WorldWideScience

Sample records for defense warfare domain

  1. Information Warfare in the Cyber Domain

    National Research Council Canada - National Science Library

    Takemoto, Glenn

    2001-01-01

    ...). This paper lays a foundation by defining the terminology associated with Information Warfare in the Cyber Domain, reviews the threat and illustrates the vulnerabilities of our information systems...

  2. Electronic Warfare: Comprehensive Strategy Needed for Suppressing Enemy Air Defenses

    National Research Council Canada - National Science Library

    2001-01-01

    .... To achieve this suppression, the services use specialized aircraft designed to neutralize, destroy, or temporarily degrade enemy air defense systems through either physical attack or electronic warfare...

  3. Simulating cyber warfare and cyber defenses: information value considerations

    Science.gov (United States)

    Stytz, Martin R.; Banks, Sheila B.

    2011-06-01

    Simulating cyber warfare is critical to the preparation of decision-makers for the challenges posed by cyber attacks. Simulation is the only means we have to prepare decision-makers for the inevitable cyber attacks upon the information they will need for decision-making and to develop cyber warfare strategies and tactics. Currently, there is no theory regarding the strategies that should be used to achieve objectives in offensive or defensive cyber warfare, and cyber warfare occurs too rarely to use real-world experience to develop effective strategies. To simulate cyber warfare by affecting the information used for decision-making, we modify the information content of the rings that are compromised during in a decision-making context. The number of rings affected and value of the information that is altered (i.e., the closeness of the ring to the center) is determined by the expertise of the decision-maker and the learning outcome(s) for the simulation exercise. We determine which information rings are compromised using the probability that the simulated cyber defenses that protect each ring can be compromised. These probabilities are based upon prior cyber attack activity in the simulation exercise as well as similar real-world cyber attacks. To determine which information in a compromised "ring" to alter, the simulation environment maintains a record of the cyber attacks that have succeeded in the simulation environment as well as the decision-making context. These two pieces of information are used to compute an estimate of the likelihood that the cyber attack can alter, destroy, or falsify each piece of information in a compromised ring. The unpredictability of information alteration in our approach adds greater realism to the cyber event. This paper suggests a new technique that can be used for cyber warfare simulation, the ring approach for modeling context-dependent information value, and our means for considering information value when assigning cyber

  4. Ending the Debate: Unconventional Warfare, Foreign Internal Defense, and Why Words Matter

    National Research Council Canada - National Science Library

    Jones, D

    2006-01-01

    There is an ongoing debate within the Special Forces community whether unconventional warfare and foreign internal defense are applicable in the contemporary and future Special Operations environments...

  5. United States Coast Guard Antisubmarine Warfare (ASW) in the Maritime Defense Zone (MDZ) - A Strategic Approach

    Science.gov (United States)

    1989-03-01

    RIC ILE COPY AIR WAR COLLGE REEAC R~pCR UNITED STATES COAST GUARD ANTISUBMARINE WARFARE (ASW) IN THE MARITIME DEFENSE ZONE (MDZ) -A STRATEGIC...going to perform in these MDZs. Those tasks identified so far include: port and coastal physical security & preventive safety, mine warfare

  6. Information Warfare: Issues Associated with the Defense of DOD Computers and Computer Networks

    National Research Council Canada - National Science Library

    Franklin, Derek

    2002-01-01

    ... that may threaten the critical information pathways of the armed forces An analysis of the history of computer information warfare reveals that there was an embarrassing lack of readiness and defense...

  7. Chemical and biological warfare. Should defenses be researched and deployed?

    Science.gov (United States)

    Orient, J M

    1989-08-04

    The threat of chemical and biological weapons of mass destruction has intensified because of improved delivery systems and advances in chemistry, genetics, and other sciences. Possible US responses to this threat include deterrence, defenses, and/or disarmament, including a reaffirmation of the Biological and Toxin Weapons Convention of 1972, which is now in jeopardy. This article discusses the history of chemical and biological warfare, existing and potential weapons, the proliferation of weapons and delivery systems, ways to prevent the use of these weapons, and ways to protect populations from their effects.

  8. Intelligence Strategy for Fourth Generation Warfare

    National Research Council Canada - National Science Library

    Jamison, Edward P

    2006-01-01

    ...." They have named this new era of war "fourth generation warfare." Currently the Department of Defense's intelligence strategy is designed to defeat conventional adversaries vise a fourth generation warfare opponent...

  9. Cyber warfare building the scientific foundation

    CERN Document Server

    Jajodia, Sushil; Subrahmanian, VS; Swarup, Vipin; Wang, Cliff

    2015-01-01

    This book features a wide spectrum of the latest computer science research relating to cyber warfare, including military and policy dimensions. It is the first book to explore the scientific foundation of cyber warfare and features research from the areas of artificial intelligence, game theory, programming languages, graph theory and more. The high-level approach and emphasis on scientific rigor provides insights on ways to improve cyber warfare defense worldwide. Cyber Warfare: Building the Scientific Foundation targets researchers and practitioners working in cyber security, especially gove

  10. Toward Multi-Domain Battle: Combined Arms Precedents to Inform Today’s Joint Force

    Science.gov (United States)

    2017-03-31

    physical and abstract] domains ... the electromagnetic spectrum [ EMS ], the information environment, and the cognitive dimension of warfare.”8 The...of war. Americans brought about several technical and operational innovations that supported the strategic bombing campaign. Combined-Systems...defense, strategic bombing , and amphibious warfare as examples of “combined-systems revolutions.”’8 Each of these innovations took decades to develop

  11. Cyber Warfare/Cyber Terrorism

    National Research Council Canada - National Science Library

    O'Hara, Timothy

    2004-01-01

    .... Section 1 concludes with a review of offensive and defensive cyber warfare concepts. Section 2 presents a general overview of cyber terrorism, including definitions of cyber terrorism and cyber terrorism support...

  12. The Relationship between Defense Patterns and DSM-5 Maladaptive Personality Domains

    Science.gov (United States)

    Granieri, Antonella; La Marca, Luana; Mannino, Giuseppe; Giunta, Serena; Guglielmucci, Fanny; Schimmenti, Adriano

    2017-01-01

    Aim: Research has extensively examined the relationship between defense mechanisms (DM) and personality traits. However, no study to date has explored if specific defenses (alone or in combination) are able to predict dysfunctional variants of personality domains, as conceived in the alternative DSM-5 model for personality disorders. This study aimed to investigate the relationship between DMs and DSM-5 maladaptive personality domains among adults. Materials and Methods: Three hundred and twenty-eight adults aged between 18 and 64 years old completed measures on DMs and maladapive personality domains. Regression analyses were performed to determine which DMs predicted the maladaptive personality domains of negative affectivity, detachment, antagonism, disinhibition, and psychoticism. Results: According to psychoanalytic literature, results showed that immature defenses positively predicted maladaptive personality domain scores, whereas mature defenses were generally related with better personality functioning. Moreover, different defense patterns emerged as significant predictors of the maladaptive personality domains comprised in the alternative DSM-5 model for personality disorder. Discussion: Our findings support the view that defense patterns represent core components of personality and its disorders, and suggest that an increased use of immature defenses and a reduced use of mature defenses have a negative impact on the development of personality. PMID:29163301

  13. Rethinking Defensive Information Warfare

    National Research Council Canada - National Science Library

    French, Geoffrey S

    2004-01-01

    .... This paper examines defensive tactics and strategies from the German defense in depth that emerged from World War I to the American Active Defense that developed in the Cold War and proposes a new mindset for DIW that draws on these operational concepts from military history.

  14. On the Probability of Predicting and Mapping Traditional Warfare Measurements to the Cyber Warfare Domain

    CSIR Research Space (South Africa)

    Grobler, M

    2014-07-01

    Full Text Available Cyber warfare is a contentious topic, with no agreement on whether this is a real possibility or an unrealistic extension of the physical battlefield. This article will not debate the validity and legality of the concept of cyber warfare...

  15. Insurgent Uprising: An Unconventional Warfare Wargame

    Science.gov (United States)

    2017-12-01

    Cleveland, Charles T. Connett, and Will Irwin. “Unconventional Warfare in the Gray Zone.” Joint Forces Quarterly 80, no. 1 (2016). Work, Robert O...CODE 13. ABSTRACT (maximum 200 words) Today, and in the future, unconventional solutions will present U.S. policymakers with options for dealing...training objectives and will complement existing training exercises. 14. SUBJECT TERMS unconventional warfare, foreign internal defense, direct

  16. The Defense Science Board 2001 Summer Study on Defense Science and Technology

    Science.gov (United States)

    2002-05-01

    HIT” The threat of biological weapons arises in part from a decades-old megatrend in the life sciences. New advances in molecular biology, genetics...99 The Technology Landscape Today.................................... 101 Biological Warfare Defense...planning and programming, today’s environment comprises a broader, more diffuse set of concerns: terrorism, biological warfare, regional tensions

  17. The Impacts of Modern Warfare on Freshwater Ecosystems

    Science.gov (United States)

    Francis, Robert A.

    2011-11-01

    There is increasing recognition and concern regarding the impacts of modern industrial warfare on the environment. Freshwater ecosystems are perhaps the most vulnerable to warfare-related impacts, which is of concern given that they provide so many essential environmental resources and services to society. Despite this, there has been little work to establish and quantify the types of impacts (both negative and positive) that warfare may have on such systems. This paper firstly highlights why rivers and lakes may be susceptible to warfare-related impacts, before synthesizing the available literature to explore the following main themes: intensification of wartime resource acquisition, use of water as an offensive or defensive weapon, direct and indirect effects of explosive ordnance, increased pollution, introduction of invasive alien species, and positive ecological impacts. This is then followed by a discussion of the implications of such impacts in relation to future warfare, including a consideration of the efficacy of existing legal instruments to protect the environment during conflict, and the trend for war to become more localized and `informal', and therefore less regulated. Finally, the paper identifies key research foci for understanding and mitigating the effects of warfare on freshwater ecosystems.

  18. Rethinking Defensive Information Warfare

    Science.gov (United States)

    2004-06-01

    Countless studies, however, have demonstrated the weakness in this system.15 The tension between easily remembered passwords and suffi...vulnerabilities Undiscovered flaws The patch model for Internet security has failed spectacularly. Caida , 2004 Signature-Based Defense Anti virus, intrusion

  19. Information Warfare: Defining the Legal Response to An Attack

    National Research Council Canada - National Science Library

    Pottorff, James

    1999-01-01

    This paper discusses the difficulty in determining whether an information warfare attack, such as a computer virus, can be treated as an "armed attack" for purposes of national defense under the United Nations charter. As the U.S...

  20. Operational advantages of using Cyber Electronic Warfare (CEW) in the battlefield

    Science.gov (United States)

    Yasar, Nurgul; Yasar, Fatih M.; Topcu, Yucel

    2012-06-01

    While cyberspace is emerging as a new battlefield, conventional Electronic Warfare (EW) methods and applications are likely to change. Cyber Electronic Warfare (CEW) concept which merges cyberspace capabilities with traditional EW methods, is a new and enhanced form of the electronic attack. In this study, cyberspace domain of the battlefield is emphazised and the feasibility of integrating Cyber Warfare (CW) concept into EW measures is researched. The SWOT (Strengths, Weaknesses, Opportunities and Threats) analysis method is used to state the operational advantages of using CEW concept in the battlefield. The operational advantages of CEW are assessed by means of its effects on adversary air defense systems, communication networks and information systems. Outstanding technological and operational difficulties are pointed out as well. As a result, a comparison of CEW concept and conventional EW applications is presented. It is concluded that, utilization of CEW concept is feasible at the battlefield and it may yield important operational advantages. Even though the computers of developed military systems are less complex than normal computers, they are not subjected to cyber threats since they are closed systems. This concept intends to show that these closed systems are also open to the cyber threats. As a result of the SWOT analysis, CEW concept provides Air Forces to be used in cyber operations effectively. On the other hand, since its Collateral Damage Criteria (CDC) is low, the usage of cyber electronic attack systems seems to grow up.

  1. Discussion of the Necessity of Psychological Warfare Education in National Defense Education in Universities%试论普通高校国防教育中开展心理战教育的必要性

    Institute of Scientific and Technical Information of China (English)

    巴文娟

    2012-01-01

    现代心理战的战略地位对普通高校的国防教育提出了新的要求,必须将心理战教育纳入国防教育的内容体系之中,这是信息化时代的要求、国家心理安全的要求.也是大学生自身特性的要求,由此,才能使国防教育更好地为国家安全服务。%The strategic position of modern psychological warfare defense for college education put forward new demands, psychological warfare must be the content of education in national defense education system, is the requirement of the information age mental state security, and also the requirements of the students" characteristics, so that we can make education better serve the defense of national security.

  2. Active Computer Network Defense: An Assessment

    Science.gov (United States)

    2001-04-01

    sufficient base of knowledge in information technology can be assumed to be working on some form of computer network warfare, even if only defensive in...the Defense Information Infrastructure (DII) to attack. Transmission Control Protocol/ Internet Protocol (TCP/IP) networks are inherently resistant to...aims to create this part of information superiority, and computer network defense is one of its fundamental components. Most of these efforts center

  3. SiGe-based re-engineering of electronic warfare subsystems

    CERN Document Server

    Lambrechts, Wynand

    2017-01-01

    This book equips readers with a thorough understanding of the applicability of new-generation silicon-germanium (SiGe) electronic subsystems for the military purposes of electronic warfare and defensive countermeasures. The theoretical and technical background is extensively explained and all aspects of the integration of SiGe as an enabling technology for maritime, land, and airborne (including space) electronic warfare are addressed, including research, design, development, and implementation. The coverage is supported by mathematical derivations, informative illustrations, practical examples, and case studies. While SiGe technology provides speed, performance, and price advantages in many markets, sharing of information on its use in electronic warfare systems has to date been limited, especially in developing nations. This book will therefore be warmly welcomed as an engineering guideline that focuses especially on the speed and reliability of current-generation SiGe circuits and highlights emerging innov...

  4. Technologies for distributed defense

    Science.gov (United States)

    Seiders, Barbara; Rybka, Anthony

    2002-07-01

    For Americans, the nature of warfare changed on September 11, 2001. Our national security henceforth will require distributed defense. One extreme of distributed defense is represented by fully deployed military troops responding to a threat from a hostile nation state. At the other extreme is a country of 'citizen soldiers', with families and communities securing their common defense through heightened awareness, engagement as good neighbors, and local support of and cooperation with local law enforcement, emergency and health care providers. Technologies - for information exploitation, biological agent detection, health care surveillance, and security - will be critical to ensuring success in distributed defense.

  5. Nondestructive inspection of chemical warfare based on API-TOF

    International Nuclear Information System (INIS)

    Wang Xinhua; Zheng Pu; He Tie; An Li; Yang Jie; Fan Yu

    2013-01-01

    Background: Real-time, fast, accurate, nondestructive inspection (NDI) and quantitative analysis for chemical warfare are very imperative for chemical defense, anti-terror and nation security. Purpose: Associated Particles Technique (APT)/Neutron Time of Flight (TOF) has been developed for non-invasive inspection of sealed containers with chemical warfare agents. Methods: A prototype equipment for chemical warfare is consisted of an APT neutron generator with a 3×3 matrix of semiconductor detectors of associated alpha-particles, the shielding protection of neutron and gamma-ray, arrayed NaI(Tl)-based detectors of gamma-rays, fully-digital data acquisition electronics, data analysis, decision-making software, support platform and remote control system. Inelastic scattering gamma-ray pulse height spectra of sarin, VX, mustard gas and adamsite induced by 14-MeV neutron are measured. The energies of these gamma rays are used to identify the inelastic scattering elements, and the intensities of the peaks at these energies are used to reveal their concentrations. Results: The characteristic peaks of inelastic scattering gamma-ray pulse height spectra show that the prototype equipment can fast and accurately inspect chemical warfare. Conclusion: The equipment can be used to detect not only chemical warfare agents but also other hazardous materials, such as chemical/toxic/drug materials, if their chemical composition is in any way different from that of the surrounding materials. (authors)

  6. Nano/micromotors for security/defense applications. A review

    Science.gov (United States)

    Singh, Virendra V.; Wang, Joseph

    2015-11-01

    The new capabilities of man-made micro/nanomotors open up considerable opportunities for diverse security and defense applications. This review highlights new micromotor-based strategies for enhanced security monitoring and detoxification of chemical and biological warfare agents (CBWA). The movement of receptor-functionalized nanomotors offers great potential for sensing and isolating target bio-threats from complex samples. New mobile reactive materials based on zeolite or activated carbon offer considerable promise for the accelerated removal of chemical warfare agents. A wide range of proof-of-concept motor-based approaches, including the detection and destruction of anthrax spores, `on-off' nerve-agent detection or effective neutralization of chemical warfare agents have thus been demonstrated. The propulsion of micromotors and their corresponding bubble tails impart significant mixing that greatly accelerates such detoxification processes. These nanomotors will thus empower sensing and destruction where stirring large quantities of decontaminating reagents and controlled mechanical agitation are impossible or undesired. New technological breakthroughs and greater sophistication of micro/nanoscale machines will lead to rapid translation of the micromotor research activity into practical defense applications, addressing the escalating threat of CBWA.

  7. Littoral Combat Ship Open Ocean Anti-Submarine Warfare

    Science.gov (United States)

    2014-06-01

    maintain stealth and its defense in order to properly conduct an attack on a surface vessel (Sternhell and Thorndike 2014, 102). This statement...its target, the surface combatants can counter by increasing their speed (Sternhell and Thorndike 2014). While the maximum speed of the current...120316_PS.pdf Sternhell, Charles M, and Alan M Thorndike . 2014. “Antisubmarine Warfare in World War II.” CNA Analysis & Solutions. Accessed April 14, 2014

  8. Hybrid Maritime Warfare

    DEFF Research Database (Denmark)

    Schaub Jr, Gary John; Murphy, Martin; Hoffman, Frank

    2017-01-01

    Russia’s use of hybrid warfare techniques has raised concerns about the security of the Baltic States. Gary Schaub, Jr, Martin Murphy and Frank G Hoffman recommend a series of measures to augment NATO’s Readiness Action Plan in the Baltic region, including increasing the breadth and depth of naval...... exercises, and improving maritime domain awareness through cooperative programmes. They also suggest unilateral and cooperative measures to develop a sound strategic communications strategy to counter Moscow’s information operations, reduce dependence on Russian energy supplies and build the resilience...

  9. Cyber warfare and electronic warfare integration in the operational environment of the future: cyber electronic warfare

    Science.gov (United States)

    Askin, Osman; Irmak, Riza; Avsever, Mustafa

    2015-05-01

    For the states with advanced technology, effective use of electronic warfare and cyber warfare will be the main determining factor of winning a war in the future's operational environment. The developed states will be able to finalize the struggles they have entered with a minimum of human casualties and minimum cost thanks to high-tech. Considering the increasing number of world economic problems, the development of human rights and humanitarian law it is easy to understand the importance of minimum cost and minimum loss of human. In this paper, cyber warfare and electronic warfare concepts are examined in conjunction with the historical development and the relationship between them is explained. Finally, assessments were carried out about the use of cyber electronic warfare in the coming years.

  10. Defense Transformation: Background and Oversight Issues for Congress

    National Research Council Canada - National Science Library

    O'Rourke, Ronald

    2004-01-01

    .... The Administration's vision for defense transformation calls for shifting the U.S. military toward a greater reliance on joint operations, network-centric warfare, effects-based operations, speed and agility, and precision application of firepower...

  11. Defense Base Closure and Realignment Budget Data for the Naval Surface Warfare Center

    National Research Council Canada - National Science Library

    1993-01-01

    ... and realignment military construction projects. This report provides the results of the audit related to the realignment of Naval Surface Warfare Centers elements in White Oak, Maryland, and Panama City, Florida, to Dahlgren, Virginia...

  12. An Open Architecture Framework for Electronic Warfare Based Approach to HLA Federate Development

    Directory of Open Access Journals (Sweden)

    HyunSeo Kang

    2018-01-01

    Full Text Available A variety of electronic warfare models are developed in the Electronic Warfare Research Center. An Open Architecture Framework for Electronic Warfare (OAFEw has been developed for reusability of various object models participating in the electronic warfare simulation and for extensibility of the electronic warfare simulator. OAFEw is a kind of component-based software (SW lifecycle management support framework. This OAFEw is defined by six components and ten rules. The purpose of this study is to construct a Distributed Simulation Interface Model, according to the rules of OAFEw, and create Use Case Model of OAFEw Reference Conceptual Model version 1.0. This is embodied in the OAFEw-FOM (Federate Object Model for High-Level Architecture (HLA based distributed simulation. Therefore, we design and implement EW real-time distributed simulation that can work with a model in C++ and MATLAB API (Application Programming Interface. In addition, OAFEw-FOM, electronic component model, and scenario of the electronic warfare domain were designed through simple scenarios for verification, and real-time distributed simulation between C++ and MATLAB was performed through OAFEw-Distributed Simulation Interface.

  13. Recent Advances in Decontamination of Chemical Warfare Agents

    OpenAIRE

    Abdul Wadood Khan; Sabna Kotta; Shahid Husain Ansari; Javed Ali; Rakesh Kumar Sharma

    2013-01-01

    The recent turmoil and volatile situation in many countries and the increased risk of terrorist activities have raised alarm bells for the field of defense against toxic chemical/materials. These situations poses threats to society as terrorists can take advantage of such situations to strike and cause public mayhem. A number of chemicals have the potential of being used as chemical warfare (CW) agents. CW agents could immediately kill or incapacitate the affected individuals even when they a...

  14. Stuxnet and Cyber-Warfare (1/2)

    CERN Multimedia

    CERN. Geneva

    2016-01-01

    The first part of the lecture is devoted to the description of the Stuxnet worm, the first cyber-weapon whose existence has been made public, discovered in 2010 and targeting a specific industrial control system; the worm is responsible for the damaging of many centrifuges at an uranium enrichment facility, with the goal of sabotaging Iran's nuclear program. In the second part, the main features of cyber-warfare in conflict and pre-conflict activities will be discussed and compared to the conventional warfare domains, with also a general view at the international political debate on this topic. Check the http://pugwash.org web site, an organisation that seeks a world free of nuclear weapons and other weapons of mass destruction.   NB! All Academic Training lectures are recorded and are publicly available. There is no live webcast.

  15. Axial Vircator for Electronic Warfare Applications

    Directory of Open Access Journals (Sweden)

    L. Drazan

    2009-12-01

    Full Text Available This paper deals with a high power microwave generator with virtual cathode – vircator in axial release for electronic warfare applications. The classification of directed energy weapons microwave (DEWM is introduced together with basic block diagrams of a particular class of DEWM. In the paper, methods for designing vircator pulsed power supply, axial vircator structure, measurement methods and experimental results are presented. The vircator in electromagnetic ammunition is powered by magneto-cumulative generator and in weapons for defense of objects (WDO, it is powered by Marx generator. The possible applications of a vircator in the DEWM area are discussed.

  16. UML modelling of network warfare examples

    CSIR Research Space (South Africa)

    Veerasamy, N

    2011-08-01

    Full Text Available ] Affects both civilian and military domains [8] [9] Related to the concepts of infowar, information operations, hacking, hackivism, cyberterrorism and cybotage depending on motivations and techniques [10] Encompasses both technological solutions...]. In addition, Williers as well as Qingbao and Anwar discuss more offensive aspects of information security and Network Warfare like Hacking, Vulnerability Injection, Network Attacks, Denial of Capability, Interception and Blockage [6] [18] [19]. Various...

  17. Health-related quality of life of chemical warfare victims: an assessment with the use of a specific tool.

    Science.gov (United States)

    Biat Saeed, Khaled; Parandeh, Akram; Alhani, Fatemeh; Salaree, Mohammad Mehdi

    2014-02-01

    Exposure to chemical warfare gases significantly changes the quality of life (QoL) of victims and has significant chronic adverse effects. This study sought to assess the health-related QoL (HRQoL) of chemical victims by means of a tool specifically designed for this purpose. The correlation of their QoL with several demographic factors was evaluated as well. In this descriptive cross-sectional study, 120 chemical warfare victims were selected from subjects presenting to selected medical centers in Tehran in 2012 using convenience sampling. Two questionnaires of demographic information and HRQoL of chemical warfare victims (specific tool) were used for data collection. The data were analyzed using SPSS version 20 software (IBM, Armonk, NY, USA). The mean and standard deviation (mean ± SD) of scores obtained by chemical warfare victims in physical, psychosocial and spiritual domains was 39.6 ± 16.5, 42.1 ± 15.2 and 82.4 ± 15.4, respectively. Different age groups showed a significant difference in the psychosocial domain score (P chemical warfare victims, it can be used as strategically for these patients to help them cope with their injury and improve their physical and psychosocial health and QoL.

  18. Stuxnet and Cyber-Warfare (2/2)

    CERN Multimedia

    CERN. Geneva

    2016-01-01

    The first part of the lecture is devoted to the description of the Stuxnet worm, the first cyber-weapon whose existence has been made public, discovered in 2010 and targeting a specific industrial control system; the worm is responsible for the damaging of many centrifuges at an uranium enrichment facility, with the goal of sabotaging Iran's nuclear program. In the second part, the main features of cyber-warfare in conflict and pre-conflict activities will be discussed and compared to the conventional warfare domains, with also a general view at the international political debate on this topic.   Check the http://pugwash.org web site, an organisation that seeks a world free of nuclear weapons and other weapons of mass destruction. The lecturer invites comments via email to Gian.Piero.Siroli@cern.ch NB! All Academic Training lectures are recorded and are publicly available. There is no live webcast.

  19. Preparing South Africa for cyber crime and cyber defense

    CSIR Research Space (South Africa)

    Grobler, M

    2013-01-01

    Full Text Available revolution on cybercrime and cyber defense in a developing country and will evaluate the relevant South African legislation. It will also look at the influence of cyber defense on the international position of the South African Government. South Africa... legislation and a lack of cyber defense mechanisms. As a starting point, cyber warfare for the purpose of this article is defined as the use of exploits in cyber space as a way to intentionally cause harm to people, assets or economies (Owen 2008). It can...

  20. The United States and biological warfare: secrets from the early cold war and Korea.

    Science.gov (United States)

    Bruwer, A

    2001-01-01

    The United States and Biological Warfare is about accusations that the United States resorted to bacteriological warfare at a time of great military stress during the Korean War. In December 1951, the then US Secretary of Defense ordered early readiness for offensive use of biological weapons. Soon afterwards, the North Korean and Chinese armies accused the United States of starting a large-scale biological warfare experiment in Korea. The US State Department denied the accusation. Both parties to the dispute maintain their positions today. The authors spent 20 years researching the accusations in North America, Europe and Japan. They were the first foreigners to be given access to Chinese classified documents. The reader is also introduced to the concept of 'plausible denial', an official US policy which allowed responsible governmental representatives to deny knowledge of certain events. The authors hope that their work will contribute to the understanding of a time when modern war expanded into a new type of violence.

  1. Computer Network Defense and Attack: Information Warfare in the Department of Defense

    National Research Council Canada - National Science Library

    Best, Carole

    2001-01-01

    .... This paper will discuss current computer network defense and attack policy in the context of ends, ways and means, explain what is lacking in current policy and offer recommendations for improvement...

  2. Biological warfare agents

    Directory of Open Access Journals (Sweden)

    Duraipandian Thavaselvam

    2010-01-01

    Full Text Available The recent bioterrorist attacks using anthrax spores have emphasized the need to detect and decontaminate critical facilities in the shortest possible time. There has been a remarkable progress in the detection, protection and decontamination of biological warfare agents as many instrumentation platforms and detection methodologies are developed and commissioned. Even then the threat of biological warfare agents and their use in bioterrorist attacks still remain a leading cause of global concern. Furthermore in the past decade there have been threats due to the emerging new diseases and also the re-emergence of old diseases and development of antimicrobial resistance and spread to new geographical regions. The preparedness against these agents need complete knowledge about the disease, better research and training facilities, diagnostic facilities and improved public health system. This review on the biological warfare agents will provide information on the biological warfare agents, their mode of transmission and spread and also the detection systems available to detect them. In addition the current information on the availability of commercially available and developing technologies against biological warfare agents has also been discussed. The risk that arise due to the use of these agents in warfare or bioterrorism related scenario can be mitigated with the availability of improved detection technologies.

  3. Biological warfare agents

    Science.gov (United States)

    Thavaselvam, Duraipandian; Vijayaraghavan, Rajagopalan

    2010-01-01

    The recent bioterrorist attacks using anthrax spores have emphasized the need to detect and decontaminate critical facilities in the shortest possible time. There has been a remarkable progress in the detection, protection and decontamination of biological warfare agents as many instrumentation platforms and detection methodologies are developed and commissioned. Even then the threat of biological warfare agents and their use in bioterrorist attacks still remain a leading cause of global concern. Furthermore in the past decade there have been threats due to the emerging new diseases and also the re-emergence of old diseases and development of antimicrobial resistance and spread to new geographical regions. The preparedness against these agents need complete knowledge about the disease, better research and training facilities, diagnostic facilities and improved public health system. This review on the biological warfare agents will provide information on the biological warfare agents, their mode of transmission and spread and also the detection systems available to detect them. In addition the current information on the availability of commercially available and developing technologies against biological warfare agents has also been discussed. The risk that arise due to the use of these agents in warfare or bioterrorism related scenario can be mitigated with the availability of improved detection technologies. PMID:21829313

  4. Governing Warfare

    DEFF Research Database (Denmark)

    Harste, Gorm

      It would seem as though warfare has gotten out of control, not only in Iraq and Afghanistan, but also in Central Africa. The paper outlines the strategic history of politically controlled warfare since the early Enlightenment. The argument is that control is implausible. The idea of control has...

  5. Defensive repertoire of Drosophila larvae in response to toxic fungi

    NARCIS (Netherlands)

    Trienens, Monika; Kraaijeveld, Ken; Wertheim, Bregje

    2017-01-01

    Chemical warfare including insecticidal secondary metabolites is a well-known strategy for environmental microbes to monopolize a food source. Insects in turn have evolved behavioural and physiological defences to eradicate or neutralize the harmful microorganisms. We studied the defensive

  6. Air Warfare and Air Base Defense 1914-1973

    Science.gov (United States)

    1988-01-01

    338 X Conclusion ............................................. 343 A ppendices ...military operations. During the battle of Stalingrad, however, the need for a more focussed defense became acute . Between November 19, 1942, when the

  7. Policy implications of the Strategic Defense Initiative

    International Nuclear Information System (INIS)

    Goodwin, R.C.

    1991-01-01

    Specific topics include: the technological feasibility of proposed components and architectures; the compatibility of the proposed systems with existing and proposed arms control agreements, with special emphasis upon the ABM Treaty, Outer Space Treaty, the Defense and Space Treaty, and the START Treaty; the compatibility of proposed systems with classical warfare doctrine and the four modern strategic nuclear doctrines of Massive Retaliation, Assured Destruction, Countervailing and Flexible Response; the economics of strategic defense including an assessment of overall governmental spending, of the suballocation for defense, and of the feasibility of defensive systems which are cost-effective at the margin; and, in summary, an assessment of the New Strategic Concept which balances arms control, offensive forces, and defensive forces. This study falls within the realm of defense policy analysis in that it attempts to determine whether the administration's proposed Strategic Defense Initiative, as well as the long-term strategic defensive systems derived from SDI research, constitute efficient, desirable allocation of scarce government resources - especially in a period of seemingly relaxed superpower tensions and numerous demands upon those resources

  8. Defining cyber warfare

    Directory of Open Access Journals (Sweden)

    Dragan D. Mladenović

    2012-04-01

    Full Text Available Cyber conflicts represent a new kind of warfare that is technologically developing very rapidly. Such development results in more frequent and more intensive cyber attacks undertaken by states against adversary targets, with a wide range of diverse operations, from information operations to physical destruction of targets. Nevertheless, cyber warfare is waged through the application of the same means, techniques and methods as those used in cyber criminal, terrorism and intelligence activities. Moreover, it has a very specific nature that enables states to covertly initiate attacks against their adversaries. The starting point in defining doctrines, procedures and standards in the area of cyber warfare is determining its true nature. In this paper, a contribution to this effort was made through the analysis of the existing state doctrines and international practice in the area of cyber warfare towards the determination of its nationally acceptable definition.

  9. Immunohistopathology in the Guinea Pig Following Chronic Low-Level Exposure to Chemical Warfare Agents

    Science.gov (United States)

    2005-11-01

    U.S. Army Medical Research Institute of Chemical Defense USAMRICD-TR-05-09 Immunohistopathology in the Guinea Pig Following Chronic Low...2005 2. REPORT TYPE Technical Report 3. DATES COVERED (From - To) May 2003 to April 2005 4. TITLE AND SUBTITLE Immunohistopathology in the Guinea Pig Following...release; distribution unlimited 13. SUPPLEMENTARY NOTES 14. ABSTRACT Guinea pigs exposed repeatedly to low levels of chemical warfare nerve agents

  10. CARF and WYL domains: ligand-binding regulators of prokaryotic defense systems

    Directory of Open Access Journals (Sweden)

    Kira eMakarova

    2014-04-01

    Full Text Available CRISPR-Cas adaptive immunity systems of bacteria and archaea insert fragments of virus or plasmid DNA as spacer sequences into CRISPR repeat loci. Processed transcripts encompassing these spacers guide the cleavage of the cognate foreign DNA or RNA. Most CRISPR-Cas loci, in addition to recognized cas genes, also include genes that are not directly implicated in spacer acquisition, CRISPR transcript processing or interference. Here we comprehensively analyze sequences, structures and genomic neighborhoods of one of the most widespread groups of such genes that encode proteins containing a predicted nucleotide-binding domain with a Rossmann-like fold, which we denote CARF (CRISPR-associated Rossmann fold. Several CARF protein structures have been determined but functional characterization of these proteins is lacking. The CARF domain is most frequently combined with a C-terminal winged helix-turn-helix DNA-binding domain and effector domains most of which are predicted to possess DNase or RNase activity. Divergent CARF domains are also found in RtcR proteins, sigma-54 dependent regulators of the rtc RNA repair operon. CARF genes frequently co-occur with those coding for proteins containing the WYL domain with the Sm-like SH3 β-barrel fold, which is also predicted to bind ligands. CRISPR-Cas and possibly other defense systems are predicted to be transcriptionally regulated by multiple ligand-binding proteins containing WYL and CARF domains which sense modified nucleotides and nucleotide derivatives generated during virus infection. We hypothesize that CARF domains also transmit the signal from the bound ligand to the fused effector domains which attack either alien or self nucleic acids, resulting, respectively, in immunity complementing the CRISPR-Cas action or in dormancy/programmed cell death.

  11. Cyber Warfare/Cyber Terrorism

    National Research Council Canada - National Science Library

    O'Hara, Timothy

    2004-01-01

    Section 1 of this paper provides an overview of cyber warfare as an element of information warfare, starting with the general background of the current strategic environment the United States is operating...

  12. The Story of the Defense Technical Information Center 1945 - 1995, 50 Years of Information for Defense

    Science.gov (United States)

    1995-07-01

    necessary. As John Naisbitt observed in his 1982 book Megatrends , ...with the coming of the infor- mation society, we have for the first time an economy...information in the hands of many. —John Naisbitt Megatrends As the Defense Technical Information Center moves forward into the last decade of the...Gulf War, for example, Iraq’s leader, Saddam Hussein, threatened to use biological or biochemical warfare. To defend against this threat, the U.S

  13. COP21: defense stakes

    International Nuclear Information System (INIS)

    Coldefy, Alain; Hulot, Nicolas; Aichi, Leila; Tertrais, Bruno; Paillard, Christophe-Alexandre; Piodi, Jerome; Regnier, Serge; Volpi, Jean-Luc; Descleves, Emmanuel; Garcin, Thierry; Granholm, Niklas; Wedin, Lars; Pouvreau, Ana; Henninger, Laurent

    2015-01-01

    The 21. Conference of the Parties (COP21) from the UN Framework Convention took place in Paris between November 30 and December 11, 2015. The challenge is to reach a universal agreement of fight against global warming and to control the carbon footprint of human activities. This topic is in the core of the Defense Ministry preoccupations. This special dossier takes stock of the question of defense issues linked with global warming. The dossier comprises 13 papers dealing with: 1 - COP21: defense stakes (Coldefy, A.); 2 - Warfare climate, a chance for peace (Hulot, N.); 3 - COP21 and defense (Aichi, L.); 4 - A war climate? (Tertrais, B.); 5 - Challenges the World has to face in the 21. century (Paillard, C.A.); 6 - Desertification: a time bomb in the heart of Sahel (Piodi, J.); 7 - The infrastructure department of defense in the fight against climate disturbance (Regnier, S.); 8 - Fight against global warming, a chance for the forces? (Volpi, J.L.); 9 - Sea and sustainable development (Descleves, E.); 10 - Rationales of Arctic's surrounding powers (Garcin, T.); 11 - Arctic: strategic stake (Granholm, N.; Wedin, L.); 12 - Strategic impact of Turkey's new energy choices (Pouvreau, A.); 13 - Climate and war: a brief historical outlook (Henninger, L.)

  14. Chemical warfare agents.

    Science.gov (United States)

    Kuca, Kamil; Pohanka, Miroslav

    2010-01-01

    Chemical warfare agents are compounds of different chemical structures. Simple molecules such as chlorine as well as complex structures such as ricin belong to this group. Nerve agents, vesicants, incapacitating agents, blood agents, lung-damaging agents, riot-control agents and several toxins are among chemical warfare agents. Although the use of these compounds is strictly prohibited, the possible misuse by terrorist groups is a reality nowadays. Owing to this fact, knowledge of the basic properties of these substances is of a high importance. This chapter briefly introduces the separate groups of chemical warfare agents together with their members and the potential therapy that should be applied in case someone is intoxicated by these agents.

  15. Maneuver from the Air Domain

    Science.gov (United States)

    2016-05-26

    Overload From the previous discussion, cognitive maneuver seeks to degrade the enemy’s capacity for...in all domains, the ability to maneuver from the air domain in the cognitive sense, comes primarily from air power’s unique ability to overload the... cognitive maneuver mechanisms developed in the 1980s as part of broader maneuver warfare theory. The result is a proposed definition of maneuver from

  16. The Information Warfare Life Cycle Model

    Directory of Open Access Journals (Sweden)

    Brett van Niekerk

    2011-11-01

    Full Text Available Information warfare (IW is a dynamic and developing concept, which constitutes a number of disciplines. This paper aims to develop a life cycle model for information warfare that is applicable to all of the constituent disciplines. The model aims to be scalable and applicable to civilian and military incidents where information warfare tactics are employed. Existing information warfare models are discussed, and a new model is developed from the common aspects of these existing models. The proposed model is then applied to a variety of incidents to test its applicability and scalability. The proposed model is shown to be applicable to multiple disciplines of information warfare and is scalable, thus meeting the objectives of the model.

  17. The Information Warfare Life Cycle Model

    Directory of Open Access Journals (Sweden)

    Brett van Niekerk

    2011-03-01

    Full Text Available Information warfare (IW is a dynamic and developing concept, which constitutes a number of disciplines. This paper aims to develop a life cycle model for information warfare that is applicable to all of the constituent disciplines. The model aims to be scalable and applicable to civilian and military incidents where information warfare tactics are employed. Existing information warfare models are discussed, and a new model is developed from the common aspects of these existing models. The proposed model is then applied to a variety of incidents to test its applicability and scalability. The proposed model is shown to be applicable to multiple disciplines of information warfare and is scalable, thus meeting the objectives of the model.

  18. A review of multi-threat medical countermeasures against chemical warfare and terrorism.

    Science.gov (United States)

    Cowan, Fred M; Broomfield, Clarence A; Stojiljkovic, Milos P; Smith, William J

    2004-11-01

    The Multi-Threat Medical Countermeasure (MTMC) hypothesis has been proposed with the aim of developing a single countermeasure drug with efficacy against different pathologies caused by multiple classes of chemical warfare agents. Although sites and mechanisms of action and the pathologies caused by different chemical insults vary, common biochemical signaling pathways, molecular mediators, and cellular processes provide targets for MTMC drugs. This article will review the MTMC hypothesis for blister and nerve agents and will expand the scope of the concept to include other chemicals as well as briefly consider biological agents. The article will also consider how common biochemical signaling pathways, molecular mediators, and cellular processes that contribute to clinical pathologies and syndromes may relate to the toxicity of threat agents. Discovery of MTMC provides the opportunity for the integration of diverse researchers and clinicians, and for the exploitation of cutting-edge technologies and drug discovery. The broad-spectrum nature of MTMC can augment military and civil defense to combat chemical warfare and chemical terrorism.

  19. Defense program pushes microchip frontiers

    Science.gov (United States)

    Julian, K.

    1985-05-01

    The very-high-speed integrated circuit (VHSIC) program of the Department of Defense will have a significant effect on the expansion of integrated circuit technology. This program, which is to cost several hundred million dollars, is accelerating the trend toward higher-speed, denser circuitry for microchips through innovative design and fabrication techniques. Teams in six different American companies are to design and fabricate a military useful 'brassboard' system which would employ chips developed in the first phase of the VHSIC program. Military objectives envisaged include automatic monitoring of displays in tactical aircraft by means of an artificial intelligence system, a brassboard used in airborne electronic warfare system, and antisubmarine warfare applications. After a fivefold improvement in performance achieved in the first phase, the second phase is concerned with a further 20-fold increase. The entire VHSIC program is, therefore, to produce a 100-fold gain over the state of the art found when the program started.

  20. Information warfare technologies in political discourse

    Directory of Open Access Journals (Sweden)

    Karpova Anna Yu.

    2016-01-01

    Full Text Available We attempt to examine the technology of «information warfare» in this paper. The dominant theme of the paper is that the outcome of the information warfare is important not only for the future of a state itself but for the future of the world balance of forces. The main task of geopolitical actors in information warfare is to introduce ideas corresponding to their interests into mass consciousness. All participants of political conflicts have common features in technologies of Information warfare. The information anomie is the indicator of the great geopolitical actors’ personified interests on the stage of «information warfare» - the process resulted in destroying the communicative line: report-information understanding and disrupting the social order in society. In this paper authors describe the following Information Warfare technologies: "Political volcano" technology; "SPIN" technology; "Widening media resource" technology; "specific gravity" technology; "Cold War 2.0" technology and Information cleaningup technology. It is assumed that in the future there will be new instructions on applying technologies of information warfare. To impart perspective to the paper we consider examples, opinions and trends.

  1. Difficult Decisions: Chemical Warfare.

    Science.gov (United States)

    Slesnick, Irwin L.; Miller, John A.

    1988-01-01

    Gives the background history and chemistry of modern day chemical warfare from World War I to the present. Provides discussion questions to stimulate deeper thinking on the issue. Contains a discussion activity called "Can New Chemical Weapons Lead to Humane Warfare?" (CW)

  2. The Use of Air Power for Maritime Homeland Defense

    Science.gov (United States)

    2006-12-01

    available from http://www.odci.gov/ nic /PDF_GIF_global/globaltrend2015.pdf (accessed 17 March 2006). 25 Some argue terrorists would have difficulty acquiring...for the 181 For a discussion of the Afghanistan campaign, see Stephen Biddle , Afghanistan and the...78 Biddle , Stephen. Afghanistan and the Future of Warfare: Implications for Army and Defense Policy. Carlisle Barracks, Pennsylvania: U.S. Army

  3. Information Warfare and Ethics

    Directory of Open Access Journals (Sweden)

    M.J. Warren

    2001-05-01

    Full Text Available This paper examines the ethics of the practice of information warfare at both the national and corporate levels. Initially examining the present and past actions of individual hackers, it moves to the more organised, future military and economic warfare scenarios. It examines the lack of legal or policy initiatives in this area.

  4. MEANS AND METHODS OF CYBER WARFARE

    Directory of Open Access Journals (Sweden)

    Dan-Iulian VOITAȘEC

    2016-06-01

    Full Text Available According to the Declaration of Saint Petersburg of 1868 “the only legitimate object which States should endeavor to accomplish during war is to weaken the military forces of the enemy”. Thus, International Humanitarian Law prohibits or limits the use of certain means and methods of warfare. The rapid development of technology has led to the emergence of a new dimension of warfare. The cyber aspect of armed conflict has led to the development of new means and methods of warfare. The purpose of this paper is to study how the norms of international humanitarian law apply to the means and methods of cyber warfare.

  5. 2008 13th Expeditionary Warfare Conference

    Science.gov (United States)

    2008-10-23

    platforms – Emphasize a mixed fleet approach that spans the “iron triangle” – Integrate MRAP into the fleet mix – Transition to a fleet of tactical...Urban Warfare Mountain Warfare Desert Warfare Jungle Riverine Special Skills Recon LOG CSS ENG MT HS Ord Maint EOD Pers Retrival ...Detection (Specialized Platform FLGPR)Stand-off (60M) Scaleable Neutralization (Area coverage) ABV Delivery Ground Cueing Stand-off (800M) Scaleable

  6. The ethics of information warfare

    CERN Document Server

    Floridi, Luciano

    2014-01-01

    This book offers an overview of the ethical problems posed by Information Warfare, and of the different approaches and methods used to solve them, in order to provide the reader with a better grasp of the ethical conundrums posed by this new form of warfare.The volume is divided into three parts, each comprising four chapters. The first part focuses on issues pertaining to the concept of Information Warfare and the clarifications that need to be made in order to address its ethical implications. The second part collects contributions focusing on Just War Theory and its application to the case of Information Warfare. The third part adopts alternative approaches to Just War Theory for analysing the ethical implications of this phenomenon. Finally, an afterword by Neelie Kroes - Vice President of the European Commission and European Digital Agenda Commissioner - concludes the volume. Her contribution describes the interests and commitments of the European Digital Agenda with respect to research for the developme...

