WorldWideScience

Sample records for anti-submarine warfare

  1. Anti-submarine warfare with continuously active sonar

    NARCIS (Netherlands)

    Vossen, R. van; Beerens, S.P.; Spek, E. van der

    2011-01-01

    Existing surveillance sonar systems for anti-submarine warfare (ASW) use a pulsed sonar deployed at a low duty cycle. Continuously active sonar (CAS) is of special interest since the technique could provide better detection performance than conventional pulsed sonar, and it will provide the operator

  2. 78 FR 72025 - Security Zones; Naval Base Point Loma; Naval Mine Anti Submarine Warfare Command; San Diego Bay...

    Science.gov (United States)

    2013-12-02

    ...-AA87 Security Zones; Naval Base Point Loma; Naval Mine Anti Submarine Warfare Command; San Diego Bay... establishing a new security zone at the Naval Mine and Anti-Submarine Warfare Command to protect the relocated... Commander of Naval Base Point Loma, the Commander of the Naval Mine Anti Submarine Warfare Command, and the...

  3. 78 FR 53109 - Security Zones; Naval Base Point Loma; Naval Mine Anti-Submarine Warfare Command; San Diego Bay...

    Science.gov (United States)

    2013-08-28

    ...-AA87 Security Zones; Naval Base Point Loma; Naval Mine Anti-Submarine Warfare Command; San Diego Bay... Anti-Submarine Warfare Command to protect the relocated marine mammal program. These security zone... the Port, The Commander of Naval Base Point Loma, the Commander of the Naval Mine Anti Submarine...

  4. Evaluation of Littoral Combat Ships for Open-Ocean Anti-Submarine Warfare

    Science.gov (United States)

    2016-03-01

    submarines that were considered in detail for this report. Adapted from Michaele Lee Huygen, 2003, “Submarine Warfare in the 20th & 21st Centuries : A...development, architecture , capability, functional decomposition, modeling and simulation, ASW, LCS 15. NUMBER OF PAGES 99 16. PRICE CODE 17. SECURITY...2015/05/revealed-chinas-new-carrier- killer-sub-simulator/. General Dynamics. 2015. “Combat Power for the 21st Century .” Sales brochure, General

  5. Anti Submarine Warfare Search Models

    Science.gov (United States)

    2016-09-01

    www.mh-60.com/mh-60r/ Stone LD (1975) Theory of Optimal Search ( Academic Press, New York) Stone LD, Royset J, Washburn A (2016), Optimal Search of...that optimizes the operation of the helicopter and measures its effectiveness. We analyze the effect of the different input parameters, such as...helicopter speed, submarine speed, sensor detection radius, and travel time to the point of detection on the optimal dipping pattern and the probability of

  6. Operational Planning for Theater Anti-Submarine Warfare

    Science.gov (United States)

    2017-03-01

    Marina, I will truly miss sitting in class with you guys wondering what a basis is. Finally, to my dog, Dougie: thank you for not eating my homework...probability of detection required by a commander to comfortably state that a mission area is likely to be clear of any enemy submarines. Given the

  7. Software Architecture for Anti-Submarine Warfare Unmanned Surface Vehicles

    Science.gov (United States)

    2016-09-01

    instant feedback from the end user. The closer the controls can mimic triple-A video game design, the more intuitive the controls will be to a user...addresses many of the benefits and challenges inherent to using USVs in dynamic maritime environments. Furthermore, this evaluation provides a building...examining potential software frameworks, this thesis addresses many of the benefits and challenges inherent to using USVs in dynamic maritime

  8. Improved Anti-Submarine Warfare (ASW) Effectiveness MSSE Capstone Project

    Science.gov (United States)

    2008-06-01

    9 - Barrier System RMA Data Component MTBF MTTR Source Buoy 9,600 Hours Not Repairable During Mission [Ref 70, Lumpkin and Pazos , 2004...and Mayra Pazos , “Lifetime Statistics of Most Recent Drifter Deployments (2002-2003),” Global Drifter Program/ Drifter Data Assembly Center, NOAA

  9. Maximizing the probability an aerial anti-submarine torpedo detects its target

    Science.gov (United States)

    Wang, Zhi-Jie

    2009-06-01

    As a result of the high speed of anti-submarine patrol aircraft as well as their wide range, high efficiency and other characteristics, aerial torpedoes released by anti-submarine patrol aircraft have become the key anti submarine tool. In order to improve operational efficiency, a deep study was made of the target detection probabilities for aerial torpedoes released by anti-submarine patrol aircraft. The operational modes of aerial torpedoes were analyzed and mathematical-simulation models were then established. The detection probabilities of three attacking modes were then calculated. Measures were developed for improving low probabilities of detection when attacking a probable target position. This study provides an important frame of reference for the operation of aerial torpedo released by anti-submarine patrol aircraft.

  10. Zone Defense -- Anti-Submarine Warfare Strategy in the age of Littoral Warfare

    Science.gov (United States)

    2008-12-01

    Stirling engines, and extended life batteries are all contributing to the changing of diesel submarine operating patterns. Specifically, diesel... Stirling engine that uses liquid oxygen to enable the diesel to run, such as in the Swedish GOTLAND class SSK.10 AIP systems enhance the capability...kept hearing on the sonar had been from the outboard motor , which was buzzing around Sheffield helping to fight the blaze. Yarmouth’s commander

  11. Navy Operational Planner: Anti-Submarine Warfare with Time-Dependent Performance

    Science.gov (United States)

    2017-09-01

    horizon . We develop three test cases with varying degrees of time- dependence in the performance data, and show that taking this new information into... account changes the operational plans generated and can lead to better employment of ASW platforms due to the more realistic representation of...ocean or atmospheric conditions that vary over the planning horizon . We develop three test cases with varying degrees of time-dependence in the

  12. Studies and Application of Adaptive Decision Aiding in Anti-Submarine Warfare

    Science.gov (United States)

    1978-04-01

    Enaineering’ P yo Program, Code 456 AV~Se W@0077 Inoy Stree Aringft, Vignia 2M21 M r"CEPRTRNICS NOTES The views and conclusions contained in this document...functions between man and machine in a way which optimizes their respective strengths. Computer techniques can also provide computational aids for...aid (1) significantly improves operator consistency, (2) significantly improves decision quality, (3) reduces inter-operator variability, and (4

  13. The acquisition radar’s detect annulus model of anti-submarine patrol aircraft

    Science.gov (United States)

    Wang, Jianguo; Yao, Keming; Wang, Xinwei; Men, Jinzhu

    2017-06-01

    Aiming at solving the problem of anti-submarine patrol aircraft(ASPA) detecting different sea-surface and aerial objects, based on the operation performance of acquisition radar, the paper puts forward the concept of detect annulus and establishes the corresponding model, and it gives the manner and method of ASPA detected objects. Through simulation and calculation, it discusses the different pattern of optical axis angle of depression and flight altitude from the width of detect annulus. The paper also provides the basis for the best optical axis angle of depression and flight altitude to meet the operational requirements. At last, the searching method of anti-submarine patrol aircraft using acquisition radar is put forward.

  14. Continuous Acoustic Sensing With an Unmanned Aerial Vehicle System for Anti-Submarine Warfare in a High-Threat Area

    Science.gov (United States)

    2015-12-01

    1\\lOIIl 150 9001 ISO 14001 CE Svun l’rmurlo (,ooJ AJ\\𔃻~<’ Commtll’l~s I$11K’toothduJ II,upto 10m rang.: PCTWW l"AA’’ :.lb lin.: b~utrN":C...wind down in Afghanistan and as U.S. military strategy transitions to an Asia-Pacific and more Navy-centric emphasis—more specifically, ASW is

  15. Autonomous-Agent Based Simulation of Anti- Submarine Warfare Operations with the Goal of Protecting a High Value Unit

    National Research Council Canada - National Science Library

    Akbori, Fahrettin

    2004-01-01

    ...). The purpose of the program is to aid ASW commanders, allowing them to configure an ASW screen, including the sonar policy, convoy speed, and the number of ships, to gain insight into how these...

  16. Effectiveness of Unmanned Surface Vehicles in Anti-submarine Warfare with the Goal of Protecting a High Value Unit

    Science.gov (United States)

    2015-06-01

    plans, he considers these factors and knows exactly the strengths and the weaknesses of the various ASW platforms. Depending on the given task...MANA (Map Aware Non-uniform Automata) Version 4.0 User Manual. Auckland , New Zealand: Defence Technology Agency, 2007. 92 [37] United States Pacific

  17. Governing Warfare

    DEFF Research Database (Denmark)

    Harste, Gorm

      It would seem as though warfare has gotten out of control, not only in Iraq and Afghanistan, but also in Central Africa. The paper outlines the strategic history of politically controlled warfare since the early Enlightenment. The argument is that control is implausible. The idea of control has...... the risks of lacking unity and displays the organisational trap to the fatal political myth of controlled warfare: Does it come from the military organisation system itself, from political ideologies of goal-rational governance, or from the chameleonic logic of wars?  ...

  18. Information Warfare

    OpenAIRE

    Darczewska, Jolanta; Żochowski, Piotr; Orttung, Robert W.; Laruelle, Marlene; Pörzgen, Gemma

    2017-01-01

    This edition addresses information warfare. Firstly, Jolanta Darczewska and Piotr Żochowski examine the use of “active measures” by Russian special services in support of Russian foreign policy. Secondly, Robert W. Orttung argues that Russia has sought to use various information warfare techniques to sow division and chaos in the U.S., but it remains unclear to what extent Russian actions had an impact on the thinking or behavior of American citizens. Thirdly, Marlene Laruelle considers the t...

  19. Air Warfare

    Science.gov (United States)

    2002-03-01

    genus as its predecessor of pre-war days. It would, however, be erroneous to conclude from this that the military value of each new development was...marked by periods of crescendo, air warfare will consist of a succession of actions of great violence , with periods of almost complete calm between...influence of time, if it should require fif- teen seconds for each airplane to take off, and one minute to land, the commander of a group of 100 airplanes

  20. Hybrid Warfare

    Science.gov (United States)

    2013-08-01

    Office, Title 10, U.S. Code ; Act of 5 May 1960. 3. 2010 Quadrennial Defense Review Report, February 2010, 8. 4. Hybrid Warfare, Global Accountability...Rise of Hybrid Wars.” Proceedings 132 (November 2005); William J. Nemeth , Future War and Chechnya: A Case for Hybrid War- fare (master’s thesis, U.S...William J. Nemeth which represents the earliest scholarly work on the subject, in which the emergence of devolved hybrid societies gives rise to hybrid

  1. Drone warfare

    Science.gov (United States)

    Gusterson, Hugh

    2017-11-01

    Crude drones existed as early as World War I, but the technology matured in the Yugoslav Wars of the 1990s and the current wars around the Middle East. The U.S. first used a weaponized drone in late 2001, in Afghanistan. Drones may cause more or less civilian casualties depending on the targeting protocols employed by their operators. There is an inherent ambiguity in determining who is an insurgent from several thousand feet, but civilian casualties are likely to be higher if targeters emphasize "signature strikes" over "personality strikes," if they engage in "double-tap strikes," if they rely too much on local informants, and if they rely too heavily on cellphone identification in the absence of corroboration from other intelligence sources. The legality of drone warfare is fairly clear in established battle zones such as Afghanistan, but is more problematic in terms of both international and domestic law when it comes to drone strikes in countries such as Yemen, Pakistan and Somalia with which the U.S. is not at war. Looking to the future, the U.S. would be well advised to sponsor negotiations for an international drone convention that might establish clear international rules for the use of drones, ban autonomous smart drones, and establish adjudicatory procedures to handle allegations of war crimes.

  2. Information Warfare and International Law

    National Research Council Canada - National Science Library

    Greenberg, Lawrence T; Goodman, Seymour E; Soo Hoo, Kevin J

    1998-01-01

    The development of "information warfare" presents international legal issues that will complicate nations' efforts both to execute and to respond to certain information warfare attacks, specifically...

  3. Hybrid Warfare and Lawfare

    OpenAIRE

    Bachmann, Sascha-Dominik; Mosquera, Andres B Munoz

    2015-01-01

    Hybrid Warfare as a method of war is not new. The change today appears to be that Hybrid Warfare “has the potential to transform the strategic calculations of potential belligerents [it has become] increasingly sophisticated and deadly”. This short paper presents Hybrid Warfare and one of its methods, lawfare. For this, we provide a current, comprehensive definition of hybrid warfare and examine different areas where law has been/is being used as a method of war. This paper focuses on the fol...

  4. Flying Electronic Warfare Laboratory

    Data.gov (United States)

    Federal Laboratory Consortium — FUNCTION: Provides NP-3D aircraft host platforms for Effectiveness of Navy Electronic Warfare Systems (ENEWS) Program antiship missile (ASM) seeker simulators used...

  5. Information Warfare and Ethics

    Directory of Open Access Journals (Sweden)

    M.J. Warren

    2001-05-01

    Full Text Available This paper examines the ethics of the practice of information warfare at both the national and corporate levels. Initially examining the present and past actions of individual hackers, it moves to the more organised, future military and economic warfare scenarios. It examines the lack of legal or policy initiatives in this area.

  6. Defining cyber warfare

    Directory of Open Access Journals (Sweden)

    Dragan D. Mladenović

    2012-04-01

    Full Text Available Cyber conflicts represent a new kind of warfare that is technologically developing very rapidly. Such development results in more frequent and more intensive cyber attacks undertaken by states against adversary targets, with a wide range of diverse operations, from information operations to physical destruction of targets. Nevertheless, cyber warfare is waged through the application of the same means, techniques and methods as those used in cyber criminal, terrorism and intelligence activities. Moreover, it has a very specific nature that enables states to covertly initiate attacks against their adversaries. The starting point in defining doctrines, procedures and standards in the area of cyber warfare is determining its true nature. In this paper, a contribution to this effort was made through the analysis of the existing state doctrines and international practice in the area of cyber warfare towards the determination of its nationally acceptable definition.

  7. Cyber Warfare/Cyber Terrorism

    National Research Council Canada - National Science Library

    O'Hara, Timothy

    2004-01-01

    Section 1 of this paper provides an overview of cyber warfare as an element of information warfare, starting with the general background of the current strategic environment the United States is operating...

  8. Chemical warfare agents

    Directory of Open Access Journals (Sweden)

    Vijayaraghavan R

    2010-01-01

    Full Text Available Among the Weapons of Mass Destruction, chemical warfare (CW is probably one of the most brutal created by mankind in comparison with biological and nuclear warfare. Chemical weapons are inexpensive and are relatively easy to produce, even by small terrorist groups, to create mass casualties with small quantities. The characteristics of various CW agents, general information relevant to current physical as well as medical protection methods, detection equipment available and decontamination techniques are discussed in this review article. A brief note on Chemical Weapons Convention is also provided.

  9. Gray Zone Warfare: German and Russian Political Warfare, 1935-1939, and 2001

    Science.gov (United States)

    2017-06-09

    separated periods. 15. SUBJECT TERMS Political Warfare, Psychological Warfare, Unconventional Warfare, Hybrid Warfare, Asymmetrical Warfare, Gray Zone...Russia ............................................................................................................................ 56 Psychological ...the waging of psychological and economic warfare to the furtherance of war aims and the organization of the fighting strength of the nation to the

  10. Biological and Chemical Warfare

    African Journals Online (AJOL)

    and entrails over the walls to induce a plaque and defecate into wells and water supplies. The. Romans tilted ... modern military weapons, discussions of their characteristics and potential threat have to draw heavily upon .... poisoning of water in desert warfare is his- torical, having continued through the time of. World War II.

  11. The Physics of Warfare

    Science.gov (United States)

    Giordano, Gerardo

    2015-01-01

    Recently, I was tasked with the creation and execution of a new themed general education physics class called The Physics of Warfare. In the past, I had used the theme of a class, such as the physics of sports medicine, as a way to create homework and in-class activities, generate discussions, and provide an application to demonstrate that physics…

  12. Hybrid Maritime Warfare

    DEFF Research Database (Denmark)

    Schaub Jr, Gary John; Murphy, Martin; Hoffman, Frank

    2017-01-01

    Russia’s use of hybrid warfare techniques has raised concerns about the security of the Baltic States. Gary Schaub, Jr, Martin Murphy and Frank G Hoffman recommend a series of measures to augment NATO’s Readiness Action Plan in the Baltic region, including increasing the breadth and depth of naval...... of a larger hybrid campaign...

  13. Refocusing Cyber Warfare Thought

    Science.gov (United States)

    2013-02-01

    the service placed two vastly different career fields into a single training pipeline? Does radar jamming belong to the same class of warfare as...patch newly discovered flaws, and private antivirus companies that develop signatures to inoculate systems to new mal- ware.21 Meanwhile, highly

  14. Electronic Warfare Signature Measurement Facility

    Data.gov (United States)

    Federal Laboratory Consortium — The Electronic Warfare Signature Measurement Facility contains specialized mobile spectral, radiometric, and imaging measurement systems to characterize ultraviolet,...

  15. Information Warfare and International Law

    National Research Council Canada - National Science Library

    Greenberg, Lawrence T; Goodman, Seymour E; Soo Hoo, Kevin J

    1998-01-01

    .... Some legal constraints will certainly apply to information warfare, either because the constraints explicitly regulate particular actions, or because more general principles of international law...

  16. Psychological effects of nuclear warfare

    International Nuclear Information System (INIS)

    Mickley, G.A.

    1987-01-01

    This report is divided into five parts. (1) Discussion of the psychological milieu before a nuclear confrontation. (2) Acute psychological reactions to nuclear warfare (some of which may reflect, in part, direct radiogenic alteration of nervous system functions). (3) Chronic psychological effects of a nuclear confrontation. (4) Issues concerning treatment of these psychological changes. (5) Prevention of adverse psychological reactions to nuclear warfare

  17. The evolution of human warfare.

    Science.gov (United States)

    Pitman, George R

    2011-01-01

    Here we propose a new theory for the origins and evolution of human warfare as a complex social phenomenon involving several behavioral traits, including aggression, risk taking, male bonding, ingroup altruism, outgroup xenophobia, dominance and subordination, and territoriality, all of which are encoded in the human genome. Among the family of great apes only chimpanzees and humans engage in war; consequently, warfare emerged in their immediate common ancestor that lived in patrilocal groups who fought one another for females. The reasons for warfare changed when the common ancestor females began to immigrate into the groups of their choice, and again, during the agricultural revolution.

  18. Cyber Warfare/Cyber Terrorism

    National Research Council Canada - National Science Library

    O'Hara, Timothy

    2004-01-01

    .... Section 1 concludes with a review of offensive and defensive cyber warfare concepts. Section 2 presents a general overview of cyber terrorism, including definitions of cyber terrorism and cyber terrorism support...

  19. Attrition in Network Centric Warfare

    National Research Council Canada - National Science Library

    Erbetta, John

    2003-01-01

    .... Information warfare means that positive attacks on systems themselves compound the problem. Emerging technologies applicable to NCW as a force multiplier need to be recognized as counter to the impediments to progress...

  20. The ethics of information warfare

    CERN Document Server

    Floridi, Luciano

    2014-01-01

    This book offers an overview of the ethical problems posed by Information Warfare, and of the different approaches and methods used to solve them, in order to provide the reader with a better grasp of the ethical conundrums posed by this new form of warfare.The volume is divided into three parts, each comprising four chapters. The first part focuses on issues pertaining to the concept of Information Warfare and the clarifications that need to be made in order to address its ethical implications. The second part collects contributions focusing on Just War Theory and its application to the case of Information Warfare. The third part adopts alternative approaches to Just War Theory for analysing the ethical implications of this phenomenon. Finally, an afterword by Neelie Kroes - Vice President of the European Commission and European Digital Agenda Commissioner - concludes the volume. Her contribution describes the interests and commitments of the European Digital Agenda with respect to research for the developme...

  1. Air Power and Maneuver Warfare

    Science.gov (United States)

    1994-07-01

    way to integrate air power on the one hand with maneuver warfare on the other. While American commanders such as Robert E. Lee and George S. Patton...MANEUVER WARFARE years .’ Nevertheless, it should not be forgotten that few commanders of any time or place have fought as many great battles- batailles ...the process to a boxer who uses one arm to parry his opponent’s punches and draw his attention while striking with the other. Gen George S. Patton

  2. Nuclear radiation in warfare

    International Nuclear Information System (INIS)

    Rotblat, J.

    1986-01-01

    The subject is covered in chapters, entitled: introduction; digest of nuclear weaponry (characteristics of nuclear weapons; effects of nuclear weapons other than ionizing radiation (fire-ball, fall-out, thermal radiation, blast wave, electromagnetic pulse); the nuclear arms race; war scenarios; biological effects of radiations on man (radiation doses; natural sources of radiation; acute effects of radiation; long-term somatic effects; genetic effects; factors affecting the biological response to radiation; internal exposure; synergistic effects; protection against radiation effects); radiations from nuclear explosions (initial radiation; fall-out; effects of fall-out on animal and plant life; contamination of water and food supplies by fall-out); radiation casualties in a nuclear war; effectiveness of civil defence; other warlike uses of radiation (attacks on civilian nuclear power installations; radiological warfare; terrorist activities); conclusion. (orig./HP) [de

  3. Nuclear radiation in warfare

    International Nuclear Information System (INIS)

    Rotblat, J.

    1981-01-01

    The subject is covered in chapters, entitled: introduction; digest of nuclear weaponry (characteristics of nuclear weapons; effects of nuclear weapons other than ionizing radiation (fire-ball, fall-out, thermal radiation, blast wave, electromagnetic pulse); the nuclear arms race; war scenarios); biological effects of radiations on man (radiation doses; natural sources of radiation; acute effects of radiation; long-term somatic effects; genetic effects; factors affecting the biological response to radiation; internal exposure; synergistic effects; protection against radiation effects); radiations from nuclear explosions (initial radiation; fall-out; effects of fall-out on animal and plant life; contamination of water and food supplies by fall-out); radiation casualties in a nuclear war; effectiveness of civil defence; other warlike uses of radiation (attacks on civilian nuclear power installations; radiological warfare; terrorist activities); conclusion. (U.K.)

  4. Reflections on nuclear warfare

    International Nuclear Information System (INIS)

    Evans, J.P.

    1983-01-01

    The author looks back on his more than 70 years of familiarity with Americans involved in warfare, noting their loyal support for our country's objectives. Drawing on the Einstein equation, his own visits to Hiroshima and Nagasaki, and current literature, he, as a physician, belatedly concurs with those who look on the use of nuclear weapons as irrational and untenable. Their employment under present circumstances would create a ''final epidemic'' to be avoided only by prevention. He suggests that medical perceptions must be considered by our national leaders in assessing the many factors that he hopes will lead to rational answers to this urgent, highly complex, and vital enigma. He cites physicians' efforts to help in finding answers and asks that his colleagues consider the issues with attention to the gravity of the situation and act according to their best judgment

  5. Intelligence Strategy for Fourth Generation Warfare

    National Research Council Canada - National Science Library

    Jamison, Edward P

    2006-01-01

    ...." They have named this new era of war "fourth generation warfare." Currently the Department of Defense's intelligence strategy is designed to defeat conventional adversaries vise a fourth generation warfare opponent...

  6. ISIL's Hybrid Warfare in Syria & Iraq

    DEFF Research Database (Denmark)

    Sørensen, Heine

    2016-01-01

    The case study specifically seeks to answer the following problem statement: Does ISIL qualify as an actor using hybrid warfare and if so what characterizes their particular use of this type of warfare? Based on an analysis of ISIL’s warfare from August 2012 to August 2016 the chapter argues, tha...

  7. Special Warfare: A Selected Bibliography.

    Science.gov (United States)

    1983-10-01

    Digest, Vol. 18, January 1963, pp. 36-41. 313. Van de Velde , R. W. "the Neglected Deterrent (Guerrilla Warfare)." Military Review, Vol. 38, August...34Principles of Modern Chinese Strategy." NATO’s Fifteen Nations, Vol. 8, June-July 1963, pp. 44-49. 255. Purcell, Henry . "Night Patrolling and District...September 1970, pp. 2-8. 331. Whittier, Henry S. "Soviet Special Operations/Partisan Warfare: Implications for Today." Military Review, Vol. 59, January 1979

  8. The doctor and nuclear warfare

    International Nuclear Information System (INIS)

    Anon.

    1982-01-01

    At the 34th World Medical Assembly in Lisbon in 1981 the World Medical Association adopted a motion proposed by the American Medical Association that national medical associations should develop programs to educate the civilian population on the medical consequences of nuclear war. This article discusses the attitude the medical professions should have, should nuclear warfare in some form confront them in the future. The conclusion is drawn that defence against nuclear warfare is only a part of civil defence against any disaster, including the natural disasters such as flood and fire and the man-made disasters of transport accidents, even of problems at nuclear plants designed to supply energy

  9. The Anatomy of Counterinsurgency Warfare

    DEFF Research Database (Denmark)

    Mouritsen, Lars; Pedersen, Kenneth; Thruelsen, Peter Dahl

    Since the beginning of the new millennium, the West has been increasingly involved in a tiresome and rather particular type of conflict: insurgency warfare. The bloody and shocking terrorist attacks on New York and Washington in September 2001 marked the beginning of a new era, and the introducti...

  10. European Curricula, Xenophobia and Warfare.

    Science.gov (United States)

    Coulby, David

    1997-01-01

    Examines school and university curricula in Europe and the extent of their influence on xenophobia. Considers the pluralistic nature of the European population. Discusses the role of curriculum selection and language policy in state efforts to promote nationalism. Assesses the role of curricular systems in the actual encouragement of warfare,…

  11. Information and Knowledge Centric Warfare: The Next Steps in the Evolution of Warfare

    National Research Council Canada - National Science Library

    Phister, Jr., Paul W; Plonisch, Igor G

    2004-01-01

    ...: transitioning from network-centric/information-centric to knowledge-centric warfare. Network-centric warfare is built around human and organizational behavior a new way of thinking in terms of linkages...

  12. UML modelling of network warfare examples

    CSIR Research Space (South Africa)

    Veerasamy, N

    2011-08-01

    Full Text Available will be determined by arguing their application to Network Warfare A. Consideration of Network Warfare Attributes Network Warfare can be seen as taking place over Information and Communication Technology (ICT) networks to affect information processing... the works of Theohandou, Tipton and Sowa, the following information security techniques emerge: Risk Analysis, Physical Security, Incident Response, Disaster Recovery Planning, Security Awareness, Legal, Regulations and Compliance [15] [16] [17...

  13. MEANS AND METHODS OF CYBER WARFARE

    Directory of Open Access Journals (Sweden)

    Dan-Iulian VOITAȘEC

    2016-06-01

    Full Text Available According to the Declaration of Saint Petersburg of 1868 “the only legitimate object which States should endeavor to accomplish during war is to weaken the military forces of the enemy”. Thus, International Humanitarian Law prohibits or limits the use of certain means and methods of warfare. The rapid development of technology has led to the emergence of a new dimension of warfare. The cyber aspect of armed conflict has led to the development of new means and methods of warfare. The purpose of this paper is to study how the norms of international humanitarian law apply to the means and methods of cyber warfare.

  14. Cyber warfare building the scientific foundation

    CERN Document Server

    Jajodia, Sushil; Subrahmanian, VS; Swarup, Vipin; Wang, Cliff

    2015-01-01

    This book features a wide spectrum of the latest computer science research relating to cyber warfare, including military and policy dimensions. It is the first book to explore the scientific foundation of cyber warfare and features research from the areas of artificial intelligence, game theory, programming languages, graph theory and more. The high-level approach and emphasis on scientific rigor provides insights on ways to improve cyber warfare defense worldwide. Cyber Warfare: Building the Scientific Foundation targets researchers and practitioners working in cyber security, especially gove

  15. Shadow Wars: An Analysis of Counterinsurgency Warfare

    National Research Council Canada - National Science Library

    Dogan, Osman

    2005-01-01

    ... of the current strategic approaches to counterinsurgency warfare. Toward this end, a systems model approach, which views insurgent organizations as open systems, is adapted to the insurgent environment...

  16. Radioecological aspects of nuclear warfare

    International Nuclear Information System (INIS)

    Edvardson, Kay

    1977-01-01

    Radioactive fallout, one of the major effects of nuclear warfare, will cause acute radiation sickness within the close-in or intermediate areas downwind from surface bursts. Global fallout from high yield explosions will be fairly evenly distributed in the hemisphere where the explosions occur, and will cause irradiation from ground deposit, inhaled material and contaminated food. Estimates of collective doses and the approximate number of late casualties from the global contamination are presented for a given total explosion yield. (author)

  17. The Information Warfare Life Cycle Model

    Directory of Open Access Journals (Sweden)

    Brett van Niekerk

    2011-03-01

    Full Text Available Information warfare (IW is a dynamic and developing concept, which constitutes a number of disciplines. This paper aims to develop a life cycle model for information warfare that is applicable to all of the constituent disciplines. The model aims to be scalable and applicable to civilian and military incidents where information warfare tactics are employed. Existing information warfare models are discussed, and a new model is developed from the common aspects of these existing models. The proposed model is then applied to a variety of incidents to test its applicability and scalability. The proposed model is shown to be applicable to multiple disciplines of information warfare and is scalable, thus meeting the objectives of the model.

  18. WARFARE IN THE INFORMATION AGE

    Directory of Open Access Journals (Sweden)

    Laurian GHERMAN

    2010-01-01

    Full Text Available The paper is focused on changes occurred in military organizations in Information Age. During Industrial Age the military structure of forces evolved according with principles of decomposition, specialization, hierarchy, optimization, deconfliction, centralized planning, and decentralized execution. But now the solutions based upon Industrial Age assumptions and practices will break down and fail in the Information Age. This will happen no matter how well intentioned, hardworking, or dedicated the leadership and the force are. Two key force capabilities needed by Information Age militaries are interoperability and agility. Both interoperability and agility are provided by Network centric warfare theory of war.

  19. Radioecological aspects of nuclear warfare

    International Nuclear Information System (INIS)

    Edvarson, K.

    1975-01-01

    The radioactive fallout from nuclear explosions is one of the major effects of nuclear warfare. Those levels causing acute radiation sickness are to be expected only within the close-in or intermediate areas downwind from surface bursts. Global fallout from high yield explosions will be fairly evenly distributed in the hemisphere where the explosions occurred and cause irradiation from ground deposit, inhaled material and contaminated food. The collective doses and the order of magnitude of late casualties from this global contamination are estimated for a given total explosion yield. (auth)

  20. Analytic tools for information warfare

    Energy Technology Data Exchange (ETDEWEB)

    Vandewart, R.L.; Craft, R.L.

    1996-05-01

    Information warfare and system surety (tradeoffs between system functionality, security, safety, reliability, cost, usability) have many mechanisms in common. Sandia`s experience has shown that an information system must be assessed from a {ital system} perspective in order to adequately identify and mitigate the risks present in the system. While some tools are available to help in this work, the process is largely manual. An integrated, extensible set of assessment tools would help the surety analyst. This paper describes one approach to surety assessment used at Sandia, identifies the difficulties in this process, and proposes a set of features desirable in an automated environment to support this process.

  1. Information warfare technologies in political discourse

    Directory of Open Access Journals (Sweden)

    Karpova Anna Yu.

    2016-01-01

    Full Text Available We attempt to examine the technology of «information warfare» in this paper. The dominant theme of the paper is that the outcome of the information warfare is important not only for the future of a state itself but for the future of the world balance of forces. The main task of geopolitical actors in information warfare is to introduce ideas corresponding to their interests into mass consciousness. All participants of political conflicts have common features in technologies of Information warfare. The information anomie is the indicator of the great geopolitical actors’ personified interests on the stage of «information warfare» - the process resulted in destroying the communicative line: report-information understanding and disrupting the social order in society. In this paper authors describe the following Information Warfare technologies: "Political volcano" technology; "SPIN" technology; "Widening media resource" technology; "specific gravity" technology; "Cold War 2.0" technology and Information cleaningup technology. It is assumed that in the future there will be new instructions on applying technologies of information warfare. To impart perspective to the paper we consider examples, opinions and trends.

  2. 78 FR 7049 - Takes of Marine Mammals Incidental to Specified Activities; U.S. Navy Training and Testing...

    Science.gov (United States)

    2013-01-31

    ... full spectrum of anti-submarine warfare from detecting and tracking a submarine to attacking a target.... This testing integrates the full spectrum of anti-submarine warfare from detecting and tracking a... ship is by radar. Electromagnetic measurements of off- board electromagnetic signatures are also...

  3. The Acme of Skill: Nonkinetic Warfare

    National Research Council Canada - National Science Library

    Teo, Cheng H

    2008-01-01

    .... The insurgency attributes that have characterized many wars since World War II suggest that the objective of warfare has shifted from the kinetic destruction of military forces to the nonkinetic...

  4. Topic modelling in the information warfare domain

    CSIR Research Space (South Africa)

    De Waal, A

    2013-11-01

    Full Text Available In this paper the authors provide context to Topic Modelling as an Information Warfare technique. Topic modelling is a technique that discovers latent topics in unstructured and unlabelled collection of documents. The topic structure can be searched...

  5. Prehistoric ceremonial warfare: beginning of institutionalized violence

    Czech Academy of Sciences Publication Activity Database

    Turek, Jan

    2017-01-01

    Roč. 13, č. 3 (2017), s. 535-548 ISSN 1555-8622 Institutional support: RVO:67985912 Keywords : human aggression * ceremonial warfare * archery symbolism * Neolithic * Chalcolithic * Europe Subject RIV: AC - Archeology, Anthropology, Ethnology OBOR OECD: Archaeology

  6. Mountain Warfare: The Need for Specialist Training

    National Research Council Canada - National Science Library

    Malik, Muhammad

    2003-01-01

    This study focuses on the need for specialist training for mountain warfare. It analyzes the special characteristics of mountain and high altitude terrain which affect conduct of military operations...

  7. On Cyber Warfare Command and Control Systems

    National Research Council Canada - National Science Library

    Howes, Norman R; Mezzino, Michael; Sarkesain, John

    2004-01-01

    .... Cyber warfare then becomes a one-sided battle where the attacker makes all the strikes and the target of the attack responds so slowly that the attacker usually gets away without being identified...

  8. Annual Expeditionary Warfare Conference (22nd)

    Science.gov (United States)

    2017-10-24

    Session: Expeditionary Logistics Integration & Expeditionary Medicine Session Co-Chair: Mr. Tom Wetherald, Director Business Development and Strategic...Forces Special Operations Component Command. Mr. thomas Dee, Performing the Duties of the Under secretary of the navy On Feb. 17, 2017, Mr. Tom Dee was...1990) • Col Chip Gregson, “Keeping Up With Navy Doctrine.” MC Gazette, (December 1990) • Maj Tom Waldhauser, “Composite Warfare/Amphibious Warfare

  9. Special Warfare: Restructuring for the Future

    Science.gov (United States)

    2016-06-01

    Boston, MA: Albert Einstein Institution, 2002, 1-9. Hoffman , Frank. “Hybrid Warfare and Challenges.” Joint Forces Quarterly, Issue 52, 1st Quarter...20 Robert Helvey. On Strategic Nonviolence Conflict: Thinking About the Fundamentals. Boston, MA: Albert Einstein Institution, 2002, 2-3...important as the future of warfare becomes increasingly “characterized by uncertainty.”28 As Frank Hoffman has commented, success in hybrid wars will

  10. Guiding Warfare to Reach Sustainable Peace

    DEFF Research Database (Denmark)

    Vestenskov, David; Drewes, Line

    The conference report Guiding Warfare to Reach Sustainable Peace constitutes the primary outcome of the conference It is based on excerpts from the conference presenters and workshop discussions. Furthermore, the report contains policy recommendations and key findings, with the ambition of develo......The conference report Guiding Warfare to Reach Sustainable Peace constitutes the primary outcome of the conference It is based on excerpts from the conference presenters and workshop discussions. Furthermore, the report contains policy recommendations and key findings, with the ambition...

  11. On the Probability of Predicting and Mapping Traditional Warfare Measurements to the Cyber Warfare Domain

    CSIR Research Space (South Africa)

    Grobler, M

    2014-07-01

    Full Text Available Cyber warfare is a contentious topic, with no agreement on whether this is a real possibility or an unrealistic extension of the physical battlefield. This article will not debate the validity and legality of the concept of cyber warfare...

  12. Towards a framework for a network warfare capability

    CSIR Research Space (South Africa)

    Veerasamy, N

    2008-07-01

    Full Text Available by many, there is a need for a more structured approach to understanding the various techniques required for a network warfare capability. A conceptual framework describing the most important network warfare techniques and considerations is proposed...

  13. Cyber Attacks, Information Attacks, and Postmodern Warfare

    Directory of Open Access Journals (Sweden)

    Valuch Jozef

    2017-06-01

    Full Text Available The aim of this paper is to evaluate and differentiate between the phenomena of cyberwarfare and information warfare, as manifestations of what we perceive as postmodern warfare. We describe and analyse the current examples of the use the postmodern warfare and the reactions of states and international bodies to these phenomena. The subject matter of this paper is the relationship between new types of postmodern conflicts and the law of armed conflicts (law of war. Based on ICJ case law, it is clear that under current legal rules of international law of war, cyber attacks as well as information attacks (often performed in the cyberspace as well can only be perceived as “war” if executed in addition to classical kinetic warfare, which is often not the case. In most cases perceived “only” as a non-linear warfare (postmodern conflict, this practice nevertheless must be condemned as conduct contrary to the principles of international law and (possibly a crime under national laws, unless this type of conduct will be recognized by the international community as a “war” proper, in its new, postmodern sense.

  14. Real-Time, General-Purpose, High-Speed Signal Processing Systems for Underwater Research. Proceedings of a Working Level Conference held at Supreme Allied Commander, Atlantic, Anti-Submarine Warfare Research Center (SACLANTCEN) on 18-21 September 1979. Part 1. Sessions I to III.

    Science.gov (United States)

    1979-12-01

    receiver. The receiver outputs a binary 8-bit parallel signal with a resolution of degree Farenheit . D. Nairn With reference to use of non-rugged gear in...specified input/output devices. MEMO No 451 VOL I. EMI Electronics Ltd, Systems and Weapons Division, Feltham, Middlesex, England, 1978. i. SACLANTCEN CP-25

  15. Survey on Urban Warfare Augmented Reality

    Directory of Open Access Journals (Sweden)

    Xiong You

    2018-01-01

    Full Text Available Urban warfare has become one of the main forms of modern combat in the twenty-first century. The main reason why urban warfare results in hundreds of casualties is that the situational information of the combatant is insufficient. Accessing information via an Augmented Reality system can elevate combatants’ situational awareness to effectively improve the efficiency of decision-making and reduce the injuries. This paper begins with the concept of Urban Warfare Augmented Reality (UWAR and illuminates the objectives of developing UWAR, i.e., transparent battlefield, intuitional perception and natural interaction. Real-time outdoor registration, information presentation and natural interaction are presented as key technologies of a practical UWAR system. Then, the history and current research state of these technologies are summarized and their future developments are highlighted from three perspectives, i.e., (1 Better integration with Geographic Information System and Virtual Geographic Environment; (2 More intelligent software; (3 More powerful hardware.

  16. Mongol Warfare in the Pre-Dissolution Period »

    Directory of Open Access Journals (Sweden)

    Timothy May

    2015-01-01

    Full Text Available Although the Mongols used many of the tactics and strategies that steppe nomads had used for centuries, the Mongols refined steppe warfare so that this style of warfare reached its apogee during the Mongol Empire. Furthermore, the Mongols developed a style of warfare that made them possibly the greatest military force in history. This work examines several facets of the pre-dissolution period (1200–1260. With the dissolution of the Mongol Empire, Mongol warfare once again changed. In some areas it remained complex while in others it regressed to traditional forces of steppe warfare, still potent but not as effective as the pre-dissolution period.

  17. Physical Readiness Testing of Surface Warfare Officers

    Science.gov (United States)

    1991-06-01

    NA% I PHISICAL READIiESS TEST (PRT QUEST1OthAIRE I. hE ARE CONDUCTI NG THESIS RESEAR H 0N HO- ELL THE PRT SUPPORT5 TNE R 0 T i E 0F St RF AC E ’ARAR...AD-A245 519 NAVAL POSTGRADUATE SCHOOL Monterey, California DTIC CTE.EC a% FEB071992 CI THESIS Physical Readiness Testing of Surface Warfare Officers...READINESS TESTING OF SURFACE WARFARE OFFICERS 12. PERSONAL AUTHOR(S) Hatch, William D. II and Swinney, Lori D. 13a. TYPE OF REPORT 13b. TIME COVERED 14

  18. Cognitive systems in electronic warfare

    Science.gov (United States)

    Kulpa, Krzysztof; Szczepankiewicz, Michał; Żywek, Marcin; Malanowski, Mateusz; Misiurewicz, Jacek; Samczyński, Piotr

    2017-04-01

    Electronic warfare (EW) techniques were invented 70 years ago and are still being developed, all the time with a key role played by their operators. However, a human operator responds far too slowly for the on-going needs since to be adequate to current threats the EW system reaction should be within 1 ms or less. Too slow reaction defers an achievement of the objectives, and generally may lead to disclosure of the applied strategy and to waste of resources. Developing the adequate response to the threat is a multifaceted matter that requires considerable experience and knowledge on the one hand, and thorough observation of outcomes of the applied strategy on the other hand. Such action requires the use of not only intelligence but also more complex algorithms for automatic control than the classical ones, and it heavily builds on the experience. It is therefore a cognitive task in its nature, and a human operator acts naturally this way. Consequently, a proper training and experience gained are what really matters. As a result of tests and actions in EW the operator builds his own knowledge base, thus, gains a capability of responding to the known threats in a balanced way. New threats, however, are much more challenging since they should be handled as fast as possible but in a fresh and creative manner. To this end, adapting the algorithms of radar jamming protection for the new conditions of the battlefield is an example of such challenging tasks. At present, such adjustments are done in a long feedback loop when the operator, after recognizing the problem, notifies the equipment manufacturers, and then, their engineers work on required solutions accordingly. Thus, the reaction time is counted in years, not a single milliseconds or seconds. Speeding up the response time is therefore the key issue, and a solution to it would be feasible only when cognitive systems were used. A concept of such cognitive system is presented in this paper.

  19. Biomonitoring of exposure to chemical warfare agents

    NARCIS (Netherlands)

    Noort, D.; Schans, M.J. van der; Benschop, H.P.

    2006-01-01

    An overview is presented of the major methods that are presently available for biomonitoring of exposure to chemical warfare agents, i.e., nerve agents and sulfur mustard. These methods can be applied for a variety of purposes such as diagnosis and dosimetry of exposure of casualties, verification

  20. Warfare tourism experiences and national identity

    NARCIS (Netherlands)

    Gieling, Joost; Ong, Chin Ee

    2016-01-01

    This paper examines through an analysis of Dutch warfare tourism whether there is a relationship between the subjective perceived salience of Dutch identity and heritage tourists’ motives, emotions and overall satisfaction. Using a social identity theory framework, this study provides a view of

  1. Chemical and Biological Warfare: A Selected Bibliography

    Science.gov (United States)

    1991-04-01

    WORLD ARMA - MENTS AND DISARMAMENT. SIPRI Yearbook 1990. New York: Oxford University Press, 1990. (REF JX1974 S775 1990) Pp. 107-133: "Chemical and...Report. Norton D. Zinder, Chairman. Washington: National Academy Press, 1984. (UG447 N33 1984) LEGACY OF CHEMICAL AND BIOLOGICA !L WARFARE Some 20th

  2. Mesoporous manganese oxide for warfare agents degradation

    Czech Academy of Sciences Publication Activity Database

    Štengl, Václav; Králová, Daniela; Opluštil, F.; Němec, T.

    2012-01-01

    Roč. 156, JULY (2012), s. 224-232 ISSN 1387-1811 R&D Projects: GA MPO FI-IM5/231 Institutional research plan: CEZ:AV0Z40320502; CEZ:AV0Z40500505 Keywords : homogeneous hydrolysis * chloroacetamide * manganese(IV) oxide * warfare agents Subject RIV: CA - Inorganic Chemistry Impact factor: 3.365, year: 2012

  3. Chemical Warfare Agent Decontaminant Solution Using Quaternary Ammonium Complexes

    Science.gov (United States)

    1997-12-11

    warfare agents, which include a variety of organophosphorus and organosulfur compounds, are known in the art. 15 However, these known methods use...chemical warfare agents, and works particularly well for neutralization of organosulfur agents such as mustard gas (HD), and organophosphorus agents such...detoxifying/neutralizing a variety of chemical warfare agents, including organosulfur agents such as mustard gas (HD), and organophosphorus agents such as

  4. Containment 2.0: U.S. political warfare

    OpenAIRE

    Alexander, Nicole M.

    2016-01-01

    Approved for public release; distribution is unlimited Contemporary Russia has shown an increasing preference for using Cold War–era political warfare techniques, which are deeply rooted in its doctrine and foreign policies. To date, the U.S. response comprises the conventional military aspects of the Cold War–era deterrence and containment rather than political warfare strategies. Exploring previous U.S. experience in political warfare activities—under the broad categories of strategic in...

  5. Book Review: Composite warfare: the conduct of successful ground ...

    African Journals Online (AJOL)

    Abstract. Book Title: Composite warfare: the conduct of successful ground force operations in Africa. Book Author: Eeben Barlow. Pinetown: 30 Degrees South Publishers. 2015, 576 pages. ISBN 9781928211761.

  6. Handbook of toxicology of chemical warfare agents

    CERN Document Server

    2010-01-01

    This groundbreaking book covers every aspect of deadly toxic chemicals used as weapons of mass destruction and employed in conflicts, warfare and terrorism. Including findings from experimental as well as clinical studies, this one-of-a-kind handbook is prepared in a very user- friendly format that can easily be followed by students, teachers and researchers, as well as lay people. Stand-alone chapters on individual chemicals and major topics allow the reader to easily access required information without searching through the entire book. This is the first book that offers in-depth coverage of individual toxicants, target organ toxicity, major incidents, toxic effects in humans, animals and wildlife, biosensors, biomarkers, on-site and laboratory analytical methods, decontamination and detoxification procedures, prophylactic, therapeutic and countermeasures, and the role of homeland security. Presents a comprehensive look at all aspects of chemical warfare toxicology in one reference work. This saves research...

  7. Computational models of intergroup competition and warfare.

    Energy Technology Data Exchange (ETDEWEB)

    Letendre, Kenneth (University of New Mexico); Abbott, Robert G.

    2011-11-01

    This document reports on the research of Kenneth Letendre, the recipient of a Sandia Graduate Research Fellowship at the University of New Mexico. Warfare is an extreme form of intergroup competition in which individuals make extreme sacrifices for the benefit of their nation or other group to which they belong. Among animals, limited, non-lethal competition is the norm. It is not fully understood what factors lead to warfare. We studied the global variation in the frequency of civil conflict among countries of the world, and its positive association with variation in the intensity of infectious disease. We demonstrated that the burden of human infectious disease importantly predicts the frequency of civil conflict and tested a causal model for this association based on the parasite-stress theory of sociality. We also investigated the organization of social foraging by colonies of harvester ants in the genus Pogonomyrmex, using both field studies and computer models.

