WorldWideScience

Sample records for warfare army special

  1. Electronic Warfare: Army Special Operations Acquisition Strategy for Improved Equipment Is Sound

    National Research Council Canada - National Science Library

    1999-01-01

    ... to you. The Army Special Operations Command employs modified Chinook and Blackhawk helicopters, the MH-47D/E and MH-60K/L, respectively, in support of special operations missions worldwide These aircraft...

  2. The Manipulation of Human Behavior in Guerrilla Warfare: Can It Enhance U.S. Army Special Forces Guerrilla Warfare Operations?

    National Research Council Canada - National Science Library

    Harris, William

    1997-01-01

    .... Proper integration of psychological communications to manipulate behavior in guerrilla warfare may facilitate the recruiting1 motivation, morale, sustainment and popular support for a guerrilla movement and its cause...

  3. The Impact of Irregular Warfare on the US Army

    National Research Council Canada - National Science Library

    McDonald, III, Roger L

    2006-01-01

    Although the U.S. Army has yet to clearly define irregular warfare, it is imperative that the Army take near-term action to enhance the ability of Soldiers and units to operate effectively in an irregular warfare environment...

  4. Toward Operational Art in Special Warfare

    Science.gov (United States)

    2016-02-23

    combatant commanders develop special warfare cam- paign options for their theaters that can be integral parts of the national approach. Getting buy -in at...the resistance spawning franchise operations at home or abroad? – Is the resistance attracting funding or other forms of assistance (indigenous

  5. Irregular Warfare: Special Operations Joint Professional Military Education Transformation

    National Research Council Canada - National Science Library

    Cannady, Bryan H

    2008-01-01

    ... on today's battlefront in Afghanistan and Iraq and in the Global War on Terrorism (GWOT). At the forefront of the GWOT and irregular warfare are the United States Special Operations Command (USSOCOM...

  6. Structuring Naval Special Warfare junior officer professional military education

    OpenAIRE

    Donovan, Thomas A.

    2007-01-01

    Naval Special Warfare does not currently have a designated career path for an officer that requires professional military education (PME) for SEAL junior officers after the rank of Ensign (O-1) and before the rank of Lieutenant Commander (O-4). There currently is interest in this subject matter at the Naval Special Warfare Command and Center. SEAL officers increasingly hold key leadership positions and influence critical decisions in the execution of national strategy. This growing respo...

  7. Toward Operational Art in Special Warfare: Appendixes

    Science.gov (United States)

    2016-01-01

    language, proficiency in small-unit tactics, and the ability to build and fight alongside indigenous combat formations in a permissive, uncertain, or...counterinsurgency through and with indigenous forces or personnel.”1 The report has four aims: (1) to adapt conventional operational art to the unique...perfect near-real-time situational awareness,” at least at the tactical level of land warfare in complex terrain. But the idea of leveraging information

  8. Sexy is what you make it: organizational culture and U.S. Army Special Forces

    OpenAIRE

    Hawk, David L.

    2014-01-01

    Approved for public release; distribution is unlimited The U.S. Army Special Forces (SF) are the most highly trained, best equipped, and most seasoned soldiers to which the United States can turn to achieve national security objectives. The future, however, will require more indirect application of SF, through special warfare operations (e.g., UW, FID, etc.), in a host of hostile and undefined areas around the globe. This manner of employment is a change in emphasis from the direct combat ...

  9. Special Warfare: Restructuring for the Future

    Science.gov (United States)

    2016-06-01

    Civil affairs CAPs combined action platoons CAS close-air support CBI China-Burma-India [theater] CDI Community Defense Initiative CENTCOM [U.S...special forces’ creed has changed over time, the sentiment has remained. The history of the basic unit of special forces—the SFODA—can be traced back to...reassigned CIDG forces no longer held the advantage of insight into local cultural norms and daily activities since they were no longer operating near

  10. 75 FR 6642 - Notice of Proposed Information Collection; Naval Special Warfare Recruiting Directorate

    Science.gov (United States)

    2010-02-10

    ... Information Collection; Naval Special Warfare Recruiting Directorate AGENCY: Department of the Navy, DoD. ACTION: Notice. SUMMARY: The Naval Special Warfare (NSW) Recruiting Directorate announces the submission... any of the following methods: Federal eRulemaking Portal: http://www.regulations.gov . Follow the...

  11. Special Forces and the Art of Influence: A Grassroots Approach to Psychological Operations in an Unconventional Warfare Environment

    National Research Council Canada - National Science Library

    Thomas, II, Joel W

    2006-01-01

    This thesis researches the intricacies of the art of influence in an unconventional warfare environment to develop a model of influence that can be utilized by Special Forces conducting unconventional warfare...

  12. Special Operations Forces: C-130 Upgrade Plan Could Help Fix Electronic Warfare Deficiencies

    National Research Council Canada - National Science Library

    1998-01-01

    In response to a concern that threats to the U.S. Special Operations Command's (USSOCOM) aircraft are increasing, while funds available for electronic warfare are decreasing, the General Accounting Office...

  13. Enhancing U.S. Army Special Forces: Research and Applications

    National Research Council Canada - National Science Library

    Brooks, Judith

    1997-01-01

    .... The report gives a brief overview of research conducted to benefit Special Forces recruitment, selection, assessment, training, and soldiers in the field. At the end of each of these major sections are recommendations for Special Forces and for the Army, based on what we learned from the research. The report concludes with a discussion of future research directions.

  14. Assessing the Role of Surgical Strike Operations in Support of a Special Warfare Campaign

    Science.gov (United States)

    2017-06-09

    classic example of special warfare in action is the use of Special Forces soldiers to facilitate the Northern Alliance’s overthrow of the Taliban...Finally, the tempo of surgical strike operations must be taken into account. Renowned British counterinsurgent of the Boer War, Charles Callwell...December 2016, accessed 15 December 2016, http://edition.cnn.com/2010/ WORLD /asiapcf/10/09/ afghanistan.british.worker.death/index.html?hpt=T2. 43 camps

  15. Special Forces and the Art of Influence: A Grassroots Approach to Psychological Operations in an Unconventional Warfare Environment

    National Research Council Canada - National Science Library

    Thomas, II, Joel W

    2006-01-01

    .... The research was based on several premises: (1) the strategic utility of Special Forces (SF) lies in its ability to influence a target audience in an unconventional warfare (UW) environment; (2...

  16. The Army Ground Forces Training for Mountain and Winter Warfare - Study No. 23

    National Research Council Canada - National Science Library

    Govan, Thomas

    1946-01-01

    This general study of the experiments in mountain and winter warfare training from 1940 to 1944 is designed as an introduction to the histories of the Mountain Training Center and The 10th Mountain...

  17. The Alpini Effect: Why the US Army Should Train Units for Mountain Warfare

    Science.gov (United States)

    2014-05-22

    practical knowledge of the ground, and are very little adapted for mountain warfare.”20 The concept of infantry forces trained in mountain combat was...spearheaded the word of mouth campaign as he said, “It is easier to train a skier to be a soldier than to train a soldier to be a skier .” 30...author’s knowledge from professional experience 51 at Camp Carson from 1942-1944 and the US

  18. Forgeting Lessons Learned: The United States Army’s Inability To Embrace Irregular Warfare

    Science.gov (United States)

    2014-04-01

    Revolutionary Development Support, commonly referred to as “CORDS”, was established in 1967 under Robert “Blowtorch” Komer. As the director of CORDS, Robert ...combat operations spanning the complete spectrum of warfare. As Robert Citino, the author of Blitzkrieg to Desert Storm wrote about the development of...US forces in Somalia. Haiti In 1915, Smedley Butler and 3,000 Marines invaded Haiti and quickly pacified the entire island. Eighty years

  19. Network Centric Warfare Concepts in the Royal Netherlands Army C2 Architecture

    NARCIS (Netherlands)

    Meijden, M.G. van der

    2004-01-01

    The Royal Netherlands Army (RNLA) has been working on its second generation C2 Information System since 2000. Its first generation Integrated Staff Information System (ISIS) that is currently deployed is based on ATCCIS specifications and uses the ATCCIS Replication Mechanism for database to

  20. The Role of Civil Affairs in Unconventional Warfare

    Science.gov (United States)

    2012-12-01

    neighbor to the west, and secured the eastern border of Laos 32 Mao Tse -Tung, On Guerrilla Warfare...INTRODUCTION..........................................................................................19  B.  BRIEF HISTORY OF LAOS ...Royal Lao Army SCA Support to Civil Administration SCIRI Supreme Council of Iraq SG Shadow Government SOF Special Operations Forces TAI Targeted

  1. Satellite and Ground Communication Systems: Space and Electronic Warfare Threats to the United States Army

    Science.gov (United States)

    2017-02-01

    as if SATCOM is guaranteed. This complacency is accompanied by the procurement of high-data communication and mission command systems that deny...threat. To overcome these significant vulnerabilities, the US Army must procure communications systems that maintain the information high ground, but...precious gift of our freedom.”1 A key element of remaining strong on the ground is maintaining the capability to effectively communicate on the ground. If

  2. Models, Analysis, and Recommendations Pertaining to the Retention of Naval Special Warfare s Mid-Level Officers

    Science.gov (United States)

    2013-12-01

    The Analytic Hierarch/Network Process,” in Rev. R. Acad. Cien. Serie A. Mat (RACSAM), submitted by Francisco Javier Giron (Real Academia de Ciencias ...Academia de Ciencias : Spain. Scott, Nathan. Naval Special Warfare Officer Retention Survey. Monterey, CA: NPS Press, September 2013. Whittenberger

  3. Postural Stability of Special Warfare Combatant-Craft Crewmen With Tactical Gear.

    Science.gov (United States)

    Morgan, Paul M; Williams, Valerie J; Sell, Timothy C

    The US Naval Special Warfare's Special Warfare Combatant-Craft Crewmen (SWCC) operate on small, high-speed boats while wearing tactical gear (TG). The TG increases mission safety and success but may affect postural stability, potentially increasing risk for musculoskeletal injury. Therefore, the purpose of this study was to examine the effects of TG on postural stability during the Sensory Organization Test (SOT). Eight SWCC performed the SOT on NeuroCom's Balance Manager with TG and with no tactical gear (NTG). The status of gear was performed in randomized order. The SOT consisted of six different conditions that challenge sensory systems responsible for postural stability. Each condition was performed for three trials, resulting in a total of 18 trials. Overall performance, each individual condition, and sensory system analysis (somatosensory, visual, vestibular, preference) were scored. Data were not normally distributed therefore Wilcoxon signed-rank tests were used to compare each variable (ρ = .05). No significant differences were found between NTG and TG tests. No statistically significant differences were detected under the two TG conditions. This may be due to low statistical power, or potentially insensitivity of the assessment. Also, the amount and distribution of weight worn during the TG conditions, and the SWCC's unstable occupational platform, may have contributed to the findings. The data from this sample will be used in future research to better understand how TG affects SWCC. The data show that the addition of TG used in our study did not affect postural stability of SWCC during the SOT. Although no statistically significant differences were observed, there are clinical reasons for continued study of the effect of increased load on postural stability, using more challenging conditions, greater surface perturbations, dynamic tasks, and heavier loads. 2016.

  4. A Business Case Analysis of the Special Care Unit at Moncrief Army Community Hospital

    National Research Council Canada - National Science Library

    Unruh, Charles

    2002-01-01

    The goal of this project is to develop and evaluate four courses of action (COA) in order to determine the most efficient and effective method to care for Moncrief Army Community Hospitals Special Care Unit (SCU) inpatients...

  5. Psychological and Unconventional Warfare, 1941-1952: Origins of a Special Warfare Capability for the United States Army

    Science.gov (United States)

    1979-11-01

    nic -,L-dant orer unconventional wsr:fare? In shnrt, wfiat were-the pre-1952 roots of tbe’ P9ych𔃺rg1.ca1 WArfArPg Contme" artx], cMocom~tant y, the...General Robert A. McClure, 30 March 1948, from Co’.onel William S. Biddle , Assistant Chief, Plans and Policy Group, 1, 319, Plans and Operations Division

  6. Should the Concept of Network-Centric Warfare Form a Central Pillar of the Australian Army’s Transformation, as Articulated in the Hardened and Networked Army Concept?

    Science.gov (United States)

    2007-05-08

    Clausewitz Kantian philosophic framework for war, which contends that due to the inherent nature of war, it cannot be predicted or controlled by man. The...the key themes identified within Clausewitz On War has identified that NCW could be considered the anti-thesis of Clausewitz Kantian study of warfare...industries and centers of population remote from the surface forces. While not discussing the ethical implication of legitimizing the attack of civilian

  7. Promoting the Scientific Development of the Construction of Psychological Warfare of Our Army with System Theory%以系统论促进我军心理战建设科学发展

    Institute of Scientific and Technical Information of China (English)

    王晓华; 白莉

    2011-01-01

    我军心理战建设应汲取系统论的营养,从明确目标上破题,整体推进,重点优化组织指挥体制。%The construction of psychological warfare of our army should absorb nutrition from system theory,in which the-goal should be clear,the process should work integrated,andfoc-using on optimizing commanding system.

  8. Network Centric Warfare Case Study: U.S. V Corps and 3rd Infantry Division (Mechanized) During Operation Iraqi Freedom Combat Operations (Mar-Apr 2003). Volume 3. Network Centric Warfare Insights

    Science.gov (United States)

    2003-01-01

    OPSEC), military deception, psychological operations (PSYOPS), special information operations (IO), information assurance, physical security...nonlethal effects, such as operational 8 Network Centric Warfare Case Study security (OPSEC), military deception, psychological operations (PSYOP...Support Operations Group ASR Alternate Supply Route; or, Ammunition Supply Rate ATACMS Army Tactical Missile System ATARS Advanced

  9. Electronic Warfare Signature Measurement Facility

    Data.gov (United States)

    Federal Laboratory Consortium — The Electronic Warfare Signature Measurement Facility contains specialized mobile spectral, radiometric, and imaging measurement systems to characterize ultraviolet,...

  10. The Role of Army National Guard Special Forces Domestically And in Special Operations Command - North

    Science.gov (United States)

    2014-12-01

    Domestic Cannabis Suppression Operations Support ...................20 4. Counterdrug-Related Training and Training LEA/Military Personnel...domestic operations that the regular Army is prevented by Posse Comitatus1 restrictions, is a worthy topic for deeper exploration. This thesis...ones that include offensive measures taken to prevent , deter, preempt, and respond to terrorism. Hostage rescue, recovery of sensitive materials and

  11. Effects of Combat Deployment on Anthropometrics and Physiological Status of U.S. Army Special Operations Forces Soldiers.

    Science.gov (United States)

    Farina, Emily K; Taylor, Jonathan C; Means, Gary E; Williams, Kelly W; Murphy, Nancy E; Margolis, Lee M; Pasiakos, Stefan M; Lieberman, Harris R; McClung, James P

    2017-03-01

    U.S. Army Special Operations Forces (SOF) soldiers deploy frequently and conduct military operations through special warfare and surgical strike capabilities. Tasks required to execute these capabilities may induce physical and mental stress and have the potential to degrade soldier physiological status. No investigations have longitudinally characterized whether combat deployment alters anthropometrics or biochemical markers of physiological status in a SOF population of frequent deployers. Effects of modern combat deployment on longitudinal changes in anthropometrics and physiological status of elite U.S. Army SOF soldiers (n = 50) were assessed. Changes in measures of body composition, grip strength, physiological status, and health behaviors from baseline to postdeployment were determined with paired t test and McNemar's statistic. Baseline measures were obtained between 4 and 8 weeks before deployment. Deployment length was a uniform duration of time between 3 and 6 months (all soldiers completed the same length of deployment). Post hoc analyses determined change in body mass within quartiles of baseline body mass with paired t test and associations between change in sex hormone-binding globulin (SHBG) and change in body mass with correlation coefficient. The study was approved by the Human Use Review Committee at the U.S. Army Research Institute of Environmental Medicine, Natick, Massachusetts. In response to deployment, increases in lean mass (77.1 ± 7.6 to 77.8 ± 7.5 kg), maximum grip strength (57.9 ± 7.2 to 61.6 ± 8.8 kg), and conduct of aerobic (156 ± 106 to 250 ± 182 minutes/week) and strength training (190 ± 101 to 336 ± 251 minutes/week) exercise were observed (p < 0.05). Increases in serum SHBG (35.42 ± 10.68 to 38.77 ± 12.26 nmol/L) and decreases in serum cortisol (443.2 ± 79.3 to 381.9 ± 111.6 nmol/L) were also observed (p < 0.05). Body mass changes were dependent on baseline body mass. Soldiers in the lowest quartile of baseline body

  12. Strategic Choice: United States Special Forces’ Comparative Advantage in Irregular Warfare

    Science.gov (United States)

    2017-03-01

    metrics. 124 James Kiras, Special Operations and the Nature of Strategy : From World War II to the War on Terrorism , Vol. 17 (New York: Routledge...Operations and the nature of Strategy : From World War II to the War on Terrorism . Vol. 17. New York: Routledge. 2006. Liddell Hart, B. H. Strategy . New...indirect strategies . This thesis examines the conflict interaction between weak and strong actors. For the strong actor, this thesis identifies that

  13. Are Large Scale (Brigade Combat Team or Regimental Level and Above) United States Army Airborne Operations Effective in the Context of 21st Century Warfare

    National Research Council Canada - National Science Library

    Childress, Mark S

    2008-01-01

    Several recommendations, in regards to the use of large scale airborne operations in the context of 21st century warfare and identified shortfalls in airborne organization, are presented in this monograph...

  14. U.S. Special Forces: culture warriors

    OpenAIRE

    Hill, Joshua L.

    2014-01-01

    Approved for public release; distribution is unlimited U.S. Army Special Forces (SF) are consistently called upon to work by, with, and through indigenous forces to conduct special warfare. Current SF doctrine reflects an increasing desire for SF operators to be culturally proficient in order to work closely with locals, advise foreign militaries, and build relationships with host-nation counterparts. Despite the doctrinal emphasis on cultural proficiency, SF doctrine offers little concret...

  15. Adaptive Army: Embracing the Concept of Operational Manoeuvre from the Sea

    Science.gov (United States)

    2010-05-05

    PEACE Source: Headquarters Training Command- Army. Land Warfare Doctrine LWD 3-01: Formation Tactics. Australian Army, November 27, 2003. 27...Amphibious Capability Implementation Team, June 15, 2009. Headquarters Training Comrriand- Army. Land Warfare Doctrine LWD 3-0: Operations. Australian Army

  16. Governing Warfare

    DEFF Research Database (Denmark)

    Harste, Gorm

      It would seem as though warfare has gotten out of control, not only in Iraq and Afghanistan, but also in Central Africa. The paper outlines the strategic history of politically controlled warfare since the early Enlightenment. The argument is that control is implausible. The idea of control has...

  17. 2008 13th Expeditionary Warfare Conference

    Science.gov (United States)

    2008-10-23

    platforms – Emphasize a mixed fleet approach that spans the “iron triangle” – Integrate MRAP into the fleet mix – Transition to a fleet of tactical...Urban Warfare Mountain Warfare Desert Warfare Jungle Riverine Special Skills Recon LOG CSS ENG MT HS Ord Maint EOD Pers Retrival ...Detection (Specialized Platform FLGPR)Stand-off (60M) Scaleable Neutralization (Area coverage) ABV Delivery Ground Cueing Stand-off (800M) Scaleable

  18. Special Army Reports Prepared by Defense Finance and Accounting Service Indianapolis Operations

    National Research Council Canada - National Science Library

    Granetto, Paul J; Marsh, Patricia A; Armstrong, Jack L; Wenzel, Paul C; Barnes, Leslie M; Grum, Andrew D; Kleiman, E. E; Baer, Joseph A; Maroska, Chad A; Thompson, Ann L

    2007-01-01

    .... This is the second in a series of reports related to Army budget execution operations. The first report discussed the transmission of Army budget execution data by the Defense Finance and Accounting Service (DFAS...

  19. Substance use and misuse in the Croatian Army Special Forces: prevalence and influencing factors

    Directory of Open Access Journals (Sweden)

    Damir Sekulic

    2014-02-01

    Full Text Available Objectives: In addition to being a serious health-hazard, substance-use-and-misuse (SUM in military forces negatively infl uences physical fi tness and army readiness. The aim of this study was to defi ne the prevalence of SUM, which includes cigarette smoking, alcohol consumption, and multiple SUM (i.e. practice of daily smoking and harmful alcohol drinking, and factors infl uencing SUM in the Croatian Special Army Forces (SAF. Materials and Methods: We studied 73 SAF members. A self-administered validated questionnaire was used to gather socio-demographic and military-professionrelated data, and SUM factors. The associations between studied variables were established by the Chi2 test, and forward conditional logistic regression (FCLR. Results: With less than 40% of daily smokers, smoking was within expected values. Almost 80% of the examinees reported no binge drinking, while 54% reported harmful drinking according to the Alcohol Use Disorders Identifi cation Test scale. Paternity and education level were negatively associated with daily smoking, while higher incidence of daily smoking was found for privates and those who practiced harmful drinking (all at p < 0.05. The FCLR demonstrated a higher risk of harmful alcohol consumption for younger commissioned offi cers (OR for military rank = 5.54, 95% CI: 2.19-13.99; OR for age = 0.85, 95% CI: 0.76-0.95. Conclusion: Although SUM incidence was not alarming compared to the overall population and the previously reported military data, additional efforts are necessary in order to decrease cigarette consumption. The study showed that protective/risk structure of the substance misuse in the military should be investigated specifi cally with regard to particular military services, corps, and socio-cultural environment.

  20. Precision Warfare Enables Interdependent Fires and Maneuver in 2010

    National Research Council Canada - National Science Library

    Smith, John

    1997-01-01

    The U.S. Army is in the midst of a revolution in military affairs (RMA). Significant advancements in informational technologies and precision weapons are providing unprecedented potential for future warfare...

  1. Military Review. Special Edition: Center for the Army Profession and Ethic. September 2010

    Science.gov (United States)

    2010-09-01

    ethically speaking; that is, the manual is no specimen of moral relativism . Counterinsurgency doctrine takes a strong nor- mative stand against the...EDITION Center for the Army Profession and Ethic Report Documentation Page Form ApprovedOMB No. 0704-0188 Public reporting burden for the collection...98) Prescribed by ANSI Std Z39-18 Cover Photo: Foreword The core of the Army profession is our ethic . The Army ethic , however, is paradoxical. It

  2. Seroprevalence of Dengue Fever in US Army Special Operations Forces: Initial Results and the Way Ahead.

    Science.gov (United States)

    Caci, Jennifer B; Blaylock, Jason M; De La Barrera, Rafael; Griggs, April N; Lin, Leyi; Jarman, Richard G; Thomas, Stephen J; Lyons, Arthur G

    2014-01-01

    The endemicity of dengue fever (DF) and, consequently, sequelae of DF are increasing worldwide. The increases are largely a result of widespread international travel and the increased range of the mosquito vectors. US Army Special Operations Command (USASOC) personnel are at an increased risk of exposure to dengue based on their frequent deployments to and presence in dengue endemic areas worldwide. Repeated deployments to different endemic areas can increase the risk for developing the more serious sequelae of dengue: dengue hemorrhagic fever (DHF) and dengue shock syndrome (DSS). Information about the seroprevalence rate of dengue in USASOC personnel, in particular, is lacking and is critical to assessing the risk, tailoring preventive medicine countermeasures, leveraging field diagnostics, and maintaining mission capability. In the first part of a two-part project to assess baseline seroprevalence in USASOC units, a random, unit-stratified sample of 500 anonymous serum specimens from personnel assigned to the highest-risk units in USASOC were screened for dengue using a microneutralization assay. Of the 500 specimens screened, 56 (11.2%) of 500 had neutralizing titers (NT) (MN₅₀≥10) against at least one DENV serotype. Subsequent sample titration resulted in 48 (85.7%) of 56 of the samples with NT (MN₅₀≥10) against at least one dengue serotype for an overall dengue exposure rate of 9.6% (48 of 500). The second part of the ongoing project, started in 2012, was a multicenter, serosurveillance project using predeployment and postdeployment sera collected from USASOC personnel deployed to South and Central America, Africa, and Southeast Asia. Preliminary results show a 13.2% (55 of 414) seropositivity rate. The significance of these findings as they relate to personal risk and operational impact is discussed. 2014.

  3. Electronic Warfare: Comprehensive Strategy Needed for Suppressing Enemy Air Defenses

    National Research Council Canada - National Science Library

    2001-01-01

    .... To achieve this suppression, the services use specialized aircraft designed to neutralize, destroy, or temporarily degrade enemy air defense systems through either physical attack or electronic warfare...

  4. Mountain Warfare: The Need for Specialist Training

    National Research Council Canada - National Science Library

    Malik, Muhammad

    2003-01-01

    This study focuses on the need for specialist training for mountain warfare. It analyzes the special characteristics of mountain and high altitude terrain which affect conduct of military operations...

  5. The ethics of drone warfare

    Directory of Open Access Journals (Sweden)

    Fatić Aleksandar

    2017-01-01

    Full Text Available The paper investigates the compatibility of the modern technologies of warfare, specifically the use of offensive drones, with traditional military ethics and suggests that the new technologies radically change the value system of the military in ways which make large parts of the traditional military ethics inapplicable. The author suggests that Agamben’s concept of ‘effectivity’ through ‘special actions’ which mark one’s belonging to a particular community or profession is a useful conceptual strategy to explore the compatibility of drone warfare with traditional military ethics; this strategy shows mixed results at best.

  6. Ending the Debate: Unconventional Warfare, Foreign Internal Defense, and Why Words Matter

    National Research Council Canada - National Science Library

    Jones, D

    2006-01-01

    There is an ongoing debate within the Special Forces community whether unconventional warfare and foreign internal defense are applicable in the contemporary and future Special Operations environments...

  7. Hybrid Warfare

    Science.gov (United States)

    2013-08-01

    nations: France and the U.S.12 The non- state actor in the 2006 Israel-Hezbollah War, Lebanese Hezbollah, combined the aspects of conventional and...served weapons systems.94 In terms of concurrent experience, the German Army successfully invaded Poland in 1939 and had successfully dominated France in...dominant ideology was that of the Communist Party as interpreted by Joseph Stalin. Generically interpreted, communism—Leninism/ Marxism — can be described

  8. Learning on the Move, OSS Detachment 101 Special Operations in Burma

    Science.gov (United States)

    2015-06-12

    actions would serve as shaping effects for larger conventional operations. Modern US Army Special Operations doctrine further supports this...their irregular brand of warfare as the decisive operation for a campaign where conventional forces were not suitable, prepared, or politically...Operations doctrine, America’s early SOF did not have the luxury of implementing schoolhouse solution sets and designed each solution as a campaign unfolded

  9. 日本关东军细菌战主力第一〇〇部队兴亡之探析%Analyze on the Rise and Fall of Unit 100Main Strength of Bacterial Warfare of The Japanese Kwantung Army

    Institute of Scientific and Technical Information of China (English)

    陈鹏

    2016-01-01

    The Army Horse Anti‐Epidemic Factory of The Japanese Kwantung Army is Unit 100 of The Japanese Kwantung Army ,which was about a decade as a secret the bacterial warfare force .It and Unit 100 of The Japanese Kwantung Army have similar military properties and close relationship .They are core parts of Japanese Bacterial Warfare Systems .Establishment and development of Unit 100 had offered full support and cooperation by Japanese Emperor Hirohito ,Imperial Japanese Army General Staff ,Ministry of War of Japan ,the Japanese Kwantung Army ,level veterinary schools and horse anti‐Epidemic institute .The Japanese government had conducted a series of premeditated and organized Bacterial Warfare from top to bottom , being regarded as National crime .Unit 100 was engaged in little known bacteria experiment ,but its related most of documents and archives had been lost .Although Academics had researched Unit 100 ,it is far ,far from enough .This paper reviews the origin and historical evolution ,organization ,size ,job ,doom of Unit 100 .After analyzing and accessing the public of historical materials ,people known Unit 100 prepared for bacterial warfare to attack the Soviet Union .In order to finish this plan ,Unit 100 repeatedly carried out a large‐scale plant and animal experiments ,in addition ,researched live human experimentations in secret .%关东军军马防疫厂即关东军第一〇〇部队,作为一支秘密细菌战部队存在了约十年之久,它与关东军第七三一部队性质相似、关系密切,是日本细菌战体系的核心组成部分。在其建立和发展的过程中,得到了日本天皇、参谋本部、陆军省、关东军、各级兽医学校及马疫研究处等部门的支持与配合,体现了日本从上至下有预谋、有组织地进行细菌战,可视为国家犯罪。该部队所从事的细菌实验鲜为人知,由于相关文献、档案付诸阙如,对该部队的研究还远远不够。本文旨在梳

  10. Drone warfare

    Science.gov (United States)

    Gusterson, Hugh

    2017-11-01

    Crude drones existed as early as World War I, but the technology matured in the Yugoslav Wars of the 1990s and the current wars around the Middle East. The U.S. first used a weaponized drone in late 2001, in Afghanistan. Drones may cause more or less civilian casualties depending on the targeting protocols employed by their operators. There is an inherent ambiguity in determining who is an insurgent from several thousand feet, but civilian casualties are likely to be higher if targeters emphasize "signature strikes" over "personality strikes," if they engage in "double-tap strikes," if they rely too much on local informants, and if they rely too heavily on cellphone identification in the absence of corroboration from other intelligence sources. The legality of drone warfare is fairly clear in established battle zones such as Afghanistan, but is more problematic in terms of both international and domestic law when it comes to drone strikes in countries such as Yemen, Pakistan and Somalia with which the U.S. is not at war. Looking to the future, the U.S. would be well advised to sponsor negotiations for an international drone convention that might establish clear international rules for the use of drones, ban autonomous smart drones, and establish adjudicatory procedures to handle allegations of war crimes.

  11. The ethics of drone warfare

    OpenAIRE

    Fatić Aleksandar

    2017-01-01

    The paper investigates the compatibility of the modern technologies of warfare, specifically the use of offensive drones, with traditional military ethics and suggests that the new technologies radically change the value system of the military in ways which make large parts of the traditional military ethics inapplicable. The author suggests that Agamben’s concept of ‘effectivity’ through ‘special actions’ which mark one’s belonging to a particular communit...

  12. Sexy is What You Make it: Organizational Culture and U.S. Army Special Forces

    Science.gov (United States)

    2014-06-01

    are an accumulation of a group’s learning as it pertains to behavioral, emotional, and cognitive elements of the group’s total psychological ...Organizational Performance in the Military (Summary). Frontiers of Entrepreneurship , 27 (21), Article 6. The future of U.S. Special Operations

  13. From Bosnia to Baghdad: The Evolution of US Army Special Forces From 1995-2004

    Science.gov (United States)

    2004-09-01

    BIJELJINA (OPERATION JOINT FORGE)............................... 13 H . FROM JCO TO SR (OPERATION ALLIED FORCE)......................... 14 I. SPECIAL...would only work with and report on Serbian villages and “Bosniak teams” exclusively focusing their efforts upon Bosnian Muslim villages.25 H . FROM JCO...processing station. Ramadani , the Sefer faction leader, arrived the next day at the demobilization point with approximately 40 faction members, including

  14. Researchers study decontamination of chemical, biological warfare agents

    OpenAIRE

    Trulove, Susan

    2007-01-01

    The U.S. Army Research Office has awarded Virginia Tech a $680,000 grant over two years to build an instrument that can be used to study the chemistry of gases that will decompose both chemical and biological warfare agents on surfaces.

  15. Impact Assessment In Special Warfare

    Science.gov (United States)

    2017-12-01

    Systematic Review and Meta-analysis,” Journal of Research in Crime and Delinquency 52, no. 4 (2015). 27 additional rigorous evaluations” of its... statistical methods, can simulate the randomized assignment into treatment and control and improve understanding of cause and effect. Lyall, Blair...demographic information and the geospatial location of each interview. I used the R statistical program to process the original survey data, filter for

  16. Innovative Practices for Special Warfare

    Science.gov (United States)

    2015-12-01

    stealing customers from traditional quick service fast food restaurants .243 Innovations in restaurant design, food preparation and distribution, are...and diverse organizations to reap the benefits of loyalty and connectivity that small teams enjoy.152 To create the linkages, JSOC strove to dissolve...those new to a field. Garage startups generate many disruptive innovations because “they are not tied to any specific customer base, product design

  17. Special Warfare: A Selected Bibliography.

    Science.gov (United States)

    1983-10-01

    Strategy. Boston: Routledge & Kegan Paul, 1981. (U162 .A78) 8. Atlantic Research Corporation. Georgetown Research Project. A Histori- cal Survey of...Corps Gazette. The Guerrillp. and How to Fight Him: Selections, ed. by T.N. Greene . Nev ’ork: Praeger, 1962. (U240 K33) 108. Martic, Milos. Insurrection

  18. Special Operations And Cyber Warfare

    Science.gov (United States)

    2016-12-01

    Cyber weapons have multiple functions and can be used for espionage or OPE. It is important to highlight the similarities between the intelligence...James Clapper, Director of National Intelligence, emphasized the importance of cyber operations as he identified cyber as the third major hazard facing...support the development of the capacity and capability of foreign security forces and their supporting institutions.”52 The DOD’s Cyber Strategy states

  19. Potential Science and Technology Game Changers for the Ground Warfare of 2050: Selected Projections Made in 2017

    Science.gov (United States)

    2018-02-01

    ARL-TR-8283 ● FEB 2018 US Army Research Laboratory Potential Science and Technology Game Changers for the Ground Warfare of 2050...Science and Technology Game Changers for the Ground Warfare of 2050: Selected Projections Made in 2017 by Alexander Kott Office of the Director...Brian Sadler Vehicle Technology Directorate, ARL Ananthram Swami Computational and Information Sciences Directorate, ARL Approved for

  20. Flying Electronic Warfare Laboratory

    Data.gov (United States)

    Federal Laboratory Consortium — FUNCTION: Provides NP-3D aircraft host platforms for Effectiveness of Navy Electronic Warfare Systems (ENEWS) Program antiship missile (ASM) seeker simulators used...

  1. Information Warfare and Ethics

    Directory of Open Access Journals (Sweden)

    M.J. Warren

    2001-05-01

    Full Text Available This paper examines the ethics of the practice of information warfare at both the national and corporate levels. Initially examining the present and past actions of individual hackers, it moves to the more organised, future military and economic warfare scenarios. It examines the lack of legal or policy initiatives in this area.

  2. Difficult Decisions: Chemical Warfare.

    Science.gov (United States)

    Slesnick, Irwin L.; Miller, John A.

    1988-01-01

    Gives the background history and chemistry of modern day chemical warfare from World War I to the present. Provides discussion questions to stimulate deeper thinking on the issue. Contains a discussion activity called "Can New Chemical Weapons Lead to Humane Warfare?" (CW)

  3. OFFICER AND COMMANDER IN ASYMMETRIC WARFARE OPERATIONS

    Directory of Open Access Journals (Sweden)

    Giuseppe CAFORIO

    2013-01-01

    Full Text Available Starting from the data of a field research conducted among soldiers with asymmetric warfare experiences from nine different countries, the author seeks to identify and shed light on the various problems that officers with command responsibilities had to face during their missions. A picture emerges of feelings and experiences relating to their first impression upon arriving in the theatre, relations with local armed forces, relations with the local population and local authorities, relations with NGOs, relations with other armies, the impact of the rules of engagement (ROEs, training and education, and operational experiences. The paper ends with a discussion of the lessons learned.

  4. Defining cyber warfare

    Directory of Open Access Journals (Sweden)

    Dragan D. Mladenović

    2012-04-01

    Full Text Available Cyber conflicts represent a new kind of warfare that is technologically developing very rapidly. Such development results in more frequent and more intensive cyber attacks undertaken by states against adversary targets, with a wide range of diverse operations, from information operations to physical destruction of targets. Nevertheless, cyber warfare is waged through the application of the same means, techniques and methods as those used in cyber criminal, terrorism and intelligence activities. Moreover, it has a very specific nature that enables states to covertly initiate attacks against their adversaries. The starting point in defining doctrines, procedures and standards in the area of cyber warfare is determining its true nature. In this paper, a contribution to this effort was made through the analysis of the existing state doctrines and international practice in the area of cyber warfare towards the determination of its nationally acceptable definition.

  5. Expeditionary Warfare- Force Protection

    National Research Council Canada - National Science Library

    Higgins, Eric

    2004-01-01

    In 2003, the Systems Engineering and Analysis students were tasked to develop a system of systems conceptual solution to provide force protection for the Sea Base conceptualized in the 2002 Expeditionary Warfare study...

  6. Biological warfare agents

    Directory of Open Access Journals (Sweden)

    Duraipandian Thavaselvam

    2010-01-01

    Full Text Available The recent bioterrorist attacks using anthrax spores have emphasized the need to detect and decontaminate critical facilities in the shortest possible time. There has been a remarkable progress in the detection, protection and decontamination of biological warfare agents as many instrumentation platforms and detection methodologies are developed and commissioned. Even then the threat of biological warfare agents and their use in bioterrorist attacks still remain a leading cause of global concern. Furthermore in the past decade there have been threats due to the emerging new diseases and also the re-emergence of old diseases and development of antimicrobial resistance and spread to new geographical regions. The preparedness against these agents need complete knowledge about the disease, better research and training facilities, diagnostic facilities and improved public health system. This review on the biological warfare agents will provide information on the biological warfare agents, their mode of transmission and spread and also the detection systems available to detect them. In addition the current information on the availability of commercially available and developing technologies against biological warfare agents has also been discussed. The risk that arise due to the use of these agents in warfare or bioterrorism related scenario can be mitigated with the availability of improved detection technologies.

  7. Biological warfare agents

    Science.gov (United States)

    Thavaselvam, Duraipandian; Vijayaraghavan, Rajagopalan

    2010-01-01

    The recent bioterrorist attacks using anthrax spores have emphasized the need to detect and decontaminate critical facilities in the shortest possible time. There has been a remarkable progress in the detection, protection and decontamination of biological warfare agents as many instrumentation platforms and detection methodologies are developed and commissioned. Even then the threat of biological warfare agents and their use in bioterrorist attacks still remain a leading cause of global concern. Furthermore in the past decade there have been threats due to the emerging new diseases and also the re-emergence of old diseases and development of antimicrobial resistance and spread to new geographical regions. The preparedness against these agents need complete knowledge about the disease, better research and training facilities, diagnostic facilities and improved public health system. This review on the biological warfare agents will provide information on the biological warfare agents, their mode of transmission and spread and also the detection systems available to detect them. In addition the current information on the availability of commercially available and developing technologies against biological warfare agents has also been discussed. The risk that arise due to the use of these agents in warfare or bioterrorism related scenario can be mitigated with the availability of improved detection technologies. PMID:21829313

  8. Effects of deployment on diet quality and nutritional status markers of elite U.S. Army special operations forces soldiers.