  7. Chemical warfare agents

    Directory of Open Access Journals (Sweden)

    Vijayaraghavan R

    2010-01-01

    Full Text Available Among the Weapons of Mass Destruction, chemical warfare (CW is probably one of the most brutal created by mankind in comparison with biological and nuclear warfare. Chemical weapons are inexpensive and are relatively easy to produce, even by small terrorist groups, to create mass casualties with small quantities. The characteristics of various CW agents, general information relevant to current physical as well as medical protection methods, detection equipment available and decontamination techniques are discussed in this review article. A brief note on Chemical Weapons Convention is also provided.

  8. Chemical warfare agents

    Science.gov (United States)

    Ganesan, K.; Raza, S. K.; Vijayaraghavan, R.

    2010-01-01

    Among the Weapons of Mass Destruction, chemical warfare (CW) is probably one of the most brutal created by mankind in comparison with biological and nuclear warfare. Chemical weapons are inexpensive and are relatively easy to produce, even by small terrorist groups, to create mass casualties with small quantities. The characteristics of various CW agents, general information relevant to current physical as well as medical protection methods, detection equipment available and decontamination techniques are discussed in this review article. A brief note on Chemical Weapons Convention is also provided. PMID:21829312

  9. Mongol Warfare in the Pre-Dissolution Period »

    Directory of Open Access Journals (Sweden)

    Timothy May

    2015-01-01

    Full Text Available Although the Mongols used many of the tactics and strategies that steppe nomads had used for centuries, the Mongols refined steppe warfare so that this style of warfare reached its apogee during the Mongol Empire. Furthermore, the Mongols developed a style of warfare that made them possibly the greatest military force in history. This work examines several facets of the pre-dissolution period (1200–1260. With the dissolution of the Mongol Empire, Mongol warfare once again changed. In some areas it remained complex while in others it regressed to traditional forces of steppe warfare, still potent but not as effective as the pre-dissolution period.

  10. Simulation-based planning for theater air warfare

    Science.gov (United States)

    Popken, Douglas A.; Cox, Louis A., Jr.

    2004-08-01

    Planning for Theatre Air Warfare can be represented as a hierarchy of decisions. At the top level, surviving airframes must be assigned to roles (e.g., Air Defense, Counter Air, Close Air Support, and AAF Suppression) in each time period in response to changing enemy air defense capabilities, remaining targets, and roles of opposing aircraft. At the middle level, aircraft are allocated to specific targets to support their assigned roles. At the lowest level, routing and engagement decisions are made for individual missions. The decisions at each level form a set of time-sequenced Courses of Action taken by opposing forces. This paper introduces a set of simulation-based optimization heuristics operating within this planning hierarchy to optimize allocations of aircraft. The algorithms estimate distributions for stochastic outcomes of the pairs of Red/Blue decisions. Rather than using traditional stochastic dynamic programming to determine optimal strategies, we use an innovative combination of heuristics, simulation-optimization, and mathematical programming. Blue decisions are guided by a stochastic hill-climbing search algorithm while Red decisions are found by optimizing over a continuous representation of the decision space. Stochastic outcomes are then provided by fast, Lanchester-type attrition simulations. This paper summarizes preliminary results from top and middle level models.

  11. Reactivity of Dual-Use Decontaminants with Chemical Warfare Agents

    Science.gov (United States)

    2016-07-01

    REACTIVITY OF DUAL-USE DECONTAMINANTS WITH CHEMICAL WARFARE AGENTS ECBC-TR-1384... Decontaminants with Chemical Warfare Agents 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER 6. AUTHOR(S) Willis, Matthew P...extraction) of chemical warfare agents from materials. 15. SUBJECT TERMS GD HD Decontamination Hazard mitigation VX Chemical warfare agent Liquid-phase

  12. Psychological effects of nuclear warfare

    International Nuclear Information System (INIS)

    Mickley, G.A.

    1987-01-01

    This report is divided into five parts. (1) Discussion of the psychological milieu before a nuclear confrontation. (2) Acute psychological reactions to nuclear warfare (some of which may reflect, in part, direct radiogenic alteration of nervous system functions). (3) Chronic psychological effects of a nuclear confrontation. (4) Issues concerning treatment of these psychological changes. (5) Prevention of adverse psychological reactions to nuclear warfare

  13. Information operation/information warfare modeling and simulation

    OpenAIRE

    Buettner, Raymond

    2000-01-01

    Information Operations have always been a part of warfare. However, this aspect of warfare is having ever-greater importance as forces rely more and more on information as an enabler. Modern information systems make possible very rapid creation, distribution, and utilization of information. These same systems have vulnerabilities that can be exploited by enemy forces. Information force-on-force is important and complex. New tools and procedures are needed for this warfare arena. As these t...

  14. Hybrid Warfare: Preparing for Future Conflict

    Science.gov (United States)

    2015-02-17

    ciceromagazine.com/?s=getting+behind+hybrid+warfare. Brown , Col Leslie F. “Twenty-First Century Warfare Will be Hybrid.” Carlisle Barracks, PA...Lebanon and Gaza.” Rand Corporation Occasional Paper. Santa Monica, CA: Rand Corporation, 2010. Jones, Gareth and Darya Korsunskaya. “U.S., EU

  15. Cyber Defense Exercises and their Role in Cyber Warfare

    OpenAIRE

    Bogdan Alexandru Bratosin

    2014-01-01

    The threat of cyber-attacks is increasing with the access to PC’s and Internet of a larger number of people around the world. Although the Internet provides a large number of advantages, it can also be used as a cyber-weapon in order to serve the interests of counties, political and economic groups or individual. The cyber-attacks of today are capable to disable the manufacturing of nuclear bombs of a country. Thus, there is an increasing demand for IT security specialists. Cyber-defense exer...

  16. Cyber Attacks, Information Attacks, and Postmodern Warfare

    Directory of Open Access Journals (Sweden)

    Valuch Jozef

    2017-06-01

    Full Text Available The aim of this paper is to evaluate and differentiate between the phenomena of cyberwarfare and information warfare, as manifestations of what we perceive as postmodern warfare. We describe and analyse the current examples of the use the postmodern warfare and the reactions of states and international bodies to these phenomena. The subject matter of this paper is the relationship between new types of postmodern conflicts and the law of armed conflicts (law of war. Based on ICJ case law, it is clear that under current legal rules of international law of war, cyber attacks as well as information attacks (often performed in the cyberspace as well can only be perceived as “war” if executed in addition to classical kinetic warfare, which is often not the case. In most cases perceived “only” as a non-linear warfare (postmodern conflict, this practice nevertheless must be condemned as conduct contrary to the principles of international law and (possibly a crime under national laws, unless this type of conduct will be recognized by the international community as a “war” proper, in its new, postmodern sense.

  17. China's Use of Cyber Warfare: Espionage Meets Strategic Deterrence

    Directory of Open Access Journals (Sweden)

    Magnus Hjortdal

    2011-01-01

    Full Text Available This article presents three reasons for states to use cyber warfare and shows that cyberspace is—and will continue to be—a decisive element in China's strategy to ascend in the international system. The three reasons are: deterrence through infiltration of critical infrastructure; military technological espionage to gain military knowledge; and industrial espionage to gain economic advantage. China has a greater interest in using cyberspace offensively than other actors, such as the United States, since it has more to gain from spying on and deterring the United States than the other way around. The article also documents China's progress in cyber warfare and shows how it works as an extension of its traditional strategic thinking and the current debate within the country. Several examples of cyber attacks traceable to China are also presented. This includes cyber intrusions on a nuclear arms laboratory, attacks on defense ministries (including the Joint Strike Fighter and an airbase and the U.S. electric grid, as well as the current Google affair, which has proved to be a small part of a broader attack that also targeted the U.S. Government. There are, however, certain constraints that qualify the image of China as an aggressive actor in cyberspace. Some believe that China itself is the victim of just as many attacks from other states. Furthermore, certain actors in the United States and the West have an interest in overestimating China's capabilities in cyberspace in order to maintain their budgets.

  18. Militias: Exploring Alternative Force Structures for National Defense

    Science.gov (United States)

    2014-06-01

    development in the art of warfare and 15 Mario A. Fumerton, “Rondas Campesinas in the Peruvian Civil War: Peasant Self-defense Organizations in...tr ai ni ng N at io na l l ev el su pp or t N at io na l d riv en id eo lo gy Pr e- ex is tin g ci vi lia n sk ill s Primary category...national framework providing guidance for the militia groups to act. This variable varies within and across cases, and will be discussed further

  19. Defensive repertoire of Drosophila larvae in response to toxic fungi.

    Science.gov (United States)

    Trienens, Monika; Kraaijeveld, Ken; Wertheim, Bregje

    2017-10-01

    Chemical warfare including insecticidal secondary metabolites is a well-known strategy for environmental microbes to monopolize a food source. Insects in turn have evolved behavioural and physiological defences to eradicate or neutralize the harmful microorganisms. We studied the defensive repertoire of insects in this interference competition by combining behavioural and developmental assays with whole-transcriptome time-series analysis. Confrontation with the toxic filamentous fungus Aspergillus nidulans severely reduced the survival of Drosophila melanogaster larvae. Nonetheless, the larvae did not behaviourally avoid the fungus, but aggregated at it. Confrontation with fungi strongly affected larval gene expression, including many genes involved in detoxification (e.g., CYP, GST and UGT genes) and the formation of the insect cuticle (e.g., Tweedle genes). The most strongly upregulated genes were several members of the insect-specific gene family Osiris, and CHK-kinase-like domains were over-represented. Immune responses were not activated, reflecting the competitive rather than pathogenic nature of the antagonistic interaction. While internal microbes are widely acknowledged as important, our study emphasizes the underappreciated role of environmental microbes as fierce competitors. © 2017 John Wiley & Sons Ltd.

  20. Changing the face of cyber warfare with international cyber defense collaboration

    CSIR Research Space (South Africa)

    Grobler, M

    2011-03-01

    Full Text Available . The result is that many countries are not properly prepared, nor adequately protected by legislation, in the event of a cyber attack on a national level. This article will address the international cyber defense collaboration problem by looking at the impact...

  1. Anti-Air Warfare Research for Naval Forces

    NARCIS (Netherlands)

    Bloemen, A.A.F.; Witberg, R.

    2000-01-01

    AAW is a warfare area with wide-spread spectrum. Command and Control Systems, sensors, effectors and electronic warfare are integrated to a system, they influence each other and must eventually be effective in coordinated action. This complexity asks for Operations Research methods to measure

  2. Russian New Art of Hybrid Warfare in Ukraine

    Directory of Open Access Journals (Sweden)

    Rusnáková Soňa

    2017-10-01

    Full Text Available The main aim of this paper is to analyse the annexation of Crimea by the Russian Federation. For the purposes of the paper, the theory of hybrid warfare was chosen as an analytical category. Throughout the paper, the concept of hybrid warfare is examined and applied on case study of Crimean annexation. Hybrid warfare, especially in connection with Russian actions in Crimea has been an intensely debated concept. There is an ongoing debate among scholars concerning the meaning of the concept, its existence and employment by the Russian Federation. This paper showed that the article of Valeriy Gerasimov – the incumbent Chief of the General Staff of the Russian Federation-invoked a new warfare strategy for the Russian Federation which was consequently for the very first time in its full spectre and effectivity employed on case of Crimean annexation in March 2014. Observing the application of the hybrid warfare in practice serves the purposes of countering its further potential application in post-Soviet space and Russian ‘near abroad’.

  3. Anxiety, depression, and posttraumatic stress in Iranian survivors of chemical warfare.

    Science.gov (United States)

    Hashemian, Farnoosh; Khoshnood, Kaveh; Desai, Mayur M; Falahati, Farahnaz; Kasl, Stanislav; Southwick, Steven

    2006-08-02

    In the 1980-1988 Iran-Iraq War, extensive use of chemical weapons resulted in high rates of morbidity and mortality. While much is known about the physical consequences of chemical warfare, there is a paucity of information about the long-term effects of chemical attacks on mental health. To assess the long-term psychological impact of chemical warfare on a civilian population. Cross-sectional randomized survey conducted in July 2004 of 153 civilians in 3 towns exposed to warfare in northwestern Iran: Oshnaviyeh (low-intensity conventional warfare), Rabat (high-intensity conventional warfare), and Sardasht (both high-intensity conventional warfare and chemical weapons). Full or partial posttraumatic stress disorder (PTSD) diagnosis, anxiety symptoms, and depressive symptoms were assessed using Farsi versions of the Clinician-Administered PTSD Scale, Hamilton Scale for Anxiety, and Beck Depression Inventory, respectively. Overall participation rate was 93%. Respondents had a mean age of 45 years and were all of Kurdish ethnicity. Among individuals exposed to both high-intensity warfare and chemical weapons, prevalence rates for lifetime PTSD, current PTSD, major anxiety symptoms, and severe depressive symptoms were 59%, 33%, 65%, and 41%, respectively. Among the low-intensity warfare group, the corresponding rates were 8%, 2%, 18%, and 6%, respectively, while intermediate rates were found among those exposed to high-intensity warfare but not to chemical weapons (31%, 8%, 26%, and 12%, respectively). Compared with individuals exposed to low-intensity warfare, those exposed to both high-intensity warfare and chemical weapons were at higher risk for lifetime PTSD (odds ratio [OR], 18.6; 95% confidence interval [CI], 5.8-59.4), current PTSD (OR, 27.4; 95% CI, 3.4-218.2), increased anxiety symptoms (OR, 14.6; 95% CI, 6.0-35.6), and increased depressive symptoms (OR, 7.2; 95% CI, 3.3-15.9). Exposure to high-intensity warfare but not to chemical weapons was also

  4. Air defense planning for an area with the use of very short range air defense sets

    Directory of Open Access Journals (Sweden)

    Tadeusz Pietkiewicz

    2017-12-01

    Full Text Available This paper presents a heuristic method of planning the deployment of very short-range anti-air missile and artillery sets (VSHORAD around an area (‘protected area’ in order to protect it. A function dependent on the distance between the earliest feasible points of destroying targets and the centre of the protected area was taken as an objective function. This is a different indicator from those commonly used in the literature, and based on the likelihood of a defense zone penetration by means of an air attack (MAA: the kill probability of the MAA and the probability of area losses. The model constraints resulted directly from the restrictions imposed by real air defense systems and the nature of the area being defended. This paper assumes that the VSHORAD system operates as a part of a general, superordinate air defense command and control system based on the idea of network-centric warfare, which provides the VSHORAD system with a recognized air picture, air defense plans, and combat mission specifications. The presented method has been implemented. The final part of the paper presents the computational results. Keywords: optimal planning, air defense system, area installation protection, deployment of very short range anti-air missile and artillery sets (VSHORAD

  5. Using Agent Based Distillation to Explore Issues Related to Asymmetric Warfare

    Science.gov (United States)

    2009-10-01

    official definition of asymmetric warfare , considering that its use was redundant to irregular warfare [30]. 2 Such as the Lanchester Equations...RTP-MP-MSG-069 23 - 1 Using Agent Based Distillation to Explore Issues Related to Asymmetric Warfare Martin Adelantado, Jean-Michel Mathé...shows that both conventional and asymmetric warfare are characterised by nonlinear behaviours and that engagement is a Complex Adaptive System (CAS

  6. A Predictive Model of Surface Warfare Officer Retention: Factors Affecting Turnover

    National Research Council Canada - National Science Library

    Gjurich, Gregory

    1999-01-01

    Junior Surface Warfare Officer retention is in a crisis. The Surface Warfare Officer community anticipates an inability to fill Department Head billets due to the number of junior Surface Warfare Officers leaving military service...

  7. Hybrid Warfare Studies and Russia’s Example in Crimea

    Directory of Open Access Journals (Sweden)

    Mehmet Seyfettin EROL

    2015-12-01

    Full Text Available Although Hybrid Warfare is an old concept, theoretical studies in the western countries mainly began in the post-Col War era, focusing on asymmetrical threats against conventional superiority of western countries such as USA or Israel. September 11th attacks and 2006 Israel-Lebanon war played important roles for the evolution of hybrid warfare theories. However, there has not any consensus among scholars on a exact or unique definition of hybrid warfare. Hybrid warfare became one of the main security issues for the West and especially for NATO after the Russia-Ukraine crisis. Russian military strategies, called “hybrid warfare” by the western countries, resulted in the successful annexation of Crimea and, caused a serious security problem for the West resulting important structural and functional changes for the military system of NATO. Russian activities, which have been based on surprise, ambiguity and deniability, presented a unique example for hybrid warfare studies.

  8. Dilemmas of Warfare in Densely Populated Civilian Areas

    OpenAIRE

    Moshe Tamir

    2012-01-01

    This essay attempts to present operational perspectives on conducting warfare in densely populated areas. It also distinguishes between three types of combat within this general category, with the goal of shedding light on this complex type of warfare.

  9. Flying Electronic Warfare Laboratory

    Data.gov (United States)

    Federal Laboratory Consortium — FUNCTION: Provides NP-3D aircraft host platforms for Effectiveness of Navy Electronic Warfare Systems (ENEWS) Program antiship missile (ASM) seeker simulators used...

  10. Redefining Hybrid Warfare: Russia's Non-linear War against the West

    Directory of Open Access Journals (Sweden)

    Tad Schnaufer

    2017-03-01

    Full Text Available The term hybrid warfare fails to properly describe Russian operations in Ukraine and elsewhere. Russia has undertaken unconventional techniques to build its influence and test the boundaries of a shaken international system. Notably, Russia’s actions in Ukraine display an evolved style of warfare that goes beyond its initial label of hybrid warfare. The term non-linear war (NLW will be defined in this article to encompass Russia’s actions and allow policymakers the correct framework to discuss and respond to Russia. NLW plays to the advantage of countries like Russia and constitute the future of warfare.

  11. Route survey periodicity for mine warfare

    OpenAIRE

    Coke, Hartwell F.

    2009-01-01

    Approved for public release, distribution unlimited One of the Navy's most long standing challenges has been conquering the mine warfare threat. As mines and mine warfare techniques evolve and become more sophisticated, so does the United States' ability to counter the threat. The United States newest technique for countering a potential mined harbor, or route, is a process known as "change detection." This concept uses previous side scan sonar images of the area prior to a mining event an...

  12. ISIL's Hybrid Warfare in Syria & Iraq

    DEFF Research Database (Denmark)

    Sørensen, Heine

    2016-01-01

    of and ability to synchronize various instruments of power with a view to achieving their end-state. With regards to the second part of the problem statement, the analysis demonstrates how ISIL employed horizontal escalation and ambiguity initially, but later on turned to vertical escalation, within the military......The case study specifically seeks to answer the following problem statement: Does ISIL qualify as an actor using hybrid warfare and if so what characterizes their particular use of this type of warfare? Based on an analysis of ISIL’s warfare from August 2012 to August 2016 the chapter argues......, that it is possible to answer the first part of the problem statement in an affirmative way. Hence, ISIL is not only theoretically prone to hybridity by organizational setup, and by the people comprising the organization, but has in fact continuously acted according to a hybrid logic in its prioritization...

  13. The ethics of drone warfare

    Directory of Open Access Journals (Sweden)

    Fatić Aleksandar

    2017-01-01

    Full Text Available The paper investigates the compatibility of the modern technologies of warfare, specifically the use of offensive drones, with traditional military ethics and suggests that the new technologies radically change the value system of the military in ways which make large parts of the traditional military ethics inapplicable. The author suggests that Agamben’s concept of ‘effectivity’ through ‘special actions’ which mark one’s belonging to a particular community or profession is a useful conceptual strategy to explore the compatibility of drone warfare with traditional military ethics; this strategy shows mixed results at best.

  14. Unconventional Cyber Warfare: Cyber Opportunities in Unconventional Warfare

    Science.gov (United States)

    2014-06-01

    Internet service provider IW irregular warfare MCO major combat operations MySQL open-source relational database management system NATO North...today, often with no regard for legal or ethical constraints. A better course of action would be to conduct operations in cyberspace within the precepts...built in feature of MySQL that 97 John Markoff, “Before the Gunfire, Cyberattacks,” York Times, August 13, 2008, sec. Technology, 1, http

  15. Survey on Urban Warfare Augmented Reality

    Directory of Open Access Journals (Sweden)

    Xiong You

    2018-01-01

    Full Text Available Urban warfare has become one of the main forms of modern combat in the twenty-first century. The main reason why urban warfare results in hundreds of casualties is that the situational information of the combatant is insufficient. Accessing information via an Augmented Reality system can elevate combatants’ situational awareness to effectively improve the efficiency of decision-making and reduce the injuries. This paper begins with the concept of Urban Warfare Augmented Reality (UWAR and illuminates the objectives of developing UWAR, i.e., transparent battlefield, intuitional perception and natural interaction. Real-time outdoor registration, information presentation and natural interaction are presented as key technologies of a practical UWAR system. Then, the history and current research state of these technologies are summarized and their future developments are highlighted from three perspectives, i.e., (1 Better integration with Geographic Information System and Virtual Geographic Environment; (2 More intelligent software; (3 More powerful hardware.

  16. Expeditionary Warfare- Force Protection

    National Research Council Canada - National Science Library

    Higgins, Eric

    2004-01-01

    In 2003, the Systems Engineering and Analysis students were tasked to develop a system of systems conceptual solution to provide force protection for the Sea Base conceptualized in the 2002 Expeditionary Warfare study...

  17. The Impact of Irregular Warfare on the US Army

    National Research Council Canada - National Science Library

    McDonald, III, Roger L

    2006-01-01

    Although the U.S. Army has yet to clearly define irregular warfare, it is imperative that the Army take near-term action to enhance the ability of Soldiers and units to operate effectively in an irregular warfare environment...

  18. Numerical simulation of RCS for carrier electronic warfare airplanes

    Directory of Open Access Journals (Sweden)

    Yue Kuizhi

    2015-04-01

    Full Text Available This paper studies the radar cross section (RCS of carrier electronic warfare airplanes. Under the typical naval operations section, the mathematical model of the radar wave’s pitch angle incidence range analysis is established. Based on the CATIA software, considering dynamic deflections of duck wing leading edge flaps, flaperons, horizontal tail, and rudder, as well as aircraft with air-to-air missile, anti-radiation missile, electronic jamming pod, and other weapons, the 3D models of carrier electronic warfare airplanes Model A and Model B with weapons were established. Based on the physical optics method and the equivalent electromagnetic flow method, by the use of the RCSAnsys software, the characteristics of carrier electronic warfare airplanes’ RCS under steady and dynamic flights were simulated under the UHF, X, and S radar bands. This paper researches the detection probability of aircraft by radars under the condition of electronic warfare, and completes the mathematical statistical analysis of the simulation results. The results show that: The Model A of carrier electronic warfare airplane is better than Model B on stealth performance and on discover probability by radar detection effectively.

  19. Information Warfare: Issues Associated with the Defense of DOD Computers and Computer Networks

    National Research Council Canada - National Science Library

    Franklin, Derek

    2002-01-01

    The threat to the Defense Information Infrastructure is growing Hackers have advanced in sophistication and the potential exists for an alliance of independent hackers and terrorist/criminal groups...

  20. Electronic Warfare Signature Measurement Facility

    Data.gov (United States)

    Federal Laboratory Consortium — The Electronic Warfare Signature Measurement Facility contains specialized mobile spectral, radiometric, and imaging measurement systems to characterize ultraviolet,...

  1. The doctor and nuclear warfare

    International Nuclear Information System (INIS)

    Anon.

    1982-01-01

    At the 34th World Medical Assembly in Lisbon in 1981 the World Medical Association adopted a motion proposed by the American Medical Association that national medical associations should develop programs to educate the civilian population on the medical consequences of nuclear war. This article discusses the attitude the medical professions should have, should nuclear warfare in some form confront them in the future. The conclusion is drawn that defence against nuclear warfare is only a part of civil defence against any disaster, including the natural disasters such as flood and fire and the man-made disasters of transport accidents, even of problems at nuclear plants designed to supply energy

  2. Information Warfare-Worthy Jamming Attack Detection Mechanism for Wireless Sensor Networks Using a Fuzzy Inference System

    Directory of Open Access Journals (Sweden)

    Sudip Misra

    2010-04-01

    Full Text Available The proposed mechanism for jamming attack detection for wireless sensor networks is novel in three respects: firstly, it upgrades the jammer to include versatile military jammers; secondly, it graduates from the existing node-centric detection system to the network-centric system making it robust and economical at the nodes, and thirdly, it tackles the problem through fuzzy inference system, as the decision regarding intensity of jamming is seldom crisp. The system with its high robustness, ability to grade nodes with jamming indices, and its true-detection rate as high as 99.8%, is worthy of consideration for information warfare defense purposes.

  3. WAR TERMINATION IN SOMALIA AND KENYA DEFENSE FORCES’ (KDF ROLE

    Directory of Open Access Journals (Sweden)

    E.O.S. ODHIAMBO

    2013-01-01

    Full Text Available War causes and conduct have fascinated war planners, war executors and scholars for a long time because little attention has been given to how wars are ended. This oversight is apparent not only in historical accounts of warfare but, more importantly, in contemporary analyses and doctrinal formulations of deterrence and overall defense policies. Just as historians have focused on how wars begin and are fought, military analysts and planners have concentrated on influencing the initiation and conduct of warfare rather than on analyzing the process and requirements for terminating warfare on acceptable terms and at acceptable costs. Conflict termination is the formal end of fighting, not the end of conflict. Despite the volumes of research and literature on the subject, belligerents mismanage war termination. The major objective of wartime strategy is defeating enemy arms as quickly as possible with the least cost in friendly casualties. As long as hostilities endure, diplomacy is subordinated to military requirements. War termination planning, as it is currently accomplished, takes the form of civil affair planning on the details of how the vanquished will be managed following the capitulation of the enemy and cessation of hostilities. We argue that Kenya Defence Forces (KDF prudently terminated its war with the terrorists group Al-Shabaab that merged with Al-Qaeda when they agreed to be integrated into the African Union Mission for Somalia (AMISOM which is backed up by the United Nations.

  4. Chemical profiling of chemical warfare agents for forensic purposes

    NARCIS (Netherlands)

    Noort, D.; Reuver, L.P.J. de; Fidder, A.; Tromp, M.; Verschraagen, M.

    2010-01-01

    A program has been initiated towards the chemical profiling of chemical warfare agents, in order to support forensic investigations towards synthesis routes, production sites and suspect chemical suppliers. Within the first stage of the project various chemical warfare agents (VX, sulfur mustard,

  5. Surface Warfare Officers Initial Training For Future Success

    Science.gov (United States)

    2018-03-01

    9 A school is initial rating specific technical training that is given to sailors. 14 Figure 4. Less...NAVAL POSTGRADUATE SCHOOL MONTEREY, CALIFORNIA MBA PROFESSIONAL REPORT SURFACE WARFARE OFFICERS— INITIAL TRAINING FOR FUTURE SUCCESS March 2018...professional report 4. TITLE AND SUBTITLE SURFACE WARFARE OFFICERS—INITIAL TRAINING FOR FUTURE SUCCESS 5. FUNDING NUMBERS 6. AUTHOR(S) Arron J

  6. Information Warfare and International Law

    National Research Council Canada - National Science Library

    Greenberg, Lawrence T; Goodman, Seymour E; Soo Hoo, Kevin J

    1998-01-01

    .... Some legal constraints will certainly apply to information warfare, either because the constraints explicitly regulate particular actions, or because more general principles of international law...

  7. Nuclear, biological and chemical warfare. Part I: Medical aspects of nuclear warfare.

    Science.gov (United States)

    Kasthuri, A S; Pradhan, A B; Dham, S K; Bhalla, I P; Paul, J S

    1990-04-01

    Casualties in earlier wars were due much more to diseases than to weapons. Mention has been made in history of the use of biological agents in warfare, to deny the enemy food and water and to cause disease. In the first world war chemical agents were used to cause mass casualties. Nuclear weapons were introduced in the second world war. Several countries are now involved in developing nuclear, biological and chemical weapon systems, for the mass annihilation of human beings, animals and plants, and to destroy the economy of their enemies. Recently, natural calamities and accidents in nuclear, chemical and biological laboratories and industries have caused mass instantaneous deaths in civilian population. The effects of future wars will not be restricted to uniformed persons. It is time that physicians become aware of the destructive potential of these weapons. Awareness, immediate protective measures and first aid will save a large number of persons. This series of articles will outline the medical aspects of nuclear, biological and chemical weapon systems in three parts. Part I will deal with the biological effects of a nuclear explosion. The short and long term effects due to blast, heat and associated radiation are highlighted. In Part II, the role of biological agents which cause commoner or new disease patterns is mentioned. Some of the accidents from biological warfare laboratories are a testimony to its potential deleterious effects. Part III deals with medical aspects of chemical warfare agents, which in view of their mass effects can overwhelm the existing medical resources, both civilian and military.(ABSTRACT TRUNCATED AT 250 WORDS)

  8. Defending Our Satellites: The Need for Electronic Warfare Education and Training

    Science.gov (United States)

    2015-12-01

    intercept Allied bombers attacking at night.9 As a result of the electronic warfare advantage that systems like Window and Airborne Cigar be- stowed...74 | Air & Space Power Journal Defending Our Satellites The Need for Electronic Warfare Education and Training Lt Col E. Lincoln Bonner, USAF...expanding education and training in the use of electronic warfare to defend US satellites and improve their survivability. The following discussion

  9. Implications of Network Centric Warfare

    National Research Council Canada - National Science Library

    Bailey, Alvin

    2004-01-01

    .... These areas of dependence also provide numerous vulnerabilities. This paper will focus specifically on Network Centric Warfare's vulnerabilities in terms of sensors cyberterrorism/ Electro-Magnetic Pulse (EMP...

  10. Distributed computing environment for Mine Warfare Command

    OpenAIRE

    Pritchard, Lane L.

    1993-01-01

    Approved for public release; distribution is unlimited. The Mine Warfare Command in Charleston, South Carolina has been converting its information systems architecture from a centralized mainframe based system to a decentralized network of personal computers over the past several years. This thesis analyzes the progress Of the evolution as of May of 1992. The building blocks of a distributed architecture are discussed in relation to the choices the Mine Warfare Command has made to date. Ar...

  11. The Cycle of Warfare - Analysis of an Analytical Model

    DEFF Research Database (Denmark)

    Jensen, Mikkel Storm

    2016-01-01

    by its economic, political and ideological characteristics. With the single assumption of economic rationality in human behaviour, Cycle of Warfare is not only coherent, it is applicable to all entities engaged in competition anywhere in the world at any point in history. The Cycle of Warfare can be used...

  12. Guiding Warfare to Reach Sustainable Peace

    DEFF Research Database (Denmark)

    Vestenskov, David; Drewes, Line

    The conference report Guiding Warfare to Reach Sustainable Peace constitutes the primary outcome of the conference It is based on excerpts from the conference presenters and workshop discussions. Furthermore, the report contains policy recommendations and key findings, with the ambition of develo......The conference report Guiding Warfare to Reach Sustainable Peace constitutes the primary outcome of the conference It is based on excerpts from the conference presenters and workshop discussions. Furthermore, the report contains policy recommendations and key findings, with the ambition...... of developing best practices in the education and implementation of IHL in capacity building of security forces....

  13. Lanchester-Type Models of Warfare, Volume II

    OpenAIRE

    Taylor, James G.

    1980-01-01

    This monograph is a comprehensive treatist on Lanchester-type models of warfare, i.e. differential-equation models of attrition in force-on-force combat operations. Its goal is to provide both an introduction to and current-state-of-the-art overview of Lanchester-type models of warfare as well as a comprehensive and unified in-depth treatment of them. Both deterministic as well as stochastic models are considered. Such models have been widely used in the United States and elsewhere for the...

  14. Hybrid Warfare: the 21st Century Russian Way of Warfare

    Science.gov (United States)

    2017-05-25

    to wage information operations— from television, to the Internet, to unconventional forces on the ground spreading the message word -of- mouth ...adversarial vulnerabilities. Many of the peculiarities of hybrid warfare described herein are inextricably linked to Russia’s social , political, and...the US election. Then they utilized various means of media to distribute that information with the goal to discredit the US political process and

  15. Attrition in Network Centric Warfare

    National Research Council Canada - National Science Library

    Erbetta, John

    2003-01-01

    .... Information warfare means that positive attacks on systems themselves compound the problem. Emerging technologies applicable to NCW as a force multiplier need to be recognized as counter to the impediments to progress...

  16. Biomaterials for mediation of chemical and biological warfare agents.

    Science.gov (United States)

    Russell, Alan J; Berberich, Jason A; Drevon, Geraldine F; Koepsel, Richard R

    2003-01-01

    Recent events have emphasized the threat from chemical and biological warfare agents. Within the efforts to counter this threat, the biocatalytic destruction and sensing of chemical and biological weapons has become an important area of focus. The specificity and high catalytic rates of biological catalysts make them appropriate for decommissioning nerve agent stockpiles, counteracting nerve agent attacks, and remediation of organophosphate spills. A number of materials have been prepared containing enzymes for the destruction of and protection against organophosphate nerve agents and biological warfare agents. This review discusses the major chemical and biological warfare agents, decontamination methods, and biomaterials that have potential for the preparation of decontamination wipes, gas filters, column packings, protective wear, and self-decontaminating paints and coatings.

  17. Towards a framework for a network warfare capability

    CSIR Research Space (South Africa)

    Veerasamy, N

    2008-07-01

    Full Text Available . These include the legal issues, ethical dilemmas, technical solutions, financial impact and skill/manpower investment. Logical constraints/implications have been grouped together in the discussion that follows. 5.1.1 Legal Ethical Issues As network warfare... but the underlying causes of crime also needs to be understood. Ethics and morals play a significant role in determining the personality traits of an individual. Users will need to balance ethical dilemmas before engaging in offensive network warfare. Computers...

  18. Chemical warfare agents. Classes and targets.

    Science.gov (United States)

    Schwenk, Michael

    2018-09-01

    Synthetic toxic chemicals (toxicants) and biological poisons (toxins) have been developed as chemical warfare agents in the last century. At the time of their initial consideration as chemical weapon, only restricted knowledge existed about their mechanisms of action. There exist two different types of acute toxic action: nonspecific cytotoxic mechanisms with multiple chemo-biological interactions versus specific mechanisms that tend to have just a single or a few target biomolecules. TRPV1- and TRPA-receptors are often involved as chemosensors that induce neurogenic inflammation. The present work briefly surveys classes and toxicologically relevant features of chemical warfare agents and describes mechanisms of toxic action. Copyright © 2017 Elsevier B.V. All rights reserved.

  19. Status of dental health in chemical warfare victims: the case of Isfahan, Iran.

    Science.gov (United States)

    Mottaghi, Ahmad; Hoseinzade, Abolfath; Zamani, Elham; Araghizade, Habib Allah

    2012-01-01

    Little evidence is available regarding the dental health of victims of chemical warfare in Iran. Therefore, in this study, we examined the decayed, missing, and filled teeth index (DMFT), community periodontal index of treatment needs (CPITN), and saliva secretion rate of chemical warfare victims living in the province of Isfahan in Iran. This case-control study was conducted with 300 chemical warfare victims as the treatment group and 300 age-matched individuals without exposure to chemical warfare as the control group. DMFT and CPITN indices and saliva secretion rate were measured and compared between the two groups. Chemical warfare victims had significantly higher scores than the control group for decayed teeth (4.25 ± 3.88 vs 3.52 ± 2.81; P=0.009), missing teeth (8.79 ± 9.3 vs 6.15 ± 8.43; Pwarfare victims was significantly lower than that in the control group (1.71 ± 0.05 vs 3.85 ± 1.95 cc/5 min; PChemical warfare victims have relatively poor dental/oral health. Chemical injury might cause a dysfunction in saliva secretion, with decrease in saliva secretion increasing the risk for tooth decay and periodontal disorders. Further research is required to find out the exact underlying mechanisms and the factors associated with poor dental/oral health in chemical warfare victims.

  20. Hybrid warfare of the USA in South America

    Directory of Open Access Journals (Sweden)

    A. V. Budaev

    2015-01-01

    Full Text Available Washington’s hybrid warfare in Latin American region differs by its inventive and sophisticated methods and in fact represents a complex and multidimensional phenomenon including symbiosis of the “soft” and “hard” power as well as their combination in the form of the “smart power”. The increasing importance of hybrid warfare technologies in the US foreign policy in Latin America predetermines the necessity of thorough studies and analysis of this phenomenon for providing Russian interests.

  1. A Review on Internet of Things for Defense and Public Safety

    Science.gov (United States)

    Fraga-Lamas, Paula; Fernández-Caramés, Tiago M.; Suárez-Albela, Manuel; Castedo, Luis; González-López, Miguel

    2016-01-01

    The Internet of Things (IoT) is undeniably transforming the way that organizations communicate and organize everyday businesses and industrial procedures. Its adoption has proven well suited for sectors that manage a large number of assets and coordinate complex and distributed processes. This survey analyzes the great potential for applying IoT technologies (i.e., data-driven applications or embedded automation and intelligent adaptive systems) to revolutionize modern warfare and provide benefits similar to those in industry. It identifies scenarios where Defense and Public Safety (PS) could leverage better commercial IoT capabilities to deliver greater survivability to the warfighter or first responders, while reducing costs and increasing operation efficiency and effectiveness. This article reviews the main tactical requirements and the architecture, examining gaps and shortcomings in existing IoT systems across the military field and mission-critical scenarios. The review characterizes the open challenges for a broad deployment and presents a research roadmap for enabling an affordable IoT for defense and PS. PMID:27782052

  2. Roots of Russian Irregular Warfare

    Science.gov (United States)

    2016-12-01

    PAGE INTENTIONALLY LEFT BLANK xiii ACKNOWLEDGMENTS Crissy, your encouragement throughout my career and especially during this project has been...all of the Russian disinformation techniques in Ukraine came directly “from Soviet toolkits .” Maria Snegovaya, “Putin’s Information Warfare In

  3. Biological warfare, bioterrorism, and biocrime

    NARCIS (Netherlands)

    Jansen, H. J.; Breeveld, F. J.; Stijnis, C.; Grobusch, M. P.

    2014-01-01

    Biological weapons achieve their intended target effects through the infectivity of disease-causing infectious agents. The ability to use biological agents in warfare is prohibited by the Biological and Toxin Weapon Convention. Bioterrorism is defined as the deliberate release of viruses, bacteria

  4. Enzymatic Decontamination of Chemical Warfare Agents

    National Research Council Canada - National Science Library

    Raushel, Frank

    2000-01-01

    The primary objective of this research program is the development of a versatile enzyme-based system that is fully optimized for the decontamination, destruction, and detection of know chemical warfare agents...

  5. The Utility of Freedom: A Principal-Agent Model for Unconventional Warfare

    Science.gov (United States)

    2011-06-01

    Lanchester Model of Guerrilla Warfare,‖ Operations Research 10, no. 6 (December 1962): 818–827; William A. Niskanen, ―Review: The Economics of Insurgency...http://galenet.galegroup.com/servlet/DDRS?locID=navalps. Deitchman, S. J. ―A Lanchester Model of Guerrilla Warfare.‖ Operations Research 10, no

  6. DCT-based cyber defense techniques

    Science.gov (United States)

    Amsalem, Yaron; Puzanov, Anton; Bedinerman, Anton; Kutcher, Maxim; Hadar, Ofer

    2015-09-01

    With the increasing popularity of video streaming services and multimedia sharing via social networks, there is a need to protect the multimedia from malicious use. An attacker may use steganography and watermarking techniques to embed malicious content, in order to attack the end user. Most of the attack algorithms are robust to basic image processing techniques such as filtering, compression, noise addition, etc. Hence, in this article two novel, real-time, defense techniques are proposed: Smart threshold and anomaly correction. Both techniques operate at the DCT domain, and are applicable for JPEG images and H.264 I-Frames. The defense performance was evaluated against a highly robust attack, and the perceptual quality degradation was measured by the well-known PSNR and SSIM quality assessment metrics. A set of defense techniques is suggested for improving the defense efficiency. For the most aggressive attack configuration, the combination of all the defense techniques results in 80% protection against cyber-attacks with PSNR of 25.74 db.

  7. Skeletal evidence for Inca warfare from the Cuzco region of Peru.

    Science.gov (United States)

    Andrushko, Valerie A; Torres, Elva C

    2011-11-01

    This article addresses the bioarchaeological evidence for Inca warfare through an analysis of 454 adult skeletons from 11 sites in the Inca capital region of Cuzco, Peru. These 11 sites span almost 1000 years (AD 600-1532), which allows for a comparison of the evidence for warfare before the Inca came to power (Middle Horizon AD 600-1000), during the time of Inca ascendency in the Late Intermediate Period (AD 1000-1400), and after the Inca came to power and expanded throughout the Cuzco region and beyond (Inca Imperial Period, AD 1400-1532). The results indicate that 100 of 454 adults (22.0%) showed evidence of cranial trauma. Of these, 23 individuals had major cranial injuries suggestive of warfare, consisting of large, complete, and/or perimortem fractures. There was scant evidence for major injuries during the Middle Horizon (2.8%, 1/36) and Late Intermediate Period (2.5%, 5/199), suggesting that warfare was not prevalent in the Cuzco region before and during the Inca rise to power. Only in the Inca Imperial Period was there a significant rise in major injuries suggestive of warfare (7.8%, 17/219). Despite the significant increase in Inca times, the evidence for major cranial injuries was only sporadically distributed at Cuzco periphery sites and was entirely absent at Cuzco core sites. These findings suggest that while the Inca used warfare as a mechanism for expansion in the Cuzco region, it was only one part of a complex expansion strategy that included economic, political, and ideological means to gain and maintain control. Copyright © 2011 Wiley-Liss, Inc.

  8. Structuring Naval Special Warfare junior officer professional military education

    OpenAIRE

    Donovan, Thomas A.

    2007-01-01

    Naval Special Warfare does not currently have a designated career path for an officer that requires professional military education (PME) for SEAL junior officers after the rank of Ensign (O-1) and before the rank of Lieutenant Commander (O-4). There currently is interest in this subject matter at the Naval Special Warfare Command and Center. SEAL officers increasingly hold key leadership positions and influence critical decisions in the execution of national strategy. This growing respo...

  9. Understanding the elementary considerations in a network warfare environment: an introductory framework

    CSIR Research Space (South Africa)

    Veerasamy, N

    2008-07-01

    Full Text Available . It seeks to offer a better introductory understanding to the field of network warfare. This paper addresses the requirements for a network warfare capability and will look at the high-level approach, constraints, focus areas, levels, techniques...

  10. The Physics of Warfare

    Science.gov (United States)

    Giordano, Gerardo

    2015-01-01

    Recently, I was tasked with the creation and execution of a new themed general education physics class called The Physics of Warfare. In the past, I had used the theme of a class, such as the physics of sports medicine, as a way to create homework and in-class activities, generate discussions, and provide an application to demonstrate that physics…

  11. Influence of Psychological Warfare Information on College Students and Educational Countermeasures%心理战信息对大学生的影响及其教育对策

    Institute of Scientific and Technical Information of China (English)

    巴文娟

    2015-01-01

    In the psychological warfare of information under the background of the Internet, television, language, religious, and academic and cultural exchanges, visits and other activities for the psychological warfare of information carrier of long term effect on the students, had different effect on the students' ideological consciousness, emotion attitude, values education, the national consciousness, cultural identity education, national education measures in a timely manner, improve the ability of college students' psychological warfare defense.%在信息心理战的背景下,以互联网、语言、影视、宗教,以及学术文化交流、参观访问等活动为载体的心理战信息长期作用于大学生,对大学生的思想意识、情感态度产生了不同程度的影响,应及时通过价值观教育、国家意识教育、文化认同教育、国情国力教育等教育对策,提高大学生的心理战防御能力。

  12. Chemical warfare agents identification by thermal neutron detection

    International Nuclear Information System (INIS)

    Liu Boxue; Ai Xianyun; Tan Daoyuan; Zhang Dianqin

    2000-01-01

    The hydrogen concentration determination by thermal neutron detection is a non-destructive, fast and effective method to identify chemical warfare agents and TNT that contain different hydrogen fraction. When an isotropic neutron source is used to irradiate chemical ammunition, hydrogen atoms of the agent inside shell act as a moderator and slow down neutrons. The number of induced thermal neutrons depends mainly upon hydrogen content of the agent. Therefore measurement of thermal neutron influence can be used to determine hydrogen atom concentration, thereby to determine the chemical warfare agents. Under a certain geometry three calibration curves of count rate against hydrogen concentration were measured. According to the calibration curves, response of a chemical agent or TNT could be calculated. Differences of count rate among chemical agents and TNT for each kind of shells is greater than five times of standard deviations of count rate for any agent, so chemical agents or TNT could be identified correctly. Meanwhile, blast tube or liquid level of chemical warfare agent could affect the response of thermal neutron count rate, and thereby the result of identification. (author)

  13. Quality of Life in Iranian Chemical Warfare Veteran's.

    Science.gov (United States)

    Ebadi, Abbas; Moradian, Tayeb; Mollahadi, Mohsen; Saeed, Yaser; Refahi, Ali Akbar

    2014-05-01

    Mustard gas has different effects on different body systems such as respiratory tract, blood, gastrointestinal, skin, eye, endocrine and peripheral nervous system. The purpose of this study was to determine the quality of life in chemical warfare veterans due to sulfur mustard exposure. In a cross-sectional and analytic study, 242 patients who had a chemical injury during the Iran-Iraq war (1980-1983) and their lung damage was proven were investigated in our study. The quality of life was measured in these patients using an extensively validated Iranian version of SF-36. The mean age of veterans was 44.12 ± 4.9 ranging from 22 to 62 years. Our results showed that chemical warfare had a decreased quality of life in all subscales of the SF-36. The lowest scores in SF-36 subscales were related to role physical and general health. The data also showed a significant relationship between the number of organs involved and the quality of life in these patients (P chemical warfare survivors suffering from late complications have a low health related quality of life.

