WorldWideScience

Sample records for warfare center dahlgren

  1. Evaluation Report on Management Controls at the Disbursing Office, Naval Surface Warfare Center, Dahlgren, Virginia

    National Research Council Canada - National Science Library

    Lane, F

    1997-01-01

    On September 19, 1996, the Defense Criminal Investigative Service requested assistance from the Assistant Inspector General for Auditing, DoD, in an investigation at the Naval Surface Warfare Center, Dahlgren, Virginia...

  2. 75 FR 69032 - Naval Surface Warfare Center, Potomac River, Dahlgren, VA; Danger Zone

    Science.gov (United States)

    2010-11-10

    ... CONTACT: Mr. David Olson, Headquarters, Operations and Regulatory Community of Practice, Washington, DC at..., Dahlgren to Baber Point; and thence west along the Upper Machodoc Creek shore of Naval Surface Warfare...

  3. Naval Surface Warfare Center, Dahlgren Division Technical Digest. Detection Systems and Technology, September 1992

    Science.gov (United States)

    1992-09-01

    position to a qua- dratic input is the quadratic term plus a transito - ry term that decays to zero for sufficiently large onstant Velocity Target k plus a... transportable . Bernoulli Box. The system is installed so that The magnetic tape cartridge hardware is a the data files and data base system are on a tape drive...loading to the desired ship. The Dahlgren accomplished. Division developed and built a tape transport unit that is interfaced with ATLSS. With this configu

  4. Range Condition Assessment Report for Naval Surface Warfare Center, Dahlgren Laboratory Ranges, Dahlgren, Virginia

    Science.gov (United States)

    2010-09-01

    potassium chlorate, baking soda, and sulfur • Green: Auramine, indigo , potassium chlorate, and lactose • Green: Malachite green, potassium chlorate...and antimony sulfide • Blue: Indigo , potassium chlorate, and lactose • Blue: Methylene blue, potassium chlorate, and antimony sulfide • White...in the exposure assessment. The hazard index for a child resident exceeds one (1) from exposure to manganese in groundwater. However, the presence

  5. Naval Surface Warfare Center Dahlgren Division Technical Digest. Advanced Materials Technology

    Science.gov (United States)

    1993-09-01

    firing sitv (measured by Archimedes method), dimen- temperature, increasing with both BPO 4 con- sional changes, phase composition (x-ray pow- tent and...smaller one, the coil wind - tinuous curve shows the expected variation of a ings are opposing each other for differential second-order tensor, based on...nozzles in steam ejectors, and turbine NS,’(;C ilahlgrv’n Divisinn blades." A passive film similar in structure to This article describes collaboration

  6. 76 FR 10522 - Naval Surface Warfare Center, Upper Machodoc Creek and the Potomac River, Dahlgren, VA; Danger Zone

    Science.gov (United States)

    2011-02-25

    ... operations in the danger zone to include firing of large or small caliber guns and projectiles, aerial... large or small caliber guns and projectiles, aerial bombing, use of directed energy, and operating.... Federal, State and local law enforcement agencies are exempt from the provisions of paragraph (a) of this...

  7. Naval Surface Warfare Center Dahlgren Division: Application of Lean Six Sigma in the Pre-Award Procurement Process

    Science.gov (United States)

    2008-09-01

    outcome of zero defects in their products (Shere, 2003). 9 According to the LSS Colleg e ( 6 December 2 004 ), Si x Sigma i s a bout qualit y, reducing...packages, rev iewing the nom ination of Contracting Officer Rep resentatives (CORs), and even the es tablishment of a Contracts Liaison or Engineering

  8. 75 FR 3901 - Notice of Availability of Record of Decision for the Naval Surface Warfare Center Panama City...

    Science.gov (United States)

    2010-01-25

    ... Panama City Division Mission Activities AGENCY: Department of the Navy, DoD. ACTION: Notice. SUMMARY: The... proposed action, announces its decision to improve the Naval Surface Warfare Center Panama City Division's.... Carmen Ferrer, Naval Surface Warfare Center Panama City Division, Code CX06, 110 Vernon Avenue, Panama...

  9. Historical Overview of Directed-Energy Work at Dahlgren

    Science.gov (United States)

    2012-01-01

    discharge of electrical energy at the gun breech to generate a plasma jet. This plasma jet heated a low- molecular-weight working fluid, such as water, to...cept augmented the electrical energy generating the plasma jet with a chemical reaction. A 127mm ETC gun was investigated, and a 60mm ETC gun was...ANSI Std Z39-18 13 Historical Overview of Directed-Energy Work at Dahlgren coaxial pipe, which was switched at one end, to create the oscillating

  10. Transmissivity and storage coefficient estimates from slug tests, Naval Air Warfare Center, West Trenton, New Jersey

    Science.gov (United States)

    Fiore, Alex R.