    Science.gov (United States)

    Farina, Emily K; Taylor, Jonathan C; Means, Gary E; Murphy, Nancy E; Pasiakos, Stefan M; Lieberman, Harris R; McClung, James P

    2017-07-03

    Special Operations Forces (SOF) Soldiers deploy frequently and require high levels of physical and cognitive performance. Nutritional status is linked to cognitive and physical performance. Studies evaluating dietary intake and nutritional status in deployed environments are lacking. Therefore, this study assessed the effects of combat deployment on diet quality and serum concentrations of nutritional status markers, including iron, vitamin D, parathyroid hormone (PTH), glucose, and lipids, among elite United States (U.S.) Army SOF Soldiers. Changes from baseline to post-deployment were determined with a repeated measure within-subjects design for Healthy Eating Index-2010 (HEI-2010) scores, intake of foods, food groups, key nutrients, and serum nutritional status markers. Dietary intake was assessed with a Block Food Frequency Questionnaire. The association between post-deployment serum 25-hydroxy vitamin D (25-OH vitamin D) and PTH was determined. Analyses of serum markers were completed on 50 participants and analyses of dietary intake were completed on 33 participants. In response to deployment, HEI-2010 scores decreased for total HEI-2010 (70.3 ± 9.1 vs. 62.9 ± 11.1), total fruit (4.4 ± 1.1 vs. 3.7 ± 1.5), whole fruit (4.6 ± 1.0 vs. 4.2 ± 1.4), dairy (6.2 ± 2.7 vs. 4.8 ± 2.4), and empty calories (14.3 ± 3.2 vs. 11.1 ± 4.5) (P ≤ 0.05). Average daily intakes of foods and food groups that decreased included total dairy (P < 0.01), milk (P < 0.01), and non-juice fruit (P = 0.03). Dietary intake of calcium (P = 0.05) and vitamin D (P = 0.03) decreased. PTH increased from baseline (3.4 ± 1.6 vs. 3.8 ± 1.4 pmol/L, P = 0.04), while there was no change in 25-OH vitamin D. Ferritin decreased (385 ± 173 vs. 354 ± 161 pmol/L, P = 0.03) and soluble transferrin receptor increased (16.3 ± 3.7 vs. 17.1 ± 3.5 nmol/L, P = 0.01). There were no changes in glucose or lipids. Post-deployment, serum 25-OH vitamin

  9. Cyber Warfare/Cyber Terrorism

    National Research Council Canada - National Science Library

    O'Hara, Timothy

    2004-01-01

    Section 1 of this paper provides an overview of cyber warfare as an element of information warfare, starting with the general background of the current strategic environment the United States is operating...

  10. Chemical warfare agents.

    Science.gov (United States)

    Kuca, Kamil; Pohanka, Miroslav

    2010-01-01

    Chemical warfare agents are compounds of different chemical structures. Simple molecules such as chlorine as well as complex structures such as ricin belong to this group. Nerve agents, vesicants, incapacitating agents, blood agents, lung-damaging agents, riot-control agents and several toxins are among chemical warfare agents. Although the use of these compounds is strictly prohibited, the possible misuse by terrorist groups is a reality nowadays. Owing to this fact, knowledge of the basic properties of these substances is of a high importance. This chapter briefly introduces the separate groups of chemical warfare agents together with their members and the potential therapy that should be applied in case someone is intoxicated by these agents.

  11. Chemical warfare agents

    Directory of Open Access Journals (Sweden)

    Vijayaraghavan R

    2010-01-01

    Full Text Available Among the Weapons of Mass Destruction, chemical warfare (CW is probably one of the most brutal created by mankind in comparison with biological and nuclear warfare. Chemical weapons are inexpensive and are relatively easy to produce, even by small terrorist groups, to create mass casualties with small quantities. The characteristics of various CW agents, general information relevant to current physical as well as medical protection methods, detection equipment available and decontamination techniques are discussed in this review article. A brief note on Chemical Weapons Convention is also provided.

  12. Chemical warfare agents

    Science.gov (United States)

    Ganesan, K.; Raza, S. K.; Vijayaraghavan, R.

    2010-01-01

    Among the Weapons of Mass Destruction, chemical warfare (CW) is probably one of the most brutal created by mankind in comparison with biological and nuclear warfare. Chemical weapons are inexpensive and are relatively easy to produce, even by small terrorist groups, to create mass casualties with small quantities. The characteristics of various CW agents, general information relevant to current physical as well as medical protection methods, detection equipment available and decontamination techniques are discussed in this review article. A brief note on Chemical Weapons Convention is also provided. PMID:21829312

  13. The Physics of Warfare

    Science.gov (United States)

    Giordano, Gerardo

    2015-01-01

    Recently, I was tasked with the creation and execution of a new themed general education physics class called The Physics of Warfare. In the past, I had used the theme of a class, such as the physics of sports medicine, as a way to create homework and in-class activities, generate discussions, and provide an application to demonstrate that physics…

  14. Army Technology

    Science.gov (United States)

    2015-02-01

    that allows them to perform applied research under the Institute for Biotechnology research team 1 2 3 20 | ARMY TECHNOLOGY MAGAZINE ...DASA(R&T) Deputy Assistant Secretary of the Army for Research and Technology Download the magazine , view online or read each individual story with...Army photo by Conrad Johnson) Front and back cover designs by Joe Stephens EXECUTIVE DEPUTY TO THE COMMANDING GENERAL Army Technology Magazine is an

  15. Information Warfare and International Law

    National Research Council Canada - National Science Library

    Greenberg, Lawrence T; Goodman, Seymour E; Soo Hoo, Kevin J

    1998-01-01

    .... Some legal constraints will certainly apply to information warfare, either because the constraints explicitly regulate particular actions, or because more general principles of international law...

  16. Implications of Network Centric Warfare

    National Research Council Canada - National Science Library

    Bailey, Alvin

    2004-01-01

    .... These areas of dependence also provide numerous vulnerabilities. This paper will focus specifically on Network Centric Warfare's vulnerabilities in terms of sensors cyberterrorism/ Electro-Magnetic Pulse (EMP...

  17. Special Operations Research Topics 2016

    Science.gov (United States)

    2015-01-01

    Senior Fellow Alvaro de Souza Pinheiro Major General, Brazilian Army, Ret. JSOU Associate Fellow James F. Powers, Jr. Colonel, U.S. Army, Ret. JSOU...goal is to shape the operating environment, counter threats, and advance U.S. interests prior to a threat or crisis neces- sitating large-scale...Role of SOF in political warfare: Achieving national objectives short of war E9. The human domain in crisis , conflict, and war: Influencing

  18. Antifragile Electronic Warfare

    OpenAIRE

    Lichtman, Marc

    2014-01-01

    This letter introduces the concept of antifragile electronic warfare (EW), which we define as the ability to allow a communications link to improve performance due to the presence of a jammer. This concept should not be confused with jamming countermeasures (a.k.a. anti-jamming or electronic protection). Rather, antifragile EW can be thought of as the next step beyond simply avoiding or mitigating jamming. After introducing the concept we narrow down the subset of jammers this concept can be ...

  19. Changing Face of Warfare

    Science.gov (United States)

    2015-06-12

    soldiers who had to use these shabby guns referred to them contemptuously as " pumpkin slingers.ൔ As with the Austrian rifled musket the Belgian rifle...Confederate forces divided. Part of the army detached to neutralize a Union garrison at Harpers Ferry while another part of the army was spread out heading...movements. The manual introduced squad tactics that spread out advancing infantrymen in loose-order formations. In theory, the attackers would be less

  20. U.S. Army War College Guide to Strategy

    Science.gov (United States)

    2001-02-01

    Stanford University Press, 1993. 26. Rudolf Hrbek and Sabine Wegand, Betrifft! Europa der Regionen, Berlin: C.H. Beck, 1994. 27. John Mueller...Barracks: U.S. Army War College, November 1998. Navarro, Jaime . Joint Vision 2010: Naval Warfare Imperatives. Newport: U.S. Naval War College

  1. Identification of chemical warfare agent with radiological measurements

    International Nuclear Information System (INIS)

    Liu Boxue; Li Yun; Ai Xianyun

    2000-01-01

    There are three non-destructive radiological methods for identification of warfare agents and TNT. Their principles and problems related were discussed. Portable isotopic neutron spectroscopy is based on the assay of key elemental composition (such as Cl, P, H, As, S, N) in chemical agents by neutron induced prompt gamma ray analysis. Hydrogen concentration measurement by means of using thermal neutron can be employed to identify chemical warfare agents and TNT that contains different hydrogen fraction. The calibration curves of thermal neutron count rate against hydrogen concentration were measured. X ray imagination system can be used to determine the internal structure of chemical bombs, there by to identify them. The radiological methods are very useful for identification of old chemical weapons abandoned by Japan Army during World War 2

  2. Psychological effects of nuclear warfare

    International Nuclear Information System (INIS)

    Mickley, G.A.

    1987-01-01

    This report is divided into five parts. (1) Discussion of the psychological milieu before a nuclear confrontation. (2) Acute psychological reactions to nuclear warfare (some of which may reflect, in part, direct radiogenic alteration of nervous system functions). (3) Chronic psychological effects of a nuclear confrontation. (4) Issues concerning treatment of these psychological changes. (5) Prevention of adverse psychological reactions to nuclear warfare

  3. IMS software developments for the detection of chemical warfare agent

    Science.gov (United States)

    Klepel, ST.; Graefenhain, U.; Lippe, R.; Stach, J.; Starrock, V.

    1995-01-01

    Interference compounds like gasoline, diesel, burning wood or fuel, etc. are presented in common battlefield situations. These compounds can cause detectors to respond as a false positive or interfere with the detector's ability to respond to target compounds such as chemical warfare agents. To ensure proper response of the ion mobility spectrometer to chemical warfare agents, two special software packages were developed and incorporated into the Bruker RAID-1. The programs suppress interferring signals caused by car exhaust or smoke gases resulting from burning materials and correct the influence of variable sample gas humidity which is important for detection and quantification of blister agents like mustard gas or lewisite.

  4. Cyber warfare and electronic warfare integration in the operational environment of the future: cyber electronic warfare

    Science.gov (United States)

    Askin, Osman; Irmak, Riza; Avsever, Mustafa

    2015-05-01

    For the states with advanced technology, effective use of electronic warfare and cyber warfare will be the main determining factor of winning a war in the future's operational environment. The developed states will be able to finalize the struggles they have entered with a minimum of human casualties and minimum cost thanks to high-tech. Considering the increasing number of world economic problems, the development of human rights and humanitarian law it is easy to understand the importance of minimum cost and minimum loss of human. In this paper, cyber warfare and electronic warfare concepts are examined in conjunction with the historical development and the relationship between them is explained. Finally, assessments were carried out about the use of cyber electronic warfare in the coming years.

  5. Hybrid Maritime Warfare

    DEFF Research Database (Denmark)

    Schaub Jr, Gary John; Murphy, Martin; Hoffman, Frank

    2017-01-01

    Russia’s use of hybrid warfare techniques has raised concerns about the security of the Baltic States. Gary Schaub, Jr, Martin Murphy and Frank G Hoffman recommend a series of measures to augment NATO’s Readiness Action Plan in the Baltic region, including increasing the breadth and depth of naval...... exercises, and improving maritime domain awareness through cooperative programmes. They also suggest unilateral and cooperative measures to develop a sound strategic communications strategy to counter Moscow’s information operations, reduce dependence on Russian energy supplies and build the resilience...

  6. Russian and Chinese Information Warfare: Theory and Practice

    Science.gov (United States)

    2004-06-01

    Integral neurolinguistic programming •Placing essential programs into the conscious or sub- conscious mind •Subconscious suggestions that modify human...Generators of special rays •Optical systems • Neurolinguistic programming •Computer psychotechnology •The mass media •Audiovisual effects •Special effects...Information Warfare: Theory and Practice 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER 6. AUTHOR(S) 5d. PROJECT NUMBER 5e

  7. Establishing Cyber Warfare Doctrine

    Directory of Open Access Journals (Sweden)

    Andrew M. Colarik

    2012-01-01

    Full Text Available Over the past several decades, advances in technology have transformed communications and the ability to acquire, disseminate, and utilize information in a range of environments. Modern societies and their respective militaries have taken advantage of a robust information space through network-centric systems. Because military and commercial operations have increasingly converged, communication and information infrastructures are now high-priority military objectives in times of war. This article examines the theoretical underpinning of current cyber warfare research, what we have learned so far about its application, and some of the emerging themes to be considered; it also postulates the development of a (national cyber warfare doctrine (CWD. An endeavor of this scale requires lots of considerations and preparation for its development if it is to be cooperatively embraced. This article considers why information technology systems and their supporting infrastructures should be considered legitimate military targets in conflicts, and offers several events that support this supposition. In addition, it identifies the various forms of doctrine that will become the basis for developing a CWD, discusses a CWD's possible components, and proposes a national collaborative and discussion framework for obtaining a nation's stakeholder buy-in for such an endeavor.

  8. Cyber Warfare/Cyber Terrorism

    National Research Council Canada - National Science Library

    O'Hara, Timothy

    2004-01-01

    .... Section 1 concludes with a review of offensive and defensive cyber warfare concepts. Section 2 presents a general overview of cyber terrorism, including definitions of cyber terrorism and cyber terrorism support...

  9. Attrition in Network Centric Warfare

    National Research Council Canada - National Science Library

    Erbetta, John

    2003-01-01

    .... Information warfare means that positive attacks on systems themselves compound the problem. Emerging technologies applicable to NCW as a force multiplier need to be recognized as counter to the impediments to progress...

  10. The ethics of information warfare

    CERN Document Server

    Floridi, Luciano

    2014-01-01

    This book offers an overview of the ethical problems posed by Information Warfare, and of the different approaches and methods used to solve them, in order to provide the reader with a better grasp of the ethical conundrums posed by this new form of warfare.The volume is divided into three parts, each comprising four chapters. The first part focuses on issues pertaining to the concept of Information Warfare and the clarifications that need to be made in order to address its ethical implications. The second part collects contributions focusing on Just War Theory and its application to the case of Information Warfare. The third part adopts alternative approaches to Just War Theory for analysing the ethical implications of this phenomenon. Finally, an afterword by Neelie Kroes - Vice President of the European Commission and European Digital Agenda Commissioner - concludes the volume. Her contribution describes the interests and commitments of the European Digital Agenda with respect to research for the developme...

  11. The United States and biological warfare: secrets from the early cold war and Korea.

    Science.gov (United States)

    Bruwer, A

    2001-01-01

    The United States and Biological Warfare is about accusations that the United States resorted to bacteriological warfare at a time of great military stress during the Korean War. In December 1951, the then US Secretary of Defense ordered early readiness for offensive use of biological weapons. Soon afterwards, the North Korean and Chinese armies accused the United States of starting a large-scale biological warfare experiment in Korea. The US State Department denied the accusation. Both parties to the dispute maintain their positions today. The authors spent 20 years researching the accusations in North America, Europe and Japan. They were the first foreigners to be given access to Chinese classified documents. The reader is also introduced to the concept of 'plausible denial', an official US policy which allowed responsible governmental representatives to deny knowledge of certain events. The authors hope that their work will contribute to the understanding of a time when modern war expanded into a new type of violence.

  12. Nuclear radiation in warfare

    International Nuclear Information System (INIS)

    Rotblat, J.

    1986-01-01

    The subject is covered in chapters, entitled: introduction; digest of nuclear weaponry (characteristics of nuclear weapons; effects of nuclear weapons other than ionizing radiation (fire-ball, fall-out, thermal radiation, blast wave, electromagnetic pulse); the nuclear arms race; war scenarios; biological effects of radiations on man (radiation doses; natural sources of radiation; acute effects of radiation; long-term somatic effects; genetic effects; factors affecting the biological response to radiation; internal exposure; synergistic effects; protection against radiation effects); radiations from nuclear explosions (initial radiation; fall-out; effects of fall-out on animal and plant life; contamination of water and food supplies by fall-out); radiation casualties in a nuclear war; effectiveness of civil defence; other warlike uses of radiation (attacks on civilian nuclear power installations; radiological warfare; terrorist activities); conclusion. (orig./HP) [de

  13. Nuclear radiation in warfare

    International Nuclear Information System (INIS)

    Rotblat, J.

    1981-01-01

    The subject is covered in chapters, entitled: introduction; digest of nuclear weaponry (characteristics of nuclear weapons; effects of nuclear weapons other than ionizing radiation (fire-ball, fall-out, thermal radiation, blast wave, electromagnetic pulse); the nuclear arms race; war scenarios); biological effects of radiations on man (radiation doses; natural sources of radiation; acute effects of radiation; long-term somatic effects; genetic effects; factors affecting the biological response to radiation; internal exposure; synergistic effects; protection against radiation effects); radiations from nuclear explosions (initial radiation; fall-out; effects of fall-out on animal and plant life; contamination of water and food supplies by fall-out); radiation casualties in a nuclear war; effectiveness of civil defence; other warlike uses of radiation (attacks on civilian nuclear power installations; radiological warfare; terrorist activities); conclusion. (U.K.)

  14. Reflections on nuclear warfare

    International Nuclear Information System (INIS)

    Evans, J.P.

    1983-01-01

    The author looks back on his more than 70 years of familiarity with Americans involved in warfare, noting their loyal support for our country's objectives. Drawing on the Einstein equation, his own visits to Hiroshima and Nagasaki, and current literature, he, as a physician, belatedly concurs with those who look on the use of nuclear weapons as irrational and untenable. Their employment under present circumstances would create a ''final epidemic'' to be avoided only by prevention. He suggests that medical perceptions must be considered by our national leaders in assessing the many factors that he hopes will lead to rational answers to this urgent, highly complex, and vital enigma. He cites physicians' efforts to help in finding answers and asks that his colleagues consider the issues with attention to the gravity of the situation and act according to their best judgment

  15. Army dreamers.

    Science.gov (United States)

    1988-05-14

    The birth of the Army Nursing Service took place in 1854, when Florence Nightingale, at the request of the Secretary of State for War, recruited and took to Scutari Hospital 38 women to tend the wounded of the Crimean war.

  16. Hybrid Warfare Dilemmas in the Middle Colonies during the American Revolution

    Science.gov (United States)

    2017-05-25

    north.51 Washington urged Lee “to push for Philadelphia. The force I have with me is infinitely ...would attend the passage of the River by a march through Jersey,” he wrote, “I propose to invade Pennsylvania by sea , and from this arrangement...Hybrid Warfare Dilemmas in the Middle Colonies during the American Revolution A Monograph by MAJ William C. Murray II US Army

  17. Immunohistopathology in the Guinea Pig Following Chronic Low-Level Exposure to Chemical Warfare Agents

    Science.gov (United States)

    2005-11-01

    U.S. Army Medical Research Institute of Chemical Defense USAMRICD-TR-05-09 Immunohistopathology in the Guinea Pig Following Chronic Low...2005 2. REPORT TYPE Technical Report 3. DATES COVERED (From - To) May 2003 to April 2005 4. TITLE AND SUBTITLE Immunohistopathology in the Guinea Pig Following...release; distribution unlimited 13. SUPPLEMENTARY NOTES 14. ABSTRACT Guinea pigs exposed repeatedly to low levels of chemical warfare nerve agents

  18. Intelligence Strategy for Fourth Generation Warfare

    National Research Council Canada - National Science Library

    Jamison, Edward P

    2006-01-01

    ...." They have named this new era of war "fourth generation warfare." Currently the Department of Defense's intelligence strategy is designed to defeat conventional adversaries vise a fourth generation warfare opponent...

  19. Inside the Wire: American Security and Cyber Warfare

    Science.gov (United States)

    2017-03-01

    Roberts, Kerry V. " SUN TZU and The Art of Cyber Warfare." Journal of Counterterrorism & Homeland Security International 19, no. 1(Spring 2013): 12-4...12. REPORT TYPE 3. DATES COVERED (From - To) 01-03-2017 Bibliography 4. TITLE AND SUBTITLE Sa. CONTRACT NUMBER Inside the Wire: American Security...MCDERMOTT LIBRARY U.S. AIR FORCE ACADEMY 11. SPONSOR/MONITOR’S REPORT USAF ACADEMY CO 80840-6214 NUMBER(S) Special Bibliography Series # 119 12

  20. Army transformation leadership a study of core competencies for civilian leadership

    OpenAIRE

    Taylor, Vickie.

    2006-01-01

    The U. S. Army is undergoing a substantial departure from its historical underpinnings to adapt and succeed in the emerging arena of asymmetric warfare-i.e., migrating from a traditional 'heavy' approach to an agile and responsive capability. Changes are not limited to equipment and doctrine, but are pervasive throughout all aspects of infrastructure and processes, including leadership. Army Transformation is outlined by the Department of Defense (DoD) April 2003 Transformation Planning Guid...

  1. Optimizing Armed Forces Capabilities for Hybrid Warfare – New Challenge for Slovak Armed Forces

    Directory of Open Access Journals (Sweden)

    Peter PINDJÁK

    2015-09-01

    Full Text Available The paper deals with the optimization of military capabilities of the Slovak Armed Forces for conducting operations in a hybrid conflict, which represents one of the possible scenarios of irregular warfare. Whereas in the regular warfare adversaries intend to eliminate the centers of gravity of each other, most often command and control structures, in irregular conflicts, the center of gravity shifts towards the will and cognitive perception of the target population. Hybrid warfare comprises a thoroughly planned combination of conventional military approaches and kinetic operations with subversive, irregular activities, including information and cyber operations. These efforts are often accompanied by intensified activities of intelligence services, special operation forces, and even mercenary and other paramilitary groups. The development of irregular warfare capabilities within the Slovak Armed Forces will require a progressive transformation process that may turn the armed forces into a modern and adaptable element of power, capable of deployment in national and international crisis management operations.

  2. Friction in the U.S. Army During Irregular Warfare

    Science.gov (United States)

    2014-05-22

    PowerPlus Books, 2002), 86–97. 29Niccolo Machiavelli and Harvey C Mansfield, The Prince (Chicago, IL: University of Chicago Press, 1985), 21–25...Gilbert, eds., Makers of Modern Strategy: From Machiavelli to the Nuclear Age (Princeton, N.J: Princeton University Press, 1986), 155. 5... Machiavelli , influenced by Greek and Roman writings, provided the basic underpinning for acquisition of land and wealth.29 Of particular importance was the

  3. The Chinese People’s Liberation Army and Information Warfare

    Science.gov (United States)

    2014-03-01

    living on a “smart planet ,” which is intercon- nected, with economic, political, and cultural activities all available to see on information systems...an existing superpower in the same region will create friction. Implicit, however, is the suggestion that it is up to the United States, as the lone ...Rang Weilai Zhanchang Geng ‘Touming’” (“Smart Planet Makes Future Battlefields More ‘Transparent’”), PLA Daily, December 16, 2010, p. 12. 26. Shen et

  4. The doctor and nuclear warfare

    International Nuclear Information System (INIS)

    Anon.

    1982-01-01

    At the 34th World Medical Assembly in Lisbon in 1981 the World Medical Association adopted a motion proposed by the American Medical Association that national medical associations should develop programs to educate the civilian population on the medical consequences of nuclear war. This article discusses the attitude the medical professions should have, should nuclear warfare in some form confront them in the future. The conclusion is drawn that defence against nuclear warfare is only a part of civil defence against any disaster, including the natural disasters such as flood and fire and the man-made disasters of transport accidents, even of problems at nuclear plants designed to supply energy

  5. US Army War College Interwar Period Curriculum: Logistics and Joint Coordination

    Science.gov (United States)

    2017-05-25

    of the United States Army conference. Milley stated, “We are on the cusp of a fundamental change in the character of ground warfare . . . a revolution...the many other tasks traditionally performed by land forces, the best it can do now is to invest heavily in the intellectual development of its...

  6. Biological warfare, bioterrorism, and biocrime

    NARCIS (Netherlands)

    Jansen, H. J.; Breeveld, F. J.; Stijnis, C.; Grobusch, M. P.

    2014-01-01

    Biological weapons achieve their intended target effects through the infectivity of disease-causing infectious agents. The ability to use biological agents in warfare is prohibited by the Biological and Toxin Weapon Convention. Bioterrorism is defined as the deliberate release of viruses, bacteria

  7. European Curricula, Xenophobia and Warfare.

    Science.gov (United States)

    Coulby, David

    1997-01-01

    Examines school and university curricula in Europe and the extent of their influence on xenophobia. Considers the pluralistic nature of the European population. Discusses the role of curriculum selection and language policy in state efforts to promote nationalism. Assesses the role of curricular systems in the actual encouragement of warfare,…

  8. The Anatomy of Counterinsurgency Warfare

    DEFF Research Database (Denmark)

    Mouritsen, Lars; Pedersen, Kenneth; Thruelsen, Peter Dahl

    Since the beginning of the new millennium, the West has been increasingly involved in a tiresome and rather particular type of conflict: insurgency warfare. The bloody and shocking terrorist attacks on New York and Washington in September 2001 marked the beginning of a new era, and the introducti...

  9. Strategic Analysis of Irregular Warfare

    Science.gov (United States)

    2010-03-01

    the same mathematical equations used by Lanchester .10 Irregular Warfare Theory and Doctrine It is time to develop new analytical methods and models...basis on which to build, similar to what Lanchester provided almost 100 years ago. Figure 9 portrays both Lanchester’s approach and an irregular 17

  10. Roots of Russian Irregular Warfare

    Science.gov (United States)

    2016-12-01

    PAGE INTENTIONALLY LEFT BLANK xiii ACKNOWLEDGMENTS Crissy, your encouragement throughout my career and especially during this project has been...all of the Russian disinformation techniques in Ukraine came directly “from Soviet toolkits .” Maria Snegovaya, “Putin’s Information Warfare In

  11. Technology Transition for Hybrid Warfare

    Science.gov (United States)

    2010-02-16

    and Iraq. At the same time, the science and technology base must provide the disruptive technologies to defeat future conventional enemies. This... disruptive technologies will be needed to retain long-term technological superiority in conventional warfare. Incremental improvement is the most...technology to be missed. Disruptive technologies are the second type of technological change and involve revolutionary concepts involving large technological

  12. Army TLS

    Science.gov (United States)

    2014-12-10

    Fast Deflation Device Tether marking Pennants Balloon / Tether marking LED Flashing light Loading Ramps Customized Trailer for transportation and Field...amount of xtra lift that permits the ballon to rise (if Res_Lift = 0, balloon is at equilibrium) RL = NL – Payload – Tether Payload: the weight of...Army TLS The TLS uses tethered aerodynamic blimps and precision-powered winches to loft one or more specialty-designed meteorological payloads that

  13. Unconventional Cyber Warfare: Cyber Opportunities in Unconventional Warfare

    Science.gov (United States)

    2014-06-01

    Internet service provider IW irregular warfare MCO major combat operations MySQL open-source relational database management system NATO North...today, often with no regard for legal or ethical constraints. A better course of action would be to conduct operations in cyberspace within the precepts...built in feature of MySQL that 97 John Markoff, “Before the Gunfire, Cyberattacks,” York Times, August 13, 2008, sec. Technology, 1, http

  14. Hybrid Warfare: the 21st Century Russian Way of Warfare

    Science.gov (United States)

    2017-05-25

    to wage information operations— from television, to the Internet, to unconventional forces on the ground spreading the message word -of- mouth ...adversarial vulnerabilities. Many of the peculiarities of hybrid warfare described herein are inextricably linked to Russia’s social , political, and...the US election. Then they utilized various means of media to distribute that information with the goal to discredit the US political process and

  15. Information Warfare in the Cyber Domain

    National Research Council Canada - National Science Library

    Takemoto, Glenn

    2001-01-01

    ...). This paper lays a foundation by defining the terminology associated with Information Warfare in the Cyber Domain, reviews the threat and illustrates the vulnerabilities of our information systems...

  16. MEANS AND METHODS OF CYBER WARFARE

    Directory of Open Access Journals (Sweden)

    Dan-Iulian VOITAȘEC

    2016-06-01

    Full Text Available According to the Declaration of Saint Petersburg of 1868 “the only legitimate object which States should endeavor to accomplish during war is to weaken the military forces of the enemy”. Thus, International Humanitarian Law prohibits or limits the use of certain means and methods of warfare. The rapid development of technology has led to the emergence of a new dimension of warfare. The cyber aspect of armed conflict has led to the development of new means and methods of warfare. The purpose of this paper is to study how the norms of international humanitarian law apply to the means and methods of cyber warfare.

  17. Cyber warfare building the scientific foundation

    CERN Document Server

    Jajodia, Sushil; Subrahmanian, VS; Swarup, Vipin; Wang, Cliff

    2015-01-01

    This book features a wide spectrum of the latest computer science research relating to cyber warfare, including military and policy dimensions. It is the first book to explore the scientific foundation of cyber warfare and features research from the areas of artificial intelligence, game theory, programming languages, graph theory and more. The high-level approach and emphasis on scientific rigor provides insights on ways to improve cyber warfare defense worldwide. Cyber Warfare: Building the Scientific Foundation targets researchers and practitioners working in cyber security, especially gove

  18. Shadow Wars: An Analysis of Counterinsurgency Warfare

    National Research Council Canada - National Science Library

    Dogan, Osman

    2005-01-01

    ... of the current strategic approaches to counterinsurgency warfare. Toward this end, a systems model approach, which views insurgent organizations as open systems, is adapted to the insurgent environment...

  19. Radioecological aspects of nuclear warfare

    International Nuclear Information System (INIS)

    Edvardson, Kay

    1977-01-01

    Radioactive fallout, one of the major effects of nuclear warfare, will cause acute radiation sickness within the close-in or intermediate areas downwind from surface bursts. Global fallout from high yield explosions will be fairly evenly distributed in the hemisphere where the explosions occur, and will cause irradiation from ground deposit, inhaled material and contaminated food. Estimates of collective doses and the approximate number of late casualties from the global contamination are presented for a given total explosion yield. (author)

  20. Hybrid Warfare: Preparing for Future Conflict

    Science.gov (United States)

    2015-02-17

    ciceromagazine.com/?s=getting+behind+hybrid+warfare. Brown , Col Leslie F. “Twenty-First Century Warfare Will be Hybrid.” Carlisle Barracks, PA...Lebanon and Gaza.” Rand Corporation Occasional Paper. Santa Monica, CA: Rand Corporation, 2010. Jones, Gareth and Darya Korsunskaya. “U.S., EU

  1. Weapons Systems, United States Army 1997.

    Science.gov (United States)

    1997-01-01

    Mexico, Morocco , Philippines, Turkey Co-Production: Korea The Army began fielding the UH-60 in 1978. Between 1978 and 1989 the Army procured UH-60A...Improvement Program ( CSR TEP) to all Area Common User System (ACUS) switch users (except AN/TTC-39-A(V)l). Incorporate Enhanced Switch Operation Program...Finland, Greece, Italy, Kuwait, Morocco , Saudi Arabia National Guard, SHAPE Tech Ctr (NATO), Spain, Special Def Acq Fund (pre-purchased export

  2. Reactivity of Dual-Use Decontaminants with Chemical Warfare Agents

    Science.gov (United States)

    2016-07-01

    REACTIVITY OF DUAL-USE DECONTAMINANTS WITH CHEMICAL WARFARE AGENTS ECBC-TR-1384... Decontaminants with Chemical Warfare Agents 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER 6. AUTHOR(S) Willis, Matthew P...extraction) of chemical warfare agents from materials. 15. SUBJECT TERMS GD HD Decontamination Hazard mitigation VX Chemical warfare agent Liquid-phase

  3. Administration: Army Congressional Fellowship Program

    National Research Council Canada - National Science Library

    2000-01-01

    This printing publishes a new Army Regulation. This regulation presents the policies and procedures under which the Army manages the Army Congressional Fellowship Program and supplements applicable Department...

  4. The Information Warfare Life Cycle Model

    Directory of Open Access Journals (Sweden)

    Brett van Niekerk

    2011-11-01

    Full Text Available Information warfare (IW is a dynamic and developing concept, which constitutes a number of disciplines. This paper aims to develop a life cycle model for information warfare that is applicable to all of the constituent disciplines. The model aims to be scalable and applicable to civilian and military incidents where information warfare tactics are employed. Existing information warfare models are discussed, and a new model is developed from the common aspects of these existing models. The proposed model is then applied to a variety of incidents to test its applicability and scalability. The proposed model is shown to be applicable to multiple disciplines of information warfare and is scalable, thus meeting the objectives of the model.

  5. The Information Warfare Life Cycle Model

    Directory of Open Access Journals (Sweden)

    Brett van Niekerk

    2011-03-01

    Full Text Available Information warfare (IW is a dynamic and developing concept, which constitutes a number of disciplines. This paper aims to develop a life cycle model for information warfare that is applicable to all of the constituent disciplines. The model aims to be scalable and applicable to civilian and military incidents where information warfare tactics are employed. Existing information warfare models are discussed, and a new model is developed from the common aspects of these existing models. The proposed model is then applied to a variety of incidents to test its applicability and scalability. The proposed model is shown to be applicable to multiple disciplines of information warfare and is scalable, thus meeting the objectives of the model.

  6. Army medical imaging system: ARMIS

    International Nuclear Information System (INIS)

    Siedband, M.P.; Kramp, D.C.

    1987-01-01

    Recent advances of stimulable phosphor screens, data cards using optical storage means, and new personal computers with image processing capability have made possible the design of economical filmless medical imaging systems. The addition of communication links means that remote interpretation of images is also possible. The Army Medical Imaging System uses stimulable phosphor screens, digital readout, a small computer, an optical digital data card device, and a DIN/PACS link. Up to 200 images can be stored in the computer hard disk for rapid recall and reading by the radiologist. The computer permits image processing, annotation, insertion of text, and control of the system. Each device contains an image storage RAM and communicates with the computer via the small computer systems interface. Data compression is used to reduce the required storage capacity and transmission times of the 1-mB images. The credit card-size optical data cards replace film and can store 12 or more images. The data cards can be read on an independent viewer. The research is supported by the U.S. Army Biomedical Research and Development Laboratory

  7. DefenseLink.mil - Special Report - Soldiers Train with Non-lethal Weapons

    Science.gov (United States)

    Spc. Yevgeniy Popov, a chemical warfare specialist with Headquarters and Headquarters Company, 3rd warfare specialist with Headquarters and Headquarters Company, 3rd Special Troops Battalion, 3rd Brigade , center, a combat engineer with Company A, 3rd Special Troops Battalion, 3rd Brigade Combat Team, 10th

  8. Radioecological aspects of nuclear warfare

    International Nuclear Information System (INIS)

    Edvarson, K.

    1975-01-01

    The radioactive fallout from nuclear explosions is one of the major effects of nuclear warfare. Those levels causing acute radiation sickness are to be expected only within the close-in or intermediate areas downwind from surface bursts. Global fallout from high yield explosions will be fairly evenly distributed in the hemisphere where the explosions occurred and cause irradiation from ground deposit, inhaled material and contaminated food. The collective doses and the order of magnitude of late casualties from this global contamination are estimated for a given total explosion yield. (auth)

  9. Information warfare technologies in political discourse

    Directory of Open Access Journals (Sweden)

    Karpova Anna Yu.

    2016-01-01

    Full Text Available We attempt to examine the technology of «information warfare» in this paper. The dominant theme of the paper is that the outcome of the information warfare is important not only for the future of a state itself but for the future of the world balance of forces. The main task of geopolitical actors in information warfare is to introduce ideas corresponding to their interests into mass consciousness. All participants of political conflicts have common features in technologies of Information warfare. The information anomie is the indicator of the great geopolitical actors’ personified interests on the stage of «information warfare» - the process resulted in destroying the communicative line: report-information understanding and disrupting the social order in society. In this paper authors describe the following Information Warfare technologies: "Political volcano" technology; "SPIN" technology; "Widening media resource" technology; "specific gravity" technology; "Cold War 2.0" technology and Information cleaningup technology. It is assumed that in the future there will be new instructions on applying technologies of information warfare. To impart perspective to the paper we consider examples, opinions and trends.

  10. An evolving joint space campaign concept and the Army's role

    Science.gov (United States)

    Franke, Henry G., III

    1992-05-01

    This monograph examines the question of an evolving joint space campaign concept and the Army's role in it over the next 20 years. Analysis progresses logically through a series of topics in order to arrive at a complete picture of this evolutionary space campaign concept, as well as the Army's place in it. Space plays an increasingly important role in US military operations, particularly when tied together with advances in information management. The synergistic impact due to the combination of these two areas suggests a revolution in the nature of modern warfare which saw its emergence during the 1991 Gulf War. With this theme in mind, I review the Army's roles, missions, and historical involvement in space, then present technological opportunities and a perspective on investment strategies for military space. A detailed discussion of a near-term military space theory and current space doctrines supports the need for an accepted military space theory as a foundation for Joint and Service space doctrines, space campaign design and conduct, and space force generation. The basis for such a theory is established using Julian Corbett's maritime warfare theory as a point of departure, while recognizing that space as a unique military operating medium requires its own theory and a regime to govern the application of space forces.

  11. 2009 Center for Army Leadership Annual Survey of Army Leadership (CASAL): Army Education

    Science.gov (United States)

    2010-06-11

    right time, handling pre- education attitudes, and tracking performance gains and career advantages related to academics.  Developing current, relevant...Army Leadership Technical Report 2010-2 2009 CENTER FOR ARMY LEADERSHIP ANNUAL SURVEY OF ARMY LEADERSHIP (CASAL): ARMY EDUCATION ...Joshua Hatfield ICF International John P. Steele Center for Army Leadership June 2010 The Center for Army Leadership An

  12. Moltke as a Model for Information Warfare

    National Research Council Canada - National Science Library

    Gallagher, Daniel P

    1998-01-01

    ... with late 20th century Information Warfare (IW). Clausewitz, with his emphasis on concentrating forces for a decisive battle, or Sun Tzu, with his focus on an indirect approach and subduing the enemy without battle, might appear to be more...

  13. Gas Warfare in World War I.

    Science.gov (United States)

    Flintham, A. J.

