WorldWideScience

Sample records for psychology law warfare

  1. Psychological effects of nuclear warfare

    International Nuclear Information System (INIS)

    Mickley, G.A.

    1987-01-01

    This report is divided into five parts. (1) Discussion of the psychological milieu before a nuclear confrontation. (2) Acute psychological reactions to nuclear warfare (some of which may reflect, in part, direct radiogenic alteration of nervous system functions). (3) Chronic psychological effects of a nuclear confrontation. (4) Issues concerning treatment of these psychological changes. (5) Prevention of adverse psychological reactions to nuclear warfare

  2. Information Warfare and International Law

    National Research Council Canada - National Science Library

    Greenberg, Lawrence T; Goodman, Seymour E; Soo Hoo, Kevin J

    1998-01-01

    .... Some legal constraints will certainly apply to information warfare, either because the constraints explicitly regulate particular actions, or because more general principles of international law...

  3. New Developments in Chinese Strategic Psychological Warfare

    Science.gov (United States)

    2005-01-01

    Taoism , which coupled hardness with softness in warfare, was not the only influence on the theory of psychological operations in ancient China. Other...portraying Islamic martyrs who appear to speak to soldiers from the clouds.38 In contemporary wars, such as the Gulf War, the first targets attacked have

  4. Are Current Psychological Operations Procedures Adequate in Information Warfare?

    National Research Council Canada - National Science Library

    Duff, Murray

    1997-01-01

    .... While some aspects of information warfare are conducted domestically, many are executed on foreign soil and involve extensive interaction with other governments, their population, non-governmental...

  5. Drone Warfare: Is the United States Violating the Law of Armed Conflict

    Science.gov (United States)

    2011-02-16

    NOTE AIR WAR COLLEGE AIR UNIVERSITY DRONE WARFARE: IS THE UNITED STATES VIOLATING THE LAW OF ARMED CONFLICT? by Barbara E. Shestko, Col...Base, Alabama. 1 Introduction The United States has become increasingly dependent upon the use of unmanned aircraft systems (UASs) or “ drones ” to...kill targeted members of al-Qaeda and the Taliban.1 Due to the success of drone warfare, we can expect the United States to continue its current

  6. International humanitarian law applied to cyber-warfare: Precautions, proportionality and the notion of ‘attack’ under the humanitarian law of armed conflict

    NARCIS (Netherlands)

    Gill, T.D.; Tsagourias, N.; Buchan, R.

    2015-01-01

    This chapter examines the application of international humanitarian law to cyber warfare in the sense of rising to the level of an armed conflict. Building upon the work of the Tallinn Manual on the Application of International Law to Cyber Warfare, it places particular emphasis on the application

  7. Cyber warfare:terms, issues, laws and controversies

    OpenAIRE

    Seviş, Kamile Nur; Şeker, Ensar

    2016-01-01

    Recent years have shown us the importance of cybersecurity. Especially, when the matter is national security, it is even more essential and crucial. Increasing cyber attacks, especially between countries in governmental level, created a new term cyber warfare. Creating some rules and regulations for this kind of war is necessary therefore international justice systems are working on it continuously. In this paper, we mentioned fundamental terms of cyber...

  8. Guerilla Warfare & Law Enforcement: Combating the 21st Century Terrorist Cell within the U.S.

    Directory of Open Access Journals (Sweden)

    Major Richard Hughbank

    2009-01-01

    Full Text Available Both domestic and international terrorist organizations employ guerrilla warfare tactics, techniques, and procedures. Thus, the ability to identify and defeat the members of these organizations, cripple their infrastructures, and disrupt their financial resources lies in the understanding of modern guerrilla warfare as it develops in the twenty-first century within the United States.3 The forms of asymmetric warfare4 adopted by domestic and international terrorist groups alike is no longer intended to gain simple media exposure or governmental manipulation; they want to make an overpowering impact by causing massive loss of life and severe damage to infrastructure and are often motivated by religious imperatives and political goals. As terrorism analyst Stephen Flynn has observed, "Throughout the 20th century [Americans] were able to treat national security as essentially an out-of-body experience. When confronted by threats, [America] dealt with them on the turf of our allies or our adversaries. Aside from the occasional disaster and heinous crime, civilian life [in the United States] has been virtually terror-free." With the turn of the twenty-first century, terrorist operations have become more prevalent in the United States and are taking shape in the form of modern guerrilla warfare, thus creating new challenges for federal, state, and local law enforcement agencies. After reviewing the origin and nature of these challenges, this article will offer some suggestions for countering guerilla warfare in the United States.

  9. Criminal law and psychology: Connection points

    OpenAIRE

    Drakić Dragiša

    2014-01-01

    In the paper the author discovers and analyzes areas which represent points of connection between criminal law and psychology, the areas in which cooperation between these two fields of science is possible and desirable. This article is divided into several sections. Firstly, the author talks about the emergence of psychology as a science and its definition. In the sections that follow the author offers analysis of initial contact between ways of thinking in primeval criminal law and psycholo...

  10. How Power-Laws Re-Write The Rules Of Cyber Warfare

    Directory of Open Access Journals (Sweden)

    David L. Bibighaus

    2015-12-01

    Full Text Available All warfare contains and element of randomness. This article will argue that, the kind uncertainty encountered in cyber warfare (Power-Law randomness is fundamentally different from the uncertainty the military has evolved to deal with in the physical world (Gaussian-Randomness. The article will explain the difference between these two kinds of randomness, and how cyber weapons appear to operate under Power-Law randomness. It then will show how in cyberspace, key aspects of strategic thought are based on a flaws assumption of randomness. Finally, this article shall argue that if the American military is going to be effective in cyberspace, it must re-examine the way the military assumes risk, recruits is forces, plans for war and maintains the peace.

  11. Impact of psychological problems in chemical warfare survivors with severe ophthalmologic complication, a cross sectional study.

    Science.gov (United States)

    Ghaedi, Gholamhosein; Ghasemi, Hassan; Mousavi, Batool; Soroush, Mohammad Reza; Rahnama, Parvin; Jafari, Farhad; Afshin-Majd, Siamak; Sadeghi Naeeni, Maryam; Naghizadeh, Mohammad Mehdi

    2012-04-12

    Sulfur mustard (SM) has been used as a chemical warfare agent since the early twentieth century. Despite the large number of studies that have investigated SM induced ocular injuries, few of those studies have also focused on the psychological health status of victims. This study has evaluated the most prominent influences on the psychological health status of patients with severe SM induced ocular injuries. This descriptive study was conducted on 149 Iranian war veterans with severe SM induced eye injuries. The psychological health status of all patients was assessed using the Iranian standardized Symptom Check List 90-Revised (SCL90-R) questionnaire. The results of patients' Global Severity Index (GSI) were compared with the optimal cut-off point of 0.4 that has previously been calculated for GSI in Iranian community. The Mann-Whitney U test, T tests and effect sizes (using Cohen's d) were employed as statistical methods. Data were analyzed using SPSS software. The mean age of patients was 44.86 (SD=8.7) and mean duration of disease was 21.58 (SD=1.20) years. Rate of exposure was once in 99 (66.4%) cases. The mean GSI (1.46) of the study group was higher compared to standardized cut off point (0.4) of the Iranian community. The results of this study showed that the mean of total GSI score was higher in participants with lower educational levels (effect size=0.507), unemployment (effect size=0.464) and having more than 3 children (effect size=0.62). Among the participants, 87 (58.4%) cases had a positive psychological history for hospitalization or receiving outpatient cares previously and 62 (41.6%) cases had a negative psychological history. In addition, the mean of GSI in participants with negative psychological history was lower than those with positive psychological history (Mean Change Difference=-0.621 with SD=0.120). There was a significant difference between positive and negative psychological history with respect to GSI (Pchemical survivors are

  12. Psychology and evolutionary biology; Causal analysis, evidence, and nomothetic laws

    NARCIS (Netherlands)

    Van Hezewijk, René

    2008-01-01

    Published as a chapter in Van Hezewijk, R. (2003). Psychology and evolutionary biology; Causal analysis, evidence, and nomothetic laws. In N. Stephenson, L. Radtke, R. Jorna & H. J. Stam (Eds.), Theoretical psychology; Critical contributions (pp. 405-415). Concord, Ontario: Captus Press.

  13. Individual psychological features of law enforcement officers convicted of crimes

    Directory of Open Access Journals (Sweden)

    Lyutykh V.A.

    2016-06-01

    Full Text Available The relevance of this topic is caused by a significant number of crimes committed by law enforcement officers and the necessity of active prevention. The aim of the study was to determine the individual psychological characteristics of law enforcement officers convicted of intentional crimes. The hypothesis was suggested that the main difference of individual psychological characteristics of law enforcement officers convicted of intentional crimes from individual psychological characteristics of law-abiding law enforcement officers is the difference between the principal values of the person both the main motives of activity adopted by an individual and the structure and the hierarchy of these values. This article describes the progress and results of empirical research conducted on the materials of psychodiagnostic examination of: employees who have been convicted of intentional crimes; law-abiding employees; people entering an internal affairs agency. Test subjects - men 18-46 years old, 90 people. Recommendations for practical psychologist of internal affairs agencies on detection of individual psychological personality features typical for law enforcement officers convicted of intentional crimes are formulated based on the obtained results.

  14. Teaching Psychology and Law: An Empirical Evaluation of Experiential Learning

    Science.gov (United States)

    Zelechoski, Amanda D.; Riggs Romaine, Christina L.; Wolbransky, Melinda

    2017-01-01

    Given the recent proliferation of undergraduate psychology and law courses, there is an increased need to empirically evaluate effective methods of teaching psycholegal material. The current study used a between- and within-subject design across four higher education institutions (N = 291 students) to evaluate the effectiveness of incorporating…

  15. Special Forces and the Art of Influence: A Grassroots Approach to Psychological Operations in an Unconventional Warfare Environment

    National Research Council Canada - National Science Library

    Thomas, II, Joel W

    2006-01-01

    This thesis researches the intricacies of the art of influence in an unconventional warfare environment to develop a model of influence that can be utilized by Special Forces conducting unconventional warfare...

  16. PSYCHOLOGICAL PROBLEMS AND STRESS FACED BY SOLDIERS WHO OPERATE IN ASYMMETRIC WARFARE ENVIRONMENTS: EXPERIENCES IN THE FIELD

    Directory of Open Access Journals (Sweden)

    Giuseppe CAFORIO

    2014-10-01

    Full Text Available This article deals with the problems of anxiety, stress and psychological discomfort that can affect soldiers sent on asymmetric warfare operations. It is based on secondary analysis of the data of two important field researches whose results have recently (2013 been published. Although the two researches adopted different methodologies, the testimonies are fully comparable and show that soldiers from different countries and cultures display common or similar reactions when they are placed in the stress conditions that the asymmetric environment involves. The approach of the paper is drawn up in such a way as to make the reader a participating observer of the reality of such missions. It is therefore centered on the personal testimonies of the soldiers interviewed in the two researches, testimonies reported just as they are, in their simplicity and, often, drama, with comments by the author kept to a minimum in order to give readers ample opportunity to evaluate and interpret the reported texts on their own. The research data, drawn from the declarations of those directly concerned, reveal the existence of a problem of psychological distress resulting from deployment in asymmetric warfare situations that is in part different in the causes of the problems resulting from deployment in traditional combat and affects percentages of participating soldiers that are not high but definitely significant. The highest incidence appears to be constituted by problems relating to reintegration into normal social and working life upon returning from the mission. This is followed in percentage terms by anxiety situations relating to life far from the family, due in large part to a sense of powerlessness for the scant possibility of managing family situations that may have cropped up or already existed beforehand.

  17. The Influence of a Psychology and Law Class on Legal Attitudes and Knowledge Structures

    Science.gov (United States)

    Laub, Cindy E.; Maeder, Evelyn M.; Bornstein, Brian H.

    2010-01-01

    Students in an undergraduate psychology and law course and an introductory psychology course completed a variety of measures, at both the beginning and end of the semester, to assess their knowledge of and attitudes toward psycholegal topics. The psychology and law course improved students' knowledge of psychological topics concerning the legal…

  18. The implications of transnational cyber threats in international humanitarian law: analysing the distinction between cybercrime, cyber attack, and cyber warfare in the 21st century

    OpenAIRE

    Faga, Hemen Philip

    2017-01-01

    This paper is an attempt to draw distinctive lines between the concepts of cybercrime, cyber-attack, and cyber warfare in the current information age, in which it has become difficult to separate the activities of transnational criminals from acts of belligerents using cyberspace. The paper considers the implications of transnational cyber threats in international humanitarian law (IHL) with a particular focus on cyber-attacks by non-state actors, the principles of state responsibility, and t...

  19. The Spectrum of Cyber Conflict from Hacking to Information Warfare: What is Law Enforcement's Role?

    National Research Council Canada - National Science Library

    Adkins, Bonnie

    2001-01-01

    ... of future cyber attacks, The main problem is distinguishing the type of intrusion or attack and developing the mechanisms to appropriately respond whether by law enforcement or military action, This paper...

  20. Special Forces and the Art of Influence: A Grassroots Approach to Psychological Operations in an Unconventional Warfare Environment

    National Research Council Canada - National Science Library

    Thomas, II, Joel W

    2006-01-01

    .... The research was based on several premises: (1) the strategic utility of Special Forces (SF) lies in its ability to influence a target audience in an unconventional warfare (UW) environment; (2...

  1. The Implications of Transnational Cyber Threats in International Humanitarian Law: Analysing the Distinction Between Cybercrime, Cyber Attack, and Cyber Warfare in the 21st Century

    Directory of Open Access Journals (Sweden)

    Faga Hemen Philip

    2017-06-01

    Full Text Available This paper is an attempt to draw distinctive lines between the concepts of cybercrime, cyber-attack, and cyber warfare in the current information age, in which it has become difficult to separate the activities of transnational criminals from acts of belligerents using cyberspace. The paper considers the implications of transnational cyber threats in international humanitarian law (IHL with a particular focus on cyber-attacks by non-state actors, the principles of state responsibility, and the implications of targeting non-state perpetrators under IHL. It concludes that current international law constructs are inadequate to address the implications of transnational cyber threats; the author recommends consequential amendments to the laws of war in order to address the challenges posed by transnational cyber threats.

  2. The Psychologist's Troubled Background: Major Related Life Experiences of Psychology and Law Students

    Science.gov (United States)

    Werz, Janina; Buechner, Vanessa L.

    2017-01-01

    This study explores major-related life experiences (MRLE) of psychology and law students to examine the stereotype of the wounded psychology student. Previous studies have shown that psychology students know people with mental disorders and are seeking treatment themselves. However, these studies do not allow drawing conclusions about the…

  3. The integrated nature of the method of psychological portraying in law enforcement

    Directory of Open Access Journals (Sweden)

    Shpagina E. M.

    2016-01-01

    Full Text Available The article reveals peculiarities of using the method of psychological portraying in law enforcement, shows the current practice of using psychological knowledge in solving crimes, reveals an integration relationship of other Sciences with psychology with the use of the method of psychological portraying the disclosure of crimes. The article presents a comprehensive approach to the psychological profile of an unknown offender. Psychological portraying of an unknown offender is regarded as a form of analytical work in solving crimes, which integrate information and knowledge from various Sciences such as forensics, criminology, detective work, psychiatry, sexology, victimology, etc. Psychological science (information of its various branches is a fundamental element that helps to explain, interpret and describe the behavior of the offender and the victim to resolve the problems of law enforcement.

  4. Cyber warfare and electronic warfare integration in the operational environment of the future: cyber electronic warfare

    Science.gov (United States)

    Askin, Osman; Irmak, Riza; Avsever, Mustafa

    2015-05-01

    For the states with advanced technology, effective use of electronic warfare and cyber warfare will be the main determining factor of winning a war in the future's operational environment. The developed states will be able to finalize the struggles they have entered with a minimum of human casualties and minimum cost thanks to high-tech. Considering the increasing number of world economic problems, the development of human rights and humanitarian law it is easy to understand the importance of minimum cost and minimum loss of human. In this paper, cyber warfare and electronic warfare concepts are examined in conjunction with the historical development and the relationship between them is explained. Finally, assessments were carried out about the use of cyber electronic warfare in the coming years.

  5. MEANS AND METHODS OF CYBER WARFARE

    Directory of Open Access Journals (Sweden)

    Dan-Iulian VOITAȘEC

    2016-06-01

    Full Text Available According to the Declaration of Saint Petersburg of 1868 “the only legitimate object which States should endeavor to accomplish during war is to weaken the military forces of the enemy”. Thus, International Humanitarian Law prohibits or limits the use of certain means and methods of warfare. The rapid development of technology has led to the emergence of a new dimension of warfare. The cyber aspect of armed conflict has led to the development of new means and methods of warfare. The purpose of this paper is to study how the norms of international humanitarian law apply to the means and methods of cyber warfare.

  6. Governing Warfare

    DEFF Research Database (Denmark)

    Harste, Gorm

      It would seem as though warfare has gotten out of control, not only in Iraq and Afghanistan, but also in Central Africa. The paper outlines the strategic history of politically controlled warfare since the early Enlightenment. The argument is that control is implausible. The idea of control has...

  7. Drone warfare

    Science.gov (United States)

    Gusterson, Hugh

    2017-11-01

    Crude drones existed as early as World War I, but the technology matured in the Yugoslav Wars of the 1990s and the current wars around the Middle East. The U.S. first used a weaponized drone in late 2001, in Afghanistan. Drones may cause more or less civilian casualties depending on the targeting protocols employed by their operators. There is an inherent ambiguity in determining who is an insurgent from several thousand feet, but civilian casualties are likely to be higher if targeters emphasize "signature strikes" over "personality strikes," if they engage in "double-tap strikes," if they rely too much on local informants, and if they rely too heavily on cellphone identification in the absence of corroboration from other intelligence sources. The legality of drone warfare is fairly clear in established battle zones such as Afghanistan, but is more problematic in terms of both international and domestic law when it comes to drone strikes in countries such as Yemen, Pakistan and Somalia with which the U.S. is not at war. Looking to the future, the U.S. would be well advised to sponsor negotiations for an international drone convention that might establish clear international rules for the use of drones, ban autonomous smart drones, and establish adjudicatory procedures to handle allegations of war crimes.

  8. Addressing the high levels of psychological distress in law students through intentional assessment and feedback design in the first year law curriculum

    OpenAIRE

    Rachael Field; Sally Kift

    2010-01-01

    A study of the Brain and Mind Institute released in 2009 established that more than one third of Australian law students suffer from psychological distress (BMRI, 2009). The psychological health of law students is therefore a critical issue for Australian legal education, and strategic change is necessary to address the stressful nature of studying law. This paper argues that intentional first year curriculum design has a critical role to play in addressing and preventing psychological distre...

  9. Some New Facets of the Psychology-Law Interface.

    Science.gov (United States)

    Freeman, James T.

    While the field of forensic psychology has emerged as a recognized discipline, psychologists who work within institutional settings frequently feel frustration in dealing with inmates for whom they have had no responsibility or input during the critical pre-trial, trial and sentencing decision-making process. The roles and ways in which psychology…

  10. Analysis on Joint Operational Capability in the Condition of Information and Psychological Warfares%信息心理对抗条件下联合作战能力分析

    Institute of Scientific and Technical Information of China (English)

    闫家传; 秦伟; 陈璐; 张仁友

    2011-01-01

    In the information age, operational capabilities of troops include firepower, defense power, maintainance power, information power and many other factors, and the warfares between the opponents represent force confrontation, psychological confrontation, information warfares and many other complex forms. Based on the quantity analysis of joint operational capability, mutual functional mechanism of information, psychology and combat power is analyzed, and three feedback loops of operational confrontation, information warfares and psychological warfares are educed, and then system dynamical models are established, and effects on joint operational capability by information, psychology and other factors are deduced in the prospect of quantity.%信息化条件下作战,部队的作战能力表现为包括火力、防护力、保障力、信息力等多种因素的联合作战能力,作战双方的对抗表现为兵力对抗,心理对抗,信息对抗等多种复杂的形式.在联合作战能力量化分析基础上,分析了信息、心理和战斗力相互作用机制,得出了战斗对抗、信息对抗、心理对抗3个反馈回路环,并据此建立了系统动力学模型,从定量的角度分析了信息、心理等因素对联合作战能力的影响.

  11. Promoting the Scientific Development of the Construction of Psychological Warfare of Our Army with System Theory%以系统论促进我军心理战建设科学发展

    Institute of Scientific and Technical Information of China (English)

    王晓华; 白莉

    2011-01-01

    我军心理战建设应汲取系统论的营养,从明确目标上破题,整体推进,重点优化组织指挥体制。%The construction of psychological warfare of our army should absorb nutrition from system theory,in which the-goal should be clear,the process should work integrated,andfoc-using on optimizing commanding system.

  12. Intentional activity and free will as core concepts in criminal law and psychology

    DEFF Research Database (Denmark)

    Bertelsen, Preben

    2012-01-01

    Whether or not intentional actions initiated and formed by free will exist, it can be shown that lack of belief in such behavior makes people behave less ethically and less law-abidingly (they cheat more). Therefore, this phenomenon—often called a necessary illusion—is crucial to moral as well as...... model within the domain of criminal law and psychology explaining human intentional actions based on a scientific notion of free will as a real-world phenomenon....

  13. Influence of Psychological Warfare Information on College Students and Educational Countermeasures%心理战信息对大学生的影响及其教育对策

    Institute of Scientific and Technical Information of China (English)

    巴文娟

    2015-01-01

    In the psychological warfare of information under the background of the Internet, television, language, religious, and academic and cultural exchanges, visits and other activities for the psychological warfare of information carrier of long term effect on the students, had different effect on the students' ideological consciousness, emotion attitude, values education, the national consciousness, cultural identity education, national education measures in a timely manner, improve the ability of college students' psychological warfare defense.%在信息心理战的背景下,以互联网、语言、影视、宗教,以及学术文化交流、参观访问等活动为载体的心理战信息长期作用于大学生,对大学生的思想意识、情感态度产生了不同程度的影响,应及时通过价值观教育、国家意识教育、文化认同教育、国情国力教育等教育对策,提高大学生的心理战防御能力。

  14. More Effective Warfare: Warfare Waged Psychologically

    Science.gov (United States)

    2012-06-01

    Marine barracks in Beirut. Over the years, their tactics have included car bombs, kidnappings, murders, and the hijacking of civilian airliners ...welfare centers cater to tens of thousands of families and their information network is unrivaled by any other terrorist organization.39 In 1992

  15. Psychological-Educational Research of Professionally Essential Characteristics of Law Students’ Personalities, Studying at Bachelor Level

    Directory of Open Access Journals (Sweden)

    Valentina A. Polyanskaya

    2012-02-01

    Full Text Available The article considers the results of psychological-educational research, implemented in teaching process of law students’, studying at bachelor level. Special attention is attached to self-determination of future lawyers in professional specialization during introduction training

  16. [Assessment of psychological conditions for the use of firearms in law enforcement].

    Science.gov (United States)

    Vilardell Molas, Jordi; Martí Agustí, Gabriel; Solé i Sanosa, M Angels

    2014-03-01

    To handle firearms safely, an individual needs to be in sound psychological conditions. This point is especially relevant in law enforcement, given that this group is likely to experience situations where there is a reasonably severe risk to life, physical integrity and that of third parties. These conditions cause high levels of stress and become a significant source of psychological strain. The assessment of these psychological conditions in law enforcement must stay ahead of this strain and should act preventively, establishing surveillance that is the product of a consensus between the needs of professionals and organizations. This evaluation should be conducted by technical specialists who understand and know the occupational reality of these professionals. A good assessment methodology starts with the need to discover the basic areas that need exploring, the ideal procedure for assessing these issues and the criteria that determine the aptitude (or lack thereof) for handling firearms. Once these goals have been established, we can be assured that the assessment will follow a set of principles that will give it homogeneity, effectiveness and efficiency. This type of assessment will help accomplish the mission that these security professionals are entrusted to by law, which is to protect the free exercise of rights and freedoms and ensure citizen safety. Copyright © 2014 Elsevier España, S.L. All rights reserved.

  17. Cyber Attacks, Information Attacks, and Postmodern Warfare

    Directory of Open Access Journals (Sweden)

    Valuch Jozef

    2017-06-01

    Full Text Available The aim of this paper is to evaluate and differentiate between the phenomena of cyberwarfare and information warfare, as manifestations of what we perceive as postmodern warfare. We describe and analyse the current examples of the use the postmodern warfare and the reactions of states and international bodies to these phenomena. The subject matter of this paper is the relationship between new types of postmodern conflicts and the law of armed conflicts (law of war. Based on ICJ case law, it is clear that under current legal rules of international law of war, cyber attacks as well as information attacks (often performed in the cyberspace as well can only be perceived as “war” if executed in addition to classical kinetic warfare, which is often not the case. In most cases perceived “only” as a non-linear warfare (postmodern conflict, this practice nevertheless must be condemned as conduct contrary to the principles of international law and (possibly a crime under national laws, unless this type of conduct will be recognized by the international community as a “war” proper, in its new, postmodern sense.

  18. Teaching Independent Learning Skills in the First Year: A Positive Psychology Strategy for Promoting Law Student Well-Being

    Science.gov (United States)

    Field, Rachael; Duffy, James; Huggins, Anna

    2015-01-01

    Empirical evidence in Australia and overseas has established that in many university disciplines, students begin to experience elevated levels of psychological distress in their first year of study. There is now a considerable body of empirical data that establishes that this is a significant problem for law students. Psychological distress may…

  19. Do law students stand apart from other university students in their quest for mental health: A comparative study on wellbeing and associated behaviours in law and psychology students.

    Science.gov (United States)

    Skead, Natalie K; Rogers, Shane L

    2015-01-01

    We are not producing a product, but a well-balanced person.(1) It is well-documented that law students experience higher levels of psychological distress than members of the general population and university students in other professional disciplines. In 2014, we published our findings on an empirical study identifying the correlations between law student wellbeing and student behaviour both at and away from law school. The results of the study informed the development of an evidence-based 'behavioural toolkit' to assist law students and law schools in making informed choices and decisions that promote and even improve the mental health of students. The study we undertook was not, however, limited to law students. It extended to collecting quantitative data on psychological distress and associated behaviours in psychology students. This article reports on the comparative findings of the study and provides a comparative basis for understanding the contextual influences on the wellbeing of law students. Copyright © 2015 Elsevier Ltd. All rights reserved.

  20. Discussion of the Necessity of Psychological Warfare Education in National Defense Education in Universities%试论普通高校国防教育中开展心理战教育的必要性

    Institute of Scientific and Technical Information of China (English)

    巴文娟

    2012-01-01

    现代心理战的战略地位对普通高校的国防教育提出了新的要求,必须将心理战教育纳入国防教育的内容体系之中,这是信息化时代的要求、国家心理安全的要求.也是大学生自身特性的要求,由此,才能使国防教育更好地为国家安全服务。%The strategic position of modern psychological warfare defense for college education put forward new demands, psychological warfare must be the content of education in national defense education system, is the requirement of the information age mental state security, and also the requirements of the students" characteristics, so that we can make education better serve the defense of national security.

  1. On the Training of Commanders' Psychological Quality under the Conditions of Information Warfare%信息化战争条件下指挥员良好心理素质培养探析

    Institute of Scientific and Technical Information of China (English)

    孙建祥

    2011-01-01

    It is an urgent need to strengthen the training of commanders' good psychological quality to win the future information warfare. In order to achieve this, we should not only grasp the connotation of the development of commanders' good psychological quality, but also make strict psychological selection, practice extensive psychological education of the involved personnel, carry out a wide range of psychological training and establish corresponding sound and perfect support system.%加强指挥员良好心理素质的培养是打赢未来信息化战争的迫切需要。着眼培养指挥员良好的心理素质,我们不仅要科学把握其良好心理素质培养的主要内涵,还要对预提对象进行认真的心理选拔和广泛的心理教育,并开展多方面的心理训练和建立健全完善的训练支持系统。

  2. Hezbollah: Psychological Warfare Against Israel

    Science.gov (United States)

    2009-03-01

    Lebanese State” in Political Islam: Essays from the Middle East Report, ed. Joel Beinin and Joe Stork (Berkeley: Univ. of California Press 1997... lyrics : It is my right to defend my land and kick out occupiers; it is my right to declare my freedom and raise a flag for the oppressed; it is my...International Journal of Press/Politics 12 (2007): 43-66. Kfoury, Assaf. "Hizb Allah and the Lebanese State." In Political Islam: Essays from the

  3. Neuroscience, Moral Psychology and Law: First Lines on the (Impossibility of Rational Persuasion

    Directory of Open Access Journals (Sweden)

    Thais de Bessa Gontijo de Oliveira

    2015-12-01

    Full Text Available Although Law is often influenced by values, nowadays a widely held expert opinion is that the application of law is a result or rational reasoning. It is believed that those applying legal rules consider the conflicting arguments from both parties, and come to a decision by rational means. Nevertheless, new discoveries from Neuroscience and Moral Psychology show that many of these moral judgments that inevitably underlie legal judgments occur unconsciously and not rationally. Once such judgments are passed, they are immune to any dissenting rational  argument.  Through  literature  review,  we  discuss  in  the  present  paper  some derivations  of  these  new  findings  to  Law.  For  instance,  it  is  advisable  that  deeper philosophical training is installed in professional qualification for lawyers and magistrates, making  these  people  more  open-minded  towards  reasons  against  their  own  moral convictions. Furthermore, it is important to consider limiting the mandate of Hight Courts Ministers, in order to prevent that the moral convictions of these people pervade for too long.

  4. The Manipulation of Human Behavior in Guerrilla Warfare: Can It Enhance U.S. Army Special Forces Guerrilla Warfare Operations?

    National Research Council Canada - National Science Library

    Harris, William

    1997-01-01

    .... Proper integration of psychological communications to manipulate behavior in guerrilla warfare may facilitate the recruiting1 motivation, morale, sustainment and popular support for a guerrilla movement and its cause...

  5. Interdisciplinary Psychology and Law Training in Family and Child Mediation: An Empirical Study of the Effects on Law Student Mediators

    Science.gov (United States)

    Holtzworth-Munroe, Amy; Applegate, Amy G.; Rudd Brittany N.; Freeman, Ann; D'Onofrio, Brian

    2013-01-01

    There is growing interest in interdisciplinary training programs for law students. The goal of these programs is to prepare law students for the real world interdisciplinary settings they will face in their careers. However, there exists little research to provide evidence of the utility of such training. This study examined the effectiveness of…

  6. Running to well-being: A comparative study on the impact of exercise on the physical and mental health of law and psychology students.

    Science.gov (United States)

    Skead, Natalie K; Rogers, Shane L

    Research indicates that, in comparison to other university students, law students are at greater risk of experiencing high levels of psychological distress. There is also a large body of literature supporting a general negative association between exercise and stress, anxiety and depression. However, we are not aware of any studies exploring the impact of exercise on the mental health of law students specifically. This article reports evidence of a negative association between exercise and psychological distress in 206 law and psychology students. Compared to psychology students, the law students not only reported greater psychological distress, but, in addition, there was a stronger association between their levels of distress and their levels of exercise. Based on the results of this study, we suggest a simple yet effective way law schools might support the mental health of their students. Copyright © 2016 Elsevier Ltd. All rights reserved.

  7. Flying Electronic Warfare Laboratory

    Data.gov (United States)

    Federal Laboratory Consortium — FUNCTION: Provides NP-3D aircraft host platforms for Effectiveness of Navy Electronic Warfare Systems (ENEWS) Program antiship missile (ASM) seeker simulators used...

  8. Interpersonal Apologies: A Psychological Perspective of How They Might Work in Law

    Directory of Open Access Journals (Sweden)

    Alfred Allan

    2017-08-01

    Full Text Available Apologies have become an accepted feature in many fields of law and there is evidence that they make a constructive contribution to the resolution of disputes. The reason for this might be that they address the intangible needs of parties after adverse events that law otherwise find difficult to address. Legal reformers introduced apologies into law primarily on the basis of deductive reasoning without being able to refer to a comprehensive psychological theory that explains the apology process; in part because apology was only identified as a psychological construct worthy of empirical research during the last quarter of the 20th century. Researchers’ contributions since the 1980s greatly improved the knowledge base about the apology process and we reviewed the relevant literature to find a comprehensive integrated theory of apology that legal reformers and practitioners can use to understand and predict the apology process. We could not find such a theory, but we try to integrate the empirical findings regarding interpersonal apologies into a rudimentary explanation that we believe could assist them. We conclude that apologies will generally be a part of the negotiated corrective interaction between the parties and that legislation should accommodate the process without being overly prescriptive and that lawyers should therefore refrain from judging the apologies their clients offer or accept.Las disculpas se han convertido en una figura aceptada en muchas áreas del derecho, y se ha demostrado que contribuyen de forma constructiva a la resolución de disputas. La razón parece ser que hacen referencia a las necesidades intangibles de las partes después de eventos adversos que el derecho, de otro modo, tiene dificultades para abordar. Algunos reformadores jurídicos incorporaron las disculpas a la legislación principalmente en base al razonamiento deductivo, sin que fueran capaces de alegar una teoría psicológica general que explicase el

  9. Information Warfare and Ethics

    Directory of Open Access Journals (Sweden)

    M.J. Warren

    2001-05-01

    Full Text Available This paper examines the ethics of the practice of information warfare at both the national and corporate levels. Initially examining the present and past actions of individual hackers, it moves to the more organised, future military and economic warfare scenarios. It examines the lack of legal or policy initiatives in this area.

  10. Difficult Decisions: Chemical Warfare.

    Science.gov (United States)

    Slesnick, Irwin L.; Miller, John A.

    1988-01-01

    Gives the background history and chemistry of modern day chemical warfare from World War I to the present. Provides discussion questions to stimulate deeper thinking on the issue. Contains a discussion activity called "Can New Chemical Weapons Lead to Humane Warfare?" (CW)

  11. From undocumented to lawfully present: Do changes to legal status impact psychological wellbeing among latino immigrant young adults?

    Science.gov (United States)

    Patler, Caitlin; Laster Pirtle, Whitney

    2018-02-01

    Exclusionary immigration policies, as a form of structural racism, have led to a sizeable undocumented population that is largely barred from access to resources in the United States. Existing research suggests that undocumented immigration status detrimentally impacts mobility, yet few studies have tested the impacts of legal status on psychological wellbeing. Most importantly, we know little about how changes to legal status impact wellbeing. Announced in 2012, the Deferred Action for Childhood Arrivals (DACA) program allows eligible undocumented youth to apply for temporary lawful status. Drawing on cross-sectional survey data from 487 Latino immigrant young adults in California collected in 2014 and 2015, we analyze the predictors of three specialized outcomes related to immigrants' psychological wellbeing-distress, negative emotions, and deportation worry before and after a transition from undocumented to lawfully present status. Results show that retrospective reports of past psychological wellness, when all respondents were undocumented, are predicted primarily by socioeconomic status. However, reports of current psychological wellness are predicted by DACA status. Our results demonstrate, for the first time, the positive emotional consequences of transitioning out of undocumented status for immigrant young adults. Copyright © 2017 Elsevier Ltd. All rights reserved.

  12. The Impact of Psychological Science on Policing in the United States: Procedural Justice, Legitimacy, and Effective Law Enforcement.

    Science.gov (United States)

    Tyler, Tom R; Goff, Phillip Atiba; MacCoun, Robert J

    2015-12-01

    The May 2015 release of the report of the President's Task Force on 21st Century Policing highlighted a fundamental change in the issues dominating discussions about policing in America. That change has moved discussions away from a focus on what is legal or effective in crime control and toward a concern for how the actions of the police influence public trust and confidence in the police. This shift in discourse has been motivated by two factors-first, the recognition by public officials that increases in the professionalism of the police and dramatic declines in the rate of crime have not led to increases in police legitimacy, and second, greater awareness of the limits of the dominant coercive model of policing and of the benefits of an alternative and more consensual model based on public trust and confidence in the police and legal system. Psychological research has played an important role in legitimating this change in the way policymakers think about policing by demonstrating that perceived legitimacy shapes a set of law-related behaviors as well as or better than concerns about the risk of punishment. Those behaviors include compliance with the law and cooperation with legal authorities. These findings demonstrate that legal authorities gain by a focus on legitimacy. Psychological research has further contributed by articulating and demonstrating empirical support for a central role of procedural justice in shaping legitimacy, providing legal authorities with a clear road map of strategies for creating and maintaining public trust. Given evidence of the benefits of legitimacy and a set of guidelines concerning its antecedents, policymakers have increasingly focused on the question of public trust when considering issues in policing. The acceptance of a legitimacy-based consensual model of police authority building on theories and research studies originating within psychology illustrates how psychology can contribute to the development of evidence

  13. Defining cyber warfare

    Directory of Open Access Journals (Sweden)

    Dragan D. Mladenović

    2012-04-01

    Full Text Available Cyber conflicts represent a new kind of warfare that is technologically developing very rapidly. Such development results in more frequent and more intensive cyber attacks undertaken by states against adversary targets, with a wide range of diverse operations, from information operations to physical destruction of targets. Nevertheless, cyber warfare is waged through the application of the same means, techniques and methods as those used in cyber criminal, terrorism and intelligence activities. Moreover, it has a very specific nature that enables states to covertly initiate attacks against their adversaries. The starting point in defining doctrines, procedures and standards in the area of cyber warfare is determining its true nature. In this paper, a contribution to this effort was made through the analysis of the existing state doctrines and international practice in the area of cyber warfare towards the determination of its nationally acceptable definition.

  14. Expeditionary Warfare- Force Protection

    National Research Council Canada - National Science Library

    Higgins, Eric

    2004-01-01

    In 2003, the Systems Engineering and Analysis students were tasked to develop a system of systems conceptual solution to provide force protection for the Sea Base conceptualized in the 2002 Expeditionary Warfare study...

  15. Biological warfare agents

    Directory of Open Access Journals (Sweden)

    Duraipandian Thavaselvam

    2010-01-01

    Full Text Available The recent bioterrorist attacks using anthrax spores have emphasized the need to detect and decontaminate critical facilities in the shortest possible time. There has been a remarkable progress in the detection, protection and decontamination of biological warfare agents as many instrumentation platforms and detection methodologies are developed and commissioned. Even then the threat of biological warfare agents and their use in bioterrorist attacks still remain a leading cause of global concern. Furthermore in the past decade there have been threats due to the emerging new diseases and also the re-emergence of old diseases and development of antimicrobial resistance and spread to new geographical regions. The preparedness against these agents need complete knowledge about the disease, better research and training facilities, diagnostic facilities and improved public health system. This review on the biological warfare agents will provide information on the biological warfare agents, their mode of transmission and spread and also the detection systems available to detect them. In addition the current information on the availability of commercially available and developing technologies against biological warfare agents has also been discussed. The risk that arise due to the use of these agents in warfare or bioterrorism related scenario can be mitigated with the availability of improved detection technologies.

  16. Biological warfare agents

    Science.gov (United States)

    Thavaselvam, Duraipandian; Vijayaraghavan, Rajagopalan

    2010-01-01

    The recent bioterrorist attacks using anthrax spores have emphasized the need to detect and decontaminate critical facilities in the shortest possible time. There has been a remarkable progress in the detection, protection and decontamination of biological warfare agents as many instrumentation platforms and detection methodologies are developed and commissioned. Even then the threat of biological warfare agents and their use in bioterrorist attacks still remain a leading cause of global concern. Furthermore in the past decade there have been threats due to the emerging new diseases and also the re-emergence of old diseases and development of antimicrobial resistance and spread to new geographical regions. The preparedness against these agents need complete knowledge about the disease, better research and training facilities, diagnostic facilities and improved public health system. This review on the biological warfare agents will provide information on the biological warfare agents, their mode of transmission and spread and also the detection systems available to detect them. In addition the current information on the availability of commercially available and developing technologies against biological warfare agents has also been discussed. The risk that arise due to the use of these agents in warfare or bioterrorism related scenario can be mitigated with the availability of improved detection technologies. PMID:21829313

  17. Occupational, social, and relationship hazards and psychological distress among low-income workers: implications of the 'inverse hazard law'.

    Science.gov (United States)

    Krieger, Nancy; Kaddour, Afamia; Koenen, Karestan; Kosheleva, Anna; Chen, Jarvis T; Waterman, Pamela D; Barbeau, Elizabeth M

    2011-03-01

    Few studies have simultaneously included exposure information on occupational hazards, relationship hazards (eg, intimate partner violence) and social hazards (eg, poverty and racial discrimination), especially among low-income multiracial/ethnic populations. A cross-sectional study (2003-2004) of 1202 workers employed at 14 worksites in the greater Boston area of Massachusetts investigated the independent and joint association of occupational, social and relationship hazards with psychological distress (K6 scale). Among this low-income cohort (45% were below the US poverty line), exposure to occupational, social and relationship hazards, per the 'inverse hazard law,' was high: 82% exposed to at least one occupational hazard, 79% to at least one social hazard, and 32% of men and 34% of women, respectively, stated they had been the perpetrator or target of intimate partner violence (IPV). Fully 15.4% had clinically significant psychological distress scores (K6 score ≥ 13). All three types of hazards, and also poverty, were independently associated with increased risk of psychological distress. In models including all three hazards, however, significant associations with psychological distress occurred among men and women for workplace abuse and high exposure to racial discrimination only; among men, for IPV; and among women, for high exposure to occupational hazards, poverty and smoking. Reckoning with the joint and embodied reality of diverse types of hazards involving how people live and work is necessary for understanding determinants of health status.

  18. Cyber Warfare/Cyber Terrorism

    National Research Council Canada - National Science Library

    O'Hara, Timothy

    2004-01-01

    Section 1 of this paper provides an overview of cyber warfare as an element of information warfare, starting with the general background of the current strategic environment the United States is operating...

  19. Chemical warfare agents.

    Science.gov (United States)

    Kuca, Kamil; Pohanka, Miroslav

    2010-01-01

    Chemical warfare agents are compounds of different chemical structures. Simple molecules such as chlorine as well as complex structures such as ricin belong to this group. Nerve agents, vesicants, incapacitating agents, blood agents, lung-damaging agents, riot-control agents and several toxins are among chemical warfare agents. Although the use of these compounds is strictly prohibited, the possible misuse by terrorist groups is a reality nowadays. Owing to this fact, knowledge of the basic properties of these substances is of a high importance. This chapter briefly introduces the separate groups of chemical warfare agents together with their members and the potential therapy that should be applied in case someone is intoxicated by these agents.