  8. Cyber Warfare: New Character with Strategic Results

    Science.gov (United States)

    2013-03-01

    government property.”12 Applying these standards to cyberspace is contentious in the international community since millions of cyber attacks transpire daily...forces and creating additional hostility. At its very nature cyber warfare can be both coercive and destructive. “At the strategic level, cyber attacks could...in the state is an armed attack.”42 Other interpretations require a higher threshold for invoking Article 51. “[O]nly large scale cyber attacks on

  9. Electronic Warfare in Army Models - A Survey.

    Science.gov (United States)

    1980-08-01

    CCM) PROVING GROUND TENIAS SAMJAM EIEM SPREAD SPECTRUM US ARMY ELECTRONIC FOREIGN SCIENCE & OFFICE OF MISSILE WARFARE LAB (EWL) TECHNOLOGY CENTER...IPAR MULTIRADAR SPREAD SPECTRUM ECMFUZ IRSS OTOALOC TAC ZINGERS EIEM ITF PATCOM TAM EOCM SIM FAC MGM-H4D RFSS TENIAS GTSF MG(-H4H ROLJAM ZAP I HMSM MSL...USAFAS TRASANA USAPAS TCF ASD WPAFU TENIAS ______ ___ ECAC _________ WAR EAGLE _________CATRADA WARRANT am________ 3DBDM ZAP 1 ____________ MEW EWL ZAP 2

  10. Russia’s Approach to Cyber Warfare

    Science.gov (United States)

    2016-09-01

    warfare domain in its own right. Ideally, it is to be employed as part of a whole of government effort, along with other, more traditional, weapons of...4 even days, be transformed into an arena of fierce armed conflict, become a victim of foreign intervention, and sink into a web of chaos...Russian military is a relative latecomer to the cyber arena. For many years, cyber was the exclusive domain of the state’s security services. The

  11. Recent Trends in Thinking about Warfare

    Science.gov (United States)

    2006-09-01

    as a pikeman), the flintlock, the iron ramrod, and mechanical production, coupled with the discovery of cheap sources of nitrates (which radically...to technologies that provide cheap WMD-like capabilities, and the vulnerabilities offered by physical, cultural, social, economic, and political...context in Peter P. Perla, Albert A. Nofi, and Michael C. Markowitz, Wargaming Fourth-Generation Warfare, Sep 2006 ( CRM D0014752.A2/Final). 83 Aryan

  12. Training Practices for Surface Warfare Junior Officers

    Science.gov (United States)

    2011-12-01

    What some saw as spoon feeding , others saw as a lack of standards and goals. The issue is also worth considering in light of the changing values of the...NPS-GSBPP-12-004 NAVAL POSTGRADATE SCHOOL MONTEREY, CALIFORNIA Approved for public release; distribution is...unlimited Prepared for Naval Postgraduate School , Monterey, California 93943 TRAINING PRACTICES FOR SURFACE WARFARE JUNIOR OFFICERS by William R

  13. Hybrid Warfare: Preparing for Future Conflict

    Science.gov (United States)

    2015-02-17

    www.vox.com/a/barack-obama-interview-vox- conversation/obama-foreign-policy-transcript. Zedong , Mao . On Protracted War. Honolulu: University...warfare in Ukraine represents a threat to state sovereignty in Eastern Europe, where, like Ukraine, many states have large Russian minority populations ...adjust as well. Conventional and unconventional military actions, such as targeting military supply routes and protecting the population , must occur at

  14. Soviet Partisan Warfare: Integral to the Whole,

    Science.gov (United States)

    1988-04-20

    partisan forces. They also saw partisan warfare as more than a military tool. Its influence was potent for propaganda use and for assuring continued...corefully selected for political reliability and partisan bands themselves were subjected to intense pro-Soviet propaganda . The risks involved in...John Erickson. The Soviet High Command. A_____________________ Military- Politica ~l History. 1918-1941. Boulder, Colorado: * Westview Press, 1962, p. 6.i

  15. Hybrid Warfare: Implications for CAF Force Development

    Science.gov (United States)

    2014-08-01

    objective,” p.603 in Peter Paret and Michael Howard , eds., trans., Carl von Clausewitz, On War. Princeton NJ: Princeton University Press, 1976...and Michael Howard , eds., trans., Carl von Clausewitz, On War. Princeton NJ: Princeton University Press, 1976. Royal Canadian Navy, Horizon 2050: A...The Winograd Commission) (Government of Israel), Final Report, January 2008. Thornton, Rod, Asymmetric Warfare, Malden MA: 2007. Tse- Tung , Mao, On

  16. Toward Operational Art in Special Warfare: Appendixes

    Science.gov (United States)

    2016-01-01

    groups to endure great hardship and work toward a common goal of driving out the infidel to defend their faith. Insights for special warfare Nuclear... financing , and the International Military Education and Training program (IMET). These programs are typically authorized and funded by DoS and executed...Organizations at U.S. embassies. In par- allel, the Security Assistance Organizations also submit requests through the foreign military financing /IMET

  17. Torpedoes and Their Impact on Naval Warfare

    Science.gov (United States)

    2017-01-01

    torpedo shell, and, as it pumped the water out through a hole in the rear, thrust was produced. This was surely the first jet -propelled torpedo...reduced from 46 to 2 kilograms per torpedo. The amounts of copper and tin used were substantially reduced. The cost and labor hours were cut in...unrestricted warfare against merchant shipping to cut sea lines of communications forcefully demonstrated the strategic significance of the torpedo as

  18. 78 FR 6977 - Takes of Marine Mammals Incidental to Specified Activities; U.S. Navy Training and Testing...

    Science.gov (United States)

    2013-01-31

    ... spectrum of anti-submarine warfare from detecting and tracking a submarine to attacking a target using... involving submarines, ships, and aircraft. This testing integrates the full spectrum of anti-submarine... how detectable the ship is by radar. Electromagnetic measurements of off-board electromagnetic...

  19. Relevance of information warfare models to critical infrastructure ...

    African Journals Online (AJOL)

    This article illustrates the relevance of information warfare models to critical infrastructure protection. Analogies of information warfare models to those of information security and information systems were used to deconstruct the models into their fundamental components and this will be discussed. The models were applied ...

  20. Axial Vircator for Electronic Warfare Applications

    Directory of Open Access Journals (Sweden)

    L. Drazan

    2009-12-01

    Full Text Available This paper deals with a high power microwave generator with virtual cathode – vircator in axial release for electronic warfare applications. The classification of directed energy weapons microwave (DEWM is introduced together with basic block diagrams of a particular class of DEWM. In the paper, methods for designing vircator pulsed power supply, axial vircator structure, measurement methods and experimental results are presented. The vircator in electromagnetic ammunition is powered by magneto-cumulative generator and in weapons for defense of objects (WDO, it is powered by Marx generator. The possible applications of a vircator in the DEWM area are discussed.

  1. Navy Operational Planner - Undersea Warfare Module

    Science.gov (United States)

    2016-09-01

    CLASSIFICATION OF ABSTRACT Unclassified 20. LIMITATION OF ABSTRACT UU NSN 7540–01-280-5500 Standard Form 298 (Rev. 2–89) Prescribed by ANSI...Convergence Zone DP Direct Path HVU High Value Unit MCM Mine Sweeper MIW Mine Warfare NMP Navy Mission Planner NOP Navy Operational Planner NOP–USW...Illustrated in Figure 1 is a piecewise linear from of the equation 1 tAchievement e   , where Achievement is the probability that a mine field

  2. Electronic warfare receivers and receiving systems

    CERN Document Server

    Poisel, Richard A

    2014-01-01

    Receivers systems are considered the core of electronic warfare (EW) intercept systems. Without them, the fundamental purpose of such systems is null and void. This book considers the major elements that make up receiver systems and the receivers that go in them.This resource provides system design engineers with techniques for design and development of EW receivers for modern modulations (spread spectrum) in addition to receivers for older, common modulation formats. Each major module in these receivers is considered in detail. Design information is included as well as performance tradeoffs o

  3. Microwave receivers with electronic warfare applications

    CERN Document Server

    Tsui, James

    2005-01-01

    This book by the author of Digital Techniques for Wideband Receivers willbe like no other one on your book shelf as the definitive word on electronicwarfare (EW) receiver design and performance. Whether you are an EWscientist involved in the test and evaluation of EW receivers or a designerof RWR's and other EW-related receivers, Microwave Receivers withElectronic Warfare Applications is a handy reference through which you canperfect your technical art. Lucidly written, this book is a treatise on EWreceivers that is relevant to you if you are just looking for a top-levelinsight into EW receive

  4. History of chemical and biological warfare agents

    International Nuclear Information System (INIS)

    Szinicz, L.

    2005-01-01

    Chemical and biological warfare agents constitute a low-probability, but high-impact risk both to the military and to the civilian population. The use of hazardous materials of chemical or biological origin as weapons and for homicide has been documented since ancient times. The first use of chemicals in terms of weapons of mass destruction goes back to World War I, when on April 22, 1915 large amounts of chlorine were released by German military forces at Ypres, Belgium. Until around the 1970s of the 20th century, the awareness of the threat by chemical and biological agents had been mainly confined to the military sector. In the following time, the development of increasing range delivery systems by chemical and biological agents possessors sensitised public attention to the threat emanating from these agents. Their proliferation to the terrorists field during the 1990s with the expanding scale and globalisation of terrorist attacks suggested that these agents are becoming an increasing threat to the whole world community. The following article gives a condensed overview on the history of use and development of the more prominent chemical and biological warfare agents

  5. History of chemical and biological warfare agents.

    Science.gov (United States)

    Szinicz, L

    2005-10-30

    Chemical and biological warfare agents constitute a low-probability, but high-impact risk both to the military and to the civilian population. The use of hazardous materials of chemical or biological origin as weapons and for homicide has been documented since ancient times. The first use of chemicals in terms of weapons of mass destruction goes back to World War I, when on April 22, 1915 large amounts of chlorine were released by German military forces at Ypres, Belgium. Until around the 1970s of the 20th century, the awareness of the threat by chemical and biological agents had been mainly confined to the military sector. In the following time, the development of increasing range delivery systems by chemical and biological agents possessors sensitised public attention to the threat emanating from these agents. Their proliferation to the terrorists field during the 1990s with the expanding scale and globalisation of terrorist attacks suggested that these agents are becoming an increasing threat to the whole world community. The following article gives a condensed overview on the history of use and development of the more prominent chemical and biological warfare agents.

  6. Calculation of Barrier Search Probability of Detection for Arbitrary Search Tracks

    National Research Council Canada - National Science Library

    Nash, Wyatt

    2000-01-01

    .... This research investigates several new performance-based measures to determine if they are more suitable than the standard measures for evaluating the conduct of anti-submarine warfare barrier searches...

  7. Managing the Double Edged Sword of Network-Centric Warfare

    National Research Council Canada - National Science Library

    Wells, David

    2003-01-01

    Network Centric Warfare can tend to collapse the operational level war by allowing information to flow around or past hierarchical staff structures and directly between tactical and strategic level decision makers...

  8. Mine Warfare - The Joint Force Commander's Achilles Heel

    National Research Council Canada - National Science Library

    Cochran, Bryan

    2004-01-01

    ... Countermeasures systems resident within Strike Groups to counter enemy mine laying activities. Additionally, the Navy needs to transform its culture and mainstream the full spectrum of MIW to include naval mining and countermine warfare capabilities...

  9. Echoes of Chechnya Warfare Resound in Moscow, Quantico

    National Research Council Canada - National Science Library

    Ackerman, Robert

    2000-01-01

    .... thinking about urban warfare. After suffering stunning public defeats just a few years ago, Russian forces applied painful lessons learned then to drive Chechen forces out of their capital city, Grozny, this year...

  10. Organizing for Irregular Warfare: Implications for the Brigade Combat Team

    National Research Council Canada - National Science Library

    Burgess, Kenneth J

    2007-01-01

    ... operations in 21st-century irregular environments. The author argues that Infantry Brigade Combat Teams would be better optimized for the challenges of irregular warfare through structural changes that decentralize resources...

  11. Irregular Warfare: Impact on Future Professional Military Education

    National Research Council Canada - National Science Library

    Paschal, David G

    2006-01-01

    ... to operate effectively in an irregular warfare environment. The utility of a decisive war between nation states continues to decline and will eventually reach critical mass based upon the extreme imbalance of military power and a U.S. monopoly...

  12. Design and implementation of intelligent electronic warfare decision making algorithm

    Science.gov (United States)

    Peng, Hsin-Hsien; Chen, Chang-Kuo; Hsueh, Chi-Shun

    2017-05-01

    Electromagnetic signals and the requirements of timely response have been a rapid growth in modern electronic warfare. Although jammers are limited resources, it is possible to achieve the best electronic warfare efficiency by tactical decisions. This paper proposes the intelligent electronic warfare decision support system. In this work, we develop a novel hybrid algorithm, Digital Pheromone Particle Swarm Optimization, based on Particle Swarm Optimization (PSO), Ant Colony Optimization (ACO) and Shuffled Frog Leaping Algorithm (SFLA). We use PSO to solve the problem and combine the concept of pheromones in ACO to accumulate more useful information in spatial solving process and speed up finding the optimal solution. The proposed algorithm finds the optimal solution in reasonable computation time by using the method of matrix conversion in SFLA. The results indicated that jammer allocation was more effective. The system based on the hybrid algorithm provides electronic warfare commanders with critical information to assist commanders in effectively managing the complex electromagnetic battlefield.

  13. Fourth Generation Warfare: The Need for a Comprehensive Approach

    National Research Council Canada - National Science Library

    Benton, LeRoy D

    2008-01-01

    .... A definition of Fourth Generation Warfare is developed, based on Col. Thomas X. Hammes' writings. The definition is further developed to show relevance and applicability to current operations in the Long War on Terrorism...

  14. Information Warfare: Defining the Legal Response to An Attack

    National Research Council Canada - National Science Library

    Pottorff, James

    1999-01-01

    This paper discusses the difficulty in determining whether an information warfare attack, such as a computer virus, can be treated as an "armed attack" for purposes of national defense under the United Nations charter. As the U.S...

  15. The Role of Airpower in Urban Warfare. An Airman's Perspective

    National Research Council Canada - National Science Library

    Saffold, Timothy

    1998-01-01

    .... This emphasis on surface force employment stifles innovative thought as to how military forces can achieve operational and strategic effects by employing airpower as the key instrument of force in urban warfare...

  16. State of the Art Report on Drone-Based Warfare

    OpenAIRE

    Lee-Morrison, Lila

    2014-01-01

    State of the art report on the latest cultural discourse and debate over contemporary forms of drone based warfare. primarily resulting from the disciplines of Law, Political Science, and Geography. 2014.

  17. Fourth Generation Warfare: The Need for a Comprehensive Approach

    National Research Council Canada - National Science Library

    Benton, LeRoy D

    2008-01-01

    ... to defeat its enemies in the Long War on Terrorism. The method used to resolve this issue was to frame the scope of the current operating environment in the context of Fourth Generation Warfare...

  18. Irregular Warfare: Special Operations Joint Professional Military Education Transformation

    National Research Council Canada - National Science Library

    Cannady, Bryan H

    2008-01-01

    ... on today's battlefront in Afghanistan and Iraq and in the Global War on Terrorism (GWOT). At the forefront of the GWOT and irregular warfare are the United States Special Operations Command (USSOCOM...

  19. A Proposed Framework for Network-Centric Maritime Warfare Analysis

    National Research Council Canada - National Science Library

    Klingbeil, Ralph

    2003-01-01

    .... In addition, this report demonstrates how the functions of many of the independent and dependent variables and associated warfare metrics can be translated into the characteristics and metrics of queues.

  20. Motivation and requirements for determining a Network Warfare Capability

    CSIR Research Space (South Africa)

    Veerasamy, N

    2010-06-01

    Full Text Available , whereas in the latter, an assessment is given of the current state of Network Warfare skills. This assessment can involve expert opinion, controls and guidelines. According to Bragg et al, an assessment is not an audit, which is used to test compliance... approach to ensure conformance to established guidelines. The difference between network security auditing and determining a Network Warfare Capability is that network security auditing evaluates compliance with controls in a very detailed manner...

  1. The theory of unconventional warfare win, lose, and draw

    OpenAIRE

    DeFeyter, Bruce E.

    2008-01-01

    Clausewitz states that "The defensive form of warfare is intrinsically stronger than the offense" and to defeat 'the stronger form of warfare' "an army's best weapon is superior numbers." Given these two facts, how do special operations forces defeat numerically superior forces fighting in the defense? William H. McRaven's book, Spec Ops, lays out a theory of special operations and six principles that are "applicable across the spectrum of special operations" (McRaven, 1995, p. 3). McRav...

  2. Cyberspace Warfare: A New DoD Core Mission Area

    Science.gov (United States)

    2013-05-01

    7. PERFORMING ORGANIZATION NAME(S) AND ADDRESS(ES) 8. PERFORMING ORGANIZATION Joint Forces Staff College REPORT NUMBER Joint Advanced Warfighting...According to Andrew F. Krepinevich cyberspace warfare is defined as: The actions by nation-states and non-state actors to penetrate computers or... actors conducting cyberspace operations in, through, and from cyberspace as a 1 Andrew F. Krepinevich, “Cyber Warfare: A Nuclear Option,” Center for

  3. Dirty Fighting: How to Counter Total Warfare Mentality

    Science.gov (United States)

    2015-06-12

    sustained British security discipline, support for the main PIRA dirty fighting weapon (unannounced bombings) began to turn against them. This was... DIRTY FIGHTING: HOW TO COUNTER TOTAL WARFARE MENTALITY A thesis presented to the Faculty of the U.S. Army Command and... Dirty Fighting: How to Counter Total Warfare Mentality 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER 6. AUTHOR(S) Major

  4. Information Warfare, Threats and Information Security

    Directory of Open Access Journals (Sweden)

    Dmitriy Nikolaevich Bespalov

    2014-01-01

    Full Text Available The article presents the opposite, but dependent on each other's reality - Revolutionary War information,information security goals and objectives of their study within the scheme "challenge-response", methodological and analytical support, the role of elites and the information society in promoting information security. One of the features of contemporaneityis the global spread of ICT, combined with poor governance and other difficulties in the construction of innovation infrastructures that are based on them in some countries. This leads to the reproduction of threats, primarily related to the ability to use ICT for purposes that are inconsistent with the objectives of maintaining international peace and security, compliance with the principles of non-use of force, non-interference in the internal affairs of states, etc. In this regard, include such terms as "a threat of information warfare", "information terrorism" and so forth. Information warfare, which stay in the policy declared the struggle for existence, and relationships are defined in terms of "friend-enemy", "ours-foreign". Superiority over the opponent or "capture of its territory" is the aim of political activity. And information security, serving activities similar process of political control, including a set of components, is a technology until their humanitarian. From the context and the decision itself is the ratio of the achieved results of information and political influence to the target - a positive image of Russia. Bringing its policy in line with the demands of a healthy public opinion provides conductivity of theauthorities initiatives in the country and increases the legitimacy of the Russian Federation actions in the world.

  5. The Fate of Chemical Warfare Agents in the Environment

    Energy Technology Data Exchange (ETDEWEB)

    Talmage, Sylvia Smith [ORNL; Munro, Nancy B [ORNL; Watson, Annetta Paule [ORNL; King, J. [U.S. Army Environmental Center; Hauschild, Veronique [U.S. Environmental Protection Agency (EPA)

    2007-01-01

    Chemical Warfare Agents, Second Edition has been totally revised since the successful first edition and expanded to about three times the length, with many new chapters and much more in-depth consideration of all the topics. The chapters have been written by distinguished international experts in various aspects of chemical warfare agents and edited by an experienced team to produce a clear review of the field. The book now contains a wealth of material on the mechanisms of action of the major chemical warfare agents, including the nerve agent cyclosarin, formally considered to be of secondary importance, as well as ricin and abrin. Chemical Warfare Agents, Second Edition discusses the physico-chemical properties of chemical warfare agents, their dispersion and fate in the environment, their toxicology and management of their effects on humans, decontamination and protective equipment. New chapters cover the experience gained after the use of sarin to attack travelers on the Tokyo subway and how to deal with the outcome of the deployment of riot control agents such as CS gas. This book provides a comprehensive review of chemical warfare agents, assessing all available evidence regarding the medical, technical and legal aspects of their use. It is an invaluable reference work for physicians, public health planners, regulators and any other professionals involved in this field.

  6. Marine Corps NBC Warfare: Determining Clinical Supply Requirements for Treatment of Battlefield Casualties from Chemical and Biological Warfare

    National Research Council Canada - National Science Library

    Hill, Martin; Galameau, Mike; Pang, Gerry; Konoske, Paula

    2003-01-01

    ... to treat victims of biochemical agents on the battlefield. This study reviewed Marine Corps medical supply blocks for biological and chemical warfare casualties - Authorized Medical Allowance Lists (AMALs) 687 and 688...

  7. Understanding the elementary considerations in a network warfare environment: an introductory framework

    CSIR Research Space (South Africa)

    Veerasamy, N

    2008-07-01

    Full Text Available by many, there is a need for a more structured approach to understanding the various techniques required for a network warfare capability. A conceptual framework describing the most important network warfare techniques and considerations is proposed...

  8. Nuclear, biological and chemical warfare. Part I: Medical aspects of nuclear warfare.

    Science.gov (United States)

    Kasthuri, A S; Pradhan, A B; Dham, S K; Bhalla, I P; Paul, J S

    1990-04-01

    Casualties in earlier wars were due much more to diseases than to weapons. Mention has been made in history of the use of biological agents in warfare, to deny the enemy food and water and to cause disease. In the first world war chemical agents were used to cause mass casualties. Nuclear weapons were introduced in the second world war. Several countries are now involved in developing nuclear, biological and chemical weapon systems, for the mass annihilation of human beings, animals and plants, and to destroy the economy of their enemies. Recently, natural calamities and accidents in nuclear, chemical and biological laboratories and industries have caused mass instantaneous deaths in civilian population. The effects of future wars will not be restricted to uniformed persons. It is time that physicians become aware of the destructive potential of these weapons. Awareness, immediate protective measures and first aid will save a large number of persons. This series of articles will outline the medical aspects of nuclear, biological and chemical weapon systems in three parts. Part I will deal with the biological effects of a nuclear explosion. The short and long term effects due to blast, heat and associated radiation are highlighted. In Part II, the role of biological agents which cause commoner or new disease patterns is mentioned. Some of the accidents from biological warfare laboratories are a testimony to its potential deleterious effects. Part III deals with medical aspects of chemical warfare agents, which in view of their mass effects can overwhelm the existing medical resources, both civilian and military.(ABSTRACT TRUNCATED AT 250 WORDS)

  9. The 2006 Lebanon Campaign and the Future of Warfare: Implications for Army and Defense Policy

    Science.gov (United States)

    2008-09-01

    ground, see, e.g., Mao Tse-Tung, On Guerrilla Warfare, Samuel B. Griffith, trans., Mineola, NY: Dover, 2005, pp. 52, 97, 102; Ernesto Guevara...Guerrilla Warfare, Old Chelsea, NY: Ocean Press, 2006, pp. 20, 22, 26; Ian F.W. Beckett , Modern Insurgencies and Counter-Insurgencies, New York...Clodfelter, Warfare and Armed Conflicts, pp. 689-690, 696, 712, 757-759). 15. See, e.g., Mao, On Guerrilla Warfare, pp. 55-57, 113; Beckett , Modern

  10. Russian New Art of Hybrid Warfare in Ukraine

    Directory of Open Access Journals (Sweden)

    Rusnáková Soňa

    2017-10-01

    Full Text Available The main aim of this paper is to analyse the annexation of Crimea by the Russian Federation. For the purposes of the paper, the theory of hybrid warfare was chosen as an analytical category. Throughout the paper, the concept of hybrid warfare is examined and applied on case study of Crimean annexation. Hybrid warfare, especially in connection with Russian actions in Crimea has been an intensely debated concept. There is an ongoing debate among scholars concerning the meaning of the concept, its existence and employment by the Russian Federation. This paper showed that the article of Valeriy Gerasimov – the incumbent Chief of the General Staff of the Russian Federation-invoked a new warfare strategy for the Russian Federation which was consequently for the very first time in its full spectre and effectivity employed on case of Crimean annexation in March 2014. Observing the application of the hybrid warfare in practice serves the purposes of countering its further potential application in post-Soviet space and Russian ‘near abroad’.

  11. Numerical simulation of RCS for carrier electronic warfare airplanes

    Directory of Open Access Journals (Sweden)

    Yue Kuizhi

    2015-04-01

    Full Text Available This paper studies the radar cross section (RCS of carrier electronic warfare airplanes. Under the typical naval operations section, the mathematical model of the radar wave’s pitch angle incidence range analysis is established. Based on the CATIA software, considering dynamic deflections of duck wing leading edge flaps, flaperons, horizontal tail, and rudder, as well as aircraft with air-to-air missile, anti-radiation missile, electronic jamming pod, and other weapons, the 3D models of carrier electronic warfare airplanes Model A and Model B with weapons were established. Based on the physical optics method and the equivalent electromagnetic flow method, by the use of the RCSAnsys software, the characteristics of carrier electronic warfare airplanes’ RCS under steady and dynamic flights were simulated under the UHF, X, and S radar bands. This paper researches the detection probability of aircraft by radars under the condition of electronic warfare, and completes the mathematical statistical analysis of the simulation results. The results show that: The Model A of carrier electronic warfare airplane is better than Model B on stealth performance and on discover probability by radar detection effectively.

  12. History of biological warfare and bioterrorism.

    Science.gov (United States)

    Barras, V; Greub, G

    2014-06-01

    Bioterrorism literally means using microorganisms or infected samples to cause terror and panic in populations. Bioterrorism had already started 14 centuries before Christ, when the Hittites sent infected rams to their enemies. However, apart from some rare well-documented events, it is often very difficult for historians and microbiologists to differentiate natural epidemics from alleged biological attacks, because: (i) little information is available for times before the advent of modern microbiology; (ii) truth may be manipulated for political reasons, especially for a hot topic such as a biological attack; and (iii) the passage of time may also have distorted the reality of the past. Nevertheless, we have tried to provide to clinical microbiologists an overview of some likely biological warfare that occurred before the 18th century and that included the intentional spread of epidemic diseases such as tularaemia, plague, malaria, smallpox, yellow fever, and leprosy. We also summarize the main events that occurred during the modern microbiology era, from World War I to the recent 'anthrax letters' that followed the World Trade Center attack of September 2001. Again, the political polemic surrounding the use of infectious agents as a weapon may distort the truth. This is nicely exemplified by the Sverdlovsk accident, which was initially attributed by the authorities to a natural foodborne outbreak, and was officially recognized as having a military cause only 13 years later. © 2014 The Authors Clinical Microbiology and Infection © 2014 European Society of Clinical Microbiology and Infectious Diseases.

  13. Chemical Warfare Agent Degradation and Decontamination

    Energy Technology Data Exchange (ETDEWEB)

    Talmage, Sylvia Smith [ORNL; Watson, Annetta Paule [ORNL; Hauschild, Veronique [U.S. Environmental Protection Agency; Munro, Nancy B [ORNL; King, J. [U.S. Army Environmental Center

    2007-02-01

    The decontamination of chemical warfare agents (CWA) from structures, environmental media, and even personnel has become an area of particular interest in recent years due to increased homeland security concerns. In addition to terrorist attacks, scenarios such as accidental releases of CWA from U.S. stockpile sites or from historic, buried munitions are also subjects for response planning. To facilitate rapid identification of practical and effective decontamination approaches, this paper reviews pathways of CWA degradation by natural means as well as those resulting from deliberately applied solutions and technologies; these pathways and technologies are compared and contrasted. We then review various technologies, both traditional and recent, with some emphasis on decontamination materials used for surfaces that are difficult to clean. Discussion is limited to the major threat CWA, namely sulfur mustard (HD, bis(2-chloroethyl)sulfide), VX (O-ethyl S-(2-diisopropylaminoethyl) methylphosphonothioate), and the G-series nerve agents. The principal G-agents are GA (tabun, ethyl N,N-dimethylphosphoramidocyanidate), GB (sarin, isopropyl methylphosphonofluoridate), and GD (soman, pinacolyl methylphosphonofluoridate). The chemical decontamination pathways of each agent are outlined, with some discussion of intermediate and final degradation product toxicity. In all cases, and regardless of the CWA degradation pathway chosen for decontamination, it will be necessary to collect and analyze pertinent environmental samples during the treatment phase to confirm attainment of clearance levels.

  14. IMS software developments for the detection of chemical warfare agent

    Science.gov (United States)

    Klepel, ST.; Graefenhain, U.; Lippe, R.; Stach, J.; Starrock, V.

    1995-01-01

    Interference compounds like gasoline, diesel, burning wood or fuel, etc. are presented in common battlefield situations. These compounds can cause detectors to respond as a false positive or interfere with the detector's ability to respond to target compounds such as chemical warfare agents. To ensure proper response of the ion mobility spectrometer to chemical warfare agents, two special software packages were developed and incorporated into the Bruker RAID-1. The programs suppress interferring signals caused by car exhaust or smoke gases resulting from burning materials and correct the influence of variable sample gas humidity which is important for detection and quantification of blister agents like mustard gas or lewisite.

  15. The Cycle of Warfare - Analysis of an Analytical Model

    DEFF Research Database (Denmark)

    Jensen, Mikkel Storm

    2016-01-01

    The abstract has the title: “The Cycle of Warfare - Analysis of an Analytical Model” The Cycle of Warfare is an analytical model designed to illustrate the coherence between the organization, doctrine and technology of a military entity and the influence of the surrounding society as expressed...... both retrospectively and predictively. As a tool for historians the model can help to identify decisive factors in developments and outcomes. As a tool for intelligence analysts, it can be used predictively to identify likely possible outcomes or unknown elements in analysed entities....

  16. Media Technologies and Their Role in the Information Warfare

    Directory of Open Access Journals (Sweden)

    Владимир Александрович Федоров

    2016-12-01

    Full Text Available The article analyzes the new role of the mass media in the modern information space, the basic techniques and technologies of focused preparation, semantic distortion and emotional coloring of the transmitted information. The value of the mass media is estimated as the main weapon of the information warfare in the modern geopolitical space. Specific examples and techniques for manipulating information.

  17. Biomonitoring of exposure to chemical warfare agents: A review

    NARCIS (Netherlands)

    Noort, D.; Benschop, H.P.; Black, R.M.

    2002-01-01

    In this report an overview of the methods currently available for detection of exposure to a number of chemical warfare agents (CWA), i.e., sulfur mustard, lewisite and nerve agents, is presented. Such methods can be applied for various purposes, e.g., diagnosis and dosimetry of exposure of

  18. Influence Operations in Insurgencies: Identifying Framing Strategies for Special Warfare

    Science.gov (United States)

    2014-12-01

    Military Information Support Operations MAR Minorities at Risk MAROB Minorities at Risk Organizational Behavior POQC Psychological Operations...and others use religious violence as a form of cleansing to eradicate “ infidels .”16 While individuals who are motivated by visions of the...indigenous personnel for Special Warfare through psychological and cognitive means. The Military Information Support Operations Command (MISOC) mission

  19. The Ottawa Treaty and Coalition Warfare: An Unholy Alliance?

    National Research Council Canada - National Science Library

    Weddle, Kevin

    1999-01-01

    ...) on our ability to execute successful coalition warfare. This paper describes the serious implications for NATO and Coalition operations in view of the bulk of our Allies signing the Ottawa Treaty banning the use of all anti-personnel landmines (APLs...

  20. The political economy of warfare in nineteeth century Benin kingdom ...

    African Journals Online (AJOL)

    This paper examines how the interactions of politics and economy influenced the changing perspective on warfare in nineteenth century Benin Kingdom. The study investigates how the combined political and economic behaviour of Benin affected the rebuilding of military power as instrument of political policy in furtherance ...

  1. blitzkrieg to desert storm: the evolution of operational warfare

    African Journals Online (AJOL)

    a_nabb

    disease of stalemates infecting militaries before the Second World War. The invasion did not change the world; instead, it brought about an increased awareness of the importance of the operational level of war, a dimension of warfare previously neglected. The German operational effectiveness represented an evolution ...

  2. Nanostructured Metal Oxides for Stoichiometric Degradation of Chemical Warfare Agents

    Czech Academy of Sciences Publication Activity Database

    Štengl, Václav; Henych, Jiří; Janos, P.; Skoumal, M.

    2016-01-01

    Roč. 236, č. 2016 (2016), s. 239-258 ISSN 0179-5953 R&D Projects: GA ČR(CZ) GAP106/12/1116 Institutional support: RVO:61388980 Keywords : chemical warfare agent * metal nanoparticle * unique surface-chemistry * mesoporous manganese oxide Subject RIV: CA - Inorganic Chemistry Impact factor: 3.930, year: 2016

  3. relevance of information warfare models to critical infrastructure

    African Journals Online (AJOL)

    ismith

    not be applicable to every possible scenario; however, the intention is to illustrate their relevance in many .... digital communications system, where the vehicles are analogous to bits or packets, intersections for routers or ..... wireless channel, and negatively impact on the systems that rely on that channel. Electronic warfare.

  4. Management information systems for electronic warfare command and decision support

    CSIR Research Space (South Africa)

    Van Niekerk, B

    2015-04-01

    Full Text Available information to allow them to manage their own spectrum, to identify threats, and to deny adversaries’ use of the spectrum. In this paper, the concepts of integrated electronic warfare and spectrum battle management are introduced, and the relevant information...

  5. Manoeuvre warfare analysis of South Africa's 1914-1915 German ...

    African Journals Online (AJOL)

    The study reported in this article explored the nexus between military theory and history. Military theory attempts to quantify, qualify and illuminate the often unpredictable phenomenon of war. The article consists of two parts: the theory of manoeuvre warfare and the history of the 1914-1915 South African campaign in ...

  6. Simulating cyber warfare and cyber defenses: information value considerations

    Science.gov (United States)

    Stytz, Martin R.; Banks, Sheila B.

    2011-06-01

    Simulating cyber warfare is critical to the preparation of decision-makers for the challenges posed by cyber attacks. Simulation is the only means we have to prepare decision-makers for the inevitable cyber attacks upon the information they will need for decision-making and to develop cyber warfare strategies and tactics. Currently, there is no theory regarding the strategies that should be used to achieve objectives in offensive or defensive cyber warfare, and cyber warfare occurs too rarely to use real-world experience to develop effective strategies. To simulate cyber warfare by affecting the information used for decision-making, we modify the information content of the rings that are compromised during in a decision-making context. The number of rings affected and value of the information that is altered (i.e., the closeness of the ring to the center) is determined by the expertise of the decision-maker and the learning outcome(s) for the simulation exercise. We determine which information rings are compromised using the probability that the simulated cyber defenses that protect each ring can be compromised. These probabilities are based upon prior cyber attack activity in the simulation exercise as well as similar real-world cyber attacks. To determine which information in a compromised "ring" to alter, the simulation environment maintains a record of the cyber attacks that have succeeded in the simulation environment as well as the decision-making context. These two pieces of information are used to compute an estimate of the likelihood that the cyber attack can alter, destroy, or falsify each piece of information in a compromised ring. The unpredictability of information alteration in our approach adds greater realism to the cyber event. This paper suggests a new technique that can be used for cyber warfare simulation, the ring approach for modeling context-dependent information value, and our means for considering information value when assigning cyber

  7. The Battle for Hue: Casualty and Disease Rates during Urban Warfare

    Science.gov (United States)

    1993-08-01

    NAVAL HEALTH RESEARCH CENTER AD-A271 748 THE BATTLE FOR HUE: CASUALTY AND DISEASE RATES DURING URBAN WARFARE C. G. Blood M. E. Anderson DTIC...prior to the first casualties being sustained. 2 The Battle for Flue: Casualty and Disease Rates During Urban Warfare Renewed nationalism with the ending...TITLE AND SUBTITLE 5. FUNDING NUMBERS The Battle for Hue: Casualty and Disease Rates Program Element: 63706N During Urban Warfare Work Unit Number: 6

  8. Stuxnet and Cyber-Warfare (2/2)

    CERN Multimedia

    CERN. Geneva

    2016-01-01

    The first part of the lecture is devoted to the description of the Stuxnet worm, the first cyber-weapon whose existence has been made public, discovered in 2010 and targeting a specific industrial control system; the worm is responsible for the damaging of many centrifuges at an uranium enrichment facility, with the goal of sabotaging Iran's nuclear program. In the second part, the main features of cyber-warfare in conflict and pre-conflict activities will be discussed and compared to the conventional warfare domains, with also a general view at the international political debate on this topic.   Check the http://pugwash.org web site, an organisation that seeks a world free of nuclear weapons and other weapons of mass destruction. The lecturer invites comments via email to Gian.Piero.Siroli@cern.ch NB! All Academic Training lectures are recorded and are publicly available. There is no live webcast.

  9. Stuxnet and Cyber-Warfare (1/2)

    CERN Multimedia

    CERN. Geneva

    2016-01-01

    The first part of the lecture is devoted to the description of the Stuxnet worm, the first cyber-weapon whose existence has been made public, discovered in 2010 and targeting a specific industrial control system; the worm is responsible for the damaging of many centrifuges at an uranium enrichment facility, with the goal of sabotaging Iran's nuclear program. In the second part, the main features of cyber-warfare in conflict and pre-conflict activities will be discussed and compared to the conventional warfare domains, with also a general view at the international political debate on this topic. Check the http://pugwash.org web site, an organisation that seeks a world free of nuclear weapons and other weapons of mass destruction.   NB! All Academic Training lectures are recorded and are publicly available. There is no live webcast.

  10. Cutaneous reactions in nuclear, biological and chemical warfare

    Directory of Open Access Journals (Sweden)

    Arora Sandeep

    2005-03-01

    Full Text Available Nuclear, biological and chemical warfare have in recent times been responsible for an increasing number of otherwise rare dermatoses. Many nations are now maintaining overt and clandestine stockpiles of such arsenal. With increasing terrorist threats, these agents of mass destruction pose a risk to the civilian population. Nuclear and chemical attacks manifest immediately while biological attacks manifest later. Chemical and biological attacks pose a significant risk to the attending medical personnel. The large scale of anticipated casualties in the event of such an occurrence would need the expertise of all physicians, including dermatologists, both military and civilian. Dermatologists are uniquely qualified in this respect. This article aims at presenting a review of the cutaneous manifestations in nuclear, chemical and biological warfare and their management.

  11. Containment 2.0: U.S. Political Warfare

    Science.gov (United States)

    2016-12-01

    and was intended to ensure the heritage , culture , and languages of ethnic minorities in the Soviet Union were maintained. The secondary objective was...http://ndupress.ndu.edu/Media/News/News-Article-View/Article/643108/unconventional- warfare-in-the-gray-zone/. 4 radio messaging, and cultural ...staging a communist coup in Czechoslovakia in early 1948.28 Furthermore, each of these events started with the sponsorship of pro-communist movements

  12. Handbook on Ground Forces Attrition in Modern Warfare

    Science.gov (United States)

    1986-09-01

    Dupuy d ELECTE John R. Brinkerhoff 0 APR 2 81994 C. Curtiss Johnson Peter J. Clark A Division of: DATA MEMORY SYSTEMS, INC. 10332 Democracy Lane Thi...Evaluation and Fe.earch Organization A Division of Data Memory Systems.. Inc. 10392 Democracy Lcne * Fairfax, Virginia 22030 Tel,: (703) 591-36ඒ The...data base touching a variety of aspects of warfare and analyzed it using techniques of the social and behavioral sciences. The work considers

  13. Just War and Postmodern Warfare: A German Case Study

    Science.gov (United States)

    2015-04-01

    non-lethal in equal measure. In many ways, Germany’s Bundeswehr (military) construct and participation in various conflicts mirror contemporary just...war theory and postmodern warfare, while its military concept lacks the necessary postmodern balance. The Bundeswehr stands in stark contrast to...the United States. The Bundeswehr is only employed for the purposes of defending German citizens where the United States military can be employed to

  14. Employing U.S. Information Operations Against Hybrid Warfare Threats

    Science.gov (United States)

    2013-03-01

    19b. TELEPHONE NUMBER (Include area code ) USAWC STRATEGY RESEARCH PROJECT Employing U.S. Information Operations Against...hostile computer code through internet infrastructure in multiple countries en route to the target) have enormous legal ramifications. Even within the...59 145 William J. Nemeth , Future War And Chechnya: A Case For Hybrid Warfare, (Monterey CA: Naval Postgraduate School, June 2002), 74. 146 U.S

  15. Information Warfare and Information Operations: Protecting The Global Information Environment.

    Science.gov (United States)

    1998-03-06

    findings in a November 1996 report described by the Wall Street Journal as "unusually strident.൮ It made 13 recommendations, including one for...Funds Moved Around World", The Wall Street Journal , September 12, 1995, p 1. 21 Data Provided By Member of the President’s Commission on Critical...U.S. Department of Defense, April 1997, 230. 38 Thomas E. Ricks, "Information Warfare Defense is Urged", Wall Street Journal , 6 January 1997, Section

  16. Wrestling the Bear: The Rise of Russian Hybrid Warfare

    Science.gov (United States)

    2015-04-13

    search.proguest.com.nduezproxy.idm.oclc.orgldocview/1 545535275?accountid.:: J2686. (accessed on 4 December 2014). 14 Reuters, " Malaysia : Dutch...with subversive efforts. The aggressor often resorts to clandestine actions, to avoid attribution or retribution. Without a credible smoking gun, NATO...2015. Accessed December 27, 2014. http://www .nato.int/docu/review/20 14/ Also-in-20 14/Deterring-hybrid- warfare/EN/index .htm. Reuters,. ’ Malaysia

  17. Nodes and Codes: The Reality of Cyber Warfare

    Science.gov (United States)

    2012-05-17

    that spin highly toxic, corrosive , and radioactive uranium gas (Uranium Hexafluoride) at over 100,000...Policy for Information Warfare,” Intellibriefs, http://intellibriefs.blogspot.com/2009_03_22_archive.html (accessed February 11, 2012). 81 Marina ...commentary_battlefield_on_your_desktop/2345202.html (accessed December 13, 2011). Myakisheva, Marina . “What is Russia’s Answer to Cyber Threats?” CNews.ru

  18. Enterprises as Inquiring Systems with Implications for Information Warfare

    Science.gov (United States)

    2014-06-01

    applying C. West Churchman’s characterization of Western epistemology , which was born in the tradition of the philosophy of science, in the business... epistemology they most closely resemble. 2.1 Lockian Model The Lockian model bases reasoning on experiment and consensus. Empirical information is gathered...defined as the “integrated employment of the core capabilities of electronic warfare, computer network operations, psychological operations, military

  19. Russian and Chinese Information Warfare: Theory and Practice

    Science.gov (United States)

    2004-06-01

    Integral neurolinguistic programming •Placing essential programs into the conscious or sub- conscious mind •Subconscious suggestions that modify human...Generators of special rays •Optical systems • Neurolinguistic programming •Computer psychotechnology •The mass media •Audiovisual effects •Special effects...Information Warfare: Theory and Practice 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER 6. AUTHOR(S) 5d. PROJECT NUMBER 5e

  20. 78 FR 29699 - Transfer of Administrative Jurisdiction: Marine Corps Mountain Warfare Training Center...

    Science.gov (United States)

    2013-05-21

    ... Forest Service Transfer of Administrative Jurisdiction: Marine Corps Mountain Warfare Training Center... order authorizing the transfer of administrative jurisdiction from the Department of Agriculture to the..., lying within the Marine Corps Mountain Warfare Training Center and the Humboldt-Toiyabe National Forest...

  1. Metal organic frameworks for the catalytic detoxification of chemical warfare nerve agents

    Science.gov (United States)

    Hupp, Joseph T.; Farha, Omar K.; Katz, Michael J.; Mondloch, Joseph E.

    2017-04-18

    A method of using a metal organic framework (MOF) comprising a metal ion and an at least bidendate organic ligand to catalytically detoxify chemical warfare nerve agents including exposing the metal-organic-framework (MOF) to the chemical warfare nerve agent and catalytically decomposing the nerve agent with the MOF.

  2. Defending Our Satellites: The Need for Electronic Warfare Education and Training

    Science.gov (United States)

    2015-12-01

    74 | Air & Space Power Journal Defending Our Satellites The Need for Electronic Warfare Education and Training Lt Col E. Lincoln Bonner, USAF...expanding education and training in the use of electronic warfare to defend US satellites and improve their survivability. The following discussion...Fighting The US military gains a disproportionate advantage over potential adversaries by exploiting space capabilities. Satellites provide an

  3. Status of dental health in chemical warfare victims: The case of Isfahan, Iran

    Directory of Open Access Journals (Sweden)

    Ahmad Mottaghi

    2012-01-01

    Conclusion: Chemical warfare victims have relatively poor dental/oral health. Chemical injury might cause a dysfunction in saliva secretion, with decrease in saliva secretion increasing the risk for tooth decay and periodontal disorders. Further research is required to find out the exact underlying mechanisms and the factors associated with poor dental/oral health in chemical warfare victims.

  4. Application of non-quantitative modelling in the analysis of a network warfare environment

    CSIR Research Space (South Africa)

    Veerasamy, N

    2008-07-01

    Full Text Available Network warfare is an emerging concept that focuses on the network and computer based forms through which information is attacked and defended. Various computer and network security concepts thus play a role in network warfare. Due the intricacy...

  5. Summary of Research 1995, Interdisciplinary Academic Groups (Command, Control & Communications Academic Group, Electronic Warfare Academic Group, Space Systems Academic Group and Undersea Warfare Academic Group)

    OpenAIRE

    Faculty of the Academic Groups

    1995-01-01

    The views expressed in this report are those of the authors and do not reflect the official policy or position of the Department of Defense or the U.S. Government. This report contains information of research projects in the four interdisciplinary groups, Command, Control & Communications Academic Group, Electronic Warfare Academic Group, Space Systems Academic Group and Undersea Warfare Academic Group, which were carried out under funding of the Naval Postgraduate School Research...

  6. Women and Warfare in Pre-Colonial Akokoland

    Directory of Open Access Journals (Sweden)

    Olusanya Faboyede

    2013-06-01

    Full Text Available In pre-colonial Akokoland, the most conspicuous fact about its political economy and peace was security challenges and mismanagement through internal and external manipulation. This paper analyses the role of women in warfare in pre-colonial Akokoland as a potential to integrate Akokoland, a multi-cultural community for productive and sustained effort to promote economic development in the region. Thus, the paper is conceptualised on historical objectivity. The paper argues that one of the ways of dealing with the scale of insecurity in the society is to assimilate historical thinking into the intention of the security agents (women warriors.

  7. Russian Military Thinking – A New Generation of Warfare

    Directory of Open Access Journals (Sweden)

    Mattsson Peter A.

    2015-06-01

    Full Text Available This article deals with how Russian warfighting is described and discussed in contemporary Russian military theory. The approach has been studies, analyses and interpretations of primarily Russian sources as prominent Russian journals, but also Western analyses and interpretations of contemporary Russian warfighting discussions. Theoretical considerations are limited to the period from the 1980s to the present day - 2014. Mainly Russian experts on military theory (Bogdanov, Chekinov, Gareev, Kiselyov, Kuralenko, Morozov, Slipchenko, Vinogradov, Vladimirov, Vorobyov have been studied, but also sources from some prominent Western experts on Russian warfare (FitzGerald, Gileotti, Kipp, McDermott.

