WorldWideScience

Sample records for air defense warfare

  1. Electronic Warfare: Comprehensive Strategy Needed for Suppressing Enemy Air Defenses

    National Research Council Canada - National Science Library

    2001-01-01

    .... To achieve this suppression, the services use specialized aircraft designed to neutralize, destroy, or temporarily degrade enemy air defense systems through either physical attack or electronic warfare...

  2. Air Warfare and Air Base Defense 1914-1973

    Science.gov (United States)

    1988-01-01

    338 X Conclusion ............................................. 343 A ppendices ...military operations. During the battle of Stalingrad, however, the need for a more focussed defense became acute . Between November 19, 1942, when the

  3. Air Warfare

    Science.gov (United States)

    2002-03-01

    genus as its predecessor of pre-war days. It would, however, be erroneous to conclude from this that the military value of each new development was...the paucity of communications, its conduct, when acting alone, has of necessity to be somewhat stereotyped in nature, and to con- form to a pre...the air, the attack commander, provided his command be equipped with defensive air power, has a rôle to perform which is simple and stereotyped in

  4. Rethinking Defensive Information Warfare

    National Research Council Canada - National Science Library

    French, Geoffrey S

    2004-01-01

    .... This paper examines defensive tactics and strategies from the German defense in depth that emerged from World War I to the American Active Defense that developed in the Cold War and proposes a new mindset for DIW that draws on these operational concepts from military history.

  5. Rethinking Defensive Information Warfare

    Science.gov (United States)

    2004-06-01

    Countless studies, however, have demonstrated the weakness in this system.15 The tension between easily remembered passwords and suffi...vulnerabilities Undiscovered flaws The patch model for Internet security has failed spectacularly. Caida , 2004 Signature-Based Defense Anti virus, intrusion

  6. United States Coast Guard Antisubmarine Warfare (ASW) in the Maritime Defense Zone (MDZ) - A Strategic Approach

    Science.gov (United States)

    1989-03-01

    RIC ILE COPY AIR WAR COLLGE REEAC R~pCR UNITED STATES COAST GUARD ANTISUBMARINE WARFARE (ASW) IN THE MARITIME DEFENSE ZONE (MDZ) -A STRATEGIC...going to perform in these MDZs. Those tasks identified so far include: port and coastal physical security & preventive safety, mine warfare

  7. Simulating cyber warfare and cyber defenses: information value considerations

    Science.gov (United States)

    Stytz, Martin R.; Banks, Sheila B.

    2011-06-01

    Simulating cyber warfare is critical to the preparation of decision-makers for the challenges posed by cyber attacks. Simulation is the only means we have to prepare decision-makers for the inevitable cyber attacks upon the information they will need for decision-making and to develop cyber warfare strategies and tactics. Currently, there is no theory regarding the strategies that should be used to achieve objectives in offensive or defensive cyber warfare, and cyber warfare occurs too rarely to use real-world experience to develop effective strategies. To simulate cyber warfare by affecting the information used for decision-making, we modify the information content of the rings that are compromised during in a decision-making context. The number of rings affected and value of the information that is altered (i.e., the closeness of the ring to the center) is determined by the expertise of the decision-maker and the learning outcome(s) for the simulation exercise. We determine which information rings are compromised using the probability that the simulated cyber defenses that protect each ring can be compromised. These probabilities are based upon prior cyber attack activity in the simulation exercise as well as similar real-world cyber attacks. To determine which information in a compromised "ring" to alter, the simulation environment maintains a record of the cyber attacks that have succeeded in the simulation environment as well as the decision-making context. These two pieces of information are used to compute an estimate of the likelihood that the cyber attack can alter, destroy, or falsify each piece of information in a compromised ring. The unpredictability of information alteration in our approach adds greater realism to the cyber event. This paper suggests a new technique that can be used for cyber warfare simulation, the ring approach for modeling context-dependent information value, and our means for considering information value when assigning cyber

  8. Ending the Debate: Unconventional Warfare, Foreign Internal Defense, and Why Words Matter

    National Research Council Canada - National Science Library

    Jones, D

    2006-01-01

    There is an ongoing debate within the Special Forces community whether unconventional warfare and foreign internal defense are applicable in the contemporary and future Special Operations environments...

  9. Chemical and biological warfare. Should defenses be researched and deployed?

    Science.gov (United States)

    Orient, J M

    1989-08-04

    The threat of chemical and biological weapons of mass destruction has intensified because of improved delivery systems and advances in chemistry, genetics, and other sciences. Possible US responses to this threat include deterrence, defenses, and/or disarmament, including a reaffirmation of the Biological and Toxin Weapons Convention of 1972, which is now in jeopardy. This article discusses the history of chemical and biological warfare, existing and potential weapons, the proliferation of weapons and delivery systems, ways to prevent the use of these weapons, and ways to protect populations from their effects.

  10. Simulation-based planning for theater air warfare

    Science.gov (United States)

    Popken, Douglas A.; Cox, Louis A., Jr.

    2004-08-01

    Planning for Theatre Air Warfare can be represented as a hierarchy of decisions. At the top level, surviving airframes must be assigned to roles (e.g., Air Defense, Counter Air, Close Air Support, and AAF Suppression) in each time period in response to changing enemy air defense capabilities, remaining targets, and roles of opposing aircraft. At the middle level, aircraft are allocated to specific targets to support their assigned roles. At the lowest level, routing and engagement decisions are made for individual missions. The decisions at each level form a set of time-sequenced Courses of Action taken by opposing forces. This paper introduces a set of simulation-based optimization heuristics operating within this planning hierarchy to optimize allocations of aircraft. The algorithms estimate distributions for stochastic outcomes of the pairs of Red/Blue decisions. Rather than using traditional stochastic dynamic programming to determine optimal strategies, we use an innovative combination of heuristics, simulation-optimization, and mathematical programming. Blue decisions are guided by a stochastic hill-climbing search algorithm while Red decisions are found by optimizing over a continuous representation of the decision space. Stochastic outcomes are then provided by fast, Lanchester-type attrition simulations. This paper summarizes preliminary results from top and middle level models.

  11. Information Warfare: Issues Associated with the Defense of DOD Computers and Computer Networks

    National Research Council Canada - National Science Library

    Franklin, Derek

    2002-01-01

    ... that may threaten the critical information pathways of the armed forces An analysis of the history of computer information warfare reveals that there was an embarrassing lack of readiness and defense...

  12. Air defense planning for an area with the use of very short range air defense sets

    Directory of Open Access Journals (Sweden)

    Tadeusz Pietkiewicz

    2017-12-01

    Full Text Available This paper presents a heuristic method of planning the deployment of very short-range anti-air missile and artillery sets (VSHORAD around an area (‘protected area’ in order to protect it. A function dependent on the distance between the earliest feasible points of destroying targets and the centre of the protected area was taken as an objective function. This is a different indicator from those commonly used in the literature, and based on the likelihood of a defense zone penetration by means of an air attack (MAA: the kill probability of the MAA and the probability of area losses. The model constraints resulted directly from the restrictions imposed by real air defense systems and the nature of the area being defended. This paper assumes that the VSHORAD system operates as a part of a general, superordinate air defense command and control system based on the idea of network-centric warfare, which provides the VSHORAD system with a recognized air picture, air defense plans, and combat mission specifications. The presented method has been implemented. The final part of the paper presents the computational results. Keywords: optimal planning, air defense system, area installation protection, deployment of very short range anti-air missile and artillery sets (VSHORAD

  13. Towards a Flexible Theater Air Warfare Doctrine

    National Research Council Canada - National Science Library

    Gunzinger, Mark A

    1996-01-01

    "Billy Mitchell was right." These words hung in the foyer of the Air Force Air Command and Staff College during Desert Storm, reflecting the belief that air power had finally come of age in the skies over Iraq...

  14. Cyber Defense Exercises and their Role in Cyber Warfare

    OpenAIRE

    Bogdan Alexandru Bratosin

    2014-01-01

    The threat of cyber-attacks is increasing with the access to PC’s and Internet of a larger number of people around the world. Although the Internet provides a large number of advantages, it can also be used as a cyber-weapon in order to serve the interests of counties, political and economic groups or individual. The cyber-attacks of today are capable to disable the manufacturing of nuclear bombs of a country. Thus, there is an increasing demand for IT security specialists. Cyber-defense exer...

  15. From Douhet to drones, air warfare, and the evolution of targeting

    NARCIS (Netherlands)

    Osinga, F.P.B.; Roorda, M.P.; Ducheine, P.A.L.; Schmitt, M.N.; Osinga, F.P.B.

    2016-01-01

    Through the prism of the experience of air warfare, this chapter identifies key factors that have shaped targeting. These include technological developments, organizational structures, and processes and inter-service competition for scarce resources. Moreover, targeting is informed by perspectives

  16. Anti-Air Warfare Research for Naval Forces

    NARCIS (Netherlands)

    Bloemen, A.A.F.; Witberg, R.

    2000-01-01

    AAW is a warfare area with wide-spread spectrum. Command and Control Systems, sensors, effectors and electronic warfare are integrated to a system, they influence each other and must eventually be effective in coordinated action. This complexity asks for Operations Research methods to measure

  17. Computer Network Defense and Attack: Information Warfare in the Department of Defense

    National Research Council Canada - National Science Library

    Best, Carole

    2001-01-01

    .... This paper will discuss current computer network defense and attack policy in the context of ends, ways and means, explain what is lacking in current policy and offer recommendations for improvement...

  18. Modeling Anti-Air Warfare With Discrete Event Simulation and Analyzing Naval Convoy Operations

    Science.gov (United States)

    2016-06-01

    W., & Scheaffer, R. L. (2008). Mathematical statistics with applications . Belmont, CA: Cengage Learning. 118 THIS PAGE INTENTIONALLY LEFT BLANK...WARFARE WITH DISCRETE EVENT SIMULATION AND ANALYZING NAVAL CONVOY OPERATIONS by Ali E. Opcin June 2016 Thesis Advisor: Arnold H. Buss Co...REPORT DATE June 2016 3. REPORT TYPE AND DATES COVERED Master’s thesis 4. TITLE AND SUBTITLE MODELING ANTI-AIR WARFARE WITH DISCRETE EVENT

  19. Enhancing U.S. Defenses Against Terrorist Air Attacks

    National Research Council Canada - National Science Library

    2004-01-01

    .... Air Force, law enforcement authorities, the Federal Aviation Administration, airport security personnel, and many other agencies share responsibility for closing gaps in our national air defenses...

  20. Defense Base Closure and Realignment Budget Data for the Naval Surface Warfare Center

    National Research Council Canada - National Science Library

    1993-01-01

    ... and realignment military construction projects. This report provides the results of the audit related to the realignment of Naval Surface Warfare Centers elements in White Oak, Maryland, and Panama City, Florida, to Dahlgren, Virginia...

  1. Plasma flame for mass purification of contaminated air with chemical and biological warfare agents

    International Nuclear Information System (INIS)

    Uhm, Han S.; Shin, Dong H.; Hong, Yong C.

    2006-01-01

    An elimination of airborne simulated chemical and biological warfare agents was carried out by making use of a plasma flame made of atmospheric plasma and a fuel-burning flame, which can purify the interior air of a large volume in isolated spaces such as buildings, public transportation systems, and military vehicles. The plasma flame generator consists of a microwave plasma torch connected in series to a fuel injector and a reaction chamber. For example, a reaction chamber, with the dimensions of a 22 cm diameter and 30 cm length, purifies an airflow rate of 5000 lpm contaminated with toluene (the simulated chemical agent) and soot from a diesel engine (the simulated aerosol for biological agents). Large volumes of purification by the plasma flame will free mankind from the threat of airborne warfare agents. The plasma flame may also effectively purify air that is contaminated with volatile organic compounds, in addition to eliminating soot from diesel engines as an environmental application

  2. The Use of Air Power for Maritime Homeland Defense

    Science.gov (United States)

    2006-12-01

    available from http://www.odci.gov/ nic /PDF_GIF_global/globaltrend2015.pdf (accessed 17 March 2006). 25 Some argue terrorists would have difficulty acquiring...for the 181 For a discussion of the Afghanistan campaign, see Stephen Biddle , Afghanistan and the...78 Biddle , Stephen. Afghanistan and the Future of Warfare: Implications for Army and Defense Policy. Carlisle Barracks, Pennsylvania: U.S. Army

  3. Coalition Warfare: Considerations for the Air Component Commander

    National Research Council Canada - National Science Library

    Hunt, Peter

    1996-01-01

    ...: the Korean War (1950-1953), the Persian Gulf War (1990-1991) and the Balkan Air Campaign (1992-1995). Each conflict saw significant United Nations involvement, and the US provided the majority...

  4. Information Warfare: Issues Associated with the Defense of DOD Computers and Computer Networks

    National Research Council Canada - National Science Library

    Franklin, Derek

    2002-01-01

    The threat to the Defense Information Infrastructure is growing Hackers have advanced in sophistication and the potential exists for an alliance of independent hackers and terrorist/criminal groups...

  5. Information Warfare: An Air Force Policy for the Role of Public Affairs

    Science.gov (United States)

    1996-06-01

    war on remote foreign soil will almost always be a bad story in a liberal democracy. The easiest way for defense establishments to man- age the media...30 pages. NORWOOD, J. Scott, Maj, USAF. Thunderbolts and Eggshells : Composite Air Operations during Desert Storm and Implications for USAF

  6. Changing the face of cyber warfare with international cyber defense collaboration

    CSIR Research Space (South Africa)

    Grobler, M

    2011-03-01

    Full Text Available . The result is that many countries are not properly prepared, nor adequately protected by legislation, in the event of a cyber attack on a national level. This article will address the international cyber defense collaboration problem by looking at the impact...

  7. Intelligence Strategy for Fourth Generation Warfare

    National Research Council Canada - National Science Library

    Jamison, Edward P

    2006-01-01

    ...." They have named this new era of war "fourth generation warfare." Currently the Department of Defense's intelligence strategy is designed to defeat conventional adversaries vise a fourth generation warfare opponent...

  8. Analytic Methods for Tactical Air Warfare. Air Campaign and High-Energy Laser Propagation Analyses

    National Research Council Canada - National Science Library

    Lee, David

    2004-01-01

    .... The report describes a probabilistic model of campaigns for air superiority between two opponents, an analysis of force concentration in deterministic Lanchester campaigns, and an analysis of high...

  9. Transmissivity and storage coefficient estimates from slug tests, Naval Air Warfare Center, West Trenton, New Jersey

    Science.gov (United States)

    Fiore, Alex R.

    2014-01-01

    Slug tests were conducted on 56 observation wells open to bedrock at the former Naval Air Warfare Center (NAWC) in West Trenton, New Jersey. Aquifer transmissivity (T) and storage coefficient (S) values for most wells were estimated from slug-test data using the Cooper-Bredehoeft-Papadopulos method. Test data from three wells exhibited fast, underdamped water-level responses and were analyzed with the Butler high-K method. The range of T at NAWC was approximately 0.07 to 10,000 square feet per day. At 11 wells, water levels did not change measurably after 20 minutes following slug insertion; transmissivity at these 11 wells was estimated to be less than 0.07 square feet per day. The range of S was approximately 10-10 to 0.01, the mode being 10-10. Water-level responses for tests at three wells fit poorly to the type curves of both methods, indicating that these methods were not appropriate for adequately estimating T and S from those data.

  10. The potential impact of developments in electronic technology on the future conduct of air warfare, volume 3

    Science.gov (United States)

    1986-12-01

    Advances in microelectronics have resulted in circuit densities many orders of magnitude greater than in current usage, making possible higher speed circuitry and greater storage capacity. RF techniques are also leading to monolithic microwave integrated circuits and microstrip antennas with corresponding reductions in size and weight. In addition, rapid advances are taking place in computer architecture and software that will provide improved information processing and control. This, coupled with progress in artificial intelligence and man-machine interface, offers promise of greatly improved battle management in the cockpit. The scale of changes is such that the nature of air warfare should be significantly affected over the next twenty years. This study examined the potential of electronic technology and potential benefits such as improvements in information processing, reduction in size and weight, increased reliability and maintainability; determined the applicability of such improvements to avionics and command and control systems and such functions as navigation and guidance, communications, surveillance, cockpit engineering and electronic warfare; and examined the impact on air warfare in the time period 2000 to 2010.

  11. Expeditionary Air Base Defense: Historical Cases and Modern Implications

    Science.gov (United States)

    2017-06-01

    203. 50 As violence in Iraq’s urban areas surged in 2006, IDF attacks against Balad Air Base reached their peak, with approximately 475...defense operations when appropriate, but it is not a singular solution for quickly or completely reducing violence in the area of air bases. The case of...forces “drawing from the units available.”3 This is appropriate for small combat outposts ( COP ) or forward operating bases (FOB) in lower threat

  12. The Cooperative Engagement Capability CEC Transforming Naval Anti-air Warfare

    Science.gov (United States)

    2007-01-01

    E-2C Aircraft Acquisition Options,” MR-1517-NAVY (Santa Monica: RAND, 2002), 10. 33 Aegis is not an acronym. The ὰιγίς ( Greek ) or ægis (Latin) was...the shield of the mythological god Zeus (Jupiter) and thus represents a sure defense. 34 For an overview of USN surface (not air) AAW...real time, without significant delay. In World War II CICs, radar operators, plotters, CIC evaluators, and FDOs acted as “ animation artists

  13. Cyber Warfare/Cyber Terrorism

    National Research Council Canada - National Science Library

    O'Hara, Timothy

    2004-01-01

    .... Section 1 concludes with a review of offensive and defensive cyber warfare concepts. Section 2 presents a general overview of cyber terrorism, including definitions of cyber terrorism and cyber terrorism support...

  14. Strategy alternatives for homeland air and cruise missile defense.

    Science.gov (United States)

    Murphy, Eric M; Payne, Michael D; Vanderwoude, Glenn W

    2010-10-01

    Air and cruise missile defense of the U.S. homeland is characterized by a requirement to protect a large number of critical assets nonuniformly dispersed over a vast area with relatively few defensive systems. In this article, we explore strategy alternatives to make the best use of existing defense resources and suggest this approach as a means of reducing risk while mitigating the cost of developing and acquiring new systems. We frame the issue as an attacker-defender problem with simultaneous moves. First, we outline and examine the relatively simple problem of defending comparatively few locations with two surveillance systems. Second, we present our analysis and findings for a more realistic scenario that includes a representative list of U.S. critical assets. Third, we investigate sensitivity to defensive strategic choices in the more realistic scenario. As part of this investigation, we describe two complementary computational methods that, under certain circumstances, allow one to reduce large computational problems to a more manageable size. Finally, we demonstrate that strategic choices can be an important supplement to material solutions and can, in some cases, be a more cost-effective alternative. © 2010 Society for Risk Analysis.

  15. Discrete Event Simulation of a Suppression of Enemy Air Defenses (SEAD) Mission

    National Research Council Canada - National Science Library

    Candir, Ahmet A

    2008-01-01

    ...) operations have been a crucial element of military air power for 50 years. Several developments and evolution in both air defense and attack systems suggest that SEAD missions will continue to have growing importance to air forces...

  16. Defense Finance and Accounting Service Work on the FY 1993 Air Force Defense Business Operations Fund Financial Statements

    National Research Council Canada - National Science Library

    Rau, Russell

    1995-01-01

    Our original audit objective was to determine whether the Air Force Consolidated Defense Business Operations Fund financial statements, prepared by the DFAS Denver Center for FY 1993, were presented...

  17. Contamination in fractured-rock aquifers: Research at the former Naval Air Warfare Center, West Trenton, New Jersey

    Science.gov (United States)

    Goode, Daniel J.; Tiedeman, Claire; Lacombe, Pierre J.; Imbrigiotta, Thomas E.; Shapiro, Allen M.; Chapelle, Francis H.

    2007-01-01

    The U.S. Geological Survey and cooperators are studying chlorinated solvents in a fractured sedimentary rock aquifer underlying the former Naval Air Warfare Center (NAWC), West Trenton, New Jersey. Fractured-rock aquifers are common in many parts of the United States and are highly susceptible to contamination, particularly at industrial sites. Compared to 'unconsolidated' aquifers, there can be much more uncertainty about the direction and rate of contaminant migration and about the processes and factors that control chemical and microbial transformations of contaminants. Research at the NAWC is improving understanding of the transport and fate of chlorinated solvents in fractured-rock aquifers and will compare the effectiveness of different strategies for contaminant remediation.

  18. Short Range Air Defense in Army Divisions: Do We Really Need It

    National Research Council Canada - National Science Library

    Anderson, Charles

    2000-01-01

    Ever since the Soviet threat collapsed, coupled with the demonstrated, overwhelming, capability of our air forces during numerous operations in the 1990s, the relevance of the Short Range Air Defense (SHORAD...

  19. Guidance Optimization for Tactical Homing Missiles and Air Defense Systems

    Directory of Open Access Journals (Sweden)

    Yunes Sh. ALQUDSI

    2018-03-01

    Full Text Available The aim of this paper is to develop a functional approach to optimize the engagement effectiveness of the tactical homing missiles and air defense systems by utilizing the differential geometric concepts. In this paper the engagement geometry of the interceptor and the target is developed and expressed in differential geometric terms in order to demonstrate the possibilities of the impact triangles and specify the earliest interception based on the direct intercept geometry. Optimizing the missile heading angle and suitable missile velocity against the target velocity is then examined to achieve minimum missile latax, minimum time-to-go (time-to-hit and minimum appropriate missile velocity that is guaranteed a quick and precise interception for the given target. The study terminates with different scenarios of engagement optimization with two-dimensional simulation to demonstrate the applicability of the DG approach and to show its properties.

  20. Study on combat effectiveness of air defense missile weapon system based on queuing theory

    Science.gov (United States)

    Zhao, Z. Q.; Hao, J. X.; Li, L. J.

    2017-01-01

    Queuing Theory is a method to analyze the combat effectiveness of air defense missile weapon system. The model of service probability based on the queuing theory was constructed, and applied to analyzing the combat effectiveness of "Sidewinder" and "Tor-M1" air defense missile weapon system. Finally aimed at different targets densities, the combat effectiveness of different combat units of two types' defense missile weapon system is calculated. This method can be used to analyze the usefulness of air defense missile weapon system.

  1. Ground-Based Midcourse Defense (GMD) Initial Defensive Operations Capability (IDOC) at Vandenberg Air Force Base Environmental Assessment

    Science.gov (United States)

    2003-08-28

    Zielinski , EDAW, Inc., concerning utilities supply and demand for Vandenberg Air Force Base, 1 August. Rush, P., 2002. Personal communication between...Pernell W. Rush, Technical Sergeant, Water Utilities/Water Treatment NCO, USAF 30th CES/CEOIU, Vandenberg Air Force Base, and James E. Zielinski ... Dave Savinsky, Environmental Consultant, 30 CES/CEVC, Vandenberg Air Force Base, on the Preliminary Draft Ground-Based Midcourse Defense (GMD

  2. The Emerging Shield. The Air Force and the Evolution of Continental Air Defense 1945-1960

    Science.gov (United States)

    1991-01-01

    Vanessa D. Allen began the editing of the manuscript, and Mrs. Barbara W’attig then took over the brunt of the editing, guiding the book to completion...In July 1917, Great Britain established the London Air Defense Area (LADA), under the command of Maj. Gen. Edward B. Ashmore, an experienced artillery...Stratemeyer that the crisis had passed, and it ended the emer- gency. When the emergency operations had ceased, General Hoyt S. Van - denberg had, for

  3. Survey on radon concentration of civil air defense shelter in Hengyang

    International Nuclear Information System (INIS)

    Tang Quan; Ma Xiao

    2011-01-01

    In this paper, the radon concentration of civil air defense shelter was surveyed in Hengyang area, where there is higher background of radon concentration. If civil air defense shelter is not pressure-tight, the average radon concentration is about 55.9 -167.3 Bq/m 3 , lower than the intervened quantity: 200 Bq/m 3 , which is given by the international commission on radiological protection (ICRP). Maybe radon protection is not needed with the ventilation of civil air defense shelter like that. The radon concentration of airtight civil air defense shelter change along with the season, which is lower in spring and higher in autumn. The results can be a reference for using civil air defense shelter during the time of peace or war. (authors)

  4. Air Activated Self-Decontaminating Polydicyclopentadiene PolyHIPE Foams for Rapid Decontamination of Chemical Warfare Agents.

    Science.gov (United States)

    McGann, Christopher L; Daniels, Grant C; Giles, Spencer L; Balow, Robert B; Miranda-Zayas, Jorge L; Lundin, Jeffrey G; Wynne, James H

    2018-06-01

    The threat of chemical warfare agents (CWA) compels research into novel self-decontaminating materials (SDM) for the continued safety of first-responders, civilians, and active service personnel. The capacity to actively detoxify, as opposed to merely sequester, offending agents under typical environmental conditions defines the added value of SDMs in comparison to traditional adsorptive materials. Porous polymers, synthesized via the high internal phase emulsion (HIPE) templating, provide a facile fabrication method for materials with permeable open cellular structures that may serve in air filtration applications. PolyHIPEs comprising polydicyclopentadiene (polyDCPD) networks form stable hydroperoxide species following activation in air under ambient conditions. The hydroperoxide-containing polyDCPD materials react quickly with CWA simulants, Demeton-S and 2-chloroethyl ethyl sulfide, forming oxidation products as confirmed via gas chromatography mass spectrometry. The simplicity of the detoxification chemistry paired with the porous foam form factor presents an exciting opportunity for the development of self-decontaminating filter media. © 2018 WILEY-VCH Verlag GmbH & Co. KGaA, Weinheim.

  5. Governing Warfare

    DEFF Research Database (Denmark)

    Harste, Gorm

      It would seem as though warfare has gotten out of control, not only in Iraq and Afghanistan, but also in Central Africa. The paper outlines the strategic history of politically controlled warfare since the early Enlightenment. The argument is that control is implausible. The idea of control has...

  6. Cyber warfare building the scientific foundation

    CERN Document Server

    Jajodia, Sushil; Subrahmanian, VS; Swarup, Vipin; Wang, Cliff

    2015-01-01

    This book features a wide spectrum of the latest computer science research relating to cyber warfare, including military and policy dimensions. It is the first book to explore the scientific foundation of cyber warfare and features research from the areas of artificial intelligence, game theory, programming languages, graph theory and more. The high-level approach and emphasis on scientific rigor provides insights on ways to improve cyber warfare defense worldwide. Cyber Warfare: Building the Scientific Foundation targets researchers and practitioners working in cyber security, especially gove

  7. Development of portable mass spectrometer with electron cyclotron resonance ion source for detection of chemical warfare agents in air.

    Science.gov (United States)

    Urabe, Tatsuya; Takahashi, Kazuya; Kitagawa, Michiko; Sato, Takafumi; Kondo, Tomohide; Enomoto, Shuichi; Kidera, Masanori; Seto, Yasuo

    2014-01-01

    A portable mass spectrometer with an electron cyclotron resonance ion source (miniECRIS-MS) was developed. It was used for in situ monitoring of trace amounts of chemical warfare agents (CWAs) in atmospheric air. Instrumental construction and parameters were optimized to realize a fast response, high sensitivity, and a small body size. Three types of CWAs, i.e., phosgene, mustard gas, and hydrogen cyanide were examined to check if the mass spectrometer was able to detect characteristic elements and atomic groups. From the results, it was found that CWAs were effectively ionized in the miniECRIS-MS, and their specific signals could be discerned over the background signals of air. In phosgene, the signals of the 35Cl+ and 37Cl+ ions were clearly observed with high dose-response relationships in the parts-per-billion level, which could lead to the quantitative on-site analysis of CWAs. A parts-per-million level of mustard gas, which was far lower than its lethal dosage (LCt50), was successfully detected with a high signal-stability of the plasma ion source. It was also found that the chemical forms of CWAs ionized in the plasma, i.e., monoatomic ions, fragment ions, and molecular ions, could be detected, thereby enabling the effective identification of the target CWAs. Despite the disadvantages associated with miniaturization, the overall performance (sensitivity and response time) of the miniECRIS-MS in detecting CWAs exceeded those of sector-type ECRIS-MS, showing its potential for on-site detection in the future. Copyright © 2013 Elsevier B.V. All rights reserved.

  8. Discussion of the Necessity of Psychological Warfare Education in National Defense Education in Universities%试论普通高校国防教育中开展心理战教育的必要性

    Institute of Scientific and Technical Information of China (English)

    巴文娟

    2012-01-01

    现代心理战的战略地位对普通高校的国防教育提出了新的要求,必须将心理战教育纳入国防教育的内容体系之中,这是信息化时代的要求、国家心理安全的要求.也是大学生自身特性的要求,由此,才能使国防教育更好地为国家安全服务。%The strategic position of modern psychological warfare defense for college education put forward new demands, psychological warfare must be the content of education in national defense education system, is the requirement of the information age mental state security, and also the requirements of the students" characteristics, so that we can make education better serve the defense of national security.

  9. Combat Pair: The Evolution of Air Force-Navy Integration in Strike Warfare

    National Research Council Canada - National Science Library

    Lambeth, Benjamin

    2007-01-01

    This report documents the exceptional cross-service harmony that the U.S. Air Force and U.S. Navy have steadily developed in their conduct of integrated strike operations since the first Persian Gulf War in 1991...

  10. Regional Joint-Integrated Air and Missile Defense (RF-IAMD): An Operational Level Integrated Air and Missile Defense (IAMD) Command and Control (C2) Organization

    Science.gov (United States)

    2015-05-15

    Accessed April 26, 2015, http://www.state.gov/t/ avc /rls/2014/226073.html 24 Pacific Air Forces, PACAF establishes Pacific IAMD Center, Accessed April...U.S. Department of State. Gulf Cooperation Council and Ballistic Missile Defense. Accessed April 26, 2015. http://www.state.gov/t/ avc /rls/2014

  11. Ram-air sample collection device for a chemical warfare agent sensor

    Science.gov (United States)

    Megerle, Clifford A.; Adkins, Douglas R.; Frye-Mason, Gregory C.

    2002-01-01

    In a surface acoustic wave sensor mounted within a body, the sensor having a surface acoustic wave array detector and a micro-fabricated sample preconcentrator exposed on a surface of the body, an apparatus for collecting air for the sensor, comprising a housing operatively arranged to mount atop the body, the housing including a multi-stage channel having an inlet and an outlet, the channel having a first stage having a first height and width proximate the inlet, a second stage having a second lower height and width proximate the micro-fabricated sample preconcentrator, a third stage having a still lower third height and width proximate the surface acoustic wave array detector, and a fourth stage having a fourth height and width proximate the outlet, where the fourth height and width are substantially the same as the first height and width.

  12. Army National Guard Air Defense Artillery Modernization: A Vision for the Future

    Science.gov (United States)

    1994-05-15

    plan to replace Stinger Under Armor (SUA) for the ARNG, and no guarantee that the BSFV will be in the future ARNG force, divisional assets will remain...Ballistic Missile SUA Stinger Under Armor TAA Total Army Analysis TAAD Theater Area Air Defense TASM Tactical Air-to-Surface Missiles TBM Tactical

  13. Development of System Architecture to Investigate the Impact of Integrated Air and Missile Defense in a Distributed Lethality Environment

    Science.gov (United States)

    2017-12-01

    SYSTEM ARCHITECTURE TO INVESTIGATE THE IMPACT OF INTEGRATED AIR AND MISSILE DEFENSE IN A DISTRIBUTED LETHALITY ENVIRONMENT by Justin K. Davis...TO INVESTIGATE THE IMPACT OF INTEGRATED AIR AND MISSILE DEFENSE IN A DISTRIBUTED LETHALITY ENVIRONMENT 5. FUNDING NUMBERS 6. AUTHOR(S) Justin K...ARCHITECTURE TO INVESTIGATE THE IMPACT OF INTEGRATED AIR AND MISSILE DEFENSE IN A DISTRIBUTED LETHALITY ENVIRONMENT Justin K. Davis Lieutenant

  14. Insurgent Uprising: An Unconventional Warfare Wargame

    Science.gov (United States)

    2017-12-01

    Cleveland, Charles T. Connett, and Will Irwin. “Unconventional Warfare in the Gray Zone.” Joint Forces Quarterly 80, no. 1 (2016). Work, Robert O...CODE 13. ABSTRACT (maximum 200 words) Today, and in the future, unconventional solutions will present U.S. policymakers with options for dealing...training objectives and will complement existing training exercises. 14. SUBJECT TERMS unconventional warfare, foreign internal defense, direct

  15. Joining Forces: Preparing to Fight Coalition Air War

    Science.gov (United States)

    2013-06-01

    penny-packets” of airpower.4 As Mediterranean Air Commander, Air Chief Marshal Sir Arthur W. Tedder’s centralized control of the coalition’s airpower...3 D’Este, Bitter Victory, 1943, 162. 4 Sir Arthur W. Tedder, “Air, Land, and Sea Warfare.” as quoted by Clint Hinote, Centralized...exercises, combat exercises, and defensive exercises. The USAF, RAAF, and JASDF plan to engage in a multilateral exercise at Andersen Air Force Base

  16. On Modularity in (V)Shorad Air Defense

    NARCIS (Netherlands)

    Veen, E.M. van der

    2001-01-01

    This paper addresses the concept of modularity in the context of (V)Shorads Air Defence. Modularity is a technical concept that provides improved operational flexibility to (V)Shorad systems. Such improved flexibility is specifically relevant to mobile crisis reaction forces. The discussion is

  17. Back to the Future: Integrated Air and Missile Defense in the Pacific

    Science.gov (United States)

    2015-02-01

    US assets with those of our allies and partners, we have optimized our defense design, pre- venting the waste of precious interceptors. The Pacific...Good Offense: Attack Operations Power projection is, and always will be, th e bread and butter of the US Air Force. Only the United States can

  18. Air Base Defense: Different Times Call for Different Methods

    Science.gov (United States)

    2006-12-01

    small explosives in an attempt to drive U.S. forces from their territories. Many of these attacks were successful, resulting in the loss of human ...value.27 As the war rages on in Iraq, Matthew Levitt argues that the U.S. cannot afford to be distracted by the situation there, as terrorists may...serious and more difficult to defend.101 Air bases typically employ infrared and thermal imagers, security sentries, canine patrols and motion-tracking

  19. Beyond Close Air Support. Forging a New Air-Ground Partnership

    Science.gov (United States)

    2005-01-01

    the "eth- nic cleansing." Despite months of effort, air attacks did little damage to Serb forces. Those in Kosovo not only survived, they even...Blue Moon: Airmen in Theater Command, CADRE Paper No. 7, Air University Press, Maxwell Air Force Base, 2000. Biddle , Stephen, Afghanistan and the...Future of Warfare: Implications for Army and Defense Policy, Carlisle, PA: Strategic Studies Institute, U.S. Army War College, 2002. Biddle , Stephen

  20. Information Warfare: Defining the Legal Response to An Attack

    National Research Council Canada - National Science Library

    Pottorff, James

    1999-01-01

    This paper discusses the difficulty in determining whether an information warfare attack, such as a computer virus, can be treated as an "armed attack" for purposes of national defense under the United Nations charter. As the U.S...

  1. China’s Air Defense Identification Zone: Concept, Issues at Stake and Regional Impact

    Science.gov (United States)

    2013-12-23

    early Chinese legal culture ” Karen Turner “War, Punishment, and The Law of Nature in Early Chinese Concepts of The State”, Harvard Journal of Asiatic...lack of strategic direction, moral relativism , a failure to gauge the significance of what is at stake, and distraction with events in other regions of...WORKING PAPER 1 posted 23 December 2013 CHINA’S AIR DEFENSE IDENTIFICATION ZONE: CONCEPT , ISSUES AT STAKE AND REGIONAL IMPACT

  2. Air Force Management of the Defense Acquisition Workforce Development Fund: Opportunities for Improvement

    Science.gov (United States)

    2016-01-01

    savings, such as subsidized cafeteria food and free snacks and beverages . 51 Work-Life Balance and Flexible Work Some of the perks described above...John A. Ausink, Lisa M. Harrington, Laura Werber, William A. Williams, John E. Boon, Jr., Michael H. Powell Air Force Management of the Defense...charter requires the Director of Acquisition Career Management in each of the services to provide DoD with measurable objectives and to track the

  3. Patriot/Medium Extended Air Defense System Combined Aggregate Program (Patriot/MEADS CAP)

    Science.gov (United States)

    2013-12-01

    SPONSOR/MONITOR’S REPORT NUMBER(S) 12. DISTRIBUTION /AVAILABILITY STATEMENT Approved for public release; distribution unlimited 13. SUPPLEMENTARY...States, Germany, and Italy to replace the U.S. Patriot air defense systems, Patriot and Hawk systems in Germany, and the Nike system in Italy. The MEADS...combat demonstrated capability against these threats. MEADS will employ a netted distributed architecture with modular components to increase

  4. Sensitive and comprehensive detection of chemical warfare agents in air by atmospheric pressure chemical ionization ion trap tandem mass spectrometry with counterflow introduction.

    Science.gov (United States)

    Seto, Yasuo; Sekiguchi, Hiroshi; Maruko, Hisashi; Yamashiro, Shigeharu; Sano, Yasuhiro; Takayama, Yasuo; Sekioka, Ryoji; Yamaguchi, Shintaro; Kishi, Shintaro; Satoh, Takafumi; Sekiguchi, Hiroyuki; Iura, Kazumitsu; Nagashima, Hisayuki; Nagoya, Tomoki; Tsuge, Kouichiro; Ohsawa, Isaac; Okumura, Akihiko; Takada, Yasuaki; Ezawa, Naoya; Watanabe, Susumu; Hashimoto, Hiroaki

    2014-05-06

    A highly sensitive and specific real-time field-deployable detection technology, based on counterflow air introduction atmospheric pressure chemical ionization, has been developed for a wide range of chemical warfare agents (CWAs) comprising gaseous (two blood agents, three choking agents), volatile (six nerve gases and one precursor agent, five blister agents), and nonvolatile (three lachrymators, three vomiting agents) agents in air. The approach can afford effective chemical ionization, in both positive and negative ion modes, for ion trap multiple-stage mass spectrometry (MS(n)). The volatile and nonvolatile CWAs tested provided characteristic ions, which were fragmented into MS(3) product ions in positive and negative ion modes. Portions of the fragment ions were assigned by laboratory hybrid mass spectrometry (MS) composed of linear ion trap and high-resolution mass spectrometers. Gaseous agents were detected by MS or MS(2) in negative ion mode. The limits of detection for a 1 s measurement were typically at or below the microgram per cubic meter level except for chloropicrin (submilligram per cubic meter). Matrix effects by gasoline vapor resulted in minimal false-positive signals for all the CWAs and some signal suppression in the case of mustard gas. The moisture level did influence the measurement of the CWAs.

  5. Drone warfare

    Science.gov (United States)

    Gusterson, Hugh

    2017-11-01

    Crude drones existed as early as World War I, but the technology matured in the Yugoslav Wars of the 1990s and the current wars around the Middle East. The U.S. first used a weaponized drone in late 2001, in Afghanistan. Drones may cause more or less civilian casualties depending on the targeting protocols employed by their operators. There is an inherent ambiguity in determining who is an insurgent from several thousand feet, but civilian casualties are likely to be higher if targeters emphasize "signature strikes" over "personality strikes," if they engage in "double-tap strikes," if they rely too much on local informants, and if they rely too heavily on cellphone identification in the absence of corroboration from other intelligence sources. The legality of drone warfare is fairly clear in established battle zones such as Afghanistan, but is more problematic in terms of both international and domestic law when it comes to drone strikes in countries such as Yemen, Pakistan and Somalia with which the U.S. is not at war. Looking to the future, the U.S. would be well advised to sponsor negotiations for an international drone convention that might establish clear international rules for the use of drones, ban autonomous smart drones, and establish adjudicatory procedures to handle allegations of war crimes.

