WorldWideScience

Sample records for undersea warfare training

  1. Analysis of Acoustic Effects on Marine Mammals for the Proposed Undersea Warfare Training Range

    National Research Council Canada - National Science Library

    Jette, Steven D; Cembrola, Joan M; Mitchell, Glenn H; Fetherston, Thomas N

    2005-01-01

    ...) for the proposed Undersea Warfare Training Range (USWTR). The DEIS includes an assessment of the effects of Navy sonars on marine mammals during exercises to occur on the range as required by the Marine Mammal Protection Act (MMPA...

  2. Navy Operational Planner - Undersea Warfare Module

    Science.gov (United States)

    2016-09-01

    CLASSIFICATION OF ABSTRACT Unclassified 20. LIMITATION OF ABSTRACT UU NSN 7540–01-280-5500 Standard Form 298 (Rev. 2–89) Prescribed by ANSI...Convergence Zone DP Direct Path HVU High Value Unit MCM Mine Sweeper MIW Mine Warfare NMP Navy Mission Planner NOP Navy Operational Planner NOP–USW...Illustrated in Figure 1 is a piecewise linear from of the equation 1 tAchievement e   , where Achievement is the probability that a mine field

  3. Summary of Research 1995, Interdisciplinary Academic Groups (Command, Control & Communications Academic Group, Electronic Warfare Academic Group, Space Systems Academic Group and Undersea Warfare Academic Group)

    OpenAIRE

    Faculty of the Academic Groups

    1995-01-01

    The views expressed in this report are those of the authors and do not reflect the official policy or position of the Department of Defense or the U.S. Government. This report contains information of research projects in the four interdisciplinary groups, Command, Control & Communications Academic Group, Electronic Warfare Academic Group, Space Systems Academic Group and Undersea Warfare Academic Group, which were carried out under funding of the Naval Postgraduate School Research...

  4. Mountain Warfare: The Need for Specialist Training

    National Research Council Canada - National Science Library

    Malik, Muhammad

    2003-01-01

    This study focuses on the need for specialist training for mountain warfare. It analyzes the special characteristics of mountain and high altitude terrain which affect conduct of military operations...

  5. Training Practices for Surface Warfare Junior Officers

    Science.gov (United States)

    2011-12-01

    What some saw as spoon feeding , others saw as a lack of standards and goals. The issue is also worth considering in light of the changing values of the...NPS-GSBPP-12-004 NAVAL POSTGRADATE SCHOOL MONTEREY, CALIFORNIA Approved for public release; distribution is...unlimited Prepared for Naval Postgraduate School , Monterey, California 93943 TRAINING PRACTICES FOR SURFACE WARFARE JUNIOR OFFICERS by William R

  6. Advanced Undersea Warfare Systems

    Science.gov (United States)

    2011-06-01

    search mode, software modifications may be needed to give the LD- UUV weapon a line-of- bearing search capability. ◦ Max Range: 8 NM69 ◦ Warhead Size: 45...Glider can self-destruct or enter a hibernation state to be retrieved at a future time. Figure 4.19: Glider Recovery Assisted by Helicopter Retrieval 97...functions of the system. It does not have any bearing on the weighting of the remaining six functions. 127 between desires and capabilities using

  7. 2024 Unmanned Undersea Warfare Concept

    Science.gov (United States)

    2013-06-01

    the cheaper option. The 242 second method, improving sensor quality, has the disadvantage of higher cost, but the advantage of being able to... Auckland , New Zealand: Operation Analysis Section, Defense Technology Agency. Michaels, Jack, and William Wood. 1989. Design to Cost. New York: Wiley

  8. 78 FR 29699 - Transfer of Administrative Jurisdiction: Marine Corps Mountain Warfare Training Center...

    Science.gov (United States)

    2013-05-21

    ... Forest Service Transfer of Administrative Jurisdiction: Marine Corps Mountain Warfare Training Center... order authorizing the transfer of administrative jurisdiction from the Department of Agriculture to the..., lying within the Marine Corps Mountain Warfare Training Center and the Humboldt-Toiyabe National Forest...

  9. Defending Our Satellites: The Need for Electronic Warfare Education and Training

    Science.gov (United States)

    2015-12-01

    74 | Air & Space Power Journal Defending Our Satellites The Need for Electronic Warfare Education and Training Lt Col E. Lincoln Bonner, USAF...expanding education and training in the use of electronic warfare to defend US satellites and improve their survivability. The following discussion...Fighting The US military gains a disproportionate advantage over potential adversaries by exploiting space capabilities. Satellites provide an

  10. The Army Ground Forces Training for Mountain and Winter Warfare - Study No. 23

    National Research Council Canada - National Science Library

    Govan, Thomas

    1946-01-01

    This general study of the experiments in mountain and winter warfare training from 1940 to 1944 is designed as an introduction to the histories of the Mountain Training Center and The 10th Mountain...

  11. Cost Effectiveness Analysis of the "Sea to SWOS" Training Initiative on the Surface Warfare Officer Qualification Process

    National Research Council Canada - National Science Library

    Gavino, Christopher

    2002-01-01

    ... (combat effectiveness) while the quantitative analysis shows additional costs to the Navy Personnel Command and savings in training costs for the Naval Education and Training Command and OPNAV N76, the Surface Warfare Resource Sponsor...

  12. NEEMO 7 undersea mission

    Science.gov (United States)

    Thirsk, Robert; Williams, David; Anvari, Mehran

    2007-02-01

    The NEEMO 7 mission was the seventh in a series of NASA-coordinated missions utilizing the Aquarius undersea habitat in Florida as a human space mission analog. The primary research focus of this mission was to evaluate telementoring and telerobotic surgery technologies as potential means to deliver medical care to astronauts during spaceflight. The NEEMO 7 crewmembers received minimal pre-mission training to perform selected medical and surgical procedures. These procedures included: (1) use of a portable ultrasound to locate and measure abdominal organs and structures in a crewmember subject; (2) use of a portable ultrasound to insert a small needle and drain into a fluid-filled cystic cavity in a simulated patient; (3) surgical repair of two arteries in a simulated patient; (4) cystoscopy and use of a ureteral basket to remove a renal stone in a simulated patient; and (5) laparoscopic cholecystectomy in a simulated patient. During the actual mission, the crewmembers performed the procedures without or with telementoring and telerobotic assistance from experts located in Hamilton, Ontario. The results of the NEEMO 7 medical experiments demonstrated that telehealth interventions rely heavily on a robust broadband, high data rate telecommunication link; that certain interventional procedures can be performed adequately by minimally trained individuals with telementoring assistance; and that prior clinical experience does not always correlate with better procedural performance. As space missions become longer in duration and take place further from Earth, enhancement of medical care capability and expertise will be required. The kinds of medical technologies demonstrated during the NEEMO 7 mission may play a significant role in enabling the human exploration of space beyond low earth orbit, particularly to destinations such as the Moon and Mars.

  13. An Assessment of the Effectiveness of Computer-based Training for Newly Commissioned Surface Warfare Division Officers

    National Research Council Canada - National Science Library

    Bowman, William R; Crawford, Alice M; Mehay, Stephen; Stoker, Carol; Paynter, Robert

    2008-01-01

    ...) on-board an officer's ship. The study relied on a variety of analytical techniques, including a literature review of CBT and OJT training, interviews and focus groups with junior and senior surface warfare officers...

  14. Undersea vehicles and national needs

    National Research Council Canada - National Science Library

    National Research Council Staff; Commission on Engineering and Technical Systems; Division on Engineering and Physical Sciences; National Research Council; National Academy of Sciences

    .... Advances in guidance and control, communications, sensors, and other technologies for undersea vehicles can provide an opportunity to understand the oceans' influence on the energy and chemical...

  15. Academic Training Lectures | Stuxnet and Cyber-Warfare | 13-14 January 2016

    CERN Multimedia

    2015-01-01

    Please note that the next series of Academic Training Lectures will take place on 13 and 14 January 2016. The lectures will be given by Gian Piero Siroli (Università e INFN, Bologna (IT))   Stuxnet and Cyber-Warfare (1/2)​ on Wednesday, 13 January from 11 a.m. to 12 p.m. http://indico.cern.ch/event/438525/ Stuxnet and Cyber-Warfare (2/2) on Thursday, 14 January from 11 a.m. to 12 p.m. http://indico.cern.ch/event/438526/ at CERN, Council Chamber (503-1-001)  Description: The first part of the lecture is devoted to the description of the Stuxnet worm, the first cyber-weapon whose existence has been made public, discovered in 2010 and targeting a specific industrial control system; the worm is responsible for the damaging of many centrifuges at an uranium enrichment facility, with the goal of sabotaging Iran&...

  16. The use of advanced simulation in the training of anesthesiologists to treat chemical warfare casualties.

    Science.gov (United States)

    Berkenstadt, Haim; Ziv, Amitai; Barsuk, Daphna; Levine, Inbal; Cohen, Amir; Vardi, Amir

    2003-06-01

    Training anesthesiologists to treat nerve gas intoxication in a mass casualty scenario is a complicated task. The scenario is an unfamiliar medical situation involving the need to decontaminate patients before providing definitive medical treatment, and the need for physical protection to the medical team before decontamination. We describe the development of a simulation-based training program. In one site of a virtual hospital, anesthesiologists were trained in initial airway and breathing resuscitation before decontamination while wearing full protective gear. In another site, they were trained in the treatment of critically-ill patients with combined conventional and chemical injuries or severe intoxication. Intubation simulators of newborn, pediatric, and adult patients, advanced full-scale simulators, and actors simulating patients were used. Initial airway, breathing, and antidotal treatment were performed successfully, with or without full protective gear. The gas mask did not interfere with orotracheal intubation, but limited effective communication within the medical team. Chemical protective gloves were the limiting factor in the performance of medical tasks such as fixing the orotracheal tube. Twenty-two participants (88%) pointed out that the simulated cases represented realistic problems in this scenario, and all 25 participants found the simulated-based training superior to previous traditional training they had in this field. Using advanced simulation, we were able to train anesthesiologists to treat nerve gas intoxication casualties and to learn about the limitations of providing medical care in this setting. Advanced medical simulation can be used to train anesthesiologists to treat nonconventional warfare casualties. The limitations of medical performance in full protective gear can be learned from this training.

  17. A Proficiency-Based Cost Estimate of Surface Warfare Officer On-the-Job Training

    Science.gov (United States)

    2011-12-01

    for “better schooling, and a surface warfare pin equivalent to the dolphins worn by submariners or the wings by the aviators” (Robinson, 2008...Historical Perspective from World War II to 2008. Fort Leavenworth: U.S. Army Command and General Staff College. Rocci, R. (2003). A Cognitive and

  18. Undersea Laser Communications Field Test at the Naval Undersea Warfare Center (NUWC)

    Science.gov (United States)

    2016-08-30

    The water transmissivity and volume scattering function were measured throughout the experiment to calibrate the results. The field test data for...through the challenging medium of natural waters with relatively low loss (compared to most electromagnetic frequencies). With terahertz (THz) of...communication impact of transmitter and receiver design elements. In- water characterization data is vital to guide lasercom terminal design. The

  19. Fourth Generation Undersea Warfare: Getting C2 for Undersea Connectivity Right

    Science.gov (United States)

    2013-06-01

    butter ” debate has brought into sharper focus the consistent theme that the U.S. military may not have the strategic assets needed to deter, and if...exploit valuable fisheries and seabed resources, 11 including oil , gas and minerals. The three seas contain the vast majority of China’s...evolving to fit the unique characteristics of information age power, competition and conflict. Information technology and advanced warfighting

  20. Multi-core fiber undersea transmission systems

    DEFF Research Database (Denmark)

    Nooruzzaman, Md; Morioka, Toshio

    2017-01-01

    Various potential architectures of branching units for multi-core fiber undersea transmission systems are presented. It is also investigated how different architectures of branching unit influence the number of fibers and those of inline components....

  1. Can undersea voltage measurements detect tsunamis?

    Digital Repository Service at National Institute of Oceanography (India)

    Manoj, C.; Kuvshinov, A.; Neetu, S.; Harinarayana, T.

    The movement of electrically conducting ocean water in the ambient geomagnetic field induces secondary electric and magnetic fields in the oceans. Ocean water transport is now routinely inferred from undersea cable voltage data. We try to answer...

  2. An assessment of the effectiveness of computer-based training for newly commissioned Surface Warfare Division officers. / by William R. Bowman, Crawford, Alice M., Stephen Mehay.

    OpenAIRE

    Bowman, William R.; Crawford, Alice M.; Mehay, Stephen

    2009-01-01

    Approved for public release; distribution unlimited. The goal of this study was to analyze the effectiveness of the new SWOS-at-Sea training for newly commissioned surface warfare officers that was introduced in 2003. The new regime combined self-paced computer-based training (CBT) with on-the-job training (OJT) on-board an officer's ship. The study relied on a variety of analytical techniques, including a literature review of CBT and OJT training, interviews and focus groups with junior a...

  3. Refocusing Cyber Warfare Thought

    Science.gov (United States)

    2013-02-01

    the service placed two vastly different career fields into a single training pipeline? Does radar jamming belong to the same class of warfare as...patch newly discovered flaws, and private antivirus companies that develop signatures to inoculate systems to new mal- ware.21 Meanwhile, highly

  4. Governing Warfare

    DEFF Research Database (Denmark)

    Harste, Gorm

      It would seem as though warfare has gotten out of control, not only in Iraq and Afghanistan, but also in Central Africa. The paper outlines the strategic history of politically controlled warfare since the early Enlightenment. The argument is that control is implausible. The idea of control has...... the risks of lacking unity and displays the organisational trap to the fatal political myth of controlled warfare: Does it come from the military organisation system itself, from political ideologies of goal-rational governance, or from the chameleonic logic of wars?  ...

  5. Information Warfare

    OpenAIRE

    Darczewska, Jolanta; Żochowski, Piotr; Orttung, Robert W.; Laruelle, Marlene; Pörzgen, Gemma

    2017-01-01

    This edition addresses information warfare. Firstly, Jolanta Darczewska and Piotr Żochowski examine the use of “active measures” by Russian special services in support of Russian foreign policy. Secondly, Robert W. Orttung argues that Russia has sought to use various information warfare techniques to sow division and chaos in the U.S., but it remains unclear to what extent Russian actions had an impact on the thinking or behavior of American citizens. Thirdly, Marlene Laruelle considers the t...

  6. Human productivity experience and undersea habitat design

    Science.gov (United States)

    Taylor, T. C.; Spencer, J. S.

    1985-01-01

    Lessons learned from the Alaskan North Slope construction camps and the Western Regional Undersea Laboratory are analyzed with respect to possible improvements for space station interior space utilization and living areas. The human factors engineering aspects have a direct bearing on the condition of crew and occupants.

  7. Undersea Laser Communication with Narrow Beams

    Science.gov (United States)

    2015-09-29

    Underwater Wireless Optical Communications ...Gbit/s underwater wireless optical communications using directly modulated 520 nm laser diode," Optics Express, vol. 23, no. 16, pp. 20743-20748, 2015. ... wireless communication with narrow optical beams. The undersea systems analysis herein is inspired by lessons learned in the last few

  8. The Alpini Effect: Why the US Army Should Train Units for Mountain Warfare

    Science.gov (United States)

    2014-05-22

    smoke , flags, mirrors, or hand movements can be effective simple signals, but need to be trained and engrained into unit standard operating...Libya, Liechtenstein, Macedonia, Malawi, Malaysia , Mali, Mexico, Mongolia, Montenegro, Morocco, Mozambique, Myanmar, Namibia, Nepal, Nicaragua

  9. Air Warfare

    Science.gov (United States)

    2002-03-01

    genus as its predecessor of pre-war days. It would, however, be erroneous to conclude from this that the military value of each new development was...marked by periods of crescendo, air warfare will consist of a succession of actions of great violence , with periods of almost complete calm between...influence of time, if it should require fif- teen seconds for each airplane to take off, and one minute to land, the commander of a group of 100 airplanes

  10. Hybrid Warfare

    Science.gov (United States)

    2013-08-01

    Office, Title 10, U.S. Code ; Act of 5 May 1960. 3. 2010 Quadrennial Defense Review Report, February 2010, 8. 4. Hybrid Warfare, Global Accountability...Rise of Hybrid Wars.” Proceedings 132 (November 2005); William J. Nemeth , Future War and Chechnya: A Case for Hybrid War- fare (master’s thesis, U.S...William J. Nemeth which represents the earliest scholarly work on the subject, in which the emergence of devolved hybrid societies gives rise to hybrid

  11. Recommended Architecture for a Knowledge Management System for the Undersea Launchers Division at the Naval Undersea Warfare Center

    Science.gov (United States)

    2010-09-01

    driven knowledge managment initiative. Master’s thesis. Naval Postgraduate School, Monterey, CA. Cong, X., & Pandya, K. V. (2003). Issues of...Department of Defense Instruction 8520.2 . Wennergren, D. M. (2005, October 20). Memorandum, Department of the Navy Knowledge Managment Strategy

  12. Undersea Feature Place Names as of June 2014

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — There are approximately 5100 undersea features with names approved by the United States Board on Geographic Names (BGN) currently in the Geographic Names Data Base...

  13. Drone warfare

    Science.gov (United States)

    Gusterson, Hugh

    2017-11-01

    Crude drones existed as early as World War I, but the technology matured in the Yugoslav Wars of the 1990s and the current wars around the Middle East. The U.S. first used a weaponized drone in late 2001, in Afghanistan. Drones may cause more or less civilian casualties depending on the targeting protocols employed by their operators. There is an inherent ambiguity in determining who is an insurgent from several thousand feet, but civilian casualties are likely to be higher if targeters emphasize "signature strikes" over "personality strikes," if they engage in "double-tap strikes," if they rely too much on local informants, and if they rely too heavily on cellphone identification in the absence of corroboration from other intelligence sources. The legality of drone warfare is fairly clear in established battle zones such as Afghanistan, but is more problematic in terms of both international and domestic law when it comes to drone strikes in countries such as Yemen, Pakistan and Somalia with which the U.S. is not at war. Looking to the future, the U.S. would be well advised to sponsor negotiations for an international drone convention that might establish clear international rules for the use of drones, ban autonomous smart drones, and establish adjudicatory procedures to handle allegations of war crimes.

  14. Multi-core Fibers in Submarine Networks for High-Capacity Undersea Transmission Systems

    DEFF Research Database (Denmark)

    Nooruzzaman, Md; Morioka, Toshio

    2017-01-01

    Application of multi-core fibers in undersea networks for high-capacity submarine transmission systems is studied. It is demonstrated how different architectures of submerged branching unit affect network component counts in long-haul undersea transmission systems......Application of multi-core fibers in undersea networks for high-capacity submarine transmission systems is studied. It is demonstrated how different architectures of submerged branching unit affect network component counts in long-haul undersea transmission systems...

  15. Information Warfare and International Law

    National Research Council Canada - National Science Library

    Greenberg, Lawrence T; Goodman, Seymour E; Soo Hoo, Kevin J

    1998-01-01

    The development of "information warfare" presents international legal issues that will complicate nations' efforts both to execute and to respond to certain information warfare attacks, specifically...

  16. Hybrid Warfare and Lawfare

    OpenAIRE

    Bachmann, Sascha-Dominik; Mosquera, Andres B Munoz

    2015-01-01

    Hybrid Warfare as a method of war is not new. The change today appears to be that Hybrid Warfare “has the potential to transform the strategic calculations of potential belligerents [it has become] increasingly sophisticated and deadly”. This short paper presents Hybrid Warfare and one of its methods, lawfare. For this, we provide a current, comprehensive definition of hybrid warfare and examine different areas where law has been/is being used as a method of war. This paper focuses on the fol...

  17. Flying Electronic Warfare Laboratory

    Data.gov (United States)

    Federal Laboratory Consortium — FUNCTION: Provides NP-3D aircraft host platforms for Effectiveness of Navy Electronic Warfare Systems (ENEWS) Program antiship missile (ASM) seeker simulators used...

  18. Information Warfare and Ethics

    Directory of Open Access Journals (Sweden)

    M.J. Warren

    2001-05-01

    Full Text Available This paper examines the ethics of the practice of information warfare at both the national and corporate levels. Initially examining the present and past actions of individual hackers, it moves to the more organised, future military and economic warfare scenarios. It examines the lack of legal or policy initiatives in this area.

  19. An Assessment of the Effectiveness of Computer-based Training for Newly Commissioned Surface Warfare Division Officers

    Science.gov (United States)

    2009-08-24

    to the SWOSDOC; the second was the move from SWOSDOC to his or her first duty station. According to the DoN FY2009 Budget, the Navy spent over $809...and the officer dons the coveted SWO “pin.” Two years into the new training régime, concerns began to surface that the self-directed training may...diverse contexts of distance education is likely a quixotic quest” (2003, p. 141). 4. Collaboration Collaboration, also mentioned in the literature

  20. Experimental Studies of Welding Effects on Damping for Undersea Warfare Applications

    National Research Council Canada - National Science Library

    Carey, Agustin

    2002-01-01

    .... The purpose of this research is to study the effects that welding has on damping. Measurements and comparisons of the damping ratios of two welded stiffened plates, two flat plates and one machined stiffened plate are undertaken...

  1. Defining cyber warfare

    Directory of Open Access Journals (Sweden)

    Dragan D. Mladenović

    2012-04-01

    Full Text Available Cyber conflicts represent a new kind of warfare that is technologically developing very rapidly. Such development results in more frequent and more intensive cyber attacks undertaken by states against adversary targets, with a wide range of diverse operations, from information operations to physical destruction of targets. Nevertheless, cyber warfare is waged through the application of the same means, techniques and methods as those used in cyber criminal, terrorism and intelligence activities. Moreover, it has a very specific nature that enables states to covertly initiate attacks against their adversaries. The starting point in defining doctrines, procedures and standards in the area of cyber warfare is determining its true nature. In this paper, a contribution to this effort was made through the analysis of the existing state doctrines and international practice in the area of cyber warfare towards the determination of its nationally acceptable definition.

  2. Living in contained environments: Research implications from undersea habitats. [undersea habitats

    Science.gov (United States)

    Helmreich, Robert L.

    1986-01-01

    A cost-reward model is used to frame a discussion of differences in observed behavior of individuals and groups in confined environments. It has been observed that the high cost of functioning in a stressful environment is likely to produce poor performance when anticipated rewards are low but that participants can manage the stress and achieve high performance if they anticipate high rewards. The high-reward environment is exemplified by early undersea habitats such as Sealab and Tektite and by early space missions. Other aspects of behavior occur in all confined environments and point to an important area for future research. Of particular interest are intergroup conflicts arising between the confined group and its external control. Also, individual differences in personality seem always to have an impact in confined environments. Recent research has focused on: (1) predicting performance and adjustment based on instrumental and expressive aspects of the self; (2) the differential predictive power of achievement striving and irritation/irritability in Type A personalities; and (3) the nature and role of leadership in small, isolated groups.

  3. Trace Explosives Signatures from World War II Unexploded Undersea Ordnance

    Science.gov (United States)

    Darrach, M. R.; Chutjian, A.; Plett, G. A.

    1998-01-01

    Trace explosives signatures of TNT and DNT have been extracted from multiple sediment samples adjacent to unexploded undersea ordnance at Halifax Harbor, Canada. The ordnance was hurled into the harbor during a massive explosion some 50 years earlier, in 1945 after World War II had ended. Laboratory sediment extractions were made using the solid-phase microextraction (SPME) method in seawater and detection using the Reversal Electron Attachment Detection (READ) technique and, in the case of DNT, a commercial gas chromatograph/mass spectrometer (GC/MS). Results show that, after more than 50 years in the environment, ordnance that appeared to be physically intact gave good explosives signatures at the parts per billion level, whereas ordnance that had been cracked open during the explosion gave no signatures at the 10 parts per trillion sensitivity level. These measurements appear to provide the first reported data of explosives signatures from undersea unexploded ordnance.

  4. Cyber Warfare/Cyber Terrorism

    National Research Council Canada - National Science Library

    O'Hara, Timothy

    2004-01-01

    Section 1 of this paper provides an overview of cyber warfare as an element of information warfare, starting with the general background of the current strategic environment the United States is operating...

  5. Chemical warfare agents

    Directory of Open Access Journals (Sweden)

    Vijayaraghavan R

    2010-01-01

    Full Text Available Among the Weapons of Mass Destruction, chemical warfare (CW is probably one of the most brutal created by mankind in comparison with biological and nuclear warfare. Chemical weapons are inexpensive and are relatively easy to produce, even by small terrorist groups, to create mass casualties with small quantities. The characteristics of various CW agents, general information relevant to current physical as well as medical protection methods, detection equipment available and decontamination techniques are discussed in this review article. A brief note on Chemical Weapons Convention is also provided.

  6. Toward Operational Art in Special Warfare: Appendixes

    Science.gov (United States)

    2016-01-01

    groups to endure great hardship and work toward a common goal of driving out the infidel to defend their faith. Insights for special warfare Nuclear... financing , and the International Military Education and Training program (IMET). These programs are typically authorized and funded by DoS and executed...Organizations at U.S. embassies. In par- allel, the Security Assistance Organizations also submit requests through the foreign military financing /IMET

  7. Gray Zone Warfare: German and Russian Political Warfare, 1935-1939, and 2001

    Science.gov (United States)

    2017-06-09

    separated periods. 15. SUBJECT TERMS Political Warfare, Psychological Warfare, Unconventional Warfare, Hybrid Warfare, Asymmetrical Warfare, Gray Zone...Russia ............................................................................................................................ 56 Psychological ...the waging of psychological and economic warfare to the furtherance of war aims and the organization of the fighting strength of the nation to the

  8. Biological and Chemical Warfare

    African Journals Online (AJOL)

    and entrails over the walls to induce a plaque and defecate into wells and water supplies. The. Romans tilted ... modern military weapons, discussions of their characteristics and potential threat have to draw heavily upon .... poisoning of water in desert warfare is his- torical, having continued through the time of. World War II.

  9. The Physics of Warfare

    Science.gov (United States)

    Giordano, Gerardo

    2015-01-01

    Recently, I was tasked with the creation and execution of a new themed general education physics class called The Physics of Warfare. In the past, I had used the theme of a class, such as the physics of sports medicine, as a way to create homework and in-class activities, generate discussions, and provide an application to demonstrate that physics…

  10. Hybrid Maritime Warfare

    DEFF Research Database (Denmark)

    Schaub Jr, Gary John; Murphy, Martin; Hoffman, Frank

    2017-01-01

    Russia’s use of hybrid warfare techniques has raised concerns about the security of the Baltic States. Gary Schaub, Jr, Martin Murphy and Frank G Hoffman recommend a series of measures to augment NATO’s Readiness Action Plan in the Baltic region, including increasing the breadth and depth of naval...... of a larger hybrid campaign...

  11. Aluminum-Water Energy System for Autonomous Undersea Vehicles

    Science.gov (United States)

    2015-04-10

    between the Department of Mechanical Engineering at MIT and Lincoln Laboratory to address the problems inherent in powering autonomous undersea vehicles...Many fuel sources have been considered to power AUVs. Combustible organic fuels, such as gasoline or jet propellant, are energy dense but have not...refuel Safe Low noise Power on demand Eco-friendly Battery       Wave energy N/A N/A    Solar N/A    Docking N/A

  12. Electronic Warfare Signature Measurement Facility

    Data.gov (United States)

    Federal Laboratory Consortium — The Electronic Warfare Signature Measurement Facility contains specialized mobile spectral, radiometric, and imaging measurement systems to characterize ultraviolet,...

  13. Information Warfare and International Law

    National Research Council Canada - National Science Library

    Greenberg, Lawrence T; Goodman, Seymour E; Soo Hoo, Kevin J

    1998-01-01

    .... Some legal constraints will certainly apply to information warfare, either because the constraints explicitly regulate particular actions, or because more general principles of international law...

  14. Obstacle Avoidance for Unmanned Undersea Vehicle in Unknown Unstructured Environment

    Directory of Open Access Journals (Sweden)

    Zheping Yan

    2013-01-01

    Full Text Available To avoid obstacle in the unknown environment for unmanned undersea vehicle (UUV, an obstacle avoiding system based on improved vector field histogram (VFH is designed. Forward looking sonar is used to detect the environment, and the divisional sonar modal is applied to deal with the measure uncertainty. To adapt to the VFH, rolling occupancy grids are used for the map building, and high accuracy details of local environment are obtained. The threshold is adaptively adjusted by the statistic of obstacles to solve the problem that VFH is sensitive to threshold. To improve the environment adaptability, the hybrid-behaviors strategy is proposed, which selects the optimal avoidance command according to the motion status and environment character. The simulation shows that UUV could avoid the obstacles fast and escape from the U shape obstacles.

  15. Psychological effects of nuclear warfare

    International Nuclear Information System (INIS)

    Mickley, G.A.

    1987-01-01

    This report is divided into five parts. (1) Discussion of the psychological milieu before a nuclear confrontation. (2) Acute psychological reactions to nuclear warfare (some of which may reflect, in part, direct radiogenic alteration of nervous system functions). (3) Chronic psychological effects of a nuclear confrontation. (4) Issues concerning treatment of these psychological changes. (5) Prevention of adverse psychological reactions to nuclear warfare

  16. The evolution of human warfare.

    Science.gov (United States)

    Pitman, George R

    2011-01-01

    Here we propose a new theory for the origins and evolution of human warfare as a complex social phenomenon involving several behavioral traits, including aggression, risk taking, male bonding, ingroup altruism, outgroup xenophobia, dominance and subordination, and territoriality, all of which are encoded in the human genome. Among the family of great apes only chimpanzees and humans engage in war; consequently, warfare emerged in their immediate common ancestor that lived in patrilocal groups who fought one another for females. The reasons for warfare changed when the common ancestor females began to immigrate into the groups of their choice, and again, during the agricultural revolution.

  17. Submersible Combatant Concept for Improved Littoral Warfare

    National Research Council Canada - National Science Library

    Leadmon, John

    2004-01-01

    .... power projection in many areas of the world. This problem is especially evident in the littoral environment, where enemy forces may employ a host of access denial methods including submarines, mines, small boats, and undersea sensor systems...

  18. Cyber Warfare/Cyber Terrorism

    National Research Council Canada - National Science Library

    O'Hara, Timothy

    2004-01-01

    .... Section 1 concludes with a review of offensive and defensive cyber warfare concepts. Section 2 presents a general overview of cyber terrorism, including definitions of cyber terrorism and cyber terrorism support...

  19. Attrition in Network Centric Warfare

    National Research Council Canada - National Science Library

    Erbetta, John

    2003-01-01

    .... Information warfare means that positive attacks on systems themselves compound the problem. Emerging technologies applicable to NCW as a force multiplier need to be recognized as counter to the impediments to progress...

  20. The ethics of information warfare

    CERN Document Server

    Floridi, Luciano

    2014-01-01

    This book offers an overview of the ethical problems posed by Information Warfare, and of the different approaches and methods used to solve them, in order to provide the reader with a better grasp of the ethical conundrums posed by this new form of warfare.The volume is divided into three parts, each comprising four chapters. The first part focuses on issues pertaining to the concept of Information Warfare and the clarifications that need to be made in order to address its ethical implications. The second part collects contributions focusing on Just War Theory and its application to the case of Information Warfare. The third part adopts alternative approaches to Just War Theory for analysing the ethical implications of this phenomenon. Finally, an afterword by Neelie Kroes - Vice President of the European Commission and European Digital Agenda Commissioner - concludes the volume. Her contribution describes the interests and commitments of the European Digital Agenda with respect to research for the developme...

  1. Air Power and Maneuver Warfare

    Science.gov (United States)

    1994-07-01

    way to integrate air power on the one hand with maneuver warfare on the other. While American commanders such as Robert E. Lee and George S. Patton...MANEUVER WARFARE years .’ Nevertheless, it should not be forgotten that few commanders of any time or place have fought as many great battles- batailles ...the process to a boxer who uses one arm to parry his opponent’s punches and draw his attention while striking with the other. Gen George S. Patton

  2. Nuclear radiation in warfare

    International Nuclear Information System (INIS)

    Rotblat, J.

    1986-01-01

    The subject is covered in chapters, entitled: introduction; digest of nuclear weaponry (characteristics of nuclear weapons; effects of nuclear weapons other than ionizing radiation (fire-ball, fall-out, thermal radiation, blast wave, electromagnetic pulse); the nuclear arms race; war scenarios; biological effects of radiations on man (radiation doses; natural sources of radiation; acute effects of radiation; long-term somatic effects; genetic effects; factors affecting the biological response to radiation; internal exposure; synergistic effects; protection against radiation effects); radiations from nuclear explosions (initial radiation; fall-out; effects of fall-out on animal and plant life; contamination of water and food supplies by fall-out); radiation casualties in a nuclear war; effectiveness of civil defence; other warlike uses of radiation (attacks on civilian nuclear power installations; radiological warfare; terrorist activities); conclusion. (orig./HP) [de

  3. Nuclear radiation in warfare

    International Nuclear Information System (INIS)

    Rotblat, J.

    1981-01-01

    The subject is covered in chapters, entitled: introduction; digest of nuclear weaponry (characteristics of nuclear weapons; effects of nuclear weapons other than ionizing radiation (fire-ball, fall-out, thermal radiation, blast wave, electromagnetic pulse); the nuclear arms race; war scenarios); biological effects of radiations on man (radiation doses; natural sources of radiation; acute effects of radiation; long-term somatic effects; genetic effects; factors affecting the biological response to radiation; internal exposure; synergistic effects; protection against radiation effects); radiations from nuclear explosions (initial radiation; fall-out; effects of fall-out on animal and plant life; contamination of water and food supplies by fall-out); radiation casualties in a nuclear war; effectiveness of civil defence; other warlike uses of radiation (attacks on civilian nuclear power installations; radiological warfare; terrorist activities); conclusion. (U.K.)

  4. Reflections on nuclear warfare

    International Nuclear Information System (INIS)

    Evans, J.P.

    1983-01-01

    The author looks back on his more than 70 years of familiarity with Americans involved in warfare, noting their loyal support for our country's objectives. Drawing on the Einstein equation, his own visits to Hiroshima and Nagasaki, and current literature, he, as a physician, belatedly concurs with those who look on the use of nuclear weapons as irrational and untenable. Their employment under present circumstances would create a ''final epidemic'' to be avoided only by prevention. He suggests that medical perceptions must be considered by our national leaders in assessing the many factors that he hopes will lead to rational answers to this urgent, highly complex, and vital enigma. He cites physicians' efforts to help in finding answers and asks that his colleagues consider the issues with attention to the gravity of the situation and act according to their best judgment

  5. Bio-Optical and Hydrographic Characteristics of the Western Pacific Ocean for Undersea Warfare Using Seaglider Data

    Science.gov (United States)

    2014-12-01

    Oceanography, and T. James Osse, Russell D. Light, Timothy Wen, Thomas W. Lehman, and Peter L. Sabin of the University of Washington Applied Physics...Salkind, J.M. Sinnett, and G.E. Whistler , Jr., 2000: “Naval Research Advisory Committee Report Unmanned Vehicles (UV) In Mine Countermeasures(U

  6. Combating the ASW Threat with Operational Art: Ensuring Efficiency through Unity of Effort with the Theater Undersea Warfare Commander

    Science.gov (United States)

    2012-05-04

    accessed 24 February 2012, JSTOR . 6 modern technology to penetrate the oceans depths with any consistency provides submarines a distinct advantage in...2012. JSTOR . Luck, Gary GEN (ret) and Col (ret) Mike Findley. “Joint Operations Insights and Best Practices 2 nd Edition.” Norfolk, VA: Joint

  7. Intelligence Strategy for Fourth Generation Warfare

    National Research Council Canada - National Science Library

    Jamison, Edward P

    2006-01-01

    ...." They have named this new era of war "fourth generation warfare." Currently the Department of Defense's intelligence strategy is designed to defeat conventional adversaries vise a fourth generation warfare opponent...

  8. ISIL's Hybrid Warfare in Syria & Iraq

    DEFF Research Database (Denmark)

    Sørensen, Heine

    2016-01-01

    The case study specifically seeks to answer the following problem statement: Does ISIL qualify as an actor using hybrid warfare and if so what characterizes their particular use of this type of warfare? Based on an analysis of ISIL’s warfare from August 2012 to August 2016 the chapter argues, tha...

  9. Cognitive systems in electronic warfare

    Science.gov (United States)

    Kulpa, Krzysztof; Szczepankiewicz, Michał; Żywek, Marcin; Malanowski, Mateusz; Misiurewicz, Jacek; Samczyński, Piotr

    2017-04-01

    Electronic warfare (EW) techniques were invented 70 years ago and are still being developed, all the time with a key role played by their operators. However, a human operator responds far too slowly for the on-going needs since to be adequate to current threats the EW system reaction should be within 1 ms or less. Too slow reaction defers an achievement of the objectives, and generally may lead to disclosure of the applied strategy and to waste of resources. Developing the adequate response to the threat is a multifaceted matter that requires considerable experience and knowledge on the one hand, and thorough observation of outcomes of the applied strategy on the other hand. Such action requires the use of not only intelligence but also more complex algorithms for automatic control than the classical ones, and it heavily builds on the experience. It is therefore a cognitive task in its nature, and a human operator acts naturally this way. Consequently, a proper training and experience gained are what really matters. As a result of tests and actions in EW the operator builds his own knowledge base, thus, gains a capability of responding to the known threats in a balanced way. New threats, however, are much more challenging since they should be handled as fast as possible but in a fresh and creative manner. To this end, adapting the algorithms of radar jamming protection for the new conditions of the battlefield is an example of such challenging tasks. At present, such adjustments are done in a long feedback loop when the operator, after recognizing the problem, notifies the equipment manufacturers, and then, their engineers work on required solutions accordingly. Thus, the reaction time is counted in years, not a single milliseconds or seconds. Speeding up the response time is therefore the key issue, and a solution to it would be feasible only when cognitive systems were used. A concept of such cognitive system is presented in this paper.

  10. The NEEMO Project: A Report on how NASA Utilizes the "Aquarius" Undersea Habitat as an Analog for Long-Duration Space Flight

    Science.gov (United States)

    Reagan, Marc; Todd, William

    2003-01-01

    NEEMO is the NASA Extreme Environment Mission Operations, a cooperative project between NASA and the National Oceanic and Atmospheric Administration (NOAA). NEEMO was created and is managed by the Mission Operations Directorate at the Johnson Space Center in Houston, Texas. On the NOAA side, the National Undersea Research Center (NURC) in Key Largo, FL, with the help of the University of North Carolina at Wilmington, manages and operates the Aquarius Program. NEEMO was developed by astronaut training specialists to utilize an undersea research habitat as a multi-objective mission analog for long-duration space flight. Each mission was designed to expose astronauts to extreme environments for training purposes and to research crew behavior, habitability, and space analog life sciences. All of this was done much in the model of a space mission utilizing specific crew procedures, mission rules and timelines. Objectives of the missions were very diverse and contained many of the typical space mission type activities such as EV As (also known as extra vehicular activities), in-habitat science and research, and educational, public outreach, and media events. Five missions, dubbed NEEMO 1-5, were conducted between October 2001 and July 2003, the longest of which (NEEMO 5) lasted 14 days.

  11. Special Warfare: A Selected Bibliography.

    Science.gov (United States)

    1983-10-01

    Digest, Vol. 18, January 1963, pp. 36-41. 313. Van de Velde , R. W. "the Neglected Deterrent (Guerrilla Warfare)." Military Review, Vol. 38, August...34Principles of Modern Chinese Strategy." NATO’s Fifteen Nations, Vol. 8, June-July 1963, pp. 44-49. 255. Purcell, Henry . "Night Patrolling and District...September 1970, pp. 2-8. 331. Whittier, Henry S. "Soviet Special Operations/Partisan Warfare: Implications for Today." Military Review, Vol. 59, January 1979

  12. The doctor and nuclear warfare

    International Nuclear Information System (INIS)

    Anon.

    1982-01-01

    At the 34th World Medical Assembly in Lisbon in 1981 the World Medical Association adopted a motion proposed by the American Medical Association that national medical associations should develop programs to educate the civilian population on the medical consequences of nuclear war. This article discusses the attitude the medical professions should have, should nuclear warfare in some form confront them in the future. The conclusion is drawn that defence against nuclear warfare is only a part of civil defence against any disaster, including the natural disasters such as flood and fire and the man-made disasters of transport accidents, even of problems at nuclear plants designed to supply energy

  13. The Anatomy of Counterinsurgency Warfare

    DEFF Research Database (Denmark)

    Mouritsen, Lars; Pedersen, Kenneth; Thruelsen, Peter Dahl

    Since the beginning of the new millennium, the West has been increasingly involved in a tiresome and rather particular type of conflict: insurgency warfare. The bloody and shocking terrorist attacks on New York and Washington in September 2001 marked the beginning of a new era, and the introducti...

  14. European Curricula, Xenophobia and Warfare.

    Science.gov (United States)

    Coulby, David

    1997-01-01

    Examines school and university curricula in Europe and the extent of their influence on xenophobia. Considers the pluralistic nature of the European population. Discusses the role of curriculum selection and language policy in state efforts to promote nationalism. Assesses the role of curricular systems in the actual encouragement of warfare,…

  15. The Covert Use of the Global Special Operations Network and the Militarization of Covert Action in Political Warfare and the Gray Zone

    Science.gov (United States)

    2017-06-09

    84 Psychological Warfare Operations...Oxford University Press, 1971). 16 Charles Cruickshank,. The Fourth Arm: Psychological Warfare 1938-1945 (London, UK: Davis-Poynter, 1977), 69. 13...capability for clandestine intelligence collection and sabotage operations, in 1950, the Army only had about 20 personnel trained in psychological

  16. Information and Knowledge Centric Warfare: The Next Steps in the Evolution of Warfare

    National Research Council Canada - National Science Library

    Phister, Jr., Paul W; Plonisch, Igor G

    2004-01-01

    ...: transitioning from network-centric/information-centric to knowledge-centric warfare. Network-centric warfare is built around human and organizational behavior a new way of thinking in terms of linkages...

  17. Stuxnet and Cyber-Warfare (2/2)

    CERN Multimedia

    CERN. Geneva

    2016-01-01

    The first part of the lecture is devoted to the description of the Stuxnet worm, the first cyber-weapon whose existence has been made public, discovered in 2010 and targeting a specific industrial control system; the worm is responsible for the damaging of many centrifuges at an uranium enrichment facility, with the goal of sabotaging Iran's nuclear program. In the second part, the main features of cyber-warfare in conflict and pre-conflict activities will be discussed and compared to the conventional warfare domains, with also a general view at the international political debate on this topic.   Check the http://pugwash.org web site, an organisation that seeks a world free of nuclear weapons and other weapons of mass destruction. The lecturer invites comments via email to Gian.Piero.Siroli@cern.ch NB! All Academic Training lectures are recorded and are publicly available. There is no live webcast.

  18. Stuxnet and Cyber-Warfare (1/2)

    CERN Multimedia

    CERN. Geneva

    2016-01-01

    The first part of the lecture is devoted to the description of the Stuxnet worm, the first cyber-weapon whose existence has been made public, discovered in 2010 and targeting a specific industrial control system; the worm is responsible for the damaging of many centrifuges at an uranium enrichment facility, with the goal of sabotaging Iran's nuclear program. In the second part, the main features of cyber-warfare in conflict and pre-conflict activities will be discussed and compared to the conventional warfare domains, with also a general view at the international political debate on this topic. Check the http://pugwash.org web site, an organisation that seeks a world free of nuclear weapons and other weapons of mass destruction.   NB! All Academic Training lectures are recorded and are publicly available. There is no live webcast.

  19. UML modelling of network warfare examples

    CSIR Research Space (South Africa)

    Veerasamy, N

    2011-08-01

    Full Text Available will be determined by arguing their application to Network Warfare A. Consideration of Network Warfare Attributes Network Warfare can be seen as taking place over Information and Communication Technology (ICT) networks to affect information processing... the works of Theohandou, Tipton and Sowa, the following information security techniques emerge: Risk Analysis, Physical Security, Incident Response, Disaster Recovery Planning, Security Awareness, Legal, Regulations and Compliance [15] [16] [17...

  20. MEANS AND METHODS OF CYBER WARFARE

    Directory of Open Access Journals (Sweden)

    Dan-Iulian VOITAȘEC

    2016-06-01

    Full Text Available According to the Declaration of Saint Petersburg of 1868 “the only legitimate object which States should endeavor to accomplish during war is to weaken the military forces of the enemy”. Thus, International Humanitarian Law prohibits or limits the use of certain means and methods of warfare. The rapid development of technology has led to the emergence of a new dimension of warfare. The cyber aspect of armed conflict has led to the development of new means and methods of warfare. The purpose of this paper is to study how the norms of international humanitarian law apply to the means and methods of cyber warfare.

  1. Cyber warfare building the scientific foundation

    CERN Document Server

    Jajodia, Sushil; Subrahmanian, VS; Swarup, Vipin; Wang, Cliff

    2015-01-01

    This book features a wide spectrum of the latest computer science research relating to cyber warfare, including military and policy dimensions. It is the first book to explore the scientific foundation of cyber warfare and features research from the areas of artificial intelligence, game theory, programming languages, graph theory and more. The high-level approach and emphasis on scientific rigor provides insights on ways to improve cyber warfare defense worldwide. Cyber Warfare: Building the Scientific Foundation targets researchers and practitioners working in cyber security, especially gove

  2. Shadow Wars: An Analysis of Counterinsurgency Warfare

    National Research Council Canada - National Science Library

    Dogan, Osman

    2005-01-01

    ... of the current strategic approaches to counterinsurgency warfare. Toward this end, a systems model approach, which views insurgent organizations as open systems, is adapted to the insurgent environment...

  3. Radioecological aspects of nuclear warfare

    International Nuclear Information System (INIS)

    Edvardson, Kay

    1977-01-01

    Radioactive fallout, one of the major effects of nuclear warfare, will cause acute radiation sickness within the close-in or intermediate areas downwind from surface bursts. Global fallout from high yield explosions will be fairly evenly distributed in the hemisphere where the explosions occur, and will cause irradiation from ground deposit, inhaled material and contaminated food. Estimates of collective doses and the approximate number of late casualties from the global contamination are presented for a given total explosion yield. (author)

  4. Defense Science Board Task Force Report on Next-Generation Unmanned Undersea Systems

    Science.gov (United States)

    2016-10-01

    of Special Projects & Underwater Robotics, The Applied Research Laboratory -Penn State Other attendees: VADM Paul Sullivan (USN retired), Director ARL...systems, and the Advanced ProcessorBuild/ Acoustic Rapid Commercial-off-the-Shelf (COTS) Insertion (APB/ARCI) programs for sonarsignal processing. Each...Communications – The limited range and bandwidth of undersea acoustic links restrict thecommand and control, and manned and unmanned teaming options for

  5. NASA 14 Day Undersea Missions: A Short-Duration Spaceflight Analog for Immune System Dysregulation?

    Science.gov (United States)

    Crucian, B. E.; Stowe, R. P.; Mehta, S. K.; Chouker, A.; Feuerecker, M.; Quiriarte, H.; Pierson, D. L.; Sams, C. F.

    2011-01-01

    This poster paper reviews the use of 14 day undersea missions as a possible analog for short duration spaceflight for the study of immune system dysregulation. Sixteen subjects from the the NASA Extreme Enviro nment Mission Operations (NEEMO) 12, 13 and 14 missions were studied for immune system dysregulation. The assays that are presented in this poster are the Virleukocyte subsets, the T Cell functions, and the intracellular/secreted cytokine profiles. Other assays were performed, but are not included in this presntation.

  6. The Information Warfare Life Cycle Model

    Directory of Open Access Journals (Sweden)

    Brett van Niekerk

    2011-03-01

    Full Text Available Information warfare (IW is a dynamic and developing concept, which constitutes a number of disciplines. This paper aims to develop a life cycle model for information warfare that is applicable to all of the constituent disciplines. The model aims to be scalable and applicable to civilian and military incidents where information warfare tactics are employed. Existing information warfare models are discussed, and a new model is developed from the common aspects of these existing models. The proposed model is then applied to a variety of incidents to test its applicability and scalability. The proposed model is shown to be applicable to multiple disciplines of information warfare and is scalable, thus meeting the objectives of the model.

  7. WARFARE IN THE INFORMATION AGE

    Directory of Open Access Journals (Sweden)

    Laurian GHERMAN

    2010-01-01

    Full Text Available The paper is focused on changes occurred in military organizations in Information Age. During Industrial Age the military structure of forces evolved according with principles of decomposition, specialization, hierarchy, optimization, deconfliction, centralized planning, and decentralized execution. But now the solutions based upon Industrial Age assumptions and practices will break down and fail in the Information Age. This will happen no matter how well intentioned, hardworking, or dedicated the leadership and the force are. Two key force capabilities needed by Information Age militaries are interoperability and agility. Both interoperability and agility are provided by Network centric warfare theory of war.

  8. Radioecological aspects of nuclear warfare

    International Nuclear Information System (INIS)

    Edvarson, K.

    1975-01-01

    The radioactive fallout from nuclear explosions is one of the major effects of nuclear warfare. Those levels causing acute radiation sickness are to be expected only within the close-in or intermediate areas downwind from surface bursts. Global fallout from high yield explosions will be fairly evenly distributed in the hemisphere where the explosions occurred and cause irradiation from ground deposit, inhaled material and contaminated food. The collective doses and the order of magnitude of late casualties from this global contamination are estimated for a given total explosion yield. (auth)

  9. Analytic tools for information warfare

    Energy Technology Data Exchange (ETDEWEB)

    Vandewart, R.L.; Craft, R.L.

