Advanced search Help
Clear all search criteria
Only 2/3! You are seeing results from the Public Collection, not the complete Full Collection. Sign in to search everything (see eligibility).
-
Chapter 3: Historical Aspects of Medical Defense Against Chemical Warfare
In discussing the history of the use of any new weapon and the medical response to it, one must also describe the context of the weapon: its scientific, social, and political aspects. For chemical warfare, there is the particular idea that chemical weapons are inhumane and immoral. Medical people, who treat the wounded, may well believe that all weapons are inhumane. Nevertheless, even the terms are relative--consider Pope Innocent II, who, in 1139, forbade the use of the relatively new crossbow as "Hateful to God and unfit for Christian Use." His prohibition was cheerfully ignored; the crossbow was used for over 300 years. In this essay, the author will return to the issue of the moral use of the chemical weapon, but he will begin with the early history of chemical warfare itself. The chemical weapon has a long and ancient history, especially in its presentation as flame and smoke. Modern chemistry made possible the use of chemical agents in a logistically and tactically feasible way in World War I. Most of what was known--and is still understood by the public--is based on the gas warfare of 1915-1918. Since then, "poison gas" has usually aroused public repugnance at its use as a weapon. Modest use in the 1930s against tribes and its lack of employment in World War II suggested that "gas warfare" had ended. The discovery of the German nerve gases after World War II, the Cold War, and the utility of tear gas in Vietnam maintained a military interest in the chemical weapon. The use of gas by Iraq against Iranian troops and the threat of Iraqi use in the Persian Gulf War clearly document that chemical warfare remains possible.
United States. Department of the Army. Office of the Surgeon General
Joy, Robert J. T.
1997
-
Chapter 8: Long-Term Health Effects of Nerve Agents and Mustard
Although the acute effects of the nerve agents and of mustard agent are well known, the longterm effects after a single exposure or multiple exposures are less well recognized. The nerve agents are the subject of Chapter 5, Nerve Agents, and mustard is a subject of Chapter 7, Vesicants, but this chapter focuses on the long-term effects. Available information implicates the nerve agents and mustard as the cause or probable cause of several long-term health effects. Polyneuropathy, the major neuromuscular manifestation seen after exposure to organophosphate pesticides, has not been reported in humans after exposure to nerve agents. Other long-term consequences of exposure to organophosphate pesticides are neuropsychiatric effects and possible EEG changes. The many studies of English and Japanese mustard factory workers establish repeated symptomatic exposures to mustard over a period of years as a causal factor in an increased incidence of airway cancer. The association between a single exposure to mustard and airway cancer is not as well established. The association between one-time mustard exposure and other chronic airway problems, such as chronic bronchitis, which is based on World War I data, seems more clearly established. Several eye diseases, such as chronic conjunctivitis, appear after an acute, usually severe, insult to the eye. In particular, delayed keratitis has appeared more than 25 years after the acute, severe lesion. The production of nonairway cancer by mustard has been demonstrated in animals, but scant evidence exists to implicate mustard as a causative factor in nonairway cancer in humans. Mustard causes chromosomal breakage and induces sister chromatid exchanges in man and has been classed as a mutagen. No data that implicate mustard as a reproductive toxin in man seem to be available, despite the many thousands of people exposed to mustard in the past 80 years.
United States. Department of the Army. Office of the Surgeon General
Sidell, Frederick R.; Hurst, Charles G.
1997
-
Chapter 4: The Chemical Warfare Threat and the Military Healthcare Provider
The military healthcare provider should be prepared to be the first to recognize military or civilian casualties of chemical warfare attack. This requires an informed understanding of the likelihood of chemical warfare agent use or threat, and it requires the ability to clearly recognize agent-exposure symptoms against a varying background of unrelated injury and stress behaviors. The healthcare provider should be informed, to the fullest extent possible, when to anticipate chemical warfare attack by hostile forces or terrorist activities. This requires consideration of an adversary with regard to political factors and motivation, chemical agent possession or access, chemical warfare offensive and defensive capabilities, and the strategic advantage to be realized through agent use. When individuals suspected to have been exposed to chemical warfare agents are encountered, initial recognition of the type of agent used may be facilitated through an understanding of tactical agent use, modes of agent dissemination, likely routes of casualty exposure to agent, and physical agent properties and other factors determining the persistence of these toxicants in the operating environment. Finally, to protect both the injured and medical personnel, casualty care must take place within a framework of decontamination both in the field and in forward medical support facilities.
United States. Department of the Army. Office of the Surgeon General
Takafuji, Ernest T.; Kok, Allart B.