  6. Second Line of Defense, Port of Buenos Aires and Exolgan Container Terminal Operational Testing and Evaluation Plan, Buenos Aires, Argentina

    Energy Technology Data Exchange (ETDEWEB)

    Roberts, Bryan W.

    2012-08-23

    The Office of the Second Line of Defense (SLD) Megaports project team for Argentina will conduct operational testing and evaluation (OT&E) at Exolgan Container Terminal at the Port of Dock Sud from July 16-20, 2012; and at the Port of Buenos Aires from September 3-7, 2012. SLD is installing radiation detection equipment to screen export, import, and transshipment containers at these locations. The purpose of OT&E is to validate and baseline an operable system that meets the SLD mission and to ensure the system continues to perform as expected in an operational environment with Argentina Customs effectively adjudicating alarms.

  7. An Investigation of the Combat Air Patrol Stationing in an Integrated Air Defense Scenario

    Science.gov (United States)

    1990-12-01

    guided missiles, drones , decoys and short range missiles and bombs. The defensive elements include a C2 netting of early warning (EW), ground...M, 69 andar 70045 Brasilia, DF Brasil 6. Departamento de Ensino Da Aerondutica Av. Mal CAmara , 233, 10 andar 20020 Rio de Janeiro, RJ Brasil 7...Diretoria de Informdtica e Estatfstica da Aeron~utica Av. Mal CAmara , 233, 8Q andar 20020 Rio de Janeiro, RJ Brasil 11. Centro de Computagdo da Aeronutica-BR

  8. Defense Base Realignment and Closure Budget Data for the Closure of Gentile Air Force Station, Dayton, Ohio, and Realignment of Defense Logistics Agency Components to Wright-Patterson Air Force Base, Ohio

    National Research Council Canada - National Science Library

    1996-01-01

    .... This report provides the results of the audit of two projects, valued at $5.5 million, for the closure of Gentile Air Force Station, Dayton, Ohio, and realignment to Wright-Patterson Air Force Base, Ohio, of two Defense Logistics Agency components...

  9. 75 FR 65458 - Renewal of Department of Defense Federal Advisory Committee; Board of Visitors of the U.S. Air...

    Science.gov (United States)

    2010-10-25

    ... Committee; Board of Visitors of the U.S. Air Force Academy AGENCY: Department of Defense (DoD). ACTION... the Board of Visitors of the U.S. Air Force Academy (hereafter referred to as the ``Board''). FOR FURTHER INFORMATION CONTACT: Jim Freeman, Deputy Committee [[Page 65459

  10. Air Base Defense in the Republic of Vietnam, 1961-1973,

    Science.gov (United States)

    1979-01-01

    that trying year at best the The same conditions prevailed at Pleiku. Maj. Perry J. Rawls , Chief of RVNAF responsible for external de- Security Police...which depend on yourself alone and your own ability. Niccolo Machiavelli , 1513. The local ground defense of Forces Vietnam, Seventh Air Force, USAF...in 23. EOTR, Maj Perry J. Rawls , Ch/ Vietnam, Part H: May-December 1965 SP, Pleiku AB, 30 May 69. (Hist Div, USMC, 1970), p 6:18; lItr, 24. Ltr, Ch/SP

  11. Sources Of Evolution Of The Japan Air Self Defense Force’s Strategy

    Science.gov (United States)

    2016-12-01

    national security. • Second is the battle space of war. “Defensive defense” strategy conducts war definitely in its territory and bears that most of its...russia-in- 2016/. 271Ankit Panda , “East China Sea: Japan Reacts as Chinese Air Force Conducts Miyako Strait Drill,” Diplomat, September 26, 2016...June 22, 2016. http://www.voanews.com/a/north-korea- failed-missile-tests-show-real-progress/3386692.html. Panda , Ankit. “East China Sea: Japan Reacts

  12. Research on air and missile defense task allocation based on extended contract net protocol

    Science.gov (United States)

    Zhang, Yunzhi; Wang, Gang

    2017-10-01

    Based on the background of air and missile defense distributed element corporative engagement, the interception task allocation problem of multiple weapon units with multiple targets under network condition is analyzed. Firstly, a mathematical model of task allocation is established by combat task decomposition. Secondly, the initialization assignment based on auction contract and the adjustment allocation scheme based on swap contract were introduced to the task allocation. Finally, through the simulation calculation of typical situation, the model can be used to solve the task allocation problem in complex combat environment.

  13. Operational advantages of using Cyber Electronic Warfare (CEW) in the battlefield

    Science.gov (United States)

    Yasar, Nurgul; Yasar, Fatih M.; Topcu, Yucel

    2012-06-01

    While cyberspace is emerging as a new battlefield, conventional Electronic Warfare (EW) methods and applications are likely to change. Cyber Electronic Warfare (CEW) concept which merges cyberspace capabilities with traditional EW methods, is a new and enhanced form of the electronic attack. In this study, cyberspace domain of the battlefield is emphazised and the feasibility of integrating Cyber Warfare (CW) concept into EW measures is researched. The SWOT (Strengths, Weaknesses, Opportunities and Threats) analysis method is used to state the operational advantages of using CEW concept in the battlefield. The operational advantages of CEW are assessed by means of its effects on adversary air defense systems, communication networks and information systems. Outstanding technological and operational difficulties are pointed out as well. As a result, a comparison of CEW concept and conventional EW applications is presented. It is concluded that, utilization of CEW concept is feasible at the battlefield and it may yield important operational advantages. Even though the computers of developed military systems are less complex than normal computers, they are not subjected to cyber threats since they are closed systems. This concept intends to show that these closed systems are also open to the cyber threats. As a result of the SWOT analysis, CEW concept provides Air Forces to be used in cyber operations effectively. On the other hand, since its Collateral Damage Criteria (CDC) is low, the usage of cyber electronic attack systems seems to grow up.

  14. MOQPSO-D/S for Air and Missile Defense WTA Problem under Uncertainty

    Directory of Open Access Journals (Sweden)

    Hao Xu

    2017-01-01

    Full Text Available Aiming at the shortcomings of single objective optimization for solving weapon target assignment (WTA and the existing multiobjective optimization based WTA method having problems being applied in air and missile defense combat under uncertainty, a fuzzy multiobjective programming based WTA method was proposed to enhance the adaptability of WTA decision to the changes of battlefield situation. Firstly, a multiobjective quantum-behaved particle swarm optimization with double/single-well (MOQPSO-D/S algorithm was proposed by adopting the double/single-well based position update method, the hybrid random mutation method, and the two-stage based guider particles selection method. Secondly, a fuzzy multiobjective programming WTA model was constructed with consideration of air and missile defense combat’s characteristics. And, the uncertain WTA model was equivalently clarified based on the necessity degree principle of uncertainty theory. Thirdly, with particles encoding and illegal particles adjusting, the MOQPSO-D/S algorithm was adopted to solve the fuzzy multiobjective programming based WTA model. Finally, example simulation was conducted, and the result shows that the WTA model constructed is rational and MOQPSO-D/S algorithm is efficient.

  15. Defense Finance and Accounting Service Work on the FY 1993 Air Force Defense Business Operations Fund Financial Statements

    National Research Council Canada - National Science Library

    Rau, Russell

    1995-01-01

    ... fairly in accordance with accepted accounting principles. The objective was revised to correspond with the incremental audit approach that DoD audit organizations were using for the Defense Business Operations Fund' 5 financial statements...

  16. Flying Electronic Warfare Laboratory

    Data.gov (United States)

    Federal Laboratory Consortium — FUNCTION: Provides NP-3D aircraft host platforms for Effectiveness of Navy Electronic Warfare Systems (ENEWS) Program antiship missile (ASM) seeker simulators used...

  17. Back to the Basics: An Aviation Solution to Counterinsurgent Warfare

    National Research Council Canada - National Science Library

    Davis, Arthur D

    2005-01-01

    .... By examining past examples of the use of air power in counterinsurgent warfare, this study sheds light on the United States' current failings in both equipment and doctrine as it wages this type of war...

  18. Information Warfare and Ethics

    Directory of Open Access Journals (Sweden)

    M.J. Warren

    2001-05-01

    Full Text Available This paper examines the ethics of the practice of information warfare at both the national and corporate levels. Initially examining the present and past actions of individual hackers, it moves to the more organised, future military and economic warfare scenarios. It examines the lack of legal or policy initiatives in this area.

  19. Difficult Decisions: Chemical Warfare.

    Science.gov (United States)

    Slesnick, Irwin L.; Miller, John A.

    1988-01-01

    Gives the background history and chemistry of modern day chemical warfare from World War I to the present. Provides discussion questions to stimulate deeper thinking on the issue. Contains a discussion activity called "Can New Chemical Weapons Lead to Humane Warfare?" (CW)

  20. Modeling of Target Tracking System for Homing Missiles and Air Defense Systems

    Directory of Open Access Journals (Sweden)

    Yunes Sh. ALQUDSI

    2018-06-01

    Full Text Available One reason of why the guidance and control systems are imperfect is due to the dynamics of both the tracker and the missile, which appears as an error in the alignment with the LOS and delay in the response of the missile to change its orientation. Other reasons are the bias and disturbances as well as the noise about and within the system such as the thermal noise. This paper deals with the tracking system used in the homing guidance and air defense systems. A realistic model for the tracking system model is developed including the receiver servo dynamics and the possible disturbance and noise that may affect the accuracy of the tracking signals measured by the seeker sensor. Modeling the parameters variability and uncertainty is also examined to determine the robustness margin of the tracking system.

  1. Technologies for distributed defense

    Science.gov (United States)

    Seiders, Barbara; Rybka, Anthony

    2002-07-01

    For Americans, the nature of warfare changed on September 11, 2001. Our national security henceforth will require distributed defense. One extreme of distributed defense is represented by fully deployed military troops responding to a threat from a hostile nation state. At the other extreme is a country of 'citizen soldiers', with families and communities securing their common defense through heightened awareness, engagement as good neighbors, and local support of and cooperation with local law enforcement, emergency and health care providers. Technologies - for information exploitation, biological agent detection, health care surveillance, and security - will be critical to ensuring success in distributed defense.

  2. TECHNICAL ASPECTS REGARDING THE IMPROVEMENT OF AEROSPACE AIR DEFENSE VECTORS’ PERFORMANCES

    Directory of Open Access Journals (Sweden)

    Vasile SANDRU

    2013-01-01

    Full Text Available Confronted with the spectacular evolution of the aircraft and other aerial vehicles, the systems destined to combat them, especially Surface-to-Air Missile Systems (SAMS, went through an accelerated loss of their performance. The financial crisis has forced an extension of the system operation even if the system is outdated. Therefore, a new modernized version has been designed. Many times, it is better to improve an existing system than to buy a new one. This article describes the diversity of SAMS’s challenges, involving a decrease in time regarding their number. The types of challenges can be divided in two categories: technical and institutional ones. The technical challenges can be also divided in two categories: deterioration of material and obsolescence. The classes of material that present interest for us are aerodynamic vector structure, propulsion, and special systems. From an institutional point of view, the main problems are: cost versus performance and cost versus the remaining lifetime (technical resource of the air defense system. The article finishes with conclusions that support the possibility and necessity of a SAMS upgrade, given the change of the threats characteristics.

  3. Systems Concepts for Integrated Air Defense of Multinational Mobile Crisis Reaction Forces (Concepts de systemes pour la defense aerienne integree de forces internationales mobiles d'intervention en situation de crise)

    National Research Council Canada - National Science Library

    2001-01-01

    The meeting proceedings from this symposium on System Concepts for Integrated Air Defense of Multinational Mobile Crisis Reaction Forces was organized and sponsored by the Systems Concepts and Integration (SCI...

  4. Defining cyber warfare

    Directory of Open Access Journals (Sweden)

    Dragan D. Mladenović

    2012-04-01

    Full Text Available Cyber conflicts represent a new kind of warfare that is technologically developing very rapidly. Such development results in more frequent and more intensive cyber attacks undertaken by states against adversary targets, with a wide range of diverse operations, from information operations to physical destruction of targets. Nevertheless, cyber warfare is waged through the application of the same means, techniques and methods as those used in cyber criminal, terrorism and intelligence activities. Moreover, it has a very specific nature that enables states to covertly initiate attacks against their adversaries. The starting point in defining doctrines, procedures and standards in the area of cyber warfare is determining its true nature. In this paper, a contribution to this effort was made through the analysis of the existing state doctrines and international practice in the area of cyber warfare towards the determination of its nationally acceptable definition.

  5. Expeditionary Warfare- Force Protection

    National Research Council Canada - National Science Library

    Higgins, Eric

    2004-01-01

    In 2003, the Systems Engineering and Analysis students were tasked to develop a system of systems conceptual solution to provide force protection for the Sea Base conceptualized in the 2002 Expeditionary Warfare study...

  6. The Defense Science Board 2001 Summer Study on Defense Science and Technology

    Science.gov (United States)

    2002-05-01

    HIT” The threat of biological weapons arises in part from a decades-old megatrend in the life sciences. New advances in molecular biology, genetics...99 The Technology Landscape Today.................................... 101 Biological Warfare Defense...planning and programming, today’s environment comprises a broader, more diffuse set of concerns: terrorism, biological warfare, regional tensions

  7. Biological warfare agents

    Directory of Open Access Journals (Sweden)

    Duraipandian Thavaselvam

    2010-01-01

    Full Text Available The recent bioterrorist attacks using anthrax spores have emphasized the need to detect and decontaminate critical facilities in the shortest possible time. There has been a remarkable progress in the detection, protection and decontamination of biological warfare agents as many instrumentation platforms and detection methodologies are developed and commissioned. Even then the threat of biological warfare agents and their use in bioterrorist attacks still remain a leading cause of global concern. Furthermore in the past decade there have been threats due to the emerging new diseases and also the re-emergence of old diseases and development of antimicrobial resistance and spread to new geographical regions. The preparedness against these agents need complete knowledge about the disease, better research and training facilities, diagnostic facilities and improved public health system. This review on the biological warfare agents will provide information on the biological warfare agents, their mode of transmission and spread and also the detection systems available to detect them. In addition the current information on the availability of commercially available and developing technologies against biological warfare agents has also been discussed. The risk that arise due to the use of these agents in warfare or bioterrorism related scenario can be mitigated with the availability of improved detection technologies.

  8. Biological warfare agents

    Science.gov (United States)

    Thavaselvam, Duraipandian; Vijayaraghavan, Rajagopalan

    2010-01-01

    The recent bioterrorist attacks using anthrax spores have emphasized the need to detect and decontaminate critical facilities in the shortest possible time. There has been a remarkable progress in the detection, protection and decontamination of biological warfare agents as many instrumentation platforms and detection methodologies are developed and commissioned. Even then the threat of biological warfare agents and their use in bioterrorist attacks still remain a leading cause of global concern. Furthermore in the past decade there have been threats due to the emerging new diseases and also the re-emergence of old diseases and development of antimicrobial resistance and spread to new geographical regions. The preparedness against these agents need complete knowledge about the disease, better research and training facilities, diagnostic facilities and improved public health system. This review on the biological warfare agents will provide information on the biological warfare agents, their mode of transmission and spread and also the detection systems available to detect them. In addition the current information on the availability of commercially available and developing technologies against biological warfare agents has also been discussed. The risk that arise due to the use of these agents in warfare or bioterrorism related scenario can be mitigated with the availability of improved detection technologies. PMID:21829313

  9. Air Power in Irregular Warfare

    Science.gov (United States)

    2012-12-01

    that Americans will return and bring with them “radios, TV’s, trucks, boats, watches, iceboxes, medicine, Coca - Cola and many wonderful things.”292 Some...three American contractors were employees of the Northrop Grumman Corporation. During a reconnaissance mission looking for coca fields and drug

  10. Air Power and Maneuver Warfare

    Science.gov (United States)

    1994-07-01

    one of the IDF’s own units. For the rest of the campaign, these units draped themselves in conspicuous red cloth, proof enough that they feared their...and Force Structure." General Dynamics, February 1992. Published Sources Adan, Avraham. On the Banks of the Suez. London : Arms and Armour Press, 1980

  11. Cyber Warfare/Cyber Terrorism

    National Research Council Canada - National Science Library

    O'Hara, Timothy

    2004-01-01

    Section 1 of this paper provides an overview of cyber warfare as an element of information warfare, starting with the general background of the current strategic environment the United States is operating...

  12. Defending Our Satellites: The Need for Electronic Warfare Education and Training

    Science.gov (United States)

    2015-12-01

    intercept Allied bombers attacking at night.9 As a result of the electronic warfare advantage that systems like Window and Airborne Cigar be- stowed...74 | Air & Space Power Journal Defending Our Satellites The Need for Electronic Warfare Education and Training Lt Col E. Lincoln Bonner, USAF...expanding education and training in the use of electronic warfare to defend US satellites and improve their survivability. The following discussion

  13. Irregular Warfare Centric Foreign Internal Defense

    Science.gov (United States)

    2013-06-01

    ransacking homes, humiliating automobile occupants during searches and harassment of pedestrians on the streets.87 The Commission of Human Rights ruled...the surface often appears reactive and inconsistent, both Labour and Conservative governments have consistently adhered to a set of basic principles

  14. The Impacts of Modern Warfare on Freshwater Ecosystems

    Science.gov (United States)

    Francis, Robert A.

    2011-11-01

    There is increasing recognition and concern regarding the impacts of modern industrial warfare on the environment. Freshwater ecosystems are perhaps the most vulnerable to warfare-related impacts, which is of concern given that they provide so many essential environmental resources and services to society. Despite this, there has been little work to establish and quantify the types of impacts (both negative and positive) that warfare may have on such systems. This paper firstly highlights why rivers and lakes may be susceptible to warfare-related impacts, before synthesizing the available literature to explore the following main themes: intensification of wartime resource acquisition, use of water as an offensive or defensive weapon, direct and indirect effects of explosive ordnance, increased pollution, introduction of invasive alien species, and positive ecological impacts. This is then followed by a discussion of the implications of such impacts in relation to future warfare, including a consideration of the efficacy of existing legal instruments to protect the environment during conflict, and the trend for war to become more localized and `informal', and therefore less regulated. Finally, the paper identifies key research foci for understanding and mitigating the effects of warfare on freshwater ecosystems.

  15. The Necessity of Company-Grade Air Defense Artillery Officers in the Air Defense and Airspace Management Cells Within the Brigade Combat Team

    Science.gov (United States)

    2014-06-13

    verge of giving up or had received setbacks. She has done all of this even while maintaining the house, caring for the kids and pets , and balancing...artillery, multiple launch rocket systems, and mortars . With all of those assets traversing the airspace, the ADAM cell provided the greatest effect in...defense threat consists of rockets, mortars , and UAVs. The Army does not currently have assets capable of maneuvering with and defeating threats in

  16. Defense Base Realignment and Closure Budget Data for Naval Air Technical Training Center, Naval Air Station Pensacola, Florida

    National Research Council Canada - National Science Library

    Granetto, Paul

    1994-01-01

    .... This report provides the results of the audit of 19 projects, valued at $288.9 million, for the realignment of the Naval Air Technical Training Center from Naval Air Station Memphis, Tennessee, to Naval Air Station Pensacola, Florida...

  17. Prepublication Review of Government Employee Speech: A Case Study of the Department of Defense and United States Air Force Security/Policy Review Programs.

    Science.gov (United States)

    Warden, Michael L.

    Since 1957 the Department of Defense has subjected all forms of speech of U.S. military personnel meant for publication to prepublication review based on security and policy criteria. The historical development of the Defense Department's prepublication review program and its specific implementation by the U.S. Air Force lead to questions of First…

  18. Chemical warfare agents.

    Science.gov (United States)

    Kuca, Kamil; Pohanka, Miroslav

    2010-01-01

    Chemical warfare agents are compounds of different chemical structures. Simple molecules such as chlorine as well as complex structures such as ricin belong to this group. Nerve agents, vesicants, incapacitating agents, blood agents, lung-damaging agents, riot-control agents and several toxins are among chemical warfare agents. Although the use of these compounds is strictly prohibited, the possible misuse by terrorist groups is a reality nowadays. Owing to this fact, knowledge of the basic properties of these substances is of a high importance. This chapter briefly introduces the separate groups of chemical warfare agents together with their members and the potential therapy that should be applied in case someone is intoxicated by these agents.

  19. Chemical warfare agents

    Directory of Open Access Journals (Sweden)

    Vijayaraghavan R

    2010-01-01

    Full Text Available Among the Weapons of Mass Destruction, chemical warfare (CW is probably one of the most brutal created by mankind in comparison with biological and nuclear warfare. Chemical weapons are inexpensive and are relatively easy to produce, even by small terrorist groups, to create mass casualties with small quantities. The characteristics of various CW agents, general information relevant to current physical as well as medical protection methods, detection equipment available and decontamination techniques are discussed in this review article. A brief note on Chemical Weapons Convention is also provided.

  20. Chemical warfare agents

    Science.gov (United States)

    Ganesan, K.; Raza, S. K.; Vijayaraghavan, R.

    2010-01-01

    Among the Weapons of Mass Destruction, chemical warfare (CW) is probably one of the most brutal created by mankind in comparison with biological and nuclear warfare. Chemical weapons are inexpensive and are relatively easy to produce, even by small terrorist groups, to create mass casualties with small quantities. The characteristics of various CW agents, general information relevant to current physical as well as medical protection methods, detection equipment available and decontamination techniques are discussed in this review article. A brief note on Chemical Weapons Convention is also provided. PMID:21829312

  1. Axial Vircator for Electronic Warfare Applications

    Directory of Open Access Journals (Sweden)

    L. Drazan

    2009-12-01

    Full Text Available This paper deals with a high power microwave generator with virtual cathode – vircator in axial release for electronic warfare applications. The classification of directed energy weapons microwave (DEWM is introduced together with basic block diagrams of a particular class of DEWM. In the paper, methods for designing vircator pulsed power supply, axial vircator structure, measurement methods and experimental results are presented. The vircator in electromagnetic ammunition is powered by magneto-cumulative generator and in weapons for defense of objects (WDO, it is powered by Marx generator. The possible applications of a vircator in the DEWM area are discussed.

  2. Fires, A Joint Professional Bulletin for US Field & Air Defense Artillerymen. May-June 08

    Science.gov (United States)

    2008-06-01

    of a new commissary. The lifestyle center will incorporate retail areas with brand-name stores, casual dining and a six-screen cinema . There also...with their Republic of Korea counterparts. Yama Sakura. Yama Sakura is a bilateral US and Japanese Ground Self-Defense Force exercise focus- ing on... Japanese Ground Self-Defense Force readiness and interoperability. Key focus areas for fires elements in previous years have included joint targeting

  3. The Physics of Warfare

    Science.gov (United States)

    Giordano, Gerardo

    2015-01-01

    Recently, I was tasked with the creation and execution of a new themed general education physics class called The Physics of Warfare. In the past, I had used the theme of a class, such as the physics of sports medicine, as a way to create homework and in-class activities, generate discussions, and provide an application to demonstrate that physics…

  4. Nondestructive inspection of chemical warfare based on API-TOF

    International Nuclear Information System (INIS)

    Wang Xinhua; Zheng Pu; He Tie; An Li; Yang Jie; Fan Yu

    2013-01-01

    Background: Real-time, fast, accurate, nondestructive inspection (NDI) and quantitative analysis for chemical warfare are very imperative for chemical defense, anti-terror and nation security. Purpose: Associated Particles Technique (APT)/Neutron Time of Flight (TOF) has been developed for non-invasive inspection of sealed containers with chemical warfare agents. Methods: A prototype equipment for chemical warfare is consisted of an APT neutron generator with a 3×3 matrix of semiconductor detectors of associated alpha-particles, the shielding protection of neutron and gamma-ray, arrayed NaI(Tl)-based detectors of gamma-rays, fully-digital data acquisition electronics, data analysis, decision-making software, support platform and remote control system. Inelastic scattering gamma-ray pulse height spectra of sarin, VX, mustard gas and adamsite induced by 14-MeV neutron are measured. The energies of these gamma rays are used to identify the inelastic scattering elements, and the intensities of the peaks at these energies are used to reveal their concentrations. Results: The characteristic peaks of inelastic scattering gamma-ray pulse height spectra show that the prototype equipment can fast and accurately inspect chemical warfare. Conclusion: The equipment can be used to detect not only chemical warfare agents but also other hazardous materials, such as chemical/toxic/drug materials, if their chemical composition is in any way different from that of the surrounding materials. (authors)

  5. Barrier Patrol and Air Defense System: Developing and Integrating Flight Profiles

    National Research Council Canada - National Science Library

    Bianchi, Luiz

    2002-01-01

    ...) This aircraft and the types of missions it can support are innovative in the Brazilian Air Force, The R-99 will be used for patrolling the Brazilian borders and interception control of illicit air...

  6. DEFENSE INVENTORY: Improved Management Framework Needed to Guide Air Force Best Practice Initiatives

    National Research Council Canada - National Science Library

    1999-01-01

    In this report, we discuss our evaluation of the Air Force's best practices implementation schedule for the acquisition and distribution of secondary inventory items, which the Secretary of the Air...

  7. Defensive repertoire of Drosophila larvae in response to toxic fungi

    NARCIS (Netherlands)

    Trienens, Monika; Kraaijeveld, Ken; Wertheim, Bregje

    2017-01-01

    Chemical warfare including insecticidal secondary metabolites is a well-known strategy for environmental microbes to monopolize a food source. Insects in turn have evolved behavioural and physiological defences to eradicate or neutralize the harmful microorganisms. We studied the defensive

  8. Defense Transformation: Background and Oversight Issues for Congress

    National Research Council Canada - National Science Library

    O'Rourke, Ronald

    2004-01-01

    .... The Administration's vision for defense transformation calls for shifting the U.S. military toward a greater reliance on joint operations, network-centric warfare, effects-based operations, speed and agility, and precision application of firepower...

  9. Information Warfare and International Law

    National Research Council Canada - National Science Library

    Greenberg, Lawrence T; Goodman, Seymour E; Soo Hoo, Kevin J

    1998-01-01

    .... Some legal constraints will certainly apply to information warfare, either because the constraints explicitly regulate particular actions, or because more general principles of international law...

  10. Electronic Warfare Signature Measurement Facility

    Data.gov (United States)

    Federal Laboratory Consortium — The Electronic Warfare Signature Measurement Facility contains specialized mobile spectral, radiometric, and imaging measurement systems to characterize ultraviolet,...

  11. Implications of Network Centric Warfare

    National Research Council Canada - National Science Library

    Bailey, Alvin

    2004-01-01

    .... These areas of dependence also provide numerous vulnerabilities. This paper will focus specifically on Network Centric Warfare's vulnerabilities in terms of sensors cyberterrorism/ Electro-Magnetic Pulse (EMP...

  12. A Game Theoretic Model for the Optimal Disposition of Integrated Air Defense System Assets

    Science.gov (United States)

    2015-03-26

    fellows of Miami Valley Philosophical and Lifting Society v Acknowledgements I want to thank LTC Brian J. Lunday and Lt Col Matthew J. Robbins for...on the defender’s valuation of tar- gets. However, if we assume that Hamas, the attacker, knows the layout of Israel’s defense, they may attack

  13. Antifragile Electronic Warfare

    OpenAIRE

    Lichtman, Marc

    2014-01-01

    This letter introduces the concept of antifragile electronic warfare (EW), which we define as the ability to allow a communications link to improve performance due to the presence of a jammer. This concept should not be confused with jamming countermeasures (a.k.a. anti-jamming or electronic protection). Rather, antifragile EW can be thought of as the next step beyond simply avoiding or mitigating jamming. After introducing the concept we narrow down the subset of jammers this concept can be ...

  14. Tracheobronchial air-liquid interface cell culture: a model for innate mucosal defense of the upper airways?

    Science.gov (United States)

    Kesimer, Mehmet; Kirkham, Sara; Pickles, Raymond J.; Henderson, Ashley G.; Alexis, Neil E.; DeMaria, Genevieve; Knight, David; Thornton, David J.; Sheehan, John K.

    2009-01-01

    Human tracheobronchial epithelial cells grown in air-liquid interface culture have emerged as a powerful tool for the study of airway biology. In this study, we have investigated whether this culture system produces “mucus” with a protein composition similar to that of in vivo, induced airway secretions. Previous compositional studies of mucous secretions have greatly underrepresented the contribution of mucins, which are major structural components of normal mucus. To overcome this limitation, we have used a mass spectrometry-based approach centered on prior separation of the mucins from the majority of the other proteins. Using this approach, we have compared the protein composition of apical secretions (AS) from well-differentiated primary human tracheobronchial cells grown at air-liquid interface and human tracheobronchial normal induced sputum (IS). A total of 186 proteins were identified, 134 from AS and 136 from IS; 84 proteins were common to both secretions, with host defense proteins being predominant. The epithelial mucins MUC1, MUC4, and MUC16 and the gel-forming mucins MUC5B and MUC5AC were identified in both secretions. Refractometry showed that the gel-forming mucins were the major contributors by mass to both secretions. When the composition of the IS was corrected for proteins that were most likely derived from saliva, serum, and migratory cells, there was considerable similarity between the two secretions, in particular, in the category of host defense proteins, which includes the mucins. This shows that the primary cell culture system is an important model for study of aspects of innate defense of the upper airways related specifically to mucus consisting solely of airway cell products. PMID:18931053

  15. Defense Infrastructure: Realignment of Air Force Special Operations Command Units to Cannon Air Force Base, New Mexico

    National Research Council Canada - National Science Library

    Lepore, Brian J

    2008-01-01

    .... As a result, Cannon Air Force Base will remain open. While DOD has satisfied the intent of the recommendation by finding a new mission for the base, this BRAC recommendation was unusual because it contained a contingency clause...

  16. Numerical simulation of RCS for carrier electronic warfare airplanes

    Directory of Open Access Journals (Sweden)

    Yue Kuizhi

    2015-04-01

    Full Text Available This paper studies the radar cross section (RCS of carrier electronic warfare airplanes. Under the typical naval operations section, the mathematical model of the radar wave’s pitch angle incidence range analysis is established. Based on the CATIA software, considering dynamic deflections of duck wing leading edge flaps, flaperons, horizontal tail, and rudder, as well as aircraft with air-to-air missile, anti-radiation missile, electronic jamming pod, and other weapons, the 3D models of carrier electronic warfare airplanes Model A and Model B with weapons were established. Based on the physical optics method and the equivalent electromagnetic flow method, by the use of the RCSAnsys software, the characteristics of carrier electronic warfare airplanes’ RCS under steady and dynamic flights were simulated under the UHF, X, and S radar bands. This paper researches the detection probability of aircraft by radars under the condition of electronic warfare, and completes the mathematical statistical analysis of the simulation results. The results show that: The Model A of carrier electronic warfare airplane is better than Model B on stealth performance and on discover probability by radar detection effectively.

  17. Navy Shipboard Lasers for Surface, Air, and Missile Defense: Background and Issues for Congress

    Science.gov (United States)

    2013-06-27

    fiber SSL effort is called the Tactical Laser System ( TLS ). Among DOD’s multiple efforts to develop slab SSLs for military use was the Maritime Laser...Missile Defense Congressional Research Service 11 Tactical Laser System Another Navy fiber SSL effort is the Tactical Laser System ( TLS )—a laser...and DOD have conducted development work on three principal types of lasers for potential use on Navy surface ships—fiber solid state lasers ( SSLs

  18. Fires Bulletin: A Joinit Professional Bulletin for US Field & Air Defense Artillerymen, January-February 2008

    Science.gov (United States)

    2008-02-01

    lessons in the formulation of appropriate operational concepts. My hope is that this monograph will give the reader an insight into the im- mense ...established with Special Forces and civilian irregular defense group units to ensure timely clearance of fire requests. 33 sill-www.army.mil...radar could acquire and track pilotless aircraft much better and in any weather, day or night. The searchlights were there to mark the irregular

  19. Recent Advances in Decontamination of Chemical Warfare Agents

    OpenAIRE

    Abdul Wadood Khan; Sabna Kotta; Shahid Husain Ansari; Javed Ali; Rakesh Kumar Sharma

    2013-01-01

    The recent turmoil and volatile situation in many countries and the increased risk of terrorist activities have raised alarm bells for the field of defense against toxic chemical/materials. These situations poses threats to society as terrorists can take advantage of such situations to strike and cause public mayhem. A number of chemicals have the potential of being used as chemical warfare (CW) agents. CW agents could immediately kill or incapacitate the affected individuals even when they a...

  20. Littoral Combat Ship Open Ocean Anti-Submarine Warfare

    Science.gov (United States)

    2014-06-01

    maintain stealth and its defense in order to properly conduct an attack on a surface vessel (Sternhell and Thorndike 2014, 102). This statement...its target, the surface combatants can counter by increasing their speed (Sternhell and Thorndike 2014). While the maximum speed of the current...120316_PS.pdf Sternhell, Charles M, and Alan M Thorndike . 2014. “Antisubmarine Warfare in World War II.” CNA Analysis & Solutions. Accessed April 14, 2014

  1. Drone Warfare: Is the United States Violating the Law of Armed Conflict

    Science.gov (United States)

    2011-02-16

    NOTE AIR WAR COLLEGE AIR UNIVERSITY DRONE WARFARE: IS THE UNITED STATES VIOLATING THE LAW OF ARMED CONFLICT? by Barbara E. Shestko, Col...Base, Alabama. 1 Introduction The United States has become increasingly dependent upon the use of unmanned aircraft systems (UASs) or “ drones ” to...kill targeted members of al-Qaeda and the Taliban.1 Due to the success of drone warfare, we can expect the United States to continue its current

  2. Psychological effects of nuclear warfare

    International Nuclear Information System (INIS)

    Mickley, G.A.

    1987-01-01

    This report is divided into five parts. (1) Discussion of the psychological milieu before a nuclear confrontation. (2) Acute psychological reactions to nuclear warfare (some of which may reflect, in part, direct radiogenic alteration of nervous system functions). (3) Chronic psychological effects of a nuclear confrontation. (4) Issues concerning treatment of these psychological changes. (5) Prevention of adverse psychological reactions to nuclear warfare

  3. Active Computer Network Defense: An Assessment

    Science.gov (United States)

    2001-04-01

    sufficient base of knowledge in information technology can be assumed to be working on some form of computer network warfare, even if only defensive in...the Defense Information Infrastructure (DII) to attack. Transmission Control Protocol/ Internet Protocol (TCP/IP) networks are inherently resistant to...aims to create this part of information superiority, and computer network defense is one of its fundamental components. Most of these efforts center

  4. The Royal Saudi Air Force and Long-Term Saudi National Defense: A Strategic Vision

    National Research Council Canada - National Science Library

    Al

    2002-01-01

    Technological advances employed in strategic offensive air operations during the Gulf War revolutionized war fighting in a desert environment and provides a basis for developing a new Saudi strategic...

  5. Foreign Internal Defense. Does Air Force Special Operations Have What it Takes?,

    Science.gov (United States)

    1993-12-01

    anything in the air or on the ground. However, while the desert conditions in areas of Peru and Chile are similarly without rain, their surrounding...example, during CABANAS 89, a joint/combined exercise, Honduran officials did not allow the use of CASA -212 aircraft in the. exercise because of...correctly understood while flying en route to Desert One on the Iranian hostage rescue mission. The experience is described by Col James H. Kyle, US Air Force

  6. Cyber warfare and electronic warfare integration in the operational environment of the future: cyber electronic warfare

    Science.gov (United States)

    Askin, Osman; Irmak, Riza; Avsever, Mustafa

    2015-05-01

    For the states with advanced technology, effective use of electronic warfare and cyber warfare will be the main determining factor of winning a war in the future's operational environment. The developed states will be able to finalize the struggles they have entered with a minimum of human casualties and minimum cost thanks to high-tech. Considering the increasing number of world economic problems, the development of human rights and humanitarian law it is easy to understand the importance of minimum cost and minimum loss of human. In this paper, cyber warfare and electronic warfare concepts are examined in conjunction with the historical development and the relationship between them is explained. Finally, assessments were carried out about the use of cyber electronic warfare in the coming years.

  7. Hybrid Maritime Warfare

    DEFF Research Database (Denmark)

    Schaub Jr, Gary John; Murphy, Martin; Hoffman, Frank

    2017-01-01

    Russia’s use of hybrid warfare techniques has raised concerns about the security of the Baltic States. Gary Schaub, Jr, Martin Murphy and Frank G Hoffman recommend a series of measures to augment NATO’s Readiness Action Plan in the Baltic region, including increasing the breadth and depth of naval...... exercises, and improving maritime domain awareness through cooperative programmes. They also suggest unilateral and cooperative measures to develop a sound strategic communications strategy to counter Moscow’s information operations, reduce dependence on Russian energy supplies and build the resilience...

  8. Tissue-based standoff biosensors for detecting chemical warfare agents

    Science.gov (United States)

    Greenbaum, Elias; Sanders, Charlene A.

    2003-11-18

    A tissue-based, deployable, standoff air quality sensor for detecting the presence of at least one chemical or biological warfare agent, includes: a cell containing entrapped photosynthetic tissue, the cell adapted for analyzing photosynthetic activity of the entrapped photosynthetic tissue; means for introducing an air sample into the cell and contacting the air sample with the entrapped photosynthetic tissue; a fluorometer in operable relationship with the cell for measuring photosynthetic activity of the entrapped photosynthetic tissue; and transmitting means for transmitting analytical data generated by the fluorometer relating to the presence of at least one chemical or biological warfare agent in the air sample, the sensor adapted for deployment into a selected area.

  9. Reflections of a Technocrat: Managing Defense, Air, and Space Programs during the Cold War

    Science.gov (United States)

    2006-08-01

    American-Rockwell OV-10 Bronco , which made its maiden flight in 1965. Deployed to Vietnam three years later, the Bronco was adopted by the Air Force as a...to its em- barrassment, the Air Force had to adapt the Navy’s A-1 Skyraider, A-7 Corsair II, F-4 Phantom II, and the Marines’ OV-10 Bronco for...Station in El Segundo, California, the SecAF’s Office of Special Projects (aka NRO Pro- gram A) performed a variety of support functions as well as

  10. Establishing Cyber Warfare Doctrine

    Directory of Open Access Journals (Sweden)

    Andrew M. Colarik

    2012-01-01

    Full Text Available Over the past several decades, advances in technology have transformed communications and the ability to acquire, disseminate, and utilize information in a range of environments. Modern societies and their respective militaries have taken advantage of a robust information space through network-centric systems. Because military and commercial operations have increasingly converged, communication and information infrastructures are now high-priority military objectives in times of war. This article examines the theoretical underpinning of current cyber warfare research, what we have learned so far about its application, and some of the emerging themes to be considered; it also postulates the development of a (national cyber warfare doctrine (CWD. An endeavor of this scale requires lots of considerations and preparation for its development if it is to be cooperatively embraced. This article considers why information technology systems and their supporting infrastructures should be considered legitimate military targets in conflicts, and offers several events that support this supposition. In addition, it identifies the various forms of doctrine that will become the basis for developing a CWD, discusses a CWD's possible components, and proposes a national collaborative and discussion framework for obtaining a nation's stakeholder buy-in for such an endeavor.

  11. Numerical simulation of RCS for carrier electronic warfare airplanes

    OpenAIRE

    Yue Kuizhi; Liu Wenlin; Li Guanxiong; Ji Jinzu; Yu Dazhao

    2015-01-01

    This paper studies the radar cross section (RCS) of carrier electronic warfare airplanes. Under the typical naval operations section, the mathematical model of the radar wave’s pitch angle incidence range analysis is established. Based on the CATIA software, considering dynamic deflections of duck wing leading edge flaps, flaperons, horizontal tail, and rudder, as well as aircraft with air-to-air missile, anti-radiation missile, electronic jamming pod, and other weapons, the 3D models of carr...