    1996-05-01

    Information warfare and system surety (tradeoffs between system functionality, security, safety, reliability, cost, usability) have many mechanisms in common. Sandia`s experience has shown that an information system must be assessed from a {ital system} perspective in order to adequately identify and mitigate the risks present in the system. While some tools are available to help in this work, the process is largely manual. An integrated, extensible set of assessment tools would help the surety analyst. This paper describes one approach to surety assessment used at Sandia, identifies the difficulties in this process, and proposes a set of features desirable in an automated environment to support this process.

  10. Point-of-Care Ultrasonography for Undersea Medical Officers

    Science.gov (United States)

    2014-11-01

    National Aeronautics and Space Administration ( NASA ) astronauts are faced with onboard the International Space Station ( ISS ) are very similar to the...endangers the lives of many others. Similar to the military, NASA astronauts’ greatest risks while on a mission are acute trauma and acute medical...sickness. To aid in medical diagnosis in space, NASA has instituted a teleradiology ultrasound program that allows minimally trained astronauts to

  11. Information warfare technologies in political discourse

    Directory of Open Access Journals (Sweden)

    Karpova Anna Yu.

    2016-01-01

    Full Text Available We attempt to examine the technology of «information warfare» in this paper. The dominant theme of the paper is that the outcome of the information warfare is important not only for the future of a state itself but for the future of the world balance of forces. The main task of geopolitical actors in information warfare is to introduce ideas corresponding to their interests into mass consciousness. All participants of political conflicts have common features in technologies of Information warfare. The information anomie is the indicator of the great geopolitical actors’ personified interests on the stage of «information warfare» - the process resulted in destroying the communicative line: report-information understanding and disrupting the social order in society. In this paper authors describe the following Information Warfare technologies: "Political volcano" technology; "SPIN" technology; "Widening media resource" technology; "specific gravity" technology; "Cold War 2.0" technology and Information cleaningup technology. It is assumed that in the future there will be new instructions on applying technologies of information warfare. To impart perspective to the paper we consider examples, opinions and trends.

  12. Combat Training Centers: Training for Full-Spectrum Operations?

    National Research Council Canada - National Science Library

    Diano, Oscar F

    2007-01-01

    The changing strategic environment has necessitated a shift in Army training from traditional maneuver warfare to full-spectrum operations to defeat irregular, catastrophic, and disruptive challenges more effectively...

  13. Object-based classification of global undersea topography and geomorphological features from the SRTM30_PLUS data

    Science.gov (United States)

    Dekavalla, Maria; Argialas, Demetre

    2017-07-01

    The analysis of undersea topography and geomorphological features provides necessary information to related disciplines and many applications. The development of an automated knowledge-based classification approach of undersea topography and geomorphological features is challenging due to their multi-scale nature. The aim of the study is to develop and evaluate an automated knowledge-based OBIA approach to: i) decompose the global undersea topography to multi-scale regions of distinct morphometric properties, and ii) assign the derived regions to characteristic geomorphological features. First, the global undersea topography was decomposed through the SRTM30_PLUS bathymetry data to the so-called morphometric objects of discrete morphometric properties and spatial scales defined by data-driven methods (local variance graphs and nested means) and multi-scale analysis. The derived morphometric objects were combined with additional relative topographic position information computed with a self-adaptive pattern recognition method (geomorphons), and auxiliary data and were assigned to characteristic undersea geomorphological feature classes through a knowledge base, developed from standard definitions. The decomposition of the SRTM30_PLUS data to morphometric objects was considered successful for the requirements of maximizing intra-object and inter-object heterogeneity, based on the near zero values of the Moran's I and the low values of the weighted variance index. The knowledge-based classification approach was tested for its transferability in six case studies of various tectonic settings and achieved the efficient extraction of 11 undersea geomorphological feature classes. The classification results for the six case studies were compared with the digital global seafloor geomorphic features map (GSFM). The 11 undersea feature classes and their producer's accuracies in respect to the GSFM relevant areas were Basin (95%), Continental Shelf (94.9%), Trough (88

  14. The Acme of Skill: Nonkinetic Warfare

    National Research Council Canada - National Science Library

    Teo, Cheng H

    2008-01-01

    .... The insurgency attributes that have characterized many wars since World War II suggest that the objective of warfare has shifted from the kinetic destruction of military forces to the nonkinetic...

  15. Topic modelling in the information warfare domain

    CSIR Research Space (South Africa)

    De Waal, A

    2013-11-01

    Full Text Available In this paper the authors provide context to Topic Modelling as an Information Warfare technique. Topic modelling is a technique that discovers latent topics in unstructured and unlabelled collection of documents. The topic structure can be searched...

  16. Prehistoric ceremonial warfare: beginning of institutionalized violence

    Czech Academy of Sciences Publication Activity Database

    Turek, Jan

    2017-01-01

    Roč. 13, č. 3 (2017), s. 535-548 ISSN 1555-8622 Institutional support: RVO:67985912 Keywords : human aggression * ceremonial warfare * archery symbolism * Neolithic * Chalcolithic * Europe Subject RIV: AC - Archeology, Anthropology, Ethnology OBOR OECD: Archaeology

  17. On Cyber Warfare Command and Control Systems

    National Research Council Canada - National Science Library

    Howes, Norman R; Mezzino, Michael; Sarkesain, John

    2004-01-01

    .... Cyber warfare then becomes a one-sided battle where the attacker makes all the strikes and the target of the attack responds so slowly that the attacker usually gets away without being identified...

  18. Annual Expeditionary Warfare Conference (22nd)

    Science.gov (United States)

    2017-10-24

    Session: Expeditionary Logistics Integration & Expeditionary Medicine Session Co-Chair: Mr. Tom Wetherald, Director Business Development and Strategic...Forces Special Operations Component Command. Mr. thomas Dee, Performing the Duties of the Under secretary of the navy On Feb. 17, 2017, Mr. Tom Dee was...1990) • Col Chip Gregson, “Keeping Up With Navy Doctrine.” MC Gazette, (December 1990) • Maj Tom Waldhauser, “Composite Warfare/Amphibious Warfare

  19. Special Warfare: Restructuring for the Future

    Science.gov (United States)

    2016-06-01

    Boston, MA: Albert Einstein Institution, 2002, 1-9. Hoffman , Frank. “Hybrid Warfare and Challenges.” Joint Forces Quarterly, Issue 52, 1st Quarter...20 Robert Helvey. On Strategic Nonviolence Conflict: Thinking About the Fundamentals. Boston, MA: Albert Einstein Institution, 2002, 2-3...important as the future of warfare becomes increasingly “characterized by uncertainty.”28 As Frank Hoffman has commented, success in hybrid wars will

  20. Guiding Warfare to Reach Sustainable Peace

    DEFF Research Database (Denmark)

    Vestenskov, David; Drewes, Line

    The conference report Guiding Warfare to Reach Sustainable Peace constitutes the primary outcome of the conference It is based on excerpts from the conference presenters and workshop discussions. Furthermore, the report contains policy recommendations and key findings, with the ambition of develo......The conference report Guiding Warfare to Reach Sustainable Peace constitutes the primary outcome of the conference It is based on excerpts from the conference presenters and workshop discussions. Furthermore, the report contains policy recommendations and key findings, with the ambition...

  1. Challenges of Military Health Service Support in Mountain Warfare.

    Science.gov (United States)

    Lechner, Raimund; Küpper, Thomas; Tannheimer, Markus

    2018-03-16

    History is full of examples of the influence of the mountain environment on warfare. The aim of this article is to identify the main environmental hazards and summarize countermeasures to mitigate the impact of this unique environment. A selective PubMed and Internet search was conducted. Additionally, we searched bibliographies for useful supplemental literature and included the recommendations of the leading mountain medicine and wilderness medicine societies. A definition of mountain warfare mainly derived from environmental influences on body functions is introduced to help identify the main environmental hazards. Cold, rugged terrain, hypoxic exposure, and often a combination and mutual aggravation of these factors are the most important environmental factors of mountain environment. Underestimating this environmental influence has decreased combat strength and caused thousands of casualties during past conflicts. Some marked differences between military and civilian mountaineering further complicate mission planning and operational sustainability. To overcome the restrictions of mountain environments, proper planning and preparation, including sustained mountain mobility training, in-depth mountain medicine training with a special emphasize on prolonged field care, knowledge of acclimatization strategies, adapted time calculations, mountain-specific equipment, air rescue strategies and makeshift evacuation strategies, and thorough personnel selection, are vital to guarantee the best possible medical support. The specifics of managing risks in mountain environments are also critical for civilian rescue missions and humanitarian aid. Copyright © 2018 Wilderness Medical Society. Published by Elsevier Inc. All rights reserved.

  2. On the Probability of Predicting and Mapping Traditional Warfare Measurements to the Cyber Warfare Domain

    CSIR Research Space (South Africa)

    Grobler, M

    2014-07-01

    Full Text Available Cyber warfare is a contentious topic, with no agreement on whether this is a real possibility or an unrealistic extension of the physical battlefield. This article will not debate the validity and legality of the concept of cyber warfare...

  3. Towards a framework for a network warfare capability

    CSIR Research Space (South Africa)

    Veerasamy, N

    2008-07-01

    Full Text Available by many, there is a need for a more structured approach to understanding the various techniques required for a network warfare capability. A conceptual framework describing the most important network warfare techniques and considerations is proposed...

  4. Cyber Attacks, Information Attacks, and Postmodern Warfare

    Directory of Open Access Journals (Sweden)

    Valuch Jozef

    2017-06-01

    Full Text Available The aim of this paper is to evaluate and differentiate between the phenomena of cyberwarfare and information warfare, as manifestations of what we perceive as postmodern warfare. We describe and analyse the current examples of the use the postmodern warfare and the reactions of states and international bodies to these phenomena. The subject matter of this paper is the relationship between new types of postmodern conflicts and the law of armed conflicts (law of war. Based on ICJ case law, it is clear that under current legal rules of international law of war, cyber attacks as well as information attacks (often performed in the cyberspace as well can only be perceived as “war” if executed in addition to classical kinetic warfare, which is often not the case. In most cases perceived “only” as a non-linear warfare (postmodern conflict, this practice nevertheless must be condemned as conduct contrary to the principles of international law and (possibly a crime under national laws, unless this type of conduct will be recognized by the international community as a “war” proper, in its new, postmodern sense.

  5. The Hawaii Undersea Research Laboratory's 25th Anniversary Expedition to the South Pacific

    Science.gov (United States)

    Smith, J. R.; Wiltshire, J. C.; Malahoff, A.

    2005-12-01

    The Hawaii Undersea Research Laboratory (HURL) was established by NOAA at the University of Hawaii 25 years ago as part of its National Undersea Research Program. HURL's mission is to study deep water marine processes in the Pacific Ocean through a competitive proposal and review process. The dual Pisces IV and Pisces V 2000-meter manned submersibles, an RCV-150 1000-meter ROV, and multibeam equipped support ship R/V Ka'imikai-o-Kanaloa ( KoK) were largely acquired from the petroleum industry then adapted and upgraded to carry out cutting edge scientific expeditions. These studies range from active submarine volcanoes, delicate precious coral gardens, endangered marine mammal and fisheries management, to engineering surveys and deployment of observatory systems. HURL successfully completed a major 5-month expedition to the South Pacific during March-August 2005, working in the waters of New Zealand, Tonga, American Samoa, and the U.S. Line Islands covering a distance of nearly 14,500 nautical miles. This mission was significant in both the scientific merit and scope of operations, consisting of 8 different cruise legs at 21 study sites, with 12 chief and co-chief scientists, 58 total science team participants, and completing 61 out of 56 scheduled Pisces science dives, 17 ROV dives, 5 multibeam survey areas, 6 CTD rosette deployments, and 7 instrument mooring recoveries. The $3.5 million expedition was funded by an international partnership with New Zealand agencies (GNS & NIWA) and the University of Kiel in Germany along with the NOAA Office of Exploration and National Undersea Research Program. While most of the individual cruise legs focused on active submarine volcanoes of the Tonga-Kermadec Islands Arc and the Samoan hot spot chain with their hydrothermal systems and associated biological communities, others concentrated on marine protected areas including those of American Samoa and the remote atolls of the Line Islands of the Central Pacific. These studies

  6. Undersea archeology

    Digital Repository Service at National Institute of Oceanography (India)

    Rao, S.R.

    stream_size 5 stream_content_type text/plain stream_name Curr_Trends_Coastal_Mar_Sci_1990_106.pdf.txt stream_source_info Curr_Trends_Coastal_Mar_Sci_1990_106.pdf.txt Content-Encoding ISO-8859-1 Content-Type text/plain; charset...

  7. Survey on Urban Warfare Augmented Reality

    Directory of Open Access Journals (Sweden)

    Xiong You

    2018-01-01

    Full Text Available Urban warfare has become one of the main forms of modern combat in the twenty-first century. The main reason why urban warfare results in hundreds of casualties is that the situational information of the combatant is insufficient. Accessing information via an Augmented Reality system can elevate combatants’ situational awareness to effectively improve the efficiency of decision-making and reduce the injuries. This paper begins with the concept of Urban Warfare Augmented Reality (UWAR and illuminates the objectives of developing UWAR, i.e., transparent battlefield, intuitional perception and natural interaction. Real-time outdoor registration, information presentation and natural interaction are presented as key technologies of a practical UWAR system. Then, the history and current research state of these technologies are summarized and their future developments are highlighted from three perspectives, i.e., (1 Better integration with Geographic Information System and Virtual Geographic Environment; (2 More intelligent software; (3 More powerful hardware.

  8. The undersea location of the Swedish Final Repository for reactor waste, SFR - human intrusion aspects

    International Nuclear Information System (INIS)

    Eng, T.

    1989-01-01

    The Swedish Final Repository for reactor waste, SFR, is built under the Baltic sea close to the Forsmark nuclear power plant. Sixty metres of rock cover the repository caverns under the seabed. The depth of the Baltic sea is about 5-6 m at this location. A human intrusion scenario that in normal inland locations has shown to be of great importance, is a well that is drilled through or in the close vicinity of the repository. Since the land uplift in the SFR area is about 6 mm/year the undersea location of SFR ensures that no well will be drilled at this location for a considerable time while the area is covered by the Baltic sea

  9. System modeling of an air-independent solid oxide fuel cell system for unmanned undersea vehicles

    Science.gov (United States)

    Burke, A. Alan; Carreiro, Louis G.

    To examine the feasibility of a solid oxide fuel cell (SOFC)-powered unmanned undersea vehicle (UUV), a system level analysis is presented that projects a possible integration of the SOFC stack, fuel steam reformer, fuel/oxidant storage and balance of plant components into a 21-in. diameter UUV platform. Heavy hydrocarbon fuel (dodecane) and liquid oxygen (LOX) are chosen as the preferred reactants. A maximum efficiency of 45% based on the lower heating value of dodecane was calculated for a system that provides 2.5 kW for 40 h. Heat sources and sinks have been coupled to show viable means of thermal management. The critical design issues involve proper recycling of exhaust steam from the fuel cell back into the reformer and effective use of the SOFC stack radiant heat for steam reformation of the hydrocarbon fuel.

  10. Mongol Warfare in the Pre-Dissolution Period »

    Directory of Open Access Journals (Sweden)

    Timothy May

    2015-01-01

    Full Text Available Although the Mongols used many of the tactics and strategies that steppe nomads had used for centuries, the Mongols refined steppe warfare so that this style of warfare reached its apogee during the Mongol Empire. Furthermore, the Mongols developed a style of warfare that made them possibly the greatest military force in history. This work examines several facets of the pre-dissolution period (1200–1260. With the dissolution of the Mongol Empire, Mongol warfare once again changed. In some areas it remained complex while in others it regressed to traditional forces of steppe warfare, still potent but not as effective as the pre-dissolution period.

  11. Memory and metacognition in dangerous situations: investigating cognitive impairment from gas narcosis in undersea divers.

    Science.gov (United States)

    Hobbs, Malcolm; Higham, Philip A; Kneller, Wendy

    2014-06-01

    The current study tested whether undersea divers are able to accurately judge their level of memory impairment from inert gas narcosis. Inert gas narcosis causes a number of cognitive impairments, including a decrement in memory ability. Undersea divers may be unable to accurately judge their level of impairment, affecting safety and work performance. In two underwater field experiments, performance decrements on tests of memory at 33 to 42 m were compared with self-ratings of impairment and resolution. The effect of depth (shallow [I-II m] vs. deep [33-42 m]) was measured on free-recall (Experiment I; n = 41) and cued-recall (Experiment 2; n = 39) performance, a visual-analogue self-assessment rating of narcotic impairment, and the accuracy of judgements-of-learning JOLs). Both free- and cued-recall were significantly reduced in deep, compared to shallow, conditions. This decrement was accompanied by an increase in self-assessed impairment. In contrast, resolution (based on JOLs) remained unaffected by depth. The dissociation of memory accuracy and resolution, coupled with a shift in a self-assessment of impairment, indicated that divers were able to accurately judge their decrease in memory performance at depth. These findings suggest that impaired self-assessment and resolution may not actually be a symptom of narcosis in the depth range of 33 to 42 m underwater and that the divers in this study were better equipped to manage narcosis than prior literature suggested. The results are discussed in relation to implications for diver safety and work performance.

  12. Physical Readiness Testing of Surface Warfare Officers

    Science.gov (United States)

    1991-06-01

    NA% I PHISICAL READIiESS TEST (PRT QUEST1OthAIRE I. hE ARE CONDUCTI NG THESIS RESEAR H 0N HO- ELL THE PRT SUPPORT5 TNE R 0 T i E 0F St RF AC E ’ARAR...AD-A245 519 NAVAL POSTGRADUATE SCHOOL Monterey, California DTIC CTE.EC a% FEB071992 CI THESIS Physical Readiness Testing of Surface Warfare Officers...READINESS TESTING OF SURFACE WARFARE OFFICERS 12. PERSONAL AUTHOR(S) Hatch, William D. II and Swinney, Lori D. 13a. TYPE OF REPORT 13b. TIME COVERED 14

  13. Biomonitoring of exposure to chemical warfare agents

    NARCIS (Netherlands)

    Noort, D.; Schans, M.J. van der; Benschop, H.P.

    2006-01-01

    An overview is presented of the major methods that are presently available for biomonitoring of exposure to chemical warfare agents, i.e., nerve agents and sulfur mustard. These methods can be applied for a variety of purposes such as diagnosis and dosimetry of exposure of casualties, verification

  14. Warfare tourism experiences and national identity

    NARCIS (Netherlands)

    Gieling, Joost; Ong, Chin Ee

    2016-01-01

    This paper examines through an analysis of Dutch warfare tourism whether there is a relationship between the subjective perceived salience of Dutch identity and heritage tourists’ motives, emotions and overall satisfaction. Using a social identity theory framework, this study provides a view of

  15. Chemical and Biological Warfare: A Selected Bibliography

    Science.gov (United States)

    1991-04-01

    WORLD ARMA - MENTS AND DISARMAMENT. SIPRI Yearbook 1990. New York: Oxford University Press, 1990. (REF JX1974 S775 1990) Pp. 107-133: "Chemical and...Report. Norton D. Zinder, Chairman. Washington: National Academy Press, 1984. (UG447 N33 1984) LEGACY OF CHEMICAL AND BIOLOGICA !L WARFARE Some 20th

  16. Mesoporous manganese oxide for warfare agents degradation

    Czech Academy of Sciences Publication Activity Database

    Štengl, Václav; Králová, Daniela; Opluštil, F.; Němec, T.

    2012-01-01

    Roč. 156, JULY (2012), s. 224-232 ISSN 1387-1811 R&D Projects: GA MPO FI-IM5/231 Institutional research plan: CEZ:AV0Z40320502; CEZ:AV0Z40500505 Keywords : homogeneous hydrolysis * chloroacetamide * manganese(IV) oxide * warfare agents Subject RIV: CA - Inorganic Chemistry Impact factor: 3.365, year: 2012

  17. RELATIONAL APPROACHES REGARDING FOCUSED LOGISTICS IN MODERN WARFARE JOINT OPERATIONS

    Directory of Open Access Journals (Sweden)

    Gheorghe MINCULETE

    2015-10-01

    Full Text Available The military joint operations of the future are characterized by large concentrations of forces and conventional means on the directions that permit the exploitation of the technological superiority and the manifestation of the offensive spirit of the commanders of the joint operation force groups. Having in mind the fact that the relation between the combatant forces and the logistic ones will shift more and more in favour of the latter, the aforementioned operations will be usually supported by modern flexible logistic structures. The constituted force groups will have a significant joint force character, ensuring superior quality of the troops’ combat training, both at individual level and collective level of units and large units. The current article presents innovative aspects of focused logistics, adapted for the modern warfare, which should be designed and achieved in order to increase the operational potential of the joint force groups.

  18. NASA 14 Day Undersea Missions: A Short-Duration Spaceflight Analog for Immune System Dysregulation

    Science.gov (United States)

    Crucian, B. E.; Stowe, R. P.; Mehta, S. K.; Quiriarte, H.; Pierson, D. L.; Sams, C. F.

    2010-01-01

    BACKGROUND Spaceflight-associated immune dysregulation (SAID) occurs during spaceflight and may represent specific clinical risks for exploration-class missions. An appropriate ground analog for spaceflight-associated immune dysregulation would offer a platform for ground-evaluation of various potential countermeasures. This study evaluated the NASA Undersea Mission Operations ( NEEMO ), consisting of 14 day undersea deployment at the Aquarius station, as an analog for SAID. Sixteen Aquanauts from missions NEEMO-12, 13 and 14 participated in the study. RESULTS Mid-mission alterations leukocyte distribution occurred, including granulocytosis and elevations in central-memory CD8+ T-cells. General T cell function was reduced during NEEMO missions in roughly 50% of subjects. Secreted cytokines profiles were evaluated following whole blood stimulation with CD3/CD28 (T cells) or LPS (monocytes). T cell production of IFNg, IL-5, IL-10, IL-2, TNFa and IL-6 were all reduced before and during the mission. Conversely, monocyte production of TNFa, IL-10, IL-6, IL-1b and IL-8 were elevated during mission, moreso at the MD-14 timepoint. Antibodies to Epstein-Barr virus (EBV) viral capsid antigen and early antigen were increased in approximately 40% of the subjects. Changes in EBV tetramer-positive CD8+ T-cells exhibited a variable pattern. Antibodies against Cytomegalovirus (CMV) were marginally increased during the mission. Herpesvirus reactivation was determined by PCR. EBV viral load was generally elevated at L-6. Higher levels of salivary EBV were found during the NEEMO mission than before and after as well as than the healthy controls. No VZV or CMV was found in any pre, during and after NEEMO mission or control samples. Plasma cortisol was elevated at L-6. CONCLUSION Unfortunately, L-6 may be too near to mission start to be an appropriate baseline measurement. The general immune changes in leukocyte distribution, T cell function, cytokine production, virus specific

  19. Chemical Warfare Agent Decontaminant Solution Using Quaternary Ammonium Complexes

    Science.gov (United States)

    1997-12-11

    warfare agents, which include a variety of organophosphorus and organosulfur compounds, are known in the art. 15 However, these known methods use...chemical warfare agents, and works particularly well for neutralization of organosulfur agents such as mustard gas (HD), and organophosphorus agents such...detoxifying/neutralizing a variety of chemical warfare agents, including organosulfur agents such as mustard gas (HD), and organophosphorus agents such as

  20. Containment 2.0: U.S. political warfare

    OpenAIRE

    Alexander, Nicole M.

    2016-01-01

    Approved for public release; distribution is unlimited Contemporary Russia has shown an increasing preference for using Cold War–era political warfare techniques, which are deeply rooted in its doctrine and foreign policies. To date, the U.S. response comprises the conventional military aspects of the Cold War–era deterrence and containment rather than political warfare strategies. Exploring previous U.S. experience in political warfare activities—under the broad categories of strategic in...

  1. Book Review: Composite warfare: the conduct of successful ground ...

    African Journals Online (AJOL)

    Abstract. Book Title: Composite warfare: the conduct of successful ground force operations in Africa. Book Author: Eeben Barlow. Pinetown: 30 Degrees South Publishers. 2015, 576 pages. ISBN 9781928211761.

  2. An Undersea Mining Microseism Source Location Algorithm Considering Wave Velocity Probability Distribution

    Directory of Open Access Journals (Sweden)

    Furui Du

    2014-01-01

    Full Text Available The traditional mine microseism locating methods are mainly based on the assumption that the wave velocity is uniform through the space, which leads to some errors for the assumption goes against the laws of nature. In this paper, the wave velocity is regarded as a random variable, and the probability distribution information of the wave velocity is fused into the traditional locating method. This paper puts forwards the microseism source location method for the undersea mining on condition of the probability distribution of the wave velocity and comes up with the solving process of Monte Carlo. In addition, based on the simulated results of the Monte Carlo method, the space is divided into three areas: the most possible area (area I, the possible area (area II, and the small probability area (area III. Attached to corresponding mathematical formulations, spherical models and cylindrical models in different areas are, respectively, built according to whether the source is in the sensor arrays. Both the examples and the actual applications show that (1 the method of microseism source location in this paper can highly improve the accuracy of the microseism monitoring, especially for the source beyond the sensor arrays, and (2 the space-dividing method based on occurrence possibilities of the source can recognize and sweep the hidden dangers for it predicts the probable location range of the source efficiently, while the traditional method cannot.

  3. Handbook of toxicology of chemical warfare agents

    CERN Document Server

    2010-01-01

    This groundbreaking book covers every aspect of deadly toxic chemicals used as weapons of mass destruction and employed in conflicts, warfare and terrorism. Including findings from experimental as well as clinical studies, this one-of-a-kind handbook is prepared in a very user- friendly format that can easily be followed by students, teachers and researchers, as well as lay people. Stand-alone chapters on individual chemicals and major topics allow the reader to easily access required information without searching through the entire book. This is the first book that offers in-depth coverage of individual toxicants, target organ toxicity, major incidents, toxic effects in humans, animals and wildlife, biosensors, biomarkers, on-site and laboratory analytical methods, decontamination and detoxification procedures, prophylactic, therapeutic and countermeasures, and the role of homeland security. Presents a comprehensive look at all aspects of chemical warfare toxicology in one reference work. This saves research...

  4. Computational models of intergroup competition and warfare.

    Energy Technology Data Exchange (ETDEWEB)

    Letendre, Kenneth (University of New Mexico); Abbott, Robert G.

    2011-11-01

    This document reports on the research of Kenneth Letendre, the recipient of a Sandia Graduate Research Fellowship at the University of New Mexico. Warfare is an extreme form of intergroup competition in which individuals make extreme sacrifices for the benefit of their nation or other group to which they belong. Among animals, limited, non-lethal competition is the norm. It is not fully understood what factors lead to warfare. We studied the global variation in the frequency of civil conflict among countries of the world, and its positive association with variation in the intensity of infectious disease. We demonstrated that the burden of human infectious disease importantly predicts the frequency of civil conflict and tested a causal model for this association based on the parasite-stress theory of sociality. We also investigated the organization of social foraging by colonies of harvester ants in the genus Pogonomyrmex, using both field studies and computer models.

  5. Cyber Warfare: New Character with Strategic Results

    Science.gov (United States)

    2013-03-01

    government property.”12 Applying these standards to cyberspace is contentious in the international community since millions of cyber attacks transpire daily...forces and creating additional hostility. At its very nature cyber warfare can be both coercive and destructive. “At the strategic level, cyber attacks could...in the state is an armed attack.”42 Other interpretations require a higher threshold for invoking Article 51. “[O]nly large scale cyber attacks on

  6. Electronic Warfare in Army Models - A Survey.

    Science.gov (United States)

    1980-08-01

    CCM) PROVING GROUND TENIAS SAMJAM EIEM SPREAD SPECTRUM US ARMY ELECTRONIC FOREIGN SCIENCE & OFFICE OF MISSILE WARFARE LAB (EWL) TECHNOLOGY CENTER...IPAR MULTIRADAR SPREAD SPECTRUM ECMFUZ IRSS OTOALOC TAC ZINGERS EIEM ITF PATCOM TAM EOCM SIM FAC MGM-H4D RFSS TENIAS GTSF MG(-H4H ROLJAM ZAP I HMSM MSL...USAFAS TRASANA USAPAS TCF ASD WPAFU TENIAS ______ ___ ECAC _________ WAR EAGLE _________CATRADA WARRANT am________ 3DBDM ZAP 1 ____________ MEW EWL ZAP 2

  7. Russia’s Approach to Cyber Warfare

    Science.gov (United States)

    2016-09-01

    warfare domain in its own right. Ideally, it is to be employed as part of a whole of government effort, along with other, more traditional, weapons of...4 even days, be transformed into an arena of fierce armed conflict, become a victim of foreign intervention, and sink into a web of chaos...Russian military is a relative latecomer to the cyber arena. For many years, cyber was the exclusive domain of the state’s security services. The

  8. Recent Trends in Thinking about Warfare

    Science.gov (United States)

    2006-09-01

    as a pikeman), the flintlock, the iron ramrod, and mechanical production, coupled with the discovery of cheap sources of nitrates (which radically...to technologies that provide cheap WMD-like capabilities, and the vulnerabilities offered by physical, cultural, social, economic, and political...context in Peter P. Perla, Albert A. Nofi, and Michael C. Markowitz, Wargaming Fourth-Generation Warfare, Sep 2006 ( CRM D0014752.A2/Final). 83 Aryan

  9. Hybrid Warfare: Preparing for Future Conflict

    Science.gov (United States)

    2015-02-17

    www.vox.com/a/barack-obama-interview-vox- conversation/obama-foreign-policy-transcript. Zedong , Mao . On Protracted War. Honolulu: University...warfare in Ukraine represents a threat to state sovereignty in Eastern Europe, where, like Ukraine, many states have large Russian minority populations ...adjust as well. Conventional and unconventional military actions, such as targeting military supply routes and protecting the population , must occur at

  10. Soviet Partisan Warfare: Integral to the Whole,

    Science.gov (United States)

    1988-04-20

    partisan forces. They also saw partisan warfare as more than a military tool. Its influence was potent for propaganda use and for assuring continued...corefully selected for political reliability and partisan bands themselves were subjected to intense pro-Soviet propaganda . The risks involved in...John Erickson. The Soviet High Command. A_____________________ Military- Politica ~l History. 1918-1941. Boulder, Colorado: * Westview Press, 1962, p. 6.i

  11. Hybrid Warfare: Implications for CAF Force Development

    Science.gov (United States)

    2014-08-01

    objective,” p.603 in Peter Paret and Michael Howard , eds., trans., Carl von Clausewitz, On War. Princeton NJ: Princeton University Press, 1976...and Michael Howard , eds., trans., Carl von Clausewitz, On War. Princeton NJ: Princeton University Press, 1976. Royal Canadian Navy, Horizon 2050: A...The Winograd Commission) (Government of Israel), Final Report, January 2008. Thornton, Rod, Asymmetric Warfare, Malden MA: 2007. Tse- Tung , Mao, On

  12. Torpedoes and Their Impact on Naval Warfare

    Science.gov (United States)

    2017-01-01

    torpedo shell, and, as it pumped the water out through a hole in the rear, thrust was produced. This was surely the first jet -propelled torpedo...reduced from 46 to 2 kilograms per torpedo. The amounts of copper and tin used were substantially reduced. The cost and labor hours were cut in...unrestricted warfare against merchant shipping to cut sea lines of communications forcefully demonstrated the strategic significance of the torpedo as

  13. Relevance of information warfare models to critical infrastructure ...

    African Journals Online (AJOL)

    This article illustrates the relevance of information warfare models to critical infrastructure protection. Analogies of information warfare models to those of information security and information systems were used to deconstruct the models into their fundamental components and this will be discussed. The models were applied ...

  14. The critical role of personality and organizational factors as determinants of reactions to restricted and stressful environments. [undersea habitats

    Science.gov (United States)

    Helmreich, Robert L.

    1987-01-01

    Research into the impact of personality factors on groups in various settings is reviewed as an introduction to a brief discussion of personality and group behavior research needs relevant to the space program. Significant findings of some earlier research are summarized, and methodological problems are touched on. The study of intergroup and intragroup conflict in a stressful environment, as exemplified particularly by undersea habitats, is seen as being of consequence for long-term space missions. It is concluded that adequate research can only be conducted as an adjunct to data collection from operational stressful environments, and not from laboratory experiments.

  15. Axial Vircator for Electronic Warfare Applications

    Directory of Open Access Journals (Sweden)

    L. Drazan

    2009-12-01

    Full Text Available This paper deals with a high power microwave generator with virtual cathode – vircator in axial release for electronic warfare applications. The classification of directed energy weapons microwave (DEWM is introduced together with basic block diagrams of a particular class of DEWM. In the paper, methods for designing vircator pulsed power supply, axial vircator structure, measurement methods and experimental results are presented. The vircator in electromagnetic ammunition is powered by magneto-cumulative generator and in weapons for defense of objects (WDO, it is powered by Marx generator. The possible applications of a vircator in the DEWM area are discussed.

  16. Electronic warfare receivers and receiving systems

    CERN Document Server

    Poisel, Richard A

    2014-01-01

    Receivers systems are considered the core of electronic warfare (EW) intercept systems. Without them, the fundamental purpose of such systems is null and void. This book considers the major elements that make up receiver systems and the receivers that go in them.This resource provides system design engineers with techniques for design and development of EW receivers for modern modulations (spread spectrum) in addition to receivers for older, common modulation formats. Each major module in these receivers is considered in detail. Design information is included as well as performance tradeoffs o

  17. Microwave receivers with electronic warfare applications

    CERN Document Server

    Tsui, James

    2005-01-01

    This book by the author of Digital Techniques for Wideband Receivers willbe like no other one on your book shelf as the definitive word on electronicwarfare (EW) receiver design and performance. Whether you are an EWscientist involved in the test and evaluation of EW receivers or a designerof RWR's and other EW-related receivers, Microwave Receivers withElectronic Warfare Applications is a handy reference through which you canperfect your technical art. Lucidly written, this book is a treatise on EWreceivers that is relevant to you if you are just looking for a top-levelinsight into EW receive

  18. History of chemical and biological warfare agents

    International Nuclear Information System (INIS)

    Szinicz, L.

    2005-01-01

    Chemical and biological warfare agents constitute a low-probability, but high-impact risk both to the military and to the civilian population. The use of hazardous materials of chemical or biological origin as weapons and for homicide has been documented since ancient times. The first use of chemicals in terms of weapons of mass destruction goes back to World War I, when on April 22, 1915 large amounts of chlorine were released by German military forces at Ypres, Belgium. Until around the 1970s of the 20th century, the awareness of the threat by chemical and biological agents had been mainly confined to the military sector. In the following time, the development of increasing range delivery systems by chemical and biological agents possessors sensitised public attention to the threat emanating from these agents. Their proliferation to the terrorists field during the 1990s with the expanding scale and globalisation of terrorist attacks suggested that these agents are becoming an increasing threat to the whole world community. The following article gives a condensed overview on the history of use and development of the more prominent chemical and biological warfare agents

  19. History of chemical and biological warfare agents.

    Science.gov (United States)

    Szinicz, L

    2005-10-30

    Chemical and biological warfare agents constitute a low-probability, but high-impact risk both to the military and to the civilian population. The use of hazardous materials of chemical or biological origin as weapons and for homicide has been documented since ancient times. The first use of chemicals in terms of weapons of mass destruction goes back to World War I, when on April 22, 1915 large amounts of chlorine were released by German military forces at Ypres, Belgium. Until around the 1970s of the 20th century, the awareness of the threat by chemical and biological agents had been mainly confined to the military sector. In the following time, the development of increasing range delivery systems by chemical and biological agents possessors sensitised public attention to the threat emanating from these agents. Their proliferation to the terrorists field during the 1990s with the expanding scale and globalisation of terrorist attacks suggested that these agents are becoming an increasing threat to the whole world community. The following article gives a condensed overview on the history of use and development of the more prominent chemical and biological warfare agents.

  20. Design and Modeling of High Power Density Acoustic Transducer Materials for Autonomous Undersea Vehicles

    Science.gov (United States)

    Heitmann, Adam Arthur

    Advances in piezocrystal transducer materials technology has opened new avenues to impact the size, weight, and power consumption of sonar systems for deployment in autonomous undersea vehicles (AUVs). Although piezocrystals exhibit exceptional electromechanical properties, they have low ferroelectric Curie temperatures, small electrical coercivities, and exhibit temperature, electrical field, and/or stress induced phase transitions between ferroelectric phases with differing electromechanical properties. New piezocrystal materials are required that can provide the compositional tailoring capability needed to increase the Curie temperature and coercive field, ameliorate the deleterious effects of ferroelectric-ferroelectric phase transitions, and enable property optimization for specific transducer applications. Currently, new piezocrystal systems and compositions are selected almost exclusively by empirical 'make and measure' approaches guided by past experiences. These empirical processes can be time and labor intensive and as a result there exists only limited predictive capability for finding new piezocrystal compositions even in known piezocrystal systems. In this study we seek to develop a comprehensive phenomenological theory and a unified parameterization scheme applicable to binary and ternary ferroelectric solid solution systems in order to enable the accelerated development and characterization of new piezocrystal systems for optimized transducer performance. A modified form of the classical Ginzburg-Landau-Devonshire theory of weak first-order transitions is applied to perovskite-structured ferroelectric systems based on the ternary oxide compounds, barium titanate and lead titanate, which places special emphasis on the role played by the crystallographic anisotropy of polarization. It is shown that the theory produces excellent qualitative agreement with the experimentally measured phase diagram topologies, crystal lattice parameters, and

  1. The concept of guerrilla warfare in Lithuania in the 1920—1930s

    Directory of Open Access Journals (Sweden)

    Jokubauskas Vytautas

    2012-03-01

    Full Text Available This article analyses the military and tactical training of the members of the Lithuanian Riflemen’s Union for guerrilla warfare in the interwar period. Small nations, such as Lithuania and other Baltic states, being unable to build up military strength in order to ensure national security, were forced to seek for unconventional methods of warfare, including guerrilla strategies. The study places emphasis on the development of the guerrilla war concept in the Union periodicals. The author retraces a change in the intensity of the guerrilla warfare concept propagation amongst Lithuanian population and riflemen, in particular, through publications in the Trimitas — a periodical of the Lithuanian Riflemen’s Union. The author also identifies the narratives associated with the guerrilla matters employed for propaganda purposes in order to create an image of a guerrilla as a defender of the Homeland — Lithuania. Additionally, the structure and numbers of the Union are analysed through a comparison with similar organisations of the other «small nations» of the Baltic North-East. The author addresses the issue of military missions planned by the Lithuanian Army, as well as the way riflemen implemented them. Since the Union did not only offer military training, but was also engaged in the patriotic propaganda, the article focuses on the network of cultural institutions, homes of riflemen, orchestras, libraries, choirs, and athletic clubs used by the Union. The article sets out to establish whether the loss of Lithuanian sovereignty could have been possible without giving rise to a protracted guerrilla war.

  2. Managing the Double Edged Sword of Network-Centric Warfare

    National Research Council Canada - National Science Library

    Wells, David

    2003-01-01

    Network Centric Warfare can tend to collapse the operational level war by allowing information to flow around or past hierarchical staff structures and directly between tactical and strategic level decision makers...

  3. Mine Warfare - The Joint Force Commander's Achilles Heel

    National Research Council Canada - National Science Library

    Cochran, Bryan

    2004-01-01

    ... Countermeasures systems resident within Strike Groups to counter enemy mine laying activities. Additionally, the Navy needs to transform its culture and mainstream the full spectrum of MIW to include naval mining and countermine warfare capabilities...

  4. Echoes of Chechnya Warfare Resound in Moscow, Quantico

    National Research Council Canada - National Science Library

    Ackerman, Robert

    2000-01-01

    .... thinking about urban warfare. After suffering stunning public defeats just a few years ago, Russian forces applied painful lessons learned then to drive Chechen forces out of their capital city, Grozny, this year...

  5. Organizing for Irregular Warfare: Implications for the Brigade Combat Team

    National Research Council Canada - National Science Library

    Burgess, Kenneth J

    2007-01-01

    ... operations in 21st-century irregular environments. The author argues that Infantry Brigade Combat Teams would be better optimized for the challenges of irregular warfare through structural changes that decentralize resources...

  6. Irregular Warfare: Impact on Future Professional Military Education

    National Research Council Canada - National Science Library

    Paschal, David G

    2006-01-01

    ... to operate effectively in an irregular warfare environment. The utility of a decisive war between nation states continues to decline and will eventually reach critical mass based upon the extreme imbalance of military power and a U.S. monopoly...

  7. Design and implementation of intelligent electronic warfare decision making algorithm

    Science.gov (United States)

    Peng, Hsin-Hsien; Chen, Chang-Kuo; Hsueh, Chi-Shun

    2017-05-01

    Electromagnetic signals and the requirements of timely response have been a rapid growth in modern electronic warfare. Although jammers are limited resources, it is possible to achieve the best electronic warfare efficiency by tactical decisions. This paper proposes the intelligent electronic warfare decision support system. In this work, we develop a novel hybrid algorithm, Digital Pheromone Particle Swarm Optimization, based on Particle Swarm Optimization (PSO), Ant Colony Optimization (ACO) and Shuffled Frog Leaping Algorithm (SFLA). We use PSO to solve the problem and combine the concept of pheromones in ACO to accumulate more useful information in spatial solving process and speed up finding the optimal solution. The proposed algorithm finds the optimal solution in reasonable computation time by using the method of matrix conversion in SFLA. The results indicated that jammer allocation was more effective. The system based on the hybrid algorithm provides electronic warfare commanders with critical information to assist commanders in effectively managing the complex electromagnetic battlefield.

  8. Fourth Generation Warfare: The Need for a Comprehensive Approach

    National Research Council Canada - National Science Library

    Benton, LeRoy D

    2008-01-01

    .... A definition of Fourth Generation Warfare is developed, based on Col. Thomas X. Hammes' writings. The definition is further developed to show relevance and applicability to current operations in the Long War on Terrorism...

  9. Information Warfare: Defining the Legal Response to An Attack

    National Research Council Canada - National Science Library

    Pottorff, James

    1999-01-01

    This paper discusses the difficulty in determining whether an information warfare attack, such as a computer virus, can be treated as an "armed attack" for purposes of national defense under the United Nations charter. As the U.S...

  10. The Role of Airpower in Urban Warfare. An Airman's Perspective

    National Research Council Canada - National Science Library

    Saffold, Timothy

    1998-01-01

    .... This emphasis on surface force employment stifles innovative thought as to how military forces can achieve operational and strategic effects by employing airpower as the key instrument of force in urban warfare...

  11. State of the Art Report on Drone-Based Warfare

    OpenAIRE

    Lee-Morrison, Lila

    2014-01-01

    State of the art report on the latest cultural discourse and debate over contemporary forms of drone based warfare. primarily resulting from the disciplines of Law, Political Science, and Geography. 2014.

  12. Fourth Generation Warfare: The Need for a Comprehensive Approach

    National Research Council Canada - National Science Library

    Benton, LeRoy D

    2008-01-01

    ... to defeat its enemies in the Long War on Terrorism. The method used to resolve this issue was to frame the scope of the current operating environment in the context of Fourth Generation Warfare...

  13. Irregular Warfare: Special Operations Joint Professional Military Education Transformation

    National Research Council Canada - National Science Library

    Cannady, Bryan H

    2008-01-01

    ... on today's battlefront in Afghanistan and Iraq and in the Global War on Terrorism (GWOT). At the forefront of the GWOT and irregular warfare are the United States Special Operations Command (USSOCOM...

  14. A Proposed Framework for Network-Centric Maritime Warfare Analysis

    National Research Council Canada - National Science Library

    Klingbeil, Ralph

    2003-01-01

    .... In addition, this report demonstrates how the functions of many of the independent and dependent variables and associated warfare metrics can be translated into the characteristics and metrics of queues.

  15. Motivation and requirements for determining a Network Warfare Capability

    CSIR Research Space (South Africa)

    Veerasamy, N

    2010-06-01

    Full Text Available , whereas in the latter, an assessment is given of the current state of Network Warfare skills. This assessment can involve expert opinion, controls and guidelines. According to Bragg et al, an assessment is not an audit, which is used to test compliance... approach to ensure conformance to established guidelines. The difference between network security auditing and determining a Network Warfare Capability is that network security auditing evaluates compliance with controls in a very detailed manner...

  16. The theory of unconventional warfare win, lose, and draw

    OpenAIRE

    DeFeyter, Bruce E.

    2008-01-01

    Clausewitz states that "The defensive form of warfare is intrinsically stronger than the offense" and to defeat 'the stronger form of warfare' "an army's best weapon is superior numbers." Given these two facts, how do special operations forces defeat numerically superior forces fighting in the defense? William H. McRaven's book, Spec Ops, lays out a theory of special operations and six principles that are "applicable across the spectrum of special operations" (McRaven, 1995, p. 3). McRav...

  17. Cyberspace Warfare: A New DoD Core Mission Area

    Science.gov (United States)

    2013-05-01

    7. PERFORMING ORGANIZATION NAME(S) AND ADDRESS(ES) 8. PERFORMING ORGANIZATION Joint Forces Staff College REPORT NUMBER Joint Advanced Warfighting...According to Andrew F. Krepinevich cyberspace warfare is defined as: The actions by nation-states and non-state actors to penetrate computers or... actors conducting cyberspace operations in, through, and from cyberspace as a 1 Andrew F. Krepinevich, “Cyber Warfare: A Nuclear Option,” Center for

  18. Dirty Fighting: How to Counter Total Warfare Mentality

    Science.gov (United States)

    2015-06-12

    sustained British security discipline, support for the main PIRA dirty fighting weapon (unannounced bombings) began to turn against them. This was... DIRTY FIGHTING: HOW TO COUNTER TOTAL WARFARE MENTALITY A thesis presented to the Faculty of the U.S. Army Command and... Dirty Fighting: How to Counter Total Warfare Mentality 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER 6. AUTHOR(S) Major

  19. Information Warfare, Threats and Information Security

    Directory of Open Access Journals (Sweden)

    Dmitriy Nikolaevich Bespalov

    2014-01-01

    Full Text Available The article presents the opposite, but dependent on each other's reality - Revolutionary War information,information security goals and objectives of their study within the scheme "challenge-response", methodological and analytical support, the role of elites and the information society in promoting information security. One of the features of contemporaneityis the global spread of ICT, combined with poor governance and other difficulties in the construction of innovation infrastructures that are based on them in some countries. This leads to the reproduction of threats, primarily related to the ability to use ICT for purposes that are inconsistent with the objectives of maintaining international peace and security, compliance with the principles of non-use of force, non-interference in the internal affairs of states, etc. In this regard, include such terms as "a threat of information warfare", "information terrorism" and so forth. Information warfare, which stay in the policy declared the struggle for existence, and relationships are defined in terms of "friend-enemy", "ours-foreign". Superiority over the opponent or "capture of its territory" is the aim of political activity. And information security, serving activities similar process of political control, including a set of components, is a technology until their humanitarian. From the context and the decision itself is the ratio of the achieved results of information and political influence to the target - a positive image of Russia. Bringing its policy in line with the demands of a healthy public opinion provides conductivity of theauthorities initiatives in the country and increases the legitimacy of the Russian Federation actions in the world.

  20. The Fate of Chemical Warfare Agents in the Environment

    Energy Technology Data Exchange (ETDEWEB)

    Talmage, Sylvia Smith [ORNL; Munro, Nancy B [ORNL; Watson, Annetta Paule [ORNL; King, J. [U.S. Army Environmental Center; Hauschild, Veronique [U.S. Environmental Protection Agency (EPA)

    2007-01-01

    Chemical Warfare Agents, Second Edition has been totally revised since the successful first edition and expanded to about three times the length, with many new chapters and much more in-depth consideration of all the topics. The chapters have been written by distinguished international experts in various aspects of chemical warfare agents and edited by an experienced team to produce a clear review of the field. The book now contains a wealth of material on the mechanisms of action of the major chemical warfare agents, including the nerve agent cyclosarin, formally considered to be of secondary importance, as well as ricin and abrin. Chemical Warfare Agents, Second Edition discusses the physico-chemical properties of chemical warfare agents, their dispersion and fate in the environment, their toxicology and management of their effects on humans, decontamination and protective equipment. New chapters cover the experience gained after the use of sarin to attack travelers on the Tokyo subway and how to deal with the outcome of the deployment of riot control agents such as CS gas. This book provides a comprehensive review of chemical warfare agents, assessing all available evidence regarding the medical, technical and legal aspects of their use. It is an invaluable reference work for physicians, public health planners, regulators and any other professionals involved in this field.

  1. Marine Corps NBC Warfare: Determining Clinical Supply Requirements for Treatment of Battlefield Casualties from Chemical and Biological Warfare

    National Research Council Canada - National Science Library

    Hill, Martin; Galameau, Mike; Pang, Gerry; Konoske, Paula

    2003-01-01

    ... to treat victims of biochemical agents on the battlefield. This study reviewed Marine Corps medical supply blocks for biological and chemical warfare casualties - Authorized Medical Allowance Lists (AMALs) 687 and 688...

