WorldWideScience

Sample records for animal-associated bacteria warfare

  1. Chemical language and warfare of bacterial natural products in bacteria-nematode-insect interactions.

    Science.gov (United States)

    Shi, Yi-Ming; Bode, Helge B

    2018-01-23

    Covering: up to November 2017Organismic interaction is one of the fundamental principles for survival in any ecosystem. Today, numerous examples show the interaction between microorganisms like bacteria and higher eukaryotes that can be anything between mutualistic to parasitic/pathogenic symbioses. There is also increasing evidence that microorganisms are used by higher eukaryotes not only for the supply of essential factors like vitamins but also as biological weapons to protect themselves or to kill other organisms. Excellent examples for such systems are entomopathogenic nematodes of the genera Heterorhabditis and Steinernema that live in mutualistic symbiosis with bacteria of the genera Photorhabdus and Xenorhabdus, respectively. Although these systems have been used successfully in organic farming on an industrial scale, it was only shown during the last 15 years that several different natural products (NPs) produced by the bacteria play key roles in the complex life cycle of the bacterial symbionts, the nematode host and the insect prey that is killed by and provides nutrients for the nematode-bacteria pair. Since the bacteria can switch from mutualistic to pathogenic lifestyle, interacting with two different types of higher eukaryotes, and since the full system with all players can be established in the lab, they are promising model systems to elucidate the natural function of microbial NPs. This review summarizes the current knowledge as well as open questions for NPs from Photorhabdus and Xenorhabdus and tries to assign their roles in the tritrophic relationship.

  2. Governing Warfare

    DEFF Research Database (Denmark)

    Harste, Gorm

      It would seem as though warfare has gotten out of control, not only in Iraq and Afghanistan, but also in Central Africa. The paper outlines the strategic history of politically controlled warfare since the early Enlightenment. The argument is that control is implausible. The idea of control has...... the risks of lacking unity and displays the organisational trap to the fatal political myth of controlled warfare: Does it come from the military organisation system itself, from political ideologies of goal-rational governance, or from the chameleonic logic of wars?  ...

  3. Information Warfare

    OpenAIRE

    Darczewska, Jolanta; Żochowski, Piotr; Orttung, Robert W.; Laruelle, Marlene; Pörzgen, Gemma

    2017-01-01

    This edition addresses information warfare. Firstly, Jolanta Darczewska and Piotr Żochowski examine the use of “active measures” by Russian special services in support of Russian foreign policy. Secondly, Robert W. Orttung argues that Russia has sought to use various information warfare techniques to sow division and chaos in the U.S., but it remains unclear to what extent Russian actions had an impact on the thinking or behavior of American citizens. Thirdly, Marlene Laruelle considers the t...

  4. Air Warfare

    Science.gov (United States)

    2002-03-01

    genus as its predecessor of pre-war days. It would, however, be erroneous to conclude from this that the military value of each new development was...marked by periods of crescendo, air warfare will consist of a succession of actions of great violence , with periods of almost complete calm between...influence of time, if it should require fif- teen seconds for each airplane to take off, and one minute to land, the commander of a group of 100 airplanes

  5. Hybrid Warfare

    Science.gov (United States)

    2013-08-01

    Office, Title 10, U.S. Code ; Act of 5 May 1960. 3. 2010 Quadrennial Defense Review Report, February 2010, 8. 4. Hybrid Warfare, Global Accountability...Rise of Hybrid Wars.” Proceedings 132 (November 2005); William J. Nemeth , Future War and Chechnya: A Case for Hybrid War- fare (master’s thesis, U.S...William J. Nemeth which represents the earliest scholarly work on the subject, in which the emergence of devolved hybrid societies gives rise to hybrid

  6. Drone warfare

    Science.gov (United States)

    Gusterson, Hugh

    2017-11-01

    Crude drones existed as early as World War I, but the technology matured in the Yugoslav Wars of the 1990s and the current wars around the Middle East. The U.S. first used a weaponized drone in late 2001, in Afghanistan. Drones may cause more or less civilian casualties depending on the targeting protocols employed by their operators. There is an inherent ambiguity in determining who is an insurgent from several thousand feet, but civilian casualties are likely to be higher if targeters emphasize "signature strikes" over "personality strikes," if they engage in "double-tap strikes," if they rely too much on local informants, and if they rely too heavily on cellphone identification in the absence of corroboration from other intelligence sources. The legality of drone warfare is fairly clear in established battle zones such as Afghanistan, but is more problematic in terms of both international and domestic law when it comes to drone strikes in countries such as Yemen, Pakistan and Somalia with which the U.S. is not at war. Looking to the future, the U.S. would be well advised to sponsor negotiations for an international drone convention that might establish clear international rules for the use of drones, ban autonomous smart drones, and establish adjudicatory procedures to handle allegations of war crimes.

  7. Information Warfare and International Law

    National Research Council Canada - National Science Library

    Greenberg, Lawrence T; Goodman, Seymour E; Soo Hoo, Kevin J

    1998-01-01

    The development of "information warfare" presents international legal issues that will complicate nations' efforts both to execute and to respond to certain information warfare attacks, specifically...

  8. Hybrid Warfare and Lawfare

    OpenAIRE

    Bachmann, Sascha-Dominik; Mosquera, Andres B Munoz

    2015-01-01

    Hybrid Warfare as a method of war is not new. The change today appears to be that Hybrid Warfare “has the potential to transform the strategic calculations of potential belligerents [it has become] increasingly sophisticated and deadly”. This short paper presents Hybrid Warfare and one of its methods, lawfare. For this, we provide a current, comprehensive definition of hybrid warfare and examine different areas where law has been/is being used as a method of war. This paper focuses on the fol...

  9. Flying Electronic Warfare Laboratory

    Data.gov (United States)

    Federal Laboratory Consortium — FUNCTION: Provides NP-3D aircraft host platforms for Effectiveness of Navy Electronic Warfare Systems (ENEWS) Program antiship missile (ASM) seeker simulators used...

  10. Information Warfare and Ethics

    Directory of Open Access Journals (Sweden)

    M.J. Warren

    2001-05-01

    Full Text Available This paper examines the ethics of the practice of information warfare at both the national and corporate levels. Initially examining the present and past actions of individual hackers, it moves to the more organised, future military and economic warfare scenarios. It examines the lack of legal or policy initiatives in this area.

  11. Defining cyber warfare

    Directory of Open Access Journals (Sweden)

    Dragan D. Mladenović

    2012-04-01

    Full Text Available Cyber conflicts represent a new kind of warfare that is technologically developing very rapidly. Such development results in more frequent and more intensive cyber attacks undertaken by states against adversary targets, with a wide range of diverse operations, from information operations to physical destruction of targets. Nevertheless, cyber warfare is waged through the application of the same means, techniques and methods as those used in cyber criminal, terrorism and intelligence activities. Moreover, it has a very specific nature that enables states to covertly initiate attacks against their adversaries. The starting point in defining doctrines, procedures and standards in the area of cyber warfare is determining its true nature. In this paper, a contribution to this effort was made through the analysis of the existing state doctrines and international practice in the area of cyber warfare towards the determination of its nationally acceptable definition.

  12. Cyber Warfare/Cyber Terrorism

    National Research Council Canada - National Science Library

    O'Hara, Timothy

    2004-01-01

    Section 1 of this paper provides an overview of cyber warfare as an element of information warfare, starting with the general background of the current strategic environment the United States is operating...

  13. Chemical warfare agents

    Directory of Open Access Journals (Sweden)

    Vijayaraghavan R

    2010-01-01

    Full Text Available Among the Weapons of Mass Destruction, chemical warfare (CW is probably one of the most brutal created by mankind in comparison with biological and nuclear warfare. Chemical weapons are inexpensive and are relatively easy to produce, even by small terrorist groups, to create mass casualties with small quantities. The characteristics of various CW agents, general information relevant to current physical as well as medical protection methods, detection equipment available and decontamination techniques are discussed in this review article. A brief note on Chemical Weapons Convention is also provided.

  14. Gray Zone Warfare: German and Russian Political Warfare, 1935-1939, and 2001

    Science.gov (United States)

    2017-06-09

    separated periods. 15. SUBJECT TERMS Political Warfare, Psychological Warfare, Unconventional Warfare, Hybrid Warfare, Asymmetrical Warfare, Gray Zone...Russia ............................................................................................................................ 56 Psychological ...the waging of psychological and economic warfare to the furtherance of war aims and the organization of the fighting strength of the nation to the

  15. Biological and Chemical Warfare

    African Journals Online (AJOL)

    and entrails over the walls to induce a plaque and defecate into wells and water supplies. The. Romans tilted ... modern military weapons, discussions of their characteristics and potential threat have to draw heavily upon .... poisoning of water in desert warfare is his- torical, having continued through the time of. World War II.

  16. The Physics of Warfare

    Science.gov (United States)

    Giordano, Gerardo

    2015-01-01

    Recently, I was tasked with the creation and execution of a new themed general education physics class called The Physics of Warfare. In the past, I had used the theme of a class, such as the physics of sports medicine, as a way to create homework and in-class activities, generate discussions, and provide an application to demonstrate that physics…

  17. Hybrid Maritime Warfare

    DEFF Research Database (Denmark)

    Schaub Jr, Gary John; Murphy, Martin; Hoffman, Frank

    2017-01-01

    Russia’s use of hybrid warfare techniques has raised concerns about the security of the Baltic States. Gary Schaub, Jr, Martin Murphy and Frank G Hoffman recommend a series of measures to augment NATO’s Readiness Action Plan in the Baltic region, including increasing the breadth and depth of naval...... of a larger hybrid campaign...

  18. Refocusing Cyber Warfare Thought

    Science.gov (United States)

    2013-02-01

    the service placed two vastly different career fields into a single training pipeline? Does radar jamming belong to the same class of warfare as...patch newly discovered flaws, and private antivirus companies that develop signatures to inoculate systems to new mal- ware.21 Meanwhile, highly

  19. Electronic Warfare Signature Measurement Facility

    Data.gov (United States)

    Federal Laboratory Consortium — The Electronic Warfare Signature Measurement Facility contains specialized mobile spectral, radiometric, and imaging measurement systems to characterize ultraviolet,...

  20. Information Warfare and International Law

    National Research Council Canada - National Science Library

    Greenberg, Lawrence T; Goodman, Seymour E; Soo Hoo, Kevin J

    1998-01-01

    .... Some legal constraints will certainly apply to information warfare, either because the constraints explicitly regulate particular actions, or because more general principles of international law...

  1. Psychological effects of nuclear warfare

    International Nuclear Information System (INIS)

    Mickley, G.A.

    1987-01-01

    This report is divided into five parts. (1) Discussion of the psychological milieu before a nuclear confrontation. (2) Acute psychological reactions to nuclear warfare (some of which may reflect, in part, direct radiogenic alteration of nervous system functions). (3) Chronic psychological effects of a nuclear confrontation. (4) Issues concerning treatment of these psychological changes. (5) Prevention of adverse psychological reactions to nuclear warfare

  2. Bioactive Natural Products from Animal Associated-Microbes.

    Science.gov (United States)

    Tian, Yuan; Li, Yan-Ling; Zhao, Feng-Chun

    2017-01-01

    Animal associated-microbes are miroorganisms living inside animal hosts during some parts of their life. In view of the special environment, it is considered that the unique microbes might be the producer of new compounds with diversity biological activities. This review summarizes new findings (mainly described since 2011) concerning the characteristics of various natural products that can be extracted from animal associated-microbes, highlighting that animal related microorganisms represent an underexplored reservoir for the discovery of molecules with unique scaffolds and promising biological activities. Copyright© Bentham Science Publishers; For any queries, please email at epub@benthamscience.org.

  3. The evolution of human warfare.

    Science.gov (United States)

    Pitman, George R

    2011-01-01

    Here we propose a new theory for the origins and evolution of human warfare as a complex social phenomenon involving several behavioral traits, including aggression, risk taking, male bonding, ingroup altruism, outgroup xenophobia, dominance and subordination, and territoriality, all of which are encoded in the human genome. Among the family of great apes only chimpanzees and humans engage in war; consequently, warfare emerged in their immediate common ancestor that lived in patrilocal groups who fought one another for females. The reasons for warfare changed when the common ancestor females began to immigrate into the groups of their choice, and again, during the agricultural revolution.

  4. Cyber Warfare/Cyber Terrorism

    National Research Council Canada - National Science Library

    O'Hara, Timothy

    2004-01-01

    .... Section 1 concludes with a review of offensive and defensive cyber warfare concepts. Section 2 presents a general overview of cyber terrorism, including definitions of cyber terrorism and cyber terrorism support...

  5. Attrition in Network Centric Warfare

    National Research Council Canada - National Science Library

    Erbetta, John

    2003-01-01

    .... Information warfare means that positive attacks on systems themselves compound the problem. Emerging technologies applicable to NCW as a force multiplier need to be recognized as counter to the impediments to progress...

  6. The ethics of information warfare

    CERN Document Server

    Floridi, Luciano

    2014-01-01

    This book offers an overview of the ethical problems posed by Information Warfare, and of the different approaches and methods used to solve them, in order to provide the reader with a better grasp of the ethical conundrums posed by this new form of warfare.The volume is divided into three parts, each comprising four chapters. The first part focuses on issues pertaining to the concept of Information Warfare and the clarifications that need to be made in order to address its ethical implications. The second part collects contributions focusing on Just War Theory and its application to the case of Information Warfare. The third part adopts alternative approaches to Just War Theory for analysing the ethical implications of this phenomenon. Finally, an afterword by Neelie Kroes - Vice President of the European Commission and European Digital Agenda Commissioner - concludes the volume. Her contribution describes the interests and commitments of the European Digital Agenda with respect to research for the developme...

  7. Air Power and Maneuver Warfare

    Science.gov (United States)

    1994-07-01

    way to integrate air power on the one hand with maneuver warfare on the other. While American commanders such as Robert E. Lee and George S. Patton...MANEUVER WARFARE years .’ Nevertheless, it should not be forgotten that few commanders of any time or place have fought as many great battles- batailles ...the process to a boxer who uses one arm to parry his opponent’s punches and draw his attention while striking with the other. Gen George S. Patton

  8. Nuclear radiation in warfare

    International Nuclear Information System (INIS)

    Rotblat, J.

    1986-01-01

    The subject is covered in chapters, entitled: introduction; digest of nuclear weaponry (characteristics of nuclear weapons; effects of nuclear weapons other than ionizing radiation (fire-ball, fall-out, thermal radiation, blast wave, electromagnetic pulse); the nuclear arms race; war scenarios; biological effects of radiations on man (radiation doses; natural sources of radiation; acute effects of radiation; long-term somatic effects; genetic effects; factors affecting the biological response to radiation; internal exposure; synergistic effects; protection against radiation effects); radiations from nuclear explosions (initial radiation; fall-out; effects of fall-out on animal and plant life; contamination of water and food supplies by fall-out); radiation casualties in a nuclear war; effectiveness of civil defence; other warlike uses of radiation (attacks on civilian nuclear power installations; radiological warfare; terrorist activities); conclusion. (orig./HP) [de

  9. Nuclear radiation in warfare

    International Nuclear Information System (INIS)

    Rotblat, J.

    1981-01-01

    The subject is covered in chapters, entitled: introduction; digest of nuclear weaponry (characteristics of nuclear weapons; effects of nuclear weapons other than ionizing radiation (fire-ball, fall-out, thermal radiation, blast wave, electromagnetic pulse); the nuclear arms race; war scenarios); biological effects of radiations on man (radiation doses; natural sources of radiation; acute effects of radiation; long-term somatic effects; genetic effects; factors affecting the biological response to radiation; internal exposure; synergistic effects; protection against radiation effects); radiations from nuclear explosions (initial radiation; fall-out; effects of fall-out on animal and plant life; contamination of water and food supplies by fall-out); radiation casualties in a nuclear war; effectiveness of civil defence; other warlike uses of radiation (attacks on civilian nuclear power installations; radiological warfare; terrorist activities); conclusion. (U.K.)

  10. Reflections on nuclear warfare

    International Nuclear Information System (INIS)

    Evans, J.P.

    1983-01-01

    The author looks back on his more than 70 years of familiarity with Americans involved in warfare, noting their loyal support for our country's objectives. Drawing on the Einstein equation, his own visits to Hiroshima and Nagasaki, and current literature, he, as a physician, belatedly concurs with those who look on the use of nuclear weapons as irrational and untenable. Their employment under present circumstances would create a ''final epidemic'' to be avoided only by prevention. He suggests that medical perceptions must be considered by our national leaders in assessing the many factors that he hopes will lead to rational answers to this urgent, highly complex, and vital enigma. He cites physicians' efforts to help in finding answers and asks that his colleagues consider the issues with attention to the gravity of the situation and act according to their best judgment

  11. Intelligence Strategy for Fourth Generation Warfare

    National Research Council Canada - National Science Library

    Jamison, Edward P

    2006-01-01

    ...." They have named this new era of war "fourth generation warfare." Currently the Department of Defense's intelligence strategy is designed to defeat conventional adversaries vise a fourth generation warfare opponent...

  12. ISIL's Hybrid Warfare in Syria & Iraq

    DEFF Research Database (Denmark)

    Sørensen, Heine

    2016-01-01

    The case study specifically seeks to answer the following problem statement: Does ISIL qualify as an actor using hybrid warfare and if so what characterizes their particular use of this type of warfare? Based on an analysis of ISIL’s warfare from August 2012 to August 2016 the chapter argues, tha...

  13. Special Warfare: A Selected Bibliography.

    Science.gov (United States)

    1983-10-01

    Digest, Vol. 18, January 1963, pp. 36-41. 313. Van de Velde , R. W. "the Neglected Deterrent (Guerrilla Warfare)." Military Review, Vol. 38, August...34Principles of Modern Chinese Strategy." NATO’s Fifteen Nations, Vol. 8, June-July 1963, pp. 44-49. 255. Purcell, Henry . "Night Patrolling and District...September 1970, pp. 2-8. 331. Whittier, Henry S. "Soviet Special Operations/Partisan Warfare: Implications for Today." Military Review, Vol. 59, January 1979

  14. The doctor and nuclear warfare

    International Nuclear Information System (INIS)

    Anon.

    1982-01-01

    At the 34th World Medical Assembly in Lisbon in 1981 the World Medical Association adopted a motion proposed by the American Medical Association that national medical associations should develop programs to educate the civilian population on the medical consequences of nuclear war. This article discusses the attitude the medical professions should have, should nuclear warfare in some form confront them in the future. The conclusion is drawn that defence against nuclear warfare is only a part of civil defence against any disaster, including the natural disasters such as flood and fire and the man-made disasters of transport accidents, even of problems at nuclear plants designed to supply energy

  15. The Anatomy of Counterinsurgency Warfare

    DEFF Research Database (Denmark)

    Mouritsen, Lars; Pedersen, Kenneth; Thruelsen, Peter Dahl

    Since the beginning of the new millennium, the West has been increasingly involved in a tiresome and rather particular type of conflict: insurgency warfare. The bloody and shocking terrorist attacks on New York and Washington in September 2001 marked the beginning of a new era, and the introducti...

  16. European Curricula, Xenophobia and Warfare.

    Science.gov (United States)

    Coulby, David

    1997-01-01

    Examines school and university curricula in Europe and the extent of their influence on xenophobia. Considers the pluralistic nature of the European population. Discusses the role of curriculum selection and language policy in state efforts to promote nationalism. Assesses the role of curricular systems in the actual encouragement of warfare,…

  17. Information and Knowledge Centric Warfare: The Next Steps in the Evolution of Warfare

    National Research Council Canada - National Science Library

    Phister, Jr., Paul W; Plonisch, Igor G

    2004-01-01

    ...: transitioning from network-centric/information-centric to knowledge-centric warfare. Network-centric warfare is built around human and organizational behavior a new way of thinking in terms of linkages...

  18. UML modelling of network warfare examples

    CSIR Research Space (South Africa)

    Veerasamy, N

    2011-08-01

    Full Text Available will be determined by arguing their application to Network Warfare A. Consideration of Network Warfare Attributes Network Warfare can be seen as taking place over Information and Communication Technology (ICT) networks to affect information processing... the works of Theohandou, Tipton and Sowa, the following information security techniques emerge: Risk Analysis, Physical Security, Incident Response, Disaster Recovery Planning, Security Awareness, Legal, Regulations and Compliance [15] [16] [17...

  19. MEANS AND METHODS OF CYBER WARFARE

    Directory of Open Access Journals (Sweden)

    Dan-Iulian VOITAȘEC

    2016-06-01

    Full Text Available According to the Declaration of Saint Petersburg of 1868 “the only legitimate object which States should endeavor to accomplish during war is to weaken the military forces of the enemy”. Thus, International Humanitarian Law prohibits or limits the use of certain means and methods of warfare. The rapid development of technology has led to the emergence of a new dimension of warfare. The cyber aspect of armed conflict has led to the development of new means and methods of warfare. The purpose of this paper is to study how the norms of international humanitarian law apply to the means and methods of cyber warfare.

  20. Cyber warfare building the scientific foundation

    CERN Document Server

    Jajodia, Sushil; Subrahmanian, VS; Swarup, Vipin; Wang, Cliff

    2015-01-01

    This book features a wide spectrum of the latest computer science research relating to cyber warfare, including military and policy dimensions. It is the first book to explore the scientific foundation of cyber warfare and features research from the areas of artificial intelligence, game theory, programming languages, graph theory and more. The high-level approach and emphasis on scientific rigor provides insights on ways to improve cyber warfare defense worldwide. Cyber Warfare: Building the Scientific Foundation targets researchers and practitioners working in cyber security, especially gove

  1. Shadow Wars: An Analysis of Counterinsurgency Warfare

    National Research Council Canada - National Science Library

    Dogan, Osman

    2005-01-01

    ... of the current strategic approaches to counterinsurgency warfare. Toward this end, a systems model approach, which views insurgent organizations as open systems, is adapted to the insurgent environment...

  2. Radioecological aspects of nuclear warfare

    International Nuclear Information System (INIS)

    Edvardson, Kay

    1977-01-01

    Radioactive fallout, one of the major effects of nuclear warfare, will cause acute radiation sickness within the close-in or intermediate areas downwind from surface bursts. Global fallout from high yield explosions will be fairly evenly distributed in the hemisphere where the explosions occur, and will cause irradiation from ground deposit, inhaled material and contaminated food. Estimates of collective doses and the approximate number of late casualties from the global contamination are presented for a given total explosion yield. (author)

  3. Detection of biological warfare agents using ultra violet-laser induced fluorescence LIDAR.

    Science.gov (United States)

    Joshi, Deepti; Kumar, Deepak; Maini, Anil K; Sharma, Ramesh C

    2013-08-01

    This review has been written to highlight the threat of biological warfare agents, their types and detection. Bacterial biological agent Bacillus anthracis (bacteria causing the disease anthrax) which is most likely to be employed in biological warfare is being discussed in detail. Standoff detection of biological warfare agents in aerosol form using Ultra violet-Laser Induced Fluorescence (UV-LIF) spectroscopy method has been studied. Range-resolved detection and identification of biological aerosols by both nano-second and non-linear femto-second LIDAR is also discussed. Calculated received fluorescence signal for a cloud of typical biological agent Bacillus globigii (Simulants of B. anthracis) at a location of ~5.0 km at different concentrations in presence of solar background radiation has been described. Overview of current research efforts in internationally available working UV-LIF LIDAR systems are also mentioned briefly. Copyright © 2013 Elsevier B.V. All rights reserved.

  4. The Information Warfare Life Cycle Model

    Directory of Open Access Journals (Sweden)

    Brett van Niekerk

    2011-03-01

    Full Text Available Information warfare (IW is a dynamic and developing concept, which constitutes a number of disciplines. This paper aims to develop a life cycle model for information warfare that is applicable to all of the constituent disciplines. The model aims to be scalable and applicable to civilian and military incidents where information warfare tactics are employed. Existing information warfare models are discussed, and a new model is developed from the common aspects of these existing models. The proposed model is then applied to a variety of incidents to test its applicability and scalability. The proposed model is shown to be applicable to multiple disciplines of information warfare and is scalable, thus meeting the objectives of the model.

  5. WARFARE IN THE INFORMATION AGE

    Directory of Open Access Journals (Sweden)

    Laurian GHERMAN

    2010-01-01

    Full Text Available The paper is focused on changes occurred in military organizations in Information Age. During Industrial Age the military structure of forces evolved according with principles of decomposition, specialization, hierarchy, optimization, deconfliction, centralized planning, and decentralized execution. But now the solutions based upon Industrial Age assumptions and practices will break down and fail in the Information Age. This will happen no matter how well intentioned, hardworking, or dedicated the leadership and the force are. Two key force capabilities needed by Information Age militaries are interoperability and agility. Both interoperability and agility are provided by Network centric warfare theory of war.

  6. Radioecological aspects of nuclear warfare

    International Nuclear Information System (INIS)

    Edvarson, K.

    1975-01-01

    The radioactive fallout from nuclear explosions is one of the major effects of nuclear warfare. Those levels causing acute radiation sickness are to be expected only within the close-in or intermediate areas downwind from surface bursts. Global fallout from high yield explosions will be fairly evenly distributed in the hemisphere where the explosions occurred and cause irradiation from ground deposit, inhaled material and contaminated food. The collective doses and the order of magnitude of late casualties from this global contamination are estimated for a given total explosion yield. (auth)

  7. Analytic tools for information warfare

    Energy Technology Data Exchange (ETDEWEB)

    Vandewart, R.L.; Craft, R.L.

    1996-05-01

    Information warfare and system surety (tradeoffs between system functionality, security, safety, reliability, cost, usability) have many mechanisms in common. Sandia`s experience has shown that an information system must be assessed from a {ital system} perspective in order to adequately identify and mitigate the risks present in the system. While some tools are available to help in this work, the process is largely manual. An integrated, extensible set of assessment tools would help the surety analyst. This paper describes one approach to surety assessment used at Sandia, identifies the difficulties in this process, and proposes a set of features desirable in an automated environment to support this process.

  8. Information warfare technologies in political discourse

    Directory of Open Access Journals (Sweden)

    Karpova Anna Yu.

    2016-01-01

    Full Text Available We attempt to examine the technology of «information warfare» in this paper. The dominant theme of the paper is that the outcome of the information warfare is important not only for the future of a state itself but for the future of the world balance of forces. The main task of geopolitical actors in information warfare is to introduce ideas corresponding to their interests into mass consciousness. All participants of political conflicts have common features in technologies of Information warfare. The information anomie is the indicator of the great geopolitical actors’ personified interests on the stage of «information warfare» - the process resulted in destroying the communicative line: report-information understanding and disrupting the social order in society. In this paper authors describe the following Information Warfare technologies: "Political volcano" technology; "SPIN" technology; "Widening media resource" technology; "specific gravity" technology; "Cold War 2.0" technology and Information cleaningup technology. It is assumed that in the future there will be new instructions on applying technologies of information warfare. To impart perspective to the paper we consider examples, opinions and trends.

  9. The Acme of Skill: Nonkinetic Warfare

    National Research Council Canada - National Science Library

    Teo, Cheng H

    2008-01-01

    .... The insurgency attributes that have characterized many wars since World War II suggest that the objective of warfare has shifted from the kinetic destruction of military forces to the nonkinetic...

  10. Topic modelling in the information warfare domain

    CSIR Research Space (South Africa)

    De Waal, A

    2013-11-01

    Full Text Available In this paper the authors provide context to Topic Modelling as an Information Warfare technique. Topic modelling is a technique that discovers latent topics in unstructured and unlabelled collection of documents. The topic structure can be searched...

  11. Prehistoric ceremonial warfare: beginning of institutionalized violence

    Czech Academy of Sciences Publication Activity Database

    Turek, Jan

    2017-01-01

    Roč. 13, č. 3 (2017), s. 535-548 ISSN 1555-8622 Institutional support: RVO:67985912 Keywords : human aggression * ceremonial warfare * archery symbolism * Neolithic * Chalcolithic * Europe Subject RIV: AC - Archeology, Anthropology, Ethnology OBOR OECD: Archaeology

  12. Mountain Warfare: The Need for Specialist Training

    National Research Council Canada - National Science Library

    Malik, Muhammad

    2003-01-01

    This study focuses on the need for specialist training for mountain warfare. It analyzes the special characteristics of mountain and high altitude terrain which affect conduct of military operations...

  13. On Cyber Warfare Command and Control Systems

    National Research Council Canada - National Science Library

    Howes, Norman R; Mezzino, Michael; Sarkesain, John

    2004-01-01

    .... Cyber warfare then becomes a one-sided battle where the attacker makes all the strikes and the target of the attack responds so slowly that the attacker usually gets away without being identified...

  14. Annual Expeditionary Warfare Conference (22nd)

    Science.gov (United States)

    2017-10-24

    Session: Expeditionary Logistics Integration & Expeditionary Medicine Session Co-Chair: Mr. Tom Wetherald, Director Business Development and Strategic...Forces Special Operations Component Command. Mr. thomas Dee, Performing the Duties of the Under secretary of the navy On Feb. 17, 2017, Mr. Tom Dee was...1990) • Col Chip Gregson, “Keeping Up With Navy Doctrine.” MC Gazette, (December 1990) • Maj Tom Waldhauser, “Composite Warfare/Amphibious Warfare

  15. Special Warfare: Restructuring for the Future

    Science.gov (United States)

    2016-06-01

    Boston, MA: Albert Einstein Institution, 2002, 1-9. Hoffman , Frank. “Hybrid Warfare and Challenges.” Joint Forces Quarterly, Issue 52, 1st Quarter...20 Robert Helvey. On Strategic Nonviolence Conflict: Thinking About the Fundamentals. Boston, MA: Albert Einstein Institution, 2002, 2-3...important as the future of warfare becomes increasingly “characterized by uncertainty.”28 As Frank Hoffman has commented, success in hybrid wars will

  16. Guiding Warfare to Reach Sustainable Peace

    DEFF Research Database (Denmark)

    Vestenskov, David; Drewes, Line

    The conference report Guiding Warfare to Reach Sustainable Peace constitutes the primary outcome of the conference It is based on excerpts from the conference presenters and workshop discussions. Furthermore, the report contains policy recommendations and key findings, with the ambition of develo......The conference report Guiding Warfare to Reach Sustainable Peace constitutes the primary outcome of the conference It is based on excerpts from the conference presenters and workshop discussions. Furthermore, the report contains policy recommendations and key findings, with the ambition...

  17. On the Probability of Predicting and Mapping Traditional Warfare Measurements to the Cyber Warfare Domain

    CSIR Research Space (South Africa)

    Grobler, M

    2014-07-01

    Full Text Available Cyber warfare is a contentious topic, with no agreement on whether this is a real possibility or an unrealistic extension of the physical battlefield. This article will not debate the validity and legality of the concept of cyber warfare...

  18. Towards a framework for a network warfare capability

    CSIR Research Space (South Africa)

    Veerasamy, N

    2008-07-01

    Full Text Available by many, there is a need for a more structured approach to understanding the various techniques required for a network warfare capability. A conceptual framework describing the most important network warfare techniques and considerations is proposed...

  19. Cyber Attacks, Information Attacks, and Postmodern Warfare

    Directory of Open Access Journals (Sweden)

    Valuch Jozef

    2017-06-01

    Full Text Available The aim of this paper is to evaluate and differentiate between the phenomena of cyberwarfare and information warfare, as manifestations of what we perceive as postmodern warfare. We describe and analyse the current examples of the use the postmodern warfare and the reactions of states and international bodies to these phenomena. The subject matter of this paper is the relationship between new types of postmodern conflicts and the law of armed conflicts (law of war. Based on ICJ case law, it is clear that under current legal rules of international law of war, cyber attacks as well as information attacks (often performed in the cyberspace as well can only be perceived as “war” if executed in addition to classical kinetic warfare, which is often not the case. In most cases perceived “only” as a non-linear warfare (postmodern conflict, this practice nevertheless must be condemned as conduct contrary to the principles of international law and (possibly a crime under national laws, unless this type of conduct will be recognized by the international community as a “war” proper, in its new, postmodern sense.

  20. Survey on Urban Warfare Augmented Reality

    Directory of Open Access Journals (Sweden)

    Xiong You

    2018-01-01

    Full Text Available Urban warfare has become one of the main forms of modern combat in the twenty-first century. The main reason why urban warfare results in hundreds of casualties is that the situational information of the combatant is insufficient. Accessing information via an Augmented Reality system can elevate combatants’ situational awareness to effectively improve the efficiency of decision-making and reduce the injuries. This paper begins with the concept of Urban Warfare Augmented Reality (UWAR and illuminates the objectives of developing UWAR, i.e., transparent battlefield, intuitional perception and natural interaction. Real-time outdoor registration, information presentation and natural interaction are presented as key technologies of a practical UWAR system. Then, the history and current research state of these technologies are summarized and their future developments are highlighted from three perspectives, i.e., (1 Better integration with Geographic Information System and Virtual Geographic Environment; (2 More intelligent software; (3 More powerful hardware.

  1. Mongol Warfare in the Pre-Dissolution Period »

    Directory of Open Access Journals (Sweden)

    Timothy May

    2015-01-01

    Full Text Available Although the Mongols used many of the tactics and strategies that steppe nomads had used for centuries, the Mongols refined steppe warfare so that this style of warfare reached its apogee during the Mongol Empire. Furthermore, the Mongols developed a style of warfare that made them possibly the greatest military force in history. This work examines several facets of the pre-dissolution period (1200–1260. With the dissolution of the Mongol Empire, Mongol warfare once again changed. In some areas it remained complex while in others it regressed to traditional forces of steppe warfare, still potent but not as effective as the pre-dissolution period.

  2. Allometry of animal-microbe interactions and global census of animal-associated microbes.

    Science.gov (United States)

    Kieft, Thomas L; Simmons, Karen A

    2015-07-07

    Animals live in close association with microorganisms, mostly prokaryotes, living in or on them as commensals, mutualists or parasites, and profoundly affecting host fitness. Most animal-microbe studies focus on microbial community structure; for this project, allometry (scaling of animal attributes with animal size) was applied to animal-microbe relationships across a range of species spanning 12 orders of magnitude in animal mass, from nematodes to whales. Microbial abundances per individual animal were gleaned from published literature and also microscopically counted in three species. Abundance of prokaryotes/individual versus animal mass scales as a nearly linear power function (exponent = 1.07, R(2) = 0.94). Combining this power function with allometry of animal abundance indicates that macrofauna have an outsized share of animal-associated microorganisms. The total number of animal-associated prokaryotes in Earth's land animals was calculated to be 1.3-1.4 × 10(25) cells and the total of marine animal-associated microbes was calculated to be 8.6-9.0 × 10(24) cells. Animal-associated microbes thus total 2.1-2.3 × 10(25) of the approximately 10(30) prokaryotes on the Earth. Microbes associated with humans comprise 3.3-3.5% of Earth's animal-associated microbes, and domestic animals harbour 14-20% of all animal-associated microbes, adding a new dimension to the scale of human impact on the biosphere. This novel allometric power function may reflect underlying mechanisms involving the transfer of energy and materials between microorganisms and their animal hosts. Microbial diversity indices of animal gut communities and gut microbial species richness for 60 mammals did not indicate significant scaling relationships with animal body mass; however, further research in this area is warranted. © 2015 The Author(s) Published by the Royal Society. All rights reserved.

  3. Physical Readiness Testing of Surface Warfare Officers

    Science.gov (United States)

    1991-06-01

    NA% I PHISICAL READIiESS TEST (PRT QUEST1OthAIRE I. hE ARE CONDUCTI NG THESIS RESEAR H 0N HO- ELL THE PRT SUPPORT5 TNE R 0 T i E 0F St RF AC E ’ARAR...AD-A245 519 NAVAL POSTGRADUATE SCHOOL Monterey, California DTIC CTE.EC a% FEB071992 CI THESIS Physical Readiness Testing of Surface Warfare Officers...READINESS TESTING OF SURFACE WARFARE OFFICERS 12. PERSONAL AUTHOR(S) Hatch, William D. II and Swinney, Lori D. 13a. TYPE OF REPORT 13b. TIME COVERED 14

  4. Cognitive systems in electronic warfare

    Science.gov (United States)

    Kulpa, Krzysztof; Szczepankiewicz, Michał; Żywek, Marcin; Malanowski, Mateusz; Misiurewicz, Jacek; Samczyński, Piotr

    2017-04-01

    Electronic warfare (EW) techniques were invented 70 years ago and are still being developed, all the time with a key role played by their operators. However, a human operator responds far too slowly for the on-going needs since to be adequate to current threats the EW system reaction should be within 1 ms or less. Too slow reaction defers an achievement of the objectives, and generally may lead to disclosure of the applied strategy and to waste of resources. Developing the adequate response to the threat is a multifaceted matter that requires considerable experience and knowledge on the one hand, and thorough observation of outcomes of the applied strategy on the other hand. Such action requires the use of not only intelligence but also more complex algorithms for automatic control than the classical ones, and it heavily builds on the experience. It is therefore a cognitive task in its nature, and a human operator acts naturally this way. Consequently, a proper training and experience gained are what really matters. As a result of tests and actions in EW the operator builds his own knowledge base, thus, gains a capability of responding to the known threats in a balanced way. New threats, however, are much more challenging since they should be handled as fast as possible but in a fresh and creative manner. To this end, adapting the algorithms of radar jamming protection for the new conditions of the battlefield is an example of such challenging tasks. At present, such adjustments are done in a long feedback loop when the operator, after recognizing the problem, notifies the equipment manufacturers, and then, their engineers work on required solutions accordingly. Thus, the reaction time is counted in years, not a single milliseconds or seconds. Speeding up the response time is therefore the key issue, and a solution to it would be feasible only when cognitive systems were used. A concept of such cognitive system is presented in this paper.

  5. Biomonitoring of exposure to chemical warfare agents

    NARCIS (Netherlands)

    Noort, D.; Schans, M.J. van der; Benschop, H.P.

    2006-01-01

    An overview is presented of the major methods that are presently available for biomonitoring of exposure to chemical warfare agents, i.e., nerve agents and sulfur mustard. These methods can be applied for a variety of purposes such as diagnosis and dosimetry of exposure of casualties, verification

  6. Warfare tourism experiences and national identity

    NARCIS (Netherlands)

    Gieling, Joost; Ong, Chin Ee

    2016-01-01

    This paper examines through an analysis of Dutch warfare tourism whether there is a relationship between the subjective perceived salience of Dutch identity and heritage tourists’ motives, emotions and overall satisfaction. Using a social identity theory framework, this study provides a view of

  7. Chemical and Biological Warfare: A Selected Bibliography

    Science.gov (United States)

    1991-04-01

    WORLD ARMA - MENTS AND DISARMAMENT. SIPRI Yearbook 1990. New York: Oxford University Press, 1990. (REF JX1974 S775 1990) Pp. 107-133: "Chemical and...Report. Norton D. Zinder, Chairman. Washington: National Academy Press, 1984. (UG447 N33 1984) LEGACY OF CHEMICAL AND BIOLOGICA !L WARFARE Some 20th

  8. Mesoporous manganese oxide for warfare agents degradation

    Czech Academy of Sciences Publication Activity Database

    Štengl, Václav; Králová, Daniela; Opluštil, F.; Němec, T.

    2012-01-01

    Roč. 156, JULY (2012), s. 224-232 ISSN 1387-1811 R&D Projects: GA MPO FI-IM5/231 Institutional research plan: CEZ:AV0Z40320502; CEZ:AV0Z40500505 Keywords : homogeneous hydrolysis * chloroacetamide * manganese(IV) oxide * warfare agents Subject RIV: CA - Inorganic Chemistry Impact factor: 3.365, year: 2012

  9. Chemical Warfare Agent Decontaminant Solution Using Quaternary Ammonium Complexes

    Science.gov (United States)

    1997-12-11

    warfare agents, which include a variety of organophosphorus and organosulfur compounds, are known in the art. 15 However, these known methods use...chemical warfare agents, and works particularly well for neutralization of organosulfur agents such as mustard gas (HD), and organophosphorus agents such...detoxifying/neutralizing a variety of chemical warfare agents, including organosulfur agents such as mustard gas (HD), and organophosphorus agents such as

  10. Containment 2.0: U.S. political warfare

    OpenAIRE

    Alexander, Nicole M.

    2016-01-01

    Approved for public release; distribution is unlimited Contemporary Russia has shown an increasing preference for using Cold War–era political warfare techniques, which are deeply rooted in its doctrine and foreign policies. To date, the U.S. response comprises the conventional military aspects of the Cold War–era deterrence and containment rather than political warfare strategies. Exploring previous U.S. experience in political warfare activities—under the broad categories of strategic in...

  11. Book Review: Composite warfare: the conduct of successful ground ...

    African Journals Online (AJOL)

    Abstract. Book Title: Composite warfare: the conduct of successful ground force operations in Africa. Book Author: Eeben Barlow. Pinetown: 30 Degrees South Publishers. 2015, 576 pages. ISBN 9781928211761.

  12. Handbook of toxicology of chemical warfare agents

    CERN Document Server

    2010-01-01

    This groundbreaking book covers every aspect of deadly toxic chemicals used as weapons of mass destruction and employed in conflicts, warfare and terrorism. Including findings from experimental as well as clinical studies, this one-of-a-kind handbook is prepared in a very user- friendly format that can easily be followed by students, teachers and researchers, as well as lay people. Stand-alone chapters on individual chemicals and major topics allow the reader to easily access required information without searching through the entire book. This is the first book that offers in-depth coverage of individual toxicants, target organ toxicity, major incidents, toxic effects in humans, animals and wildlife, biosensors, biomarkers, on-site and laboratory analytical methods, decontamination and detoxification procedures, prophylactic, therapeutic and countermeasures, and the role of homeland security. Presents a comprehensive look at all aspects of chemical warfare toxicology in one reference work. This saves research...

  13. Computational models of intergroup competition and warfare.

    Energy Technology Data Exchange (ETDEWEB)

    Letendre, Kenneth (University of New Mexico); Abbott, Robert G.

    2011-11-01

    This document reports on the research of Kenneth Letendre, the recipient of a Sandia Graduate Research Fellowship at the University of New Mexico. Warfare is an extreme form of intergroup competition in which individuals make extreme sacrifices for the benefit of their nation or other group to which they belong. Among animals, limited, non-lethal competition is the norm. It is not fully understood what factors lead to warfare. We studied the global variation in the frequency of civil conflict among countries of the world, and its positive association with variation in the intensity of infectious disease. We demonstrated that the burden of human infectious disease importantly predicts the frequency of civil conflict and tested a causal model for this association based on the parasite-stress theory of sociality. We also investigated the organization of social foraging by colonies of harvester ants in the genus Pogonomyrmex, using both field studies and computer models.

  14. Cyber Warfare: New Character with Strategic Results

    Science.gov (United States)

    2013-03-01

    government property.”12 Applying these standards to cyberspace is contentious in the international community since millions of cyber attacks transpire daily...forces and creating additional hostility. At its very nature cyber warfare can be both coercive and destructive. “At the strategic level, cyber attacks could...in the state is an armed attack.”42 Other interpretations require a higher threshold for invoking Article 51. “[O]nly large scale cyber attacks on

  15. Electronic Warfare in Army Models - A Survey.

    Science.gov (United States)

    1980-08-01

    CCM) PROVING GROUND TENIAS SAMJAM EIEM SPREAD SPECTRUM US ARMY ELECTRONIC FOREIGN SCIENCE & OFFICE OF MISSILE WARFARE LAB (EWL) TECHNOLOGY CENTER...IPAR MULTIRADAR SPREAD SPECTRUM ECMFUZ IRSS OTOALOC TAC ZINGERS EIEM ITF PATCOM TAM EOCM SIM FAC MGM-H4D RFSS TENIAS GTSF MG(-H4H ROLJAM ZAP I HMSM MSL...USAFAS TRASANA USAPAS TCF ASD WPAFU TENIAS ______ ___ ECAC _________ WAR EAGLE _________CATRADA WARRANT am________ 3DBDM ZAP 1 ____________ MEW EWL ZAP 2

  16. Russia’s Approach to Cyber Warfare

    Science.gov (United States)

    2016-09-01

    warfare domain in its own right. Ideally, it is to be employed as part of a whole of government effort, along with other, more traditional, weapons of...4 even days, be transformed into an arena of fierce armed conflict, become a victim of foreign intervention, and sink into a web of chaos...Russian military is a relative latecomer to the cyber arena. For many years, cyber was the exclusive domain of the state’s security services. The

  17. Recent Trends in Thinking about Warfare

    Science.gov (United States)

    2006-09-01

    as a pikeman), the flintlock, the iron ramrod, and mechanical production, coupled with the discovery of cheap sources of nitrates (which radically...to technologies that provide cheap WMD-like capabilities, and the vulnerabilities offered by physical, cultural, social, economic, and political...context in Peter P. Perla, Albert A. Nofi, and Michael C. Markowitz, Wargaming Fourth-Generation Warfare, Sep 2006 ( CRM D0014752.A2/Final). 83 Aryan

  18. Training Practices for Surface Warfare Junior Officers

    Science.gov (United States)

    2011-12-01

    What some saw as spoon feeding , others saw as a lack of standards and goals. The issue is also worth considering in light of the changing values of the...NPS-GSBPP-12-004 NAVAL POSTGRADATE SCHOOL MONTEREY, CALIFORNIA Approved for public release; distribution is...unlimited Prepared for Naval Postgraduate School , Monterey, California 93943 TRAINING PRACTICES FOR SURFACE WARFARE JUNIOR OFFICERS by William R

  19. Hybrid Warfare: Preparing for Future Conflict

    Science.gov (United States)

    2015-02-17

    www.vox.com/a/barack-obama-interview-vox- conversation/obama-foreign-policy-transcript. Zedong , Mao . On Protracted War. Honolulu: University...warfare in Ukraine represents a threat to state sovereignty in Eastern Europe, where, like Ukraine, many states have large Russian minority populations ...adjust as well. Conventional and unconventional military actions, such as targeting military supply routes and protecting the population , must occur at

  20. Soviet Partisan Warfare: Integral to the Whole,

    Science.gov (United States)

    1988-04-20

    partisan forces. They also saw partisan warfare as more than a military tool. Its influence was potent for propaganda use and for assuring continued...corefully selected for political reliability and partisan bands themselves were subjected to intense pro-Soviet propaganda . The risks involved in...John Erickson. The Soviet High Command. A_____________________ Military- Politica ~l History. 1918-1941. Boulder, Colorado: * Westview Press, 1962, p. 6.i

  1. Hybrid Warfare: Implications for CAF Force Development

    Science.gov (United States)

    2014-08-01

    objective,” p.603 in Peter Paret and Michael Howard , eds., trans., Carl von Clausewitz, On War. Princeton NJ: Princeton University Press, 1976...and Michael Howard , eds., trans., Carl von Clausewitz, On War. Princeton NJ: Princeton University Press, 1976. Royal Canadian Navy, Horizon 2050: A...The Winograd Commission) (Government of Israel), Final Report, January 2008. Thornton, Rod, Asymmetric Warfare, Malden MA: 2007. Tse- Tung , Mao, On

  2. Toward Operational Art in Special Warfare: Appendixes

    Science.gov (United States)

    2016-01-01

    groups to endure great hardship and work toward a common goal of driving out the infidel to defend their faith. Insights for special warfare Nuclear... financing , and the International Military Education and Training program (IMET). These programs are typically authorized and funded by DoS and executed...Organizations at U.S. embassies. In par- allel, the Security Assistance Organizations also submit requests through the foreign military financing /IMET

  3. Torpedoes and Their Impact on Naval Warfare

    Science.gov (United States)

    2017-01-01

    torpedo shell, and, as it pumped the water out through a hole in the rear, thrust was produced. This was surely the first jet -propelled torpedo...reduced from 46 to 2 kilograms per torpedo. The amounts of copper and tin used were substantially reduced. The cost and labor hours were cut in...unrestricted warfare against merchant shipping to cut sea lines of communications forcefully demonstrated the strategic significance of the torpedo as

  4. Relevance of information warfare models to critical infrastructure ...

    African Journals Online (AJOL)

    This article illustrates the relevance of information warfare models to critical infrastructure protection. Analogies of information warfare models to those of information security and information systems were used to deconstruct the models into their fundamental components and this will be discussed. The models were applied ...