  12. Fires, A Joint Professional Bulletin for US Field & Air Defense Artillerymen. March-April 2008

    Science.gov (United States)

    2008-04-01

    actions. However, if the effects synchronization division were not added to the lineup , just the teaming of joint fires division and IO division still...ADAFCO would be the liaison between the two Services who coordinates fires and facilitates track identification thus preventing fratricide. Joint...decisions to be made based on current air users versus planned control measures. Interoperability. Identification is a key feature that enables AC2 nodes

  13. The Role of the Brazilian Air Force in the Defense of the South Atlantic

    Science.gov (United States)

    1989-05-01

    the ocean as a means of maritime and air communica’tions and tride; 4. Participation .in the Exploration of the Antartic continent. From my point of...Good Hope - Magellan - Cape of Good Hope - Antartic roLItesII The following routes are those that especially demand our I attention: - Coastal...keeping it out of the East-West struggle); Internation.1 cooperation to develop the rugi.on’s countrie_ -- Exploration of the Antartic . In line with

  14. Attrition in Network Centric Warfare

    National Research Council Canada - National Science Library

    Erbetta, John

    2003-01-01

    .... Information warfare means that positive attacks on systems themselves compound the problem. Emerging technologies applicable to NCW as a force multiplier need to be recognized as counter to the impediments to progress...

  15. The ethics of information warfare

    CERN Document Server

    Floridi, Luciano

    2014-01-01

    This book offers an overview of the ethical problems posed by Information Warfare, and of the different approaches and methods used to solve them, in order to provide the reader with a better grasp of the ethical conundrums posed by this new form of warfare.The volume is divided into three parts, each comprising four chapters. The first part focuses on issues pertaining to the concept of Information Warfare and the clarifications that need to be made in order to address its ethical implications. The second part collects contributions focusing on Just War Theory and its application to the case of Information Warfare. The third part adopts alternative approaches to Just War Theory for analysing the ethical implications of this phenomenon. Finally, an afterword by Neelie Kroes - Vice President of the European Commission and European Digital Agenda Commissioner - concludes the volume. Her contribution describes the interests and commitments of the European Digital Agenda with respect to research for the developme...

  16. Nuclear radiation in warfare

    International Nuclear Information System (INIS)

    Rotblat, J.

    1986-01-01

    The subject is covered in chapters, entitled: introduction; digest of nuclear weaponry (characteristics of nuclear weapons; effects of nuclear weapons other than ionizing radiation (fire-ball, fall-out, thermal radiation, blast wave, electromagnetic pulse); the nuclear arms race; war scenarios; biological effects of radiations on man (radiation doses; natural sources of radiation; acute effects of radiation; long-term somatic effects; genetic effects; factors affecting the biological response to radiation; internal exposure; synergistic effects; protection against radiation effects); radiations from nuclear explosions (initial radiation; fall-out; effects of fall-out on animal and plant life; contamination of water and food supplies by fall-out); radiation casualties in a nuclear war; effectiveness of civil defence; other warlike uses of radiation (attacks on civilian nuclear power installations; radiological warfare; terrorist activities); conclusion. (orig./HP) [de

  17. Nuclear radiation in warfare

    International Nuclear Information System (INIS)

    Rotblat, J.

    1981-01-01

    The subject is covered in chapters, entitled: introduction; digest of nuclear weaponry (characteristics of nuclear weapons; effects of nuclear weapons other than ionizing radiation (fire-ball, fall-out, thermal radiation, blast wave, electromagnetic pulse); the nuclear arms race; war scenarios); biological effects of radiations on man (radiation doses; natural sources of radiation; acute effects of radiation; long-term somatic effects; genetic effects; factors affecting the biological response to radiation; internal exposure; synergistic effects; protection against radiation effects); radiations from nuclear explosions (initial radiation; fall-out; effects of fall-out on animal and plant life; contamination of water and food supplies by fall-out); radiation casualties in a nuclear war; effectiveness of civil defence; other warlike uses of radiation (attacks on civilian nuclear power installations; radiological warfare; terrorist activities); conclusion. (U.K.)

  18. Reflections on nuclear warfare

    International Nuclear Information System (INIS)

    Evans, J.P.

    1983-01-01

    The author looks back on his more than 70 years of familiarity with Americans involved in warfare, noting their loyal support for our country's objectives. Drawing on the Einstein equation, his own visits to Hiroshima and Nagasaki, and current literature, he, as a physician, belatedly concurs with those who look on the use of nuclear weapons as irrational and untenable. Their employment under present circumstances would create a ''final epidemic'' to be avoided only by prevention. He suggests that medical perceptions must be considered by our national leaders in assessing the many factors that he hopes will lead to rational answers to this urgent, highly complex, and vital enigma. He cites physicians' efforts to help in finding answers and asks that his colleagues consider the issues with attention to the gravity of the situation and act according to their best judgment

  19. Defense Base Realignment and Closure Budget Data for Realignment of Construction Battalion Unit 416 from Naval Air Station Alameda, California, to Naval Air Station Fallon, Nevada

    National Research Council Canada - National Science Library

    1995-01-01

    ... requested for each military construction project associated with Defense base realignment and closure does not exceed the original estimated cost provided to the Commission on Defense Base Closure and Realignment (the Commission...

  20. Air-breathing behavior, oxygen concentrations, and ROS defense in the swimbladders of two erythrinid fish, the facultative air-breathing jeju, and the non-air-breathing traira during normoxia, hypoxia and hyperoxia.

    Science.gov (United States)

    Pelster, Bernd; Wood, Chris M; Jung, Ellen; Val, Adalberto L

    2018-05-01

    The jeju Hoplerythrinus unitaeniatus and the traira Hoplias malabaricus are two neighboring genera from the family of erythrinid fish, both possessing a two-chambered physostomous swimbladder. In the jeju the anterior section of the posterior bladder is highly vascularized, and the swimbladder is used for aerial respiration; the traira, in turn, is a water-breather that uses the swimbladder as a buoyancy organ and not for aerial oxygen uptake. Measurement of swimbladder oxygen partial pressure (PO 2 ) of fish kept at 26 °C in normoxic, hyperoxic (28-32 mg O 2 L - 1 ) or hypoxic (1-1.5 mg O 2 L - 1 ) water revealed constant values in traira swimbladder. Under normoxic conditions in the jeju swimbladder PO 2 was higher than in traira, and the PO 2 significantly increased under hyperoxic conditions, even in the absence of air breathing. In jeju, air-breathing activity increased significantly under hypoxic conditions. Hypoxic air-breathing activity was negatively correlated to swimbladder PO 2 , indicating that the swimbladder was intensely used for gas exchange under these conditions. In traira, the capacity of the ROS defense system, as assessed by measurement of activities of enzymes involved in ROS degradation and total glutathione (GSH + GSSG) concentration, was elevated after 4 h of hyperoxic and/or hypoxic exposure, although swimbladder PO 2 was not affected. In jeju, experiencing a higher variability in swimbladder PO 2 due to the air-breathing activity, only a reduced responsiveness of the ROS defense system to changing environmental PO 2 was detected.

  1. Dehumanization and Irregular Warfare

    Science.gov (United States)

    2013-06-01

    author and do not reflect the official policy or position of the Department of Defense or the U.S. Government. IRB Protocol number ____N/A____...films.122 This reframing of cultural training as a discussion of proper etiquette , rather 120

  2. Chemical warfare in termites

    Czech Academy of Sciences Publication Activity Database

    Šobotník, Jan; Jirošová, Anna; Hanus, Robert

    2010-01-01

    Roč. 56, č. 9 (2010), s. 1012-1021 ISSN 0022-1910 R&D Projects: GA AV ČR IAA600550614 Institutional research plan: CEZ:AV0Z40550506 Keywords : Isoptera * chemical defense * exocrine gland * frontal gland Subject RIV: CC - Organic Chemistry Impact factor: 2.310, year: 2010

  3. Inside the Wire: American Security and Cyber Warfare

    Science.gov (United States)

    2017-03-01

    Roberts, Kerry V. " SUN TZU and The Art of Cyber Warfare." Journal of Counterterrorism & Homeland Security International 19, no. 1(Spring 2013): 12-4...12. REPORT TYPE 3. DATES COVERED (From - To) 01-03-2017 Bibliography 4. TITLE AND SUBTITLE Sa. CONTRACT NUMBER Inside the Wire: American Security...MCDERMOTT LIBRARY U.S. AIR FORCE ACADEMY 11. SPONSOR/MONITOR’S REPORT USAF ACADEMY CO 80840-6214 NUMBER(S) Special Bibliography Series # 119 12

  4. The ethics of drone warfare

    Directory of Open Access Journals (Sweden)

    Fatić Aleksandar

    2017-01-01

    Full Text Available The paper investigates the compatibility of the modern technologies of warfare, specifically the use of offensive drones, with traditional military ethics and suggests that the new technologies radically change the value system of the military in ways which make large parts of the traditional military ethics inapplicable. The author suggests that Agamben’s concept of ‘effectivity’ through ‘special actions’ which mark one’s belonging to a particular community or profession is a useful conceptual strategy to explore the compatibility of drone warfare with traditional military ethics; this strategy shows mixed results at best.

  5. The doctor and nuclear warfare

    International Nuclear Information System (INIS)

    Anon.

    1982-01-01

    At the 34th World Medical Assembly in Lisbon in 1981 the World Medical Association adopted a motion proposed by the American Medical Association that national medical associations should develop programs to educate the civilian population on the medical consequences of nuclear war. This article discusses the attitude the medical professions should have, should nuclear warfare in some form confront them in the future. The conclusion is drawn that defence against nuclear warfare is only a part of civil defence against any disaster, including the natural disasters such as flood and fire and the man-made disasters of transport accidents, even of problems at nuclear plants designed to supply energy

  6. COP21: defense stakes

    International Nuclear Information System (INIS)

    Coldefy, Alain; Hulot, Nicolas; Aichi, Leila; Tertrais, Bruno; Paillard, Christophe-Alexandre; Piodi, Jerome; Regnier, Serge; Volpi, Jean-Luc; Descleves, Emmanuel; Garcin, Thierry; Granholm, Niklas; Wedin, Lars; Pouvreau, Ana; Henninger, Laurent

    2015-01-01

    The 21. Conference of the Parties (COP21) from the UN Framework Convention took place in Paris between November 30 and December 11, 2015. The challenge is to reach a universal agreement of fight against global warming and to control the carbon footprint of human activities. This topic is in the core of the Defense Ministry preoccupations. This special dossier takes stock of the question of defense issues linked with global warming. The dossier comprises 13 papers dealing with: 1 - COP21: defense stakes (Coldefy, A.); 2 - Warfare climate, a chance for peace (Hulot, N.); 3 - COP21 and defense (Aichi, L.); 4 - A war climate? (Tertrais, B.); 5 - Challenges the World has to face in the 21. century (Paillard, C.A.); 6 - Desertification: a time bomb in the heart of Sahel (Piodi, J.); 7 - The infrastructure department of defense in the fight against climate disturbance (Regnier, S.); 8 - Fight against global warming, a chance for the forces? (Volpi, J.L.); 9 - Sea and sustainable development (Descleves, E.); 10 - Rationales of Arctic's surrounding powers (Garcin, T.); 11 - Arctic: strategic stake (Granholm, N.; Wedin, L.); 12 - Strategic impact of Turkey's new energy choices (Pouvreau, A.); 13 - Climate and war: a brief historical outlook (Henninger, L.)

  7. Defense Base Realignment and Closure Budget Data for the Realignment of Navy and Air Force Food Services Training at Lackland Air Force Base, Texas

    National Research Council Canada - National Science Library

    Granetto, Paul

    1996-01-01

    ... of the FY 1997 audit coverage. Public Law 102-190, "National Defense Authorization Act for Fiscal Years 1992 and 1993," December 5, 1991, directs the Secretary of Defense to ensure that the amount of the authorization that DoD...

  8. Biological warfare, bioterrorism, and biocrime

    NARCIS (Netherlands)

    Jansen, H. J.; Breeveld, F. J.; Stijnis, C.; Grobusch, M. P.

    2014-01-01

    Biological weapons achieve their intended target effects through the infectivity of disease-causing infectious agents. The ability to use biological agents in warfare is prohibited by the Biological and Toxin Weapon Convention. Bioterrorism is defined as the deliberate release of viruses, bacteria

  9. European Curricula, Xenophobia and Warfare.

    Science.gov (United States)

    Coulby, David

    1997-01-01

    Examines school and university curricula in Europe and the extent of their influence on xenophobia. Considers the pluralistic nature of the European population. Discusses the role of curriculum selection and language policy in state efforts to promote nationalism. Assesses the role of curricular systems in the actual encouragement of warfare,…

  10. The Anatomy of Counterinsurgency Warfare

    DEFF Research Database (Denmark)

    Mouritsen, Lars; Pedersen, Kenneth; Thruelsen, Peter Dahl

    Since the beginning of the new millennium, the West has been increasingly involved in a tiresome and rather particular type of conflict: insurgency warfare. The bloody and shocking terrorist attacks on New York and Washington in September 2001 marked the beginning of a new era, and the introducti...

  11. Strategic Analysis of Irregular Warfare

    Science.gov (United States)

    2010-03-01

    the same mathematical equations used by Lanchester .10 Irregular Warfare Theory and Doctrine It is time to develop new analytical methods and models...basis on which to build, similar to what Lanchester provided almost 100 years ago. Figure 9 portrays both Lanchester’s approach and an irregular 17

  12. Roots of Russian Irregular Warfare

    Science.gov (United States)

    2016-12-01

    PAGE INTENTIONALLY LEFT BLANK xiii ACKNOWLEDGMENTS Crissy, your encouragement throughout my career and especially during this project has been...all of the Russian disinformation techniques in Ukraine came directly “from Soviet toolkits .” Maria Snegovaya, “Putin’s Information Warfare In

  13. Technology Transition for Hybrid Warfare

    Science.gov (United States)

    2010-02-16

    and Iraq. At the same time, the science and technology base must provide the disruptive technologies to defeat future conventional enemies. This... disruptive technologies will be needed to retain long-term technological superiority in conventional warfare. Incremental improvement is the most...technology to be missed. Disruptive technologies are the second type of technological change and involve revolutionary concepts involving large technological

  14. The United States and biological warfare: secrets from the early cold war and Korea.

    Science.gov (United States)

    Bruwer, A

    2001-01-01

    The United States and Biological Warfare is about accusations that the United States resorted to bacteriological warfare at a time of great military stress during the Korean War. In December 1951, the then US Secretary of Defense ordered early readiness for offensive use of biological weapons. Soon afterwards, the North Korean and Chinese armies accused the United States of starting a large-scale biological warfare experiment in Korea. The US State Department denied the accusation. Both parties to the dispute maintain their positions today. The authors spent 20 years researching the accusations in North America, Europe and Japan. They were the first foreigners to be given access to Chinese classified documents. The reader is also introduced to the concept of 'plausible denial', an official US policy which allowed responsible governmental representatives to deny knowledge of certain events. The authors hope that their work will contribute to the understanding of a time when modern war expanded into a new type of violence.

  15. SiGe-based re-engineering of electronic warfare subsystems

    CERN Document Server

    Lambrechts, Wynand

    2017-01-01

    This book equips readers with a thorough understanding of the applicability of new-generation silicon-germanium (SiGe) electronic subsystems for the military purposes of electronic warfare and defensive countermeasures. The theoretical and technical background is extensively explained and all aspects of the integration of SiGe as an enabling technology for maritime, land, and airborne (including space) electronic warfare are addressed, including research, design, development, and implementation. The coverage is supported by mathematical derivations, informative illustrations, practical examples, and case studies. While SiGe technology provides speed, performance, and price advantages in many markets, sharing of information on its use in electronic warfare systems has to date been limited, especially in developing nations. This book will therefore be warmly welcomed as an engineering guideline that focuses especially on the speed and reliability of current-generation SiGe circuits and highlights emerging innov...

  16. Defense program pushes microchip frontiers

    Science.gov (United States)

    Julian, K.

    1985-05-01

    The very-high-speed integrated circuit (VHSIC) program of the Department of Defense will have a significant effect on the expansion of integrated circuit technology. This program, which is to cost several hundred million dollars, is accelerating the trend toward higher-speed, denser circuitry for microchips through innovative design and fabrication techniques. Teams in six different American companies are to design and fabricate a military useful 'brassboard' system which would employ chips developed in the first phase of the VHSIC program. Military objectives envisaged include automatic monitoring of displays in tactical aircraft by means of an artificial intelligence system, a brassboard used in airborne electronic warfare system, and antisubmarine warfare applications. After a fivefold improvement in performance achieved in the first phase, the second phase is concerned with a further 20-fold increase. The entire VHSIC program is, therefore, to produce a 100-fold gain over the state of the art found when the program started.

  17. Unconventional Cyber Warfare: Cyber Opportunities in Unconventional Warfare

    Science.gov (United States)

    2014-06-01

    Internet service provider IW irregular warfare MCO major combat operations MySQL open-source relational database management system NATO North...today, often with no regard for legal or ethical constraints. A better course of action would be to conduct operations in cyberspace within the precepts...built in feature of MySQL that 97 John Markoff, “Before the Gunfire, Cyberattacks,” York Times, August 13, 2008, sec. Technology, 1, http

  18. Hybrid Warfare: the 21st Century Russian Way of Warfare

    Science.gov (United States)

    2017-05-25

    to wage information operations— from television, to the Internet, to unconventional forces on the ground spreading the message word -of- mouth ...adversarial vulnerabilities. Many of the peculiarities of hybrid warfare described herein are inextricably linked to Russia’s social , political, and...the US election. Then they utilized various means of media to distribute that information with the goal to discredit the US political process and

  19. 2008 13th Expeditionary Warfare Conference

    Science.gov (United States)

    2008-10-23

    platforms – Emphasize a mixed fleet approach that spans the “iron triangle” – Integrate MRAP into the fleet mix – Transition to a fleet of tactical...Urban Warfare Mountain Warfare Desert Warfare Jungle Riverine Special Skills Recon LOG CSS ENG MT HS Ord Maint EOD Pers Retrival ...Detection (Specialized Platform FLGPR)Stand-off (60M) Scaleable Neutralization (Area coverage) ABV Delivery Ground Cueing Stand-off (800M) Scaleable

  20. Cyber warfare: critical perspectives

    NARCIS (Netherlands)

    Ducheine, P.; Osinga, F.; Soeters, J.

    2012-01-01

    Next to sea, land, air and space, ‘cyber space’ appears to be the fifth operational domain for the military. This manmade and virtual sphere brings along opportunities and threats. In this book, academics of the Netherlands Defence Academy as well as specialists and military professionals from other

  1. Information Warfare in the Cyber Domain

    National Research Council Canada - National Science Library

    Takemoto, Glenn

    2001-01-01

    ...). This paper lays a foundation by defining the terminology associated with Information Warfare in the Cyber Domain, reviews the threat and illustrates the vulnerabilities of our information systems...

  2. MEANS AND METHODS OF CYBER WARFARE

    Directory of Open Access Journals (Sweden)

    Dan-Iulian VOITAȘEC

    2016-06-01

    Full Text Available According to the Declaration of Saint Petersburg of 1868 “the only legitimate object which States should endeavor to accomplish during war is to weaken the military forces of the enemy”. Thus, International Humanitarian Law prohibits or limits the use of certain means and methods of warfare. The rapid development of technology has led to the emergence of a new dimension of warfare. The cyber aspect of armed conflict has led to the development of new means and methods of warfare. The purpose of this paper is to study how the norms of international humanitarian law apply to the means and methods of cyber warfare.

  3. Shadow Wars: An Analysis of Counterinsurgency Warfare

    National Research Council Canada - National Science Library

    Dogan, Osman

    2005-01-01

    ... of the current strategic approaches to counterinsurgency warfare. Toward this end, a systems model approach, which views insurgent organizations as open systems, is adapted to the insurgent environment...

  4. The ethics of drone warfare

    OpenAIRE

    Fatić Aleksandar

    2017-01-01

    The paper investigates the compatibility of the modern technologies of warfare, specifically the use of offensive drones, with traditional military ethics and suggests that the new technologies radically change the value system of the military in ways which make large parts of the traditional military ethics inapplicable. The author suggests that Agamben’s concept of ‘effectivity’ through ‘special actions’ which mark one’s belonging to a particular communit...

  5. Radioecological aspects of nuclear warfare

    International Nuclear Information System (INIS)

    Edvardson, Kay

    1977-01-01

    Radioactive fallout, one of the major effects of nuclear warfare, will cause acute radiation sickness within the close-in or intermediate areas downwind from surface bursts. Global fallout from high yield explosions will be fairly evenly distributed in the hemisphere where the explosions occur, and will cause irradiation from ground deposit, inhaled material and contaminated food. Estimates of collective doses and the approximate number of late casualties from the global contamination are presented for a given total explosion yield. (author)

  6. Defense Base Realignment and Closure Budget Data for Naval Air Stations Dallas, Texas, and Memphis, Tennessee, Realigning to Carswell Air Reserve Base, Texas

    National Research Council Canada - National Science Library

    Granetto, Paul

    1994-01-01

    .... This report provides the results of the audit of 16 projects, valued at $122 million, for the realignment of the Naval Air Stations Memphis, Tennessee, and Dallas, Texas, to Carswell Air Reserve Base, Texas...

  7. Immunohistopathology in the Guinea Pig Following Chronic Low-Level Exposure to Chemical Warfare Agents

    Science.gov (United States)

    2005-11-01

    U.S. Army Medical Research Institute of Chemical Defense USAMRICD-TR-05-09 Immunohistopathology in the Guinea Pig Following Chronic Low...2005 2. REPORT TYPE Technical Report 3. DATES COVERED (From - To) May 2003 to April 2005 4. TITLE AND SUBTITLE Immunohistopathology in the Guinea Pig Following...release; distribution unlimited 13. SUPPLEMENTARY NOTES 14. ABSTRACT Guinea pigs exposed repeatedly to low levels of chemical warfare nerve agents

  8. Hybrid Warfare: Preparing for Future Conflict

    Science.gov (United States)

    2015-02-17

    ciceromagazine.com/?s=getting+behind+hybrid+warfare. Brown , Col Leslie F. “Twenty-First Century Warfare Will be Hybrid.” Carlisle Barracks, PA...Lebanon and Gaza.” Rand Corporation Occasional Paper. Santa Monica, CA: Rand Corporation, 2010. Jones, Gareth and Darya Korsunskaya. “U.S., EU

  9. Special Warfare: Restructuring for the Future

    Science.gov (United States)

    2016-06-01

    Civil affairs CAPs combined action platoons CAS close-air support CBI China-Burma-India [theater] CDI Community Defense Initiative CENTCOM [U.S...special forces’ creed has changed over time, the sentiment has remained. The history of the basic unit of special forces—the SFODA—can be traced back to...reassigned CIDG forces no longer held the advantage of insight into local cultural norms and daily activities since they were no longer operating near

  10. Reactivity of Dual-Use Decontaminants with Chemical Warfare Agents

    Science.gov (United States)

    2016-07-01

    REACTIVITY OF DUAL-USE DECONTAMINANTS WITH CHEMICAL WARFARE AGENTS ECBC-TR-1384... Decontaminants with Chemical Warfare Agents 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER 6. AUTHOR(S) Willis, Matthew P...extraction) of chemical warfare agents from materials. 15. SUBJECT TERMS GD HD Decontamination Hazard mitigation VX Chemical warfare agent Liquid-phase

  11. The Information Warfare Life Cycle Model

    Directory of Open Access Journals (Sweden)

    Brett van Niekerk

    2011-11-01

    Full Text Available Information warfare (IW is a dynamic and developing concept, which constitutes a number of disciplines. This paper aims to develop a life cycle model for information warfare that is applicable to all of the constituent disciplines. The model aims to be scalable and applicable to civilian and military incidents where information warfare tactics are employed. Existing information warfare models are discussed, and a new model is developed from the common aspects of these existing models. The proposed model is then applied to a variety of incidents to test its applicability and scalability. The proposed model is shown to be applicable to multiple disciplines of information warfare and is scalable, thus meeting the objectives of the model.

  12. The Information Warfare Life Cycle Model

    Directory of Open Access Journals (Sweden)

    Brett van Niekerk

    2011-03-01

    Full Text Available Information warfare (IW is a dynamic and developing concept, which constitutes a number of disciplines. This paper aims to develop a life cycle model for information warfare that is applicable to all of the constituent disciplines. The model aims to be scalable and applicable to civilian and military incidents where information warfare tactics are employed. Existing information warfare models are discussed, and a new model is developed from the common aspects of these existing models. The proposed model is then applied to a variety of incidents to test its applicability and scalability. The proposed model is shown to be applicable to multiple disciplines of information warfare and is scalable, thus meeting the objectives of the model.

  13. Report of the Defense Science Board Summer Study Task Force on Information Architecture for the Battlefield

    Science.gov (United States)

    1994-10-01

    information warfare has many elements, some new, some old, which interrelate in complex ways. Some are: "• Psychological operations and perception...and information systems." Some aspects of Information Warfare are very old - for example, what we now call Psychological Operations. Some are...Communications, and Intelligence) ASOC Air Support Operations Center ASTEC Advanced Satellite Technology and EHF Communications ATARS Advanced Tactical

  14. Selected General Controls Over the Defense Business Management System

    National Research Council Canada - National Science Library

    1996-01-01

    .... The Defense Business Management System performs appropriation accounting, cost accounting, personnel, payroll, manpower, and management information functions for the Navy, the Air Force, five Defense...

  15. Radioecological aspects of nuclear warfare

    International Nuclear Information System (INIS)

    Edvarson, K.

    1975-01-01

    The radioactive fallout from nuclear explosions is one of the major effects of nuclear warfare. Those levels causing acute radiation sickness are to be expected only within the close-in or intermediate areas downwind from surface bursts. Global fallout from high yield explosions will be fairly evenly distributed in the hemisphere where the explosions occurred and cause irradiation from ground deposit, inhaled material and contaminated food. The collective doses and the order of magnitude of late casualties from this global contamination are estimated for a given total explosion yield. (auth)

  16. Information warfare technologies in political discourse

    Directory of Open Access Journals (Sweden)

    Karpova Anna Yu.

    2016-01-01

    Full Text Available We attempt to examine the technology of «information warfare» in this paper. The dominant theme of the paper is that the outcome of the information warfare is important not only for the future of a state itself but for the future of the world balance of forces. The main task of geopolitical actors in information warfare is to introduce ideas corresponding to their interests into mass consciousness. All participants of political conflicts have common features in technologies of Information warfare. The information anomie is the indicator of the great geopolitical actors’ personified interests on the stage of «information warfare» - the process resulted in destroying the communicative line: report-information understanding and disrupting the social order in society. In this paper authors describe the following Information Warfare technologies: "Political volcano" technology; "SPIN" technology; "Widening media resource" technology; "specific gravity" technology; "Cold War 2.0" technology and Information cleaningup technology. It is assumed that in the future there will be new instructions on applying technologies of information warfare. To impart perspective to the paper we consider examples, opinions and trends.

  17. China's Use of Cyber Warfare: Espionage Meets Strategic Deterrence

    Directory of Open Access Journals (Sweden)

    Magnus Hjortdal

    2011-01-01

    Full Text Available This article presents three reasons for states to use cyber warfare and shows that cyberspace is—and will continue to be—a decisive element in China's strategy to ascend in the international system. The three reasons are: deterrence through infiltration of critical infrastructure; military technological espionage to gain military knowledge; and industrial espionage to gain economic advantage. China has a greater interest in using cyberspace offensively than other actors, such as the United States, since it has more to gain from spying on and deterring the United States than the other way around. The article also documents China's progress in cyber warfare and shows how it works as an extension of its traditional strategic thinking and the current debate within the country. Several examples of cyber attacks traceable to China are also presented. This includes cyber intrusions on a nuclear arms laboratory, attacks on defense ministries (including the Joint Strike Fighter and an airbase and the U.S. electric grid, as well as the current Google affair, which has proved to be a small part of a broader attack that also targeted the U.S. Government. There are, however, certain constraints that qualify the image of China as an aggressive actor in cyberspace. Some believe that China itself is the victim of just as many attacks from other states. Furthermore, certain actors in the United States and the West have an interest in overestimating China's capabilities in cyberspace in order to maintain their budgets.

  18. Which Air Force Civil Engineer Capabilities Can Complement USNORTHCOM’s Role in Defense Support to Civil Authorities (DSCA)?

    Science.gov (United States)

    2014-05-21

    PERSONNEL FROM STANDARD PRIME BEEF OR RED 4F9K4 PROVIDES FOLDED FIBERGLASS MATTING ( FFM ) FOR AIRFIELD DAMAGE REPAIR (ADR). PACKAGE CONSISTS OF THREE FFM ...SETS (54’ X 60’), ONE FFM SUPPORT TOOL KIT, UPPER BUSHINGS, ANCHOR BUSHINGS, ANCHOR BOLTS, AND TWO EA MC-7 AIR COMPRESSORS. EACH UTC WILL BE TASKED TO...OF 7 FOLDED FIBERGLASS MAT SETS (54 FT X 60 FT), 2 FFM SUPPORT TOOL KIT, UPPER BUSHINGS, ANCHOR BUSHINGS, ANCHOR BOLTS AND 4 X MC-7 AIR COMPRESSORS

  19. Improved ROS defense in the swimbladder of a facultative air-breathing erythrinid fish, jeju, compared to a non-air-breathing close relative, traira.

    Science.gov (United States)

    Pelster, Bernd; Giacomin, Marina; Wood, Chris M; Val, Adalberto L

    2016-07-01

    The jeju Hoplerythrinus unitaeniatus and the traira Hoplias malabaricus are two closely related erythrinid fish, both possessing a two-chambered physostomous swimbladder. In the jeju the anterior section of the posterior bladder is highly vascularized and the swimbladder is used for aerial respiration; the traira, in turn, is a water-breather that uses the swimbladder as a buoyancy organ and not for aerial oxygen uptake. Observation of the breathing behavior under different levels of water oxygenation revealed that the traira started aquatic surface respiration only under severe hypoxic conditions and did not breathe air. In the jeju air-breathing behavior was observed under normoxic conditions, and the frequency of air-breathing was significantly increased under hypoxic conditions. Unexpectedly, even under hyperoxic conditions (30 mg O2 L(-1)) the jeju continued to take air breaths, and compared with normoxic conditions the frequency was not reduced. Because the frequently air-exposed swimbladder tissue faces higher oxygen partial pressures than normally experienced by other fish tissues, it was hypothesized that in the facultative air-breathing jeju, swimbladder tissue would have a higher antioxidative capacity than the swimbladder tissue of the water breathing traira. Measurement of total glutathione (GSSG/GSH) concentration in anterior and posterior swimbladder tissue revealed a higher concentration of this antioxidant in swimbladder tissue as compared to muscle tissue in the jeju. Furthermore, the GSSG/GSH concentration in jeju tissues was significantly higher than in traira tissues. Similarly, activities of enzymes involved in the breakdown of reactive oxygen species were significantly higher in the jeju swimbladder as compared to the traira swimbladder. The results show that the jeju, using the swimbladder as an additional breathing organ, has an enhanced antioxidative capacity in the swimbladder as compared to the traira, using the swimbladder only as a

  20. Moltke as a Model for Information Warfare

    National Research Council Canada - National Science Library

    Gallagher, Daniel P

    1998-01-01

    ... with late 20th century Information Warfare (IW). Clausewitz, with his emphasis on concentrating forces for a decisive battle, or Sun Tzu, with his focus on an indirect approach and subduing the enemy without battle, might appear to be more...

  1. Gas Warfare in World War I.

    Science.gov (United States)

    Flintham, A. J.

    1978-01-01

    The effectiveness of gas warfare during World War I was increased by the lack of a basic understanding of the behavior of gases on the part of the soldiers. This was a result of deficiencies in science education. (BB)

  2. Prehistoric ceremonial warfare: beginning of institutionalized violence

    Czech Academy of Sciences Publication Activity Database

    Turek, Jan

    2017-01-01

    Roč. 13, č. 3 (2017), s. 535-548 ISSN 1555-8622 Institutional support: RVO:67985912 Keywords : human aggression * ceremonial warfare * archery symbolism * Neolithic * Chalcolithic * Europe Subject RIV: AC - Archeology, Anthropology, Ethnology OBOR OECD: Archaeology

  3. On Cyber Warfare Command and Control Systems

    National Research Council Canada - National Science Library

    Howes, Norman R; Mezzino, Michael; Sarkesain, John

    2004-01-01

    .... Cyber warfare then becomes a one-sided battle where the attacker makes all the strikes and the target of the attack responds so slowly that the attacker usually gets away without being identified...

  4. Enzymatic Decontamination of Chemical Warfare Agents

    National Research Council Canada - National Science Library

    Raushel, Frank

    2000-01-01

    The primary objective of this research program is the development of a versatile enzyme-based system that is fully optimized for the decontamination, destruction, and detection of know chemical warfare agents...

  5. Mountain Warfare: The Need for Specialist Training

    National Research Council Canada - National Science Library

    Malik, Muhammad

    2003-01-01

    This study focuses on the need for specialist training for mountain warfare. It analyzes the special characteristics of mountain and high altitude terrain which affect conduct of military operations...

  6. Defense Acquisition Workforce: The Air Force Needs to Evaluate Changes in Funding for Civilians Engaged in Space Acquisition

    Science.gov (United States)

    2013-07-01

    1) revitalize the acquisition workforce; (2) improve the requirements generation process; (3) instill budget and financial DOD Acquisition...with our four recommended actions (see app . I). In concurring with our recommendations, DOD stated that the Air Force will evaluate the pilot program

  7. Distributed computing environment for Mine Warfare Command

    OpenAIRE

    Pritchard, Lane L.

    1993-01-01

    Approved for public release; distribution is unlimited. The Mine Warfare Command in Charleston, South Carolina has been converting its information systems architecture from a centralized mainframe based system to a decentralized network of personal computers over the past several years. This thesis analyzes the progress Of the evolution as of May of 1992. The building blocks of a distributed architecture are discussed in relation to the choices the Mine Warfare Command has made to date. Ar...

  8. Route survey periodicity for mine warfare

    OpenAIRE

    Coke, Hartwell F.

    2009-01-01

    Approved for public release, distribution unlimited One of the Navy's most long standing challenges has been conquering the mine warfare threat. As mines and mine warfare techniques evolve and become more sophisticated, so does the United States' ability to counter the threat. The United States newest technique for countering a potential mined harbor, or route, is a process known as "change detection." This concept uses previous side scan sonar images of the area prior to a mining event an...

  9. The Story of the Defense Technical Information Center 1945 - 1995, 50 Years of Information for Defense

    Science.gov (United States)

    1995-07-01

    necessary. As John Naisbitt observed in his 1982 book Megatrends , ...with the coming of the infor- mation society, we have for the first time an economy...information in the hands of many. —John Naisbitt Megatrends As the Defense Technical Information Center moves forward into the last decade of the...Gulf War, for example, Iraq’s leader, Saddam Hussein, threatened to use biological or biochemical warfare. To defend against this threat, the U.S

  10. On the Probability of Predicting and Mapping Traditional Warfare Measurements to the Cyber Warfare Domain

    CSIR Research Space (South Africa)

    Grobler, M

    2014-07-01

    Full Text Available Cyber warfare is a contentious topic, with no agreement on whether this is a real possibility or an unrealistic extension of the physical battlefield. This article will not debate the validity and legality of the concept of cyber warfare...

  11. Evaluating and managing Cold War era historic properties : the cultural significance of U.S. Air Force defensive radar systems.

    Energy Technology Data Exchange (ETDEWEB)

    Whorton, M.

    1999-01-20

    Aircraft and later missile radar early warning stations played an important role in the Cold War. They are associated with important technological, social, political, and military themes of the Cold War and are worthy of preservation. The scope and scale of these systems make physical preservation impractical, but the U.S. Air Force program of historical evaluation and documentation of these systems will provide valuable information to future generations studying this historic period.

  12. Transforming Defense

    National Research Council Canada - National Science Library

    Lamb, Christopher J; Bunn, M. E; Lutes, Charles; Cavoli, Christopher

    2005-01-01

    .... Despite the resources and attention consumed by the war on terror, and recent decisions by the White House to curtail the growth of defense spending, the senior leadership of the Department of Defense (DoD...

  13. Enhancing Fires and Maneuver Capability Through Greater Air-Ground Joint Interdependence

    Science.gov (United States)

    2009-01-01

    Washington, D.C.: Air Warfare College University, February 25, 2005). 2 Charles E. Kirkpatrick, Joint Fires as They Were Meant to Be: V Corps and the 4th Air...Sup- port Operations Group During Operation Iraqi Freedom, Land Warfare Paper No. 48, Arling- ton, Va.: The Institute of Land Warfare , Association of...forces are also based on dif- ferential equations, but ones that follow a slightly modified Lanchester square law that includes the effects of Blue

  14. Defense Base Realignment and Closure Budget Data for the Realignment of the Bureau of Naval Personnel, Washington, D.C., to Naval Air Station Memphis, Tennessee

    National Research Council Canada - National Science Library

    Granetto, Paul

    1995-01-01

    ... requested for each military construction project associated with Defense base realignment and closure does not exceed the original estimated cost provided to the Commission on Defense Base Closure and Realignment (the Commission...

  15. The Impact of Irregular Warfare on the US Army

    National Research Council Canada - National Science Library

    McDonald, III, Roger L

    2006-01-01

    Although the U.S. Army has yet to clearly define irregular warfare, it is imperative that the Army take near-term action to enhance the ability of Soldiers and units to operate effectively in an irregular warfare environment...

  16. Dilemmas of Warfare in Densely Populated Civilian Areas

    OpenAIRE

    Moshe Tamir

    2012-01-01

    This essay attempts to present operational perspectives on conducting warfare in densely populated areas. It also distinguishes between three types of combat within this general category, with the goal of shedding light on this complex type of warfare.

  17. Application of the MASH v1.0 Code System to radiological warfare radiation threats

    International Nuclear Information System (INIS)

    Johnson, J.O.; Santoro, R.T.; Smith, M.S.

    1994-01-01

    Nuclear hardening capabilities of US and foreign ground force systems is a primary concern of the Department of Defense (DoD) and US Army. The Monte Carlo Adjoint Shielding Code System -- MASH v1.0 was developed at Oak Ridge National Laboratory (ORNL) to analyze these capabilities, i.e. the shielding effectiveness, for prompt radiation from a nuclear weapon detonation. Rapidly changing world events and the proliferation of nuclear weapons related technology have increased the kinds of nuclear threats to include intentionally dispersed radiation sources and fallout from tactical nuclear weapons used in the modern AirLand battlefield scenario. Consequently, a DoD area of increasing interest focuses on determining the shielding effectiveness of foreign and US armored vehicles to radiological warfare and fallout radiation threats. To demonstrate the applicability of MASH for analyzing dispersed radiation source problems, calculations have been completed for two distributed sources; a dispersed radiation environment simulated by a uniformly distributed 60 Co source, and a 235 U fission weapon fallout source. Fluence and dose assessments were performed for the free-field, the inside of a steel-walled two-meter box, in a phantom standing in the free-field, and in a phantom standing in the two-meter box. The results indicate substantial radiation protection factors for the 60 Co dispersed radiation source and the fallout source compared to the prompt radiation protection factors. The dose protection factors ranged from 40 to 95 for the two-meter box and from 55 to 123 for the mid-gut position of the phantom standing in the box. The results further indicate that a 60 Co source might be a good first order approximation for a tactical fission weapon fallout protection factor analysis

  18. Policy implications of the Strategic Defense Initiative

    International Nuclear Information System (INIS)

    Goodwin, R.C.