    1978-01-01

    The effectiveness of gas warfare during World War I was increased by the lack of a basic understanding of the behavior of gases on the part of the soldiers. This was a result of deficiencies in science education. (BB)

  14. Prehistoric ceremonial warfare: beginning of institutionalized violence

    Czech Academy of Sciences Publication Activity Database

    Turek, Jan

    2017-01-01

    Roč. 13, č. 3 (2017), s. 535-548 ISSN 1555-8622 Institutional support: RVO:67985912 Keywords : human aggression * ceremonial warfare * archery symbolism * Neolithic * Chalcolithic * Europe Subject RIV: AC - Archeology, Anthropology, Ethnology OBOR OECD: Archaeology

  15. On Cyber Warfare Command and Control Systems

    National Research Council Canada - National Science Library

    Howes, Norman R; Mezzino, Michael; Sarkesain, John

    2004-01-01

    .... Cyber warfare then becomes a one-sided battle where the attacker makes all the strikes and the target of the attack responds so slowly that the attacker usually gets away without being identified...

  16. Enzymatic Decontamination of Chemical Warfare Agents

    National Research Council Canada - National Science Library

    Raushel, Frank

    2000-01-01

    The primary objective of this research program is the development of a versatile enzyme-based system that is fully optimized for the decontamination, destruction, and detection of know chemical warfare agents...

  17. Insurgent Uprising: An Unconventional Warfare Wargame

    Science.gov (United States)

    2017-12-01

    Cleveland, Charles T. Connett, and Will Irwin. “Unconventional Warfare in the Gray Zone.” Joint Forces Quarterly 80, no. 1 (2016). Work, Robert O...CODE 13. ABSTRACT (maximum 200 words) Today, and in the future, unconventional solutions will present U.S. policymakers with options for dealing...training objectives and will complement existing training exercises. 14. SUBJECT TERMS unconventional warfare, foreign internal defense, direct

  18. Distributed computing environment for Mine Warfare Command

    OpenAIRE

    Pritchard, Lane L.

    1993-01-01

    Approved for public release; distribution is unlimited. The Mine Warfare Command in Charleston, South Carolina has been converting its information systems architecture from a centralized mainframe based system to a decentralized network of personal computers over the past several years. This thesis analyzes the progress Of the evolution as of May of 1992. The building blocks of a distributed architecture are discussed in relation to the choices the Mine Warfare Command has made to date. Ar...

  19. Route survey periodicity for mine warfare

    OpenAIRE

    Coke, Hartwell F.

    2009-01-01

    Approved for public release, distribution unlimited One of the Navy's most long standing challenges has been conquering the mine warfare threat. As mines and mine warfare techniques evolve and become more sophisticated, so does the United States' ability to counter the threat. The United States newest technique for countering a potential mined harbor, or route, is a process known as "change detection." This concept uses previous side scan sonar images of the area prior to a mining event an...

  20. On the Probability of Predicting and Mapping Traditional Warfare Measurements to the Cyber Warfare Domain

    CSIR Research Space (South Africa)

    Grobler, M

    2014-07-01

    Full Text Available Cyber warfare is a contentious topic, with no agreement on whether this is a real possibility or an unrealistic extension of the physical battlefield. This article will not debate the validity and legality of the concept of cyber warfare...

  1. Army Research Laboratory S&T Campaign Plans 2015-2035

    Science.gov (United States)

    2014-09-01

    for micro-robotics, and high quality factor communications, electronic warfare. Efforts focus on the maturation of LEAD zirconium titanate ( PZT ) and...spectrums (multiple impact, high energy impact, and high to low cycle fatigue ) to meet the needs of current and future Army platforms and structures...MATERIALS RESEARCH CAMPAIGN’s Polymer Coatings S&T Footprint S&T AREA POSTURE Polymer Coatings LEAD Corrosion & Fatigue research explores corrosion

  2. The Dynamics of Change: Regeneration of the Indonesian Army.

    Science.gov (United States)

    1984-11-15

    Army Special Forces (KOPASSANDHA): COI1U11a11Idl MG Yogic Suardi Memet * it(B) CCL, W ismuy Ar i.-j MU11,1IL101 A (N4) Deputy Commander *MG Soedjasmin0...KLTG Yogic Suardi Memet Cdr KODAM, VI/Cdr Special Forces Cdr KOWILHAN II BG S. Momon HI. Ad ip)Utro) Unknown Chi Army F iulaaic L’uia’ BC IP1

  3. Dilemmas of Warfare in Densely Populated Civilian Areas

    OpenAIRE

    Moshe Tamir

    2012-01-01

    This essay attempts to present operational perspectives on conducting warfare in densely populated areas. It also distinguishes between three types of combat within this general category, with the goal of shedding light on this complex type of warfare.

  4. Cyber Attacks, Information Attacks, and Postmodern Warfare

    Directory of Open Access Journals (Sweden)

    Valuch Jozef

    2017-06-01

    Full Text Available The aim of this paper is to evaluate and differentiate between the phenomena of cyberwarfare and information warfare, as manifestations of what we perceive as postmodern warfare. We describe and analyse the current examples of the use the postmodern warfare and the reactions of states and international bodies to these phenomena. The subject matter of this paper is the relationship between new types of postmodern conflicts and the law of armed conflicts (law of war. Based on ICJ case law, it is clear that under current legal rules of international law of war, cyber attacks as well as information attacks (often performed in the cyberspace as well can only be perceived as “war” if executed in addition to classical kinetic warfare, which is often not the case. In most cases perceived “only” as a non-linear warfare (postmodern conflict, this practice nevertheless must be condemned as conduct contrary to the principles of international law and (possibly a crime under national laws, unless this type of conduct will be recognized by the international community as a “war” proper, in its new, postmodern sense.

  5. Discovering the Army's Core Competencies

    National Research Council Canada - National Science Library

    Rudesheim, Frederick

    2001-01-01

    This paper seeks to answer the question, "Has the Army correctly identified its core competencies to ensure the Army can adequately respond to the national military strategy?" FM 1, The Army (Prototype Draft...

  6. Women in the Army

    Science.gov (United States)

    1980-06-06

    Army womenpower re- quirements with no apparent end in sight. No country, not even Russia or Israel, has ever made a conscious decision to include...provide a basis for decision making. iiI CHAPTER ONE AN HISTORICAL OVERVIEW Few books have been written which outline the history of military women...with a bill introducing the Women’s Army Auxillary Corps (WAAC). In order 7 that the Army could maintain control over this sensitive issue, General

  7. Detachment 101 and North Burma: Historical Conditions for Future Unconventional Warfare Operations

    Science.gov (United States)

    2016-05-26

    Detachment 101’s early UW operations also illustrate how enemy actions, conventional partner force capabilities and limitations, and indigenous populations...Publication ARSOF Army Special Operations Forces ATC Air Transport Command CBI China -Burma-India CMO Civil Military Operations CNAC China National Aviation...a smaller force size as well as budget, the US Army will place increased emphasis on “ innovative , low-cost and small-footprint engagements across the

  8. ISIL's Hybrid Warfare in Syria & Iraq

    DEFF Research Database (Denmark)

    Sørensen, Heine

    2016-01-01

    of and ability to synchronize various instruments of power with a view to achieving their end-state. With regards to the second part of the problem statement, the analysis demonstrates how ISIL employed horizontal escalation and ambiguity initially, but later on turned to vertical escalation, within the military......The case study specifically seeks to answer the following problem statement: Does ISIL qualify as an actor using hybrid warfare and if so what characterizes their particular use of this type of warfare? Based on an analysis of ISIL’s warfare from August 2012 to August 2016 the chapter argues......, that it is possible to answer the first part of the problem statement in an affirmative way. Hence, ISIL is not only theoretically prone to hybridity by organizational setup, and by the people comprising the organization, but has in fact continuously acted according to a hybrid logic in its prioritization...

  9. Survey on Urban Warfare Augmented Reality

    Directory of Open Access Journals (Sweden)

    Xiong You

    2018-01-01

    Full Text Available Urban warfare has become one of the main forms of modern combat in the twenty-first century. The main reason why urban warfare results in hundreds of casualties is that the situational information of the combatant is insufficient. Accessing information via an Augmented Reality system can elevate combatants’ situational awareness to effectively improve the efficiency of decision-making and reduce the injuries. This paper begins with the concept of Urban Warfare Augmented Reality (UWAR and illuminates the objectives of developing UWAR, i.e., transparent battlefield, intuitional perception and natural interaction. Real-time outdoor registration, information presentation and natural interaction are presented as key technologies of a practical UWAR system. Then, the history and current research state of these technologies are summarized and their future developments are highlighted from three perspectives, i.e., (1 Better integration with Geographic Information System and Virtual Geographic Environment; (2 More intelligent software; (3 More powerful hardware.

  10. Army Maintenance System Transformation

    National Research Council Canada - National Science Library

    Gilbertson, Frank V

    2006-01-01

    .... Used in conjunction with pertinent historical data and developed with Army transformation goals in mind, General Systems thinking can provide the framework for guiding maintenance transformation...

  11. Mongol Warfare in the Pre-Dissolution Period »

    Directory of Open Access Journals (Sweden)

    Timothy May

    2015-01-01

    Full Text Available Although the Mongols used many of the tactics and strategies that steppe nomads had used for centuries, the Mongols refined steppe warfare so that this style of warfare reached its apogee during the Mongol Empire. Furthermore, the Mongols developed a style of warfare that made them possibly the greatest military force in history. This work examines several facets of the pre-dissolution period (1200–1260. With the dissolution of the Mongol Empire, Mongol warfare once again changed. In some areas it remained complex while in others it regressed to traditional forces of steppe warfare, still potent but not as effective as the pre-dissolution period.

  12. Guiding Warfare to Reach Sustainable Peace

    DEFF Research Database (Denmark)

    Vestenskov, David; Drewes, Line

    The conference report Guiding Warfare to Reach Sustainable Peace constitutes the primary outcome of the conference It is based on excerpts from the conference presenters and workshop discussions. Furthermore, the report contains policy recommendations and key findings, with the ambition of develo......The conference report Guiding Warfare to Reach Sustainable Peace constitutes the primary outcome of the conference It is based on excerpts from the conference presenters and workshop discussions. Furthermore, the report contains policy recommendations and key findings, with the ambition...... of developing best practices in the education and implementation of IHL in capacity building of security forces....

  13. Terrorism as a Perceived Threat to US Armed Forces Serving OCONUS and the Army’s Program of Addressing That Threat.

    Science.gov (United States)

    1986-03-27

    many terrorist groups with plastique and other explosives to build bombs. 6 Using these explosives they have produced vehicle bombs which are totally...US Army War College Study, 19 April 1982. 3. TRADOC Pam 525-37, Military Operations, US Army Operational Concept For Terrorism Counteraction, 19...Army (U). Counterintelligence Special Report. (Overall Report (S)), 1981. 30. US Army. TRADOC Pam 525-37. "Military Operations." US Army Concept For

  14. Cyber-Enabled Unconventional Warfare: The Convergence of Cyberspace, Social Mobilization, and Special Warfare

    Science.gov (United States)

    2015-12-01

    Internet, to recruit, indoctrinate and train individuals.223 Cinema -quality propaganda videos are produced...ideological identity to participate in a perceived to be legitimate UW-like operation without actually physically showing-up on the battlefield, if

  15. Personal protection during resuscitation of casualties contaminated with chemical or biological warfare agents--a survey of medical first responders.

    Science.gov (United States)

    Brinker, Andrea; Prior, Kate; Schumacher, Jan

    2009-01-01

    The threat of mass casualties caused by an unconventional terrorist attack is a challenge for the public health system, with special implications for emergency medicine, anesthesia, and intensive care. Advanced life support of patients injured by chemical or biological warfare agents requires an adequate level of personal protection. The aim of this study was to evaluate the personal protection knowledge of emergency physicians and anesthetists who would be at the frontline of the initial health response to a chemical/biological warfare agent incident. After institutional review board approval, knowledge of personal protection measures among emergency medicine (n = 28) and anesthetics (n = 47) specialty registrars in the South Thames Region of the United Kingdom was surveyed using a standardized questionnaire. Participants were asked for the recommended level of personal protection if a chemical/biological warfare agent(s) casualty required advanced life support in the designated hospital resuscitation area. The best awareness within both groups was regarding severe acute respiratory syndrome, and fair knowledge was found regarding anthrax, plague, Ebola, and smallpox. In both groups, knowledge about personal protection requirements against chemical warfare agents was limited. Knowledge about personal protection measures for biological agents was acceptable, but was limited for chemical warfare agents. The results highlight the need to improve training and education regarding personal protection measures for medical first receivers.

  16. Biological warfare, bioterrorism, and biocrime.

    Science.gov (United States)

    Jansen, H J; Breeveld, F J; Stijnis, C; Grobusch, M P

    2014-06-01

    Biological weapons achieve their intended target effects through the infectivity of disease-causing infectious agents. The ability to use biological agents in warfare is prohibited by the Biological and Toxin Weapon Convention. Bioterrorism is defined as the deliberate release of viruses, bacteria or other agents used to cause illness or death in people, but also in animals or plants. It is aimed at creating casualties, terror, societal disruption, or economic loss, inspired by ideological, religious or political beliefs. The success of bioterroristic attempts is defined by the measure of societal disruption and panic, and not necessarily by the sheer number of casualties. Thus, making only a few individuals ill by the use of crude methods may be sufficient, as long as it creates the impact that is aimed for. The assessment of bioterrorism threats and motives have been described before. Biocrime implies the use of a biological agent to kill or make ill a single individual or small group of individuals, motivated by revenge or the desire for monetary gain by extortion, rather than by political, ideological, religious or other beliefs. The likelihood of a successful bioterrorist attack is not very large, given the technical difficulties and constraints. However, even if the number of casualties is likely to be limited, the impact of a bioterrorist attack can still be high. Measures aimed at enhancing diagnostic and therapeutic capabilities and capacities alongside training and education will improve the ability of society to combat 'regular' infectious diseases outbreaks, as well as mitigating the effects of bioterrorist attacks. © 2014 The Authors Clinical Microbiology and Infection © 2014 European Society of Clinical Microbiology and Infectious Diseases.

  17. ARMY CYBER STRUCTURE ALIGNMENT

    Science.gov (United States)

    2016-02-16

    content/?q=historic-cyber-unit-begins- daily-action . 14 John M. McHugh , Secretary of the Army, HQDA General Order 2014-02, Affirmation of Secretary of...support-plays-role-in-tactical-operations/75545442/. McHugh , John M., Secretary of the Army, HQDA General Order 2014-02, Affirmation of Secretary of

  18. Role Of The Army In Modern Pakistan

    Directory of Open Access Journals (Sweden)

    Vladislav Viktorovich Vorobiev

    2014-01-01

    Full Text Available The article studies the political development of the country in the modern period. Special attention is paid to the position of the army and its role in the Pakistani society. The article explores in detail the processes of gradual distancing of the army from politics and strengthening of civil society institutions. It is the first time in the Pakistani history that the civilian government managed to complete its full five-year constitutional term. Meanwhile, the country has been advancing on the path to democracy even after the elections 2013: a new civilian government has been formed in Pakistan. As compared with the previous phases of the country's development, the status of the army has considerably changed, evolved from "guiding force" to "shadow" guarantee of democratic development. The process has been largely encouraged by popular among officers feeling of tiredness: many of them are not ready to take power into their own hands and committed to their strictly constitutional duties. Despite this recent positive trend, the army continues to enjoy great authority in the society, often brokers political crisis and helps civilian authorities in settling such pressing problems as, for example, fight against extremism. The military will exert influence on government unless civil authorities are able to resist the current challenges and settle the actual problems. The role of "power broker" fully serves the interests of the top army brass.

  19. ROLE OF THE ARMY IN MODERN PAKISTAN

    Directory of Open Access Journals (Sweden)

    Vladislav Viktorovich Vorobiev

    2014-01-01

    Full Text Available The article studies the political development of the country in the modern period. Special attention is paid to the position of the army and its role in the Pakistani society. The article explores in detail the processes of gradual distancing of the army from politics and strengthening of civil society institutions. It is the first time in the Pakistani history that the civilian government managed to complete its full five-year constitutional term. Meanwhile, the country has been advancing on the path to democracy even after the elections 2013: a new civilian government has been formed in Pakistan. As compared with the previous phases of the country's development, the status of the army has considerably changed, evolved from "guiding force" to "shadow" guarantee of democratic development. The process has been largely encouraged by popular among officers feeling of tiredness: many of them are not ready to take power into their own hands and committed to their strictly constitutional duties. Despite this recent positive trend, the army continues to enjoy great authority in the society, often brokers political crisis and helps civilian authorities in settling such pressing problems as, for example, fight against extremism. The military will exert influence on government unless civil authorities are able to resist the current challenges and settle the actual problems. The role of "power broker" fully serves the interests of the top army brass.

  20. Warfare and the Teaching of History.

    Science.gov (United States)

    Salevouris, Michael J.

    1989-01-01

    Maintains that history teachers must challenge simplistic romantic notions about war. Proposes two approaches to teaching about war: the use of personal war narratives; and examining the relationship between warfare and society. Discusses literature related to these approaches. Contends that only through realistic assessments of war can peace be…

  1. The technical Dimensions of Nuclear Warfare

    International Nuclear Information System (INIS)

    Broda, E.

    1977-01-01

    This text, written by Engelbert Broda in 1977 is about the dimensions of nuclear warfare. Broda describes the devastating effects of the nuclear bombs dropped in 1945 in Hiroshima and Nagasaki and compares these effects with the explosive power of Hydrogen weapons. He also expresses his concerns about another nuclear ware and analyses possible worsening situations like change in the military doctrine. (nowak)

  2. Book Review COMPOSITE WARFARE: THE CONDUCT OF ...

    African Journals Online (AJOL)

    COMPOSITE WARFARE: THE CONDUCT OF. SUCCESSFUL GROUND FORCE. OPERATIONS IN AFRICA. Eeben Barlow. Abel Esterhuyse, PhD. Stellenbosch University. Pinetown: 30 Degrees South Publishers. 2015, 576 pages. ISBN 9781928211761. Africa is still one of the most conflict-ridden places on earth – from ...

  3. MOSES, development of an Underwater Warfare Testbed

    NARCIS (Netherlands)

    Lentze, S.G.

    2001-01-01

    The TNO underwater warfare (UWW) research programme results in a large number of models used in operational research projects. To enhance the accessibility and re-use of these models for new projects, TNO-FEL has developed the modelling environment ‘MOSES - Maritime Operations Simulation and

  4. Biomonitoring of exposure to chemical warfare agents

    NARCIS (Netherlands)

    Noort, D.; Schans, M.J. van der; Benschop, H.P.

    2006-01-01

    An overview is presented of the major methods that are presently available for biomonitoring of exposure to chemical warfare agents, i.e., nerve agents and sulfur mustard. These methods can be applied for a variety of purposes such as diagnosis and dosimetry of exposure of casualties, verification

  5. New Developments in Chinese Strategic Psychological Warfare

    Science.gov (United States)

    2005-01-01

    Taoism , which coupled hardness with softness in warfare, was not the only influence on the theory of psychological operations in ancient China. Other...portraying Islamic martyrs who appear to speak to soldiers from the clouds.38 In contemporary wars, such as the Gulf War, the first targets attacked have

  6. Proceedings: Special session on the rehabilitation of US Army Training Lands, Second Annual Conference of the Society for Ecological Restoration, held in Chicago, Illinois, April 29--May 3, 1990

    Energy Technology Data Exchange (ETDEWEB)

    Hinchman, R.R. [comp.

    1993-05-01

    US Army lands are currently being degraded at a rate that often exceeds natural resource conservation goals. The US Army Construction Engineering Research Laboratories is developing and implementing the Integrated Training Area Management (ITAM) program at several installations in the United States and Germany to reverse the rate of degradation and maintain realistic training habitat. The ITAM program includes environmental education/awareness tools, revegetation and erosion-control technologies, standardized land-monitoring methodologies, and computerized land-management decision-support systems that are integrated with military training mission requirements to provide a long-term, land-management program.

  7. Proceedings: Special session on the rehabilitation of US Army Training Lands, Second Annual Conference of the Society for Ecological Restoration, held in Chicago, Illinois, April 29--May 3, 1990

    International Nuclear Information System (INIS)

    Hinchman, R.R.

    1993-05-01

    US Army lands are currently being degraded at a rate that often exceeds natural resource conservation goals. The US Army Construction Engineering Research Laboratories is developing and implementing the Integrated Training Area Management (ITAM) program at several installations in the United States and Germany to reverse the rate of degradation and maintain realistic training habitat. The ITAM program includes environmental education/awareness tools, revegetation and erosion-control technologies, standardized land-monitoring methodologies, and computerized land-management decision-support systems that are integrated with military training mission requirements to provide a long-term, land-management program

  8. Naval Special Warfare Injury Prevention and Human Performance Initiative

    Science.gov (United States)

    2012-06-30

    or tactical training when the injury occurred. In 13.6% of the injuries, Operators were engaged in recreational activity/ sports when the injury...Collegiate Athletic Association (NCAA) and World Anti- Doping Agency (WADA) supplement list. Based on self-reported dietary intake, the current data indicate...knee tendonitis/ITBS (11%), and biceps and supraspinatus tendonopathy (11%) • Command PT and recreational/ sports activities accounted for 70% of

  9. Depth vs. Breadth: Talent Management for Special Warfare

    Science.gov (United States)

    2016-12-01

    a valuable and important tool when it comes to managing officer talent. In the corporate world, business skill has been strongly linked to leader ...Taking Charge, Harvard Business Professor John Gabarro discusses his research into the process behind successful (and failed) leader rotation. Gabarro’s...spend five years in a leadership role, agrees with Google’s experience. He believes that strategic leaders , like the SOCOM Commander, benefit from

  10. Hybrid Warfare: How to Shape Special Operations Forces

    Science.gov (United States)

    2016-06-10

    irregular tactics, information operations, and deliberate terrorism as they waged war against Russia in the territory of Chechnya and o deep in Russian...Russia initially had to withdraw its forces from Chechnya , but later led by a former KGB operative, Vladimir Putin, were able to defeat the Chechen rebels

  11. Influence Operations in Insurgencies: Identifying Framing Strategies for Special Warfare

    Science.gov (United States)

    2014-12-01

    1979; Tilly 1978), civil war termination (Walter 1997; Licklider 1993), the political and social consequences of civil war ( Rich and Stubbs 1997), the...from two challenges in the literature. First, scholarship on religious terrorism tends to focus on one particular motivation— apocalyptic, millennial ...factors that motivate some members of ethnic minorities to become radicalized, to form activist organizations, and to move from conventional means

  12. Naval Special Warfare Command's Implementation of the CFO Act

    National Research Council Canada - National Science Library

    Sabel, Martin

    2001-01-01

    ... out." Differences in definitions and classifications of finance categories, human error, and lack of training, and faulty accounting systems can result in inaccurate data and inability to properly utilize...

  13. Army Communicator. Volume 27, Number 3, Fall 2002

    Science.gov (United States)

    2002-01-01

    play in the Army’s transformation to the Objec- tive Force.” Gizmo’s debut in the Beatle Bailey comic strip came July 4. And according to a source close...Approved for public release; distribution is unlimited. Headquarters, Department of the Army ARMY COMMUNICATOR Voice of the Signal Regiment ! PB 11...02-3 Fall 2002 Vol. 27 No. 3 ! Special focus: radio’s resurgence -- its “new” uses in the current and near- future Army, Pgs. 2-18 ! Signal-planning

  14. Military Review: The Professional Journal of the U.S. Army. Volume 82, Number 5, September-October 2002

    Science.gov (United States)

    2002-10-01

    the disastrous defeat of the Prussians at Jena and Auerstedt. Napoleon’s modern brand of warfare exposed Prussian deficiencies and 4 September-October...great power. The choice for the underdog is literally victory or death. After the Continental Army unsuccessfully defended New York in 1776 and...best mete out their own Caucasian brand of punishment on the perpe- trators. Call it a blood feud, a vendet- ta, or just a plain old grudge, in the

  15. A Predictive Model of Surface Warfare Officer Retention: Factors Affecting Turnover

    National Research Council Canada - National Science Library

    Gjurich, Gregory

    1999-01-01

    Junior Surface Warfare Officer retention is in a crisis. The Surface Warfare Officer community anticipates an inability to fill Department Head billets due to the number of junior Surface Warfare Officers leaving military service...

  16. Applicability of federal and state hazardous waste regulatory programs to waste chemical weapons and chemical warfare agents.; TOPICAL

    International Nuclear Information System (INIS)

    Haffenden, R.; Kimmell, T.

    2002-01-01

    This report reviews federal and state hazardous waste regulatory programs that govern the management of chemical weapons or chemical warfare agents. It addresses state programs in the eight states with chemical weapon storage facilities managed by the U.S. Army: Alabama, Arkansas, Colorado, Indiana, Kentucky, Maryland, Oregon, and Utah. It also includes discussions on 32 additional states or jurisdictions with known or suspected chemical weapons or chemical warfare agent presence (e.g., disposal sites containing chemical agent identification sets): Alaska, Arizona, California, Florida, Georgia, Hawaii, Idaho, Illinois, Iowa, Kansas, Louisiana, Massachusetts, Michigan, Mississippi, Missouri, Nebraska, Nevada, New Jersey, New Mexico, New York, North Carolina, Ohio, Pennsylvania, South Carolina, South Dakota, Tennessee, Texas, the U.S. Virgin Islands, Virginia, Washington, Washington, D.C., and Wyoming. Resource Conservation and Recovery Act (RCRA) hazardous waste programs are reviewed to determine whether chemical weapons or chemical warfare agents are listed hazardous wastes or otherwise defined or identified as hazardous wastes. Because the U.S. Environmental Protection Agency (EPA) military munitions rule specifically addresses the management of chemical munitions, this report also indicates whether a state has adopted the rule and whether the resulting state regulations have been authorized by EPA. Many states have adopted parts or all of the EPA munitions rule but have not yet received authorization from EPA to implement the rule. In these cases, the states may enforce the adopted munitions rule provisions under state law, but these provisions are not federally enforceable

  17. The concept of guerrilla warfare in Lithuania in the 1920—1930s

    Directory of Open Access Journals (Sweden)

    Jokubauskas Vytautas

    2012-03-01

    Full Text Available This article analyses the military and tactical training of the members of the Lithuanian Riflemen’s Union for guerrilla warfare in the interwar period. Small nations, such as Lithuania and other Baltic states, being unable to build up military strength in order to ensure national security, were forced to seek for unconventional methods of warfare, including guerrilla strategies. The study places emphasis on the development of the guerrilla war concept in the Union periodicals. The author retraces a change in the intensity of the guerrilla warfare concept propagation amongst Lithuanian population and riflemen, in particular, through publications in the Trimitas — a periodical of the Lithuanian Riflemen’s Union. The author also identifies the narratives associated with the guerrilla matters employed for propaganda purposes in order to create an image of a guerrilla as a defender of the Homeland — Lithuania. Additionally, the structure and numbers of the Union are analysed through a comparison with similar organisations of the other «small nations» of the Baltic North-East. The author addresses the issue of military missions planned by the Lithuanian Army, as well as the way riflemen implemented them. Since the Union did not only offer military training, but was also engaged in the patriotic propaganda, the article focuses on the network of cultural institutions, homes of riflemen, orchestras, libraries, choirs, and athletic clubs used by the Union. The article sets out to establish whether the loss of Lithuanian sovereignty could have been possible without giving rise to a protracted guerrilla war.

  18. Information operation/information warfare modeling and simulation

    OpenAIRE

    Buettner, Raymond

    2000-01-01

    Information Operations have always been a part of warfare. However, this aspect of warfare is having ever-greater importance as forces rely more and more on information as an enabler. Modern information systems make possible very rapid creation, distribution, and utilization of information. These same systems have vulnerabilities that can be exploited by enemy forces. Information force-on-force is important and complex. New tools and procedures are needed for this warfare arena. As these t...

  19. U.S. Special Forces: Culture Warriors

    Science.gov (United States)

    2014-12-01

    definitions include:  “ culture is that complex whole which includes knowledge, beliefs, art, law, morals , custom, and any other capabilities and habits...perceptions towards others, such as ethnocentrism, cultural relativism , stereotypes, biases and worldview. Readings: ARSOF 2022, Special Warfare, Vol. 26...FORCES: CULTURE WARRIORS by Joshua L. Hill December 2014 Thesis Advisor: Heather S. Gregg Second Reader: Robert Burks THIS PAGE

  20. Military Engineers and Chemical Warfare Troops (Inzhenernye Voiska Khimicheskie Voiska),

    Science.gov (United States)

    MILITARY FORCES(FOREIGN), *MILITARY ORGANIZATIONS, MILITARY ENGINEERING , INFANTRY, AMPHIBIOUS OPERATIONS, MINELAYING, ARMORED VEHICLES, NUCLEAR...RADIATION, DOSIMETERS, CHEMICAL WARFARE, PROTECTIVE CLOTHING, DECONTAMINATION, HEALTH PHYSICS.

  1. Are Current Psychological Operations Procedures Adequate in Information Warfare?

    National Research Council Canada - National Science Library

    Duff, Murray

    1997-01-01

    .... While some aspects of information warfare are conducted domestically, many are executed on foreign soil and involve extensive interaction with other governments, their population, non-governmental...

  2. The Army Ethic

    Science.gov (United States)

    2015-06-12

    The Constitution and Declaration of Independence simultaneously hold two different views of human nature, an individualist and a collectivist view...Profession, defines the Army Ethic as “the evolving set of laws, values, and beliefs, deeply embedded within the core of the Army culture and...incorporate other viewpoints or respond to shifts in morality, religion, economics, and other socio- cultural factors. This thesis will use the term

  3. The Total Army

    Science.gov (United States)

    2016-01-01

    http://thediplomat.com/2015/04/chinas-growing-cyberwar-capabilities/ (accessed April 25, 2016); Nicolas Giacometti, “China’s Nuclear Modernization and...link between the operational and tactical levels of war.48 47. Michelle Tan , “US Army Generals Criticize Outdated Deployment Model: ‘We’ve Gotten...unveils-its-big-8-initiatives/81882852/ (accessed March 16, 2016). 58. Michelle Tan , “US Army Generals Criticize Outdated Deployment Model: ‘We’ve

  4. Army Leader Transitions Handbook

    Science.gov (United States)

    2008-01-01

    The courseware allows users to tailor training materials to specific needs. Users access this at the CAL AKO website or Army eLearning https...usarmy.skillport.com/ skillportfe/login/usarmylogin.cfm. New users must register with eLearning . Then login, select “Army Custom Curricula” and scroll to...challenges of your transition. Patience, flexibility and a good understanding of influence techniques on your part will help make any needed realignment a

  5. U.S. Army War College Key Strategic Issues List, 2015-2016

    Science.gov (United States)

    2015-09-28

    the Army outsource to contractors in a deployed environment before we risk operational effectiveness? What are the pitfalls for moving entire...support of expeditionary operations? What are the appropriate timelines for bringing better QOL to our soldiers? (POC: COL Stephanie Howard, CSLD...717- 245-3457) 79. How do Army Conventional Forces and Army Special Operations Forces build and maintain modern, scalable C2 structures that ensure

  6. Computational models of intergroup competition and warfare.

    Energy Technology Data Exchange (ETDEWEB)

    Letendre, Kenneth (University of New Mexico); Abbott, Robert G.

    2011-11-01

    This document reports on the research of Kenneth Letendre, the recipient of a Sandia Graduate Research Fellowship at the University of New Mexico. Warfare is an extreme form of intergroup competition in which individuals make extreme sacrifices for the benefit of their nation or other group to which they belong. Among animals, limited, non-lethal competition is the norm. It is not fully understood what factors lead to warfare. We studied the global variation in the frequency of civil conflict among countries of the world, and its positive association with variation in the intensity of infectious disease. We demonstrated that the burden of human infectious disease importantly predicts the frequency of civil conflict and tested a causal model for this association based on the parasite-stress theory of sociality. We also investigated the organization of social foraging by colonies of harvester ants in the genus Pogonomyrmex, using both field studies and computer models.

  7. Handbook of toxicology of chemical warfare agents

    CERN Document Server

    2010-01-01

    This groundbreaking book covers every aspect of deadly toxic chemicals used as weapons of mass destruction and employed in conflicts, warfare and terrorism. Including findings from experimental as well as clinical studies, this one-of-a-kind handbook is prepared in a very user- friendly format that can easily be followed by students, teachers and researchers, as well as lay people. Stand-alone chapters on individual chemicals and major topics allow the reader to easily access required information without searching through the entire book. This is the first book that offers in-depth coverage of individual toxicants, target organ toxicity, major incidents, toxic effects in humans, animals and wildlife, biosensors, biomarkers, on-site and laboratory analytical methods, decontamination and detoxification procedures, prophylactic, therapeutic and countermeasures, and the role of homeland security. Presents a comprehensive look at all aspects of chemical warfare toxicology in one reference work. This saves research...

  8. Chemical warfare agents. Classes and targets.

    Science.gov (United States)

    Schwenk, Michael

    2018-09-01

    Synthetic toxic chemicals (toxicants) and biological poisons (toxins) have been developed as chemical warfare agents in the last century. At the time of their initial consideration as chemical weapon, only restricted knowledge existed about their mechanisms of action. There exist two different types of acute toxic action: nonspecific cytotoxic mechanisms with multiple chemo-biological interactions versus specific mechanisms that tend to have just a single or a few target biomolecules. TRPV1- and TRPA-receptors are often involved as chemosensors that induce neurogenic inflammation. The present work briefly surveys classes and toxicologically relevant features of chemical warfare agents and describes mechanisms of toxic action. Copyright © 2017 Elsevier B.V. All rights reserved.

  9. Mapping the Spread of Mounted Warfare

    Directory of Open Access Journals (Sweden)

    Peter Turchin

    2016-12-01

    Full Text Available Military technology is one of the most important factors affecting the evolution of complex societies. In particular, mounted warfare, the use of horse-riders in military operations, revolutionized war as it spread to different parts of Eurasia and Africa during the Ancient and Medieval eras, and to the Americas during the Early Modern period. Here we use a variety of sources to map this spread.

  10. UML modelling of network warfare examples

    CSIR Research Space (South Africa)

    Veerasamy, N

    2011-08-01

    Full Text Available ] Affects both civilian and military domains [8] [9] Related to the concepts of infowar, information operations, hacking, hackivism, cyberterrorism and cybotage depending on motivations and techniques [10] Encompasses both technological solutions...]. In addition, Williers as well as Qingbao and Anwar discuss more offensive aspects of information security and Network Warfare like Hacking, Vulnerability Injection, Network Attacks, Denial of Capability, Interception and Blockage [6] [18] [19]. Various...

  11. Maritime Trade Warfare Against a Modern Power

    Science.gov (United States)

    2013-05-20

    Malaysian and Singaporean support. Operational Environment The previous sections have assessed that an oil embargo would be effective at influencing...will be addressed. The first approach is to stop the trade at its source. This approach forms the foundation of many contemporary sanctions. Under...antisubmarine warfare capable ships, could be sufficient to defend against forces attempting to break a blockade, and a carrier battle group in the Indian Ocean

  12. Navy Operational Planner - Undersea Warfare Module

    Science.gov (United States)

    2016-09-01

    concepts are considered in NOP–USW that are not in previous research: time phasing of missions, mutually exclusive missions, and asset availability...operational planning efforts. NOP–USW suggests the correct allocation of assets across a wide theater of operation to accomplish missions in the...Master’s thesis 4. TITLE AND SUBTITLE NAVY OPERATIONAL PLANNER – UNDERSEA WARFARE MODULE 5. FUNDING NUMBERS 6. AUTHOR(S) Guy A. Molina 7

  13. Army Healthcare Enterprise Management System

    National Research Council Canada - National Science Library

    2001-01-01

    ... to buy the Enterprise Management System. The Information Technology Business Center provides information technology services to Fort Sam Houston tenants which include the Army Medical Command and the Army Medical Department Center and School...

  14. Army Business Transformation - Next Steps

    National Research Council Canada - National Science Library

    2006-01-01

    As a follow-on to the Army Science Board 2005 Summer Study on Best Practices, the Army Science Board was tasked to identify areas where alternative approaches and application of transforming practices...

  15. The Cycle of Warfare - Analysis of an Analytical Model

    DEFF Research Database (Denmark)

    Jensen, Mikkel Storm

    2016-01-01

    by its economic, political and ideological characteristics. With the single assumption of economic rationality in human behaviour, Cycle of Warfare is not only coherent, it is applicable to all entities engaged in competition anywhere in the world at any point in history. The Cycle of Warfare can be used...

  16. Surface Warfare Officers Initial Training For Future Success

    Science.gov (United States)

    2018-03-01

    9 A school is initial rating specific technical training that is given to sailors. 14 Figure 4. Less...NAVAL POSTGRADUATE SCHOOL MONTEREY, CALIFORNIA MBA PROFESSIONAL REPORT SURFACE WARFARE OFFICERS— INITIAL TRAINING FOR FUTURE SUCCESS March 2018...professional report 4. TITLE AND SUBTITLE SURFACE WARFARE OFFICERS—INITIAL TRAINING FOR FUTURE SUCCESS 5. FUNDING NUMBERS 6. AUTHOR(S) Arron J

  17. Anti-Air Warfare Research for Naval Forces

    NARCIS (Netherlands)

    Bloemen, A.A.F.; Witberg, R.

    2000-01-01

    AAW is a warfare area with wide-spread spectrum. Command and Control Systems, sensors, effectors and electronic warfare are integrated to a system, they influence each other and must eventually be effective in coordinated action. This complexity asks for Operations Research methods to measure

  18. Chemical profiling of chemical warfare agents for forensic purposes

    NARCIS (Netherlands)

    Noort, D.; Reuver, L.P.J. de; Fidder, A.; Tromp, M.; Verschraagen, M.

    2010-01-01

    A program has been initiated towards the chemical profiling of chemical warfare agents, in order to support forensic investigations towards synthesis routes, production sites and suspect chemical suppliers. Within the first stage of the project various chemical warfare agents (VX, sulfur mustard,

  19. Hybrid Warfare Studies and Russia’s Example in Crimea

    Directory of Open Access Journals (Sweden)

    Mehmet Seyfettin EROL

    2015-12-01

    Full Text Available Although Hybrid Warfare is an old concept, theoretical studies in the western countries mainly began in the post-Col War era, focusing on asymmetrical threats against conventional superiority of western countries such as USA or Israel. September 11th attacks and 2006 Israel-Lebanon war played important roles for the evolution of hybrid warfare theories. However, there has not any consensus among scholars on a exact or unique definition of hybrid warfare. Hybrid warfare became one of the main security issues for the West and especially for NATO after the Russia-Ukraine crisis. Russian military strategies, called “hybrid warfare” by the western countries, resulted in the successful annexation of Crimea and, caused a serious security problem for the West resulting important structural and functional changes for the military system of NATO. Russian activities, which have been based on surprise, ambiguity and deniability, presented a unique example for hybrid warfare studies.