    2014-01-01

    Slug tests were conducted on 56 observation wells open to bedrock at the former Naval Air Warfare Center (NAWC) in West Trenton, New Jersey. Aquifer transmissivity (T) and storage coefficient (S) values for most wells were estimated from slug-test data using the Cooper-Bredehoeft-Papadopulos method. Test data from three wells exhibited fast, underdamped water-level responses and were analyzed with the Butler high-K method. The range of T at NAWC was approximately 0.07 to 10,000 square feet per day. At 11 wells, water levels did not change measurably after 20 minutes following slug insertion; transmissivity at these 11 wells was estimated to be less than 0.07 square feet per day. The range of S was approximately 10-10 to 0.01, the mode being 10-10. Water-level responses for tests at three wells fit poorly to the type curves of both methods, indicating that these methods were not appropriate for adequately estimating T and S from those data.

  11. Governing Warfare

    DEFF Research Database (Denmark)

    Harste, Gorm

    its origins in a - some say 1st - generation of warfare, where armies were concentrated and could be controlled by political masters who were also acclaimed as warfare "geniuses". With subsequent generations of warfare, however, the control of war cannot be replaced by a control of military...... administration. While organisation systems continue to make some kind of political control possible, this is not the case in relation to wars. The organisation system is the in-between that should mediatise politics and war but is not functionally equivalent to just and unjust wars. The paper investigates...... the risks of lacking unity and displays the organisational trap to the fatal political myth of controlled warfare: Does it come from the military organisation system itself, from political ideologies of goal-rational governance, or from the chameleonic logic of wars?  ...

  12. Groundwater geochemical and selected volatile organic compound data, Operable Unit 1, Naval Undersea Warfare Center, Division Keyport, Washington, July 2013

    Science.gov (United States)

    Huffman, Raegan L.

    2014-01-01

    Previous investigations indicate that concentrations of chlorinated volatile organic compounds (CVOCs) are substantial in groundwater beneath the 9-acre former landfill at Operable Unit 1, Naval Undersea Warfare Center, Division Keyport, Washington. The U.S. Geological Survey has continued to monitor groundwater geochemistry to ensure that conditions remain favorable for contaminant biodegradation as specified in the Record of Decision for the site. This report presents groundwater geochemical and selected CVOC data collected at Operable Unit 1 by the U.S. Geological Survey during July 9–18, 2013, in support of longterm monitoring for natural attenuation. Groundwater samples were collected from 13 wells and 9 piezometers, as well as from 10 shallow groundwater passive-diffusion sampling sites in the nearby marsh. Samples from all wells and piezometers were analyzed for oxidation-reduction (redox) sensitive constituents and dissolved gases. Samples from all piezometers and four wells also were analyzed for CVOCs, as were all samples from the passive-diffusion sampling sites. In 2013, concentrations of redox-sensitive constituents measured at all wells and piezometers were consistent with those measured in previous years, with dissolved oxygen concentrations at all except an upgradient well 0.2 milligrams per liter or less; little to no detectable nitrate; abundant dissolved manganese, iron, and methane; and commonly detected sulfide. In the upper aquifer of the northern plantation in 2013, CVOC concentrations at all piezometers were similar to those measured in previous years, and concentrations of the reductive dechlorination byproducts ethane and ethene were slightly lower or the same as concentrations measured in 2012. In the upper aquifer of the southern plantation, CVOC concentrations measured in piezometers during 2013 continued to be variable as in previous years, and often very high, and reductive dechlorination byproducts were detected in two of the three

  13. Hybrid Warfare

    Science.gov (United States)

    2013-08-01

    military vocabulary to describe these observed phenomena. After an intense focus on large-scale conventional conflicts during the Cold War, with episodic...requiring the mastery of both grammars.85 It follows that hybrid warfare requires the blending of both grammars. The Theoretical Lineage of

  14. Groundwater geochemical and selected volatile organic compound data, Operable Unit 1, Naval Undersea Warfare Center, Division Keyport, Washington, June 2011

    Science.gov (United States)

    Huffman, Raegan L.; Frans, L.M.