    1991-01-01

    Specific topics include: the technological feasibility of proposed components and architectures; the compatibility of the proposed systems with existing and proposed arms control agreements, with special emphasis upon the ABM Treaty, Outer Space Treaty, the Defense and Space Treaty, and the START Treaty; the compatibility of proposed systems with classical warfare doctrine and the four modern strategic nuclear doctrines of Massive Retaliation, Assured Destruction, Countervailing and Flexible Response; the economics of strategic defense including an assessment of overall governmental spending, of the suballocation for defense, and of the feasibility of defensive systems which are cost-effective at the margin; and, in summary, an assessment of the New Strategic Concept which balances arms control, offensive forces, and defensive forces. This study falls within the realm of defense policy analysis in that it attempts to determine whether the administration's proposed Strategic Defense Initiative, as well as the long-term strategic defensive systems derived from SDI research, constitute efficient, desirable allocation of scarce government resources - especially in a period of seemingly relaxed superpower tensions and numerous demands upon those resources

  19. Preparing South Africa for cyber crime and cyber defense

    CSIR Research Space (South Africa)

    Grobler, M

    2013-01-01

    Full Text Available revolution on cybercrime and cyber defense in a developing country and will evaluate the relevant South African legislation. It will also look at the influence of cyber defense on the international position of the South African Government. South Africa... legislation and a lack of cyber defense mechanisms. As a starting point, cyber warfare for the purpose of this article is defined as the use of exploits in cyber space as a way to intentionally cause harm to people, assets or economies (Owen 2008). It can...

  20. Cyber Attacks, Information Attacks, and Postmodern Warfare

    Directory of Open Access Journals (Sweden)

    Valuch Jozef

    2017-06-01

    Full Text Available The aim of this paper is to evaluate and differentiate between the phenomena of cyberwarfare and information warfare, as manifestations of what we perceive as postmodern warfare. We describe and analyse the current examples of the use the postmodern warfare and the reactions of states and international bodies to these phenomena. The subject matter of this paper is the relationship between new types of postmodern conflicts and the law of armed conflicts (law of war. Based on ICJ case law, it is clear that under current legal rules of international law of war, cyber attacks as well as information attacks (often performed in the cyberspace as well can only be perceived as “war” if executed in addition to classical kinetic warfare, which is often not the case. In most cases perceived “only” as a non-linear warfare (postmodern conflict, this practice nevertheless must be condemned as conduct contrary to the principles of international law and (possibly a crime under national laws, unless this type of conduct will be recognized by the international community as a “war” proper, in its new, postmodern sense.

  1. Geologic and hydrologic data for the municipal solid waste landfill facility, U.S. Army Air Defense Artillery Center and Fort Bliss, El Paso County, Texas

    Science.gov (United States)

    Abeyta, Cynthia G.; Frenzel, P.F.

    1999-01-01

    Geologic and hydrologic data for the Municipal Solid Waste Landfill Facility on the U.S. Army Air Defense Artillery Center and Fort Bliss in El Paso County, Texas, were collected by the U.S. Geological Survey in cooperation with the U.S. Department of the Army. The 106.03-acre landfill has been in operation since January 1974. The landfill contains household refuse, Post solid wastes, bulky items, grass and tree trimmings from family housing, refuse from litter cans, construction debris, classified waste (dry), dead animals, asbestos, and empty oil cans. The depth of the filled areas is about 30 feet and the cover, consisting of locally derived material, is 2 to 3 feet thick. Geologic and hydrologic data were collected at or adjacent to the landfill during (1) drilling of 10 30- to 31-foot boreholes that were completed with gas-monitoring probes, (2) drilling of a 59-foot borehole, (3) drilling of a 355-foot borehole that was completed as a ground-water monitoring well, and (4) in situ measurements made on the landfill cover. After completion, the gas- monitoring probes were monitored on a quarterly basis (1 year total) for gases generated by the landfill. Water samples were collected from the ground-water monitoring well for chemical analysis. Data collection is divided into two elements: geologic data and hydrologic data. Geologic data include lithologic descriptions of cores and cuttings, geophysical logs, soil- gas and ambient-air analyses, and chemical analyses of soil. Hydrologic data include physical properties, total organic carbon, and pH of soil and sediment samples; soil-water chloride and soil-moisture analyses; physical properties of the landfill cover; measurements of depth to ground water; and ground-water chemical analyses. Interpretation of data is not included in this report.

  2. Textile/metal-organic-framework composites as self-detoxifying filters for chemical-warfare agents.

    Science.gov (United States)

    López-Maya, Elena; Montoro, Carmen; Rodríguez-Albelo, L Marleny; Aznar Cervantes, Salvador D; Lozano-Pérez, A Abel; Cenís, José Luis; Barea, Elisa; Navarro, Jorge A R

    2015-06-01

    The current technology of air-filtration materials for protection against highly toxic chemicals, that is, chemical-warfare agents, is mainly based on the broad and effective adsorptive properties of hydrophobic activated carbons. However, adsorption does not prevent these materials from behaving as secondary emitters once they are contaminated. Thus, the development of efficient self-cleaning filters is of high interest. Herein, we report how we can take advantage of the improved phosphotriesterase catalytic activity of lithium alkoxide doped zirconium(IV) metal-organic framework (MOF) materials to develop advanced self-detoxifying adsorbents of chemical-warfare agents containing hydrolysable P-F, P-O, and C-Cl bonds. Moreover, we also show that it is possible to integrate these materials onto textiles, thereby combining air-permeation properties of the textiles with the self-detoxifying properties of the MOF material. © 2015 WILEY-VCH Verlag GmbH & Co. KGaA, Weinheim.

  3. ISIL's Hybrid Warfare in Syria & Iraq

    DEFF Research Database (Denmark)

    Sørensen, Heine

    2016-01-01

    of and ability to synchronize various instruments of power with a view to achieving their end-state. With regards to the second part of the problem statement, the analysis demonstrates how ISIL employed horizontal escalation and ambiguity initially, but later on turned to vertical escalation, within the military......The case study specifically seeks to answer the following problem statement: Does ISIL qualify as an actor using hybrid warfare and if so what characterizes their particular use of this type of warfare? Based on an analysis of ISIL’s warfare from August 2012 to August 2016 the chapter argues......, that it is possible to answer the first part of the problem statement in an affirmative way. Hence, ISIL is not only theoretically prone to hybridity by organizational setup, and by the people comprising the organization, but has in fact continuously acted according to a hybrid logic in its prioritization...

  4. Survey on Urban Warfare Augmented Reality

    Directory of Open Access Journals (Sweden)

    Xiong You

    2018-01-01

    Full Text Available Urban warfare has become one of the main forms of modern combat in the twenty-first century. The main reason why urban warfare results in hundreds of casualties is that the situational information of the combatant is insufficient. Accessing information via an Augmented Reality system can elevate combatants’ situational awareness to effectively improve the efficiency of decision-making and reduce the injuries. This paper begins with the concept of Urban Warfare Augmented Reality (UWAR and illuminates the objectives of developing UWAR, i.e., transparent battlefield, intuitional perception and natural interaction. Real-time outdoor registration, information presentation and natural interaction are presented as key technologies of a practical UWAR system. Then, the history and current research state of these technologies are summarized and their future developments are highlighted from three perspectives, i.e., (1 Better integration with Geographic Information System and Virtual Geographic Environment; (2 More intelligent software; (3 More powerful hardware.

  5. Mongol Warfare in the Pre-Dissolution Period »

    Directory of Open Access Journals (Sweden)

    Timothy May

    2015-01-01

    Full Text Available Although the Mongols used many of the tactics and strategies that steppe nomads had used for centuries, the Mongols refined steppe warfare so that this style of warfare reached its apogee during the Mongol Empire. Furthermore, the Mongols developed a style of warfare that made them possibly the greatest military force in history. This work examines several facets of the pre-dissolution period (1200–1260. With the dissolution of the Mongol Empire, Mongol warfare once again changed. In some areas it remained complex while in others it regressed to traditional forces of steppe warfare, still potent but not as effective as the pre-dissolution period.

  6. Guiding Warfare to Reach Sustainable Peace

    DEFF Research Database (Denmark)

    Vestenskov, David; Drewes, Line

    The conference report Guiding Warfare to Reach Sustainable Peace constitutes the primary outcome of the conference It is based on excerpts from the conference presenters and workshop discussions. Furthermore, the report contains policy recommendations and key findings, with the ambition of develo......The conference report Guiding Warfare to Reach Sustainable Peace constitutes the primary outcome of the conference It is based on excerpts from the conference presenters and workshop discussions. Furthermore, the report contains policy recommendations and key findings, with the ambition...... of developing best practices in the education and implementation of IHL in capacity building of security forces....

  7. Biological warfare, bioterrorism, and biocrime.

    Science.gov (United States)

    Jansen, H J; Breeveld, F J; Stijnis, C; Grobusch, M P

    2014-06-01

    Biological weapons achieve their intended target effects through the infectivity of disease-causing infectious agents. The ability to use biological agents in warfare is prohibited by the Biological and Toxin Weapon Convention. Bioterrorism is defined as the deliberate release of viruses, bacteria or other agents used to cause illness or death in people, but also in animals or plants. It is aimed at creating casualties, terror, societal disruption, or economic loss, inspired by ideological, religious or political beliefs. The success of bioterroristic attempts is defined by the measure of societal disruption and panic, and not necessarily by the sheer number of casualties. Thus, making only a few individuals ill by the use of crude methods may be sufficient, as long as it creates the impact that is aimed for. The assessment of bioterrorism threats and motives have been described before. Biocrime implies the use of a biological agent to kill or make ill a single individual or small group of individuals, motivated by revenge or the desire for monetary gain by extortion, rather than by political, ideological, religious or other beliefs. The likelihood of a successful bioterrorist attack is not very large, given the technical difficulties and constraints. However, even if the number of casualties is likely to be limited, the impact of a bioterrorist attack can still be high. Measures aimed at enhancing diagnostic and therapeutic capabilities and capacities alongside training and education will improve the ability of society to combat 'regular' infectious diseases outbreaks, as well as mitigating the effects of bioterrorist attacks. © 2014 The Authors Clinical Microbiology and Infection © 2014 European Society of Clinical Microbiology and Infectious Diseases.

  8. Chemical warfare protection for the cockpit of future aircraft

    Science.gov (United States)

    Pickl, William C.

    1988-01-01

    Currently systems are being developed which will filter chemical and biological contaminants from crew station air. In order to maximize the benefits of these systems, a method of keeping the cockpit contaminant free during pilot ingress and egress is needed. One solution is to use a rectangular plastic curtain to seal the four edges of the canopy frame to the canopy sill. The curtain is stored in a tray which is recessed into the canopy sill and unfolds in accordion fashion as the canopy is raised. A two way zipper developed by Calspan could be used as an airlock between the pilot's oversuit and the cockpit. This system eliminates the pilot's need for heavy and restrictive CB gear because he would never be exposed to the chemical warfare environment.

  9. Toward Operational Art in Special Warfare

    Science.gov (United States)

    2016-02-23

    combatant commanders develop special warfare cam- paign options for their theaters that can be integral parts of the national approach. Getting buy -in at...the resistance spawning franchise operations at home or abroad? – Is the resistance attracting funding or other forms of assistance (indigenous

  10. Warfare and the Teaching of History.

    Science.gov (United States)

    Salevouris, Michael J.

    1989-01-01

    Maintains that history teachers must challenge simplistic romantic notions about war. Proposes two approaches to teaching about war: the use of personal war narratives; and examining the relationship between warfare and society. Discusses literature related to these approaches. Contends that only through realistic assessments of war can peace be…

  11. The technical Dimensions of Nuclear Warfare

    International Nuclear Information System (INIS)

    Broda, E.

    1977-01-01

    This text, written by Engelbert Broda in 1977 is about the dimensions of nuclear warfare. Broda describes the devastating effects of the nuclear bombs dropped in 1945 in Hiroshima and Nagasaki and compares these effects with the explosive power of Hydrogen weapons. He also expresses his concerns about another nuclear ware and analyses possible worsening situations like change in the military doctrine. (nowak)

  12. Book Review COMPOSITE WARFARE: THE CONDUCT OF ...

    African Journals Online (AJOL)

    COMPOSITE WARFARE: THE CONDUCT OF. SUCCESSFUL GROUND FORCE. OPERATIONS IN AFRICA. Eeben Barlow. Abel Esterhuyse, PhD. Stellenbosch University. Pinetown: 30 Degrees South Publishers. 2015, 576 pages. ISBN 9781928211761. Africa is still one of the most conflict-ridden places on earth – from ...

  13. MOSES, development of an Underwater Warfare Testbed

    NARCIS (Netherlands)

    Lentze, S.G.

    2001-01-01

    The TNO underwater warfare (UWW) research programme results in a large number of models used in operational research projects. To enhance the accessibility and re-use of these models for new projects, TNO-FEL has developed the modelling environment ‘MOSES - Maritime Operations Simulation and

  14. Biomonitoring of exposure to chemical warfare agents

    NARCIS (Netherlands)

    Noort, D.; Schans, M.J. van der; Benschop, H.P.

    2006-01-01

    An overview is presented of the major methods that are presently available for biomonitoring of exposure to chemical warfare agents, i.e., nerve agents and sulfur mustard. These methods can be applied for a variety of purposes such as diagnosis and dosimetry of exposure of casualties, verification

  15. New Developments in Chinese Strategic Psychological Warfare

    Science.gov (United States)

    2005-01-01

    Taoism , which coupled hardness with softness in warfare, was not the only influence on the theory of psychological operations in ancient China. Other...portraying Islamic martyrs who appear to speak to soldiers from the clouds.38 In contemporary wars, such as the Gulf War, the first targets attacked have

  16. A Predictive Model of Surface Warfare Officer Retention: Factors Affecting Turnover

    National Research Council Canada - National Science Library

    Gjurich, Gregory

    1999-01-01

    Junior Surface Warfare Officer retention is in a crisis. The Surface Warfare Officer community anticipates an inability to fill Department Head billets due to the number of junior Surface Warfare Officers leaving military service...

  17. Planetary Defense

    Science.gov (United States)

    2016-05-01

    4 Abstract Planetary defense against asteroids should be a major concern for every government in the world . Millions of asteroids and...helps make Planetary Defense viable because defending the Earth against asteroids benefits from all the above technologies. So if our planet security...information about their physical characteristics so we can employ the right strategies. It is a crucial difference if asteroids are made up of metal

  18. Lighter-Than-Air Systems for Future Naval Missions

    National Research Council Canada - National Science Library

    Bowes, W. C; Engelland, J; Fernandez, F. L; Fratarangelo, P; Kohn, Jr., E. R; Lister, M. J; Neal, W. A; Polmar, N; Rumpf, R. L; Smith, T. B

    2006-01-01

    The Panel concluded that several Lighter-Than-Air (LTA) vehicles now available could provide the endurance and station-keeping needed for persistent ISR, communications relay, and electronic warfare...

  19. Comparing Information Assurance Awareness Training for End-Users: A Content Analysis Examination of Air Force and Defense Information Systems Agency User Training Modules

    National Research Council Canada - National Science Library

    Fruge, John W

    2008-01-01

    Today, the threats to information security and assurance are great. While there are many avenues for IT professionals to safeguard against these threats, many times these defenses prove useless against typical system users...

  20. Accounting Entries Made in Compiling the FY 2000 Financial Statements for the Working Capital Funds of the Air Force and Other Defense Organizations

    National Research Council Canada - National Science Library

    2001-01-01

    .... This audit is one in a series of audits of department-level accounting entries made by the Defense Finance and Accounting Service in preparing the FY 2000 financial statements for DoD reporting entities...

  1. Inside Logistics - Exploring the Heart of Logistics, Volume 23, Number 3, 1999. Collocating Air Force Weapon Systems Inventory with the Defense Logistics Agency Premium Service Facility

    National Research Council Canada - National Science Library

    Murphy, Monte

    1999-01-01

    With declining defense budgets and the inherent responsibility as stewards of taxpayer dollars, the Services must continue to search for more efficient processes while ensuring the mission can be accomplished...

  2. Information operation/information warfare modeling and simulation

    OpenAIRE

    Buettner, Raymond

    2000-01-01

    Information Operations have always been a part of warfare. However, this aspect of warfare is having ever-greater importance as forces rely more and more on information as an enabler. Modern information systems make possible very rapid creation, distribution, and utilization of information. These same systems have vulnerabilities that can be exploited by enemy forces. Information force-on-force is important and complex. New tools and procedures are needed for this warfare arena. As these t...

  3. Military Engineers and Chemical Warfare Troops (Inzhenernye Voiska Khimicheskie Voiska),

    Science.gov (United States)

    MILITARY FORCES(FOREIGN), *MILITARY ORGANIZATIONS, MILITARY ENGINEERING , INFANTRY, AMPHIBIOUS OPERATIONS, MINELAYING, ARMORED VEHICLES, NUCLEAR...RADIATION, DOSIMETERS, CHEMICAL WARFARE, PROTECTIVE CLOTHING, DECONTAMINATION, HEALTH PHYSICS.

  4. Are Current Psychological Operations Procedures Adequate in Information Warfare?

    National Research Council Canada - National Science Library

    Duff, Murray

    1997-01-01

    .... While some aspects of information warfare are conducted domestically, many are executed on foreign soil and involve extensive interaction with other governments, their population, non-governmental...

  5. Computational models of intergroup competition and warfare.

    Energy Technology Data Exchange (ETDEWEB)

    Letendre, Kenneth (University of New Mexico); Abbott, Robert G.

    2011-11-01

    This document reports on the research of Kenneth Letendre, the recipient of a Sandia Graduate Research Fellowship at the University of New Mexico. Warfare is an extreme form of intergroup competition in which individuals make extreme sacrifices for the benefit of their nation or other group to which they belong. Among animals, limited, non-lethal competition is the norm. It is not fully understood what factors lead to warfare. We studied the global variation in the frequency of civil conflict among countries of the world, and its positive association with variation in the intensity of infectious disease. We demonstrated that the burden of human infectious disease importantly predicts the frequency of civil conflict and tested a causal model for this association based on the parasite-stress theory of sociality. We also investigated the organization of social foraging by colonies of harvester ants in the genus Pogonomyrmex, using both field studies and computer models.

  6. Handbook of toxicology of chemical warfare agents

    CERN Document Server

    2010-01-01

    This groundbreaking book covers every aspect of deadly toxic chemicals used as weapons of mass destruction and employed in conflicts, warfare and terrorism. Including findings from experimental as well as clinical studies, this one-of-a-kind handbook is prepared in a very user- friendly format that can easily be followed by students, teachers and researchers, as well as lay people. Stand-alone chapters on individual chemicals and major topics allow the reader to easily access required information without searching through the entire book. This is the first book that offers in-depth coverage of individual toxicants, target organ toxicity, major incidents, toxic effects in humans, animals and wildlife, biosensors, biomarkers, on-site and laboratory analytical methods, decontamination and detoxification procedures, prophylactic, therapeutic and countermeasures, and the role of homeland security. Presents a comprehensive look at all aspects of chemical warfare toxicology in one reference work. This saves research...

  7. Chemical warfare agents. Classes and targets.

    Science.gov (United States)

    Schwenk, Michael

    2018-09-01

    Synthetic toxic chemicals (toxicants) and biological poisons (toxins) have been developed as chemical warfare agents in the last century. At the time of their initial consideration as chemical weapon, only restricted knowledge existed about their mechanisms of action. There exist two different types of acute toxic action: nonspecific cytotoxic mechanisms with multiple chemo-biological interactions versus specific mechanisms that tend to have just a single or a few target biomolecules. TRPV1- and TRPA-receptors are often involved as chemosensors that induce neurogenic inflammation. The present work briefly surveys classes and toxicologically relevant features of chemical warfare agents and describes mechanisms of toxic action. Copyright © 2017 Elsevier B.V. All rights reserved.

  8. 32 CFR 245.21 - ESCAT air traffic priority list.

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 2 2010-07-01 2010-07-01 false ESCAT air traffic priority list. 245.21 Section 245.21 National Defense Department of Defense (Continued) OFFICE OF THE SECRETARY OF DEFENSE (CONTINUED) MISCELLANEOUS PLAN FOR THE EMERGENCY SECURITY CONTROL OF AIR TRAFFIC (ESCAT) ESCAT Air Traffic Priority List (EATPL) § 245.21 ESCAT air traffic...

  9. Mapping the Spread of Mounted Warfare

    Directory of Open Access Journals (Sweden)

    Peter Turchin

    2016-12-01

    Full Text Available Military technology is one of the most important factors affecting the evolution of complex societies. In particular, mounted warfare, the use of horse-riders in military operations, revolutionized war as it spread to different parts of Eurasia and Africa during the Ancient and Medieval eras, and to the Americas during the Early Modern period. Here we use a variety of sources to map this spread.

  10. UML modelling of network warfare examples

    CSIR Research Space (South Africa)

    Veerasamy, N

    2011-08-01

    Full Text Available ] Affects both civilian and military domains [8] [9] Related to the concepts of infowar, information operations, hacking, hackivism, cyberterrorism and cybotage depending on motivations and techniques [10] Encompasses both technological solutions...]. In addition, Williers as well as Qingbao and Anwar discuss more offensive aspects of information security and Network Warfare like Hacking, Vulnerability Injection, Network Attacks, Denial of Capability, Interception and Blockage [6] [18] [19]. Various...

  11. Maritime Trade Warfare Against a Modern Power

    Science.gov (United States)

    2013-05-20

    Malaysian and Singaporean support. Operational Environment The previous sections have assessed that an oil embargo would be effective at influencing...will be addressed. The first approach is to stop the trade at its source. This approach forms the foundation of many contemporary sanctions. Under...antisubmarine warfare capable ships, could be sufficient to defend against forces attempting to break a blockade, and a carrier battle group in the Indian Ocean

  12. Navy Operational Planner - Undersea Warfare Module

    Science.gov (United States)

    2016-09-01

    concepts are considered in NOP–USW that are not in previous research: time phasing of missions, mutually exclusive missions, and asset availability...operational planning efforts. NOP–USW suggests the correct allocation of assets across a wide theater of operation to accomplish missions in the...Master’s thesis 4. TITLE AND SUBTITLE NAVY OPERATIONAL PLANNER – UNDERSEA WARFARE MODULE 5. FUNDING NUMBERS 6. AUTHOR(S) Guy A. Molina 7

  13. Toward Operational Art in Special Warfare: Appendixes

    Science.gov (United States)

    2016-01-01

    language, proficiency in small-unit tactics, and the ability to build and fight alongside indigenous combat formations in a permissive, uncertain, or...counterinsurgency through and with indigenous forces or personnel.”1 The report has four aims: (1) to adapt conventional operational art to the unique...perfect near-real-time situational awareness,” at least at the tactical level of land warfare in complex terrain. But the idea of leveraging information

  14. Defense Business Board

    Science.gov (United States)

    Skip to main content (Press Enter). Toggle navigation Defense Business Board Search Search Defense Business Board: Search Search Defense Business Board: Search Defense Business Board Business Excellence in Defense of the Nation Defense Business Board Home Charter Members Meetings Studies Contact Us The Defense

  15. Air

    International Nuclear Information System (INIS)

    Gugele, B.; Scheider, J.; Spangl, W.

    2001-01-01

    In recent years several regulations and standards for air quality and limits for air pollution were issued or are in preparation by the European Union, which have severe influence on the environmental monitoring and legislation in Austria. This chapter of the environmental control report of Austria gives an overview about the legal situation of air pollution control in the European Union and in specific the legal situation in Austria. It gives a comprehensive inventory of air pollution measurements for the whole area of Austria of total suspended particulates, ozone, volatile organic compounds, nitrogen oxides, sulfur dioxide, carbon monoxide, heavy metals, benzene, dioxin, polycyclic aromatic hydrocarbons and eutrophication. For each of these pollutants the measured emission values throughout Austria are given in tables and geographical charts, the environmental impact is discussed, statistical data and time series of the emission sources are given and legal regulations and measures for an effective environmental pollution control are discussed. In particular the impact of fossil-fuel power plants on the air pollution is analyzed. (a.n.)

  16. Systems Concepts for Integrated Air Defense of Multinational Mobile Crisis Reaction Forces (Concepts de systemes pour la defense aerienne integree de forces internationales mobiles d’intervention en situation de crise)

    Science.gov (United States)

    2001-03-01

    characteristics shown in Table 1 are based upon a conventional armoured formation, and implicitly at divisional level or above, they could also apply at lower...widely dispersed Ease of Physical big/hot mid-size/cool small/cold targeting Camouflage scrimmed draped visual full/thermal EMCON 4 3 2 1 Visibility...line of sight occulting/obscured non line of sight Contact static FLOT fluid confused melée Armour soft semi-hard hard defensive aids Protection

  17. The Cycle of Warfare - Analysis of an Analytical Model

    DEFF Research Database (Denmark)

    Jensen, Mikkel Storm

    2016-01-01

    by its economic, political and ideological characteristics. With the single assumption of economic rationality in human behaviour, Cycle of Warfare is not only coherent, it is applicable to all entities engaged in competition anywhere in the world at any point in history. The Cycle of Warfare can be used...

  18. Surface Warfare Officers Initial Training For Future Success

    Science.gov (United States)

    2018-03-01

    9 A school is initial rating specific technical training that is given to sailors. 14 Figure 4. Less...NAVAL POSTGRADUATE SCHOOL MONTEREY, CALIFORNIA MBA PROFESSIONAL REPORT SURFACE WARFARE OFFICERS— INITIAL TRAINING FOR FUTURE SUCCESS March 2018...professional report 4. TITLE AND SUBTITLE SURFACE WARFARE OFFICERS—INITIAL TRAINING FOR FUTURE SUCCESS 5. FUNDING NUMBERS 6. AUTHOR(S) Arron J

  19. Chemical profiling of chemical warfare agents for forensic purposes

    NARCIS (Netherlands)

    Noort, D.; Reuver, L.P.J. de; Fidder, A.; Tromp, M.; Verschraagen, M.

    2010-01-01

    A program has been initiated towards the chemical profiling of chemical warfare agents, in order to support forensic investigations towards synthesis routes, production sites and suspect chemical suppliers. Within the first stage of the project various chemical warfare agents (VX, sulfur mustard,

  20. Defense Base Realignment and Closure Budget Data for the Closure of Marine Corps Air Station El Toro and Tustin, California, and the Realignment to Naval Air Station Miramar, California

    National Research Council Canada - National Science Library

    1994-01-01

    ... requested for each military construction project associated with base realignment and closure does not exceed the original estimated cost provided to the Commission on Defense Base Closure and Realignment (the Commission...

  1. Hybrid Warfare Studies and Russia’s Example in Crimea

    Directory of Open Access Journals (Sweden)

    Mehmet Seyfettin EROL

    2015-12-01

    Full Text Available Although Hybrid Warfare is an old concept, theoretical studies in the western countries mainly began in the post-Col War era, focusing on asymmetrical threats against conventional superiority of western countries such as USA or Israel. September 11th attacks and 2006 Israel-Lebanon war played important roles for the evolution of hybrid warfare theories. However, there has not any consensus among scholars on a exact or unique definition of hybrid warfare. Hybrid warfare became one of the main security issues for the West and especially for NATO after the Russia-Ukraine crisis. Russian military strategies, called “hybrid warfare” by the western countries, resulted in the successful annexation of Crimea and, caused a serious security problem for the West resulting important structural and functional changes for the military system of NATO. Russian activities, which have been based on surprise, ambiguity and deniability, presented a unique example for hybrid warfare studies.

  2. Nano/micromotors for security/defense applications. A review

    Science.gov (United States)

    Singh, Virendra V.; Wang, Joseph

    2015-11-01

    The new capabilities of man-made micro/nanomotors open up considerable opportunities for diverse security and defense applications. This review highlights new micromotor-based strategies for enhanced security monitoring and detoxification of chemical and biological warfare agents (CBWA). The movement of receptor-functionalized nanomotors offers great potential for sensing and isolating target bio-threats from complex samples. New mobile reactive materials based on zeolite or activated carbon offer considerable promise for the accelerated removal of chemical warfare agents. A wide range of proof-of-concept motor-based approaches, including the detection and destruction of anthrax spores, `on-off' nerve-agent detection or effective neutralization of chemical warfare agents have thus been demonstrated. The propulsion of micromotors and their corresponding bubble tails impart significant mixing that greatly accelerates such detoxification processes. These nanomotors will thus empower sensing and destruction where stirring large quantities of decontaminating reagents and controlled mechanical agitation are impossible or undesired. New technological breakthroughs and greater sophistication of micro/nanoscale machines will lead to rapid translation of the micromotor research activity into practical defense applications, addressing the escalating threat of CBWA.

  3. OFFICER AND COMMANDER IN ASYMMETRIC WARFARE OPERATIONS

    Directory of Open Access Journals (Sweden)

    Giuseppe CAFORIO

    2013-01-01

    Full Text Available Starting from the data of a field research conducted among soldiers with asymmetric warfare experiences from nine different countries, the author seeks to identify and shed light on the various problems that officers with command responsibilities had to face during their missions. A picture emerges of feelings and experiences relating to their first impression upon arriving in the theatre, relations with local armed forces, relations with the local population and local authorities, relations with NGOs, relations with other armies, the impact of the rules of engagement (ROEs, training and education, and operational experiences. The paper ends with a discussion of the lessons learned.

  4. Electronic warfare receivers and receiving systems

    CERN Document Server

    Poisel, Richard A

    2014-01-01

    Receivers systems are considered the core of electronic warfare (EW) intercept systems. Without them, the fundamental purpose of such systems is null and void. This book considers the major elements that make up receiver systems and the receivers that go in them.This resource provides system design engineers with techniques for design and development of EW receivers for modern modulations (spread spectrum) in addition to receivers for older, common modulation formats. Each major module in these receivers is considered in detail. Design information is included as well as performance tradeoffs o

  5. Defense Meteorological Satellite Program (DMSP) Film

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — The United States Air Force Defense Meteorological Satellite Program (DMSP) Operational Linescan System (OLS) is a polar orbiting meteorological sensor with two...

  6. Information Warfare-Worthy Jamming Attack Detection Mechanism for Wireless Sensor Networks Using a Fuzzy Inference System

    Directory of Open Access Journals (Sweden)

    Sudip Misra

    2010-04-01

    Full Text Available The proposed mechanism for jamming attack detection for wireless sensor networks is novel in three respects: firstly, it upgrades the jammer to include versatile military jammers; secondly, it graduates from the existing node-centric detection system to the network-centric system making it robust and economical at the nodes, and thirdly, it tackles the problem through fuzzy inference system, as the decision regarding intensity of jamming is seldom crisp. The system with its high robustness, ability to grade nodes with jamming indices, and its true-detection rate as high as 99.8%, is worthy of consideration for information warfare defense purposes.

  7. A review of multi-threat medical countermeasures against chemical warfare and terrorism.

    Science.gov (United States)

    Cowan, Fred M; Broomfield, Clarence A; Stojiljkovic, Milos P; Smith, William J

    2004-11-01

    The Multi-Threat Medical Countermeasure (MTMC) hypothesis has been proposed with the aim of developing a single countermeasure drug with efficacy against different pathologies caused by multiple classes of chemical warfare agents. Although sites and mechanisms of action and the pathologies caused by different chemical insults vary, common biochemical signaling pathways, molecular mediators, and cellular processes provide targets for MTMC drugs. This article will review the MTMC hypothesis for blister and nerve agents and will expand the scope of the concept to include other chemicals as well as briefly consider biological agents. The article will also consider how common biochemical signaling pathways, molecular mediators, and cellular processes that contribute to clinical pathologies and syndromes may relate to the toxicity of threat agents. Discovery of MTMC provides the opportunity for the integration of diverse researchers and clinicians, and for the exploitation of cutting-edge technologies and drug discovery. The broad-spectrum nature of MTMC can augment military and civil defense to combat chemical warfare and chemical terrorism.

  8. History of chemical and biological warfare agents

    International Nuclear Information System (INIS)

    Szinicz, L.

    2005-01-01

    Chemical and biological warfare agents constitute a low-probability, but high-impact risk both to the military and to the civilian population. The use of hazardous materials of chemical or biological origin as weapons and for homicide has been documented since ancient times. The first use of chemicals in terms of weapons of mass destruction goes back to World War I, when on April 22, 1915 large amounts of chlorine were released by German military forces at Ypres, Belgium. Until around the 1970s of the 20th century, the awareness of the threat by chemical and biological agents had been mainly confined to the military sector. In the following time, the development of increasing range delivery systems by chemical and biological agents possessors sensitised public attention to the threat emanating from these agents. Their proliferation to the terrorists field during the 1990s with the expanding scale and globalisation of terrorist attacks suggested that these agents are becoming an increasing threat to the whole world community. The following article gives a condensed overview on the history of use and development of the more prominent chemical and biological warfare agents

  9. History of chemical and biological warfare agents.

    Science.gov (United States)

    Szinicz, L

    2005-10-30

    Chemical and biological warfare agents constitute a low-probability, but high-impact risk both to the military and to the civilian population. The use of hazardous materials of chemical or biological origin as weapons and for homicide has been documented since ancient times. The first use of chemicals in terms of weapons of mass destruction goes back to World War I, when on April 22, 1915 large amounts of chlorine were released by German military forces at Ypres, Belgium. Until around the 1970s of the 20th century, the awareness of the threat by chemical and biological agents had been mainly confined to the military sector. In the following time, the development of increasing range delivery systems by chemical and biological agents possessors sensitised public attention to the threat emanating from these agents. Their proliferation to the terrorists field during the 1990s with the expanding scale and globalisation of terrorist attacks suggested that these agents are becoming an increasing threat to the whole world community. The following article gives a condensed overview on the history of use and development of the more prominent chemical and biological warfare agents.

  10. [Decontamination of chemical and biological warfare agents].

    Science.gov (United States)

    Seto, Yasuo

    2009-01-01

    Chemical and biological warfare agents (CBWA's) are diverse in nature; volatile acute low-molecular-weight toxic compounds, chemical warfare agents (CWA's, gaseous choking and blood agents, volatile nerve gases and blister agents, nonvolatile vomit agents and lacrymators), biological toxins (nonvolatile low-molecular-weight toxins, proteinous toxins) and microbes (bacteria, viruses, rickettsiae). In the consequence management against chemical and biological terrorism, speedy decontamination of victims, facilities and equipment is required for the minimization of the damage. In the present situation, washing victims and contaminated materials with large volumes of water is the basic way, and additionally hypochlorite salt solution is used for decomposition of CWA's. However, it still remains unsolved how to dispose large volumes of waste water, and the decontamination reagents have serious limitation of high toxicity, despoiling nature against the environments, long finishing time and non-durability in effective decontamination. Namely, the existing decontamination system is not effective, nonspecifically affecting the surrounding non-target materials. Therefore, it is the urgent matter to build up the usable decontamination system surpassing the present technologies. The symposiast presents the on-going joint project of research and development of the novel decontamination system against CBWA's, in the purpose of realizing nontoxic, fast, specific, effective and economical terrorism on-site decontamination. The projects consists of (1) establishment of the decontamination evaluation methods and verification of the existing technologies and adaptation of bacterial organophosphorus hydrolase, (2) development of adsorptive elimination technologies using molecular recognition tools, and (4) development of deactivation technologies using photocatalysis.

  11. Back to the future: aerial warfare in Libya

    Directory of Open Access Journals (Sweden)

    João Paulo Nunes Vicente

    2013-05-01

    Full Text Available A century after the first air bomb mission, a new intervention in the same geographic space has made evident the changes in Airpower. The Aerial Warfare in Libya has radically changed the civil war, complying with a UN mission to protect Libyan population, imposing a no-fly zone and an arms embargo. Therefore, Operation Unified Protector became one of the most successful campaigns in the history of NATO. We aim to assess the operational efficiency of Airpower in the conflict in Libya, focusing on the challenges of a War essentially Aerial. Despite the military results and the fact that some political objectives were met, we can identify some concerning trends that, if not shifted, may negatively influence future NATO operations. We do not aim to draw general and universal conclusions on the strategic value of Airpower based on the analysis of a specific case. Above all, we focus on identifying some lessons which have influenced OUP operational efficiency. Thus, we must analyze some factors, such as the scope of objectives, the type of opposing action and aerial strategy used by the coalition and then focus on the challenges arising from the OUP.

  12. Geohydrologic site characterization of the municipal solid waste landfill facility, US Army Air Defense Artillery Center and Fort Bliss, El Paso County, Texas

    Science.gov (United States)

    Abeyta, Cynthia G.

    1996-01-01

    Geohydrologic conditions of the Municipal Solid Waste Landfill Facility (MSWLF) on the U.S. Army Air Defense Artillery Center and Fort Bliss, El Paso County, Texas, were evaluated by the U.S. Geological Survey in cooperation with the U.S. Army. The 106.03-acre MSWLF has been in operation since January 1974. The landfill contains household refuse, Post solid wastes, bulky items, grass and tree trimmings from family housing, refuse from litter cans, construction debris, classified waste (dry), dead animals, asbestos, and empty oil cans. The MSWLF, located about 1,200 feet east of the nearest occupied structure, is estimated to receive an average of approximately 56 tons of municipal solid waste per day and, at a fill rate of 1-4 acres per year, is expected to reach its capacity by the year 2004. The MSWLF is located in the Hueco Bolson, 4 miles east of the Franklin Mountains. Elevations at the MSWLF range from 3,907 to 3,937 feet above sea level. The climate at the MSWLF and vicinity is arid continental, characterized by an abundance of sunny days, high summer temperatures, relatively cool winters typical of arid areas, scanty rainfall, and very low humidity throughout the year. Average annual temperature near the MSWLF and vicinity is 63.3 degrees Fahrenheit and annual precipitation is 7.8 inches. Potential evaporation in the El Paso area was estimated to be 65 inches per year. Soils at and adjacent to the MSWLF are nearly level to gently sloping, have a fine sandy loam subsoil, and are moderately deep over caliche. The MSWLF is underlain by Hueco Bolson deposits of Tertiary age and typically are composed of unconsolidated to slightly consolidated interbedded sands, clay, silt, gravel, and caliche. Individual beds are not well defined and range in thickness from a fraction of an inch to about 100 feet. The primary source of ground water in the MSWLF area is in the deposits of the Hueco Bolson. A relatively thick vadose zone of approximately 300 feet overlies the

  13. Maneuver from the Air Domain

    Science.gov (United States)

    2016-05-26

    Overload From the previous discussion, cognitive maneuver seeks to degrade the enemy’s capacity for...in all domains, the ability to maneuver from the air domain in the cognitive sense, comes primarily from air power’s unique ability to overload the... cognitive maneuver mechanisms developed in the 1980s as part of broader maneuver warfare theory. The result is a proposed definition of maneuver from

  14. Naval Air Warfare Center Aircraft Division Patent Portfolio

    Science.gov (United States)

    2012-01-01

    2.0 parts of an oil soluble antioxidant , from 0.0 to 5.0 parts of a water-displacing compound, an effective amount of a mildew-inhibiting compound...effective amount of an oil soluble alkyl phosphate, from 0.1 to 2.0 parts of an oil soluble antioxidant , from 0.1 to 5.0 parts of a water-displacing...Market Opportunities: • Exercise, recreational, or motor sports • Fire Fighters and First Responders for rescue missions • Hazmat teams or specialist

  15. Defense Human Resources Activity > PERSEREC

    Science.gov (United States)

    Skip to main content (Press Enter). Toggle navigation Defense Human Resources Activity Search Search Defense Human Resources Activity: Search Search Defense Human Resources Activity: Search Defense Human Resources Activity U.S. Department of Defense Defense Human Resources Activity Overview

  16. Irregular Warfare: Impact on Future Professional Military Education

    National Research Council Canada - National Science Library

    Paschal, David G

    2006-01-01

    ... to operate effectively in an irregular warfare environment. The utility of a decisive war between nation states continues to decline and will eventually reach critical mass based upon the extreme imbalance of military power and a U.S. monopoly...