  5. Axial Vircator for Electronic Warfare Applications

    Directory of Open Access Journals (Sweden)

    L. Drazan

    2009-12-01

    Full Text Available This paper deals with a high power microwave generator with virtual cathode – vircator in axial release for electronic warfare applications. The classification of directed energy weapons microwave (DEWM is introduced together with basic block diagrams of a particular class of DEWM. In the paper, methods for designing vircator pulsed power supply, axial vircator structure, measurement methods and experimental results are presented. The vircator in electromagnetic ammunition is powered by magneto-cumulative generator and in weapons for defense of objects (WDO, it is powered by Marx generator. The possible applications of a vircator in the DEWM area are discussed.

  6. Navy Operational Planner - Undersea Warfare Module

    Science.gov (United States)

    2016-09-01

    CLASSIFICATION OF ABSTRACT Unclassified 20. LIMITATION OF ABSTRACT UU NSN 7540–01-280-5500 Standard Form 298 (Rev. 2–89) Prescribed by ANSI...Convergence Zone DP Direct Path HVU High Value Unit MCM Mine Sweeper MIW Mine Warfare NMP Navy Mission Planner NOP Navy Operational Planner NOP–USW...Illustrated in Figure 1 is a piecewise linear from of the equation 1 tAchievement e   , where Achievement is the probability that a mine field

  7. Electronic warfare receivers and receiving systems

    CERN Document Server

    Poisel, Richard A

    2014-01-01

    Receivers systems are considered the core of electronic warfare (EW) intercept systems. Without them, the fundamental purpose of such systems is null and void. This book considers the major elements that make up receiver systems and the receivers that go in them.This resource provides system design engineers with techniques for design and development of EW receivers for modern modulations (spread spectrum) in addition to receivers for older, common modulation formats. Each major module in these receivers is considered in detail. Design information is included as well as performance tradeoffs o

  8. Microwave receivers with electronic warfare applications

    CERN Document Server

    Tsui, James

    2005-01-01

    This book by the author of Digital Techniques for Wideband Receivers willbe like no other one on your book shelf as the definitive word on electronicwarfare (EW) receiver design and performance. Whether you are an EWscientist involved in the test and evaluation of EW receivers or a designerof RWR's and other EW-related receivers, Microwave Receivers withElectronic Warfare Applications is a handy reference through which you canperfect your technical art. Lucidly written, this book is a treatise on EWreceivers that is relevant to you if you are just looking for a top-levelinsight into EW receive

  9. History of chemical and biological warfare agents

    International Nuclear Information System (INIS)

    Szinicz, L.

    2005-01-01

    Chemical and biological warfare agents constitute a low-probability, but high-impact risk both to the military and to the civilian population. The use of hazardous materials of chemical or biological origin as weapons and for homicide has been documented since ancient times. The first use of chemicals in terms of weapons of mass destruction goes back to World War I, when on April 22, 1915 large amounts of chlorine were released by German military forces at Ypres, Belgium. Until around the 1970s of the 20th century, the awareness of the threat by chemical and biological agents had been mainly confined to the military sector. In the following time, the development of increasing range delivery systems by chemical and biological agents possessors sensitised public attention to the threat emanating from these agents. Their proliferation to the terrorists field during the 1990s with the expanding scale and globalisation of terrorist attacks suggested that these agents are becoming an increasing threat to the whole world community. The following article gives a condensed overview on the history of use and development of the more prominent chemical and biological warfare agents

  10. History of chemical and biological warfare agents.

    Science.gov (United States)

    Szinicz, L

    2005-10-30

    Chemical and biological warfare agents constitute a low-probability, but high-impact risk both to the military and to the civilian population. The use of hazardous materials of chemical or biological origin as weapons and for homicide has been documented since ancient times. The first use of chemicals in terms of weapons of mass destruction goes back to World War I, when on April 22, 1915 large amounts of chlorine were released by German military forces at Ypres, Belgium. Until around the 1970s of the 20th century, the awareness of the threat by chemical and biological agents had been mainly confined to the military sector. In the following time, the development of increasing range delivery systems by chemical and biological agents possessors sensitised public attention to the threat emanating from these agents. Their proliferation to the terrorists field during the 1990s with the expanding scale and globalisation of terrorist attacks suggested that these agents are becoming an increasing threat to the whole world community. The following article gives a condensed overview on the history of use and development of the more prominent chemical and biological warfare agents.

  11. International Clostridium difficile animal strain collection and large diversity of animal associated strains

    DEFF Research Database (Denmark)

    Janezic, Sandra; Zidaric, Valerija; Pardon, Bart

    2014-01-01

    as well as in terms of number of different host species: 078 (14.3% of isolates; 4 hosts), 014/020 (11.6%; 8 hosts); 002 (5.4%; 4 hosts) and 012 (5.4%; 5 hosts). Two animal hosts were best represented; cattle with 31 isolates (20 PCR ribotypes; 7 countries) and pigs with 31 isolates (16 PCR ribotypes; 10......Background: Clostridium difficile is an important cause of intestinal infections in some animal species and animals might be a reservoir for community associated human infections. Here we describe a collection of animal associated C. difficile strains from 12 countries based on inclusion criteria...... of one strain (PCR ribotype) per animal species per laboratory. Results: Altogether 112 isolates were collected and distributed into 38 PCR ribotypes with agarose based approach and 50 PCR ribotypes with sequencer based approach. Four PCR ribotypes were most prevalent in terms of number of isolates...

  12. Managing the Double Edged Sword of Network-Centric Warfare

    National Research Council Canada - National Science Library

    Wells, David

    2003-01-01

    Network Centric Warfare can tend to collapse the operational level war by allowing information to flow around or past hierarchical staff structures and directly between tactical and strategic level decision makers...

  13. Mine Warfare - The Joint Force Commander's Achilles Heel

    National Research Council Canada - National Science Library

    Cochran, Bryan

    2004-01-01

    ... Countermeasures systems resident within Strike Groups to counter enemy mine laying activities. Additionally, the Navy needs to transform its culture and mainstream the full spectrum of MIW to include naval mining and countermine warfare capabilities...

  14. Echoes of Chechnya Warfare Resound in Moscow, Quantico

    National Research Council Canada - National Science Library

    Ackerman, Robert

    2000-01-01

    .... thinking about urban warfare. After suffering stunning public defeats just a few years ago, Russian forces applied painful lessons learned then to drive Chechen forces out of their capital city, Grozny, this year...

  15. Organizing for Irregular Warfare: Implications for the Brigade Combat Team

    National Research Council Canada - National Science Library

    Burgess, Kenneth J

    2007-01-01

    ... operations in 21st-century irregular environments. The author argues that Infantry Brigade Combat Teams would be better optimized for the challenges of irregular warfare through structural changes that decentralize resources...

  16. Irregular Warfare: Impact on Future Professional Military Education

    National Research Council Canada - National Science Library

    Paschal, David G

    2006-01-01

    ... to operate effectively in an irregular warfare environment. The utility of a decisive war between nation states continues to decline and will eventually reach critical mass based upon the extreme imbalance of military power and a U.S. monopoly...

  17. Design and implementation of intelligent electronic warfare decision making algorithm

    Science.gov (United States)

    Peng, Hsin-Hsien; Chen, Chang-Kuo; Hsueh, Chi-Shun

    2017-05-01

    Electromagnetic signals and the requirements of timely response have been a rapid growth in modern electronic warfare. Although jammers are limited resources, it is possible to achieve the best electronic warfare efficiency by tactical decisions. This paper proposes the intelligent electronic warfare decision support system. In this work, we develop a novel hybrid algorithm, Digital Pheromone Particle Swarm Optimization, based on Particle Swarm Optimization (PSO), Ant Colony Optimization (ACO) and Shuffled Frog Leaping Algorithm (SFLA). We use PSO to solve the problem and combine the concept of pheromones in ACO to accumulate more useful information in spatial solving process and speed up finding the optimal solution. The proposed algorithm finds the optimal solution in reasonable computation time by using the method of matrix conversion in SFLA. The results indicated that jammer allocation was more effective. The system based on the hybrid algorithm provides electronic warfare commanders with critical information to assist commanders in effectively managing the complex electromagnetic battlefield.

  18. Fourth Generation Warfare: The Need for a Comprehensive Approach

    National Research Council Canada - National Science Library

    Benton, LeRoy D

    2008-01-01

    .... A definition of Fourth Generation Warfare is developed, based on Col. Thomas X. Hammes' writings. The definition is further developed to show relevance and applicability to current operations in the Long War on Terrorism...

  19. Information Warfare: Defining the Legal Response to An Attack

    National Research Council Canada - National Science Library

    Pottorff, James

    1999-01-01

    This paper discusses the difficulty in determining whether an information warfare attack, such as a computer virus, can be treated as an "armed attack" for purposes of national defense under the United Nations charter. As the U.S...

  20. The Role of Airpower in Urban Warfare. An Airman's Perspective

    National Research Council Canada - National Science Library

    Saffold, Timothy

    1998-01-01

    .... This emphasis on surface force employment stifles innovative thought as to how military forces can achieve operational and strategic effects by employing airpower as the key instrument of force in urban warfare...

  1. State of the Art Report on Drone-Based Warfare

    OpenAIRE

    Lee-Morrison, Lila

    2014-01-01

    State of the art report on the latest cultural discourse and debate over contemporary forms of drone based warfare. primarily resulting from the disciplines of Law, Political Science, and Geography. 2014.

  2. Fourth Generation Warfare: The Need for a Comprehensive Approach

    National Research Council Canada - National Science Library

    Benton, LeRoy D

    2008-01-01

    ... to defeat its enemies in the Long War on Terrorism. The method used to resolve this issue was to frame the scope of the current operating environment in the context of Fourth Generation Warfare...

  3. Irregular Warfare: Special Operations Joint Professional Military Education Transformation

    National Research Council Canada - National Science Library

    Cannady, Bryan H

    2008-01-01

    ... on today's battlefront in Afghanistan and Iraq and in the Global War on Terrorism (GWOT). At the forefront of the GWOT and irregular warfare are the United States Special Operations Command (USSOCOM...

  4. A Proposed Framework for Network-Centric Maritime Warfare Analysis

    National Research Council Canada - National Science Library

    Klingbeil, Ralph

    2003-01-01

    .... In addition, this report demonstrates how the functions of many of the independent and dependent variables and associated warfare metrics can be translated into the characteristics and metrics of queues.

  5. Motivation and requirements for determining a Network Warfare Capability

    CSIR Research Space (South Africa)

    Veerasamy, N

    2010-06-01

    Full Text Available , whereas in the latter, an assessment is given of the current state of Network Warfare skills. This assessment can involve expert opinion, controls and guidelines. According to Bragg et al, an assessment is not an audit, which is used to test compliance... approach to ensure conformance to established guidelines. The difference between network security auditing and determining a Network Warfare Capability is that network security auditing evaluates compliance with controls in a very detailed manner...

  6. The theory of unconventional warfare win, lose, and draw

    OpenAIRE

    DeFeyter, Bruce E.

    2008-01-01

    Clausewitz states that "The defensive form of warfare is intrinsically stronger than the offense" and to defeat 'the stronger form of warfare' "an army's best weapon is superior numbers." Given these two facts, how do special operations forces defeat numerically superior forces fighting in the defense? William H. McRaven's book, Spec Ops, lays out a theory of special operations and six principles that are "applicable across the spectrum of special operations" (McRaven, 1995, p. 3). McRav...

  7. Cyberspace Warfare: A New DoD Core Mission Area

    Science.gov (United States)

    2013-05-01

    7. PERFORMING ORGANIZATION NAME(S) AND ADDRESS(ES) 8. PERFORMING ORGANIZATION Joint Forces Staff College REPORT NUMBER Joint Advanced Warfighting...According to Andrew F. Krepinevich cyberspace warfare is defined as: The actions by nation-states and non-state actors to penetrate computers or... actors conducting cyberspace operations in, through, and from cyberspace as a 1 Andrew F. Krepinevich, “Cyber Warfare: A Nuclear Option,” Center for

  8. Dirty Fighting: How to Counter Total Warfare Mentality

    Science.gov (United States)

    2015-06-12

    sustained British security discipline, support for the main PIRA dirty fighting weapon (unannounced bombings) began to turn against them. This was... DIRTY FIGHTING: HOW TO COUNTER TOTAL WARFARE MENTALITY A thesis presented to the Faculty of the U.S. Army Command and... Dirty Fighting: How to Counter Total Warfare Mentality 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER 6. AUTHOR(S) Major

  9. Information Warfare, Threats and Information Security

    Directory of Open Access Journals (Sweden)

    Dmitriy Nikolaevich Bespalov

    2014-01-01

    Full Text Available The article presents the opposite, but dependent on each other's reality - Revolutionary War information,information security goals and objectives of their study within the scheme "challenge-response", methodological and analytical support, the role of elites and the information society in promoting information security. One of the features of contemporaneityis the global spread of ICT, combined with poor governance and other difficulties in the construction of innovation infrastructures that are based on them in some countries. This leads to the reproduction of threats, primarily related to the ability to use ICT for purposes that are inconsistent with the objectives of maintaining international peace and security, compliance with the principles of non-use of force, non-interference in the internal affairs of states, etc. In this regard, include such terms as "a threat of information warfare", "information terrorism" and so forth. Information warfare, which stay in the policy declared the struggle for existence, and relationships are defined in terms of "friend-enemy", "ours-foreign". Superiority over the opponent or "capture of its territory" is the aim of political activity. And information security, serving activities similar process of political control, including a set of components, is a technology until their humanitarian. From the context and the decision itself is the ratio of the achieved results of information and political influence to the target - a positive image of Russia. Bringing its policy in line with the demands of a healthy public opinion provides conductivity of theauthorities initiatives in the country and increases the legitimacy of the Russian Federation actions in the world.

  10. The Fate of Chemical Warfare Agents in the Environment

    Energy Technology Data Exchange (ETDEWEB)

    Talmage, Sylvia Smith [ORNL; Munro, Nancy B [ORNL; Watson, Annetta Paule [ORNL; King, J. [U.S. Army Environmental Center; Hauschild, Veronique [U.S. Environmental Protection Agency (EPA)

    2007-01-01

    Chemical Warfare Agents, Second Edition has been totally revised since the successful first edition and expanded to about three times the length, with many new chapters and much more in-depth consideration of all the topics. The chapters have been written by distinguished international experts in various aspects of chemical warfare agents and edited by an experienced team to produce a clear review of the field. The book now contains a wealth of material on the mechanisms of action of the major chemical warfare agents, including the nerve agent cyclosarin, formally considered to be of secondary importance, as well as ricin and abrin. Chemical Warfare Agents, Second Edition discusses the physico-chemical properties of chemical warfare agents, their dispersion and fate in the environment, their toxicology and management of their effects on humans, decontamination and protective equipment. New chapters cover the experience gained after the use of sarin to attack travelers on the Tokyo subway and how to deal with the outcome of the deployment of riot control agents such as CS gas. This book provides a comprehensive review of chemical warfare agents, assessing all available evidence regarding the medical, technical and legal aspects of their use. It is an invaluable reference work for physicians, public health planners, regulators and any other professionals involved in this field.

  11. Marine Corps NBC Warfare: Determining Clinical Supply Requirements for Treatment of Battlefield Casualties from Chemical and Biological Warfare

    National Research Council Canada - National Science Library

    Hill, Martin; Galameau, Mike; Pang, Gerry; Konoske, Paula

    2003-01-01

    ... to treat victims of biochemical agents on the battlefield. This study reviewed Marine Corps medical supply blocks for biological and chemical warfare casualties - Authorized Medical Allowance Lists (AMALs) 687 and 688...

  12. Staphylococcus aureus isolated from wastewater treatment plants in Tunisia: occurrence of human and animal associated lineages.

    Science.gov (United States)

    Ben Said, Meriam; Abbassi, Mohamed Salah; Gómez, Paula; Ruiz-Ripa, Laura; Sghaier, Senda; Ibrahim, Chourouk; Torres, Carmen; Hassen, Abdennaceur

    2017-08-01

    The objective was to characterize Staphylococcus aureus isolated from two wastewater treatment plants (WWTPs) located in Tunis City (Tunisia), during the period 2014-2015. Genetic lineages, antibiotic resistance mechanisms and virulence factors were determined for the recovered isolates. S. aureus isolates were recovered from 12 of the 62 wastewater samples tested (19.35%), and one isolate/sample was characterized, all of them being methicillin-susceptible (MSSA). Six spa types (t587, t674, t224, t127, t701 and t1534) were found among the 12 isolates, and the spa-t587, associated with the new sequence type ST3245, was the most predominant one (7 isolates). The remaining isolates were assigned to five clonal complexes (CC5, CC97, CC1, CC6 and CC522) according to the sequence-type determined and/or the spa-type detected. S. aureus isolates were ascribed to agrI (n = 3), agrII (n = 7) and agrIII (n = 1); however, one isolate was non-typeable. S. aureus showed resistance to (number of isolates): penicillin (12), erythromycin (7), tetracycline (one) and clindamycin (one). Among the virulence factors investigated, only one isolate harboured the tst gene, encoding the TSST-1 (toxic shock syndrome toxin 1). Despite the low number of studied isolates, the present study reports the occurrence of both human- and animal-associated S. aureus clonal complexes in WWTPs in Tunisia.

  13. Understanding the elementary considerations in a network warfare environment: an introductory framework

    CSIR Research Space (South Africa)

    Veerasamy, N

    2008-07-01

    Full Text Available by many, there is a need for a more structured approach to understanding the various techniques required for a network warfare capability. A conceptual framework describing the most important network warfare techniques and considerations is proposed...

  14. Nuclear, biological and chemical warfare. Part I: Medical aspects of nuclear warfare.

    Science.gov (United States)

    Kasthuri, A S; Pradhan, A B; Dham, S K; Bhalla, I P; Paul, J S

    1990-04-01

    Casualties in earlier wars were due much more to diseases than to weapons. Mention has been made in history of the use of biological agents in warfare, to deny the enemy food and water and to cause disease. In the first world war chemical agents were used to cause mass casualties. Nuclear weapons were introduced in the second world war. Several countries are now involved in developing nuclear, biological and chemical weapon systems, for the mass annihilation of human beings, animals and plants, and to destroy the economy of their enemies. Recently, natural calamities and accidents in nuclear, chemical and biological laboratories and industries have caused mass instantaneous deaths in civilian population. The effects of future wars will not be restricted to uniformed persons. It is time that physicians become aware of the destructive potential of these weapons. Awareness, immediate protective measures and first aid will save a large number of persons. This series of articles will outline the medical aspects of nuclear, biological and chemical weapon systems in three parts. Part I will deal with the biological effects of a nuclear explosion. The short and long term effects due to blast, heat and associated radiation are highlighted. In Part II, the role of biological agents which cause commoner or new disease patterns is mentioned. Some of the accidents from biological warfare laboratories are a testimony to its potential deleterious effects. Part III deals with medical aspects of chemical warfare agents, which in view of their mass effects can overwhelm the existing medical resources, both civilian and military.(ABSTRACT TRUNCATED AT 250 WORDS)

  15. The 2006 Lebanon Campaign and the Future of Warfare: Implications for Army and Defense Policy

    Science.gov (United States)

    2008-09-01

    ground, see, e.g., Mao Tse-Tung, On Guerrilla Warfare, Samuel B. Griffith, trans., Mineola, NY: Dover, 2005, pp. 52, 97, 102; Ernesto Guevara...Guerrilla Warfare, Old Chelsea, NY: Ocean Press, 2006, pp. 20, 22, 26; Ian F.W. Beckett , Modern Insurgencies and Counter-Insurgencies, New York...Clodfelter, Warfare and Armed Conflicts, pp. 689-690, 696, 712, 757-759). 15. See, e.g., Mao, On Guerrilla Warfare, pp. 55-57, 113; Beckett , Modern

  16. Russian New Art of Hybrid Warfare in Ukraine

    Directory of Open Access Journals (Sweden)

    Rusnáková Soňa

    2017-10-01

    Full Text Available The main aim of this paper is to analyse the annexation of Crimea by the Russian Federation. For the purposes of the paper, the theory of hybrid warfare was chosen as an analytical category. Throughout the paper, the concept of hybrid warfare is examined and applied on case study of Crimean annexation. Hybrid warfare, especially in connection with Russian actions in Crimea has been an intensely debated concept. There is an ongoing debate among scholars concerning the meaning of the concept, its existence and employment by the Russian Federation. This paper showed that the article of Valeriy Gerasimov – the incumbent Chief of the General Staff of the Russian Federation-invoked a new warfare strategy for the Russian Federation which was consequently for the very first time in its full spectre and effectivity employed on case of Crimean annexation in March 2014. Observing the application of the hybrid warfare in practice serves the purposes of countering its further potential application in post-Soviet space and Russian ‘near abroad’.

  17. Numerical simulation of RCS for carrier electronic warfare airplanes

    Directory of Open Access Journals (Sweden)

    Yue Kuizhi

    2015-04-01

    Full Text Available This paper studies the radar cross section (RCS of carrier electronic warfare airplanes. Under the typical naval operations section, the mathematical model of the radar wave’s pitch angle incidence range analysis is established. Based on the CATIA software, considering dynamic deflections of duck wing leading edge flaps, flaperons, horizontal tail, and rudder, as well as aircraft with air-to-air missile, anti-radiation missile, electronic jamming pod, and other weapons, the 3D models of carrier electronic warfare airplanes Model A and Model B with weapons were established. Based on the physical optics method and the equivalent electromagnetic flow method, by the use of the RCSAnsys software, the characteristics of carrier electronic warfare airplanes’ RCS under steady and dynamic flights were simulated under the UHF, X, and S radar bands. This paper researches the detection probability of aircraft by radars under the condition of electronic warfare, and completes the mathematical statistical analysis of the simulation results. The results show that: The Model A of carrier electronic warfare airplane is better than Model B on stealth performance and on discover probability by radar detection effectively.

  18. History of biological warfare and bioterrorism.

    Science.gov (United States)

    Barras, V; Greub, G

    2014-06-01

    Bioterrorism literally means using microorganisms or infected samples to cause terror and panic in populations. Bioterrorism had already started 14 centuries before Christ, when the Hittites sent infected rams to their enemies. However, apart from some rare well-documented events, it is often very difficult for historians and microbiologists to differentiate natural epidemics from alleged biological attacks, because: (i) little information is available for times before the advent of modern microbiology; (ii) truth may be manipulated for political reasons, especially for a hot topic such as a biological attack; and (iii) the passage of time may also have distorted the reality of the past. Nevertheless, we have tried to provide to clinical microbiologists an overview of some likely biological warfare that occurred before the 18th century and that included the intentional spread of epidemic diseases such as tularaemia, plague, malaria, smallpox, yellow fever, and leprosy. We also summarize the main events that occurred during the modern microbiology era, from World War I to the recent 'anthrax letters' that followed the World Trade Center attack of September 2001. Again, the political polemic surrounding the use of infectious agents as a weapon may distort the truth. This is nicely exemplified by the Sverdlovsk accident, which was initially attributed by the authorities to a natural foodborne outbreak, and was officially recognized as having a military cause only 13 years later. © 2014 The Authors Clinical Microbiology and Infection © 2014 European Society of Clinical Microbiology and Infectious Diseases.

  19. Chemical Warfare Agent Degradation and Decontamination

    Energy Technology Data Exchange (ETDEWEB)

    Talmage, Sylvia Smith [ORNL; Watson, Annetta Paule [ORNL; Hauschild, Veronique [U.S. Environmental Protection Agency; Munro, Nancy B [ORNL; King, J. [U.S. Army Environmental Center

    2007-02-01

    The decontamination of chemical warfare agents (CWA) from structures, environmental media, and even personnel has become an area of particular interest in recent years due to increased homeland security concerns. In addition to terrorist attacks, scenarios such as accidental releases of CWA from U.S. stockpile sites or from historic, buried munitions are also subjects for response planning. To facilitate rapid identification of practical and effective decontamination approaches, this paper reviews pathways of CWA degradation by natural means as well as those resulting from deliberately applied solutions and technologies; these pathways and technologies are compared and contrasted. We then review various technologies, both traditional and recent, with some emphasis on decontamination materials used for surfaces that are difficult to clean. Discussion is limited to the major threat CWA, namely sulfur mustard (HD, bis(2-chloroethyl)sulfide), VX (O-ethyl S-(2-diisopropylaminoethyl) methylphosphonothioate), and the G-series nerve agents. The principal G-agents are GA (tabun, ethyl N,N-dimethylphosphoramidocyanidate), GB (sarin, isopropyl methylphosphonofluoridate), and GD (soman, pinacolyl methylphosphonofluoridate). The chemical decontamination pathways of each agent are outlined, with some discussion of intermediate and final degradation product toxicity. In all cases, and regardless of the CWA degradation pathway chosen for decontamination, it will be necessary to collect and analyze pertinent environmental samples during the treatment phase to confirm attainment of clearance levels.

  20. IMS software developments for the detection of chemical warfare agent

    Science.gov (United States)

    Klepel, ST.; Graefenhain, U.; Lippe, R.; Stach, J.; Starrock, V.

    1995-01-01

    Interference compounds like gasoline, diesel, burning wood or fuel, etc. are presented in common battlefield situations. These compounds can cause detectors to respond as a false positive or interfere with the detector's ability to respond to target compounds such as chemical warfare agents. To ensure proper response of the ion mobility spectrometer to chemical warfare agents, two special software packages were developed and incorporated into the Bruker RAID-1. The programs suppress interferring signals caused by car exhaust or smoke gases resulting from burning materials and correct the influence of variable sample gas humidity which is important for detection and quantification of blister agents like mustard gas or lewisite.

  1. The Cycle of Warfare - Analysis of an Analytical Model

    DEFF Research Database (Denmark)

    Jensen, Mikkel Storm

    2016-01-01

    The abstract has the title: “The Cycle of Warfare - Analysis of an Analytical Model” The Cycle of Warfare is an analytical model designed to illustrate the coherence between the organization, doctrine and technology of a military entity and the influence of the surrounding society as expressed...... both retrospectively and predictively. As a tool for historians the model can help to identify decisive factors in developments and outcomes. As a tool for intelligence analysts, it can be used predictively to identify likely possible outcomes or unknown elements in analysed entities....

  2. Magnetic Bacteria.

    Science.gov (United States)

    Nelson, Jane Bray; Nelson, Jim

    1992-01-01

    Describes the history of Richard Blakemore's discovery of magnetotaxic organisms. Discusses possible reasons why the magnetic response in bacteria developed. Proposes research experiments integrating biology and physics in which students investigate problems using cultures of magnetotaxic organisms. (MDH)

  3. Big bacteria

    DEFF Research Database (Denmark)

    Schulz, HN; Jørgensen, BB

    2001-01-01

    A small number of prokaryotic species have a unique physiology or ecology related to their development of unusually large size. The biomass of bacteria varies over more than 10 orders of magnitude, from the 0.2 mum wide nanobacteria to the largest cells of the colorless sulfur bacteria......, Thiomargarita namibiensis, with a diameter of 750 mum. All bacteria, including those that swim around in the environment, obtain their food molecules by molecular diffusion. Only the fastest and largest swimmers known, Thiovulum majus, are able to significantly increase their food supply by motility...... and by actively creating an advective flow through the entire population. Diffusion limitation generally restricts the maximal size of prokaryotic cells and provides a selective advantage for mum-sized cells at the normally low substrate concentrations in the environment. The largest heterotrophic bacteria...

  4. Big bacteria

    DEFF Research Database (Denmark)

    Schulz, HN; Jørgensen, BB

    2001-01-01

    A small number of prokaryotic species have a unique physiology or ecology related to their development of unusually large size. The biomass of bacteria varies over more than 10 orders of magnitude, from the 0.2 mum wide nanobacteria to the largest cells of the colorless sulfur bacteria...... and by actively creating an advective flow through the entire population. Diffusion limitation generally restricts the maximal size of prokaryotic cells and provides a selective advantage for mum-sized cells at the normally low substrate concentrations in the environment. The largest heterotrophic bacteria......, the 80 x 600 mum large Epulopiscium sp. from the gut of tropical fish, are presumably living in a very nutrient-rich medium. Many large bacteria contain numerous inclusions in the cells that reduce the volume of active cytoplasm. The most striking examples of competitive advantage from large cell size...

  5. Media Technologies and Their Role in the Information Warfare

    Directory of Open Access Journals (Sweden)

    Владимир Александрович Федоров

    2016-12-01

    Full Text Available The article analyzes the new role of the mass media in the modern information space, the basic techniques and technologies of focused preparation, semantic distortion and emotional coloring of the transmitted information. The value of the mass media is estimated as the main weapon of the information warfare in the modern geopolitical space. Specific examples and techniques for manipulating information.

  6. Biomonitoring of exposure to chemical warfare agents: A review

    NARCIS (Netherlands)

    Noort, D.; Benschop, H.P.; Black, R.M.

    2002-01-01

    In this report an overview of the methods currently available for detection of exposure to a number of chemical warfare agents (CWA), i.e., sulfur mustard, lewisite and nerve agents, is presented. Such methods can be applied for various purposes, e.g., diagnosis and dosimetry of exposure of

  7. Influence Operations in Insurgencies: Identifying Framing Strategies for Special Warfare

    Science.gov (United States)

    2014-12-01

    Military Information Support Operations MAR Minorities at Risk MAROB Minorities at Risk Organizational Behavior POQC Psychological Operations...and others use religious violence as a form of cleansing to eradicate “ infidels .”16 While individuals who are motivated by visions of the...indigenous personnel for Special Warfare through psychological and cognitive means. The Military Information Support Operations Command (MISOC) mission

  8. Anti-submarine warfare with continuously active sonar

    NARCIS (Netherlands)

    Vossen, R. van; Beerens, S.P.; Spek, E. van der

    2011-01-01

    Existing surveillance sonar systems for anti-submarine warfare (ASW) use a pulsed sonar deployed at a low duty cycle. Continuously active sonar (CAS) is of special interest since the technique could provide better detection performance than conventional pulsed sonar, and it will provide the operator

  9. The Ottawa Treaty and Coalition Warfare: An Unholy Alliance?

    National Research Council Canada - National Science Library

    Weddle, Kevin

    1999-01-01

    ...) on our ability to execute successful coalition warfare. This paper describes the serious implications for NATO and Coalition operations in view of the bulk of our Allies signing the Ottawa Treaty banning the use of all anti-personnel landmines (APLs...

  10. The political economy of warfare in nineteeth century Benin kingdom ...

    African Journals Online (AJOL)

    This paper examines how the interactions of politics and economy influenced the changing perspective on warfare in nineteenth century Benin Kingdom. The study investigates how the combined political and economic behaviour of Benin affected the rebuilding of military power as instrument of political policy in furtherance ...

  11. blitzkrieg to desert storm: the evolution of operational warfare

    African Journals Online (AJOL)

    a_nabb

    disease of stalemates infecting militaries before the Second World War. The invasion did not change the world; instead, it brought about an increased awareness of the importance of the operational level of war, a dimension of warfare previously neglected. The German operational effectiveness represented an evolution ...

  12. Nanostructured Metal Oxides for Stoichiometric Degradation of Chemical Warfare Agents

    Czech Academy of Sciences Publication Activity Database

    Štengl, Václav; Henych, Jiří; Janos, P.; Skoumal, M.

    2016-01-01

    Roč. 236, č. 2016 (2016), s. 239-258 ISSN 0179-5953 R&D Projects: GA ČR(CZ) GAP106/12/1116 Institutional support: RVO:61388980 Keywords : chemical warfare agent * metal nanoparticle * unique surface-chemistry * mesoporous manganese oxide Subject RIV: CA - Inorganic Chemistry Impact factor: 3.930, year: 2016

  13. relevance of information warfare models to critical infrastructure

    African Journals Online (AJOL)

    ismith

    not be applicable to every possible scenario; however, the intention is to illustrate their relevance in many .... digital communications system, where the vehicles are analogous to bits or packets, intersections for routers or ..... wireless channel, and negatively impact on the systems that rely on that channel. Electronic warfare.

  14. Management information systems for electronic warfare command and decision support

    CSIR Research Space (South Africa)

    Van Niekerk, B

    2015-04-01

    Full Text Available information to allow them to manage their own spectrum, to identify threats, and to deny adversaries’ use of the spectrum. In this paper, the concepts of integrated electronic warfare and spectrum battle management are introduced, and the relevant information...

  15. Manoeuvre warfare analysis of South Africa's 1914-1915 German ...

    African Journals Online (AJOL)

    The study reported in this article explored the nexus between military theory and history. Military theory attempts to quantify, qualify and illuminate the often unpredictable phenomenon of war. The article consists of two parts: the theory of manoeuvre warfare and the history of the 1914-1915 South African campaign in ...

  16. Simulating cyber warfare and cyber defenses: information value considerations

    Science.gov (United States)

    Stytz, Martin R.; Banks, Sheila B.

    2011-06-01

    Simulating cyber warfare is critical to the preparation of decision-makers for the challenges posed by cyber attacks. Simulation is the only means we have to prepare decision-makers for the inevitable cyber attacks upon the information they will need for decision-making and to develop cyber warfare strategies and tactics. Currently, there is no theory regarding the strategies that should be used to achieve objectives in offensive or defensive cyber warfare, and cyber warfare occurs too rarely to use real-world experience to develop effective strategies. To simulate cyber warfare by affecting the information used for decision-making, we modify the information content of the rings that are compromised during in a decision-making context. The number of rings affected and value of the information that is altered (i.e., the closeness of the ring to the center) is determined by the expertise of the decision-maker and the learning outcome(s) for the simulation exercise. We determine which information rings are compromised using the probability that the simulated cyber defenses that protect each ring can be compromised. These probabilities are based upon prior cyber attack activity in the simulation exercise as well as similar real-world cyber attacks. To determine which information in a compromised "ring" to alter, the simulation environment maintains a record of the cyber attacks that have succeeded in the simulation environment as well as the decision-making context. These two pieces of information are used to compute an estimate of the likelihood that the cyber attack can alter, destroy, or falsify each piece of information in a compromised ring. The unpredictability of information alteration in our approach adds greater realism to the cyber event. This paper suggests a new technique that can be used for cyber warfare simulation, the ring approach for modeling context-dependent information value, and our means for considering information value when assigning cyber

  17. Stomata and pathogens: Warfare at the gates

    OpenAIRE

    Gudesblat, Gustavo E; Torres, Pablo S; Vojnov, Adrian A

    2009-01-01

    Bacteria and fungi are capable of triggering stomatal closure through pathogen-associated molecular patterns (PAMPs), which prevents penetration through these pores. Therefore, the stomata can be considered part of the plant innate immune response. Some pathogens have evolved mechanisms to evade stomatal defense. The bacterial pathogen Xanthomonas campestris pv. campestris (Xcc), which infects plants of the Brassicaceae family mainly through hydathodes, has also been reported to infect plants...

  18. The Battle for Hue: Casualty and Disease Rates during Urban Warfare

    Science.gov (United States)

    1993-08-01

    NAVAL HEALTH RESEARCH CENTER AD-A271 748 THE BATTLE FOR HUE: CASUALTY AND DISEASE RATES DURING URBAN WARFARE C. G. Blood M. E. Anderson DTIC...prior to the first casualties being sustained. 2 The Battle for Flue: Casualty and Disease Rates During Urban Warfare Renewed nationalism with the ending...TITLE AND SUBTITLE 5. FUNDING NUMBERS The Battle for Hue: Casualty and Disease Rates Program Element: 63706N During Urban Warfare Work Unit Number: 6

  19. Stuxnet and Cyber-Warfare (2/2)

    CERN Multimedia

    CERN. Geneva

    2016-01-01

    The first part of the lecture is devoted to the description of the Stuxnet worm, the first cyber-weapon whose existence has been made public, discovered in 2010 and targeting a specific industrial control system; the worm is responsible for the damaging of many centrifuges at an uranium enrichment facility, with the goal of sabotaging Iran's nuclear program. In the second part, the main features of cyber-warfare in conflict and pre-conflict activities will be discussed and compared to the conventional warfare domains, with also a general view at the international political debate on this topic.   Check the http://pugwash.org web site, an organisation that seeks a world free of nuclear weapons and other weapons of mass destruction. The lecturer invites comments via email to Gian.Piero.Siroli@cern.ch NB! All Academic Training lectures are recorded and are publicly available. There is no live webcast.

  20. Stuxnet and Cyber-Warfare (1/2)

    CERN Multimedia

    CERN. Geneva

    2016-01-01

    The first part of the lecture is devoted to the description of the Stuxnet worm, the first cyber-weapon whose existence has been made public, discovered in 2010 and targeting a specific industrial control system; the worm is responsible for the damaging of many centrifuges at an uranium enrichment facility, with the goal of sabotaging Iran's nuclear program. In the second part, the main features of cyber-warfare in conflict and pre-conflict activities will be discussed and compared to the conventional warfare domains, with also a general view at the international political debate on this topic. Check the http://pugwash.org web site, an organisation that seeks a world free of nuclear weapons and other weapons of mass destruction.   NB! All Academic Training lectures are recorded and are publicly available. There is no live webcast.

  1. Cutaneous reactions in nuclear, biological and chemical warfare

    Directory of Open Access Journals (Sweden)

    Arora Sandeep

    2005-03-01

    Full Text Available Nuclear, biological and chemical warfare have in recent times been responsible for an increasing number of otherwise rare dermatoses. Many nations are now maintaining overt and clandestine stockpiles of such arsenal. With increasing terrorist threats, these agents of mass destruction pose a risk to the civilian population. Nuclear and chemical attacks manifest immediately while biological attacks manifest later. Chemical and biological attacks pose a significant risk to the attending medical personnel. The large scale of anticipated casualties in the event of such an occurrence would need the expertise of all physicians, including dermatologists, both military and civilian. Dermatologists are uniquely qualified in this respect. This article aims at presenting a review of the cutaneous manifestations in nuclear, chemical and biological warfare and their management.

  2. Containment 2.0: U.S. Political Warfare

    Science.gov (United States)

    2016-12-01

    and was intended to ensure the heritage , culture , and languages of ethnic minorities in the Soviet Union were maintained. The secondary objective was...http://ndupress.ndu.edu/Media/News/News-Article-View/Article/643108/unconventional- warfare-in-the-gray-zone/. 4 radio messaging, and cultural ...staging a communist coup in Czechoslovakia in early 1948.28 Furthermore, each of these events started with the sponsorship of pro-communist movements

  3. Handbook on Ground Forces Attrition in Modern Warfare

    Science.gov (United States)

    1986-09-01

    Dupuy d ELECTE John R. Brinkerhoff 0 APR 2 81994 C. Curtiss Johnson Peter J. Clark A Division of: DATA MEMORY SYSTEMS, INC. 10332 Democracy Lane Thi...Evaluation and Fe.earch Organization A Division of Data Memory Systems.. Inc. 10392 Democracy Lcne * Fairfax, Virginia 22030 Tel,: (703) 591-36ඒ The...data base touching a variety of aspects of warfare and analyzed it using techniques of the social and behavioral sciences. The work considers

  4. Just War and Postmodern Warfare: A German Case Study

    Science.gov (United States)

    2015-04-01

    non-lethal in equal measure. In many ways, Germany’s Bundeswehr (military) construct and participation in various conflicts mirror contemporary just...war theory and postmodern warfare, while its military concept lacks the necessary postmodern balance. The Bundeswehr stands in stark contrast to...the United States. The Bundeswehr is only employed for the purposes of defending German citizens where the United States military can be employed to

  5. Employing U.S. Information Operations Against Hybrid Warfare Threats

    Science.gov (United States)

    2013-03-01

    19b. TELEPHONE NUMBER (Include area code ) USAWC STRATEGY RESEARCH PROJECT Employing U.S. Information Operations Against...hostile computer code through internet infrastructure in multiple countries en route to the target) have enormous legal ramifications. Even within the...59 145 William J. Nemeth , Future War And Chechnya: A Case For Hybrid Warfare, (Monterey CA: Naval Postgraduate School, June 2002), 74. 146 U.S

  6. Information Warfare and Information Operations: Protecting The Global Information Environment.

    Science.gov (United States)

    1998-03-06

    findings in a November 1996 report described by the Wall Street Journal as "unusually strident.൮ It made 13 recommendations, including one for...Funds Moved Around World", The Wall Street Journal , September 12, 1995, p 1. 21 Data Provided By Member of the President’s Commission on Critical...U.S. Department of Defense, April 1997, 230. 38 Thomas E. Ricks, "Information Warfare Defense is Urged", Wall Street Journal , 6 January 1997, Section

  7. Wrestling the Bear: The Rise of Russian Hybrid Warfare

    Science.gov (United States)

    2015-04-13

    search.proguest.com.nduezproxy.idm.oclc.orgldocview/1 545535275?accountid.:: J2686. (accessed on 4 December 2014). 14 Reuters, " Malaysia : Dutch...with subversive efforts. The aggressor often resorts to clandestine actions, to avoid attribution or retribution. Without a credible smoking gun, NATO...2015. Accessed December 27, 2014. http://www .nato.int/docu/review/20 14/ Also-in-20 14/Deterring-hybrid- warfare/EN/index .htm. Reuters,. ’ Malaysia

  8. Nodes and Codes: The Reality of Cyber Warfare

    Science.gov (United States)

    2012-05-17

    that spin highly toxic, corrosive , and radioactive uranium gas (Uranium Hexafluoride) at over 100,000...Policy for Information Warfare,” Intellibriefs, http://intellibriefs.blogspot.com/2009_03_22_archive.html (accessed February 11, 2012). 81 Marina ...commentary_battlefield_on_your_desktop/2345202.html (accessed December 13, 2011). Myakisheva, Marina . “What is Russia’s Answer to Cyber Threats?” CNews.ru

  9. Enterprises as Inquiring Systems with Implications for Information Warfare

    Science.gov (United States)

    2014-06-01

    applying C. West Churchman’s characterization of Western epistemology , which was born in the tradition of the philosophy of science, in the business... epistemology they most closely resemble. 2.1 Lockian Model The Lockian model bases reasoning on experiment and consensus. Empirical information is gathered...defined as the “integrated employment of the core capabilities of electronic warfare, computer network operations, psychological operations, military

  10. Russian and Chinese Information Warfare: Theory and Practice

    Science.gov (United States)

    2004-06-01

    Integral neurolinguistic programming •Placing essential programs into the conscious or sub- conscious mind •Subconscious suggestions that modify human...Generators of special rays •Optical systems • Neurolinguistic programming •Computer psychotechnology •The mass media •Audiovisual effects •Special effects...Information Warfare: Theory and Practice 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER 6. AUTHOR(S) 5d. PROJECT NUMBER 5e

  11. NATO Advanced Research Workshop on Fluorescence and other Optical Properties of Biological Particles for Biological Warfare Agent Sensors

    CERN Document Server

    Hoekstra, Alfons; Videen, Gorden; Optics of Biological Particles

    2007-01-01

    This book covers the optics of single biological particles, both theory and experiment, with emphasis on Elastic Light Scattering and Fluorescence. It deals with the optics of bacteria (bio-aerosols), marine particles (selected phytoplankton communities) and red and white blood cells. Moreover, there are dedicated chapters on a general theory for scattering by a cell, and modelling and simulation of scattering by inhomogeneous biological cells. Finally, one chapter is dedicated to astro-biological signatures, discussing the possibilities for detecting non-terrestrial biological material. The volume has up-to-date discussions on new experimental and numerical techniques, and many examples of applications of these techniques in real-life systems, as used to detect and characterize e.g. biological warfare agents or human blood cells.

  12. 78 FR 72025 - Security Zones; Naval Base Point Loma; Naval Mine Anti Submarine Warfare Command; San Diego Bay...

    Science.gov (United States)

    2013-12-02

    ...-AA87 Security Zones; Naval Base Point Loma; Naval Mine Anti Submarine Warfare Command; San Diego Bay... establishing a new security zone at the Naval Mine and Anti-Submarine Warfare Command to protect the relocated... Commander of Naval Base Point Loma, the Commander of the Naval Mine Anti Submarine Warfare Command, and the...

  13. Stomata and pathogens: Warfare at the gates.

    Science.gov (United States)

    Gudesblat, Gustavo E; Torres, Pablo S; Vojnov, Adrian A

    2009-12-01

    Bacteria and fungi are capable of triggering stomatal closure through pathogen-associated molecular patterns (PAMPs), which prevents penetration through these pores. Therefore, the stomata can be considered part of the plant innate immune response. Some pathogens have evolved mechanisms to evade stomatal defense. The bacterial pathogen Xanthomonas campestris pv. campestris (Xcc), which infects plants of the Brassicaceae family mainly through hydathodes, has also been reported to infect plants through stomata. A recent report shows that penetration of Xcc in Arabidopsis leaves through stomata depends on a secreted small molecule whose synthesis is under control of the rpf/diffusible signal factor (DSF) cell-to-cell signaling system, which also controls genes involved in biofilm formation and pathogenesis. The same reports shows that Arabidopsis ROS- and PAMP-activated MAP kinase 3 (MPK3) is essential for stomatal innate response. Other recent and past findings about modulation of stomatal behaviour by pathogens are also discussed. In all, these findings support the idea that PAMP-triggered stomatal closure might be a more effective and widespread barrier against phytopathogens than previously thought, which has in turn led to the evolution in pathogens of several mechanisms to evade stomatal defense.

  14. 78 FR 29699 - Transfer of Administrative Jurisdiction: Marine Corps Mountain Warfare Training Center...

    Science.gov (United States)

    2013-05-21

    ... Forest Service Transfer of Administrative Jurisdiction: Marine Corps Mountain Warfare Training Center... order authorizing the transfer of administrative jurisdiction from the Department of Agriculture to the..., lying within the Marine Corps Mountain Warfare Training Center and the Humboldt-Toiyabe National Forest...

  15. Metal organic frameworks for the catalytic detoxification of chemical warfare nerve agents

    Science.gov (United States)

    Hupp, Joseph T.; Farha, Omar K.; Katz, Michael J.; Mondloch, Joseph E.

    2017-04-18

    A method of using a metal organic framework (MOF) comprising a metal ion and an at least bidendate organic ligand to catalytically detoxify chemical warfare nerve agents including exposing the metal-organic-framework (MOF) to the chemical warfare nerve agent and catalytically decomposing the nerve agent with the MOF.

  16. Defending Our Satellites: The Need for Electronic Warfare Education and Training

    Science.gov (United States)

    2015-12-01

    74 | Air & Space Power Journal Defending Our Satellites The Need for Electronic Warfare Education and Training Lt Col E. Lincoln Bonner, USAF...expanding education and training in the use of electronic warfare to defend US satellites and improve their survivability. The following discussion...Fighting The US military gains a disproportionate advantage over potential adversaries by exploiting space capabilities. Satellites provide an

  17. Status of dental health in chemical warfare victims: The case of Isfahan, Iran

    Directory of Open Access Journals (Sweden)

    Ahmad Mottaghi

    2012-01-01

    Conclusion: Chemical warfare victims have relatively poor dental/oral health. Chemical injury might cause a dysfunction in saliva secretion, with decrease in saliva secretion increasing the risk for tooth decay and periodontal disorders. Further research is required to find out the exact underlying mechanisms and the factors associated with poor dental/oral health in chemical warfare victims.

  18. Application of non-quantitative modelling in the analysis of a network warfare environment

    CSIR Research Space (South Africa)

    Veerasamy, N

    2008-07-01

    Full Text Available Network warfare is an emerging concept that focuses on the network and computer based forms through which information is attacked and defended. Various computer and network security concepts thus play a role in network warfare. Due the intricacy...

  19. Summary of Research 1995, Interdisciplinary Academic Groups (Command, Control & Communications Academic Group, Electronic Warfare Academic Group, Space Systems Academic Group and Undersea Warfare Academic Group)

    OpenAIRE

    Faculty of the Academic Groups

    1995-01-01

    The views expressed in this report are those of the authors and do not reflect the official policy or position of the Department of Defense or the U.S. Government. This report contains information of research projects in the four interdisciplinary groups, Command, Control & Communications Academic Group, Electronic Warfare Academic Group, Space Systems Academic Group and Undersea Warfare Academic Group, which were carried out under funding of the Naval Postgraduate School Research...

  20. Women and Warfare in Pre-Colonial Akokoland

    Directory of Open Access Journals (Sweden)

    Olusanya Faboyede

    2013-06-01

    Full Text Available In pre-colonial Akokoland, the most conspicuous fact about its political economy and peace was security challenges and mismanagement through internal and external manipulation. This paper analyses the role of women in warfare in pre-colonial Akokoland as a potential to integrate Akokoland, a multi-cultural community for productive and sustained effort to promote economic development in the region. Thus, the paper is conceptualised on historical objectivity. The paper argues that one of the ways of dealing with the scale of insecurity in the society is to assimilate historical thinking into the intention of the security agents (women warriors.