  2. SEACAT CTD data of the Hawaii Undersea Research Program from 593 dives of the remotely operated vehicle and the submersibles Pisces IV and V during 1995-2012 in the North and South Pacific (NODC Accession 0116373)

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — The Hawaii Undersea Research Laboratory (HURL) was established by the National Oceanic and Atmospheric Administration (NOAA) and the University of Hawaii. Its...

  3. Understanding the elementary considerations in a network warfare environment: an introductory framework

    CSIR Research Space (South Africa)

    Veerasamy, N

    2008-07-01

    Full Text Available by many, there is a need for a more structured approach to understanding the various techniques required for a network warfare capability. A conceptual framework describing the most important network warfare techniques and considerations is proposed...

  4. Nuclear, biological and chemical warfare. Part I: Medical aspects of nuclear warfare.

    Science.gov (United States)

    Kasthuri, A S; Pradhan, A B; Dham, S K; Bhalla, I P; Paul, J S

    1990-04-01

    Casualties in earlier wars were due much more to diseases than to weapons. Mention has been made in history of the use of biological agents in warfare, to deny the enemy food and water and to cause disease. In the first world war chemical agents were used to cause mass casualties. Nuclear weapons were introduced in the second world war. Several countries are now involved in developing nuclear, biological and chemical weapon systems, for the mass annihilation of human beings, animals and plants, and to destroy the economy of their enemies. Recently, natural calamities and accidents in nuclear, chemical and biological laboratories and industries have caused mass instantaneous deaths in civilian population. The effects of future wars will not be restricted to uniformed persons. It is time that physicians become aware of the destructive potential of these weapons. Awareness, immediate protective measures and first aid will save a large number of persons. This series of articles will outline the medical aspects of nuclear, biological and chemical weapon systems in three parts. Part I will deal with the biological effects of a nuclear explosion. The short and long term effects due to blast, heat and associated radiation are highlighted. In Part II, the role of biological agents which cause commoner or new disease patterns is mentioned. Some of the accidents from biological warfare laboratories are a testimony to its potential deleterious effects. Part III deals with medical aspects of chemical warfare agents, which in view of their mass effects can overwhelm the existing medical resources, both civilian and military.(ABSTRACT TRUNCATED AT 250 WORDS)

  5. The 2006 Lebanon Campaign and the Future of Warfare: Implications for Army and Defense Policy

    Science.gov (United States)

    2008-09-01

    ground, see, e.g., Mao Tse-Tung, On Guerrilla Warfare, Samuel B. Griffith, trans., Mineola, NY: Dover, 2005, pp. 52, 97, 102; Ernesto Guevara...Guerrilla Warfare, Old Chelsea, NY: Ocean Press, 2006, pp. 20, 22, 26; Ian F.W. Beckett , Modern Insurgencies and Counter-Insurgencies, New York...Clodfelter, Warfare and Armed Conflicts, pp. 689-690, 696, 712, 757-759). 15. See, e.g., Mao, On Guerrilla Warfare, pp. 55-57, 113; Beckett , Modern

  6. Russian New Art of Hybrid Warfare in Ukraine

    Directory of Open Access Journals (Sweden)

    Rusnáková Soňa

    2017-10-01

    Full Text Available The main aim of this paper is to analyse the annexation of Crimea by the Russian Federation. For the purposes of the paper, the theory of hybrid warfare was chosen as an analytical category. Throughout the paper, the concept of hybrid warfare is examined and applied on case study of Crimean annexation. Hybrid warfare, especially in connection with Russian actions in Crimea has been an intensely debated concept. There is an ongoing debate among scholars concerning the meaning of the concept, its existence and employment by the Russian Federation. This paper showed that the article of Valeriy Gerasimov – the incumbent Chief of the General Staff of the Russian Federation-invoked a new warfare strategy for the Russian Federation which was consequently for the very first time in its full spectre and effectivity employed on case of Crimean annexation in March 2014. Observing the application of the hybrid warfare in practice serves the purposes of countering its further potential application in post-Soviet space and Russian ‘near abroad’.

  7. Numerical simulation of RCS for carrier electronic warfare airplanes

    Directory of Open Access Journals (Sweden)

    Yue Kuizhi

    2015-04-01

    Full Text Available This paper studies the radar cross section (RCS of carrier electronic warfare airplanes. Under the typical naval operations section, the mathematical model of the radar wave’s pitch angle incidence range analysis is established. Based on the CATIA software, considering dynamic deflections of duck wing leading edge flaps, flaperons, horizontal tail, and rudder, as well as aircraft with air-to-air missile, anti-radiation missile, electronic jamming pod, and other weapons, the 3D models of carrier electronic warfare airplanes Model A and Model B with weapons were established. Based on the physical optics method and the equivalent electromagnetic flow method, by the use of the RCSAnsys software, the characteristics of carrier electronic warfare airplanes’ RCS under steady and dynamic flights were simulated under the UHF, X, and S radar bands. This paper researches the detection probability of aircraft by radars under the condition of electronic warfare, and completes the mathematical statistical analysis of the simulation results. The results show that: The Model A of carrier electronic warfare airplane is better than Model B on stealth performance and on discover probability by radar detection effectively.

  8. History of biological warfare and bioterrorism.

    Science.gov (United States)

    Barras, V; Greub, G

    2014-06-01

    Bioterrorism literally means using microorganisms or infected samples to cause terror and panic in populations. Bioterrorism had already started 14 centuries before Christ, when the Hittites sent infected rams to their enemies. However, apart from some rare well-documented events, it is often very difficult for historians and microbiologists to differentiate natural epidemics from alleged biological attacks, because: (i) little information is available for times before the advent of modern microbiology; (ii) truth may be manipulated for political reasons, especially for a hot topic such as a biological attack; and (iii) the passage of time may also have distorted the reality of the past. Nevertheless, we have tried to provide to clinical microbiologists an overview of some likely biological warfare that occurred before the 18th century and that included the intentional spread of epidemic diseases such as tularaemia, plague, malaria, smallpox, yellow fever, and leprosy. We also summarize the main events that occurred during the modern microbiology era, from World War I to the recent 'anthrax letters' that followed the World Trade Center attack of September 2001. Again, the political polemic surrounding the use of infectious agents as a weapon may distort the truth. This is nicely exemplified by the Sverdlovsk accident, which was initially attributed by the authorities to a natural foodborne outbreak, and was officially recognized as having a military cause only 13 years later. © 2014 The Authors Clinical Microbiology and Infection © 2014 European Society of Clinical Microbiology and Infectious Diseases.

  9. Chemical Warfare Agent Degradation and Decontamination

    Energy Technology Data Exchange (ETDEWEB)

    Talmage, Sylvia Smith [ORNL; Watson, Annetta Paule [ORNL; Hauschild, Veronique [U.S. Environmental Protection Agency; Munro, Nancy B [ORNL; King, J. [U.S. Army Environmental Center

    2007-02-01

    The decontamination of chemical warfare agents (CWA) from structures, environmental media, and even personnel has become an area of particular interest in recent years due to increased homeland security concerns. In addition to terrorist attacks, scenarios such as accidental releases of CWA from U.S. stockpile sites or from historic, buried munitions are also subjects for response planning. To facilitate rapid identification of practical and effective decontamination approaches, this paper reviews pathways of CWA degradation by natural means as well as those resulting from deliberately applied solutions and technologies; these pathways and technologies are compared and contrasted. We then review various technologies, both traditional and recent, with some emphasis on decontamination materials used for surfaces that are difficult to clean. Discussion is limited to the major threat CWA, namely sulfur mustard (HD, bis(2-chloroethyl)sulfide), VX (O-ethyl S-(2-diisopropylaminoethyl) methylphosphonothioate), and the G-series nerve agents. The principal G-agents are GA (tabun, ethyl N,N-dimethylphosphoramidocyanidate), GB (sarin, isopropyl methylphosphonofluoridate), and GD (soman, pinacolyl methylphosphonofluoridate). The chemical decontamination pathways of each agent are outlined, with some discussion of intermediate and final degradation product toxicity. In all cases, and regardless of the CWA degradation pathway chosen for decontamination, it will be necessary to collect and analyze pertinent environmental samples during the treatment phase to confirm attainment of clearance levels.

  10. Army Training: Efforts to Adjust Training Requirements Should Consider the Use of Virtual Training Devices

    Science.gov (United States)

    2016-08-01

    accompanying bills for the Fiscal Year 2016 National Defense Authorization Act included provisions for GAO to review the Army’s training plans and its use...implemented it. Both the Senate and House reports accompanying bills for the National Defense Authorization Act for Fiscal Year 2016 included provisions...system training devices are the Engagement Skills Trainer, the Call for Fire Trainer II, the Intelligence and Electronic Warfare Tactical Proficiency

  11. IMS software developments for the detection of chemical warfare agent

    Science.gov (United States)

    Klepel, ST.; Graefenhain, U.; Lippe, R.; Stach, J.; Starrock, V.

    1995-01-01

    Interference compounds like gasoline, diesel, burning wood or fuel, etc. are presented in common battlefield situations. These compounds can cause detectors to respond as a false positive or interfere with the detector's ability to respond to target compounds such as chemical warfare agents. To ensure proper response of the ion mobility spectrometer to chemical warfare agents, two special software packages were developed and incorporated into the Bruker RAID-1. The programs suppress interferring signals caused by car exhaust or smoke gases resulting from burning materials and correct the influence of variable sample gas humidity which is important for detection and quantification of blister agents like mustard gas or lewisite.

  12. The Cycle of Warfare - Analysis of an Analytical Model

    DEFF Research Database (Denmark)

    Jensen, Mikkel Storm

    2016-01-01

    The abstract has the title: “The Cycle of Warfare - Analysis of an Analytical Model” The Cycle of Warfare is an analytical model designed to illustrate the coherence between the organization, doctrine and technology of a military entity and the influence of the surrounding society as expressed...... both retrospectively and predictively. As a tool for historians the model can help to identify decisive factors in developments and outcomes. As a tool for intelligence analysts, it can be used predictively to identify likely possible outcomes or unknown elements in analysed entities....

  13. The Infantry Brigade Combat Team: The U.S. Army’s Premier Phase IV and Irregular Warfare Force for the 21st Century

    Science.gov (United States)

    2007-04-01

    required. The vision of this new IBCT is not complex . When the Army is called upon to conduct conventional warfare, it will do so with its Airborne...Because of its complexity , IW conflicts tend to last many years; it took the British ten years to win the IW conflict in Malaya.23 In order for a...include two human intelligence (HUMINT) collectors. In the IBCT’s Military Intelligence Company ( MICO ), there is an abundance of trained intelligence

  14. Media Technologies and Their Role in the Information Warfare

    Directory of Open Access Journals (Sweden)

    Владимир Александрович Федоров

    2016-12-01

    Full Text Available The article analyzes the new role of the mass media in the modern information space, the basic techniques and technologies of focused preparation, semantic distortion and emotional coloring of the transmitted information. The value of the mass media is estimated as the main weapon of the information warfare in the modern geopolitical space. Specific examples and techniques for manipulating information.

  15. Biomonitoring of exposure to chemical warfare agents: A review

    NARCIS (Netherlands)

    Noort, D.; Benschop, H.P.; Black, R.M.

    2002-01-01

    In this report an overview of the methods currently available for detection of exposure to a number of chemical warfare agents (CWA), i.e., sulfur mustard, lewisite and nerve agents, is presented. Such methods can be applied for various purposes, e.g., diagnosis and dosimetry of exposure of

  16. Influence Operations in Insurgencies: Identifying Framing Strategies for Special Warfare

    Science.gov (United States)

    2014-12-01

    Military Information Support Operations MAR Minorities at Risk MAROB Minorities at Risk Organizational Behavior POQC Psychological Operations...and others use religious violence as a form of cleansing to eradicate “ infidels .”16 While individuals who are motivated by visions of the...indigenous personnel for Special Warfare through psychological and cognitive means. The Military Information Support Operations Command (MISOC) mission

  17. Anti-submarine warfare with continuously active sonar

    NARCIS (Netherlands)

    Vossen, R. van; Beerens, S.P.; Spek, E. van der

    2011-01-01

    Existing surveillance sonar systems for anti-submarine warfare (ASW) use a pulsed sonar deployed at a low duty cycle. Continuously active sonar (CAS) is of special interest since the technique could provide better detection performance than conventional pulsed sonar, and it will provide the operator

  18. The Ottawa Treaty and Coalition Warfare: An Unholy Alliance?

    National Research Council Canada - National Science Library

    Weddle, Kevin

    1999-01-01

    ...) on our ability to execute successful coalition warfare. This paper describes the serious implications for NATO and Coalition operations in view of the bulk of our Allies signing the Ottawa Treaty banning the use of all anti-personnel landmines (APLs...

  19. The political economy of warfare in nineteeth century Benin kingdom ...

    African Journals Online (AJOL)

    This paper examines how the interactions of politics and economy influenced the changing perspective on warfare in nineteenth century Benin Kingdom. The study investigates how the combined political and economic behaviour of Benin affected the rebuilding of military power as instrument of political policy in furtherance ...

  20. blitzkrieg to desert storm: the evolution of operational warfare

    African Journals Online (AJOL)

    a_nabb

    disease of stalemates infecting militaries before the Second World War. The invasion did not change the world; instead, it brought about an increased awareness of the importance of the operational level of war, a dimension of warfare previously neglected. The German operational effectiveness represented an evolution ...

  1. Nanostructured Metal Oxides for Stoichiometric Degradation of Chemical Warfare Agents

    Czech Academy of Sciences Publication Activity Database

    Štengl, Václav; Henych, Jiří; Janos, P.; Skoumal, M.

    2016-01-01

    Roč. 236, č. 2016 (2016), s. 239-258 ISSN 0179-5953 R&D Projects: GA ČR(CZ) GAP106/12/1116 Institutional support: RVO:61388980 Keywords : chemical warfare agent * metal nanoparticle * unique surface-chemistry * mesoporous manganese oxide Subject RIV: CA - Inorganic Chemistry Impact factor: 3.930, year: 2016

  2. relevance of information warfare models to critical infrastructure

    African Journals Online (AJOL)

    ismith

    not be applicable to every possible scenario; however, the intention is to illustrate their relevance in many .... digital communications system, where the vehicles are analogous to bits or packets, intersections for routers or ..... wireless channel, and negatively impact on the systems that rely on that channel. Electronic warfare.

  3. Management information systems for electronic warfare command and decision support

    CSIR Research Space (South Africa)

    Van Niekerk, B

    2015-04-01

    Full Text Available information to allow them to manage their own spectrum, to identify threats, and to deny adversaries’ use of the spectrum. In this paper, the concepts of integrated electronic warfare and spectrum battle management are introduced, and the relevant information...

  4. Manoeuvre warfare analysis of South Africa's 1914-1915 German ...

    African Journals Online (AJOL)

    The study reported in this article explored the nexus between military theory and history. Military theory attempts to quantify, qualify and illuminate the often unpredictable phenomenon of war. The article consists of two parts: the theory of manoeuvre warfare and the history of the 1914-1915 South African campaign in ...

  5. Simulating cyber warfare and cyber defenses: information value considerations

    Science.gov (United States)

    Stytz, Martin R.; Banks, Sheila B.

    2011-06-01

    Simulating cyber warfare is critical to the preparation of decision-makers for the challenges posed by cyber attacks. Simulation is the only means we have to prepare decision-makers for the inevitable cyber attacks upon the information they will need for decision-making and to develop cyber warfare strategies and tactics. Currently, there is no theory regarding the strategies that should be used to achieve objectives in offensive or defensive cyber warfare, and cyber warfare occurs too rarely to use real-world experience to develop effective strategies. To simulate cyber warfare by affecting the information used for decision-making, we modify the information content of the rings that are compromised during in a decision-making context. The number of rings affected and value of the information that is altered (i.e., the closeness of the ring to the center) is determined by the expertise of the decision-maker and the learning outcome(s) for the simulation exercise. We determine which information rings are compromised using the probability that the simulated cyber defenses that protect each ring can be compromised. These probabilities are based upon prior cyber attack activity in the simulation exercise as well as similar real-world cyber attacks. To determine which information in a compromised "ring" to alter, the simulation environment maintains a record of the cyber attacks that have succeeded in the simulation environment as well as the decision-making context. These two pieces of information are used to compute an estimate of the likelihood that the cyber attack can alter, destroy, or falsify each piece of information in a compromised ring. The unpredictability of information alteration in our approach adds greater realism to the cyber event. This paper suggests a new technique that can be used for cyber warfare simulation, the ring approach for modeling context-dependent information value, and our means for considering information value when assigning cyber

  6. Analysis of Biota to Evaluate the Risks Associated with Chemical Warfare Materiel Present in Sea-Disposed Military Munitions to Human Health and the Environment

    Science.gov (United States)

    Briggs, C. W.; Bissonnette, M. C.; Edwards, M.; Shjegstad, S. M.

    2016-12-01

    Thousands of 100-lb M47A series bombs containing sulfur mustard were disposed in the ocean following World War II yet few studies have been conducted at sites in excess of 250 m, the depth where most discarded military munitions (DMM) were disposed. The Hawai`i Undersea Military Munitions Assessment (HUMMA) project was conducted to evaluate the risk from chemical warfare materiel (CWM) in DMM to human health, measuring ecological differences between the disposal area and nearby but otherwise similar areas, and evaluating the most efficient platforms for surveying DMM sea-disposal sites located at depths between 400-650 m. During the 2014 HUMMA Sampling Survey, the Jason 2 remotely operated vehicle was used to collect data. Shrimp were collected and analyzed to assess the potential for bioaccumulation of CWM, energetics and metals from munitions. No CWM was detected in H. ensifer tissue samples, indicating bioaccumulation is not occurring. Low levels of 2,4,6-trinitrotoluene, 4-amino-2,6-­dinitrotoluene, 1,3,5-trinitrobenzene, nitrobenzene, arsenic, copper, and lead were detected and the concentrations were not significantly different at DMM and control sites. No visible deformities, eroded fins, lesions, or tumors were observed on the shrimp living in the vicinity of M47A bombs. Given these results and under current and potential future uses of the HUMMA study area, health risks to likely receptors are within EPA acceptable levels. Photographic data and benthic infauna analysis were used to study benthic organisms that lived on or near munitions. There was no statistically distinguishable difference between organism distributions in dense and sparse munitions fields. Conventional munitions were found to have the greatest number of benthic infauna individuals, with control sites generally having the least number of individuals. This is consistent with the benthic macro-fauna analysis, which shows that munitions provide habitat.

  7. The Battle for Hue: Casualty and Disease Rates during Urban Warfare

    Science.gov (United States)

    1993-08-01

    NAVAL HEALTH RESEARCH CENTER AD-A271 748 THE BATTLE FOR HUE: CASUALTY AND DISEASE RATES DURING URBAN WARFARE C. G. Blood M. E. Anderson DTIC...prior to the first casualties being sustained. 2 The Battle for Flue: Casualty and Disease Rates During Urban Warfare Renewed nationalism with the ending...TITLE AND SUBTITLE 5. FUNDING NUMBERS The Battle for Hue: Casualty and Disease Rates Program Element: 63706N During Urban Warfare Work Unit Number: 6

  8. Targeting: the challenges of modern warfare

    NARCIS (Netherlands)

    Ducheine, P.A.L.; Schmitt, M.N.; Osinga, F.P.B.

    2016-01-01

    This book offers a multidisciplinary treatment of targeting. It is intended for use by the military, government legal advisers and academics. The book is suitable for use in both military training and educational programs and in Bachelor and Master degree level courses on such topics as War Studies

  9. Cutaneous reactions in nuclear, biological and chemical warfare

    Directory of Open Access Journals (Sweden)

    Arora Sandeep

    2005-03-01

    Full Text Available Nuclear, biological and chemical warfare have in recent times been responsible for an increasing number of otherwise rare dermatoses. Many nations are now maintaining overt and clandestine stockpiles of such arsenal. With increasing terrorist threats, these agents of mass destruction pose a risk to the civilian population. Nuclear and chemical attacks manifest immediately while biological attacks manifest later. Chemical and biological attacks pose a significant risk to the attending medical personnel. The large scale of anticipated casualties in the event of such an occurrence would need the expertise of all physicians, including dermatologists, both military and civilian. Dermatologists are uniquely qualified in this respect. This article aims at presenting a review of the cutaneous manifestations in nuclear, chemical and biological warfare and their management.

  10. Containment 2.0: U.S. Political Warfare

    Science.gov (United States)

    2016-12-01

    and was intended to ensure the heritage , culture , and languages of ethnic minorities in the Soviet Union were maintained. The secondary objective was...http://ndupress.ndu.edu/Media/News/News-Article-View/Article/643108/unconventional- warfare-in-the-gray-zone/. 4 radio messaging, and cultural ...staging a communist coup in Czechoslovakia in early 1948.28 Furthermore, each of these events started with the sponsorship of pro-communist movements

  11. Handbook on Ground Forces Attrition in Modern Warfare

    Science.gov (United States)

    1986-09-01

    Dupuy d ELECTE John R. Brinkerhoff 0 APR 2 81994 C. Curtiss Johnson Peter J. Clark A Division of: DATA MEMORY SYSTEMS, INC. 10332 Democracy Lane Thi...Evaluation and Fe.earch Organization A Division of Data Memory Systems.. Inc. 10392 Democracy Lcne * Fairfax, Virginia 22030 Tel,: (703) 591-36ඒ The...data base touching a variety of aspects of warfare and analyzed it using techniques of the social and behavioral sciences. The work considers

  12. Just War and Postmodern Warfare: A German Case Study

    Science.gov (United States)

    2015-04-01

    non-lethal in equal measure. In many ways, Germany’s Bundeswehr (military) construct and participation in various conflicts mirror contemporary just...war theory and postmodern warfare, while its military concept lacks the necessary postmodern balance. The Bundeswehr stands in stark contrast to...the United States. The Bundeswehr is only employed for the purposes of defending German citizens where the United States military can be employed to

  13. Employing U.S. Information Operations Against Hybrid Warfare Threats

    Science.gov (United States)

    2013-03-01

    19b. TELEPHONE NUMBER (Include area code ) USAWC STRATEGY RESEARCH PROJECT Employing U.S. Information Operations Against...hostile computer code through internet infrastructure in multiple countries en route to the target) have enormous legal ramifications. Even within the...59 145 William J. Nemeth , Future War And Chechnya: A Case For Hybrid Warfare, (Monterey CA: Naval Postgraduate School, June 2002), 74. 146 U.S

  14. Information Warfare and Information Operations: Protecting The Global Information Environment.

    Science.gov (United States)

    1998-03-06

    findings in a November 1996 report described by the Wall Street Journal as "unusually strident.൮ It made 13 recommendations, including one for...Funds Moved Around World", The Wall Street Journal , September 12, 1995, p 1. 21 Data Provided By Member of the President’s Commission on Critical...U.S. Department of Defense, April 1997, 230. 38 Thomas E. Ricks, "Information Warfare Defense is Urged", Wall Street Journal , 6 January 1997, Section

  15. Wrestling the Bear: The Rise of Russian Hybrid Warfare

    Science.gov (United States)

    2015-04-13

    search.proguest.com.nduezproxy.idm.oclc.orgldocview/1 545535275?accountid.:: J2686. (accessed on 4 December 2014). 14 Reuters, " Malaysia : Dutch...with subversive efforts. The aggressor often resorts to clandestine actions, to avoid attribution or retribution. Without a credible smoking gun, NATO...2015. Accessed December 27, 2014. http://www .nato.int/docu/review/20 14/ Also-in-20 14/Deterring-hybrid- warfare/EN/index .htm. Reuters,. ’ Malaysia

  16. Nodes and Codes: The Reality of Cyber Warfare

    Science.gov (United States)

    2012-05-17

    that spin highly toxic, corrosive , and radioactive uranium gas (Uranium Hexafluoride) at over 100,000...Policy for Information Warfare,” Intellibriefs, http://intellibriefs.blogspot.com/2009_03_22_archive.html (accessed February 11, 2012). 81 Marina ...commentary_battlefield_on_your_desktop/2345202.html (accessed December 13, 2011). Myakisheva, Marina . “What is Russia’s Answer to Cyber Threats?” CNews.ru

  17. Enterprises as Inquiring Systems with Implications for Information Warfare

    Science.gov (United States)

    2014-06-01

    applying C. West Churchman’s characterization of Western epistemology , which was born in the tradition of the philosophy of science, in the business... epistemology they most closely resemble. 2.1 Lockian Model The Lockian model bases reasoning on experiment and consensus. Empirical information is gathered...defined as the “integrated employment of the core capabilities of electronic warfare, computer network operations, psychological operations, military

  18. Russian and Chinese Information Warfare: Theory and Practice

    Science.gov (United States)

    2004-06-01

    Integral neurolinguistic programming •Placing essential programs into the conscious or sub- conscious mind •Subconscious suggestions that modify human...Generators of special rays •Optical systems • Neurolinguistic programming •Computer psychotechnology •The mass media •Audiovisual effects •Special effects...Information Warfare: Theory and Practice 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER 6. AUTHOR(S) 5d. PROJECT NUMBER 5e

  19. 78 FR 72025 - Security Zones; Naval Base Point Loma; Naval Mine Anti Submarine Warfare Command; San Diego Bay...

    Science.gov (United States)

    2013-12-02

    ...-AA87 Security Zones; Naval Base Point Loma; Naval Mine Anti Submarine Warfare Command; San Diego Bay... establishing a new security zone at the Naval Mine and Anti-Submarine Warfare Command to protect the relocated... Commander of Naval Base Point Loma, the Commander of the Naval Mine Anti Submarine Warfare Command, and the...

  20. Metal organic frameworks for the catalytic detoxification of chemical warfare nerve agents

    Science.gov (United States)

    Hupp, Joseph T.; Farha, Omar K.; Katz, Michael J.; Mondloch, Joseph E.

    2017-04-18

    A method of using a metal organic framework (MOF) comprising a metal ion and an at least bidendate organic ligand to catalytically detoxify chemical warfare nerve agents including exposing the metal-organic-framework (MOF) to the chemical warfare nerve agent and catalytically decomposing the nerve agent with the MOF.

  1. Status of dental health in chemical warfare victims: The case of Isfahan, Iran

    Directory of Open Access Journals (Sweden)

    Ahmad Mottaghi

    2012-01-01

    Conclusion: Chemical warfare victims have relatively poor dental/oral health. Chemical injury might cause a dysfunction in saliva secretion, with decrease in saliva secretion increasing the risk for tooth decay and periodontal disorders. Further research is required to find out the exact underlying mechanisms and the factors associated with poor dental/oral health in chemical warfare victims.

  2. Application of non-quantitative modelling in the analysis of a network warfare environment

    CSIR Research Space (South Africa)

    Veerasamy, N

    2008-07-01

    Full Text Available Network warfare is an emerging concept that focuses on the network and computer based forms through which information is attacked and defended. Various computer and network security concepts thus play a role in network warfare. Due the intricacy...

  3. Information Operations Team Training & Information Operations Training Aid, Information Warfare Effectiveness (IWE) Program, Delivery Order 8

    Science.gov (United States)

    2010-03-01

    operational planning. The body of this report describes the data collection (knowledge elicitation) and design plan, encompassing the work domain...generate a new scenario. 360 System: General The system shall allow the user to open existing scenarios. 361 System: General The sytem shall have a...capabilities. IOTA should support students as they learn to organize a body of knowledge, plan and execute a strategy across all influence

  4. Women and Warfare in Pre-Colonial Akokoland

    Directory of Open Access Journals (Sweden)

    Olusanya Faboyede

    2013-06-01

    Full Text Available In pre-colonial Akokoland, the most conspicuous fact about its political economy and peace was security challenges and mismanagement through internal and external manipulation. This paper analyses the role of women in warfare in pre-colonial Akokoland as a potential to integrate Akokoland, a multi-cultural community for productive and sustained effort to promote economic development in the region. Thus, the paper is conceptualised on historical objectivity. The paper argues that one of the ways of dealing with the scale of insecurity in the society is to assimilate historical thinking into the intention of the security agents (women warriors.

  5. Russian Military Thinking – A New Generation of Warfare

    Directory of Open Access Journals (Sweden)

    Mattsson Peter A.

    2015-06-01

    Full Text Available This article deals with how Russian warfighting is described and discussed in contemporary Russian military theory. The approach has been studies, analyses and interpretations of primarily Russian sources as prominent Russian journals, but also Western analyses and interpretations of contemporary Russian warfighting discussions. Theoretical considerations are limited to the period from the 1980s to the present day - 2014. Mainly Russian experts on military theory (Bogdanov, Chekinov, Gareev, Kiselyov, Kuralenko, Morozov, Slipchenko, Vinogradov, Vladimirov, Vorobyov have been studied, but also sources from some prominent Western experts on Russian warfare (FitzGerald, Gileotti, Kipp, McDermott.

  6. Lawfare in Hybrid Wars: The 21st Century Warfare

    OpenAIRE

    Mosquera, A.; Bachmann, Sascha-Dominik

    2016-01-01

    In the context of ‘Hybrid Warfare’ as 21st Century’s threat to peace and security, this paper intends to address the role of Lawfare. The use of law as a weapon, Lawfare,1can have a tangible impact on democratic States when their adversaries use it in an exploitative way. Lawfare can be used in the context of Hybrid War.2 Examples of Hybrid Warfare as witnessed in the Russian/Ukrainian conflict of 2014/2015 and the ongoing conflict with Daesh are particularly sensitive to Lawfare due to an ap...

  7. Cybersecurity protecting critical infrastructures from cyber attack and cyber warfare

    CERN Document Server

    Johnson, Thomas A

    2015-01-01

    The World Economic Forum regards the threat of cyber attack as one of the top five global risks confronting nations of the world today. Cyber attacks are increasingly targeting the core functions of the economies in nations throughout the world. The threat to attack critical infrastructures, disrupt critical services, and induce a wide range of damage is becoming more difficult to defend against. Cybersecurity: Protecting Critical Infrastructures from Cyber Attack and Cyber Warfare examines the current cyber threat landscape and discusses the strategies being used by governments and corporatio

  8. Built to Outlast: Operational Approaches to Hybrid Warfare

    Science.gov (United States)

    2012-05-17

    PAGE 19b. PHONE NUMBER (include area code ) (U) (U) (U) (U) 100 (913)758-3300 Standard Form 298 (Rev. 8-98) Prescribed by ANSI Std. Z39.18 i...William J. Nemeth , Future War and Chechnya: A Case for Hybrid Warfare (master’s thesis, US Naval Postgraduate School, 2002); Erin M. Simpson...2005). Unpublished papers pre-dating Hoffman’s effort include a 2002 Master’s thesis by William J. Nemeth which represents the earliest scholarly work

  9. Venezuela’s Hugo Chavez, Bolivarian Socialism, and Asymmetric Warfare

    Science.gov (United States)

    2005-10-01

    lead to a better life for all. Finally, taken all together, this is “war as a whole,” or what Chávez calls “ Guerra de todo el pueblo...VENEZUELA’S HUGO CHÁVEZ, BOLIVARIAN SOCIALISM, AND ASYMMETRIC WARFARE Beginning with the election of Lieutenant Colonel Hugo Chávez Frias as President...financial, material, and political-military support of people’s movements.31 This takes us to the notion of “ Guerra de todo el pueblo” (war of all

  10. Environmental assessments of sea dumped chemical warfare agents

    DEFF Research Database (Denmark)

    Sanderson, Hans; Fauser, Patrik

    This is a report on the information gathered during work related to sea dumped chemical warfare agents. It mainly reviews the work conducted in relation to the installation of the two Nord Stream gas pipeline from 2008-2012. The focus was on the weight-of-evidence risk assessment of disturbed CWA...... residues in connection with the installation of the pipelines. Novel exposure and toxicity assessments are presented and the risk is assessed. The overall conclusion is that there is a negligible acute added CWA risk towards the fish community from the installation of the pipelines....

  11. Destruction of chemical warfare agents using metal-organic frameworks

    Science.gov (United States)

    Mondloch, Joseph E.; Katz, Michael J.; Isley, William C., III; Ghosh, Pritha; Liao, Peilin; Bury, Wojciech; Wagner, George W.; Hall, Morgan G.; Decoste, Jared B.; Peterson, Gregory W.; Snurr, Randall Q.; Cramer, Christopher J.; Hupp, Joseph T.; Farha, Omar K.

    2015-05-01

    Chemical warfare agents containing phosphonate ester bonds are among the most toxic chemicals known to mankind. Recent global military events, such as the conflict and disarmament in Syria, have brought into focus the need to find effective strategies for the rapid destruction of these banned chemicals. Solutions are needed for immediate personal protection (for example, the filtration and catalytic destruction of airborne versions of agents), bulk destruction of chemical weapon stockpiles, protection (via coating) of clothing, equipment and buildings, and containment of agent spills. Solid heterogeneous materials such as modified activated carbon or metal oxides exhibit many desirable characteristics for the destruction of chemical warfare agents. However, low sorptive capacities, low effective active site loadings, deactivation of the active site, slow degradation kinetics, and/or a lack of tailorability offer significant room for improvement in these materials. Here, we report a carefully chosen metal-organic framework (MOF) material featuring high porosity and exceptional chemical stability that is extraordinarily effective for the degradation of nerve agents and their simulants. Experimental and computational evidence points to Lewis-acidic ZrIV ions as the active sites and to their superb accessibility as a defining element of their efficacy.

  12. Punishment sustains large-scale cooperation in prestate warfare

    Science.gov (United States)

    Mathew, Sarah; Boyd, Robert

    2011-01-01

    Understanding cooperation and punishment in small-scale societies is crucial for explaining the origins of human cooperation. We studied warfare among the Turkana, a politically uncentralized, egalitarian, nomadic pastoral society in East Africa. Based on a representative sample of 88 recent raids, we show that the Turkana sustain costly cooperation in combat at a remarkably large scale, at least in part, through punishment of free-riders. Raiding parties comprised several hundred warriors and participants are not kin or day-to-day interactants. Warriors incur substantial risk of death and produce collective benefits. Cowardice and desertions occur, and are punished by community-imposed sanctions, including collective corporal punishment and fines. Furthermore, Turkana norms governing warfare benefit the ethnolinguistic group, a population of a half-million people, at the expense of smaller social groupings. These results challenge current views that punishment is unimportant in small-scale societies and that human cooperation evolved in small groups of kin and familiar individuals. Instead, these results suggest that cooperation at the larger scale of ethnolinguistic units enforced by third-party sanctions could have a deep evolutionary history in the human species. PMID:21670285

  13. China's Use of Cyber Warfare: Espionage Meets Strategic Deterrence

    Directory of Open Access Journals (Sweden)

    Magnus Hjortdal

    2011-01-01

    Full Text Available This article presents three reasons for states to use cyber warfare and shows that cyberspace is—and will continue to be—a decisive element in China's strategy to ascend in the international system. The three reasons are: deterrence through infiltration of critical infrastructure; military technological espionage to gain military knowledge; and industrial espionage to gain economic advantage. China has a greater interest in using cyberspace offensively than other actors, such as the United States, since it has more to gain from spying on and deterring the United States than the other way around. The article also documents China's progress in cyber warfare and shows how it works as an extension of its traditional strategic thinking and the current debate within the country. Several examples of cyber attacks traceable to China are also presented. This includes cyber intrusions on a nuclear arms laboratory, attacks on defense ministries (including the Joint Strike Fighter and an airbase and the U.S. electric grid, as well as the current Google affair, which has proved to be a small part of a broader attack that also targeted the U.S. Government. There are, however, certain constraints that qualify the image of China as an aggressive actor in cyberspace. Some believe that China itself is the victim of just as many attacks from other states. Furthermore, certain actors in the United States and the West have an interest in overestimating China's capabilities in cyberspace in order to maintain their budgets.

  14. The Effectiveness of Mindfulness Training in Improving the Quality of Life of the War Victims with Post Traumatic stress disorder (PTSD)

    OpenAIRE

    Azad marzabadi, Esfandiar; hashemi zadeh, Seyyed morteza

    2014-01-01

    Objective Those veterans suffering from Post Traumatic stress disorder (PTSD) experience a low quality of life. This study investigated how the quality of life of warfare victims with PTSD was influenced by mindfulness training (MT) Method This study followed a randomized controlled trial and included a pre-test, post-test and delayed post- and was conducted in 2012 at Shahid Rajaee Hospital in Isfahan, Iran. The participants were 28 randomly selected male warfare victims with PTSD who were a...

  15. Koncepcija partizanskoj vojny v Litve v 1920— 1930-e gody [The concept of guerrilla warfare in Lithuania in the 1920—1930s

    Directory of Open Access Journals (Sweden)

    Jokubauskas Vytautas

    2012-01-01

    Full Text Available This article analyses the military and tactical training of the members of the Lithuanian Riflemen’s Union for guerrilla warfare in the interwar period. Small nations, such as Lithuania and other Baltic states, being unable to build up military strength in order to ensure national security, were forced to seek for unconventional methods of warfare, including guerrilla strategies. The study places emphasis on the development of the guerrilla war concept in the Union periodicals. The author retraces a change in the intensity of the guerrilla warfare concept propagation amongst Lithuanian population and riflemen, in particular, through publications in the Trimitas — a periodical of the Lithuanian Riflemen’s Union. The author also identifies the narratives associated with the guerrilla matters employed for propaganda purposes in order to create an image of a guerrilla as a defender of the Homeland — Lithuania. Additionally, the structure and numbers of the Union are analysed through a comparison with similar organisations of the other «small nations» of the Baltic North-East. The author addresses the issue of military missions planned by the Lithuanian Army, as well as the way riflemen implemented them. Since the Union did not only offer military training, but was also engaged in the patriotic propaganda, the article focuses on the network of cultural institutions, homes of riflemen, orchestras, libraries, choirs, and athletic clubs used by the Union. The article sets out to establish whether the loss of Lithuanian sovereignty could have been possible without giving rise to a protracted guerrilla war.

  16. Integrated Swarming Operations for Air Base Defense: Applications in Irregular Warfare

    National Research Council Canada - National Science Library

    Gray, Ron

    2006-01-01

    .... However, in low-intensity conflicts (LICs) or irregular warfare (IW) campaigns, U.S. forces are faced with an irregular enemy, one that does not choose to fight its forces directly, but rather through unconventional or indirect methods...

  17. Understanding "Understanding" Flow for Network-Centric Warfare: Military Knowledge-Flow Mechanics

    National Research Council Canada - National Science Library

    Nissen, Mark

    2002-01-01

    Network-centric warfare (NCW) emphasizes information superiority for battlespace efficacy, but it is clear that the mechanics of how knowledge flows are just as important as those pertaining to the networks and communication...

  18. Defense Base Closure and Realignment Budget Data for the Naval Surface Warfare Center

    National Research Council Canada - National Science Library

    1993-01-01

    ... and realignment military construction projects. This report provides the results of the audit related to the realignment of Naval Surface Warfare Centers elements in White Oak, Maryland, and Panama City, Florida, to Dahlgren, Virginia...

  19. Optimizing Armed Forces Capabilities for Hybrid Warfare – New Challenge for Slovak Armed Forces

    Directory of Open Access Journals (Sweden)

    Peter PINDJÁK

    2015-09-01

    Full Text Available The paper deals with the optimization of military capabilities of the Slovak Armed Forces for conducting operations in a hybrid conflict, which represents one of the possible scenarios of irregular warfare. Whereas in the regular warfare adversaries intend to eliminate the centers of gravity of each other, most often command and control structures, in irregular conflicts, the center of gravity shifts towards the will and cognitive perception of the target population. Hybrid warfare comprises a thoroughly planned combination of conventional military approaches and kinetic operations with subversive, irregular activities, including information and cyber operations. These efforts are often accompanied by intensified activities of intelligence services, special operation forces, and even mercenary and other paramilitary groups. The development of irregular warfare capabilities within the Slovak Armed Forces will require a progressive transformation process that may turn the armed forces into a modern and adaptable element of power, capable of deployment in national and international crisis management operations.

  20. Interoperability and Network-Centric Warfare: US Army Future Force and German Army in 2015

    National Research Council Canada - National Science Library

    Alme, Thorsten

    2005-01-01

    .... Special consideration is given to technical and behavioral interoperability. The monograph also assesses the projected capabilities of the German Bundeswehr in the year 2015 with regard to Network-Centric Warfare (NCW...

  1. Surface Warfare Officer Retention: Analysis of Individual Ready Reserve Survey Data

    National Research Council Canada - National Science Library

    Stoker, Carol; Crawford, Alice

    2008-01-01

    ... (including morale and lack of mentoring), push both men and women out of the Navy. Nonetheless, the Navy s primary effort to improve retention has been to introduce the Surface Warfare Officer Continuation Pay (SWOCP...

  2. Diagnosis of Exposure to Chemical Warfare Agents: A Comprehensive Literature Survey 1990-2005

    National Research Council Canada - National Science Library

    Noort, D

    2006-01-01

    This report is an update of TNO report PML 2003-A63. In this report an overview is presented of the methods currently available for detection of exposure to a number of chemical warfare agents (CWA), i.e...

  3. Information Warfare: Issues Associated with the Defense of DOD Computers and Computer Networks

    National Research Council Canada - National Science Library

    Franklin, Derek

    2002-01-01

    ... that may threaten the critical information pathways of the armed forces An analysis of the history of computer information warfare reveals that there was an embarrassing lack of readiness and defense...

  4. The Third World War? In The Cyberspace. Cyber Warfare in the Middle East.

    Directory of Open Access Journals (Sweden)

    Martina

    2014-06-01

    Full Text Available This article aims to provide a brief and comprehensive introduction to the issue of cyber warfare and to display the recent development in this area. Geographically, it focuses on the Middle East region, since the vast majority of the most important recent cyber attacks appeared just in there or were connected to it. The first part of the article tries to define the key notion of cyber warfare, compares it to the standard warfare and presents different types of cyber weapons that are known today. The second part points out examples of the most striking recent cyber attacks and uses them as evidences to demonstrate today's importance and dissemination of cyber warfare. Finally, the article sums up pros and cons of the cyber weapons and, in view of these, predicts a significant increase in their use in any future war conflicts.

  5. Cerium oxide for the destruction of chemical warfare agents: A comparison of synthetic routes

    Czech Academy of Sciences Publication Activity Database

    Janos, P.; Henych, Jiří; Pelant, O.; Pilařová, V.; Vrtoch, L.; Kormunda, M.; Mazanec, K.; Štengl, Václav

    2016-01-01

    Roč. 304, MAR (2016), s. 259-268 ISSN 0304-3894 Institutional support: RVO:61388980 Keywords : Cerium oxide * Chemical warfare agents * Organophosphate compounds * Decontamination Subject RIV: CA - Inorganic Chemistry Impact factor: 6.065, year: 2016

  6. Damn! The Torpedoes: Coping with Mine Warfare in the Joint Maritime Environment

    National Research Council Canada - National Science Library

    Bahr, James D

    2007-01-01

    ... and the attainment of joint operational maneuver. The potential exists for non-state actors to acquire sea mines and subsequently employ mine warfare as a means of crippling the Navy throughout its range of military operations...

  7. Improving Blood Monitoring of Enzymes as Biomarkers of Risk from Anticholinergic Pesticides and Chemical Warfare Agents

    National Research Council Canada - National Science Library

    Wilson, Barry W

    2005-01-01

    Blood biomarkers are an important way to monitor exposure to anticholinergic pesticides and chemical warfare agents and to establish whether some personnel are at greater risk than others from exposure...

  8. Improving Blood Monitoring of Enzymes as Biomarkers of Risk from Anticholinergic Pesticides and Chemical Warfare Agents

    National Research Council Canada - National Science Library

    Wilson, Barry W

    2006-01-01

    Blood biomarkers are an important way to monitor exposure to anticholinergic pesticides and chemical warfare agents and to establish whether some personnel are at greater risk than others from exposure...

  9. Evaluation Report on Management Controls at the Disbursing Office, Naval Surface Warfare Center, Dahlgren, Virginia

    National Research Council Canada - National Science Library

    Lane, F

    1997-01-01

    On September 19, 1996, the Defense Criminal Investigative Service requested assistance from the Assistant Inspector General for Auditing, DoD, in an investigation at the Naval Surface Warfare Center, Dahlgren, Virginia...

  10. Guerrilla Warfare: Cause and Conflict (A 21st Century Success Story?),

    Science.gov (United States)

    1981-01-01

    and low intensity warfare is the means, both qualitative and quantitative, employed to achieve the intended goal. Both types of war require analysis ...administration.’ 9 If despair and aggravation become the mortar and pestle of future guerrilla warfare, then weapons availability and population growth might be... Thailand , and the Philippines. 55 Every time you ask, "Where are they going to get the money to pay," everybody falls silent. Brazil alone owes $55

  11. Twenty-First-Century Air Warfare and the Invisible War: Strategic Agility

    Science.gov (United States)

    2015-10-01

    September–October 2015 | 85 Views Twenty-First-Century Air Warfare and the Invisible War Strategic Agility Maj Michael W. Benitez, USAF America’s... gap between the dynamic 21st-century environment and our 20th-century bureaucracy. Their initiative and perse- verance allow us to succeed in our...SUBTITLE Twenty-First-Century Air Warfare and the Invisible War: Strategic Agility 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER 6

  12. Detachment 101 and North Burma: Historical Conditions for Future Unconventional Warfare Operations

    Science.gov (United States)

    2016-05-26

    of 1941 (1990; repr., Washington, DC: Government Printing Office, 2011), 42. 24 Maurice Matloff and Edwin M. Snell, Strategic Planning for Coalition...Warfare: 1941­ 1942 (1953 repr., Washington, DC: Government Printing Office, 1999), 120. 25 Maurice Matloff, Strategic Planning for Coalition Warfare...opportunity for DET 101 to improve its relationships with the Kachin people. 99War Report: OSS, Volume 2, 383. 100 Richard Dunlop, Behind Japanese Lines with

  13. Irregular Warfare as a National Military Strategy Approach for Small States

    Science.gov (United States)

    2013-12-01

    of these “pods”: the question of homogeneity or heterogeneity. There 216 Oliker, Russia´s Chechen Wars...Ronfeldt regarding the degree of homogeneity of the teams should also be evaluated. In some cases, there might be a higher degree of specialization in...prerequisites. A. IRREGULAR WARFARE – A DIRTY WAR? Based on the last decades of conflicts, the tactics used in irregular warfare have left a bad taste in the

  14. Key Planning Factors for Recovery from a Chemical Warfare Agent Incident

    Science.gov (United States)

    2012-07-01

    GB], Franke, S., Manual of Military Chemistry , Volume 1. Chemistry of Chemical Warfare Agents, Deutscher Militîrverlag: Berlin (East), 1967... Chemistry , Volume 1. Chemistry of Chemical Warfare Agents, Deutscher Militîrverlag: Berlin (East), 1967. Translated from German by U.S. Department of...Response and Recovery Phases A common misconception is that recovery begins after the response phase. Recovery, however, actually begins during

  15. Estimated Chemical Warfare Agent Surface Clearance Goals for Remediation Pre-Planning

    Energy Technology Data Exchange (ETDEWEB)

    Dolislager, Frederick [University of Tennessee, Knoxville (UTK); Bansleben, Dr. Donald [U.S. Department of Homeland Security; Watson, Annetta Paule [ORNL

    2010-01-01

    Health-based surface clearance goals, in units of mg/cm2, have been developed for the persistent chemical warfare agents sulfur mustard (HD) and nerve agent VX as well as their principal degradation products. Selection of model parameters and critical receptor (toddler child) allow calculation of surface residue estimates protective for the toddler child, the general population and adult employees of a facilty that has undergone chemical warfare agent attack.

  16. Electronic Warfare Closed Loop Laboratory (EWCLL) Antenna Motor Software and Hardware Development

    Science.gov (United States)

    2016-09-01

    Electronic Warfare Closed Loop Laboratory (EWCLL) Antenna Motor Software and Hardware Development by Neal Tesny Sensors and Electron Devices Directorate...TITLE AND SUBTITLE Electronic Warfare Closed Loop Laboratory (EWCLL) Antenna Motor Software and Hardware Development 5a. CONTRACT NUMBER 5b...called cllMotorBasic. This module can be used separately if one is developing other software that needs to control the motors . The front panel of this

  17. Welcome to the Naval Postgraduate School Center on Terrorism and Irregular Warfare, Webpage

    OpenAIRE

    Center on Terrorism and Irregular Warfare

    2013-01-01

    Includes an image of the main page on this date and compressed file containing additional web pages. Established in 1998, The Center on Terrorism and Irregular Warfare produces timely, innovative, interdisciplinary analysis relevant to policy and operations. In studying terrorism and irregular warfare, the Center focuses the research capabilities of its staff and the Naval Postgraduate School on an area of critical importance to the national security of the United States.

  18. Modeling Anti-Air Warfare With Discrete Event Simulation and Analyzing Naval Convoy Operations

    Science.gov (United States)

    2016-06-01

    W., & Scheaffer, R. L. (2008). Mathematical statistics with applications . Belmont, CA: Cengage Learning. 118 THIS PAGE INTENTIONALLY LEFT BLANK...WARFARE WITH DISCRETE EVENT SIMULATION AND ANALYZING NAVAL CONVOY OPERATIONS by Ali E. Opcin June 2016 Thesis Advisor: Arnold H. Buss Co...REPORT DATE June 2016 3. REPORT TYPE AND DATES COVERED Master’s thesis 4. TITLE AND SUBTITLE MODELING ANTI-AIR WARFARE WITH DISCRETE EVENT

  19. The impact of warfare on the soil environment

    Science.gov (United States)

    Certini, Giacomo; Scalenghe, Riccardo; Woods, William I.