  20. Analysis of the psychometric characteristics of the experimental psychological methods for examination of the law enforcement officers

    Directory of Open Access Journals (Sweden)

    Vitaliy Omelyanovich

    2016-09-01

    Full Text Available Background. As a number of local documents requires continuous improvement of psychodiagnostic work, one of the main activities of the Internal Affairs Agencies psychiatric service is an active clinical examination, the timely detection of law enforcement officers employees with neuropsychological instability, tendency to aggression and other forms of deviant behavior. Methods. The aim of the study was the selection of additional experimental psychological techniques to conduct psychological examinations of law enforcement officers.  As on objective of a study evaluation of reliability, validity and discriminative level of psychological tests has been chosen. The object of study was a group of the randomly selected representatives of almost all the major police professions, consisting of 348 respondents of the male gender in the age from 21 to 48 years old. Given the fact that the screening psychological evaluation of law enforcement officers during periodic psychiatric examinations is usually carried out under time constraints and the urgency to form an opinion immediately after the end of testing, nonprojective psychological techniques have been chosen for testing. These techniques, according to the scientific literature, proved their effectiveness and, in addition, are characterized by a small volume of questions and simplicity (largely - the dichotomous scales. Moreover, it does not require a lot of time to handle them: a methodology «Aggressive behavior» (E. P Ilyin, P. O. Kovalev, 2001, the test «Аnxiety-Rigidity- Extravertebral» (D. Moudsli, 2002, the test «IPC-Fragebogen» (H. Levenson, 1986, the test is «MS PTSD» (NM Keane, 2001. Results. Tests reliability was investigated by determining the consistency of their results by calculating the L. Cronbach’s coefficient α and Guttman method of splitting in half; discriminative level was determined by calculating the ratio; construct validity was investigated by the exploratory

  1. Chemical warfare agents

    Directory of Open Access Journals (Sweden)

    Vijayaraghavan R

    2010-01-01

    Full Text Available Among the Weapons of Mass Destruction, chemical warfare (CW is probably one of the most brutal created by mankind in comparison with biological and nuclear warfare. Chemical weapons are inexpensive and are relatively easy to produce, even by small terrorist groups, to create mass casualties with small quantities. The characteristics of various CW agents, general information relevant to current physical as well as medical protection methods, detection equipment available and decontamination techniques are discussed in this review article. A brief note on Chemical Weapons Convention is also provided.

  2. Chemical warfare agents

    Science.gov (United States)

    Ganesan, K.; Raza, S. K.; Vijayaraghavan, R.

    2010-01-01

    Among the Weapons of Mass Destruction, chemical warfare (CW) is probably one of the most brutal created by mankind in comparison with biological and nuclear warfare. Chemical weapons are inexpensive and are relatively easy to produce, even by small terrorist groups, to create mass casualties with small quantities. The characteristics of various CW agents, general information relevant to current physical as well as medical protection methods, detection equipment available and decontamination techniques are discussed in this review article. A brief note on Chemical Weapons Convention is also provided. PMID:21829312

  3. The Physics of Warfare

    Science.gov (United States)

    Giordano, Gerardo

    2015-01-01

    Recently, I was tasked with the creation and execution of a new themed general education physics class called The Physics of Warfare. In the past, I had used the theme of a class, such as the physics of sports medicine, as a way to create homework and in-class activities, generate discussions, and provide an application to demonstrate that physics…

  4. A brief report on rape myth acceptance: differences between police officers, law students, and psychology students in the United Kingdom.

    Science.gov (United States)

    Sleath, Emma; Bull, Ray

    2015-01-01

    A common perception is that police officers hold very negative attitudes about rape victims. Therefore, the purpose of this article is to establish whether police officers do accept stereotypical rape myths at a higher level compared to members of other populations. There were 3 comparison samples, composed of police officers, law students, and psychology students, that completed the Illinois Rape Myth Acceptance scale. Male and female police officers accepted "she lied" myths at a higher level than the student samples. Student samples were found to accept 2 types of rape myths ("she asked for it" and "he didn't meant to") at a higher level compared to police officers. No significant differences were found in the other 4 subfactors. Therefore, the pattern of results suggests that police officers do not adhere to stereotypical myths about rape victims more than do other populations.

  5. Protecting Young People From Junk Food Advertising: Implications of Psychological Research for First Amendment Law

    Science.gov (United States)

    Harris, Jennifer L.; Graff, Samantha K.

    2012-01-01

    In the United States, one third of children and adolescents are overweight or obese, yet food and beverage companies continue to target them with advertising for products that contribute to this obesity crisis. When government restrictions on such advertising are proposed, the constitutional commercial speech doctrine is often invoked as a barrier to action. We explore incongruities between the legal justifications for the commercial speech doctrine and the psychological research on how food advertising affects young people. A proper interpretation of the First Amendment should leave room for regulations to protect young people from advertising featuring calorie-dense, nutrient-poor foods and beverages. PMID:22390435

  6. Protecting young people from junk food advertising: implications of psychological research for First Amendment law.

    Science.gov (United States)

    Harris, Jennifer L; Graff, Samantha K

    2012-02-01

    In the United States, one third of children and adolescents are overweight or obese, yet food and beverage companies continue to target them with advertising for products that contribute to this obesity crisis. When government restrictions on such advertising are proposed, the constitutional commercial speech doctrine is often invoked as a barrier to action. We explore incongruities between the legal justifications for the commercial speech doctrine and the psychological research on how food advertising affects young people. A proper interpretation of the First Amendment should leave room for regulations to protect young people from advertising featuring calorie-dense, nutrient-poor foods and beverages.

  7. Theory of information warfare: basic framework, methodology and conceptual apparatus

    Directory of Open Access Journals (Sweden)

    Олександр Васильович Курбан

    2015-11-01

    Full Text Available It is conducted a comprehensive theoretical study and determine the basic provisions of the modern theory of information warfare in on-line social networks. Three basic blocks, which systematized the theoretical and methodological basis of the topic, are established. There are information and psychological war, social off-line and on-line network. According to the three blocks, theoretical concepts are defined and methodological substantiation of information processes within the information warfare in the social on-line networks is formed

  8. A psychological law of inertia and the illusion of loss aversion

    Directory of Open Access Journals (Sweden)

    David Gal

    2006-07-01

    Full Text Available The principle of loss aversion is thought to explain a wide range of anomalous phenomena involving tradeoffs between losses and gains. In this article, I show that the anomalies loss aversion was introduced to explain --- the risky bet premium, the endowment effect, and the status-quo bias --- are characterized not only by a loss/gain tradeoff, but by a tradeoff between the status-quo and change; and, that a propensity towards the status-quo in the latter tradeoff is sufficient to explain these phenomena. Moreover, I show that two basic psychological principles --- (1 that motives drive behavior; and (2 that preferences tend to be fuzzy and ill-defined --- imply the existence of a robust and fundamental propensity of this sort. Thus, a loss aversion principle is rendered superfluous to an account of the phenomena it was

  9. Electronic Warfare Signature Measurement Facility

    Data.gov (United States)

    Federal Laboratory Consortium — The Electronic Warfare Signature Measurement Facility contains specialized mobile spectral, radiometric, and imaging measurement systems to characterize ultraviolet,...

  10. Implications of Network Centric Warfare

    National Research Council Canada - National Science Library

    Bailey, Alvin

    2004-01-01

    .... These areas of dependence also provide numerous vulnerabilities. This paper will focus specifically on Network Centric Warfare's vulnerabilities in terms of sensors cyberterrorism/ Electro-Magnetic Pulse (EMP...

  11. Antifragile Electronic Warfare

    OpenAIRE

    Lichtman, Marc

    2014-01-01

    This letter introduces the concept of antifragile electronic warfare (EW), which we define as the ability to allow a communications link to improve performance due to the presence of a jammer. This concept should not be confused with jamming countermeasures (a.k.a. anti-jamming or electronic protection). Rather, antifragile EW can be thought of as the next step beyond simply avoiding or mitigating jamming. After introducing the concept we narrow down the subset of jammers this concept can be ...

  12. Cyber crime and cyber warfare with international cyber collaboration for RSA – preparing communities

    CSIR Research Space (South Africa)

    Grobler, M

    2012-03-01

    Full Text Available aspects come into play that may have an influence on the manner in which the military reacts to cyber attacks (Wilson 2007): ? new national security policy issues; ? consideration of psychological operations used to affect friendly nations... relationship between modern cyber space, cyber warfare and traditional legislation. As a starting point, cyber warfare is defined for the purpose of this article as the use of exploits in cyber space as a way to intentionally cause harm to people, assets...

  13. Hybrid Maritime Warfare

    DEFF Research Database (Denmark)

    Schaub Jr, Gary John; Murphy, Martin; Hoffman, Frank

    2017-01-01

    Russia’s use of hybrid warfare techniques has raised concerns about the security of the Baltic States. Gary Schaub, Jr, Martin Murphy and Frank G Hoffman recommend a series of measures to augment NATO’s Readiness Action Plan in the Baltic region, including increasing the breadth and depth of naval...... exercises, and improving maritime domain awareness through cooperative programmes. They also suggest unilateral and cooperative measures to develop a sound strategic communications strategy to counter Moscow’s information operations, reduce dependence on Russian energy supplies and build the resilience...

  14. Naval Law Review, Volume 50, 2004

    National Research Council Canada - National Science Library

    Noone, Gregory P; Fleming, Christian P; Morean, Robert P; Danner, Jr., John V; Fluhr, Jr., Philip N; Shapiro, Jonathan I; Hodgkinson, Sandra L; Romero, Joseph; Yim, Anthony; Galvin, Joseph E

    2004-01-01

    ...: Issues in Modern Warfare," by Commander Gregory P. Noone, et al. This article discusses the history of the treatment of prisoners of war, the law of armed conflict as it pertains to them, and relevant U.S. policy...

  15. Establishing Cyber Warfare Doctrine

    Directory of Open Access Journals (Sweden)

    Andrew M. Colarik

    2012-01-01

    Full Text Available Over the past several decades, advances in technology have transformed communications and the ability to acquire, disseminate, and utilize information in a range of environments. Modern societies and their respective militaries have taken advantage of a robust information space through network-centric systems. Because military and commercial operations have increasingly converged, communication and information infrastructures are now high-priority military objectives in times of war. This article examines the theoretical underpinning of current cyber warfare research, what we have learned so far about its application, and some of the emerging themes to be considered; it also postulates the development of a (national cyber warfare doctrine (CWD. An endeavor of this scale requires lots of considerations and preparation for its development if it is to be cooperatively embraced. This article considers why information technology systems and their supporting infrastructures should be considered legitimate military targets in conflicts, and offers several events that support this supposition. In addition, it identifies the various forms of doctrine that will become the basis for developing a CWD, discusses a CWD's possible components, and proposes a national collaborative and discussion framework for obtaining a nation's stakeholder buy-in for such an endeavor.

  16. Indignation: Psychology, Politics, Law

    OpenAIRE

    Sunstein, Cass Robert; Kahneman, Daniel

    2007-01-01

    Moral intuitions operate in much the same way as other intuitions do; what makes the moral domain is distinctive is its foundations in the emotions, beliefs, and response tendencies that define indignation. The intuitive system of cognition, System I, is typically responsible for indignation; the more reflective system, System II, may or may not provide an override. Moral dumbfounding and moral numbness are often a product of moral intuitions that people are unable to justify. An understandin...

  17. Cyber Warfare/Cyber Terrorism

    National Research Council Canada - National Science Library

    O'Hara, Timothy

    2004-01-01

    .... Section 1 concludes with a review of offensive and defensive cyber warfare concepts. Section 2 presents a general overview of cyber terrorism, including definitions of cyber terrorism and cyber terrorism support...

  18. Attrition in Network Centric Warfare

    National Research Council Canada - National Science Library

    Erbetta, John

    2003-01-01

    .... Information warfare means that positive attacks on systems themselves compound the problem. Emerging technologies applicable to NCW as a force multiplier need to be recognized as counter to the impediments to progress...

  19. The ethics of information warfare

    CERN Document Server

    Floridi, Luciano

    2014-01-01

    This book offers an overview of the ethical problems posed by Information Warfare, and of the different approaches and methods used to solve them, in order to provide the reader with a better grasp of the ethical conundrums posed by this new form of warfare.The volume is divided into three parts, each comprising four chapters. The first part focuses on issues pertaining to the concept of Information Warfare and the clarifications that need to be made in order to address its ethical implications. The second part collects contributions focusing on Just War Theory and its application to the case of Information Warfare. The third part adopts alternative approaches to Just War Theory for analysing the ethical implications of this phenomenon. Finally, an afterword by Neelie Kroes - Vice President of the European Commission and European Digital Agenda Commissioner - concludes the volume. Her contribution describes the interests and commitments of the European Digital Agenda with respect to research for the developme...

  20. Nuclear radiation in warfare

    International Nuclear Information System (INIS)

    Rotblat, J.

    1986-01-01

    The subject is covered in chapters, entitled: introduction; digest of nuclear weaponry (characteristics of nuclear weapons; effects of nuclear weapons other than ionizing radiation (fire-ball, fall-out, thermal radiation, blast wave, electromagnetic pulse); the nuclear arms race; war scenarios; biological effects of radiations on man (radiation doses; natural sources of radiation; acute effects of radiation; long-term somatic effects; genetic effects; factors affecting the biological response to radiation; internal exposure; synergistic effects; protection against radiation effects); radiations from nuclear explosions (initial radiation; fall-out; effects of fall-out on animal and plant life; contamination of water and food supplies by fall-out); radiation casualties in a nuclear war; effectiveness of civil defence; other warlike uses of radiation (attacks on civilian nuclear power installations; radiological warfare; terrorist activities); conclusion. (orig./HP) [de

  1. Nuclear radiation in warfare

    International Nuclear Information System (INIS)

    Rotblat, J.

    1981-01-01

    The subject is covered in chapters, entitled: introduction; digest of nuclear weaponry (characteristics of nuclear weapons; effects of nuclear weapons other than ionizing radiation (fire-ball, fall-out, thermal radiation, blast wave, electromagnetic pulse); the nuclear arms race; war scenarios); biological effects of radiations on man (radiation doses; natural sources of radiation; acute effects of radiation; long-term somatic effects; genetic effects; factors affecting the biological response to radiation; internal exposure; synergistic effects; protection against radiation effects); radiations from nuclear explosions (initial radiation; fall-out; effects of fall-out on animal and plant life; contamination of water and food supplies by fall-out); radiation casualties in a nuclear war; effectiveness of civil defence; other warlike uses of radiation (attacks on civilian nuclear power installations; radiological warfare; terrorist activities); conclusion. (U.K.)

  2. Reflections on nuclear warfare

    International Nuclear Information System (INIS)

    Evans, J.P.

    1983-01-01

    The author looks back on his more than 70 years of familiarity with Americans involved in warfare, noting their loyal support for our country's objectives. Drawing on the Einstein equation, his own visits to Hiroshima and Nagasaki, and current literature, he, as a physician, belatedly concurs with those who look on the use of nuclear weapons as irrational and untenable. Their employment under present circumstances would create a ''final epidemic'' to be avoided only by prevention. He suggests that medical perceptions must be considered by our national leaders in assessing the many factors that he hopes will lead to rational answers to this urgent, highly complex, and vital enigma. He cites physicians' efforts to help in finding answers and asks that his colleagues consider the issues with attention to the gravity of the situation and act according to their best judgment

  3. Intelligence Strategy for Fourth Generation Warfare

    National Research Council Canada - National Science Library

    Jamison, Edward P

    2006-01-01

    ...." They have named this new era of war "fourth generation warfare." Currently the Department of Defense's intelligence strategy is designed to defeat conventional adversaries vise a fourth generation warfare opponent...

  4. Associations between Psychological Distress and Body Mass Index among Law Enforcement Officers: The National Health Interview Survey 2004-2010

    Directory of Open Access Journals (Sweden)

    Ja K. Gu

    2013-03-01

    Conclusion: Mean BMI significantly increased as psychological distress increased among female LEOs. A longitudinal study design may reveal the directionality of this association as well as the potential role that physical activity might play in this association.

  5. Network Centric Warfare Case Study: U.S. V Corps and 3rd Infantry Division (Mechanized) During Operation Iraqi Freedom Combat Operations (Mar-Apr 2003). Volume 3. Network Centric Warfare Insights

    Science.gov (United States)

    2003-01-01

    OPSEC), military deception, psychological operations (PSYOPS), special information operations (IO), information assurance, physical security...nonlethal effects, such as operational 8 Network Centric Warfare Case Study security (OPSEC), military deception, psychological operations (PSYOP...Support Operations Group ASR Alternate Supply Route; or, Ammunition Supply Rate ATACMS Army Tactical Missile System ATARS Advanced

  6. The ethics of drone warfare

    Directory of Open Access Journals (Sweden)

    Fatić Aleksandar

    2017-01-01

    Full Text Available The paper investigates the compatibility of the modern technologies of warfare, specifically the use of offensive drones, with traditional military ethics and suggests that the new technologies radically change the value system of the military in ways which make large parts of the traditional military ethics inapplicable. The author suggests that Agamben’s concept of ‘effectivity’ through ‘special actions’ which mark one’s belonging to a particular community or profession is a useful conceptual strategy to explore the compatibility of drone warfare with traditional military ethics; this strategy shows mixed results at best.

  7. The doctor and nuclear warfare

    International Nuclear Information System (INIS)

    Anon.

    1982-01-01

    At the 34th World Medical Assembly in Lisbon in 1981 the World Medical Association adopted a motion proposed by the American Medical Association that national medical associations should develop programs to educate the civilian population on the medical consequences of nuclear war. This article discusses the attitude the medical professions should have, should nuclear warfare in some form confront them in the future. The conclusion is drawn that defence against nuclear warfare is only a part of civil defence against any disaster, including the natural disasters such as flood and fire and the man-made disasters of transport accidents, even of problems at nuclear plants designed to supply energy

  8. The law concerning the conduct of lineups in England and Wales: how well does it satisfy the recommendations of the American Psychology-Law Society?

    Science.gov (United States)

    Kebbell, M R

    2000-06-01

    Four rules minimize the likelihood of a false conviction resulting from the misidentification of a suspect from a lineup: (1) The person conducting the lineup should not know which member of the lineup is the suspect. (2) The eyewitness should be warned that the criminal might not be present. (3) Foils should be selected based on the eyewitness's verbal description of the criminal. (4) Confidence should be recorded at the time of identification. In this paper the relevant law relating to lineups in England and Wales is outlined and the extent to which they satisfy the four rules is reviewed. It is concluded that the way in which lineups are conducted in England and Wales would, with minor modifications, satisfy the four rules, and this demonstrates that the rules can be applied practically.

  9. The Seed Is the Law

    Science.gov (United States)

    Antone, Eileen M.

    2005-01-01

    Since humanities arise from a specific place and from the people of that place, this article will focus on Peacemaker's revolutionary teachings about the seed of law. Long before the people from across the ocean arrived here on Turtle Island (North America) there was much warfare happening. According to John Mohawk (2001, para. 1), an Iroquoian…

  10. Biological warfare, bioterrorism, and biocrime

    NARCIS (Netherlands)

    Jansen, H. J.; Breeveld, F. J.; Stijnis, C.; Grobusch, M. P.

    2014-01-01

    Biological weapons achieve their intended target effects through the infectivity of disease-causing infectious agents. The ability to use biological agents in warfare is prohibited by the Biological and Toxin Weapon Convention. Bioterrorism is defined as the deliberate release of viruses, bacteria

  11. European Curricula, Xenophobia and Warfare.

    Science.gov (United States)

    Coulby, David

    1997-01-01

    Examines school and university curricula in Europe and the extent of their influence on xenophobia. Considers the pluralistic nature of the European population. Discusses the role of curriculum selection and language policy in state efforts to promote nationalism. Assesses the role of curricular systems in the actual encouragement of warfare,…

  12. The Anatomy of Counterinsurgency Warfare

    DEFF Research Database (Denmark)

    Mouritsen, Lars; Pedersen, Kenneth; Thruelsen, Peter Dahl

    Since the beginning of the new millennium, the West has been increasingly involved in a tiresome and rather particular type of conflict: insurgency warfare. The bloody and shocking terrorist attacks on New York and Washington in September 2001 marked the beginning of a new era, and the introducti...

  13. Strategic Analysis of Irregular Warfare

    Science.gov (United States)

    2010-03-01

    the same mathematical equations used by Lanchester .10 Irregular Warfare Theory and Doctrine It is time to develop new analytical methods and models...basis on which to build, similar to what Lanchester provided almost 100 years ago. Figure 9 portrays both Lanchester’s approach and an irregular 17

  14. Roots of Russian Irregular Warfare

    Science.gov (United States)

    2016-12-01

    PAGE INTENTIONALLY LEFT BLANK xiii ACKNOWLEDGMENTS Crissy, your encouragement throughout my career and especially during this project has been...all of the Russian disinformation techniques in Ukraine came directly “from Soviet toolkits .” Maria Snegovaya, “Putin’s Information Warfare In

  15. Technology Transition for Hybrid Warfare

    Science.gov (United States)

    2010-02-16

    and Iraq. At the same time, the science and technology base must provide the disruptive technologies to defeat future conventional enemies. This... disruptive technologies will be needed to retain long-term technological superiority in conventional warfare. Incremental improvement is the most...technology to be missed. Disruptive technologies are the second type of technological change and involve revolutionary concepts involving large technological

  16. Anxiety, depression, and posttraumatic stress in Iranian survivors of chemical warfare.

    Science.gov (United States)

    Hashemian, Farnoosh; Khoshnood, Kaveh; Desai, Mayur M; Falahati, Farahnaz; Kasl, Stanislav; Southwick, Steven

    2006-08-02

    In the 1980-1988 Iran-Iraq War, extensive use of chemical weapons resulted in high rates of morbidity and mortality. While much is known about the physical consequences of chemical warfare, there is a paucity of information about the long-term effects of chemical attacks on mental health. To assess the long-term psychological impact of chemical warfare on a civilian population. Cross-sectional randomized survey conducted in July 2004 of 153 civilians in 3 towns exposed to warfare in northwestern Iran: Oshnaviyeh (low-intensity conventional warfare), Rabat (high-intensity conventional warfare), and Sardasht (both high-intensity conventional warfare and chemical weapons). Full or partial posttraumatic stress disorder (PTSD) diagnosis, anxiety symptoms, and depressive symptoms were assessed using Farsi versions of the Clinician-Administered PTSD Scale, Hamilton Scale for Anxiety, and Beck Depression Inventory, respectively. Overall participation rate was 93%. Respondents had a mean age of 45 years and were all of Kurdish ethnicity. Among individuals exposed to both high-intensity warfare and chemical weapons, prevalence rates for lifetime PTSD, current PTSD, major anxiety symptoms, and severe depressive symptoms were 59%, 33%, 65%, and 41%, respectively. Among the low-intensity warfare group, the corresponding rates were 8%, 2%, 18%, and 6%, respectively, while intermediate rates were found among those exposed to high-intensity warfare but not to chemical weapons (31%, 8%, 26%, and 12%, respectively). Compared with individuals exposed to low-intensity warfare, those exposed to both high-intensity warfare and chemical weapons were at higher risk for lifetime PTSD (odds ratio [OR], 18.6; 95% confidence interval [CI], 5.8-59.4), current PTSD (OR, 27.4; 95% CI, 3.4-218.2), increased anxiety symptoms (OR, 14.6; 95% CI, 6.0-35.6), and increased depressive symptoms (OR, 7.2; 95% CI, 3.3-15.9). Exposure to high-intensity warfare but not to chemical weapons was also

  17. Unconventional Cyber Warfare: Cyber Opportunities in Unconventional Warfare

    Science.gov (United States)

    2014-06-01

    Internet service provider IW irregular warfare MCO major combat operations MySQL open-source relational database management system NATO North...today, often with no regard for legal or ethical constraints. A better course of action would be to conduct operations in cyberspace within the precepts...built in feature of MySQL that 97 John Markoff, “Before the Gunfire, Cyberattacks,” York Times, August 13, 2008, sec. Technology, 1, http

  18. Hybrid Warfare: the 21st Century Russian Way of Warfare

    Science.gov (United States)

    2017-05-25

    to wage information operations— from television, to the Internet, to unconventional forces on the ground spreading the message word -of- mouth ...adversarial vulnerabilities. Many of the peculiarities of hybrid warfare described herein are inextricably linked to Russia’s social , political, and...the US election. Then they utilized various means of media to distribute that information with the goal to discredit the US political process and

  19. 2008 13th Expeditionary Warfare Conference

    Science.gov (United States)

    2008-10-23

    platforms – Emphasize a mixed fleet approach that spans the “iron triangle” – Integrate MRAP into the fleet mix – Transition to a fleet of tactical...Urban Warfare Mountain Warfare Desert Warfare Jungle Riverine Special Skills Recon LOG CSS ENG MT HS Ord Maint EOD Pers Retrival ...Detection (Specialized Platform FLGPR)Stand-off (60M) Scaleable Neutralization (Area coverage) ABV Delivery Ground Cueing Stand-off (800M) Scaleable

  20. Information Warfare in the Cyber Domain

    National Research Council Canada - National Science Library

    Takemoto, Glenn

    2001-01-01

    ...). This paper lays a foundation by defining the terminology associated with Information Warfare in the Cyber Domain, reviews the threat and illustrates the vulnerabilities of our information systems...

  1. Cyber warfare building the scientific foundation

    CERN Document Server

    Jajodia, Sushil; Subrahmanian, VS; Swarup, Vipin; Wang, Cliff

    2015-01-01

    This book features a wide spectrum of the latest computer science research relating to cyber warfare, including military and policy dimensions. It is the first book to explore the scientific foundation of cyber warfare and features research from the areas of artificial intelligence, game theory, programming languages, graph theory and more. The high-level approach and emphasis on scientific rigor provides insights on ways to improve cyber warfare defense worldwide. Cyber Warfare: Building the Scientific Foundation targets researchers and practitioners working in cyber security, especially gove

  2. Shadow Wars: An Analysis of Counterinsurgency Warfare

    National Research Council Canada - National Science Library

    Dogan, Osman

    2005-01-01

    ... of the current strategic approaches to counterinsurgency warfare. Toward this end, a systems model approach, which views insurgent organizations as open systems, is adapted to the insurgent environment...

  3. The ethics of drone warfare

    OpenAIRE

    Fatić Aleksandar

    2017-01-01

    The paper investigates the compatibility of the modern technologies of warfare, specifically the use of offensive drones, with traditional military ethics and suggests that the new technologies radically change the value system of the military in ways which make large parts of the traditional military ethics inapplicable. The author suggests that Agamben’s concept of ‘effectivity’ through ‘special actions’ which mark one’s belonging to a particular communit...

  4. Radioecological aspects of nuclear warfare

    International Nuclear Information System (INIS)

    Edvardson, Kay

    1977-01-01

    Radioactive fallout, one of the major effects of nuclear warfare, will cause acute radiation sickness within the close-in or intermediate areas downwind from surface bursts. Global fallout from high yield explosions will be fairly evenly distributed in the hemisphere where the explosions occur, and will cause irradiation from ground deposit, inhaled material and contaminated food. Estimates of collective doses and the approximate number of late casualties from the global contamination are presented for a given total explosion yield. (author)

  5. [Psychological harassment].

    Science.gov (United States)

    Puech, Paloma; Pitcho, Benjamin

    2013-04-01

    Two types of harassment are distinguished: sexual and psychological. In the private sector, according to French labour laws and the penal code, psychological harassment is actionable. It is up to the employer to prove the absence of harassment. The sanctions incurred can be up to 5 years imprisonment and a 150,000 euro fine and various measures of compensation for damages can be envisaged.

  6. Zipf's law, power laws and maximum entropy

    International Nuclear Information System (INIS)

    Visser, Matt

    2013-01-01

    Zipf's law, and power laws in general, have attracted and continue to attract considerable attention in a wide variety of disciplines—from astronomy to demographics to software structure to economics to linguistics to zoology, and even warfare. A recent model of random group formation (RGF) attempts a general explanation of such phenomena based on Jaynes' notion of maximum entropy applied to a particular choice of cost function. In the present paper I argue that the specific cost function used in the RGF model is in fact unnecessarily complicated, and that power laws can be obtained in a much simpler way by applying maximum entropy ideas directly to the Shannon entropy subject only to a single constraint: that the average of the logarithm of the observable quantity is specified. (paper)

  7. Hybrid Warfare: Preparing for Future Conflict

    Science.gov (United States)

    2015-02-17

    ciceromagazine.com/?s=getting+behind+hybrid+warfare. Brown , Col Leslie F. “Twenty-First Century Warfare Will be Hybrid.” Carlisle Barracks, PA...Lebanon and Gaza.” Rand Corporation Occasional Paper. Santa Monica, CA: Rand Corporation, 2010. Jones, Gareth and Darya Korsunskaya. “U.S., EU

  8. Reactivity of Dual-Use Decontaminants with Chemical Warfare Agents

    Science.gov (United States)

    2016-07-01

    REACTIVITY OF DUAL-USE DECONTAMINANTS WITH CHEMICAL WARFARE AGENTS ECBC-TR-1384... Decontaminants with Chemical Warfare Agents 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER 6. AUTHOR(S) Willis, Matthew P...extraction) of chemical warfare agents from materials. 15. SUBJECT TERMS GD HD Decontamination Hazard mitigation VX Chemical warfare agent Liquid-phase

  9. The Information Warfare Life Cycle Model

    Directory of Open Access Journals (Sweden)

    Brett van Niekerk

    2011-11-01

    Full Text Available Information warfare (IW is a dynamic and developing concept, which constitutes a number of disciplines. This paper aims to develop a life cycle model for information warfare that is applicable to all of the constituent disciplines. The model aims to be scalable and applicable to civilian and military incidents where information warfare tactics are employed. Existing information warfare models are discussed, and a new model is developed from the common aspects of these existing models. The proposed model is then applied to a variety of incidents to test its applicability and scalability. The proposed model is shown to be applicable to multiple disciplines of information warfare and is scalable, thus meeting the objectives of the model.

  10. The Information Warfare Life Cycle Model

    Directory of Open Access Journals (Sweden)

    Brett van Niekerk

    2011-03-01

    Full Text Available Information warfare (IW is a dynamic and developing concept, which constitutes a number of disciplines. This paper aims to develop a life cycle model for information warfare that is applicable to all of the constituent disciplines. The model aims to be scalable and applicable to civilian and military incidents where information warfare tactics are employed. Existing information warfare models are discussed, and a new model is developed from the common aspects of these existing models. The proposed model is then applied to a variety of incidents to test its applicability and scalability. The proposed model is shown to be applicable to multiple disciplines of information warfare and is scalable, thus meeting the objectives of the model.

  11. Operationalizing and Measuring (a Kind of Free Will (and Responsibility. Towards a New Framework for Psychology, Ethics, and Law

    Directory of Open Access Journals (Sweden)

    Andrea Lavazza

    2015-04-01

    Full Text Available Free will is usually defined by three conditions: (1 the ability to do otherwise; (2 control of one’s own choices; (3 responsiveness to reasons. The compatibility of free will with determinism lies at the heart of the philosophical debate at the metaphysical level. This debate, while being increasingly refined, has not yet reached a conclusion. Recently, neuroscience and empirical psychology have tried to settle the problem of free will with a series of experiments that go in the direction of so-called illusionism: free will as the conscious control of our behavior cannot exist, being a mere illusion. But even in this case, the experimental results are challenged at various levels. Considering that in most moral and legal systems, the subject’s liability derives from their freedom, the usefulness of preserving the concept of freedom – which incidentally responds to a very strong commonsensical intuition – suggests the need for an operational solution. This could be done by resorting to the concepts of capacity and cognitive control, which are measured by a set of well-established neuropsychological tests. Our preliminary proposal is to create an index, the first step towards a specific quantification and measurement of free will, to be used especially in ethical and legal contexts. Theoretical premises, practical difficulties and objections to this approach are also discussed and addressed.

  12. Radioecological aspects of nuclear warfare

    International Nuclear Information System (INIS)

    Edvarson, K.

    1975-01-01

    The radioactive fallout from nuclear explosions is one of the major effects of nuclear warfare. Those levels causing acute radiation sickness are to be expected only within the close-in or intermediate areas downwind from surface bursts. Global fallout from high yield explosions will be fairly evenly distributed in the hemisphere where the explosions occurred and cause irradiation from ground deposit, inhaled material and contaminated food. The collective doses and the order of magnitude of late casualties from this global contamination are estimated for a given total explosion yield. (auth)

  13. Information warfare technologies in political discourse

    Directory of Open Access Journals (Sweden)

    Karpova Anna Yu.

    2016-01-01

    Full Text Available We attempt to examine the technology of «information warfare» in this paper. The dominant theme of the paper is that the outcome of the information warfare is important not only for the future of a state itself but for the future of the world balance of forces. The main task of geopolitical actors in information warfare is to introduce ideas corresponding to their interests into mass consciousness. All participants of political conflicts have common features in technologies of Information warfare. The information anomie is the indicator of the great geopolitical actors’ personified interests on the stage of «information warfare» - the process resulted in destroying the communicative line: report-information understanding and disrupting the social order in society. In this paper authors describe the following Information Warfare technologies: "Political volcano" technology; "SPIN" technology; "Widening media resource" technology; "specific gravity" technology; "Cold War 2.0" technology and Information cleaningup technology. It is assumed that in the future there will be new instructions on applying technologies of information warfare. To impart perspective to the paper we consider examples, opinions and trends.

  14. Moltke as a Model for Information Warfare

    National Research Council Canada - National Science Library

    Gallagher, Daniel P

    1998-01-01

    ... with late 20th century Information Warfare (IW). Clausewitz, with his emphasis on concentrating forces for a decisive battle, or Sun Tzu, with his focus on an indirect approach and subduing the enemy without battle, might appear to be more...

  15. Gas Warfare in World War I.

    Science.gov (United States)

    Flintham, A. J.

    1978-01-01

    The effectiveness of gas warfare during World War I was increased by the lack of a basic understanding of the behavior of gases on the part of the soldiers. This was a result of deficiencies in science education. (BB)

  16. Prehistoric ceremonial warfare: beginning of institutionalized violence

    Czech Academy of Sciences Publication Activity Database

    Turek, Jan

    2017-01-01

    Roč. 13, č. 3 (2017), s. 535-548 ISSN 1555-8622 Institutional support: RVO:67985912 Keywords : human aggression * ceremonial warfare * archery symbolism * Neolithic * Chalcolithic * Europe Subject RIV: AC - Archeology, Anthropology, Ethnology OBOR OECD: Archaeology

  17. On Cyber Warfare Command and Control Systems

    National Research Council Canada - National Science Library

    Howes, Norman R; Mezzino, Michael; Sarkesain, John

    2004-01-01

    .... Cyber warfare then becomes a one-sided battle where the attacker makes all the strikes and the target of the attack responds so slowly that the attacker usually gets away without being identified...

  18. Enzymatic Decontamination of Chemical Warfare Agents

    National Research Council Canada - National Science Library

    Raushel, Frank

    2000-01-01

    The primary objective of this research program is the development of a versatile enzyme-based system that is fully optimized for the decontamination, destruction, and detection of know chemical warfare agents...

  19. Mountain Warfare: The Need for Specialist Training

    National Research Council Canada - National Science Library

    Malik, Muhammad

    2003-01-01

    This study focuses on the need for specialist training for mountain warfare. It analyzes the special characteristics of mountain and high altitude terrain which affect conduct of military operations...

  20. Insurgent Uprising: An Unconventional Warfare Wargame

    Science.gov (United States)

    2017-12-01

    Cleveland, Charles T. Connett, and Will Irwin. “Unconventional Warfare in the Gray Zone.” Joint Forces Quarterly 80, no. 1 (2016). Work, Robert O...CODE 13. ABSTRACT (maximum 200 words) Today, and in the future, unconventional solutions will present U.S. policymakers with options for dealing...training objectives and will complement existing training exercises. 14. SUBJECT TERMS unconventional warfare, foreign internal defense, direct

  1. Distributed computing environment for Mine Warfare Command

    OpenAIRE

    Pritchard, Lane L.

    1993-01-01

    Approved for public release; distribution is unlimited. The Mine Warfare Command in Charleston, South Carolina has been converting its information systems architecture from a centralized mainframe based system to a decentralized network of personal computers over the past several years. This thesis analyzes the progress Of the evolution as of May of 1992. The building blocks of a distributed architecture are discussed in relation to the choices the Mine Warfare Command has made to date. Ar...

  2. Route survey periodicity for mine warfare

    OpenAIRE

    Coke, Hartwell F.

    2009-01-01

    Approved for public release, distribution unlimited One of the Navy's most long standing challenges has been conquering the mine warfare threat. As mines and mine warfare techniques evolve and become more sophisticated, so does the United States' ability to counter the threat. The United States newest technique for countering a potential mined harbor, or route, is a process known as "change detection." This concept uses previous side scan sonar images of the area prior to a mining event an...

  3. On the Probability of Predicting and Mapping Traditional Warfare Measurements to the Cyber Warfare Domain

    CSIR Research Space (South Africa)

    Grobler, M

    2014-07-01

    Full Text Available Cyber warfare is a contentious topic, with no agreement on whether this is a real possibility or an unrealistic extension of the physical battlefield. This article will not debate the validity and legality of the concept of cyber warfare...

  4. Implementation of the provisions of the European social charter on the right to protection of youth from the danger of causing physical and psychological harm in the process of their labor in the labor law of the Russian Federation

    Directory of Open Access Journals (Sweden)

    Marina Eduardovna Kandel

    2015-06-01

    Full Text Available Objective to analyze special measures and safeguards enshrined in the provisions of Art. 7 of the European Social Charter which provides protection of children and adolescents from the danger of causing physical or psychological harm in the process of their labor and its implementation in the Labor Law of the Russian Federation in connection with acceptance of obligations under Art. 7 of the European Social Charter. Methods comparative legal research method was applied. Results the comparative legal analysis was carried out of the implementation of measures and warranties expressed in Art. 7 of the European Social Charter which guarantee the right of children and adolescents to be protected from the danger of causing physical and psychological harm in the process of their employment within the Russian Labor Law investigation was made of the degree of compliance of norms of the Russian Labor Law with the specified provisions of the Charter and the requirements of European Convention the necessary measures are listed to fill up the norms and gaps in the Russian Labor Law. Scientific novelty for the first time the article presents a comprehensive comparative legal study on the implementation of measures and safeguards embodied in Art. 7 of the Charter which guarantee the right of children and adolescents to be protected from the danger of causing physical and psychological harm in the process of labor activity in the Russian norms of Labor Law the degree of their compliance with the Charter is determined practical steps are offered to reform the Russian legislation with the aim of implementation of the assumed Charter obligations by the Russian Federation. Practical value the measures for the protection of children proposed by the author can be used in scientific legislative and lawenforcement practice in Russia. nbsp

  5. The Impact of Irregular Warfare on the US Army

    National Research Council Canada - National Science Library

    McDonald, III, Roger L

    2006-01-01

    Although the U.S. Army has yet to clearly define irregular warfare, it is imperative that the Army take near-term action to enhance the ability of Soldiers and units to operate effectively in an irregular warfare environment...

  6. Dilemmas of Warfare in Densely Populated Civilian Areas

    OpenAIRE

    Moshe Tamir

    2012-01-01

    This essay attempts to present operational perspectives on conducting warfare in densely populated areas. It also distinguishes between three types of combat within this general category, with the goal of shedding light on this complex type of warfare.

  7. Evolution of war and cyber attacks in the concept of conventional warfare

    Directory of Open Access Journals (Sweden)

    Huseyin Kuru

    2018-01-01

    Full Text Available Humanity have witnessed many confrontations of states whose interests challenge at some points and their struggle to neutralize problems in battlefield. While war was perceived as a way of eliminating deadlocks for some parties, some considered it as one of the international policy materials. The definition and content of conventional warfare have been subject to change for centuries, while the new weapons and technologies have been developed by human beings that it has brought constant change in the law of war and at the same time more lethal and devastating consequences. The struggle for superiority in international relations played an impulsive role in the development of weapons used in the battlefield. Countries have used their labor and financial resources to improve their military skills. Beginning with stones and sticks in the battlefield, this struggle has reached the point of using the next generation satellite controlled unmanned and armed aircrafts and having nuclear weapons has become more deterrent than using them. The struggle between strong countries and the limited countries in terms of technology and armed groups that do not have enough technology and skills completely changed the definition of conventional warfare. This fight has led Asymmetric warfare born which can turn commercial airline planes full of innocent people into a weapon like September-11 attacks. In this study, the historical development and the change in the content of the warfare were briefly explained and then cyber-attacks in the concept of the fourth generation warfare was analyzed taking into account of prominent attacks.

  8. ISIL's Hybrid Warfare in Syria & Iraq

    DEFF Research Database (Denmark)

    Sørensen, Heine

    2016-01-01

    of and ability to synchronize various instruments of power with a view to achieving their end-state. With regards to the second part of the problem statement, the analysis demonstrates how ISIL employed horizontal escalation and ambiguity initially, but later on turned to vertical escalation, within the military......The case study specifically seeks to answer the following problem statement: Does ISIL qualify as an actor using hybrid warfare and if so what characterizes their particular use of this type of warfare? Based on an analysis of ISIL’s warfare from August 2012 to August 2016 the chapter argues......, that it is possible to answer the first part of the problem statement in an affirmative way. Hence, ISIL is not only theoretically prone to hybridity by organizational setup, and by the people comprising the organization, but has in fact continuously acted according to a hybrid logic in its prioritization...