  8. Lawfare in Hybrid Wars: The 21st Century Warfare

    OpenAIRE

    Mosquera, A.; Bachmann, Sascha-Dominik

    2016-01-01

    In the context of ‘Hybrid Warfare’ as 21st Century’s threat to peace and security, this paper intends to address the role of Lawfare. The use of law as a weapon, Lawfare,1can have a tangible impact on democratic States when their adversaries use it in an exploitative way. Lawfare can be used in the context of Hybrid War.2 Examples of Hybrid Warfare as witnessed in the Russian/Ukrainian conflict of 2014/2015 and the ongoing conflict with Daesh are particularly sensitive to Lawfare due to an ap...

  9. Cybersecurity protecting critical infrastructures from cyber attack and cyber warfare

    CERN Document Server

    Johnson, Thomas A

    2015-01-01

    The World Economic Forum regards the threat of cyber attack as one of the top five global risks confronting nations of the world today. Cyber attacks are increasingly targeting the core functions of the economies in nations throughout the world. The threat to attack critical infrastructures, disrupt critical services, and induce a wide range of damage is becoming more difficult to defend against. Cybersecurity: Protecting Critical Infrastructures from Cyber Attack and Cyber Warfare examines the current cyber threat landscape and discusses the strategies being used by governments and corporatio

  10. Built to Outlast: Operational Approaches to Hybrid Warfare

    Science.gov (United States)

    2012-05-17

    PAGE 19b. PHONE NUMBER (include area code ) (U) (U) (U) (U) 100 (913)758-3300 Standard Form 298 (Rev. 8-98) Prescribed by ANSI Std. Z39.18 i...William J. Nemeth , Future War and Chechnya: A Case for Hybrid Warfare (master’s thesis, US Naval Postgraduate School, 2002); Erin M. Simpson...2005). Unpublished papers pre-dating Hoffman’s effort include a 2002 Master’s thesis by William J. Nemeth which represents the earliest scholarly work

  11. Venezuela’s Hugo Chavez, Bolivarian Socialism, and Asymmetric Warfare

    Science.gov (United States)

    2005-10-01

    lead to a better life for all. Finally, taken all together, this is “war as a whole,” or what Chávez calls “ Guerra de todo el pueblo...VENEZUELA’S HUGO CHÁVEZ, BOLIVARIAN SOCIALISM, AND ASYMMETRIC WARFARE Beginning with the election of Lieutenant Colonel Hugo Chávez Frias as President...financial, material, and political-military support of people’s movements.31 This takes us to the notion of “ Guerra de todo el pueblo” (war of all

  12. Environmental assessments of sea dumped chemical warfare agents

    DEFF Research Database (Denmark)

    Sanderson, Hans; Fauser, Patrik

    This is a report on the information gathered during work related to sea dumped chemical warfare agents. It mainly reviews the work conducted in relation to the installation of the two Nord Stream gas pipeline from 2008-2012. The focus was on the weight-of-evidence risk assessment of disturbed CWA...... residues in connection with the installation of the pipelines. Novel exposure and toxicity assessments are presented and the risk is assessed. The overall conclusion is that there is a negligible acute added CWA risk towards the fish community from the installation of the pipelines....

  13. Destruction of chemical warfare agents using metal-organic frameworks

    Science.gov (United States)

    Mondloch, Joseph E.; Katz, Michael J.; Isley, William C., III; Ghosh, Pritha; Liao, Peilin; Bury, Wojciech; Wagner, George W.; Hall, Morgan G.; Decoste, Jared B.; Peterson, Gregory W.; Snurr, Randall Q.; Cramer, Christopher J.; Hupp, Joseph T.; Farha, Omar K.

    2015-05-01

    Chemical warfare agents containing phosphonate ester bonds are among the most toxic chemicals known to mankind. Recent global military events, such as the conflict and disarmament in Syria, have brought into focus the need to find effective strategies for the rapid destruction of these banned chemicals. Solutions are needed for immediate personal protection (for example, the filtration and catalytic destruction of airborne versions of agents), bulk destruction of chemical weapon stockpiles, protection (via coating) of clothing, equipment and buildings, and containment of agent spills. Solid heterogeneous materials such as modified activated carbon or metal oxides exhibit many desirable characteristics for the destruction of chemical warfare agents. However, low sorptive capacities, low effective active site loadings, deactivation of the active site, slow degradation kinetics, and/or a lack of tailorability offer significant room for improvement in these materials. Here, we report a carefully chosen metal-organic framework (MOF) material featuring high porosity and exceptional chemical stability that is extraordinarily effective for the degradation of nerve agents and their simulants. Experimental and computational evidence points to Lewis-acidic ZrIV ions as the active sites and to their superb accessibility as a defining element of their efficacy.

  14. Punishment sustains large-scale cooperation in prestate warfare

    Science.gov (United States)

    Mathew, Sarah; Boyd, Robert

    2011-01-01

    Understanding cooperation and punishment in small-scale societies is crucial for explaining the origins of human cooperation. We studied warfare among the Turkana, a politically uncentralized, egalitarian, nomadic pastoral society in East Africa. Based on a representative sample of 88 recent raids, we show that the Turkana sustain costly cooperation in combat at a remarkably large scale, at least in part, through punishment of free-riders. Raiding parties comprised several hundred warriors and participants are not kin or day-to-day interactants. Warriors incur substantial risk of death and produce collective benefits. Cowardice and desertions occur, and are punished by community-imposed sanctions, including collective corporal punishment and fines. Furthermore, Turkana norms governing warfare benefit the ethnolinguistic group, a population of a half-million people, at the expense of smaller social groupings. These results challenge current views that punishment is unimportant in small-scale societies and that human cooperation evolved in small groups of kin and familiar individuals. Instead, these results suggest that cooperation at the larger scale of ethnolinguistic units enforced by third-party sanctions could have a deep evolutionary history in the human species. PMID:21670285

  15. Challenges of Military Health Service Support in Mountain Warfare.

    Science.gov (United States)

    Lechner, Raimund; Küpper, Thomas; Tannheimer, Markus

    2018-03-16

    History is full of examples of the influence of the mountain environment on warfare. The aim of this article is to identify the main environmental hazards and summarize countermeasures to mitigate the impact of this unique environment. A selective PubMed and Internet search was conducted. Additionally, we searched bibliographies for useful supplemental literature and included the recommendations of the leading mountain medicine and wilderness medicine societies. A definition of mountain warfare mainly derived from environmental influences on body functions is introduced to help identify the main environmental hazards. Cold, rugged terrain, hypoxic exposure, and often a combination and mutual aggravation of these factors are the most important environmental factors of mountain environment. Underestimating this environmental influence has decreased combat strength and caused thousands of casualties during past conflicts. Some marked differences between military and civilian mountaineering further complicate mission planning and operational sustainability. To overcome the restrictions of mountain environments, proper planning and preparation, including sustained mountain mobility training, in-depth mountain medicine training with a special emphasize on prolonged field care, knowledge of acclimatization strategies, adapted time calculations, mountain-specific equipment, air rescue strategies and makeshift evacuation strategies, and thorough personnel selection, are vital to guarantee the best possible medical support. The specifics of managing risks in mountain environments are also critical for civilian rescue missions and humanitarian aid. Copyright © 2018 Wilderness Medical Society. Published by Elsevier Inc. All rights reserved.

  16. China's Use of Cyber Warfare: Espionage Meets Strategic Deterrence

    Directory of Open Access Journals (Sweden)

    Magnus Hjortdal

    2011-01-01

    Full Text Available This article presents three reasons for states to use cyber warfare and shows that cyberspace is—and will continue to be—a decisive element in China's strategy to ascend in the international system. The three reasons are: deterrence through infiltration of critical infrastructure; military technological espionage to gain military knowledge; and industrial espionage to gain economic advantage. China has a greater interest in using cyberspace offensively than other actors, such as the United States, since it has more to gain from spying on and deterring the United States than the other way around. The article also documents China's progress in cyber warfare and shows how it works as an extension of its traditional strategic thinking and the current debate within the country. Several examples of cyber attacks traceable to China are also presented. This includes cyber intrusions on a nuclear arms laboratory, attacks on defense ministries (including the Joint Strike Fighter and an airbase and the U.S. electric grid, as well as the current Google affair, which has proved to be a small part of a broader attack that also targeted the U.S. Government. There are, however, certain constraints that qualify the image of China as an aggressive actor in cyberspace. Some believe that China itself is the victim of just as many attacks from other states. Furthermore, certain actors in the United States and the West have an interest in overestimating China's capabilities in cyberspace in order to maintain their budgets.

  17. Integrated Swarming Operations for Air Base Defense: Applications in Irregular Warfare

    National Research Council Canada - National Science Library

    Gray, Ron

    2006-01-01

    .... However, in low-intensity conflicts (LICs) or irregular warfare (IW) campaigns, U.S. forces are faced with an irregular enemy, one that does not choose to fight its forces directly, but rather through unconventional or indirect methods...

  18. Understanding "Understanding" Flow for Network-Centric Warfare: Military Knowledge-Flow Mechanics

    National Research Council Canada - National Science Library

    Nissen, Mark

    2002-01-01

    Network-centric warfare (NCW) emphasizes information superiority for battlespace efficacy, but it is clear that the mechanics of how knowledge flows are just as important as those pertaining to the networks and communication...

  19. Defense Base Closure and Realignment Budget Data for the Naval Surface Warfare Center

    National Research Council Canada - National Science Library

    1993-01-01

    ... and realignment military construction projects. This report provides the results of the audit related to the realignment of Naval Surface Warfare Centers elements in White Oak, Maryland, and Panama City, Florida, to Dahlgren, Virginia...

  20. Optimizing Armed Forces Capabilities for Hybrid Warfare – New Challenge for Slovak Armed Forces

    Directory of Open Access Journals (Sweden)

    Peter PINDJÁK

    2015-09-01

    Full Text Available The paper deals with the optimization of military capabilities of the Slovak Armed Forces for conducting operations in a hybrid conflict, which represents one of the possible scenarios of irregular warfare. Whereas in the regular warfare adversaries intend to eliminate the centers of gravity of each other, most often command and control structures, in irregular conflicts, the center of gravity shifts towards the will and cognitive perception of the target population. Hybrid warfare comprises a thoroughly planned combination of conventional military approaches and kinetic operations with subversive, irregular activities, including information and cyber operations. These efforts are often accompanied by intensified activities of intelligence services, special operation forces, and even mercenary and other paramilitary groups. The development of irregular warfare capabilities within the Slovak Armed Forces will require a progressive transformation process that may turn the armed forces into a modern and adaptable element of power, capable of deployment in national and international crisis management operations.

  1. Interoperability and Network-Centric Warfare: US Army Future Force and German Army in 2015

    National Research Council Canada - National Science Library

    Alme, Thorsten

    2005-01-01

    .... Special consideration is given to technical and behavioral interoperability. The monograph also assesses the projected capabilities of the German Bundeswehr in the year 2015 with regard to Network-Centric Warfare (NCW...

  2. Analysis of Acoustic Effects on Marine Mammals for the Proposed Undersea Warfare Training Range

    National Research Council Canada - National Science Library

    Jette, Steven D; Cembrola, Joan M; Mitchell, Glenn H; Fetherston, Thomas N

    2005-01-01

    ...) for the proposed Undersea Warfare Training Range (USWTR). The DEIS includes an assessment of the effects of Navy sonars on marine mammals during exercises to occur on the range as required by the Marine Mammal Protection Act (MMPA...

  3. Surface Warfare Officer Retention: Analysis of Individual Ready Reserve Survey Data

    National Research Council Canada - National Science Library

    Stoker, Carol; Crawford, Alice

    2008-01-01

    ... (including morale and lack of mentoring), push both men and women out of the Navy. Nonetheless, the Navy s primary effort to improve retention has been to introduce the Surface Warfare Officer Continuation Pay (SWOCP...

  4. Diagnosis of Exposure to Chemical Warfare Agents: A Comprehensive Literature Survey 1990-2005

    National Research Council Canada - National Science Library

    Noort, D

    2006-01-01

    This report is an update of TNO report PML 2003-A63. In this report an overview is presented of the methods currently available for detection of exposure to a number of chemical warfare agents (CWA), i.e...

  5. Information Warfare: Issues Associated with the Defense of DOD Computers and Computer Networks

    National Research Council Canada - National Science Library

    Franklin, Derek

    2002-01-01

    ... that may threaten the critical information pathways of the armed forces An analysis of the history of computer information warfare reveals that there was an embarrassing lack of readiness and defense...

  6. The Third World War? In The Cyberspace. Cyber Warfare in the Middle East.

    Directory of Open Access Journals (Sweden)

    Martina

    2014-06-01

    Full Text Available This article aims to provide a brief and comprehensive introduction to the issue of cyber warfare and to display the recent development in this area. Geographically, it focuses on the Middle East region, since the vast majority of the most important recent cyber attacks appeared just in there or were connected to it. The first part of the article tries to define the key notion of cyber warfare, compares it to the standard warfare and presents different types of cyber weapons that are known today. The second part points out examples of the most striking recent cyber attacks and uses them as evidences to demonstrate today's importance and dissemination of cyber warfare. Finally, the article sums up pros and cons of the cyber weapons and, in view of these, predicts a significant increase in their use in any future war conflicts.

  7. The Army Ground Forces Training for Mountain and Winter Warfare - Study No. 23

    National Research Council Canada - National Science Library

    Govan, Thomas

    1946-01-01

    This general study of the experiments in mountain and winter warfare training from 1940 to 1944 is designed as an introduction to the histories of the Mountain Training Center and The 10th Mountain...

  8. Cerium oxide for the destruction of chemical warfare agents: A comparison of synthetic routes

    Czech Academy of Sciences Publication Activity Database

    Janos, P.; Henych, Jiří; Pelant, O.; Pilařová, V.; Vrtoch, L.; Kormunda, M.; Mazanec, K.; Štengl, Václav

    2016-01-01

    Roč. 304, MAR (2016), s. 259-268 ISSN 0304-3894 Institutional support: RVO:61388980 Keywords : Cerium oxide * Chemical warfare agents * Organophosphate compounds * Decontamination Subject RIV: CA - Inorganic Chemistry Impact factor: 6.065, year: 2016

  9. Damn! The Torpedoes: Coping with Mine Warfare in the Joint Maritime Environment

    National Research Council Canada - National Science Library

    Bahr, James D

    2007-01-01

    ... and the attainment of joint operational maneuver. The potential exists for non-state actors to acquire sea mines and subsequently employ mine warfare as a means of crippling the Navy throughout its range of military operations...

  10. Improving Blood Monitoring of Enzymes as Biomarkers of Risk from Anticholinergic Pesticides and Chemical Warfare Agents

    National Research Council Canada - National Science Library

    Wilson, Barry W

    2005-01-01

    Blood biomarkers are an important way to monitor exposure to anticholinergic pesticides and chemical warfare agents and to establish whether some personnel are at greater risk than others from exposure...

  11. Improving Blood Monitoring of Enzymes as Biomarkers of Risk from Anticholinergic Pesticides and Chemical Warfare Agents

    National Research Council Canada - National Science Library

    Wilson, Barry W

    2006-01-01

    Blood biomarkers are an important way to monitor exposure to anticholinergic pesticides and chemical warfare agents and to establish whether some personnel are at greater risk than others from exposure...

  12. Evaluation Report on Management Controls at the Disbursing Office, Naval Surface Warfare Center, Dahlgren, Virginia

    National Research Council Canada - National Science Library

    Lane, F

    1997-01-01

    On September 19, 1996, the Defense Criminal Investigative Service requested assistance from the Assistant Inspector General for Auditing, DoD, in an investigation at the Naval Surface Warfare Center, Dahlgren, Virginia...

  13. Guerrilla Warfare: Cause and Conflict (A 21st Century Success Story?),

    Science.gov (United States)

    1981-01-01

    and low intensity warfare is the means, both qualitative and quantitative, employed to achieve the intended goal. Both types of war require analysis ...administration.’ 9 If despair and aggravation become the mortar and pestle of future guerrilla warfare, then weapons availability and population growth might be... Thailand , and the Philippines. 55 Every time you ask, "Where are they going to get the money to pay," everybody falls silent. Brazil alone owes $55

  14. Twenty-First-Century Air Warfare and the Invisible War: Strategic Agility

    Science.gov (United States)

    2015-10-01

    September–October 2015 | 85 Views Twenty-First-Century Air Warfare and the Invisible War Strategic Agility Maj Michael W. Benitez, USAF America’s... gap between the dynamic 21st-century environment and our 20th-century bureaucracy. Their initiative and perse- verance allow us to succeed in our...SUBTITLE Twenty-First-Century Air Warfare and the Invisible War: Strategic Agility 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER 6

  15. Detachment 101 and North Burma: Historical Conditions for Future Unconventional Warfare Operations

    Science.gov (United States)

    2016-05-26

    of 1941 (1990; repr., Washington, DC: Government Printing Office, 2011), 42. 24 Maurice Matloff and Edwin M. Snell, Strategic Planning for Coalition...Warfare: 1941­ 1942 (1953 repr., Washington, DC: Government Printing Office, 1999), 120. 25 Maurice Matloff, Strategic Planning for Coalition Warfare...opportunity for DET 101 to improve its relationships with the Kachin people. 99War Report: OSS, Volume 2, 383. 100 Richard Dunlop, Behind Japanese Lines with

  16. Irregular Warfare as a National Military Strategy Approach for Small States

    Science.gov (United States)

    2013-12-01

    of these “pods”: the question of homogeneity or heterogeneity. There 216 Oliker, Russia´s Chechen Wars...Ronfeldt regarding the degree of homogeneity of the teams should also be evaluated. In some cases, there might be a higher degree of specialization in...prerequisites. A. IRREGULAR WARFARE – A DIRTY WAR? Based on the last decades of conflicts, the tactics used in irregular warfare have left a bad taste in the

  17. Key Planning Factors for Recovery from a Chemical Warfare Agent Incident

    Science.gov (United States)

    2012-07-01

    GB], Franke, S., Manual of Military Chemistry , Volume 1. Chemistry of Chemical Warfare Agents, Deutscher Militîrverlag: Berlin (East), 1967... Chemistry , Volume 1. Chemistry of Chemical Warfare Agents, Deutscher Militîrverlag: Berlin (East), 1967. Translated from German by U.S. Department of...Response and Recovery Phases A common misconception is that recovery begins after the response phase. Recovery, however, actually begins during

  18. Estimated Chemical Warfare Agent Surface Clearance Goals for Remediation Pre-Planning

    Energy Technology Data Exchange (ETDEWEB)

    Dolislager, Frederick [University of Tennessee, Knoxville (UTK); Bansleben, Dr. Donald [U.S. Department of Homeland Security; Watson, Annetta Paule [ORNL

    2010-01-01

    Health-based surface clearance goals, in units of mg/cm2, have been developed for the persistent chemical warfare agents sulfur mustard (HD) and nerve agent VX as well as their principal degradation products. Selection of model parameters and critical receptor (toddler child) allow calculation of surface residue estimates protective for the toddler child, the general population and adult employees of a facilty that has undergone chemical warfare agent attack.

  19. Electronic Warfare Closed Loop Laboratory (EWCLL) Antenna Motor Software and Hardware Development

    Science.gov (United States)

    2016-09-01

    Electronic Warfare Closed Loop Laboratory (EWCLL) Antenna Motor Software and Hardware Development by Neal Tesny Sensors and Electron Devices Directorate...TITLE AND SUBTITLE Electronic Warfare Closed Loop Laboratory (EWCLL) Antenna Motor Software and Hardware Development 5a. CONTRACT NUMBER 5b...called cllMotorBasic. This module can be used separately if one is developing other software that needs to control the motors . The front panel of this

  20. Welcome to the Naval Postgraduate School Center on Terrorism and Irregular Warfare, Webpage

    OpenAIRE

    Center on Terrorism and Irregular Warfare

    2013-01-01

    Includes an image of the main page on this date and compressed file containing additional web pages. Established in 1998, The Center on Terrorism and Irregular Warfare produces timely, innovative, interdisciplinary analysis relevant to policy and operations. In studying terrorism and irregular warfare, the Center focuses the research capabilities of its staff and the Naval Postgraduate School on an area of critical importance to the national security of the United States.

  1. Modeling Anti-Air Warfare With Discrete Event Simulation and Analyzing Naval Convoy Operations

    Science.gov (United States)

    2016-06-01

    W., & Scheaffer, R. L. (2008). Mathematical statistics with applications . Belmont, CA: Cengage Learning. 118 THIS PAGE INTENTIONALLY LEFT BLANK...WARFARE WITH DISCRETE EVENT SIMULATION AND ANALYZING NAVAL CONVOY OPERATIONS by Ali E. Opcin June 2016 Thesis Advisor: Arnold H. Buss Co...REPORT DATE June 2016 3. REPORT TYPE AND DATES COVERED Master’s thesis 4. TITLE AND SUBTITLE MODELING ANTI-AIR WARFARE WITH DISCRETE EVENT

  2. The impact of warfare on the soil environment

    Science.gov (United States)

    Certini, Giacomo; Scalenghe, Riccardo; Woods, William I.

    2013-12-01

    One of the most dramatic ways humans can affect soil properties is through the performance of military activities. Warfare-induced disturbances to soil are basically of three types - physical, chemical, and biological - and are aimed at causing direct problems to enemies or, more often, are indirect, undesired ramifications. Physical disturbances to soil include sealing due to building of defensive infrastructures, excavation of trenches or tunnels, compaction by traffic of machinery and troops, or cratering by bombs. Chemical disturbances consist of the input of pollutants such as oil, heavy metals, nitroaromatic explosives, organophosphorus nerve agents, dioxins from herbicides, or radioactive elements. Biological disturbances occur as unintentional consequences of the impact on the physical and chemical properties of soil or the deliberate introduction of microorganisms lethal to higher animals and humans such as botulin or anthrax. Soil represents a secure niche where such pathogens can perpetuate their virulence for decades.

  3. Nanostructured Metal Oxides for Stoichiometric Degradation of Chemical Warfare Agents.

    Science.gov (United States)

    Štengl, Václav; Henych, Jiří; Janoš, Pavel; Skoumal, Miroslav

    2016-01-01

    Metal oxides have very important applications in many areas of chemistry, physics and materials science; their properties are dependent on the method of preparation, the morphology and texture. Nanostructured metal oxides can exhibit unique characteristics unlike those of the bulk form depending on their morphology, with a high density of edges, corners and defect surfaces. In recent years, methods have been developed for the preparation of metal oxide powders with tunable control of the primary particle size as well as of a secondary particle size: the size of agglomerates of crystallites. One of the many ways to take advantage of unique properties of nanostructured oxide materials is stoichiometric degradation of chemical warfare agents (CWAs) and volatile organic compounds (VOC) pollutants on their surfaces.

  4. Information Warfare on Social Media: A Brand Management Perspective

    Directory of Open Access Journals (Sweden)

    Kalpokas Ignas

    2017-06-01

    Full Text Available Employing a perspective informed by brand management, this article aims at understanding information warfare operations in social media. The state, seen as brand, must project an image of itself to both internal and foreign audiences to unite the domestic audience and/or attract global support. However, in constructing a brand, states are vulnerable to ‘sofa warriors’ – ordinary individuals who have been unwittingly recruited by hostile actors to disseminate (over social media or other platforms a counter-brand, harmful to the state concerned. These new threats are investigated in light of recent tendencies in online branding, elucidating their status as a national security threat, with the potential to significantly disrupt life in political communities.

  5. Agroterrorism, Biological Crimes, and Biological Warfare Targeting Animal Agriculture

    Energy Technology Data Exchange (ETDEWEB)

    Wilson, Terry M.; Logan-Henfrey, Linda; Weller, Richard E.; Kellman, Brian

    2000-04-12

    There is a rising level of concern that agriculture might be targeted for economic sabotage by terrorists. Knowledge gathered about the Soviet Union biological weapons program and Iraq following the Gulf War, confirmed that animals and agricultural crops were targets of bioweapon development. These revelations are particularly disturbing in light of the fact that both countries are States Parties to the Biological and Toxin Weapons Convention that entered into force in 1975. The potential for misusing biotechnology to create more virulent pathogens and the lack of international means to detect unethical uses of new technologies to create destructive bioweapons is of increasing concern. Disease outbreaks, whether naturally occurring or intentionally, involving agricultural pathogens that destroy livestock and crops would have a profound impact on a country's infrastructure, economy and export markets. This chapter deals with the history of agroterrorism, biological crimes and biological warfare directed toward animal agriculture, specifically, horses, cattle, swine, sheep, goats, and poultry.

  6. RELATIONAL APPROACHES REGARDING FOCUSED LOGISTICS IN MODERN WARFARE JOINT OPERATIONS

    Directory of Open Access Journals (Sweden)

    Gheorghe MINCULETE

    2015-10-01

    Full Text Available The military joint operations of the future are characterized by large concentrations of forces and conventional means on the directions that permit the exploitation of the technological superiority and the manifestation of the offensive spirit of the commanders of the joint operation force groups. Having in mind the fact that the relation between the combatant forces and the logistic ones will shift more and more in favour of the latter, the aforementioned operations will be usually supported by modern flexible logistic structures. The constituted force groups will have a significant joint force character, ensuring superior quality of the troops’ combat training, both at individual level and collective level of units and large units. The current article presents innovative aspects of focused logistics, adapted for the modern warfare, which should be designed and achieved in order to increase the operational potential of the joint force groups.

  7. Book Review: Conquest in Cyberspace: National Security and Information Warfare

    Directory of Open Access Journals (Sweden)

    Gary C. Kessler

    2007-06-01

    Full Text Available Libicki, M.C. (2007. Conquest in Cyberspace: National Security and Information Warfare. New York: Cambridge University Press. 323 pages, ISBN: 978-0-521-69214-4 (paper, US$80Reviewed by Gary C. Kessler (gary.kessler@champlain.eduMany books -- and even movies ("Live Free or Die Hard" -- are based upon the premise of an impending information war. In these scenarios -- made all too plausible by the increased frequency with which we read about and experience major information security incidents -- a Bad Guy exploits known computer security vulnerabilities in order to control major national infrastructures via the Internet so as to reap financial, economic, and/or personal power.(see PDF for full review

  8. An Open Architecture Framework for Electronic Warfare Based Approach to HLA Federate Development

    Directory of Open Access Journals (Sweden)

    HyunSeo Kang

    2018-01-01

    Full Text Available A variety of electronic warfare models are developed in the Electronic Warfare Research Center. An Open Architecture Framework for Electronic Warfare (OAFEw has been developed for reusability of various object models participating in the electronic warfare simulation and for extensibility of the electronic warfare simulator. OAFEw is a kind of component-based software (SW lifecycle management support framework. This OAFEw is defined by six components and ten rules. The purpose of this study is to construct a Distributed Simulation Interface Model, according to the rules of OAFEw, and create Use Case Model of OAFEw Reference Conceptual Model version 1.0. This is embodied in the OAFEw-FOM (Federate Object Model for High-Level Architecture (HLA based distributed simulation. Therefore, we design and implement EW real-time distributed simulation that can work with a model in C++ and MATLAB API (Application Programming Interface. In addition, OAFEw-FOM, electronic component model, and scenario of the electronic warfare domain were designed through simple scenarios for verification, and real-time distributed simulation between C++ and MATLAB was performed through OAFEw-Distributed Simulation Interface.

  9. A Survey of Game Theoretic Approaches to Modelling Decision-Making in Information Warfare Scenarios

    Directory of Open Access Journals (Sweden)

    Kathryn Merrick

    2016-07-01

    Full Text Available Our increasing dependence on information technologies and autonomous systems has escalated international concern for information- and cyber-security in the face of politically, socially and religiously motivated cyber-attacks. Information warfare tactics that interfere with the flow of information can challenge the survival of individuals and groups. It is increasingly important that both humans and machines can make decisions that ensure the trustworthiness of information, communication and autonomous systems. Subsequently, an important research direction is concerned with modelling decision-making processes. One approach to this involves modelling decision-making scenarios as games using game theory. This paper presents a survey of information warfare literature, with the purpose of identifying games that model different types of information warfare operations. Our contribution is a systematic identification and classification of information warfare games, as a basis for modelling decision-making by humans and machines in such scenarios. We also present a taxonomy of games that map to information warfare and cyber crime problems as a precursor to future research on decision-making in such scenarios. We identify and discuss open research questions including the role of behavioural game theory in modelling human decision making and the role of machine decision-making in information warfare scenarios.

  10. Guerilla Warfare & Law Enforcement: Combating the 21st Century Terrorist Cell within the U.S.

    Directory of Open Access Journals (Sweden)

    Major Richard Hughbank

    2009-01-01

    Full Text Available Both domestic and international terrorist organizations employ guerrilla warfare tactics, techniques, and procedures. Thus, the ability to identify and defeat the members of these organizations, cripple their infrastructures, and disrupt their financial resources lies in the understanding of modern guerrilla warfare as it develops in the twenty-first century within the United States.3 The forms of asymmetric warfare4 adopted by domestic and international terrorist groups alike is no longer intended to gain simple media exposure or governmental manipulation; they want to make an overpowering impact by causing massive loss of life and severe damage to infrastructure and are often motivated by religious imperatives and political goals. As terrorism analyst Stephen Flynn has observed, "Throughout the 20th century [Americans] were able to treat national security as essentially an out-of-body experience. When confronted by threats, [America] dealt with them on the turf of our allies or our adversaries. Aside from the occasional disaster and heinous crime, civilian life [in the United States] has been virtually terror-free." With the turn of the twenty-first century, terrorist operations have become more prevalent in the United States and are taking shape in the form of modern guerrilla warfare, thus creating new challenges for federal, state, and local law enforcement agencies. After reviewing the origin and nature of these challenges, this article will offer some suggestions for countering guerilla warfare in the United States.

  11. Eye injuries in twentieth century warfare: a historical perspective.

    Science.gov (United States)

    Wong, T Y; Seet, M B; Ang, C L

    1997-01-01

    With successive wars in the twentieth century, there has been a relative increase in injuries to the eye compared to injuries of other parts of the body. The main causes of eye injury have changed with advances in techniques and weaponry of warfare, with blast fragmentation injuries accounting for 50-80% of cases. Penetrating and perforating injuries are most common, and injuries associated with intraocular foreign bodies pose special diagnostic and management problems. Injuries are bilateral in 15-25% of cases. Injuries associated with chemical, nuclear, and laser weapons have distinct characteristics and epidemiology. Enucleation was commonly performed at the turn of the century, but incidence has declined with better understanding of the pathophysiology of ocular trauma, improved surgical techniques and sepsis control with antibiotics. Sympathetic ophthalmia appears to be uncommon and earlier fears of this complication seem to have been exaggerated. Timely evacuation to a surgical facility is important for a good visual prognosis and preservation of the globe. However, prevention of injuries with eye armor is ultimately the best management, and the need for a comprehensive eye protection program in the military cannot be overemphasized, especially since eye injuries pose important socioeconomic, as well as medical, problems.

  12. The enemy as animal: Symmetric dehumanization during asymmetric warfare.

    Science.gov (United States)

    Bruneau, Emile; Kteily, Nour

    2017-01-01

    Historically, dehumanization has enabled members of advantaged groups to 'morally disengage' from disadvantaged group suffering, thereby facilitating acts of intergroup aggression such as colonization, slavery and genocide. But is blatant dehumanization exclusive to those at the top 'looking down', or might disadvantaged groups similarly dehumanize those who dominate them? We examined this question in the context of intergroup warfare in which the disadvantaged group shoulders a disproportionate share of casualties and may be especially likely to question the humanity of the advantaged group. Specifically, we assessed blatant dehumanization in the context of stark asymmetric conflict between Israelis (Study 1; N = 521) and Palestinians (Study 2; N = 354) during the 2014 Gaza war. We observed that (a) community samples of Israelis and Palestinians expressed extreme (and comparable) levels of blatant dehumanization, (b) blatant dehumanization was uniquely associated with outcomes related to outgroup hostility for both groups, even after accounting for political ideologies known to strongly predict outgroup aggression, and (c) the strength of association between blatant dehumanization and outcomes was similar across both groups. This study illuminates the striking potency and symmetry of blatant dehumanization among those on both sides of an active asymmetric conflict.

  13. Studies on residue-free decontaminants for chemical warfare agents.

    Science.gov (United States)

    Wagner, George W

    2015-03-17

    Residue-free decontaminants based on hydrogen peroxide, which decomposes to water and oxygen in the environment, are examined as decontaminants for chemical warfare agents (CWA). For the apparent special case of CWA on concrete, H2O2 alone, without any additives, effectively decontaminates S-2-(diisopropylamino)ethyl O-ethyl methylphosphonothioate (VX), pinacolyl methylphosphorofluoridate (GD), and bis(2-choroethyl) sulfide (HD) in a process thought to involve H2O2 activation by surface-bound carbonates/bicarbonates (known H2O2 activators for CWA decontamination). A plethora of products are formed during the H2O2 decontamination of HD on concrete, and these are characterized by comparison to synthesized authentic compounds. As a potential residue-free decontaminant for surfaces other than concrete (or those lacking adsorbed carbonate/bicarbonate) H2O2 activation for CWA decontamination is feasible using residue-free NH3 and CO2 as demonstrated by reaction studies for VX, GD, and HD in homogeneous solution. Although H2O2/NH3/CO2 ("HPAC") decontaminants are active for CWA decontamination in solution, they require testing on actual surfaces of interest to assess their true efficacy for surface decontamination.

  14. Unconventional Nuclear Warfare Defense (UNWD) containment and mitigation subtask.

    Energy Technology Data Exchange (ETDEWEB)

    Wente, William Baker

    2005-06-01

    The objective of this subtask of the Unconventional Nuclear Warfare Design project was to demonstrate mitigation technologies for radiological material dispersal and to assist planners with incorporation of the technologies into a concept of operations. The High Consequence Assessment and Technology department at Sandia National Laboratories (SNL) has studied aqueous foam's ability to mitigate the effects of an explosively disseminated radiological dispersal device (RDD). These benefits include particle capture of respirable radiological particles, attenuation of blast overpressure, and reduction of plume buoyancy. To better convey the aqueous foam attributes, SNL conducted a study using the Explosive Release Atmospheric Dispersion model, comparing the effects of a mitigated and unmitigated explosive RDD release. Results from this study compared health effects and land contamination between the two scenarios in terms of distances of effect, population exposure, and remediation costs. Incorporating aqueous foam technology, SNL created a conceptual design for a stationary containment area to be located at a facility entrance with equipment that could minimize the effects from the detonation of a vehicle transported RDD. The containment design was evaluated against several criteria, including mitigation ability (both respirable and large fragment particle capture as well as blast overpressure suppression), speed of implementation, cost, simplicity, and required space. A mock-up of the conceptual idea was constructed at SNL's 9920 explosive test site to demonstrate the containment design.

  15. Drone Warfare: Twenty-First Century Empire and Communications

    Directory of Open Access Journals (Sweden)

    Kevin Howley

    2017-02-01

    Full Text Available This paper, part of a larger project that examines drones from a social-construction of technology perspective, considers drone warfare in light of Harold Innis’s seminal work on empire and communication. Leveraging leading-edge aeronautics with advanced optics, data processing, and networked communication, drones represent an archetypal “space-biased” technology. Indeed, by allowing remote operators and others to monitor, select, and strike targets from half a world away, and in real-time, these weapon systems epitomize the “pernicious neglect of time” Innis sought to identify and remedy in his later writing. With Innis’s time-space dialectic as a starting point, then, the paper considers drones in light of a longstanding paradox of American culture: the impulse to collapse the geographical distance between the United States and other parts of the globe, while simultaneously magnifying the cultural difference between Americans and other peoples and societies. In the midst of the worldwide proliferation of drones, this quintessentially sublime technology embodies this (disconnect in important, profound, and ominous ways.

  16. Back to the future: aerial warfare in Libya

    Directory of Open Access Journals (Sweden)

    João Paulo Nunes Vicente

    2013-05-01

    Full Text Available A century after the first air bomb mission, a new intervention in the same geographic space has made evident the changes in Airpower. The Aerial Warfare in Libya has radically changed the civil war, complying with a UN mission to protect Libyan population, imposing a no-fly zone and an arms embargo. Therefore, Operation Unified Protector became one of the most successful campaigns in the history of NATO. We aim to assess the operational efficiency of Airpower in the conflict in Libya, focusing on the challenges of a War essentially Aerial. Despite the military results and the fact that some political objectives were met, we can identify some concerning trends that, if not shifted, may negatively influence future NATO operations. We do not aim to draw general and universal conclusions on the strategic value of Airpower based on the analysis of a specific case. Above all, we focus on identifying some lessons which have influenced OUP operational efficiency. Thus, we must analyze some factors, such as the scope of objectives, the type of opposing action and aerial strategy used by the coalition and then focus on the challenges arising from the OUP.

  17. Detection of biological warfare agents using ultra violet-laser induced fluorescence LIDAR.

    Science.gov (United States)

    Joshi, Deepti; Kumar, Deepak; Maini, Anil K; Sharma, Ramesh C

    2013-08-01

    This review has been written to highlight the threat of biological warfare agents, their types and detection. Bacterial biological agent Bacillus anthracis (bacteria causing the disease anthrax) which is most likely to be employed in biological warfare is being discussed in detail. Standoff detection of biological warfare agents in aerosol form using Ultra violet-Laser Induced Fluorescence (UV-LIF) spectroscopy method has been studied. Range-resolved detection and identification of biological aerosols by both nano-second and non-linear femto-second LIDAR is also discussed. Calculated received fluorescence signal for a cloud of typical biological agent Bacillus globigii (Simulants of B. anthracis) at a location of ~5.0 km at different concentrations in presence of solar background radiation has been described. Overview of current research efforts in internationally available working UV-LIF LIDAR systems are also mentioned briefly. Copyright © 2013 Elsevier B.V. All rights reserved.

  18. SiGe-based re-engineering of electronic warfare subsystems

    CERN Document Server

    Lambrechts, Wynand

    2017-01-01

    This book equips readers with a thorough understanding of the applicability of new-generation silicon-germanium (SiGe) electronic subsystems for the military purposes of electronic warfare and defensive countermeasures. The theoretical and technical background is extensively explained and all aspects of the integration of SiGe as an enabling technology for maritime, land, and airborne (including space) electronic warfare are addressed, including research, design, development, and implementation. The coverage is supported by mathematical derivations, informative illustrations, practical examples, and case studies. While SiGe technology provides speed, performance, and price advantages in many markets, sharing of information on its use in electronic warfare systems has to date been limited, especially in developing nations. This book will therefore be warmly welcomed as an engineering guideline that focuses especially on the speed and reliability of current-generation SiGe circuits and highlights emerging innov...

  19. THE CYBER DIMENSION OF MODERN HYBRID WARFARE AND ITS RELEVANCE FOR NATO

    Directory of Open Access Journals (Sweden)

    Sorin DUCARU

    2016-06-01

    Full Text Available The technological development and the instant communication possibilities advanced not only economic and social developments, but also evolving threats from those who exploit the vulnerabilities of communication and information systems. The cyber threat landscape points to a significant increase of the frequency, intensity, duration and sophistication of cyber-attacks. One of the new and concerning trends is the use of cyber capabilities in relation with military of hybrid operations – the so-called cyber dimension of hybrid warfare. NATO’s strategy on countering hybrid warfare is based on the triad: prepare-deter-defend, which also applies to cyber. Nations represent the first line of defence in countering hybrid strategies. International cooperation is also a key factor in this sense. It is in this context that NATO’s response to cyber-attacks in the context of hybrid warfare must be further refined.

  20. The United States and biological warfare: secrets from the early cold war and Korea.

    Science.gov (United States)

    Bruwer, A

    2001-01-01

    The United States and Biological Warfare is about accusations that the United States resorted to bacteriological warfare at a time of great military stress during the Korean War. In December 1951, the then US Secretary of Defense ordered early readiness for offensive use of biological weapons. Soon afterwards, the North Korean and Chinese armies accused the United States of starting a large-scale biological warfare experiment in Korea. The US State Department denied the accusation. Both parties to the dispute maintain their positions today. The authors spent 20 years researching the accusations in North America, Europe and Japan. They were the first foreigners to be given access to Chinese classified documents. The reader is also introduced to the concept of 'plausible denial', an official US policy which allowed responsible governmental representatives to deny knowledge of certain events. The authors hope that their work will contribute to the understanding of a time when modern war expanded into a new type of violence.

  1. Skeletal evidence for Inca warfare from the Cuzco region of Peru.

    Science.gov (United States)

    Andrushko, Valerie A; Torres, Elva C

    2011-11-01

    This article addresses the bioarchaeological evidence for Inca warfare through an analysis of 454 adult skeletons from 11 sites in the Inca capital region of Cuzco, Peru. These 11 sites span almost 1000 years (AD 600-1532), which allows for a comparison of the evidence for warfare before the Inca came to power (Middle Horizon AD 600-1000), during the time of Inca ascendency in the Late Intermediate Period (AD 1000-1400), and after the Inca came to power and expanded throughout the Cuzco region and beyond (Inca Imperial Period, AD 1400-1532). The results indicate that 100 of 454 adults (22.0%) showed evidence of cranial trauma. Of these, 23 individuals had major cranial injuries suggestive of warfare, consisting of large, complete, and/or perimortem fractures. There was scant evidence for major injuries during the Middle Horizon (2.8%, 1/36) and Late Intermediate Period (2.5%, 5/199), suggesting that warfare was not prevalent in the Cuzco region before and during the Inca rise to power. Only in the Inca Imperial Period was there a significant rise in major injuries suggestive of warfare (7.8%, 17/219). Despite the significant increase in Inca times, the evidence for major cranial injuries was only sporadically distributed at Cuzco periphery sites and was entirely absent at Cuzco core sites. These findings suggest that while the Inca used warfare as a mechanism for expansion in the Cuzco region, it was only one part of a complex expansion strategy that included economic, political, and ideological means to gain and maintain control. Copyright © 2011 Wiley-Liss, Inc.

  2. Particle Swarm Social Adaptive Model for Multi-Agent Based Insurgency Warfare Simulation

    Energy Technology Data Exchange (ETDEWEB)

    Cui, Xiaohui [ORNL; Potok, Thomas E [ORNL

    2009-12-01

    To better understand insurgent activities and asymmetric warfare, a social adaptive model for modeling multiple insurgent groups attacking multiple military and civilian targets is proposed and investigated. This report presents a pilot study using the particle swarm modeling, a widely used non-linear optimal tool to model the emergence of insurgency campaign. The objective of this research is to apply the particle swarm metaphor as a model of insurgent social adaptation for the dynamically changing environment and to provide insight and understanding of insurgency warfare. Our results show that unified leadership, strategic planning, and effective communication between insurgent groups are not the necessary requirements for insurgents to efficiently attain their objective.

  3. NONDESTRUCTIVE IDENTIFICATION OF CHEMICAL WARFARE AGENTS AND EXPLOSIVES BY NEUTRON GENERATOR-DRIVEN PGNAA

    Energy Technology Data Exchange (ETDEWEB)

    T. R. Twomey; A. J. Caffrey; D. L. Chichester

    2007-02-01

    Prompt gamma-ray neutron activation analysis (PGNAA) is now a proven method for the identification of chemical warfare agents and explosives in military projectiles and storage containers. Idaho National Laboratory is developing a next-generation PGNAA instrument based on the new Ortec Detective mechanically-cooled HPGe detector and a neutron generator. In this paper we review PGNAA analysis of suspect chemical warfare munitions, and we discuss the advantages and disadvantages of replacing the californium-252 radioisotopic neutron source with a compact accelerator neutron generator.

  4. NONDESTRUCTIVE IDENTIFICATION OF CHEMICAL WARFARE AGENTS AND EXPLOSIVES BY NEUTRON GENERATOR-DRIVEN PGNAA

    International Nuclear Information System (INIS)

    T. R. Twomey; A. J. Caffrey; D. L. Chichester

    2007-01-01

    Prompt gamma-ray neutron activation analysis (PGNAA) is now a proven method for the identification of chemical warfare agents and explosives in military projectiles and storage containers. Idaho National Laboratory is developing a next-generation PGNAA instrument based on the new Ortec Detective mechanically-cooled HPGe detector and a neutron generator. In this paper we review PGNAA analysis of suspect chemical warfare munitions, and we discuss the advantages and disadvantages of replacing the californium-252 radioisotopic neutron source with a compact accelerator neutron generator

  5. Adaptive motion compensation in sonar array processing

    NARCIS (Netherlands)

    Groen, J.

    2006-01-01

    In recent years, sonar performance has mainly improved via a significant increase in array ap-erture, signal bandwidth and computational power. This thesis aims at improving sonar array processing techniques based on these three steps forward. In applications such as anti-submarine warfare and mine

  6. Underwater detection, classification and localisation : Improving the capabilities of towed sonar arrays

    NARCIS (Netherlands)

    Colin, M.E.G.D.

    2011-01-01

    The end of the Cold War and the collapse of the Warsaw pact have resulted in a change of operational theatre for the naval forces of the North Atlantic Treaty Organisation (NATO). In particular, the focus of Anti Submarine Warfare forces has shifted from tracking Soviet nuclear ballistic missile

  7. Target Localisation with Multistatic Systems

    NARCIS (Netherlands)

    Sindt, J.C.; Theije, P.A.M. de

    2004-01-01

    Submarines becoming more and more silent, the Navies have much interest in active-sonar applications for Anti-Submarine Warfare (ASW). The overt nature of low-frequency active sonar (LFAS) operations could give to an opposing submarine the potential initiative. This risk can be significantly reduced

  8. Environment Adaptation for LFAS and Corresponding 3D Modelling of Sonar Performance

    NARCIS (Netherlands)

    Lam, F.P.A; Benders, F.P.A.; Schippers, P.; Beerens, S.P.

    2002-01-01

    In Anti-Submarine Warfare (ASW), focus has been shifted towards littoral environments. These harsh environments are in general characterised by high variability in sonar performance, depending heavily on environmental input-parameters. Therefore, a strong need is signalled for accurate sonar

  9. Shape and Doppler correction for a towed sonar array

    NARCIS (Netherlands)

    Groen, J.; Beerens, S.P.; Doisy, Y.

    2004-01-01

    Anti Submarine Warfare (ASW) is more and more focused toward shallow water environments. Many complications have come up for ASW sonar performance as a result of this. The problem that is tackled in this article is the performance loss due to the shape and motion of the sonar during a maneuver.

  10. Detection and visualization to Doppler sensitive sonar pulses

    NARCIS (Netherlands)

    Bertrand, D.B.; IJsselmuide, S.P. van; Beerens, S.P.

    2006-01-01

    In anti-submarine warfare, the use of Doppler sensitive sonar pulses is common practice. In particular, the wideband Doppler sensitive PTFM pulse (Pulse Train Frequency Modulation) is a powerful tool for detection in reverberation limited conditions. Nevertheless, this pulse is not operationally

  11. Diagnosis of exposure to chemical warfare agents: An essential tool to counteract chemical terrorism

    NARCIS (Netherlands)

    Noort, D.; Schans, M.J. van der; Bikker, F.J.; Benschop, H.P.

    2009-01-01

    Methods to analyze chemical warfare agents (CW-agents) and their decomposition products in environmental samples were developed over the last decades. In contrast herewith, procedures for analysis in biological samples have only recently been developed. Retrospective detection of exposure to

  12. A statistical analysis of the effect of warfare on the human secondary sex ratio

    NARCIS (Netherlands)

    Graffelman, J.; Hoekstra, R.F.