    2013-12-01

    One of the most dramatic ways humans can affect soil properties is through the performance of military activities. Warfare-induced disturbances to soil are basically of three types - physical, chemical, and biological - and are aimed at causing direct problems to enemies or, more often, are indirect, undesired ramifications. Physical disturbances to soil include sealing due to building of defensive infrastructures, excavation of trenches or tunnels, compaction by traffic of machinery and troops, or cratering by bombs. Chemical disturbances consist of the input of pollutants such as oil, heavy metals, nitroaromatic explosives, organophosphorus nerve agents, dioxins from herbicides, or radioactive elements. Biological disturbances occur as unintentional consequences of the impact on the physical and chemical properties of soil or the deliberate introduction of microorganisms lethal to higher animals and humans such as botulin or anthrax. Soil represents a secure niche where such pathogens can perpetuate their virulence for decades.

  20. Nanostructured Metal Oxides for Stoichiometric Degradation of Chemical Warfare Agents.

    Science.gov (United States)

    Štengl, Václav; Henych, Jiří; Janoš, Pavel; Skoumal, Miroslav

    2016-01-01

    Metal oxides have very important applications in many areas of chemistry, physics and materials science; their properties are dependent on the method of preparation, the morphology and texture. Nanostructured metal oxides can exhibit unique characteristics unlike those of the bulk form depending on their morphology, with a high density of edges, corners and defect surfaces. In recent years, methods have been developed for the preparation of metal oxide powders with tunable control of the primary particle size as well as of a secondary particle size: the size of agglomerates of crystallites. One of the many ways to take advantage of unique properties of nanostructured oxide materials is stoichiometric degradation of chemical warfare agents (CWAs) and volatile organic compounds (VOC) pollutants on their surfaces.

  1. Information Warfare on Social Media: A Brand Management Perspective

    Directory of Open Access Journals (Sweden)

    Kalpokas Ignas

    2017-06-01

    Full Text Available Employing a perspective informed by brand management, this article aims at understanding information warfare operations in social media. The state, seen as brand, must project an image of itself to both internal and foreign audiences to unite the domestic audience and/or attract global support. However, in constructing a brand, states are vulnerable to ‘sofa warriors’ – ordinary individuals who have been unwittingly recruited by hostile actors to disseminate (over social media or other platforms a counter-brand, harmful to the state concerned. These new threats are investigated in light of recent tendencies in online branding, elucidating their status as a national security threat, with the potential to significantly disrupt life in political communities.

  2. Agroterrorism, Biological Crimes, and Biological Warfare Targeting Animal Agriculture

    Energy Technology Data Exchange (ETDEWEB)

    Wilson, Terry M.; Logan-Henfrey, Linda; Weller, Richard E.; Kellman, Brian

    2000-04-12

    There is a rising level of concern that agriculture might be targeted for economic sabotage by terrorists. Knowledge gathered about the Soviet Union biological weapons program and Iraq following the Gulf War, confirmed that animals and agricultural crops were targets of bioweapon development. These revelations are particularly disturbing in light of the fact that both countries are States Parties to the Biological and Toxin Weapons Convention that entered into force in 1975. The potential for misusing biotechnology to create more virulent pathogens and the lack of international means to detect unethical uses of new technologies to create destructive bioweapons is of increasing concern. Disease outbreaks, whether naturally occurring or intentionally, involving agricultural pathogens that destroy livestock and crops would have a profound impact on a country's infrastructure, economy and export markets. This chapter deals with the history of agroterrorism, biological crimes and biological warfare directed toward animal agriculture, specifically, horses, cattle, swine, sheep, goats, and poultry.

  3. Book Review: Conquest in Cyberspace: National Security and Information Warfare

    Directory of Open Access Journals (Sweden)

    Gary C. Kessler

    2007-06-01

    Full Text Available Libicki, M.C. (2007. Conquest in Cyberspace: National Security and Information Warfare. New York: Cambridge University Press. 323 pages, ISBN: 978-0-521-69214-4 (paper, US$80Reviewed by Gary C. Kessler (gary.kessler@champlain.eduMany books -- and even movies ("Live Free or Die Hard" -- are based upon the premise of an impending information war. In these scenarios -- made all too plausible by the increased frequency with which we read about and experience major information security incidents -- a Bad Guy exploits known computer security vulnerabilities in order to control major national infrastructures via the Internet so as to reap financial, economic, and/or personal power.(see PDF for full review

  4. An Open Architecture Framework for Electronic Warfare Based Approach to HLA Federate Development

    Directory of Open Access Journals (Sweden)

    HyunSeo Kang

    2018-01-01

    Full Text Available A variety of electronic warfare models are developed in the Electronic Warfare Research Center. An Open Architecture Framework for Electronic Warfare (OAFEw has been developed for reusability of various object models participating in the electronic warfare simulation and for extensibility of the electronic warfare simulator. OAFEw is a kind of component-based software (SW lifecycle management support framework. This OAFEw is defined by six components and ten rules. The purpose of this study is to construct a Distributed Simulation Interface Model, according to the rules of OAFEw, and create Use Case Model of OAFEw Reference Conceptual Model version 1.0. This is embodied in the OAFEw-FOM (Federate Object Model for High-Level Architecture (HLA based distributed simulation. Therefore, we design and implement EW real-time distributed simulation that can work with a model in C++ and MATLAB API (Application Programming Interface. In addition, OAFEw-FOM, electronic component model, and scenario of the electronic warfare domain were designed through simple scenarios for verification, and real-time distributed simulation between C++ and MATLAB was performed through OAFEw-Distributed Simulation Interface.

  5. A Survey of Game Theoretic Approaches to Modelling Decision-Making in Information Warfare Scenarios

    Directory of Open Access Journals (Sweden)

    Kathryn Merrick

    2016-07-01

    Full Text Available Our increasing dependence on information technologies and autonomous systems has escalated international concern for information- and cyber-security in the face of politically, socially and religiously motivated cyber-attacks. Information warfare tactics that interfere with the flow of information can challenge the survival of individuals and groups. It is increasingly important that both humans and machines can make decisions that ensure the trustworthiness of information, communication and autonomous systems. Subsequently, an important research direction is concerned with modelling decision-making processes. One approach to this involves modelling decision-making scenarios as games using game theory. This paper presents a survey of information warfare literature, with the purpose of identifying games that model different types of information warfare operations. Our contribution is a systematic identification and classification of information warfare games, as a basis for modelling decision-making by humans and machines in such scenarios. We also present a taxonomy of games that map to information warfare and cyber crime problems as a precursor to future research on decision-making in such scenarios. We identify and discuss open research questions including the role of behavioural game theory in modelling human decision making and the role of machine decision-making in information warfare scenarios.

  6. The Hawai'i Undersea Research Laboratory: Applying Innovative Deep-sea Technologies Toward Research, Service, and Stewardship in Marine Protected Areas of the Pacific Region

    Science.gov (United States)

    Smith, J. R.

    2012-12-01

    The Hawai'i Undersea Research Laboratory (HURL) is the only U.S. deep submergence facility in the Pacific Rim tasked with supporting undersea research necessary to fulfill the mission, goals, and objectives of the National Oceanic and Atmospheric Administration (NOAA), along with other national interests of importance. Over 30 years of submersible operations have resulted in nearly 1900 dives representing 9300 hours underwater, and a benthic ecology database derived from in-house video record logging of over 125,000 entries based on 1100 unique deep-sea animal identifications in the Hawaiian Archipelago. As a Regional Center within the Office of Ocean Exploration and Research (OER), HURL conducts undersea research in offshore and nearshore waters of the main and Northwestern Hawaiian Islands and waters of the central, southern, and western Pacific. HURL facilities primarily support marine research projects that require data acquisition at depths greater than wet diving methods. These consist of the research vessel Ka'imikai-o-Kanaloa (KOK), human occupied submersibles Pisces IV and Pisces V (2000 m), a new remotely operated vehicle (6000 m), and a multibeam bathymetric sonar system (11,000 m). In addition, HURL has also supported AAUS compliant wet diving since 2003, including technical mixed gas/rebreather work. While ecosystem studies of island, atoll, and seamount flanks are the largest component of the HURL science program, many other thematic research areas have been targeted including extreme and unique environments, new resources from the sea, episodic events to long term changes, and the development of innovative technologies. Several examples of HURL's contributions to marine protected areas (MPAs) include: (a) A long term presence in the pristine ecosystems of the Papahānaumokuākea Marine National Monument in the Northwestern Hawaiian Islands. Researchers from National Marine Fisheries have used HURL assets to study endangered Hawaiian Monk Seal habitat

  7. Guerilla Warfare & Law Enforcement: Combating the 21st Century Terrorist Cell within the U.S.

    Directory of Open Access Journals (Sweden)

    Major Richard Hughbank

    2009-01-01

    Full Text Available Both domestic and international terrorist organizations employ guerrilla warfare tactics, techniques, and procedures. Thus, the ability to identify and defeat the members of these organizations, cripple their infrastructures, and disrupt their financial resources lies in the understanding of modern guerrilla warfare as it develops in the twenty-first century within the United States.3 The forms of asymmetric warfare4 adopted by domestic and international terrorist groups alike is no longer intended to gain simple media exposure or governmental manipulation; they want to make an overpowering impact by causing massive loss of life and severe damage to infrastructure and are often motivated by religious imperatives and political goals. As terrorism analyst Stephen Flynn has observed, "Throughout the 20th century [Americans] were able to treat national security as essentially an out-of-body experience. When confronted by threats, [America] dealt with them on the turf of our allies or our adversaries. Aside from the occasional disaster and heinous crime, civilian life [in the United States] has been virtually terror-free." With the turn of the twenty-first century, terrorist operations have become more prevalent in the United States and are taking shape in the form of modern guerrilla warfare, thus creating new challenges for federal, state, and local law enforcement agencies. After reviewing the origin and nature of these challenges, this article will offer some suggestions for countering guerilla warfare in the United States.

  8. 78 FR 53109 - Security Zones; Naval Base Point Loma; Naval Mine Anti-Submarine Warfare Command; San Diego Bay...

    Science.gov (United States)

    2013-08-28

    ...-AA87 Security Zones; Naval Base Point Loma; Naval Mine Anti-Submarine Warfare Command; San Diego Bay... Anti-Submarine Warfare Command to protect the relocated marine mammal program. These security zone... the Port, The Commander of Naval Base Point Loma, the Commander of the Naval Mine Anti Submarine...

  9. Eye injuries in twentieth century warfare: a historical perspective.

    Science.gov (United States)

    Wong, T Y; Seet, M B; Ang, C L

    1997-01-01

    With successive wars in the twentieth century, there has been a relative increase in injuries to the eye compared to injuries of other parts of the body. The main causes of eye injury have changed with advances in techniques and weaponry of warfare, with blast fragmentation injuries accounting for 50-80% of cases. Penetrating and perforating injuries are most common, and injuries associated with intraocular foreign bodies pose special diagnostic and management problems. Injuries are bilateral in 15-25% of cases. Injuries associated with chemical, nuclear, and laser weapons have distinct characteristics and epidemiology. Enucleation was commonly performed at the turn of the century, but incidence has declined with better understanding of the pathophysiology of ocular trauma, improved surgical techniques and sepsis control with antibiotics. Sympathetic ophthalmia appears to be uncommon and earlier fears of this complication seem to have been exaggerated. Timely evacuation to a surgical facility is important for a good visual prognosis and preservation of the globe. However, prevention of injuries with eye armor is ultimately the best management, and the need for a comprehensive eye protection program in the military cannot be overemphasized, especially since eye injuries pose important socioeconomic, as well as medical, problems.

  10. The enemy as animal: Symmetric dehumanization during asymmetric warfare.

    Science.gov (United States)

    Bruneau, Emile; Kteily, Nour

    2017-01-01

    Historically, dehumanization has enabled members of advantaged groups to 'morally disengage' from disadvantaged group suffering, thereby facilitating acts of intergroup aggression such as colonization, slavery and genocide. But is blatant dehumanization exclusive to those at the top 'looking down', or might disadvantaged groups similarly dehumanize those who dominate them? We examined this question in the context of intergroup warfare in which the disadvantaged group shoulders a disproportionate share of casualties and may be especially likely to question the humanity of the advantaged group. Specifically, we assessed blatant dehumanization in the context of stark asymmetric conflict between Israelis (Study 1; N = 521) and Palestinians (Study 2; N = 354) during the 2014 Gaza war. We observed that (a) community samples of Israelis and Palestinians expressed extreme (and comparable) levels of blatant dehumanization, (b) blatant dehumanization was uniquely associated with outcomes related to outgroup hostility for both groups, even after accounting for political ideologies known to strongly predict outgroup aggression, and (c) the strength of association between blatant dehumanization and outcomes was similar across both groups. This study illuminates the striking potency and symmetry of blatant dehumanization among those on both sides of an active asymmetric conflict.

  11. Studies on residue-free decontaminants for chemical warfare agents.

    Science.gov (United States)

    Wagner, George W

    2015-03-17

    Residue-free decontaminants based on hydrogen peroxide, which decomposes to water and oxygen in the environment, are examined as decontaminants for chemical warfare agents (CWA). For the apparent special case of CWA on concrete, H2O2 alone, without any additives, effectively decontaminates S-2-(diisopropylamino)ethyl O-ethyl methylphosphonothioate (VX), pinacolyl methylphosphorofluoridate (GD), and bis(2-choroethyl) sulfide (HD) in a process thought to involve H2O2 activation by surface-bound carbonates/bicarbonates (known H2O2 activators for CWA decontamination). A plethora of products are formed during the H2O2 decontamination of HD on concrete, and these are characterized by comparison to synthesized authentic compounds. As a potential residue-free decontaminant for surfaces other than concrete (or those lacking adsorbed carbonate/bicarbonate) H2O2 activation for CWA decontamination is feasible using residue-free NH3 and CO2 as demonstrated by reaction studies for VX, GD, and HD in homogeneous solution. Although H2O2/NH3/CO2 ("HPAC") decontaminants are active for CWA decontamination in solution, they require testing on actual surfaces of interest to assess their true efficacy for surface decontamination.

  12. Unconventional Nuclear Warfare Defense (UNWD) containment and mitigation subtask.

    Energy Technology Data Exchange (ETDEWEB)

    Wente, William Baker

    2005-06-01

    The objective of this subtask of the Unconventional Nuclear Warfare Design project was to demonstrate mitigation technologies for radiological material dispersal and to assist planners with incorporation of the technologies into a concept of operations. The High Consequence Assessment and Technology department at Sandia National Laboratories (SNL) has studied aqueous foam's ability to mitigate the effects of an explosively disseminated radiological dispersal device (RDD). These benefits include particle capture of respirable radiological particles, attenuation of blast overpressure, and reduction of plume buoyancy. To better convey the aqueous foam attributes, SNL conducted a study using the Explosive Release Atmospheric Dispersion model, comparing the effects of a mitigated and unmitigated explosive RDD release. Results from this study compared health effects and land contamination between the two scenarios in terms of distances of effect, population exposure, and remediation costs. Incorporating aqueous foam technology, SNL created a conceptual design for a stationary containment area to be located at a facility entrance with equipment that could minimize the effects from the detonation of a vehicle transported RDD. The containment design was evaluated against several criteria, including mitigation ability (both respirable and large fragment particle capture as well as blast overpressure suppression), speed of implementation, cost, simplicity, and required space. A mock-up of the conceptual idea was constructed at SNL's 9920 explosive test site to demonstrate the containment design.

  13. Drone Warfare: Twenty-First Century Empire and Communications

    Directory of Open Access Journals (Sweden)

    Kevin Howley

    2017-02-01

    Full Text Available This paper, part of a larger project that examines drones from a social-construction of technology perspective, considers drone warfare in light of Harold Innis’s seminal work on empire and communication. Leveraging leading-edge aeronautics with advanced optics, data processing, and networked communication, drones represent an archetypal “space-biased” technology. Indeed, by allowing remote operators and others to monitor, select, and strike targets from half a world away, and in real-time, these weapon systems epitomize the “pernicious neglect of time” Innis sought to identify and remedy in his later writing. With Innis’s time-space dialectic as a starting point, then, the paper considers drones in light of a longstanding paradox of American culture: the impulse to collapse the geographical distance between the United States and other parts of the globe, while simultaneously magnifying the cultural difference between Americans and other peoples and societies. In the midst of the worldwide proliferation of drones, this quintessentially sublime technology embodies this (disconnect in important, profound, and ominous ways.

  14. Back to the future: aerial warfare in Libya

    Directory of Open Access Journals (Sweden)

    João Paulo Nunes Vicente

    2013-05-01

    Full Text Available A century after the first air bomb mission, a new intervention in the same geographic space has made evident the changes in Airpower. The Aerial Warfare in Libya has radically changed the civil war, complying with a UN mission to protect Libyan population, imposing a no-fly zone and an arms embargo. Therefore, Operation Unified Protector became one of the most successful campaigns in the history of NATO. We aim to assess the operational efficiency of Airpower in the conflict in Libya, focusing on the challenges of a War essentially Aerial. Despite the military results and the fact that some political objectives were met, we can identify some concerning trends that, if not shifted, may negatively influence future NATO operations. We do not aim to draw general and universal conclusions on the strategic value of Airpower based on the analysis of a specific case. Above all, we focus on identifying some lessons which have influenced OUP operational efficiency. Thus, we must analyze some factors, such as the scope of objectives, the type of opposing action and aerial strategy used by the coalition and then focus on the challenges arising from the OUP.

  15. Detection of biological warfare agents using ultra violet-laser induced fluorescence LIDAR.

    Science.gov (United States)

    Joshi, Deepti; Kumar, Deepak; Maini, Anil K; Sharma, Ramesh C

    2013-08-01

    This review has been written to highlight the threat of biological warfare agents, their types and detection. Bacterial biological agent Bacillus anthracis (bacteria causing the disease anthrax) which is most likely to be employed in biological warfare is being discussed in detail. Standoff detection of biological warfare agents in aerosol form using Ultra violet-Laser Induced Fluorescence (UV-LIF) spectroscopy method has been studied. Range-resolved detection and identification of biological aerosols by both nano-second and non-linear femto-second LIDAR is also discussed. Calculated received fluorescence signal for a cloud of typical biological agent Bacillus globigii (Simulants of B. anthracis) at a location of ~5.0 km at different concentrations in presence of solar background radiation has been described. Overview of current research efforts in internationally available working UV-LIF LIDAR systems are also mentioned briefly. Copyright © 2013 Elsevier B.V. All rights reserved.

  16. SiGe-based re-engineering of electronic warfare subsystems

    CERN Document Server

    Lambrechts, Wynand

    2017-01-01

    This book equips readers with a thorough understanding of the applicability of new-generation silicon-germanium (SiGe) electronic subsystems for the military purposes of electronic warfare and defensive countermeasures. The theoretical and technical background is extensively explained and all aspects of the integration of SiGe as an enabling technology for maritime, land, and airborne (including space) electronic warfare are addressed, including research, design, development, and implementation. The coverage is supported by mathematical derivations, informative illustrations, practical examples, and case studies. While SiGe technology provides speed, performance, and price advantages in many markets, sharing of information on its use in electronic warfare systems has to date been limited, especially in developing nations. This book will therefore be warmly welcomed as an engineering guideline that focuses especially on the speed and reliability of current-generation SiGe circuits and highlights emerging innov...

  17. THE CYBER DIMENSION OF MODERN HYBRID WARFARE AND ITS RELEVANCE FOR NATO

    Directory of Open Access Journals (Sweden)

    Sorin DUCARU

    2016-06-01

    Full Text Available The technological development and the instant communication possibilities advanced not only economic and social developments, but also evolving threats from those who exploit the vulnerabilities of communication and information systems. The cyber threat landscape points to a significant increase of the frequency, intensity, duration and sophistication of cyber-attacks. One of the new and concerning trends is the use of cyber capabilities in relation with military of hybrid operations – the so-called cyber dimension of hybrid warfare. NATO’s strategy on countering hybrid warfare is based on the triad: prepare-deter-defend, which also applies to cyber. Nations represent the first line of defence in countering hybrid strategies. International cooperation is also a key factor in this sense. It is in this context that NATO’s response to cyber-attacks in the context of hybrid warfare must be further refined.

  18. The United States and biological warfare: secrets from the early cold war and Korea.

    Science.gov (United States)

    Bruwer, A

    2001-01-01

    The United States and Biological Warfare is about accusations that the United States resorted to bacteriological warfare at a time of great military stress during the Korean War. In December 1951, the then US Secretary of Defense ordered early readiness for offensive use of biological weapons. Soon afterwards, the North Korean and Chinese armies accused the United States of starting a large-scale biological warfare experiment in Korea. The US State Department denied the accusation. Both parties to the dispute maintain their positions today. The authors spent 20 years researching the accusations in North America, Europe and Japan. They were the first foreigners to be given access to Chinese classified documents. The reader is also introduced to the concept of 'plausible denial', an official US policy which allowed responsible governmental representatives to deny knowledge of certain events. The authors hope that their work will contribute to the understanding of a time when modern war expanded into a new type of violence.

  19. Skeletal evidence for Inca warfare from the Cuzco region of Peru.

    Science.gov (United States)

    Andrushko, Valerie A; Torres, Elva C

    2011-11-01

    This article addresses the bioarchaeological evidence for Inca warfare through an analysis of 454 adult skeletons from 11 sites in the Inca capital region of Cuzco, Peru. These 11 sites span almost 1000 years (AD 600-1532), which allows for a comparison of the evidence for warfare before the Inca came to power (Middle Horizon AD 600-1000), during the time of Inca ascendency in the Late Intermediate Period (AD 1000-1400), and after the Inca came to power and expanded throughout the Cuzco region and beyond (Inca Imperial Period, AD 1400-1532). The results indicate that 100 of 454 adults (22.0%) showed evidence of cranial trauma. Of these, 23 individuals had major cranial injuries suggestive of warfare, consisting of large, complete, and/or perimortem fractures. There was scant evidence for major injuries during the Middle Horizon (2.8%, 1/36) and Late Intermediate Period (2.5%, 5/199), suggesting that warfare was not prevalent in the Cuzco region before and during the Inca rise to power. Only in the Inca Imperial Period was there a significant rise in major injuries suggestive of warfare (7.8%, 17/219). Despite the significant increase in Inca times, the evidence for major cranial injuries was only sporadically distributed at Cuzco periphery sites and was entirely absent at Cuzco core sites. These findings suggest that while the Inca used warfare as a mechanism for expansion in the Cuzco region, it was only one part of a complex expansion strategy that included economic, political, and ideological means to gain and maintain control. Copyright © 2011 Wiley-Liss, Inc.

  20. Particle Swarm Social Adaptive Model for Multi-Agent Based Insurgency Warfare Simulation

    Energy Technology Data Exchange (ETDEWEB)

    Cui, Xiaohui [ORNL; Potok, Thomas E [ORNL

    2009-12-01

    To better understand insurgent activities and asymmetric warfare, a social adaptive model for modeling multiple insurgent groups attacking multiple military and civilian targets is proposed and investigated. This report presents a pilot study using the particle swarm modeling, a widely used non-linear optimal tool to model the emergence of insurgency campaign. The objective of this research is to apply the particle swarm metaphor as a model of insurgent social adaptation for the dynamically changing environment and to provide insight and understanding of insurgency warfare. Our results show that unified leadership, strategic planning, and effective communication between insurgent groups are not the necessary requirements for insurgents to efficiently attain their objective.

  1. NONDESTRUCTIVE IDENTIFICATION OF CHEMICAL WARFARE AGENTS AND EXPLOSIVES BY NEUTRON GENERATOR-DRIVEN PGNAA

    Energy Technology Data Exchange (ETDEWEB)

    T. R. Twomey; A. J. Caffrey; D. L. Chichester

    2007-02-01

    Prompt gamma-ray neutron activation analysis (PGNAA) is now a proven method for the identification of chemical warfare agents and explosives in military projectiles and storage containers. Idaho National Laboratory is developing a next-generation PGNAA instrument based on the new Ortec Detective mechanically-cooled HPGe detector and a neutron generator. In this paper we review PGNAA analysis of suspect chemical warfare munitions, and we discuss the advantages and disadvantages of replacing the californium-252 radioisotopic neutron source with a compact accelerator neutron generator.

  2. NONDESTRUCTIVE IDENTIFICATION OF CHEMICAL WARFARE AGENTS AND EXPLOSIVES BY NEUTRON GENERATOR-DRIVEN PGNAA

    International Nuclear Information System (INIS)

    T. R. Twomey; A. J. Caffrey; D. L. Chichester

    2007-01-01

    Prompt gamma-ray neutron activation analysis (PGNAA) is now a proven method for the identification of chemical warfare agents and explosives in military projectiles and storage containers. Idaho National Laboratory is developing a next-generation PGNAA instrument based on the new Ortec Detective mechanically-cooled HPGe detector and a neutron generator. In this paper we review PGNAA analysis of suspect chemical warfare munitions, and we discuss the advantages and disadvantages of replacing the californium-252 radioisotopic neutron source with a compact accelerator neutron generator

  3. Diagnosis of exposure to chemical warfare agents: An essential tool to counteract chemical terrorism

    NARCIS (Netherlands)

    Noort, D.; Schans, M.J. van der; Bikker, F.J.; Benschop, H.P.

    2009-01-01

    Methods to analyze chemical warfare agents (CW-agents) and their decomposition products in environmental samples were developed over the last decades. In contrast herewith, procedures for analysis in biological samples have only recently been developed. Retrospective detection of exposure to

  4. A statistical analysis of the effect of warfare on the human secondary sex ratio

    NARCIS (Netherlands)

    Graffelman, J.; Hoekstra, R.F.

    2000-01-01

    Many factors have been hypothesized to affect the human secondary sex ratio (the annual percentage of males among all live births), among them race, parental ages, and birth order. Some authors have even proposed warfare as a factor influencing live birth sex ratios. The hypothesis that during and

  5. 75 FR 69032 - Naval Surface Warfare Center, Potomac River, Dahlgren, VA; Danger Zone

    Science.gov (United States)

    2010-11-10

    ... Warfare Center, Dahlgren's patrol boats. Oystering and fishing boats or other craft may cross the river in... energy technology, and manned or unmanned water craft operations; (2) change the latitude and longitude... shoreline for commercial fishing and waterfowl hunting blinds under existing Navy and state regulations. The...

  6. The Evolution of Naval Warfare Technology and the Impact of Space Systems

    Science.gov (United States)

    1987-09-01

    or Greek fire. Larger missile devices such as the trebuchet were commonly used in land warfare, particularly in siege operations. However, the...were being used more widely in the Mediterranean. Mangonels and trebuchets were used to heave a variety of projectiles. Their adaptation for use on

  7. Information Warfare: Legal, Regulatory, Policy and Organizational Considerations for Assurance. Second Edition.

    Science.gov (United States)

    1996-07-04

    2-19 2-2-1 State Com puter Crim e Statutes ....................................................................... 2-44...2-2-2 Com puter Crim e Jurisdiction .......................................................................... 2-45 2-4-1 Information Warfare Policy...infrastructures from physical and cyber threats. * Propose statutory and regulatory changes. The Infrastructure Protection Task Force (IPTF): * Increase

  8. Above the Influence: The Strategic Effects of Airpower in Irregular Warfare

    Science.gov (United States)

    2010-06-01

    using the methods of Mao Zedong , working at the individual village level to subvert central government authority, which effectively stopped at the...Nagl, ―Principles, Imperatives, and Paradoxes of Counterinsurgency,‖ 50; Mao Tse-Tung, Problems of Strategy in Guerrilla Warfare, 215-216; Gray...outposts, 63 General (Ret.) William W. Momyer, Airpower in Three Wars ( WWII , Korea, Vietnam

  9. Ge 4+ doped TiO 2 for stoichiometric degradation of warfare agents

    Czech Academy of Sciences Publication Activity Database

    Štengl, Václav; Matys Grygar, Tomáš; Opluštil, F.; Němec, T.

    2012-01-01

    Roč. 227, AUGUST (2012), s. 62-67 ISSN 0304-3894 R&D Projects: GA ČR(CZ) GAP106/12/1116 Institutional support: RVO:61388980 Keywords : germanium * homogeneous hydrolysis * titania * urea * warfare agent degradation Subject RIV: CA - Inorganic Chemistry Impact factor: 3.925, year: 2012

  10. (Review of) Reno, William. 2011. Warfare in Independent Africa. Cambridge: Cambridge University Press

    DEFF Research Database (Denmark)

    Hagmann, Tobias

    2013-01-01

    Warfare in Independent Africa is Reno’s bold attempt to analyze the modern history of African insurgencies. The book tackles this task through the prism of five generations of rebel, which left their mark on the continent; anti-colonial rebels, majority rule rebels, reform rebels, warlord rebels ...

  11. Urban Warfare at the Operational Level: Identifying Centers of Gravity and Key Nodes

    National Research Council Canada - National Science Library

    McCleskey, Edward

    1999-01-01

    .... The intent of this paper is to focus the reader on the operational level of urban warfare. A key task for the Joint Force Commander and his staff will be to identify the targets against which he will employ his component forces...

  12. The influence of the Ratel infantry fighting vehicle on mobile warfare ...

    African Journals Online (AJOL)

    This article traces the story of how the author and a number of daring young commanders and soldiers had cast aside military textbooks in developing their own military doctrine for mobile warfare, South African style. It is clear that the Ratel infantry fighting vehicle had wielded huge influence on the development and ...

  13. Improving Blood Monitoring of Enzymes as Biomarkers of Risk from Anticholinergic Pesticides and Chemical Warfare Agents

    Science.gov (United States)

    2007-10-01

    1991. Protection by butyrylcholinesterase against organophosphorus poisoning in nonhuman primates. J. Pharmacol. Exp. Ther. 259(2): 633-638. Costa...Employee Health), Stephen McCurdy (UCD Epidemiology ), Stephanie Padilla (US EPA), Matthew Keifer (U. Washington) and CA and Utah clinical laboratories...the cholinergic function of the nervous system (Wilson, 2001). Organophosphorus ester pesticides and chem- ical warfare agents disrupt cholinergic

  14. Military medicine and the ethics of war: British colonial warfare during the Seven Years War (1756-63).

    Science.gov (United States)

    Charters, Erica

    2010-01-01

    This article examines 18th-century European warfare, tracing the first formal codifications of conventions of war, frequently introduced by military physicians and initially regarding the treatment of the sick and wounded. It outlines to what extent these conventions were followed in practice, particularly in the challenging environment of American irregular warfare, with a focus on the most well-known incident of "biological warfare" in the period: the deliberate spread of smallpox by British officers among Amerindians in 1763. More broadly, it demonstrates that the history of military medicine provides a fruitful method with which to uncover assumptions about the ethics of war.

  15. An inventory of wargaming models for special warfare: Candidate applications for the infusion of human performance data

    Energy Technology Data Exchange (ETDEWEB)

    Burton, H.D.; Banks, W.W.; Schultz, E.E.; Berghage, T.E.

    1988-11-01

    The material contained in this compendium has been drawn from many sources in an attempt to define the number and types of small group combat simulation models which currently exist. The emphasis placed on this particular effort was to identify combat simulation models which are oriented or could be oriented toward special warfare involving highly trained, light, mobile forces. These descriptions and characterizations of the different simulation models should be viewed with the goal of infusing human performance data and human performance models into candidate simulation models to enhance both fidelity and realism. We feel that this listing will be of direct benefit to military and civilian scientists who are interested in identifying candidate combat simulation models which can be targeted for enhancement with appropriate human performance data. Few existing models reviewed were found to incorporate laboratory or field data drawn from the behavioral sciences or human performance literature. Several models did incorporate human performance assumptions which were found to be incongruent with real world data about how people behave under various environmental conditions and both physical and cognitive stress.

  16. Evolution of war and cyber attacks in the concept of conventional warfare

    Directory of Open Access Journals (Sweden)

    Huseyin Kuru

    2018-01-01

    Full Text Available Humanity have witnessed many confrontations of states whose interests challenge at some points and their struggle to neutralize problems in battlefield. While war was perceived as a way of eliminating deadlocks for some parties, some considered it as one of the international policy materials. The definition and content of conventional warfare have been subject to change for centuries, while the new weapons and technologies have been developed by human beings that it has brought constant change in the law of war and at the same time more lethal and devastating consequences. The struggle for superiority in international relations played an impulsive role in the development of weapons used in the battlefield. Countries have used their labor and financial resources to improve their military skills. Beginning with stones and sticks in the battlefield, this struggle has reached the point of using the next generation satellite controlled unmanned and armed aircrafts and having nuclear weapons has become more deterrent than using them. The struggle between strong countries and the limited countries in terms of technology and armed groups that do not have enough technology and skills completely changed the definition of conventional warfare. This fight has led Asymmetric warfare born which can turn commercial airline planes full of innocent people into a weapon like September-11 attacks. In this study, the historical development and the change in the content of the warfare were briefly explained and then cyber-attacks in the concept of the fourth generation warfare was analyzed taking into account of prominent attacks.

  17. An Analysis of the Effectiveness Evaluation Process for VP Antisubmarine Warfare Fleet Replacement Squadron Aircrew Training.

    Science.gov (United States)

    1982-10-01

    performance. Second, Stuff lebeam [Ref. 21] developed evaluation methods composed of a model called CIPP (Context, Input, Process, and Product). The model...Evaluation Pe ectives and Procedures, in W. J. Popham, Nvaluatio,n dia tit , -NcCutchan, 1974. 21. Stufflebeam , D. Lo., Foley, W. J., Gephart, W. Ro, Guba

  18. Asymmetric Warfare in the Simulation and Training Environment: Comprehensive Approach Wanted!

    Science.gov (United States)

    2009-10-01

    Tzu.: The Art of War. (New York: Delacorte Press, 1983). [9] Terem, P.: Globalisation and its Environmental Dimension. Siwek,T.-Baar,V.(ed... Globalisation and its Geopolitical, Cultural, Economic and Ecological Context. 8.-10. 10. 2003 University of Ostrava, 2004, ISBN 80-7368-022-X, str.304-314, AEC.

  19. The Role of Cultural Understanding and Language Training in Unconventional Warfare

    National Research Council Canada - National Science Library

    Beleaga, Constantin

    2004-01-01

    .... After examining some situations in which United States and British forces carried out counterinsurgency operations, the author reveals that ground troops with foreign-language skills and cultural...

  20. The Role of Cultural Understanding and Language Training in Unconventional Warfare

    Science.gov (United States)

    2004-12-01

    this are various forms of psychological actions and a persuasive use of propaganda. Hence, as Valeriano & Bohannan (1962) note, “whoever wants to...Publishing Co., Inc. Valeriano , N.D. & Bohannan, C. T.R. (1962). Counter-guerrilla Operations: The Philippine Experience. New York: Frederick A. Praeger

  1. Bench-Scale Investigation of Composting for Remediation of Explosives-Contaminated Soils from Naval Surface Warfare Center, Crane, Indiana

    National Research Council Canada - National Science Library

    Preston, Kurt

    1998-01-01

    ...), and octahydro-1,3,5,7-tetranitro-1,3,5,7- tetrazocine (HMX). The Naval Surface Warfare Center (NSWC), Crane, Indiana, provides material and logistic support to the Navy's weapon systems, including expendable and nonexpendable ordnance items...

  2. The German Military Entrepreneur Ernst von Mansfeld and His Conduct of Asymmetrical Warfare in the Thirty Years War

    OpenAIRE

    Bäckström, Olli

    2011-01-01

    The dissertation examines aspects of asymmetrical warfare in the war-making of the German military entrepreneur Ernst von Mansfeld during his involvement in the Thirty Years War. Due to the nature of the inquiry, which combines history with military-political theory, the methodological approach of the dissertation is interdisciplinary. The theoretical framework used is that of asymmetrical warfare. The primary sources used in the dissertation are mostly political pamphlets and newsl...

  3. The Importance of Airpower in Supporting Irregular Warfare in Afghanistan

    Science.gov (United States)

    2012-08-01

    Shindand Air Base’s ability to support initial tranche of pilot candidates (approximately 100) into pilot training Way Ahead - Thunder Lab English...heavy snows triggered deadly avalanches that killed some 150 people in the Salang Pass in north-central Afghanistan.14 Once notified of the tragedy, the

  4. Unconventional Warfare: A Mission Metamorphosis for the 21st Century?

    Science.gov (United States)

    2000-06-01

    attachments included a 1.5 million-candlepower variable beam illuminator that could light up an area the size of a football field. A definite asset for...hand, it was obvious that the U.S. training had brought changes; the rebels fought more like soldiers and less like hooligans . Within months

  5. How Power-Laws Re-Write The Rules Of Cyber Warfare

    Directory of Open Access Journals (Sweden)

    David L. Bibighaus

    2015-12-01

    Full Text Available All warfare contains and element of randomness. This article will argue that, the kind uncertainty encountered in cyber warfare (Power-Law randomness is fundamentally different from the uncertainty the military has evolved to deal with in the physical world (Gaussian-Randomness. The article will explain the difference between these two kinds of randomness, and how cyber weapons appear to operate under Power-Law randomness. It then will show how in cyberspace, key aspects of strategic thought are based on a flaws assumption of randomness. Finally, this article shall argue that if the American military is going to be effective in cyberspace, it must re-examine the way the military assumes risk, recruits is forces, plans for war and maintains the peace.

  6. ANTARES: An Undersea Neutrino telescope

    CERN Multimedia

    2002-01-01

    The ANTARES (Astronomy with a Neutrino Telescope and ${Abyss}$ environmental RESearch) deep-sea neutrino telescope is designed to search for neutrinos of astrophysical origin. Neutrinos are unique probes of the high energy universe; being neutral they are not deflected by magnetic fields and interacting weakly they can readily escape from the densest regions of the universe. Potential sources of neutrino are galactic (e.g supernova remnants, micro-quasars) and extra-galactic (e.g active galactic nuclei, gamma-ray bursters). Annihilation of dark matter particles in the Sun or Galactic Centre is another well motivated potential source of extra terrestrial neutrinos. The ANTARES detector is located 40 km off the coast of Toulon (France) at a depth of 2475m in the Mediterranean Sea. Being located in the Northern hemisphere it studies the Southern sky and in particular has the Galactic Centre in its field of view. Since 2006, the detector has operated continuously in a partial configuration. The detector was compl...

  7. Undersea vehicles and national needs

    National Research Council Canada - National Science Library

    National Research Council Staff; Commission on Engineering and Technical Systems; Division on Engineering and Physical Sciences; National Research Council; National Academy of Sciences

    The United States faces decisions requiring information about the oceans in vastly expanded scales of time and space and from oceanic sectors not accessible with the suite of tools now used by scientists and engineers...

  8. Undersea vehicles and national needs

    National Research Council Canada - National Science Library

    National Research Council Staff; Commission on Engineering and Technical Systems; Division on Engineering and Physical Sciences; National Research Council; National Academy of Sciences

    ... on Engineering and Technical Systems National Research Council NATIONAL ACADEMY PRESS Washington, D.C. 1996 i Copyrighttrue Please breaks inserted. are Page files. accidentally typesetting been have may original from the errors not typographic original retained, and from the created cannot be files XML from however, formatting, recomposed typesetting...

  9. Air University Research Paper: Asymmetric Warfare - Exposing America’s Weaknesses

    Science.gov (United States)

    2003-04-01

    AU/ACSC/ 03-1261R/2003-04 AIR COMMAND AND STAFF COLLEGE AIR UNIVERSITY AIR UNIVERSITY RESEARCH PAPER ASYMMETRIC WARFARE - EXPOSING AMERICA’S...Air University Research Paper : Asymmetric Wafare - Exposing America’s Weaknesses 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER...Std Z39-18 Disclaimer The views expressed in this academic research paper are those of the author(s) and do not reflect the official policy or

  10. Satellite and Ground Communication Systems: Space and Electronic Warfare Threats to the United States Army

    Science.gov (United States)

    2017-02-01

    Figure 3). However, a 2016 Department of Defense (DoD) report explained that in 2013 “China launched an object into space on a ballistic trajectory with...well as other non-kinetic counter- space capabilities.42 The USCC report also provided detailed analysis of Chinese developments of co-orbital...Satellite and Ground Communication Systems: Space and Electronic Warfare Threats to the

  11. A Review of Multi-Threat Medical Countermeasures Against Chemical Warfare and Terrorism

    Science.gov (United States)

    2004-11-01

    Biopreparat, the military and civil defense to combat chemical warfare and civilian arm of the former Soviet Union’s biological weapons chemical terrorism . program...seamlessly transition to military force protection and civil defense against chemical terrorism . Terrorist threat agents include all classes of MTMC... chemical terrorism . Using MTMC to blunt pathological actions enteric mast cell granulation in acute soman intoxicated rats. Experimentia of chemical agents

  12. Equipping Network Warfare: Industrial-Era Bureaucracies for Information-Era Weapons

    Science.gov (United States)

    2009-04-01

    to operational shortfalls. Clearly, there are benefits in following known methods in organizing the cyberspace mission and its capabilities...sid26_gci853845,00.html (accessed 15 December 2008). 9 BX.com Terminology Reference, “Web Year,” http://www.bx.com/dictionary/ ecommerce /Web_year.cfm... benefits of the process, while amplifying the negative aspects of the bureaucracy. Network warfare capabilities are much more vulnerable to

  13. Mass spectrometric study of selected precursors and degradation products of chemical warfare agents

    Czech Academy of Sciences Publication Activity Database

    Papoušková, B.; Bednář, P.; Fryšová, I.; Stýskala, J.; Hlaváč, J.; Barták, P.; Ulrichová, J.; Jirkovský, Jaromír; Lemr, K.

    2007-01-01

    Roč. 42, č. 12 (2007), s. 1550-1561 ISSN 1076-5174 Grant - others:The Organization for the Prohibition of Chemical Weapons(NL) L/ICA/ICB/84322/04 Institutional research plan: CEZ:AV0Z40400503 Source of funding: V - iné verejné zdroje Keywords : mass spectrometry * chemical warfare agent * high performance liquid chromatography * LC/MS Subject RIV: CF - Physical ; Theoretical Chemistry Impact factor: 3.062, year: 2007

  14. A cost and operational effectiveness analysis of alternative anti-surface warfare platforms

    OpenAIRE

    Skinner, Walter Mark.

    1993-01-01

    Approved for public release; distribution is unlimited. A Cost and Operational Effectiveness Analysis (COEA) is performed for three alternative anti-surface warfare (ASUW) platforms that will conduct operations in multi-service regional scenarios. Estimated program costs, historical cost variances, and measures of operational effectiveness are determined for each COEA alternative, and service life extension effects are examined. The data is merged in a mixed-integer optimization model, MPA...

  15. The Equipment of Czech Firefighters for the Detection and Field Analyses of Chemical Warfare Agents

    Directory of Open Access Journals (Sweden)

    Jana Krykorkova

    2014-05-01

    Full Text Available This paper describes the requirements for the devices of detection, chemical reconnaissance and field analyses of chemical warfare agents (CWA and divides them into simple devices of detection, universal detectors, selective analyzers, multi-component analyzers and mobile laboratories. It also describes the devices of detection available within the Fire and Rescue Service of the Czech Republic (FRS CR and compares them with some prospective trends of further development.

  16. Deterrence in the Human Domain: A COIN Framework to Deterring Unconventional Warfare in Shaping Operations

    Science.gov (United States)

    2017-05-25

    protecting ethnic Russians, providing stability to neighbors, defending “self- determination,” and protecting human rights . Protection of Russian...Deterrence in the Human Domain: A COIN Framework to Deterring Unconventional Warfare in Shaping Operations A Monograph by MAJ Matthew P...should be aware that notwithstanding any other provision of law , no person shall be subject to any penalty for failing to comply with a collection of

  17. Cyberspace as a Complex Adaptive System and the Policy and Operational Implications for Cyber Warfare

    Science.gov (United States)

    2014-05-22

    accessed 13 February 2014). 66Teresa Degenhard “Between War and Crime: The Overlap between War and Crime: Unpacking Foucault and Agamben’s Studies...Article-2-Revision- for- Foucault -and-Agamben-Degenhardt-July-2013.pdf (accessed 5 April 2014). 26... Foucault and Agamben’s Studies within the Context of the War on Terror.”, 34. 68US Department of Defense, Electronic Warfare, Joint Publication 3-13, I-2

  18. Efficacy Evaluation of Current and Future Naval Mine Warfare Neutralization Method

    Science.gov (United States)

    2016-12-01

    MCM-1) Operates off the Coast of Hawaii during Exercise Rim of the Pacific (RIMPAC) 2004. ID: 040710-N-6551H-229. U.S. Navy, Arlington, VA...The Mine Countermeasure Ship USS Avenger (MCM-1) Operates off the Coast of Hawaii during Exercise Rim of the Pacific (RIMPAC) 2004. ID: 040710-N... fire -scout-following-two-crashes/. Accessed December 5, 2016. Space and Naval Warfare Systems Command. 2011. “Marine Mammal Program.” SSC Pacific

  19. Discrete Electronic Warfare Signal Processing using Compressed Sensing Based on Random Modulator Pre-Integrator

    OpenAIRE

    M. Sreenivasa Rao; Chandan C. Mishra; K. Krishna Naik; K. Maheshwara Reddy

    2015-01-01

    Electronic warfare receiver works in the wide electromagnetic spectrum in dense radar signal environment. Current trends in radar systems are ultra wideband and low probability of intercept radar technology. Detection of signals from various radar stations is a concern. Performance and probability of intercept are mainly dependent on high speed ADC technology. The sampling and reconstruction functions have to be optimized to capture incoming signals at the receiver to extract characteristics ...

  20. Vital Interests, Virtual Threats: Reconciling International Law with Information Warfare and United States Security

    Science.gov (United States)

    1999-05-01

    1985 workforce of 406,000 by two thirds. Volkswagen intends to reduce its present workforce by one third. Proctor and Gamble has rising sales, yet is...of the Senate Governmental Affairs Committee , named “China, Russia, Libya, Iran, Iraq, and at least seven other countries... audit uses four recent Stanford Technology Law Journal articles not related to information warfare. Granted, hypothetical environments make certainty

  1. Lawfare and hybrid warfare-how Russia is using the law as a weapon

    OpenAIRE

    Mosquera, A.; Bachmann, Sascha-Dominik

    2015-01-01

    This short paper introduces the reader to the mutating military concept of hybrid warfare and one of its implementing methods, the use of law as a weapon. We aim to provide a current, comprehensive definition of the terms “hybrid warfare” and “lawfare”. This submission focuses on the following areas: where law has been/is being used as a method of war, namely the Jus ad bellum, the jus in bello and the law of treaties in international relations.

  2. Special Operations, Irregular Warfare, and Operational Art: A Theory of Special Operations

    Science.gov (United States)

    2013-12-10

    modern militaries: Ian F. W. Beckett , Modern Insurgencies and Counter-Insurgencies (New York: Routledge, 2003), 213. 1...the dynamics that influence other coalition members. They do not have the 71Mao Zedong, On Guerrilla Warfare, trans. Samuel B. Griffith (Breiningville...2004. Beckett , Ian F. W. Modern Insurgencies and Counter-Insurgencies. New York: Routledge, 2003. Bergen, Peter. “Analysis: Bin Laden might find

  3. Russian Perspectives on Network-Centric Warfare: The Key Aim of Serdyukov’s Reform

    Science.gov (United States)

    2011-01-01

    has faced with its GLObal’naya NAvigatsionnaya Sputnikovaya Sistema —(GLONASS) system, and introducing advanced digitized communications in the armed...of targeting data will be accomplished by organizing virtual channels for data transmission or via a web -portal. The successful function- ing of the...Operations: Tactical Web Takes Shape,” Signal, November 2003; Col. Alan D. Campen, USAF (Ret.), “Look Closely At Network-Centric Warfare: Technology Can

  4. Incorporating AFEWC IMOM as an instructional asset for NPS radar and electronic warfare curricula

    OpenAIRE

    Van Splinter, Gregg A.

    1992-01-01

    Approved for public release; distribution is unlimited In this thesis, effort is made to incorporate the computer program, Improved Many(Jammers)-on-Many(Radars) (IMOM), into radar and electronic warfare curricula at the Naval Postgraduate School. The IMOM program is used operationally by the U.S. Air Force for electronic combat mission planning. IMOM allows the user to evaluate electronic combat effects through computer color graphics display of the electronic order of battle including ...