  14. Technological advancements for the detection of and protection against biological and chemical warfare agents.

    Science.gov (United States)

    Eubanks, Lisa M; Dickerson, Tobin J; Janda, Kim D

    2007-03-01

    There is a growing need for technological advancements to combat agents of chemical and biological warfare, particularly in the context of the deliberate use of a chemical and/or biological warfare agent by a terrorist organization. In this tutorial review, we describe methods that have been developed both for the specific detection of biological and chemical warfare agents in a field setting, as well as potential therapeutic approaches for treating exposure to these toxic species. In particular, nerve agents are described as a typical chemical warfare agent, and the two potent biothreat agents, anthrax and botulinum neurotoxin, are used as illustrative examples of potent weapons for which countermeasures are urgently needed.

  15. The Anatomy of Counterinsurgency Warfare

    DEFF Research Database (Denmark)

    Mouritsen, Lars; Pedersen, Kenneth; Thruelsen, Peter Dahl

    Since the beginning of the new millennium, the West has been increasingly involved in a tiresome and rather particular type of conflict: insurgency warfare. The bloody and shocking terrorist attacks on New York and Washington in September 2001 marked the beginning of a new era, and the introducti...

  16. Strategic Analysis of Irregular Warfare

    Science.gov (United States)

    2010-03-01

    the same mathematical equations used by Lanchester .10 Irregular Warfare Theory and Doctrine It is time to develop new analytical methods and models...basis on which to build, similar to what Lanchester provided almost 100 years ago. Figure 9 portrays both Lanchester’s approach and an irregular 17

  17. Establishing Cyber Warfare Doctrine

    Directory of Open Access Journals (Sweden)

    Andrew M. Colarik

    2012-01-01

    Full Text Available Over the past several decades, advances in technology have transformed communications and the ability to acquire, disseminate, and utilize information in a range of environments. Modern societies and their respective militaries have taken advantage of a robust information space through network-centric systems. Because military and commercial operations have increasingly converged, communication and information infrastructures are now high-priority military objectives in times of war. This article examines the theoretical underpinning of current cyber warfare research, what we have learned so far about its application, and some of the emerging themes to be considered; it also postulates the development of a (national cyber warfare doctrine (CWD. An endeavor of this scale requires lots of considerations and preparation for its development if it is to be cooperatively embraced. This article considers why information technology systems and their supporting infrastructures should be considered legitimate military targets in conflicts, and offers several events that support this supposition. In addition, it identifies the various forms of doctrine that will become the basis for developing a CWD, discusses a CWD's possible components, and proposes a national collaborative and discussion framework for obtaining a nation's stakeholder buy-in for such an endeavor.

  18. Antifragile Electronic Warfare

    OpenAIRE

    Lichtman, Marc

    2014-01-01

    This letter introduces the concept of antifragile electronic warfare (EW), which we define as the ability to allow a communications link to improve performance due to the presence of a jammer. This concept should not be confused with jamming countermeasures (a.k.a. anti-jamming or electronic protection). Rather, antifragile EW can be thought of as the next step beyond simply avoiding or mitigating jamming. After introducing the concept we narrow down the subset of jammers this concept can be ...

  19. Transport and Reactivity of Decontaminants to Provide Hazard Mitigation of Chemical Warfare Agents from Materials

    Science.gov (United States)

    2016-06-01

    2013 4. TITLE AND SUBTITLE Transport and Reactivity of Decontaminants to Provide Hazard Mitigation of Chemical Warfare Agents from Materials 5a...directions for future decontamination formulation approaches. 15. SUBJECT TERMS GD HD Decontamination Hazard mitigation VX Chemical warfare agent... DECONTAMINANTS TO PROVIDE HAZARD MITIGATION OF CHEMICAL WARFARE AGENTS FROM MATERIALS 1. INTRODUCTION Decontamination of materials is the

  20. Strategy in the Robotic Age: A Case for Autonomous Warfare

    Science.gov (United States)

    2014-09-01

    enabling technology that augments human performance, such as exoskeleton suits, and other complementary fields that make robotics function...philosophy of maneuver warfare with new technologies from the Robotic Age, such as unmanned systems and exoskeleton suits, to present a new warfighting...and Brimley, “20YY,” 12. 49 the exoskeleton suit, but rather that the full benefit of autonomous warfare will be achieved by leveraging mass and

  1. European Curricula, Xenophobia and Warfare.

    Science.gov (United States)

    Coulby, David

    1997-01-01

    Examines school and university curricula in Europe and the extent of their influence on xenophobia. Considers the pluralistic nature of the European population. Discusses the role of curriculum selection and language policy in state efforts to promote nationalism. Assesses the role of curricular systems in the actual encouragement of warfare,…

  2. Shadow Wars: An Analysis of Counterinsurgency Warfare

    National Research Council Canada - National Science Library

    Dogan, Osman

    2005-01-01

    ... of the current strategic approaches to counterinsurgency warfare. Toward this end, a systems model approach, which views insurgent organizations as open systems, is adapted to the insurgent environment...

  3. Gas Warfare in World War I.

    Science.gov (United States)

    Flintham, A. J.

    1978-01-01

    The effectiveness of gas warfare during World War I was increased by the lack of a basic understanding of the behavior of gases on the part of the soldiers. This was a result of deficiencies in science education. (BB)

  4. A Survey of Game Theoretic Approaches to Modelling Decision-Making in Information Warfare Scenarios

    Directory of Open Access Journals (Sweden)

    Kathryn Merrick

    2016-07-01

    Full Text Available Our increasing dependence on information technologies and autonomous systems has escalated international concern for information- and cyber-security in the face of politically, socially and religiously motivated cyber-attacks. Information warfare tactics that interfere with the flow of information can challenge the survival of individuals and groups. It is increasingly important that both humans and machines can make decisions that ensure the trustworthiness of information, communication and autonomous systems. Subsequently, an important research direction is concerned with modelling decision-making processes. One approach to this involves modelling decision-making scenarios as games using game theory. This paper presents a survey of information warfare literature, with the purpose of identifying games that model different types of information warfare operations. Our contribution is a systematic identification and classification of information warfare games, as a basis for modelling decision-making by humans and machines in such scenarios. We also present a taxonomy of games that map to information warfare and cyber crime problems as a precursor to future research on decision-making in such scenarios. We identify and discuss open research questions including the role of behavioural game theory in modelling human decision making and the role of machine decision-making in information warfare scenarios.

  5. Mountain Warfare: The Need for Specialist Training

    National Research Council Canada - National Science Library

    Malik, Muhammad

    2003-01-01

    This study focuses on the need for specialist training for mountain warfare. It analyzes the special characteristics of mountain and high altitude terrain which affect conduct of military operations...

  6. Metal organic frameworks for the catalytic detoxification of chemical warfare nerve agents

    Science.gov (United States)

    Hupp, Joseph T.; Farha, Omar K.; Katz, Michael J.; Mondloch, Joseph E.

    2017-04-18

    A method of using a metal organic framework (MOF) comprising a metal ion and an at least bidendate organic ligand to catalytically detoxify chemical warfare nerve agents including exposing the metal-organic-framework (MOF) to the chemical warfare nerve agent and catalytically decomposing the nerve agent with the MOF.

  7. The Manipulation of Human Behavior in Guerrilla Warfare: Can It Enhance U.S. Army Special Forces Guerrilla Warfare Operations?

    National Research Council Canada - National Science Library

    Harris, William

    1997-01-01

    .... Proper integration of psychological communications to manipulate behavior in guerrilla warfare may facilitate the recruiting1 motivation, morale, sustainment and popular support for a guerrilla movement and its cause...

  8. A Review on Internet of Things for Defense and Public Safety

    Directory of Open Access Journals (Sweden)

    Paula Fraga-Lamas

    2016-10-01

    Full Text Available The Internet of Things (IoT is undeniably transforming the way that organizations communicate and organize everyday businesses and industrial procedures. Its adoption has proven well suited for sectors that manage a large number of assets and coordinate complex and distributed processes. This survey analyzes the great potential for applying IoT technologies (i.e., data-driven applications or embedded automation and intelligent adaptive systems to revolutionize modern warfare and provide benefits similar to those in industry. It identifies scenarios where Defense and Public Safety (PS could leverage better commercial IoT capabilities to deliver greater survivability to the warfighter or first responders, while reducing costs and increasing operation efficiency and effectiveness. This article reviews the main tactical requirements and the architecture, examining gaps and shortcomings in existing IoT systems across the military field and mission-critical scenarios. The review characterizes the open challenges for a broad deployment and presents a research roadmap for enabling an affordable IoT for defense and PS.

  9. A Review on Internet of Things for Defense and Public Safety.

    Science.gov (United States)

    Fraga-Lamas, Paula; Fernández-Caramés, Tiago M; Suárez-Albela, Manuel; Castedo, Luis; González-López, Miguel

    2016-10-05

    The Internet of Things (IoT) is undeniably transforming the way that organizations communicate and organize everyday businesses and industrial procedures. Its adoption has proven well suited for sectors that manage a large number of assets and coordinate complex and distributed processes. This survey analyzes the great potential for applying IoT technologies (i.e., data-driven applications or embedded automation and intelligent adaptive systems) to revolutionize modern warfare and provide benefits similar to those in industry. It identifies scenarios where Defense and Public Safety (PS) could leverage better commercial IoT capabilities to deliver greater survivability to the warfighter or first responders, while reducing costs and increasing operation efficiency and effectiveness. This article reviews the main tactical requirements and the architecture, examining gaps and shortcomings in existing IoT systems across the military field and mission-critical scenarios. The review characterizes the open challenges for a broad deployment and presents a research roadmap for enabling an affordable IoT for defense and PS.

  10. Oxidative decontamination of chemical and biological warfare agents using L-Gel.

    Science.gov (United States)

    Raber, Ellen; McGuire, Raymond

    2002-08-05

    A decontamination method has been developed using a single reagent that is effective both against chemical warfare (CW) and biological warfare (BW) agents. The new reagent, "L-Gel", consists of an aqueous solution of a mild commercial oxidizer, Oxone, together with a commercial fumed silica gelling agent, Cab-O-Sil EH-5. L-Gel is non-toxic, environmentally friendly, relatively non-corrosive, maximizes contact time because of its thixotropic nature, clings to walls and ceilings, and does not harm carpets or painted surfaces. The new reagent also addresses the most demanding requirements for decontamination in the civilian sector, including availability, low maintenance, ease of application and deployment by a variety of dispersal mechanisms, minimal training and acceptable expense. Experiments to test the effectiveness of L-Gel were conducted at Lawrence Livermore National Laboratory and independently at four other locations. L-Gel was tested against all classes of chemical warfare agents and against various biological warfare agent surrogates, including spore-forming bacteria and non-virulent strains of real biological agents. Testing showed that L-Gel is as effective against chemical agents and biological materials, including spores, as the best military decontaminants.

  11. 75 FR 6642 - Notice of Proposed Information Collection; Naval Special Warfare Recruiting Directorate

    Science.gov (United States)

    2010-02-10

    ... Information Collection; Naval Special Warfare Recruiting Directorate AGENCY: Department of the Navy, DoD. ACTION: Notice. SUMMARY: The Naval Special Warfare (NSW) Recruiting Directorate announces the submission... any of the following methods: Federal eRulemaking Portal: http://www.regulations.gov . Follow the...

  12. On Cyber Warfare Command and Control Systems

    National Research Council Canada - National Science Library

    Howes, Norman R; Mezzino, Michael; Sarkesain, John

    2004-01-01

    .... Cyber warfare then becomes a one-sided battle where the attacker makes all the strikes and the target of the attack responds so slowly that the attacker usually gets away without being identified...

  13. The Third World War? In The Cyberspace. Cyber Warfare in the Middle East.

    Directory of Open Access Journals (Sweden)

    Martina

    2014-06-01

    Full Text Available This article aims to provide a brief and comprehensive introduction to the issue of cyber warfare and to display the recent development in this area. Geographically, it focuses on the Middle East region, since the vast majority of the most important recent cyber attacks appeared just in there or were connected to it. The first part of the article tries to define the key notion of cyber warfare, compares it to the standard warfare and presents different types of cyber weapons that are known today. The second part points out examples of the most striking recent cyber attacks and uses them as evidences to demonstrate today's importance and dissemination of cyber warfare. Finally, the article sums up pros and cons of the cyber weapons and, in view of these, predicts a significant increase in their use in any future war conflicts.

  14. Toward Operational Art in Special Warfare

    Science.gov (United States)

    2016-02-23

    combatant commanders develop special warfare cam- paign options for their theaters that can be integral parts of the national approach. Getting buy -in at...the resistance spawning franchise operations at home or abroad? – Is the resistance attracting funding or other forms of assistance (indigenous

  15. Mass spectrometry in identification of ecotoxicants including chemical and biological warfare agents

    International Nuclear Information System (INIS)

    Lebedev, Albert T.

    2005-01-01

    Mass spectrometry is a unique tool to detect and identify trace levels of organic and bioorganic compounds as well as microorganisms in the environment. The range of potential chemical warfare (CW) and biological warfare (BW) agents is very broad. An important advantage of mass spectrometry over other techniques involves potential for full spectrum detection of chemical and biological agents including mid-spectrum materials (i.e. bioactive peptides, toxins, etc.) for which biological approaches are inadequate. Being very fast (seconds and minutes), extremely sensitive (zeptomoles 10 -21 ), and informative (detailed qualitative and quantitative composition of mixtures containing hundreds of chemicals), mass spectrometry is a principal analytical tool at the sites of destruction of CW. Due to its unique features, mass spectrometry is applied not only for the detection of CW agents, but for the analysis of products of metabolism and degradation of these agents in organisms or environment as well. The present paper deals with some examples of successful application of mass spectrometry for the analyses of ecotoxicants, chemical warfare agents, explosives, and microorganisms including biology warfare agents

  16. Prehistoric ceremonial warfare: beginning of institutionalized violence

    Czech Academy of Sciences Publication Activity Database

    Turek, Jan

    2017-01-01

    Roč. 13, č. 3 (2017), s. 535-548 ISSN 1555-8622 Institutional support: RVO:67985912 Keywords : human aggression * ceremonial warfare * archery symbolism * Neolithic * Chalcolithic * Europe Subject RIV: AC - Archeology, Anthropology, Ethnology OBOR OECD: Archaeology

  17. Theory of information warfare: basic framework, methodology and conceptual apparatus

    Directory of Open Access Journals (Sweden)

    Олександр Васильович Курбан

    2015-11-01

    Full Text Available It is conducted a comprehensive theoretical study and determine the basic provisions of the modern theory of information warfare in on-line social networks. Three basic blocks, which systematized the theoretical and methodological basis of the topic, are established. There are information and psychological war, social off-line and on-line network. According to the three blocks, theoretical concepts are defined and methodological substantiation of information processes within the information warfare in the social on-line networks is formed

  18. Infected cell protein 0 functional domains and their coordination in herpes simplex virus replication

    Science.gov (United States)

    Gu, Haidong

    2016-01-01

    Herpes simplex virus 1 (HSV-1) is a ubiquitous human pathogen that establishes latent infection in ganglia neurons. Its unique life cycle requires a balanced “conquer and compromise” strategy to deal with the host anti-viral defenses. One of HSV-1 α (immediate early) gene products, infected cell protein 0 (ICP0), is a multifunctional protein that interacts with and modulates a wide range of cellular defensive pathways. These pathways may locate in different cell compartments, which then migrate or exchange factors upon stimulation, for the purpose of a concerted and effective defense. ICP0 is able to simultaneously attack multiple host pathways by either degrading key restrictive factors or modifying repressive complexes. This is a viral protein that contains an E3 ubiquitin ligase, translocates among different cell compartments and interacts with major defensive complexes. The multiple functional domains of ICP0 can work independently and at the same time coordinate with each other. Dissecting the functional domains of ICP0 and delineating the coordination of these domains will help us understand HSV-1 pathogenicity as well as host defense mechanisms. This article focuses on describing individual ICP0 domains, their biochemical properties and their implication in HSV-1 infection. By putting individual domain functions back into the picture of host anti-viral defense network, this review seeks to elaborate the complex interactions between HSV-1 and its host. PMID:26870669

  19. Antidotes and treatments for chemical warfare/terrorism agents: an evidence-based review.

    Science.gov (United States)

    Rodgers, G C; Condurache, C T

    2010-09-01

    This article reviews the evidence supporting the efficacy of antidotes used or recommended for the potential chemical warfare agents of most concern. Chemical warfare agents considered include cyanide, vesicants, pulmonary irritants such as chlorine and phosgene, and nerve agents. The strength of evidence for most antidotes is weak, highlighting the need for additional research in this area.

  20. Naval War College Review. Volume 66, Number 3, Summer 2013

    Science.gov (United States)

    2013-01-01

    Naval Mine and Anti-submarine Warfare Command, Corpus Christi, Texas. He also served at the U.S. Naval Academy as a company of- ficer, celestial... Mine Warfare • Electronic Warfare • Air Defense • C4ISR • Civil Affairs • Installation Management Navy-centric Common Areas USMC...Brinsfield, and Col. jamie Iñiguez of the NATO SOF Coordination Centre. 37. Barbara Opall -Rome, “U.S. Seeks global Spec Ops Network,” Defense News, 12

  1. Technology Transition for Hybrid Warfare

    Science.gov (United States)

    2010-02-16

    and Iraq. At the same time, the science and technology base must provide the disruptive technologies to defeat future conventional enemies. This... disruptive technologies will be needed to retain long-term technological superiority in conventional warfare. Incremental improvement is the most...technology to be missed. Disruptive technologies are the second type of technological change and involve revolutionary concepts involving large technological

  2. Analysis on Joint Operational Capability in the Condition of Information and Psychological Warfares%信息心理对抗条件下联合作战能力分析

    Institute of Scientific and Technical Information of China (English)

    闫家传; 秦伟; 陈璐; 张仁友

    2011-01-01

    In the information age, operational capabilities of troops include firepower, defense power, maintainance power, information power and many other factors, and the warfares between the opponents represent force confrontation, psychological confrontation, information warfares and many other complex forms. Based on the quantity analysis of joint operational capability, mutual functional mechanism of information, psychology and combat power is analyzed, and three feedback loops of operational confrontation, information warfares and psychological warfares are educed, and then system dynamical models are established, and effects on joint operational capability by information, psychology and other factors are deduced in the prospect of quantity.%信息化条件下作战,部队的作战能力表现为包括火力、防护力、保障力、信息力等多种因素的联合作战能力,作战双方的对抗表现为兵力对抗,心理对抗,信息对抗等多种复杂的形式.在联合作战能力量化分析基础上,分析了信息、心理和战斗力相互作用机制,得出了战斗对抗、信息对抗、心理对抗3个反馈回路环,并据此建立了系统动力学模型,从定量的角度分析了信息、心理等因素对联合作战能力的影响.

  3. Warfare and the Teaching of History.

    Science.gov (United States)

    Salevouris, Michael J.

    1989-01-01

    Maintains that history teachers must challenge simplistic romantic notions about war. Proposes two approaches to teaching about war: the use of personal war narratives; and examining the relationship between warfare and society. Discusses literature related to these approaches. Contends that only through realistic assessments of war can peace be…

  4. Blaptica dubia as sentinels for exposure to chemical warfare agents - a pilot study.

    Science.gov (United States)

    Worek, Franz; Seeger, Thomas; Neumaier, Katharina; Wille, Timo; Thiermann, Horst

    2016-11-16

    The increased interest of terrorist groups in toxic chemicals and chemical warfare agents presents a continuing threat to our societies. Early warning and detection is a key component for effective countermeasures against such deadly agents. Presently available and near term solutions have a number of major drawbacks, e.g. lack of automated, remote warning and detection of primarily low volatile chemical warfare agents. An alternative approach is the use of animals as sentinels for exposure to toxic chemicals. To overcome disadvantages of vertebrates the present pilot study was initiated to investigate the suitability of South American cockroaches (Blaptica dubia) as warning system for exposure to chemical warfare nerve and blister agents. Initial in vitro experiments with nerve agents showed an increasing inhibitory potency in the order tabun - cyclosarin - sarin - soman - VX of cockroach cholinesterase. Exposure of cockroaches to chemical warfare agents resulted in clearly visible and reproducible reactions, the onset being dependent on the agent and dose. With nerve agents the onset was related to the volatility of the agents. The blister agent lewisite induced signs largely comparable to those of nerve agents while sulfur mustard exposed animals exhibited a different sequence of events. In conclusion, this first pilot study indicates that Blaptica dubia could serve as a warning system to exposure of chemical warfare agents. A cockroach-based system will not detect or identify a particular chemical warfare agent but could trigger further actions, e.g. specific detection and increased protective status. By designing appropriate boxes with (IR) motion sensors and remote control (IR) camera automated off-site warning systems could be realized. Copyright © 2016 Elsevier Ireland Ltd. All rights reserved.

  5. Effects of lactoferrin derived peptides on simulants of biological warfare agents.

    Science.gov (United States)

    Sijbrandij, Tjitske; Ligtenberg, Antoon J; Nazmi, Kamran; Veerman, Enno C I; Bolscher, Jan G M; Bikker, Floris J

    2017-01-01

    Lactoferrin (LF) is an important immune protein in neutrophils and secretory fluids of mammals. Bovine LF (bLF) harbours two antimicrobial stretches, lactoferricin and lactoferampin, situated in close proximity in the N1 domain. To mimic these antimicrobial domain parts a chimeric peptide (LFchimera) has been constructed comprising parts of both stretches (LFcin17-30 and LFampin265-284). To investigate the potency of this construct to combat a set of Gram positive and Gram negative bacteria which are regarded as simulants for biological warfare agents, the effect on bacterial killing, membrane permeability and membrane polarity were determined in comparison to the constituent peptides and the native bLF. Furthermore we aimed to increase the antimicrobial potency of the bLF derived peptides by cationic amino acid substitutions. Overall, the bactericidal activity of the peptides could be related to membrane disturbing effects, i.e. membrane permeabilization and depolarization. Those effects were most prominent for the LFchimera. Arginine residues were found to be crucial for displaying antimicrobial activity, as lysine to arginine substitutions resulted in an increased antimicrobial activity, affecting mostly LFampin265-284 whereas arginine to lysine substitutions resulted in a decreased bactericidal activity, predominantly in case of LFcin17-30.

  6. Irregular Warfare: New Challenges for Civil-Military Relations

    National Research Council Canada - National Science Library

    Cronin, Patrick M

    2008-01-01

    .... Irregular warfare introduces new complications to what Eliot Cohen has called an unequal dialogue between civilian and military leaders in which civilian leaders hold the true power but must modulate...

  7. Moltke as a Model for Information Warfare

    National Research Council Canada - National Science Library

    Gallagher, Daniel P

    1998-01-01

    ... with late 20th century Information Warfare (IW). Clausewitz, with his emphasis on concentrating forces for a decisive battle, or Sun Tzu, with his focus on an indirect approach and subduing the enemy without battle, might appear to be more...

  8. Cutaneous reactions in nuclear, biological and chemical warfare

    Directory of Open Access Journals (Sweden)

    Arora Sandeep

    2005-03-01

    Full Text Available Nuclear, biological and chemical warfare have in recent times been responsible for an increasing number of otherwise rare dermatoses. Many nations are now maintaining overt and clandestine stockpiles of such arsenal. With increasing terrorist threats, these agents of mass destruction pose a risk to the civilian population. Nuclear and chemical attacks manifest immediately while biological attacks manifest later. Chemical and biological attacks pose a significant risk to the attending medical personnel. The large scale of anticipated casualties in the event of such an occurrence would need the expertise of all physicians, including dermatologists, both military and civilian. Dermatologists are uniquely qualified in this respect. This article aims at presenting a review of the cutaneous manifestations in nuclear, chemical and biological warfare and their management.

  9. Evolution of war and cyber attacks in the concept of conventional warfare

    Directory of Open Access Journals (Sweden)

    Huseyin Kuru

    2018-01-01

    Full Text Available Humanity have witnessed many confrontations of states whose interests challenge at some points and their struggle to neutralize problems in battlefield. While war was perceived as a way of eliminating deadlocks for some parties, some considered it as one of the international policy materials. The definition and content of conventional warfare have been subject to change for centuries, while the new weapons and technologies have been developed by human beings that it has brought constant change in the law of war and at the same time more lethal and devastating consequences. The struggle for superiority in international relations played an impulsive role in the development of weapons used in the battlefield. Countries have used their labor and financial resources to improve their military skills. Beginning with stones and sticks in the battlefield, this struggle has reached the point of using the next generation satellite controlled unmanned and armed aircrafts and having nuclear weapons has become more deterrent than using them. The struggle between strong countries and the limited countries in terms of technology and armed groups that do not have enough technology and skills completely changed the definition of conventional warfare. This fight has led Asymmetric warfare born which can turn commercial airline planes full of innocent people into a weapon like September-11 attacks. In this study, the historical development and the change in the content of the warfare were briefly explained and then cyber-attacks in the concept of the fourth generation warfare was analyzed taking into account of prominent attacks.

  10. Water-driven micromotors for rapid photocatalytic degradation of biological and chemical warfare agents.

    Science.gov (United States)

    Li, Jinxing; Singh, Virendra V; Sattayasamitsathit, Sirilak; Orozco, Jahir; Kaufmann, Kevin; Dong, Renfeng; Gao, Wei; Jurado-Sanchez, Beatriz; Fedorak, Yuri; Wang, Joseph

    2014-11-25

    Threats of chemical and biological warfare agents (CBWA) represent a serious global concern and require rapid and efficient neutralization methods. We present a highly effective micromotor strategy for photocatalytic degradation of CBWA based on light-activated TiO2/Au/Mg microspheres that propel autonomously in natural water and obviate the need for external fuel, decontaminating reagent, or mechanical agitation. The activated TiO2/Au/Mg micromotors generate highly reactive oxygen species responsible for the efficient destruction of the cell membranes of the anthrax simulant Bacillus globigii spore, as well as rapid and complete in situ mineralization of the highly persistent organophosphate nerve agents into nonharmful products. The water-driven propulsion of the TiO2/Au/Mg micromotors facilitates efficient fluid transport and dispersion of the photogenerated reactive oxidative species and their interaction with the CBWA. Coupling of the photocatalytic surface of the micromotors and their autonomous water-driven propulsion thus leads to a reagent-free operation which holds a considerable promise for diverse "green" defense and environmental applications.

  11. Preparing South Africa for Cyber Crime and Cyber Defense

    Directory of Open Access Journals (Sweden)

    Marthie Grobler

    2013-10-01

    deal with making the civil community aware of Cyber Crime and provide a defense mechanism to assist governments from developing countries to prevent their countries to be used as targets or intermediary for either Cyber Crime or Cyber Warfare.

  12. Status of dental health in chemical warfare victims: The case of Isfahan, Iran

    Directory of Open Access Journals (Sweden)

    Ahmad Mottaghi

    2012-01-01

    Conclusion: Chemical warfare victims have relatively poor dental/oral health. Chemical injury might cause a dysfunction in saliva secretion, with decrease in saliva secretion increasing the risk for tooth decay and periodontal disorders. Further research is required to find out the exact underlying mechanisms and the factors associated with poor dental/oral health in chemical warfare victims.

  13. Handbook of toxicology of chemical warfare agents

    CERN Document Server

    2010-01-01

    This groundbreaking book covers every aspect of deadly toxic chemicals used as weapons of mass destruction and employed in conflicts, warfare and terrorism. Including findings from experimental as well as clinical studies, this one-of-a-kind handbook is prepared in a very user- friendly format that can easily be followed by students, teachers and researchers, as well as lay people. Stand-alone chapters on individual chemicals and major topics allow the reader to easily access required information without searching through the entire book. This is the first book that offers in-depth coverage of individual toxicants, target organ toxicity, major incidents, toxic effects in humans, animals and wildlife, biosensors, biomarkers, on-site and laboratory analytical methods, decontamination and detoxification procedures, prophylactic, therapeutic and countermeasures, and the role of homeland security. Presents a comprehensive look at all aspects of chemical warfare toxicology in one reference work. This saves research...

  14. Optimizing Armed Forces Capabilities for Hybrid Warfare – New Challenge for Slovak Armed Forces

    Directory of Open Access Journals (Sweden)

    Peter PINDJÁK

    2015-09-01

    Full Text Available The paper deals with the optimization of military capabilities of the Slovak Armed Forces for conducting operations in a hybrid conflict, which represents one of the possible scenarios of irregular warfare. Whereas in the regular warfare adversaries intend to eliminate the centers of gravity of each other, most often command and control structures, in irregular conflicts, the center of gravity shifts towards the will and cognitive perception of the target population. Hybrid warfare comprises a thoroughly planned combination of conventional military approaches and kinetic operations with subversive, irregular activities, including information and cyber operations. These efforts are often accompanied by intensified activities of intelligence services, special operation forces, and even mercenary and other paramilitary groups. The development of irregular warfare capabilities within the Slovak Armed Forces will require a progressive transformation process that may turn the armed forces into a modern and adaptable element of power, capable of deployment in national and international crisis management operations.

  15. Echoes of Chechnya Warfare Resound in Moscow, Quantico

    National Research Council Canada - National Science Library

    Ackerman, Robert

    2000-01-01

    .... thinking about urban warfare. After suffering stunning public defeats just a few years ago, Russian forces applied painful lessons learned then to drive Chechen forces out of their capital city, Grozny, this year...

  16. The ethics of drone warfare

    OpenAIRE

    Fatić Aleksandar

    2017-01-01

    The paper investigates the compatibility of the modern technologies of warfare, specifically the use of offensive drones, with traditional military ethics and suggests that the new technologies radically change the value system of the military in ways which make large parts of the traditional military ethics inapplicable. The author suggests that Agamben’s concept of ‘effectivity’ through ‘special actions’ which mark one’s belonging to a particular communit...

  17. Book Review COMPOSITE WARFARE: THE CONDUCT OF ...

    African Journals Online (AJOL)

    COMPOSITE WARFARE: THE CONDUCT OF. SUCCESSFUL GROUND FORCE. OPERATIONS IN AFRICA. Eeben Barlow. Abel Esterhuyse, PhD. Stellenbosch University. Pinetown: 30 Degrees South Publishers. 2015, 576 pages. ISBN 9781928211761. Africa is still one of the most conflict-ridden places on earth – from ...

  18. MOSES, development of an Underwater Warfare Testbed

    NARCIS (Netherlands)

    Lentze, S.G.

    2001-01-01

    The TNO underwater warfare (UWW) research programme results in a large number of models used in operational research projects. To enhance the accessibility and re-use of these models for new projects, TNO-FEL has developed the modelling environment ‘MOSES - Maritime Operations Simulation and

  19. Identification of chemical warfare agent with radiological measurements

    International Nuclear Information System (INIS)

    Liu Boxue; Li Yun; Ai Xianyun

    2000-01-01

    There are three non-destructive radiological methods for identification of warfare agents and TNT. Their principles and problems related were discussed. Portable isotopic neutron spectroscopy is based on the assay of key elemental composition (such as Cl, P, H, As, S, N) in chemical agents by neutron induced prompt gamma ray analysis. Hydrogen concentration measurement by means of using thermal neutron can be employed to identify chemical warfare agents and TNT that contains different hydrogen fraction. The calibration curves of thermal neutron count rate against hydrogen concentration were measured. X ray imagination system can be used to determine the internal structure of chemical bombs, there by to identify them. The radiological methods are very useful for identification of old chemical weapons abandoned by Japan Army during World War 2

  20. Are Current Psychological Operations Procedures Adequate in Information Warfare?

    National Research Council Canada - National Science Library

    Duff, Murray

    1997-01-01

    .... While some aspects of information warfare are conducted domestically, many are executed on foreign soil and involve extensive interaction with other governments, their population, non-governmental...

  1. Tissue-based water quality biosensors for detecting chemical warfare agents

    Science.gov (United States)

    Greenbaum, Elias [Oak Ridge, TN; Sanders, Charlene A [Knoxville, TN

    2003-05-27

    A water quality sensor for detecting the presence of at least one chemical or biological warfare agent includes: a cell; apparatus for introducing water into the cell and discharging water from the cell adapted for analyzing photosynthetic activity of naturally occurring, free-living, indigenous photosynthetic organisms in water; a fluorometer for measuring photosynthetic activity of naturally occurring, free-living, indigenous photosynthetic organisms drawn into the cell; and an electronics package that analyzes raw data from the fluorometer and emits a signal indicating the presence of at least one chemical or biological warfare agent in the water.

  2. A Dynamic Defense Modeling and Simulation Methodology using Semantic Web Services

    Directory of Open Access Journals (Sweden)

    Kangsun Lee

    2010-04-01

    Full Text Available Defense Modeling and Simulations require interoperable and autonomous federates in order to fully simulate complex behavior of war-fighters and to dynamically adapt themselves to various war-game events, commands and controls. In this paper, we propose a semantic web service based methodology to develop war-game simulations. Our methodology encapsulates war-game logic into a set of web services with additional semantic information in WSDL (Web Service Description Language and OWL (Web Ontology Language. By utilizing dynamic discovery and binding power of semantic web services, we are able to dynamically reconfigure federates according to various simulation events. An ASuW (Anti-Surface Warfare simulator is constructed to demonstrate the methodology and successfully shows that the level of interoperability and autonomy can be greatly improved.

  3. Tissue-based standoff biosensors for detecting chemical warfare agents

    Science.gov (United States)

    Greenbaum, Elias; Sanders, Charlene A.

    2003-11-18

    A tissue-based, deployable, standoff air quality sensor for detecting the presence of at least one chemical or biological warfare agent, includes: a cell containing entrapped photosynthetic tissue, the cell adapted for analyzing photosynthetic activity of the entrapped photosynthetic tissue; means for introducing an air sample into the cell and contacting the air sample with the entrapped photosynthetic tissue; a fluorometer in operable relationship with the cell for measuring photosynthetic activity of the entrapped photosynthetic tissue; and transmitting means for transmitting analytical data generated by the fluorometer relating to the presence of at least one chemical or biological warfare agent in the air sample, the sensor adapted for deployment into a selected area.

  4. Drone Warfare: Is the United States Violating the Law of Armed Conflict

    Science.gov (United States)

    2011-02-16

    NOTE AIR WAR COLLEGE AIR UNIVERSITY DRONE WARFARE: IS THE UNITED STATES VIOLATING THE LAW OF ARMED CONFLICT? by Barbara E. Shestko, Col...Base, Alabama. 1 Introduction The United States has become increasingly dependent upon the use of unmanned aircraft systems (UASs) or “ drones ” to...kill targeted members of al-Qaeda and the Taliban.1 Due to the success of drone warfare, we can expect the United States to continue its current

  5. A motivational analysis of defensive pessimism and self-handicapping.

    Science.gov (United States)

    Elliot, Andrew J; Church, Marcy A

    2003-06-01

    Two studies examined motivational influences on and correlates of defensive pessimism and self-handicapping and investigated the relationship between these two cognitive strategies and performance attainment. The findings indicated that defensive pessimism and self-handicapping have similar motivational profiles, with the primary difference being that self-handicapping represents the absence of approach motivation in the achievement domain, as well as the presence of avoidance motivation. Self-handicapping, but not defensive pessimism, was shown to undermine performance-attainment, and performance-avoidance goals were validated as mediators of this negative relationship. Issues regarding the functional nature of the two cognitive strategies are discussed.

  6. Biomonitoring of exposure to chemical warfare agents

    NARCIS (Netherlands)

    Noort, D.; Schans, M.J. van der; Benschop, H.P.

    2006-01-01

    An overview is presented of the major methods that are presently available for biomonitoring of exposure to chemical warfare agents, i.e., nerve agents and sulfur mustard. These methods can be applied for a variety of purposes such as diagnosis and dosimetry of exposure of casualties, verification

  7. Computational models of intergroup competition and warfare.

    Energy Technology Data Exchange (ETDEWEB)

    Letendre, Kenneth (University of New Mexico); Abbott, Robert G.

    2011-11-01

    This document reports on the research of Kenneth Letendre, the recipient of a Sandia Graduate Research Fellowship at the University of New Mexico. Warfare is an extreme form of intergroup competition in which individuals make extreme sacrifices for the benefit of their nation or other group to which they belong. Among animals, limited, non-lethal competition is the norm. It is not fully understood what factors lead to warfare. We studied the global variation in the frequency of civil conflict among countries of the world, and its positive association with variation in the intensity of infectious disease. We demonstrated that the burden of human infectious disease importantly predicts the frequency of civil conflict and tested a causal model for this association based on the parasite-stress theory of sociality. We also investigated the organization of social foraging by colonies of harvester ants in the genus Pogonomyrmex, using both field studies and computer models.

  8. Modeling Anti-Air Warfare With Discrete Event Simulation and Analyzing Naval Convoy Operations

    Science.gov (United States)

    2016-06-01

    W., & Scheaffer, R. L. (2008). Mathematical statistics with applications . Belmont, CA: Cengage Learning. 118 THIS PAGE INTENTIONALLY LEFT BLANK...WARFARE WITH DISCRETE EVENT SIMULATION AND ANALYZING NAVAL CONVOY OPERATIONS by Ali E. Opcin June 2016 Thesis Advisor: Arnold H. Buss Co...REPORT DATE June 2016 3. REPORT TYPE AND DATES COVERED Master’s thesis 4. TITLE AND SUBTITLE MODELING ANTI-AIR WARFARE WITH DISCRETE EVENT

  9. FFT Based VLSI Digital One Bit Electronic Warfare Receiver

    National Research Council Canada - National Science Library

    Chien-In, Henry

    1998-01-01

    ... (1 GHz) digital receiver designed for electronic warfare applications. The receiver can process two simultaneous signals and has the potential for fabrication on a single multi-chip module (MCM...

  10. New Developments in Chinese Strategic Psychological Warfare

    Science.gov (United States)

    2005-01-01

    Taoism , which coupled hardness with softness in warfare, was not the only influence on the theory of psychological operations in ancient China. Other...portraying Islamic martyrs who appear to speak to soldiers from the clouds.38 In contemporary wars, such as the Gulf War, the first targets attacked have

  11. The technical Dimensions of Nuclear Warfare

    International Nuclear Information System (INIS)

    Broda, E.

    1977-01-01

    This text, written by Engelbert Broda in 1977 is about the dimensions of nuclear warfare. Broda describes the devastating effects of the nuclear bombs dropped in 1945 in Hiroshima and Nagasaki and compares these effects with the explosive power of Hydrogen weapons. He also expresses his concerns about another nuclear ware and analyses possible worsening situations like change in the military doctrine. (nowak)

  12. Detection of biological warfare agents using ultra violet-laser induced fluorescence LIDAR.

    Science.gov (United States)

    Joshi, Deepti; Kumar, Deepak; Maini, Anil K; Sharma, Ramesh C

    2013-08-01

    This review has been written to highlight the threat of biological warfare agents, their types and detection. Bacterial biological agent Bacillus anthracis (bacteria causing the disease anthrax) which is most likely to be employed in biological warfare is being discussed in detail. Standoff detection of biological warfare agents in aerosol form using Ultra violet-Laser Induced Fluorescence (UV-LIF) spectroscopy method has been studied. Range-resolved detection and identification of biological aerosols by both nano-second and non-linear femto-second LIDAR is also discussed. Calculated received fluorescence signal for a cloud of typical biological agent Bacillus globigii (Simulants of B. anthracis) at a location of ~5.0 km at different concentrations in presence of solar background radiation has been described. Overview of current research efforts in internationally available working UV-LIF LIDAR systems are also mentioned briefly. Copyright © 2013 Elsevier B.V. All rights reserved.

  13. THE CYBER DIMENSION OF MODERN HYBRID WARFARE AND ITS RELEVANCE FOR NATO

    Directory of Open Access Journals (Sweden)

    Sorin DUCARU

    2016-06-01

    Full Text Available The technological development and the instant communication possibilities advanced not only economic and social developments, but also evolving threats from those who exploit the vulnerabilities of communication and information systems. The cyber threat landscape points to a significant increase of the frequency, intensity, duration and sophistication of cyber-attacks. One of the new and concerning trends is the use of cyber capabilities in relation with military of hybrid operations – the so-called cyber dimension of hybrid warfare. NATO’s strategy on countering hybrid warfare is based on the triad: prepare-deter-defend, which also applies to cyber. Nations represent the first line of defence in countering hybrid strategies. International cooperation is also a key factor in this sense. It is in this context that NATO’s response to cyber-attacks in the context of hybrid warfare must be further refined.

  14. Precision Warfare Enables Interdependent Fires and Maneuver in 2010

    National Research Council Canada - National Science Library

    Smith, John

    1997-01-01

    The U.S. Army is in the midst of a revolution in military affairs (RMA). Significant advancements in informational technologies and precision weapons are providing unprecedented potential for future warfare...

  15. Irregular Warfare: Impact on Future Professional Military Education

    National Research Council Canada - National Science Library

    Paschal, David G

    2006-01-01

    ... to operate effectively in an irregular warfare environment. The utility of a decisive war between nation states continues to decline and will eventually reach critical mass based upon the extreme imbalance of military power and a U.S. monopoly...

  16. IMS software developments for the detection of chemical warfare agent

    Science.gov (United States)

    Klepel, ST.; Graefenhain, U.; Lippe, R.; Stach, J.; Starrock, V.

    1995-01-01

    Interference compounds like gasoline, diesel, burning wood or fuel, etc. are presented in common battlefield situations. These compounds can cause detectors to respond as a false positive or interfere with the detector's ability to respond to target compounds such as chemical warfare agents. To ensure proper response of the ion mobility spectrometer to chemical warfare agents, two special software packages were developed and incorporated into the Bruker RAID-1. The programs suppress interferring signals caused by car exhaust or smoke gases resulting from burning materials and correct the influence of variable sample gas humidity which is important for detection and quantification of blister agents like mustard gas or lewisite.

  17. Military Engineers and Chemical Warfare Troops (Inzhenernye Voiska Khimicheskie Voiska),

    Science.gov (United States)

    MILITARY FORCES(FOREIGN), *MILITARY ORGANIZATIONS, MILITARY ENGINEERING , INFANTRY, AMPHIBIOUS OPERATIONS, MINELAYING, ARMORED VEHICLES, NUCLEAR...RADIATION, DOSIMETERS, CHEMICAL WARFARE, PROTECTIVE CLOTHING, DECONTAMINATION, HEALTH PHYSICS.

  18. Irregular Warfare: Special Operations Joint Professional Military Education Transformation

    National Research Council Canada - National Science Library

    Cannady, Bryan H

    2008-01-01

    ... on today's battlefront in Afghanistan and Iraq and in the Global War on Terrorism (GWOT). At the forefront of the GWOT and irregular warfare are the United States Special Operations Command (USSOCOM...

  19. Design and Implementation of a Cyber-Defense Exercise

    OpenAIRE

    Adrian Furtuna

    2010-01-01

    Learning by practice is a very effective way of education in some activity domains, including information security. The article explores this idea by showing how a cyber-defense exercise can be designed and implemented in order to reach its educational goals.

  20. An evolutionary theory of large-scale human warfare: Group-structured cultural selection.

    Science.gov (United States)

    Zefferman, Matthew R; Mathew, Sarah

    2015-01-01

    When humans wage war, it is not unusual for battlefields to be strewn with dead warriors. These warriors typically were men in their reproductive prime who, had they not died in battle, might have gone on to father more children. Typically, they are also genetically unrelated to one another. We know of no other animal species in which reproductively capable, genetically unrelated individuals risk their lives in this manner. Because the immense private costs borne by individual warriors create benefits that are shared widely by others in their group, warfare is a stark evolutionary puzzle that is difficult to explain. Although several scholars have posited models of the evolution of human warfare, these models do not adequately explain how humans solve the problem of collective action in warfare at the evolutionarily novel scale of hundreds of genetically unrelated individuals. We propose that group-structured cultural selection explains this phenomenon. © 2015 Wiley Periodicals, Inc.

  1. Researchers study decontamination of chemical, biological warfare agents

    OpenAIRE

    Trulove, Susan

    2007-01-01

    The U.S. Army Research Office has awarded Virginia Tech a $680,000 grant over two years to build an instrument that can be used to study the chemistry of gases that will decompose both chemical and biological warfare agents on surfaces.

  2. Changing the Scale and Efficiency of Chemical Warfare Countermeasure Discovery Using the Zebrafish

    Science.gov (United States)

    Peterson, Randall T.; MacRae, Calum A.

    2013-01-01

    As the scope of potential chemical warfare agents grows rapidly and as the diversity of potential threat scenarios expands with non-state actors, so a need for innovative approaches to countermeasure development has emerged. In the last few years, the utility of the zebrafish as a model organism that is amenable to high-throughput screening has become apparent and this system has been applied to the unbiased discovery of chemical warfare countermeasures. This review summarizes the in vivo screening approach that has been pioneered in the countermeasure discovery arena, and highlights the successes to date as well as the potential challenges in moving the field forward. Importantly, the establishment of a zebrafish platform for countermeasure discovery would offer a rapid response system for the development of antidotes to the continuous stream of new potential chemical warfare agents. PMID:24273586

  3. Radioecological aspects of nuclear warfare

    International Nuclear Information System (INIS)

    Edvardson, Kay

    1977-01-01

    Radioactive fallout, one of the major effects of nuclear warfare, will cause acute radiation sickness within the close-in or intermediate areas downwind from surface bursts. Global fallout from high yield explosions will be fairly evenly distributed in the hemisphere where the explosions occur, and will cause irradiation from ground deposit, inhaled material and contaminated food. Estimates of collective doses and the approximate number of late casualties from the global contamination are presented for a given total explosion yield. (author)

  4. Fourth Generation Warfare: The Need for a Comprehensive Approach

    National Research Council Canada - National Science Library

    Benton, LeRoy D

    2008-01-01

    .... A definition of Fourth Generation Warfare is developed, based on Col. Thomas X. Hammes' writings. The definition is further developed to show relevance and applicability to current operations in the Long War on Terrorism...