  20. The use of the saber in the army of Napoleon

    Directory of Open Access Journals (Sweden)

    Gevaert Bert

    2016-04-01

    Full Text Available Though Napoleonic warfare is usually associated with guns and cannons, edged weapons still played an important role on the battlefield. Swords and sabers could dominate battles and this was certainly the case in the hands of experienced cavalrymen. In contrast to gunshot wounds, wounds caused by the saber could be treated quite easily and caused fewer casualties. In 18th and 19th century France, not only manuals about the use of foil and epee were published, but also some important works on the military saber: de Saint Martin, Alexandre Muller… The saber was not only used in individual fights against the enemy, but also as a duelling weapon in the French army.

  1. Army Contract Writing System (ACWS)

    Science.gov (United States)

    2016-03-01

    2016 Major Automated Information System Annual Report Army Contract Writing System (ACWS) Defense Acquisition Management Information Retrieval...Information 4 Responsible Office 4 References 4 Program Description 5 Business Case 5 Program Status 6 Schedule 7 Performance...Program Information Program Name Army Contract Writing System (ACWS) DoD Component Army Responsible Office Program Manager References MAIS

  2. Participation on official proficiency test of the OPCW: case study of Brazilian Army – IDQBRN

    Science.gov (United States)

    Silva, T. C.; Ferreira, C. N.; Cardozo, M.; de Paula, R. L.

    2018-03-01

    In recent years, Brazil has been the scene of international events, gaining worldwide repercussion. However, this increases the risk of terrorist attacks using chemical warfare agents. It brings the need to achieve proficiency to do a quick and unequivocal identification of these dangerous compounds. Thinking about it, the Laboratory of Chemical Analyzes (LAQ) of Brazilian Army has participated since the end of 2010 in the interlaboratory tests promoted by the Organisation for the Prohibition of Chemical Weapons (OPCW). In this article, we discuss about the participation of LAQ in the 40th OPCW Proficiency Test, one more step in the way to become a laboratory designated by OPCW and an international reference.

  3. Nutrition Knowledge and Supplement Use among Elite U.S. Army Soldiers

    National Research Council Canada - National Science Library

    Bovill, Maria E; Tharion, William J; Lieberman, Harris R

    2003-01-01

    A U.S. Army Special Forces (SF) unit was studied to determine the characteristics of those who were dietary supplement users, assess their nutrition knowledge, and identify the nutrition information sources they use. SF-qualified (n=119...

  4. Axial Vircator for Electronic Warfare Applications

    Directory of Open Access Journals (Sweden)

    L. Drazan

    2009-12-01

    Full Text Available This paper deals with a high power microwave generator with virtual cathode – vircator in axial release for electronic warfare applications. The classification of directed energy weapons microwave (DEWM is introduced together with basic block diagrams of a particular class of DEWM. In the paper, methods for designing vircator pulsed power supply, axial vircator structure, measurement methods and experimental results are presented. The vircator in electromagnetic ammunition is powered by magneto-cumulative generator and in weapons for defense of objects (WDO, it is powered by Marx generator. The possible applications of a vircator in the DEWM area are discussed.

  5. Electronic warfare receivers and receiving systems

    CERN Document Server

    Poisel, Richard A

    2014-01-01

    Receivers systems are considered the core of electronic warfare (EW) intercept systems. Without them, the fundamental purpose of such systems is null and void. This book considers the major elements that make up receiver systems and the receivers that go in them.This resource provides system design engineers with techniques for design and development of EW receivers for modern modulations (spread spectrum) in addition to receivers for older, common modulation formats. Each major module in these receivers is considered in detail. Design information is included as well as performance tradeoffs o

  6. Special Operations Doctrine: Is it Needed

    Science.gov (United States)

    2016-12-07

    AOB), eight Special Forces Operational Detachment-Alphas (SFODAs)2, and Civil Affairs and Psychological Operations teams working alongside two bat...Operations doctrine. Sixty years after the Army’s first special operations units were formed, the time had arrived for writing how Army special operations...Affairs, Psychological Operations, and Special Forces, the effort inte- grated the roles and missions of the Ranger Regiment, Special Mission Units, and

  7. The Army Lawyer

    Science.gov (United States)

    2007-07-01

    authors in the articles do not necessarily reflect the view of The Judge Advocate General or the Department of the Army. Masculine or feminine...for the hegemonic power (read ‘United States’) and its followers to determine international public enemy on a case-by-case basis. A legal

  8. Army Sustainability Report 2010

    Science.gov (United States)

    2011-09-01

    the Fairfax Village Neighborhood Center’s native plant and butterfly garden. The center is the first LEED platinum military project (photo: US Army... Bush in 2007. 11 Statement of Deputy Under Secretary of Defense for Strategy, Plans, and Forces, Kathleen Hicks before the Senate Environment and

  9. Studies on residue-free decontaminants for chemical warfare agents.

    Science.gov (United States)

    Wagner, George W

    2015-03-17

    Residue-free decontaminants based on hydrogen peroxide, which decomposes to water and oxygen in the environment, are examined as decontaminants for chemical warfare agents (CWA). For the apparent special case of CWA on concrete, H2O2 alone, without any additives, effectively decontaminates S-2-(diisopropylamino)ethyl O-ethyl methylphosphonothioate (VX), pinacolyl methylphosphorofluoridate (GD), and bis(2-choroethyl) sulfide (HD) in a process thought to involve H2O2 activation by surface-bound carbonates/bicarbonates (known H2O2 activators for CWA decontamination). A plethora of products are formed during the H2O2 decontamination of HD on concrete, and these are characterized by comparison to synthesized authentic compounds. As a potential residue-free decontaminant for surfaces other than concrete (or those lacking adsorbed carbonate/bicarbonate) H2O2 activation for CWA decontamination is feasible using residue-free NH3 and CO2 as demonstrated by reaction studies for VX, GD, and HD in homogeneous solution. Although H2O2/NH3/CO2 ("HPAC") decontaminants are active for CWA decontamination in solution, they require testing on actual surfaces of interest to assess their true efficacy for surface decontamination.

  10. Annihilating time and space: The electrification of the United States Army, 1875--1920

    Science.gov (United States)

    Brown, Shannon Allen

    2000-10-01

    The United States Army embraced electrical technology in the 1870s as part of a wider initiative to meet the challenge of the coastal defense mission. As commercial power storage, generation, and transmission technology improved and the army came to recognize the value of the energy source as a means and method of improving command and control, localized electrical networks were integrated into the active service of the military. New vulnerabilities emerged as the army became ever more reliant upon electric power, however, and electrification---the institutional adoption and adaptation of electrical technologies---emerged as a very expensive and contentious process guided by technical, political, and economic pressures, and influenced by conflicting personalities within the service. This study considers the institutional evolution of the U.S. Army before and during World War I with respect to the adoption and application of electrical technology. The changing relationships between the military and electrical manufacturing and utilities industries during the period 1875--1920 are also explored. Using a combination of military archival sources and published primary materials, this study traces the effects of electrification on the army. In the end, this study proves that electrification was, at first, a symptom of, and later, a partial solution to the army's struggle to modernize and centralize during the period under consideration. Electrification produced a set of conditions that encouraged a new maturity within the ranks of the army, in technical, doctrinal, and administrative terms. This growth eventually led to the development of new capabilities, new forms of military organization, new missions, and new approaches to warfare.

  11. Thought about Strategic Demonstration Simulation Warfare Experiment%关于战略级推演模拟型作战实验的思考

    Institute of Scientific and Technical Information of China (English)

    周绍亮; 李雄; 董斐; 付佳

    2011-01-01

    Abstract:Based on classification of warfare experiments, the concept of strategic demonstration simulation warfare experiment is defined. From the standpoint of establishment of national strategic goals, grasping of international situation and education of joint operation command talents, the function and signification of strategic demonstration simulation warfare experiment are discussed. The basic requirements on military strategic policy, coordinated development of army construction and military operations, warfare lab and warfare experiment technologies are analyzed. The strategic demonstration simulation warfare lab is designed by presenting its functional framework, logic concept framework and running mode. The research results provide theoretical reference to promoting innovation development of warfare experiment.%摘要:在划分作战实验类别的基础上,界定了战略级推演模拟型作战实验的基本概念;从国家战略目标确立、国际局势把握、联合作战指挥人才培养的角度,阐述了战略级推演模拟型作战实验的作用及意义;从以军事战略方针为指导、与军队建设和军事作战协调发展、以作战实验机构为依托、以作战实验技术手段为支撑的角度,分析了战略级推演模拟型作战实验的基本要求;从功能结构、逻辑概念结构、运行模式的角度,进行了战略级推演模拟型作战实验室的初步设计。研究结果可为推动作战实验的创新发展提供理论参考。

  12. History of chemical and biological warfare agents

    International Nuclear Information System (INIS)

    Szinicz, L.

    2005-01-01

    Chemical and biological warfare agents constitute a low-probability, but high-impact risk both to the military and to the civilian population. The use of hazardous materials of chemical or biological origin as weapons and for homicide has been documented since ancient times. The first use of chemicals in terms of weapons of mass destruction goes back to World War I, when on April 22, 1915 large amounts of chlorine were released by German military forces at Ypres, Belgium. Until around the 1970s of the 20th century, the awareness of the threat by chemical and biological agents had been mainly confined to the military sector. In the following time, the development of increasing range delivery systems by chemical and biological agents possessors sensitised public attention to the threat emanating from these agents. Their proliferation to the terrorists field during the 1990s with the expanding scale and globalisation of terrorist attacks suggested that these agents are becoming an increasing threat to the whole world community. The following article gives a condensed overview on the history of use and development of the more prominent chemical and biological warfare agents

  13. History of chemical and biological warfare agents.

    Science.gov (United States)

    Szinicz, L

    2005-10-30

    Chemical and biological warfare agents constitute a low-probability, but high-impact risk both to the military and to the civilian population. The use of hazardous materials of chemical or biological origin as weapons and for homicide has been documented since ancient times. The first use of chemicals in terms of weapons of mass destruction goes back to World War I, when on April 22, 1915 large amounts of chlorine were released by German military forces at Ypres, Belgium. Until around the 1970s of the 20th century, the awareness of the threat by chemical and biological agents had been mainly confined to the military sector. In the following time, the development of increasing range delivery systems by chemical and biological agents possessors sensitised public attention to the threat emanating from these agents. Their proliferation to the terrorists field during the 1990s with the expanding scale and globalisation of terrorist attacks suggested that these agents are becoming an increasing threat to the whole world community. The following article gives a condensed overview on the history of use and development of the more prominent chemical and biological warfare agents.

  14. [Decontamination of chemical and biological warfare agents].

    Science.gov (United States)

    Seto, Yasuo

    2009-01-01

    Chemical and biological warfare agents (CBWA's) are diverse in nature; volatile acute low-molecular-weight toxic compounds, chemical warfare agents (CWA's, gaseous choking and blood agents, volatile nerve gases and blister agents, nonvolatile vomit agents and lacrymators), biological toxins (nonvolatile low-molecular-weight toxins, proteinous toxins) and microbes (bacteria, viruses, rickettsiae). In the consequence management against chemical and biological terrorism, speedy decontamination of victims, facilities and equipment is required for the minimization of the damage. In the present situation, washing victims and contaminated materials with large volumes of water is the basic way, and additionally hypochlorite salt solution is used for decomposition of CWA's. However, it still remains unsolved how to dispose large volumes of waste water, and the decontamination reagents have serious limitation of high toxicity, despoiling nature against the environments, long finishing time and non-durability in effective decontamination. Namely, the existing decontamination system is not effective, nonspecifically affecting the surrounding non-target materials. Therefore, it is the urgent matter to build up the usable decontamination system surpassing the present technologies. The symposiast presents the on-going joint project of research and development of the novel decontamination system against CBWA's, in the purpose of realizing nontoxic, fast, specific, effective and economical terrorism on-site decontamination. The projects consists of (1) establishment of the decontamination evaluation methods and verification of the existing technologies and adaptation of bacterial organophosphorus hydrolase, (2) development of adsorptive elimination technologies using molecular recognition tools, and (4) development of deactivation technologies using photocatalysis.

  15. Army Communicator. Volume 37, Number 3, Fall 2012

    Science.gov (United States)

    2012-01-01

    today. From dismounted Special Operations Forces to the White House Communications Agency, UFO is used to provide reliable beyond line of sight...TCM-TR - Capability Manager for Tactical Radios TRADOC - U.S. Army Training and Doctrine Command UHF - Ultra High Frequency UFO - UHF Follow-On

  16. Department of the Army - The Fiscal Year 2008 Military Personnel, Army Appropriation and the Antideficiency Act

    Science.gov (United States)

    2010-06-22

    of the Army, U.S. Army Audit Agency, Budgeting for the Military Personnel, Army Appropriation, Report No. A-2010-0028- FFM (Jan. 6, 2010); Department...of the Army, U.S. Army Audit Agency, Military Personnel, Army FY 05 Subsistence Charges, Report No. A-2008-0037- FFM (Feb. 12, 2008); Department of

  17. Army Programs: Army Finance and Accounting Quality Assurance Program

    National Research Council Canada - National Science Library

    1988-01-01

    This regulation discusses the primary responsibilities of commanders and staff officers at installation and higher levels for execution of the Army Finance and Accounting Quality Assurance (QA) Program...

  18. Information Warfare: Defining the Legal Response to An Attack

    National Research Council Canada - National Science Library

    Pottorff, James

    1999-01-01

    This paper discusses the difficulty in determining whether an information warfare attack, such as a computer virus, can be treated as an "armed attack" for purposes of national defense under the United Nations charter. As the U.S...

  19. Irregular Warfare: Impact on Future Professional Military Education

    National Research Council Canada - National Science Library

    Paschal, David G

    2006-01-01

    ... to operate effectively in an irregular warfare environment. The utility of a decisive war between nation states continues to decline and will eventually reach critical mass based upon the extreme imbalance of military power and a U.S. monopoly...

  20. FFT Based VLSI Digital One Bit Electronic Warfare Receiver

    National Research Council Canada - National Science Library

    Chien-In, Henry

    1998-01-01

    ... (1 GHz) digital receiver designed for electronic warfare applications. The receiver can process two simultaneous signals and has the potential for fabrication on a single multi-chip module (MCM...

  1. Back to the Basics: An Aviation Solution to Counterinsurgent Warfare

    National Research Council Canada - National Science Library

    Davis, Arthur D

    2005-01-01

    .... By examining past examples of the use of air power in counterinsurgent warfare, this study sheds light on the United States' current failings in both equipment and doctrine as it wages this type of war...

  2. Irregular Warfare: New Challenges for Civil-Military Relations

    National Research Council Canada - National Science Library

    Cronin, Patrick M

    2008-01-01

    .... Irregular warfare introduces new complications to what Eliot Cohen has called an unequal dialogue between civilian and military leaders in which civilian leaders hold the true power but must modulate...

  3. Echoes of Chechnya Warfare Resound in Moscow, Quantico

    National Research Council Canada - National Science Library

    Ackerman, Robert

    2000-01-01

    .... thinking about urban warfare. After suffering stunning public defeats just a few years ago, Russian forces applied painful lessons learned then to drive Chechen forces out of their capital city, Grozny, this year...

  4. zero day exploits and national readiness for cyber-warfare

    African Journals Online (AJOL)

    HOD

    A zero day vulnerability is an unknown exploit that divulges security flaws in software before such a flaw is publicly ... Keywords: exploits, zero day, vulnerability, cyberspace, cyber-warfare. 1. ..... industries and companies across the globe. The.

  5. The Role of Airpower in Urban Warfare. An Airman's Perspective

    National Research Council Canada - National Science Library

    Saffold, Timothy

    1998-01-01

    .... This emphasis on surface force employment stifles innovative thought as to how military forces can achieve operational and strategic effects by employing airpower as the key instrument of force in urban warfare...

  6. Fourth Generation Warfare: The Need for a Comprehensive Approach

    National Research Council Canada - National Science Library

    Benton, LeRoy D

    2008-01-01

    .... A definition of Fourth Generation Warfare is developed, based on Col. Thomas X. Hammes' writings. The definition is further developed to show relevance and applicability to current operations in the Long War on Terrorism...

  7. Union Directions - Army Response.

    Science.gov (United States)

    1985-12-06

    reflects the long-held belief in the Army that employee participation in decisions that affect their worklife is healthy and desirable. Although some...pluralistic society, checks and balances are as important for the economy as for the government. Business executives who salivate at the thought of vanishing...Unions. Reading, MA: Addison-Wesley, 1976. 37. National Federation of Federal Employees. NFFE’s Guide to Quality of Worklife Programs. No. G-21

  8. Operationalizing Army Cyber

    Science.gov (United States)

    2013-03-01

    killed just under 3,000 people and cost the U.S. economy somewhere between three and five trillion dollars. The Japanese attacked with a state... economy , and military readiness. The challenge is to design an Army Cyber force that can support the United States Cyber Command (USCYBERCOM) national...still keeps the intelligence and signal functions separate in most units today from battalion to echelon above Corps ( EAC ). There are many past reasons

  9. 2007 Army Modernization Plan

    Science.gov (United States)

    2007-03-01

    Additional confi gurations include two NATO li ers with patients and one medical a endant. The aircra has a hoist for use in emergency...including airframes, wiring bundles and hydraulic systems on the remanufactured CH-47Fs are new. Program Status. The Army received its fi rst fully...Expansible Van and the 10T Dump Truck. Another new variant, the FMTV-Load Handling System, is expected to be fi elded in late-2007, initially to medical

  10. 1998 Army Modernization Plan

    Science.gov (United States)

    1998-01-01

    Biological (CB) Protective Duty Uniform (STO) • Biometrics (SRO) • Nanoscience (SRO) • Millimeter Wave Material and Dissemination Technology... Biometrics and Nanoscience SROs will enable the development of advanced NBC detection and characterization systems, including the exploitation of biologically...Requirements Trailers • Procure HEMAT Trailers Figure K-23 K-19 //;<?. U.S. Army 1997Modernization Plan This final fleet assessment, made against the

  11. Towards a framework for a network warfare capability

    CSIR Research Space (South Africa)

    Veerasamy, N

    2008-07-01

    Full Text Available . These include the legal issues, ethical dilemmas, technical solutions, financial impact and skill/manpower investment. Logical constraints/implications have been grouped together in the discussion that follows. 5.1.1 Legal Ethical Issues As network warfare... but the underlying causes of crime also needs to be understood. Ethics and morals play a significant role in determining the personality traits of an individual. Users will need to balance ethical dilemmas before engaging in offensive network warfare. Computers...

  12. Strategy in the Robotic Age: A Case for Autonomous Warfare

    Science.gov (United States)

    2014-09-01

    enabling technology that augments human performance, such as exoskeleton suits, and other complementary fields that make robotics function...philosophy of maneuver warfare with new technologies from the Robotic Age, such as unmanned systems and exoskeleton suits, to present a new warfighting...and Brimley, “20YY,” 12. 49 the exoskeleton suit, but rather that the full benefit of autonomous warfare will be achieved by leveraging mass and

  13. The Other Quiet Professionals: Lessons for Future Cyber Forces from the Evolution of Special Forces

    Science.gov (United States)

    2014-01-01

    tions Command), John Mense (INSCOM), Paul Schuh (JFCC-NW), Russell Fenton (U.S. Army Network Enterprise Technology Command), and CW5 Todd Boudreau and...Surdu, 2009, pp. 16–17). Doctrine Irregular warfare and SOF doctrine lagged operational activities after the Vietnam War and prior to the...forces are, at their operating core, small teams of highly skilled specialists, and both communities value skilled personnel above all else. Irregular

  14. Army Healthcare Enterprise Management System

    National Research Council Canada - National Science Library

    2001-01-01

    .... The complaint alleged that the Army Healthcare Enterprise Management System was not properly competed, potential conflicts of interest existed, and possible contract performance problems existed...

  15. The Impacts of Modern Warfare on Freshwater Ecosystems

    Science.gov (United States)

    Francis, Robert A.

    2011-11-01

    There is increasing recognition and concern regarding the impacts of modern industrial warfare on the environment. Freshwater ecosystems are perhaps the most vulnerable to warfare-related impacts, which is of concern given that they provide so many essential environmental resources and services to society. Despite this, there has been little work to establish and quantify the types of impacts (both negative and positive) that warfare may have on such systems. This paper firstly highlights why rivers and lakes may be susceptible to warfare-related impacts, before synthesizing the available literature to explore the following main themes: intensification of wartime resource acquisition, use of water as an offensive or defensive weapon, direct and indirect effects of explosive ordnance, increased pollution, introduction of invasive alien species, and positive ecological impacts. This is then followed by a discussion of the implications of such impacts in relation to future warfare, including a consideration of the efficacy of existing legal instruments to protect the environment during conflict, and the trend for war to become more localized and `informal', and therefore less regulated. Finally, the paper identifies key research foci for understanding and mitigating the effects of warfare on freshwater ecosystems.

  16. Information Warfare, Threats and Information Security

    Directory of Open Access Journals (Sweden)

    Dmitriy Nikolaevich Bespalov

    2014-01-01

    Full Text Available The article presents the opposite, but dependent on each other's reality - Revolutionary War information,information security goals and objectives of their study within the scheme "challenge-response", methodological and analytical support, the role of elites and the information society in promoting information security. One of the features of contemporaneityis the global spread of ICT, combined with poor governance and other difficulties in the construction of innovation infrastructures that are based on them in some countries. This leads to the reproduction of threats, primarily related to the ability to use ICT for purposes that are inconsistent with the objectives of maintaining international peace and security, compliance with the principles of non-use of force, non-interference in the internal affairs of states, etc. In this regard, include such terms as "a threat of information warfare", "information terrorism" and so forth. Information warfare, which stay in the policy declared the struggle for existence, and relationships are defined in terms of "friend-enemy", "ours-foreign". Superiority over the opponent or "capture of its territory" is the aim of political activity. And information security, serving activities similar process of political control, including a set of components, is a technology until their humanitarian. From the context and the decision itself is the ratio of the achieved results of information and political influence to the target - a positive image of Russia. Bringing its policy in line with the demands of a healthy public opinion provides conductivity of theauthorities initiatives in the country and increases the legitimacy of the Russian Federation actions in the world.

  17. The Human Domain and the Future of Army Warfare: Present as Prelude to 2050

    Science.gov (United States)

    2017-07-01

    future that leaves the U.S. in a position of leadership , though perhaps in a diminished role. Democratization of technologies and governments will have...unlike that of the past—trading large, open expanses of terrain for sprawling, dense urban centers. Likewise, the democratization of technology will...strategic advantage due to the democratization of technologies and the ease with which such technologies can be defeated. I then consider social trends

  18. Innovative Leader Development: Evaluation of the U.S. Army Asymmetric Warfare Adaptive Leader Program

    Science.gov (United States)

    2014-01-01

    These changes can be seen by the increasing darker gray and black segments in each pair of stacked bars in the figures. Dimensions showing the greatest...Psychologist, Vol. 86, No. 10, 1986, pp. 1040–1048. Entin, Eileen B., Elliot E. Entin, Jean MacMillan, and Daniel Serfaty, Structuring and Training

  19. The 2006 Lebanon Campaign and the Future of Warfare: Implications for Army and Defense Policy

    National Research Council Canada - National Science Library

    Biddle, Stephen; Friedman, Jeffrey A

    2008-01-01

    .... Stephen Biddle of the Council on Foreign Relations and Mr. Jeffrey Friedman, Harvard Kennedy School of Government, seeks to inform this debate by examining in detail Hezbollah's conduct of the 2006 campaign...

  20. Warfare, army and soldiers in Santayana’s thoughts and life

    Directory of Open Access Journals (Sweden)

    Luis ARIAS GONZÁLEZ

    2017-06-01

    Full Text Available George Santayana’s life (1863-1952 and thought, constitute in themselves a fundamental historical event and also represent a crucial period in history. The present article analyses Santayana’s vision of the war as a phenomenon and also the role played by the Military Forces in Society. The article also explains his positioning with respect to the wars which took place in his days: The Cuban War, The First World War and the Spanish Civil War. On the other hand, a reconstruction of his family’s military background, together with his living experiences both in Spain and in the United States, provide an insight into Santayana as a character and into his ideas.

  1. U. S. Army Land Warfare Laboratory. Volume II Appendix B. Task Sheets

    Science.gov (United States)

    1974-06-01

    Also, a plastic artificial ground plane was tested in conjunction with some of the experimental helical monopoles , since these antennas were found to...provided in each kit, converts any beer can into a live trap for field mice . An aspirator facilitates handling of ectoparasites by functioning by...provides a means of backpack transport of 100 mice or 100 weanling hamsters to and from remote areas for the purpose of performing epidemiological

  2. Listening to Historys Rhyme:Preparing the United States Army for Future Irregular Warfare

    Science.gov (United States)

    2014-04-01

    December 2007), 10. 44. Mission: Readiness, Too Fat to Fight: Retired Military Leaders Want Junk Food Out of Schools (Washington, DC, April 2010), 2...Politics and Strategy 50, no. 1 (February-March 2008): 19-30. Mission: Readiness. Too Fat to Fight: Retired Military Leaders Want Junk Food Out

  3. Redefining Information Warfare Boundaries for an Army in a Wireless World

    Science.gov (United States)

    2013-01-01

    development. For example, such a generic requirement might involve detection, identification, tracking, and kill - ing a class of targets by nonkinetic...Merging Information Operations and Psychological Operations,” Military Review, January–February 2008, pp. 108–111. Rosin, Randolph, “To Kill a... Mockingbird : The Deconstruction of Information Operations,” Small Wars Journal, August 17, 2009. As of December 6, 2010: http://smallwarsjournal.com/blog

  4. Special Operations, Irregular Warfare, and Operational Art: A Theory of Special Operations

    Science.gov (United States)

    2013-12-10

    is mostly but not wholly a land phenomenon. Naval forces have combatted maritime irregulars such as pirates for millennia, for example see: Plutarch ...SW2502SocialMediaAndUW.html (accessed June 15, 2013). Plaster, John L. SOG: Secret Wars of America’s Commandos in Vietnam. New York: Simon & Schuster, 1997. Plutarch

  5. Army Blast Claims Evaluation Procedures

    Science.gov (United States)

    1994-03-01

    ATIN: AFZX-JA Building 4551 Fort Polk, LA 71459-5000 Commander U.S. Army Engineer Center and Fort Leonard Wood ATIN: AlZT-JA Building 1706 East...U.S. Armed Forces Claims Service, Korea APO AP 96205-0084 No. of Copies Organization 1 Commander U.S. Army South ATI’N: SOJA Building 154 APO

  6. The Army Study Program.

    Science.gov (United States)

    1980-10-09

    STUDDIES BY CATEGORY STUDY TITLE SPONSOR NMtTHOO PPA ADM RE:MOTE LINK PRUG DARCOM CONTRACT ADV TECH MODEL FULL DARCON CONTRACT ARMY COMMAND ANDi CONTROL...HOUUSE NUN -RLCURRIN 1 LMANUS DARCON I"-HUSL FF-TH-hLLI TM~k ECUNLNI(. ANALYSIS DARCOM CUNTRALT FOR SFELTKUM ANALYZERS UPLRA1IUN&L FLt)AI/EKPSL TKADL...TECHNULOGY A5 AESM:NT TRADOC bUTH *TEN YEAR INSTRUMENTATIOft ANALYSkIS OCSA ot" PHASE I TERRAIN MODELS DARCOM bUTH lEST CRITLRIA FUOR NUN -IIILLL-K WEAPUN

  7. Nuclear, biological and chemical warfare. Part I: Medical aspects of nuclear warfare.

    Science.gov (United States)

    Kasthuri, A S; Pradhan, A B; Dham, S K; Bhalla, I P; Paul, J S

    1990-04-01

    Casualties in earlier wars were due much more to diseases than to weapons. Mention has been made in history of the use of biological agents in warfare, to deny the enemy food and water and to cause disease. In the first world war chemical agents were used to cause mass casualties. Nuclear weapons were introduced in the second world war. Several countries are now involved in developing nuclear, biological and chemical weapon systems, for the mass annihilation of human beings, animals and plants, and to destroy the economy of their enemies. Recently, natural calamities and accidents in nuclear, chemical and biological laboratories and industries have caused mass instantaneous deaths in civilian population. The effects of future wars will not be restricted to uniformed persons. It is time that physicians become aware of the destructive potential of these weapons. Awareness, immediate protective measures and first aid will save a large number of persons. This series of articles will outline the medical aspects of nuclear, biological and chemical weapon systems in three parts. Part I will deal with the biological effects of a nuclear explosion. The short and long term effects due to blast, heat and associated radiation are highlighted. In Part II, the role of biological agents which cause commoner or new disease patterns is mentioned. Some of the accidents from biological warfare laboratories are a testimony to its potential deleterious effects. Part III deals with medical aspects of chemical warfare agents, which in view of their mass effects can overwhelm the existing medical resources, both civilian and military.(ABSTRACT TRUNCATED AT 250 WORDS)

  8. Using Agent Based Distillation to Explore Issues Related to Asymmetric Warfare

    Science.gov (United States)

    2009-10-01

    official definition of asymmetric warfare , considering that its use was redundant to irregular warfare [30]. 2 Such as the Lanchester Equations...RTP-MP-MSG-069 23 - 1 Using Agent Based Distillation to Explore Issues Related to Asymmetric Warfare Martin Adelantado, Jean-Michel Mathé...shows that both conventional and asymmetric warfare are characterised by nonlinear behaviours and that engagement is a Complex Adaptive System (CAS

  9. Transport and Reactivity of Decontaminants to Provide Hazard Mitigation of Chemical Warfare Agents from Materials

    Science.gov (United States)

    2016-06-01

    2013 4. TITLE AND SUBTITLE Transport and Reactivity of Decontaminants to Provide Hazard Mitigation of Chemical Warfare Agents from Materials 5a...directions for future decontamination formulation approaches. 15. SUBJECT TERMS GD HD Decontamination Hazard mitigation VX Chemical warfare agent... DECONTAMINANTS TO PROVIDE HAZARD MITIGATION OF CHEMICAL WARFARE AGENTS FROM MATERIALS 1. INTRODUCTION Decontamination of materials is the

  10. 76 FR 66282 - Army Educational Advisory Committee

    Science.gov (United States)

    2011-10-26

    ... Committee: U.S. Army War College Subcommittee of the Army Education Advisory Committee. Dates of Meeting: November 15, 2011. Place of Meeting: U.S. Army War College, 122 Forbes Avenue, Carlisle, PA, Command... issues and matters related to the continued growth and development of the United States Army War College...

  11. 76 FR 72914 - Army Educational Advisory Committee

    Science.gov (United States)

    2011-11-28

    ...: U.S. Army War College Subcommittee of the Army Education Advisory Committee. Dates of Meeting: December 14, 2011. Place of Meeting: U.S. Army War College, 122 Forbes Avenue, Carlisle, PA, Command... issues and matters related to the continued growth and development of the United States Army War College...

  12. Russian New Art of Hybrid Warfare in Ukraine

    Directory of Open Access Journals (Sweden)

    Rusnáková Soňa

    2017-10-01

    Full Text Available The main aim of this paper is to analyse the annexation of Crimea by the Russian Federation. For the purposes of the paper, the theory of hybrid warfare was chosen as an analytical category. Throughout the paper, the concept of hybrid warfare is examined and applied on case study of Crimean annexation. Hybrid warfare, especially in connection with Russian actions in Crimea has been an intensely debated concept. There is an ongoing debate among scholars concerning the meaning of the concept, its existence and employment by the Russian Federation. This paper showed that the article of Valeriy Gerasimov – the incumbent Chief of the General Staff of the Russian Federation-invoked a new warfare strategy for the Russian Federation which was consequently for the very first time in its full spectre and effectivity employed on case of Crimean annexation in March 2014. Observing the application of the hybrid warfare in practice serves the purposes of countering its further potential application in post-Soviet space and Russian ‘near abroad’.

  13. Nondestructive inspection of chemical warfare based on API-TOF

    International Nuclear Information System (INIS)

    Wang Xinhua; Zheng Pu; He Tie; An Li; Yang Jie; Fan Yu

    2013-01-01

    Background: Real-time, fast, accurate, nondestructive inspection (NDI) and quantitative analysis for chemical warfare are very imperative for chemical defense, anti-terror and nation security. Purpose: Associated Particles Technique (APT)/Neutron Time of Flight (TOF) has been developed for non-invasive inspection of sealed containers with chemical warfare agents. Methods: A prototype equipment for chemical warfare is consisted of an APT neutron generator with a 3×3 matrix of semiconductor detectors of associated alpha-particles, the shielding protection of neutron and gamma-ray, arrayed NaI(Tl)-based detectors of gamma-rays, fully-digital data acquisition electronics, data analysis, decision-making software, support platform and remote control system. Inelastic scattering gamma-ray pulse height spectra of sarin, VX, mustard gas and adamsite induced by 14-MeV neutron are measured. The energies of these gamma rays are used to identify the inelastic scattering elements, and the intensities of the peaks at these energies are used to reveal their concentrations. Results: The characteristic peaks of inelastic scattering gamma-ray pulse height spectra show that the prototype equipment can fast and accurately inspect chemical warfare. Conclusion: The equipment can be used to detect not only chemical warfare agents but also other hazardous materials, such as chemical/toxic/drug materials, if their chemical composition is in any way different from that of the surrounding materials. (authors)

  14. Numerical simulation of RCS for carrier electronic warfare airplanes

    Directory of Open Access Journals (Sweden)

    Yue Kuizhi

    2015-04-01

    Full Text Available This paper studies the radar cross section (RCS of carrier electronic warfare airplanes. Under the typical naval operations section, the mathematical model of the radar wave’s pitch angle incidence range analysis is established. Based on the CATIA software, considering dynamic deflections of duck wing leading edge flaps, flaperons, horizontal tail, and rudder, as well as aircraft with air-to-air missile, anti-radiation missile, electronic jamming pod, and other weapons, the 3D models of carrier electronic warfare airplanes Model A and Model B with weapons were established. Based on the physical optics method and the equivalent electromagnetic flow method, by the use of the RCSAnsys software, the characteristics of carrier electronic warfare airplanes’ RCS under steady and dynamic flights were simulated under the UHF, X, and S radar bands. This paper researches the detection probability of aircraft by radars under the condition of electronic warfare, and completes the mathematical statistical analysis of the simulation results. The results show that: The Model A of carrier electronic warfare airplane is better than Model B on stealth performance and on discover probability by radar detection effectively.

  15. Matrix organizational structure and its effect on Army acquisition program management offices

    OpenAIRE

    Ostrowski, Paul Adam.

    1996-01-01

    With the implementation of the Defense Management Review, and publications of DoD Directive 5000.1 and DoD 5OOO.2-R, the Army was mandated to restructure program offices with the intent of cutting waste and fraud within the defense acquisition process. The goal was to establish an organizational structure which could operate efficiently in an environment of shrinking budgets and increasing technical specialization. To address this challenge, the Army followed the aerospace industry's lead, an...

  16. [The re-introduction of malaria in the Pontine Marshes and the Cassino district during the end of World War II. Biological warfare or global war tactics?].

    Science.gov (United States)

    Sabbatani, Sergio; Fiorino, Sirio; Manfredi, Roberto

    2013-12-01

    After the fall of the Fascist regime on September 8, 1943, Italy was split into two parts: (i) the Southern regions where the King Victor Emanuel III and the military general staff escaped was under the control of English-American allied armies, and (ii) the northern regions comprising Lazio, Tuscany, Umbria, and Marche still under the control of the Germans. The German Wehrmacht, after suffering several defeats on Southern lines, established a new strengthened line of defence called the Gustav line, located south of Rome and crossing in the western portion the recently-drained Pontine Marshes. In his book published in 2006, Frank Snowden hypothesised that occupying German armies in 1943 had initiated a programme of re-flooding the Pontine plain as a biological warfare strategy to re-introduce malaria infection in the territories south of Rome, Such a plan was intended (i) to slow down the advance of English-American forces, and (ii) to punish Italians who abandoned their former allies. Other authors, including Annibale Folchi, Erhard Geissler, and Jeanne Guillemin, have disputed this hypothesis based on an analysis of recently-uncovered archive documents. What is not disputed is that the flooding of the Pontine and Roman plains in 1943 contributed to a severe malaria epidemic in 1944, which was associated with exceptionally high morbidity and mortality rates in the afflicted populations. Herein, we critically evaluate the evidence and arguments of whether the Wehrmacht specifically aimed to spread malaria as a novel biological warfare strategy in Italy during the Second World War. In our opinion, evidence for specific orders to deliberately spread malaria by the German army is lacking, although the strategy itself may have been considered by Nazis during the waning years of the war.

  17. [Decontamination of chemical warfare agents by photocatalysis].

    Science.gov (United States)

    Hirakawa, Tsutomu; Mera, Nobuaki; Sano, Taizo; Negishi, Nobuaki; Takeuchi, Koji

    2009-01-01

    Photocatalysis has been widely applied to solar-energy conversion and environmental purification. Photocatalyst, typically titanium dioxide (TiO(2)), produces active oxygen species under irradiation of ultraviolet light, and can decompose not only conventional pollutants but also different types of hazardous substances at mild conditions. We have recently started the study of photocatalytic decontamination of chemical warfare agents (CWAs) under collaboration with the National Research Institute of Police Science. This article reviews environmental applications of semiconductor photocatalysis, decontamination methods for CWAs, and previous photocatalytic studies applied to CWA degradation, together with some of our results obtained with CWAs and their simulant compounds. The data indicate that photocatalysis, which may not always give a striking power, certainly helps detoxification of such hazardous compounds. Unfortunately, there are not enough data obtained with real CWAs due to the difficulty in handling. We will add more scientific data using CWAs in the near future to develop useful decontamination systems that can reduce the damage caused by possible terrorism.

  18. How Do I Know? A Guide to the Selection of Personal Protective Equipment for Use in Responding to A Release of Chemical Warfare Agents

    Energy Technology Data Exchange (ETDEWEB)

    Foust, C.B.