  5. Past and Potential Theory for Special Warfare Operational Art: People’s War and Contentious Politics

    Science.gov (United States)

    2015-03-04

    the scientific method could be used to examine historical case studies.114 His examination of the English , American, French, and Russian Revolutions...its full evaluation as a grammar of revolutionary war. Finally, a translation of basic concepts from contentious politics into useful outlines and...be founded upon distinct and sound theories of war and warfare. This monograph argues that from 1952-1965, the US Army Special Forces developed two

  6. Puncturing the Counterinsurgency Myth: Britain and Irregular Warfare in the Past, Present, and Future

    Science.gov (United States)

    2011-09-01

    FUTURE INTRODUCTION Britain’s irregular warfare experience in the post- World War II era presented the military with numer- ous insurgent challenges where...STRATEGICALLY PERCEPTIVE This myth points to a painful element of British COIN conduct, namely, the short -circuiting of con- text. The preference for...military to plan for long-term coalition commitments: “Increasing globalisation ties our security to that of our allies. . . . Therefore we must

  7. Evaluation of Littoral Combat Ships for Open-Ocean Anti-Submarine Warfare

    Science.gov (United States)

    2016-03-01

    submarines that were considered in detail for this report. Adapted from Michaele Lee Huygen, 2003, “Submarine Warfare in the 20th & 21st Centuries : A...development, architecture , capability, functional decomposition, modeling and simulation, ASW, LCS 15. NUMBER OF PAGES 99 16. PRICE CODE 17. SECURITY...2015/05/revealed-chinas-new-carrier- killer-sub-simulator/. General Dynamics. 2015. “Combat Power for the 21st Century .” Sales brochure, General

  8. Evaluating Effectiveness of a Frigate in an Anti-Air Warfare (AAW) Environment

    Science.gov (United States)

    2016-06-01

    anti-air warfare (AAW) mission, weapons and radar systems influence each other and interact with the combat software system (Figure 1). Figure 1...similar to our approach include UAV contributions to expeditionary operations (Raffetto, 2004), counter- piracy operations in the Gulf of Aden (Tsilis...statistical discovery software offers both powerful statistics and dynamic graphics capabilities to its users. In the thesis, JMP statistical discovery

  9. Cyber crime and cyber warfare with international cyber collaboration for RSA – preparing communities

    CSIR Research Space (South Africa)

    Grobler, M

    2012-03-01

    Full Text Available Warfare with International Cyber Collaboration for RSA ? Preparing Communities Dr Marthie Grobler, Joey Jansen van Vuuren', Dr Jannie Zaaiman? Council for Scientific and Industrial Research, Pretoria, South Africa1 University of Venda2 ABSTRACT... with the technological revolution is that cyberspace is full of complex and dynamic technological innovations that are not well suited to any legal system. A further complication is the lack of comprehensive treaties facilitating international cooperation...

  10. Global Trends and Future Warfare (Strategic Insights. Special Issue, October 2011)

    Science.gov (United States)

    2011-10-01

    Li Future Warfare and China regional and ethnic discrimination, and the spread of the internet and proliferation of sensational media. In a...communications, we have near-worldwide instant exchange of ideas and spread of ideas. Images and information of living standards, role models, and political...an unusually seductive form of military strength, in part because, like modern courtship, it appears to offer gratification without commitment.’15

  11. Transport and Reactivity of Decontaminants to Provide Hazard Mitigation of Chemical Warfare Agents from Materials

    Science.gov (United States)

    2016-06-01

    directions for future decontamination formulation approaches. 15. SUBJECT TERMS GD HD Decontamination Hazard mitigation VX Chemical warfare agent...agent from materials. The objective of this study was to provide a screening tool to identify decontamination chemistries and formulations that will...mitigation. The materials included a water-dispersible polyurethane (WDP) paint (MIL-DTL-53039) and an alkyd paint (MIL-PRF-24635). Two polymers were also

  12. Hybrid Warfare Dilemmas in the Middle Colonies during the American Revolution

    Science.gov (United States)

    2017-05-25

    prisoners and forcing the British to reinforce and area they thought they controlled.65 These militia groups grew larger and more emboldened after...British prisoners , Washington told him that he could not “answer for the militia who are resorting to Arms in most parts of the State, and exceedingly...the tension between punishing the colonists and welcoming them back into British rule prevented him from solving the hybrid warfare dilemmas posed

  13. CYBER WARFARE GOVERNANCE: EVALUATION OF CURRENT INTERNATIONAL AGREEMENTS ON THE OFFENSIVE USE OF CYBER

    Science.gov (United States)

    2015-10-01

    vulnerability in networks across the world as supervisory control and data acquisition ( SCADA ) systems, similar to the ones attacked in Iran, are...used worldwide to perform tasks such as traffic control, managing power grids and management of other utility systems. The heavy reliance on SCADA ...standpoint, this document will never become the agreed upon standard for today’s warfare, unless it is substantially updated . AU/ACSC/2015 28

  14. From the Decomposition of Chemical Warfare Agents to the Decontamination of Cytostatics

    Czech Academy of Sciences Publication Activity Database

    Štengl, Václav; Šťastný, Martin; Janoš, P.; Mazanec, K.; Perez-Diaz, J. L.; Štenglová Netíková, I. R.

    2018-01-01

    Roč. 57, č. 6 (2018), s. 2114-2122 ISSN 0888-5885 EU Projects: European Commission(XE) 312804 - COUNTERFOG Grant - others:NATO(US) SPS984599 Program:Science for Peace and Security Institutional support: RVO:61388980 Keywords : Chemical warfare agents * Degradation * Metal oxide sorbents Subject RIV: CA - Inorganic Chemistry OBOR OECD: Inorganic and nuclear chemistry Impact factor: 2.843, year: 2016

  15. Operational advantages of using Cyber Electronic Warfare (CEW) in the battlefield

    Science.gov (United States)

    Yasar, Nurgul; Yasar, Fatih M.; Topcu, Yucel

    2012-06-01

    While cyberspace is emerging as a new battlefield, conventional Electronic Warfare (EW) methods and applications are likely to change. Cyber Electronic Warfare (CEW) concept which merges cyberspace capabilities with traditional EW methods, is a new and enhanced form of the electronic attack. In this study, cyberspace domain of the battlefield is emphazised and the feasibility of integrating Cyber Warfare (CW) concept into EW measures is researched. The SWOT (Strengths, Weaknesses, Opportunities and Threats) analysis method is used to state the operational advantages of using CEW concept in the battlefield. The operational advantages of CEW are assessed by means of its effects on adversary air defense systems, communication networks and information systems. Outstanding technological and operational difficulties are pointed out as well. As a result, a comparison of CEW concept and conventional EW applications is presented. It is concluded that, utilization of CEW concept is feasible at the battlefield and it may yield important operational advantages. Even though the computers of developed military systems are less complex than normal computers, they are not subjected to cyber threats since they are closed systems. This concept intends to show that these closed systems are also open to the cyber threats. As a result of the SWOT analysis, CEW concept provides Air Forces to be used in cyber operations effectively. On the other hand, since its Collateral Damage Criteria (CDC) is low, the usage of cyber electronic attack systems seems to grow up.

  16. The Filipino Way of War: Irregular Warfare through the Centuries

    Science.gov (United States)

    2011-12-01

    consisting of from 10 to 100 households . The larger (and more rare) barangays could be from 2000 to up to 20,000 households . The barangay was an independent...government. In 1968, a secret plot was uncovered wherein the AFP was training recruits to infiltrate and sow destabilization in the Malaysian state of...population below the income poverty line is 22.6, and the percentage of population vulnerable to poverty is 9.1. These percentages, out of a current

  17. An Analysis of Undersea Glider Architectures and an Assessment of Undersea Glider Integration into Undersea Applications

    Science.gov (United States)

    2012-09-01

    71 ix LIST OF FIGURES Figure 1. SLOCUM Glider Dive Profile, from (P. Simonetti, 1992...ANT-LLC, 2010) .................................. 11 Figure 5. Glider #3 - Slocum Electric after (Webb Research, 2012a) ................ 12 Figure 6... Glider #4 - Slocum Thermal after (Webb Research, 2012b) ................ 13 Figure 7. Glider #6 - Sea Glider after (iRobot, 2012

  18. Defining and Assessing the Impact to the Combat/Weapon Systems of a Ship Post Major Overhaul

    Science.gov (United States)

    2013-06-01

    Strike Warfare ( STW )  Surface Warfare (SUW)  Undersea Warfare (USW)  Expeditionary Warfare (EXW)  Electronic Warfare (EW) CSSQT assess all combat...quadrants one and four are recommended for CSSQT which means if funding and resources are available then these ships should be designated to perform a...CSSQT. Ships in quadrant two would benefit the most from a CSSQT and it those ships should be the first to be allocated funding and resources . 46

  19. International humanitarian law applied to cyber-warfare: Precautions, proportionality and the notion of ‘attack’ under the humanitarian law of armed conflict

    NARCIS (Netherlands)

    Gill, T.D.; Tsagourias, N.; Buchan, R.

    2015-01-01

    This chapter examines the application of international humanitarian law to cyber warfare in the sense of rising to the level of an armed conflict. Building upon the work of the Tallinn Manual on the Application of International Law to Cyber Warfare, it places particular emphasis on the application

  20. Survey of Radar Refraction Error Corrections

    Science.gov (United States)

    2016-11-01

    RANGE YUMA PROVING GROUND NAVAL AIR WARFARE CENTER AIRCRAFT DIVISION NAVAL AIR WARFARE CENTER WEAPONS DIVISION NAVAL UNDERSEA WARFARE CENTER...estimation for an electromagnetic wave propagating at radio frequencies through the earth’s atmosphere. Appendices contain descriptive material on the...of Radar Refraction Error Corrections, RCC 266-16 vii Acronyms BAE BAE Systems CRPL Central Radio Propagation Laboratory EM electromagnetic

  1. Quality of life in chemical warfare survivors with ophthalmologic injuries: the first results form Iran Chemical Warfare Victims Health Assessment Study

    Directory of Open Access Journals (Sweden)

    Soroush Mohammad

    2009-01-01

    Full Text Available Abstract Background Iraq used chemical weapons extensively against the Iranians during the Iran-Iraq war (1980–1988. The aim of this study was to assess the health related quality of life (HRQOL in people who had ophthalmologic complications due to the sulfur mustard gas exposure during the war. Methods The Veterans and Martyrs Affair Foundation (VMAF database indicated that there were 196 patients with severe ophthalmologic complications due to chemical weapons exposure. Of these, those who gave consent (n = 147 entered into the study. Quality of life was measured using the 36-item Short Form Health Survey (SF-36 and scores were compared to those of the general public. In addition logistic regression analysis was performed to indicate variables that contribute to physical and mental health related quality of life. Results The mean age of the patients was 44.8 (SD = 8.7 ranging from 21 to 75 years. About one-third of the cases (n= 50 reported exposure to chemical weapons more than once. The mean exposure duration to sulfur mustard gas was 21.6 years (SD = 1.2. The lowest scores on the SF-36 subscales were found to be: the role physical and the general health. Quality of life in chemical warfare victims who had ophthalmologic problems was significantly lower than the general public (P Conclusion The study findings suggest that chemical warfare victims with ophthalmologic complications suffer from poor health related quality of life. It seems that the need for provision of health and support for this population is urgent. In addition, further research is necessary to measure health related quality of life in victims with different types of disabilities in order to support and enhance quality of life among this population.

  2. Detection of warfare agents in liquid foods using the brine shrimp lethality assay.

    Science.gov (United States)

    Lumor, Stephen E; Diez-Gonzalez, Francisco; Labuza, Theodore P

    2011-01-01

    The brine shrimp lethality assay (BSLA) was used for rapid and non-specific detection of biological and chemical warfare agents at concentrations considerably below that which will cause harm to humans. Warfare agents detected include T-2 toxin, trimethylsilyl cyanide, and commercially available pesticides such as dichlorvos, diazinon, dursban, malathion, and parathion. The assay was performed by introducing 50 μL of milk or orange juice contaminated with each analyte into vials containing 10 freshly hatched brine shrimp nauplii in seawater. This was incubated at 28 °C for 24 h, after which mortality was determined. Mortality was converted to probits and the LC(50) was determined for each analyte by plotting probits of mortality against analyte concentration (log(10)). Our findings were the following: (1) the lethal effects of toxins dissolved in milk were observed, with T-2 toxin being the most lethal and malathion being the least, (2) except for parathion, the dosage (based on LC(50)) of analyte in a cup of milk (200 mL) consumed by a 6-y-old (20 kg) was less than the respective published rat LD(50) values, and (3) the BSLA was only suitable for detecting toxins dissolved in orange juice if incubation time was reduced to 6 h. Our results support the application of the BSLA for routine, rapid, and non-specific prescreening of liquid foods for possible sabotage by an employee or an intentional bioterrorist act. Practical Application: The findings of this study strongly indicate that the brine shrimp lethality assay can be adapted for nonspecific detection of warfare agents or toxins in food at any point during food production and distribution.

  3. U.S. Army Land Warfare Laboratory. Volume 1. Project Report, Appendix A. Documentation

    Science.gov (United States)

    1974-06-01

    10) "EXPLOSIVES DETECTING DOGS", Final Report. Krauss, flax , Bliological Sciences Branch. U. S. Ariqy Land Warfare Laboratory, Aberdeen Proving...Readei .•,al uat ed by Alaska Nau inl i 1 :uli d. IC SI’ID ret onilt dt’d yN, ( ;,Iaid, a l ,., by PISARAi.. ROC he inu, prteparted. I1 lt ninat ion 1...to UISARV. Ret : ansmission >;ystni Evaluation qty 0l 0 sup li,-d to I Ag\\’N and USAkV which rt-comin• l:dt-d I( \\’I I mod i f cat io. Riot Col: rol

  4. Destruction of chemical warfare agent simulants by air and moisture stable metal NHC complexes.

    Science.gov (United States)

    Weetman, Catherine; Notman, Stuart; Arnold, Polly L

    2018-02-20

    The cooperative effect of both NHC and metal centre has been found to destroy chemical warfare agent (CWA) simulants. Choice of both the metal and NHC is key to these transformations as simple, monodentate N-heterocyclic carbenes in combination with silver or vanadium can promote stoichiometric destruction, whilst bidentate, aryloxide-tethered NHC complexes of silver and alkali metals promote breakdown under mild heating. Iron-NHC complexes generated in situ are competent catalysts for the destruction of each of the three targetted CWA simulants.

  5. Total Control: How the Nazis Countered Unconventional Warfare in the Netherlands During World War Two

    Science.gov (United States)

    2017-05-25

    11:mrnn ’ cc11rit) pnlic) :.incc I >t66. l·Dlkm ing the (jcrman ’ ict ori1.:~ ~) f 1939- 19-10. I titler grantccl I limmlcr rrnthority over la" :md...better deterrent in the c;mall " Durch cnmmunity. the Scc11rit) :-1.:n ict ’’i pro’ idcd the names of death candidates 3nu c"<ccu tcd people tu thl...Total Control: I low the Nazis Countered Unconventional Warfare in the Netherlands During World War Two A Monograph by Major Jeroen F van

  6. Unconventional War and Warfare in the Gray Zone. The New Spectrum of Modern Conflicts

    Directory of Open Access Journals (Sweden)

    Miroslaw Banasik

    2016-06-01

    Full Text Available Experiences of the last couple of years indicate that political objectives are increasingly achieved without official declarations of war. Armed forces are used in untraditional ways and the so-called substitute troops begin to play an increasingly bigger part. The article aims to characterize the conflicts of alternative nature below the level of open war that are on the border between war and peace. The content of the article presents the theory of unconventional warfare and its description, and familiarizes the reader with the concept of grey zone conflicts. It further shows the challenges linked to rivalry for influence zones and security provisions.

  7. Battle-Wise: Seeking Time-Information Superiority in Networked Warfare

    Science.gov (United States)

    2006-07-01

    it best about learning from mistakes in life: “There is no wisdom in the second kick of a mule .” Although he did not have 21st-century warfare in...part of our military leadership—can we expect to avoid the “second kick of a mule .” xii BATTLE-WISE PREFACE xiii xiii Preface This book is an inquiry...recruiting meth - ods. Depending on work experience before joining the military, it may be possible actually to identify battle-wise traits in recruits. For

  8. Next Generation Non-particulate Dry Nonwoven Pad for Chemical Warfare Agent Decontamination

    Energy Technology Data Exchange (ETDEWEB)

    Ramkumar, S S; Love, A; Sata, U R; Koester, C J; Smith, W J; Keating, G A; Hobbs, L; Cox, S B; Lagna, W M; Kendall, R J

    2008-05-01

    New, non-particulate decontamination materials promise to reduce both military and civilian casualties by enabling individuals to decontaminate themselves and their equipment within minutes of exposure to chemical warfare agents or other toxic materials. One of the most promising new materials has been developed using a needlepunching nonwoven process to construct a novel and non-particulate composite fabric of multiple layers, including an inner layer of activated carbon fabric, which is well-suited for the decontamination of both personnel and equipment. This paper describes the development of a composite nonwoven pad and compares efficacy test results for this pad with results from testing other decontamination systems. The efficacy of the dry nonwoven fabric pad was demonstrated specifically for decontamination of the chemical warfare blister agent bis(2-chloroethyl)sulfide (H or sulfur mustard). GC/MS results indicate that the composite fabric was capable of significantly reducing the vapor hazard from mustard liquid absorbed into the nonwoven dry fabric pad. The mustard adsorption efficiency of the nonwoven pad was significantly higher than particulate activated carbon (p=0.041) and was similar to the currently fielded US military M291 kit (p=0.952). The nonwoven pad has several advantages over other materials, especially its non-particulate, yet flexible, construction. This composite fabric was also shown to be chemically compatible with potential toxic and hazardous liquids, which span a range of hydrophilic and hydrophobic chemicals, including a concentrated acid, an organic solvent and a mild oxidant, bleach.

  9. Information warfare as ICT influence on public consciousness and public opinion

    Directory of Open Access Journals (Sweden)

    A. H. Stadnyk

    2015-12-01

    Full Text Available The article defines the key aspects of the merits and impact of information warfare on public consciousness and public opinion. In the article, we review the information war not as an auxiliary mechanism for real war, but as a mechanism of affecting the public opinion. The public opinion can not be formed completely (while there is information content, public opinion changes constantly because the information in the hands of the media acts as a real weapon aimed at the mass consciousness. The article discusses in detail the four main factors that determine the effectiveness of the impact of information: 1 information warfare agents that affect the population, mass consciousness, public opinion; 2 information weapon of war; 3 the content itself, the content that is broadcast during the information war; 4 the specifics of mass awareness in different countries, the formation and functioning of their public opinion. And how much information war characteristic of the crisis (as an example to Ukraine since the beginning of the Maidan in 2013, the presentation of information aimed at manipulating public consciousness and, accordingly, the public opinion as the outward expression of consciousness.

  10. An Empirical Examination of the Warfare Metaphor with Respect to Pre-Service Elementary Teachers

    Science.gov (United States)

    Cobern, William W.; Loving, Cathleen C.; Davis, Edward B.; Terpstra, Jeff

    2013-08-01

    Since its origination in the late nineteenth century, the warfare metaphor has been used to characterize the relationship between science and religion, especially orthodox Christianity. Though thoroughly discredited by historians of science, the ideological descendants of Thomas Huxley, who spoke of science in quasi-religious terms, have kept the warfare metaphor alive. On the other hand, there are substantial numbers of Christians who at least appear to oppose science given their high-profile opposition to the general theory of evolution. The research reported in this paper asked, "Does anti-science sentiment increase with increasing orthodox Christian belief?" Two validated, published instruments were used: The Thinking about Science Survey Instrument and the Christian Fundamentalist Belief Scale. The subjects for the study were 545 preservice elementary teachers. The analysis did not show that anti-science sentiment increases with increasing Christian belief. Subjects with strong Christian beliefs were found to be just as supportive of science, if not more so, than subjects with no Christian beliefs. The study concludes with a caution against projecting attitudes toward science "on the whole" based on attitudes specifically toward evolution when working with preservice elementary teachers. Such a projection could well be counterproductive. The study has implications for other modern countries having highly religious populations such as Turkey.

  11. Investigating the Relationship Between Drone Warfare and Civilian Casualties in Gaza

    Directory of Open Access Journals (Sweden)

    Dr. Ann Rogers

    2014-12-01

    Full Text Available Unmanned aerial vehicles (UAVs, better known as drones, are increasingly touted as ‘humanitarian’ weapons that contribute positively to fighting just wars and saving innocent lives. At the same time, civilian casualties have become the most visible and criticized aspect of drone warfare. It is argued here that drones contribute to civilian casualties not in spite of, but because of, their unique attributes. They greatly extend war across time and space, pulling more potential threats and targets into play over long periods, and because they are low-risk and highly accurate, they are more likely to be used. The assumption that drones save lives obscures a new turn in strategic thinking that sees states such as Israel and the US rely on large numbers of small, highly discriminating attacks applied over time to achieve their objectives. This examination of Israel’s 2014 war in Gaza argues that civilian casualties are not an unexpected or unintended consequence of drone warfare, but an entirely predictable outcome.

  12. Zirconium doped nano-dispersed oxides of Fe, Al and Zn for destruction of warfare agents

    Energy Technology Data Exchange (ETDEWEB)

    Stengl, Vaclav, E-mail: stengl@uach.cz [Institute of Inorganic Chemistry AS CR v.v.i., 250 68 Rez (Czech Republic); Houskova, Vendula; Bakardjieva, Snejana; Murafa, Nataliya; Marikova, Monika [Institute of Inorganic Chemistry AS CR v.v.i., 250 68 Rez (Czech Republic); Oplustil, Frantisek; Nemec, Tomas [Military Technical Institute of Protection Brno, Veslarska 230, 628 00 Brno (Czech Republic)

    2010-11-15

    Zirconium doped nano dispersive oxides of Fe, Al and Zn were prepared by a homogeneous hydrolysis of the respective sulfate salts with urea in aqueous solutions. Synthesized metal oxide hydroxides were characterized using Brunauer-Emmett-Teller (BET) surface area and Barrett-Joiner-Halenda porosity (BJH), X-ray diffraction (XRD), infrared spectroscopy (IR), scanning electron microscopy (SEM) and energy-dispersive X-ray microanalysis (EDX). These oxides were taken for an experimental evaluation of their reactivity with sulfur mustard (HD or bis(2-chloroethyl)sulfide), soman (GD or (3,3'-Dimethylbutan-2-yl)-methylphosphonofluoridate) and VX agent (S-[2-(diisopropylamino)ethyl]-O-ethyl-methylphosphonothionate). The presence of Zr{sup 4+} dopant can increase both the surface area and the surface hydroxylation of the resulting doped oxides, decreases their crystallites' sizes thereby it may contribute in enabling the substrate adsorption at the oxide surface thus it can accelerate the rate of degradation of warfare agents. Addition of Zr{sup 4+} converts the product of the reaction of ferric sulphate with urea from ferrihydrite to goethite. We found out that doped oxo-hydroxides Zr-FeO(OH) - being prepared by a homogeneous hydrolysis of ferric and zirconium oxo-sulfates mixture in aqueous solutions - exhibit a comparatively higher degradation activity towards chemical warfare agents (CWAs). Degradation of soman or VX agent on Zr-doped FeO(OH) containing ca. 8.3 wt.% of zirconium proceeded to completion within 30 min.

  13. Zirconium doped nano-dispersed oxides of Fe, Al and Zn for destruction of warfare agents

    International Nuclear Information System (INIS)

    Stengl, Vaclav; Houskova, Vendula; Bakardjieva, Snejana; Murafa, Nataliya; Marikova, Monika; Oplustil, Frantisek; Nemec, Tomas

    2010-01-01

    Zirconium doped nano dispersive oxides of Fe, Al and Zn were prepared by a homogeneous hydrolysis of the respective sulfate salts with urea in aqueous solutions. Synthesized metal oxide hydroxides were characterized using Brunauer-Emmett-Teller (BET) surface area and Barrett-Joiner-Halenda porosity (BJH), X-ray diffraction (XRD), infrared spectroscopy (IR), scanning electron microscopy (SEM) and energy-dispersive X-ray microanalysis (EDX). These oxides were taken for an experimental evaluation of their reactivity with sulfur mustard (HD or bis(2-chloroethyl)sulfide), soman (GD or (3,3'-Dimethylbutan-2-yl)-methylphosphonofluoridate) and VX agent (S-[2-(diisopropylamino)ethyl]-O-ethyl-methylphosphonothionate). The presence of Zr 4+ dopant can increase both the surface area and the surface hydroxylation of the resulting doped oxides, decreases their crystallites' sizes thereby it may contribute in enabling the substrate adsorption at the oxide surface thus it can accelerate the rate of degradation of warfare agents. Addition of Zr 4+ converts the product of the reaction of ferric sulphate with urea from ferrihydrite to goethite. We found out that doped oxo-hydroxides Zr-FeO(OH) - being prepared by a homogeneous hydrolysis of ferric and zirconium oxo-sulfates mixture in aqueous solutions - exhibit a comparatively higher degradation activity towards chemical warfare agents (CWAs). Degradation of soman or VX agent on Zr-doped FeO(OH) containing ca. 8.3 wt.% of zirconium proceeded to completion within 30 min.

  14. The possible role of intravenous lipid emulsion in the treatment of chemical warfare agent poisoning

    Directory of Open Access Journals (Sweden)

    Arik Eisenkraft

    Full Text Available Organophosphates (OPs are cholinesterase inhibitors that lead to a characteristic toxidrome of hypersecretion, miosis, dyspnea, respiratory insufficiency, convulsions and, without proper and early antidotal treatment, death. Most of these compounds are highly lipophilic. Sulfur mustard is a toxic lipophilic alkylating agent, exerting its damage through alkylation of cellular macromolecules (e.g., DNA, proteins and intense activation of pro-inflammatory pathways. Currently approved antidotes against OPs include the peripheral anticholinergic drug atropine and an oxime that reactivates the inhibited cholinesterase. Benzodiazepines are used to stop organophosphate-induced seizures. Despite these approved drugs, efforts have been made to introduce other medical countermeasures in order to attenuate both the short-term and long-term clinical effects following exposure. Currently, there is no antidote against sulfur mustard poisoning. Intravenous lipid emulsions are used as a source of calories in parenteral nutrition. In recent years, efficacy of lipid emulsions has been shown in the treatment of poisoning by fat-soluble compounds in animal models as well as clinically in humans. In this review we discuss the usefulness of intravenous lipid emulsions as an adjunct to the in-hospital treatment of chemical warfare agent poisoning. Keywords: Intravenous lipid emulsion, Organophosphates, Sulfur mustard, Antidotes, Poisoning, Chemical Warfare agents

  15. Bioarchaeological investigation of ancient Maya violence and warfare in inland Northwest Yucatan, Mexico.

    Science.gov (United States)

    Serafin, Stanley; Lope, Carlos Peraza; Uc González, Eunice

    2014-05-01

    This study investigates evidence of changes and continuities in ancient Maya violence and warfare in inland northwest Yucatan, Mexico from the Middle Preclassic (600-300 BC) to the Postclassic (AD 1050-1542) through bioarchaeological analysis of cranial and projectile trauma. It is hypothesized that the frequency of violence increases before the Classic Maya collapse and remains high during the Postclassic period. It is also hypothesized that the flat, open terrain was conducive to warfare and resulted in higher trauma frequencies than in other parts of the Maya area. Results show that the frequency of cranial trauma decreases before the Classic collapse and increases in the Postclassic, partially matching the expected chronological trends. The frequency of cranial trauma does not differ significantly from other Maya regions but the pattern does: for all periods, males have more healed injuries than females and they are concentrated on the left side of the anterior of the skull. Some injuries appear to be from small points hafted in wooden clubs. In addition, projectile trauma is evident in a scapula with an embedded arrowhead tip, the first such case reported in a Maya skeleton. Overall, these results suggest greater reliance on open combat and less on raids in this region compared with other parts of the Maya area, possibly due to the flat, open terrain, though the identification of perimortem trauma in both women and men indicates surprise raids on settlements were also practiced. Copyright © 2014 Wiley Periodicals, Inc.

  16. Reevaluation of 1999 Health-Based Environmental Screening Levels (HBESLs) for Chemical Warfare Agents

    Energy Technology Data Exchange (ETDEWEB)

    Watson, Annetta Paule [ORNL; Dolislager, Fredrick G [ORNL

    2007-05-01

    This report evaluates whether new information and updated scientific models require that changes be made to previously published health-based environmental soil screening levels (HBESLs) and associated environmental fate/breakdown information for chemical warfare agents (USACHPPM 1999). Specifically, the present evaluation describes and compares changes that have been made since 1999 to U.S. Environmental Protection Agency (EPA) risk assessment models, EPA exposure assumptions, as well as to specific chemical warfare agent parameters (e.g., toxicity values). Comparison was made between screening value estimates recalculated with current assumptions and earlier health-based environmental screening levels presented in 1999. The chemical warfare agents evaluated include the G-series and VX nerve agents and the vesicants sulfur mustard (agent HD) and Lewisite (agent L). In addition, key degradation products of these agents were also evaluated. Study findings indicate that the combined effect of updates and/or changes to EPA risk models, EPA default exposure parameters, and certain chemical warfare agent toxicity criteria does not result in significant alteration to the USACHPPM (1999) health-based environmental screening level estimates for the G-series and VX nerve agents or the vesicant agents HD and L. Given that EPA's final position on separate Tier 1 screening levels for indoor and outdoor worker screening assessments has not yet been released as of May 2007, the study authors find that the 1999 screening level estimates (see Table ES.1) are still appropriate and protective for screening residential as well as nonresidential sites. As such, risk management decisions made on the basis of USACHPPM (1999) recommendations do not require reconsideration. While the 1999 HBESL values are appropriate for continued use as general screening criteria, the updated '2007' estimates (presented below) that follow the new EPA protocols currently under development

  17. 76 FR 10522 - Naval Surface Warfare Center, Upper Machodoc Creek and the Potomac River, Dahlgren, VA; Danger Zone

    Science.gov (United States)

    2011-02-25

    ... Warfare Center, Dahlgren's patrol boats. Oystering and fishing boats or other craft may cross the river in... bombing, directed energy technology, and manned or unmanned water craft operations; expand the Middle... manned or unmanned watercraft. (ii) When hazardous operations are in progress, no person, or fishing or...

  18. Modern sample preparation techniques for gas chromatography-mass spectrometry analysis of environmental markers of chemical warfare agents use

    NARCIS (Netherlands)

    Terzic, O.; de Voogt, P.; Banoub, J.

    2014-01-01

    The chapter introduces problematics of on-site chemical analysis in the investigations of past chemical warfare agents (CWA) events. An overview of primary environmental degradation pathways of CWA leading to formation of chemical markers of their use is given. Conventional and modern sample

  19. Warfare tourism experiences and national identity: The case of Airborne Museum ‘Hartenstein’ in Oosterbeek, the Netherlands

    NARCIS (Netherlands)

    Gieling, Johannes

    2016-01-01

    This paper examines through an analysis of Dutch warfare tourism whether there is a relationship between the subjective perceived salience of Dutch identity and heritage tourists' motives, emotions and overall satisfaction. Using a social identity theory framework, this study provides a view of

  20. Warfare has changed - so should have methods: Ammunition and weapon performance induced operational risk and safety issues

    NARCIS (Netherlands)

    Verhagen, T.L.A.; Voorde, M.J. van de

    2010-01-01

    Warfare has changed. Out-of-area operations have increased the awareness that we are unfamiliar with the performance of the current conventional medium and large calibre ammunitions in day-to-day practice. Current ammunition is primarily developed and procured to defeat the traditional ‘steel’

  1. Rapid Analysis of Chemical Warfare Agents and Their Hydrolysis Products by Desorption Electrospray Ionization Mass Spectrometry (DESI-MS)

    Science.gov (United States)

    2009-10-01

    72, 77-79], polymers [80], alkaloids on plant tissue [81], chemical warfare agents on solid phase microextraction (SPME) fibers [60, 82], hydrolysis...situ detection of alkaloids in plant tissue under ambient conditions using desorption electrospray ionization. Analyst, 130, 1624-1633. [82

  2. Advanced Active Acoustics Lab (AAAL)

    Data.gov (United States)

    Federal Laboratory Consortium — The Advanced Active Acoustics Lab (AAAL) is a state-of-the-art Undersea Warfare (USW) acoustic data analysis facility capable of both active and passive underwater...

  3. Case Study: A Measurement Program for Product Lines

    National Research Council Canada - National Science Library

    Cohen, Sholom; Zubrow, Dave; Dunn, Ed

    2004-01-01

    The Naval Undersea Warfare Center (NUWC) Division Newport Ranges, Engineering, and Analysis Department applied product line practices in the development of systems for the Navy test ranges it supports...

  4. Language Training: French Training

    CERN Multimedia

    2004-01-01

    If you wish to participate in one of the following courses, please discuss with your supervisor and apply electronically directly from the course description pages that can be found on the Web at: http://www.cern.ch/Training/ or fill in an "application for training" form available from your Divisional Secretariat or from your DTO (Divisional Training Officer). Applications will be accepted in the order of their receipt. LANGUAGE TRAINING Françoise Benz tel. 73127 language.training@cern.ch General and Professional French Courses The next session will take place from 26 April to 02 July 2004. These courses are open to all persons working on the Cern site, and to their spouses. For registration and further information on the courses, please consult our Web pages: http://cern.ch/Training or contact Mrs. Benz: Tel. 73127. Writing Professional Documents in French The next session will take place from 26 April to 02 July 2004. This course is designed for people with a good level of s...

  5. Language Training: French Training

    CERN Multimedia

    2004-01-01

    If you wish to participate in one of the following courses, please discuss with your supervisor and apply electronically directly from the course description pages that can be found on the Web at: http://www.cern.ch/Training/ or fill in an "application for training" form available from your Divisional Secretariat or from your DTO (Divisional Training Officer). Applications will be accepted in the order of their receipt. LANGUAGE TRAINING Françoise Benz tel. 73127 language.training@cern.ch General and Professional French Courses The next session will take place from 26 April to 02 July 2004. These courses are open to all persons working on the Cern site, and to their spouses. For registration and further information on the courses, please consult our Web pages: http://cern.ch/Training or contact Mrs. Benz: Tel. 73127. Writing Professional Documents in French The next session will take place from 26 April to 02 July 2004. This course is designed for people with a good level...

  6. Warfare Ecology on an Underwater Demolition Range: Acoustic Observations of Marine Life and Shallow Water Detonations in Hawai`i

    Science.gov (United States)

    Shannon, Lee H.

    Most studies investigating the effects of military-associated anthropogenic noise concentrate on deep sea or open ocean propagation of sonar and its effect on marine mammals. In littoral waters, U.S. military special operations units regularly conduct shallow water explosives training, yet relatively little attention has been given to the potential impact on nearshore marine ecosystems from these underwater detonations. This dissertation research focused on the Pu'uloa Underwater Detonation Range off the coast of O`ahu, and examined multiple aspects of the surrounding marine ecosystem and the effects of detonations using acoustic monitoring techniques. The soundscape of a nearshore reef ecosystem adjacent to the UNDET range was characterized through analysis of passive acoustic recordings collected over the span of 6 years. Snapping shrimp were the predominant source of noise, and a diel pattern was present, with increased sound energy during the night hours. Results revealed a difference of up to 7dB between two Ecological Acoustic Recorder locations 2.5km apart along the 60ft isobath. Passive acoustic recording files were searched visually and aurally for odontocete whistles. Whistles were detected in only 0.6% of files analyzed, indicating this area is not frequently transited by coastal odontocete emitting social sounds. The study also opportunistically captured a humpback whale singing during a detonation event, during which the animal showed no obvious alteration of its singing behavior. Four separate underwater detonation events were recorded using a surface deployed F-42C transducer, and the resulting analysis showed no measurable drop in the biologically produced acoustic energy in reaction to the explosive events. Coral reef fishes were recorded visually and acoustically during detonation events at a known distance and bearing from a known explosive sound source. Individual fish behavioral responses to the explosion varied, and a sharp uptick in fish

  7. Trace Detection of Organophosphorus Chemical Warfare Agents in Wastewater and Plants by Luminescent UIO-67(Hf) and Evaluating the Bioaccumulation of Organophosphorus Chemical Warfare Agents.

    Science.gov (United States)

    Lian, Xiao; Yan, Bing

    2018-04-17

    Organophosphorus chemical warfare agents (OPCWAs) are a group of organic pollutants characterized by high toxicity and chemical stability, and they are very difficult to be degraded. The trace quality of OPCWAs in water and food will cause great harm to the human body. Therefore, the detection of OPCWAs is a difficult challenge, which has become the research hotspot over the world. In this work, a Hf-based luminescent metal-organic framework (Eu@1) is prepared, and the reactivity of Hf 12 results in a methanephosphonic acid (MPA)-induced luminescence quenching and the charge transfer from MPA to Hf(IV) and generated exciplexes which are responsible for this quenching effect. The excellent performance of Eu@1 in the detection of MPA, with its finer selectivity, high sensitivity (LOD = 0.4 ppm), and large linear range (10 -7 to 10 -3 M), is encouraging for application in wastewater detection. Importantly, MPA is a pollutant that can be absorbed by plants and causes the bioaccumulation effect, and thus, the detection of MPA in real plant samples is a purposeful topic. Eu@1 also achieved satisfactory results in actual plant sample testing, and the bioaccumulation of MPA in onions, turnips, and cabbages is determined via our sensor. This fabricated detector provides a feasible path for the detection of ppm-level OPCWAs in a complex environment, which will help humans to avoid OPCWA-contaminated foods.

  8. Domestic Preparedness Program: Evaluation of the Agilent Gas Chromatograph - Flame Photometric Detector/Mass Selective Detector (GC-FPD/MSD) System Against Chemical Warfare Agents Summary Report

    National Research Council Canada - National Science Library

    Longworth, Terri

    2003-01-01

    This report characterizes the chemical warfare agent (CWA) detection potential of the commercially available Agilent gas chromatograph-flame photometric detector/mass selective detector (GC-FPD/MSD...

  9. An Analysis of the Impact of Network-Centric Warfare on the Doctrine and Tactics, Techniques and Procedures of Intelligence at the Operational Level

    National Research Council Canada - National Science Library

    Harvey, Charles

    1999-01-01

    This project sought to determine the impacts of network centric warfare (NCW) on the planning and direction of intelligence at the operational level, and what changes in joint intelligence doctrine (JID...

  10. Fate of chemical warfare agents and toxic indutrial chemicals in landfills

    DEFF Research Database (Denmark)

    Bartelt-Hunt, D.L.; Barlaz, M.A.; Knappe, D.R.U.

    2006-01-01

    One component of preparedness for a chemical attack is planning for the disposal of contaminated debris. To assess the feasibility of contaminated debris disposal in municipal solid waste (MSW) landfills, the fate of selected chemical warfare agents (CWAs) and toxic industrial chemicals (TICs......], and two TICs [furan and carbon disulfide] were studied. The effects of both infiltration (climate) and contaminant biodegradability on fate predictions were assessed. Model results showed that hydrolysis and gas-phase advection were the principal fate pathways for CWAs and TICs, respectively. Apart from...... CX and the TICs, none of the investigated compounds was predicted to persist in a landfill for more than 5 years. Climate had little impact on CWA/TIC fate, and biodegradability was only important for compounds with long hydrolysis halflives. Monte Carlo simulations were performed to assess...

  11. Nuclear radiation in warfare. A SIPRI publication. Strahlungswirkungen beim Einsatz von Kernwaffen. Eine SIPRI-Publikation

    Energy Technology Data Exchange (ETDEWEB)

    Rotblat, J.

    1986-01-01

    The subject is covered in chapters, entitled: introduction; digest of nuclear weaponry (characteristics of nuclear weapons; effects of nuclear weapons other than ionizing radiation (fire-ball, fall-out, thermal radiation, blast wave, electromagnetic pulse); the nuclear arms race; war scenarios; biological effects of radiations on man (radiation doses; natural sources of radiation; acute effects of radiation; long-term somatic effects; genetic effects; factors affecting the biological response to radiation; internal exposure; synergistic effects; protection against radiation effects); radiations from nuclear explosions (initial radiation; fall-out; effects of fall-out on animal and plant life; contamination of water and food supplies by fall-out); radiation casualties in a nuclear war; effectiveness of civil defence; other warlike uses of radiation (attacks on civilian nuclear power installations; radiological warfare; terrorist activities); conclusion.

  12. Comparison of Selected Methods for Individual Decontamination of Chemical Warfare Agents

    Directory of Open Access Journals (Sweden)

    Tomas Capoun

    2014-06-01

    Full Text Available This study addresses the individual decontamination of chemical warfare agents (CWA and other hazardous substances. The individual decontamination applies to contaminated body surfaces, protective clothing and objects immediately after contamination, performed individually or by mutual assistance using prescribed or improvised devices. The article evaluates the importance of individual decontamination, security level for Fire and Rescue Service Units of the Czech Republic (FRS CR and demonstrates some of the devices. The decontamination efficiency of selected methods (sorbent, glove and sponge, two-chamber foam device and wiping with alcohol was evaluated for protective clothing and painted steel plate contaminated with O-ethyl-S-(diisopropylaminoethyl-methylthiophosphonate (VX, sulfur mustard, o-cresol and acrylonitrile. The methods were assessed from an economic point of view and with regard to specific user parameters, such as the decontamination of surfaces or materials with poor accessibility and vertical surfaces, the need for a water rinse as well as toxic waste and its disposal.

  13. Investigation of Acute Toxicity of a Chemical Warfare Agent in Kidneys

    Directory of Open Access Journals (Sweden)

    Turgut Topal

    2007-08-01

    Full Text Available One of the most important chemical warfare agents, sulfur mustard (SM causes crucial acute and chronic toxic effects. Lung, skin, eye and kidneys are the most affected organs. In this work, it was investigated if increased nitric oxide (NO and peroxynitrite are involved in nitrogen mustard (NM induced kidney damage. In this experimen, aminoguanidine (AG as inducible nitric oxide synthase (iNOS inhibitor and ebselen as peroxynitrite scavenger were used. NM administration resulted in important oxidant and antioxidant changes as well as tissue damage in kidneys. Therapeutic agents showed significant protection and reduced oxidant parameteres leading to tissue healing was observed. Results of this study suggest that drugs with similar properties can be used to protect kidney damage caused by NM. [TAF Prev Med Bull. 2007; 6(4: 227-232

  14. Investigation of Acute Toxicity of a Chemical Warfare Agent in Kidneys

    Directory of Open Access Journals (Sweden)

    Turgut Topal

    2007-08-01

    Full Text Available One of the most important chemical warfare agents, sulfur mustard (SM causes crucial acute and chronic toxic effects. Lung, skin, eye and kidneys are the most affected organs. In this work, it was investigated if increased nitric oxide (NO and peroxynitrite are involved in nitrogen mustard (NM induced kidney damage. In this experimen, aminoguanidine (AG as inducible nitric oxide synthase (iNOS inhibitor and ebselen as peroxynitrite scavenger were used. NM administration resulted in important oxidant and antioxidant changes as well as tissue damage in kidneys. Therapeutic agents showed significant protection and reduced oxidant parameteres leading to tissue healing was observed. Results of this study suggest that drugs with similar properties can be used to protect kidney damage caused by NM. [TAF Prev Med Bull 2007; 6(4.000: 227-232

  15. Chemiresistor Devices for Chemical Warfare Agent Detection Based on Polymer Wrapped Single-Walled Carbon Nanotubes

    Science.gov (United States)

    Fennell, John F.; Hamaguchi, Hitoshi; Yoon, Bora; Swager, Timothy M.

    2017-01-01

    Chemical warfare agents (CWA) continue to present a threat to civilian populations and military personnel in operational areas all over the world. Reliable measurements of CWAs are critical to contamination detection, avoidance, and remediation. The current deployed systems in United States and foreign militaries, as well as those in the private sector offer accurate detection of CWAs, but are still limited by size, portability and fabrication cost. Herein, we report a chemiresistive CWA sensor using single-walled carbon nanotubes (SWCNTs) wrapped with poly(3,4-ethylenedioxythiophene) (PEDOT) derivatives. We demonstrate that a pendant hexafluoroisopropanol group on the polymer that enhances sensitivity to a nerve agent mimic, dimethyl methylphosphonate, in both nitrogen and air environments to concentrations as low as 5 ppm and 11 ppm, respectively. Additionally, these PEDOT/SWCNT derivative sensor systems experience negligible device performance over the course of two weeks under ambient conditions. PMID:28452929

  16. Love-Wave Sensors Combined with Microfluidics for Fast Detection of Biological Warfare Agents

    Directory of Open Access Journals (Sweden)

    Daniel Matatagui

    2014-07-01

    Full Text Available The following paper examines a time-efficient method for detecting biological warfare agents (BWAs. The method is based on a system of a Love-wave immunosensor combined with a microfluidic chip which detects BWA samples in a dynamic mode. In this way a continuous flow-through of the sample is created, promoting the reaction between antigen and antibody and allowing a fast detection of the BWAs. In order to prove this method, static and dynamic modes have been simulated and different concentrations of BWA simulants have been tested with two immunoreactions: phage M13 has been detected using the mouse monoclonal antibody anti-M13 (AM13, and the rabbit immunoglobulin (Rabbit IgG has been detected using the polyclonal antibody goat anti-rabbit (GAR. Finally, different concentrations of each BWA simulants have been detected with a fast response time and a desirable level of discrimination among them has been achieved.

  17. Love-wave sensors combined with microfluidics for fast detection of biological warfare agents.

    Science.gov (United States)

    Matatagui, Daniel; Fontecha, José Luis; Fernández, María Jesús; Gràcia, Isabel; Cané, Carles; Santos, José Pedro; Horrillo, María Carmen

    2014-07-15

    The following paper examines a time-efficient method for detecting biological warfare agents (BWAs). The method is based on a system of a Love-wave immunosensor combined with a microfluidic chip which detects BWA samples in a dynamic mode. In this way a continuous flow-through of the sample is created, promoting the reaction between antigen and antibody and allowing a fast detection of the BWAs. In order to prove this method, static and dynamic modes have been simulated and different concentrations of BWA simulants have been tested with two immunoreactions: phage M13 has been detected using the mouse monoclonal antibody anti-M13 (AM13), and the rabbit immunoglobulin (Rabbit IgG) has been detected using the polyclonal antibody goat anti-rabbit (GAR). Finally, different concentrations of each BWA simulants have been detected with a fast response time and a desirable level of discrimination among them has been achieved.

  18. Decontamination of adsorbed chemical warfare agents on activated carbon using hydrogen peroxide solutions.

    Science.gov (United States)

    Osovsky, Ruth; Kaplan, Doron; Nir, Ido; Rotter, Hadar; Elisha, Shmuel; Columbus, Ishay

    2014-09-16

    Mild treatment with hydrogen peroxide solutions (3-30%) efficiently decomposes adsorbed chemical warfare agents (CWAs) on microporous activated carbons used in protective garments and air filters. Better than 95% decomposition of adsorbed sulfur mustard (HD), sarin, and VX was achieved at ambient temperatures within 1-24 h, depending on the H2O2 concentration. HD was oxidized to the nontoxic HD-sulfoxide. The nerve agents were perhydrolyzed to the respective nontoxic methylphosphonic acids. The relative rapidity of the oxidation and perhydrolysis under these conditions is attributed to the microenvironment of the micropores. Apparently, the reactions are favored due to basic sites on the carbon surface. Our findings suggest a potential environmentally friendly route for decontamination of adsorbed CWAs, using H2O2 without the need of cosolvents or activators.

  19. Training management

    International Nuclear Information System (INIS)

    Martin, H.D.

    1986-01-01

    The following topics to be covered in this report are: Design principles for training programmes; training methods, materials and facilities; national and international organization; training assessment and documentation; relation between supplier and customer, licensing requirements and practices. (orig.)

  20. Bioterrorism and Biological Warfare, from Past to the Present: A classic review

    Directory of Open Access Journals (Sweden)

    Majid Zare Bidaki

    2015-10-01

    Full Text Available Bioterrorism is defined as any terrorist action of intentional release or dissemination of highly pathogenic biological agents, including a variety of microorganisms or biological toxins. With the growing threat of terrorism, is necessary that the potential danger of various microorganisms – as a powerful tool of aggression and threat- to be taken seriously. This review tries to explain the concept of biological weapons and their historical development process with an emphasis on efforts to control the proliferation of these types of weapons over the last century. Potential impact of infectious diseases on people and armed forces was known from since 600 BC. Using the victims of the plague as a weapon in medieval warfare and spread of smallpox as a weapon during the war against the Indians when initially America was discovered, the development of biological weapons during the World War I, World War II and the Cold War, and even since the beginning of the third millennium, all show the strategic importance of pathogenic microorganisms as a deterrent power for the superiority of some governments and cults. Historical attempts to use infectious diseases as biological weapons reveal that the distinction between a natural outbreak of an infectious disease and that of a deliberate biological attack is very difficult. Abusing this characteristic of infectious diseases has made it possible for the purposes of superiority. International agreements to control the development of biological weapons, such as “the 1925 Geneva Protocol” and “the Convention on the Prohibition of the Development, Production and Stockpiling of Biological and Toxic Weapons” have not been able to control the development and using of biological warfare.  The current paper is a classic review (Overview article aiming at increasing the knowledge and awareness of people especially of health authorities and government officials.

  1. Nanoparticle-based optical biosensors for the direct detection of organophosphate chemical warfare agents and pesticides

    International Nuclear Information System (INIS)

    Simonian, A.L.; Good, T.A.; Wang, S.-S.; Wild, J.R.