  1. Russian Military Thinking – A New Generation of Warfare

    Directory of Open Access Journals (Sweden)

    Mattsson Peter A.

    2015-06-01

    Full Text Available This article deals with how Russian warfighting is described and discussed in contemporary Russian military theory. The approach has been studies, analyses and interpretations of primarily Russian sources as prominent Russian journals, but also Western analyses and interpretations of contemporary Russian warfighting discussions. Theoretical considerations are limited to the period from the 1980s to the present day - 2014. Mainly Russian experts on military theory (Bogdanov, Chekinov, Gareev, Kiselyov, Kuralenko, Morozov, Slipchenko, Vinogradov, Vladimirov, Vorobyov have been studied, but also sources from some prominent Western experts on Russian warfare (FitzGerald, Gileotti, Kipp, McDermott.

  2. Lawfare in Hybrid Wars: The 21st Century Warfare

    OpenAIRE

    Mosquera, A.; Bachmann, Sascha-Dominik

    2016-01-01

    In the context of ‘Hybrid Warfare’ as 21st Century’s threat to peace and security, this paper intends to address the role of Lawfare. The use of law as a weapon, Lawfare,1can have a tangible impact on democratic States when their adversaries use it in an exploitative way. Lawfare can be used in the context of Hybrid War.2 Examples of Hybrid Warfare as witnessed in the Russian/Ukrainian conflict of 2014/2015 and the ongoing conflict with Daesh are particularly sensitive to Lawfare due to an ap...

  3. Cybersecurity protecting critical infrastructures from cyber attack and cyber warfare

    CERN Document Server

    Johnson, Thomas A

    2015-01-01

    The World Economic Forum regards the threat of cyber attack as one of the top five global risks confronting nations of the world today. Cyber attacks are increasingly targeting the core functions of the economies in nations throughout the world. The threat to attack critical infrastructures, disrupt critical services, and induce a wide range of damage is becoming more difficult to defend against. Cybersecurity: Protecting Critical Infrastructures from Cyber Attack and Cyber Warfare examines the current cyber threat landscape and discusses the strategies being used by governments and corporatio

  4. Built to Outlast: Operational Approaches to Hybrid Warfare

    Science.gov (United States)

    2012-05-17

    PAGE 19b. PHONE NUMBER (include area code ) (U) (U) (U) (U) 100 (913)758-3300 Standard Form 298 (Rev. 8-98) Prescribed by ANSI Std. Z39.18 i...William J. Nemeth , Future War and Chechnya: A Case for Hybrid Warfare (master’s thesis, US Naval Postgraduate School, 2002); Erin M. Simpson...2005). Unpublished papers pre-dating Hoffman’s effort include a 2002 Master’s thesis by William J. Nemeth which represents the earliest scholarly work

  5. Venezuela’s Hugo Chavez, Bolivarian Socialism, and Asymmetric Warfare

    Science.gov (United States)

    2005-10-01

    lead to a better life for all. Finally, taken all together, this is “war as a whole,” or what Chávez calls “ Guerra de todo el pueblo...VENEZUELA’S HUGO CHÁVEZ, BOLIVARIAN SOCIALISM, AND ASYMMETRIC WARFARE Beginning with the election of Lieutenant Colonel Hugo Chávez Frias as President...financial, material, and political-military support of people’s movements.31 This takes us to the notion of “ Guerra de todo el pueblo” (war of all

  6. Environmental assessments of sea dumped chemical warfare agents

    DEFF Research Database (Denmark)

    Sanderson, Hans; Fauser, Patrik

    This is a report on the information gathered during work related to sea dumped chemical warfare agents. It mainly reviews the work conducted in relation to the installation of the two Nord Stream gas pipeline from 2008-2012. The focus was on the weight-of-evidence risk assessment of disturbed CWA...... residues in connection with the installation of the pipelines. Novel exposure and toxicity assessments are presented and the risk is assessed. The overall conclusion is that there is a negligible acute added CWA risk towards the fish community from the installation of the pipelines....

  7. Destruction of chemical warfare agents using metal-organic frameworks

    Science.gov (United States)

    Mondloch, Joseph E.; Katz, Michael J.; Isley, William C., III; Ghosh, Pritha; Liao, Peilin; Bury, Wojciech; Wagner, George W.; Hall, Morgan G.; Decoste, Jared B.; Peterson, Gregory W.; Snurr, Randall Q.; Cramer, Christopher J.; Hupp, Joseph T.; Farha, Omar K.

    2015-05-01

    Chemical warfare agents containing phosphonate ester bonds are among the most toxic chemicals known to mankind. Recent global military events, such as the conflict and disarmament in Syria, have brought into focus the need to find effective strategies for the rapid destruction of these banned chemicals. Solutions are needed for immediate personal protection (for example, the filtration and catalytic destruction of airborne versions of agents), bulk destruction of chemical weapon stockpiles, protection (via coating) of clothing, equipment and buildings, and containment of agent spills. Solid heterogeneous materials such as modified activated carbon or metal oxides exhibit many desirable characteristics for the destruction of chemical warfare agents. However, low sorptive capacities, low effective active site loadings, deactivation of the active site, slow degradation kinetics, and/or a lack of tailorability offer significant room for improvement in these materials. Here, we report a carefully chosen metal-organic framework (MOF) material featuring high porosity and exceptional chemical stability that is extraordinarily effective for the degradation of nerve agents and their simulants. Experimental and computational evidence points to Lewis-acidic ZrIV ions as the active sites and to their superb accessibility as a defining element of their efficacy.

  8. Punishment sustains large-scale cooperation in prestate warfare

    Science.gov (United States)

    Mathew, Sarah; Boyd, Robert

    2011-01-01

    Understanding cooperation and punishment in small-scale societies is crucial for explaining the origins of human cooperation. We studied warfare among the Turkana, a politically uncentralized, egalitarian, nomadic pastoral society in East Africa. Based on a representative sample of 88 recent raids, we show that the Turkana sustain costly cooperation in combat at a remarkably large scale, at least in part, through punishment of free-riders. Raiding parties comprised several hundred warriors and participants are not kin or day-to-day interactants. Warriors incur substantial risk of death and produce collective benefits. Cowardice and desertions occur, and are punished by community-imposed sanctions, including collective corporal punishment and fines. Furthermore, Turkana norms governing warfare benefit the ethnolinguistic group, a population of a half-million people, at the expense of smaller social groupings. These results challenge current views that punishment is unimportant in small-scale societies and that human cooperation evolved in small groups of kin and familiar individuals. Instead, these results suggest that cooperation at the larger scale of ethnolinguistic units enforced by third-party sanctions could have a deep evolutionary history in the human species. PMID:21670285

  9. Challenges of Military Health Service Support in Mountain Warfare.

    Science.gov (United States)

    Lechner, Raimund; Küpper, Thomas; Tannheimer, Markus

    2018-03-16

    History is full of examples of the influence of the mountain environment on warfare. The aim of this article is to identify the main environmental hazards and summarize countermeasures to mitigate the impact of this unique environment. A selective PubMed and Internet search was conducted. Additionally, we searched bibliographies for useful supplemental literature and included the recommendations of the leading mountain medicine and wilderness medicine societies. A definition of mountain warfare mainly derived from environmental influences on body functions is introduced to help identify the main environmental hazards. Cold, rugged terrain, hypoxic exposure, and often a combination and mutual aggravation of these factors are the most important environmental factors of mountain environment. Underestimating this environmental influence has decreased combat strength and caused thousands of casualties during past conflicts. Some marked differences between military and civilian mountaineering further complicate mission planning and operational sustainability. To overcome the restrictions of mountain environments, proper planning and preparation, including sustained mountain mobility training, in-depth mountain medicine training with a special emphasize on prolonged field care, knowledge of acclimatization strategies, adapted time calculations, mountain-specific equipment, air rescue strategies and makeshift evacuation strategies, and thorough personnel selection, are vital to guarantee the best possible medical support. The specifics of managing risks in mountain environments are also critical for civilian rescue missions and humanitarian aid. Copyright © 2018 Wilderness Medical Society. Published by Elsevier Inc. All rights reserved.

  10. China's Use of Cyber Warfare: Espionage Meets Strategic Deterrence

    Directory of Open Access Journals (Sweden)

    Magnus Hjortdal

    2011-01-01

    Full Text Available This article presents three reasons for states to use cyber warfare and shows that cyberspace is—and will continue to be—a decisive element in China's strategy to ascend in the international system. The three reasons are: deterrence through infiltration of critical infrastructure; military technological espionage to gain military knowledge; and industrial espionage to gain economic advantage. China has a greater interest in using cyberspace offensively than other actors, such as the United States, since it has more to gain from spying on and deterring the United States than the other way around. The article also documents China's progress in cyber warfare and shows how it works as an extension of its traditional strategic thinking and the current debate within the country. Several examples of cyber attacks traceable to China are also presented. This includes cyber intrusions on a nuclear arms laboratory, attacks on defense ministries (including the Joint Strike Fighter and an airbase and the U.S. electric grid, as well as the current Google affair, which has proved to be a small part of a broader attack that also targeted the U.S. Government. There are, however, certain constraints that qualify the image of China as an aggressive actor in cyberspace. Some believe that China itself is the victim of just as many attacks from other states. Furthermore, certain actors in the United States and the West have an interest in overestimating China's capabilities in cyberspace in order to maintain their budgets.

  11. Integrated Swarming Operations for Air Base Defense: Applications in Irregular Warfare

    National Research Council Canada - National Science Library

    Gray, Ron

    2006-01-01

    .... However, in low-intensity conflicts (LICs) or irregular warfare (IW) campaigns, U.S. forces are faced with an irregular enemy, one that does not choose to fight its forces directly, but rather through unconventional or indirect methods...

  12. Understanding "Understanding" Flow for Network-Centric Warfare: Military Knowledge-Flow Mechanics

    National Research Council Canada - National Science Library

    Nissen, Mark

    2002-01-01

    Network-centric warfare (NCW) emphasizes information superiority for battlespace efficacy, but it is clear that the mechanics of how knowledge flows are just as important as those pertaining to the networks and communication...

  13. Defense Base Closure and Realignment Budget Data for the Naval Surface Warfare Center

    National Research Council Canada - National Science Library

    1993-01-01

    ... and realignment military construction projects. This report provides the results of the audit related to the realignment of Naval Surface Warfare Centers elements in White Oak, Maryland, and Panama City, Florida, to Dahlgren, Virginia...

  14. Optimizing Armed Forces Capabilities for Hybrid Warfare – New Challenge for Slovak Armed Forces

    Directory of Open Access Journals (Sweden)

    Peter PINDJÁK

    2015-09-01

    Full Text Available The paper deals with the optimization of military capabilities of the Slovak Armed Forces for conducting operations in a hybrid conflict, which represents one of the possible scenarios of irregular warfare. Whereas in the regular warfare adversaries intend to eliminate the centers of gravity of each other, most often command and control structures, in irregular conflicts, the center of gravity shifts towards the will and cognitive perception of the target population. Hybrid warfare comprises a thoroughly planned combination of conventional military approaches and kinetic operations with subversive, irregular activities, including information and cyber operations. These efforts are often accompanied by intensified activities of intelligence services, special operation forces, and even mercenary and other paramilitary groups. The development of irregular warfare capabilities within the Slovak Armed Forces will require a progressive transformation process that may turn the armed forces into a modern and adaptable element of power, capable of deployment in national and international crisis management operations.

  15. Interoperability and Network-Centric Warfare: US Army Future Force and German Army in 2015

    National Research Council Canada - National Science Library

    Alme, Thorsten

    2005-01-01

    .... Special consideration is given to technical and behavioral interoperability. The monograph also assesses the projected capabilities of the German Bundeswehr in the year 2015 with regard to Network-Centric Warfare (NCW...

  16. Analysis of Acoustic Effects on Marine Mammals for the Proposed Undersea Warfare Training Range

    National Research Council Canada - National Science Library

    Jette, Steven D; Cembrola, Joan M; Mitchell, Glenn H; Fetherston, Thomas N

    2005-01-01

    ...) for the proposed Undersea Warfare Training Range (USWTR). The DEIS includes an assessment of the effects of Navy sonars on marine mammals during exercises to occur on the range as required by the Marine Mammal Protection Act (MMPA...

  17. Surface Warfare Officer Retention: Analysis of Individual Ready Reserve Survey Data

    National Research Council Canada - National Science Library

    Stoker, Carol; Crawford, Alice

    2008-01-01

    ... (including morale and lack of mentoring), push both men and women out of the Navy. Nonetheless, the Navy s primary effort to improve retention has been to introduce the Surface Warfare Officer Continuation Pay (SWOCP...

  18. Diagnosis of Exposure to Chemical Warfare Agents: A Comprehensive Literature Survey 1990-2005

    National Research Council Canada - National Science Library

    Noort, D

    2006-01-01

    This report is an update of TNO report PML 2003-A63. In this report an overview is presented of the methods currently available for detection of exposure to a number of chemical warfare agents (CWA), i.e...

  19. Information Warfare: Issues Associated with the Defense of DOD Computers and Computer Networks

    National Research Council Canada - National Science Library

    Franklin, Derek

    2002-01-01

    ... that may threaten the critical information pathways of the armed forces An analysis of the history of computer information warfare reveals that there was an embarrassing lack of readiness and defense...

  20. The Third World War? In The Cyberspace. Cyber Warfare in the Middle East.

    Directory of Open Access Journals (Sweden)

    Martina

    2014-06-01

    Full Text Available This article aims to provide a brief and comprehensive introduction to the issue of cyber warfare and to display the recent development in this area. Geographically, it focuses on the Middle East region, since the vast majority of the most important recent cyber attacks appeared just in there or were connected to it. The first part of the article tries to define the key notion of cyber warfare, compares it to the standard warfare and presents different types of cyber weapons that are known today. The second part points out examples of the most striking recent cyber attacks and uses them as evidences to demonstrate today's importance and dissemination of cyber warfare. Finally, the article sums up pros and cons of the cyber weapons and, in view of these, predicts a significant increase in their use in any future war conflicts.

  1. The Army Ground Forces Training for Mountain and Winter Warfare - Study No. 23

    National Research Council Canada - National Science Library

    Govan, Thomas

    1946-01-01

    This general study of the experiments in mountain and winter warfare training from 1940 to 1944 is designed as an introduction to the histories of the Mountain Training Center and The 10th Mountain...

  2. Cerium oxide for the destruction of chemical warfare agents: A comparison of synthetic routes

    Czech Academy of Sciences Publication Activity Database

    Janos, P.; Henych, Jiří; Pelant, O.; Pilařová, V.; Vrtoch, L.; Kormunda, M.; Mazanec, K.; Štengl, Václav

    2016-01-01

    Roč. 304, MAR (2016), s. 259-268 ISSN 0304-3894 Institutional support: RVO:61388980 Keywords : Cerium oxide * Chemical warfare agents * Organophosphate compounds * Decontamination Subject RIV: CA - Inorganic Chemistry Impact factor: 6.065, year: 2016

  3. Damn! The Torpedoes: Coping with Mine Warfare in the Joint Maritime Environment

    National Research Council Canada - National Science Library

    Bahr, James D

    2007-01-01

    ... and the attainment of joint operational maneuver. The potential exists for non-state actors to acquire sea mines and subsequently employ mine warfare as a means of crippling the Navy throughout its range of military operations...

  4. Improving Blood Monitoring of Enzymes as Biomarkers of Risk from Anticholinergic Pesticides and Chemical Warfare Agents

    National Research Council Canada - National Science Library

    Wilson, Barry W

    2005-01-01

    Blood biomarkers are an important way to monitor exposure to anticholinergic pesticides and chemical warfare agents and to establish whether some personnel are at greater risk than others from exposure...

  5. Improving Blood Monitoring of Enzymes as Biomarkers of Risk from Anticholinergic Pesticides and Chemical Warfare Agents

    National Research Council Canada - National Science Library

    Wilson, Barry W

    2006-01-01

    Blood biomarkers are an important way to monitor exposure to anticholinergic pesticides and chemical warfare agents and to establish whether some personnel are at greater risk than others from exposure...

  6. Evaluation Report on Management Controls at the Disbursing Office, Naval Surface Warfare Center, Dahlgren, Virginia

    National Research Council Canada - National Science Library

    Lane, F

    1997-01-01

    On September 19, 1996, the Defense Criminal Investigative Service requested assistance from the Assistant Inspector General for Auditing, DoD, in an investigation at the Naval Surface Warfare Center, Dahlgren, Virginia...

  7. Guerrilla Warfare: Cause and Conflict (A 21st Century Success Story?),

    Science.gov (United States)

    1981-01-01

    and low intensity warfare is the means, both qualitative and quantitative, employed to achieve the intended goal. Both types of war require analysis ...administration.’ 9 If despair and aggravation become the mortar and pestle of future guerrilla warfare, then weapons availability and population growth might be... Thailand , and the Philippines. 55 Every time you ask, "Where are they going to get the money to pay," everybody falls silent. Brazil alone owes $55

  8. Twenty-First-Century Air Warfare and the Invisible War: Strategic Agility

    Science.gov (United States)

    2015-10-01

    September–October 2015 | 85 Views Twenty-First-Century Air Warfare and the Invisible War Strategic Agility Maj Michael W. Benitez, USAF America’s... gap between the dynamic 21st-century environment and our 20th-century bureaucracy. Their initiative and perse- verance allow us to succeed in our...SUBTITLE Twenty-First-Century Air Warfare and the Invisible War: Strategic Agility 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER 6

  9. Detachment 101 and North Burma: Historical Conditions for Future Unconventional Warfare Operations

    Science.gov (United States)

    2016-05-26

    of 1941 (1990; repr., Washington, DC: Government Printing Office, 2011), 42. 24 Maurice Matloff and Edwin M. Snell, Strategic Planning for Coalition...Warfare: 1941­ 1942 (1953 repr., Washington, DC: Government Printing Office, 1999), 120. 25 Maurice Matloff, Strategic Planning for Coalition Warfare...opportunity for DET 101 to improve its relationships with the Kachin people. 99War Report: OSS, Volume 2, 383. 100 Richard Dunlop, Behind Japanese Lines with

  10. Irregular Warfare as a National Military Strategy Approach for Small States

    Science.gov (United States)

    2013-12-01

    of these “pods”: the question of homogeneity or heterogeneity. There 216 Oliker, Russia´s Chechen Wars...Ronfeldt regarding the degree of homogeneity of the teams should also be evaluated. In some cases, there might be a higher degree of specialization in...prerequisites. A. IRREGULAR WARFARE – A DIRTY WAR? Based on the last decades of conflicts, the tactics used in irregular warfare have left a bad taste in the

  11. Key Planning Factors for Recovery from a Chemical Warfare Agent Incident

    Science.gov (United States)

    2012-07-01

    GB], Franke, S., Manual of Military Chemistry , Volume 1. Chemistry of Chemical Warfare Agents, Deutscher Militîrverlag: Berlin (East), 1967... Chemistry , Volume 1. Chemistry of Chemical Warfare Agents, Deutscher Militîrverlag: Berlin (East), 1967. Translated from German by U.S. Department of...Response and Recovery Phases A common misconception is that recovery begins after the response phase. Recovery, however, actually begins during

  12. Estimated Chemical Warfare Agent Surface Clearance Goals for Remediation Pre-Planning

    Energy Technology Data Exchange (ETDEWEB)

    Dolislager, Frederick [University of Tennessee, Knoxville (UTK); Bansleben, Dr. Donald [U.S. Department of Homeland Security; Watson, Annetta Paule [ORNL

    2010-01-01

    Health-based surface clearance goals, in units of mg/cm2, have been developed for the persistent chemical warfare agents sulfur mustard (HD) and nerve agent VX as well as their principal degradation products. Selection of model parameters and critical receptor (toddler child) allow calculation of surface residue estimates protective for the toddler child, the general population and adult employees of a facilty that has undergone chemical warfare agent attack.

  13. Electronic Warfare Closed Loop Laboratory (EWCLL) Antenna Motor Software and Hardware Development

    Science.gov (United States)

    2016-09-01

    Electronic Warfare Closed Loop Laboratory (EWCLL) Antenna Motor Software and Hardware Development by Neal Tesny Sensors and Electron Devices Directorate...TITLE AND SUBTITLE Electronic Warfare Closed Loop Laboratory (EWCLL) Antenna Motor Software and Hardware Development 5a. CONTRACT NUMBER 5b...called cllMotorBasic. This module can be used separately if one is developing other software that needs to control the motors . The front panel of this

  14. Welcome to the Naval Postgraduate School Center on Terrorism and Irregular Warfare, Webpage

    OpenAIRE

    Center on Terrorism and Irregular Warfare

    2013-01-01

    Includes an image of the main page on this date and compressed file containing additional web pages. Established in 1998, The Center on Terrorism and Irregular Warfare produces timely, innovative, interdisciplinary analysis relevant to policy and operations. In studying terrorism and irregular warfare, the Center focuses the research capabilities of its staff and the Naval Postgraduate School on an area of critical importance to the national security of the United States.

  15. Modeling Anti-Air Warfare With Discrete Event Simulation and Analyzing Naval Convoy Operations

    Science.gov (United States)

    2016-06-01

    W., & Scheaffer, R. L. (2008). Mathematical statistics with applications . Belmont, CA: Cengage Learning. 118 THIS PAGE INTENTIONALLY LEFT BLANK...WARFARE WITH DISCRETE EVENT SIMULATION AND ANALYZING NAVAL CONVOY OPERATIONS by Ali E. Opcin June 2016 Thesis Advisor: Arnold H. Buss Co...REPORT DATE June 2016 3. REPORT TYPE AND DATES COVERED Master’s thesis 4. TITLE AND SUBTITLE MODELING ANTI-AIR WARFARE WITH DISCRETE EVENT

  16. The impact of warfare on the soil environment

    Science.gov (United States)

    Certini, Giacomo; Scalenghe, Riccardo; Woods, William I.

    2013-12-01

    One of the most dramatic ways humans can affect soil properties is through the performance of military activities. Warfare-induced disturbances to soil are basically of three types - physical, chemical, and biological - and are aimed at causing direct problems to enemies or, more often, are indirect, undesired ramifications. Physical disturbances to soil include sealing due to building of defensive infrastructures, excavation of trenches or tunnels, compaction by traffic of machinery and troops, or cratering by bombs. Chemical disturbances consist of the input of pollutants such as oil, heavy metals, nitroaromatic explosives, organophosphorus nerve agents, dioxins from herbicides, or radioactive elements. Biological disturbances occur as unintentional consequences of the impact on the physical and chemical properties of soil or the deliberate introduction of microorganisms lethal to higher animals and humans such as botulin or anthrax. Soil represents a secure niche where such pathogens can perpetuate their virulence for decades.

  17. Nanostructured Metal Oxides for Stoichiometric Degradation of Chemical Warfare Agents.

    Science.gov (United States)

    Štengl, Václav; Henych, Jiří; Janoš, Pavel; Skoumal, Miroslav

    2016-01-01

    Metal oxides have very important applications in many areas of chemistry, physics and materials science; their properties are dependent on the method of preparation, the morphology and texture. Nanostructured metal oxides can exhibit unique characteristics unlike those of the bulk form depending on their morphology, with a high density of edges, corners and defect surfaces. In recent years, methods have been developed for the preparation of metal oxide powders with tunable control of the primary particle size as well as of a secondary particle size: the size of agglomerates of crystallites. One of the many ways to take advantage of unique properties of nanostructured oxide materials is stoichiometric degradation of chemical warfare agents (CWAs) and volatile organic compounds (VOC) pollutants on their surfaces.

  18. Information Warfare on Social Media: A Brand Management Perspective

    Directory of Open Access Journals (Sweden)

    Kalpokas Ignas

    2017-06-01

    Full Text Available Employing a perspective informed by brand management, this article aims at understanding information warfare operations in social media. The state, seen as brand, must project an image of itself to both internal and foreign audiences to unite the domestic audience and/or attract global support. However, in constructing a brand, states are vulnerable to ‘sofa warriors’ – ordinary individuals who have been unwittingly recruited by hostile actors to disseminate (over social media or other platforms a counter-brand, harmful to the state concerned. These new threats are investigated in light of recent tendencies in online branding, elucidating their status as a national security threat, with the potential to significantly disrupt life in political communities.

  19. Agroterrorism, Biological Crimes, and Biological Warfare Targeting Animal Agriculture

    Energy Technology Data Exchange (ETDEWEB)

    Wilson, Terry M.; Logan-Henfrey, Linda; Weller, Richard E.; Kellman, Brian

    2000-04-12

    There is a rising level of concern that agriculture might be targeted for economic sabotage by terrorists. Knowledge gathered about the Soviet Union biological weapons program and Iraq following the Gulf War, confirmed that animals and agricultural crops were targets of bioweapon development. These revelations are particularly disturbing in light of the fact that both countries are States Parties to the Biological and Toxin Weapons Convention that entered into force in 1975. The potential for misusing biotechnology to create more virulent pathogens and the lack of international means to detect unethical uses of new technologies to create destructive bioweapons is of increasing concern. Disease outbreaks, whether naturally occurring or intentionally, involving agricultural pathogens that destroy livestock and crops would have a profound impact on a country's infrastructure, economy and export markets. This chapter deals with the history of agroterrorism, biological crimes and biological warfare directed toward animal agriculture, specifically, horses, cattle, swine, sheep, goats, and poultry.

  20. RELATIONAL APPROACHES REGARDING FOCUSED LOGISTICS IN MODERN WARFARE JOINT OPERATIONS

    Directory of Open Access Journals (Sweden)

    Gheorghe MINCULETE

    2015-10-01

    Full Text Available The military joint operations of the future are characterized by large concentrations of forces and conventional means on the directions that permit the exploitation of the technological superiority and the manifestation of the offensive spirit of the commanders of the joint operation force groups. Having in mind the fact that the relation between the combatant forces and the logistic ones will shift more and more in favour of the latter, the aforementioned operations will be usually supported by modern flexible logistic structures. The constituted force groups will have a significant joint force character, ensuring superior quality of the troops’ combat training, both at individual level and collective level of units and large units. The current article presents innovative aspects of focused logistics, adapted for the modern warfare, which should be designed and achieved in order to increase the operational potential of the joint force groups.

  1. Book Review: Conquest in Cyberspace: National Security and Information Warfare

    Directory of Open Access Journals (Sweden)

    Gary C. Kessler

    2007-06-01

    Full Text Available Libicki, M.C. (2007. Conquest in Cyberspace: National Security and Information Warfare. New York: Cambridge University Press. 323 pages, ISBN: 978-0-521-69214-4 (paper, US$80Reviewed by Gary C. Kessler (gary.kessler@champlain.eduMany books -- and even movies ("Live Free or Die Hard" -- are based upon the premise of an impending information war. In these scenarios -- made all too plausible by the increased frequency with which we read about and experience major information security incidents -- a Bad Guy exploits known computer security vulnerabilities in order to control major national infrastructures via the Internet so as to reap financial, economic, and/or personal power.(see PDF for full review

  2. Advances in toxicology and medical treatment of chemical warfare nerve agents

    Directory of Open Access Journals (Sweden)

    Moshiri Mohammd

    2012-11-01

    Full Text Available Abstract Organophosphorous (OP Nerve agents (NAs are known as the deadliest chemical warfare agents. They are divided into two classes of G and V agents. Most of them are liquid at room temperature. NAs chemical structures and mechanisms of actions are similar to OP pesticides, but their toxicities are higher than these compounds. The main mechanism of action is irreversible inhibition of Acetyl Choline Esterase (AChE resulting in accumulation of toxic levels of acetylcholine (ACh at the synaptic junctions and thus induces muscarinic and nicotinic receptors stimulation. However, other mechanisms have recently been described. Central nervous system (CNS depression particularly on respiratory and vasomotor centers may induce respiratory failure and cardiac arrest. Intermediate syndrome after NAs exposure is less common than OP pesticides poisoning. There are four approaches to detect exposure to NAs in biological samples: (I AChE activity measurement, (II Determination of hydrolysis products in plasma and urine, (III Fluoride reactivation of phosphylated binding sites and (IV Mass spectrometric determination of cholinesterase adducts. The clinical manifestations are similar to OP pesticides poisoning, but with more severity and fatalities. The management should be started as soon as possible. The victims should immediately be removed from the field and treatment is commenced with auto-injector antidotes (atropine and oximes such as MARK I kit. A 0.5% hypochlorite solution as well as novel products like M291 Resin kit, G117H and Phosphotriesterase isolated from soil bacterias, are now available for decontamination of NAs. Atropine and oximes are the well known antidotes that should be infused as clinically indicated. However, some new adjuvant and additional treatment such as magnesium sulfate, sodium bicarbonate, gacyclidine, benactyzine, tezampanel, hemoperfusion, antioxidants and bioscavengers have recently been used for OP NAs poisoning.

  3. An Open Architecture Framework for Electronic Warfare Based Approach to HLA Federate Development

    Directory of Open Access Journals (Sweden)

    HyunSeo Kang

    2018-01-01

    Full Text Available A variety of electronic warfare models are developed in the Electronic Warfare Research Center. An Open Architecture Framework for Electronic Warfare (OAFEw has been developed for reusability of various object models participating in the electronic warfare simulation and for extensibility of the electronic warfare simulator. OAFEw is a kind of component-based software (SW lifecycle management support framework. This OAFEw is defined by six components and ten rules. The purpose of this study is to construct a Distributed Simulation Interface Model, according to the rules of OAFEw, and create Use Case Model of OAFEw Reference Conceptual Model version 1.0. This is embodied in the OAFEw-FOM (Federate Object Model for High-Level Architecture (HLA based distributed simulation. Therefore, we design and implement EW real-time distributed simulation that can work with a model in C++ and MATLAB API (Application Programming Interface. In addition, OAFEw-FOM, electronic component model, and scenario of the electronic warfare domain were designed through simple scenarios for verification, and real-time distributed simulation between C++ and MATLAB was performed through OAFEw-Distributed Simulation Interface.

  4. A Survey of Game Theoretic Approaches to Modelling Decision-Making in Information Warfare Scenarios

    Directory of Open Access Journals (Sweden)

    Kathryn Merrick

    2016-07-01

    Full Text Available Our increasing dependence on information technologies and autonomous systems has escalated international concern for information- and cyber-security in the face of politically, socially and religiously motivated cyber-attacks. Information warfare tactics that interfere with the flow of information can challenge the survival of individuals and groups. It is increasingly important that both humans and machines can make decisions that ensure the trustworthiness of information, communication and autonomous systems. Subsequently, an important research direction is concerned with modelling decision-making processes. One approach to this involves modelling decision-making scenarios as games using game theory. This paper presents a survey of information warfare literature, with the purpose of identifying games that model different types of information warfare operations. Our contribution is a systematic identification and classification of information warfare games, as a basis for modelling decision-making by humans and machines in such scenarios. We also present a taxonomy of games that map to information warfare and cyber crime problems as a precursor to future research on decision-making in such scenarios. We identify and discuss open research questions including the role of behavioural game theory in modelling human decision making and the role of machine decision-making in information warfare scenarios.

  5. Bleach vs. Bacteria

    Science.gov (United States)

    ... Articles | Inside Life Science Home Page Bleach vs. Bacteria By Sharon Reynolds Posted April 2, 2014 Your ... hypochlorous acid to help kill invading microbes, including bacteria. Researchers funded by the National Institutes of Health ...

  6. Guerilla Warfare & Law Enforcement: Combating the 21st Century Terrorist Cell within the U.S.

    Directory of Open Access Journals (Sweden)

    Major Richard Hughbank

    2009-01-01

    Full Text Available Both domestic and international terrorist organizations employ guerrilla warfare tactics, techniques, and procedures. Thus, the ability to identify and defeat the members of these organizations, cripple their infrastructures, and disrupt their financial resources lies in the understanding of modern guerrilla warfare as it develops in the twenty-first century within the United States.3 The forms of asymmetric warfare4 adopted by domestic and international terrorist groups alike is no longer intended to gain simple media exposure or governmental manipulation; they want to make an overpowering impact by causing massive loss of life and severe damage to infrastructure and are often motivated by religious imperatives and political goals. As terrorism analyst Stephen Flynn has observed, "Throughout the 20th century [Americans] were able to treat national security as essentially an out-of-body experience. When confronted by threats, [America] dealt with them on the turf of our allies or our adversaries. Aside from the occasional disaster and heinous crime, civilian life [in the United States] has been virtually terror-free." With the turn of the twenty-first century, terrorist operations have become more prevalent in the United States and are taking shape in the form of modern guerrilla warfare, thus creating new challenges for federal, state, and local law enforcement agencies. After reviewing the origin and nature of these challenges, this article will offer some suggestions for countering guerilla warfare in the United States.

  7. 78 FR 53109 - Security Zones; Naval Base Point Loma; Naval Mine Anti-Submarine Warfare Command; San Diego Bay...

    Science.gov (United States)

    2013-08-28

    ...-AA87 Security Zones; Naval Base Point Loma; Naval Mine Anti-Submarine Warfare Command; San Diego Bay... Anti-Submarine Warfare Command to protect the relocated marine mammal program. These security zone... the Port, The Commander of Naval Base Point Loma, the Commander of the Naval Mine Anti Submarine...

  8. Eye injuries in twentieth century warfare: a historical perspective.

    Science.gov (United States)

    Wong, T Y; Seet, M B; Ang, C L

    1997-01-01

    With successive wars in the twentieth century, there has been a relative increase in injuries to the eye compared to injuries of other parts of the body. The main causes of eye injury have changed with advances in techniques and weaponry of warfare, with blast fragmentation injuries accounting for 50-80% of cases. Penetrating and perforating injuries are most common, and injuries associated with intraocular foreign bodies pose special diagnostic and management problems. Injuries are bilateral in 15-25% of cases. Injuries associated with chemical, nuclear, and laser weapons have distinct characteristics and epidemiology. Enucleation was commonly performed at the turn of the century, but incidence has declined with better understanding of the pathophysiology of ocular trauma, improved surgical techniques and sepsis control with antibiotics. Sympathetic ophthalmia appears to be uncommon and earlier fears of this complication seem to have been exaggerated. Timely evacuation to a surgical facility is important for a good visual prognosis and preservation of the globe. However, prevention of injuries with eye armor is ultimately the best management, and the need for a comprehensive eye protection program in the military cannot be overemphasized, especially since eye injuries pose important socioeconomic, as well as medical, problems.

  9. The enemy as animal: Symmetric dehumanization during asymmetric warfare.

    Science.gov (United States)

    Bruneau, Emile; Kteily, Nour

    2017-01-01

    Historically, dehumanization has enabled members of advantaged groups to 'morally disengage' from disadvantaged group suffering, thereby facilitating acts of intergroup aggression such as colonization, slavery and genocide. But is blatant dehumanization exclusive to those at the top 'looking down', or might disadvantaged groups similarly dehumanize those who dominate them? We examined this question in the context of intergroup warfare in which the disadvantaged group shoulders a disproportionate share of casualties and may be especially likely to question the humanity of the advantaged group. Specifically, we assessed blatant dehumanization in the context of stark asymmetric conflict between Israelis (Study 1; N = 521) and Palestinians (Study 2; N = 354) during the 2014 Gaza war. We observed that (a) community samples of Israelis and Palestinians expressed extreme (and comparable) levels of blatant dehumanization, (b) blatant dehumanization was uniquely associated with outcomes related to outgroup hostility for both groups, even after accounting for political ideologies known to strongly predict outgroup aggression, and (c) the strength of association between blatant dehumanization and outcomes was similar across both groups. This study illuminates the striking potency and symmetry of blatant dehumanization among those on both sides of an active asymmetric conflict.

  10. Studies on residue-free decontaminants for chemical warfare agents.

    Science.gov (United States)

    Wagner, George W

    2015-03-17

    Residue-free decontaminants based on hydrogen peroxide, which decomposes to water and oxygen in the environment, are examined as decontaminants for chemical warfare agents (CWA). For the apparent special case of CWA on concrete, H2O2 alone, without any additives, effectively decontaminates S-2-(diisopropylamino)ethyl O-ethyl methylphosphonothioate (VX), pinacolyl methylphosphorofluoridate (GD), and bis(2-choroethyl) sulfide (HD) in a process thought to involve H2O2 activation by surface-bound carbonates/bicarbonates (known H2O2 activators for CWA decontamination). A plethora of products are formed during the H2O2 decontamination of HD on concrete, and these are characterized by comparison to synthesized authentic compounds. As a potential residue-free decontaminant for surfaces other than concrete (or those lacking adsorbed carbonate/bicarbonate) H2O2 activation for CWA decontamination is feasible using residue-free NH3 and CO2 as demonstrated by reaction studies for VX, GD, and HD in homogeneous solution. Although H2O2/NH3/CO2 ("HPAC") decontaminants are active for CWA decontamination in solution, they require testing on actual surfaces of interest to assess their true efficacy for surface decontamination.

  11. Unconventional Nuclear Warfare Defense (UNWD) containment and mitigation subtask.

    Energy Technology Data Exchange (ETDEWEB)

    Wente, William Baker

    2005-06-01

    The objective of this subtask of the Unconventional Nuclear Warfare Design project was to demonstrate mitigation technologies for radiological material dispersal and to assist planners with incorporation of the technologies into a concept of operations. The High Consequence Assessment and Technology department at Sandia National Laboratories (SNL) has studied aqueous foam's ability to mitigate the effects of an explosively disseminated radiological dispersal device (RDD). These benefits include particle capture of respirable radiological particles, attenuation of blast overpressure, and reduction of plume buoyancy. To better convey the aqueous foam attributes, SNL conducted a study using the Explosive Release Atmospheric Dispersion model, comparing the effects of a mitigated and unmitigated explosive RDD release. Results from this study compared health effects and land contamination between the two scenarios in terms of distances of effect, population exposure, and remediation costs. Incorporating aqueous foam technology, SNL created a conceptual design for a stationary containment area to be located at a facility entrance with equipment that could minimize the effects from the detonation of a vehicle transported RDD. The containment design was evaluated against several criteria, including mitigation ability (both respirable and large fragment particle capture as well as blast overpressure suppression), speed of implementation, cost, simplicity, and required space. A mock-up of the conceptual idea was constructed at SNL's 9920 explosive test site to demonstrate the containment design.

  12. Drone Warfare: Twenty-First Century Empire and Communications

    Directory of Open Access Journals (Sweden)

    Kevin Howley

    2017-02-01

    Full Text Available This paper, part of a larger project that examines drones from a social-construction of technology perspective, considers drone warfare in light of Harold Innis’s seminal work on empire and communication. Leveraging leading-edge aeronautics with advanced optics, data processing, and networked communication, drones represent an archetypal “space-biased” technology. Indeed, by allowing remote operators and others to monitor, select, and strike targets from half a world away, and in real-time, these weapon systems epitomize the “pernicious neglect of time” Innis sought to identify and remedy in his later writing. With Innis’s time-space dialectic as a starting point, then, the paper considers drones in light of a longstanding paradox of American culture: the impulse to collapse the geographical distance between the United States and other parts of the globe, while simultaneously magnifying the cultural difference between Americans and other peoples and societies. In the midst of the worldwide proliferation of drones, this quintessentially sublime technology embodies this (disconnect in important, profound, and ominous ways.

  13. Back to the future: aerial warfare in Libya

    Directory of Open Access Journals (Sweden)

    João Paulo Nunes Vicente

    2013-05-01

    Full Text Available A century after the first air bomb mission, a new intervention in the same geographic space has made evident the changes in Airpower. The Aerial Warfare in Libya has radically changed the civil war, complying with a UN mission to protect Libyan population, imposing a no-fly zone and an arms embargo. Therefore, Operation Unified Protector became one of the most successful campaigns in the history of NATO. We aim to assess the operational efficiency of Airpower in the conflict in Libya, focusing on the challenges of a War essentially Aerial. Despite the military results and the fact that some political objectives were met, we can identify some concerning trends that, if not shifted, may negatively influence future NATO operations. We do not aim to draw general and universal conclusions on the strategic value of Airpower based on the analysis of a specific case. Above all, we focus on identifying some lessons which have influenced OUP operational efficiency. Thus, we must analyze some factors, such as the scope of objectives, the type of opposing action and aerial strategy used by the coalition and then focus on the challenges arising from the OUP.

  14. SiGe-based re-engineering of electronic warfare subsystems

    CERN Document Server

    Lambrechts, Wynand

    2017-01-01

    This book equips readers with a thorough understanding of the applicability of new-generation silicon-germanium (SiGe) electronic subsystems for the military purposes of electronic warfare and defensive countermeasures. The theoretical and technical background is extensively explained and all aspects of the integration of SiGe as an enabling technology for maritime, land, and airborne (including space) electronic warfare are addressed, including research, design, development, and implementation. The coverage is supported by mathematical derivations, informative illustrations, practical examples, and case studies. While SiGe technology provides speed, performance, and price advantages in many markets, sharing of information on its use in electronic warfare systems has to date been limited, especially in developing nations. This book will therefore be warmly welcomed as an engineering guideline that focuses especially on the speed and reliability of current-generation SiGe circuits and highlights emerging innov...

  15. THE CYBER DIMENSION OF MODERN HYBRID WARFARE AND ITS RELEVANCE FOR NATO

    Directory of Open Access Journals (Sweden)

    Sorin DUCARU

    2016-06-01

    Full Text Available The technological development and the instant communication possibilities advanced not only economic and social developments, but also evolving threats from those who exploit the vulnerabilities of communication and information systems. The cyber threat landscape points to a significant increase of the frequency, intensity, duration and sophistication of cyber-attacks. One of the new and concerning trends is the use of cyber capabilities in relation with military of hybrid operations – the so-called cyber dimension of hybrid warfare. NATO’s strategy on countering hybrid warfare is based on the triad: prepare-deter-defend, which also applies to cyber. Nations represent the first line of defence in countering hybrid strategies. International cooperation is also a key factor in this sense. It is in this context that NATO’s response to cyber-attacks in the context of hybrid warfare must be further refined.

  16. The United States and biological warfare: secrets from the early cold war and Korea.

    Science.gov (United States)

    Bruwer, A

    2001-01-01

    The United States and Biological Warfare is about accusations that the United States resorted to bacteriological warfare at a time of great military stress during the Korean War. In December 1951, the then US Secretary of Defense ordered early readiness for offensive use of biological weapons. Soon afterwards, the North Korean and Chinese armies accused the United States of starting a large-scale biological warfare experiment in Korea. The US State Department denied the accusation. Both parties to the dispute maintain their positions today. The authors spent 20 years researching the accusations in North America, Europe and Japan. They were the first foreigners to be given access to Chinese classified documents. The reader is also introduced to the concept of 'plausible denial', an official US policy which allowed responsible governmental representatives to deny knowledge of certain events. The authors hope that their work will contribute to the understanding of a time when modern war expanded into a new type of violence.

  17. Skeletal evidence for Inca warfare from the Cuzco region of Peru.

    Science.gov (United States)

    Andrushko, Valerie A; Torres, Elva C

    2011-11-01

    This article addresses the bioarchaeological evidence for Inca warfare through an analysis of 454 adult skeletons from 11 sites in the Inca capital region of Cuzco, Peru. These 11 sites span almost 1000 years (AD 600-1532), which allows for a comparison of the evidence for warfare before the Inca came to power (Middle Horizon AD 600-1000), during the time of Inca ascendency in the Late Intermediate Period (AD 1000-1400), and after the Inca came to power and expanded throughout the Cuzco region and beyond (Inca Imperial Period, AD 1400-1532). The results indicate that 100 of 454 adults (22.0%) showed evidence of cranial trauma. Of these, 23 individuals had major cranial injuries suggestive of warfare, consisting of large, complete, and/or perimortem fractures. There was scant evidence for major injuries during the Middle Horizon (2.8%, 1/36) and Late Intermediate Period (2.5%, 5/199), suggesting that warfare was not prevalent in the Cuzco region before and during the Inca rise to power. Only in the Inca Imperial Period was there a significant rise in major injuries suggestive of warfare (7.8%, 17/219). Despite the significant increase in Inca times, the evidence for major cranial injuries was only sporadically distributed at Cuzco periphery sites and was entirely absent at Cuzco core sites. These findings suggest that while the Inca used warfare as a mechanism for expansion in the Cuzco region, it was only one part of a complex expansion strategy that included economic, political, and ideological means to gain and maintain control. Copyright © 2011 Wiley-Liss, Inc.

  18. Particle Swarm Social Adaptive Model for Multi-Agent Based Insurgency Warfare Simulation

    Energy Technology Data Exchange (ETDEWEB)

    Cui, Xiaohui [ORNL; Potok, Thomas E [ORNL

    2009-12-01

    To better understand insurgent activities and asymmetric warfare, a social adaptive model for modeling multiple insurgent groups attacking multiple military and civilian targets is proposed and investigated. This report presents a pilot study using the particle swarm modeling, a widely used non-linear optimal tool to model the emergence of insurgency campaign. The objective of this research is to apply the particle swarm metaphor as a model of insurgent social adaptation for the dynamically changing environment and to provide insight and understanding of insurgency warfare. Our results show that unified leadership, strategic planning, and effective communication between insurgent groups are not the necessary requirements for insurgents to efficiently attain their objective.

  19. NONDESTRUCTIVE IDENTIFICATION OF CHEMICAL WARFARE AGENTS AND EXPLOSIVES BY NEUTRON GENERATOR-DRIVEN PGNAA

    Energy Technology Data Exchange (ETDEWEB)

    T. R. Twomey; A. J. Caffrey; D. L. Chichester

    2007-02-01

    Prompt gamma-ray neutron activation analysis (PGNAA) is now a proven method for the identification of chemical warfare agents and explosives in military projectiles and storage containers. Idaho National Laboratory is developing a next-generation PGNAA instrument based on the new Ortec Detective mechanically-cooled HPGe detector and a neutron generator. In this paper we review PGNAA analysis of suspect chemical warfare munitions, and we discuss the advantages and disadvantages of replacing the californium-252 radioisotopic neutron source with a compact accelerator neutron generator.

  20. NONDESTRUCTIVE IDENTIFICATION OF CHEMICAL WARFARE AGENTS AND EXPLOSIVES BY NEUTRON GENERATOR-DRIVEN PGNAA

    International Nuclear Information System (INIS)

    T. R. Twomey; A. J. Caffrey; D. L. Chichester

    2007-01-01

    Prompt gamma-ray neutron activation analysis (PGNAA) is now a proven method for the identification of chemical warfare agents and explosives in military projectiles and storage containers. Idaho National Laboratory is developing a next-generation PGNAA instrument based on the new Ortec Detective mechanically-cooled HPGe detector and a neutron generator. In this paper we review PGNAA analysis of suspect chemical warfare munitions, and we discuss the advantages and disadvantages of replacing the californium-252 radioisotopic neutron source with a compact accelerator neutron generator

  1. Genomics of Probiotic Bacteria

    Science.gov (United States)

    O'Flaherty, Sarah; Goh, Yong Jun; Klaenhammer, Todd R.

    Probiotic bacteria from the Lactobacillus and Bifidobacterium species belong to the Firmicutes and the Actinobacteria phylum, respectively. Lactobacilli are members of the lactic acid bacteria (LAB) group, a broadly defined family of microorganisms that ferment various hexoses into primarily lactic acid. Lactobacilli are typically low G + C gram-positive species which are phylogenetically diverse, with over 100 species documented to date. Bifidobacteria are heterofermentative, high G + C content bacteria with about 30 species of bifidobacteria described to date.

  2. Diagnosis of exposure to chemical warfare agents: An essential tool to counteract chemical terrorism

    NARCIS (Netherlands)

    Noort, D.; Schans, M.J. van der; Bikker, F.J.; Benschop, H.P.

    2009-01-01

    Methods to analyze chemical warfare agents (CW-agents) and their decomposition products in environmental samples were developed over the last decades. In contrast herewith, procedures for analysis in biological samples have only recently been developed. Retrospective detection of exposure to

  3. A statistical analysis of the effect of warfare on the human secondary sex ratio

    NARCIS (Netherlands)

    Graffelman, J.; Hoekstra, R.F.

