WorldWideScience

Sample records for intelligent munition warfare

  1. Intelligence Strategy for Fourth Generation Warfare

    National Research Council Canada - National Science Library

    Jamison, Edward P

    2006-01-01

    ...." They have named this new era of war "fourth generation warfare." Currently the Department of Defense's intelligence strategy is designed to defeat conventional adversaries vise a fourth generation warfare opponent...

  2. Bioaccumulation of chemical warfare agents, energetic materials, and metals in deep-sea shrimp from discarded military munitions sites off Pearl Harbor

    Science.gov (United States)

    Koide, Shelby; Silva, Jeff A. K.; Dupra, Vilma; Edwards, Margo

    2016-06-01

    The bioaccumulation of munitions-related chemicals at former military deep-water disposal sites is poorly understood. This paper presents the results of human-food-item biota sampling to assess the potential for bioaccumulation of chemical warfare agents, energetic materials, arsenic, and additional munitions-related metals in deep-sea shrimp tissue samples collected during the Hawai'i Undersea Military Munitions Assessment (HUMMA) project to date. The HUMMA investigation area is located within a former munitions sea-disposal site located south of Pearl Harbor on the island of O'ahu, Hawai'i, designated site Hawaii-05 (HI-05) by the United States Department of Defense. Indigenous deep-sea shrimp (Heterocarpus ensifer) were caught adjacent to discarded military munitions (DMM) and at control sites where munitions were absent. Tissue analysis results showed that chemical warfare agents and their degradation products were not present within the edible portions of these samples at detectable concentrations, and energetic materials and their degradation products were detected in only a few samples at concentrations below the laboratory reporting limits. Likewise, arsenic, copper, and lead concentrations were below the United States Food and Drug Administration's permitted concentrations of metals in marine biota tissue (if defined), and their presence within these samples could not be attributed to the presence of DMM within the study area based on a comparative analysis of munitions-adjacent and control samples collected. Based on this current dataset, it can be concluded that DMM existing within the HUMMA study area is not contributing to the bioaccumulation of munitions-related chemicals for the biota species investigated to date.

  3. Chemical Warfare Materiel in Sediment at a Deep-Water Discarded Military Munitions Site

    Science.gov (United States)

    Briggs, C. W.; Bissonnette, M. C.; Edwards, M.; Shjegstad, S. M.

    2016-12-01

    Understanding the release and transformation of chemical agent (CA) at underwater discarded military munitions (DMM) sites is essential to determine the potential risk to human health and impact on the ocean environment; yet few studies have been conducted at sites in excess of 250 m, the depth at which most U.S. CA munitions were disposed. Maritime construction workers installing cables or pipelines at a CA DMM site, as well as fishermen and scientific researchers deploying bottom-contact gear, represent possible exposure pathways to human receptors. The Hawai`i Undersea Military Munitions Assessment (HUMMA) sought to characterize a historic munitions sea-disposal site at depths between 400-650 m. During the 2014 HUMMA Sampling Survey, the Jason 2 remotely operated vehicle was used to collect sediments within two meters of suspected World War II chemical munitions, confirmed to be 100-lb M47 series bombs containing sulfur mustard. When environmental media was brought to the surface, samples were screened for distilled sulfur mustard (HD) and related agent breakdown products (ABP) (collectively referred to as chemical warfare materiel [CWM]). Detectable concentrations of HD and/or its ABP 1,4-dithiane were found in sediments collected at all CA DMM sites; HD was also detected at two control sites. The location and extent of munitions casing deterioration strongly influenced the distribution and level of CWM in sediment. The interior of the casing contained levels of CWM orders of magnitudes higher than that observed in the surrounding sediment at one meter distance, indicating the majority of the CWM is hydrolyzed as it is released from the munitions casing and a fraction of the fill materiel persists in the environment for decades following disposal. Although the potential for future site users to become exposed to CWA in recovered sediments and debris exists, the level of risk is significantly mitigated by the depth and location of the sea-disposal site.

  4. Distribution of chemical warfare agent, energetics, and metals in sediments at a deep-water discarded military munitions site

    Science.gov (United States)

    Briggs, Christian; Shjegstad, Sonia M.; Silva, Jeff A. K.; Edwards, Margo H.

    2016-06-01

    There is a strong need to understand the behavior of chemical warfare agent (CWA) at underwater discarded military munitions (DMM) sites to determine the potential threat to human health or the environment, yet few studies have been conducted at sites in excess of 250 m, the depth at which most U.S. chemical munitions were disposed. As part of the Hawai'i Undersea Military Munitions Assessment (HUMMA), sediments adjacent to chemical and conventional DMM at depths of 400-650 m were sampled using human occupied vehicles (HOVs) in order to quantify the distribution of CWA, energetics, and select metals. Sites in the same general area, with no munitions within 50 m in any direction were sampled as a control. Sulfur mustard (HD) and its degradation product 1,4-dithiane were detected at each CWA DMM site, as well as a single sample with the HD degradation product 1,4-thioxane. An energetic compound was detected in sediment to a limited extent at one CWA DMM site. Metals common in munitions casings (i.e., Fe, Cu, and Pb) showed similar trends at the regional and site-wide scales, likely reflecting changes in marine sediment deposition and composition. This study shows HD and its degradation products can persist in the deep-marine environment for decades following munitions disposal.

  5. Optimization of Intelligent Munition Warfare Using Agent-Based Simulation Software and Design of Experiments Methodology

    National Research Council Canada - National Science Library

    Floersheim, Bruce; Hou, Gene

    2006-01-01

    ... mechanism for a number of vehicles caught in the killzone. Thus, it is useful to study and attempt to model through equations and simulation the interaction between enemy agents and these new munitions...

  6. Analysis of Biota to Evaluate the Risks Associated with Chemical Warfare Materiel Present in Sea-Disposed Military Munitions to Human Health and the Environment

    Science.gov (United States)

    Briggs, C. W.; Bissonnette, M. C.; Edwards, M.; Shjegstad, S. M.

    2016-12-01

    Thousands of 100-lb M47A series bombs containing sulfur mustard were disposed in the ocean following World War II yet few studies have been conducted at sites in excess of 250 m, the depth where most discarded military munitions (DMM) were disposed. The Hawai`i Undersea Military Munitions Assessment (HUMMA) project was conducted to evaluate the risk from chemical warfare materiel (CWM) in DMM to human health, measuring ecological differences between the disposal area and nearby but otherwise similar areas, and evaluating the most efficient platforms for surveying DMM sea-disposal sites located at depths between 400-650 m. During the 2014 HUMMA Sampling Survey, the Jason 2 remotely operated vehicle was used to collect data. Shrimp were collected and analyzed to assess the potential for bioaccumulation of CWM, energetics and metals from munitions. No CWM was detected in H. ensifer tissue samples, indicating bioaccumulation is not occurring. Low levels of 2,4,6-trinitrotoluene, 4-amino-2,6-­dinitrotoluene, 1,3,5-trinitrobenzene, nitrobenzene, arsenic, copper, and lead were detected and the concentrations were not significantly different at DMM and control sites. No visible deformities, eroded fins, lesions, or tumors were observed on the shrimp living in the vicinity of M47A bombs. Given these results and under current and potential future uses of the HUMMA study area, health risks to likely receptors are within EPA acceptable levels. Photographic data and benthic infauna analysis were used to study benthic organisms that lived on or near munitions. There was no statistically distinguishable difference between organism distributions in dense and sparse munitions fields. Conventional munitions were found to have the greatest number of benthic infauna individuals, with control sites generally having the least number of individuals. This is consistent with the benthic macro-fauna analysis, which shows that munitions provide habitat.

  7. A Comparison of Neutron-Based Non-Destructive Assessment Methods for Chemical Warfare Material and High Explosives

    International Nuclear Information System (INIS)

    Seabury, E. H.; Chichester, D. L.; Wharton, C. J.; Caffrey, A. J.

    2009-01-01

    Prompt Gamma Neutron Activation Analysis (PGNAA) systems employ neutrons as a probe to interrogate items, e.g. chemical warfare materiel-filled munitions. The choice of a neutron source in field-portable systems is determined by its ability to excite nuclei of interest, operational concerns such as radiological safety and ease-of-use, and cost. Idaho National Laboratory's PINS Chemical Assay System has traditionally used a 252 Cf isotopic neutron source, but recently a deuterium-tritium (DT) electronic neutron generator (ENG) has been tested as an alternate neutron source. This paper presents the results of using both of these neutron sources to interrogate chemical warfare materiel (CWM) and high explosive (HE) filled munitions.

  8. Applicability of federal and state hazardous waste regulatory programs to waste chemical weapons and chemical warfare agents.; TOPICAL

    International Nuclear Information System (INIS)

    Haffenden, R.; Kimmell, T.

    2002-01-01

    This report reviews federal and state hazardous waste regulatory programs that govern the management of chemical weapons or chemical warfare agents. It addresses state programs in the eight states with chemical weapon storage facilities managed by the U.S. Army: Alabama, Arkansas, Colorado, Indiana, Kentucky, Maryland, Oregon, and Utah. It also includes discussions on 32 additional states or jurisdictions with known or suspected chemical weapons or chemical warfare agent presence (e.g., disposal sites containing chemical agent identification sets): Alaska, Arizona, California, Florida, Georgia, Hawaii, Idaho, Illinois, Iowa, Kansas, Louisiana, Massachusetts, Michigan, Mississippi, Missouri, Nebraska, Nevada, New Jersey, New Mexico, New York, North Carolina, Ohio, Pennsylvania, South Carolina, South Dakota, Tennessee, Texas, the U.S. Virgin Islands, Virginia, Washington, Washington, D.C., and Wyoming. Resource Conservation and Recovery Act (RCRA) hazardous waste programs are reviewed to determine whether chemical weapons or chemical warfare agents are listed hazardous wastes or otherwise defined or identified as hazardous wastes. Because the U.S. Environmental Protection Agency (EPA) military munitions rule specifically addresses the management of chemical munitions, this report also indicates whether a state has adopted the rule and whether the resulting state regulations have been authorized by EPA. Many states have adopted parts or all of the EPA munitions rule but have not yet received authorization from EPA to implement the rule. In these cases, the states may enforce the adopted munitions rule provisions under state law, but these provisions are not federally enforceable

  9. Acute toxicity of sea-dumped chemical munitions: Luminating the environmental toxicity of legacy compounds

    DEFF Research Database (Denmark)

    Mohammed Abdullah Christensen, Ilias; Sanderson, Hans; Baatrup, Erik

    2016-01-01

    As a result of the disarmament of Germany after the Second World War, 65,000 tons of chemical munitions were dumped in the Baltic Sea. Approximately 13,000 tons containing chemical warfare agents (CWAs) of which 11,000 tons were dumped in the Bornholm Basin east of Bornholm. This paper addresses...

  10. Electronic Warfare (EW) Historical Perspectives and Its Relationship to Information Operations (IO) - Considerations for Turkey

    Science.gov (United States)

    2006-09-01

    Information Operations IW Information Warfare JDAM Joint Direct Attack Munition JRFL Joint Restricted Frequency List JSTARS Joint...through the preparation of the joint restricted frequency list (JRFL), which includes taboo, guarded and protected frequencies. The EC-130H Compass Call

  11. Joint Military Operations: Centers of Gravity and the War in Kosovo

    National Research Council Canada - National Science Library

    Milley, Mark

    2000-01-01

    ... and not throw the baby out with the bathwater. Even in this age of networked warfare, precision strike munitions and real time intelligence, Clausewitz's discussions of centers of gravity still provide fundamental insight into the conduct of war...

  12. Cyber warfare building the scientific foundation

    CERN Document Server

    Jajodia, Sushil; Subrahmanian, VS; Swarup, Vipin; Wang, Cliff

    2015-01-01

    This book features a wide spectrum of the latest computer science research relating to cyber warfare, including military and policy dimensions. It is the first book to explore the scientific foundation of cyber warfare and features research from the areas of artificial intelligence, game theory, programming languages, graph theory and more. The high-level approach and emphasis on scientific rigor provides insights on ways to improve cyber warfare defense worldwide. Cyber Warfare: Building the Scientific Foundation targets researchers and practitioners working in cyber security, especially gove

  13. Defining cyber warfare

    Directory of Open Access Journals (Sweden)

    Dragan D. Mladenović

    2012-04-01

    Full Text Available Cyber conflicts represent a new kind of warfare that is technologically developing very rapidly. Such development results in more frequent and more intensive cyber attacks undertaken by states against adversary targets, with a wide range of diverse operations, from information operations to physical destruction of targets. Nevertheless, cyber warfare is waged through the application of the same means, techniques and methods as those used in cyber criminal, terrorism and intelligence activities. Moreover, it has a very specific nature that enables states to covertly initiate attacks against their adversaries. The starting point in defining doctrines, procedures and standards in the area of cyber warfare is determining its true nature. In this paper, a contribution to this effort was made through the analysis of the existing state doctrines and international practice in the area of cyber warfare towards the determination of its nationally acceptable definition.

  14. The 1970s and Early 1980s: Enabling a Military Offset

    Science.gov (United States)

    2017-04-05

    already obsolete or see that technologies such as drones and artificial intelligence are revolutionary changes in the nature of warfare that make the...and feed revolutionary new systems, such as extended-range precision-guided munitions, stealth aircraft, and new intelligence , surveillance, and...approach to military competition that seeks to asymmetrically compensate for a disadvantaged position. Rather than competing head to head in an area

  15. Innovative permeable cover system to reduce risks at a chemical munitions burial site

    International Nuclear Information System (INIS)

    Powels, C.C.; Bon, I.; Okusu, N.M.

    1997-01-01

    An innovative permeable sand cover with various integrated systems has been designed to contain and treat the Old O-Field chemical munitions landfill at Aberdeen Proving Ground, Maryland. The 18,200 m 2 (4.5 acre) landfill was used from the mid 1930s to the mid 1950s for the disposal of chemical, incendiary, and explosive munitions from domestic and foreign origins, together with contaminated wastes associated with the development and production of chemical warfare agents (CWA). The site is suspected to be contaminated with white phosphorous (WP) (which when dry, spontaneously burns when exposed to air), shock sensitive picric acid fuses and has the potential to contain large quantities of CWA-filled munitions. Historically, one to three explosions or fires occurred per ten-year period at the landfill. Such events have the potential to cause a CWA release to the environment, which could potentially affect densely populated areas. Recovery and decontamination projects conducted at the site in the late 1940s and early 1950s used large amounts of decontamination chemicals (containing solvents) and fuels which further contaminated the area. The groundwater downgradient of the landfill is contaminated with volatile organic compounds, metals, explosives and CWA degradation compounds and is currently being contained by a groundwater extraction and treatment system. This report describes a remedial action program for the site

  16. Survey on Urban Warfare Augmented Reality

    Directory of Open Access Journals (Sweden)

    Xiong You

    2018-01-01

    Full Text Available Urban warfare has become one of the main forms of modern combat in the twenty-first century. The main reason why urban warfare results in hundreds of casualties is that the situational information of the combatant is insufficient. Accessing information via an Augmented Reality system can elevate combatants’ situational awareness to effectively improve the efficiency of decision-making and reduce the injuries. This paper begins with the concept of Urban Warfare Augmented Reality (UWAR and illuminates the objectives of developing UWAR, i.e., transparent battlefield, intuitional perception and natural interaction. Real-time outdoor registration, information presentation and natural interaction are presented as key technologies of a practical UWAR system. Then, the history and current research state of these technologies are summarized and their future developments are highlighted from three perspectives, i.e., (1 Better integration with Geographic Information System and Virtual Geographic Environment; (2 More intelligent software; (3 More powerful hardware.

  17. Bits or Shots in Combat? The Generalized Deitchman Model of Guerrilla Warfare

    OpenAIRE

    Kress, Moshe; MacKay, Niall J.

    2013-01-01

    Operations Research Letters, accepted. We generalize Deitchman's guerrilla warfare model to account for trade-off between intelligence ('bits') and firepower ('shots'). Intelligent targeting leads to aimed fire, absence of intelligence leads to unaimed fire, dependent on targets' density. We propose a new Lanchester-type model that mixes aimed with unaimed fire, the balance between these being determined by quality of information. We derive the model's conserved quantity, and use it ...

  18. Evolving Military Intelligence: The Effect of the Military Intelligence Service (MIS) and the Military Intelligence Organization (MIO) During the Korean and Vietnam Wars

    Science.gov (United States)

    2017-06-09

    Doctrine Publication (ADP) 2-0, Intelligence (Washington, DC: Government Printing Office, 2012), 1. 2 Scott D. Berrier, “ILE Branch Day” (Lecture, Command...Combat Intelligence (Washington, DC: Government Printing Office, 1951), 11-15. 6 groups of MI specialist teams within a larger tactical unit; allowing...Department of the Army, TOE 30- 115T, Combat Electronic Warfare Intelligence Battalion, Division (Washington, DC: Government Printing Office, 1976

  19. 2008 Munitions Executive Summit

    Science.gov (United States)

    2008-02-21

    Improvement Initiative • Problem : • Ballistic performance • Parts Obsolescence • Producibility Issues • Solution: • Flight telemetry • Results...Reduced Manufacturing Costs, Increased reliability, Better understanding, Reduced complexity, Reduced touch labor, Reduced material costs • SATISFIED...Rocket Motor Demil R&D Technology •Munitions parts make-up: Munitions Items Disposition Action System ( MIDAS ) Training Directorate •Ammunition

  20. Optimization of Munitions Storage.

    Science.gov (United States)

    1979-12-01

    zones of land around each facility place a significant economic cost on the storage of munitions (Schreyer, 1970: 1). Munitions storage is a subject...ADDTOT, BTOTAL 353 REAL MPH,MW ,MPD, MPU ,4,MPNEW,MCD 354 IF (SW2.NE.0) GO TO 1 355 SW2 - 1 356 WRITE (6,2) 357 GO TO 3 358 1 IF (REC.EQ.0) GO TO 4 359 IF

  1. Arsenic and Old Mustard: Chemical Problems of Old Arsenical and 'Mustard' Munitions (Joseph F. Bunnett and Marian Mikotajczyk, Eds.)

    Science.gov (United States)

    Garrett, Benjamin

    1999-10-01

    What do Knute Rockne, Notre Dame's famed football coach, and Lewisite, a chemical warfare agent dubbed "the dew of death", have in common? Both owe their discovery to Father Julius Arthur Nieuwland.1 Rockne's legacy lives on in the Fighting Irish and their tradition of excellence on the gridiron. Lewisite, together with other arsenical- and mustard-type chemical warfare agents, provide a legacy that lives on, too, but with less cheerful consequences. The book Arsenic and Old Mustard: Chemical Problems of Old Arsenical and 'Mustard' Munitions makes clear the challenges faced in dealing with those consequences. This book documents the proceedings of a workshop devoted to arsenical- and mustard-type chemical warfare agents and their associated munitions. The workshop, held in Poland in 1996, included nine lectures, eight posters, and three discussion groups; and the contents of all these are presented. Major support for the workshop came from the Scientific Affairs Division of NATO as part of on ongoing series of meetings, cooperative research projects, and related efforts dealing with problems leftover from the Cold War and, in the case of the arsenicals and mustards, from conflicts dating to World War I. These problems can be seen in contemporary accounts, including a January 1999 news report that the U.S. Department of Defense intends to survey Washington, DC, areas near both American University and the Catholic University of America (CUA), site of the original synthesis of Lewisite, for chemical warfare agents and other materials disposed at the end of World War I.2 The first nine chapters of the book present the workshop's lectures. Of these, readers interested in chemical weapon destruction might find especially useful the first chapter, in which Ron Mansley of the Organisation for the Prohibition of Chemical Weapons presents a scholarly overview covering historical aspects of the arsenicals and mustards; their production and use; prospective destruction

  2. Defense Industrial Base (DIB): Munitions Realignment for 2020

    Science.gov (United States)

    2013-03-01

    munitions DIB by companies like Coca Cola , Quaker Oats, and Eastman Kodak. As industrial mobilization quickly increased, the requirements decreased...industry and the munitions DIB. This report documented the volatility associated with the production of munitions and financial risks to which

  3. Military Munitions Waste Working Group report

    International Nuclear Information System (INIS)

    1993-01-01

    This report presents the findings of the Military Munitions Waste Working Group in its effort to achieve the goals directed under the Federal Advisory Committee to Develop On-Site Innovative Technologies (DOIT Committee) for environmental restoration and waste management. The Military Munitions Waste Working Group identified the following seven areas of concern associated with the ordnance (energetics) waste stream: unexploded ordnance; stockpiled; disposed -- at known locations, i.e., disposal pits; discharged -- impact areas, unknown disposal sites; contaminated media; chemical sureties/weapons; biological weapons; munitions production; depleted uranium; and rocket motor and fuel disposal (open burn/open detonation). Because of time constraints, the Military Munitions Waste Working Group has focused on unexploded ordnance and contaminated media with the understanding that remaining waste streams will be considered as time permits. Contents of this report are as follows: executive summary; introduction; Military Munitions Waste Working Group charter; description of priority waste stream problems; shortcomings of existing approaches, processes and technologies; innovative approaches, processes and technologies, work force planning, training, and education issues relative to technology development and cleanup; criteria used to identify and screen potential demonstration projects; list of potential candidate demonstration projects for the DOIT committee decision/recommendation and appendices

  4. Military Munitions Waste Working Group report

    Energy Technology Data Exchange (ETDEWEB)

    1993-11-30

    This report presents the findings of the Military Munitions Waste Working Group in its effort to achieve the goals directed under the Federal Advisory Committee to Develop On-Site Innovative Technologies (DOIT Committee) for environmental restoration and waste management. The Military Munitions Waste Working Group identified the following seven areas of concern associated with the ordnance (energetics) waste stream: unexploded ordnance; stockpiled; disposed -- at known locations, i.e., disposal pits; discharged -- impact areas, unknown disposal sites; contaminated media; chemical sureties/weapons; biological weapons; munitions production; depleted uranium; and rocket motor and fuel disposal (open burn/open detonation). Because of time constraints, the Military Munitions Waste Working Group has focused on unexploded ordnance and contaminated media with the understanding that remaining waste streams will be considered as time permits. Contents of this report are as follows: executive summary; introduction; Military Munitions Waste Working Group charter; description of priority waste stream problems; shortcomings of existing approaches, processes and technologies; innovative approaches, processes and technologies, work force planning, training, and education issues relative to technology development and cleanup; criteria used to identify and screen potential demonstration projects; list of potential candidate demonstration projects for the DOIT committee decision/recommendation and appendices.

  5. Intelligent methods for cyber warfare

    CERN Document Server

    Reformat, Marek; Alajlan, Naif

    2015-01-01

    Cyberwarfare has become an important concern for governmental agencies as well businesses of various types.  This timely volume, with contributions from some of the internationally recognized, leaders in the field, gives readers a glimpse of the new and emerging ways that Computational Intelligence and Machine Learning methods can be applied to address problems related to cyberwarfare. The book includes a number of chapters that can be conceptually divided into three topics: chapters describing different data analysis methodologies with their applications to cyberwarfare, chapters presenting a number of intrusion detection approaches, and chapters dedicated to analysis of possible cyber attacks and their impact. The book provides the readers with a variety of methods and techniques, based on computational intelligence, which can be applied to the broad domain of cyberwarfare.

  6. Observations of Munitions Mobility During a Nor'easter at Wallops Island

    Science.gov (United States)

    Swann, C.; Frank, D. P.; Braithwaite, E. F., III; Hagg, R. K.; Calantoni, J.

    2017-12-01

    Unexploded ordnance (or munitions) may migrate, bury, or become exposed over time, and may pose a hazard to both humans and environment. Understanding the behavior of munitions under various wave and current conditions is central to management and remediation of contaminated underwater sites. We embedded Inertial Measurement Units (IMUs) into inert replicas of large caliber munitions (81 mm - 155 mm), herein referred to as `smart munitions'. Several smart munitions were deployed in the field with IMUs logging at 16 Hz continuously. Simultaneously the local hydrodynamic conditions were monitored to correlate any resulting munitions mobility. Here, we present the response of the smart munitions to wave and current conditions observed during a nor'easter off the coast of Wallops Island, Virginia USA in about 10 m water depth. During the nor'easter, peak significant wave heights of 2.8 m were observed in 10 m water depth. Over a roughly 10-hour period, an 81 mm smart munition migrated approximately 206 ft in a net onshore direction. Displacement and heading of the migrated smart munition were estimated by divers during the recovery. Integration of the trajectory of motion for the smart munition using a custom signal processing algorithm was in good agreement with the diver measurements. Discussion will focus on the relationship of the local sediment type and the potential for munitions mobility.

  7. A Wide Area Risk Assessment Framework for Underwater Military Munitions Response

    Science.gov (United States)

    Holland, K. T.; Calantoni, J.

    2017-12-01

    Our objective was to develop a prototype statistical framework supporting Wide Area Assessment and Remedial Investigation decisions relating to the risk of unexploded ordnance and other military munitions concentrated in underwater environments. Decision making involving underwater munitions is inherently complex due to the high degree of uncertainty in the environmental conditions that force munitions responses (burial, decay, migration, etc.) and associated risks to the public. The prototype framework provides a consistent approach to accurately delineating contaminated areas at underwater munitions sites through the estimation of most probable concentrations. We adapted existing deterministic models and environmental data services for use within statistical modules that allowed the estimation of munition concentration given historic site information and environmental attributes. Ultimately this risk surface can be used to evaluate costs associated with various remediation approaches (e.g. removal, monitoring, etc.). Unfortunately, evaluation of the assessment framework was limited due to the lack of enduser data services from munition site managers. Of the 450 U.S. sites identified as having potential contamination with underwater munitions, assessment of available munitions information (including historic firing or disposal records, and recent ground-truth munitions samples) indicated very limited information in the databases. Example data types include the most probable munition types, approximate firing / disposal dates and locations, and any supportive munition survey or sampling results. However the overall technical goal to integrate trained statistical belief networks with detailed geophysical knowledge of sites, of sensors and of the underwater environment was demonstrated and should allow probabilistic estimates of the most likely outcomes and tradeoffs while managing uncertainty associated with military munitions response.

  8. Chemical Munitions Dumped at Sea near the Hawaiian Islands

    Science.gov (United States)

    Edwards, M.; Bissonnette, M. C.; Briggs, C. W.; Shjegstad, S. M.

    2016-12-01

    Sea disposal was once internationally accepted as an appropriate method for disposal of excess, obsolete, and unserviceable conventional and chemical munitions. The past decade has seen an increase in the number and complexity of studies to assess the effects of historical munitions disposal in the oceans. The Hawai`i Undersea Military Munitions Assessment (HUMMA) is a comprehensive deep-water (300-600 meter) investigation designed to determine the potential impact of sea-disposed munitions on the ocean environment, and vice versa, at a disposal site south of Pearl Harbor, Oahu, Hawaii. Historical records indicated that as many as 16,000 mustard-filled bombs were disposed in this area following World War II. A secondary objective of HUMMA is to determine best practices and technologies for mapping and sampling sea-disposed munitions. The overarching result from five HUMMA field programs conducted over a decade is that the greatest risk from munitions derives from direct contact; there is little evidence that leakage from munitions into the surrounding environment has a direct pathway to affect human health and the impact on the surrounding environment in Hawaii is detectable only at trace levels. This finding should be modulated based on the quantity of physical samples, which were collected around detected at control sites. Both findings support a hypothesis that the impacts of sea-disposed munitions change over time. This presentation will describe the technical approach and results of the 2014 HUMMA field program using Jason 2.

  9. 19 CFR 145.53 - Firearms and munitions of war.

    Science.gov (United States)

    2010-04-01

    ... 19 Customs Duties 2 2010-04-01 2010-04-01 false Firearms and munitions of war. 145.53 Section 145.53 Customs Duties U.S. CUSTOMS AND BORDER PROTECTION, DEPARTMENT OF HOMELAND SECURITY; DEPARTMENT OF... munitions of war. Importations of firearms, munitions of war, and related articles are subject to the import...

  10. Insensitive Munitions Testing

    Data.gov (United States)

    Federal Laboratory Consortium — Insensitive Munitions Testing at RTC is conducted (IAW MILSTD-2105) at Test Area 4. Our engineers and technicians obtain data for hazards classification and safety...

  11. Optimizing Armed Forces Capabilities for Hybrid Warfare – New Challenge for Slovak Armed Forces

    Directory of Open Access Journals (Sweden)

    Peter PINDJÁK

    2015-09-01

    Full Text Available The paper deals with the optimization of military capabilities of the Slovak Armed Forces for conducting operations in a hybrid conflict, which represents one of the possible scenarios of irregular warfare. Whereas in the regular warfare adversaries intend to eliminate the centers of gravity of each other, most often command and control structures, in irregular conflicts, the center of gravity shifts towards the will and cognitive perception of the target population. Hybrid warfare comprises a thoroughly planned combination of conventional military approaches and kinetic operations with subversive, irregular activities, including information and cyber operations. These efforts are often accompanied by intensified activities of intelligence services, special operation forces, and even mercenary and other paramilitary groups. The development of irregular warfare capabilities within the Slovak Armed Forces will require a progressive transformation process that may turn the armed forces into a modern and adaptable element of power, capable of deployment in national and international crisis management operations.

  12. Sea-dumped CW munitions - the European component

    International Nuclear Information System (INIS)

    Hart, J.; Stock, T.

    2009-01-01

    The purpose of this contribution is to outline the European magnitude of sea-dumped CW munitions. Hereby the paper attempts to provide an overview on historical dumping activities, both for conventional and chemical munitions. The potential dangers which might result from these dumping activities are discussed in brief. Among others the differences in deep sea dumping and dumping in shallow waters are evaluated. Further, the presentation will outline and discuss the different technology steps: (a) identification, (b) recovery, (c) transportation and (d) destruction (on- or off-shore), necessary for possible cleaning of dumping sites. Thereafter an evaluation of the different technologies available/applied is performed, in particular on the destruction part. Hereby the already practised experience is displayed. Based upon existing treaty regimes an actual judgment of possible application of treaty provisions for demanding cleaning up operations is discussed. The question if treaty obligations can be used to force cleaning operations is debated. A possible match of the technology package available with the scope/magnitude of the munitions dumping problem is discussed. Hereby the gaps between the size of the problem and the most suitable technologies for recovery and destruction are illustrated. The resulting answers should be regarded as possible technical guidelines for future development activities as well existing limitations to solve the problems. The papers will result in some general guidelines for future prospect on the issues of dumped munitions, in particular chemical munitions under the European context.(author)

  13. Missile/Munition Integration Facility

    Data.gov (United States)

    Federal Laboratory Consortium — A large complex contained within approximately 600 acres with security fencing, controlled access gates, and a munitions convoy access road. The complex is capable...

  14. The Environmental Challenge of Military Munitions and Federal Facilities

    Science.gov (United States)

    EPA and the Department of Defense (DoD) must address the contamination legacy left by military munitions and explosives of concern (MEC) and other hazardous munitions materials from military live-fire training or testing.

  15. Cyber warfare and electronic warfare integration in the operational environment of the future: cyber electronic warfare

    Science.gov (United States)

    Askin, Osman; Irmak, Riza; Avsever, Mustafa

    2015-05-01

    For the states with advanced technology, effective use of electronic warfare and cyber warfare will be the main determining factor of winning a war in the future's operational environment. The developed states will be able to finalize the struggles they have entered with a minimum of human casualties and minimum cost thanks to high-tech. Considering the increasing number of world economic problems, the development of human rights and humanitarian law it is easy to understand the importance of minimum cost and minimum loss of human. In this paper, cyber warfare and electronic warfare concepts are examined in conjunction with the historical development and the relationship between them is explained. Finally, assessments were carried out about the use of cyber electronic warfare in the coming years.

  16. Bioinspired polarization navigation sensor for autonomous munitions systems

    Science.gov (United States)

    Giakos, G. C.; Quang, T.; Farrahi, T.; Deshpande, A.; Narayan, C.; Shrestha, S.; Li, Y.; Agarwal, M.

    2013-05-01

    Small unmanned aerial vehicles UAVs (SUAVs), micro air vehicles (MAVs), Automated Target Recognition (ATR), and munitions guidance, require extreme operational agility and robustness which can be partially offset by efficient bioinspired imaging sensor designs capable to provide enhanced guidance, navigation and control capabilities (GNC). Bioinspired-based imaging technology can be proved useful either for long-distance surveillance of targets in a cluttered environment, or at close distances limited by space surroundings and obstructions. The purpose of this study is to explore the phenomenology of image formation by different insect eye architectures, which would directly benefit the areas of defense and security, on the following four distinct areas: a) fabrication of the bioinspired sensor b) optical architecture, c) topology, and d) artificial intelligence. The outcome of this study indicates that bioinspired imaging can impact the areas of defense and security significantly by dedicated designs fitting into different combat scenarios and applications.

  17. Hawaii Munitions Monitoring Station and Natural Laboratory

    Science.gov (United States)

    Edwards, M.; Trimble, A. Z.; Rognstad, M. R.

    2017-12-01

    Hundreds of thousands of tons of conventional munitions were fired into the ocean at military ranges or deliberately disposed at sea during the twentieth century. Potential contaminants from munitions and explosives of concern (MEC) affect virtually every coast in the United States, including Alaska, the Hawaiian Islands, Guam, American Samoa and other U.S. territories as well as inland waterways. It is necessary to develop methods to assess the concentrations of munitions constituents present at a site to address concerns about the presence of environmentally relevant concentrations and their potential impacts. Having a well-characterized site to test instruments and methods is important for continued development and refinement of technology. Most sites are too big to characterize comprehensively in three dimensions over time periods lasting days or longer. We are working to develop a monitoring station and natural laboratory near Oahu, Hawaii to create a cost-effective demonstration and validation natural laboratory where emerging technologies can be evaluated and compared. Ordnance Reef (OR) is an ideal location to establish a munitions monitoring station for historical, logistical and environmental reasons. OR is an area of shallow fringing reef measuring approximately 4.2 km by 2.2 km along the Waianae coast of Oahu that was used as a disposal area for military munitions following World War II. OR has been the subject of multiple investigations including an inventory of munitions conducted by the U.S. Army Corps of Engineers in 2002 and a screening-level risk investigation conducted by the National Oceanic and Atmospheric Administration and the University of Hawaii in 2006. As a result, there are multiple datasets collected over the past fifteen years that can be leveraged to serve as a baseline for the natural laboratory. These extant datasets are being supplemented with data from integrated unmanned systems deployed at OR to characterize and visualize the

  18. Solid phase microextraction headspace sampling of chemical warfare agent contaminated samples : method development for GC-MS analysis

    Energy Technology Data Exchange (ETDEWEB)

    Jackson Lepage, C.R.; Hancock, J.R. [Defence Research and Development Canada, Medicine Hat, AB (Canada); Wyatt, H.D.M. [Regina Univ., SK (Canada)

    2004-07-01

    Defence R and D Canada-Suffield (DRDC-Suffield) is responsible for analyzing samples that are suspected to contain chemical warfare agents, either collected by the Canadian Forces or by first-responders in the event of a terrorist attack in Canada. The analytical techniques used to identify the composition of the samples include gas chromatography-mass spectrometry (GC-MS), liquid chromatography-mass spectrometry (LC-MS), Fourier-transform infrared spectroscopy (FT-IR) and nuclear magnetic resonance spectroscopy. GC-MS and LC-MS generally require solvent extraction and reconcentration, thereby increasing sample handling. The authors examined analytical techniques which reduce or eliminate sample manipulation. In particular, this paper presented a screening method based on solid phase microextraction (SPME) headspace sampling and GC-MS analysis for chemical warfare agents such as mustard, sarin, soman, and cyclohexyl methylphosphonofluoridate in contaminated soil samples. SPME is a method which uses small adsorbent polymer coated silica fibers that trap vaporous or liquid analytes for GC or LC analysis. Collection efficiency can be increased by adjusting sampling time and temperature. This method was tested on two real-world samples, one from excavated chemical munitions and the second from a caustic decontamination mixture. 7 refs., 2 tabs., 3 figs.

  19. An Analysis of the Influence of Signals Intelligence Through Wargaming

    National Research Council Canada - National Science Library

    McCaffrey, Charles

    2000-01-01

    Signals intelligence (SIGINT), information derived from the monitoring, interception, decryption and evaluation of an adversary's electronic communications, has long been viewed as a significant factor in modem warfare...

  20. Munitions Classification Library

    Science.gov (United States)

    2016-04-04

    members of the community to make their own additions to any, or all, of the classification libraries . The next phase entailed data collection over less......Include area code) 04/04/2016 Final Report August 2014 - August 2015 MUNITIONS CLASSIFICATION LIBRARY Mr. Craig Murray, Parsons Dr. Thomas H. Bell, Leidos

  1. Estimating areas threatened by contamination from leaking chemical warfare agents dumped into the Baltic Sea

    Science.gov (United States)

    Jakacki, Jaromir; Przyborska, Anna; Andrzejewski, Jan

    2017-04-01

    Approximately 60,000 tons of chemical munitions were dumped into the Baltic Sea after World War II (the exact amount is unknown and some sources estimate it as more than 200,000 tons). Dumped munitions still pose a risk of leakage caused by erosion and corrosion, and it is important to know the danger areas. Because of wide dispersion of the dumped munitions, modelling is only one tool that could provide wide image of physical state of the sea at all locations and which could also be used for analysing contamination during a potential leakage. Obviously, it is possible to take samples at each dumpsite, but modelling also allows to develop possible scenarios of leakages under specific physical conditions. For the purpose of analysis of potential leakage a high-resolution model (HRM) of the contamination will be embedded in the hydrodynamic model (HM) of the Baltic Sea. The HRM will use data from general circulation model results of estimated resolution of nearly 2 km. The Parallel Ocean Program will be implemented as the HM for the whole Baltic Sea. Atmospheric data from regional implementation of the Weather Research and Forecasting System (WRF) have been used as the top boundary conditions of the HM, and sea level data from Gothenburg had been included into model barotropic equation as lateral boundary conditions. Passive tracer will represent the contamination in the HRM and horizontal resolution of the HRM will be close to 50 meters. Passive tracers will also be implemented in the HM - for comparison of the results. For proper representation of potential leakage of chemical warfare agents the HRM will have included diffusion and advection processes. The results from the HM are going to be interpolated into the HRM domain and then integration will be performed. Based on the implemented simulations, estimated contaminated area and its comparison from the HRM as well as from the HM will be presented. The research work was fund by the European Union (European

  2. Modern warfare as a significant form of zoogeomorphic disturbance upon the landscape

    Science.gov (United States)

    Hupy, Joseph P.; Koehler, Thomas

    2012-07-01

    The damage exerted by warfare on the physical landscape is one, of many, anthropogenic impacts upon the environment. Bombturbation is a term that describes the impacts of explosive munitions upon the landscape. Bombturbation, like many other forms of zoogeomorphology, is a disruptive force, capable of moving large amounts of sediments, and denuding landscapes to the point where changes in micro and mesotopography have long-term implications. The long term implication of bombturbative actions depends on the type and duration of explosive device that rendered the disturbance, and the geographic context of the landscape disturbed; i.e. cultural and physical factors. Recovery from bombturbative activity, in the context of this research, is measured by vegetative regrowth and soil development in cratered disturbances. A comparison and contrast between the two battlefields of Verdun, France and Khe Sanh, Vietnam show that bombturbative actions have significantly altered the topography at each location, thus influencing surface runoff and processes of soil development. Principals of the Runge pedogenic model, or the energy of water moving through the soil profile, best explain how the varying climate and parent material at each location influence post disturbance soil development rates. Whereas the data collected at Verdun suggest that explosive munitions have put that landscape on diverging path of development, thus rendering it much different post-disturbance landscape, Khe Sanh displays much different recovery patterns. Preliminary research at Khe Sanh indicates that reforestation and soil development following disturbance are not so much influenced by bombturbative patterns as land use activities in the area of study.

  3. Optimal Control of Sensor Threshold for Autonomous Wide Area Search Munitions

    National Research Council Canada - National Science Library

    Kish, Brian A; Jacques, David R; Pachter, Meir

    2005-01-01

    The optimal employment of autonomous wide area search munitions is addressed. The scenario considered involves an airborne munition searching a battle space for stationary targets in the presence of false targets...

  4. Spread, Behavior, and Ecosystem Consequences of Conventional Munitions Compounds in Coastal Marine Waters

    Directory of Open Access Journals (Sweden)

    Aaron J. Beck

    2018-04-01

    Full Text Available Coastal marine environments are contaminated globally with a vast quantity of unexploded ordnance and munitions from intentional disposal. These munitions contain organic explosive compounds as well as a variety of metals, and represent point sources of chemical pollution to marine waters. Most underwater munitions originate from World Wars at the beginning of the twentieth century, and metal munitions housings have been impacted by extensive corrosion over the course of the following decades. As a result, the risk of munitions-related contaminant release to the water column is increasing. The behavior of munitions compounds is well-characterized in terrestrial systems and groundwater, but is only poorly understood in marine systems. Organic explosive compounds, primarily nitroaromatics and nitramines, can be degraded or transformed by a variety of biotic and abiotic mechanisms. These reaction products exhibit a range in biogeochemical characteristics such as sorption by particles and sediments, and variable environmental behavior as a result. The reaction products often exhibit increased toxicity to biological receptors and geochemical controls like sorption can limit this exposure. Environmental samples typically show low concentrations of munitions compounds in water and sediments (on the order of ng/L and μg/kg, respectively, and ecological risk appears generally low. Nonetheless, recent work demonstrates the possibility of sub-lethal genetic and metabolic effects. This review evaluates the state of knowledge on the occurrence, fate, and effect of munition-related chemical contaminants in the marine environment. There remain a number of knowledge gaps that limit our understanding of munitions-related contaminant spread and effect, and the need for additional work is made all the more urgent by increasing risk of release to the environment.

  5. Computational Modeling of Hydrodynamics and Scour around Underwater Munitions

    Science.gov (United States)

    Liu, X.; Xu, Y.

    2017-12-01

    Munitions deposited in water bodies are a big threat to human health, safety, and environment. It is thus imperative to predict the motion and the resting status of the underwater munitions. A multitude of physical processes are involved, which include turbulent flows, sediment transport, granular material mechanics, 6 degree-of-freedom motion of the munition, and potential liquefaction. A clear understanding of this unique physical setting is currently lacking. Consequently, it is extremely hard to make reliable predictions. In this work, we present the computational modeling of two importance processes, i.e., hydrodynamics and scour, around munition objects. Other physical processes are also considered in our comprehensive model. However, they are not shown in this talk. To properly model the dynamics of the deforming bed and the motion of the object, an immersed boundary method is implemented in the open source CFD package OpenFOAM. Fixed bed and scour cases are simulated and compared with laboratory experiments. The future work of this project will implement the coupling between all the physical processes.

  6. Munitions in the Underwater Environment: State of the Science and Knowledge Gaps

    Science.gov (United States)

    2010-06-01

    the Munitions Items Disposition Action System ( MIDAS ). Munitions constituents (MCs) can be identified through the known munitions type. The MIDAS and...physical damage to the casing, adjacent or touching metals, and water or substrate qualities such as temperature, pH, or Redox potential. The...environments, little is known on modeling the fate of MCs in the underwater environment. One of the anticipated problems in predicting the fate and

  7. Biological warfare agents

    Directory of Open Access Journals (Sweden)

    Duraipandian Thavaselvam

    2010-01-01

    Full Text Available The recent bioterrorist attacks using anthrax spores have emphasized the need to detect and decontaminate critical facilities in the shortest possible time. There has been a remarkable progress in the detection, protection and decontamination of biological warfare agents as many instrumentation platforms and detection methodologies are developed and commissioned. Even then the threat of biological warfare agents and their use in bioterrorist attacks still remain a leading cause of global concern. Furthermore in the past decade there have been threats due to the emerging new diseases and also the re-emergence of old diseases and development of antimicrobial resistance and spread to new geographical regions. The preparedness against these agents need complete knowledge about the disease, better research and training facilities, diagnostic facilities and improved public health system. This review on the biological warfare agents will provide information on the biological warfare agents, their mode of transmission and spread and also the detection systems available to detect them. In addition the current information on the availability of commercially available and developing technologies against biological warfare agents has also been discussed. The risk that arise due to the use of these agents in warfare or bioterrorism related scenario can be mitigated with the availability of improved detection technologies.

  8. Biological warfare agents

    Science.gov (United States)

    Thavaselvam, Duraipandian; Vijayaraghavan, Rajagopalan

    2010-01-01

    The recent bioterrorist attacks using anthrax spores have emphasized the need to detect and decontaminate critical facilities in the shortest possible time. There has been a remarkable progress in the detection, protection and decontamination of biological warfare agents as many instrumentation platforms and detection methodologies are developed and commissioned. Even then the threat of biological warfare agents and their use in bioterrorist attacks still remain a leading cause of global concern. Furthermore in the past decade there have been threats due to the emerging new diseases and also the re-emergence of old diseases and development of antimicrobial resistance and spread to new geographical regions. The preparedness against these agents need complete knowledge about the disease, better research and training facilities, diagnostic facilities and improved public health system. This review on the biological warfare agents will provide information on the biological warfare agents, their mode of transmission and spread and also the detection systems available to detect them. In addition the current information on the availability of commercially available and developing technologies against biological warfare agents has also been discussed. The risk that arise due to the use of these agents in warfare or bioterrorism related scenario can be mitigated with the availability of improved detection technologies. PMID:21829313

  9. Governing Warfare

    DEFF Research Database (Denmark)

    Harste, Gorm

      It would seem as though warfare has gotten out of control, not only in Iraq and Afghanistan, but also in Central Africa. The paper outlines the strategic history of politically controlled warfare since the early Enlightenment. The argument is that control is implausible. The idea of control has...

  10. Validation of Passive Sampling Devices for Monitoring of Munitions Constituents in Underwater Environments

    Science.gov (United States)

    2017-09-01

    TNT TOC TSS Low Order Detonation Munitions constituents Munitions Debris Method Detection Limit Munitions and explosives of concern Mean low...Total organic carbon ( TOC ) and grain size distribution from stations A1, T10, T11, and T12 at BSS...16 syringes/stn) TNT, ADNTs, DNTs, RDX 4 locations in BSS based on positive POCIS results Sediment 5 TOC , grain size 4, co-located with sediment

  11. Eksplozivne materije za neosetljiva ubojna sredstva / Explosive substances for insensitive munitions

    Directory of Open Access Journals (Sweden)

    Radun Jeremić

    2005-03-01

    Full Text Available U skladu sa sve strožim zahtevima za očuvanje životne sredine i većom bezbednošću, tendencije u razvoju suvremenih ubojnih sredstava (UbS, pored povećanja pouzdanosti i efikasnosti, usmerene su i na povećanje sigurnosti pri njihovoj proizvodnji, skladištenju, manipulaciji i upotrebi. Na taj način dobijena je nova kategorija UbS, tzv. neosetljiva UbS, kod kojih je verovatnoća neželjenog aktiviranja pod dejstvom spoljnih impulsa svedena na minimum. Suština rešavanja ovog problema je primena eksplozivnih materija koje su mnogo manje osetljive na spoljne uticaje u odnosu na standardne. Osnovni zahtev koji se pri tome postavlja je da taktičko-tehničke karakteristike ostanu na nivou ili budu bolje u odnosu na postojeća UbS. U radu je ukratko objašnjen koncept razvoja neosetljivih UbS i dat pregled najznačajnijih rezultata istraživanja u oblasti eksplozivnih materija koje zadovoljavaju zahteve za primenu u neosetljivim UbS. / According to severe environment protection and safety requirements, tendencies in development of modern munitions, besides of increasing reliability and efficiency, are directed to decreasing of danger during their processing, storing, handling and operating. In that manner the new category of munitions has been obtained, named insensitive munitions, with a minimum probability of unplanned activating. The best method for solving this problem is using of explosive substances that are more insensitive according to standard ones. The main requirement is the tactical and technical characteristics stay at the level or to be better according to the existing munitions. In this paper the developing concept of insensitive munitions is shortly explained and presented a review of most important research results of explosive materials that fulfill requirements for applying in insensitive munitions.