    2005-01-01

    Neurotoxic organophosphates (OP) have found widespread use in the environment for insect control. In addition, there is the increasing threat of use of OP based chemical warfare agents in both ground based warfare and terrorist attacks. Together, these trends necessitate the development of simple and specific methods for discriminative detection of ultra low quantities of OP neurotoxins. In our previous investigations a new biosensor for the direct detection of organophosphorus neurotoxins was pioneered. In this system, the enzymatic hydrolysis of OP neurotoxins by organophosphate hydrolase (OPH) generated two protons in each hydrolytic turnover through reactions in which P-X bonds are cleaved. The sensitivity of this biosensor was limited due to the potentiometric method of detection. Recently, it was reported that a change in fluorescence properties of a fluorophore in the vicinity of gold nanoparticles might be used for detection of nanomolar concentrations of DNA oligonucleotides. The detection strategy was based on the fact that an enhancement or quenching of fluorescence intensity is a function of the distances between the gold nanoparticle and fluorophore. While these reports have demonstrated the use of nanoparticle-based sensors for the detection of target DNA, we observed that the specificity of enzyme-substrate interactions could be exploited in similar systems. To test the feasibility of this approach, OPH-gold nanoparticle conjugates were prepared, then incubated with a fluorescent enzyme inhibitor or decoy. The fluorescence intensity of the decoy was sensitive to the proximity of the gold nanoparticle, and thus could be used to indicate that the decoy was bound to the OPH. Then different paraoxon concentrations were introduced to the OPH-nanoparticle-conjugate-decoy mixtures, and normalized ratio of fluorescence intensities were measured. The greatest sensitivity to paraoxon was obtained when decoys and OPH-gold nanoparticle conjugates were present at

  2. Media Discourse in an Atmosphere of Information Warfare: From Manipulation to Aggression

    Directory of Open Access Journals (Sweden)

    Владимир Иванович Озюменко

    2017-12-01

    Full Text Available In todays atmosphere of information warfare the biased impact of the media has increased, pushing behind other functions, including the informative one. The forms of media influence have also changed: direct persuasion has been replaced by implicit manipulation, which develops into outright aggression. Since, in the media discourse aggression can be both verbal and non-verbal, we propose to use the term information (or media aggression , which is broader than verbal aggression . Media aggression can be considered as a binary process - in relation to the referent (affective aggression and in relation to the audience (cognitive aggression. As a result, the information under media aggression refers to the expression of open hostility and animosity towards the referent and meaningful impact on the consciousness of the recipient (the target audience to its ideological subordination. The purpose of this article is to justify the hypothesis that the growing media aggression is a feature of modern media discourse in the atmosphere of information warfare, and this function can be analysed within the framework of manipulative discourse as manipulative persuasion. The data has been taken from quality British and American newspapers, news websites of The BBC, The Economist, The Guardian, The New York Times, The Washington Post, and some others covering the relations between Russia and the USA, the situation in the Middle East, particularly in Syria. The the study was conducted using critical discourse analysis (Fairclough 2001, Van Dijk 2006, 2009; Wodak 2007; Weiss, Wodak 2007 and the multimodal approach (Ivanova, Spodarets 2010; Ponton 2016, and reveals various strategies and means of linguistic manipulation and media aggression. It also shows that the main aim of linguistic manipulation accentuated by verbal and non-verbal aggression is to deliberately mislead the audience imposing on it the desired idea of ideological subordination. Therefore, a

  3. Language Training: English Training

    CERN Multimedia

    Françoise Benz

    2004-01-01

    If you wish to participate in one of the following courses, please discuss with your supervisor and apply electronically directly from the course description pages that can be found on the Web at: http://www.cern.ch/Training/ or fill in an 'application for training' form available from your Divisional Secretariat or from your DTO (Divisional Training Officer). Applications will be accepted in the order of their receipt. General and Professional English Courses The next session will take place from 04 October 2004 to 11 February 2005 (3 weeks break at Christmas). These courses are open to all persons working on the CERN site, and to their spouses. For registration and further information on the courses, please consult our Web pages: http://cern.ch/Training or contact Mr. Liptow, tel. 72957. Oral Expression This course is intended for people with a good knowledge of English who want to practise and maintain their speaking skills while extending their vocabulary. There will be approximately 8 participants in...

  4. Millennial Warfare

    Science.gov (United States)

    2017-06-09

    www.psychologytoday.com/ blog / cutting-edge-leadership/201005/how-lead-the-millennial-generation. 8 Elizabeth Bodine-Barron, Todd C. Helmus, Madeline...environment. ISIL has taken the message boards and blog post of the 1990s and jumped in with both feet to the modern digital environment. They push content...57 Riggio. 58 Stern and Berger, 81-84. 59 Anwar Alawlaki, “The State of Ummah,” Anwar Alawaki Blog , April 23, 2009, accessed March 15, 2017

  5. Nuclear warfare

    CERN Multimedia

    Broda

    1981-01-01

    Le Prof.Broda a étudié à Vienne et Berlin et a travaillé pendant la dernière guerre mondiale en Grande Bretagne pour le conseil de la recherche médicale, notamment sur la chimie de la vision. Il est maintenant Prof. de la chimie, physique et radiochimie à l'Université de Vienne, où il concentre ses travaux sur les méchanisme de transport d'énergie à travers les cellules de membranes.

  6. Electronic Warfare

    Science.gov (United States)

    2012-02-08

    nuclear burst. A high-altitude electromagnetic pulse ( HEMP ) can generate significant disruptive field strengths over a continental-size area. The...portion of the EMS most affected by EMP and HEMP is the radio spectrum. Planning for communications system protection is significant when the potential...international law (e.g., Protocol IV of the 1980 Convention on Certain Conventional Weapons that prohibits the use of laser weapons with a combat function to

  7. Biosafety Level 3 Recon Training

    Energy Technology Data Exchange (ETDEWEB)

    Dickens, Brian Scott [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Chavez, Melanie Ann [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Heimer, Donovan J. [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Knudsen, Ryan [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Velasquez, Celina Carmelita [Los Alamos National Lab. (LANL), Los Alamos, NM (United States)

    2017-04-12

    The Biosafety Level 3 Recon training is a 3D virtual tool developed for the Counter WMD Analysis Cell (CWAC) and the Asymmetric Warfare Group (AWG) by the Application Modeling and Development Team within the NEN-3 International Threat Reduction Group. The training simulates a situation where friendly forces have secured from hostile forces a suspected bioweapons development laboratory. The trainee is a squad member tasked to investigate the facility, locate laboratories within the facility, and identify hazards to entrants and the surrounding area. Before beginning the 3D simulation, the trainee must select the appropriate MOPP level for entering the facility. The items in the simulation, including inside and outside the bioweapon facility, are items that are commonly used by scientists in Biosafety Level (BSL) laboratories. Each item has clickable red tags that, when activated, give the trainee a brief description of the item and a controllable turn-around view. The descriptions also contain information about potential hazards the item can present. Trainees must find all tagged items in order to complete the simulation, but can also reference descriptions and turn-around view of the items in a glossary menu. Training is intended to familiarize individuals whom have little or no biology or chemistry background with technical equipment used in BSL laboratories. The revised edition of this simulation (Biosafety Level 3 Virtual Lab) changes the trainee into a investigator instead of a military combatant. Many doors now require a virtual badge swipe to open. Airlock doors may come in sets such that the open door must be closed before the next door in the set can be opened. A user interface was added so that the instructor can edit the information about the items (the brief descriptions mentioned above) using the simulation software instead of the previous method of manually entering the material in xml settings files. Facility labels, such as "No Parking" and "Men

  8. A Comparison of Neutron-Based Non-Destructive Assessment Methods for Chemical Warfare Materiel and High Explosives

    Science.gov (United States)

    Seabury, E. H.; Chichester, D. L.; Wharton, C. J.; Caffrey, A. J.

    2009-03-01

    Prompt Gamma Neutron Activation Analysis (PGNAA) systems employ neutrons as a probe to interrogate items, e.g. chemical warfare materiel-filled munitions. The choice of a neutron source in field-portable systems is determined by its ability to excite nuclei of interest, operational concerns such as radiological safety and ease-of-use, and cost. Idaho National Laboratory's PINS Chemical Assay System has traditionally used a 252Cf isotopic neutron source, but recently a deuterium-tritium (DT) electronic neutron generator (ENG) has been tested as an alternate neutron source. This paper presents the results of using both of these neutron sources to interrogate chemical warfare materiel (CWM) and high explosive (HE) filled munitions.

  9. Language Training - French Training

    CERN Multimedia

    HR Department

    2008-01-01

    General and Professional French Courses The next session will take place from 26 January to 3rd April 2009. These courses are open to all persons working on the CERN site, and to their spouses. For registration and further information on the courses, please consult our Web pages: http://cern.ch/Training or contact Mrs. Nathalie Dumeaux : Tel. 78144. Writing Professional Documents in French The next session will take place from 26 January to 3rd April 2009. This course is designed for people with a good level of spoken French. Duration: 30 hours Price: 660 CHF For further information and registration, please consult our Web pages: http://cern.ch/Training or contact Mrs. Nathalie Dumeaux : Tel. 78144. Nathalie Dumeaux Tel. 78144 mailto:nathalie.dumeaux@cern.ch

  10. Language Training - French Training

    CERN Multimedia

    HR Department

    2009-01-01

    General and Professional French Courses The next session will take place from 26 January to 3rd April 2009. These courses are open to all persons working on the CERN site, and to their spouses. For registration and further information on the courses, please consult our Web pages: http://cern.ch/Training or contact Mrs. Nathalie Dumeaux : Tel. 78144. Writing Professional Documents in French The next session will take place from 26 January to 3rd April 2009. This course is designed for people with a good level of spoken French. Duration: 30 hours Price: 660 CHF For further information and registration, please consult our Web pages: http://cern.ch/Training or contact Mrs. Nathalie Dumeaux : Tel. 78144. Nathalie Dumeaux Tel. 78144 mailto:nathalie.dumeaux@cern.ch

  11. Models, Analysis, and Recommendations Pertaining to the Retention of Naval Special Warfare s Mid-Level Officers

    Science.gov (United States)

    2013-12-01

    I would like to thank Sarah Ashby, an amazing human being and friend; you spent countless hours researching information that was absolutely critical...The Analytic Hierarch/Network Process,” in Rev. R. Acad. Cien. Serie A. Mat (RACSAM), submitted by Francisco Javier Giron (Real Academia de Ciencias ...Academia de Ciencias : Spain. Scott, Nathan. Naval Special Warfare Officer Retention Survey. Monterey, CA: NPS Press, September 2013. Whittenberger

  12. Capability of the People’s Republic of China to Conduct Cyber Warfare and Computer Network Exploitation

    Science.gov (United States)

    2009-10-09

    resurgence of similar large scale hacker wars. Some groups, rallying around politically “safe” topics such as anti- Tibetan independence, however, still...also described Peng as an “experienced hacker” (see Figure 5).88 • Following this exposure on Henderson’s blog, the Coolswallow and Buddhist ...the Tibetan Government in Exile in India. The Canadian-based Information Warfare Monitor (IWM) notes the compromise of numerous government and

  13. The Short-Term Effect of Chest Physiotherapy on Spirometric Indices in Chemical Warfare Victims Exposed to Mustard Gas

    Directory of Open Access Journals (Sweden)

    A Abedi

    2008-12-01

    Full Text Available ABCTRACT Introduction & Objective: Chronic respiratory diseases are the most prevalent late sequels of sulfur mustard gas injury among Iranian chemical warfare victims. Chest physiotherapy is one of the useful methods in care, cure and infection prevention of these patients. The aim of this study was to determine the short-term effect of chest physiotherapy on spirometric indices in chemical warfare victims exposed to sulfur mustard gas. Materials & Methods: In this study, 27 of the chemical warfare victims with respiratory diseases were selected. Chest physiotherapy including postural drainage percussion and vibration were used in four positions for all patients. Pulmonary function test (PFT was obtained before (baseline, immediately and 20 minute after the chest physiotherapy. The SPSS software was used for the data analysis of the collected data. Results: Results of this study showed the significant effect (p<0.01 of chest physiotherapy upon forced expiratory volume in first second (FEV1 (baseline mean, 44.19 immediately after intervention mean 47.3 and 20 minute after intervention mean 48.3 and forced vital capacity (FVC (baseline mean, 69.37 immediately after intervention mean, 73.67 20 minute after intervention 75.74. Chest physiotherapy had significant effect (p<0.01 in asthmatic bronchitis group and also had significant effect (p<0.05 in both severe and moderate groups. Conclusion: Chest physiotherapy was able to improve pulmonary function test indices in chemical warfare victims suffering from respiratory problems. The effect on asthmatic bronchitis group, as well as both severe and moderate groups, was significant.

  14. Application of Model-Based Systems Engineering (MBSE) to Compare Legacy and Future Forces in Mine Warfare (MIW) Missions

    Science.gov (United States)

    2014-12-01

    airborne mine neutralization system AoA analysis of alternatives API application programming interface ASuW anti-surface warfare ASW...upon stakeholder feedback, an operational scenario was developed and ACRS was selected as the primary MOE for comparison. Lifecycle cost and risks...MIW Team was unfamiliar with some of the more advanced features of ExtendSim, such as 3-D animation, application programming inter- faces ( APIs ) to

  15. A hybrid method for protection against threats to a network infrastructure for an electronic warfare management system

    Science.gov (United States)

    Byłak, Michał; RóŻański, Grzegorz

    2017-04-01

    The article presents the concept of ensuring the security of network information infrastructure for the management of Electronic Warfare (EW) systems. The concept takes into account the reactive and proactive tools against threats. An overview of the methods used to support the safety of IT networks and information sources about threats is presented. Integration of mechanisms that allow for effective intrusion detection and rapid response to threats in a network has been proposed. The architecture of the research environment is also presented.

  16. Special Operations Forces in the People’s Liberation Army and the Development of an Integral Unconventional Warfare Mission

    Science.gov (United States)

    2005-06-01

    Yahuda , Michael . The International Politics of the Asia-Pacific, 1945-1995 (New York; Routledge, 1996). Yang, Andrew N.D. and Liao, Milton Wen...Action: The Challenge of Unconventional Warfare (Portland: Frank Cass Press, 2001), 3-4. 9. Michael J.Strack, “China: Special Operations Forces of...weapons/scud.html; Internet; accessed 21 March 2005. 59. Michael B. Gordon and General Bernard E. Trainor, “ The General’s War: The Inside Story of

  17. Potential Science and Technology Game Changers for the Ground Warfare of 2050: Selected Projections Made in 2017

    Science.gov (United States)

    2018-02-01

    effect, it is a living document that is not intended to offer arguments or recommendations for programmatic investments or priorities. It touches on the ...reports might offer different projections or update those already discussed. In effect, it is a living document. It is also important to emphasize what...now and 2050; these are depicted by the stars inside the left circle. Most of them will not have a game-changing importance for ground warfare in

  18. The potential impact of developments in electronic technology on the future conduct of air warfare, volume 3

    Science.gov (United States)

    1986-12-01

    Advances in microelectronics have resulted in circuit densities many orders of magnitude greater than in current usage, making possible higher speed circuitry and greater storage capacity. RF techniques are also leading to monolithic microwave integrated circuits and microstrip antennas with corresponding reductions in size and weight. In addition, rapid advances are taking place in computer architecture and software that will provide improved information processing and control. This, coupled with progress in artificial intelligence and man-machine interface, offers promise of greatly improved battle management in the cockpit. The scale of changes is such that the nature of air warfare should be significantly affected over the next twenty years. This study examined the potential of electronic technology and potential benefits such as improvements in information processing, reduction in size and weight, increased reliability and maintainability; determined the applicability of such improvements to avionics and command and control systems and such functions as navigation and guidance, communications, surveillance, cockpit engineering and electronic warfare; and examined the impact on air warfare in the time period 2000 to 2010.

  19. Multifunctional ultra-high vacuum apparatus for studies of the interactions of chemical warfare agents on complex surfaces.

    Science.gov (United States)

    Wilmsmeyer, Amanda R; Gordon, Wesley O; Davis, Erin Durke; Mantooth, Brent A; Lalain, Teri A; Morris, John R

    2014-01-01

    A fundamental understanding of the surface chemistry of chemical warfare agents is needed to fully predict the interaction of these toxic molecules with militarily relevant materials, catalysts, and environmental surfaces. For example, rules for predicting the surface chemistry of agents can be applied to the creation of next generation decontaminants, reactive coatings, and protective materials for the warfighter. Here, we describe a multifunctional ultra-high vacuum instrument for conducting comprehensive studies of the adsorption, desorption, and surface chemistry of chemical warfare agents on model and militarily relevant surfaces. The system applies reflection-absorption infrared spectroscopy, x-ray photoelectron spectroscopy, and mass spectrometry to study adsorption and surface reactions of chemical warfare agents. Several novel components have been developed to address the unique safety and sample exposure challenges that accompany the research of these toxic, often very low vapor pressure, compounds. While results of vacuum-based surface science techniques may not necessarily translate directly to environmental processes, learning about the fundamental chemistry will begin to inform scientists about the critical aspects that impact real-world applications.

  20. The role of the sand in chemical warfare agent exposure among Persian Gulf War veterans: Al Eskan disease and "dirty dust".

    Science.gov (United States)

    Korényi-Both, A L; Svéd, L; Korényi-Both, G E; Juncer, D J; Korényi-Both, A L; Székely, A

    2000-05-01

    The purpose of this paper is to inquire into the relationship between Al Eskan disease and the probable exposure to chemical warfare agents by Persian Gulf War veterans. Al Eskan disease, first reported in 1991, compromises the body's immunological defense and is a result of the pathogenic properties of the extremely fine, dusty sand located in the central and eastern region of the Arabian peninsula. The disease manifests with localized expression of multisystem disorder. Signs and symptoms of Al Eskan disease have been termed by the news media "Persian Gulf syndrome." The dust becomes a warfare agent when toxic chemicals are microimpregnated into inert particles. The "dirty dust" concept, that the toxicity of an agent could be enhanced by absorption into inactive particles, dates from World War I. A growing body of evidence shows that coalition forces have encountered Iraqi chemical warfare in the theater of operation/Persian Gulf War to a much greater extent than early U.S. Department of Defense information had indicated. Veterans of that war were exposed to chemical warfare agents in the form of direct (deliberate) attacks by chemical weapons, such as missiles and mines, and indirect (accidental) contamination from demolished munition production plants and storage areas, or otherwise. We conclude that the microimpregnated sand particles in the theater of operation/Persian Gulf War depleted the immune system and simultaneously acted as vehicles for low-intensity exposure to chemical warfare agents and had a modifying-intensifying effect on the toxicity of exposed individuals. We recommend recognition of a new term, "dirty sand," as a subcategory of dirty dust/dusty chemical warfare agents. Our ongoing research efforts to investigate the health impact of chemical warfare agent exposure among Persian Gulf War veterans suggest that Al Eskan disease is a plausible and preeminent explanation for the preponderance of Persian Gulf War illnesses.

  1. An Analysis of Surface Warfare Officer Measures of Effectiveness as Related to Commissioning Source, Undergraduate Education, and Navy Training

    Science.gov (United States)

    1993-03-01

    and Riordan for their encouragement, support. and understanding which truly made this research possible. viii I. INTRODUCTION "It is important that the...Relative Productivity Of Of ricers From Different Accession Sources. Master’s Thesis, Naval Postgraduate School, Monterey, CA. Maze, Rick . 1990. Methods

  2. Realignment of the Fleet and Mine Warfare Training Center from Naval Station Charleston, South Carolina, to Naval Station Ingleside, Texas

    National Research Council Canada - National Science Library

    1994-01-01

    ... requested for each military construction project associated with base realignment and closure does not exceed the original estimated cost provided to the Commission on Defense Base Closure and Realignment (the Commission...

  3. Language Training: English Training

    CERN Multimedia

    Françoise Benz

    2004-01-01

    General and Professional English Courses The next session will take place from 04 October 2004 to 11 February 2005 (3 weeks break at Christmas). These courses are open to all persons working on the CERN site, and to their spouses. For registration and further information on the courses, please consult our Web pages: http://cern.ch/Training or contact Mr. Liptow, tel. 72957. Oral Expression This course is intended for people with a good knowledge of English who want to practise and maintain their speaking skills while extending their vocabulary. There will be approximately 8 participants in a class. Speaking activities will include discussions, meeting simulations, role-plays etc. depending on the needs of the students. Duration: 20 hours (2 hours a week) Price: 440 CHF (for 8 students) For further information, please contact Mr. Liptow, tel. 72957. Date and timetable will be fixed when there are sufficient participants enrolled. FORMATION EN LANGUES LANGUAGE TRAINING Françoise Benz 73127 langua...

  4. Language Training: English Training

    CERN Multimedia

    Françoise Benz

    2004-01-01

    La prochaine session se déroulera du 04 octobre 2004 au 11 février 2005 (interruption de 3 semaines à Noël). Ces cours s'adressent à toute personne travaillant au CERN ainsi qu'à leur conjoint. Pour vous inscrire et voir tout le détail des cours proposés, consultez nos pages Web : http://cern.ch/Training Vous pouvez aussi contacter M. Liptow, tél. 72957. General and Professional English Courses The next session will take place from 04 October 2004 to 11 February 2005 (3 weeks break at Christmas). These courses are open to all persons working on the CERN site, and to their spouses. For registration and further information on the courses, please consult our Web pages: http://cern.ch/Training or contact Mr. Liptow, tel. 72957. Oral Expression This course is intended for people with a good knowledge of English who want to practise and maintain their speaking skills while extending their vocabulary. There will be approximately 8 participants ...

  5. Language Training: English Training

    CERN Multimedia

    Françoise Benz

    2004-01-01

    General and Professional English Courses The next session will take place from 04 October 2004 to 11 February 2005 (3 weeks break at Christmas). These courses are open to all persons working on the CERN site, and to their spouses. For registration and further information on the courses, please consult our Web pages: http://cern.ch/Training or contact Mr. Liptow, tel. 72957. Oral Expression This course is intended for people with a good knowledge of English who want to practise and maintain their speaking skills while extending their vocabulary. There will be approximately 8 participants in a class. Speaking activities will include discussions, meeting simulations, role-plays etc. depending on the needs of the students. Duration: 20 hours (2 hours a week) Price: 440 CHF (for 8 students) For further information, please contact Mr. Liptow, tel. 72957. Date and timetable will be fixed when there are sufficient participants enrolled. FORMATION EN LANGUES LANGUAGE TRAINING Françoise Benz 73127 languag...

  6. Efficacy of liquid and foam decontamination technologies for chemical warfare agents on indoor surfaces.

    Science.gov (United States)

    Love, Adam H; Bailey, Christopher G; Hanna, M Leslie; Hok, Saphon; Vu, Alex K; Reutter, Dennis J; Raber, Ellen

    2011-11-30

    Bench-scale testing was used to evaluate the efficacy of four decontamination formulations on typical indoor surfaces following exposure to the liquid chemical warfare agents sarin (GB), soman (GD), sulfur mustard (HD), and VX. Residual surface contamination on coupons was periodically measured for up to 24h after applying one of four selected decontamination technologies [0.5% bleach solution with trisodium phosphate, Allen Vanguard Surface Decontamination Foam (SDF™), U.S. military Decon Green™, and Modec Inc. and EnviroFoam Technologies Sandia Decontamination Foam (DF-200)]. All decontamination technologies tested, except for the bleach solution, performed well on nonporous and nonpermeable glass and stainless-steel surfaces. However, chemical agent residual contamination typically remained on porous and permeable surfaces, especially for the more persistent agents, HD and VX. Solvent-based Decon Green™ performed better than aqueous-based bleach or foams on polymeric surfaces, possibly because the solvent is able to penetrate the polymer matrix. Bleach and foams out-performed Decon Green for penetrating the highly polar concrete surface. Results suggest that the different characteristics needed for an ideal and universal decontamination technology may be incompatible in a single formulation and a strategy for decontaminating a complex facility will require a range of technologies. Copyright © 2011 Elsevier B.V. All rights reserved.

  7. Extraordinary Measures: Drone Warfare, Securitization, and the “War on Terror”

    Directory of Open Access Journals (Sweden)

    Romaniuk Scott Nicholas

    2015-07-01

    Full Text Available The use of unmanned aerial vehicles or “drones,” as part of the United States’ (US targeted killing (TK program dramatically increased after the War on Terror (WoT was declared. With the ambiguous nature and parameters of the WoT, and stemming from the postulation of numerous low-level, niche-, and other securitizations producing a monolithic threat, US drone operations now constitute a vital stitch in the extensive fabric of US counterterrorism policy. This article employs the theories of securitization and macrosecuritization as discussed by Buzan (1991, 2006, and Buzan and Wæver (2009 to understand targeted killing, by means of weaponized drones, as an extraordinary measure according to the Copenhagen School’s interpretation. An overarching securitization and the use of the “security” label warrants the emergency action of targeted killing through the use of drones as an extraordinary measure. We argue that the WoT serves as a means of securitizing global terrorism as a threat significant enough to warrant the use of drone warfare as an extraordinary use of force. By accepting the WoT as a securitization process we can reasonably accept that the US’ response(s against that threat are also securitized and therefore become extraordinary measures.

  8. Reactions of psychiatric inpatients to the threat of biological and chemical warfare in Israel.

    Science.gov (United States)

    Strous, Rael D; Ofir, Dana; Brodsky, Ori; Yakirevitch, Janna; Drannikov, Angela; Navo, Nadav; Kotler, Moshe

    2004-04-01

    In the months before the Second Gulf War, the threat of biological and chemical warfare led many Israelis to experience significant stress and mood changes. In this study, we investigated whether this threat affected the subjective mood and behavior of inpatients with schizophrenia and compared the results with effects noted in their clinical staff. Subjects were evaluated at two points in time-2 months before the war and on day 1 of the war-with a specially designed questionnaire and with the Spielberger Scale for Trait Anxiety. Although the responses of the two groups did not differ radically before the war, on the first day of war, significant differences were noted, with patients demonstrating increases in anxiety and level of concern. Both groups reported similar effects on their mood. Patients were more concerned about the potential for the outbreak of World War III, whereas staff were more concerned about economic effects. Female subjects in both groups demonstrated greater anxiety and mood changes after the outbreak of war compared with before the war. Effects observed on the patients may be related to the decreased coping threshold resulting from their illness, which renders psychotic patients more vulnerable to any acute stressor; however, effects on the staff members should not be ignored.

  9. Transmissivity and storage coefficient estimates from slug tests, Naval Air Warfare Center, West Trenton, New Jersey

    Science.gov (United States)

    Fiore, Alex R.

    2014-01-01

    Slug tests were conducted on 56 observation wells open to bedrock at the former Naval Air Warfare Center (NAWC) in West Trenton, New Jersey. Aquifer transmissivity (T) and storage coefficient (S) values for most wells were estimated from slug-test data using the Cooper-Bredehoeft-Papadopulos method. Test data from three wells exhibited fast, underdamped water-level responses and were analyzed with the Butler high-K method. The range of T at NAWC was approximately 0.07 to 10,000 square feet per day. At 11 wells, water levels did not change measurably after 20 minutes following slug insertion; transmissivity at these 11 wells was estimated to be less than 0.07 square feet per day. The range of S was approximately 10-10 to 0.01, the mode being 10-10. Water-level responses for tests at three wells fit poorly to the type curves of both methods, indicating that these methods were not appropriate for adequately estimating T and S from those data.

  10. Detection of chemical warfare simulants using Raman excitation at 1064 nm

    Science.gov (United States)

    Dentinger, Claire; Mabry, Mark W.; Roy, Eric G.

    2014-05-01

    Raman spectroscopy is a powerful technique for material identification. The technique is sensitive to primary and higher ordered molecular structure and can be used to identify unknown materials by comparison with spectral reference libraries. Additionally, miniaturization of opto-electronic components has permitted development of portable Raman analyzers that are field deployable. Raman scattering is a relatively weak effect compared to a competing phenomenon, fluorescence. Even a moderate amount of fluorescence background interference can easily prevent identification of unknown materials. A long wavelength Raman system is less likely to induce fluorescence from a wider variety of materials than a higher energy visible laser system. Compounds such as methyl salicylate (MS), diethyl malonate (DEM), and dimethyl methylphosphonate (DMMP) are used as chemical warfare agent (CWA) simulants for development of analytical detection strategies. Field detection of these simulants however poses unique challenges because threat identification must be made quickly without the turnaround time usually required for a laboratory based analysis. Fortunately, these CWA simulants are good Raman scatterers, and field based detection using portable Raman instruments is promising. Measurements of the CWA simulants were done using a 1064 nm based portable Raman spectrometer. The longer wavelength excitation laser was chosen relative to a visible based laser systems because the 1064 nm based spectrometer is less likely to induce fluorescence and more suitable to a wider range of materials. To more closely mimic real world measurement situations, different sample presentations were investigated.

  11. Global physics: from percolation to terrorism, guerilla warfare and clandestine activities

    Science.gov (United States)

    Galam, Serge

    2003-12-01

    The September 11 attack on the US has revealed an unprecedented terrorism with worldwide range of destruction. It is argued to result from the first worldwide percolation of passive supporters. They are people sympathetic to the terrorism cause but without being involved with it. They just do not oppose it in case they could. This scheme puts suppression of the percolation as the major strategic issue in the fight against terrorism. Acting on the population is shown to be useless. Instead a new strategic scheme is suggested to increase the terrorism percolation threshold and in turn suppress the percolation. The relevant associated space is identified as a multi-dimensional social space including both the ground earth surface and all various independent flags displayed by the terrorist group. Some hints are given on how to shrink the geographical spreading of terrorism threat. The model apply to a large spectrum of clandestine activities including guerilla warfare as well as tax evasion, corruption, illegal gambling, illegal prostitution and black markets.

  12. Metabolic Syndrome in Chemical Warfare Patients with Chronic Obstructive Pulmonary Disease

    Directory of Open Access Journals (Sweden)

    Shahrzad M. Lari

    2014-11-01

    Full Text Available   Introduction: Sulfur mustard (SM, a toxic alkylating gas, can cause serious long-term pulmonary complications such as chronic obstructive pulmonary disease (COPD. Metabolic syndrome (MetS is one of the important comorbidities of COPD. This study was designed to evaluate the frequency of metabolic syndrome in Iranian chemical warfare patients (CWPs with COPD. Materials and Methods: Thirty CWPs with a mean age of 46.93± 6.8 were enrolled in this study. The following parameters were studied in: complete pulmonary function tests, health-related quality of life, serum triglycerides (TG, high density lipoprotein (HDL and fasting blood sugar (FBS levels. Additionally, 32 COPD patients and 56 healthy persons were considered as control groups who were matched to CWPs. Results: We found a statistically significant difference in the frequency of MetS between the COPD patients and the healthy control group (p=0.04. Additionally, we observed a statistically significant difference in the mean HDL levels among these groups (p=

  13. Structural Effect of Thioureas on the Detection of Chemical Warfare Agent Simulants.

    Science.gov (United States)

    Ha, Seonggyun; Lee, Minhe; Seo, Hyun Ook; Song, Sun Gu; Kim, Kyung-Su; Park, Chan Heum; Kim, Il Hee; Kim, Young Dok; Song, Changsik

    2017-08-25

    The ability to rapidly detect, identify, and monitor chemical warfare agents (CWAs) is imperative for both military and civilian defense. Since most CWAs and their simulants have an organophosphonate group, which is a hydrogen (H)-bond acceptor, many H-bond donors have been developed to effectively bind to the organophosphonate group. Although thioureas have been actively studied as an organocatalyst, they are relatively less investigated in CWA detection. In addition, there is a lack of studies on the structure-property relationship for gas phase detection. In this study, we synthesized various thioureas of different chemical structures, and tested them for sensing dimethylmethylphosphonate (DMMP), a CWA simulant. Molecular interaction between DMMP and thiourea was measured by 1 H NMR titration and supported by density functional theory (DFT) calculations. Strong H-bond donor ability of thiourea may cause self-aggregation, and CH-π interaction can play an important role in the DMMP detection. Gas-phase adsorption of DMMP was also measured using a quartz crystal microbalance (QCM) and analyzed using the simple Langmuir isotherm, showing the importance of structure-induced morphology of thioureas on the surface.

  14. Healthcare and warfare. Medical space, mission and apartheid in twentieth century northern Namibia.

    Science.gov (United States)

    Nord, Catharina

    2014-07-01

    In the year 1966, the first government hospital, Oshakati hospital, was inaugurated in northern South-West Africa. It was constructed by the apartheid regime of South Africa which was occupying the territory. Prior to this inauguration, Finnish missionaries had, for 65 years, provided healthcare to the indigenous people in a number of healthcare facilities of which Onandjokwe hospital was the most important. This article discusses these two agents' ideological standpoints. The same year, the war between the South-West African guerrillas and the South African state started, and continued up to 1988. The two hospitals became involved in the war; Oshakati hospital as a part of the South African war machinery, and Onandjokwe hospital as a 'terrorist hospital' in the eyes of the South Africans. The missionary Onandjokwe hospital was linked to the Lutheran church in South-West Africa, which became one of the main critics of the apartheid system early in the liberation war. Warfare and healthcare became intertwined with apartheid policies and aggression, materialised by healthcare provision based on strategic rationales rather than the people's healthcare needs. When the Namibian state took over a ruined healthcare system in 1990, the two hospitals were hubs in a healthcare landscape shaped by missionary ambitions, war and apartheid logic.

  15. Trade, Diplomacy, and Warfare: The Quest for Elite Rhizobia Inoculant Strains

    Directory of Open Access Journals (Sweden)

    Alice Checcucci

    2017-11-01

    Full Text Available Rhizobia form symbiotic nitrogen-fixing nodules on leguminous plants, which provides an important source of fixed nitrogen input into the soil ecosystem. The improvement of symbiotic nitrogen fixation is one of the main challenges facing agriculture research. Doing so will reduce the usage of chemical nitrogen fertilizer, contributing to the development of sustainable agriculture practices to deal with the increasing global human population. Sociomicrobiological studies of rhizobia have become a model for the study of the evolution of mutualistic interactions. The exploitation of the wide range of social interactions rhizobia establish among themselves, with the soil and root microbiota, and with the host plant, could constitute a great advantage in the development of a new generation of highly effective rhizobia inoculants. Here, we provide a brief overview of the current knowledge on three main aspects of rhizobia interaction: trade of fixed nitrogen with the plant; diplomacy in terms of communication and possible synergistic effects; and warfare, as antagonism and plant control over symbiosis. Then, we propose new areas of investigation and the selection of strains based on the combination of the genetic determinants for the relevant rhizobia symbiotic behavioral phenotypes.

  16. China’s Three Warfares Strategy Mitigates Fallout From Cyber Espionage Activities

    Directory of Open Access Journals (Sweden)

    Emilio Iasiello

    2016-06-01

    Full Text Available China is engaged in longstanding cyber espionage against the U.S., as well as other nations, to collect sensitive public and private information in support of national objectives laid out in its 12th Five Year Plan. Foreign governments citing China’s malfeasance have rebuked these activities, a claim vehemently denied by Beijing. In response, China is leveraging the “Three Warfares” an integrated three-prong information warfare strategy to combat these accusations by leveraging Media, Legal, and Psychological components designed to influence the international community. While the United States has threatened the imposition of economic sanctions, Beijing has successfully parried consequential actions by arresting U.S.-identified hackers, thereby demonstrating its commitment toward preserving a stable and peaceful cyberspace. These interrelated “Three Warfares” disciplines have targeted the cognitive processes of the U.S. leadership, as well as the international public’s perception of China as a global threat, thereby having successfully forestalled the implementation of any effective punitive or economic deterrence strategy to include the imposition of cyber sanctions.

  17. Virtual Warfare: Masculinity, Sexuality, and Propaganda in the Russo-Ukrainian War

    Directory of Open Access Journals (Sweden)

    Maryna Romanets

    2017-03-01

    Full Text Available This paper explores the intersection of sexual and political discourses as a particular aspect of the body politics that Russia has employed, among other strategies, in its massive propaganda offensive during the hybrid warfare against Ukraine.While recognizing sexuality as one of the mainstream concepts in political analysis, the paper draws on sexually explicit imagery and idiom used in Russian social media, and public discursive space in general, as propaganda techniques, and maps their “genealogy” within wider sociocultural and political contexts. Being conceptualized in terms of Russian hegemonic masculinity in relation to subordinated femininity and non-hegemonic masculinities of its adversarial others, these setups reveal how sexuality constitutes uneven and contradictory nexuses of power once being co-opted by Putin’s propaganda machine. It is noteworthy that Russia’s neo-imperial discursive tactics of homologizing sexual and political dominance—when supplemented with the official rhetoric of restituting Russia as a great power, Orthodox Christian fundamentalism as an integral part of Russian unique “state-civilization,” state-sanctioned homophobia, and traditional macho gender ideology—contribute quite effectively to sustaining public support in Russia for aggression against Ukraine in the process of Russian reimperialization of the former Soviet space.

  18. Trade, Diplomacy, and Warfare: The Quest for Elite Rhizobia Inoculant Strains.

    Science.gov (United States)

    Checcucci, Alice; DiCenzo, George C; Bazzicalupo, Marco; Mengoni, Alessio

    2017-01-01

    Rhizobia form symbiotic nitrogen-fixing nodules on leguminous plants, which provides an important source of fixed nitrogen input into the soil ecosystem. The improvement of symbiotic nitrogen fixation is one of the main challenges facing agriculture research. Doing so will reduce the usage of chemical nitrogen fertilizer, contributing to the development of sustainable agriculture practices to deal with the increasing global human population. Sociomicrobiological studies of rhizobia have become a model for the study of the evolution of mutualistic interactions. The exploitation of the wide range of social interactions rhizobia establish among themselves, with the soil and root microbiota, and with the host plant, could constitute a great advantage in the development of a new generation of highly effective rhizobia inoculants. Here, we provide a brief overview of the current knowledge on three main aspects of rhizobia interaction: trade of fixed nitrogen with the plant; diplomacy in terms of communication and possible synergistic effects; and warfare, as antagonism and plant control over symbiosis. Then, we propose new areas of investigation and the selection of strains based on the combination of the genetic determinants for the relevant rhizobia symbiotic behavioral phenotypes.

  19. Explosives and chemical warfare agents - detection and analysis with PTR-MS

    Energy Technology Data Exchange (ETDEWEB)

    Sulzer, Philipp; Juerschik, Simone; Jaksch, Stefan; Jordan, Alfons; Hanel, Gernot; Hartungen, Eugen; Seehauser, Hans; Maerk, Lukas; Haidacher, Stefan; Schottkowsky, Ralf [IONICON Analytik GmbH, Innsbruck (Austria); Petersson, Fredrik [Institut fuer Ionenphysik und Angewandte Physik, Leopold-Franzens Universitaet Innsbruck (Austria); Maerk, Tilmann [IONICON Analytik GmbH, Innsbruck (Austria); Institut fuer Ionenphysik und Angewandte Physik, Leopold-Franzens Universitaet Innsbruck (Austria)

    2010-07-01

    We utilized a recently developed high sensitivity PTR-MS instrument equipped with a high resolution time-of-flight mass analyzer for detailed investigations on explosives and chemical warfare agents (CWAs). We show that with this so called PTR-TOF 8000 it is possible to identify solid explosives (RDX, TNT, HMX, PETN and Semtex A) by analyzing the headspace above small quantities of samples at room temperature and from trace quantities not visible to the naked eye placed on surfaces. As the mentioned solid explosives possess very low vapor pressures, the main challenge for detecting them in the gas phase is to provide an instrument with a sufficient sensitivity. CWAs on the other side have very high vapor pressures but are difficult to identify unambiguously as their nominal molecular masses are usually comparably small and therefore hard to distinguish from harmless everyday-compounds (e.g. mustard gas: 159 g/mol). In the present work we demonstrate that we can detect a broad range of dangerous substances, ranging from the CWA mustard gas to the explosive HMX.

  20. Social networks as a new tool of information warfare in the modern world

    Directory of Open Access Journals (Sweden)

    B. W. Kovalevych

    2014-03-01

    Full Text Available With the rapid development of information technologies, especially the Internet, people are becoming increasingly dependent on information that surrounds them. And social networks, where a person spends most of their time, become the ideal instruments of influence on the people consciousness and information warfare. Due to psychological factors ( such as ‘spiral of silence’, the herd instinct, the entire credibility of published information, opinion leaders, the desire for self­realization or replacement of reality that influence the human behavior in the network and the use of models of influence (model of network attack, model of involving users as volunteers, total block model, social networks become a platform for the dissemination of political ideas, ideologies and implementation of the ‘color revolutions’. However, social media play a positive role, especially in the establishment of civil society and the free flow of information. Positive or negative impact of networks primary depends on the purpose of use of social networking tools.

  1. Between Female Dialogics and Traces of Essentialism: Gender and Warfare in Christa Wolf's Major Writings

    Directory of Open Access Journals (Sweden)

    Sabine Wilke

    1993-06-01

    Full Text Available The relationship between memory, writing, and the question of how we define ourselves as gendered subjects is at the center of Christa Wolf's work. Her literary production, starting in the late fifties with a rather naive and un-selfconscious love story, has undergone a dramatic shift. In her more recent texts, Wolf sets out to rewrite classical mythology to make us aware of those intersections in the history of Western civilization at which women were made economically and psychologically into objects. The present essay seeks to locate Christa Wolf's evolving conception of gender and warfare within the contemporary theoretical discussion on identity and the subject sketched briefly above. While of late there has been a wealth of studies into the construction of gender in particular works by Wolf, no scholarly contribution has yet addressed the range of answers regarding those questions in her overall oeuvre. I will argue that whereas Wolf's earlier works present a dialogic conception of gender, her later narratives more and more expound a notion of the essentially more peaceful female subject that is counterposed to the essentially warloving male. In these works "female subjectivity is taken to be capable of articulating itself fully in its radical otherness outside of male discourse," which seems to support ideas of an ontological essence of "woman."

  2. Chemical warfare agent detection in complex environments with comprehensive two-dimensional gas chromatography

    Science.gov (United States)

    Reichenbach, Stephen E.; Ni, Mingtian; Kottapalli, Visweswara; Visvanathan, Arvind; Ledford, Edward B., Jr.; Oostdijk, John; Trap, Henk C.

    2003-08-01

    Comprehensive two-dimensional gas chromatography (GCxGC) is an emerging technology for chemical separation that provides an order-of-magnitude increase in separation capacity over traditional gas chromatography. GCxGC separates chemical species with two capillary columns interfaced by two-stage thermal desorption. Because GCxGC is comprehensive and has high separation capacity, it can perform multiple traditional analytical methods with a single analysis. GCxGC has great potential for a wide variety of environmental sensing applications, including detection of chemical warfare agents (CWA) and other harmful chemicals. This paper demonstrates separation of nerve agents sarin and soman from a matrix of gasoline and diesel fuel. Using a combination of an initial column separating on the basis of boiling point and a second column separating on the basis of polarity, GCxGC clearly separates the nerve agents from the thousands of other chemicals in the sample. The GCxGC data is visualized, processed, and analyzed as a two-dimensional digital image using a software system for GCxGC image processing developed at the University of Nebraska - Lincoln.

  3. Chemical Warfare Agent Surface Adsorption: Hydrogen Bonding of Sarin and Soman to Amorphous Silica.

    Science.gov (United States)

    Davis, Erin Durke; Gordon, Wesley O; Wilmsmeyer, Amanda R; Troya, Diego; Morris, John R

    2014-04-17

    Sarin and soman are warfare nerve agents that represent some of the most toxic compounds ever synthesized. The extreme risk in handling such molecules has, until now, precluded detailed research into the surface chemistry of agents. We have developed a surface science approach to explore the fundamental nature of hydrogen bonding forces between these agents and a hydroxylated surface. Infrared spectroscopy revealed that both agents adsorb to amorphous silica through the formation of surprisingly strong hydrogen-bonding interactions with primarily isolated silanol groups (SiOH). Comparisons with previous theoretical results reveal that this bonding occurs almost exclusively through the phosphoryl oxygen (P═O) of the agent. Temperature-programmed desorption experiments determined that the activation energy for hydrogen bond rupture and desorption of sarin and soman was 50 ± 2 and 52 ± 2 kJ/mol, respectively. Together with results from previous studies involving other phosphoryl-containing molecules, we have constructed a detailed understanding of the structure-function relationship for nerve agent hydrogen bonding at the gas-surface interface.

  4. Interval Training

    Science.gov (United States)

    Healthy Lifestyle Fitness Interval training can help you get the most out of your workout. By Mayo Clinic Staff Are you ready to shake up ... more time at the gym? Consider aerobic interval training. Once the domain of elite athletes, interval training ...

  5. Language Training - English Training

    CERN Multimedia

    HR Department

    2009-01-01

    General and Professional English Courses The next session will take place: from 2nd March to end of June 2009 (1/2 weeks break at Easter). These courses are open to all persons working on the CERN site, and to their spouses. For registration and further information on the courses, please consult our Web pages: http://cern.ch/Training or contact Nathalie Dumeaux, tel. 78144. Oral Expression The next session will take place from 2nd March to end of June 2009 (1/2 weeks break at Easter). This course is intended for people with a good knowledge of English who want to enhance their speaking skills. There will be on average of 8 participants in a class. Speaking activities will include discussions, meeting simulations, role-plays etc. depending on the needs of the students. Duration: 30 hours Price: 660 CHF (for a minimum of 8 students) Writing Professional Documents in English The next session will take place from 2nd March to end of June 2009 (1/2 weeks break at Easter). This course is designed for people w...

  6. Language Training - English Training

    CERN Multimedia

    HR Department

    2009-01-01

    General and Professional English Courses The next session will take place: from 2nd March to end of June 2009 (1/2 weeks break at Easter). These courses are open to all persons working on the CERN site, and to their spouses. For registration and further information on the courses, please consult our Web pages: http://cern.ch/Training or contact Nathalie Dumeaux, tel. 78144. Oral Expression The next session will take place from 2nd March to end of June 2009 (1/2 weeks break at Easter). This course is intended for people with a good knowledge of English who want to enhance their speaking skills. There will be an average of 8 participants per class. Speaking activities will include discussions, meeting simulations, role-plays, etc., depending on the needs of the students. Duration: 30 hours Price: 660 CHF (for a minimum of 8 students) Writing Professional Documents in English The next session will take place from 2nd March to end of June 2009 (1/2 weeks break at Easter). This course is designed for people ...

  7. COPD assessment test (CAT): simple tool for evaluating quality of life of chemical warfare patients with chronic obstructive pulmonary disease.

    Science.gov (United States)

    Lari, Shahrzad M; Ghobadi, Hassan; Attaran, Davood; Mahmoodpour, Afsoun; Shadkam, Omid; Rostami, Maryam

    2014-01-01

    Chronic obstructive pulmonary disease (COPD) is one of the serious late pulmonary complications caused by sulphur mustard exposure. Health status evaluations of chemical warfare patients with COPD are important to the management of these patients. The aim of this study was to determine the efficacy of the COPD assessment test (CAT) in evaluating the health-related quality of life (HRQOL) of chemical warfare patients with COPD. Eighty-two consecutive patients with stable COPD were enrolled in this study. All subjects were visited by one physician, and the HRQOL was evaluated by the CAT and St. George Respiratory Questionnaires (SGRQs). In addition, a standard spirometry test, 6-min walk distance test and pulse oxymetry were conducted. The severity of the COPD was determined using Global Initiative for Chronic Obstructive Lung Disease (GOLD) staging and the body mass index, obstruction, dyspnoea and exercise (BODE) index. The mean age of the patients was 47.30 ± 7.08 years. The mean CAT score was 26.03 ± 8.28. Thirty-five (43%) patients were in CAT stage 3. There were statistically significant correlations between the CAT and the SGRQ (r = 0.70, P = 0.001) and the BODE index (r = 0.70, P = 0.001). A statistically significant inverse correlation was found between the CAT score and the forced expiratory volume in 1 s (r = -0.30, P = 0.03). Our results demonstrated that the CAT is a simple and valid tool for assessment of HRQOL in chemical warfare patients with COPD and can be used in clinical practice. © 2013 John Wiley & Sons Ltd.

  8. Treatment of chemical warfare agents by zero-valent iron nanoparticles and ferrate(VI)/(III) composite

    Energy Technology Data Exchange (ETDEWEB)

    Zboril, Radek, E-mail: zboril@prfnw.upol.cz [Regional Centre of Advanced Technologies and Materials, Departments of Physical Chemistry and Experimental Physics, 17. listopadu 1192/12, 771 46 Olomouc (Czech Republic); Andrle, Marek; Oplustil, Frantisek [Military Institute VOP-026 Sternberk, Division in Brno, Rybkova 8, 602 00 Brno (Czech Republic); Machala, Libor; Tucek, Jiri; Filip, Jan; Marusak, Zdenek [Regional Centre of Advanced Technologies and Materials, Departments of Physical Chemistry and Experimental Physics, 17. listopadu 1192/12, 771 46 Olomouc (Czech Republic); Sharma, Virender K., E-mail: vsharma@fit.edu [Chemistry Department, Florida Institute of Technology, 150 West University Boulevard, Melbourne, FL 32901 (United States); Center of Ferrate Excellence, Florida Institute of Technology, 150 West University Boulevard, Melbourne, FL 32901 (United States)

    2012-04-15

    Highlights: Black-Right-Pointing-Pointer Ferrate(VI) has been found to be highly efficient to decontaminate chemical warfare agents. Black-Right-Pointing-Pointer Fast degradation of sulfur mustard, soman and compound VX by ferrate(VI). Black-Right-Pointing-Pointer Nanoscale zero-valent iron particles are considerably less efficient in degradation of studied warfare agents compared to ferrate(VI). - Abstract: Nanoscale zero-valent iron (nZVI) particles and a composite containing a mixture of ferrate(VI) and ferrate(III) were prepared by thermal procedures. The phase compositions, valence states of iron, and particle sizes of iron-bearing compounds were determined by combination of X-ray powder diffraction, Moessbauer spectroscopy and scanning electron microscopy. The applicability of these environmentally friendly iron based materials in treatment of chemical warfare agents (CWAs) has been tested with three representative compounds, sulfur mustard (bis(2-chlorethyl) sulfide, HD), soman ((3,3 Prime -imethylbutan-2-yl)-methylphosphonofluoridate, GD), and O-ethyl S-[2-(diisopropylamino)ethyl] methylphosphonothiolate (VX). Zero-valent iron, even in the nanodimensional state, had a sluggish reactivity with CWAs, which was also observed in low degrees of CWAs degradation. On the contrary, ferrate(VI)/(III) composite exhibited a high reactivity and complete degradations of CWAs were accomplished. Under the studied conditions, the estimated first-order rate constants ({approx}10{sup -2} s{sup -1}) with the ferrate(VI)/(III) composite were several orders of magnitude higher than those of spontaneous hydrolysis of CWAs (10{sup -8}-10{sup -6} s{sup -1}). The results demonstrated that the oxidative technology based on application of ferrate(VI) is very promising to decontaminate CWAs.