  9. Survey on Urban Warfare Augmented Reality

    Directory of Open Access Journals (Sweden)

    Xiong You

    2018-01-01

    Full Text Available Urban warfare has become one of the main forms of modern combat in the twenty-first century. The main reason why urban warfare results in hundreds of casualties is that the situational information of the combatant is insufficient. Accessing information via an Augmented Reality system can elevate combatants’ situational awareness to effectively improve the efficiency of decision-making and reduce the injuries. This paper begins with the concept of Urban Warfare Augmented Reality (UWAR and illuminates the objectives of developing UWAR, i.e., transparent battlefield, intuitional perception and natural interaction. Real-time outdoor registration, information presentation and natural interaction are presented as key technologies of a practical UWAR system. Then, the history and current research state of these technologies are summarized and their future developments are highlighted from three perspectives, i.e., (1 Better integration with Geographic Information System and Virtual Geographic Environment; (2 More intelligent software; (3 More powerful hardware.

  10. Soldiers’ Psychological Responses to Tactical Nuclear Warfare

    Science.gov (United States)

    1992-02-01

    530. Greene , T.L. (1987). Description of a nuclear battlefield. In R.H. Young & B.H. Drum (Edo.), Proceedings of the Defense Nuclear Agency Symposium...ATTN: DEPT OF BEHAVOR SCI & LEADERSHIP ATTN: PMS/PMA-423 ATTN: DEPT OF PHYSICS COL J G CAMPBELL ATTN: SCIENCE RESEARCH LAB OPERATIONAL TEST & EVALUATION

  11. Mongol Warfare in the Pre-Dissolution Period »

    Directory of Open Access Journals (Sweden)

    Timothy May

    2015-01-01

    Full Text Available Although the Mongols used many of the tactics and strategies that steppe nomads had used for centuries, the Mongols refined steppe warfare so that this style of warfare reached its apogee during the Mongol Empire. Furthermore, the Mongols developed a style of warfare that made them possibly the greatest military force in history. This work examines several facets of the pre-dissolution period (1200–1260. With the dissolution of the Mongol Empire, Mongol warfare once again changed. In some areas it remained complex while in others it regressed to traditional forces of steppe warfare, still potent but not as effective as the pre-dissolution period.

  12. Guiding Warfare to Reach Sustainable Peace

    DEFF Research Database (Denmark)

    Vestenskov, David; Drewes, Line

    The conference report Guiding Warfare to Reach Sustainable Peace constitutes the primary outcome of the conference It is based on excerpts from the conference presenters and workshop discussions. Furthermore, the report contains policy recommendations and key findings, with the ambition of develo......The conference report Guiding Warfare to Reach Sustainable Peace constitutes the primary outcome of the conference It is based on excerpts from the conference presenters and workshop discussions. Furthermore, the report contains policy recommendations and key findings, with the ambition...... of developing best practices in the education and implementation of IHL in capacity building of security forces....

  13. Biological warfare, bioterrorism, and biocrime.

    Science.gov (United States)

    Jansen, H J; Breeveld, F J; Stijnis, C; Grobusch, M P

    2014-06-01

    Biological weapons achieve their intended target effects through the infectivity of disease-causing infectious agents. The ability to use biological agents in warfare is prohibited by the Biological and Toxin Weapon Convention. Bioterrorism is defined as the deliberate release of viruses, bacteria or other agents used to cause illness or death in people, but also in animals or plants. It is aimed at creating casualties, terror, societal disruption, or economic loss, inspired by ideological, religious or political beliefs. The success of bioterroristic attempts is defined by the measure of societal disruption and panic, and not necessarily by the sheer number of casualties. Thus, making only a few individuals ill by the use of crude methods may be sufficient, as long as it creates the impact that is aimed for. The assessment of bioterrorism threats and motives have been described before. Biocrime implies the use of a biological agent to kill or make ill a single individual or small group of individuals, motivated by revenge or the desire for monetary gain by extortion, rather than by political, ideological, religious or other beliefs. The likelihood of a successful bioterrorist attack is not very large, given the technical difficulties and constraints. However, even if the number of casualties is likely to be limited, the impact of a bioterrorist attack can still be high. Measures aimed at enhancing diagnostic and therapeutic capabilities and capacities alongside training and education will improve the ability of society to combat 'regular' infectious diseases outbreaks, as well as mitigating the effects of bioterrorist attacks. © 2014 The Authors Clinical Microbiology and Infection © 2014 European Society of Clinical Microbiology and Infectious Diseases.

  14. Toward Operational Art in Special Warfare

    Science.gov (United States)

    2016-02-23

    combatant commanders develop special warfare cam- paign options for their theaters that can be integral parts of the national approach. Getting buy -in at...the resistance spawning franchise operations at home or abroad? – Is the resistance attracting funding or other forms of assistance (indigenous

  15. Warfare and the Teaching of History.

    Science.gov (United States)

    Salevouris, Michael J.

    1989-01-01

    Maintains that history teachers must challenge simplistic romantic notions about war. Proposes two approaches to teaching about war: the use of personal war narratives; and examining the relationship between warfare and society. Discusses literature related to these approaches. Contends that only through realistic assessments of war can peace be…

  16. The technical Dimensions of Nuclear Warfare

    International Nuclear Information System (INIS)

    Broda, E.

    1977-01-01

    This text, written by Engelbert Broda in 1977 is about the dimensions of nuclear warfare. Broda describes the devastating effects of the nuclear bombs dropped in 1945 in Hiroshima and Nagasaki and compares these effects with the explosive power of Hydrogen weapons. He also expresses his concerns about another nuclear ware and analyses possible worsening situations like change in the military doctrine. (nowak)

  17. Book Review COMPOSITE WARFARE: THE CONDUCT OF ...

    African Journals Online (AJOL)

    COMPOSITE WARFARE: THE CONDUCT OF. SUCCESSFUL GROUND FORCE. OPERATIONS IN AFRICA. Eeben Barlow. Abel Esterhuyse, PhD. Stellenbosch University. Pinetown: 30 Degrees South Publishers. 2015, 576 pages. ISBN 9781928211761. Africa is still one of the most conflict-ridden places on earth – from ...

  18. MOSES, development of an Underwater Warfare Testbed

    NARCIS (Netherlands)

    Lentze, S.G.

    2001-01-01

    The TNO underwater warfare (UWW) research programme results in a large number of models used in operational research projects. To enhance the accessibility and re-use of these models for new projects, TNO-FEL has developed the modelling environment ‘MOSES - Maritime Operations Simulation and

  19. Biomonitoring of exposure to chemical warfare agents

    NARCIS (Netherlands)

    Noort, D.; Schans, M.J. van der; Benschop, H.P.

    2006-01-01

    An overview is presented of the major methods that are presently available for biomonitoring of exposure to chemical warfare agents, i.e., nerve agents and sulfur mustard. These methods can be applied for a variety of purposes such as diagnosis and dosimetry of exposure of casualties, verification

  20. Psychology and criminal justice

    OpenAIRE

    Adler, Joanna R.

    2013-01-01

    This chapter is designed to give the reader a flavour of a few areas in which psychology has been applied to criminal justice. It begins by providing some historical context and showing the development of some applications of psychology to criminal justice. The chapter is broadly split into 3 sections: Pre Trial; Trial; and Post Trial. In most of this chapter, the areas considered assess how psychology has had an influence on the law and how psychologists work within criminal justice settings...

  1. Environmental law

    International Nuclear Information System (INIS)

    Bender, B.; Sparwasser, R.

    1988-01-01

    Environmental law is discussed exhaustively in this book. Legal and scientific fundamentals are taken into account, a systematic orientation is given, and hints for further information are presented. The book covers general environmental law, plan approval procedures, protection against nuisances, atomic law and radiation protection law, water protection law, waste management law, laws on chemical substances, conservation law. (HSCH) [de

  2. A Predictive Model of Surface Warfare Officer Retention: Factors Affecting Turnover

    National Research Council Canada - National Science Library

    Gjurich, Gregory

    1999-01-01

    Junior Surface Warfare Officer retention is in a crisis. The Surface Warfare Officer community anticipates an inability to fill Department Head billets due to the number of junior Surface Warfare Officers leaving military service...

  3. Adoção de crianças por casais homoafetivos: um estudo comparativo entre universitários de Direito e de Psicologia Children adoption by homosexual couples: a comparative study between law and psychology students

    Directory of Open Access Journals (Sweden)

    Ludgleydson Fernandes de Araújo

    2007-08-01

    Full Text Available Esta pesquisa objetivou analisar e comparar as Representações Sociais (RS de estudantes em fase final do curso de psicologia e de direito acerca da adoção de crianças por casais homossexuais. Para tanto a amostra foi não-probabilística e intencional constituída de 104 universitários, de ambos os sexos (56% feminino e 44% masculino, sendo 51 concluintes do curso de Direito e 53 concluintes do curso de Psicologia. Utilizaram-se questionários com perguntas fechadas. Posteriormente foi categorizada pela análise de conteúdo temática de Bardin (1977/2000. Perceberam-se posicionamentos contrários dos universitários acerca da adoção de crianças por casais homossexuais. No que diz respeito às conseqüências para a criança emergiram conteúdos tais como: influência na orientação sexual, preconceito e ausência de referencial materno/paterno. Os universitários de Psicologia mencionaram que tal fato poderia desenvolver distúrbios psicológicos, ao passo que os universitários de Direito ancoraram suas RS nos problemas morais. Evidenciou-se a necessidade do fomento de mecanismos psicossociais e jurídicos que contribuam na elucidação desta temática complexa e dinâmica na sociedade contemporânea.The objective of this research was to analyze and to compare the Social Representations of last year's undergraduate law and psychology students regarding the adoption of children by homosexual couples. For this purpose, the sample was non-probabilistic and intentional and it was composed of 104 students of both genders (56% female and 44% male; 51 students were graduating in Law, and 53 were graduating in Psychology. Closed questioned questionnaires were used. The data was categorized by Bardin's (1977/2000 thematic content analysis. Contrary attitudes were perceived from the students regarding the adoption of children adoption by homosexual couples. Concerning the consequences to the child, contents such as influence on sexual

  4. Information operation/information warfare modeling and simulation

    OpenAIRE

    Buettner, Raymond

    2000-01-01

    Information Operations have always been a part of warfare. However, this aspect of warfare is having ever-greater importance as forces rely more and more on information as an enabler. Modern information systems make possible very rapid creation, distribution, and utilization of information. These same systems have vulnerabilities that can be exploited by enemy forces. Information force-on-force is important and complex. New tools and procedures are needed for this warfare arena. As these t...

  5. Discursive Psychology

    NARCIS (Netherlands)

    Molder, te H.F.M.

    2016-01-01

    Discursive psychology examines how psychological issues are made relevant and put to use in everyday talk. Unlike traditional psychological perspectives, discursive psychology does not approach the question of what psychology comprises and explains from an analyst's perspective. Instead, the focus

  6. Military Engineers and Chemical Warfare Troops (Inzhenernye Voiska Khimicheskie Voiska),

    Science.gov (United States)

    MILITARY FORCES(FOREIGN), *MILITARY ORGANIZATIONS, MILITARY ENGINEERING , INFANTRY, AMPHIBIOUS OPERATIONS, MINELAYING, ARMORED VEHICLES, NUCLEAR...RADIATION, DOSIMETERS, CHEMICAL WARFARE, PROTECTIVE CLOTHING, DECONTAMINATION, HEALTH PHYSICS.

  7. Electronic Warfare: Comprehensive Strategy Needed for Suppressing Enemy Air Defenses

    National Research Council Canada - National Science Library

    2001-01-01

    .... To achieve this suppression, the services use specialized aircraft designed to neutralize, destroy, or temporarily degrade enemy air defense systems through either physical attack or electronic warfare...

  8. Computational models of intergroup competition and warfare.

    Energy Technology Data Exchange (ETDEWEB)

    Letendre, Kenneth (University of New Mexico); Abbott, Robert G.

    2011-11-01

    This document reports on the research of Kenneth Letendre, the recipient of a Sandia Graduate Research Fellowship at the University of New Mexico. Warfare is an extreme form of intergroup competition in which individuals make extreme sacrifices for the benefit of their nation or other group to which they belong. Among animals, limited, non-lethal competition is the norm. It is not fully understood what factors lead to warfare. We studied the global variation in the frequency of civil conflict among countries of the world, and its positive association with variation in the intensity of infectious disease. We demonstrated that the burden of human infectious disease importantly predicts the frequency of civil conflict and tested a causal model for this association based on the parasite-stress theory of sociality. We also investigated the organization of social foraging by colonies of harvester ants in the genus Pogonomyrmex, using both field studies and computer models.

  9. Handbook of toxicology of chemical warfare agents

    CERN Document Server

    2010-01-01

    This groundbreaking book covers every aspect of deadly toxic chemicals used as weapons of mass destruction and employed in conflicts, warfare and terrorism. Including findings from experimental as well as clinical studies, this one-of-a-kind handbook is prepared in a very user- friendly format that can easily be followed by students, teachers and researchers, as well as lay people. Stand-alone chapters on individual chemicals and major topics allow the reader to easily access required information without searching through the entire book. This is the first book that offers in-depth coverage of individual toxicants, target organ toxicity, major incidents, toxic effects in humans, animals and wildlife, biosensors, biomarkers, on-site and laboratory analytical methods, decontamination and detoxification procedures, prophylactic, therapeutic and countermeasures, and the role of homeland security. Presents a comprehensive look at all aspects of chemical warfare toxicology in one reference work. This saves research...

  10. Chemical warfare agents. Classes and targets.

    Science.gov (United States)

    Schwenk, Michael

    2018-09-01

    Synthetic toxic chemicals (toxicants) and biological poisons (toxins) have been developed as chemical warfare agents in the last century. At the time of their initial consideration as chemical weapon, only restricted knowledge existed about their mechanisms of action. There exist two different types of acute toxic action: nonspecific cytotoxic mechanisms with multiple chemo-biological interactions versus specific mechanisms that tend to have just a single or a few target biomolecules. TRPV1- and TRPA-receptors are often involved as chemosensors that induce neurogenic inflammation. The present work briefly surveys classes and toxicologically relevant features of chemical warfare agents and describes mechanisms of toxic action. Copyright © 2017 Elsevier B.V. All rights reserved.

  11. Business Law

    DEFF Research Database (Denmark)

    Föh, Kennet Fischer; Mandøe, Lene; Tinten, Bjarke

    Business Law is a translation of the 2nd edition of Erhvervsjura - videregående uddannelser. It is an educational textbook for the subject of business law. The textbook covers all important topic?s within business law such as the Legal System, Private International Law, Insolvency Law, Contract law......, Instruments of debt and other claims, Sale of Goods and real estate, Charges, mortgages and pledges, Guarantees, Credit agreements, Tort Law, Product liability and Insurance, Company law, Market law, Labour Law, Family Law and Law of Inheritance....

  12. Mapping the Spread of Mounted Warfare

    Directory of Open Access Journals (Sweden)

    Peter Turchin

    2016-12-01

    Full Text Available Military technology is one of the most important factors affecting the evolution of complex societies. In particular, mounted warfare, the use of horse-riders in military operations, revolutionized war as it spread to different parts of Eurasia and Africa during the Ancient and Medieval eras, and to the Americas during the Early Modern period. Here we use a variety of sources to map this spread.

  13. UML modelling of network warfare examples

    CSIR Research Space (South Africa)

    Veerasamy, N

    2011-08-01

    Full Text Available ] Affects both civilian and military domains [8] [9] Related to the concepts of infowar, information operations, hacking, hackivism, cyberterrorism and cybotage depending on motivations and techniques [10] Encompasses both technological solutions...]. In addition, Williers as well as Qingbao and Anwar discuss more offensive aspects of information security and Network Warfare like Hacking, Vulnerability Injection, Network Attacks, Denial of Capability, Interception and Blockage [6] [18] [19]. Various...

  14. Maritime Trade Warfare Against a Modern Power

    Science.gov (United States)

    2013-05-20

    Malaysian and Singaporean support. Operational Environment The previous sections have assessed that an oil embargo would be effective at influencing...will be addressed. The first approach is to stop the trade at its source. This approach forms the foundation of many contemporary sanctions. Under...antisubmarine warfare capable ships, could be sufficient to defend against forces attempting to break a blockade, and a carrier battle group in the Indian Ocean

  15. Navy Operational Planner - Undersea Warfare Module

    Science.gov (United States)

    2016-09-01

    concepts are considered in NOP–USW that are not in previous research: time phasing of missions, mutually exclusive missions, and asset availability...operational planning efforts. NOP–USW suggests the correct allocation of assets across a wide theater of operation to accomplish missions in the...Master’s thesis 4. TITLE AND SUBTITLE NAVY OPERATIONAL PLANNER – UNDERSEA WARFARE MODULE 5. FUNDING NUMBERS 6. AUTHOR(S) Guy A. Molina 7

  16. Toward Operational Art in Special Warfare: Appendixes

    Science.gov (United States)

    2016-01-01

    language, proficiency in small-unit tactics, and the ability to build and fight alongside indigenous combat formations in a permissive, uncertain, or...counterinsurgency through and with indigenous forces or personnel.”1 The report has four aims: (1) to adapt conventional operational art to the unique...perfect near-real-time situational awareness,” at least at the tactical level of land warfare in complex terrain. But the idea of leveraging information

  17. The Cycle of Warfare - Analysis of an Analytical Model

    DEFF Research Database (Denmark)

    Jensen, Mikkel Storm

    2016-01-01

    by its economic, political and ideological characteristics. With the single assumption of economic rationality in human behaviour, Cycle of Warfare is not only coherent, it is applicable to all entities engaged in competition anywhere in the world at any point in history. The Cycle of Warfare can be used...

  18. Surface Warfare Officers Initial Training For Future Success

    Science.gov (United States)

    2018-03-01

    9 A school is initial rating specific technical training that is given to sailors. 14 Figure 4. Less...NAVAL POSTGRADUATE SCHOOL MONTEREY, CALIFORNIA MBA PROFESSIONAL REPORT SURFACE WARFARE OFFICERS— INITIAL TRAINING FOR FUTURE SUCCESS March 2018...professional report 4. TITLE AND SUBTITLE SURFACE WARFARE OFFICERS—INITIAL TRAINING FOR FUTURE SUCCESS 5. FUNDING NUMBERS 6. AUTHOR(S) Arron J

  19. Anti-Air Warfare Research for Naval Forces

    NARCIS (Netherlands)

    Bloemen, A.A.F.; Witberg, R.

    2000-01-01

    AAW is a warfare area with wide-spread spectrum. Command and Control Systems, sensors, effectors and electronic warfare are integrated to a system, they influence each other and must eventually be effective in coordinated action. This complexity asks for Operations Research methods to measure

  20. Chemical profiling of chemical warfare agents for forensic purposes

    NARCIS (Netherlands)

    Noort, D.; Reuver, L.P.J. de; Fidder, A.; Tromp, M.; Verschraagen, M.

    2010-01-01

    A program has been initiated towards the chemical profiling of chemical warfare agents, in order to support forensic investigations towards synthesis routes, production sites and suspect chemical suppliers. Within the first stage of the project various chemical warfare agents (VX, sulfur mustard,

  1. Hybrid Warfare Studies and Russia’s Example in Crimea

    Directory of Open Access Journals (Sweden)

    Mehmet Seyfettin EROL

    2015-12-01

    Full Text Available Although Hybrid Warfare is an old concept, theoretical studies in the western countries mainly began in the post-Col War era, focusing on asymmetrical threats against conventional superiority of western countries such as USA or Israel. September 11th attacks and 2006 Israel-Lebanon war played important roles for the evolution of hybrid warfare theories. However, there has not any consensus among scholars on a exact or unique definition of hybrid warfare. Hybrid warfare became one of the main security issues for the West and especially for NATO after the Russia-Ukraine crisis. Russian military strategies, called “hybrid warfare” by the western countries, resulted in the successful annexation of Crimea and, caused a serious security problem for the West resulting important structural and functional changes for the military system of NATO. Russian activities, which have been based on surprise, ambiguity and deniability, presented a unique example for hybrid warfare studies.

  2. OFFICER AND COMMANDER IN ASYMMETRIC WARFARE OPERATIONS

    Directory of Open Access Journals (Sweden)

    Giuseppe CAFORIO

    2013-01-01

    Full Text Available Starting from the data of a field research conducted among soldiers with asymmetric warfare experiences from nine different countries, the author seeks to identify and shed light on the various problems that officers with command responsibilities had to face during their missions. A picture emerges of feelings and experiences relating to their first impression upon arriving in the theatre, relations with local armed forces, relations with the local population and local authorities, relations with NGOs, relations with other armies, the impact of the rules of engagement (ROEs, training and education, and operational experiences. The paper ends with a discussion of the lessons learned.

  3. Axial Vircator for Electronic Warfare Applications

    Directory of Open Access Journals (Sweden)

    L. Drazan

    2009-12-01

    Full Text Available This paper deals with a high power microwave generator with virtual cathode – vircator in axial release for electronic warfare applications. The classification of directed energy weapons microwave (DEWM is introduced together with basic block diagrams of a particular class of DEWM. In the paper, methods for designing vircator pulsed power supply, axial vircator structure, measurement methods and experimental results are presented. The vircator in electromagnetic ammunition is powered by magneto-cumulative generator and in weapons for defense of objects (WDO, it is powered by Marx generator. The possible applications of a vircator in the DEWM area are discussed.

  4. Electronic warfare receivers and receiving systems

    CERN Document Server

    Poisel, Richard A

    2014-01-01

    Receivers systems are considered the core of electronic warfare (EW) intercept systems. Without them, the fundamental purpose of such systems is null and void. This book considers the major elements that make up receiver systems and the receivers that go in them.This resource provides system design engineers with techniques for design and development of EW receivers for modern modulations (spread spectrum) in addition to receivers for older, common modulation formats. Each major module in these receivers is considered in detail. Design information is included as well as performance tradeoffs o

  5. Environmental law

    International Nuclear Information System (INIS)

    Ketteler, G.; Kippels, K.

    1988-01-01

    In section I 'Basic principles' the following topics are considered: Constitutional-legal aspects of environmental protection, e.g. nuclear hazards and the remaining risk; European environmental law; international environmental law; administrative law, private law and criminal law relating to the environment; basic principles of environmental law, the instruments of public environmental law. Section II 'Special areas of law' is concerned with the law on water and waste, prevention of air pollution, nature conservation and care of the countryside. Legal decisions and literature up to June 1988 have been taken into consideration. (orig./RST) [de

  6. Civil law

    NARCIS (Netherlands)

    Hesselink, M.W.; Gibbons, M.T.

    2014-01-01

    The concept of civil law has two distinct meanings. that is, disputes between private parties (individuals, corporations), as opposed to other branches of the law, such as administrative law or criminal law, which relate to disputes between individuals and the state. Second, the term civil law is

  7. History of chemical and biological warfare agents

    International Nuclear Information System (INIS)

    Szinicz, L.

    2005-01-01

    Chemical and biological warfare agents constitute a low-probability, but high-impact risk both to the military and to the civilian population. The use of hazardous materials of chemical or biological origin as weapons and for homicide has been documented since ancient times. The first use of chemicals in terms of weapons of mass destruction goes back to World War I, when on April 22, 1915 large amounts of chlorine were released by German military forces at Ypres, Belgium. Until around the 1970s of the 20th century, the awareness of the threat by chemical and biological agents had been mainly confined to the military sector. In the following time, the development of increasing range delivery systems by chemical and biological agents possessors sensitised public attention to the threat emanating from these agents. Their proliferation to the terrorists field during the 1990s with the expanding scale and globalisation of terrorist attacks suggested that these agents are becoming an increasing threat to the whole world community. The following article gives a condensed overview on the history of use and development of the more prominent chemical and biological warfare agents

  8. History of chemical and biological warfare agents.

    Science.gov (United States)

    Szinicz, L

    2005-10-30

    Chemical and biological warfare agents constitute a low-probability, but high-impact risk both to the military and to the civilian population. The use of hazardous materials of chemical or biological origin as weapons and for homicide has been documented since ancient times. The first use of chemicals in terms of weapons of mass destruction goes back to World War I, when on April 22, 1915 large amounts of chlorine were released by German military forces at Ypres, Belgium. Until around the 1970s of the 20th century, the awareness of the threat by chemical and biological agents had been mainly confined to the military sector. In the following time, the development of increasing range delivery systems by chemical and biological agents possessors sensitised public attention to the threat emanating from these agents. Their proliferation to the terrorists field during the 1990s with the expanding scale and globalisation of terrorist attacks suggested that these agents are becoming an increasing threat to the whole world community. The following article gives a condensed overview on the history of use and development of the more prominent chemical and biological warfare agents.

  9. [Decontamination of chemical and biological warfare agents].

    Science.gov (United States)

    Seto, Yasuo

    2009-01-01

    Chemical and biological warfare agents (CBWA's) are diverse in nature; volatile acute low-molecular-weight toxic compounds, chemical warfare agents (CWA's, gaseous choking and blood agents, volatile nerve gases and blister agents, nonvolatile vomit agents and lacrymators), biological toxins (nonvolatile low-molecular-weight toxins, proteinous toxins) and microbes (bacteria, viruses, rickettsiae). In the consequence management against chemical and biological terrorism, speedy decontamination of victims, facilities and equipment is required for the minimization of the damage. In the present situation, washing victims and contaminated materials with large volumes of water is the basic way, and additionally hypochlorite salt solution is used for decomposition of CWA's. However, it still remains unsolved how to dispose large volumes of waste water, and the decontamination reagents have serious limitation of high toxicity, despoiling nature against the environments, long finishing time and non-durability in effective decontamination. Namely, the existing decontamination system is not effective, nonspecifically affecting the surrounding non-target materials. Therefore, it is the urgent matter to build up the usable decontamination system surpassing the present technologies. The symposiast presents the on-going joint project of research and development of the novel decontamination system against CBWA's, in the purpose of realizing nontoxic, fast, specific, effective and economical terrorism on-site decontamination. The projects consists of (1) establishment of the decontamination evaluation methods and verification of the existing technologies and adaptation of bacterial organophosphorus hydrolase, (2) development of adsorptive elimination technologies using molecular recognition tools, and (4) development of deactivation technologies using photocatalysis.

  10. Criminal Law

    DEFF Research Database (Denmark)

    Langsted, Lars Bo; Garde, Peter; Greve, Vagn

    <> book contains a thorough description of Danish substantive criminal law, criminal procedure and execution of sanctions. The book was originally published as a monograph in the International Encyclopaedia of Laws/Criminal Law....... book contains a thorough description of Danish substantive criminal law, criminal procedure and execution of sanctions. The book was originally published as a monograph in the International Encyclopaedia of Laws/Criminal Law....

  11. Psychology in Japan.

    Science.gov (United States)

    Imada, Hiroshi; Tanaka-Matsumi, Junko

    2016-06-01

    The purpose of this article is to provide information about Japan and its psychology in advance of the 31st International Congress of Psychology (ICP), to be held in Yokohama, Japan, in 2016. The article begins with the introduction of the Japanese Psychological Association (JPA), the hosting organization of the ICP 2016, and the Japanese Union of Psychological Associations consisting of 51 associations/societies, of which the JPA is a member. This is followed by a brief description of a history of psychology of Japan, with emphasis on the variation in our approach to psychology in three different periods, that is, the pre- and post-Pacific War periods, and the post-1960 period. Next, the international contributions of Japanese psychology/psychologists are discussed from the point of view of their visibility. Education and training in psychology in Japanese universities is discussed with a final positive remark about the long-awaited enactment of the Accredited Psychologist Law in September, 2015. © 2016 International Union of Psychological Science.

  12. ADOPTION IN SHARI'A LAW, ITS IMPACT ON THE MUSLIM MINORITY IN ISRAEL, AND THE THERAPIST-PATIENT RELATIONSHIP WHEN PSYCHOLOGICAL INTERVENTION IS NECESSARY.

    Science.gov (United States)

    Gith, Emad

    2014-10-01

    Adoption is an act of kindness and an expression of the most exalted of human morality. It fulfills the needs of both the adoptive parents and the adopted child. Muslim religious law has rejected the concept of adoption as it exists in the western world and presents several alternatives including personal liability, declaration of guardianship, bestowing a gift and leaving a last will and testament. Nevertheless, over the past 20 years, the Arab-Muslim population in Israel has developed a certain acceptance of the more typical concept of adoption and the willingness to accept the civil legislation that is applied in domestic courts in Israel. This gradual integration into Israeli society as well as the very act of adoption, which remains controversial, often creates the need for treatment, consultation and guidance for the adoptive family and the adopted child. The traditional, collective characteristics of the Arab-Muslim society have a significant impact on the child's emotional state and behavior and, of course, effect the adoptive family's social standing as well. In such situations, it is imperative to discuss the interaction and the often difficult and complex relationship that develops between the therapist or counselor and the patient.

  13. World law

    Directory of Open Access Journals (Sweden)

    Harold J. Berman

    1999-03-01

    Full Text Available In the third millennium of the Christian era, which is characterised by the emergence of a world economy and eventually a world society, the concept of world law is needed to embrace not only the traditional disciplines of public international law, and comparative law, but also the common underlying legal principles applicable in world trade, world finance, transnational transfer of technology and other fields of world economic law, as well as in such emerging fields as the protection of the world's environment and the protection of universal human rights. World law combines inter-state law with the common law of humanity and the customary law of various world communities.

  14. [Medecine, Law, and Knowledge Production about the "Civilized" War in the Long 19th Century].

    Science.gov (United States)

    Goltermann, Svenja

    2015-01-01

    The aim to 'civilize' warfare accompanied Medicine and International Law ever since the mid-19th century. However, the entanglement of Medicine and Law, crucial for such an endeavour, has not been taken into consideration so far; likewise, the huge importance of medical knowledge for the perception of wars and their ramifications did not garner much attention in historical research. Hence, by focusing on the 'long' 19th century, this paper shows, firstly, that the production of surgical knowledge during warfare aimed at measuring the effects of combat on human bodies in order to develop prognostic medical knowledge for future wars, as well as maintaining the combat strength of soldiers. Moreover, this knowledge production during warfare strived for the enhancement of medical competence in the diagnosis and treatment of wounds in general. Secondly, I show that this medical knowledge was not only relevant for warfare, but also crucial for the design of International Law: it served to nourish the debates among the so called 'civilized' nations about legitimate and illegitimate weaponry and warfare.

  15. Adolescentes autores de atos infracionais: psicologia moral e legislação Adolescents who committed criminal transgressions: moral psychology and brazilian laws

    Directory of Open Access Journals (Sweden)

    Franciela Félix de Carvalho Monte

    2011-04-01

    Full Text Available Este trabalho tem o objetivo de discutir o Estatuto da Criança e do Adolescente - ECA, e o Sistema Nacional de Atendimento Socioeducativo - SINASE, os quais dispõem sobre a proteção integral dos direitos fundamentais de crianças e adolescentes. Foca-se a discussão nas diretrizes do atendimento a adolescentes em cumprimento de medidas socioeducativas, especialmente em instituições de ressocialização, destacando-se como características imprescindíveis para o desenvolvimento integral dos adolescentes: o estímulo à negociação, à autonomia, e à democracia, especialmente no relacionamento entre profissionais e adolescentes. Estes documentos são analisados à luz das contribuições teóricas de Piaget para o campo da Psicologia do Desenvolvimento, bem como de achados atuais sobre o desenvolvimento sociomoral de crianças e adolescentes autores de atos infracionais.This article aims to discuss Estatuto da Criança e do Adolescente (ECA and Sistema Nacional de Atendimento Socioeducativo (SINASE which provide for full protection of fundamental rights of children and adolescents. This discussion is based on the perspective of Psychology of Moral Development, especially Piaget' theory and some recent work about social-moral development of young transgressors. It will be emphasized the necessity of changing the assistance to this public, incorporating some ideals like moral autonomy, democracy and interpersonal respect in the routines of the institutions of re-socialization.

  16. Information Warfare: Defining the Legal Response to An Attack

    National Research Council Canada - National Science Library

    Pottorff, James

    1999-01-01

    This paper discusses the difficulty in determining whether an information warfare attack, such as a computer virus, can be treated as an "armed attack" for purposes of national defense under the United Nations charter. As the U.S...

  17. Irregular Warfare: Impact on Future Professional Military Education

    National Research Council Canada - National Science Library

    Paschal, David G

    2006-01-01

    ... to operate effectively in an irregular warfare environment. The utility of a decisive war between nation states continues to decline and will eventually reach critical mass based upon the extreme imbalance of military power and a U.S. monopoly...

  18. FFT Based VLSI Digital One Bit Electronic Warfare Receiver

    National Research Council Canada - National Science Library

    Chien-In, Henry

    1998-01-01

    ... (1 GHz) digital receiver designed for electronic warfare applications. The receiver can process two simultaneous signals and has the potential for fabrication on a single multi-chip module (MCM...

  19. Back to the Basics: An Aviation Solution to Counterinsurgent Warfare

    National Research Council Canada - National Science Library

    Davis, Arthur D

    2005-01-01

    .... By examining past examples of the use of air power in counterinsurgent warfare, this study sheds light on the United States' current failings in both equipment and doctrine as it wages this type of war...

  20. Precision Warfare Enables Interdependent Fires and Maneuver in 2010

    National Research Council Canada - National Science Library

    Smith, John

    1997-01-01

    The U.S. Army is in the midst of a revolution in military affairs (RMA). Significant advancements in informational technologies and precision weapons are providing unprecedented potential for future warfare...

  1. Irregular Warfare: Special Operations Joint Professional Military Education Transformation

    National Research Council Canada - National Science Library

    Cannady, Bryan H

    2008-01-01

    ... on today's battlefront in Afghanistan and Iraq and in the Global War on Terrorism (GWOT). At the forefront of the GWOT and irregular warfare are the United States Special Operations Command (USSOCOM...

  2. Irregular Warfare: New Challenges for Civil-Military Relations

    National Research Council Canada - National Science Library

    Cronin, Patrick M

    2008-01-01

    .... Irregular warfare introduces new complications to what Eliot Cohen has called an unequal dialogue between civilian and military leaders in which civilian leaders hold the true power but must modulate...

  3. Echoes of Chechnya Warfare Resound in Moscow, Quantico

    National Research Council Canada - National Science Library

    Ackerman, Robert

    2000-01-01

    .... thinking about urban warfare. After suffering stunning public defeats just a few years ago, Russian forces applied painful lessons learned then to drive Chechen forces out of their capital city, Grozny, this year...

  4. zero day exploits and national readiness for cyber-warfare

    African Journals Online (AJOL)

    HOD

    A zero day vulnerability is an unknown exploit that divulges security flaws in software before such a flaw is publicly ... Keywords: exploits, zero day, vulnerability, cyberspace, cyber-warfare. 1. ..... industries and companies across the globe. The.

  5. The Role of Airpower in Urban Warfare. An Airman's Perspective

    National Research Council Canada - National Science Library

    Saffold, Timothy

    1998-01-01

    .... This emphasis on surface force employment stifles innovative thought as to how military forces can achieve operational and strategic effects by employing airpower as the key instrument of force in urban warfare...

  6. Fourth Generation Warfare: The Need for a Comprehensive Approach

    National Research Council Canada - National Science Library

    Benton, LeRoy D

    2008-01-01

    .... A definition of Fourth Generation Warfare is developed, based on Col. Thomas X. Hammes' writings. The definition is further developed to show relevance and applicability to current operations in the Long War on Terrorism...

  7. Towards a framework for a network warfare capability

    CSIR Research Space (South Africa)

    Veerasamy, N

    2008-07-01

    Full Text Available . These include the legal issues, ethical dilemmas, technical solutions, financial impact and skill/manpower investment. Logical constraints/implications have been grouped together in the discussion that follows. 5.1.1 Legal Ethical Issues As network warfare... but the underlying causes of crime also needs to be understood. Ethics and morals play a significant role in determining the personality traits of an individual. Users will need to balance ethical dilemmas before engaging in offensive network warfare. Computers...

  8. Structuring Naval Special Warfare junior officer professional military education

    OpenAIRE

    Donovan, Thomas A.

    2007-01-01

    Naval Special Warfare does not currently have a designated career path for an officer that requires professional military education (PME) for SEAL junior officers after the rank of Ensign (O-1) and before the rank of Lieutenant Commander (O-4). There currently is interest in this subject matter at the Naval Special Warfare Command and Center. SEAL officers increasingly hold key leadership positions and influence critical decisions in the execution of national strategy. This growing respo...

  9. Strategy in the Robotic Age: A Case for Autonomous Warfare

    Science.gov (United States)

    2014-09-01

    enabling technology that augments human performance, such as exoskeleton suits, and other complementary fields that make robotics function...philosophy of maneuver warfare with new technologies from the Robotic Age, such as unmanned systems and exoskeleton suits, to present a new warfighting...and Brimley, “20YY,” 12. 49 the exoskeleton suit, but rather that the full benefit of autonomous warfare will be achieved by leveraging mass and

  10. Law in Transition Biblioessay: Globalization, Human Rights, Environment, Technology

    Directory of Open Access Journals (Sweden)

    Michael Marien

    2012-04-01

    Full Text Available As globalization continues, many transformations in international and domestic laws areunderway or called for. There are too many laws and too few, too much law that is inadequateor obsolete, and too much law-breaking. This biblioessay covers some 100 recentbooks, nearly all recently published, arranged in four categories. 1 International Lawincludes six overviews/textbooks on comparative law, laws related to warfare and security,pushback against demands of globalization, and gender perspectives; 2 Human Rightsencompasses general overviews and normative visions, several books on how some statesviolate human rights, five items on how good laws can end poverty and promote prosperity,and laws regulating working conditions and health rights; 3 Environment/Resources coversgrowth of international environmental law, visions of law for a better environmental future,laws to govern genetic resources and increasingly stressed water resources, two books onprospects for climate change liability, and items on toxic hazards and problems of compliance;4 Technology, Etc. identifies eight books on global crime and the failed war on drugs,books on the response to terrorism and guarding privacy and mobility in our high-tech age,seven books on how infotech is changing law and legal processes while raising intellectualproperty questions, biomedical technologies and the law, and general views on the need forupdated laws and constitutions. In sum, this essay suggests the need for deeper and timelyanalysis of the many books on changes in law.

  11. The Impacts of Modern Warfare on Freshwater Ecosystems

    Science.gov (United States)

    Francis, Robert A.

    2011-11-01

    There is increasing recognition and concern regarding the impacts of modern industrial warfare on the environment. Freshwater ecosystems are perhaps the most vulnerable to warfare-related impacts, which is of concern given that they provide so many essential environmental resources and services to society. Despite this, there has been little work to establish and quantify the types of impacts (both negative and positive) that warfare may have on such systems. This paper firstly highlights why rivers and lakes may be susceptible to warfare-related impacts, before synthesizing the available literature to explore the following main themes: intensification of wartime resource acquisition, use of water as an offensive or defensive weapon, direct and indirect effects of explosive ordnance, increased pollution, introduction of invasive alien species, and positive ecological impacts. This is then followed by a discussion of the implications of such impacts in relation to future warfare, including a consideration of the efficacy of existing legal instruments to protect the environment during conflict, and the trend for war to become more localized and `informal', and therefore less regulated. Finally, the paper identifies key research foci for understanding and mitigating the effects of warfare on freshwater ecosystems.

  12. Information Warfare, Threats and Information Security

    Directory of Open Access Journals (Sweden)

    Dmitriy Nikolaevich Bespalov

    2014-01-01

    Full Text Available The article presents the opposite, but dependent on each other's reality - Revolutionary War information,information security goals and objectives of their study within the scheme "challenge-response", methodological and analytical support, the role of elites and the information society in promoting information security. One of the features of contemporaneityis the global spread of ICT, combined with poor governance and other difficulties in the construction of innovation infrastructures that are based on them in some countries. This leads to the reproduction of threats, primarily related to the ability to use ICT for purposes that are inconsistent with the objectives of maintaining international peace and security, compliance with the principles of non-use of force, non-interference in the internal affairs of states, etc. In this regard, include such terms as "a threat of information warfare", "information terrorism" and so forth. Information warfare, which stay in the policy declared the struggle for existence, and relationships are defined in terms of "friend-enemy", "ours-foreign". Superiority over the opponent or "capture of its territory" is the aim of political activity. And information security, serving activities similar process of political control, including a set of components, is a technology until their humanitarian. From the context and the decision itself is the ratio of the achieved results of information and political influence to the target - a positive image of Russia. Bringing its policy in line with the demands of a healthy public opinion provides conductivity of theauthorities initiatives in the country and increases the legitimacy of the Russian Federation actions in the world.

  13. Applicability of federal and state hazardous waste regulatory programs to waste chemical weapons and chemical warfare agents.; TOPICAL

    International Nuclear Information System (INIS)

    Haffenden, R.; Kimmell, T.