  12. Resolving the Role of the Dynamic Pressure in the Burial, Exposure, Scour, and Mobility of Underwater Munitions

    Science.gov (United States)

    Gilooly, S.; Foster, D. L.

    2017-12-01

    In nearshore environments, the motion of munitions results from a mixture of sediment transport conditions including sheet flow, scour, bedform migration, and momentary liquefaction. Incipient motion can be caused by disruptive shear stresses and pressure gradients. Foster et al. (2006) incorporated both processes into a single parameter, indicating incipient motion as a function of the bed state. This research looks to evaluate the role of the pressure gradient in positional state changes such as burial, exposure, and mobility. In the case of munitions, this may include pressure gradients induced by vortex shedding or the passing wave. Pressure-mapped model munitions are being developed to measure the orientation, rotation, and surface pressure of the munitions during threshold events leading to a new positional state. These munitions will be deployed in inner surf zone and estuary environments along with acoustic Doppler velocimeters (ADVs), pore water pressure sensors, a laser grid, and a pencil beam sonar with an azimuth drive. The additional instruments allow for near bed and far field water column and sediment bed sampling. Currently preliminary assessments of various pressure sensors and munition designs are underway. Two pressure sensors were selected; the thin FlexiForce A201 sensors will be used to indicate munition rolling during threshold events and diaphragm sensors will be used to understand changes in surrounding pore water pressure as the munition begins to bury/unbury. Both sensors are expected to give quantitative measurements of dynamic pressure gradients in the flow field surrounding the munition. Resolving the role of this process will give insight to an improved incipient motion parameter and allow for better munition motion predictions.

  13. NDIA 2018 IM and EM Technology Symposium: Innovative Insensitive Munition Solutions for Enhanced Warfighter Effectiveness

    Science.gov (United States)

    2018-04-26

    2018 IM & EM TECHNOLOGY SYMPOSIUM INNOVATIVE INSENSITIVE MUNITION SOLUTIONS FOR ENHANCED WARFIGHTER EFFECTIVENESS April 23 – 26, 2018 Doubletree by...IM & EM TECHNOLOGY SYMPOSIUM On behalf of the Insensitive Munitions and Energetic Materials Committee and our MSIAC partner, I would like to...welcome you to the 2018 Insensitive Munitions and Energetic Materials Technology Symposium. This international gathering of the top chemists, system

  14. Intelligence Architecture, Echelons Corps and Below (ECB): Some Near Term Alternatives

    Science.gov (United States)

    1991-04-05

    intelligence missions. - Failure to have an annual "MI Table VIII" type evaluation system keeps MI units in the business of supporting other Table...Division) CAC: Combined Arms Center (Ft Leavenworth) CEWI: Combat Electronic Warfare Inteligence C&GSC: Command and General Staff College CI

  15. Cyber Warfare/Cyber Terrorism

    National Research Council Canada - National Science Library

    O'Hara, Timothy

    2004-01-01

    Section 1 of this paper provides an overview of cyber warfare as an element of information warfare, starting with the general background of the current strategic environment the United States is operating...

  16. Cluster munitions: public health and international humanitarian law perspectives.

    Science.gov (United States)

    Freckelton, Ian

    2008-02-01

    As a result of civilian deaths in Vietnam, Cambodia, Laos, Chechnya, Kosovo, Afghanistan, Iraq and Lebanon, cluster munitions have been recognised to pose a grave threat to civilian populations because of their limited precision and problematically high rate of initial failure to explode. Efforts are intensifying to ban cluster munitions and to mandate those who have discharged them to defuse them effectively so as to reduce the risks to civilians. This editorial reviews these efforts and identifies a need for them to be actively supported by both the legal and medical communities.

  17. Weathering the Cyber Storm: The Military’s Resiliency to Cyber Attacks in Future Warfare

    Science.gov (United States)

    2012-06-01

    observation. While the ability to collect intelligence is important, it falls under a different rubric than warfare itself. 20 Another term worth...the use of antivirus programs, firewalls, and security policies. These measures also fall under the rubric of information assurance, or “measures that...specifying how it is to be accomplished.” of genetic diversity. 13 A complaint after Operation Iraqi Freedom (OIF) was that soldiers had to

  18. Acoustic Scattering from Munitions in the Underwater Environment: Measurements and Modeling

    Science.gov (United States)

    Williams, K.; Kargl, S. G.; Espana, A.

    2017-12-01

    Acoustical scattering from elastic targets has been a subject of research for several decades. However, the introduction of those targets into the ocean environment brings new complexities to quantitative prediction of that scattering. The goal of our work has been to retain as much of the target physics as possible while also handling the propagation to and from the target in the multi-path ocean environment. Testing of the resulting predictions has been carried out via ocean experiments in which munitions are deployed on and within the sediment. We will present the overall philosophy used in the modeling and then compare model results to measurements. A 60 cm long 30 cd diameter aluminum cylinder will be used as a canonical example and then a sample of results for a variety of munitions will be shown. Finally, we will discuss the use of both the models and measurements in assessing the ability of sonar to discriminate munitions from other man-made targets. The difficulty of this challenge will be made apparent via results from a recent experiment in which both munitions and man-made "clutter" were deployed on a rippled sand interface.

  19. Observation of Burial and Migration of Instrumented Surrogate Munitions Deployed in the Swash Zone

    Science.gov (United States)

    Cristaudo, D.; Puleo, J. A.; Bruder, B. L.

    2017-12-01

    Munitions (also known as unexploded ordnance; UXO) in the nearshore environment due to past military activities, may be found on the beach, constituting a risk for beach users. Munitions may be transported from offshore to shallower water and/or migrate along the coast. In addition, munitions may bury in place or be exhumed due to hydrodynamic forcing. Observations on munitions mobility have generally been collected offshore, while observations in the swash zone are scarce. The swash zone is the region of the beach alternately covered by wave runup where hydrodynamic processes may be intense. Studies of munitions mobility require the use of realistic surrogates to quantify mobility/burial and hydrodynamic forcing conditions. Four surrogates (BLU-61 Cluster Bomb, 81 mm Mortar, M151-70 Hydra Rocket and M107 155 mm High Explosive Howitzer) were developed and tested during large-scale laboratory and field studies. Surrogates house sensors that measure different components of motion. Errors between real munitions and surrogate parameters (mass, center of gravity and axial moment of inertia) are all within an absolute error of 20%. Internal munitions sensors consist of inertial motion units (for acceleration and angular velocity in and around the three directions and orientation), pressure transducers (for water depth above surrogate), shock recorders (for high frequency acceleration to detect wave impact on the surrogate), and an in-house designed array of optical sensors (for burial/exposure and rolling). An in situ array of sensors to measure hydrodynamics, bed morphology and sediment concentrations, was deployed in the swash zone, aligned with the surrogate deployment. Data collected during the studies will be shown highlighting surrogate sensor capabilities. Sensors response will be compared with GPS measurements and imagery from cameras overlooking the study sites of surrogate position as a function of time. Examples of burial/exposure and migration of surrogates

  20. Trauma-related infections due to cluster munitions.

    Science.gov (United States)

    Fares, Youssef; El-Zaatari, Mohamad; Fares, Jawad; Bedrosian, Nora; Yared, Nadine

    2013-12-01

    Trauma-related infections remain a concerning and potentially avoidable complication of conflict-related injuries. During the Israeli conflict in South Lebanon, more than four million sub-munitions were dropped over South Lebanese soil. In this study, we will explore the different types of infection caused by sub-munitions and penetrating agents. This prospective study took place from 2006 to 2012 at the Lebanese University within the Faculty of Medical Sciences' departments. This study sample consisted of 350 injured casualties. Patients suffered from blast injuries with fragmentations targeting the head, face, torso, abdomen, pelvis and extremities. Of the 350 causalities studied, 326 (93.1%) were males, and 24 (6.9%) were females. Ages varied between 10 and 70 years, with the average age being 27 years. Of the 350 patients studied, 68 (19.4%) developed infections. Infections varied between pseudomonas, Escherichia coli, Candida and fungus and sometimes led to necrosis. Vaccinations, antibiotic therapies and proper wound irrigation must be performed at appropriate emergency units. Excision and complete debridement of necrotic and contaminated tissue should also be performed. The Convention on Cluster Munitions of 2008 should be adhered to, as these weapons indiscriminately and disproportionately harm civilians, thereby violating the well-established international principles governing conflict. Copyright © 2013 King Saud Bin Abdulaziz University for Health Sciences. Published by Elsevier Ltd. All rights reserved.

  1. Chemical warfare agents.

    Science.gov (United States)

    Kuca, Kamil; Pohanka, Miroslav

    2010-01-01

    Chemical warfare agents are compounds of different chemical structures. Simple molecules such as chlorine as well as complex structures such as ricin belong to this group. Nerve agents, vesicants, incapacitating agents, blood agents, lung-damaging agents, riot-control agents and several toxins are among chemical warfare agents. Although the use of these compounds is strictly prohibited, the possible misuse by terrorist groups is a reality nowadays. Owing to this fact, knowledge of the basic properties of these substances is of a high importance. This chapter briefly introduces the separate groups of chemical warfare agents together with their members and the potential therapy that should be applied in case someone is intoxicated by these agents.

  2. 28 CFR 0.89 - Authority to seize arms and munitions of war.

    Science.gov (United States)

    2010-07-01

    ... war. 0.89 Section 0.89 Judicial Administration DEPARTMENT OF JUSTICE ORGANIZATION OF THE DEPARTMENT OF JUSTICE Federal Bureau of Investigation § 0.89 Authority to seize arms and munitions of war. The Director... arms and munitions of war, and other articles, pursuant to section 1 of title VI of the act of June 15...

  3. Optimal path planning for video-guided smart munitions via multitarget tracking

    Science.gov (United States)

    Borkowski, Jeffrey M.; Vasquez, Juan R.

    2006-05-01

    An advent in the development of smart munitions entails autonomously modifying target selection during flight in order to maximize the value of the target being destroyed. A unique guidance law can be constructed that exploits both attribute and kinematic data obtained from an onboard video sensor. An optimal path planning algorithm has been developed with the goals of obstacle avoidance and maximizing the value of the target impacted by the munition. Target identification and classification provides a basis for target value which is used in conjunction with multi-target tracks to determine an optimal waypoint for the munition. A dynamically feasible trajectory is computed to provide constraints on the waypoint selection. Results demonstrate the ability of the autonomous system to avoid moving obstacles and revise target selection in flight.

  4. The potential impact of developments in electronic technology on the future conduct of air warfare, volume 3

    Science.gov (United States)

    1986-12-01

    Advances in microelectronics have resulted in circuit densities many orders of magnitude greater than in current usage, making possible higher speed circuitry and greater storage capacity. RF techniques are also leading to monolithic microwave integrated circuits and microstrip antennas with corresponding reductions in size and weight. In addition, rapid advances are taking place in computer architecture and software that will provide improved information processing and control. This, coupled with progress in artificial intelligence and man-machine interface, offers promise of greatly improved battle management in the cockpit. The scale of changes is such that the nature of air warfare should be significantly affected over the next twenty years. This study examined the potential of electronic technology and potential benefits such as improvements in information processing, reduction in size and weight, increased reliability and maintainability; determined the applicability of such improvements to avionics and command and control systems and such functions as navigation and guidance, communications, surveillance, cockpit engineering and electronic warfare; and examined the impact on air warfare in the time period 2000 to 2010.

  5. The Information Warfare Life Cycle Model

    Directory of Open Access Journals (Sweden)

    Brett van Niekerk

    2011-11-01

    Full Text Available Information warfare (IW is a dynamic and developing concept, which constitutes a number of disciplines. This paper aims to develop a life cycle model for information warfare that is applicable to all of the constituent disciplines. The model aims to be scalable and applicable to civilian and military incidents where information warfare tactics are employed. Existing information warfare models are discussed, and a new model is developed from the common aspects of these existing models. The proposed model is then applied to a variety of incidents to test its applicability and scalability. The proposed model is shown to be applicable to multiple disciplines of information warfare and is scalable, thus meeting the objectives of the model.

  6. The Information Warfare Life Cycle Model

    Directory of Open Access Journals (Sweden)

    Brett van Niekerk

    2011-03-01

    Full Text Available Information warfare (IW is a dynamic and developing concept, which constitutes a number of disciplines. This paper aims to develop a life cycle model for information warfare that is applicable to all of the constituent disciplines. The model aims to be scalable and applicable to civilian and military incidents where information warfare tactics are employed. Existing information warfare models are discussed, and a new model is developed from the common aspects of these existing models. The proposed model is then applied to a variety of incidents to test its applicability and scalability. The proposed model is shown to be applicable to multiple disciplines of information warfare and is scalable, thus meeting the objectives of the model.

  7. High-power VCSELs for smart munitions

    Science.gov (United States)

    Geske, Jon; MacDougal, Michael; Cole, Garrett; Snyder, Donald

    2006-08-01

    The next generation of low-cost smart munitions will be capable of autonomously detecting and identifying targets aided partly by the ability to image targets with compact and robust scanning rangefinder and LADAR capabilities. These imaging systems will utilize arrays of high performance, low-cost semiconductor diode lasers capable of achieving high peak powers in pulses ranging from 5 to 25 nanoseconds in duration. Aerius Photonics is developing high-power Vertical-Cavity Surface-Emitting Lasers (VCSELs) to meet the needs of these smart munitions applications. The authors will report the results of Aerius' development program in which peak pulsed powers exceeding 60 Watts were demonstrated from single VCSEL emitters. These compact packaged emitters achieved pulse energies in excess of 1.5 micro-joules with multi kilo-hertz pulse repetition frequencies. The progress of the ongoing effort toward extending this performance to arrays of VCSEL emitters and toward further improving laser slope efficiency will be reported.

  8. Information warfare technologies in political discourse

    Directory of Open Access Journals (Sweden)

    Karpova Anna Yu.

    2016-01-01

    Full Text Available We attempt to examine the technology of «information warfare» in this paper. The dominant theme of the paper is that the outcome of the information warfare is important not only for the future of a state itself but for the future of the world balance of forces. The main task of geopolitical actors in information warfare is to introduce ideas corresponding to their interests into mass consciousness. All participants of political conflicts have common features in technologies of Information warfare. The information anomie is the indicator of the great geopolitical actors’ personified interests on the stage of «information warfare» - the process resulted in destroying the communicative line: report-information understanding and disrupting the social order in society. In this paper authors describe the following Information Warfare technologies: "Political volcano" technology; "SPIN" technology; "Widening media resource" technology; "specific gravity" technology; "Cold War 2.0" technology and Information cleaningup technology. It is assumed that in the future there will be new instructions on applying technologies of information warfare. To impart perspective to the paper we consider examples, opinions and trends.

  9. Difficult Decisions: Chemical Warfare.

    Science.gov (United States)

    Slesnick, Irwin L.; Miller, John A.

    1988-01-01

    Gives the background history and chemistry of modern day chemical warfare from World War I to the present. Provides discussion questions to stimulate deeper thinking on the issue. Contains a discussion activity called "Can New Chemical Weapons Lead to Humane Warfare?" (CW)

  10. Remote Machining and Evaluation of Explosively Filled Munitions

    Data.gov (United States)

    Federal Laboratory Consortium — This facility is used for remote machining of explosively loaded ammunition. Munition sizes from small arms through 8-inch artillery can be accommodated. Sectioning,...

  11. 40 CFR 266.203 - Standards applicable to the transportation of solid waste military munitions.

    Science.gov (United States)

    2010-07-01

    ... transportation of solid waste military munitions. 266.203 Section 266.203 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) SOLID WASTES (CONTINUED) STANDARDS FOR THE MANAGEMENT OF SPECIFIC HAZARDOUS... applicable to the transportation of solid waste military munitions. (a) Criteria for hazardous waste...

  12. 40 CFR 266.205 - Standards applicable to the storage of solid waste military munitions.

    Science.gov (United States)

    2010-07-01

    ... solid waste military munitions. 266.205 Section 266.205 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) SOLID WASTES (CONTINUED) STANDARDS FOR THE MANAGEMENT OF SPECIFIC HAZARDOUS... applicable to the storage of solid waste military munitions. (a) Criteria for hazardous waste regulation of...

  13. Benthic communities in chemical munitions dumping site areas within the Baltic deeps with special focus on nematodes

    Science.gov (United States)

    Kotwicki, Lech; Grzelak, Katarzyna; Bełdowski, Jacek

    2016-06-01

    Assessment of biological effects of chemical warfare agents (CWAs) dumped in the Baltic Sea has been one of the tasks of the Chemical Munitions Search & Assessment (CHEMSEA) project. Three sites have been selected for investigation: Bornholm Deep, Gotland Deep and Gdansk Deep. Fauna collected from these locations were compared with the reference area located between the studied regions at similar depths below 70 m. In total, four scientific cruises occurred in different seasons between 2011 and 2013. The total lack of any representatives of macrozoobenthos in all of the investigated dumping sites was noted. As a practical matter, the Baltic deeps were inhabited by nematodes as the only meiofauna representatives. Therefore, nematodes were used as a key group to explore the faunal communities inhabiting chemical dumping sites in the Baltic deeps. In total, 42 nematode genera belonging to 18 families were identified, and the dominant genus was Sabatieria (Comesomatidae), which constituted 37.6% of the overall nematode community. There were significant differences in nematode community structure (abundance and taxa composition) between the dumping areas and the reference site (Kruskal-Wallis H=30.96, pnematode assemblages could mirror the environmental conditions.

  14. Validation of Passive Sampling Devices for Monitoring of Munitions Constituents in Underwater Environments

    Science.gov (United States)

    2017-06-30

    Research and Development Program [SERDP] project #ER-2542) into the canister would provide enhancement of the quantitative estimation of the TWA...Department of Defense EOD Explosive Ordnance Disposal EPA United States Environmental Protection Agency EQL Environmental Quantitation Limit EST...Laboratory Quantitation Limit MC Munitions Constituents mL Milliliter MR Munitions Response NESDI Navy’s Environmental Security Development to

  15. Information Warfare and Ethics

    Directory of Open Access Journals (Sweden)

    M.J. Warren

    2001-05-01

    Full Text Available This paper examines the ethics of the practice of information warfare at both the national and corporate levels. Initially examining the present and past actions of individual hackers, it moves to the more organised, future military and economic warfare scenarios. It examines the lack of legal or policy initiatives in this area.

  16. MEANS AND METHODS OF CYBER WARFARE

    Directory of Open Access Journals (Sweden)

    Dan-Iulian VOITAȘEC

    2016-06-01

    Full Text Available According to the Declaration of Saint Petersburg of 1868 “the only legitimate object which States should endeavor to accomplish during war is to weaken the military forces of the enemy”. Thus, International Humanitarian Law prohibits or limits the use of certain means and methods of warfare. The rapid development of technology has led to the emergence of a new dimension of warfare. The cyber aspect of armed conflict has led to the development of new means and methods of warfare. The purpose of this paper is to study how the norms of international humanitarian law apply to the means and methods of cyber warfare.

  17. Naval electronic warfare simulation for effectiveness assessment and softkill programmability facility

    Science.gov (United States)

    Lançon, F.

    2011-06-01

    The Anti-ship Missile (ASM) threat to be faced by ships will become more diverse and difficult. Intelligence, rules of engagement constraints, fast reaction-time for effective softkill solution require specific tools to design Electronic Warfare (EW) systems and to integrate it onboard ship. SAGEM Company provides decoy launcher system [1] and its associated Naval Electronic Warfare Simulation tool (NEWS) to permit softkill effectiveness analysis for anti-ship missile defence. NEWS tool generates virtual environment for missile-ship engagement and counter-measure simulator over a wide spectrum: RF, IR, EO. It integrates EW Command & Control (EWC2) process which is implemented in decoy launcher system and performs Monte-Carlo batch processing to evaluate softkill effectiveness in different engagement situations. NEWS is designed to allow immediate EWC2 process integration from simulation to real decoy launcher system. By design, it allows the final operator to be able to program, test and integrate its own EWC2 module and EW library onboard, so intelligence of each user is protected and evolution of threat can be taken into account through EW library update. The objectives of NEWS tool are also to define a methodology for trial definition and trial data reduction. Growth potential would permit to design new concept for EWC2 programmability and real time effectiveness estimation in EW system. This tool can also be used for operator training purpose. This paper presents the architecture design, the softkill programmability facility concept and the flexibility for onboard integration on ship. The concept of this operationally focused simulation, which is to use only one tool for design, development, trial validation and operational use, will be demonstrated.

  18. Drone warfare

    Science.gov (United States)

    Gusterson, Hugh

    2017-11-01

    Crude drones existed as early as World War I, but the technology matured in the Yugoslav Wars of the 1990s and the current wars around the Middle East. The U.S. first used a weaponized drone in late 2001, in Afghanistan. Drones may cause more or less civilian casualties depending on the targeting protocols employed by their operators. There is an inherent ambiguity in determining who is an insurgent from several thousand feet, but civilian casualties are likely to be higher if targeters emphasize "signature strikes" over "personality strikes," if they engage in "double-tap strikes," if they rely too much on local informants, and if they rely too heavily on cellphone identification in the absence of corroboration from other intelligence sources. The legality of drone warfare is fairly clear in established battle zones such as Afghanistan, but is more problematic in terms of both international and domestic law when it comes to drone strikes in countries such as Yemen, Pakistan and Somalia with which the U.S. is not at war. Looking to the future, the U.S. would be well advised to sponsor negotiations for an international drone convention that might establish clear international rules for the use of drones, ban autonomous smart drones, and establish adjudicatory procedures to handle allegations of war crimes.

  19. Identification of Sarin and Related Compounds in Snow by Packed Capillary Liquid Chromatography-Electrospray Mass Spectrometry (LC-ESI-MS)

    National Research Council Canada - National Science Library

    D'Agostino, Paul

    2001-01-01

    Packed capillary LC-ESl-MS was used for the analysis of a snow sample that was accidentally contaminated with an organophosphorus chemical warfare agent during the destruction of a chemical munition...

  20. Munition Burial by Local Scour and Sandwaves: large-scale laboratory experiments

    Science.gov (United States)

    Garcia, M. H.

    2017-12-01

    Our effort has been the direct observation and monitoring of the burial process of munitions induced by the combined action of waves, currents and pure oscillatory flows. The experimental conditions have made it possible to observe the burial process due to both local scour around model munitions as well as the passage of sandwaves. One experimental facility is the Large Oscillating Water Sediment Tunnel (LOWST) constructed with DURIP support. LOWST can reproduce field-like conditions near the sea bed. The second facility is a multipurpose wave-current flume which is 4 feet (1.20 m) deep, 6 feet (1.8 m) wide, and 161 feet (49.2 m) long. More than two hundred experiments were carried out in the wave-current flume. The main task completed within this effort has been the characterization of the burial process induced by local scour as well in the presence of dynamic sandwaves with superimposed ripples. It is found that the burial of a finite-length model munition (cylinder) is determined by local scour around the cylinder and by a more global process associated with the formation and evolution of sandwaves having superimposed ripples on them. Depending on the ratio of the amplitude of these features and the body's diameter (D), a model munition can progressively get partially or totally buried as such bedforms migrate. Analysis of the experimental data indicates that existing semi-empirical formulae for prediction of equilibrium-burial-depth, geometry of the scour hole around a cylinder, and time-scales developed for pipelines are not suitable for the case of a cylinder of finite length. Relative burial depth (Bd / D) is found to be mainly a function of two parameters. One is the Keulegan-Carpenter number, KC, and the Shields parameter, θ. Munition burial under either waves or combined flow, is influenced by two different processes. One is related to the local scour around the object, which takes place within the first few hundred minutes of flow action (i.e. short

  1. 2008 13th Expeditionary Warfare Conference

    Science.gov (United States)

    2008-10-23

    platforms – Emphasize a mixed fleet approach that spans the “iron triangle” – Integrate MRAP into the fleet mix – Transition to a fleet of tactical...Urban Warfare Mountain Warfare Desert Warfare Jungle Riverine Special Skills Recon LOG CSS ENG MT HS Ord Maint EOD Pers Retrival ...Detection (Specialized Platform FLGPR)Stand-off (60M) Scaleable Neutralization (Area coverage) ABV Delivery Ground Cueing Stand-off (800M) Scaleable

  2. U.S. Army Training and Testing Area Carrying Capacity (ATTACC) for Munitions (AFM)

    Science.gov (United States)

    2006-11-01

    Army Training Support Center USDA United States Department of Agriculture USGS United States Geological Survey USLE Universal Soil Loss Equation...Range condition is a function of climate, soil , and hydrology. The munitions impact, constituent load, and range condition are modeled using AFM...For ArcGIS v2 to attain expected concentrations of munitions constituents and corresponding risk due to exposure through soil - and water-related

  3. On the Probability of Predicting and Mapping Traditional Warfare Measurements to the Cyber Warfare Domain

    CSIR Research Space (South Africa)

    Grobler, M

    2014-07-01

    Full Text Available Cyber warfare is a contentious topic, with no agreement on whether this is a real possibility or an unrealistic extension of the physical battlefield. This article will not debate the validity and legality of the concept of cyber warfare...

  4. The ethics of information warfare

    CERN Document Server

    Floridi, Luciano

    2014-01-01

    This book offers an overview of the ethical problems posed by Information Warfare, and of the different approaches and methods used to solve them, in order to provide the reader with a better grasp of the ethical conundrums posed by this new form of warfare.The volume is divided into three parts, each comprising four chapters. The first part focuses on issues pertaining to the concept of Information Warfare and the clarifications that need to be made in order to address its ethical implications. The second part collects contributions focusing on Just War Theory and its application to the case of Information Warfare. The third part adopts alternative approaches to Just War Theory for analysing the ethical implications of this phenomenon. Finally, an afterword by Neelie Kroes - Vice President of the European Commission and European Digital Agenda Commissioner - concludes the volume. Her contribution describes the interests and commitments of the European Digital Agenda with respect to research for the developme...

  5. Chemical warfare agents

    Directory of Open Access Journals (Sweden)

    Vijayaraghavan R

    2010-01-01

    Full Text Available Among the Weapons of Mass Destruction, chemical warfare (CW is probably one of the most brutal created by mankind in comparison with biological and nuclear warfare. Chemical weapons are inexpensive and are relatively easy to produce, even by small terrorist groups, to create mass casualties with small quantities. The characteristics of various CW agents, general information relevant to current physical as well as medical protection methods, detection equipment available and decontamination techniques are discussed in this review article. A brief note on Chemical Weapons Convention is also provided.

  6. Chemical warfare agents

    Science.gov (United States)

    Ganesan, K.; Raza, S. K.; Vijayaraghavan, R.

    2010-01-01

    Among the Weapons of Mass Destruction, chemical warfare (CW) is probably one of the most brutal created by mankind in comparison with biological and nuclear warfare. Chemical weapons are inexpensive and are relatively easy to produce, even by small terrorist groups, to create mass casualties with small quantities. The characteristics of various CW agents, general information relevant to current physical as well as medical protection methods, detection equipment available and decontamination techniques are discussed in this review article. A brief note on Chemical Weapons Convention is also provided. PMID:21829312

  7. Mongol Warfare in the Pre-Dissolution Period »

    Directory of Open Access Journals (Sweden)

    Timothy May

    2015-01-01

    Full Text Available Although the Mongols used many of the tactics and strategies that steppe nomads had used for centuries, the Mongols refined steppe warfare so that this style of warfare reached its apogee during the Mongol Empire. Furthermore, the Mongols developed a style of warfare that made them possibly the greatest military force in history. This work examines several facets of the pre-dissolution period (1200–1260. With the dissolution of the Mongol Empire, Mongol warfare once again changed. In some areas it remained complex while in others it regressed to traditional forces of steppe warfare, still potent but not as effective as the pre-dissolution period.

  8. Reactivity of Dual-Use Decontaminants with Chemical Warfare Agents

    Science.gov (United States)

    2016-07-01

    REACTIVITY OF DUAL-USE DECONTAMINANTS WITH CHEMICAL WARFARE AGENTS ECBC-TR-1384... Decontaminants with Chemical Warfare Agents 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER 6. AUTHOR(S) Willis, Matthew P...extraction) of chemical warfare agents from materials. 15. SUBJECT TERMS GD HD Decontamination Hazard mitigation VX Chemical warfare agent Liquid-phase

  9. Service life determination of munition during expeditionary missions

    NARCIS (Netherlands)

    Klerk, W.P.C. de; Heijden, A.E.D.M. van der

    2012-01-01

    For a more in-depth understanding of the aging processes of munitions in expeditionary operations, research is performed with respect to the influence of transport, storage and use on the safety of ammunition. Within this programme the influences of parameters like temperature, humidity, vibrations,

  10. Assessment of Soil, Surface-Water, and Ground-Water Contamination at Selected Sites at J-Field, Aberdeen Proving Ground, Maryland

    National Research Council Canada - National Science Library

    Phelan, Daniel

    1998-01-01

    .... From shortly after World War II into the 1970's, chemical-warfare agents, high-explosive munitions, and industrial chemicals were tested and disposed of at J-Field by open-pit burning and by high-explosive demolition...

  11. 48 CFR 225.770 - Prohibition on acquisition of United States Munitions List items from Communist Chinese military...

    Science.gov (United States)

    2010-10-01

    ... 48 Federal Acquisition Regulations System 3 2010-10-01 2010-10-01 false Prohibition on acquisition of United States Munitions List items from Communist Chinese military companies. 225.770 Section 225... of United States Munitions List items from Communist Chinese military companies. This section...

  12. Psychological effects of nuclear warfare

    International Nuclear Information System (INIS)

    Mickley, G.A.

    1987-01-01

    This report is divided into five parts. (1) Discussion of the psychological milieu before a nuclear confrontation. (2) Acute psychological reactions to nuclear warfare (some of which may reflect, in part, direct radiogenic alteration of nervous system functions). (3) Chronic psychological effects of a nuclear confrontation. (4) Issues concerning treatment of these psychological changes. (5) Prevention of adverse psychological reactions to nuclear warfare

  13. Information operation/information warfare modeling and simulation

    OpenAIRE

    Buettner, Raymond

    2000-01-01

    Information Operations have always been a part of warfare. However, this aspect of warfare is having ever-greater importance as forces rely more and more on information as an enabler. Modern information systems make possible very rapid creation, distribution, and utilization of information. These same systems have vulnerabilities that can be exploited by enemy forces. Information force-on-force is important and complex. New tools and procedures are needed for this warfare arena. As these t...

  14. Hybrid Warfare: Preparing for Future Conflict

    Science.gov (United States)

    2015-02-17

    ciceromagazine.com/?s=getting+behind+hybrid+warfare. Brown , Col Leslie F. “Twenty-First Century Warfare Will be Hybrid.” Carlisle Barracks, PA...Lebanon and Gaza.” Rand Corporation Occasional Paper. Santa Monica, CA: Rand Corporation, 2010. Jones, Gareth and Darya Korsunskaya. “U.S., EU

  15. A two-stage extraction procedure for insensitive munition (IM) explosive compounds in soils.

    Science.gov (United States)

    Felt, Deborah; Gurtowski, Luke; Nestler, Catherine C; Johnson, Jared; Larson, Steven

    2016-12-01

    The Department of Defense (DoD) is developing a new category of insensitive munitions (IMs) that are more resistant to detonation or promulgation from external stimuli than traditional munition formulations. The new explosive constituent compounds are 2,4-dinitroanisole (DNAN), nitroguanidine (NQ), and nitrotriazolone (NTO). The production and use of IM formulations may result in interaction of IM component compounds with soil. The chemical properties of these IM compounds present unique challenges for extraction from environmental matrices such as soil. A two-stage extraction procedure was developed and tested using several soil types amended with known concentrations of IM compounds. This procedure incorporates both an acidified phase and an organic phase to account for the chemical properties of the IM compounds. The method detection limits (MDLs) for all IM compounds in all soil types were regulatory risk-based Regional Screening Level (RSL) criteria for soil proposed by the U.S. Army Public Health Center. At defined environmentally relevant concentrations, the average recovery of each IM compound in each soil type was consistent and greater than 85%. The two-stage extraction method decreased the influence of soil composition on IM compound recovery. UV analysis of NTO established an isosbestic point based on varied pH at a detection wavelength of 341 nm. The two-stage soil extraction method is equally effective for traditional munition compounds, a potentially important point when examining soils exposed to both traditional and insensitive munitions. Copyright © 2016 Elsevier Ltd. All rights reserved.

  16. 20000G shock energy harvesters for gun-fired munition

    International Nuclear Information System (INIS)

    Willemin, J.; Boisseau, S.; Olmos, L.; Gallardo, M.; Despesse, G.; Robert, T.

    2016-01-01

    This paper presents a 20000G shock energy harvester dedicated to gun-fired munitions and based on a mass-spring resonant structure coupled to a coil-magnet electromagnetic converter. The 20000G shock energy is firstly stored in the spring as elastic potential energy, released as mass-spring mechanical oscillations right after the shock and finally converted into electricity thanks to the coil-magnet transducer. The device has been modeled, sized to generate 200mJ in 150ms, manufactured and tested in a gun-fired munition. The prototype sizes 117cm 3 and weighs 370g. 210mJ have been generated in a test bench and 140mJ in real conditions; this corresponds to a mean output power of 0.93W (7.9mW/cm 3 ) and a maximum output power of 4.83W (41.3mW/cm 3 ) right after the shock. (paper)

  17. 20000G shock energy harvesters for gun-fired munition

    Science.gov (United States)

    Willemin, J.; Boisseau, S.; Olmos, L.; Gallardo, M.; Despesse, G.; Robert, T.

    2016-11-01

    This paper presents a 20000G shock energy harvester dedicated to gun-fired munitions and based on a mass-spring resonant structure coupled to a coil-magnet electromagnetic converter. The 20000G shock energy is firstly stored in the spring as elastic potential energy, released as mass-spring mechanical oscillations right after the shock and finally converted into electricity thanks to the coil-magnet transducer. The device has been modeled, sized to generate 200mJ in 150ms, manufactured and tested in a gun-fired munition. The prototype sizes 117cm3 and weighs 370g. 210mJ have been generated in a test bench and 140mJ in real conditions; this corresponds to a mean output power of 0.93W (7.9mW/cm3) and a maximum output power of 4.83W (41.3mW/cm3) right after the shock.

  18. The Impacts of Modern Warfare on Freshwater Ecosystems

    Science.gov (United States)

    Francis, Robert A.

    2011-11-01

    There is increasing recognition and concern regarding the impacts of modern industrial warfare on the environment. Freshwater ecosystems are perhaps the most vulnerable to warfare-related impacts, which is of concern given that they provide so many essential environmental resources and services to society. Despite this, there has been little work to establish and quantify the types of impacts (both negative and positive) that warfare may have on such systems. This paper firstly highlights why rivers and lakes may be susceptible to warfare-related impacts, before synthesizing the available literature to explore the following main themes: intensification of wartime resource acquisition, use of water as an offensive or defensive weapon, direct and indirect effects of explosive ordnance, increased pollution, introduction of invasive alien species, and positive ecological impacts. This is then followed by a discussion of the implications of such impacts in relation to future warfare, including a consideration of the efficacy of existing legal instruments to protect the environment during conflict, and the trend for war to become more localized and `informal', and therefore less regulated. Finally, the paper identifies key research foci for understanding and mitigating the effects of warfare on freshwater ecosystems.

  19. 48 CFR 252.225-7007 - Prohibition on Acquisition of United States Munitions List Items from Communist Chinese Military...

    Science.gov (United States)

    2010-10-01

    ... of United States Munitions List Items from Communist Chinese Military Companies. 252.225-7007 Section... Chinese Military Companies. As prescribed in 225.1103(4), use the following clause: Prohibition On Acquisition of United States Munitions List Items From Communist Chinese Military Companies (SEP 2006) (a...

  20. Health and environmental problems of using antiarmour munitions containing depleted uranium core

    International Nuclear Information System (INIS)

    Matousek, J.

    2006-01-01

    In the 1970s, core of depleted uranium commenced to be introduced into the breakthrough antitank munitions of various calibers and types in order to considerably enhance their effectiveness due to extremely high density in comparison with steel. The health and environmental threats of using this munitions and other weaponry where depleted uranium has been utilised as counterbalance stem from the pyrophoric character of uranium, burnt due to material deformation and friction when penetrating armour targets creating thus highly respirable aerosol of uranium oxides that are deposited in alveoli after being inhaled or in other tissues after being ingested. Composition and main properties of depleted uranium are presented. Chronic effects of deposited particles of uranium oxides are due to internal irradiation of sensitive organs at proceeding radioactive decay accompanied with alpha irradiation. Long-term internal irradiation by radionuclides producing alpha-rays leads to proved risk of increased incidence of carcinoma and leukaemia not to speak on chronic chemical toxicity of uranium, independent of its isotopic composition. Environmental impact of extensive use of munitions with depleted uranium in the recent armed conflicts is assessed. (authors)

  1. Cyber Attacks, Information Attacks, and Postmodern Warfare

    Directory of Open Access Journals (Sweden)

    Valuch Jozef

    2017-06-01

    Full Text Available The aim of this paper is to evaluate and differentiate between the phenomena of cyberwarfare and information warfare, as manifestations of what we perceive as postmodern warfare. We describe and analyse the current examples of the use the postmodern warfare and the reactions of states and international bodies to these phenomena. The subject matter of this paper is the relationship between new types of postmodern conflicts and the law of armed conflicts (law of war. Based on ICJ case law, it is clear that under current legal rules of international law of war, cyber attacks as well as information attacks (often performed in the cyberspace as well can only be perceived as “war” if executed in addition to classical kinetic warfare, which is often not the case. In most cases perceived “only” as a non-linear warfare (postmodern conflict, this practice nevertheless must be condemned as conduct contrary to the principles of international law and (possibly a crime under national laws, unless this type of conduct will be recognized by the international community as a “war” proper, in its new, postmodern sense.

  2. Disposal of chemical agents and munitions stored at Pine Bluff Arsenal, Pine Bluff, Arkansas

    Energy Technology Data Exchange (ETDEWEB)

    Ensminger, J.T.; Hillsman, E.L.; Johnson, R.D.; Morrisey, J.A.; Staub, W.P.; Boston, C.R.; Hunsaker, D.B.; Leibsch, E.; Rickert, L.W.; Tolbert, V.R.; Zimmerman, G.P.

    1991-09-01

    The Pine Bluff Arsenal (PBA) near Pine Bluff, Arkansas, is one of eight continental United States (CONUS) Army installations where lethal unitary chemical agents and munitions are stored and where destruction of agents and munitions is proposed under the Chemical Stockpile Disposal Program (CSDP). The chemical agent inventory at PBA consists of approximately 12%, by weight, of the total US stockpile. The destruction of the stockpile is necessary to eliminate the risk to the public from continued storage and to dispose of obsolete and leaking munitions. In 1988 the US Army issued a Final Programmatic Environmental Impact Statement (FPEIS) for the CSDP that identified on-site disposal of agents and munitions as the environmentally preferred alternative (i.e., the alternative with the least potential to cause significant adverse impacts). The purpose of this report is to examine the proposed implementation of on-site disposal at PBA in light of more recent and more detailed data than those on which the FPEIS is based. New population data were used to compute fatalities using the same computation methods and values for all other parameters as in the FPEIS. Results indicate that all alternatives are indistinguishable when the potential health impacts to the PBA community are considered. However, risks from on-site disposal are in all cases equal to or less than risks from other alternatives. Furthermore, no unique resources with the potential to prevent or delay implementation of on-site disposal at PBA have been identified.

  3. Anti-Air Warfare Research for Naval Forces

    NARCIS (Netherlands)

    Bloemen, A.A.F.; Witberg, R.

    2000-01-01

    AAW is a warfare area with wide-spread spectrum. Command and Control Systems, sensors, effectors and electronic warfare are integrated to a system, they influence each other and must eventually be effective in coordinated action. This complexity asks for Operations Research methods to measure

  4. Russian New Art of Hybrid Warfare in Ukraine

    Directory of Open Access Journals (Sweden)

    Rusnáková Soňa

    2017-10-01

    Full Text Available The main aim of this paper is to analyse the annexation of Crimea by the Russian Federation. For the purposes of the paper, the theory of hybrid warfare was chosen as an analytical category. Throughout the paper, the concept of hybrid warfare is examined and applied on case study of Crimean annexation. Hybrid warfare, especially in connection with Russian actions in Crimea has been an intensely debated concept. There is an ongoing debate among scholars concerning the meaning of the concept, its existence and employment by the Russian Federation. This paper showed that the article of Valeriy Gerasimov – the incumbent Chief of the General Staff of the Russian Federation-invoked a new warfare strategy for the Russian Federation which was consequently for the very first time in its full spectre and effectivity employed on case of Crimean annexation in March 2014. Observing the application of the hybrid warfare in practice serves the purposes of countering its further potential application in post-Soviet space and Russian ‘near abroad’.

  5. Anxiety, depression, and posttraumatic stress in Iranian survivors of chemical warfare.

    Science.gov (United States)

    Hashemian, Farnoosh; Khoshnood, Kaveh; Desai, Mayur M; Falahati, Farahnaz; Kasl, Stanislav; Southwick, Steven

    2006-08-02

    In the 1980-1988 Iran-Iraq War, extensive use of chemical weapons resulted in high rates of morbidity and mortality. While much is known about the physical consequences of chemical warfare, there is a paucity of information about the long-term effects of chemical attacks on mental health. To assess the long-term psychological impact of chemical warfare on a civilian population. Cross-sectional randomized survey conducted in July 2004 of 153 civilians in 3 towns exposed to warfare in northwestern Iran: Oshnaviyeh (low-intensity conventional warfare), Rabat (high-intensity conventional warfare), and Sardasht (both high-intensity conventional warfare and chemical weapons). Full or partial posttraumatic stress disorder (PTSD) diagnosis, anxiety symptoms, and depressive symptoms were assessed using Farsi versions of the Clinician-Administered PTSD Scale, Hamilton Scale for Anxiety, and Beck Depression Inventory, respectively. Overall participation rate was 93%. Respondents had a mean age of 45 years and were all of Kurdish ethnicity. Among individuals exposed to both high-intensity warfare and chemical weapons, prevalence rates for lifetime PTSD, current PTSD, major anxiety symptoms, and severe depressive symptoms were 59%, 33%, 65%, and 41%, respectively. Among the low-intensity warfare group, the corresponding rates were 8%, 2%, 18%, and 6%, respectively, while intermediate rates were found among those exposed to high-intensity warfare but not to chemical weapons (31%, 8%, 26%, and 12%, respectively). Compared with individuals exposed to low-intensity warfare, those exposed to both high-intensity warfare and chemical weapons were at higher risk for lifetime PTSD (odds ratio [OR], 18.6; 95% confidence interval [CI], 5.8-59.4), current PTSD (OR, 27.4; 95% CI, 3.4-218.2), increased anxiety symptoms (OR, 14.6; 95% CI, 6.0-35.6), and increased depressive symptoms (OR, 7.2; 95% CI, 3.3-15.9). Exposure to high-intensity warfare but not to chemical weapons was also

  6. Self-Development for Cyber Warriors

    Science.gov (United States)

    2011-11-10

    Geospatial Intelligence (GEOINT), Human Intelligence (HUMINT), Open Source Intelligence ( OSINT ), Signals Intelligence (SIGINT) and Measurement and...from career fields with varying degrees of intersection with cyber warfare including: signals intelligence , all source intelligence , and...leverage them in support of cyber warfare operations. All Source Intelligence Ability to request, analyze, synthesize, and fuse intelligence from

  7. Insurgent Uprising: An Unconventional Warfare Wargame

    Science.gov (United States)

    2017-12-01

    Cleveland, Charles T. Connett, and Will Irwin. “Unconventional Warfare in the Gray Zone.” Joint Forces Quarterly 80, no. 1 (2016). Work, Robert O...CODE 13. ABSTRACT (maximum 200 words) Today, and in the future, unconventional solutions will present U.S. policymakers with options for dealing...training objectives and will complement existing training exercises. 14. SUBJECT TERMS unconventional warfare, foreign internal defense, direct

  8. A Cataloger’s Guide to the LMARS Report Number Authority File in Use at the Naval Underwater Systems Center.

    Science.gov (United States)

    1980-09-15

    FORCE CAMBRIDGE AFCRL-70-0018 RESEARCH LAB AFETR AIR FORCE EASTERN TEST RANGE APETR-TR-76-13 AFEWC AIR FORCE ELECTRONIC AFEWC-OP-1-77 WARFARE CENTER... EFFECTS TECHNOLOGY INC ETI-CR79-623 EUDAC EUROPEAN COMMAND DEFENSE EUDAC-DASJ-3-78 ANALYSIS EWIS (Electroniz Warfare EWIS-R-02-76 Inte 11 igence...AEO-76-066 JHU-APL-POR-1999. ..etc. JMEM (Joint Munitions Effectiveness JMEM-61JTCG/ME-1-2 Manual) jpl *See CIT-JPL (California Institute of Technology

  9. Using Agent Based Distillation to Explore Issues Related to Asymmetric Warfare

    Science.gov (United States)

    2009-10-01

    official definition of asymmetric warfare , considering that its use was redundant to irregular warfare [30]. 2 Such as the Lanchester Equations...RTP-MP-MSG-069 23 - 1 Using Agent Based Distillation to Explore Issues Related to Asymmetric Warfare Martin Adelantado, Jean-Michel Mathé...shows that both conventional and asymmetric warfare are characterised by nonlinear behaviours and that engagement is a Complex Adaptive System (CAS

  10. Investigation of a new passive sampler for the detection of munitions compounds in marine and freshwater systems.

    Science.gov (United States)

    Warren, Joseph K; Vlahos, Penny; Smith, Richard; Tobias, Craig

    2018-07-01

    Over the last century, unexploded ordnances have been disposed of in marine shelf systems because of a lack of cost-effective alternatives. Underwater unexploded ordnances have the potential to leak 2,4,6-trinitrotoluene (TNT) and 1,3,5-trinitro-1,3,5-triazine (RDX), commonly used chemical munitions, and contaminate local waters, biota, and sediments. The rate at which this contamination occurs in the environment is relatively unknown, and the cost- and time-prohibitive nature of sampling across sites makes mapping difficult. In the present study we assessed the efficacy of ethylene-vinyl acetate (EVA) for sampling relatively soluble munitions compounds over a range of environmental conditions (i.e., changes in temperature and salinity) and optimized the composition of the passive sampling polymer. The EVA sampler was able to successfully detect ambient concentrations of lingering munitions compounds from field sites containing unexploded ordnances. The sampler affinity for the munitions in terms of an EVA-water partition coefficient was greater than the standard octanol water values for each target compound. Partitioning of compounds onto EVA over the natural ranges of salinity did not change significantly, although uptake varied consistently and predictably with temperature. Increasing the vinyl acetate to ethylene ratio of the polymer corresponded to an increase in uptake capacity, consistent with enhanced dipole-dipole interactions between the munitions and the polymer. This sampler provides a cost-effective means to map and track leakage of unexploded ordnances both spatially and temporally. Environ Toxicol Chem 2018;37:1990-1997. © 2018 SETAC. © 2018 SETAC.

  11. A Predictive Model of Surface Warfare Officer Retention: Factors Affecting Turnover

    National Research Council Canada - National Science Library

    Gjurich, Gregory

    1999-01-01

    Junior Surface Warfare Officer retention is in a crisis. The Surface Warfare Officer community anticipates an inability to fill Department Head billets due to the number of junior Surface Warfare Officers leaving military service...

