrorism; overseas crisis planning; helping children adjust; security for children; evacuation; residential fire safety; and community participation in security. Although this booklet contains many tips for successful travel and residence abroad, it is by no means all inclusive. Additional information is available from a variety of sources, ranging from travel brochures, magazines, and books, to conversations with persons who have lived or traveled to your assigned country. You can never know too much about what you're getting into. Prior organization and preparation will significantly reduce your anxieties, lessen the shock of adjustment, and enable you to settle in with relative ease to a safe and enjoyable experience abroad.United States. Department of State. Bureau of Diplomatic Security1994-11
-
Ghosts in the Machines?The author cites law enforcement as a primary area where global information security can be enhanced. He calls for "the harmonization of national laws against computer attack, multinational cooperation in tracing attacks across national lines, international treaties on extradition of attackers, and a readiness to impose sanctions on those who protect attackers." He believes a willingness to share information on research and development, on attack indications and warnings, and on attack incidents and responses "can also improve the efficacy of each nation's protective measures." Computer attacks, if sufficiently systematic, may be war by other means -- hence "information warfare," as an overarching concept. But information warfare understood broadly -- attacking an adversary's information and decision processes -- is as old as warfare itself. Such tactics encompass psychological operations, attacks on an enemy's command apparatus, espionage and counter-espionage, and operations against adversary infrastructures and surveillance systems. During the U.S. Civil War (1861-1865) there were incidents of propaganda operations, snipers targeting opposing generals and observers in hot-air balloons, marauders tearing up telegraph lines, cavalry pickets and counter-cavalry demonstrations -- all information warfare. World War II saw the advent of electronic warfare in the form of radar, electronic deception, radio-frequency jamming, codemaking, and computer-aided codebreaking. Two indicators may reveal a great deal about the true risk from systems attack. One is how people react to the year 2000 computer problem. Assume a large share of the world's information systems crash at midnight on December 31, 1999. Will panic and paralysis result, or will people quickly find ways of working around the problem or doing without information for awhile? If lawsuits erupt, what precedents will be established to assign responsibility to people for harm done if their systems fail? The other harbinger is of more recent origin. Were one to imagine the most plausible perpetrator of serious information warfare terrorism, it would be someone with nothing that can be held at risk (i.e., not a country), several hundred million dollars in hidden cash, an appreciation of technology, an international network of nefarious friends, and a vicious score (real or imagined) to settle with the United States or some other nation. Sound familiar? If it does, what happens in the next year may reveal whether powerful individuals or groups might try to bring a country to its knees through information warfare -- or whether they direct their efforts elsewhere.United States. Department of StateLibicki, Martin C.1998-11
-
CIAO: An Integrated Approach to Counter Threats of a 'New Era'"The full support of the private sector" is vital in protecting U.S. critical infrastructures against cyber attack, says Dr. Jeffrey A. Hunker, Director of the Critical Infrastructure Assurance Office (CIAO). "The threat that we are facing is a threat that's growing over time," he says. "And so we need to respond with a sense of urgency and produce real results very quickly to combat it." Hunker was interviewed by Contributing Editor Susan Ellis. This interview includes questions on Hunker's responsibilities, challenges, and plans as CIAO director. Topics include telecommunications, vulnerabilities to cyber attack, the agancies assigned to work together and with the public on these issues, and the nature and gravity of threats to U.S. critical infrastructures.United States. Department of StateEllis, Susan1998-11
-
Response of Higher Education to Information WarfareThere is a growing demand for information security professionals in an era when "malicious vandalism, criminal activity, and international information warfare" all may threaten the nation's information infrastructure, says Dr. Charles Reynolds. He describes how the academic community is collaborating with government and industry to meet that need through an initiative launched in 1997 called the National Colloquium for Information Systems Security Education (NCISSE). The author, 1998 chairman of NCISSE's executive committee, also outlines James Madison University's efforts to respond to emerging national priorities in countering the threats to U.S. information networks. To counter the threats of the new era in information technology, our nation needs an information-literate work force that is aware of the emerging vulnerabilities of critical infrastructures, as well as a cadre of information security professionals who are knowledgeable about the recognized "best practices" available in information security and information assurance. Participants who complete the Information Security Program at James Madison University earn a Master of Science degree in computer science with a concentration in information security. The program is based on a standard endorsed by the National Security Agency and is designed to develop the knowledge and skills necessary to understand the interrelationships between information security and information technology and to relate both the technical and human components of information security and