  5. Rain-Induced Wash-Off of Chemical Warfare Agent (VX) from Foliar Surfaces of Living Plants Maintained in a Surety Hood

    Science.gov (United States)

    2016-09-01

    RAIN-INDUCED WASH-OFF OF CHEMICAL WARFARE AGENT (VX) FROM FOLIAR SURFACES OF LIVING PLANTS MAINTAINED IN A...Final 3. DATES COVERED (From - To) May 2014 – Sep 2015 4. TITLE AND SUBTITLE Rain-Induced Wash-Off of Chemical Warfare Agent (VX) from Foliar...galli Foliage Chemical warfare agent (CWA) O-ethyl-S-(2

  6. Special Forces and the Art of Influence: A Grassroots Approach to Psychological Operations in an Unconventional Warfare Environment

    National Research Council Canada - National Science Library

    Thomas, II, Joel W

    2006-01-01

    This thesis researches the intricacies of the art of influence in an unconventional warfare environment to develop a model of influence that can be utilized by Special Forces conducting unconventional warfare...

  7. Mapping the Spread of Mounted Warfare

    Directory of Open Access Journals (Sweden)

    Peter Turchin

    2016-12-01

    Full Text Available Military technology is one of the most important factors affecting the evolution of complex societies. In particular, mounted warfare, the use of horse-riders in military operations, revolutionized war as it spread to different parts of Eurasia and Africa during the Ancient and Medieval eras, and to the Americas during the Early Modern period. Here we use a variety of sources to map this spread.

  8. Navy Operational Planner - Undersea Warfare Module

    Science.gov (United States)

    2016-09-01

    concepts are considered in NOP–USW that are not in previous research: time phasing of missions, mutually exclusive missions, and asset availability...operational planning efforts. NOP–USW suggests the correct allocation of assets across a wide theater of operation to accomplish missions in the...Master’s thesis 4. TITLE AND SUBTITLE NAVY OPERATIONAL PLANNER – UNDERSEA WARFARE MODULE 5. FUNDING NUMBERS 6. AUTHOR(S) Guy A. Molina 7

  9. zero day exploits and national readiness for cyber-warfare

    African Journals Online (AJOL)

    HOD

    A zero day vulnerability is an unknown exploit that divulges security flaws in software before such a flaw is publicly ... Keywords: exploits, zero day, vulnerability, cyberspace, cyber-warfare. 1. ..... industries and companies across the globe. The.

  10. Guerilla Warfare & Law Enforcement: Combating the 21st Century Terrorist Cell within the U.S.

    Directory of Open Access Journals (Sweden)

    Major Richard Hughbank

    2009-01-01

    Full Text Available Both domestic and international terrorist organizations employ guerrilla warfare tactics, techniques, and procedures. Thus, the ability to identify and defeat the members of these organizations, cripple their infrastructures, and disrupt their financial resources lies in the understanding of modern guerrilla warfare as it develops in the twenty-first century within the United States.3 The forms of asymmetric warfare4 adopted by domestic and international terrorist groups alike is no longer intended to gain simple media exposure or governmental manipulation; they want to make an overpowering impact by causing massive loss of life and severe damage to infrastructure and are often motivated by religious imperatives and political goals. As terrorism analyst Stephen Flynn has observed, "Throughout the 20th century [Americans] were able to treat national security as essentially an out-of-body experience. When confronted by threats, [America] dealt with them on the turf of our allies or our adversaries. Aside from the occasional disaster and heinous crime, civilian life [in the United States] has been virtually terror-free." With the turn of the twenty-first century, terrorist operations have become more prevalent in the United States and are taking shape in the form of modern guerrilla warfare, thus creating new challenges for federal, state, and local law enforcement agencies. After reviewing the origin and nature of these challenges, this article will offer some suggestions for countering guerilla warfare in the United States.

  11. Science and defense 2003: the future on-board energies; Science et defense 2003: les futures energies embarquees

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2003-07-01

    Since 1983, the DGA (delegation of armament) organizes the colloquium ''Science and defense'' in the domains of the scientific research and the defense. The 2003 colloquium took place in Paris on December 2 and 3 and concerns the future portable energies. This paper is a summary presentation of the presented topics: the needs and the developments for the portable energies, the state of the art of the mini and micro energy sources and their limitations, the energy materials which strongly provide energy by chemical transformation, the new energy sources of medium power, the environmental impacts. The budget devoted to these researches in 2002 by the DGA, are also presented. (A.L.B.)

  12. Second NATO/SIBCA Exercise on Sampling of Chemical Warfare Agents

    National Research Council Canada - National Science Library

    Wils, E

    1999-01-01

    In order to practise the sampling of chemical warfare agents under realistic conditions, the Netherlands participated successfully in the second NATO/SIBCA sampling exercise conducted in Poland on 1-3...

  13. The Role of Civil Affairs in Unconventional Warfare

    Science.gov (United States)

    2012-12-01

    neighbor to the west, and secured the eastern border of Laos 32 Mao Tse -Tung, On Guerrilla Warfare...INTRODUCTION..........................................................................................19  B.  BRIEF HISTORY OF LAOS ...Royal Lao Army SCA Support to Civil Administration SCIRI Supreme Council of Iraq SG Shadow Government SOF Special Operations Forces TAI Targeted

  14. How Power-Laws Re-Write The Rules Of Cyber Warfare

    Directory of Open Access Journals (Sweden)

    David L. Bibighaus

    2015-12-01

    Full Text Available All warfare contains and element of randomness. This article will argue that, the kind uncertainty encountered in cyber warfare (Power-Law randomness is fundamentally different from the uncertainty the military has evolved to deal with in the physical world (Gaussian-Randomness. The article will explain the difference between these two kinds of randomness, and how cyber weapons appear to operate under Power-Law randomness. It then will show how in cyberspace, key aspects of strategic thought are based on a flaws assumption of randomness. Finally, this article shall argue that if the American military is going to be effective in cyberspace, it must re-examine the way the military assumes risk, recruits is forces, plans for war and maintains the peace.

  15. Military medicine and the ethics of war: British colonial warfare during the Seven Years War (1756-63).

    Science.gov (United States)

    Charters, Erica

    2010-01-01

    This article examines 18th-century European warfare, tracing the first formal codifications of conventions of war, frequently introduced by military physicians and initially regarding the treatment of the sick and wounded. It outlines to what extent these conventions were followed in practice, particularly in the challenging environment of American irregular warfare, with a focus on the most well-known incident of "biological warfare" in the period: the deliberate spread of smallpox by British officers among Amerindians in 1763. More broadly, it demonstrates that the history of military medicine provides a fruitful method with which to uncover assumptions about the ethics of war.

  16. Simulated experiment for elimination of chemical and biological warfare agents by making use of microwave plasma torch

    International Nuclear Information System (INIS)

    Hong, Yong C.; Kim, Jeong H.; Uhm, Han S.

    2004-01-01

    The threat of chemical and biological warfare agents in a domestic terrorist attack and in military conflict is increasing worldwide. Elimination and decontamination of chemical and biological warfare (CBW) agents are immediately required after such an attack. Simulated experiment for elimination of CBW agents by making use of atmospheric-pressure microwave plasma torches is carried out. Elimination of biological warfare agents indicated by the vitrification or burnout of sewage sludge powders and decomposition of toluene gas as a chemical agent stimulant are presented. A detailed characterization for the elimination of the simulant chemicals using Fourier transform infrared and gas chromatography is also presented

  17. Simulated experiment for elimination of chemical and biological warfare agents by making use of microwave plasma torch

    Science.gov (United States)

    Hong, Yong C.; Kim, Jeong H.; Uhm, Han S.

    2004-02-01

    The threat of chemical and biological warfare agents in a domestic terrorist attack and in military conflict is increasing worldwide. Elimination and decontamination of chemical and biological warfare (CBW) agents are immediately required after such an attack. Simulated experiment for elimination of CBW agents by making use of atmospheric-pressure microwave plasma torches is carried out. Elimination of biological warfare agents indicated by the vitrification or burnout of sewage sludge powders and decomposition of toluene gas as a chemical agent stimulant are presented. A detailed characterization for the elimination of the simulant chemicals using Fourier transform infrared and gas chromatography is also presented.

  18. Radioecological aspects of nuclear warfare

    International Nuclear Information System (INIS)

    Edvarson, K.

    1975-01-01

    The radioactive fallout from nuclear explosions is one of the major effects of nuclear warfare. Those levels causing acute radiation sickness are to be expected only within the close-in or intermediate areas downwind from surface bursts. Global fallout from high yield explosions will be fairly evenly distributed in the hemisphere where the explosions occurred and cause irradiation from ground deposit, inhaled material and contaminated food. The collective doses and the order of magnitude of late casualties from this global contamination are estimated for a given total explosion yield. (auth)

  19. The Role of Airpower in Urban Warfare. An Airman's Perspective

    National Research Council Canada - National Science Library

    Saffold, Timothy

    1998-01-01

    .... This emphasis on surface force employment stifles innovative thought as to how military forces can achieve operational and strategic effects by employing airpower as the key instrument of force in urban warfare...

  20. A Cloud Storage Platform in the Defense Context : Mobile Data Management With Unreliable Network Conditions

    NARCIS (Netherlands)

    Veen, J.S. van der; Bastiaans, M.; Jonge, M. de; Strijkers, R.J.

    2012-01-01

    This paper discusses a cloud storage platform in the defense context. The mobile and dismounted domains of defense organizations typically use devices that are light in storage, processing and communication capabilities. This means that it is difficult to store a lot of information on these devices

  1. Nanoplatforms for Detection, Remediation and Protection Against Chem-Bio Warfare

    Science.gov (United States)

    Denkbaş, E. B.; Bayram, C.; Kavaz, D.; Çirak, T.; Demirbilek, M.

    Chemical and biological substances have been used as warfare agents by terrorists by varying degree of sophistication. It is critical that these agents be detected in real-time with high level of sensitively, specificity, and accuracy. Many different types of techniques and systems have been developed to detect these agents. But there are some limitations in these conventional techniques and systems. Limitations include the collection, handling and sampling procedures, detection limits, sample transfer, expensive equipment, personnel training, and detection materials. Due to the unique properties such as quantum effect, very high surface/volume ratio, enhanced surface reactivity, conductivity, electrical and magnetic properties of the nanomaterials offer great opportunity to develop very fast, sensitive, accurate and cost effective detection techniques and systems to detect chemical and biological (chem.-bio) warfare agents. Furthermore, surface modification of the materials is very easy and effective way to get functional or smart surfaces to be used as nano-biosensor platform. In that respect many different types of nanomaterials have been developed and used for the detection, remediation and protection, such as gold and silver nanoparticles, quantum dots, Nano chips and arrays, fluorescent polymeric and magnetic nanoparticles, fiber optic and cantilever based nanobiosensors, nanofibrillar nanostructures etc. This study summarizes preparation and characterization of nanotechnology based approaches for the detection of and remediation and protection against chem.-bio warfare agents.

  2. Development of Information Technology for Smart Defense

    International Nuclear Information System (INIS)

    Chung, Kyoil; Lee, So Yeon; Park, Sangjoon; Park, Jonghyun; Han, Sangcheol

    2014-01-01

    Recently, there has been demand for the convergence of IT (Information and communication Technologies, ICT) with defense, as has already been achieved in civilian fields such as healthcare and construction. It is expected that completely new and common requirements would emerge from the civilian and military domains and that the shape of war field would change rapidly. Many military scientists forecast that future wars would be network-centric and be based on C4I(Command, Control, Communication and Computer, Intelligence), ISR(Intelligence, Surveillance and Reconnaissance), and PGM(Precision Guided Munitions). For realizing the smart defense concept, IT should act as a baseline technology even for simulating a real combat field using virtual reality. In this paper, we propose the concept of IT-based smart defense with a focus on accurate detection in real and cyber wars, effective data communication, automated and unmanned operation, and modeling and simulation

  3. Development of Information Technology for Smart Defense

    Energy Technology Data Exchange (ETDEWEB)

    Chung, Kyoil; Lee, So Yeon; Park, Sangjoon; Park, Jonghyun [ETRI, Daejeon (Korea, Republic of); Han, Sangcheol [KEIT, Seoul (Korea, Republic of)

    2014-03-15

    Recently, there has been demand for the convergence of IT (Information and communication Technologies, ICT) with defense, as has already been achieved in civilian fields such as healthcare and construction. It is expected that completely new and common requirements would emerge from the civilian and military domains and that the shape of war field would change rapidly. Many military scientists forecast that future wars would be network-centric and be based on C4I(Command, Control, Communication and Computer, Intelligence), ISR(Intelligence, Surveillance and Reconnaissance), and PGM(Precision Guided Munitions). For realizing the smart defense concept, IT should act as a baseline technology even for simulating a real combat field using virtual reality. In this paper, we propose the concept of IT-based smart defense with a focus on accurate detection in real and cyber wars, effective data communication, automated and unmanned operation, and modeling and simulation.

  4. History of chemical and biological warfare agents

    International Nuclear Information System (INIS)

    Szinicz, L.

    2005-01-01

    Chemical and biological warfare agents constitute a low-probability, but high-impact risk both to the military and to the civilian population. The use of hazardous materials of chemical or biological origin as weapons and for homicide has been documented since ancient times. The first use of chemicals in terms of weapons of mass destruction goes back to World War I, when on April 22, 1915 large amounts of chlorine were released by German military forces at Ypres, Belgium. Until around the 1970s of the 20th century, the awareness of the threat by chemical and biological agents had been mainly confined to the military sector. In the following time, the development of increasing range delivery systems by chemical and biological agents possessors sensitised public attention to the threat emanating from these agents. Their proliferation to the terrorists field during the 1990s with the expanding scale and globalisation of terrorist attacks suggested that these agents are becoming an increasing threat to the whole world community. The following article gives a condensed overview on the history of use and development of the more prominent chemical and biological warfare agents

  5. History of chemical and biological warfare agents.

    Science.gov (United States)

    Szinicz, L

    2005-10-30

    Chemical and biological warfare agents constitute a low-probability, but high-impact risk both to the military and to the civilian population. The use of hazardous materials of chemical or biological origin as weapons and for homicide has been documented since ancient times. The first use of chemicals in terms of weapons of mass destruction goes back to World War I, when on April 22, 1915 large amounts of chlorine were released by German military forces at Ypres, Belgium. Until around the 1970s of the 20th century, the awareness of the threat by chemical and biological agents had been mainly confined to the military sector. In the following time, the development of increasing range delivery systems by chemical and biological agents possessors sensitised public attention to the threat emanating from these agents. Their proliferation to the terrorists field during the 1990s with the expanding scale and globalisation of terrorist attacks suggested that these agents are becoming an increasing threat to the whole world community. The following article gives a condensed overview on the history of use and development of the more prominent chemical and biological warfare agents.

  6. Electronic Warfare: Towed Decoys Could Improve Survivability of Current Navy Aircraft

    National Research Council Canada - National Science Library

    Aiken, Michael

    1997-01-01

    Traditionally, DOD'S combat aircraft have used on-board electronic warfare devices called jammers for self-protection against radar-controlled weapons, including missiles and anti-aircraft artillery...

  7. Study on the identification method of chemical warfare agents with spectroscopy of neutron induced γ rays

    International Nuclear Information System (INIS)

    Liu Boxue; Li Yun; Li Xiangbao

    1996-01-01

    The paper briefly describes some non-destructive verification technologies of chemical warfare agents in-site, and some application of neutron induced gamma ray analysis, such as multi-elements analysis of coal, hidden explosive detection and identification of chemical agents. It also describes some problems in developing the portable isotopic neutron spectroscopy for non-destructive evaluation of chemical warfare agents

  8. Decontamination and Detoxification of Toxic Chemical Warfare Agents Using Polyurethane Sponges

    National Research Council Canada - National Science Library

    Gordon, Richard K; Gunduz, Alper T; Askins, LaTawnya Y; Strating, Simon J; Doctor, Bhupendra P; Clarkson, Edward D; Mitchelree, Larry W; Lukey, Brian; Railer, Roy; Schulz, Susan

    2003-01-01

    .... Another serious problem that may be encountered while caring for personnel contaminated with organophosphorus chemical warfare nerve agents is the possibility that there will be cross-contamination...

  9. Back to the Basics: An Aviation Solution to Counterinsurgent Warfare

    National Research Council Canada - National Science Library

    Davis, Arthur D

    2005-01-01

    .... By examining past examples of the use of air power in counterinsurgent warfare, this study sheds light on the United States' current failings in both equipment and doctrine as it wages this type of war...

  10. Cyber crime and cyber warfare with international cyber collaboration for RSA – preparing communities

    CSIR Research Space (South Africa)

    Grobler, M

    2012-03-01

    Full Text Available aspects come into play that may have an influence on the manner in which the military reacts to cyber attacks (Wilson 2007): ? new national security policy issues; ? consideration of psychological operations used to affect friendly nations... relationship between modern cyber space, cyber warfare and traditional legislation. As a starting point, cyber warfare is defined for the purpose of this article as the use of exploits in cyber space as a way to intentionally cause harm to people, assets...

  11. Particle Swarm Social Adaptive Model for Multi-Agent Based Insurgency Warfare Simulation

    Energy Technology Data Exchange (ETDEWEB)

    Cui, Xiaohui [ORNL; Potok, Thomas E [ORNL

    2009-12-01

    To better understand insurgent activities and asymmetric warfare, a social adaptive model for modeling multiple insurgent groups attacking multiple military and civilian targets is proposed and investigated. This report presents a pilot study using the particle swarm modeling, a widely used non-linear optimal tool to model the emergence of insurgency campaign. The objective of this research is to apply the particle swarm metaphor as a model of insurgent social adaptation for the dynamically changing environment and to provide insight and understanding of insurgency warfare. Our results show that unified leadership, strategic planning, and effective communication between insurgent groups are not the necessary requirements for insurgents to efficiently attain their objective.

  12. CARDS: A blueprint and environment for domain-specific software reuse

    Science.gov (United States)

    Wallnau, Kurt C.; Solderitsch, Anne Costa; Smotherman, Catherine

    1992-01-01

    CARDS (Central Archive for Reusable Defense Software) exploits advances in domain analysis and domain modeling to identify, specify, develop, archive, retrieve, understand, and reuse domain-specific software components. An important element of CARDS is to provide visibility into the domain model artifacts produced by, and services provided by, commercial computer-aided software engineering (CASE) technology. The use of commercial CASE technology is important to provide rich, robust support for the varied roles involved in a reuse process. We refer to this kind of use of knowledge representation systems as supporting 'knowledge-based integration.'

  13. blitzkrieg to desert storm: the evolution of operational warfare

    African Journals Online (AJOL)

    a_nabb

    disease of stalemates infecting militaries before the Second World War. The invasion did not change the world; instead, it brought about an increased awareness of the importance of the operational level of war, a dimension of warfare previously neglected. The German operational effectiveness represented an evolution ...

  14. Bioaccumulation of chemical warfare agents, energetic materials, and metals in deep-sea shrimp from discarded military munitions sites off Pearl Harbor

    Science.gov (United States)

    Koide, Shelby; Silva, Jeff A. K.; Dupra, Vilma; Edwards, Margo

    2016-06-01

    The bioaccumulation of munitions-related chemicals at former military deep-water disposal sites is poorly understood. This paper presents the results of human-food-item biota sampling to assess the potential for bioaccumulation of chemical warfare agents, energetic materials, arsenic, and additional munitions-related metals in deep-sea shrimp tissue samples collected during the Hawai'i Undersea Military Munitions Assessment (HUMMA) project to date. The HUMMA investigation area is located within a former munitions sea-disposal site located south of Pearl Harbor on the island of O'ahu, Hawai'i, designated site Hawaii-05 (HI-05) by the United States Department of Defense. Indigenous deep-sea shrimp (Heterocarpus ensifer) were caught adjacent to discarded military munitions (DMM) and at control sites where munitions were absent. Tissue analysis results showed that chemical warfare agents and their degradation products were not present within the edible portions of these samples at detectable concentrations, and energetic materials and their degradation products were detected in only a few samples at concentrations below the laboratory reporting limits. Likewise, arsenic, copper, and lead concentrations were below the United States Food and Drug Administration's permitted concentrations of metals in marine biota tissue (if defined), and their presence within these samples could not be attributed to the presence of DMM within the study area based on a comparative analysis of munitions-adjacent and control samples collected. Based on this current dataset, it can be concluded that DMM existing within the HUMMA study area is not contributing to the bioaccumulation of munitions-related chemicals for the biota species investigated to date.

  15. Computer network defense through radial wave functions

    Science.gov (United States)

    Malloy, Ian J.

    The purpose of this research is to synthesize basic and fundamental findings in quantum computing, as applied to the attack and defense of conventional computer networks. The concept focuses on uses of radio waves as a shield for, and attack against traditional computers. A logic bomb is analogous to a landmine in a computer network, and if one was to implement it as non-trivial mitigation, it will aid computer network defense. As has been seen in kinetic warfare, the use of landmines has been devastating to geopolitical regions in that they are severely difficult for a civilian to avoid triggering given the unknown position of a landmine. Thus, the importance of understanding a logic bomb is relevant and has corollaries to quantum mechanics as well. The research synthesizes quantum logic phase shifts in certain respects using the Dynamic Data Exchange protocol in software written for this work, as well as a C-NOT gate applied to a virtual quantum circuit environment by implementing a Quantum Fourier Transform. The research focus applies the principles of coherence and entanglement from quantum physics, the concept of expert systems in artificial intelligence, principles of prime number based cryptography with trapdoor functions, and modeling radio wave propagation against an event from unknown parameters. This comes as a program relying on the artificial intelligence concept of an expert system in conjunction with trigger events for a trapdoor function relying on infinite recursion, as well as system mechanics for elliptic curve cryptography along orbital angular momenta. Here trapdoor both denotes the form of cipher, as well as the implied relationship to logic bombs.

  16. Biodiversity conservation and armed conflict: a warfare ecology perspective.

    Science.gov (United States)

    Hanson, Thor

    2018-04-23

    The activities involved in preparing for, executing, and recovering from armed conflict are globally pervasive and consequential, with significant impacts on natural systems. Effects on biodiversity are predominantly negative, produced by direct and indirect battlefield impacts, as well as the general breakdown of social, economic, and governance systems during wartime. Certain conservation opportunities do occur, however, particularly on lands set aside for training exercises, buffer zones, and peace parks. Here, the relationship between armed conflict and biodiversity is reviewed using the temporal framework of warfare ecology, which defines warfare as an ongoing process of three overlapping stages: preparations, war (armed conflict), and postwar activities. Several themes emerge from recent studies, including a heightened awareness of biodiversity conservation on military lands, the potential for scientific and conservation engagement to mitigate negative biodiversity impacts in war zones, and the importance of the postwar period for incorporating biodiversity priorities into reconstruction and recovery efforts. Research limitations and knowledge gaps are also discussed. © 2018 New York Academy of Sciences.

  17. Maritime Trade Warfare Against a Modern Power

    Science.gov (United States)

    2013-05-20

    Malaysian and Singaporean support. Operational Environment The previous sections have assessed that an oil embargo would be effective at influencing...will be addressed. The first approach is to stop the trade at its source. This approach forms the foundation of many contemporary sanctions. Under...antisubmarine warfare capable ships, could be sufficient to defend against forces attempting to break a blockade, and a carrier battle group in the Indian Ocean

  18. Toward Operational Art in Special Warfare: Appendixes

    Science.gov (United States)

    2016-01-01

    language, proficiency in small-unit tactics, and the ability to build and fight alongside indigenous combat formations in a permissive, uncertain, or...counterinsurgency through and with indigenous forces or personnel.”1 The report has four aims: (1) to adapt conventional operational art to the unique...perfect near-real-time situational awareness,” at least at the tactical level of land warfare in complex terrain. But the idea of leveraging information

  19. Cyber warfare:terms, issues, laws and controversies

    OpenAIRE

    Seviş, Kamile Nur; Şeker, Ensar

    2016-01-01

    Recent years have shown us the importance of cybersecurity. Especially, when the matter is national security, it is even more essential and crucial. Increasing cyber attacks, especially between countries in governmental level, created a new term cyber warfare. Creating some rules and regulations for this kind of war is necessary therefore international justice systems are working on it continuously. In this paper, we mentioned fundamental terms of cyber...

  20. Tactical aspects of nuclear strategy

    International Nuclear Information System (INIS)

    Van Tonder, A.

    1983-01-01

    The advent of nuclear weapons at the end of the Second World War, caused a revolution in warfare. The article discusses the nature of nuclear warfare and the defense measures that can be employed in the event of a nuclear attack

  1. Biomonitoring of exposure to chemical warfare agents: A review

    NARCIS (Netherlands)

    Noort, D.; Benschop, H.P.; Black, R.M.

    2002-01-01

    In this report an overview of the methods currently available for detection of exposure to a number of chemical warfare agents (CWA), i.e., sulfur mustard, lewisite and nerve agents, is presented. Such methods can be applied for various purposes, e.g., diagnosis and dosimetry of exposure of

  2. Understanding "Understanding" Flow for Network-Centric Warfare: Military Knowledge-Flow Mechanics

    National Research Council Canada - National Science Library

    Nissen, Mark

    2002-01-01

    Network-centric warfare (NCW) emphasizes information superiority for battlespace efficacy, but it is clear that the mechanics of how knowledge flows are just as important as those pertaining to the networks and communication...

  3. Manoeuvre warfare analysis of South Africa's 1914-1915 German ...

    African Journals Online (AJOL)

    The study reported in this article explored the nexus between military theory and history. Military theory attempts to quantify, qualify and illuminate the often unpredictable phenomenon of war. The article consists of two parts: the theory of manoeuvre warfare and the history of the 1914-1915 South African campaign in ...

  4. Potential Science and Technology Game Changers for the Ground Warfare of 2050: Selected Projections Made in 2017

    Science.gov (United States)

    2018-02-01

    ARL-TR-8283 ● FEB 2018 US Army Research Laboratory Potential Science and Technology Game Changers for the Ground Warfare of 2050...Science and Technology Game Changers for the Ground Warfare of 2050: Selected Projections Made in 2017 by Alexander Kott Office of the Director...Brian Sadler Vehicle Technology Directorate, ARL Ananthram Swami Computational and Information Sciences Directorate, ARL Approved for

  5. Management information systems for electronic warfare command and decision support

    CSIR Research Space (South Africa)

    Van Niekerk, B

    2015-04-01

    Full Text Available information to allow them to manage their own spectrum, to identify threats, and to deny adversaries’ use of the spectrum. In this paper, the concepts of integrated electronic warfare and spectrum battle management are introduced, and the relevant information...

  6. Circular from January 26, 2004, taken for the enforcement of the by-law from January 26, 2004, relative to the national defense secrecy protection in the domain of nuclear materials protection and control; Circulaire du 26 janvier 2004 prise pour l'application de l'arrete du 26 janvier 2004 relatif a la protection du secret de la defense nationale dans le domaine de la protection et du controle des matieres nucleaires

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2004-01-15

    The by-law of January 26, 2004 gives a regulatory foundation to the classification of sensible informations relative to the security and physical protection of nuclear materials. This circular recalls, in this framework, the conditions of implementation of the regulation relative to the protection of national defense secrecies in the domain of the protection of nuclear facilities and materials. (J.S.)

  7. Electronic warfare receivers and receiving systems

    CERN Document Server

    Poisel, Richard A

    2014-01-01

    Receivers systems are considered the core of electronic warfare (EW) intercept systems. Without them, the fundamental purpose of such systems is null and void. This book considers the major elements that make up receiver systems and the receivers that go in them.This resource provides system design engineers with techniques for design and development of EW receivers for modern modulations (spread spectrum) in addition to receivers for older, common modulation formats. Each major module in these receivers is considered in detail. Design information is included as well as performance tradeoffs o

  8. Punishment sustains large-scale cooperation in prestate warfare

    Science.gov (United States)

    Mathew, Sarah; Boyd, Robert

    2011-01-01

    Understanding cooperation and punishment in small-scale societies is crucial for explaining the origins of human cooperation. We studied warfare among the Turkana, a politically uncentralized, egalitarian, nomadic pastoral society in East Africa. Based on a representative sample of 88 recent raids, we show that the Turkana sustain costly cooperation in combat at a remarkably large scale, at least in part, through punishment of free-riders. Raiding parties comprised several hundred warriors and participants are not kin or day-to-day interactants. Warriors incur substantial risk of death and produce collective benefits. Cowardice and desertions occur, and are punished by community-imposed sanctions, including collective corporal punishment and fines. Furthermore, Turkana norms governing warfare benefit the ethnolinguistic group, a population of a half-million people, at the expense of smaller social groupings. These results challenge current views that punishment is unimportant in small-scale societies and that human cooperation evolved in small groups of kin and familiar individuals. Instead, these results suggest that cooperation at the larger scale of ethnolinguistic units enforced by third-party sanctions could have a deep evolutionary history in the human species. PMID:21670285

  9. Surface Warfare Officer Retention: Analysis of Individual Ready Reserve Survey Data

    National Research Council Canada - National Science Library

    Stoker, Carol; Crawford, Alice

    2008-01-01

    ... (including morale and lack of mentoring), push both men and women out of the Navy. Nonetheless, the Navy s primary effort to improve retention has been to introduce the Surface Warfare Officer Continuation Pay (SWOCP...

  10. DRES Database of Methods for the Analysis of Chemical Warfare Agents

    National Research Council Canada - National Science Library

    D'Agostino, Paul

    1997-01-01

    .... Update of the database continues as an ongoing effort and the DRES Database of Methods for the Analysis of Chemical Warfare Agents is available panel in hardcopy form or as a softcopy Procite or Wordperfect file...

  11. Nodes and Codes: The Reality of Cyber Warfare

    Science.gov (United States)

    2012-05-17

    respectively. The avionics in Boeing’s 787 Dreamliner require approximately 6.5 million lines of code while the current S-Class Mercedes Benz requires over 20...leaders (demonstrated through outdated policy, theory, and doctrine) and the reality of warfare in 1914 (dictated by innovation, technology , and...or the guidelines to military action codified in doctrine? How are states using the latest technological innovations as violent instruments of

  12. 论国防概念在信息化战争条件下的再认识%Reflection on the definition of national defense in the information-based war

    Institute of Scientific and Technical Information of China (English)

    赵岚

    2012-01-01

      The modernization of national defense has encountered many new issues in the information warfare. Therefore, a fresh recognition and comprehensive interpretation of the concept of national defense is required be it for its objectives or purposes. To enhance the dynamic adaptation of national defense concept to the diverse circumstances, it counts to focus on the subject of national defense and to highlight the idea of sovereignty.%  在信息化战争条件下,目前对国防定义的认识与我国现代国防建设的发展已经出现不相适应的情况,无论是从国防对象还是国防目的来看都有需要重新认识和全新解读的必要。为了适应不断发展的实际变化,回归国防主体,突出主权概念,有利于增强国防定义的动态适应性。

  13. Identification system for chemical warfare agents with PGNAA method

    International Nuclear Information System (INIS)

    Wang Bairong; Yin Guanghua; Yang Zhongpin

    2007-01-01

    The principle and the experimental commanding of Chemical warfare Agents Identification with PGNAA method are discussed in this paper. The choosing of detector, neutron source and the data processing method are detailed. Finally, a set of experimental instruments composed of Cf-232 and BGO detector is developed based on this theory discussed above. (authors)

  14. Nuclear radiation in warfare

    International Nuclear Information System (INIS)

    Rotblat, J.

    1986-01-01

    The subject is covered in chapters, entitled: introduction; digest of nuclear weaponry (characteristics of nuclear weapons; effects of nuclear weapons other than ionizing radiation (fire-ball, fall-out, thermal radiation, blast wave, electromagnetic pulse); the nuclear arms race; war scenarios; biological effects of radiations on man (radiation doses; natural sources of radiation; acute effects of radiation; long-term somatic effects; genetic effects; factors affecting the biological response to radiation; internal exposure; synergistic effects; protection against radiation effects); radiations from nuclear explosions (initial radiation; fall-out; effects of fall-out on animal and plant life; contamination of water and food supplies by fall-out); radiation casualties in a nuclear war; effectiveness of civil defence; other warlike uses of radiation (attacks on civilian nuclear power installations; radiological warfare; terrorist activities); conclusion. (orig./HP) [de

  15. Nuclear radiation in warfare

    International Nuclear Information System (INIS)

    Rotblat, J.

    1981-01-01

    The subject is covered in chapters, entitled: introduction; digest of nuclear weaponry (characteristics of nuclear weapons; effects of nuclear weapons other than ionizing radiation (fire-ball, fall-out, thermal radiation, blast wave, electromagnetic pulse); the nuclear arms race; war scenarios); biological effects of radiations on man (radiation doses; natural sources of radiation; acute effects of radiation; long-term somatic effects; genetic effects; factors affecting the biological response to radiation; internal exposure; synergistic effects; protection against radiation effects); radiations from nuclear explosions (initial radiation; fall-out; effects of fall-out on animal and plant life; contamination of water and food supplies by fall-out); radiation casualties in a nuclear war; effectiveness of civil defence; other warlike uses of radiation (attacks on civilian nuclear power installations; radiological warfare; terrorist activities); conclusion. (U.K.)

  16. Reducing contingent self-worth: a defensive response to self-threats.

    Science.gov (United States)

    Buckingham, Justin; Lam, Tiffany A; Andrade, Fernanda C; Boring, Brandon L; Emery, Danielle

    2018-04-10

    Previous research shows that people with high self-esteem cope with threats to the self by reducing the extent to which their self-worth is contingent on the threatened domain (Buckingham, Weber, & Sypher, 2012). The present studies tested the hypothesis that this is a defensive process. In support of this hypothesis, Study 1 (N = 160), showed that self-affirmation attenuates the tendency for people with high self-esteem to reduce their contingencies of self-worth following self-threat. Furthermore, Study 2 (N = 286), showed that this tendency was more prevalent among people with defensive self-esteem than among those with secure self-esteem. The present studies imply that reducing contingent self-worth after self-threat is a defensive process. We discuss implications for theories of contingent self-worth.

  17. The Primary Role of Fibrinogen-Related Proteins in Invertebrates Is Defense, Not Coagulation

    Science.gov (United States)

    Hanington, Patrick C.; Zhang, Si-Ming

    2010-01-01

    In vertebrates, the conversion of fibrinogen into fibrin is an essential process that underlies the establishment of the supporting protein framework required for coagulation. In invertebrates, fibrinogen-domain-containing proteins play a role in the defense response generated against pathogens; however, they do not function in coagulation, suggesting that this role has been recently acquired. Molecules containing fibrinogen motifs have been identified in numerous invertebrate organisms, and most of these molecules known to date have been linked to defense. Moreover, recent genome projects of invertebrate animals have revealed surprisingly high numbers of fibrinogen-like loci in their genomes, suggesting important and perhaps diverse functions of fibrinogen-like proteins in invertebrates. The ancestral role of molecules containing fibrinogen-related domains (FReDs) with immunity is the focus of this review, with emphasis on specific FReDs called fibrinogen-related proteins (FREPs) identified from the schistosome-transmitting mollusc Biomphalaria glabrata. Herein, we outline the range of invertebrate organisms FREPs can be found in, and detail the roles these molecules play in defense and protection against infection. PMID:21063081

  18. Personal protection during resuscitation of casualties contaminated with chemical or biological warfare agents--a survey of medical first responders.

    Science.gov (United States)

    Brinker, Andrea; Prior, Kate; Schumacher, Jan

    2009-01-01

    The threat of mass casualties caused by an unconventional terrorist attack is a challenge for the public health system, with special implications for emergency medicine, anesthesia, and intensive care. Advanced life support of patients injured by chemical or biological warfare agents requires an adequate level of personal protection. The aim of this study was to evaluate the personal protection knowledge of emergency physicians and anesthetists who would be at the frontline of the initial health response to a chemical/biological warfare agent incident. After institutional review board approval, knowledge of personal protection measures among emergency medicine (n = 28) and anesthetics (n = 47) specialty registrars in the South Thames Region of the United Kingdom was surveyed using a standardized questionnaire. Participants were asked for the recommended level of personal protection if a chemical/biological warfare agent(s) casualty required advanced life support in the designated hospital resuscitation area. The best awareness within both groups was regarding severe acute respiratory syndrome, and fair knowledge was found regarding anthrax, plague, Ebola, and smallpox. In both groups, knowledge about personal protection requirements against chemical warfare agents was limited. Knowledge about personal protection measures for biological agents was acceptable, but was limited for chemical warfare agents. The results highlight the need to improve training and education regarding personal protection measures for medical first receivers.

  19. Efikasnost sistema PVO u uslovima elektronskih dejstava / Efficiency of antiaircraft system in electronic warfare

    Directory of Open Access Journals (Sweden)

    Vladimir V. Šepec

    2007-01-01

    Full Text Available U radu je primenjena teorija masovnog opsluživanja u analizi efikasnosti sistema protivvazduhoplovne odbrane (sistema PVO u uslovima elektronskih dejstava protivnika. Prikazan je model za ocenu efikasnosti sistema PVO i predstavljeni su izrazi za procenu efikasnosti sistema PVO u uslovima elektronskih dejstava. / In this article the theory of mass servicing is used in the analysis of efficiency of antiaircraft system in the conditions of electronic warfare. The model for analysis of the antiaircraft system efficiency has been shown and formulas for qualitative analysis of antiaircraft system efficiency have been presented in the conditions of electronic warfare.

  20. CRUSER's Warfare Innovation Workshop Focused on Hybrid War in the Urban Littorals

    OpenAIRE

    Ehrlich, Michael

    2017-01-01

    News Stories Archive The Naval Postgraduate School (NPS) Consortium for Robotics and Unmanned Systems Education and Research, CRUSER, hosted its annual Warfare Innovation Workshop (WIW) in Glasgow Hall, Sept. 18-21.

  1. Summary of Research 2002

    Science.gov (United States)

    2005-01-01

    rapidly-developing extratropical cyclones that may contain gale-, storm -, or hurricane-force winds (Jones et al., 2002, Harr 2002b), an objective of this...12 Europe and Information Warfare...ABM Treaty, Arms Control, Deterrence, Nuclear Weapons, Missile Defenses EUROPE AND INFORMATION WARFARE David S. Yost, Professor Department

  2. From Douhet to drones, air warfare, and the evolution of targeting

    NARCIS (Netherlands)

    Osinga, F.P.B.; Roorda, M.P.; Ducheine, P.A.L.; Schmitt, M.N.; Osinga, F.P.B.

    2016-01-01

    Through the prism of the experience of air warfare, this chapter identifies key factors that have shaped targeting. These include technological developments, organizational structures, and processes and inter-service competition for scarce resources. Moreover, targeting is informed by perspectives

  3. Information Warfare, Threats and Information Security

    Directory of Open Access Journals (Sweden)

    Dmitriy Nikolaevich Bespalov

    2014-01-01

    Full Text Available The article presents the opposite, but dependent on each other's reality - Revolutionary War information,information security goals and objectives of their study within the scheme "challenge-response", methodological and analytical support, the role of elites and the information society in promoting information security. One of the features of contemporaneityis the global spread of ICT, combined with poor governance and other difficulties in the construction of innovation infrastructures that are based on them in some countries. This leads to the reproduction of threats, primarily related to the ability to use ICT for purposes that are inconsistent with the objectives of maintaining international peace and security, compliance with the principles of non-use of force, non-interference in the internal affairs of states, etc. In this regard, include such terms as "a threat of information warfare", "information terrorism" and so forth. Information warfare, which stay in the policy declared the struggle for existence, and relationships are defined in terms of "friend-enemy", "ours-foreign". Superiority over the opponent or "capture of its territory" is the aim of political activity. And information security, serving activities similar process of political control, including a set of components, is a technology until their humanitarian. From the context and the decision itself is the ratio of the achieved results of information and political influence to the target - a positive image of Russia. Bringing its policy in line with the demands of a healthy public opinion provides conductivity of theauthorities initiatives in the country and increases the legitimacy of the Russian Federation actions in the world.

  4. DefenseLink.mil - Special Report - Soldiers Train with Non-lethal Weapons

    Science.gov (United States)

    Spc. Yevgeniy Popov, a chemical warfare specialist with Headquarters and Headquarters Company, 3rd warfare specialist with Headquarters and Headquarters Company, 3rd Special Troops Battalion, 3rd Brigade , center, a combat engineer with Company A, 3rd Special Troops Battalion, 3rd Brigade Combat Team, 10th

  5. Russian and Chinese Information Warfare: Theory and Practice

    Science.gov (United States)

    2004-06-01

    Integral neurolinguistic programming •Placing essential programs into the conscious or sub- conscious mind •Subconscious suggestions that modify human...Generators of special rays •Optical systems • Neurolinguistic programming •Computer psychotechnology •The mass media •Audiovisual effects •Special effects...Information Warfare: Theory and Practice 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER 6. AUTHOR(S) 5d. PROJECT NUMBER 5e

  6. Recent canadian experience in chemical warfare agent destruction. An overview

    Energy Technology Data Exchange (ETDEWEB)

    McAndless, J.M.

    1995-09-01

    A Canadian chemical warfare agent destruction project (Swiftsure) was recently completed in which stockpiles of aged mustard, lewisite, nerve agents and contaminated scrap metal were incinerated or chemically neutralized in a safe, environmentally-responsible manner. The project scope, destruction technologies, environmental monitoring and public consultation programs are described.

  7. Airpower History and the Cyber Force of the Future: How Organization for the Cyber Domain Outpaced Strategic Thinking and Forgot the Lessons of the Past

    Science.gov (United States)

    2016-06-01

    why the airplane led to the reorganization of air forces within the military. Furthermore, cyberspace forces were organized around a functional...emergence of new technology, the airplane , once opened an entirely new domain in the air that revolutionized warfare. The countries that figured out how to...newspaper articles , courts martial, and press conferences about airpower, and because of these theatrics, senior officials may have become weary of

  8. Destruction of chemical warfare surrogates using a portable atmospheric pressure plasma jet

    Science.gov (United States)

    Škoro, Nikola; Puač, Nevena; Živković, Suzana; Krstić-Milošević, Dijana; Cvelbar, Uroš; Malović, Gordana; Petrović, Zoran Lj.

    2018-01-01

    Today's reality is connected with mitigation of threats from the new chemical and biological warfare agents. A novel investigation of cold plasmas in contact with liquids presented in this paper demonstrated that the chemically reactive environment produced by atmospheric pressure plasma jet (APPJ) is potentially capable of rapid destruction of chemical warfare agents in a broad spectrum. The decontamination of three different chemical warfare agent surrogates dissolved in liquid is investigated by using an easily transportable APPJ. The jet is powered by a kHz signal source connected to a low-voltage DC source and with He as working gas. The detailed investigation of electrical properties is performed for various plasmas at different distances from the sample. The measurements of plasma properties in situ are supported by the optical spectrometry measurements, whereas the high performance liquid chromatography measurements before and after the treatment of aqueous solutions of Malathion, Fenitrothion and Dimethyl Methylphosphonate. These solutions are used to evaluate destruction and its efficiency for specific neural agent simulants. The particular removal rates are found to be from 56% up to 96% during 10 min treatment. The data obtained provide basis to evaluate APPJ's efficiency at different operating conditions. The presented results are promising and could be improved with different operating conditions and optimization of the decontamination process.

  9. 77 FR 36419 - Feasibility of Enumerating “Specially Designed” Components

    Science.gov (United States)

    2012-06-19

    ...) ``chemical warfare (CW) agents;'' or (4) specific ``riot control agents'' listed in ECCN 1A004.a.4. 2. ECCN... and decontamination equipment therefor, designed or modified for defense against'' (1) ``biological...) ``[r]adioactive materials `adapted for use in war;' '' or (3) ``[c]hemical warfare (CW) agents.'' 3...

  10. The Rapier or the Club: The Relationship between Attrition and Maneuver Warfare

    National Research Council Canada - National Science Library

    Springman, Jeffrey A

    2006-01-01

    ...? This project compares the relationship between attrition and maneuver warfare. The study considers whether there are times when wars of attrition should be fought, and whether there are conditions that force wars of attrition...

  11. Nanostructured Metal Oxides for Stoichiometric Degradation of Chemical Warfare Agents

    Czech Academy of Sciences Publication Activity Database

    Štengl, Václav; Henych, Jiří; Janos, P.; Skoumal, M.