    2000-01-01

    Many factors have been hypothesized to affect the human secondary sex ratio (the annual percentage of males among all live births), among them race, parental ages, and birth order. Some authors have even proposed warfare as a factor influencing live birth sex ratios. The hypothesis that during and

  13. A Proficiency-Based Cost Estimate of Surface Warfare Officer On-the-Job Training

    Science.gov (United States)

    2011-12-01

    for “better schooling, and a surface warfare pin equivalent to the dolphins worn by submariners or the wings by the aviators” (Robinson, 2008...Historical Perspective from World War II to 2008. Fort Leavenworth: U.S. Army Command and General Staff College. Rocci, R. (2003). A Cognitive and

  14. 75 FR 69032 - Naval Surface Warfare Center, Potomac River, Dahlgren, VA; Danger Zone

    Science.gov (United States)

    2010-11-10

    ... Warfare Center, Dahlgren's patrol boats. Oystering and fishing boats or other craft may cross the river in... energy technology, and manned or unmanned water craft operations; (2) change the latitude and longitude... shoreline for commercial fishing and waterfowl hunting blinds under existing Navy and state regulations. The...

  15. The Evolution of Naval Warfare Technology and the Impact of Space Systems

    Science.gov (United States)

    1987-09-01

    or Greek fire. Larger missile devices such as the trebuchet were commonly used in land warfare, particularly in siege operations. However, the...were being used more widely in the Mediterranean. Mangonels and trebuchets were used to heave a variety of projectiles. Their adaptation for use on

  16. Information Warfare: Legal, Regulatory, Policy and Organizational Considerations for Assurance. Second Edition.

    Science.gov (United States)

    1996-07-04

    2-19 2-2-1 State Com puter Crim e Statutes ....................................................................... 2-44...2-2-2 Com puter Crim e Jurisdiction .......................................................................... 2-45 2-4-1 Information Warfare Policy...infrastructures from physical and cyber threats. * Propose statutory and regulatory changes. The Infrastructure Protection Task Force (IPTF): * Increase

  17. Above the Influence: The Strategic Effects of Airpower in Irregular Warfare

    Science.gov (United States)

    2010-06-01

    using the methods of Mao Zedong , working at the individual village level to subvert central government authority, which effectively stopped at the...Nagl, ―Principles, Imperatives, and Paradoxes of Counterinsurgency,‖ 50; Mao Tse-Tung, Problems of Strategy in Guerrilla Warfare, 215-216; Gray...outposts, 63 General (Ret.) William W. Momyer, Airpower in Three Wars ( WWII , Korea, Vietnam

  18. Ge 4+ doped TiO 2 for stoichiometric degradation of warfare agents

    Czech Academy of Sciences Publication Activity Database

    Štengl, Václav; Matys Grygar, Tomáš; Opluštil, F.; Němec, T.

    2012-01-01

    Roč. 227, AUGUST (2012), s. 62-67 ISSN 0304-3894 R&D Projects: GA ČR(CZ) GAP106/12/1116 Institutional support: RVO:61388980 Keywords : germanium * homogeneous hydrolysis * titania * urea * warfare agent degradation Subject RIV: CA - Inorganic Chemistry Impact factor: 3.925, year: 2012

  19. (Review of) Reno, William. 2011. Warfare in Independent Africa. Cambridge: Cambridge University Press

    DEFF Research Database (Denmark)

    Hagmann, Tobias

    2013-01-01

    Warfare in Independent Africa is Reno’s bold attempt to analyze the modern history of African insurgencies. The book tackles this task through the prism of five generations of rebel, which left their mark on the continent; anti-colonial rebels, majority rule rebels, reform rebels, warlord rebels ...

  20. Urban Warfare at the Operational Level: Identifying Centers of Gravity and Key Nodes

    National Research Council Canada - National Science Library

    McCleskey, Edward

    1999-01-01

    .... The intent of this paper is to focus the reader on the operational level of urban warfare. A key task for the Joint Force Commander and his staff will be to identify the targets against which he will employ his component forces...

  1. The influence of the Ratel infantry fighting vehicle on mobile warfare ...

    African Journals Online (AJOL)

    This article traces the story of how the author and a number of daring young commanders and soldiers had cast aside military textbooks in developing their own military doctrine for mobile warfare, South African style. It is clear that the Ratel infantry fighting vehicle had wielded huge influence on the development and ...

  2. Improving Blood Monitoring of Enzymes as Biomarkers of Risk from Anticholinergic Pesticides and Chemical Warfare Agents

    Science.gov (United States)

    2007-10-01

    1991. Protection by butyrylcholinesterase against organophosphorus poisoning in nonhuman primates. J. Pharmacol. Exp. Ther. 259(2): 633-638. Costa...Employee Health), Stephen McCurdy (UCD Epidemiology ), Stephanie Padilla (US EPA), Matthew Keifer (U. Washington) and CA and Utah clinical laboratories...the cholinergic function of the nervous system (Wilson, 2001). Organophosphorus ester pesticides and chem- ical warfare agents disrupt cholinergic

  3. Military medicine and the ethics of war: British colonial warfare during the Seven Years War (1756-63).

    Science.gov (United States)

    Charters, Erica

    2010-01-01

    This article examines 18th-century European warfare, tracing the first formal codifications of conventions of war, frequently introduced by military physicians and initially regarding the treatment of the sick and wounded. It outlines to what extent these conventions were followed in practice, particularly in the challenging environment of American irregular warfare, with a focus on the most well-known incident of "biological warfare" in the period: the deliberate spread of smallpox by British officers among Amerindians in 1763. More broadly, it demonstrates that the history of military medicine provides a fruitful method with which to uncover assumptions about the ethics of war.

  4. Evolution of war and cyber attacks in the concept of conventional warfare

    Directory of Open Access Journals (Sweden)

    Huseyin Kuru

    2018-01-01

    Full Text Available Humanity have witnessed many confrontations of states whose interests challenge at some points and their struggle to neutralize problems in battlefield. While war was perceived as a way of eliminating deadlocks for some parties, some considered it as one of the international policy materials. The definition and content of conventional warfare have been subject to change for centuries, while the new weapons and technologies have been developed by human beings that it has brought constant change in the law of war and at the same time more lethal and devastating consequences. The struggle for superiority in international relations played an impulsive role in the development of weapons used in the battlefield. Countries have used their labor and financial resources to improve their military skills. Beginning with stones and sticks in the battlefield, this struggle has reached the point of using the next generation satellite controlled unmanned and armed aircrafts and having nuclear weapons has become more deterrent than using them. The struggle between strong countries and the limited countries in terms of technology and armed groups that do not have enough technology and skills completely changed the definition of conventional warfare. This fight has led Asymmetric warfare born which can turn commercial airline planes full of innocent people into a weapon like September-11 attacks. In this study, the historical development and the change in the content of the warfare were briefly explained and then cyber-attacks in the concept of the fourth generation warfare was analyzed taking into account of prominent attacks.

  5. Search Parameter Optimization for Discrete, Bayesian, and Continuous Search Algorithms

    Science.gov (United States)

    2017-09-01

    sensor with some non-uniform probability of detection • Game theory approach with a target counter-detecting and evading. 40 APPENDIX A: Figures A.1...DISTRIBUTION CODE 13. ABSTRACT (maximum 200 words) Search and Detection Theory is the overarching field of study that covers many scenarios. These range from...SUBJECT TERMS Search Theory , Undersea Warfare, South China Sea, Anti-Submarine Warfare 15. NUMBER OF PAGES 253 16. PRICE CODE 17. SECURITY

  6. Bench-Scale Investigation of Composting for Remediation of Explosives-Contaminated Soils from Naval Surface Warfare Center, Crane, Indiana

    National Research Council Canada - National Science Library

    Preston, Kurt

    1998-01-01

    ...), and octahydro-1,3,5,7-tetranitro-1,3,5,7- tetrazocine (HMX). The Naval Surface Warfare Center (NSWC), Crane, Indiana, provides material and logistic support to the Navy's weapon systems, including expendable and nonexpendable ordnance items...

  7. Cost Effectiveness Analysis of the "Sea to SWOS" Training Initiative on the Surface Warfare Officer Qualification Process

    National Research Council Canada - National Science Library

    Gavino, Christopher

    2002-01-01

    ... (combat effectiveness) while the quantitative analysis shows additional costs to the Navy Personnel Command and savings in training costs for the Naval Education and Training Command and OPNAV N76, the Surface Warfare Resource Sponsor...

  8. An Assessment of the Effectiveness of Computer-based Training for Newly Commissioned Surface Warfare Division Officers

    National Research Council Canada - National Science Library

    Bowman, William R; Crawford, Alice M; Mehay, Stephen; Stoker, Carol; Paynter, Robert

    2008-01-01

    ...) on-board an officer's ship. The study relied on a variety of analytical techniques, including a literature review of CBT and OJT training, interviews and focus groups with junior and senior surface warfare officers...

  9. The German Military Entrepreneur Ernst von Mansfeld and His Conduct of Asymmetrical Warfare in the Thirty Years War

    OpenAIRE

    Bäckström, Olli

    2011-01-01

    The dissertation examines aspects of asymmetrical warfare in the war-making of the German military entrepreneur Ernst von Mansfeld during his involvement in the Thirty Years War. Due to the nature of the inquiry, which combines history with military-political theory, the methodological approach of the dissertation is interdisciplinary. The theoretical framework used is that of asymmetrical warfare. The primary sources used in the dissertation are mostly political pamphlets and newsl...

  10. How Power-Laws Re-Write The Rules Of Cyber Warfare

    Directory of Open Access Journals (Sweden)

    David L. Bibighaus

    2015-12-01

    Full Text Available All warfare contains and element of randomness. This article will argue that, the kind uncertainty encountered in cyber warfare (Power-Law randomness is fundamentally different from the uncertainty the military has evolved to deal with in the physical world (Gaussian-Randomness. The article will explain the difference between these two kinds of randomness, and how cyber weapons appear to operate under Power-Law randomness. It then will show how in cyberspace, key aspects of strategic thought are based on a flaws assumption of randomness. Finally, this article shall argue that if the American military is going to be effective in cyberspace, it must re-examine the way the military assumes risk, recruits is forces, plans for war and maintains the peace.

  11. Air University Research Paper: Asymmetric Warfare - Exposing America’s Weaknesses

    Science.gov (United States)

    2003-04-01

    AU/ACSC/ 03-1261R/2003-04 AIR COMMAND AND STAFF COLLEGE AIR UNIVERSITY AIR UNIVERSITY RESEARCH PAPER ASYMMETRIC WARFARE - EXPOSING AMERICA’S...Air University Research Paper : Asymmetric Wafare - Exposing America’s Weaknesses 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER...Std Z39-18 Disclaimer The views expressed in this academic research paper are those of the author(s) and do not reflect the official policy or

  12. Satellite and Ground Communication Systems: Space and Electronic Warfare Threats to the United States Army

    Science.gov (United States)

    2017-02-01

    Figure 3). However, a 2016 Department of Defense (DoD) report explained that in 2013 “China launched an object into space on a ballistic trajectory with...well as other non-kinetic counter- space capabilities.42 The USCC report also provided detailed analysis of Chinese developments of co-orbital...Satellite and Ground Communication Systems: Space and Electronic Warfare Threats to the

  13. A Review of Multi-Threat Medical Countermeasures Against Chemical Warfare and Terrorism

    Science.gov (United States)

    2004-11-01

    Biopreparat, the military and civil defense to combat chemical warfare and civilian arm of the former Soviet Union’s biological weapons chemical terrorism . program...seamlessly transition to military force protection and civil defense against chemical terrorism . Terrorist threat agents include all classes of MTMC... chemical terrorism . Using MTMC to blunt pathological actions enteric mast cell granulation in acute soman intoxicated rats. Experimentia of chemical agents

  14. Equipping Network Warfare: Industrial-Era Bureaucracies for Information-Era Weapons

    Science.gov (United States)

    2009-04-01

    to operational shortfalls. Clearly, there are benefits in following known methods in organizing the cyberspace mission and its capabilities...sid26_gci853845,00.html (accessed 15 December 2008). 9 BX.com Terminology Reference, “Web Year,” http://www.bx.com/dictionary/ ecommerce /Web_year.cfm... benefits of the process, while amplifying the negative aspects of the bureaucracy. Network warfare capabilities are much more vulnerable to

  15. Mass spectrometric study of selected precursors and degradation products of chemical warfare agents

    Czech Academy of Sciences Publication Activity Database

    Papoušková, B.; Bednář, P.; Fryšová, I.; Stýskala, J.; Hlaváč, J.; Barták, P.; Ulrichová, J.; Jirkovský, Jaromír; Lemr, K.

    2007-01-01

    Roč. 42, č. 12 (2007), s. 1550-1561 ISSN 1076-5174 Grant - others:The Organization for the Prohibition of Chemical Weapons(NL) L/ICA/ICB/84322/04 Institutional research plan: CEZ:AV0Z40400503 Source of funding: V - iné verejné zdroje Keywords : mass spectrometry * chemical warfare agent * high performance liquid chromatography * LC/MS Subject RIV: CF - Physical ; Theoretical Chemistry Impact factor: 3.062, year: 2007

  16. A cost and operational effectiveness analysis of alternative anti-surface warfare platforms

    OpenAIRE

    Skinner, Walter Mark.

    1993-01-01

    Approved for public release; distribution is unlimited. A Cost and Operational Effectiveness Analysis (COEA) is performed for three alternative anti-surface warfare (ASUW) platforms that will conduct operations in multi-service regional scenarios. Estimated program costs, historical cost variances, and measures of operational effectiveness are determined for each COEA alternative, and service life extension effects are examined. The data is merged in a mixed-integer optimization model, MPA...

  17. The Equipment of Czech Firefighters for the Detection and Field Analyses of Chemical Warfare Agents

    Directory of Open Access Journals (Sweden)

    Jana Krykorkova

    2014-05-01

    Full Text Available This paper describes the requirements for the devices of detection, chemical reconnaissance and field analyses of chemical warfare agents (CWA and divides them into simple devices of detection, universal detectors, selective analyzers, multi-component analyzers and mobile laboratories. It also describes the devices of detection available within the Fire and Rescue Service of the Czech Republic (FRS CR and compares them with some prospective trends of further development.

  18. Deterrence in the Human Domain: A COIN Framework to Deterring Unconventional Warfare in Shaping Operations

    Science.gov (United States)

    2017-05-25

    protecting ethnic Russians, providing stability to neighbors, defending “self- determination,” and protecting human rights . Protection of Russian...Deterrence in the Human Domain: A COIN Framework to Deterring Unconventional Warfare in Shaping Operations A Monograph by MAJ Matthew P...should be aware that notwithstanding any other provision of law , no person shall be subject to any penalty for failing to comply with a collection of

  19. Cyberspace as a Complex Adaptive System and the Policy and Operational Implications for Cyber Warfare

    Science.gov (United States)

    2014-05-22

    accessed 13 February 2014). 66Teresa Degenhard “Between War and Crime: The Overlap between War and Crime: Unpacking Foucault and Agamben’s Studies...Article-2-Revision- for- Foucault -and-Agamben-Degenhardt-July-2013.pdf (accessed 5 April 2014). 26... Foucault and Agamben’s Studies within the Context of the War on Terror.”, 34. 68US Department of Defense, Electronic Warfare, Joint Publication 3-13, I-2

  20. Efficacy Evaluation of Current and Future Naval Mine Warfare Neutralization Method

    Science.gov (United States)

    2016-12-01

    MCM-1) Operates off the Coast of Hawaii during Exercise Rim of the Pacific (RIMPAC) 2004. ID: 040710-N-6551H-229. U.S. Navy, Arlington, VA...The Mine Countermeasure Ship USS Avenger (MCM-1) Operates off the Coast of Hawaii during Exercise Rim of the Pacific (RIMPAC) 2004. ID: 040710-N... fire -scout-following-two-crashes/. Accessed December 5, 2016. Space and Naval Warfare Systems Command. 2011. “Marine Mammal Program.” SSC Pacific

  1. Discrete Electronic Warfare Signal Processing using Compressed Sensing Based on Random Modulator Pre-Integrator

    OpenAIRE

    M. Sreenivasa Rao; Chandan C. Mishra; K. Krishna Naik; K. Maheshwara Reddy

    2015-01-01

    Electronic warfare receiver works in the wide electromagnetic spectrum in dense radar signal environment. Current trends in radar systems are ultra wideband and low probability of intercept radar technology. Detection of signals from various radar stations is a concern. Performance and probability of intercept are mainly dependent on high speed ADC technology. The sampling and reconstruction functions have to be optimized to capture incoming signals at the receiver to extract characteristics ...

  2. Vital Interests, Virtual Threats: Reconciling International Law with Information Warfare and United States Security

    Science.gov (United States)

    1999-05-01

    1985 workforce of 406,000 by two thirds. Volkswagen intends to reduce its present workforce by one third. Proctor and Gamble has rising sales, yet is...of the Senate Governmental Affairs Committee , named “China, Russia, Libya, Iran, Iraq, and at least seven other countries... audit uses four recent Stanford Technology Law Journal articles not related to information warfare. Granted, hypothetical environments make certainty

  3. Lawfare and hybrid warfare-how Russia is using the law as a weapon

    OpenAIRE

    Mosquera, A.; Bachmann, Sascha-Dominik

    2015-01-01

    This short paper introduces the reader to the mutating military concept of hybrid warfare and one of its implementing methods, the use of law as a weapon. We aim to provide a current, comprehensive definition of the terms “hybrid warfare” and “lawfare”. This submission focuses on the following areas: where law has been/is being used as a method of war, namely the Jus ad bellum, the jus in bello and the law of treaties in international relations.

  4. Special Operations, Irregular Warfare, and Operational Art: A Theory of Special Operations

    Science.gov (United States)

    2013-12-10

    modern militaries: Ian F. W. Beckett , Modern Insurgencies and Counter-Insurgencies (New York: Routledge, 2003), 213. 1...the dynamics that influence other coalition members. They do not have the 71Mao Zedong, On Guerrilla Warfare, trans. Samuel B. Griffith (Breiningville...2004. Beckett , Ian F. W. Modern Insurgencies and Counter-Insurgencies. New York: Routledge, 2003. Bergen, Peter. “Analysis: Bin Laden might find

  5. Russian Perspectives on Network-Centric Warfare: The Key Aim of Serdyukov’s Reform

    Science.gov (United States)

    2011-01-01

    has faced with its GLObal’naya NAvigatsionnaya Sputnikovaya Sistema —(GLONASS) system, and introducing advanced digitized communications in the armed...of targeting data will be accomplished by organizing virtual channels for data transmission or via a web -portal. The successful function- ing of the...Operations: Tactical Web Takes Shape,” Signal, November 2003; Col. Alan D. Campen, USAF (Ret.), “Look Closely At Network-Centric Warfare: Technology Can

  6. Incorporating AFEWC IMOM as an instructional asset for NPS radar and electronic warfare curricula

    OpenAIRE

    Van Splinter, Gregg A.

    1992-01-01

    Approved for public release; distribution is unlimited In this thesis, effort is made to incorporate the computer program, Improved Many(Jammers)-on-Many(Radars) (IMOM), into radar and electronic warfare curricula at the Naval Postgraduate School. The IMOM program is used operationally by the U.S. Air Force for electronic combat mission planning. IMOM allows the user to evaluate electronic combat effects through computer color graphics display of the electronic order of battle including ...

  7. Past and Potential Theory for Special Warfare Operational Art: People’s War and Contentious Politics

    Science.gov (United States)

    2015-03-04

    the scientific method could be used to examine historical case studies.114 His examination of the English , American, French, and Russian Revolutions...its full evaluation as a grammar of revolutionary war. Finally, a translation of basic concepts from contentious politics into useful outlines and...be founded upon distinct and sound theories of war and warfare. This monograph argues that from 1952-1965, the US Army Special Forces developed two

  8. Puncturing the Counterinsurgency Myth: Britain and Irregular Warfare in the Past, Present, and Future

    Science.gov (United States)

    2011-09-01

    FUTURE INTRODUCTION Britain’s irregular warfare experience in the post- World War II era presented the military with numer- ous insurgent challenges where...STRATEGICALLY PERCEPTIVE This myth points to a painful element of British COIN conduct, namely, the short -circuiting of con- text. The preference for...military to plan for long-term coalition commitments: “Increasing globalisation ties our security to that of our allies. . . . Therefore we must

  9. Evaluating Effectiveness of a Frigate in an Anti-Air Warfare (AAW) Environment

    Science.gov (United States)

    2016-06-01

    anti-air warfare (AAW) mission, weapons and radar systems influence each other and interact with the combat software system (Figure 1). Figure 1...similar to our approach include UAV contributions to expeditionary operations (Raffetto, 2004), counter- piracy operations in the Gulf of Aden (Tsilis...statistical discovery software offers both powerful statistics and dynamic graphics capabilities to its users. In the thesis, JMP statistical discovery

  10. Cyber crime and cyber warfare with international cyber collaboration for RSA – preparing communities

    CSIR Research Space (South Africa)

    Grobler, M

    2012-03-01

    Full Text Available Warfare with International Cyber Collaboration for RSA ? Preparing Communities Dr Marthie Grobler, Joey Jansen van Vuuren', Dr Jannie Zaaiman? Council for Scientific and Industrial Research, Pretoria, South Africa1 University of Venda2 ABSTRACT... with the technological revolution is that cyberspace is full of complex and dynamic technological innovations that are not well suited to any legal system. A further complication is the lack of comprehensive treaties facilitating international cooperation...

  11. Global Trends and Future Warfare (Strategic Insights. Special Issue, October 2011)

    Science.gov (United States)

    2011-10-01

    Li Future Warfare and China regional and ethnic discrimination, and the spread of the internet and proliferation of sensational media. In a...communications, we have near-worldwide instant exchange of ideas and spread of ideas. Images and information of living standards, role models, and political...an unusually seductive form of military strength, in part because, like modern courtship, it appears to offer gratification without commitment.’15

  12. Transport and Reactivity of Decontaminants to Provide Hazard Mitigation of Chemical Warfare Agents from Materials

    Science.gov (United States)

    2016-06-01

    directions for future decontamination formulation approaches. 15. SUBJECT TERMS GD HD Decontamination Hazard mitigation VX Chemical warfare agent...agent from materials. The objective of this study was to provide a screening tool to identify decontamination chemistries and formulations that will...mitigation. The materials included a water-dispersible polyurethane (WDP) paint (MIL-DTL-53039) and an alkyd paint (MIL-PRF-24635). Two polymers were also

  13. Hybrid Warfare Dilemmas in the Middle Colonies during the American Revolution

    Science.gov (United States)

    2017-05-25

    prisoners and forcing the British to reinforce and area they thought they controlled.65 These militia groups grew larger and more emboldened after...British prisoners , Washington told him that he could not “answer for the militia who are resorting to Arms in most parts of the State, and exceedingly...the tension between punishing the colonists and welcoming them back into British rule prevented him from solving the hybrid warfare dilemmas posed

  14. CYBER WARFARE GOVERNANCE: EVALUATION OF CURRENT INTERNATIONAL AGREEMENTS ON THE OFFENSIVE USE OF CYBER

    Science.gov (United States)

    2015-10-01

    vulnerability in networks across the world as supervisory control and data acquisition ( SCADA ) systems, similar to the ones attacked in Iran, are...used worldwide to perform tasks such as traffic control, managing power grids and management of other utility systems. The heavy reliance on SCADA ...standpoint, this document will never become the agreed upon standard for today’s warfare, unless it is substantially updated . AU/ACSC/2015 28

  15. From the Decomposition of Chemical Warfare Agents to the Decontamination of Cytostatics

    Czech Academy of Sciences Publication Activity Database

    Štengl, Václav; Šťastný, Martin; Janoš, P.; Mazanec, K.; Perez-Diaz, J. L.; Štenglová Netíková, I. R.

    2018-01-01

    Roč. 57, č. 6 (2018), s. 2114-2122 ISSN 0888-5885 EU Projects: European Commission(XE) 312804 - COUNTERFOG Grant - others:NATO(US) SPS984599 Program:Science for Peace and Security Institutional support: RVO:61388980 Keywords : Chemical warfare agents * Degradation * Metal oxide sorbents Subject RIV: CA - Inorganic Chemistry OBOR OECD: Inorganic and nuclear chemistry Impact factor: 2.843, year: 2016

  16. Operational advantages of using Cyber Electronic Warfare (CEW) in the battlefield

    Science.gov (United States)

    Yasar, Nurgul; Yasar, Fatih M.; Topcu, Yucel

    2012-06-01

    While cyberspace is emerging as a new battlefield, conventional Electronic Warfare (EW) methods and applications are likely to change. Cyber Electronic Warfare (CEW) concept which merges cyberspace capabilities with traditional EW methods, is a new and enhanced form of the electronic attack. In this study, cyberspace domain of the battlefield is emphazised and the feasibility of integrating Cyber Warfare (CW) concept into EW measures is researched. The SWOT (Strengths, Weaknesses, Opportunities and Threats) analysis method is used to state the operational advantages of using CEW concept in the battlefield. The operational advantages of CEW are assessed by means of its effects on adversary air defense systems, communication networks and information systems. Outstanding technological and operational difficulties are pointed out as well. As a result, a comparison of CEW concept and conventional EW applications is presented. It is concluded that, utilization of CEW concept is feasible at the battlefield and it may yield important operational advantages. Even though the computers of developed military systems are less complex than normal computers, they are not subjected to cyber threats since they are closed systems. This concept intends to show that these closed systems are also open to the cyber threats. As a result of the SWOT analysis, CEW concept provides Air Forces to be used in cyber operations effectively. On the other hand, since its Collateral Damage Criteria (CDC) is low, the usage of cyber electronic attack systems seems to grow up.

  17. The Covert Use of the Global Special Operations Network and the Militarization of Covert Action in Political Warfare and the Gray Zone

    Science.gov (United States)

    2017-06-09

    84 Psychological Warfare Operations...Oxford University Press, 1971). 16 Charles Cruickshank,. The Fourth Arm: Psychological Warfare 1938-1945 (London, UK: Davis-Poynter, 1977), 69. 13...capability for clandestine intelligence collection and sabotage operations, in 1950, the Army only had about 20 personnel trained in psychological

  18. International humanitarian law applied to cyber-warfare: Precautions, proportionality and the notion of ‘attack’ under the humanitarian law of armed conflict

    NARCIS (Netherlands)

    Gill, T.D.; Tsagourias, N.; Buchan, R.

    2015-01-01

    This chapter examines the application of international humanitarian law to cyber warfare in the sense of rising to the level of an armed conflict. Building upon the work of the Tallinn Manual on the Application of International Law to Cyber Warfare, it places particular emphasis on the application

  19. Quality of life in chemical warfare survivors with ophthalmologic injuries: the first results form Iran Chemical Warfare Victims Health Assessment Study

    Directory of Open Access Journals (Sweden)

    Soroush Mohammad

    2009-01-01

    Full Text Available Abstract Background Iraq used chemical weapons extensively against the Iranians during the Iran-Iraq war (1980–1988. The aim of this study was to assess the health related quality of life (HRQOL in people who had ophthalmologic complications due to the sulfur mustard gas exposure during the war. Methods The Veterans and Martyrs Affair Foundation (VMAF database indicated that there were 196 patients with severe ophthalmologic complications due to chemical weapons exposure. Of these, those who gave consent (n = 147 entered into the study. Quality of life was measured using the 36-item Short Form Health Survey (SF-36 and scores were compared to those of the general public. In addition logistic regression analysis was performed to indicate variables that contribute to physical and mental health related quality of life. Results The mean age of the patients was 44.8 (SD = 8.7 ranging from 21 to 75 years. About one-third of the cases (n= 50 reported exposure to chemical weapons more than once. The mean exposure duration to sulfur mustard gas was 21.6 years (SD = 1.2. The lowest scores on the SF-36 subscales were found to be: the role physical and the general health. Quality of life in chemical warfare victims who had ophthalmologic problems was significantly lower than the general public (P Conclusion The study findings suggest that chemical warfare victims with ophthalmologic complications suffer from poor health related quality of life. It seems that the need for provision of health and support for this population is urgent. In addition, further research is necessary to measure health related quality of life in victims with different types of disabilities in order to support and enhance quality of life among this population.

  20. Detection of warfare agents in liquid foods using the brine shrimp lethality assay.

    Science.gov (United States)

    Lumor, Stephen E; Diez-Gonzalez, Francisco; Labuza, Theodore P

    2011-01-01

    The brine shrimp lethality assay (BSLA) was used for rapid and non-specific detection of biological and chemical warfare agents at concentrations considerably below that which will cause harm to humans. Warfare agents detected include T-2 toxin, trimethylsilyl cyanide, and commercially available pesticides such as dichlorvos, diazinon, dursban, malathion, and parathion. The assay was performed by introducing 50 μL of milk or orange juice contaminated with each analyte into vials containing 10 freshly hatched brine shrimp nauplii in seawater. This was incubated at 28 °C for 24 h, after which mortality was determined. Mortality was converted to probits and the LC(50) was determined for each analyte by plotting probits of mortality against analyte concentration (log(10)). Our findings were the following: (1) the lethal effects of toxins dissolved in milk were observed, with T-2 toxin being the most lethal and malathion being the least, (2) except for parathion, the dosage (based on LC(50)) of analyte in a cup of milk (200 mL) consumed by a 6-y-old (20 kg) was less than the respective published rat LD(50) values, and (3) the BSLA was only suitable for detecting toxins dissolved in orange juice if incubation time was reduced to 6 h. Our results support the application of the BSLA for routine, rapid, and non-specific prescreening of liquid foods for possible sabotage by an employee or an intentional bioterrorist act. Practical Application: The findings of this study strongly indicate that the brine shrimp lethality assay can be adapted for nonspecific detection of warfare agents or toxins in food at any point during food production and distribution.

  1. The concept of guerrilla warfare in Lithuania in the 1920—1930s

    Directory of Open Access Journals (Sweden)

    Jokubauskas Vytautas

    2012-03-01

    Full Text Available This article analyses the military and tactical training of the members of the Lithuanian Riflemen’s Union for guerrilla warfare in the interwar period. Small nations, such as Lithuania and other Baltic states, being unable to build up military strength in order to ensure national security, were forced to seek for unconventional methods of warfare, including guerrilla strategies. The study places emphasis on the development of the guerrilla war concept in the Union periodicals. The author retraces a change in the intensity of the guerrilla warfare concept propagation amongst Lithuanian population and riflemen, in particular, through publications in the Trimitas — a periodical of the Lithuanian Riflemen’s Union. The author also identifies the narratives associated with the guerrilla matters employed for propaganda purposes in order to create an image of a guerrilla as a defender of the Homeland — Lithuania. Additionally, the structure and numbers of the Union are analysed through a comparison with similar organisations of the other «small nations» of the Baltic North-East. The author addresses the issue of military missions planned by the Lithuanian Army, as well as the way riflemen implemented them. Since the Union did not only offer military training, but was also engaged in the patriotic propaganda, the article focuses on the network of cultural institutions, homes of riflemen, orchestras, libraries, choirs, and athletic clubs used by the Union. The article sets out to establish whether the loss of Lithuanian sovereignty could have been possible without giving rise to a protracted guerrilla war.

  2. U.S. Army Land Warfare Laboratory. Volume 1. Project Report, Appendix A. Documentation

    Science.gov (United States)

    1974-06-01

    10) "EXPLOSIVES DETECTING DOGS", Final Report. Krauss, flax , Bliological Sciences Branch. U. S. Ariqy Land Warfare Laboratory, Aberdeen Proving...Readei .•,al uat ed by Alaska Nau inl i 1 :uli d. IC SI’ID ret onilt dt’d yN, ( ;,Iaid, a l ,., by PISARAi.. ROC he inu, prteparted. I1 lt ninat ion 1...to UISARV. Ret : ansmission >;ystni Evaluation qty 0l 0 sup li,-d to I Ag\\’N and USAkV which rt-comin• l:dt-d I( \\’I I mod i f cat io. Riot Col: rol

  3. Destruction of chemical warfare agent simulants by air and moisture stable metal NHC complexes.

    Science.gov (United States)

    Weetman, Catherine; Notman, Stuart; Arnold, Polly L

    2018-02-20

    The cooperative effect of both NHC and metal centre has been found to destroy chemical warfare agent (CWA) simulants. Choice of both the metal and NHC is key to these transformations as simple, monodentate N-heterocyclic carbenes in combination with silver or vanadium can promote stoichiometric destruction, whilst bidentate, aryloxide-tethered NHC complexes of silver and alkali metals promote breakdown under mild heating. Iron-NHC complexes generated in situ are competent catalysts for the destruction of each of the three targetted CWA simulants.

  4. Total Control: How the Nazis Countered Unconventional Warfare in the Netherlands During World War Two

    Science.gov (United States)

    2017-05-25

    11:mrnn ’ cc11rit) pnlic) :.incc I >t66. l·Dlkm ing the (jcrman ’ ict ori1.:~ ~) f 1939- 19-10. I titler grantccl I limmlcr rrnthority over la" :md...better deterrent in the c;mall " Durch cnmmunity. the Scc11rit) :-1.:n ict ’’i pro’ idcd the names of death candidates 3nu c"<ccu tcd people tu thl...Total Control: I low the Nazis Countered Unconventional Warfare in the Netherlands During World War Two A Monograph by Major Jeroen F van

  5. Unconventional War and Warfare in the Gray Zone. The New Spectrum of Modern Conflicts

    Directory of Open Access Journals (Sweden)

    Miroslaw Banasik

    2016-06-01

    Full Text Available Experiences of the last couple of years indicate that political objectives are increasingly achieved without official declarations of war. Armed forces are used in untraditional ways and the so-called substitute troops begin to play an increasingly bigger part. The article aims to characterize the conflicts of alternative nature below the level of open war that are on the border between war and peace. The content of the article presents the theory of unconventional warfare and its description, and familiarizes the reader with the concept of grey zone conflicts. It further shows the challenges linked to rivalry for influence zones and security provisions.

  6. Battle-Wise: Seeking Time-Information Superiority in Networked Warfare

    Science.gov (United States)

    2006-07-01

    it best about learning from mistakes in life: “There is no wisdom in the second kick of a mule .” Although he did not have 21st-century warfare in...part of our military leadership—can we expect to avoid the “second kick of a mule .” xii BATTLE-WISE PREFACE xiii xiii Preface This book is an inquiry...recruiting meth - ods. Depending on work experience before joining the military, it may be possible actually to identify battle-wise traits in recruits. For

  7. Next Generation Non-particulate Dry Nonwoven Pad for Chemical Warfare Agent Decontamination

    Energy Technology Data Exchange (ETDEWEB)

    Ramkumar, S S; Love, A; Sata, U R; Koester, C J; Smith, W J; Keating, G A; Hobbs, L; Cox, S B; Lagna, W M; Kendall, R J

    2008-05-01

    New, non-particulate decontamination materials promise to reduce both military and civilian casualties by enabling individuals to decontaminate themselves and their equipment within minutes of exposure to chemical warfare agents or other toxic materials. One of the most promising new materials has been developed using a needlepunching nonwoven process to construct a novel and non-particulate composite fabric of multiple layers, including an inner layer of activated carbon fabric, which is well-suited for the decontamination of both personnel and equipment. This paper describes the development of a composite nonwoven pad and compares efficacy test results for this pad with results from testing other decontamination systems. The efficacy of the dry nonwoven fabric pad was demonstrated specifically for decontamination of the chemical warfare blister agent bis(2-chloroethyl)sulfide (H or sulfur mustard). GC/MS results indicate that the composite fabric was capable of significantly reducing the vapor hazard from mustard liquid absorbed into the nonwoven dry fabric pad. The mustard adsorption efficiency of the nonwoven pad was significantly higher than particulate activated carbon (p=0.041) and was similar to the currently fielded US military M291 kit (p=0.952). The nonwoven pad has several advantages over other materials, especially its non-particulate, yet flexible, construction. This composite fabric was also shown to be chemically compatible with potential toxic and hazardous liquids, which span a range of hydrophilic and hydrophobic chemicals, including a concentrated acid, an organic solvent and a mild oxidant, bleach.

  8. Information warfare as ICT influence on public consciousness and public opinion

    Directory of Open Access Journals (Sweden)

    A. H. Stadnyk

    2015-12-01

    Full Text Available The article defines the key aspects of the merits and impact of information warfare on public consciousness and public opinion. In the article, we review the information war not as an auxiliary mechanism for real war, but as a mechanism of affecting the public opinion. The public opinion can not be formed completely (while there is information content, public opinion changes constantly because the information in the hands of the media acts as a real weapon aimed at the mass consciousness. The article discusses in detail the four main factors that determine the effectiveness of the impact of information: 1 information warfare agents that affect the population, mass consciousness, public opinion; 2 information weapon of war; 3 the content itself, the content that is broadcast during the information war; 4 the specifics of mass awareness in different countries, the formation and functioning of their public opinion. And how much information war characteristic of the crisis (as an example to Ukraine since the beginning of the Maidan in 2013, the presentation of information aimed at manipulating public consciousness and, accordingly, the public opinion as the outward expression of consciousness.

  9. An Empirical Examination of the Warfare Metaphor with Respect to Pre-Service Elementary Teachers

    Science.gov (United States)

    Cobern, William W.; Loving, Cathleen C.; Davis, Edward B.; Terpstra, Jeff

    2013-08-01

    Since its origination in the late nineteenth century, the warfare metaphor has been used to characterize the relationship between science and religion, especially orthodox Christianity. Though thoroughly discredited by historians of science, the ideological descendants of Thomas Huxley, who spoke of science in quasi-religious terms, have kept the warfare metaphor alive. On the other hand, there are substantial numbers of Christians who at least appear to oppose science given their high-profile opposition to the general theory of evolution. The research reported in this paper asked, "Does anti-science sentiment increase with increasing orthodox Christian belief?" Two validated, published instruments were used: The Thinking about Science Survey Instrument and the Christian Fundamentalist Belief Scale. The subjects for the study were 545 preservice elementary teachers. The analysis did not show that anti-science sentiment increases with increasing Christian belief. Subjects with strong Christian beliefs were found to be just as supportive of science, if not more so, than subjects with no Christian beliefs. The study concludes with a caution against projecting attitudes toward science "on the whole" based on attitudes specifically toward evolution when working with preservice elementary teachers. Such a projection could well be counterproductive. The study has implications for other modern countries having highly religious populations such as Turkey.

  10. Investigating the Relationship Between Drone Warfare and Civilian Casualties in Gaza

    Directory of Open Access Journals (Sweden)

    Dr. Ann Rogers

    2014-12-01

    Full Text Available Unmanned aerial vehicles (UAVs, better known as drones, are increasingly touted as ‘humanitarian’ weapons that contribute positively to fighting just wars and saving innocent lives. At the same time, civilian casualties have become the most visible and criticized aspect of drone warfare. It is argued here that drones contribute to civilian casualties not in spite of, but because of, their unique attributes. They greatly extend war across time and space, pulling more potential threats and targets into play over long periods, and because they are low-risk and highly accurate, they are more likely to be used. The assumption that drones save lives obscures a new turn in strategic thinking that sees states such as Israel and the US rely on large numbers of small, highly discriminating attacks applied over time to achieve their objectives. This examination of Israel’s 2014 war in Gaza argues that civilian casualties are not an unexpected or unintended consequence of drone warfare, but an entirely predictable outcome.

  11. Zirconium doped nano-dispersed oxides of Fe, Al and Zn for destruction of warfare agents

    Energy Technology Data Exchange (ETDEWEB)

    Stengl, Vaclav, E-mail: stengl@uach.cz [Institute of Inorganic Chemistry AS CR v.v.i., 250 68 Rez (Czech Republic); Houskova, Vendula; Bakardjieva, Snejana; Murafa, Nataliya; Marikova, Monika [Institute of Inorganic Chemistry AS CR v.v.i., 250 68 Rez (Czech Republic); Oplustil, Frantisek; Nemec, Tomas [Military Technical Institute of Protection Brno, Veslarska 230, 628 00 Brno (Czech Republic)

    2010-11-15

    Zirconium doped nano dispersive oxides of Fe, Al and Zn were prepared by a homogeneous hydrolysis of the respective sulfate salts with urea in aqueous solutions. Synthesized metal oxide hydroxides were characterized using Brunauer-Emmett-Teller (BET) surface area and Barrett-Joiner-Halenda porosity (BJH), X-ray diffraction (XRD), infrared spectroscopy (IR), scanning electron microscopy (SEM) and energy-dispersive X-ray microanalysis (EDX). These oxides were taken for an experimental evaluation of their reactivity with sulfur mustard (HD or bis(2-chloroethyl)sulfide), soman (GD or (3,3'-Dimethylbutan-2-yl)-methylphosphonofluoridate) and VX agent (S-[2-(diisopropylamino)ethyl]-O-ethyl-methylphosphonothionate). The presence of Zr{sup 4+} dopant can increase both the surface area and the surface hydroxylation of the resulting doped oxides, decreases their crystallites' sizes thereby it may contribute in enabling the substrate adsorption at the oxide surface thus it can accelerate the rate of degradation of warfare agents. Addition of Zr{sup 4+} converts the product of the reaction of ferric sulphate with urea from ferrihydrite to goethite. We found out that doped oxo-hydroxides Zr-FeO(OH) - being prepared by a homogeneous hydrolysis of ferric and zirconium oxo-sulfates mixture in aqueous solutions - exhibit a comparatively higher degradation activity towards chemical warfare agents (CWAs). Degradation of soman or VX agent on Zr-doped FeO(OH) containing ca. 8.3 wt.% of zirconium proceeded to completion within 30 min.

  12. Zirconium doped nano-dispersed oxides of Fe, Al and Zn for destruction of warfare agents

    International Nuclear Information System (INIS)

    Stengl, Vaclav; Houskova, Vendula; Bakardjieva, Snejana; Murafa, Nataliya; Marikova, Monika; Oplustil, Frantisek; Nemec, Tomas

    2010-01-01

    Zirconium doped nano dispersive oxides of Fe, Al and Zn were prepared by a homogeneous hydrolysis of the respective sulfate salts with urea in aqueous solutions. Synthesized metal oxide hydroxides were characterized using Brunauer-Emmett-Teller (BET) surface area and Barrett-Joiner-Halenda porosity (BJH), X-ray diffraction (XRD), infrared spectroscopy (IR), scanning electron microscopy (SEM) and energy-dispersive X-ray microanalysis (EDX). These oxides were taken for an experimental evaluation of their reactivity with sulfur mustard (HD or bis(2-chloroethyl)sulfide), soman (GD or (3,3'-Dimethylbutan-2-yl)-methylphosphonofluoridate) and VX agent (S-[2-(diisopropylamino)ethyl]-O-ethyl-methylphosphonothionate). The presence of Zr 4+ dopant can increase both the surface area and the surface hydroxylation of the resulting doped oxides, decreases their crystallites' sizes thereby it may contribute in enabling the substrate adsorption at the oxide surface thus it can accelerate the rate of degradation of warfare agents. Addition of Zr 4+ converts the product of the reaction of ferric sulphate with urea from ferrihydrite to goethite. We found out that doped oxo-hydroxides Zr-FeO(OH) - being prepared by a homogeneous hydrolysis of ferric and zirconium oxo-sulfates mixture in aqueous solutions - exhibit a comparatively higher degradation activity towards chemical warfare agents (CWAs). Degradation of soman or VX agent on Zr-doped FeO(OH) containing ca. 8.3 wt.% of zirconium proceeded to completion within 30 min.

  13. The possible role of intravenous lipid emulsion in the treatment of chemical warfare agent poisoning

    Directory of Open Access Journals (Sweden)

    Arik Eisenkraft

    Full Text Available Organophosphates (OPs are cholinesterase inhibitors that lead to a characteristic toxidrome of hypersecretion, miosis, dyspnea, respiratory insufficiency, convulsions and, without proper and early antidotal treatment, death. Most of these compounds are highly lipophilic. Sulfur mustard is a toxic lipophilic alkylating agent, exerting its damage through alkylation of cellular macromolecules (e.g., DNA, proteins and intense activation of pro-inflammatory pathways. Currently approved antidotes against OPs include the peripheral anticholinergic drug atropine and an oxime that reactivates the inhibited cholinesterase. Benzodiazepines are used to stop organophosphate-induced seizures. Despite these approved drugs, efforts have been made to introduce other medical countermeasures in order to attenuate both the short-term and long-term clinical effects following exposure. Currently, there is no antidote against sulfur mustard poisoning. Intravenous lipid emulsions are used as a source of calories in parenteral nutrition. In recent years, efficacy of lipid emulsions has been shown in the treatment of poisoning by fat-soluble compounds in animal models as well as clinically in humans. In this review we discuss the usefulness of intravenous lipid emulsions as an adjunct to the in-hospital treatment of chemical warfare agent poisoning. Keywords: Intravenous lipid emulsion, Organophosphates, Sulfur mustard, Antidotes, Poisoning, Chemical Warfare agents

  14. Bioarchaeological investigation of ancient Maya violence and warfare in inland Northwest Yucatan, Mexico.

    Science.gov (United States)

    Serafin, Stanley; Lope, Carlos Peraza; Uc González, Eunice

    2014-05-01

    This study investigates evidence of changes and continuities in ancient Maya violence and warfare in inland northwest Yucatan, Mexico from the Middle Preclassic (600-300 BC) to the Postclassic (AD 1050-1542) through bioarchaeological analysis of cranial and projectile trauma. It is hypothesized that the frequency of violence increases before the Classic Maya collapse and remains high during the Postclassic period. It is also hypothesized that the flat, open terrain was conducive to warfare and resulted in higher trauma frequencies than in other parts of the Maya area. Results show that the frequency of cranial trauma decreases before the Classic collapse and increases in the Postclassic, partially matching the expected chronological trends. The frequency of cranial trauma does not differ significantly from other Maya regions but the pattern does: for all periods, males have more healed injuries than females and they are concentrated on the left side of the anterior of the skull. Some injuries appear to be from small points hafted in wooden clubs. In addition, projectile trauma is evident in a scapula with an embedded arrowhead tip, the first such case reported in a Maya skeleton. Overall, these results suggest greater reliance on open combat and less on raids in this region compared with other parts of the Maya area, possibly due to the flat, open terrain, though the identification of perimortem trauma in both women and men indicates surprise raids on settlements were also practiced. Copyright © 2014 Wiley Periodicals, Inc.

  15. Academic Training Lectures | Stuxnet and Cyber-Warfare | 13-14 January 2016

    CERN Multimedia

    2015-01-01

    Please note that the next series of Academic Training Lectures will take place on 13 and 14 January 2016. The lectures will be given by Gian Piero Siroli (Università e INFN, Bologna (IT))   Stuxnet and Cyber-Warfare (1/2)​ on Wednesday, 13 January from 11 a.m. to 12 p.m. http://indico.cern.ch/event/438525/ Stuxnet and Cyber-Warfare (2/2) on Thursday, 14 January from 11 a.m. to 12 p.m. http://indico.cern.ch/event/438526/ at CERN, Council Chamber (503-1-001)  Description: The first part of the lecture is devoted to the description of the Stuxnet worm, the first cyber-weapon whose existence has been made public, discovered in 2010 and targeting a specific industrial control system; the worm is responsible for the damaging of many centrifuges at an uranium enrichment facility, with the goal of sabotaging Iran&...