1997
-
Chapter 6: Pretreatment for Nerve Agent Exposure
The inadequacy of postexposure therapy for nerve agent casualties, particularly those with potentially lethal exposures to soman, has been of great concern. Development of pyridostigmine, a peripherally active carbamate compound, as a nerve agent pretreatment adjunct has substantially improved the ability of the U.S. military to protect its soldiers from the lethal effects of nerve agents. A major deficiency of this pretreatment program --that it does not protect the CNS against nerve agent-induced injury--may be overcome by postexposure administration of anticonvulsants. While centrally acting pretreatments offer more effective protection than does pyridostigmine, their development is limited because of their potential for impairing soldier performance. New research may provide a revolutionary advance in protection against nerve agents with biotechnologically derived pretreatments that bind or inactivate nerve agents in the circulation.
United States. Department of the Army. Office of the Surgeon General
Sidell, Frederick R.; Dunn, Michael A.; Hackley, Brennie E., Jr.
1997
-
Chapter 1: Overview: Defense against the Effects of Chemical and Biological Warfare Agents
"Gas! Gas!" This warning cry, so common in World War I, almost became real to U.S. forces again as they prepared to liberate Kuwait in late 1990. The threat of chemical, and even biological, warfare was foremost in the minds of U.S. military personnel during Operation Desert Shield, the preparation for the Persian Gulf War. Iraq was known to have a large stockpile of chemical weapons and had demonstrated during its conflict with Iran that it would use them. It was not until after the Persian Gulf War that the U.N. Special Commission on Iraq confirmed that Saddam Hussein also had biological agents loaded in weapons. The chemical and biological threats were major concerns to those in the military medical departments who would be called on to care for poisoned or infected casualties, possibly in a chemically contaminated environment. Fortunately the ground war of the Persian Gulf War (Operation Desert Storm) was brief, and even more fortunately, our adversary did not employ these weapons. Two lessons were learned from this conflict, lessons that should never be forgotten by those in the military. The first was that there are countries that have chemical and biological weapons, and there are other countries that might obtain or produce them. The second was that the U.S. military medical departments must be prepared at all times to treat both types of casualties. As long as potential adversaries exist, the U.S. military might face a chemical or biological battlefield. The breakup of the Soviet Union, and the consequent glut of biowarfare experts on the world employment market, may have actually increased the threat of biological proliferation. In addition to the recent experience in the Persian Gulf, a review of other events of the past 2 decades bears out this conclusion.
United States. Department of the Army. Office of the Surgeon General
Sidell, Frederick R.; Franz, David R.
1997
-
Robust Multi-Scenario Optimization of an Air Expeditionary Force: Force Structure Applying Scatter Search to the Combat Forces Assessment Model
Modern Times' bring change in all areas of life. Even the rate of change has changed and is still changing to increase its enormous speed even more. Newer and more challenging questions face the military analysts everyday putting a question mark at the end of their last answer. Recently, the question of how to structure a robust air force to meet the requirements of competing, uncertain future scenarios has been keeping analysts busy. The new world order does not tolerate only being able to respond to a single scenario anymore, which once was considered a hard problem. Who knows what comes next?
In this thesis, we employ a robust optimization methodology to provide an answer to the multi-scenario optimization problem. The methodology uses a meta-heuristic, Scatter Search, to guide the search of the multi-scenario solution space obtained by the evaluations of Combat Forces Assessment Model, the model currently used to respond to single theater scenario objectives. A Visual BasicDOS routine performs the necessary interactions to find an Air Expeditionary Force structure robust across three notional threat scenarios.
Air Force Institute of Technology (U.S.)
Bulut, Gokay
2001-03
-
Towards a Game Theory Model of Information Warfare
The production and exchange of information has become a central activity in today's global economy. Protecting and securing information as it travels over the vast, mostly public Internet has emerged as perhaps the premiere issue of the Information Age. Thus, the attack and defense of electronic information has formed an entirely new kind of conflict - information warfare. Information warfare is still in its infancy. Government and private organizations alike poorly understand this ubiquitous form of confrontation. Nevertheless, they cannot avoid devoting ever increasing portions of their budgets to information warfare. Both obtaining other's information and defending one's own information have become critical economic decisions. As with any economic decision, the benefits (i.e. utility) must be commensurate with the resources expended to acquire those benefits. Game theory could provide a new method for analyzing information warfare. The strategic and tactical decisions that face information warriors are essentially economic in nature. Does the value of the information being defended or sought justify the cost of protecting or seeking it? Game theory could contribute to a better understanding of information warfare strategy and implications. The application of game theory to information warfare is a complex and massive undertaking. This study is but the first step in exploring the full ramifications of this potential application of game theory.
Air Force Institute of Technology (U.S.)
Burke, David A.