    1999-05-01

    An incident involving chemical warfare agents requires a unique hazardous materials (HAZMAT) response. As with an HAZMAT event, federal regulations prescribe that responders must be protected from exposure to the chemical agents. But unlike other HAZMAT events, special considerations govern selection of personal protective equipment (PPE). PPE includes all clothing, respirators and monitoring devices used to respond to a chemical release. PPE can differ depending on whether responders are military or civilian personnel.

  19. Portraying the Army Reserve Components in Army War Games and Exercises

    National Research Council Canada - National Science Library

    Dillon, Dick

    2002-01-01

    .... Ensuring that accuracy and realism was the primary purpose of the Role of the Army National Guard and Army Reserve in Army Exercises workshop conducted at the Collins Center for Strategic Leadership from 23-26 September 2002.

  20. Biomaterials for mediation of chemical and biological warfare agents.

    Science.gov (United States)

    Russell, Alan J; Berberich, Jason A; Drevon, Geraldine F; Koepsel, Richard R

    2003-01-01

    Recent events have emphasized the threat from chemical and biological warfare agents. Within the efforts to counter this threat, the biocatalytic destruction and sensing of chemical and biological weapons has become an important area of focus. The specificity and high catalytic rates of biological catalysts make them appropriate for decommissioning nerve agent stockpiles, counteracting nerve agent attacks, and remediation of organophosphate spills. A number of materials have been prepared containing enzymes for the destruction of and protection against organophosphate nerve agents and biological warfare agents. This review discusses the major chemical and biological warfare agents, decontamination methods, and biomaterials that have potential for the preparation of decontamination wipes, gas filters, column packings, protective wear, and self-decontaminating paints and coatings.

  1. Lanchester-Type Models of Warfare, Volume II

    OpenAIRE

    Taylor, James G.

    1980-01-01

    This monograph is a comprehensive treatist on Lanchester-type models of warfare, i.e. differential-equation models of attrition in force-on-force combat operations. Its goal is to provide both an introduction to and current-state-of-the-art overview of Lanchester-type models of warfare as well as a comprehensive and unified in-depth treatment of them. Both deterministic as well as stochastic models are considered. Such models have been widely used in the United States and elsewhere for the...

  2. Theory of information warfare: basic framework, methodology and conceptual apparatus

    Directory of Open Access Journals (Sweden)

    Олександр Васильович Курбан

    2015-11-01

    Full Text Available It is conducted a comprehensive theoretical study and determine the basic provisions of the modern theory of information warfare in on-line social networks. Three basic blocks, which systematized the theoretical and methodological basis of the topic, are established. There are information and psychological war, social off-line and on-line network. According to the three blocks, theoretical concepts are defined and methodological substantiation of information processes within the information warfare in the social on-line networks is formed

  3. Hybrid warfare of the USA in South America

    Directory of Open Access Journals (Sweden)

    A. V. Budaev

    2015-01-01

    Full Text Available Washington’s hybrid warfare in Latin American region differs by its inventive and sophisticated methods and in fact represents a complex and multidimensional phenomenon including symbiosis of the “soft” and “hard” power as well as their combination in the form of the “smart power”. The increasing importance of hybrid warfare technologies in the US foreign policy in Latin America predetermines the necessity of thorough studies and analysis of this phenomenon for providing Russian interests.

  4. Increasing Army Retention Through Incentives

    National Research Council Canada - National Science Library

    Beerman, Kevin

    2006-01-01

    .... If the Army fails to address the enlisted retention issue in the near future departures of experienced NCOs will have a detrimental impact our military's ability to provide for our nation's security...

  5. Christian Contributions to Army Values

    National Research Council Canada - National Science Library

    D'Emma, Gregory

    2000-01-01

    .... The Army builds the soldier's heart, spirit, and soul by the values we instill. Over the years these values of loyalty, duty, respect, selfless service, honor, integrity, and personal courage have been trained and reinforced...

  6. Racial Extremism in the Army

    National Research Council Canada - National Science Library

    Hudson, Walter M

    1998-01-01

    ... modem phenomenon of "skinheads." I then discuss the history of white supremacist extremism in the Army, culminating in the December, 1995 murders of two black civilians by soldiers assigned to the 82d Airborne Division at Fort Bragg, North Carolina...

  7. Robotics In Manufacturing: Army View

    Science.gov (United States)

    Michel, F. J.

    1983-05-01

    (Figure 1) This is an outline of my presentation today. The U. S. Army has a dual interest in the use of robots, namely: 1. As a substitute for or an extension of the soldier in the battlefield, and 2. in the factories that make Army materiel, or - as we call it -the the production base. The Production Base can again be divided into three separate segments, i.e., the Army owned and operated facilities or GOG6s, such as Rock Island and Watervliet arsenals, and not to be overlooked, the depot operations. There the Army manufactures gun tubes and other related parts for artillery weapons and repairs and overhauls them. A second category is the Army owned and contractor operated facilities or GOCOs,such as the ammunition plants, the tank plants at Lima, Ohio and Warren, Michigan and the Stratford Engine Plant in Connecticut where gas turbines for helicopter and the Abrams tank are manufactured. The last category covers the industrial base, that is those factories which are not only operated but also owned by the contractor himself also referred to as COCOs. You can see from this description that the Army is supported by a base which produces a diversified line of products. Therefore, the task of technology development and technology insertion is considerably more complex than what one encounters in the average U. S. Manufacturing organization.

  8. Statistical Analysis of Warfare: Identification of Winning Factors with a Focus on Irregular Warfare

    Science.gov (United States)

    2015-09-01

    Defense HERO Historical Evaluation and Research Organization IDPs Internally Displaced Persons IFR Initial Force Ratio INITA Relative Imitative...armies started combating non-state, widely dispersed groups. Although this change appears to be quite simple, it has had a deep impact on military...1789–1961: A Study of the Impact of the French, Industrial, and Russian Revolutions on War and its Conduct (Boston, MA: Da Capo Press, 1992). 10 Ibid

  9. Nanostructured Metal Oxides for Stoichiometric Degradation of Chemical Warfare Agents

    Czech Academy of Sciences Publication Activity Database

    Štengl, Václav; Henych, Jiří; Janos, P.; Skoumal, M.

    2016-01-01

    Roč. 236, č. 2016 (2016), s. 239-258 ISSN 0179-5953 R&D Projects: GA ČR(CZ) GAP106/12/1116 Institutional support: RVO:61388980 Keywords : chemical warfare agent * metal nanoparticle * unique surface- chemistry * mesoporous manganese oxide Subject RIV: CA - Inorganic Chemistry Impact factor: 3.930, year: 2016

  10. Management information systems for electronic warfare command and decision support

    CSIR Research Space (South Africa)

    Van Niekerk, B

    2015-04-01

    Full Text Available information to allow them to manage their own spectrum, to identify threats, and to deny adversaries’ use of the spectrum. In this paper, the concepts of integrated electronic warfare and spectrum battle management are introduced, and the relevant information...

  11. Manoeuvre warfare analysis of South Africa's 1914-1915 German ...

    African Journals Online (AJOL)

    The study reported in this article explored the nexus between military theory and history. Military theory attempts to quantify, qualify and illuminate the often unpredictable phenomenon of war. The article consists of two parts: the theory of manoeuvre warfare and the history of the 1914-1915 South African campaign in ...

  12. blitzkrieg to desert storm: the evolution of operational warfare

    African Journals Online (AJOL)

    a_nabb

    disease of stalemates infecting militaries before the Second World War. The invasion did not change the world; instead, it brought about an increased awareness of the importance of the operational level of war, a dimension of warfare previously neglected. The German operational effectiveness represented an evolution ...

  13. A identification system for chemical warfare agents with PGNAA method

    International Nuclear Information System (INIS)

    Wang Bairong; Yin Guanghua; Yang Zhongping

    2006-01-01

    The principle and the experimental commanding of Chemical warfare Agents Identification with PGNAA method are discussed in this paper. The choosing of Detector, neutron source and the data processing method are detailed. Finally, a set of experimental instruments composed of Cf-232 and BGO detector is developed based on the theory discussed above. (authors)

  14. Identification system for chemical warfare agents with PGNAA method

    International Nuclear Information System (INIS)

    Wang Bairong; Yin Guanghua; Yang Zhongpin

    2007-01-01

    The principle and the experimental commanding of Chemical warfare Agents Identification with PGNAA method are discussed in this paper. The choosing of detector, neutron source and the data processing method are detailed. Finally, a set of experimental instruments composed of Cf-232 and BGO detector is developed based on this theory discussed above. (authors)

  15. Biomonitoring of exposure to chemical warfare agents: A review

    NARCIS (Netherlands)

    Noort, D.; Benschop, H.P.; Black, R.M.

    2002-01-01

    In this report an overview of the methods currently available for detection of exposure to a number of chemical warfare agents (CWA), i.e., sulfur mustard, lewisite and nerve agents, is presented. Such methods can be applied for various purposes, e.g., diagnosis and dosimetry of exposure of

  16. Recent canadian experience in chemical warfare agent destruction. An overview

    Energy Technology Data Exchange (ETDEWEB)

    McAndless, J.M.

    1995-09-01

    A Canadian chemical warfare agent destruction project (Swiftsure) was recently completed in which stockpiles of aged mustard, lewisite, nerve agents and contaminated scrap metal were incinerated or chemically neutralized in a safe, environmentally-responsible manner. The project scope, destruction technologies, environmental monitoring and public consultation programs are described.

  17. Simulating cyber warfare and cyber defenses: information value considerations

    Science.gov (United States)

    Stytz, Martin R.; Banks, Sheila B.

    2011-06-01

    Simulating cyber warfare is critical to the preparation of decision-makers for the challenges posed by cyber attacks. Simulation is the only means we have to prepare decision-makers for the inevitable cyber attacks upon the information they will need for decision-making and to develop cyber warfare strategies and tactics. Currently, there is no theory regarding the strategies that should be used to achieve objectives in offensive or defensive cyber warfare, and cyber warfare occurs too rarely to use real-world experience to develop effective strategies. To simulate cyber warfare by affecting the information used for decision-making, we modify the information content of the rings that are compromised during in a decision-making context. The number of rings affected and value of the information that is altered (i.e., the closeness of the ring to the center) is determined by the expertise of the decision-maker and the learning outcome(s) for the simulation exercise. We determine which information rings are compromised using the probability that the simulated cyber defenses that protect each ring can be compromised. These probabilities are based upon prior cyber attack activity in the simulation exercise as well as similar real-world cyber attacks. To determine which information in a compromised "ring" to alter, the simulation environment maintains a record of the cyber attacks that have succeeded in the simulation environment as well as the decision-making context. These two pieces of information are used to compute an estimate of the likelihood that the cyber attack can alter, destroy, or falsify each piece of information in a compromised ring. The unpredictability of information alteration in our approach adds greater realism to the cyber event. This paper suggests a new technique that can be used for cyber warfare simulation, the ring approach for modeling context-dependent information value, and our means for considering information value when assigning cyber

  18. Diversity Issues in the Army as Perceived by Army Students at the United States Army War College

    National Research Council Canada - National Science Library

    Webster, Cecil

    1997-01-01

    ..., welfare, and other related programs. In recognizing this diversity, this paper identifies some diversity issues within the Army, analyzes the perception of those diversity issues by the resident Army students in the USAWC Class of 1997...

  19. Comparative analysis of field ration for military personnel of the ukrainian army and armies of other countries worldwide

    OpenAIRE

    M. Mardar; M. Hkrupalo; M. Stateva

    2017-01-01

    For the purpose of improvement of the Ukrainian nutritional standards this Article provides comparative analysis of field rations of different countries worldwide to make a proposal on improvement of food-stuff assortment in food ration for military personnel in the Armed Forces of Ukraine, Army of USA, the British Army, Army of Germany, Army of Italy, Army of Canada, Army of France, Army of Belarus, Army of Armenia. In accordance with the comparative analysis it was established that ration c...

  20. Answering the Hottest Question in Army Education: What Is Army University?

    Science.gov (United States)

    Kem, John S.; LeBoeuf, Eugene J.; Martin, James B.

    2016-01-01

    The most common question heard by senior members of Army University is always, "What is Army University?" The newest education institution in the U.S. Army was created to unify the training and educational institutions of the Army, making the large learning organization more effective and efficient for its soldiers, bringing together 37…

  1. Nine novel microsatellite markers for the army ant Simopelta pergandei (subfamily Ponerinae)

    DEFF Research Database (Denmark)

    Kronauer, D.J.C.; Boomsma, J.J.; Pierce, N.E.

    2011-01-01

    Simopelta (subfamily Ponerinae) army ants are specialized predators of other ants in New World tropical forests. Although they show a striking convergence in overall life-history with the well known army ants of the subfamilies Aenictinae, Dorylinae, and Ecitoninae, the genus has been little...... studied. We developed and characterized nine novel microsatellite loci for S. pergandei with 2-8 observed alleles (mean: 5.2) and expected heterozygosities between 0.16 and 0.87 (mean: 0.68). Three of these loci reliably cross-amplified in a second species, S. pentadentata, with 4-8 alleles (mean: 8.......0) and expected heterozygosities between 0.32 and 0.85 (mean: 0.65). These genetic markers will be useful in studying the sociobiology and molecular ecology of Simopelta army ants and in elucidating convergent evolutionary trajectories that have culminated in the army ant lifestyle...

  2. Operational Reach: Is Current Army Doctrine Adequate?

    National Research Council Canada - National Science Library

    Heintzelman, Scott

    2003-01-01

    The term operational reach, an element of operational design, is new to U.S. Army doctrine. Operational reach is not found in the previous edition of the Army's basic operational doctrine, Field Manual...

  3. Multistage Deployment of the Army Theater Hospital

    Science.gov (United States)

    2013-12-01

    analysis on the effects warfare tactics, casualty timing, and casualty types had on the medical treatment facility (Cecchine et al., 2001). This proved...the 44-bed mobile portion of the current CSH was potentially inadequate to support approximately four brigades in an asymmetrical warfare scenario...systems and its increased force effectiveness on the fleet. He utilized quantitative analysis with Lanchester and Hughes-Salvo models to show that

  4. The Evolution of Army Leader Development

    Science.gov (United States)

    2013-03-01

    Human Resources Command, OPMD- MFE -I. 4 U.S. Army General Officer Management Office, Army General Officer Roster (Washington, DC, U.S. Department of the...Human Resources Command, Command Management Branch post board data analysis. 15 Data from the United States Army Human Resources Command, OPMD- MFE -A...May 1, 2008), D-1. 25 19 Data from the United States Army Human Resources Command, OPMD- MFE -A, 01 February, 2013. 20 U.S. Joint Chiefs of

  5. 76 FR 12087 - Army Educational Advisory Committee

    Science.gov (United States)

    2011-03-04

    ...: U.S. Army War College Subcommittee of the Army Education Advisory Committee. Dates of Meeting: March 24, 2011. Place of Meeting: U.S. Army War College, 122 Forbes Avenue, Carlisle, PA, Command... faculty; table and examine online College issues; assess resident and distance education programs, self...

  6. 75 FR 7255 - Army Educational Advisory Committee

    Science.gov (United States)

    2010-02-18

    ... Committee: U.S. Army War College Subcommittee of the Army Education Advisory Committee. Date of Meeting: March 11, 2010. Place of Meeting: U.S. Army War College, 122 Forbes Avenue, Carlisle, PA, Command...; table and examine online College issues; assess resident and distance education programs, self- study...

  7. 32 CFR 631.14 - Army policy.

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 4 2010-07-01 2010-07-01 true Army policy. 631.14 Section 631.14 National Defense Department of Defense (Continued) DEPARTMENT OF THE ARMY (CONTINUED) LAW ENFORCEMENT AND CRIMINAL...-Installation Operations (Military Patrols and Investigative Activities) and Policy § 631.14 Army policy. (a...

  8. Koncepcija partizanskoj vojny v Litve v 1920— 1930-e gody [The concept of guerrilla warfare in Lithuania in the 1920—1930s

    Directory of Open Access Journals (Sweden)

    Jokubauskas Vytautas

    2012-01-01

    Full Text Available This article analyses the military and tactical training of the members of the Lithuanian Riflemen’s Union for guerrilla warfare in the interwar period. Small nations, such as Lithuania and other Baltic states, being unable to build up military strength in order to ensure national security, were forced to seek for unconventional methods of warfare, including guerrilla strategies. The study places emphasis on the development of the guerrilla war concept in the Union periodicals. The author retraces a change in the intensity of the guerrilla warfare concept propagation amongst Lithuanian population and riflemen, in particular, through publications in the Trimitas — a periodical of the Lithuanian Riflemen’s Union. The author also identifies the narratives associated with the guerrilla matters employed for propaganda purposes in order to create an image of a guerrilla as a defender of the Homeland — Lithuania. Additionally, the structure and numbers of the Union are analysed through a comparison with similar organisations of the other «small nations» of the Baltic North-East. The author addresses the issue of military missions planned by the Lithuanian Army, as well as the way riflemen implemented them. Since the Union did not only offer military training, but was also engaged in the patriotic propaganda, the article focuses on the network of cultural institutions, homes of riflemen, orchestras, libraries, choirs, and athletic clubs used by the Union. The article sets out to establish whether the loss of Lithuanian sovereignty could have been possible without giving rise to a protracted guerrilla war.

  9. Defending Our Satellites: The Need for Electronic Warfare Education and Training

    Science.gov (United States)

    2015-12-01

    intercept Allied bombers attacking at night.9 As a result of the electronic warfare advantage that systems like Window and Airborne Cigar be- stowed...74 | Air & Space Power Journal Defending Our Satellites The Need for Electronic Warfare Education and Training Lt Col E. Lincoln Bonner, USAF...expanding education and training in the use of electronic warfare to defend US satellites and improve their survivability. The following discussion

  10. U.S. Army Chemical Corps Historical Studies. Gas Warfare in World War I: Gas Warfare at Belleau Wood, June 1918

    Science.gov (United States)

    1957-06-01

    companies (over 400 men) against the Rouvrols sector occupied by the 9th Infantry at 11$00 porno that same night, 13 April, apparently to gain...is highly probable that until gas is dissipated no infantry attack need be fearedo" The bombardment continued on the 14th when about 4|30 porno the...40 the next morningo Between liOO and 6t00 porno on 18 June^ 100 HE and gas 105s fell in the Bois des Clerembaut8s and between 6r00 and lljOO

  11. Cultural Competence and the Operational Commander: Moving Beyond Cultural Awareness into Culture-Centric Warfare

    National Research Council Canada - National Science Library

    Karcanes, James A

    2007-01-01

    .... Understanding the different levels of cultural awareness -- cultural consideration, cultural understanding, and cultural competence -- will help usher in a new focus on culture-centric warfare...

  12. Mass Spectrometric Determination of Chemical Warfare Agents in Indoor Sample Media Typically Collected During Forensic Investigations

    National Research Council Canada - National Science Library

    D'Agostino, P. A; Hancock, J. R; Chenier, C. L

    2005-01-01

    .... DRDC Suffield, in collaboration with the Royal Canadian Mounted Police, identified a need for analytical methods for chemical warfare agent identification in media, including flooring, wall surfaces...

  13. Redefining Hybrid Warfare: Russia's Non-linear War against the West

    Directory of Open Access Journals (Sweden)

    Tad Schnaufer

    2017-03-01

    Full Text Available The term hybrid warfare fails to properly describe Russian operations in Ukraine and elsewhere. Russia has undertaken unconventional techniques to build its influence and test the boundaries of a shaken international system. Notably, Russia’s actions in Ukraine display an evolved style of warfare that goes beyond its initial label of hybrid warfare. The term non-linear war (NLW will be defined in this article to encompass Russia’s actions and allow policymakers the correct framework to discuss and respond to Russia. NLW plays to the advantage of countries like Russia and constitute the future of warfare.

  14. Technological advancements for the detection of and protection against biological and chemical warfare agents.

    Science.gov (United States)

    Eubanks, Lisa M; Dickerson, Tobin J; Janda, Kim D

    2007-03-01

    There is a growing need for technological advancements to combat agents of chemical and biological warfare, particularly in the context of the deliberate use of a chemical and/or biological warfare agent by a terrorist organization. In this tutorial review, we describe methods that have been developed both for the specific detection of biological and chemical warfare agents in a field setting, as well as potential therapeutic approaches for treating exposure to these toxic species. In particular, nerve agents are described as a typical chemical warfare agent, and the two potent biothreat agents, anthrax and botulinum neurotoxin, are used as illustrative examples of potent weapons for which countermeasures are urgently needed.

  15. Development of Bicarbonate-Activated Peroxide as a Chemical and Biological Warfare Agent Decontaminant

    National Research Council Canada - National Science Library

    Richardson, David E

    2006-01-01

    ...) and other chemistry for the decontamination of chemical and biological warfare agents. The mechanism of formation of the active oxidant, peroxymonocarbonate, has been investigated in detail. New surfoxidants...

  16. Decontamination and Detoxification of Toxic Chemical Warfare Agents Using Polyurethane Sponges

    National Research Council Canada - National Science Library

    Gordon, Richard K; Gunduz, Alper T; Askins, LaTawnya Y; Strating, Simon J; Doctor, Bhupendra P; Clarkson, Edward D; Mitchelree, Larry W; Lukey, Brian; Railer, Roy; Schulz, Susan

    2003-01-01

    .... Another serious problem that may be encountered while caring for personnel contaminated with organophosphorus chemical warfare nerve agents is the possibility that there will be cross-contamination...

  17. Health Professions Officer Special Pay Study HPOSPS

    Science.gov (United States)

    2014-08-01

    the career field and the tax: Student-Transient-Prisoner/Patient ( STP ), Special Duty, and Outside. o STP : The Army equivalent of this Air Force...patterns due to their highly marketable skills which can be transferred to another form of public service (e.g., inter-Service transfer) or are in high... STP , and developmental opportunities (primarily special duties). The inventory identifies categories indicating skill availability (“Not Fully

  18. Application of the MASH v1.0 Code System to radiological warfare radiation threats

    International Nuclear Information System (INIS)

    Johnson, J.O.; Santoro, R.T.; Smith, M.S.

    1994-01-01

    Nuclear hardening capabilities of US and foreign ground force systems is a primary concern of the Department of Defense (DoD) and US Army. The Monte Carlo Adjoint Shielding Code System -- MASH v1.0 was developed at Oak Ridge National Laboratory (ORNL) to analyze these capabilities, i.e. the shielding effectiveness, for prompt radiation from a nuclear weapon detonation. Rapidly changing world events and the proliferation of nuclear weapons related technology have increased the kinds of nuclear threats to include intentionally dispersed radiation sources and fallout from tactical nuclear weapons used in the modern AirLand battlefield scenario. Consequently, a DoD area of increasing interest focuses on determining the shielding effectiveness of foreign and US armored vehicles to radiological warfare and fallout radiation threats. To demonstrate the applicability of MASH for analyzing dispersed radiation source problems, calculations have been completed for two distributed sources; a dispersed radiation environment simulated by a uniformly distributed 60 Co source, and a 235 U fission weapon fallout source. Fluence and dose assessments were performed for the free-field, the inside of a steel-walled two-meter box, in a phantom standing in the free-field, and in a phantom standing in the two-meter box. The results indicate substantial radiation protection factors for the 60 Co dispersed radiation source and the fallout source compared to the prompt radiation protection factors. The dose protection factors ranged from 40 to 95 for the two-meter box and from 55 to 123 for the mid-gut position of the phantom standing in the box. The results further indicate that a 60 Co source might be a good first order approximation for a tactical fission weapon fallout protection factor analysis

  19. Stuxnet and Cyber-Warfare (2/2)

    CERN Multimedia

    CERN. Geneva

    2016-01-01

    The first part of the lecture is devoted to the description of the Stuxnet worm, the first cyber-weapon whose existence has been made public, discovered in 2010 and targeting a specific industrial control system; the worm is responsible for the damaging of many centrifuges at an uranium enrichment facility, with the goal of sabotaging Iran's nuclear program. In the second part, the main features of cyber-warfare in conflict and pre-conflict activities will be discussed and compared to the conventional warfare domains, with also a general view at the international political debate on this topic.   Check the http://pugwash.org web site, an organisation that seeks a world free of nuclear weapons and other weapons of mass destruction. The lecturer invites comments via email to Gian.Piero.Siroli@cern.ch NB! All Academic Training lectures are recorded and are publicly available. There is no live webcast.

  20. Stuxnet and Cyber-Warfare (1/2)

    CERN Multimedia

    CERN. Geneva

    2016-01-01

    The first part of the lecture is devoted to the description of the Stuxnet worm, the first cyber-weapon whose existence has been made public, discovered in 2010 and targeting a specific industrial control system; the worm is responsible for the damaging of many centrifuges at an uranium enrichment facility, with the goal of sabotaging Iran's nuclear program. In the second part, the main features of cyber-warfare in conflict and pre-conflict activities will be discussed and compared to the conventional warfare domains, with also a general view at the international political debate on this topic. Check the http://pugwash.org web site, an organisation that seeks a world free of nuclear weapons and other weapons of mass destruction.   NB! All Academic Training lectures are recorded and are publicly available. There is no live webcast.

  1. Tissue-based standoff biosensors for detecting chemical warfare agents

    Science.gov (United States)

    Greenbaum, Elias; Sanders, Charlene A.

    2003-11-18

    A tissue-based, deployable, standoff air quality sensor for detecting the presence of at least one chemical or biological warfare agent, includes: a cell containing entrapped photosynthetic tissue, the cell adapted for analyzing photosynthetic activity of the entrapped photosynthetic tissue; means for introducing an air sample into the cell and contacting the air sample with the entrapped photosynthetic tissue; a fluorometer in operable relationship with the cell for measuring photosynthetic activity of the entrapped photosynthetic tissue; and transmitting means for transmitting analytical data generated by the fluorometer relating to the presence of at least one chemical or biological warfare agent in the air sample, the sensor adapted for deployment into a selected area.

  2. Cutaneous reactions in nuclear, biological and chemical warfare

    Directory of Open Access Journals (Sweden)

    Arora Sandeep

    2005-03-01

    Full Text Available Nuclear, biological and chemical warfare have in recent times been responsible for an increasing number of otherwise rare dermatoses. Many nations are now maintaining overt and clandestine stockpiles of such arsenal. With increasing terrorist threats, these agents of mass destruction pose a risk to the civilian population. Nuclear and chemical attacks manifest immediately while biological attacks manifest later. Chemical and biological attacks pose a significant risk to the attending medical personnel. The large scale of anticipated casualties in the event of such an occurrence would need the expertise of all physicians, including dermatologists, both military and civilian. Dermatologists are uniquely qualified in this respect. This article aims at presenting a review of the cutaneous manifestations in nuclear, chemical and biological warfare and their management.

  3. Male parentage in army ants

    DEFF Research Database (Denmark)

    Kronauer, Daniel J C; Schöning, Caspar; Boomsma, Jacobus J

    2006-01-01

    of active research in insect sociobiology. Here we present microsatellite data for 176 males from eight colonies of the African army ant Dorylus (Anomma) molestus. Comparison with worker genotypes and inferred queen genotypes from the same colonies show that workers do not or at best very rarely reproduce...

  4. The Army word recognition system

    Science.gov (United States)

    Hadden, David R.; Haratz, David

    1977-01-01

    The application of speech recognition technology in the Army command and control area is presented. The problems associated with this program are described as well as as its relevance in terms of the man/machine interactions, voice inflexions, and the amount of training needed to interact with and utilize the automated system.

  5. Army Transformation to Expeditionary Formations

    National Research Council Canada - National Science Library

    Bryson, Jeff

    2008-01-01

    This thesis explores the path of transformation in the U.S. Army from its inception in the late 1990s by then Chief of Staff GEN Eric Shinseki to the Interim Brigade Combat Team and through Operations Enduring and Iraqi Freedom...

  6. Just War and Postmodern Warfare: A German Case Study

    Science.gov (United States)

    2015-04-01

    warfare construct, Germany is shaping a military concept based on recent conflicts and unfettered by biases of conventional strategies, organizations...remain sovereign while subconsciously evolving toward liberal democratic ideas. In respecting each country’s political sensitivities, Germany’s...before exhausting all diplomatic, economic and information instruments. Whereas the term AU/ACSC/PINSON/AY15 13 “interests” may bias the United

  7. Conflict Without Casualties: Non-Lethal Weapons in Irregular Warfare

    Science.gov (United States)

    2007-09-01

    the body,” and the Geneva Protocol of 1925, bans the use of chemical and biological weapons .11 On 8 April 1975, President Ford issued Executive...E Funding – PE 63851M) (accessed 15 December 2006). The American Journal of Bioethics . “Medical Ethics and Non-Lethal Weapons .” Bioethics.net...CASUALTIES: NON-LETHAL WEAPONS IN IRREGULAR WARFARE by Richard L. Scott September 2007 Thesis Advisor: Robert McNab Second Reader

  8. Nodes and Codes: The Reality of Cyber Warfare

    Science.gov (United States)

    2012-05-17

    respectively. The avionics in Boeing’s 787 Dreamliner require approximately 6.5 million lines of code while the current S-Class Mercedes Benz requires over 20...leaders (demonstrated through outdated policy, theory, and doctrine) and the reality of warfare in 1914 (dictated by innovation, technology , and...or the guidelines to military action codified in doctrine? How are states using the latest technological innovations as violent instruments of

  9. Attacking the infrastructure: exploring potential uses of offensive information warfare

    OpenAIRE

    Elam, Donald Emmett.

    1996-01-01

    The world has entered the Third Wave; it has entered the Information Age. One of the fundamentals of this paradigm shift is the fact that information is power. The side that controls information more effectively will be victorious. Thus, countries and militaries must change their mentality in order to survive. A new form of conflict, Information Warfare, has been born. This new discipline is large, dynamic, and complex. The need exists for education among military officers and other concerned...

  10. Built to Outlast: Operational Approaches to Hybrid Warfare

    Science.gov (United States)

    2012-05-17

    29Robert T. Ames, Sun Tzu: The Art of War (New York: Ballantine Books, 1993), 78-80; Mao Tse -Tung, On Guerrilla Warfare, trans. Samuel B. Griffith...Chicago: University of Illinois Press, 1961), 25, 42.The works of Sun Tzu and Mao Tse -Tung both illustrate aspects of this concept. In a work...toreador’s cape, not the toreador himself. - Norman B. Hannah, The Key to Failure: Laos and the Vietnam War114 Against the backdrop of the Cold

  11. Warfare, genocide, and ethnic conflict: a Darwinian approach

    OpenAIRE

    Dimijian, Gregory G.

    2010-01-01

    As the 21st century dawns, I reflect on the history of humankind with growing concern about the need to understand the underlying biological and cultural roots of ethnic conflict and warfare. In the many studies of human conflict, innate biological predispositions have been neglected. This article is the third part of a series of seminars for medical residents at the University of Texas Southwestern Medical School at Dallas (see http://adarwinstudygroup.org/). The series starts with in-depth ...

  12. Numerical simulation of RCS for carrier electronic warfare airplanes

    OpenAIRE

    Yue Kuizhi; Liu Wenlin; Li Guanxiong; Ji Jinzu; Yu Dazhao

    2015-01-01

    This paper studies the radar cross section (RCS) of carrier electronic warfare airplanes. Under the typical naval operations section, the mathematical model of the radar wave’s pitch angle incidence range analysis is established. Based on the CATIA software, considering dynamic deflections of duck wing leading edge flaps, flaperons, horizontal tail, and rudder, as well as aircraft with air-to-air missile, anti-radiation missile, electronic jamming pod, and other weapons, the 3D models of carr...

  13. Annihilation Prediction for Lanchester-Type Models of Modern Warfare

    OpenAIRE

    Brown, G.G.; Taylor, J.

    1983-01-01

    Operations Research, 31, p.752. This paper introduces important new functions for analytic solution of Launch-ester-type equations of modern warfare for combat between two homogeneous forces modeled by power attrtition-rate coefficients with "no offset". Tabulations of these Lanchester-Clifford-Schlatii (or LCS) functions allow one to study this particular variable-coefficient model almost as easily and thoroughly as Lanchester's classic constant-coefficient one. LCS functions allow one ...

  14. Hungarys Alternative to Counter Hybrid Warfare - Small States Weaponized Citizenry

    Science.gov (United States)

    2017-06-09

    said “Resilience as a terminological and operational factor, will become the newest ‘ brand ’ and communication name for the Alliance.”70 He also...audiences to influence their emotions , motives, objective reasoning, and ultimately the behavior of foreign governments, organizations, groups, and...so-called influence warfare. His study pinpointed the importance of emotion over rational facts in messages. Second, Edward Lucas and Ben Nimmo on

  15. Recent Advances in Decontamination of Chemical Warfare Agents

    OpenAIRE

    Abdul Wadood Khan; Sabna Kotta; Shahid Husain Ansari; Javed Ali; Rakesh Kumar Sharma

    2013-01-01

    The recent turmoil and volatile situation in many countries and the increased risk of terrorist activities have raised alarm bells for the field of defense against toxic chemical/materials. These situations poses threats to society as terrorists can take advantage of such situations to strike and cause public mayhem. A number of chemicals have the potential of being used as chemical warfare (CW) agents. CW agents could immediately kill or incapacitate the affected individuals even when they a...

  16. Cyber warfare:terms, issues, laws and controversies

    OpenAIRE

    Seviş, Kamile Nur; Şeker, Ensar

    2016-01-01

    Recent years have shown us the importance of cybersecurity. Especially, when the matter is national security, it is even more essential and crucial. Increasing cyber attacks, especially between countries in governmental level, created a new term cyber warfare. Creating some rules and regulations for this kind of war is necessary therefore international justice systems are working on it continuously. In this paper, we mentioned fundamental terms of cyber...

  17. Littoral Combat Ship Open Ocean Anti-Submarine Warfare

    Science.gov (United States)

    2014-06-01

    maintain stealth and its defense in order to properly conduct an attack on a surface vessel (Sternhell and Thorndike 2014, 102). This statement...its target, the surface combatants can counter by increasing their speed (Sternhell and Thorndike 2014). While the maximum speed of the current...120316_PS.pdf Sternhell, Charles M, and Alan M Thorndike . 2014. “Antisubmarine Warfare in World War II.” CNA Analysis & Solutions. Accessed April 14, 2014

  18. The Theory of Unconventional Warfare: Win, Lose, and Draw

    Science.gov (United States)

    2008-12-01

    addition, Taraki changed the flag from its Islamic black- green -red colors to a 22 Soviet inspired all red color and then proceeded to paint most of...5. Introduction of the Stinger: 26 September 1986 The unmistakable backfire signature of an American made FIM -92 Stinger anti- aircraft missile...movements to the Bolivian Army. The 2nd Bolivian Ranger Battalion was deployed as a screen to trap Che’s men as the 8th Bolivian Army Division

  19. Special Operations - the Central Role of Air Capabilities

    DEFF Research Database (Denmark)

    Jensen, Lars H. Ehrensvärd

    the ground and maritime elements of special operations, such as the Navy’s Frogman Corps and the Army Jaeger Corps. The paper gives a practical example of how a joint (all-services) special operations capacity may enlarge the strategic options of Denmark beyond what most people think is possible for a small...

  20. Chemical warfare agents identification by thermal neutron detection

    International Nuclear Information System (INIS)

    Liu Boxue; Ai Xianyun; Tan Daoyuan; Zhang Dianqin

    2000-01-01

    The hydrogen concentration determination by thermal neutron detection is a non-destructive, fast and effective method to identify chemical warfare agents and TNT that contain different hydrogen fraction. When an isotropic neutron source is used to irradiate chemical ammunition, hydrogen atoms of the agent inside shell act as a moderator and slow down neutrons. The number of induced thermal neutrons depends mainly upon hydrogen content of the agent. Therefore measurement of thermal neutron influence can be used to determine hydrogen atom concentration, thereby to determine the chemical warfare agents. Under a certain geometry three calibration curves of count rate against hydrogen concentration were measured. According to the calibration curves, response of a chemical agent or TNT could be calculated. Differences of count rate among chemical agents and TNT for each kind of shells is greater than five times of standard deviations of count rate for any agent, so chemical agents or TNT could be identified correctly. Meanwhile, blast tube or liquid level of chemical warfare agent could affect the response of thermal neutron count rate, and thereby the result of identification. (author)

  1. Quality of Life in Iranian Chemical Warfare Veteran's.

    Science.gov (United States)

    Ebadi, Abbas; Moradian, Tayeb; Mollahadi, Mohsen; Saeed, Yaser; Refahi, Ali Akbar

    2014-05-01

    Mustard gas has different effects on different body systems such as respiratory tract, blood, gastrointestinal, skin, eye, endocrine and peripheral nervous system. The purpose of this study was to determine the quality of life in chemical warfare veterans due to sulfur mustard exposure. In a cross-sectional and analytic study, 242 patients who had a chemical injury during the Iran-Iraq war (1980-1983) and their lung damage was proven were investigated in our study. The quality of life was measured in these patients using an extensively validated Iranian version of SF-36. The mean age of veterans was 44.12 ± 4.9 ranging from 22 to 62 years. Our results showed that chemical warfare had a decreased quality of life in all subscales of the SF-36. The lowest scores in SF-36 subscales were related to role physical and general health. The data also showed a significant relationship between the number of organs involved and the quality of life in these patients (P chemical warfare survivors suffering from late complications have a low health related quality of life.

  2. Social Security, Cash Payments and Awards to Servicemen of the Red Army Air Force in the Great Patriotic War of 1941–1945

    Directory of Open Access Journals (Sweden)

    Alexander P. Abramov

    2016-07-01

    Full Text Available On the basis of the historical and sociological material presented materials about the Soviet state measures during the Great Patriotic War for the implementation of social policy in respect of the military air force of the Red Army, expressed in monetary incentives, rewards and social guarantees. The author notes that the implementation of social management practices at each stage of warfare timely adjustments depending on acquired combat experience and the strategic objectives of war. Existing wartime monetary awards system and social guarantees in respect of the personnel of the Red Army Air Force was not a major, but significant moral incentive for both pilots, as for representatives of other arms and services.