information technology. The program begins with a preparatory segment for those who need to strengthen their computing skills before beginning the computer science core. This is followed by three courses in computer science that cover data-base management, operating systems and networks, and application software development. Building on this strong foundation, the third period introduces information security, the concepts of trusted information systems, and techniques for secure information storage and transmission, especially by encryption. The fourth segment teaches management and administrative issues in information security including risk and vulnerability analysis, information system audit tools and procedures, and legal, ethical, and policy issues. A final capstone project integrates the whole program with a project that challenges participants to analyze the security of an information system.United States. Department of StateReynolds, Charles W., 1948-1998-11
-
Costs of Nuclear Weapons in South AsiaWith continued fighting in Kashmir, "the risk of another India-Pakistan conventional war seems higher than ever before," says Lavoy. "Even if India and Pakistan do manage to establish nuclear deterrence, the effect will be that every Indian and Pakistani will live under the threat of nuclear annihilation." Lavoy is Director of Counterproliferation Policy in the Office of the Secretary of Defense. The nuclear tests conducted by India and Pakistan in May 1998 received wide and vocal support in each country. Patriotic Indians and Pakistanis had much to celebrate: their scientists had surmounted high political, financial, and technical barriers to achieve what only five other states had done: develop and detonate nuclear bombs. That their leaders authorized these tests in spite of strong international political pressures, including the threat of economic sanctions, only spurred the nationalist fervor in India and Pakistan. A year and a half after the Pokhran and Chagai Hills explosions, however, public confusion and anxiety have supplanted euphoria. Military clashes bordering on open warfare in Kashmir make even ardent nuclear advocates question the utility of nuclear deterrence, or whether it actually exists in South Asia. And in the face of deep poverty, outdated economies, and teetering governments, Indians and Pakistanis now prudently ask whether they can afford their growing arms competition. Continued fighting over Kashmir and the downing of aircraft in other areas indicate that nuclear deterrence has not yet emerged in South Asia. The risk of another India-Pakistan conventional war seems higher than ever before and India's relations with China also have deteriorated. Added to these problems are new risks of inadvertent or accidental nuclear use because of unsophisticated nuclear command-and-control systems and poorly defined nuclear doctrines. And, even if India and Pakistan do manage to establish nuclear deterrence, moreover, the effect will be that every Indian and Pakistani will live under the threat of nuclear annihilation. Welcome to the nuclear club. As U.S. Deputy Secretary of State Strobe Talbott has stated, "India and Pakistan need security, deserve security, and have a right to determine what is necessary to attain security." Are there ways for India and Pakistan to enhance their security without deploying nuclear weapons and missiles? Considering the dangerous and expensive record of the Soviet-American arms race, the enormous political and economic costs of Indian and Pakistani deterrent programs, and the growing risk of nuclear war in South Asia, India and Pakistan should make every effort to pursue nonnuclear sources of security. And, all concerned states should help them to achieve that security.United States. Department of StateLavoy, Peter R. (Peter René), 1961-1999-09
-
Proliferation of Weapons of Mass Destruction: Challenges and ResponsesThe challenge presented by the proliferation of weapons of mass destruction is great, but the international community is "resolutely determined to contain it," Holum says. "A strong, comprehensive nonproliferation strategy will remain a centerpiece of U.S. foreign policy as we advance America's interests and global security into the next century." Holum is Senior Adviser to the Secretary of State for Arms Control and International Security. Current trends in weapons of mass destruction (WMD) and missile proliferation are mixed. The past two years have presented some of the most difficult challenges the nonproliferation community has faced. Yet these same challenges afford opportunities to intensify awareness that such threats are real and require high-level and sustained attention. While WMD proliferation presents a significant challenge to the United States, the challenge is being addressed. Our nonproliferation strategy will continue to combine efforts to reduce incentives to acquire WMD, convince those on the supply side that threats from proliferation dramatically outweigh economic benefits, and remind proliferators that their actions come with a high price. The key remains to identify proliferation threats at an early stage before costly countermeasures are needed, keep focused on reducing WMD and missile programs to zero, and control access to key technologies. There will be circumstances where nonproliferation efforts will not succeed, and in those cases active counter-proliferation and defense initiatives must be maintained. Those who work to address proliferation challenges recognize the task can be daunting and that efforts to prevent proliferation are more important than ever before and also more difficult. The challenge is great, but the international community is increasingly focused on the threat and resolutely determined to contain it. A strong, comprehensive nonproliferation strategy will remain a centerpiece of U.S. foreign policy as we advance U.S. interests and global security into the next century.United States. Department of StateHolum, John D.1999-09