  12. Strategic Munitions Planning in Non-Conventional Asymmetric Operations

    Science.gov (United States)

    2010-04-01

    Conventional Asymmetric Operations RTO-MP-SAS-081 16 - 3 with a clearly structured, sized and located military force. The principles of Lanchester ...stockpiles and calculated munitions requirements. REFERENCES [1] Prague Summit Declaration, November 2002. [2] J. Fletcher, The Lanchester Legacy... Lanchester battles, Journal of the Operational Research Society, Vol. 50 No. 3, March 1999. [13] W. Freeman, A Study of Ammunition Consumption, Master of

  13. Hybrid Warfare Studies and Russia’s Example in Crimea

    Directory of Open Access Journals (Sweden)

    Mehmet Seyfettin EROL

    2015-12-01

    Full Text Available Although Hybrid Warfare is an old concept, theoretical studies in the western countries mainly began in the post-Col War era, focusing on asymmetrical threats against conventional superiority of western countries such as USA or Israel. September 11th attacks and 2006 Israel-Lebanon war played important roles for the evolution of hybrid warfare theories. However, there has not any consensus among scholars on a exact or unique definition of hybrid warfare. Hybrid warfare became one of the main security issues for the West and especially for NATO after the Russia-Ukraine crisis. Russian military strategies, called “hybrid warfare” by the western countries, resulted in the successful annexation of Crimea and, caused a serious security problem for the West resulting important structural and functional changes for the military system of NATO. Russian activities, which have been based on surprise, ambiguity and deniability, presented a unique example for hybrid warfare studies.

  14. Underwater Munitions Expert System: Preliminary Design Report

    Science.gov (United States)

    2015-08-21

    analysis  would  usually  be  performed,   where  separation  by   sieving  results  in  the  PMF  of  sand  grain...locations  they  might  potentially   aggregate .    Furthermore,  given  knowledge  of  the  types  of   munitions...feature  that   Netica  provides  is  the  ability  to  do  sensitivity   analysis ,

  15. Dilemmas of Warfare in Densely Populated Civilian Areas

    OpenAIRE

    Moshe Tamir

    2012-01-01

    This essay attempts to present operational perspectives on conducting warfare in densely populated areas. It also distinguishes between three types of combat within this general category, with the goal of shedding light on this complex type of warfare.

  16. REMOTE SENSING IN DETECTING BURIED MUNITIONS FROM WORLD WAR I

    Science.gov (United States)

    During World War I, The American University in Washington D.C. was used by the U.S. Army as an experiment station for the development and testing of a variety of battlefield munitions including chemical weapons such as Mustard Gas, Phosgene, Ricin and Lewisite, among othe...

  17. 40 CFR 220.2 - Definitions.

    Science.gov (United States)

    2010-07-01

    ... of 1972, as amended (33 U.S.C. 1401); (b) FWPCA means the Federal Water Pollution Control Act, as... matter of any kind or description, including, but not limited to, dredged material, solid waste, incinerator residue, garbage, sewage, sewage sludge, munitions, radiological, chemical, and biological warfare...

  18. Disposal of chemical agents and munitions stored at Umatilla Depot Activity, Hermiston, Oregon

    Energy Technology Data Exchange (ETDEWEB)

    Zimmerman, G.P.; Hillsman, E.L.; Johnson, R.O.; Miller, R.L.; Patton, T.G.; Schoepfle, G.M.; Tolbert, V.R.; Feldman, D.L.; Hunsaker, D.B. Jr.; Kroodsma, R.L.; Morrissey, J.; Rickert, L.W.; Staub, W.P.; West, D.C.

    1993-02-01

    The Umatilla Depot Activity (UMDA) near Hermiston, Oregon, is one of eight US Army installations in the continental United States where lethal unitary chemical agents and munitions are stored, and where destruction of agents and munitions is proposed under the Chemical Stockpile Disposal Program (CSDP). The chemical agent inventory at UMDA consists of 11.6%, by weight, of the total US stockpile. The destruction of the stockpile is necessary to eliminate the risk to the public from continued storage and to dispose of obsolete and leaking munitions. In 1988 the US Army issued a Final Programmatic Environmental Impact Statement (FPEIS) for the CSDP that identified on-site disposal of agents and munitions as the environmentally preferred alternative (i.e., the alternative with the least potential to cause significant adverse impacts), using a method based on five measures of risk for potential human health and ecosystem/environmental effects; the effectiveness and adequacy of emergency preparedness capabilities also played a key role in the FPEIS selection methodology. In some instances, the FPEIS included generic data and assumptions that were developed to allow a consistent comparison of potential impacts among programmatic alternatives and did not include detailed conditions at each of the eight installations. The purpose of this Phase 1 report is to examine the proposed implementation of on-site disposal at UMDA in light of more recent and more detailed data than those included in the FPEIS. Specifically, this Phase 1 report is intended to either confirm or reject the validity of on-site disposal for the UMDA stockpile. Using the same computation methods as in the FPEIS, new population data were used to compute potential fatalities from hypothetical disposal accidents. Results indicate that onsite disposal is clearly preferable to either continued storage at UMDA or transportation of the UMDA stockpile to another depot for disposal.

  19. Flying Electronic Warfare Laboratory

    Data.gov (United States)

    Federal Laboratory Consortium — FUNCTION: Provides NP-3D aircraft host platforms for Effectiveness of Navy Electronic Warfare Systems (ENEWS) Program antiship missile (ASM) seeker simulators used...

  20. Redefining Hybrid Warfare: Russia's Non-linear War against the West

    Directory of Open Access Journals (Sweden)

    Tad Schnaufer

    2017-03-01

    Full Text Available The term hybrid warfare fails to properly describe Russian operations in Ukraine and elsewhere. Russia has undertaken unconventional techniques to build its influence and test the boundaries of a shaken international system. Notably, Russia’s actions in Ukraine display an evolved style of warfare that goes beyond its initial label of hybrid warfare. The term non-linear war (NLW will be defined in this article to encompass Russia’s actions and allow policymakers the correct framework to discuss and respond to Russia. NLW plays to the advantage of countries like Russia and constitute the future of warfare.

  1. The Political Economy of the Munitions Supply Program

    Science.gov (United States)

    2014-05-01

    advantage in production, and further identified which munitions products can be procured offshore with only limited effects on operational liabilities...comparative advantage and access to global supply chains. A few options exist: fixed-price contracts may be indexed to exogenously-given input prices and... franchisees bid their true costs.47 Third, once supply is forthcoming, the franchisee has an incentive to minimize costs unless the franchiser is known

  2. Route survey periodicity for mine warfare

    OpenAIRE

    Coke, Hartwell F.

    2009-01-01

    Approved for public release, distribution unlimited One of the Navy's most long standing challenges has been conquering the mine warfare threat. As mines and mine warfare techniques evolve and become more sophisticated, so does the United States' ability to counter the threat. The United States newest technique for countering a potential mined harbor, or route, is a process known as "change detection." This concept uses previous side scan sonar images of the area prior to a mining event an...

  3. ISIL's Hybrid Warfare in Syria & Iraq

    DEFF Research Database (Denmark)

    Sørensen, Heine

    2016-01-01

    of and ability to synchronize various instruments of power with a view to achieving their end-state. With regards to the second part of the problem statement, the analysis demonstrates how ISIL employed horizontal escalation and ambiguity initially, but later on turned to vertical escalation, within the military......The case study specifically seeks to answer the following problem statement: Does ISIL qualify as an actor using hybrid warfare and if so what characterizes their particular use of this type of warfare? Based on an analysis of ISIL’s warfare from August 2012 to August 2016 the chapter argues......, that it is possible to answer the first part of the problem statement in an affirmative way. Hence, ISIL is not only theoretically prone to hybridity by organizational setup, and by the people comprising the organization, but has in fact continuously acted according to a hybrid logic in its prioritization...

  4. Munitions having an insensitive detonator system for initiating large failure diameter explosives

    Science.gov (United States)

    Perry, III, William Leroy

    2015-08-04

    A munition according to a preferred embodiment can include a detonator system having a detonator that is selectively coupled to a microwave source that functions to selectively prime, activate, initiate, and/or sensitize an insensitive explosive material for detonation. The preferred detonator can include an explosive cavity having a barrier within which an insensitive explosive material is disposed and a waveguide coupled to the explosive cavity. The preferred system can further include a microwave source coupled to the waveguide such that microwaves enter the explosive cavity and impinge on the insensitive explosive material to sensitize the explosive material for detonation. In use the preferred embodiments permit the deployment and use of munitions that are maintained in an insensitive state until the actual time of use, thereby substantially preventing unauthorized or unintended detonation thereof.

  5. The ethics of drone warfare

    Directory of Open Access Journals (Sweden)

    Fatić Aleksandar

    2017-01-01

    Full Text Available The paper investigates the compatibility of the modern technologies of warfare, specifically the use of offensive drones, with traditional military ethics and suggests that the new technologies radically change the value system of the military in ways which make large parts of the traditional military ethics inapplicable. The author suggests that Agamben’s concept of ‘effectivity’ through ‘special actions’ which mark one’s belonging to a particular community or profession is a useful conceptual strategy to explore the compatibility of drone warfare with traditional military ethics; this strategy shows mixed results at best.

  6. Underwater Munitions Expert System to Predict Mobility and Burial

    Science.gov (United States)

    2017-11-14

    for predicting the location and possible burial of underwater munitions is required to advise site managers as they plan...that region above the given UXO relative density, which is defined as the UXO density divided by the sand grain density, ( nominally 2650 g...0.0 + 2.5*dsed ; % nominal bed roughness if no burial % (Potentially in future version, ripple height

  7. National Security Strategy and the Munitions' Paradox: Self-Sufficiency or Maximum Efficiency

    National Research Council Canada - National Science Library

    McChesney, Michael

    1998-01-01

    ... that the United States military strategy may not be credible to likely regional aggressors. Conversely, DoD acquisition leadership believes industry consolidation should continue and the munitions base should be expanded to include US allies...

  8. Cyber Warfare/Cyber Terrorism

    National Research Council Canada - National Science Library

    O'Hara, Timothy

    2004-01-01

    .... Section 1 concludes with a review of offensive and defensive cyber warfare concepts. Section 2 presents a general overview of cyber terrorism, including definitions of cyber terrorism and cyber terrorism support...

  9. Unconventional Cyber Warfare: Cyber Opportunities in Unconventional Warfare

    Science.gov (United States)

    2014-06-01

    Internet service provider IW irregular warfare MCO major combat operations MySQL open-source relational database management system NATO North...today, often with no regard for legal or ethical constraints. A better course of action would be to conduct operations in cyberspace within the precepts...built in feature of MySQL that 97 John Markoff, “Before the Gunfire, Cyberattacks,” York Times, August 13, 2008, sec. Technology, 1, http

  10. Progressing Insensitive Munitions: Benefits and Techniques for Proactively Addressing Environmental Regulations

    Science.gov (United States)

    2012-05-01

    X Worm Tubifex tubifex X X X Black worm Lumbriculus X Asiatic clam Corbicula fluminea X Estuarine/marine water column Mysid shrimp Americamysis...Objective: Characterize traditional and insensitive munitions (IMs) impacts on amphibian larvae to manage a candidate for T&E status that inhabit

  11. Expeditionary Warfare- Force Protection

    National Research Council Canada - National Science Library

    Higgins, Eric

    2004-01-01

    In 2003, the Systems Engineering and Analysis students were tasked to develop a system of systems conceptual solution to provide force protection for the Sea Base conceptualized in the 2002 Expeditionary Warfare study...

  12. The Impact of Irregular Warfare on the US Army

    National Research Council Canada - National Science Library

    McDonald, III, Roger L

    2006-01-01

    Although the U.S. Army has yet to clearly define irregular warfare, it is imperative that the Army take near-term action to enhance the ability of Soldiers and units to operate effectively in an irregular warfare environment...

  13. Numerical simulation of RCS for carrier electronic warfare airplanes

    Directory of Open Access Journals (Sweden)

    Yue Kuizhi

    2015-04-01

    Full Text Available This paper studies the radar cross section (RCS of carrier electronic warfare airplanes. Under the typical naval operations section, the mathematical model of the radar wave’s pitch angle incidence range analysis is established. Based on the CATIA software, considering dynamic deflections of duck wing leading edge flaps, flaperons, horizontal tail, and rudder, as well as aircraft with air-to-air missile, anti-radiation missile, electronic jamming pod, and other weapons, the 3D models of carrier electronic warfare airplanes Model A and Model B with weapons were established. Based on the physical optics method and the equivalent electromagnetic flow method, by the use of the RCSAnsys software, the characteristics of carrier electronic warfare airplanes’ RCS under steady and dynamic flights were simulated under the UHF, X, and S radar bands. This paper researches the detection probability of aircraft by radars under the condition of electronic warfare, and completes the mathematical statistical analysis of the simulation results. The results show that: The Model A of carrier electronic warfare airplane is better than Model B on stealth performance and on discover probability by radar detection effectively.

  14. Electronic Warfare Signature Measurement Facility

    Data.gov (United States)

    Federal Laboratory Consortium — The Electronic Warfare Signature Measurement Facility contains specialized mobile spectral, radiometric, and imaging measurement systems to characterize ultraviolet,...

  15. Using waterjet in reverse logistic operations in discarded munitions processing

    Czech Academy of Sciences Publication Activity Database

    Hloch, S.; Tozan, H.; Yagimli, M.; Valíček, Jan; Rokosz, K.

    2011-01-01

    Roč. 18, č. 2 (2011), s. 267-271 ISSN 1330-3651 Institutional research plan: CEZ:AV0Z30860518 Keywords : abrasive waterjet * anti tank bullet * automatic line Subject RIV: JQ - Machines ; Tools Impact factor: 0.347, year: 2011 http://hrcak.srce.hr/search/?q=Using+waterjet+in+reverse+logistic+operations+in+discarded+munitions+processing

  16. The doctor and nuclear warfare

    International Nuclear Information System (INIS)

    Anon.

    1982-01-01

    At the 34th World Medical Assembly in Lisbon in 1981 the World Medical Association adopted a motion proposed by the American Medical Association that national medical associations should develop programs to educate the civilian population on the medical consequences of nuclear war. This article discusses the attitude the medical professions should have, should nuclear warfare in some form confront them in the future. The conclusion is drawn that defence against nuclear warfare is only a part of civil defence against any disaster, including the natural disasters such as flood and fire and the man-made disasters of transport accidents, even of problems at nuclear plants designed to supply energy

  17. Mechanism of injury and microbiological flora of the geographical location are essential for the prognosis in soldiers with serious warfare injuries

    DEFF Research Database (Denmark)

    Wetterslev, Mik; Rose-Larsen, Katrine; Hansen-Schwartz, Jacob

    2013-01-01

    patients survived to discharge and two patients died. DISCUSSION: Explosion was the most frequent cause of injury in all cases and caused damage to several organ systems. Infections after combat injuries are a major problem because of the different microbiological profile. CONCLUSION: The use of explosives...... has been and remains a substantial part of warfare, and this review has showed us that the knowledge of the mechanism of injury is indeed essential, and that intelligence on the microbiological flora of the geographical location of the conflict is essential. FUNDING: not relevant. TRIAL REGISTRATION...

  18. Chemical profiling of chemical warfare agents for forensic purposes

    NARCIS (Netherlands)

    Noort, D.; Reuver, L.P.J. de; Fidder, A.; Tromp, M.; Verschraagen, M.

    2010-01-01

    A program has been initiated towards the chemical profiling of chemical warfare agents, in order to support forensic investigations towards synthesis routes, production sites and suspect chemical suppliers. Within the first stage of the project various chemical warfare agents (VX, sulfur mustard,

  19. Surface Warfare Officers Initial Training For Future Success

    Science.gov (United States)

    2018-03-01

    9 A school is initial rating specific technical training that is given to sailors. 14 Figure 4. Less...NAVAL POSTGRADUATE SCHOOL MONTEREY, CALIFORNIA MBA PROFESSIONAL REPORT SURFACE WARFARE OFFICERS— INITIAL TRAINING FOR FUTURE SUCCESS March 2018...professional report 4. TITLE AND SUBTITLE SURFACE WARFARE OFFICERS—INITIAL TRAINING FOR FUTURE SUCCESS 5. FUNDING NUMBERS 6. AUTHOR(S) Arron J

  20. Information Warfare and International Law

    National Research Council Canada - National Science Library

    Greenberg, Lawrence T; Goodman, Seymour E; Soo Hoo, Kevin J

    1998-01-01

    .... Some legal constraints will certainly apply to information warfare, either because the constraints explicitly regulate particular actions, or because more general principles of international law...

  1. Nuclear, biological and chemical warfare. Part I: Medical aspects of nuclear warfare.

    Science.gov (United States)

    Kasthuri, A S; Pradhan, A B; Dham, S K; Bhalla, I P; Paul, J S

    1990-04-01

    Casualties in earlier wars were due much more to diseases than to weapons. Mention has been made in history of the use of biological agents in warfare, to deny the enemy food and water and to cause disease. In the first world war chemical agents were used to cause mass casualties. Nuclear weapons were introduced in the second world war. Several countries are now involved in developing nuclear, biological and chemical weapon systems, for the mass annihilation of human beings, animals and plants, and to destroy the economy of their enemies. Recently, natural calamities and accidents in nuclear, chemical and biological laboratories and industries have caused mass instantaneous deaths in civilian population. The effects of future wars will not be restricted to uniformed persons. It is time that physicians become aware of the destructive potential of these weapons. Awareness, immediate protective measures and first aid will save a large number of persons. This series of articles will outline the medical aspects of nuclear, biological and chemical weapon systems in three parts. Part I will deal with the biological effects of a nuclear explosion. The short and long term effects due to blast, heat and associated radiation are highlighted. In Part II, the role of biological agents which cause commoner or new disease patterns is mentioned. Some of the accidents from biological warfare laboratories are a testimony to its potential deleterious effects. Part III deals with medical aspects of chemical warfare agents, which in view of their mass effects can overwhelm the existing medical resources, both civilian and military.(ABSTRACT TRUNCATED AT 250 WORDS)

  2. Defending Our Satellites: The Need for Electronic Warfare Education and Training

    Science.gov (United States)

    2015-12-01

    intercept Allied bombers attacking at night.9 As a result of the electronic warfare advantage that systems like Window and Airborne Cigar be- stowed...74 | Air & Space Power Journal Defending Our Satellites The Need for Electronic Warfare Education and Training Lt Col E. Lincoln Bonner, USAF...expanding education and training in the use of electronic warfare to defend US satellites and improve their survivability. The following discussion

  3. Implications of Network Centric Warfare

    National Research Council Canada - National Science Library

    Bailey, Alvin

    2004-01-01

    .... These areas of dependence also provide numerous vulnerabilities. This paper will focus specifically on Network Centric Warfare's vulnerabilities in terms of sensors cyberterrorism/ Electro-Magnetic Pulse (EMP...

  4. Epidemic Intelligence. Langmuir and the Birth of Disease Surveillance

    Directory of Open Access Journals (Sweden)

    Lyle Fearnley

    2010-12-01

    Full Text Available In the wake of the SARS and influenza epidemics of the past decade, one public health solution has become a refrain: surveillance systems for detection of disease outbreaks. This paper is an effort to understand how disease surveillance for outbreak detection gained such paramount rationality in contemporary public health. The epidemiologist Alexander Langmuir is well known as the creator of modern disease surveillance. But less well known is how he imagined disease surveillance as one part of what he called “epidemic intelligence.” Langmuir developed the practice of disease surveillance during an unprecedented moment in which the threat of biological warfare brought civil defense experts and epidemiologists together around a common problem. In this paper, I describe how Langmuir navigated this world, experimenting with new techniques and rationales of epidemic control. Ultimately, I argue, Langmuir′s experiments resulted in a set of techniques and infrastructures – a system of epidemic intelligence – that transformed the epidemic as an object of human art.

  5. Distributed computing environment for Mine Warfare Command

    OpenAIRE

    Pritchard, Lane L.

    1993-01-01

    Approved for public release; distribution is unlimited. The Mine Warfare Command in Charleston, South Carolina has been converting its information systems architecture from a centralized mainframe based system to a decentralized network of personal computers over the past several years. This thesis analyzes the progress Of the evolution as of May of 1992. The building blocks of a distributed architecture are discussed in relation to the choices the Mine Warfare Command has made to date. Ar...

  6. The Cycle of Warfare - Analysis of an Analytical Model

    DEFF Research Database (Denmark)

    Jensen, Mikkel Storm

    2016-01-01

    by its economic, political and ideological characteristics. With the single assumption of economic rationality in human behaviour, Cycle of Warfare is not only coherent, it is applicable to all entities engaged in competition anywhere in the world at any point in history. The Cycle of Warfare can be used...

  7. Guiding Warfare to Reach Sustainable Peace

    DEFF Research Database (Denmark)

    Vestenskov, David; Drewes, Line

    The conference report Guiding Warfare to Reach Sustainable Peace constitutes the primary outcome of the conference It is based on excerpts from the conference presenters and workshop discussions. Furthermore, the report contains policy recommendations and key findings, with the ambition of develo......The conference report Guiding Warfare to Reach Sustainable Peace constitutes the primary outcome of the conference It is based on excerpts from the conference presenters and workshop discussions. Furthermore, the report contains policy recommendations and key findings, with the ambition...... of developing best practices in the education and implementation of IHL in capacity building of security forces....

  8. Lanchester-Type Models of Warfare, Volume II

    OpenAIRE

    Taylor, James G.

    1980-01-01

    This monograph is a comprehensive treatist on Lanchester-type models of warfare, i.e. differential-equation models of attrition in force-on-force combat operations. Its goal is to provide both an introduction to and current-state-of-the-art overview of Lanchester-type models of warfare as well as a comprehensive and unified in-depth treatment of them. Both deterministic as well as stochastic models are considered. Such models have been widely used in the United States and elsewhere for the...

  9. Nondestructive inspection of chemical warfare based on API-TOF

    International Nuclear Information System (INIS)

    Wang Xinhua; Zheng Pu; He Tie; An Li; Yang Jie; Fan Yu

    2013-01-01

    Background: Real-time, fast, accurate, nondestructive inspection (NDI) and quantitative analysis for chemical warfare are very imperative for chemical defense, anti-terror and nation security. Purpose: Associated Particles Technique (APT)/Neutron Time of Flight (TOF) has been developed for non-invasive inspection of sealed containers with chemical warfare agents. Methods: A prototype equipment for chemical warfare is consisted of an APT neutron generator with a 3×3 matrix of semiconductor detectors of associated alpha-particles, the shielding protection of neutron and gamma-ray, arrayed NaI(Tl)-based detectors of gamma-rays, fully-digital data acquisition electronics, data analysis, decision-making software, support platform and remote control system. Inelastic scattering gamma-ray pulse height spectra of sarin, VX, mustard gas and adamsite induced by 14-MeV neutron are measured. The energies of these gamma rays are used to identify the inelastic scattering elements, and the intensities of the peaks at these energies are used to reveal their concentrations. Results: The characteristic peaks of inelastic scattering gamma-ray pulse height spectra show that the prototype equipment can fast and accurately inspect chemical warfare. Conclusion: The equipment can be used to detect not only chemical warfare agents but also other hazardous materials, such as chemical/toxic/drug materials, if their chemical composition is in any way different from that of the surrounding materials. (authors)

  10. Depleted uranium instead of lead in munitions: the lesser evil.

    Science.gov (United States)

    Jargin, Sergei V

    2014-03-01

    Uranium has many similarities to lead in its exposure mechanisms, metabolism and target organs. However, lead is more toxic, which is reflected in the threshold limit values. The main potential hazard associated with depleted uranium is inhalation of the aerosols created when a projectile hits an armoured target. A person can be exposed to lead in similar ways. Accidental dangerous exposures can result from contact with both substances. Encountering uranium fragments is of minor significance because of the low penetration depth of alpha particles emitted by uranium: they are unable to penetrate even the superficial keratin layer of human skin. An additional cancer risk attributable to the uranium exposure might be significant only in case of prolonged contact of the contaminant with susceptible tissues. Lead intoxication can be observed in the wounded, in workers manufacturing munitions etc; moreover, lead has been documented to have a negative impact on the intellectual function of children at very low blood concentrations. It is concluded on the basis of the literature overview that replacement of lead by depleted uranium in munitions would be environmentally beneficial or largely insignificant because both lead and uranium are present in the environment.

  11. Depleted uranium instead of lead in munitions: the lesser evil

    International Nuclear Information System (INIS)

    Jargin, Sergei V

    2014-01-01

    Uranium has many similarities to lead in its exposure mechanisms, metabolism and target organs. However, lead is more toxic, which is reflected in the threshold limit values. The main potential hazard associated with depleted uranium is inhalation of the aerosols created when a projectile hits an armoured target. A person can be exposed to lead in similar ways. Accidental dangerous exposures can result from contact with both substances. Encountering uranium fragments is of minor significance because of the low penetration depth of alpha particles emitted by uranium: they are unable to penetrate even the superficial keratin layer of human skin. An additional cancer risk attributable to the uranium exposure might be significant only in case of prolonged contact of the contaminant with susceptible tissues. Lead intoxication can be observed in the wounded, in workers manufacturing munitions etc; moreover, lead has been documented to have a negative impact on the intellectual function of children at very low blood concentrations. It is concluded on the basis of the literature overview that replacement of lead by depleted uranium in munitions would be environmentally beneficial or largely insignificant because both lead and uranium are present in the environment. (opinion)

  12. Firearm microstamping technology: counterinsurgency intelligence gathering tool

    Science.gov (United States)

    Lizotte, Todd E.; Ohar, Orest P.

    2009-05-01

    Warfare relies on effective, accurate and timely intelligence an especially critical task when conducting a counterinsurgency operation [1]. Simply stated counterinsurgency is an intelligence war. Both insurgents and counterinsurgents need effective intelligence capabilities to be successful. Insurgents and counterinsurgents therefore attempt to create and maintain intelligence networks and fight continuously to neutralize each other's intelligence capabilities [1][2]. In such an environment it is obviously an advantage to target or proactively create opportunities to track and map an insurgent movement. Quickly identifying insurgency intelligence assets (Infiltrators) within a host government's infrastructure is the goal. Infiltrators can occupy various areas of government such as security personnel, national police force, government offices or military units. Intentional Firearm Microstamping offers such opportunities when implemented into firearms. Outfitted within firearms purchased and distributed to the host nation's security forces (civilian and military), Intentional Firearm Microstamping (IFM) marks bullet cartridge casings with codes as they are fired from the firearm. IFM is incorporated onto optimum surfaces with the firearm mechanism. The intentional microstamp tooling marks can take the form of alphanumeric codes or encoded geometric codes that identify the firearm. As the firearm is discharged the intentional tooling marks transfer a code to the cartridge casing which is ejected out of the firearm. When recovered at the scene of a firefight or engagement, the technology will provide forensic intelligence allowing the mapping and tracking of small arms traffic patterns within the host nation or identify insurgency force strength and pinpoint firearm sources, such as corrupt/rogue military units or police force. Intentional Firearm Microstamping is a passive mechanical trace technology that can be outfitted or retrofitted to semiautomatic handguns and

  13. Hybrid Warfare: the 21st Century Russian Way of Warfare

    Science.gov (United States)

    2017-05-25

    to wage information operations— from television, to the Internet, to unconventional forces on the ground spreading the message word -of- mouth ...adversarial vulnerabilities. Many of the peculiarities of hybrid warfare described herein are inextricably linked to Russia’s social , political, and...the US election. Then they utilized various means of media to distribute that information with the goal to discredit the US political process and

  14. Attrition in Network Centric Warfare

    National Research Council Canada - National Science Library

    Erbetta, John

    2003-01-01

    .... Information warfare means that positive attacks on systems themselves compound the problem. Emerging technologies applicable to NCW as a force multiplier need to be recognized as counter to the impediments to progress...

  15. Decision Support Tools for Munitions Response Performance Prediction and Risk Assessment

    Science.gov (United States)

    2016-09-01

    Oldenburg. A discrimination algorithm for UXO using time domain electromagnetic induction . Journal of Environmental and Engineering Geophysics, 6:91...the course of a munitions response project. Unexploded ordnance (UXO), electromagnetic (EM), sensors, electromagnetic induction (EMI), data...approach defines a detection channel that is a linear combination of received channels. The weightings of received channels comprising the optimized

  16. Depleted uranium munitions - where are we now?

    International Nuclear Information System (INIS)

    Spratt, Brian G.

    2002-01-01

    There are very different views on the health hazards of DU munitions. Most of the concerns of veterans and their advisors focus on the radiological effects of DU and consequently these are the focus of this editorial. Effects on the kidney and environmental consequences are, however, considered in the second of the Royal Society reports and the main conclusions of both of the reports are outlined in the summary document published in this issue of the journal. The main radiological concerns focus on the irradiation of lung tissues from inhaled DU particles and irradiation resulting from the translocation of inhaled particles to the thoracic lymph nodes.The overwhelming scientific view, presented in the two Royal Society reports and in other independent reviews, is that the main risks of exposure to DU aerosols are an increase in lung cancer and (from chemical toxicity) damage to the kidney, although these are likely to be evident only following substantial intakes. The equivalent doses to the thoracic lymph nodes following inhalation of DU particles are about ten times greater than those to the lung, but the former tissue is considered to be relatively insensitive to radiation-induced cancers. So far, large-scale epidemiological studies of UK and US Gulf War veterans have shown no increase in mortality from cancer, or kidney disease, but these studies need to be continued to see if any significant excess mortality from these causes appears. As mentioned previously, more sensitive epidemiological studies should be possible if groups of soldiers who have known exposures to DU can be identified. Adverse reproductive effects have been observed in rodents exposed to uranium although most of these effects are evident after relatively large daily intakes of uranium. The possibility of effects on reproductive health (from DU or other toxic exposures) is being studied in both UK and US Gulf War veterans. Results from the UK epidemiological study are not yet available but

  17. Simulating cyber warfare and cyber defenses: information value considerations

    Science.gov (United States)

    Stytz, Martin R.; Banks, Sheila B.

    2011-06-01

    Simulating cyber warfare is critical to the preparation of decision-makers for the challenges posed by cyber attacks. Simulation is the only means we have to prepare decision-makers for the inevitable cyber attacks upon the information they will need for decision-making and to develop cyber warfare strategies and tactics. Currently, there is no theory regarding the strategies that should be used to achieve objectives in offensive or defensive cyber warfare, and cyber warfare occurs too rarely to use real-world experience to develop effective strategies. To simulate cyber warfare by affecting the information used for decision-making, we modify the information content of the rings that are compromised during in a decision-making context. The number of rings affected and value of the information that is altered (i.e., the closeness of the ring to the center) is determined by the expertise of the decision-maker and the learning outcome(s) for the simulation exercise. We determine which information rings are compromised using the probability that the simulated cyber defenses that protect each ring can be compromised. These probabilities are based upon prior cyber attack activity in the simulation exercise as well as similar real-world cyber attacks. To determine which information in a compromised "ring" to alter, the simulation environment maintains a record of the cyber attacks that have succeeded in the simulation environment as well as the decision-making context. These two pieces of information are used to compute an estimate of the likelihood that the cyber attack can alter, destroy, or falsify each piece of information in a compromised ring. The unpredictability of information alteration in our approach adds greater realism to the cyber event. This paper suggests a new technique that can be used for cyber warfare simulation, the ring approach for modeling context-dependent information value, and our means for considering information value when assigning cyber

  18. Evaluation of the metabolic fate of munitions material (TNT & RDX) in plant systems and initial assessment of material interaction with plant genetic material. Validation of the metabolic fate of munitions materials (TNT, RDX) in mature crops

    Energy Technology Data Exchange (ETDEWEB)

    Fellows, R.J.; Harvey, S.D.; Cataldo, D.A.

    1995-09-01

    The goals of this effort were to confirm and expand data related to the behavior and impacts of munitions residues upon human food chain components. Plant species employed included corn (Zea mays), alfalfa (Medicago sativa). spinach (Spinacea oleraceae), and carrot (Daucus carota). Plants were grown from seed to maturity (70 to 120 days) in a low-fertility soil (Burbank) amended with either {sup 14}C-TNT or {sup 14}C-RDX at which time they were harvested and analyzed for munitions uptake, partitioning, and chemical form of the munition or munition-metabolite. All four of the plant species used in this study accumulated the {sup 14}C-TNT- and RDX-derived label. The carrot, alfalfa, and corn demonstrated a higher percentage of label retained in the roots (62, 73, and 83% respectively). The spinach contained less activity in its root (36%) but also contained the highest TNT specific activity observed (>4600 jig TNT equivalents/g dry wt.). The specific uptake values of RDX for the spinach and alfalfa were comparable to those previously reported for wheat and bean (314 to 590 {mu}g RDX-equivalents/g dry wt. respectively). An exception to this may be the carrot where the specific activity was found to exceed 4200 {mu}g RDX-equivalents/g dry wt. in the shoot. The total accumulation of TNT by the plants ranged from 1.24% for the spinach to 2.34% for the carrot. The RDX plants ranging from 15% for the spinach to 37% for the carrot. There was no identifiable TNT or amino dinitrotoluene (ADNT) isomers present in the plants however, the parent RDX compound was found at significant levels in the shoot of alfalfa (> 1 80 {mu}g/g) and corn (>18 {mu}g/g).

  19. An Open Architecture Framework for Electronic Warfare Based Approach to HLA Federate Development

    Directory of Open Access Journals (Sweden)

    HyunSeo Kang

    2018-01-01

    Full Text Available A variety of electronic warfare models are developed in the Electronic Warfare Research Center. An Open Architecture Framework for Electronic Warfare (OAFEw has been developed for reusability of various object models participating in the electronic warfare simulation and for extensibility of the electronic warfare simulator. OAFEw is a kind of component-based software (SW lifecycle management support framework. This OAFEw is defined by six components and ten rules. The purpose of this study is to construct a Distributed Simulation Interface Model, according to the rules of OAFEw, and create Use Case Model of OAFEw Reference Conceptual Model version 1.0. This is embodied in the OAFEw-FOM (Federate Object Model for High-Level Architecture (HLA based distributed simulation. Therefore, we design and implement EW real-time distributed simulation that can work with a model in C++ and MATLAB API (Application Programming Interface. In addition, OAFEw-FOM, electronic component model, and scenario of the electronic warfare domain were designed through simple scenarios for verification, and real-time distributed simulation between C++ and MATLAB was performed through OAFEw-Distributed Simulation Interface.

  20. Biomaterials for mediation of chemical and biological warfare agents.

    Science.gov (United States)

    Russell, Alan J; Berberich, Jason A; Drevon, Geraldine F; Koepsel, Richard R

    2003-01-01

    Recent events have emphasized the threat from chemical and biological warfare agents. Within the efforts to counter this threat, the biocatalytic destruction and sensing of chemical and biological weapons has become an important area of focus. The specificity and high catalytic rates of biological catalysts make them appropriate for decommissioning nerve agent stockpiles, counteracting nerve agent attacks, and remediation of organophosphate spills. A number of materials have been prepared containing enzymes for the destruction of and protection against organophosphate nerve agents and biological warfare agents. This review discusses the major chemical and biological warfare agents, decontamination methods, and biomaterials that have potential for the preparation of decontamination wipes, gas filters, column packings, protective wear, and self-decontaminating paints and coatings.

  1. Towards a framework for a network warfare capability

    CSIR Research Space (South Africa)

    Veerasamy, N

    2008-07-01

    Full Text Available . These include the legal issues, ethical dilemmas, technical solutions, financial impact and skill/manpower investment. Logical constraints/implications have been grouped together in the discussion that follows. 5.1.1 Legal Ethical Issues As network warfare... but the underlying causes of crime also needs to be understood. Ethics and morals play a significant role in determining the personality traits of an individual. Users will need to balance ethical dilemmas before engaging in offensive network warfare. Computers...

  2. Chemical warfare agents. Classes and targets.

    Science.gov (United States)

    Schwenk, Michael

    2018-09-01

    Synthetic toxic chemicals (toxicants) and biological poisons (toxins) have been developed as chemical warfare agents in the last century. At the time of their initial consideration as chemical weapon, only restricted knowledge existed about their mechanisms of action. There exist two different types of acute toxic action: nonspecific cytotoxic mechanisms with multiple chemo-biological interactions versus specific mechanisms that tend to have just a single or a few target biomolecules. TRPV1- and TRPA-receptors are often involved as chemosensors that induce neurogenic inflammation. The present work briefly surveys classes and toxicologically relevant features of chemical warfare agents and describes mechanisms of toxic action. Copyright © 2017 Elsevier B.V. All rights reserved.

  3. Status of dental health in chemical warfare victims: the case of Isfahan, Iran.

    Science.gov (United States)

    Mottaghi, Ahmad; Hoseinzade, Abolfath; Zamani, Elham; Araghizade, Habib Allah

    2012-01-01

    Little evidence is available regarding the dental health of victims of chemical warfare in Iran. Therefore, in this study, we examined the decayed, missing, and filled teeth index (DMFT), community periodontal index of treatment needs (CPITN), and saliva secretion rate of chemical warfare victims living in the province of Isfahan in Iran. This case-control study was conducted with 300 chemical warfare victims as the treatment group and 300 age-matched individuals without exposure to chemical warfare as the control group. DMFT and CPITN indices and saliva secretion rate were measured and compared between the two groups. Chemical warfare victims had significantly higher scores than the control group for decayed teeth (4.25 ± 3.88 vs 3.52 ± 2.81; P=0.009), missing teeth (8.79 ± 9.3 vs 6.15 ± 8.43; Pwarfare victims was significantly lower than that in the control group (1.71 ± 0.05 vs 3.85 ± 1.95 cc/5 min; PChemical warfare victims have relatively poor dental/oral health. Chemical injury might cause a dysfunction in saliva secretion, with decrease in saliva secretion increasing the risk for tooth decay and periodontal disorders. Further research is required to find out the exact underlying mechanisms and the factors associated with poor dental/oral health in chemical warfare victims.

  4. Disposal of chemical agents and munitions stored at Pine Bluff Arsenal, Pine Bluff, Arkansas. Final phase 1, Environmental report

    Energy Technology Data Exchange (ETDEWEB)

    Ensminger, J.T.; Hillsman, E.L.; Johnson, R.D.; Morrisey, J.A.; Staub, W.P.; Boston, C.R.; Hunsaker, D.B.; Leibsch, E.; Rickert, L.W.; Tolbert, V.R.; Zimmerman, G.P.

    1991-09-01

    The Pine Bluff Arsenal (PBA) near Pine Bluff, Arkansas, is one of eight continental United States (CONUS) Army installations where lethal unitary chemical agents and munitions are stored and where destruction of agents and munitions is proposed under the Chemical Stockpile Disposal Program (CSDP). The chemical agent inventory at PBA consists of approximately 12%, by weight, of the total US stockpile. The destruction of the stockpile is necessary to eliminate the risk to the public from continued storage and to dispose of obsolete and leaking munitions. In 1988 the US Army issued a Final Programmatic Environmental Impact Statement (FPEIS) for the CSDP that identified on-site disposal of agents and munitions as the environmentally preferred alternative (i.e., the alternative with the least potential to cause significant adverse impacts). The purpose of this report is to examine the proposed implementation of on-site disposal at PBA in light of more recent and more detailed data than those on which the FPEIS is based. New population data were used to compute fatalities using the same computation methods and values for all other parameters as in the FPEIS. Results indicate that all alternatives are indistinguishable when the potential health impacts to the PBA community are considered. However, risks from on-site disposal are in all cases equal to or less than risks from other alternatives. Furthermore, no unique resources with the potential to prevent or delay implementation of on-site disposal at PBA have been identified.

  5. Safety and vulnerability simulation of munitions; Modelisation du comportement de munitions en securite et vulnerabilite

    Energy Technology Data Exchange (ETDEWEB)

    Desailly, D.; Briquet, B.; Brunet, P.; Guegant, Y.; Houdusse, D.; Prost, M. [Groupe SNPE Propulsion/ Centre de Recherches du Boucher, 91 - Vert le Petit (France)

    2002-09-01

    Vulnerability of new weapon systems to accidental and hostile environments is a major concern for military operations and many research programs have been so investigated of SNPE Propulsion. Before they were accepted as being safe and suitable for introduction into military inventories systems underwent a wide range of expensive type qualification trials. There was a need therefore, to develop a greater understanding of the reaction mechanisms that affect the behaviour of confined energetic materials when subjected to external stimuli and computer models to control the resulting hazard. As part of this program SNPE Propulsion has developed a method for modelling Cook-off response in order to master the design of insensitive munitions (IM). The behavior of energetic materials when they are submitted to a thermal threat is complex and follows two different time scales: thermochemical processes, counted in minutes even hours whereas pyrotechnic reaction may require a few microseconds. It was shown that the reaction level is ruled by the competition between pressure generated from the cook-off reaction and stress release resulting from break-up confinement. After self-ignition phenomenon and under some confinement and thermal conditions burning can accelerate to deflagration and lead to a deflagration to detonation transition (DDT) event. The method requires'modular tools describing each physical phenomenon. Works have been first focused on the development of experimental facilities to characterise thermal chemical properties and reactivity of thermally damaged energetic material. Consequently the first part of the model describing self-heating and pyrolysis processes has been implemented in an implicit solver. Simulations have shown quite accurate predictions (ignition temperature, time to event) and proved the effectiveness of this approach. Recent developments are.thus concentrated on the numerical modelling of the reaction violence level prediction hence a

  6. Information Warfare in the Cyber Domain

    National Research Council Canada - National Science Library

    Takemoto, Glenn

    2001-01-01

    ...). This paper lays a foundation by defining the terminology associated with Information Warfare in the Cyber Domain, reviews the threat and illustrates the vulnerabilities of our information systems...

  7. Hybrid warfare of the USA in South America

    Directory of Open Access Journals (Sweden)

    A. V. Budaev

    2015-01-01

    Full Text Available Washington’s hybrid warfare in Latin American region differs by its inventive and sophisticated methods and in fact represents a complex and multidimensional phenomenon including symbiosis of the “soft” and “hard” power as well as their combination in the form of the “smart power”. The increasing importance of hybrid warfare technologies in the US foreign policy in Latin America predetermines the necessity of thorough studies and analysis of this phenomenon for providing Russian interests.

  8. Cost Of Compliance On Munitions Consolidation From Lualualei To West Loch

    Science.gov (United States)

    2017-12-01

    well as the opportunity to drastically reduce the transportation of ordnance to and from the Lualualei Annex through local community roads and areas...single road and the availability of CULT trucks and/or drivers that could impede an expeditious response in a contingency operation. This project...to distribute munitions to the fleet. This consolidation plan will also reduce the infrastructure costs for ordnance storage, maintenance , and

  9. Roots of Russian Irregular Warfare

    Science.gov (United States)

    2016-12-01

    PAGE INTENTIONALLY LEFT BLANK xiii ACKNOWLEDGMENTS Crissy, your encouragement throughout my career and especially during this project has been...all of the Russian disinformation techniques in Ukraine came directly “from Soviet toolkits .” Maria Snegovaya, “Putin’s Information Warfare In

  10. Biological warfare, bioterrorism, and biocrime

    NARCIS (Netherlands)

    Jansen, H. J.; Breeveld, F. J.; Stijnis, C.; Grobusch, M. P.

    2014-01-01

    Biological weapons achieve their intended target effects through the infectivity of disease-causing infectious agents. The ability to use biological agents in warfare is prohibited by the Biological and Toxin Weapon Convention. Bioterrorism is defined as the deliberate release of viruses, bacteria

  11. Enzymatic Decontamination of Chemical Warfare Agents

    National Research Council Canada - National Science Library

    Raushel, Frank

    2000-01-01

    The primary objective of this research program is the development of a versatile enzyme-based system that is fully optimized for the decontamination, destruction, and detection of know chemical warfare agents...

  12. Dissolution of NTO, DNAN, and Insensitive Munitions Formulations and Their Fates in Soils

    Science.gov (United States)

    2014-09-01

    plastic bags to save the (a) (b) ERDC/CRREL TR-14-23 10 sample even if the bottle should break from ice formation. During each collection, we...Bacillus sp. Biodegradation 23 (2): 287–295. Prak, D.L., and D. O’Sullivan. 2012. Photochemical Transformation of Munitions Constituents in Marine

  13. SiGe-based re-engineering of electronic warfare subsystems

    CERN Document Server

    Lambrechts, Wynand

    2017-01-01

    This book equips readers with a thorough understanding of the applicability of new-generation silicon-germanium (SiGe) electronic subsystems for the military purposes of electronic warfare and defensive countermeasures. The theoretical and technical background is extensively explained and all aspects of the integration of SiGe as an enabling technology for maritime, land, and airborne (including space) electronic warfare are addressed, including research, design, development, and implementation. The coverage is supported by mathematical derivations, informative illustrations, practical examples, and case studies. While SiGe technology provides speed, performance, and price advantages in many markets, sharing of information on its use in electronic warfare systems has to date been limited, especially in developing nations. This book will therefore be warmly welcomed as an engineering guideline that focuses especially on the speed and reliability of current-generation SiGe circuits and highlights emerging innov...

  14. The Utility of Freedom: A Principal-Agent Model for Unconventional Warfare

    Science.gov (United States)

    2011-06-01

    Lanchester Model of Guerrilla Warfare,‖ Operations Research 10, no. 6 (December 1962): 818–827; William A. Niskanen, ―Review: The Economics of Insurgency...http://galenet.galegroup.com/servlet/DDRS?locID=navalps. Deitchman, S. J. ―A Lanchester Model of Guerrilla Warfare.‖ Operations Research 10, no

  15. Skeletal evidence for Inca warfare from the Cuzco region of Peru.

    Science.gov (United States)

    Andrushko, Valerie A; Torres, Elva C

    2011-11-01

    This article addresses the bioarchaeological evidence for Inca warfare through an analysis of 454 adult skeletons from 11 sites in the Inca capital region of Cuzco, Peru. These 11 sites span almost 1000 years (AD 600-1532), which allows for a comparison of the evidence for warfare before the Inca came to power (Middle Horizon AD 600-1000), during the time of Inca ascendency in the Late Intermediate Period (AD 1000-1400), and after the Inca came to power and expanded throughout the Cuzco region and beyond (Inca Imperial Period, AD 1400-1532). The results indicate that 100 of 454 adults (22.0%) showed evidence of cranial trauma. Of these, 23 individuals had major cranial injuries suggestive of warfare, consisting of large, complete, and/or perimortem fractures. There was scant evidence for major injuries during the Middle Horizon (2.8%, 1/36) and Late Intermediate Period (2.5%, 5/199), suggesting that warfare was not prevalent in the Cuzco region before and during the Inca rise to power. Only in the Inca Imperial Period was there a significant rise in major injuries suggestive of warfare (7.8%, 17/219). Despite the significant increase in Inca times, the evidence for major cranial injuries was only sporadically distributed at Cuzco periphery sites and was entirely absent at Cuzco core sites. These findings suggest that while the Inca used warfare as a mechanism for expansion in the Cuzco region, it was only one part of a complex expansion strategy that included economic, political, and ideological means to gain and maintain control. Copyright © 2011 Wiley-Liss, Inc.

  16. Structuring Naval Special Warfare junior officer professional military education

    OpenAIRE

    Donovan, Thomas A.

    2007-01-01

    Naval Special Warfare does not currently have a designated career path for an officer that requires professional military education (PME) for SEAL junior officers after the rank of Ensign (O-1) and before the rank of Lieutenant Commander (O-4). There currently is interest in this subject matter at the Naval Special Warfare Command and Center. SEAL officers increasingly hold key leadership positions and influence critical decisions in the execution of national strategy. This growing respo...

  17. Understanding the elementary considerations in a network warfare environment: an introductory framework

    CSIR Research Space (South Africa)

    Veerasamy, N

    2008-07-01

    Full Text Available . It seeks to offer a better introductory understanding to the field of network warfare. This paper addresses the requirements for a network warfare capability and will look at the high-level approach, constraints, focus areas, levels, techniques...