    2000-01-01

    Many factors have been hypothesized to affect the human secondary sex ratio (the annual percentage of males among all live births), among them race, parental ages, and birth order. Some authors have even proposed warfare as a factor influencing live birth sex ratios. The hypothesis that during and

  4. A Proficiency-Based Cost Estimate of Surface Warfare Officer On-the-Job Training

    Science.gov (United States)

    2011-12-01

    for “better schooling, and a surface warfare pin equivalent to the dolphins worn by submariners or the wings by the aviators” (Robinson, 2008...Historical Perspective from World War II to 2008. Fort Leavenworth: U.S. Army Command and General Staff College. Rocci, R. (2003). A Cognitive and

  5. 75 FR 69032 - Naval Surface Warfare Center, Potomac River, Dahlgren, VA; Danger Zone

    Science.gov (United States)

    2010-11-10

    ... Warfare Center, Dahlgren's patrol boats. Oystering and fishing boats or other craft may cross the river in... energy technology, and manned or unmanned water craft operations; (2) change the latitude and longitude... shoreline for commercial fishing and waterfowl hunting blinds under existing Navy and state regulations. The...

  6. The Evolution of Naval Warfare Technology and the Impact of Space Systems

    Science.gov (United States)

    1987-09-01

    or Greek fire. Larger missile devices such as the trebuchet were commonly used in land warfare, particularly in siege operations. However, the...were being used more widely in the Mediterranean. Mangonels and trebuchets were used to heave a variety of projectiles. Their adaptation for use on

  7. Information Warfare: Legal, Regulatory, Policy and Organizational Considerations for Assurance. Second Edition.

    Science.gov (United States)

    1996-07-04

    2-19 2-2-1 State Com puter Crim e Statutes ....................................................................... 2-44...2-2-2 Com puter Crim e Jurisdiction .......................................................................... 2-45 2-4-1 Information Warfare Policy...infrastructures from physical and cyber threats. * Propose statutory and regulatory changes. The Infrastructure Protection Task Force (IPTF): * Increase

  8. Above the Influence: The Strategic Effects of Airpower in Irregular Warfare

    Science.gov (United States)

    2010-06-01

    using the methods of Mao Zedong , working at the individual village level to subvert central government authority, which effectively stopped at the...Nagl, ―Principles, Imperatives, and Paradoxes of Counterinsurgency,‖ 50; Mao Tse-Tung, Problems of Strategy in Guerrilla Warfare, 215-216; Gray...outposts, 63 General (Ret.) William W. Momyer, Airpower in Three Wars ( WWII , Korea, Vietnam

  9. Ge 4+ doped TiO 2 for stoichiometric degradation of warfare agents

    Czech Academy of Sciences Publication Activity Database

    Štengl, Václav; Matys Grygar, Tomáš; Opluštil, F.; Němec, T.

    2012-01-01

    Roč. 227, AUGUST (2012), s. 62-67 ISSN 0304-3894 R&D Projects: GA ČR(CZ) GAP106/12/1116 Institutional support: RVO:61388980 Keywords : germanium * homogeneous hydrolysis * titania * urea * warfare agent degradation Subject RIV: CA - Inorganic Chemistry Impact factor: 3.925, year: 2012

  10. (Review of) Reno, William. 2011. Warfare in Independent Africa. Cambridge: Cambridge University Press

    DEFF Research Database (Denmark)

    Hagmann, Tobias

    2013-01-01

    Warfare in Independent Africa is Reno’s bold attempt to analyze the modern history of African insurgencies. The book tackles this task through the prism of five generations of rebel, which left their mark on the continent; anti-colonial rebels, majority rule rebels, reform rebels, warlord rebels ...

  11. Urban Warfare at the Operational Level: Identifying Centers of Gravity and Key Nodes

    National Research Council Canada - National Science Library

    McCleskey, Edward

    1999-01-01

    .... The intent of this paper is to focus the reader on the operational level of urban warfare. A key task for the Joint Force Commander and his staff will be to identify the targets against which he will employ his component forces...

  12. The influence of the Ratel infantry fighting vehicle on mobile warfare ...

    African Journals Online (AJOL)

    This article traces the story of how the author and a number of daring young commanders and soldiers had cast aside military textbooks in developing their own military doctrine for mobile warfare, South African style. It is clear that the Ratel infantry fighting vehicle had wielded huge influence on the development and ...

  13. Improving Blood Monitoring of Enzymes as Biomarkers of Risk from Anticholinergic Pesticides and Chemical Warfare Agents

    Science.gov (United States)

    2007-10-01

    1991. Protection by butyrylcholinesterase against organophosphorus poisoning in nonhuman primates. J. Pharmacol. Exp. Ther. 259(2): 633-638. Costa...Employee Health), Stephen McCurdy (UCD Epidemiology ), Stephanie Padilla (US EPA), Matthew Keifer (U. Washington) and CA and Utah clinical laboratories...the cholinergic function of the nervous system (Wilson, 2001). Organophosphorus ester pesticides and chem- ical warfare agents disrupt cholinergic

  14. Military medicine and the ethics of war: British colonial warfare during the Seven Years War (1756-63).

    Science.gov (United States)

    Charters, Erica

    2010-01-01

    This article examines 18th-century European warfare, tracing the first formal codifications of conventions of war, frequently introduced by military physicians and initially regarding the treatment of the sick and wounded. It outlines to what extent these conventions were followed in practice, particularly in the challenging environment of American irregular warfare, with a focus on the most well-known incident of "biological warfare" in the period: the deliberate spread of smallpox by British officers among Amerindians in 1763. More broadly, it demonstrates that the history of military medicine provides a fruitful method with which to uncover assumptions about the ethics of war.

  15. How honey kills bacteria

    NARCIS (Netherlands)

    Kwakman, Paulus H. S.; te Velde, Anje A.; de Boer, Leonie; Speijer, Dave; Vandenbroucke-Grauls, Christina M. J. E.; Zaat, Sebastian A. J.

    2010-01-01

    With the rise in prevalence of antibiotic-resistant bacteria, honey is increasingly valued for its antibacterial activity. To characterize all bactericidal factors in a medical-grade honey, we used a novel approach of successive neutralization of individual honey bactericidal factors. All bacteria

  16. Evolution of war and cyber attacks in the concept of conventional warfare

    Directory of Open Access Journals (Sweden)

    Huseyin Kuru

    2018-01-01

    Full Text Available Humanity have witnessed many confrontations of states whose interests challenge at some points and their struggle to neutralize problems in battlefield. While war was perceived as a way of eliminating deadlocks for some parties, some considered it as one of the international policy materials. The definition and content of conventional warfare have been subject to change for centuries, while the new weapons and technologies have been developed by human beings that it has brought constant change in the law of war and at the same time more lethal and devastating consequences. The struggle for superiority in international relations played an impulsive role in the development of weapons used in the battlefield. Countries have used their labor and financial resources to improve their military skills. Beginning with stones and sticks in the battlefield, this struggle has reached the point of using the next generation satellite controlled unmanned and armed aircrafts and having nuclear weapons has become more deterrent than using them. The struggle between strong countries and the limited countries in terms of technology and armed groups that do not have enough technology and skills completely changed the definition of conventional warfare. This fight has led Asymmetric warfare born which can turn commercial airline planes full of innocent people into a weapon like September-11 attacks. In this study, the historical development and the change in the content of the warfare were briefly explained and then cyber-attacks in the concept of the fourth generation warfare was analyzed taking into account of prominent attacks.

  17. Bench-Scale Investigation of Composting for Remediation of Explosives-Contaminated Soils from Naval Surface Warfare Center, Crane, Indiana

    National Research Council Canada - National Science Library

    Preston, Kurt

    1998-01-01

    ...), and octahydro-1,3,5,7-tetranitro-1,3,5,7- tetrazocine (HMX). The Naval Surface Warfare Center (NSWC), Crane, Indiana, provides material and logistic support to the Navy's weapon systems, including expendable and nonexpendable ordnance items...

  18. Cost Effectiveness Analysis of the "Sea to SWOS" Training Initiative on the Surface Warfare Officer Qualification Process

    National Research Council Canada - National Science Library

    Gavino, Christopher

    2002-01-01

    ... (combat effectiveness) while the quantitative analysis shows additional costs to the Navy Personnel Command and savings in training costs for the Naval Education and Training Command and OPNAV N76, the Surface Warfare Resource Sponsor...

  19. An Assessment of the Effectiveness of Computer-based Training for Newly Commissioned Surface Warfare Division Officers

    National Research Council Canada - National Science Library

    Bowman, William R; Crawford, Alice M; Mehay, Stephen; Stoker, Carol; Paynter, Robert

    2008-01-01

    ...) on-board an officer's ship. The study relied on a variety of analytical techniques, including a literature review of CBT and OJT training, interviews and focus groups with junior and senior surface warfare officers...

  20. Antibiotics from predatory bacteria

    Directory of Open Access Journals (Sweden)

    Juliane Korp

    2016-03-01

    Full Text Available Bacteria, which prey on other microorganisms, are commonly found in the environment. While some of these organisms act as solitary hunters, others band together in large consortia before they attack their prey. Anecdotal reports suggest that bacteria practicing such a wolfpack strategy utilize antibiotics as predatory weapons. Consistent with this hypothesis, genome sequencing revealed that these micropredators possess impressive capacities for natural product biosynthesis. Here, we will present the results from recent chemical investigations of this bacterial group, compare the biosynthetic potential with that of non-predatory bacteria and discuss the link between predation and secondary metabolism.

  1. Hydrogen production by nonphotosynthetic bacteria

    Energy Technology Data Exchange (ETDEWEB)

    Huang, S.D.; Secor, C.K.; Zweig, R.M.; Ascione, R.

    1984-01-01

    H-producing nonphotosynthetic bacteria are identified and H from sewage treatment plants, H from rumen bacteria, and large-scale production of H through the genetic manipulation of H-producing nonphotosynthetic bacteria are discussed. (Refs. 36).

  2. The German Military Entrepreneur Ernst von Mansfeld and His Conduct of Asymmetrical Warfare in the Thirty Years War

    OpenAIRE

    Bäckström, Olli

    2011-01-01

    The dissertation examines aspects of asymmetrical warfare in the war-making of the German military entrepreneur Ernst von Mansfeld during his involvement in the Thirty Years War. Due to the nature of the inquiry, which combines history with military-political theory, the methodological approach of the dissertation is interdisciplinary. The theoretical framework used is that of asymmetrical warfare. The primary sources used in the dissertation are mostly political pamphlets and newsl...

  3. [Darwin and bacteria].

    Science.gov (United States)

    Ledermann D, Walter

    2009-02-01

    As in 2009 the scientific world celebrates two hundreds years from the birthday of Charles Darwin and one hundred and fifty from the publication of The Origin of Species, an analysis of his complete work is performed, looking for any mention of bacteria. But it seems that the great naturahst never took knowledge about its existence, something rather improbable in a time when the discovery of bacteria shook the medical world, or he deliberately ignored them, not finding a place for such microscopic beings into his theory of evolution. But the bacteria badly affected his familiar life, killing scarlet fever one of his children and worsening to death the evolution of tuberculosis of his favourite Annie. Darwin himself could suffer the sickness of Chagas, whose etiological agent has a similar level to bacteria in the scale of evolution.

  4. Extracellular communication in bacteria

    DEFF Research Database (Denmark)

    Chhabra, S.R.; Philipp, B.; Eberl, L.

    2005-01-01

    molecules, in different Gram-positive and Gram-negative bacteria they control pathogenicity, secondary metabolite production, biofilm differentiation, DNA transfer and bioluminescence. The development of biosensors for the detection of these signal molecules has greatly facilitated their subsequent chemical...

  5. How Power-Laws Re-Write The Rules Of Cyber Warfare

    Directory of Open Access Journals (Sweden)

    David L. Bibighaus

    2015-12-01

    Full Text Available All warfare contains and element of randomness. This article will argue that, the kind uncertainty encountered in cyber warfare (Power-Law randomness is fundamentally different from the uncertainty the military has evolved to deal with in the physical world (Gaussian-Randomness. The article will explain the difference between these two kinds of randomness, and how cyber weapons appear to operate under Power-Law randomness. It then will show how in cyberspace, key aspects of strategic thought are based on a flaws assumption of randomness. Finally, this article shall argue that if the American military is going to be effective in cyberspace, it must re-examine the way the military assumes risk, recruits is forces, plans for war and maintains the peace.

  6. The fecal bacteria

    Science.gov (United States)

    Sadowsky, Michael J.; Whitman, Richard L.

    2011-01-01

    The Fecal Bacteria offers a balanced, integrated discussion of fecal bacteria and their presence and ecology in the intestinal tract of mammals, in the environment, and in the food supply. This volume covers their use in examining and assessing water quality in order to offer protection from illnesses related to swimming in or ingesting contaminated water, in addition to discussing their use in engineering considerations of water quality, modeling, monitoring, and regulations. Fecal bacteria are additionally used as indicators of contamination of ready-to-eat foods and fresh produce. The intestinal environment, the microbial community structure of the gut microbiota, and the physiology and genomics of this broad group of microorganisms are explored in the book. With contributions from an internationally recognized group of experts, the book integrates medicine, public health, environmental, and microbiological topics in order to provide a unique, holistic understanding of fecal bacteria. Moreover, it shows how the latest basic science and applied research findings are helping to solve problems and develop effective management strategies. For example, readers will discover how the latest tools and molecular approaches have led to our current understanding of fecal bacteria and enabled us to improve human health and water quality. The Fecal Bacteria is recommended for microbiologists, clinicians, animal scientists, engineers, environmental scientists, food safety experts, water quality managers, and students. It will help them better understand fecal bacteria and use their knowledge to protect human and environmental health. They can also apply many of the techniques and molecular tools discussed in this book to the study of a broad range of microorganisms in a variety of habitats.

  7. Air University Research Paper: Asymmetric Warfare - Exposing America’s Weaknesses

    Science.gov (United States)

    2003-04-01

    AU/ACSC/ 03-1261R/2003-04 AIR COMMAND AND STAFF COLLEGE AIR UNIVERSITY AIR UNIVERSITY RESEARCH PAPER ASYMMETRIC WARFARE - EXPOSING AMERICA’S...Air University Research Paper : Asymmetric Wafare - Exposing America’s Weaknesses 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER...Std Z39-18 Disclaimer The views expressed in this academic research paper are those of the author(s) and do not reflect the official policy or

  8. Satellite and Ground Communication Systems: Space and Electronic Warfare Threats to the United States Army

    Science.gov (United States)

    2017-02-01

    Figure 3). However, a 2016 Department of Defense (DoD) report explained that in 2013 “China launched an object into space on a ballistic trajectory with...well as other non-kinetic counter- space capabilities.42 The USCC report also provided detailed analysis of Chinese developments of co-orbital...Satellite and Ground Communication Systems: Space and Electronic Warfare Threats to the

  9. A Review of Multi-Threat Medical Countermeasures Against Chemical Warfare and Terrorism

    Science.gov (United States)

    2004-11-01

    Biopreparat, the military and civil defense to combat chemical warfare and civilian arm of the former Soviet Union’s biological weapons chemical terrorism . program...seamlessly transition to military force protection and civil defense against chemical terrorism . Terrorist threat agents include all classes of MTMC... chemical terrorism . Using MTMC to blunt pathological actions enteric mast cell granulation in acute soman intoxicated rats. Experimentia of chemical agents

  10. Equipping Network Warfare: Industrial-Era Bureaucracies for Information-Era Weapons

    Science.gov (United States)

    2009-04-01

    to operational shortfalls. Clearly, there are benefits in following known methods in organizing the cyberspace mission and its capabilities...sid26_gci853845,00.html (accessed 15 December 2008). 9 BX.com Terminology Reference, “Web Year,” http://www.bx.com/dictionary/ ecommerce /Web_year.cfm... benefits of the process, while amplifying the negative aspects of the bureaucracy. Network warfare capabilities are much more vulnerable to

  11. Mass spectrometric study of selected precursors and degradation products of chemical warfare agents

    Czech Academy of Sciences Publication Activity Database

    Papoušková, B.; Bednář, P.; Fryšová, I.; Stýskala, J.; Hlaváč, J.; Barták, P.; Ulrichová, J.; Jirkovský, Jaromír; Lemr, K.

    2007-01-01

    Roč. 42, č. 12 (2007), s. 1550-1561 ISSN 1076-5174 Grant - others:The Organization for the Prohibition of Chemical Weapons(NL) L/ICA/ICB/84322/04 Institutional research plan: CEZ:AV0Z40400503 Source of funding: V - iné verejné zdroje Keywords : mass spectrometry * chemical warfare agent * high performance liquid chromatography * LC/MS Subject RIV: CF - Physical ; Theoretical Chemistry Impact factor: 3.062, year: 2007

  12. A cost and operational effectiveness analysis of alternative anti-surface warfare platforms

    OpenAIRE

    Skinner, Walter Mark.

    1993-01-01

    Approved for public release; distribution is unlimited. A Cost and Operational Effectiveness Analysis (COEA) is performed for three alternative anti-surface warfare (ASUW) platforms that will conduct operations in multi-service regional scenarios. Estimated program costs, historical cost variances, and measures of operational effectiveness are determined for each COEA alternative, and service life extension effects are examined. The data is merged in a mixed-integer optimization model, MPA...

  13. The Equipment of Czech Firefighters for the Detection and Field Analyses of Chemical Warfare Agents

    Directory of Open Access Journals (Sweden)

    Jana Krykorkova

    2014-05-01

    Full Text Available This paper describes the requirements for the devices of detection, chemical reconnaissance and field analyses of chemical warfare agents (CWA and divides them into simple devices of detection, universal detectors, selective analyzers, multi-component analyzers and mobile laboratories. It also describes the devices of detection available within the Fire and Rescue Service of the Czech Republic (FRS CR and compares them with some prospective trends of further development.

  14. Deterrence in the Human Domain: A COIN Framework to Deterring Unconventional Warfare in Shaping Operations

    Science.gov (United States)

    2017-05-25

    protecting ethnic Russians, providing stability to neighbors, defending “self- determination,” and protecting human rights . Protection of Russian...Deterrence in the Human Domain: A COIN Framework to Deterring Unconventional Warfare in Shaping Operations A Monograph by MAJ Matthew P...should be aware that notwithstanding any other provision of law , no person shall be subject to any penalty for failing to comply with a collection of

  15. Cyberspace as a Complex Adaptive System and the Policy and Operational Implications for Cyber Warfare

    Science.gov (United States)

    2014-05-22

    accessed 13 February 2014). 66Teresa Degenhard “Between War and Crime: The Overlap between War and Crime: Unpacking Foucault and Agamben’s Studies...Article-2-Revision- for- Foucault -and-Agamben-Degenhardt-July-2013.pdf (accessed 5 April 2014). 26... Foucault and Agamben’s Studies within the Context of the War on Terror.”, 34. 68US Department of Defense, Electronic Warfare, Joint Publication 3-13, I-2

  16. Efficacy Evaluation of Current and Future Naval Mine Warfare Neutralization Method

    Science.gov (United States)

    2016-12-01

    MCM-1) Operates off the Coast of Hawaii during Exercise Rim of the Pacific (RIMPAC) 2004. ID: 040710-N-6551H-229. U.S. Navy, Arlington, VA...The Mine Countermeasure Ship USS Avenger (MCM-1) Operates off the Coast of Hawaii during Exercise Rim of the Pacific (RIMPAC) 2004. ID: 040710-N... fire -scout-following-two-crashes/. Accessed December 5, 2016. Space and Naval Warfare Systems Command. 2011. “Marine Mammal Program.” SSC Pacific

  17. Discrete Electronic Warfare Signal Processing using Compressed Sensing Based on Random Modulator Pre-Integrator

    OpenAIRE

    M. Sreenivasa Rao; Chandan C. Mishra; K. Krishna Naik; K. Maheshwara Reddy

    2015-01-01

    Electronic warfare receiver works in the wide electromagnetic spectrum in dense radar signal environment. Current trends in radar systems are ultra wideband and low probability of intercept radar technology. Detection of signals from various radar stations is a concern. Performance and probability of intercept are mainly dependent on high speed ADC technology. The sampling and reconstruction functions have to be optimized to capture incoming signals at the receiver to extract characteristics ...

  18. Vital Interests, Virtual Threats: Reconciling International Law with Information Warfare and United States Security

    Science.gov (United States)

    1999-05-01

    1985 workforce of 406,000 by two thirds. Volkswagen intends to reduce its present workforce by one third. Proctor and Gamble has rising sales, yet is...of the Senate Governmental Affairs Committee , named “China, Russia, Libya, Iran, Iraq, and at least seven other countries... audit uses four recent Stanford Technology Law Journal articles not related to information warfare. Granted, hypothetical environments make certainty

  19. Lawfare and hybrid warfare-how Russia is using the law as a weapon

    OpenAIRE

    Mosquera, A.; Bachmann, Sascha-Dominik

    2015-01-01

    This short paper introduces the reader to the mutating military concept of hybrid warfare and one of its implementing methods, the use of law as a weapon. We aim to provide a current, comprehensive definition of the terms “hybrid warfare” and “lawfare”. This submission focuses on the following areas: where law has been/is being used as a method of war, namely the Jus ad bellum, the jus in bello and the law of treaties in international relations.

  20. Special Operations, Irregular Warfare, and Operational Art: A Theory of Special Operations

    Science.gov (United States)

    2013-12-10

    modern militaries: Ian F. W. Beckett , Modern Insurgencies and Counter-Insurgencies (New York: Routledge, 2003), 213. 1...the dynamics that influence other coalition members. They do not have the 71Mao Zedong, On Guerrilla Warfare, trans. Samuel B. Griffith (Breiningville...2004. Beckett , Ian F. W. Modern Insurgencies and Counter-Insurgencies. New York: Routledge, 2003. Bergen, Peter. “Analysis: Bin Laden might find

  1. Russian Perspectives on Network-Centric Warfare: The Key Aim of Serdyukov’s Reform

    Science.gov (United States)

    2011-01-01

    has faced with its GLObal’naya NAvigatsionnaya Sputnikovaya Sistema —(GLONASS) system, and introducing advanced digitized communications in the armed...of targeting data will be accomplished by organizing virtual channels for data transmission or via a web -portal. The successful function- ing of the...Operations: Tactical Web Takes Shape,” Signal, November 2003; Col. Alan D. Campen, USAF (Ret.), “Look Closely At Network-Centric Warfare: Technology Can

  2. Incorporating AFEWC IMOM as an instructional asset for NPS radar and electronic warfare curricula

    OpenAIRE

    Van Splinter, Gregg A.

    1992-01-01

    Approved for public release; distribution is unlimited In this thesis, effort is made to incorporate the computer program, Improved Many(Jammers)-on-Many(Radars) (IMOM), into radar and electronic warfare curricula at the Naval Postgraduate School. The IMOM program is used operationally by the U.S. Air Force for electronic combat mission planning. IMOM allows the user to evaluate electronic combat effects through computer color graphics display of the electronic order of battle including ...

  3. Past and Potential Theory for Special Warfare Operational Art: People’s War and Contentious Politics

    Science.gov (United States)

    2015-03-04

    the scientific method could be used to examine historical case studies.114 His examination of the English , American, French, and Russian Revolutions...its full evaluation as a grammar of revolutionary war. Finally, a translation of basic concepts from contentious politics into useful outlines and...be founded upon distinct and sound theories of war and warfare. This monograph argues that from 1952-1965, the US Army Special Forces developed two

  4. Puncturing the Counterinsurgency Myth: Britain and Irregular Warfare in the Past, Present, and Future

    Science.gov (United States)

    2011-09-01

    FUTURE INTRODUCTION Britain’s irregular warfare experience in the post- World War II era presented the military with numer- ous insurgent challenges where...STRATEGICALLY PERCEPTIVE This myth points to a painful element of British COIN conduct, namely, the short -circuiting of con- text. The preference for...military to plan for long-term coalition commitments: “Increasing globalisation ties our security to that of our allies. . . . Therefore we must

  5. Evaluation of Littoral Combat Ships for Open-Ocean Anti-Submarine Warfare

    Science.gov (United States)

    2016-03-01

    submarines that were considered in detail for this report. Adapted from Michaele Lee Huygen, 2003, “Submarine Warfare in the 20th & 21st Centuries : A...development, architecture , capability, functional decomposition, modeling and simulation, ASW, LCS 15. NUMBER OF PAGES 99 16. PRICE CODE 17. SECURITY...2015/05/revealed-chinas-new-carrier- killer-sub-simulator/. General Dynamics. 2015. “Combat Power for the 21st Century .” Sales brochure, General

  6. Evaluating Effectiveness of a Frigate in an Anti-Air Warfare (AAW) Environment

    Science.gov (United States)

    2016-06-01

    anti-air warfare (AAW) mission, weapons and radar systems influence each other and interact with the combat software system (Figure 1). Figure 1...similar to our approach include UAV contributions to expeditionary operations (Raffetto, 2004), counter- piracy operations in the Gulf of Aden (Tsilis...statistical discovery software offers both powerful statistics and dynamic graphics capabilities to its users. In the thesis, JMP statistical discovery

  7. Cyber crime and cyber warfare with international cyber collaboration for RSA – preparing communities

    CSIR Research Space (South Africa)

    Grobler, M

    2012-03-01

    Full Text Available Warfare with International Cyber Collaboration for RSA ? Preparing Communities Dr Marthie Grobler, Joey Jansen van Vuuren', Dr Jannie Zaaiman? Council for Scientific and Industrial Research, Pretoria, South Africa1 University of Venda2 ABSTRACT... with the technological revolution is that cyberspace is full of complex and dynamic technological innovations that are not well suited to any legal system. A further complication is the lack of comprehensive treaties facilitating international cooperation...

  8. Global Trends and Future Warfare (Strategic Insights. Special Issue, October 2011)

    Science.gov (United States)

    2011-10-01

    Li Future Warfare and China regional and ethnic discrimination, and the spread of the internet and proliferation of sensational media. In a...communications, we have near-worldwide instant exchange of ideas and spread of ideas. Images and information of living standards, role models, and political...an unusually seductive form of military strength, in part because, like modern courtship, it appears to offer gratification without commitment.’15

  9. Transport and Reactivity of Decontaminants to Provide Hazard Mitigation of Chemical Warfare Agents from Materials

    Science.gov (United States)

    2016-06-01

    directions for future decontamination formulation approaches. 15. SUBJECT TERMS GD HD Decontamination Hazard mitigation VX Chemical warfare agent...agent from materials. The objective of this study was to provide a screening tool to identify decontamination chemistries and formulations that will...mitigation. The materials included a water-dispersible polyurethane (WDP) paint (MIL-DTL-53039) and an alkyd paint (MIL-PRF-24635). Two polymers were also

  10. Hybrid Warfare Dilemmas in the Middle Colonies during the American Revolution

    Science.gov (United States)

    2017-05-25

    prisoners and forcing the British to reinforce and area they thought they controlled.65 These militia groups grew larger and more emboldened after...British prisoners , Washington told him that he could not “answer for the militia who are resorting to Arms in most parts of the State, and exceedingly...the tension between punishing the colonists and welcoming them back into British rule prevented him from solving the hybrid warfare dilemmas posed

  11. CYBER WARFARE GOVERNANCE: EVALUATION OF CURRENT INTERNATIONAL AGREEMENTS ON THE OFFENSIVE USE OF CYBER

    Science.gov (United States)

    2015-10-01

    vulnerability in networks across the world as supervisory control and data acquisition ( SCADA ) systems, similar to the ones attacked in Iran, are...used worldwide to perform tasks such as traffic control, managing power grids and management of other utility systems. The heavy reliance on SCADA ...standpoint, this document will never become the agreed upon standard for today’s warfare, unless it is substantially updated . AU/ACSC/2015 28

  12. From the Decomposition of Chemical Warfare Agents to the Decontamination of Cytostatics

    Czech Academy of Sciences Publication Activity Database

    Štengl, Václav; Šťastný, Martin; Janoš, P.; Mazanec, K.; Perez-Diaz, J. L.; Štenglová Netíková, I. R.

    2018-01-01

    Roč. 57, č. 6 (2018), s. 2114-2122 ISSN 0888-5885 EU Projects: European Commission(XE) 312804 - COUNTERFOG Grant - others:NATO(US) SPS984599 Program:Science for Peace and Security Institutional support: RVO:61388980 Keywords : Chemical warfare agents * Degradation * Metal oxide sorbents Subject RIV: CA - Inorganic Chemistry OBOR OECD: Inorganic and nuclear chemistry Impact factor: 2.843, year: 2016

  13. Operational advantages of using Cyber Electronic Warfare (CEW) in the battlefield

    Science.gov (United States)

    Yasar, Nurgul; Yasar, Fatih M.; Topcu, Yucel

    2012-06-01

    While cyberspace is emerging as a new battlefield, conventional Electronic Warfare (EW) methods and applications are likely to change. Cyber Electronic Warfare (CEW) concept which merges cyberspace capabilities with traditional EW methods, is a new and enhanced form of the electronic attack. In this study, cyberspace domain of the battlefield is emphazised and the feasibility of integrating Cyber Warfare (CW) concept into EW measures is researched. The SWOT (Strengths, Weaknesses, Opportunities and Threats) analysis method is used to state the operational advantages of using CEW concept in the battlefield. The operational advantages of CEW are assessed by means of its effects on adversary air defense systems, communication networks and information systems. Outstanding technological and operational difficulties are pointed out as well. As a result, a comparison of CEW concept and conventional EW applications is presented. It is concluded that, utilization of CEW concept is feasible at the battlefield and it may yield important operational advantages. Even though the computers of developed military systems are less complex than normal computers, they are not subjected to cyber threats since they are closed systems. This concept intends to show that these closed systems are also open to the cyber threats. As a result of the SWOT analysis, CEW concept provides Air Forces to be used in cyber operations effectively. On the other hand, since its Collateral Damage Criteria (CDC) is low, the usage of cyber electronic attack systems seems to grow up.

  14. Mycorrhiza helper bacteria

    Energy Technology Data Exchange (ETDEWEB)

    Deveau, Aurelie [French National Insitute for Agricultural Research (INRA); Labbe, Jessy [ORNL

    2016-10-01

    This chapter focuses on the Mycorrhiza Helper Bacteria (MHB), a generic name given to bacteria which stimulate the formation of mycorrhizal symbiosis. By extension, some bacterial strains that positively impact the functioning of mycorrhizal symbiosis are also called MHB. These bacteria have applicative interests, as they indirectly improve the health and growth of tree seedlings. MHB are not restricted to a specific type of ecosystem, but are rather generalist in the way that they associate with both herbaceous and woody mycorrhizal plants from boreal, temperate, arid and tropical ecosystems. However, understanding the molecular mechanisms and their specificities will help us to know more about the ecology of the MHB. The process of acquisition varies between fungal species; while ectomycorrhizal fungi most probably recurrently acquire them from the environment, the association between bacterial endosymbionts and Glomeromycota probably dates back to very ancient times, and has since been vertically transmitted.

  15. Antifreeze Proteins of Bacteria

    Indian Academy of Sciences (India)

    Home; Journals; Resonance – Journal of Science Education; Volume 12; Issue 12. Antifreeze Proteins of Bacteria. M K Chattopadhyay. General Article Volume 12 Issue 12 December 2007 pp 25-30. Fulltext. Click here to view fulltext PDF. Permanent link: https://www.ias.ac.in/article/fulltext/reso/012/12/0025-0030 ...

  16. (PHB)-producing bacteria

    African Journals Online (AJOL)

    Jane

    2011-06-06

    Jun 6, 2011 ... Bioplastics are naturally occurring biodegradable polymers made from polyhydroxyalkanoates (PHA) of which poly 3-hydroxy butyric acid ... The plastic polymers accumulate intracellularly as light- refracting amorphous ... study focuses on the isolation and identification of novel species of bacteria capable ...

  17. Do Bacteria Age?

    Indian Academy of Sciences (India)

    Bacteria are thought to be examples of organisms that do not age. ... sues, organs, organ systems, organism, population, species, and .... Humans inevitably grow old through aging. All vertebrates show physical manifestations of aging somewhat similar to humans (other than white hair!). Aging is also seen in plants.

  18. Antifreeze Proteins of Bacteria

    Indian Academy of Sciences (India)

    Home; Journals; Resonance – Journal of Science Education; Volume 12; Issue 12. Antifreeze Proteins of Bacteria. M K Chattopadhyay. General Article Volume 12 Issue 12 December 2007 pp 25-30. Fulltext. Click here to view fulltext PDF. Permanent link: http://www.ias.ac.in/article/fulltext/reso/012/12/0025-0030. Keywords.

  19. Antibiotic-Resistant Bacteria.

    Science.gov (United States)

    Longenecker, Nevin E.; Oppenheimer, Dan

    1982-01-01

    A study conducted by high school advanced bacteriology students appears to confirm the hypothesis that the incremental administration of antibiotics on several species of bacteria (Escherichia coli, Staphylococcus epidermis, Bacillus sublitus, Bacillus megaterium) will allow for the development of antibiotic-resistant strains. (PEB)

  20. (PHB)-producing bacteria

    African Journals Online (AJOL)

    Isolation and characterization of two novel polyhydroxybutyrate (PHB)-producing bacteria. ... subsequently studied using phenotype microarray panels which allowed the testing of the effect of more than 90 different carbon, nitrogen, sulfur and phosphorus sources as well as pH on the growth characteristics of these strains.

  1. The Covert Use of the Global Special Operations Network and the Militarization of Covert Action in Political Warfare and the Gray Zone

    Science.gov (United States)

    2017-06-09

    84 Psychological Warfare Operations...Oxford University Press, 1971). 16 Charles Cruickshank,. The Fourth Arm: Psychological Warfare 1938-1945 (London, UK: Davis-Poynter, 1977), 69. 13...capability for clandestine intelligence collection and sabotage operations, in 1950, the Army only had about 20 personnel trained in psychological

  2. International humanitarian law applied to cyber-warfare: Precautions, proportionality and the notion of ‘attack’ under the humanitarian law of armed conflict

    NARCIS (Netherlands)

    Gill, T.D.; Tsagourias, N.; Buchan, R.

    2015-01-01

    This chapter examines the application of international humanitarian law to cyber warfare in the sense of rising to the level of an armed conflict. Building upon the work of the Tallinn Manual on the Application of International Law to Cyber Warfare, it places particular emphasis on the application

  3. The friendly bacteria within us Commensal bacteria of the intestine ...

    Indian Academy of Sciences (India)

    The friendly bacteria within us Commensal bacteria of the intestine: Roles in health and disease B.S. Ramakrishna Professor & Head Gastroenterology & Hepatology Christian Medical College Vellore · Slide 2 · Intestinal bacteria: the hidden organ · Slide 4 · Slide 5 · The normal bacterial flora prevents GI disease · Slide 7.

  4. The friendly bacteria within us Commensal bacteria of the intestine ...

    Indian Academy of Sciences (India)

    Short chain fatty acids (SCFA) are main source of energy for colonic epithelial cells · SCFA – role in colonic disease · SCFA prevent mucosal inflammation · Immunoregulation by gut bacteria · Balance of bacterial species in the gut · Immunosensory detection of intestinal bacteria · Pathogenic bacteria release interleukin-8 ...

  5. Manufacture of Probiotic Bacteria

    Science.gov (United States)

    Muller, J. A.; Ross, R. P.; Fitzgerald, G. F.; Stanton, C.

    Lactic acid bacteria (LAB) have been used for many years as natural biopreservatives in fermented foods. A small group of LAB are also believed to have beneficial health effects on the host, so called probiotic bacteria. Probiotics have emerged from the niche industry from Asia into European and American markets. Functional foods are one of the fastest growing markets today, with estimated growth to 20 billion dollars worldwide by 2010 (GIA, 2008). The increasing demand for probiotics and the new food markets where probiotics are introduced, challenges the industry to produce high quantities of probiotic cultures in a viable and stable form. Dried concentrated probiotic cultures are the most convenient form for incorporation into functional foods, given the ease of storage, handling and transport, especially for shelf-stable functional products. This chapter will discuss various aspects of the challenges associated with the manufacturing of probiotic cultures.

  6. Bacteria in ulcera crurum.

    Science.gov (United States)

    Kontiainen, S; Rinne, E

    1988-01-01

    Bacterial cultures derived from 432 chronic leg ulcers were analysed retrospectively to determine which bacteria are most commonly found in these ulcers. The study covered a 2-year period. Two-thirds of the patients were over 70 years of age. Staphylococcus aureus was found in nearly half of the ulcers studied, Pseudomonas sp. in one-third, pyogenic streptococci and enterococci in every fifth and Proteus sp. in every tenth. The frequency by which pyogenic streptococci were isolated was about 10 to 20 times as high as previously reported. Obligate anaerobic bacteria were also frequently isolated. The sensitivity of the isolates from the second year to antimicrobial agents likely to be chosen if systemic therapy were required is also reported. The results are discussed in relation to previous findings.

  7. Bacteria in ancient sediments

    International Nuclear Information System (INIS)

    Izzo, G.

    1986-01-01

    In order to ascertain the role of biological activity in ancient sediments, two microbiological studies were carried out. The first was on pleistocenic clay sediments on land, the second on deep oceanic sediments. In the present paper by direct counting the samples is demonstrated the presence of bacteria in a range of 10 5 to 10 7 . Further studies must be carried out to ascertain the activities by in situ incubation methods

  8. Bacteria colonizing paper machines

    OpenAIRE

    Ekman, Jaakko

    2011-01-01

    Bacteria growing in paper machines can cause several problems. Biofilms detaching from paper machine surfaces may lead to holes and spots in the end product or even break the paper web leading to expensive delays in production. Heat stable endospores will remain viable through the drying section of paper machine, increasing the microbial contamination of paper and board. Of the bacterial species regularly found in the end products, Bacillus cereus is the only one classified as a pathogen. Cer...

  9. Quality of life in chemical warfare survivors with ophthalmologic injuries: the first results form Iran Chemical Warfare Victims Health Assessment Study

    Directory of Open Access Journals (Sweden)

    Soroush Mohammad

    2009-01-01

    Full Text Available Abstract Background Iraq used chemical weapons extensively against the Iranians during the Iran-Iraq war (1980–1988. The aim of this study was to assess the health related quality of life (HRQOL in people who had ophthalmologic complications due to the sulfur mustard gas exposure during the war. Methods The Veterans and Martyrs Affair Foundation (VMAF database indicated that there were 196 patients with severe ophthalmologic complications due to chemical weapons exposure. Of these, those who gave consent (n = 147 entered into the study. Quality of life was measured using the 36-item Short Form Health Survey (SF-36 and scores were compared to those of the general public. In addition logistic regression analysis was performed to indicate variables that contribute to physical and mental health related quality of life. Results The mean age of the patients was 44.8 (SD = 8.7 ranging from 21 to 75 years. About one-third of the cases (n= 50 reported exposure to chemical weapons more than once. The mean exposure duration to sulfur mustard gas was 21.6 years (SD = 1.2. The lowest scores on the SF-36 subscales were found to be: the role physical and the general health. Quality of life in chemical warfare victims who had ophthalmologic problems was significantly lower than the general public (P Conclusion The study findings suggest that chemical warfare victims with ophthalmologic complications suffer from poor health related quality of life. It seems that the need for provision of health and support for this population is urgent. In addition, further research is necessary to measure health related quality of life in victims with different types of disabilities in order to support and enhance quality of life among this population.

  10. Detection of warfare agents in liquid foods using the brine shrimp lethality assay.

    Science.gov (United States)

    Lumor, Stephen E; Diez-Gonzalez, Francisco; Labuza, Theodore P

    2011-01-01

    The brine shrimp lethality assay (BSLA) was used for rapid and non-specific detection of biological and chemical warfare agents at concentrations considerably below that which will cause harm to humans. Warfare agents detected include T-2 toxin, trimethylsilyl cyanide, and commercially available pesticides such as dichlorvos, diazinon, dursban, malathion, and parathion. The assay was performed by introducing 50 μL of milk or orange juice contaminated with each analyte into vials containing 10 freshly hatched brine shrimp nauplii in seawater. This was incubated at 28 °C for 24 h, after which mortality was determined. Mortality was converted to probits and the LC(50) was determined for each analyte by plotting probits of mortality against analyte concentration (log(10)). Our findings were the following: (1) the lethal effects of toxins dissolved in milk were observed, with T-2 toxin being the most lethal and malathion being the least, (2) except for parathion, the dosage (based on LC(50)) of analyte in a cup of milk (200 mL) consumed by a 6-y-old (20 kg) was less than the respective published rat LD(50) values, and (3) the BSLA was only suitable for detecting toxins dissolved in orange juice if incubation time was reduced to 6 h. Our results support the application of the BSLA for routine, rapid, and non-specific prescreening of liquid foods for possible sabotage by an employee or an intentional bioterrorist act. Practical Application: The findings of this study strongly indicate that the brine shrimp lethality assay can be adapted for nonspecific detection of warfare agents or toxins in food at any point during food production and distribution.

  11. The concept of guerrilla warfare in Lithuania in the 1920—1930s

    Directory of Open Access Journals (Sweden)

    Jokubauskas Vytautas

    2012-03-01

    Full Text Available This article analyses the military and tactical training of the members of the Lithuanian Riflemen’s Union for guerrilla warfare in the interwar period. Small nations, such as Lithuania and other Baltic states, being unable to build up military strength in order to ensure national security, were forced to seek for unconventional methods of warfare, including guerrilla strategies. The study places emphasis on the development of the guerrilla war concept in the Union periodicals. The author retraces a change in the intensity of the guerrilla warfare concept propagation amongst Lithuanian population and riflemen, in particular, through publications in the Trimitas — a periodical of the Lithuanian Riflemen’s Union. The author also identifies the narratives associated with the guerrilla matters employed for propaganda purposes in order to create an image of a guerrilla as a defender of the Homeland — Lithuania. Additionally, the structure and numbers of the Union are analysed through a comparison with similar organisations of the other «small nations» of the Baltic North-East. The author addresses the issue of military missions planned by the Lithuanian Army, as well as the way riflemen implemented them. Since the Union did not only offer military training, but was also engaged in the patriotic propaganda, the article focuses on the network of cultural institutions, homes of riflemen, orchestras, libraries, choirs, and athletic clubs used by the Union. The article sets out to establish whether the loss of Lithuanian sovereignty could have been possible without giving rise to a protracted guerrilla war.

  12. Pepsin homologues in bacteria

    Directory of Open Access Journals (Sweden)

    Bateman Alex

    2009-09-01

    Full Text Available Abstract Background Peptidase family A1, to which pepsin belongs, had been assumed to be restricted to eukaryotes. The tertiary structure of pepsin shows two lobes with similar folds and it has been suggested that the gene has arisen from an ancient duplication and fusion event. The only sequence similarity between the lobes is restricted to the motif around the active site aspartate and a hydrophobic-hydrophobic-Gly motif. Together, these contribute to an essential structural feature known as a psi-loop. There is one such psi-loop in each lobe, and so each lobe presents an active Asp. The human immunodeficiency virus peptidase, retropepsin, from peptidase family A2 also has a similar fold but consists of one lobe only and has to dimerize to be active. All known members of family A1 show the bilobed structure, but it is unclear if the ancestor of family A1 was similar to an A2 peptidase, or if the ancestral retropepsin was derived from a half-pepsin gene. The presence of a pepsin homologue in a prokaryote might give insights into the evolution of the pepsin family. Results Homologues of the aspartic peptidase pepsin have been found in the completed genomic sequences from seven species of bacteria. The bacterial homologues, unlike those from eukaryotes, do not possess signal peptides, and would therefore be intracellular acting at neutral pH. The bacterial homologues have Thr218 replaced by Asp, a change which in renin has been shown to confer activity at neutral pH. No pepsin homologues could be detected in any archaean genome. Conclusion The peptidase family A1 is found in some species of bacteria as well as eukaryotes. The bacterial homologues fall into two groups, one from oceanic bacteria and one from plant symbionts. The bacterial homologues are all predicted to be intracellular proteins, unlike the eukaryotic enzymes. The bacterial homologues are bilobed like pepsin, implying that if no horizontal gene transfer has occurred the duplication

  13. U.S. Army Land Warfare Laboratory. Volume 1. Project Report, Appendix A. Documentation

    Science.gov (United States)

    1974-06-01

    10) "EXPLOSIVES DETECTING DOGS", Final Report. Krauss, flax , Bliological Sciences Branch. U. S. Ariqy Land Warfare Laboratory, Aberdeen Proving...Readei .•,al uat ed by Alaska Nau inl i 1 :uli d. IC SI’ID ret onilt dt’d yN, ( ;,Iaid, a l ,., by PISARAi.. ROC he inu, prteparted. I1 lt ninat ion 1...to UISARV. Ret : ansmission >;ystni Evaluation qty 0l 0 sup li,-d to I Ag\\’N and USAkV which rt-comin• l:dt-d I( \\’I I mod i f cat io. Riot Col: rol

  14. Destruction of chemical warfare agent simulants by air and moisture stable metal NHC complexes.

    Science.gov (United States)

    Weetman, Catherine; Notman, Stuart; Arnold, Polly L

    2018-02-20

    The cooperative effect of both NHC and metal centre has been found to destroy chemical warfare agent (CWA) simulants. Choice of both the metal and NHC is key to these transformations as simple, monodentate N-heterocyclic carbenes in combination with silver or vanadium can promote stoichiometric destruction, whilst bidentate, aryloxide-tethered NHC complexes of silver and alkali metals promote breakdown under mild heating. Iron-NHC complexes generated in situ are competent catalysts for the destruction of each of the three targetted CWA simulants.

  15. Total Control: How the Nazis Countered Unconventional Warfare in the Netherlands During World War Two

    Science.gov (United States)

    2017-05-25

    11:mrnn ’ cc11rit) pnlic) :.incc I >t66. l·Dlkm ing the (jcrman ’ ict ori1.:~ ~) f 1939- 19-10. I titler grantccl I limmlcr rrnthority over la" :md...better deterrent in the c;mall " Durch cnmmunity. the Scc11rit) :-1.:n ict ’’i pro’ idcd the names of death candidates 3nu c"<ccu tcd people tu thl...Total Control: I low the Nazis Countered Unconventional Warfare in the Netherlands During World War Two A Monograph by Major Jeroen F van

  16. Unconventional War and Warfare in the Gray Zone. The New Spectrum of Modern Conflicts

    Directory of Open Access Journals (Sweden)

    Miroslaw Banasik

    2016-06-01

    Full Text Available Experiences of the last couple of years indicate that political objectives are increasingly achieved without official declarations of war. Armed forces are used in untraditional ways and the so-called substitute troops begin to play an increasingly bigger part. The article aims to characterize the conflicts of alternative nature below the level of open war that are on the border between war and peace. The content of the article presents the theory of unconventional warfare and its description, and familiarizes the reader with the concept of grey zone conflicts. It further shows the challenges linked to rivalry for influence zones and security provisions.

  17. Battle-Wise: Seeking Time-Information Superiority in Networked Warfare

    Science.gov (United States)

    2006-07-01

    it best about learning from mistakes in life: “There is no wisdom in the second kick of a mule .” Although he did not have 21st-century warfare in...part of our military leadership—can we expect to avoid the “second kick of a mule .” xii BATTLE-WISE PREFACE xiii xiii Preface This book is an inquiry...recruiting meth - ods. Depending on work experience before joining the military, it may be possible actually to identify battle-wise traits in recruits. For

  18. Bacteria counting method based on polyaniline/bacteria thin film.

    Science.gov (United States)

    Zhihua, Li; Xuetao, Hu; Jiyong, Shi; Xiaobo, Zou; Xiaowei, Huang; Xucheng, Zhou; Tahir, Haroon Elrasheid; Holmes, Mel; Povey, Malcolm

    2016-07-15

    A simple and rapid bacteria counting method based on polyaniline (PANI)/bacteria thin film was proposed. Since the negative effects of immobilized bacteria on the deposition of PANI on glass carbon electrode (GCE), PANI/bacteria thin films containing decreased amount of PANI would be obtained when increasing the bacteria concentration. The prepared PANI/bacteria film was characterized with cyclic voltammetry (CV) technique to provide quantitative index for the determination of the bacteria count, and electrochemical impedance spectroscopy (EIS) was also performed to further investigate the difference in the PANI/bacteria films. Good linear relationship of the peak currents of the CVs and the log total count of bacteria (Bacillus subtilis) could be established using the equation Y=-30.413X+272.560 (R(2)=0.982) over the range of 5.3×10(4) to 5.3×10(8)CFUmL(-1), which also showed acceptable stability, reproducibility and switchable ability. The proposed method was feasible for simple and rapid counting of bacteria. Copyright © 2016 Elsevier B.V. All rights reserved.