    2012-01-01

    Previous investigations indicate that concentrations of chlorinated volatile organic compounds are substantial in groundwater beneath the 9-acre former landfill at Operable Unit 1, Naval Undersea Warfare Center, Division Keyport, Washington. Phytoremediation combined with ongoing natural attenuation processes was the preferred remedy selected by the U.S. Navy, as specified in the Record of Decision for the site. The U.S. Navy planted two hybrid poplar plantations on the landfill in spring 1999 to remove and to control the migration of chlorinated volatile organic compounds in shallow groundwater. The U.S. Geological Survey has continued to monitor groundwater geochemistry to ensure that conditions remain favorable for contaminant biodegradation as specified in the Record of Decision. This report presents groundwater geochemical and selected volatile organic compound data collected at Operable Unit 1 by the U.S. Geological Survey during June 20-22, 2011, in support of long-term monitoring for natural attenuation. In 2011, groundwater samples were collected from 13 wells and 9 piezometers. Samples from all wells and piezometers were analyzed for redox sensitive constituents and dissolved gases, and samples from 5 of 13 wells and all piezometers also were analyzed for chlorinated volatile organic compounds. Concentrations of redox sensitive constituents measured in 2011 were consistent with previous years, with dissolved oxygen concentrations all at 0.4 milligram per liter or less; little to no detectable nitrate; abundant dissolved manganese, iron, and methane; and commonly detected sulfide. The reductive declorination byproducts - methane, ethane, and ethene - were either not detected in samples collected from the upgradient wells in the landfill and the upper aquifer beneath the northern phytoremediation plantation or were detected at concentrations less than those measured in 2010. Chlorinated volatile organic compound concentrations in 2011 at most piezometers

  15. Concurrent RFID/UID Implementation at Naval Surface Warfare Center, Crane Division, A Naval Postgraduate School Master of Business Administration Thesis Study in Item Unique Identification and Radio Frequency Identification

    OpenAIRE

    Obellos, Ernan S.; Lookabill, Ryan D.; Colleran, Travis

    2007-01-01

    As part of their Master of Business Administration thesis at Naval Postgraduate School (NPS) in Monterey, California, United States Navy Lieutenant Commanders Travis Colleran, Ryan Lookabill, and Ernan Obellos developed an implementation plan to apply Unique Identification (UID) and Radio Frequency Identification (RFID) concurrently at Naval Surface Warfare Center, Crane Division (NSWC Crane) in Crane, Indiana.

  16. Millennial Warfare

    Science.gov (United States)

    2017-06-09

    www.cbsnews.com/news/the-echo-boomers-01-10-2004. 37 Andrew Hanna, “The Global Youth Unemployment Crisis: Exploring Successful Initiatives and Partnering with...SSP/seminars/wed_archives06spring/habeck.html Hanna, Andrew. “The Global Youth Unemployment Crisis: Exploring Successful Initiatives and Partnering...ISIL cause . The millennials within ISILs global insurgency are the drivers of these changes. The current Irregular Warfare literature does not account

  17. Air Warfare

    Science.gov (United States)

    2002-03-01

    to a halt in its usual medium of travel. A certain minimum of speed is essen- tial to sustentation , for the whole phenomenon of flight 36 AIR WARFARE...3,000 pounds, has a wing area of 287 square feet, while the bomber with its weight of 12,000 pounds requires some 1,121 square feet for its sustentation ...the resistance offered by the other parts of the airplane, which, since they play no part in sustentation , are known as “parasite” resistances. But the

  18. Drone warfare

    Science.gov (United States)

    Gusterson, Hugh

    2017-11-01

    Crude drones existed as early as World War I, but the technology matured in the Yugoslav Wars of the 1990s and the current wars around the Middle East. The U.S. first used a weaponized drone in late 2001, in Afghanistan. Drones may cause more or less civilian casualties depending on the targeting protocols employed by their operators. There is an inherent ambiguity in determining who is an insurgent from several thousand feet, but civilian casualties are likely to be higher if targeters emphasize "signature strikes" over "personality strikes," if they engage in "double-tap strikes," if they rely too much on local informants, and if they rely too heavily on cellphone identification in the absence of corroboration from other intelligence sources. The legality of drone warfare is fairly clear in established battle zones such as Afghanistan, but is more problematic in terms of both international and domestic law when it comes to drone strikes in countries such as Yemen, Pakistan and Somalia with which the U.S. is not at war. Looking to the future, the U.S. would be well advised to sponsor negotiations for an international drone convention that might establish clear international rules for the use of drones, ban autonomous smart drones, and establish adjudicatory procedures to handle allegations of war crimes.

  19. Hypervelocity Wind Tunnel No. 9 Mach 7 Thermal Structural Facility Verification and Calibration

    National Research Council Canada - National Science Library

    Lafferty, John

    1996-01-01

    This report summarizes the verification and calibration of the new Mach 7 Thermal Structural Facility located at the White Oak, Maryland, site of the Dahlgren Division, Naval Surface Warfare Center...