  18. The Physics of Warfare

    Science.gov (United States)

    Giordano, Gerardo

    2015-01-01

    Recently, I was tasked with the creation and execution of a new themed general education physics class called The Physics of Warfare. In the past, I had used the theme of a class, such as the physics of sports medicine, as a way to create homework and in-class activities, generate discussions, and provide an application to demonstrate that physics…

  19. Chemical warfare agents identification by thermal neutron detection

    International Nuclear Information System (INIS)

    Liu Boxue; Ai Xianyun; Tan Daoyuan; Zhang Dianqin

    2000-01-01

    The hydrogen concentration determination by thermal neutron detection is a non-destructive, fast and effective method to identify chemical warfare agents and TNT that contain different hydrogen fraction. When an isotropic neutron source is used to irradiate chemical ammunition, hydrogen atoms of the agent inside shell act as a moderator and slow down neutrons. The number of induced thermal neutrons depends mainly upon hydrogen content of the agent. Therefore measurement of thermal neutron influence can be used to determine hydrogen atom concentration, thereby to determine the chemical warfare agents. Under a certain geometry three calibration curves of count rate against hydrogen concentration were measured. According to the calibration curves, response of a chemical agent or TNT could be calculated. Differences of count rate among chemical agents and TNT for each kind of shells is greater than five times of standard deviations of count rate for any agent, so chemical agents or TNT could be identified correctly. Meanwhile, blast tube or liquid level of chemical warfare agent could affect the response of thermal neutron count rate, and thereby the result of identification. (author)

  20. Quality of Life in Iranian Chemical Warfare Veteran's.

    Science.gov (United States)

    Ebadi, Abbas; Moradian, Tayeb; Mollahadi, Mohsen; Saeed, Yaser; Refahi, Ali Akbar

    2014-05-01

    Mustard gas has different effects on different body systems such as respiratory tract, blood, gastrointestinal, skin, eye, endocrine and peripheral nervous system. The purpose of this study was to determine the quality of life in chemical warfare veterans due to sulfur mustard exposure. In a cross-sectional and analytic study, 242 patients who had a chemical injury during the Iran-Iraq war (1980-1983) and their lung damage was proven were investigated in our study. The quality of life was measured in these patients using an extensively validated Iranian version of SF-36. The mean age of veterans was 44.12 ± 4.9 ranging from 22 to 62 years. Our results showed that chemical warfare had a decreased quality of life in all subscales of the SF-36. The lowest scores in SF-36 subscales were related to role physical and general health. The data also showed a significant relationship between the number of organs involved and the quality of life in these patients (P chemical warfare survivors suffering from late complications have a low health related quality of life.

  1. Technological advancements for the detection of and protection against biological and chemical warfare agents.

    Science.gov (United States)

    Eubanks, Lisa M; Dickerson, Tobin J; Janda, Kim D

    2007-03-01

    There is a growing need for technological advancements to combat agents of chemical and biological warfare, particularly in the context of the deliberate use of a chemical and/or biological warfare agent by a terrorist organization. In this tutorial review, we describe methods that have been developed both for the specific detection of biological and chemical warfare agents in a field setting, as well as potential therapeutic approaches for treating exposure to these toxic species. In particular, nerve agents are described as a typical chemical warfare agent, and the two potent biothreat agents, anthrax and botulinum neurotoxin, are used as illustrative examples of potent weapons for which countermeasures are urgently needed.

  2. The Anatomy of Counterinsurgency Warfare

    DEFF Research Database (Denmark)

    Mouritsen, Lars; Pedersen, Kenneth; Thruelsen, Peter Dahl

    Since the beginning of the new millennium, the West has been increasingly involved in a tiresome and rather particular type of conflict: insurgency warfare. The bloody and shocking terrorist attacks on New York and Washington in September 2001 marked the beginning of a new era, and the introducti...

  3. Strategic Analysis of Irregular Warfare

    Science.gov (United States)

    2010-03-01

    the same mathematical equations used by Lanchester .10 Irregular Warfare Theory and Doctrine It is time to develop new analytical methods and models...basis on which to build, similar to what Lanchester provided almost 100 years ago. Figure 9 portrays both Lanchester’s approach and an irregular 17

  4. Disposal of chemical agents and munitions stored at Umatilla Depot Activity, Hermiston, Oregon. Final Phase 1 environmental report

    Energy Technology Data Exchange (ETDEWEB)

    Zimmerman, G.P.; Hillsman, E.L.; Johnson, R.O.; Miller, R.L.; Patton, T.G.; Schoepfle, G.M.; Tolbert, V.R.; Feldman, D.L.; Hunsaker, D.B. Jr.; Kroodsma, R.L.; Morrissey, J.; Rickert, L.W.; Staub, W.P.; West, D.C.

    1993-02-01

    The Umatilla Depot Activity (UMDA) near Hermiston, Oregon, is one of eight US Army installations in the continental United States where lethal unitary chemical agents and munitions are stored, and where destruction of agents and munitions is proposed under the Chemical Stockpile Disposal Program (CSDP). The chemical agent inventory at UMDA consists of 11.6%, by weight, of the total US stockpile. The destruction of the stockpile is necessary to eliminate the risk to the public from continued storage and to dispose of obsolete and leaking munitions. In 1988 the US Army issued a Final Programmatic Environmental Impact Statement (FPEIS) for the CSDP that identified on-site disposal of agents and munitions as the environmentally preferred alternative (i.e., the alternative with the least potential to cause significant adverse impacts), using a method based on five measures of risk for potential human health and ecosystem/environmental effects; the effectiveness and adequacy of emergency preparedness capabilities also played a key role in the FPEIS selection methodology. In some instances, the FPEIS included generic data and assumptions that were developed to allow a consistent comparison of potential impacts among programmatic alternatives and did not include detailed conditions at each of the eight installations. The purpose of this Phase 1 report is to examine the proposed implementation of on-site disposal at UMDA in light of more recent and more detailed data than those included in the FPEIS. Specifically, this Phase 1 report is intended to either confirm or reject the validity of on-site disposal for the UMDA stockpile. Using the same computation methods as in the FPEIS, new population data were used to compute potential fatalities from hypothetical disposal accidents. Results indicate that onsite disposal is clearly preferable to either continued storage at UMDA or transportation of the UMDA stockpile to another depot for disposal.

  5. Establishing Cyber Warfare Doctrine

    Directory of Open Access Journals (Sweden)

    Andrew M. Colarik

    2012-01-01

    Full Text Available Over the past several decades, advances in technology have transformed communications and the ability to acquire, disseminate, and utilize information in a range of environments. Modern societies and their respective militaries have taken advantage of a robust information space through network-centric systems. Because military and commercial operations have increasingly converged, communication and information infrastructures are now high-priority military objectives in times of war. This article examines the theoretical underpinning of current cyber warfare research, what we have learned so far about its application, and some of the emerging themes to be considered; it also postulates the development of a (national cyber warfare doctrine (CWD. An endeavor of this scale requires lots of considerations and preparation for its development if it is to be cooperatively embraced. This article considers why information technology systems and their supporting infrastructures should be considered legitimate military targets in conflicts, and offers several events that support this supposition. In addition, it identifies the various forms of doctrine that will become the basis for developing a CWD, discusses a CWD's possible components, and proposes a national collaborative and discussion framework for obtaining a nation's stakeholder buy-in for such an endeavor.

  6. Development of the HS-SPME-GC-MS/MS method for analysis of chemical warfare agent and their degradation products in environmental samples.

    Science.gov (United States)

    Nawała, Jakub; Czupryński, Krzysztof; Popiel, Stanisław; Dziedzic, Daniel; Bełdowski, Jacek

    2016-08-24

    After World War II approximately 50,000 tons of chemical weapons were dumped in the Baltic Sea by the Soviet Union under the provisions of the Potsdam Conference on Disarmament. These dumped chemical warfare agents still possess a major threat to the marine environment and to human life. Therefore, continue monitoring of these munitions is essential. In this work, we present the application of new solid phase microextraction fibers in analysis of chemical warfare agents and their degradation products. It can be concluded that the best fiber for analysis of sulfur mustard and its degradation products is butyl acrylate (BA), whereas for analysis of organoarsenic compounds and chloroacetophenone, the best fiber is a co-polymer of methyl acrylate and methyl methacrylate (MA/MMA). In order to achieve the lowest LOD and LOQ the samples should be divided into two subsamples. One of them should be analyzed using a BA fiber, and the second one using a MA/MMA fiber. When the fast analysis is required, the microextraction should be performed by use of a butyl acrylate fiber because the extraction efficiency of organoarsenic compounds for this fiber is acceptable. Next, we have elaborated of the HS-SPME-GC-MS/MS method for analysis of CWA degradation products in environmental samples using laboratory obtained fibers The analytical method for analysis of organosulfur and organoarsenic compounds was optimized and validated. The LOD's for all target chemicals were between 0.03 and 0.65 ppb. Then, the analytical method developed by us, was used for the analysis of sediment and pore water samples from the Baltic Sea. During these studies, 80 samples were analyzed. It was found that 25 sediments and 5 pore water samples contained CWA degradation products such as 1,4-dithiane, 1,4-oxathiane or triphenylarsine, the latter being a component of arsine oil. The obtained data is evidence that the CWAs present in the Baltic Sea have leaked into the general marine environment. Copyright

  7. Antifragile Electronic Warfare

    OpenAIRE

    Lichtman, Marc

    2014-01-01

    This letter introduces the concept of antifragile electronic warfare (EW), which we define as the ability to allow a communications link to improve performance due to the presence of a jammer. This concept should not be confused with jamming countermeasures (a.k.a. anti-jamming or electronic protection). Rather, antifragile EW can be thought of as the next step beyond simply avoiding or mitigating jamming. After introducing the concept we narrow down the subset of jammers this concept can be ...

  8. Transport and Reactivity of Decontaminants to Provide Hazard Mitigation of Chemical Warfare Agents from Materials

    Science.gov (United States)

    2016-06-01

    2013 4. TITLE AND SUBTITLE Transport and Reactivity of Decontaminants to Provide Hazard Mitigation of Chemical Warfare Agents from Materials 5a...directions for future decontamination formulation approaches. 15. SUBJECT TERMS GD HD Decontamination Hazard mitigation VX Chemical warfare agent... DECONTAMINANTS TO PROVIDE HAZARD MITIGATION OF CHEMICAL WARFARE AGENTS FROM MATERIALS 1. INTRODUCTION Decontamination of materials is the

  9. Strategy in the Robotic Age: A Case for Autonomous Warfare

    Science.gov (United States)

    2014-09-01

    enabling technology that augments human performance, such as exoskeleton suits, and other complementary fields that make robotics function...philosophy of maneuver warfare with new technologies from the Robotic Age, such as unmanned systems and exoskeleton suits, to present a new warfighting...and Brimley, “20YY,” 12. 49 the exoskeleton suit, but rather that the full benefit of autonomous warfare will be achieved by leveraging mass and

  10. European Curricula, Xenophobia and Warfare.

    Science.gov (United States)

    Coulby, David

    1997-01-01

    Examines school and university curricula in Europe and the extent of their influence on xenophobia. Considers the pluralistic nature of the European population. Discusses the role of curriculum selection and language policy in state efforts to promote nationalism. Assesses the role of curricular systems in the actual encouragement of warfare,…

  11. Shadow Wars: An Analysis of Counterinsurgency Warfare

    National Research Council Canada - National Science Library

    Dogan, Osman

    2005-01-01

    ... of the current strategic approaches to counterinsurgency warfare. Toward this end, a systems model approach, which views insurgent organizations as open systems, is adapted to the insurgent environment...

  12. Stuxnet and Cyber-Warfare (1/2)

    CERN Multimedia

    CERN. Geneva

    2016-01-01

    The first part of the lecture is devoted to the description of the Stuxnet worm, the first cyber-weapon whose existence has been made public, discovered in 2010 and targeting a specific industrial control system; the worm is responsible for the damaging of many centrifuges at an uranium enrichment facility, with the goal of sabotaging Iran's nuclear program. In the second part, the main features of cyber-warfare in conflict and pre-conflict activities will be discussed and compared to the conventional warfare domains, with also a general view at the international political debate on this topic. Check the http://pugwash.org web site, an organisation that seeks a world free of nuclear weapons and other weapons of mass destruction.   NB! All Academic Training lectures are recorded and are publicly available. There is no live webcast.

  13. Gas Warfare in World War I.

    Science.gov (United States)

    Flintham, A. J.

    1978-01-01

    The effectiveness of gas warfare during World War I was increased by the lack of a basic understanding of the behavior of gases on the part of the soldiers. This was a result of deficiencies in science education. (BB)

  14. A Survey of Game Theoretic Approaches to Modelling Decision-Making in Information Warfare Scenarios

    Directory of Open Access Journals (Sweden)

    Kathryn Merrick

    2016-07-01

    Full Text Available Our increasing dependence on information technologies and autonomous systems has escalated international concern for information- and cyber-security in the face of politically, socially and religiously motivated cyber-attacks. Information warfare tactics that interfere with the flow of information can challenge the survival of individuals and groups. It is increasingly important that both humans and machines can make decisions that ensure the trustworthiness of information, communication and autonomous systems. Subsequently, an important research direction is concerned with modelling decision-making processes. One approach to this involves modelling decision-making scenarios as games using game theory. This paper presents a survey of information warfare literature, with the purpose of identifying games that model different types of information warfare operations. Our contribution is a systematic identification and classification of information warfare games, as a basis for modelling decision-making by humans and machines in such scenarios. We also present a taxonomy of games that map to information warfare and cyber crime problems as a precursor to future research on decision-making in such scenarios. We identify and discuss open research questions including the role of behavioural game theory in modelling human decision making and the role of machine decision-making in information warfare scenarios.

  15. Mountain Warfare: The Need for Specialist Training

    National Research Council Canada - National Science Library

    Malik, Muhammad

    2003-01-01

    This study focuses on the need for specialist training for mountain warfare. It analyzes the special characteristics of mountain and high altitude terrain which affect conduct of military operations...

  16. Laser formed intentional firearm microstamping technology: counterinsurgency intelligence gathering tool

    Science.gov (United States)

    Lizotte, Todd E.; Ohar, Orest P.

    2009-09-01

    Warfare relies on effective, accurate and timely intelligence an especially critical task when conducting a counterinsurgency operation [1]. Simply stated counterinsurgency is an intelligence war. Both insurgents and counterinsurgents need effective intelligence capabilities to be successful. Insurgents and counterinsurgents therefore attempt to create and maintain intelligence networks and fight continuously to neutralize each other's intelligence capabilities [1][2]. In such an environment it is obviously an advantage to target or proactively create opportunities to track and map an insurgent movement. Quickly identifying insurgency intelligence assets (Infiltrators) within a host government's infrastructure is the goal. Infiltrators can occupy various areas of government such as security personnel, national police force, government offices or military units. Intentional Firearm Microstamping offers such opportunities when implemented into firearms. Outfitted within firearms purchased and distributed to the host nation's security forces (civilian and military), Intentional Firearm Microstamping (IFM) marks bullet cartridge casings with codes as they are fired from the firearm. IFM is incorporated onto optimum surfaces with the firearm mechanism. The intentional microstamp tooling marks can take the form of alphanumeric codes or encoded geometric codes that identify the firearm. As the firearm is discharged the intentional tooling marks transfer a code to the cartridge casing which is ejected out of the firearm. When recovered at the scene of a firefight or engagement, the technology will provide forensic intelligence allowing the mapping and tracking of small arms traffic patterns within the host nation or identify insurgency force strength and pinpoint firearm sources, such as corrupt/rogue military units or police force. Intentional Firearm Microstamping is a passive mechanical trace technology that can be outfitted or retrofitted to semiautomatic handguns and

  17. Metal organic frameworks for the catalytic detoxification of chemical warfare nerve agents

    Science.gov (United States)

    Hupp, Joseph T.; Farha, Omar K.; Katz, Michael J.; Mondloch, Joseph E.

    2017-04-18

    A method of using a metal organic framework (MOF) comprising a metal ion and an at least bidendate organic ligand to catalytically detoxify chemical warfare nerve agents including exposing the metal-organic-framework (MOF) to the chemical warfare nerve agent and catalytically decomposing the nerve agent with the MOF.

  18. The Manipulation of Human Behavior in Guerrilla Warfare: Can It Enhance U.S. Army Special Forces Guerrilla Warfare Operations?

    National Research Council Canada - National Science Library

    Harris, William

    1997-01-01

    .... Proper integration of psychological communications to manipulate behavior in guerrilla warfare may facilitate the recruiting1 motivation, morale, sustainment and popular support for a guerrilla movement and its cause...

  19. Stuxnet and Cyber-Warfare (2/2)

    CERN Multimedia

    CERN. Geneva

    2016-01-01

    The first part of the lecture is devoted to the description of the Stuxnet worm, the first cyber-weapon whose existence has been made public, discovered in 2010 and targeting a specific industrial control system; the worm is responsible for the damaging of many centrifuges at an uranium enrichment facility, with the goal of sabotaging Iran's nuclear program. In the second part, the main features of cyber-warfare in conflict and pre-conflict activities will be discussed and compared to the conventional warfare domains, with also a general view at the international political debate on this topic.   Check the http://pugwash.org web site, an organisation that seeks a world free of nuclear weapons and other weapons of mass destruction. The lecturer invites comments via email to Gian.Piero.Siroli@cern.ch NB! All Academic Training lectures are recorded and are publicly available. There is no live webcast.

  20. Oxidative decontamination of chemical and biological warfare agents using L-Gel.

    Science.gov (United States)

    Raber, Ellen; McGuire, Raymond

    2002-08-05

    A decontamination method has been developed using a single reagent that is effective both against chemical warfare (CW) and biological warfare (BW) agents. The new reagent, "L-Gel", consists of an aqueous solution of a mild commercial oxidizer, Oxone, together with a commercial fumed silica gelling agent, Cab-O-Sil EH-5. L-Gel is non-toxic, environmentally friendly, relatively non-corrosive, maximizes contact time because of its thixotropic nature, clings to walls and ceilings, and does not harm carpets or painted surfaces. The new reagent also addresses the most demanding requirements for decontamination in the civilian sector, including availability, low maintenance, ease of application and deployment by a variety of dispersal mechanisms, minimal training and acceptable expense. Experiments to test the effectiveness of L-Gel were conducted at Lawrence Livermore National Laboratory and independently at four other locations. L-Gel was tested against all classes of chemical warfare agents and against various biological warfare agent surrogates, including spore-forming bacteria and non-virulent strains of real biological agents. Testing showed that L-Gel is as effective against chemical agents and biological materials, including spores, as the best military decontaminants.

  1. Intelligently interactive combat simulation

    Science.gov (United States)

    Fogel, Lawrence J.; Porto, Vincent W.; Alexander, Steven M.

    2001-09-01

    To be fully effective, combat simulation must include an intelligently interactive enemy... one that can be calibrated. But human operated combat simulations are uncalibratable, for we learn during the engagement, there's no average enemy, and we cannot replicate their culture/personality. Rule-based combat simulations (expert systems) are not interactive. They do not take advantage of unexpected mistakes, learn, innovate, and reflect the changing mission/situation. And it is presumed that the enemy does not have a copy of the rules, that the available experts are good enough, that they know why they did what they did, that their combat experience provides a sufficient sample and that we know how to combine the rules offered by differing experts. Indeed, expert systems become increasingly complex, costly to develop, and brittle. They have face validity but may be misleading. In contrast, intelligently interactive combat simulation is purpose- driven. Each player is given a well-defined mission, reference to the available weapons/platforms, their dynamics, and the sensed environment. Optimal tactics are discovered online and in real-time by simulating phenotypic evolution in fast time. The initial behaviors are generated randomly or include hints. The process then learns without instruction. The Valuated State Space Approach provides a convenient way to represent any purpose/mission. Evolutionary programming searches the domain of possible tactics in a highly efficient manner. Coupled together, these provide a basis for cruise missile mission planning, and for driving tank warfare simulation. This approach is now being explored to benefit Air Force simulations by a shell that can enhance the original simulation.

  2. 75 FR 6642 - Notice of Proposed Information Collection; Naval Special Warfare Recruiting Directorate

    Science.gov (United States)

    2010-02-10

    ... Information Collection; Naval Special Warfare Recruiting Directorate AGENCY: Department of the Navy, DoD. ACTION: Notice. SUMMARY: The Naval Special Warfare (NSW) Recruiting Directorate announces the submission... any of the following methods: Federal eRulemaking Portal: http://www.regulations.gov . Follow the...

  3. On Cyber Warfare Command and Control Systems

    National Research Council Canada - National Science Library

    Howes, Norman R; Mezzino, Michael; Sarkesain, John

    2004-01-01

    .... Cyber warfare then becomes a one-sided battle where the attacker makes all the strikes and the target of the attack responds so slowly that the attacker usually gets away without being identified...

  4. The Third World War? In The Cyberspace. Cyber Warfare in the Middle East.

    Directory of Open Access Journals (Sweden)

    Martina

    2014-06-01

    Full Text Available This article aims to provide a brief and comprehensive introduction to the issue of cyber warfare and to display the recent development in this area. Geographically, it focuses on the Middle East region, since the vast majority of the most important recent cyber attacks appeared just in there or were connected to it. The first part of the article tries to define the key notion of cyber warfare, compares it to the standard warfare and presents different types of cyber weapons that are known today. The second part points out examples of the most striking recent cyber attacks and uses them as evidences to demonstrate today's importance and dissemination of cyber warfare. Finally, the article sums up pros and cons of the cyber weapons and, in view of these, predicts a significant increase in their use in any future war conflicts.

  5. Hybrid Maritime Warfare

    DEFF Research Database (Denmark)

    Schaub Jr, Gary John; Murphy, Martin; Hoffman, Frank

    2017-01-01

    Russia’s use of hybrid warfare techniques has raised concerns about the security of the Baltic States. Gary Schaub, Jr, Martin Murphy and Frank G Hoffman recommend a series of measures to augment NATO’s Readiness Action Plan in the Baltic region, including increasing the breadth and depth of naval...... exercises, and improving maritime domain awareness through cooperative programmes. They also suggest unilateral and cooperative measures to develop a sound strategic communications strategy to counter Moscow’s information operations, reduce dependence on Russian energy supplies and build the resilience...

  6. Toward Operational Art in Special Warfare

    Science.gov (United States)

    2016-02-23

    combatant commanders develop special warfare cam- paign options for their theaters that can be integral parts of the national approach. Getting buy -in at...the resistance spawning franchise operations at home or abroad? – Is the resistance attracting funding or other forms of assistance (indigenous

  7. Mass spectrometry in identification of ecotoxicants including chemical and biological warfare agents

    International Nuclear Information System (INIS)

    Lebedev, Albert T.

    2005-01-01

    Mass spectrometry is a unique tool to detect and identify trace levels of organic and bioorganic compounds as well as microorganisms in the environment. The range of potential chemical warfare (CW) and biological warfare (BW) agents is very broad. An important advantage of mass spectrometry over other techniques involves potential for full spectrum detection of chemical and biological agents including mid-spectrum materials (i.e. bioactive peptides, toxins, etc.) for which biological approaches are inadequate. Being very fast (seconds and minutes), extremely sensitive (zeptomoles 10 -21 ), and informative (detailed qualitative and quantitative composition of mixtures containing hundreds of chemicals), mass spectrometry is a principal analytical tool at the sites of destruction of CW. Due to its unique features, mass spectrometry is applied not only for the detection of CW agents, but for the analysis of products of metabolism and degradation of these agents in organisms or environment as well. The present paper deals with some examples of successful application of mass spectrometry for the analyses of ecotoxicants, chemical warfare agents, explosives, and microorganisms including biology warfare agents

  8. Prehistoric ceremonial warfare: beginning of institutionalized violence

    Czech Academy of Sciences Publication Activity Database

    Turek, Jan

    2017-01-01

    Roč. 13, č. 3 (2017), s. 535-548 ISSN 1555-8622 Institutional support: RVO:67985912 Keywords : human aggression * ceremonial warfare * archery symbolism * Neolithic * Chalcolithic * Europe Subject RIV: AC - Archeology, Anthropology, Ethnology OBOR OECD: Archaeology

  9. Theory of information warfare: basic framework, methodology and conceptual apparatus

    Directory of Open Access Journals (Sweden)

    Олександр Васильович Курбан

    2015-11-01

    Full Text Available It is conducted a comprehensive theoretical study and determine the basic provisions of the modern theory of information warfare in on-line social networks. Three basic blocks, which systematized the theoretical and methodological basis of the topic, are established. There are information and psychological war, social off-line and on-line network. According to the three blocks, theoretical concepts are defined and methodological substantiation of information processes within the information warfare in the social on-line networks is formed

  10. Environmental Assessment: Demolition of Munitions Storage Area Facilities at Ellsworth AFB, South Dakota

    Science.gov (United States)

    2009-11-01

    CEQ Council on Environmental Quality CFR Code of Federal Regulations CO Carbon Monoxide cpm Counts per Minute CRM Cultural Resource Manager...newspaper advertisement in the Rapid City Journal announcing the availability of the Draft EA for a 30-day public and agency review to facilitate...Ellsworth Air Force Base Munitions Storage Area Environmental Assessment Page 2-5 public involvement in the project. This advertisement was published one

  11. Antidotes and treatments for chemical warfare/terrorism agents: an evidence-based review.

    Science.gov (United States)

    Rodgers, G C; Condurache, C T

    2010-09-01

    This article reviews the evidence supporting the efficacy of antidotes used or recommended for the potential chemical warfare agents of most concern. Chemical warfare agents considered include cyanide, vesicants, pulmonary irritants such as chlorine and phosgene, and nerve agents. The strength of evidence for most antidotes is weak, highlighting the need for additional research in this area.

  12. Technology Transition for Hybrid Warfare

    Science.gov (United States)

    2010-02-16

    and Iraq. At the same time, the science and technology base must provide the disruptive technologies to defeat future conventional enemies. This... disruptive technologies will be needed to retain long-term technological superiority in conventional warfare. Incremental improvement is the most...technology to be missed. Disruptive technologies are the second type of technological change and involve revolutionary concepts involving large technological

  13. Warfare and the Teaching of History.

    Science.gov (United States)

    Salevouris, Michael J.

    1989-01-01

    Maintains that history teachers must challenge simplistic romantic notions about war. Proposes two approaches to teaching about war: the use of personal war narratives; and examining the relationship between warfare and society. Discusses literature related to these approaches. Contends that only through realistic assessments of war can peace be…

  14. Blaptica dubia as sentinels for exposure to chemical warfare agents - a pilot study.

    Science.gov (United States)

    Worek, Franz; Seeger, Thomas; Neumaier, Katharina; Wille, Timo; Thiermann, Horst

    2016-11-16

    The increased interest of terrorist groups in toxic chemicals and chemical warfare agents presents a continuing threat to our societies. Early warning and detection is a key component for effective countermeasures against such deadly agents. Presently available and near term solutions have a number of major drawbacks, e.g. lack of automated, remote warning and detection of primarily low volatile chemical warfare agents. An alternative approach is the use of animals as sentinels for exposure to toxic chemicals. To overcome disadvantages of vertebrates the present pilot study was initiated to investigate the suitability of South American cockroaches (Blaptica dubia) as warning system for exposure to chemical warfare nerve and blister agents. Initial in vitro experiments with nerve agents showed an increasing inhibitory potency in the order tabun - cyclosarin - sarin - soman - VX of cockroach cholinesterase. Exposure of cockroaches to chemical warfare agents resulted in clearly visible and reproducible reactions, the onset being dependent on the agent and dose. With nerve agents the onset was related to the volatility of the agents. The blister agent lewisite induced signs largely comparable to those of nerve agents while sulfur mustard exposed animals exhibited a different sequence of events. In conclusion, this first pilot study indicates that Blaptica dubia could serve as a warning system to exposure of chemical warfare agents. A cockroach-based system will not detect or identify a particular chemical warfare agent but could trigger further actions, e.g. specific detection and increased protective status. By designing appropriate boxes with (IR) motion sensors and remote control (IR) camera automated off-site warning systems could be realized. Copyright © 2016 Elsevier Ireland Ltd. All rights reserved.

  15. Munitions and Explosives of Concern Survey Methodology and In-field Testing for Wind Energy Areas on the Atlantic Outer Continental Shelf

    Science.gov (United States)

    DuVal, C.; Carton, G.; Trembanis, A. C.; Edwards, M.; Miller, J. K.

    2017-12-01

    Munitions and explosives of concern (MEC) are present in U.S. waters as a result of past and ongoing live-fire testing and training, combat operations, and sea disposal. To identify MEC that may pose a risk to human safety during development of offshore wind facilities on the Atlantic Outer Continental Shelf (OCS), the Bureau of Ocean Energy Management (BOEM) is preparing to develop guidance on risk analysis and selection processes for methods and technologies to identify MEC in Wind Energy Areas (WEA). This study developed a process for selecting appropriate technologies and methodologies for MEC detection using a synthesis of historical research, physical site characterization, remote sensing technology review, and in-field trials. Personnel were tasked with seeding a portion of the Delaware WEA with munitions surrogates, while a second group of researchers not privy to the surrogate locations tested and optimized the selected methodology to find and identify the placed targets. This in-field trial, conducted in July 2016, emphasized the use of multiple sensors for MEC detection, and led to further guidance for future MEC detection efforts on the Atlantic OCS. An April 2017 follow on study determined the fate of the munitions surrogates after the Atlantic storm season had passed. Using regional hydrodynamic models and incorporating the recommendations from the 2016 field trial, the follow on study examined the fate of the MEC and compared the findings to existing research on munitions mobility, as well as models developed as part of the Office of Naval Research Mine-Burial Program. Focus was given to characterizing the influence of sediment type on surrogate munitions behavior and the influence of mophodynamics and object burial on MEC detection. Supporting Mine-Burial models, ripple bedforms were observed to impede surrogate scour and burial in coarse sediments, while surrogate burial was both predicted and observed in finer sediments. Further, incorporation of

  16. Screening Level Ecological Risk Assessments of Some Military Munitions and Obscurant-related Compounds for Selected Threatened and Endangered Species

    National Research Council Canada - National Science Library

    Von Stackleberg, Katherine; Amos, Craig; Butler, C; Smith, Thomas; Famely, J; McArdle, M; Southworth, B; Steevens, Jeffrey

    2006-01-01

    ...) associated with munitions. This study evaluates the potential long-term impacts on selected threatened and endangered species resulting from dispersion and deposition of vapors and particles found in the fog oils...

  17. Validation of Passive Sampling Devices for Monitoring of Munitions Constituents in Underwater Environments

    Science.gov (United States)

    2017-09-01

    and explosives of concern (MEC) corroding, breaching, and leaking MC into the water column (Darrach, Chutjian, and Plett, 1998; GMI, 2007; Lewis et...underwater UWMM have the potential to corrode, breach, and leak munitions constituents (MCs) such as 2,4,6-trinitrotoluene (TNT) and hexahydro-1,3,5...Wang et al., 2013), a number of challenges prevent accurate assessment of environmental exposure using traditional water , sediment, and tissue

  18. Post-traumatic stress disorder in adult victims of cluster munitions in Lebanon: a 10-year longitudinal study.

    Science.gov (United States)

    Fares, Jawad; Gebeily, Souheil; Saad, Mohamad; Harati, Hayat; Nabha, Sanaa; Said, Najwane; Kanso, Mohamad; Abdel Rassoul, Ronza; Fares, Youssef

    2017-08-18

    This study aims to explore the short-term and long-term prevalence and effects of post-traumatic stress disorder (PTSD) among victims of cluster munitions. A prospective 10-year longitudinal study that took place in Lebanon. Two-hundred-and-forty-four Lebanese civilian victims of submunition blasts, who were injured in 2006 and were over 18 years old, were interviewed. Included were participants who had been diagnosed with PTSD according to the Diagnostic and Statistical Manual of Mental Disorders, 5th Edition (DSM-5) and the PTSD Checklist - Civilian Version in 2006. Interviewees were present for the 10-year follow-up. PTSD prevalence rates of participants in 2006 and 2016 were compared. Analysis of the demographical data pertaining to the association of long-term PTSD with other variables was performed. p Values <0.05 were considered statistically significant for all analyses (95% CI). All the 244 civilians injured by cluster munitions in 2006 responded, and were present for long-term follow-up in 2016. The prevalence of PTSD decreased significantly from 98% to 43% after 10 years (p<0.001). A lower long-term prevalence was significantly associated with male sex (p<0.001), family support (p<0.001) and religion (p<0.001). Hospitalisation (p=0.005) and severe functional impairment (p<0.001) post-trauma were significantly associated with increased prevalence of long-term PTSD. Symptoms of negative cognition and mood were more common in the long run. In addition, job instability was the most frequent socioeconomic repercussion among the participants (88%). Psychological symptoms, especially PTSD, remain high in war-affected populations many years after the war; this is particularly evident for Lebanese civilians who were victimised by cluster munitions. Screening programmes and psychological interventions need to be implemented in vulnerable populations exposed to war traumas. Officials and public health advocates should consider the socioeconomic implications, and

  19. Irregular Warfare: New Challenges for Civil-Military Relations

    National Research Council Canada - National Science Library

    Cronin, Patrick M

    2008-01-01

    .... Irregular warfare introduces new complications to what Eliot Cohen has called an unequal dialogue between civilian and military leaders in which civilian leaders hold the true power but must modulate...

  20. Moltke as a Model for Information Warfare

    National Research Council Canada - National Science Library

    Gallagher, Daniel P

    1998-01-01

    ... with late 20th century Information Warfare (IW). Clausewitz, with his emphasis on concentrating forces for a decisive battle, or Sun Tzu, with his focus on an indirect approach and subduing the enemy without battle, might appear to be more...

  1. Cutaneous reactions in nuclear, biological and chemical warfare

    Directory of Open Access Journals (Sweden)

    Arora Sandeep

    2005-03-01

    Full Text Available Nuclear, biological and chemical warfare have in recent times been responsible for an increasing number of otherwise rare dermatoses. Many nations are now maintaining overt and clandestine stockpiles of such arsenal. With increasing terrorist threats, these agents of mass destruction pose a risk to the civilian population. Nuclear and chemical attacks manifest immediately while biological attacks manifest later. Chemical and biological attacks pose a significant risk to the attending medical personnel. The large scale of anticipated casualties in the event of such an occurrence would need the expertise of all physicians, including dermatologists, both military and civilian. Dermatologists are uniquely qualified in this respect. This article aims at presenting a review of the cutaneous manifestations in nuclear, chemical and biological warfare and their management.

  2. Evolution of war and cyber attacks in the concept of conventional warfare

    Directory of Open Access Journals (Sweden)

    Huseyin Kuru

    2018-01-01

    Full Text Available Humanity have witnessed many confrontations of states whose interests challenge at some points and their struggle to neutralize problems in battlefield. While war was perceived as a way of eliminating deadlocks for some parties, some considered it as one of the international policy materials. The definition and content of conventional warfare have been subject to change for centuries, while the new weapons and technologies have been developed by human beings that it has brought constant change in the law of war and at the same time more lethal and devastating consequences. The struggle for superiority in international relations played an impulsive role in the development of weapons used in the battlefield. Countries have used their labor and financial resources to improve their military skills. Beginning with stones and sticks in the battlefield, this struggle has reached the point of using the next generation satellite controlled unmanned and armed aircrafts and having nuclear weapons has become more deterrent than using them. The struggle between strong countries and the limited countries in terms of technology and armed groups that do not have enough technology and skills completely changed the definition of conventional warfare. This fight has led Asymmetric warfare born which can turn commercial airline planes full of innocent people into a weapon like September-11 attacks. In this study, the historical development and the change in the content of the warfare were briefly explained and then cyber-attacks in the concept of the fourth generation warfare was analyzed taking into account of prominent attacks.

  3. An integrated theoretical and experimental investigation of insensitive munition compounds adsorption on cellulose, cellulose triacetate, chitin and chitosan surfaces.

    Science.gov (United States)

    Gurtowski, Luke A; Griggs, Chris S; Gude, Veera G; Shukla, Manoj K

    2018-02-01

    This manuscript reports results of combined computational chemistry and batch adsorption investigation of insensitive munition compounds, 2,4-dinitroanisole (DNAN), triaminotrinitrobenzene (TATB), 1,1-diamino-2,2-dinitroethene (FOX-7) and nitroguanidine (NQ), and traditional munition compound 2,4,6-trinitrotoluene (TNT) on the surfaces of cellulose, cellulose triacetate, chitin and chitosan biopolymers. Cellulose, cellulose triacetate, chitin and chitosan were modeled as trimeric form of the linear chain of 4 C 1 chair conformation of β-d-glucopyranos, its triacetate form, β-N-acetylglucosamine and D-glucosamine, respectively, in the 1➔4 linkage. Geometries were optimized at the M062X functional level of the density functional theory (DFT) using the 6-31G(d,p) basis set in the gas phase and in the bulk water solution using the conductor-like polarizable continuum model (CPCM) approach. The nature of potential energy surfaces of the optimized geometries were ascertained through the harmonic vibrational frequency analysis. The basis set superposition error (BSSE) corrected interaction energies were obtained using the 6-311G(d,p) basis set at the same theoretical level. The computed BSSE in the gas phase was used to correct interaction energy in the bulk water solution. Computed and experimental results regarding the ability of considered surfaces in adsorbing the insensitive munitions compounds are discussed. Copyright © 2017. Published by Elsevier B.V.

  4. In-Flight Self-Alignment Method Aided by Geomagnetism for Moving Basement of Guided Munitions

    Directory of Open Access Journals (Sweden)

    Shuang-biao Zhang

    2015-01-01

    Full Text Available Due to power-after-launch mode of guided munitions of high rolling speed, initial attitude of munitions cannot be determined accurately, and this makes it difficult for navigation and control system to work effectively and validly. An in-flight self-alignment method aided by geomagnetism that includes a fast in-flight coarse alignment method and an in-flight alignment model based on Kalman theory is proposed in this paper. Firstly a fast in-flight coarse alignment method is developed by using gyros, magnetic sensors, and trajectory angles. Then, an in-flight alignment model is derived by investigation of the measurement errors and attitude errors, which regards attitude errors as state variables and geomagnetic components in navigation frame as observed variables. Finally, fight data of a spinning projectile is used to verify the performance of the in-flight self-alignment method. The satisfying results show that (1 the precision of coarse alignment can attain below 5°; (2 the attitude errors by in-flight alignment model converge to 24′ at early of the latter half of the flight; (3 the in-flight alignment model based on Kalman theory has better adaptability, and show satisfying performance.

  5. Penetrating injury to the chest by an attenuated energy projectile: a case report and literature review of thoracic injuries caused by "less-lethal" munitions.

    Science.gov (United States)

    Rezende-Neto, Joao; Silva, Fabriccio Df; Porto, Leonardo Bo; Teixeira, Luiz C; Tien, Homer; Rizoli, Sandro B

    2009-06-26

    We present the case of a patient who sustained a penetrating injury to the chest caused by an attenuated energy rubber bullet and review the literature on thoracic injuries caused by plastic and rubber "less-lethal" munitions. The patient of this report underwent a right thoracotomy to extract the projectile as well as a wedge resection of the injured lung parenchyma. This case demonstrates that even supposedly safe riot control munition fired at close range, at the torso, can provoke serious injury. Therefore a thorough investigation and close clinical supervision are justified.

  6. Status of dental health in chemical warfare victims: The case of Isfahan, Iran

    Directory of Open Access Journals (Sweden)

    Ahmad Mottaghi

    2012-01-01

    Conclusion: Chemical warfare victims have relatively poor dental/oral health. Chemical injury might cause a dysfunction in saliva secretion, with decrease in saliva secretion increasing the risk for tooth decay and periodontal disorders. Further research is required to find out the exact underlying mechanisms and the factors associated with poor dental/oral health in chemical warfare victims.

  7. Handbook of toxicology of chemical warfare agents

    CERN Document Server

    2010-01-01

    This groundbreaking book covers every aspect of deadly toxic chemicals used as weapons of mass destruction and employed in conflicts, warfare and terrorism. Including findings from experimental as well as clinical studies, this one-of-a-kind handbook is prepared in a very user- friendly format that can easily be followed by students, teachers and researchers, as well as lay people. Stand-alone chapters on individual chemicals and major topics allow the reader to easily access required information without searching through the entire book. This is the first book that offers in-depth coverage of individual toxicants, target organ toxicity, major incidents, toxic effects in humans, animals and wildlife, biosensors, biomarkers, on-site and laboratory analytical methods, decontamination and detoxification procedures, prophylactic, therapeutic and countermeasures, and the role of homeland security. Presents a comprehensive look at all aspects of chemical warfare toxicology in one reference work. This saves research...

  8. Echoes of Chechnya Warfare Resound in Moscow, Quantico

    National Research Council Canada - National Science Library

    Ackerman, Robert

    2000-01-01

    .... thinking about urban warfare. After suffering stunning public defeats just a few years ago, Russian forces applied painful lessons learned then to drive Chechen forces out of their capital city, Grozny, this year...

  9. The ethics of drone warfare

    OpenAIRE

    Fatić Aleksandar

    2017-01-01

    The paper investigates the compatibility of the modern technologies of warfare, specifically the use of offensive drones, with traditional military ethics and suggests that the new technologies radically change the value system of the military in ways which make large parts of the traditional military ethics inapplicable. The author suggests that Agamben’s concept of ‘effectivity’ through ‘special actions’ which mark one’s belonging to a particular communit...

  10. Book Review COMPOSITE WARFARE: THE CONDUCT OF ...

    African Journals Online (AJOL)

    COMPOSITE WARFARE: THE CONDUCT OF. SUCCESSFUL GROUND FORCE. OPERATIONS IN AFRICA. Eeben Barlow. Abel Esterhuyse, PhD. Stellenbosch University. Pinetown: 30 Degrees South Publishers. 2015, 576 pages. ISBN 9781928211761. Africa is still one of the most conflict-ridden places on earth – from ...

  11. MOSES, development of an Underwater Warfare Testbed

    NARCIS (Netherlands)

    Lentze, S.G.

    2001-01-01

    The TNO underwater warfare (UWW) research programme results in a large number of models used in operational research projects. To enhance the accessibility and re-use of these models for new projects, TNO-FEL has developed the modelling environment ‘MOSES - Maritime Operations Simulation and

  12. Identification of chemical warfare agent with radiological measurements

    International Nuclear Information System (INIS)

    Liu Boxue; Li Yun; Ai Xianyun

    2000-01-01

    There are three non-destructive radiological methods for identification of warfare agents and TNT. Their principles and problems related were discussed. Portable isotopic neutron spectroscopy is based on the assay of key elemental composition (such as Cl, P, H, As, S, N) in chemical agents by neutron induced prompt gamma ray analysis. Hydrogen concentration measurement by means of using thermal neutron can be employed to identify chemical warfare agents and TNT that contains different hydrogen fraction. The calibration curves of thermal neutron count rate against hydrogen concentration were measured. X ray imagination system can be used to determine the internal structure of chemical bombs, there by to identify them. The radiological methods are very useful for identification of old chemical weapons abandoned by Japan Army during World War 2

  13. Are Current Psychological Operations Procedures Adequate in Information Warfare?

    National Research Council Canada - National Science Library

    Duff, Murray

    1997-01-01

    .... While some aspects of information warfare are conducted domestically, many are executed on foreign soil and involve extensive interaction with other governments, their population, non-governmental...

  14. Tissue-based water quality biosensors for detecting chemical warfare agents

    Science.gov (United States)

    Greenbaum, Elias [Oak Ridge, TN; Sanders, Charlene A [Knoxville, TN

    2003-05-27

    A water quality sensor for detecting the presence of at least one chemical or biological warfare agent includes: a cell; apparatus for introducing water into the cell and discharging water from the cell adapted for analyzing photosynthetic activity of naturally occurring, free-living, indigenous photosynthetic organisms in water; a fluorometer for measuring photosynthetic activity of naturally occurring, free-living, indigenous photosynthetic organisms drawn into the cell; and an electronics package that analyzes raw data from the fluorometer and emits a signal indicating the presence of at least one chemical or biological warfare agent in the water.

  15. Tissue-based standoff biosensors for detecting chemical warfare agents

    Science.gov (United States)

    Greenbaum, Elias; Sanders, Charlene A.

    2003-11-18

    A tissue-based, deployable, standoff air quality sensor for detecting the presence of at least one chemical or biological warfare agent, includes: a cell containing entrapped photosynthetic tissue, the cell adapted for analyzing photosynthetic activity of the entrapped photosynthetic tissue; means for introducing an air sample into the cell and contacting the air sample with the entrapped photosynthetic tissue; a fluorometer in operable relationship with the cell for measuring photosynthetic activity of the entrapped photosynthetic tissue; and transmitting means for transmitting analytical data generated by the fluorometer relating to the presence of at least one chemical or biological warfare agent in the air sample, the sensor adapted for deployment into a selected area.

  16. Tracking and Interception of Ground-Based RF Sources Using Autonomous Guided Munitions with Passive Bearings-Only Sensors and Tracking Algorithms

    National Research Council Canada - National Science Library

    Ezal, Kenan; Agate, Craig

    2006-01-01

    This paper considers the problem of tracking and intercepting a potentially moving ground-based RF source with an autonomous guided munition that has a passive bearings-only sensor located on its nose...

  17. Drone Warfare: Is the United States Violating the Law of Armed Conflict

    Science.gov (United States)

    2011-02-16

    NOTE AIR WAR COLLEGE AIR UNIVERSITY DRONE WARFARE: IS THE UNITED STATES VIOLATING THE LAW OF ARMED CONFLICT? by Barbara E. Shestko, Col...Base, Alabama. 1 Introduction The United States has become increasingly dependent upon the use of unmanned aircraft systems (UASs) or “ drones ” to...kill targeted members of al-Qaeda and the Taliban.1 Due to the success of drone warfare, we can expect the United States to continue its current

  18. Biomonitoring of exposure to chemical warfare agents

    NARCIS (Netherlands)

    Noort, D.; Schans, M.J. van der; Benschop, H.P.

    2006-01-01

    An overview is presented of the major methods that are presently available for biomonitoring of exposure to chemical warfare agents, i.e., nerve agents and sulfur mustard. These methods can be applied for a variety of purposes such as diagnosis and dosimetry of exposure of casualties, verification

  19. Computational models of intergroup competition and warfare.

    Energy Technology Data Exchange (ETDEWEB)

    Letendre, Kenneth (University of New Mexico); Abbott, Robert G.

    2011-11-01

    This document reports on the research of Kenneth Letendre, the recipient of a Sandia Graduate Research Fellowship at the University of New Mexico. Warfare is an extreme form of intergroup competition in which individuals make extreme sacrifices for the benefit of their nation or other group to which they belong. Among animals, limited, non-lethal competition is the norm. It is not fully understood what factors lead to warfare. We studied the global variation in the frequency of civil conflict among countries of the world, and its positive association with variation in the intensity of infectious disease. We demonstrated that the burden of human infectious disease importantly predicts the frequency of civil conflict and tested a causal model for this association based on the parasite-stress theory of sociality. We also investigated the organization of social foraging by colonies of harvester ants in the genus Pogonomyrmex, using both field studies and computer models.

  20. Modeling Anti-Air Warfare With Discrete Event Simulation and Analyzing Naval Convoy Operations

    Science.gov (United States)

    2016-06-01

    W., & Scheaffer, R. L. (2008). Mathematical statistics with applications . Belmont, CA: Cengage Learning. 118 THIS PAGE INTENTIONALLY LEFT BLANK...WARFARE WITH DISCRETE EVENT SIMULATION AND ANALYZING NAVAL CONVOY OPERATIONS by Ali E. Opcin June 2016 Thesis Advisor: Arnold H. Buss Co...REPORT DATE June 2016 3. REPORT TYPE AND DATES COVERED Master’s thesis 4. TITLE AND SUBTITLE MODELING ANTI-AIR WARFARE WITH DISCRETE EVENT

  1. Penetrating injury to the chest by an attenuated energy projectile: a case report and literature review of thoracic injuries caused by "less-lethal" munitions

    Directory of Open Access Journals (Sweden)

    Porto Leonardo BO

    2009-06-01

    Full Text Available Abstract We present the case of a patient who sustained a penetrating injury to the chest caused by an attenuated energy rubber bullet and review the literature on thoracic injuries caused by plastic and rubber "less-lethal" munitions. The patient of this report underwent a right thoracotomy to extract the projectile as well as a wedge resection of the injured lung parenchyma. This case demonstrates that even supposedly safe riot control munition fired at close range, at the torso, can provoke serious injury. Therefore a thorough investigation and close clinical supervision are justified.