1999-11
-
Using GPS as a Reference System to Hit a Moving Target
The Affordable Moving Surface Target Engagement (AMSTE) project attempts to develop affordable solutions to the precise moving target surface target engagement problem. Up to this point, most of the error analysis performed for the AMSTE project has been at the error variance level, generating root-sum-square (RSS) total errors from error budgets consisting of constant error variances. In reality, the level of error for both Global Positioning System (GPS) positioning and radar targeting systems is highly dependent upon the given situation (such as the distance between sensor and target, the altitude differences, etc.)
This research generates a more comprehensive model of the GPS errors based upon the underlying physics of the situation. It focuses on differential troposphere errors and multipath, as these are the primary error source in a differential GPS targeting system. In addition to the error model development, a code-based differential GPS and differential ranging approach is implemented in simulation using a Kalman filter. This approach uses GPS measurements collected by each of the sensors and the weapon, and it uses ranging measurements from the sensors to the bomb and the target. Multiple cases are run varying 1) the number of GPS satellite measurements tracked by each receiver, 2) whether or not the common GPS errors are estimated, and 3) whether or not the bomb is tracked with the same radar sensors that are tracking the target. The horizontal DRMS position error during the terminal phase of the bomb trajectory drops from about 6 meters to about 3.5 meters.
Air Force Institute of Technology (U.S.)
Burnette, Daryl J.
2001-03
-
Wavelet Domain Communication System (WDCS): Design, Model, Simulation, and Analysis
A proposed wavelet domain communication system (WDCS) using transform domain processing is demonstrated as having enhanced interference avoidance capability under adverse environmental conditions. The WDCS system samples the environment and uses the wavelet transform, to determine interference presence and time/scale location. A digital communication waveform (basis function) is subsequently designed in the wavelet domain to specifically avoid regions containing interference. The WDCS basis function is data modulated prior to transmission. Assuming perfect synchronization, the receiver replicates a locally generated basis function for correlating with the received signal and demodulating the data. The proposed system is modeled and simulation results are obtained using MATLAB. Bit error rate is the metric for analysis and performance comparisons. Relative to an equivalent DSSS, the WDCS provided bit error performance improvement in several different interference scenarios. The system also demonstrated comparable performance to a developmental TDCS while providing significant improvement in scenarios containing swept-tone interference. The system was evaluated using signal bit energy-to noise power level (Eb/No) of 4.0 dB and interference energy-to-signal energy (I/E) ratios ranging from 0 dB to 16.0 dB. As defined, performance improvement metrics representing the ratio of DSSS-to-WDCS and DSSS-to-TDCS bit error rates were used for characterizing performance. For antipodal data modulation, the average (over all interference scenarios) DSSS-to-WDCS performance improvement was 12.4 dB, approximately equal to the DSSS-to-TDCS (comparable performance). For binary orthogonal data modulation, the average DSSS-to-WDCS improvement was 5.7 dB vs. 6.8 dB for the DSSS-to-TDCS comparison. These results indicate the proposed WDCS is a viable option for interference avoidance communications and worthy of further study.
Air Force Institute of Technology (U.S.)
Klein, Randall W.
2001-03
-
Viral Computer Warfare Via Activation Engine Employing Steganography
Information warfare is probably the most mysterious, magical, and sophisticated area of study for computer professionals today. Information warfare scientists employ their skills in the use of common electronic mail and the not so common art of steganography in attempts to develop defenses against intrusions and to implement attacks on target systems. To enhance capabilities, steganography is employed and is the art and science of communicating through covert channels. The goal is to hide a message or executable program inside a carrier file such as a photograph in digital form. The growth of attacks in the commercial environment and the possibility of applying those same techniques for military purposes has increased the interest in manipulation of the Internet as a deployment system for cyber-attacks. Electronic mail is currently the most widely exploited practice for the delivery of viruses, Trojan horse programs, or other malicious code. The results of this research indicate that the use of a separate engine followed by an HTML-based electronic mail message containing a photographic image with a steganographically embedded virus or other payload is a vulnerable attack if implemented without the proper environment variables in place. Although successful in delivery of a known virus without detection in the electronic mail reader, it still requires human intervention to initiate the virus attack. Furthermore, the dual stage delivery of the engine, and later the message, allowed for a higher probability of detection at the target system.
Air Force Institute of Technology (U.S.)
Lathrop, Dale A.
2000-03
-
Meeting U.S. Defense Needs in Space: Effects of a Shrinking Defense Industrial Base on the Satellite Industry
U.S. defense industrial base (DIB) deterioration and increased DoD interest in space exploitation highlights the U.S. satellite industry as one DIB sector requiring analysis. Despite DIB problems, this industry must maintain the capability to produce advanced satellites for the DoD. Commercial-Military Integration (CMI) will, according to experts, eliminate problems inherent with a separate DIB. This research focused on investigating satellite industry capability to meet DoD space requirements. Through literature review, case study analysis and interviews, effects of a shrinking DIB on the satellite industry were determined. A model for DIB strength was developed and analyzed through literature review. General Electric Aircraft Engines (GEAE) case study showed the potential for commercializing the DIB. Research focused on satellite industry executives whose perspectives illustrated industry capability to meet defense space needs. Results indicated continued DIB deterioration unless Government and defense industry leaders intervene. GEAE sales performance demonstrated how commercializing the DIB can provide stability. Interviews confirmed the satellite industry's ability to meet defense needs, yet space architecture and launch vehicle issues must be addressed. Through flexible manufacturing, dual use and smaller, smart satellites/satellite services, this industry can produce high quality, inexpensive satellites for defense/commercial markets faster, providing additional surge/mobilization capability.