  9. Treatment of chemical warfare agents by zero-valent iron nanoparticles and ferrate(VI)/(III) composite

    International Nuclear Information System (INIS)

    Zboril, Radek; Andrle, Marek; Oplustil, Frantisek; Machala, Libor; Tucek, Jiri; Filip, Jan; Marusak, Zdenek; Sharma, Virender K.

    2012-01-01

    Highlights: ► Ferrate(VI) has been found to be highly efficient to decontaminate chemical warfare agents. ► Fast degradation of sulfur mustard, soman and compound VX by ferrate(VI). ► Nanoscale zero-valent iron particles are considerably less efficient in degradation of studied warfare agents compared to ferrate(VI). - Abstract: Nanoscale zero-valent iron (nZVI) particles and a composite containing a mixture of ferrate(VI) and ferrate(III) were prepared by thermal procedures. The phase compositions, valence states of iron, and particle sizes of iron-bearing compounds were determined by combination of X-ray powder diffraction, Mössbauer spectroscopy and scanning electron microscopy. The applicability of these environmentally friendly iron based materials in treatment of chemical warfare agents (CWAs) has been tested with three representative compounds, sulfur mustard (bis(2-chlorethyl) sulfide, HD), soman ((3,3′-imethylbutan-2-yl)-methylphosphonofluoridate, GD), and O-ethyl S-[2-(diisopropylamino)ethyl] methylphosphonothiolate (VX). Zero-valent iron, even in the nanodimensional state, had a sluggish reactivity with CWAs, which was also observed in low degrees of CWAs degradation. On the contrary, ferrate(VI)/(III) composite exhibited a high reactivity and complete degradations of CWAs were accomplished. Under the studied conditions, the estimated first-order rate constants (∼10 −2 s −1 ) with the ferrate(VI)/(III) composite were several orders of magnitude higher than those of spontaneous hydrolysis of CWAs (10 −8 –10 −6 s −1 ). The results demonstrated that the oxidative technology based on application of ferrate(VI) is very promising to decontaminate CWAs.

  10. Information Warfare-Worthy Jamming Attack Detection Mechanism for Wireless Sensor Networks Using a Fuzzy Inference System

    Directory of Open Access Journals (Sweden)

    Sudip Misra

    2010-04-01

    Full Text Available The proposed mechanism for jamming attack detection for wireless sensor networks is novel in three respects: firstly, it upgrades the jammer to include versatile military jammers; secondly, it graduates from the existing node-centric detection system to the network-centric system making it robust and economical at the nodes, and thirdly, it tackles the problem through fuzzy inference system, as the decision regarding intensity of jamming is seldom crisp. The system with its high robustness, ability to grade nodes with jamming indices, and its true-detection rate as high as 99.8%, is worthy of consideration for information warfare defense purposes.

  11. The Dragon and the Computer: Why Intellectual Property Theft is Compatible with Chinese Cyber-Warfare Doctrine

    OpenAIRE

    Shakarian, Paulo; Shakarian, Jana; Ruef, Andrew

    2013-01-01

    Along with the USA and Russia, China is often considered one of the leading cyber-powers in the world. In this excerpt, we explore how Chinese military thought, developed in the 1990s, influenced their cyber-operations in the early 2000s. In particular, we examine the ideas of "Unrestricted Warfare" and "Active Offense" and discuss how they can permit for the theft of intellectual property. We then specifically look at how the case study of Operation Aurora, a cyber-operation directed against...

  12. Modern warfare as a significant form of zoogeomorphic disturbance upon the landscape

    Science.gov (United States)

    Hupy, Joseph P.; Koehler, Thomas

    2012-07-01

    The damage exerted by warfare on the physical landscape is one, of many, anthropogenic impacts upon the environment. Bombturbation is a term that describes the impacts of explosive munitions upon the landscape. Bombturbation, like many other forms of zoogeomorphology, is a disruptive force, capable of moving large amounts of sediments, and denuding landscapes to the point where changes in micro and mesotopography have long-term implications. The long term implication of bombturbative actions depends on the type and duration of explosive device that rendered the disturbance, and the geographic context of the landscape disturbed; i.e. cultural and physical factors. Recovery from bombturbative activity, in the context of this research, is measured by vegetative regrowth and soil development in cratered disturbances. A comparison and contrast between the two battlefields of Verdun, France and Khe Sanh, Vietnam show that bombturbative actions have significantly altered the topography at each location, thus influencing surface runoff and processes of soil development. Principals of the Runge pedogenic model, or the energy of water moving through the soil profile, best explain how the varying climate and parent material at each location influence post disturbance soil development rates. Whereas the data collected at Verdun suggest that explosive munitions have put that landscape on diverging path of development, thus rendering it much different post-disturbance landscape, Khe Sanh displays much different recovery patterns. Preliminary research at Khe Sanh indicates that reforestation and soil development following disturbance are not so much influenced by bombturbative patterns as land use activities in the area of study.

  13. Application of the MASH v1.0 Code System to radiological warfare radiation threats

    International Nuclear Information System (INIS)

    Johnson, J.O.; Santoro, R.T.; Smith, M.S.

    1994-01-01

    Nuclear hardening capabilities of US and foreign ground force systems is a primary concern of the Department of Defense (DoD) and US Army. The Monte Carlo Adjoint Shielding Code System -- MASH v1.0 was developed at Oak Ridge National Laboratory (ORNL) to analyze these capabilities, i.e. the shielding effectiveness, for prompt radiation from a nuclear weapon detonation. Rapidly changing world events and the proliferation of nuclear weapons related technology have increased the kinds of nuclear threats to include intentionally dispersed radiation sources and fallout from tactical nuclear weapons used in the modern AirLand battlefield scenario. Consequently, a DoD area of increasing interest focuses on determining the shielding effectiveness of foreign and US armored vehicles to radiological warfare and fallout radiation threats. To demonstrate the applicability of MASH for analyzing dispersed radiation source problems, calculations have been completed for two distributed sources; a dispersed radiation environment simulated by a uniformly distributed 60 Co source, and a 235 U fission weapon fallout source. Fluence and dose assessments were performed for the free-field, the inside of a steel-walled two-meter box, in a phantom standing in the free-field, and in a phantom standing in the two-meter box. The results indicate substantial radiation protection factors for the 60 Co dispersed radiation source and the fallout source compared to the prompt radiation protection factors. The dose protection factors ranged from 40 to 95 for the two-meter box and from 55 to 123 for the mid-gut position of the phantom standing in the box. The results further indicate that a 60 Co source might be a good first order approximation for a tactical fission weapon fallout protection factor analysis

  14. Locus-specific microemulsion catalysts for sulfur mustard (HD) chemical warfare agent decontamination.

    Science.gov (United States)

    Fallis, Ian A; Griffiths, Peter C; Cosgrove, Terence; Dreiss, Cecile A; Govan, Norman; Heenan, Richard K; Holden, Ian; Jenkins, Robert L; Mitchell, Stephen J; Notman, Stuart; Platts, Jamie A; Riches, James; Tatchell, Thomas

    2009-07-22

    The rates of catalytic oxidative decontamination of the chemical warfare agent (CWA) sulfur mustard (HD, bis(2-chlororethyl) sulfide) and a range (chloroethyl) sulfide simulants of variable lipophilicity have been examined using a hydrogen peroxide-based microemulsion system. SANS (small-angle neutron scattering), SAXS (small-angle X-ray scattering), PGSE-NMR (pulsed-gradient spin-echo NMR), fluorescence quenching, and electrospray mass spectroscopy (ESI-MS) were implemented to examine the distribution of HD, its simulants, and their oxidation/hydrolysis products in a model oil-in-water microemulsion. These measurements not only present a means of interpreting decontamination rates but also a rationale for the design of oxidation catalysts for these toxic materials. Here we show that by localizing manganese-Schiff base catalysts at the oil droplet-water interface or within the droplet core, a range of (chloroethyl) sulfides, including HD, spanning some 7 orders of octanol-water partition coefficient (K(ow)), may be oxidized with equal efficacy using dilute (5 wt. % of aqueous phase) hydrogen peroxide as a noncorrosive, environmentally benign oxidant (e.g., t(1/2) (HD) approximately 18 s, (2-chloroethyl phenyl sulfide, C(6)H(5)SCH(2)CH(2)Cl) approximately 15 s, (thiodiglycol, S(CH(2)CH(2)OH)(2)) approximately 19 s {20 degrees C}). Our observations demonstrate that by programming catalyst lipophilicity to colocalize catalyst and substrate, the inherent compartmentalization of the microemulsion can be exploited to achieve enhanced rates of reaction or to exert control over product selectivity. A combination of SANS, ESI-MS and fluorescence quenching measurements indicate that the enhanced catalytic activity is due to the locus of the catalyst and not a result of partial hydrolysis of the substrate.

  15. Computed Tomography Imaging findings in Chemical Warfare Victims with pulmonary Complications

    Directory of Open Access Journals (Sweden)

    Zahra Salehinezhad

    2013-05-01

    Full Text Available Introduction: Data on imaging findings in pulmonary complications of chemical agents is scarce. The current study aimed to evaluate radiological findings of late onset pulmonary complications in chemical warfare victims (CWV and to guide pulmonologists in diagnosis of these subjects. Materials and Methods: Ninety- three male CWV were enrolled in this prospective study, 20-25 years (mean=23 after exposure. Demographic and clinical data were recorded. High resolution computed Tomography (HRCT of the lung was performed during inspiration and expiration and was double reported blindly by two radiologists. Final diagnosis was made according to HRCT findings. The HRCT findings, final diagnosis, and distribution of the abnormalities were compared between subjects whom had been exposed to more complex chemical agents used during the second half of the war and simpler agents during the first half. Results: The most frequent HRCT findings were air trapping (56.7% and mosaic attenuation (35.1%. The distribution of abnormalities was mostly local (79.4% and bilateral (73% especially in lower regions (61.3%. The diagnosed respiratory diseases included bronchiolitis obliterans (43%, chronic obstructive pulmonary disease (COPD (27.9%, asthma (23.6%, bronchiectasis (13.9% and interstitial lung disease (ILD (9.6%. Frequency of subjects involved in the second half of the period of war was more than the first period (P-value < 0.05 but the HRCT findings were similar. Conclusions: Bronchiolitis obliterans with picture of focal bilateral air trapping was the most common finding in CWV but asthma appeared to have become a new problem in these subjects.

  16. Advances in toxicology and medical treatment of chemical warfare nerve agents

    Directory of Open Access Journals (Sweden)

    Moshiri Mohammd

    2012-11-01

    Full Text Available Abstract Organophosphorous (OP Nerve agents (NAs are known as the deadliest chemical warfare agents. They are divided into two classes of G and V agents. Most of them are liquid at room temperature. NAs chemical structures and mechanisms of actions are similar to OP pesticides, but their toxicities are higher than these compounds. The main mechanism of action is irreversible inhibition of Acetyl Choline Esterase (AChE resulting in accumulation of toxic levels of acetylcholine (ACh at the synaptic junctions and thus induces muscarinic and nicotinic receptors stimulation. However, other mechanisms have recently been described. Central nervous system (CNS depression particularly on respiratory and vasomotor centers may induce respiratory failure and cardiac arrest. Intermediate syndrome after NAs exposure is less common than OP pesticides poisoning. There are four approaches to detect exposure to NAs in biological samples: (I AChE activity measurement, (II Determination of hydrolysis products in plasma and urine, (III Fluoride reactivation of phosphylated binding sites and (IV Mass spectrometric determination of cholinesterase adducts. The clinical manifestations are similar to OP pesticides poisoning, but with more severity and fatalities. The management should be started as soon as possible. The victims should immediately be removed from the field and treatment is commenced with auto-injector antidotes (atropine and oximes such as MARK I kit. A 0.5% hypochlorite solution as well as novel products like M291 Resin kit, G117H and Phosphotriesterase isolated from soil bacterias, are now available for decontamination of NAs. Atropine and oximes are the well known antidotes that should be infused as clinically indicated. However, some new adjuvant and additional treatment such as magnesium sulfate, sodium bicarbonate, gacyclidine, benactyzine, tezampanel, hemoperfusion, antioxidants and bioscavengers have recently been used for OP NAs poisoning.

  17. [Analytical and on-site detection methods for chemical warfare agents].

    Science.gov (United States)

    Seto, Yasuo

    2006-12-01

    Chemical warfare agents (CWAs) are fast acting and sometimes lethal, even at low levels, and can be classified into nerve gases, blister agents, choking agents, blood agents, vomit agents, tear gases, and incapacitating agents. As countermeasures against CWA terrorism, detection and identification are important. In crisis management, monitoring of CWAs in public places and security checks at territorial borders, big event venues, and executive facilities are performed for protection against terrorism. In consequence management, on-site detection by first responders and laboratory analysis after on-site sampling and transfer are performed for minimization of terrorism damage, leading to personal protection, initial investigation, and emergency lifesaving. In incident management, laboratory analysis is performed to provide evidence at court trials for the prevention of future crimes. Laboratory analysis consists of pretreatment of on-site and casualty samples and instrumental analysis using GC-MS. However, CWAs are easily degraded, and thus are difficult to detect. Instead, it is useful to detect their metabolites and degradation products using tert-butyldimethylsilyl derivatization GC-MS or direct LC-MS. Commercially available chemical detection equipment such as gas detection tubes and ion mobility spectrometers are used for on-site detection. We have evaluated the detection performance of such equipment and found that no equipment fulfills the required perfect performance of CWA detection sensitivity, accuracy, response time, return time, and operation. To overcome the drawbacks, we have adopted the monitoring tape method and counterflow introduction atmospheric pressure chemical ionization mass spectrometry and recommend the combination of commercial detection equipment and these new technologies for simultaneous, rapid detection of all CWAs.

  18. ANTARES: The first undersea neutrino telescope

    Science.gov (United States)

    Ageron, M.; Aguilar, J. A.; Al Samarai, I.; Albert, A.; Ameli, F.; André, M.; Anghinolfi, M.; Anton, G.; Anvar, S.; Ardid, M.; Arnaud, K.; Aslanides, E.; Assis Jesus, A. C.; Astraatmadja, T.; Aubert, J.-J.; Auer, R.; Barbarito, E.; Baret, B.; Basa, S.; Bazzotti, M.; Becherini, Y.; Beltramelli, J.; Bersani, A.; Bertin, V.; Beurthey, S.; Biagi, S.; Bigongiari, C.; Billault, M.; Blaes, R.; Bogazzi, C.; de Botton, N.; Bou-Cabo, M.; Boudahef, B.; Bouwhuis, M. C.; Brown, A. M.; Brunner, J.; Busto, J.; Caillat, L.; Calzas, A.; Camarena, F.; Capone, A.; Caponetto, L.; Cârloganu, C.; Carminati, G.; Carmona, E.; Carr, J.; Carton, P. H.; Cassano, B.; Castorina, E.; Cecchini, S.; Ceres, A.; Chaleil, Th.; Charvis, Ph.; Chauchot, P.; Chiarusi, T.; Circella, M.; Compère, C.; Coniglione, R.; Coppolani, X.; Cosquer, A.; Costantini, H.; Cottini, N.; Coyle, P.; Cuneo, S.; Curtil, C.; D'Amato, C.; Damy, G.; van Dantzig, R.; de Bonis, G.; Decock, G.; Decowski, M. P.; Dekeyser, I.; Delagnes, E.; Desages-Ardellier, F.; Deschamps, A.; Destelle, J.-J.; di Maria, F.; Dinkespiler, B.; Distefano, C.; Dominique, J.-L.; Donzaud, C.; Dornic, D.; Dorosti, Q.; Drogou, J.-F.; Drouhin, D.; Druillole, F.; Durand, D.; Durand, R.; Eberl, T.; Emanuele, U.; Engelen, J. J.; Ernenwein, J.-P.; Escoffier, S.; Falchini, E.; Favard, S.; Fehr, F.; Feinstein, F.; Ferri, M.; Ferry, S.; Fiorello, C.; Flaminio, V.; Folger, F.; Fritsch, U.; Fuda, J.-L.; Galatá, S.; Galeotti, S.; Gay, P.; Gensolen, F.; Giacomelli, G.; Gojak, C.; Gómez-González, J. P.; Goret, Ph.; Graf, K.; Guillard, G.; Halladjian, G.; Hallewell, G.; van Haren, H.; Hartmann, B.; Heijboer, A. J.; Heine, E.; Hello, Y.; Henry, S.; Hernández-Rey, J. J.; Herold, B.; Hößl, J.; Hogenbirk, J.; Hsu, C. C.; Hubbard, J. R.; Jaquet, M.; Jaspers, M.; de Jong, M.; Jourde, D.; Kadler, M.; Kalantar-Nayestanaki, N.; Kalekin, O.; Kappes, A.; Karg, T.; Karkar, S.; Karolak, M.; Katz, U.; Keller, P.; Kestener, P.; Kok, E.; Kok, H.; Kooijman, P.; Kopper, C.; Kouchner, A.; Kretschmer, W.; Kruijer, A.; Kuch, S.; Kulikovskiy, V.; Lachartre, D.; Lafoux, H.; Lagier, P.; Lahmann, R.; Lahonde-Hamdoun, C.; Lamare, P.; Lambard, G.; Languillat, J.-C.; Larosa, G.; Lavalle, J.; Le Guen, Y.; Le Provost, H.; Levansuu, A.; Lefèvre, D.; Legou, T.; Lelaizant, G.; Lévéque, C.; Lim, G.; Lo Presti, D.; Loehner, H.; Loucatos, S.; Louis, F.; Lucarelli, F.; Lyashuk, V.; Magnier, P.; Mangano, S.; Marcel, A.; Marcelin, M.; Margiotta, A.; Martinez-Mora, J. A.; Masullo, R.; Mazéas, F.; Mazure, A.; Meli, A.; Melissas, M.; Migneco, E.; Mongelli, M.; Montaruli, T.; Morganti, M.; Moscoso, L.; Motz, H.; Musumeci, M.; Naumann, C.; Naumann-Godo, M.; Neff, M.; Niess, V.; Nooren, G. J. L.; Oberski, J. E. J.; Olivetto, C.; Palanque-Delabrouille, N.; Palioselitis, D.; Papaleo, R.; Păvălaş, G. E.; Payet, K.; Payre, P.; Peek, H.; Petrovic, J.; Piattelli, P.; Picot-Clemente, N.; Picq, C.; Piret, Y.; Poinsignon, J.; Popa, V.; Pradier, T.; Presani, E.; Prono, G.; Racca, C.; Raia, G.; van Randwijk, J.; Real, D.; Reed, C.; Réthoré, F.; Rewiersma, P.; Riccobene, G.; Richardt, C.; Richter, R.; Ricol, J. S.; Rigaud, V.; Roca, V.; Roensch, K.; Rolin, J.-F.; Rostovtsev, A.; Rottura, A.; Roux, J.; Rujoiu, M.; Ruppi, M.; Russo, G. V.; Salesa, F.; Salomon, K.; Sapienza, P.; Schmitt, F.; Schöck, F.; Schuller, J.-P.; Schüssler, F.; Sciliberto, D.; Shanidze, R.; Shirokov, E.; Simeone, F.; Sottoriva, A.; Spies, A.; Spona, T.; Spurio, M.; Steijger, J. J. M.; Stolarczyk, Th.; Streeb, K.; Sulak, L.; Taiuti, M.; Tamburini, C.; Tao, C.; Tasca, L.; Terreni, G.; Tezier, D.; Toscano, S.; Urbano, F.; Valdy, P.; Vallage, B.; van Elewyck, V.; Vannoni, G.; Vecchi, M.; Venekamp, G.; Verlaat, B.; Vernin, P.; Virique, E.; de Vries, G.; van Wijk, R.; Wijnker, G.; Wobbe, G.; de Wolf, E.; Yakovenko, Y.; Yepes, H.; Zaborov, D.; Zaccone, H.; Zornoza, J. D.; Zúñiga, J.

    2011-11-01

    The ANTARES Neutrino Telescope was completed in May 2008 and is the first operational Neutrino Telescope in the Mediterranean Sea. The main purpose of the detector is to perform neutrino astronomy and the apparatus also offers facilities for marine and Earth sciences. This paper describes the design, the construction and the installation of the telescope in the deep sea, offshore from Toulon in France. An illustration of the detector performance is given.

  19. ANTARES : The first undersea neutrino telescope

    NARCIS (Netherlands)

    Ageron, M.; Aguilar, J. A.; Al Samarai, I.; Albert, A.; Ameli, F.; Andre, M.; Anghinolfi, M.; Anton, G.; Anvar, S.; Ardid, M.; Arnaud, K.; Aslanides, E.; Jesus, A. C. Assis; Astraatmadja, T.; Aubert, J. -J.; Auer, R.; Barbarito, E.; Baret, B.; Basa, S.; Bazzotti, M.; Becherini, Y.; Beltramelli, J.; Bersani, A.; Bertin, V.; Beurthey, S.; Biagi, S.; Bigongiari, C.; Billault, M.; Blaes, R.; Bogazzi, C.; de Botton, N.; Bou-Cabo, M.; Boudahef, B.; Bouwhuis, M. C.; Brown, A. M.; Brunner, J.; Busto, J.; Caillat, L.; Calzas, A.; Camarena, F.; Capone, A.; Caponetto, L.; Carloganu, C.; Carminati, G.; Carmona, E.; Carr, J.; Carton, P. H.; Cassano, B.; Castorina, E.; Cecchini, S.; Ceres, A.; Chaleil, Th; Charvis, Ph; Chauchot, P.; Chiarusi, T.; Circella, M.; Compere, C.; Coniglione, R.; Coppolani, X.; Cosquer, A.; Costantini, H.; Cottini, N.; Coyle, P.; Cuneo, S.; Curtil, C.; D'Amato, C.; Damy, G.; van Dantzig, R.; De Bonis, G.; Decock, G.; Decowski, M. P.; Dekeyser, I.; Delagnes, E.; Desages-Ardellier, F.; Deschamps, A.; Destelle, J. -J.; Di Maria, F.; Dinkespiler, B.; Distefano, C.; Dominique, J. -L.; Donzaud, C.; Dornic, D.; Dorosti, Q.; Drogou, J. -F.; Drouhin, D.; Druillole, F.; Durand, D.; Durand, R.; Eberl, T.; Emanuele, U.; Engelen, J. J.; Ernenwein, J. -P.; Escoffier, S.; Falchini, E.; Favard, S.; Fehr, F.; Feinstein, F.; Ferri, M.; Ferry, S.; Fiorello, C.; Flaminio, V.; Folger, F.; Fritsch, U.; Fuda, J. -L.; Galata, S.; Galeotti, S.; Gay, P.; Gensolen, F.; Giacomelli, G.; Gojak, C.; Gomez-Gonzalez, J. P.; Goret, Ph.; Graf, K.; Guillard, G.; Halladjian, G.; Hallewell, G.; van Haren, H.; Hartmann, B.; Heijboer, A. J.; Heine, E.; Hello, Y.; Henry, S.; Hernandez-Rey, J. J.; Herold, B.; Hoessl, J.; Hogenbirk, J.; Hsu, C. C.; Hubbard, J. R.; Jaquet, M.; Jaspers, M.; de Jong, M.; Jourde, D.; Kadler, M.; Kalantar-Nayestanaki, N.; Kalekin, O.; Kappes, A.; Karg, T.; Karkar, S.; Karolak, M.; Katz, U.; Keller, P.; Kestener, P.; Kok, E.; Kok, H.; Kooijman, P.; Kopper, C.; Kouchner, A.; Kretschmer, W.; Kruijer, A.; Kuch, S.; Kulikovskiy, V.; Lachartre, D.; Lafoux, H.; Lagier, P.; Lahmann, R.; Lahonde-Hamdoun, C.; Lamare, P.; Lambard, G.; Languillat, J-C; Larosa, G.; Lavalle, J.; Le Guen, Y.; Le Provost, H.; LeVanSuu, A.; Lefevre, D.; Legou, T.; Lelaizant, G.; Leveque, C.; Lim, G.; Lo Presti, D.; Loehner, H.; Loucatos, S.; Louis, F.; Lucarelli, F.; Lyashuk, V.; Magnier, P.; Mangano, S.; Marcel, A.; Marcelin, M.; Margiotta, A.; Martinez-Mora, J. A.; Masullo, R.; Mazeas, F.; Mazure, A.; Meli, A.; Melissas, M.; Migneco, E.; Mongelli, M.; Montaruli, T.; Morganti, M.; Moscoso, L.; Motz, H.; Musumeci, M.; Naumann, C.; Naumann-Godo, M.; Neff, M.; Niess, V.; Nooren, G. J. L.; Oberski, J. E. J.; Olivetto, C.; Palanque-Delabrouille, N.; Patioselitis, D.; Papaleo, R.; Pavalas, G. E.; Payet, K.; Payre, P.; Peek, H.; Petrovic, J.; Piattelli, P.; Picot-Clemente, N.; Picq, C.; Piret, Y.; Poinsignon, J.; Popa, V.; Pradier, T.; Presani, E.; Prono, G.; Racca, C.; Raia, G.; van Randwijk, J.; Real, D.; Reed, C.; Rethore, F.; Rewiersma, P.; Riccobene, G.; Richardt, C.; Richter, R.; Ricol, J. S.; Rigaud, V.; Roca, V.; Roensch, K.; Rolin, J. -F.; Rostovtsev, A.; Rottura, A.; Roux, J.; Rujoiu, M.; Ruppi, M.; Russo, G. V.; Salesa, F.; Salomon, K.; Sapienza, P.; Schmitt, F.; Schoeck, F.; Schuller, J. -P.; Schuessler, F.; Sciliberto, D.; Shanidze, R.; Shirokov, E.; Simeone, F.; Sottoriva, A.; Spies, A.; Spona, T.; Spurio, M.; Steijger, J. J. M.; Stolarczyk, Th; Streeb, K.; Sulak, L.; Taiuti, M.; Tamburini, C.; Tao, C.; Tasca, L.; Terreni, G.; Tezier, D.; Toscano, S.; Urbano, F.; Valdy, P.; Vallage, B.; Van Elewyck, V.; Vannoni, G.; Vecchi, M.; Venekamp, G.; Verlaat, B.; Vernin, P.; Virique, E.; de Vries, G.; Wijnker, G.; Wobbe, G.; de Wolf, E.; Yakovenko, Y.; Yepes, H.; Zaborov, D.; Zaccone, H.; Zornoza, J. D.; Zuniga, J.; van Wijk, R.

    2011-01-01

    The ANTARES Neutrino Telescope was completed in May 2008 and is the first operational Neutrino Telescope in the Mediterranean Sea. The main purpose of the detector is to perform neutrino astronomy and the apparatus also offers facilities for marine and Earth sciences. This paper describes the

  20. ACUMEN 2012: Atlantic Canyons Undersea Mapping Expeditions

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — Between February and August 2012, a team of NOAA and external partners will conduct a mapping ‘blitz’ focused on deepwater canyons off the northeastern...

  1. Human and Computer Control of Undersea Teleoperators

    Science.gov (United States)

    1978-07-15

    transferring lead bricks in a nuclear hot cell , Vertut (1976) has shown that the time to move one block (cycle time) depends on the type of hand grip used...lations (which can be graphed as planes in hyperspace , lines if only two trade- off variables are included such as are shown in Figure 8.2 ). For each

  2. Field training

    International Nuclear Information System (INIS)

    Mumford, G.E.; Hadaway, E.H.

    1991-01-01

    Individualized, personal training can be used to increase an employee's awareness of the HSE program. Such training can stimulate personal commitment and provide personal skills that can be utilized for the benefit of the overall HSE effort. But, providing such training within our industry can be a difficult task due to the scheduling, travel arrangements, and cost associated with bringing employees from isolated, remote locations to centrally located training facilities. One method of overcoming these obstacles involves the use of field instructors to provide the training at the many, and varied number of individuals can be reached with minimal disruption to their work scheduling or to their time off. In fact, this type of on-site training is already used by some oil companies and drilling contractors with encouraging results. This paper describes one drilling contractor's experiences with such a training program. The results after eight years how that this program not only can provide and efficient, economical means of employee training, but also can have a direct application to employee motivation regarding a company's HSE effort

  3. Training Bibliography.

    Science.gov (United States)

    Vocational Training Council, Wellington (New Zealand).

    This bibliography is intended primarily for managers and trainers but will also be of interest to employers, unions, and all parties interested in improving the competency of trade and nonprofessional workers through improved training. Materials represent the topics of needs assessment, identification of training objectives, monitoring and…

  4. Development and Application of Acute Exposure Guideline Levels (AEGLs) for Chemical Warfare Nerve and Sulfur Mustard Agents.

    Energy Technology Data Exchange (ETDEWEB)

    Watson, Annetta Paule [ORNL; Opresko, Dennis M [ORNL; Young, Robert A [ORNL; Hauschild, Veronique [U.S. Environmental Protection Agency

    2006-01-01

    Acute exposure guideline levels (AEGLs) have been developed for the chemical warfare agents GB, GA, GD, GF, VX, and sulfur mustard. These AEGLs were approved by the National Advisory Committee for Acute Exposure Guideline Levels for Hazardous Substances after Federal Register publication and comment, and judged as scientifically valid by the National Research Council Committee on Toxicology Subcommittee on AEGLs. AEGLs represent general public exposure limits for durations ranging from 10 min to 8 h, and for three levels of severity (AEGL-1, AEGL-2, AEGL-3). Mild effects are possible at concentrations greater than AEGL-1, while life-threatening effects are expected at concentrations greater than AEGL-3. AEGLs can be applied to various civilian and national defense purposes, including evacuation and shelter-in-place protocols, reentry levels, protective clothing specifications, and analytical monitoring requirements. This report documents development and derivation of AEGL values for six key chemical warfare agents, and makes recommendations for their application to various potential exposure scenarios.

  5. Operator training

    International Nuclear Information System (INIS)

    Wirstad, J.

    1983-12-01

    The traditional operator job is changing, which among other things has generated a need for better job training. Surprisingly increased process automation has lead to increased operator qualifications, i.e. basic job training but also up-date and rehearsal training within certain fixed intervals. There are several, similar models for instructional system development available in the literature. One model which is of special interest integrates Operator Training development and Man-Machine Interfaces development. The extent to which Systematic Operator Training has been implemented varies with branches and companies. The nuclear power branch is given as an example in the report. This branch probably represents something better than the average among the process industries.(author)

  6. ENGLISH TRAINING

    CERN Multimedia

    2003-01-01

    If you wish to participate in one of the following courses, please discuss with your supervisor and apply electronically directly from the course description pages that can be found on the Web at: http://www.cern.ch/Training/ or fill in an "application for training" form available from your Divisional Secretariat or from your DTO (Divisional Training Officer). Applications will be accepted in the order of their receipt. LANGUAGE TRAINING Françoise Benz tel. 73127 language.training@cern.ch PLACES AVAILABLE Writing Professional Documents in English This course is designed for people with a good level of spoken English who need to improve their professional writing (administrative, scientific, technical). Duration: 20 hours (2 hours a week) Price: 440 CHF (for 8 students) Date and timetable will be fixed when there are sufficient participants enrolled. Oral Expression This course is intended for people with a good knowledge of English who want to practise and maintain their sp...

  7. Training Standardization

    International Nuclear Information System (INIS)

    Agnihotri, Newal

    2003-01-01

    The article describes the benefits of and required process and recommendations for implementing the standardization of training in the nuclear power industry in the United States and abroad. Current Information and Communication Technologies (ICT) enable training standardization in the nuclear power industry. The delivery of training through the Internet, Intranet and video over IP will facilitate this standardization and bring multiple benefits to the nuclear power industry worldwide. As the amount of available qualified and experienced professionals decreases because of retirements and fewer nuclear engineering institutions, standardized training will help increase the number of available professionals in the industry. Technology will make it possible to use the experience of retired professionals who may be interested in working part-time from a remote location. Well-planned standardized training will prevent a fragmented approach among utilities, and it will save the industry considerable resources in the long run. It will also ensure cost-effective and safe nuclear power plant operation

  8. Improved Hybrid Opponent System for Professional Military Training

    Directory of Open Access Journals (Sweden)

    Michael Pelosi

    2017-10-01

    Full Text Available Described herein is a general-purpose software engineering architecture for autonomous, computer controlled opponent implementation in modern maneuver warfare simulation and training. The implementation has been developed, refined, and tested in the user crucible for several years. The approach represents a hybrid application of various well-known AI techniques, including domain modeling, agent modeling, and object-oriented programming. Inspired by computer chess approaches, the methodology combines this theoretical foundation with a hybrid and scalable portfolio of additional techniques. The result remains simple enough to be maintainable, comprehensible for the code writers as well as the end-users, and robust enough to handle a wide spectrum of possible mission scenarios and circumstances without modification.

  9. A Comparison of QSAR Based Thermo and Water Solvation Property Prediction Tools and Experimental Data for Selected Traditional Chemical Warfare Agents and Simulants

    Science.gov (United States)

    2014-07-01

    AND EXPERIMENTAL DATA FOR SELECTED TRADITIONAL CHEMICAL WARFARE AGENTS AND SIMULANTS ECBC-TR-1259 Jerry B. Cabalo RESEARCH AND TECHNOLOGY...PROGRAM ELEMENT NUMBER 6. AUTHOR(S) Cabalo , Jerry B. (ECBC); and Knox, Craig K. (Leidos) 5d. PROJECT NUMBER 5e. TASK NUMBER 5f. WORK UNIT

  10. Development of an automated on-line pepsin digestion-liquid chromatography-tandem mass spectrometry configuration for the rapid analysis of protein adducts of chemical warfare agents

    NARCIS (Netherlands)

    Carol-Visser, J.; van der Schans, M.; Fidder, A.; Huist, A.G.; van Baar, B.L.M.; Irth, H.; Noort, D.

    2008-01-01

    Rapid monitoring and retrospective verification are key issues in protection against and non-proliferation of chemical warfare agents (CWA). Such monitoring and verification are adequately accomplished by the analysis of persistent protein adducts of these agents. Liquid chromatography-mass

  11. System architecture and operational analysis of medium displacement unmanned surface vehicle sea hunter as a surface warfare component of distributed lethality

    Science.gov (United States)

    2017-06-01

    NAVAL POSTGRADUATE SCHOOL MONTEREY, CALIFORNIA THESIS Approved for public release. Distribution is unlimited. SYSTEM ARCHITECTURE ...TITLE AND SUBTITLE SYSTEM ARCHITECTURE AND OPERATIONAL ANALYSIS OF MEDIUM DISPLACEMENT UNMANNED SURFACE VEHICLE SEA HUNTER AS A SURFACE WARFARE...traceability, requirements and capabilities while determining the architecture framework in accordance with the Department of Defense Architectural

  12. LANGUAGE TRAINING

    CERN Multimedia

    2004-01-01

    If you wish to participate in one of the following courses, please discuss with your supervisor and apply electronically directly from the course description pages that can be found on the Web at: http://www.cern.ch/Training/ or fill in an "application for training" form available from your Divisional Secretariat or from your DTO (Divisional Training Officer). Applications will be accepted in the order of their receipt. LANGUAGE TRAINING Françoise Benz tel. 73127 language.training@cern.ch FRENCH TRAINING General and Professional French Courses The next session will take place from 26 January to 02 April 2004. These courses are open to all persons working on the Cern site, and to their spouses. For registration and further information on the courses, please consult our Web pages: http://cern.ch/Training or contact Mrs. Benz: Tel. 73127. Writing Professional Documents in French The next session will take place from 26 January to 02 April 2004. This course is designed for people wi...

  13. LANGUAGE TRAINING

    CERN Multimedia

    2004-01-01

    If you wish to participate in one of the following courses, please discuss with your supervisor and apply electronically directly from the course description pages that can be found on the Web at: http://www.cern.ch/Training/ or fill in an "application for training" form available from your Divisional Secretariat or from your DTO (Divisional Training Officer). Applications will be accepted in the order of their receipt. LANGUAGE TRAINING Françoise Benz tel. 73127 language.training@cern.ch FRENCH TRAINING General and Professional French Courses The next session will take place from 26 January to 02 April 2004. These courses are open to all persons working on the Cern site, and to their spouses. For registration and further information on the courses, please consult our Web pages: http://cern.ch/Training or contact Mrs. Benz : Tel. 73127. Writing Professional Documents in French The next session will take place from 26 January to 02 April 2004. This course is designed for peop...

  14. Training Attestations

    CERN Multimedia

    HR Department

    2004-01-01

    In the past, paper Training Attestations were printed during the first quarter of a New Year for Staff Members having followed courses and seminars the previous year in the context of CERN's official Training Programmes.  The attestations were sent to Divisional Training Officers (DTO's) for distribution to all Staff Members concerned within their Division. In practise many Staff Members did not find this paper useful, however some expressed a wish to be able to have access to a self-service facility in case of need. This change was discussed by the Joint Training Board (JTB) and with the DTO's during 2003 and was supported. As a consequence, following a collaboration between HR-PMD and IT-AIS, from 2004 onwards paper Training Attestations will no longer be printed and distributed as before. Those requiring a list of training followed in the past can now obtain their attestation directly from the Human Resources Toolkit (HRT) application for all training followed since 1997. https://hrt.cern...

  15. Laser photoacoustic spectroscopy helps fight terrorism: High sensitivity detection of chemical Warfare Agent and explosives

    Science.gov (United States)

    Patel, C. K. N.

    2008-01-01

    Tunable laser photoacoustic spectroscopy is maturing rapidly in its applications to real world problems. One of the burning problems of the current turbulent times is the threat of terrorist acts against civilian population. This threat appears in two distinct forms. The first is the potential release of chemical warfare agents (CWA), such as the nerve agents, in a crowded environment. An example of this is the release of Sarin by Aum Shinrikyo sect in a crowded Tokyo subway in 1995. An example of the second terrorist threat is the ever-present possible suicide bomber in crowded environment such as airports, markets and large buildings. Minimizing the impact of both of these threats requires early detection of the presence of the CWAs and explosives. Photoacoustic spectroscopy is an exquisitely sensitive technique for the detection of trace gaseous species, a property that Pranalytica has extensively exploited in its CO2 laser based commercial instrumentation for the sub-ppb level detection of a number of industrially important gases including ammonia, ethylene, acrolein, sulfur hexafluoride, phosphine, arsine, boron trichloride and boron trifluoride. In this presentation, I will focus, however, on our recent use of broadly tunable single frequency high power room temperature quantum cascade lasers (QCL) for the detection of the CWAs and explosives. Using external grating cavity geometry, we have developed room temperature QCLs that produce continuously tunable single frequency CW power output in excess of 300 mW at wavelengths covering 5 μm to 12 μm. I will present data that show a CWA detection capability at ppb levels with false alarm rates below 1:108. I will also show the capability of detecting a variety of explosives at a ppb level, again with very low false alarm rates. Among the explosives, we have demonstrated the capability of detecting homemade explosives such as triacetone triperoxide and its liquid precursor, acetone which is a common household

  16. Impact of psychological problems in chemical warfare survivors with severe ophthalmologic complication, a cross sectional study

    Directory of Open Access Journals (Sweden)

    Ghaedi Gholamhosein

    2012-04-01

    Full Text Available Abstract Background Sulfur mustard (SM has been used as a chemical warfare agent since the early twentieth century. Despite the large number of studies that have investigated SM induced ocular injuries, few of those studies have also focused on the psychological health status of victims. This study has evaluated the most prominent influences on the psychological health status of patients with severe SM induced ocular injuries. Methods This descriptive study was conducted on 149 Iranian war veterans with severe SM induced eye injuries. The psychological health status of all patients was assessed using the Iranian standardized Symptom Check List 90-Revised (SCL90-R questionnaire. The results of patients' Global Severity Index (GSI were compared with the optimal cut-off point of 0.4 that has previously been calculated for GSI in Iranian community. The Mann-Whitney U test, T tests and effect sizes (using Cohen's d were employed as statistical methods. Data were analyzed using SPSS software. Results The mean age of patients was 44.86 (SD = 8.7 and mean duration of disease was 21.58 (SD = 1.20 years. Rate of exposure was once in 99 (66.4% cases. The mean GSI (1.46 of the study group was higher compared to standardized cut off point (0.4 of the Iranian community. The results of this study showed that the mean of total GSI score was higher in participants with lower educational levels (effect size = 0.507, unemployment (effect size = 0.464 and having more than 3 children (effect size = 0.62. Among the participants, 87 (58.4% cases had a positive psychological history for hospitalization or receiving outpatient cares previously and 62 (41.6% cases had a negative psychological history. In addition, the mean of GSI in participants with negative psychological history was lower than those with positive psychological history (Mean Change Difference = -0.621 with SD = 0.120. There was a significant difference between positive and negative psychological history

  17. Interleukin-6 and airflow limitation in chemical warfare patients with chronic obstructive pulmonary disease

    Directory of Open Access Journals (Sweden)

    Davood Attaran

    2010-09-01

    disease, interleukin-6, inflammation, chemical warfare

  18. Anticonvulsant efficacy of antihistamine cyproheptadine in rats exposed to the chemical warfare nerve agent soman.

    Science.gov (United States)

    Winkler, Jennifer L; Skovira, Jacob W; Kan, Robert K

    2017-01-01

    Organophosphate compounds, such as soman and sarin, are highly toxic chemical warfare nerve agents that cause a build-up of acetylcholine in synapses and neuromuscular junctions. Current therapies aim to prevent seizures and protect against brain injury following exposure. The present study was designed to evaluate the effectiveness of the antihistamine cyproheptadine in improving survival and controlling seizures in rats exposed to soman. Rats were pretreated with the oxime reactivator HI-6 (125mg/kg, ip) 30min prior to soman exposure (225μg/kg, sc) and then treated with atropine methylnitrate (AMN, 2.0mg/kg, im) 1min after soman. Cyproheptadine (10, 13, 16 or 20mg/kg, ip) was given at one of three time points: 1min after soman intoxication, at the onset of soman-induced seizures or 5min after seizure onset. Control animals were exposed to soman and given an equivalent volume of sterile water instead of cyproheptadine. The incidence of seizures, mortality, neuron counts, neuropathology and apoptosis in specific regions of the brain were evaluated. In animals given HI-6 and AMN the incidence of soman-induced seizure and mortality rate within the first 24h were 100%. When cyproheptadine was given at a dose of 13 or 20mg/kg 1min after soman exposure, the incidence of seizures was reduced from 100% to 13% and 30%, respectively. In addition, cyproheptadine given at 1min after soman exposure increased the survival rate to 100% regardless of dose. When cyproheptadine was administered at seizure onset, seizures were terminated in 100% of the animals at doses above 10mg/kg. The survival rate with cyproheptadine treatment at the onset of seizure was ≥83%. Seizures terminated in ≥75% of the animals that received cyproheptadine 5min after soman-induced seizure onset. When given at 5min after seizure onset the survival rate was 100% at all tested doses of cyproheptadine. The neuropathology scores and the number of TUNEL positive cells in the brain regions examined

  19. Anthropogenic landforms of warfare origin and their ecological significance: the Verdun Forest, NE France

    Science.gov (United States)

    De Matos Machado, Rémi; Amat, Jean-Paul; Arnaud-Fassetta, Gilles; Bétard, François; Bilodeau, Clélia; Jacquemot, Stéphanie; Toumazet, Jean-Pierre

    2017-04-01

    By its unprecedented industrial character, the First World War marked landscapes like no other conflict in the world. As a result of artillery bombardment and building facilities, the relief suffered major disturbances giving rise to millions anthropogenic landforms of warfare origin on the Western front: shell craters, trenches, shelters and gun sites. This landscape made of bumps and holes that dominated the lands of West Flanders and North-eastern France during the four years of war took chaotic aspects on the great battle sites. In some areas, substrate crushing by repeated bombings resulted in a field lowering of several metres. Although these geomorphological legacies of war are still present on these scarred lands, their effects on local environment and on present-day biodiversity patterns are not fully understood. On the battlefield of Verdun, where a huge number and range of conflict-induced landforms may be observed, special attention is being paid to the ecological significance of these anthropogenic landforms in a current landscape matrix dominated by forest. In 2013, an airborne LiDAR mission conducted over the battlefield has brought to light the relief inherited from the fighting that was until now concealed by the Verdun forest planted in the 1930's. Through a digital terrain model (DTM) with centimetre level accuracy, it is now possible to observe the smallest traces of the fighting. A first programmatic mapping work allowed to inventory and to locate these reliefs on the whole 10,000 hectares covered by the DTM. Also, the calculation of their geometry enabled us to quantify the erosion rate due to the military activities on the battlefield. On the basis of these morphometric measurements, a typology was developed to better appreciate the morphological diversity of conflict-induced landforms. The results show that these anthropogenic landforms are generally hollow. Because of this particular morphology, the conflict-induced landforms provide

  20. Driverless Train

    OpenAIRE

    Törnqvist, Julia; Berglund, Emma

    2017-01-01

    As automation increases in train services, this project resulted in making a driver-less train. The main purpose was to see how security can be increased. By using sensors, today’s technologies and rebuild the stations with walls on the platforms, the safety can increase for the better. This project designs a railway system consisting of a train, boom barriers and a station. The mechanical parts were made from scratch to get the system to work beneficially. The use of Arduino as a micro contro...

  1. Caffeine effects on marksmanship during high-stress military training with 72 hour sleep deprivation.

    Science.gov (United States)

    Tharion, William J; Shukitt-Hale, Barbara; Lieberman, Harris R

    2003-04-01

    Navy SEALs (sea, air, land) are elite special warfare units that conduct unconventional warfare primarily in marine environments. Marksmanship accuracy and sighting time were quantified with 62 male trainees during Navy SEAL Hell Week, which involves the combined stress of sleep loss, operational combat scenarios, and cold-wet environmental conditions. Caffeine was administered to minimize deficits due to sleep deprivation. Volunteers dry-fired a disabled rifle equipped with a laser-based marksmanship simulator system to measure shooting speed and accuracy. The target was a 2.3-cm diameter circle at a distance of 5 m, simulating a 46 cm target at a distance of 50 m. Marksmanship was assessed prior to training, and at 73 and 80 h into Hell Week. Volunteers were randomly assigned to 1 of 4 treatments: 100, 200, or 300 mg of caffeine or a placebo. Dosing occurred 72 h after training commenced. The combined effects of almost 73 h of total sleep deprivation and operational and environmental stress degraded all marksmanship accuracy measures (p sleep deprivation (p sleep deprived individuals after taking 200 or 300 mg of caffeine compared with placebo or 100 mg of caffeine. No differences in accuracy measures between caffeine treatment groups were evident at any test period. During periods of sleep deprivation combined with other stressors, the use of 200 or 300 mg of caffeine enabled SEAL trainees to sight the target and pull the trigger faster without compromising shooting accuracy.

  2. Evaluation of Molecular Markers and Analytical Methods Documenting the Occurrence of Mustard Gas and Arsenical Warfare Agents in Soil.

    Science.gov (United States)

    Sassolini, Alessandro; Brinchi, Giampaolo; Di Gennaro, Antonio; Dionisi, Simone; Dominici, Carola; Fantozzi, Luca; Onofri, Giorgio; Piazza, Rosario; Guidotti, Maurizio

    2016-09-01

    The chemicals warfare agents (CWAs) are an extremely toxic class of molecules widely produced in many industrialized countries for decades, these compounds frequently contained arsenic. The plants where the CWAs have been produced or the plants where they have been demilitarized after the Second World War with unacceptable techniques can represent a serious environmental problem. CWAs standards are difficult to find on market so in present work an environmental assessment method based on markers has been proposed. Triphenylarsine, phenylarsine oxide and thiodiglycol have been selected as markers. Three reliable analytical methods based on gaschromatography and mass detection have been proposed and tested for quantitative analysis of markers. Methods performance have been evaluated testing uncertainty, linearity, recovery and detection limits and also comparing detection limits with exposure limits of reference CWAs. Proposed assessment methods have been applied to a case study of a former industrial plant sited in an area characterized by a high background of mineral arsenic.