    2002-01-01

    This report reviews federal and state hazardous waste regulatory programs that govern the management of chemical weapons or chemical warfare agents. It addresses state programs in the eight states with chemical weapon storage facilities managed by the U.S. Army: Alabama, Arkansas, Colorado, Indiana, Kentucky, Maryland, Oregon, and Utah. It also includes discussions on 32 additional states or jurisdictions with known or suspected chemical weapons or chemical warfare agent presence (e.g., disposal sites containing chemical agent identification sets): Alaska, Arizona, California, Florida, Georgia, Hawaii, Idaho, Illinois, Iowa, Kansas, Louisiana, Massachusetts, Michigan, Mississippi, Missouri, Nebraska, Nevada, New Jersey, New Mexico, New York, North Carolina, Ohio, Pennsylvania, South Carolina, South Dakota, Tennessee, Texas, the U.S. Virgin Islands, Virginia, Washington, Washington, D.C., and Wyoming. Resource Conservation and Recovery Act (RCRA) hazardous waste programs are reviewed to determine whether chemical weapons or chemical warfare agents are listed hazardous wastes or otherwise defined or identified as hazardous wastes. Because the U.S. Environmental Protection Agency (EPA) military munitions rule specifically addresses the management of chemical munitions, this report also indicates whether a state has adopted the rule and whether the resulting state regulations have been authorized by EPA. Many states have adopted parts or all of the EPA munitions rule but have not yet received authorization from EPA to implement the rule. In these cases, the states may enforce the adopted munitions rule provisions under state law, but these provisions are not federally enforceable

  14. Law Studies

    Directory of Open Access Journals (Sweden)

    G. P. Tolstopiatenko

    2014-01-01

    Full Text Available At the origin of the International Law Department were such eminent scientists, diplomats and teachers as V.N. Durdenevsky, S.B. Krylov and F.I. Kozhevnikov. International law studies in USSR and Russia during the second half of the XX century was largely shaped by the lawyers of MGIMO. They had a large influence on the education in the international law in the whole USSR, and since 1990s in Russia and other CIS countries. The prominence of the research of MGIMO international lawyers was due to the close connections with the international practice, involving international negotiations in the United Nations and other international fora, diplomatic conferences and international scientific conferences. This experience is represented in the MGIMO handbooks on international law, which are still in demand. The Faculty of International Law at MGIMO consists of seven departments: Department of International Law, Department of Private International and Comparative Law; Department of European Law; Department of Comparative Constitutional Law; Department of Administrative and Financial Law; Department of Criminal Law, Department Criminal Procedure and Criminalistics. Many Russian lawyers famous at home and abroad work at the Faculty, contributing to domestic and international law studies. In 1947 the Academy of Sciences of the USSR published "International Law" textbook which was the first textbook on the subject in USSR. S.B. Krylov and V.N. Durdenevsky were the authors and editors of the textbook. First generations of MGIMO students studied international law according to this textbook. All subsequent books on international law, published in the USSR, were based on the approach to the teaching of international law, developed in the textbook by S.B. Krylov and V.N. Durdenevsky. The first textbook of international law with the stamp of MGIMO, edited by F.I. Kozhevnikov, was published in 1964. This textbook later went through five editions in 1966, 1972

  15. International law

    CERN Document Server

    Shaw, Malcolm N

    2017-01-01

    International Law is the definitive and authoritative text on the subject, offering Shaw's unbeatable combination of clarity of expression and academic rigour and ensuring both understanding and critical analysis in an engaging and authoritative style. Encompassing the leading principles, practice and cases, and retaining and developing the detailed references which encourage and assist the reader in further study, this new edition motivates and challenges students and professionals while remaining accessible and engaging. Fully updated to reflect recent case law and treaty developments, this edition contains an expanded treatment of the relationship between international and domestic law, the principles of international humanitarian law, and international criminal law alongside additional material on international economic law.

  16. Environmental law

    International Nuclear Information System (INIS)

    Anon.

    1980-01-01

    This pocketbook contains major federal regulations on environmental protection. They serve to protect and cultivate mankind's natural foundations of life, to preserve the environment. The environmental law is devided as follows: Constitutional law on the environment, common administrative law on the environment, special administrative law on the environment including conservation of nature and preservation of rural amenities, protection of waters, waste management, protection against nuisances, nuclear energy and radiation protection, energy conservation, protection against dangerous substances, private law relating to the environment, criminal law relating to the environment. (HSCH) [de

  17. Jus post bellum: Towards a law of transition from conflict to peace

    NARCIS (Netherlands)

    Stahn, C.; Kleffner, J.K.

    2008-01-01

    Warfare is usually theorised in the categories of jus ad bellum (justification for recourse to force) and jus in bello (rules applicable in armed conflict). The challenge of establishing fair and sustainable peace after conflict (jus post bellum) has received less attention in existing law and

  18. Nuclear, biological and chemical warfare. Part I: Medical aspects of nuclear warfare.

    Science.gov (United States)

    Kasthuri, A S; Pradhan, A B; Dham, S K; Bhalla, I P; Paul, J S

    1990-04-01

    Casualties in earlier wars were due much more to diseases than to weapons. Mention has been made in history of the use of biological agents in warfare, to deny the enemy food and water and to cause disease. In the first world war chemical agents were used to cause mass casualties. Nuclear weapons were introduced in the second world war. Several countries are now involved in developing nuclear, biological and chemical weapon systems, for the mass annihilation of human beings, animals and plants, and to destroy the economy of their enemies. Recently, natural calamities and accidents in nuclear, chemical and biological laboratories and industries have caused mass instantaneous deaths in civilian population. The effects of future wars will not be restricted to uniformed persons. It is time that physicians become aware of the destructive potential of these weapons. Awareness, immediate protective measures and first aid will save a large number of persons. This series of articles will outline the medical aspects of nuclear, biological and chemical weapon systems in three parts. Part I will deal with the biological effects of a nuclear explosion. The short and long term effects due to blast, heat and associated radiation are highlighted. In Part II, the role of biological agents which cause commoner or new disease patterns is mentioned. Some of the accidents from biological warfare laboratories are a testimony to its potential deleterious effects. Part III deals with medical aspects of chemical warfare agents, which in view of their mass effects can overwhelm the existing medical resources, both civilian and military.(ABSTRACT TRUNCATED AT 250 WORDS)

  19. Israeli surrogacy law in practice.

    Science.gov (United States)

    Honig, D; Nave, O; Adam, R

    2000-01-01

    This article examines surrogacy arrangements in Israel. The Law of Surrogacy was legislated in March 1996. Surrogacy agreements are strictly limited by the criteria set forth in the law. An authorizations committee was set up by the Ministry of Health to examine each application for approval of a surrogacy agreement. Prior to filing the request, the intended parents must find an appropriate surrogate mother. Psychological evaluation of the parties is imperative in matching the parents with a surrogate mother and both sides undergo these evaluations. The surrogate mother is entitled to psychological counseling throughout the period of her attempts to conceive, the pregnancy, and for a period of 6 months after the birth. Surrogacy is a dynamic and rapidly evolving area, in both law and psychology. The constant advancements in medical technology indicate that future trends--indirectly related to surrogacy--include posthumous reproduction and reproductive cloning. Surrogacy in Israel is restricted to couples with a serious infertility problem.

  20. Using Agent Based Distillation to Explore Issues Related to Asymmetric Warfare

    Science.gov (United States)

    2009-10-01

    official definition of asymmetric warfare , considering that its use was redundant to irregular warfare [30]. 2 Such as the Lanchester Equations...RTP-MP-MSG-069 23 - 1 Using Agent Based Distillation to Explore Issues Related to Asymmetric Warfare Martin Adelantado, Jean-Michel Mathé...shows that both conventional and asymmetric warfare are characterised by nonlinear behaviours and that engagement is a Complex Adaptive System (CAS

  1. Psychological and Unconventional Warfare, 1941-1952: Origins of a Special Warfare Capability for the United States Army

    Science.gov (United States)

    1979-11-01

    nic -,L-dant orer unconventional wsr:fare? In shnrt, wfiat were-the pre-1952 roots of tbe’ P9ych𔃺rg1.ca1 WArfArPg Contme" artx], cMocom~tant y, the...General Robert A. McClure, 30 March 1948, from Co’.onel William S. Biddle , Assistant Chief, Plans and Policy Group, 1, 319, Plans and Operations Division

  2. The Treaty of Tordesillas and the (reInvention of International Law in the Age of Discovery

    Directory of Open Access Journals (Sweden)

    Tatiana Waisberg

    2017-05-01

    Full Text Available This paper aims to investigate some of the main features of sixteenth century international law in order to challenge traditional international law foundations. By exploring concrete cases, and indicating situations in which state and non-state actors resorted to international norms in order to promote trade and celebrate peace treaties, it is inquired whether some pre-Westphalia international trade and warfare practices may be defined as the beginning of “modern” international law.

  3. Transport and Reactivity of Decontaminants to Provide Hazard Mitigation of Chemical Warfare Agents from Materials

    Science.gov (United States)

    2016-06-01

    2013 4. TITLE AND SUBTITLE Transport and Reactivity of Decontaminants to Provide Hazard Mitigation of Chemical Warfare Agents from Materials 5a...directions for future decontamination formulation approaches. 15. SUBJECT TERMS GD HD Decontamination Hazard mitigation VX Chemical warfare agent... DECONTAMINANTS TO PROVIDE HAZARD MITIGATION OF CHEMICAL WARFARE AGENTS FROM MATERIALS 1. INTRODUCTION Decontamination of materials is the

  4. Russian New Art of Hybrid Warfare in Ukraine

    Directory of Open Access Journals (Sweden)

    Rusnáková Soňa

    2017-10-01

    Full Text Available The main aim of this paper is to analyse the annexation of Crimea by the Russian Federation. For the purposes of the paper, the theory of hybrid warfare was chosen as an analytical category. Throughout the paper, the concept of hybrid warfare is examined and applied on case study of Crimean annexation. Hybrid warfare, especially in connection with Russian actions in Crimea has been an intensely debated concept. There is an ongoing debate among scholars concerning the meaning of the concept, its existence and employment by the Russian Federation. This paper showed that the article of Valeriy Gerasimov – the incumbent Chief of the General Staff of the Russian Federation-invoked a new warfare strategy for the Russian Federation which was consequently for the very first time in its full spectre and effectivity employed on case of Crimean annexation in March 2014. Observing the application of the hybrid warfare in practice serves the purposes of countering its further potential application in post-Soviet space and Russian ‘near abroad’.

  5. Nondestructive inspection of chemical warfare based on API-TOF

    International Nuclear Information System (INIS)

    Wang Xinhua; Zheng Pu; He Tie; An Li; Yang Jie; Fan Yu

    2013-01-01

    Background: Real-time, fast, accurate, nondestructive inspection (NDI) and quantitative analysis for chemical warfare are very imperative for chemical defense, anti-terror and nation security. Purpose: Associated Particles Technique (APT)/Neutron Time of Flight (TOF) has been developed for non-invasive inspection of sealed containers with chemical warfare agents. Methods: A prototype equipment for chemical warfare is consisted of an APT neutron generator with a 3×3 matrix of semiconductor detectors of associated alpha-particles, the shielding protection of neutron and gamma-ray, arrayed NaI(Tl)-based detectors of gamma-rays, fully-digital data acquisition electronics, data analysis, decision-making software, support platform and remote control system. Inelastic scattering gamma-ray pulse height spectra of sarin, VX, mustard gas and adamsite induced by 14-MeV neutron are measured. The energies of these gamma rays are used to identify the inelastic scattering elements, and the intensities of the peaks at these energies are used to reveal their concentrations. Results: The characteristic peaks of inelastic scattering gamma-ray pulse height spectra show that the prototype equipment can fast and accurately inspect chemical warfare. Conclusion: The equipment can be used to detect not only chemical warfare agents but also other hazardous materials, such as chemical/toxic/drug materials, if their chemical composition is in any way different from that of the surrounding materials. (authors)

  6. Numerical simulation of RCS for carrier electronic warfare airplanes

    Directory of Open Access Journals (Sweden)

    Yue Kuizhi

    2015-04-01

    Full Text Available This paper studies the radar cross section (RCS of carrier electronic warfare airplanes. Under the typical naval operations section, the mathematical model of the radar wave’s pitch angle incidence range analysis is established. Based on the CATIA software, considering dynamic deflections of duck wing leading edge flaps, flaperons, horizontal tail, and rudder, as well as aircraft with air-to-air missile, anti-radiation missile, electronic jamming pod, and other weapons, the 3D models of carrier electronic warfare airplanes Model A and Model B with weapons were established. Based on the physical optics method and the equivalent electromagnetic flow method, by the use of the RCSAnsys software, the characteristics of carrier electronic warfare airplanes’ RCS under steady and dynamic flights were simulated under the UHF, X, and S radar bands. This paper researches the detection probability of aircraft by radars under the condition of electronic warfare, and completes the mathematical statistical analysis of the simulation results. The results show that: The Model A of carrier electronic warfare airplane is better than Model B on stealth performance and on discover probability by radar detection effectively.

  7. [Decontamination of chemical warfare agents by photocatalysis].

    Science.gov (United States)

    Hirakawa, Tsutomu; Mera, Nobuaki; Sano, Taizo; Negishi, Nobuaki; Takeuchi, Koji

    2009-01-01

    Photocatalysis has been widely applied to solar-energy conversion and environmental purification. Photocatalyst, typically titanium dioxide (TiO(2)), produces active oxygen species under irradiation of ultraviolet light, and can decompose not only conventional pollutants but also different types of hazardous substances at mild conditions. We have recently started the study of photocatalytic decontamination of chemical warfare agents (CWAs) under collaboration with the National Research Institute of Police Science. This article reviews environmental applications of semiconductor photocatalysis, decontamination methods for CWAs, and previous photocatalytic studies applied to CWA degradation, together with some of our results obtained with CWAs and their simulant compounds. The data indicate that photocatalysis, which may not always give a striking power, certainly helps detoxification of such hazardous compounds. Unfortunately, there are not enough data obtained with real CWAs due to the difficulty in handling. We will add more scientific data using CWAs in the near future to develop useful decontamination systems that can reduce the damage caused by possible terrorism.

  8. An empirical test of Lanchester's square law: mortality during battles of the fire ant Solenopsis invicta

    OpenAIRE

    Plowes, Nicola J.R; Adams, Eldridge S

    2005-01-01

    Lanchester's models of attrition describe casualty rates during battles between groups as functions of the numbers of individuals and their fighting abilities. Originally developed to describe human warfare, Lanchester's square law has been hypothesized to apply broadly to social animals as well, with important consequences for their aggressive behaviour and social structure. According to the square law, the fighting ability of a group is proportional to the square of the number of individual...

  9. Environmental law

    International Nuclear Information System (INIS)

    Kloepfer, M.

    1989-01-01

    This comprehensive reference book on environmental law and practice also is a valuable textbook for students specializing in the field. The entire law on pollution control and environmental protection is presented in an intelligent system, covering the latest developments in the Federal and Land legislation, public environmental law, and the related provisions in the fields of civil law and criminal law. The national survey is rounded up by information concerning the international environmental law, environmental law of the European Communities, and of other foreign countries as e.g. Austria and Switzerland. The author also reviews conditions in neighbouring fields such as technology and labour law, environmental economy, environmental policy. Special attention is given to current topics, as e.g. relating to genetic engineering, disused landfills or industrial sites, soil protection, transport of hazardous goods, liability for damage to forests, atomic energy law, and radiation protection law. The latest publishing dates of literature and court decisions considered in the book are in the first months of 1989. (RST) [de

  10. Biomaterials for mediation of chemical and biological warfare agents.

    Science.gov (United States)

    Russell, Alan J; Berberich, Jason A; Drevon, Geraldine F; Koepsel, Richard R

    2003-01-01

    Recent events have emphasized the threat from chemical and biological warfare agents. Within the efforts to counter this threat, the biocatalytic destruction and sensing of chemical and biological weapons has become an important area of focus. The specificity and high catalytic rates of biological catalysts make them appropriate for decommissioning nerve agent stockpiles, counteracting nerve agent attacks, and remediation of organophosphate spills. A number of materials have been prepared containing enzymes for the destruction of and protection against organophosphate nerve agents and biological warfare agents. This review discusses the major chemical and biological warfare agents, decontamination methods, and biomaterials that have potential for the preparation of decontamination wipes, gas filters, column packings, protective wear, and self-decontaminating paints and coatings.

  11. Investigative psychology

    OpenAIRE

    Canter, David V.

    2010-01-01

    The domain of Investigative Psychology covers all aspects of psychology that are relevant to the conduct of criminal or civil investigations. Its focus is on the ways in which criminal activities may be examined and understood in order for the detection of crime to be effective and legal proceedings to be appropriate. As such Investigative Psychology is concerned with psychological input to the full range of issues that relate to the management, investigation and prosecution of crime

  12. Positive Psychology

    Science.gov (United States)

    Peterson, Christopher

    2009-01-01

    Positive psychology is a deliberate correction to the focus of psychology on problems. Positive psychology does not deny the difficulties that people may experience but does suggest that sole attention to disorder leads to an incomplete view of the human condition. Positive psychologists concern themselves with four major topics: (1) positive…

  13. Kantian Psychologism

    NARCIS (Netherlands)

    Sperber, P.|info:eu-repo/dai/nl/377312894

    2017-01-01

    For more than a hundred years now, the dominant view amongst scholars has been that Kant's philosophy has nothing to do with psychology, or, at the very least, that psychology is inessential to Kant's philosophical project. In the early reception of Kant's work, however, psychology played a central

  14. Lanchester-Type Models of Warfare, Volume II

    OpenAIRE

    Taylor, James G.

    1980-01-01

    This monograph is a comprehensive treatist on Lanchester-type models of warfare, i.e. differential-equation models of attrition in force-on-force combat operations. Its goal is to provide both an introduction to and current-state-of-the-art overview of Lanchester-type models of warfare as well as a comprehensive and unified in-depth treatment of them. Both deterministic as well as stochastic models are considered. Such models have been widely used in the United States and elsewhere for the...

  15. Hybrid warfare of the USA in South America

    Directory of Open Access Journals (Sweden)

    A. V. Budaev

    2015-01-01

    Full Text Available Washington’s hybrid warfare in Latin American region differs by its inventive and sophisticated methods and in fact represents a complex and multidimensional phenomenon including symbiosis of the “soft” and “hard” power as well as their combination in the form of the “smart power”. The increasing importance of hybrid warfare technologies in the US foreign policy in Latin America predetermines the necessity of thorough studies and analysis of this phenomenon for providing Russian interests.

  16. IMS software developments for the detection of chemical warfare agent

    Science.gov (United States)

    Klepel, ST.; Graefenhain, U.; Lippe, R.; Stach, J.; Starrock, V.

    1995-01-01

    Interference compounds like gasoline, diesel, burning wood or fuel, etc. are presented in common battlefield situations. These compounds can cause detectors to respond as a false positive or interfere with the detector's ability to respond to target compounds such as chemical warfare agents. To ensure proper response of the ion mobility spectrometer to chemical warfare agents, two special software packages were developed and incorporated into the Bruker RAID-1. The programs suppress interferring signals caused by car exhaust or smoke gases resulting from burning materials and correct the influence of variable sample gas humidity which is important for detection and quantification of blister agents like mustard gas or lewisite.

  17. Pollution law

    International Nuclear Information System (INIS)

    Triffterer, O.

    1980-01-01

    In the draft proposed by the legal advisory board the law for the controlling of environmental criminality was promulgated on 28th March 1980. The present commentary therefore - as seen from the results - corresponds in essential to the original assessment of the governmental draft. However, an introduction into the problems of environmental law precedes this commentary for the better unterstanding of all those not acquainted with pollution law and the whole legal matter. (orig./HP) [de

  18. Lindy's Law

    Science.gov (United States)

    Eliazar, Iddo

    2017-11-01

    Aging means that as things grow old their remaining expected lifetimes lessen. Either faster or slower, most of the things we encounter in our everyday lives age with time. However, there are things that do quite the opposite - they anti-age: as they grow old their remaining expected lifetimes increase rather than decrease. A quantitative formulation of anti-aging is given by the so-called ;Lindy's Law;. In this paper we explore Lindy's Law and its connections to Pareto's Law, to Zipf's Law, and to socioeconomic inequality.

  19. Mathematical psychology.

    Science.gov (United States)

    Batchelder, William H

    2010-09-01

    Mathematical psychology is a sub-field of psychology that started in the 1950s and has continued to grow as an important contributor to formal psychological theory, especially in the cognitive areas of psychology such as learning, memory, classification, choice response time, decision making, attention, and problem solving. In addition, there are several scientific sub-areas that were originated by mathematical psychologists such as the foundations of measurement, stochastic memory models, and psychologically motivated reformulations of expected utility theory. Mathematical psychology does not include all uses of mathematics and statistics in psychology, and indeed there is a long history of such uses especially in the areas of perception and psychometrics. What is most unique about mathematical psychology is its approach to theory construction. While accepting the behaviorist dictum that the data in psychology must be observable and replicable, mathematical models are specified in terms of unobservable formal constructs that can predict detailed aspects of data across multiple experimental and natural settings. By now almost all the substantive areas of cognitive and experimental psychology have formal mathematical models and theories, and many of these are due to researchers that identify with mathematical psychology. Copyright © 2010 John Wiley & Sons, Ltd. For further resources related to this article, please visit the WIREs website. Copyright © 2010 John Wiley & Sons, Ltd.

  20. Socioecological psychology.

    Science.gov (United States)

    Oishi, Shigehiro

    2014-01-01

    Socioecological psychology investigates humans' cognitive, emotional, and behavioral adaption to physical, interpersonal, economic, and political environments. This article summarizes three types of socioecological psychology research: (a) association studies that link an aspect of social ecology (e.g., population density) with psychology (e.g., prosocial behavior), (b) process studies that clarify why there is an association between social ecology and psychology (e.g., residential mobility → anxiety → familiarity seeking), and (c) niche construction studies that illuminate how psychological states give rise to the creation and maintenance of a social ecology (e.g., familiarity seeking → dominance of national chain stores). Socioecological psychology attempts to bring the objectivist perspective to psychological science, investigating how objective social and physical environments, not just perception and construal of the environments, affect one's thinking, feeling, and behaviors, as well as how people's thinking, feeling, and behaviors give rise to social and built environments.

  1. Case law

    International Nuclear Information System (INIS)

    2016-01-01

    This section treats of the following case laws: 1 - Case Law France: Conseil d'etat decision, 22 February 2016, EDF v. Republic and Canton of Geneva relative to the Bugey nuclear power plant (No. 373516); United States: Brodsky v. US Nuclear Regulatory Commission, 650 Fed. Appx. 804 (2. Cir. 2016)

  2. Law 302.

    Science.gov (United States)

    Manitoba Dept. of Education, Winnipeg.

    This publication outlines a law course intended as part of a business education program in the secondary schools of Manitoba, Canada. The one credit course of study should be taught over a period of 110-120 hours of instruction. It provides students with an introduction to the principles, practices, and consequences of law with regard to torts,…

  3. Testes psicológicos e o Direito: uma aproximação à luz da dignidade da pessoa humana e dos direitos da personalidade Psychological tests and Law: an approach in light of human dignity and personality rights

    Directory of Open Access Journals (Sweden)

    Luciano Augusto de Toledo Coelho

    2004-08-01

    Full Text Available Testes psicológicos são freqüentemente usados na seleção de funcionários para empresas. Este artigo busca comparar tais instrumentos considerando os direitos fundamentais do trabalhador. Sempre que um candidato para um trabalho é sujeitado a um teste, seja isso para medir a aptidão dele ou dela ou para verificar determinados traços da personalidade, acima daquele instrumento está sujeitado o conhecimento de uma ciência que legitima o poder do empregador para testar o candidato. A crise de trabalho gerada pela globalização e a hegemonia do sistema capitalista neoliberal levam vantagem do sujeição crescente do trabalhador. Não há nenhuma lei no Brasil que protege um(a candidato(a do "vazamento" de informação sobre sua personalidade. E, em alguns casos, estes fatores que podem causar a pessoa não ser contratada, poderiam ser considerados discriminatórios. Tais técnicas e testes de seleção de pessoal abusivas que não são muito fidedignos, aumentam a possibilidade de revelação desnecessária e, por conseguinte, uma violação de privacidade, vida privada e o desrespeito do princípio constitucional da dignidade humana.Psychological tests are quite frequently used in selecting personnel for companies. This article seeks to compare such instruments with the worker's fundamental rights in mind. Whenever a candidate for a job is subjected to a test, be that to measure his or her aptitude or to verify certain personality traits, over that instrument is incurred the knowledge of a science that legitimizes the employer's power to test the candidate. The job crisis generated from globalization and the hegemony of the neo-liberal capitalistic system, takes advantage of the ever-growing subjection of the worker. There are no laws in Brazil that protect a candidate from the "leak" of information about his or her personality. And, in some cases, these factors, which can cause one to not be hired, could be considered discriminatory

  4. Forensic psychology and correctional psychology: Distinct but related subfields of psychological science and practice.

    Science.gov (United States)

    Neal, Tess M S

    2018-02-12

    This article delineates 2 separate but related subfields of psychological science and practice applicable across all major areas of the field (e.g., clinical, counseling, developmental, social, cognitive, community). Forensic and correctional psychology are related by their historical roots, involvement in the justice system, and the shared population of people they study and serve. The practical and ethical contexts of these subfields is distinct from other areas of psychology-and from one another-with important implications for ecologically valid research and ethically sound practice. Forensic psychology is a subfield of psychology in which basic and applied psychological science or scientifically oriented professional practice is applied to the law to help resolve legal, contractual, or administrative matters. Correctional psychology is a subfield of psychology in which basic and applied psychological science or scientifically oriented professional practice is applied to the justice system to inform the classification, treatment, and management of offenders to reduce risk and improve public safety. There has been and continues to be great interest in both subfields-especially the potential for forensic and correctional psychological science to help resolve practical issues and questions in legal and justice settings. This article traces the shared and separate developmental histories of these subfields, outlines their important distinctions and implications, and provides a common understanding and shared language for psychologists interested in applying their knowledge in forensic or correctional contexts. (PsycINFO Database Record (c) 2018 APA, all rights reserved).

  5. Nanostructured Metal Oxides for Stoichiometric Degradation of Chemical Warfare Agents

    Czech Academy of Sciences Publication Activity Database

    Štengl, Václav; Henych, Jiří; Janos, P.; Skoumal, M.

    2016-01-01

    Roč. 236, č. 2016 (2016), s. 239-258 ISSN 0179-5953 R&D Projects: GA ČR(CZ) GAP106/12/1116 Institutional support: RVO:61388980 Keywords : chemical warfare agent * metal nanoparticle * unique surface- chemistry * mesoporous manganese oxide Subject RIV: CA - Inorganic Chemistry Impact factor: 3.930, year: 2016

  6. The Role of Civil Affairs in Unconventional Warfare

    Science.gov (United States)

    2012-12-01

    neighbor to the west, and secured the eastern border of Laos 32 Mao Tse -Tung, On Guerrilla Warfare...INTRODUCTION..........................................................................................19  B.  BRIEF HISTORY OF LAOS ...Royal Lao Army SCA Support to Civil Administration SCIRI Supreme Council of Iraq SG Shadow Government SOF Special Operations Forces TAI Targeted

  7. Management information systems for electronic warfare command and decision support

    CSIR Research Space (South Africa)

    Van Niekerk, B

    2015-04-01

    Full Text Available information to allow them to manage their own spectrum, to identify threats, and to deny adversaries’ use of the spectrum. In this paper, the concepts of integrated electronic warfare and spectrum battle management are introduced, and the relevant information...

  8. Manoeuvre warfare analysis of South Africa's 1914-1915 German ...

    African Journals Online (AJOL)

    The study reported in this article explored the nexus between military theory and history. Military theory attempts to quantify, qualify and illuminate the often unpredictable phenomenon of war. The article consists of two parts: the theory of manoeuvre warfare and the history of the 1914-1915 South African campaign in ...

  9. blitzkrieg to desert storm: the evolution of operational warfare

    African Journals Online (AJOL)

    a_nabb

    disease of stalemates infecting militaries before the Second World War. The invasion did not change the world; instead, it brought about an increased awareness of the importance of the operational level of war, a dimension of warfare previously neglected. The German operational effectiveness represented an evolution ...

  10. A identification system for chemical warfare agents with PGNAA method

    International Nuclear Information System (INIS)

    Wang Bairong; Yin Guanghua; Yang Zhongping

    2006-01-01

    The principle and the experimental commanding of Chemical warfare Agents Identification with PGNAA method are discussed in this paper. The choosing of Detector, neutron source and the data processing method are detailed. Finally, a set of experimental instruments composed of Cf-232 and BGO detector is developed based on the theory discussed above. (authors)

  11. Identification system for chemical warfare agents with PGNAA method

    International Nuclear Information System (INIS)

    Wang Bairong; Yin Guanghua; Yang Zhongpin

    2007-01-01

    The principle and the experimental commanding of Chemical warfare Agents Identification with PGNAA method are discussed in this paper. The choosing of detector, neutron source and the data processing method are detailed. Finally, a set of experimental instruments composed of Cf-232 and BGO detector is developed based on this theory discussed above. (authors)

  12. Biomonitoring of exposure to chemical warfare agents: A review

    NARCIS (Netherlands)

    Noort, D.; Benschop, H.P.; Black, R.M.

    2002-01-01

    In this report an overview of the methods currently available for detection of exposure to a number of chemical warfare agents (CWA), i.e., sulfur mustard, lewisite and nerve agents, is presented. Such methods can be applied for various purposes, e.g., diagnosis and dosimetry of exposure of

  13. Researchers study decontamination of chemical, biological warfare agents

    OpenAIRE

    Trulove, Susan

    2007-01-01

    The U.S. Army Research Office has awarded Virginia Tech a $680,000 grant over two years to build an instrument that can be used to study the chemistry of gases that will decompose both chemical and biological warfare agents on surfaces.

  14. Recent canadian experience in chemical warfare agent destruction. An overview

    Energy Technology Data Exchange (ETDEWEB)

    McAndless, J.M.

    1995-09-01

    A Canadian chemical warfare agent destruction project (Swiftsure) was recently completed in which stockpiles of aged mustard, lewisite, nerve agents and contaminated scrap metal were incinerated or chemically neutralized in a safe, environmentally-responsible manner. The project scope, destruction technologies, environmental monitoring and public consultation programs are described.

  15. Simulating cyber warfare and cyber defenses: information value considerations

    Science.gov (United States)

    Stytz, Martin R.; Banks, Sheila B.

    2011-06-01

    Simulating cyber warfare is critical to the preparation of decision-makers for the challenges posed by cyber attacks. Simulation is the only means we have to prepare decision-makers for the inevitable cyber attacks upon the information they will need for decision-making and to develop cyber warfare strategies and tactics. Currently, there is no theory regarding the strategies that should be used to achieve objectives in offensive or defensive cyber warfare, and cyber warfare occurs too rarely to use real-world experience to develop effective strategies. To simulate cyber warfare by affecting the information used for decision-making, we modify the information content of the rings that are compromised during in a decision-making context. The number of rings affected and value of the information that is altered (i.e., the closeness of the ring to the center) is determined by the expertise of the decision-maker and the learning outcome(s) for the simulation exercise. We determine which information rings are compromised using the probability that the simulated cyber defenses that protect each ring can be compromised. These probabilities are based upon prior cyber attack activity in the simulation exercise as well as similar real-world cyber attacks. To determine which information in a compromised "ring" to alter, the simulation environment maintains a record of the cyber attacks that have succeeded in the simulation environment as well as the decision-making context. These two pieces of information are used to compute an estimate of the likelihood that the cyber attack can alter, destroy, or falsify each piece of information in a compromised ring. The unpredictability of information alteration in our approach adds greater realism to the cyber event. This paper suggests a new technique that can be used for cyber warfare simulation, the ring approach for modeling context-dependent information value, and our means for considering information value when assigning cyber

  16. Case - Case-Law - Law

    DEFF Research Database (Denmark)

    Sadl, Urska

    2013-01-01

    Reasoning of the Court of Justice of the European Union – Constr uction of arguments in the case-law of the Court – Citation technique – The use of formulas to transform case-law into ‘law’ – ‘Formulaic style’ – European citizenship as a fundamental status – Ruiz Zambrano – Reasoning from...

  17. Nuclear Law

    International Nuclear Information System (INIS)

    Pascal, Maurice.

    1979-01-01

    This book on nuclear law is the first of a series of analytical studies to be published by the French Energy Commission (CEA) concerning all the various nuclear activities. It describes national and international legislation applicable in France covering the following main sectors: the licensing procedure for nuclear installations, the law of the sea and nuclear law, the legal system governing radioisotopes, the transport of radioactive materials, third party liability and insurance and radiation protection. In each chapter, the overall analysis is supplemented by the relevant regulatory texts and by organisation charts in annex. (NEA) [fr

  18. [Political psychology].

    Science.gov (United States)

    Resch, Mária; Bella, Tamás

    2013-04-21

    In Hungary one can mostly find references to the psychological processes of politics in the writings of publicists, public opinion pollsters, philosophers, social psychologists, and political analysts. It would be still important if not only legal scientists focusing on political institutions or sociologist-politologists concentrating on social structures could analyse the psychological aspects of political processes; but one could also do so through the application of the methods of political psychology. The authors review the history of political psychology, its position vis-à-vis other fields of science and the essential interfaces through which this field of science, which is still to be discovered in Hungary, connects to other social sciences. As far as its methodology comprising psycho-biographical analyses, questionnaire-based queries, cognitive mapping of interviews and statements are concerned, it is identical with the psychiatric tools of medical sciences. In the next part of this paper, the focus is shifted to the essence and contents of political psychology. Group dynamics properties, voters' attitudes, leaders' personalities and the behavioural patterns demonstrated by them in different political situations, authoritativeness, games, and charisma are all essential components of political psychology, which mostly analyses psychological-psychiatric processes and also involves medical sciences by relying on cognitive and behavioural sciences. This paper describes political psychology, which is basically part of social sciences, still, being an interdisciplinary science, has several ties to medical sciences through psychological and psychiatric aspects.

  19. Islamic Law

    OpenAIRE

    Doranda Maracineanu

    2009-01-01

    The law system of a State represents the body of rules passed or recognized by that State inorder to regulate the social relationships, rules that must be freely obeyed by their recipients, otherwisethe State intervening with its coercive power. Throughout the development of the society, pedants havebeen particularly interested in the issue of law systems, each supporting various classifications; theclassification that has remained is the one distinguishing between the Anglo-Saxon, the Roman-...

  20. Toward a Developmental Ecological Psychology.

    Science.gov (United States)

    Goldfield, Eugene C.

    1997-01-01

    Discusses Adolph's research on locomotion with regard to the requirements of an ecological psychology, especially the use of control laws; her examination of individual styles and normative patterns as it reflects a dynamic systems perspective; and her use of cognitive processes of decision making in explaining why infants approach or avoid a…

  1. Psychological behaviorism and behaviorizing psychology

    Science.gov (United States)

    Staats, Arthur W.

    1994-01-01

    Paradigmatic or psychological behaviorism (PB), in a four-decade history of development, has been shaped by its goal, the establishment of a behaviorism that can also serve as the approach in psychology (Watson's original goal). In the process, PB has become a new generation of behaviorism with abundant heuristic avenues for development in theory, philosophy, methodology, and research. Psychology has resources, purview and problem areas, and nascent developments of many kinds, gathered in chaotic diversity, needing unification (and other things) that cognitivism cannot provide. Behaviorism can, within PB's multilevel framework for connecting and advancing both psychology and behaviorism. PMID:22478175

  2. Discursive Psychology

    NARCIS (Netherlands)

    Molder, te H.

    2015-01-01

    Discursive psychology was established in the United Kingdom by the end of the 1980s, mainly in response to the dominant cognitivist approach in social psychology. While it borrowed notions from poststructuralism and sociology of science, it is most akin to conversation analysis. Discursive

  3. Psychological experiment

    NARCIS (Netherlands)

    Boven, Martijn; Emmanuel, Steven M.; McDonald, William; Stewart, Jon

    2015-01-01

    For Kierkegaard the ‘psychological experiment’ is a literary strategy. It enables him to dramatize an existential conflict in an experimental mode. Kierkegaard’s aim is to study the source of movement that animates the existing individual (this is the psychological part). However, he is not

  4. Military chemical warfare agent human subjects testing: part 1--history of six-decades of military experiments with chemical warfare agents.

    Science.gov (United States)

    Brown, Mark

    2009-10-01

    Military chemical warfare agent testing from World War I to 1975 produced thousands of veterans with concerns of possible long-term health consequences. Clinical and research evaluation of potential long-term health effects has been difficult because the exposures occurred decades ago, the identity of troops exposed and exposure magnitudes are uncertain, and acute effects during experiments poorly documented. In contrast, a companion article describes the large amount of information available about the specific agents tested and their long-term health effects. This short history describes U.S. military chemical-agent experiments with human subjects and identifies tested agents. Finally, the demonstrated need to anticipate future health concerns from military personnel involved in such military testing suggests current and future military researchers should be required, by law and regulation, to fully record the identity of those exposed, relevant exposure magnitude, and complete medical information for all subjects. New study protocols and institutional review board approvals for research involving military personnel should reflect this need.

  5. History of development and modern condition of Chinese military psychology

    Directory of Open Access Journals (Sweden)

    Aleksandr G. Karayani

    2017-12-01

    Full Text Available Background. Russian military psychology is actively analyzing the achievements gained over the years of its reform and with great interest turns to the military psychological experience of foreign armies. Acquaintance with this experience allows Russian military psychology to assess its place in the world military psychological science, to assess the dynamics and fidelity of the general direction of development. In this regard, it is quite interesting to get acquainted with the state, capabilities, and the most important guidelines for the development of the Chinese military psychology. Objective. The objective of this paper is to get acquainted with the invaluable experience of trial and error, ups and downs, stagnation and real breakthroughs, which can be learnt through getting acquainted with the history and modern functioning of the psychological structures of the Chinese army. Design. The paper considers the centuries-old history and a modern condition of military psychology in China. The methodological foundations of the Chinese military psychology are proved to be the philosophical ideas of Taoism, Confucianism and Buddhism. Theoretical sources Chinese military psychology is rooted in the writings of the great thinkers and generals of ancient China – Sun Tzu, Wu Tzu, Zhuge Liang. The two most vigorously developing areas of military psychology: the psychological selection of military personnel, theory and practice of psychological warfare. The historical analysis of traditions and technologies development for the period of four thousand years is given. The development of psychological selection in the army of China was affected by cooperation with the American psychologists during the Second World War. The overall state and program approach to perfect the system of selecting military men using the psychology methods is underlined. Historical development tendencies and the Chinese paradigm of the theory and practice of psychological war

  6. Standards for educational and psychological testing

    CERN Document Server

    2014-01-01

    Developed jointly by the American Educational Research Association, American Psychological Association, and the National Council on Measurement in Education, Standards for Educational and Psychological Testing (Revised 2014) addresses professional and technical issues of test development and use in education, psychology, and employment. It includes changes in federal law and measurement trends affecting validity, testing individuals with disabilities or different linguistic backgrounds, and new types of tests, as well as new uses of existing tests.

  7. Defending Our Satellites: The Need for Electronic Warfare Education and Training

    Science.gov (United States)

    2015-12-01

    intercept Allied bombers attacking at night.9 As a result of the electronic warfare advantage that systems like Window and Airborne Cigar be- stowed...74 | Air & Space Power Journal Defending Our Satellites The Need for Electronic Warfare Education and Training Lt Col E. Lincoln Bonner, USAF...expanding education and training in the use of electronic warfare to defend US satellites and improve their survivability. The following discussion

  8. Cultural Competence and the Operational Commander: Moving Beyond Cultural Awareness into Culture-Centric Warfare

    National Research Council Canada - National Science Library

    Karcanes, James A

    2007-01-01

    .... Understanding the different levels of cultural awareness -- cultural consideration, cultural understanding, and cultural competence -- will help usher in a new focus on culture-centric warfare...

  9. Ending the Debate: Unconventional Warfare, Foreign Internal Defense, and Why Words Matter

    National Research Council Canada - National Science Library

    Jones, D

    2006-01-01

    There is an ongoing debate within the Special Forces community whether unconventional warfare and foreign internal defense are applicable in the contemporary and future Special Operations environments...

  10. Mass Spectrometric Determination of Chemical Warfare Agents in Indoor Sample Media Typically Collected During Forensic Investigations

    National Research Council Canada - National Science Library

    D'Agostino, P. A; Hancock, J. R; Chenier, C. L

    2005-01-01

    .... DRDC Suffield, in collaboration with the Royal Canadian Mounted Police, identified a need for analytical methods for chemical warfare agent identification in media, including flooring, wall surfaces...

  11. Redefining Hybrid Warfare: Russia's Non-linear War against the West

    Directory of Open Access Journals (Sweden)

    Tad Schnaufer

    2017-03-01

    Full Text Available The term hybrid warfare fails to properly describe Russian operations in Ukraine and elsewhere. Russia has undertaken unconventional techniques to build its influence and test the boundaries of a shaken international system. Notably, Russia’s actions in Ukraine display an evolved style of warfare that goes beyond its initial label of hybrid warfare. The term non-linear war (NLW will be defined in this article to encompass Russia’s actions and allow policymakers the correct framework to discuss and respond to Russia. NLW plays to the advantage of countries like Russia and constitute the future of warfare.

  12. Technological advancements for the detection of and protection against biological and chemical warfare agents.

    Science.gov (United States)

    Eubanks, Lisa M; Dickerson, Tobin J; Janda, Kim D

    2007-03-01

    There is a growing need for technological advancements to combat agents of chemical and biological warfare, particularly in the context of the deliberate use of a chemical and/or biological warfare agent by a terrorist organization. In this tutorial review, we describe methods that have been developed both for the specific detection of biological and chemical warfare agents in a field setting, as well as potential therapeutic approaches for treating exposure to these toxic species. In particular, nerve agents are described as a typical chemical warfare agent, and the two potent biothreat agents, anthrax and botulinum neurotoxin, are used as illustrative examples of potent weapons for which countermeasures are urgently needed.

  13. Development of Bicarbonate-Activated Peroxide as a Chemical and Biological Warfare Agent Decontaminant

    National Research Council Canada - National Science Library

    Richardson, David E

    2006-01-01

    ...) and other chemistry for the decontamination of chemical and biological warfare agents. The mechanism of formation of the active oxidant, peroxymonocarbonate, has been investigated in detail. New surfoxidants...

  14. Decontamination and Detoxification of Toxic Chemical Warfare Agents Using Polyurethane Sponges

    National Research Council Canada - National Science Library

    Gordon, Richard K; Gunduz, Alper T; Askins, LaTawnya Y; Strating, Simon J; Doctor, Bhupendra P; Clarkson, Edward D; Mitchelree, Larry W; Lukey, Brian; Railer, Roy; Schulz, Susan

    2003-01-01

    .... Another serious problem that may be encountered while caring for personnel contaminated with organophosphorus chemical warfare nerve agents is the possibility that there will be cross-contamination...

  15. Private law

    DEFF Research Database (Denmark)

    working and researching in the key areas of law, security and privacy in IT, international trade and private law. Now, in 2010 and some seven conferences later, the event moves to Barcelona and embraces for the first time the three conference tracks just described. The papers in this work have all been...... blind reviewed and edited for quality. They represent the contributions of leading academics, early career researchers and others from an increasing number of countries, universities and institutions around the world. They set a benchmark for discussion of the current issues arising in the subject area...... and continue to offer an informed and relevant contribution to the policy making agenda. As Chair of the Conference Committee, I am once more very proud to endorse this work "Private Law: Rights, Duties & Conflicts" to all those seeking an up to date and informed evaluation of the leading issues. This work...