Air Force Institute of Technology (U.S.)
Cole, Ronald B.
1997-11
-
Methodology for Integrating the Scenario Databases of Simulation Systems
The use of many different simulation systems by the United States Department of Defense has resulted in many different scenario data representations contained in heterogeneous databases. These heterogeneous databases all represent the same data concept, but have different semantics due to intrinsic variations among the data models. In this research, I describe a unified scenario database to allow interoperability and reuse of the scenario data components while avoiding the problems of data redundancy. Using the object-oriented approach, the data and schema of the scenario databases, represented in an object-oriented model, are integrated into a global database also represented in an object-oriented model. The global database schema is extended to allow semantic interoperability of database components by explicitly associating the semantics of the schema elements of the database components with the global metadata. I create the Integration Dictionary to represent the semantic interoperability and to store the translation mappings between each database component and the global database. The Integration Dictionary also provides support for object-oriented views generation. Next, I describe a methodology to integrate databases using the Integration Dictionary. My methodology is based on an analysis of the semantics of conceptual schema elements and on the identification of related elements in the global schema. My methodology defines the resolution for schema conflicts, and associates these conflict resolutions with data changes in the Integration Dictionary. Selected parts of the Extended Air Defense Simulation (EADSIM) and Suppressor scenario databases are integrated into the global database to validate my methodology. I use the Object-Store database to implement the global database. This methodology can be applied to other systems that require database integration.
Air Force Institute of Technology (U.S.)
Colonese, Emília M.
1999-06
-
Integrated Synthetic Aperture Radar/Global Positioning System/Inertial Navigation System for Target Geolocation Improvement
A significant amount of military and civilian research has been aimed at the sensor fusion technology area. However, there has been little research into the fusion between synthetic aperture radar (SAR) sensors and navigation sensors like the inertial navigation sensor (INS) and the global positioning system (GPS). SAR is used in civilian and military applications to image ground based targets in reconnaissance and fighter targeting missions. The SAR range and range rate measurements are generally obtained and processed independently from the aircraft navigation system. This thesis explores a potential integration technique to fuse information from the navigation sensors with the SAR target measurements. Using Kalman filtering techniques, an INS/GPS/SAR integrated system was simulated in a single Kalman filter to analyze the SAR target geolocation accuracy benefits. Three different GPS receiver models were used in the integrated system: stand-alone, differential, and carrier-phase differential (using floating ambiguity resolution). Each of these GPS models was integrated with a common INS/SAR combination to determine the target geolocation accuracy improvements due only to GPS receiver type. Thesis results show that SAR targeting can be enhanced, through tight integration of an INS/GPS navigation system, without increasing the SAR resolution.
Air Force Institute of Technology (U.S.)
Young, Brian James
1999-03
-
Utility of Using a Third Party in Military to Commercial Technology Transfer
In the wake of the defense drawdown and end of the Cold War, government laboratories are facing a changing mission. It is not only to maintain technology superiority, but also to promote commercialization of their technologies. Although Congress has tried to facilitate technology transfer from the government to the private sector, the transfer process has been inconsistent. The need for assistance has initiated the use of third parties or intermediaries in the technology transfer process. This thesis evaluates the utility of a third party in the technology transfer process. An examination of Wright Technology Network (WTN), a third party, is used to form a case study of its value added to Wright Laboratory (WL) in striving to meet WL's mission. Interviews with employees at WTN and WL are used to obtain the data for this case study. The key findings of this research suggest recommendations that can be applied to understand the utility of third parties. Some key findings found include: Third parties assist firms in targeting and defining a technology problem or interest and third parties facilitate the transfer process through their ties with industry. Opportunities for additional research in this area are also offered.
Air Force Institute of Technology (U.S.)
Taylor, David A.
1996-09
-
Formation of U.S. Security Assistance Policy: 1947-1959
Security assistance has played a vital role in the formation of foreign policy objectives throughout United States history. It is generally accepted that a formal security assistance program was initiated in the U.S. following the conclusion of World War II with the signing of the Greek-Turkish Aid Bill. From this point forward the U.S. would embark on a global attempt to shape the world political environment to suit our own national objectives and priorities. The period between 1947 and 1959 offers a unique look at the formative years of our national security assistance program both in terms of world events as well as debate surrounding the program. This thesis investigates the evolution of the program through an intensive historical literature review of major pieces of legislation and doctrines during the time period between 1947 through 1959.