  3. 2013 Center for Army Leadership Annual Survey of Army Leadership (CASAL): Army Civilian Leaders

    Science.gov (United States)

    2014-05-30

    Army civilian workforce with regard to gender and ethnic origin (Office of the Assistant G-1 for Civilian Personnel, 2013). The reported education...climates of perceived inequality . Civilian leader comments frequently referenced favoritism as reflecting cronyism, unfair personnel actions, and...interests of others, unequal enforcement of standards and discipline, and use of discretion in workplace justice. As demonstrated in previous CASAL

  4. 77 FR 50089 - Army Education Advisory Committee Meeting

    Science.gov (United States)

    2012-08-20

    ... DEPARTMENT OF DEFENSE Department of the Army Army Education Advisory Committee Meeting AGENCY... the Army announces the following committee meeting: Name of Committee: Army Education Advisory... learning environment. The agenda will include topics relating to Army Learning Model 2015 and support to...

  5. 77 FR 11084 - Army Education Advisory Committee Meeting

    Science.gov (United States)

    2012-02-24

    ... DEPARTMENT OF DEFENSE Department of the Army Army Education Advisory Committee Meeting AGENCY... the Army announces the following committee meeting: Name of Committee: Army Education Advisory... Army 2020 learning environment. The agenda will include topics relating Arm Learning Model 2015 and to...

  6. 75 FR 19302 - Radiation Sources on Army Land

    Science.gov (United States)

    2010-04-14

    ... possession of ionizing radiation sources by non-Army agencies (including their civilian contractors) on an... radiation sources on Army land. The Army requires Non-Army agencies (including their civilian contractors... ionizing radiation sources on an Army Installation. For the purpose of this proposed rule, ``ionizing...

  7. 78 FR 33074 - Army Science Board Summer Study Session

    Science.gov (United States)

    2013-06-03

    ...--This study evaluates what science and technology competencies the Army must maintain and/or develop as... DEPARTMENT OF DEFENSE Department of the Army Army Science Board Summer Study Session AGENCY... the Army announces the following committee meeting: 1. Name of Committee: Army Science Board (ASB). 2...

  8. Army Air Commandos: A New Organization for Army Special Operations Aviation Foreign Internal Defense

    Science.gov (United States)

    2014-06-13

    AFSOC-managed AvFID program? How can USASOAC assimilate the RWAvFID mission into its portfolio without unacceptable decrement to its other core...was exploring options to strengthen its FID portfolio .2 USSOCOM’s focus shift combined with the AvFID capability gap would begin a process that would...security environment, US national strategy, and present capabilities. For the joint force this has meant investment, divestment, and rebalancing across

  9. Program specialization

    CERN Document Server

    Marlet, Renaud

    2013-01-01

    This book presents the principles and techniques of program specialization - a general method to make programs faster (and possibly smaller) when some inputs can be known in advance. As an illustration, it describes the architecture of Tempo, an offline program specializer for C that can also specialize code at runtime, and provides figures for concrete applications in various domains. Technical details address issues related to program analysis precision, value reification, incomplete program specialization, strategies to exploit specialized program, incremental specialization, and data speci

  10. United States Coast Guard Antisubmarine Warfare (ASW) in the Maritime Defense Zone (MDZ) - A Strategic Approach

    Science.gov (United States)

    1989-03-01

    RIC ILE COPY AIR WAR COLLGE REEAC R~pCR UNITED STATES COAST GUARD ANTISUBMARINE WARFARE (ASW) IN THE MARITIME DEFENSE ZONE (MDZ) -A STRATEGIC...going to perform in these MDZs. Those tasks identified so far include: port and coastal physical security & preventive safety, mine warfare

  11. The Utility of Freedom: A Principal-Agent Model for Unconventional Warfare

    Science.gov (United States)

    2011-06-01

    Lanchester Model of Guerrilla Warfare,‖ Operations Research 10, no. 6 (December 1962): 818–827; William A. Niskanen, ―Review: The Economics of Insurgency...http://galenet.galegroup.com/servlet/DDRS?locID=navalps. Deitchman, S. J. ―A Lanchester Model of Guerrilla Warfare.‖ Operations Research 10, no

  12. Understanding the elementary considerations in a network warfare environment: an introductory framework

    CSIR Research Space (South Africa)

    Veerasamy, N

    2008-07-01

    Full Text Available . It seeks to offer a better introductory understanding to the field of network warfare. This paper addresses the requirements for a network warfare capability and will look at the high-level approach, constraints, focus areas, levels, techniques...

  13. Metal organic frameworks for the catalytic detoxification of chemical warfare nerve agents

    Science.gov (United States)

    Hupp, Joseph T.; Farha, Omar K.; Katz, Michael J.; Mondloch, Joseph E.

    2017-04-18

    A method of using a metal organic framework (MOF) comprising a metal ion and an at least bidendate organic ligand to catalytically detoxify chemical warfare nerve agents including exposing the metal-organic-framework (MOF) to the chemical warfare nerve agent and catalytically decomposing the nerve agent with the MOF.

  14. Study on the identification method of chemical warfare agents with spectroscopy of neutron induced γ rays

    International Nuclear Information System (INIS)

    Liu Boxue; Li Yun; Li Xiangbao

    1996-01-01

    The paper briefly describes some non-destructive verification technologies of chemical warfare agents in-site, and some application of neutron induced gamma ray analysis, such as multi-elements analysis of coal, hidden explosive detection and identification of chemical agents. It also describes some problems in developing the portable isotopic neutron spectroscopy for non-destructive evaluation of chemical warfare agents

  15. Antidotes and treatments for chemical warfare/terrorism agents: an evidence-based review.

    Science.gov (United States)

    Rodgers, G C; Condurache, C T

    2010-09-01

    This article reviews the evidence supporting the efficacy of antidotes used or recommended for the potential chemical warfare agents of most concern. Chemical warfare agents considered include cyanide, vesicants, pulmonary irritants such as chlorine and phosgene, and nerve agents. The strength of evidence for most antidotes is weak, highlighting the need for additional research in this area.

  16. Status of dental health in chemical warfare victims: The case of Isfahan, Iran

    Directory of Open Access Journals (Sweden)

    Ahmad Mottaghi

    2012-01-01

    Conclusion: Chemical warfare victims have relatively poor dental/oral health. Chemical injury might cause a dysfunction in saliva secretion, with decrease in saliva secretion increasing the risk for tooth decay and periodontal disorders. Further research is required to find out the exact underlying mechanisms and the factors associated with poor dental/oral health in chemical warfare victims.

  17. 76 FR 56406 - Science and Technology Reinvention Laboratory Demonstration Project; Department of the Army; Army...

    Science.gov (United States)

    2011-09-13

    ... DEPARTMENT OF DEFENSE Office of the Secretary Science and Technology Reinvention Laboratory Demonstration Project; Department of the Army; Army Research, Development and Engineering Command; Tank... personnel management demonstration project for eligible TARDEC employees. Within that notice the table...

  18. Any Time, Any Place, Any Gender The Risks and Rewards of Integrating Females into Special Operations Forces

    Science.gov (United States)

    2015-06-02

    Service report to Congress in 1987, subsequently published commercially as John Collins, Green Berets, SEALs, and Spetsnaz: US & Soviet Special...warfare activities are their Special Forces (SF), more commonly known as “ Green Berets” due their specific cultural artifact, with the assistance of CA...2004. Howarth, Patrick. Undercover: The Men and Women of the Special Operations Executive. London, UK: Routledge and Kegan Paul, 1980. Howes, Ruth

  19. Building A Better Force: Regular Army / Reserve Components Integration In The Army Chemical Corps

    Science.gov (United States)

    2016-05-26

    a significant effect on the shape of the Chemical Corps, emphasizing contamination avoidance and decontamination . Russia, the United States...future will center on how to shape the force to balance these capabilities. 13 Mauroni, Albert J., America’s Struggle with Chemical -Biological Warfare ...War of Nerves: Chemical Warfare from World War I to Al-Qaeda (New York: Anchor, 2007), 365-366. 19 Damien McElroy, “ISIS Storms Saddam-Era Chemical

  20. 2013 CENTER FOR ARMY LEADERSHIP ANNUAL SURVEY OF ARMY LEADERSHIP (CASAL): MAIN FINDINGS

    Science.gov (United States)

    2014-04-30

    The Center for Army Profession and Ethic (CAPE) has fielded education and training materials (including doctrine, pamphlets , videos, brochures , and...Army Pamphlet (DA PAM) 600-3, Commissioned Officer Development and Career Management, states that a goal of warrant officer training and education... Pamphlet 600-25, U.S. Army noncommissioned officer professional development and career management. Washington, D.C.: Headquarters, Department of the Army

  1. US Army Soldiers With Type 1 Diabetes Mellitus.

    Science.gov (United States)

    Choi, Y Sammy; Cucura, Jon

    2018-04-01

    US Army soldiers diagnosed with type 1 diabetes were previously considered unfit for duty. For highly motivated soldiers, current advanced technologies allow the possibility of not only retention on active duty, but military deployment. We present our experience at Fort Bragg, North Carolina, taking care of soldiers newly diagnosed with type 1 diabetes mellitus. Through intensive diabetes education, extensive military and physical training, optimization of diabetes technology, and remote real-time monitoring, soldiers are able to continue to serve their country in the most specialized roles.

  2. Racial Extremism in the Army

    Science.gov (United States)

    1998-04-01

    of Deference ...................................................................................................... 46 1. The Separation of Powers Doctrine...to the military. This deference has a two-fold basis. First, the separation of powers in the U.S. Constitution gives authority to the executive (and...Why should there be judicial deference to the Army’s policy on extremism? There are two principal reasons. First, the Constitution’s separation of powers doctrine

  3. 2011 Army Strategic Planning Guidance

    Science.gov (United States)

    2011-03-25

    TESI ) of 22,000 Soldiers, the Army’s total force by the end of the mid-term period is programmed to be 520K (AC). We will achieve a more...dwell ratios, extending TESI authority to adequately man deploying units and sustain the All-Volunteer Force, right-sizing the generating force, and... TESI Temporary End-Strength Increase WMD Weapons of Mass Destruction 2011 ARMY STRATEGIC PLANNING GUIDANCE Page 19 2011

  4. Inverting the Army Intelligence Pyramid

    Science.gov (United States)

    2011-05-19

    British experience fighting the Provisional Irish Republican Army ( PIRA ) in Northern Ireland, which began an insurgency in 1969.91...they became extremely successful.”93 Martin Van Creveld posits that the British Army’s success against the PIRA in Northern Ireland stands out as...and MI6 (Secret Intelligence Service) to defeat the PIRA .97 92 John Kiszely, "Learning About

  5. Information Management: Army Information Management

    Science.gov (United States)

    2002-05-31

    funds or personnel to produce free programming solely for the benefit of a commercial CATV company. (6) The Army will require that the CATV franchisee ...provided, future customer requirements, and emerging IT capabilities which can benefit the customer. The Army’s increasing employment of IT dictates a...proactive oversight/insight system is operational and ensures mission benefit , cost, and schedule goals are met. (2) IT performance measures at the

  6. 78 FR 24735 - Army Education Advisory Committee Meeting

    Science.gov (United States)

    2013-04-26

    ... include topics relating to the Army Learning Model that seeks to improve the Army's learning model by leveraging technology without sacrificing standards so the Army can provide credible, rigorous, and relevant...

  7. Issues and Insights from the Army Technology Seminar Game

    National Research Council Canada - National Science Library

    Darilek, Richard

    2001-01-01

    ...). The AAN goals were to link Army XXI to a long-term vision of the Army extending well into the 21st century and to ensure that this vision informed evolving Army research and development requirements...

  8. Features and structure of edition «Atlas of the Ukrainian Insurgent Army»

    Directory of Open Access Journals (Sweden)

    Володимир Грицеляк

    2017-09-01

    Full Text Available The article introduces the edition «Atlas of the Ukrainian Insurgent Army». Actuality for mapmaking of distorted Ukrainian history pages is showed. The approaches to structure of the atlas are noted. The atlas presents the origins of UPA, its armed struggle, territorial divisions, military organization and present-day memory places. The distortion of Ukrainian Insurgent Army’s history is one of the cornerstones of the Russian propaganda machine. Edition of «Atlas of the Ukrainian Insurgent Army» will contribute to the fight of the Ukrainians in the information warfare waged by the Russians for centuries, trying to assimilate the neighboring people and to appropriate its historical achievements. According to the concept, the structure of the atlas should cover a wide range of different aspects of the UPA’s struggle; bases on objective materials and destroy the Soviet myths; it discloses the territorial organization of the struggle; transmits different historical phases of social processes (origins, activity, today’s echo. The Atlas complies with such approaches as complexity and consistency, as well as scientific approach, clarity for consumer, Ukrainian centrism, objectivity. Its structure consists of five chapters: 1 «Origins of UPA», 2 «UPA armed struggle for the restoration of Ukrainian statehood», 3 «UPA territorial divisions», 4 «Characteristics of military organization», 5 «Memorable places of UPA». The introductory article to atlas «OUN and UPA: myths and slanders of the Russian propaganda» is intended to show the main Russian fakes. The first chapter gives the prerequisites for insurgency formation, the second reveals the theme of military confrontation of Ukrainian rebels to all invaders during World War II (German Nazis with Hungarians and Romanians, Polish chauvinists, Russian and Soviet imperialists, the third reveals territorial divisions of the armed struggle, the fourth is without maps, it shows features of

  9. Army Reserve Military Intelligence: Time for Change

    Science.gov (United States)

    2010-04-20

    Miramax Books, 2002. Goleman , Daniel . Emotional Intelligence . New York: Bantam Books, 1997. Goleman , Daniel , Richard Boyatzis, and Annie McKee...or position of the Department of the Army, Department of Defense, or the U.S. Government. ARMY RESERVE MILITARY INTELLIGENCE : TIME FOR CHANGE...Research Project 3. DATES COVERED 00-00-2009 to 00-00-2010 4. TITLE AND SUBTITLE Army Reserve Military Intelligence : Time for Change 5a

  10. Effectiveness of the Army Mentorship Program

    National Research Council Canada - National Science Library

    Nieberding, Richard J

    2007-01-01

    ...). From the artifacts associated with this mentorship program, it appears that the Army highly values this program as a way to create a culture and climate that fosters learning and development for future leadership. This project will examine the effectiveness of mentorship in the today's Army and evaluate whether the program is sufficient to meet the needs for the Army's next generation of soldiers and leaders.

  11. The United States Army 1996 Modernization Plan.

    Science.gov (United States)

    1996-03-08

    time and with less risk. IMA technology improvements are leveraged and inserted into the Army’s information architectures as the competitive market place...to procure a family of complementary, interoperable systems. At the end of the near-term, "Active Defense RD&A Startegy Army will begin fielding...Haul and Engineer tractors were fielded that brought modern technologies from the commercial market to the Army. However, adequate quantities were

  12. A Pilotless Army in the Megalopolis

    National Research Council Canada - National Science Library

    Wegner, Robert

    2004-01-01

    .... Although Army aviation can provide mobility, intelligence gathering, and massive precision fires, its current aviation systems are highly vulnerable within the urban environment and a solution...

  13. Army Cost Culture: What Is It? What Should It Become?

    Science.gov (United States)

    2013-03-01

    Army leaders to implement inclusion of this Army cost culture value into the larger Army culture. Kotter warns us that failure to complete each step...inculcation of a cost culture. However, this circumstance does not really apply to the Army. Army senior leaders clearly understand that mission comes...changed: In this challenging environment, an improved Army cost culture will enable senior leaders to preserve the nation’s security. This Strategy

  14. Innovative smart micro sensors for Army weaponry applications

    Science.gov (United States)

    Ruffin, Paul B.; Brantley, Christina; Edwards, Eugene

    2008-03-01

    Micro sensors offer the potential solution to cost, size, and weight issues associated with smart networked sensor systems designed for environmental/missile health monitoring and rocket out-gassing/fuel leak detection, as well as situational awareness on the battlefield. In collaboration with the University of Arkansas (Fayetteville), University of Alabama (Tuscaloosa and Birmingham), Alabama A&M University (Normal), and Streamline Automation (Huntsville, AL), scientists and engineers at the Army Aviation & Missile Research, Development, and Engineering Center (AMRDEC) are investigating several nano-based technologies to solve the problem of sensing extremely small levels of toxic gases associated with both chemical warfare agents (in air and liquids) and potential rocket motor leaks. Innovative techniques are being devised to adapt voltammetry, which is a well established technique for the detection and quantification of substances dissolved in liquids, to low-cost micro sensors for detecting airborne chemical agents and potential missile propellant leakages. In addition, a surface enhanced Raman scattering (SERS) technique, which enhances Raman scattered light by excitation of surface plasmons on nanoporous metal surfaces (nanospheres), is being investigated to develop novel smart sensors for the detection of chemical agents (including rocket motor out-gassing) and potential detection of home-made explosive devices. In this paper, results are delineated that are associated with experimental studies, which are conducted for the aforementioned cases and for several other nano-based technology approaches. The design challenges of each micro sensor technology approach are discussed. Finally, a comparative analysis of the various innovative micro-sensor techniques is provided.

  15. Cybersecurity protecting critical infrastructures from cyber attack and cyber warfare

    CERN Document Server

    Johnson, Thomas A

    2015-01-01

    The World Economic Forum regards the threat of cyber attack as one of the top five global risks confronting nations of the world today. Cyber attacks are increasingly targeting the core functions of the economies in nations throughout the world. The threat to attack critical infrastructures, disrupt critical services, and induce a wide range of damage is becoming more difficult to defend against. Cybersecurity: Protecting Critical Infrastructures from Cyber Attack and Cyber Warfare examines the current cyber threat landscape and discusses the strategies being used by governments and corporatio

  16. Getting the Next War Right: Beyond Population-centric Warfare

    Science.gov (United States)

    2010-06-01

    respectively: Che Guevara and Mao Tse -tung. Che’s foco theory, as we have discussed, advocates mobilizing from the top. The armed challenger chooses an...example, Thomas A. Marks, “Guerrillas in the Mist: Hmong Resistance Continues in Laos ,” Combat and Survival 8, no. 5 (August 1996), 4–11. 12 Theory and...Mao Tse -tung, On Guerrilla Warfare, trans. and ed. Samuel B. Grif!th (Mineola, NY: Dover Publications, 2005). The book is available from a wide

  17. Chemical and biological warfare. Should defenses be researched and deployed?

    Science.gov (United States)

    Orient, J M

    1989-08-04

    The threat of chemical and biological weapons of mass destruction has intensified because of improved delivery systems and advances in chemistry, genetics, and other sciences. Possible US responses to this threat include deterrence, defenses, and/or disarmament, including a reaffirmation of the Biological and Toxin Weapons Convention of 1972, which is now in jeopardy. This article discusses the history of chemical and biological warfare, existing and potential weapons, the proliferation of weapons and delivery systems, ways to prevent the use of these weapons, and ways to protect populations from their effects.

  18. Environmental assessments of sea dumped chemical warfare agents

    DEFF Research Database (Denmark)

    Sanderson, Hans; Fauser, Patrik

    This is a report on the information gathered during work related to sea dumped chemical warfare agents. It mainly reviews the work conducted in relation to the installation of the two Nord Stream gas pipeline from 2008-2012. The focus was on the weight-of-evidence risk assessment of disturbed CWA...... residues in connection with the installation of the pipelines. Novel exposure and toxicity assessments are presented and the risk is assessed. The overall conclusion is that there is a negligible acute added CWA risk towards the fish community from the installation of the pipelines....

  19. Ultraviolet Raman scattering from persistent chemical warfare agents

    Science.gov (United States)

    Kullander, Fredrik; Wästerby, Pär.; Landström, Lars

    2016-05-01

    Laser induced Raman scattering at excitation wavelengths in the middle ultraviolet was examined using a pulsed tunable laser based spectrometer system. Droplets of chemical warfare agents, with a volume of 2 μl, were placed on a silicon surface and irradiated with sequences of laser pulses. The Raman scattering from V-series nerve agents, Tabun (GA) and Mustard gas (HD) was studied with the aim of finding the optimum parameters and the requirements for a detection system. A particular emphasis was put on V-agents that have been previously shown to yield relatively weak Raman scattering in this excitation band.

  20. Specialization Patterns

    DEFF Research Database (Denmark)

    Schultz, Ulrik Pagh; Lawall, Julia Laetitia; Consel, Charles

    2000-01-01

    Design patterns offer many advantages for software development, but can introduce inefficiency into the final program. Program specialization can eliminate such overheads, but is most effective when targeted by the user to specific bottlenecks. Consequently, we propose that these concepts...... are complementary. Program specialization can optimize programs written using design patterns, and design patterns provide information about the program structure that can guide specialization. Concretely, we propose specialization patterns, which describe how to apply program specialization to optimize uses...... of design patterns. In this paper, we analyze the specialization opportunities provided by specific uses of design patterns. Based on the analysis of each design pattern, we define the associated specialization pattern. These specialization opportunities can be declared using the specialization classes...

  1. Status of dental health in chemical warfare victims: the case of Isfahan, Iran.

    Science.gov (United States)

    Mottaghi, Ahmad; Hoseinzade, Abolfath; Zamani, Elham; Araghizade, Habib Allah

    2012-01-01

    Little evidence is available regarding the dental health of victims of chemical warfare in Iran. Therefore, in this study, we examined the decayed, missing, and filled teeth index (DMFT), community periodontal index of treatment needs (CPITN), and saliva secretion rate of chemical warfare victims living in the province of Isfahan in Iran. This case-control study was conducted with 300 chemical warfare victims as the treatment group and 300 age-matched individuals without exposure to chemical warfare as the control group. DMFT and CPITN indices and saliva secretion rate were measured and compared between the two groups. Chemical warfare victims had significantly higher scores than the control group for decayed teeth (4.25 ± 3.88 vs 3.52 ± 2.81; P=0.009), missing teeth (8.79 ± 9.3 vs 6.15 ± 8.43; Pwarfare victims was significantly lower than that in the control group (1.71 ± 0.05 vs 3.85 ± 1.95 cc/5 min; PChemical warfare victims have relatively poor dental/oral health. Chemical injury might cause a dysfunction in saliva secretion, with decrease in saliva secretion increasing the risk for tooth decay and periodontal disorders. Further research is required to find out the exact underlying mechanisms and the factors associated with poor dental/oral health in chemical warfare victims.

  2. On-Site Detection as a Countermeasure to Chemical Warfare/Terrorism.

    Science.gov (United States)

    Seto, Y

    2014-01-01

    On-site monitoring and detection are necessary in the crisis and consequence management of wars and terrorism involving chemical warfare agents (CWAs) such as sarin. The analytical performance required for on-site detection is mainly determined by the fatal vapor concentration and volatility of the CWAs involved. The analytical performance for presently available on-site technologies and commercially available on-site equipment for detecting CWAs interpreted and compared in this review include: classical manual methods, photometric methods, ion mobile spectrometry, vibrational spectrometry, gas chromatography, mass spectrometry, sensors, and other methods. Some of the data evaluated were obtained from our experiments using authentic CWAs. We concluded that (a) no technologies perfectly fulfill all of the on-site detection requirements and (b) adequate on-site detection requires (i) a combination of the monitoring-tape method and ion-mobility spectrometry for point detection and (ii) a combination of the monitoring-tape method, atmospheric pressure chemical ionization mass spectrometry with counterflow introduction, and gas chromatography with a trap and special detectors for continuous monitoring. The basic properties of CWAs, the concept of on-site detection, and the sarin gas attacks in Japan as well as the forensic investigations thereof, are also explicated in this article. Copyright © 2014 Central Police University.

  3. The Woman's Land Army: 1918-1920.

    Science.gov (United States)

    Laughlin, Margaret

    1994-01-01

    Describes the origins and work of the Women's Land Army, a World War I British volunteer agricultural production unit. Details similar program in the United States. Identifies the impact of the Women's Land Army including enhanced political, economic, and physical freedom for the participants and future generations of women. (CFR)

  4. Army industrial, landscaping, and agricultural water use

    Energy Technology Data Exchange (ETDEWEB)

    Stoughton, Kate McMordie [Pacific Northwest National Laboratory (PNNL), Richland, WA (United States); Loper, Susan A. [Pacific Northwest National Laboratory (PNNL), Richland, WA (United States); Boyd, Brian K. [Pacific Northwest National Laboratory (PNNL), Richland, WA (United States)

    2014-09-18

    The Pacific Northwest National Laboratory conducted a task for the Deputy Assistant Secretary of the Army to quantify the Army’s ILA water use and to help improve the data quality and installation water reporting in the Army Energy and Water Reporting System.

  5. 2004 Army Research Office in Review

    Science.gov (United States)

    2004-01-01

    the thermal decomposition of nitrate - ester propellants. This is the first such data ever measured and will provide reliable input for Army...strain has been set for the actuator. The research program includes: Multiscale modeling of microstructural evolution and its affect on mechanical... Multiscale modeling and process optimization for engineered microstructural complexity” have had multiple transition interactions with the Army Research

  6. Punishment sustains large-scale cooperation in prestate warfare

    Science.gov (United States)

    Mathew, Sarah; Boyd, Robert

    2011-01-01

    Understanding cooperation and punishment in small-scale societies is crucial for explaining the origins of human cooperation. We studied warfare among the Turkana, a politically uncentralized, egalitarian, nomadic pastoral society in East Africa. Based on a representative sample of 88 recent raids, we show that the Turkana sustain costly cooperation in combat at a remarkably large scale, at least in part, through punishment of free-riders. Raiding parties comprised several hundred warriors and participants are not kin or day-to-day interactants. Warriors incur substantial risk of death and produce collective benefits. Cowardice and desertions occur, and are punished by community-imposed sanctions, including collective corporal punishment and fines. Furthermore, Turkana norms governing warfare benefit the ethnolinguistic group, a population of a half-million people, at the expense of smaller social groupings. These results challenge current views that punishment is unimportant in small-scale societies and that human cooperation evolved in small groups of kin and familiar individuals. Instead, these results suggest that cooperation at the larger scale of ethnolinguistic units enforced by third-party sanctions could have a deep evolutionary history in the human species. PMID:21670285

  7. China's Use of Cyber Warfare: Espionage Meets Strategic Deterrence

    Directory of Open Access Journals (Sweden)

    Magnus Hjortdal

    2011-01-01

    Full Text Available This article presents three reasons for states to use cyber warfare and shows that cyberspace is—and will continue to be—a decisive element in China's strategy to ascend in the international system. The three reasons are: deterrence through infiltration of critical infrastructure; military technological espionage to gain military knowledge; and industrial espionage to gain economic advantage. China has a greater interest in using cyberspace offensively than other actors, such as the United States, since it has more to gain from spying on and deterring the United States than the other way around. The article also documents China's progress in cyber warfare and shows how it works as an extension of its traditional strategic thinking and the current debate within the country. Several examples of cyber attacks traceable to China are also presented. This includes cyber intrusions on a nuclear arms laboratory, attacks on defense ministries (including the Joint Strike Fighter and an airbase and the U.S. electric grid, as well as the current Google affair, which has proved to be a small part of a broader attack that also targeted the U.S. Government. There are, however, certain constraints that qualify the image of China as an aggressive actor in cyberspace. Some believe that China itself is the victim of just as many attacks from other states. Furthermore, certain actors in the United States and the West have an interest in overestimating China's capabilities in cyberspace in order to maintain their budgets.

  8. Biodiversity conservation and armed conflict: a warfare ecology perspective.

    Science.gov (United States)

    Hanson, Thor

    2018-04-23

    The activities involved in preparing for, executing, and recovering from armed conflict are globally pervasive and consequential, with significant impacts on natural systems. Effects on biodiversity are predominantly negative, produced by direct and indirect battlefield impacts, as well as the general breakdown of social, economic, and governance systems during wartime. Certain conservation opportunities do occur, however, particularly on lands set aside for training exercises, buffer zones, and peace parks. Here, the relationship between armed conflict and biodiversity is reviewed using the temporal framework of warfare ecology, which defines warfare as an ongoing process of three overlapping stages: preparations, war (armed conflict), and postwar activities. Several themes emerge from recent studies, including a heightened awareness of biodiversity conservation on military lands, the potential for scientific and conservation engagement to mitigate negative biodiversity impacts in war zones, and the importance of the postwar period for incorporating biodiversity priorities into reconstruction and recovery efforts. Research limitations and knowledge gaps are also discussed. © 2018 New York Academy of Sciences.

  9. Pathology and Laboratory Medicine Support for the American Expeditionary Forces by the US Army Medical Corps During World War I.

    Science.gov (United States)

    Wright, James R; Baskin, Leland B

    2015-09-01

    Historical research on pathology and laboratory medicine services in World War I has been limited. In the Spanish American War, these efforts were primarily focused on tropical diseases. World War I problems that could be addressed by pathology and laboratory medicine were strikingly different because of the new field of clinical pathology. Geographic differences, changing war tactics, and trench warfare created new issues. To describe the scope of pathology and laboratory medicine services in World War I and the value these services brought to the war effort. Available primary and secondary sources related to American Expeditionary Forces' laboratory services were analyzed and contrasted with the British and German approaches. The United States entered the war in April 1917. Colonel Joseph Siler, MD, a career medical officer, was the director, and Colonel Louis B. Wilson, MD, head of pathology at the Mayo Clinic, was appointed assistant director of the US Army Medical Corps Division of Laboratories and Infectious Disease, based in Dijon, France. During the next year, they organized 300 efficient laboratories to support the American Expeditionary Forces. Autopsies were performed to better understand treatment of battlefield injuries, effects of chemical warfare agents, and the influenza pandemic; autopsies also generated teaching specimens for the US Army Medical Museum. Bacteriology services focused on communicable diseases. Laboratory testing for social diseases was very aggressive. Significant advances in blood transfusion techniques, which allowed brief blood storage, occurred during the war but were not primarily overseen by laboratory services. Both Siler and Wilson received Distinguished Service Medals. Wilson's vision for military pathology services helped transform American civilian laboratory services in the 1920s.

  10. Napoleon’s Nightmare: Guerrilla Warfare in Spain (1808-1814) -The French Army’s Failed Counterinsurgency Effort

    Science.gov (United States)

    2011-04-29

    religion , and Napoleon and his troops had wounded the Spaniards in their deepest beliefs and national pride. The Spanish had contempt for the invasion and...organizations with force, as the French attempted to do in Spain, must first fully ground themselves in knowledge of the culture, traditions, religion ...de la Independencia. Madrid: Leynfor Siglo XXI, 2007. The book is focused on one of the guerrilla leaders who became senior officer in the Spanish

  11. French and US Army’s dilemma Between Athena and Ares: Keep a Sense of Humanity in a Technological Warfare?

    Science.gov (United States)

    2014-06-13

    insectes- cyborgs -attaquent (accessed 12 March 2014). 28Michael Walzer, Noncombattant Immunity and Military Necessity: Just and Unjust Wars (New-York...BIBLIOGRAPHY Allenby, Brad. La Guerre technologique. slate.fr, 11 June 2010. http://www.slate.fr/ story/22881/guerre-technologique-insectes- cyborgs

  12. Increasing Airpower’s Effectiveness: Applying the U.S. Army’s Operational Design Methodology to Airpower in Warfare

    Science.gov (United States)

    2010-04-01

    understanding choice.”24 Another way of demonstrating the kind of systems thinking that is used to power operational design is found in Checkland and...interactive design (redesigning the future and inventing ways to bring it about).” 25 Peter Checkland and John Poulter, Learning for Action: A Short...26 Checkland and Poulter, Learning for Action, 22. 9 ideas.”27 The next foundation of operational design is the concept of reflection or reflective

  13. Countering Gray-Zone Hybrid Threats: An Analysis of Russias New Generation Warfare and Implications for the US Army

    Science.gov (United States)

    2016-10-18

    Threats 21 Laws and Cultural Norms as a Weapons System : When operating in the gray zone, aggressors try to use... Operational Phases 26 Countering Gray-Zone Hybrid Threats 4 Abstract The gray zone is an operating environment in...Countering Gray-Zone Hybrid Threats 6 Criminal Organizations and Networks,

  14. 78 FR 69077 - Army Education Advisory Subcommittee Meeting Notice

    Science.gov (United States)

    2013-11-18

    ... DEPARTMENT OF DEFENSE Department of the Army Army Education Advisory Subcommittee Meeting Notice... leading to provisional findings will be referred to the Army Education Advisory Committee for deliberation...: ATFL-APO, Monterey, CA 93944, [email protected]us.army.mil , (831) 242-5828. SUPPLEMENTARY INFORMATION...

  15. 77 FR 27209 - Army Education Advisory Subcommittee Meeting Notice

    Science.gov (United States)

    2012-05-09

    ... DEPARTMENT OF DEFENSE Department of the Army Army Education Advisory Subcommittee Meeting Notice...: Board of Visitors, U.S. Army War College Subcommittee. Date of Meeting: May 31, 2012. Place of Meeting: U.S. Army War College, 122 Forbes Avenue, Carlisle, PA, Command Conference Room, Root Hall, Carlisle...

  16. 77 FR 4026 - Army Education Advisory Subcommittee Meeting Notice

    Science.gov (United States)

    2012-01-26

    ... DEPARTMENT OF DEFENSE Department of the Army Army Education Advisory Subcommittee Meeting Notice... Visitors, U.S. Army War College Subcommittee. Date of Meeting: February 23, 2012. Place of Meeting: U.S. Army War College, 122 Forbes Avenue, Carlisle, PA, Command Conference Room, Root Hall, Carlisle...

  17. 78 FR 23759 - Army Education Advisory Subcommittee Meeting Notice

    Science.gov (United States)

    2013-04-22

    ... DEPARTMENT OF DEFENSE Department of the Army Army Education Advisory Subcommittee Meeting Notice... Visitors, U.S. Army War College Subcommittee. Dates of Meeting: May 16, 2013. Place of Meeting: U.S. Army War College, 122 Forbes Avenue, Carlisle, PA, Command Conference Room, Root Hall, Carlisle Barracks...

  18. High Value Talent: Identifying, Developing, and Retaining Naval Special Warfare’s Best Leaders

    Science.gov (United States)

    2012-06-01

    Southwest Airlines both rank character as the most important individual trait they look for.22,23 The importance of character will be elaborated on...Southwest Airlines likewise has character as its top hiring trait, only hiring 4% of its applicants as a result.27...incentives to much more creative concepts that cater to a High Potential’s life outside of the workplace. Paying attention to both methods is critical

  19. Naval Special Warfare: Identifying and Prioritizing Core Attributes of the Profession

    Science.gov (United States)

    2014-12-01

    sociologist named Morris Janowitz described the transition and development of American military professionalism in his book titled The Professional...Westport, CT: Praeger Publishers, 1989). 45 For a full discussion see Morris Janowitz, The Professional Soldier: A Social and Political Portrait...Sent: Tuesday , August 19, 2014 1:36 AM To: NSW Survey Distro Cc: Wisotzki, Stephen C CAPT USSOCOM NAVSOC; Voigt, Bradley D Mr CIV USSOCOM

  20. Integrating Defense, Diplomacy, and Development (3 D) in the Naval Special Warfare Operator

    Science.gov (United States)

    2010-12-01

    usually filling the executive positions, is equivalent to different roles of the players of a sports team and their coaches. The operators are the...them on what SOF resources can be provided to a country team’s counterterrorism campaign plan. 1. The Operator With Al Qaeda developing franchise

  1. The Role of Special Operations Forces in Information Warfare: Enablers, Not Cyber Warriors

    National Research Council Canada - National Science Library

    Edgar, Jeffry

    2000-01-01

    ... (IW) - is not unique to SOF. Conventional forces also execute IW. As a result, SOF runs the risk of losing its unique character as it tries to assume a role that conventional forces can fulfill...

  2. Global Trends and Future Warfare (Strategic Insights. Special Issue, October 2011)

    Science.gov (United States)

    2011-10-01

    across the Indian Ocean and Asia-Pacific Regions     change” through the use of military force, under the rubric of “Responsibility to Protect.” The...rationalizations of their attacks. Consider, for example, this 11 August 2002 communiqué issued in response to the development of genetically modified organisms

  3. Detachment 101 in the CBI: An Unconventional Warfare Paradigm for Contemporary Special Operations

    Science.gov (United States)

    2010-05-13

    have been based on either a total misreading of the situation in Japan, or a readiness for war.”15 Churchill wanted to find a softer approach to...developed to decipher Japanese diplomatic traffic during World War II. Initially, Japanese traffic was intercepted and labeled as the Japanese ‘Red’ Codes...Donovan had to face the issue and make a decision, which he did by relieving Carl “for physical and medical reasons.”67

  4. Understanding the Threat Ecosystem: A Concept for Intelligence Support to Special Warfare

    Science.gov (United States)

    2016-05-10

    international law, national law, behavioral norms and ethical principles have no restraining effects on them.5 This emerging complexity paradigm is one...similar to a biome: a major ecological community of organisms adapted to a particular climatic or environmental condition on a large geographic area in...Awareness through tracking agents and agency in the threat environment is paramount to building an accurate ecological frame of the operational environment

  5. Strategic Usefulness of Conventional Force/Special Operations Force Interdependence in Irregular Warfare

    Science.gov (United States)

    2017-06-01

    surgical strike missions, often deep in denied territory like the Osama bin Laden raid in Pakistan or counterterrorism raids in Yemen . “Surgical strike...70 Rothstein, “Less is More,” 283. 71 Alexander George and Andrew Bennett, Case Studies and Theory Development in the Social Sciences... Media Network, September 16, 2011. 75 Ibid. 76 Max Boot, War Made New: Weapons, Warriors, and the Making of the Modern World (New York: Penguin

  6. Swimming With the Natives: Cultural Immersion and Its Applications to Naval Special Warfare

    Science.gov (United States)

    2004-09-01

    refer to as the “Struggle against the ‘Great Demon’ or ‘Great Satan ’”—which in turn refers to the western forces and their coalitions. The cell...the Cairo Bulletin, which is a sort of bible to them. (Wilson, 1990, p. 949) 28 As he had intended, Lawrence was able to use his cultural immersion...21, 2004, from http://www.oft.osd.mil/library/ library_files/document_377_National%20Military%20Strategy%2013%20May% 2004. pdf Johnson, C. (1982

  7. Past and Potential Theory for Special Warfare Operational Art: People’s War and Contentious Politics

    Science.gov (United States)

    2015-03-04

    bourgeoisie revolution, revolution from above, and peasant revolution.123 These events produced three corresponding revolutionary outcomes...the key structural variables that determined these paths and outcomes within a country were the strength of the bourgeoisie

  8. Attacking the Lion: A Study of Cohesion in Naval Special Warfare Operational Units

    Science.gov (United States)

    2011-06-01

    of Existential Courage.‖ Journal of Humanistic Psychology 44, no. 3 (Summer 2004): 279–298. ———. ―Relevance of Hardiness Assessment and Training to...stealth, teamwork, and violence of action to survive and succeed in missions against larger opponents. Developing bonds of trust between individuals and...a force that conducts kinetic action missions with an emphasis on speed, surprise, and violence of action. For the most part, this mentality

  9. Information Warfare: Issues Associated with the Defense of DOD Computers and Computer Networks

    National Research Council Canada - National Science Library

    Franklin, Derek

    2002-01-01

    ... that may threaten the critical information pathways of the armed forces An analysis of the history of computer information warfare reveals that there was an embarrassing lack of readiness and defense...