  17. FFT Based VLSI Digital One Bit Electronic Warfare Receiver

    National Research Council Canada - National Science Library

    Chien-In, Henry

    1998-01-01

    ... (1 GHz) digital receiver designed for electronic warfare applications. The receiver can process two simultaneous signals and has the potential for fabrication on a single multi-chip module (MCM...

  18. Precision Warfare Enables Interdependent Fires and Maneuver in 2010

    National Research Council Canada - National Science Library

    Smith, John

    1997-01-01

    The U.S. Army is in the midst of a revolution in military affairs (RMA). Significant advancements in informational technologies and precision weapons are providing unprecedented potential for future warfare...

  19. Irregular Warfare: Special Operations Joint Professional Military Education Transformation

    National Research Council Canada - National Science Library

    Cannady, Bryan H

    2008-01-01

    ... on today's battlefront in Afghanistan and Iraq and in the Global War on Terrorism (GWOT). At the forefront of the GWOT and irregular warfare are the United States Special Operations Command (USSOCOM...

  20. Irregular Warfare: New Challenges for Civil-Military Relations

    National Research Council Canada - National Science Library

    Cronin, Patrick M

    2008-01-01

    .... Irregular warfare introduces new complications to what Eliot Cohen has called an unequal dialogue between civilian and military leaders in which civilian leaders hold the true power but must modulate...

  1. Echoes of Chechnya Warfare Resound in Moscow, Quantico

    National Research Council Canada - National Science Library

    Ackerman, Robert

    2000-01-01

    .... thinking about urban warfare. After suffering stunning public defeats just a few years ago, Russian forces applied painful lessons learned then to drive Chechen forces out of their capital city, Grozny, this year...

  2. zero day exploits and national readiness for cyber-warfare

    African Journals Online (AJOL)

    HOD

    A zero day vulnerability is an unknown exploit that divulges security flaws in software before such a flaw is publicly ... Keywords: exploits, zero day, vulnerability, cyberspace, cyber-warfare. 1. ..... industries and companies across the globe. The.

  3. The Role of Airpower in Urban Warfare. An Airman's Perspective

    National Research Council Canada - National Science Library

    Saffold, Timothy

    1998-01-01

    .... This emphasis on surface force employment stifles innovative thought as to how military forces can achieve operational and strategic effects by employing airpower as the key instrument of force in urban warfare...

  4. Fourth Generation Warfare: The Need for a Comprehensive Approach

    National Research Council Canada - National Science Library

    Benton, LeRoy D

    2008-01-01

    .... A definition of Fourth Generation Warfare is developed, based on Col. Thomas X. Hammes' writings. The definition is further developed to show relevance and applicability to current operations in the Long War on Terrorism...

  5. Towards a framework for a network warfare capability

    CSIR Research Space (South Africa)

    Veerasamy, N

    2008-07-01

    Full Text Available . These include the legal issues, ethical dilemmas, technical solutions, financial impact and skill/manpower investment. Logical constraints/implications have been grouped together in the discussion that follows. 5.1.1 Legal Ethical Issues As network warfare... but the underlying causes of crime also needs to be understood. Ethics and morals play a significant role in determining the personality traits of an individual. Users will need to balance ethical dilemmas before engaging in offensive network warfare. Computers...

  6. Structuring Naval Special Warfare junior officer professional military education

    OpenAIRE

    Donovan, Thomas A.

    2007-01-01

    Naval Special Warfare does not currently have a designated career path for an officer that requires professional military education (PME) for SEAL junior officers after the rank of Ensign (O-1) and before the rank of Lieutenant Commander (O-4). There currently is interest in this subject matter at the Naval Special Warfare Command and Center. SEAL officers increasingly hold key leadership positions and influence critical decisions in the execution of national strategy. This growing respo...

  7. Strategy in the Robotic Age: A Case for Autonomous Warfare

    Science.gov (United States)

    2014-09-01

    enabling technology that augments human performance, such as exoskeleton suits, and other complementary fields that make robotics function...philosophy of maneuver warfare with new technologies from the Robotic Age, such as unmanned systems and exoskeleton suits, to present a new warfighting...and Brimley, “20YY,” 12. 49 the exoskeleton suit, but rather that the full benefit of autonomous warfare will be achieved by leveraging mass and

  8. On Space Warfare: A Space Power Doctrine

    National Research Council Canada - National Science Library

    Lupton, David

    1998-01-01

    .... Nevertheless, the speech was promptly dubbed "Star Wars" because the space environment seems to be the most likely place to deploy a ballistic missile defense system, and several administration...

  9. The Manipulation of Human Behavior in Guerrilla Warfare: Can It Enhance U.S. Army Special Forces Guerrilla Warfare Operations?

    National Research Council Canada - National Science Library

    Harris, William

    1997-01-01

    .... Proper integration of psychological communications to manipulate behavior in guerrilla warfare may facilitate the recruiting1 motivation, morale, sustainment and popular support for a guerrilla movement and its cause...

  10. Information Warfare, Threats and Information Security

    Directory of Open Access Journals (Sweden)

    Dmitriy Nikolaevich Bespalov

    2014-01-01

    Full Text Available The article presents the opposite, but dependent on each other's reality - Revolutionary War information,information security goals and objectives of their study within the scheme "challenge-response", methodological and analytical support, the role of elites and the information society in promoting information security. One of the features of contemporaneityis the global spread of ICT, combined with poor governance and other difficulties in the construction of innovation infrastructures that are based on them in some countries. This leads to the reproduction of threats, primarily related to the ability to use ICT for purposes that are inconsistent with the objectives of maintaining international peace and security, compliance with the principles of non-use of force, non-interference in the internal affairs of states, etc. In this regard, include such terms as "a threat of information warfare", "information terrorism" and so forth. Information warfare, which stay in the policy declared the struggle for existence, and relationships are defined in terms of "friend-enemy", "ours-foreign". Superiority over the opponent or "capture of its territory" is the aim of political activity. And information security, serving activities similar process of political control, including a set of components, is a technology until their humanitarian. From the context and the decision itself is the ratio of the achieved results of information and political influence to the target - a positive image of Russia. Bringing its policy in line with the demands of a healthy public opinion provides conductivity of theauthorities initiatives in the country and increases the legitimacy of the Russian Federation actions in the world.

  11. 77 FR 55465 - US Air Force Exclusive Patent License

    Science.gov (United States)

    2012-09-10

    ... DEPARTMENT OF DEFENSE Department of the Air Force US Air Force Exclusive Patent License AGENCY: Air Force Research Laboratory Information Directorate, Rome, New York, Department of the Air Force... amended, the Department of the Air Force announces [[Page 55466

  12. Militias: Exploring Alternative Force Structures for National Defense

    Science.gov (United States)

    2014-06-01

    development in the art of warfare and 15 Mario A. Fumerton, “Rondas Campesinas in the Peruvian Civil War: Peasant Self-defense Organizations in...tr ai ni ng N at io na l l ev el su pp or t N at io na l d riv en id eo lo gy Pr e- ex is tin g ci vi lia n sk ill s Primary category...national framework providing guidance for the militia groups to act. This variable varies within and across cases, and will be discussed further

  13. U.S. Air Forces Aerial Spray Mission: Should the Department of Defense Continue to Operate this Weapon of Mass Dispersion

    Science.gov (United States)

    2015-12-01

    or should it be outsourced to commercial sources. This research investigates the many advantages and disadvantages of the military aerial spray...Aerial Spraying for Mosquito Control for Fort Bend County – Technical Specifications Compliance , 12 June 2014. Federal Aviation Administration, Air

  14. WAR TERMINATION IN SOMALIA AND KENYA DEFENSE FORCES’ (KDF ROLE

    Directory of Open Access Journals (Sweden)

    E.O.S. ODHIAMBO

    2013-01-01

    Full Text Available War causes and conduct have fascinated war planners, war executors and scholars for a long time because little attention has been given to how wars are ended. This oversight is apparent not only in historical accounts of warfare but, more importantly, in contemporary analyses and doctrinal formulations of deterrence and overall defense policies. Just as historians have focused on how wars begin and are fought, military analysts and planners have concentrated on influencing the initiation and conduct of warfare rather than on analyzing the process and requirements for terminating warfare on acceptable terms and at acceptable costs. Conflict termination is the formal end of fighting, not the end of conflict. Despite the volumes of research and literature on the subject, belligerents mismanage war termination. The major objective of wartime strategy is defeating enemy arms as quickly as possible with the least cost in friendly casualties. As long as hostilities endure, diplomacy is subordinated to military requirements. War termination planning, as it is currently accomplished, takes the form of civil affair planning on the details of how the vanquished will be managed following the capitulation of the enemy and cessation of hostilities. We argue that Kenya Defence Forces (KDF prudently terminated its war with the terrorists group Al-Shabaab that merged with Al-Qaeda when they agreed to be integrated into the African Union Mission for Somalia (AMISOM which is backed up by the United Nations.

  15. Comment on “Computed Tomography Imaging Findings in Chemical Warfare Victims with Pulmonary Complications”

    Directory of Open Access Journals (Sweden)

    2013-08-01

    Full Text Available Dr.Mirsadraei and colleagues performed an interesting study about the lung HRCT findings in chemical warfare patients who suffering from long-term pulmonary complications. They found that air trapping and mosaic attenuation were the most common lung HRCT findings. Also they divided patients in different clinical entities according to the lung HRCT findings (Bronchiolitis Oblitrans, pulmonary fibrosis, bronchiectasis, asthma, and COPD. At present, GOLD and GINA recommend the diagnosis of COPD and asthma mainly on spirometry (1, 2. Although the HRCT may have valuable diagnostic points, but the diagnosis of COPD and asthma is according to the spirometry and relevant clinical symptoms. In this article, the authors relied only on clinical symptoms and corresponding lung HRCT findings that may have overlapping points in the diagnosis of asthma and COPD since normal lung HRCT with or without air trapping can be seen in COPD too (3. It has been proposed that saber-sheath trachea (tracheal index

  16. Bending the Eagle’s Wing - How Advanced Air Defenses put the Enemy’s Vital Centers Beyond the Reach of American Airpower

    Science.gov (United States)

    2010-06-04

    29 Carl von Clausewitz, On War, ed. and trans. Michael Howard and Peter Paret (Princeton, NJ: Princeton University Press, 1976), 358. 68 More so...Air University Press, 1994. Clausewitz, Carl von. On War. Edited and Translated by Michael Howard and Peter Paret. Princeton, NJ: Princeton...Randolph, Stephen P. Powerful and Brutal Weapons. Cambridge, MA: Harvard University Press, 2007. Sagan , Scott D. and Kenneth N. Waltz. The Spread of

  17. Nuclear, biological and chemical warfare. Part I: Medical aspects of nuclear warfare.

    Science.gov (United States)

    Kasthuri, A S; Pradhan, A B; Dham, S K; Bhalla, I P; Paul, J S

    1990-04-01

    Casualties in earlier wars were due much more to diseases than to weapons. Mention has been made in history of the use of biological agents in warfare, to deny the enemy food and water and to cause disease. In the first world war chemical agents were used to cause mass casualties. Nuclear weapons were introduced in the second world war. Several countries are now involved in developing nuclear, biological and chemical weapon systems, for the mass annihilation of human beings, animals and plants, and to destroy the economy of their enemies. Recently, natural calamities and accidents in nuclear, chemical and biological laboratories and industries have caused mass instantaneous deaths in civilian population. The effects of future wars will not be restricted to uniformed persons. It is time that physicians become aware of the destructive potential of these weapons. Awareness, immediate protective measures and first aid will save a large number of persons. This series of articles will outline the medical aspects of nuclear, biological and chemical weapon systems in three parts. Part I will deal with the biological effects of a nuclear explosion. The short and long term effects due to blast, heat and associated radiation are highlighted. In Part II, the role of biological agents which cause commoner or new disease patterns is mentioned. Some of the accidents from biological warfare laboratories are a testimony to its potential deleterious effects. Part III deals with medical aspects of chemical warfare agents, which in view of their mass effects can overwhelm the existing medical resources, both civilian and military.(ABSTRACT TRUNCATED AT 250 WORDS)

  18. Using Agent Based Distillation to Explore Issues Related to Asymmetric Warfare

    Science.gov (United States)

    2009-10-01

    official definition of asymmetric warfare , considering that its use was redundant to irregular warfare [30]. 2 Such as the Lanchester Equations...RTP-MP-MSG-069 23 - 1 Using Agent Based Distillation to Explore Issues Related to Asymmetric Warfare Martin Adelantado, Jean-Michel Mathé...shows that both conventional and asymmetric warfare are characterised by nonlinear behaviours and that engagement is a Complex Adaptive System (CAS

  19. FY 1972-1976 Defense Program and the 1972 Defense Budget.

    Science.gov (United States)

    1971-03-01

    Thai Government. This assessment was given me by Thai officials during my recent visit there. Insurgents along the Thai/ Malaysian border are under the...Development and Initial Procurement of Maverick Air-to-Ground Missile 31 87 Air Superiority and Air Defense Continued Procurement of F-4 Air Force Fighter... MAVERICK . The MAVERICK is another program that is of importance in providing increased capabilities for support of troops on the battlefield. MAVERICK is

  20. Home - Defense Technology Security Administration

    Science.gov (United States)

    by @dtsamil Defense Technology Security Administration Mission, Culture, and History Executive Official seal of Defense Technology Security Administration Official seal of Defense Technology Security Administration OFFICE of the SECRETARY of DEFENSE Defense Technology Security Administration

  1. Bomber: The Formation and Early Years of Strategic Air Command

    Science.gov (United States)

    2012-11-01

    fundamental, healthy interest in the tools of their trade. War had been fought on land and sea since prehistory , but it only moved into the air in...advanced technology—there is a reason why it took millennia for man to conquer the air, whereas he adapted to warfare on land and sea in prehistory . The

  2. Transport and Reactivity of Decontaminants to Provide Hazard Mitigation of Chemical Warfare Agents from Materials

    Science.gov (United States)

    2016-06-01

    2013 4. TITLE AND SUBTITLE Transport and Reactivity of Decontaminants to Provide Hazard Mitigation of Chemical Warfare Agents from Materials 5a...directions for future decontamination formulation approaches. 15. SUBJECT TERMS GD HD Decontamination Hazard mitigation VX Chemical warfare agent... DECONTAMINANTS TO PROVIDE HAZARD MITIGATION OF CHEMICAL WARFARE AGENTS FROM MATERIALS 1. INTRODUCTION Decontamination of materials is the

  3. Examining U.S. Irregular Warfare Doctrine

    Science.gov (United States)

    2008-06-01

    Muslim leaders, this manual also provides inspiration to the Al-Qaeda undercover member. These are especially useful in convincing the young...A “Air Power: An Enduring Illusion,” The Economist (24 August 2006). Accessed via: http://www.economist.com/world/displaystory.cfm?story_id...USA AFIT/ILM/ENS/08-04 DEPARTMENT OF THE AIR FORCE AIR UNIVERSITY AIR FORCE INSTITUTE OF TECHNOLOGY Wright-Patterson

  4. Ballistic missile defense effectiveness

    Science.gov (United States)

    Lewis, George N.

    2017-11-01

    The potential effectiveness of ballistic missile defenses today remains a subject of debate. After a brief discussion of terminal and boost phase defenses, this chapter will focus on long-range midcourse defenses. The problems posed by potential countermeasures to such midcourse defenses are discussed as are the sensor capabilities a defense might have available to attempt to discriminate the actual missile warhead in a countermeasures environment. The role of flight testing in assessing ballistic missile defense effectiveness is discussed. Arguments made about effectiveness by missile defense supporters and critics are summarized.

  5. Russian New Art of Hybrid Warfare in Ukraine

    Directory of Open Access Journals (Sweden)

    Rusnáková Soňa

    2017-10-01

    Full Text Available The main aim of this paper is to analyse the annexation of Crimea by the Russian Federation. For the purposes of the paper, the theory of hybrid warfare was chosen as an analytical category. Throughout the paper, the concept of hybrid warfare is examined and applied on case study of Crimean annexation. Hybrid warfare, especially in connection with Russian actions in Crimea has been an intensely debated concept. There is an ongoing debate among scholars concerning the meaning of the concept, its existence and employment by the Russian Federation. This paper showed that the article of Valeriy Gerasimov – the incumbent Chief of the General Staff of the Russian Federation-invoked a new warfare strategy for the Russian Federation which was consequently for the very first time in its full spectre and effectivity employed on case of Crimean annexation in March 2014. Observing the application of the hybrid warfare in practice serves the purposes of countering its further potential application in post-Soviet space and Russian ‘near abroad’.

  6. Cost Effective Regional Ballistic Missile Defense

    Science.gov (United States)

    2016-02-16

    deploying advanced air defense systems18, such as the Russian S-300 and S-500, and concealing them in hardened, camouflaged sites, such as extensive... Russian objections to the European Phased Adaptive Approach (EPAA) and fund homeland defense priorities.39 Furthermore, the PTSS system was also... Theatre Ballistic Missile Defence Capability Becomes Operational,” Jane’s Missiles & Rockets, 1 February 2011. 55 Joseph W. Kirschbaum, REGIONAL MISSILE

  7. Optimizing Active Cyber Defense

    OpenAIRE

    Lu, Wenlian; Xu, Shouhuai; Yi, Xinlei

    2016-01-01

    Active cyber defense is one important defensive method for combating cyber attacks. Unlike traditional defensive methods such as firewall-based filtering and anti-malware tools, active cyber defense is based on spreading "white" or "benign" worms to combat against the attackers' malwares (i.e., malicious worms) that also spread over the network. In this paper, we initiate the study of {\\em optimal} active cyber defense in the setting of strategic attackers and/or strategic defenders. Specific...

  8. [Decontamination of chemical warfare agents by photocatalysis].

    Science.gov (United States)

    Hirakawa, Tsutomu; Mera, Nobuaki; Sano, Taizo; Negishi, Nobuaki; Takeuchi, Koji

    2009-01-01

    Photocatalysis has been widely applied to solar-energy conversion and environmental purification. Photocatalyst, typically titanium dioxide (TiO(2)), produces active oxygen species under irradiation of ultraviolet light, and can decompose not only conventional pollutants but also different types of hazardous substances at mild conditions. We have recently started the study of photocatalytic decontamination of chemical warfare agents (CWAs) under collaboration with the National Research Institute of Police Science. This article reviews environmental applications of semiconductor photocatalysis, decontamination methods for CWAs, and previous photocatalytic studies applied to CWA degradation, together with some of our results obtained with CWAs and their simulant compounds. The data indicate that photocatalysis, which may not always give a striking power, certainly helps detoxification of such hazardous compounds. Unfortunately, there are not enough data obtained with real CWAs due to the difficulty in handling. We will add more scientific data using CWAs in the near future to develop useful decontamination systems that can reduce the damage caused by possible terrorism.

  9. The Academy and Fourth Generation Warfare

    Science.gov (United States)

    de Russy, Candace

    2003-01-01

    Candace de Russy wonders whether the climate of ideas in higher education offers any defense at all against the anti-Western terrorism abroad in the world today. "No," she concludes. Divisive ideologies can only weaken our unity, our resolve, and our moral confidence, just when we need them at their strongest.

  10. Implications of Outsourcing on Network Centric Warfare

    National Research Council Canada - National Science Library

    Brown, Michael

    2002-01-01

    The Department of Defense (DoD) has taken about 80 percent of the government cutbacks since the end of the Cold Wan As a means to fashion cost savings and gain efficiencies, DoD is seeking to streamline much of its infrastructure...

  11. Biomaterials for mediation of chemical and biological warfare agents.

    Science.gov (United States)

    Russell, Alan J; Berberich, Jason A; Drevon, Geraldine F; Koepsel, Richard R

    2003-01-01

    Recent events have emphasized the threat from chemical and biological warfare agents. Within the efforts to counter this threat, the biocatalytic destruction and sensing of chemical and biological weapons has become an important area of focus. The specificity and high catalytic rates of biological catalysts make them appropriate for decommissioning nerve agent stockpiles, counteracting nerve agent attacks, and remediation of organophosphate spills. A number of materials have been prepared containing enzymes for the destruction of and protection against organophosphate nerve agents and biological warfare agents. This review discusses the major chemical and biological warfare agents, decontamination methods, and biomaterials that have potential for the preparation of decontamination wipes, gas filters, column packings, protective wear, and self-decontaminating paints and coatings.

  12. Lanchester-Type Models of Warfare, Volume II

    OpenAIRE

    Taylor, James G.

    1980-01-01

    This monograph is a comprehensive treatist on Lanchester-type models of warfare, i.e. differential-equation models of attrition in force-on-force combat operations. Its goal is to provide both an introduction to and current-state-of-the-art overview of Lanchester-type models of warfare as well as a comprehensive and unified in-depth treatment of them. Both deterministic as well as stochastic models are considered. Such models have been widely used in the United States and elsewhere for the...

  13. Theory of information warfare: basic framework, methodology and conceptual apparatus

    Directory of Open Access Journals (Sweden)

    Олександр Васильович Курбан

    2015-11-01

    Full Text Available It is conducted a comprehensive theoretical study and determine the basic provisions of the modern theory of information warfare in on-line social networks. Three basic blocks, which systematized the theoretical and methodological basis of the topic, are established. There are information and psychological war, social off-line and on-line network. According to the three blocks, theoretical concepts are defined and methodological substantiation of information processes within the information warfare in the social on-line networks is formed

  14. Hybrid warfare of the USA in South America

    Directory of Open Access Journals (Sweden)

    A. V. Budaev

    2015-01-01

    Full Text Available Washington’s hybrid warfare in Latin American region differs by its inventive and sophisticated methods and in fact represents a complex and multidimensional phenomenon including symbiosis of the “soft” and “hard” power as well as their combination in the form of the “smart power”. The increasing importance of hybrid warfare technologies in the US foreign policy in Latin America predetermines the necessity of thorough studies and analysis of this phenomenon for providing Russian interests.

  15. IMS software developments for the detection of chemical warfare agent

    Science.gov (United States)

    Klepel, ST.; Graefenhain, U.; Lippe, R.; Stach, J.; Starrock, V.

    1995-01-01

    Interference compounds like gasoline, diesel, burning wood or fuel, etc. are presented in common battlefield situations. These compounds can cause detectors to respond as a false positive or interfere with the detector's ability to respond to target compounds such as chemical warfare agents. To ensure proper response of the ion mobility spectrometer to chemical warfare agents, two special software packages were developed and incorporated into the Bruker RAID-1. The programs suppress interferring signals caused by car exhaust or smoke gases resulting from burning materials and correct the influence of variable sample gas humidity which is important for detection and quantification of blister agents like mustard gas or lewisite.

  16. Empirically-driven Analysis for Model-driven Experimentation: From Lab to Sea and Back Again (Part 1)

    National Research Council Canada - National Science Library

    Weil, Shawn A; Kemple, William; Grier, Rebecca; Hutchins, Susan; Kleinman, David; Hocevar, Susan; Serfaty, Daniel

    2006-01-01

    The Expeditionary Strike Group (ESG) is a versatile military organization, designed to effectively handle missions as diverse as air warfare, tactical ballistic missile defense, and maritime interdiction operations...

  17. Swarming and the Future of Warfare

    Science.gov (United States)

    2005-01-01

    and Plans DIVARTY Division Artillery DoD Department of Defense EO Electro-Optical EXFOR Experimental Force FLIR Forward-Looking Infrared FOFA Follow-on...HUMINT Human Intelligence xiii IED Improvised Explosive Device IFV Infantry Fighting Vehicle 10 Information Operations IR Infrared ISR Intelligence...and the rifles of WW2 (9 out of 1,000). 37 No longer could artillery unlimber within 300 yards and shoot at infantry with relative impunity since

  18. Annual Expeditionary Warfare Conference (22nd)

    Science.gov (United States)

    2017-10-24

    Shipbuilding has what it takes to build the military ships that keep America and our allies safe. Leonardo DRS is a prime contractor , leading technology...innovator and supplier of integrated products, services and support to military forces, intelligence agencies and defense contractors worldwide. The...deployed with HMM- 264, HMM-365 and HMM-162. He has served as a Basic and Advanced Flight Instructor at Helicopter Training Squadron ( HT ) 18, NAS

  19. Risk, Military Ethics and Irregular Warfare

    Science.gov (United States)

    2011-12-01

    permissible; they are obligatory. Given the state’s moral obligation to protect its citizens, 6 military operations conducted in their defense are prima ... facie obligated, even when conducting those operations exposes combatants to harm. 7 Thus, in what I will refer to as the “traditional view,” by taking...feature of the traditional view. In an article co-written in 2005 with then Major General Amos Yadlin, Kasher remarked: “the duty to minimize casualties

  20. Decontamination of adsorbed chemical warfare agents on activated carbon using hydrogen peroxide solutions.

    Science.gov (United States)

    Osovsky, Ruth; Kaplan, Doron; Nir, Ido; Rotter, Hadar; Elisha, Shmuel; Columbus, Ishay

    2014-09-16

    Mild treatment with hydrogen peroxide solutions (3-30%) efficiently decomposes adsorbed chemical warfare agents (CWAs) on microporous activated carbons used in protective garments and air filters. Better than 95% decomposition of adsorbed sulfur mustard (HD), sarin, and VX was achieved at ambient temperatures within 1-24 h, depending on the H2O2 concentration. HD was oxidized to the nontoxic HD-sulfoxide. The nerve agents were perhydrolyzed to the respective nontoxic methylphosphonic acids. The relative rapidity of the oxidation and perhydrolysis under these conditions is attributed to the microenvironment of the micropores. Apparently, the reactions are favored due to basic sites on the carbon surface. Our findings suggest a potential environmentally friendly route for decontamination of adsorbed CWAs, using H2O2 without the need of cosolvents or activators.

  1. Chemiresistor Devices for Chemical Warfare Agent Detection Based on Polymer Wrapped Single-Walled Carbon Nanotubes.

    Science.gov (United States)

    Fennell, John F; Hamaguchi, Hitoshi; Yoon, Bora; Swager, Timothy M

    2017-04-28

    Chemical warfare agents (CWA) continue to present a threat to civilian populations and military personnel in operational areas all over the world. Reliable measurements of CWAs are critical to contamination detection, avoidance, and remediation. The current deployed systems in United States and foreign militaries, as well as those in the private sector offer accurate detection of CWAs, but are still limited by size, portability and fabrication cost. Herein, we report a chemiresistive CWA sensor using single-walled carbon nanotubes (SWCNTs) wrapped with poly(3,4-ethylenedioxythiophene) (PEDOT) derivatives. We demonstrate that a pendant hexafluoroisopropanol group on the polymer that enhances sensitivity to a nerve agent mimic, dimethyl methylphosphonate, in both nitrogen and air environments to concentrations as low as 5 ppm and 11 ppm, respectively. Additionally, these PEDOT/SWCNT derivative sensor systems experience negligible device performance over the course of two weeks under ambient conditions.

  2. Adsorption and Desorption of Chemical Warfare Agent Simulants on Silica Surfaces with Hydrophobic Coating

    International Nuclear Information System (INIS)

    Park, Eun Ji; Kim, Young Dok

    2013-01-01

    Aim of our study is finding adsorbents suitable for pre-concentration of chemical warfare agents (CWAs). We considered Tenax, bare silica and polydimethylsiloxane (PDMS)-coated silica as adsorbents for dimethyl methylphosphonate (DMMP) and dipropylene glycol methyl ether (DPGME). Tenax showed lower thermal stability, and therefore, desorption of CWA simulants and decomposition of Tenax took place simultaneously. Silica-based adsorbents showed higher thermal stabilities than Tenax. A drawback of silica was that adsorption of CWA simulant (DMMP) was significantly reduced by pre-treatment of the adsorbents with humid air. In the case of PDMS-coated silica, influence of humidity for CWA simulant adsorption was less pronounced due to the hydrophobic nature of PDMS-coating. We propose that PDMS-coated silica can be of potential importance as adsorbent of CWAs for their pre-concentration, which can facilitate detection of these CWAs

  3. Adsorption and Desorption of Chemical Warfare Agent Simulants on Silica Surfaces with Hydrophobic Coating

    Energy Technology Data Exchange (ETDEWEB)

    Park, Eun Ji; Kim, Young Dok [Sungkyunkwan Univ., Suwon (Korea, Republic of)

    2013-07-15

    Aim of our study is finding adsorbents suitable for pre-concentration of chemical warfare agents (CWAs). We considered Tenax, bare silica and polydimethylsiloxane (PDMS)-coated silica as adsorbents for dimethyl methylphosphonate (DMMP) and dipropylene glycol methyl ether (DPGME). Tenax showed lower thermal stability, and therefore, desorption of CWA simulants and decomposition of Tenax took place simultaneously. Silica-based adsorbents showed higher thermal stabilities than Tenax. A drawback of silica was that adsorption of CWA simulant (DMMP) was significantly reduced by pre-treatment of the adsorbents with humid air. In the case of PDMS-coated silica, influence of humidity for CWA simulant adsorption was less pronounced due to the hydrophobic nature of PDMS-coating. We propose that PDMS-coated silica can be of potential importance as adsorbent of CWAs for their pre-concentration, which can facilitate detection of these CWAs.

  4. Strategic Defense Initiative Overview

    National Research Council Canada - National Science Library

    1990-01-01

    ... to Third World and other nations. I will then discuss the scope of the SDI effort, the evolving strategic defense system architectures and theater defense, our compliancy with the ABM Treaty, technology spinoffs resulting from SDI...

  5. Nanostructured Metal Oxides for Stoichiometric Degradation of Chemical Warfare Agents

    Czech Academy of Sciences Publication Activity Database

    Štengl, Václav; Henych, Jiří; Janos, P.; Skoumal, M.

    2016-01-01

    Roč. 236, č. 2016 (2016), s. 239-258 ISSN 0179-5953 R&D Projects: GA ČR(CZ) GAP106/12/1116 Institutional support: RVO:61388980 Keywords : chemical warfare agent * metal nanoparticle * unique surface- chemistry * mesoporous manganese oxide Subject RIV: CA - Inorganic Chemistry Impact factor: 3.930, year: 2016

  6. The Role of Civil Affairs in Unconventional Warfare

    Science.gov (United States)

    2012-12-01

    neighbor to the west, and secured the eastern border of Laos 32 Mao Tse -Tung, On Guerrilla Warfare...INTRODUCTION..........................................................................................19  B.  BRIEF HISTORY OF LAOS ...Royal Lao Army SCA Support to Civil Administration SCIRI Supreme Council of Iraq SG Shadow Government SOF Special Operations Forces TAI Targeted

  7. Management information systems for electronic warfare command and decision support

    CSIR Research Space (South Africa)

    Van Niekerk, B

    2015-04-01

    Full Text Available information to allow them to manage their own spectrum, to identify threats, and to deny adversaries’ use of the spectrum. In this paper, the concepts of integrated electronic warfare and spectrum battle management are introduced, and the relevant information...

  8. Manoeuvre warfare analysis of South Africa's 1914-1915 German ...

    African Journals Online (AJOL)

    The study reported in this article explored the nexus between military theory and history. Military theory attempts to quantify, qualify and illuminate the often unpredictable phenomenon of war. The article consists of two parts: the theory of manoeuvre warfare and the history of the 1914-1915 South African campaign in ...

  9. blitzkrieg to desert storm: the evolution of operational warfare

    African Journals Online (AJOL)

    a_nabb

    disease of stalemates infecting militaries before the Second World War. The invasion did not change the world; instead, it brought about an increased awareness of the importance of the operational level of war, a dimension of warfare previously neglected. The German operational effectiveness represented an evolution ...

  10. A identification system for chemical warfare agents with PGNAA method

    International Nuclear Information System (INIS)

    Wang Bairong; Yin Guanghua; Yang Zhongping

    2006-01-01

    The principle and the experimental commanding of Chemical warfare Agents Identification with PGNAA method are discussed in this paper. The choosing of Detector, neutron source and the data processing method are detailed. Finally, a set of experimental instruments composed of Cf-232 and BGO detector is developed based on the theory discussed above. (authors)

  11. Identification system for chemical warfare agents with PGNAA method

    International Nuclear Information System (INIS)

    Wang Bairong; Yin Guanghua; Yang Zhongpin

    2007-01-01

    The principle and the experimental commanding of Chemical warfare Agents Identification with PGNAA method are discussed in this paper. The choosing of detector, neutron source and the data processing method are detailed. Finally, a set of experimental instruments composed of Cf-232 and BGO detector is developed based on this theory discussed above. (authors)

  12. Biomonitoring of exposure to chemical warfare agents: A review

    NARCIS (Netherlands)

    Noort, D.; Benschop, H.P.; Black, R.M.

    2002-01-01

    In this report an overview of the methods currently available for detection of exposure to a number of chemical warfare agents (CWA), i.e., sulfur mustard, lewisite and nerve agents, is presented. Such methods can be applied for various purposes, e.g., diagnosis and dosimetry of exposure of

  13. Researchers study decontamination of chemical, biological warfare agents

    OpenAIRE

    Trulove, Susan

    2007-01-01

    The U.S. Army Research Office has awarded Virginia Tech a $680,000 grant over two years to build an instrument that can be used to study the chemistry of gases that will decompose both chemical and biological warfare agents on surfaces.

  14. Recent canadian experience in chemical warfare agent destruction. An overview

    Energy Technology Data Exchange (ETDEWEB)

    McAndless, J.M.

    1995-09-01

    A Canadian chemical warfare agent destruction project (Swiftsure) was recently completed in which stockpiles of aged mustard, lewisite, nerve agents and contaminated scrap metal were incinerated or chemically neutralized in a safe, environmentally-responsible manner. The project scope, destruction technologies, environmental monitoring and public consultation programs are described.

  15. Recognizing Plant Defense Priming

    NARCIS (Netherlands)

    Martinez-Medina, Ainhoa; Flors, Victor; Heil, Martin; Mauch-Mani, Brigitte; Pieterse, Corné M J|info:eu-repo/dai/nl/113115113; Pozo, Maria J; Ton, Jurriaan; van Dam, Nicole M; Conrath, Uwe

    2016-01-01

    Defense priming conditions diverse plant species for the superinduction of defense, often resulting in enhanced pest and disease resistance and abiotic stress tolerance. Here, we propose a guideline that might assist the plant research community in a consistent assessment of defense priming in

  16. Recognizing Plant Defense Priming.

    Science.gov (United States)

    Martinez-Medina, Ainhoa; Flors, Victor; Heil, Martin; Mauch-Mani, Brigitte; Pieterse, Corné M J; Pozo, Maria J; Ton, Jurriaan; van Dam, Nicole M; Conrath, Uwe

    2016-10-01

    Defense priming conditions diverse plant species for the superinduction of defense, often resulting in enhanced pest and disease resistance and abiotic stress tolerance. Here, we propose a guideline that might assist the plant research community in a consistent assessment of defense priming in plants. Copyright © 2016 Elsevier Ltd. All rights reserved.

  17. Recognizing plant defense priming

    NARCIS (Netherlands)

    Martinez-Medina, A.; Flors, V.; Heil, M.; Mauch-Mani, B.; Pieterse, C.M.J.; Pozo, M.J.; Ton, J.; Van Dam, N.M.; Conrath, U.

    2016-01-01

    Defense priming conditions diverse plant species for the superinduction of defense, often resulting in enhanced pest and disease resistance and abiotic stress tolerance. Here, we propose a guideline that might assist the plant research community in a consistent assessment of defense priming in

  18. Fort Laurdale Branch, Naval Surface Warfare Center

    National Research Council Canada - National Science Library

    1998-01-01

    ...) facility located on the Eastern Seaboard. Here, NSWC and other research and development activities conduct full-scale trials of air, surface, and underwater weapon systems under a variety of oceanographic conditions...

  19. Integrating Defense, Diplomacy, and Development (3 D) in the Naval Special Warfare Operator

    Science.gov (United States)

    2010-12-01

    usually filling the executive positions, is equivalent to different roles of the players of a sports team and their coaches. The operators are the...them on what SOF resources can be provided to a country team’s counterterrorism campaign plan. 1. The Operator With Al Qaeda developing franchise

  20. The 2006 Lebanon Campaign and the Future of Warfare: Implications for Army and Defense Policy

    National Research Council Canada - National Science Library

    Biddle, Stephen; Friedman, Jeffrey A

    2008-01-01

    .... Stephen Biddle of the Council on Foreign Relations and Mr. Jeffrey Friedman, Harvard Kennedy School of Government, seeks to inform this debate by examining in detail Hezbollah's conduct of the 2006 campaign...

  1. From Successful Defense to Problematic Offense: The Devolution of Unconventional Warfare

    Science.gov (United States)

    2016-12-01

    evaluation as to whether or not they deserved to graduate. The Master Sergeant then began an impassioned speech about why Robin Sage was so important...wanted freedom . The Master Sergeant looked towards the Special Forces crest painted on the wall of the auditorium, emblazoned with the unit’s motto...numerous books and several films .”10 However, today’s version of UW differs significantly from what was expected during World War II. The

  2. NATO RESILIENCE STRATEGY TOWARDS RUSSIAN HYBRID WARFARE

    Directory of Open Access Journals (Sweden)

    Liliana Filip

    2017-11-01

    Full Text Available Faced with the greatest security challenges of this generation, the Nord Atlantic Alliance is currently implementing the most significant strategy for strengthening its collective defense capabilities since the end of the Cold War. While the public attention has focused on NATO’s military adaptation, the concerted efforts to strengthen the Alliance’s ability to withstand and recover from a military attack, have so far been less visible. However, this is changing. At the 2016 Alliance high level meeting in Warsaw, NATO leaders agreed on an unprecedented commitment to “increase resilience”. The 28 Allies work urgently to put this commitment into practice. But how to understand this NATO resilience?

  3. Cultural Competence and the Operational Commander: Moving Beyond Cultural Awareness into Culture-Centric Warfare

    National Research Council Canada - National Science Library

    Karcanes, James A

    2007-01-01

    .... Understanding the different levels of cultural awareness -- cultural consideration, cultural understanding, and cultural competence -- will help usher in a new focus on culture-centric warfare...

  4. Mass Spectrometric Determination of Chemical Warfare Agents in Indoor Sample Media Typically Collected During Forensic Investigations

    National Research Council Canada - National Science Library

    D'Agostino, P. A; Hancock, J. R; Chenier, C. L

    2005-01-01

    .... DRDC Suffield, in collaboration with the Royal Canadian Mounted Police, identified a need for analytical methods for chemical warfare agent identification in media, including flooring, wall surfaces...

  5. Redefining Hybrid Warfare: Russia's Non-linear War against the West

    Directory of Open Access Journals (Sweden)

    Tad Schnaufer

    2017-03-01

    Full Text Available The term hybrid warfare fails to properly describe Russian operations in Ukraine and elsewhere. Russia has undertaken unconventional techniques to build its influence and test the boundaries of a shaken international system. Notably, Russia’s actions in Ukraine display an evolved style of warfare that goes beyond its initial label of hybrid warfare. The term non-linear war (NLW will be defined in this article to encompass Russia’s actions and allow policymakers the correct framework to discuss and respond to Russia. NLW plays to the advantage of countries like Russia and constitute the future of warfare.