Air Force Institute of Technology (U.S.)
Mazul, Gregory S.
1997-09
-
Comparative Analysis of the Iridium® and Globalstar® Satellite Transmission Paths
Low earth orbit Satellite-based Personal Communication Systems (S-PCS) such as Globalstar 1 and Iridium 2 will provide a valuable global communications asset for business, humanitarian aid and military operations. However, the level of coverage and the quality of the transmission path of these systems are strongly dependent on the latitude of the user and, due to their orbital characteristics; both systems provide reduced levels of coverage at low latitudes. Additionally, the L- and S-Band frequencies utilized by these systems are prone to ionospheric interference at low latitudes. In order to quantify these effects and allow a comparison to be conducted, both constellations are simulated and analyzed in terms of their transmission path elevation and azimuth angles, satellite visibility and levels of path attenuation. The results indicate that the Globalstar constellation architecture provides a considerably better transmission path than Iridium's in several important areas, including path elevation angles, satellite visibility and susceptibility to ionospheric effects. For example, at low latitudes, Globalstar provides a 25% higher elevation angle and a 60% greater probability of multiple satellite coverage. These factors impact the expected levels of signal multipath effects, shadowing and blockage from terrestrial obstacles such as trees or buildings. To assist future study in this area, a unique set of equations has been developed which describe the distribution of Iridium and Globalstar path elevation angles entirely as a function of the user's latitude. In addition to the differences in path elevation angles, modeling indicates that ionospheric scintillation is a potentially serious problem for both systems. However, Globalstar is expected to suffer lower fade levels than Iridium due to its higher downlink frequency and multiple path availability. The research concludes that, within the scope of the analysis, Globalstar provides a higher quality transmission path for users at low to mid-latitudes.
Air Force Institute of Technology (U.S.)
Crowe, Kenneth E.
1999-03
-
Dual Channel Matched Filtering and Space-Time Adaptive Processing
We propose a dual channel matched filtering system that addresses two key challenges in the practical implementation of a single channel matched filtering system: secondary data support and computational cost. We derive an exact expression of the dual channel normalized signal-to-interference plus noise ratio (SINR) in terms of random variables with known distributions and approximate expressions of the mean and variance of the normalized SINR. Using these approximate expressions, we demonstrated that the dual channel system requires half the secondary data to achieve nearly the same SINR performance as an equivalent single channel system. With the dual channel system, two reduced dimension weight vectors are used in place of the larger single channel weight vector, offering the potential reduction in computational cost. The key to the dual channel system is the efficient block diagonalization of the interference plus noise correlation matrix with a fixed transformation. The dual channel system is a viable replacement for a single channel system in applications involving real, wide-sense stationary random processes. We investigate the application of this dual channel concept to the problem domain of space-time adaptive processing (STAP), referring to the system as Block STAP. We provide evidence that the family of STAP correlation matrices cannot be simultaneously block diagonalized with a fixed transformation and thus, the implementation of the Block STAP processor will be suboptimal. We propose a transformation selection criterion for minimizing the loss in SINR performance of a suboptimal Block STAP processor. Finally, we introduce the SINR metric and a new eigen-based, reduced-rank direct form STAP processor based on the SINR metric. The SINR metric is used to identify the eigenvectors of the correlation matrix that have the greatest impact on SINR performance of a direct form processor. If the rank reduction transformation is constructed from r eigenvectors of the correlation matrix, then the r eigenvectors with the largest SINR are the optimal set of eigenvectors in terms of minimizing the loss in SINR performance of an eigen-based, reduced-rank direct form processor.
Air Force Institute of Technology (U.S.)
Berger, Scott D.
1999-06
-
Evaluation of the Appropriateness of the Defence Logistics Agency's Requirements Model
This thesis discusses the appropriateness of the Defense Logistics Agency's (DLA) requirements model in managing consumable support for Air Force specific items. Currently, DLA uses a lot sizing technique referred to as the classic Economic Order Quantity, (EOQ) model. One of the key assumptions of this model is that demand is constant and continuous. Yet with Air Force bases using a lot sizing technique to place their demands for consumable items to DLA, it is apparent that the demand pattern that DLA faces, at least for Air Force specific items, is not constant and continuous. This study looks at the impact of violations of the constant and continuous demand assumption on DLA's ability to support its customers. The findings of this study highlight the fact that the EOQ model does not perform well under the lumpy demand patterns that DLA faces. In addition, the Silver-Meal algorithm was used as a comparison to see if other inventory models could better handle this lumpy demand pattern. The Silver-Meal model required fewer inventories on hand and at a lower total variable cost than the EOQ model DLA is currently using.