  2. FFT Based VLSI Digital One Bit Electronic Warfare Receiver

    National Research Council Canada - National Science Library

    Chien-In, Henry

    1998-01-01

    ... (1 GHz) digital receiver designed for electronic warfare applications. The receiver can process two simultaneous signals and has the potential for fabrication on a single multi-chip module (MCM...

  3. New Developments in Chinese Strategic Psychological Warfare

    Science.gov (United States)

    2005-01-01

    Taoism , which coupled hardness with softness in warfare, was not the only influence on the theory of psychological operations in ancient China. Other...portraying Islamic martyrs who appear to speak to soldiers from the clouds.38 In contemporary wars, such as the Gulf War, the first targets attacked have

  4. The technical Dimensions of Nuclear Warfare

    International Nuclear Information System (INIS)

    Broda, E.

    1977-01-01

    This text, written by Engelbert Broda in 1977 is about the dimensions of nuclear warfare. Broda describes the devastating effects of the nuclear bombs dropped in 1945 in Hiroshima and Nagasaki and compares these effects with the explosive power of Hydrogen weapons. He also expresses his concerns about another nuclear ware and analyses possible worsening situations like change in the military doctrine. (nowak)

  5. Detection of biological warfare agents using ultra violet-laser induced fluorescence LIDAR.

    Science.gov (United States)

    Joshi, Deepti; Kumar, Deepak; Maini, Anil K; Sharma, Ramesh C

    2013-08-01

    This review has been written to highlight the threat of biological warfare agents, their types and detection. Bacterial biological agent Bacillus anthracis (bacteria causing the disease anthrax) which is most likely to be employed in biological warfare is being discussed in detail. Standoff detection of biological warfare agents in aerosol form using Ultra violet-Laser Induced Fluorescence (UV-LIF) spectroscopy method has been studied. Range-resolved detection and identification of biological aerosols by both nano-second and non-linear femto-second LIDAR is also discussed. Calculated received fluorescence signal for a cloud of typical biological agent Bacillus globigii (Simulants of B. anthracis) at a location of ~5.0 km at different concentrations in presence of solar background radiation has been described. Overview of current research efforts in internationally available working UV-LIF LIDAR systems are also mentioned briefly. Copyright © 2013 Elsevier B.V. All rights reserved.

  6. THE CYBER DIMENSION OF MODERN HYBRID WARFARE AND ITS RELEVANCE FOR NATO

    Directory of Open Access Journals (Sweden)

    Sorin DUCARU

    2016-06-01

    Full Text Available The technological development and the instant communication possibilities advanced not only economic and social developments, but also evolving threats from those who exploit the vulnerabilities of communication and information systems. The cyber threat landscape points to a significant increase of the frequency, intensity, duration and sophistication of cyber-attacks. One of the new and concerning trends is the use of cyber capabilities in relation with military of hybrid operations – the so-called cyber dimension of hybrid warfare. NATO’s strategy on countering hybrid warfare is based on the triad: prepare-deter-defend, which also applies to cyber. Nations represent the first line of defence in countering hybrid strategies. International cooperation is also a key factor in this sense. It is in this context that NATO’s response to cyber-attacks in the context of hybrid warfare must be further refined.

  7. Precision Warfare Enables Interdependent Fires and Maneuver in 2010

    National Research Council Canada - National Science Library

    Smith, John

    1997-01-01

    The U.S. Army is in the midst of a revolution in military affairs (RMA). Significant advancements in informational technologies and precision weapons are providing unprecedented potential for future warfare...

  8. Irregular Warfare: Impact on Future Professional Military Education

    National Research Council Canada - National Science Library

    Paschal, David G

    2006-01-01

    ... to operate effectively in an irregular warfare environment. The utility of a decisive war between nation states continues to decline and will eventually reach critical mass based upon the extreme imbalance of military power and a U.S. monopoly...

  9. IMS software developments for the detection of chemical warfare agent

    Science.gov (United States)

    Klepel, ST.; Graefenhain, U.; Lippe, R.; Stach, J.; Starrock, V.

    1995-01-01

    Interference compounds like gasoline, diesel, burning wood or fuel, etc. are presented in common battlefield situations. These compounds can cause detectors to respond as a false positive or interfere with the detector's ability to respond to target compounds such as chemical warfare agents. To ensure proper response of the ion mobility spectrometer to chemical warfare agents, two special software packages were developed and incorporated into the Bruker RAID-1. The programs suppress interferring signals caused by car exhaust or smoke gases resulting from burning materials and correct the influence of variable sample gas humidity which is important for detection and quantification of blister agents like mustard gas or lewisite.

  10. Military Engineers and Chemical Warfare Troops (Inzhenernye Voiska Khimicheskie Voiska),

    Science.gov (United States)

    MILITARY FORCES(FOREIGN), *MILITARY ORGANIZATIONS, MILITARY ENGINEERING , INFANTRY, AMPHIBIOUS OPERATIONS, MINELAYING, ARMORED VEHICLES, NUCLEAR...RADIATION, DOSIMETERS, CHEMICAL WARFARE, PROTECTIVE CLOTHING, DECONTAMINATION, HEALTH PHYSICS.

  11. Irregular Warfare: Special Operations Joint Professional Military Education Transformation

    National Research Council Canada - National Science Library

    Cannady, Bryan H

    2008-01-01

    ... on today's battlefront in Afghanistan and Iraq and in the Global War on Terrorism (GWOT). At the forefront of the GWOT and irregular warfare are the United States Special Operations Command (USSOCOM...

  12. Implementation of the NEMO model for estimating the spread of leakage from chemical munitions in the Baltic Sea - the first approach

    Science.gov (United States)

    Andrzejewski, Jan

    2017-04-01

    After the Second World War, during the Potsdam Conference a decision about demilitarization of Germany was made, and as a consequence, ammunition including chemical warfare agents (CWA) was dumped into the basins of the Baltic Sea. This type of weapon was stored in metal barrels that were under strong influence of electrochemical oxidation, also known as corrosion. Several tens years later, scientists were wondering what consequences for marine ecosystem could a leakage from this weapon bring. Although over 70 years passed since the Second World War, the influence of potential leakage of the CWA has not been properly estimated. Thus, the main goal of this work is to estimate dangerous area caused by potential leakage using the NEMO (Nucleus for European Modelling of the Ocean) ocean model. The NEMO ocean model is developed by the European Consortium including research institutes from France, England and Italy. The first step of this work is to implement the model for the area of the Baltic Sea. It requires generation of horizontal and vertical grid, bathymetry, atmospheric forces and lateral boundary conditions. Implemented model will have to be checked - it means it will have to pass a validation process. The Baltic Sea is one of the best measured sea in the World - as a consequence a lot of data are freely available for researchers. After validation and tuning up the model, implementation of passive tracer is planned. Passive tracer is the prognostic variable that could represent concentration of potential leakage and does not have influence on the density of the model. Based on distribution of the passive tracer, dangerous areas in the locations of dumpsites will be assessed. The research work was funded by the European Union (European Regional Development Fund) under the Interreg Baltic Sea Region Programme 2014-2020, project #R013 DAIMON (Decision Aid for Marine Munitions).

  13. Environmental toxicity of Chemical Warfare Agents (CWAs) - MicrotoxTM and Spontaneous Locomotor Changes

    DEFF Research Database (Denmark)

    Storgaard, Morten Swayne; Sanderson, Hans; Baatrup, Erik

    After the 2nd World War the CWAs were prohibited by law and 11,000 tonnes of toxic agents were dumped in the Bornholm Basin east of Bornholm. The dumped chemical munitions have not reached attention from politicians and scientists until recently. During earlier projects, such as MERCW (2005...

  14. The health hazards of depleted uranium munitions. Part 1

    International Nuclear Information System (INIS)

    2001-01-01

    Depleted uranium is a toxic and weakly radioactive metal used for a variety of purposes. Perhaps its most controversial use is in battlefield munitions, where it can be widely dispersed in the form of fine particles and shrapnel that may enter the bodies of combatants and others through inhalation, ingestion or wounding. It is a matter of legitimate public concern whether the use of this material in this way could create unacceptable health hazards or damage to the environment. The objective of our study has been to provide the best scientific understanding of the ways in which the material may be distributed, how it may be taken up by humans, and the potential implications for health. For politicians, any hazards to health have to be balanced against the military advantages that the use of these munitions confers. We have not tried to reach a judgment on these political issues, but we believe that a better scientific understanding of the extent of the hazards will make it easier for these wider questions to be addressed in a more objective way. This report is the first of two, and addresses the likely levels of exposure to depleted uranium, the resulting radiological risks, and the lessons to be learned from epidemiological studies. Our second report will address toxicological risks and environmental issues. So far, we conclude that risks from radiation are low for most soldiers on the battlefield, and for civilians who later return to the area. However, there are uncertainties about the maximal levels of exposure to depleted uranium on the battlefield, and there may be circumstances in which a few soldiers are exposed to levels of depleted uranium that result in a significant risk to health. Further studies are needed to determine the levels of exposure to depleted uranium that might occur on the battlefield and to judge whether such higher risks are likely to occur in practice

  15. An evolutionary theory of large-scale human warfare: Group-structured cultural selection.

    Science.gov (United States)

    Zefferman, Matthew R; Mathew, Sarah

    2015-01-01

    When humans wage war, it is not unusual for battlefields to be strewn with dead warriors. These warriors typically were men in their reproductive prime who, had they not died in battle, might have gone on to father more children. Typically, they are also genetically unrelated to one another. We know of no other animal species in which reproductively capable, genetically unrelated individuals risk their lives in this manner. Because the immense private costs borne by individual warriors create benefits that are shared widely by others in their group, warfare is a stark evolutionary puzzle that is difficult to explain. Although several scholars have posited models of the evolution of human warfare, these models do not adequately explain how humans solve the problem of collective action in warfare at the evolutionarily novel scale of hundreds of genetically unrelated individuals. We propose that group-structured cultural selection explains this phenomenon. © 2015 Wiley Periodicals, Inc.

  16. APSTNG: Neutron interrogation for detection of nuclear and CW weapons, explosives, and drugs

    International Nuclear Information System (INIS)

    Rhodes, E.; Dickerman, C.E.; De Volpi, A.; Peters, C.W.

    1992-01-01

    A recently developed neutron diagnostic probe system has the potential to satisfy a significant number of van-mobile and fixed- portal requirements for nondestructive verification of sealed munitions and detection of contraband explosives and drugs. The probe is based on a unique associated-particle sealed-tube neutron generator (APSTNG) that interrogates the object of interest with a low-intensity beam of 14-MeV neutrons generated from the deuterium-tritium reaction and that detects the alpha-particle associated with each neutron. Gamma-ray spectra of resulting neutron inelastic scattering and fission reactions identify nuclides associated with all major chemicals in chemical warfare agents, explosives, and drugs, as well as many pollutants and fissile and fertile special nuclear material. Flight times determined from determined from detection times of the gamma-rays and alpha-particles yield a separate tomographic image of each identified nuclide. The APSTNG also forms the basis for a compact fast-neutron transmission imaging system that can be used along with or instead of the emission imaging system; a collimator is not required since scattered neutrons are removed by ''electronic collimation'' (detected neutrons not having the proper flight time to be uncollided are discarded). The small and relatively inexpensive APSTNG exhibits high reliability and can be quickly replaced. Proof-of-concept experiments have been performed under laboratory conditions for simulated nuclear and chemical warfare munitions and for explosives and drugs

  17. APSTNG: Neutron interrogation for detection of explosives and drugs and nuclear and CW materials

    International Nuclear Information System (INIS)

    Rhodes, E.; Peters, C.W.

    1993-01-01

    A recently developed neutron diagnostic probe system has the potential to satisfy a significant number of van-mobile and fixed-portal requirements for nondestructive detection, including monitoring of contraband explosives, drugs, and weapon materials, and treaty verification of sealed munitions. The probe is based on a unique associated-particle sealed-tube neutron generator (APSTNG) that interrogates the object of interest with a low-intensity beam of 14-MeV neutron generated from the deuterium-tritium reaction and that detects the alpha-particle associated with each neutron. Gamma-ray spectra of resulting neutron reactions identify nuclides associated with all major chemicals in explosives, drugs, and chemical warfare agents, as well as many pollutants and fissile and fertile special nuclear material. Flight times determined from detection times of the gamma rays and alpha-particles yield a separate coarse tomographic image of each identified nuclide. The APSTNG also forms the basis for a compact fast-neutron transmission imaging system that can be used along with or instead of the emission imaging system. Proof-of-concept experiments have been performed under laboratory conditions for simulated nuclear and chemical warfare munitions and for explosives and drugs. The small and relatively inexpensive APSTNG exhibits high reliability and can be quickly replaced. Surveillance systems based on APSTNG technology can avoid the large physical size, high capital and operating expenses, and reliability problems associated with complex accelerators

  18. Researchers study decontamination of chemical, biological warfare agents

    OpenAIRE

    Trulove, Susan

    2007-01-01

    The U.S. Army Research Office has awarded Virginia Tech a $680,000 grant over two years to build an instrument that can be used to study the chemistry of gases that will decompose both chemical and biological warfare agents on surfaces.

  19. Changing the Scale and Efficiency of Chemical Warfare Countermeasure Discovery Using the Zebrafish

    Science.gov (United States)

    Peterson, Randall T.; MacRae, Calum A.

    2013-01-01

    As the scope of potential chemical warfare agents grows rapidly and as the diversity of potential threat scenarios expands with non-state actors, so a need for innovative approaches to countermeasure development has emerged. In the last few years, the utility of the zebrafish as a model organism that is amenable to high-throughput screening has become apparent and this system has been applied to the unbiased discovery of chemical warfare countermeasures. This review summarizes the in vivo screening approach that has been pioneered in the countermeasure discovery arena, and highlights the successes to date as well as the potential challenges in moving the field forward. Importantly, the establishment of a zebrafish platform for countermeasure discovery would offer a rapid response system for the development of antidotes to the continuous stream of new potential chemical warfare agents. PMID:24273586

  20. Radioecological aspects of nuclear warfare

    International Nuclear Information System (INIS)

    Edvardson, Kay

    1977-01-01

    Radioactive fallout, one of the major effects of nuclear warfare, will cause acute radiation sickness within the close-in or intermediate areas downwind from surface bursts. Global fallout from high yield explosions will be fairly evenly distributed in the hemisphere where the explosions occur, and will cause irradiation from ground deposit, inhaled material and contaminated food. Estimates of collective doses and the approximate number of late casualties from the global contamination are presented for a given total explosion yield. (author)

  1. Fourth Generation Warfare: The Need for a Comprehensive Approach

    National Research Council Canada - National Science Library

    Benton, LeRoy D

    2008-01-01

    .... A definition of Fourth Generation Warfare is developed, based on Col. Thomas X. Hammes' writings. The definition is further developed to show relevance and applicability to current operations in the Long War on Terrorism...

  2. Rain-Induced Wash-Off of Chemical Warfare Agent (VX) from Foliar Surfaces of Living Plants Maintained in a Surety Hood

    Science.gov (United States)

    2016-09-01

    RAIN-INDUCED WASH-OFF OF CHEMICAL WARFARE AGENT (VX) FROM FOLIAR SURFACES OF LIVING PLANTS MAINTAINED IN A...Final 3. DATES COVERED (From - To) May 2014 – Sep 2015 4. TITLE AND SUBTITLE Rain-Induced Wash-Off of Chemical Warfare Agent (VX) from Foliar...galli Foliage Chemical warfare agent (CWA) O-ethyl-S-(2

  3. Operation Iraqi Freedom: DOD Should Apply Lessons Learned Concerning the Need for Security over Conventional Munitions Storage Sites to Future Operations Planning

    National Research Council Canada - National Science Library

    D'Agostino, Davi M

    2007-01-01

    The Government Accountability Office (GAO) is releasing a report today on lessons learned concerning the need for security over conventional munitions storage sites that provides the basis for this testimony...

  4. Electronic Warfare: Comprehensive Strategy Needed for Suppressing Enemy Air Defenses

    National Research Council Canada - National Science Library

    2001-01-01

    .... To achieve this suppression, the services use specialized aircraft designed to neutralize, destroy, or temporarily degrade enemy air defense systems through either physical attack or electronic warfare...

  5. United States Coast Guard Antisubmarine Warfare (ASW) in the Maritime Defense Zone (MDZ) - A Strategic Approach

    Science.gov (United States)

    1989-03-01

    RIC ILE COPY AIR WAR COLLGE REEAC R~pCR UNITED STATES COAST GUARD ANTISUBMARINE WARFARE (ASW) IN THE MARITIME DEFENSE ZONE (MDZ) -A STRATEGIC...going to perform in these MDZs. Those tasks identified so far include: port and coastal physical security & preventive safety, mine warfare

  6. Special Forces and the Art of Influence: A Grassroots Approach to Psychological Operations in an Unconventional Warfare Environment

    National Research Council Canada - National Science Library

    Thomas, II, Joel W

    2006-01-01

    This thesis researches the intricacies of the art of influence in an unconventional warfare environment to develop a model of influence that can be utilized by Special Forces conducting unconventional warfare...

  7. Mapping the Spread of Mounted Warfare

    Directory of Open Access Journals (Sweden)

    Peter Turchin

    2016-12-01

    Full Text Available Military technology is one of the most important factors affecting the evolution of complex societies. In particular, mounted warfare, the use of horse-riders in military operations, revolutionized war as it spread to different parts of Eurasia and Africa during the Ancient and Medieval eras, and to the Americas during the Early Modern period. Here we use a variety of sources to map this spread.

  8. UML modelling of network warfare examples

    CSIR Research Space (South Africa)

    Veerasamy, N

    2011-08-01

    Full Text Available ] Affects both civilian and military domains [8] [9] Related to the concepts of infowar, information operations, hacking, hackivism, cyberterrorism and cybotage depending on motivations and techniques [10] Encompasses both technological solutions...]. In addition, Williers as well as Qingbao and Anwar discuss more offensive aspects of information security and Network Warfare like Hacking, Vulnerability Injection, Network Attacks, Denial of Capability, Interception and Blockage [6] [18] [19]. Various...

  9. Navy Operational Planner - Undersea Warfare Module

    Science.gov (United States)

    2016-09-01

    concepts are considered in NOP–USW that are not in previous research: time phasing of missions, mutually exclusive missions, and asset availability...operational planning efforts. NOP–USW suggests the correct allocation of assets across a wide theater of operation to accomplish missions in the...Master’s thesis 4. TITLE AND SUBTITLE NAVY OPERATIONAL PLANNER – UNDERSEA WARFARE MODULE 5. FUNDING NUMBERS 6. AUTHOR(S) Guy A. Molina 7

  10. zero day exploits and national readiness for cyber-warfare

    African Journals Online (AJOL)

    HOD

    A zero day vulnerability is an unknown exploit that divulges security flaws in software before such a flaw is publicly ... Keywords: exploits, zero day, vulnerability, cyberspace, cyber-warfare. 1. ..... industries and companies across the globe. The.

  11. An Advanced VHF/UHF Short Range, Groundwave Propagation Model for Paths With Near-Earth Antennas

    National Research Council Canada - National Science Library

    Cross, Marshall W; Fung, Tat Y

    2006-01-01

    ... the earth such as: Unattended Ground Sensors (UGS) and Intelligent Munitions Systems (IMS), are attenuated above free space values by the lossy earth itself and any obstructions between a transmitter and receiver pair...

  12. Guerilla Warfare & Law Enforcement: Combating the 21st Century Terrorist Cell within the U.S.

    Directory of Open Access Journals (Sweden)

    Major Richard Hughbank

    2009-01-01

    Full Text Available Both domestic and international terrorist organizations employ guerrilla warfare tactics, techniques, and procedures. Thus, the ability to identify and defeat the members of these organizations, cripple their infrastructures, and disrupt their financial resources lies in the understanding of modern guerrilla warfare as it develops in the twenty-first century within the United States.3 The forms of asymmetric warfare4 adopted by domestic and international terrorist groups alike is no longer intended to gain simple media exposure or governmental manipulation; they want to make an overpowering impact by causing massive loss of life and severe damage to infrastructure and are often motivated by religious imperatives and political goals. As terrorism analyst Stephen Flynn has observed, "Throughout the 20th century [Americans] were able to treat national security as essentially an out-of-body experience. When confronted by threats, [America] dealt with them on the turf of our allies or our adversaries. Aside from the occasional disaster and heinous crime, civilian life [in the United States] has been virtually terror-free." With the turn of the twenty-first century, terrorist operations have become more prevalent in the United States and are taking shape in the form of modern guerrilla warfare, thus creating new challenges for federal, state, and local law enforcement agencies. After reviewing the origin and nature of these challenges, this article will offer some suggestions for countering guerilla warfare in the United States.

  13. Information Warfare: Defining the Legal Response to An Attack

    National Research Council Canada - National Science Library

    Pottorff, James

    1999-01-01

    This paper discusses the difficulty in determining whether an information warfare attack, such as a computer virus, can be treated as an "armed attack" for purposes of national defense under the United Nations charter. As the U.S...

  14. Second NATO/SIBCA Exercise on Sampling of Chemical Warfare Agents

    National Research Council Canada - National Science Library

    Wils, E

    1999-01-01

    In order to practise the sampling of chemical warfare agents under realistic conditions, the Netherlands participated successfully in the second NATO/SIBCA sampling exercise conducted in Poland on 1-3...

  15. The Role of Civil Affairs in Unconventional Warfare

    Science.gov (United States)

    2012-12-01

    neighbor to the west, and secured the eastern border of Laos 32 Mao Tse -Tung, On Guerrilla Warfare...INTRODUCTION..........................................................................................19  B.  BRIEF HISTORY OF LAOS ...Royal Lao Army SCA Support to Civil Administration SCIRI Supreme Council of Iraq SG Shadow Government SOF Special Operations Forces TAI Targeted

  16. Intelligence in Artificial Intelligence

    OpenAIRE

    Datta, Shoumen Palit Austin

    2016-01-01

    The elusive quest for intelligence in artificial intelligence prompts us to consider that instituting human-level intelligence in systems may be (still) in the realm of utopia. In about a quarter century, we have witnessed the winter of AI (1990) being transformed and transported to the zenith of tabloid fodder about AI (2015). The discussion at hand is about the elements that constitute the canonical idea of intelligence. The delivery of intelligence as a pay-per-use-service, popping out of ...

  17. How Power-Laws Re-Write The Rules Of Cyber Warfare

    Directory of Open Access Journals (Sweden)

    David L. Bibighaus

    2015-12-01

    Full Text Available All warfare contains and element of randomness. This article will argue that, the kind uncertainty encountered in cyber warfare (Power-Law randomness is fundamentally different from the uncertainty the military has evolved to deal with in the physical world (Gaussian-Randomness. The article will explain the difference between these two kinds of randomness, and how cyber weapons appear to operate under Power-Law randomness. It then will show how in cyberspace, key aspects of strategic thought are based on a flaws assumption of randomness. Finally, this article shall argue that if the American military is going to be effective in cyberspace, it must re-examine the way the military assumes risk, recruits is forces, plans for war and maintains the peace.

  18. PINS Testing and Modification for Explosive Identification

    International Nuclear Information System (INIS)

    Seabury, E.H.; Caffrey, A.J.

    2011-01-01

    The INL's Portable Isotopic Neutron Spectroscopy System (PINS)1 non-intrusively identifies the chemical fill of munitions and sealed containers. PINS is used routinely by the U.S. Army, the Defense Threat Reduction Agency, and foreign military units to determine the contents of munitions and other containers suspected to contain explosives, smoke-generating chemicals, and chemical warfare agents such as mustard and nerve gas. The objects assayed with PINS range from softball-sized M139 chemical bomblets to 200 gallon DOT 500X ton containers. INL had previously examined2 the feasibility of using a similar system for the identification of explosives, and based on this proof-of-principle test, the development of a dedicated system for the identification of explosives in an improvised nuclear device appears entirely feasible. INL has been tasked by NNSA NA-42 Render Safe Research and Development with the development of such a system.

  19. Military medicine and the ethics of war: British colonial warfare during the Seven Years War (1756-63).

    Science.gov (United States)

    Charters, Erica

    2010-01-01

    This article examines 18th-century European warfare, tracing the first formal codifications of conventions of war, frequently introduced by military physicians and initially regarding the treatment of the sick and wounded. It outlines to what extent these conventions were followed in practice, particularly in the challenging environment of American irregular warfare, with a focus on the most well-known incident of "biological warfare" in the period: the deliberate spread of smallpox by British officers among Amerindians in 1763. More broadly, it demonstrates that the history of military medicine provides a fruitful method with which to uncover assumptions about the ethics of war.

  20. Simulated experiment for elimination of chemical and biological warfare agents by making use of microwave plasma torch

    International Nuclear Information System (INIS)

    Hong, Yong C.; Kim, Jeong H.; Uhm, Han S.

    2004-01-01

    The threat of chemical and biological warfare agents in a domestic terrorist attack and in military conflict is increasing worldwide. Elimination and decontamination of chemical and biological warfare (CBW) agents are immediately required after such an attack. Simulated experiment for elimination of CBW agents by making use of atmospheric-pressure microwave plasma torches is carried out. Elimination of biological warfare agents indicated by the vitrification or burnout of sewage sludge powders and decomposition of toluene gas as a chemical agent stimulant are presented. A detailed characterization for the elimination of the simulant chemicals using Fourier transform infrared and gas chromatography is also presented

  1. Simulated experiment for elimination of chemical and biological warfare agents by making use of microwave plasma torch

    Science.gov (United States)

    Hong, Yong C.; Kim, Jeong H.; Uhm, Han S.

    2004-02-01

    The threat of chemical and biological warfare agents in a domestic terrorist attack and in military conflict is increasing worldwide. Elimination and decontamination of chemical and biological warfare (CBW) agents are immediately required after such an attack. Simulated experiment for elimination of CBW agents by making use of atmospheric-pressure microwave plasma torches is carried out. Elimination of biological warfare agents indicated by the vitrification or burnout of sewage sludge powders and decomposition of toluene gas as a chemical agent stimulant are presented. A detailed characterization for the elimination of the simulant chemicals using Fourier transform infrared and gas chromatography is also presented.

  2. Radioecological aspects of nuclear warfare

    International Nuclear Information System (INIS)

    Edvarson, K.

    1975-01-01

    The radioactive fallout from nuclear explosions is one of the major effects of nuclear warfare. Those levels causing acute radiation sickness are to be expected only within the close-in or intermediate areas downwind from surface bursts. Global fallout from high yield explosions will be fairly evenly distributed in the hemisphere where the explosions occurred and cause irradiation from ground deposit, inhaled material and contaminated food. The collective doses and the order of magnitude of late casualties from this global contamination are estimated for a given total explosion yield. (auth)

  3. The Role of Airpower in Urban Warfare. An Airman's Perspective

    National Research Council Canada - National Science Library

    Saffold, Timothy

    1998-01-01

    .... This emphasis on surface force employment stifles innovative thought as to how military forces can achieve operational and strategic effects by employing airpower as the key instrument of force in urban warfare...

  4. Health-related quality of life of chemical warfare victims: an assessment with the use of a specific tool.

    Science.gov (United States)

    Biat Saeed, Khaled; Parandeh, Akram; Alhani, Fatemeh; Salaree, Mohammad Mehdi

    2014-02-01

    Exposure to chemical warfare gases significantly changes the quality of life (QoL) of victims and has significant chronic adverse effects. This study sought to assess the health-related QoL (HRQoL) of chemical victims by means of a tool specifically designed for this purpose. The correlation of their QoL with several demographic factors was evaluated as well. In this descriptive cross-sectional study, 120 chemical warfare victims were selected from subjects presenting to selected medical centers in Tehran in 2012 using convenience sampling. Two questionnaires of demographic information and HRQoL of chemical warfare victims (specific tool) were used for data collection. The data were analyzed using SPSS version 20 software (IBM, Armonk, NY, USA). The mean and standard deviation (mean ± SD) of scores obtained by chemical warfare victims in physical, psychosocial and spiritual domains was 39.6 ± 16.5, 42.1 ± 15.2 and 82.4 ± 15.4, respectively. Different age groups showed a significant difference in the psychosocial domain score (P chemical warfare victims, it can be used as strategically for these patients to help them cope with their injury and improve their physical and psychosocial health and QoL.

  5. Nanoplatforms for Detection, Remediation and Protection Against Chem-Bio Warfare

    Science.gov (United States)

    Denkbaş, E. B.; Bayram, C.; Kavaz, D.; Çirak, T.; Demirbilek, M.

    Chemical and biological substances have been used as warfare agents by terrorists by varying degree of sophistication. It is critical that these agents be detected in real-time with high level of sensitively, specificity, and accuracy. Many different types of techniques and systems have been developed to detect these agents. But there are some limitations in these conventional techniques and systems. Limitations include the collection, handling and sampling procedures, detection limits, sample transfer, expensive equipment, personnel training, and detection materials. Due to the unique properties such as quantum effect, very high surface/volume ratio, enhanced surface reactivity, conductivity, electrical and magnetic properties of the nanomaterials offer great opportunity to develop very fast, sensitive, accurate and cost effective detection techniques and systems to detect chemical and biological (chem.-bio) warfare agents. Furthermore, surface modification of the materials is very easy and effective way to get functional or smart surfaces to be used as nano-biosensor platform. In that respect many different types of nanomaterials have been developed and used for the detection, remediation and protection, such as gold and silver nanoparticles, quantum dots, Nano chips and arrays, fluorescent polymeric and magnetic nanoparticles, fiber optic and cantilever based nanobiosensors, nanofibrillar nanostructures etc. This study summarizes preparation and characterization of nanotechnology based approaches for the detection of and remediation and protection against chem.-bio warfare agents.

  6. History of chemical and biological warfare agents

    International Nuclear Information System (INIS)

    Szinicz, L.

    2005-01-01

    Chemical and biological warfare agents constitute a low-probability, but high-impact risk both to the military and to the civilian population. The use of hazardous materials of chemical or biological origin as weapons and for homicide has been documented since ancient times. The first use of chemicals in terms of weapons of mass destruction goes back to World War I, when on April 22, 1915 large amounts of chlorine were released by German military forces at Ypres, Belgium. Until around the 1970s of the 20th century, the awareness of the threat by chemical and biological agents had been mainly confined to the military sector. In the following time, the development of increasing range delivery systems by chemical and biological agents possessors sensitised public attention to the threat emanating from these agents. Their proliferation to the terrorists field during the 1990s with the expanding scale and globalisation of terrorist attacks suggested that these agents are becoming an increasing threat to the whole world community. The following article gives a condensed overview on the history of use and development of the more prominent chemical and biological warfare agents

  7. History of chemical and biological warfare agents.

    Science.gov (United States)

    Szinicz, L

    2005-10-30

    Chemical and biological warfare agents constitute a low-probability, but high-impact risk both to the military and to the civilian population. The use of hazardous materials of chemical or biological origin as weapons and for homicide has been documented since ancient times. The first use of chemicals in terms of weapons of mass destruction goes back to World War I, when on April 22, 1915 large amounts of chlorine were released by German military forces at Ypres, Belgium. Until around the 1970s of the 20th century, the awareness of the threat by chemical and biological agents had been mainly confined to the military sector. In the following time, the development of increasing range delivery systems by chemical and biological agents possessors sensitised public attention to the threat emanating from these agents. Their proliferation to the terrorists field during the 1990s with the expanding scale and globalisation of terrorist attacks suggested that these agents are becoming an increasing threat to the whole world community. The following article gives a condensed overview on the history of use and development of the more prominent chemical and biological warfare agents.

  8. Photochemical transformation of the insensitive munitions compound 2,4-dinitroanisole

    Energy Technology Data Exchange (ETDEWEB)

    Rao, Balaji, E-mail: anandharaob@ornl.gov [Environmental Sciences Division, Oak Ridge National Laboratory, Oak Ridge, TN (United States); Wang, Wei [Environmental Sciences Division, Oak Ridge National Laboratory, Oak Ridge, TN (United States); Cai, Qingsong; Anderson, Todd [Department of Environmental Toxicology, The Institute of Environment and Human Health, Texas Tech University, Lubbock, TX (United States); Gu, Baohua, E-mail: gub1@ornl.gov [Environmental Sciences Division, Oak Ridge National Laboratory, Oak Ridge, TN (United States)

    2013-01-15

    The insensitive munitions compound 2,4-dinitroanisole (DNAN) is increasingly being used as a replacement for traditional, sensitive munitions compounds (e.g., trinitrotoluene [TNT]), but the environmental fate and photo-transformation of DNAN in natural water systems are currently unknown. In this study, we investigated the photo-transformation rates of DNAN with both ultraviolet (UV) and sunlight irradiation under different environmentally relevant conditions. Sunlight photo-transformation of DNAN in water was found to follow predominantly pseudo-first-order decay kinetics with an average half-life (t{sub 1/2}) of approximately 0.70 d and activation energy (E{sub a}) of 53 kJ mol{sup −1}. Photo-transformation rates of DNAN were dependent on the wavelength of the light source: irradiation with UV-B light (280–315 nm) resulted in a greater quantum yield of transformation (ϕ{sub UV-B} = 3.7 × 10{sup −4}) than rates obtained with UV-A light (ϕ{sub UV-A} = 2.9 × 10{sup −4} at 316–400 nm) and sunlight (ϕ{sub sun} = 1.1 × 10{sup −4}). Photo-oxidation was the dominant mechanism for DNAN photo-transformation, based on the formation of nitrite (NO{sub 2}{sup −}) and nitrate (NO{sub 3}{sup −}) as major N species and 2,4-dinitrophenol as the minor species. Environmental factors (e.g., temperature, pH, and the presence or absence of naturally dissolved organic matter) displayed modest to little effects on the rate of DNAN photo-transformation. These observations indicate that sunlight-induced photo-transformation of DNAN may represent a significant abiotic degradation pathway in surface water, which may have important implications in evaluating the potential impacts and risks of DNAN in the environment. - Highlights: ► DNAN photo-transformation kinetics was dependent on light source and temperature. ► Photolysis produced harmful by-products that included dinitrophenol and nitrate. ► Photo-oxidation was determined to be the likely pathway of DNAN

  9. The Geneva Protocol of 1925

    International Nuclear Information System (INIS)

    Mc Elroy, R.J.

    1991-01-01

    This paper reports that when President Gerald Ford signed the instruments of ratification for the Geneva Protocol of 1925 on January 22, 1975, a tortured, half-century-long chapter in U.S. arms control policy was brought to a close. Fifty years earlier, at the Geneva Conference for the Control of the International Trade in Arms, Munitions and Implements of War, the United States had played a key role in drafting and reaching agreement on the Protocol for the Prohibition of the Use in War of Asphyxiating, Poisonous or Other Gases and of Bacteriological Methods of Warfare. The protocol, signed by thirty nations, including the United States, on June 17, 1925, prohibits the use in war of asphyxiating, poisonous or other gases, and of all analogous liquids, materials or devices as well as the use of bacteriological methods of warfare

  10. Electronic Warfare: Towed Decoys Could Improve Survivability of Current Navy Aircraft

    National Research Council Canada - National Science Library

    Aiken, Michael

    1997-01-01

    Traditionally, DOD'S combat aircraft have used on-board electronic warfare devices called jammers for self-protection against radar-controlled weapons, including missiles and anti-aircraft artillery...

  11. Study on the identification method of chemical warfare agents with spectroscopy of neutron induced γ rays

    International Nuclear Information System (INIS)

    Liu Boxue; Li Yun; Li Xiangbao

    1996-01-01

    The paper briefly describes some non-destructive verification technologies of chemical warfare agents in-site, and some application of neutron induced gamma ray analysis, such as multi-elements analysis of coal, hidden explosive detection and identification of chemical agents. It also describes some problems in developing the portable isotopic neutron spectroscopy for non-destructive evaluation of chemical warfare agents

  12. Decontamination and Detoxification of Toxic Chemical Warfare Agents Using Polyurethane Sponges

    National Research Council Canada - National Science Library

    Gordon, Richard K; Gunduz, Alper T; Askins, LaTawnya Y; Strating, Simon J; Doctor, Bhupendra P; Clarkson, Edward D; Mitchelree, Larry W; Lukey, Brian; Railer, Roy; Schulz, Susan

    2003-01-01

    .... Another serious problem that may be encountered while caring for personnel contaminated with organophosphorus chemical warfare nerve agents is the possibility that there will be cross-contamination...

  13. GENE EXPRESSION CHANGES IN ARABIDOPSIS THALIANA SEEDLING ROOTS EXPOSED TO THE MUNITION HEXAHYDRO-1,3,5-TRINITRO-1,3,5-TRIAZINE

    Science.gov (United States)

    Arabidopsis thaliana root transcriptome responses to the munition, hexahydro-1,3,5-trinitro-1,3,5-triazine (RDX), were assessed using serial analysis of gene expression (SAGE). Comparison of the transcriptional profile for the RDX response to a profile previously described for Ar...

  14. Back to the Basics: An Aviation Solution to Counterinsurgent Warfare

    National Research Council Canada - National Science Library

    Davis, Arthur D

    2005-01-01

    .... By examining past examples of the use of air power in counterinsurgent warfare, this study sheds light on the United States' current failings in both equipment and doctrine as it wages this type of war...

  15. Artificial Intelligence and Moral intelligence

    OpenAIRE

    Laura Pana

    2008-01-01

    We discuss the thesis that the implementation of a moral code in the behaviour of artificial intelligent systems needs a specific form of human and artificial intelligence, not just an abstract intelligence. We present intelligence as a system with an internal structure and the structural levels of the moral system, as well as certain characteristics of artificial intelligent agents which can/must be treated as 1- individual entities (with a complex, specialized, autonomous or selfdetermined,...

  16. Hybrid analysis of multiaxis electromagnetic data for discrimination of munitions and explosives of concern

    Science.gov (United States)

    Friedel, M. J.; Asch, T. H.; Oden, C.

    2012-08-01

    The remediation of land containing munitions and explosives of concern, otherwise known as unexploded ordnance, is an ongoing problem facing the U.S. Department of Defense and similar agencies worldwide that have used or are transferring training ranges or munitions disposal areas to civilian control. The expense associated with cleanup of land previously used for military training and war provides impetus for research towards enhanced discrimination of buried unexploded ordnance. Towards reducing that expense, a multiaxis electromagnetic induction data collection and software system, called ALLTEM, was designed and tested with support from the U.S. Department of Defense Environmental Security Technology Certification Program. ALLTEM is an on-time time-domain system that uses a continuous triangle-wave excitation to measure the target-step response rather than traditional impulse response. The system cycles through three orthogonal transmitting loops and records a total of 19 different transmitting and receiving loop combinations with a nominal spatial data sampling interval of 20 cm. Recorded data are pre-processed and then used in a hybrid discrimination scheme involving both data-driven and numerical classification techniques. The data-driven classification scheme is accomplished in three steps. First, field observations are used to train a type of unsupervised artificial neural network, a self-organizing map (SOM). Second, the SOM is used to simultaneously estimate target parameters (depth, azimuth, inclination, item type and weight) by iterative minimization of the topographic error vectors. Third, the target classification is accomplished by evaluating histograms of the estimated parameters. The numerical classification scheme is also accomplished in three steps. First, the Biot-Savart law is used to model the primary magnetic fields from the transmitter coils and the secondary magnetic fields generated by currents induced in the target materials in the

  17. Hybrid analysis of multiaxis electromagnetic data for discrimination of munitions and explosives of concern

    Science.gov (United States)

    Friedel, M.J.; Asch, T.H.; Oden, C.

    2012-01-01

    The remediation of land containing munitions and explosives of concern, otherwise known as unexploded ordnance, is an ongoing problem facing the U.S. Department of Defense and similar agencies worldwide that have used or are transferring training ranges or munitions disposal areas to civilian control. The expense associated with cleanup of land previously used for military training and war provides impetus for research towards enhanced discrimination of buried unexploded ordnance. Towards reducing that expense, a multiaxis electromagnetic induction data collection and software system, called ALLTEM, was designed and tested with support from the U.S. Department of Defense Environmental Security Technology Certification Program. ALLTEM is an on-time time-domain system that uses a continuous triangle-wave excitation to measure the target-step response rather than traditional impulse response. The system cycles through three orthogonal transmitting loops and records a total of 19 different transmitting and receiving loop combinations with a nominal spatial data sampling interval of 20 cm. Recorded data are pre-processed and then used in a hybrid discrimination scheme involving both data-driven and numerical classification techniques. The data-driven classification scheme is accomplished in three steps. First, field observations are used to train a type of unsupervised artificial neural network, a self-organizing map (SOM). Second, the SOM is used to simultaneously estimate target parameters (depth, azimuth, inclination, item type and weight) by iterative minimization of the topographic error vectors. Third, the target classification is accomplished by evaluating histograms of the estimated parameters. The numerical classification scheme is also accomplished in three steps. First, the Biot–Savart law is used to model the primary magnetic fields from the transmitter coils and the secondary magnetic fields generated by currents induced in the target materials in the

  18. A Biography of the Trousered Munitions Women’s Uniform of World War 1

    OpenAIRE

    Roberts, Jennifer

    2017-01-01

    Ce chapitre fournit une vue d’ensemble de la recherche pour un exemple survivant de l’uniforme de pantalons des « munitionettes », alors que les travailleurs dans les usines de munitions dans la Première Guerre Mondiale étaient reconnus. Si nous examinons la réaction sur les femmes qui portent un vêtement d’homme et les discussions d’émancipation de cet uniforme, ces recherches ont étudié considérablement les archives jadis moins utilisées dans l’histoire des vêtements. Comme il n’existe plus...

  19. Cyber crime and cyber warfare with international cyber collaboration for RSA – preparing communities

    CSIR Research Space (South Africa)

    Grobler, M

    2012-03-01

    Full Text Available aspects come into play that may have an influence on the manner in which the military reacts to cyber attacks (Wilson 2007): ? new national security policy issues; ? consideration of psychological operations used to affect friendly nations... relationship between modern cyber space, cyber warfare and traditional legislation. As a starting point, cyber warfare is defined for the purpose of this article as the use of exploits in cyber space as a way to intentionally cause harm to people, assets...

  20. Particle Swarm Social Adaptive Model for Multi-Agent Based Insurgency Warfare Simulation

    Energy Technology Data Exchange (ETDEWEB)

    Cui, Xiaohui [ORNL; Potok, Thomas E [ORNL

    2009-12-01

    To better understand insurgent activities and asymmetric warfare, a social adaptive model for modeling multiple insurgent groups attacking multiple military and civilian targets is proposed and investigated. This report presents a pilot study using the particle swarm modeling, a widely used non-linear optimal tool to model the emergence of insurgency campaign. The objective of this research is to apply the particle swarm metaphor as a model of insurgent social adaptation for the dynamically changing environment and to provide insight and understanding of insurgency warfare. Our results show that unified leadership, strategic planning, and effective communication between insurgent groups are not the necessary requirements for insurgents to efficiently attain their objective.

  1. blitzkrieg to desert storm: the evolution of operational warfare

    African Journals Online (AJOL)

    a_nabb

    disease of stalemates infecting militaries before the Second World War. The invasion did not change the world; instead, it brought about an increased awareness of the importance of the operational level of war, a dimension of warfare previously neglected. The German operational effectiveness represented an evolution ...

  2. Biodiversity conservation and armed conflict: a warfare ecology perspective.

    Science.gov (United States)

    Hanson, Thor

    2018-04-23

    The activities involved in preparing for, executing, and recovering from armed conflict are globally pervasive and consequential, with significant impacts on natural systems. Effects on biodiversity are predominantly negative, produced by direct and indirect battlefield impacts, as well as the general breakdown of social, economic, and governance systems during wartime. Certain conservation opportunities do occur, however, particularly on lands set aside for training exercises, buffer zones, and peace parks. Here, the relationship between armed conflict and biodiversity is reviewed using the temporal framework of warfare ecology, which defines warfare as an ongoing process of three overlapping stages: preparations, war (armed conflict), and postwar activities. Several themes emerge from recent studies, including a heightened awareness of biodiversity conservation on military lands, the potential for scientific and conservation engagement to mitigate negative biodiversity impacts in war zones, and the importance of the postwar period for incorporating biodiversity priorities into reconstruction and recovery efforts. Research limitations and knowledge gaps are also discussed. © 2018 New York Academy of Sciences.

  3. The United States and biological warfare: secrets from the early cold war and Korea.

    Science.gov (United States)

    Bruwer, A

    2001-01-01

    The United States and Biological Warfare is about accusations that the United States resorted to bacteriological warfare at a time of great military stress during the Korean War. In December 1951, the then US Secretary of Defense ordered early readiness for offensive use of biological weapons. Soon afterwards, the North Korean and Chinese armies accused the United States of starting a large-scale biological warfare experiment in Korea. The US State Department denied the accusation. Both parties to the dispute maintain their positions today. The authors spent 20 years researching the accusations in North America, Europe and Japan. They were the first foreigners to be given access to Chinese classified documents. The reader is also introduced to the concept of 'plausible denial', an official US policy which allowed responsible governmental representatives to deny knowledge of certain events. The authors hope that their work will contribute to the understanding of a time when modern war expanded into a new type of violence.

  4. Maritime Trade Warfare Against a Modern Power

    Science.gov (United States)

    2013-05-20

    Malaysian and Singaporean support. Operational Environment The previous sections have assessed that an oil embargo would be effective at influencing...will be addressed. The first approach is to stop the trade at its source. This approach forms the foundation of many contemporary sanctions. Under...antisubmarine warfare capable ships, could be sufficient to defend against forces attempting to break a blockade, and a carrier battle group in the Indian Ocean

  5. Toward Operational Art in Special Warfare: Appendixes

    Science.gov (United States)

    2016-01-01

    language, proficiency in small-unit tactics, and the ability to build and fight alongside indigenous combat formations in a permissive, uncertain, or...counterinsurgency through and with indigenous forces or personnel.”1 The report has four aims: (1) to adapt conventional operational art to the unique...perfect near-real-time situational awareness,” at least at the tactical level of land warfare in complex terrain. But the idea of leveraging information

  6. Cyber warfare:terms, issues, laws and controversies

    OpenAIRE

    Seviş, Kamile Nur; Şeker, Ensar

    2016-01-01

    Recent years have shown us the importance of cybersecurity. Especially, when the matter is national security, it is even more essential and crucial. Increasing cyber attacks, especially between countries in governmental level, created a new term cyber warfare. Creating some rules and regulations for this kind of war is necessary therefore international justice systems are working on it continuously. In this paper, we mentioned fundamental terms of cyber...

  7. Intelligence Naturelle et Intelligence Artificielle

    OpenAIRE

    Dubois, Daniel

    2011-01-01

    Cet article présente une approche systémique du concept d’intelligence naturelle en ayant pour objectif de créer une intelligence artificielle. Ainsi, l’intelligence naturelle, humaine et animale non-humaine, est une fonction composée de facultés permettant de connaître et de comprendre. De plus, l'intelligence naturelle reste indissociable de la structure, à savoir les organes du cerveau et du corps. La tentation est grande de doter les systèmes informatiques d’une intelligence artificielle ...

  8. Biomonitoring of exposure to chemical warfare agents: A review

    NARCIS (Netherlands)

    Noort, D.; Benschop, H.P.; Black, R.M.