  20. Analysis of Water Barrier Line Charge Plume Measurements

    National Research Council Canada - National Science Library

    Higdon, Charles

    1998-01-01

    The Naval Surface Warfare Center, Dahlgren Division (NSWCDD) is developing technology for a concept that has the potential to be very effective in defending Navy platforms against high-speed, sea-skimming antiship cruise missiles (ASCMs...

  1. An Approach for Systematically Capturing Value-Added Knowledge as Applicable to Contracting

    National Research Council Canada - National Science Library

    Eller, Rachelle B; Moore, Sherry A; Impastato, Bonnie A

    2008-01-01

    Naval Surface Warfare Center, Dahlgren Division (NSWCDD), anticipates a substantial loss of contracting knowledge due to the retirement of senior leadership and contract specialists over the next 7 years...

  2. Implementation of Successful Practices Using an Iterative Development Methodology for an AEGIS Configuration Management Software Application

    National Research Council Canada - National Science Library

    Colston, Sharon

    1998-01-01

    This paper documents a two-and-a-half year software development project of the Combat Systems Configuration Management Branch of the Combat Systems Department at Naval Surface Warfare Center, Dahlgren Division (NSWCDD...

  3. Future Of Privatized Warfare

    Science.gov (United States)

    2016-05-26

    support roles like base support and sustainment . In contrast, nearly seventeen percent of private contractors in Iraq and Afghanistan performed...numerous others in their works. 48 Jan Glete, “Warfare, Entrepreneurship , and the Fiscal-Military State,” in European Warfare: 1350-1750, eds. Frank...Pirates, and Sovereigns, 21. 50 Glete, “Warfare, Entrepreneurship , and the Fiscal-Military State,” 301. 51 Tallett and Trim, “Then Was Then and Now

  4. Hybrid Warfare and Lawfare

    OpenAIRE

    Bachmann, Sascha-Dominik; Mosquera, Andres B Munoz

    2015-01-01

    Hybrid Warfare as a method of war is not new. The change today appears to be that Hybrid Warfare “has the potential to transform the strategic calculations of potential belligerents [it has become] increasingly sophisticated and deadly”. This short paper presents Hybrid Warfare and one of its methods, lawfare. For this, we provide a current, comprehensive definition of hybrid warfare and examine different areas where law has been/is being used as a method of war. This paper focuses on the fol...

  5. Flying Electronic Warfare Laboratory

    Data.gov (United States)

    Federal Laboratory Consortium — FUNCTION: Provides NP-3D aircraft host platforms for Effectiveness of Navy Electronic Warfare Systems (ENEWS) Program antiship missile (ASM) seeker simulators used...

  6. Groundwater geochemical and selected volatile organic compound data, Operable Unit 1, Naval Undersea Warfare Center, Division Keyport, Washington, June and October 2012

    Science.gov (United States)

    Huffman, R.L.

    2013-01-01

    Previous investigations indicate that concentrations of chlorinated volatile organic compounds are substantial in groundwater beneath the 9-acre former landfill at Operable Unit 1, Naval Undersea Warfare Center, Division Keyport, Washington. The U.S. Geological Survey has continued to monitor groundwater geochemistry to ensure that conditions remain favorable for contaminant biodegradation as specified in the Record of Decision for the site. This report presents groundwater geochemical and selected chlorinated volatile organic compound data collected at Operable Unit 1 by the U.S. Geological Survey during June and October 2012, in support of long-term monitoring for natural attenuation. Groundwater samples were collected from 13 wells and 9 piezometers, as well as from 10 shallow groundwater passive-diffusion sampling sites in the nearby marsh. Samples from all wells and piezometers were analyzed for oxidation-reduction (redox) sensitive constituents and dissolved gases. Samples from all piezometers also were analyzed for chlorinated volatile organic compounds, as were all samples from the passive-diffusion sampling sites. In 2012, concentrations of redox-sensitive constituents measured at all wells and piezometers were consistent with those measured in previous years, with dissolved oxygen concentrations all at 0.4 milligram per liter or less; little to no detectable nitrate; abundant dissolved manganese, iron, and methane; and commonly detected sulfide. In the upper aquifer of the northern plantation in 2012, chlorinated volatile organic compound (CVOC) concentrations at all piezometers were similar to those measured in previous years, and concentrations of the reductive dechlorination byproducts ethane and ethene were slightly higher or the same as concentrations measured in 2011. In the upper aquifer of the southern plantation, CVOC concentrations measured in piezometers during 2012 continued to be extremely variable as in previous years, and often very high

  7. Groundwater geochemical and selected volatile organic compound data, Operable Unit 1, Naval Undersea Warfare Center, Division Keyport, Washington, June and September 2014

    Science.gov (United States)

    Huffman, Raegan L.