    2016-01-01

    Roč. 236, č. 2016 (2016), s. 239-258 ISSN 0179-5953 R&D Projects: GA ČR(CZ) GAP106/12/1116 Institutional support: RVO:61388980 Keywords : chemical warfare agent * metal nanoparticle * unique surface- chemistry * mesoporous manganese oxide Subject RIV: CA - Inorganic Chemistry Impact factor: 3.930, year: 2016

  12. Effects of internal and external factors on the budgeting between defensive and non-defensive responses in Aplysia.

    Science.gov (United States)

    Leod, Kaitlyn A Mac; Seas, Alexandra; Wainwright, Marcy L; Mozzachiodi, Riccardo

    2018-04-25

    Following exposure to aversive stimuli, organisms budget their behaviors by augmenting defensive responses and reducing/suppressing non-defensive behaviors. This budgeting process must be flexible to accommodate modifications in the animal's internal and/or external state that require the normal balance between defensive and non-defensive behaviors to be adjusted. When exposed to aversive stimuli, the mollusk Aplysia budgets its behaviors by concurrently enhancing defensive withdrawal reflexes (an elementary form of learning known as sensitization) and suppressing feeding. Sensitization and feeding suppression are consistently co-expressed following different training protocols and share common temporal domains, suggesting that they are interlocked. In this study, we attempted to uncouple the co-expression of sensitization and feeding suppression using: 1) manipulation of the animal's motivational state through prolonged food deprivation and 2) extended training with aversive stimuli that induces sensitization lasting for weeks. Both manipulations uncoupled the co-expression of the above behavioral changes. Prolonged food deprivation prevented the expression of sensitization, but not of feeding suppression. Following the extended training, sensitization and feeding suppression were co-expressed only for a limited time (i.e., 24 h), after which feeding returned to baseline levels as sensitization persisted for up to seven days. These findings indicate that sensitization and feeding suppression are not interlocked and that their co-expression can be uncoupled by internal (prolonged food deprivation) and external (extended aversive training) factors. The different strategies, by which the co-expression of sensitization and feeding suppression was altered, provide an example of how budgeting strategies triggered by an identical aversive experience can vary depending on the state of the organism. Copyright © 2018 Elsevier B.V. All rights reserved.

  13. Reflections on nuclear warfare

    International Nuclear Information System (INIS)

    Evans, J.P.

    1983-01-01

    The author looks back on his more than 70 years of familiarity with Americans involved in warfare, noting their loyal support for our country's objectives. Drawing on the Einstein equation, his own visits to Hiroshima and Nagasaki, and current literature, he, as a physician, belatedly concurs with those who look on the use of nuclear weapons as irrational and untenable. Their employment under present circumstances would create a ''final epidemic'' to be avoided only by prevention. He suggests that medical perceptions must be considered by our national leaders in assessing the many factors that he hopes will lead to rational answers to this urgent, highly complex, and vital enigma. He cites physicians' efforts to help in finding answers and asks that his colleagues consider the issues with attention to the gravity of the situation and act according to their best judgment

  14. Just War and Postmodern Warfare: A German Case Study

    Science.gov (United States)

    2015-04-01

    warfare construct, Germany is shaping a military concept based on recent conflicts and unfettered by biases of conventional strategies, organizations...remain sovereign while subconsciously evolving toward liberal democratic ideas. In respecting each country’s political sensitivities, Germany’s...before exhausting all diplomatic, economic and information instruments. Whereas the term AU/ACSC/PINSON/AY15 13 “interests” may bias the United

  15. IBR5 Modulates Temperature-Dependent, R Protein CHS3-Mediated Defense Responses in Arabidopsis.

    Directory of Open Access Journals (Sweden)

    Jingyan Liu

    2015-10-01

    Full Text Available Plant responses to low temperature are tightly associated with defense responses. We previously characterized the chilling-sensitive mutant chs3-1 resulting from the activation of the Toll and interleukin 1 receptor-nucleotide binding-leucine-rich repeat (TIR-NB-LRR-type resistance (R protein harboring a C-terminal LIM (Lin-11, Isl-1 and Mec-3 domains domain. Here we report the identification of a suppressor of chs3, ibr5-7 (indole-3-butyric acid response 5, which largely suppresses chilling-activated defense responses. IBR5 encodes a putative dual-specificity protein phosphatase. The accumulation of CHS3 protein at chilling temperatures is inhibited by the IBR5 mutation. Moreover, chs3-conferred defense phenotypes were synergistically suppressed by mutations in HSP90 and IBR5. Further analysis showed that IBR5, with holdase activity, physically associates with CHS3, HSP90 and SGT1b (Suppressor of the G2 allele of skp1 to form a complex that protects CHS3. In addition to the positive role of IBR5 in regulating CHS3, IBR5 is also involved in defense responses mediated by R genes, including SNC1 (Suppressor of npr1-1, Constitutive 1, RPS4 (Resistance to P. syringae 4 and RPM1 (Resistance to Pseudomonas syringae pv. maculicola 1. Thus, the results of the present study reveal a role for IBR5 in the regulation of multiple R protein-mediated defense responses.

  16. Development of Bicarbonate-Activated Peroxide as a Chemical and Biological Warfare Agent Decontaminant

    National Research Council Canada - National Science Library

    Richardson, David E

    2006-01-01

    ...) and other chemistry for the decontamination of chemical and biological warfare agents. The mechanism of formation of the active oxidant, peroxymonocarbonate, has been investigated in detail. New surfoxidants...

  17. The Abbott and Costello Effect: Who's on What, and What's Where When? A Human-Centered Method to Investigate Network Centric Warfare Systems

    National Research Council Canada - National Science Library

    Reed, Derek W

    2007-01-01

    ...), fundamentally changing how warfare is being conducted. Network centric warfare (NCW) systems are being rushed to the field and are offered as a solution for the fog of war and as a way to reduce manpower costs...

  18. Modeling the transport of chemical warfare agents and simulants in polymeric substrates for reactive decontamination

    Science.gov (United States)

    Pearl, Thomas; Mantooth, Brent; Varady, Mark; Willis, Matthew

    2014-03-01

    Chemical warfare agent simulants are often used for environmental testing in place of highly toxic agents. This work sets the foundation for modeling decontamination of absorbing polymeric materials with the focus on determining relationships between agents and simulants. The correlations of agents to simulants must consider the three way interactions in the chemical-material-decontaminant system where transport and reaction occur in polymer materials. To this end, diffusion modeling of the subsurface transport of simulants and live chemical warfare agents was conducted for various polymer systems (e.g., paint coatings) with and without reaction pathways with applied decontamination. The models utilized 1D and 2D finite difference diffusion and reaction models to simulate absorption and reaction in the polymers, and subsequent flux of the chemicals out of the polymers. Experimental data including vapor flux measurements and dynamic contact angle measurements were used to determine model input parameters. Through modeling, an understanding of the relationship of simulant to live chemical warfare agent was established, focusing on vapor emission of agents and simulants from materials.

  19. Inside the Wire: American Security and Cyber Warfare

    Science.gov (United States)

    2017-03-01

    Roberts, Kerry V. " SUN TZU and The Art of Cyber Warfare." Journal of Counterterrorism & Homeland Security International 19, no. 1(Spring 2013): 12-4...12. REPORT TYPE 3. DATES COVERED (From - To) 01-03-2017 Bibliography 4. TITLE AND SUBTITLE Sa. CONTRACT NUMBER Inside the Wire: American Security...MCDERMOTT LIBRARY U.S. AIR FORCE ACADEMY 11. SPONSOR/MONITOR’S REPORT USAF ACADEMY CO 80840-6214 NUMBER(S) Special Bibliography Series # 119 12

  20. Role of Nucleotide-Binding Oligomerization Domain-Containing (NOD 2 in Host Defense during Pneumococcal Pneumonia.

    Directory of Open Access Journals (Sweden)

    Tijmen J Hommes

    Full Text Available Streptococcus (S. pneumoniae is the most common causative pathogen in community-acquired pneumonia. Nucleotide-binding oligomerization domain-containing (NOD 2 is a pattern recognition receptor located in the cytosol of myeloid cells that is able to detect peptidoglycan fragments of S. pneumoniae. We here aimed to investigate the role of NOD2 in the host response during pneumococcal pneumonia. Phagocytosis of S. pneumoniae was studied in NOD2 deficient (Nod2-/- and wild-type (Wt alveolar macrophages and neutrophils in vitro. In subsequent in vivo experiments Nod2-/- and Wt mice were inoculated with serotype 2 S. pneumoniae (D39, an isogenic capsule locus deletion mutant (D39Δcps or serotype 3 S. pneumoniae (6303 via the airways, and bacterial growth and dissemination and the lung inflammatory response were evaluated. Nod2-/- alveolar macrophages and blood neutrophils displayed a reduced capacity to internalize pneumococci in vitro. During pneumonia caused by S. pneumoniae D39 Nod2-/- mice were indistinguishable from Wt mice with regard to bacterial loads in lungs and distant organs, lung pathology and neutrophil recruitment. While Nod2-/- and Wt mice also had similar bacterial loads after infection with the more virulent S. pneumoniae 6303 strain, Nod2-/- mice displayed a reduced bacterial clearance of the normally avirulent unencapsulated D39Δcps strain. These results suggest that NOD2 does not contribute to host defense during pneumococcal pneumonia and that the pneumococcal capsule impairs recognition of S. pneumoniae by NOD2.

  1. From energy-rich phosphate compounds to warfare agents: A review on the chemistry of organic phosphate compounds

    Directory of Open Access Journals (Sweden)

    Luciano Albino Giusti

    2008-12-01

    Full Text Available The chemistry of the phosphorus-oxygen bond is widely used in biological systems in many processes, such as energy transduction and the storage, transmission and expression of genetic information, which are essential to living beings in relation to a wide variety of functions. Compounds containing this bond have been designed for many purposes, ranging from agricultural defense systems, in order to increase food production, to nerve agents, for complaining use in warfare. In this review, features related to the chemistry of organic phosphate compounds are discussed, with particular emphasis on the role of phosphate compounds in biochemical events and in nerve agents. To this aim, the energy-rich phosphate compounds are focused, particularly the mode of their use as energy currency in cells. Historical and recent studies carried out by research groups have tried to elucidate the mechanism of action of enzymes responsible for energy transduction through the use of biochemical studies, enzyme models, and artificial enzymes. Finally, recent studies on the detoxification of nerve agents based on phosphorous esters are presented, and on the utilization of chromogenic and fluorogenic chemosensors for the detection of these phosphate species.

  2. Reforming Acquisition: This Time Must Be Different

    Science.gov (United States)

    2015-04-30

    budget theory. Public Budgeting & Finance, 25, 1–19. Lanchester , F. (1916). Aircraft in warfare : The dawn of the fourth arm. London, England... warfare in the 21st century (4th ed.). New York, NY: Harper Perennial. Enthoven, A., & Smith, K. (2005a). How much is enough? Shaping the defense

  3. Special Operations Forces: C-130 Upgrade Plan Could Help Fix Electronic Warfare Deficiencies

    National Research Council Canada - National Science Library

    1998-01-01

    In response to a concern that threats to the U.S. Special Operations Command's (USSOCOM) aircraft are increasing, while funds available for electronic warfare are decreasing, the General Accounting Office...

  4. Combinatorial Auction Theory Applied to the Selection of Surface Warfare Officer Retention Incentives

    National Research Council Canada - National Science Library

    Denmond, Constance M; Johnson, Derek N; Lewis, Chavius G; Zegley, Christopher R

    2007-01-01

    The purpose of this project is to investigate the potential retention and cost impacts of offering combinations of retention base incentives to members of the Surface Warfare Officer (SWO) community...

  5. Feasibility Study for the Use of Green, Bio-Based, Efficient Reactive Sorbent Material to Neutralize Chemical Warfare Agents

    Science.gov (United States)

    2012-08-02

    REPORT Feasibility study for the use of green, bio-based, efficient reactive sorbent material to neutralize chemical warfare agents 14. ABSTRACT 16...way cellulose, lignin and hemicelluloses interact as well as whole wood dissolution occurs in ILs. The present project was conducted to 1. REPORT...Feasibility study for the use of green, bio-based, efficient reactive sorbent material to neutralize chemical warfare agents Report Title ABSTRACT Over the

  6. A identification system for chemical warfare agents with PGNAA method

    International Nuclear Information System (INIS)

    Wang Bairong; Yin Guanghua; Yang Zhongping

    2006-01-01

    The principle and the experimental commanding of Chemical warfare Agents Identification with PGNAA method are discussed in this paper. The choosing of Detector, neutron source and the data processing method are detailed. Finally, a set of experimental instruments composed of Cf-232 and BGO detector is developed based on the theory discussed above. (authors)

  7. Defense Technology Objectives for the Joint Warfighting Science and Technology Plan and the Defense Technology Area Plan

    National Research Council Canada - National Science Library

    1998-01-01

    .... Technologies such as radar, jet engines, nuclear weapons, night vision, smart weapons, stealth, the Global Positioning System, and vastly more capable information management systems have changed warfare dramatically...

  8. Cultural Competence and the Operational Commander: Moving Beyond Cultural Awareness into Culture-Centric Warfare

    National Research Council Canada - National Science Library

    Karcanes, James A

    2007-01-01

    .... Understanding the different levels of cultural awareness -- cultural consideration, cultural understanding, and cultural competence -- will help usher in a new focus on culture-centric warfare...

  9. Factors influencing environmental attitude: The relationship between environmental attitude defensibility and cognitive reasoning level

    Science.gov (United States)

    Yount, James R.; Horton, Phillip B.

    The purpose of this study was to investigate the relationship between factors believed to contribute to the formation of environmental attitudes by college nonscience majors. Key relationships addressed were the effects of a university environmental studies course on (a) environmental attitudes, (b) the amount of factual information that is brought to bear on an environmental attitude decision (defensibility), and (c) the linkages between the affective and the cognitive domains of freshman and sophomore students. When compared to the control group, the students who attended an environmental studies class did not significantly change their attitudes, but they did exhibit increases in their total [F(3, 132) = 5.91, p cognitive reasoning scores were more prone to increase defensibility [F(6, 129) = 3.78, p cognitive and affective domains in the environmental attitude decision-making process.

  10. Warfare, genocide, and ethnic conflict: a Darwinian approach

    OpenAIRE

    Dimijian, Gregory G.

    2010-01-01

    As the 21st century dawns, I reflect on the history of humankind with growing concern about the need to understand the underlying biological and cultural roots of ethnic conflict and warfare. In the many studies of human conflict, innate biological predispositions have been neglected. This article is the third part of a series of seminars for medical residents at the University of Texas Southwestern Medical School at Dallas (see http://adarwinstudygroup.org/). The series starts with in-depth ...

  11. Investigating the Relationship Between Drone Warfare and Civilian Casualties in Gaza

    Directory of Open Access Journals (Sweden)

    Dr. Ann Rogers

    2014-12-01

    Full Text Available Unmanned aerial vehicles (UAVs, better known as drones, are increasingly touted as ‘humanitarian’ weapons that contribute positively to fighting just wars and saving innocent lives. At the same time, civilian casualties have become the most visible and criticized aspect of drone warfare. It is argued here that drones contribute to civilian casualties not in spite of, but because of, their unique attributes. They greatly extend war across time and space, pulling more potential threats and targets into play over long periods, and because they are low-risk and highly accurate, they are more likely to be used. The assumption that drones save lives obscures a new turn in strategic thinking that sees states such as Israel and the US rely on large numbers of small, highly discriminating attacks applied over time to achieve their objectives. This examination of Israel’s 2014 war in Gaza argues that civilian casualties are not an unexpected or unintended consequence of drone warfare, but an entirely predictable outcome.

  12. Establish an Agent-Simulant Technology Relationship (ASTR)

    Science.gov (United States)

    2017-04-14

    collective protection; CP; decontamination ; decon; contamination avoidance; CA; chemical biological radiological; CBR 16. SECURITY CLASSIFICATION...Within chemical defense, the individual protection (IP), collective protection (CP), decontamination (decon), and contamination avoidance (CA...OT). c. Testing may use chemical warfare agent (CWA), biological warfare agent (BWA), radiological agent, or simulant (surrogate). A simulant is a

  13. Developmental Testing of Liquid and Gaseous/Vaporous Decontamination on Bacterial Spores and Other Biological Warfare Agents on Military Relevant Surfaces

    Science.gov (United States)

    2016-02-11

    Vaporous Decontamination on Bacterial Spores and Other Biological Warfare Agents on Military-Relevant Surfaces 5a. CONTRACT NUMBER 5b. GRANT... DECONTAMINATION ON BACTERIAL SPORES AND OTHER BIOLOGICAL WARFARE AGENTS ON MILITARY-RELEVANT SURFACES Page Paragraph 1. SCOPE...surfaces before and after decontamination . The protocol in this TOP is based on the developed test methodologies from Edgewood Chemical Biological

  14. A new General Purpose Decontamination System for Chemical and Biological Warfare and Terrorism Agents

    National Research Council Canada - National Science Library

    Khetan, Sushil; Banerjee, xdDeboshri; Chanda, Arani; Collins, Terry

    2003-01-01

    Partial contents: Fe-TAML Activator of Peroxide,Activators of Hydrogen peroxide,Biological Warfare Agents,Bacterial Endospore,Bacterial Spore Deactivation,Modeling Studies,Deactivation Studies with Bacillus spores...

  15. MOFwich: Sandwiched Metal-Organic Framework-Containing Mixed Matrix Composites for Chemical Warfare Agent Removal.

    Science.gov (United States)

    Peterson, Gregory W; Lu, Annie X; Hall, Morgan G; Browe, Matthew A; Tovar, Trenton; Epps, Thomas H

    2018-02-28

    This work describes a new strategy for fabricating mixed matrix composites containing layered metal-organic framework (MOF)/polymer films as functional barriers for chemical warfare agent protection. Through the use of mechanically robust polymers as the top and bottom encasing layers, a high-MOF-loading, high-performance-core layer can be sandwiched within. We term this multifunctional composite "MOFwich". We found that the use of elastomeric encasing layers enabled core layer reformation after breakage, an important feature for composites and membranes alike. The incorporation of MOFs into the core layer led to enhanced removal of chemical warfare agents while simultaneously promoting moisture vapor transport through the composite, showcasing the promise of these composites for protection applications.

  16. Defense Business Board

    Science.gov (United States)

    Skip to main content (Press Enter). Toggle navigation Defense Business Board Search Search Defense Business Board: Search Search Defense Business Board: Search Defense Business Board Business Excellence in Defense of the Nation Defense Business Board Home Charter Members Meetings Studies Contact Us The Defense

  17. Department of Defense Chemical and Biological Defense Program. Volume I: Annual Report to Congress

    Science.gov (United States)

    2002-04-01

    nerve agents. * Identified specific gene products that are either enhanced or depressed in the brain following low-level chemical warfare nerve agent...with ample time to properly treat for injury. This model was used to determine that N- acetylcysteine given intraperitoneally increased survival rates in

  18. The Army Ground Forces Training for Mountain and Winter Warfare - Study No. 23

    National Research Council Canada - National Science Library

    Govan, Thomas

    1946-01-01

    This general study of the experiments in mountain and winter warfare training from 1940 to 1944 is designed as an introduction to the histories of the Mountain Training Center and The 10th Mountain...

  19. Conflict Without Casualties: Non-Lethal Weapons in Irregular Warfare

    Science.gov (United States)

    2007-09-01

    the body,” and the Geneva Protocol of 1925, bans the use of chemical and biological weapons .11 On 8 April 1975, President Ford issued Executive...E Funding – PE 63851M) (accessed 15 December 2006). The American Journal of Bioethics . “Medical Ethics and Non-Lethal Weapons .” Bioethics.net...CASUALTIES: NON-LETHAL WEAPONS IN IRREGULAR WARFARE by Richard L. Scott September 2007 Thesis Advisor: Robert McNab Second Reader

  20. Annihilation Prediction for Lanchester-Type Models of Modern Warfare

    OpenAIRE

    Brown, G.G.; Taylor, J.

    1983-01-01

    Operations Research, 31, p.752. This paper introduces important new functions for analytic solution of Launch-ester-type equations of modern warfare for combat between two homogeneous forces modeled by power attrtition-rate coefficients with "no offset". Tabulations of these Lanchester-Clifford-Schlatii (or LCS) functions allow one to study this particular variable-coefficient model almost as easily and thoroughly as Lanchester's classic constant-coefficient one. LCS functions allow one ...

  1. Built to Outlast: Operational Approaches to Hybrid Warfare

    Science.gov (United States)

    2012-05-17

    29Robert T. Ames, Sun Tzu: The Art of War (New York: Ballantine Books, 1993), 78-80; Mao Tse -Tung, On Guerrilla Warfare, trans. Samuel B. Griffith...Chicago: University of Illinois Press, 1961), 25, 42.The works of Sun Tzu and Mao Tse -Tung both illustrate aspects of this concept. In a work...toreador’s cape, not the toreador himself. - Norman B. Hannah, The Key to Failure: Laos and the Vietnam War114 Against the backdrop of the Cold

  2. National Guard Forces in the Cyber Domain

    Science.gov (United States)

    2015-05-22

    TITLE AND SUBTITLE National Guard Forces in the Cyber Domain 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER 6. AUTHOR(S...Soldiers. Army Cyber Command (ARCYBER) commander, Lieutenant General Edward Cardon stated that Guard will begin to build combat power with...90 2014 Quadrennial Defense Review, 15. 91 Ibid. 92 Edward C. Cardon , "ARMY.MIL, The Official Homepage of the United

  3. Laboratory analysis of chemical warfare agents, adducts, and metabolites in biomedial samples

    NARCIS (Netherlands)

    Schans, M.J. van der

    2015-01-01

    Chemical warfare agents (CWAs) are the most toxic compounds ever produced. To develop medical countermeasures against the effects of these agents, analytical procedures to analyze these agents in biological matrices are essential for a better understanding of the toxicological process. The need for

  4. Above the Influence: The Strategic Effects of Airpower in Irregular Warfare

    Science.gov (United States)

    2010-06-01

    INDOCHINA. . . . . . . . . . . . . . . . . . . . . 105 APPENDIX B: MAP OF LAOS . . . . . . . . . . . . . . . . . . . . . . . . . . . 106 APPENDIX...perspectives. These perspectives involve the use of airpower in North Vietnam, South Vietnam, and Laos . The overarching political endstate or...Nagl, ―Principles, Imperatives, and Paradoxes of Counterinsurgency,‖ 50; Mao Tse -Tung, Problems of Strategy in Guerrilla Warfare, 215-216; Gray

  5. [Decontamination of chemical and biological warfare agents].

    Science.gov (United States)

    Seto, Yasuo

    2009-01-01

    Chemical and biological warfare agents (CBWA's) are diverse in nature; volatile acute low-molecular-weight toxic compounds, chemical warfare agents (CWA's, gaseous choking and blood agents, volatile nerve gases and blister agents, nonvolatile vomit agents and lacrymators), biological toxins (nonvolatile low-molecular-weight toxins, proteinous toxins) and microbes (bacteria, viruses, rickettsiae). In the consequence management against chemical and biological terrorism, speedy decontamination of victims, facilities and equipment is required for the minimization of the damage. In the present situation, washing victims and contaminated materials with large volumes of water is the basic way, and additionally hypochlorite salt solution is used for decomposition of CWA's. However, it still remains unsolved how to dispose large volumes of waste water, and the decontamination reagents have serious limitation of high toxicity, despoiling nature against the environments, long finishing time and non-durability in effective decontamination. Namely, the existing decontamination system is not effective, nonspecifically affecting the surrounding non-target materials. Therefore, it is the urgent matter to build up the usable decontamination system surpassing the present technologies. The symposiast presents the on-going joint project of research and development of the novel decontamination system against CBWA's, in the purpose of realizing nontoxic, fast, specific, effective and economical terrorism on-site decontamination. The projects consists of (1) establishment of the decontamination evaluation methods and verification of the existing technologies and adaptation of bacterial organophosphorus hydrolase, (2) development of adsorptive elimination technologies using molecular recognition tools, and (4) development of deactivation technologies using photocatalysis.

  6. International humanitarian law applied to cyber-warfare: Precautions, proportionality and the notion of ‘attack’ under the humanitarian law of armed conflict

    NARCIS (Netherlands)

    Gill, T.D.; Tsagourias, N.; Buchan, R.

    2015-01-01

    This chapter examines the application of international humanitarian law to cyber warfare in the sense of rising to the level of an armed conflict. Building upon the work of the Tallinn Manual on the Application of International Law to Cyber Warfare, it places particular emphasis on the application

  7. JMJ27, an Arabidopsis H3K9 histone demethylase, modulates defense against Pseudomonas syringae and flowering time.

    Science.gov (United States)

    Dutta, Aditya; Choudhary, Pratibha; Caruana, Julie; Raina, Ramesh

    2017-09-01

    Histone methylation is known to dynamically regulate diverse developmental and physiological processes. Histone methyl marks are written by methyltransferases and erased by demethylases, and result in modification of chromatin structure to repress or activate transcription. However, little is known about how histone methylation may regulate defense mechanisms and flowering time in plants. Here we report characterization of JmjC DOMAIN-CONTAINING PROTEIN 27 (JMJ27), an Arabidopsis JHDM2 (JmjC domain-containing histone demethylase 2) family protein, which modulates defense against pathogens and flowering time. JMJ27 is a nuclear protein containing a zinc-finger motif and a catalytic JmjC domain with conserved Fe(II) and α-ketoglutarate binding sites, and displays H3K9me1/2 demethylase activity both in vitro and in vivo. JMJ27 is induced in response to virulent Pseudomonas syringae pathogens and is required for resistance against these pathogens. JMJ27 is a negative modulator of WRKY25 (a repressor of defense) and a positive modulator of several pathogenesis-related (PR) proteins. Additionally, loss of JMJ27 function leads to early flowering. JMJ27 negatively modulates the major flowering regulator CONSTANS (CO) and positively modulates FLOWERING LOCUS C (FLC). Taken together, our results indicate that JMJ27 functions as a histone demethylase to modulate both physiological (defense) and developmental (flowering time) processes in Arabidopsis. © 2017 The Authors The Plant Journal © 2017 John Wiley & Sons Ltd.

  8. Efficacy Evaluation of Current and Future Naval Mine Warfare Neutralization Method

    Science.gov (United States)

    2016-12-01

    ENGINEERING APPROACH Numerous systems engineering process models were considered for this study including the Waterfall , Spiral, and “Vee” models . Given the... model based systems engineering, design of experiments, requirements analysis, mine warfare, MIW, mine countermeasures, MCM, littoral combat ship, LCS...E. IMPLEMENTATION IN SIMULATION MODEL .............................47 VII. MODELING AND SIMULATION ARCHITECTURE ..................................49

  9. The influence of the Ratel infantry fighting vehicle on mobile warfare ...

    African Journals Online (AJOL)

    This article traces the story of how the author and a number of daring young commanders and soldiers had cast aside military textbooks in developing their own military doctrine for mobile warfare, South African style. It is clear that the Ratel infantry fighting vehicle had wielded huge influence on the development and ...

  10. On modeling of the evaporation of chemical warfare agents on the ground

    NARCIS (Netherlands)

    Westin, S.N.; Winter, S.; Karlsson, E.; Hin, A.; Oeseburg, F.

    1998-01-01

    A model for evaporation of chemical warfare agents on the ground has been developed. The process of evaporation is described in three steps: (1) the immediate drop enlargement due to impact momentum is modeled using an empirical correlation from technical literature; (2) further enlargement caused

  11. Ultrasensitive detection of explosives and chemical warfare agents by low-pressure photoionization mass spectrometry.

    Science.gov (United States)

    Sun, Wanqi; Liang, Miao; Li, Zhen; Shu, Jinian; Yang, Bo; Xu, Ce; Zou, Yao

    2016-08-15

    On-spot monitoring of threat agents needs high sensitive instrument. In this study, a low-pressure photoionization mass spectrometer (LPPI-MS) was employed to detect trace amounts of vapor-phase explosives and chemical warfare agent mimetics under ambient conditions. Under 10-s detection time, the limits of detection of 2,4-dinitrotoluene, nitrotoluene, nitrobenzene, and dimethyl methyl phosphonate were 30, 0.5, 4, and 1 parts per trillion by volume, respectively. As compared to those obtained previously with PI mass spectrometric techniques, an improvement of 3-4 orders of magnitude was achieved. This study indicates that LPPI-MS will open new opportunities for the sensitive detection of explosives and chemical warfare agents. Copyright © 2016 Elsevier B.V. All rights reserved.

  12. Metal-organic frameworks for the removal of toxic industrial chemicals and chemical warfare agents.

    Science.gov (United States)

    Bobbitt, N Scott; Mendonca, Matthew L; Howarth, Ashlee J; Islamoglu, Timur; Hupp, Joseph T; Farha, Omar K; Snurr, Randall Q

    2017-06-06

    Owing to the vast diversity of linkers, nodes, and topologies, metal-organic frameworks can be tailored for specific tasks, such as chemical separations or catalysis. Accordingly, these materials have attracted significant interest for capture and/or detoxification of toxic industrial chemicals and chemical warfare agents. In this paper, we review recent experimental and computational work pertaining to the capture of several industrially-relevant toxic chemicals, including NH 3 , SO 2 , NO 2 , H 2 S, and some volatile organic compounds, with particular emphasis on the challenging issue of designing materials that selectively adsorb these chemicals in the presence of water. We also examine recent research on the capture and catalytic degradation of chemical warfare agents such as sarin and sulfur mustard using metal-organic frameworks.

  13. Drone warfare

    Science.gov (United States)

    Gusterson, Hugh

    2017-11-01

    Crude drones existed as early as World War I, but the technology matured in the Yugoslav Wars of the 1990s and the current wars around the Middle East. The U.S. first used a weaponized drone in late 2001, in Afghanistan. Drones may cause more or less civilian casualties depending on the targeting protocols employed by their operators. There is an inherent ambiguity in determining who is an insurgent from several thousand feet, but civilian casualties are likely to be higher if targeters emphasize "signature strikes" over "personality strikes," if they engage in "double-tap strikes," if they rely too much on local informants, and if they rely too heavily on cellphone identification in the absence of corroboration from other intelligence sources. The legality of drone warfare is fairly clear in established battle zones such as Afghanistan, but is more problematic in terms of both international and domestic law when it comes to drone strikes in countries such as Yemen, Pakistan and Somalia with which the U.S. is not at war. Looking to the future, the U.S. would be well advised to sponsor negotiations for an international drone convention that might establish clear international rules for the use of drones, ban autonomous smart drones, and establish adjudicatory procedures to handle allegations of war crimes.

  14. Modeling and Optimal Control of a Class of Warfare Hybrid Dynamic Systems Based on Lanchester (n,1) Attrition Model

    OpenAIRE

    Chen, Xiangyong; Zhang, Ancai

    2014-01-01

    For the particularity of warfare hybrid dynamic process, a class of warfare hybrid dynamic systems is established based on Lanchester equation in a (n,1) battle, where a heterogeneous force of n different troop types faces a homogeneous force. This model can be characterized by the interaction of continuous-time models (governed by Lanchester equation), and discrete event systems (described by variable tactics). Furthermore, an expository discussion is presented on an optimal variable tact...

  15. PRGPred: A platform for prediction of domains of resistance gene analogue (RGA in Arecaceae developed using machine learning algorithms

    Directory of Open Access Journals (Sweden)

    MATHODIYIL S. MANJULA

    2015-12-01

    Full Text Available Plant disease resistance genes (R-genes are responsible for initiation of defense mechanism against various phytopathogens. The majority of plant R-genes are members of very large multi-gene families, which encode structurally related proteins containing nucleotide binding site domains (NBS and C-terminal leucine rich repeats (LRR. Other classes possess' an extracellular LRR domain, a transmembrane domain and sometimes, an intracellular serine/threonine kinase domain. R-proteins work in pathogen perception and/or the activation of conserved defense signaling networks. In the present study, sequences representing resistance gene analogues (RGAs of coconut, arecanut, oil palm and date palm were collected from NCBI, sorted based on domains and assembled into a database. The sequences were analyzed in PRINTS database to find out the conserved domains and their motifs present in the RGAs. Based on these domains, we have also developed a tool to predict the domains of palm R-genes using various machine learning algorithms. The model files were selected based on the performance of the best classifier in training and testing. All these information is stored and made available in the online ‘PRGpred' database and prediction tool.

  16. Diagnosis of Exposure to Chemical Warfare Agents: A Comprehensive Literature Survey 1990-2005

    National Research Council Canada - National Science Library

    Noort, D

    2006-01-01

    This report is an update of TNO report PML 2003-A63. In this report an overview is presented of the methods currently available for detection of exposure to a number of chemical warfare agents (CWA), i.e...

  17. Control Systems Cyber Security:Defense in Depth Strategies

    Energy Technology Data Exchange (ETDEWEB)

    David Kuipers; Mark Fabro

    2006-05-01

    Information infrastructures across many public and private domains share several common attributes regarding IT deployments and data communications. This is particularly true in the control systems domain. A majority of the systems use robust architectures to enhance business and reduce costs by increasing the integration of external, business, and control system networks. However, multi-network integration strategies often lead to vulnerabilities that greatly reduce the security of an organization, and can expose mission-critical control systems to cyber threats. This document provides guidance and direction for developing ‘defense-in-depth’ strategies for organizations that use control system networks while maintaining a multi-tier information architecture that requires: Maintenance of various field devices, telemetry collection, and/or industrial-level process systems Access to facilities via remote data link or modem Public facing services for customer or corporate operations A robust business environment that requires connections among the control system domain, the external Internet, and other peer organizations.

  18. A Comparison of Predictive Thermo and Water Solvation Property Prediction Tools and Experimental Data for Selected Traditional Chemical Warfare Agents and Simulants II: COSMO RS and COSMOTherm

    Science.gov (United States)

    2017-04-01

    SELECTED TRADITIONAL CHEMICAL WARFARE AGENTS AND SIMULANTS II: COSMO-RS AND COSMOTHERM ECBC-TR-1454 Jerry B. Cabalo RESEARCH AND TECHNOLOGY...Traditional Chemical Warfare Agents and Simulants II: COSMO-RS and COSMOTherm 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER CB10115...in the ADF 2012 suite of programs for the physico- chemical properties of a set of traditional chemical warfare agents and selected simulants. To

  19. The Arabidopsis NPR1 Protein Is a Receptor for the Plant Defense Hormone Salicylic Acid

    Directory of Open Access Journals (Sweden)

    Yue Wu

    2012-06-01

    Full Text Available Salicylic acid (SA is an essential hormone in plant immunity, but its receptor has remained elusive for decades. The transcriptional coregulator NPR1 is central to the activation of SA-dependent defense genes, and we previously found that Cys521 and Cys529 of Arabidopsis NPR1's transactivation domain are critical for coactivator function. Here, we demonstrate that NPR1 directly binds SA, but not inactive structural analogs, with an affinity similar to that of other hormone-receptor interactions and consistent with in vivo Arabidopsis SA concentrations. Binding of SA occurs through Cys521/529 via the transition metal copper. Mechanistically, our results suggest that binding of SA causes a conformational change in NPR1 that is accompanied by the release of the C-terminal transactivation domain from the N-terminal autoinhibitory BTB/POZ domain. While NPR1 is already known as a link between the SA signaling molecule and defense-gene activation, we now show that NPR1 is the receptor for SA.

  20. Ge 4+ doped TiO 2 for stoichiometric degradation of warfare agents

    Czech Academy of Sciences Publication Activity Database

    Štengl, Václav; Matys Grygar, Tomáš; Opluštil, F.; Němec, T.

    2012-01-01

    Roč. 227, AUGUST (2012), s. 62-67 ISSN 0304-3894 R&D Projects: GA ČR(CZ) GAP106/12/1116 Institutional support: RVO:61388980 Keywords : germanium * homogeneous hydrolysis * titania * urea * warfare agent degradation Subject RIV: CA - Inorganic Chemistry Impact factor: 3.925, year: 2012

  1. Academic Training Lectures | Stuxnet and Cyber-Warfare | 13-14 January 2016

    CERN Multimedia

    2015-01-01

    Please note that the next series of Academic Training Lectures will take place on 13 and 14 January 2016. The lectures will be given by Gian Piero Siroli (Università e INFN, Bologna (IT))   Stuxnet and Cyber-Warfare (1/2)​ on Wednesday, 13 January from 11 a.m. to 12 p.m. http://indico.cern.ch/event/438525/ Stuxnet and Cyber-Warfare (2/2) on Thursday, 14 January from 11 a.m. to 12 p.m. http://indico.cern.ch/event/438526/ at CERN, Council Chamber (503-1-001)  Description: The first part of the lecture is devoted to the description of the Stuxnet worm, the first cyber-weapon whose existence has been made public, discovered in 2010 and targeting a specific industrial control system; the worm is responsible for the damaging of many centrifuges at an uranium enrichment facility, with the goal of sabotaging Iran&...

  2. Iron-montmorillonite clays as active sorbents for the decontamination of hazardous chemical warfare agents.

    Science.gov (United States)

    Carniato, F; Bisio, C; Evangelisti, C; Psaro, R; Dal Santo, V; Costenaro, D; Marchese, L; Guidotti, M

    2018-02-27

    A class of heterogeneous catalysts based on commercial bentonite from natural origin, containing at least 80 wt% of montmorillonite clay, was designed to transform selectively and under mild conditions toxic organosulfur and organophosphorus chemical warfare agents into non-noxious products with a reduced impact on health and environment. The bentonite from the natural origin was modified by introducing iron species and acid sites in the interlayer space, aiming to obtain a sorbent with strong catalytic oxidising and hydrolytic properties. The catalytic performance of these materials was evaluated in the oxidative abatement of (2-chloroethyl)ethyl sulfide (CEES), a simulant of sulfur mustard, in the presence of aqueous hydrogen peroxide as an oxidant. A new decontamination formulation was, moreover, proposed and obtained by mixing sodium perborate, as a solid oxidant, to iron-bentonite catalysts. Solid-phase decontamination tests, performed on a cotton textile support contaminated with organosulfide and organophosphonate simulant agents revealed the good activity of the solid formulation, especially in the in situ detoxification of blistering agents. Tests carried out on the real blistering warfare agent, sulfur mustard (HD agent), showed that, thanks to the co-presence of the iron-based clay together with the solid oxidant component, a good decontamination of the test surface from the real warfare agent could be achieved (80% contaminant degradation, under ambient conditions, in 24 h).

  3. Defensive Medicine in U.S. Spine Neurosurgery.

    Science.gov (United States)

    Din, Ryan S; Yan, Sandra C; Cote, David J; Acosta, Michael A; Smith, Timothy R

    2017-02-01

    Observational cross-sectional survey. To compare defensive practices of U.S. spine and nonspine neurosurgeons in the context of state medical liability risk. Defensive medicine is a commonly reported and costly phenomenon in neurosurgery. Although state liability risk is thought to contribute greatly to defensive practice, variation within neurosurgical specialties has not been well explored. A validated, online survey was sent via email to 3344 members of the American Board of Neurological Surgeons. The instrument contained eight question domains: surgeon characteristics, patient characteristics, practice type, insurance type, surgeon liability profile, basic surgeon reimbursement, surgeon perceptions of medical legal environment, and the practice of defensive medicine. The overall response rate was 30.6% (n = 1026), including 499 neurosurgeons performing mainly spine procedures (48.6%). Spine neurosurgeons had a similar average practice duration as nonspine neurosurgeons (16.6 vs 16.9 years, P = 0.64) and comparable lifetime case volume (4767 vs 4,703, P = 0.71). The average annual malpractice premium for spine neurosurgeons was similar to nonspine neurosurgeons ($104,480.52 vs $101,721.76, P = 0.60). On average, spine neurosurgeons had a significantly higher rate of ordering labs, medications, referrals, procedures, and imaging solely for liability concerns compared with nonspine neurosurgeons (89.2% vs 84.6%, P = 0.031). Multivariate analysis revealed that spine neurosurgeons were roughly 3 times more likely to practice defensively compared with nonspine neurosurgeons (odds ratio, OR = 2.9, P = 0.001) when controlling for high-risk procedures (OR = 7.8, P < 0.001), annual malpractice premium (OR = 3.3, P = 0.01), percentage of patients publicly insured (OR = 1.1, P = 0.80), malpractice claims in the last 3 years (OR = 1.13, P = 0.71), and state medical-legal environment (OR = 1.3, P = 0

  4. Multifunctional ultra-high vacuum apparatus for studies of the interactions of chemical warfare agents on complex surfaces

    International Nuclear Information System (INIS)

    Wilmsmeyer, Amanda R.; Morris, John R.; Gordon, Wesley O.; Mantooth, Brent A.; Lalain, Teri A.; Davis, Erin Durke

    2014-01-01

    A fundamental understanding of the surface chemistry of chemical warfare agents is needed to fully predict the interaction of these toxic molecules with militarily relevant materials, catalysts, and environmental surfaces. For example, rules for predicting the surface chemistry of agents can be applied to the creation of next generation decontaminants, reactive coatings, and protective materials for the warfighter. Here, we describe a multifunctional ultra-high vacuum instrument for conducting comprehensive studies of the adsorption, desorption, and surface chemistry of chemical warfare agents on model and militarily relevant surfaces. The system applies reflection-absorption infrared spectroscopy, x-ray photoelectron spectroscopy, and mass spectrometry to study adsorption and surface reactions of chemical warfare agents. Several novel components have been developed to address the unique safety and sample exposure challenges that accompany the research of these toxic, often very low vapor pressure, compounds. While results of vacuum-based surface science techniques may not necessarily translate directly to environmental processes, learning about the fundamental chemistry will begin to inform scientists about the critical aspects that impact real-world applications

  5. The potential impact of developments in electronic technology on the future conduct of air warfare, volume 3

    Science.gov (United States)

    1986-12-01

    Advances in microelectronics have resulted in circuit densities many orders of magnitude greater than in current usage, making possible higher speed circuitry and greater storage capacity. RF techniques are also leading to monolithic microwave integrated circuits and microstrip antennas with corresponding reductions in size and weight. In addition, rapid advances are taking place in computer architecture and software that will provide improved information processing and control. This, coupled with progress in artificial intelligence and man-machine interface, offers promise of greatly improved battle management in the cockpit. The scale of changes is such that the nature of air warfare should be significantly affected over the next twenty years. This study examined the potential of electronic technology and potential benefits such as improvements in information processing, reduction in size and weight, increased reliability and maintainability; determined the applicability of such improvements to avionics and command and control systems and such functions as navigation and guidance, communications, surveillance, cockpit engineering and electronic warfare; and examined the impact on air warfare in the time period 2000 to 2010.

  6. Multifunctional ultra-high vacuum apparatus for studies of the interactions of chemical warfare agents on complex surfaces.

    Science.gov (United States)

    Wilmsmeyer, Amanda R; Gordon, Wesley O; Davis, Erin Durke; Mantooth, Brent A; Lalain, Teri A; Morris, John R

    2014-01-01

    A fundamental understanding of the surface chemistry of chemical warfare agents is needed to fully predict the interaction of these toxic molecules with militarily relevant materials, catalysts, and environmental surfaces. For example, rules for predicting the surface chemistry of agents can be applied to the creation of next generation decontaminants, reactive coatings, and protective materials for the warfighter. Here, we describe a multifunctional ultra-high vacuum instrument for conducting comprehensive studies of the adsorption, desorption, and surface chemistry of chemical warfare agents on model and militarily relevant surfaces. The system applies reflection-absorption infrared spectroscopy, x-ray photoelectron spectroscopy, and mass spectrometry to study adsorption and surface reactions of chemical warfare agents. Several novel components have been developed to address the unique safety and sample exposure challenges that accompany the research of these toxic, often very low vapor pressure, compounds. While results of vacuum-based surface science techniques may not necessarily translate directly to environmental processes, learning about the fundamental chemistry will begin to inform scientists about the critical aspects that impact real-world applications.

  7. Multifunctional ultra-high vacuum apparatus for studies of the interactions of chemical warfare agents on complex surfaces

    Energy Technology Data Exchange (ETDEWEB)

    Wilmsmeyer, Amanda R.; Morris, John R. [Department of Chemistry, Virginia Tech, Blacksburg, Virginia 24061 (United States); Gordon, Wesley O.; Mantooth, Brent A.; Lalain, Teri A. [Research and Technology Directorate, U.S. Army Edgewood Chemical Biological Center, Aberdeen Proving Ground, Maryland 21010 (United States); Davis, Erin Durke [OptiMetrics, Inc., Abingdon, Maryland 21009 (United States)

    2014-01-15

    A fundamental understanding of the surface chemistry of chemical warfare agents is needed to fully predict the interaction of these toxic molecules with militarily relevant materials, catalysts, and environmental surfaces. For example, rules for predicting the surface chemistry of agents can be applied to the creation of next generation decontaminants, reactive coatings, and protective materials for the warfighter. Here, we describe a multifunctional ultra-high vacuum instrument for conducting comprehensive studies of the adsorption, desorption, and surface chemistry of chemical warfare agents on model and militarily relevant surfaces. The system applies reflection-absorption infrared spectroscopy, x-ray photoelectron spectroscopy, and mass spectrometry to study adsorption and surface reactions of chemical warfare agents. Several novel components have been developed to address the unique safety and sample exposure challenges that accompany the research of these toxic, often very low vapor pressure, compounds. While results of vacuum-based surface science techniques may not necessarily translate directly to environmental processes, learning about the fundamental chemistry will begin to inform scientists about the critical aspects that impact real-world applications.

  8. Hungarys Alternative to Counter Hybrid Warfare - Small States Weaponized Citizenry

    Science.gov (United States)

    2017-06-09

    said “Resilience as a terminological and operational factor, will become the newest ‘ brand ’ and communication name for the Alliance.”70 He also...audiences to influence their emotions , motives, objective reasoning, and ultimately the behavior of foreign governments, organizations, groups, and...so-called influence warfare. His study pinpointed the importance of emotion over rational facts in messages. Second, Edward Lucas and Ben Nimmo on

  9. Analysis of chemical warfare using a transient semi-Markov formulation.

    OpenAIRE

    Kierzewski, Michael O.