    2002-01-01

    In this report an overview of the methods currently available for detection of exposure to a number of chemical warfare agents (CWA), i.e., sulfur mustard, lewisite and nerve agents, is presented. Such methods can be applied for various purposes, e.g., diagnosis and dosimetry of exposure of

  9. Arsenal of democracy in the face of change: Precision Guided Munitions (PGMs), their evolution and some economic considerations, Working Paper No. 4

    Energy Technology Data Exchange (ETDEWEB)

    Chester, C.V.

    1990-08-01

    A brief study was made of some of the forces driving the move to Precision Guided Munitions (PGMs), including the quest for military effectiveness, combat experience, and logistic compression. PGMs cost from a few hundred to a few thousand dollars per Kg but are tens to hundreds of times more effective than conventional munitions. A year's peacetime plateau production of each US PGM can be carried by a few C-5 aircraft. Surge quantities of PGMs are within US airlift capabilities, taking some of the risk out of off-shore procurement. The improving capability of antiaircraft PGMs and the escalating cost of combat aircraft (50 to 100-fold in constant dollars since WW II) may bring into question the economic viability of manned attack aircraft. The same may be true to a slightly lesser degree for heavy armored vehicles. 14 refs., 5 tabs.

  10. Defense Small Business Innovation Research Program (SBIR) FY 1984.

    Science.gov (United States)

    1984-01-12

    Intelligence (AI) Software Program Development Aids DESCRIPTION: The technology of aritificial intelligence (AI) has evolved to the point that...advanced rotor/control concepts. 10. TITLE: Artificial Intelligence Techniques for Tactical Decision Aids DESCRIPTION: Current and planned C3 systems...application to intelligence , VISTA targeting, and responsive countermeasure activation. 16. TITLE: Research in Support of Electronic Warfare DESCRIPTION

  11. Understanding "Understanding" Flow for Network-Centric Warfare: Military Knowledge-Flow Mechanics

    National Research Council Canada - National Science Library

    Nissen, Mark

    2002-01-01

    Network-centric warfare (NCW) emphasizes information superiority for battlespace efficacy, but it is clear that the mechanics of how knowledge flows are just as important as those pertaining to the networks and communication...

  12. Manoeuvre warfare analysis of South Africa's 1914-1915 German ...

    African Journals Online (AJOL)

    The study reported in this article explored the nexus between military theory and history. Military theory attempts to quantify, qualify and illuminate the often unpredictable phenomenon of war. The article consists of two parts: the theory of manoeuvre warfare and the history of the 1914-1915 South African campaign in ...

  13. Potential Science and Technology Game Changers for the Ground Warfare of 2050: Selected Projections Made in 2017

    Science.gov (United States)

    2018-02-01

    ARL-TR-8283 ● FEB 2018 US Army Research Laboratory Potential Science and Technology Game Changers for the Ground Warfare of 2050...Science and Technology Game Changers for the Ground Warfare of 2050: Selected Projections Made in 2017 by Alexander Kott Office of the Director...Brian Sadler Vehicle Technology Directorate, ARL Ananthram Swami Computational and Information Sciences Directorate, ARL Approved for

  14. Management information systems for electronic warfare command and decision support

    CSIR Research Space (South Africa)

    Van Niekerk, B

    2015-04-01

    Full Text Available information to allow them to manage their own spectrum, to identify threats, and to deny adversaries’ use of the spectrum. In this paper, the concepts of integrated electronic warfare and spectrum battle management are introduced, and the relevant information...

  15. Ending the Debate: Unconventional Warfare, Foreign Internal Defense, and Why Words Matter

    National Research Council Canada - National Science Library

    Jones, D

    2006-01-01

    There is an ongoing debate within the Special Forces community whether unconventional warfare and foreign internal defense are applicable in the contemporary and future Special Operations environments...

  16. Sea-dumped chemical weapons: environmental risk, occupational hazard.

    Science.gov (United States)

    Greenberg, M I; Sexton, K J; Vearrier, D

    2016-01-01

    Chemical weapons dumped into the ocean for disposal in the twentieth century pose a continuing environmental and human health risk. In this review we discuss locations, quantity, and types of sea-dumped chemical weapons, related environmental concerns, and human encounters with sea-dumped chemical weapons. We utilized the Ovid (http://ovidsp.tx.ovid.com) and PubMed (http://www.pubmed.org) search engines to perform MEDLINE searches for the terms 'sea-dumped chemical weapons', 'chemical warfare agents', and 'chemical munitions'. The searches returned 5863 articles. Irrelevant and non-English articles were excluded. A review of the references for these articles yielded additional relevant sources, with a total of 64 peer-reviewed articles cited in this paper. History and geography of chemical weapons dumping at sea: Hundreds of thousands of tons of chemical munitions were disposed off at sea following World War II. European, Russian, Japanese, and United States coasts are the areas most affected worldwide. Several areas in the Baltic and North Seas suffered concentrated large levels of dumping, and these appear to be the world's most studied chemical warfare agent marine dumping areas. Chemical warfare agents: Sulfur mustard, Lewisite, and the nerve agents appear to be the chemical warfare agents most frequently disposed off at sea. Multiple other type of agents including organoarsenicals, blood agents, choking agents, and lacrimators were dumped at sea, although in lesser volumes. Environmental concerns: Numerous geohydrologic variables contribute to the rate of release of chemical agents from their original casings, leading to difficult and inexact modeling of risk of release into seawater. Sulfur mustard and the organoarsenicals are the most environmentally persistent dumped chemical agents. Sulfur mustard in particular has a propensity to form a solid or semi-solid lump with a polymer coating of breakdown products, and can persist in this state on the ocean floor

  17. Electronic warfare receivers and receiving systems

    CERN Document Server

    Poisel, Richard A

    2014-01-01

    Receivers systems are considered the core of electronic warfare (EW) intercept systems. Without them, the fundamental purpose of such systems is null and void. This book considers the major elements that make up receiver systems and the receivers that go in them.This resource provides system design engineers with techniques for design and development of EW receivers for modern modulations (spread spectrum) in addition to receivers for older, common modulation formats. Each major module in these receivers is considered in detail. Design information is included as well as performance tradeoffs o

  18. Punishment sustains large-scale cooperation in prestate warfare

    Science.gov (United States)

    Mathew, Sarah; Boyd, Robert

    2011-01-01

    Understanding cooperation and punishment in small-scale societies is crucial for explaining the origins of human cooperation. We studied warfare among the Turkana, a politically uncentralized, egalitarian, nomadic pastoral society in East Africa. Based on a representative sample of 88 recent raids, we show that the Turkana sustain costly cooperation in combat at a remarkably large scale, at least in part, through punishment of free-riders. Raiding parties comprised several hundred warriors and participants are not kin or day-to-day interactants. Warriors incur substantial risk of death and produce collective benefits. Cowardice and desertions occur, and are punished by community-imposed sanctions, including collective corporal punishment and fines. Furthermore, Turkana norms governing warfare benefit the ethnolinguistic group, a population of a half-million people, at the expense of smaller social groupings. These results challenge current views that punishment is unimportant in small-scale societies and that human cooperation evolved in small groups of kin and familiar individuals. Instead, these results suggest that cooperation at the larger scale of ethnolinguistic units enforced by third-party sanctions could have a deep evolutionary history in the human species. PMID:21670285

  19. Surface Warfare Officer Retention: Analysis of Individual Ready Reserve Survey Data

    National Research Council Canada - National Science Library

    Stoker, Carol; Crawford, Alice

    2008-01-01

    ... (including morale and lack of mentoring), push both men and women out of the Navy. Nonetheless, the Navy s primary effort to improve retention has been to introduce the Surface Warfare Officer Continuation Pay (SWOCP...

  20. DRES Database of Methods for the Analysis of Chemical Warfare Agents

    National Research Council Canada - National Science Library

    D'Agostino, Paul

    1997-01-01

    .... Update of the database continues as an ongoing effort and the DRES Database of Methods for the Analysis of Chemical Warfare Agents is available panel in hardcopy form or as a softcopy Procite or Wordperfect file...

  1. Mammalian Toxicity of Munition Compounds. Phase II. Effects of Multiple Doses. Part III. 2,6-Dinitrotoluene

    Science.gov (United States)

    1976-07-01

    and the neuromuscular effects in these dogs were not due to hypocalcemia . The lowest serum calcium concen- tration in these dogs was 4.2 meq/liter...motor end plate might produce a local hypocalcemia . Such a mechanism is purely speculative. Qualitatively and quantitavely, most of the effects of 2,6...I ýNw,- -MIM I/ MIDWEST RESEARCH INS14ITUTE H0q .3L I LU -_ MAMMALIAN TOXICITY OF MUNITIONS COMPOUlNDSPHASE II: EFFECTS OF MiULTIPLE DOSES C* •PART

  2. Nodes and Codes: The Reality of Cyber Warfare

    Science.gov (United States)

    2012-05-17

    respectively. The avionics in Boeing’s 787 Dreamliner require approximately 6.5 million lines of code while the current S-Class Mercedes Benz requires over 20...leaders (demonstrated through outdated policy, theory, and doctrine) and the reality of warfare in 1914 (dictated by innovation, technology , and...or the guidelines to military action codified in doctrine? How are states using the latest technological innovations as violent instruments of

  3. Identification system for chemical warfare agents with PGNAA method

    International Nuclear Information System (INIS)

    Wang Bairong; Yin Guanghua; Yang Zhongpin

    2007-01-01

    The principle and the experimental commanding of Chemical warfare Agents Identification with PGNAA method are discussed in this paper. The choosing of detector, neutron source and the data processing method are detailed. Finally, a set of experimental instruments composed of Cf-232 and BGO detector is developed based on this theory discussed above. (authors)

  4. Nuclear radiation in warfare

    International Nuclear Information System (INIS)

    Rotblat, J.

    1986-01-01

    The subject is covered in chapters, entitled: introduction; digest of nuclear weaponry (characteristics of nuclear weapons; effects of nuclear weapons other than ionizing radiation (fire-ball, fall-out, thermal radiation, blast wave, electromagnetic pulse); the nuclear arms race; war scenarios; biological effects of radiations on man (radiation doses; natural sources of radiation; acute effects of radiation; long-term somatic effects; genetic effects; factors affecting the biological response to radiation; internal exposure; synergistic effects; protection against radiation effects); radiations from nuclear explosions (initial radiation; fall-out; effects of fall-out on animal and plant life; contamination of water and food supplies by fall-out); radiation casualties in a nuclear war; effectiveness of civil defence; other warlike uses of radiation (attacks on civilian nuclear power installations; radiological warfare; terrorist activities); conclusion. (orig./HP) [de

  5. Nuclear radiation in warfare

    International Nuclear Information System (INIS)

    Rotblat, J.

    1981-01-01

    The subject is covered in chapters, entitled: introduction; digest of nuclear weaponry (characteristics of nuclear weapons; effects of nuclear weapons other than ionizing radiation (fire-ball, fall-out, thermal radiation, blast wave, electromagnetic pulse); the nuclear arms race; war scenarios); biological effects of radiations on man (radiation doses; natural sources of radiation; acute effects of radiation; long-term somatic effects; genetic effects; factors affecting the biological response to radiation; internal exposure; synergistic effects; protection against radiation effects); radiations from nuclear explosions (initial radiation; fall-out; effects of fall-out on animal and plant life; contamination of water and food supplies by fall-out); radiation casualties in a nuclear war; effectiveness of civil defence; other warlike uses of radiation (attacks on civilian nuclear power installations; radiological warfare; terrorist activities); conclusion. (U.K.)

  6. Operational advantages of using Cyber Electronic Warfare (CEW) in the battlefield

    Science.gov (United States)

    Yasar, Nurgul; Yasar, Fatih M.; Topcu, Yucel

    2012-06-01

    While cyberspace is emerging as a new battlefield, conventional Electronic Warfare (EW) methods and applications are likely to change. Cyber Electronic Warfare (CEW) concept which merges cyberspace capabilities with traditional EW methods, is a new and enhanced form of the electronic attack. In this study, cyberspace domain of the battlefield is emphazised and the feasibility of integrating Cyber Warfare (CW) concept into EW measures is researched. The SWOT (Strengths, Weaknesses, Opportunities and Threats) analysis method is used to state the operational advantages of using CEW concept in the battlefield. The operational advantages of CEW are assessed by means of its effects on adversary air defense systems, communication networks and information systems. Outstanding technological and operational difficulties are pointed out as well. As a result, a comparison of CEW concept and conventional EW applications is presented. It is concluded that, utilization of CEW concept is feasible at the battlefield and it may yield important operational advantages. Even though the computers of developed military systems are less complex than normal computers, they are not subjected to cyber threats since they are closed systems. This concept intends to show that these closed systems are also open to the cyber threats. As a result of the SWOT analysis, CEW concept provides Air Forces to be used in cyber operations effectively. On the other hand, since its Collateral Damage Criteria (CDC) is low, the usage of cyber electronic attack systems seems to grow up.

  7. Personal protection during resuscitation of casualties contaminated with chemical or biological warfare agents--a survey of medical first responders.

    Science.gov (United States)

    Brinker, Andrea; Prior, Kate; Schumacher, Jan

    2009-01-01

    The threat of mass casualties caused by an unconventional terrorist attack is a challenge for the public health system, with special implications for emergency medicine, anesthesia, and intensive care. Advanced life support of patients injured by chemical or biological warfare agents requires an adequate level of personal protection. The aim of this study was to evaluate the personal protection knowledge of emergency physicians and anesthetists who would be at the frontline of the initial health response to a chemical/biological warfare agent incident. After institutional review board approval, knowledge of personal protection measures among emergency medicine (n = 28) and anesthetics (n = 47) specialty registrars in the South Thames Region of the United Kingdom was surveyed using a standardized questionnaire. Participants were asked for the recommended level of personal protection if a chemical/biological warfare agent(s) casualty required advanced life support in the designated hospital resuscitation area. The best awareness within both groups was regarding severe acute respiratory syndrome, and fair knowledge was found regarding anthrax, plague, Ebola, and smallpox. In both groups, knowledge about personal protection requirements against chemical warfare agents was limited. Knowledge about personal protection measures for biological agents was acceptable, but was limited for chemical warfare agents. The results highlight the need to improve training and education regarding personal protection measures for medical first receivers.

  8. Efikasnost sistema PVO u uslovima elektronskih dejstava / Efficiency of antiaircraft system in electronic warfare

    Directory of Open Access Journals (Sweden)

    Vladimir V. Šepec

    2007-01-01

    Full Text Available U radu je primenjena teorija masovnog opsluživanja u analizi efikasnosti sistema protivvazduhoplovne odbrane (sistema PVO u uslovima elektronskih dejstava protivnika. Prikazan je model za ocenu efikasnosti sistema PVO i predstavljeni su izrazi za procenu efikasnosti sistema PVO u uslovima elektronskih dejstava. / In this article the theory of mass servicing is used in the analysis of efficiency of antiaircraft system in the conditions of electronic warfare. The model for analysis of the antiaircraft system efficiency has been shown and formulas for qualitative analysis of antiaircraft system efficiency have been presented in the conditions of electronic warfare.

  9. CRUSER's Warfare Innovation Workshop Focused on Hybrid War in the Urban Littorals

    OpenAIRE

    Ehrlich, Michael

    2017-01-01

    News Stories Archive The Naval Postgraduate School (NPS) Consortium for Robotics and Unmanned Systems Education and Research, CRUSER, hosted its annual Warfare Innovation Workshop (WIW) in Glasgow Hall, Sept. 18-21.

  10. From Douhet to drones, air warfare, and the evolution of targeting

    NARCIS (Netherlands)

    Osinga, F.P.B.; Roorda, M.P.; Ducheine, P.A.L.; Schmitt, M.N.; Osinga, F.P.B.

    2016-01-01

    Through the prism of the experience of air warfare, this chapter identifies key factors that have shaped targeting. These include technological developments, organizational structures, and processes and inter-service competition for scarce resources. Moreover, targeting is informed by perspectives

  11. Information Warfare, Threats and Information Security

    Directory of Open Access Journals (Sweden)

    Dmitriy Nikolaevich Bespalov

    2014-01-01

    Full Text Available The article presents the opposite, but dependent on each other's reality - Revolutionary War information,information security goals and objectives of their study within the scheme "challenge-response", methodological and analytical support, the role of elites and the information society in promoting information security. One of the features of contemporaneityis the global spread of ICT, combined with poor governance and other difficulties in the construction of innovation infrastructures that are based on them in some countries. This leads to the reproduction of threats, primarily related to the ability to use ICT for purposes that are inconsistent with the objectives of maintaining international peace and security, compliance with the principles of non-use of force, non-interference in the internal affairs of states, etc. In this regard, include such terms as "a threat of information warfare", "information terrorism" and so forth. Information warfare, which stay in the policy declared the struggle for existence, and relationships are defined in terms of "friend-enemy", "ours-foreign". Superiority over the opponent or "capture of its territory" is the aim of political activity. And information security, serving activities similar process of political control, including a set of components, is a technology until their humanitarian. From the context and the decision itself is the ratio of the achieved results of information and political influence to the target - a positive image of Russia. Bringing its policy in line with the demands of a healthy public opinion provides conductivity of theauthorities initiatives in the country and increases the legitimacy of the Russian Federation actions in the world.

  12. Littoral Combat Ship Open Ocean Anti-Submarine Warfare

    Science.gov (United States)

    2014-06-01

    maintain stealth and its defense in order to properly conduct an attack on a surface vessel (Sternhell and Thorndike 2014, 102). This statement...its target, the surface combatants can counter by increasing their speed (Sternhell and Thorndike 2014). While the maximum speed of the current...120316_PS.pdf Sternhell, Charles M, and Alan M Thorndike . 2014. “Antisubmarine Warfare in World War II.” CNA Analysis & Solutions. Accessed April 14, 2014

  13. Russian and Chinese Information Warfare: Theory and Practice

    Science.gov (United States)

    2004-06-01

    Integral neurolinguistic programming •Placing essential programs into the conscious or sub- conscious mind •Subconscious suggestions that modify human...Generators of special rays •Optical systems • Neurolinguistic programming •Computer psychotechnology •The mass media •Audiovisual effects •Special effects...Information Warfare: Theory and Practice 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER 6. AUTHOR(S) 5d. PROJECT NUMBER 5e

  14. Recent canadian experience in chemical warfare agent destruction. An overview

    Energy Technology Data Exchange (ETDEWEB)

    McAndless, J.M.

    1995-09-01

    A Canadian chemical warfare agent destruction project (Swiftsure) was recently completed in which stockpiles of aged mustard, lewisite, nerve agents and contaminated scrap metal were incinerated or chemically neutralized in a safe, environmentally-responsible manner. The project scope, destruction technologies, environmental monitoring and public consultation programs are described.

  15. Destruction of chemical warfare surrogates using a portable atmospheric pressure plasma jet

    Science.gov (United States)

    Škoro, Nikola; Puač, Nevena; Živković, Suzana; Krstić-Milošević, Dijana; Cvelbar, Uroš; Malović, Gordana; Petrović, Zoran Lj.

    2018-01-01

    Today's reality is connected with mitigation of threats from the new chemical and biological warfare agents. A novel investigation of cold plasmas in contact with liquids presented in this paper demonstrated that the chemically reactive environment produced by atmospheric pressure plasma jet (APPJ) is potentially capable of rapid destruction of chemical warfare agents in a broad spectrum. The decontamination of three different chemical warfare agent surrogates dissolved in liquid is investigated by using an easily transportable APPJ. The jet is powered by a kHz signal source connected to a low-voltage DC source and with He as working gas. The detailed investigation of electrical properties is performed for various plasmas at different distances from the sample. The measurements of plasma properties in situ are supported by the optical spectrometry measurements, whereas the high performance liquid chromatography measurements before and after the treatment of aqueous solutions of Malathion, Fenitrothion and Dimethyl Methylphosphonate. These solutions are used to evaluate destruction and its efficiency for specific neural agent simulants. The particular removal rates are found to be from 56% up to 96% during 10 min treatment. The data obtained provide basis to evaluate APPJ's efficiency at different operating conditions. The presented results are promising and could be improved with different operating conditions and optimization of the decontamination process.

  16. 32 CFR 518.9 - Reading room.

    Science.gov (United States)

    2010-07-01

    ... RELATIONS THE FREEDOM OF INFORMATION ACT PROGRAM FOIA Reading Rooms § 518.9 Reading room. (a) Reading room... clearly unwarranted invasions of privacy, or competitive harm to business submitters. In appropriate cases... information concerning munitions, equipment, systems, and intelligence activities. (4) (a)(2)(D) records...

  17. Axial Vircator for Electronic Warfare Applications

    Directory of Open Access Journals (Sweden)

    L. Drazan

    2009-12-01

    Full Text Available This paper deals with a high power microwave generator with virtual cathode – vircator in axial release for electronic warfare applications. The classification of directed energy weapons microwave (DEWM is introduced together with basic block diagrams of a particular class of DEWM. In the paper, methods for designing vircator pulsed power supply, axial vircator structure, measurement methods and experimental results are presented. The vircator in electromagnetic ammunition is powered by magneto-cumulative generator and in weapons for defense of objects (WDO, it is powered by Marx generator. The possible applications of a vircator in the DEWM area are discussed.

  18. The Rapier or the Club: The Relationship between Attrition and Maneuver Warfare

    National Research Council Canada - National Science Library

    Springman, Jeffrey A

    2006-01-01

    ...? This project compares the relationship between attrition and maneuver warfare. The study considers whether there are times when wars of attrition should be fought, and whether there are conditions that force wars of attrition...

  19. Nanostructured Metal Oxides for Stoichiometric Degradation of Chemical Warfare Agents

    Czech Academy of Sciences Publication Activity Database

    Štengl, Václav; Henych, Jiří; Janos, P.; Skoumal, M.

    2016-01-01

    Roč. 236, č. 2016 (2016), s. 239-258 ISSN 0179-5953 R&D Projects: GA ČR(CZ) GAP106/12/1116 Institutional support: RVO:61388980 Keywords : chemical warfare agent * metal nanoparticle * unique surface- chemistry * mesoporous manganese oxide Subject RIV: CA - Inorganic Chemistry Impact factor: 3.930, year: 2016

  20. Reflections on nuclear warfare

    International Nuclear Information System (INIS)

    Evans, J.P.

    1983-01-01

    The author looks back on his more than 70 years of familiarity with Americans involved in warfare, noting their loyal support for our country's objectives. Drawing on the Einstein equation, his own visits to Hiroshima and Nagasaki, and current literature, he, as a physician, belatedly concurs with those who look on the use of nuclear weapons as irrational and untenable. Their employment under present circumstances would create a ''final epidemic'' to be avoided only by prevention. He suggests that medical perceptions must be considered by our national leaders in assessing the many factors that he hopes will lead to rational answers to this urgent, highly complex, and vital enigma. He cites physicians' efforts to help in finding answers and asks that his colleagues consider the issues with attention to the gravity of the situation and act according to their best judgment

  1. Just War and Postmodern Warfare: A German Case Study

    Science.gov (United States)

    2015-04-01

    warfare construct, Germany is shaping a military concept based on recent conflicts and unfettered by biases of conventional strategies, organizations...remain sovereign while subconsciously evolving toward liberal democratic ideas. In respecting each country’s political sensitivities, Germany’s...before exhausting all diplomatic, economic and information instruments. Whereas the term AU/ACSC/PINSON/AY15 13 “interests” may bias the United

  2. Development of Bicarbonate-Activated Peroxide as a Chemical and Biological Warfare Agent Decontaminant

    National Research Council Canada - National Science Library

    Richardson, David E

    2006-01-01

    ...) and other chemistry for the decontamination of chemical and biological warfare agents. The mechanism of formation of the active oxidant, peroxymonocarbonate, has been investigated in detail. New surfoxidants...

  3. The Abbott and Costello Effect: Who's on What, and What's Where When? A Human-Centered Method to Investigate Network Centric Warfare Systems

    National Research Council Canada - National Science Library

    Reed, Derek W

    2007-01-01

    ...), fundamentally changing how warfare is being conducted. Network centric warfare (NCW) systems are being rushed to the field and are offered as a solution for the fog of war and as a way to reduce manpower costs...

  4. Modeling the transport of chemical warfare agents and simulants in polymeric substrates for reactive decontamination

    Science.gov (United States)

    Pearl, Thomas; Mantooth, Brent; Varady, Mark; Willis, Matthew

    2014-03-01

    Chemical warfare agent simulants are often used for environmental testing in place of highly toxic agents. This work sets the foundation for modeling decontamination of absorbing polymeric materials with the focus on determining relationships between agents and simulants. The correlations of agents to simulants must consider the three way interactions in the chemical-material-decontaminant system where transport and reaction occur in polymer materials. To this end, diffusion modeling of the subsurface transport of simulants and live chemical warfare agents was conducted for various polymer systems (e.g., paint coatings) with and without reaction pathways with applied decontamination. The models utilized 1D and 2D finite difference diffusion and reaction models to simulate absorption and reaction in the polymers, and subsequent flux of the chemicals out of the polymers. Experimental data including vapor flux measurements and dynamic contact angle measurements were used to determine model input parameters. Through modeling, an understanding of the relationship of simulant to live chemical warfare agent was established, focusing on vapor emission of agents and simulants from materials.

  5. Inside the Wire: American Security and Cyber Warfare

    Science.gov (United States)

    2017-03-01

    Roberts, Kerry V. " SUN TZU and The Art of Cyber Warfare." Journal of Counterterrorism & Homeland Security International 19, no. 1(Spring 2013): 12-4...12. REPORT TYPE 3. DATES COVERED (From - To) 01-03-2017 Bibliography 4. TITLE AND SUBTITLE Sa. CONTRACT NUMBER Inside the Wire: American Security...MCDERMOTT LIBRARY U.S. AIR FORCE ACADEMY 11. SPONSOR/MONITOR’S REPORT USAF ACADEMY CO 80840-6214 NUMBER(S) Special Bibliography Series # 119 12

  6. Bioconcentration factors and plant-water partition coefficients of munitions compounds in barley.

    Science.gov (United States)

    Torralba-Sanchez, Tifany L; Kuo, Dave T F; Allen, Herbert E; Di Toro, Dominic M

    2017-12-01

    Plants growing in the soils at military ranges and surrounding locations are exposed, and potentially able to uptake, munitions compounds (MCs). The extent to which a compound is transferred from the environment into organisms such as plants, referred to as bioconcentration, is conventionally measured through uptake experiments with field/synthetic soils. Multiple components/phases that vary among different soil types and affect the bioavailability of the MC, however, hinder the ability to separate the effects of soil characteristics from the MC chemical properties on the resulting plant bioconcentration. To circumvent the problem, this work presents a protocol to measure steady state bioconcentration factors (BCFs) for MCs in barley (Hordeum vulgare L.) using inert laboratory sand rather than field/synthetic soils. Three MCs: 2,4,6-trinitrotoluene (TNT), 2,4-dinitrotoluene (2,4-DNT), and 2,4-dinitroanisole (2,4-DNAN), and two munition-like compounds (MLCs): 4-nitroanisole (4-NAN) and 2-methoxy-5-nitropyridine (2-M-5-NPYNE) were evaluated. Approximately constant plant biomass and exposure concentrations were achieved within a one-month period that produced steady state log BCF values: 0.62 ± 0.02, 0.70 ± 0.03, 1.30 ± 0.06, 0.52 ± 0.03, and 0.40 ± 0.05 L kg plant dwt -1 for TNT, 2,4-DNT, 2,4-DNAN, 4-NAN, and 2-M-5-NPYNE, respectively. Furthermore, results suggest that the upper-bounds of the BCFs can be estimated within an order of magnitude by measuring the partitioning of the compounds between barley biomass and water. This highlights the importance of partition equilibrium as a mechanism for the uptake of MCs and MLCs by barley from interstitial water. The results from this work provide chemically meaningful data for prediction models able to estimate the bioconcentration of these contaminants in plants. Copyright © 2017 Elsevier Ltd. All rights reserved.

  7. A New Dimension of Business Intelligence: Location-based Intelligence

    OpenAIRE

    Zeljko Panian

    2012-01-01

    Through the course of this paper we define Locationbased Intelligence (LBI) which is outgrowing from process of amalgamation of geolocation and Business Intelligence. Amalgamating geolocation with traditional Business Intelligence (BI) results in a new dimension of BI named Location-based Intelligence. LBI is defined as leveraging unified location information for business intelligence. Collectively, enterprises can transform location data into business intelligence applic...

  8. Special Operations And Cyber Warfare

    Science.gov (United States)

    2016-12-01

    Cyber weapons have multiple functions and can be used for espionage or OPE. It is important to highlight the similarities between the intelligence...James Clapper, Director of National Intelligence, emphasized the importance of cyber operations as he identified cyber as the third major hazard facing...support the development of the capacity and capability of foreign security forces and their supporting institutions.”52 The DOD’s Cyber Strategy states

  9. Special Operations Forces: C-130 Upgrade Plan Could Help Fix Electronic Warfare Deficiencies

    National Research Council Canada - National Science Library

    1998-01-01

    In response to a concern that threats to the U.S. Special Operations Command's (USSOCOM) aircraft are increasing, while funds available for electronic warfare are decreasing, the General Accounting Office...

  10. Combinatorial Auction Theory Applied to the Selection of Surface Warfare Officer Retention Incentives

    National Research Council Canada - National Science Library

    Denmond, Constance M; Johnson, Derek N; Lewis, Chavius G; Zegley, Christopher R

    2007-01-01

    The purpose of this project is to investigate the potential retention and cost impacts of offering combinations of retention base incentives to members of the Surface Warfare Officer (SWO) community...

  11. Intelligence analysis – the royal discipline of Competitive Intelligence

    Directory of Open Access Journals (Sweden)

    František Bartes

    2011-01-01

    Full Text Available The aim of this article is to propose work methodology for Competitive Intelligence teams in one of the intelligence cycle’s specific area, in the so-called “Intelligence Analysis”. Intelligence Analysis is one of the stages of the Intelligence Cycle in which data from both the primary and secondary research are analyzed. The main result of the effort is the creation of added value for the information collected. Company Competiitve Intelligence, correctly understood and implemented in business practice, is the “forecasting of the future”. That is forecasting about the future, which forms the basis for strategic decisions made by the company’s top management. To implement that requirement in corporate practice, the author perceives Competitive Intelligence as a systemic application discipline. This approach allows him to propose a “Work Plan” for Competitive Intelligence as a fundamental standardized document to steer Competitive Intelligence team activities. The author divides the Competitive Intelligence team work plan into five basic parts. Those parts are derived from the five-stage model of the intelligence cycle, which, in the author’s opinion, is more appropriate for complicated cases of Competitive Intelligence.

  12. Feasibility Study for the Use of Green, Bio-Based, Efficient Reactive Sorbent Material to Neutralize Chemical Warfare Agents

    Science.gov (United States)

    2012-08-02

    REPORT Feasibility study for the use of green, bio-based, efficient reactive sorbent material to neutralize chemical warfare agents 14. ABSTRACT 16...way cellulose, lignin and hemicelluloses interact as well as whole wood dissolution occurs in ILs. The present project was conducted to 1. REPORT...Feasibility study for the use of green, bio-based, efficient reactive sorbent material to neutralize chemical warfare agents Report Title ABSTRACT Over the

  13. Spiritual Intelligence, Emotional Intelligence and Auditor’s Performance

    OpenAIRE

    Hanafi, Rustam

    2010-01-01

    The objective of this research was to investigate empirical evidence about influence audi-tor spiritual intelligence on the performance with emotional intelligence as a mediator variable. Linear regression models are developed to examine the hypothesis and path analysis. The de-pendent variable of each model is auditor performance, whereas the independent variable of model 1 is spiritual intelligence, of model 2 are emotional intelligence and spiritual intelligence. The parameters were estima...

  14. A identification system for chemical warfare agents with PGNAA method

    International Nuclear Information System (INIS)

    Wang Bairong; Yin Guanghua; Yang Zhongping

    2006-01-01

    The principle and the experimental commanding of Chemical warfare Agents Identification with PGNAA method are discussed in this paper. The choosing of Detector, neutron source and the data processing method are detailed. Finally, a set of experimental instruments composed of Cf-232 and BGO detector is developed based on the theory discussed above. (authors)

  15. Information Warfare: Issues Associated with the Defense of DOD Computers and Computer Networks

    National Research Council Canada - National Science Library

    Franklin, Derek

    2002-01-01

    ... that may threaten the critical information pathways of the armed forces An analysis of the history of computer information warfare reveals that there was an embarrassing lack of readiness and defense...

  16. Cultural Competence and the Operational Commander: Moving Beyond Cultural Awareness into Culture-Centric Warfare

    National Research Council Canada - National Science Library

    Karcanes, James A

    2007-01-01

    .... Understanding the different levels of cultural awareness -- cultural consideration, cultural understanding, and cultural competence -- will help usher in a new focus on culture-centric warfare...

  17. Warfare, genocide, and ethnic conflict: a Darwinian approach

    OpenAIRE

    Dimijian, Gregory G.

    2010-01-01

    As the 21st century dawns, I reflect on the history of humankind with growing concern about the need to understand the underlying biological and cultural roots of ethnic conflict and warfare. In the many studies of human conflict, innate biological predispositions have been neglected. This article is the third part of a series of seminars for medical residents at the University of Texas Southwestern Medical School at Dallas (see http://adarwinstudygroup.org/). The series starts with in-depth ...

  18. Recent Advances in Decontamination of Chemical Warfare Agents

    OpenAIRE

    Abdul Wadood Khan; Sabna Kotta; Shahid Husain Ansari; Javed Ali; Rakesh Kumar Sharma

    2013-01-01

    The recent turmoil and volatile situation in many countries and the increased risk of terrorist activities have raised alarm bells for the field of defense against toxic chemical/materials. These situations poses threats to society as terrorists can take advantage of such situations to strike and cause public mayhem. A number of chemicals have the potential of being used as chemical warfare (CW) agents. CW agents could immediately kill or incapacitate the affected individuals even when they a...

  19. Investigating the Relationship Between Drone Warfare and Civilian Casualties in Gaza

    Directory of Open Access Journals (Sweden)

    Dr. Ann Rogers

    2014-12-01

    Full Text Available Unmanned aerial vehicles (UAVs, better known as drones, are increasingly touted as ‘humanitarian’ weapons that contribute positively to fighting just wars and saving innocent lives. At the same time, civilian casualties have become the most visible and criticized aspect of drone warfare. It is argued here that drones contribute to civilian casualties not in spite of, but because of, their unique attributes. They greatly extend war across time and space, pulling more potential threats and targets into play over long periods, and because they are low-risk and highly accurate, they are more likely to be used. The assumption that drones save lives obscures a new turn in strategic thinking that sees states such as Israel and the US rely on large numbers of small, highly discriminating attacks applied over time to achieve their objectives. This examination of Israel’s 2014 war in Gaza argues that civilian casualties are not an unexpected or unintended consequence of drone warfare, but an entirely predictable outcome.

  20. Developmental Testing of Liquid and Gaseous/Vaporous Decontamination on Bacterial Spores and Other Biological Warfare Agents on Military Relevant Surfaces

    Science.gov (United States)

    2016-02-11

    Vaporous Decontamination on Bacterial Spores and Other Biological Warfare Agents on Military-Relevant Surfaces 5a. CONTRACT NUMBER 5b. GRANT... DECONTAMINATION ON BACTERIAL SPORES AND OTHER BIOLOGICAL WARFARE AGENTS ON MILITARY-RELEVANT SURFACES Page Paragraph 1. SCOPE...surfaces before and after decontamination . The protocol in this TOP is based on the developed test methodologies from Edgewood Chemical Biological

  1. A new General Purpose Decontamination System for Chemical and Biological Warfare and Terrorism Agents

    National Research Council Canada - National Science Library

    Khetan, Sushil; Banerjee, xdDeboshri; Chanda, Arani; Collins, Terry

    2003-01-01

    Partial contents: Fe-TAML Activator of Peroxide,Activators of Hydrogen peroxide,Biological Warfare Agents,Bacterial Endospore,Bacterial Spore Deactivation,Modeling Studies,Deactivation Studies with Bacillus spores...

  2. Artificial Intelligence (AI) Based Tactical Guidance for Fighter Aircraft

    Science.gov (United States)

    McManus, John W.; Goodrich, Kenneth H.

    1990-01-01

    A research program investigating the use of Artificial Intelligence (AI) techniques to aid in the development of a Tactical Decision Generator (TDG) for Within Visual Range (WVR) air combat engagements is discussed. The application of AI programming and problem solving methods in the development and implementation of the Computerized Logic For Air-to-Air Warfare Simulations (CLAWS), a second generation TDG, is presented. The Knowledge-Based Systems used by CLAWS to aid in the tactical decision-making process are outlined in detail, and the results of tests to evaluate the performance of CLAWS versus a baseline TDG developed in FORTRAN to run in real-time in the Langley Differential Maneuvering Simulator (DMS), are presented. To date, these test results have shown significant performance gains with respect to the TDG baseline in one-versus-one air combat engagements, and the AI-based TDG software has proven to be much easier to modify and maintain than the baseline FORTRAN TDG programs. Alternate computing environments and programming approaches, including the use of parallel algorithms and heterogeneous computer networks are discussed, and the design and performance of a prototype concurrent TDG system are presented.

  3. MOFwich: Sandwiched Metal-Organic Framework-Containing Mixed Matrix Composites for Chemical Warfare Agent Removal.

    Science.gov (United States)

    Peterson, Gregory W; Lu, Annie X; Hall, Morgan G; Browe, Matthew A; Tovar, Trenton; Epps, Thomas H

    2018-02-28

    This work describes a new strategy for fabricating mixed matrix composites containing layered metal-organic framework (MOF)/polymer films as functional barriers for chemical warfare agent protection. Through the use of mechanically robust polymers as the top and bottom encasing layers, a high-MOF-loading, high-performance-core layer can be sandwiched within. We term this multifunctional composite "MOFwich". We found that the use of elastomeric encasing layers enabled core layer reformation after breakage, an important feature for composites and membranes alike. The incorporation of MOFs into the core layer led to enhanced removal of chemical warfare agents while simultaneously promoting moisture vapor transport through the composite, showcasing the promise of these composites for protection applications.

  4. Intelligence analysis – the royal discipline of Competitive Intelligence

    OpenAIRE

    František Bartes

    2011-01-01

    The aim of this article is to propose work methodology for Competitive Intelligence teams in one of the intelligence cycle’s specific area, in the so-called “Intelligence Analysis”. Intelligence Analysis is one of the stages of the Intelligence Cycle in which data from both the primary and secondary research are analyzed. The main result of the effort is the creation of added value for the information collected. Company Competiitve Intelligence, correctly understood and implemented in busines...

  5. PINS Spectrum Identification Guide

    Energy Technology Data Exchange (ETDEWEB)

    A.J. Caffrey

    2012-03-01

    The Portable Isotopic Neutron Spectroscopy—PINS, for short—system identifies the chemicals inside munitions and containers without opening them, a decided safety advantage if the fill chemical is a hazardous substance like a chemical warfare agent or an explosive. The PINS Spectrum Identification Guide is intended as a reference for technical professionals responsible for the interpretation of PINS gamma-ray spectra. The guide is divided into two parts. The three chapters that constitute Part I cover the science and technology of PINS. Neutron activation analysis is the focus of Chapter 1. Chapter 2 explores PINS hardware, software, and related operational issues. Gamma-ray spectral analysis basics are introduced in Chapter 3. The six chapters of Part II cover the identification of PINS spectra in detail. Like the PINS decision tree logic, these chapters are organized by chemical element: phosphorus-based chemicals, chlorine-based chemicals, etc. These descriptions of hazardous, toxic, and/or explosive chemicals conclude with a chapter on the identification of the inert chemicals, e.g. sand, used to fill practice munitions.

  6. Defense Base Closure and Realignment Budget Data for the Naval Surface Warfare Center

    National Research Council Canada - National Science Library

    1993-01-01

    ... and realignment military construction projects. This report provides the results of the audit related to the realignment of Naval Surface Warfare Centers elements in White Oak, Maryland, and Panama City, Florida, to Dahlgren, Virginia...

  7. The Army Ground Forces Training for Mountain and Winter Warfare - Study No. 23

    National Research Council Canada - National Science Library

    Govan, Thomas

    1946-01-01

    This general study of the experiments in mountain and winter warfare training from 1940 to 1944 is designed as an introduction to the histories of the Mountain Training Center and The 10th Mountain...

  8. Report of the Defense Science Board Summer Study Task Force on Information Architecture for the Battlefield

    Science.gov (United States)

    1994-10-01

    information warfare has many elements, some new, some old, which interrelate in complex ways. Some are: "• Psychological operations and perception...and information systems." Some aspects of Information Warfare are very old - for example, what we now call Psychological Operations. Some are...Communications, and Intelligence) ASOC Air Support Operations Center ASTEC Advanced Satellite Technology and EHF Communications ATARS Advanced Tactical

  9. Conflict Without Casualties: Non-Lethal Weapons in Irregular Warfare

    Science.gov (United States)

    2007-09-01

    the body,” and the Geneva Protocol of 1925, bans the use of chemical and biological weapons .11 On 8 April 1975, President Ford issued Executive...E Funding – PE 63851M) (accessed 15 December 2006). The American Journal of Bioethics . “Medical Ethics and Non-Lethal Weapons .” Bioethics.net...CASUALTIES: NON-LETHAL WEAPONS IN IRREGULAR WARFARE by Richard L. Scott September 2007 Thesis Advisor: Robert McNab Second Reader

  10. Annihilation Prediction for Lanchester-Type Models of Modern Warfare

    OpenAIRE

    Brown, G.G.; Taylor, J.

    1983-01-01

    Operations Research, 31, p.752. This paper introduces important new functions for analytic solution of Launch-ester-type equations of modern warfare for combat between two homogeneous forces modeled by power attrtition-rate coefficients with "no offset". Tabulations of these Lanchester-Clifford-Schlatii (or LCS) functions allow one to study this particular variable-coefficient model almost as easily and thoroughly as Lanchester's classic constant-coefficient one. LCS functions allow one ...

  11. Built to Outlast: Operational Approaches to Hybrid Warfare

    Science.gov (United States)

    2012-05-17

    29Robert T. Ames, Sun Tzu: The Art of War (New York: Ballantine Books, 1993), 78-80; Mao Tse -Tung, On Guerrilla Warfare, trans. Samuel B. Griffith...Chicago: University of Illinois Press, 1961), 25, 42.The works of Sun Tzu and Mao Tse -Tung both illustrate aspects of this concept. In a work...toreador’s cape, not the toreador himself. - Norman B. Hannah, The Key to Failure: Laos and the Vietnam War114 Against the backdrop of the Cold

  12. Laboratory analysis of chemical warfare agents, adducts, and metabolites in biomedial samples

    NARCIS (Netherlands)

    Schans, M.J. van der

    2015-01-01

    Chemical warfare agents (CWAs) are the most toxic compounds ever produced. To develop medical countermeasures against the effects of these agents, analytical procedures to analyze these agents in biological matrices are essential for a better understanding of the toxicological process. The need for

  13. Above the Influence: The Strategic Effects of Airpower in Irregular Warfare

    Science.gov (United States)

    2010-06-01

    INDOCHINA. . . . . . . . . . . . . . . . . . . . . 105 APPENDIX B: MAP OF LAOS . . . . . . . . . . . . . . . . . . . . . . . . . . . 106 APPENDIX...perspectives. These perspectives involve the use of airpower in North Vietnam, South Vietnam, and Laos . The overarching political endstate or...Nagl, ―Principles, Imperatives, and Paradoxes of Counterinsurgency,‖ 50; Mao Tse -Tung, Problems of Strategy in Guerrilla Warfare, 215-216; Gray

  14. Computer-based test system for the Tactical Airfield Attack Munition (TAAM) safing, arming, and fuzing system

    International Nuclear Information System (INIS)

    Warhus, J.; Castleton, R.; Lanning, S.

    1981-12-01

    Testing and quality assurance of large numbers of firing systems are an essential part of the development of the Tactical Airfield Attack Munition (TAAM). A computerized test and data acquisition system has been developed to make the testing and quality assurance workload manageable. The system hardware utilizes an LSI-11/23 computer, a Tektronix 7612 transient digitizer, and various other programmable instruments and power supplies. The system is capable of measuring and analyzing mechanical shock and fireset transient waveforms, automating testing sequences, and making records and comparisons of the test results. The system architecture is flexible for general purpose firing system development work

  15. [Decontamination of chemical and biological warfare agents].

    Science.gov (United States)

    Seto, Yasuo

    2009-01-01

    Chemical and biological warfare agents (CBWA's) are diverse in nature; volatile acute low-molecular-weight toxic compounds, chemical warfare agents (CWA's, gaseous choking and blood agents, volatile nerve gases and blister agents, nonvolatile vomit agents and lacrymators), biological toxins (nonvolatile low-molecular-weight toxins, proteinous toxins) and microbes (bacteria, viruses, rickettsiae). In the consequence management against chemical and biological terrorism, speedy decontamination of victims, facilities and equipment is required for the minimization of the damage. In the present situation, washing victims and contaminated materials with large volumes of water is the basic way, and additionally hypochlorite salt solution is used for decomposition of CWA's. However, it still remains unsolved how to dispose large volumes of waste water, and the decontamination reagents have serious limitation of high toxicity, despoiling nature against the environments, long finishing time and non-durability in effective decontamination. Namely, the existing decontamination system is not effective, nonspecifically affecting the surrounding non-target materials. Therefore, it is the urgent matter to build up the usable decontamination system surpassing the present technologies. The symposiast presents the on-going joint project of research and development of the novel decontamination system against CBWA's, in the purpose of realizing nontoxic, fast, specific, effective and economical terrorism on-site decontamination. The projects consists of (1) establishment of the decontamination evaluation methods and verification of the existing technologies and adaptation of bacterial organophosphorus hydrolase, (2) development of adsorptive elimination technologies using molecular recognition tools, and (4) development of deactivation technologies using photocatalysis.

  16. International humanitarian law applied to cyber-warfare: Precautions, proportionality and the notion of ‘attack’ under the humanitarian law of armed conflict

    NARCIS (Netherlands)

    Gill, T.D.; Tsagourias, N.; Buchan, R.

    2015-01-01

    This chapter examines the application of international humanitarian law to cyber warfare in the sense of rising to the level of an armed conflict. Building upon the work of the Tallinn Manual on the Application of International Law to Cyber Warfare, it places particular emphasis on the application

  17. Web Intelligence and Artificial Intelligence in Education

    Science.gov (United States)

    Devedzic, Vladan

    2004-01-01

    This paper surveys important aspects of Web Intelligence (WI) in the context of Artificial Intelligence in Education (AIED) research. WI explores the fundamental roles as well as practical impacts of Artificial Intelligence (AI) and advanced Information Technology (IT) on the next generation of Web-related products, systems, services, and…

  18. Artificial Intelligence and Moral intelligence

    Directory of Open Access Journals (Sweden)

    Laura Pana

    2008-07-01

    Full Text Available We discuss the thesis that the implementation of a moral code in the behaviour of artificial intelligent systems needs a specific form of human and artificial intelligence, not just an abstract intelligence. We present intelligence as a system with an internal structure and the structural levels of the moral system, as well as certain characteristics of artificial intelligent agents which can/must be treated as 1- individual entities (with a complex, specialized, autonomous or selfdetermined, even unpredictable conduct, 2- entities endowed with diverse or even multiple intelligence forms, like moral intelligence, 3- open and, even, free-conduct performing systems (with specific, flexible and heuristic mechanisms and procedures of decision, 4 – systems which are open to education, not just to instruction, 5- entities with “lifegraphy”, not just “stategraphy”, 6- equipped not just with automatisms but with beliefs (cognitive and affective complexes, 7- capable even of reflection (“moral life” is a form of spiritual, not just of conscious activity, 8 – elements/members of some real (corporal or virtual community, 9 – cultural beings: free conduct gives cultural value to the action of a ”natural” or artificial being. Implementation of such characteristics does not necessarily suppose efforts to design, construct and educate machines like human beings. The human moral code is irremediably imperfect: it is a morality of preference, of accountability (not of responsibility and a morality of non-liberty, which cannot be remedied by the invention of ethical systems, by the circulation of ideal values and by ethical (even computing education. But such an imperfect morality needs perfect instruments for its implementation: applications of special logic fields; efficient psychological (theoretical and technical attainments to endow the machine not just with intelligence, but with conscience and even spirit; comprehensive technical

  19. Efficacy Evaluation of Current and Future Naval Mine Warfare Neutralization Method

    Science.gov (United States)

    2016-12-01

    ENGINEERING APPROACH Numerous systems engineering process models were considered for this study including the Waterfall , Spiral, and “Vee” models . Given the... model based systems engineering, design of experiments, requirements analysis, mine warfare, MIW, mine countermeasures, MCM, littoral combat ship, LCS...E. IMPLEMENTATION IN SIMULATION MODEL .............................47 VII. MODELING AND SIMULATION ARCHITECTURE ..................................49

  20. The influence of the Ratel infantry fighting vehicle on mobile warfare ...

    African Journals Online (AJOL)

    This article traces the story of how the author and a number of daring young commanders and soldiers had cast aside military textbooks in developing their own military doctrine for mobile warfare, South African style. It is clear that the Ratel infantry fighting vehicle had wielded huge influence on the development and ...