Air Force Institute of Technology (U.S.)
Berry, Harry A.; Tatge, Edward E.
1995-09
-
Case Studies in the Analysis of the DoD Migration System Selection Process
One of the focuses of Corporate Information Management (CIM) initiative in the Department of Defense is the elimination of duplicate automated information systems. This thesis is a case study examination of the selection process in the logistics, transportation, and health functional areas. The case studies were performed through a one time review of documents relating to system selections in each functional area. A review of strategic information systems planning and systems implementation literature is used to examine the results in the three areas. The thesis concludes with three suggestions for improving the selection process with a emphasis on systems implementation.
Air Force Institute of Technology (U.S.)
Boley, II, Paul E.
1997-09
-
Hearing on Reauthorization of the Natural Gas and Hazardous Liquids Pipeline Safety Program: Hearing before the Subcommittee on Economic Development, Public Buildings and Emergency Management of the Committee on Transportation and Infrastructure, United States House of Representatives One Hundred Sixth Congress, First Session, July 27, 1999
The purpose of this hearing is to receive testimony on reauthorizing the natural gas and hazardous liquid pipeline safety program. Transportation by pipeline is one of the safest modes of transportation. However, there remains great potential for loss of life and significant damage to the environment. According to the Department of Transportation (DOT) records, in the five-year period from 1994 to 1998, 2,000 incidents were reported, involving over 120 fatalities, 2,000 injuries, and more than $450 million in property damage. These incidents leaked a total of 17.6 million gallons of hazardous liquids into the environment. Outside force damage is the leading cause of pipeline accidents involving fatalities or significant property damage, followed by corrosion. DOT maintains statistics on the industry categorized by year, by cause of incident, and by type of pipeline to monitor the industry record. Statements include those of the following persons: Kelley Coyner, James E. Hall, Steve Ball, John Zurcher, and Willard S. Carey.
United States. Congress. House. Committee on Transportation and Infrastructure
1999-07-27
-
U.S. Postal Service: Better Guidance Is Needed to Improve Communication Should Anthrax Contamination Occur in the Future
In 2001, letters contaminated with anthrax resulted in 23 cases of the disease, 5 deaths, and the contamination of numerous U.S. Postal Service facilities, including the Southern Connecticut Processing and Distribution Center in Wallingford, Connecticut (the Wallingford facility). The General Accounting Office (GAO) was asked to address, among other matters, whether (1) the Postal Service followed applicable guidelines and requirements for informing employees at the facility about the contamination and (2) lessons can be learned from the response to the facility's contamination. To help prevent a reoccurrence of communication problems, GAO recommends that the Postal Service, OSHA, GSA, and the National Response Team--a group chaired by the Administrator of EPA and comprising 16 federal agencies with responsibilities for planning, preparing, and responding to activities related to the release of hazardous substances--work together to revise their existing guidelines or regulations to, among other things, require prompt communication of available test results, including quantitative results, to workers and others, as applicable. The Service, EPA, and GSA generally agreed with our recommendations, indicating that they would work together to revise their guidelines. OSHA did not comment on our commendations.
United States. General Accounting Office
2003-04
-
Implementation of the Aviation and Transportation Security Act with a Focus on the 60-Day Deadline for Screening and Checked Baggage: Hearing before the Subcommittee on Aviation of the Committee on Transportation and Infrastructure, United States House of Representatives One Hundred Seventh Congress, Second Session, January 23, 2002
The purpose of this hearing is to review implementation of the Aviation and Transportation Security Act with a particular focus on how well the airlines and DOT have met the 60-day deadline for screening checked luggage. Currently, airlines use a computer profiling system, known as the Computer Assisted Passenger Prescreening System (CAPPS), to select those passengers who pose the greatest risk and whose baggage should be subject to a more rigorous inspection. Section 110 establishes two separate deadlines for checked baggage screening. The first deadline--60 days after enactment or January 18, 2002--required that all checked baggage be screened by some means. The law listed four possible ways that checked baggage could be screened: a bag match program that insures that no checked baggage is placed aboard an aircraft unless the passenger who checked the bag is aboard the aircraft; manual search, which involves opening the bag and searching through it by hand; search by canine explosive detection units, i.e., bomb sniffing dogs; other means or technology approved by the Under Secretary for Transportation Security. Statements include those of the following persons: John Magaw, Kenneth R. Mead, Carol Hallett, David Z. Plavin, and Arnold Barnett.