    1988-01-01

    Approved for public release; distribution is unlimited This thesis proposes an analytical model to test various assumptions about conventional/chemical warfare. A unit's status in conventional/chemical combat is modeled as states in a semi-Markov chain with transient and absorbing states. The effects of differing chemical threat levels, availability of decontamination assets and assumed personnel degradation rates on expected unit life and capabilities are tested. The ...

  10. PERMANENCE OF BIOLOGICAL AND CHEMICAL WARFARE AGENTS IN MUNICIPAL SOLID WASTE LANDFILL LEACHATES

    Science.gov (United States)

    The objective of this work is to permit EPA/ORD's National Homeland Security Research Center (NHSRC) and Edgewood Chemical Biological Center to collaborate together to test the permanence of biological and chemical warfare agents in municipal solid waste landfills. Research into ...

  11. The Ecological Domain of Warfare

    Science.gov (United States)

    2004-06-01

    of military performance in terms of e.g., unpredictability, nonlinearity and self organized criticality. [4] The issues of complex interactions...WORK UNIT NUMBER 7. PERFORMING ORGANIZATION NAME(S) AND ADDRESS(ES) Kockums AB,SE-371 82 Karlskrona,Sweden, , 8. PERFORMING ORGANIZATION REPORT...by the architechture for Open Computational Systems itself [Alberts & Hayes (2003)] Author: Jens-Olof Lindh, Security class: UNCLASSIFIED Status

  12. Environmental assessments of sea dumped chemical warfare agents

    DEFF Research Database (Denmark)

    Sanderson, Hans; Fauser, Patrik

    This is a report on the information gathered during work related to sea dumped chemical warfare agents. It mainly reviews the work conducted in relation to the installation of the two Nord Stream gas pipeline from 2008-2012. The focus was on the weight-of-evidence risk assessment of disturbed CWA...... residues in connection with the installation of the pipelines. Novel exposure and toxicity assessments are presented and the risk is assessed. The overall conclusion is that there is a negligible acute added CWA risk towards the fish community from the installation of the pipelines....

  13. Getting the Next War Right: Beyond Population-centric Warfare

    Science.gov (United States)

    2010-06-01

    respectively: Che Guevara and Mao Tse -tung. Che’s foco theory, as we have discussed, advocates mobilizing from the top. The armed challenger chooses an...example, Thomas A. Marks, “Guerrillas in the Mist: Hmong Resistance Continues in Laos ,” Combat and Survival 8, no. 5 (August 1996), 4–11. 12 Theory and...Mao Tse -tung, On Guerrilla Warfare, trans. and ed. Samuel B. Grif!th (Mineola, NY: Dover Publications, 2005). The book is available from a wide

  14. Numerical simulation of RCS for carrier electronic warfare airplanes

    OpenAIRE

    Yue Kuizhi; Liu Wenlin; Li Guanxiong; Ji Jinzu; Yu Dazhao

    2015-01-01

    This paper studies the radar cross section (RCS) of carrier electronic warfare airplanes. Under the typical naval operations section, the mathematical model of the radar wave’s pitch angle incidence range analysis is established. Based on the CATIA software, considering dynamic deflections of duck wing leading edge flaps, flaperons, horizontal tail, and rudder, as well as aircraft with air-to-air missile, anti-radiation missile, electronic jamming pod, and other weapons, the 3D models of carr...

  15. Reevaluation of 1999 Health-Based Environmental Screening Levels (HBESLs) for Chemical Warfare Agents

    Energy Technology Data Exchange (ETDEWEB)

    Watson, Annetta Paule [ORNL; Dolislager, Fredrick G [ORNL

    2007-05-01

    This report evaluates whether new information and updated scientific models require that changes be made to previously published health-based environmental soil screening levels (HBESLs) and associated environmental fate/breakdown information for chemical warfare agents (USACHPPM 1999). Specifically, the present evaluation describes and compares changes that have been made since 1999 to U.S. Environmental Protection Agency (EPA) risk assessment models, EPA exposure assumptions, as well as to specific chemical warfare agent parameters (e.g., toxicity values). Comparison was made between screening value estimates recalculated with current assumptions and earlier health-based environmental screening levels presented in 1999. The chemical warfare agents evaluated include the G-series and VX nerve agents and the vesicants sulfur mustard (agent HD) and Lewisite (agent L). In addition, key degradation products of these agents were also evaluated. Study findings indicate that the combined effect of updates and/or changes to EPA risk models, EPA default exposure parameters, and certain chemical warfare agent toxicity criteria does not result in significant alteration to the USACHPPM (1999) health-based environmental screening level estimates for the G-series and VX nerve agents or the vesicant agents HD and L. Given that EPA's final position on separate Tier 1 screening levels for indoor and outdoor worker screening assessments has not yet been released as of May 2007, the study authors find that the 1999 screening level estimates (see Table ES.1) are still appropriate and protective for screening residential as well as nonresidential sites. As such, risk management decisions made on the basis of USACHPPM (1999) recommendations do not require reconsideration. While the 1999 HBESL values are appropriate for continued use as general screening criteria, the updated '2007' estimates (presented below) that follow the new EPA protocols currently under development

  16. The nuclear immune receptor RPS4 is required for RRS1SLH1-dependent constitutive defense activation in Arabidopsis thaliana.

    Directory of Open Access Journals (Sweden)

    Kee Hoon Sohn

    2014-10-01

    Full Text Available Plant nucleotide-binding leucine-rich repeat (NB-LRR disease resistance (R proteins recognize specific "avirulent" pathogen effectors and activate immune responses. NB-LRR proteins structurally and functionally resemble mammalian Nod-like receptors (NLRs. How NB-LRR and NLR proteins activate defense is poorly understood. The divergently transcribed Arabidopsis R genes, RPS4 (resistance to Pseudomonas syringae 4 and RRS1 (resistance to Ralstonia solanacearum 1, function together to confer recognition of Pseudomonas AvrRps4 and Ralstonia PopP2. RRS1 is the only known recessive NB-LRR R gene and encodes a WRKY DNA binding domain, prompting suggestions that it acts downstream of RPS4 for transcriptional activation of defense genes. We define here the early RRS1-dependent transcriptional changes upon delivery of PopP2 via Pseudomonas type III secretion. The Arabidopsis slh1 (sensitive to low humidity 1 mutant encodes an RRS1 allele (RRS1SLH1 with a single amino acid (leucine insertion in the WRKY DNA-binding domain. Its poor growth due to constitutive defense activation is rescued at higher temperature. Transcription profiling data indicate that RRS1SLH1-mediated defense activation overlaps substantially with AvrRps4- and PopP2-regulated responses. To better understand the genetic basis of RPS4/RRS1-dependent immunity, we performed a genetic screen to identify suppressor of slh1 immunity (sushi mutants. We show that many sushi mutants carry mutations in RPS4, suggesting that RPS4 acts downstream or in a complex with RRS1. Interestingly, several mutations were identified in a domain C-terminal to the RPS4 LRR domain. Using an Agrobacterium-mediated transient assay system, we demonstrate that the P-loop motif of RPS4 but not of RRS1SLH1 is required for RRS1SLH1 function. We also recapitulate the dominant suppression of RRS1SLH1 defense activation by wild type RRS1 and show this suppression requires an intact RRS1 P-loop. These analyses of RRS1SLH1 shed

  17. PRINCIPLES OF THE SYSTEM OF "CUSTOMIZABLE” DEFENSE ON THE FULL BASKETBALL COURT

    Directory of Open Access Journals (Sweden)

    Pavle Rubin

    2010-09-01

    Full Text Available The problem of this work stems from the fact that the tactics (not just applications, but also to create the principles of basketball games and variants belongs to the domain experts of this sport (coaches, theorists, etc.. Every devising, selecting and applying specific tactics should satisfy two main objectives, to: be the greater surprise and provide adequate "response" to the opponent's tactics. The possibility of surprising opponent is primarily associated with the phase of defense, till firstly from an offense is expected to find and implement an adequate solution ("response". Prerequisite that this defense could be successfully adopted is that the players (they know, and they can play quality individual defense (one - on - one. Another prerequisite is that the basketball players fully adopted the principles of the system: zone pressing and "man to man" (variations of "pressing" on the full court. The defense in the foul court is, even more demanding because of the space that is defended, which allows players to adapt to the possible, at least the first time, adequate "response" on offense.

  18. Cerium oxide for the destruction of chemical warfare agents: A comparison of synthetic routes

    Czech Academy of Sciences Publication Activity Database

    Janos, P.; Henych, Jiří; Pelant, O.; Pilařová, V.; Vrtoch, L.; Kormunda, M.; Mazanec, K.; Štengl, Václav

    2016-01-01

    Roč. 304, MAR (2016), s. 259-268 ISSN 0304-3894 Institutional support: RVO:61388980 Keywords : Cerium oxide * Chemical warfare agents * Organophosphate compounds * Decontamination Subject RIV: CA - Inorganic Chemistry Impact factor: 6.065, year: 2016

  19. OFFICER AND COMMANDER IN ASYMMETRIC WARFARE OPERATIONS

    Directory of Open Access Journals (Sweden)

    Giuseppe CAFORIO

    2013-01-01

    Full Text Available Starting from the data of a field research conducted among soldiers with asymmetric warfare experiences from nine different countries, the author seeks to identify and shed light on the various problems that officers with command responsibilities had to face during their missions. A picture emerges of feelings and experiences relating to their first impression upon arriving in the theatre, relations with local armed forces, relations with the local population and local authorities, relations with NGOs, relations with other armies, the impact of the rules of engagement (ROEs, training and education, and operational experiences. The paper ends with a discussion of the lessons learned.

  20. Textile/metal-organic-framework composites as self-detoxifying filters for chemical-warfare agents.

    Science.gov (United States)

    López-Maya, Elena; Montoro, Carmen; Rodríguez-Albelo, L Marleny; Aznar Cervantes, Salvador D; Lozano-Pérez, A Abel; Cenís, José Luis; Barea, Elisa; Navarro, Jorge A R

    2015-06-01

    The current technology of air-filtration materials for protection against highly toxic chemicals, that is, chemical-warfare agents, is mainly based on the broad and effective adsorptive properties of hydrophobic activated carbons. However, adsorption does not prevent these materials from behaving as secondary emitters once they are contaminated. Thus, the development of efficient self-cleaning filters is of high interest. Herein, we report how we can take advantage of the improved phosphotriesterase catalytic activity of lithium alkoxide doped zirconium(IV) metal-organic framework (MOF) materials to develop advanced self-detoxifying adsorbents of chemical-warfare agents containing hydrolysable P-F, P-O, and C-Cl bonds. Moreover, we also show that it is possible to integrate these materials onto textiles, thereby combining air-permeation properties of the textiles with the self-detoxifying properties of the MOF material. © 2015 WILEY-VCH Verlag GmbH & Co. KGaA, Weinheim.

  1. Thought about Strategic Demonstration Simulation Warfare Experiment%关于战略级推演模拟型作战实验的思考

    Institute of Scientific and Technical Information of China (English)

    周绍亮; 李雄; 董斐; 付佳

    2011-01-01

    Abstract:Based on classification of warfare experiments, the concept of strategic demonstration simulation warfare experiment is defined. From the standpoint of establishment of national strategic goals, grasping of international situation and education of joint operation command talents, the function and signification of strategic demonstration simulation warfare experiment are discussed. The basic requirements on military strategic policy, coordinated development of army construction and military operations, warfare lab and warfare experiment technologies are analyzed. The strategic demonstration simulation warfare lab is designed by presenting its functional framework, logic concept framework and running mode. The research results provide theoretical reference to promoting innovation development of warfare experiment.%摘要:在划分作战实验类别的基础上,界定了战略级推演模拟型作战实验的基本概念;从国家战略目标确立、国际局势把握、联合作战指挥人才培养的角度,阐述了战略级推演模拟型作战实验的作用及意义;从以军事战略方针为指导、与军队建设和军事作战协调发展、以作战实验机构为依托、以作战实验技术手段为支撑的角度,分析了战略级推演模拟型作战实验的基本要求;从功能结构、逻辑概念结构、运行模式的角度,进行了战略级推演模拟型作战实验室的初步设计。研究结果可为推动作战实验的创新发展提供理论参考。

  2. The concept of guerrilla warfare in Lithuania in the 1920—1930s

    Directory of Open Access Journals (Sweden)

    Jokubauskas Vytautas

    2012-03-01

    Full Text Available This article analyses the military and tactical training of the members of the Lithuanian Riflemen’s Union for guerrilla warfare in the interwar period. Small nations, such as Lithuania and other Baltic states, being unable to build up military strength in order to ensure national security, were forced to seek for unconventional methods of warfare, including guerrilla strategies. The study places emphasis on the development of the guerrilla war concept in the Union periodicals. The author retraces a change in the intensity of the guerrilla warfare concept propagation amongst Lithuanian population and riflemen, in particular, through publications in the Trimitas — a periodical of the Lithuanian Riflemen’s Union. The author also identifies the narratives associated with the guerrilla matters employed for propaganda purposes in order to create an image of a guerrilla as a defender of the Homeland — Lithuania. Additionally, the structure and numbers of the Union are analysed through a comparison with similar organisations of the other «small nations» of the Baltic North-East. The author addresses the issue of military missions planned by the Lithuanian Army, as well as the way riflemen implemented them. Since the Union did not only offer military training, but was also engaged in the patriotic propaganda, the article focuses on the network of cultural institutions, homes of riflemen, orchestras, libraries, choirs, and athletic clubs used by the Union. The article sets out to establish whether the loss of Lithuanian sovereignty could have been possible without giving rise to a protracted guerrilla war.

  3. Talking About Defense: Leathernecks in Lab Coats

    National Research Council Canada - National Science Library

    Wilson, George

    2002-01-01

    .... Anderson is not the typical bunker-charging, poster-boy Marine. An internationally known authority on new kinds of warfare, Anderson more resembles a militarized Thomas Edison, an experimenter in the science of war...

  4. Fluorescent discrimination between traces of chemical warfare agents and their mimics.

    Science.gov (United States)

    Díaz de Greñu, Borja; Moreno, Daniel; Torroba, Tomás; Berg, Alexander; Gunnars, Johan; Nilsson, Tobias; Nyman, Rasmus; Persson, Milton; Pettersson, Johannes; Eklind, Ida; Wästerby, Pär

    2014-03-19

    An array of fluorogenic probes is able to discriminate between nerve agents, sarin, soman, tabun, VX and their mimics, in water or organic solvent, by qualitative fluorescence patterns and quantitative multivariate analysis, thus making the system suitable for the in-the-field detection of traces of chemical warfare agents as well as to differentiate between the real nerve agents and other related compounds.

  5. Analysis of the Threat of Genetically Modified Organisms for Biological Warfare

    Science.gov (United States)

    2011-05-01

    biological warfare. The primary focus of the framework are those aspects of the technology directly affecting humans by inducing virulent infectious disease...applications. Simple organisms such as fruit flies have been used to study the effects of genetic changes across generations. Transgenic mice are...Analysis * Multi-cell pathogens * Toxins (Chemical products of living cells.) * Fungi (Robust organism; no genetic manipulation needed

  6. Irregular Warfare Centric Foreign Internal Defense

    Science.gov (United States)

    2013-06-01

    ransacking homes, humiliating automobile occupants during searches and harassment of pedestrians on the streets.87 The Commission of Human Rights ruled...the surface often appears reactive and inconsistent, both Labour and Conservative governments have consistently adhered to a set of basic principles

  7. Defensive medicine among neurosurgeons in the Netherlands: a national survey.

    Science.gov (United States)

    Yan, Sandra C; Hulsbergen, Alexander F C; Muskens, Ivo S; van Dam, Marjel; Gormley, William B; Broekman, Marike L D; Smith, Timothy R

    2017-12-01

    In defensive medicine, practice is motivated by legal rather than medical reasons. Previous studies have analyzed the correlation between perceived medico-legal risk and defensive behavior among neurosurgeons in the United States, Canada, and South Africa, but not yet in Europe. The aim of this study is to explore perceived liability burdens and self-reported defensive behaviors among neurosurgeons in the Netherlands and compare their practices with their non-European counterparts. A survey was sent to 136 neurosurgeons. The survey included questions from several domains: surgeon characteristics, patient demographics, type of practice, surgeon liability profile, policy coverage, defensive practices, and perception of the liability environment. Survey responses were analyzed and summarized. Forty-five neurosurgeons filled out the questionnaire (response rate of 33.1%). Almost half (n = 20) reported paying less than 5% of their income to annual malpractice premiums. Nearly all respondents view their insurance premiums as a minor or no burden (n = 42) and are confident that in their coverage is sufficient (n = 41). Most neurosurgeons (n = 38) do not see patients as "potential lawsuits". Relative to their American peers, Dutch neurosurgeons view their insurance premiums as less burdensome, their patients as a smaller legal threat, and their practice as less risky in general. They are sued less often and engage in fewer defensive behaviors than their non-European counterparts. The medico-legal climate in the Netherlands may contribute to this difference.

  8. The Modern Space Domain: On the Eve of Weaponization

    Science.gov (United States)

    2018-04-09

    Space Warfighting Domain; Weaponization of Space; Space history UNCLAS UNCLAS UNCLAS UNCLAS; Unlimited 59 Mark A. Hauser 618-795-3900 NATIONAL DEFENSE...humans have traced history and made scientific discoveries. Man has touched the moon and seeks interplanetary journeys. Space has inspired many...open to national security engagement. The United States responded to the Soviet advances by developing technology for satellite employment, space

  9. A Comparison of Neutron-Based Non-Destructive Assessment Methods for Chemical Warfare Material and High Explosives

    International Nuclear Information System (INIS)

    Seabury, E. H.; Chichester, D. L.; Wharton, C. J.; Caffrey, A. J.

    2009-01-01

    Prompt Gamma Neutron Activation Analysis (PGNAA) systems employ neutrons as a probe to interrogate items, e.g. chemical warfare materiel-filled munitions. The choice of a neutron source in field-portable systems is determined by its ability to excite nuclei of interest, operational concerns such as radiological safety and ease-of-use, and cost. Idaho National Laboratory's PINS Chemical Assay System has traditionally used a 252 Cf isotopic neutron source, but recently a deuterium-tritium (DT) electronic neutron generator (ENG) has been tested as an alternate neutron source. This paper presents the results of using both of these neutron sources to interrogate chemical warfare materiel (CWM) and high explosive (HE) filled munitions.

  10. A model for warfare in stratified small-scale societies: The effect of within-group inequality

    Science.gov (United States)

    Pandit, Sagar; van Schaik, Carel

    2017-01-01

    In order to predict the features of non-raiding human warfare in small-scale, socially stratified societies, we study a coalitionary model of war that assumes that individuals participate voluntarily because their decisions serve to maximize fitness. Individual males join the coalition if war results in a net economic and thus fitness benefit. Within the model, viable offensive war ensues if the attacking coalition of males can overpower the defending coalition. We assume that the two groups will eventually fuse after a victory, with ranks arranged according to the fighting abilities of all males and that the new group will adopt the winning group’s skew in fitness payoffs. We ask whether asymmetries in skew, group size and the amount of resources controlled by a group affect the likelihood of successful war. The model shows, other things being equal, that (i) egalitarian groups are more likely to defeat their more despotic enemies, even when these are stronger, (ii) defection to enemy groups will be rare, unless the attacked group is far more despotic than the attacking one, and (iii) genocidal war is likely under a variety of conditions, in particular when the group under attack is more egalitarian. This simple optimality model accords with several empirically observed correlations in human warfare. Its success underlines the important role of egalitarianism in warfare. PMID:29228014

  11. Mass Spectrometric Determination of Chemical Warfare Agents in Indoor Sample Media Typically Collected During Forensic Investigations

    National Research Council Canada - National Science Library

    D'Agostino, P. A; Hancock, J. R; Chenier, C. L

    2005-01-01

    .... DRDC Suffield, in collaboration with the Royal Canadian Mounted Police, identified a need for analytical methods for chemical warfare agent identification in media, including flooring, wall surfaces...

  12. The Short-Term Effect of Chest Physiotherapy on Spirometric Indices in Chemical Warfare Victims Exposed to Mustard Gas

    Directory of Open Access Journals (Sweden)

    A Abedi

    2008-12-01

    Full Text Available ABCTRACT Introduction & Objective: Chronic respiratory diseases are the most prevalent late sequels of sulfur mustard gas injury among Iranian chemical warfare victims. Chest physiotherapy is one of the useful methods in care, cure and infection prevention of these patients. The aim of this study was to determine the short-term effect of chest physiotherapy on spirometric indices in chemical warfare victims exposed to sulfur mustard gas. Materials & Methods: In this study, 27 of the chemical warfare victims with respiratory diseases were selected. Chest physiotherapy including postural drainage percussion and vibration were used in four positions for all patients. Pulmonary function test (PFT was obtained before (baseline, immediately and 20 minute after the chest physiotherapy. The SPSS software was used for the data analysis of the collected data. Results: Results of this study showed the significant effect (p<0.01 of chest physiotherapy upon forced expiratory volume in first second (FEV1 (baseline mean, 44.19 immediately after intervention mean 47.3 and 20 minute after intervention mean 48.3 and forced vital capacity (FVC (baseline mean, 69.37 immediately after intervention mean, 73.67 20 minute after intervention 75.74. Chest physiotherapy had significant effect (p<0.01 in asthmatic bronchitis group and also had significant effect (p<0.05 in both severe and moderate groups. Conclusion: Chest physiotherapy was able to improve pulmonary function test indices in chemical warfare victims suffering from respiratory problems. The effect on asthmatic bronchitis group, as well as both severe and moderate groups, was significant.

  13. Ultraviolet Raman scattering from persistent chemical warfare agents

    Science.gov (United States)

    Kullander, Fredrik; Wästerby, Pär.; Landström, Lars

    2016-05-01

    Laser induced Raman scattering at excitation wavelengths in the middle ultraviolet was examined using a pulsed tunable laser based spectrometer system. Droplets of chemical warfare agents, with a volume of 2 μl, were placed on a silicon surface and irradiated with sequences of laser pulses. The Raman scattering from V-series nerve agents, Tabun (GA) and Mustard gas (HD) was studied with the aim of finding the optimum parameters and the requirements for a detection system. A particular emphasis was put on V-agents that have been previously shown to yield relatively weak Raman scattering in this excitation band.

  14. Air Warfare

    Science.gov (United States)

    2002-03-01

    genus as its predecessor of pre-war days. It would, however, be erroneous to conclude from this that the military value of each new development was...the paucity of communications, its conduct, when acting alone, has of necessity to be somewhat stereotyped in nature, and to con- form to a pre...the air, the attack commander, provided his command be equipped with defensive air power, has a rôle to perform which is simple and stereotyped in

  15. Diagnosis of exposure to chemical warfare agents: An essential tool to counteract chemical terrorism

    NARCIS (Netherlands)

    Noort, D.; Schans, M.J. van der; Bikker, F.J.; Benschop, H.P.

    2009-01-01

    Methods to analyze chemical warfare agents (CW-agents) and their decomposition products in environmental samples were developed over the last decades. In contrast herewith, procedures for analysis in biological samples have only recently been developed. Retrospective detection of exposure to

  16. Network Centric Warfare Case Study: U.S. V Corps and 3rd Infantry Division (Mechanized) During Operation Iraqi Freedom Combat Operations (Mar-Apr 2003). Volume 3. Network Centric Warfare Insights

    Science.gov (United States)

    2003-01-01

    OPSEC), military deception, psychological operations (PSYOPS), special information operations (IO), information assurance, physical security...nonlethal effects, such as operational 8 Network Centric Warfare Case Study security (OPSEC), military deception, psychological operations (PSYOP...Support Operations Group ASR Alternate Supply Route; or, Ammunition Supply Rate ATACMS Army Tactical Missile System ATARS Advanced

  17. Evaluating the Appropriateness and Use of Domain Critical Errors

    Directory of Open Access Journals (Sweden)

    Chad W. Buckendahl

    2012-10-01

    Full Text Available The consequences associated with the uses and interpretations of scores for many credentialing testing programs have important implications for a range of stakeholders. Within licensure settings specifically, results from examination programs are often one of the final steps in the process of assessing whether individuals will be allowed to enter practice. This article focuses on the concept of domain critical errors and suggests a framework for considering their use in practice. Domain critical errors are defined here as knowledge, skills, abilities, or judgments that are essential to the definition of minimum qualifications in a testing program's pass-'fail decision-making process. Using domain critical errors has psychometric and policy implications, particularly for licensure programs that are mandatory for entry-level practice. Because these errors greatly influence pass-'fail decisions, the measurement community faces an ongoing challenge to promote defensible practices while concurrently providing assessment literacy development about the appropriate design and use of testing methods like domain critical errors.

  18. Hybrid Warfare Dilemmas in the Middle Colonies during the American Revolution

    Science.gov (United States)

    2017-05-25

    north.51 Washington urged Lee “to push for Philadelphia. The force I have with me is infinitely ...would attend the passage of the River by a march through Jersey,” he wrote, “I propose to invade Pennsylvania by sea , and from this arrangement...Hybrid Warfare Dilemmas in the Middle Colonies during the American Revolution A Monograph by MAJ William C. Murray II US Army

  19. Comparison of Selected Methods for Individual Decontamination of Chemical Warfare Agents

    OpenAIRE

    Tomas Capoun; Jana Krykorkova

    2014-01-01

    This study addresses the individual decontamination of chemical warfare agents (CWA) and other hazardous substances. The individual decontamination applies to contaminated body surfaces, protective clothing and objects immediately after contamination, performed individually or by mutual assistance using prescribed or improvised devices. The article evaluates the importance of individual decontamination, security level for Fire and Rescue Service Units of the Czech Republic (FRS CR) and demons...

  20. Dynamic defense workshop :

    Energy Technology Data Exchange (ETDEWEB)

    Crosby, Sean Michael; Doak, Justin E.; Haas, Jason Juedes.; Helinski, Ryan; Lamb, Christopher C.

    2013-02-01

    On September 5th and 6th, 2012, the Dynamic Defense Workshop: From Research to Practice brought together researchers from academia, industry, and Sandia with the goals of increasing collaboration between Sandia National Laboratories and external organizations, de ning and un- derstanding dynamic, or moving target, defense concepts and directions, and gaining a greater understanding of the state of the art for dynamic defense. Through the workshop, we broadened and re ned our de nition and understanding, identi ed new approaches to inherent challenges, and de ned principles of dynamic defense. Half of the workshop was devoted to presentations of current state-of-the-art work. Presentation topics included areas such as the failure of current defenses, threats, techniques, goals of dynamic defense, theory, foundations of dynamic defense, future directions and open research questions related to dynamic defense. The remainder of the workshop was discussion, which was broken down into sessions on de ning challenges, applications to host or mobile environments, applications to enterprise network environments, exploring research and operational taxonomies, and determining how to apply scienti c rigor to and investigating the eld of dynamic defense.

  1. Technical Soddi Defenses: The Trojan Horse Defense Revisited

    Directory of Open Access Journals (Sweden)

    Chad Steel

    2014-12-01

    Full Text Available In 2004, the Trojan horse defense was at a crossroads, with two child pornography cases where it was successfully employed in the United Kingdom, resulting in acquittals.  The original Trojan horse defense has now become part of the more general “technical SODDI” defense, which includes the possibility of unknown actors using unsecured Wi-Fi connections or having physical access to a computer to perform criminal acts.  In the past ten years, it has failed to be effective in the United States for criminal cases, with no published acquittals in cases where it was the primary defense.  In the criminal cases where it has been used as leverage in plea negotiations, there has been either poor forensics performed by the prosecution or political pressure to resolve a matter.  On the civil side, however, the defense has been wildly successful, effectively shutting down large John Doe copyright infringement litigation against non-commercial violators.  

  2. Toxoplasma gondii GRA7-Targeted ASC and PLD1 Promote Antibacterial Host Defense via PKCα.

    Science.gov (United States)

    Koh, Hyun-Jung; Kim, Ye-Ram; Kim, Jae-Sung; Yun, Jin-Seung; Jang, Kiseok; Yang, Chul-Su

    2017-01-01

    Tuberculosis is a global health problem and at least one-third of the world's population is infected with Mycobacterium tuberculosis (MTB). MTB is a successful pathogen that enhances its own intracellular survival by inhibiting inflammation and arresting phago-lysosomal fusion. We previously demonstrated that Toxoplasma gondii (T. gondii) dense granule antigen (GRA) 7 interacts with TNF receptor-associated factor 6 via Myeloid differentiation primary response gene 88, enabling innate immune responses in macrophages. To extend these studies, we found that GRA7 interacts with host proteins involved in antimicrobial host defense mechanisms as a therapeutic strategy for tuberculosis. Here, we show that protein kinase C (PKC)α-mediated phosphorylation of T. gondii GRA7-I (Ser52) regulates the interaction of GRA7 with PYD domain of apoptosis-associated speck-like protein containing a carboxy-terminal CARD, which is capable of oligomerization and inflammasome activation can lead to antimicrobial defense against MTB. Furthermore, GRA7-III interacted with the PX domain of phospholipase D1, facilitating its enzyme activity, phago-lysosomal maturation, and subsequent antimicrobial activity in a GRA7-III (Ser135) phosphorylation-dependent manner via PKCα. Taken together, these results underscore a previously unrecognized role of GRA7 in modulating antimicrobial host defense mechanism during mycobacterial infection.

  3. Toxoplasma gondii GRA7-Targeted ASC and PLD1 Promote Antibacterial Host Defense via PKCα.

    Directory of Open Access Journals (Sweden)

    Hyun-Jung Koh

    2017-01-01

    Full Text Available Tuberculosis is a global health problem and at least one-third of the world's population is infected with Mycobacterium tuberculosis (MTB. MTB is a successful pathogen that enhances its own intracellular survival by inhibiting inflammation and arresting phago-lysosomal fusion. We previously demonstrated that Toxoplasma gondii (T. gondii dense granule antigen (GRA 7 interacts with TNF receptor-associated factor 6 via Myeloid differentiation primary response gene 88, enabling innate immune responses in macrophages. To extend these studies, we found that GRA7 interacts with host proteins involved in antimicrobial host defense mechanisms as a therapeutic strategy for tuberculosis. Here, we show that protein kinase C (PKCα-mediated phosphorylation of T. gondii GRA7-I (Ser52 regulates the interaction of GRA7 with PYD domain of apoptosis-associated speck-like protein containing a carboxy-terminal CARD, which is capable of oligomerization and inflammasome activation can lead to antimicrobial defense against MTB. Furthermore, GRA7-III interacted with the PX domain of phospholipase D1, facilitating its enzyme activity, phago-lysosomal maturation, and subsequent antimicrobial activity in a GRA7-III (Ser135 phosphorylation-dependent manner via PKCα. Taken together, these results underscore a previously unrecognized role of GRA7 in modulating antimicrobial host defense mechanism during mycobacterial infection.

  4. 关于国防生专业知识学习的认知与思考%Cognition and Thinking about the Professional Knowledge Learning of National Defense Students

    Institute of Scientific and Technical Information of China (English)

    刘洋

    2016-01-01

    依托普通高等教育培养军队干部是我军为适应信息化战争对人才的需求做出的重要举措。然而现实中,国防生总体学习情况并不理想。解决国防生专业学习问题,进一步提高人才培养质量,对服务国防现代化建设具有重要意义。本文从分析现象产生原因出发,提出具体的解决方案,论述国防生在校期间学习问题。%Cultivating military cadres depending on higher education is an important measure. It fits in with the demand that our military needs talents in IT-based warfare. But in reality, the overall learning of national defense students is not ideal. This paper is aimed at solving learning problems of national defense students in their major, thus further improving the quality of talent development, which is of great significance to national defense modernization construction. Based on analyzing causes of the situation, the paper puts forward specific solutions and deals with the learning problems of national defense students in college.

  5. Improving Blood Monitoring of Enzymes as Biomarkers of Risk from Anticholinergic Pesticides and Chemical Warfare Agents

    National Research Council Canada - National Science Library

    Wilson, Barry W

    2006-01-01

    Blood biomarkers are an important way to monitor exposure to anticholinergic pesticides and chemical warfare agents and to establish whether some personnel are at greater risk than others from exposure...

  6. Improving Blood Monitoring of Enzymes as Biomarkers of Risk from Anticholinergic Pesticides and Chemical Warfare Agents

    National Research Council Canada - National Science Library

    Wilson, Barry W

    2005-01-01

    Blood biomarkers are an important way to monitor exposure to anticholinergic pesticides and chemical warfare agents and to establish whether some personnel are at greater risk than others from exposure...

  7. JPRS Report China

    National Research Council Canada - National Science Library

    1988-01-01

    Partial Contents: Labor, Deployment, Transportation, Road Tolls, Farm Loans, Land Management, Oil Crops, Military, Public Security, Strategic, Warfare, Armed Forces, Economics, Civil Defense, Reserve Logistics...

  8. Defense AT&L (Volume 37, Number 3, May-June 2008)

    Science.gov (United States)

    2008-06-01

    software in countless critical applications like the Berke - ley Internet Name Domain software that provides name resolution on DoD networks and the global...needs, that expense represents an inefficiency that is either paid for by the taxpayers or by the stockholders of the corporation . The defense...security is the drug trade and narco-terrorism. Drug revenues finance and equip terrorists and insurgents, so if the movement of drugs can be interdicted

  9. Attacking the infrastructure: exploring potential uses of offensive information warfare

    OpenAIRE

    Elam, Donald Emmett.

    1996-01-01

    The world has entered the Third Wave; it has entered the Information Age. One of the fundamentals of this paradigm shift is the fact that information is power. The side that controls information more effectively will be victorious. Thus, countries and militaries must change their mentality in order to survive. A new form of conflict, Information Warfare, has been born. This new discipline is large, dynamic, and complex. The need exists for education among military officers and other concerned...

  10. (Review of) Reno, William. 2011. Warfare in Independent Africa. Cambridge: Cambridge University Press

    DEFF Research Database (Denmark)

    Hagmann, Tobias

    2013-01-01

    Warfare in Independent Africa is Reno’s bold attempt to analyze the modern history of African insurgencies. The book tackles this task through the prism of five generations of rebel, which left their mark on the continent; anti-colonial rebels, majority rule rebels, reform rebels, warlord rebels ...... and parochial rebels....

  11. Emerging Threat to America: Non-State Entities Fighting Fourth Generation Warfare in Mexico

    Science.gov (United States)

    2010-09-01

    warfare in Juarez, Mexico contrasts with the “peaceful” cities of Ciudad Acuña and Piedras Negras controlled by the Zetas who demonstrate 4GW tactics...Vulliamy, 2009). Within the cities of Acuna and Piedra Negras where one Pack Virus (the Zetas) has effective control of these limited geographic

  12. [Study of defense styles, defenses and coping strategies in alcohol-dependent population].

    Science.gov (United States)

    Ribadier, A; Varescon, I

    2017-05-01

    Defense mechanisms have been seen to greatly change over time and across different definitions made by different theoretical currents. Recently with the definition provided by the DSM IV, defense mechanisms have integrated the concept of coping as a defensive factor. These mechanisms are no longer considered just through a psychodynamic approach but also through a cognitive and behavioral one. In recent years, new theories have therefore integrated these two components of the defensive operation. According to Chabrol and Callahan (2013), defense mechanisms precede coping strategies. In individuals with psychopathological disorders, these authors indicate a relative stability of these mechanisms. Also, we asked about the presence of unique characteristics among people with alcohol dependence. Indeed, studies conducted with people with alcohol dependence highlight the presence of a neurotic defense style and some highly immature defenses (projection, acting out, splitting and somatization). In terms of coping strategies, persons with alcohol dependence preferentially use avoidant strategies and strategies focused on emotion. However, although several studies have been conducted to assess coping strategies and defense styles within a population of individuals with an alcohol problem, at the present time none of them has taken into account all these aspects of defense mechanisms. The aim of this study is therefore to study the defenses and defense styles and coping strategies in an alcohol-dependent population. This multicenter study (3 CHU, 1 center of supportive care and prevention in addiction and 1 clinic) received a favorable opinion of an Institutional Review Board (IRB Registration #: 00001072). Eighty alcohol-dependent individuals responded to a questionnaire assessing sociodemographic characteristics and elements related to the course of consumption. Coping strategies were assessed by means of a questionnaire validated in French: the Brief Cope. The Defense

  13. The Need for a USAF Information Warfare(IW) Strategy for Military Operations Other Than War (MOOTW)

    National Research Council Canada - National Science Library

    Butler, Bradley

    1996-01-01

    .... Two areas having an impact on the answer to this question but not normally examined together are information warfare and the broad area of military operations short of large scale conventional combat...

  14. Ballistic missile defense effectiveness

    Science.gov (United States)

    Lewis, George N.

    2017-11-01

    The potential effectiveness of ballistic missile defenses today remains a subject of debate. After a brief discussion of terminal and boost phase defenses, this chapter will focus on long-range midcourse defenses. The problems posed by potential countermeasures to such midcourse defenses are discussed as are the sensor capabilities a defense might have available to attempt to discriminate the actual missile warhead in a countermeasures environment. The role of flight testing in assessing ballistic missile defense effectiveness is discussed. Arguments made about effectiveness by missile defense supporters and critics are summarized.

  15. 11th Annual Mine Warfare Technology Symposium, May 6-8, 2014 - Monterey, CA

    OpenAIRE

    2014-01-01

    The Naval Postgraduate School (NPS), the Office of Naval Research (ONR), the Program Executive Office Littoral Combat Ships (PEO LCS), OPNAV (N95), and The Consortium for Robotics and Unmanned Systems Education and Research (CRUSER) are pleased to announce the ELEVENTH International Mine Warfare Technology Symposium in Monterey, California, May 6-8, 2014.

  16. From the Decomposition of Chemical Warfare Agents to the Decontamination of Cytostatics

    Czech Academy of Sciences Publication Activity Database

    Štengl, Václav; Šťastný, Martin; Janoš, P.; Mazanec, K.; Perez-Diaz, J. L.; Štenglová Netíková, I. R.

    2018-01-01

    Roč. 57, č. 6 (2018), s. 2114-2122 ISSN 0888-5885 EU Projects: European Commission(XE) 312804 - COUNTERFOG Grant - others:NATO(US) SPS984599 Program:Science for Peace and Security Institutional support: RVO:61388980 Keywords : Chemical warfare agents * Degradation * Metal oxide sorbents Subject RIV: CA - Inorganic Chemistry OBOR OECD: Inorganic and nuclear chemistry Impact factor: 2.843, year: 2016

  17. 76 FR 72391 - Defense Logistics Agency Revised Regulation 1000.22, Environmental Considerations in Defense...

    Science.gov (United States)

    2011-11-23

    ... DEPARTMENT OF DEFENSE Office of the Secretary [Docket ID DOD-2011-OS-0055] Defense Logistics Agency Revised Regulation 1000.22, Environmental Considerations in Defense Logistics Agency Actions AGENCY: Defense Logistics Agency, Department of Defense. ACTION: Revised Defense Logistics Agency...

  18. Quality of life in chemical warfare survivors with ophthalmologic injuries: the first results form Iran Chemical Warfare Victims Health Assessment Study.

    Science.gov (United States)

    Mousavi, Batool; Soroush, Mohammad Reza; Montazeri, Ali

    2009-01-19

    Iraq used chemical weapons extensively against the Iranians during the Iran-Iraq war (1980-1988). The aim of this study was to assess the health related quality of life (HRQOL) in people who had ophthalmologic complications due to the sulfur mustard gas exposure during the war. The Veterans and Martyrs Affair Foundation (VMAF) database indicated that there were 196 patients with severe ophthalmologic complications due to chemical weapons exposure. Of these, those who gave consent (n = 147) entered into the study. Quality of life was measured using the 36-item Short Form Health Survey (SF-36) and scores were compared to those of the general public. In addition logistic regression analysis was performed to indicate variables that contribute to physical and mental health related quality of life. The mean age of the patients was 44.8 (SD = 8.7) ranging from 21 to 75 years. About one-third of the cases (n= 50) reported exposure to chemical weapons more than once. The mean exposure duration to sulfur mustard gas was 21.6 years (SD = 1.2). The lowest scores on the SF-36 subscales were found to be: the role physical and the general health. Quality of life in chemical warfare victims who had ophthalmologic problems was significantly lower than the general public (P chemical warfare victims with ophthalmologic complications suffer from poor health related quality of life. It seems that the need for provision of health and support for this population is urgent. In addition, further research is necessary to measure health related quality of life in victims with different types of disabilities in order to support and enhance quality of life among this population.

  19. Zirconium doped nano-dispersed oxides of Fe, Al and Zn for destruction of warfare agents

    Czech Academy of Sciences Publication Activity Database

    Štengl, Václav; Houšková, Vendula; Bakardjieva, Snejana; Murafa, Nataliya; Maříková, Monika; Opluštil, F.; Němec, T.

    2010-01-01

    Roč. 61, č. 11 (2010), s. 1080-1088 ISSN 1044-5803 Institutional research plan: CEZ:AV0Z40320502 Keywords : warfare agents * nano-dispersed oxides * homogeneous hydrolysis Subject RIV: CA - Inorganic Chemistry Impact factor: 1.496, year: 2010

  20. Silverleaf whitefly induces salicylic acid defenses and suppresses effectual jasmonic acid defenses.

    Science.gov (United States)

    Zarate, Sonia I; Kempema, Louisa A; Walling, Linda L

    2007-02-01

    The basal defenses important in curtailing the development of the phloem-feeding silverleaf whitefly (Bemisia tabaci type B; SLWF) on Arabidopsis (Arabidopsis thaliana) were investigated. Sentinel defense gene RNAs were monitored in SLWF-infested and control plants. Salicylic acid (SA)-responsive gene transcripts accumulated locally (PR1, BGL2, PR5, SID2, EDS5, PAD4) and systemically (PR1, BGL2, PR5) during SLWF nymph feeding. In contrast, jasmonic acid (JA)- and ethylene-dependent RNAs (PDF1.2, VSP1, HEL, THI2.1, FAD3, ERS1, ERF1) were repressed or not modulated in SLWF-infested leaves. To test for a role of SA and JA pathways in basal defense, SLWF development on mutant and transgenic lines that constitutively activate or impair defense pathways was determined. By monitoring the percentage of SLWF nymphs in each instar, we show that mutants that activate SA defenses (cim10) or impair JA defenses (coi1) accelerated SLWF nymphal development. Reciprocally, mutants that activate JA defenses (cev1) or impair SA defenses (npr1, NahG) slowed SLWF nymphal development. Furthermore, when npr1 plants, which do not activate downstream SA defenses, were treated with methyl jasmonate, a dramatic delay in nymph development was observed. Collectively, these results showed that SLWF-repressed, JA-regulated defenses were associated with basal defense to the SLWF.

  1. Missile Defense: Ballistic Missile Defense System Testing Delays Affect Delivery of Capabilities

    Science.gov (United States)

    2016-04-28

    Page 1 GAO-16-339R Ballistic Missile Defense 441 G St. N.W. Washington, DC 20548 April 28, 2016 Congressional Committees Missile Defense... Ballistic Missile Defense System Testing Delays Affect Delivery of Capabilities For over half a century, the Department of Defense (DOD) has been...funding efforts to develop a system to detect, track, and defeat enemy ballistic missiles. The current system—the Ballistic Missile Defense System

  2. An Assessment of the Effectiveness of Computer-based Training for Newly Commissioned Surface Warfare Division Officers

    National Research Council Canada - National Science Library

    Bowman, William R; Crawford, Alice M; Mehay, Stephen; Stoker, Carol; Paynter, Robert

    2008-01-01

    ...) on-board an officer's ship. The study relied on a variety of analytical techniques, including a literature review of CBT and OJT training, interviews and focus groups with junior and senior surface warfare officers...

  3. Plasma flame for mass purification of contaminated air with chemical and biological warfare agents

    International Nuclear Information System (INIS)

    Uhm, Han S.; Shin, Dong H.; Hong, Yong C.

    2006-01-01

    An elimination of airborne simulated chemical and biological warfare agents was carried out by making use of a plasma flame made of atmospheric plasma and a fuel-burning flame, which can purify the interior air of a large volume in isolated spaces such as buildings, public transportation systems, and military vehicles. The plasma flame generator consists of a microwave plasma torch connected in series to a fuel injector and a reaction chamber. For example, a reaction chamber, with the dimensions of a 22 cm diameter and 30 cm length, purifies an airflow rate of 5000 lpm contaminated with toluene (the simulated chemical agent) and soot from a diesel engine (the simulated aerosol for biological agents). Large volumes of purification by the plasma flame will free mankind from the threat of airborne warfare agents. The plasma flame may also effectively purify air that is contaminated with volatile organic compounds, in addition to eliminating soot from diesel engines as an environmental application

  4. Electronic Warfare (EW) Historical Perspectives and Its Relationship to Information Operations (IO) - Considerations for Turkey

    Science.gov (United States)

    2006-09-01

    Information Operations IW Information Warfare JDAM Joint Direct Attack Munition JRFL Joint Restricted Frequency List JSTARS Joint...through the preparation of the joint restricted frequency list (JRFL), which includes taboo, guarded and protected frequencies. The EC-130H Compass Call

  5. Dehumanization and Irregular Warfare

    Science.gov (United States)

    2013-06-01

    author and do not reflect the official policy or position of the Department of Defense or the U.S. Government. IRB Protocol number ____N/A____...films.122 This reframing of cultural training as a discussion of proper etiquette , rather 120

  6. On Pecuniary Resiliency, Early Warning, and Market Imitation under Unrestricted Warfare

    Science.gov (United States)

    2015-09-17

    combatants, and civilians. The term was first used by American analysts in 1989 as Lind et . al . [37] to describe the return of warfare to a decentralized...Century. New York: Free, 1988 . Print. [22] Gould , Stephen, and Eldredge Niles. “Punctuated Equilibria: The Tempo and Mode of Evolution Reconsidered...able to take a punch.” He specifically argues that Al Qaeda and other terrorist organizations have limited resources to plan and carry out attacks and

  7. Ethics and National Defense: The Timeless Issues

    Science.gov (United States)

    1993-02-01

    recent times by Jeremy Bentham (as hedonistic act utilitari- anism) and by John Stuart Mill (whose writings leave unclear whether act or rule...School, Bentham , Jeremy , 177 151 Biological warfare research, 109 Aquino, Corazon, 67 Brewer,Justice, 28 Armed Forces Staff College, 154 Budgetary issues

  8. Empirically-driven Analysis for Model-driven Experimentation: From Lab to Sea and Back Again (Part 1)

    National Research Council Canada - National Science Library

    Weil, Shawn A; Kemple, William; Grier, Rebecca; Hutchins, Susan; Kleinman, David; Hocevar, Susan; Serfaty, Daniel

    2006-01-01

    The Expeditionary Strike Group (ESG) is a versatile military organization, designed to effectively handle missions as diverse as air warfare, tactical ballistic missile defense, and maritime interdiction operations...