  19. Next Generation Non-particulate Dry Nonwoven Pad for Chemical Warfare Agent Decontamination

    Energy Technology Data Exchange (ETDEWEB)

    Ramkumar, S S; Love, A; Sata, U R; Koester, C J; Smith, W J; Keating, G A; Hobbs, L; Cox, S B; Lagna, W M; Kendall, R J

    2008-05-01

    New, non-particulate decontamination materials promise to reduce both military and civilian casualties by enabling individuals to decontaminate themselves and their equipment within minutes of exposure to chemical warfare agents or other toxic materials. One of the most promising new materials has been developed using a needlepunching nonwoven process to construct a novel and non-particulate composite fabric of multiple layers, including an inner layer of activated carbon fabric, which is well-suited for the decontamination of both personnel and equipment. This paper describes the development of a composite nonwoven pad and compares efficacy test results for this pad with results from testing other decontamination systems. The efficacy of the dry nonwoven fabric pad was demonstrated specifically for decontamination of the chemical warfare blister agent bis(2-chloroethyl)sulfide (H or sulfur mustard). GC/MS results indicate that the composite fabric was capable of significantly reducing the vapor hazard from mustard liquid absorbed into the nonwoven dry fabric pad. The mustard adsorption efficiency of the nonwoven pad was significantly higher than particulate activated carbon (p=0.041) and was similar to the currently fielded US military M291 kit (p=0.952). The nonwoven pad has several advantages over other materials, especially its non-particulate, yet flexible, construction. This composite fabric was also shown to be chemically compatible with potential toxic and hazardous liquids, which span a range of hydrophilic and hydrophobic chemicals, including a concentrated acid, an organic solvent and a mild oxidant, bleach.

  20. Information warfare as ICT influence on public consciousness and public opinion

    Directory of Open Access Journals (Sweden)

    A. H. Stadnyk

    2015-12-01

    Full Text Available The article defines the key aspects of the merits and impact of information warfare on public consciousness and public opinion. In the article, we review the information war not as an auxiliary mechanism for real war, but as a mechanism of affecting the public opinion. The public opinion can not be formed completely (while there is information content, public opinion changes constantly because the information in the hands of the media acts as a real weapon aimed at the mass consciousness. The article discusses in detail the four main factors that determine the effectiveness of the impact of information: 1 information warfare agents that affect the population, mass consciousness, public opinion; 2 information weapon of war; 3 the content itself, the content that is broadcast during the information war; 4 the specifics of mass awareness in different countries, the formation and functioning of their public opinion. And how much information war characteristic of the crisis (as an example to Ukraine since the beginning of the Maidan in 2013, the presentation of information aimed at manipulating public consciousness and, accordingly, the public opinion as the outward expression of consciousness.

  1. An Empirical Examination of the Warfare Metaphor with Respect to Pre-Service Elementary Teachers

    Science.gov (United States)

    Cobern, William W.; Loving, Cathleen C.; Davis, Edward B.; Terpstra, Jeff

    2013-08-01

    Since its origination in the late nineteenth century, the warfare metaphor has been used to characterize the relationship between science and religion, especially orthodox Christianity. Though thoroughly discredited by historians of science, the ideological descendants of Thomas Huxley, who spoke of science in quasi-religious terms, have kept the warfare metaphor alive. On the other hand, there are substantial numbers of Christians who at least appear to oppose science given their high-profile opposition to the general theory of evolution. The research reported in this paper asked, "Does anti-science sentiment increase with increasing orthodox Christian belief?" Two validated, published instruments were used: The Thinking about Science Survey Instrument and the Christian Fundamentalist Belief Scale. The subjects for the study were 545 preservice elementary teachers. The analysis did not show that anti-science sentiment increases with increasing Christian belief. Subjects with strong Christian beliefs were found to be just as supportive of science, if not more so, than subjects with no Christian beliefs. The study concludes with a caution against projecting attitudes toward science "on the whole" based on attitudes specifically toward evolution when working with preservice elementary teachers. Such a projection could well be counterproductive. The study has implications for other modern countries having highly religious populations such as Turkey.

  2. Investigating the Relationship Between Drone Warfare and Civilian Casualties in Gaza

    Directory of Open Access Journals (Sweden)

    Dr. Ann Rogers

    2014-12-01

    Full Text Available Unmanned aerial vehicles (UAVs, better known as drones, are increasingly touted as ‘humanitarian’ weapons that contribute positively to fighting just wars and saving innocent lives. At the same time, civilian casualties have become the most visible and criticized aspect of drone warfare. It is argued here that drones contribute to civilian casualties not in spite of, but because of, their unique attributes. They greatly extend war across time and space, pulling more potential threats and targets into play over long periods, and because they are low-risk and highly accurate, they are more likely to be used. The assumption that drones save lives obscures a new turn in strategic thinking that sees states such as Israel and the US rely on large numbers of small, highly discriminating attacks applied over time to achieve their objectives. This examination of Israel’s 2014 war in Gaza argues that civilian casualties are not an unexpected or unintended consequence of drone warfare, but an entirely predictable outcome.

  3. Zirconium doped nano-dispersed oxides of Fe, Al and Zn for destruction of warfare agents

    Energy Technology Data Exchange (ETDEWEB)

    Stengl, Vaclav, E-mail: stengl@uach.cz [Institute of Inorganic Chemistry AS CR v.v.i., 250 68 Rez (Czech Republic); Houskova, Vendula; Bakardjieva, Snejana; Murafa, Nataliya; Marikova, Monika [Institute of Inorganic Chemistry AS CR v.v.i., 250 68 Rez (Czech Republic); Oplustil, Frantisek; Nemec, Tomas [Military Technical Institute of Protection Brno, Veslarska 230, 628 00 Brno (Czech Republic)

    2010-11-15

    Zirconium doped nano dispersive oxides of Fe, Al and Zn were prepared by a homogeneous hydrolysis of the respective sulfate salts with urea in aqueous solutions. Synthesized metal oxide hydroxides were characterized using Brunauer-Emmett-Teller (BET) surface area and Barrett-Joiner-Halenda porosity (BJH), X-ray diffraction (XRD), infrared spectroscopy (IR), scanning electron microscopy (SEM) and energy-dispersive X-ray microanalysis (EDX). These oxides were taken for an experimental evaluation of their reactivity with sulfur mustard (HD or bis(2-chloroethyl)sulfide), soman (GD or (3,3'-Dimethylbutan-2-yl)-methylphosphonofluoridate) and VX agent (S-[2-(diisopropylamino)ethyl]-O-ethyl-methylphosphonothionate). The presence of Zr{sup 4+} dopant can increase both the surface area and the surface hydroxylation of the resulting doped oxides, decreases their crystallites' sizes thereby it may contribute in enabling the substrate adsorption at the oxide surface thus it can accelerate the rate of degradation of warfare agents. Addition of Zr{sup 4+} converts the product of the reaction of ferric sulphate with urea from ferrihydrite to goethite. We found out that doped oxo-hydroxides Zr-FeO(OH) - being prepared by a homogeneous hydrolysis of ferric and zirconium oxo-sulfates mixture in aqueous solutions - exhibit a comparatively higher degradation activity towards chemical warfare agents (CWAs). Degradation of soman or VX agent on Zr-doped FeO(OH) containing ca. 8.3 wt.% of zirconium proceeded to completion within 30 min.

  4. Zirconium doped nano-dispersed oxides of Fe, Al and Zn for destruction of warfare agents

    International Nuclear Information System (INIS)

    Stengl, Vaclav; Houskova, Vendula; Bakardjieva, Snejana; Murafa, Nataliya; Marikova, Monika; Oplustil, Frantisek; Nemec, Tomas

    2010-01-01

    Zirconium doped nano dispersive oxides of Fe, Al and Zn were prepared by a homogeneous hydrolysis of the respective sulfate salts with urea in aqueous solutions. Synthesized metal oxide hydroxides were characterized using Brunauer-Emmett-Teller (BET) surface area and Barrett-Joiner-Halenda porosity (BJH), X-ray diffraction (XRD), infrared spectroscopy (IR), scanning electron microscopy (SEM) and energy-dispersive X-ray microanalysis (EDX). These oxides were taken for an experimental evaluation of their reactivity with sulfur mustard (HD or bis(2-chloroethyl)sulfide), soman (GD or (3,3'-Dimethylbutan-2-yl)-methylphosphonofluoridate) and VX agent (S-[2-(diisopropylamino)ethyl]-O-ethyl-methylphosphonothionate). The presence of Zr 4+ dopant can increase both the surface area and the surface hydroxylation of the resulting doped oxides, decreases their crystallites' sizes thereby it may contribute in enabling the substrate adsorption at the oxide surface thus it can accelerate the rate of degradation of warfare agents. Addition of Zr 4+ converts the product of the reaction of ferric sulphate with urea from ferrihydrite to goethite. We found out that doped oxo-hydroxides Zr-FeO(OH) - being prepared by a homogeneous hydrolysis of ferric and zirconium oxo-sulfates mixture in aqueous solutions - exhibit a comparatively higher degradation activity towards chemical warfare agents (CWAs). Degradation of soman or VX agent on Zr-doped FeO(OH) containing ca. 8.3 wt.% of zirconium proceeded to completion within 30 min.

  5. The possible role of intravenous lipid emulsion in the treatment of chemical warfare agent poisoning

    Directory of Open Access Journals (Sweden)

    Arik Eisenkraft

    Full Text Available Organophosphates (OPs are cholinesterase inhibitors that lead to a characteristic toxidrome of hypersecretion, miosis, dyspnea, respiratory insufficiency, convulsions and, without proper and early antidotal treatment, death. Most of these compounds are highly lipophilic. Sulfur mustard is a toxic lipophilic alkylating agent, exerting its damage through alkylation of cellular macromolecules (e.g., DNA, proteins and intense activation of pro-inflammatory pathways. Currently approved antidotes against OPs include the peripheral anticholinergic drug atropine and an oxime that reactivates the inhibited cholinesterase. Benzodiazepines are used to stop organophosphate-induced seizures. Despite these approved drugs, efforts have been made to introduce other medical countermeasures in order to attenuate both the short-term and long-term clinical effects following exposure. Currently, there is no antidote against sulfur mustard poisoning. Intravenous lipid emulsions are used as a source of calories in parenteral nutrition. In recent years, efficacy of lipid emulsions has been shown in the treatment of poisoning by fat-soluble compounds in animal models as well as clinically in humans. In this review we discuss the usefulness of intravenous lipid emulsions as an adjunct to the in-hospital treatment of chemical warfare agent poisoning. Keywords: Intravenous lipid emulsion, Organophosphates, Sulfur mustard, Antidotes, Poisoning, Chemical Warfare agents

  6. Bioarchaeological investigation of ancient Maya violence and warfare in inland Northwest Yucatan, Mexico.

    Science.gov (United States)

    Serafin, Stanley; Lope, Carlos Peraza; Uc González, Eunice

    2014-05-01

    This study investigates evidence of changes and continuities in ancient Maya violence and warfare in inland northwest Yucatan, Mexico from the Middle Preclassic (600-300 BC) to the Postclassic (AD 1050-1542) through bioarchaeological analysis of cranial and projectile trauma. It is hypothesized that the frequency of violence increases before the Classic Maya collapse and remains high during the Postclassic period. It is also hypothesized that the flat, open terrain was conducive to warfare and resulted in higher trauma frequencies than in other parts of the Maya area. Results show that the frequency of cranial trauma decreases before the Classic collapse and increases in the Postclassic, partially matching the expected chronological trends. The frequency of cranial trauma does not differ significantly from other Maya regions but the pattern does: for all periods, males have more healed injuries than females and they are concentrated on the left side of the anterior of the skull. Some injuries appear to be from small points hafted in wooden clubs. In addition, projectile trauma is evident in a scapula with an embedded arrowhead tip, the first such case reported in a Maya skeleton. Overall, these results suggest greater reliance on open combat and less on raids in this region compared with other parts of the Maya area, possibly due to the flat, open terrain, though the identification of perimortem trauma in both women and men indicates surprise raids on settlements were also practiced. Copyright © 2014 Wiley Periodicals, Inc.

  7. Academic Training Lectures | Stuxnet and Cyber-Warfare | 13-14 January 2016

    CERN Multimedia

    2015-01-01

    Please note that the next series of Academic Training Lectures will take place on 13 and 14 January 2016. The lectures will be given by Gian Piero Siroli (Università e INFN, Bologna (IT))   Stuxnet and Cyber-Warfare (1/2)​ on Wednesday, 13 January from 11 a.m. to 12 p.m. http://indico.cern.ch/event/438525/ Stuxnet and Cyber-Warfare (2/2) on Thursday, 14 January from 11 a.m. to 12 p.m. http://indico.cern.ch/event/438526/ at CERN, Council Chamber (503-1-001)  Description: The first part of the lecture is devoted to the description of the Stuxnet worm, the first cyber-weapon whose existence has been made public, discovered in 2010 and targeting a specific industrial control system; the worm is responsible for the damaging of many centrifuges at an uranium enrichment facility, with the goal of sabotaging Iran&...

  8. Beneficial bacteria inhibit cachexia

    Science.gov (United States)

    Varian, Bernard J.; Goureshetti, Sravya; Poutahidis, Theofilos; Lakritz, Jessica R.; Levkovich, Tatiana; Kwok, Caitlin; Teliousis, Konstantinos; Ibrahim, Yassin M.; Mirabal, Sheyla; Erdman, Susan E.

    2016-01-01

    Muscle wasting, known as cachexia, is a debilitating condition associated with chronic inflammation such as during cancer. Beneficial microbes have been shown to optimize systemic inflammatory tone during good health; however, interactions between microbes and host immunity in the context of cachexia are incompletely understood. Here we use mouse models to test roles for bacteria in muscle wasting syndromes. We find that feeding of a human commensal microbe, Lactobacillus reuteri, to mice is sufficient to lower systemic indices of inflammation and inhibit cachexia. Further, the microbial muscle-building phenomenon extends to normal aging as wild type animals exhibited increased growth hormone levels and up-regulation of transcription factor Forkhead Box N1 [FoxN1] associated with thymus gland retention and longevity. Interestingly, mice with a defective FoxN1 gene (athymic nude) fail to inhibit sarcopenia after L. reuteri therapy, indicating a FoxN1-mediated mechanism. In conclusion, symbiotic bacteria may serve to stimulate FoxN1 and thymic functions that regulate inflammation, offering possible alternatives for cachexia prevention and novel insights into roles for microbiota in mammalian ontogeny and phylogeny. PMID:26933816

  9. Chemical communication in bacteria

    Science.gov (United States)

    Suravajhala, Srinivasa Sandeep; Saini, Deepak; Nott, Prabhu

    Luminescence in Vibrio fischeri is a model for quorum-sensing-gene-regulation in bacteria. We study luminescence response of V. fischeri to both internal and external cues at the single cell and population level. Experiments with ES114, a wild-type strain, and ainS mutant show that luminescence induction in cultures is not always proportional to cell-density and there is always a basal level of luminescence. At any given concentration of the exogenously added signals, C6-HSL and C8-HSL, luminescence per cell reaches a maximum during the exponential phase and decreases thereafter. We hypothesize that (1) C6-HSL production and LuxR activity are not proportional to cell-density, and (2) there is a shift in equilibrium from C6-HSL to C8-HSL during the later stages of growth of the culture. RT-PCR analysis of luxI and luxR shows that the expression of these genes is maximum corresponding to the highest level of luminescence. The shift in equilibrium is shown by studying competitive binding of C6-HSL and C8-HSL to LuxR. We argue that luminescence is a unicellular behaviour, and an intensive property like per cell luminescence is more important than gross luminescence of the population in understanding response of bacteria to chemical signalling. Funding from the Department of Science and Technology, India is acknowledged.

  10. Reevaluation of 1999 Health-Based Environmental Screening Levels (HBESLs) for Chemical Warfare Agents

    Energy Technology Data Exchange (ETDEWEB)

    Watson, Annetta Paule [ORNL; Dolislager, Fredrick G [ORNL

    2007-05-01

    This report evaluates whether new information and updated scientific models require that changes be made to previously published health-based environmental soil screening levels (HBESLs) and associated environmental fate/breakdown information for chemical warfare agents (USACHPPM 1999). Specifically, the present evaluation describes and compares changes that have been made since 1999 to U.S. Environmental Protection Agency (EPA) risk assessment models, EPA exposure assumptions, as well as to specific chemical warfare agent parameters (e.g., toxicity values). Comparison was made between screening value estimates recalculated with current assumptions and earlier health-based environmental screening levels presented in 1999. The chemical warfare agents evaluated include the G-series and VX nerve agents and the vesicants sulfur mustard (agent HD) and Lewisite (agent L). In addition, key degradation products of these agents were also evaluated. Study findings indicate that the combined effect of updates and/or changes to EPA risk models, EPA default exposure parameters, and certain chemical warfare agent toxicity criteria does not result in significant alteration to the USACHPPM (1999) health-based environmental screening level estimates for the G-series and VX nerve agents or the vesicant agents HD and L. Given that EPA's final position on separate Tier 1 screening levels for indoor and outdoor worker screening assessments has not yet been released as of May 2007, the study authors find that the 1999 screening level estimates (see Table ES.1) are still appropriate and protective for screening residential as well as nonresidential sites. As such, risk management decisions made on the basis of USACHPPM (1999) recommendations do not require reconsideration. While the 1999 HBESL values are appropriate for continued use as general screening criteria, the updated '2007' estimates (presented below) that follow the new EPA protocols currently under development

  11. 76 FR 10522 - Naval Surface Warfare Center, Upper Machodoc Creek and the Potomac River, Dahlgren, VA; Danger Zone

    Science.gov (United States)

    2011-02-25

    ... Warfare Center, Dahlgren's patrol boats. Oystering and fishing boats or other craft may cross the river in... bombing, directed energy technology, and manned or unmanned water craft operations; expand the Middle... manned or unmanned watercraft. (ii) When hazardous operations are in progress, no person, or fishing or...

  12. Modern sample preparation techniques for gas chromatography-mass spectrometry analysis of environmental markers of chemical warfare agents use

    NARCIS (Netherlands)

    Terzic, O.; de Voogt, P.; Banoub, J.

    2014-01-01

    The chapter introduces problematics of on-site chemical analysis in the investigations of past chemical warfare agents (CWA) events. An overview of primary environmental degradation pathways of CWA leading to formation of chemical markers of their use is given. Conventional and modern sample

  13. Warfare tourism experiences and national identity: The case of Airborne Museum ‘Hartenstein’ in Oosterbeek, the Netherlands

    NARCIS (Netherlands)

    Gieling, Johannes

    2016-01-01

    This paper examines through an analysis of Dutch warfare tourism whether there is a relationship between the subjective perceived salience of Dutch identity and heritage tourists' motives, emotions and overall satisfaction. Using a social identity theory framework, this study provides a view of

  14. Warfare has changed - so should have methods: Ammunition and weapon performance induced operational risk and safety issues

    NARCIS (Netherlands)

    Verhagen, T.L.A.; Voorde, M.J. van de

    2010-01-01

    Warfare has changed. Out-of-area operations have increased the awareness that we are unfamiliar with the performance of the current conventional medium and large calibre ammunitions in day-to-day practice. Current ammunition is primarily developed and procured to defeat the traditional ‘steel’

  15. Rapid Analysis of Chemical Warfare Agents and Their Hydrolysis Products by Desorption Electrospray Ionization Mass Spectrometry (DESI-MS)

    Science.gov (United States)

    2009-10-01

    72, 77-79], polymers [80], alkaloids on plant tissue [81], chemical warfare agents on solid phase microextraction (SPME) fibers [60, 82], hydrolysis...situ detection of alkaloids in plant tissue under ambient conditions using desorption electrospray ionization. Analyst, 130, 1624-1633. [82

  16. Cable Bacteria in Freshwater Sediments

    DEFF Research Database (Denmark)

    Risgaard-Petersen, Nils; Kristiansen, Michael; Frederiksen, Rasmus

    2015-01-01

    In marine sediments cathodic oxygen reduction at the sediment surface can be coupled to anodic sulfide oxidation in deeper anoxic layers through electrical currents mediated by filamentous, multicellular bacteria of the Desulfobulbaceae family, the so-called cable bacteria. Until now, cable...... bacteria have only been reported from marine environments. In this study, we demonstrate that cable bacteria also occur in freshwater sediments. In a first step, homogenized sediment collected from the freshwater stream Giber Å, Denmark, was incubated in the laboratory. After 2 weeks, pH signatures...... marine cable bacteria, with the genus Desulfobulbus as the closest cultured lineage. The results of the present study indicate that electric currents mediated by cable bacteria could be important for the biogeochemistry in many more environments than anticipated thus far and suggest a common evolutionary...

  17. Immunomodulatory properties of probiotic bacteria

    DEFF Research Database (Denmark)

    Fink, Lisbeth Nielsen

    2007-01-01

    Certain lactic acid bacteria (LAB) are part of the commensal intestinal flora and considered beneficial for health, as they compete with pathogens for adhesion sites in the intestine and ferment otherwise indigestible compounds. Another important property of these so-called probiotic bacteria...... with bacteria, and the cytokine pattern induced by specific bacteria resembled the pattern induced in MoDC, except for TNF-alpha and IL-6, which were induced in response to different bacteria in blood DC/monocytes and monocyte-derived DC. Autologous NK cells produced IFN-gamma when cultured with blood DC......, monocytes and monocyte-derived DC and IL-12-inducing bacteria, whereas only DC induced IFN-gamma production in allogeneic T cells. In vitro-generated DC is a commonly used model of tissue DC, but they differ in certain aspects from intestinal DC, which are in direct contact with the intestinal microbiota...

  18. Phenotypic switching in bacteria

    Science.gov (United States)

    Merrin, Jack

    Living matter is a non-equilibrium system in which many components work in parallel to perpetuate themselves through a fluctuating environment. Physiological states or functionalities revealed by a particular environment are called phenotypes. Transitions between phenotypes may occur either spontaneously or via interaction with the environment. Even in the same environment, genetically identical bacteria can exhibit different phenotypes of a continuous or discrete nature. In this thesis, we pursued three lines of investigation into discrete phenotypic heterogeneity in bacterial populations: the quantitative characterization of the so-called bacterial persistence, a theoretical model of phenotypic switching based on those measurements, and the design of artificial genetic networks which implement this model. Persistence is the phenotype of a subpopulation of bacteria with a reduced sensitivity to antibiotics. We developed a microfluidic apparatus, which allowed us to monitor the growth rates of individual cells while applying repeated cycles of antibiotic treatments. We were able to identify distinct phenotypes (normal and persistent) and characterize the stochastic transitions between them. We also found that phenotypic heterogeneity was present prior to any environmental cue such as antibiotic exposure. Motivated by the experiments with persisters, we formulated a theoretical model describing the dynamic behavior of several discrete phenotypes in a periodically varying environment. This theoretical framework allowed us to quantitatively predict the fitness of dynamic populations and to compare survival strategies according to environmental time-symmetries. These calculations suggested that persistence is a strategy used by bacterial populations to adapt to fluctuating environments. Knowledge of the phenotypic transition rates for persistence may provide statistical information about the typical environments of bacteria. We also describe a design of artificial

  19. [Chitinolytic activity of bacteria].

    Science.gov (United States)

    Saks, Elzbieta; Jankiewicz, Urszula

    2010-01-01

    Chitinolytic bacteria play an important role in degradation of chitin, one of the most abundant biopolymers in nature. These microorganisms synthesize specific enzymes, that catalyze hydrolysis of beta-1,4-glycosidic bonds in low-digestible chitin polymers, turning it into low-molecular, easy to digest compounds. During last decades many bacterial chitinolytic enzymes have been studied and characterized, mainly for their potential applications in agriculture, industry and medicine. Several chitinase classifications have been proposed, either on the base of substrate specificity or amino acid sequence similarities. X-ray crystallography and NMR spectroscopy techniques enabled the determination of three dimensional structure of some chitinases, what was helpful in explaining their catalytic mechanism. Development of biotechnology and molecular biology enables a deep research in regulation and cloning of bacterial chitinase genes.

  20. Bacteria, phages and septicemia.

    Directory of Open Access Journals (Sweden)

    Ausra Gaidelyte

    Full Text Available The use of phages is an attractive option to battle antibiotic resistant bacteria in certain bacterial infections, but the role of phage ecology in bacterial infections is obscure. Here we surveyed the phage ecology in septicemia, the most severe type of bacterial infection. We observed that the majority of the bacterial isolates from septicemia patients spontaneously secreted phages active against other isolates of the same bacterial strain, but not to the strain causing the disease. Such phages were also detected in the initial blood cultures, indicating that phages are circulating in the blood at the onset of sepsis. The fact that most of the septicemic bacterial isolates carry functional prophages suggests an active role of phages in bacterial infections. Apparently, prophages present in sepsis-causing bacterial clones play a role in clonal selection during bacterial invasion.

  1. Acoustofluidic bacteria separation

    International Nuclear Information System (INIS)

    Li, Sixing; Huang, Tony Jun; Ma, Fen; Zeng, Xiangqun; Bachman, Hunter; Cameron, Craig E

    2017-01-01

    Bacterial separation from human blood samples can help with the identification of pathogenic bacteria for sepsis diagnosis. In this work, we report an acoustofluidic device for label-free bacterial separation from human blood samples. In particular, we exploit the acoustic radiation force generated from a tilted-angle standing surface acoustic wave (taSSAW) field to separate Escherichia coli from human blood cells based on their size difference. Flow cytometry analysis of the E. coli separated from red blood cells shows a purity of more than 96%. Moreover, the label-free electrochemical detection of the separated E. coli displays reduced non-specific signals due to the removal of blood cells. Our acoustofluidic bacterial separation platform has advantages such as label-free separation, high biocompatibility, flexibility, low cost, miniaturization, automation, and ease of in-line integration. The platform can be incorporated with an on-chip sensor to realize a point-of-care sepsis diagnostic device. (paper)

  2. Acoustofluidic bacteria separation

    Science.gov (United States)

    Li, Sixing; Ma, Fen; Bachman, Hunter; Cameron, Craig E.; Zeng, Xiangqun; Huang, Tony Jun

    2017-01-01

    Bacterial separation from human blood samples can help with the identification of pathogenic bacteria for sepsis diagnosis. In this work, we report an acoustofluidic device for label-free bacterial separation from human blood samples. In particular, we exploit the acoustic radiation force generated from a tilted-angle standing surface acoustic wave (taSSAW) field to separate Escherichia coli from human blood cells based on their size difference. Flow cytometry analysis of the E. coli separated from red blood cells shows a purity of more than 96%. Moreover, the label-free electrochemical detection of the separated E. coli displays reduced non-specific signals due to the removal of blood cells. Our acoustofluidic bacterial separation platform has advantages such as label-free separation, high biocompatibility, flexibility, low cost, miniaturization, automation, and ease of in-line integration. The platform can be incorporated with an on-chip sensor to realize a point-of-care sepsis diagnostic device.

  3. Trace Detection of Organophosphorus Chemical Warfare Agents in Wastewater and Plants by Luminescent UIO-67(Hf) and Evaluating the Bioaccumulation of Organophosphorus Chemical Warfare Agents.

    Science.gov (United States)

    Lian, Xiao; Yan, Bing

    2018-04-17

    Organophosphorus chemical warfare agents (OPCWAs) are a group of organic pollutants characterized by high toxicity and chemical stability, and they are very difficult to be degraded. The trace quality of OPCWAs in water and food will cause great harm to the human body. Therefore, the detection of OPCWAs is a difficult challenge, which has become the research hotspot over the world. In this work, a Hf-based luminescent metal-organic framework (Eu@1) is prepared, and the reactivity of Hf 12 results in a methanephosphonic acid (MPA)-induced luminescence quenching and the charge transfer from MPA to Hf(IV) and generated exciplexes which are responsible for this quenching effect. The excellent performance of Eu@1 in the detection of MPA, with its finer selectivity, high sensitivity (LOD = 0.4 ppm), and large linear range (10 -7 to 10 -3 M), is encouraging for application in wastewater detection. Importantly, MPA is a pollutant that can be absorbed by plants and causes the bioaccumulation effect, and thus, the detection of MPA in real plant samples is a purposeful topic. Eu@1 also achieved satisfactory results in actual plant sample testing, and the bioaccumulation of MPA in onions, turnips, and cabbages is determined via our sensor. This fabricated detector provides a feasible path for the detection of ppm-level OPCWAs in a complex environment, which will help humans to avoid OPCWA-contaminated foods.

  4. Domestic Preparedness Program: Evaluation of the Agilent Gas Chromatograph - Flame Photometric Detector/Mass Selective Detector (GC-FPD/MSD) System Against Chemical Warfare Agents Summary Report

    National Research Council Canada - National Science Library

    Longworth, Terri

    2003-01-01

    This report characterizes the chemical warfare agent (CWA) detection potential of the commercially available Agilent gas chromatograph-flame photometric detector/mass selective detector (GC-FPD/MSD...

  5. An Analysis of the Impact of Network-Centric Warfare on the Doctrine and Tactics, Techniques and Procedures of Intelligence at the Operational Level

    National Research Council Canada - National Science Library

    Harvey, Charles

    1999-01-01

    This project sought to determine the impacts of network centric warfare (NCW) on the planning and direction of intelligence at the operational level, and what changes in joint intelligence doctrine (JID...

  6. Money and transmission of bacteria.

    NARCIS (Netherlands)

    Gedik, H.; Voss, T.A.; Voss, A.

    2013-01-01

    Money is one of the most frequently passed items in the world. The aim of this study was to ascertain the survival status of bacteria including Staphylococcus aureus, Escherichia coli, and Vancomycin- Resistant Enterococci (VRE) on banknotes from different countries and the transmission of bacteria

  7. Motility of electric cable bacteria

    DEFF Research Database (Denmark)

    Bjerg, Jesper Tataru; Damgaard, Lars Riis; Holm, Simon Agner

    2016-01-01

    Cable bacteria are filamentous bacteria that electrically couple sulfide oxidation and oxygen reduction at centimeter distances, and observations in sediment environments have suggested that they are motile. By time-lapse microscopy, we found that cable bacteria used gliding motility on surfaces...... with a highly variable speed of 0.50.3 ms1 (meanstandard deviation) and time between reversals of 155108 s. They frequently moved forward in loops, and formation of twisted loops revealed helical rotation of the filaments. Cable bacteria responded to chemical gradients in their environment, and around the oxic......-anoxic interface, they curled and piled up, with straight parts connecting back to the source of sulfide. Thus, it appears that motility serves the cable bacteria in establishing and keeping optimal connections between their distant electron donor and acceptors in a dynamic sediment environment....

  8. Fate of chemical warfare agents and toxic indutrial chemicals in landfills

    DEFF Research Database (Denmark)

    Bartelt-Hunt, D.L.; Barlaz, M.A.; Knappe, D.R.U.

    2006-01-01

    One component of preparedness for a chemical attack is planning for the disposal of contaminated debris. To assess the feasibility of contaminated debris disposal in municipal solid waste (MSW) landfills, the fate of selected chemical warfare agents (CWAs) and toxic industrial chemicals (TICs......], and two TICs [furan and carbon disulfide] were studied. The effects of both infiltration (climate) and contaminant biodegradability on fate predictions were assessed. Model results showed that hydrolysis and gas-phase advection were the principal fate pathways for CWAs and TICs, respectively. Apart from...... CX and the TICs, none of the investigated compounds was predicted to persist in a landfill for more than 5 years. Climate had little impact on CWA/TIC fate, and biodegradability was only important for compounds with long hydrolysis halflives. Monte Carlo simulations were performed to assess...

  9. Nuclear radiation in warfare. A SIPRI publication. Strahlungswirkungen beim Einsatz von Kernwaffen. Eine SIPRI-Publikation

    Energy Technology Data Exchange (ETDEWEB)

    Rotblat, J.

    1986-01-01

    The subject is covered in chapters, entitled: introduction; digest of nuclear weaponry (characteristics of nuclear weapons; effects of nuclear weapons other than ionizing radiation (fire-ball, fall-out, thermal radiation, blast wave, electromagnetic pulse); the nuclear arms race; war scenarios; biological effects of radiations on man (radiation doses; natural sources of radiation; acute effects of radiation; long-term somatic effects; genetic effects; factors affecting the biological response to radiation; internal exposure; synergistic effects; protection against radiation effects); radiations from nuclear explosions (initial radiation; fall-out; effects of fall-out on animal and plant life; contamination of water and food supplies by fall-out); radiation casualties in a nuclear war; effectiveness of civil defence; other warlike uses of radiation (attacks on civilian nuclear power installations; radiological warfare; terrorist activities); conclusion.

  10. Comparison of Selected Methods for Individual Decontamination of Chemical Warfare Agents

    Directory of Open Access Journals (Sweden)

    Tomas Capoun

    2014-06-01

    Full Text Available This study addresses the individual decontamination of chemical warfare agents (CWA and other hazardous substances. The individual decontamination applies to contaminated body surfaces, protective clothing and objects immediately after contamination, performed individually or by mutual assistance using prescribed or improvised devices. The article evaluates the importance of individual decontamination, security level for Fire and Rescue Service Units of the Czech Republic (FRS CR and demonstrates some of the devices. The decontamination efficiency of selected methods (sorbent, glove and sponge, two-chamber foam device and wiping with alcohol was evaluated for protective clothing and painted steel plate contaminated with O-ethyl-S-(diisopropylaminoethyl-methylthiophosphonate (VX, sulfur mustard, o-cresol and acrylonitrile. The methods were assessed from an economic point of view and with regard to specific user parameters, such as the decontamination of surfaces or materials with poor accessibility and vertical surfaces, the need for a water rinse as well as toxic waste and its disposal.

  11. Investigation of Acute Toxicity of a Chemical Warfare Agent in Kidneys

    Directory of Open Access Journals (Sweden)

    Turgut Topal

    2007-08-01

    Full Text Available One of the most important chemical warfare agents, sulfur mustard (SM causes crucial acute and chronic toxic effects. Lung, skin, eye and kidneys are the most affected organs. In this work, it was investigated if increased nitric oxide (NO and peroxynitrite are involved in nitrogen mustard (NM induced kidney damage. In this experimen, aminoguanidine (AG as inducible nitric oxide synthase (iNOS inhibitor and ebselen as peroxynitrite scavenger were used. NM administration resulted in important oxidant and antioxidant changes as well as tissue damage in kidneys. Therapeutic agents showed significant protection and reduced oxidant parameteres leading to tissue healing was observed. Results of this study suggest that drugs with similar properties can be used to protect kidney damage caused by NM. [TAF Prev Med Bull. 2007; 6(4: 227-232

  12. Investigation of Acute Toxicity of a Chemical Warfare Agent in Kidneys

    Directory of Open Access Journals (Sweden)

    Turgut Topal

    2007-08-01

    Full Text Available One of the most important chemical warfare agents, sulfur mustard (SM causes crucial acute and chronic toxic effects. Lung, skin, eye and kidneys are the most affected organs. In this work, it was investigated if increased nitric oxide (NO and peroxynitrite are involved in nitrogen mustard (NM induced kidney damage. In this experimen, aminoguanidine (AG as inducible nitric oxide synthase (iNOS inhibitor and ebselen as peroxynitrite scavenger were used. NM administration resulted in important oxidant and antioxidant changes as well as tissue damage in kidneys. Therapeutic agents showed significant protection and reduced oxidant parameteres leading to tissue healing was observed. Results of this study suggest that drugs with similar properties can be used to protect kidney damage caused by NM. [TAF Prev Med Bull 2007; 6(4.000: 227-232

  13. Chemiresistor Devices for Chemical Warfare Agent Detection Based on Polymer Wrapped Single-Walled Carbon Nanotubes

    Science.gov (United States)

    Fennell, John F.; Hamaguchi, Hitoshi; Yoon, Bora; Swager, Timothy M.

    2017-01-01

    Chemical warfare agents (CWA) continue to present a threat to civilian populations and military personnel in operational areas all over the world. Reliable measurements of CWAs are critical to contamination detection, avoidance, and remediation. The current deployed systems in United States and foreign militaries, as well as those in the private sector offer accurate detection of CWAs, but are still limited by size, portability and fabrication cost. Herein, we report a chemiresistive CWA sensor using single-walled carbon nanotubes (SWCNTs) wrapped with poly(3,4-ethylenedioxythiophene) (PEDOT) derivatives. We demonstrate that a pendant hexafluoroisopropanol group on the polymer that enhances sensitivity to a nerve agent mimic, dimethyl methylphosphonate, in both nitrogen and air environments to concentrations as low as 5 ppm and 11 ppm, respectively. Additionally, these PEDOT/SWCNT derivative sensor systems experience negligible device performance over the course of two weeks under ambient conditions. PMID:28452929

  14. Love-Wave Sensors Combined with Microfluidics for Fast Detection of Biological Warfare Agents

    Directory of Open Access Journals (Sweden)

    Daniel Matatagui

    2014-07-01

    Full Text Available The following paper examines a time-efficient method for detecting biological warfare agents (BWAs. The method is based on a system of a Love-wave immunosensor combined with a microfluidic chip which detects BWA samples in a dynamic mode. In this way a continuous flow-through of the sample is created, promoting the reaction between antigen and antibody and allowing a fast detection of the BWAs. In order to prove this method, static and dynamic modes have been simulated and different concentrations of BWA simulants have been tested with two immunoreactions: phage M13 has been detected using the mouse monoclonal antibody anti-M13 (AM13, and the rabbit immunoglobulin (Rabbit IgG has been detected using the polyclonal antibody goat anti-rabbit (GAR. Finally, different concentrations of each BWA simulants have been detected with a fast response time and a desirable level of discrimination among them has been achieved.

  15. Love-wave sensors combined with microfluidics for fast detection of biological warfare agents.

    Science.gov (United States)

    Matatagui, Daniel; Fontecha, José Luis; Fernández, María Jesús; Gràcia, Isabel; Cané, Carles; Santos, José Pedro; Horrillo, María Carmen

    2014-07-15

    The following paper examines a time-efficient method for detecting biological warfare agents (BWAs). The method is based on a system of a Love-wave immunosensor combined with a microfluidic chip which detects BWA samples in a dynamic mode. In this way a continuous flow-through of the sample is created, promoting the reaction between antigen and antibody and allowing a fast detection of the BWAs. In order to prove this method, static and dynamic modes have been simulated and different concentrations of BWA simulants have been tested with two immunoreactions: phage M13 has been detected using the mouse monoclonal antibody anti-M13 (AM13), and the rabbit immunoglobulin (Rabbit IgG) has been detected using the polyclonal antibody goat anti-rabbit (GAR). Finally, different concentrations of each BWA simulants have been detected with a fast response time and a desirable level of discrimination among them has been achieved.

  16. Decontamination of adsorbed chemical warfare agents on activated carbon using hydrogen peroxide solutions.

    Science.gov (United States)

    Osovsky, Ruth; Kaplan, Doron; Nir, Ido; Rotter, Hadar; Elisha, Shmuel; Columbus, Ishay

    2014-09-16

    Mild treatment with hydrogen peroxide solutions (3-30%) efficiently decomposes adsorbed chemical warfare agents (CWAs) on microporous activated carbons used in protective garments and air filters. Better than 95% decomposition of adsorbed sulfur mustard (HD), sarin, and VX was achieved at ambient temperatures within 1-24 h, depending on the H2O2 concentration. HD was oxidized to the nontoxic HD-sulfoxide. The nerve agents were perhydrolyzed to the respective nontoxic methylphosphonic acids. The relative rapidity of the oxidation and perhydrolysis under these conditions is attributed to the microenvironment of the micropores. Apparently, the reactions are favored due to basic sites on the carbon surface. Our findings suggest a potential environmentally friendly route for decontamination of adsorbed CWAs, using H2O2 without the need of cosolvents or activators.

  17. Bioterrorism and Biological Warfare, from Past to the Present: A classic review

    Directory of Open Access Journals (Sweden)

    Majid Zare Bidaki

    2015-10-01

    Full Text Available Bioterrorism is defined as any terrorist action of intentional release or dissemination of highly pathogenic biological agents, including a variety of microorganisms or biological toxins. With the growing threat of terrorism, is necessary that the potential danger of various microorganisms – as a powerful tool of aggression and threat- to be taken seriously. This review tries to explain the concept of biological weapons and their historical development process with an emphasis on efforts to control the proliferation of these types of weapons over the last century. Potential impact of infectious diseases on people and armed forces was known from since 600 BC. Using the victims of the plague as a weapon in medieval warfare and spread of smallpox as a weapon during the war against the Indians when initially America was discovered, the development of biological weapons during the World War I, World War II and the Cold War, and even since the beginning of the third millennium, all show the strategic importance of pathogenic microorganisms as a deterrent power for the superiority of some governments and cults. Historical attempts to use infectious diseases as biological weapons reveal that the distinction between a natural outbreak of an infectious disease and that of a deliberate biological attack is very difficult. Abusing this characteristic of infectious diseases has made it possible for the purposes of superiority. International agreements to control the development of biological weapons, such as “the 1925 Geneva Protocol” and “the Convention on the Prohibition of the Development, Production and Stockpiling of Biological and Toxic Weapons” have not been able to control the development and using of biological warfare.  The current paper is a classic review (Overview article aiming at increasing the knowledge and awareness of people especially of health authorities and government officials.

  18. Nanoparticle-based optical biosensors for the direct detection of organophosphate chemical warfare agents and pesticides

    International Nuclear Information System (INIS)

    Simonian, A.L.; Good, T.A.; Wang, S.-S.; Wild, J.R.

    2005-01-01

    Neurotoxic organophosphates (OP) have found widespread use in the environment for insect control. In addition, there is the increasing threat of use of OP based chemical warfare agents in both ground based warfare and terrorist attacks. Together, these trends necessitate the development of simple and specific methods for discriminative detection of ultra low quantities of OP neurotoxins. In our previous investigations a new biosensor for the direct detection of organophosphorus neurotoxins was pioneered. In this system, the enzymatic hydrolysis of OP neurotoxins by organophosphate hydrolase (OPH) generated two protons in each hydrolytic turnover through reactions in which P-X bonds are cleaved. The sensitivity of this biosensor was limited due to the potentiometric method of detection. Recently, it was reported that a change in fluorescence properties of a fluorophore in the vicinity of gold nanoparticles might be used for detection of nanomolar concentrations of DNA oligonucleotides. The detection strategy was based on the fact that an enhancement or quenching of fluorescence intensity is a function of the distances between the gold nanoparticle and fluorophore. While these reports have demonstrated the use of nanoparticle-based sensors for the detection of target DNA, we observed that the specificity of enzyme-substrate interactions could be exploited in similar systems. To test the feasibility of this approach, OPH-gold nanoparticle conjugates were prepared, then incubated with a fluorescent enzyme inhibitor or decoy. The fluorescence intensity of the decoy was sensitive to the proximity of the gold nanoparticle, and thus could be used to indicate that the decoy was bound to the OPH. Then different paraoxon concentrations were introduced to the OPH-nanoparticle-conjugate-decoy mixtures, and normalized ratio of fluorescence intensities were measured. The greatest sensitivity to paraoxon was obtained when decoys and OPH-gold nanoparticle conjugates were present at

  19. Media Discourse in an Atmosphere of Information Warfare: From Manipulation to Aggression

    Directory of Open Access Journals (Sweden)

    Владимир Иванович Озюменко

    2017-12-01

    Full Text Available In todays atmosphere of information warfare the biased impact of the media has increased, pushing behind other functions, including the informative one. The forms of media influence have also changed: direct persuasion has been replaced by implicit manipulation, which develops into outright aggression. Since, in the media discourse aggression can be both verbal and non-verbal, we propose to use the term information (or media aggression , which is broader than verbal aggression . Media aggression can be considered as a binary process - in relation to the referent (affective aggression and in relation to the audience (cognitive aggression. As a result, the information under media aggression refers to the expression of open hostility and animosity towards the referent and meaningful impact on the consciousness of the recipient (the target audience to its ideological subordination. The purpose of this article is to justify the hypothesis that the growing media aggression is a feature of modern media discourse in the atmosphere of information warfare, and this function can be analysed within the framework of manipulative discourse as manipulative persuasion. The data has been taken from quality British and American newspapers, news websites of The BBC, The Economist, The Guardian, The New York Times, The Washington Post, and some others covering the relations between Russia and the USA, the situation in the Middle East, particularly in Syria. The the study was conducted using critical discourse analysis (Fairclough 2001, Van Dijk 2006, 2009; Wodak 2007; Weiss, Wodak 2007 and the multimodal approach (Ivanova, Spodarets 2010; Ponton 2016, and reveals various strategies and means of linguistic manipulation and media aggression. It also shows that the main aim of linguistic manipulation accentuated by verbal and non-verbal aggression is to deliberately mislead the audience imposing on it the desired idea of ideological subordination. Therefore, a

  20. METHODS FOR DETECTING BACTERIA USING POLYMER MATERIALS

    NARCIS (Netherlands)

    Van Grinsven Bart Robert, Nicolaas; Cleij, Thomas

    2017-01-01

    A method for characterizing bacteria includes passing a liquid containing an analyte comprising a first bacteria and a second bacteria over and in contact with a polymer material on a substrate. The polymer material is formulated to bind to the first bacteria, and the first bacteria binds to the

  1. Millennial Warfare

    Science.gov (United States)

    2017-06-09

    www.psychologytoday.com/ blog / cutting-edge-leadership/201005/how-lead-the-millennial-generation. 8 Elizabeth Bodine-Barron, Todd C. Helmus, Madeline...environment. ISIL has taken the message boards and blog post of the 1990s and jumped in with both feet to the modern digital environment. They push content...57 Riggio. 58 Stern and Berger, 81-84. 59 Anwar Alawlaki, “The State of Ummah,” Anwar Alawaki Blog , April 23, 2009, accessed March 15, 2017

  2. Nuclear warfare

    CERN Multimedia

    Broda

    1981-01-01

    Le Prof.Broda a étudié à Vienne et Berlin et a travaillé pendant la dernière guerre mondiale en Grande Bretagne pour le conseil de la recherche médicale, notamment sur la chimie de la vision. Il est maintenant Prof. de la chimie, physique et radiochimie à l'Université de Vienne, où il concentre ses travaux sur les méchanisme de transport d'énergie à travers les cellules de membranes.

  3. Electronic Warfare

    Science.gov (United States)

    2012-02-08

    nuclear burst. A high-altitude electromagnetic pulse ( HEMP ) can generate significant disruptive field strengths over a continental-size area. The...portion of the EMS most affected by EMP and HEMP is the radio spectrum. Planning for communications system protection is significant when the potential...international law (e.g., Protocol IV of the 1980 Convention on Certain Conventional Weapons that prohibits the use of laser weapons with a combat function to

  4. Interactions between diatoms and bacteria.

    Science.gov (United States)

    Amin, Shady A; Parker, Micaela S; Armbrust, E Virginia

    2012-09-01

    Diatoms and bacteria have cooccurred in common habitats for hundreds of millions of years, thus fostering specific associations and interactions with global biogeochemical consequences. Diatoms are responsible for one-fifth of the photosynthesis on Earth, while bacteria remineralize a large portion of this fixed carbon in the oceans. Through their coexistence, diatoms and bacteria cycle nutrients between oxidized and reduced states, impacting bioavailability and ultimately feeding higher trophic levels. Here we present an overview of how diatoms and bacteria interact and the implications of these interactions. We emphasize that heterotrophic bacteria in the oceans that are consistently associated with diatoms are confined to two phyla. These consistent bacterial associations result from encounter mechanisms that occur within a microscale environment surrounding a diatom cell. We review signaling mechanisms that occur in this microenvironment to pave the way for specific interactions. Finally, we discuss known interactions between diatoms and bacteria and exciting new directions and research opportunities in this field. Throughout the review, we emphasize new technological advances that will help in the discovery of new interactions. Deciphering the languages of diatoms and bacteria and how they interact will inform our understanding of the role these organisms have in shaping the ocean and how these interactions may change in future oceans.

  5. Interactions between Diatoms and Bacteria

    Science.gov (United States)

    Amin, Shady A.; Parker, Micaela S.