  3. NATO Advanced Research Workshop on Fluorescence and other Optical Properties of Biological Particles for Biological Warfare Agent Sensors

    CERN Document Server

    Hoekstra, Alfons; Videen, Gorden; Optics of Biological Particles

    2007-01-01

    This book covers the optics of single biological particles, both theory and experiment, with emphasis on Elastic Light Scattering and Fluorescence. It deals with the optics of bacteria (bio-aerosols), marine particles (selected phytoplankton communities) and red and white blood cells. Moreover, there are dedicated chapters on a general theory for scattering by a cell, and modelling and simulation of scattering by inhomogeneous biological cells. Finally, one chapter is dedicated to astro-biological signatures, discussing the possibilities for detecting non-terrestrial biological material. The volume has up-to-date discussions on new experimental and numerical techniques, and many examples of applications of these techniques in real-life systems, as used to detect and characterize e.g. biological warfare agents or human blood cells.

  4. Biological warfare warriors, secrecy and pure science in the Cold War: how to understand dialogue and the classifications of science.

    Science.gov (United States)

    Bud, Robert

    2014-01-01

    This paper uses a case study from the Cold War to reflect on the meaning at the time of the term 'Pure Science'. In 1961, four senior scientists from Britain's biological warfare centre at Porton Down visited Moscow both attending an International Congress and visiting Russian microbiological and biochemical laboratories. The reports of the British scientists in talking about a limited range of topics encountered in the Soviet Union expressed qualities of openness, sociologists of the time associated with pure science. The paper reflects on the discourses of "Pure Science", secrecy and security in the Cold War. Using Bakhtin's approach, I suggest the cordial communication between scientists from opposing sides can be seen in terms of the performance, or speaking, of one language among several at their disposal. Pure science was the language they were allowed to share outside their institutions, and indeed political blocs.

  5. The Effectiveness of Mindfulness Training in Improving the Quality of Life of the War Victims with Post Traumatic stress disorder (PTSD.

    Directory of Open Access Journals (Sweden)

    Esfandiar Azad Marzabadi

    2014-12-01

    Full Text Available Those veterans suffering from Post Traumatic stress disorder (PTSD experience a low quality of life. This study investigated how the quality of life of warfare victims with PTSD was influenced by mindfulness training (MT.This study followed a randomized controlled trial and included a pre-test, post-test and delayed post- and was conducted in 2012 at Shahid Rajaee Hospital in Isfahan, Iran. The participants were 28 randomly selected male warfare victims with PTSD who were assigned into control and experimental groups. Data were collected using World Health Organization Quality of Life Questionnaire-26 (WHOQOL-26. Repeated measures ANOVA was run to analyze the data.The findings of this study indicated a statistically significant decrease in the mean score of the experimental group in both post-test and delayed post-test. Also, in comparison with the control group, there was a statistically significant increase in the mean scores of the physical and psychiatric health, social relationship and social setting and condition of the experimental group in the post-test and delayed post-test (p< 0.01.The findings of this study lend support to the effectiveness of MT in improving the quality of life of those veterans with PTSD and have significant implications for drawing our attention to mindfulness-based treatments as a way to enhance the quality of life of warfare victims suffering from PTSD.

  6. The Effectiveness of Mindfulness Training in Improving the Quality of Life of the War Victims with Post Traumatic stress disorder (PTSD).

    Science.gov (United States)

    Azad Marzabadi, Esfandiar; Hashemi Zadeh, Seyyed Morteza

    2014-10-01

    Those veterans suffering from Post Traumatic stress disorder (PTSD) experience a low quality of life. This study investigated how the quality of life of warfare victims with PTSD was influenced by mindfulness training (MT). This study followed a randomized controlled trial and included a pre-test, post-test and delayed post- and was conducted in 2012 at Shahid Rajaee Hospital in Isfahan, Iran. The participants were 28 randomly selected male warfare victims with PTSD who were assigned into control and experimental groups. Data were collected using World Health Organization Quality of Life Questionnaire-26 (WHOQOL-26). Repeated measures ANOVA was run to analyze the data. The findings of this study indicated a statistically significant decrease in the mean score of the experimental group in both post-test and delayed post-test. Also, in comparison with the control group, there was a statistically significant increase in the mean scores of the physical and psychiatric health, social relationship and social setting and condition of the experimental group in the post-test and delayed post-test (psupport to the effectiveness of MT in improving the quality of life of those veterans with PTSD and have significant implications for drawing our attention to mindfulness-based treatments as a way to enhance the quality of life of warfare victims suffering from PTSD.

  7. “John A. MacMillan: Pioneer Missionary of Spiritual Warfare and the Believer’s Authority”

    Directory of Open Access Journals (Sweden)

    Paul King

    2016-01-01

    Full Text Available Many people associate teaching on spiritual warfare and the authority of the believer from charismatic or Word of Faith sources, especially like Kenneth Hagin. However, the original source of teaching on this doctrine comes from classic holiness roots in the Higher Life and Keswick movements, especially from John A. MacMillan, a missionary, writer, editor, and professor with the Christian and Missionary Alliance. In 1932 he wrote a series of articles entitled “The Authority of the Believer,” eventually published in book form, distributed widely and republished in other periodicals. MacMillan had a remarkable and extensive ministry in the exercise of the authority of the believer and spiritual warfare spanning more than thirty years. His experiences include divine protection, healing, divine intervention, power encounters with demonic forces, and teaching on territorial spirits and generational bondages. Numerous evangelical and charismatic leaders have quoted or referred to his teachings and principles.Banyak orang mengasosiasikan pengajaran peperangan rohani dan otoritas orang percaya dari karismatik atau sumber Firman Iman, terutama seperti Kenneth Hagin. Namun, sumber asli dari pengajaran doktrin ini berasal dari akar kekudusan klasik dalam gerakan Higher Life dan Keswick, terutama dari John A. MacMillan, seorang misionaris, penulis, editor, dan profesor dengan Christian and Missionary Alliance. Pada tahun 1932 ia menulis serangkaian artikel yang berjudul “Otoritas orang percaya,” akhirnya diterbitkan dalam bentuk buku, didistribusikan secara luas dan diterbitkan di majalah lainnya. MacMillan memiliki pelayanan yang luar biasa dan luas dalam pelaksanaan otoritas orang percaya dan peperangan rohani yang lebih dari tiga puluh tahun. Pengalamannya termasuk perlindungan ilahi, penyembuhan, campur tangan ilahi, pertemuan kuasa dengan kekuatan jahat, dan pengajaran tentang roh teritorial dan perbudakan generasi. Banyak pemimpin injili dan

  8. Training Relations

    DEFF Research Database (Denmark)

    Smith, Aja

    This thesis explores the phenomenon of horse-assisted leadership training and the manners, in which the training relations between horses, managers and facilitators were entangled with perceptions of, what “proper sociality” entailed and felt like in contemporary Danish society. The study...... managers, horses and facilitators were training to strike between self-centredness and other-orientation, self-interests and fellow-feelings, was related to this marriage. The thesis contributes to the conceptualisation of the relationship between the self and sociality, particularly within consumer...... culture research interested in destabilising the primacy of the agentive powers of the human consumer. It does so by broadening the notion of the social to include animals – and by emphasising the sensorial, bodily and affective dimensions of the relations between self and sociality. A related...

  9. French Training

    CERN Multimedia

    Françoise Benz

    2003-01-01

    General and Professional French Courses The next session will take place: from 13 October to 19 December 2003. These courses are open to all persons working on the CERN site, and to their spouses. For registration and further information on the courses, please consult our Web pages or contact Mrs. Fontbonne: Tel. 72844. Writing Professional Documents in French This course is designed for people with a good level of spoken French. Duration: 30 hours Price: 660 CHF (for 8 students) For further information and registration, please consult our Web pages or contact Mrs. Fontbonne: Tel. 72844. Language Training Françoise Benz Tel.73127 language.training@cern.ch

  10. Supervisor training

    DEFF Research Database (Denmark)

    Pedersen, Inge Nygaard

    2015-01-01

    on the experience of an integrated supervisor training programme offered in Aalborg, Denmark in 2009/2010. In this programme general issues of professional supervision and the application of artistic media as a core element in the supervisory process were Integrated. It is the hope of the author that this article...

  11. Interval Training.

    Science.gov (United States)

    President's Council on Physical Fitness and Sports, Washington, DC.

    Regardless of the type of physical activity used, interval training is simply repeated periods of physical stress interspersed with recovery periods during which activity of a reduced intensity is performed. During the recovery periods, the individual usually keeps moving and does not completely recover before the next exercise interval (e.g.,…

  12. Language training

    CERN Multimedia

    Françoise Benz

    2006-01-01

    If you wish to participate in one of the following courses, please tell to your supervisor and apply electronically from the course description pages that can be found on the Web at: http://www.cern.ch/Training/ or fill in an 'application for training'form available from your Departmental Secretariat or from your DTO (Departmental Training Officer). Applications will be accepted in the order in which they are received. General and Professional English Courses The next session will take place from beginning of October 2006 to beginning of February 2007 (3 weeks break at Christmas).These courses are open to all persons working on the CERN site and to their spouses. For registration and further information on the courses, please consult our Web pages: http://cern.ch/Training or contact Tessa Osborne, tel.16 23 40. Oral Expression The next session will take place from beginning of October 2006 to beginning of February 2007 (3 weeks break at Christmas).This course is intended for people with a goo...

  13. Language training

    CERN Document Server

    2006-01-01

    If you wish to participate in one of the following courses, please tell to your supervisor and apply electronically from the course description pages that can be found on the Web at: http://www.cern.ch/Training/ or fill in an 'application for training' form available from your Departmental Secretariat or from your DTO (Departmental Training Officer). Applications will be accepted in the order in which they are received. General and Professional English Courses The next session will take place from beginning of October 2006 to beginning of February 2007 (3 weeks break at Christmas).These courses are open to all persons working on the CERN site and to their spouses. For registration and further information on the courses, please consult our Web pages: http://cern.ch/Training or contact Tessa Osborne, tel.16 23 40. Oral Expression The next session will take place from beginning of October 2006 to beginning of February 2007 (3 weeks break at Christmas).This course is intended for people with a good knowl...

  14. Language Training

    CERN Multimedia

    Françoise Benz

    2005-01-01

    If you wish to participate in one of the following courses, please tell to your supervisor and apply electronically from the course description pages that can be found on the Web at: http://www.cern.ch/Training/ or fill in an 'application for training' form available from your Departmental Secretariat or from your DTO (Departmental Training Officer). Applications will be accepted in the order in which they are received. General and Professional English Courses The next session will take place: from end of September 2005 to middle of February 2006 (2/ 3 weeks break at Christmas). These courses are open to all persons working on the CERN site, and to their spouses. For registration and further information on the courses, please consult our Web pages: http://cern.ch/Training or contact Mr. Liptow: tel. 72957. Oral Expression The next session will take place from end of September to December 2005. This course is intended for people with a good knowledge of English who want to practise and maintain the...

  15. Technical Training: Technical Training Seminar

    CERN Multimedia

    2004-01-01

    TECHNICAL TRAINING Monique Duval tel. 74924 technical.training@cern.ch Monday 9 February 2004 From 10:00 to 12:00 - IT Auditorium - bldg. 31, 3rd floor ANSOFT High-Frequency Seminar David Prestaux, Application Engineer, ANSOFT F-78535 BUC, France This Technical Training seminar will present two Ansoft application products: Ansoft HFSS and Ansoft Designer. Ansoft HFSS makes use of the Finite Element Method (FEM) to calculate field solutions from first principles. It can accurately predict all high-frequency behaviours such as dispersion, mode conversion, and losses due to materials and radiation. Ansoft Designer is a suite of design tools to fully integrate high-frequency, physics-based electromagnetic simulations into a seamless system-level simulation environment. Ansoft Designer uses a simple interface to give complete control over every design task, by a method allowing multiple solvers, Solver on Demand. • Introduction • Overview of the Ansoft Total solution • Ansoft HFSS 9...

  16. Redefining Information Warfare Boundaries for an Army in a Wireless World

    Science.gov (United States)

    2013-01-01

    information and cognitive effects. Currently, FA30s are trained inte- grators; they are not required to have a particular level of mastery in any of the...forward for cyber operations, EW, and IO. In the memo, he concluded the following: 1. The cyber-EW-IO vocabulary in use today is adequate—but will

  17. Russia’s Ambiguous Warfare and Implications for the U.S. Marine Corps

    Science.gov (United States)

    2015-05-01

    coordination with local supporters, utilize psychological operations, intimidation, and bribery to undermine resistance. While it is unlikely that U.S...its early phases? Do they need more education and training on how to build and sustain relationships with local actors? Official versus non

  18. Management of DoD Irregular Warfare (IW) and Security Force Assistance (SFA) Capabilities

    Science.gov (United States)

    2016-05-03

    training, education, and experience) to support their theater strategies and DoD strategic plans. DoDI 3000.11, May 3, 2016 SECTION 3: PROCEDURES 6...professional licensing such as: Law, Business, Government, Economics, Anthropology , Engineering, Agriculture, Veterinary Medicine, and others. (4...development of the capacity and capability of foreign security forces and their supporting institutions. theater strategy. An overarching construct

  19. The Soviet - Afghan War, 1979-1989: Failures in Irregular Warfare

    Science.gov (United States)

    2008-01-01

    in countering the new threats or the mountainous terrain. One of the few exceptions was the SPETSNAZ , the Soviet Special Forces, which were trained...for unconventional operations. While the elite SPETSNAZ provided an inegular capability to the Red Army, their strengths were in insurgent operations

  20. General Alphonse Juin: A Case Study in Leadership and Coalition Warfare (Italy 1943-1944)

    Science.gov (United States)

    2011-04-04

    oftheir commitment from de Gaulle’s hands. Juin thus. found himself in a paradoxical situation. The equipment and training program boosted the morale of...two weeks before his eighty-eighth birthday . Sources: • Mark Blumenson, Mark Clark, the Last of the Great World War II Commanders. • Britannica

  1. Navy Irregular Warfare and Counterterrorism Operations: Background and Issues for Congress

    Science.gov (United States)

    2015-09-25

    inancial support to terrorists ashore and reduce instability and criminality at sea. Training and equipping partners for maritime security and fisheries ...providing non-naval augmentation for detainee affairs, security, and reconstruction . The procurement and employment of evolving multi-mission

  2. MINDSET: National Styles in Warfare and the Operational Level of Planning, Conduct and Analysis

    Science.gov (United States)

    1980-03-10

    sized and smaller units detached from the formations (and also, by the Sissi raiding tean,s trained by the Frontier Guards - which may. operate beyond...small but important Sissi element’ would fight as outright guerillas with a special emphasis on offensive cremolitions (in Soviet territory too, where

  3. 75 FR 6642 - Notice of Proposed Information Collection; Naval Special Warfare Recruiting Directorate

    Science.gov (United States)

    2010-02-10

    ... profile with individuals who have been historically successful in completing Navy SEAL accession training... techniques or other forms of information technology. DATES: Consideration will be given to all comments... is necessary to: (1) Help determine the eligibility and overall compatibility between individuals...

  4. Counter-Unmanned Aerial Vehicle Warfare: Kill Authorizations for the Carrier Strike Group

    Science.gov (United States)

    2016-06-10

    missiles at terrorist training camps in Afghanistan and a pharmaceutical plant in Sudan. This strike was justified because passive support had been...Accessed November 15, 2015. http://www.deseret news.com/article/933571/ Colombia -troops-seize-model-planes-in-bomb- plot.html?pg=all. ______. 2015. A

  5. How Do I Know? A Guide to the Selection of Personal Protective Equipment for Use in Responding to A Release of Chemical Warfare Agents

    Energy Technology Data Exchange (ETDEWEB)

    Foust, C.B.

    1999-05-01

    An incident involving chemical warfare agents requires a unique hazardous materials (HAZMAT) response. As with an HAZMAT event, federal regulations prescribe that responders must be protected from exposure to the chemical agents. But unlike other HAZMAT events, special considerations govern selection of personal protective equipment (PPE). PPE includes all clothing, respirators and monitoring devices used to respond to a chemical release. PPE can differ depending on whether responders are military or civilian personnel.

  6. Desorption Electrospray Ionization Mass Spectrometry (DESI-MS) Analysis of Organophosphorus Chemical Warfare Agents: Rapid Acquisition of Time-Aligned Parallel (TAP) Fragmentation Data

    Science.gov (United States)

    2010-06-01

    of surfaces [22, 28-30], polymers [31], alkaloids on plant tissue [32], chemical warfare agents on solid phase microextraction (SPME) fibers [33, 34...phase analysis of industrial polymers. Chem. Commun., 888-890. [32] Talaty, N., Takats, Z. and Cooks, R.G. (2005). Rapid in situ detection of alkaloids ...in plant tissue under ambient conditions using desorption electrospray ionization. Analyst, 130, 1624-1633. [33] D’Agostino, P. A., Hancock, J. R

  7. Sports Training

    Science.gov (United States)

    1988-01-01

    Practitioners of martial arts have long seen a need for a precise method of measuring the power of a karate kick or a boxer's punch in training and competition. Impax sensor is a piezoelectric film less than one thousandth of an inch thick, yet extremely durable. They give out a voltage impulse when struck, the greater the force of impact, the higher the voltage. The impulse is transmitted to a compact electronics package where voltage is translated into a force-pounds reading shown on a digital display. Impax, manufactured by Impulse Technology, Inc. is used by martial arts instructors, practitioners, U.S. Olympic Committee Training Center, football blocking sleds, and boxers as well as police defensive tactics, providing a means of evaluating the performance of recruits.

  8. Language Training

    CERN Multimedia

    HR Department

    2009-01-01

    PermanenceA "permanence" for language Training has been set up. If anyone has a question or requires information on any aspect of English or French training please come to our office 5 4-016 at the following times. Lucette Fournier French courses Monday 13.30 - 15.30 Tuesday\t10.30 - 12.30 Tessa Osborne English courses Wednesday\t12.00 - 14.00 Thursday\t11.00 - 13.00 New courses Specific English and French courses - Exam preparation/ We are now offering specific courses in English and French leading to a recognised external examination (e.g. Cambridge, DELF and BULATS). If you are interested in following one of these courses and have at least an upper intermediate level of English or French, please enrol through the following link: http://English courses http://French courses Or contact: Tessa Osborne 72957 (English courses) Lucette Fournier 73483 (French courses) Language Training Nathalie Dumeaux Tel. 78144 mailto:nathalie.dumeaux@cern.ch

  9. Language Training

    CERN Multimedia

    HR Department

    Permanence A "permanence" for language Training has been set up. If anyone has a question or requires information on any aspect of English or French training please come to our office 5 4-016 at the following times. Lucette Fournier - French courses Monday 13.30 - 15.30 Tuesday\t10.30 - 12.30 Tessa Osborne - English courses Wednesday\t12.00 - 14.00 Thursday\t11.00 - 13.00   New courses Specific English and French courses - Exam preparation/ We are now offering specific courses in English and French leading to a recognised external examination (e.g. Cambridge, DELF, DALF). If you are interested in following one of these courses and have at least an upper intermediate level of English or French, please enrol through the following link:  English courses French courses Or contact: Tessa Osborne 72957 (English courses) Lucette Fournier 73483 (French courses) Language Training Nathalie Dumeaux Tel. 78144 nathalie.dumeaux@cern.ch

  10. The Human Domain and the Future of Army Warfare: Present as Prelude to 2050

    Science.gov (United States)

    2017-07-01

    urban slums overall,[28] but climate change , ongoing conflict, and poor economic prospects could induce migration to these major economic and social hubs...training, and further education to hone skills. This begs the question: how successfully could a future social -science-based program fair in the...due to the democratiza- tion of technologies and other factors. He also considers social trends that will shape the future operational environment

  11. Formative Evaluation of a Massively Multi-Player Persistent (MMP) Environment for Asymmetric Warfare Exercises

    Science.gov (United States)

    2008-04-01

    Bessemer , & Bolton, 2002). In formative evaluations, the intent is focused on gaining sufficient information to guide the development process ; and...training requires multiple, iterative cycles of implementation, review and test, and revised development. Key in this process is acquisition of user input...immediately provided to the project team, and used by the developers to prioritize and guide the iterative development process . The RDECOM-STTC program has

  12. Integrated Avionics Electronic Warfare Equipment and Component Specialty, AFS 326X3A/B

    Science.gov (United States)

    1981-12-01

    INFORMATION CENTER X AFHRL/MODS X X AFtIEA/MEMD x HQ USAF/ MPPT X X AFHRL/LRT X LTTC (TECHNICAL TRAINING CENTER, CHECK PTT FOR ADDRESS) X X EXTENSION...a useable form involves the use of gases at very low temperatures (cryogenics). The job of these personnel, therefore, includes both electronic...voltage test probes, pressure regulators, frequency dip meters, high voltage toroids, pressure/ temperature test sets, and strobescopes are used almost

  13. R-EACTR: A Framework for Designing Realistic Cyber Warfare Exercises

    Science.gov (United States)

    2017-09-11

    NETCOM) training and exercise branch began collecting survey data after each exercise. With each survey response, we learned more specific details of...Battle Rhythm: schedule, hotwash, shift turnover , end-of-day reporting Pressure: pace, complexity of exercise, assessments, feedback from leadership...tools, and responsibilities. The second element of the Tactics segment is collective , where we focus more on processes that enable the successful

  14. Rebalancing General Purpose Forces to Meet Expanding Worldwide Irregular Warfare Requirements

    Science.gov (United States)

    2009-01-01

    develop a comprehensive understanding of the complex character of a conflict, of its social, political, historical, cultural, and economic contexts...to train and develop adaptive leaders and units that can operate effectively in today’s complex environments, more jointly and at lower levels.77 To...in conjunction with the brigade intelligence officer and is complemented by a Military Intelligence Company ( MICO ), with substantial access to

  15. Innovative Leader Development: Evaluation of the U.S. Army Asymmetric Warfare Adaptive Leader Program

    Science.gov (United States)

    2014-01-01

    based practice of medicine; Watkins et al., 2011) suggests that, even Summary, Conclusions, and recommendations 101 with clear and strict...Chen, Gilad, Brian Thomas, and J. Craig Wallace, “A Multilevel Examination of the Relationships Among Training Outcomes, Mediating Regulatory Processes...pp. 325–338. Watkins , K. E., H. A. Pincus, Susan Paddock, Brad Smith, Abigail Woodroffe, Carrie Farmer, Melanie E. Sorbero, Marcela Horvitz-Lennon

  16. Analysis of Unmanned Undersea Vehicle (UUV) Architectures and an Assessment of UUV Integration into Undersea Applications

    Science.gov (United States)

    2010-09-01

    found common materials utilized were: • ABS (acrylonitrile butadiene styrene or thermoplastic ) • Acrylic • Aluminum • Carbon Fiber 48...art, in GPS denied areas, etc.), internal processing hardware, information handling and software (i.e., open vs closed architectures, information

  17. Integrating Soft Set Theory and Fuzzy Linguistic Model to Evaluate the Performance of Training Simulation Systems.

    Science.gov (United States)

    Chang, Kuei-Hu; Chang, Yung-Chia; Chain, Kai; Chung, Hsiang-Yu

    2016-01-01

    The advancement of high technologies and the arrival of the information age have caused changes to the modern warfare. The military forces of many countries have replaced partially real training drills with training simulation systems to achieve combat readiness. However, considerable types of training simulation systems are used in military settings. In addition, differences in system set up time, functions, the environment, and the competency of system operators, as well as incomplete information have made it difficult to evaluate the performance of training simulation systems. To address the aforementioned problems, this study integrated analytic hierarchy process, soft set theory, and the fuzzy linguistic representation model to evaluate the performance of various training simulation systems. Furthermore, importance-performance analysis was adopted to examine the influence of saving costs and training safety of training simulation systems. The findings of this study are expected to facilitate applying military training simulation systems, avoiding wasting of resources (e.g., low utility and idle time), and providing data for subsequent applications and analysis. To verify the method proposed in this study, the numerical examples of the performance evaluation of training simulation systems were adopted and compared with the numerical results of an AHP and a novel AHP-based ranking technique. The results verified that not only could expert-provided questionnaire information be fully considered to lower the repetition rate of performance ranking, but a two-dimensional graph could also be used to help administrators allocate limited resources, thereby enhancing the investment benefits and training effectiveness of a training simulation system.

  18. Technical Training: Technical Training Seminar

    CERN Multimedia

    2004-01-01

    TECHNICAL TRAINING Monique Duval tel. 74924 technical.training@cern.ch Tuesday 3 February 2004 From 09:00 to 13:30 - Training Centre Auditorium - bldg. 593, room 11 USB (Universal Serial Bus) CYPRESS Seminar Claudia Colombini, Field Application Engineer CYPRESS ActiveComp Electronic GmbH D-85077 MANCHING, Germany As a pioneer in USB, CYPRESS sets the standard for cost-effective solutions without sacrificing functionality, performance or reliability. Having shipped over 200 million USB devices, Cypress is the undisputed market leader and demonstrates unmatched USB expertise. With the industry's broadest selection of USB solutions, Cypress has the right silicon, software and support for every USB application, from Low-speed to High-Speed and USB On-The-Go (OTG). 9:00 - 10:30 Overview of USB systems. USB CYPRESS product overview. Peripherals: Low Speed, Full Speed, High Speed (1.1 and 2.0). Hub Solutions, Embedded Host Solutions, On-The-Go (OTG) and wireless USB. USB Development Tools (first part) 10:30 -...

  19. Warfare and Socio-political hierarchies: reflections on non-State societies of the predynastic Nile Valley

    Directory of Open Access Journals (Sweden)

    Gayubas, Augusto

    2015-12-01

    Full Text Available In a recent article, anthropologist Robert L. Carneiro reassessed his most debated hypothesis about the emergence of chiefdoms and the State as a result of environmental or social circumscription, theorized for a series of historical contexts including that of the Predynastic Nile Valley. The problem of the origin of the State is beyond our scope, but regarding the emergence of institutionalized leadership and chiefdoms in the Nile Valley, Carneiro’s ideas about warfare as a main factor in the process of social change remain interesting, even when his insistence in circumscription is still debatable. The aim of the present paper is to briefly review the available archaeological evidence of warfare among non-State societies of the Predynastic Nile Valley, and to evaluate its possible relation to the emergence of socio-political hierarchies, in turn refering to and criticizing some of Carneiro’s recent ideas about the issue.En un artículo reciente, Robert L. Carneiro presentó una reconsideración de su muy debatida hipótesis acerca de la emergencia de sociedades de jefatura y del Estado como resultado de un contexto de circunscripción ambiental, teorizada para una serie de situaciones históricas, entre ellas el valle del Nilo predinástico. El problema del origen del Estado excede las posibilidades de este trabajo, pero en lo que respecta al surgimiento de jefaturas, consideramos que las ideas de Carneiro acerca de la guerra como factor de importancia en el proceso revisten cierto interés, aun cuando su insistencia en la circunscripción continúa siendo discutible. El objetivo del presente artículo es considerar la evidencia arqueológica de guerra disponible para las sociedades no estatales del valle del Nilo predinástico y evaluar la posible relación entre dichos testimonios y la emergencia de jerarquías sociopolíticas, refiriendo y criticando algunas de las ideas recientes de Carneiro sobre el problema.

  20. Media Training

    CERN Multimedia

    CERN. Geneva

    2009-01-01

    With the LHC starting up soon, the world's media are again turning their attention to CERN. We're all likely to be called upon to explain what is happening at CERN to media, friends and neighbours. The seminar will be given by BBC television news journalists Liz Pike and Nadia Marchant, and will deal with the kind of questions we're likely to be confronted with through the restart period. The training is open for everybody. Make sure you arrive early enough to get a seat - there are only 200 seats in the Globe. The session will also be webcast: http://webcast.cern.ch/

  1. ACADEMIC TRAINING

    CERN Document Server

    Françoise Benz

    2002-01-01

    6, 7 May LECTURE SERIES from 11.00 to 12.00 hrs - Auditorium, bldg. 500 Decoding the Human Genome, Scientific basis and ethic and social aspects by S.E. Antonarakis and A. Mauron / Univ. of Geneva Decoding the Human genome is a very up-to-date topic, raising several questions besides purely scientific, in view of the two competing teams (public and private), the ethics of using the results, and the fact that the project went apparently faster and easier than expected. The lecture series will address the following chapters: Scientific basis and challenges, Ethical and social aspects of genomics. Academic Training Françoise Benz Tel. 73127

  2. Human Systems Integration for Network Centric Warfare (Integration des systemes humains dans les operations reseaux centrees)

    Science.gov (United States)

    2010-02-01

    and perception in the local population in an area of operation in order to see whether opinions are changing to the better or worse for own forces...Requirements (e.g. training needs); • Local effects (e.g. opportunities for social learning). (in order) HV-B3 & F1 - HV-B1 & 5 HV-H HV-B2, F1 UK...ozbrojených síl SDG TECEN / DGAM M.R. Štefánika, Distribučné a C/ Arturo Soria 289 PAYS-BAS informačné stredisko RTO Madrid 28033 Royal

  3. English Training

    CERN Multimedia

    2003-01-01

    General and Professional English Courses The next session will take place: from 03 March to 28 June 2003 (2 weeks break at Easter). These courses are open to all persons working on the Cern site, and to their spouses. For registration and further information on the courses, please consult our Web pages: http://cern.ch/Training or contact Mrs. Benz: tel.73127 or Mr. Liptow: tel.72957. Writing Professional Documents in English This course is designed for people with a good level of spoken English. Duration: 20 hours (2 hours a week) Price: 440 CHF (for 8 students) For registration and further information, please consult our Web pages: http://cern.ch/Training or contact Mrs. Tessa Osborne: Tessa.Osborne@cern. Oral Expression This course is intended for people with a good knowledge of English who want to practise and maintain their speaking skills while extending their vocabulary. There will be approximately 8 participants in a class. Speaking activities will include discussions, meeting simulations, rol...

  4. English Training

    CERN Multimedia

    2003-01-01

    General and Professional English Courses The next session will take place: from 03 March to 28 June 2003 (2 weeks break at Easter). These courses are open to all persons working on the Cern site, and to their spouses. For registration and further information on the courses, please consult our Web pages: http://cern.ch/Training or contact Mrs. Benz: tel.73127 or Mr. Liptow: tel.72957. Writing Professional Documents in English This course is designed for people with a good level of spoken English. Duration: 20 hours (2 hours a week) Price: 440 CHF (for 8 students) For registration and further information, please consult our Web pages: http://cern.ch/Training or contact Mrs. Tessa Osborne: Tessa.Osborne@cern. Oral Expression This course is intended for people with a good knowledge of English who want to practise and maintain their speaking skills while extending their vocabulary. There will be approximately 8 participants in a class. Speaking activities will include discussions, meeting simulations, role-p...

  5. Language Training

    CERN Multimedia

    2003-01-01

    Formation en anglais Cours d'anglais général et professionnel La prochaine session se déroulera: du 06 octobre 2003 au 13 février 2004 (interruption de 3/4 semaines à Noël). Ces cours s'adressent à toute personne travaillant au CERN ainsi qu'à leur conjoint. Pour vous inscrire et voir tout le détail des cours proposés, consultez nos pages Web: http://cern.ch/Training Vous pouvez aussi contacter Mme Benz, tél. 73127 ou Mr Liptow, tél. 72957. General and Professional English Courses The next session will take place: from 06 October 2003 to 13 February 2004 (3/4 weeks break at Christmas). These courses are open to all persons working on the Cern site, and to their spouses. For registration and further information on the courses, please consult our Web pages: http://cern.ch/Training or contact Mrs. Benz: tel. 73127 or Mr. Liptow: tel. 72957. Writing Professional Documents in Engl...

  6. Language Training

    CERN Multimedia

    2003-01-01

    Formation en anglais Cours d'anglais général et professionnel La prochaine session se déroulera: du 06 octobre 2003 au 13 février 2004 (interruption de 3/4 semaines à Noël). Ces cours s'adressent à toute personne travaillant au CERN ainsi qu'à leur conjoint. Pour vous inscrire et voir tout le détail des cours proposés, consultez nos pages Web: http://cern.ch/Training Vous pouvez aussi contacter Mme Benz, tél. 73127 ou Mr Liptow, tél. 72957. General and Professional English Courses The next session will take place: from 06 October 2003 to 13 February 2004 (3/4 weeks break at Christmas). These courses are open to all persons working on the Cern site, and to their spouses. For registration and further information on the courses, please consult our Web pages: http://cern.ch/Training or contact Mrs. Benz: tel. 73127 or Mr. Liptow: tel. 72957. Writing Professional Documents in English This course is designed for people with a good level of spoken English. Duration: 20 hours (2 hours a week) Price: ...

  7. Language Training

    CERN Multimedia

    2003-01-01

    Formation en anglais Cours d'anglais général et professionnel La prochaine session se déroulera: du 06 octobre 2003 au 13 février 2004 (interruption de 3/4 semaines à Noël). Ces cours s'adressent à toute personne travaillant au CERN ainsi qu'à leur conjoint. Pour vous inscrire et voir tout le détail des cours proposés, consultez nos pages Web: http://cern.ch/Training Vous pouvez aussi contacter M. Liptow, tél. 72957. General and Professional English Courses The next session will take place: from 06 October 2003 to 13 February 2004 (3/4 weeks break at Christmas). These courses are open to all persons working on the Cern site, and to their spouses. For registration and further information on the courses, please consult our Web pages: http://cern.ch/Training or contact Mr. Liptow: tel. 72957. Writing Professional Documents in English This course is designed for people with a good level of...

  8. Evaluation of Chemical Warfare Agent Percutaneous Vapor Toxicity: Derivation of Toxicity Guidelines for Assessing Chemical Protective Ensembles.

    Energy Technology Data Exchange (ETDEWEB)

    Watson, A.P.

    2003-07-24

    Percutaneous vapor toxicity guidelines are provided for assessment and selection of chemical protective ensembles (CPEs) to be used by civilian and military first responders operating in a chemical warfare agent vapor environment. The agents evaluated include the G-series and VX nerve agents, the vesicant sulfur mustard (agent HD) and, to a lesser extent, the vesicant Lewisite (agent L). The focus of this evaluation is percutaneous vapor permeation of CPEs and the resulting skin absorption, as inhalation and ocular exposures are assumed to be largely eliminated through use of SCBA and full-face protective masks. Selection of appropriately protective CPE designs and materials incorporates a variety of test parameters to ensure operability, practicality, and adequacy. One aspect of adequacy assessment should be based on systems tests, which focus on effective protection of the most vulnerable body regions (e.g., the groin area), as identified in this analysis. The toxicity range of agent-specific cumulative exposures (Cts) derived in this analysis can be used as decision guidelines for CPE acceptance, in conjunction with weighting consideration towards more susceptible body regions. This toxicity range is bounded by the percutaneous vapor estimated minimal effect (EME{sub pv}) Ct (as the lower end) and the 1% population threshold effect (ECt{sub 01}) estimate. Assumptions of exposure duration used in CPE certification should consider that each agent-specific percutaneous vapor cumulative exposure Ct for a given endpoint is a constant for exposure durations between 30 min and 2 hours.

  9. Graphene Nanoplatelet-Polymer Chemiresistive Sensor Arrays for the Detection and Discrimination of Chemical Warfare Agent Simulants.

    Science.gov (United States)

    Wiederoder, Michael S; Nallon, Eric C; Weiss, Matt; McGraw, Shannon K; Schnee, Vincent P; Bright, Collin J; Polcha, Michael P; Paffenroth, Randy; Uzarski, Joshua R

    2017-11-22

    A cross-reactive array of semiselective chemiresistive sensors made of polymer-graphene nanoplatelet (GNP) composite coated electrodes was examined for detection and discrimination of chemical warfare agents (CWA). The arrays employ a set of chemically diverse polymers to generate a unique response signature for multiple CWA simulants and background interferents. The developed sensors' signal remains consistent after repeated exposures to multiple analytes for up to 5 days with a similar signal magnitude across different replicate sensors with the same polymer-GNP coating. An array of 12 sensors each coated with a different polymer-GNP mixture was exposed 100 times to a cycle of single analyte vapors consisting of 5 chemically similar CWA simulants and 8 common background interferents. The collected data was vector normalized to reduce concentration dependency, z-scored to account for baseline drift and signal-to-noise ratio, and Kalman filtered to reduce noise. The processed data was dimensionally reduced with principal component analysis and analyzed with four different machine learning algorithms to evaluate discrimination capabilities. For 5 similarly structured CWA simulants alone 100% classification accuracy was achieved. For all analytes tested 99% classification accuracy was achieved demonstrating the CWA discrimination capabilities of the developed system. The novel sensor fabrication methods and data processing techniques are attractive for development of sensor platforms for discrimination of CWA and other classes of chemical vapors.

  10. Transport behavior of surrogate biological warfare agents in a simulated landfill: Effect of leachate recirculation and water infiltration

    KAUST Repository

    Saikaly, Pascal

    2010-11-15

    An understanding of the transport behavior of biological warfare (BW) agents in landfills is required to evaluate the suitability of landfills for the disposal of building decontamination residue (BDR) following a bioterrorist attack on a building. Surrogate BW agents, Bacillus atrophaeus spores and Serratia marcescens, were spiked into simulated landfill reactors that were filled with synthetic building debris (SBD) and operated for 4 months with leachate recirculation or water infiltration. Quantitative polymerase chain reaction (Q-PCR) was used to monitor surrogate transport. In the leachate recirculation reactors, <10% of spiked surrogates were eluted in leachate over 4 months. In contrast, 45% and 31% of spiked S. marcescens and B. atrophaeus spores were eluted in leachate in the water infiltration reactors. At the termination of the experiment, the number of retained cells and spores in SBD was measured over the depth of the reactor. Less than 3% of the total spiked S. marcescens cells and no B. atrophaeus spores were detected in SBD. These results suggest that significant fractions of the spiked surrogates were strongly attached to SBD. © 2010 American Chemical Society.

  11. A comparison of 252Cf and 14-MeV neutron excitation to identify chemical warfare agents by PGNAA

    International Nuclear Information System (INIS)

    Caffrey, A.J.; Harlow, B.D.; Edwards, A.J.; Krebs, K.M.; Jones, J.L.; Yoon, W.; Zabriskie, J.M.; Dougan, A.D.

    2000-01-01

    Since 1992, Idaho National Engineering and Environmental Laboratory's portable isotopic neutron spectrometry (PINS) system has been widely used for the nondestructive assessment of munitions suspected to contain chemical warfare agents, such as the nerve agent sarin. PINS is a 252 Cf-based prompt gamma-ray neutron activation analysis (PGNAA) system. The standard PINS system employs a partially moderated 5-microg 252 Cf source emitting 10 7 n/s to excite the atomic nuclei inside the item under test. The chemical elements inside the item are revealed by their characteristic gamma-ray spectrum, measured by a high-resolution high-purity germanium gamma-ray spectrometer. The system computer then infers the fill compound or mixture from the elemental data extracted from the gamma-ray spectrum. Reliable PINS assessments can be completed in as little as 100 s for favorable cases such as white phosphorus smoke munitions, but normally, a 1000 to 3000 live-second counting interval is required. To improve PINS throughput when hundreds or more munitions must be assessed, they are evaluating the possible advantages of 14-MeV neutron excitation over their current radioisotopic source

  12. In Situ Probes of Capture and Decomposition of Chemical Warfare Agent Simulants by Zr-Based Metal Organic Frameworks

    Energy Technology Data Exchange (ETDEWEB)

    Plonka, Anna M.; Wang, Qi; Gordon, Wesley O.; Balboa, Alex; Troya, Diego; Guo, Weiwei; Sharp, Conor H.; Senanayake, Sanjaya D.; Morris, John R.; Hill, Craig L.; Frenkel, Anatoly I. (BNL); (Virginia Tech); (ECBC); (Emory); (SBU)

    2017-01-18

    Zr-based metal organic frameworks (MOFs) have been recently shown to be among the fastest catalysts of nerve-agent hydrolysis in solution. We report a detailed study of the adsorption and decomposition of a nerve-agent simulant, dimethyl methylphosphonate (DMMP), on UiO-66, UiO-67, MOF-808, and NU-1000 using synchrotron-based X-ray powder diffraction, X-ray absorption, and infrared spectroscopy, which reveals key aspects of the reaction mechanism. The diffraction measurements indicate that all four MOFs adsorb DMMP (introduced at atmospheric pressures through a flow of helium or air) within the pore space. In addition, the combination of X-ray absorption and infrared spectra suggests direct coordination of DMMP to the Zr6 cores of all MOFs, which ultimately leads to decomposition to phosphonate products. These experimental probes into the mechanism of adsorption and decomposition of chemical warfare agent simulants on Zr-based MOFs open new opportunities in rational design of new and superior decontamination materials.

  13. Environmental Effects on Zirconium Hydroxide Nanoparticles and Chemical Warfare Agent Decomposition: Implications of Atmospheric Water and Carbon Dioxide.

    Science.gov (United States)

    Balow, Robert B; Lundin, Jeffrey G; Daniels, Grant C; Gordon, Wesley O; McEntee, Monica; Peterson, Gregory W; Wynne, James H; Pehrsson, Pehr E

    2017-11-15

    Zirconium hydroxide (Zr(OH) 4 ) has excellent sorption properties and wide-ranging reactivity toward numerous types of chemical warfare agents (CWAs) and toxic industrial chemicals. Under pristine laboratory conditions, the effectiveness of Zr(OH) 4 has been attributed to a combination of diverse surface hydroxyl species and defects; however, atmospheric components (e.g., CO 2 , H 2 O, etc.) and trace contaminants can form adsorbates with potentially detrimental impact to the chemical reactivity of Zr(OH) 4 . Here, we report the hydrolysis of a CWA simulant, dimethyl methylphosphonate (DMMP) on Zr(OH) 4 determined by gas chromatography-mass spectrometry and in situ attenuated total reflectance Fourier transform infrared spectroscopy under ambient conditions. DMMP dosing on Zr(OH) 4 formed methyl methylphosphonate and methoxy degradation products on free bridging and terminal hydroxyl sites of Zr(OH) 4 under all evaluated environmental conditions. CO 2 dosing on Zr(OH) 4 formed adsorbed (bi)carbonates and interfacial carbonate complexes with relative stability dependent on CO 2 and H 2 O partial pressures. High concentrations of CO 2 reduced DMMP decomposition kinetics by occupying Zr(OH) 4 active sites with carbonaceous adsorbates. Elevated humidity promoted hydrolysis of adsorbed DMMP on Zr(OH) 4 to produce methanol and regenerated free hydroxyl species. Hydrolysis of DMMP by Zr(OH) 4 occurred under all conditions evaluated, demonstrating promise for chemical decontamination under diverse, real-world conditions.

  14. Extraordinary Adaptive Plasticity of Colorado Potato Beetle: “Ten-Striped Spearman” in the Era of Biotechnological Warfare

    Directory of Open Access Journals (Sweden)

    Aleksandar Cingel

    2016-09-01

    Full Text Available Expanding from remote areas of Mexico to a worldwide scale, the ten-striped insect, the Colorado potato beetle (CPB, Leptinotarsa decemlineata Say, has risen from being an innocuous beetle to a prominent global pest. A diverse life cycle, phenotypic plasticity, adaptation to adverse conditions, and capability to detoxify or tolerate toxins make this insect appear to be virtually “indestructible”. With increasing advances in molecular biology, tools of biotechnological warfare were deployed to combat CPB. In the last three decades, genetically modified potato has created a new challenge for the beetle. After reviewing hundreds of scientific papers dealing with CPB control, it became clear that even biotechnological means of control, if used alone, would not defeat the Colorado potato beetle. This control measure once again appears to be provoking the potato beetle to exhibit its remarkable adaptability. Nonetheless, the potential for adaptation to these techniques has increased our knowledge of this pest and thus opened possibilities for devising more sustainable CPB management programs.

  15. Difficulties associated with the development and licensing of vaccines for protection against bio-warfare and bio-terrorism.

    Science.gov (United States)

    Langford, M J; Myers, R C

    2002-01-01

    Today there is an increasing need to license vaccines for the protection of individuals against bio-warfare and bio-terrorism. While the need is apparent, the actual road to developing, producing and licensing such vaccines successfully is as yet undefined. Bio-defence vaccine candidates may come from several sources. They may come from vaccines that were previously licensed but are no longer in production, vaccines that are currently in an IND status, vaccines currently licensed in foreign countries, and newer vaccines currently under development. The issues that apply to the development and licensing of these vaccines can be defined by currently accepted standards for manufacture, and the requirement to demonstrate safety and efficacy to a level that gives the scientific and medical community, regulatory agencies, users and the public at large confidence. Requirements for manufacturing and demonstration of safety will be consistent with vaccines being developed for traditional purposes. However, demonstration of efficacy will be more difficult. Because field trials for these vaccines are generally not feasible and the conduct of human challenge studies is generally considered unethical, the demonstration of efficacy will need to be based on existing efficacy data, a thorough understanding of both the disease's pathogenesis and mechanism of protection, the ability to identify surrogate markers for efficacy, and the use of the proposed FDA "animal rule".

  16. Using Metal Complex Ion-Molecule Reactions in a Miniature Rectilinear Ion Trap Mass Spectrometer to Detect Chemical Warfare Agents

    Science.gov (United States)

    Graichen, Adam M.; Vachet, Richard W.

    2013-06-01

    The gas-phase reactions of a series of coordinatively unsaturated [Ni(L)n]y+ complexes, where L is a nitrogen-containing ligand, with chemical warfare agent (CWA) simulants in a miniature rectilinear ion trap mass spectrometer were investigated as part of a new approach to detect CWAs. Results show that upon entering the vacuum system via a poly(dimethylsiloxane) (PDMS) membrane introduction, low concentrations of several CWA simulants, including dipropyl sulfide (simulant for mustard gas), acetonitrile (simulant for the nerve agent tabun), and diethyl phosphite (simulant for nerve agents sarin, soman, tabun, and VX), can react with metal complex ions generated by electrospray ionization (ESI), thereby providing a sensitive means of detecting these compounds. The [Ni(L)n]2+ complexes are found to be particularly reactive with the simulants of mustard gas and tabun, allowing their detection at low parts-per-billion (ppb) levels. These detection limits are well below reported exposure limits for these CWAs, which indicates the applicability of this new approach, and are about two orders of magnitude lower than electron ionization detection limits on the same mass spectrometer. The use of coordinatively unsaturated metal complexes as reagent ions offers the possibility of further tuning the ion-molecule chemistry so that desired compounds can be detected selectively or at even lower concentrations.

  17. Express analysis of explosives, chemical warfare agents and drugs with multicapillary column gas chromatography and ion mobility increment spectrometry.

    Science.gov (United States)

    Buryakov, Igor A

    2004-02-05

    Description of a gas chromatograph designed for express analysis of explosives (2,4-dinitrotoluene, 2,4,6-trinitrotoluene, pentaerythritol tetranitrate), chemical warfare agents (mustard gas, lewisite, sarin) and drugs (heroin, cocaine hydrochloride, crack) is given. The devices comprises a multicapillary chromatographic column and an ion mobility increment spectrometer (MCC-IMIS). The main analytical characteristics of an IMIS (estimated detection limit (DL), linear dynamic range (LDR), speed of response) and a chromatographic column (separation power, degree of separation, a number of possible peaks at a chromatogram section, divided by analysis time) are determined. The maximum value of DL equal to 5 pg/ml was registered for cis-alpha-LW, and the lowest one of 0.001 pg/ml was for cocaine. The maximum value of LDR equal to 1000 was registered for sarin and the lowest one of 150 was for the ions of lewisite. Speed of response of one compound detection with the IMIS was 0.7 s.

  18. ACADEMIC TRAINING

    CERN Multimedia

    Françoise Benz

    2002-01-01

    25, 26, 27, 28 February and 1st March from 11.00 to 12.00 hrs - Auditorium, bldg. 500 LECTURE SERIES Neutrino masses and oscillations by A. de Rujula / CERN-TH This course will not cover its subject in the customary way. The emphasis will be on the simple theoretical concepts (helicity, handedness, chirality, Majorana masses) which are obscure in most of the literature, and on the quantum mechanics of oscillations, that ALL books get wrong. Which, hopefully, will not deter me from discussing some of the most interesting results from the labs and from the cosmos. Academic Training Françoise Benz Secretariat Tel. 73127 francoise.benz@cern.ch

  19. Training apparatus

    International Nuclear Information System (INIS)

    Monteith, W.D.

    1983-01-01

    Training apparatus for use in contamination surveillance uses a mathematical model of a hypothetical contamination source (e.g. nuclear, bacteriological or chemical explosion or leak) to determine from input data defining the contamination source, the contamination level at any location within a defined exercise area. The contamination level to be displayed by the apparatus is corrected to real time from a real time clock or may be displayed in response to a time input from a keyboard. In a preferred embodiment the location is defined by entering UTM grid reference coordinates using the keyboard. The mathematical model used by a microprocessor of the apparatus for simulation of contamination levels in the event of a nuclear explosion is described. (author)

  20. English training

    CERN Multimedia

    2003-01-01

    You have a good level of English BUT... You still need to improve your speaking or You have problems writing professional documents Would you like to work in a small group on either of these areas? Then, the following courses are for you! Writing Professional Documents in English The aim of the course is for students to improve their professional writing. Participants will work on technical, scientific or administrative documents depending on the needs of the group. Duration: 20 hours (2 hours a week) Price: 440 CHF (for 8 students) Oral Expression The emphasis will be on oral expression with necessary feed-back. Speaking activities will include discussions, meeting simulations, role-plays etc. Duration: 20 hours (2 hours a week) Price: 440 CHF (for 8 students) For registration and further information, please consult our Web pages: http://cern.ch/Training or contact Mr. Liptow: tel. 72957 / Mrs. Tessa Osborne: Tessa.Osborne@cern.ch.