  9. The Role of NLR-related Protein 3 Inflammasome in Host Defense and Inflammatory Diseases

    Directory of Open Access Journals (Sweden)

    Chul-Su Yang

    2012-03-01

    Full Text Available Among a number of innate receptors, the nucleotide-binding domain leucine-rich repeat containing (NLR nucleotide oligomerization domain (NOD-like receptor families are involved in the recognition of cytosolic pathogen- or danger-associated molecules. Activation of these specific sets of receptors leads to the assembly of a multiprotein complex, the inflammasome, leading to the activation of caspase-1 and maturation of the cytokines interleukin (IL-1β, IL-18, and IL-33. Among NLRs, NLR-related protein 3 (NLRP3 is one of the best-characterized receptors that activates the inflammasome. There is no doubt that NLRP3 inflammasome activation is important for host defense and effective pathogen clearance against fungal, bacterial, and viral infection. In addition, mounting evidence indicates that the NLRP3 inflammasome plays a role in a variety of inflammatory diseases, including gout, atherosclerosis, and type II diabetes, as well as under conditions of cellular stress or injury. Here, we review recent advances in our understanding of the role of the NLRP3 inflammasome in host defense and various inflammatory diseases.

  10. An Empirical Examination of the Warfare Metaphor with Respect to Pre-Service Elementary Teachers

    Science.gov (United States)

    Cobern, William W.; Loving, Cathleen C.; Davis, Edward B.; Terpstra, Jeff

    2013-01-01

    Since its origination in the late nineteenth century, the warfare metaphor has been used to characterize the relationship between science and religion, especially orthodox Christianity. Though thoroughly discredited by historians of science, the ideological descendants of Thomas Huxley, who spoke of science in quasi-religious terms, have kept the…

  11. Airpower's Role in Homeland Defense: A Western Hemisphere Perspective

    National Research Council Canada - National Science Library

    Witek, Roger

    2002-01-01

    .... The author assesses hemispheric historical cases such as antisubmarine warfare during World War II, the development of NORAD during the Cold War, and counterdrug operations during the last two decades...

  12. Defense Human Resources Activity > PERSEREC

    Science.gov (United States)

    Skip to main content (Press Enter). Toggle navigation Defense Human Resources Activity Search Search Defense Human Resources Activity: Search Search Defense Human Resources Activity: Search Defense Human Resources Activity U.S. Department of Defense Defense Human Resources Activity Overview

  13. Modeling the Total Dose Radiation Effects of Hg(1-x)Cd(x)Te Photodiodes Using Numerical Device Simulators

    Science.gov (United States)

    1994-01-01

    REPORT NUMBER Defense Nuclear Agency 6801 Telegraph Road DNA-TR-93-50 Alexandria, VA 22310-3398 RAEE /Cohn 11. SUPPLEMENTARY NOTES 12a. DISTRIBUTION...WARNOCK ATTN: DT-1B ATTN: CODE H23 R SMITH DEFENSE NUCLEAR AGENCY NAVAL SURFACE WARFARE CENTER ATTN: RAEE TREE ATTN: CODE H-21 2 CY ATTN: TITL NAVAL

  14. Reactive skin decontamination lotion (RSDL) for the decontamination of chemical warfare agent (CWA) dermal exposure.

    Science.gov (United States)

    Schwartz, M D; Hurst, C G; Kirk, M A; Reedy, S J D; Braue, E H

    2012-08-01

    Rapid decontamination of the skin is the single most important action to prevent dermal absorption of chemical contaminants in persons exposed to chemical warfare agents (CWA) and toxic industrial chemicals (TICs) as a result of accidental or intentional release. Chemicals on the skin may be removed by mechanical means through the use of dry sorbents or water. Recent interest in decontamination systems which both partition contaminants away from the skin and actively neutralize the chemical has led to the development of several reactive decontamination solutions. This article will review the recently FDA-approved Reactive Skin Decontamination Lotion (RSDL) and will summarize the toxicity and efficacy studies conducted to date. Evidence of RSDL's superior performance against vesicant and organophosphorus chemical warfare agents compared to water, bleach, and dry sorbents, suggests that RSDL may have a role in mass human exposure chemical decontamination in both the military and civilian arenas.

  15. Redefining the Indirect Approach, Defining Special Operations Forces (SOF Power, and the Global Networking of SOF

    Directory of Open Access Journals (Sweden)

    Scott Morrison

    2014-07-01

    Full Text Available The current Defense Strategy assigns Special Operations Forces (SOF to play a central role in countering terrorism, weapons of mass destruction, and irregular warfare. However, there has been little published that defines the role of Special Operations alongside air, land, and sea domains. The U.S. Special Operations Community struggles to define its own theoretical concepts such as direct approach and indirect approach. The U.S. SOF circles typically define direct approach with direct action and the indirect approach with foreign internal defense or security force assistance. Military theorist Liddell Hart viewed the indirect approach as a method to orient upon, target, and upset an adversary’s equilibrium in order to plan for and direct decisive blows. Today, the SOF indirect approach is arguable more applicable due to the prevalence of non-state threats and internal conflicts. Following Hart’s definition, precision raids are among the integral components of a broader application of the indirect approach. The approach also networks U.S. government power as a force when used in concert with allies and local partners. Global networking along with balanced precision raids will exponentially increase the utility of SOF power and position it to appropriately complement all domains to tackle 21st century challenges.

  16. Defense islands in bacterial and archaeal genomes and prediction of novel defense systems.

    Science.gov (United States)

    Makarova, Kira S; Wolf, Yuri I; Snir, Sagi; Koonin, Eugene V

    2011-11-01

    The arms race between cellular life forms and viruses is a major driving force of evolution. A substantial fraction of bacterial and archaeal genomes is dedicated to antivirus defense. We analyzed the distribution of defense genes and typical mobilome components (such as viral and transposon genes) in bacterial and archaeal genomes and demonstrated statistically significant clustering of antivirus defense systems and mobile genes and elements in genomic islands. The defense islands are enriched in putative operons and contain numerous overrepresented gene families. A detailed sequence analysis of the proteins encoded by genes in these families shows that many of them are diverged variants of known defense system components, whereas others show features, such as characteristic operonic organization, that are suggestive of novel defense systems. Thus, genomic islands provide abundant material for the experimental study of bacterial and archaeal antivirus defense. Except for the CRISPR-Cas systems, different classes of defense systems, in particular toxin-antitoxin and restriction-modification systems, show nonrandom clustering in defense islands. It remains unclear to what extent these associations reflect functional cooperation between different defense systems and to what extent the islands are genomic "sinks" that accumulate diverse nonessential genes, particularly those acquired via horizontal gene transfer. The characteristics of defense islands resemble those of mobilome islands. Defense and mobilome genes are nonrandomly associated in islands, suggesting nonadaptive evolution of the islands via a preferential attachment-like mechanism underpinned by the addictive properties of defense systems such as toxins-antitoxins and an important role of horizontal mobility in the evolution of these islands.

  17. 76 FR 28757 - Defense Logistics Agency Revised Regulation 1000.22, Environmental Considerations in Defense...

    Science.gov (United States)

    2011-05-18

    ... DEPARTMENT OF DEFENSE Office of the Secretary [DOCKET ID DOD-2011-OS-0055] Defense Logistics Agency Revised Regulation 1000.22, Environmental Considerations in Defense Logistics Agency Actions AGENCY: Defense Logistics Agency, Department of Defense. ACTION: Notice of Availability (NOA) of Revised...

  18. 76 FR 53119 - Defense Logistics Agency Revised Regulation 1000.22, Environmental Considerations in Defense...

    Science.gov (United States)

    2011-08-25

    ... DEPARTMENT OF DEFENSE Office of the Secretary [Docket ID: DOD-2011-OS-0055] Defense Logistics Agency Revised Regulation 1000.22, Environmental Considerations in Defense Logistics Agency Actions AGENCY: Defense Logistics Agency, Department of Defense. ACTION: Comment Addressed on Notice of...

  19. Treatment of chemical warfare agents by zero-valent iron nanoparticles and ferrate(VI)/(III) composite

    International Nuclear Information System (INIS)

    Zboril, Radek; Andrle, Marek; Oplustil, Frantisek; Machala, Libor; Tucek, Jiri; Filip, Jan; Marusak, Zdenek; Sharma, Virender K.

    2012-01-01

    Highlights: ► Ferrate(VI) has been found to be highly efficient to decontaminate chemical warfare agents. ► Fast degradation of sulfur mustard, soman and compound VX by ferrate(VI). ► Nanoscale zero-valent iron particles are considerably less efficient in degradation of studied warfare agents compared to ferrate(VI). - Abstract: Nanoscale zero-valent iron (nZVI) particles and a composite containing a mixture of ferrate(VI) and ferrate(III) were prepared by thermal procedures. The phase compositions, valence states of iron, and particle sizes of iron-bearing compounds were determined by combination of X-ray powder diffraction, Mössbauer spectroscopy and scanning electron microscopy. The applicability of these environmentally friendly iron based materials in treatment of chemical warfare agents (CWAs) has been tested with three representative compounds, sulfur mustard (bis(2-chlorethyl) sulfide, HD), soman ((3,3′-imethylbutan-2-yl)-methylphosphonofluoridate, GD), and O-ethyl S-[2-(diisopropylamino)ethyl] methylphosphonothiolate (VX). Zero-valent iron, even in the nanodimensional state, had a sluggish reactivity with CWAs, which was also observed in low degrees of CWAs degradation. On the contrary, ferrate(VI)/(III) composite exhibited a high reactivity and complete degradations of CWAs were accomplished. Under the studied conditions, the estimated first-order rate constants (∼10 −2 s −1 ) with the ferrate(VI)/(III) composite were several orders of magnitude higher than those of spontaneous hydrolysis of CWAs (10 −8 –10 −6 s −1 ). The results demonstrated that the oxidative technology based on application of ferrate(VI) is very promising to decontaminate CWAs.

  20. 75 FR 76423 - Defense Intelligence Agency National Defense Intelligence College Board of Visitors Closed Meeting

    Science.gov (United States)

    2010-12-08

    ... DEPARTMENT OF DEFENSE Office of the Secretary Defense Intelligence Agency National Defense Intelligence College Board of Visitors Closed Meeting AGENCY: National Defense Intelligence College, Defense Intelligence Agency, Department of Defense. ACTION: Notice of Closed Meeting. SUMMARY: Pursuant to the...

  1. 76 FR 28960 - Defense Intelligence Agency National Defense Intelligence College Board of Visitors Closed Meeting

    Science.gov (United States)

    2011-05-19

    ... DEPARTMENT OF DEFENSE Office of the Secretary Defense Intelligence Agency National Defense Intelligence College Board of Visitors Closed Meeting AGENCY: National Defense Intelligence College, Defense Intelligence Agency, Department of Defense. ACTION: Notice of Closed Meeting. SUMMARY: Pursuant to the...

  2. Psychological defensive profile of sciatica patients with neuropathic pain and its relationship to quality of life.

    Science.gov (United States)

    Tutoglu, A; Boyaci, A; Karababa, I F; Koca, I; Kaya, E; Kucuk, A; Yetisgin, A

    2015-09-01

    To identify differences between defense styles and mechanisms in sciatica patients with or without neuropathic pain and their relationship to quality of life. The study included 37 sciatica patients with neuropathic pain (SNP), 36 sciatica patients without neuropathic pain and 38 healthy subjects. Pain severity was measured using the Visual Analogue Scale (VAS). Psychological condition was assessed using the Beck Depression Inventory (BDI) and the Beck Anxiety Inventory (BAI). Defense mechanisms were assessed using a 40-item Defense Style Questionnaire (DSQ-40) and quality of life was assessed using Short Form-36 (SF-36). BDI and BAI scores were significantly higher in the SNP group (p < 0.001). Idealization and immature defense styles, as well as isolation, displacement and somatization were significantly higher in the SNP group (p < 0.05). SF-36 parameters also differed significantly between the groups, with controls having the best scores and the SNP group the worst. In linear regression analysis, acting out and BDI were found to affect the pain domain of the SF-36 (p < 0.001). The acting out defensive style and BDI were independently associated with pain-related quality of life. In the SNP group, significant differences were found in the immature and neurotic styles of the defense mechanisms.

  3. Quality of life in chemical warfare survivors with ophthalmologic injuries: the first results form Iran Chemical Warfare Victims Health Assessment Study

    Directory of Open Access Journals (Sweden)

    Soroush Mohammad

    2009-01-01

    Full Text Available Abstract Background Iraq used chemical weapons extensively against the Iranians during the Iran-Iraq war (1980–1988. The aim of this study was to assess the health related quality of life (HRQOL in people who had ophthalmologic complications due to the sulfur mustard gas exposure during the war. Methods The Veterans and Martyrs Affair Foundation (VMAF database indicated that there were 196 patients with severe ophthalmologic complications due to chemical weapons exposure. Of these, those who gave consent (n = 147 entered into the study. Quality of life was measured using the 36-item Short Form Health Survey (SF-36 and scores were compared to those of the general public. In addition logistic regression analysis was performed to indicate variables that contribute to physical and mental health related quality of life. Results The mean age of the patients was 44.8 (SD = 8.7 ranging from 21 to 75 years. About one-third of the cases (n= 50 reported exposure to chemical weapons more than once. The mean exposure duration to sulfur mustard gas was 21.6 years (SD = 1.2. The lowest scores on the SF-36 subscales were found to be: the role physical and the general health. Quality of life in chemical warfare victims who had ophthalmologic problems was significantly lower than the general public (P Conclusion The study findings suggest that chemical warfare victims with ophthalmologic complications suffer from poor health related quality of life. It seems that the need for provision of health and support for this population is urgent. In addition, further research is necessary to measure health related quality of life in victims with different types of disabilities in order to support and enhance quality of life among this population.

  4. Global Networks: Emerging Constraints on Strategy (Defense Horizons, July 2004)

    National Research Council Canada - National Science Library

    Fonow, Bob

    2004-01-01

    .... This shift is problematic for U.S. national security, because the global telecommunications infrastructure is becoming an important strategic battlespace the physical battlefield of information warfare...

  5. Transforming Defense

    National Research Council Canada - National Science Library

    Lamb, Christopher J; Bunn, M. E; Lutes, Charles; Cavoli, Christopher

    2005-01-01

    .... Despite the resources and attention consumed by the war on terror, and recent decisions by the White House to curtail the growth of defense spending, the senior leadership of the Department of Defense (DoD...

  6. Future Integrated Fire Control

    National Research Council Canada - National Science Library

    Young, Bonnie W

    2005-01-01

    Future advances in fire control for air and missile defense depend largely on a network-enabled foundation that enables the collaborative use of distributed warfare assets for time-critical operations...

  7. A Communitarian Critique of the Warfare State: Implications for the Twenty-First-Century University

    Science.gov (United States)

    Theobald, Paul; Knotwell, Jim

    2007-01-01

    This article contends that the relatively recent academic movement known as communitarianism can serve as a policy guide that could work catalytically on American cultural development of the sort that would loosen the tight military-industrial connection and in so doing aid the dismantling of the "warfare state." After chronicling the development…

  8. Home - Defense Technology Security Administration

    Science.gov (United States)

    by @dtsamil Defense Technology Security Administration Mission, Culture, and History Executive Official seal of Defense Technology Security Administration Official seal of Defense Technology Security Administration OFFICE of the SECRETARY of DEFENSE Defense Technology Security Administration

  9. Bits or Shots in Combat? The Generalized Deitchman Model of Guerrilla Warfare

    OpenAIRE

    Kress, Moshe; MacKay, Niall J.

    2013-01-01

    Operations Research Letters, accepted. We generalize Deitchman's guerrilla warfare model to account for trade-off between intelligence ('bits') and firepower ('shots'). Intelligent targeting leads to aimed fire, absence of intelligence leads to unaimed fire, dependent on targets' density. We propose a new Lanchester-type model that mixes aimed with unaimed fire, the balance between these being determined by quality of information. We derive the model's conserved quantity, and use it ...

  10. A cost and operational effectiveness analysis of alternative anti-surface warfare platforms

    OpenAIRE

    Skinner, Walter Mark.

    1993-01-01

    Approved for public release; distribution is unlimited. A Cost and Operational Effectiveness Analysis (COEA) is performed for three alternative anti-surface warfare (ASUW) platforms that will conduct operations in multi-service regional scenarios. Estimated program costs, historical cost variances, and measures of operational effectiveness are determined for each COEA alternative, and service life extension effects are examined. The data is merged in a mixed-integer optimization model, MPA...

  11. Cybersecurity protecting critical infrastructures from cyber attack and cyber warfare

    CERN Document Server

    Johnson, Thomas A

    2015-01-01

    The World Economic Forum regards the threat of cyber attack as one of the top five global risks confronting nations of the world today. Cyber attacks are increasingly targeting the core functions of the economies in nations throughout the world. The threat to attack critical infrastructures, disrupt critical services, and induce a wide range of damage is becoming more difficult to defend against. Cybersecurity: Protecting Critical Infrastructures from Cyber Attack and Cyber Warfare examines the current cyber threat landscape and discusses the strategies being used by governments and corporatio

  12. Optimizing Active Cyber Defense

    OpenAIRE

    Lu, Wenlian; Xu, Shouhuai; Yi, Xinlei

    2016-01-01

    Active cyber defense is one important defensive method for combating cyber attacks. Unlike traditional defensive methods such as firewall-based filtering and anti-malware tools, active cyber defense is based on spreading "white" or "benign" worms to combat against the attackers' malwares (i.e., malicious worms) that also spread over the network. In this paper, we initiate the study of {\\em optimal} active cyber defense in the setting of strategic attackers and/or strategic defenders. Specific...

  13. Chemical warfare in termites

    Czech Academy of Sciences Publication Activity Database

    Šobotník, Jan; Jirošová, Anna; Hanus, Robert

    2010-01-01

    Roč. 56, č. 9 (2010), s. 1012-1021 ISSN 0022-1910 R&D Projects: GA AV ČR IAA600550614 Institutional research plan: CEZ:AV0Z40550506 Keywords : Isoptera * chemical defense * exocrine gland * frontal gland Subject RIV: CC - Organic Chemistry Impact factor: 2.310, year: 2010

  14. Isolation and expression of recombinant antibody fragments to the biological warfare pathogen Brucella melitensis.

    Science.gov (United States)

    Hayhurst, Andrew; Happe, Scott; Mabry, Robert; Koch, Zephyr; Iverson, Brent L; Georgiou, George

    2003-05-01

    Brucella melitensis is a highly infectious animal pathogen able to cause a recurring debilitating disease in humans and is therefore high on the list of biological warfare agents. Immunoglobulin genes from mice immunized with gamma-irradiated B. melitensis strain 16M were used to construct a library that was screened by phage display against similarly prepared bacteria. The selected phage particles afforded a strong enzyme-linked immunosorbent assay (ELISA) signal against gamma-irradiated B. melitensis cells. However, extensive efforts to express the respective single chain antibody variable region fragment (scFv) in soluble form failed due to: (i) poor solubility and (ii) in vivo degradation of the c-myc tag used for the detection of the recombinant antibodies. Both problems could be addressed by: (i) fusing a human kappa light chain constant domain (Ck) chain to the scFv to generate single chain antibody fragment (scAb) antibody fragments and (ii) by co-expression of the periplasmic chaperone Skp. While soluble, functional antibodies could be produced in this manner, phage-displaying scFvs or scAbs were still found to be superior ELISA reagents for immunoassays, due to the large signal amplification afforded by anti-phage antibodies. The isolated phage antibodies were shown to be highly specific to B. melitensis and did not recognize Yersinia pseudotuberculosis in contrast to the existing diagnostic monoclonal YST 9.2.1.

  15. Physics of a ballistic missile defense - The chemical laser boost-phase defense

    Science.gov (United States)

    Grabbe, Crockett L.

    1988-01-01

    The basic physics involved in proposals to use a chemical laser based on satellites for a boost-phase defense are investigated. After a brief consideration of simple physical conditions for the defense, a calculation of an equation for the number of satellites needed for the defense is made along with some typical values of this for possible future conditions for the defense. Basic energy and power requirements for the defense are determined. A sumary is made of probable minimum conditions that must be achieved for laser power, targeting accuracy, number of satellites, and total sources for power needed.

  16. Report of the Defense Science Board Summer Study Task Force on Information Architecture for the Battlefield

    Science.gov (United States)

    1994-10-01

    information warfare has many elements, some new, some old, which interrelate in complex ways. Some are: "• Psychological operations and perception...and information systems." Some aspects of Information Warfare are very old - for example, what we now call Psychological Operations. Some are...Communications, and Intelligence) ASOC Air Support Operations Center ASTEC Advanced Satellite Technology and EHF Communications ATARS Advanced Tactical

  17. Investment in defense and cost of predator-induced defense along a resource gradient

    DEFF Research Database (Denmark)

    Steiner, Uli

    2007-01-01

    An organism's investment in different traits to reduce predation is determined by the fitness benefit of the defense relative to the fitness costs associated with the allocation of time and resources to the defense. Inherent tradeoffs in time and resource allocation should result in differential...... investment in defense along a resource gradient, but competing models predict different patterns of investment. There are currently insufficient empirical data on changes in investment in defensive traits or their costs along resource gradients to differentiate between the competing allocation models....... In this study, I exposed tadpoles to caged predators along a resource gradient in order to estimate investment in defense and costs of defense by assessing predator-induced plasticity. Induced defenses included increased tail depth, reduced feeding, and reduced swimming activity; costs associated...

  18. Unfolding Green Defense

    DEFF Research Database (Denmark)

    Larsen, Kristian Knus

    2015-01-01

    In recent years, many states have developed and implemented green solutions for defense. Building on these initiatives NATO formulated the NATO Green Defence Framework in 2014. The framework provides a broad basis for cooperation within the Alliance on green solutions for defense. This report aims...... to inform and support the further development of green solutions by unfolding how green technologies and green strategies have been developed and used to handle current security challenges. The report, initially, focuses on the security challenges that are being linked to green defense, namely fuel...... consumption in military operations, defense expenditure, energy security, and global climate change. The report then proceeds to introduce the NATO Green Defence Framework before exploring specific current uses of green technologies and green strategies for defense. The report concludes that a number...

  19. Prokaryotic homologs of Argonaute proteins are predicted to function as key components of a novel system of defense against mobile genetic elements

    Directory of Open Access Journals (Sweden)

    van der Oost John

    2009-08-01

    Full Text Available Abstract Background In eukaryotes, RNA interference (RNAi is a major mechanism of defense against viruses and transposable elements as well of regulating translation of endogenous mRNAs. The RNAi systems recognize the target RNA molecules via small guide RNAs that are completely or partially complementary to a region of the target. Key components of the RNAi systems are proteins of the Argonaute-PIWI family some of which function as slicers, the nucleases that cleave the target RNA that is base-paired to a guide RNA. Numerous prokaryotes possess the CRISPR-associated system (CASS of defense against phages and plasmids that is, in part, mechanistically analogous but not homologous to eukaryotic RNAi systems. Many prokaryotes also encode homologs of Argonaute-PIWI proteins but their functions remain unknown. Results We present a detailed analysis of Argonaute-PIWI protein sequences and the genomic neighborhoods of the respective genes in prokaryotes. Whereas eukaryotic Ago/PIWI proteins always contain PAZ (oligonucleotide binding and PIWI (active or inactivated nuclease domains, the prokaryotic Argonaute homologs (pAgos fall into two major groups in which the PAZ domain is either present or absent. The monophyly of each group is supported by a phylogenetic analysis of the conserved PIWI-domains. Almost all pAgos that lack a PAZ domain appear to be inactivated, and the respective genes are associated with a variety of predicted nucleases in putative operons. An additional, uncharacterized domain that is fused to various nucleases appears to be a unique signature of operons encoding the short (lacking PAZ pAgo form. By contrast, almost all PAZ-domain containing pAgos are predicted to be active nucleases. Some proteins of this group (e.g., that from Aquifex aeolicus have been experimentally shown to possess nuclease activity, and are not typically associated with genes for other (putative nucleases. Given these observations, the apparent extensive

  20. Cost Effectiveness Analysis of the "Sea to SWOS" Training Initiative on the Surface Warfare Officer Qualification Process

    National Research Council Canada - National Science Library

    Gavino, Christopher

    2002-01-01

    ... (combat effectiveness) while the quantitative analysis shows additional costs to the Navy Personnel Command and savings in training costs for the Naval Education and Training Command and OPNAV N76, the Surface Warfare Resource Sponsor...

  1. Littoral Combat Vessels: Analysis and Comparison of Designs

    National Research Council Canada - National Science Library

    Christiansen, Bryan J

    2008-01-01

    .... The candidates are a Littoral Combat Ship with a surface warfare module, a National Security Cutter augmented with offensive and defensive weaponry, a "Sea Lance" inshore combat vessel, and a Combat...

  2. Using cheminformatics to find simulants for chemical warfare agents

    Energy Technology Data Exchange (ETDEWEB)

    Lavoie, J.; Srinivasan, Sree [Molecular Sciences and Engineering Team, U.S. Army Natick Soldier Research, Development and Engineering Center, 15 Kansas Street, Natick, MA 01760 (United States); Nagarajan, R., E-mail: Ramanathan.Nagarajan@us.army.mil [Molecular Sciences and Engineering Team, U.S. Army Natick Soldier Research, Development and Engineering Center, 15 Kansas Street, Natick, MA 01760 (United States)

    2011-10-30

    Highlights: {yields} Summary of chemical warfare agent (CWA) simulants in current use. {yields} Application of method of molecular similarity to CWA and simulants. {yields} Quantitative metric for CWA-simulant similarity. {yields} Rank ordering of simulants in current use. {yields} Potential of method to identify simulants for emerging agents. - Abstract: Direct experimentation with chemical warfare agents (CWA) to study important problems such as their permeation across protective barrier materials, decontamination of equipment and facilities, or the environmental transport and fate of CWAs is not feasible because of the obvious toxicity of the CWAs and associated restrictions on their laboratory use. The common practice is to use 'simulants,' namely, analogous chemicals that closely resemble the CWAs but are less toxic, with the expectation that the results attained for simulants can be correlated to how the CWAs would perform. Simulants have been traditionally chosen by experts, by means of intuition, using similarity in one or more physical properties (such as vapor pressure or aqueous solubility) or in the molecular structural features (such as functional groups) between the stimulant and the CWA. This work is designed to automate the simulant identification process backed by quantitative metrics, by means of chemical similarity search software routinely used in pharmaceutical drug discovery. The question addressed here is: By the metrics of such software, how similar are traditional simulants to CWAs? That is, what is the numerical 'distance' between each CWA and its customary simulants in the quantitative space of molecular descriptors? The answers show promise for finding close but less toxic simulants for the ever-increasing numbers of CWAs objectively and fast.

  3. Using cheminformatics to find simulants for chemical warfare agents

    International Nuclear Information System (INIS)

    Lavoie, J.; Srinivasan, Sree; Nagarajan, R.

    2011-01-01

    Highlights: → Summary of chemical warfare agent (CWA) simulants in current use. → Application of method of molecular similarity to CWA and simulants. → Quantitative metric for CWA-simulant similarity. → Rank ordering of simulants in current use. → Potential of method to identify simulants for emerging agents. - Abstract: Direct experimentation with chemical warfare agents (CWA) to study important problems such as their permeation across protective barrier materials, decontamination of equipment and facilities, or the environmental transport and fate of CWAs is not feasible because of the obvious toxicity of the CWAs and associated restrictions on their laboratory use. The common practice is to use 'simulants,' namely, analogous chemicals that closely resemble the CWAs but are less toxic, with the expectation that the results attained for simulants can be correlated to how the CWAs would perform. Simulants have been traditionally chosen by experts, by means of intuition, using similarity in one or more physical properties (such as vapor pressure or aqueous solubility) or in the molecular structural features (such as functional groups) between the stimulant and the CWA. This work is designed to automate the simulant identification process backed by quantitative metrics, by means of chemical similarity search software routinely used in pharmaceutical drug discovery. The question addressed here is: By the metrics of such software, how similar are traditional simulants to CWAs? That is, what is the numerical 'distance' between each CWA and its customary simulants in the quantitative space of molecular descriptors? The answers show promise for finding close but less toxic simulants for the ever-increasing numbers of CWAs objectively and fast.

  4. Induction of defensive enzymes (isozymes) during defense against ...

    African Journals Online (AJOL)

    user

    2012-09-06

    Sep 6, 2012 ... defense against two different fungal pathogens in pear calli ... study the biochemical changes in relation to plant defense ... relatively easy to manipulate by empirical means, allowing for a ... earlier phase, and the degree of rot was significantly ..... resistance of fruit, and they play an important role in the.

  5. Fast neutron sensor for detection of explosives and chemical warfare agents

    International Nuclear Information System (INIS)

    Valkovic, Vladivoj; Sudac, Davorin; Matika, Dario

    2010-01-01

    Once the presence of the anomaly on the bottom of the shallow coastal sea water has been confirmed it is necessary to establish if it contains explosive or chemical warfare charge. We propose that this be performed by using neutron sensor installed within an underwater vessel. When positioned above the object, or to its side, the system can inspect the object for the presence of the threat materials by using alpha particle tagged neutrons from the sealed tube d+t neutron generator.

  6. Fast neutron sensor for detection of explosives and chemical warfare agents

    Energy Technology Data Exchange (ETDEWEB)

    Valkovic, Vladivoj [A.C.T.d.o.o., Prilesje 4, 10000 Zagreb (Croatia)], E-mail: valkovic@irb.hr; Sudac, Davorin [Institute Ruder Boskovic, Bijenicka c.54, 10000 Zagreb (Croatia); Matika, Dario [Institute for Researches and Development of Defense Systems, Ilica 256b, 10000 Zagreb (Croatia)

    2010-04-15

    Once the presence of the anomaly on the bottom of the shallow coastal sea water has been confirmed it is necessary to establish if it contains explosive or chemical warfare charge. We propose that this be performed by using neutron sensor installed within an underwater vessel. When positioned above the object, or to its side, the system can inspect the object for the presence of the threat materials by using alpha particle tagged neutrons from the sealed tube d+t neutron generator.

  7. Transcription Factor Functional Protein-Protein Interactions in Plant Defense Responses

    Directory of Open Access Journals (Sweden)

    Murilo S. Alves

    2014-03-01

    Full Text Available Responses to biotic stress in plants lead to dramatic reprogramming of gene expression, favoring stress responses at the expense of normal cellular functions. Transcription factors are master regulators of gene expression at the transcriptional level, and controlling the activity of these factors alters the transcriptome of the plant, leading to metabolic and phenotypic changes in response to stress. The functional analysis of interactions between transcription factors and other proteins is very important for elucidating the role of these transcriptional regulators in different signaling cascades. In this review, we present an overview of protein-protein interactions for the six major families of transcription factors involved in plant defense: basic leucine zipper containing domain proteins (bZIP, amino-acid sequence WRKYGQK (WRKY, myelocytomatosis related proteins (MYC, myeloblastosis related proteins (MYB, APETALA2/ ETHYLENE-RESPONSIVE ELEMENT BINDING FACTORS (AP2/EREBP and no apical meristem (NAM, Arabidopsis transcription activation factor (ATAF, and cup-shaped cotyledon (CUC (NAC. We describe the interaction partners of these transcription factors as molecular responses during pathogen attack and the key components of signal transduction pathways that take place during plant defense responses. These interactions determine the activation or repression of response pathways and are crucial to understanding the regulatory networks that modulate plant defense responses.

  8. Toxicity induced by chemical warfare agents: insights on the protective role of melatonin.

    Science.gov (United States)

    Pita, René; Marco-Contelles, José; Ramos, Eva; Del Pino, Javier; Romero, Alejandro

    2013-11-25

    Chemical Warfare Agents (CWAs) are substances that can be used to kill, injure or incapacitate an enemy in warfare, but also against civilian population in terrorist attacks. Many chemical agents are able to generate free radicals and derived reactants, excitotoxicity process, or inflammation, and as consequence they can cause neurological symptoms and damage in different organs. Nowadays, taking into account that total immediate decontamination after exposure is difficult to achieve and there are not completely effective antidotes and treatments against all CWAs, we advance and propose that medical countermeasures against CWAs poisoning would benefit from a broad-spectrum multipotent molecule. Melatonin, a versatile and ubiquitous antioxidant molecule, originally discovered as a hormone synthesized mainly in the pineal gland, has low toxicity and high efficacy in reducing oxidative damage, anti-inflammatory effects by regulation of multiple cellular pathways and properties to prevent excitotoxicity, among others. The purpose of this review is to show the multiple and diverse properties of melatonin, as a pleiotropic indole derivative, and its marked potential for improving human health against the most widely used chemical weapons. Copyright © 2013 Elsevier Ireland Ltd. All rights reserved.

  9. Special Forces and the Art of Influence: A Grassroots Approach to Psychological Operations in an Unconventional Warfare Environment

    National Research Council Canada - National Science Library

    Thomas, II, Joel W

    2006-01-01

    .... The research was based on several premises: (1) the strategic utility of Special Forces (SF) lies in its ability to influence a target audience in an unconventional warfare (UW) environment; (2...

  10. Models, Analysis, and Recommendations Pertaining to the Retention of Naval Special Warfare s Mid-Level Officers

    Science.gov (United States)

    2013-12-01

    The Analytic Hierarch/Network Process,” in Rev. R. Acad. Cien. Serie A. Mat (RACSAM), submitted by Francisco Javier Giron (Real Academia de Ciencias ...Academia de Ciencias : Spain. Scott, Nathan. Naval Special Warfare Officer Retention Survey. Monterey, CA: NPS Press, September 2013. Whittenberger

  11. Navy Needs to Establish Effective Metrics to Achieve Desired Outcomes for SPY1 Radar Sustainment (Redacted)

    Science.gov (United States)

    2016-08-01

    subsystems in the AEGIS Weapon System that searches, detects, and tracks air and surface targets to support Anti -Air Warfare and Ballistic Missile... System that searches, detects, and tracks air and surface targets to support Anti -Air Warfare and Ballistic Missile Defense missions. The SPY-1 radar...a series on SPY-1 radar spare parts. The SPY-1 radar is an advanced, automatic detect and track radar system . The SPY-1 radar is one of 13 major

  12. Treatment of chemical warfare agents by zero-valent iron nanoparticles and ferrate(VI)/(III) composite

    Energy Technology Data Exchange (ETDEWEB)

    Zboril, Radek, E-mail: zboril@prfnw.upol.cz [Regional Centre of Advanced Technologies and Materials, Departments of Physical Chemistry and Experimental Physics, 17. listopadu 1192/12, 771 46 Olomouc (Czech Republic); Andrle, Marek; Oplustil, Frantisek [Military Institute VOP-026 Sternberk, Division in Brno, Rybkova 8, 602 00 Brno (Czech Republic); Machala, Libor; Tucek, Jiri; Filip, Jan; Marusak, Zdenek [Regional Centre of Advanced Technologies and Materials, Departments of Physical Chemistry and Experimental Physics, 17. listopadu 1192/12, 771 46 Olomouc (Czech Republic); Sharma, Virender K., E-mail: vsharma@fit.edu [Chemistry Department, Florida Institute of Technology, 150 West University Boulevard, Melbourne, FL 32901 (United States); Center of Ferrate Excellence, Florida Institute of Technology, 150 West University Boulevard, Melbourne, FL 32901 (United States)

    2012-04-15

    Highlights: Black-Right-Pointing-Pointer Ferrate(VI) has been found to be highly efficient to decontaminate chemical warfare agents. Black-Right-Pointing-Pointer Fast degradation of sulfur mustard, soman and compound VX by ferrate(VI). Black-Right-Pointing-Pointer Nanoscale zero-valent iron particles are considerably less efficient in degradation of studied warfare agents compared to ferrate(VI). - Abstract: Nanoscale zero-valent iron (nZVI) particles and a composite containing a mixture of ferrate(VI) and ferrate(III) were prepared by thermal procedures. The phase compositions, valence states of iron, and particle sizes of iron-bearing compounds were determined by combination of X-ray powder diffraction, Moessbauer spectroscopy and scanning electron microscopy. The applicability of these environmentally friendly iron based materials in treatment of chemical warfare agents (CWAs) has been tested with three representative compounds, sulfur mustard (bis(2-chlorethyl) sulfide, HD), soman ((3,3 Prime -imethylbutan-2-yl)-methylphosphonofluoridate, GD), and O-ethyl S-[2-(diisopropylamino)ethyl] methylphosphonothiolate (VX). Zero-valent iron, even in the nanodimensional state, had a sluggish reactivity with CWAs, which was also observed in low degrees of CWAs degradation. On the contrary, ferrate(VI)/(III) composite exhibited a high reactivity and complete degradations of CWAs were accomplished. Under the studied conditions, the estimated first-order rate constants ({approx}10{sup -2} s{sup -1}) with the ferrate(VI)/(III) composite were several orders of magnitude higher than those of spontaneous hydrolysis of CWAs (10{sup -8}-10{sup -6} s{sup -1}). The results demonstrated that the oxidative technology based on application of ferrate(VI) is very promising to decontaminate CWAs.

  13. The Private Military Firms: Historical Evolution and Industry Analysis

    National Research Council Canada - National Science Library

    Alabarda, Yusuf; Lisowiec, Rafal

    2007-01-01

    .... This new industry, where firms not only supply the goods of warfare, but also fulfill many of the professional functions, is not only significant to the defense community, but has wider ramifications...

  14. Defense.gov Special Report: Defense Officials Release Operational Energy

    Science.gov (United States)

    , DOD Operational Energy Strategy DOD's Operational Energy Strategy will guide the Defense Department to operations are among the goals of the Defense Department's operational energy strategy, a senior Pentagon operational energy footprint, experts in solar power, microgrids and "smart" generators recently

  15. 75 FR 52732 - Renewal of Department of Defense Federal Advisory Committee; Missile Defense Advisory Committee

    Science.gov (United States)

    2010-08-27

    ... Committee; Missile Defense Advisory Committee AGENCY: Department of Defense (DoD). ACTION: Renewal of..., the Department of Defense gives notice that it is renewing the charter for the Missile Defense... Director, Missile Defense Agency, independent advice and recommendations on all matters relating to missile...

  16. Strategic Framework for the Defense Acquisition System Understanding Defense Consolidation

    National Research Council Canada - National Science Library

    Potts, Anthony W

    2007-01-01

    ...% of defense product sales annually. Defense consolidation has diminished the flexibility required for surge capacity, diminished competitive innovations in products, and reduced competitive pricing based on multiple sources for products...

  17. Mission Accomplished! Or Not? A Study about Success in Information Operations

    Science.gov (United States)

    2012-09-01

    sensors and presented on a man-machine interface, e.g., a computer screen or on a radar plan position indicator. In modern warfare, staff and...has to be achievable; otherwise, it can be viewed simply as dreaming. Compared to sea, land and even air warfare, information warfare is a young...shares some of its characteristics with the air and sea domains. All of them exist without borders. In addition, they cannot be fortified or

  18. What to Buy? The Role of Director of Defense Research and Engineering (DDR&E) Lessons from the 1970s

    Science.gov (United States)

    2011-01-01

    M. Thorndike , “Antisubmarine Warfare in World War II,” OEG Report No. 51 (Washington, DC: Operations Evaluation Group, 1946). The authors were not...Sternhell, Charles M. and Alan M. Thorndike . “Antisubmarine Warfare in World War II.” OEG Report No. 51. Washington, DC: Operations Evaluation Group

  19. Strategic Defense Initiative: Splendid Defense or Pipe Dream? Headline Series No. 275.

    Science.gov (United States)

    Armstrong, Scott; Grier, Peter

    This pamphlet presents a discussion of the various components of President Reagan's Strategic Defense Initiative (SDI) including the problem of pulling together various new technologies into an effective defensive system and the politics of the so-called "star wars" system. An important part of the defense initiative is the…

  20. Do You and Your Class Dare Visit the Real World?

    Science.gov (United States)

    Rossman, Michael

    1982-01-01

    A science teacher relates his feelings as he discussed modern warfare with his sixth-grade students. The students' reactions to moral questions and issues behind civil defense procedures and radioactivity are also discussed. (FG)

  1. The Military Missions and Means Framework

    National Research Council Canada - National Science Library

    Sheehan, Jack

    2004-01-01

    As the Department of Defense (DoD) transforms itself from a forces-based, materiel-centric Cold War posture to a capabilities-based, mission-centric asymmetric-warfare posture, it is increasingly vital that military planners...

  2. Protection of Shipping: A Forgotten Mission with Many New Challenges

    National Research Council Canada - National Science Library

    Grubb, Michael C

    2006-01-01

    ..." mission status, often leading to devastating losses of shipping when war came. Today, the protection of shipping mission still finds itself behind more high-profile missions such as strike warfare and ballistic missile defense...

  3. Financial Reporting Procedures for Defense Distribution Depots - Defense Logistics Agency Business Area of the Defense Business Operations Fund

    National Research Council Canada - National Science Library

    Young, Shelton

    1994-01-01

    In our audit of the FY 1993 Financial Statements for the Distribution Depots--Defense Logistics Agency Business Mea of the Defense Business Operations Fund, we evaluated procedures and controls used...

  4. Defense styles of pedophilic offenders.

    Science.gov (United States)

    Drapeau, Martin; Beretta, Véronique; de Roten, Yves; Koerner, Annett; Despland, Jean-Nicolas

    2008-04-01

    This pilot study investigated the defense styles of pedophile sexual offenders. Interviews with 20 pedophiles and 20 controls were scored using the Defense Mechanisms Rating Scales. Results showed that pedophiles had a significantly lower overall defensive functioning score than the controls. Pedophiles used significantly fewer obsessional-level defenses but more major image-distorting and action-level defenses. Results also suggested differences in the prevalence of individual defenses where pedophiles used more dissociation, displacement, denial, autistic fantasy, splitting of object, projective identification, acting out, and passive aggressive behavior but less intellectualization and rationalization.

  5. PRINCIPLES OF THE SYSTEM OF "CUSTOMIZABLE” DEFENSE ON THE FULL BASKETBALL COURT

    OpenAIRE

    Pavle Rubin

    2010-01-01

    The problem of this work stems from the fact that the tactics (not just applications, but also to create the principles of basketball games and variants) belongs to the domain experts of this sport (coaches, theorists, etc.). Every devising, selecting and applying specific tactics should satisfy two main objectives, to: be the greater surprise and provide adequate "response" to the opponent's tactics. The possibility of surprising opponent is primarily associated with the phase of defense, ti...

  6. Mass spectrometric study of selected precursors and degradation products of chemical warfare agents

    Czech Academy of Sciences Publication Activity Database

    Papoušková, B.; Bednář, P.; Fryšová, I.; Stýskala, J.; Hlaváč, J.; Barták, P.; Ulrichová, J.; Jirkovský, Jaromír; Lemr, K.

    2007-01-01

    Roč. 42, č. 12 (2007), s. 1550-1561 ISSN 1076-5174 Grant - others:The Organization for the Prohibition of Chemical Weapons (NL) L/ICA/ICB/84322/04 Institutional research plan: CEZ:AV0Z40400503 Source of funding: V - iné verejné zdroje Keywords : mass spectrometry * chemical warfare agent * high performance liquid chromatography * LC/MS Subject RIV: CF - Physical ; Theoretical Chemistry Impact factor: 3.062, year: 2007

  7. Strategic Framework for the Defense Acquisition System Understanding Defense Consolidation

    National Research Council Canada - National Science Library

    Potts, Anthony W

    2007-01-01

    The 1993 policy to promote the consolidation of the United States defense industry began a series of acquisitions and mergers that went beyond the intent of the policy and left the Department of Defense (DoD...

  8. A Cataloger’s Guide to the LMARS Report Number Authority File in Use at the Naval Underwater Systems Center.

    Science.gov (United States)

    1980-09-15

    FORCE CAMBRIDGE AFCRL-70-0018 RESEARCH LAB AFETR AIR FORCE EASTERN TEST RANGE APETR-TR-76-13 AFEWC AIR FORCE ELECTRONIC AFEWC-OP-1-77 WARFARE CENTER... EFFECTS TECHNOLOGY INC ETI-CR79-623 EUDAC EUROPEAN COMMAND DEFENSE EUDAC-DASJ-3-78 ANALYSIS EWIS (Electroniz Warfare EWIS-R-02-76 Inte 11 igence...AEO-76-066 JHU-APL-POR-1999. ..etc. JMEM (Joint Munitions Effectiveness JMEM-61JTCG/ME-1-2 Manual) jpl *See CIT-JPL (California Institute of Technology

  9. Recognizing Plant Defense Priming

    NARCIS (Netherlands)

    Martinez-Medina, Ainhoa; Flors, Victor; Heil, Martin; Mauch-Mani, Brigitte; Pieterse, Corné M J|info:eu-repo/dai/nl/113115113; Pozo, Maria J; Ton, Jurriaan; van Dam, Nicole M; Conrath, Uwe

    2016-01-01

    Defense priming conditions diverse plant species for the superinduction of defense, often resulting in enhanced pest and disease resistance and abiotic stress tolerance. Here, we propose a guideline that might assist the plant research community in a consistent assessment of defense priming in

  10. Recognizing plant defense priming

    NARCIS (Netherlands)

    Martinez-Medina, A.; Flors, V.; Heil, M.; Mauch-Mani, B.; Pieterse, C.M.J.; Pozo, M.J.; Ton, J.; Van Dam, N.M.; Conrath, U.