  16. Reevaluation of 1999 Health-Based Environmental Screening Levels (HBESLs) for Chemical Warfare Agents

    Energy Technology Data Exchange (ETDEWEB)

    Watson, Annetta Paule [ORNL; Dolislager, Fredrick G [ORNL

    2007-05-01

    This report evaluates whether new information and updated scientific models require that changes be made to previously published health-based environmental soil screening levels (HBESLs) and associated environmental fate/breakdown information for chemical warfare agents (USACHPPM 1999). Specifically, the present evaluation describes and compares changes that have been made since 1999 to U.S. Environmental Protection Agency (EPA) risk assessment models, EPA exposure assumptions, as well as to specific chemical warfare agent parameters (e.g., toxicity values). Comparison was made between screening value estimates recalculated with current assumptions and earlier health-based environmental screening levels presented in 1999. The chemical warfare agents evaluated include the G-series and VX nerve agents and the vesicants sulfur mustard (agent HD) and Lewisite (agent L). In addition, key degradation products of these agents were also evaluated. Study findings indicate that the combined effect of updates and/or changes to EPA risk models, EPA default exposure parameters, and certain chemical warfare agent toxicity criteria does not result in significant alteration to the USACHPPM (1999) health-based environmental screening level estimates for the G-series and VX nerve agents or the vesicant agents HD and L. Given that EPA's final position on separate Tier 1 screening levels for indoor and outdoor worker screening assessments has not yet been released as of May 2007, the study authors find that the 1999 screening level estimates (see Table ES.1) are still appropriate and protective for screening residential as well as nonresidential sites. As such, risk management decisions made on the basis of USACHPPM (1999) recommendations do not require reconsideration. While the 1999 HBESL values are appropriate for continued use as general screening criteria, the updated '2007' estimates (presented below) that follow the new EPA protocols currently under development

  17. 76 FR 10522 - Naval Surface Warfare Center, Upper Machodoc Creek and the Potomac River, Dahlgren, VA; Danger Zone

    Science.gov (United States)

    2011-02-25

    ... Warfare Center, Dahlgren's patrol boats. Oystering and fishing boats or other craft may cross the river in... bombing, directed energy technology, and manned or unmanned water craft operations; expand the Middle... manned or unmanned watercraft. (ii) When hazardous operations are in progress, no person, or fishing or...

  18. Modern sample preparation techniques for gas chromatography-mass spectrometry analysis of environmental markers of chemical warfare agents use

    NARCIS (Netherlands)

    Terzic, O.; de Voogt, P.; Banoub, J.

    2014-01-01

    The chapter introduces problematics of on-site chemical analysis in the investigations of past chemical warfare agents (CWA) events. An overview of primary environmental degradation pathways of CWA leading to formation of chemical markers of their use is given. Conventional and modern sample

  19. Warfare tourism experiences and national identity: The case of Airborne Museum ‘Hartenstein’ in Oosterbeek, the Netherlands

    NARCIS (Netherlands)

    Gieling, Johannes

    2016-01-01

    This paper examines through an analysis of Dutch warfare tourism whether there is a relationship between the subjective perceived salience of Dutch identity and heritage tourists' motives, emotions and overall satisfaction. Using a social identity theory framework, this study provides a view of

  20. Warfare has changed - so should have methods: Ammunition and weapon performance induced operational risk and safety issues

    NARCIS (Netherlands)

    Verhagen, T.L.A.; Voorde, M.J. van de

    2010-01-01

    Warfare has changed. Out-of-area operations have increased the awareness that we are unfamiliar with the performance of the current conventional medium and large calibre ammunitions in day-to-day practice. Current ammunition is primarily developed and procured to defeat the traditional ‘steel’

  1. Rapid Analysis of Chemical Warfare Agents and Their Hydrolysis Products by Desorption Electrospray Ionization Mass Spectrometry (DESI-MS)

    Science.gov (United States)

    2009-10-01

    72, 77-79], polymers [80], alkaloids on plant tissue [81], chemical warfare agents on solid phase microextraction (SPME) fibers [60, 82], hydrolysis...situ detection of alkaloids in plant tissue under ambient conditions using desorption electrospray ionization. Analyst, 130, 1624-1633. [82

  2. Trace Detection of Organophosphorus Chemical Warfare Agents in Wastewater and Plants by Luminescent UIO-67(Hf) and Evaluating the Bioaccumulation of Organophosphorus Chemical Warfare Agents.

    Science.gov (United States)

    Lian, Xiao; Yan, Bing

    2018-04-17

    Organophosphorus chemical warfare agents (OPCWAs) are a group of organic pollutants characterized by high toxicity and chemical stability, and they are very difficult to be degraded. The trace quality of OPCWAs in water and food will cause great harm to the human body. Therefore, the detection of OPCWAs is a difficult challenge, which has become the research hotspot over the world. In this work, a Hf-based luminescent metal-organic framework (Eu@1) is prepared, and the reactivity of Hf 12 results in a methanephosphonic acid (MPA)-induced luminescence quenching and the charge transfer from MPA to Hf(IV) and generated exciplexes which are responsible for this quenching effect. The excellent performance of Eu@1 in the detection of MPA, with its finer selectivity, high sensitivity (LOD = 0.4 ppm), and large linear range (10 -7 to 10 -3 M), is encouraging for application in wastewater detection. Importantly, MPA is a pollutant that can be absorbed by plants and causes the bioaccumulation effect, and thus, the detection of MPA in real plant samples is a purposeful topic. Eu@1 also achieved satisfactory results in actual plant sample testing, and the bioaccumulation of MPA in onions, turnips, and cabbages is determined via our sensor. This fabricated detector provides a feasible path for the detection of ppm-level OPCWAs in a complex environment, which will help humans to avoid OPCWA-contaminated foods.

  3. Domestic Preparedness Program: Evaluation of the Agilent Gas Chromatograph - Flame Photometric Detector/Mass Selective Detector (GC-FPD/MSD) System Against Chemical Warfare Agents Summary Report

    National Research Council Canada - National Science Library

    Longworth, Terri

    2003-01-01

    This report characterizes the chemical warfare agent (CWA) detection potential of the commercially available Agilent gas chromatograph-flame photometric detector/mass selective detector (GC-FPD/MSD...

  4. An Analysis of the Impact of Network-Centric Warfare on the Doctrine and Tactics, Techniques and Procedures of Intelligence at the Operational Level

    National Research Council Canada - National Science Library

    Harvey, Charles

    1999-01-01

    This project sought to determine the impacts of network centric warfare (NCW) on the planning and direction of intelligence at the operational level, and what changes in joint intelligence doctrine (JID...

  5. Fate of chemical warfare agents and toxic indutrial chemicals in landfills

    DEFF Research Database (Denmark)

    Bartelt-Hunt, D.L.; Barlaz, M.A.; Knappe, D.R.U.

    2006-01-01

    One component of preparedness for a chemical attack is planning for the disposal of contaminated debris. To assess the feasibility of contaminated debris disposal in municipal solid waste (MSW) landfills, the fate of selected chemical warfare agents (CWAs) and toxic industrial chemicals (TICs......], and two TICs [furan and carbon disulfide] were studied. The effects of both infiltration (climate) and contaminant biodegradability on fate predictions were assessed. Model results showed that hydrolysis and gas-phase advection were the principal fate pathways for CWAs and TICs, respectively. Apart from...... CX and the TICs, none of the investigated compounds was predicted to persist in a landfill for more than 5 years. Climate had little impact on CWA/TIC fate, and biodegradability was only important for compounds with long hydrolysis halflives. Monte Carlo simulations were performed to assess...

  6. Nuclear radiation in warfare. A SIPRI publication. Strahlungswirkungen beim Einsatz von Kernwaffen. Eine SIPRI-Publikation

    Energy Technology Data Exchange (ETDEWEB)

    Rotblat, J.

    1986-01-01

    The subject is covered in chapters, entitled: introduction; digest of nuclear weaponry (characteristics of nuclear weapons; effects of nuclear weapons other than ionizing radiation (fire-ball, fall-out, thermal radiation, blast wave, electromagnetic pulse); the nuclear arms race; war scenarios; biological effects of radiations on man (radiation doses; natural sources of radiation; acute effects of radiation; long-term somatic effects; genetic effects; factors affecting the biological response to radiation; internal exposure; synergistic effects; protection against radiation effects); radiations from nuclear explosions (initial radiation; fall-out; effects of fall-out on animal and plant life; contamination of water and food supplies by fall-out); radiation casualties in a nuclear war; effectiveness of civil defence; other warlike uses of radiation (attacks on civilian nuclear power installations; radiological warfare; terrorist activities); conclusion.

  7. Comparison of Selected Methods for Individual Decontamination of Chemical Warfare Agents

    Directory of Open Access Journals (Sweden)

    Tomas Capoun

    2014-06-01

    Full Text Available This study addresses the individual decontamination of chemical warfare agents (CWA and other hazardous substances. The individual decontamination applies to contaminated body surfaces, protective clothing and objects immediately after contamination, performed individually or by mutual assistance using prescribed or improvised devices. The article evaluates the importance of individual decontamination, security level for Fire and Rescue Service Units of the Czech Republic (FRS CR and demonstrates some of the devices. The decontamination efficiency of selected methods (sorbent, glove and sponge, two-chamber foam device and wiping with alcohol was evaluated for protective clothing and painted steel plate contaminated with O-ethyl-S-(diisopropylaminoethyl-methylthiophosphonate (VX, sulfur mustard, o-cresol and acrylonitrile. The methods were assessed from an economic point of view and with regard to specific user parameters, such as the decontamination of surfaces or materials with poor accessibility and vertical surfaces, the need for a water rinse as well as toxic waste and its disposal.

  8. Investigation of Acute Toxicity of a Chemical Warfare Agent in Kidneys

    Directory of Open Access Journals (Sweden)

    Turgut Topal

    2007-08-01

    Full Text Available One of the most important chemical warfare agents, sulfur mustard (SM causes crucial acute and chronic toxic effects. Lung, skin, eye and kidneys are the most affected organs. In this work, it was investigated if increased nitric oxide (NO and peroxynitrite are involved in nitrogen mustard (NM induced kidney damage. In this experimen, aminoguanidine (AG as inducible nitric oxide synthase (iNOS inhibitor and ebselen as peroxynitrite scavenger were used. NM administration resulted in important oxidant and antioxidant changes as well as tissue damage in kidneys. Therapeutic agents showed significant protection and reduced oxidant parameteres leading to tissue healing was observed. Results of this study suggest that drugs with similar properties can be used to protect kidney damage caused by NM. [TAF Prev Med Bull. 2007; 6(4: 227-232

  9. Investigation of Acute Toxicity of a Chemical Warfare Agent in Kidneys

    Directory of Open Access Journals (Sweden)

    Turgut Topal

    2007-08-01

    Full Text Available One of the most important chemical warfare agents, sulfur mustard (SM causes crucial acute and chronic toxic effects. Lung, skin, eye and kidneys are the most affected organs. In this work, it was investigated if increased nitric oxide (NO and peroxynitrite are involved in nitrogen mustard (NM induced kidney damage. In this experimen, aminoguanidine (AG as inducible nitric oxide synthase (iNOS inhibitor and ebselen as peroxynitrite scavenger were used. NM administration resulted in important oxidant and antioxidant changes as well as tissue damage in kidneys. Therapeutic agents showed significant protection and reduced oxidant parameteres leading to tissue healing was observed. Results of this study suggest that drugs with similar properties can be used to protect kidney damage caused by NM. [TAF Prev Med Bull 2007; 6(4.000: 227-232

  10. Chemiresistor Devices for Chemical Warfare Agent Detection Based on Polymer Wrapped Single-Walled Carbon Nanotubes

    Science.gov (United States)

    Fennell, John F.; Hamaguchi, Hitoshi; Yoon, Bora; Swager, Timothy M.

    2017-01-01

    Chemical warfare agents (CWA) continue to present a threat to civilian populations and military personnel in operational areas all over the world. Reliable measurements of CWAs are critical to contamination detection, avoidance, and remediation. The current deployed systems in United States and foreign militaries, as well as those in the private sector offer accurate detection of CWAs, but are still limited by size, portability and fabrication cost. Herein, we report a chemiresistive CWA sensor using single-walled carbon nanotubes (SWCNTs) wrapped with poly(3,4-ethylenedioxythiophene) (PEDOT) derivatives. We demonstrate that a pendant hexafluoroisopropanol group on the polymer that enhances sensitivity to a nerve agent mimic, dimethyl methylphosphonate, in both nitrogen and air environments to concentrations as low as 5 ppm and 11 ppm, respectively. Additionally, these PEDOT/SWCNT derivative sensor systems experience negligible device performance over the course of two weeks under ambient conditions. PMID:28452929

  11. Love-Wave Sensors Combined with Microfluidics for Fast Detection of Biological Warfare Agents

    Directory of Open Access Journals (Sweden)

    Daniel Matatagui

    2014-07-01

    Full Text Available The following paper examines a time-efficient method for detecting biological warfare agents (BWAs. The method is based on a system of a Love-wave immunosensor combined with a microfluidic chip which detects BWA samples in a dynamic mode. In this way a continuous flow-through of the sample is created, promoting the reaction between antigen and antibody and allowing a fast detection of the BWAs. In order to prove this method, static and dynamic modes have been simulated and different concentrations of BWA simulants have been tested with two immunoreactions: phage M13 has been detected using the mouse monoclonal antibody anti-M13 (AM13, and the rabbit immunoglobulin (Rabbit IgG has been detected using the polyclonal antibody goat anti-rabbit (GAR. Finally, different concentrations of each BWA simulants have been detected with a fast response time and a desirable level of discrimination among them has been achieved.

  12. Love-wave sensors combined with microfluidics for fast detection of biological warfare agents.

    Science.gov (United States)

    Matatagui, Daniel; Fontecha, José Luis; Fernández, María Jesús; Gràcia, Isabel; Cané, Carles; Santos, José Pedro; Horrillo, María Carmen

    2014-07-15

    The following paper examines a time-efficient method for detecting biological warfare agents (BWAs). The method is based on a system of a Love-wave immunosensor combined with a microfluidic chip which detects BWA samples in a dynamic mode. In this way a continuous flow-through of the sample is created, promoting the reaction between antigen and antibody and allowing a fast detection of the BWAs. In order to prove this method, static and dynamic modes have been simulated and different concentrations of BWA simulants have been tested with two immunoreactions: phage M13 has been detected using the mouse monoclonal antibody anti-M13 (AM13), and the rabbit immunoglobulin (Rabbit IgG) has been detected using the polyclonal antibody goat anti-rabbit (GAR). Finally, different concentrations of each BWA simulants have been detected with a fast response time and a desirable level of discrimination among them has been achieved.

  13. Decontamination of adsorbed chemical warfare agents on activated carbon using hydrogen peroxide solutions.

    Science.gov (United States)

    Osovsky, Ruth; Kaplan, Doron; Nir, Ido; Rotter, Hadar; Elisha, Shmuel; Columbus, Ishay

    2014-09-16

    Mild treatment with hydrogen peroxide solutions (3-30%) efficiently decomposes adsorbed chemical warfare agents (CWAs) on microporous activated carbons used in protective garments and air filters. Better than 95% decomposition of adsorbed sulfur mustard (HD), sarin, and VX was achieved at ambient temperatures within 1-24 h, depending on the H2O2 concentration. HD was oxidized to the nontoxic HD-sulfoxide. The nerve agents were perhydrolyzed to the respective nontoxic methylphosphonic acids. The relative rapidity of the oxidation and perhydrolysis under these conditions is attributed to the microenvironment of the micropores. Apparently, the reactions are favored due to basic sites on the carbon surface. Our findings suggest a potential environmentally friendly route for decontamination of adsorbed CWAs, using H2O2 without the need of cosolvents or activators.

  14. Bioterrorism and Biological Warfare, from Past to the Present: A classic review

    Directory of Open Access Journals (Sweden)

    Majid Zare Bidaki

    2015-10-01

    Full Text Available Bioterrorism is defined as any terrorist action of intentional release or dissemination of highly pathogenic biological agents, including a variety of microorganisms or biological toxins. With the growing threat of terrorism, is necessary that the potential danger of various microorganisms – as a powerful tool of aggression and threat- to be taken seriously. This review tries to explain the concept of biological weapons and their historical development process with an emphasis on efforts to control the proliferation of these types of weapons over the last century. Potential impact of infectious diseases on people and armed forces was known from since 600 BC. Using the victims of the plague as a weapon in medieval warfare and spread of smallpox as a weapon during the war against the Indians when initially America was discovered, the development of biological weapons during the World War I, World War II and the Cold War, and even since the beginning of the third millennium, all show the strategic importance of pathogenic microorganisms as a deterrent power for the superiority of some governments and cults. Historical attempts to use infectious diseases as biological weapons reveal that the distinction between a natural outbreak of an infectious disease and that of a deliberate biological attack is very difficult. Abusing this characteristic of infectious diseases has made it possible for the purposes of superiority. International agreements to control the development of biological weapons, such as “the 1925 Geneva Protocol” and “the Convention on the Prohibition of the Development, Production and Stockpiling of Biological and Toxic Weapons” have not been able to control the development and using of biological warfare.  The current paper is a classic review (Overview article aiming at increasing the knowledge and awareness of people especially of health authorities and government officials.

  15. Nanoparticle-based optical biosensors for the direct detection of organophosphate chemical warfare agents and pesticides

    International Nuclear Information System (INIS)

    Simonian, A.L.; Good, T.A.; Wang, S.-S.; Wild, J.R.

    2005-01-01

    Neurotoxic organophosphates (OP) have found widespread use in the environment for insect control. In addition, there is the increasing threat of use of OP based chemical warfare agents in both ground based warfare and terrorist attacks. Together, these trends necessitate the development of simple and specific methods for discriminative detection of ultra low quantities of OP neurotoxins. In our previous investigations a new biosensor for the direct detection of organophosphorus neurotoxins was pioneered. In this system, the enzymatic hydrolysis of OP neurotoxins by organophosphate hydrolase (OPH) generated two protons in each hydrolytic turnover through reactions in which P-X bonds are cleaved. The sensitivity of this biosensor was limited due to the potentiometric method of detection. Recently, it was reported that a change in fluorescence properties of a fluorophore in the vicinity of gold nanoparticles might be used for detection of nanomolar concentrations of DNA oligonucleotides. The detection strategy was based on the fact that an enhancement or quenching of fluorescence intensity is a function of the distances between the gold nanoparticle and fluorophore. While these reports have demonstrated the use of nanoparticle-based sensors for the detection of target DNA, we observed that the specificity of enzyme-substrate interactions could be exploited in similar systems. To test the feasibility of this approach, OPH-gold nanoparticle conjugates were prepared, then incubated with a fluorescent enzyme inhibitor or decoy. The fluorescence intensity of the decoy was sensitive to the proximity of the gold nanoparticle, and thus could be used to indicate that the decoy was bound to the OPH. Then different paraoxon concentrations were introduced to the OPH-nanoparticle-conjugate-decoy mixtures, and normalized ratio of fluorescence intensities were measured. The greatest sensitivity to paraoxon was obtained when decoys and OPH-gold nanoparticle conjugates were present at

  16. Media Discourse in an Atmosphere of Information Warfare: From Manipulation to Aggression

    Directory of Open Access Journals (Sweden)

    Владимир Иванович Озюменко

    2017-12-01

    Full Text Available In todays atmosphere of information warfare the biased impact of the media has increased, pushing behind other functions, including the informative one. The forms of media influence have also changed: direct persuasion has been replaced by implicit manipulation, which develops into outright aggression. Since, in the media discourse aggression can be both verbal and non-verbal, we propose to use the term information (or media aggression , which is broader than verbal aggression . Media aggression can be considered as a binary process - in relation to the referent (affective aggression and in relation to the audience (cognitive aggression. As a result, the information under media aggression refers to the expression of open hostility and animosity towards the referent and meaningful impact on the consciousness of the recipient (the target audience to its ideological subordination. The purpose of this article is to justify the hypothesis that the growing media aggression is a feature of modern media discourse in the atmosphere of information warfare, and this function can be analysed within the framework of manipulative discourse as manipulative persuasion. The data has been taken from quality British and American newspapers, news websites of The BBC, The Economist, The Guardian, The New York Times, The Washington Post, and some others covering the relations between Russia and the USA, the situation in the Middle East, particularly in Syria. The the study was conducted using critical discourse analysis (Fairclough 2001, Van Dijk 2006, 2009; Wodak 2007; Weiss, Wodak 2007 and the multimodal approach (Ivanova, Spodarets 2010; Ponton 2016, and reveals various strategies and means of linguistic manipulation and media aggression. It also shows that the main aim of linguistic manipulation accentuated by verbal and non-verbal aggression is to deliberately mislead the audience imposing on it the desired idea of ideological subordination. Therefore, a

  17. Millennial Warfare

    Science.gov (United States)

    2017-06-09

    www.psychologytoday.com/ blog / cutting-edge-leadership/201005/how-lead-the-millennial-generation. 8 Elizabeth Bodine-Barron, Todd C. Helmus, Madeline...environment. ISIL has taken the message boards and blog post of the 1990s and jumped in with both feet to the modern digital environment. They push content...57 Riggio. 58 Stern and Berger, 81-84. 59 Anwar Alawlaki, “The State of Ummah,” Anwar Alawaki Blog , April 23, 2009, accessed March 15, 2017

  18. Nuclear warfare

    CERN Multimedia

    Broda

    1981-01-01

    Le Prof.Broda a étudié à Vienne et Berlin et a travaillé pendant la dernière guerre mondiale en Grande Bretagne pour le conseil de la recherche médicale, notamment sur la chimie de la vision. Il est maintenant Prof. de la chimie, physique et radiochimie à l'Université de Vienne, où il concentre ses travaux sur les méchanisme de transport d'énergie à travers les cellules de membranes.

  19. Electronic Warfare

    Science.gov (United States)

    2012-02-08

    nuclear burst. A high-altitude electromagnetic pulse ( HEMP ) can generate significant disruptive field strengths over a continental-size area. The...portion of the EMS most affected by EMP and HEMP is the radio spectrum. Planning for communications system protection is significant when the potential...international law (e.g., Protocol IV of the 1980 Convention on Certain Conventional Weapons that prohibits the use of laser weapons with a combat function to

  20. A Systems Approach to Architecting a Mission Package for LCS Support of Amphibious Operations

    Science.gov (United States)

    2014-09-01

    ESG expeditionary strike group F2T2EA find, fix, track, target, engage, and assess FAA functional area analysis FLIR forward-looking infrared FO...engagement capability. The LCS operating in support of a CSG or expeditionary strike group ( ESG ), or as part of a surface action group (SAG), will...Module 15 2. Anti-Submarine Warfare Mission Package Operating in direct support of a CSG or ESG , or as part of a forward-deployed group, the LCS

  1. Wide-Area Persistent Energy-Efficient Maritime Sensing

    Science.gov (United States)

    2015-09-30

    sensor data can be processed coherently or incoherently to achieve synoptic maritime sensing over a wide area. OBJECTIVES 1) Development of a...use this testbed to collect on the open water to confirm operation at sea. Figure 4: Block diagram and picture of the Arduino-based...including ship self-protection, anti-submarine warfare, synoptic oceanographic field measurement, and harbor security. In particular, the reduction

  2. Autonomous Underwater Vehicle Architecture Synthesis for Shipwreck Interior Exploration

    Science.gov (United States)

    2015-12-01

    1989, the Komsomolets (K-278), a Russian nuclear attack submarine operating in the Norwegian Sea, went down after unsuccessfully fighting a fire in...surface search radar and the Shark Gill active sonar. D. ENVIRONMENT DESCRIPTION K-278 is located approximately 180 miles south of Medvezhy Island...primary mission: anti-submarine warfare (ASW), or land attack . The principal concern of the submarine commander is the safety of his submarine and crew

  3. Perspectives on Operational Testing: Guest Lecture at Naval Postgraduate School

    Science.gov (United States)

    2017-01-01

    provide a guest lecture to students in the T&E course. The briefing covers three primary themes: 1) evaluation of military systems on the basis of...be designed to be reliable, equipped with self-protection features and radios, and capable of transporting weapons and sonobuoys across the...specified distances , but would not actually have to have the ability to successfully find and sink threat submarines in an Anti-Submarine Warfare mission

  4. A Comparison of Neutron-Based Non-Destructive Assessment Methods for Chemical Warfare Materiel and High Explosives

    Science.gov (United States)

    Seabury, E. H.; Chichester, D. L.; Wharton, C. J.; Caffrey, A. J.

    2009-03-01

    Prompt Gamma Neutron Activation Analysis (PGNAA) systems employ neutrons as a probe to interrogate items, e.g. chemical warfare materiel-filled munitions. The choice of a neutron source in field-portable systems is determined by its ability to excite nuclei of interest, operational concerns such as radiological safety and ease-of-use, and cost. Idaho National Laboratory's PINS Chemical Assay System has traditionally used a 252Cf isotopic neutron source, but recently a deuterium-tritium (DT) electronic neutron generator (ENG) has been tested as an alternate neutron source. This paper presents the results of using both of these neutron sources to interrogate chemical warfare materiel (CWM) and high explosive (HE) filled munitions.

  5. Models, Analysis, and Recommendations Pertaining to the Retention of Naval Special Warfare s Mid-Level Officers

    Science.gov (United States)

    2013-12-01

    I would like to thank Sarah Ashby, an amazing human being and friend; you spent countless hours researching information that was absolutely critical...The Analytic Hierarch/Network Process,” in Rev. R. Acad. Cien. Serie A. Mat (RACSAM), submitted by Francisco Javier Giron (Real Academia de Ciencias ...Academia de Ciencias : Spain. Scott, Nathan. Naval Special Warfare Officer Retention Survey. Monterey, CA: NPS Press, September 2013. Whittenberger

  6. Capability of the People’s Republic of China to Conduct Cyber Warfare and Computer Network Exploitation

    Science.gov (United States)

    2009-10-09

    resurgence of similar large scale hacker wars. Some groups, rallying around politically “safe” topics such as anti- Tibetan independence, however, still...also described Peng as an “experienced hacker” (see Figure 5).88 • Following this exposure on Henderson’s blog, the Coolswallow and Buddhist ...the Tibetan Government in Exile in India. The Canadian-based Information Warfare Monitor (IWM) notes the compromise of numerous government and

  7. The Short-Term Effect of Chest Physiotherapy on Spirometric Indices in Chemical Warfare Victims Exposed to Mustard Gas

    Directory of Open Access Journals (Sweden)

    A Abedi

    2008-12-01

    Full Text Available ABCTRACT Introduction & Objective: Chronic respiratory diseases are the most prevalent late sequels of sulfur mustard gas injury among Iranian chemical warfare victims. Chest physiotherapy is one of the useful methods in care, cure and infection prevention of these patients. The aim of this study was to determine the short-term effect of chest physiotherapy on spirometric indices in chemical warfare victims exposed to sulfur mustard gas. Materials & Methods: In this study, 27 of the chemical warfare victims with respiratory diseases were selected. Chest physiotherapy including postural drainage percussion and vibration were used in four positions for all patients. Pulmonary function test (PFT was obtained before (baseline, immediately and 20 minute after the chest physiotherapy. The SPSS software was used for the data analysis of the collected data. Results: Results of this study showed the significant effect (p<0.01 of chest physiotherapy upon forced expiratory volume in first second (FEV1 (baseline mean, 44.19 immediately after intervention mean 47.3 and 20 minute after intervention mean 48.3 and forced vital capacity (FVC (baseline mean, 69.37 immediately after intervention mean, 73.67 20 minute after intervention 75.74. Chest physiotherapy had significant effect (p<0.01 in asthmatic bronchitis group and also had significant effect (p<0.05 in both severe and moderate groups. Conclusion: Chest physiotherapy was able to improve pulmonary function test indices in chemical warfare victims suffering from respiratory problems. The effect on asthmatic bronchitis group, as well as both severe and moderate groups, was significant.

  8. Application of Model-Based Systems Engineering (MBSE) to Compare Legacy and Future Forces in Mine Warfare (MIW) Missions

    Science.gov (United States)

    2014-12-01

    airborne mine neutralization system AoA analysis of alternatives API application programming interface ASuW anti-surface warfare ASW...upon stakeholder feedback, an operational scenario was developed and ACRS was selected as the primary MOE for comparison. Lifecycle cost and risks...MIW Team was unfamiliar with some of the more advanced features of ExtendSim, such as 3-D animation, application programming inter- faces ( APIs ) to

  9. A hybrid method for protection against threats to a network infrastructure for an electronic warfare management system

    Science.gov (United States)

    Byłak, Michał; RóŻański, Grzegorz

    2017-04-01

    The article presents the concept of ensuring the security of network information infrastructure for the management of Electronic Warfare (EW) systems. The concept takes into account the reactive and proactive tools against threats. An overview of the methods used to support the safety of IT networks and information sources about threats is presented. Integration of mechanisms that allow for effective intrusion detection and rapid response to threats in a network has been proposed. The architecture of the research environment is also presented.

  10. Special Operations Forces in the People’s Liberation Army and the Development of an Integral Unconventional Warfare Mission

    Science.gov (United States)

    2005-06-01

    Yahuda , Michael . The International Politics of the Asia-Pacific, 1945-1995 (New York; Routledge, 1996). Yang, Andrew N.D. and Liao, Milton Wen...Action: The Challenge of Unconventional Warfare (Portland: Frank Cass Press, 2001), 3-4. 9. Michael J.Strack, “China: Special Operations Forces of...weapons/scud.html; Internet; accessed 21 March 2005. 59. Michael B. Gordon and General Bernard E. Trainor, “ The General’s War: The Inside Story of

  11. Potential Science and Technology Game Changers for the Ground Warfare of 2050: Selected Projections Made in 2017

    Science.gov (United States)

    2018-02-01

    effect, it is a living document that is not intended to offer arguments or recommendations for programmatic investments or priorities. It touches on the ...reports might offer different projections or update those already discussed. In effect, it is a living document. It is also important to emphasize what...now and 2050; these are depicted by the stars inside the left circle. Most of them will not have a game-changing importance for ground warfare in

  12. The potential impact of developments in electronic technology on the future conduct of air warfare, volume 3

    Science.gov (United States)

    1986-12-01

    Advances in microelectronics have resulted in circuit densities many orders of magnitude greater than in current usage, making possible higher speed circuitry and greater storage capacity. RF techniques are also leading to monolithic microwave integrated circuits and microstrip antennas with corresponding reductions in size and weight. In addition, rapid advances are taking place in computer architecture and software that will provide improved information processing and control. This, coupled with progress in artificial intelligence and man-machine interface, offers promise of greatly improved battle management in the cockpit. The scale of changes is such that the nature of air warfare should be significantly affected over the next twenty years. This study examined the potential of electronic technology and potential benefits such as improvements in information processing, reduction in size and weight, increased reliability and maintainability; determined the applicability of such improvements to avionics and command and control systems and such functions as navigation and guidance, communications, surveillance, cockpit engineering and electronic warfare; and examined the impact on air warfare in the time period 2000 to 2010.

  13. Multifunctional ultra-high vacuum apparatus for studies of the interactions of chemical warfare agents on complex surfaces.

    Science.gov (United States)

    Wilmsmeyer, Amanda R; Gordon, Wesley O; Davis, Erin Durke; Mantooth, Brent A; Lalain, Teri A; Morris, John R

    2014-01-01

    A fundamental understanding of the surface chemistry of chemical warfare agents is needed to fully predict the interaction of these toxic molecules with militarily relevant materials, catalysts, and environmental surfaces. For example, rules for predicting the surface chemistry of agents can be applied to the creation of next generation decontaminants, reactive coatings, and protective materials for the warfighter. Here, we describe a multifunctional ultra-high vacuum instrument for conducting comprehensive studies of the adsorption, desorption, and surface chemistry of chemical warfare agents on model and militarily relevant surfaces. The system applies reflection-absorption infrared spectroscopy, x-ray photoelectron spectroscopy, and mass spectrometry to study adsorption and surface reactions of chemical warfare agents. Several novel components have been developed to address the unique safety and sample exposure challenges that accompany the research of these toxic, often very low vapor pressure, compounds. While results of vacuum-based surface science techniques may not necessarily translate directly to environmental processes, learning about the fundamental chemistry will begin to inform scientists about the critical aspects that impact real-world applications.

  14. The role of the sand in chemical warfare agent exposure among Persian Gulf War veterans: Al Eskan disease and "dirty dust".

    Science.gov (United States)

    Korényi-Both, A L; Svéd, L; Korényi-Both, G E; Juncer, D J; Korényi-Both, A L; Székely, A

    2000-05-01

    The purpose of this paper is to inquire into the relationship between Al Eskan disease and the probable exposure to chemical warfare agents by Persian Gulf War veterans. Al Eskan disease, first reported in 1991, compromises the body's immunological defense and is a result of the pathogenic properties of the extremely fine, dusty sand located in the central and eastern region of the Arabian peninsula. The disease manifests with localized expression of multisystem disorder. Signs and symptoms of Al Eskan disease have been termed by the news media "Persian Gulf syndrome." The dust becomes a warfare agent when toxic chemicals are microimpregnated into inert particles. The "dirty dust" concept, that the toxicity of an agent could be enhanced by absorption into inactive particles, dates from World War I. A growing body of evidence shows that coalition forces have encountered Iraqi chemical warfare in the theater of operation/Persian Gulf War to a much greater extent than early U.S. Department of Defense information had indicated. Veterans of that war were exposed to chemical warfare agents in the form of direct (deliberate) attacks by chemical weapons, such as missiles and mines, and indirect (accidental) contamination from demolished munition production plants and storage areas, or otherwise. We conclude that the microimpregnated sand particles in the theater of operation/Persian Gulf War depleted the immune system and simultaneously acted as vehicles for low-intensity exposure to chemical warfare agents and had a modifying-intensifying effect on the toxicity of exposed individuals. We recommend recognition of a new term, "dirty sand," as a subcategory of dirty dust/dusty chemical warfare agents. Our ongoing research efforts to investigate the health impact of chemical warfare agent exposure among Persian Gulf War veterans suggest that Al Eskan disease is a plausible and preeminent explanation for the preponderance of Persian Gulf War illnesses.

  15. Efficacy of liquid and foam decontamination technologies for chemical warfare agents on indoor surfaces.

    Science.gov (United States)

    Love, Adam H; Bailey, Christopher G; Hanna, M Leslie; Hok, Saphon; Vu, Alex K; Reutter, Dennis J; Raber, Ellen

    2011-11-30

    Bench-scale testing was used to evaluate the efficacy of four decontamination formulations on typical indoor surfaces following exposure to the liquid chemical warfare agents sarin (GB), soman (GD), sulfur mustard (HD), and VX. Residual surface contamination on coupons was periodically measured for up to 24h after applying one of four selected decontamination technologies [0.5% bleach solution with trisodium phosphate, Allen Vanguard Surface Decontamination Foam (SDF™), U.S. military Decon Green™, and Modec Inc. and EnviroFoam Technologies Sandia Decontamination Foam (DF-200)]. All decontamination technologies tested, except for the bleach solution, performed well on nonporous and nonpermeable glass and stainless-steel surfaces. However, chemical agent residual contamination typically remained on porous and permeable surfaces, especially for the more persistent agents, HD and VX. Solvent-based Decon Green™ performed better than aqueous-based bleach or foams on polymeric surfaces, possibly because the solvent is able to penetrate the polymer matrix. Bleach and foams out-performed Decon Green for penetrating the highly polar concrete surface. Results suggest that the different characteristics needed for an ideal and universal decontamination technology may be incompatible in a single formulation and a strategy for decontaminating a complex facility will require a range of technologies. Copyright © 2011 Elsevier B.V. All rights reserved.

  16. Extraordinary Measures: Drone Warfare, Securitization, and the “War on Terror”

    Directory of Open Access Journals (Sweden)

    Romaniuk Scott Nicholas

    2015-07-01

    Full Text Available The use of unmanned aerial vehicles or “drones,” as part of the United States’ (US targeted killing (TK program dramatically increased after the War on Terror (WoT was declared. With the ambiguous nature and parameters of the WoT, and stemming from the postulation of numerous low-level, niche-, and other securitizations producing a monolithic threat, US drone operations now constitute a vital stitch in the extensive fabric of US counterterrorism policy. This article employs the theories of securitization and macrosecuritization as discussed by Buzan (1991, 2006, and Buzan and Wæver (2009 to understand targeted killing, by means of weaponized drones, as an extraordinary measure according to the Copenhagen School’s interpretation. An overarching securitization and the use of the “security” label warrants the emergency action of targeted killing through the use of drones as an extraordinary measure. We argue that the WoT serves as a means of securitizing global terrorism as a threat significant enough to warrant the use of drone warfare as an extraordinary use of force. By accepting the WoT as a securitization process we can reasonably accept that the US’ response(s against that threat are also securitized and therefore become extraordinary measures.

  17. Reactions of psychiatric inpatients to the threat of biological and chemical warfare in Israel.

    Science.gov (United States)

    Strous, Rael D; Ofir, Dana; Brodsky, Ori; Yakirevitch, Janna; Drannikov, Angela; Navo, Nadav; Kotler, Moshe

    2004-04-01

    In the months before the Second Gulf War, the threat of biological and chemical warfare led many Israelis to experience significant stress and mood changes. In this study, we investigated whether this threat affected the subjective mood and behavior of inpatients with schizophrenia and compared the results with effects noted in their clinical staff. Subjects were evaluated at two points in time-2 months before the war and on day 1 of the war-with a specially designed questionnaire and with the Spielberger Scale for Trait Anxiety. Although the responses of the two groups did not differ radically before the war, on the first day of war, significant differences were noted, with patients demonstrating increases in anxiety and level of concern. Both groups reported similar effects on their mood. Patients were more concerned about the potential for the outbreak of World War III, whereas staff were more concerned about economic effects. Female subjects in both groups demonstrated greater anxiety and mood changes after the outbreak of war compared with before the war. Effects observed on the patients may be related to the decreased coping threshold resulting from their illness, which renders psychotic patients more vulnerable to any acute stressor; however, effects on the staff members should not be ignored.

  18. Transmissivity and storage coefficient estimates from slug tests, Naval Air Warfare Center, West Trenton, New Jersey

    Science.gov (United States)

    Fiore, Alex R.

    2014-01-01

    Slug tests were conducted on 56 observation wells open to bedrock at the former Naval Air Warfare Center (NAWC) in West Trenton, New Jersey. Aquifer transmissivity (T) and storage coefficient (S) values for most wells were estimated from slug-test data using the Cooper-Bredehoeft-Papadopulos method. Test data from three wells exhibited fast, underdamped water-level responses and were analyzed with the Butler high-K method. The range of T at NAWC was approximately 0.07 to 10,000 square feet per day. At 11 wells, water levels did not change measurably after 20 minutes following slug insertion; transmissivity at these 11 wells was estimated to be less than 0.07 square feet per day. The range of S was approximately 10-10 to 0.01, the mode being 10-10. Water-level responses for tests at three wells fit poorly to the type curves of both methods, indicating that these methods were not appropriate for adequately estimating T and S from those data.

  19. Detection of chemical warfare simulants using Raman excitation at 1064 nm

    Science.gov (United States)

    Dentinger, Claire; Mabry, Mark W.; Roy, Eric G.

    2014-05-01

    Raman spectroscopy is a powerful technique for material identification. The technique is sensitive to primary and higher ordered molecular structure and can be used to identify unknown materials by comparison with spectral reference libraries. Additionally, miniaturization of opto-electronic components has permitted development of portable Raman analyzers that are field deployable. Raman scattering is a relatively weak effect compared to a competing phenomenon, fluorescence. Even a moderate amount of fluorescence background interference can easily prevent identification of unknown materials. A long wavelength Raman system is less likely to induce fluorescence from a wider variety of materials than a higher energy visible laser system. Compounds such as methyl salicylate (MS), diethyl malonate (DEM), and dimethyl methylphosphonate (DMMP) are used as chemical warfare agent (CWA) simulants for development of analytical detection strategies. Field detection of these simulants however poses unique challenges because threat identification must be made quickly without the turnaround time usually required for a laboratory based analysis. Fortunately, these CWA simulants are good Raman scatterers, and field based detection using portable Raman instruments is promising. Measurements of the CWA simulants were done using a 1064 nm based portable Raman spectrometer. The longer wavelength excitation laser was chosen relative to a visible based laser systems because the 1064 nm based spectrometer is less likely to induce fluorescence and more suitable to a wider range of materials. To more closely mimic real world measurement situations, different sample presentations were investigated.

  20. Global physics: from percolation to terrorism, guerilla warfare and clandestine activities

    Science.gov (United States)

    Galam, Serge

    2003-12-01

    The September 11 attack on the US has revealed an unprecedented terrorism with worldwide range of destruction. It is argued to result from the first worldwide percolation of passive supporters. They are people sympathetic to the terrorism cause but without being involved with it. They just do not oppose it in case they could. This scheme puts suppression of the percolation as the major strategic issue in the fight against terrorism. Acting on the population is shown to be useless. Instead a new strategic scheme is suggested to increase the terrorism percolation threshold and in turn suppress the percolation. The relevant associated space is identified as a multi-dimensional social space including both the ground earth surface and all various independent flags displayed by the terrorist group. Some hints are given on how to shrink the geographical spreading of terrorism threat. The model apply to a large spectrum of clandestine activities including guerilla warfare as well as tax evasion, corruption, illegal gambling, illegal prostitution and black markets.

  1. Metabolic Syndrome in Chemical Warfare Patients with Chronic Obstructive Pulmonary Disease

    Directory of Open Access Journals (Sweden)

    Shahrzad M. Lari

    2014-11-01

    Full Text Available   Introduction: Sulfur mustard (SM, a toxic alkylating gas, can cause serious long-term pulmonary complications such as chronic obstructive pulmonary disease (COPD. Metabolic syndrome (MetS is one of the important comorbidities of COPD. This study was designed to evaluate the frequency of metabolic syndrome in Iranian chemical warfare patients (CWPs with COPD. Materials and Methods: Thirty CWPs with a mean age of 46.93± 6.8 were enrolled in this study. The following parameters were studied in: complete pulmonary function tests, health-related quality of life, serum triglycerides (TG, high density lipoprotein (HDL and fasting blood sugar (FBS levels. Additionally, 32 COPD patients and 56 healthy persons were considered as control groups who were matched to CWPs. Results: We found a statistically significant difference in the frequency of MetS between the COPD patients and the healthy control group (p=0.04. Additionally, we observed a statistically significant difference in the mean HDL levels among these groups (p=

  2. Structural Effect of Thioureas on the Detection of Chemical Warfare Agent Simulants.

    Science.gov (United States)

    Ha, Seonggyun; Lee, Minhe; Seo, Hyun Ook; Song, Sun Gu; Kim, Kyung-Su; Park, Chan Heum; Kim, Il Hee; Kim, Young Dok; Song, Changsik

    2017-08-25

    The ability to rapidly detect, identify, and monitor chemical warfare agents (CWAs) is imperative for both military and civilian defense. Since most CWAs and their simulants have an organophosphonate group, which is a hydrogen (H)-bond acceptor, many H-bond donors have been developed to effectively bind to the organophosphonate group. Although thioureas have been actively studied as an organocatalyst, they are relatively less investigated in CWA detection. In addition, there is a lack of studies on the structure-property relationship for gas phase detection. In this study, we synthesized various thioureas of different chemical structures, and tested them for sensing dimethylmethylphosphonate (DMMP), a CWA simulant. Molecular interaction between DMMP and thiourea was measured by 1 H NMR titration and supported by density functional theory (DFT) calculations. Strong H-bond donor ability of thiourea may cause self-aggregation, and CH-π interaction can play an important role in the DMMP detection. Gas-phase adsorption of DMMP was also measured using a quartz crystal microbalance (QCM) and analyzed using the simple Langmuir isotherm, showing the importance of structure-induced morphology of thioureas on the surface.

  3. Healthcare and warfare. Medical space, mission and apartheid in twentieth century northern Namibia.

    Science.gov (United States)

    Nord, Catharina

    2014-07-01

    In the year 1966, the first government hospital, Oshakati hospital, was inaugurated in northern South-West Africa. It was constructed by the apartheid regime of South Africa which was occupying the territory. Prior to this inauguration, Finnish missionaries had, for 65 years, provided healthcare to the indigenous people in a number of healthcare facilities of which Onandjokwe hospital was the most important. This article discusses these two agents' ideological standpoints. The same year, the war between the South-West African guerrillas and the South African state started, and continued up to 1988. The two hospitals became involved in the war; Oshakati hospital as a part of the South African war machinery, and Onandjokwe hospital as a 'terrorist hospital' in the eyes of the South Africans. The missionary Onandjokwe hospital was linked to the Lutheran church in South-West Africa, which became one of the main critics of the apartheid system early in the liberation war. Warfare and healthcare became intertwined with apartheid policies and aggression, materialised by healthcare provision based on strategic rationales rather than the people's healthcare needs. When the Namibian state took over a ruined healthcare system in 1990, the two hospitals were hubs in a healthcare landscape shaped by missionary ambitions, war and apartheid logic.

  4. Trade, Diplomacy, and Warfare: The Quest for Elite Rhizobia Inoculant Strains

    Directory of Open Access Journals (Sweden)

    Alice Checcucci

    2017-11-01

    Full Text Available Rhizobia form symbiotic nitrogen-fixing nodules on leguminous plants, which provides an important source of fixed nitrogen input into the soil ecosystem. The improvement of symbiotic nitrogen fixation is one of the main challenges facing agriculture research. Doing so will reduce the usage of chemical nitrogen fertilizer, contributing to the development of sustainable agriculture practices to deal with the increasing global human population. Sociomicrobiological studies of rhizobia have become a model for the study of the evolution of mutualistic interactions. The exploitation of the wide range of social interactions rhizobia establish among themselves, with the soil and root microbiota, and with the host plant, could constitute a great advantage in the development of a new generation of highly effective rhizobia inoculants. Here, we provide a brief overview of the current knowledge on three main aspects of rhizobia interaction: trade of fixed nitrogen with the plant; diplomacy in terms of communication and possible synergistic effects; and warfare, as antagonism and plant control over symbiosis. Then, we propose new areas of investigation and the selection of strains based on the combination of the genetic determinants for the relevant rhizobia symbiotic behavioral phenotypes.

  5. China’s Three Warfares Strategy Mitigates Fallout From Cyber Espionage Activities

    Directory of Open Access Journals (Sweden)

    Emilio Iasiello

    2016-06-01

    Full Text Available China is engaged in longstanding cyber espionage against the U.S., as well as other nations, to collect sensitive public and private information in support of national objectives laid out in its 12th Five Year Plan. Foreign governments citing China’s malfeasance have rebuked these activities, a claim vehemently denied by Beijing. In response, China is leveraging the “Three Warfares” an integrated three-prong information warfare strategy to combat these accusations by leveraging Media, Legal, and Psychological components designed to influence the international community. While the United States has threatened the imposition of economic sanctions, Beijing has successfully parried consequential actions by arresting U.S.-identified hackers, thereby demonstrating its commitment toward preserving a stable and peaceful cyberspace. These interrelated “Three Warfares” disciplines have targeted the cognitive processes of the U.S. leadership, as well as the international public’s perception of China as a global threat, thereby having successfully forestalled the implementation of any effective punitive or economic deterrence strategy to include the imposition of cyber sanctions.