  1. On modeling of the evaporation of chemical warfare agents on the ground

    NARCIS (Netherlands)

    Westin, S.N.; Winter, S.; Karlsson, E.; Hin, A.; Oeseburg, F.

    1998-01-01

    A model for evaporation of chemical warfare agents on the ground has been developed. The process of evaporation is described in three steps: (1) the immediate drop enlargement due to impact momentum is modeled using an empirical correlation from technical literature; (2) further enlargement caused

  2. Ultrasensitive detection of explosives and chemical warfare agents by low-pressure photoionization mass spectrometry.

    Science.gov (United States)

    Sun, Wanqi; Liang, Miao; Li, Zhen; Shu, Jinian; Yang, Bo; Xu, Ce; Zou, Yao

    2016-08-15

    On-spot monitoring of threat agents needs high sensitive instrument. In this study, a low-pressure photoionization mass spectrometer (LPPI-MS) was employed to detect trace amounts of vapor-phase explosives and chemical warfare agent mimetics under ambient conditions. Under 10-s detection time, the limits of detection of 2,4-dinitrotoluene, nitrotoluene, nitrobenzene, and dimethyl methyl phosphonate were 30, 0.5, 4, and 1 parts per trillion by volume, respectively. As compared to those obtained previously with PI mass spectrometric techniques, an improvement of 3-4 orders of magnitude was achieved. This study indicates that LPPI-MS will open new opportunities for the sensitive detection of explosives and chemical warfare agents. Copyright © 2016 Elsevier B.V. All rights reserved.

  3. Metal-organic frameworks for the removal of toxic industrial chemicals and chemical warfare agents.

    Science.gov (United States)

    Bobbitt, N Scott; Mendonca, Matthew L; Howarth, Ashlee J; Islamoglu, Timur; Hupp, Joseph T; Farha, Omar K; Snurr, Randall Q

    2017-06-06

    Owing to the vast diversity of linkers, nodes, and topologies, metal-organic frameworks can be tailored for specific tasks, such as chemical separations or catalysis. Accordingly, these materials have attracted significant interest for capture and/or detoxification of toxic industrial chemicals and chemical warfare agents. In this paper, we review recent experimental and computational work pertaining to the capture of several industrially-relevant toxic chemicals, including NH 3 , SO 2 , NO 2 , H 2 S, and some volatile organic compounds, with particular emphasis on the challenging issue of designing materials that selectively adsorb these chemicals in the presence of water. We also examine recent research on the capture and catalytic degradation of chemical warfare agents such as sarin and sulfur mustard using metal-organic frameworks.

  4. Intelligible Artificial Intelligence

    OpenAIRE

    Weld, Daniel S.; Bansal, Gagan

    2018-01-01

    Since Artificial Intelligence (AI) software uses techniques like deep lookahead search and stochastic optimization of huge neural networks to fit mammoth datasets, it often results in complex behavior that is difficult for people to understand. Yet organizations are deploying AI algorithms in many mission-critical settings. In order to trust their behavior, we must make it intelligible --- either by using inherently interpretable models or by developing methods for explaining otherwise overwh...

  5. Naturalist Intelligence Among the Other Multiple Intelligences [In Bulgarian

    Directory of Open Access Journals (Sweden)

    R. Genkov

    2007-09-01

    Full Text Available The theory of multiple intelligences was presented by Gardner in 1983. The theory was revised later (1999 and among the other intelligences a naturalist intelligence was added. The criteria for distinguishing of the different types of intelligences are considered. While Gardner restricted the analysis of the naturalist intelligence with examples from the living nature only, the present paper considered this problem on wider background including objects and persons of the natural sciences.

  6. Modeling and Optimal Control of a Class of Warfare Hybrid Dynamic Systems Based on Lanchester (n,1) Attrition Model

    OpenAIRE

    Chen, Xiangyong; Zhang, Ancai

    2014-01-01

    For the particularity of warfare hybrid dynamic process, a class of warfare hybrid dynamic systems is established based on Lanchester equation in a (n,1) battle, where a heterogeneous force of n different troop types faces a homogeneous force. This model can be characterized by the interaction of continuous-time models (governed by Lanchester equation), and discrete event systems (described by variable tactics). Furthermore, an expository discussion is presented on an optimal variable tact...

  7. Artificial intelligence

    CERN Document Server

    Hunt, Earl B

    1975-01-01

    Artificial Intelligence provides information pertinent to the fundamental aspects of artificial intelligence. This book presents the basic mathematical and computational approaches to problems in the artificial intelligence field.Organized into four parts encompassing 16 chapters, this book begins with an overview of the various fields of artificial intelligence. This text then attempts to connect artificial intelligence problems to some of the notions of computability and abstract computing devices. Other chapters consider the general notion of computability, with focus on the interaction bet

  8. Intelligence Ethics:

    DEFF Research Database (Denmark)

    Rønn, Kira Vrist

    2016-01-01

    Questions concerning what constitutes a morally justified conduct of intelligence activities have received increased attention in recent decades. However, intelligence ethics is not yet homogeneous or embedded as a solid research field. The aim of this article is to sketch the state of the art...... of intelligence ethics and point out subjects for further scrutiny in future research. The review clusters the literature on intelligence ethics into two groups: respectively, contributions on external topics (i.e., the accountability of and the public trust in intelligence agencies) and internal topics (i.......e., the search for an ideal ethical framework for intelligence actions). The article concludes that there are many holes to fill for future studies on intelligence ethics both in external and internal discussions. Thus, the article is an invitation – especially, to moral philosophers and political theorists...

  9. #%Applications of artificial intelligence in intelligent manufacturing: a review

    Institute of Scientific and Technical Information of China (English)

    #

    2017-01-01

    #%Based on research into the applications of artificial intelligence (AI) technology in the manufacturing industry in recent years, we analyze the rapid development of core technologies in the new era of 'Internet plus AI', which is triggering a great change in the models, means, and ecosystems of the manufacturing industry, as well as in the development of AI. We then propose new models, means, and forms of intelligent manufacturing, intelligent manufacturing system architecture, and intelligent man-ufacturing technology system, based on the integration of AI technology with information communications, manufacturing, and related product technology. Moreover, from the perspectives of intelligent manufacturing application technology, industry, and application demonstration, the current development in intelligent manufacturing is discussed. Finally, suggestions for the appli-cation of AI in intelligent manufacturing in China are presented.

  10. Diagnosis of Exposure to Chemical Warfare Agents: A Comprehensive Literature Survey 1990-2005

    National Research Council Canada - National Science Library

    Noort, D

    2006-01-01

    This report is an update of TNO report PML 2003-A63. In this report an overview is presented of the methods currently available for detection of exposure to a number of chemical warfare agents (CWA), i.e...

  11. A Comparison of Predictive Thermo and Water Solvation Property Prediction Tools and Experimental Data for Selected Traditional Chemical Warfare Agents and Simulants II: COSMO RS and COSMOTherm

    Science.gov (United States)

    2017-04-01

    SELECTED TRADITIONAL CHEMICAL WARFARE AGENTS AND SIMULANTS II: COSMO-RS AND COSMOTHERM ECBC-TR-1454 Jerry B. Cabalo RESEARCH AND TECHNOLOGY...Traditional Chemical Warfare Agents and Simulants II: COSMO-RS and COSMOTherm 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER CB10115...in the ADF 2012 suite of programs for the physico- chemical properties of a set of traditional chemical warfare agents and selected simulants. To

  12. Ge 4+ doped TiO 2 for stoichiometric degradation of warfare agents

    Czech Academy of Sciences Publication Activity Database

    Štengl, Václav; Matys Grygar, Tomáš; Opluštil, F.; Němec, T.

    2012-01-01

    Roč. 227, AUGUST (2012), s. 62-67 ISSN 0304-3894 R&D Projects: GA ČR(CZ) GAP106/12/1116 Institutional support: RVO:61388980 Keywords : germanium * homogeneous hydrolysis * titania * urea * warfare agent degradation Subject RIV: CA - Inorganic Chemistry Impact factor: 3.925, year: 2012

  13. Academic Training Lectures | Stuxnet and Cyber-Warfare | 13-14 January 2016

    CERN Multimedia

    2015-01-01

    Please note that the next series of Academic Training Lectures will take place on 13 and 14 January 2016. The lectures will be given by Gian Piero Siroli (Università e INFN, Bologna (IT))   Stuxnet and Cyber-Warfare (1/2)​ on Wednesday, 13 January from 11 a.m. to 12 p.m. http://indico.cern.ch/event/438525/ Stuxnet and Cyber-Warfare (2/2) on Thursday, 14 January from 11 a.m. to 12 p.m. http://indico.cern.ch/event/438526/ at CERN, Council Chamber (503-1-001)  Description: The first part of the lecture is devoted to the description of the Stuxnet worm, the first cyber-weapon whose existence has been made public, discovered in 2010 and targeting a specific industrial control system; the worm is responsible for the damaging of many centrifuges at an uranium enrichment facility, with the goal of sabotaging Iran&...

  14. Emerging Trends in China’s Development of Unmanned Systems

    Science.gov (United States)

    2015-01-01

    electronic warfare (EW); mine warfare/mine countermeasures; combat applications/strike missions; and humanitarian assistance and disaster relief (HA/DR...emerged in February 2013 that China had consid- ered launching a drone strike in Myanmar to kill a drug traf- ficker who was wanted for killing 13 Chinese...HA/DR humanitarian assistance and disaster relief HALE high altitude, long endurance ISR intelligence, surveillance, and reconnaissance MALE medium

  15. Iron-montmorillonite clays as active sorbents for the decontamination of hazardous chemical warfare agents.

    Science.gov (United States)

    Carniato, F; Bisio, C; Evangelisti, C; Psaro, R; Dal Santo, V; Costenaro, D; Marchese, L; Guidotti, M

    2018-02-27

    A class of heterogeneous catalysts based on commercial bentonite from natural origin, containing at least 80 wt% of montmorillonite clay, was designed to transform selectively and under mild conditions toxic organosulfur and organophosphorus chemical warfare agents into non-noxious products with a reduced impact on health and environment. The bentonite from the natural origin was modified by introducing iron species and acid sites in the interlayer space, aiming to obtain a sorbent with strong catalytic oxidising and hydrolytic properties. The catalytic performance of these materials was evaluated in the oxidative abatement of (2-chloroethyl)ethyl sulfide (CEES), a simulant of sulfur mustard, in the presence of aqueous hydrogen peroxide as an oxidant. A new decontamination formulation was, moreover, proposed and obtained by mixing sodium perborate, as a solid oxidant, to iron-bentonite catalysts. Solid-phase decontamination tests, performed on a cotton textile support contaminated with organosulfide and organophosphonate simulant agents revealed the good activity of the solid formulation, especially in the in situ detoxification of blistering agents. Tests carried out on the real blistering warfare agent, sulfur mustard (HD agent), showed that, thanks to the co-presence of the iron-based clay together with the solid oxidant component, a good decontamination of the test surface from the real warfare agent could be achieved (80% contaminant degradation, under ambient conditions, in 24 h).

  16. A review of multi-threat medical countermeasures against chemical warfare and terrorism.

    Science.gov (United States)

    Cowan, Fred M; Broomfield, Clarence A; Stojiljkovic, Milos P; Smith, William J

    2004-11-01

    The Multi-Threat Medical Countermeasure (MTMC) hypothesis has been proposed with the aim of developing a single countermeasure drug with efficacy against different pathologies caused by multiple classes of chemical warfare agents. Although sites and mechanisms of action and the pathologies caused by different chemical insults vary, common biochemical signaling pathways, molecular mediators, and cellular processes provide targets for MTMC drugs. This article will review the MTMC hypothesis for blister and nerve agents and will expand the scope of the concept to include other chemicals as well as briefly consider biological agents. The article will also consider how common biochemical signaling pathways, molecular mediators, and cellular processes that contribute to clinical pathologies and syndromes may relate to the toxicity of threat agents. Discovery of MTMC provides the opportunity for the integration of diverse researchers and clinicians, and for the exploitation of cutting-edge technologies and drug discovery. The broad-spectrum nature of MTMC can augment military and civil defense to combat chemical warfare and chemical terrorism.

  17. Multifunctional ultra-high vacuum apparatus for studies of the interactions of chemical warfare agents on complex surfaces

    International Nuclear Information System (INIS)

    Wilmsmeyer, Amanda R.; Morris, John R.; Gordon, Wesley O.; Mantooth, Brent A.; Lalain, Teri A.; Davis, Erin Durke

    2014-01-01

    A fundamental understanding of the surface chemistry of chemical warfare agents is needed to fully predict the interaction of these toxic molecules with militarily relevant materials, catalysts, and environmental surfaces. For example, rules for predicting the surface chemistry of agents can be applied to the creation of next generation decontaminants, reactive coatings, and protective materials for the warfighter. Here, we describe a multifunctional ultra-high vacuum instrument for conducting comprehensive studies of the adsorption, desorption, and surface chemistry of chemical warfare agents on model and militarily relevant surfaces. The system applies reflection-absorption infrared spectroscopy, x-ray photoelectron spectroscopy, and mass spectrometry to study adsorption and surface reactions of chemical warfare agents. Several novel components have been developed to address the unique safety and sample exposure challenges that accompany the research of these toxic, often very low vapor pressure, compounds. While results of vacuum-based surface science techniques may not necessarily translate directly to environmental processes, learning about the fundamental chemistry will begin to inform scientists about the critical aspects that impact real-world applications

  18. Multifunctional ultra-high vacuum apparatus for studies of the interactions of chemical warfare agents on complex surfaces.

    Science.gov (United States)

    Wilmsmeyer, Amanda R; Gordon, Wesley O; Davis, Erin Durke; Mantooth, Brent A; Lalain, Teri A; Morris, John R

    2014-01-01

    A fundamental understanding of the surface chemistry of chemical warfare agents is needed to fully predict the interaction of these toxic molecules with militarily relevant materials, catalysts, and environmental surfaces. For example, rules for predicting the surface chemistry of agents can be applied to the creation of next generation decontaminants, reactive coatings, and protective materials for the warfighter. Here, we describe a multifunctional ultra-high vacuum instrument for conducting comprehensive studies of the adsorption, desorption, and surface chemistry of chemical warfare agents on model and militarily relevant surfaces. The system applies reflection-absorption infrared spectroscopy, x-ray photoelectron spectroscopy, and mass spectrometry to study adsorption and surface reactions of chemical warfare agents. Several novel components have been developed to address the unique safety and sample exposure challenges that accompany the research of these toxic, often very low vapor pressure, compounds. While results of vacuum-based surface science techniques may not necessarily translate directly to environmental processes, learning about the fundamental chemistry will begin to inform scientists about the critical aspects that impact real-world applications.

  19. Multifunctional ultra-high vacuum apparatus for studies of the interactions of chemical warfare agents on complex surfaces

    Energy Technology Data Exchange (ETDEWEB)

    Wilmsmeyer, Amanda R.; Morris, John R. [Department of Chemistry, Virginia Tech, Blacksburg, Virginia 24061 (United States); Gordon, Wesley O.; Mantooth, Brent A.; Lalain, Teri A. [Research and Technology Directorate, U.S. Army Edgewood Chemical Biological Center, Aberdeen Proving Ground, Maryland 21010 (United States); Davis, Erin Durke [OptiMetrics, Inc., Abingdon, Maryland 21009 (United States)

    2014-01-15

    A fundamental understanding of the surface chemistry of chemical warfare agents is needed to fully predict the interaction of these toxic molecules with militarily relevant materials, catalysts, and environmental surfaces. For example, rules for predicting the surface chemistry of agents can be applied to the creation of next generation decontaminants, reactive coatings, and protective materials for the warfighter. Here, we describe a multifunctional ultra-high vacuum instrument for conducting comprehensive studies of the adsorption, desorption, and surface chemistry of chemical warfare agents on model and militarily relevant surfaces. The system applies reflection-absorption infrared spectroscopy, x-ray photoelectron spectroscopy, and mass spectrometry to study adsorption and surface reactions of chemical warfare agents. Several novel components have been developed to address the unique safety and sample exposure challenges that accompany the research of these toxic, often very low vapor pressure, compounds. While results of vacuum-based surface science techniques may not necessarily translate directly to environmental processes, learning about the fundamental chemistry will begin to inform scientists about the critical aspects that impact real-world applications.

  20. Hungarys Alternative to Counter Hybrid Warfare - Small States Weaponized Citizenry

    Science.gov (United States)

    2017-06-09

    said “Resilience as a terminological and operational factor, will become the newest ‘ brand ’ and communication name for the Alliance.”70 He also...audiences to influence their emotions , motives, objective reasoning, and ultimately the behavior of foreign governments, organizations, groups, and...so-called influence warfare. His study pinpointed the importance of emotion over rational facts in messages. Second, Edward Lucas and Ben Nimmo on

  1. Analysis of chemical warfare using a transient semi-Markov formulation.

    OpenAIRE

    Kierzewski, Michael O.

    1988-01-01

    Approved for public release; distribution is unlimited This thesis proposes an analytical model to test various assumptions about conventional/chemical warfare. A unit's status in conventional/chemical combat is modeled as states in a semi-Markov chain with transient and absorbing states. The effects of differing chemical threat levels, availability of decontamination assets and assumed personnel degradation rates on expected unit life and capabilities are tested. The ...

  2. PERMANENCE OF BIOLOGICAL AND CHEMICAL WARFARE AGENTS IN MUNICIPAL SOLID WASTE LANDFILL LEACHATES

    Science.gov (United States)

    The objective of this work is to permit EPA/ORD's National Homeland Security Research Center (NHSRC) and Edgewood Chemical Biological Center to collaborate together to test the permanence of biological and chemical warfare agents in municipal solid waste landfills. Research into ...

  3. Social intelligence, human intelligence and niche construction.

    Science.gov (United States)

    Sterelny, Kim

    2007-04-29

    This paper is about the evolution of hominin intelligence. I agree with defenders of the social intelligence hypothesis in thinking that externalist models of hominin intelligence are not plausible: such models cannot explain the unique cognition and cooperation explosion in our lineage, for changes in the external environment (e.g. increasing environmental unpredictability) affect many lineages. Both the social intelligence hypothesis and the social intelligence-ecological complexity hybrid I outline here are niche construction models. Hominin evolution is hominin response to selective environments that earlier hominins have made. In contrast to social intelligence models, I argue that hominins have both created and responded to a unique foraging mode; a mode that is both social in itself and which has further effects on hominin social environments. In contrast to some social intelligence models, on this view, hominin encounters with their ecological environments continue to have profound selective effects. However, though the ecological environment selects, it does not select on its own. Accidents and their consequences, differential success and failure, result from the combination of the ecological environment an agent faces and the social features that enhance some opportunities and suppress others and that exacerbate some dangers and lessen others. Individuals do not face the ecological filters on their environment alone, but with others, and with the technology, information and misinformation that their social world provides.

  4. Trends in ambient intelligent systems the role of computational intelligence

    CERN Document Server

    Khan, Mohammad; Abraham, Ajith

    2016-01-01

    This book demonstrates the success of Ambient Intelligence in providing possible solutions for the daily needs of humans. The book addresses implications of ambient intelligence in areas of domestic living, elderly care, robotics, communication, philosophy and others. The objective of this edited volume is to show that Ambient Intelligence is a boon to humanity with conceptual, philosophical, methodical and applicative understanding. The book also aims to schematically demonstrate developments in the direction of augmented sensors, embedded systems and behavioral intelligence towards Ambient Intelligent Networks or Smart Living Technology. It contains chapters in the field of Ambient Intelligent Networks, which received highly positive feedback during the review process. The book contains research work, with in-depth state of the art from augmented sensors, embedded technology and artificial intelligence along with cutting-edge research and development of technologies and applications of Ambient Intelligent N...

  5. Environmental assessments of sea dumped chemical warfare agents

    DEFF Research Database (Denmark)

    Sanderson, Hans; Fauser, Patrik

    This is a report on the information gathered during work related to sea dumped chemical warfare agents. It mainly reviews the work conducted in relation to the installation of the two Nord Stream gas pipeline from 2008-2012. The focus was on the weight-of-evidence risk assessment of disturbed CWA...... residues in connection with the installation of the pipelines. Novel exposure and toxicity assessments are presented and the risk is assessed. The overall conclusion is that there is a negligible acute added CWA risk towards the fish community from the installation of the pipelines....

  6. Getting the Next War Right: Beyond Population-centric Warfare

    Science.gov (United States)

    2010-06-01

    respectively: Che Guevara and Mao Tse -tung. Che’s foco theory, as we have discussed, advocates mobilizing from the top. The armed challenger chooses an...example, Thomas A. Marks, “Guerrillas in the Mist: Hmong Resistance Continues in Laos ,” Combat and Survival 8, no. 5 (August 1996), 4–11. 12 Theory and...Mao Tse -tung, On Guerrilla Warfare, trans. and ed. Samuel B. Grif!th (Mineola, NY: Dover Publications, 2005). The book is available from a wide

  7. Numerical simulation of RCS for carrier electronic warfare airplanes

    OpenAIRE

    Yue Kuizhi; Liu Wenlin; Li Guanxiong; Ji Jinzu; Yu Dazhao

    2015-01-01

    This paper studies the radar cross section (RCS) of carrier electronic warfare airplanes. Under the typical naval operations section, the mathematical model of the radar wave’s pitch angle incidence range analysis is established. Based on the CATIA software, considering dynamic deflections of duck wing leading edge flaps, flaperons, horizontal tail, and rudder, as well as aircraft with air-to-air missile, anti-radiation missile, electronic jamming pod, and other weapons, the 3D models of carr...

  8. Reevaluation of 1999 Health-Based Environmental Screening Levels (HBESLs) for Chemical Warfare Agents

    Energy Technology Data Exchange (ETDEWEB)

    Watson, Annetta Paule [ORNL; Dolislager, Fredrick G [ORNL

    2007-05-01

    This report evaluates whether new information and updated scientific models require that changes be made to previously published health-based environmental soil screening levels (HBESLs) and associated environmental fate/breakdown information for chemical warfare agents (USACHPPM 1999). Specifically, the present evaluation describes and compares changes that have been made since 1999 to U.S. Environmental Protection Agency (EPA) risk assessment models, EPA exposure assumptions, as well as to specific chemical warfare agent parameters (e.g., toxicity values). Comparison was made between screening value estimates recalculated with current assumptions and earlier health-based environmental screening levels presented in 1999. The chemical warfare agents evaluated include the G-series and VX nerve agents and the vesicants sulfur mustard (agent HD) and Lewisite (agent L). In addition, key degradation products of these agents were also evaluated. Study findings indicate that the combined effect of updates and/or changes to EPA risk models, EPA default exposure parameters, and certain chemical warfare agent toxicity criteria does not result in significant alteration to the USACHPPM (1999) health-based environmental screening level estimates for the G-series and VX nerve agents or the vesicant agents HD and L. Given that EPA's final position on separate Tier 1 screening levels for indoor and outdoor worker screening assessments has not yet been released as of May 2007, the study authors find that the 1999 screening level estimates (see Table ES.1) are still appropriate and protective for screening residential as well as nonresidential sites. As such, risk management decisions made on the basis of USACHPPM (1999) recommendations do not require reconsideration. While the 1999 HBESL values are appropriate for continued use as general screening criteria, the updated '2007' estimates (presented below) that follow the new EPA protocols currently under development

  9. Swarming and the Future of Warfare

    Science.gov (United States)

    2005-01-01

    and Plans DIVARTY Division Artillery DoD Department of Defense EO Electro-Optical EXFOR Experimental Force FLIR Forward-Looking Infrared FOFA Follow-on...HUMINT Human Intelligence xiii IED Improvised Explosive Device IFV Infantry Fighting Vehicle 10 Information Operations IR Infrared ISR Intelligence...and the rifles of WW2 (9 out of 1,000). 37 No longer could artillery unlimber within 300 yards and shoot at infantry with relative impunity since

  10. Cerium oxide for the destruction of chemical warfare agents: A comparison of synthetic routes

    Czech Academy of Sciences Publication Activity Database

    Janos, P.; Henych, Jiří; Pelant, O.; Pilařová, V.; Vrtoch, L.; Kormunda, M.; Mazanec, K.; Štengl, Václav

    2016-01-01

    Roč. 304, MAR (2016), s. 259-268 ISSN 0304-3894 Institutional support: RVO:61388980 Keywords : Cerium oxide * Chemical warfare agents * Organophosphate compounds * Decontamination Subject RIV: CA - Inorganic Chemistry Impact factor: 6.065, year: 2016

  11. OFFICER AND COMMANDER IN ASYMMETRIC WARFARE OPERATIONS

    Directory of Open Access Journals (Sweden)

    Giuseppe CAFORIO

    2013-01-01

    Full Text Available Starting from the data of a field research conducted among soldiers with asymmetric warfare experiences from nine different countries, the author seeks to identify and shed light on the various problems that officers with command responsibilities had to face during their missions. A picture emerges of feelings and experiences relating to their first impression upon arriving in the theatre, relations with local armed forces, relations with the local population and local authorities, relations with NGOs, relations with other armies, the impact of the rules of engagement (ROEs, training and education, and operational experiences. The paper ends with a discussion of the lessons learned.

  12. Textile/metal-organic-framework composites as self-detoxifying filters for chemical-warfare agents.

    Science.gov (United States)

    López-Maya, Elena; Montoro, Carmen; Rodríguez-Albelo, L Marleny; Aznar Cervantes, Salvador D; Lozano-Pérez, A Abel; Cenís, José Luis; Barea, Elisa; Navarro, Jorge A R

    2015-06-01

    The current technology of air-filtration materials for protection against highly toxic chemicals, that is, chemical-warfare agents, is mainly based on the broad and effective adsorptive properties of hydrophobic activated carbons. However, adsorption does not prevent these materials from behaving as secondary emitters once they are contaminated. Thus, the development of efficient self-cleaning filters is of high interest. Herein, we report how we can take advantage of the improved phosphotriesterase catalytic activity of lithium alkoxide doped zirconium(IV) metal-organic framework (MOF) materials to develop advanced self-detoxifying adsorbents of chemical-warfare agents containing hydrolysable P-F, P-O, and C-Cl bonds. Moreover, we also show that it is possible to integrate these materials onto textiles, thereby combining air-permeation properties of the textiles with the self-detoxifying properties of the MOF material. © 2015 WILEY-VCH Verlag GmbH & Co. KGaA, Weinheim.

  13. Thought about Strategic Demonstration Simulation Warfare Experiment%关于战略级推演模拟型作战实验的思考

    Institute of Scientific and Technical Information of China (English)

    周绍亮; 李雄; 董斐; 付佳

    2011-01-01

    Abstract:Based on classification of warfare experiments, the concept of strategic demonstration simulation warfare experiment is defined. From the standpoint of establishment of national strategic goals, grasping of international situation and education of joint operation command talents, the function and signification of strategic demonstration simulation warfare experiment are discussed. The basic requirements on military strategic policy, coordinated development of army construction and military operations, warfare lab and warfare experiment technologies are analyzed. The strategic demonstration simulation warfare lab is designed by presenting its functional framework, logic concept framework and running mode. The research results provide theoretical reference to promoting innovation development of warfare experiment.%摘要:在划分作战实验类别的基础上,界定了战略级推演模拟型作战实验的基本概念;从国家战略目标确立、国际局势把握、联合作战指挥人才培养的角度,阐述了战略级推演模拟型作战实验的作用及意义;从以军事战略方针为指导、与军队建设和军事作战协调发展、以作战实验机构为依托、以作战实验技术手段为支撑的角度,分析了战略级推演模拟型作战实验的基本要求;从功能结构、逻辑概念结构、运行模式的角度,进行了战略级推演模拟型作战实验室的初步设计。研究结果可为推动作战实验的创新发展提供理论参考。

  14. The concept of guerrilla warfare in Lithuania in the 1920—1930s

    Directory of Open Access Journals (Sweden)

    Jokubauskas Vytautas

    2012-03-01

    Full Text Available This article analyses the military and tactical training of the members of the Lithuanian Riflemen’s Union for guerrilla warfare in the interwar period. Small nations, such as Lithuania and other Baltic states, being unable to build up military strength in order to ensure national security, were forced to seek for unconventional methods of warfare, including guerrilla strategies. The study places emphasis on the development of the guerrilla war concept in the Union periodicals. The author retraces a change in the intensity of the guerrilla warfare concept propagation amongst Lithuanian population and riflemen, in particular, through publications in the Trimitas — a periodical of the Lithuanian Riflemen’s Union. The author also identifies the narratives associated with the guerrilla matters employed for propaganda purposes in order to create an image of a guerrilla as a defender of the Homeland — Lithuania. Additionally, the structure and numbers of the Union are analysed through a comparison with similar organisations of the other «small nations» of the Baltic North-East. The author addresses the issue of military missions planned by the Lithuanian Army, as well as the way riflemen implemented them. Since the Union did not only offer military training, but was also engaged in the patriotic propaganda, the article focuses on the network of cultural institutions, homes of riflemen, orchestras, libraries, choirs, and athletic clubs used by the Union. The article sets out to establish whether the loss of Lithuanian sovereignty could have been possible without giving rise to a protracted guerrilla war.

  15. Advanced intelligent systems

    CERN Document Server

    Ryoo, Young; Jang, Moon-soo; Bae, Young-Chul

    2014-01-01

    Intelligent systems have been initiated with the attempt to imitate the human brain. People wish to let machines perform intelligent works. Many techniques of intelligent systems are based on artificial intelligence. According to changing and novel requirements, the advanced intelligent systems cover a wide spectrum: big data processing, intelligent control, advanced robotics, artificial intelligence and machine learning. This book focuses on coordinating intelligent systems with highly integrated and foundationally functional components. The book consists of 19 contributions that features social network-based recommender systems, application of fuzzy enforcement, energy visualization, ultrasonic muscular thickness measurement, regional analysis and predictive modeling, analysis of 3D polygon data, blood pressure estimation system, fuzzy human model, fuzzy ultrasonic imaging method, ultrasonic mobile smart technology, pseudo-normal image synthesis, subspace classifier, mobile object tracking, standing-up moti...

  16. Competitive Intelligence.

    Science.gov (United States)

    Bergeron, Pierrette; Hiller, Christine A.

    2002-01-01

    Reviews the evolution of competitive intelligence since 1994, including terminology and definitions and analytical techniques. Addresses the issue of ethics; explores how information technology supports the competitive intelligence process; and discusses education and training opportunities for competitive intelligence, including core competencies…

  17. Fluorescent discrimination between traces of chemical warfare agents and their mimics.

    Science.gov (United States)

    Díaz de Greñu, Borja; Moreno, Daniel; Torroba, Tomás; Berg, Alexander; Gunnars, Johan; Nilsson, Tobias; Nyman, Rasmus; Persson, Milton; Pettersson, Johannes; Eklind, Ida; Wästerby, Pär

    2014-03-19

    An array of fluorogenic probes is able to discriminate between nerve agents, sarin, soman, tabun, VX and their mimics, in water or organic solvent, by qualitative fluorescence patterns and quantitative multivariate analysis, thus making the system suitable for the in-the-field detection of traces of chemical warfare agents as well as to differentiate between the real nerve agents and other related compounds.

  18. Analysis of the Threat of Genetically Modified Organisms for Biological Warfare

    Science.gov (United States)

    2011-05-01

    biological warfare. The primary focus of the framework are those aspects of the technology directly affecting humans by inducing virulent infectious disease...applications. Simple organisms such as fruit flies have been used to study the effects of genetic changes across generations. Transgenic mice are...Analysis * Multi-cell pathogens * Toxins (Chemical products of living cells.) * Fungi (Robust organism; no genetic manipulation needed

  19. A model for warfare in stratified small-scale societies: The effect of within-group inequality

    Science.gov (United States)

    Pandit, Sagar; van Schaik, Carel

    2017-01-01

    In order to predict the features of non-raiding human warfare in small-scale, socially stratified societies, we study a coalitionary model of war that assumes that individuals participate voluntarily because their decisions serve to maximize fitness. Individual males join the coalition if war results in a net economic and thus fitness benefit. Within the model, viable offensive war ensues if the attacking coalition of males can overpower the defending coalition. We assume that the two groups will eventually fuse after a victory, with ranks arranged according to the fighting abilities of all males and that the new group will adopt the winning group’s skew in fitness payoffs. We ask whether asymmetries in skew, group size and the amount of resources controlled by a group affect the likelihood of successful war. The model shows, other things being equal, that (i) egalitarian groups are more likely to defeat their more despotic enemies, even when these are stronger, (ii) defection to enemy groups will be rare, unless the attacked group is far more despotic than the attacking one, and (iii) genocidal war is likely under a variety of conditions, in particular when the group under attack is more egalitarian. This simple optimality model accords with several empirically observed correlations in human warfare. Its success underlines the important role of egalitarianism in warfare. PMID:29228014

  20. Mass Spectrometric Determination of Chemical Warfare Agents in Indoor Sample Media Typically Collected During Forensic Investigations

    National Research Council Canada - National Science Library

    D'Agostino, P. A; Hancock, J. R; Chenier, C. L

    2005-01-01

    .... DRDC Suffield, in collaboration with the Royal Canadian Mounted Police, identified a need for analytical methods for chemical warfare agent identification in media, including flooring, wall surfaces...

  1. The Short-Term Effect of Chest Physiotherapy on Spirometric Indices in Chemical Warfare Victims Exposed to Mustard Gas

    Directory of Open Access Journals (Sweden)

    A Abedi

    2008-12-01

    Full Text Available ABCTRACT Introduction & Objective: Chronic respiratory diseases are the most prevalent late sequels of sulfur mustard gas injury among Iranian chemical warfare victims. Chest physiotherapy is one of the useful methods in care, cure and infection prevention of these patients. The aim of this study was to determine the short-term effect of chest physiotherapy on spirometric indices in chemical warfare victims exposed to sulfur mustard gas. Materials & Methods: In this study, 27 of the chemical warfare victims with respiratory diseases were selected. Chest physiotherapy including postural drainage percussion and vibration were used in four positions for all patients. Pulmonary function test (PFT was obtained before (baseline, immediately and 20 minute after the chest physiotherapy. The SPSS software was used for the data analysis of the collected data. Results: Results of this study showed the significant effect (p<0.01 of chest physiotherapy upon forced expiratory volume in first second (FEV1 (baseline mean, 44.19 immediately after intervention mean 47.3 and 20 minute after intervention mean 48.3 and forced vital capacity (FVC (baseline mean, 69.37 immediately after intervention mean, 73.67 20 minute after intervention 75.74. Chest physiotherapy had significant effect (p<0.01 in asthmatic bronchitis group and also had significant effect (p<0.05 in both severe and moderate groups. Conclusion: Chest physiotherapy was able to improve pulmonary function test indices in chemical warfare victims suffering from respiratory problems. The effect on asthmatic bronchitis group, as well as both severe and moderate groups, was significant.

  2. Modelling traffic flows with intelligent cars and intelligent roads

    NARCIS (Netherlands)

    van Arem, Bart; Tampere, Chris M.J.; Malone, Kerry

    2003-01-01

    This paper addresses the modeling of traffic flows with intelligent cars and intelligent roads. It will describe the modeling approach MIXIC and review the results for different ADA systems: Adaptive Cruise Control, a special lane for Intelligent Vehicles, cooperative following and external speed

  3. Ultraviolet Raman scattering from persistent chemical warfare agents

    Science.gov (United States)

    Kullander, Fredrik; Wästerby, Pär.; Landström, Lars

    2016-05-01

    Laser induced Raman scattering at excitation wavelengths in the middle ultraviolet was examined using a pulsed tunable laser based spectrometer system. Droplets of chemical warfare agents, with a volume of 2 μl, were placed on a silicon surface and irradiated with sequences of laser pulses. The Raman scattering from V-series nerve agents, Tabun (GA) and Mustard gas (HD) was studied with the aim of finding the optimum parameters and the requirements for a detection system. A particular emphasis was put on V-agents that have been previously shown to yield relatively weak Raman scattering in this excitation band.

  4. Intelligence.

    Science.gov (United States)

    Sternberg, Robert J

    2012-03-01

    Intelligence is the ability to learn from experience and to adapt to, shape, and select environments. Intelligence as measured by (raw scores on) conventional standardized tests varies across the lifespan, and also across generations. Intelligence can be understood in part in terms of the biology of the brain-especially with regard to the functioning in the prefrontal cortex-and also correlates with brain size, at least within humans. Studies of the effects of genes and environment suggest that the heritability coefficient (ratio of genetic to phenotypic variation) is between .4 and .8, although heritability varies as a function of socioeconomic status and other factors. Racial differences in measured intelligence have been observed, but race is a socially constructed rather than biological variable, so such differences are difficult to interpret.

  5. Intelligence

    Science.gov (United States)

    Sternberg, Robert J.

    2012-01-01

    Intelligence is the ability to learn from experience and to adapt to, shape, and select environments. Intelligence as measured by (raw scores on) conventional standardized tests varies across the lifespan, and also across generations. Intelligence can be understood in part in terms of the biology of the brain—especially with regard to the functioning in the prefrontal cortex—and also correlates with brain size, at least within humans. Studies of the effects of genes and environment suggest that the heritability coefficient (ratio of genetic to phenotypic variation) is between .4 and .8, although heritability varies as a function of socioeconomic status and other factors. Racial differences in measured intelligence have been observed, but race is a socially constructed rather than biological variable, so such differences are difficult to interpret. PMID:22577301

  6. Diagnosis of exposure to chemical warfare agents: An essential tool to counteract chemical terrorism

    NARCIS (Netherlands)

    Noort, D.; Schans, M.J. van der; Bikker, F.J.; Benschop, H.P.

    2009-01-01

    Methods to analyze chemical warfare agents (CW-agents) and their decomposition products in environmental samples were developed over the last decades. In contrast herewith, procedures for analysis in biological samples have only recently been developed. Retrospective detection of exposure to

  7. Network Centric Warfare Case Study: U.S. V Corps and 3rd Infantry Division (Mechanized) During Operation Iraqi Freedom Combat Operations (Mar-Apr 2003). Volume 3. Network Centric Warfare Insights

    Science.gov (United States)

    2003-01-01

    OPSEC), military deception, psychological operations (PSYOPS), special information operations (IO), information assurance, physical security...nonlethal effects, such as operational 8 Network Centric Warfare Case Study security (OPSEC), military deception, psychological operations (PSYOP...Support Operations Group ASR Alternate Supply Route; or, Ammunition Supply Rate ATACMS Army Tactical Missile System ATARS Advanced

  8. Combined Intelligent Control (CIC an Intelligent Decision Making Algorithm

    Directory of Open Access Journals (Sweden)

    Moteaal Asadi Shirzi

    2007-03-01

    Full Text Available The focus of this research is to introduce the concept of combined intelligent control (CIC as an effective architecture for decision-making and control of intelligent agents and multi-robot sets. Basically, the CIC is a combination of various architectures and methods from fields such as artificial intelligence, Distributed Artificial Intelligence (DAI, control and biological computing. Although any intelligent architecture may be very effective for some specific applications, it could be less for others. Therefore, CIC combines and arranges them in a way that the strengths of any approach cover the weaknesses of others. In this paper first, we introduce some intelligent architectures from a new aspect. Afterward, we offer the CIC by combining them. CIC has been executed in a multi-agent set. In this set, robots must cooperate to perform some various tasks in a complex and nondeterministic environment with a low sensory feedback and relationship. In order to investigate, improve, and correct the combined intelligent control method, simulation software has been designed which will be presented and considered. To show the ability of the CIC algorithm as a distributed architecture, a central algorithm is designed and compared with the CIC.

  9. Intelligence and negotiating

    International Nuclear Information System (INIS)

    George, D.G.

    1990-01-01

    This paper discusses the role of US intelligence during arms control negotiations between 1982 and 1987. It also covers : the orchestration of intelligence projects; an evaluation of the performance of intelligence activities; the effect intelligence work had on actual arms negotiations; and suggestions for improvements in the future

  10. Hybrid Warfare Dilemmas in the Middle Colonies during the American Revolution

    Science.gov (United States)

    2017-05-25

    north.51 Washington urged Lee “to push for Philadelphia. The force I have with me is infinitely ...would attend the passage of the River by a march through Jersey,” he wrote, “I propose to invade Pennsylvania by sea , and from this arrangement...Hybrid Warfare Dilemmas in the Middle Colonies during the American Revolution A Monograph by MAJ William C. Murray II US Army

  11. Comparison of Selected Methods for Individual Decontamination of Chemical Warfare Agents

    OpenAIRE

    Tomas Capoun; Jana Krykorkova

    2014-01-01

    This study addresses the individual decontamination of chemical warfare agents (CWA) and other hazardous substances. The individual decontamination applies to contaminated body surfaces, protective clothing and objects immediately after contamination, performed individually or by mutual assistance using prescribed or improvised devices. The article evaluates the importance of individual decontamination, security level for Fire and Rescue Service Units of the Czech Republic (FRS CR) and demons...

  12. Intelligence and childlessness.

    Science.gov (United States)

    Kanazawa, Satoshi

    2014-11-01

    Demographers debate why people have children in advanced industrial societies where children are net economic costs. From an evolutionary perspective, however, the important question is why some individuals choose not to have children. Recent theoretical developments in evolutionary psychology suggest that more intelligent individuals may be more likely to prefer to remain childless than less intelligent individuals. Analyses of the National Child Development Study show that more intelligent men and women express preference to remain childless early in their reproductive careers, but only more intelligent women (not more intelligent men) are more likely to remain childless by the end of their reproductive careers. Controlling for education and earnings does not at all attenuate the association between childhood general intelligence and lifetime childlessness among women. One-standard-deviation increase in childhood general intelligence (15 IQ points) decreases women's odds of parenthood by 21-25%. Because women have a greater impact on the average intelligence of future generations, the dysgenic fertility among women is predicted to lead to a decline in the average intelligence of the population in advanced industrial nations. Copyright © 2014 Elsevier Inc. All rights reserved.

  13. Perceived intelligence is associated with measured intelligence in men but not women.

    Science.gov (United States)

    Kleisner, Karel; Chvátalová, Veronika; Flegr, Jaroslav

    2014-01-01

    The ability to accurately assess the intelligence of other persons finds its place in everyday social interaction and should have important evolutionary consequences. We used static facial photographs of 40 men and 40 women to test the relationship between measured IQ, perceived intelligence, and facial shape. Both men and women were able to accurately evaluate the intelligence of men by viewing facial photographs. In addition to general intelligence, figural and fluid intelligence showed a significant relationship with perceived intelligence, but again, only in men. No relationship between perceived intelligence and IQ was found for women. We used geometric morphometrics to determine which facial traits are associated with the perception of intelligence, as well as with intelligence as measured by IQ testing. Faces that are perceived as highly intelligent are rather prolonged with a broader distance between the eyes, a larger nose, a slight upturn to the corners of the mouth, and a sharper, pointing, less rounded chin. By contrast, the perception of lower intelligence is associated with broader, more rounded faces with eyes closer to each other, a shorter nose, declining corners of the mouth, and a rounded and massive chin. By contrast, we found no correlation between morphological traits and real intelligence measured with IQ test, either in men or women. These results suggest that a perceiver can accurately gauge the real intelligence of men, but not women, by viewing their faces in photographs; however, this estimation is possibly not based on facial shape. Our study revealed no relation between intelligence and either attractiveness or face shape.

  14. Artificial Intelligence.

    Science.gov (United States)

    Information Technology Quarterly, 1985

    1985-01-01

    This issue of "Information Technology Quarterly" is devoted to the theme of "Artificial Intelligence." It contains two major articles: (1) Artificial Intelligence and Law" (D. Peter O'Neill and George D. Wood); (2) "Artificial Intelligence: A Long and Winding Road" (John J. Simon, Jr.). In addition, it contains two sidebars: (1) "Calculating and…

  15. China's Use of Cyber Warfare: Espionage Meets Strategic Deterrence

    Directory of Open Access Journals (Sweden)

    Magnus Hjortdal

    2011-01-01

    Full Text Available This article presents three reasons for states to use cyber warfare and shows that cyberspace is—and will continue to be—a decisive element in China's strategy to ascend in the international system. The three reasons are: deterrence through infiltration of critical infrastructure; military technological espionage to gain military knowledge; and industrial espionage to gain economic advantage. China has a greater interest in using cyberspace offensively than other actors, such as the United States, since it has more to gain from spying on and deterring the United States than the other way around. The article also documents China's progress in cyber warfare and shows how it works as an extension of its traditional strategic thinking and the current debate within the country. Several examples of cyber attacks traceable to China are also presented. This includes cyber intrusions on a nuclear arms laboratory, attacks on defense ministries (including the Joint Strike Fighter and an airbase and the U.S. electric grid, as well as the current Google affair, which has proved to be a small part of a broader attack that also targeted the U.S. Government. There are, however, certain constraints that qualify the image of China as an aggressive actor in cyberspace. Some believe that China itself is the victim of just as many attacks from other states. Furthermore, certain actors in the United States and the West have an interest in overestimating China's capabilities in cyberspace in order to maintain their budgets.

  16. Improving Blood Monitoring of Enzymes as Biomarkers of Risk from Anticholinergic Pesticides and Chemical Warfare Agents

    National Research Council Canada - National Science Library

    Wilson, Barry W

    2006-01-01

    Blood biomarkers are an important way to monitor exposure to anticholinergic pesticides and chemical warfare agents and to establish whether some personnel are at greater risk than others from exposure...

  17. Improving Blood Monitoring of Enzymes as Biomarkers of Risk from Anticholinergic Pesticides and Chemical Warfare Agents

    National Research Council Canada - National Science Library

    Wilson, Barry W

    2005-01-01

    Blood biomarkers are an important way to monitor exposure to anticholinergic pesticides and chemical warfare agents and to establish whether some personnel are at greater risk than others from exposure...

  18. Self-Assessing of the Emotional Intelligence and Organizational Intelligence in Schools

    Science.gov (United States)

    Dagiene, Valentina; Juškeviciene, Anita; Carneiro, Roberto; Child, Camilla; Cullen, Joe

    2015-01-01

    The paper presents the results of an evaluation of the Emotional Intelligence (EI) and Organisational Intelligence (OI) competences self-assessment tools developed and applied by the IGUANA project. In the paper Emotional Intelligence and Organisational Intelligence competences are discussed, their use in action research experiments to assess and…

  19. Attacking the infrastructure: exploring potential uses of offensive information warfare

    OpenAIRE

    Elam, Donald Emmett.