  6. Technological advancements for the detection of and protection against biological and chemical warfare agents.

    Science.gov (United States)

    Eubanks, Lisa M; Dickerson, Tobin J; Janda, Kim D

    2007-03-01

    There is a growing need for technological advancements to combat agents of chemical and biological warfare, particularly in the context of the deliberate use of a chemical and/or biological warfare agent by a terrorist organization. In this tutorial review, we describe methods that have been developed both for the specific detection of biological and chemical warfare agents in a field setting, as well as potential therapeutic approaches for treating exposure to these toxic species. In particular, nerve agents are described as a typical chemical warfare agent, and the two potent biothreat agents, anthrax and botulinum neurotoxin, are used as illustrative examples of potent weapons for which countermeasures are urgently needed.

  7. Development of Bicarbonate-Activated Peroxide as a Chemical and Biological Warfare Agent Decontaminant

    National Research Council Canada - National Science Library

    Richardson, David E

    2006-01-01

    ...) and other chemistry for the decontamination of chemical and biological warfare agents. The mechanism of formation of the active oxidant, peroxymonocarbonate, has been investigated in detail. New surfoxidants...

  8. Decontamination and Detoxification of Toxic Chemical Warfare Agents Using Polyurethane Sponges

    National Research Council Canada - National Science Library

    Gordon, Richard K; Gunduz, Alper T; Askins, LaTawnya Y; Strating, Simon J; Doctor, Bhupendra P; Clarkson, Edward D; Mitchelree, Larry W; Lukey, Brian; Railer, Roy; Schulz, Susan

    2003-01-01

    .... Another serious problem that may be encountered while caring for personnel contaminated with organophosphorus chemical warfare nerve agents is the possibility that there will be cross-contamination...

  9. Water-driven micromotors for rapid photocatalytic degradation of biological and chemical warfare agents.

    Science.gov (United States)

    Li, Jinxing; Singh, Virendra V; Sattayasamitsathit, Sirilak; Orozco, Jahir; Kaufmann, Kevin; Dong, Renfeng; Gao, Wei; Jurado-Sanchez, Beatriz; Fedorak, Yuri; Wang, Joseph

    2014-11-25

    Threats of chemical and biological warfare agents (CBWA) represent a serious global concern and require rapid and efficient neutralization methods. We present a highly effective micromotor strategy for photocatalytic degradation of CBWA based on light-activated TiO2/Au/Mg microspheres that propel autonomously in natural water and obviate the need for external fuel, decontaminating reagent, or mechanical agitation. The activated TiO2/Au/Mg micromotors generate highly reactive oxygen species responsible for the efficient destruction of the cell membranes of the anthrax simulant Bacillus globigii spore, as well as rapid and complete in situ mineralization of the highly persistent organophosphate nerve agents into nonharmful products. The water-driven propulsion of the TiO2/Au/Mg micromotors facilitates efficient fluid transport and dispersion of the photogenerated reactive oxidative species and their interaction with the CBWA. Coupling of the photocatalytic surface of the micromotors and their autonomous water-driven propulsion thus leads to a reagent-free operation which holds a considerable promise for diverse "green" defense and environmental applications.

  10. Techniques for Combined Arms for Air Defense

    Science.gov (United States)

    2016-07-29

    4-6 Figure 4-3. Football Field Technique: Jet aiming points...4-7 Figure 4-4. Football Field Technique: Helicopter aiming points............................................. 4-8 Figure 4-5. Firing positions...destroy it.  HOLD FIRE is an emergency fire control order to stop engagement of a specific target. Missiles already in flight must be prevented from

  11. Stuxnet and Cyber-Warfare (2/2)

    CERN Multimedia

    CERN. Geneva

    2016-01-01

    The first part of the lecture is devoted to the description of the Stuxnet worm, the first cyber-weapon whose existence has been made public, discovered in 2010 and targeting a specific industrial control system; the worm is responsible for the damaging of many centrifuges at an uranium enrichment facility, with the goal of sabotaging Iran's nuclear program. In the second part, the main features of cyber-warfare in conflict and pre-conflict activities will be discussed and compared to the conventional warfare domains, with also a general view at the international political debate on this topic.   Check the http://pugwash.org web site, an organisation that seeks a world free of nuclear weapons and other weapons of mass destruction. The lecturer invites comments via email to Gian.Piero.Siroli@cern.ch NB! All Academic Training lectures are recorded and are publicly available. There is no live webcast.

  12. Stuxnet and Cyber-Warfare (1/2)

    CERN Multimedia

    CERN. Geneva

    2016-01-01

    The first part of the lecture is devoted to the description of the Stuxnet worm, the first cyber-weapon whose existence has been made public, discovered in 2010 and targeting a specific industrial control system; the worm is responsible for the damaging of many centrifuges at an uranium enrichment facility, with the goal of sabotaging Iran's nuclear program. In the second part, the main features of cyber-warfare in conflict and pre-conflict activities will be discussed and compared to the conventional warfare domains, with also a general view at the international political debate on this topic. Check the http://pugwash.org web site, an organisation that seeks a world free of nuclear weapons and other weapons of mass destruction.   NB! All Academic Training lectures are recorded and are publicly available. There is no live webcast.

  13. Cutaneous reactions in nuclear, biological and chemical warfare

    Directory of Open Access Journals (Sweden)

    Arora Sandeep

    2005-03-01

    Full Text Available Nuclear, biological and chemical warfare have in recent times been responsible for an increasing number of otherwise rare dermatoses. Many nations are now maintaining overt and clandestine stockpiles of such arsenal. With increasing terrorist threats, these agents of mass destruction pose a risk to the civilian population. Nuclear and chemical attacks manifest immediately while biological attacks manifest later. Chemical and biological attacks pose a significant risk to the attending medical personnel. The large scale of anticipated casualties in the event of such an occurrence would need the expertise of all physicians, including dermatologists, both military and civilian. Dermatologists are uniquely qualified in this respect. This article aims at presenting a review of the cutaneous manifestations in nuclear, chemical and biological warfare and their management.

  14. Identification of chemical warfare agent with radiological measurements

    International Nuclear Information System (INIS)

    Liu Boxue; Li Yun; Ai Xianyun

    2000-01-01

    There are three non-destructive radiological methods for identification of warfare agents and TNT. Their principles and problems related were discussed. Portable isotopic neutron spectroscopy is based on the assay of key elemental composition (such as Cl, P, H, As, S, N) in chemical agents by neutron induced prompt gamma ray analysis. Hydrogen concentration measurement by means of using thermal neutron can be employed to identify chemical warfare agents and TNT that contains different hydrogen fraction. The calibration curves of thermal neutron count rate against hydrogen concentration were measured. X ray imagination system can be used to determine the internal structure of chemical bombs, there by to identify them. The radiological methods are very useful for identification of old chemical weapons abandoned by Japan Army during World War 2

  15. Dynamic defense workshop :

    Energy Technology Data Exchange (ETDEWEB)

    Crosby, Sean Michael; Doak, Justin E.; Haas, Jason Juedes.; Helinski, Ryan; Lamb, Christopher C.

    2013-02-01

    On September 5th and 6th, 2012, the Dynamic Defense Workshop: From Research to Practice brought together researchers from academia, industry, and Sandia with the goals of increasing collaboration between Sandia National Laboratories and external organizations, de ning and un- derstanding dynamic, or moving target, defense concepts and directions, and gaining a greater understanding of the state of the art for dynamic defense. Through the workshop, we broadened and re ned our de nition and understanding, identi ed new approaches to inherent challenges, and de ned principles of dynamic defense. Half of the workshop was devoted to presentations of current state-of-the-art work. Presentation topics included areas such as the failure of current defenses, threats, techniques, goals of dynamic defense, theory, foundations of dynamic defense, future directions and open research questions related to dynamic defense. The remainder of the workshop was discussion, which was broken down into sessions on de ning challenges, applications to host or mobile environments, applications to enterprise network environments, exploring research and operational taxonomies, and determining how to apply scienti c rigor to and investigating the eld of dynamic defense.

  16. The availability of unmanned air vehicles: a post-case study

    NARCIS (Netherlands)

    Smith, M.A.J.; Dekker, R.; Kos, J.; Hontelez, J.A.M.

    2001-01-01

    An Unmanned Air Vehicle (UAV) is an unmanned, remotely controlled, small air vehicle. It has an important role in antisurface warfare. This implies over-the-horizon detection, classification, targeting and battle damage assessment. To perform these tasks several UAVs are needed to assist or

  17. Just War and Postmodern Warfare: A German Case Study

    Science.gov (United States)

    2015-04-01

    warfare construct, Germany is shaping a military concept based on recent conflicts and unfettered by biases of conventional strategies, organizations...remain sovereign while subconsciously evolving toward liberal democratic ideas. In respecting each country’s political sensitivities, Germany’s...before exhausting all diplomatic, economic and information instruments. Whereas the term AU/ACSC/PINSON/AY15 13 “interests” may bias the United

  18. Conflict Without Casualties: Non-Lethal Weapons in Irregular Warfare

    Science.gov (United States)

    2007-09-01

    the body,” and the Geneva Protocol of 1925, bans the use of chemical and biological weapons .11 On 8 April 1975, President Ford issued Executive...E Funding – PE 63851M) (accessed 15 December 2006). The American Journal of Bioethics . “Medical Ethics and Non-Lethal Weapons .” Bioethics.net...CASUALTIES: NON-LETHAL WEAPONS IN IRREGULAR WARFARE by Richard L. Scott September 2007 Thesis Advisor: Robert McNab Second Reader

  19. Nodes and Codes: The Reality of Cyber Warfare

    Science.gov (United States)

    2012-05-17

    respectively. The avionics in Boeing’s 787 Dreamliner require approximately 6.5 million lines of code while the current S-Class Mercedes Benz requires over 20...leaders (demonstrated through outdated policy, theory, and doctrine) and the reality of warfare in 1914 (dictated by innovation, technology , and...or the guidelines to military action codified in doctrine? How are states using the latest technological innovations as violent instruments of

  20. Attacking the infrastructure: exploring potential uses of offensive information warfare

    OpenAIRE

    Elam, Donald Emmett.

    1996-01-01

    The world has entered the Third Wave; it has entered the Information Age. One of the fundamentals of this paradigm shift is the fact that information is power. The side that controls information more effectively will be victorious. Thus, countries and militaries must change their mentality in order to survive. A new form of conflict, Information Warfare, has been born. This new discipline is large, dynamic, and complex. The need exists for education among military officers and other concerned...

  1. Built to Outlast: Operational Approaches to Hybrid Warfare

    Science.gov (United States)

    2012-05-17

    29Robert T. Ames, Sun Tzu: The Art of War (New York: Ballantine Books, 1993), 78-80; Mao Tse -Tung, On Guerrilla Warfare, trans. Samuel B. Griffith...Chicago: University of Illinois Press, 1961), 25, 42.The works of Sun Tzu and Mao Tse -Tung both illustrate aspects of this concept. In a work...toreador’s cape, not the toreador himself. - Norman B. Hannah, The Key to Failure: Laos and the Vietnam War114 Against the backdrop of the Cold

  2. Warfare, genocide, and ethnic conflict: a Darwinian approach

    OpenAIRE

    Dimijian, Gregory G.

    2010-01-01

    As the 21st century dawns, I reflect on the history of humankind with growing concern about the need to understand the underlying biological and cultural roots of ethnic conflict and warfare. In the many studies of human conflict, innate biological predispositions have been neglected. This article is the third part of a series of seminars for medical residents at the University of Texas Southwestern Medical School at Dallas (see http://adarwinstudygroup.org/). The series starts with in-depth ...

  3. Annihilation Prediction for Lanchester-Type Models of Modern Warfare

    OpenAIRE

    Brown, G.G.; Taylor, J.

    1983-01-01

    Operations Research, 31, p.752. This paper introduces important new functions for analytic solution of Launch-ester-type equations of modern warfare for combat between two homogeneous forces modeled by power attrtition-rate coefficients with "no offset". Tabulations of these Lanchester-Clifford-Schlatii (or LCS) functions allow one to study this particular variable-coefficient model almost as easily and thoroughly as Lanchester's classic constant-coefficient one. LCS functions allow one ...

  4. Hungarys Alternative to Counter Hybrid Warfare - Small States Weaponized Citizenry

    Science.gov (United States)

    2017-06-09

    said “Resilience as a terminological and operational factor, will become the newest ‘ brand ’ and communication name for the Alliance.”70 He also...audiences to influence their emotions , motives, objective reasoning, and ultimately the behavior of foreign governments, organizations, groups, and...so-called influence warfare. His study pinpointed the importance of emotion over rational facts in messages. Second, Edward Lucas and Ben Nimmo on

  5. Cyber warfare:terms, issues, laws and controversies

    OpenAIRE

    Seviş, Kamile Nur; Şeker, Ensar

    2016-01-01

    Recent years have shown us the importance of cybersecurity. Especially, when the matter is national security, it is even more essential and crucial. Increasing cyber attacks, especially between countries in governmental level, created a new term cyber warfare. Creating some rules and regulations for this kind of war is necessary therefore international justice systems are working on it continuously. In this paper, we mentioned fundamental terms of cyber...

  6. Russian and Chinese Information Warfare: Theory and Practice

    Science.gov (United States)

    2004-06-01

    Integral neurolinguistic programming •Placing essential programs into the conscious or sub- conscious mind •Subconscious suggestions that modify human...Generators of special rays •Optical systems • Neurolinguistic programming •Computer psychotechnology •The mass media •Audiovisual effects •Special effects...Information Warfare: Theory and Practice 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER 6. AUTHOR(S) 5d. PROJECT NUMBER 5e

  7. 32 CFR 245.17 - U.S. civil and military air traffic control facilities.

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 2 2010-07-01 2010-07-01 false U.S. civil and military air traffic control facilities. 245.17 Section 245.17 National Defense Department of Defense (Continued) OFFICE OF THE SECRETARY OF DEFENSE (CONTINUED) MISCELLANEOUS PLAN FOR THE EMERGENCY SECURITY CONTROL OF AIR TRAFFIC (ESCAT) Procedures for Implementation of ESCAT §...

  8. Special Forces and the Art of Influence: A Grassroots Approach to Psychological Operations in an Unconventional Warfare Environment

    National Research Council Canada - National Science Library

    Thomas, II, Joel W

    2006-01-01

    This thesis researches the intricacies of the art of influence in an unconventional warfare environment to develop a model of influence that can be utilized by Special Forces conducting unconventional warfare...

  9. Chemical warfare agents identification by thermal neutron detection

    International Nuclear Information System (INIS)

    Liu Boxue; Ai Xianyun; Tan Daoyuan; Zhang Dianqin

    2000-01-01

    The hydrogen concentration determination by thermal neutron detection is a non-destructive, fast and effective method to identify chemical warfare agents and TNT that contain different hydrogen fraction. When an isotropic neutron source is used to irradiate chemical ammunition, hydrogen atoms of the agent inside shell act as a moderator and slow down neutrons. The number of induced thermal neutrons depends mainly upon hydrogen content of the agent. Therefore measurement of thermal neutron influence can be used to determine hydrogen atom concentration, thereby to determine the chemical warfare agents. Under a certain geometry three calibration curves of count rate against hydrogen concentration were measured. According to the calibration curves, response of a chemical agent or TNT could be calculated. Differences of count rate among chemical agents and TNT for each kind of shells is greater than five times of standard deviations of count rate for any agent, so chemical agents or TNT could be identified correctly. Meanwhile, blast tube or liquid level of chemical warfare agent could affect the response of thermal neutron count rate, and thereby the result of identification. (author)

  10. Quality of Life in Iranian Chemical Warfare Veteran's.

    Science.gov (United States)

    Ebadi, Abbas; Moradian, Tayeb; Mollahadi, Mohsen; Saeed, Yaser; Refahi, Ali Akbar

    2014-05-01

    Mustard gas has different effects on different body systems such as respiratory tract, blood, gastrointestinal, skin, eye, endocrine and peripheral nervous system. The purpose of this study was to determine the quality of life in chemical warfare veterans due to sulfur mustard exposure. In a cross-sectional and analytic study, 242 patients who had a chemical injury during the Iran-Iraq war (1980-1983) and their lung damage was proven were investigated in our study. The quality of life was measured in these patients using an extensively validated Iranian version of SF-36. The mean age of veterans was 44.12 ± 4.9 ranging from 22 to 62 years. Our results showed that chemical warfare had a decreased quality of life in all subscales of the SF-36. The lowest scores in SF-36 subscales were related to role physical and general health. The data also showed a significant relationship between the number of organs involved and the quality of life in these patients (P chemical warfare survivors suffering from late complications have a low health related quality of life.

  11. Decontamination of Water Containing Radiological Warfare Agents

    Science.gov (United States)

    1975-03-01

    soil or air, dissolved minerals in water, or mnaterials of construction of thie’ hob n its•llf. So--called "rigged boiihbs" or "salted bo nits...Carbion 2-10 In regard to tire diatomite filter, the coagulated water passes throtugh the filter cake to the interior of each filter clenrnn. Thre filtrale...data indicate the following: a. Nuclear bomb debris from a silicious soil , being essentially insoluble in water, is easily removed by coagulation and

  12. 32 CFR 631.15 - Air Force policy.

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 4 2010-07-01 2010-07-01 true Air Force policy. 631.15 Section 631.15 National Defense Department of Defense (Continued) DEPARTMENT OF THE ARMY (CONTINUED) LAW ENFORCEMENT AND CRIMINAL...-Installation Operations (Military Patrols and Investigative Activities) and Policy § 631.15 Air Force policy...

  13. Computer network defense through radial wave functions

    Science.gov (United States)

    Malloy, Ian J.

    The purpose of this research is to synthesize basic and fundamental findings in quantum computing, as applied to the attack and defense of conventional computer networks. The concept focuses on uses of radio waves as a shield for, and attack against traditional computers. A logic bomb is analogous to a landmine in a computer network, and if one was to implement it as non-trivial mitigation, it will aid computer network defense. As has been seen in kinetic warfare, the use of landmines has been devastating to geopolitical regions in that they are severely difficult for a civilian to avoid triggering given the unknown position of a landmine. Thus, the importance of understanding a logic bomb is relevant and has corollaries to quantum mechanics as well. The research synthesizes quantum logic phase shifts in certain respects using the Dynamic Data Exchange protocol in software written for this work, as well as a C-NOT gate applied to a virtual quantum circuit environment by implementing a Quantum Fourier Transform. The research focus applies the principles of coherence and entanglement from quantum physics, the concept of expert systems in artificial intelligence, principles of prime number based cryptography with trapdoor functions, and modeling radio wave propagation against an event from unknown parameters. This comes as a program relying on the artificial intelligence concept of an expert system in conjunction with trigger events for a trapdoor function relying on infinite recursion, as well as system mechanics for elliptic curve cryptography along orbital angular momenta. Here trapdoor both denotes the form of cipher, as well as the implied relationship to logic bombs.

  14. Defense Mechanisms: A Bibliography.

    Science.gov (United States)

    Pedrini, D. T.; Pedrini, Bonnie C.

    This bibliography includes studies of defense mechanisms, in general, and studies of multiple mechanisms. Defense mechanisms, briefly and simply defined, are the unconscious ego defendants against unpleasure, threat, or anxiety. Sigmund Freud deserves the clinical credit for studying many mechanisms and introducing them in professional literature.…

  15. Defense Business Transformation

    Science.gov (United States)

    2009-12-01

    Defense Business Transformation by Jacques S. Gansler and William Lucyshyn The Center for Technology and National...REPORT TYPE 3. DATES COVERED 00-00-2009 to 00-00-2009 4. TITLE AND SUBTITLE Defense Business Transformation 5a. CONTRACT NUMBER 5b. GRANT NUMBER...vii Part One: DoD Business Transformation

  16. Unfolding Green Defense

    DEFF Research Database (Denmark)

    Larsen, Kristian Knus

    2015-01-01

    In recent years, many states have developed and implemented green solutions for defense. Building on these initiatives NATO formulated the NATO Green Defence Framework in 2014. The framework provides a broad basis for cooperation within the Alliance on green solutions for defense. This report aims...... to inform and support the further development of green solutions by unfolding how green technologies and green strategies have been developed and used to handle current security challenges. The report, initially, focuses on the security challenges that are being linked to green defense, namely fuel...... consumption in military operations, defense expenditure, energy security, and global climate change. The report then proceeds to introduce the NATO Green Defence Framework before exploring specific current uses of green technologies and green strategies for defense. The report concludes that a number...

  17. Statistical Analysis of Warfare: Identification of Winning Factors with a Focus on Irregular Warfare

    Science.gov (United States)

    2015-09-01

    Defense HERO Historical Evaluation and Research Organization IDPs Internally Displaced Persons IFR Initial Force Ratio INITA Relative Imitative...armies started combating non-state, widely dispersed groups. Although this change appears to be quite simple, it has had a deep impact on military...1789–1961: A Study of the Impact of the French, Industrial, and Russian Revolutions on War and its Conduct (Boston, MA: Da Capo Press, 1992). 10 Ibid

  18. The Utility of Freedom: A Principal-Agent Model for Unconventional Warfare

    Science.gov (United States)

    2011-06-01

    Lanchester Model of Guerrilla Warfare,‖ Operations Research 10, no. 6 (December 1962): 818–827; William A. Niskanen, ―Review: The Economics of Insurgency...http://galenet.galegroup.com/servlet/DDRS?locID=navalps. Deitchman, S. J. ―A Lanchester Model of Guerrilla Warfare.‖ Operations Research 10, no

  19. Understanding the elementary considerations in a network warfare environment: an introductory framework

    CSIR Research Space (South Africa)

    Veerasamy, N

    2008-07-01

    Full Text Available . It seeks to offer a better introductory understanding to the field of network warfare. This paper addresses the requirements for a network warfare capability and will look at the high-level approach, constraints, focus areas, levels, techniques...

  20. Metal organic frameworks for the catalytic detoxification of chemical warfare nerve agents

    Science.gov (United States)

    Hupp, Joseph T.; Farha, Omar K.; Katz, Michael J.; Mondloch, Joseph E.

    2017-04-18

    A method of using a metal organic framework (MOF) comprising a metal ion and an at least bidendate organic ligand to catalytically detoxify chemical warfare nerve agents including exposing the metal-organic-framework (MOF) to the chemical warfare nerve agent and catalytically decomposing the nerve agent with the MOF.

  1. Study on the identification method of chemical warfare agents with spectroscopy of neutron induced γ rays

    International Nuclear Information System (INIS)

    Liu Boxue; Li Yun; Li Xiangbao

    1996-01-01

    The paper briefly describes some non-destructive verification technologies of chemical warfare agents in-site, and some application of neutron induced gamma ray analysis, such as multi-elements analysis of coal, hidden explosive detection and identification of chemical agents. It also describes some problems in developing the portable isotopic neutron spectroscopy for non-destructive evaluation of chemical warfare agents

  2. Antidotes and treatments for chemical warfare/terrorism agents: an evidence-based review.

    Science.gov (United States)

    Rodgers, G C; Condurache, C T

    2010-09-01

    This article reviews the evidence supporting the efficacy of antidotes used or recommended for the potential chemical warfare agents of most concern. Chemical warfare agents considered include cyanide, vesicants, pulmonary irritants such as chlorine and phosgene, and nerve agents. The strength of evidence for most antidotes is weak, highlighting the need for additional research in this area.

  3. Status of dental health in chemical warfare victims: The case of Isfahan, Iran

    Directory of Open Access Journals (Sweden)

    Ahmad Mottaghi

    2012-01-01

    Conclusion: Chemical warfare victims have relatively poor dental/oral health. Chemical injury might cause a dysfunction in saliva secretion, with decrease in saliva secretion increasing the risk for tooth decay and periodontal disorders. Further research is required to find out the exact underlying mechanisms and the factors associated with poor dental/oral health in chemical warfare victims.

  4. 75 FR 6642 - Notice of Proposed Information Collection; Naval Special Warfare Recruiting Directorate

    Science.gov (United States)

    2010-02-10

    ... Information Collection; Naval Special Warfare Recruiting Directorate AGENCY: Department of the Navy, DoD. ACTION: Notice. SUMMARY: The Naval Special Warfare (NSW) Recruiting Directorate announces the submission... any of the following methods: Federal eRulemaking Portal: http://www.regulations.gov . Follow the...

  5. Defense.gov Special Report: 2015 Fiscal Budget

    Science.gov (United States)

    Department of Defense Submit Search FY 2015 Fiscal Budget News Stories Dempsey Calls for Budget Increase increase its budget, the chairman of the Joint Chiefs of Staff said. Story James: Air Force Grapples with Congress to Fund Readiness The Air Force fiscal 2015 budget request is shrinking because of Congressional

  6. Advanced thermal management technologies for defense electronics

    Science.gov (United States)

    Bloschock, Kristen P.; Bar-Cohen, Avram

    2012-05-01

    Thermal management technology plays a key role in the continuing miniaturization, performance improvements, and higher reliability of electronic systems. For the past decade, and particularly, the past 4 years, the Defense Advanced Research Projects Agency (DARPA) has aggressively pursued the application of micro- and nano-technology to reduce or remove thermal constraints on the performance of defense electronic systems. The DARPA Thermal Management Technologies (TMT) portfolio is comprised of five technical thrust areas: Thermal Ground Plane (TGP), Microtechnologies for Air-Cooled Exchangers (MACE), NanoThermal Interfaces (NTI), Active Cooling Modules (ACM), and Near Junction Thermal Transport (NJTT). An overview of the TMT program will be presented with emphasis on the goals and status of these efforts relative to the current State-of-the-Art. The presentation will close with future challenges and opportunities in the thermal management of defense electronics.

  7. LESSONS FROM THE FRONT: A CASE STUDY OF RUSSIAN CYBER WARFARE

    Science.gov (United States)

    2015-12-01

    how DDoS was used during the Sony data breach in 2011.60 The idea behind this tactic is that while the defensive efforts are being focused on...online pilfering of intellectual property (IP) from the US government and corporate America constitutes an average loss of over $100 billion dollars...Analysis and Assessment, The MITRE Corporation , Bedford, MA [or M.A.], November 2013, 18. 67 Air Force, “Intelligence Officer Career Field

  8. Department of Defense perspective

    International Nuclear Information System (INIS)

    Devine, R.

    1985-01-01

    This paper examines radiation instrumentation from the Department of Defense perspective. Radiation survey instruments and calibration, or RADIAC, as it is called in the services, while administratively falling under the Assistant Secretary of Defense for Atomic Energy, has generally been managed at a lower level. The Naval Electronics Systems Command and Army Signal Corp are the two principles in the Department of Defense for RADIAC. The actions of the services are coordinated through the tri-service RADIAC working group, which meets about every year and a half. Several points from this organization are highlighted

  9. 75 FR 32750 - US Air Force Scientific Advisory Board Notice of Meeting

    Science.gov (United States)

    2010-06-09

    ... DEPARTMENT OF DEFENSE Department of the Air Force US Air Force Scientific Advisory Board Notice of Meeting AGENCY: Department of the Air Force, US Air Force Scientific Advisory Board. ACTION: Meeting....150, the Department of Defense announces that the United States Air Force Scientific Advisory Board...

  10. 76 FR 18537 - U.S. Air Force Scientific Advisory Board; Notice of Meeting

    Science.gov (United States)

    2011-04-04

    ... DEPARTMENT OF DEFENSE Department of the Air Force U.S. Air Force Scientific Advisory Board; Notice of Meeting AGENCY: Department of the Air Force, US Air Force Scientific Advisory Board. ACTION... 102-3.150, the Department of Defense announces that the United States Air Force Scientific Advisory...

  11. Review of defense display research programs

    Science.gov (United States)

    Tulis, Robert W.; Hopper, Darrel G.; Morton, David C.; Shashidhar, Ranganathan

    2001-09-01

    Display research has comprised a substantial portion of the defense investment in new technology for national security for the past 13 years. These investments have been made by the separate service departments and, especially, via several Defense Research Projects Agency (DARPA) programs, known collectively as the High Definition Systems (HDS) Program (which ended in 2001) and via the Office of the Secretary of Defense (OSD) Defense Production Act (DPA) Title III Program (efforts ended in 2000). Using input from the Army, Navy, and Air Force to focus research and identify insertion opportunities, DARPA and the Title III Program Office have made investments to develop the national technology base and manufacturing infrastructure necessary to meet the twin challenge of providing affordable displays in current systems and enabling the DoD strategy of winning future conflicts by getting more information to all participants during the battle. These completed DARPA and DPA research and infrastructure programs are reviewed. Service investments have been and are being made to transition display technology; examples are described. Display science and technology (S&T) visions are documented for each service to assist the identification of areas meriting consideration for future defense research.

  12. Cruise Missile Defense

    National Research Council Canada - National Science Library

    Hichkad, Ravi R; Bolkcom, Christopher

    2005-01-01

    Congress has expressed interest in cruise missile defense for years. Cruise missiles (CMs) are essentially unmanned attack aircraft -- vehicles composed of an airframe, propulsion system, guidance system, and weapons payload...

  13. Cruise Missile Defense

    National Research Council Canada - National Science Library

    Hichkad, Ravi R; Bolkcom, Christopher

    2004-01-01

    Congress has expressed interest in cruise missile defense for years. Cruise missiles (CMs) are essentially unmanned attack aircraft -- vehicles composed of an airframe, propulsion system, guidance system, and weapons payload...

  14. Defense Transportation; The Army

    National Research Council Canada - National Science Library

    1998-01-01

    .... The statement of managers in the conference report on the Department of Defense Appropriations Act, 1997, directed us to validate the results and savings achieved from this and any other personal property pilot program...

  15. Defense Primer: DOD Contractors

    Science.gov (United States)

    2017-02-10

    functions, from intelligence analysis or software development to landscaping or food service. Why does DOD use individual contractors? Going back to...that provide professional services, from research to management support. The bulk of contractors—more than 70%—provide products, and these include...10 U.S.C. Part IV: Service, Supply, and Procurement. CRS Products CRS In Focus IF10548, Defense Primer: U.S. Defense Industrial Base, by Daniel

  16. Ballistic Missile Defense

    OpenAIRE

    Mayer, Michael

    2011-01-01

    At the 2010 NATO summit in Lisbon, the alliance decided to move forward on the development of a territorial ballistic missile defense (BMD) system and explore avenues for cooperation with Russia in this endeavor. Substantial progress on BMD has been made over the past decade, but some questions remain regarding the ultimate strategic utility of such a system and whether its benefi ts outweigh the possible opportunity costs. Missile defense has been a point of contention between the US and its...

  17. Cybersecurity protecting critical infrastructures from cyber attack and cyber warfare

    CERN Document Server

    Johnson, Thomas A

    2015-01-01

    The World Economic Forum regards the threat of cyber attack as one of the top five global risks confronting nations of the world today. Cyber attacks are increasingly targeting the core functions of the economies in nations throughout the world. The threat to attack critical infrastructures, disrupt critical services, and induce a wide range of damage is becoming more difficult to defend against. Cybersecurity: Protecting Critical Infrastructures from Cyber Attack and Cyber Warfare examines the current cyber threat landscape and discusses the strategies being used by governments and corporatio

  18. Getting the Next War Right: Beyond Population-centric Warfare

    Science.gov (United States)

    2010-06-01

    respectively: Che Guevara and Mao Tse -tung. Che’s foco theory, as we have discussed, advocates mobilizing from the top. The armed challenger chooses an...example, Thomas A. Marks, “Guerrillas in the Mist: Hmong Resistance Continues in Laos ,” Combat and Survival 8, no. 5 (August 1996), 4–11. 12 Theory and...Mao Tse -tung, On Guerrilla Warfare, trans. and ed. Samuel B. Grif!th (Mineola, NY: Dover Publications, 2005). The book is available from a wide

  19. Environmental assessments of sea dumped chemical warfare agents

    DEFF Research Database (Denmark)

    Sanderson, Hans; Fauser, Patrik

    This is a report on the information gathered during work related to sea dumped chemical warfare agents. It mainly reviews the work conducted in relation to the installation of the two Nord Stream gas pipeline from 2008-2012. The focus was on the weight-of-evidence risk assessment of disturbed CWA...... residues in connection with the installation of the pipelines. Novel exposure and toxicity assessments are presented and the risk is assessed. The overall conclusion is that there is a negligible acute added CWA risk towards the fish community from the installation of the pipelines....

  20. Ultraviolet Raman scattering from persistent chemical warfare agents

    Science.gov (United States)

    Kullander, Fredrik; Wästerby, Pär.; Landström, Lars

    2016-05-01

    Laser induced Raman scattering at excitation wavelengths in the middle ultraviolet was examined using a pulsed tunable laser based spectrometer system. Droplets of chemical warfare agents, with a volume of 2 μl, were placed on a silicon surface and irradiated with sequences of laser pulses. The Raman scattering from V-series nerve agents, Tabun (GA) and Mustard gas (HD) was studied with the aim of finding the optimum parameters and the requirements for a detection system. A particular emphasis was put on V-agents that have been previously shown to yield relatively weak Raman scattering in this excitation band.

  1. Defense Coastal/Estuarine Research Program (DCERP)

    Science.gov (United States)

    2007-09-19

    activities, splash points and Landing Craft Air Cushion (LCAC) operations) and non-military Base activities (e.g., sewage treatment , storm water runoff and...We will measure the metabolism of benthic microalgae, the water column, eelgrass, and any dominant macroalgae by developing series of photosynthesis...activities (storm water control and sewage treatment ). Defense Coastal/Estuarine Research Program (DCERP) Research Plan DCERP Research Plan 32 September 19

  2. Low power unattended defense reactor

    International Nuclear Information System (INIS)

    Kirchner, W.L.; Meier, K.L.

    1984-01-01

    A small, low power, passive, nuclear reactor electric power supply has been designed for unattended defense applications. Through innovative utilization of existing proven technologies and components, a highly reliable, ''walk-away safe'' design has been obtained. Operating at a thermal power level of 200 kWt, the reactor uses low enrichment uranium fuel in a graphite block core to generate heat that is transferred through heat pipes to a thermoelectric (TE) converter. Waste heat is removed from the TEs by circulation of ambient air. Because such a power supply offers the promise of minimal operation and maintenance (OandM) costs as well as no fuel logistics, it is particularly attractive for remote, unattended applications such as the North Warning System

  3. Low power unattended defense reactor

    International Nuclear Information System (INIS)

    Kirchner, W.L.; Meier, K.L.

    1984-01-01

    A small, low power, passive, nuclear reactor electric power supply has been designed for unattended defense applications. Through innovative utilization of existing proven technologies and components, a highly reliable, walk-away safe design has been obtained. Operating at a thermal power level of 200 kWt, the reactor uses low enrichment uranium fuel in a graphite block core to generate heat that is transferred through heat pipes to a thermoelectric (TE) converter. Waste heat is removed from the TEs by circulation of ambient air. Because such a power supply offers the promise of minimal operation and maintenance (O and M) costs as well as no fuel logistics, it is particularly attractive for remote, unattended applications such as the North Warning System

  4. 76 FR 72391 - Defense Logistics Agency Revised Regulation 1000.22, Environmental Considerations in Defense...

    Science.gov (United States)

    2011-11-23

    ... DEPARTMENT OF DEFENSE Office of the Secretary [Docket ID DOD-2011-OS-0055] Defense Logistics Agency Revised Regulation 1000.22, Environmental Considerations in Defense Logistics Agency Actions AGENCY: Defense Logistics Agency, Department of Defense. ACTION: Revised Defense Logistics Agency...

  5. 75 FR 76423 - Defense Intelligence Agency National Defense Intelligence College Board of Visitors Closed Meeting

    Science.gov (United States)

    2010-12-08

    ... DEPARTMENT OF DEFENSE Office of the Secretary Defense Intelligence Agency National Defense Intelligence College Board of Visitors Closed Meeting AGENCY: National Defense Intelligence College, Defense Intelligence Agency, Department of Defense. ACTION: Notice of Closed Meeting. SUMMARY: Pursuant to the...

  6. 76 FR 28960 - Defense Intelligence Agency National Defense Intelligence College Board of Visitors Closed Meeting

    Science.gov (United States)

    2011-05-19

    ... DEPARTMENT OF DEFENSE Office of the Secretary Defense Intelligence Agency National Defense Intelligence College Board of Visitors Closed Meeting AGENCY: National Defense Intelligence College, Defense Intelligence Agency, Department of Defense. ACTION: Notice of Closed Meeting. SUMMARY: Pursuant to the...

  7. Cyber Professionals in the Military and Industry-Partnering in Defense of the Nation: A Conversation between Maj Gen Suzanne Vautrinot, Commander, Twenty-Fourth Air Force, and Mr. Charles Beard, Chief Information Officer, Science Applications International Corporation

    Science.gov (United States)

    2013-01-01

    what truly had to be protected and where we would establish trust. The results of that exercise materially changed our defense-in-depth strategy...vice president for Global Transportation and Industrial Markets at KPMG Consulting (later BearingPoint), leading the company’s strat- egy and

  8. 32 CFR 989.30 - Air quality.

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 6 2010-07-01 2010-07-01 false Air quality. 989.30 Section 989.30 National... ENVIRONMENTAL IMPACT ANALYSIS PROCESS (EIAP) § 989.30 Air quality. Section 176(c) of the Clean Air Act..., Air Quality Compliance. 10 10 See footnote 1 to § 989.1. ...

  9. Influence of Psychological Warfare Information on College Students and Educational Countermeasures%心理战信息对大学生的影响及其教育对策

    Institute of Scientific and Technical Information of China (English)

    巴文娟

    2015-01-01

    In the psychological warfare of information under the background of the Internet, television, language, religious, and academic and cultural exchanges, visits and other activities for the psychological warfare of information carrier of long term effect on the students, had different effect on the students' ideological consciousness, emotion attitude, values education, the national consciousness, cultural identity education, national education measures in a timely manner, improve the ability of college students' psychological warfare defense.%在信息心理战的背景下,以互联网、语言、影视、宗教,以及学术文化交流、参观访问等活动为载体的心理战信息长期作用于大学生,对大学生的思想意识、情感态度产生了不同程度的影响,应及时通过价值观教育、国家意识教育、文化认同教育、国情国力教育等教育对策,提高大学生的心理战防御能力。

  10. Wearable Atmospheric Pressure Plasma Fabrics Produced by Knitting Flexible Wire Electrodes for the Decontamination of Chemical Warfare Agents

    Science.gov (United States)

    Jung, Heesoo; Seo, Jin Ah; Choi, Seungki

    2017-01-01

    One of the key reasons for the limited use of atmospheric pressure plasma (APP) is its inability to treat non-flat, three-dimensional (3D) surface structures, such as electronic devices and the human body, because of the rigid electrode structure required. In this study, a new APP system design—wearable APP (WAPP)—that utilizes a knitting technique to assemble flexible co-axial wire electrodes into a large-area plasma fabric is presented. The WAPP device operates in ambient air with a fully enclosed power electrode and grounded outer electrode. The plasma fabric is flexible and lightweight, and it can be scaled up for larger areas, making it attractive for wearable APP applications. Here, we report the various plasma properties of the WAPP device and successful test results showing the decontamination of toxic chemical warfare agents, namely, mustard (HD), soman (GD), and nerve (VX) agents.