  10. Cerium oxide for the destruction of chemical warfare agents: A comparison of synthetic routes

    Czech Academy of Sciences Publication Activity Database

    Janos, P.; Henych, Jiří; Pelant, O.; Pilařová, V.; Vrtoch, L.; Kormunda, M.; Mazanec, K.; Štengl, Václav

    2016-01-01

    Roč. 304, MAR (2016), s. 259-268 ISSN 0304-3894 Institutional support: RVO:61388980 Keywords : Cerium oxide * Chemical warfare agents * Organophosphate compounds * Decontamination Subject RIV: CA - Inorganic Chemistry Impact factor: 6.065, year: 2016

  11. From Douhet to drones, air warfare, and the evolution of targeting

    NARCIS (Netherlands)

    Osinga, F.P.B.; Roorda, M.P.; Ducheine, P.A.L.; Schmitt, M.N.; Osinga, F.P.B.

    2016-01-01

    Through the prism of the experience of air warfare, this chapter identifies key factors that have shaped targeting. These include technological developments, organizational structures, and processes and inter-service competition for scarce resources. Moreover, targeting is informed by perspectives

  12. Defense Base Closure and Realignment Budget Data for the Naval Surface Warfare Center

    National Research Council Canada - National Science Library

    1993-01-01

    ... and realignment military construction projects. This report provides the results of the audit related to the realignment of Naval Surface Warfare Centers elements in White Oak, Maryland, and Panama City, Florida, to Dahlgren, Virginia...

  13. CRUSER's Warfare Innovation Workshop Focused on Hybrid War in the Urban Littorals

    OpenAIRE

    Ehrlich, Michael

    2017-01-01

    News Stories Archive The Naval Postgraduate School (NPS) Consortium for Robotics and Unmanned Systems Education and Research, CRUSER, hosted its annual Warfare Innovation Workshop (WIW) in Glasgow Hall, Sept. 18-21.

  14. Electronic Warfare: Towed Decoys Could Improve Survivability of Current Navy Aircraft

    National Research Council Canada - National Science Library

    Aiken, Michael

    1997-01-01

    Traditionally, DOD'S combat aircraft have used on-board electronic warfare devices called jammers for self-protection against radar-controlled weapons, including missiles and anti-aircraft artillery...

  15. Surface Warfare Officer Retention: Analysis of Individual Ready Reserve Survey Data

    National Research Council Canada - National Science Library

    Stoker, Carol; Crawford, Alice

    2008-01-01

    ... (including morale and lack of mentoring), push both men and women out of the Navy. Nonetheless, the Navy s primary effort to improve retention has been to introduce the Surface Warfare Officer Continuation Pay (SWOCP...

  16. Understanding "Understanding" Flow for Network-Centric Warfare: Military Knowledge-Flow Mechanics

    National Research Council Canada - National Science Library

    Nissen, Mark

    2002-01-01

    Network-centric warfare (NCW) emphasizes information superiority for battlespace efficacy, but it is clear that the mechanics of how knowledge flows are just as important as those pertaining to the networks and communication...

  17. DRES Database of Methods for the Analysis of Chemical Warfare Agents

    National Research Council Canada - National Science Library

    D'Agostino, Paul

    1997-01-01

    .... Update of the database continues as an ongoing effort and the DRES Database of Methods for the Analysis of Chemical Warfare Agents is available panel in hardcopy form or as a softcopy Procite or Wordperfect file...

  18. The Rapier or the Club: The Relationship between Attrition and Maneuver Warfare

    National Research Council Canada - National Science Library

    Springman, Jeffrey A

    2006-01-01

    ...? This project compares the relationship between attrition and maneuver warfare. The study considers whether there are times when wars of attrition should be fought, and whether there are conditions that force wars of attrition...

  19. Diagnosis of Exposure to Chemical Warfare Agents: A Comprehensive Literature Survey 1990-2005

    National Research Council Canada - National Science Library

    Noort, D

    2006-01-01

    This report is an update of TNO report PML 2003-A63. In this report an overview is presented of the methods currently available for detection of exposure to a number of chemical warfare agents (CWA), i.e...

  20. Anxiety, depression, and posttraumatic stress in Iranian survivors of chemical warfare.

    Science.gov (United States)

    Hashemian, Farnoosh; Khoshnood, Kaveh; Desai, Mayur M; Falahati, Farahnaz; Kasl, Stanislav; Southwick, Steven

    2006-08-02

    In the 1980-1988 Iran-Iraq War, extensive use of chemical weapons resulted in high rates of morbidity and mortality. While much is known about the physical consequences of chemical warfare, there is a paucity of information about the long-term effects of chemical attacks on mental health. To assess the long-term psychological impact of chemical warfare on a civilian population. Cross-sectional randomized survey conducted in July 2004 of 153 civilians in 3 towns exposed to warfare in northwestern Iran: Oshnaviyeh (low-intensity conventional warfare), Rabat (high-intensity conventional warfare), and Sardasht (both high-intensity conventional warfare and chemical weapons). Full or partial posttraumatic stress disorder (PTSD) diagnosis, anxiety symptoms, and depressive symptoms were assessed using Farsi versions of the Clinician-Administered PTSD Scale, Hamilton Scale for Anxiety, and Beck Depression Inventory, respectively. Overall participation rate was 93%. Respondents had a mean age of 45 years and were all of Kurdish ethnicity. Among individuals exposed to both high-intensity warfare and chemical weapons, prevalence rates for lifetime PTSD, current PTSD, major anxiety symptoms, and severe depressive symptoms were 59%, 33%, 65%, and 41%, respectively. Among the low-intensity warfare group, the corresponding rates were 8%, 2%, 18%, and 6%, respectively, while intermediate rates were found among those exposed to high-intensity warfare but not to chemical weapons (31%, 8%, 26%, and 12%, respectively). Compared with individuals exposed to low-intensity warfare, those exposed to both high-intensity warfare and chemical weapons were at higher risk for lifetime PTSD (odds ratio [OR], 18.6; 95% confidence interval [CI], 5.8-59.4), current PTSD (OR, 27.4; 95% CI, 3.4-218.2), increased anxiety symptoms (OR, 14.6; 95% CI, 6.0-35.6), and increased depressive symptoms (OR, 7.2; 95% CI, 3.3-15.9). Exposure to high-intensity warfare but not to chemical weapons was also

  1. Improving Blood Monitoring of Enzymes as Biomarkers of Risk from Anticholinergic Pesticides and Chemical Warfare Agents

    National Research Council Canada - National Science Library

    Wilson, Barry W

    2006-01-01

    Blood biomarkers are an important way to monitor exposure to anticholinergic pesticides and chemical warfare agents and to establish whether some personnel are at greater risk than others from exposure...

  2. A new General Purpose Decontamination System for Chemical and Biological Warfare and Terrorism Agents

    National Research Council Canada - National Science Library

    Khetan, Sushil; Banerjee, xdDeboshri; Chanda, Arani; Collins, Terry

    2003-01-01

    Partial contents: Fe-TAML Activator of Peroxide,Activators of Hydrogen peroxide,Biological Warfare Agents,Bacterial Endospore,Bacterial Spore Deactivation,Modeling Studies,Deactivation Studies with Bacillus spores...

  3. Second NATO/SIBCA Exercise on Sampling of Chemical Warfare Agents

    National Research Council Canada - National Science Library

    Wils, E

    1999-01-01

    In order to practise the sampling of chemical warfare agents under realistic conditions, the Netherlands participated successfully in the second NATO/SIBCA sampling exercise conducted in Poland on 1-3...

  4. The Third World War? In The Cyberspace. Cyber Warfare in the Middle East.

    Directory of Open Access Journals (Sweden)

    Martina

    2014-06-01

    Full Text Available This article aims to provide a brief and comprehensive introduction to the issue of cyber warfare and to display the recent development in this area. Geographically, it focuses on the Middle East region, since the vast majority of the most important recent cyber attacks appeared just in there or were connected to it. The first part of the article tries to define the key notion of cyber warfare, compares it to the standard warfare and presents different types of cyber weapons that are known today. The second part points out examples of the most striking recent cyber attacks and uses them as evidences to demonstrate today's importance and dissemination of cyber warfare. Finally, the article sums up pros and cons of the cyber weapons and, in view of these, predicts a significant increase in their use in any future war conflicts.

  5. Improving Blood Monitoring of Enzymes as Biomarkers of Risk from Anticholinergic Pesticides and Chemical Warfare Agents

    National Research Council Canada - National Science Library

    Wilson, Barry W

    2005-01-01

    Blood biomarkers are an important way to monitor exposure to anticholinergic pesticides and chemical warfare agents and to establish whether some personnel are at greater risk than others from exposure...

  6. Combinatorial Auction Theory Applied to the Selection of Surface Warfare Officer Retention Incentives

    National Research Council Canada - National Science Library

    Denmond, Constance M; Johnson, Derek N; Lewis, Chavius G; Zegley, Christopher R

    2007-01-01

    The purpose of this project is to investigate the potential retention and cost impacts of offering combinations of retention base incentives to members of the Surface Warfare Officer (SWO) community...

  7. Army Study Shows Decline In Behavioral Health Stigma

    Science.gov (United States)

    2012-01-01

    Army Study Shows Decline in Behavioral Health Stigma By Rob McIlvaine Army News Service WASHINGTON, Jan. 20, 2012 - A newly released Army study on...conference yesterday. The three-year study outlines the problem of suicide in the Army and related issues of substance abuse, spouse abuse and child abuse...REPORT TYPE 3. DATES COVERED 00-00-2012 to 00-00-2012 4. TITLE AND SUBTITLE Army Study Shows Decline In Behavioral Health Stigma 5a. CONTRACT

  8. Army Hearing Program Status Report Quarter 2 Fiscal Year 2017

    Science.gov (United States)

    2017-07-01

    U.S. Army Publ ic Heal th Center Army Hearing Program Status Report Q2 FY17 Clinical Public Health and Epidemiology Directorate Army... Hearing Division General Medical: 500A July 2017 Approved for public release; distribution unlimited Army Hearing Program Status Report, Q2FY17...56               INTRODUCTION The Army Hearing Program Status Report (AHPSR) is a component of the Public Health

  9. Cyber crime and cyber warfare with international cyber collaboration for RSA – preparing communities

    CSIR Research Space (South Africa)

    Grobler, M

    2012-03-01

    Full Text Available aspects come into play that may have an influence on the manner in which the military reacts to cyber attacks (Wilson 2007): ? new national security policy issues; ? consideration of psychological operations used to affect friendly nations... relationship between modern cyber space, cyber warfare and traditional legislation. As a starting point, cyber warfare is defined for the purpose of this article as the use of exploits in cyber space as a way to intentionally cause harm to people, assets...

  10. Modeling Anti-Air Warfare With Discrete Event Simulation and Analyzing Naval Convoy Operations

    Science.gov (United States)

    2016-06-01

    W., & Scheaffer, R. L. (2008). Mathematical statistics with applications . Belmont, CA: Cengage Learning. 118 THIS PAGE INTENTIONALLY LEFT BLANK...WARFARE WITH DISCRETE EVENT SIMULATION AND ANALYZING NAVAL CONVOY OPERATIONS by Ali E. Opcin June 2016 Thesis Advisor: Arnold H. Buss Co...REPORT DATE June 2016 3. REPORT TYPE AND DATES COVERED Master’s thesis 4. TITLE AND SUBTITLE MODELING ANTI-AIR WARFARE WITH DISCRETE EVENT

  11. Drone Warfare: Is the United States Violating the Law of Armed Conflict

    Science.gov (United States)

    2011-02-16

    NOTE AIR WAR COLLEGE AIR UNIVERSITY DRONE WARFARE: IS THE UNITED STATES VIOLATING THE LAW OF ARMED CONFLICT? by Barbara E. Shestko, Col...Base, Alabama. 1 Introduction The United States has become increasingly dependent upon the use of unmanned aircraft systems (UASs) or “ drones ” to...kill targeted members of al-Qaeda and the Taliban.1 Due to the success of drone warfare, we can expect the United States to continue its current

  12. Trust: Implications for the Army Profession

    Science.gov (United States)

    2013-10-01

    Georgia Institute of Technology, a MMAS from the School of Advance Military Studies, and an MSS from the U.S. Army War College. He was the U.S. Army...degrees from the School of Advance Military Studies, the US Army War College, and Webster University. His current research focus is senior military...The Repeal of Don’t Ask, Don’t Tell—1 Year Later,” Center for American Progress, from <http://www.americanprogress.org/issues/ lgbt /report/2012/09

  13. America’s Army: The Strength of the Nation. 2010 Army Posture Statement

    Science.gov (United States)

    2010-02-19

    that the Army Soldier is the best equipped and most re- spected combatant in the world. In order to ex- ecute Army Modernization and ensure the con...Force Traumatic Brain Injury ( TBI ) Unaccompanied Personnel Housing (UPH) Unmanned Aircraft, Raven Small System Unmanned Aircraft, Shadow System Unmanned...Services TBI Traumatic Brain Injury 30 LoyaLty | Duty | Respect | seLfLess seRvice | HonoR | integRity | peRsonaL couRage 2010 Army

  14. Warfare, genocide, and ethnic conflict: a Darwinian approach.

    Science.gov (United States)

    Dimijian, Gregory G

    2010-07-01

    As the 21st century dawns, I reflect on the history of humankind with growing concern about the need to understand the underlying biological and cultural roots of ethnic conflict and warfare. In the many studies of human conflict, innate biological predispositions have been neglected. This article is the third part of a series of seminars for medical residents at the University of Texas Southwestern Medical School at Dallas (see http://adarwinstudygroup.org/). The series starts with in-depth coverage of Darwinian natural and sexual selection, with examples from the domestication of animals and plants and the crisis of antibiotic resistance. The series strives to show how biology has been neglected in the study of the we-they orientation of human behavior, with its devastating consequences. The subject material is profoundly disturbing, as it looks at "human nature" and contrasts the "dark side" of human behavior with the opposite, profoundly caring and loving side.

  15. Information Warfare on Social Media: A Brand Management Perspective

    Directory of Open Access Journals (Sweden)

    Kalpokas Ignas

    2017-06-01

    Full Text Available Employing a perspective informed by brand management, this article aims at understanding information warfare operations in social media. The state, seen as brand, must project an image of itself to both internal and foreign audiences to unite the domestic audience and/or attract global support. However, in constructing a brand, states are vulnerable to ‘sofa warriors’ – ordinary individuals who have been unwittingly recruited by hostile actors to disseminate (over social media or other platforms a counter-brand, harmful to the state concerned. These new threats are investigated in light of recent tendencies in online branding, elucidating their status as a national security threat, with the potential to significantly disrupt life in political communities.

  16. Book Review: Conquest in Cyberspace: National Security and Information Warfare

    Directory of Open Access Journals (Sweden)

    Gary C. Kessler

    2007-06-01

    Full Text Available Libicki, M.C. (2007. Conquest in Cyberspace: National Security and Information Warfare. New York: Cambridge University Press. 323 pages, ISBN: 978-0-521-69214-4 (paper, US$80Reviewed by Gary C. Kessler (gary.kessler@champlain.eduMany books -- and even movies ("Live Free or Die Hard" -- are based upon the premise of an impending information war. In these scenarios -- made all too plausible by the increased frequency with which we read about and experience major information security incidents -- a Bad Guy exploits known computer security vulnerabilities in order to control major national infrastructures via the Internet so as to reap financial, economic, and/or personal power.(see PDF for full review

  17. Nanostructured Metal Oxides for Stoichiometric Degradation of Chemical Warfare Agents.

    Science.gov (United States)

    Štengl, Václav; Henych, Jiří; Janoš, Pavel; Skoumal, Miroslav

    2016-01-01

    Metal oxides have very important applications in many areas of chemistry, physics and materials science; their properties are dependent on the method of preparation, the morphology and texture. Nanostructured metal oxides can exhibit unique characteristics unlike those of the bulk form depending on their morphology, with a high density of edges, corners and defect surfaces. In recent years, methods have been developed for the preparation of metal oxide powders with tunable control of the primary particle size as well as of a secondary particle size: the size of agglomerates of crystallites. One of the many ways to take advantage of unique properties of nanostructured oxide materials is stoichiometric degradation of chemical warfare agents (CWAs) and volatile organic compounds (VOC) pollutants on their surfaces.

  18. Chemical warfare protection for the cockpit of future aircraft

    Science.gov (United States)

    Pickl, William C.

    1988-01-01

    Currently systems are being developed which will filter chemical and biological contaminants from crew station air. In order to maximize the benefits of these systems, a method of keeping the cockpit contaminant free during pilot ingress and egress is needed. One solution is to use a rectangular plastic curtain to seal the four edges of the canopy frame to the canopy sill. The curtain is stored in a tray which is recessed into the canopy sill and unfolds in accordion fashion as the canopy is raised. A two way zipper developed by Calspan could be used as an airlock between the pilot's oversuit and the cockpit. This system eliminates the pilot's need for heavy and restrictive CB gear because he would never be exposed to the chemical warfare environment.

  19. Decontamination of biological warfare agents by a microwave plasma torch

    International Nuclear Information System (INIS)

    Lai, Wilson; Lai, Henry; Kuo, Spencer P.; Tarasenko, Olga; Levon, Kalle

    2005-01-01

    A portable arc-seeded microwave plasma torch running stably with airflow is described and applied for the decontamination of biological warfare agents. Emission spectroscopy of the plasma torch indicated that this torch produced an abundance of reactive atomic oxygen that could effectively oxidize biological agents. Bacillus cereus was chosen as a simulant of Bacillus anthracis spores for biological agent in the decontamination experiments. Decontamination was performed with the airflow rate of 0.393 l/s, corresponding to a maximum concentration of atomic oxygen produced by the torch. The experimental results showed that all spores were killed in less than 8 s at 3 cm distance, 12 s at 4 cm distance, and 16 s at 5 cm distance away from the nozzle of the torch

  20. [Cutaneous and systemic toxicology of vesicants used in warfare].

    Science.gov (United States)

    Pita, R; Vidal-Asensi, S

    2010-01-01

    Vesicants are a group of chemicals used in warfare. The most representative agent is yperite, also known as mustard gas. The blisters that appeared on those exposed to yperite during combat in the First World War are responsible for the current name--vesicants--for this group of chemicals. Their affects are produced mainly through localized action of liquid or vapor forms on the skin, eyes, and respiratory tract. However, the high absorption of the liquid form through the skin or the vapor form on inhalation may cause substantial systemic effects. Here we analyze these effects, treatment of intoxication, and long-term sequelae, drawing on our experience and a review of the literature.

  1. An Open Architecture Framework for Electronic Warfare Based Approach to HLA Federate Development

    Directory of Open Access Journals (Sweden)

    HyunSeo Kang

    2018-01-01

    Full Text Available A variety of electronic warfare models are developed in the Electronic Warfare Research Center. An Open Architecture Framework for Electronic Warfare (OAFEw has been developed for reusability of various object models participating in the electronic warfare simulation and for extensibility of the electronic warfare simulator. OAFEw is a kind of component-based software (SW lifecycle management support framework. This OAFEw is defined by six components and ten rules. The purpose of this study is to construct a Distributed Simulation Interface Model, according to the rules of OAFEw, and create Use Case Model of OAFEw Reference Conceptual Model version 1.0. This is embodied in the OAFEw-FOM (Federate Object Model for High-Level Architecture (HLA based distributed simulation. Therefore, we design and implement EW real-time distributed simulation that can work with a model in C++ and MATLAB API (Application Programming Interface. In addition, OAFEw-FOM, electronic component model, and scenario of the electronic warfare domain were designed through simple scenarios for verification, and real-time distributed simulation between C++ and MATLAB was performed through OAFEw-Distributed Simulation Interface.

  2. A Survey of Game Theoretic Approaches to Modelling Decision-Making in Information Warfare Scenarios

    Directory of Open Access Journals (Sweden)

    Kathryn Merrick

    2016-07-01

    Full Text Available Our increasing dependence on information technologies and autonomous systems has escalated international concern for information- and cyber-security in the face of politically, socially and religiously motivated cyber-attacks. Information warfare tactics that interfere with the flow of information can challenge the survival of individuals and groups. It is increasingly important that both humans and machines can make decisions that ensure the trustworthiness of information, communication and autonomous systems. Subsequently, an important research direction is concerned with modelling decision-making processes. One approach to this involves modelling decision-making scenarios as games using game theory. This paper presents a survey of information warfare literature, with the purpose of identifying games that model different types of information warfare operations. Our contribution is a systematic identification and classification of information warfare games, as a basis for modelling decision-making by humans and machines in such scenarios. We also present a taxonomy of games that map to information warfare and cyber crime problems as a precursor to future research on decision-making in such scenarios. We identify and discuss open research questions including the role of behavioural game theory in modelling human decision making and the role of machine decision-making in information warfare scenarios.

  3. Specialization Patterns

    OpenAIRE

    Schultz , Ulrik Pagh; Lawall , Julia ,; Consel , Charles

    1999-01-01

    Design patterns offer numerous advantages for software development, but can introduce inefficiency into the finished program. Program specialization can eliminate such overheads, but is most effective when targeted by the user to specific bottlenecks. Consequently, we propose to consider program specialization and design patterns as complementary concepts. On the one hand, program specialization can optimize object-oriented programs written using design patterns. On the other hand, design pat...

  4. Using cheminformatics to find simulants for chemical warfare agents

    Energy Technology Data Exchange (ETDEWEB)

    Lavoie, J.; Srinivasan, Sree [Molecular Sciences and Engineering Team, U.S. Army Natick Soldier Research, Development and Engineering Center, 15 Kansas Street, Natick, MA 01760 (United States); Nagarajan, R., E-mail: Ramanathan.Nagarajan@us.army.mil [Molecular Sciences and Engineering Team, U.S. Army Natick Soldier Research, Development and Engineering Center, 15 Kansas Street, Natick, MA 01760 (United States)

    2011-10-30

    Highlights: {yields} Summary of chemical warfare agent (CWA) simulants in current use. {yields} Application of method of molecular similarity to CWA and simulants. {yields} Quantitative metric for CWA-simulant similarity. {yields} Rank ordering of simulants in current use. {yields} Potential of method to identify simulants for emerging agents. - Abstract: Direct experimentation with chemical warfare agents (CWA) to study important problems such as their permeation across protective barrier materials, decontamination of equipment and facilities, or the environmental transport and fate of CWAs is not feasible because of the obvious toxicity of the CWAs and associated restrictions on their laboratory use. The common practice is to use 'simulants,' namely, analogous chemicals that closely resemble the CWAs but are less toxic, with the expectation that the results attained for simulants can be correlated to how the CWAs would perform. Simulants have been traditionally chosen by experts, by means of intuition, using similarity in one or more physical properties (such as vapor pressure or aqueous solubility) or in the molecular structural features (such as functional groups) between the stimulant and the CWA. This work is designed to automate the simulant identification process backed by quantitative metrics, by means of chemical similarity search software routinely used in pharmaceutical drug discovery. The question addressed here is: By the metrics of such software, how similar are traditional simulants to CWAs? That is, what is the numerical 'distance' between each CWA and its customary simulants in the quantitative space of molecular descriptors? The answers show promise for finding close but less toxic simulants for the ever-increasing numbers of CWAs objectively and fast.

  5. Using cheminformatics to find simulants for chemical warfare agents

    International Nuclear Information System (INIS)

    Lavoie, J.; Srinivasan, Sree; Nagarajan, R.

    2011-01-01

    Highlights: → Summary of chemical warfare agent (CWA) simulants in current use. → Application of method of molecular similarity to CWA and simulants. → Quantitative metric for CWA-simulant similarity. → Rank ordering of simulants in current use. → Potential of method to identify simulants for emerging agents. - Abstract: Direct experimentation with chemical warfare agents (CWA) to study important problems such as their permeation across protective barrier materials, decontamination of equipment and facilities, or the environmental transport and fate of CWAs is not feasible because of the obvious toxicity of the CWAs and associated restrictions on their laboratory use. The common practice is to use 'simulants,' namely, analogous chemicals that closely resemble the CWAs but are less toxic, with the expectation that the results attained for simulants can be correlated to how the CWAs would perform. Simulants have been traditionally chosen by experts, by means of intuition, using similarity in one or more physical properties (such as vapor pressure or aqueous solubility) or in the molecular structural features (such as functional groups) between the stimulant and the CWA. This work is designed to automate the simulant identification process backed by quantitative metrics, by means of chemical similarity search software routinely used in pharmaceutical drug discovery. The question addressed here is: By the metrics of such software, how similar are traditional simulants to CWAs? That is, what is the numerical 'distance' between each CWA and its customary simulants in the quantitative space of molecular descriptors? The answers show promise for finding close but less toxic simulants for the ever-increasing numbers of CWAs objectively and fast.

  6. Developing an Army Market Research Index in Support of Army Recruiting

    National Research Council Canada - National Science Library

    Morath, Ray

    2001-01-01

    .... Generating appropriate market research for the Army requires first cataloguing the existing market research databases and identifying the critical questions that are not answered by current research...

  7. Army Business Transformation: The Utility of Using Corporate Business Models within the Institutional Army

    National Research Council Canada - National Science Library

    Bailer, Jr., John J

    2007-01-01

    .... Through a survey of the literature of published corporate business plans and models, military reports, Army depot case studies, and comparative analysis of emerging computer software technology...

  8. Department of the Army, FY 1999 Amended Budget Estimates, Army Working Capital Fund

    National Research Council Canada - National Science Library

    1998-01-01

    The Department of the Army has historically operated a significant number of its organic commercial and industrial facilities under revolving fund concepts to encourage these activities to function...

  9. The Center for the Army Profession and Ethic (CAPE) Annual Survey of the Army Profession (CASAP FY16)

    Science.gov (United States)

    2016-12-30

    incredibly fatiguing which cuts into my personal time to include mental health, physical health, and emotional well-being.” Understand this...April 2016. Its findings contribute to shared understanding of the State of the Army Profession within the Army Culture of Trust -- informing senior...Army leaders regarding the effectiveness of policies and practices intended to inspire and motivate Army professionals to “live by and uphold the Army

  10. A History of the Army Ground Forces; Study Number 16. The Army Ground Forces History of the Second Army

    Science.gov (United States)

    1945-09-01

    proficiency in conjunction with other arms and services.7 GHQ and Second Army placed great stress on the development of instructors and the proper training of...separate units. This was clearly brought out in a report of iuspection of Second Army units at Ft. Knox, Ky., by Maj. Gen. J. M. Cumins , Commander of the...covered were food and water, hygiene, housing, field sanitation, and contagious and communicable diseases. Physical exercise stressed mass calisthenics

  11. Special Weapons

    Data.gov (United States)

    Federal Laboratory Consortium — Supporting Navy special weapons, the division provides an array of engineering services, technical publication support services, logistics support services, safety...

  12. The Enemy Below: Preparing Ground Forces for Subterranean Warfare

    Science.gov (United States)

    2013-12-01

    States of America (CSA). Under the command of Lieutenant General (LTG) Ulysses S. Grant, Major General (MG) George Meade’s forces waged a nearly...Additionally, in his statement he noted that General Meade and Grant’s chief engineer regarded the effort as nonsense; that a mine that length had...tomorrow, but we shall certainly change the geography.” Sir Herbert Plumer, 2nd Army Commander44 1. Introduction The Western Front was caught in a

  13. A Study of Combined Arms Warfare by Alexander the Great.

    Science.gov (United States)

    1998-06-05

    source of Greek literature written about Alexander is from the famous biographer Plutarch . He wrote the Life of Alexander in the second century C.E...emperor Trajan, was appointed governor of Greece for a short time, and like Arrian, also served as Archon. It was in his later years that Plutarch began...and heavy troops were positioned by their territory behind the main battle line. According to Arrian and Plutarch , 41 Darius’ army at this time

  14. The DTIC Review, Urban Warfare. Volume 4, Number 4

    Science.gov (United States)

    1999-08-01

    changes daily. The United States Army has some of the most advanced technology in the world. With the openess of today’s global markets , many threats have...terrifying spurts of flame-throwers. Dragging the dead and dying out of the rubble at street level exposed the inhabitants to the sportive habits of Soviet...century versions to the most modem available on the world market . In an environment where the enemy will have tremendous technological advantages, old

  15. Army's drinking water surveillance program

    International Nuclear Information System (INIS)

    Sneeringer, P.V.; Belkin, F.; Straffon, N.; Costick, S.A.

    1977-01-01

    In 1976 a total of 827 water sources from Army installations throughout the world were sampled and analyzed for 53 chemical constituents and physical parameters. Medically significant contaminants included radiation measurements, heavy metals, fluoride, nitrate, and pesticides. Radiological activity appeared to vary with geographic location; a majority being from water sources in the western part of the U.S. No results for tritium were found to exceed the health-reference limit. Confirmatory analyses for radium-226 identified 3 groundwater sources as exceeding the limit; one was attributed to natural activity and the other sources are currently being investigated. Of the metals considered to be medically significant, mercury, chromium, lead, cadmium, silver, barium and arsenic were found in amounts within health level limits. Nitrate levels exceeding the health limit were confirmed for 2 drinking water sources

  16. Army Roof Management and Improvement Opportunities

    National Research Council Canada - National Science Library

    Bailey, David

    1999-01-01

    ... - about $200 million annually. Systemic, integrated solutions offer the Army a great opportunity to save millions of dollars annually in repair and replacement costs, and to avoid incidental costs incurred due to interrupted...

  17. Evaluation of Sierra Army Depot Groundwater Contamination

    National Research Council Canada - National Science Library

    Granetto, Paul

    1997-01-01

    ...), September 28, 1996. The Congressional conferees were concerned about allegations from a group of investors that the Army precipitously and abruptly changed its position on permits and applications to develop water...

  18. US Army Nuclear Burst Detection System (NBDS)

    International Nuclear Information System (INIS)

    Glaser, R.F.

    1980-07-01

    The Nuclear Burst Detection System (NBDS) was developed to meet the Army requirements of an unattended, automatic nuclear burst reporting system. It provides pertinent data for battlefield commanders on a timely basis with high reliability

  19. Accelerated Logistics: Streamlining the Army's Supply Chain

    National Research Council Canada - National Science Library

    Wang, Mark

    2000-01-01

    ...) initiative, the Army has dramatically streamlined its supply chain, cutting order and ship times for repair parts by nearly two-thirds nationwide and over 75 percent at several of the major Forces Command (FORSCOM) installations...

  20. Energy Design Guides for Army Barracks: Preprint

    Energy Technology Data Exchange (ETDEWEB)

    Deru, M.; Zhivov, A.; Herron, D.

    2008-08-01

    The U.S. Army Corps of Engineers and NREL are developing target energy budgets and design guides to achieve 30% energy savings. This paper focuses the design guide for one type of barracks called unaccompanied enlisted personal housing.

  1. US Army Cultural Obstacles to Transformational Leadership

    National Research Council Canada - National Science Library

    Combs, Peggy C

    2007-01-01

    ...." Although these words sound like a direct lift of the current 2007 Army Posture statement, which discusses the "pentathlete" leader, they were written by the 33rd CSA, General Dennis Reimer, in 1999...

  2. A Pilotless Army in the Megalopolis

    National Research Council Canada - National Science Library

    Wegner, Robert

    2004-01-01

    This monograph answers the question, "Can unmanned aerial vehicles (UAVs) supplant manned United States Army attack and reconnaissance helicopters in the conduct of future urban operations" and the answer is, "not completely...

  3. Engineering from the Sea: Establishing How Australian Army Engineers Fit into Australia’s Amphibious Concept

    Science.gov (United States)

    2011-03-16

    STUDIES MAJOR M.D. SCOTT AUSTRALIAN ARMY AY 10-11 Oral Defense Committee Member: Dr. John W. Gordon , Ph.D., Professor ofNational Security App...equivalent to a Private. 9 Ronald Ramsay McNicoll, The Royal Australian Engineers 1902 to 1919: The Second Volume of the History of the Royal...Special Collections Branch, Library of the Marine Corps, WWII Marianas Islands Collection, Box 4, Folder 2; and Ronald Ramsay McNicoll, The Royal

  4. Global Climate Change (GCC) Issues and Their Impacts on the US Army Corps of Engineers

    Science.gov (United States)

    1991-11-01

    Figure 24: The Great Plains scenario POSSIBLE SCENARIOS FOR FUTURE CLIMATE 70 Agriculture Clmate change could: *decreae. corn and soybean yields In...AD-A247 279 ____________ GLOBAL CLIMATE CHANGE us A (GCC) ISSUES AND THEIRoUS ;T AryL ors IM PACTS ON THE US ARMY Topographic Engineering CenerCORPS...blank) 12. AEPGAT DATE 3. REPORT TYPE AND DATES COVERED 1 29 Nov 91 SPECIAL REPORT 4. TITLE AND SUBTITLE ,. FUNDING NUMBERS Global Climate Change (GCC

  5. National Guard Special Forces: Enhancing the Contributions of Reserve Component Army Special Operations Forces

    Science.gov (United States)

    2012-01-01

    Predictability discussions struck a similar theme, specifically, that given notice that mobi - lization would occur at some future point, the unit could be ready...recommendation described earlier in this chapter may be indicated.1 Advertise for the skills desired, and encourage soldiers with those skills to

  6. Leadership Stability in Army Reserve Component Units

    Science.gov (United States)

    2013-01-01

    OMB control number. 1. REPORT DATE 2013 2. REPORT TYPE 3. DATES COVERED 00-00-2013 to 00-00-2013 4. TITLE AND SUBTITLE Leadership Stability in...standards for research quality and objectivity. Leadership Stability in Army Reserve Component Units Thomas F. Lippiatt, J. Michael Polich NATIONAL SECURITY...RESEARCH DIVISION Leadership Stability in Army Reserve Component Units Thomas F. Lippiatt, J. Michael Polich Prepared for the Office of the

  7. Democratic civilian control of the Nepalese Army

    Science.gov (United States)

    2013-06-14

    following are recommendations or principles the Army must institutionalize to guide it through the still-evolving civil-military relationship discussions...society. The following are recommendations or principles the Army must institutionalize to guide it through the still-evolving civil-military...hence, the principal–agent framework developed in microeconomics and already used in various political applications can be profitably extended to

  8. Counter - Drug: Mandate for the Army.

    Science.gov (United States)

    1991-03-01

    this comprehensive review will provide a basis for responding to new missions assigned...observations for determining the short-, mid-, and long-term direction of Army support to the national counter-drug effort. Also, this comprehensive review will provide...and long-term direction of Army support to the national counter-drug effort. Also, this comprehensive review will provide a basis for responding

  9. The Cultural Dimension of Army Transition

    Science.gov (United States)

    2012-12-06

    by the conveyor belt of training. Instead of spending so much of their time as resource managers, the challenges become those of the operational...adaptability. 19The ARMY 2020 project defined the design of the future Army. A design team lead by...iterations, a design based approach uses systemic analysis to resolve these criteria. 27 Systems thinking reflects a departure from the common

  10. U.S. Army Space Operational Narrative

    Science.gov (United States)

    2012-03-20

    fire, and effects ( MFE ), the operational support (OS), and the functional support division (FSD); it is further divided into many more specialties...cyberspace expertise at the highest levels is a must for the Army. Both ARCYBERCOM and USASMDC/ARSTRAT commands are key positions filled by MFE officers... MFE officers with the majority from infantry and armor (31). The FA, AD, and EN branches will round out the top five.47 Half of the Army branches are

  11. Florence Nightingale: on feeding an army.

    Science.gov (United States)

    Calkins, B M

    1989-12-01

    Florence Nightingale's work for the British Army during the Crimean War earned her the well-deserved honor of being considered the mother of modern nursing. Less well recognized is her involvement with the development of nutritional services for the military. A nutrient-intake analysis is developed here based on her recommendations and recipes for army troops. The intake profile is compared with modern recommendations for dietary intake for adequacy of the diet.

  12. The Army Ethic-Inchoate but Sufficient

    Science.gov (United States)

    2015-06-12

    are constraints imposed by this thesis. Delimitations include the scope, jus ad bellum, cultural relativism , descriptive ethics , and implementation...politicians. Third, this thesis will not look in depth at cultural relativism and how changes in laws and society’s philosophical and ethical ...THE ARMY ETHIC –INCHOATE BUT SUFFICIENT A thesis presented to the Faculty of the U.S. Army Command and General Staff College

  13. Specialized science.

    Science.gov (United States)

    Casadevall, Arturo; Fang, Ferric C

    2014-04-01

    As the body of scientific knowledge in a discipline increases, there is pressure for specialization. Fields spawn subfields that then become entities in themselves that promote further specialization. The process by which scientists join specialized groups has remarkable similarities to the guild system of the middle ages. The advantages of specialization of science include efficiency, the establishment of normative standards, and the potential for greater rigor in experimental research. However, specialization also carries risks of monopoly, monotony, and isolation. The current tendency to judge scientific work by the impact factor of the journal in which it is published may have roots in overspecialization, as scientists are less able to critically evaluate work outside their field than before. Scientists in particular define themselves through group identity and adopt practices that conform to the expectations and dynamics of such groups. As part of our continuing analysis of issues confronting contemporary science, we analyze the emergence and consequences of specialization in science, with a particular emphasis on microbiology, a field highly vulnerable to balkanization along microbial phylogenetic boundaries, and suggest that specialization carries significant costs. We propose measures to mitigate the detrimental effects of scientific specialism.

  14. Special geometry

    International Nuclear Information System (INIS)

    Strominger, A.

    1990-01-01

    A special manifold is an allowed target manifold for the vector multiplets of D=4, N=2 supergravity. These manifolds are of interest for string theory because the moduli spaces of Calabi-Yau threefolds and c=9, (2,2) conformal field theories are special. Previous work has given a local, coordinate-dependent characterization of special geometry. A global description of special geometries is given herein, and their properties are studied. A special manifold M of complex dimension n is characterized by the existence of a holomorphic Sp(2n+2,R)xGL(1,C) vector bundle over M with a nowhere-vanishing holomorphic section Ω. The Kaehler potential on M is the logarithm of the Sp(2n+2,R) invariant norm of Ω. (orig.)