  16. Stuxnet and Cyber-Warfare (2/2)

    CERN Multimedia

    CERN. Geneva

    2016-01-01

    The first part of the lecture is devoted to the description of the Stuxnet worm, the first cyber-weapon whose existence has been made public, discovered in 2010 and targeting a specific industrial control system; the worm is responsible for the damaging of many centrifuges at an uranium enrichment facility, with the goal of sabotaging Iran's nuclear program. In the second part, the main features of cyber-warfare in conflict and pre-conflict activities will be discussed and compared to the conventional warfare domains, with also a general view at the international political debate on this topic.   Check the http://pugwash.org web site, an organisation that seeks a world free of nuclear weapons and other weapons of mass destruction. The lecturer invites comments via email to Gian.Piero.Siroli@cern.ch NB! All Academic Training lectures are recorded and are publicly available. There is no live webcast.

  17. Stuxnet and Cyber-Warfare (1/2)

    CERN Multimedia

    CERN. Geneva

    2016-01-01

    The first part of the lecture is devoted to the description of the Stuxnet worm, the first cyber-weapon whose existence has been made public, discovered in 2010 and targeting a specific industrial control system; the worm is responsible for the damaging of many centrifuges at an uranium enrichment facility, with the goal of sabotaging Iran's nuclear program. In the second part, the main features of cyber-warfare in conflict and pre-conflict activities will be discussed and compared to the conventional warfare domains, with also a general view at the international political debate on this topic. Check the http://pugwash.org web site, an organisation that seeks a world free of nuclear weapons and other weapons of mass destruction.   NB! All Academic Training lectures are recorded and are publicly available. There is no live webcast.

  18. Tissue-based standoff biosensors for detecting chemical warfare agents

    Science.gov (United States)

    Greenbaum, Elias; Sanders, Charlene A.

    2003-11-18

    A tissue-based, deployable, standoff air quality sensor for detecting the presence of at least one chemical or biological warfare agent, includes: a cell containing entrapped photosynthetic tissue, the cell adapted for analyzing photosynthetic activity of the entrapped photosynthetic tissue; means for introducing an air sample into the cell and contacting the air sample with the entrapped photosynthetic tissue; a fluorometer in operable relationship with the cell for measuring photosynthetic activity of the entrapped photosynthetic tissue; and transmitting means for transmitting analytical data generated by the fluorometer relating to the presence of at least one chemical or biological warfare agent in the air sample, the sensor adapted for deployment into a selected area.

  19. Cutaneous reactions in nuclear, biological and chemical warfare

    Directory of Open Access Journals (Sweden)

    Arora Sandeep

    2005-03-01

    Full Text Available Nuclear, biological and chemical warfare have in recent times been responsible for an increasing number of otherwise rare dermatoses. Many nations are now maintaining overt and clandestine stockpiles of such arsenal. With increasing terrorist threats, these agents of mass destruction pose a risk to the civilian population. Nuclear and chemical attacks manifest immediately while biological attacks manifest later. Chemical and biological attacks pose a significant risk to the attending medical personnel. The large scale of anticipated casualties in the event of such an occurrence would need the expertise of all physicians, including dermatologists, both military and civilian. Dermatologists are uniquely qualified in this respect. This article aims at presenting a review of the cutaneous manifestations in nuclear, chemical and biological warfare and their management.

  20. Identification of chemical warfare agent with radiological measurements

    International Nuclear Information System (INIS)

    Liu Boxue; Li Yun; Ai Xianyun

    2000-01-01

    There are three non-destructive radiological methods for identification of warfare agents and TNT. Their principles and problems related were discussed. Portable isotopic neutron spectroscopy is based on the assay of key elemental composition (such as Cl, P, H, As, S, N) in chemical agents by neutron induced prompt gamma ray analysis. Hydrogen concentration measurement by means of using thermal neutron can be employed to identify chemical warfare agents and TNT that contains different hydrogen fraction. The calibration curves of thermal neutron count rate against hydrogen concentration were measured. X ray imagination system can be used to determine the internal structure of chemical bombs, there by to identify them. The radiological methods are very useful for identification of old chemical weapons abandoned by Japan Army during World War 2

  1. From Berlin-Dahlem to the Fronts of World War I: The Role of Fritz Haber and his Kaiser Wilhelm Institute in German Chemical Warfare

    OpenAIRE

    Friedrich, B.; James, J.

    2017-01-01

    There is little doubt that Fritz Haber (1868–1934) was the driving force behind the centrally directed development of chemical warfare in Germany, whose use during World War I violated international law and elicited both immediate and enduring moral criticism. The chlorine cloud attack at Ypres on 22 April 1915 amounted to the first use of a weapon of mass destruction and as such marks a turning point in world history. Following the “success” at Ypres, Haber, eager to employ science in resolv...

  2. Just War and Postmodern Warfare: A German Case Study

    Science.gov (United States)

    2015-04-01

    warfare construct, Germany is shaping a military concept based on recent conflicts and unfettered by biases of conventional strategies, organizations...remain sovereign while subconsciously evolving toward liberal democratic ideas. In respecting each country’s political sensitivities, Germany’s...before exhausting all diplomatic, economic and information instruments. Whereas the term AU/ACSC/PINSON/AY15 13 “interests” may bias the United

  3. Conflict Without Casualties: Non-Lethal Weapons in Irregular Warfare

    Science.gov (United States)

    2007-09-01

    the body,” and the Geneva Protocol of 1925, bans the use of chemical and biological weapons .11 On 8 April 1975, President Ford issued Executive...E Funding – PE 63851M) (accessed 15 December 2006). The American Journal of Bioethics . “Medical Ethics and Non-Lethal Weapons .” Bioethics.net...CASUALTIES: NON-LETHAL WEAPONS IN IRREGULAR WARFARE by Richard L. Scott September 2007 Thesis Advisor: Robert McNab Second Reader

  4. Nodes and Codes: The Reality of Cyber Warfare

    Science.gov (United States)

    2012-05-17

    respectively. The avionics in Boeing’s 787 Dreamliner require approximately 6.5 million lines of code while the current S-Class Mercedes Benz requires over 20...leaders (demonstrated through outdated policy, theory, and doctrine) and the reality of warfare in 1914 (dictated by innovation, technology , and...or the guidelines to military action codified in doctrine? How are states using the latest technological innovations as violent instruments of

  5. Attacking the infrastructure: exploring potential uses of offensive information warfare

    OpenAIRE

    Elam, Donald Emmett.

    1996-01-01

    The world has entered the Third Wave; it has entered the Information Age. One of the fundamentals of this paradigm shift is the fact that information is power. The side that controls information more effectively will be victorious. Thus, countries and militaries must change their mentality in order to survive. A new form of conflict, Information Warfare, has been born. This new discipline is large, dynamic, and complex. The need exists for education among military officers and other concerned...

  6. Built to Outlast: Operational Approaches to Hybrid Warfare

    Science.gov (United States)

    2012-05-17

    29Robert T. Ames, Sun Tzu: The Art of War (New York: Ballantine Books, 1993), 78-80; Mao Tse -Tung, On Guerrilla Warfare, trans. Samuel B. Griffith...Chicago: University of Illinois Press, 1961), 25, 42.The works of Sun Tzu and Mao Tse -Tung both illustrate aspects of this concept. In a work...toreador’s cape, not the toreador himself. - Norman B. Hannah, The Key to Failure: Laos and the Vietnam War114 Against the backdrop of the Cold

  7. Warfare, genocide, and ethnic conflict: a Darwinian approach

    OpenAIRE

    Dimijian, Gregory G.

    2010-01-01

    As the 21st century dawns, I reflect on the history of humankind with growing concern about the need to understand the underlying biological and cultural roots of ethnic conflict and warfare. In the many studies of human conflict, innate biological predispositions have been neglected. This article is the third part of a series of seminars for medical residents at the University of Texas Southwestern Medical School at Dallas (see http://adarwinstudygroup.org/). The series starts with in-depth ...

  8. Numerical simulation of RCS for carrier electronic warfare airplanes

    OpenAIRE

    Yue Kuizhi; Liu Wenlin; Li Guanxiong; Ji Jinzu; Yu Dazhao

    2015-01-01

    This paper studies the radar cross section (RCS) of carrier electronic warfare airplanes. Under the typical naval operations section, the mathematical model of the radar wave’s pitch angle incidence range analysis is established. Based on the CATIA software, considering dynamic deflections of duck wing leading edge flaps, flaperons, horizontal tail, and rudder, as well as aircraft with air-to-air missile, anti-radiation missile, electronic jamming pod, and other weapons, the 3D models of carr...

  9. Annihilation Prediction for Lanchester-Type Models of Modern Warfare

    OpenAIRE

    Brown, G.G.; Taylor, J.

    1983-01-01

    Operations Research, 31, p.752. This paper introduces important new functions for analytic solution of Launch-ester-type equations of modern warfare for combat between two homogeneous forces modeled by power attrtition-rate coefficients with "no offset". Tabulations of these Lanchester-Clifford-Schlatii (or LCS) functions allow one to study this particular variable-coefficient model almost as easily and thoroughly as Lanchester's classic constant-coefficient one. LCS functions allow one ...

  10. Inside the Wire: American Security and Cyber Warfare

    Science.gov (United States)

    2017-03-01

    Roberts, Kerry V. " SUN TZU and The Art of Cyber Warfare." Journal of Counterterrorism & Homeland Security International 19, no. 1(Spring 2013): 12-4...12. REPORT TYPE 3. DATES COVERED (From - To) 01-03-2017 Bibliography 4. TITLE AND SUBTITLE Sa. CONTRACT NUMBER Inside the Wire: American Security...MCDERMOTT LIBRARY U.S. AIR FORCE ACADEMY 11. SPONSOR/MONITOR’S REPORT USAF ACADEMY CO 80840-6214 NUMBER(S) Special Bibliography Series # 119 12

  11. Hungarys Alternative to Counter Hybrid Warfare - Small States Weaponized Citizenry

    Science.gov (United States)

    2017-06-09

    said “Resilience as a terminological and operational factor, will become the newest ‘ brand ’ and communication name for the Alliance.”70 He also...audiences to influence their emotions , motives, objective reasoning, and ultimately the behavior of foreign governments, organizations, groups, and...so-called influence warfare. His study pinpointed the importance of emotion over rational facts in messages. Second, Edward Lucas and Ben Nimmo on

  12. Recent Advances in Decontamination of Chemical Warfare Agents

    OpenAIRE

    Abdul Wadood Khan; Sabna Kotta; Shahid Husain Ansari; Javed Ali; Rakesh Kumar Sharma

    2013-01-01

    The recent turmoil and volatile situation in many countries and the increased risk of terrorist activities have raised alarm bells for the field of defense against toxic chemical/materials. These situations poses threats to society as terrorists can take advantage of such situations to strike and cause public mayhem. A number of chemicals have the potential of being used as chemical warfare (CW) agents. CW agents could immediately kill or incapacitate the affected individuals even when they a...

  13. Littoral Combat Ship Open Ocean Anti-Submarine Warfare

    Science.gov (United States)

    2014-06-01

    maintain stealth and its defense in order to properly conduct an attack on a surface vessel (Sternhell and Thorndike 2014, 102). This statement...its target, the surface combatants can counter by increasing their speed (Sternhell and Thorndike 2014). While the maximum speed of the current...120316_PS.pdf Sternhell, Charles M, and Alan M Thorndike . 2014. “Antisubmarine Warfare in World War II.” CNA Analysis & Solutions. Accessed April 14, 2014

  14. Russian and Chinese Information Warfare: Theory and Practice

    Science.gov (United States)

    2004-06-01

    Integral neurolinguistic programming •Placing essential programs into the conscious or sub- conscious mind •Subconscious suggestions that modify human...Generators of special rays •Optical systems • Neurolinguistic programming •Computer psychotechnology •The mass media •Audiovisual effects •Special effects...Information Warfare: Theory and Practice 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER 6. AUTHOR(S) 5d. PROJECT NUMBER 5e

  15. Psychological Treatment

    Science.gov (United States)

    ... cognitive-behavioral therapy ), relaxation therapy , hypnotherapy , and biofeedback therapy . Psychological treatments can also be combined. Review of well- ... Antidepressant Medications Newer IBS Medications Probiotics and Antibiotics ... Cognitive Behavioral Therapy Relaxation Techniques for IBS Take Part in Online ...

  16. Chemical warfare agents identification by thermal neutron detection

    International Nuclear Information System (INIS)

    Liu Boxue; Ai Xianyun; Tan Daoyuan; Zhang Dianqin

    2000-01-01

    The hydrogen concentration determination by thermal neutron detection is a non-destructive, fast and effective method to identify chemical warfare agents and TNT that contain different hydrogen fraction. When an isotropic neutron source is used to irradiate chemical ammunition, hydrogen atoms of the agent inside shell act as a moderator and slow down neutrons. The number of induced thermal neutrons depends mainly upon hydrogen content of the agent. Therefore measurement of thermal neutron influence can be used to determine hydrogen atom concentration, thereby to determine the chemical warfare agents. Under a certain geometry three calibration curves of count rate against hydrogen concentration were measured. According to the calibration curves, response of a chemical agent or TNT could be calculated. Differences of count rate among chemical agents and TNT for each kind of shells is greater than five times of standard deviations of count rate for any agent, so chemical agents or TNT could be identified correctly. Meanwhile, blast tube or liquid level of chemical warfare agent could affect the response of thermal neutron count rate, and thereby the result of identification. (author)

  17. Quality of Life in Iranian Chemical Warfare Veteran's.

    Science.gov (United States)

    Ebadi, Abbas; Moradian, Tayeb; Mollahadi, Mohsen; Saeed, Yaser; Refahi, Ali Akbar

    2014-05-01

    Mustard gas has different effects on different body systems such as respiratory tract, blood, gastrointestinal, skin, eye, endocrine and peripheral nervous system. The purpose of this study was to determine the quality of life in chemical warfare veterans due to sulfur mustard exposure. In a cross-sectional and analytic study, 242 patients who had a chemical injury during the Iran-Iraq war (1980-1983) and their lung damage was proven were investigated in our study. The quality of life was measured in these patients using an extensively validated Iranian version of SF-36. The mean age of veterans was 44.12 ± 4.9 ranging from 22 to 62 years. Our results showed that chemical warfare had a decreased quality of life in all subscales of the SF-36. The lowest scores in SF-36 subscales were related to role physical and general health. The data also showed a significant relationship between the number of organs involved and the quality of life in these patients (P chemical warfare survivors suffering from late complications have a low health related quality of life.

  18. Recent publications on environmental law

    International Nuclear Information System (INIS)

    Lohse, S.

    1991-01-01

    The bibliography contains references to publications covering the following subject fields: General environmental law; environmental law in relation to constitutional law, administrative law, procedural law, revenue law, criminal law, private law, industrial law; law of regional development; nature conservation law; law on water protection; waste management law; law on protection against harmful effects on the environment; atomic energy law and radiation protection law; law of the power industry and the mining industry; laws and regulations on hazardous material and environmental hygiene. (orig.) [de

  19. Case law

    International Nuclear Information System (INIS)

    Anon.

    1999-01-01

    This paper gives and analyses three examples of case law: decision rejecting application to close down Tomari nuclear power plant (Japan); judgement by the Supreme Administrative Court on the closing of Barsebaeck (Sweden); litigation relating to the Department of Energy's obligations under the Nuclear Waste Policy Act to accept spent nuclear fuel and high-level radioactive waste (United States). (A.L.B.)

  20. Case law

    International Nuclear Information System (INIS)

    2015-01-01

    This section treats of the two following case laws: Slovak Republic: Further developments in cases related to the challenge by Greenpeace Slovakia to the Mochovce nuclear power plant; United States: Judgment of the Nuclear Regulatory Commission denying requests from petitioners to suspend final reactor licensing decisions pending the issuance of a final determination of reasonable assurance of permanent disposal of spent fuel

  1. Business Law

    OpenAIRE

    Marson, James; Ferris, Katy

    2016-01-01

    Marson & Ferris provide a thorough account of the subject for students. Essential topics are introduced by exploring current and pertinent examples and the relevance of the law in a business environment is considered throughout. This pack includes a supplement which considers the effects of the Consumer Rights Act 2015.

  2. Whither Psychology.

    Science.gov (United States)

    Halpern, Diane F

    2017-07-01

    Contemporary psychology is experiencing tremendous growth in neuroscience, and there is every indication that it will continue to gain in popularity notwithstanding the scarcity of academic positions for newly minted Ph.Ds. Despite the general perception that brain correlates "explain" or "cause" the mind and behavior, these correlates have not yet proven useful in understanding psychological processes, although they offer the possibility of early identification of some disorders. Other recent developments in psychology include increased emphasis on applications and more global representation among researchers and participants. In thinking about the way we want psychology to evolve, psychologists need to pay more than lip service to the idea that complex questions in psychology require multiple levels of analysis with contributions from biological (brain, hormones, and genetics), individual differences and social and cultural perspectives. Early career psychologists who can attain a breadth of knowledge will be well-positioned for a team approach to psychological inquiry. Finally, I offer the belief that an emphasis on enhancing critical thinking skills at all levels of education offers the best hope for the future.

  3. Nuclear Energy Law and Arbo Law/Safety Law

    International Nuclear Information System (INIS)

    Eijnde, J.G. van den

    1986-01-01

    The legal aspects of radiation protection in the Netherlands are described. Radiation protection is regulated mainly in the Nuclear Energy Law. The Arbo Law also has some sections about radiation protection. The interaction between both laws is discussed. (Auth.)

  4. Psychological jurisprudence as an interdisciplinary science and the area of psychological practice

    Directory of Open Access Journals (Sweden)

    Pozdnyakov V. M.

    2017-04-01

    Full Text Available The article convincingly demonstrates that Russia is increasingly began to publish monographs lawyers on key legal and psychological phenomena, and in dissertations in the formulation of the provisions on the protection of delatsya criticism of "Westernization" of the state legislation and upheld psychologicaland position. At the same time, critically, it is noted that in the field of legal ideology and policies, and in making innovations in the law still, as in Soviet period, dominated by legal dogma, and psychological realities are taken into account in fragments. The reason for this state of Affairs is that still within the framework of University training and further education of local lawyers, in contrast to international practice, insufficient attention is paid to the development of psychological culture, but in the end no full-fledged dialogue between lawyers and psychologists. Taking into account possibilities of integrative methodology justified the subject of psychological law as an interdisciplinary science and the field of psychological practice focused on the identification of regularities and mechanisms of development of legal awareness and legal existence of various actors in the legal activity aimed at the development of psychologically informed interventions for the improvement of legal ideology and politics, systems of law-making, law enforcement and crime prevention, psycho-technical methods and techniques in activities of law enforcement officials. For constructive development of psychological jurisprudence identified the key areas of research and nodal practicerelevant problems.

  5. Islamic Law

    Directory of Open Access Journals (Sweden)

    Doranda Maracineanu

    2009-06-01

    Full Text Available The law system of a State represents the body of rules passed or recognized by that State inorder to regulate the social relationships, rules that must be freely obeyed by their recipients, otherwisethe State intervening with its coercive power. Throughout the development of the society, pedants havebeen particularly interested in the issue of law systems, each supporting various classifications; theclassification that has remained is the one distinguishing between the Anglo-Saxon, the Roman-German,the religious and respectively the communist law systems. The third main international law system is theMuslim one, founded on the Muslim religion – the Islam. The Islam promotes the idea that Allah createdthe law and therefore it must be preserved and observed as such. Etymologically, the Arabian word“Islam” means “to be wanted, to obey” implying the fact that this law system promotes total andunconditioned submission to Allah. The Islamic law is not built on somebody of laws or leading cases,but has as source. The Islam is meant as a universal religion, the Koran promoting the idea of the unityof mankind; thus, one of the precepts in the Koran asserts that “all men are equal (…, there is nodifference between a white man and a black man, between one who is Arabian and one who is not,except for the measure in which they fear God.” The Koran is founded mainly on the Talmud, Hebrewsource of inspiration, and only on very few Christian sources. The Islam does not forward ideas whichcannot be materialized; on the contrary its ideas are purely practical, easy to be observed by the commonman, ideas subordinated to the principle of monotheism. The uncertainties and gaps of the Koran, whichhave been felt along the years, imposed the need for another set of rules, meant to supplement it – that isSunna. Sunna represents a body of laws and, consequently, the second source of the Koran. Sunnanarrates the life of the prophet Mohamed, the model to

  6. From Cross-Cultural Psychology to Cultural Psychology

    OpenAIRE

    Eckensberger, Lutz H.

    1990-01-01

    “… psychology from the very beginning has been struggling for its identity as a human science. Although psychology may seem to have successfuIly come of age, it is still an open question whether or not it can be further developed according to the principles of natural science, or whether it should have some unique features. Human beings, the way they think, feel and act, cannot easily be explained by "natural laws" alone; "cultural rules" have also to be taken into consideration. But these ru...

  7. Political psychology.

    Science.gov (United States)

    Stone, Susanna; Johnson, Kate M; Beall, Erica; Meindl, Peter; Smith, Benjamin; Graham, Jesse

    2014-07-01

    Political psychology is a dynamic field of research that offers a unique blend of approaches and methods in the social and cognitive sciences. Political psychologists explore the interactions between macrolevel political structures and microlevel factors such as decision-making processes, motivations, and perceptions. In this article, we provide a broad overview of the field, beginning with a brief history of political psychology research and a summary of the primary methodological approaches in the field. We then give a more detailed account of research on ideology and social justice, two topics experiencing a resurgence of interest in current political psychology. Finally, we cover research on political persuasion and voting behavior. By summarizing these major areas of political psychology research, we hope to highlight the wide variety of theoretical and methodological approaches of cognitive scientists working at the intersection of psychology and political science. WIREs Cogn Sci 2014, 5:373-385. doi: 10.1002/wcs.1293 For further resources related to this article, please visit the WIREs website. The authors have declared no conflicts of interest for this article. © 2014 John Wiley & Sons, Ltd.

  8. United States Coast Guard Antisubmarine Warfare (ASW) in the Maritime Defense Zone (MDZ) - A Strategic Approach

    Science.gov (United States)

    1989-03-01

    RIC ILE COPY AIR WAR COLLGE REEAC R~pCR UNITED STATES COAST GUARD ANTISUBMARINE WARFARE (ASW) IN THE MARITIME DEFENSE ZONE (MDZ) -A STRATEGIC...going to perform in these MDZs. Those tasks identified so far include: port and coastal physical security & preventive safety, mine warfare

  9. The Utility of Freedom: A Principal-Agent Model for Unconventional Warfare

    Science.gov (United States)

    2011-06-01

    Lanchester Model of Guerrilla Warfare,‖ Operations Research 10, no. 6 (December 1962): 818–827; William A. Niskanen, ―Review: The Economics of Insurgency...http://galenet.galegroup.com/servlet/DDRS?locID=navalps. Deitchman, S. J. ―A Lanchester Model of Guerrilla Warfare.‖ Operations Research 10, no

  10. Understanding the elementary considerations in a network warfare environment: an introductory framework

    CSIR Research Space (South Africa)

    Veerasamy, N

    2008-07-01

    Full Text Available . It seeks to offer a better introductory understanding to the field of network warfare. This paper addresses the requirements for a network warfare capability and will look at the high-level approach, constraints, focus areas, levels, techniques...

  11. Metal organic frameworks for the catalytic detoxification of chemical warfare nerve agents

    Science.gov (United States)

    Hupp, Joseph T.; Farha, Omar K.; Katz, Michael J.; Mondloch, Joseph E.

    2017-04-18

    A method of using a metal organic framework (MOF) comprising a metal ion and an at least bidendate organic ligand to catalytically detoxify chemical warfare nerve agents including exposing the metal-organic-framework (MOF) to the chemical warfare nerve agent and catalytically decomposing the nerve agent with the MOF.

  12. Study on the identification method of chemical warfare agents with spectroscopy of neutron induced γ rays

    International Nuclear Information System (INIS)

    Liu Boxue; Li Yun; Li Xiangbao

    1996-01-01

    The paper briefly describes some non-destructive verification technologies of chemical warfare agents in-site, and some application of neutron induced gamma ray analysis, such as multi-elements analysis of coal, hidden explosive detection and identification of chemical agents. It also describes some problems in developing the portable isotopic neutron spectroscopy for non-destructive evaluation of chemical warfare agents

  13. Antidotes and treatments for chemical warfare/terrorism agents: an evidence-based review.

    Science.gov (United States)

    Rodgers, G C; Condurache, C T

    2010-09-01

    This article reviews the evidence supporting the efficacy of antidotes used or recommended for the potential chemical warfare agents of most concern. Chemical warfare agents considered include cyanide, vesicants, pulmonary irritants such as chlorine and phosgene, and nerve agents. The strength of evidence for most antidotes is weak, highlighting the need for additional research in this area.

  14. Status of dental health in chemical warfare victims: The case of Isfahan, Iran

    Directory of Open Access Journals (Sweden)

    Ahmad Mottaghi

    2012-01-01

    Conclusion: Chemical warfare victims have relatively poor dental/oral health. Chemical injury might cause a dysfunction in saliva secretion, with decrease in saliva secretion increasing the risk for tooth decay and periodontal disorders. Further research is required to find out the exact underlying mechanisms and the factors associated with poor dental/oral health in chemical warfare victims.

  15. 75 FR 6642 - Notice of Proposed Information Collection; Naval Special Warfare Recruiting Directorate

    Science.gov (United States)

    2010-02-10

    ... Information Collection; Naval Special Warfare Recruiting Directorate AGENCY: Department of the Navy, DoD. ACTION: Notice. SUMMARY: The Naval Special Warfare (NSW) Recruiting Directorate announces the submission... any of the following methods: Federal eRulemaking Portal: http://www.regulations.gov . Follow the...

  16. Criminal law

    International Nuclear Information System (INIS)

    Silva, J.M. da.

    1979-01-01

    Facts concerning the application of atomic energy are presented and those aspects which should be under tutelage, the nature and guilt of the nuclear offenses and the agent's peril are presented. The need of a specific chapter in criminal law with adequate legislation concerning the principles of atomic energy is inferred. The basis for the future elaboration this legislation are fixed. (A.L.S.L.) [pt

  17. China’s Three Warfares Strategy Mitigates Fallout From Cyber Espionage Activities

    Directory of Open Access Journals (Sweden)

    Emilio Iasiello

    2016-06-01

    Full Text Available China is engaged in longstanding cyber espionage against the U.S., as well as other nations, to collect sensitive public and private information in support of national objectives laid out in its 12th Five Year Plan. Foreign governments citing China’s malfeasance have rebuked these activities, a claim vehemently denied by Beijing. In response, China is leveraging the “Three Warfares” an integrated three-prong information warfare strategy to combat these accusations by leveraging Media, Legal, and Psychological components designed to influence the international community. While the United States has threatened the imposition of economic sanctions, Beijing has successfully parried consequential actions by arresting U.S.-identified hackers, thereby demonstrating its commitment toward preserving a stable and peaceful cyberspace. These interrelated “Three Warfares” disciplines have targeted the cognitive processes of the U.S. leadership, as well as the international public’s perception of China as a global threat, thereby having successfully forestalled the implementation of any effective punitive or economic deterrence strategy to include the imposition of cyber sanctions.

  18. Social networks as a new tool of information warfare in the modern world

    Directory of Open Access Journals (Sweden)

    B. W. Kovalevych

    2014-03-01

    Full Text Available With the rapid development of information technologies, especially the Internet, people are becoming increasingly dependent on information that surrounds them. And social networks, where a person spends most of their time, become the ideal instruments of influence on the people consciousness and information warfare. Due to psychological factors ( such as ‘spiral of silence’, the herd instinct, the entire credibility of published information, opinion leaders, the desire for self­realization or replacement of reality that influence the human behavior in the network and the use of models of influence (model of network attack, model of involving users as volunteers, total block model, social networks become a platform for the dissemination of political ideas, ideologies and implementation of the ‘color revolutions’. However, social media play a positive role, especially in the establishment of civil society and the free flow of information. Positive or negative impact of networks primary depends on the purpose of use of social networking tools.

  19. Analysis of the Precursors, Simulants and Degradation Products of Chemical Warfare Agents.

    Science.gov (United States)

    Witkiewicz, Zygfryd; Neffe, Slawomir; Sliwka, Ewa; Quagliano, Javier

    2018-09-03

    Recent advances in analysis of precursors, simulants and degradation products of chemical warfare agents (CWA) are reviewed. Fast and reliable analysis of precursors, simulants and CWA degradation products is extremely important at a time, when more and more terrorist groups and radical non-state organizations use or plan to use chemical weapons to achieve their own psychological, political and military goals. The review covers the open source literature analysis after the time, when the chemical weapons convention had come into force (1997). The authors stated that during last 15 years increased number of laboratories are focused not only on trace analysis of CWA (mostly nerve and blister agents) in environmental and biological samples, but the growing number of research are devoted to instrumental analysis of precursors and degradation products of these substances. The identification of low-level concentration of CWA degradation products is often more important and difficult than the original CWA, because of lower level of concentration and a very large number of compounds present in environmental and biological samples. Many of them are hydrolysis products and are present in samples in the ionic form. For this reason, two or three instrumental methods are used to perform a reliable analysis of these substances.

  20. The Spectrum of Cyber Conflict from Hacking to Information Warfare: What is Law Enforcement's Role?

    National Research Council Canada - National Science Library

    Adkins, Bonnie

    2001-01-01

    ... intrusion attempts daily and this trend appears to be increasing It is paramount that DOD develops appropriate defensive courses of action to systematically and appropriately counter the threat...

  1. The Spectrum of Cyber Conflict from Hacking to Information Warfare: What is Law Enforcement's Role?

    National Research Council Canada - National Science Library

    Adkins, Bonnie

    2001-01-01

    Our reliance on computers and information-based technologies within DOD has greatly increased our potential for vulnerability if our information systems are attacked, DOD systems now receive numerous...

  2. Vital Interests, Virtual Threats: Reconciling International Law with Information Warfare and United States Security

    National Research Council Canada - National Science Library

    Shawhan, Karl

    2001-01-01

    .... Nontraditional threats, however, pose asymmetric dilemmas for the United States. The increased U.S. military and economic reliance on information systems introduces new vulnerabilities not adequately protected by traditional kinetic force arms...

  3. Operational Law Handbook,2007

    National Research Council Canada - National Science Library

    2007-01-01

    ...), human rights, rules of engagement, emergency essential civilians supporting military operations, contingency contractor personnel, foreign and deployment, criminal law, environmental law, fiscal law...

  4. Psychological IVF

    DEFF Research Database (Denmark)

    Adrian, Stine Willum

    2015-01-01

    ’. This theoretical work has three aims. First, it seeks to illustrate how the story of psychological IVF offers a rich range of materializations of emotions. Secondly, this work proposes a feminist materialist conceptualization of emotions that is both non-representational and posthuman. This conceptualization draws...

  5. Space psychology

    Science.gov (United States)

    Parin, V. V.; Gorbov, F. D.; Kosmolinskiy, F. P.

    1974-01-01

    Psychological selection of astronauts considers mental responses and adaptation to the following space flight stress factors: (1) confinement in a small space; (2) changes in three dimensional orientation; (3) effects of altered gravity and weightlessness; (4) decrease in afferent nerve pulses; (5) a sensation of novelty and danger; and (6) a sense of separation from earth.

  6. Nuclear law

    International Nuclear Information System (INIS)

    Bringuier, P.

    2009-01-01

    The object of this report is to present the evolution of the nuclear law during the period from 2006 to 2008, period that was characterized in France by a real rewriting from the implementation of a control authority. The prescriptive backing of nuclear activities has been deeply changed by numerous texts. In this first part are presented: (1) the institutional aspects, (2) openness and public information, (7) radioactive wastes and (9) liability and insurance. In a next publication will be treated: (3) safety and radiation protection; (4) nuclear matter, inspection, physical protection; (5) transports; (6) trade, non-proliferation; (8) radiological accidents. (N.C.)

  7. Case law

    International Nuclear Information System (INIS)

    2016-01-01

    This section treats of the following case laws: 1 - Canada: Decision of the Canadian Federal Court of Appeal dismissing an appeal related to an environmental assessment of a project to refurbish and extend the life of an Ontario nuclear power plant; 2 - Poland: Decision of the Masovian Voivod of 28 December 2015 concerning the legality of the resolution on holding a local referendum in the Commune of Rozan regarding a new radioactive waste repository (2015); 3 - United States: Commission authorises issuance of construction permit for the Shine Medical Isotope Facility in Janesville, Wisconsin; 4 - United States: Commission authorises issuance of combined licences for the South Texas Project site in Matagorda County, Texas

  8. Case law

    International Nuclear Information System (INIS)

    2012-01-01

    This section gathers the following case laws: 1 - Canada: Judicial review of Darlington new nuclear power plant project; Appeal decision upholding criminal convictions related to attempt to export nuclear-related dual-use items to Iran: Her Majesty the Queen V. Yadegari; 2 - European Commission: Greenland cases; 3 - France: Chernobyl accident - decision of dismissal of the Court of Appeal of Paris; 4 - Slovak Republic: Aarhus Convention compliance update; 5 - United States: Judgement of a US court of appeals upholding the NRC's dismissal of challenges to the renewal of the operating licence for Oyster Creek Nuclear Generating Station; reexamination of the project of high-level waste disposal site at Yucca Mountain

  9. The Baltic states should adopt the self-defence pinpricks doctrine: the “accumulation of events” threshold as a deterrent to Russian hybrid warfare

    Directory of Open Access Journals (Sweden)

    Nader Philippe Bou

    2017-06-01

    Full Text Available This article addresses a key legal debate that the Baltic NATO members ought to engage in: what constitutes an “armed attack” and what interpretation should be made of this concept in order to deter recent Russian hybrid warfare strategies. These questions are considered in connection with a more general issue regarding the law of self-defence: the question of what constitutes an armed attack in international law. This article will try to present a broad definition and context of Russian hybrid warfare and how it is challenging traditional jus ad bellum paradigms. Too few policy-makers have paid detailed attention to the new Russian “lawfare” in Ukraine, using specific military and non-military tactics in order to blur the lines between “armed attack” and mere political intervention. Meanwhile, legal scholars detach their analysis from actual policy-serving considerations and tend to acquiesce to some very restrictive theories of the use force in self-defence. For some countries, like the Baltic ones, facing strategic exposure – because of both threatening neighbours and low military capacities – the jus ad bellum paradigm should not be construed as another layer of obstacle.

  10. Cybersecurity protecting critical infrastructures from cyber attack and cyber warfare

    CERN Document Server

    Johnson, Thomas A

    2015-01-01

    The World Economic Forum regards the threat of cyber attack as one of the top five global risks confronting nations of the world today. Cyber attacks are increasingly targeting the core functions of the economies in nations throughout the world. The threat to attack critical infrastructures, disrupt critical services, and induce a wide range of damage is becoming more difficult to defend against. Cybersecurity: Protecting Critical Infrastructures from Cyber Attack and Cyber Warfare examines the current cyber threat landscape and discusses the strategies being used by governments and corporatio

  11. Getting the Next War Right: Beyond Population-centric Warfare

    Science.gov (United States)

    2010-06-01

    respectively: Che Guevara and Mao Tse -tung. Che’s foco theory, as we have discussed, advocates mobilizing from the top. The armed challenger chooses an...example, Thomas A. Marks, “Guerrillas in the Mist: Hmong Resistance Continues in Laos ,” Combat and Survival 8, no. 5 (August 1996), 4–11. 12 Theory and...Mao Tse -tung, On Guerrilla Warfare, trans. and ed. Samuel B. Grif!th (Mineola, NY: Dover Publications, 2005). The book is available from a wide

  12. Chemical and biological warfare. Should defenses be researched and deployed?

    Science.gov (United States)

    Orient, J M

    1989-08-04

    The threat of chemical and biological weapons of mass destruction has intensified because of improved delivery systems and advances in chemistry, genetics, and other sciences. Possible US responses to this threat include deterrence, defenses, and/or disarmament, including a reaffirmation of the Biological and Toxin Weapons Convention of 1972, which is now in jeopardy. This article discusses the history of chemical and biological warfare, existing and potential weapons, the proliferation of weapons and delivery systems, ways to prevent the use of these weapons, and ways to protect populations from their effects.

  13. Environmental assessments of sea dumped chemical warfare agents

    DEFF Research Database (Denmark)

    Sanderson, Hans; Fauser, Patrik

    This is a report on the information gathered during work related to sea dumped chemical warfare agents. It mainly reviews the work conducted in relation to the installation of the two Nord Stream gas pipeline from 2008-2012. The focus was on the weight-of-evidence risk assessment of disturbed CWA...... residues in connection with the installation of the pipelines. Novel exposure and toxicity assessments are presented and the risk is assessed. The overall conclusion is that there is a negligible acute added CWA risk towards the fish community from the installation of the pipelines....

  14. Ultraviolet Raman scattering from persistent chemical warfare agents

    Science.gov (United States)

    Kullander, Fredrik; Wästerby, Pär.; Landström, Lars

    2016-05-01

    Laser induced Raman scattering at excitation wavelengths in the middle ultraviolet was examined using a pulsed tunable laser based spectrometer system. Droplets of chemical warfare agents, with a volume of 2 μl, were placed on a silicon surface and irradiated with sequences of laser pulses. The Raman scattering from V-series nerve agents, Tabun (GA) and Mustard gas (HD) was studied with the aim of finding the optimum parameters and the requirements for a detection system. A particular emphasis was put on V-agents that have been previously shown to yield relatively weak Raman scattering in this excitation band.

  15. Case law

    International Nuclear Information System (INIS)

    Anon.

    2002-01-01

    Several judgements are carried: Supreme Administrative Court Judgement rejecting an application to prevent construction of a new nuclear power plant (Finland); judgement of the Council of State specifying the law applicable to storage facilities for depleted uranium (France); Supreme Court Decision overturning for foreign spent fuel (Russian federation); Court of Appeal Judgement on government decision to allow the start up of a MOX fuel plant ( United Kingdom); judgement on lawfulness of authorizations granted by the Environment Agency: Marchiori v. the Environment Agency; (U.K.); Kennedy v. Southern California Edison Co. (U.S.A); Judgement concerning Ireland ' s application to prevent operation of BNFL ' s MOX facility at Sellafield: Ireland v. United Kingdom; At the European Court of Human Rights Balmer-Schafroth and others have complained v. Switzerland. Parliamentary decision rescinding the shutdown date for Barseback - 2 (Sweden); Decision of the International trade Commission regarding imposition of countervailing and anti-dumping duties on imports of low enriched uranium from the European Union, Yucca Mountain site recommendation (USA). (N.C.)

  16. Desert Guerrillas: Psychological Social and Economic Characteristics of the Bedouin Which Lend Themselves to Irregular Warfare

    Science.gov (United States)

    1988-11-14

    to defend their positions from the rebels; and augmenting their efforts with a well- financed and comprehensive civic action program aimed at...Royal Sussex Regiment. London, England: The Unicorn Press Ltd., 1936. Connelley, William Elsey. Duantrill and the Border Wars. Cedar Rapids, Iowa

  17. Status of dental health in chemical warfare victims: the case of Isfahan, Iran.

    Science.gov (United States)

    Mottaghi, Ahmad; Hoseinzade, Abolfath; Zamani, Elham; Araghizade, Habib Allah

    2012-01-01

    Little evidence is available regarding the dental health of victims of chemical warfare in Iran. Therefore, in this study, we examined the decayed, missing, and filled teeth index (DMFT), community periodontal index of treatment needs (CPITN), and saliva secretion rate of chemical warfare victims living in the province of Isfahan in Iran. This case-control study was conducted with 300 chemical warfare victims as the treatment group and 300 age-matched individuals without exposure to chemical warfare as the control group. DMFT and CPITN indices and saliva secretion rate were measured and compared between the two groups. Chemical warfare victims had significantly higher scores than the control group for decayed teeth (4.25 ± 3.88 vs 3.52 ± 2.81; P=0.009), missing teeth (8.79 ± 9.3 vs 6.15 ± 8.43; Pwarfare victims was significantly lower than that in the control group (1.71 ± 0.05 vs 3.85 ± 1.95 cc/5 min; PChemical warfare victims have relatively poor dental/oral health. Chemical injury might cause a dysfunction in saliva secretion, with decrease in saliva secretion increasing the risk for tooth decay and periodontal disorders. Further research is required to find out the exact underlying mechanisms and the factors associated with poor dental/oral health in chemical warfare victims.

  18. Nuclear Law

    International Nuclear Information System (INIS)

    Wiesbauer, Bruno

    1978-01-01

    This book is the first attempt of a comprehensive compilation of national Austrian Nuclear Law (Nuclear Liability Act; Radiation protection Act, Radiation Protection Ordinance, Security Control Act, Act on the uses of Nuclear Energy - Zwentendorf Nuclear Power Plant) and the most important international agreements to which Austria is a party. Furthermore, the book contains the most important Nuclear Liability Conventions to which Austria is not yet a party, but which are applicable in neighbouring; the Paris Convention served as a model for the national Nuclear Liability Act and may be used for its interpretation. The author has translated a number of international instruments into German, such as the Expose des Motifs of the Paris Convention. (NEA) [fr

  19. Case law

    International Nuclear Information System (INIS)

    2014-01-01

    This section of the Bulletin brings together the texts of the following case laws: Canada: - Judgment of the Federal Court of Canada sending back to a joint review panel for reconsideration the environmental assessment of a proposed new nuclear power plant in Ontario. France : - Conseil d'etat, 24 March 2014 (Request No. 358882); - Conseil d'etat, 24 March 2014 (Request No. 362001). Slovak Republic: - Further developments in cases related to the challenge by Greenpeace Slovakia to the Mochovce nuclear power plant; - Developments in relation to the disclosure of information concerning the Mochovce nuclear power plant. United States: - Initial Decision of the Atomic Safety and Licensing Board Ruling in Favour of Nuclear Innovation North America, LLC (NINA) Regarding Foreign Ownership, Control or Domination

  20. Criminal tendencies and psychological testing

    Directory of Open Access Journals (Sweden)

    Sobchik L. N.