United States. Congress. House. Committee on Transportation and Infrastructure
2002-01-23
-
Port Security: Shipping Containers: Hearing before the Subcommittee on Coast Guard and Maritime Transportation of the Committee on Transportation and Infrastructure, United States House of Representatives One Hundred Seventh Congress, Second Session, March 13, 2002
The purpose of this hearing is to investigate the security of containers used to ship goods imported into and exported out of the United States by water. The Subcommittee will receive testimony from the Administration, cargo shippers, vessel operators, as well as freight terminal owners and operators. The goal of the Container Security Initiative is to reduce the vulnerability of cargo containers being used to smuggle terrorists or terrorist weapons while accommodating the need for efficiency in global commerce. This initiative will establish criteria for identifying high-risk containers, pre-screen containers before they are shipped to the United States, use technology to pre-screen high risk containers, as well as develop smart and secure containers. The Customs Service plans to focus on the largest foreign seaports that are responsible for shipping the greatest number of sea containers to the United States. Statements include those of the following: Anthony Regalbuto, Christopher Koch, Richard Larrabee, Basil Maher, and Wayne Gibson.
United States. Congress. House. Committee on Transportation and Infrastructure
2002-03-13
-
Hearing on H.R. 525: Preparedness against Domestic Terrorism Act, Subcommittee on Economic Development, Public Buildings and Emergency Management of the Committee on Transportation and Infrastructure, United States House of Representatives One Hundred Seventh Congress, First Session, May 9, 2001
The purpose of this hearing is to receive testimony on H.R. 525, a bill to amend the Robert T. Stafford Act to update Title VI of the Act and to provide coordination for federal efforts with regard to preparedness against terrorist attacks in the United States. The hearing will also address proposals offered by the Administration. H.R. 525 represents the view that (1) there is no national strategy for preparedness against terrorist attacks; (2) despite the multitude of existing federal preparedness programs, there is no defined end-state to determine at what point communities are prepared for a terrorist attack involving a weapon of mass destruction; (3) federal efforts are not coordinated resulting in fragmented and overlapping programs; (4) emergency responders insist there must be a single entity in charge of coordinating federal efforts; and (5) this entity must have authority over all federal agencies. Statements include those of the following persons: Earl Blumenauer, Joe M. Allbaugh, Mary Lou Leary, Charles Cragin, Ann Simank, and Edward Plaugher.
United States. Congress. House. Committee on Transportation and Infrastructure
2001
-
Electronic Frontier: The Challenge of Unlawful Conduct Involving Use of the Internet: A Report of the President's Working Group on Unlawful Conduct on the Internet, March 2000
Unlawful conduct involving the Internet challenges the safety and security of Internet commerce. How should society and government in particular, respond to the advent of these new ways of committing traditional crimes? This report responds to Executive Order 13,133 from President Clinton and sketches the preliminary contours of a legal and policy answer to that question. It provides a foundation and offers a framework for further dialogue among law enforcement officials and policymakers at all levels; members of the business community, trade associations, and the nonprofit sector; and members of the public on one of the most important issues we face in response to this powerful new communications medium and our new digital economy. In the policy framework and legal analysis section, for example, the topics include: "understanding the nature of unlawful conduct involving computer," "a framework for evaluating unlawful conduct on the Internet," "promoting private sector leadership," and "sufficiency of existing federal laws."
United States. General Accounting Office
2000-04
-
Analysis in Cloud-to-Ground Lightning Flashes Over Land-vs-Water
Understanding lightning characteristics over land and water is vital to achieving optimal safety and success in Air Force missions. Lightning safety rules are often based on experience rather than a scientific understanding of lightning. Examining lightning characteristics over water and land will assist in a better understanding of lightning and provide answers that can protect human lives and property. Water and land have different compositions and surface conductivity values. A lightning stroke is detected through a change in the electro-magnetic field at the surface. The change in surface conductivity values from land to water can affect the detection of a lightning stroke and its associated parameters. The change in composition from water to land can also affect the dynamics of a storm and the lightning discharge process. Data from the Salt Lake City, Mobile Bay, New Orleans, Kennedy Space Center, and Lake Okeechobee were used to determine if there are differences in lightning characteristics or behavior over land versus water. The National Lightning Detection Network (NLDN), Global Atmospherics, Inc., Tucson, Arizona recorded the lightning parameters. Differences were seen in eleven of the twelve characteristics compared over water and land. Results varied from area to area and over time, there was not a consistent response due to the change in underlying surface type. Not all differences could be directly attributed to the change in underlying surface type. In conclusion, the change in underlying surface type did not produce consistent change in lightning characteristics or behavior. Water did influence lightning characteristics and behavior in specific cases of median peak current differences and diurnal pattern.
Air Force Institute of Technology (U.S.)
Boll, Elizabeth A.