    2012-01-01

    Summary: Diatoms and bacteria have cooccurred in common habitats for hundreds of millions of years, thus fostering specific associations and interactions with global biogeochemical consequences. Diatoms are responsible for one-fifth of the photosynthesis on Earth, while bacteria remineralize a large portion of this fixed carbon in the oceans. Through their coexistence, diatoms and bacteria cycle nutrients between oxidized and reduced states, impacting bioavailability and ultimately feeding higher trophic levels. Here we present an overview of how diatoms and bacteria interact and the implications of these interactions. We emphasize that heterotrophic bacteria in the oceans that are consistently associated with diatoms are confined to two phyla. These consistent bacterial associations result from encounter mechanisms that occur within a microscale environment surrounding a diatom cell. We review signaling mechanisms that occur in this microenvironment to pave the way for specific interactions. Finally, we discuss known interactions between diatoms and bacteria and exciting new directions and research opportunities in this field. Throughout the review, we emphasize new technological advances that will help in the discovery of new interactions. Deciphering the languages of diatoms and bacteria and how they interact will inform our understanding of the role these organisms have in shaping the ocean and how these interactions may change in future oceans. PMID:22933565

  6. Review on SERS of Bacteria

    Directory of Open Access Journals (Sweden)

    Pamela A. Mosier-Boss

    2017-11-01

    Full Text Available Surface enhanced Raman spectroscopy (SERS has been widely used for chemical detection. Moreover, the inherent richness of the spectral data has made SERS attractive for use in detecting biological materials, including bacteria. This review discusses methods that have been used to obtain SERS spectra of bacteria. The kinds of SERS substrates employed to obtain SERS spectra are discussed as well as how bacteria interact with silver and gold nanoparticles. The roll of capping agents on Ag/Au NPs in obtaining SERS spectra is examined as well as the interpretation of the spectral data.

  7. A Comparison of Neutron-Based Non-Destructive Assessment Methods for Chemical Warfare Materiel and High Explosives

    Science.gov (United States)

    Seabury, E. H.; Chichester, D. L.; Wharton, C. J.; Caffrey, A. J.

    2009-03-01

    Prompt Gamma Neutron Activation Analysis (PGNAA) systems employ neutrons as a probe to interrogate items, e.g. chemical warfare materiel-filled munitions. The choice of a neutron source in field-portable systems is determined by its ability to excite nuclei of interest, operational concerns such as radiological safety and ease-of-use, and cost. Idaho National Laboratory's PINS Chemical Assay System has traditionally used a 252Cf isotopic neutron source, but recently a deuterium-tritium (DT) electronic neutron generator (ENG) has been tested as an alternate neutron source. This paper presents the results of using both of these neutron sources to interrogate chemical warfare materiel (CWM) and high explosive (HE) filled munitions.

  8. Beer spoilage bacteria and hop resistance

    NARCIS (Netherlands)

    Sakamoto, K; Konings, WN

    2003-01-01

    For brewing industry, beer spoilage bacteria have been problematic for centuries. They include some lactic acid bacteria such as Lactobacillus brevis, Lactobacillus lindneri and Pediococcus damnosus, and some Gram-negative bacteria such as Pectinatus cerevisiiphilus, Pectinatus frisingensis and

  9. Models, Analysis, and Recommendations Pertaining to the Retention of Naval Special Warfare s Mid-Level Officers

    Science.gov (United States)

    2013-12-01

    I would like to thank Sarah Ashby, an amazing human being and friend; you spent countless hours researching information that was absolutely critical...The Analytic Hierarch/Network Process,” in Rev. R. Acad. Cien. Serie A. Mat (RACSAM), submitted by Francisco Javier Giron (Real Academia de Ciencias ...Academia de Ciencias : Spain. Scott, Nathan. Naval Special Warfare Officer Retention Survey. Monterey, CA: NPS Press, September 2013. Whittenberger

  10. Capability of the People’s Republic of China to Conduct Cyber Warfare and Computer Network Exploitation

    Science.gov (United States)

    2009-10-09

    resurgence of similar large scale hacker wars. Some groups, rallying around politically “safe” topics such as anti- Tibetan independence, however, still...also described Peng as an “experienced hacker” (see Figure 5).88 • Following this exposure on Henderson’s blog, the Coolswallow and Buddhist ...the Tibetan Government in Exile in India. The Canadian-based Information Warfare Monitor (IWM) notes the compromise of numerous government and

  11. The Short-Term Effect of Chest Physiotherapy on Spirometric Indices in Chemical Warfare Victims Exposed to Mustard Gas

    Directory of Open Access Journals (Sweden)

    A Abedi

    2008-12-01

    Full Text Available ABCTRACT Introduction & Objective: Chronic respiratory diseases are the most prevalent late sequels of sulfur mustard gas injury among Iranian chemical warfare victims. Chest physiotherapy is one of the useful methods in care, cure and infection prevention of these patients. The aim of this study was to determine the short-term effect of chest physiotherapy on spirometric indices in chemical warfare victims exposed to sulfur mustard gas. Materials & Methods: In this study, 27 of the chemical warfare victims with respiratory diseases were selected. Chest physiotherapy including postural drainage percussion and vibration were used in four positions for all patients. Pulmonary function test (PFT was obtained before (baseline, immediately and 20 minute after the chest physiotherapy. The SPSS software was used for the data analysis of the collected data. Results: Results of this study showed the significant effect (p<0.01 of chest physiotherapy upon forced expiratory volume in first second (FEV1 (baseline mean, 44.19 immediately after intervention mean 47.3 and 20 minute after intervention mean 48.3 and forced vital capacity (FVC (baseline mean, 69.37 immediately after intervention mean, 73.67 20 minute after intervention 75.74. Chest physiotherapy had significant effect (p<0.01 in asthmatic bronchitis group and also had significant effect (p<0.05 in both severe and moderate groups. Conclusion: Chest physiotherapy was able to improve pulmonary function test indices in chemical warfare victims suffering from respiratory problems. The effect on asthmatic bronchitis group, as well as both severe and moderate groups, was significant.

  12. Application of Model-Based Systems Engineering (MBSE) to Compare Legacy and Future Forces in Mine Warfare (MIW) Missions

    Science.gov (United States)

    2014-12-01

    airborne mine neutralization system AoA analysis of alternatives API application programming interface ASuW anti-surface warfare ASW...upon stakeholder feedback, an operational scenario was developed and ACRS was selected as the primary MOE for comparison. Lifecycle cost and risks...MIW Team was unfamiliar with some of the more advanced features of ExtendSim, such as 3-D animation, application programming inter- faces ( APIs ) to

  13. A hybrid method for protection against threats to a network infrastructure for an electronic warfare management system

    Science.gov (United States)

    Byłak, Michał; RóŻański, Grzegorz

    2017-04-01

    The article presents the concept of ensuring the security of network information infrastructure for the management of Electronic Warfare (EW) systems. The concept takes into account the reactive and proactive tools against threats. An overview of the methods used to support the safety of IT networks and information sources about threats is presented. Integration of mechanisms that allow for effective intrusion detection and rapid response to threats in a network has been proposed. The architecture of the research environment is also presented.

  14. Special Operations Forces in the People’s Liberation Army and the Development of an Integral Unconventional Warfare Mission

    Science.gov (United States)

    2005-06-01

    Yahuda , Michael . The International Politics of the Asia-Pacific, 1945-1995 (New York; Routledge, 1996). Yang, Andrew N.D. and Liao, Milton Wen...Action: The Challenge of Unconventional Warfare (Portland: Frank Cass Press, 2001), 3-4. 9. Michael J.Strack, “China: Special Operations Forces of...weapons/scud.html; Internet; accessed 21 March 2005. 59. Michael B. Gordon and General Bernard E. Trainor, “ The General’s War: The Inside Story of

  15. Potential Science and Technology Game Changers for the Ground Warfare of 2050: Selected Projections Made in 2017

    Science.gov (United States)

    2018-02-01

    effect, it is a living document that is not intended to offer arguments or recommendations for programmatic investments or priorities. It touches on the ...reports might offer different projections or update those already discussed. In effect, it is a living document. It is also important to emphasize what...now and 2050; these are depicted by the stars inside the left circle. Most of them will not have a game-changing importance for ground warfare in

  16. Gut Bacteria Affect Immunotherapy Response

    Science.gov (United States)

    Three new studies have identified intestinal bacteria that appear to influence the response to checkpoint inhibitors. This Cancer Currents blog post explains how the researchers think their findings could be used to improve patients’ responses to these immunotherapy drugs.

  17. Sewage-pollution indicator bacteria

    Digital Repository Service at National Institute of Oceanography (India)

    Ramaiah, N.; Rodrigues, V.; Alwares, E.; Rodrigues, C.; Baksh, R.; Jayan, S.; Mohandass, C.

    indiscriminate, deliber- ate, accidental, or regular/routine disposals), higher will be the number of coliforms in environmental samples. Further, microbiologists rely on the principle that higher the incidence of sewage indicator bacteria in any environment...

  18. The potential impact of developments in electronic technology on the future conduct of air warfare, volume 3

    Science.gov (United States)

    1986-12-01

    Advances in microelectronics have resulted in circuit densities many orders of magnitude greater than in current usage, making possible higher speed circuitry and greater storage capacity. RF techniques are also leading to monolithic microwave integrated circuits and microstrip antennas with corresponding reductions in size and weight. In addition, rapid advances are taking place in computer architecture and software that will provide improved information processing and control. This, coupled with progress in artificial intelligence and man-machine interface, offers promise of greatly improved battle management in the cockpit. The scale of changes is such that the nature of air warfare should be significantly affected over the next twenty years. This study examined the potential of electronic technology and potential benefits such as improvements in information processing, reduction in size and weight, increased reliability and maintainability; determined the applicability of such improvements to avionics and command and control systems and such functions as navigation and guidance, communications, surveillance, cockpit engineering and electronic warfare; and examined the impact on air warfare in the time period 2000 to 2010.

  19. Multifunctional ultra-high vacuum apparatus for studies of the interactions of chemical warfare agents on complex surfaces.

    Science.gov (United States)

    Wilmsmeyer, Amanda R; Gordon, Wesley O; Davis, Erin Durke; Mantooth, Brent A; Lalain, Teri A; Morris, John R

    2014-01-01

    A fundamental understanding of the surface chemistry of chemical warfare agents is needed to fully predict the interaction of these toxic molecules with militarily relevant materials, catalysts, and environmental surfaces. For example, rules for predicting the surface chemistry of agents can be applied to the creation of next generation decontaminants, reactive coatings, and protective materials for the warfighter. Here, we describe a multifunctional ultra-high vacuum instrument for conducting comprehensive studies of the adsorption, desorption, and surface chemistry of chemical warfare agents on model and militarily relevant surfaces. The system applies reflection-absorption infrared spectroscopy, x-ray photoelectron spectroscopy, and mass spectrometry to study adsorption and surface reactions of chemical warfare agents. Several novel components have been developed to address the unique safety and sample exposure challenges that accompany the research of these toxic, often very low vapor pressure, compounds. While results of vacuum-based surface science techniques may not necessarily translate directly to environmental processes, learning about the fundamental chemistry will begin to inform scientists about the critical aspects that impact real-world applications.

  20. LACTIC ACID BACTERIA: PROBIOTIC APPLICATIONS

    OpenAIRE

    NEENA GARG

    2015-01-01

    Lactic acid bacteria (LAB) is a heterotrophic Gram-positive bacteria which under goes lactic acid fermentations and leads to production of lactic acid as an end product. LAB includes Lactobacillus, Leuconostoc, Pediococcus, Lactococcus and Streptococcus which are grouped together in the family lactobacillaceae. LAB shows numerous antimicrobial activities due to production of antibacterial and antifungal compounds such as organic acids, bacteriocins, diacetyl, hydrogen peroxide and reutrin. LA...

  1. Thymidine kinase diversity in bacteria

    DEFF Research Database (Denmark)

    Sandrini, Michael; Clausen, A.R.; Munch-Petersen, B.

    2006-01-01

    Thymidine kinases (TKs) appear to be almost ubiquitous and are found in nearly all prokaryotes, eukaryotes, and several viruses. They are the key enzymes in thymidine salvage and activation of several anti-cancer and antiviral drugs. We show that bacterial TKs can be subdivided into 2 groups. The....... The TKs from Gram-positive bacteria are more closely related to the eukaryotic TK1 enzymes than are TKs from Gram-negative bacteria....

  2. Filtrating forms of soil bacteria

    Science.gov (United States)

    Van'kova, A. A.; Ivanov, P. I.; Emtsev, V. T.

    2013-03-01

    Filtrating (ultramicroscopic) forms (FF) of bacteria were studied in a soddy-podzolic soil and the root zone of alfalfa plants as part of populations of the most widespread physiological groups of soil bacteria. FF were obtained by filtering soil solutions through membrane filters with a pore diameter of 0.22 μm. It was established that the greater part of the bacteria in the soil and in the root zone of the plants has an ultramicroscopic size: the average diameter of the cells is 0.3 μm, and their length is 0.6 μm, which is significantly less than the cell size of banal bacteria. The number of FF varies within a wide range depending on the physicochemical conditions of the habitat. The FF number's dynamics in the soil is of a seasonal nature; i.e., the number of bacteria found increases in the summer and fall and decreases in the winter-spring period. In the rhizosphere of the alfalfa, over the vegetation period, the number of FF and their fraction in the total mass of the bacteria increase. A reverse tendency is observed in the rhizoplane. The morphological particularities (identified by an electron microscopy) and the nature of the FF indicate their physiological activity.

  3. The role of the sand in chemical warfare agent exposure among Persian Gulf War veterans: Al Eskan disease and "dirty dust".

    Science.gov (United States)

    Korényi-Both, A L; Svéd, L; Korényi-Both, G E; Juncer, D J; Korényi-Both, A L; Székely, A

    2000-05-01

    The purpose of this paper is to inquire into the relationship between Al Eskan disease and the probable exposure to chemical warfare agents by Persian Gulf War veterans. Al Eskan disease, first reported in 1991, compromises the body's immunological defense and is a result of the pathogenic properties of the extremely fine, dusty sand located in the central and eastern region of the Arabian peninsula. The disease manifests with localized expression of multisystem disorder. Signs and symptoms of Al Eskan disease have been termed by the news media "Persian Gulf syndrome." The dust becomes a warfare agent when toxic chemicals are microimpregnated into inert particles. The "dirty dust" concept, that the toxicity of an agent could be enhanced by absorption into inactive particles, dates from World War I. A growing body of evidence shows that coalition forces have encountered Iraqi chemical warfare in the theater of operation/Persian Gulf War to a much greater extent than early U.S. Department of Defense information had indicated. Veterans of that war were exposed to chemical warfare agents in the form of direct (deliberate) attacks by chemical weapons, such as missiles and mines, and indirect (accidental) contamination from demolished munition production plants and storage areas, or otherwise. We conclude that the microimpregnated sand particles in the theater of operation/Persian Gulf War depleted the immune system and simultaneously acted as vehicles for low-intensity exposure to chemical warfare agents and had a modifying-intensifying effect on the toxicity of exposed individuals. We recommend recognition of a new term, "dirty sand," as a subcategory of dirty dust/dusty chemical warfare agents. Our ongoing research efforts to investigate the health impact of chemical warfare agent exposure among Persian Gulf War veterans suggest that Al Eskan disease is a plausible and preeminent explanation for the preponderance of Persian Gulf War illnesses.

  4. Human body may produce bacteria.

    Science.gov (United States)

    Salerian, Alen J

    2017-06-01

    "Human body may produce bacteria" proposes that human body may produce bacteria and represent an independent source of infections contrary to the current paradigm of infectious disorders proposed by Louis Pasteur in 1880. The following observations are consistent with this hypothesis: A. Bidirectional transformations of both living and nonliving things have been commonly observed in nature. B. Complex multicellular organisms harbor the necessary properties to produce bacteria (water, nitrogen and oxygen). C. Physical laws suggest any previously observed phenomenon or action will occur again (life began on earth; a non living thing). D. Animal muscle cells may generate energy (fermentation). E. Sterilized food products (i.e. boiled eggs), may produce bacteria and fungus under special conditions and without any exposure to foreign living cells. "Human body may produce bacteria" may challenge the current medical paradigm that views human infectious disorders as the exclusive causative byproducts of invading foreign cells. It may also introduce new avenues to treat infectious disorders. Copyright © 2017 Elsevier Ltd. All rights reserved.

  5. Efficacy of liquid and foam decontamination technologies for chemical warfare agents on indoor surfaces.

    Science.gov (United States)

    Love, Adam H; Bailey, Christopher G; Hanna, M Leslie; Hok, Saphon; Vu, Alex K; Reutter, Dennis J; Raber, Ellen

    2011-11-30

    Bench-scale testing was used to evaluate the efficacy of four decontamination formulations on typical indoor surfaces following exposure to the liquid chemical warfare agents sarin (GB), soman (GD), sulfur mustard (HD), and VX. Residual surface contamination on coupons was periodically measured for up to 24h after applying one of four selected decontamination technologies [0.5% bleach solution with trisodium phosphate, Allen Vanguard Surface Decontamination Foam (SDF™), U.S. military Decon Green™, and Modec Inc. and EnviroFoam Technologies Sandia Decontamination Foam (DF-200)]. All decontamination technologies tested, except for the bleach solution, performed well on nonporous and nonpermeable glass and stainless-steel surfaces. However, chemical agent residual contamination typically remained on porous and permeable surfaces, especially for the more persistent agents, HD and VX. Solvent-based Decon Green™ performed better than aqueous-based bleach or foams on polymeric surfaces, possibly because the solvent is able to penetrate the polymer matrix. Bleach and foams out-performed Decon Green for penetrating the highly polar concrete surface. Results suggest that the different characteristics needed for an ideal and universal decontamination technology may be incompatible in a single formulation and a strategy for decontaminating a complex facility will require a range of technologies. Copyright © 2011 Elsevier B.V. All rights reserved.

  6. Extraordinary Measures: Drone Warfare, Securitization, and the “War on Terror”

    Directory of Open Access Journals (Sweden)

    Romaniuk Scott Nicholas

    2015-07-01

    Full Text Available The use of unmanned aerial vehicles or “drones,” as part of the United States’ (US targeted killing (TK program dramatically increased after the War on Terror (WoT was declared. With the ambiguous nature and parameters of the WoT, and stemming from the postulation of numerous low-level, niche-, and other securitizations producing a monolithic threat, US drone operations now constitute a vital stitch in the extensive fabric of US counterterrorism policy. This article employs the theories of securitization and macrosecuritization as discussed by Buzan (1991, 2006, and Buzan and Wæver (2009 to understand targeted killing, by means of weaponized drones, as an extraordinary measure according to the Copenhagen School’s interpretation. An overarching securitization and the use of the “security” label warrants the emergency action of targeted killing through the use of drones as an extraordinary measure. We argue that the WoT serves as a means of securitizing global terrorism as a threat significant enough to warrant the use of drone warfare as an extraordinary use of force. By accepting the WoT as a securitization process we can reasonably accept that the US’ response(s against that threat are also securitized and therefore become extraordinary measures.

  7. Reactions of psychiatric inpatients to the threat of biological and chemical warfare in Israel.

    Science.gov (United States)

    Strous, Rael D; Ofir, Dana; Brodsky, Ori; Yakirevitch, Janna; Drannikov, Angela; Navo, Nadav; Kotler, Moshe

    2004-04-01

    In the months before the Second Gulf War, the threat of biological and chemical warfare led many Israelis to experience significant stress and mood changes. In this study, we investigated whether this threat affected the subjective mood and behavior of inpatients with schizophrenia and compared the results with effects noted in their clinical staff. Subjects were evaluated at two points in time-2 months before the war and on day 1 of the war-with a specially designed questionnaire and with the Spielberger Scale for Trait Anxiety. Although the responses of the two groups did not differ radically before the war, on the first day of war, significant differences were noted, with patients demonstrating increases in anxiety and level of concern. Both groups reported similar effects on their mood. Patients were more concerned about the potential for the outbreak of World War III, whereas staff were more concerned about economic effects. Female subjects in both groups demonstrated greater anxiety and mood changes after the outbreak of war compared with before the war. Effects observed on the patients may be related to the decreased coping threshold resulting from their illness, which renders psychotic patients more vulnerable to any acute stressor; however, effects on the staff members should not be ignored.

  8. Transmissivity and storage coefficient estimates from slug tests, Naval Air Warfare Center, West Trenton, New Jersey

    Science.gov (United States)

    Fiore, Alex R.

    2014-01-01

    Slug tests were conducted on 56 observation wells open to bedrock at the former Naval Air Warfare Center (NAWC) in West Trenton, New Jersey. Aquifer transmissivity (T) and storage coefficient (S) values for most wells were estimated from slug-test data using the Cooper-Bredehoeft-Papadopulos method. Test data from three wells exhibited fast, underdamped water-level responses and were analyzed with the Butler high-K method. The range of T at NAWC was approximately 0.07 to 10,000 square feet per day. At 11 wells, water levels did not change measurably after 20 minutes following slug insertion; transmissivity at these 11 wells was estimated to be less than 0.07 square feet per day. The range of S was approximately 10-10 to 0.01, the mode being 10-10. Water-level responses for tests at three wells fit poorly to the type curves of both methods, indicating that these methods were not appropriate for adequately estimating T and S from those data.

  9. Detection of chemical warfare simulants using Raman excitation at 1064 nm

    Science.gov (United States)

    Dentinger, Claire; Mabry, Mark W.; Roy, Eric G.

    2014-05-01

    Raman spectroscopy is a powerful technique for material identification. The technique is sensitive to primary and higher ordered molecular structure and can be used to identify unknown materials by comparison with spectral reference libraries. Additionally, miniaturization of opto-electronic components has permitted development of portable Raman analyzers that are field deployable. Raman scattering is a relatively weak effect compared to a competing phenomenon, fluorescence. Even a moderate amount of fluorescence background interference can easily prevent identification of unknown materials. A long wavelength Raman system is less likely to induce fluorescence from a wider variety of materials than a higher energy visible laser system. Compounds such as methyl salicylate (MS), diethyl malonate (DEM), and dimethyl methylphosphonate (DMMP) are used as chemical warfare agent (CWA) simulants for development of analytical detection strategies. Field detection of these simulants however poses unique challenges because threat identification must be made quickly without the turnaround time usually required for a laboratory based analysis. Fortunately, these CWA simulants are good Raman scatterers, and field based detection using portable Raman instruments is promising. Measurements of the CWA simulants were done using a 1064 nm based portable Raman spectrometer. The longer wavelength excitation laser was chosen relative to a visible based laser systems because the 1064 nm based spectrometer is less likely to induce fluorescence and more suitable to a wider range of materials. To more closely mimic real world measurement situations, different sample presentations were investigated.

  10. Global physics: from percolation to terrorism, guerilla warfare and clandestine activities

    Science.gov (United States)

    Galam, Serge

    2003-12-01

    The September 11 attack on the US has revealed an unprecedented terrorism with worldwide range of destruction. It is argued to result from the first worldwide percolation of passive supporters. They are people sympathetic to the terrorism cause but without being involved with it. They just do not oppose it in case they could. This scheme puts suppression of the percolation as the major strategic issue in the fight against terrorism. Acting on the population is shown to be useless. Instead a new strategic scheme is suggested to increase the terrorism percolation threshold and in turn suppress the percolation. The relevant associated space is identified as a multi-dimensional social space including both the ground earth surface and all various independent flags displayed by the terrorist group. Some hints are given on how to shrink the geographical spreading of terrorism threat. The model apply to a large spectrum of clandestine activities including guerilla warfare as well as tax evasion, corruption, illegal gambling, illegal prostitution and black markets.

  11. Metabolic Syndrome in Chemical Warfare Patients with Chronic Obstructive Pulmonary Disease

    Directory of Open Access Journals (Sweden)

    Shahrzad M. Lari

    2014-11-01

    Full Text Available   Introduction: Sulfur mustard (SM, a toxic alkylating gas, can cause serious long-term pulmonary complications such as chronic obstructive pulmonary disease (COPD. Metabolic syndrome (MetS is one of the important comorbidities of COPD. This study was designed to evaluate the frequency of metabolic syndrome in Iranian chemical warfare patients (CWPs with COPD. Materials and Methods: Thirty CWPs with a mean age of 46.93± 6.8 were enrolled in this study. The following parameters were studied in: complete pulmonary function tests, health-related quality of life, serum triglycerides (TG, high density lipoprotein (HDL and fasting blood sugar (FBS levels. Additionally, 32 COPD patients and 56 healthy persons were considered as control groups who were matched to CWPs. Results: We found a statistically significant difference in the frequency of MetS between the COPD patients and the healthy control group (p=0.04. Additionally, we observed a statistically significant difference in the mean HDL levels among these groups (p=

  12. Structural Effect of Thioureas on the Detection of Chemical Warfare Agent Simulants.

    Science.gov (United States)

    Ha, Seonggyun; Lee, Minhe; Seo, Hyun Ook; Song, Sun Gu; Kim, Kyung-Su; Park, Chan Heum; Kim, Il Hee; Kim, Young Dok; Song, Changsik

    2017-08-25

    The ability to rapidly detect, identify, and monitor chemical warfare agents (CWAs) is imperative for both military and civilian defense. Since most CWAs and their simulants have an organophosphonate group, which is a hydrogen (H)-bond acceptor, many H-bond donors have been developed to effectively bind to the organophosphonate group. Although thioureas have been actively studied as an organocatalyst, they are relatively less investigated in CWA detection. In addition, there is a lack of studies on the structure-property relationship for gas phase detection. In this study, we synthesized various thioureas of different chemical structures, and tested them for sensing dimethylmethylphosphonate (DMMP), a CWA simulant. Molecular interaction between DMMP and thiourea was measured by 1 H NMR titration and supported by density functional theory (DFT) calculations. Strong H-bond donor ability of thiourea may cause self-aggregation, and CH-π interaction can play an important role in the DMMP detection. Gas-phase adsorption of DMMP was also measured using a quartz crystal microbalance (QCM) and analyzed using the simple Langmuir isotherm, showing the importance of structure-induced morphology of thioureas on the surface.

  13. Healthcare and warfare. Medical space, mission and apartheid in twentieth century northern Namibia.

    Science.gov (United States)

    Nord, Catharina

    2014-07-01

    In the year 1966, the first government hospital, Oshakati hospital, was inaugurated in northern South-West Africa. It was constructed by the apartheid regime of South Africa which was occupying the territory. Prior to this inauguration, Finnish missionaries had, for 65 years, provided healthcare to the indigenous people in a number of healthcare facilities of which Onandjokwe hospital was the most important. This article discusses these two agents' ideological standpoints. The same year, the war between the South-West African guerrillas and the South African state started, and continued up to 1988. The two hospitals became involved in the war; Oshakati hospital as a part of the South African war machinery, and Onandjokwe hospital as a 'terrorist hospital' in the eyes of the South Africans. The missionary Onandjokwe hospital was linked to the Lutheran church in South-West Africa, which became one of the main critics of the apartheid system early in the liberation war. Warfare and healthcare became intertwined with apartheid policies and aggression, materialised by healthcare provision based on strategic rationales rather than the people's healthcare needs. When the Namibian state took over a ruined healthcare system in 1990, the two hospitals were hubs in a healthcare landscape shaped by missionary ambitions, war and apartheid logic.

  14. Trade, Diplomacy, and Warfare: The Quest for Elite Rhizobia Inoculant Strains

    Directory of Open Access Journals (Sweden)

    Alice Checcucci

    2017-11-01

    Full Text Available Rhizobia form symbiotic nitrogen-fixing nodules on leguminous plants, which provides an important source of fixed nitrogen input into the soil ecosystem. The improvement of symbiotic nitrogen fixation is one of the main challenges facing agriculture research. Doing so will reduce the usage of chemical nitrogen fertilizer, contributing to the development of sustainable agriculture practices to deal with the increasing global human population. Sociomicrobiological studies of rhizobia have become a model for the study of the evolution of mutualistic interactions. The exploitation of the wide range of social interactions rhizobia establish among themselves, with the soil and root microbiota, and with the host plant, could constitute a great advantage in the development of a new generation of highly effective rhizobia inoculants. Here, we provide a brief overview of the current knowledge on three main aspects of rhizobia interaction: trade of fixed nitrogen with the plant; diplomacy in terms of communication and possible synergistic effects; and warfare, as antagonism and plant control over symbiosis. Then, we propose new areas of investigation and the selection of strains based on the combination of the genetic determinants for the relevant rhizobia symbiotic behavioral phenotypes.

  15. China’s Three Warfares Strategy Mitigates Fallout From Cyber Espionage Activities

    Directory of Open Access Journals (Sweden)

    Emilio Iasiello

    2016-06-01

    Full Text Available China is engaged in longstanding cyber espionage against the U.S., as well as other nations, to collect sensitive public and private information in support of national objectives laid out in its 12th Five Year Plan. Foreign governments citing China’s malfeasance have rebuked these activities, a claim vehemently denied by Beijing. In response, China is leveraging the “Three Warfares” an integrated three-prong information warfare strategy to combat these accusations by leveraging Media, Legal, and Psychological components designed to influence the international community. While the United States has threatened the imposition of economic sanctions, Beijing has successfully parried consequential actions by arresting U.S.-identified hackers, thereby demonstrating its commitment toward preserving a stable and peaceful cyberspace. These interrelated “Three Warfares” disciplines have targeted the cognitive processes of the U.S. leadership, as well as the international public’s perception of China as a global threat, thereby having successfully forestalled the implementation of any effective punitive or economic deterrence strategy to include the imposition of cyber sanctions.

  16. Virtual Warfare: Masculinity, Sexuality, and Propaganda in the Russo-Ukrainian War

    Directory of Open Access Journals (Sweden)

    Maryna Romanets

    2017-03-01

    Full Text Available This paper explores the intersection of sexual and political discourses as a particular aspect of the body politics that Russia has employed, among other strategies, in its massive propaganda offensive during the hybrid warfare against Ukraine.While recognizing sexuality as one of the mainstream concepts in political analysis, the paper draws on sexually explicit imagery and idiom used in Russian social media, and public discursive space in general, as propaganda techniques, and maps their “genealogy” within wider sociocultural and political contexts. Being conceptualized in terms of Russian hegemonic masculinity in relation to subordinated femininity and non-hegemonic masculinities of its adversarial others, these setups reveal how sexuality constitutes uneven and contradictory nexuses of power once being co-opted by Putin’s propaganda machine. It is noteworthy that Russia’s neo-imperial discursive tactics of homologizing sexual and political dominance—when supplemented with the official rhetoric of restituting Russia as a great power, Orthodox Christian fundamentalism as an integral part of Russian unique “state-civilization,” state-sanctioned homophobia, and traditional macho gender ideology—contribute quite effectively to sustaining public support in Russia for aggression against Ukraine in the process of Russian reimperialization of the former Soviet space.

  17. Trade, Diplomacy, and Warfare: The Quest for Elite Rhizobia Inoculant Strains.

    Science.gov (United States)

    Checcucci, Alice; DiCenzo, George C; Bazzicalupo, Marco; Mengoni, Alessio

    2017-01-01

    Rhizobia form symbiotic nitrogen-fixing nodules on leguminous plants, which provides an important source of fixed nitrogen input into the soil ecosystem. The improvement of symbiotic nitrogen fixation is one of the main challenges facing agriculture research. Doing so will reduce the usage of chemical nitrogen fertilizer, contributing to the development of sustainable agriculture practices to deal with the increasing global human population. Sociomicrobiological studies of rhizobia have become a model for the study of the evolution of mutualistic interactions. The exploitation of the wide range of social interactions rhizobia establish among themselves, with the soil and root microbiota, and with the host plant, could constitute a great advantage in the development of a new generation of highly effective rhizobia inoculants. Here, we provide a brief overview of the current knowledge on three main aspects of rhizobia interaction: trade of fixed nitrogen with the plant; diplomacy in terms of communication and possible synergistic effects; and warfare, as antagonism and plant control over symbiosis. Then, we propose new areas of investigation and the selection of strains based on the combination of the genetic determinants for the relevant rhizobia symbiotic behavioral phenotypes.

  18. Explosives and chemical warfare agents - detection and analysis with PTR-MS

    Energy Technology Data Exchange (ETDEWEB)

    Sulzer, Philipp; Juerschik, Simone; Jaksch, Stefan; Jordan, Alfons; Hanel, Gernot; Hartungen, Eugen; Seehauser, Hans; Maerk, Lukas; Haidacher, Stefan; Schottkowsky, Ralf [IONICON Analytik GmbH, Innsbruck (Austria); Petersson, Fredrik [Institut fuer Ionenphysik und Angewandte Physik, Leopold-Franzens Universitaet Innsbruck (Austria); Maerk, Tilmann [IONICON Analytik GmbH, Innsbruck (Austria); Institut fuer Ionenphysik und Angewandte Physik, Leopold-Franzens Universitaet Innsbruck (Austria)

    2010-07-01

    We utilized a recently developed high sensitivity PTR-MS instrument equipped with a high resolution time-of-flight mass analyzer for detailed investigations on explosives and chemical warfare agents (CWAs). We show that with this so called PTR-TOF 8000 it is possible to identify solid explosives (RDX, TNT, HMX, PETN and Semtex A) by analyzing the headspace above small quantities of samples at room temperature and from trace quantities not visible to the naked eye placed on surfaces. As the mentioned solid explosives possess very low vapor pressures, the main challenge for detecting them in the gas phase is to provide an instrument with a sufficient sensitivity. CWAs on the other side have very high vapor pressures but are difficult to identify unambiguously as their nominal molecular masses are usually comparably small and therefore hard to distinguish from harmless everyday-compounds (e.g. mustard gas: 159 g/mol). In the present work we demonstrate that we can detect a broad range of dangerous substances, ranging from the CWA mustard gas to the explosive HMX.

  19. Social networks as a new tool of information warfare in the modern world

    Directory of Open Access Journals (Sweden)

    B. W. Kovalevych

    2014-03-01

    Full Text Available With the rapid development of information technologies, especially the Internet, people are becoming increasingly dependent on information that surrounds them. And social networks, where a person spends most of their time, become the ideal instruments of influence on the people consciousness and information warfare. Due to psychological factors ( such as ‘spiral of silence’, the herd instinct, the entire credibility of published information, opinion leaders, the desire for self­realization or replacement of reality that influence the human behavior in the network and the use of models of influence (model of network attack, model of involving users as volunteers, total block model, social networks become a platform for the dissemination of political ideas, ideologies and implementation of the ‘color revolutions’. However, social media play a positive role, especially in the establishment of civil society and the free flow of information. Positive or negative impact of networks primary depends on the purpose of use of social networking tools.

  20. Between Female Dialogics and Traces of Essentialism: Gender and Warfare in Christa Wolf's Major Writings

    Directory of Open Access Journals (Sweden)

    Sabine Wilke

    1993-06-01

    Full Text Available The relationship between memory, writing, and the question of how we define ourselves as gendered subjects is at the center of Christa Wolf's work. Her literary production, starting in the late fifties with a rather naive and un-selfconscious love story, has undergone a dramatic shift. In her more recent texts, Wolf sets out to rewrite classical mythology to make us aware of those intersections in the history of Western civilization at which women were made economically and psychologically into objects. The present essay seeks to locate Christa Wolf's evolving conception of gender and warfare within the contemporary theoretical discussion on identity and the subject sketched briefly above. While of late there has been a wealth of studies into the construction of gender in particular works by Wolf, no scholarly contribution has yet addressed the range of answers regarding those questions in her overall oeuvre. I will argue that whereas Wolf's earlier works present a dialogic conception of gender, her later narratives more and more expound a notion of the essentially more peaceful female subject that is counterposed to the essentially warloving male. In these works "female subjectivity is taken to be capable of articulating itself fully in its radical otherness outside of male discourse," which seems to support ideas of an ontological essence of "woman."

  1. Chemical warfare agent detection in complex environments with comprehensive two-dimensional gas chromatography

    Science.gov (United States)

    Reichenbach, Stephen E.; Ni, Mingtian; Kottapalli, Visweswara; Visvanathan, Arvind; Ledford, Edward B., Jr.; Oostdijk, John; Trap, Henk C.

    2003-08-01

    Comprehensive two-dimensional gas chromatography (GCxGC) is an emerging technology for chemical separation that provides an order-of-magnitude increase in separation capacity over traditional gas chromatography. GCxGC separates chemical species with two capillary columns interfaced by two-stage thermal desorption. Because GCxGC is comprehensive and has high separation capacity, it can perform multiple traditional analytical methods with a single analysis. GCxGC has great potential for a wide variety of environmental sensing applications, including detection of chemical warfare agents (CWA) and other harmful chemicals. This paper demonstrates separation of nerve agents sarin and soman from a matrix of gasoline and diesel fuel. Using a combination of an initial column separating on the basis of boiling point and a second column separating on the basis of polarity, GCxGC clearly separates the nerve agents from the thousands of other chemicals in the sample. The GCxGC data is visualized, processed, and analyzed as a two-dimensional digital image using a software system for GCxGC image processing developed at the University of Nebraska - Lincoln.

  2. Chemical Warfare Agent Surface Adsorption: Hydrogen Bonding of Sarin and Soman to Amorphous Silica.

    Science.gov (United States)

    Davis, Erin Durke; Gordon, Wesley O; Wilmsmeyer, Amanda R; Troya, Diego; Morris, John R

    2014-04-17

    Sarin and soman are warfare nerve agents that represent some of the most toxic compounds ever synthesized. The extreme risk in handling such molecules has, until now, precluded detailed research into the surface chemistry of agents. We have developed a surface science approach to explore the fundamental nature of hydrogen bonding forces between these agents and a hydroxylated surface. Infrared spectroscopy revealed that both agents adsorb to amorphous silica through the formation of surprisingly strong hydrogen-bonding interactions with primarily isolated silanol groups (SiOH). Comparisons with previous theoretical results reveal that this bonding occurs almost exclusively through the phosphoryl oxygen (P═O) of the agent. Temperature-programmed desorption experiments determined that the activation energy for hydrogen bond rupture and desorption of sarin and soman was 50 ± 2 and 52 ± 2 kJ/mol, respectively. Together with results from previous studies involving other phosphoryl-containing molecules, we have constructed a detailed understanding of the structure-function relationship for nerve agent hydrogen bonding at the gas-surface interface.

  3. Chitin Degradation In Marine Bacteria

    DEFF Research Database (Denmark)

    Paulsen, Sara; Machado, Henrique; Gram, Lone

    2015-01-01

    Introduction: Chitin is the most abundant polymer in the marine environment and the second most abundant in nature. Chitin does not accumulate on the ocean floor, because of microbial breakdown. Chitin degrading bacteria could have potential in the utilization of chitin as a renewable carbon...... and nitrogen source in the fermentation industry.Methods: Here, whole genome sequenced marine bacteria were screened for chitin degradation using phenotypic and in silico analyses.Results: The in silico analyses revealed the presence of three to nine chitinases in each strain, however the number of chitinases...... chitin regulatory system.Conclusions: This study has provided insight into the ecology of chitin degradation in marine bacteria. It also served as a basis for choosing a more efficient chitin degrading production strain e.g. for the use of chitin waste for large-scale fermentations....

  4. Methylotrophic bacteria in sustainable agriculture.

    Science.gov (United States)

    Kumar, Manish; Tomar, Rajesh Singh; Lade, Harshad; Paul, Diby

    2016-07-01

    Excessive use of chemical fertilizers to increase production from available land has resulted in deterioration of soil quality. To prevent further soil deterioration, the use of methylotrophic bacteria that have the ability to colonize different habitats, including soil, sediment, water, and both epiphytes and endophytes as host plants, has been suggested for sustainable agriculture. Methylotrophic bacteria are known to play a significant role in the biogeochemical cycle in soil ecosystems, ultimately fortifying plants and sustaining agriculture. Methylotrophs also improve air quality by using volatile organic compounds such as dichloromethane, formaldehyde, methanol, and formic acid. Additionally, methylotrophs are involved in phosphorous, nitrogen, and carbon cycling and can help reduce global warming. In this review, different aspects of the interaction between methylotrophs and host plants are discussed, including the role of methylotrophs in phosphorus acquisition, nitrogen fixation, phytohormone production, iron chelation, and plant growth promotion, and co-inoculation of these bacteria as biofertilizers for viable agriculture practices.

  5. Probiotic bacteria in dairy products

    OpenAIRE

    KORANDOVÁ, Květa

    2012-01-01

    Probiotic microorganisms are live organisms that facilitate optimal composition of intestinal flora. The thesis deals with the positive influence of probiotic microorganisms on human health. It describes the most frequently used bacteria family, which includes Lactobacillus, Lactococcus, Streptococcus and Bifidobacterium. The thesis also deals with health, microbiologic and technological requirements necessary for probiotic effectiveness. It offers an overview of characteristics of products c...

  6. Biofilms: Community Behavior by Bacteria

    Indian Academy of Sciences (India)

    IAS Admin

    ment of Microbiology and. Cell Biology, Indian. Institute of Science. Her laboratory is interested in host–pathogen interaction and understanding the survival strategies of pathogens. Biofilm is a lifestyle exhibited by bacteria. This is an intricate process that involves cell–cell communication which leads to the regulation of ...

  7. ENDOSPORES OF THERMOPHILIC FERMENTATIVE BACTERIA

    DEFF Research Database (Denmark)

    Volpi, Marta

    2016-01-01

    solely based on endospores of sulphate-reducing bacteria (SRB), which presumably constitute only a small fraction of the total thermophilic endospore community reaching cold environments. My PhD project developed an experimental framework for using thermophilic fermentative endospores (TFEs) to trace...

  8. Programmed survival of soil bacteria

    DEFF Research Database (Denmark)

    Jensen, Lars Bogø; Molin, Søren; Sternberg, Claus

    Biological containment systems have been developed for Pseudomonas putida and related soil bacteria. The systems are based on combinations of lethal genes and regulated gene expression. Two types of killing function have been employed: 1) A membrane protein interfering with the membrane potential...

  9. Synthetic Biology in Streptomyces Bacteria

    NARCIS (Netherlands)

    Medema, Marnix H.; Breitling, Rainer; Takano, Eriko

    2011-01-01

    Actinomycete bacteria of the genus Streptomyces are major producers of bioactive compounds for the biotechnology industry. They are the source of most clinically used antibiotics, as well as of several widely used drugs against common diseases, including cancer . Genome sequencing has revealed that

  10. Deodorant bacteria; Des bacteries desodorisantes

    Energy Technology Data Exchange (ETDEWEB)

    Fanlo, J.L. [Ecole Nationale Superieure des Mines, 30 - Ales (France)

    1998-02-01

    Purifying bacteria: if this concept is not new, its application to gases cleansing has only been developed recently. This method allows to eliminate the volatile organic compounds and the gaseous effluents odors which come from industrial sites. Three bioreactors types exist at the present time. Their principles are explained. (O.M.) 6 refs.

  11. Manipulating Genetic Material in Bacteria

    Science.gov (United States)

    1998-01-01

    Lisa Crawford, a graduate research assistant from the University of Toledo, works with Laurel Karr of Marshall Space Flight Center (MSFC) in the molecular biology laboratory. They are donducting genetic manipulation of bacteria and yeast for the production of large amount of desired protein. Photo credit: NASA/Marshall Space Flight Center (MSFC)

  12. Functional genomics of intracellular bacteria.

    Science.gov (United States)

    de Barsy, Marie; Greub, Gilbert

    2013-07-01

    During the genomic era, a large amount of whole-genome sequences accumulated, which identified many hypothetical proteins of unknown function. Rapidly, functional genomics, which is the research domain that assign a function to a given gene product, has thus been developed. Functional genomics of intracellular pathogenic bacteria exhibit specific peculiarities due to the fastidious growth of most of these intracellular micro-organisms, due to the close interaction with the host cell, due to the risk of contamination of experiments with host cell proteins and, for some strict intracellular bacteria such as Chlamydia, due to the absence of simple genetic system to manipulate the bacterial genome. To identify virulence factors of intracellular pathogenic bacteria, functional genomics often rely on bioinformatic analyses compared with model organisms such as Escherichia coli and Bacillus subtilis. The use of heterologous expression is another common approach. Given the intracellular lifestyle and the many effectors that are used by the intracellular bacteria to corrupt host cell functions, functional genomics is also often targeting the identification of new effectors such as those of the T4SS of Brucella and Legionella.

  13. Biofilms: Community Behavior by Bacteria

    Indian Academy of Sciences (India)

    IAS Admin

    phenotypically planktonic bacteria, leaving behind an empty colony. Dispersal is usually ... dental plaque biofilms includes a series of steps that begins with the initial colonization of the pellicle and ends with the complex formation ... treated by the biofilm method (activated sludge) is very effective. Biofilms can also be used ...

  14. Automated radiometric detection of bacteria

    International Nuclear Information System (INIS)

    Waters, J.R.

    1974-01-01

    A new radiometric method called BACTEC, used for the detection of bacteria in cultures or in supposedly sterile samples, was discussed from the standpoint of methodology, both automated and semi-automated. Some of the results obtained so far were reported and some future applications and development possibilities were described. In this new method, the test sample is incubated in a sealed vial with a liquid culture medium containing a 14 C-labeled substrate. If bacteria are present, they break down the substrate, producing 14 CO 2 which is periodically extracted from the vial as a gas and is tested for radioactivity. If this gaseous radioactivity exceeds a threshold level, it is evidence of bacterial presence and growth in the test vial. The first application was for the detection of bacteria in the blood cultures of hospital patients. Data were presented showing typical results. Also discussed were future applications, such as rapid screening for bacteria in urine industrial sterility testing and the disposal of used 14 C substrates. (Mukohata, S.)

  15. Alternative sources of Legionella bacteria

    NARCIS (Netherlands)

    van Heijnsbergen, H.H.L.

    2017-01-01

    Legionella bacteria can cause Legionnaires’ disease (LD) in humans. Symptoms of LD can range from mild disease to severe pneumonia with sometimes fatal outcome. In the Netherlands, the most important infective agent is Legionella pneumophila. L. pneumophila infection is associated with aquatic

  16. Fuzzy species among recombinogenic bacteria

    Directory of Open Access Journals (Sweden)

    Fraser Christophe

    2005-03-01

    Full Text Available Abstract Background It is a matter of ongoing debate whether a universal species concept is possible for bacteria. Indeed, it is not clear whether closely related isolates of bacteria typically form discrete genotypic clusters that can be assigned as species. The most challenging test of whether species can be clearly delineated is provided by analysis of large populations of closely-related, highly recombinogenic, bacteria that colonise the same body site. We have used concatenated sequences of seven house-keeping loci from 770 strains of 11 named Neisseria species, and phylogenetic trees, to investigate whether genotypic clusters can be resolved among these recombinogenic bacteria and, if so, the extent to which they correspond to named species. Results Alleles at individual loci were widely distributed among the named species but this distorting effect of recombination was largely buffered by using concatenated sequences, which resolved clusters corresponding to the three species most numerous in the sample, N. meningitidis, N. lactamica and N. gonorrhoeae. A few isolates arose from the branch that separated N. meningitidis from N. lactamica leading us to describe these species as 'fuzzy'. Conclusion A multilocus approach using large samples of closely related isolates delineates species even in the highly recombinogenic human Neisseria where individual loci are inadequate for the task. This approach should be applied by taxonomists to large samples of other groups of closely-related bacteria, and especially to those where species delineation has historically been difficult, to determine whether genotypic clusters can be delineated, and to guide the definition of species.

  17. Travelers' Health: Animal-Associated Hazards

    Science.gov (United States)

    ... Ticks, & Other Arthropods section earlier in this chapter. Marine Animals Most marine animals are generally harmless unless ... risk to humans. Some animals such as poultry, reptiles, and goats carry human pathogens as normal gut ...

  18. COPD assessment test (CAT): simple tool for evaluating quality of life of chemical warfare patients with chronic obstructive pulmonary disease.

    Science.gov (United States)

    Lari, Shahrzad M; Ghobadi, Hassan; Attaran, Davood; Mahmoodpour, Afsoun; Shadkam, Omid; Rostami, Maryam

    2014-01-01

    Chronic obstructive pulmonary disease (COPD) is one of the serious late pulmonary complications caused by sulphur mustard exposure. Health status evaluations of chemical warfare patients with COPD are important to the management of these patients. The aim of this study was to determine the efficacy of the COPD assessment test (CAT) in evaluating the health-related quality of life (HRQOL) of chemical warfare patients with COPD. Eighty-two consecutive patients with stable COPD were enrolled in this study. All subjects were visited by one physician, and the HRQOL was evaluated by the CAT and St. George Respiratory Questionnaires (SGRQs). In addition, a standard spirometry test, 6-min walk distance test and pulse oxymetry were conducted. The severity of the COPD was determined using Global Initiative for Chronic Obstructive Lung Disease (GOLD) staging and the body mass index, obstruction, dyspnoea and exercise (BODE) index. The mean age of the patients was 47.30 ± 7.08 years. The mean CAT score was 26.03 ± 8.28. Thirty-five (43%) patients were in CAT stage 3. There were statistically significant correlations between the CAT and the SGRQ (r = 0.70, P = 0.001) and the BODE index (r = 0.70, P = 0.001). A statistically significant inverse correlation was found between the CAT score and the forced expiratory volume in 1 s (r = -0.30, P = 0.03). Our results demonstrated that the CAT is a simple and valid tool for assessment of HRQOL in chemical warfare patients with COPD and can be used in clinical practice. © 2013 John Wiley & Sons Ltd.