  11. Status of dental health in chemical warfare victims: the case of Isfahan, Iran.

    Science.gov (United States)

    Mottaghi, Ahmad; Hoseinzade, Abolfath; Zamani, Elham; Araghizade, Habib Allah

    2012-01-01

    Little evidence is available regarding the dental health of victims of chemical warfare in Iran. Therefore, in this study, we examined the decayed, missing, and filled teeth index (DMFT), community periodontal index of treatment needs (CPITN), and saliva secretion rate of chemical warfare victims living in the province of Isfahan in Iran. This case-control study was conducted with 300 chemical warfare victims as the treatment group and 300 age-matched individuals without exposure to chemical warfare as the control group. DMFT and CPITN indices and saliva secretion rate were measured and compared between the two groups. Chemical warfare victims had significantly higher scores than the control group for decayed teeth (4.25 ± 3.88 vs 3.52 ± 2.81; P=0.009), missing teeth (8.79 ± 9.3 vs 6.15 ± 8.43; Pwarfare victims was significantly lower than that in the control group (1.71 ± 0.05 vs 3.85 ± 1.95 cc/5 min; PChemical warfare victims have relatively poor dental/oral health. Chemical injury might cause a dysfunction in saliva secretion, with decrease in saliva secretion increasing the risk for tooth decay and periodontal disorders. Further research is required to find out the exact underlying mechanisms and the factors associated with poor dental/oral health in chemical warfare victims.

  12. Punishment sustains large-scale cooperation in prestate warfare

    Science.gov (United States)

    Mathew, Sarah; Boyd, Robert

    2011-01-01

    Understanding cooperation and punishment in small-scale societies is crucial for explaining the origins of human cooperation. We studied warfare among the Turkana, a politically uncentralized, egalitarian, nomadic pastoral society in East Africa. Based on a representative sample of 88 recent raids, we show that the Turkana sustain costly cooperation in combat at a remarkably large scale, at least in part, through punishment of free-riders. Raiding parties comprised several hundred warriors and participants are not kin or day-to-day interactants. Warriors incur substantial risk of death and produce collective benefits. Cowardice and desertions occur, and are punished by community-imposed sanctions, including collective corporal punishment and fines. Furthermore, Turkana norms governing warfare benefit the ethnolinguistic group, a population of a half-million people, at the expense of smaller social groupings. These results challenge current views that punishment is unimportant in small-scale societies and that human cooperation evolved in small groups of kin and familiar individuals. Instead, these results suggest that cooperation at the larger scale of ethnolinguistic units enforced by third-party sanctions could have a deep evolutionary history in the human species. PMID:21670285

  13. Biodiversity conservation and armed conflict: a warfare ecology perspective.

    Science.gov (United States)

    Hanson, Thor

    2018-04-23

    The activities involved in preparing for, executing, and recovering from armed conflict are globally pervasive and consequential, with significant impacts on natural systems. Effects on biodiversity are predominantly negative, produced by direct and indirect battlefield impacts, as well as the general breakdown of social, economic, and governance systems during wartime. Certain conservation opportunities do occur, however, particularly on lands set aside for training exercises, buffer zones, and peace parks. Here, the relationship between armed conflict and biodiversity is reviewed using the temporal framework of warfare ecology, which defines warfare as an ongoing process of three overlapping stages: preparations, war (armed conflict), and postwar activities. Several themes emerge from recent studies, including a heightened awareness of biodiversity conservation on military lands, the potential for scientific and conservation engagement to mitigate negative biodiversity impacts in war zones, and the importance of the postwar period for incorporating biodiversity priorities into reconstruction and recovery efforts. Research limitations and knowledge gaps are also discussed. © 2018 New York Academy of Sciences.

  14. Institutional Memory and the US Air Force

    Science.gov (United States)

    2016-01-01

    38 | Air & Space Power Journal Institutional Memory and the US Air Force Lt Col Daniel J. Brown, USAF Disclaimer: The views and opinions expressed...or implied in the Journal are those of the authors and should not be construed as carrying the official sanction of the Department of Defense, Air...national defense. After each ad- vance is tested in combat, a new round of intellectual sparring commences regarding Summer 2016 | 39 Institutional Memory

  15. Analysis on Joint Operational Capability in the Condition of Information and Psychological Warfares%信息心理对抗条件下联合作战能力分析

    Institute of Scientific and Technical Information of China (English)

    闫家传; 秦伟; 陈璐; 张仁友

    2011-01-01

    In the information age, operational capabilities of troops include firepower, defense power, maintainance power, information power and many other factors, and the warfares between the opponents represent force confrontation, psychological confrontation, information warfares and many other complex forms. Based on the quantity analysis of joint operational capability, mutual functional mechanism of information, psychology and combat power is analyzed, and three feedback loops of operational confrontation, information warfares and psychological warfares are educed, and then system dynamical models are established, and effects on joint operational capability by information, psychology and other factors are deduced in the prospect of quantity.%信息化条件下作战,部队的作战能力表现为包括火力、防护力、保障力、信息力等多种因素的联合作战能力,作战双方的对抗表现为兵力对抗,心理对抗,信息对抗等多种复杂的形式.在联合作战能力量化分析基础上,分析了信息、心理和战斗力相互作用机制,得出了战斗对抗、信息对抗、心理对抗3个反馈回路环,并据此建立了系统动力学模型,从定量的角度分析了信息、心理等因素对联合作战能力的影响.

  16. Defense waste management plan

    International Nuclear Information System (INIS)

    1983-06-01

    Defense high-level waste (HLW) and defense transuranic (TRU) waste are in interim storage at three sites, namely: at the Savannah River Plant, in South Carolina; at the Hanford Reservation, in Washington; and at the Idaho National Engineering Laboratory, in Idaho. Defense TRU waste is also in interim storage at the Oak Ridge National Laboratory, in Tennessee; at the Los Alamos National Laboratory, in New Mexico; and at the Nevada Test Site, in Nevada. (Figure E-2). This document describes a workable approach for the permanent disposal of high-level and transuranic waste from atomic energy defense activities. The plan does not address the disposal of suspect waste which has been conservatively considered to be high-level or transuranic waste but which can be shown to be low-level waste. This material will be processed and disposed of in accordance with low-level waste practices. The primary goal of this program is to utilize or dispose of high-level and transuranic waste routinely, safely, and effectively. This goal will include the disposal of the backlog of stored defense waste. A Reference Plan for each of the sites describes the sequence of steps leading to permanent disposal. No technological breakthroughs are required to implement the reference plan. Not all final decisions concerning the activities described in this document have been made. These decisions will depend on: completion of the National Environmental Policy Act process, authorization and appropriation of funds, agreements with states as appropriate, and in some cases, the results of pilot plant experiments and operational experience. The major elements of the reference plan for permanent disposal of defense high-level and transuranic waste are summarized

  17. Defensive Federal Litigation

    Science.gov (United States)

    1998-08-20

    requires that all affirmative defenses be pleaded in the answer. The rule lists 19 specific affirmative defenses, such as estoppel , laches, res judicata...Brown, 22 F.3d 516 (2d Cir. 1994); Poole v. Rourke, 779 F. Supp. 1546 (E.D. Cal. 1991). 3-40 potential collateral estoppel .4. effect of the district...the back pay claim, which was over $10,000, to the Court of Claims. The court of appeals found that ൸Collateral estoppel prohibits relitigation of

  18. Defense styles of pedophilic offenders.

    Science.gov (United States)

    Drapeau, Martin; Beretta, Véronique; de Roten, Yves; Koerner, Annett; Despland, Jean-Nicolas

    2008-04-01

    This pilot study investigated the defense styles of pedophile sexual offenders. Interviews with 20 pedophiles and 20 controls were scored using the Defense Mechanisms Rating Scales. Results showed that pedophiles had a significantly lower overall defensive functioning score than the controls. Pedophiles used significantly fewer obsessional-level defenses but more major image-distorting and action-level defenses. Results also suggested differences in the prevalence of individual defenses where pedophiles used more dissociation, displacement, denial, autistic fantasy, splitting of object, projective identification, acting out, and passive aggressive behavior but less intellectualization and rationalization.

  19. Strategic Framework for the Defense Acquisition System Understanding Defense Consolidation

    National Research Council Canada - National Science Library

    Potts, Anthony W

    2007-01-01

    The 1993 policy to promote the consolidation of the United States defense industry began a series of acquisitions and mergers that went beyond the intent of the policy and left the Department of Defense (DoD...

  20. Strategic Framework for the Defense Acquisition System Understanding Defense Consolidation

    National Research Council Canada - National Science Library

    Potts, Anthony W

    2007-01-01

    ...% of defense product sales annually. Defense consolidation has diminished the flexibility required for surge capacity, diminished competitive innovations in products, and reduced competitive pricing based on multiple sources for products...

  1. Cerium oxide for the destruction of chemical warfare agents: A comparison of synthetic routes

    Czech Academy of Sciences Publication Activity Database

    Janos, P.; Henych, Jiří; Pelant, O.; Pilařová, V.; Vrtoch, L.; Kormunda, M.; Mazanec, K.; Štengl, Václav

    2016-01-01

    Roč. 304, MAR (2016), s. 259-268 ISSN 0304-3894 Institutional support: RVO:61388980 Keywords : Cerium oxide * Chemical warfare agents * Organophosphate compounds * Decontamination Subject RIV: CA - Inorganic Chemistry Impact factor: 6.065, year: 2016

  2. CRUSER's Warfare Innovation Workshop Focused on Hybrid War in the Urban Littorals

    OpenAIRE

    Ehrlich, Michael

    2017-01-01

    News Stories Archive The Naval Postgraduate School (NPS) Consortium for Robotics and Unmanned Systems Education and Research, CRUSER, hosted its annual Warfare Innovation Workshop (WIW) in Glasgow Hall, Sept. 18-21.

  3. The Army Ground Forces Training for Mountain and Winter Warfare - Study No. 23

    National Research Council Canada - National Science Library

    Govan, Thomas

    1946-01-01

    This general study of the experiments in mountain and winter warfare training from 1940 to 1944 is designed as an introduction to the histories of the Mountain Training Center and The 10th Mountain...

  4. Electronic Warfare: Towed Decoys Could Improve Survivability of Current Navy Aircraft

    National Research Council Canada - National Science Library

    Aiken, Michael

    1997-01-01

    Traditionally, DOD'S combat aircraft have used on-board electronic warfare devices called jammers for self-protection against radar-controlled weapons, including missiles and anti-aircraft artillery...

  5. Optimizing Armed Forces Capabilities for Hybrid Warfare – New Challenge for Slovak Armed Forces

    Directory of Open Access Journals (Sweden)

    Peter PINDJÁK

    2015-09-01

    Full Text Available The paper deals with the optimization of military capabilities of the Slovak Armed Forces for conducting operations in a hybrid conflict, which represents one of the possible scenarios of irregular warfare. Whereas in the regular warfare adversaries intend to eliminate the centers of gravity of each other, most often command and control structures, in irregular conflicts, the center of gravity shifts towards the will and cognitive perception of the target population. Hybrid warfare comprises a thoroughly planned combination of conventional military approaches and kinetic operations with subversive, irregular activities, including information and cyber operations. These efforts are often accompanied by intensified activities of intelligence services, special operation forces, and even mercenary and other paramilitary groups. The development of irregular warfare capabilities within the Slovak Armed Forces will require a progressive transformation process that may turn the armed forces into a modern and adaptable element of power, capable of deployment in national and international crisis management operations.

  6. Surface Warfare Officer Retention: Analysis of Individual Ready Reserve Survey Data

    National Research Council Canada - National Science Library

    Stoker, Carol; Crawford, Alice

    2008-01-01

    ... (including morale and lack of mentoring), push both men and women out of the Navy. Nonetheless, the Navy s primary effort to improve retention has been to introduce the Surface Warfare Officer Continuation Pay (SWOCP...

  7. Understanding "Understanding" Flow for Network-Centric Warfare: Military Knowledge-Flow Mechanics

    National Research Council Canada - National Science Library

    Nissen, Mark

    2002-01-01

    Network-centric warfare (NCW) emphasizes information superiority for battlespace efficacy, but it is clear that the mechanics of how knowledge flows are just as important as those pertaining to the networks and communication...

  8. DRES Database of Methods for the Analysis of Chemical Warfare Agents

    National Research Council Canada - National Science Library

    D'Agostino, Paul

    1997-01-01

    .... Update of the database continues as an ongoing effort and the DRES Database of Methods for the Analysis of Chemical Warfare Agents is available panel in hardcopy form or as a softcopy Procite or Wordperfect file...

  9. The Rapier or the Club: The Relationship between Attrition and Maneuver Warfare

    National Research Council Canada - National Science Library

    Springman, Jeffrey A

    2006-01-01

    ...? This project compares the relationship between attrition and maneuver warfare. The study considers whether there are times when wars of attrition should be fought, and whether there are conditions that force wars of attrition...

  10. Diagnosis of Exposure to Chemical Warfare Agents: A Comprehensive Literature Survey 1990-2005

    National Research Council Canada - National Science Library

    Noort, D

    2006-01-01

    This report is an update of TNO report PML 2003-A63. In this report an overview is presented of the methods currently available for detection of exposure to a number of chemical warfare agents (CWA), i.e...

  11. Anxiety, depression, and posttraumatic stress in Iranian survivors of chemical warfare.

    Science.gov (United States)

    Hashemian, Farnoosh; Khoshnood, Kaveh; Desai, Mayur M; Falahati, Farahnaz; Kasl, Stanislav; Southwick, Steven

    2006-08-02

    In the 1980-1988 Iran-Iraq War, extensive use of chemical weapons resulted in high rates of morbidity and mortality. While much is known about the physical consequences of chemical warfare, there is a paucity of information about the long-term effects of chemical attacks on mental health. To assess the long-term psychological impact of chemical warfare on a civilian population. Cross-sectional randomized survey conducted in July 2004 of 153 civilians in 3 towns exposed to warfare in northwestern Iran: Oshnaviyeh (low-intensity conventional warfare), Rabat (high-intensity conventional warfare), and Sardasht (both high-intensity conventional warfare and chemical weapons). Full or partial posttraumatic stress disorder (PTSD) diagnosis, anxiety symptoms, and depressive symptoms were assessed using Farsi versions of the Clinician-Administered PTSD Scale, Hamilton Scale for Anxiety, and Beck Depression Inventory, respectively. Overall participation rate was 93%. Respondents had a mean age of 45 years and were all of Kurdish ethnicity. Among individuals exposed to both high-intensity warfare and chemical weapons, prevalence rates for lifetime PTSD, current PTSD, major anxiety symptoms, and severe depressive symptoms were 59%, 33%, 65%, and 41%, respectively. Among the low-intensity warfare group, the corresponding rates were 8%, 2%, 18%, and 6%, respectively, while intermediate rates were found among those exposed to high-intensity warfare but not to chemical weapons (31%, 8%, 26%, and 12%, respectively). Compared with individuals exposed to low-intensity warfare, those exposed to both high-intensity warfare and chemical weapons were at higher risk for lifetime PTSD (odds ratio [OR], 18.6; 95% confidence interval [CI], 5.8-59.4), current PTSD (OR, 27.4; 95% CI, 3.4-218.2), increased anxiety symptoms (OR, 14.6; 95% CI, 6.0-35.6), and increased depressive symptoms (OR, 7.2; 95% CI, 3.3-15.9). Exposure to high-intensity warfare but not to chemical weapons was also

  12. Improving Blood Monitoring of Enzymes as Biomarkers of Risk from Anticholinergic Pesticides and Chemical Warfare Agents

    National Research Council Canada - National Science Library

    Wilson, Barry W

    2006-01-01

    Blood biomarkers are an important way to monitor exposure to anticholinergic pesticides and chemical warfare agents and to establish whether some personnel are at greater risk than others from exposure...

  13. A new General Purpose Decontamination System for Chemical and Biological Warfare and Terrorism Agents

    National Research Council Canada - National Science Library

    Khetan, Sushil; Banerjee, xdDeboshri; Chanda, Arani; Collins, Terry

    2003-01-01

    Partial contents: Fe-TAML Activator of Peroxide,Activators of Hydrogen peroxide,Biological Warfare Agents,Bacterial Endospore,Bacterial Spore Deactivation,Modeling Studies,Deactivation Studies with Bacillus spores...

  14. Second NATO/SIBCA Exercise on Sampling of Chemical Warfare Agents

    National Research Council Canada - National Science Library

    Wils, E

    1999-01-01

    In order to practise the sampling of chemical warfare agents under realistic conditions, the Netherlands participated successfully in the second NATO/SIBCA sampling exercise conducted in Poland on 1-3...

  15. The Third World War? In The Cyberspace. Cyber Warfare in the Middle East.

    Directory of Open Access Journals (Sweden)

    Martina

    2014-06-01

    Full Text Available This article aims to provide a brief and comprehensive introduction to the issue of cyber warfare and to display the recent development in this area. Geographically, it focuses on the Middle East region, since the vast majority of the most important recent cyber attacks appeared just in there or were connected to it. The first part of the article tries to define the key notion of cyber warfare, compares it to the standard warfare and presents different types of cyber weapons that are known today. The second part points out examples of the most striking recent cyber attacks and uses them as evidences to demonstrate today's importance and dissemination of cyber warfare. Finally, the article sums up pros and cons of the cyber weapons and, in view of these, predicts a significant increase in their use in any future war conflicts.

  16. Improving Blood Monitoring of Enzymes as Biomarkers of Risk from Anticholinergic Pesticides and Chemical Warfare Agents

    National Research Council Canada - National Science Library

    Wilson, Barry W

    2005-01-01

    Blood biomarkers are an important way to monitor exposure to anticholinergic pesticides and chemical warfare agents and to establish whether some personnel are at greater risk than others from exposure...

  17. Special Operations Forces: C-130 Upgrade Plan Could Help Fix Electronic Warfare Deficiencies

    National Research Council Canada - National Science Library

    1998-01-01

    In response to a concern that threats to the U.S. Special Operations Command's (USSOCOM) aircraft are increasing, while funds available for electronic warfare are decreasing, the General Accounting Office...

  18. Combinatorial Auction Theory Applied to the Selection of Surface Warfare Officer Retention Incentives

    National Research Council Canada - National Science Library

    Denmond, Constance M; Johnson, Derek N; Lewis, Chavius G; Zegley, Christopher R

    2007-01-01

    The purpose of this project is to investigate the potential retention and cost impacts of offering combinations of retention base incentives to members of the Surface Warfare Officer (SWO) community...

  19. Computed Tomography Imaging findings in Chemical Warfare Victims with pulmonary Complications

    Directory of Open Access Journals (Sweden)

    Zahra Salehinezhad

    2013-05-01

    Full Text Available Introduction: Data on imaging findings in pulmonary complications of chemical agents is scarce. The current study aimed to evaluate radiological findings of late onset pulmonary complications in chemical warfare victims (CWV and to guide pulmonologists in diagnosis of these subjects. Materials and Methods: Ninety- three male CWV were enrolled in this prospective study, 20-25 years (mean=23 after exposure. Demographic and clinical data were recorded. High resolution computed Tomography (HRCT of the lung was performed during inspiration and expiration and was double reported blindly by two radiologists. Final diagnosis was made according to HRCT findings. The HRCT findings, final diagnosis, and distribution of the abnormalities were compared between subjects whom had been exposed to more complex chemical agents used during the second half of the war and simpler agents during the first half. Results: The most frequent HRCT findings were air trapping (56.7% and mosaic attenuation (35.1%. The distribution of abnormalities was mostly local (79.4% and bilateral (73% especially in lower regions (61.3%. The diagnosed respiratory diseases included bronchiolitis obliterans (43%, chronic obstructive pulmonary disease (COPD (27.9%, asthma (23.6%, bronchiectasis (13.9% and interstitial lung disease (ILD (9.6%. Frequency of subjects involved in the second half of the period of war was more than the first period (P-value < 0.05 but the HRCT findings were similar. Conclusions: Bronchiolitis obliterans with picture of focal bilateral air trapping was the most common finding in CWV but asthma appeared to have become a new problem in these subjects.

  20. 76 FR 65187 - U.S. Air Force Scientific Advisory Board Notice of Meeting

    Science.gov (United States)

    2011-10-20

    ... DEPARTMENT OF DEFENSE Department of the Air Force U.S. Air Force Scientific Advisory Board Notice of Meeting AGENCY: US Air Force Scientific Advisory Board, Department of the Air Force, DoD. ACTION...-calendar day period the Advisory Committee Management Officer for the Department of Defense, pursuant to 41...

  1. Cyber crime and cyber warfare with international cyber collaboration for RSA – preparing communities

    CSIR Research Space (South Africa)

    Grobler, M

    2012-03-01

    Full Text Available aspects come into play that may have an influence on the manner in which the military reacts to cyber attacks (Wilson 2007): ? new national security policy issues; ? consideration of psychological operations used to affect friendly nations... relationship between modern cyber space, cyber warfare and traditional legislation. As a starting point, cyber warfare is defined for the purpose of this article as the use of exploits in cyber space as a way to intentionally cause harm to people, assets...

  2. Defensive Passivity in Adolescence

    Science.gov (United States)

    Rosenheim, Eliyahu; Gaoni, Bracha

    1977-01-01

    There are potentially healthy adolescents who display excessive reluctance to move toward independent decision and action. This research presents a clinical description of this "syndrome", conceptualizes it as a defensive maneuver against mourning over cherished childhood dreams and offers steps for therapeutic intervention. (Editor/RK)

  3. Defense radioactive waste management

    International Nuclear Information System (INIS)

    Hindman, T.B. Jr.

    1988-01-01

    The Office of Defense Programs (DP), U.S. Department of Energy, is responsible for the production of nuclear weapons and materials for national defense. Pursuant to this mission, DP operates a large industrial complex that employs over 60,000 people at various installations across the country. As a byproduct of their activities, these installations generate radioactive, hazardous, or mixed wastes that must be managed in a safe and cost-effective manner in compliance with all applicable Federal and STate environmental requirements. At the Federal level such requirements derive primarily from the Atomic Energy Act, the Resource Conservation and Recovery Act (RCRA), the comprehensive Environmental Response, Compensation, and Liability Act (CERCLA) and the Superfund Amendments and Reauthorization Act (SARA). Responsibility for DP activities in connection with the disposal of defense wastes is consolidated within the Office of Defense Waste and Transportation Management (DWTM). This paper discusses these activities which consist of five principal elements: the environmental restoration of inactive DP facilities and sites, the processing storage and disposal of wastes associated with ongoing operations at active DP facilities, research and development directed toward the long-term disposal of radioactive, hazardous, mixed wastes, technology development directly supporting regulatory compliance, and the development of policies, procedures, and technologies for assuring the safe transportation of radioactive and hazardous materials

  4. Auxins in defense strategies

    Czech Academy of Sciences Publication Activity Database

    Čarná, Mária; Repka, V.; Skůpa, Petr; Šturdík, E.

    2014-01-01

    Roč. 69, č. 10 (2014), s. 1255-1263 ISSN 0006-3088 R&D Projects: GA TA ČR TA01011802 Institutional support: RVO:61389030 Keywords : auxin * defense responses * JA Subject RIV: GF - Plant Pathology, Vermin, Weed, Plant Protection Impact factor: 0.827, year: 2014

  5. Hanford defense waste studies

    International Nuclear Information System (INIS)

    Napier, B.A.; Zimmerman, M.G.; Soldat, J.K.

    1981-01-01

    PNL is assisting Rockwell Hanford Operations to prepare a programmatic environmental impact statement for the management of Hanford defense nuclear waste. The Ecological Sciences Department is leading the task of calculation of public radiation doses from a large matrix of potential routine and accidental releases of radionuclides to the environment

  6. Warfare, genocide, and ethnic conflict: a Darwinian approach.

    Science.gov (United States)

    Dimijian, Gregory G

    2010-07-01

    As the 21st century dawns, I reflect on the history of humankind with growing concern about the need to understand the underlying biological and cultural roots of ethnic conflict and warfare. In the many studies of human conflict, innate biological predispositions have been neglected. This article is the third part of a series of seminars for medical residents at the University of Texas Southwestern Medical School at Dallas (see http://adarwinstudygroup.org/). The series starts with in-depth coverage of Darwinian natural and sexual selection, with examples from the domestication of animals and plants and the crisis of antibiotic resistance. The series strives to show how biology has been neglected in the study of the we-they orientation of human behavior, with its devastating consequences. The subject material is profoundly disturbing, as it looks at "human nature" and contrasts the "dark side" of human behavior with the opposite, profoundly caring and loving side.

  7. Information Warfare on Social Media: A Brand Management Perspective

    Directory of Open Access Journals (Sweden)

    Kalpokas Ignas

    2017-06-01

    Full Text Available Employing a perspective informed by brand management, this article aims at understanding information warfare operations in social media. The state, seen as brand, must project an image of itself to both internal and foreign audiences to unite the domestic audience and/or attract global support. However, in constructing a brand, states are vulnerable to ‘sofa warriors’ – ordinary individuals who have been unwittingly recruited by hostile actors to disseminate (over social media or other platforms a counter-brand, harmful to the state concerned. These new threats are investigated in light of recent tendencies in online branding, elucidating their status as a national security threat, with the potential to significantly disrupt life in political communities.

  8. Book Review: Conquest in Cyberspace: National Security and Information Warfare

    Directory of Open Access Journals (Sweden)

    Gary C. Kessler

    2007-06-01

    Full Text Available Libicki, M.C. (2007. Conquest in Cyberspace: National Security and Information Warfare. New York: Cambridge University Press. 323 pages, ISBN: 978-0-521-69214-4 (paper, US$80Reviewed by Gary C. Kessler (gary.kessler@champlain.eduMany books -- and even movies ("Live Free or Die Hard" -- are based upon the premise of an impending information war. In these scenarios -- made all too plausible by the increased frequency with which we read about and experience major information security incidents -- a Bad Guy exploits known computer security vulnerabilities in order to control major national infrastructures via the Internet so as to reap financial, economic, and/or personal power.(see PDF for full review

  9. Nanostructured Metal Oxides for Stoichiometric Degradation of Chemical Warfare Agents.

    Science.gov (United States)

    Štengl, Václav; Henych, Jiří; Janoš, Pavel; Skoumal, Miroslav

    2016-01-01

    Metal oxides have very important applications in many areas of chemistry, physics and materials science; their properties are dependent on the method of preparation, the morphology and texture. Nanostructured metal oxides can exhibit unique characteristics unlike those of the bulk form depending on their morphology, with a high density of edges, corners and defect surfaces. In recent years, methods have been developed for the preparation of metal oxide powders with tunable control of the primary particle size as well as of a secondary particle size: the size of agglomerates of crystallites. One of the many ways to take advantage of unique properties of nanostructured oxide materials is stoichiometric degradation of chemical warfare agents (CWAs) and volatile organic compounds (VOC) pollutants on their surfaces.

  10. Decontamination of biological warfare agents by a microwave plasma torch

    International Nuclear Information System (INIS)

    Lai, Wilson; Lai, Henry; Kuo, Spencer P.; Tarasenko, Olga; Levon, Kalle

    2005-01-01

    A portable arc-seeded microwave plasma torch running stably with airflow is described and applied for the decontamination of biological warfare agents. Emission spectroscopy of the plasma torch indicated that this torch produced an abundance of reactive atomic oxygen that could effectively oxidize biological agents. Bacillus cereus was chosen as a simulant of Bacillus anthracis spores for biological agent in the decontamination experiments. Decontamination was performed with the airflow rate of 0.393 l/s, corresponding to a maximum concentration of atomic oxygen produced by the torch. The experimental results showed that all spores were killed in less than 8 s at 3 cm distance, 12 s at 4 cm distance, and 16 s at 5 cm distance away from the nozzle of the torch

  11. [Cutaneous and systemic toxicology of vesicants used in warfare].

    Science.gov (United States)

    Pita, R; Vidal-Asensi, S

    2010-01-01

    Vesicants are a group of chemicals used in warfare. The most representative agent is yperite, also known as mustard gas. The blisters that appeared on those exposed to yperite during combat in the First World War are responsible for the current name--vesicants--for this group of chemicals. Their affects are produced mainly through localized action of liquid or vapor forms on the skin, eyes, and respiratory tract. However, the high absorption of the liquid form through the skin or the vapor form on inhalation may cause substantial systemic effects. Here we analyze these effects, treatment of intoxication, and long-term sequelae, drawing on our experience and a review of the literature.

  12. Defense Logistics Agency Revenue Eliminations

    National Research Council Canada - National Science Library

    1996-01-01

    The issue of revenue eliminations was identified during our work on the Defense Logistics Agency portion of the Audit of Revenue Accounts in the FY 1996 Financial Statements of the Defense Business Operations Fund...

  13. An Open Architecture Framework for Electronic Warfare Based Approach to HLA Federate Development

    Directory of Open Access Journals (Sweden)

    HyunSeo Kang

    2018-01-01

    Full Text Available A variety of electronic warfare models are developed in the Electronic Warfare Research Center. An Open Architecture Framework for Electronic Warfare (OAFEw has been developed for reusability of various object models participating in the electronic warfare simulation and for extensibility of the electronic warfare simulator. OAFEw is a kind of component-based software (SW lifecycle management support framework. This OAFEw is defined by six components and ten rules. The purpose of this study is to construct a Distributed Simulation Interface Model, according to the rules of OAFEw, and create Use Case Model of OAFEw Reference Conceptual Model version 1.0. This is embodied in the OAFEw-FOM (Federate Object Model for High-Level Architecture (HLA based distributed simulation. Therefore, we design and implement EW real-time distributed simulation that can work with a model in C++ and MATLAB API (Application Programming Interface. In addition, OAFEw-FOM, electronic component model, and scenario of the electronic warfare domain were designed through simple scenarios for verification, and real-time distributed simulation between C++ and MATLAB was performed through OAFEw-Distributed Simulation Interface.

  14. A Survey of Game Theoretic Approaches to Modelling Decision-Making in Information Warfare Scenarios

    Directory of Open Access Journals (Sweden)

    Kathryn Merrick

    2016-07-01

    Full Text Available Our increasing dependence on information technologies and autonomous systems has escalated international concern for information- and cyber-security in the face of politically, socially and religiously motivated cyber-attacks. Information warfare tactics that interfere with the flow of information can challenge the survival of individuals and groups. It is increasingly important that both humans and machines can make decisions that ensure the trustworthiness of information, communication and autonomous systems. Subsequently, an important research direction is concerned with modelling decision-making processes. One approach to this involves modelling decision-making scenarios as games using game theory. This paper presents a survey of information warfare literature, with the purpose of identifying games that model different types of information warfare operations. Our contribution is a systematic identification and classification of information warfare games, as a basis for modelling decision-making by humans and machines in such scenarios. We also present a taxonomy of games that map to information warfare and cyber crime problems as a precursor to future research on decision-making in such scenarios. We identify and discuss open research questions including the role of behavioural game theory in modelling human decision making and the role of machine decision-making in information warfare scenarios.

  15. Space Technology and Network Centric Warfare: A Strategic Paradox

    National Research Council Canada - National Science Library

    Ginter, Karl

    2007-01-01

    The Department of Defense (DoD) force transformation is in large measure predicated on harnessing and exploiting the benefits of shared information on the battlefield to develop a common operating picture...

  16. Using cheminformatics to find simulants for chemical warfare agents

    Energy Technology Data Exchange (ETDEWEB)

    Lavoie, J.; Srinivasan, Sree [Molecular Sciences and Engineering Team, U.S. Army Natick Soldier Research, Development and Engineering Center, 15 Kansas Street, Natick, MA 01760 (United States); Nagarajan, R., E-mail: Ramanathan.Nagarajan@us.army.mil [Molecular Sciences and Engineering Team, U.S. Army Natick Soldier Research, Development and Engineering Center, 15 Kansas Street, Natick, MA 01760 (United States)

    2011-10-30

    Highlights: {yields} Summary of chemical warfare agent (CWA) simulants in current use. {yields} Application of method of molecular similarity to CWA and simulants. {yields} Quantitative metric for CWA-simulant similarity. {yields} Rank ordering of simulants in current use. {yields} Potential of method to identify simulants for emerging agents. - Abstract: Direct experimentation with chemical warfare agents (CWA) to study important problems such as their permeation across protective barrier materials, decontamination of equipment and facilities, or the environmental transport and fate of CWAs is not feasible because of the obvious toxicity of the CWAs and associated restrictions on their laboratory use. The common practice is to use 'simulants,' namely, analogous chemicals that closely resemble the CWAs but are less toxic, with the expectation that the results attained for simulants can be correlated to how the CWAs would perform. Simulants have been traditionally chosen by experts, by means of intuition, using similarity in one or more physical properties (such as vapor pressure or aqueous solubility) or in the molecular structural features (such as functional groups) between the stimulant and the CWA. This work is designed to automate the simulant identification process backed by quantitative metrics, by means of chemical similarity search software routinely used in pharmaceutical drug discovery. The question addressed here is: By the metrics of such software, how similar are traditional simulants to CWAs? That is, what is the numerical 'distance' between each CWA and its customary simulants in the quantitative space of molecular descriptors? The answers show promise for finding close but less toxic simulants for the ever-increasing numbers of CWAs objectively and fast.

  17. Using cheminformatics to find simulants for chemical warfare agents

    International Nuclear Information System (INIS)

    Lavoie, J.; Srinivasan, Sree; Nagarajan, R.

    2011-01-01

    Highlights: → Summary of chemical warfare agent (CWA) simulants in current use. → Application of method of molecular similarity to CWA and simulants. → Quantitative metric for CWA-simulant similarity. → Rank ordering of simulants in current use. → Potential of method to identify simulants for emerging agents. - Abstract: Direct experimentation with chemical warfare agents (CWA) to study important problems such as their permeation across protective barrier materials, decontamination of equipment and facilities, or the environmental transport and fate of CWAs is not feasible because of the obvious toxicity of the CWAs and associated restrictions on their laboratory use. The common practice is to use 'simulants,' namely, analogous chemicals that closely resemble the CWAs but are less toxic, with the expectation that the results attained for simulants can be correlated to how the CWAs would perform. Simulants have been traditionally chosen by experts, by means of intuition, using similarity in one or more physical properties (such as vapor pressure or aqueous solubility) or in the molecular structural features (such as functional groups) between the stimulant and the CWA. This work is designed to automate the simulant identification process backed by quantitative metrics, by means of chemical similarity search software routinely used in pharmaceutical drug discovery. The question addressed here is: By the metrics of such software, how similar are traditional simulants to CWAs? That is, what is the numerical 'distance' between each CWA and its customary simulants in the quantitative space of molecular descriptors? The answers show promise for finding close but less toxic simulants for the ever-increasing numbers of CWAs objectively and fast.

  18. Organizing for Irregular Warfare: Implications for the Brigade Combat Team

    Science.gov (United States)

    2007-12-01

    program on October 13, 2006. For further information see, Stew Magnuson, “Eyes Wide Open,” National Defense May 2007, 46. 227 John A. English...David Tucker and Christopher J. Lamb , “Restructuring Special Operations Forces for Emerging Threats,” Strategic Forum no. 219 (January 2006) to... Stew . “Eyes Wide Open.” National Defense, May 2007. Malcom, Ben S. White Tigers, My Secret War in Korea. U.S.: Brassey’s, 2003

  19. Underground population defense structures in China

    Energy Technology Data Exchange (ETDEWEB)

    Wukasch, E.

    The design and construction ofunderground shelters to protect the Chinese population in the event of nuclear war are described. Built in the style of World War II air raid shelters and designed as neighborhood defense facilities, these are not judged to be adequate for nuclear defense needs, particularly the needs of urban populations. However, 80% of China's population is rural and 1/3 of this has lived underground for centuries in cliff dwellings and atrium houses. It is, therefore, concluded that China's rural population has a better chance the the population of any other country for long-term survival from the later consequences, as well as the immediate shock, of an urban nuclear attack. (LCL)

  20. Department of Defense high power laser program guidance

    Science.gov (United States)

    Muller, Clifford H.

    1994-06-01

    The DoD investment of nominally $200 million per year is focused on four high power laser (HPL) concepts: Space-Based Laser (SBL), a Ballistic Missile Defense Organization effort that addresses boost-phase intercept for Theater Missile Defense and National Missile Defense; Airborne Laser (ABL), an Air Force effort that addresses boost-phase intercept for Theater Missile Defense; Ground-Based Laser (GBL), an Air Force effort addressing space control; and Anti-Ship Missile Defense (ASMD), a Navy effort addressing ship-based defense. Each organization is also supporting technology development with the goal of achieving less expensive, brighter, and lighter high power laser systems. These activities represent the building blocks of the DoD program to exploit the compelling characteristics of the high power laser. Even though DoD's HPL program are focused and moderately strong, additional emphasis in a few technical areas could help reduce risk in these programs. In addition, a number of options are available for continuing to use the High-Energy Laser System Test Facility (HELSTF) at White Sands Missile Range. This report provides a brief overview and guidance for the five efforts which comprise the DoD HPL program (SBL, ABL, GBL, ASMD, HELSTF).

  1. Defense AT&L (Volume 37, Number 1, January-February 2008)

    Science.gov (United States)

    2008-02-01

    Senate, he serves as the senior advisor to the secretary of defense on testing Department of Defense weapon systems, and prescribing policies and...including several commands. As general, his final assign- ment was the senior air defense advisor to the chief of staff of the Army. His awards...by going to <www. usajobs.gov>. For more details, see the USA Staffing Ap- plication Manager’s online help at <http://eshelp.opm. gov/ robo /projects

  2. Talking About Defense: Leathernecks in Lab Coats

    National Research Council Canada - National Science Library

    Wilson, George

    2002-01-01

    .... Anderson is not the typical bunker-charging, poster-boy Marine. An internationally known authority on new kinds of warfare, Anderson more resembles a militarized Thomas Edison, an experimenter in the science of war...

  3. From energy-rich phosphate compounds to warfare agents: A review on the chemistry of organic phosphate compounds

    Directory of Open Access Journals (Sweden)

    Luciano Albino Giusti

    2008-12-01

    Full Text Available The chemistry of the phosphorus-oxygen bond is widely used in biological systems in many processes, such as energy transduction and the storage, transmission and expression of genetic information, which are essential to living beings in relation to a wide variety of functions. Compounds containing this bond have been designed for many purposes, ranging from agricultural defense systems, in order to increase food production, to nerve agents, for complaining use in warfare. In this review, features related to the chemistry of organic phosphate compounds are discussed, with particular emphasis on the role of phosphate compounds in biochemical events and in nerve agents. To this aim, the energy-rich phosphate compounds are focused, particularly the mode of their use as energy currency in cells. Historical and recent studies carried out by research groups have tried to elucidate the mechanism of action of enzymes responsible for energy transduction through the use of biochemical studies, enzyme models, and artificial enzymes. Finally, recent studies on the detoxification of nerve agents based on phosphorous esters are presented, and on the utilization of chromogenic and fluorogenic chemosensors for the detection of these phosphate species.

  4. Naval War College Review. Volume 66, Number 3, Summer 2013

    Science.gov (United States)

    2013-01-01

    Naval Mine and Anti-submarine Warfare Command, Corpus Christi, Texas. He also served at the U.S. Naval Academy as a company of- ficer, celestial... Mine Warfare • Electronic WarfareAir Defense • C4ISR • Civil Affairs • Installation Management Navy-centric Common Areas USMC...Brinsfield, and Col. jamie Iñiguez of the NATO SOF Coordination Centre. 37. Barbara Opall -Rome, “U.S. Seeks global Spec Ops Network,” Defense News, 12

  5. Shaping Air Mobility Forces for Future Relevance

    Science.gov (United States)

    2017-01-01

    King Air University Press 600 Chennault Circle, Building 1405 Maxwell AFB, AL 36112-6010 afri.aupress@us.af.mil http://aupress.au.af.mil...the congressional study’s Persian Gulf scenario.37 Later Defense Department air mobility plans continued the CMMS pat- tern of paring down air mobility

  6. Inherently Offensive: Airpower and the Dialectic with Defense

    Science.gov (United States)

    2017-06-01

    detailed definition up front. Ted Hopf, writing in The American Political Science Review, argues, “the offense-defense balance consists of three elements...technology contributed to air power’s ability to maintain overwhelming offensive 12 Hopf, Ted . "Polarity...fighters and surface-to-air missile systems. John Patterson explains why this is true, “most fighter aircraft operate in the X - and Ku-bands because

  7. Modernization of the Indian Air Force: Security Implications for South Asia

    National Research Council Canada - National Science Library

    2005-01-01

    This thesis analyzes the Indian Air Force's (IAF) robust modernization campaign and explores why the IAF is on the path to transforming itself from an air force dedicated to air defense to one capable of global force projection...