    2016-01-01

    Defense priming conditions diverse plant species for the superinduction of defense, often resulting in enhanced pest and disease resistance and abiotic stress tolerance. Here, we propose a guideline that might assist the plant research community in a consistent assessment of defense priming in

  11. Monoclonal antibody-assisted structure-function analysis of the carbohydrate recognition domain of surfactant protein D

    DEFF Research Database (Denmark)

    Hartshorn, Kevan L; White, Mitchell R; Rynkiewicz, Michael

    2010-01-01

    Surfactant protein D (SP-D) plays important roles in host defense against a variety of pathogens including influenza A virus (IAV). Ligand binding by SP-D is mediated by the trimeric neck and carbohydrate recognition domain (NCRD). We used monoclonal antibodies (mAbs) against human SP-D and a panel...

  12. Information Warfare on Social Media: A Brand Management Perspective

    Directory of Open Access Journals (Sweden)

    Kalpokas Ignas

    2017-06-01

    Full Text Available Employing a perspective informed by brand management, this article aims at understanding information warfare operations in social media. The state, seen as brand, must project an image of itself to both internal and foreign audiences to unite the domestic audience and/or attract global support. However, in constructing a brand, states are vulnerable to ‘sofa warriors’ – ordinary individuals who have been unwittingly recruited by hostile actors to disseminate (over social media or other platforms a counter-brand, harmful to the state concerned. These new threats are investigated in light of recent tendencies in online branding, elucidating their status as a national security threat, with the potential to significantly disrupt life in political communities.

  13. [Cutaneous and systemic toxicology of vesicants used in warfare].

    Science.gov (United States)

    Pita, R; Vidal-Asensi, S

    2010-01-01

    Vesicants are a group of chemicals used in warfare. The most representative agent is yperite, also known as mustard gas. The blisters that appeared on those exposed to yperite during combat in the First World War are responsible for the current name--vesicants--for this group of chemicals. Their affects are produced mainly through localized action of liquid or vapor forms on the skin, eyes, and respiratory tract. However, the high absorption of the liquid form through the skin or the vapor form on inhalation may cause substantial systemic effects. Here we analyze these effects, treatment of intoxication, and long-term sequelae, drawing on our experience and a review of the literature.

  14. Laser mass spectrometry of chemical warfare agents using ultrashort laser pulses

    International Nuclear Information System (INIS)

    Weickhardt, C.; Grun, C.; Grotemeyer, J.

    1998-01-01

    Fast relaxation processes in excited molecules such as IC, ISC, and fragmentation are observed in many environmentally and technically relevant substances. They cause severe problems to resonance ionization mass spectrometry because they reduce the ionization yield and lead to mass spectra which do not allow the identification of the compound. By the use of ultrashort laser pulses these problems can be overcome and the advantages of REMPI over conventional ionization techniques in mass spectrometry can be regained. This is demonstrated using soil samples contaminated with a chemical warfare agent

  15. Plant defense against insect herbivores

    DEFF Research Database (Denmark)

    Fürstenberg-Hägg, Joel; Zagrobelny, Mika; Bak, Søren

    2013-01-01

    , defense compounds. These bioactive specialized plant defense compounds may repel or intoxicate insects, while defense proteins often interfere with their digestion. Volatiles are released upon herbivory to repel herbivores, attract predators or for communication between leaves or plants, and to induce......Plants have been interacting with insects for several hundred million years, leading to complex defense approaches against various insect feeding strategies. Some defenses are constitutive while others are induced, although the insecticidal defense compound or protein classes are often similar...... defense responses. Plants also apply morphological features like waxes, trichomes and latices to make the feeding more difficult for the insects. Extrafloral nectar, food bodies and nesting or refuge sites are produced to accommodate and feed the predators of the herbivores. Meanwhile, herbivorous insects...

  16. Which Plant Proteins Are Involved in Antiviral Defense? Review on In Vivo and In Vitro Activities of Selected Plant Proteins against Viruses

    Directory of Open Access Journals (Sweden)

    Oskar Musidlak

    2017-11-01

    Full Text Available Plants have evolved a variety of defense mechanisms to tackle virus attack. Endogenous plant proteins can function as virus suppressors. Different types of proteins mediate defense responses against plant viruses. Pathogenesis-related (PR proteins are activated upon pathogen infections or in different stress situations and their production is one of many components in plant defense. Ribosome-inactivating proteins (RIPs suppress translation by enzymatically damaging ribosomes and they have been found to have antiviral activity. RNA-binding proteins (RBPs bind to target RNAs via specialized RNA-binding domain and can directly or indirectly function in plant defense system against RNA viruses. Proteins involved in silencing machinery, namely Dicer-like (DCL proteins, Argonaute (AGO proteins, and RNA-dependent RNA polymerases (RDRs confer innate antiviral defense in plants as they are able to degrade foreign RNA of viral origin. This review aims to provide a comprehensive and up-to-date picture of plant proteins participating in antiviral defense. As a result we discuss proteins conferring plant antiviral resistance and their potential future applications in different fields of life including agriculture and medicine.

  17. Other Defense Organizations and Defense Finance and Accounting Service Controls Over High-Risk Transactions Were Not Effective

    Science.gov (United States)

    2016-03-28

    Defense Organizations and Defense Finance and Accounting Service Controls Over High-Risk Transactions Were Not Effective M A R C H 2 8 , 2 0 1 6...Defense Organizations and Defense Finance and Accounting Service Controls Over High-Risk Transactions Were Not Effective Visit us at www.dodig.mil... FINANCE AND ACCOUNTING SERVICE DIRECTOR, DEFENSE HEALTH AGENCY SUBJECT: Other Defense Organizations and Defense Finance and Accounting Service

  18. DEFENSE PROGRAMS RISK MANAGEMENT FRAMEWORK

    Directory of Open Access Journals (Sweden)

    Constantin PREDA

    2012-01-01

    Full Text Available For the past years defense programs have faced delays in delivering defense capabilities and budget overruns. Stakeholders are looking for ways to improve program management and the decision making process given the very fluid and uncertain economic and political environment. Consequently, they have increasingly resorted to risk management as the main management tool for achieving defense programs objectives and for delivering the defense capabilities strongly needed for the soldiers on the ground on time and within limited defense budgets. Following a risk management based decision-making approach the stakeholders are expected not only to protect program objectives against a wide range of risks but, at the same time, to take advantage of the opportunities to increase the likelihood of program success. The prerequisite for making risk management the main tool for achieving defense programs objectives is the design and implementation of a strong risk management framework as a foundation providing an efficient and effective application of the best risk management practices. The aim of this paper is to examine the risk management framework for defense programs based on the ISO 31000:2009 standard, best risk management practices and the defense programs’ needs and particularities. For the purposes of this article, the term of defense programs refers to joint defense programs.

  19. Silverleaf Whitefly Induces Salicylic Acid Defenses and Suppresses Effectual Jasmonic Acid Defenses1[W][OA

    Science.gov (United States)

    Zarate, Sonia I.; Kempema, Louisa A.; Walling, Linda L.

    2007-01-01

    The basal defenses important in curtailing the development of the phloem-feeding silverleaf whitefly (Bemisia tabaci type B; SLWF) on Arabidopsis (Arabidopsis thaliana) were investigated. Sentinel defense gene RNAs were monitored in SLWF-infested and control plants. Salicylic acid (SA)-responsive gene transcripts accumulated locally (PR1, BGL2, PR5, SID2, EDS5, PAD4) and systemically (PR1, BGL2, PR5) during SLWF nymph feeding. In contrast, jasmonic acid (JA)- and ethylene-dependent RNAs (PDF1.2, VSP1, HEL, THI2.1, FAD3, ERS1, ERF1) were repressed or not modulated in SLWF-infested leaves. To test for a role of SA and JA pathways in basal defense, SLWF development on mutant and transgenic lines that constitutively activate or impair defense pathways was determined. By monitoring the percentage of SLWF nymphs in each instar, we show that mutants that activate SA defenses (cim10) or impair JA defenses (coi1) accelerated SLWF nymphal development. Reciprocally, mutants that activate JA defenses (cev1) or impair SA defenses (npr1, NahG) slowed SLWF nymphal development. Furthermore, when npr1 plants, which do not activate downstream SA defenses, were treated with methyl jasmonate, a dramatic delay in nymph development was observed. Collectively, these results showed that SLWF-repressed, JA-regulated defenses were associated with basal defense to the SLWF. PMID:17189328

  20. Bench-Scale Investigation of Composting for Remediation of Explosives-Contaminated Soils from Naval Surface Warfare Center, Crane, Indiana

    National Research Council Canada - National Science Library

    Preston, Kurt

    1998-01-01

    ...), and octahydro-1,3,5,7-tetranitro-1,3,5,7- tetrazocine (HMX). The Naval Surface Warfare Center (NSWC), Crane, Indiana, provides material and logistic support to the Navy's weapon systems, including expendable and nonexpendable ordnance items...

  1. Ge{sup 4+} doped TiO{sub 2} for stoichiometric degradation of warfare agents

    Energy Technology Data Exchange (ETDEWEB)

    Stengl, Vaclav, E-mail: stengl@iic.cas.cz [Department of Solid State Chemistry, Institute of Inorganic Chemistry AS CR v.v.i., 250 68 Rez (Czech Republic); Grygar, Tomas Matys [Department of Solid State Chemistry, Institute of Inorganic Chemistry AS CR v.v.i., 250 68 Rez (Czech Republic); Oplustil, Frantisek; Nemec, Tomas [Military Technical Institute of Protection Brno, Veslarska 230, 628 00 Brno (Czech Republic)

    2012-08-15

    Highlights: Black-Right-Pointing-Pointer We prepared nanodisperse Ge{sup 4+} doped titania by a novel synthesis method. Black-Right-Pointing-Pointer Synthesis does not involve organic solvents, organometallics nor thermal processes. Black-Right-Pointing-Pointer The prepared materials are efficient in removal of chemical warfare agents. Black-Right-Pointing-Pointer Ge{sup 4+} doping improves rate of removal of soman and agent VX by TiO{sub 2}. - Abstract: Germanium doped TiO{sub 2} was prepared by homogeneous hydrolysis of aqueous solutions of GeCl{sub 4} and TiOSO{sub 4} with urea. The synthesized samples were characterized by X-ray diffraction, scanning electron microscopy, EDS analysis, specific surface area (BET) and porosity determination (BJH). Ge{sup 4+} doping increases surface area and content of amorphous phase in prepared samples. These oxides were used in an experimental evaluation of their reactivity with chemical warfare agent, sulphur mustard, soman and agent VX. Ge{sup 4+} doping worsens sulphur mustard degradation and improves soman and agent VX degradation. The best degree of removal (degradation), 100% of soman, 99% of agent VX and 95% of sulphur mustard, is achieved with sample with 2 wt.% of germanium.

  2. Applicability of federal and state hazardous waste regulatory programs to waste chemical weapons and chemical warfare agents.; TOPICAL

    International Nuclear Information System (INIS)

    Haffenden, R.; Kimmell, T.

    2002-01-01

    This report reviews federal and state hazardous waste regulatory programs that govern the management of chemical weapons or chemical warfare agents. It addresses state programs in the eight states with chemical weapon storage facilities managed by the U.S. Army: Alabama, Arkansas, Colorado, Indiana, Kentucky, Maryland, Oregon, and Utah. It also includes discussions on 32 additional states or jurisdictions with known or suspected chemical weapons or chemical warfare agent presence (e.g., disposal sites containing chemical agent identification sets): Alaska, Arizona, California, Florida, Georgia, Hawaii, Idaho, Illinois, Iowa, Kansas, Louisiana, Massachusetts, Michigan, Mississippi, Missouri, Nebraska, Nevada, New Jersey, New Mexico, New York, North Carolina, Ohio, Pennsylvania, South Carolina, South Dakota, Tennessee, Texas, the U.S. Virgin Islands, Virginia, Washington, Washington, D.C., and Wyoming. Resource Conservation and Recovery Act (RCRA) hazardous waste programs are reviewed to determine whether chemical weapons or chemical warfare agents are listed hazardous wastes or otherwise defined or identified as hazardous wastes. Because the U.S. Environmental Protection Agency (EPA) military munitions rule specifically addresses the management of chemical munitions, this report also indicates whether a state has adopted the rule and whether the resulting state regulations have been authorized by EPA. Many states have adopted parts or all of the EPA munitions rule but have not yet received authorization from EPA to implement the rule. In these cases, the states may enforce the adopted munitions rule provisions under state law, but these provisions are not federally enforceable

  3. 75 FR 65462 - Renewal of Department of Defense Federal Advisory Committee; Department of Defense Military...

    Science.gov (United States)

    2010-10-25

    ... Committee; Department of Defense Military Family Readiness Council AGENCY: Department of Defense (DoD... renewing the charter for the Department of Defense Military Family Readiness Council (hereafter referred to... requirements for the support of military family readiness by the Department of Defense; and (c) evaluate and...

  4. Let’s Get Counterinsurgency Right: Collective Action Theory in Joint Publication 3-24

    Science.gov (United States)

    2015-04-01

    sell the weapons and pocket profits.73 Taliban members who experience fair sharing of expensive weapons are more likely to increase participation...Defense. (8 November 2010 (As Amended Through15 January 2015)). Joint Publication 1-02: Department of Defense Dictionary of Military and Associated...Warfare: A French View of Counterinsurgency ( English Translation). United States of America, KS: Frederick A. Praeger, Inc. Trives, S. (2009). Roots of

  5. The Alpini Effect: Why the US Army Should Train Units for Mountain Warfare

    Science.gov (United States)

    2014-05-22

    practical knowledge of the ground, and are very little adapted for mountain warfare.”20 The concept of infantry forces trained in mountain combat was...spearheaded the word of mouth campaign as he said, “It is easier to train a skier to be a soldier than to train a soldier to be a skier .” 30...author’s knowledge from professional experience 51 at Camp Carson from 1942-1944 and the US

  6. Chemical Warfare Agent Operational Exposure Hazard Assessment Research: FY07 Report and Analysis

    Science.gov (United States)

    2010-07-01

    agent migration rates. As stated by Armour and Sturgeon (1992), the extent of the contact hazard depends on the initial degree of contamination, the...with a contaminated surface. 2.1.5 Literature Cited 1. Armour , S.J; Sturgeon, W.R. Liquid Hazard from Chemical Warfare Agents for Pilots of High...the neck area was clipped and prepped with betadine, and the animal covered with a sterile surgical drape . The planned incision areas in the

  7. Defense AR Journal, Volume 15, Number 1, April 2008

    Science.gov (United States)

    2008-04-01

    available, inexpensive, and efficient methods of creating large-scale effects. Recent examples of basic asymmetric warfare include 9/11 suicide ...it is not planned, tracked, managed, or even acknowledged except by the overworked staff.” Employing the VDT model provides a valuable tool for

  8. MicroRNA-Mediated Gene Silencing in Plant Defense and Viral Counter-Defense

    Directory of Open Access Journals (Sweden)

    Sheng-Rui Liu

    2017-09-01

    Full Text Available MicroRNAs (miRNAs are non-coding RNAs of approximately 20–24 nucleotides in length that serve as central regulators of eukaryotic gene expression by targeting mRNAs for cleavage or translational repression. In plants, miRNAs are associated with numerous regulatory pathways in growth and development processes, and defensive responses in plant–pathogen interactions. Recently, significant progress has been made in understanding miRNA-mediated gene silencing and how viruses counter this defense mechanism. Here, we summarize the current knowledge and recent advances in understanding the roles of miRNAs involved in the plant defense against viruses and viral counter-defense. We also document the application of miRNAs in plant antiviral defense. This review discusses the current understanding of the mechanisms of miRNA-mediated gene silencing and provides insights on the never-ending arms race between plants and viruses.

  9. Modeling and Optimal Control of a Class of Warfare Hybrid Dynamic Systems Based on Lanchester (n,1 Attrition Model

    Directory of Open Access Journals (Sweden)

    Xiangyong Chen

    2014-01-01

    hybrid dynamic systems is established based on Lanchester equation in a (n,1 battle, where a heterogeneous force of n different troop types faces a homogeneous force. This model can be characterized by the interaction of continuous-time models (governed by Lanchester equation, and discrete event systems (described by variable tactics. Furthermore, an expository discussion is presented on an optimal variable tactics control problem for warfare hybrid dynamic system. The optimal control strategies are designed based on dynamic programming and differential game theory. As an example of the consequences of this optimal control problem, we take the (2, 1 case and solve the optimal strategies in a (2, 1 case. Simulation results show the feasibility of warfare hybrid system model and the effectiveness of the optimal control strategies designed.

  10. Recognizing Plant Defense Priming.

    Science.gov (United States)

    Martinez-Medina, Ainhoa; Flors, Victor; Heil, Martin; Mauch-Mani, Brigitte; Pieterse, Corné M J; Pozo, Maria J; Ton, Jurriaan; van Dam, Nicole M; Conrath, Uwe

    2016-10-01

    Defense priming conditions diverse plant species for the superinduction of defense, often resulting in enhanced pest and disease resistance and abiotic stress tolerance. Here, we propose a guideline that might assist the plant research community in a consistent assessment of defense priming in plants. Copyright © 2016 Elsevier Ltd. All rights reserved.

  11. Defense Islands in Bacterial and Archaeal Genomes and Prediction of Novel Defense Systems ▿†‡

    Science.gov (United States)

    Makarova, Kira S.; Wolf, Yuri I.; Snir, Sagi; Koonin, Eugene V.

    2011-01-01

    The arms race between cellular life forms and viruses is a major driving force of evolution. A substantial fraction of bacterial and archaeal genomes is dedicated to antivirus defense. We analyzed the distribution of defense genes and typical mobilome components (such as viral and transposon genes) in bacterial and archaeal genomes and demonstrated statistically significant clustering of antivirus defense systems and mobile genes and elements in genomic islands. The defense islands are enriched in putative operons and contain numerous overrepresented gene families. A detailed sequence analysis of the proteins encoded by genes in these families shows that many of them are diverged variants of known defense system components, whereas others show features, such as characteristic operonic organization, that are suggestive of novel defense systems. Thus, genomic islands provide abundant material for the experimental study of bacterial and archaeal antivirus defense. Except for the CRISPR-Cas systems, different classes of defense systems, in particular toxin-antitoxin and restriction-modification systems, show nonrandom clustering in defense islands. It remains unclear to what extent these associations reflect functional cooperation between different defense systems and to what extent the islands are genomic “sinks” that accumulate diverse nonessential genes, particularly those acquired via horizontal gene transfer. The characteristics of defense islands resemble those of mobilome islands. Defense and mobilome genes are nonrandomly associated in islands, suggesting nonadaptive evolution of the islands via a preferential attachment-like mechanism underpinned by the addictive properties of defense systems such as toxins-antitoxins and an important role of horizontal mobility in the evolution of these islands. PMID:21908672

  12. Application of the MASH v1.0 Code System to radiological warfare radiation threats

    International Nuclear Information System (INIS)

    Johnson, J.O.; Santoro, R.T.; Smith, M.S.

    1994-01-01

    Nuclear hardening capabilities of US and foreign ground force systems is a primary concern of the Department of Defense (DoD) and US Army. The Monte Carlo Adjoint Shielding Code System -- MASH v1.0 was developed at Oak Ridge National Laboratory (ORNL) to analyze these capabilities, i.e. the shielding effectiveness, for prompt radiation from a nuclear weapon detonation. Rapidly changing world events and the proliferation of nuclear weapons related technology have increased the kinds of nuclear threats to include intentionally dispersed radiation sources and fallout from tactical nuclear weapons used in the modern AirLand battlefield scenario. Consequently, a DoD area of increasing interest focuses on determining the shielding effectiveness of foreign and US armored vehicles to radiological warfare and fallout radiation threats. To demonstrate the applicability of MASH for analyzing dispersed radiation source problems, calculations have been completed for two distributed sources; a dispersed radiation environment simulated by a uniformly distributed 60 Co source, and a 235 U fission weapon fallout source. Fluence and dose assessments were performed for the free-field, the inside of a steel-walled two-meter box, in a phantom standing in the free-field, and in a phantom standing in the two-meter box. The results indicate substantial radiation protection factors for the 60 Co dispersed radiation source and the fallout source compared to the prompt radiation protection factors. The dose protection factors ranged from 40 to 95 for the two-meter box and from 55 to 123 for the mid-gut position of the phantom standing in the box. The results further indicate that a 60 Co source might be a good first order approximation for a tactical fission weapon fallout protection factor analysis

  13. [Decontamination of chemical warfare agents by photocatalysis].

    Science.gov (United States)

    Hirakawa, Tsutomu; Mera, Nobuaki; Sano, Taizo; Negishi, Nobuaki; Takeuchi, Koji

    2009-01-01

    Photocatalysis has been widely applied to solar-energy conversion and environmental purification. Photocatalyst, typically titanium dioxide (TiO(2)), produces active oxygen species under irradiation of ultraviolet light, and can decompose not only conventional pollutants but also different types of hazardous substances at mild conditions. We have recently started the study of photocatalytic decontamination of chemical warfare agents (CWAs) under collaboration with the National Research Institute of Police Science. This article reviews environmental applications of semiconductor photocatalysis, decontamination methods for CWAs, and previous photocatalytic studies applied to CWA degradation, together with some of our results obtained with CWAs and their simulant compounds. The data indicate that photocatalysis, which may not always give a striking power, certainly helps detoxification of such hazardous compounds. Unfortunately, there are not enough data obtained with real CWAs due to the difficulty in handling. We will add more scientific data using CWAs in the near future to develop useful decontamination systems that can reduce the damage caused by possible terrorism.

  14. Antipredator defenses predict diversification rates

    Science.gov (United States)

    Arbuckle, Kevin; Speed, Michael P.

    2015-01-01

    The “escape-and-radiate” hypothesis predicts that antipredator defenses facilitate adaptive radiations by enabling escape from constraints of predation, diversified habitat use, and subsequently speciation. Animals have evolved diverse strategies to reduce the direct costs of predation, including cryptic coloration and behavior, chemical defenses, mimicry, and advertisement of unprofitability (conspicuous warning coloration). Whereas the survival consequences of these alternative defenses for individuals are well-studied, little attention has been given to the macroevolutionary consequences of alternative forms of defense. Here we show, using amphibians as the first, to our knowledge, large-scale empirical test in animals, that there are important macroevolutionary consequences of alternative defenses. However, the escape-and-radiate hypothesis does not adequately describe them, due to its exclusive focus on speciation. We examined how rates of speciation and extinction vary across defensive traits throughout amphibians. Lineages that use chemical defenses show higher rates of speciation as predicted by escape-and-radiate but also show higher rates of extinction compared with those without chemical defense. The effect of chemical defense is a net reduction in diversification compared with lineages without chemical defense. In contrast, acquisition of conspicuous coloration (often used as warning signals or in mimicry) is associated with heightened speciation rates but unchanged extinction rates. We conclude that predictions based on the escape-and-radiate hypothesis must incorporate the effect of traits on both speciation and extinction, which is rarely considered in such studies. Our results also suggest that knowledge of defensive traits could have a bearing on the predictability of extinction, perhaps especially important in globally threatened taxa such as amphibians. PMID:26483488

  15. Planetary Defense

    Science.gov (United States)

    2016-05-01

    4 Abstract Planetary defense against asteroids should be a major concern for every government in the world . Millions of asteroids and...helps make Planetary Defense viable because defending the Earth against asteroids benefits from all the above technologies. So if our planet security...information about their physical characteristics so we can employ the right strategies. It is a crucial difference if asteroids are made up of metal

  16. A cognitive model for visual attention and its application (Extended abstract)

    NARCIS (Netherlands)

    Bosse, T.; Maanen, P.P. van; Treur, J.

    2007-01-01

    In the domain of naval command and control and warfare, the complex and dynamic nature of the environment makes that a warfare officer, who has to compile a tactical picture of the situation, has to deal with a large number of tasks in parallel. This study aims at investigating the use of a

  17. Ensuring a Strong U.S. Defense for the Future: The National Defense Panel Review of the 2014 Quadrennial Defense Review

    Science.gov (United States)

    2014-07-31

    territorial disputes with China. We note recent moves to station U.S. forces in Darwin , the plan to station a number of Littoral Combat Ships in Singapore...Under Secretary of Defense, Comptroller (C) Charles “Chuck” Hagel Secretary of Defense Mara Karlin Principal Director for Strategy, Policy (P...Support Staff to the Panel Charles Arnold George Sinks U.S. Government Liaison Officers Lori Abele Chief of Staff, Deputy Under Secretary of Defense

  18. DEFENSE-ATTACK INTERACTION OVER OPTIMALLY DESIGNED DEFENSE SYSTEMS VIA GAMES AND RELIABILITY

    Directory of Open Access Journals (Sweden)

    Isis Didier Lins

    2014-05-01

    Full Text Available This paper analyzes defense systems taking into account the strategic interactions between two rational agents; one of them is interested in designing a defense system against purposeful attacks of the other. The interaction is characterized by a sequential game with perfect and complete information. Reliability plays a fundamental role in both defining agents' actions and in measuring performance of the defense system for which a series-parallel configuration is set up by the defender. The attacker, in turn, focuses on only one defense subsystem in order to maximize her efficiency in attacking. An algorithm involving backward induction is developed to determine the equilibrium paths of the game. Application examples are also provided.

  19. A PR-4 gene identified from Malus domestica is involved in the defense responses against Botryosphaeria dothidea.

    Science.gov (United States)

    Bai, Suhua; Dong, Chaohua; Li, Baohua; Dai, Hongyi

    2013-01-01

    Pathogenesis-related protein-4 (PR-4) family is a group of proteins with a Barwin domain in C-terminus and generally thought to be involved in plant defense responses. However, their detailed roles are poorly understood in defense of apple plant against pathogenic infection. In the present study, a new PR-4 gene (designated as MdPR-4) was identified from Malus domestica, and its roles in defense responses of apple were investigated. The open reading frame of MdPR-4 gene is of 447 bp encoding a protein of 148 amino acids with a Barwin domain in C-terminus and a signal peptide of 26 amino acids in N-terminus. Sequence and structural analysis indicated that MdPR-4 protein belongs to class II of PR-4 family. The high-level expression of MdPR-4 was observed in flowers and leaves as revealed by quantitative real time PCR. The temporal expression analysis demonstrated that MdPR-4 expression could be up-regulated by Botryosphaeria dothidea infection and salicylic acid (SA) or methyl jasmonate (MeJA) treatment, but suppressed by diethyldithiocarbamic acid (DIECA). In vitro assays, recombinant MdPR-4 protein exhibited ribonuclease activity specific for single strand RNA and significant inhibition to hyphal growth of three apple pathogenic fungi B. dothidea, Valsa ceratosperma and Glomerella cingulata. Moreover, the inhibition was reduced by the presence of 5'-ADP. Taken all together, the results indicate that MdPR-4 protein is involved in the defense responses of apple against pathogenic attack by directly inhibiting hyphal growth, and the inhibition is correlated with its ribonuclease activity, where as MdPR-4 expression is regulated by both SA and JA signaling pathway. Copyright © 2012 Elsevier Masson SAS. All rights reserved.

  20. Russia and hybrid warfare: identifying critical elements in successful applications of hybrid tactics

    OpenAIRE

    Neville, Seth B.

    2015-01-01

    Approved for public release; distribution is unlimited With the Russian annexation of Crimea in 2014, hybrid war became a buzzword within political and academic circles. This thesis examines hybrid warfare applications using contemporary and historical examples. The analysis seeks to determine why a country was or was not successful in its execution of hybrid war, and it assesses the geo-political context of cost, benefit, and risk for an aggressor state contributing to its decision to eng...

  1. How ISO/IEC 17799 can be used for base lining information assurance among entities using data mining for defense, homeland security, commercial, and other civilian/commercial domains

    Science.gov (United States)

    Perry, William G.

    2006-04-01

    One goal of database mining is to draw unique and valid perspectives from multiple data sources. Insights that are fashioned from closely-held data stores are likely to possess a high degree of reliability. The degree of information assurance comes into question, however, when external databases are accessed, combined and analyzed to form new perspectives. ISO/IEC 17799, Information technology-Security techniques-Code of practice for information security management, can be used to establish a higher level of information assurance among disparate entities using data mining in the defense, homeland security, commercial and other civilian/commercial domains. Organizations that meet ISO/IEC information security standards have identified and assessed risks, threats and vulnerabilities and have taken significant proactive steps to meet their unique security requirements. The ISO standards address twelve domains: risk assessment and treatment, security policy, organization of information security, asset management, human resources security, physical and environmental security, communications and operations management, access control, information systems acquisition, development and maintenance, information security incident management and business continuity management and compliance. Analysts can be relatively confident that if organizations are ISO 17799 compliant, a high degree of information assurance is likely to be a characteristic of the data sets being used. The reverse may be true. Extracting, fusing and drawing conclusions based upon databases with a low degree of information assurance may be wrought with all of the hazards that come from knowingly using bad data to make decisions. Using ISO/IEC 17799 as a baseline for information assurance can help mitigate these risks.

  2. Modern sample preparation techniques for gas chromatography-mass spectrometry analysis of environmental markers of chemical warfare agents use

    NARCIS (Netherlands)

    Terzic, O.; de Voogt, P.; Banoub, J.

    2014-01-01

    The chapter introduces problematics of on-site chemical analysis in the investigations of past chemical warfare agents (CWA) events. An overview of primary environmental degradation pathways of CWA leading to formation of chemical markers of their use is given. Conventional and modern sample

  3. EDR2 negatively regulates salicylic acid-based defenses and cell death during powdery mildew infections of Arabidopsis thaliana

    Directory of Open Access Journals (Sweden)

    Nishimura Marc

    2007-07-01

    Full Text Available Abstract Background The hypersensitive necrosis response (HR of resistant plants to avirulent pathogens is a form of programmed cell death in which the plant sacrifices a few cells under attack, restricting pathogen growth into adjacent healthy tissues. In spite of the importance of this defense response, relatively little is known about the plant components that execute the cell death program or about its regulation in response to pathogen attack. Results We isolated the edr2-6 mutant, an allele of the previously described edr2 mutants. We found that edr2-6 exhibited an exaggerated chlorosis and necrosis response to attack by three pathogens, two powdery mildew and one downy mildew species, but not in response to abiotic stresses or attack by the bacterial leaf speck pathogen. The chlorosis and necrosis did not spread beyond inoculated sites suggesting that EDR2 limits the initiation of cell death rather than its spread. The pathogen-induced chlorosis and necrosis of edr2-6 was correlated with a stimulation of the salicylic acid defense pathway and was suppressed in mutants deficient in salicylic acid signaling. EDR2 encodes a novel protein with a pleckstrin homology and a StAR transfer (START domain as well as a plant-specific domain of unknown function, DUF1336. The pleckstrin homology domain binds to phosphatidylinositol-4-phosphate in vitro and an EDR2:HA:GFP protein localizes to endoplasmic reticulum, plasma membrane and endosomes. Conclusion EDR2 acts as a negative regulator of cell death, specifically the cell death elicited by pathogen attack and mediated by the salicylic acid defense pathway. Phosphatidylinositol-4-phosphate may have a role in limiting cell death via its effect on EDR2. This role in cell death may be indirect, by helping to target EDR2 to the appropriate membrane, or it may play a more direct role.

  4. Evaluation of the Space and Naval Warfare Systems Command (SPAWAR) Cost and Performance Measurement

    OpenAIRE

    Flavell, Drew G.; Dorwin, Timothy E.

    1999-01-01

    Approved for public release; distribution is unlimited. This thesis examines the Cost and Performance Measurements within four Program Directorates at the Space and Naval Warfare Systems Command (SPAWAR). SPAWAR is the Navy's full-spectrum research, development, test and evaluation, engineering and fleet support center for Command, Control and Communications Systems, Ocean Surveillance Systems and the integration of those systems that overarch multiplatforms. In the era of lean military bu...

  5. Assessing the Role of Surgical Strike Operations in Support of a Special Warfare Campaign

    Science.gov (United States)

    2017-06-09

    classic example of special warfare in action is the use of Special Forces soldiers to facilitate the Northern Alliance’s overthrow of the Taliban...Finally, the tempo of surgical strike operations must be taken into account. Renowned British counterinsurgent of the Boer War, Charles Callwell...December 2016, accessed 15 December 2016, http://edition.cnn.com/2010/ WORLD /asiapcf/10/09/ afghanistan.british.worker.death/index.html?hpt=T2. 43 camps

  6. Forgeting Lessons Learned: The United States Army’s Inability To Embrace Irregular Warfare

    Science.gov (United States)

    2014-04-01

    Revolutionary Development Support, commonly referred to as “CORDS”, was established in 1967 under Robert “Blowtorch” Komer. As the director of CORDS, Robert ...combat operations spanning the complete spectrum of warfare. As Robert Citino, the author of Blitzkrieg to Desert Storm wrote about the development of...US forces in Somalia. Haiti In 1915, Smedley Butler and 3,000 Marines invaded Haiti and quickly pacified the entire island. Eighty years

  7. Russian Perspectives on Network-Centric Warfare: The Key Aim of Serdyukov’s Reform

    Science.gov (United States)

    2011-01-01

    has faced with its GLObal’naya NAvigatsionnaya Sputnikovaya Sistema —(GLONASS) system, and introducing advanced digitized communications in the armed...of targeting data will be accomplished by organizing virtual channels for data transmission or via a web -portal. The successful function- ing of the...Operations: Tactical Web Takes Shape,” Signal, November 2003; Col. Alan D. Campen, USAF (Ret.), “Look Closely At Network-Centric Warfare: Technology Can

  8. Long-Term Effects of Chemical Warfare on Post-traumatic Stress Disorder, Depression, and Chronic Medical Conditions in Veterans.

    Science.gov (United States)

    Safi-Aghdam, Hamideh; Shafie, Mehrzad; Khoshdel, Alireza; Moazen-Zadeh, Ehsan; Avakh, Farhad; Rahmani, Arash

    2018-04-24

    We investigated the association between exposure to chemical warfare and chronic mental/physical conditions. This was a secondary analysis of data from a case-control study on Iranian male veterans. Participants with neuropsychiatric disorders other than depressive/anxiety disorders, anatomical defects, or malignancies were excluded. Compared to non-exposed veterans, exposed veterans demonstrated significantly higher odds of PTSD [OR (95% CI) = 5.23 (1.98-13.85)], hypertension [OR (95% CI) = 5.57 (1.68-18.48)], coronary heart disease [OR (95% CI) = 6.8 (1.62-28.49)], and diabetes [OR (95% CI) = 3.88 (1.35-11.16)], and marginally higher odds of moderate to severe depressive symptoms [OR (95% CI) = 2.21 (0.93-5.28)]. This study provides preliminary evidence on association of exposure to chemical warfare with long-term mental disorders as well as chronic medical conditions.

  9. Modeling and Simulation for the Investigation of Radar Responses to Electronic Attacks in Electronic Warfare Environments

    Directory of Open Access Journals (Sweden)

    So Ryoung Park

    2018-01-01

    Full Text Available An electronic warfare (EW simulator is presented to investigate and evaluate the tracking performance of radar system under the electronic attack situations. The EW simulator has the input section in which the characteristic parameters of radar threat, radar warning receiver, jammer, electromagnetic wave propagation, and simulation scenario can be set up. During the process of simulation, the simulator displays the situations of simulation such as the received signal and its spectrum, radar scope, and angle tracking scope and also calculates the transient and root-mean-squared tracking errors of the range and angle tracking system of radar. Using the proposed EW simulator, we analyze the effect of concealment according to the noise and signal powers under the noise jamming and also analyze the effect of deception by calculating errors between the desired value and the estimated one under the deceptive jamming. Furthermore, the proposed EW simulator can be used to figure out the feature of radar threats based on the information collected from the EW receiver and also used to carry out the electronic attacks efficiently in electronic warfare.

  10. Next Generation Non-particulate Dry Nonwoven Pad for Chemical Warfare Agent Decontamination

    Energy Technology Data Exchange (ETDEWEB)

    Ramkumar, S S; Love, A; Sata, U R; Koester, C J; Smith, W J; Keating, G A; Hobbs, L; Cox, S B; Lagna, W M; Kendall, R J

    2008-05-01

    New, non-particulate decontamination materials promise to reduce both military and civilian casualties by enabling individuals to decontaminate themselves and their equipment within minutes of exposure to chemical warfare agents or other toxic materials. One of the most promising new materials has been developed using a needlepunching nonwoven process to construct a novel and non-particulate composite fabric of multiple layers, including an inner layer of activated carbon fabric, which is well-suited for the decontamination of both personnel and equipment. This paper describes the development of a composite nonwoven pad and compares efficacy test results for this pad with results from testing other decontamination systems. The efficacy of the dry nonwoven fabric pad was demonstrated specifically for decontamination of the chemical warfare blister agent bis(2-chloroethyl)sulfide (H or sulfur mustard). GC/MS results indicate that the composite fabric was capable of significantly reducing the vapor hazard from mustard liquid absorbed into the nonwoven dry fabric pad. The mustard adsorption efficiency of the nonwoven pad was significantly higher than particulate activated carbon (p=0.041) and was similar to the currently fielded US military M291 kit (p=0.952). The nonwoven pad has several advantages over other materials, especially its non-particulate, yet flexible, construction. This composite fabric was also shown to be chemically compatible with potential toxic and hazardous liquids, which span a range of hydrophilic and hydrophobic chemicals, including a concentrated acid, an organic solvent and a mild oxidant, bleach.

  11. Analysis of Chemical Warfare Agents: General Overview, LC-MS Review, In-House LC-ESI-MS Methods and Open Literature Bibliography

    National Research Council Canada - National Science Library

    D'Agostino, Paul A; Chenier, C. L

    2006-01-01

    Ratification of the Chemical Weapons Convention by more than 165 States Parties has reduced the risk of chemical warfare agent use, but there still remains a concern that other parties may make use...

  12. The US-Russia missile defense dialogue as a factor of the Russian defense policy

    OpenAIRE

    Dmitry Suslov

    2013-01-01

    To a big extent the Russian defense policy and, as a consequence, development of the Russian defense industrial complex, is determined by the prospects of the US missile defense policy and fate of the US-Russia negotiations in this area. As a cooperative solution seems improbable in the observable future, Russia plans to develop certain response measures of military nature, including creation of a new heavy ICBM, and to create its own missile defense by 2015. However, this policy does not see...

  13. Defense Agency Travel Payments at Defense Finance and Accounting Service Indianapolis Center

    National Research Council Canada - National Science Library

    1997-01-01

    The audit objective was to assess the effectiveness of Defense Finance and Accounting Service Indianapolis Center management controls over payments to Defense agency personnel for temporary duty and local travel...

  14. USN/USMC Antiair Warfare and Command, Control and Communications for Amphibious Operations

    Science.gov (United States)

    1992-03-01

    NUMBERS W’Vf~ * ic0"W O plows k; to., W..ia 0;41 40A.YWfI 11 TITLE (Inclucle Securily CiaSsifkcaticin) U8N/U8SUC Antiuar Warflire and4 CommaskC~Ual...the CWC to be a manager of all the warfare areas and frees him from becoming entangled in one tactical problem while another grows undetected elsewhere...hostile enemy actions (i.e., jamming) the potential begins to decrease rapidly . [Ref. 19:pp. 185-194] F. MARINE CORPS PRINCIPLES OF AAW There are three

  15. SELF-DEFENSE IN KARABAKH CONFLICT?

    Directory of Open Access Journals (Sweden)

    Saeed Bagheri

    2015-01-01

    Full Text Available Use of force is one of the principles of international law which has been banned by the UN Charter and modern constitutions. However, since the enforcement of the UN Charter, self-defense has become the preferred excuse for states to justify their use of force. But applying self-defense requires some conditions. Immediacy is one of the important conditions of self-defense. Immediacy defined as the time span between armed attacks and reaction to it, is the main discourse. This condition requires self defense immediately after the armed conflict or during a rational time span since its occurance.In this respect, the emerging Karabakh Conflict between Armenia and Azerbaijan in the 1990s is important. After Armenia’s armed attacks, Azerbaijan has acted within the scope of legitimate self-defense. But in accordance with UN Security Council cease-fire resolution Azerbaijan has suspended its self-defense actions. However, today, still twenty percent of Azerbaijani territory is still under Armenian occupation. Accordingly, after a long time the validity of Azerbaijan’s right to legitimate self-defense is still subject to arguments.In this article, by comparing two different approaches (strict and board interpretation approaches on the temporal link between the measures of self-defense and the armed attacks (immediacy, the temporal link between the self-defense countermeasures of Azerbaijan and armed attacks by Armenia in Karabakh Conflict will be examined.

  16. Chromatography and mass spectrometry of chemical warfare agents, toxins and related compounds: state of the art and future prospects

    NARCIS (Netherlands)

    Kientz, C.E.

    1998-01-01

    Methods for the identification of chemical warfare agents, toxins, bioregulators and related products are frequently reported in literature. These methods are often based on instrumental analysis using chromatography (gas and liquid) and mass spectrometry. Here, these instrumental techniques are

  17. Book Review: Conquest in Cyberspace: National Security and Information Warfare

    Directory of Open Access Journals (Sweden)

    Gary C. Kessler

    2007-06-01

    Full Text Available Libicki, M.C. (2007. Conquest in Cyberspace: National Security and Information Warfare. New York: Cambridge University Press. 323 pages, ISBN: 978-0-521-69214-4 (paper, US$80Reviewed by Gary C. Kessler (gary.kessler@champlain.eduMany books -- and even movies ("Live Free or Die Hard" -- are based upon the premise of an impending information war. In these scenarios -- made all too plausible by the increased frequency with which we read about and experience major information security incidents -- a Bad Guy exploits known computer security vulnerabilities in order to control major national infrastructures via the Internet so as to reap financial, economic, and/or personal power.(see PDF for full review

  18. The Tudor domain protein Spindlin1 is involved in intrinsic antiviral defense against incoming hepatitis B Virus and herpes simplex virus type 1.

    Directory of Open Access Journals (Sweden)

    Aurélie Ducroux

    2014-09-01

    Full Text Available Hepatitis B virus infection (HBV is a major risk factor for the development of hepatocellular carcinoma. HBV replicates from a covalently closed circular DNA (cccDNA that remains as an episome within the nucleus of infected cells and serves as a template for the transcription of HBV RNAs. The regulatory protein HBx has been shown to be essential for cccDNA transcription in the context of infection. Here we identified Spindlin1, a cellular Tudor-domain protein, as an HBx interacting partner. We further demonstrated that Spindlin1 is recruited to the cccDNA and inhibits its transcription in the context of infection. Spindlin1 knockdown induced an increase in HBV transcription and in histone H4K4 trimethylation at the cccDNA, suggesting that Spindlin1 impacts on epigenetic regulation. Spindlin1-induced transcriptional inhibition was greater for the HBV virus deficient for the expression of HBx than for the HBV WT virus, suggesting that HBx counteracts Spindlin1 repression. Importantly, we showed that the repressive role of Spindlin1 is not limited to HBV transcription but also extends to other DNA virus that replicate within the nucleus such as Herpes Simplex Virus type 1 (HSV-1. Taken together our results identify Spindlin1 as a critical component of the intrinsic antiviral defense and shed new light on the function of HBx in HBV infection.

  19. Defense Treaty Inspection Readiness Program

    International Nuclear Information System (INIS)

    Cronin, J.J.; Kohen, M.D.; Rivers, J.D.

    1996-01-01

    The Defense Treaty Inspection Readiness Program (DTIRP) was established by the Department of Defense in 1990 to assist defense facilities in preparing for treaty verification activities. Led by the On-Site Inspection Agency (OSIA), an element of the Department of Defense, DTIRP''s membership includes representatives from other Department of Defense agencies, the Department of Energy (DOE), the Central Intelligence Agency, the Federal Bureau of Investigation, the Department of Commerce, and others. The Office of Safeguards and Security has a significant interest in this program, due to the number of national defense facilities within its purview that are candidates for future inspections. As a result, the Office of Safeguards and Security has taken a very active role in DTIRP. This paper discusses the Office of Safeguards and Security''s increasing involvement in various elements of the DTIRP, ranging from facility assessments to training development and implementation

  20. Chemical warfare protection for the cockpit of future aircraft

    Science.gov (United States)

    Pickl, William C.

    1988-01-01

    Currently systems are being developed which will filter chemical and biological contaminants from crew station air. In order to maximize the benefits of these systems, a method of keeping the cockpit contaminant free during pilot ingress and egress is needed. One solution is to use a rectangular plastic curtain to seal the four edges of the canopy frame to the canopy sill. The curtain is stored in a tray which is recessed into the canopy sill and unfolds in accordion fashion as the canopy is raised. A two way zipper developed by Calspan could be used as an airlock between the pilot's oversuit and the cockpit. This system eliminates the pilot's need for heavy and restrictive CB gear because he would never be exposed to the chemical warfare environment.