    2017-04-01

    Full Text Available Methods of psychological diagnostics closer to the psychology main research areas, which involve measuring the accuracy and statistical reliability. A set of methods that includes questionnaires should be complemented with projective tests in which the stimulus material is verbal in nature. The article presents the results of surveys of different groups of persons in conflict with the law, as well as screening tests contingent of youth groups and adolescents. High performance, spontaneously manifested aggressiveness, traits, emotional immaturity, low self-control and primitive-the requirement of the hierarchy of values at statistically significant level are identified in the data psychodiagnostic study, thus allowing to allocate the risk of wrongful conduct and to develop preventive measures of psycho-pedagogical and social nature. Psychological testing is an effective tool in the study of criminal predisposici and gives the key to a science-based approach in the development of preventive measures aimed at reducing crime.

  1. Case law

    International Nuclear Information System (INIS)

    2017-01-01

    This section treats of the following case laws (United States): 1 - Virginia Uranium, Inc. v. Warren, 848 F.3d 590 (4. Cir. 2017): In the United States District Court for the Western District of Virginia, the plaintiffs, a collection of uranium mining companies and owners of land containing uranium deposits, challenged a Commonwealth of Virginia moratorium on conventional uranium mining. The plaintiffs alleged that the state moratorium was preempted by federal law under the Supremacy Clause of the US Constitution.; 2 - United States v. Energy Solutions, Inc.; Rockwell Holdco, Inc.; Andrews County; Holdings, Inc.; and Waste Control Specialists, LLC. (D. Del. June 21, 2017): In 2016, the United States, acting through the US Department of Justice, commenced an action in United States District Court in Delaware seeking to enjoin the acquisition of Waste Control Specialists, LLC (WCS) and its parent company by Energy Solutions, Inc., and its parent. WCS and Energy Solutions are competitors in the market for the disposal of low-level radioactive waste (LLRW) produced by commercial generators of such material. The United States alleged that the proposed acquisition was unlawful. 3 - Cooper v. Tokyo Electric Power Company, No. 15-56426 (9. Cir. 2017): The plaintiffs are US Navy service members who were deployed off the Japanese coast as part of the US effort to provide earthquake relief after the 9.0 earthquake and tsunami that struck Japan on 11 March 2011. Plaintiffs sued alleging 'that TEPCO was negligent in operating the Fukushima Daiichi Nuclear Power Plant and in reporting the extent of the radiation leak

  2. Murky Projects and Uneven Information Policies: A Case Study of the Psychological Strategy Board and CIA

    Directory of Open Access Journals (Sweden)

    Susan Maret

    2018-02-01

    Full Text Available This case study discusses the Truman and Eisenhower administration's (1951-1953 short-lived Psychological Strategy Board (PSB. Through the lens of declassified documents, the article recounts the history and activities of the Board, including its relationship with the Central Intelligence Agency (CIA and clandestine projects that involve human experimentation. Primary documents of the period suggest that institutional secrecy, coupled with inconsistent information policies, largely shielded CIA's BLUEBIRD, ARTICHOKE, and MKULTRA from the Board. This subject has not been previously reported in the research literature, and supplements existing historical understanding of the PSB's mission under the broad umbrella of psychological warfare.

  3. Punishment sustains large-scale cooperation in prestate warfare

    Science.gov (United States)

    Mathew, Sarah; Boyd, Robert

    2011-01-01

    Understanding cooperation and punishment in small-scale societies is crucial for explaining the origins of human cooperation. We studied warfare among the Turkana, a politically uncentralized, egalitarian, nomadic pastoral society in East Africa. Based on a representative sample of 88 recent raids, we show that the Turkana sustain costly cooperation in combat at a remarkably large scale, at least in part, through punishment of free-riders. Raiding parties comprised several hundred warriors and participants are not kin or day-to-day interactants. Warriors incur substantial risk of death and produce collective benefits. Cowardice and desertions occur, and are punished by community-imposed sanctions, including collective corporal punishment and fines. Furthermore, Turkana norms governing warfare benefit the ethnolinguistic group, a population of a half-million people, at the expense of smaller social groupings. These results challenge current views that punishment is unimportant in small-scale societies and that human cooperation evolved in small groups of kin and familiar individuals. Instead, these results suggest that cooperation at the larger scale of ethnolinguistic units enforced by third-party sanctions could have a deep evolutionary history in the human species. PMID:21670285

  4. China's Use of Cyber Warfare: Espionage Meets Strategic Deterrence

    Directory of Open Access Journals (Sweden)

    Magnus Hjortdal

    2011-01-01

    Full Text Available This article presents three reasons for states to use cyber warfare and shows that cyberspace is—and will continue to be—a decisive element in China's strategy to ascend in the international system. The three reasons are: deterrence through infiltration of critical infrastructure; military technological espionage to gain military knowledge; and industrial espionage to gain economic advantage. China has a greater interest in using cyberspace offensively than other actors, such as the United States, since it has more to gain from spying on and deterring the United States than the other way around. The article also documents China's progress in cyber warfare and shows how it works as an extension of its traditional strategic thinking and the current debate within the country. Several examples of cyber attacks traceable to China are also presented. This includes cyber intrusions on a nuclear arms laboratory, attacks on defense ministries (including the Joint Strike Fighter and an airbase and the U.S. electric grid, as well as the current Google affair, which has proved to be a small part of a broader attack that also targeted the U.S. Government. There are, however, certain constraints that qualify the image of China as an aggressive actor in cyberspace. Some believe that China itself is the victim of just as many attacks from other states. Furthermore, certain actors in the United States and the West have an interest in overestimating China's capabilities in cyberspace in order to maintain their budgets.

  5. Biodiversity conservation and armed conflict: a warfare ecology perspective.

    Science.gov (United States)

    Hanson, Thor

    2018-04-23

    The activities involved in preparing for, executing, and recovering from armed conflict are globally pervasive and consequential, with significant impacts on natural systems. Effects on biodiversity are predominantly negative, produced by direct and indirect battlefield impacts, as well as the general breakdown of social, economic, and governance systems during wartime. Certain conservation opportunities do occur, however, particularly on lands set aside for training exercises, buffer zones, and peace parks. Here, the relationship between armed conflict and biodiversity is reviewed using the temporal framework of warfare ecology, which defines warfare as an ongoing process of three overlapping stages: preparations, war (armed conflict), and postwar activities. Several themes emerge from recent studies, including a heightened awareness of biodiversity conservation on military lands, the potential for scientific and conservation engagement to mitigate negative biodiversity impacts in war zones, and the importance of the postwar period for incorporating biodiversity priorities into reconstruction and recovery efforts. Research limitations and knowledge gaps are also discussed. © 2018 New York Academy of Sciences.

  6. Case Law

    International Nuclear Information System (INIS)

    Anon.

    2009-01-01

    Different case law are presented in this part: By decision dated 17 july 2009, the Ontario Court of Appeal (Canada) has ruled on the scope of solicitor-client privilege and the protections that may be afforded to privileged investigations reports. The decision reaffirms the canadian court system view of the importance of the protection of solicitor-client privilege to the administration of justice; For United states here is a judgment of a U.S. court of Appeals on the design basis threat security rule (2009), this case concerns a challenge to the U.S. Nuclear regulatory commission (N.R.C.) revised design basis threat rule, which was adopted in 2007 (nuclear bulletin law no. 80). The petitioners public citizen, Inc., San Luis Obispo Mothers for Peace and the State of New York filed a lawsuit in the U.S. court of appeals for the Ninth circuit alleging that the N.R.C. acted arbitrarily and capriciously and in violation of law by refusing to include the treat of air attacks in its final revised design basis rule. On the 24. july 2009, a panel of three ninth circuit judges rules 2-1 that the N.R.C. acted reasonably in not including an air treat in its design basis rule. Secondly, judgment of a U.S. court of appeals on consideration of the environmental impact of terrorist attacks on nuclear facilities (2009), this case concerns the scope of the U.S. Nuclear regulatory commission environmental analysis during its review of applications to re-licence commercial nuclear power plants. New Jersey urged the N.R.C. to consider the environmental impact of an airborne terrorist attack on the power plant, arguing that such analysis was required by the national environmental policy act (N.E.P.A.). On 31. march 2009, a panel of three circuit judges declined to follow the ninth circuit opinion and affirmed NRC decision 3-0 ruling that NRC was not required to consider terrorism in its N.E.P.A. analysis because NRC re-licensing would not be a reasonably close cause of terrorism

  7. Case law

    International Nuclear Information System (INIS)

    Anon.

    2011-01-01

    This chapter gathers three case laws, one concerning France and the two others concerning the United States. France - Decision of the Administrative Court in Strasbourg on the permanent shutdown of the Fessenheim nuclear power plant: On 9 March 2011, the administrative court in Strasbourg confirmed the government's rejection to immediately close the Fessenheim nuclear power plant, the first unit of which started operation on 1 January 1978. The court rejected the motion of the 'Association trinationale de protection nucleaire' (ATPN) filed against the decision of the Minister of Economy, Industry and Employment to refuse the final shutdown of the plant. The group, which brings together associations as well as French, German and Swiss municipalities, had taken legal action in December 2008. United States - Case law 1 - Judgment of a US Court of Appeals on public access to sensitive security information and consideration of the environmental impacts of terrorist attacks on nuclear facilities: This case concerns 1) the public's right to access classified and sensitive security information relied upon by the US Nuclear Regulatory Commission (NRC) in its environmental review; and 2) the sufficiency of the NRC's environmental review of the impacts of terrorist attacks for a proposed Independent Spent Fuel Storage Installation (ISFSI). In 2003, the NRC ruled that the National Environmental Policy Act (NEPA) did not require the NRC to consider the impacts of terrorist attacks in its environmental review for the proposed ISFSI at the Diablo Canyon Power Plant. ' NEPA mandates that all federal agencies must prepare a detailed statement on the environment impacts before undertaking a major federal action that significantly affects the human environment. In 2004, the San Luis Obispo Mothers for Peace, a group of individuals who live near the Diablo Canyon Power Plant, filed a petition in the US Court of Appeals for the Ninth Circuit challenging the NRC's 2003 decision. The

  8. Case law

    International Nuclear Information System (INIS)

    2013-01-01

    This section reports on 7 case laws from 4 countries: - France: Conseil d'Etat decision, 28 June 2013, refusing to suspend operation of the Fessenheim nuclear power plant; - Slovak Republic: New developments including the Supreme Court's judgment in a matter involving Greenpeace Slovakia's claims regarding the Mochovce nuclear power plant; New developments in the matter involving Greenpeace's demands for information under the Freedom of Information Act; - Switzerland: Judgment of the Federal Supreme Court in the matter of the Departement federal de l'environnement, des transports, de l'energie et de la communication (DETEC) against Ursula Balmer-Schafroth and others on consideration of admissibility of a request to withdraw the operating licence for the Muehleberg nuclear power plant; - United States: Judgment of the Court of Appeals for the District of Columbia Circuit granting petition for writ of mandamus ordering US Nuclear Regulatory Commission (NRC) to resume Yucca Mountain licensing; Judgment of the Court of Appeals for the Second Circuit invalidating two Vermont statutes as preempted by the Atomic Energy Act; Judgment of the NRC on transferring Shieldalloy site to New Jersey's jurisdiction

  9. Case Law

    International Nuclear Information System (INIS)

    2014-01-01

    This section treats of the following case laws sorted by country: 1 - Germany: Federal Administrative Court confirms the judgments of the Higher Administrative Court of the Land Hesse: The shutdown of nuclear power plant Biblis blocks A and B based on a 'moratorium' imposed by the Government was unlawful; List of lawsuits in the nuclear field. 2 - Slovak Republic: Further developments in cases related to the challenge by Greenpeace Slovakia to the Mochovce nuclear power plant; Developments in relation to the disclosure of information concerning the Mochovce nuclear power plant. 3 - United States: Judgment of the Nuclear Regulatory Commission resuming the licensing process for the Department of Energy's construction authorisation application for the Yucca Mountain high-level radioactive waste repository; Judgment of the Licensing Board in favour of Shaw AREVA MOX Services regarding the material control and accounting system at the proposed MOX Facility; Dismissal by US District Court Judge of lawsuit brought by US military personnel against Tokyo Electric Power Company (TEPCO) in connection with the Fukushima Daiichi nuclear power plant accident

  10. Case law

    International Nuclear Information System (INIS)

    Anon.

    2000-01-01

    This article reviews the judgements and law decisions concerning nuclear activities throughout the world during the end of 1999 and the first semester 2000. In Belgium a judgement has allowed the return of nuclear waste from France. In France the Council of State confirmed the repeal of an authorization order of an installation dedicated to the storage of uranium sesquioxide, on the basis of an insufficient risk analysis. In France too, the criminal chamber of the French Supreme Court ruled that the production in excess of that authorized in the licence can be compared to carrying out operations without a licence. In Japan the Fukui district court rejected a lawsuit filed by local residents calling for the permanent closure, on safety grounds, of the Monju reactor. In the Netherlands, the Council of State ruled that the Dutch government had no legal basis for limiting in time the operating licence of the Borssele plant. In Usa a district court has rejected a request to ban MOX fuel shipment. (A.C.)

  11. Psychology Faculty Perceptions of Abnormal Psychology Textbooks

    Science.gov (United States)

    Rapport, Zachary

    2011-01-01

    The problem. The purpose of the current study was to investigate the perceptions and opinions of psychology professors regarding the accuracy and inclusiveness of abnormal psychology textbooks. It sought answers from psychology professors to the following questions: (1) What are the expectations of the psychology faculty at a private university of…

  12. Psychology of religion: perspectives from cultural psychology

    NARCIS (Netherlands)

    Belzen, J.A.

    2010-01-01

    After a brief introduction, this paper tries to establish what type of psychology the psychology of religion is. Having introduced cultural psychology in general, some theories applicable in research on religion are presented, and some examples of cultural psychological research of religious

  13. Recent publications on environmental law

    International Nuclear Information System (INIS)

    Lohse, S.

    1988-01-01

    The bibliography contains 1235 references to publications covering the following subject fields: general environmental law; environmental law in relation to constitutional law, administrative law, procedural law, revenue law, criminal law, private law, industrial law; law of regional development; nature conservation law; law on water protection; waste management law; law on protection against harmful effects on the environment; atomic energy law and radiation protection law; law of the power industry and the mining industry; laws and regulations on hazardous material and environmental hygiene. (HP) [de

  14. Recent publications on environmental law

    International Nuclear Information System (INIS)

    Lohse, S.

    1989-01-01

    The bibliography contains 1160 references to publications covering the following subject fields: General environmental law; environmental law in relation to constitutional law, administrative law, procedural law, revenue law, criminal law, private law, industrial law; law of regional development; nature conservation law; law on water protection; waste management law; law on protection against harmful effects on the environment; atomic energy law and radiation protection law; law of the power industry and the mining industry; laws and regulations on hazardous material and environmental hygiene. (orig./HP) [de

  15. Beyond Artificial Intelligence toward Engineered Psychology

    Science.gov (United States)

    Bozinovski, Stevo; Bozinovska, Liljana

    This paper addresses the field of Artificial Intelligence, road it went so far and possible road it should go. The paper was invited by the Conference of IT Revolutions 2008, and discusses some issues not emphasized in AI trajectory so far. The recommendations are that the main focus should be personalities rather than programs or agents, that genetic environment should be introduced in reasoning about personalities, and that limbic system should be studied and modeled. Engineered Psychology is proposed as a road to go. Need for basic principles in psychology are discussed and a mathematical equation is proposed as fundamental law of engineered and human psychology.

  16. Information Warfare: Issues Associated with the Defense of DOD Computers and Computer Networks

    National Research Council Canada - National Science Library

    Franklin, Derek

    2002-01-01

    ... that may threaten the critical information pathways of the armed forces An analysis of the history of computer information warfare reveals that there was an embarrassing lack of readiness and defense...

  17. Cerium oxide for the destruction of chemical warfare agents: A comparison of synthetic routes

    Czech Academy of Sciences Publication Activity Database

    Janos, P.; Henych, Jiří; Pelant, O.; Pilařová, V.; Vrtoch, L.; Kormunda, M.; Mazanec, K.; Štengl, Václav

    2016-01-01

    Roč. 304, MAR (2016), s. 259-268 ISSN 0304-3894 Institutional support: RVO:61388980 Keywords : Cerium oxide * Chemical warfare agents * Organophosphate compounds * Decontamination Subject RIV: CA - Inorganic Chemistry Impact factor: 6.065, year: 2016

  18. From Douhet to drones, air warfare, and the evolution of targeting

    NARCIS (Netherlands)

    Osinga, F.P.B.; Roorda, M.P.; Ducheine, P.A.L.; Schmitt, M.N.; Osinga, F.P.B.

    2016-01-01

    Through the prism of the experience of air warfare, this chapter identifies key factors that have shaped targeting. These include technological developments, organizational structures, and processes and inter-service competition for scarce resources. Moreover, targeting is informed by perspectives

  19. Defense Base Closure and Realignment Budget Data for the Naval Surface Warfare Center

    National Research Council Canada - National Science Library

    1993-01-01

    ... and realignment military construction projects. This report provides the results of the audit related to the realignment of Naval Surface Warfare Centers elements in White Oak, Maryland, and Panama City, Florida, to Dahlgren, Virginia...

  20. CRUSER's Warfare Innovation Workshop Focused on Hybrid War in the Urban Littorals

    OpenAIRE

    Ehrlich, Michael

    2017-01-01

    News Stories Archive The Naval Postgraduate School (NPS) Consortium for Robotics and Unmanned Systems Education and Research, CRUSER, hosted its annual Warfare Innovation Workshop (WIW) in Glasgow Hall, Sept. 18-21.

  1. The Army Ground Forces Training for Mountain and Winter Warfare - Study No. 23

    National Research Council Canada - National Science Library

    Govan, Thomas

    1946-01-01

    This general study of the experiments in mountain and winter warfare training from 1940 to 1944 is designed as an introduction to the histories of the Mountain Training Center and The 10th Mountain...

  2. Electronic Warfare: Towed Decoys Could Improve Survivability of Current Navy Aircraft

    National Research Council Canada - National Science Library

    Aiken, Michael

    1997-01-01

    Traditionally, DOD'S combat aircraft have used on-board electronic warfare devices called jammers for self-protection against radar-controlled weapons, including missiles and anti-aircraft artillery...

  3. Optimizing Armed Forces Capabilities for Hybrid Warfare – New Challenge for Slovak Armed Forces

    Directory of Open Access Journals (Sweden)

    Peter PINDJÁK

    2015-09-01

    Full Text Available The paper deals with the optimization of military capabilities of the Slovak Armed Forces for conducting operations in a hybrid conflict, which represents one of the possible scenarios of irregular warfare. Whereas in the regular warfare adversaries intend to eliminate the centers of gravity of each other, most often command and control structures, in irregular conflicts, the center of gravity shifts towards the will and cognitive perception of the target population. Hybrid warfare comprises a thoroughly planned combination of conventional military approaches and kinetic operations with subversive, irregular activities, including information and cyber operations. These efforts are often accompanied by intensified activities of intelligence services, special operation forces, and even mercenary and other paramilitary groups. The development of irregular warfare capabilities within the Slovak Armed Forces will require a progressive transformation process that may turn the armed forces into a modern and adaptable element of power, capable of deployment in national and international crisis management operations.

  4. Surface Warfare Officer Retention: Analysis of Individual Ready Reserve Survey Data

    National Research Council Canada - National Science Library

    Stoker, Carol; Crawford, Alice

    2008-01-01

    ... (including morale and lack of mentoring), push both men and women out of the Navy. Nonetheless, the Navy s primary effort to improve retention has been to introduce the Surface Warfare Officer Continuation Pay (SWOCP...

  5. Understanding "Understanding" Flow for Network-Centric Warfare: Military Knowledge-Flow Mechanics

    National Research Council Canada - National Science Library

    Nissen, Mark

    2002-01-01

    Network-centric warfare (NCW) emphasizes information superiority for battlespace efficacy, but it is clear that the mechanics of how knowledge flows are just as important as those pertaining to the networks and communication...

  6. DRES Database of Methods for the Analysis of Chemical Warfare Agents

    National Research Council Canada - National Science Library

    D'Agostino, Paul

    1997-01-01

    .... Update of the database continues as an ongoing effort and the DRES Database of Methods for the Analysis of Chemical Warfare Agents is available panel in hardcopy form or as a softcopy Procite or Wordperfect file...

  7. The Rapier or the Club: The Relationship between Attrition and Maneuver Warfare

    National Research Council Canada - National Science Library

    Springman, Jeffrey A

    2006-01-01

    ...? This project compares the relationship between attrition and maneuver warfare. The study considers whether there are times when wars of attrition should be fought, and whether there are conditions that force wars of attrition...

  8. Diagnosis of Exposure to Chemical Warfare Agents: A Comprehensive Literature Survey 1990-2005

    National Research Council Canada - National Science Library

    Noort, D

    2006-01-01

    This report is an update of TNO report PML 2003-A63. In this report an overview is presented of the methods currently available for detection of exposure to a number of chemical warfare agents (CWA), i.e...

  9. Improving Blood Monitoring of Enzymes as Biomarkers of Risk from Anticholinergic Pesticides and Chemical Warfare Agents

    National Research Council Canada - National Science Library

    Wilson, Barry W

    2006-01-01

    Blood biomarkers are an important way to monitor exposure to anticholinergic pesticides and chemical warfare agents and to establish whether some personnel are at greater risk than others from exposure...

  10. A new General Purpose Decontamination System for Chemical and Biological Warfare and Terrorism Agents

    National Research Council Canada - National Science Library

    Khetan, Sushil; Banerjee, xdDeboshri; Chanda, Arani; Collins, Terry

    2003-01-01

    Partial contents: Fe-TAML Activator of Peroxide,Activators of Hydrogen peroxide,Biological Warfare Agents,Bacterial Endospore,Bacterial Spore Deactivation,Modeling Studies,Deactivation Studies with Bacillus spores...

  11. Second NATO/SIBCA Exercise on Sampling of Chemical Warfare Agents

    National Research Council Canada - National Science Library

    Wils, E

    1999-01-01

    In order to practise the sampling of chemical warfare agents under realistic conditions, the Netherlands participated successfully in the second NATO/SIBCA sampling exercise conducted in Poland on 1-3...

  12. The Third World War? In The Cyberspace. Cyber Warfare in the Middle East.

    Directory of Open Access Journals (Sweden)

    Martina

    2014-06-01

    Full Text Available This article aims to provide a brief and comprehensive introduction to the issue of cyber warfare and to display the recent development in this area. Geographically, it focuses on the Middle East region, since the vast majority of the most important recent cyber attacks appeared just in there or were connected to it. The first part of the article tries to define the key notion of cyber warfare, compares it to the standard warfare and presents different types of cyber weapons that are known today. The second part points out examples of the most striking recent cyber attacks and uses them as evidences to demonstrate today's importance and dissemination of cyber warfare. Finally, the article sums up pros and cons of the cyber weapons and, in view of these, predicts a significant increase in their use in any future war conflicts.

  13. Improving Blood Monitoring of Enzymes as Biomarkers of Risk from Anticholinergic Pesticides and Chemical Warfare Agents

    National Research Council Canada - National Science Library

    Wilson, Barry W

    2005-01-01

    Blood biomarkers are an important way to monitor exposure to anticholinergic pesticides and chemical warfare agents and to establish whether some personnel are at greater risk than others from exposure...

  14. Special Operations Forces: C-130 Upgrade Plan Could Help Fix Electronic Warfare Deficiencies

    National Research Council Canada - National Science Library

    1998-01-01

    In response to a concern that threats to the U.S. Special Operations Command's (USSOCOM) aircraft are increasing, while funds available for electronic warfare are decreasing, the General Accounting Office...

  15. Combinatorial Auction Theory Applied to the Selection of Surface Warfare Officer Retention Incentives

    National Research Council Canada - National Science Library

    Denmond, Constance M; Johnson, Derek N; Lewis, Chavius G; Zegley, Christopher R

    2007-01-01

    The purpose of this project is to investigate the potential retention and cost impacts of offering combinations of retention base incentives to members of the Surface Warfare Officer (SWO) community...

  16. Case law

    International Nuclear Information System (INIS)

    2015-01-01

    This section treats of the following case laws: 1 - Canada: Decision of the Canadian Federal Court of Appeal overturning a decision to send back for reconsideration an environmental assessment of a proposed new nuclear power plant in Ontario; 2 - France: Council of State decision, 28 November 2014, Federation 'Reseau sortir du nucleaire' (Nuclear Phase-Out network) and others vs. Electricite de France (EDF), Request No. 367013 for the annulment of: - The resolution of the French Nuclear Safety Authority (ASN) dated 4 July 2011 specifying additional regulations for Electricite de France (EDF) designed to strengthen the reactor basemat of reactor No. 1 in the Fessenheim nuclear power plant, and - The resolution of ASN dated 19 December 2012 approving the start of work on reinforcing the reactor basemat in accordance with the dossier submitted by EDF; 3 - Germany: Judgment of the European Court of Justice on the nuclear fuel tax; 4 - India: Judgment of the High Court of Kerala in a public interest litigation challenging the constitutional validity of the Civil Liability for Nuclear Damage Act, 2010; 5 - Japan - District court decisions on lawsuits related to the restart of Sendai NPP and Takahama NPP; 6 - Poland: Decision of the Masovian Voivod concerning the legality of the resolution on holding a local referendum in the Commune of Rozan regarding a new radioactive waste repository; Certain provisions of the Regulation of the Minister of Health of 18 February 2011 on the conditions for safe use of ionising radiation for all types of medical exposure have been declared unconstitutional by a judgment pronounced by the Constitutional Tribunal; 7 - Slovak Republic: Developments in relation to the disclosure of information concerning the Mochovce nuclear power plant

  17. UNCLOS and International Law

    DEFF Research Database (Denmark)

    Martinez Romera, Beatriz; Coelho, Nelson F.

    2018-01-01

    , treaty law is only one of many sources of the law that governs international relations, the others being customary international law and principles of law. The main conclusion of this chapter is that states may have to wake up to the limitations of the UNCLOS and that this will require understanding...... the relative role of this treaty among other sources of international law....

  18. The French nuclear law

    International Nuclear Information System (INIS)

    Ito, Hiroshi

    2013-01-01

    The nuclear law had been out of the environmental law. The act on the transparency and the security of the nuclear matter was enacted in 2006 and set in the code of the environment in 2012. It means that the nuclear law is part of the environmental law and that it is advanced. I will report the French nuclear law. (author)

  19. Demonstrating the Gas Laws.

    Science.gov (United States)

    Holko, David A.

    1982-01-01

    Presents a complete computer program demonstrating the relationship between volume/pressure for Boyle's Law, volume/temperature for Charles' Law, and volume/moles of gas for Avagadro's Law. The programing reinforces students' application of gas laws and equates a simulated moving piston to theoretical values derived using the ideal gas law.…

  20. Modeling Anti-Air Warfare With Discrete Event Simulation and Analyzing Naval Convoy Operations

    Science.gov (United States)

    2016-06-01

    W., & Scheaffer, R. L. (2008). Mathematical statistics with applications . Belmont, CA: Cengage Learning. 118 THIS PAGE INTENTIONALLY LEFT BLANK...WARFARE WITH DISCRETE EVENT SIMULATION AND ANALYZING NAVAL CONVOY OPERATIONS by Ali E. Opcin June 2016 Thesis Advisor: Arnold H. Buss Co...REPORT DATE June 2016 3. REPORT TYPE AND DATES COVERED Master’s thesis 4. TITLE AND SUBTITLE MODELING ANTI-AIR WARFARE WITH DISCRETE EVENT

  1. Warfare, genocide, and ethnic conflict: a Darwinian approach.

    Science.gov (United States)

    Dimijian, Gregory G

    2010-07-01

    As the 21st century dawns, I reflect on the history of humankind with growing concern about the need to understand the underlying biological and cultural roots of ethnic conflict and warfare. In the many studies of human conflict, innate biological predispositions have been neglected. This article is the third part of a series of seminars for medical residents at the University of Texas Southwestern Medical School at Dallas (see http://adarwinstudygroup.org/). The series starts with in-depth coverage of Darwinian natural and sexual selection, with examples from the domestication of animals and plants and the crisis of antibiotic resistance. The series strives to show how biology has been neglected in the study of the we-they orientation of human behavior, with its devastating consequences. The subject material is profoundly disturbing, as it looks at "human nature" and contrasts the "dark side" of human behavior with the opposite, profoundly caring and loving side.

  2. Information Warfare on Social Media: A Brand Management Perspective

    Directory of Open Access Journals (Sweden)

    Kalpokas Ignas

    2017-06-01

    Full Text Available Employing a perspective informed by brand management, this article aims at understanding information warfare operations in social media. The state, seen as brand, must project an image of itself to both internal and foreign audiences to unite the domestic audience and/or attract global support. However, in constructing a brand, states are vulnerable to ‘sofa warriors’ – ordinary individuals who have been unwittingly recruited by hostile actors to disseminate (over social media or other platforms a counter-brand, harmful to the state concerned. These new threats are investigated in light of recent tendencies in online branding, elucidating their status as a national security threat, with the potential to significantly disrupt life in political communities.

  3. Book Review: Conquest in Cyberspace: National Security and Information Warfare

    Directory of Open Access Journals (Sweden)

    Gary C. Kessler

    2007-06-01

    Full Text Available Libicki, M.C. (2007. Conquest in Cyberspace: National Security and Information Warfare. New York: Cambridge University Press. 323 pages, ISBN: 978-0-521-69214-4 (paper, US$80Reviewed by Gary C. Kessler (gary.kessler@champlain.eduMany books -- and even movies ("Live Free or Die Hard" -- are based upon the premise of an impending information war. In these scenarios -- made all too plausible by the increased frequency with which we read about and experience major information security incidents -- a Bad Guy exploits known computer security vulnerabilities in order to control major national infrastructures via the Internet so as to reap financial, economic, and/or personal power.(see PDF for full review

  4. Nanostructured Metal Oxides for Stoichiometric Degradation of Chemical Warfare Agents.

    Science.gov (United States)

    Štengl, Václav; Henych, Jiří; Janoš, Pavel; Skoumal, Miroslav

    2016-01-01

    Metal oxides have very important applications in many areas of chemistry, physics and materials science; their properties are dependent on the method of preparation, the morphology and texture. Nanostructured metal oxides can exhibit unique characteristics unlike those of the bulk form depending on their morphology, with a high density of edges, corners and defect surfaces. In recent years, methods have been developed for the preparation of metal oxide powders with tunable control of the primary particle size as well as of a secondary particle size: the size of agglomerates of crystallites. One of the many ways to take advantage of unique properties of nanostructured oxide materials is stoichiometric degradation of chemical warfare agents (CWAs) and volatile organic compounds (VOC) pollutants on their surfaces.

  5. Chemical warfare protection for the cockpit of future aircraft

    Science.gov (United States)

    Pickl, William C.

    1988-01-01

    Currently systems are being developed which will filter chemical and biological contaminants from crew station air. In order to maximize the benefits of these systems, a method of keeping the cockpit contaminant free during pilot ingress and egress is needed. One solution is to use a rectangular plastic curtain to seal the four edges of the canopy frame to the canopy sill. The curtain is stored in a tray which is recessed into the canopy sill and unfolds in accordion fashion as the canopy is raised. A two way zipper developed by Calspan could be used as an airlock between the pilot's oversuit and the cockpit. This system eliminates the pilot's need for heavy and restrictive CB gear because he would never be exposed to the chemical warfare environment.

  6. Decontamination of biological warfare agents by a microwave plasma torch

    International Nuclear Information System (INIS)

    Lai, Wilson; Lai, Henry; Kuo, Spencer P.; Tarasenko, Olga; Levon, Kalle

    2005-01-01

    A portable arc-seeded microwave plasma torch running stably with airflow is described and applied for the decontamination of biological warfare agents. Emission spectroscopy of the plasma torch indicated that this torch produced an abundance of reactive atomic oxygen that could effectively oxidize biological agents. Bacillus cereus was chosen as a simulant of Bacillus anthracis spores for biological agent in the decontamination experiments. Decontamination was performed with the airflow rate of 0.393 l/s, corresponding to a maximum concentration of atomic oxygen produced by the torch. The experimental results showed that all spores were killed in less than 8 s at 3 cm distance, 12 s at 4 cm distance, and 16 s at 5 cm distance away from the nozzle of the torch

  7. [Cutaneous and systemic toxicology of vesicants used in warfare].

    Science.gov (United States)

    Pita, R; Vidal-Asensi, S

    2010-01-01

    Vesicants are a group of chemicals used in warfare. The most representative agent is yperite, also known as mustard gas. The blisters that appeared on those exposed to yperite during combat in the First World War are responsible for the current name--vesicants--for this group of chemicals. Their affects are produced mainly through localized action of liquid or vapor forms on the skin, eyes, and respiratory tract. However, the high absorption of the liquid form through the skin or the vapor form on inhalation may cause substantial systemic effects. Here we analyze these effects, treatment of intoxication, and long-term sequelae, drawing on our experience and a review of the literature.

  8. An overview of South African psychology.

    Science.gov (United States)

    Cooper, Saths; Nicholas, Lionel

    2012-01-01

    This overview of psychology in South Africa presents a concise and historical account of its science and practice, from its early origins in the late nineteenth century to the present, and traces seminal influences on the discipline. It is a review of how psychology in South Africa developed over more than a century to become one of the most popular subjects in universities and an established and recognized profession, whose members play a variety of roles in the South African polity and larger society. The impact that apartheid racism had on key aspects of psychology's development is traversed, and the influences that previous ruling party politics had on professional psychological organizations are delineated. The unification of psychology under the Psychological Society of South Africa, a few months before the advent of democracy in South Africa, is explicated. The protection of the title of psychologist in law and certain other changes in the legislative environment, enabling a greater role for psychologists, are reported. The primary research sites for psychology and its funding and the main university psychology programs are described, as are the requirements for registration and licensure. The genesis and the importance of the work of internationally acclaimed South African psychologists, such as J. Wolpe and A. A. Lazarus, are contextualized. With the increased participation of progressive black psychologists in leadership and research in the past two decades, a transformed psychology has the potential to play a significant role in addressing human issues confronting South Africa.

  9. An Open Architecture Framework for Electronic Warfare Based Approach to HLA Federate Development

    Directory of Open Access Journals (Sweden)

    HyunSeo Kang

    2018-01-01

    Full Text Available A variety of electronic warfare models are developed in the Electronic Warfare Research Center. An Open Architecture Framework for Electronic Warfare (OAFEw has been developed for reusability of various object models participating in the electronic warfare simulation and for extensibility of the electronic warfare simulator. OAFEw is a kind of component-based software (SW lifecycle management support framework. This OAFEw is defined by six components and ten rules. The purpose of this study is to construct a Distributed Simulation Interface Model, according to the rules of OAFEw, and create Use Case Model of OAFEw Reference Conceptual Model version 1.0. This is embodied in the OAFEw-FOM (Federate Object Model for High-Level Architecture (HLA based distributed simulation. Therefore, we design and implement EW real-time distributed simulation that can work with a model in C++ and MATLAB API (Application Programming Interface. In addition, OAFEw-FOM, electronic component model, and scenario of the electronic warfare domain were designed through simple scenarios for verification, and real-time distributed simulation between C++ and MATLAB was performed through OAFEw-Distributed Simulation Interface.

  10. A Survey of Game Theoretic Approaches to Modelling Decision-Making in Information Warfare Scenarios

    Directory of Open Access Journals (Sweden)

    Kathryn Merrick

    2016-07-01

    Full Text Available Our increasing dependence on information technologies and autonomous systems has escalated international concern for information- and cyber-security in the face of politically, socially and religiously motivated cyber-attacks. Information warfare tactics that interfere with the flow of information can challenge the survival of individuals and groups. It is increasingly important that both humans and machines can make decisions that ensure the trustworthiness of information, communication and autonomous systems. Subsequently, an important research direction is concerned with modelling decision-making processes. One approach to this involves modelling decision-making scenarios as games using game theory. This paper presents a survey of information warfare literature, with the purpose of identifying games that model different types of information warfare operations. Our contribution is a systematic identification and classification of information warfare games, as a basis for modelling decision-making by humans and machines in such scenarios. We also present a taxonomy of games that map to information warfare and cyber crime problems as a precursor to future research on decision-making in such scenarios. We identify and discuss open research questions including the role of behavioural game theory in modelling human decision making and the role of machine decision-making in information warfare scenarios.

  11. Using cheminformatics to find simulants for chemical warfare agents

    Energy Technology Data Exchange (ETDEWEB)

    Lavoie, J.; Srinivasan, Sree [Molecular Sciences and Engineering Team, U.S. Army Natick Soldier Research, Development and Engineering Center, 15 Kansas Street, Natick, MA 01760 (United States); Nagarajan, R., E-mail: Ramanathan.Nagarajan@us.army.mil [Molecular Sciences and Engineering Team, U.S. Army Natick Soldier Research, Development and Engineering Center, 15 Kansas Street, Natick, MA 01760 (United States)

    2011-10-30

    Highlights: {yields} Summary of chemical warfare agent (CWA) simulants in current use. {yields} Application of method of molecular similarity to CWA and simulants. {yields} Quantitative metric for CWA-simulant similarity. {yields} Rank ordering of simulants in current use. {yields} Potential of method to identify simulants for emerging agents. - Abstract: Direct experimentation with chemical warfare agents (CWA) to study important problems such as their permeation across protective barrier materials, decontamination of equipment and facilities, or the environmental transport and fate of CWAs is not feasible because of the obvious toxicity of the CWAs and associated restrictions on their laboratory use. The common practice is to use 'simulants,' namely, analogous chemicals that closely resemble the CWAs but are less toxic, with the expectation that the results attained for simulants can be correlated to how the CWAs would perform. Simulants have been traditionally chosen by experts, by means of intuition, using similarity in one or more physical properties (such as vapor pressure or aqueous solubility) or in the molecular structural features (such as functional groups) between the stimulant and the CWA. This work is designed to automate the simulant identification process backed by quantitative metrics, by means of chemical similarity search software routinely used in pharmaceutical drug discovery. The question addressed here is: By the metrics of such software, how similar are traditional simulants to CWAs? That is, what is the numerical 'distance' between each CWA and its customary simulants in the quantitative space of molecular descriptors? The answers show promise for finding close but less toxic simulants for the ever-increasing numbers of CWAs objectively and fast.

  12. Using cheminformatics to find simulants for chemical warfare agents

    International Nuclear Information System (INIS)

    Lavoie, J.; Srinivasan, Sree; Nagarajan, R.

    2011-01-01

    Highlights: → Summary of chemical warfare agent (CWA) simulants in current use. → Application of method of molecular similarity to CWA and simulants. → Quantitative metric for CWA-simulant similarity. → Rank ordering of simulants in current use. → Potential of method to identify simulants for emerging agents. - Abstract: Direct experimentation with chemical warfare agents (CWA) to study important problems such as their permeation across protective barrier materials, decontamination of equipment and facilities, or the environmental transport and fate of CWAs is not feasible because of the obvious toxicity of the CWAs and associated restrictions on their laboratory use. The common practice is to use 'simulants,' namely, analogous chemicals that closely resemble the CWAs but are less toxic, with the expectation that the results attained for simulants can be correlated to how the CWAs would perform. Simulants have been traditionally chosen by experts, by means of intuition, using similarity in one or more physical properties (such as vapor pressure or aqueous solubility) or in the molecular structural features (such as functional groups) between the stimulant and the CWA. This work is designed to automate the simulant identification process backed by quantitative metrics, by means of chemical similarity search software routinely used in pharmaceutical drug discovery. The question addressed here is: By the metrics of such software, how similar are traditional simulants to CWAs? That is, what is the numerical 'distance' between each CWA and its customary simulants in the quantitative space of molecular descriptors? The answers show promise for finding close but less toxic simulants for the ever-increasing numbers of CWAs objectively and fast.

  13. Law Enforcement Locations

    Data.gov (United States)

    Kansas Data Access and Support Center — Law Enforcement Locations in Kansas Any location where sworn officers of a law enforcement agency are regularly based or stationed. Law enforcement agencies "are...

  14. Psychological barriers

    DEFF Research Database (Denmark)

    Skinner, T. C.

    2004-01-01

    Type 2 diabetes treatment outcomes ultimately depend on patients and their ability to make long-term behavioural changes that support good self-care and metabolic control. Patients' perceptions about diabetes and diabetes-related complications can have a strong influence on their emotional well...... of lifestyle changes and pharmacological therapy in preventing future complications. Negative emotions and preconceptions about treatment can also discourage adherence to treatment plans. 'Psychological Insulin resistance' caused by fear and concerns about insulin and daily insulin injections can discourage...... many patients from starting insulin therapy, even if oral agents have failed. Depression, stress and anxiety represent further obstacles to optimum self-care and the attainment of glucose goals. Healthcare professionals should endeavour to understand and accommodate these issues when setting personal...

  15. Fate of chemical warfare agents and toxic industrial chemicals in landfills.

    Science.gov (United States)

    Bartelt-Hunt, Shannon L; Barlaz, Morton A; Knappe, Detlef R U; Kjeldsen, Peter

    2006-07-01

    One component of preparedness for a chemical attack is planning for the disposal of contaminated debris. To assess the feasibility of contaminated debris disposal in municipal solid waste (MSW) landfills, the fate of selected chemical warfare agents (CWAs) and toxic industrial chemicals (TICs) in MSW landfills was predicted with a mathematical model. Five blister agents [sulfur mustard (HD), nitrogen mustard (HN-2), lewisite (L), ethyldichloroarsine (ED), and phosgene oxime (CX)], eight nerve agents [tabun (GA), sarin (GB), soman (GD), GE, GF, VX, VG, and VM], one riot-control agent [CS], and two TICs [furan and carbon disulfide] were studied. The effects of both infiltration (climate) and contaminant biodegradability on fate predictions were assessed. Model results showed that hydrolysis and gas-phase advection were the principal fate pathways for CWAs and TICs, respectively. Apart from CX and the TICs, none of the investigated compounds was predicted to persist in a landfill for more than 5 years. Climate had little impact on CWA/TIC fate, and biodegradability was only important for compounds with long hydrolysis half-lives. Monte Carlo simulations were performed to assess the influence of uncertainty in model input parameters on CWA/TIC fate predictions. Correlation analyses showed that uncertainty in hydrolysis rate constants was the primary contributor to variance of CWA fate predictions, while uncertainty in the Henry's Law constant and landfill gas-production rate accounted for most of the variance of TIC fate predictions. CWA hydrolysates were more persistent than the parent CWAs, but limited information is available on abiotic or biotic transformation rates for these chemicals.