  8. Defense Primer: Procurement

    Science.gov (United States)

    2017-02-10

    Usually, incremental funding is used to mitigate peaks and valleys in annual budgets caused by the cost of one item significantly changing the...base defense budget . DOD uses these funds to buy several different types of materiel, including  new items easily recognizable as military...pursues a policy of full funding for procurement, meaning that the total estimated cost of each unit must be funded in the year it is budgeted . In a

  9. Quadrennial Defense Review Report

    Science.gov (United States)

    2010-02-01

    medicine , and computer network operations. While we continue to employ a mix of programs and incentives to recruit quality personnel, we are also...Lithuania* Singapore Australia Finland Luxembourg* Slovakia* Austria France* Macedonia Slovenia* Azerbaijan Georgia Montenegro Spain* Belgium...20,000 positions by 2015. We will continue to significantly enhance Secretary of Defense Robert M. Gates meets with plant workers during a tour of an

  10. Whither Ballistic Missile Defense?

    Science.gov (United States)

    1992-11-30

    important that technology today is placing enormous power in the many camps-not only information that enables timely decision-making, but also the...WHITHER BALLISTIC MISSILE DEFENSE? BY AMBASSADOR HENRY F. COOPER NOVEMBER 30,1992 TECHNICAL MARKETING SOCIETY OF AMERICA WASHINGTON, DC...Conference on Technical Marketing 2000: Opportunities and Strategies for a Changing World) I intend to discuss the prospects for SDI in a changing

  11. Plant defense against insect herbivores

    DEFF Research Database (Denmark)

    Fürstenberg-Hägg, Joel; Zagrobelny, Mika; Bak, Søren

    2013-01-01

    , defense compounds. These bioactive specialized plant defense compounds may repel or intoxicate insects, while defense proteins often interfere with their digestion. Volatiles are released upon herbivory to repel herbivores, attract predators or for communication between leaves or plants, and to induce......Plants have been interacting with insects for several hundred million years, leading to complex defense approaches against various insect feeding strategies. Some defenses are constitutive while others are induced, although the insecticidal defense compound or protein classes are often similar...... defense responses. Plants also apply morphological features like waxes, trichomes and latices to make the feeding more difficult for the insects. Extrafloral nectar, food bodies and nesting or refuge sites are produced to accommodate and feed the predators of the herbivores. Meanwhile, herbivorous insects...

  12. The Abbott and Costello Effect: Who's on What, and What's Where When? A Human-Centered Method to Investigate Network Centric Warfare Systems

    National Research Council Canada - National Science Library

    Reed, Derek W

    2007-01-01

    ...), fundamentally changing how warfare is being conducted. Network centric warfare (NCW) systems are being rushed to the field and are offered as a solution for the fog of war and as a way to reduce manpower costs...

  13. Funding Defense: Challenges of Buying Military Capability in Sub-Saharan Africa

    National Research Council Canada - National Science Library

    Henk, Daniel

    2001-01-01

    Martin Rupiya, Director of the University of Zimbabwe's Centre for Defence Studies, and Daniel Henk of the Air War College provide one of the first comprehensive studies of defense budgeting practices in Africa...

  14. Preparing South Africa for Cyber Crime and Cyber Defense

    Directory of Open Access Journals (Sweden)

    Marthie Grobler

    2013-10-01

    deal with making the civil community aware of Cyber Crime and provide a defense mechanism to assist governments from developing countries to prevent their countries to be used as targets or intermediary for either Cyber Crime or Cyber Warfare.

  15. Integrated Unit Deployments: Rethinking Air National Guard Fighter Mobilizations

    Science.gov (United States)

    2016-06-01

    participation in the homeland defense mission. But they emphasized that homeland defense would not become an exclusive ANG mission. Operation...station that can absorb pilots and maintainers left behind. Few Air National Guard squadrons enjoy this luxury . Only Air Guard squadrons that are part

  16. DEFENSE PROGRAMS RISK MANAGEMENT FRAMEWORK

    Directory of Open Access Journals (Sweden)

    Constantin PREDA

    2012-01-01

    Full Text Available For the past years defense programs have faced delays in delivering defense capabilities and budget overruns. Stakeholders are looking for ways to improve program management and the decision making process given the very fluid and uncertain economic and political environment. Consequently, they have increasingly resorted to risk management as the main management tool for achieving defense programs objectives and for delivering the defense capabilities strongly needed for the soldiers on the ground on time and within limited defense budgets. Following a risk management based decision-making approach the stakeholders are expected not only to protect program objectives against a wide range of risks but, at the same time, to take advantage of the opportunities to increase the likelihood of program success. The prerequisite for making risk management the main tool for achieving defense programs objectives is the design and implementation of a strong risk management framework as a foundation providing an efficient and effective application of the best risk management practices. The aim of this paper is to examine the risk management framework for defense programs based on the ISO 31000:2009 standard, best risk management practices and the defense programs’ needs and particularities. For the purposes of this article, the term of defense programs refers to joint defense programs.

  17. Rain-Induced Wash-Off of Chemical Warfare Agent (VX) from Foliar Surfaces of Living Plants Maintained in a Surety Hood

    Science.gov (United States)

    2016-09-01

    RAIN-INDUCED WASH-OFF OF CHEMICAL WARFARE AGENT (VX) FROM FOLIAR SURFACES OF LIVING PLANTS MAINTAINED IN A...Final 3. DATES COVERED (From - To) May 2014 – Sep 2015 4. TITLE AND SUBTITLE Rain-Induced Wash-Off of Chemical Warfare Agent (VX) from Foliar...galli Foliage Chemical warfare agent (CWA) O-ethyl-S-(2

  18. EW 101 a first course in electronic warfare

    CERN Document Server

    Adamy, David L

    2000-01-01

    This popular series of tutorials, featured over a period of years in the Journal of Electronic Defense, is now available in a single volume. Organized into chapters with new introductory and supplementary material from the author, you get clear, concise and well-illustrated examinations of critical topics such as antenna parameters, receiver sensitivity, processing tasks, and search strategies, LPI signals, jamming, communication links, and simulation. The chapters define key terms and explain how and why particular technologies are relevant to electronic defense. Detailed charts, diagrams and

  19. Quarrelsome Committees in U.S. Defense Acquisition: The KC-X Case

    Science.gov (United States)

    2014-04-30

    Chair: Jeff Ronka, Managing Partner, Renaissance Strategic Advisors Quarrelsome Committees in U.S. Defense Acquisition: The KC-X Case Raymond...aircraft; “ Italian Air Force,” n.d.; “Japan Air Self-Defense Force,” n.d.). Since the A330 can carry (and offload) more fuel (Fulghum, 2010), it would be...Retrieved from http://www.latimes.com Italian Air Force. (n.d.). In Wikipedia. Retrieved from http://en.wikipedia.org/wiki/Italian_Air_Force (last

  20. RELEVANCE OF RELIGIOUS LEADER ENGAGEMENT FOR THE AIR FORCE CHAPLAIN CORPS

    Science.gov (United States)

    2015-12-01

    organizations. They are ordained religious leaders who have been set them aside to do sacred works. Furthermore, as Navy Chaplain George Adams writes...AU/ACSC/CHAE, C/AY16 AIR COMMAND AND STAFF COLLEGE AIR UNIVERSITY RELEVANCE OF RELIGIOUS LEADER ENGAGEMENT FOR THE...agent of Religious Leader Engagement on deployments in an informal manner. As the nature of warfare continues to evolve toward a non-traditional

  1. UNDERGRADUATE AIR BATTLE MANAGER TRAINING: PREPARED TO ACHIEVE COMBAT MISSION READY

    Science.gov (United States)

    2016-04-01

    training to ensure ABMs develop basic airmanship similar to graduates from Undergraduate Pilot Training (UPT) or Undergraduate Combat Systems Officer... System (AWACS), the E-8C Joint Surveillance Targeting Attack Reconnaissance System (JSTARS), and the Control and Reporting Center (CRC). This study will...complexity of future air warfare, continues to grow ABMs will be required to integrate effects across Air, Space, and Cyberspace. The opportunity to train

  2. Guerilla Warfare & Law Enforcement: Combating the 21st Century Terrorist Cell within the U.S.

    Directory of Open Access Journals (Sweden)

    Major Richard Hughbank

    2009-01-01

    Full Text Available Both domestic and international terrorist organizations employ guerrilla warfare tactics, techniques, and procedures. Thus, the ability to identify and defeat the members of these organizations, cripple their infrastructures, and disrupt their financial resources lies in the understanding of modern guerrilla warfare as it develops in the twenty-first century within the United States.3 The forms of asymmetric warfare4 adopted by domestic and international terrorist groups alike is no longer intended to gain simple media exposure or governmental manipulation; they want to make an overpowering impact by causing massive loss of life and severe damage to infrastructure and are often motivated by religious imperatives and political goals. As terrorism analyst Stephen Flynn has observed, "Throughout the 20th century [Americans] were able to treat national security as essentially an out-of-body experience. When confronted by threats, [America] dealt with them on the turf of our allies or our adversaries. Aside from the occasional disaster and heinous crime, civilian life [in the United States] has been virtually terror-free." With the turn of the twenty-first century, terrorist operations have become more prevalent in the United States and are taking shape in the form of modern guerrilla warfare, thus creating new challenges for federal, state, and local law enforcement agencies. After reviewing the origin and nature of these challenges, this article will offer some suggestions for countering guerilla warfare in the United States.

  3. Potential Science and Technology Game Changers for the Ground Warfare of 2050: Selected Projections Made in 2017

    Science.gov (United States)

    2018-02-01

    ARL-TR-8283 ● FEB 2018 US Army Research Laboratory Potential Science and Technology Game Changers for the Ground Warfare of 2050...Science and Technology Game Changers for the Ground Warfare of 2050: Selected Projections Made in 2017 by Alexander Kott Office of the Director...Brian Sadler Vehicle Technology Directorate, ARL Ananthram Swami Computational and Information Sciences Directorate, ARL Approved for

  4. Nanomaterials for Defense Applications

    Science.gov (United States)

    Turaga, Uday; Singh, Vinitkumar; Lalagiri, Muralidhar; Kiekens, Paul; Ramkumar, Seshadri S.

    Nanotechnology has found a number of applications in electronics and healthcare. Within the textile field, applications of nanotechnology have been limited to filters, protective liners for chemical and biological clothing and nanocoatings. This chapter presents an overview of the applications of nanomaterials such as nanofibers and nanoparticles that are of use to military and industrial sectors. An effort has been made to categorize nanofibers based on the method of production. This chapter particularly focuses on a few latest developments that have taken place with regard to the application of nanomaterials such as metal oxides in the defense arena.

  5. Phenomenon of Psychological Defense

    Directory of Open Access Journals (Sweden)

    Elena T. Sokolova

    2011-01-01

    Full Text Available The author discusses the controversial issues of formation and functioning of psy¬chological defense mechanisms in ontogenesis and in personality disorders as they are represented in classical and contemporary psychoanalysis, in cognitivism and communication theory. The paper emphasizes the role of cognitive organi¬zation (style, sign-symbolic mediation, representative system of object relations and attachments in individual typological variability of the level organization of ciency of personal and social adaptation, in maturity and mental health of personality

  6. Defense Treaty Inspection Readiness Program

    International Nuclear Information System (INIS)

    Cronin, J.J.; Kohen, M.D.; Rivers, J.D.

    1996-01-01

    The Defense Treaty Inspection Readiness Program (DTIRP) was established by the Department of Defense in 1990 to assist defense facilities in preparing for treaty verification activities. Led by the On-Site Inspection Agency (OSIA), an element of the Department of Defense, DTIRP''s membership includes representatives from other Department of Defense agencies, the Department of Energy (DOE), the Central Intelligence Agency, the Federal Bureau of Investigation, the Department of Commerce, and others. The Office of Safeguards and Security has a significant interest in this program, due to the number of national defense facilities within its purview that are candidates for future inspections. As a result, the Office of Safeguards and Security has taken a very active role in DTIRP. This paper discusses the Office of Safeguards and Security''s increasing involvement in various elements of the DTIRP, ranging from facility assessments to training development and implementation

  7. Naval Undersea Warfare Center Division Newport utilities metering, Phase 1

    Energy Technology Data Exchange (ETDEWEB)

    Carroll, D.M.

    1992-11-01

    Pacific Northwest Laboratory developed this report for the US Navy`s Naval Undersea Warfare Center Division Newport, Rhode Island (NUWC). The purpose of the report was to review options for metering electricity and steam used in the NUWC compound, and to make recommendations to NUWC for implementation under a follow-on project. An additional NUWC concern is a proposed rate change by the servicing utility, Newport Electric, which would make a significant shift from consumption to demand billing, and what effect that rate change would have on the NUWC utility budget. Automated, remote reading meters are available which would allow NUWC to monitor its actual utility consumption and demand for both the entire NUWC compound and by end-use in individual buildings. Technology is available to perform the meter reads and manipulate the data using a personal computer with minimal staff requirement. This is not meant to mislead the reader into assuming that there is no requirement for routine preventive maintenance. All equipment requires routine maintenance to maintain its accuracy. While PNL reviewed the data collected during the site visit, however, it became obvious that significant opportunities exist for reducing the utility costs other than accounting for actual consumption and demand. Unit costs for both steam and electricity are unnecessarily high, and options are presented in this report for reducing them. Additionally, NUWC has an opportunity to undertake a comprehensive energy resource management program to significantly reduce its energy demand, consumption, and costs.

  8. Naval Undersea Warfare Center Division Newport utilities metering, Phase 1

    Energy Technology Data Exchange (ETDEWEB)

    Carroll, D.M.

    1992-11-01

    Pacific Northwest Laboratory developed this report for the US Navy's Naval Undersea Warfare Center Division Newport, Rhode Island (NUWC). The purpose of the report was to review options for metering electricity and steam used in the NUWC compound, and to make recommendations to NUWC for implementation under a follow-on project. An additional NUWC concern is a proposed rate change by the servicing utility, Newport Electric, which would make a significant shift from consumption to demand billing, and what effect that rate change would have on the NUWC utility budget. Automated, remote reading meters are available which would allow NUWC to monitor its actual utility consumption and demand for both the entire NUWC compound and by end-use in individual buildings. Technology is available to perform the meter reads and manipulate the data using a personal computer with minimal staff requirement. This is not meant to mislead the reader into assuming that there is no requirement for routine preventive maintenance. All equipment requires routine maintenance to maintain its accuracy. While PNL reviewed the data collected during the site visit, however, it became obvious that significant opportunities exist for reducing the utility costs other than accounting for actual consumption and demand. Unit costs for both steam and electricity are unnecessarily high, and options are presented in this report for reducing them. Additionally, NUWC has an opportunity to undertake a comprehensive energy resource management program to significantly reduce its energy demand, consumption, and costs.

  9. Drone Warfare: Twenty-First Century Empire and Communications

    Directory of Open Access Journals (Sweden)

    Kevin Howley

    2017-02-01

    Full Text Available This paper, part of a larger project that examines drones from a social-construction of technology perspective, considers drone warfare in light of Harold Innis’s seminal work on empire and communication. Leveraging leading-edge aeronautics with advanced optics, data processing, and networked communication, drones represent an archetypal “space-biased” technology. Indeed, by allowing remote operators and others to monitor, select, and strike targets from half a world away, and in real-time, these weapon systems epitomize the “pernicious neglect of time” Innis sought to identify and remedy in his later writing. With Innis’s time-space dialectic as a starting point, then, the paper considers drones in light of a longstanding paradox of American culture: the impulse to collapse the geographical distance between the United States and other parts of the globe, while simultaneously magnifying the cultural difference between Americans and other peoples and societies. In the midst of the worldwide proliferation of drones, this quintessentially sublime technology embodies this (disconnect in important, profound, and ominous ways.

  10. Prevalence of Asthma in Children of Chemical Warfare Victims

    Science.gov (United States)

    Mirsadraee, Majid; Mozaffari, Abolfazl; Attaran, Davood

    2011-01-01

    Objective Exposure of DNA to sulfur mustard gas may increase the inheritance of asthma in chemical warfare victims' (CWV) offspring. The objective of this study was to determine the prevalence of asthma in children of CWV and compare it to asthmatic children in the general population. Methods Four hundred and nine children from 130 CWV fathers and 440 children from 145 asthmatic parents from two cities in Iran participated in this study. The prevalence of asthma was determined by standard questionnaire released for epidemiological survey of asthma in children and compared between two groups. Findings The prevalence of asthma in the CWV group was 15%; this was not significantly different from the control group (12.5%). The children of the CWV group reported a significantly greater incidence of wheezing (1.2±3.1 attacks) per year, but the control group reported more severe attacks leading to speech difficulties (3%) and coughing (7%). Regression analysis showed that with increasing family size in the control group, the number of subjects suffering from asthmatic symptoms decreases significantly (r=0.86, P=0.001). Conclusion Chemical agents may increase the prevalence of asthma in the offspring of CWV. PMID:23056804

  11. Studies on residue-free decontaminants for chemical warfare agents.

    Science.gov (United States)

    Wagner, George W

    2015-03-17

    Residue-free decontaminants based on hydrogen peroxide, which decomposes to water and oxygen in the environment, are examined as decontaminants for chemical warfare agents (CWA). For the apparent special case of CWA on concrete, H2O2 alone, without any additives, effectively decontaminates S-2-(diisopropylamino)ethyl O-ethyl methylphosphonothioate (VX), pinacolyl methylphosphorofluoridate (GD), and bis(2-choroethyl) sulfide (HD) in a process thought to involve H2O2 activation by surface-bound carbonates/bicarbonates (known H2O2 activators for CWA decontamination). A plethora of products are formed during the H2O2 decontamination of HD on concrete, and these are characterized by comparison to synthesized authentic compounds. As a potential residue-free decontaminant for surfaces other than concrete (or those lacking adsorbed carbonate/bicarbonate) H2O2 activation for CWA decontamination is feasible using residue-free NH3 and CO2 as demonstrated by reaction studies for VX, GD, and HD in homogeneous solution. Although H2O2/NH3/CO2 ("HPAC") decontaminants are active for CWA decontamination in solution, they require testing on actual surfaces of interest to assess their true efficacy for surface decontamination.

  12. Soldiers’ Psychological Responses to Tactical Nuclear Warfare

    Science.gov (United States)

    1992-02-01

    530. Greene , T.L. (1987). Description of a nuclear battlefield. In R.H. Young & B.H. Drum (Edo.), Proceedings of the Defense Nuclear Agency Symposium...ATTN: DEPT OF BEHAVOR SCI & LEADERSHIP ATTN: PMS/PMA-423 ATTN: DEPT OF PHYSICS COL J G CAMPBELL ATTN: SCIENCE RESEARCH LAB OPERATIONAL TEST & EVALUATION

  13. Ballistic Missile Defense in Europe

    OpenAIRE

    Sarihan, Ali; Bush, Amy; Summers, Lawrence; Thompson, Brent; Tomasszewski, Steven

    2009-01-01

    This paper will build on ballistic missile defense in Europe. In the first part, a brief historical overview will place the current public management issue into light. This is followed by a discussion of the main actors in the international debate, the problems that arise and the available options and recommendations to address missile defense. In the second part, differences between George W. Bush and Barack H. Obama will analyze under the title “Ballistic Missile Defense in Europe: Evolving...

  14. Defense Programs and Budget Risk

    National Research Council Canada - National Science Library

    Troutman, Mark D

    2006-01-01

    .... Therefore the Defense Department has set before itself a requirement to modernize a large conventional force structure engaged in ongoing combat operations while simultaneously developing deeper...

  15. Detection of biological warfare agents using ultra violet-laser induced fluorescence LIDAR.

    Science.gov (United States)

    Joshi, Deepti; Kumar, Deepak; Maini, Anil K; Sharma, Ramesh C

    2013-08-01

    This review has been written to highlight the threat of biological warfare agents, their types and detection. Bacterial biological agent Bacillus anthracis (bacteria causing the disease anthrax) which is most likely to be employed in biological warfare is being discussed in detail. Standoff detection of biological warfare agents in aerosol form using Ultra violet-Laser Induced Fluorescence (UV-LIF) spectroscopy method has been studied. Range-resolved detection and identification of biological aerosols by both nano-second and non-linear femto-second LIDAR is also discussed. Calculated received fluorescence signal for a cloud of typical biological agent Bacillus globigii (Simulants of B. anthracis) at a location of ~5.0 km at different concentrations in presence of solar background radiation has been described. Overview of current research efforts in internationally available working UV-LIF LIDAR systems are also mentioned briefly. Copyright © 2013 Elsevier B.V. All rights reserved.

  16. THE CYBER DIMENSION OF MODERN HYBRID WARFARE AND ITS RELEVANCE FOR NATO

    Directory of Open Access Journals (Sweden)

    Sorin DUCARU

    2016-06-01

    Full Text Available The technological development and the instant communication possibilities advanced not only economic and social developments, but also evolving threats from those who exploit the vulnerabilities of communication and information systems. The cyber threat landscape points to a significant increase of the frequency, intensity, duration and sophistication of cyber-attacks. One of the new and concerning trends is the use of cyber capabilities in relation with military of hybrid operations – the so-called cyber dimension of hybrid warfare. NATO’s strategy on countering hybrid warfare is based on the triad: prepare-deter-defend, which also applies to cyber. Nations represent the first line of defence in countering hybrid strategies. International cooperation is also a key factor in this sense. It is in this context that NATO’s response to cyber-attacks in the context of hybrid warfare must be further refined.

  17. An evolutionary theory of large-scale human warfare: Group-structured cultural selection.

    Science.gov (United States)

    Zefferman, Matthew R; Mathew, Sarah

    2015-01-01

    When humans wage war, it is not unusual for battlefields to be strewn with dead warriors. These warriors typically were men in their reproductive prime who, had they not died in battle, might have gone on to father more children. Typically, they are also genetically unrelated to one another. We know of no other animal species in which reproductively capable, genetically unrelated individuals risk their lives in this manner. Because the immense private costs borne by individual warriors create benefits that are shared widely by others in their group, warfare is a stark evolutionary puzzle that is difficult to explain. Although several scholars have posited models of the evolution of human warfare, these models do not adequately explain how humans solve the problem of collective action in warfare at the evolutionarily novel scale of hundreds of genetically unrelated individuals. We propose that group-structured cultural selection explains this phenomenon. © 2015 Wiley Periodicals, Inc.

  18. Changing the Scale and Efficiency of Chemical Warfare Countermeasure Discovery Using the Zebrafish

    Science.gov (United States)

    Peterson, Randall T.; MacRae, Calum A.

    2013-01-01

    As the scope of potential chemical warfare agents grows rapidly and as the diversity of potential threat scenarios expands with non-state actors, so a need for innovative approaches to countermeasure development has emerged. In the last few years, the utility of the zebrafish as a model organism that is amenable to high-throughput screening has become apparent and this system has been applied to the unbiased discovery of chemical warfare countermeasures. This review summarizes the in vivo screening approach that has been pioneered in the countermeasure discovery arena, and highlights the successes to date as well as the potential challenges in moving the field forward. Importantly, the establishment of a zebrafish platform for countermeasure discovery would offer a rapid response system for the development of antidotes to the continuous stream of new potential chemical warfare agents. PMID:24273586

  19. Defense.gov Special Report: Defense Officials Release Operational Energy

    Science.gov (United States)

    , DOD Operational Energy Strategy DOD's Operational Energy Strategy will guide the Defense Department to operations are among the goals of the Defense Department's operational energy strategy, a senior Pentagon operational energy footprint, experts in solar power, microgrids and "smart" generators recently

  20. Induction of defensive enzymes (isozymes) during defense against ...

    African Journals Online (AJOL)

    user

    2012-09-06

    Sep 6, 2012 ... defense against two different fungal pathogens in pear calli ... study the biochemical changes in relation to plant defense ... relatively easy to manipulate by empirical means, allowing for a ... earlier phase, and the degree of rot was significantly ..... resistance of fruit, and they play an important role in the.

  1. From Foreign Internal Defense to Unconventional Warfare: Campaign Transitions When US-Support to Friendly Governments Fails

    Science.gov (United States)

    2015-05-27

    country’s income.338 As the poor struggled with subsistence living, the rich lived lavish lifestyles often taking shopping trips to Miami. Poverty...this research. The times they patiently stayed in their rooms with their books always wondering how much homework dad really had. Second, I want to...

  2. Bioaccumulation of chemical warfare agents, energetic materials, and metals in deep-sea shrimp from discarded military munitions sites off Pearl Harbor

    Science.gov (United States)

    Koide, Shelby; Silva, Jeff A. K.; Dupra, Vilma; Edwards, Margo

    2016-06-01

    The bioaccumulation of munitions-related chemicals at former military deep-water disposal sites is poorly understood. This paper presents the results of human-food-item biota sampling to assess the potential for bioaccumulation of chemical warfare agents, energetic materials, arsenic, and additional munitions-related metals in deep-sea shrimp tissue samples collected during the Hawai'i Undersea Military Munitions Assessment (HUMMA) project to date. The HUMMA investigation area is located within a former munitions sea-disposal site located south of Pearl Harbor on the island of O'ahu, Hawai'i, designated site Hawaii-05 (HI-05) by the United States Department of Defense. Indigenous deep-sea shrimp (Heterocarpus ensifer) were caught adjacent to discarded military munitions (DMM) and at control sites where munitions were absent. Tissue analysis results showed that chemical warfare agents and their degradation products were not present within the edible portions of these samples at detectable concentrations, and energetic materials and their degradation products were detected in only a few samples at concentrations below the laboratory reporting limits. Likewise, arsenic, copper, and lead concentrations were below the United States Food and Drug Administration's permitted concentrations of metals in marine biota tissue (if defined), and their presence within these samples could not be attributed to the presence of DMM within the study area based on a comparative analysis of munitions-adjacent and control samples collected. Based on this current dataset, it can be concluded that DMM existing within the HUMMA study area is not contributing to the bioaccumulation of munitions-related chemicals for the biota species investigated to date.

  3. Skeletal evidence for Inca warfare from the Cuzco region of Peru.

    Science.gov (United States)

    Andrushko, Valerie A; Torres, Elva C

    2011-11-01

    This article addresses the bioarchaeological evidence for Inca warfare through an analysis of 454 adult skeletons from 11 sites in the Inca capital region of Cuzco, Peru. These 11 sites span almost 1000 years (AD 600-1532), which allows for a comparison of the evidence for warfare before the Inca came to power (Middle Horizon AD 600-1000), during the time of Inca ascendency in the Late Intermediate Period (AD 1000-1400), and after the Inca came to power and expanded throughout the Cuzco region and beyond (Inca Imperial Period, AD 1400-1532). The results indicate that 100 of 454 adults (22.0%) showed evidence of cranial trauma. Of these, 23 individuals had major cranial injuries suggestive of warfare, consisting of large, complete, and/or perimortem fractures. There was scant evidence for major injuries during the Middle Horizon (2.8%, 1/36) and Late Intermediate Period (2.5%, 5/199), suggesting that warfare was not prevalent in the Cuzco region before and during the Inca rise to power. Only in the Inca Imperial Period was there a significant rise in major injuries suggestive of warfare (7.8%, 17/219). Despite the significant increase in Inca times, the evidence for major cranial injuries was only sporadically distributed at Cuzco periphery sites and was entirely absent at Cuzco core sites. These findings suggest that while the Inca used warfare as a mechanism for expansion in the Cuzco region, it was only one part of a complex expansion strategy that included economic, political, and ideological means to gain and maintain control. Copyright © 2011 Wiley-Liss, Inc.

  4. Blaptica dubia as sentinels for exposure to chemical warfare agents - a pilot study.

    Science.gov (United States)

    Worek, Franz; Seeger, Thomas; Neumaier, Katharina; Wille, Timo; Thiermann, Horst

    2016-11-16

    The increased interest of terrorist groups in toxic chemicals and chemical warfare agents presents a continuing threat to our societies. Early warning and detection is a key component for effective countermeasures against such deadly agents. Presently available and near term solutions have a number of major drawbacks, e.g. lack of automated, remote warning and detection of primarily low volatile chemical warfare agents. An alternative approach is the use of animals as sentinels for exposure to toxic chemicals. To overcome disadvantages of vertebrates the present pilot study was initiated to investigate the suitability of South American cockroaches (Blaptica dubia) as warning system for exposure to chemical warfare nerve and blister agents. Initial in vitro experiments with nerve agents showed an increasing inhibitory potency in the order tabun - cyclosarin - sarin - soman - VX of cockroach cholinesterase. Exposure of cockroaches to chemical warfare agents resulted in clearly visible and reproducible reactions, the onset being dependent on the agent and dose. With nerve agents the onset was related to the volatility of the agents. The blister agent lewisite induced signs largely comparable to those of nerve agents while sulfur mustard exposed animals exhibited a different sequence of events. In conclusion, this first pilot study indicates that Blaptica dubia could serve as a warning system to exposure of chemical warfare agents. A cockroach-based system will not detect or identify a particular chemical warfare agent but could trigger further actions, e.g. specific detection and increased protective status. By designing appropriate boxes with (IR) motion sensors and remote control (IR) camera automated off-site warning systems could be realized. Copyright © 2016 Elsevier Ireland Ltd. All rights reserved.

  5. 77 FR 5781 - Record of Decision for the Air Space Training Initiative Shaw Air Force Base, South Carolina...

    Science.gov (United States)

    2012-02-06

    ... DEPARTMENT OF DEFENSE Department of the Air Force Record of Decision for the Air Space Training Initiative Shaw Air Force Base, South Carolina Final Environmental Impact Statement ACTION: Notice of... signed the ROD for the Airspace Training Initiative Shaw Air Force Base, South Carolina Final...

  6. Antipredator defenses predict diversification rates

    Science.gov (United States)

    Arbuckle, Kevin; Speed, Michael P.

    2015-01-01

    The “escape-and-radiate” hypothesis predicts that antipredator defenses facilitate adaptive radiations by enabling escape from constraints of predation, diversified habitat use, and subsequently speciation. Animals have evolved diverse strategies to reduce the direct costs of predation, including cryptic coloration and behavior, chemical defenses, mimicry, and advertisement of unprofitability (conspicuous warning coloration). Whereas the survival consequences of these alternative defenses for individuals are well-studied, little attention has been given to the macroevolutionary consequences of alternative forms of defense. Here we show, using amphibians as the first, to our knowledge, large-scale empirical test in animals, that there are important macroevolutionary consequences of alternative defenses. However, the escape-and-radiate hypothesis does not adequately describe them, due to its exclusive focus on speciation. We examined how rates of speciation and extinction vary across defensive traits throughout amphibians. Lineages that use chemical defenses show higher rates of speciation as predicted by escape-and-radiate but also show higher rates of extinction compared with those without chemical defense. The effect of chemical defense is a net reduction in diversification compared with lineages without chemical defense. In contrast, acquisition of conspicuous coloration (often used as warning signals or in mimicry) is associated with heightened speciation rates but unchanged extinction rates. We conclude that predictions based on the escape-and-radiate hypothesis must incorporate the effect of traits on both speciation and extinction, which is rarely considered in such studies. Our results also suggest that knowledge of defensive traits could have a bearing on the predictability of extinction, perhaps especially important in globally threatened taxa such as amphibians. PMID:26483488

  7. Efikasnost sistema PVO u uslovima elektronskih dejstava / Efficiency of antiaircraft system in electronic warfare

    Directory of Open Access Journals (Sweden)

    Vladimir V. Šepec

    2007-01-01

    Full Text Available U radu je primenjena teorija masovnog opsluživanja u analizi efikasnosti sistema protivvazduhoplovne odbrane (sistema PVO u uslovima elektronskih dejstava protivnika. Prikazan je model za ocenu efikasnosti sistema PVO i predstavljeni su izrazi za procenu efikasnosti sistema PVO u uslovima elektronskih dejstava. / In this article the theory of mass servicing is used in the analysis of efficiency of antiaircraft system in the conditions of electronic warfare. The model for analysis of the antiaircraft system efficiency has been shown and formulas for qualitative analysis of antiaircraft system efficiency have been presented in the conditions of electronic warfare.

  8. Particle Swarm Social Adaptive Model for Multi-Agent Based Insurgency Warfare Simulation

    Energy Technology Data Exchange (ETDEWEB)

    Cui, Xiaohui [ORNL; Potok, Thomas E [ORNL

    2009-12-01

    To better understand insurgent activities and asymmetric warfare, a social adaptive model for modeling multiple insurgent groups attacking multiple military and civilian targets is proposed and investigated. This report presents a pilot study using the particle swarm modeling, a widely used non-linear optimal tool to model the emergence of insurgency campaign. The objective of this research is to apply the particle swarm metaphor as a model of insurgent social adaptation for the dynamically changing environment and to provide insight and understanding of insurgency warfare. Our results show that unified leadership, strategic planning, and effective communication between insurgent groups are not the necessary requirements for insurgents to efficiently attain their objective.

  9. Tissue-based water quality biosensors for detecting chemical warfare agents

    Science.gov (United States)

    Greenbaum, Elias [Oak Ridge, TN; Sanders, Charlene A [Knoxville, TN

    2003-05-27

    A water quality sensor for detecting the presence of at least one chemical or biological warfare agent includes: a cell; apparatus for introducing water into the cell and discharging water from the cell adapted for analyzing photosynthetic activity of naturally occurring, free-living, indigenous photosynthetic organisms in water; a fluorometer for measuring photosynthetic activity of naturally occurring, free-living, indigenous photosynthetic organisms drawn into the cell; and an electronics package that analyzes raw data from the fluorometer and emits a signal indicating the presence of at least one chemical or biological warfare agent in the water.

  10. Global Networks: Emerging Constraints on Strategy (Defense Horizons, July 2004)

    National Research Council Canada - National Science Library

    Fonow, Bob

    2004-01-01

    .... This shift is problematic for U.S. national security, because the global telecommunications infrastructure is becoming an important strategic battlespace the physical battlefield of information warfare...

  11. Defensive repertoire of Drosophila larvae in response to toxic fungi.

    Science.gov (United States)

    Trienens, Monika; Kraaijeveld, Ken; Wertheim, Bregje

    2017-10-01

    Chemical warfare including insecticidal secondary metabolites is a well-known strategy for environmental microbes to monopolize a food source. Insects in turn have evolved behavioural and physiological defences to eradicate or neutralize the harmful microorganisms. We studied the defensive repertoire of insects in this interference competition by combining behavioural and developmental assays with whole-transcriptome time-series analysis. Confrontation with the toxic filamentous fungus Aspergillus nidulans severely reduced the survival of Drosophila melanogaster larvae. Nonetheless, the larvae did not behaviourally avoid the fungus, but aggregated at it. Confrontation with fungi strongly affected larval gene expression, including many genes involved in detoxification (e.g., CYP, GST and UGT genes) and the formation of the insect cuticle (e.g., Tweedle genes). The most strongly upregulated genes were several members of the insect-specific gene family Osiris, and CHK-kinase-like domains were over-represented. Immune responses were not activated, reflecting the competitive rather than pathogenic nature of the antagonistic interaction. While internal microbes are widely acknowledged as important, our study emphasizes the underappreciated role of environmental microbes as fierce competitors. © 2017 John Wiley & Sons Ltd.

  12. High Altitude Warfare: The Kargil Conflict and the Future

    National Research Council Canada - National Science Library

    Acosta, Marcus

    2003-01-01

    The unique combination of thin air, freezing temperatures, and mountainous terrain that forms the high altitude environment has resisted advances in military technology for centuries, The emergence...

  13. Air Force and the Cyberspace Mission: Defending the Air Force's Computer Network in the Future

    National Research Council Canada - National Science Library

    Courville, Shane P

    2007-01-01

    .... Although the Air Force and the Department of Defense (DoD) in general, have numerous safeguards in effect to protect systems and their networks, DoD relies on a system that is "passive" when encountering cyber threats...

  14. Defense Reutilization and Marketing Manual

    Science.gov (United States)

    1990-03-01

    H -3 E Responsibilities of Defense Reutilization and Marketing Regions (D R M s...at Defense electronic products which produce radiation Reutilization and Marketing Offices, para- when energized. Among the principal radi- graph F... Sporting Equipment 7820 Games , Toys, and Wheeled Goods 7830 Recreational and Gymnastic Equipment 7910 Floor Polishers and Vacuum Cleaning Equipment

  15. Defense Acquisitions Acronyms and Terms

    Science.gov (United States)

    2012-12-01

    DR Decision Review DRMO Defense Reutilization Marketing Office DRPM Direct Reporting Program Manager DSAA Defense Security Assistance Agency...STE Special Test Equipment STEP Simulation, Test, and Evaluation Process STLDD Software Top Level Design Document STP Software Test Plan STPR...established catalog or market prices for specific tasks under standard commercial terms and conditions; this does not include services sold based

  16. A Dynamic Defense Modeling and Simulation Methodology using Semantic Web Services

    Directory of Open Access Journals (Sweden)

    Kangsun Lee

    2010-04-01

    Full Text Available Defense Modeling and Simulations require interoperable and autonomous federates in order to fully simulate complex behavior of war-fighters and to dynamically adapt themselves to various war-game events, commands and controls. In this paper, we propose a semantic web service based methodology to develop war-game simulations. Our methodology encapsulates war-game logic into a set of web services with additional semantic information in WSDL (Web Service Description Language and OWL (Web Ontology Language. By utilizing dynamic discovery and binding power of semantic web services, we are able to dynamically reconfigure federates according to various simulation events. An ASuW (Anti-Surface Warfare simulator is constructed to demonstrate the methodology and successfully shows that the level of interoperability and autonomy can be greatly improved.

  17. Defense Technology Objectives for the Joint Warfighting Science and Technology Plan and the Defense Technology Area Plan

    National Research Council Canada - National Science Library

    1998-01-01

    .... Technologies such as radar, jet engines, nuclear weapons, night vision, smart weapons, stealth, the Global Positioning System, and vastly more capable information management systems have changed warfare dramatically...

  18. BLACK HAWK DOWN: A STORY OF MODERN WARFARE

    OpenAIRE

    Abel Esterhuyse

    2012-01-01

    Robert D. Kaplan in his illuminating article "The Coming Anarchy", published in the Atlantic Monthly of February 1994, emphasises the fact that "Africa may be marginal in terms of conventional late-twentieth-century conceptions of strategy, but in an age of cultural and racial clash, when national defense is increasingly local, Africa's distress will exert a destabilizing influence on the United States ". This point was clearly illustrated during 1993 in a battle between American Colin Gray; ...

  19. Naval Air Warfare Center, Aircraft Division at Warminster Environmental Materials Program. Phase 1.

    Science.gov (United States)

    1992-06-24

    potential for saving significant man -hours: 1) no engine cooldown would be required; 2) no dilution would be needed since the products are available...1 Watertown, MA 02172 Betz MetGhem ...................... ......................... 1 Attn: R. lezzi 4636 Somerton Rd. Trevose

  20. Airpower and the Environment: The Ecological Implications of Modern Air Warfare

    Science.gov (United States)

    2013-07-01

    competency.54 Knowledge of the foundational concepts and domains of culture and enhancing behaviors such as cultural relativism will promote and sustain...ned as “the ability to adapt eec- tively in cross- cultural environments.” Sands, “ Cultural Relativism ,” 13. e DOD has identied 3C as a necessary... Relativism and the Convergence of Ethnography and 3C [cross- cultural competence].” Military Intelligence Professional Bulletin, PB-34-12-1 (January/March