  6. Virtual Warfare: Masculinity, Sexuality, and Propaganda in the Russo-Ukrainian War

    Directory of Open Access Journals (Sweden)

    Maryna Romanets

    2017-03-01

    Full Text Available This paper explores the intersection of sexual and political discourses as a particular aspect of the body politics that Russia has employed, among other strategies, in its massive propaganda offensive during the hybrid warfare against Ukraine.While recognizing sexuality as one of the mainstream concepts in political analysis, the paper draws on sexually explicit imagery and idiom used in Russian social media, and public discursive space in general, as propaganda techniques, and maps their “genealogy” within wider sociocultural and political contexts. Being conceptualized in terms of Russian hegemonic masculinity in relation to subordinated femininity and non-hegemonic masculinities of its adversarial others, these setups reveal how sexuality constitutes uneven and contradictory nexuses of power once being co-opted by Putin’s propaganda machine. It is noteworthy that Russia’s neo-imperial discursive tactics of homologizing sexual and political dominance—when supplemented with the official rhetoric of restituting Russia as a great power, Orthodox Christian fundamentalism as an integral part of Russian unique “state-civilization,” state-sanctioned homophobia, and traditional macho gender ideology—contribute quite effectively to sustaining public support in Russia for aggression against Ukraine in the process of Russian reimperialization of the former Soviet space.

  7. Trade, Diplomacy, and Warfare: The Quest for Elite Rhizobia Inoculant Strains.

    Science.gov (United States)

    Checcucci, Alice; DiCenzo, George C; Bazzicalupo, Marco; Mengoni, Alessio

    2017-01-01

    Rhizobia form symbiotic nitrogen-fixing nodules on leguminous plants, which provides an important source of fixed nitrogen input into the soil ecosystem. The improvement of symbiotic nitrogen fixation is one of the main challenges facing agriculture research. Doing so will reduce the usage of chemical nitrogen fertilizer, contributing to the development of sustainable agriculture practices to deal with the increasing global human population. Sociomicrobiological studies of rhizobia have become a model for the study of the evolution of mutualistic interactions. The exploitation of the wide range of social interactions rhizobia establish among themselves, with the soil and root microbiota, and with the host plant, could constitute a great advantage in the development of a new generation of highly effective rhizobia inoculants. Here, we provide a brief overview of the current knowledge on three main aspects of rhizobia interaction: trade of fixed nitrogen with the plant; diplomacy in terms of communication and possible synergistic effects; and warfare, as antagonism and plant control over symbiosis. Then, we propose new areas of investigation and the selection of strains based on the combination of the genetic determinants for the relevant rhizobia symbiotic behavioral phenotypes.

  8. Explosives and chemical warfare agents - detection and analysis with PTR-MS

    Energy Technology Data Exchange (ETDEWEB)

    Sulzer, Philipp; Juerschik, Simone; Jaksch, Stefan; Jordan, Alfons; Hanel, Gernot; Hartungen, Eugen; Seehauser, Hans; Maerk, Lukas; Haidacher, Stefan; Schottkowsky, Ralf [IONICON Analytik GmbH, Innsbruck (Austria); Petersson, Fredrik [Institut fuer Ionenphysik und Angewandte Physik, Leopold-Franzens Universitaet Innsbruck (Austria); Maerk, Tilmann [IONICON Analytik GmbH, Innsbruck (Austria); Institut fuer Ionenphysik und Angewandte Physik, Leopold-Franzens Universitaet Innsbruck (Austria)

    2010-07-01

    We utilized a recently developed high sensitivity PTR-MS instrument equipped with a high resolution time-of-flight mass analyzer for detailed investigations on explosives and chemical warfare agents (CWAs). We show that with this so called PTR-TOF 8000 it is possible to identify solid explosives (RDX, TNT, HMX, PETN and Semtex A) by analyzing the headspace above small quantities of samples at room temperature and from trace quantities not visible to the naked eye placed on surfaces. As the mentioned solid explosives possess very low vapor pressures, the main challenge for detecting them in the gas phase is to provide an instrument with a sufficient sensitivity. CWAs on the other side have very high vapor pressures but are difficult to identify unambiguously as their nominal molecular masses are usually comparably small and therefore hard to distinguish from harmless everyday-compounds (e.g. mustard gas: 159 g/mol). In the present work we demonstrate that we can detect a broad range of dangerous substances, ranging from the CWA mustard gas to the explosive HMX.

  9. Social networks as a new tool of information warfare in the modern world

    Directory of Open Access Journals (Sweden)

    B. W. Kovalevych

    2014-03-01

    Full Text Available With the rapid development of information technologies, especially the Internet, people are becoming increasingly dependent on information that surrounds them. And social networks, where a person spends most of their time, become the ideal instruments of influence on the people consciousness and information warfare. Due to psychological factors ( such as ‘spiral of silence’, the herd instinct, the entire credibility of published information, opinion leaders, the desire for self­realization or replacement of reality that influence the human behavior in the network and the use of models of influence (model of network attack, model of involving users as volunteers, total block model, social networks become a platform for the dissemination of political ideas, ideologies and implementation of the ‘color revolutions’. However, social media play a positive role, especially in the establishment of civil society and the free flow of information. Positive or negative impact of networks primary depends on the purpose of use of social networking tools.

  10. Between Female Dialogics and Traces of Essentialism: Gender and Warfare in Christa Wolf's Major Writings

    Directory of Open Access Journals (Sweden)

    Sabine Wilke

    1993-06-01

    Full Text Available The relationship between memory, writing, and the question of how we define ourselves as gendered subjects is at the center of Christa Wolf's work. Her literary production, starting in the late fifties with a rather naive and un-selfconscious love story, has undergone a dramatic shift. In her more recent texts, Wolf sets out to rewrite classical mythology to make us aware of those intersections in the history of Western civilization at which women were made economically and psychologically into objects. The present essay seeks to locate Christa Wolf's evolving conception of gender and warfare within the contemporary theoretical discussion on identity and the subject sketched briefly above. While of late there has been a wealth of studies into the construction of gender in particular works by Wolf, no scholarly contribution has yet addressed the range of answers regarding those questions in her overall oeuvre. I will argue that whereas Wolf's earlier works present a dialogic conception of gender, her later narratives more and more expound a notion of the essentially more peaceful female subject that is counterposed to the essentially warloving male. In these works "female subjectivity is taken to be capable of articulating itself fully in its radical otherness outside of male discourse," which seems to support ideas of an ontological essence of "woman."

  11. Chemical warfare agent detection in complex environments with comprehensive two-dimensional gas chromatography

    Science.gov (United States)

    Reichenbach, Stephen E.; Ni, Mingtian; Kottapalli, Visweswara; Visvanathan, Arvind; Ledford, Edward B., Jr.; Oostdijk, John; Trap, Henk C.

    2003-08-01

    Comprehensive two-dimensional gas chromatography (GCxGC) is an emerging technology for chemical separation that provides an order-of-magnitude increase in separation capacity over traditional gas chromatography. GCxGC separates chemical species with two capillary columns interfaced by two-stage thermal desorption. Because GCxGC is comprehensive and has high separation capacity, it can perform multiple traditional analytical methods with a single analysis. GCxGC has great potential for a wide variety of environmental sensing applications, including detection of chemical warfare agents (CWA) and other harmful chemicals. This paper demonstrates separation of nerve agents sarin and soman from a matrix of gasoline and diesel fuel. Using a combination of an initial column separating on the basis of boiling point and a second column separating on the basis of polarity, GCxGC clearly separates the nerve agents from the thousands of other chemicals in the sample. The GCxGC data is visualized, processed, and analyzed as a two-dimensional digital image using a software system for GCxGC image processing developed at the University of Nebraska - Lincoln.

  12. Chemical Warfare Agent Surface Adsorption: Hydrogen Bonding of Sarin and Soman to Amorphous Silica.

    Science.gov (United States)

    Davis, Erin Durke; Gordon, Wesley O; Wilmsmeyer, Amanda R; Troya, Diego; Morris, John R

    2014-04-17

    Sarin and soman are warfare nerve agents that represent some of the most toxic compounds ever synthesized. The extreme risk in handling such molecules has, until now, precluded detailed research into the surface chemistry of agents. We have developed a surface science approach to explore the fundamental nature of hydrogen bonding forces between these agents and a hydroxylated surface. Infrared spectroscopy revealed that both agents adsorb to amorphous silica through the formation of surprisingly strong hydrogen-bonding interactions with primarily isolated silanol groups (SiOH). Comparisons with previous theoretical results reveal that this bonding occurs almost exclusively through the phosphoryl oxygen (P═O) of the agent. Temperature-programmed desorption experiments determined that the activation energy for hydrogen bond rupture and desorption of sarin and soman was 50 ± 2 and 52 ± 2 kJ/mol, respectively. Together with results from previous studies involving other phosphoryl-containing molecules, we have constructed a detailed understanding of the structure-function relationship for nerve agent hydrogen bonding at the gas-surface interface.

  13. COPD assessment test (CAT): simple tool for evaluating quality of life of chemical warfare patients with chronic obstructive pulmonary disease.

    Science.gov (United States)

    Lari, Shahrzad M; Ghobadi, Hassan; Attaran, Davood; Mahmoodpour, Afsoun; Shadkam, Omid; Rostami, Maryam

    2014-01-01

    Chronic obstructive pulmonary disease (COPD) is one of the serious late pulmonary complications caused by sulphur mustard exposure. Health status evaluations of chemical warfare patients with COPD are important to the management of these patients. The aim of this study was to determine the efficacy of the COPD assessment test (CAT) in evaluating the health-related quality of life (HRQOL) of chemical warfare patients with COPD. Eighty-two consecutive patients with stable COPD were enrolled in this study. All subjects were visited by one physician, and the HRQOL was evaluated by the CAT and St. George Respiratory Questionnaires (SGRQs). In addition, a standard spirometry test, 6-min walk distance test and pulse oxymetry were conducted. The severity of the COPD was determined using Global Initiative for Chronic Obstructive Lung Disease (GOLD) staging and the body mass index, obstruction, dyspnoea and exercise (BODE) index. The mean age of the patients was 47.30 ± 7.08 years. The mean CAT score was 26.03 ± 8.28. Thirty-five (43%) patients were in CAT stage 3. There were statistically significant correlations between the CAT and the SGRQ (r = 0.70, P = 0.001) and the BODE index (r = 0.70, P = 0.001). A statistically significant inverse correlation was found between the CAT score and the forced expiratory volume in 1 s (r = -0.30, P = 0.03). Our results demonstrated that the CAT is a simple and valid tool for assessment of HRQOL in chemical warfare patients with COPD and can be used in clinical practice. © 2013 John Wiley & Sons Ltd.

  14. Treatment of chemical warfare agents by zero-valent iron nanoparticles and ferrate(VI)/(III) composite

    Energy Technology Data Exchange (ETDEWEB)

    Zboril, Radek, E-mail: zboril@prfnw.upol.cz [Regional Centre of Advanced Technologies and Materials, Departments of Physical Chemistry and Experimental Physics, 17. listopadu 1192/12, 771 46 Olomouc (Czech Republic); Andrle, Marek; Oplustil, Frantisek [Military Institute VOP-026 Sternberk, Division in Brno, Rybkova 8, 602 00 Brno (Czech Republic); Machala, Libor; Tucek, Jiri; Filip, Jan; Marusak, Zdenek [Regional Centre of Advanced Technologies and Materials, Departments of Physical Chemistry and Experimental Physics, 17. listopadu 1192/12, 771 46 Olomouc (Czech Republic); Sharma, Virender K., E-mail: vsharma@fit.edu [Chemistry Department, Florida Institute of Technology, 150 West University Boulevard, Melbourne, FL 32901 (United States); Center of Ferrate Excellence, Florida Institute of Technology, 150 West University Boulevard, Melbourne, FL 32901 (United States)

    2012-04-15

    Highlights: Black-Right-Pointing-Pointer Ferrate(VI) has been found to be highly efficient to decontaminate chemical warfare agents. Black-Right-Pointing-Pointer Fast degradation of sulfur mustard, soman and compound VX by ferrate(VI). Black-Right-Pointing-Pointer Nanoscale zero-valent iron particles are considerably less efficient in degradation of studied warfare agents compared to ferrate(VI). - Abstract: Nanoscale zero-valent iron (nZVI) particles and a composite containing a mixture of ferrate(VI) and ferrate(III) were prepared by thermal procedures. The phase compositions, valence states of iron, and particle sizes of iron-bearing compounds were determined by combination of X-ray powder diffraction, Moessbauer spectroscopy and scanning electron microscopy. The applicability of these environmentally friendly iron based materials in treatment of chemical warfare agents (CWAs) has been tested with three representative compounds, sulfur mustard (bis(2-chlorethyl) sulfide, HD), soman ((3,3 Prime -imethylbutan-2-yl)-methylphosphonofluoridate, GD), and O-ethyl S-[2-(diisopropylamino)ethyl] methylphosphonothiolate (VX). Zero-valent iron, even in the nanodimensional state, had a sluggish reactivity with CWAs, which was also observed in low degrees of CWAs degradation. On the contrary, ferrate(VI)/(III) composite exhibited a high reactivity and complete degradations of CWAs were accomplished. Under the studied conditions, the estimated first-order rate constants ({approx}10{sup -2} s{sup -1}) with the ferrate(VI)/(III) composite were several orders of magnitude higher than those of spontaneous hydrolysis of CWAs (10{sup -8}-10{sup -6} s{sup -1}). The results demonstrated that the oxidative technology based on application of ferrate(VI) is very promising to decontaminate CWAs.

  15. Treatment of chemical warfare agents by zero-valent iron nanoparticles and ferrate(VI)/(III) composite

    International Nuclear Information System (INIS)

    Zboril, Radek; Andrle, Marek; Oplustil, Frantisek; Machala, Libor; Tucek, Jiri; Filip, Jan; Marusak, Zdenek; Sharma, Virender K.

    2012-01-01

    Highlights: ► Ferrate(VI) has been found to be highly efficient to decontaminate chemical warfare agents. ► Fast degradation of sulfur mustard, soman and compound VX by ferrate(VI). ► Nanoscale zero-valent iron particles are considerably less efficient in degradation of studied warfare agents compared to ferrate(VI). - Abstract: Nanoscale zero-valent iron (nZVI) particles and a composite containing a mixture of ferrate(VI) and ferrate(III) were prepared by thermal procedures. The phase compositions, valence states of iron, and particle sizes of iron-bearing compounds were determined by combination of X-ray powder diffraction, Mössbauer spectroscopy and scanning electron microscopy. The applicability of these environmentally friendly iron based materials in treatment of chemical warfare agents (CWAs) has been tested with three representative compounds, sulfur mustard (bis(2-chlorethyl) sulfide, HD), soman ((3,3′-imethylbutan-2-yl)-methylphosphonofluoridate, GD), and O-ethyl S-[2-(diisopropylamino)ethyl] methylphosphonothiolate (VX). Zero-valent iron, even in the nanodimensional state, had a sluggish reactivity with CWAs, which was also observed in low degrees of CWAs degradation. On the contrary, ferrate(VI)/(III) composite exhibited a high reactivity and complete degradations of CWAs were accomplished. Under the studied conditions, the estimated first-order rate constants (∼10 −2 s −1 ) with the ferrate(VI)/(III) composite were several orders of magnitude higher than those of spontaneous hydrolysis of CWAs (10 −8 –10 −6 s −1 ). The results demonstrated that the oxidative technology based on application of ferrate(VI) is very promising to decontaminate CWAs.

  16. Information Warfare-Worthy Jamming Attack Detection Mechanism for Wireless Sensor Networks Using a Fuzzy Inference System

    Directory of Open Access Journals (Sweden)

    Sudip Misra

    2010-04-01

    Full Text Available The proposed mechanism for jamming attack detection for wireless sensor networks is novel in three respects: firstly, it upgrades the jammer to include versatile military jammers; secondly, it graduates from the existing node-centric detection system to the network-centric system making it robust and economical at the nodes, and thirdly, it tackles the problem through fuzzy inference system, as the decision regarding intensity of jamming is seldom crisp. The system with its high robustness, ability to grade nodes with jamming indices, and its true-detection rate as high as 99.8%, is worthy of consideration for information warfare defense purposes.

  17. The Dragon and the Computer: Why Intellectual Property Theft is Compatible with Chinese Cyber-Warfare Doctrine

    OpenAIRE

    Shakarian, Paulo; Shakarian, Jana; Ruef, Andrew

    2013-01-01

    Along with the USA and Russia, China is often considered one of the leading cyber-powers in the world. In this excerpt, we explore how Chinese military thought, developed in the 1990s, influenced their cyber-operations in the early 2000s. In particular, we examine the ideas of "Unrestricted Warfare" and "Active Offense" and discuss how they can permit for the theft of intellectual property. We then specifically look at how the case study of Operation Aurora, a cyber-operation directed against...

  18. Modern warfare as a significant form of zoogeomorphic disturbance upon the landscape

    Science.gov (United States)

    Hupy, Joseph P.; Koehler, Thomas

    2012-07-01

    The damage exerted by warfare on the physical landscape is one, of many, anthropogenic impacts upon the environment. Bombturbation is a term that describes the impacts of explosive munitions upon the landscape. Bombturbation, like many other forms of zoogeomorphology, is a disruptive force, capable of moving large amounts of sediments, and denuding landscapes to the point where changes in micro and mesotopography have long-term implications. The long term implication of bombturbative actions depends on the type and duration of explosive device that rendered the disturbance, and the geographic context of the landscape disturbed; i.e. cultural and physical factors. Recovery from bombturbative activity, in the context of this research, is measured by vegetative regrowth and soil development in cratered disturbances. A comparison and contrast between the two battlefields of Verdun, France and Khe Sanh, Vietnam show that bombturbative actions have significantly altered the topography at each location, thus influencing surface runoff and processes of soil development. Principals of the Runge pedogenic model, or the energy of water moving through the soil profile, best explain how the varying climate and parent material at each location influence post disturbance soil development rates. Whereas the data collected at Verdun suggest that explosive munitions have put that landscape on diverging path of development, thus rendering it much different post-disturbance landscape, Khe Sanh displays much different recovery patterns. Preliminary research at Khe Sanh indicates that reforestation and soil development following disturbance are not so much influenced by bombturbative patterns as land use activities in the area of study.

  19. Application of the MASH v1.0 Code System to radiological warfare radiation threats

    International Nuclear Information System (INIS)

    Johnson, J.O.; Santoro, R.T.; Smith, M.S.

    1994-01-01

    Nuclear hardening capabilities of US and foreign ground force systems is a primary concern of the Department of Defense (DoD) and US Army. The Monte Carlo Adjoint Shielding Code System -- MASH v1.0 was developed at Oak Ridge National Laboratory (ORNL) to analyze these capabilities, i.e. the shielding effectiveness, for prompt radiation from a nuclear weapon detonation. Rapidly changing world events and the proliferation of nuclear weapons related technology have increased the kinds of nuclear threats to include intentionally dispersed radiation sources and fallout from tactical nuclear weapons used in the modern AirLand battlefield scenario. Consequently, a DoD area of increasing interest focuses on determining the shielding effectiveness of foreign and US armored vehicles to radiological warfare and fallout radiation threats. To demonstrate the applicability of MASH for analyzing dispersed radiation source problems, calculations have been completed for two distributed sources; a dispersed radiation environment simulated by a uniformly distributed 60 Co source, and a 235 U fission weapon fallout source. Fluence and dose assessments were performed for the free-field, the inside of a steel-walled two-meter box, in a phantom standing in the free-field, and in a phantom standing in the two-meter box. The results indicate substantial radiation protection factors for the 60 Co dispersed radiation source and the fallout source compared to the prompt radiation protection factors. The dose protection factors ranged from 40 to 95 for the two-meter box and from 55 to 123 for the mid-gut position of the phantom standing in the box. The results further indicate that a 60 Co source might be a good first order approximation for a tactical fission weapon fallout protection factor analysis

  20. Locus-specific microemulsion catalysts for sulfur mustard (HD) chemical warfare agent decontamination.

    Science.gov (United States)

    Fallis, Ian A; Griffiths, Peter C; Cosgrove, Terence; Dreiss, Cecile A; Govan, Norman; Heenan, Richard K; Holden, Ian; Jenkins, Robert L; Mitchell, Stephen J; Notman, Stuart; Platts, Jamie A; Riches, James; Tatchell, Thomas

    2009-07-22

    The rates of catalytic oxidative decontamination of the chemical warfare agent (CWA) sulfur mustard (HD, bis(2-chlororethyl) sulfide) and a range (chloroethyl) sulfide simulants of variable lipophilicity have been examined using a hydrogen peroxide-based microemulsion system. SANS (small-angle neutron scattering), SAXS (small-angle X-ray scattering), PGSE-NMR (pulsed-gradient spin-echo NMR), fluorescence quenching, and electrospray mass spectroscopy (ESI-MS) were implemented to examine the distribution of HD, its simulants, and their oxidation/hydrolysis products in a model oil-in-water microemulsion. These measurements not only present a means of interpreting decontamination rates but also a rationale for the design of oxidation catalysts for these toxic materials. Here we show that by localizing manganese-Schiff base catalysts at the oil droplet-water interface or within the droplet core, a range of (chloroethyl) sulfides, including HD, spanning some 7 orders of octanol-water partition coefficient (K(ow)), may be oxidized with equal efficacy using dilute (5 wt. % of aqueous phase) hydrogen peroxide as a noncorrosive, environmentally benign oxidant (e.g., t(1/2) (HD) approximately 18 s, (2-chloroethyl phenyl sulfide, C(6)H(5)SCH(2)CH(2)Cl) approximately 15 s, (thiodiglycol, S(CH(2)CH(2)OH)(2)) approximately 19 s {20 degrees C}). Our observations demonstrate that by programming catalyst lipophilicity to colocalize catalyst and substrate, the inherent compartmentalization of the microemulsion can be exploited to achieve enhanced rates of reaction or to exert control over product selectivity. A combination of SANS, ESI-MS and fluorescence quenching measurements indicate that the enhanced catalytic activity is due to the locus of the catalyst and not a result of partial hydrolysis of the substrate.

  1. The use of advanced simulation in the training of anesthesiologists to treat chemical warfare casualties.

    Science.gov (United States)

    Berkenstadt, Haim; Ziv, Amitai; Barsuk, Daphna; Levine, Inbal; Cohen, Amir; Vardi, Amir

    2003-06-01

    Training anesthesiologists to treat nerve gas intoxication in a mass casualty scenario is a complicated task. The scenario is an unfamiliar medical situation involving the need to decontaminate patients before providing definitive medical treatment, and the need for physical protection to the medical team before decontamination. We describe the development of a simulation-based training program. In one site of a virtual hospital, anesthesiologists were trained in initial airway and breathing resuscitation before decontamination while wearing full protective gear. In another site, they were trained in the treatment of critically-ill patients with combined conventional and chemical injuries or severe intoxication. Intubation simulators of newborn, pediatric, and adult patients, advanced full-scale simulators, and actors simulating patients were used. Initial airway, breathing, and antidotal treatment were performed successfully, with or without full protective gear. The gas mask did not interfere with orotracheal intubation, but limited effective communication within the medical team. Chemical protective gloves were the limiting factor in the performance of medical tasks such as fixing the orotracheal tube. Twenty-two participants (88%) pointed out that the simulated cases represented realistic problems in this scenario, and all 25 participants found the simulated-based training superior to previous traditional training they had in this field. Using advanced simulation, we were able to train anesthesiologists to treat nerve gas intoxication casualties and to learn about the limitations of providing medical care in this setting. Advanced medical simulation can be used to train anesthesiologists to treat nonconventional warfare casualties. The limitations of medical performance in full protective gear can be learned from this training.

  2. Computed Tomography Imaging findings in Chemical Warfare Victims with pulmonary Complications

    Directory of Open Access Journals (Sweden)

    Zahra Salehinezhad

    2013-05-01

    Full Text Available Introduction: Data on imaging findings in pulmonary complications of chemical agents is scarce. The current study aimed to evaluate radiological findings of late onset pulmonary complications in chemical warfare victims (CWV and to guide pulmonologists in diagnosis of these subjects. Materials and Methods: Ninety- three male CWV were enrolled in this prospective study, 20-25 years (mean=23 after exposure. Demographic and clinical data were recorded. High resolution computed Tomography (HRCT of the lung was performed during inspiration and expiration and was double reported blindly by two radiologists. Final diagnosis was made according to HRCT findings. The HRCT findings, final diagnosis, and distribution of the abnormalities were compared between subjects whom had been exposed to more complex chemical agents used during the second half of the war and simpler agents during the first half. Results: The most frequent HRCT findings were air trapping (56.7% and mosaic attenuation (35.1%. The distribution of abnormalities was mostly local (79.4% and bilateral (73% especially in lower regions (61.3%. The diagnosed respiratory diseases included bronchiolitis obliterans (43%, chronic obstructive pulmonary disease (COPD (27.9%, asthma (23.6%, bronchiectasis (13.9% and interstitial lung disease (ILD (9.6%. Frequency of subjects involved in the second half of the period of war was more than the first period (P-value < 0.05 but the HRCT findings were similar. Conclusions: Bronchiolitis obliterans with picture of focal bilateral air trapping was the most common finding in CWV but asthma appeared to have become a new problem in these subjects.

  3. Advances in toxicology and medical treatment of chemical warfare nerve agents

    Directory of Open Access Journals (Sweden)

    Moshiri Mohammd

    2012-11-01

    Full Text Available Abstract Organophosphorous (OP Nerve agents (NAs are known as the deadliest chemical warfare agents. They are divided into two classes of G and V agents. Most of them are liquid at room temperature. NAs chemical structures and mechanisms of actions are similar to OP pesticides, but their toxicities are higher than these compounds. The main mechanism of action is irreversible inhibition of Acetyl Choline Esterase (AChE resulting in accumulation of toxic levels of acetylcholine (ACh at the synaptic junctions and thus induces muscarinic and nicotinic receptors stimulation. However, other mechanisms have recently been described. Central nervous system (CNS depression particularly on respiratory and vasomotor centers may induce respiratory failure and cardiac arrest. Intermediate syndrome after NAs exposure is less common than OP pesticides poisoning. There are four approaches to detect exposure to NAs in biological samples: (I AChE activity measurement, (II Determination of hydrolysis products in plasma and urine, (III Fluoride reactivation of phosphylated binding sites and (IV Mass spectrometric determination of cholinesterase adducts. The clinical manifestations are similar to OP pesticides poisoning, but with more severity and fatalities. The management should be started as soon as possible. The victims should immediately be removed from the field and treatment is commenced with auto-injector antidotes (atropine and oximes such as MARK I kit. A 0.5% hypochlorite solution as well as novel products like M291 Resin kit, G117H and Phosphotriesterase isolated from soil bacterias, are now available for decontamination of NAs. Atropine and oximes are the well known antidotes that should be infused as clinically indicated. However, some new adjuvant and additional treatment such as magnesium sulfate, sodium bicarbonate, gacyclidine, benactyzine, tezampanel, hemoperfusion, antioxidants and bioscavengers have recently been used for OP NAs poisoning.

  4. [Analytical and on-site detection methods for chemical warfare agents].

    Science.gov (United States)

    Seto, Yasuo

    2006-12-01

    Chemical warfare agents (CWAs) are fast acting and sometimes lethal, even at low levels, and can be classified into nerve gases, blister agents, choking agents, blood agents, vomit agents, tear gases, and incapacitating agents. As countermeasures against CWA terrorism, detection and identification are important. In crisis management, monitoring of CWAs in public places and security checks at territorial borders, big event venues, and executive facilities are performed for protection against terrorism. In consequence management, on-site detection by first responders and laboratory analysis after on-site sampling and transfer are performed for minimization of terrorism damage, leading to personal protection, initial investigation, and emergency lifesaving. In incident management, laboratory analysis is performed to provide evidence at court trials for the prevention of future crimes. Laboratory analysis consists of pretreatment of on-site and casualty samples and instrumental analysis using GC-MS. However, CWAs are easily degraded, and thus are difficult to detect. Instead, it is useful to detect their metabolites and degradation products using tert-butyldimethylsilyl derivatization GC-MS or direct LC-MS. Commercially available chemical detection equipment such as gas detection tubes and ion mobility spectrometers are used for on-site detection. We have evaluated the detection performance of such equipment and found that no equipment fulfills the required perfect performance of CWA detection sensitivity, accuracy, response time, return time, and operation. To overcome the drawbacks, we have adopted the monitoring tape method and counterflow introduction atmospheric pressure chemical ionization mass spectrometry and recommend the combination of commercial detection equipment and these new technologies for simultaneous, rapid detection of all CWAs.

  5. Development and Application of Acute Exposure Guideline Levels (AEGLs) for Chemical Warfare Nerve and Sulfur Mustard Agents.

    Energy Technology Data Exchange (ETDEWEB)

    Watson, Annetta Paule [ORNL; Opresko, Dennis M [ORNL; Young, Robert A [ORNL; Hauschild, Veronique [U.S. Environmental Protection Agency

    2006-01-01

    Acute exposure guideline levels (AEGLs) have been developed for the chemical warfare agents GB, GA, GD, GF, VX, and sulfur mustard. These AEGLs were approved by the National Advisory Committee for Acute Exposure Guideline Levels for Hazardous Substances after Federal Register publication and comment, and judged as scientifically valid by the National Research Council Committee on Toxicology Subcommittee on AEGLs. AEGLs represent general public exposure limits for durations ranging from 10 min to 8 h, and for three levels of severity (AEGL-1, AEGL-2, AEGL-3). Mild effects are possible at concentrations greater than AEGL-1, while life-threatening effects are expected at concentrations greater than AEGL-3. AEGLs can be applied to various civilian and national defense purposes, including evacuation and shelter-in-place protocols, reentry levels, protective clothing specifications, and analytical monitoring requirements. This report documents development and derivation of AEGL values for six key chemical warfare agents, and makes recommendations for their application to various potential exposure scenarios.

  6. A Comparison of QSAR Based Thermo and Water Solvation Property Prediction Tools and Experimental Data for Selected Traditional Chemical Warfare Agents and Simulants

    Science.gov (United States)

    2014-07-01

    AND EXPERIMENTAL DATA FOR SELECTED TRADITIONAL CHEMICAL WARFARE AGENTS AND SIMULANTS ECBC-TR-1259 Jerry B. Cabalo RESEARCH AND TECHNOLOGY...PROGRAM ELEMENT NUMBER 6. AUTHOR(S) Cabalo , Jerry B. (ECBC); and Knox, Craig K. (Leidos) 5d. PROJECT NUMBER 5e. TASK NUMBER 5f. WORK UNIT

  7. Development of an automated on-line pepsin digestion-liquid chromatography-tandem mass spectrometry configuration for the rapid analysis of protein adducts of chemical warfare agents

    NARCIS (Netherlands)

    Carol-Visser, J.; van der Schans, M.; Fidder, A.; Huist, A.G.; van Baar, B.L.M.; Irth, H.; Noort, D.

    2008-01-01

    Rapid monitoring and retrospective verification are key issues in protection against and non-proliferation of chemical warfare agents (CWA). Such monitoring and verification are adequately accomplished by the analysis of persistent protein adducts of these agents. Liquid chromatography-mass

  8. System architecture and operational analysis of medium displacement unmanned surface vehicle sea hunter as a surface warfare component of distributed lethality

    Science.gov (United States)

    2017-06-01

    NAVAL POSTGRADUATE SCHOOL MONTEREY, CALIFORNIA THESIS Approved for public release. Distribution is unlimited. SYSTEM ARCHITECTURE ...TITLE AND SUBTITLE SYSTEM ARCHITECTURE AND OPERATIONAL ANALYSIS OF MEDIUM DISPLACEMENT UNMANNED SURFACE VEHICLE SEA HUNTER AS A SURFACE WARFARE...traceability, requirements and capabilities while determining the architecture framework in accordance with the Department of Defense Architectural

  9. Laser photoacoustic spectroscopy helps fight terrorism: High sensitivity detection of chemical Warfare Agent and explosives

    Science.gov (United States)

    Patel, C. K. N.

    2008-01-01

    Tunable laser photoacoustic spectroscopy is maturing rapidly in its applications to real world problems. One of the burning problems of the current turbulent times is the threat of terrorist acts against civilian population. This threat appears in two distinct forms. The first is the potential release of chemical warfare agents (CWA), such as the nerve agents, in a crowded environment. An example of this is the release of Sarin by Aum Shinrikyo sect in a crowded Tokyo subway in 1995. An example of the second terrorist threat is the ever-present possible suicide bomber in crowded environment such as airports, markets and large buildings. Minimizing the impact of both of these threats requires early detection of the presence of the CWAs and explosives. Photoacoustic spectroscopy is an exquisitely sensitive technique for the detection of trace gaseous species, a property that Pranalytica has extensively exploited in its CO2 laser based commercial instrumentation for the sub-ppb level detection of a number of industrially important gases including ammonia, ethylene, acrolein, sulfur hexafluoride, phosphine, arsine, boron trichloride and boron trifluoride. In this presentation, I will focus, however, on our recent use of broadly tunable single frequency high power room temperature quantum cascade lasers (QCL) for the detection of the CWAs and explosives. Using external grating cavity geometry, we have developed room temperature QCLs that produce continuously tunable single frequency CW power output in excess of 300 mW at wavelengths covering 5 μm to 12 μm. I will present data that show a CWA detection capability at ppb levels with false alarm rates below 1:108. I will also show the capability of detecting a variety of explosives at a ppb level, again with very low false alarm rates. Among the explosives, we have demonstrated the capability of detecting homemade explosives such as triacetone triperoxide and its liquid precursor, acetone which is a common household

  10. Impact of psychological problems in chemical warfare survivors with severe ophthalmologic complication, a cross sectional study

    Directory of Open Access Journals (Sweden)

    Ghaedi Gholamhosein

    2012-04-01

    Full Text Available Abstract Background Sulfur mustard (SM has been used as a chemical warfare agent since the early twentieth century. Despite the large number of studies that have investigated SM induced ocular injuries, few of those studies have also focused on the psychological health status of victims. This study has evaluated the most prominent influences on the psychological health status of patients with severe SM induced ocular injuries. Methods This descriptive study was conducted on 149 Iranian war veterans with severe SM induced eye injuries. The psychological health status of all patients was assessed using the Iranian standardized Symptom Check List 90-Revised (SCL90-R questionnaire. The results of patients' Global Severity Index (GSI were compared with the optimal cut-off point of 0.4 that has previously been calculated for GSI in Iranian community. The Mann-Whitney U test, T tests and effect sizes (using Cohen's d were employed as statistical methods. Data were analyzed using SPSS software. Results The mean age of patients was 44.86 (SD = 8.7 and mean duration of disease was 21.58 (SD = 1.20 years. Rate of exposure was once in 99 (66.4% cases. The mean GSI (1.46 of the study group was higher compared to standardized cut off point (0.4 of the Iranian community. The results of this study showed that the mean of total GSI score was higher in participants with lower educational levels (effect size = 0.507, unemployment (effect size = 0.464 and having more than 3 children (effect size = 0.62. Among the participants, 87 (58.4% cases had a positive psychological history for hospitalization or receiving outpatient cares previously and 62 (41.6% cases had a negative psychological history. In addition, the mean of GSI in participants with negative psychological history was lower than those with positive psychological history (Mean Change Difference = -0.621 with SD = 0.120. There was a significant difference between positive and negative psychological history

  11. Interleukin-6 and airflow limitation in chemical warfare patients with chronic obstructive pulmonary disease

    Directory of Open Access Journals (Sweden)

    Davood Attaran

    2010-09-01

    disease, interleukin-6, inflammation, chemical warfare

  12. Anticonvulsant efficacy of antihistamine cyproheptadine in rats exposed to the chemical warfare nerve agent soman.

    Science.gov (United States)

    Winkler, Jennifer L; Skovira, Jacob W; Kan, Robert K

    2017-01-01

    Organophosphate compounds, such as soman and sarin, are highly toxic chemical warfare nerve agents that cause a build-up of acetylcholine in synapses and neuromuscular junctions. Current therapies aim to prevent seizures and protect against brain injury following exposure. The present study was designed to evaluate the effectiveness of the antihistamine cyproheptadine in improving survival and controlling seizures in rats exposed to soman. Rats were pretreated with the oxime reactivator HI-6 (125mg/kg, ip) 30min prior to soman exposure (225μg/kg, sc) and then treated with atropine methylnitrate (AMN, 2.0mg/kg, im) 1min after soman. Cyproheptadine (10, 13, 16 or 20mg/kg, ip) was given at one of three time points: 1min after soman intoxication, at the onset of soman-induced seizures or 5min after seizure onset. Control animals were exposed to soman and given an equivalent volume of sterile water instead of cyproheptadine. The incidence of seizures, mortality, neuron counts, neuropathology and apoptosis in specific regions of the brain were evaluated. In animals given HI-6 and AMN the incidence of soman-induced seizure and mortality rate within the first 24h were 100%. When cyproheptadine was given at a dose of 13 or 20mg/kg 1min after soman exposure, the incidence of seizures was reduced from 100% to 13% and 30%, respectively. In addition, cyproheptadine given at 1min after soman exposure increased the survival rate to 100% regardless of dose. When cyproheptadine was administered at seizure onset, seizures were terminated in 100% of the animals at doses above 10mg/kg. The survival rate with cyproheptadine treatment at the onset of seizure was ≥83%. Seizures terminated in ≥75% of the animals that received cyproheptadine 5min after soman-induced seizure onset. When given at 5min after seizure onset the survival rate was 100% at all tested doses of cyproheptadine. The neuropathology scores and the number of TUNEL positive cells in the brain regions examined

  13. Anthropogenic landforms of warfare origin and their ecological significance: the Verdun Forest, NE France

    Science.gov (United States)

    De Matos Machado, Rémi; Amat, Jean-Paul; Arnaud-Fassetta, Gilles; Bétard, François; Bilodeau, Clélia; Jacquemot, Stéphanie; Toumazet, Jean-Pierre

    2017-04-01

    By its unprecedented industrial character, the First World War marked landscapes like no other conflict in the world. As a result of artillery bombardment and building facilities, the relief suffered major disturbances giving rise to millions anthropogenic landforms of warfare origin on the Western front: shell craters, trenches, shelters and gun sites. This landscape made of bumps and holes that dominated the lands of West Flanders and North-eastern France during the four years of war took chaotic aspects on the great battle sites. In some areas, substrate crushing by repeated bombings resulted in a field lowering of several metres. Although these geomorphological legacies of war are still present on these scarred lands, their effects on local environment and on present-day biodiversity patterns are not fully understood. On the battlefield of Verdun, where a huge number and range of conflict-induced landforms may be observed, special attention is being paid to the ecological significance of these anthropogenic landforms in a current landscape matrix dominated by forest. In 2013, an airborne LiDAR mission conducted over the battlefield has brought to light the relief inherited from the fighting that was until now concealed by the Verdun forest planted in the 1930's. Through a digital terrain model (DTM) with centimetre level accuracy, it is now possible to observe the smallest traces of the fighting. A first programmatic mapping work allowed to inventory and to locate these reliefs on the whole 10,000 hectares covered by the DTM. Also, the calculation of their geometry enabled us to quantify the erosion rate due to the military activities on the battlefield. On the basis of these morphometric measurements, a typology was developed to better appreciate the morphological diversity of conflict-induced landforms. The results show that these anthropogenic landforms are generally hollow. Because of this particular morphology, the conflict-induced landforms provide

  14. Evaluation of Molecular Markers and Analytical Methods Documenting the Occurrence of Mustard Gas and Arsenical Warfare Agents in Soil.

    Science.gov (United States)

    Sassolini, Alessandro; Brinchi, Giampaolo; Di Gennaro, Antonio; Dionisi, Simone; Dominici, Carola; Fantozzi, Luca; Onofri, Giorgio; Piazza, Rosario; Guidotti, Maurizio

    2016-09-01

    The chemicals warfare agents (CWAs) are an extremely toxic class of molecules widely produced in many industrialized countries for decades, these compounds frequently contained arsenic. The plants where the CWAs have been produced or the plants where they have been demilitarized after the Second World War with unacceptable techniques can represent a serious environmental problem. CWAs standards are difficult to find on market so in present work an environmental assessment method based on markers has been proposed. Triphenylarsine, phenylarsine oxide and thiodiglycol have been selected as markers. Three reliable analytical methods based on gaschromatography and mass detection have been proposed and tested for quantitative analysis of markers. Methods performance have been evaluated testing uncertainty, linearity, recovery and detection limits and also comparing detection limits with exposure limits of reference CWAs. Proposed assessment methods have been applied to a case study of a former industrial plant sited in an area characterized by a high background of mineral arsenic.

  15. NATO Advanced Research Workshop on Fluorescence and other Optical Properties of Biological Particles for Biological Warfare Agent Sensors

    CERN Document Server

    Hoekstra, Alfons; Videen, Gorden; Optics of Biological Particles

    2007-01-01

    This book covers the optics of single biological particles, both theory and experiment, with emphasis on Elastic Light Scattering and Fluorescence. It deals with the optics of bacteria (bio-aerosols), marine particles (selected phytoplankton communities) and red and white blood cells. Moreover, there are dedicated chapters on a general theory for scattering by a cell, and modelling and simulation of scattering by inhomogeneous biological cells. Finally, one chapter is dedicated to astro-biological signatures, discussing the possibilities for detecting non-terrestrial biological material. The volume has up-to-date discussions on new experimental and numerical techniques, and many examples of applications of these techniques in real-life systems, as used to detect and characterize e.g. biological warfare agents or human blood cells.

  16. Biological warfare warriors, secrecy and pure science in the Cold War: how to understand dialogue and the classifications of science.

    Science.gov (United States)

    Bud, Robert

    2014-01-01

    This paper uses a case study from the Cold War to reflect on the meaning at the time of the term 'Pure Science'. In 1961, four senior scientists from Britain's biological warfare centre at Porton Down visited Moscow both attending an International Congress and visiting Russian microbiological and biochemical laboratories. The reports of the British scientists in talking about a limited range of topics encountered in the Soviet Union expressed qualities of openness, sociologists of the time associated with pure science. The paper reflects on the discourses of "Pure Science", secrecy and security in the Cold War. Using Bakhtin's approach, I suggest the cordial communication between scientists from opposing sides can be seen in terms of the performance, or speaking, of one language among several at their disposal. Pure science was the language they were allowed to share outside their institutions, and indeed political blocs.

  17. “John A. MacMillan: Pioneer Missionary of Spiritual Warfare and the Believer’s Authority”

    Directory of Open Access Journals (Sweden)

    Paul King

    2016-01-01

    Full Text Available Many people associate teaching on spiritual warfare and the authority of the believer from charismatic or Word of Faith sources, especially like Kenneth Hagin. However, the original source of teaching on this doctrine comes from classic holiness roots in the Higher Life and Keswick movements, especially from John A. MacMillan, a missionary, writer, editor, and professor with the Christian and Missionary Alliance. In 1932 he wrote a series of articles entitled “The Authority of the Believer,” eventually published in book form, distributed widely and republished in other periodicals. MacMillan had a remarkable and extensive ministry in the exercise of the authority of the believer and spiritual warfare spanning more than thirty years. His experiences include divine protection, healing, divine intervention, power encounters with demonic forces, and teaching on territorial spirits and generational bondages. Numerous evangelical and charismatic leaders have quoted or referred to his teachings and principles.Banyak orang mengasosiasikan pengajaran peperangan rohani dan otoritas orang percaya dari karismatik atau sumber Firman Iman, terutama seperti Kenneth Hagin. Namun, sumber asli dari pengajaran doktrin ini berasal dari akar kekudusan klasik dalam gerakan Higher Life dan Keswick, terutama dari John A. MacMillan, seorang misionaris, penulis, editor, dan profesor dengan Christian and Missionary Alliance. Pada tahun 1932 ia menulis serangkaian artikel yang berjudul “Otoritas orang percaya,” akhirnya diterbitkan dalam bentuk buku, didistribusikan secara luas dan diterbitkan di majalah lainnya. MacMillan memiliki pelayanan yang luar biasa dan luas dalam pelaksanaan otoritas orang percaya dan peperangan rohani yang lebih dari tiga puluh tahun. Pengalamannya termasuk perlindungan ilahi, penyembuhan, campur tangan ilahi, pertemuan kuasa dengan kekuatan jahat, dan pengajaran tentang roh teritorial dan perbudakan generasi. Banyak pemimpin injili dan

  18. The Infantry Brigade Combat Team: The U.S. Army’s Premier Phase IV and Irregular Warfare Force for the 21st Century

    Science.gov (United States)

    2007-04-01

    required. The vision of this new IBCT is not complex . When the Army is called upon to conduct conventional warfare, it will do so with its Airborne...Because of its complexity , IW conflicts tend to last many years; it took the British ten years to win the IW conflict in Malaya.23 In order for a...include two human intelligence (HUMINT) collectors. In the IBCT’s Military Intelligence Company ( MICO ), there is an abundance of trained intelligence

  19. How Do I Know? A Guide to the Selection of Personal Protective Equipment for Use in Responding to A Release of Chemical Warfare Agents

    Energy Technology Data Exchange (ETDEWEB)

    Foust, C.B.

    1999-05-01

    An incident involving chemical warfare agents requires a unique hazardous materials (HAZMAT) response. As with an HAZMAT event, federal regulations prescribe that responders must be protected from exposure to the chemical agents. But unlike other HAZMAT events, special considerations govern selection of personal protective equipment (PPE). PPE includes all clothing, respirators and monitoring devices used to respond to a chemical release. PPE can differ depending on whether responders are military or civilian personnel.

  20. Desorption Electrospray Ionization Mass Spectrometry (DESI-MS) Analysis of Organophosphorus Chemical Warfare Agents: Rapid Acquisition of Time-Aligned Parallel (TAP) Fragmentation Data

    Science.gov (United States)

    2010-06-01

    of surfaces [22, 28-30], polymers [31], alkaloids on plant tissue [32], chemical warfare agents on solid phase microextraction (SPME) fibers [33, 34...phase analysis of industrial polymers. Chem. Commun., 888-890. [32] Talaty, N., Takats, Z. and Cooks, R.G. (2005). Rapid in situ detection of alkaloids ...in plant tissue under ambient conditions using desorption electrospray ionization. Analyst, 130, 1624-1633. [33] D’Agostino, P. A., Hancock, J. R

  1. Warfare and Socio-political hierarchies: reflections on non-State societies of the predynastic Nile Valley

    Directory of Open Access Journals (Sweden)

    Gayubas, Augusto

    2015-12-01

    Full Text Available In a recent article, anthropologist Robert L. Carneiro reassessed his most debated hypothesis about the emergence of chiefdoms and the State as a result of environmental or social circumscription, theorized for a series of historical contexts including that of the Predynastic Nile Valley. The problem of the origin of the State is beyond our scope, but regarding the emergence of institutionalized leadership and chiefdoms in the Nile Valley, Carneiro’s ideas about warfare as a main factor in the process of social change remain interesting, even when his insistence in circumscription is still debatable. The aim of the present paper is to briefly review the available archaeological evidence of warfare among non-State societies of the Predynastic Nile Valley, and to evaluate its possible relation to the emergence of socio-political hierarchies, in turn refering to and criticizing some of Carneiro’s recent ideas about the issue.En un artículo reciente, Robert L. Carneiro presentó una reconsideración de su muy debatida hipótesis acerca de la emergencia de sociedades de jefatura y del Estado como resultado de un contexto de circunscripción ambiental, teorizada para una serie de situaciones históricas, entre ellas el valle del Nilo predinástico. El problema del origen del Estado excede las posibilidades de este trabajo, pero en lo que respecta al surgimiento de jefaturas, consideramos que las ideas de Carneiro acerca de la guerra como factor de importancia en el proceso revisten cierto interés, aun cuando su insistencia en la circunscripción continúa siendo discutible. El objetivo del presente artículo es considerar la evidencia arqueológica de guerra disponible para las sociedades no estatales del valle del Nilo predinástico y evaluar la posible relación entre dichos testimonios y la emergencia de jerarquías sociopolíticas, refiriendo y criticando algunas de las ideas recientes de Carneiro sobre el problema.