  19. Treatment of chemical warfare agents by zero-valent iron nanoparticles and ferrate(VI)/(III) composite

    Energy Technology Data Exchange (ETDEWEB)

    Zboril, Radek, E-mail: zboril@prfnw.upol.cz [Regional Centre of Advanced Technologies and Materials, Departments of Physical Chemistry and Experimental Physics, 17. listopadu 1192/12, 771 46 Olomouc (Czech Republic); Andrle, Marek; Oplustil, Frantisek [Military Institute VOP-026 Sternberk, Division in Brno, Rybkova 8, 602 00 Brno (Czech Republic); Machala, Libor; Tucek, Jiri; Filip, Jan; Marusak, Zdenek [Regional Centre of Advanced Technologies and Materials, Departments of Physical Chemistry and Experimental Physics, 17. listopadu 1192/12, 771 46 Olomouc (Czech Republic); Sharma, Virender K., E-mail: vsharma@fit.edu [Chemistry Department, Florida Institute of Technology, 150 West University Boulevard, Melbourne, FL 32901 (United States); Center of Ferrate Excellence, Florida Institute of Technology, 150 West University Boulevard, Melbourne, FL 32901 (United States)

    2012-04-15

    Highlights: Black-Right-Pointing-Pointer Ferrate(VI) has been found to be highly efficient to decontaminate chemical warfare agents. Black-Right-Pointing-Pointer Fast degradation of sulfur mustard, soman and compound VX by ferrate(VI). Black-Right-Pointing-Pointer Nanoscale zero-valent iron particles are considerably less efficient in degradation of studied warfare agents compared to ferrate(VI). - Abstract: Nanoscale zero-valent iron (nZVI) particles and a composite containing a mixture of ferrate(VI) and ferrate(III) were prepared by thermal procedures. The phase compositions, valence states of iron, and particle sizes of iron-bearing compounds were determined by combination of X-ray powder diffraction, Moessbauer spectroscopy and scanning electron microscopy. The applicability of these environmentally friendly iron based materials in treatment of chemical warfare agents (CWAs) has been tested with three representative compounds, sulfur mustard (bis(2-chlorethyl) sulfide, HD), soman ((3,3 Prime -imethylbutan-2-yl)-methylphosphonofluoridate, GD), and O-ethyl S-[2-(diisopropylamino)ethyl] methylphosphonothiolate (VX). Zero-valent iron, even in the nanodimensional state, had a sluggish reactivity with CWAs, which was also observed in low degrees of CWAs degradation. On the contrary, ferrate(VI)/(III) composite exhibited a high reactivity and complete degradations of CWAs were accomplished. Under the studied conditions, the estimated first-order rate constants ({approx}10{sup -2} s{sup -1}) with the ferrate(VI)/(III) composite were several orders of magnitude higher than those of spontaneous hydrolysis of CWAs (10{sup -8}-10{sup -6} s{sup -1}). The results demonstrated that the oxidative technology based on application of ferrate(VI) is very promising to decontaminate CWAs.

  20. Treatment of chemical warfare agents by zero-valent iron nanoparticles and ferrate(VI)/(III) composite

    International Nuclear Information System (INIS)

    Zboril, Radek; Andrle, Marek; Oplustil, Frantisek; Machala, Libor; Tucek, Jiri; Filip, Jan; Marusak, Zdenek; Sharma, Virender K.

    2012-01-01

    Highlights: ► Ferrate(VI) has been found to be highly efficient to decontaminate chemical warfare agents. ► Fast degradation of sulfur mustard, soman and compound VX by ferrate(VI). ► Nanoscale zero-valent iron particles are considerably less efficient in degradation of studied warfare agents compared to ferrate(VI). - Abstract: Nanoscale zero-valent iron (nZVI) particles and a composite containing a mixture of ferrate(VI) and ferrate(III) were prepared by thermal procedures. The phase compositions, valence states of iron, and particle sizes of iron-bearing compounds were determined by combination of X-ray powder diffraction, Mössbauer spectroscopy and scanning electron microscopy. The applicability of these environmentally friendly iron based materials in treatment of chemical warfare agents (CWAs) has been tested with three representative compounds, sulfur mustard (bis(2-chlorethyl) sulfide, HD), soman ((3,3′-imethylbutan-2-yl)-methylphosphonofluoridate, GD), and O-ethyl S-[2-(diisopropylamino)ethyl] methylphosphonothiolate (VX). Zero-valent iron, even in the nanodimensional state, had a sluggish reactivity with CWAs, which was also observed in low degrees of CWAs degradation. On the contrary, ferrate(VI)/(III) composite exhibited a high reactivity and complete degradations of CWAs were accomplished. Under the studied conditions, the estimated first-order rate constants (∼10 −2 s −1 ) with the ferrate(VI)/(III) composite were several orders of magnitude higher than those of spontaneous hydrolysis of CWAs (10 −8 –10 −6 s −1 ). The results demonstrated that the oxidative technology based on application of ferrate(VI) is very promising to decontaminate CWAs.

  1. Information Warfare-Worthy Jamming Attack Detection Mechanism for Wireless Sensor Networks Using a Fuzzy Inference System

    Directory of Open Access Journals (Sweden)

    Sudip Misra

    2010-04-01

    Full Text Available The proposed mechanism for jamming attack detection for wireless sensor networks is novel in three respects: firstly, it upgrades the jammer to include versatile military jammers; secondly, it graduates from the existing node-centric detection system to the network-centric system making it robust and economical at the nodes, and thirdly, it tackles the problem through fuzzy inference system, as the decision regarding intensity of jamming is seldom crisp. The system with its high robustness, ability to grade nodes with jamming indices, and its true-detection rate as high as 99.8%, is worthy of consideration for information warfare defense purposes.

  2. The Dragon and the Computer: Why Intellectual Property Theft is Compatible with Chinese Cyber-Warfare Doctrine

    OpenAIRE

    Shakarian, Paulo; Shakarian, Jana; Ruef, Andrew

    2013-01-01

    Along with the USA and Russia, China is often considered one of the leading cyber-powers in the world. In this excerpt, we explore how Chinese military thought, developed in the 1990s, influenced their cyber-operations in the early 2000s. In particular, we examine the ideas of "Unrestricted Warfare" and "Active Offense" and discuss how they can permit for the theft of intellectual property. We then specifically look at how the case study of Operation Aurora, a cyber-operation directed against...

  3. Modern warfare as a significant form of zoogeomorphic disturbance upon the landscape

    Science.gov (United States)

    Hupy, Joseph P.; Koehler, Thomas

    2012-07-01

    The damage exerted by warfare on the physical landscape is one, of many, anthropogenic impacts upon the environment. Bombturbation is a term that describes the impacts of explosive munitions upon the landscape. Bombturbation, like many other forms of zoogeomorphology, is a disruptive force, capable of moving large amounts of sediments, and denuding landscapes to the point where changes in micro and mesotopography have long-term implications. The long term implication of bombturbative actions depends on the type and duration of explosive device that rendered the disturbance, and the geographic context of the landscape disturbed; i.e. cultural and physical factors. Recovery from bombturbative activity, in the context of this research, is measured by vegetative regrowth and soil development in cratered disturbances. A comparison and contrast between the two battlefields of Verdun, France and Khe Sanh, Vietnam show that bombturbative actions have significantly altered the topography at each location, thus influencing surface runoff and processes of soil development. Principals of the Runge pedogenic model, or the energy of water moving through the soil profile, best explain how the varying climate and parent material at each location influence post disturbance soil development rates. Whereas the data collected at Verdun suggest that explosive munitions have put that landscape on diverging path of development, thus rendering it much different post-disturbance landscape, Khe Sanh displays much different recovery patterns. Preliminary research at Khe Sanh indicates that reforestation and soil development following disturbance are not so much influenced by bombturbative patterns as land use activities in the area of study.

  4. Application of the MASH v1.0 Code System to radiological warfare radiation threats

    International Nuclear Information System (INIS)

    Johnson, J.O.; Santoro, R.T.; Smith, M.S.

    1994-01-01

    Nuclear hardening capabilities of US and foreign ground force systems is a primary concern of the Department of Defense (DoD) and US Army. The Monte Carlo Adjoint Shielding Code System -- MASH v1.0 was developed at Oak Ridge National Laboratory (ORNL) to analyze these capabilities, i.e. the shielding effectiveness, for prompt radiation from a nuclear weapon detonation. Rapidly changing world events and the proliferation of nuclear weapons related technology have increased the kinds of nuclear threats to include intentionally dispersed radiation sources and fallout from tactical nuclear weapons used in the modern AirLand battlefield scenario. Consequently, a DoD area of increasing interest focuses on determining the shielding effectiveness of foreign and US armored vehicles to radiological warfare and fallout radiation threats. To demonstrate the applicability of MASH for analyzing dispersed radiation source problems, calculations have been completed for two distributed sources; a dispersed radiation environment simulated by a uniformly distributed 60 Co source, and a 235 U fission weapon fallout source. Fluence and dose assessments were performed for the free-field, the inside of a steel-walled two-meter box, in a phantom standing in the free-field, and in a phantom standing in the two-meter box. The results indicate substantial radiation protection factors for the 60 Co dispersed radiation source and the fallout source compared to the prompt radiation protection factors. The dose protection factors ranged from 40 to 95 for the two-meter box and from 55 to 123 for the mid-gut position of the phantom standing in the box. The results further indicate that a 60 Co source might be a good first order approximation for a tactical fission weapon fallout protection factor analysis

  5. Locus-specific microemulsion catalysts for sulfur mustard (HD) chemical warfare agent decontamination.

    Science.gov (United States)

    Fallis, Ian A; Griffiths, Peter C; Cosgrove, Terence; Dreiss, Cecile A; Govan, Norman; Heenan, Richard K; Holden, Ian; Jenkins, Robert L; Mitchell, Stephen J; Notman, Stuart; Platts, Jamie A; Riches, James; Tatchell, Thomas

    2009-07-22

    The rates of catalytic oxidative decontamination of the chemical warfare agent (CWA) sulfur mustard (HD, bis(2-chlororethyl) sulfide) and a range (chloroethyl) sulfide simulants of variable lipophilicity have been examined using a hydrogen peroxide-based microemulsion system. SANS (small-angle neutron scattering), SAXS (small-angle X-ray scattering), PGSE-NMR (pulsed-gradient spin-echo NMR), fluorescence quenching, and electrospray mass spectroscopy (ESI-MS) were implemented to examine the distribution of HD, its simulants, and their oxidation/hydrolysis products in a model oil-in-water microemulsion. These measurements not only present a means of interpreting decontamination rates but also a rationale for the design of oxidation catalysts for these toxic materials. Here we show that by localizing manganese-Schiff base catalysts at the oil droplet-water interface or within the droplet core, a range of (chloroethyl) sulfides, including HD, spanning some 7 orders of octanol-water partition coefficient (K(ow)), may be oxidized with equal efficacy using dilute (5 wt. % of aqueous phase) hydrogen peroxide as a noncorrosive, environmentally benign oxidant (e.g., t(1/2) (HD) approximately 18 s, (2-chloroethyl phenyl sulfide, C(6)H(5)SCH(2)CH(2)Cl) approximately 15 s, (thiodiglycol, S(CH(2)CH(2)OH)(2)) approximately 19 s {20 degrees C}). Our observations demonstrate that by programming catalyst lipophilicity to colocalize catalyst and substrate, the inherent compartmentalization of the microemulsion can be exploited to achieve enhanced rates of reaction or to exert control over product selectivity. A combination of SANS, ESI-MS and fluorescence quenching measurements indicate that the enhanced catalytic activity is due to the locus of the catalyst and not a result of partial hydrolysis of the substrate.

  6. The use of advanced simulation in the training of anesthesiologists to treat chemical warfare casualties.

    Science.gov (United States)

    Berkenstadt, Haim; Ziv, Amitai; Barsuk, Daphna; Levine, Inbal; Cohen, Amir; Vardi, Amir

    2003-06-01

    Training anesthesiologists to treat nerve gas intoxication in a mass casualty scenario is a complicated task. The scenario is an unfamiliar medical situation involving the need to decontaminate patients before providing definitive medical treatment, and the need for physical protection to the medical team before decontamination. We describe the development of a simulation-based training program. In one site of a virtual hospital, anesthesiologists were trained in initial airway and breathing resuscitation before decontamination while wearing full protective gear. In another site, they were trained in the treatment of critically-ill patients with combined conventional and chemical injuries or severe intoxication. Intubation simulators of newborn, pediatric, and adult patients, advanced full-scale simulators, and actors simulating patients were used. Initial airway, breathing, and antidotal treatment were performed successfully, with or without full protective gear. The gas mask did not interfere with orotracheal intubation, but limited effective communication within the medical team. Chemical protective gloves were the limiting factor in the performance of medical tasks such as fixing the orotracheal tube. Twenty-two participants (88%) pointed out that the simulated cases represented realistic problems in this scenario, and all 25 participants found the simulated-based training superior to previous traditional training they had in this field. Using advanced simulation, we were able to train anesthesiologists to treat nerve gas intoxication casualties and to learn about the limitations of providing medical care in this setting. Advanced medical simulation can be used to train anesthesiologists to treat nonconventional warfare casualties. The limitations of medical performance in full protective gear can be learned from this training.

  7. Computed Tomography Imaging findings in Chemical Warfare Victims with pulmonary Complications

    Directory of Open Access Journals (Sweden)

    Zahra Salehinezhad

    2013-05-01

    Full Text Available Introduction: Data on imaging findings in pulmonary complications of chemical agents is scarce. The current study aimed to evaluate radiological findings of late onset pulmonary complications in chemical warfare victims (CWV and to guide pulmonologists in diagnosis of these subjects. Materials and Methods: Ninety- three male CWV were enrolled in this prospective study, 20-25 years (mean=23 after exposure. Demographic and clinical data were recorded. High resolution computed Tomography (HRCT of the lung was performed during inspiration and expiration and was double reported blindly by two radiologists. Final diagnosis was made according to HRCT findings. The HRCT findings, final diagnosis, and distribution of the abnormalities were compared between subjects whom had been exposed to more complex chemical agents used during the second half of the war and simpler agents during the first half. Results: The most frequent HRCT findings were air trapping (56.7% and mosaic attenuation (35.1%. The distribution of abnormalities was mostly local (79.4% and bilateral (73% especially in lower regions (61.3%. The diagnosed respiratory diseases included bronchiolitis obliterans (43%, chronic obstructive pulmonary disease (COPD (27.9%, asthma (23.6%, bronchiectasis (13.9% and interstitial lung disease (ILD (9.6%. Frequency of subjects involved in the second half of the period of war was more than the first period (P-value < 0.05 but the HRCT findings were similar. Conclusions: Bronchiolitis obliterans with picture of focal bilateral air trapping was the most common finding in CWV but asthma appeared to have become a new problem in these subjects.

  8. [Analytical and on-site detection methods for chemical warfare agents].

    Science.gov (United States)

    Seto, Yasuo

    2006-12-01

    Chemical warfare agents (CWAs) are fast acting and sometimes lethal, even at low levels, and can be classified into nerve gases, blister agents, choking agents, blood agents, vomit agents, tear gases, and incapacitating agents. As countermeasures against CWA terrorism, detection and identification are important. In crisis management, monitoring of CWAs in public places and security checks at territorial borders, big event venues, and executive facilities are performed for protection against terrorism. In consequence management, on-site detection by first responders and laboratory analysis after on-site sampling and transfer are performed for minimization of terrorism damage, leading to personal protection, initial investigation, and emergency lifesaving. In incident management, laboratory analysis is performed to provide evidence at court trials for the prevention of future crimes. Laboratory analysis consists of pretreatment of on-site and casualty samples and instrumental analysis using GC-MS. However, CWAs are easily degraded, and thus are difficult to detect. Instead, it is useful to detect their metabolites and degradation products using tert-butyldimethylsilyl derivatization GC-MS or direct LC-MS. Commercially available chemical detection equipment such as gas detection tubes and ion mobility spectrometers are used for on-site detection. We have evaluated the detection performance of such equipment and found that no equipment fulfills the required perfect performance of CWA detection sensitivity, accuracy, response time, return time, and operation. To overcome the drawbacks, we have adopted the monitoring tape method and counterflow introduction atmospheric pressure chemical ionization mass spectrometry and recommend the combination of commercial detection equipment and these new technologies for simultaneous, rapid detection of all CWAs.

  9. Drinking Water Fact Sheet: Coliform Bacteria

    OpenAIRE

    Mesner, Nancy; Daniels, Barbara

    2010-01-01

    This fact sheet provides information about coliform bacteria. Including sections about what coliform bacteria is, how it enters drinking water, health concerns from exposure, drinking water standards, and how to treat drinking water that contains coliforms.

  10. Killer Pigments in Bacteria: An Ecological Nightmare.

    Science.gov (United States)

    Benathen, Isaiah A.; Saccardi, Marion

    2000-01-01

    Describes an alternative to teaching ecology by using bacteria to test competitor survival. Students observe a time-dependent selective killing of other unrelated bacteria by Pseudomonas aeruginosa. (SAH)

  11. Viability of bacteria in peatlands

    Science.gov (United States)

    Bogdanova, O. Yu.; Golovchenko, A. V.; Lysak, L. V.; Glukhova, T. V.; Zvyagintsev, D. G.

    2014-04-01

    The viability of bacteria in oligotrofic bogs and fens was determined by the luminescent microscopy method with the help of a two-component fluorescent dye (L7012 LIVE/DEAD). Living bacterial cells were found in the entire peat profiles. Their portion was maximal (up to 60%) in the upper layers and did not exceed 25% in the lower layers. The portion of dead bacterial cells varied from 3 to 19%, and dormant cells constituted 25 to 95% of the total number of bacterial cells. The numbers of dormant cells increased down the profiles irrespectively of the peat type. The portion of nanoforms did not exceed 5% of the total. The cells of the nanoforms, unlike the bacteria of typical sizes, were characterized by their high viability (93-98%).

  12. Genetics of Lactic Acid Bacteria

    Science.gov (United States)

    Zagorec, Monique; Anba-Mondoloni, Jamila; Coq, Anne-Marie Crutz-Le; Champomier-Vergès, Marie-Christine

    Many meat (or fish) products, obtained by the fermentation of meat originating from various animals by the flora that naturally contaminates it, are part of the human diet since millenaries. Historically, the use of bacteria as starters for the fermentation of meat, to produce dry sausages, was thus performed empirically through the endogenous micro-biota, then, by a volunteer addition of starters, often performed by back-slopping, without knowing precisely the microbial species involved. It is only since about 50 years that well defined bacterial cultures have been used as starters for the fermentation of dry sausages. Nowadays, the indigenous micro-biota of fermented meat products is well identified, and the literature is rich of reports on the identification of lactic acid bacteria (LAB) present in many traditional fermented products from various geographical origin, obtained without the addition of commercial starters (See Talon, Leroy, & Lebert, 2007, and references therein).

  13. Copper resistance determinants in bacteria.

    Science.gov (United States)

    Brown, N L; Rouch, D A; Lee, B T

    1992-01-01

    Copper is an essential trace element that is utilized in a number of oxygenases and electron transport proteins, but it is also a highly toxic heavy metal, against which all organisms must protect themselves. Known bacterial determinants of copper resistance are plasmid-encoded. The mechanisms which confer resistance must be integrated with the normal metabolism of copper. Different bacteria have adopted diverse strategies for copper resistance, and this review outlines what is known about bacterial copper resistance mechanisms and their genetic regulation.

  14. Box-shaped halophilic bacteria.

    OpenAIRE

    Javor, B; Requadt, C; Stoeckenius, W

    1982-01-01

    Three morphologically similar strains of halophilic, box-shaped procaryotes have been isolated from brines collected in the Sinai, Baja California (Mexico), and southern California (United States). Although the isolates in their morphology resemble Walsby's square bacteria, which are a dominant morphological type in the Red Sea and Baja California brines, they are probably not identical to them. The cells show the general characteristics of extreme halophiles and archaebacteria. They contain ...

  15. Fungal inhibitory lactic acid bacteria

    OpenAIRE

    Ström, Katrin

    2005-01-01

    Lactic acid bacteria (LAB) are microorganisms that have been used for centuries to prepare and improve storage of food and for ensiling of different crops for animal feed. This thesis explores the possibility of using LAB to inhibit growth of spoilage fungi in food and feed products. LAB isolates, collected from plant material or dairy products, were screened for antifungal activity in a dual culture assay. Strains with antifungal activity were identified and the fungal inhibitory activity wa...

  16. Re-engineering bacteria for ethanol production

    Science.gov (United States)

    Yomano, Lorraine P; York, Sean W; Zhou, Shengde; Shanmugam, Keelnatham; Ingram, Lonnie O

    2014-05-06

    The invention provides recombinant bacteria, which comprise a full complement of heterologous ethanol production genes. Expression of the full complement of heterologous ethanol production genes causes the recombinant bacteria to produce ethanol as the primary fermentation product when grown in mineral salts medium, without the addition of complex nutrients. Methods for producing the recombinant bacteria and methods for producing ethanol using the recombinant bacteria are also disclosed.

  17. Oligotrophic bacteria isolated from clinical materials.

    OpenAIRE

    Tada, Y; Ihmori, M; Yamaguchi, J

    1995-01-01

    Oligotrophic bacteria (oligotrophs) are microorganisms that grow in extremely nutritionally deficient conditions in which the concentrations of organic substances are low. Many oligotrophic bacteria were isolated from clinical materials including urine, sputum, swabbings of the throat, vaginal discharges, and others. Seventy-seven strains of oligotrophic bacteria from 871 samples of clinical material were isolated. A relatively higher frequency of isolation of oligotrophic bacteria was shown ...

  18. Laser-Based Identification of Pathogenic Bacteria

    Science.gov (United States)

    Rehse, Steven J.

    2009-01-01

    Bacteria are ubiquitous in our world. From our homes, to our work environment, to our own bodies, bacteria are the omnipresent although often unobserved companions to human life. Physicists are typically untroubled professionally by the presence of these bacteria, as their study usually falls safely outside the realm of our typical domain. In the…

  19. Bacteria interfere with A-actinomycetemcomitans colonization

    OpenAIRE

    Teughels, Wim; Haake, S. Kinder; Sliepen, Isabelle; Pauwels, Martine; Van Eldere, Johan; Cassiman, Jean-Jacques; Quirynen, Marc

    2007-01-01

    It is known that beneficial bacteria can suppress the emergence of pathogenic bacteria, particularly in the gastrointestinal tract. This study examined the potential for a similar suppression of Aggregatibacter (formerly Actinobacillus) actinomycetemcomitans colonization of epithelial cells, due to its potential relevance in periodontal diseases. Seven presumed beneficial bacteria were examined for their ability to interfere, exclude, or displace A. actinomycetemcomitans from epithelial cells...

  20. Current strategies for improving food bacteria

    NARCIS (Netherlands)

    Kuipers, O P; Buist, Girbe; Kok, Jan

    2000-01-01

    Novel concepts and methodologies are emerging that hold great promise for the directed improvement of food-related bacteria, specifically lactic acid bacteria. Also, the battle against food spoilage and pathogenic bacteria can now be fought more effectively. Here we describe recent advances in

  1. Development and Application of Acute Exposure Guideline Levels (AEGLs) for Chemical Warfare Nerve and Sulfur Mustard Agents.

    Energy Technology Data Exchange (ETDEWEB)

    Watson, Annetta Paule [ORNL; Opresko, Dennis M [ORNL; Young, Robert A [ORNL; Hauschild, Veronique [U.S. Environmental Protection Agency

    2006-01-01

    Acute exposure guideline levels (AEGLs) have been developed for the chemical warfare agents GB, GA, GD, GF, VX, and sulfur mustard. These AEGLs were approved by the National Advisory Committee for Acute Exposure Guideline Levels for Hazardous Substances after Federal Register publication and comment, and judged as scientifically valid by the National Research Council Committee on Toxicology Subcommittee on AEGLs. AEGLs represent general public exposure limits for durations ranging from 10 min to 8 h, and for three levels of severity (AEGL-1, AEGL-2, AEGL-3). Mild effects are possible at concentrations greater than AEGL-1, while life-threatening effects are expected at concentrations greater than AEGL-3. AEGLs can be applied to various civilian and national defense purposes, including evacuation and shelter-in-place protocols, reentry levels, protective clothing specifications, and analytical monitoring requirements. This report documents development and derivation of AEGL values for six key chemical warfare agents, and makes recommendations for their application to various potential exposure scenarios.

  2. Microbial Warfare: Illuminating CRISPR adaptive immunity using single-molecule fluorescence

    NARCIS (Netherlands)

    Loeff, L.

    2017-01-01

    Bacteria and archaea are constantly threatened by a large array of viruses and other genetic elements. Driven by evolution, these organisms have acquired a wide arsenal of defense mechanisms that allow the host organism to fight off the invaders. Among these defense mechanisms is an adaptive and

  3. Fate of Bacterial and Viral Bio-Warfare Agents in Disinfected Waters

    Science.gov (United States)

    2010-10-01

    15 and 50 mL tubes Petri dish spreaders Microscope slides Disposable transfer pipettes Bunsen Burner Forceps 10 mL pipettes Pipetting device...Allow the slide to dry. 4. Heat-fix the bacteria to the slide by passing the slide through the flame of a Bunsen burner . 5. Apply crystal violet stain

  4. AIDS: "it's the bacteria, stupid!".

    Science.gov (United States)

    Broxmeyer, Lawrence; Cantwell, Alan

    2008-11-01

    Acid-fast tuberculous mycobacterial infections are common in AIDS and are regarded as secondary "opportunistic infections." According to the National Institute of Allergy and Infectious Diseases, TB is the major attributable cause of death in AIDS patients. Could such bacteria play a primary or causative role in AIDS? Certainly, In screening tests for HIV, there is frequent, up to 70%, cross-reactivity, between the gag and pol proteins of HIV and patients with mycobacterial infections such as tuberculosis. By 1972, five years before gays started dying in the U.S., Rolland wrote Genital Tuberculosis, a Forgotten Disease? And ironically, in 1979, on the eve of AIDS recognition, Gondzik and Jasiewicz showed that even in the laboratory, genitally infected tubercular male guinea pigs could infect healthy females through their semen by an HIV-compatible ratio of 1 in 6 or 17%, prompting him to warn his patients that not only was tuberculosis a sexually transmitted disease, but also the necessity of the application of suitable contraceptives, such as condoms, to avoid it. Gondzik's solution and date of publication are chilling; his findings significant. Since 1982 Cantwell et al found acid-fast bacteria closely related to tuberculosis (TB) and atypical tuberculosis in AIDS tissue. On the other hand molecular biologist and virologist Duesberg, who originally defined retroviral ultrastructure, has made it clear that HIV is not the cause of AIDS and that the so-called AIDS retrovirus has never been isolated in its pure state. Dr. Etienne de Harven, first to examine retroviruses under the electron, agrees. In 1993 HIV co-discoverer Luc Montagnier reported on cell-wall-deficient (CWD) bacteria which he called "mycoplasma" in AIDS tissue. He suspected these as a necessary "co-factor" for AIDS. Remarkably, Montagnier remained silent on Cantwell's reports of acid-fast bacteria which could simulate "mycoplasma" in AIDS tissue. Mattman makes clear that the differentiation between

  5. A Comparison of QSAR Based Thermo and Water Solvation Property Prediction Tools and Experimental Data for Selected Traditional Chemical Warfare Agents and Simulants

    Science.gov (United States)

    2014-07-01

    AND EXPERIMENTAL DATA FOR SELECTED TRADITIONAL CHEMICAL WARFARE AGENTS AND SIMULANTS ECBC-TR-1259 Jerry B. Cabalo RESEARCH AND TECHNOLOGY...PROGRAM ELEMENT NUMBER 6. AUTHOR(S) Cabalo , Jerry B. (ECBC); and Knox, Craig K. (Leidos) 5d. PROJECT NUMBER 5e. TASK NUMBER 5f. WORK UNIT

  6. Development of an automated on-line pepsin digestion-liquid chromatography-tandem mass spectrometry configuration for the rapid analysis of protein adducts of chemical warfare agents

    NARCIS (Netherlands)

    Carol-Visser, J.; van der Schans, M.; Fidder, A.; Huist, A.G.; van Baar, B.L.M.; Irth, H.; Noort, D.

    2008-01-01

    Rapid monitoring and retrospective verification are key issues in protection against and non-proliferation of chemical warfare agents (CWA). Such monitoring and verification are adequately accomplished by the analysis of persistent protein adducts of these agents. Liquid chromatography-mass

  7. System architecture and operational analysis of medium displacement unmanned surface vehicle sea hunter as a surface warfare component of distributed lethality

    Science.gov (United States)

    2017-06-01

    NAVAL POSTGRADUATE SCHOOL MONTEREY, CALIFORNIA THESIS Approved for public release. Distribution is unlimited. SYSTEM ARCHITECTURE ...TITLE AND SUBTITLE SYSTEM ARCHITECTURE AND OPERATIONAL ANALYSIS OF MEDIUM DISPLACEMENT UNMANNED SURFACE VEHICLE SEA HUNTER AS A SURFACE WARFARE...traceability, requirements and capabilities while determining the architecture framework in accordance with the Department of Defense Architectural

  8. Laser photoacoustic spectroscopy helps fight terrorism: High sensitivity detection of chemical Warfare Agent and explosives

    Science.gov (United States)

    Patel, C. K. N.

    2008-01-01

    Tunable laser photoacoustic spectroscopy is maturing rapidly in its applications to real world problems. One of the burning problems of the current turbulent times is the threat of terrorist acts against civilian population. This threat appears in two distinct forms. The first is the potential release of chemical warfare agents (CWA), such as the nerve agents, in a crowded environment. An example of this is the release of Sarin by Aum Shinrikyo sect in a crowded Tokyo subway in 1995. An example of the second terrorist threat is the ever-present possible suicide bomber in crowded environment such as airports, markets and large buildings. Minimizing the impact of both of these threats requires early detection of the presence of the CWAs and explosives. Photoacoustic spectroscopy is an exquisitely sensitive technique for the detection of trace gaseous species, a property that Pranalytica has extensively exploited in its CO2 laser based commercial instrumentation for the sub-ppb level detection of a number of industrially important gases including ammonia, ethylene, acrolein, sulfur hexafluoride, phosphine, arsine, boron trichloride and boron trifluoride. In this presentation, I will focus, however, on our recent use of broadly tunable single frequency high power room temperature quantum cascade lasers (QCL) for the detection of the CWAs and explosives. Using external grating cavity geometry, we have developed room temperature QCLs that produce continuously tunable single frequency CW power output in excess of 300 mW at wavelengths covering 5 μm to 12 μm. I will present data that show a CWA detection capability at ppb levels with false alarm rates below 1:108. I will also show the capability of detecting a variety of explosives at a ppb level, again with very low false alarm rates. Among the explosives, we have demonstrated the capability of detecting homemade explosives such as triacetone triperoxide and its liquid precursor, acetone which is a common household

  9. Impact of psychological problems in chemical warfare survivors with severe ophthalmologic complication, a cross sectional study

    Directory of Open Access Journals (Sweden)

    Ghaedi Gholamhosein

    2012-04-01

    Full Text Available Abstract Background Sulfur mustard (SM has been used as a chemical warfare agent since the early twentieth century. Despite the large number of studies that have investigated SM induced ocular injuries, few of those studies have also focused on the psychological health status of victims. This study has evaluated the most prominent influences on the psychological health status of patients with severe SM induced ocular injuries. Methods This descriptive study was conducted on 149 Iranian war veterans with severe SM induced eye injuries. The psychological health status of all patients was assessed using the Iranian standardized Symptom Check List 90-Revised (SCL90-R questionnaire. The results of patients' Global Severity Index (GSI were compared with the optimal cut-off point of 0.4 that has previously been calculated for GSI in Iranian community. The Mann-Whitney U test, T tests and effect sizes (using Cohen's d were employed as statistical methods. Data were analyzed using SPSS software. Results The mean age of patients was 44.86 (SD = 8.7 and mean duration of disease was 21.58 (SD = 1.20 years. Rate of exposure was once in 99 (66.4% cases. The mean GSI (1.46 of the study group was higher compared to standardized cut off point (0.4 of the Iranian community. The results of this study showed that the mean of total GSI score was higher in participants with lower educational levels (effect size = 0.507, unemployment (effect size = 0.464 and having more than 3 children (effect size = 0.62. Among the participants, 87 (58.4% cases had a positive psychological history for hospitalization or receiving outpatient cares previously and 62 (41.6% cases had a negative psychological history. In addition, the mean of GSI in participants with negative psychological history was lower than those with positive psychological history (Mean Change Difference = -0.621 with SD = 0.120. There was a significant difference between positive and negative psychological history

  10. Interleukin-6 and airflow limitation in chemical warfare patients with chronic obstructive pulmonary disease

    Directory of Open Access Journals (Sweden)

    Davood Attaran

    2010-09-01

    disease, interleukin-6, inflammation, chemical warfare

  11. Anticonvulsant efficacy of antihistamine cyproheptadine in rats exposed to the chemical warfare nerve agent soman.

    Science.gov (United States)

    Winkler, Jennifer L; Skovira, Jacob W; Kan, Robert K

    2017-01-01

    Organophosphate compounds, such as soman and sarin, are highly toxic chemical warfare nerve agents that cause a build-up of acetylcholine in synapses and neuromuscular junctions. Current therapies aim to prevent seizures and protect against brain injury following exposure. The present study was designed to evaluate the effectiveness of the antihistamine cyproheptadine in improving survival and controlling seizures in rats exposed to soman. Rats were pretreated with the oxime reactivator HI-6 (125mg/kg, ip) 30min prior to soman exposure (225μg/kg, sc) and then treated with atropine methylnitrate (AMN, 2.0mg/kg, im) 1min after soman. Cyproheptadine (10, 13, 16 or 20mg/kg, ip) was given at one of three time points: 1min after soman intoxication, at the onset of soman-induced seizures or 5min after seizure onset. Control animals were exposed to soman and given an equivalent volume of sterile water instead of cyproheptadine. The incidence of seizures, mortality, neuron counts, neuropathology and apoptosis in specific regions of the brain were evaluated. In animals given HI-6 and AMN the incidence of soman-induced seizure and mortality rate within the first 24h were 100%. When cyproheptadine was given at a dose of 13 or 20mg/kg 1min after soman exposure, the incidence of seizures was reduced from 100% to 13% and 30%, respectively. In addition, cyproheptadine given at 1min after soman exposure increased the survival rate to 100% regardless of dose. When cyproheptadine was administered at seizure onset, seizures were terminated in 100% of the animals at doses above 10mg/kg. The survival rate with cyproheptadine treatment at the onset of seizure was ≥83%. Seizures terminated in ≥75% of the animals that received cyproheptadine 5min after soman-induced seizure onset. When given at 5min after seizure onset the survival rate was 100% at all tested doses of cyproheptadine. The neuropathology scores and the number of TUNEL positive cells in the brain regions examined

  12. Anthropogenic landforms of warfare origin and their ecological significance: the Verdun Forest, NE France

    Science.gov (United States)

    De Matos Machado, Rémi; Amat, Jean-Paul; Arnaud-Fassetta, Gilles; Bétard, François; Bilodeau, Clélia; Jacquemot, Stéphanie; Toumazet, Jean-Pierre

    2017-04-01

    By its unprecedented industrial character, the First World War marked landscapes like no other conflict in the world. As a result of artillery bombardment and building facilities, the relief suffered major disturbances giving rise to millions anthropogenic landforms of warfare origin on the Western front: shell craters, trenches, shelters and gun sites. This landscape made of bumps and holes that dominated the lands of West Flanders and North-eastern France during the four years of war took chaotic aspects on the great battle sites. In some areas, substrate crushing by repeated bombings resulted in a field lowering of several metres. Although these geomorphological legacies of war are still present on these scarred lands, their effects on local environment and on present-day biodiversity patterns are not fully understood. On the battlefield of Verdun, where a huge number and range of conflict-induced landforms may be observed, special attention is being paid to the ecological significance of these anthropogenic landforms in a current landscape matrix dominated by forest. In 2013, an airborne LiDAR mission conducted over the battlefield has brought to light the relief inherited from the fighting that was until now concealed by the Verdun forest planted in the 1930's. Through a digital terrain model (DTM) with centimetre level accuracy, it is now possible to observe the smallest traces of the fighting. A first programmatic mapping work allowed to inventory and to locate these reliefs on the whole 10,000 hectares covered by the DTM. Also, the calculation of their geometry enabled us to quantify the erosion rate due to the military activities on the battlefield. On the basis of these morphometric measurements, a typology was developed to better appreciate the morphological diversity of conflict-induced landforms. The results show that these anthropogenic landforms are generally hollow. Because of this particular morphology, the conflict-induced landforms provide

  13. Potential role of bacteria packaging by protozoa in the persistence and transmission of pathogenic bacteria

    OpenAIRE

    Denoncourt, Alix M.; Paquet, Valérie E.; Charette, Steve J.

    2014-01-01

    Many pathogenic bacteria live in close association with protozoa. These unicellular eukaryotic microorganisms are ubiquitous in various environments. A number of protozoa such as amoebae and ciliates ingest pathogenic bacteria, package them usually in membrane structures, and then release them into the environment. Packaged bacteria are more resistant to various stresses and are more apt to survive than free bacteria. New evidence indicates that protozoa and not bacteria control the packaging...

  14. Bacteria detection instrument and method

    Science.gov (United States)

    Renner, W.; Fealey, R. D. (Inventor)

    1972-01-01

    A method and apparatus for screening a sample fluid for bacterial presence are disclosed wherein the fluid sample is mixed with culture media of sufficient quantity to permit bacterial growth in order to obtain a test solution. The concentration of oxygen dissolved in the test solution is then monitored using the potential difference between a reference electrode and a noble metal electrode which are in contact with the test solution. The change in oxygen concentration which occurs during a period of time as indicated by the electrode potential difference is compared with a detection criterion which exceeds the change which would occur absent bacteria.

  15. Bacteria and vampirism in cinema.

    Science.gov (United States)

    Castel, O; Bourry, A; Thévenot, S; Burucoa, C

    2013-09-01

    A vampire is a non-dead and non-alive chimerical creature, which, according to various folklores and popular superstitions, feeds on blood of the living to draw vital force. Vampires do not reproduce by copulation, but by bite. Vampirism is thus similar to a contagious disease contracted by intravascular inoculation with a suspected microbial origin. In several vampire films, two real bacteria were staged, better integrated than others in popular imagination: Yersinia pestis and Treponema pallidum. Bacillus vampiris was created for science-fiction. These films are attempts to better define humans through one of their greatest fears: infectious disease. Copyright © 2013 Elsevier Masson SAS. All rights reserved.

  16. Money and transmission of bacteria.

    Science.gov (United States)

    Gedik, Habip; Voss, Timothy A; Voss, Andreas

    2013-08-28

    Money is one of the most frequently passed items in the world. The aim of this study was to ascertain the survival status of bacteria including Staphylococcus aureus, Escherichia coli, and Vancomycin- Resistant Enterococci (VRE) on banknotes from different countries and the transmission of bacteria to people who come in contact with the banknotes. The survival rate was highest for the Romanian Leu yielding all three microorganisms used after both three and six hours of drying. Furthermore, the Leu was the only banknote to yield VRE after one day of drying. Other currencies either enabled the survival of Extended-Spectrum Beta-Lactamases (ESBL) and VRE (e.g. Euro), but not of MRSA, or the other way round (e.g. US Dollar). While a variety of factors such as community hygiene levels, people's behaviour, and antimicrobial resistance rates at community level obviously have influence on the transmission of resistant microorganisms, the type of banknote-paper may be an additional variable to consider.

  17. Differential scanning calorimetry of bacteria.

    Science.gov (United States)

    Miles, C A; Mackey, B M; Parsons, S E

    1986-04-01

    Thermograms obtained by differential scanning calorimetry of a range of bacteria of different heat resistances were compared. Equations were derived to calculate the rate at which the numbers of viable organisms in a calorimeter decline as the temperature is raised at a constant rate. Vegetative bacteria scanned at 10 degrees C min-1 showed multi-peaked thermograms with four major peaks (denoted m, n, p and q) occurring in the regions 68-73, 77-84, 89-99 and 105-110 degrees C respectively. Exceptions were that peak m (the largest peak) occurred at 79-82 degrees C in Bacillus stearothermophilus and an additional peak, r, was detected in Escherichia coli at 119 degrees C. At temperatures below the main peak m there were major differences in thermograms between species. There was a direct relationship between the onset of thermal denaturation and the thermoresistance of different organisms. Heat-sensitive organisms displayed thermogram features which were absent in the more heat-resistant types. When samples were cooled to 5 degrees C and re-heated, a small endothermic peak, pr, was observed at the same temperature as p. Peaks p and pr were identified as the melting endotherms of DNA. In all vegetative organisms examined, maximum death rates, computed from published D and z values, occurred at temperatures above the onset of thermal denaturation, i.e. cell death and irreversible denaturation of cell components occurred within the same temperature range.

  18. Sulfur metabolism in phototrophic sulfur bacteria

    DEFF Research Database (Denmark)

    Frigaard, Niels-Ulrik; Dahl, Christiane

    2008-01-01

    Phototrophic sulfur bacteria are characterized by oxidizing various inorganic sulfur compounds for use as electron donors in carbon dioxide fixation during anoxygenic photosynthetic growth. These bacteria are divided into the purple sulfur bacteria (PSB) and the green sulfur bacteria (GSB......). They utilize various combinations of sulfide, elemental sulfur, and thiosulfate and sometimes also ferrous iron and hydrogen as electron donors. This review focuses on the dissimilatory and assimilatory metabolism of inorganic sulfur compounds in these bacteria and also briefly discusses these metabolisms...... in other types of anoxygenic phototrophic bacteria. The biochemistry and genetics of sulfur compound oxidation in PSB and GSB are described in detail. A variety of enzymes catalyzing sulfur oxidation reactions have been isolated from GSB and PSB (especially Allochromatium vinosum, a representative...

  19. Evaluation of Molecular Markers and Analytical Methods Documenting the Occurrence of Mustard Gas and Arsenical Warfare Agents in Soil.

    Science.gov (United States)

    Sassolini, Alessandro; Brinchi, Giampaolo; Di Gennaro, Antonio; Dionisi, Simone; Dominici, Carola; Fantozzi, Luca; Onofri, Giorgio; Piazza, Rosario; Guidotti, Maurizio

    2016-09-01

    The chemicals warfare agents (CWAs) are an extremely toxic class of molecules widely produced in many industrialized countries for decades, these compounds frequently contained arsenic. The plants where the CWAs have been produced or the plants where they have been demilitarized after the Second World War with unacceptable techniques can represent a serious environmental problem. CWAs standards are difficult to find on market so in present work an environmental assessment method based on markers has been proposed. Triphenylarsine, phenylarsine oxide and thiodiglycol have been selected as markers. Three reliable analytical methods based on gaschromatography and mass detection have been proposed and tested for quantitative analysis of markers. Methods performance have been evaluated testing uncertainty, linearity, recovery and detection limits and also comparing detection limits with exposure limits of reference CWAs. Proposed assessment methods have been applied to a case study of a former industrial plant sited in an area characterized by a high background of mineral arsenic.

  20. Biological warfare warriors, secrecy and pure science in the Cold War: how to understand dialogue and the classifications of science.

    Science.gov (United States)

    Bud, Robert

    2014-01-01

    This paper uses a case study from the Cold War to reflect on the meaning at the time of the term 'Pure Science'. In 1961, four senior scientists from Britain's biological warfare centre at Porton Down visited Moscow both attending an International Congress and visiting Russian microbiological and biochemical laboratories. The reports of the British scientists in talking about a limited range of topics encountered in the Soviet Union expressed qualities of openness, sociologists of the time associated with pure science. The paper reflects on the discourses of "Pure Science", secrecy and security in the Cold War. Using Bakhtin's approach, I suggest the cordial communication between scientists from opposing sides can be seen in terms of the performance, or speaking, of one language among several at their disposal. Pure science was the language they were allowed to share outside their institutions, and indeed political blocs.

  1. Transformation of gram positive bacteria by sonoporation

    Science.gov (United States)

    Yang, Yunfeng; Li, Yongchao

    2014-03-11

    The present invention provides a sonoporation-based method that can be universally applied for delivery of compounds into Gram positive bacteria. Gram positive bacteria which can be transformed by sonoporation include, for example, Bacillus, Streptococcus, Acetobacterium, and Clostridium. Compounds which can be delivered into Gram positive bacteria via sonoporation include nucleic acids (DNA or RNA), proteins, lipids, carbohydrates, viruses, small organic and inorganic molecules, and nano-particles.

  2. Beneficial interactions between insects and gut bacteria

    OpenAIRE

    Rajagopal, R.

    2009-01-01

    Insects are amongst the most successful of animals, both in terms of diversity and in colonizing all ecological niches. Recent studies have highlighted the benefi ciary roles that bacteria play in the success and establishment of insects. By adopting techniques like 16S rRNA sequencing we are now in a position to understand the diversity of bacteria present in insect guts. It has been shown that some of these bacteria, like Wolbachia and Cardinium are involved in manipulating insect populatio...

  3. Magnetotactic bacteria at the geomagnetic equator

    International Nuclear Information System (INIS)

    Frankel, R.B.; Blakemore, R.P.; Araujo, F.F.T. de; Esquivel, D.M.S.; Danon, J.

    1981-01-01

    Magnetotatic bacteria are observed in freshwater and marine sediments of Fortaleza, Brazil, situated close to the geomagnetic equator. Both South-seeking and North-seeking bacteria are present in roughly equal numbers in the same samples. This observation is consistent with the hypothesis that the vertical component of the geomagnetic field selects the predominant polarity type among magnetotactic bacteria in natural environments. (Author) [pt

  4. “John A. MacMillan: Pioneer Missionary of Spiritual Warfare and the Believer’s Authority”

    Directory of Open Access Journals (Sweden)

    Paul King

    2016-01-01

    Full Text Available Many people associate teaching on spiritual warfare and the authority of the believer from charismatic or Word of Faith sources, especially like Kenneth Hagin. However, the original source of teaching on this doctrine comes from classic holiness roots in the Higher Life and Keswick movements, especially from John A. MacMillan, a missionary, writer, editor, and professor with the Christian and Missionary Alliance. In 1932 he wrote a series of articles entitled “The Authority of the Believer,” eventually published in book form, distributed widely and republished in other periodicals. MacMillan had a remarkable and extensive ministry in the exercise of the authority of the believer and spiritual warfare spanning more than thirty years. His experiences include divine protection, healing, divine intervention, power encounters with demonic forces, and teaching on territorial spirits and generational bondages. Numerous evangelical and charismatic leaders have quoted or referred to his teachings and principles.Banyak orang mengasosiasikan pengajaran peperangan rohani dan otoritas orang percaya dari karismatik atau sumber Firman Iman, terutama seperti Kenneth Hagin. Namun, sumber asli dari pengajaran doktrin ini berasal dari akar kekudusan klasik dalam gerakan Higher Life dan Keswick, terutama dari John A. MacMillan, seorang misionaris, penulis, editor, dan profesor dengan Christian and Missionary Alliance. Pada tahun 1932 ia menulis serangkaian artikel yang berjudul “Otoritas orang percaya,” akhirnya diterbitkan dalam bentuk buku, didistribusikan secara luas dan diterbitkan di majalah lainnya. MacMillan memiliki pelayanan yang luar biasa dan luas dalam pelaksanaan otoritas orang percaya dan peperangan rohani yang lebih dari tiga puluh tahun. Pengalamannya termasuk perlindungan ilahi, penyembuhan, campur tangan ilahi, pertemuan kuasa dengan kekuatan jahat, dan pengajaran tentang roh teritorial dan perbudakan generasi. Banyak pemimpin injili dan

  5. Antioxidant Properties of Probiotic Bacteria.

    Science.gov (United States)

    Wang, Yang; Wu, Yanping; Wang, Yuanyuan; Xu, Han; Mei, Xiaoqiang; Yu, Dongyou; Wang, Yibing; Li, Weifen

    2017-05-19

    Oxidative stress defines a condition in which the prooxidant-antioxidant balance in the cell is disturbed, resulting in DNA hydroxylation, protein denaturation, lipid peroxidation, and apoptosis, ultimately compromising cells' viability. Probiotics have been known for many beneficial health effects, and the consumption of probiotics alone or in food shows that strain-specific probiotics can present antioxidant activity and reduce damages caused by oxidation. However, the oxidation-resistant ability of probiotics, especially the underling mechanisms, is not properly understood. In this view, there is interest to figure out the antioxidant property of probiotics and summarize the mode of action of probiotic bacteria in antioxidation. Therefore, in the present paper, the antioxidant mechanisms of probiotics have been reviewed in terms of their ability to improve the antioxidant system and their ability to decrease radical generation. Since in recent years, oxidative stress has been associated with an altered gut microbiota, the effects of probiotics on intestinal flora composition are also elaborated.