    1996-01-01

    The world has entered the Third Wave; it has entered the Information Age. One of the fundamentals of this paradigm shift is the fact that information is power. The side that controls information more effectively will be victorious. Thus, countries and militaries must change their mentality in order to survive. A new form of conflict, Information Warfare, has been born. This new discipline is large, dynamic, and complex. The need exists for education among military officers and other concerned...

  20. Perceived Intelligence Is Associated with Measured Intelligence in Men but Not Women

    Science.gov (United States)

    Kleisner, Karel; Chvátalová, Veronika; Flegr, Jaroslav

    2014-01-01

    Background The ability to accurately assess the intelligence of other persons finds its place in everyday social interaction and should have important evolutionary consequences. Methodology/Principal Findings We used static facial photographs of 40 men and 40 women to test the relationship between measured IQ, perceived intelligence, and facial shape. Both men and women were able to accurately evaluate the intelligence of men by viewing facial photographs. In addition to general intelligence, figural and fluid intelligence showed a significant relationship with perceived intelligence, but again, only in men. No relationship between perceived intelligence and IQ was found for women. We used geometric morphometrics to determine which facial traits are associated with the perception of intelligence, as well as with intelligence as measured by IQ testing. Faces that are perceived as highly intelligent are rather prolonged with a broader distance between the eyes, a larger nose, a slight upturn to the corners of the mouth, and a sharper, pointing, less rounded chin. By contrast, the perception of lower intelligence is associated with broader, more rounded faces with eyes closer to each other, a shorter nose, declining corners of the mouth, and a rounded and massive chin. By contrast, we found no correlation between morphological traits and real intelligence measured with IQ test, either in men or women. Conclusions These results suggest that a perceiver can accurately gauge the real intelligence of men, but not women, by viewing their faces in photographs; however, this estimation is possibly not based on facial shape. Our study revealed no relation between intelligence and either attractiveness or face shape. PMID:24651120

  1. Nexus between Intelligence Education and Intelligence Training: A South African Perspective

    Directory of Open Access Journals (Sweden)

    M. A. van den Berg

    2015-10-01

    Full Text Available This paper examines the nexus of intelligence education and training from a South African perspective with the focus on current practices in light of the country’s transition towards democracy. A brief overview is provided on the history and development of the South African intelligence community with specific focus on the civilian intelligence services from the period prior 1994 to date (2015. The main focus, however, is on intelligence education that is currently available from training institutions and universities in South Africa as registered with the Department of Higher Education as well as private training institutions on the one hand, and the intelligence training practices within the statutory intelligence environment on the other. To this extent, the relations between academic institutions and the intelligence structures in terms of education and training within South Africa are perused against other practices within the African continent and internationally. The approaches to the study of intelligence are also addressed within this paper. Likewise, the how, what as well as to whom – pertaining to intelligence education and training availability and accessibility to students and practitioners within South Africa, is reviewed and analysed with the focus on making recommendations for the enhancement and improvement thereof to enable a focus on preparing the next generation of professional intelligence officers.

  2. (Review of) Reno, William. 2011. Warfare in Independent Africa. Cambridge: Cambridge University Press

    DEFF Research Database (Denmark)

    Hagmann, Tobias

    2013-01-01

    Warfare in Independent Africa is Reno’s bold attempt to analyze the modern history of African insurgencies. The book tackles this task through the prism of five generations of rebel, which left their mark on the continent; anti-colonial rebels, majority rule rebels, reform rebels, warlord rebels ...... and parochial rebels....

  3. Emerging Threat to America: Non-State Entities Fighting Fourth Generation Warfare in Mexico

    Science.gov (United States)

    2010-09-01

    warfare in Juarez, Mexico contrasts with the “peaceful” cities of Ciudad Acuña and Piedras Negras controlled by the Zetas who demonstrate 4GW tactics...Vulliamy, 2009). Within the cities of Acuna and Piedra Negras where one Pack Virus (the Zetas) has effective control of these limited geographic

  4. The Need for a USAF Information Warfare(IW) Strategy for Military Operations Other Than War (MOOTW)

    National Research Council Canada - National Science Library

    Butler, Bradley

    1996-01-01

    .... Two areas having an impact on the answer to this question but not normally examined together are information warfare and the broad area of military operations short of large scale conventional combat...

  5. The relationship of Emotional Intelligence with Academic Intelligence and the Big Five

    NARCIS (Netherlands)

    Van der Zee, K.I.; Thijs, Melanie; Schakel, Lolle

    The present study examines the relationship of self- and other ratings of emotional intelligence with academic intelligence and personality, as well as the incremental validity of emotional intelligence beyond academic intelligence and personality in predicting academic and social success. A sample

  6. The relationship of emotional intelligence with academic intelligence and the Big Five

    NARCIS (Netherlands)

    van der Zee, K; Thijs, M; Schakel, L

    2002-01-01

    The present study examines the relationship of self- and other ratings of emotional intelligence with academic intelligence and personality, as well as the incremental validity of emotional intelligence beyond academic intelligence and personality in predicting academic and social success. A sample

  7. 11th Annual Mine Warfare Technology Symposium, May 6-8, 2014 - Monterey, CA

    OpenAIRE

    2014-01-01

    The Naval Postgraduate School (NPS), the Office of Naval Research (ONR), the Program Executive Office Littoral Combat Ships (PEO LCS), OPNAV (N95), and The Consortium for Robotics and Unmanned Systems Education and Research (CRUSER) are pleased to announce the ELEVENTH International Mine Warfare Technology Symposium in Monterey, California, May 6-8, 2014.

  8. From the Decomposition of Chemical Warfare Agents to the Decontamination of Cytostatics

    Czech Academy of Sciences Publication Activity Database

    Štengl, Václav; Šťastný, Martin; Janoš, P.; Mazanec, K.; Perez-Diaz, J. L.; Štenglová Netíková, I. R.

    2018-01-01

    Roč. 57, č. 6 (2018), s. 2114-2122 ISSN 0888-5885 EU Projects: European Commission(XE) 312804 - COUNTERFOG Grant - others:NATO(US) SPS984599 Program:Science for Peace and Security Institutional support: RVO:61388980 Keywords : Chemical warfare agents * Degradation * Metal oxide sorbents Subject RIV: CA - Inorganic Chemistry OBOR OECD: Inorganic and nuclear chemistry Impact factor: 2.843, year: 2016

  9. Evaluation of the metabolic fate of munitions material (TNT & RDX) in plant systems. Initial assessment of plant DNA mutation spectra as a biomarker

    Energy Technology Data Exchange (ETDEWEB)

    Leung, F.; Cataldo, D.A.; Fellows, R.J.; Jarrell, A.E.; Harvey, S.D.

    1995-09-01

    Munitions material can enter the environment as a result of manufacturing activities and field usage. Predictor methodologies, or biomarkers would enhance evaluation of environmental impacts. The goal of this exploratory study deoxyribonucleic acid (DNA) mutation frequency as a biomarker for munitions exposure. The approach e resolution of an effective repetitive sequence probe for the identification of characteristic mutations, and (2) the development of a testing media [a clonal cell line of carrot (Daucus carota) spension cells]. Commercially available probes demonstrated marginal resolution therefore a low-C{sub o}t library was then constructed. Three colonies from the low-C{sub o}t DNA library were screened and the DNA isolates sequenced. A suspension culture of carrot (Daucus carota) was developed. A mutation spectra experiment was initiated at a 10-mg TNT/L exposure concentration with the attempt to clone over 1500 single TNT-exposed cells. Over the following six months greater than 98% of the initially isolated cells were unable to survive and produce micro calluses. The remaining calli were too few to be statistically significant and the experiment was terminated. The biomarker concept itself remains to be disproved, but the need for large numbers of uniform clones to differentiate true mutations suggest that more direct techniques using whole tissues need to be developed.

  10. Quality of life in chemical warfare survivors with ophthalmologic injuries: the first results form Iran Chemical Warfare Victims Health Assessment Study.

    Science.gov (United States)

    Mousavi, Batool; Soroush, Mohammad Reza; Montazeri, Ali

    2009-01-19

    Iraq used chemical weapons extensively against the Iranians during the Iran-Iraq war (1980-1988). The aim of this study was to assess the health related quality of life (HRQOL) in people who had ophthalmologic complications due to the sulfur mustard gas exposure during the war. The Veterans and Martyrs Affair Foundation (VMAF) database indicated that there were 196 patients with severe ophthalmologic complications due to chemical weapons exposure. Of these, those who gave consent (n = 147) entered into the study. Quality of life was measured using the 36-item Short Form Health Survey (SF-36) and scores were compared to those of the general public. In addition logistic regression analysis was performed to indicate variables that contribute to physical and mental health related quality of life. The mean age of the patients was 44.8 (SD = 8.7) ranging from 21 to 75 years. About one-third of the cases (n= 50) reported exposure to chemical weapons more than once. The mean exposure duration to sulfur mustard gas was 21.6 years (SD = 1.2). The lowest scores on the SF-36 subscales were found to be: the role physical and the general health. Quality of life in chemical warfare victims who had ophthalmologic problems was significantly lower than the general public (P chemical warfare victims with ophthalmologic complications suffer from poor health related quality of life. It seems that the need for provision of health and support for this population is urgent. In addition, further research is necessary to measure health related quality of life in victims with different types of disabilities in order to support and enhance quality of life among this population.

  11. Zirconium doped nano-dispersed oxides of Fe, Al and Zn for destruction of warfare agents

    Czech Academy of Sciences Publication Activity Database

    Štengl, Václav; Houšková, Vendula; Bakardjieva, Snejana; Murafa, Nataliya; Maříková, Monika; Opluštil, F.; Němec, T.

    2010-01-01

    Roč. 61, č. 11 (2010), s. 1080-1088 ISSN 1044-5803 Institutional research plan: CEZ:AV0Z40320502 Keywords : warfare agents * nano-dispersed oxides * homogeneous hydrolysis Subject RIV: CA - Inorganic Chemistry Impact factor: 1.496, year: 2010

  12. An Assessment of the Effectiveness of Computer-based Training for Newly Commissioned Surface Warfare Division Officers

    National Research Council Canada - National Science Library

    Bowman, William R; Crawford, Alice M; Mehay, Stephen; Stoker, Carol; Paynter, Robert

    2008-01-01

    ...) on-board an officer's ship. The study relied on a variety of analytical techniques, including a literature review of CBT and OJT training, interviews and focus groups with junior and senior surface warfare officers...

  13. Plasma flame for mass purification of contaminated air with chemical and biological warfare agents

    International Nuclear Information System (INIS)

    Uhm, Han S.; Shin, Dong H.; Hong, Yong C.

    2006-01-01

    An elimination of airborne simulated chemical and biological warfare agents was carried out by making use of a plasma flame made of atmospheric plasma and a fuel-burning flame, which can purify the interior air of a large volume in isolated spaces such as buildings, public transportation systems, and military vehicles. The plasma flame generator consists of a microwave plasma torch connected in series to a fuel injector and a reaction chamber. For example, a reaction chamber, with the dimensions of a 22 cm diameter and 30 cm length, purifies an airflow rate of 5000 lpm contaminated with toluene (the simulated chemical agent) and soot from a diesel engine (the simulated aerosol for biological agents). Large volumes of purification by the plasma flame will free mankind from the threat of airborne warfare agents. The plasma flame may also effectively purify air that is contaminated with volatile organic compounds, in addition to eliminating soot from diesel engines as an environmental application

  14. Artificial Intelligence Project

    Science.gov (United States)

    1990-01-01

    Symposium on Aritificial Intelligence and Software Engineering Working Notes, March 1989. Blumenthal, Brad, "An Architecture for Automating...Artificial Intelligence Project Final Technical Report ARO Contract: DAAG29-84-K-OGO Artificial Intelligence LaboratO"ry The University of Texas at...Austin N>.. ~ ~ JA 1/I 1991 n~~~ Austin, Texas 78712 ________k A,.tificial Intelligence Project i Final Technical Report ARO Contract: DAAG29-84-K-0060

  15. On Pecuniary Resiliency, Early Warning, and Market Imitation under Unrestricted Warfare

    Science.gov (United States)

    2015-09-17

    combatants, and civilians. The term was first used by American analysts in 1989 as Lind et . al . [37] to describe the return of warfare to a decentralized...Century. New York: Free, 1988 . Print. [22] Gould , Stephen, and Eldredge Niles. “Punctuated Equilibria: The Tempo and Mode of Evolution Reconsidered...able to take a punch.” He specifically argues that Al Qaeda and other terrorist organizations have limited resources to plan and carry out attacks and

  16. Routledge companion to intelligence studies

    CERN Document Server

    Dover, Robert; Hillebrand, Claudia

    2013-01-01

    The Routledge Companion to Intelligence Studies provides a broad overview of the growing field of intelligence studies. The recent growth of interest in intelligence and security studies has led to an increased demand for popular depictions of intelligence and reference works to explain the architecture and underpinnings of intelligence activity. Divided into five comprehensive sections, this Companion provides a strong survey of the cutting-edge research in the field of intelligence studies: Part I: The evolution of intelligence studies; Part II: Abstract approaches to intelligence; Part III: Historical approaches to intelligence; Part IV: Systems of intelligence; Part V: Contemporary challenges. With a broad focus on the origins, practices and nature of intelligence, the book not only addresses classical issues, but also examines topics of recent interest in security studies. The overarching aim is to reveal the rich tapestry of intelligence studies in both a sophisticated and accessible way. This Companion...

  17. An Empirical Examination of the Warfare Metaphor with Respect to Pre-Service Elementary Teachers

    Science.gov (United States)

    Cobern, William W.; Loving, Cathleen C.; Davis, Edward B.; Terpstra, Jeff

    2013-01-01

    Since its origination in the late nineteenth century, the warfare metaphor has been used to characterize the relationship between science and religion, especially orthodox Christianity. Though thoroughly discredited by historians of science, the ideological descendants of Thomas Huxley, who spoke of science in quasi-religious terms, have kept the…

  18. 78 FR 90 - Defense Intelligence Agency National Intelligence University Board of Visitors Closed Meeting

    Science.gov (United States)

    2013-01-02

    ... DEPARTMENT OF DEFENSE Office of the Secretary Defense Intelligence Agency National Intelligence University Board of Visitors Closed Meeting AGENCY: National Intelligence University, Defense Intelligence... hereby given that a closed meeting of the National Intelligence University Board of Visitors has been...

  19. Reactive skin decontamination lotion (RSDL) for the decontamination of chemical warfare agent (CWA) dermal exposure.

    Science.gov (United States)

    Schwartz, M D; Hurst, C G; Kirk, M A; Reedy, S J D; Braue, E H

    2012-08-01

    Rapid decontamination of the skin is the single most important action to prevent dermal absorption of chemical contaminants in persons exposed to chemical warfare agents (CWA) and toxic industrial chemicals (TICs) as a result of accidental or intentional release. Chemicals on the skin may be removed by mechanical means through the use of dry sorbents or water. Recent interest in decontamination systems which both partition contaminants away from the skin and actively neutralize the chemical has led to the development of several reactive decontamination solutions. This article will review the recently FDA-approved Reactive Skin Decontamination Lotion (RSDL) and will summarize the toxicity and efficacy studies conducted to date. Evidence of RSDL's superior performance against vesicant and organophosphorus chemical warfare agents compared to water, bleach, and dry sorbents, suggests that RSDL may have a role in mass human exposure chemical decontamination in both the military and civilian arenas.

  20. Electronic Warfare in Operations

    Science.gov (United States)

    2009-02-25

    intelligence-related portion of the EW running estimate. Provides input to the restricted frequency list by recommending guarded frequencies. Provides...preparation of the restricted frequency list and issuance of emissions control guidance. Coordinates frequency allotment, assignment, and use... frequency list . Validating and approving or denying cease-jamming requests. Maintaining situational awareness of all jamming-capable systems in the area

  1. Intelligent products : A survey

    NARCIS (Netherlands)

    Meyer, G.G.; Främling, K.; Holmström, J.

    This paper presents an overview of the field of Intelligent Products. As Intelligent Products have many facets, this paper is mainly focused on the concept behind Intelligent Products, the technical foundations, and the achievable practical goals of Intelligent Products. A novel classification of

  2. Benefits of collective intelligence: Swarm intelligent foraging, an ethnographic research

    Directory of Open Access Journals (Sweden)

    Sivave Mashingaidze

    2014-12-01

    Full Text Available Wisdom of crowds; bees, colonies of ants, schools of fish, flocks of birds, and fireflies flashing synchronously are all examples of highly coordinated behaviors that emerge from collective, decentralized intelligence. This article is an ethnographic study of swarm intelligence foraging of swarms and the benefits derived from collective decision making. The author used using secondary data analysis to look at the benefits of swarm intelligence in decision making to achieve intended goals. Concepts like combined decision making and consensus were discussed and four principles of swarm intelligence were also discussed viz; coordination, cooperation, deliberation and collaboration. The research found out that collective decision making in swarms is the touchstone of achieving their goals. The research further recommended corporate to adopt collective intelligence for business sustainability.

  3. Intelligence: Real or artificial?

    OpenAIRE

    Schlinger, Henry D.

    1992-01-01

    Throughout the history of the artificial intelligence movement, researchers have strived to create computers that could simulate general human intelligence. This paper argues that workers in artificial intelligence have failed to achieve this goal because they adopted the wrong model of human behavior and intelligence, namely a cognitive essentialist model with origins in the traditional philosophies of natural intelligence. An analysis of the word “intelligence” suggests that it originally r...

  4. Treatment of chemical warfare agents by zero-valent iron nanoparticles and ferrate(VI)/(III) composite

    International Nuclear Information System (INIS)

    Zboril, Radek; Andrle, Marek; Oplustil, Frantisek; Machala, Libor; Tucek, Jiri; Filip, Jan; Marusak, Zdenek; Sharma, Virender K.

    2012-01-01

    Highlights: ► Ferrate(VI) has been found to be highly efficient to decontaminate chemical warfare agents. ► Fast degradation of sulfur mustard, soman and compound VX by ferrate(VI). ► Nanoscale zero-valent iron particles are considerably less efficient in degradation of studied warfare agents compared to ferrate(VI). - Abstract: Nanoscale zero-valent iron (nZVI) particles and a composite containing a mixture of ferrate(VI) and ferrate(III) were prepared by thermal procedures. The phase compositions, valence states of iron, and particle sizes of iron-bearing compounds were determined by combination of X-ray powder diffraction, Mössbauer spectroscopy and scanning electron microscopy. The applicability of these environmentally friendly iron based materials in treatment of chemical warfare agents (CWAs) has been tested with three representative compounds, sulfur mustard (bis(2-chlorethyl) sulfide, HD), soman ((3,3′-imethylbutan-2-yl)-methylphosphonofluoridate, GD), and O-ethyl S-[2-(diisopropylamino)ethyl] methylphosphonothiolate (VX). Zero-valent iron, even in the nanodimensional state, had a sluggish reactivity with CWAs, which was also observed in low degrees of CWAs degradation. On the contrary, ferrate(VI)/(III) composite exhibited a high reactivity and complete degradations of CWAs were accomplished. Under the studied conditions, the estimated first-order rate constants (∼10 −2 s −1 ) with the ferrate(VI)/(III) composite were several orders of magnitude higher than those of spontaneous hydrolysis of CWAs (10 −8 –10 −6 s −1 ). The results demonstrated that the oxidative technology based on application of ferrate(VI) is very promising to decontaminate CWAs.

  5. Quality of life in chemical warfare survivors with ophthalmologic injuries: the first results form Iran Chemical Warfare Victims Health Assessment Study

    Directory of Open Access Journals (Sweden)

    Soroush Mohammad

    2009-01-01

    Full Text Available Abstract Background Iraq used chemical weapons extensively against the Iranians during the Iran-Iraq war (1980–1988. The aim of this study was to assess the health related quality of life (HRQOL in people who had ophthalmologic complications due to the sulfur mustard gas exposure during the war. Methods The Veterans and Martyrs Affair Foundation (VMAF database indicated that there were 196 patients with severe ophthalmologic complications due to chemical weapons exposure. Of these, those who gave consent (n = 147 entered into the study. Quality of life was measured using the 36-item Short Form Health Survey (SF-36 and scores were compared to those of the general public. In addition logistic regression analysis was performed to indicate variables that contribute to physical and mental health related quality of life. Results The mean age of the patients was 44.8 (SD = 8.7 ranging from 21 to 75 years. About one-third of the cases (n= 50 reported exposure to chemical weapons more than once. The mean exposure duration to sulfur mustard gas was 21.6 years (SD = 1.2. The lowest scores on the SF-36 subscales were found to be: the role physical and the general health. Quality of life in chemical warfare victims who had ophthalmologic problems was significantly lower than the general public (P Conclusion The study findings suggest that chemical warfare victims with ophthalmologic complications suffer from poor health related quality of life. It seems that the need for provision of health and support for this population is urgent. In addition, further research is necessary to measure health related quality of life in victims with different types of disabilities in order to support and enhance quality of life among this population.

  6. Quality control of intelligence research

    International Nuclear Information System (INIS)

    Lu Yan; Xin Pingping; Wu Jian

    2014-01-01

    Quality control of intelligence research is the core issue of intelligence management, is a problem in study of information science This paper focuses on the performance of intelligence to explain the significance of intelligence research quality control. In summing up the results of the study on the basis of the analysis, discusses quality control methods in intelligence research, introduces the experience of foreign intelligence research quality control, proposes some recommendations to improve quality control in intelligence research. (authors)

  7. Intelligence Issues for Congress

    Science.gov (United States)

    2013-04-23

    open source information— osint (newspapers...by user agencies. Section 1052 of the Intelligence Reform Act expressed the sense of Congress that there should be an open source intelligence ...center to coordinate the collection, analysis, production, and dissemination of open source intelligence to other intelligence agencies. An Open Source

  8. Orchestrating Multiple Intelligences

    Science.gov (United States)

    Moran, Seana; Kornhaber, Mindy; Gardner, Howard

    2006-01-01

    Education policymakers often go astray when they attempt to integrate multiple intelligences theory into schools, according to the originator of the theory, Howard Gardner, and his colleagues. The greatest potential of a multiple intelligences approach to education grows from the concept of a profile of intelligences. Each learner's intelligence…

  9. A Communitarian Critique of the Warfare State: Implications for the Twenty-First-Century University

    Science.gov (United States)

    Theobald, Paul; Knotwell, Jim

    2007-01-01

    This article contends that the relatively recent academic movement known as communitarianism can serve as a policy guide that could work catalytically on American cultural development of the sort that would loosen the tight military-industrial connection and in so doing aid the dismantling of the "warfare state." After chronicling the development…

  10. Semantic Business Intelligence - a New Generation of Business Intelligence

    Directory of Open Access Journals (Sweden)

    Dinu AIRINEI

    2012-01-01

    Full Text Available Business Intelligence Solutions represents applications used by companies to manage process and analyze data to provide substantiated decision. In the context of Semantic Web develop-ment trend is to integrate semantic unstructured data, making business intelligence solutions to be redesigned in such a manner that can analyze, process and synthesize, in addition to traditional data and data integrated with semantic another form and structure. This invariably leads appearance of new BI solution, called Semantic Business Intelligence.

  11. A cost and operational effectiveness analysis of alternative anti-surface warfare platforms

    OpenAIRE

    Skinner, Walter Mark.

    1993-01-01

    Approved for public release; distribution is unlimited. A Cost and Operational Effectiveness Analysis (COEA) is performed for three alternative anti-surface warfare (ASUW) platforms that will conduct operations in multi-service regional scenarios. Estimated program costs, historical cost variances, and measures of operational effectiveness are determined for each COEA alternative, and service life extension effects are examined. The data is merged in a mixed-integer optimization model, MPA...

  12. Chemical and biological warfare. Should defenses be researched and deployed?

    Science.gov (United States)

    Orient, J M

    1989-08-04

    The threat of chemical and biological weapons of mass destruction has intensified because of improved delivery systems and advances in chemistry, genetics, and other sciences. Possible US responses to this threat include deterrence, defenses, and/or disarmament, including a reaffirmation of the Biological and Toxin Weapons Convention of 1972, which is now in jeopardy. This article discusses the history of chemical and biological warfare, existing and potential weapons, the proliferation of weapons and delivery systems, ways to prevent the use of these weapons, and ways to protect populations from their effects.

  13. Cybersecurity protecting critical infrastructures from cyber attack and cyber warfare

    CERN Document Server

    Johnson, Thomas A

    2015-01-01

    The World Economic Forum regards the threat of cyber attack as one of the top five global risks confronting nations of the world today. Cyber attacks are increasingly targeting the core functions of the economies in nations throughout the world. The threat to attack critical infrastructures, disrupt critical services, and induce a wide range of damage is becoming more difficult to defend against. Cybersecurity: Protecting Critical Infrastructures from Cyber Attack and Cyber Warfare examines the current cyber threat landscape and discusses the strategies being used by governments and corporatio

  14. Research of Classical and Intelligent Information System Solutions for Criminal Intelligence Analysis

    OpenAIRE

    Šimović, Vladimir

    2001-01-01

    The objective of this study is to present research on classical and intelligent information system solutions used in criminal intelligence analysis in Croatian security system theory. The study analyses objective and classical methods of information science, including artificial intelligence and other scientific methods. The intelligence and classical software solutions researched, proposed, and presented in this study were used in developing the integrated information system for the Croatian...

  15. The Panacea and the Square Peg: Strategic Fallacies of the Air, Undersea and Cyber Domains

    Science.gov (United States)

    2015-04-21

    Intelligence : Washington, DC, I 946, I. 10 Lautenschlager, "The Submarine in Naval Warfare 1901-2001," 115. 11 Kennedy. Engineers of Victory, 50. 25...equipment and fertilizers. The Japanese implemented food rationing like most other WWII participants, and although some malnutrition occurred there...action. The Obama Administration authorized $35 million in 2015 to create the Cyber Threat Intelligence Integration Center, an organization designed to

  16. Artificial Consciousness or Artificial Intelligence

    OpenAIRE

    Spanache Florin

    2017-01-01

    Artificial intelligence is a tool designed by people for the gratification of their own creative ego, so we can not confuse conscience with intelligence and not even intelligence in its human representation with conscience. They are all different concepts and they have different uses. Philosophically, there are differences between autonomous people and automatic artificial intelligence. This is the difference between intelligence and artificial intelligence, autonomous versus a...

  17. Intelligent mechatronics; Intelligent mechatronics

    Energy Technology Data Exchange (ETDEWEB)

    Hashimoto, H. [The University of Tokyo, Tokyo (Japan). Institute of Industrial Science

    1995-10-01

    Intelligent mechatronics (IM) was explained as follows: a study of IM essentially targets realization of a robot namely, but in the present stage the target is a creation of new values by intellectualization of machine, that is, a combination of the information infrastructure and the intelligent machine system. IM is also thought to be constituted of computers positively used and micromechatronics. The paper next introduces examples of IM study, mainly those the author is concerned with as shown below: sensor gloves, robot hands, robot eyes, tele operation, three-dimensional object recognition, mobile robot, magnetic bearing, construction of remote controlled unmanned dam, robot network, sensitivity communication using neuro baby, etc. 27 figs.

  18. Cost Effectiveness Analysis of the "Sea to SWOS" Training Initiative on the Surface Warfare Officer Qualification Process

    National Research Council Canada - National Science Library

    Gavino, Christopher

    2002-01-01

    ... (combat effectiveness) while the quantitative analysis shows additional costs to the Navy Personnel Command and savings in training costs for the Naval Education and Training Command and OPNAV N76, the Surface Warfare Resource Sponsor...

  19. Brain Intelligence: Go Beyond Artificial Intelligence

    OpenAIRE

    Lu, Huimin; Li, Yujie; Chen, Min; Kim, Hyoungseop; Serikawa, Seiichi

    2017-01-01

    Artificial intelligence (AI) is an important technology that supports daily social life and economic activities. It contributes greatly to the sustainable growth of Japan's economy and solves various social problems. In recent years, AI has attracted attention as a key for growth in developed countries such as Europe and the United States and developing countries such as China and India. The attention has been focused mainly on developing new artificial intelligence information communication ...

  20. Business Intelligence Systems

    Directory of Open Access Journals (Sweden)

    Bogdan NEDELCU

    2014-02-01

    Full Text Available The aim of this article is to show the importance of business intelligence and its growing influence. It also shows when the concept of business intelligence was used for the first time and how it evolved over time. The paper discusses the utility of a business intelligence system in any organization and its contribution to daily activities. Furthermore, we highlight the role and the objectives of business intelligence systems inside an organization and the needs to grow the incomes and reduce the costs, to manage the complexity of the business environment and to cut IT costs so that the organization survives in the current competitive climate. The article contains information about architectural principles of a business intelligence system and how such a system can be achieved.

  1. Using cheminformatics to find simulants for chemical warfare agents

    Energy Technology Data Exchange (ETDEWEB)

    Lavoie, J.; Srinivasan, Sree [Molecular Sciences and Engineering Team, U.S. Army Natick Soldier Research, Development and Engineering Center, 15 Kansas Street, Natick, MA 01760 (United States); Nagarajan, R., E-mail: Ramanathan.Nagarajan@us.army.mil [Molecular Sciences and Engineering Team, U.S. Army Natick Soldier Research, Development and Engineering Center, 15 Kansas Street, Natick, MA 01760 (United States)

    2011-10-30

    Highlights: {yields} Summary of chemical warfare agent (CWA) simulants in current use. {yields} Application of method of molecular similarity to CWA and simulants. {yields} Quantitative metric for CWA-simulant similarity. {yields} Rank ordering of simulants in current use. {yields} Potential of method to identify simulants for emerging agents. - Abstract: Direct experimentation with chemical warfare agents (CWA) to study important problems such as their permeation across protective barrier materials, decontamination of equipment and facilities, or the environmental transport and fate of CWAs is not feasible because of the obvious toxicity of the CWAs and associated restrictions on their laboratory use. The common practice is to use 'simulants,' namely, analogous chemicals that closely resemble the CWAs but are less toxic, with the expectation that the results attained for simulants can be correlated to how the CWAs would perform. Simulants have been traditionally chosen by experts, by means of intuition, using similarity in one or more physical properties (such as vapor pressure or aqueous solubility) or in the molecular structural features (such as functional groups) between the stimulant and the CWA. This work is designed to automate the simulant identification process backed by quantitative metrics, by means of chemical similarity search software routinely used in pharmaceutical drug discovery. The question addressed here is: By the metrics of such software, how similar are traditional simulants to CWAs? That is, what is the numerical 'distance' between each CWA and its customary simulants in the quantitative space of molecular descriptors? The answers show promise for finding close but less toxic simulants for the ever-increasing numbers of CWAs objectively and fast.

  2. Using cheminformatics to find simulants for chemical warfare agents

    International Nuclear Information System (INIS)

    Lavoie, J.; Srinivasan, Sree; Nagarajan, R.

    2011-01-01

    Highlights: → Summary of chemical warfare agent (CWA) simulants in current use. → Application of method of molecular similarity to CWA and simulants. → Quantitative metric for CWA-simulant similarity. → Rank ordering of simulants in current use. → Potential of method to identify simulants for emerging agents. - Abstract: Direct experimentation with chemical warfare agents (CWA) to study important problems such as their permeation across protective barrier materials, decontamination of equipment and facilities, or the environmental transport and fate of CWAs is not feasible because of the obvious toxicity of the CWAs and associated restrictions on their laboratory use. The common practice is to use 'simulants,' namely, analogous chemicals that closely resemble the CWAs but are less toxic, with the expectation that the results attained for simulants can be correlated to how the CWAs would perform. Simulants have been traditionally chosen by experts, by means of intuition, using similarity in one or more physical properties (such as vapor pressure or aqueous solubility) or in the molecular structural features (such as functional groups) between the stimulant and the CWA. This work is designed to automate the simulant identification process backed by quantitative metrics, by means of chemical similarity search software routinely used in pharmaceutical drug discovery. The question addressed here is: By the metrics of such software, how similar are traditional simulants to CWAs? That is, what is the numerical 'distance' between each CWA and its customary simulants in the quantitative space of molecular descriptors? The answers show promise for finding close but less toxic simulants for the ever-increasing numbers of CWAs objectively and fast.

  3. Professionalizing Intelligence Analysis

    Directory of Open Access Journals (Sweden)

    James B. Bruce

    2015-09-01

    Full Text Available This article examines the current state of professionalism in national security intelligence analysis in the U.S. Government. Since the introduction of major intelligence reforms directed by the Intelligence Reform and Terrorism Prevention Act (IRTPA in December, 2004, we have seen notable strides in many aspects of intelligence professionalization, including in analysis. But progress is halting, uneven, and by no means permanent. To consolidate its gains, and if it is to continue improving, the U.S. intelligence community (IC should commit itself to accomplishing a new program of further professionalization of analysis to ensure that it will develop an analytic cadre that is fully prepared to deal with the complexities of an emerging multipolar and highly dynamic world that the IC itself is forecasting. Some recent reforms in intelligence analysis can be assessed against established standards of more fully developed professions; these may well fall short of moving the IC closer to the more fully professionalized analytical capability required for producing the kind of analysis needed now by the United States.

  4. Fast neutron sensor for detection of explosives and chemical warfare agents

    International Nuclear Information System (INIS)

    Valkovic, Vladivoj; Sudac, Davorin; Matika, Dario

    2010-01-01

    Once the presence of the anomaly on the bottom of the shallow coastal sea water has been confirmed it is necessary to establish if it contains explosive or chemical warfare charge. We propose that this be performed by using neutron sensor installed within an underwater vessel. When positioned above the object, or to its side, the system can inspect the object for the presence of the threat materials by using alpha particle tagged neutrons from the sealed tube d+t neutron generator.

  5. Fast neutron sensor for detection of explosives and chemical warfare agents

    Energy Technology Data Exchange (ETDEWEB)

    Valkovic, Vladivoj [A.C.T.d.o.o., Prilesje 4, 10000 Zagreb (Croatia)], E-mail: valkovic@irb.hr; Sudac, Davorin [Institute Ruder Boskovic, Bijenicka c.54, 10000 Zagreb (Croatia); Matika, Dario [Institute for Researches and Development of Defense Systems, Ilica 256b, 10000 Zagreb (Croatia)

    2010-04-15

    Once the presence of the anomaly on the bottom of the shallow coastal sea water has been confirmed it is necessary to establish if it contains explosive or chemical warfare charge. We propose that this be performed by using neutron sensor installed within an underwater vessel. When positioned above the object, or to its side, the system can inspect the object for the presence of the threat materials by using alpha particle tagged neutrons from the sealed tube d+t neutron generator.

  6. Revolutionary Intelligence: The Expanding Intelligence Role of the Iranian Revolutionary Guard Corps

    Directory of Open Access Journals (Sweden)

    Udit Banerjea

    2015-09-01

    Full Text Available The Iranian Revolutionary Guard Corps (IRGC is a military and paramilitary organization that is meant to defend the ideals of the Iranian Islamic Revolution in 1979. Since its formation, the IRGC has grown in influence and its intelligence role has expanded. This paper examines the role of the IRGC in Iran’s intelligence system through a comprehensive analysis of the organization of the IRGC’s intelligence arm, along with its operations and capabilities. In doing so, the scope, objectives, resources, customers, and sponsors of the IRGC’s intelligence activities are also analyzed. Additionally, this paper explores how the IRGC interacts with the government of Iran, the Ministry of Intelligence and Security (MOIS, other key internal stakeholders, and foreign client organizations. A key focus of this analysis is the evolution of the relationship between the IRGC and the MOIS and the growing influence of the IRGC in Iran’s intelligence community over the last decade. The paper concludes that the IRGC has now eclipsed the MOIS within Iran’s intelligence community and is one of the most powerful institutions in Iranian politics today, using its intelligence activities as its key means of maintaining power and influence within the country.

  7. 77 FR 32952 - Defense Intelligence Agency National Intelligence University Board of Visitors Closed Meeting

    Science.gov (United States)

    2012-06-04

    ... DEPARTMENT OF DEFENSE Office of the Secretary Defense Intelligence Agency National Intelligence University Board of Visitors Closed Meeting AGENCY: Department of Defense, Defense Intelligence Agency, National Intelligence University. ACTION: Notice of closed meeting. SUMMARY: Pursuant to the provisions of...

  8. Toxicity induced by chemical warfare agents: insights on the protective role of melatonin.

    Science.gov (United States)

    Pita, René; Marco-Contelles, José; Ramos, Eva; Del Pino, Javier; Romero, Alejandro

    2013-11-25

    Chemical Warfare Agents (CWAs) are substances that can be used to kill, injure or incapacitate an enemy in warfare, but also against civilian population in terrorist attacks. Many chemical agents are able to generate free radicals and derived reactants, excitotoxicity process, or inflammation, and as consequence they can cause neurological symptoms and damage in different organs. Nowadays, taking into account that total immediate decontamination after exposure is difficult to achieve and there are not completely effective antidotes and treatments against all CWAs, we advance and propose that medical countermeasures against CWAs poisoning would benefit from a broad-spectrum multipotent molecule. Melatonin, a versatile and ubiquitous antioxidant molecule, originally discovered as a hormone synthesized mainly in the pineal gland, has low toxicity and high efficacy in reducing oxidative damage, anti-inflammatory effects by regulation of multiple cellular pathways and properties to prevent excitotoxicity, among others. The purpose of this review is to show the multiple and diverse properties of melatonin, as a pleiotropic indole derivative, and its marked potential for improving human health against the most widely used chemical weapons. Copyright © 2013 Elsevier Ireland Ltd. All rights reserved.

  9. Special Forces and the Art of Influence: A Grassroots Approach to Psychological Operations in an Unconventional Warfare Environment

    National Research Council Canada - National Science Library

    Thomas, II, Joel W

    2006-01-01

    .... The research was based on several premises: (1) the strategic utility of Special Forces (SF) lies in its ability to influence a target audience in an unconventional warfare (UW) environment; (2...

  10. Intelligent playgrounds

    DEFF Research Database (Denmark)

    Larsen, Lasse Juel

    2009-01-01

    This paper examines play, gaming and learning in regard to intelligent playware developed for outdoor use. The key questions are how does these novel artefacts influence the concept of play, gaming and learning. Up until now play and game have been understood as different activities. This paper...... examines if the sharp differentiation between the two can be uphold in regard to intelligent playware for outdoor use. Play and game activities will be analysed and viewed in conjunction with learning contexts. This paper will stipulate that intelligent playware facilitates rapid shifts in contexts...

  11. Artificial intelligence

    CERN Document Server

    Ennals, J R

    1987-01-01

    Artificial Intelligence: State of the Art Report is a two-part report consisting of the invited papers and the analysis. The editor first gives an introduction to the invited papers before presenting each paper and the analysis, and then concludes with the list of references related to the study. The invited papers explore the various aspects of artificial intelligence. The analysis part assesses the major advances in artificial intelligence and provides a balanced analysis of the state of the art in this field. The Bibliography compiles the most important published material on the subject of

  12. Models, Analysis, and Recommendations Pertaining to the Retention of Naval Special Warfare s Mid-Level Officers

    Science.gov (United States)

    2013-12-01

    The Analytic Hierarch/Network Process,” in Rev. R. Acad. Cien. Serie A. Mat (RACSAM), submitted by Francisco Javier Giron (Real Academia de Ciencias ...Academia de Ciencias : Spain. Scott, Nathan. Naval Special Warfare Officer Retention Survey. Monterey, CA: NPS Press, September 2013. Whittenberger

  13. Advanced intelligence and mechanism approach

    Institute of Scientific and Technical Information of China (English)

    ZHONG Yixin

    2007-01-01

    Advanced intelligence will feature the intelligence research in next 50 years.An understanding of the concept of advanced intelligence as well as its importance will be provided first,and detailed analysis on an approach,the mechanism approach.suitable to the advanced intelligence research will then be flolowed.And the mutual relationship among mechanism approach,traditional approaches existed in artificial intelligence research,and the cognitive informatics will be discussed.It is interesting to discover that mechanism approach is a good one to the Advanced Intelligence research and a tmified form of the existed approaches to artificial intelligence.

  14. Treatment of chemical warfare agents by zero-valent iron nanoparticles and ferrate(VI)/(III) composite

    Energy Technology Data Exchange (ETDEWEB)

    Zboril, Radek, E-mail: zboril@prfnw.upol.cz [Regional Centre of Advanced Technologies and Materials, Departments of Physical Chemistry and Experimental Physics, 17. listopadu 1192/12, 771 46 Olomouc (Czech Republic); Andrle, Marek; Oplustil, Frantisek [Military Institute VOP-026 Sternberk, Division in Brno, Rybkova 8, 602 00 Brno (Czech Republic); Machala, Libor; Tucek, Jiri; Filip, Jan; Marusak, Zdenek [Regional Centre of Advanced Technologies and Materials, Departments of Physical Chemistry and Experimental Physics, 17. listopadu 1192/12, 771 46 Olomouc (Czech Republic); Sharma, Virender K., E-mail: vsharma@fit.edu [Chemistry Department, Florida Institute of Technology, 150 West University Boulevard, Melbourne, FL 32901 (United States); Center of Ferrate Excellence, Florida Institute of Technology, 150 West University Boulevard, Melbourne, FL 32901 (United States)

    2012-04-15

    Highlights: Black-Right-Pointing-Pointer Ferrate(VI) has been found to be highly efficient to decontaminate chemical warfare agents. Black-Right-Pointing-Pointer Fast degradation of sulfur mustard, soman and compound VX by ferrate(VI). Black-Right-Pointing-Pointer Nanoscale zero-valent iron particles are considerably less efficient in degradation of studied warfare agents compared to ferrate(VI). - Abstract: Nanoscale zero-valent iron (nZVI) particles and a composite containing a mixture of ferrate(VI) and ferrate(III) were prepared by thermal procedures. The phase compositions, valence states of iron, and particle sizes of iron-bearing compounds were determined by combination of X-ray powder diffraction, Moessbauer spectroscopy and scanning electron microscopy. The applicability of these environmentally friendly iron based materials in treatment of chemical warfare agents (CWAs) has been tested with three representative compounds, sulfur mustard (bis(2-chlorethyl) sulfide, HD), soman ((3,3 Prime -imethylbutan-2-yl)-methylphosphonofluoridate, GD), and O-ethyl S-[2-(diisopropylamino)ethyl] methylphosphonothiolate (VX). Zero-valent iron, even in the nanodimensional state, had a sluggish reactivity with CWAs, which was also observed in low degrees of CWAs degradation. On the contrary, ferrate(VI)/(III) composite exhibited a high reactivity and complete degradations of CWAs were accomplished. Under the studied conditions, the estimated first-order rate constants ({approx}10{sup -2} s{sup -1}) with the ferrate(VI)/(III) composite were several orders of magnitude higher than those of spontaneous hydrolysis of CWAs (10{sup -8}-10{sup -6} s{sup -1}). The results demonstrated that the oxidative technology based on application of ferrate(VI) is very promising to decontaminate CWAs.

  15. Computational Intelligence in Intelligent Data Analysis

    CERN Document Server

    Nürnberger, Andreas

    2013-01-01

    Complex systems and their phenomena are ubiquitous as they can be found in biology, finance, the humanities, management sciences, medicine, physics and similar fields. For many problems in these fields, there are no conventional ways to mathematically or analytically solve them completely at low cost. On the other hand, nature already solved many optimization problems efficiently. Computational intelligence attempts to mimic nature-inspired problem-solving strategies and methods. These strategies can be used to study, model and analyze complex systems such that it becomes feasible to handle them. Key areas of computational intelligence are artificial neural networks, evolutionary computation and fuzzy systems. As only a few researchers in that field, Rudolf Kruse has contributed in many important ways to the understanding, modeling and application of computational intelligence methods. On occasion of his 60th birthday, a collection of original papers of leading researchers in the field of computational intell...

  16. Evaluation of the metabolic fate of munitions material (TNT & RDX) in plant systems and initial assessment of material interaction with plant genetic material (DNA). Initial assessment of plant DNA adducts as biomarkers

    Energy Technology Data Exchange (ETDEWEB)

    Harvey, S.D.; Clauss, T.W.; Fellows, R.J.; Cataldo, D.A.

    1995-08-01

    Genetic damage to deoxyribonucleic acid (DNA) has long been suspected of being a fundamental event leading to cancer. A variety of causal factors can result in DNA damage including photodimerization of base pairs, ionizing radiation, specific reaction of DNA with environmental pollutants, and nonspecific oxidative damage caused by the action of highly reactive oxidizing agents produced by metabolism. Because organisms depend on an unadulterated DNA template for reproduction, DNA repair mechanisms are an important defense for maintaining genomic integrity. The objective of this exploratory project was to evaluate the potential for TNT to form DNA adducts in plants. These adducts, if they exist in sufficient quantities, could be potential biomarkers of munitions exposure. The ultimate goal is to develop a simple analytical assay for the determination of blomarkers that is indicative of munitions contamination. DNA repair exists in dynamic equilibrium with DNA damage. Repair mechanisms are capable of keeping DNA damage at remarkably low concentrations provided that the repair capacity is not overwhelmed.

  17. Before and Beyond Anticipatory Intelligence: Assessing the Potential for Crowdsourcing and Intelligence Studies

    Directory of Open Access Journals (Sweden)

    Alexander Halman

    2015-10-01

    Full Text Available Crowdsourcing is a new tool for businesses, academics, and now intelligence analysts. Enabled by recent technology, crowdsourcing allows researchers to harness the wisdom of crowds and provide recommendations and insight into complex problems. This paper examines the potential benefits and limitations of crowdsourcing for intelligence analysis and the intelligence community beyond its primary use: anticipatory intelligence. The author constructs a model and compares it to existing crowdsourcing theories in business, information science, and public policy. Finally, he offers advice for intelligence analysis and public policy.

  18. 2015 Chinese Intelligent Systems Conference

    CERN Document Server

    Du, Junping; Li, Hongbo; Zhang, Weicun; CISC’15

    2016-01-01

    This book presents selected research papers from the 2015 Chinese Intelligent Systems Conference (CISC’15), held in Yangzhou, China. The topics covered include multi-agent systems, evolutionary computation, artificial intelligence, complex systems, computation intelligence and soft computing, intelligent control, advanced control technology, robotics and applications, intelligent information processing, iterative learning control, and machine learning. Engineers and researchers from academia, industry and the government can gain valuable insights into solutions combining ideas from multiple disciplines in the field of intelligent systems.

  19. Intelligence and the machinery of government: conceptualizing the intelligence community

    OpenAIRE

    Davies, PHJ

    2010-01-01

    This article argues that the failure to address intelligence agencies as public organizations part and parcel with the overt machinery of government constitutes a significant lacuna both in the specialist study of intelligence and the broader discipline of public administration studies. The role and status of intelligence institutions as aspects of the machinery of central government is examined, along with the prospects of certain key paradigms in the field for understanding those institutio...

  20. Secular gains in fluid intelligence: evidence from the Culture-Fair intelligence test.

    Science.gov (United States)

    Colom, Roberto; García-López, Oscar

    2003-01-01

    There is no doubt about the reality of the secular increase in cognitive test scores. However, there is disagreement about a key issue: does the observed increase reflect a genuine upward trend in intelligence? Evidence from the Raven test is clear, although there are some doubts about its adequacy as a fine-grained measure of fluid intelligence. Evidence from the so-called 'method of correlated vectors' is much less clear. When a crystallized battery is considered, the results leave little doubt: the increase does not reflect gains in general intelligence. However, when a fluid battery is analysed, the increase does reflect gains in general intelligence. The present study uses one of the best available measures of fluid intelligence (the Culture-Fair intelligence test) to provide new evidence for the secular increase in fluid intelligence, beyond the findings from the Raven test and the method of correlated vectors. A total of 4498 Spanish high school students and high school graduates were tested within a time interval of 20 and 23 years, respectively. The results show that there is a clear upward trend in intelligence. Moreover, students show an average increase equivalent to 6 IQ points, while graduates show an average increase of 4 IQ points. Therefore, more selected people (graduates) show a smaller increase than less selected people (students). Some implications are discussed.