  16. Tenancy Law Denmark

    DEFF Research Database (Denmark)

    Edlund, Hans Henrik

    2003-01-01

    Report on Danish Tenancy Law. Contribution to a research project co-financed by the Grotius Programme for Judicial Co-Operation in Civil Matters. http://www.iue.it/LAW/ResearchTeaching/EuropeanPrivateLaw/Projects.shtml......Report on Danish Tenancy Law. Contribution to a research project co-financed by the Grotius Programme for Judicial Co-Operation in Civil Matters. http://www.iue.it/LAW/ResearchTeaching/EuropeanPrivateLaw/Projects.shtml...

  17. School Psychological Services and Program Evaluation

    Science.gov (United States)

    MacGregor, Mary Jo, Ed.

    1972-01-01

    A variety of court decisions and laws relevant to malpractice and liability of school psychologists are presented. Terms are defined and examples of faulty psychological testing, defamation, withholding information, and inferred imcompetence are provided. Suggestions regarding litigation and legal defenses are made and issues related to…

  18. Case law

    International Nuclear Information System (INIS)

    Anon.

    2008-01-01

    The first point concerns the judgement of the federal Administration Court on the standing of third parties regarding attacks at interim storage facilities (2008). In its judgement handed down on 10. april 2008, the german Federal Administrative Court overrules a decision of a Higher Regional Administrative Court and declares that residents in the vicinity of an interim storage facility may challenge the licence for that facility on the grounds that the necessary protection has not been provided against disruptive action or other interference by third parties. The second point concerns the judgement of the European Court of justice of a member State to fulfill obligations under directive 96/29 EURATOM (2007): the united kingdom imposed to intervene only if a situation of radioactive contamination results from a present or past activity for the exercise of which a licence was granted. The national legislation does not oblige the authorities to take measures in circumstances in which radioactive contamination results from a past practice which was not the subject of a such licence. The United Kingdom Government admitted the validity of the Commission claims adding that further legislation to transpose that article (article 53) into national laws is in the process of being drawn up. The third point is relative to judgement of the US court of Appeals on licensing of the L.E.S. uranium enrichment facility (2007), on appeal to the Federal Court of Appeals for the district of Columbia, the joint petitioners objected to the Nuclear regulatory Commission (NRC) issuing to the Louisiana Energy Services, L.P. (L.E.S.) Uranium enrichment Facility in New Mexico on several grounds: the NRC violated the Atomic Energy Act by supplementing the environmental impact statement after hearing closed; the NRC violated the National Environmental Policy Act by insufficiently analysing the environmental impact of depleted uranium waste from the L.E.S. facility; the NRC violated the Atomic

  19. The Legal Content of School Psychology Journals: A Systematic Survey

    Science.gov (United States)

    Zaheer, Imad; Zirkel, Perry A.

    2014-01-01

    The many challenges that school psychologists face inevitably include legal issues. In light of the agreement between the two primary professional organizations for school psychologists that understanding of law is a critical competency, this study analyzed the extent of law-based articles in leading school psychology journal articles published…

  20. Psychology and Gender.

    Science.gov (United States)

    Henley, Nancy M.

    1985-01-01

    Considers recent efforts within the field of psychology to understand issues involving gender. Demonstrates patterns of development within feminist psychology and its relation to mainstream psychology. Examines status of the field, two case studies, and new research. (Author/SA)

  1. The Abbott and Costello Effect: Who's on What, and What's Where When? A Human-Centered Method to Investigate Network Centric Warfare Systems

    National Research Council Canada - National Science Library

    Reed, Derek W

    2007-01-01

    ...), fundamentally changing how warfare is being conducted. Network centric warfare (NCW) systems are being rushed to the field and are offered as a solution for the fog of war and as a way to reduce manpower costs...

  2. Psychiatric/ psychological forensic report writing.

    Science.gov (United States)

    Young, Gerald

    Approaches to forensic report writing in psychiatry, psychology, and related mental health disciplines have moved from an organization, content, and stylistic framework to considering ethical and other codes, evidentiary standards, and practice considerations. The first part of the article surveys different approaches to forensic report writing, including that of forensic mental health assessment and psychiatric ethics. The second part deals especially with psychological ethical approaches. The American Psychological Association's Ethical Principles and Code of Conduct (2002) provide one set of principles on which to base forensic report writing. The U.S. Federal Rules of Evidence (2014) and related state rules provide another basis. The American Psychological Association's Specialty Guidelines for Forensic Psychology (2013) provide a third source. Some work has expanded the principles in ethics codes; and, in the third part of this article, these additions are applied to forensic report writing. Other work that could help with the question of forensic report writing concerns the 4 Ds in psychological injury assessments (e.g., conduct oneself with Dignity, avoid the adversary Divide, get the needed reliable Data, Determine interpretations and conclusions judiciously). One overarching ethical principle that is especially applicable in forensic report writing is to be comprehensive, scientific, and impartial. As applied to forensic report writing, the overall principle that applies is that the work process and product should reflect integrity in its ethics, law, and science. Four principles that derive from this meta-principle concern: Competency and Communication; Procedure and Protection; Dignity and Distance; and Data Collection and Determination. The standards or rules associated with each of these principles are reviewed. Crown Copyright © 2016. Published by Elsevier Ltd. All rights reserved.

  3. Psychology Ethics in Introductory Psychology Textbooks

    Science.gov (United States)

    Zucchero, Renee' A.

    2011-01-01

    Previous research revealed that introductory psychology textbooks included limited information about psychology ethics. This study reviewed 48 current introductory psychology textbooks for research and other APA ethics content. These textbooks included slightly more total ethics content and were more thorough in their review of research ethics…

  4. 信息化战争中的心理战研究与运用%Psychological Warfare Research and Application in Information Warfare

    Institute of Scientific and Technical Information of China (English)

    高鹏

    2010-01-01

    在信息化战争条件下,以心理战为目的的信息心理战已成为战争之上的战争.心理战作为一种独立的作战样式,在信息化条件下与过去冷热时代相比具有鲜明的时代特征.因此,必须注重研究信息战条件下开展心理战的方法和手段以及信息战条件下心理战的运用与对策,才能在信息化作战中发挥心理战的作用.

  5. Democratic contract law

    NARCIS (Netherlands)

    Hesselink, M.W.

    2015-01-01

    This article discusses the normative relationship between contract law and democracy. In particular, it argues that in order to be legitimate contract law needs to have a democratic basis. Private law is not different in this respect from public law. Thus, the first claim made in this article will

  6. Investigating Coulomb's Law.

    Science.gov (United States)

    Noll, Ellis; Koehlinger, Mervin; Kowalski, Ludwik; Swackhamer, Gregg

    1998-01-01

    Describes the use of a computer-linked camera to demonstrate Coulomb's law. Suggests a way of reducing the difficulties in presenting Coulomb's law by teaching the inverse square law of gravity and the inverse square law of electricity in the same unit. (AIM)

  7. Teaching Human Rights Law.

    Science.gov (United States)

    Berman, Howard R.

    1985-01-01

    The international community has developed a system of human rights law relevant to many areas of legal encounter, which American law schools have been slow to incorporate into curricula. Teaching human rights law provides an opportunity for law schools to enrich the learning process and contribute creatively to the respect for rights in society.…

  8. Tax Law System

    Science.gov (United States)

    Tsindeliani, Imeda A.

    2016-01-01

    The article deals with consideration of the actual theoretic problems of the subject and system of tax law in Russia. The theoretical approaches to determination of the nature of separate institutes of tax law are represented. The existence of pandect system intax law building as financial law sub-branch of Russia is substantiated. The goal of the…

  9. Law across nations

    DEFF Research Database (Denmark)

    of participants keen to work together to promote research and policy development in such a lively forum." - Professor Steve Saxby PhD, Cert Ed., MBCS Professor of IT Law and Public Policy, Solicitor, Deputy Head of School (Research), Faculty of Business and Law, University of Southampton, Editor...... not only the original themes of Legal, Security and Privacy Issues in IT Law and International Law and Trade but more recently two new conferences on International Public and Private Law. The papers in this volume then represent the contributions to all these fields and reflect the strong desire......-in-Chief, The Computer Law & Security Review - The International Journal of Technology Law and Practice (Elsevier), www.elsevier.com/locate/clsr, Editor, The Encyclopedia of Information Technology Law (Sweet & Maxwell), Director ILAWS - Institute for Law and the Web - School of Law, Southampton University, www...

  10. International Investment Law and EU Law

    DEFF Research Database (Denmark)

    regional economic integration agreements, International Competition Law, International Investment Regulation, International Monetary Law, International Intellectual Property Protection and International Tax Law. In addition to the regular annual volumes, EYIEL Special Issues routinely address specific...... current topics in International Economic Law. The entry into force of the Lisbon Treaty entails sweeping changes with respect to foreign investment regulation. Most prominently, the Treaty on the Functioning of the European Union (TFEU) now contains in its Article 207 an explicit competence...... for the regulation of foreign direct investment as part of the Common Commercial Policy (CCP) chapter. With this new competence, the EU will become an important actor in the field of international investment politics and law. The new empowerment in the field of international investment law prompts a multitude...

  11. Property law in Jersey

    OpenAIRE

    MacLeod, Rebecca Frances

    2012-01-01

    Jersey law, and within it Jersey property law, has received little academic attention. This thesis seeks to examine, and provide a systematic account of, the Jersey law of property. Specific aspects of substantive law are explored. From these, general observations about the nature and structure of property law are made. Unsurprisingly, given the small size of the island, Jersey has a relatively limited amount of indigenous legal material to offer, much of it in French. Inevitab...

  12. EU Labour Law

    DEFF Research Database (Denmark)

    Nielsen, Ruth

    The focus in this book is upon EU labour law and its interaction with national and international labour law. The book provides an analysis of the framework and sources of European labour law. It covers a number of substantive topics, notably collective labour law, individual employment contracts......, discrimination on grounds of sex and on other grounds, free movement of persons, restructuring of enterprises, working environment and enforcement of rights derived from EU labour law....

  13. Europeanisation of private law and English law

    OpenAIRE

    Beale, Hugh

    2003-01-01

    To what extent is English Private Law being affected by the United Kingdom’s membership of the European Union? I think we can try to answer this at three levels: (i) The United Kingdom’s compliance with EU legislation; (ii) the influence of European ideas on English Private Law; (iii) the attitude in England towards greater harmonisation or possible unification of European Private Law

  14. Rain-Induced Wash-Off of Chemical Warfare Agent (VX) from Foliar Surfaces of Living Plants Maintained in a Surety Hood

    Science.gov (United States)

    2016-09-01

    RAIN-INDUCED WASH-OFF OF CHEMICAL WARFARE AGENT (VX) FROM FOLIAR SURFACES OF LIVING PLANTS MAINTAINED IN A...Final 3. DATES COVERED (From - To) May 2014 – Sep 2015 4. TITLE AND SUBTITLE Rain-Induced Wash-Off of Chemical Warfare Agent (VX) from Foliar...galli Foliage Chemical warfare agent (CWA) O-ethyl-S-(2

  15. Potential Science and Technology Game Changers for the Ground Warfare of 2050: Selected Projections Made in 2017

    Science.gov (United States)

    2018-02-01

    ARL-TR-8283 ● FEB 2018 US Army Research Laboratory Potential Science and Technology Game Changers for the Ground Warfare of 2050...Science and Technology Game Changers for the Ground Warfare of 2050: Selected Projections Made in 2017 by Alexander Kott Office of the Director...Brian Sadler Vehicle Technology Directorate, ARL Ananthram Swami Computational and Information Sciences Directorate, ARL Approved for

  16. Mainstreaming Culture in Psychology

    Science.gov (United States)

    Cheung, Fanny M.

    2012-01-01

    Despite the "awakening" to the importance of culture in psychology in America, international psychology has remained on the sidelines of psychological science. The author recounts her personal and professional experience in tandem with the stages of development in international/cross-cultural psychology. Based on her research in cross-cultural…

  17. Naval Undersea Warfare Center Division Newport utilities metering, Phase 1

    Energy Technology Data Exchange (ETDEWEB)

    Carroll, D.M.

    1992-11-01

    Pacific Northwest Laboratory developed this report for the US Navy`s Naval Undersea Warfare Center Division Newport, Rhode Island (NUWC). The purpose of the report was to review options for metering electricity and steam used in the NUWC compound, and to make recommendations to NUWC for implementation under a follow-on project. An additional NUWC concern is a proposed rate change by the servicing utility, Newport Electric, which would make a significant shift from consumption to demand billing, and what effect that rate change would have on the NUWC utility budget. Automated, remote reading meters are available which would allow NUWC to monitor its actual utility consumption and demand for both the entire NUWC compound and by end-use in individual buildings. Technology is available to perform the meter reads and manipulate the data using a personal computer with minimal staff requirement. This is not meant to mislead the reader into assuming that there is no requirement for routine preventive maintenance. All equipment requires routine maintenance to maintain its accuracy. While PNL reviewed the data collected during the site visit, however, it became obvious that significant opportunities exist for reducing the utility costs other than accounting for actual consumption and demand. Unit costs for both steam and electricity are unnecessarily high, and options are presented in this report for reducing them. Additionally, NUWC has an opportunity to undertake a comprehensive energy resource management program to significantly reduce its energy demand, consumption, and costs.

  18. Naval Undersea Warfare Center Division Newport utilities metering, Phase 1

    Energy Technology Data Exchange (ETDEWEB)

    Carroll, D.M.

    1992-11-01

    Pacific Northwest Laboratory developed this report for the US Navy's Naval Undersea Warfare Center Division Newport, Rhode Island (NUWC). The purpose of the report was to review options for metering electricity and steam used in the NUWC compound, and to make recommendations to NUWC for implementation under a follow-on project. An additional NUWC concern is a proposed rate change by the servicing utility, Newport Electric, which would make a significant shift from consumption to demand billing, and what effect that rate change would have on the NUWC utility budget. Automated, remote reading meters are available which would allow NUWC to monitor its actual utility consumption and demand for both the entire NUWC compound and by end-use in individual buildings. Technology is available to perform the meter reads and manipulate the data using a personal computer with minimal staff requirement. This is not meant to mislead the reader into assuming that there is no requirement for routine preventive maintenance. All equipment requires routine maintenance to maintain its accuracy. While PNL reviewed the data collected during the site visit, however, it became obvious that significant opportunities exist for reducing the utility costs other than accounting for actual consumption and demand. Unit costs for both steam and electricity are unnecessarily high, and options are presented in this report for reducing them. Additionally, NUWC has an opportunity to undertake a comprehensive energy resource management program to significantly reduce its energy demand, consumption, and costs.

  19. Simulation-based planning for theater air warfare

    Science.gov (United States)

    Popken, Douglas A.; Cox, Louis A., Jr.

    2004-08-01

    Planning for Theatre Air Warfare can be represented as a hierarchy of decisions. At the top level, surviving airframes must be assigned to roles (e.g., Air Defense, Counter Air, Close Air Support, and AAF Suppression) in each time period in response to changing enemy air defense capabilities, remaining targets, and roles of opposing aircraft. At the middle level, aircraft are allocated to specific targets to support their assigned roles. At the lowest level, routing and engagement decisions are made for individual missions. The decisions at each level form a set of time-sequenced Courses of Action taken by opposing forces. This paper introduces a set of simulation-based optimization heuristics operating within this planning hierarchy to optimize allocations of aircraft. The algorithms estimate distributions for stochastic outcomes of the pairs of Red/Blue decisions. Rather than using traditional stochastic dynamic programming to determine optimal strategies, we use an innovative combination of heuristics, simulation-optimization, and mathematical programming. Blue decisions are guided by a stochastic hill-climbing search algorithm while Red decisions are found by optimizing over a continuous representation of the decision space. Stochastic outcomes are then provided by fast, Lanchester-type attrition simulations. This paper summarizes preliminary results from top and middle level models.

  20. Back to the future: aerial warfare in Libya

    Directory of Open Access Journals (Sweden)

    João Paulo Nunes Vicente

    2013-05-01

    Full Text Available A century after the first air bomb mission, a new intervention in the same geographic space has made evident the changes in Airpower. The Aerial Warfare in Libya has radically changed the civil war, complying with a UN mission to protect Libyan population, imposing a no-fly zone and an arms embargo. Therefore, Operation Unified Protector became one of the most successful campaigns in the history of NATO. We aim to assess the operational efficiency of Airpower in the conflict in Libya, focusing on the challenges of a War essentially Aerial. Despite the military results and the fact that some political objectives were met, we can identify some concerning trends that, if not shifted, may negatively influence future NATO operations. We do not aim to draw general and universal conclusions on the strategic value of Airpower based on the analysis of a specific case. Above all, we focus on identifying some lessons which have influenced OUP operational efficiency. Thus, we must analyze some factors, such as the scope of objectives, the type of opposing action and aerial strategy used by the coalition and then focus on the challenges arising from the OUP.

  1. Drone Warfare: Twenty-First Century Empire and Communications

    Directory of Open Access Journals (Sweden)

    Kevin Howley

    2017-02-01

    Full Text Available This paper, part of a larger project that examines drones from a social-construction of technology perspective, considers drone warfare in light of Harold Innis’s seminal work on empire and communication. Leveraging leading-edge aeronautics with advanced optics, data processing, and networked communication, drones represent an archetypal “space-biased” technology. Indeed, by allowing remote operators and others to monitor, select, and strike targets from half a world away, and in real-time, these weapon systems epitomize the “pernicious neglect of time” Innis sought to identify and remedy in his later writing. With Innis’s time-space dialectic as a starting point, then, the paper considers drones in light of a longstanding paradox of American culture: the impulse to collapse the geographical distance between the United States and other parts of the globe, while simultaneously magnifying the cultural difference between Americans and other peoples and societies. In the midst of the worldwide proliferation of drones, this quintessentially sublime technology embodies this (disconnect in important, profound, and ominous ways.

  2. Prevalence of Asthma in Children of Chemical Warfare Victims

    Science.gov (United States)

    Mirsadraee, Majid; Mozaffari, Abolfazl; Attaran, Davood

    2011-01-01

    Objective Exposure of DNA to sulfur mustard gas may increase the inheritance of asthma in chemical warfare victims' (CWV) offspring. The objective of this study was to determine the prevalence of asthma in children of CWV and compare it to asthmatic children in the general population. Methods Four hundred and nine children from 130 CWV fathers and 440 children from 145 asthmatic parents from two cities in Iran participated in this study. The prevalence of asthma was determined by standard questionnaire released for epidemiological survey of asthma in children and compared between two groups. Findings The prevalence of asthma in the CWV group was 15%; this was not significantly different from the control group (12.5%). The children of the CWV group reported a significantly greater incidence of wheezing (1.2±3.1 attacks) per year, but the control group reported more severe attacks leading to speech difficulties (3%) and coughing (7%). Regression analysis showed that with increasing family size in the control group, the number of subjects suffering from asthmatic symptoms decreases significantly (r=0.86, P=0.001). Conclusion Chemical agents may increase the prevalence of asthma in the offspring of CWV. PMID:23056804

  3. Studies on residue-free decontaminants for chemical warfare agents.

    Science.gov (United States)

    Wagner, George W

    2015-03-17

    Residue-free decontaminants based on hydrogen peroxide, which decomposes to water and oxygen in the environment, are examined as decontaminants for chemical warfare agents (CWA). For the apparent special case of CWA on concrete, H2O2 alone, without any additives, effectively decontaminates S-2-(diisopropylamino)ethyl O-ethyl methylphosphonothioate (VX), pinacolyl methylphosphorofluoridate (GD), and bis(2-choroethyl) sulfide (HD) in a process thought to involve H2O2 activation by surface-bound carbonates/bicarbonates (known H2O2 activators for CWA decontamination). A plethora of products are formed during the H2O2 decontamination of HD on concrete, and these are characterized by comparison to synthesized authentic compounds. As a potential residue-free decontaminant for surfaces other than concrete (or those lacking adsorbed carbonate/bicarbonate) H2O2 activation for CWA decontamination is feasible using residue-free NH3 and CO2 as demonstrated by reaction studies for VX, GD, and HD in homogeneous solution. Although H2O2/NH3/CO2 ("HPAC") decontaminants are active for CWA decontamination in solution, they require testing on actual surfaces of interest to assess their true efficacy for surface decontamination.

  4. LAW OCRACY ELOPMENT LAW DEMOCRACY & DEVELOPMENT

    African Journals Online (AJOL)

    HP27975994114

    head of traditional central government, the headman was the head of the ward, and the family head exercised leadership at family level.13 Accordingly, the nature of traditional governance in South Africa was that of an unspecialised legal system where the king or chief was creator of laws, the executor of laws and the judge ...

  5. RUSSIAN LAW SUBJECTS

    Directory of Open Access Journals (Sweden)

    D.N. Bakhrakh

    2006-03-01

    Full Text Available The question about the subjects of law branches is concerning the number of most important and difficult in law science. Its right decision influences on the subject of law regulation, precise definition of addressees of law norms, the volume of their rights and duties, the limits of action of norms of Main part of the branch, its principles. Scientific investigations, dedicated to law subjects system, promote the development of recommendations for the legislative and law applying activity; they are needed for scientific work organization and student training, for preparing qualified lawyers.

  6. Broad-Spectrum Liquid- and Gas-Phase Decontamination of Chemical Warfare Agents by One-Dimensional Heteropolyniobates.

    Science.gov (United States)

    Guo, Weiwei; Lv, Hongjin; Sullivan, Kevin P; Gordon, Wesley O; Balboa, Alex; Wagner, George W; Musaev, Djamaladdin G; Bacsa, John; Hill, Craig L

    2016-06-20

    A wide range of chemical warfare agents and their simulants are catalytically decontaminated by a new one-dimensional polymeric polyniobate (P-PONb), K12 [Ti2 O2 ][GeNb12 O40 ]⋅19 H2 O (KGeNb) under mild conditions and in the dark. Uniquely, KGeNb facilitates hydrolysis of nerve agents Sarin (GB) and Soman (GD) (and their less reactive simulants, dimethyl methylphosphonate (DMMP)) as well as mustard (HD) in both liquid and gas phases at ambient temperature and in the absence of neutralizing bases or illumination. Three lines of evidence establish that KGeNb removes DMMP, and thus likely GB/GD, by general base catalysis: a) the k(H2 O)/k(D2 O) solvent isotope effect is 1.4; b) the rate law (hydrolysis at the same pH depends on the amount of P-PONb present); and c) hydroxide is far less active against the above simulants at the same pH than the P-PONbs themselves, a critical control experiment. © 2016 WILEY-VCH Verlag GmbH & Co. KGaA, Weinheim.

  7. Detection of biological warfare agents using ultra violet-laser induced fluorescence LIDAR.

    Science.gov (United States)

    Joshi, Deepti; Kumar, Deepak; Maini, Anil K; Sharma, Ramesh C

    2013-08-01

    This review has been written to highlight the threat of biological warfare agents, their types and detection. Bacterial biological agent Bacillus anthracis (bacteria causing the disease anthrax) which is most likely to be employed in biological warfare is being discussed in detail. Standoff detection of biological warfare agents in aerosol form using Ultra violet-Laser Induced Fluorescence (UV-LIF) spectroscopy method has been studied. Range-resolved detection and identification of biological aerosols by both nano-second and non-linear femto-second LIDAR is also discussed. Calculated received fluorescence signal for a cloud of typical biological agent Bacillus globigii (Simulants of B. anthracis) at a location of ~5.0 km at different concentrations in presence of solar background radiation has been described. Overview of current research efforts in internationally available working UV-LIF LIDAR systems are also mentioned briefly. Copyright © 2013 Elsevier B.V. All rights reserved.

  8. The United States and biological warfare: secrets from the early cold war and Korea.

    Science.gov (United States)

    Bruwer, A

    2001-01-01

    The United States and Biological Warfare is about accusations that the United States resorted to bacteriological warfare at a time of great military stress during the Korean War. In December 1951, the then US Secretary of Defense ordered early readiness for offensive use of biological weapons. Soon afterwards, the North Korean and Chinese armies accused the United States of starting a large-scale biological warfare experiment in Korea. The US State Department denied the accusation. Both parties to the dispute maintain their positions today. The authors spent 20 years researching the accusations in North America, Europe and Japan. They were the first foreigners to be given access to Chinese classified documents. The reader is also introduced to the concept of 'plausible denial', an official US policy which allowed responsible governmental representatives to deny knowledge of certain events. The authors hope that their work will contribute to the understanding of a time when modern war expanded into a new type of violence.

  9. SiGe-based re-engineering of electronic warfare subsystems

    CERN Document Server

    Lambrechts, Wynand

    2017-01-01

    This book equips readers with a thorough understanding of the applicability of new-generation silicon-germanium (SiGe) electronic subsystems for the military purposes of electronic warfare and defensive countermeasures. The theoretical and technical background is extensively explained and all aspects of the integration of SiGe as an enabling technology for maritime, land, and airborne (including space) electronic warfare are addressed, including research, design, development, and implementation. The coverage is supported by mathematical derivations, informative illustrations, practical examples, and case studies. While SiGe technology provides speed, performance, and price advantages in many markets, sharing of information on its use in electronic warfare systems has to date been limited, especially in developing nations. This book will therefore be warmly welcomed as an engineering guideline that focuses especially on the speed and reliability of current-generation SiGe circuits and highlights emerging innov...

  10. THE CYBER DIMENSION OF MODERN HYBRID WARFARE AND ITS RELEVANCE FOR NATO

    Directory of Open Access Journals (Sweden)

    Sorin DUCARU

    2016-06-01

    Full Text Available The technological development and the instant communication possibilities advanced not only economic and social developments, but also evolving threats from those who exploit the vulnerabilities of communication and information systems. The cyber threat landscape points to a significant increase of the frequency, intensity, duration and sophistication of cyber-attacks. One of the new and concerning trends is the use of cyber capabilities in relation with military of hybrid operations – the so-called cyber dimension of hybrid warfare. NATO’s strategy on countering hybrid warfare is based on the triad: prepare-deter-defend, which also applies to cyber. Nations represent the first line of defence in countering hybrid strategies. International cooperation is also a key factor in this sense. It is in this context that NATO’s response to cyber-attacks in the context of hybrid warfare must be further refined.

  11. An evolutionary theory of large-scale human warfare: Group-structured cultural selection.

    Science.gov (United States)

    Zefferman, Matthew R; Mathew, Sarah

    2015-01-01

    When humans wage war, it is not unusual for battlefields to be strewn with dead warriors. These warriors typically were men in their reproductive prime who, had they not died in battle, might have gone on to father more children. Typically, they are also genetically unrelated to one another. We know of no other animal species in which reproductively capable, genetically unrelated individuals risk their lives in this manner. Because the immense private costs borne by individual warriors create benefits that are shared widely by others in their group, warfare is a stark evolutionary puzzle that is difficult to explain. Although several scholars have posited models of the evolution of human warfare, these models do not adequately explain how humans solve the problem of collective action in warfare at the evolutionarily novel scale of hundreds of genetically unrelated individuals. We propose that group-structured cultural selection explains this phenomenon. © 2015 Wiley Periodicals, Inc.

  12. Changing the Scale and Efficiency of Chemical Warfare Countermeasure Discovery Using the Zebrafish

    Science.gov (United States)

    Peterson, Randall T.; MacRae, Calum A.

    2013-01-01

    As the scope of potential chemical warfare agents grows rapidly and as the diversity of potential threat scenarios expands with non-state actors, so a need for innovative approaches to countermeasure development has emerged. In the last few years, the utility of the zebrafish as a model organism that is amenable to high-throughput screening has become apparent and this system has been applied to the unbiased discovery of chemical warfare countermeasures. This review summarizes the in vivo screening approach that has been pioneered in the countermeasure discovery arena, and highlights the successes to date as well as the potential challenges in moving the field forward. Importantly, the establishment of a zebrafish platform for countermeasure discovery would offer a rapid response system for the development of antidotes to the continuous stream of new potential chemical warfare agents. PMID:24273586

  13. Equalizing Military and Civilian Law Enforcement Certification

    Science.gov (United States)

    2012-03-20

    an Active Shooter Lesson 2: Psychology of an Active Shooter Lesson 3: Physiological Stress of a Patrolman Lesson 4: Police Intelligence Fusion...MPs are migratory by nature and by mission, they require professional credentials regarding federal and state laws, the Uniform Code of Military...their preceding MP training or experience – for employment. For instance, the State of Louisiana POST Council stresses the following minimum training

  14. Skeletal evidence for Inca warfare from the Cuzco region of Peru.

    Science.gov (United States)

    Andrushko, Valerie A; Torres, Elva C

    2011-11-01

    This article addresses the bioarchaeological evidence for Inca warfare through an analysis of 454 adult skeletons from 11 sites in the Inca capital region of Cuzco, Peru. These 11 sites span almost 1000 years (AD 600-1532), which allows for a comparison of the evidence for warfare before the Inca came to power (Middle Horizon AD 600-1000), during the time of Inca ascendency in the Late Intermediate Period (AD 1000-1400), and after the Inca came to power and expanded throughout the Cuzco region and beyond (Inca Imperial Period, AD 1400-1532). The results indicate that 100 of 454 adults (22.0%) showed evidence of cranial trauma. Of these, 23 individuals had major cranial injuries suggestive of warfare, consisting of large, complete, and/or perimortem fractures. There was scant evidence for major injuries during the Middle Horizon (2.8%, 1/36) and Late Intermediate Period (2.5%, 5/199), suggesting that warfare was not prevalent in the Cuzco region before and during the Inca rise to power. Only in the Inca Imperial Period was there a significant rise in major injuries suggestive of warfare (7.8%, 17/219). Despite the significant increase in Inca times, the evidence for major cranial injuries was only sporadically distributed at Cuzco periphery sites and was entirely absent at Cuzco core sites. These findings suggest that while the Inca used warfare as a mechanism for expansion in the Cuzco region, it was only one part of a complex expansion strategy that included economic, political, and ideological means to gain and maintain control. Copyright © 2011 Wiley-Liss, Inc.

  15. Blaptica dubia as sentinels for exposure to chemical warfare agents - a pilot study.

    Science.gov (United States)

    Worek, Franz; Seeger, Thomas; Neumaier, Katharina; Wille, Timo; Thiermann, Horst

    2016-11-16

    The increased interest of terrorist groups in toxic chemicals and chemical warfare agents presents a continuing threat to our societies. Early warning and detection is a key component for effective countermeasures against such deadly agents. Presently available and near term solutions have a number of major drawbacks, e.g. lack of automated, remote warning and detection of primarily low volatile chemical warfare agents. An alternative approach is the use of animals as sentinels for exposure to toxic chemicals. To overcome disadvantages of vertebrates the present pilot study was initiated to investigate the suitability of South American cockroaches (Blaptica dubia) as warning system for exposure to chemical warfare nerve and blister agents. Initial in vitro experiments with nerve agents showed an increasing inhibitory potency in the order tabun - cyclosarin - sarin - soman - VX of cockroach cholinesterase. Exposure of cockroaches to chemical warfare agents resulted in clearly visible and reproducible reactions, the onset being dependent on the agent and dose. With nerve agents the onset was related to the volatility of the agents. The blister agent lewisite induced signs largely comparable to those of nerve agents while sulfur mustard exposed animals exhibited a different sequence of events. In conclusion, this first pilot study indicates that Blaptica dubia could serve as a warning system to exposure of chemical warfare agents. A cockroach-based system will not detect or identify a particular chemical warfare agent but could trigger further actions, e.g. specific detection and increased protective status. By designing appropriate boxes with (IR) motion sensors and remote control (IR) camera automated off-site warning systems could be realized. Copyright © 2016 Elsevier Ireland Ltd. All rights reserved.

  16. International Law Studies. The War in Iraq: A Legal Analysis. Violume 86

    Science.gov (United States)

    2010-01-01

    ment in the Security Council debates concerning Iraq on a "strict constructionist " approach to thejus ad bellum. That is, the strict limits on the use...discrimination solely on the ground of race, colour, sex, language, religion or social origin. 73. DlNSTEIN, supra note 41, at 72. 74. Thomas Buergenthal, To...Bacteriological Methods ofWarfare, June 17, 1925, 26 U.S.T. 571, T.I.A.S. 8061, reprinted in DOCUMENTS ON THE LAWS OF WAR, supra, at 158 (Iraq made statements

  17. Cognitive psychology and depth psychology backgrounds

    International Nuclear Information System (INIS)

    Fritzsche, A.F.

    1986-01-01

    The sixth chapter gives an insight into the risk perception process which is highly determined by emotions, and, thus, deals with the psychological backgrounds of both the conscious cognitive and the subconscious intuitive realms of the human psyche. The chapter deals with the formation of opinion and the origination of an attitude towards an issue; cognitive-psychological patterns of thinking from the field of risk perception; the question of man's rationality; pertinent aspects of group behaviour; depth psychological backgrounds of the fear of technology; the collective subconscious; nuclear energy as a preferred object of projection for various psychological problems of modern man. (HSCH) [de

  18. Recent Case Law

    DEFF Research Database (Denmark)

    Petz, Thomas; Sagaert, Vincent; Østergaard, Kim

    2004-01-01

    In this section authors from various European countries report the recent case law in their country on the field of private patrimonial law, that is decisions on the law of property, juridical acts, the law of obligations, contract law and prescription. The European Review of Private Law (ERPL......) started this section in 2003. The section aims to give our readers an overview of what is happening in the most recent European case law. We have asked the national reporters to report the juridical essence of the decisions given by the highest courts in their country. These national reports...... not relate the facts of the decision, nor the personal opinion of the reporter. One can find discussions on the most important decisions of European courts in ERPL’s case note section. The recent case law section gives overviews of decisions published in periods of four months. The period of January...

  19. By Law Established

    DEFF Research Database (Denmark)

    Christoffersen, Lisbet

    2017-01-01

    An analysis of the degree and content of statutory law regulation of Nordic Lutheran majority churches in 2017......An analysis of the degree and content of statutory law regulation of Nordic Lutheran majority churches in 2017...

  20. Civil Law Glossary.

    Science.gov (United States)

    Update on Law-Related Education, 1997

    1997-01-01

    Presents a glossary of civil law terms originally compiled for journalists by the American Bar Association. Defines many essential civil law concepts and practices including compensatory damages, jurisdiction, motion to dismiss, discovery, and remedy. (MJP)

  1. Community Notification Laws

    National Research Council Canada - National Science Library

    Speck, Michael B

    2007-01-01

    .... Furthermore, a false sense of security and reductions in incest reporting continue to victimize children, which results in further sex offender laws passed by legislatures without empirical data supporting such laws...

  2. Themes in nuclear law

    International Nuclear Information System (INIS)

    2003-01-01

    The nuclear law was analyzed during a workshop. The main aspects were: the law of population to access to information on nuclear energy and the relationship between the Regulator Organism and the nuclear power plants managers

  3. Efikasnost sistema PVO u uslovima elektronskih dejstava / Efficiency of antiaircraft system in electronic warfare

    Directory of Open Access Journals (Sweden)

    Vladimir V. Šepec

    2007-01-01

    Full Text Available U radu je primenjena teorija masovnog opsluživanja u analizi efikasnosti sistema protivvazduhoplovne odbrane (sistema PVO u uslovima elektronskih dejstava protivnika. Prikazan je model za ocenu efikasnosti sistema PVO i predstavljeni su izrazi za procenu efikasnosti sistema PVO u uslovima elektronskih dejstava. / In this article the theory of mass servicing is used in the analysis of efficiency of antiaircraft system in the conditions of electronic warfare. The model for analysis of the antiaircraft system efficiency has been shown and formulas for qualitative analysis of antiaircraft system efficiency have been presented in the conditions of electronic warfare.

  4. Particle Swarm Social Adaptive Model for Multi-Agent Based Insurgency Warfare Simulation

    Energy Technology Data Exchange (ETDEWEB)

    Cui, Xiaohui [ORNL; Potok, Thomas E [ORNL

    2009-12-01

    To better understand insurgent activities and asymmetric warfare, a social adaptive model for modeling multiple insurgent groups attacking multiple military and civilian targets is proposed and investigated. This report presents a pilot study using the particle swarm modeling, a widely used non-linear optimal tool to model the emergence of insurgency campaign. The objective of this research is to apply the particle swarm metaphor as a model of insurgent social adaptation for the dynamically changing environment and to provide insight and understanding of insurgency warfare. Our results show that unified leadership, strategic planning, and effective communication between insurgent groups are not the necessary requirements for insurgents to efficiently attain their objective.

  5. Tissue-based water quality biosensors for detecting chemical warfare agents

    Science.gov (United States)

    Greenbaum, Elias [Oak Ridge, TN; Sanders, Charlene A [Knoxville, TN

    2003-05-27

    A water quality sensor for detecting the presence of at least one chemical or biological warfare agent includes: a cell; apparatus for introducing water into the cell and discharging water from the cell adapted for analyzing photosynthetic activity of naturally occurring, free-living, indigenous photosynthetic organisms in water; a fluorometer for measuring photosynthetic activity of naturally occurring, free-living, indigenous photosynthetic organisms drawn into the cell; and an electronics package that analyzes raw data from the fluorometer and emits a signal indicating the presence of at least one chemical or biological warfare agent in the water.

  6. Health care law versus constitutional law.

    Science.gov (United States)

    Hall, Mark A

    2013-04-01

    National Federation of Independent Business v. Sebelius, the Supreme Court's ruling on the Patient Protection and Affordable Care Act, is a landmark decision - both for constitutional law and for health care law and policy. Others will study its implications for constitutional limits on a range of federal powers beyond health care. This article considers to what extent the decision is also about health care law, properly conceived. Under one view, health care law is the subdiscipline that inquires how courts and government actors take account of the special features of medicine that make legal or policy issues especially problematic - rather than regarding health care delivery and finance more generically, like most any other economic or social enterprise. Viewed this way, the opinions from the Court's conservative justices are mainly about general constitutional law principles. In contrast, Justice Ruth Bader Ginsburg's dissenting opinion for the four more liberal justices is just as much about health care law as it is about constitutional law. Her opinion gives detailed attention to the unique features of health care finance and delivery in order to inform her analysis of constitutional precedents and principles. Thus, the Court's multiple opinions give a vivid depiction of the compelling contrasts between communal versus individualistic conceptions of caring for those in need, and between health care and health insurance as ordinary commodities versus ones that merit special economic, social, and legal status.

  7. Approaching comparative company law

    OpenAIRE

    Donald, David C.

    2008-01-01

    This paper identifies some common errors that occur in comparative law, offers some guidelines to help avoid such errors, and provides a framework for entering into studies of the company laws of three major jurisdictions. The first section illustrates why a conscious approach to comparative company law is useful. Part I discusses some of the problems that can arise in comparative law and offers a few points of caution that can be useful for practical, theoretical and legislative comparative ...

  8. On crystallization of law

    Directory of Open Access Journals (Sweden)

    Szmodis Jenő

    2014-01-01

    Full Text Available The article introduces the problem of autonomy of law. The paper examines the medieval origins of legal positivism from a historical approach, sketching the main theories concerning the emergence of law, and phrasing some preliminary consideration for a historical and philosophical view of the problem of the birth of law. As a result of reasoning the article suggests some legal historical and human ethological ideas relating to the phenomena of crystallization of the law.

  9. Historizing epistemology in psychology.

    Science.gov (United States)

    Jovanović, Gordana

    2010-12-01

    The conflict between the psychometric methodological framework and the particularities of human experiences reported in psychotherapeutic context led Michael Schwarz to raise the question whether psychology is based on a methodological error. I take this conflict as a heuristic tool for the reconstruction of the early history of psychology, which bears witness to similar epistemological conflicts, though the dominant historiography of psychology has largely forgotten alternative conceptions and their valuable insights into complexities of psychic phenomena. In order to work against the historical amnesia in psychology I suggest to look at cultural-historical contexts which decisively shaped epistemological choices in psychology. Instead of keeping epistemology and history of psychology separate, which nurtures individualism and naturalism in psychology, I argue for historizing epistemology and for historical psychology. From such a historically reflected perspective psychology in contemporary world can be approached more critically.

  10. Psychological Theories of Acculturation

    DEFF Research Database (Denmark)

    Ozer, Simon

    2017-01-01

    advancements, together with greater mobility. Acculturation psychology aims to comprehend the dynamic psychological processes and outcomes emanating from intercultural contact. Acculturation psychology has been a growing field of research within cross-cultural psychology. Today, psychological theories......The proliferation of cultural transition and intercultural contact has highlighted the importance of psychological theories of acculturation. Acculturation, understood as contact between diverse cultural streams, has become prevalent worldwide due to technological, economical, and educational...... of acculturation also include cognate disciplines such as cultural psychology, social psychology, sociology, and anthropology.The expansion of psychological theories of acculturation has led to advancements in the field of research as well as the bifurcation of epistemological and methodological approaches...

  11. LAW DEMOCRACY & DEVELOPMENT

    African Journals Online (AJOL)

    HP27975994114

    is still on the increase.8 It is forecast that the world will face a 40 per cent .... the legal context entails.27 Renowned property law scholars, like Underkuffler, argue ..... operation of law.53 The classic examples of Roman law res publicae were ...

  12. European tax law

    NARCIS (Netherlands)

    Terra, B.J.M.; Wattel, P.J.

    2008-01-01

    This book is intended as a reference book for tax law and EC law pratitioners, tax administrators, academics, the judiciary and tax or Community law policy makers. For students, an abridged student edition textbook is available. The book offers a systematic survey of the tax implications of the EC

  13. Contract law as fairness

    NARCIS (Netherlands)

    Klijnsma, J.