  6. Isolation and characterization of methanogenic bacteria from ...

    African Journals Online (AJOL)

    Isolation and characterization of methanogenic bacteria from brewery wastewater in Kenya. Sylvia Injete Murunga, Duncan Onyango Mbuge, Ayub Njoroge Gitau, Urbanus Ndungwa Mutwiwa, Ingrid Namae Wekesa ...

  7. Quorum sensing in gram-negative bacteria

    DEFF Research Database (Denmark)

    Wu, H.; Song, Z.J.; Høiby, N.

    2004-01-01

    Bacteria can communicate with each other by means of signal molecules to coordinate the behavior of the entire community, and the mechanism is referred to as quorum sensing (QS). Signal systems enable bacteria to sense the size of their densities by monitoring the concentration of the signal...... molecules. Among Gram-negative bacteria N-acyl-L-homoserine lactone (acyl-HSL)-dependent quorum sensing systems are particularly widespread. These systems are used to coordinate expression of phenotypes that are fundamental to the interaction of bacteria with each other and with their environment...

  8. Coliform bacteria, fabrics, and the environment.

    Science.gov (United States)

    Colclasure, Victoria J; Soderquist, Thomas J; Lynch, Thomas; Schubert, Nina; McCormick, Deirdre S; Urrutia, Erika; Knickerbocker, Corey; McCord, Devon; Kavouras, Jerry H

    2015-02-01

    People come into contact with coliform bacteria at recreational sites. Previous research on bacteria adhering to fabrics and surfaces focused on the viability of clinically significant microbes, but did not examine the quantity of bacteria. This study examined the viability and quantity of coliform bacteria adhered to common fabrics. The fabrics of 100% cotton, blended cotton, and silk were exposed to a mixture of environmental coliform isolates. Fabrics were incubated in the dark at 25°C or 37°C or in direct sunlight at room temperature for 30, 60, 90, and 120 days. The quantity and viability of the bacteria were determined by the Most Probable Number technique using Colilert reagent (IDEXX Laboratories, Westbrook, ME) and eosin methylene blue agar, respectively. The highest numbers of bacteria were detected for each type of fabric when stored in the dark at 25°C, whereas the lowest numbers of bacteria were detected when fabrics were stored in the dark at 37°C. Low numbers of bacteria were detected on silk and blended cotton exposed to sunlight at room temperature, but not 100% cotton. It appears that coliform bacteria can survive on fabrics longer than previous studies have reported. Coliform bacteria survive better in the dark, at lower temperatures, and on fabrics that can retain moisture. These findings can be applied directly to the viability of bacteria on clothing and potential human exposure to fecal pathogens. Copyright © 2015 Association for Professionals in Infection Control and Epidemiology, Inc. Published by Elsevier Inc. All rights reserved.

  9. Identification of Quorum Quenching Bacteria and Its Biocontrol Potential Against Soft Rot Disease Bacteria, Dickeya Dadantii

    OpenAIRE

    Khoiri, Syaiful; Damayanti, Tri Asmira; Giyanto, Giyanto

    2017-01-01

    Dickeya dadantii is one of newly found bacteria causing soft rot on orchids in Indonesia. Infected plants showed severe rot rapidly only in few days. An effort to control the bacteria was conducted by utilizing selected quorum quenching (QQ) inducer bacteria which produce AHL-lactonase by aiiA gene. The aims of this research were to screen and identify of quorum quenching bacteria, and also assayed their biocontrol potential ability against D. dadantii in laboratory. The screening of QQ bacte...

  10. Characterization of Bacteria Isolation of Bacteria from Pinyon Rhizosphere,

    Science.gov (United States)

    2016-01-01

    Two hundred and fifty bacterial strains were isolated from pinyon rhizosphere and screened for biosurfactants production. Among them, six bacterial strains were selected for their potential to produce biosurfactants using two low cost wastes, crude glycerol and lactoserum, as raw material. Both wastes were useful for producing biosurfactants because of their high content in fat and carbohydrates. The six strains were identified by 16S rDNA with an identity percentage higher than 95%, three strains belonged to Enterobacter sp., Pseudomonas aeruginosa, Bacillus pumilus and Rhizobium sp. All strains assayed were able to grow and showed halos around the colonies as evidence of biosurfactants production on Cetyl Trimethyl Ammonium Bromide agar with crude glycerol and lactoserum as substrate. In a mineral salt liquid medium enriched with both wastes, the biosurfactants were produced and collected from free cell medium after 72 h incubation. The biosurfactants produced reduced the surface tension from 69 to 30 mN/m with an emulsification index of diesel at approximately 60%. The results suggest that biosurfactants produced by rhizosphere bacteria from pinyon have promising environmental applications.

  11. Rock-degrading endophytic bacteria in cacti

    Science.gov (United States)

    M. Esther Puente; Ching Y. Li; Yoav Bashan

    2009-01-01

    A plant-bacterium association of the cardon cactus (Pachycereus pringlei) and endophytic bacteria promotes establishment of seedlings and growth on igneous rocks without soil. These bacteria weather several rock types and minerals, unbind significant amounts of useful minerals for plants from the rocks, fix in vitro N2. produce...

  12. Comparative Genomics of Green Sulfur Bacteria

    DEFF Research Database (Denmark)

    Ussery, David; Davenport, C; Tümmler, B

    2010-01-01

    Eleven completely sequenced Chlorobi genomes were compared in oligonucleotide usage, gene contents, and synteny. The green sulfur bacteria (GSB) are equipped with a core genome that sustains their anoxygenic phototrophic lifestyle by photosynthesis, sulfur oxidation, and CO(2) fixation. Whole...... weight of 10(6), and are probably instrumental for the bacteria to generate their own intimate (micro)environment....

  13. Resuscitation effects of catalase on airborne bacteria.

    OpenAIRE

    Marthi, B; Shaffer, B T; Lighthart, B; Ganio, L

    1991-01-01

    Catalase incorporation into enumeration media caused a significant increase (greater than 63%) in the colony-forming abilities of airborne bacteria. Incubation for 30 to 60 min of airborne bacteria in collection fluid containing catalase caused a greater than 95% increase in colony-forming ability. However, catalase did not have any effects on enumeration at high relative humidities (80 to 90%).

  14. Lactic Acid Bacteria in the Gut

    NARCIS (Netherlands)

    Stolaki, M.; Vos, de W.M.; Kleerebezem, M.; Zoetendal, E.G.

    2012-01-01

    From all bacterial groups, the lactic acid bacteria (LAB) are probably the group of bacteria that is most associated with human lifestyle. The term LAB mainly refers to the ability of these organisms to convert sugars to lactic acid. The LAB comprise non-sporing, aerotolerant, coccus or rod-shaped,

  15. Isolating bacteria from sponges: Why and How?

    Science.gov (United States)

    Laport, Marinella Silva

    2018-03-28

    It is known that sponge-associated bacteria are an attractive source of new bioactive substances with biotechnological potential. These include antimicrobials, enzymes and surfactants. However, the potential of these microorganisms remains little investigated due to the difficulty of isolating new bacterial groups that produce original bioactive metabolites and enzymes. Cultivation methods are still playing crucial functions in many studies involving bacteria isolated from sponges, and in the traditional approach for biodiscovery by screening culture collections. For instance, culture media which are rich in nutrients favor the fast cultivation in comparison with slower growing bacteria, and diluted and/or poor culture media increase the possibility of growing previously uncultured bacteria. The ability to grow bacteria in culture and to characterize their secondary metabolites are a crucial approach to new biotechnology products of potential value. Many microbial biotechnology compounds used nowadays were extracted from cultured bacteria. This review presents and discusses some strategies to isolate and culture bacteria from sponges for biotechnological exploration. Finally, whole genome sequencing of sponge-associated bacteria is proposed as a novel strategy for biodiscovery. Copyright© Bentham Science Publishers; For any queries, please email at epub@benthamscience.org.

  16. Energy transduction in lactic acid bacteria

    NARCIS (Netherlands)

    Poolman, Bert

    In the discovery of some general principles of energy transduction, lactic acid bacteria have played an important role. In this review, the energy transducing processes of lactic acid bacteria are discussed with the emphasis on the major developments of the past 5 years. This work not only includes

  17. Role of Outer Membrane Vesicles of Bacteria

    Indian Academy of Sciences (India)

    IAS Admin

    However, not all the surface-associated bacterial toxins mediate binding and internal- ization of the vesicles. Role in Pathogenesis. OMVs are important for pathogenicity and virulence of bacteria. Studies involving various pathogenic bacteria clearly reveal that they produce OMVs within the infected host tissues. Body fluids.

  18. The Microworld of Marine-Bacteria

    DEFF Research Database (Denmark)

    JØRGENSEN, BB

    1995-01-01

    metabolism types, bacteria in the mostly anoxic sea floor play an important role in the major element cycles of the ocean. The communities of giant, filamentous sulfur bacteria that live in the deep-sea hydrothermal vents or along the Pacific coast of South America are presented here as examples....

  19. Biodiversity of Bacteria Isolated from Different Soils

    Directory of Open Access Journals (Sweden)

    Fatma YAMAN

    2017-01-01

    Full Text Available The aim of this study was to determine the biodiversity of PHB producing bacteria isolated from soils where fruit and vegetable are cultivated (onion, grape, olive, mulberry and plum in Aydın providence. Morphological, cultural, biochemical, and molecular methods were used for bacteria identification. These isolated bacteria were identified by 16S rRNA sequencing and using BLAST. The following bacteria Bacillus thuringiensis (6, Bacillus cereus (8, Bacillus anthrachis (1, Bacillus circulans (1, Bacillus weihenstephanensis (1, Pseudomonas putida (1, Azotobacter chroococcum (1, Brevibacterium frigoritolerans (1, Burkholderia sp. (1, Staphylococcus epidermidis (1, Streptomyces exfoliatus (1, Variovorax paradoxus (1 were found. The Maximum Likelihood method was used to produce a molecular phylogenetic analysis and a phylogenetic tree was constructed. These bacteria can produce polyhydroxybutyrate (PHB which is an organic polymer with commercial potential as a biodegradable thermoplastic. PHB can be used instead of petrol derivated non-degradable plastics. For this reason, PHB producing microorganisms are substantial in industry.

  20. Coryneform bacteria associated with canine otitis externa

    DEFF Research Database (Denmark)

    Aalbæk, Bent; Bemis, David A.; Schjærff, Mette

    2010-01-01

    This study aims to investigate the occurrence of coryneform bacteria in canine otitis externa. A combined case series and case-control study was carried out to improve the current knowledge on frequency and clinical significance of coryneform bacteria in samples from canine otitis externa. A total...... of 16 cases of otitis externa with involvement of coryneform bacteria were recorded at two referral veterinary hospitals in Denmark and the US, respectively. Coryneform bacteria were identified by partial 16S rRNA gene sequencing. Corynebacterium auriscanis was the most common coryneform species (10...... cases). Small colony variants of this species were also observed. Other coryneform isolates were identified as Corynebacterium amycolatum (3 cases), Corynebacterium freneyi (2 cases) and an Arcanobacterium-like species (1 case). The coryneform bacteria were in all cases isolated together with other...

  1. HYDROCARBON-DEGRADING BACTERIA AND SURFACTANT ACTIVITY

    Energy Technology Data Exchange (ETDEWEB)

    Brigmon, R; Topher Berry, T; Grazyna A. Plaza, G; jacek Wypych, j

    2006-08-15

    Fate of benzene ethylbenzene toluene xylenes (BTEX) compounds through biodegradation was investigated using two different bacteria, Ralstonia picketti (BP-20) and Alcaligenes piechaudii (CZOR L-1B). These bacteria were isolated from extremely polluted petroleum hydrocarbon contaminated soils. PCR and Fatty Acid Methyl Ester (FAME) were used to identify the isolates. Biodegradation was measured using each organism individually and in combination. Both bacteria were shown to degrade each of the BTEX compounds. Alcaligenes piechaudii biodegraded BTEXs more efficiently while mixed with BP-20 and individually. Biosurfactant production was observed by culture techniques. In addition 3-hydroxy fatty acids, important in biosurfactant production, was observed by FAME analysis. In the all experiments toluene and m+p- xylenes were better growth substrates for both bacteria than the other BTEX compounds. In addition, the test results indicate that the bacteria could contribute to bioremediation of aromatic hydrocarbons (BTEX) pollution increase biodegradation through the action by biosurfactants.

  2. The Infantry Brigade Combat Team: The U.S. Army’s Premier Phase IV and Irregular Warfare Force for the 21st Century

    Science.gov (United States)

    2007-04-01

    required. The vision of this new IBCT is not complex . When the Army is called upon to conduct conventional warfare, it will do so with its Airborne...Because of its complexity , IW conflicts tend to last many years; it took the British ten years to win the IW conflict in Malaya.23 In order for a...include two human intelligence (HUMINT) collectors. In the IBCT’s Military Intelligence Company ( MICO ), there is an abundance of trained intelligence

  3. How Do I Know? A Guide to the Selection of Personal Protective Equipment for Use in Responding to A Release of Chemical Warfare Agents

    Energy Technology Data Exchange (ETDEWEB)

    Foust, C.B.

    1999-05-01

    An incident involving chemical warfare agents requires a unique hazardous materials (HAZMAT) response. As with an HAZMAT event, federal regulations prescribe that responders must be protected from exposure to the chemical agents. But unlike other HAZMAT events, special considerations govern selection of personal protective equipment (PPE). PPE includes all clothing, respirators and monitoring devices used to respond to a chemical release. PPE can differ depending on whether responders are military or civilian personnel.

  4. Desorption Electrospray Ionization Mass Spectrometry (DESI-MS) Analysis of Organophosphorus Chemical Warfare Agents: Rapid Acquisition of Time-Aligned Parallel (TAP) Fragmentation Data

    Science.gov (United States)

    2010-06-01

    of surfaces [22, 28-30], polymers [31], alkaloids on plant tissue [32], chemical warfare agents on solid phase microextraction (SPME) fibers [33, 34...phase analysis of industrial polymers. Chem. Commun., 888-890. [32] Talaty, N., Takats, Z. and Cooks, R.G. (2005). Rapid in situ detection of alkaloids ...in plant tissue under ambient conditions using desorption electrospray ionization. Analyst, 130, 1624-1633. [33] D’Agostino, P. A., Hancock, J. R

  5. [Unique properties of highly radioresistant bacteria].

    Science.gov (United States)

    Romanovskaia, V A; Rokitko, P V; Malashenko, Iu R

    2000-01-01

    In connection with the Chernobyl Nuclear Power Plant (ChNPP) accident and the negative ecological after-effects for biota in this zone the interest has arisen to radioresistant bacteria, as to the most dynamic model of the given ecosystem, and to mechanisms which provide resistance of bacteria to ionizing radiation. The analysis of published data has shown that the radioresistant bacteria are not interrelated taxonomically and phylogenetically. The extreme radioresistant bacteria are represented by the Deinococcus species, which form a group phylogenetically close to the line Thermus-Meiothermus. Other radioresistant bacteria are the representatives of the genera Rubrobacter, Methylobacterium, Kocuria, Bacillus and some archebacteria. Data on natural habitats, of radioresistant bacteria are not numerous. In a number of cases it is difficult to distinguish their natural habitats, as they were isolated from the samples which were previously exposed to X-ray or gamma-irradiation, or from the ecosystems with the naturally raised radioactivity. To understand the strategy of survival of radioresistant bacteria, we briefly reviewed the mechanism of action of various species of radiation on cells and macromolecules; physiological signs of the cell damage caused by radiation; mechanisms eliminating (repairing) these damages. More details on mechanisms of the DNA repair in D. radiodurans are described. The extreme resistance of D. radiodurans to the DNA damaging factors is defined by 1) repair mechanisms which fundamentally differ from those in other procaryotes; 2) ability to increase the efficiency of a standard set of the DNA repairing proteins. Literary and own data on the effect of radiation on survival of various groups of bacteria in natural ecosystems are summarized. The ecological consequences of the ChNPP accident for soil bacteria in this region were estimated. The reduction of the number of soil bacteria and recession of microbial diversity under the effect of

  6. Tape Cassette Bacteria Detection System

    Science.gov (United States)

    1973-01-01

    The design, fabrication, and testing of an automatic bacteria detection system with a zero-g capability and based on the filter-capsule approach is described. This system is intended for monitoring the sterility of regenerated water in a spacecraft. The principle of detection is based on measuring the increase in chemiluminescence produced by the action of bacterial porphyrins (i.e., catalase, cytochromes, etc.) on a luminol-hydrogen peroxide mixture. Since viable as well as nonviable organisms initiate this luminescence, viable organisms are detected by comparing the signal of an incubated water sample with an unincubated control. Higher signals for the former indicate the presence of viable organisms. System features include disposable sealed sterile capsules, each containing a filter membrane, for processing discrete water samples and a tape transport for moving these capsules through a processing sequence which involves sample concentration, nutrient addition, incubation, a 4 Molar Urea wash and reaction with luminol-hydrogen peroxide in front of a photomultiplier tube. Liquids are introduced by means of a syringe needle which pierces a rubber septum contained in the wall of the capsule. Detection thresholds obtained with this unit towards E. coli and S. marcescens assuming a 400 ml water sample are indicated.

  7. Antibiotic resistance in probiotic bacteria

    Directory of Open Access Journals (Sweden)

    Miguel eGueimonde

    2013-07-01

    Full Text Available Probiotics are live microorganisms which when administered in adequate amounts confer a health benefit on the host. The main probiotic bacteria are strains belonging to the genera Lactobacillus and Bifidobacterium, although other representatives, such as Bacillus or Escherichia coli strains, have also been used. Lactobacillus and Bifidobacterium are two common inhabitants of the human intestinal microbiota. Also, some species are used in food fermentation processes as starters, or as adjunct cultures in the food industry. With some exceptions, antibiotic resistance in these beneficial microbes does not constitute a safety concern in itself, when mutations or intrinsic resistance mechanisms are responsible for the resistance phenotype. In fact, some probiotic strains with intrinsic antibiotic resistance could be useful for restoring the gut microbiota after antibiotic treatment. However, specific antibiotic resistance determinants carried on mobile genetic elements, such as tetracycline resistance genes, are often detected in the typical probiotic genera, and constitute a reservoir of resistance for potential food or gut pathogens, thus representing a serious safety issue.

  8. Comparative cytotoxicity of periodontal bacteria

    International Nuclear Information System (INIS)

    Stevens, R.H.; Hammond, B.F.

    1988-01-01

    The direct cytotoxicity of sonic extracts (SE) from nine periodontal bacteria for human gingival fibroblasts (HGF) was compared. Equivalent dosages (in terms of protein concentration) of SE were used to challenge HGF cultures. The cytotoxic potential of each SE was assessed by its ability to (1) inhibit HGF proliferation, as measured by direct cell counts; (2) inhibit 3H-thymidine incorporation in HGF cultures; or (3) cause morphological alterations of the cells in challenged cultures. The highest concentration (500 micrograms SE protein/ml) of any of the SEs used to challenge the cells was found to be markedly inhibitory to the HGFs by all three of the criteria of cytotoxicity. At the lowest dosage tested (50 micrograms SE protein/ml); only SE from Actinobacillus actinomycetemcomitans, Bacteroides gingivalis, and Fusobacterium nucleatum caused a significant effect (greater than 90% inhibition or overt morphological abnormalities) in the HGFs as determined by any of the criteria employed. SE from Capnocytophaga sputigena, Eikenella corrodens, or Wolinella recta also inhibited cell proliferation and thymidine incorporation at this dosage; however, the degree of inhibition (5-50%) was consistently, clearly less than that of the first group of three organisms named above. The SE of the three other organisms tested (Actinomyces odontolyticus, Bacteroides intermedius, and Streptococcus sanguis) had little or no effect (0-10% inhibition) at this concentration. The data suggest that the outcome of the interaction between bacterial components and normal resident cells of the periodontium is, at least in part, a function of the bacterial species

  9. Comparative cytotoxicity of periodontal bacteria

    Energy Technology Data Exchange (ETDEWEB)

    Stevens, R.H.; Hammond, B.F.

    1988-11-01

    The direct cytotoxicity of sonic extracts (SE) from nine periodontal bacteria for human gingival fibroblasts (HGF) was compared. Equivalent dosages (in terms of protein concentration) of SE were used to challenge HGF cultures. The cytotoxic potential of each SE was assessed by its ability to (1) inhibit HGF proliferation, as measured by direct cell counts; (2) inhibit 3H-thymidine incorporation in HGF cultures; or (3) cause morphological alterations of the cells in challenged cultures. The highest concentration (500 micrograms SE protein/ml) of any of the SEs used to challenge the cells was found to be markedly inhibitory to the HGFs by all three of the criteria of cytotoxicity. At the lowest dosage tested (50 micrograms SE protein/ml); only SE from Actinobacillus actinomycetemcomitans, Bacteroides gingivalis, and Fusobacterium nucleatum caused a significant effect (greater than 90% inhibition or overt morphological abnormalities) in the HGFs as determined by any of the criteria employed. SE from Capnocytophaga sputigena, Eikenella corrodens, or Wolinella recta also inhibited cell proliferation and thymidine incorporation at this dosage; however, the degree of inhibition (5-50%) was consistently, clearly less than that of the first group of three organisms named above. The SE of the three other organisms tested (Actinomyces odontolyticus, Bacteroides intermedius, and Streptococcus sanguis) had little or no effect (0-10% inhibition) at this concentration. The data suggest that the outcome of the interaction between bacterial components and normal resident cells of the periodontium is, at least in part, a function of the bacterial species.

  10. Potential role of bacteria packaging by protozoa in the persistence and transmission of pathogenic bacteria

    Directory of Open Access Journals (Sweden)

    Alix M Denoncourt

    2014-05-01

    Full Text Available Many pathogenic bacteria live in close association with protozoa. These unicellular eukaryotic microorganisms are ubiquitous in various environments. A number of protozoa such as amoebae and ciliates ingest pathogenic bacteria, package them usually in membrane structures, and then release them into the environment. Packaged bacteria are more resistant to various stresses and are more apt to survive than free bacteria. New evidence indicates that protozoa and not bacteria control the packaging process. It is possible that packaging is more common than suspected and may play a major role in the persistence and transmission of pathogenic bacteria. To confirm the role of packaging in the propagation of infections, it is vital that the molecular mechanisms governing the packaging of bacteria by protozoa be identified as well as elements related to the ecology of this process in order to determine whether packaging acts as a Trojan Horse.

  11. Counting bacteria on a microfluidic chip.

    Science.gov (United States)

    Song, Yongxin; Zhang, Hongpeng; Chon, Chan Hee; Chen, Shu; Pan, Xinxiang; Li, Dongqing

    2010-11-29

    This paper reports a lab-on-a-chip device that counts the number of bacteria flowing through a microchannel. The bacteria number counting is realized by a microfluidic differential Resistive Pulse Sensor (RPS). By using a single microfluidic channel with two detecting arm channels placed at the two ends of the sensing section, the microfluidic differential RPS can achieve a high signal-to-noise ratio. This method is applied to detect and count bacteria in aqueous solution. The detected RPS signals amplitude for Pseudomonas aeruginosa ranges from 0.05 V to 0.17 V and the signal-to-noise ratio is 5-17. The number rate of the bacteria flowing through the sensing gate per minute is a linear function of the sample concentration. Using this experimentally obtained correlation curve, the concentration of bacteria in the sample solution can be evaluated within several minutes by measuring the number rate of the bacteria flowing through the sensing gate of this microfluidic differential RPS chip. The method described in this paper is simple and automatic, and have wide applications in determining the bacteria and cell concentrations for microbiological and other biological applications. Copyright © 2010 Elsevier B.V. All rights reserved.

  12. Fermentative Bacteria Influence the Competition between Denitrifiers and DNRA Bacteria

    Directory of Open Access Journals (Sweden)

    Eveline M. van den Berg

    2017-09-01

    results of this study clearly show that not only the ratio of available substrates, but also the nature of the electron donor influences the outcome of competition between DNRA and denitrification. Apparently, fermentative bacteria are competitive for the electron donor and thereby alter the ratio of available substrates for nitrate reduction.

  13. Folate Production by Probiotic Bacteria

    Directory of Open Access Journals (Sweden)

    Stefano Raimondi

    2011-01-01

    Full Text Available Probiotic bacteria, mostly belonging to the genera Lactobacillus and Bifidobacterium, confer a number of health benefits to the host, including vitamin production. With the aim to produce folate-enriched fermented products and/or develop probiotic supplements that accomplish folate biosynthesis in vivo within the colon, bifidobacteria and lactobacilli have been extensively studied for their capability to produce this vitamin. On the basis of physiological studies and genome analysis, wild-type lactobacilli cannot synthesize folate, generally require it for growth, and provide a negative contribution to folate levels in fermented dairy products. Lactobacillus plantarum constitutes an exception among lactobacilli, since it is capable of folate production in presence of para-aminobenzoic acid (pABA and deserves to be used in animal trials to validate its ability to produce the vitamin in vivo. On the other hand, several folate-producing strains have been selected within the genus Bifidobacterium, with a great variability in the extent of vitamin released in the medium. Most of them belong to the species B. adolescentis and B. pseudocatenulatum, but few folate producing strains are found in the other species as well. Rats fed a probiotic formulation of folate-producing bifidobacteria exhibited increased plasma folate level, confirming that the vitamin is produced in vivo and absorbed. In a human trial, the same supplement raised folate concentration in feces. The use of folate-producing probiotic strains can be regarded as a new perspective in the specific use of probiotics. They could more efficiently confer protection against inflammation and cancer, both exerting the beneficial effects of probiotics and preventing the folate deficiency that is associated with premalignant changes in the colonic epithelia.

  14. Bacteria classification using Cyranose 320 electronic nose

    Directory of Open Access Journals (Sweden)

    Gardner Julian W

    2002-10-01

    Full Text Available Abstract Background An electronic nose (e-nose, the Cyrano Sciences' Cyranose 320, comprising an array of thirty-two polymer carbon black composite sensors has been used to identify six species of bacteria responsible for eye infections when present at a range of concentrations in saline solutions. Readings were taken from the headspace of the samples by manually introducing the portable e-nose system into a sterile glass containing a fixed volume of bacteria in suspension. Gathered data were a very complex mixture of different chemical compounds. Method Linear Principal Component Analysis (PCA method was able to classify four classes of bacteria out of six classes though in reality other two classes were not better evident from PCA analysis and we got 74% classification accuracy from PCA. An innovative data clustering approach was investigated for these bacteria data by combining the 3-dimensional scatter plot, Fuzzy C Means (FCM and Self Organizing Map (SOM network. Using these three data clustering algorithms simultaneously better 'classification' of six eye bacteria classes were represented. Then three supervised classifiers, namely Multi Layer Perceptron (MLP, Probabilistic Neural network (PNN and Radial basis function network (RBF, were used to classify the six bacteria classes. Results A [6 × 1] SOM network gave 96% accuracy for bacteria classification which was best accuracy. A comparative evaluation of the classifiers was conducted for this application. The best results suggest that we are able to predict six classes of bacteria with up to 98% accuracy with the application of the RBF network. Conclusion This type of bacteria data analysis and feature extraction is very difficult. But we can conclude that this combined use of three nonlinear methods can solve the feature extraction problem with very complex data and enhance the performance of Cyranose 320.

  15. Mortality of fecal bacteria in seawater

    International Nuclear Information System (INIS)

    Garcia-Lara, J.; Menon, P.; Servais, P.; Billen, G.

    1991-01-01

    The authors propose a method for determining the mortality rate for allochthonous bacteria released in aquatic environments without interference due to the loss of culturability in specific culture media. This method consists of following the disappearance of radioactivity from the trichloracetic acid-insoluble fraction in water samples to which [ 3 H]thymidine-prelabeled allochthonous bacteria have been added. In coastal seawater, they found that the actual rate of disappearance of fecal bacteria was 1 order of magnitude lower than the rate of loss of culturability on specific media. Minor adaptation of the procedure may facilitate assessment of the effect of protozoan grazing and bacteriophage lysis on the overall bacterial mortality rate

  16. Anaerobic bacteria, the colon and colitis.

    Science.gov (United States)

    Roediger, W E

    1980-02-01

    Anaerobic bacteria constitute more than 90% of the bacteria in the colon. An anaerobic environment is needed to maintain their growth and the production of short-chain fatty acids by these bacteria from carbohydrates. Short-chain fatty acids are rapidly absorbed and essential for metabolic as well as functional welfare of the colonic mucosa. The importance of these acids in water absorption and in the patogenesis of colitis is discussed in relation to the concept of "energy deficiency diseases" of the colonic mucosa.

  17. Second messenger - Sensing riboswitches in bacteria.

    Science.gov (United States)

    Ramesh, Arati

    2015-12-01

    Signal sensing in bacteria has traditionally been attributed to protein-based factors. It is however becoming increasingly clear that bacteria also exploit RNAs to serve this role. This review discusses how key developmental processes in bacteria, such as community formation, choice of a sessile versus motile lifestyle, or vegetative growth versus dormant spore formation may be governed by signal sensing RNAs. The signaling molecules that affect these processes, the RNAs that sense these molecules and the underlying molecular basis for specific signal-response are discussed here. Copyright © 2015 Elsevier Ltd. All rights reserved.

  18. Warfare and Socio-political hierarchies: reflections on non-State societies of the predynastic Nile Valley

    Directory of Open Access Journals (Sweden)

    Gayubas, Augusto

    2015-12-01

    Full Text Available In a recent article, anthropologist Robert L. Carneiro reassessed his most debated hypothesis about the emergence of chiefdoms and the State as a result of environmental or social circumscription, theorized for a series of historical contexts including that of the Predynastic Nile Valley. The problem of the origin of the State is beyond our scope, but regarding the emergence of institutionalized leadership and chiefdoms in the Nile Valley, Carneiro’s ideas about warfare as a main factor in the process of social change remain interesting, even when his insistence in circumscription is still debatable. The aim of the present paper is to briefly review the available archaeological evidence of warfare among non-State societies of the Predynastic Nile Valley, and to evaluate its possible relation to the emergence of socio-political hierarchies, in turn refering to and criticizing some of Carneiro’s recent ideas about the issue.En un artículo reciente, Robert L. Carneiro presentó una reconsideración de su muy debatida hipótesis acerca de la emergencia de sociedades de jefatura y del Estado como resultado de un contexto de circunscripción ambiental, teorizada para una serie de situaciones históricas, entre ellas el valle del Nilo predinástico. El problema del origen del Estado excede las posibilidades de este trabajo, pero en lo que respecta al surgimiento de jefaturas, consideramos que las ideas de Carneiro acerca de la guerra como factor de importancia en el proceso revisten cierto interés, aun cuando su insistencia en la circunscripción continúa siendo discutible. El objetivo del presente artículo es considerar la evidencia arqueológica de guerra disponible para las sociedades no estatales del valle del Nilo predinástico y evaluar la posible relación entre dichos testimonios y la emergencia de jerarquías sociopolíticas, refiriendo y criticando algunas de las ideas recientes de Carneiro sobre el problema.

  19. Bacteria Culture Test: MedlinePlus Lab Test Information

    Science.gov (United States)

    ... this page: https://medlineplus.gov/labtests/bacteriaculturetest.html Bacteria Culture Test To use the sharing features on this page, please enable JavaScript. What is a Bacteria Culture Test? Bacteria are a large group of ...

  20. Rapidly evolving genes in pathogens: methods for detecting positive selection and examples among fungi, bacteria, viruses and protists.

    Science.gov (United States)

    Aguileta, Gabriela; Refrégier, Guislaine; Yockteng, Roxana; Fournier, Elisabeth; Giraud, Tatiana

    2009-07-01

    The ongoing coevolutionary struggle between hosts and pathogens, with hosts evolving to escape pathogen infection and pathogens evolving to escape host defences, can generate an 'arms race', i.e., the occurrence of recurrent selective sweeps that each favours a novel resistance or virulence allele that goes to fixation. Host-pathogen coevolution can alternatively lead to a 'trench warfare', i.e., balancing selection, maintaining certain alleles at loci involved in host-pathogen recognition over long time scales. Recently, technological and methodological progress has enabled detection of footprints of selection directly on genes, which can provide useful insights into the processes of coevolution. This knowledge can also have practical applications, for instance development of vaccines or drugs. Here we review the methods for detecting genes under positive selection using divergence data (i.e., the ratio of nonsynonymous to synonymous substitution rates, d(N)/d(S)). We also review methods for detecting selection using polymorphisms, such as methods based on F(ST) measures, frequency spectrum, linkage disequilibrium and haplotype structure. In the second part, we review examples where targets of selection have been identified in pathogens using these tests. Genes under positive selection in pathogens have mostly been sought among viruses, bacteria and protists, because of their paramount importance for human health. Another focus is on fungal pathogens owing to their agronomic importance. We finally discuss promising directions in pathogen studies, such as detecting selection in non-coding regions.

  1. Comparative genomics of the lactic acid bacteria

    Energy Technology Data Exchange (ETDEWEB)

    Makarova, K.; Slesarev, A.; Wolf, Y.; Sorokin, A.; Mirkin, B.; Koonin, E.; Pavlov, A.; Pavlova, N.; Karamychev, V.; Polouchine, N.; Shakhova, V.; Grigoriev, I.; Lou, Y.; Rokhsar, D.; Lucas, S.; Huang, K.; Goodstein, D. M.; Hawkins, T.; Plengvidhya, V.; Welker, D.; Hughes, J.; Goh, Y.; Benson, A.; Baldwin, K.; Lee, J. -H.; Diaz-Muniz, I.; Dosti, B.; Smeianov, V; Wechter, W.; Barabote, R.; Lorca, G.; Altermann, E.; Barrangou, R.; Ganesan, B.; Xie, Y.; Rawsthorne, H.; Tamir, D.; Parker, C.; Breidt, F.; Broadbent, J.; Hutkins, R.; O' Sullivan, D.; Steele, J.; Unlu, G.; Saier, M.; Klaenhammer, T.; Richardson, P.; Kozyavkin, S.; Weimer, B.; Mills, D.

    2006-06-01

    Lactic acid-producing bacteria are associated with various plant and animal niches and play a key role in the production of fermented foods and beverages. We report nine genome sequences representing the phylogenetic and functional diversity of these bacteria. The small genomes of lactic acid bacteria encode a broad repertoire of transporters for efficient carbon and nitrogen acquisition from the nutritionally rich environments they inhabit and reflect a limited range of biosynthetic capabilities that indicate both prototrophic and auxotrophic strains. Phylogenetic analyses, comparison of gene content across the group, and reconstruction of ancestral gene sets indicate a combination of extensive gene loss and key gene acquisitions via horizontal gene transfer during the coevolution of lactic acid bacteria with their habitats.

  2. Lactic acid bacteria: microbiological and functional aspects

    National Research Council Canada - National Science Library

    Lahtinen, Sampo

    2012-01-01

    "Updated with the substantial progress made in lactic acid and bacteria research since the third edition, this fourth volume discusses improved insights in genetics and new molecular biological techniques...

  3. Ecology: Electrical Cable Bacteria Save Marine Life

    DEFF Research Database (Denmark)

    Nielsen, Lars Peter

    2016-01-01

    Animals at the bottom of the sea survive oxygen depletion surprisingly often, and a new study identifies cable bacteria in the sediment as the saviors. The bacterial electrical activity creates an iron 'carpet', trapping toxic hydrogen sulfide....

  4. Flow cytometry, fluorescent probes, and flashing bacteria

    NARCIS (Netherlands)

    Bunthof, C.J.

    2002-01-01


    Key words: fluorescent probes, flow cytometry, CSLM, viability, survival, microbial physiology, lactic acid bacteria, Lactococcus lactis , Lactobacillus plantarum , cheese, milk,

  5. Effect of leukocyte hydrolases on bacteria

    International Nuclear Information System (INIS)

    Cohen, D.; Michel, J.; Ferne, M.; Bergner-Rabinowitz, S.; Ginsburg, I.

    1979-01-01

    Leukocyte extracts, trypsin, and lysozyme are all capable of releasing the bulk of the LPS from S. typhi, S. typhimurium, and E. coli. Bacteria which have been killed by heat, ultraviolet irradiation, or by a variety of metabolic inhibitors and antibiotics which affect protein, DNA, RNA, and cell wall synthesis no longer yield soluble LPS following treatment with the releasing agents. On the other hand, bacteria which are resistant to certain of the antibiotics yield nearly the full amount of soluble LPS following treatment, suggesting that certain heatabile endogenous metabolic pathways collaborate with the releasing agents in the release of LPS from the bacteria. It is suggested that some of the beneficial effects of antibiotics on infections with gram-negative bacteria may be the prevention of massive release of endotoxin by leukocyte enzymes in inflammatory sites

  6. Distribution of phytopathogenic bacteria in infested seeds

    Science.gov (United States)

    Populations of phytopathogenic bacteria representing five host-pathogen combinations were assessed to determine if there was a mathematical relationship common across seedborne bacterial diseases. Bacterial populations were estimated from naturally-infested seeds of cowpea (Vigna unguiculata), peppe...

  7. Bacteria-mediated bisphenol A degradation.

    Science.gov (United States)

    Zhang, Weiwei; Yin, Kun; Chen, Lingxin

    2013-07-01

    Bisphenol A (BPA) is an important monomer in the manufacture of polycarbonate plastics, food cans, and other daily used chemicals. Daily and worldwide usage of BPA and BPA-contained products led to its ubiquitous distribution in water, sediment/soil, and atmosphere. Moreover, BPA has been identified as an environmental endocrine disruptor for its estrogenic and genotoxic activity. Thus, BPA contamination in the environment is an increasingly worldwide concern, and methods to efficiently remove BPA from the environment are urgently recommended. Although many factors affect the fate of BPA in the environment, BPA degradation is mainly depended on the metabolism of bacteria. Many BPA-degrading bacteria have been identified from water, sediment/soil, and wastewater treatment plants. Metabolic pathways of BPA degradation in specific bacterial strains were proposed, based on the metabolic intermediates detected during the degradation process. In this review, the BPA-degrading bacteria were summarized, and the (proposed) BPA degradation pathway mediated by bacteria were referred.

  8. Abundance, viability and culturability of Antarctic bacteria

    Digital Repository Service at National Institute of Oceanography (India)

    LokaBharathi, P.A.; DeSouza, M.J.B.D.; Nair, S.; Chandramohan, D.

    The viability of total number of bacteria decide the mineralisation rate in any ecosystem and ultimately the fertility of the region. This study aims at establishing the extent of viability in the standing stock of the Antarctic bacterial population...

  9. Systemic resistance induced by rhizosphere bacteria

    NARCIS (Netherlands)

    Loon, L.C. van; Bakker, P.A.H.M.; Pieterse, C.M.J.

    1998-01-01

    Nonpathogenic rhizobacteria can induce a systemic resistance in plants that is phenotypically similar to pathogen-induced systemic acquired resistance (SAR). Rhizobacteria-mediated induced systemic resistance (ISR) has been demonstrated against fungi, bacteria, and viruses in Arabidopsis, bean,

  10. Discovering lactic acid bacteria by genomics

    NARCIS (Netherlands)

    Klaenhammer, T; Altermann, E; Arigoni, F; Bolotin, A; Breidt, F; Broadbent, J; Cano, R; Chaillou, S; Deutscher, J; Gasson, M; van de Guchte, M; Guzzo, J; Hartke, A; Hawkins, T; Hols, P; Hutkins, R; Kleerebezem, M; Kok, J; Kuipers, O; Maguin, E; McKay, L; Mills, D; Nauta, A; Overbeek, R; Pel, H; Pridmore, D; Saier, M; van Sinderen, D; Sorokin, A; Steele, J; O'Sullivan, D; de Vos, W; Weimer, B; Zagorec, M; Siezen, R

    This review summarizes a collection of lactic acid bacteria that are now undergoing genomic sequencing and analysis. Summaries are presented on twenty different species, with each overview discussing the organisms fundamental and practical significance, environmental habitat, and its role in

  11. Do bacteria, not fish, produce 'fish kairomone'?

    NARCIS (Netherlands)

    Ringelberg, J.; Van Gool, E.

    1998-01-01

    Fish-associated chemicals enhance phototactic downward swimming in Daphnia. If perch were treated with the antibiotic ampicillin, this enhancement was significantly decreased. Therefore, not fish, but bacteria associated with fish, seem to produce this kairomone. [KEYWORDS: Diel vertical migration;

  12. Rapid methods for detection of bacteria

    DEFF Research Database (Denmark)

    Corfitzen, Charlotte B.; Andersen, B.Ø.; Miller, M.

    2006-01-01

    Traditional methods for detection of bacteria in drinking water e.g. Heterotrophic Plate Counts (HPC) or Most Probable Number (MNP) take 48-72 hours to give the result. New rapid methods for detection of bacteria are needed to protect the consumers against contaminations. Two rapid methods: Measu......: Measurements of Adosine Triphosphate and BactiQuantTM have shown promising results as new monitoring tools, which gives the result within minutes/hours....

  13. Potentials of Exopolysaccharides from Lactic Acid Bacteria

    OpenAIRE

    Patel, Seema; Majumder, Avishek; Goyal, Arun

    2011-01-01

    Recent research in the area of importance of microbes has revealed the immense industrial potential of exopolysaccharides and their derivative oligosaccharides from lactic acid bacteria. However, due to lack of adequate technological knowledge, the exopolysaccharides have remained largely under exploited. In the present review, the enormous potentials of different types of exopolysaccharides from lactic acid bacteria are described. This also summarizes the recent advances in the applications ...

  14. Systemic resistance induced by rhizosphere bacteria

    OpenAIRE

    Loon, L.C. van; Bakker, P.A.H.M.; Pieterse, C.M.J.

    1998-01-01

    Nonpathogenic rhizobacteria can induce a systemic resistance in plants that is phenotypically similar to pathogen-induced systemic acquired resistance (SAR). Rhizobacteria-mediated induced systemic resistance (ISR) has been demonstrated against fungi, bacteria, and viruses in Arabidopsis, bean, carnation, cucumber, radish, tobacco, and tomato under conditions in which the inducing bacteria and the challenging pathogen remained spatially separated. Bacterial strains differ in their ability to ...

  15. ORAL BACTERIA AND SYSTEMS DISEASES: A REVIEW

    OpenAIRE

    Moromi Nakata, Hilda

    2014-01-01

    In order to show a global vision of oral bacteria in systemic diseases, it is important to analyze the presence and consequences of these microorganisms in relation with: bacteremia, endocarditis, cardiovascular disease, cerebrovascular disease, bacterial pneumonia, neonatal weight, nefritis, arthritis, dermatitis and diabetes mellitus, reaching conclusions for each one of them. Con el objeto de presentar una visión general de la bacterias orales en los procesos sistémicos, se analiza la p...

  16. Molecular genetic studies on obligate anaerobic bacteria

    International Nuclear Information System (INIS)

    Woods, D.R.

    1982-01-01

    Molecular genetic studies on obligate anaerobic bacteria have lagged behind similar studies in aerobes. However, the current interest in biotechnology, the involvement of anaerobes in disease and the emergence of antibioticresistant strains have focused attention on the genetics of anaerobes. This article reviews molecular genetic studies in Bacteroides spp., Clostridium spp. and methanogens. Certain genetic systems in some anaerobes differ from those in aerobes and illustrate the genetic diversity among bacteria

  17. [Teichoic acids from lactic acid bacteria].

    Science.gov (United States)

    Livins'ka, O P; Harmasheva, I L; Kovalenko, N K

    2012-01-01

    The current view of the structural diversity of teichoic acids and their involvement in the biological activity of lactobacilli has been reviewed. The mechanisms of effects of probiotic lactic acid bacteria, in particular adhesive and immunostimulating functions have been described. The prospects of the use of structure data of teichoic acid in the assessment of intraspecific diversity of lactic acid bacteria have been also reflected.

  18. An inventory of wargaming models for special warfare: Candidate applications for the infusion of human performance data

    Energy Technology Data Exchange (ETDEWEB)

    Burton, H.D.; Banks, W.W.; Schultz, E.E.; Berghage, T.E.

    1988-11-01

    The material contained in this compendium has been drawn from many sources in an attempt to define the number and types of small group combat simulation models which currently exist. The emphasis placed on this particular effort was to identify combat simulation models which are oriented or could be oriented toward special warfare involving highly trained, light, mobile forces. These descriptions and characterizations of the different simulation models should be viewed with the goal of infusing human performance data and human performance models into candidate simulation models to enhance both fidelity and realism. We feel that this listing will be of direct benefit to military and civilian scientists who are interested in identifying candidate combat simulation models which can be targeted for enhancement with appropriate human performance data. Few existing models reviewed were found to incorporate laboratory or field data drawn from the behavioral sciences or human performance literature. Several models did incorporate human performance assumptions which were found to be incongruent with real world data about how people behave under various environmental conditions and both physical and cognitive stress.

  19. Evaluation of Chemical Warfare Agent Percutaneous Vapor Toxicity: Derivation of Toxicity Guidelines for Assessing Chemical Protective Ensembles.

    Energy Technology Data Exchange (ETDEWEB)

    Watson, A.P.

    2003-07-24

    Percutaneous vapor toxicity guidelines are provided for assessment and selection of chemical protective ensembles (CPEs) to be used by civilian and military first responders operating in a chemical warfare agent vapor environment. The agents evaluated include the G-series and VX nerve agents, the vesicant sulfur mustard (agent HD) and, to a lesser extent, the vesicant Lewisite (agent L). The focus of this evaluation is percutaneous vapor permeation of CPEs and the resulting skin absorption, as inhalation and ocular exposures are assumed to be largely eliminated through use of SCBA and full-face protective masks. Selection of appropriately protective CPE designs and materials incorporates a variety of test parameters to ensure operability, practicality, and adequacy. One aspect of adequacy assessment should be based on systems tests, which focus on effective protection of the most vulnerable body regions (e.g., the groin area), as identified in this analysis. The toxicity range of agent-specific cumulative exposures (Cts) derived in this analysis can be used as decision guidelines for CPE acceptance, in conjunction with weighting consideration towards more susceptible body regions. This toxicity range is bounded by the percutaneous vapor estimated minimal effect (EME{sub pv}) Ct (as the lower end) and the 1% population threshold effect (ECt{sub 01}) estimate. Assumptions of exposure duration used in CPE certification should consider that each agent-specific percutaneous vapor cumulative exposure Ct for a given endpoint is a constant for exposure durations between 30 min and 2 hours.

  20. Graphene Nanoplatelet-Polymer Chemiresistive Sensor Arrays for the Detection and Discrimination of Chemical Warfare Agent Simulants.

    Science.gov (United States)

    Wiederoder, Michael S; Nallon, Eric C; Weiss, Matt; McGraw, Shannon K; Schnee, Vincent P; Bright, Collin J; Polcha, Michael P; Paffenroth, Randy; Uzarski, Joshua R

    2017-11-22

    A cross-reactive array of semiselective chemiresistive sensors made of polymer-graphene nanoplatelet (GNP) composite coated electrodes was examined for detection and discrimination of chemical warfare agents (CWA). The arrays employ a set of chemically diverse polymers to generate a unique response signature for multiple CWA simulants and background interferents. The developed sensors' signal remains consistent after repeated exposures to multiple analytes for up to 5 days with a similar signal magnitude across different replicate sensors with the same polymer-GNP coating. An array of 12 sensors each coated with a different polymer-GNP mixture was exposed 100 times to a cycle of single analyte vapors consisting of 5 chemically similar CWA simulants and 8 common background interferents. The collected data was vector normalized to reduce concentration dependency, z-scored to account for baseline drift and signal-to-noise ratio, and Kalman filtered to reduce noise. The processed data was dimensionally reduced with principal component analysis and analyzed with four different machine learning algorithms to evaluate discrimination capabilities. For 5 similarly structured CWA simulants alone 100% classification accuracy was achieved. For all analytes tested 99% classification accuracy was achieved demonstrating the CWA discrimination capabilities of the developed system. The novel sensor fabrication methods and data processing techniques are attractive for development of sensor platforms for discrimination of CWA and other classes of chemical vapors.