  2. An inventory of wargaming models for special warfare: Candidate applications for the infusion of human performance data

    Energy Technology Data Exchange (ETDEWEB)

    Burton, H.D.; Banks, W.W.; Schultz, E.E.; Berghage, T.E.

    1988-11-01

    The material contained in this compendium has been drawn from many sources in an attempt to define the number and types of small group combat simulation models which currently exist. The emphasis placed on this particular effort was to identify combat simulation models which are oriented or could be oriented toward special warfare involving highly trained, light, mobile forces. These descriptions and characterizations of the different simulation models should be viewed with the goal of infusing human performance data and human performance models into candidate simulation models to enhance both fidelity and realism. We feel that this listing will be of direct benefit to military and civilian scientists who are interested in identifying candidate combat simulation models which can be targeted for enhancement with appropriate human performance data. Few existing models reviewed were found to incorporate laboratory or field data drawn from the behavioral sciences or human performance literature. Several models did incorporate human performance assumptions which were found to be incongruent with real world data about how people behave under various environmental conditions and both physical and cognitive stress.

  3. Evaluation of Chemical Warfare Agent Percutaneous Vapor Toxicity: Derivation of Toxicity Guidelines for Assessing Chemical Protective Ensembles.

    Energy Technology Data Exchange (ETDEWEB)

    Watson, A.P.

    2003-07-24

    Percutaneous vapor toxicity guidelines are provided for assessment and selection of chemical protective ensembles (CPEs) to be used by civilian and military first responders operating in a chemical warfare agent vapor environment. The agents evaluated include the G-series and VX nerve agents, the vesicant sulfur mustard (agent HD) and, to a lesser extent, the vesicant Lewisite (agent L). The focus of this evaluation is percutaneous vapor permeation of CPEs and the resulting skin absorption, as inhalation and ocular exposures are assumed to be largely eliminated through use of SCBA and full-face protective masks. Selection of appropriately protective CPE designs and materials incorporates a variety of test parameters to ensure operability, practicality, and adequacy. One aspect of adequacy assessment should be based on systems tests, which focus on effective protection of the most vulnerable body regions (e.g., the groin area), as identified in this analysis. The toxicity range of agent-specific cumulative exposures (Cts) derived in this analysis can be used as decision guidelines for CPE acceptance, in conjunction with weighting consideration towards more susceptible body regions. This toxicity range is bounded by the percutaneous vapor estimated minimal effect (EME{sub pv}) Ct (as the lower end) and the 1% population threshold effect (ECt{sub 01}) estimate. Assumptions of exposure duration used in CPE certification should consider that each agent-specific percutaneous vapor cumulative exposure Ct for a given endpoint is a constant for exposure durations between 30 min and 2 hours.

  4. Graphene Nanoplatelet-Polymer Chemiresistive Sensor Arrays for the Detection and Discrimination of Chemical Warfare Agent Simulants.

    Science.gov (United States)

    Wiederoder, Michael S; Nallon, Eric C; Weiss, Matt; McGraw, Shannon K; Schnee, Vincent P; Bright, Collin J; Polcha, Michael P; Paffenroth, Randy; Uzarski, Joshua R

    2017-11-22

    A cross-reactive array of semiselective chemiresistive sensors made of polymer-graphene nanoplatelet (GNP) composite coated electrodes was examined for detection and discrimination of chemical warfare agents (CWA). The arrays employ a set of chemically diverse polymers to generate a unique response signature for multiple CWA simulants and background interferents. The developed sensors' signal remains consistent after repeated exposures to multiple analytes for up to 5 days with a similar signal magnitude across different replicate sensors with the same polymer-GNP coating. An array of 12 sensors each coated with a different polymer-GNP mixture was exposed 100 times to a cycle of single analyte vapors consisting of 5 chemically similar CWA simulants and 8 common background interferents. The collected data was vector normalized to reduce concentration dependency, z-scored to account for baseline drift and signal-to-noise ratio, and Kalman filtered to reduce noise. The processed data was dimensionally reduced with principal component analysis and analyzed with four different machine learning algorithms to evaluate discrimination capabilities. For 5 similarly structured CWA simulants alone 100% classification accuracy was achieved. For all analytes tested 99% classification accuracy was achieved demonstrating the CWA discrimination capabilities of the developed system. The novel sensor fabrication methods and data processing techniques are attractive for development of sensor platforms for discrimination of CWA and other classes of chemical vapors.

  5. Transport behavior of surrogate biological warfare agents in a simulated landfill: Effect of leachate recirculation and water infiltration

    KAUST Repository

    Saikaly, Pascal

    2010-11-15

    An understanding of the transport behavior of biological warfare (BW) agents in landfills is required to evaluate the suitability of landfills for the disposal of building decontamination residue (BDR) following a bioterrorist attack on a building. Surrogate BW agents, Bacillus atrophaeus spores and Serratia marcescens, were spiked into simulated landfill reactors that were filled with synthetic building debris (SBD) and operated for 4 months with leachate recirculation or water infiltration. Quantitative polymerase chain reaction (Q-PCR) was used to monitor surrogate transport. In the leachate recirculation reactors, <10% of spiked surrogates were eluted in leachate over 4 months. In contrast, 45% and 31% of spiked S. marcescens and B. atrophaeus spores were eluted in leachate in the water infiltration reactors. At the termination of the experiment, the number of retained cells and spores in SBD was measured over the depth of the reactor. Less than 3% of the total spiked S. marcescens cells and no B. atrophaeus spores were detected in SBD. These results suggest that significant fractions of the spiked surrogates were strongly attached to SBD. © 2010 American Chemical Society.

  6. A comparison of 252Cf and 14-MeV neutron excitation to identify chemical warfare agents by PGNAA

    International Nuclear Information System (INIS)

    Caffrey, A.J.; Harlow, B.D.; Edwards, A.J.; Krebs, K.M.; Jones, J.L.; Yoon, W.; Zabriskie, J.M.; Dougan, A.D.

    2000-01-01

    Since 1992, Idaho National Engineering and Environmental Laboratory's portable isotopic neutron spectrometry (PINS) system has been widely used for the nondestructive assessment of munitions suspected to contain chemical warfare agents, such as the nerve agent sarin. PINS is a 252 Cf-based prompt gamma-ray neutron activation analysis (PGNAA) system. The standard PINS system employs a partially moderated 5-microg 252 Cf source emitting 10 7 n/s to excite the atomic nuclei inside the item under test. The chemical elements inside the item are revealed by their characteristic gamma-ray spectrum, measured by a high-resolution high-purity germanium gamma-ray spectrometer. The system computer then infers the fill compound or mixture from the elemental data extracted from the gamma-ray spectrum. Reliable PINS assessments can be completed in as little as 100 s for favorable cases such as white phosphorus smoke munitions, but normally, a 1000 to 3000 live-second counting interval is required. To improve PINS throughput when hundreds or more munitions must be assessed, they are evaluating the possible advantages of 14-MeV neutron excitation over their current radioisotopic source

  7. In Situ Probes of Capture and Decomposition of Chemical Warfare Agent Simulants by Zr-Based Metal Organic Frameworks

    Energy Technology Data Exchange (ETDEWEB)

    Plonka, Anna M.; Wang, Qi; Gordon, Wesley O.; Balboa, Alex; Troya, Diego; Guo, Weiwei; Sharp, Conor H.; Senanayake, Sanjaya D.; Morris, John R.; Hill, Craig L.; Frenkel, Anatoly I. (BNL); (Virginia Tech); (ECBC); (Emory); (SBU)

    2017-01-18

    Zr-based metal organic frameworks (MOFs) have been recently shown to be among the fastest catalysts of nerve-agent hydrolysis in solution. We report a detailed study of the adsorption and decomposition of a nerve-agent simulant, dimethyl methylphosphonate (DMMP), on UiO-66, UiO-67, MOF-808, and NU-1000 using synchrotron-based X-ray powder diffraction, X-ray absorption, and infrared spectroscopy, which reveals key aspects of the reaction mechanism. The diffraction measurements indicate that all four MOFs adsorb DMMP (introduced at atmospheric pressures through a flow of helium or air) within the pore space. In addition, the combination of X-ray absorption and infrared spectra suggests direct coordination of DMMP to the Zr6 cores of all MOFs, which ultimately leads to decomposition to phosphonate products. These experimental probes into the mechanism of adsorption and decomposition of chemical warfare agent simulants on Zr-based MOFs open new opportunities in rational design of new and superior decontamination materials.

  8. Environmental Effects on Zirconium Hydroxide Nanoparticles and Chemical Warfare Agent Decomposition: Implications of Atmospheric Water and Carbon Dioxide.

    Science.gov (United States)

    Balow, Robert B; Lundin, Jeffrey G; Daniels, Grant C; Gordon, Wesley O; McEntee, Monica; Peterson, Gregory W; Wynne, James H; Pehrsson, Pehr E

    2017-11-15

    Zirconium hydroxide (Zr(OH) 4 ) has excellent sorption properties and wide-ranging reactivity toward numerous types of chemical warfare agents (CWAs) and toxic industrial chemicals. Under pristine laboratory conditions, the effectiveness of Zr(OH) 4 has been attributed to a combination of diverse surface hydroxyl species and defects; however, atmospheric components (e.g., CO 2 , H 2 O, etc.) and trace contaminants can form adsorbates with potentially detrimental impact to the chemical reactivity of Zr(OH) 4 . Here, we report the hydrolysis of a CWA simulant, dimethyl methylphosphonate (DMMP) on Zr(OH) 4 determined by gas chromatography-mass spectrometry and in situ attenuated total reflectance Fourier transform infrared spectroscopy under ambient conditions. DMMP dosing on Zr(OH) 4 formed methyl methylphosphonate and methoxy degradation products on free bridging and terminal hydroxyl sites of Zr(OH) 4 under all evaluated environmental conditions. CO 2 dosing on Zr(OH) 4 formed adsorbed (bi)carbonates and interfacial carbonate complexes with relative stability dependent on CO 2 and H 2 O partial pressures. High concentrations of CO 2 reduced DMMP decomposition kinetics by occupying Zr(OH) 4 active sites with carbonaceous adsorbates. Elevated humidity promoted hydrolysis of adsorbed DMMP on Zr(OH) 4 to produce methanol and regenerated free hydroxyl species. Hydrolysis of DMMP by Zr(OH) 4 occurred under all conditions evaluated, demonstrating promise for chemical decontamination under diverse, real-world conditions.

  9. Extraordinary Adaptive Plasticity of Colorado Potato Beetle: “Ten-Striped Spearman” in the Era of Biotechnological Warfare

    Directory of Open Access Journals (Sweden)

    Aleksandar Cingel

    2016-09-01

    Full Text Available Expanding from remote areas of Mexico to a worldwide scale, the ten-striped insect, the Colorado potato beetle (CPB, Leptinotarsa decemlineata Say, has risen from being an innocuous beetle to a prominent global pest. A diverse life cycle, phenotypic plasticity, adaptation to adverse conditions, and capability to detoxify or tolerate toxins make this insect appear to be virtually “indestructible”. With increasing advances in molecular biology, tools of biotechnological warfare were deployed to combat CPB. In the last three decades, genetically modified potato has created a new challenge for the beetle. After reviewing hundreds of scientific papers dealing with CPB control, it became clear that even biotechnological means of control, if used alone, would not defeat the Colorado potato beetle. This control measure once again appears to be provoking the potato beetle to exhibit its remarkable adaptability. Nonetheless, the potential for adaptation to these techniques has increased our knowledge of this pest and thus opened possibilities for devising more sustainable CPB management programs.

  10. Difficulties associated with the development and licensing of vaccines for protection against bio-warfare and bio-terrorism.

    Science.gov (United States)

    Langford, M J; Myers, R C

    2002-01-01

    Today there is an increasing need to license vaccines for the protection of individuals against bio-warfare and bio-terrorism. While the need is apparent, the actual road to developing, producing and licensing such vaccines successfully is as yet undefined. Bio-defence vaccine candidates may come from several sources. They may come from vaccines that were previously licensed but are no longer in production, vaccines that are currently in an IND status, vaccines currently licensed in foreign countries, and newer vaccines currently under development. The issues that apply to the development and licensing of these vaccines can be defined by currently accepted standards for manufacture, and the requirement to demonstrate safety and efficacy to a level that gives the scientific and medical community, regulatory agencies, users and the public at large confidence. Requirements for manufacturing and demonstration of safety will be consistent with vaccines being developed for traditional purposes. However, demonstration of efficacy will be more difficult. Because field trials for these vaccines are generally not feasible and the conduct of human challenge studies is generally considered unethical, the demonstration of efficacy will need to be based on existing efficacy data, a thorough understanding of both the disease's pathogenesis and mechanism of protection, the ability to identify surrogate markers for efficacy, and the use of the proposed FDA "animal rule".

  11. Using Metal Complex Ion-Molecule Reactions in a Miniature Rectilinear Ion Trap Mass Spectrometer to Detect Chemical Warfare Agents

    Science.gov (United States)

    Graichen, Adam M.; Vachet, Richard W.

    2013-06-01

    The gas-phase reactions of a series of coordinatively unsaturated [Ni(L)n]y+ complexes, where L is a nitrogen-containing ligand, with chemical warfare agent (CWA) simulants in a miniature rectilinear ion trap mass spectrometer were investigated as part of a new approach to detect CWAs. Results show that upon entering the vacuum system via a poly(dimethylsiloxane) (PDMS) membrane introduction, low concentrations of several CWA simulants, including dipropyl sulfide (simulant for mustard gas), acetonitrile (simulant for the nerve agent tabun), and diethyl phosphite (simulant for nerve agents sarin, soman, tabun, and VX), can react with metal complex ions generated by electrospray ionization (ESI), thereby providing a sensitive means of detecting these compounds. The [Ni(L)n]2+ complexes are found to be particularly reactive with the simulants of mustard gas and tabun, allowing their detection at low parts-per-billion (ppb) levels. These detection limits are well below reported exposure limits for these CWAs, which indicates the applicability of this new approach, and are about two orders of magnitude lower than electron ionization detection limits on the same mass spectrometer. The use of coordinatively unsaturated metal complexes as reagent ions offers the possibility of further tuning the ion-molecule chemistry so that desired compounds can be detected selectively or at even lower concentrations.

  12. Express analysis of explosives, chemical warfare agents and drugs with multicapillary column gas chromatography and ion mobility increment spectrometry.

    Science.gov (United States)

    Buryakov, Igor A

    2004-02-05

    Description of a gas chromatograph designed for express analysis of explosives (2,4-dinitrotoluene, 2,4,6-trinitrotoluene, pentaerythritol tetranitrate), chemical warfare agents (mustard gas, lewisite, sarin) and drugs (heroin, cocaine hydrochloride, crack) is given. The devices comprises a multicapillary chromatographic column and an ion mobility increment spectrometer (MCC-IMIS). The main analytical characteristics of an IMIS (estimated detection limit (DL), linear dynamic range (LDR), speed of response) and a chromatographic column (separation power, degree of separation, a number of possible peaks at a chromatogram section, divided by analysis time) are determined. The maximum value of DL equal to 5 pg/ml was registered for cis-alpha-LW, and the lowest one of 0.001 pg/ml was for cocaine. The maximum value of LDR equal to 1000 was registered for sarin and the lowest one of 150 was for the ions of lewisite. Speed of response of one compound detection with the IMIS was 0.7 s.

  13. Arleigh Burke Destroyers: Delaying Procurement of DDG 51 Flight III Ships Would Allow Time to Increase Design Knowledge

    Science.gov (United States)

    2015-08-01

    defense, area air defense, and some types of anti-submarine warfare, the Navy determined to restart production of DDG 51 Flight IIA ships to combat...and Navy documentation. | GAO-16-613 aPer 10 U.S.C. § 2306b(i)(2) the Navy would be required to preliminarily find that these criteria would be met...design changes— including number, type , and location of those changes—to Navy and contractor estimates and to previous DDG 51-class upgrades to assess

  14. Design definition study of a lift/cruise fan technology V/STOL aircraft. Volume 1: Navy operational aircraft

    Science.gov (United States)

    1975-01-01

    Aircraft were designed and sized to meet Navy mission requirements. Five missions were established for evaluation: anti-submarine warfare (ASW), surface attack (SA), combat search and rescue (CSAR), surveillance (SURV), and vertical on-board delivery (VOD). All missions were performed with a short takeoff and a vertical landing. The aircraft were defined using existing J97-GE gas generators or reasonable growth derivatives in conjunction with turbotip fans reflecting LF460 type technology. The multipurpose aircraft configuration established for U.S. Navy missions utilizes the turbotip driven lift/cruise fan concept for V/STOL aircraft.

  15. Koncepcija partizanskoj vojny v Litve v 1920— 1930-e gody [The concept of guerrilla warfare in Lithuania in the 1920—1930s

    Directory of Open Access Journals (Sweden)

    Jokubauskas Vytautas

    2012-01-01

    Full Text Available This article analyses the military and tactical training of the members of the Lithuanian Riflemen’s Union for guerrilla warfare in the interwar period. Small nations, such as Lithuania and other Baltic states, being unable to build up military strength in order to ensure national security, were forced to seek for unconventional methods of warfare, including guerrilla strategies. The study places emphasis on the development of the guerrilla war concept in the Union periodicals. The author retraces a change in the intensity of the guerrilla warfare concept propagation amongst Lithuanian population and riflemen, in particular, through publications in the Trimitas — a periodical of the Lithuanian Riflemen’s Union. The author also identifies the narratives associated with the guerrilla matters employed for propaganda purposes in order to create an image of a guerrilla as a defender of the Homeland — Lithuania. Additionally, the structure and numbers of the Union are analysed through a comparison with similar organisations of the other «small nations» of the Baltic North-East. The author addresses the issue of military missions planned by the Lithuanian Army, as well as the way riflemen implemented them. Since the Union did not only offer military training, but was also engaged in the patriotic propaganda, the article focuses on the network of cultural institutions, homes of riflemen, orchestras, libraries, choirs, and athletic clubs used by the Union. The article sets out to establish whether the loss of Lithuanian sovereignty could have been possible without giving rise to a protracted guerrilla war.

  16. More Effective Warfare: Warfare Waged Psychologically

    Science.gov (United States)

    2012-06-01

    116 “Intifada” is an Arabic word which translates as “uprising.” 117 Matthew Levitt, Hamas...were clearly translated to the media: Hamas was responsible for breaking the ceasefire with Israel, Israel’s objective was the safety and security of... audiovisual equipment confiscated. Reporters without Borders heavily condemned Hamas in a February 2009 report covering Operation Cast Lead in

  17. An assessment of the effectiveness of computer-based training for newly commissioned Surface Warfare Division officers. / by William R. Bowman, Crawford, Alice M., Stephen Mehay.

    OpenAIRE

    Bowman, William R.; Crawford, Alice M.; Mehay, Stephen

    2009-01-01

    Approved for public release; distribution unlimited. The goal of this study was to analyze the effectiveness of the new SWOS-at-Sea training for newly commissioned surface warfare officers that was introduced in 2003. The new regime combined self-paced computer-based training (CBT) with on-the-job training (OJT) on-board an officer's ship. The study relied on a variety of analytical techniques, including a literature review of CBT and OJT training, interviews and focus groups with junior a...

  18. Real-time, wide-area hyperspectral imaging sensors for standoff detection of explosives and chemical warfare agents

    Science.gov (United States)

    Gomer, Nathaniel R.; Tazik, Shawna; Gardner, Charles W.; Nelson, Matthew P.

    2017-05-01

    Hyperspectral imaging (HSI) is a valuable tool for the detection and analysis of targets located within complex backgrounds. HSI can detect threat materials on environmental surfaces, where the concentration of the target of interest is often very low and is typically found within complex scenery. Unfortunately, current generation HSI systems have size, weight, and power limitations that prohibit their use for field-portable and/or real-time applications. Current generation systems commonly provide an inefficient area search rate, require close proximity to the target for screening, and/or are not capable of making real-time measurements. ChemImage Sensor Systems (CISS) is developing a variety of real-time, wide-field hyperspectral imaging systems that utilize shortwave infrared (SWIR) absorption and Raman spectroscopy. SWIR HSI sensors provide wide-area imagery with at or near real time detection speeds. Raman HSI sensors are being developed to overcome two obstacles present in standard Raman detection systems: slow area search rate (due to small laser spot sizes) and lack of eye-safety. SWIR HSI sensors have been integrated into mobile, robot based platforms and handheld variants for the detection of explosives and chemical warfare agents (CWAs). In addition, the fusion of these two technologies into a single system has shown the feasibility of using both techniques concurrently to provide higher probability of detection and lower false alarm rates. This paper will provide background on Raman and SWIR HSI, discuss the applications for these techniques, and provide an overview of novel CISS HSI sensors focusing on sensor design and detection results.

  19. Guerra biológica, bioterrorismo e saúde pública Biological warfare, bioterrorism and public health

    Directory of Open Access Journals (Sweden)

    Luiz Jacintho da Silva

    2001-12-01

    Full Text Available O uso de agentes biológicos como arma não é novidade para a humanidade. Durante séculos, até a atualidade, a guerra biológica tem sido objeto de muita pesquisa e especulação, mas de pouca ação. O medo de efeitos contrários e dúvidas sobre sua eficiência como armas devem ter limitado seu uso. Recentemente, se verificou uma nova forma de terrorismo, empregando agentes infecciosos, devagar e sem muito alarde, até as ocorrências recentes com o Bacillus anthracis nos Estados Unidos. A varíola é possivelmente o mais devastador desses agentes. Menos de 25 anos passados desde sua erradicação, a saúde pública tem que lidar com a possibilidade de sua re-introdução. O cenário da re-introdução da varíola no Brasil é discutido.Biological agents as weapons are not new to mankind. For centuries and into the present, biological warfare has been the subject of much research and speculation, but little action. Their limited use has probably been due to fear of unexpected counter-effects and doubts about their efficiency as weapons. Recently a new form of terrorism employing infectious agents has emerged slowly and without much fanfare, until the recent events with Bacillus anthracis in the United States. Smallpox is potentially the most devastating of these agents. Less than 25 years after the eradication of smallpox, the public health field is now forced to deal with the possibility of its re-introduction. The author discusses the scenario of smallpox re-introduction into Brazil.

  20. Demonstration of spread-on peel-off consumer products for sampling surfaces contaminated with pesticides and chemical warfare agent signatures.

    Science.gov (United States)

    Behringer, Deborah L; Smith, Deborah L; Katona, Vanessa R; Lewis, Alan T; Hernon-Kenny, Laura A; Crenshaw, Michael D

    2014-08-01

    A terrorist attack using toxic chemicals is an international concern. The utility of rubber cement and latex body paint as spray-on/spread-on peel-off collection media for signatures attributable to pesticides and chemical warfare agents from interior building and public transportation surfaces two weeks post-deposition is demonstrated. The efficacy of these media to sample escalator handrail, stainless steel, vinyl upholstery fabric, and wood flooring is demonstrated for two pesticides and eight chemicals related to chemical warfare agents. The chemicals tested are nicotine, parathion, atropine, diisopropyl methylphosphonate, dimethyl methylphosphonate, dipinacolyl methylphosphonate, ethyl methylphosphonic acid, isopropyl methylphosphonic acid, methylphosphonic acid, and thiodiglycol. Amounts of each chemical found are generally greatest when latex body paint is used. Analytes with low volatility and containing an alkaline nitrogen or a sulfur atom (e.g., nicotine and parathion) usually are recovered to a greater extent than the neutral phosphonate diesters and acidic phosphonic acids (e.g., dimethyl methylphosphonate and ethyl methylphosphonic acid). Copyright © 2014 Elsevier Ireland Ltd. All rights reserved.

  1. The Baltic states should adopt the self-defence pinpricks doctrine: the “accumulation of events” threshold as a deterrent to Russian hybrid warfare

    Directory of Open Access Journals (Sweden)

    Nader Philippe Bou

    2017-06-01

    Full Text Available This article addresses a key legal debate that the Baltic NATO members ought to engage in: what constitutes an “armed attack” and what interpretation should be made of this concept in order to deter recent Russian hybrid warfare strategies. These questions are considered in connection with a more general issue regarding the law of self-defence: the question of what constitutes an armed attack in international law. This article will try to present a broad definition and context of Russian hybrid warfare and how it is challenging traditional jus ad bellum paradigms. Too few policy-makers have paid detailed attention to the new Russian “lawfare” in Ukraine, using specific military and non-military tactics in order to blur the lines between “armed attack” and mere political intervention. Meanwhile, legal scholars detach their analysis from actual policy-serving considerations and tend to acquiesce to some very restrictive theories of the use force in self-defence. For some countries, like the Baltic ones, facing strategic exposure – because of both threatening neighbours and low military capacities – the jus ad bellum paradigm should not be construed as another layer of obstacle.

  2. Concurrent RFID/UID Implementation at Naval Surface Warfare Center, Crane Division, A Naval Postgraduate School Master of Business Administration Thesis Study in Item Unique Identification and Radio Frequency Identification

    OpenAIRE

    Obellos, Ernan S.; Lookabill, Ryan D.; Colleran, Travis

    2007-01-01

    As part of their Master of Business Administration thesis at Naval Postgraduate School (NPS) in Monterey, California, United States Navy Lieutenant Commanders Travis Colleran, Ryan Lookabill, and Ernan Obellos developed an implementation plan to apply Unique Identification (UID) and Radio Frequency Identification (RFID) concurrently at Naval Surface Warfare Center, Crane Division (NSWC Crane) in Crane, Indiana.

  3. Rapid screening of N-oxides of chemical warfare agents degradation products by ESI-tandem mass spectrometry.

    Science.gov (United States)

    Sridhar, L; Karthikraj, R; Lakshmi, V V S; Raju, N Prasada; Prabhakar, S

    2014-08-01

    Rapid detection and identification of chemical warfare agents and related precursors/degradation products in various environmental matrices is of paramount importance for verification of standards set by the chemical weapons convention (CWC). Nitrogen mustards, N,N-dialkylaminoethyl-2-chlorides, N,N-dialkylaminoethanols, N-alkyldiethanolamines, and triethanolamine, which are listed CWC scheduled chemicals, are prone to undergo N-oxidation in environmental matrices or during decontamination process. Thus, screening of the oxidized products of these compounds is also an important task in the verification process because the presence of these products reveals alleged use of nitrogen mustards or precursors of VX compounds. The N-oxides of aminoethanols and aminoethylchlorides easily produce [M + H](+) ions under electrospray ionization conditions, and their collision-induced dissociation spectra include a specific neutral loss of 48 u (OH + CH2OH) and 66 u (OH + CH2Cl), respectively. Based on this specific fragmentation, a rapid screening method was developed for screening of the N-oxides by applying neutral loss scan technique. The method was validated and the applicability of the method was demonstrated by analyzing positive and negative samples. The method was useful in the detection of N-oxides of aminoethanols and aminoethylchlorides in environmental matrices at trace levels (LOD, up to 500 ppb), even in the presence of complex masking agents, without the use of time-consuming sample preparation methods and chromatographic steps. This method is advantageous for the off-site verification program and also for participation in official proficiency tests conducted by the Organization for the Prohibition of Chemical Weapons (OPCW), the Netherlands. The structure of N-oxides can be confirmed by the MS/MS experiments on the detected peaks. A liquid chromatography-mass spectrometry (LC-MS) method was developed for the separation of isomeric N-oxides of aminoethanols and

  4. Warfare Ecology on an Underwater Demolition Range: Acoustic Observations of Marine Life and Shallow Water Detonations in Hawai`i

    Science.gov (United States)

    Shannon, Lee H.

    vocalizations was recorded immediately following the blast, with rapid (within 30s) return to baseline visual and acoustic behavior. The results and conclusions of these studies are placed within the broader context of warfare ecology as an emerging scientific discipline.

  5. Establishment of Exposure to Organophosphorus Warfare Agents by Means of SPME-GSMS Analysis of Bodily Fluids

    International Nuclear Information System (INIS)

    Saveleva, E. I.; Koryagina, N. L.; Radilov, A. S.; Khlebnikova, N. S.; Khrustaleva, V. S.; Feld, V. E.

    2007-01-01

    Reliable chemical analytical procedures for revealing an exposure to toxic chemicals, identifying the active substance, and assessing the degree of exposure are necessary as a component of medical and forensic activities in cases of the possible use of highly toxic chemicals in war conflicts and terrorism acts, as well as emergency situations in chemical industry, specifically at chemical weapons storage and destruction facilities. According to Chemical Weapons Convention, Part XI, Appendix 4, e-17, 'samples of importance in the investigation of alleged use include biomedical samples from human or animal sources (blood, urine, excreta, tissue etc.)'. Urinary metabolites, O-alkyl esters of methylphosphic acid, offer one of the simplest means of confirming an exposure to organophosphorus warfare agents (OPWA). Urine, unlike blood or tissues, does not require invasive collection demanding in terms of sterility. Excretion with urine is the major route of elimination of OPWA from an organism. According to published data, 90% of OPWA metabolites are excreted within 48-72 h after intoxication. We developed an SPME-GCMS procedure for the determination of O-alkyl esters methylphosphonic acid in urine, with the following detection limits,: isopropyl and isobutyl esters 5 ng/ml and pinacolyl ester 1 ng/ml. The procedure involves derivatization of the target compounds directly on the microfiber. The total analysis time is 1-1.5 h. In animal experiments in vivo we could establish the exposure to OPWA at a half-LD50 level within no less than 48 h after intoxication. In principle, OPWA metabolites could be detected in urine within two weeks after intoxication but at higher doses. Retrospective analysis of urinary metabolites in cases of the exposure to low doses of OPWA requires lower detection limits (0.1-1 ng/ml). Optimal objects for the retrospective analysis of OPWA in an organism are long-lived blood protein adducts. We developed a procedure for revealing an exposure to

  6. Computational Investigations of Potential Energy Function Development for Metal--Organic Framework Simulations, Metal Carbenes, and Chemical Warfare Agents

    Science.gov (United States)

    Cioce, Christian R.

    sigma donates, and subsequent back-bonding occurs into a pi* antibonding orbital. This is a different type of interaction not seen in the three existing classes of metal-carbene complexes, namely Fischer, Schrock, and Grubbs. Finally, the virtual engineering of enhanced chemical warfare agent (CWA) detection systems is discussed. As part of a U.S. Department of Defense supported research project, in silico chemical modifications to a previously synthesized zinc-porphyrin, ZnCS1, were made to attempt to achieve preferential binding of the nerve agent sarin versus its simulant, DIMP (diisopropyl methylphosphonate). Upon modification, a combination of steric effects and induced hydrogen bonding allowed for the selective binding of sarin. The success of this work demonstrates the role that high performance computing can play in national security research, without the associated costs and high security required for experimentation.

  7. The Implications of Transnational Cyber Threats in International Humanitarian Law: Analysing the Distinction Between Cybercrime, Cyber Attack, and Cyber Warfare in the 21st Century

    Directory of Open Access Journals (Sweden)

    Faga Hemen Philip

    2017-06-01

    Full Text Available This paper is an attempt to draw distinctive lines between the concepts of cybercrime, cyber-attack, and cyber warfare in the current information age, in which it has become difficult to separate the activities of transnational criminals from acts of belligerents using cyberspace. The paper considers the implications of transnational cyber threats in international humanitarian law (IHL with a particular focus on cyber-attacks by non-state actors, the principles of state responsibility, and the implications of targeting non-state perpetrators under IHL. It concludes that current international law constructs are inadequate to address the implications of transnational cyber threats; the author recommends consequential amendments to the laws of war in order to address the challenges posed by transnational cyber threats.

  8. [The re-introduction of malaria in the Pontine Marshes and the Cassino district during the end of World War II. Biological warfare or global war tactics?].

    Science.gov (United States)

    Sabbatani, Sergio; Fiorino, Sirio; Manfredi, Roberto

    2013-12-01

    After the fall of the Fascist regime on September 8, 1943, Italy was split into two parts: (i) the Southern regions where the King Victor Emanuel III and the military general staff escaped was under the control of English-American allied armies, and (ii) the northern regions comprising Lazio, Tuscany, Umbria, and Marche still under the control of the Germans. The German Wehrmacht, after suffering several defeats on Southern lines, established a new strengthened line of defence called the Gustav line, located south of Rome and crossing in the western portion the recently-drained Pontine Marshes. In his book published in 2006, Frank Snowden hypothesised that occupying German armies in 1943 had initiated a programme of re-flooding the Pontine plain as a biological warfare strategy to re-introduce malaria infection in the territories south of Rome, Such a plan was intended (i) to slow down the advance of English-American forces, and (ii) to punish Italians who abandoned their former allies. Other authors, including Annibale Folchi, Erhard Geissler, and Jeanne Guillemin, have disputed this hypothesis based on an analysis of recently-uncovered archive documents. What is not disputed is that the flooding of the Pontine and Roman plains in 1943 contributed to a severe malaria epidemic in 1944, which was associated with exceptionally high morbidity and mortality rates in the afflicted populations. Herein, we critically evaluate the evidence and arguments of whether the Wehrmacht specifically aimed to spread malaria as a novel biological warfare strategy in Italy during the Second World War. In our opinion, evidence for specific orders to deliberately spread malaria by the German army is lacking, although the strategy itself may have been considered by Nazis during the waning years of the war.

  9. Çanakkale Savaşlarına Sualtından Bir Bakış A Look From Underwater to The Çanakkale Warfares

    Directory of Open Access Journals (Sweden)

    H.Barış ÖZALP

    2010-01-01

    Full Text Available Çanakkale Naval Warfares can basically be defined as a historic moment that tells of the campaign for liberation of its country and the state of defence of a nation’s capital. The importance of all battles taken place in Çanakkale surely are not ignored in winning the war, but the attacks occured around the coastal waters of Çanakkale Strait and Gallipoli Peninsula and sinking of the opposer’s ships and submarines can be evaluated as a significant information which is a proof that the strait can not be surpassed. If the enemy naval forces could not kept down and as a result of this, their willing to arrive at østanbul had come true, the success in Gallipoli campaign was not able to obtain. That can be stated that all arrangements planned by the Entente Powers on succeeding in war are primarily about the passing the Çanakkale Strait. Since the enemy forces and submarines have been stopped with severe damage or sunk, there have achieved success in naval battles and it was accepted by all the enemy forces that the strait was impassable. In this success, the powerfull emplacements deployed on both sides of the strait and our submarines and besides the mines laid by the Minelayer Nusret had a great effect. In Naval Warfares, many battleships and submarines owned by Entente Powers were sunk in the Çanakkale Strait and not allowed to drive into the sea of Marmara. Thus, all the plans of Entente Powers aim for conquering østanbul were interrupted and their will on winning in naval battle has been obstructed.

  10. Warfare and children.

    Science.gov (United States)

    Shann, Frank

    2010-05-01

    In 2007, 136 million children were born in the world, and 9.2 million died before they were 5 years old; 99.8% of these deaths were in developing countries, and 8.2 million were unnecessary. This is 23 000 unnecessary deaths every day. Approximately 0.2 million children die from the direct effects of war every year, and at least twice as many die from the indirect effects. However, most child deaths are caused by common childhood infections in communities that are not affected by war. In 2007, overseas development aid totalled only $104 billion, and world military expenditure totalled US$1339 billion. The 49 poorest countries in the world have a population of 1.3 billion; they spent only $27 per person on health in 2006, but the world spent $201 per person on military activity. The five permanent members of the United Nations Security Council account for 90% of weapons sales to developing countries, yet they are the very countries that have accepted responsibility for ensuring world security. Unfortunately, many governments in both rich and poor countries do not want to limit military spending - the vested interests that support military activity are too powerful. War is immensely harmful, but not primarily because of the horrible injuries, nor the large number of deaths it causes indirectly from infection, malnutrition, and social and political disruption. By far, the greatest harm comes from the diversion of huge amounts of money that could be used for beneficial development into harmful and destructive military activity.

  11. Chemical warfare in termites

    Czech Academy of Sciences Publication Activity Database

    Šobotník, Jan; Jirošová, Anna; Hanus, Robert

    2010-01-01

    Roč. 56, č. 9 (2010), s. 1012-1021 ISSN 0022-1910 R&D Projects: GA AV ČR IAA600550614 Institutional research plan: CEZ:AV0Z40550506 Keywords : Isoptera * chemical defense * exocrine gland * frontal gland Subject RIV: CC - Organic Chemistry Impact factor: 2.310, year: 2010

  12. On Winter Warfare

    Science.gov (United States)

    1993-06-01

    supply of the front. gy horses raised by the rural population since the times 3. All the main objectives must be reached before the of the Mongols...an economic base. He believed in the advantages of hereditary monarchy rather than elective rule. Under him the country evolved from a rural society...Historian, Ms. D-106. Vaida, A.P. (1976) War in Ecological Perspective. New Richter, G.D. (Ed.) (1960) Geografia Snezhnogo Pok- York: Plenum Press. rova (Snow

  13. Air Power and Warfare

    Science.gov (United States)

    1978-09-01

    American air ace.- New York: Putnam , 1958. (UG!3 290 G98) Guild, Richard E. The double attack system: a formalization. Yokota Air Base, Japan, 1968...1962) Sa..dby;•Robert H.M.S. Air bombardment: the story of it- development New York: Harper, 1961. (UGK 207 S25) Saunders, Hilary A.S. .Per ardua; the...1961. Letchworth, Herts: Harleyford Publications, 1961. (UGH 3215 .F5 887) Bruce, John N. British ,aeroplance 1914-1918. London: Putnam ; 1957. (Ref

  14. Defeating Guerrilla Warfare

    Science.gov (United States)

    1991-06-21

    to emphasize that the government has lost control. For the insurgent, being able to fight battles is more inmortant than winning them. Survival of...recently El Salvador to realize that the tide did not turn against the guerrilla until government forces went after him and hunted him down on his own...involvement is less likely. We are already involved in El Salvador and the Philippines. Military professionals must study potential adversaries and how

  15. Globalization and Asymmetrical Warfare

    Science.gov (United States)

    2002-04-01

    we will explore in this research paper, globalization is not completely progressive and technology is morally neutral. The same tools being used to... globalization regardless of its effects on the rest of the world. Thirdly, 2 technology will continue to be exploited to benefit developed nations and... globalization ”. It further states “…governments will have less and less control over flows of information, technology , diseases, migrants, arms, and

  16. Marketing Network Centric Warfare

    National Research Council Canada - National Science Library

    McCarthy, Shannon

    2001-01-01

    ... the other services. In order to be effective, NCW must transition from a Navy concept to a joint product. NCW advocates can effect this transition by using basic business principles to market NCW...

  17. Countermobilization: Unconventional Social Warfare

    Science.gov (United States)

    2014-06-01

    of neoliberal economic policies and the poor distribution practices of income . 88 The EZLN view the consequences of neoliberalism as the principal...jihad until the world was purified from the ideals of infidels . 168 When the enemy enters that land of the Muslims, jihad becomes individually

  18. tion, violence and warfare.

    African Journals Online (AJOL)

    example, see the following quote by van Hooff: .... authors, are male by definition, since the ultimate motivation for ... motivations. The aspects of racism I found most offensive, were the lack of recognition of the authors' own cultural biases and constraints, and the pervasive use of a scola naturae approach to 'stages of.

  19. Changing Face of Warfare

    Science.gov (United States)

    2015-06-12

    weapons technology produced horrifying results when 19m century tactics were employed against the new weapons systems . Scenes such as the one...soldiers who had to use these shabby guns referred to them contemptuously as "pumpkin slingers.ൔ As with the Austrian rifled musket the Belgian rifle...assault came toward the strong defensive line. "Their fifth charge" Sanders recalled "was made with greatly decimated ranks that slowly recoiled

  20. Islamic Rulings on Warfare

    National Research Council Canada - National Science Library

    Aboul-Enein, Youssef

    2004-01-01

    The United States no doubt will be involved in the Middle East for many decades. To be sure, settling the Israeli-Palestinian dispute or alleviating poverty could help to stem the tides of Islamic radicalism and anti-American sentiment...

  1. Chemical warfare in freshwater

    NARCIS (Netherlands)

    Mulderij, Gabi

    2006-01-01

    Aquatic macrophytes can excrete chemical substances into their enviroment and these compounds may inhibit the growth of phytoplankton. This process is defined as allelopathy: one organism has effects on another via the excretion of a (mixture of) chemical substance(s). With laboratory and field

  2. Cyber warfare: critical perspectives

    NARCIS (Netherlands)

    Ducheine, P.; Osinga, F.; Soeters, J.

    2012-01-01

    Next to sea, land, air and space, ‘cyber space’ appears to be the fifth operational domain for the military. This manmade and virtual sphere brings along opportunities and threats. In this book, academics of the Netherlands Defence Academy as well as specialists and military professionals from other

  3. Sustaining Unconventional Warfare

    Science.gov (United States)

    2013-05-23

    EAM Greek National Front ELAS Greek People’s Liberation Army ESC Expeditionary Sustainment Command FID Foreign Internal Defense FDU Force...invasion of France created a complicated political situation. In June 1940, Churchill offered France a fusion of states. Charles de Gaulle, the newly...resistance forces in June, both by parachute.30 The successful execution of integrated operations encouraged British Chief of Air Staff Charles Portal

  4. Dehumanization and Irregular Warfare

    Science.gov (United States)

    2013-06-01

    and northerners, doctors and lawyers, gays and straights, soccer moms and NASCAR dads, outgoing people and shy types, smart ones and lucky ones...framework for disrupting the likelihood of dehumanization. For instance, I was invited to the wedding of a young man who had previously been a Taliban... wedding with my ANASF counterpart and spent hours with U.S. during the meal. It was at this event that the father asked for my assurance that his son

  5. Advanced Undersea Warfare Systems

    Science.gov (United States)

    2011-06-01

    search mode, software modifications may be needed to give the LD- UUV weapon a line-of- bearing search capability. ◦ Max Range: 8 NM69 ◦ Warhead Size: 45...Glider can self-destruct or enter a hibernation state to be retrieved at a future time. Figure 4.19: Glider Recovery Assisted by Helicopter Retrieval 97...functions of the system. It does not have any bearing on the weighting of the remaining six functions. 127 between desires and capabilities using

  6. Future Of Privatized Warfare

    Science.gov (United States)

    2016-05-26

    consolidating and buying other firms to become more diversified or increase their market share. One of the largest, Armor Holdings, owns subsidiaries in Russia...cuisine, dress, literature, music , and language is an example of the attack on national identity. At the same time, the liberalization of trade is...for Combat Patrols; Critics Question Legality ,” Los Angeles Times, November 27, 2015, accessed 15 December, 2015, 64 already controlling two

  7. Hair analysis as a useful procedure for detection of vapour exposure to chemical warfare agents: simulation of sulphur mustard with methyl salicylate.

    Science.gov (United States)

    Spiandore, Marie; Piram, Anne; Lacoste, Alexandre; Josse, Denis; Doumenq, Pierre

    2014-06-01

    Chemical warfare agents (CWA) are highly toxic compounds which have been produced to kill or hurt people during conflicts or terrorist attacks. Despite the fact that their use is strictly prohibited according to international convention, populations' exposure still recently occurred. Development of markers of exposure to CWA is necessary to distinguish exposed victims from unexposed ones. We present the first study of hair usage as passive sampler to assess contamination by chemicals in vapour form. This work presents more particularly the hair adsorption capacity for methyl salicylate used as a surrogate of the vesicant sulphur mustard. Chemical vapours toxicity through the respiratory route has historically been defined through Haber's law's concentration-time (Ct) product, and vapour exposure of hair to methyl salicylate was conducted with various times or doses of exposure in the range of incapacitating and lethal Ct products corresponding to sulphur mustard. Following exposure, extraction of methyl salicylate from hair was conducted by simple soaking in dichloromethane. Methyl salicylate could be detected on hair for vapour concentration corresponding to about one fifth of the sulphur mustard concentration that would kill 50% of exposed individuals (LCt50). The amount of methyl salicylate recovered from hair increased with time or dose of exposure. It showed a good correlation with the concentration-time product, suggesting that hair could be used like a passive sampler to assess vapour exposure to chemical compounds. It introduces great perspectives concerning the use of hair as a marker of exposure to CWA. Copyright © 2014 John Wiley & Sons, Ltd.

  8. Development of haemostatic decontaminants for treatment of wounds contaminated with chemical warfare agents. 3: Evaluation of in vitro topical decontamination efficacy using damaged skin.

    Science.gov (United States)

    Lydon, Helen L; Hall, Charlotte A; Dalton, Christopher H; Chipman, J Kevin; Graham, John S; Chilcott, Robert P

    2017-08-01

    Previous studies have demonstrated that haemostatic products with an absorptive mechanism of action retain their clotting efficiency in the presence of toxic materials and are effective in decontaminating chemical warfare (CW) agents when applied to normal, intact skin. The purpose of this in vitro study was to assess three candidate haemostatic products for effectiveness in the decontamination of superficially damaged porcine skin exposed to the radiolabelled CW agents, soman (GD), VX and sulphur mustard (HD). Controlled physical damage (removal of the upper 100 μm skin layer) resulted in a significant enhancement of the dermal absorption of all three CW agents. Of the haemostatic products assessed, WoundStat™ was consistently the most effective, being equivalent in performance to a standard military decontaminant (fuller's earth). These data suggest that judicious application of haemostatic products to wounds contaminated with CW agents may be a viable option for the clinical management of casualties presenting with contaminated, haemorrhaging injuries. Further studies using a relevant animal model are required to confirm the potential clinical efficacy of WoundStat™ for treating wounds contaminated with CW agents. Copyright © 2017 John Wiley & Sons, Ltd. Copyright © 2017 John Wiley & Sons, Ltd.

  9. Graphene oxide as sensitive layer in Love-wave surface acoustic wave sensors for the detection of chemical warfare agent simulants.

    Science.gov (United States)

    Sayago, Isabel; Matatagui, Daniel; Fernández, María Jesús; Fontecha, José Luis; Jurewicz, Izabela; Garriga, Rosa; Muñoz, Edgar

    2016-02-01

    A Love-wave device with graphene oxide (GO) as sensitive layer has been developed for the detection of chemical warfare agent (CWA) simulants. Sensitive films were fabricated by airbrushing GO dispersions onto Love-wave devices. The resulting Love-wave sensors detected very low CWA simulant concentrations in synthetic air at room temperature (as low as 0.2 ppm for dimethyl-methylphosphonate, DMMP, a simulant of sarin nerve gas, and 0.75 ppm for dipropylene glycol monomethyl ether, DPGME, a simulant of nitrogen mustard). High responses to DMMP and DPGME were obtained with sensitivities of 3087 and 760 Hz/ppm respectively. Very low limit of detection (LOD) values (9 and 40 ppb for DMMP and DPGME, respectively) were calculated from the achieved experimental data. The sensor exhibited outstanding sensitivity, good linearity and repeatability to all simulants tested. The detection mechanism is here explained in terms of hydrogen bonding formation between the tested CWA simulants and GO. Copyright © 2015 Elsevier B.V. All rights reserved.