    2015-01-01

    This article examines the implications for contract law of Rawls' theory of justice as fairness. It argues that contract law as an institution is part of the basic structure of society and as such subject to the principles of justice. Discussing the basic structure in relation to contract law is

  14. Transnational Constitutional Law

    NARCIS (Netherlands)

    Zumbansen, P (Peer); K.I. Bhatt (Kinnari)

    2018-01-01

    textabstractThis chapter provides an overview of the emerging field of transnational constitutional law (TCL). Whilst questions of constitutional law are typically discussed in the context of a specific domestic legal setting, a salient strategy of TCL is to understand constitutional law and its

  15. Environmental law in Denmark

    DEFF Research Database (Denmark)

    Basse, Ellen Margrethe

    Modern Danish environmental law has a strong international dimension due to membership of EU and participation in global and regional agreements. The concept of transnational law that includes EU environmental law that has vertical as well as horizontal effects across jurisdictions binding national...

  16. Unjust enrichment in business law

    OpenAIRE

    Vydrová, Zuzana

    2016-01-01

    This thesis analyses the concept of unjust enrichment under the business law. First of all the thesis explains the term of business law. Business law is a complex of legal rules concerning the contractual relationships between entrepreneurs arising from their business activities. Business law is a comprehensive field of law which extends into many other fields of law, both private and public law. Equally the regulation of unjust enrichment within the business law expands into many other laws ...

  17. Water, law, science

    Science.gov (United States)

    Narasimhan, T. N.

    2008-01-01

    SummaryIn a world with water resources severely impacted by technology, science must actively contribute to water law. To this end, this paper is an earth scientist's attempt to comprehend essential elements of water law, and to examine their connections to science. Science and law share a common logical framework of starting with a priori prescribed tenets, and drawing consistent inferences. In science, observationally established physical laws constitute the tenets, while in law, they stem from social values. The foundations of modern water law in Europe and the New World were formulated nearly two thousand years ago by Roman jurists who were inspired by Greek philosophy of reason. Recognizing that vital natural elements such as water, air, and the sea were governed by immutable natural laws, they reasoned that these elements belonged to all humans, and therefore cannot be owned as private property. Legally, such public property was to be governed by jus gentium, the law of all people or the law of all nations. In contrast, jus civile or civil law governed private property. Remarkably, jus gentium continues to be relevant in our contemporary society in which science plays a pivotal role in exploiting vital resources common to all. This paper examines the historical roots of modern water law, follows their evolution through the centuries, and examines how the spirit of science inherent in jus gentium is profoundly influencing evolving water and environmental laws in Europe, the United States and elsewhere. In a technological world, scientific knowledge has to lie at the core of water law. Yet, science cannot formulate law. It is hoped that a philosophical understanding of the relationships between science and law will contribute to their constructively coming together in the service of society.

  18. LAW OCRACY ELOPMENT LAW DEMOCRACY & DEVELOPMENT

    African Journals Online (AJOL)

    HP27975994114

    to health care services dovetails with the international law approach to assessing compliance with the ..... with extended opening hours) are well distributed across the city.40 Availability of .... often constitutes a de facto denial of access to care.

  19. Human law and computer law comparative perspectives

    CERN Document Server

    Hildebrandt, Mireille

    2014-01-01

    This book probes the epistemological and hermeneutic implications of data science and artificial intelligence for democracy and the Rule of Law, and the challenges posed by computing technologies traditional legal thinking and the regulation of human affairs.

  20. Psychological After-effects of War in Displaced Women

    Directory of Open Access Journals (Sweden)

    José Alonso Andrade Salazar

    2016-07-01

    Full Text Available The psychological after-effects of violence due to the armed conflict have left traumatic memories or indelible stigma in victimized women. Females are overrepresented since they compose more than half of the victims in the Colombian warfare. (Sierra, Calle, and Vélez, 2015. Thus, we considered the following research question: What psychological after-effects of war prevail in displaced women? In this research project, we defined psychological after-effects of war as signs, symptoms and psychological disorders based on the fifth edition of the Diagnostic and Statistical Manual of Mental Disorders. Moreover, we defined forced migration as the movement of people, families and groups away from their homes to other places. This movement is coerced by a powerful actor or group to expel, harass and uproot a person, group or community.   We adopted a social psychological perspective to study the after-effects of war in displaced women. This is a narrative review in which we included manuscripts from academic journals, institutional reports and books. The inclusion criteria were the following: manuscripts published and indexed from 2005 to 2015, and generalizability of the results.  We selected the following academic data-bases: Academic Search Complete, Medline, Redalyc, EBSCO, Google Scholar, and Science Direct. We selected 7 out of 50 papers that fulfilled the inclusion criteria. The results showed that displaced women suffer from mood, impulse control and behavioral disorders. These disorders prevail due to the after-effects of war. Whereas fear, helplessness, anger and uprooting are equally conducive to the emotional stability that they experience. We conclude that war directly and indirectly affects the mental health of women forced to emigrate, causing mental disorders and psychological alterations.

  1. A common law agenda for labour law

    OpenAIRE

    Hough, Barry; Spowart-Taylor, Ann

    1999-01-01

    This article assesses the purposes of a re-contractualisation of the employment relationship. It examines in particular the implied duty to act in good faith, and argues that in developing this and other implied terms the judiciary only extends employment protection to further wealth maximisation. It is argued that the common law sees its contribution to labour law as a device for maximising the efficiency of the enterprise and promoting the creation of wealth for the benefit of the national ...

  2. Bruner's Search for Meaning: A Conversation between Psychology and Anthropology

    Science.gov (United States)

    Mattingly, Cheryl; Lutkehaus, Nancy C.; Throop, C. Jason

    2010-01-01

    We introduce a special issue of Ethos devoted to the work of Jerome Bruner and his careerlong attempts to seek innovative ways to foster a dialogue between psychology and anthropology. The articles in this special issue situate Bruner's meaning-centered approach to psychology and his groundbreaking work on narrative in the broader context of the developmental trajectory of both of fields of inquiry. Bruner's work has been enormously influential in the subfields of cultural psychology and psychological anthropology, especially because of his important contributions to our understanding of the intimate relationship between culture and mind. We examine Bruner's past and ongoing engagement with such luminary figures as Lev Vygotsky, Jean Piaget, Alfred Kroeber, Claude Lévi-Strauss, and Clifford Geertz to highlight points of convergence and tension between his version of cultural psychology and contemporary theorizing and practice in psychological anthropology. We also review his practical and theoretical contributions to the fields of medicine, law, and education. PMID:20706551

  3. Bruner's Search for Meaning: A Conversation between Psychology and Anthropology.

    Science.gov (United States)

    Mattingly, Cheryl; Lutkehaus, Nancy C; Throop, C Jason

    2008-03-01

    We introduce a special issue of Ethos devoted to the work of Jerome Bruner and his careerlong attempts to seek innovative ways to foster a dialogue between psychology and anthropology. The articles in this special issue situate Bruner's meaning-centered approach to psychology and his groundbreaking work on narrative in the broader context of the developmental trajectory of both of fields of inquiry. Bruner's work has been enormously influential in the subfields of cultural psychology and psychological anthropology, especially because of his important contributions to our understanding of the intimate relationship between culture and mind. We examine Bruner's past and ongoing engagement with such luminary figures as Lev Vygotsky, Jean Piaget, Alfred Kroeber, Claude Lévi-Strauss, and Clifford Geertz to highlight points of convergence and tension between his version of cultural psychology and contemporary theorizing and practice in psychological anthropology. We also review his practical and theoretical contributions to the fields of medicine, law, and education.

  4. Psychological Factors Influencing Life Satisfaction of Undergraduates

    OpenAIRE

    Ajayi, Olubukola; Adewumi, Bukunmi

    2017-01-01

    This study was designed to assess the psychological factors influencing life satisfaction of undergraduates. The instruments used were Perceived Stress Scale (PSS), Wong and Law Emotional Intelligence Scale (WLEIS), Rosenberge Self-esteem Scale (RSS), and Satisfaction with Life Scale (SWLS). A total number of 190 participants were purposively selected across various faculties in Ekiti State University. Four hypotheses were tested using Independent t-test to find the effects of perceived stres...

  5. Efficacy Evaluation of Current and Future Naval Mine Warfare Neutralization Method

    Science.gov (United States)

    2016-12-01

    ENGINEERING APPROACH Numerous systems engineering process models were considered for this study including the Waterfall , Spiral, and “Vee” models . Given the... model based systems engineering, design of experiments, requirements analysis, mine warfare, MIW, mine countermeasures, MCM, littoral combat ship, LCS...E. IMPLEMENTATION IN SIMULATION MODEL .............................47 VII. MODELING AND SIMULATION ARCHITECTURE ..................................49

  6. (Review of) Reno, William. 2011. Warfare in Independent Africa. Cambridge: Cambridge University Press

    DEFF Research Database (Denmark)

    Hagmann, Tobias

    2013-01-01

    Warfare in Independent Africa is Reno’s bold attempt to analyze the modern history of African insurgencies. The book tackles this task through the prism of five generations of rebel, which left their mark on the continent; anti-colonial rebels, majority rule rebels, reform rebels, warlord rebels ...... and parochial rebels....

  7. 11th Annual Mine Warfare Technology Symposium, May 6-8, 2014 - Monterey, CA

    OpenAIRE

    2014-01-01

    The Naval Postgraduate School (NPS), the Office of Naval Research (ONR), the Program Executive Office Littoral Combat Ships (PEO LCS), OPNAV (N95), and The Consortium for Robotics and Unmanned Systems Education and Research (CRUSER) are pleased to announce the ELEVENTH International Mine Warfare Technology Symposium in Monterey, California, May 6-8, 2014.

  8. A Communitarian Critique of the Warfare State: Implications for the Twenty-First-Century University

    Science.gov (United States)

    Theobald, Paul; Knotwell, Jim

    2007-01-01

    This article contends that the relatively recent academic movement known as communitarianism can serve as a policy guide that could work catalytically on American cultural development of the sort that would loosen the tight military-industrial connection and in so doing aid the dismantling of the "warfare state." After chronicling the development…

  9. An Empirical Examination of the Warfare Metaphor with Respect to Pre-Service Elementary Teachers

    Science.gov (United States)

    Cobern, William W.; Loving, Cathleen C.; Davis, Edward B.; Terpstra, Jeff

    2013-01-01

    Since its origination in the late nineteenth century, the warfare metaphor has been used to characterize the relationship between science and religion, especially orthodox Christianity. Though thoroughly discredited by historians of science, the ideological descendants of Thomas Huxley, who spoke of science in quasi-religious terms, have kept the…

  10. The influence of the Ratel infantry fighting vehicle on mobile warfare ...

    African Journals Online (AJOL)

    This article traces the story of how the author and a number of daring young commanders and soldiers had cast aside military textbooks in developing their own military doctrine for mobile warfare, South African style. It is clear that the Ratel infantry fighting vehicle had wielded huge influence on the development and ...

  11. Above the Influence: The Strategic Effects of Airpower in Irregular Warfare

    Science.gov (United States)

    2010-06-01

    INDOCHINA. . . . . . . . . . . . . . . . . . . . . 105 APPENDIX B: MAP OF LAOS . . . . . . . . . . . . . . . . . . . . . . . . . . . 106 APPENDIX...perspectives. These perspectives involve the use of airpower in North Vietnam, South Vietnam, and Laos . The overarching political endstate or...Nagl, ―Principles, Imperatives, and Paradoxes of Counterinsurgency,‖ 50; Mao Tse -Tung, Problems of Strategy in Guerrilla Warfare, 215-216; Gray

  12. Emerging Threat to America: Non-State Entities Fighting Fourth Generation Warfare in Mexico

    Science.gov (United States)

    2010-09-01

    warfare in Juarez, Mexico contrasts with the “peaceful” cities of Ciudad Acuña and Piedras Negras controlled by the Zetas who demonstrate 4GW tactics...Vulliamy, 2009). Within the cities of Acuna and Piedra Negras where one Pack Virus (the Zetas) has effective control of these limited geographic

  13. Electronic Warfare (EW) Historical Perspectives and Its Relationship to Information Operations (IO) - Considerations for Turkey

    Science.gov (United States)

    2006-09-01

    Information Operations IW Information Warfare JDAM Joint Direct Attack Munition JRFL Joint Restricted Frequency List JSTARS Joint...through the preparation of the joint restricted frequency list (JRFL), which includes taboo, guarded and protected frequencies. The EC-130H Compass Call

  14. Laboratory analysis of chemical warfare agents, adducts, and metabolites in biomedial samples

    NARCIS (Netherlands)

    Schans, M.J. van der

    2015-01-01

    Chemical warfare agents (CWAs) are the most toxic compounds ever produced. To develop medical countermeasures against the effects of these agents, analytical procedures to analyze these agents in biological matrices are essential for a better understanding of the toxicological process. The need for

  15. Fluorescent discrimination between traces of chemical warfare agents and their mimics.

    Science.gov (United States)

    Díaz de Greñu, Borja; Moreno, Daniel; Torroba, Tomás; Berg, Alexander; Gunnars, Johan; Nilsson, Tobias; Nyman, Rasmus; Persson, Milton; Pettersson, Johannes; Eklind, Ida; Wästerby, Pär

    2014-03-19

    An array of fluorogenic probes is able to discriminate between nerve agents, sarin, soman, tabun, VX and their mimics, in water or organic solvent, by qualitative fluorescence patterns and quantitative multivariate analysis, thus making the system suitable for the in-the-field detection of traces of chemical warfare agents as well as to differentiate between the real nerve agents and other related compounds.

  16. On modeling of the evaporation of chemical warfare agents on the ground

    NARCIS (Netherlands)

    Westin, S.N.; Winter, S.; Karlsson, E.; Hin, A.; Oeseburg, F.

    1998-01-01

    A model for evaporation of chemical warfare agents on the ground has been developed. The process of evaporation is described in three steps: (1) the immediate drop enlargement due to impact momentum is modeled using an empirical correlation from technical literature; (2) further enlargement caused

  17. Diagnosis of exposure to chemical warfare agents: An essential tool to counteract chemical terrorism

    NARCIS (Netherlands)

    Noort, D.; Schans, M.J. van der; Bikker, F.J.; Benschop, H.P.

    2009-01-01

    Methods to analyze chemical warfare agents (CW-agents) and their decomposition products in environmental samples were developed over the last decades. In contrast herewith, procedures for analysis in biological samples have only recently been developed. Retrospective detection of exposure to

  18. Mass spectrometry in identification of ecotoxicants including chemical and biological warfare agents

    International Nuclear Information System (INIS)

    Lebedev, Albert T.

    2005-01-01

    Mass spectrometry is a unique tool to detect and identify trace levels of organic and bioorganic compounds as well as microorganisms in the environment. The range of potential chemical warfare (CW) and biological warfare (BW) agents is very broad. An important advantage of mass spectrometry over other techniques involves potential for full spectrum detection of chemical and biological agents including mid-spectrum materials (i.e. bioactive peptides, toxins, etc.) for which biological approaches are inadequate. Being very fast (seconds and minutes), extremely sensitive (zeptomoles 10 -21 ), and informative (detailed qualitative and quantitative composition of mixtures containing hundreds of chemicals), mass spectrometry is a principal analytical tool at the sites of destruction of CW. Due to its unique features, mass spectrometry is applied not only for the detection of CW agents, but for the analysis of products of metabolism and degradation of these agents in organisms or environment as well. The present paper deals with some examples of successful application of mass spectrometry for the analyses of ecotoxicants, chemical warfare agents, explosives, and microorganisms including biology warfare agents

  19. PERMANENCE OF BIOLOGICAL AND CHEMICAL WARFARE AGENTS IN MUNICIPAL SOLID WASTE LANDFILL LEACHATES

    Science.gov (United States)

    The objective of this work is to permit EPA/ORD's National Homeland Security Research Center (NHSRC) and Edgewood Chemical Biological Center to collaborate together to test the permanence of biological and chemical warfare agents in municipal solid waste landfills. Research into ...

  20. Oxidative decontamination of chemical and biological warfare agents using L-Gel.

    Science.gov (United States)

    Raber, Ellen; McGuire, Raymond

    2002-08-05

    A decontamination method has been developed using a single reagent that is effective both against chemical warfare (CW) and biological warfare (BW) agents. The new reagent, "L-Gel", consists of an aqueous solution of a mild commercial oxidizer, Oxone, together with a commercial fumed silica gelling agent, Cab-O-Sil EH-5. L-Gel is non-toxic, environmentally friendly, relatively non-corrosive, maximizes contact time because of its thixotropic nature, clings to walls and ceilings, and does not harm carpets or painted surfaces. The new reagent also addresses the most demanding requirements for decontamination in the civilian sector, including availability, low maintenance, ease of application and deployment by a variety of dispersal mechanisms, minimal training and acceptable expense. Experiments to test the effectiveness of L-Gel were conducted at Lawrence Livermore National Laboratory and independently at four other locations. L-Gel was tested against all classes of chemical warfare agents and against various biological warfare agent surrogates, including spore-forming bacteria and non-virulent strains of real biological agents. Testing showed that L-Gel is as effective against chemical agents and biological materials, including spores, as the best military decontaminants.

  1. Zirconium doped nano-dispersed oxides of Fe, Al and Zn for destruction of warfare agents

    Czech Academy of Sciences Publication Activity Database

    Štengl, Václav; Houšková, Vendula; Bakardjieva, Snejana; Murafa, Nataliya; Maříková, Monika; Opluštil, F.; Němec, T.

    2010-01-01

    Roč. 61, č. 11 (2010), s. 1080-1088 ISSN 1044-5803 Institutional research plan: CEZ:AV0Z40320502 Keywords : warfare agents * nano-dispersed oxides * homogeneous hydrolysis Subject RIV: CA - Inorganic Chemistry Impact factor: 1.496, year: 2010

  2. Ge 4+ doped TiO 2 for stoichiometric degradation of warfare agents

    Czech Academy of Sciences Publication Activity Database

    Štengl, Václav; Matys Grygar, Tomáš; Opluštil, F.; Němec, T.

    2012-01-01

    Roč. 227, AUGUST (2012), s. 62-67 ISSN 0304-3894 R&D Projects: GA ČR(CZ) GAP106/12/1116 Institutional support: RVO:61388980 Keywords : germanium * homogeneous hydrolysis * titania * urea * warfare agent degradation Subject RIV: CA - Inorganic Chemistry Impact factor: 3.925, year: 2012

  3. Analysis of the Threat of Genetically Modified Organisms for Biological Warfare

    Science.gov (United States)

    2011-05-01

    biological warfare. The primary focus of the framework are those aspects of the technology directly affecting humans by inducing virulent infectious disease...applications. Simple organisms such as fruit flies have been used to study the effects of genetic changes across generations. Transgenic mice are...Analysis * Multi-cell pathogens * Toxins (Chemical products of living cells.) * Fungi (Robust organism; no genetic manipulation needed

  4. Military medicine and the ethics of war: British colonial warfare during the Seven Years War (1756-63).

    Science.gov (United States)

    Charters, Erica

    2010-01-01

    This article examines 18th-century European warfare, tracing the first formal codifications of conventions of war, frequently introduced by military physicians and initially regarding the treatment of the sick and wounded. It outlines to what extent these conventions were followed in practice, particularly in the challenging environment of American irregular warfare, with a focus on the most well-known incident of "biological warfare" in the period: the deliberate spread of smallpox by British officers among Amerindians in 1763. More broadly, it demonstrates that the history of military medicine provides a fruitful method with which to uncover assumptions about the ethics of war.

  5. Simulated experiment for elimination of chemical and biological warfare agents by making use of microwave plasma torch

    International Nuclear Information System (INIS)

    Hong, Yong C.; Kim, Jeong H.; Uhm, Han S.

    2004-01-01

    The threat of chemical and biological warfare agents in a domestic terrorist attack and in military conflict is increasing worldwide. Elimination and decontamination of chemical and biological warfare (CBW) agents are immediately required after such an attack. Simulated experiment for elimination of CBW agents by making use of atmospheric-pressure microwave plasma torches is carried out. Elimination of biological warfare agents indicated by the vitrification or burnout of sewage sludge powders and decomposition of toluene gas as a chemical agent stimulant are presented. A detailed characterization for the elimination of the simulant chemicals using Fourier transform infrared and gas chromatography is also presented

  6. Simulated experiment for elimination of chemical and biological warfare agents by making use of microwave plasma torch

    Science.gov (United States)

    Hong, Yong C.; Kim, Jeong H.; Uhm, Han S.

    2004-02-01

    The threat of chemical and biological warfare agents in a domestic terrorist attack and in military conflict is increasing worldwide. Elimination and decontamination of chemical and biological warfare (CBW) agents are immediately required after such an attack. Simulated experiment for elimination of CBW agents by making use of atmospheric-pressure microwave plasma torches is carried out. Elimination of biological warfare agents indicated by the vitrification or burnout of sewage sludge powders and decomposition of toluene gas as a chemical agent stimulant are presented. A detailed characterization for the elimination of the simulant chemicals using Fourier transform infrared and gas chromatography is also presented.

  7. Historiography of Czech psychology

    Czech Academy of Sciences Publication Activity Database

    Hoskovcová, S.; Hoskovec, J.; Plháková, A.; Šebek, M.; Švancara, J.; Vobořil, Dalibor

    2010-01-01

    Roč. 13, č. 3 (2010), s. 309-334 ISSN 1093-4510 Institutional research plan: CEZ:AV0Z70250504 Keywords : Czech psychologists * Czechoslovak psychology * ideologic influences on psychology Subject RIV: AN - Psychology Impact factor: 0.500, year: 2010

  8. Teachers and Psychological Reports.

    Science.gov (United States)

    Rogers, George W., Jr.

    The importance of the written psychological report is explored, and, in particular, its relationship to teachers' needs and requirements is discussed. Additionally, the characteristics of a "good" psychological report are listed, and teachers are advised to use these criteria in evaluating the psychological reports they are receiving. (Author)

  9. Psychology in Mexico

    Science.gov (United States)

    Ruiz, Eleonora Rubio

    2011-01-01

    The first formal psychology course taught in Mexico was in 1896 at Mexico's National University; today, National Autonomous University of Mexico (UNAM in Spanish). The modern psychology from Europe and the US in the late 19th century were the primary influences of Mexican psychology, as well as psychoanalysis and both clinical and experimental…

  10. What is Political Psychology?

    Science.gov (United States)

    Deutsch, Morton

    1983-01-01

    Political psychology is the study of the bidirectional interaction of political and psychological processes. This academic discipline was founded after the First World War by Harold D. Lasswell. The content of political psychology is discussed and illustrative studies of the field are briefly summarized. (CS)

  11. Psychology in India

    Science.gov (United States)

    Sushma, B.; Padmaja, G.

    2011-01-01

    Psychology forms the basis of every human activity. The scope of psychology is increasingly widening in various economic, political, social, cultural and technological aspects. Though the application of psychology is extending to various aspects of life, it needs to be indigenised to address the dynamic needs in the various socio-economic contexts…

  12. Water, law, science

    Energy Technology Data Exchange (ETDEWEB)

    Narasimhan, T.N.

    2007-10-17

    In a world with water resources severely impacted bytechnology, science must actively contribute to water law. To this end,this paper is an earth scientist s attempt to comprehend essentialelements of water law, and to examine their connections to science.Science and law share a common logical framework of starting with apriori prescribed tenets, and drawing consistent inferences. In science,observationally established physical laws constitute the tenets, while inlaw, they stem from social values. The foundations of modern water law inEurope and the New World were formulated nearly two thousand years ago byRoman jurists who were inspired by Greek philosophy of reason.Recognizing that vital natural elements such as water, air, and the seawere governed by immutable natural laws, they reasoned that theseelements belonged to all humans, and therefore cannot be owned as privateproperty. Legally, such public property was to be governed by jusgentium, the law of all people or the law of all nations. In contrast,jus civile or civil law governed private property. Remarkably, jusgentium continues to be relevant in our contemporary society in whichscience plays a pivotal role in exploiting vital resources common to all.This paper examines the historical roots of modern water law, followstheir evolution through the centuries, and examines how the spirit ofscience inherent in jus gentium is profoundly influencing evolving waterand environmental laws in Europe, the United States and elsewhere. In atechnological world, scientific knowledge has to lie at the core of waterlaw. Yet, science cannot formulate law. It is hoped that a philosophicalunderstanding of the relationships between science and law willcontribute to their constructively coming together in the service ofsociety.

  13. Looking Up: Conditions for Insurgent Airpower in Unconventional Warfare

    Science.gov (United States)

    2017-12-01

    the mid-to-late 20th century consisted of fishing, tea exports, and tourism , as well as smuggling goods to India due to restrictive Indian laws that...manner that it resorted to aerial tourism to fund its own training. However, by the mid-1990s the SLAF acquired air assets capable of counter-air

  14. Law for nuclear experts only

    Energy Technology Data Exchange (ETDEWEB)

    Wagner, H [Kernforschungszentrum Karlsruhe G.m.b.H. (Germany, F.R.)

    1980-02-01

    The Federal Ministry of the Interior is preparing an ordinance on expert consultants under the Atomic Energy Act which, among other topics, is to include legal norms for the criteria to be met by experts in terms of non-partisanship, training, capabilities, technical equipment and cooperation in expert organizations of members of various scientific and technical disciplines. A summary of general criteria relating to the qualification, selection and status of experts called in by the legislative and executive branches and by courts of law, which could be organized as a series of guidelines without any original qualities of legal norms, could be recommended in view of the increasing quantitative and qualitative importance of experts. However, passing an ordinance merely fixing and putting into concrete terms the image of an 'expert under the Atomic Energy Act' is intolerable, because the status of scientific and technical experts by far extends beyond the field of nuclear law in our industrial society characterized by a far reaching division of labor. Weak points in the organization of expert services are not confined to technology or nuclear power. Separate rules establishing legal norms are not convincing also for reasons of technology policy and legal policy as well as for those of social psychology and practice.

  15. Legislative recognition in France of psychological harassment at work.

    Science.gov (United States)

    Graser, M; Manaouil, C; Verrier, A; Doutrellot-Phillipon, C; Jardé, O

    2003-01-01

    The recent French Law on Social Modernisation of 17 January 2002 introduced into the French Labour Code and into the French Criminal Code, the concept of "moral" harassment. The definition of psychological harassment under this law adopts quite a broad conception of the notion of psychological harassment. The legislator has established a means for "friendly" settlement of disputes: mediation. When it has not been possible to settle the dispute internally, the Courts have a number of sanctions available to them. The French Labour Code provides that any termination of the contract of employment resulting from a situation of psychological harassment is automatically null and void. Such nullification should therefore be applicable whatever the nature of the termination: dismissal, resignation or negotiated departure and it punishes psychological harassment at work by imprisonment for one year and a fine of 3,750 Euros. The French Criminal Code prescribes penalties of one year and 15,000 Euros.

  16. International Treaties Tax Law in Brazilian Law

    Directory of Open Access Journals (Sweden)

    Milena Zampieri Sellmann

    2016-06-01

    Full Text Available International agreements are the primary source of obligations internationally, whi- ch generate reflections in national law. They have been extremely used in tax harvest because they avoid double taxation and reduce tax burden in international trade. They are formal sources of tax law, which the legislature is expressly recognized in Article 96 of the National Tax Code to set the “tax legislation” expression. Article 98 of the Code determines the supremacy of international tax agreements over national law. Against the odds, international tax agreements do not revoke or modify the national legislation, just limit the effectiveness of national law incompatible with them, with supra-legal hierarchy and infra-constitution. They are above national law, either after or before it is created, and are below the Federal Constitution, so agreements incompatible with it should not be approved by Congress and, if so, they will be subject to declaration of unconstitutionality by the Supreme Court. It is a reporting case the international agreement’s unconstitutio- nality after it is celebrated.

  17. Dynamics of positional warfare malaria: Finland and Korea compared.

    Science.gov (United States)

    Huldén, Lena; Huldén, Larry

    2008-09-08

    A sudden outbreak of vivax malaria among Finnish troops in SE-Finland and along the front line in Hanko peninsula in the southwest occurred in 1941 during World War II. The common explanation has been an invasion of infective Anopheles mosquitoes from the Russian troops crossing the front line between Finland and Soviet Union. A revised explanation is presented based on recent studies of Finnish malaria. The exact start of the epidemic and the phenology of malaria cases among the Finnish soldiers were reanalyzed. The results were compared with the declining malaria in Finland. A comparison with a corresponding situation starting in the 1990's in Korea was performed. The malaria cases occurred in July in 1941 when it was by far too early for infective mosquitoes to be present. The first Anopheles mosquitoes hatched at about the same time as the first malaria cases were observed among the Finnish soldiers. It takes about 3-6 weeks for the completion of the sporogony in Finland. The new explanation is that soldiers in war conditions were suddenly exposed to uninfected mosquitoes and those who still were carriers of hypnozoites developed relapses triggered by these mosquitoes. It is estimated that about 0.5% of the Finnish population still were carriers of hypnozoites in the 1940's. A corresponding outbreak of vivax malaria in Korea in the 1990's is similarly interpreted as relapses from activated hypnozoites among Korean soldiers. The significance of the mosquito induced relapses is emphasized by two benefits for the Plasmodium. There is a synchronous increase of gametocytes when new mosquitoes emerge. It also enables meiotic recombination between different strains of the Plasmodium. The malaria peak during the positional warfare in the 1940's was a short outbreak during the last phase of declining indigenous malaria in Finland. The activation of hypnozoites among a large number of soldiers and subsequent medication contributed to diminishing the reservoir of malaria

  18. The rule of law

    Directory of Open Access Journals (Sweden)

    Besnik Murati

    2015-07-01

    Full Text Available The state as an international entity and its impact on the individual’s right has been and still continues to be a crucial factor in the relationship between private and public persons. States vary in terms of their political system, however, democratic states are based on the separation of powers and human rights within the state. Rule of law is the product of many actors in a state, including laws, individuals, society, political system, separation of powers, human rights, the establishment of civil society, the relationship between law and the individual, as well as, individual-state relations. Purpose and focus of this study is the importance of a functioning state based on law, characteristics of the rule of law, separation of powers and the basic concepts of the rule of law.

  19. Dentistry and criminal law.

    Science.gov (United States)

    Khoury, B S; Khoury, J N

    2017-09-01

    Criminal law in dentistry, as shaped and moulded by the prevailing views of society, defines what is or is not socially acceptable. It applies in both personal and professional contexts with the intended consequence of protecting the public from unacceptable conduct and potential imbalances of power. At its centre, a patient's consent plays a pivotal role in transforming unlawful conduct into lawful conduct. This literature review considers the current law and the trend of utilizing criminal law in addition to non-criminal law alternatives of reprimanding clinicians for failure to achieve consent in the course of dental practice. Dentists must appreciate this change and the prosecuting authority's increasing willingness to resort to criminal law. © 2017 Australian Dental Association.

  20. Bibliometric Profile of Turkish Journal of Psychology

    Directory of Open Access Journals (Sweden)

    Umut Al

    2013-11-01

    Full Text Available The Turkish Journal of Psychology has been indexed by the Social Science Citation Index since 1995. This study examines the Turkish Journal of Psychology and bibliometric features of its articles.  The research carried out covers 118 articles between the years 1995-2005.  The following research ques- tions have been addressed: 1 What are the subjects of the articles? 2 Is multi- ple authorship a prevalent feature of the articles? 3 What are the institutional affiliations of the authors of the articles? 4 What are the common characteris- tics of the cited articles? 5 Which types of sources (journal articles, mono- graphs, etc. get cited more often in the articles? 6 What are the most frequent- ly cited journals in the TJP? 7 Does the distribution of citations to journals fit Bradford's Law of Scattering? 8 Is there a relationship between the impact fac- tors of journals and the number of citations they get? 9 What is the rate of lit- erature obsolescence in psychology? 10 With regard to impact factor, what is the position of the TJP? Almost all of the articles were written in Turkish. The important part of the contributors was affiliated with Hacettepe, Ankara and the Middle East Technical universities. This research showed that 57% of articles (67 articles published in Turkish Journal of Psychology received no citations remaining 43% (51 articles were cited 135 times. The author self-citation ratio was 34%. In addition, journal self-citation ratio was 41%. Journals received 69% of all cita- tions in the Turkish Journal of Psychology. Journal of Personality and Social Psychology, Turkish Journal of Psychology, Child Development, Developmental Psychology and Psychological Bulletin were among the most frequently cited journals. Articles that appeared in the top 18 journals received 33% of all citations. The half-life of sources cited in the Turkish Journal of Psychology was ten years. According to the impact factor rank, the Turkish Journal of

  1. Transnational Constitutional Law

    OpenAIRE

    Zumbansen, P (Peer); Bhatt, Kinnari

    2018-01-01

    textabstractThis chapter provides an overview of the emerging field of transnational constitutional law (TCL). Whilst questions of constitutional law are typically discussed in the context of a specific domestic legal setting, a salient strategy of TCL is to understand constitutional law and its values by placing them ‘in context’ with existing and evolving cultural norms and political, social and economic discourses and struggles. Drawing on socio-legal investigations into the relationships ...

  2. New Russian law

    International Nuclear Information System (INIS)

    Anon.

    1996-01-01

    The information about the Russian Federation law dealing with population radiation safety signed by the President in January 1996 is given. The law is based on a new strategy of radiation protection including the mean efficient dose from all ionizing radiation sources as the main factor for evaluation of the safe level for the population. The norms stated in the law will become valid from January 1, 2000

  3. Labor Laws and Innovation

    OpenAIRE

    Viral V. Acharya; Ramin P. Baghai; Krishnamurthy V. Subramanian

    2013-01-01

    Can stringent labor laws be efficient? Possibly, if they provide firms with a commitment device to not punish short-run failures and thereby incentivize the pursuit of value-maximizing innovative activities. In this paper, we provide empirical evidence that strong labor laws indeed appear to have an ex ante positive incentive effect by encouraging the innovative pursuits of firms and their employees. Using patents and citations as proxies for innovation and a time-varying index of labor laws,...

  4. Rhetoric in Law

    DEFF Research Database (Denmark)

    Gabrielsen, Jonas

    The bond between law and rhetoric is as old as the subjects themselves. Especially the ancient works on legal rhetoric afford, however, a too narrow depiction of the interaction between law and rhetoric as a purely instrumental discipline of communication in court. In this paper I challenge...... this narrow understanding of legal rhetoric and outline three distinct frames of understanding the relation between law and rhetoric...

  5. Enjoying the Law

    DEFF Research Database (Denmark)

    Bjerre, Henrik Jøker

    2005-01-01

    of the concept of enjoyment is instructive, and looking at it more closely makes it possible to spell out why obedience in itself does not suffice for a moral existence. Subjecting ourselves to the prescriptions of positive law might actually function as a way of escaping the insatiable demands of the moral law....... In this case, the positive law not only sustains our enjoyment (by securing basic liberties), but also comes to function as an object of enjoyment itself....

  6. Investigative Psychology: Offender Profiling and the Analysis of Criminal Action

    OpenAIRE

    Canter, David V.; Youngs, Donna E.

    2009-01-01

    For many years Offender Profiling has caught the popular imagination, being drawn on by law enforcement throughout the world. But until the development of Investigative Psychology ‘profiling’ was based on little more than the informed personal expertise of experienced detectives. Spearheaded by David Canter and his associates throughout the world the new discipline of Investigative Psychology has emerged out of a quarter century of research and involvement in many actual cases. \\ud This groun...

  7. Violence in soccer: a socio-psychological review

    OpenAIRE

    Alex Christiano Barreto Fensterseifer; Nivia Marcia Velho; Mário Luiz C. Barroso

    2005-01-01

    Violence in Soccer has been worrying specialists in Physical Education, Psychology, Sociology, Law and Press for many years. Despite their best efforts to reduce it, violence continues to increase. The purpose of this review study is to verify what the above-mentioned sciences have to say about violence in soccer. The literature suggests that there are two big theories about this problem: an internal and psychological one, and an external and sociological one. Therefore, data analyses suggest...

  8. Is Contract Law Necessary?

    OpenAIRE

    SCHWARTZ, Alan

    2010-01-01

    This lecture was delivered on 17 March 2010. Alan Schwartz, Sterling Professor of Law; Professor of Management, Yale University This Lecture argues that much of the contract law in the cases (the US, the UK and Canada) and in the codes (Europe and Latin America) is unnecessary. To say that a law is unnecessary is to say that it does not perform a useful social function. The argument below thus sets out the functions that contract laws today are thought to serve, and then shows that many of...

  9. Outlines of environmental Law

    International Nuclear Information System (INIS)

    Salzwedel, J.

    1982-01-01

    In this omnibus, ten members of the working group for environmental law attempt to present the respective fields of environmental law in a consistent context, and to show the autonomy of each subject-matter as well as their interdependence and interrelationships. In the long run, the complexity of basic facts of natural science, technology and that of practical execution will require subject-specific penetration and application. Relationships between systems have to be realized to an increasing extent. Structures of law and administration have to be harmonized, and statements on the environmental impact of projects have to be made possible on the whole. Fundamental issues of environmental law are dealt with in the chapters entitled 'Concept and levels of applications of environmental law' and 'Environmental law in general'. The international, supranational and constitutional conditions given in advance of any environmental legislation increasingly gaining in importance are presented in the chapter on 'International environmental law', 'Basics of European Law' and on 'Constitutional Fundamentals'. The necessity of interdisciplinary cooperation becomes evident in those contributions concerning individual fields of environmental law. (orig./HSCH) [de

  10. Law before Gratian

    DEFF Research Database (Denmark)

    This volume, the third in the series, contains the proceedings of the conference 'Law before Gratian' and covers a wide range of topics from individual and local studies to broader reflections on the status and function of law in medieval European societies before the scholastic legal 'revolution......' of the later twelfth century. Seeking to broaden our view of what constituted law in this period, the articles examine these earlier developments in their own right and provide new insights into the variety and complexity of early and high medieval approaches to law and jurisprudence. Contributors...

  11. Operational Law Handbook,2007

    National Research Council Canada - National Science Library

    2007-01-01

    ... & SOFAs, legal assistance, combating terrorism, domestic operations, noncombatant evacuation operations, special operations, civil affairs, air, sea, and space law, detainee operations, reserve...

  12. The laws of sociodynamics

    OpenAIRE

    Movsesyan, Arsen A.

    2015-01-01

    The purpose of this article is to tell briefly about the newly discovered fundamental Laws of Sociodynamics, which are the driving force of the evolution of society and the determining factor of world historic process. Based on the principle of symmetry of the laws of nature the relationship between the Laws of Thermodynamics and Sociodynamics is shown, due to which the fifth Law of Thermodynamics has been formulated. In doing so the objectivity of the concept of «spirituality» has been subst...

  13. Integrated Warfare Requirements Methodology (IWRM). Phase 1 - Feasibility Study

    Science.gov (United States)

    1981-05-29

    effects of chemical antidotes will produce short-term reductions in effectiveness @ The psychological effects of mass destruction, fE ’, and the fa- tigue...scoreboards for each combat posture, iS necessary. K-i T ’Ri ATAR US i puu s t n d (t Uri Cu0! i~t .L voy )1 J I fy 1119 a3 Tif it’ s dL. t 1u e1 I V ver

  14. Towards a Semiotic Information Position Framework for Network Centric Warfare

    Science.gov (United States)

    2011-06-01

    study of anything which stands for something else [10]. Swiss linguist Ferdinand de Saussure and American logician and philosopher Charles Sanders Peirce...are considered as the founders of semiotics [10]. As a linguist, Saussure was interested in the relationships between words (or signs) and he argued...to Eco, Saussure “did not define the signified any too clearly, leaving it half way between a mental image, a concept and a psychological reality

  15. Cost Effectiveness Analysis of the "Sea to SWOS" Training Initiative on the Surface Warfare Officer Qualification Process

    National Research Council Canada - National Science Library

    Gavino, Christopher

    2002-01-01

    ... (combat effectiveness) while the quantitative analysis shows additional costs to the Navy Personnel Command and savings in training costs for the Naval Education and Training Command and OPNAV N76, the Surface Warfare Resource Sponsor...

  16. An Assessment of the Effectiveness of Computer-based Training for Newly Commissioned Surface Warfare Division Officers

    National Research Council Canada - National Science Library

    Bowman, William R; Crawford, Alice M; Mehay, Stephen; Stoker, Carol; Paynter, Robert

    2008-01-01

    ...) on-board an officer's ship. The study relied on a variety of analytical techniques, including a literature review of CBT and OJT training, interviews and focus groups with junior and senior surface warfare officers...

  17. Bench-Scale Investigation of Composting for Remediation of Explosives-Contaminated Soils from Naval Surface Warfare Center, Crane, Indiana

    National Research Council Canada - National Science Library

    Preston, Kurt

    1998-01-01

    ...), and octahydro-1,3,5,7-tetranitro-1,3,5,7- tetrazocine (HMX). The Naval Surface Warfare Center (NSWC), Crane, Indiana, provides material and logistic support to the Navy's weapon systems, including expendable and nonexpendable ordnance items...

  18. Chromatography and mass spectrometry of chemical warfare agents, toxins and related compounds: state of the art and future prospects

    NARCIS (Netherlands)

    Kientz, C.E.

    1998-01-01

    Methods for the identification of chemical warfare agents, toxins, bioregulators and related products are frequently reported in literature. These methods are often based on instrumental analysis using chromatography (gas and liquid) and mass spectrometry. Here, these instrumental techniques are

  19. The Need for a USAF Information Warfare(IW) Strategy for Military Operations Other Than War (MOOTW)

    National Research Council Canada - National Science Library

    Butler, Bradley

    1996-01-01

    .... Two areas having an impact on the answer to this question but not normally examined together are information warfare and the broad area of military operations short of large scale conventional combat...

  20. Modeling and Optimal Control of a Class of Warfare Hybrid Dynamic Systems Based on Lanchester (n,1) Attrition Model

    OpenAIRE

    Chen, Xiangyong; Zhang, Ancai

    2014-01-01

    For the particularity of warfare hybrid dynamic process, a class of warfare hybrid dynamic systems is established based on Lanchester equation in a (n,1) battle, where a heterogeneous force of n different troop types faces a homogeneous force. This model can be characterized by the interaction of continuous-time models (governed by Lanchester equation), and discrete event systems (described by variable tactics). Furthermore, an expository discussion is presented on an optimal variable tact...