  15. Russian Army Mat as a Code System Controlling Behaviour in the Russian army

    Directory of Open Access Journals (Sweden)

    Vadim Mikhailin

    2004-09-01

    Full Text Available This text is to be a shortened, restructured and based on somewhat another factological foundation version of my article “Russkii mat kak muzhskoi obstsennyi kod: problema proiskhozhdeniia i evoliutsiia statusa”, published in # 43 of Novoe Literaturnoe Obozrenie. Tracing the genesis of mat to the specific modes of behaviour, peculiar to the archaic male warrior bands, I’m going to show that the military milieu (and some other, structurally close to it social strata, has always been – and remain – absolutely adequate for the mat speaking. Moreover, mat has always carried on within these strata rather specific function connected with creating of one’s identity as a military, and its use offers various and sometimes the only possible means of impact at one’s equal or subordinate (or even superior. As a matter of fact, mat is a basis for a whole code system, controlling different military behaviour practices. The problems of the freshers’ adaptation and of the national specificities in the late Soviet and modern Russian army are to be considered with special respect.

  16. Military organization and army command of ancient armies of Northern Black Sea Region

    Directory of Open Access Journals (Sweden)

    K. M. Kolesnykov

    2015-06-01

    Full Text Available This article deal with the description, analysis and generalization of features organization of command structure of the army ancient states of the Northern Black Sea region: Olbia, Chersonese, Bosporus. Author sure that the foundation of the armed forces of these states was a civil militia – free, economically independent landowners, endowed with the broadest volume of political and social rights men – full citizens. Accordingly, the assemblies of citizens were electing strategists, who led militia forces. In case of need the people also claimed commanders’ mercenary troops. Bosporus kings have attracted a significant number of hired troops that held by the royal treasury income and special direct tax. Bosporus military command came from magistrates of polis only at the lower levels. Middle and higher level of «officer corps» of the Bosporus were appointed by the monarch from among the landowners, officialdom and military aristocracy. For example, in the Roman period on the Bosporus fixed formation units of cathafractarian cavalry. The weapons and tactics of the Sarmatian nomadic nobility (Aspurhianian, Sirak, Aorsy and more were served as a model for Bosporus cataphractarian horsemen.

  17. Department of the Army Installation Restoration Program

    International Nuclear Information System (INIS)

    Anderson, A.W.

    1988-01-01

    The Army's Installation Restoration Program (IRP) was established in 1975 in response to regulatory action at several installations where past disposal practices had caused contamination of streams and groundwater. The need to decontaminate excess Army-owned real estate also was considered in early IRP activities. A variety of site types have been discovered on Army installations. The major site types evaluated to date include: contaminated soil areas, landfills, lagoons, buildings, burning grounds, sumps, pits, storage tanks, sewage treatment plants, storage pads, industrial wastewater treatment plants, and salvage yards. Twenty Army installations have been proposed for or listed on the National Priorities List (NPL). The need for taking action at hazardous waste sites, however, is based on threats they pose to human health, welfare or the environment. Sites do not have to be on the SPL in order to be cleaned up through IRP activities. All of the sites that caused Army installations to be proposed for the NPL are being evaluated and cleaned up. In addition, all Army properties have been or will be assessed and where needed they will be addressed by the IRP

  18. Horsemanship of ancient armies of Northern Black Sea region

    Directory of Open Access Journals (Sweden)

    K. M. Kolesnykov

    2015-06-01

    Full Text Available This article deal with the description, analysis and generalization of features of organization and tactics of cavalry of the army ancient states of the Northern Black Sea region: Olbia, Chersonese, Bosporus. Author sure that the foundation of the armed forces of these states was a civil militia – free, economically independent landowners, endowed with the broadest volume of political and social rights men – full citizens. Bosporus kings have attracted a significant number of hired troops that held by the royal treasury income and special direct tax. The cavalry is interacted with heavily armed infantry contingents – hoplites or swordsman­ thyureoforoi. The contingents of lightweight (arrow­toxots and heavy (akontists and spearmen cavalry were presented as part of ancient armies of the Northern Black Sea Region in Classical and Hellenistic periods. In the Roman period on the Bosporus fixed formation units of cathafractarian cavalry. The weapons and tactics of the Sarmatian nomadic nobility (Aspurhianian, Sirak, Aorsy and more were served as a model for Bosporus cataphractarian horsemen.

  19. The Abbott and Costello Effect: Who's on What, and What's Where When? A Human-Centered Method to Investigate Network Centric Warfare Systems

    National Research Council Canada - National Science Library

    Reed, Derek W

    2007-01-01

    ...), fundamentally changing how warfare is being conducted. Network centric warfare (NCW) systems are being rushed to the field and are offered as a solution for the fog of war and as a way to reduce manpower costs...

  20. Can Access to Data Prevent Army Suicides Identifying Optimal Response Strategies for Army Leaders

    Science.gov (United States)

    2016-01-01

    activities. One shortfall of this approach, however, is the lack of guidance on how Army leaders should interpret and use these data. To address this gap ...records Personal relationships Divorce, Army Community Service records Financial problems Wage garnishment, creditor notification agreed that leaders...endorsed by three panelists. compared, noting that there are significant differences between battalions with respect to age, gender , and rank

  1. Specialized languages

    DEFF Research Database (Denmark)

    Mousten, Birthe; Laursen, Anne Lise

    2016-01-01

    Across different fields of research, one feature is often overlooked: the use of language for specialized purposes (LSP) as a cross-discipline. Mastering cross-disciplinarity is the precondition for communicating detailed results within any field. Researchers in specialized languages work cross...... science fields communicate their findings. With this article, we want to create awareness of the work in this special area of language studies and of the inherent cross-disciplinarity that makes LSP special compared to common-core language. An acknowledgement of the importance of this field both in terms...... of more empirical studies and in terms of a greater application of the results would give language specialists in trade and industry a solid and updated basis for communication and language use....

  2. Rain-Induced Wash-Off of Chemical Warfare Agent (VX) from Foliar Surfaces of Living Plants Maintained in a Surety Hood

    Science.gov (United States)

    2016-09-01

    RAIN-INDUCED WASH-OFF OF CHEMICAL WARFARE AGENT (VX) FROM FOLIAR SURFACES OF LIVING PLANTS MAINTAINED IN A...Final 3. DATES COVERED (From - To) May 2014 – Sep 2015 4. TITLE AND SUBTITLE Rain-Induced Wash-Off of Chemical Warfare Agent (VX) from Foliar...galli Foliage Chemical warfare agent (CWA) O-ethyl-S-(2

  3. Guerilla Warfare & Law Enforcement: Combating the 21st Century Terrorist Cell within the U.S.

    Directory of Open Access Journals (Sweden)

    Major Richard Hughbank

    2009-01-01

    Full Text Available Both domestic and international terrorist organizations employ guerrilla warfare tactics, techniques, and procedures. Thus, the ability to identify and defeat the members of these organizations, cripple their infrastructures, and disrupt their financial resources lies in the understanding of modern guerrilla warfare as it develops in the twenty-first century within the United States.3 The forms of asymmetric warfare4 adopted by domestic and international terrorist groups alike is no longer intended to gain simple media exposure or governmental manipulation; they want to make an overpowering impact by causing massive loss of life and severe damage to infrastructure and are often motivated by religious imperatives and political goals. As terrorism analyst Stephen Flynn has observed, "Throughout the 20th century [Americans] were able to treat national security as essentially an out-of-body experience. When confronted by threats, [America] dealt with them on the turf of our allies or our adversaries. Aside from the occasional disaster and heinous crime, civilian life [in the United States] has been virtually terror-free." With the turn of the twenty-first century, terrorist operations have become more prevalent in the United States and are taking shape in the form of modern guerrilla warfare, thus creating new challenges for federal, state, and local law enforcement agencies. After reviewing the origin and nature of these challenges, this article will offer some suggestions for countering guerilla warfare in the United States.

  4. Army Secure Operating System: Information Security for Real Time Systems

    National Research Council Canada - National Science Library

    Anderson, Eric

    1984-01-01

    The Army Secure Operating System (ASOS) project, under the management of the U.S. Army CECOM organization, will provide real time systems software necessary for fielding modern Battlefield Automation Systems...

  5. Assessing Army Professional Forums Metrics for Effectiveness and Impact

    National Research Council Canada - National Science Library

    Cianciolo, Anna T; Heiden, Charles G; Prevou, Michael I

    2006-01-01

    ... meet the challenges brought on by Army transformation. Army professional forums (APFs), powered by advances in collaborative toolsets and multimedia presentation software, provide a means for leader self-development and professional growth...

  6. A Transformed Army in Europe For a Transformed World

    National Research Council Canada - National Science Library

    Brown, James

    2003-01-01

    General Gordon R. Sullivan was the Army Chief of Staff when he wrote, "Ultimately, the Army's objective in leveraging change is to create a "learning organization," one that adapts in ever-quicker response cycles...

  7. 2007 Posture Statement, Army Reserve: An Operational Force

    National Research Council Canada - National Science Library

    Stultz, Jack C

    2007-01-01

    The 2007 Army Reserve Posture Statement describes how the Army Reserve continues to transform from a strategic reserve to an operational force, meeting today's challenges as it better prepares for future uncertainties...

  8. Army Model and Simulation Standards Report FY98

    National Research Council Canada - National Science Library

    1997-01-01

    ...) standards efforts as work progresses towards the objective Army M&S environment. This report specifically documents projects approved for funding through the Army Model and Improvement Program (AMIP...

  9. Nanotechnology Laboratory Collaborates with Army to Develop Botulism Vaccine | FNLCR

    Science.gov (United States)

    The Nanotechnology Characterization Laboratory (NCL) is collaborating with the Army to develop a candidate vaccine against botulism. Under a collaboration agreement between the National Cancer Institute and the U.S. Army Medical Research Institute of

  10. Long-term neurological and neuropsychological complications of sulfur mustard and Lewisite mixture poisoning in Chinese victims exposed to chemical warfare agents abandoned at the end of WWII.

    Science.gov (United States)

    Isono, O; Kituda, A; Fujii, M; Yoshinaka, T; Nakagawa, G; Suzuki, Y

    2018-09-01

    In August 2003, 44 victims were poisoned by chemical warfare agents (CWAs) leaked from five drums that were excavated at a construction site in Qiqihar, Northeast China. The drums were abandoned by the former Japanese imperial army during World War II and contained a mixture of Sulfur mustard (SM) and Lewisite. We carried out a total of six regular check-ups between 2006 and 2014, and from 2008 we added neurological evaluations including neuropsychological test and autonomic nervous function test in parallel with medical follow-up as much as was possible. Severe autonomic failure, such as hyperhidrosis, pollakiuria, diarrhoea, diminished libido, and asthenia appeared in almost all victims. Polyneuropathy occurred in 35% of the victims and constricted vision occurred in 20% of them. The rates of abnormal response on cold pressor test (CPT), active standing test (AST), Heart rate variability (CV R-R ), performed in 2014, were 63.1%, 31.6%, and 15.9%, respectively. On neuropsychological testing evaluated in 2010, a generalized cognitive decline was observed in 42% of the victims. Memories and visuospatial abilities were affected in the remaining victims. Finally, a 17-item PTSD questionnaire and the Beck Depression Inventory evaluated in 2014 revealed long-lasting severe PTSD symptoms and depression of the victims. Our findings suggest that an SM/Lewisite compound have significant adverse consequences directly in cognitive and emotional network and autonomic nervous systems in the brain. Copyright © 2018 Elsevier B.V. All rights reserved.

  11. Naval Undersea Warfare Center Division Newport utilities metering, Phase 1

    Energy Technology Data Exchange (ETDEWEB)

    Carroll, D.M.

    1992-11-01

    Pacific Northwest Laboratory developed this report for the US Navy`s Naval Undersea Warfare Center Division Newport, Rhode Island (NUWC). The purpose of the report was to review options for metering electricity and steam used in the NUWC compound, and to make recommendations to NUWC for implementation under a follow-on project. An additional NUWC concern is a proposed rate change by the servicing utility, Newport Electric, which would make a significant shift from consumption to demand billing, and what effect that rate change would have on the NUWC utility budget. Automated, remote reading meters are available which would allow NUWC to monitor its actual utility consumption and demand for both the entire NUWC compound and by end-use in individual buildings. Technology is available to perform the meter reads and manipulate the data using a personal computer with minimal staff requirement. This is not meant to mislead the reader into assuming that there is no requirement for routine preventive maintenance. All equipment requires routine maintenance to maintain its accuracy. While PNL reviewed the data collected during the site visit, however, it became obvious that significant opportunities exist for reducing the utility costs other than accounting for actual consumption and demand. Unit costs for both steam and electricity are unnecessarily high, and options are presented in this report for reducing them. Additionally, NUWC has an opportunity to undertake a comprehensive energy resource management program to significantly reduce its energy demand, consumption, and costs.

  12. Naval Undersea Warfare Center Division Newport utilities metering, Phase 1

    Energy Technology Data Exchange (ETDEWEB)

    Carroll, D.M.

    1992-11-01

    Pacific Northwest Laboratory developed this report for the US Navy's Naval Undersea Warfare Center Division Newport, Rhode Island (NUWC). The purpose of the report was to review options for metering electricity and steam used in the NUWC compound, and to make recommendations to NUWC for implementation under a follow-on project. An additional NUWC concern is a proposed rate change by the servicing utility, Newport Electric, which would make a significant shift from consumption to demand billing, and what effect that rate change would have on the NUWC utility budget. Automated, remote reading meters are available which would allow NUWC to monitor its actual utility consumption and demand for both the entire NUWC compound and by end-use in individual buildings. Technology is available to perform the meter reads and manipulate the data using a personal computer with minimal staff requirement. This is not meant to mislead the reader into assuming that there is no requirement for routine preventive maintenance. All equipment requires routine maintenance to maintain its accuracy. While PNL reviewed the data collected during the site visit, however, it became obvious that significant opportunities exist for reducing the utility costs other than accounting for actual consumption and demand. Unit costs for both steam and electricity are unnecessarily high, and options are presented in this report for reducing them. Additionally, NUWC has an opportunity to undertake a comprehensive energy resource management program to significantly reduce its energy demand, consumption, and costs.

  13. Simulation-based planning for theater air warfare

    Science.gov (United States)

    Popken, Douglas A.; Cox, Louis A., Jr.

    2004-08-01

    Planning for Theatre Air Warfare can be represented as a hierarchy of decisions. At the top level, surviving airframes must be assigned to roles (e.g., Air Defense, Counter Air, Close Air Support, and AAF Suppression) in each time period in response to changing enemy air defense capabilities, remaining targets, and roles of opposing aircraft. At the middle level, aircraft are allocated to specific targets to support their assigned roles. At the lowest level, routing and engagement decisions are made for individual missions. The decisions at each level form a set of time-sequenced Courses of Action taken by opposing forces. This paper introduces a set of simulation-based optimization heuristics operating within this planning hierarchy to optimize allocations of aircraft. The algorithms estimate distributions for stochastic outcomes of the pairs of Red/Blue decisions. Rather than using traditional stochastic dynamic programming to determine optimal strategies, we use an innovative combination of heuristics, simulation-optimization, and mathematical programming. Blue decisions are guided by a stochastic hill-climbing search algorithm while Red decisions are found by optimizing over a continuous representation of the decision space. Stochastic outcomes are then provided by fast, Lanchester-type attrition simulations. This paper summarizes preliminary results from top and middle level models.

  14. Back to the future: aerial warfare in Libya

    Directory of Open Access Journals (Sweden)

    João Paulo Nunes Vicente

    2013-05-01

    Full Text Available A century after the first air bomb mission, a new intervention in the same geographic space has made evident the changes in Airpower. The Aerial Warfare in Libya has radically changed the civil war, complying with a UN mission to protect Libyan population, imposing a no-fly zone and an arms embargo. Therefore, Operation Unified Protector became one of the most successful campaigns in the history of NATO. We aim to assess the operational efficiency of Airpower in the conflict in Libya, focusing on the challenges of a War essentially Aerial. Despite the military results and the fact that some political objectives were met, we can identify some concerning trends that, if not shifted, may negatively influence future NATO operations. We do not aim to draw general and universal conclusions on the strategic value of Airpower based on the analysis of a specific case. Above all, we focus on identifying some lessons which have influenced OUP operational efficiency. Thus, we must analyze some factors, such as the scope of objectives, the type of opposing action and aerial strategy used by the coalition and then focus on the challenges arising from the OUP.

  15. Drone Warfare: Twenty-First Century Empire and Communications

    Directory of Open Access Journals (Sweden)

    Kevin Howley

    2017-02-01

    Full Text Available This paper, part of a larger project that examines drones from a social-construction of technology perspective, considers drone warfare in light of Harold Innis’s seminal work on empire and communication. Leveraging leading-edge aeronautics with advanced optics, data processing, and networked communication, drones represent an archetypal “space-biased” technology. Indeed, by allowing remote operators and others to monitor, select, and strike targets from half a world away, and in real-time, these weapon systems epitomize the “pernicious neglect of time” Innis sought to identify and remedy in his later writing. With Innis’s time-space dialectic as a starting point, then, the paper considers drones in light of a longstanding paradox of American culture: the impulse to collapse the geographical distance between the United States and other parts of the globe, while simultaneously magnifying the cultural difference between Americans and other peoples and societies. In the midst of the worldwide proliferation of drones, this quintessentially sublime technology embodies this (disconnect in important, profound, and ominous ways.

  16. Prevalence of Asthma in Children of Chemical Warfare Victims

    Science.gov (United States)

    Mirsadraee, Majid; Mozaffari, Abolfazl; Attaran, Davood

    2011-01-01

    Objective Exposure of DNA to sulfur mustard gas may increase the inheritance of asthma in chemical warfare victims' (CWV) offspring. The objective of this study was to determine the prevalence of asthma in children of CWV and compare it to asthmatic children in the general population. Methods Four hundred and nine children from 130 CWV fathers and 440 children from 145 asthmatic parents from two cities in Iran participated in this study. The prevalence of asthma was determined by standard questionnaire released for epidemiological survey of asthma in children and compared between two groups. Findings The prevalence of asthma in the CWV group was 15%; this was not significantly different from the control group (12.5%). The children of the CWV group reported a significantly greater incidence of wheezing (1.2±3.1 attacks) per year, but the control group reported more severe attacks leading to speech difficulties (3%) and coughing (7%). Regression analysis showed that with increasing family size in the control group, the number of subjects suffering from asthmatic symptoms decreases significantly (r=0.86, P=0.001). Conclusion Chemical agents may increase the prevalence of asthma in the offspring of CWV. PMID:23056804

  17. The Army Communications Objectives Measurement System (ACOMS) Users’ Manual

    Science.gov (United States)

    1988-07-01

    and analysis system to support Army (1) assessments of advertising program effectiveness; (2) assessments of advertising strategy efficiencies; (3...advertising program effectiveness in a timely fashion; 2 (2) To support Army assessments of advertising strategy in an integrated framework; and (3...ACOMS data to assess the Army’s advertising strategy . ACOMS was designed to be used to examine the extent to which the Army’s intended messages are

  18. A Cross-Sectional Comparison of Army Advertising Attributes

    Science.gov (United States)

    1990-11-01

    ARMY ADVERTISING ATTRIBUTES EXECUTIVE SUMMARY Research Requirement: In order to assess the impact of the Army’s advertising strategy and campaigns...Sample sizes varied from 4,875 to 4,926 for the NRS and from 3,569 to 3,602 for ACOMS. Improvement type themes. This advertising strategy would make...and college. I recommend that the Army focus advertising strategy on the Army as a positive step between high school and college in addition to work

  19. Recruiting Effects of Army Advertising

    Science.gov (United States)

    1989-01-01

    Evaluation; and from Colonels Donald Borden and William Graf of the Directorate of Advertising and Sales Promotion . Ani Haigazian provided valuable...because they include numerous non- media items, such as lead fulfillment, sales promotion , market research, printed bro- chures, and special programs

  20. Special relativity

    International Nuclear Information System (INIS)

    Taylor, J.G.

    1975-01-01

    It is stated that the early chapters review special relativity from an elementary mathematical viewpoint, and include discussion of recent experiments which set out to test Einstein's predictions. The theory of relativity is then reformulated in more sophisticated mathematical language to show its relation to electro-magnetism, and to lay the foundation for more general viewpoints. The final chapter discusses in simple terms where activity in the field is currently centred, and where future interest lies. Chapter headings include: the constant speed of light; measuring time and distance; the Lorentz transformation (relativity of simultaneity, space-time and causality); relativistic kinematics (including - the Dopper effect); relativistic dynamics (including - nuclear binding energy, particle creation, electrodynamics); the structure of special relativity (including - the Lorentz group, the rotation group, elementary particle scattering); extensions of special relativity. (U.K.)

  1. Optimizing the Sustainment of U.S. Army Weapon Systems

    Science.gov (United States)

    2016-03-17

    Dale Carnegie , Fellowship, etc.) NA None of the above OPTIMIZING SUSTAINMENT OF ARMY SYSTEMS 36 Question 11: Army Civilian Education System...Darden, Dale Carnegie , Fellowship, etc.) None of the above 11. Army Civilian Education System (check all that apply) Action Officer Development Course

  2. Detection of biological warfare agents using ultra violet-laser induced fluorescence LIDAR.

    Science.gov (United States)

    Joshi, Deepti; Kumar, Deepak; Maini, Anil K; Sharma, Ramesh C

    2013-08-01

    This review has been written to highlight the threat of biological warfare agents, their types and detection. Bacterial biological agent Bacillus anthracis (bacteria causing the disease anthrax) which is most likely to be employed in biological warfare is being discussed in detail. Standoff detection of biological warfare agents in aerosol form using Ultra violet-Laser Induced Fluorescence (UV-LIF) spectroscopy method has been studied. Range-resolved detection and identification of biological aerosols by both nano-second and non-linear femto-second LIDAR is also discussed. Calculated received fluorescence signal for a cloud of typical biological agent Bacillus globigii (Simulants of B. anthracis) at a location of ~5.0 km at different concentrations in presence of solar background radiation has been described. Overview of current research efforts in internationally available working UV-LIF LIDAR systems are also mentioned briefly. Copyright © 2013 Elsevier B.V. All rights reserved.

  3. SiGe-based re-engineering of electronic warfare subsystems

    CERN Document Server

    Lambrechts, Wynand

    2017-01-01

    This book equips readers with a thorough understanding of the applicability of new-generation silicon-germanium (SiGe) electronic subsystems for the military purposes of electronic warfare and defensive countermeasures. The theoretical and technical background is extensively explained and all aspects of the integration of SiGe as an enabling technology for maritime, land, and airborne (including space) electronic warfare are addressed, including research, design, development, and implementation. The coverage is supported by mathematical derivations, informative illustrations, practical examples, and case studies. While SiGe technology provides speed, performance, and price advantages in many markets, sharing of information on its use in electronic warfare systems has to date been limited, especially in developing nations. This book will therefore be warmly welcomed as an engineering guideline that focuses especially on the speed and reliability of current-generation SiGe circuits and highlights emerging innov...

  4. THE CYBER DIMENSION OF MODERN HYBRID WARFARE AND ITS RELEVANCE FOR NATO

    Directory of Open Access Journals (Sweden)

    Sorin DUCARU

    2016-06-01

    Full Text Available The technological development and the instant communication possibilities advanced not only economic and social developments, but also evolving threats from those who exploit the vulnerabilities of communication and information systems. The cyber threat landscape points to a significant increase of the frequency, intensity, duration and sophistication of cyber-attacks. One of the new and concerning trends is the use of cyber capabilities in relation with military of hybrid operations – the so-called cyber dimension of hybrid warfare. NATO’s strategy on countering hybrid warfare is based on the triad: prepare-deter-defend, which also applies to cyber. Nations represent the first line of defence in countering hybrid strategies. International cooperation is also a key factor in this sense. It is in this context that NATO’s response to cyber-attacks in the context of hybrid warfare must be further refined.

  5. An evolutionary theory of large-scale human warfare: Group-structured cultural selection.

    Science.gov (United States)

    Zefferman, Matthew R; Mathew, Sarah

    2015-01-01

    When humans wage war, it is not unusual for battlefields to be strewn with dead warriors. These warriors typically were men in their reproductive prime who, had they not died in battle, might have gone on to father more children. Typically, they are also genetically unrelated to one another. We know of no other animal species in which reproductively capable, genetically unrelated individuals risk their lives in this manner. Because the immense private costs borne by individual warriors create benefits that are shared widely by others in their group, warfare is a stark evolutionary puzzle that is difficult to explain. Although several scholars have posited models of the evolution of human warfare, these models do not adequately explain how humans solve the problem of collective action in warfare at the evolutionarily novel scale of hundreds of genetically unrelated individuals. We propose that group-structured cultural selection explains this phenomenon. © 2015 Wiley Periodicals, Inc.

  6. Changing the Scale and Efficiency of Chemical Warfare Countermeasure Discovery Using the Zebrafish

    Science.gov (United States)

    Peterson, Randall T.; MacRae, Calum A.

    2013-01-01

    As the scope of potential chemical warfare agents grows rapidly and as the diversity of potential threat scenarios expands with non-state actors, so a need for innovative approaches to countermeasure development has emerged. In the last few years, the utility of the zebrafish as a model organism that is amenable to high-throughput screening has become apparent and this system has been applied to the unbiased discovery of chemical warfare countermeasures. This review summarizes the in vivo screening approach that has been pioneered in the countermeasure discovery arena, and highlights the successes to date as well as the potential challenges in moving the field forward. Importantly, the establishment of a zebrafish platform for countermeasure discovery would offer a rapid response system for the development of antidotes to the continuous stream of new potential chemical warfare agents. PMID:24273586

  7. The evolution of dependent medical care in the U.S. Army.

    Science.gov (United States)

    Herold, Thomas J S

    2011-10-01

    There is great focus within the military medical community regarding the ever growing cost of medical care overall and dependent care specifically. A great deal of discussion relates to the delivery of care through a growing military-civilian partnership, where an increased amount of health care will be referred to an ever growing network of civilian providers. The U.S. military establishment now stands at an important crossroad leading into the future of dependent care. However, the special concerns, which arise from the responsibility of caring for military dependents, are not a solely recent phenomenon. Ever since the establishment of a permanent standing U.S. Army in the late 1700s, there have been families in need of medical treatment. Although changes occurred continuously, the development and evolution of policies regulating the delivery of medical care to dependants can be divided into three periods. The first is the longest and ranges from the establishment of the Army until the year 1900. The second period spans from 1900 to the post-Korean War year of 1956. The third and final period is from 1956 to 1975. Special changes and advances in each of these periods have served to shape the face of dependent care in today's Army Medical Department.

  8. Army Energy and Water Reporting System Assessment

    Energy Technology Data Exchange (ETDEWEB)

    Deprez, Peggy C.; Giardinelli, Michael J.; Burke, John S.; Connell, Linda M.

    2011-09-01

    There are many areas of desired improvement for the Army Energy and Water Reporting System. The purpose of system is to serve as a data repository for collecting information from energy managers, which is then compiled into an annual energy report. This document summarizes reported shortcomings of the system and provides several alternative approaches for improving application usability and adding functionality. The U.S. Army has been using Army Energy and Water Reporting System (AEWRS) for many years to collect and compile energy data from installations for facilitating compliance with Federal and Department of Defense energy management program reporting requirements. In this analysis, staff from Pacific Northwest National Laboratory found that substantial opportunities exist to expand AEWRS functions to better assist the Army to effectively manage energy programs. Army leadership must decide if it wants to invest in expanding AEWRS capabilities as a web-based, enterprise-wide tool for improving the Army Energy and Water Management Program or simply maintaining a bottom-up reporting tool. This report looks at both improving system functionality from an operational perspective and increasing user-friendliness, but also as a tool for potential improvements to increase program effectiveness. The authors of this report recommend focusing on making the system easier for energy managers to input accurate data as the top priority for improving AEWRS. The next major focus of improvement would be improved reporting. The AEWRS user interface is dated and not user friendly, and a new system is recommended. While there are relatively minor improvements that could be made to the existing system to make it easier to use, significant improvements will be achieved with a user-friendly interface, new architecture, and a design that permits scalability and reliability. An expanded data set would naturally have need of additional requirements gathering and a focus on integrating

  9. Skeletal evidence for Inca warfare from the Cuzco region of Peru.

    Science.gov (United States)

    Andrushko, Valerie A; Torres, Elva C

    2011-11-01

    This article addresses the bioarchaeological evidence for Inca warfare through an analysis of 454 adult skeletons from 11 sites in the Inca capital region of Cuzco, Peru. These 11 sites span almost 1000 years (AD 600-1532), which allows for a comparison of the evidence for warfare before the Inca came to power (Middle Horizon AD 600-1000), during the time of Inca ascendency in the Late Intermediate Period (AD 1000-1400), and after the Inca came to power and expanded throughout the Cuzco region and beyond (Inca Imperial Period, AD 1400-1532). The results indicate that 100 of 454 adults (22.0%) showed evidence of cranial trauma. Of these, 23 individuals had major cranial injuries suggestive of warfare, consisting of large, complete, and/or perimortem fractures. There was scant evidence for major injuries during the Middle Horizon (2.8%, 1/36) and Late Intermediate Period (2.5%, 5/199), suggesting that warfare was not prevalent in the Cuzco region before and during the Inca rise to power. Only in the Inca Imperial Period was there a significant rise in major injuries suggestive of warfare (7.8%, 17/219). Despite the significant increase in Inca times, the evidence for major cranial injuries was only sporadically distributed at Cuzco periphery sites and was entirely absent at Cuzco core sites. These findings suggest that while the Inca used warfare as a mechanism for expansion in the Cuzco region, it was only one part of a complex expansion strategy that included economic, political, and ideological means to gain and maintain control. Copyright © 2011 Wiley-Liss, Inc.

  10. Blaptica dubia as sentinels for exposure to chemical warfare agents - a pilot study.

    Science.gov (United States)

    Worek, Franz; Seeger, Thomas; Neumaier, Katharina; Wille, Timo; Thiermann, Horst

    2016-11-16

    The increased interest of terrorist groups in toxic chemicals and chemical warfare agents presents a continuing threat to our societies. Early warning and detection is a key component for effective countermeasures against such deadly agents. Presently available and near term solutions have a number of major drawbacks, e.g. lack of automated, remote warning and detection of primarily low volatile chemical warfare agents. An alternative approach is the use of animals as sentinels for exposure to toxic chemicals. To overcome disadvantages of vertebrates the present pilot study was initiated to investigate the suitability of South American cockroaches (Blaptica dubia) as warning system for exposure to chemical warfare nerve and blister agents. Initial in vitro experiments with nerve agents showed an increasing inhibitory potency in the order tabun - cyclosarin - sarin - soman - VX of cockroach cholinesterase. Exposure of cockroaches to chemical warfare agents resulted in clearly visible and reproducible reactions, the onset being dependent on the agent and dose. With nerve agents the onset was related to the volatility of the agents. The blister agent lewisite induced signs largely comparable to those of nerve agents while sulfur mustard exposed animals exhibited a different sequence of events. In conclusion, this first pilot study indicates that Blaptica dubia could serve as a warning system to exposure of chemical warfare agents. A cockroach-based system will not detect or identify a particular chemical warfare agent but could trigger further actions, e.g. specific detection and increased protective status. By designing appropriate boxes with (IR) motion sensors and remote control (IR) camera automated off-site warning systems could be realized. Copyright © 2016 Elsevier Ireland Ltd. All rights reserved.

  11. A history of US Army PAs.

    Science.gov (United States)

    Chalupa, Robyn L; Marble, W Sanders

    2017-11-01

    The US military has a long tradition of using physician assistants (PAs). The Army began using PAs in 1971 in an effort to supplement the physicians and surgeons in the medical corps. As their numbers grew, PAs gradually replaced general medical officers assigned to battalions. Later, specialty positions developed in aviation medicine, orthopedics, and emergency medicine. The need for a PA serving as an adviser in the major commands slowly developed at all levels of leadership. In 2015, the Army removed limitations on female PAs assigned to combat units. PAs lead in tactical and clinical settings, filling command roles, senior clinical positions, and administrative leadership roles.

  12. US Army primary radiation standards complex

    Energy Technology Data Exchange (ETDEWEB)

    Rogers, S.C. [Radiation Standards and Dosimetry Laboratory, Redstone Arsenal, AL (United States)

    1993-12-31

    This paper describes the U.S. Army Primary Radiation Standards Complex (PRSC) to be constructed at Redstone Arsenal, Alabama. The missions of the organizations to be located in the PRSC are described. The health physics review of the facility design is discussed. The radiation sources to be available in the PRSC and the resulting measurement capabilities of the Army Primary Standards Laboratory Nucleonics section are specified. Influence of the National Voluntary Laboratory Accrediation Program (NVLAP) accreditation criteria on facility design and source selection is illustrated.

  13. Thinkers at the Cutting Edge: Innovation in the Danish Special Forces

    DEFF Research Database (Denmark)

    Mayland, Karina; Haugegaard, Rikke; Shapiro, Allan

    2017-01-01

    This article is a contribution to the discussions about the unique capacity of Special Operation Forces (SOF). Based on data from interviews and observation in a field study among the Danish Frogman Corps, the Royal Danish Navy Special Operations unit, and the Danish Jaeger Corps, the Danish Army...... Special Operations unit, the article investigates the work environment of the two Special Operations units supporting an innovative capacity. What kind of leadership, processes and work climate support employee-driven innovation in SOF?......This article is a contribution to the discussions about the unique capacity of Special Operation Forces (SOF). Based on data from interviews and observation in a field study among the Danish Frogman Corps, the Royal Danish Navy Special Operations unit, and the Danish Jaeger Corps, the Danish Army...

  14. Efikasnost sistema PVO u uslovima elektronskih dejstava / Efficiency of antiaircraft system in electronic warfare

    Directory of Open Access Journals (Sweden)

    Vladimir V. Šepec

    2007-01-01

    Full Text Available U radu je primenjena teorija masovnog opsluživanja u analizi efikasnosti sistema protivvazduhoplovne odbrane (sistema PVO u uslovima elektronskih dejstava protivnika. Prikazan je model za ocenu efikasnosti sistema PVO i predstavljeni su izrazi za procenu efikasnosti sistema PVO u uslovima elektronskih dejstava. / In this article the theory of mass servicing is used in the analysis of efficiency of antiaircraft system in the conditions of electronic warfare. The model for analysis of the antiaircraft system efficiency has been shown and formulas for qualitative analysis of antiaircraft system efficiency have been presented in the conditions of electronic warfare.

  15. Particle Swarm Social Adaptive Model for Multi-Agent Based Insurgency Warfare Simulation

    Energy Technology Data Exchange (ETDEWEB)

    Cui, Xiaohui [ORNL; Potok, Thomas E [ORNL

    2009-12-01

    To better understand insurgent activities and asymmetric warfare, a social adaptive model for modeling multiple insurgent groups attacking multiple military and civilian targets is proposed and investigated. This report presents a pilot study using the particle swarm modeling, a widely used non-linear optimal tool to model the emergence of insurgency campaign. The objective of this research is to apply the particle swarm metaphor as a model of insurgent social adaptation for the dynamically changing environment and to provide insight and understanding of insurgency warfare. Our results show that unified leadership, strategic planning, and effective communication between insurgent groups are not the necessary requirements for insurgents to efficiently attain their objective.

  16. Tissue-based water quality biosensors for detecting chemical warfare agents

    Science.gov (United States)

    Greenbaum, Elias [Oak Ridge, TN; Sanders, Charlene A [Knoxville, TN

    2003-05-27

    A water quality sensor for detecting the presence of at least one chemical or biological warfare agent includes: a cell; apparatus for introducing water into the cell and discharging water from the cell adapted for analyzing photosynthetic activity of naturally occurring, free-living, indigenous photosynthetic organisms in water; a fluorometer for measuring photosynthetic activity of naturally occurring, free-living, indigenous photosynthetic organisms drawn into the cell; and an electronics package that analyzes raw data from the fluorometer and emits a signal indicating the presence of at least one chemical or biological warfare agent in the water.

  17. Lessons from the British Defeat Combating Colonial Hybrid Warfare in the 1781 Southern Theater of Operations

    Science.gov (United States)

    2014-05-22

    Society for Army Historical Research 16, no. 61 (1937): 3-23; Henry Clinton, The Headquarters Papers of the British Army in North America During the War...Rejoinder to ‘Future Threats and Strategic Thinking,” Infinity Journal 2, no. 2 (Spring 2012): 24-29. 19Department of the Army, ADRP 3-0, Unified Land...represented his security zone. The colony provided food for Greene’s army, a staging base for manufactured material and forces from New England, and a

  18. Capstone Concept for Special Operations

    National Research Council Canada - National Science Library

    2006-01-01

    The United States and its allies will remain at war for the foreseeable future. They will continue to battle a networked, technologically modern adversary that utilizes nonconventional methods of warfare as its primary means of operation...

  19. Army Business Transformation: The Utility of Using Corporate Business Models within the Institutional Army

    National Research Council Canada - National Science Library

    Bailer, Jr., John J

    2007-01-01

    .... This study finds that working corporate models, such as Lean Six Sigma (LSS), are available which are already enabling the transformation of a very specific aspect within the institutional Army...

  20. Factors predicting health behaviors among Army Reserve, active duty Army, and civilian hospital employees.

    Science.gov (United States)

    Wynd, Christine A; Ryan-Wenger, Nancy A

    2004-12-01

    This study identified health-risk and health-promoting behaviors in military and civilian personnel employed in hospitals. Intrinsic self-motivation and extrinsic organizational workplace factors were examined as predictors of health behaviors. Because reservists represent a blend of military and civilian lifestyles, descriptive analyses focused on comparing Army Reserve personnel (n = 199) with active duty Army (n = 218) and civilian employees (n = 193), for a total sample of 610. Self-motivation and social support were significant factors contributing to the adoption of health-promoting behaviors; however, organizational workplace cultures were inconsistent predictors of health among the three groups. Only the active Army subgroup identified a hierarchical culture as having an influence on health promotion, possibly because of the Army's mandatory physical fitness and weight control standards. Social support and self-motivation are essential to promoting health among employees, thus hospital commanders and chief executive officers should encourage strategies that enhance and reward these behaviors.