  10. Comparison of latex body paint with wetted gauze wipes for sampling the chemical warfare agents VX and sulfur mustard from common indoor surfaces.

    Science.gov (United States)

    Hernon-Kenny, Laura A; Behringer, Deborah L; Crenshaw, Michael D

    2016-05-01

    Comparison of solvent-wetted gauze with body paint, a peelable surface sampling media, for the sampling of the chemical warfare agents VX and sulfur mustard from nine surfaces was performed. The nine surfaces sampled are those typical of interior public venues and include smooth, rough, porous, and non-porous surfaces. Overall, solvent-wetted gauze (wipes) performed better for the recovery of VX from non-porous surfaces while body paint (BP) performed better for the porous surfaces. The average percent VX recoveries using wipes and BP, respectively, are: finished wood flooring, 86.2%, 71.4%; escalator handrail, 47.3%, 26.7%; stainless steel, 80.5%, 56.1%; glazed ceramic tile, 81.8%, 44.9%; ceiling tile, 1.77%, 13.1%; painted drywall 7.83%, 21.1%; smooth cement, 0.64%, 10.3%; upholstery fabric, 24.6%, 23.1%; unfinished wood flooring, 9.37%, 13.1%. Solvent-wetted gauze performed better for the recovery of sulfur mustard from three of the relatively non-porous surfaces while body paint performed better for the more porous surfaces. The average percent sulfur mustard recoveries using wipes and BP, respectively, are: finished wood flooring, 30.2%, 2.97%; escalator handrail, 4.40%, 4.09%; stainless steel, 21.2%, 3.30%; glazed ceramic tile, 49.7%, 16.7%; ceiling tile, 0.33%, 11.1%; painted drywall 2.05%, 10.6%; smooth cement, 1.20%, 35.2%; upholstery fabric, 7.63%, 6.03%; unfinished wood flooring, 0.90%, 1.74%. Copyright © 2016 Elsevier Ireland Ltd. All rights reserved.

  11. Analysis of Biota to Evaluate the Risks Associated with Chemical Warfare Materiel Present in Sea-Disposed Military Munitions to Human Health and the Environment

    Science.gov (United States)

    Briggs, C. W.; Bissonnette, M. C.; Edwards, M.; Shjegstad, S. M.

    2016-12-01

    Thousands of 100-lb M47A series bombs containing sulfur mustard were disposed in the ocean following World War II yet few studies have been conducted at sites in excess of 250 m, the depth where most discarded military munitions (DMM) were disposed. The Hawai`i Undersea Military Munitions Assessment (HUMMA) project was conducted to evaluate the risk from chemical warfare materiel (CWM) in DMM to human health, measuring ecological differences between the disposal area and nearby but otherwise similar areas, and evaluating the most efficient platforms for surveying DMM sea-disposal sites located at depths between 400-650 m. During the 2014 HUMMA Sampling Survey, the Jason 2 remotely operated vehicle was used to collect data. Shrimp were collected and analyzed to assess the potential for bioaccumulation of CWM, energetics and metals from munitions. No CWM was detected in H. ensifer tissue samples, indicating bioaccumulation is not occurring. Low levels of 2,4,6-trinitrotoluene, 4-amino-2,6-­dinitrotoluene, 1,3,5-trinitrobenzene, nitrobenzene, arsenic, copper, and lead were detected and the concentrations were not significantly different at DMM and control sites. No visible deformities, eroded fins, lesions, or tumors were observed on the shrimp living in the vicinity of M47A bombs. Given these results and under current and potential future uses of the HUMMA study area, health risks to likely receptors are within EPA acceptable levels. Photographic data and benthic infauna analysis were used to study benthic organisms that lived on or near munitions. There was no statistically distinguishable difference between organism distributions in dense and sparse munitions fields. Conventional munitions were found to have the greatest number of benthic infauna individuals, with control sites generally having the least number of individuals. This is consistent with the benthic macro-fauna analysis, which shows that munitions provide habitat.

  12. Diphenylarsinic acid, a chemical warfare-related neurotoxicant, promotes liver carcinogenesis via activation of aryl hydrocarbon receptor signaling and consequent induction of oxidative DAN damage in rats

    Energy Technology Data Exchange (ETDEWEB)

    Wei, Min; Yamada, Takanori; Yamano, Shotaro; Kato, Minoru; Kakehashi, Anna; Fujioka, Masaki; Tago, Yoshiyuki; Kitano, Mistuaki; Wanibuchi, Hideki, E-mail: wani@med.osaka-cu.ac.jp

    2013-11-15

    Diphenylarsinic acid (DPAA), a chemical warfare-related neurotoxic organic arsenical, is present in the groundwater and soil in some regions of Japan due to illegal dumping after World War II. Inorganic arsenic is carcinogenic in humans and its organic arsenic metabolites are carcinogenic in animal studies, raising serious concerns about the carcinogenicity of DPAA. However, the carcinogenic potential of DPAA has not yet been evaluated. In the present study we found that DPAA significantly enhanced the development of diethylnitrosamine-induced preneoplastic lesions in the liver in a medium-term rat liver carcinogenesis assay. Evaluation of the expression of cytochrome P450 (CYP) enzymes in the liver revealed that DPAA induced the expression of CYP1B1, but not any other CYP1, CYP2, or CYP3 enzymes, suggesting that CYP1B1 might be the enzyme responsible for the metabolic activation of DPAA. We also found increased oxidative DNA damage, possibly due to elevated CYP1B1 expression. Induction of CYP1B1 has generally been linked with the activation of AhR, and we found that DPAA activates the aryl hydrocarbon receptor (AhR). Importantly, the promotion effect of DPAA was observed only at a dose that activated the AhR, suggesting that activation of AhR and consequent induction of AhR target genes and oxidative DNA damage plays a vital role in the promotion effects of DPAA. The present study provides, for the first time, evidence regarding the carcinogenicity of DPAA and indicates the necessity of comprehensive evaluation of its carcinogenic potential using long-term carcinogenicity studies. - Highlights: • DPAA, an environmental neurotoxicant, promotes liver carcinogenesis in rats. • DPAA is an activator of AhR signaling pathway. • DPAA promoted oxidative DNA damage in rat livers. • AhR target gene CYP 1B1 might be involved in the metabolism of DPAA.

  13. Development of Quantitative Real-Time PCR Assays for Detection and Quantification of Surrogate Biological Warfare Agents in Building Debris and Leachate▿

    Science.gov (United States)

    Saikaly, Pascal E.; Barlaz, Morton A.; de los Reyes, Francis L.

    2007-01-01

    Evaluation of the fate and transport of biological warfare (BW) agents in landfills requires the development of specific and sensitive detection assays. The objective of the current study was to develop and validate SYBR green quantitative real-time PCR (Q-PCR) assays for the specific detection and quantification of surrogate BW agents in synthetic building debris (SBD) and leachate. Bacillus atrophaeus (vegetative cells and spores) and Serratia marcescens were used as surrogates for Bacillus anthracis (anthrax) and Yersinia pestis (plague), respectively. The targets for SYBR green Q-PCR assays were the 16S-23S rRNA intergenic transcribed spacer (ITS) region and recA gene for B. atrophaeus and the gyrB, wzm, and recA genes for S. marcescens. All assays showed high specificity when tested against 5 ng of closely related Bacillus and Serratia nontarget DNA from 21 organisms. Several spore lysis methods that include a combination of one or more of freeze-thaw cycles, chemical lysis, hot detergent treatment, bead beat homogenization, and sonication were evaluated. All methods tested showed similar threshold cycle values. The limit of detection of the developed Q-PCR assays was determined using DNA extracted from a pure bacterial culture and DNA extracted from sterile water, leachate, and SBD samples spiked with increasing quantities of surrogates. The limit of detection for B. atrophaeus genomic DNA using the ITS and B. atrophaeus recA Q-PCR assays was 7.5 fg per PCR. The limits of detection of S. marcescens genomic DNA using the gyrB, wzm, and S. marcescens recA Q-PCR assays were 7.5 fg, 75 fg, and 7.5 fg per PCR, respectively. Quantification of B. atrophaeus vegetative cells and spores was linear (R2 > 0.98) over a 7-log-unit dynamic range down to 101 B. atrophaeus cells or spores. Quantification of S. marcescens (R2 > 0.98) was linear over a 6-log-unit dynamic range down to 102 S. marcescens cells. The developed Q-PCR assays are highly specific and sensitive and can

  14. Fate of the chemical warfare agent O-ethyl S-2-diisopropylaminoethyl methylphosphonothiolate (VX) on soil following accelerant-based fire and liquid decontamination.

    Science.gov (United States)

    Gravett, M R; Hopkins, F B; Self, A J; Webb, A J; Timperley, C M; Riches, J R

    2014-08-01

    procedures and analytical methods suitable for investigating accelerant and decontaminant-soaked soil samples are presented. VX and its degradation products and/or impurities were detected under all the conditions studied, demonstrating that accelerant-based fire and liquid-based decontamination and then fire are unlikely to prevent the retrieval of evidence of chemical warfare agent (CWA) testing. This is the first published study of the effects of an accelerant-based fire on a CWA in environmental samples. The results will inform defence and security-based organisations worldwide and support the verification activities of the Organisation for the Prohibition of Chemical Weapons (OPCW), winner of the 2013 Nobel Peace Prize for its extensive efforts to eliminate chemical weapons.

  15. Hybrid Warfare: the 21st Century Russian Way of Warfare

    Science.gov (United States)

    2017-05-25

    War, the pendulum slowly swung back to those of limited aims. Nuclear weapon proliferation became the regulating force that eroded the political...offensive operations, a series of consecutive blows that would not permit the enemy to recuperate.”55 Mobile , combined arms formations, blending tanks...works in conjunction with a regular force to achieve a similar political purpose. Schmitt also states that partisans are telluric61, mobile , and

  16. Unconventional Cyber Warfare: Cyber Opportunities in Unconventional Warfare

    Science.gov (United States)

    2014-06-01

    public, the documents were spread by a variety of means: as pdf. on Scribd, file sharing services, torrents , and on Facebook as images (spread further...information via pdf. on Scribd, file sharing services, on torrents , and on Facebook as images, and also began crowdsourcing the translation of many of

  17. The Changing Nature of Warfare

    Science.gov (United States)

    2004-11-01

    an Indian. Fujimori would win reelection if he were to return. The Sendero Luminoso is reviving. Are they supported by FARC? The FARC is also active...weapons and one commentator speculated about their return to military prominence by 2020. Sic transit gloria mundi. 97 C IM D 00 11 00 5. A 1/ F in al

  18. Air Power in Irregular Warfare

    Science.gov (United States)

    2012-12-01

    One needs only to look towards the Mexican Revolution from 1910 – 1920 for several examples of air power being used during IW in the form of an...tradition was and is a constant in conflicts throughout all time since. Mercenaries of various nationalities flew during the Mexican Revolution (1913...Company. During his time in Mexico City, the Mexicans convinced Worden to conduct several patrols/scouting missions as part of his demonstration. He

  19. German Views of Irregular Warfare

    Science.gov (United States)

    2015-06-01

    General Staff experience, and Seebataillon (Marine) command. He had significant foreign-service stints, including service in the Boxer Rebellion in...Colonel von Lettow-Vorbeck and Germany’s East African Empire (New York: Macmillan, 1981), 7. During the Boxer Rebellion, von Lettow, “was struck by ‘the

  20. The Strategy of Drone Warfare

    Directory of Open Access Journals (Sweden)

    Mike Fowler

    2014-12-01

    Full Text Available There is a budding controversy with the combat use of Remotely Piloted Aircraft (RPA. Also known as Unmanned Aerial Vehicles (UAV, there is a growing literature critiquing the use of RPAs, often using the pejorative term “drone.” RPAs seem to get the blame for a variety of complaints about policy and employment that have little to do with the airframe or its processes. While all of the military functions of an RPA can and are done by manned aircraft, the RPAs must endure additional scrutiny. The decision to employ RPAs requires additional considerations at both the strategic and operational levels of war. This article explores the strategic issues that govern the decisions to employ RPAs in combat. The decision to employ RPAs involves a variety of strategic and operational concerns involving legal issues, technological constraints, operational efficiency, and an interdependency upon information operations.

  1. Moral Warfare in Counterinsurgency Operations

    National Research Council Canada - National Science Library

    Chiarenza, David C

    2007-01-01

    .... This monograph argues that resistance to U.S. endeavors in Iraq is due to losses in the moral realm for the compliance and support of the Iraqi people, which is critical in defeating any insurgency...

  2. Rethinking Cultural Influences on Warfare

    Science.gov (United States)

    2012-05-17

    Book 1, 87. 51 Mark Philip Bradley, Imagining Vietnam and America: the Making of Postcolonial Vietnam, 1919-1950 (Chapel Hill: University of North... Postcolonial Vietnam, 1919-1950. Chapel Hill: University of North Carolina, 2000. Brightman, Robert. "Forget Culture: Replacement, Transcendence

  3. Knowledge Centric Warfare: An Introduction

    Science.gov (United States)

    2009-03-25

    around them while building on knowledge previously acquired. Immanuel Kant, Jean Piaget , and Lev Vygotsky are among important contributors to the... Jean Lave first introduced the term Communities of Practice (CoP) more than 15 years ago.41 In a later work, Wenger, et al., define CoP as “groups of...Development Piaget Cognition develops in four stages: sensorimotor, preoperational, concrete, and formal Private Multiple Intelligences Theory Gardner

  4. 2024 Unmanned Undersea Warfare Concept

    Science.gov (United States)

    2013-06-01

    the cheaper option. The 242 second method, improving sensor quality, has the disadvantage of higher cost, but the advantage of being able to... Auckland , New Zealand: Operation Analysis Section, Defense Technology Agency. Michaels, Jack, and William Wood. 1989. Design to Cost. New York: Wiley

  5. The Surface Warfare Test Ship

    Science.gov (United States)

    2000-01-26

    reactivated, resulting in algae in the tanks and tank seepage. This has led to degraded fuel quality and fuel leakage into ship’s storerooms. The inherent...The cosmetic bulkhead is smooth like line 1; only 1 % of the reflected power is reflected along the sea surface. 4. Angled Bulkhead around Fantail... algae present and require continuous treatment to prevent fouling of the main engines and generators. The ship s tank system was not properly

  6. Elegant Irrelevance: Fourth Generation Warfare

    Science.gov (United States)

    1993-01-01

    philosopher of the 19th century who relied extensively upon this form of the dialectic method. The dialectic method was also used by Gottfried Wilhelm ...von Leibniz and a host of other philosophers who found it invaluable as a pedagogical method. The discussion in the text is based on the Hegelian

  7. Information Warfare and International Law

    Science.gov (United States)

    1998-01-01

    business with companies that did business with Israel.137 Similarly, where it has not internationalized a canal, the country through which a canal travels...attracting business, including professional sports franchises . Where a government refuses to extradite those responsible for attacks against another...Standard for Economically Related State Economic Action, 13 Mich. J. Int’l L. 218, 219 (1991). 106 Amendments of the Brazilian Delegation to the

  8. Warfare, Fiscal Capacity, and Performance

    DEFF Research Database (Denmark)

    Prado, Mauricio; Dincecco, Mark

    innovations, which persisted and helped to shape current fiscal institutions. Economic historians claim that greater fiscal capacity was the key long-run institutional change brought about by historical conflicts. Using casualties sustained in pre-modern wars to instrument for current fiscal institutions, we......We exploit differences in casualties sustained in pre-modern wars to estimate the impact of fiscal capacity on economic performance. In the past, states fought different amounts of external conflicts, of various lengths and magnitudes. To raise the revenues to wage wars, states made fiscal...... estimate substantial impacts of fiscal capacity on GDP per worker. The results are robust to a broad range of specifications, controls, and sub-samples....

  9. Warfare, Fiscal Capacity, and Performance

    DEFF Research Database (Denmark)

    Dincecco, Mark; Prado, Mauricio

    2012-01-01

    innovations, which persisted and helped to shape current fiscal institutions. Economic historians claim that greater fiscal capacity was the key long-run institutional change brought about by historical conflicts. Using casualties sustained in pre-modern wars to instrument for current fiscal institutions, we......We exploit differences in casualties sustained in pre-modern wars to estimate the impact of fiscal capacity on economic performance. In the past, states fought different amounts of external conflicts, of various lengths and magnitudes. To raise the revenues to wage wars, states made fiscal...... estimate substantial impacts of fiscal capacity on GDP per worker. The results are robust to a broad range of specifications, controls, and sub-samples....

  10. General Crook and Counterinsurgency Warfare

    Science.gov (United States)

    2001-06-01

    civilian agent John Clum. The overcrowding on the San Carlos reservation and the vacillation within the government over the policy towards the Apache...police, with the objective of turning over mundane policing duties to the Apache inhabitants. To relieve the 80 overcrowding on the main populated...Geronimo’s band to a remote portion of San Carlos at a location called Turkey Creek. This would lessen the pressure of overpopulation among the

  11. Mine Warfare History and Technology

    Science.gov (United States)

    1975-07-01

    off, it released a spring-driven plunger which struck a " fulminating charge," thus exploding the mine. The discovery of fulminate of mercury (Hg(0NC...2> had been reported to the Royal Society in 1800 by Edward Charles Howard, FRS (brother of the 12th Duke of Norfolk). The use of fulminate of mer...generally a mixture of the two ( fulminate and potassium chlorate) in a small tube impacted at the closed end, the open end being in contact with

  12. Breaching Walls in Urban Warfare

    Science.gov (United States)

    1975-06-06

    weapons in the basement and automatic weapons on the upper stories were a deadly com- bination. Pavlov’s House was never taken.^ 3. Hundreds of...misnomer, for the street w-is the one place we could not go. Streets were completely covered by pillboxes and rapid-fire 40min guns, with each...street comer swept by at least four pillboxes . Our procedure was to go from house to house blasting holes through the walls with satchel

  13. Compound Warfare: That Fatal Knot

    Science.gov (United States)

    2002-08-01

    perception of Diem as a fearful dictator with no support in the countryside. And the village militia (Dan Ve , or People’s Self-defense Forces) were miserably...bez sovetskikh voisk) (Moscow: INSAN , 1996), 58; Stephen J. Blank, Operational and Strategic Lessons of the War in Afghanistan, 1979-90 (Carlisle

  14. Future Warfare: Anthology Revised Edition

    Science.gov (United States)

    2001-06-01

    direct result of the “victory disease ” that broke out in the immediate aftermath of the Gulf War. If the American military are to innovate in an...Some even have urged redesigning American military forces specifically for intervention in such cases.12 Such proposals are a gilt -edged invitation to...positive feedback to the IIT on their notional system concept designs. These assessments are then forwarded to TRADOC for review and assessment, and

  15. Political Warfare and Contentious Politics

    Science.gov (United States)

    2015-06-01

    UK: Oxford University Press, 2007), 216. 31 Jonathan Christiansen, “Four Stages of Social Movement” ( EBSCO Publishing Inc, 2009), 2, http...Encyclopedia of Sociology_George Ritzer.pdf. Christiansen, Jonathan. “Four Stages of Social Movement.” EBSCO Publishing Inc, 2009. http://www.ebscohost.com

  16. Hezbollah: Psychological Warfare Against Israel

    Science.gov (United States)

    2009-03-01

    rats. Who is it that’s putting your life in danger? Who is using you as human shields? We don’t want to harm you. We’re... lyrics : It is my right to defend my land and kick out occupiers; it is my right to declare my freedom and raise a flag for the oppressed; it is my

  17. Communications, radar and electronic warfare

    CERN Document Server

    Graham, Adrian

    2010-01-01

    A practical guide to the principles of radio communications for both civilian and military applications In this book, the author covers both the civilian and military uses of technology, focusing particularly on the applications of radio propagation and prediction. Divided into two parts, the author introduces the basic theory of radio prediction before providing a step-by-step explanation of how this theory can be translated into real-life applications. In addition, the book presents up-to-date systems and methods to illustrate how these applications work in practice. This includes s

  18. The Technology of Nuclear Warfare

    International Nuclear Information System (INIS)

    Broda, E.

    1979-01-01

    The present technical status of the nuclear weapon system and of the systems for their delivery is explained. All these systems have made tremendous progress since the 1960s. Available destructive power now is literally millions of times larger than at the time of Hiroshima. Moreover, technical progress has had, especially through the MIRV principle and the cruise missile, a destabilizing influence and threatens the equilibrium of terror. New strategy doctrines for winning rather than preventing nuclear war are developed. According to the counterforce strategy the retaliation capacity of the opponent is to be destroyed by a surprise attack. Moreover, plans for the tactical first-use of nuclear weapons have been accepted. In a nuclear conflict, the commanders-in-chief are overburdened by the need for ultra-urgent decisions. As a consequence tendencies in the direction of increasing automatization become ever more conspicuous. In the extreme case, decisions may be entirely left to machines, and man would not any more be included in decision-making. The increasing automatization leads to further escalation of insecurity for the whole world. A solution cannot be found on the level of technology, but only on that of practical peace policy. (author)

  19. Roots of Russian Irregular Warfare

    Science.gov (United States)

    2016-12-01

    most sacred duty and object in life” and “die in battle against the infidel .”522 During the five years of resistance, Sheik Mansur succeeded in...across Chechnya. This did little to appease the extremists. External, radical influence continued to pour in, along with financing . Sharia supporters

  20. Special Operations And Cyber Warfare

    Science.gov (United States)

    2016-12-01

    on the ground with them or while continents away.”86 Cultural sensitivity is clearly critical for the success of these operations. Ultimately, cyber...Andrew Campbell, and Ian Hughes, “Research: Ageing, social capital and the Internet: Findings from an exploratory study of Australian ‘silver surfers

  1. Postmodern Warfare: Beyond the Horizon

    Science.gov (United States)

    2013-06-01

    money ahead of loyalty to their state or group. A novel form of currency called Bitcoin presents an interesting example of money—a symbolic store...of value—that is not tied to the power of the state. Bitcoin is a form of currency derived from the efforts of computer code- breakers. It can be...and there is currently more than $1.4B worth of Bitcoin in global 58 Metz and Cuccia, “Defining War

  2. IRREGULAR WARFARE IN AFRICAN CONFLICTS

    African Journals Online (AJOL)

    Abel

    Winter 2000: 1-5. Hugo, F. 2009. Asymmetrical War and terror at sea: 2010 scenarios. In Potgieter, T. & Pommerin, R. (eds). Maritime Security. Centre for Military Studies. Stellenbosch University: 103-111. Institute for Security Studies Briefing. Events: 2008. The role of UN peacekeepers in re-arming rebel groups in the DRC.

  3. Civil Affairs in Unconventional Warfare

    Science.gov (United States)

    2013-05-23

    Affairs Team CIM Civil Information Management CCDR Combatant Commander CF Conventional Forces CLT Civil Liaison Team CME Civil Military...this strategy from the 1930s to 1940s against the Japanese invaders in China in World War II and then against the Chinese ruling party, the

  4. Forensic Information Warfare Requirement Study

    Science.gov (United States)

    2002-06-01

    evidence, they also must search for words that would cause them to not examine a document or file due to it containing information that would be privileged...systems, format of the drive (doublespaced or compressed drives cause great difficulty), operating system (especially have problems with UNIX, old...34Electronic Sweatshop ", 28 J. Marshall L. Rev. 139 (1994). 22. Michael R. Anderson, “Electronic Fingerprints Computer Evidence Comes of Age”, www.secure

  5. Post-heroic warfare revisited

    DEFF Research Database (Denmark)

    Frisk, Kristian

    2017-01-01

    The paper challenges the thesis that Western societies have moved towards a post-heroic mood in which military casualties are interpreted as nothing but a waste of life. Using content analysis and qualitative textual analysis of obituaries produced by the Royal Danish Army in memory of soldiers...

  6. Innovative Practices for Special Warfare

    Science.gov (United States)

    2015-12-01

    businesses to collaborate within the delivery chain in order to be successful. This collaboration increases potential output and profitability while...manufacturing, design, food , and beverage industries. In sum, this chapter seeks to illuminate best practices from these organizations from a variety of...in which a favorable outcome is unlikely in a given situation, they may seek to “change the game.”232 Two companies in the food and beverage industry

  7. Intelligent methods for cyber warfare

    CERN Document Server

    Reformat, Marek; Alajlan, Naif

    2015-01-01

    Cyberwarfare has become an important concern for governmental agencies as well businesses of various types.  This timely volume, with contributions from some of the internationally recognized, leaders in the field, gives readers a glimpse of the new and emerging ways that Computational Intelligence and Machine Learning methods can be applied to address problems related to cyberwarfare. The book includes a number of chapters that can be conceptually divided into three topics: chapters describing different data analysis methodologies with their applications to cyberwarfare, chapters presenting a number of intrusion detection approaches, and chapters dedicated to analysis of possible cyber attacks and their impact. The book provides the readers with a variety of methods and techniques, based on computational intelligence, which can be applied to the broad domain of cyberwarfare.

  8. Review of environmental exposure concentrations of chemical warfare agent residues and associated the fish community risk following the construction and completion of the Nord Stream gas pipeline between Russia and Germany.

    Science.gov (United States)

    Sanderson, Hans; Fauser, Patrik; Rahbek, Malene; Larsen, Jørn Bo

    2014-08-30

    This paper compiles all the measured chemical warfare agent (CWA) concentrations found in relation to the Nord Stream pipeline work in Danish waters for the past 5 years. Sediment and biota sampling were performed along the pipeline route in four campaigns, prior to (in 2008 and 2010), during (in 2011) and after (in 2012) the construction work. No parent CWAs were detected in the sediments. Patchy residues of CWA degradation products of Adamsite, Clark I, phenyldichloroarsine, trichloroarsine and Lewisite II, were detected in a total of 29 of the 391 sediment samples collected and analyzed the past 5 years. The cumulative fish community risk quotient for the different locations, calculated as a sum of background and added risk, ranged between 0 and 0.017 suggesting a negligible acute CWA risk toward the fish community. The added risk from sediment disturbance in relation to construction of the pipelines represents less than 2% of the total risk in the areas with the highest calculated risk. The analyses of benthic infauna corroborate the finding of CWA related low risk across the years. There was no significant difference in CWA risk before (2008) and after the pipeline construction (2012). Copyright © 2014 Elsevier B.V. All rights reserved.

  9. Determination of degradation products of chemical warfare agents in water using hollow fibre-protected liquid-phase microextraction with in-situ derivatisation followed by gas chromatography-mass spectrometry.

    Science.gov (United States)

    Lee, Hoi Sim Nancy; Sng, Mui Tiang; Basheer, Chanbasha; Lee, Hian Kee

    2007-04-27

    Hollow fibre-protected liquid-phase microextraction (HF-LPME) together with gas chromatography/mass spectrometry was investigated for the analysis of degradation products of chemical warfare agents in water samples. The degradation products studied were those of nerve and blister agents, and a psychotomimetic agent. Extractions were successfully performed coupled with in-situ derivatisation using a mixture of solvent and derivatising agent. The protection of the moisture-sensitive derivatising agent was afforded by the hollow fibre. Parameters such as extraction solvent, pH, salt concentration, stirring speed and extraction time were optimised using spiked deionised water samples. The linear range established was between 0.005 and 5 microg ml(-1) depending on analyte, with squared regression coefficients ranging from 0.9929 to 1.0000. Relative standard deviations ranged from 9% to 22%. As compared to those of solid-phase microextraction, the limits of detection (0.01-0.54 microg l(-1)) of the newly-developed approach were significantly improved.

  10. Determination of basic degradation products of chemical warfare agents in water using hollow fibre-protected liquid-phase microextraction with in-situ derivatisation followed by gas chromatography-mass spectrometry.

    Science.gov (United States)

    Lee, Hoi Sim Nancy; Sng, Mui Tiang; Basheer, Chanbasha; Lee, Hian Kee

    2008-07-04

    Hollow fibre-protected liquid-phase microextraction (HF-LPME) together with gas chromatography-mass spectrometry was, for the first time, investigated for the in-situ derivatisation and analysis of basic degradation products of chemical warfare agents in water samples. The degradation products studied were those of nerve and blister agents, and a psychotomimetic agent. Extractions with in-situ derivatisation were successfully performed using a mixture of solvent and derivatising agent. The protection of the moisture-sensitive derivatising agent was afforded by the hydrophobic hollow fibre. Parameters such as type of derivatising agent, extraction solvent, pH, salt concentration, stirring speed and extraction time were optimised using spiked deionised water samples. The linear range established was between 0.05 and 25 microg ml(-1) depending on analyte, with squared regression coefficients ranging from 0.9959 to 0.9996. Relative standard deviations (RSDs) ranged from 6% to 10%. As comparison, solid-phase microextraction (SPME) was also evaluated and extraction conditions such as pH, salt concentration, stirring speed and extraction time were optimised. This work also represented the first report of such an in-situ derivatisation approach for SPME of basic analytes. The linear range established was between 0.5 and 25 microg ml(-1) depending on analyte, with squared regression coefficients ranging from 0.9946 to 0.9998. RSDs ranged from 5% to 22%. The limits of detection of HF-LPME (0.04-0.36 microg l(-1)) showed improvement over those of SPME (0.06-0.77 microg l(-1)).

  11. Measurement of breakthrough volumes of volatile chemical warfare agents on a poly(2,6-diphenylphenylene oxide)-based adsorbent and application to thermal desorption-gas chromatography/mass spectrometric analysis.

    Science.gov (United States)

    Kanamori-Kataoka, Mieko; Seto, Yasuo

    2015-09-04

    To establish adequate on-site solvent trapping of volatile chemical warfare agents (CWAs) from air samples, we measured the breakthrough volumes of CWAs on three adsorbent resins by an elution technique using direct electron ionization mass spectrometry. The trapping characteristics of Tenax(®) TA were better than those of Tenax(®) GR and Carboxen(®) 1016. The latter two adsorbents showed non-reproducible breakthrough behavior and low VX recovery. The specific breakthrough values were more than 44 (sarin) L/g Tenax(®) TA resin at 20°C. Logarithmic values of specific breakthrough volume for four nerve agents (sarin, soman, tabun, and VX) showed a nearly linear correlation with the reciprocals of their boiling points, but the data point of sulfur mustard deviated from this linear curve. Next, we developed a method to determine volatile CWAs in ambient air by thermal desorption-gas chromatography (TD-GC/MS). CWA solutions that were spiked into the Tenax TA(®) adsorbent tubes were analyzed by a two-stage TD-GC/MS using a Tenax(®) TA-packed cold trap tube. Linear calibration curves for CWAs retained in the resin tubes were obtained in the range between 0.2pL and 100pL for sarin, soman, tabun, cyclohexylsarin, and sulfur mustard; and between 2pL and 100pL for VX and Russian VX. We also examined the stability of CWAs in Tenax(®) TA tubes purged with either dry or 50% relative humidity air under storage conditions at room temperature or 4°C. More than 80% sarin, soman, tabun, cyclohexylsarin, and sulfur mustard were recovered from the tubes within 2 weeks. In contrast, the recoveries of VX and Russian VX drastically reduced with storage time at room temperature, resulting in a drop to 10-30% after 2 weeks. Moreover, we examined the trapping efficiency of Tenax TA(®) adsorbent tubes for vaporized CWA samples (100mL) prepared in a 500mL gas sampling cylinder. In the concentration range of 0.2-2.5mg/m(3), >50% of sarin, soman, tabun, cyclohexylsarin, and HD were

  12. Identification of chemical warfare agents from vapor samples using a field-portable capillary gas chromatography/membrane-interfaced electron ionization quadrupole mass spectrometry instrument with Tri-Bed concentrator.

    Science.gov (United States)

    Nagashima, Hisayuki; Kondo, Tomohide; Nagoya, Tomoki; Ikeda, Toru; Kurimata, Naoko; Unoke, Shohei; Seto, Yasuo

    2015-08-07

    A field-portable gas chromatograph-mass spectrometer (Hapsite ER system) was evaluated for the detection of chemical warfare agents (CWAs) in the vapor phase. The system consisted of Tri-Bed concentrator gas sampler (trapping time: 3s(-1)min), a nonpolar low thermal-mass capillary gas chromatography column capable of raising temperatures up to 200°C, a hydrophobic membrane-interfaced electron ionization quadrupole mass spectrometer evacuated by a non-evaporative getter pump for data acquisition, and a personal computer for data analysis. Sample vapors containing as little as 22μg sarin (GB), 100μg soman (GD), 210μg tabun (GA), 55μg cyclohexylsarin (GF), 4.8μg sulfur mustard, 390μg nitrogen mustard 1, 140μg of nitrogen mustard 2, 130μg nitrogen mustard 3, 120μg of 2-chloroacetophenone and 990μg of chloropicrin per cubic meter could be confirmed after Tri-Bed micro-concentration (for 1min) and automated AMDIS search within 12min. Using manual deconvolution by background subtraction of neighboring regions on the extracted ion chromatograms, the above-mentioned CWAs could be confirmed at lower concentration levels. The memory effects were also examined and we found that blister agents showed significantly more carry-over than nerve agents. Gasoline vapor was found to interfere with the detection of GB and GD, raising the concentration limits for confirmation in the presence of gasoline by both AMDIS search and manual deconvolution; however, GA and GF were not subject to interference by gasoline. Lewisite 1, and o-chlorobenzylidene malononitrile could also be confirmed by gas chromatography, but it was hard to quantify them. Vapors of phosgene, chlorine, and cyanogen chloride could be confirmed by direct mass spectrometric detection at concentration levels higher than 2, 140, and 10mg/m(3) respectively, by bypassing the micro-concentration trap and gas chromatographic separation. Copyright © 2015 Elsevier B.V. All rights reserved.

  13. Historical Bibliography of Sea Mine Warfare

    Science.gov (United States)

    1976-01-01

    609. Murder at Sea and the Blockade of German Experts; Spector, Vol. CLXIII, 11. Nov. 24, 1939; London. pg. 729. (Murray), Army and Navy Journal, Vol...War at Sea: Death for the Magpie ; Time, Vol. LVI, No. 16, Oct. 16, 1950; 7. New York. pg. 27. The War at Sea: Going In; Time, Vol. LVI, No. 18, Oct. 30

  14. Encircled Forces: The Neglected Phenomenon of Warfare.

    Science.gov (United States)

    1985-05-01

    Command and General Staff College, 1984. Wray, Timothy A. "Standing Fast: German Defensive Doctrine On the Russian Front During the Second World War... Raney , George H. "Tank and Anti-Tank Activities of the German Army." Infantry Journal 31 (February 1927), 151-8. Record, Jeffrey. "Implications of a

  15. Laboratory Aspects of Biological Warfare Agents

    Science.gov (United States)

    2016-01-01

    acid in bacterial spores using pyrolysis /mass spectrometry. Rapid Commun Mass Spectrom 10:455-458. 5. Beverly MB, Voorhees KJ, Hadfield TL. 1999...Africa. In 2000, cases were confirmed in Saudi Arabi and Yemen, making the first occurrence outside of Africa. Tospovirus; type species: Tomato ...spotted wilt virus The genus takes its name from the discovery of Tomato spotted wilt virus (TSWV) in Australia in 1915. Not further discussed

  16. Olfaction Warfare: Odor as Sword and Shield

    Science.gov (United States)

    2013-03-01

    Wheel for South African Brandy. South African Journal of Enology and Viticulture 2001, 22 (1), 16–21. Jones, M. B.; Fjellanger, R.; Cox, C.; Poling, A...Aroma Terminology. American Journal of Enology and Viticulture 1984, 35, 107–109. Nolte, D. L.; Mason, J. R.; Epple, G.; Aronov, E.; Campbell, D. L

  17. Tribal Warfare: The Society of Modern Airmen

    Science.gov (United States)

    2015-06-01

    Air University Press, 1998), 235–38. See also Janowitz, Professional Soldier, 150–51. 8. Charles C. Moskos, David R . Segal, and John Allen Williams...social Darwinism to accept the notion that 86 | Air & Space Power Journal a certain amount of organizational strife keeps everybody on his or her toes...York: Free Press, 1971), 54–75. 7. Michael R . Worden, Rise of the Fighter Generals: The Problem of Air Force Leadership, 1945–1982 (Maxwell AFB, AL

  18. The International Legal Limitations On Information Warfare

    National Research Council Canada - National Science Library

    O'Brien, Gregory

    1998-01-01

    .... Information war has no front line. Potential battlefields are anywhere networked systems allow access to oil and as pipelines, for example, electric power grids, telephone switching networks. In sum, the U.S...

  19. Technology, Effects and Doctrines of Nuclear Warfare

    International Nuclear Information System (INIS)

    Broda, E.

    1981-01-01

    The development and the status of the nuclear weapons systems and of the systems for their delivery are explained. All these systems have made tremendous progress since the 1960s. Available destructive power now is literally millions of times larger than at the time of Hiroshima. Moreover, technical progress has had, especially through the MIRV principle and the cruise missile, a destabilizing influence and threatens the equilibrium of terror. New strategic doctrines for winning rather than preventing nuclear war have come to the foreground. Plans for the tactical first-use of nuclear weapons have been accepted. Alternatively, the retaliation capacity of the opponent could be destroyed by surprise attack - The First Strike. In a nuclear conflict, the commanders-in-chief are overburdened by the need for ultra-urgent decisions. This applies especially to a First Strike situation. As a consequence tendencies in the direction of increasing automatization become ever more conspicuous. In the extreme ease, decisions may be left entirely to machines, and men would not any more be included in decision-making. The increasing automatization leads to further escalation of insecurity for the whole world. Solutions for the principal problem of the world, war or peace, cannot be found On the level of technology, but only on that of practical policy of detente, disarmament, collaboration and reconciliation. (author)

  20. Electronic Warfare and Radar Systems Engineering Handbook

    Science.gov (United States)

    2012-06-01

    aircraft or motor vehicle being fueled or on an adjacent aircraft or vehicle. • Do not make or break any electrical, ground wire, or tie down...typically are of the Stirling cycle design and utilize the expansion of a gas (helium) to cool a cold finger attached to the detector. These generally...10-1.20 NUTATOR - A motor -driven rotating antenna feed used to produce a conical scan for a tracking radar. See also Antenna, Nutating. Also

  1. Book Review COMPOSITE WARFARE: THE CONDUCT OF ...

    African Journals Online (AJOL)

    of someone who has served as an “… advisor, military strategist, special operations commander, brigade commander, occasional division commander, and special advisor to several chiefs of staff”3; someone who has experienced the “campfires, bad food, terrible water, heat, cold, total exhaustion, hostile jungles, and heat-.

  2. The Civil Side of Irregular Warfare

    Science.gov (United States)

    2014-05-22

    works highlight the “campaigns” that the United States won, to include Lewis Sorley’s A Better War; Mark Moyar’s Phoenix, and the Birds of Prey ; and...organization to the communists in 76Mark Moyar, Phoenix and the Birds of Prey : Counterinsurgency and Counterterrorism in Vietnam (Lincoln: University...86Moyar, Phoenix and the Birds of Prey , 273. 87Sorley. A Better War, 147. 88Moyar, Phoenix and the Birds of Prey , 264. 27

  3. Mosby’s Rangers and Partisan Warfare

    Science.gov (United States)

    1993-06-04

    formation of Company C and 53 presented the four officer candidates. They were Captain William H. Chapman, ILT Dolly Ric-r",% 2LT Frank Fox, and 3LT Frank...of hay and wheat and confiscated "all stock, sheep , cattle, horses, &c., south of Winchester." He mentioned Mosby’s annoyance and reported "we hung one...and GC " Dolly " Richards was promoted to major and assumed command of a battalion composed of Companies A, B, and D. 100 At the time of receipt of the

  4. Decontamination of Water Containing Radiological Warfare Agents

    Science.gov (United States)

    1975-03-01

    ofNuct,=r Weapons, Department of Prv vtnIive Medicine, Army Medical Service School, M709.1.1, January 1959. 17 N" S. .,. z 0S CA t’ -,41 1o "t.C,4 13...week period. 7. Detection. Although water quality assessment in the field is the primary responsibility of the field medical officer, the water...It kPSEC) Amnounit of Isotope Rewiloved (% ,) lh’ . Sotope (.atmtnl Exchangec Anlioln lxchialge \\hxcl-e (,4t’nG i 185W 12-16 97.2-99.2 98.9) 9 91 11 M

  5. Preparing the British Army for Future Warfare

    Science.gov (United States)

    2011-12-16

    concepts described the “Clash of Civilizations”3 and theories on how “scarcity, crime, overpopulation , tribalism, and disease are rapidly destroying the...like the United Kingdom, are faced with a clash of interests. Of more direct military relevance is a multinational and multi-organizational solution to...Perspective 49 from their current unilateral ownership of the task. This multilateral solution could quite possibly call upon the United Kingdom to

  6. Africa: Irregular Warfare on the Dark Continent

    Science.gov (United States)

    2009-05-01

    were decades in the making. Prolonged drought, desertification, and overpopulation are among the primary reasons for the fighting, which breaks down...threat to U.S. and European interests in the area. There are also indications from Al Qaeda’s central command in Southwest Asia that the 39...convenience and self-interests of extra-continental powers. With more than 400 indigenous tribes, plus genetic infusion from Europe and Asia , the population

  7. Strategic Implications of Intercommunal Warfare in Iraq

    Science.gov (United States)

    2005-02-01

    the U.S. embassy in the United Arab Emirates; Major James Overstreet, USAF, the former Assistant Air Attaché in Amman Jordan; Colonel Patrick...Relations from Claremont Graduate University, Claremont, California. v SUMMARY Contemporary Iraqi society is comprised of Shi’ite Arabs , Sunni Arabs ...orientation and ideology. Around 60-65 percent of Iraqis are Shi’ite Arabs , 15-20 percent are Sunni Muslim Arabs , and 15-20 percent are Kurds. Turkomans

  8. Armored Warfare in World War 2

    Science.gov (United States)

    1979-05-10

    Ilegt 102 wk Aleejw. MAP 8 \\~uglik N’owosselowIka H atie Gp PGI _Z24J = == . PGD Werchopenje Sawdo1w Aleejwka Luhaiu 1 heBatl f iuslwiI Thetatte of Kurs...ulj 13) 12 Miles (APPMa) o 1 2 4 5 103 MAP 9 -’~9 K1attlep G:~ wk - PGD GD 24!- B iuto ons 14 Jt 1 M~ies (appmo)o 6 1 s i 5 104 the troops were unable...calls for such intensive contemplation of its ethical and intellectual basis as that of the soldier". -15 150

  9. Entomological Terrorism: A Tactic in Asymmetrical Warfare

    Science.gov (United States)

    2010-06-01

    borne disease. These arthropods can cause casualties from secondary infections and even death from allergic reactions to their venom . Annoyance...injected into the bloodstream.2 Military personnel currently conduct operations in en- vironments throughout Iraq that support Paederus bee - tle

  10. Transforming USMC Intelligence to Address Irregular Warfare

    National Research Council Canada - National Science Library

    Reiley, Matthew A

    2008-01-01

    ... to which they had grown accustomed. This global instability, in addition to a dramatic increase in Islamic terrorism, has forced the United States to become increasingly involved in small conflicts around the globe...

  11. Black Jack Pershing: Partnerships in Warfare

    Science.gov (United States)

    2010-04-01

    withdrawn to American territory as soon as the de facto government of Mexico is able to relieve them of this work.”38 The Carranza government of Mexico...roadless deserts and rugged mountains stretching some five hundred miles into the heart of Mexico.40 The Carranza government refused to allow the...through which we have operated.”44 By May 4, 1916, the Carranza government was opening calling for the immediate withdrawal of US troops.45 General

  12. Towards a Flexible Theater Air Warfare Doctrine

    National Research Council Canada - National Science Library

    Gunzinger, Mark A

    1996-01-01

    "Billy Mitchell was right." These words hung in the foyer of the Air Force Air Command and Staff College during Desert Storm, reflecting the belief that air power had finally come of age in the skies over Iraq...

  13. The Acme of Skill: Nonkinetic Warfare

    National Research Council Canada - National Science Library

    Teo, Cheng H

    2008-01-01

    ... impairment of the enemy's will to fight. Four global trends identified in this paper -- economic prosperity, freedom of information, the rise of nationalism, and globalization and interdependence -- are possible causes for this shift...

  14. A Dialectic for Network Centric Warfare

    National Research Council Canada - National Science Library

    Lambert, Dale A; Scholz, Jason B

    2005-01-01

    .... 2. Mission command will remain an effective command philosophy into the future. 3. Information and intelligence will be shared if a network is built by connecting engagement systems, sensor systems and command and control systems...

  15. Globalization and Asymmetrical Warfare: Operation Athena

    Directory of Open Access Journals (Sweden)

    Paul Clep

    2011-02-01

    Full Text Available Since 2003, Operation Athena represents Canada’s contribution to the International Security Assistance Force (ISAF in Afghanistan. This article explains the Canadian role as an international security provider in general and a closer look on the background, the rationale and the structure of Operation Athena - how it supports the Canadian priorities and objectives in Afghanistan toward 2011.

  16. 2007 Expeditionary Warfare Conference (12th)

    Science.gov (United States)

    2007-10-25

    Panama Peru Uruguay EUCOM Armenia Austria Azerbaijan Belgium Bulgaria Croatia Denmark Estonia Finland Czech Rep. France Georgia Germany Greece Hungary...UPS 1911/14/2007 2:17 PM Lockheed Martin Team Lockheed Martin Gibbs & Cox Marinette Marine Bollinger Shipyards General Dynamics Bath Iron Works

  17. Book Review COMPOSITE WARFARE: THE CONDUCT OF ...

    African Journals Online (AJOL)

    Pinetown: 30 Degrees South Publishers. 2015, 576 pages. ISBN 9781928211761. Africa is still one of the most conflict-ridden places on earth – from civil strife and civil war to various forms of mostly irregular war. Although much has changed since the end of the Cold War in 1989, many people, especially women.

  18. Russian Political Warfare: Origin, Evolution, and Application

    Science.gov (United States)

    2015-06-01

    financing and resources from local Ukrainian businesses, groups, and citizens, particularly entrepreneurs .595 In fact, U.S. funding overall for Ukraine had...Revolution provoked Putin’s paranoia and intensified the conspiratorial mindset pervasive in the Kremlin. The protests were a direct threat to Russia and a

  19. The Mongols: Early Practitioners of Maneuver Warfare

    Science.gov (United States)

    2012-05-17

    35 Paul Ratchnevsky, Genghis Khan: His Life and Legacy (Oxford, UK: Blackwell, 1991), 121. 36 Distances based on Google map. 37...was in Brest , France and his eastern flank was in Berlin, Germany. 39 The second topographic characteristic of this area is that it is a land of...approximate. 43 Paul Ratchnevsky, Genghis Khan: His Life and Legacy (Oxford, UK: Blackwell, 1991), 132- 33. 44 Richard A. Gabriel, Subotai the

  20. Soviet Tactical Doctrine for Urban Warfare

    Science.gov (United States)

    1975-12-01

    characteristics are discussed in more detail in the following passages. 1. The Meeting Engene •et Soviet writers point out that the probability of mating engage...field, 20 meters by 25 meters. Point 8 is a finiai trench. Point 9 is a tar-Let setup for hand grenade throving. Electric cables have been laid in the