2000-03
-
Analysis for Cooperative Behavior Effectiveness of Autonomous Wide Area Search Munitions
The purpose of this study is to investigate how a simulation model can accurately represent the performance of the autonomous wide area search munitions, and to find the effectiveness of the cooperative behavior on the autonomous munitions. As a prediction tool for measuring the performance of the virtual weapon systems, simulation models are established because there are insufficient analytical tool for the prediction of weapon system performance. Though the simulation models may not accurately represent the actual autonomous weapon system, the result of the simulation may provide expectations of the performance of the autonomous munitions in actual battlefield scenarios. Several assumptions and limitations are necessary in dealing with the problem for the purpose of the simplicity. The assumptions and limitations will be presented in this thesis. Two simulation models were used in this research. One is a highly simplified model for validity investigation, and the other is an AFRL/VACA model which is still in development phase to investigate the effectiveness of cooperative behavior. The simulation result from the simplified simulation model will be compared to the calculated performance predicted from an analytical tool for validity investigation, and it will also dominate the potential effectiveness of cooperative behavior. The result from the AFRL/VACA simulation will also present the effectiveness of cooperative behavior in the virtual weapon system.
Air Force Institute of Technology (U.S.)
Park, Sang Mork
2002-07
-
Port Security: Credentials for Port Security: Hearing before the Subcommittee on Coast Guard and MaritimeTransportation of the Committee on Transportation and Infrastructure, United States House of Representatives One Hundred Seventh Congress, Second Session, February 13, 2002
The purpose of this hearing is to investigate the best way to implement a nationwide security system which requires transportation workers to hold secure identity cards. The Subcommittee will receive testimony from Administration, transportation industry, and labor representatives. There are a number of issues related to creating a workable credentialing system that need to be considered. These include: Are different levels of "security clearances" needed, depending upon the port area in which the individual will be granted access? Do all ports or terminals need to have secure areas? For example, does a grain elevator or a terminal that only unloads groceries and supplies for a small town need to have the same level of security as an oil terminal? Who needs a port security card? Do truck drivers, terminal workers, railroad workers, equipment repair personnel that work at ports all need security cards? Do personnel who work only at a grain elevator terminal need security cards? What is the extent of the background check for the individual? Does it include criminal acts, national driver register checks for drunk driving, drug testing, and "intelligence" checks to ensure that the individual is not a member of, or support, terrorist organizations? What factors will lead to denial of a security card? What criminal actions constitute a "security risk"? Statements include those of the following: James Underwood, James M. MacDonald, Herzl S. Eisenstadt, Peter Peyton, Philip L. Byrd, and John Bowers.
United States. Congress. House. Committee on Transportation and Infrastructure
2002-02-13
-
United States Coast Guard FY 2001 Budget Requests (Outside Witnesses): Hearing before the Subcommittee on Coast Guard and Maritime Transportation of the Committee on Transportation and Infrastructure, United States House of Representatives One Hundred Sixth Congress, Second Session, March 15, 2000
The purpose of this hearing is to receive testimony from a variety of witnesses about the Administration's fiscal year 2001 budget request for the U. S. Coast Guard. A detailed background memorandum on the Coast Guard's fiscal year 2001 budget request was distributed in preparation for the Subcommittee's first hearing on the Coast Guard's fiscal year 2001 budget held February 29, 2000. The Administration requests $4.6 billion for fiscal year 2001 for Coast Guard activities that are subject to appropriation. This request is $429 million (10.3 percent) more than the amount appropriated for the Coast Guard in fiscal year 2000. Statements include those of the following: Bart Stupak, John H. Anderson, Jr., Thomas J. Howard, Charles L. Calkins, Paul Donheffner, and Michael G. Sciulla.
United States. Congress. House. Committee on Transportation and Infrastructure
2000-03-15
-
Report of the Commodity Futures Trading Commission on the Futures Industry Response to September 11th
The futures industry demonstrated preparedness, resilience, and flexibility in the aftermath of the attacks. NYMEX and NYBOT, despite being directly and severely impacted by the September 11th attacks, successfully responded by following established contingency plans and/or by skillfully adapting to unforeseen challenges and new operational realities. NYMEX initially resumed trading on Friday, September 14th, using internet access to its electronic trading platform. It resumed open outcry trading on Monday, September 17th, after remarkable efforts to restore the functionality of its floor trading facility located only one block from the World Trade Center. NYBOT, whose facilities in 4 World Trade Center were destroyed, moved quickly into a well-conceived, well-resourced backup facility in Queens, complete with trading rings, and resumed its open-outcry trading operations on Monday, September 17th. The appropriate regulatory responses under the Plan vary from one market event to another but fall broadly into the categories of: identification and oversight of market moves, "first day" responses, subsequent follow-up and intensified oversight, and responses to particular market-related emergencies (such as the distress of a financial institution, physical emergencies, and major system malfunctions). In addition, the Commission prepared itself for potential problems connected with the Year 2000 date rollover by developing contingency plans focused on failures in building infrastructure services and mission-critical information systems.
United States. Commodity Futures Trading Commission
2002-03-11