    2015-01-01

    Previous investigations indicate that concentrations of chlorinated volatile organic compounds (CVOCs) are substantial in groundwater beneath the 9-acre former landfill at Operable Unit 1, Naval Undersea Warfare Center, Division Keyport, Washington. The U.S. Geological Survey has continued to monitor groundwater geochemistry to ensure that conditions remain favorable for contaminant biodegradation at the site. This report presents groundwater geochemical and selected CVOC data collected at Operable Unit 1 by the U.S. Geological Survey during June 23–25 and September 4, 2014, in support of long-term monitoring for natural attenuation. Groundwater samples were collected from 13 wells and 9 piezometers, as well as from 10 shallow groundwater passive-diffusion sampling sites in the nearby marsh. Samples from all wells and piezometers were analyzed for oxidation-reduction (redox) sensitive constituents and dissolved gases. Samples from all piezometers and four wells also were analyzed for CVOCs, as were all samples from the passive-diffusion sampling sites. In 2014, concentrations of redox-sensitive constituents measured at all wells and piezometers were consistent with those measured in previous years, with dissolved oxygen concentrations all less than 1 milligram per liter; little to no detectable nitrate; abundant dissolved manganese, iron, and methane; and commonly detected sulfide. In the upper aquifer of the northern plantation in 2014, CVOC concentrations at all piezometers were similar to those measured in previous years, and concentrations of the reductive dechlorination byproducts ethane and ethene were slightly lower or the same as concentrations measured in 2013. In the upper aquifer of the southern plantation, CVOC concentrations measured in piezometers during 2014 continued to be variable as in previous years, often high, and reductive dechlorination byproducts were detected in one of the three wells and in all but two piezometers. Beneath the marsh

  8. Information Warfare and Ethics

    Directory of Open Access Journals (Sweden)

    M.J. Warren

    2001-05-01

    Full Text Available This paper examines the ethics of the practice of information warfare at both the national and corporate levels. Initially examining the present and past actions of individual hackers, it moves to the more organised, future military and economic warfare scenarios. It examines the lack of legal or policy initiatives in this area.

  9. Lasers in Electronic Warfare

    Science.gov (United States)

    Manke, Gerald C.

    2014-10-01

    The use of lasers for Electronic Warfare applications will be discussed and reviewed. Specific examples of deployed EW systems which include lasers will be presented along with a discussion of their most salient features.

  10. Hybrid Warfare and Challenges

    Science.gov (United States)

    2009-01-01

    was developed as an alternative to the Western teleological approach, while operational design is based on epistemology. In contrast to EBO...and the Ethics of Warfare,” presentation to the Joint Services FORUM | Systems versus Classical Approach to Warfare Conference on Professional... Ethics , 2006, School of Advanced Military Studies, Fort Leavenworth, KS. 23 Cited in Avi Kober, “The Israel Defense Forces in the Second Lebanon War

  11. Biological warfare agents

    Directory of Open Access Journals (Sweden)

    Duraipandian Thavaselvam

    2010-01-01

    Full Text Available The recent bioterrorist attacks using anthrax spores have emphasized the need to detect and decontaminate critical facilities in the shortest possible time. There has been a remarkable progress in the detection, protection and decontamination of biological warfare agents as many instrumentation platforms and detection methodologies are developed and commissioned. Even then the threat of biological warfare agents and their use in bioterrorist attacks still remain a leading cause of global concern. Furthermore in the past decade there have been threats due to the emerging new diseases and also the re-emergence of old diseases and development of antimicrobial resistance and spread to new geographical regions. The preparedness against these agents need complete knowledge about the disease, better research and training facilities, diagnostic facilities and improved public health system. This review on the biological warfare agents will provide information on the biological warfare agents, their mode of transmission and spread and also the detection systems available to detect them. In addition the current information on the availability of commercially available and developing technologies against biological warfare agents has also been discussed. The risk that arise due to the use of these agents in warfare or bioterrorism related scenario can be mitigated with the availability of improved detection technologies.

  12. Chemical warfare agents

    Directory of Open Access Journals (Sweden)

    Vijayaraghavan R

    2010-01-01

    Full Text Available Among the Weapons of Mass Destruction, chemical warfare (CW is probably one of the most brutal created by mankind in comparison with biological and nuclear warfare. Chemical weapons are inexpensive and are relatively easy to produce, even by small terrorist groups, to create mass casualties with small quantities. The characteristics of various CW agents, general information relevant to current physical as well as medical protection methods, detection equipment available and decontamination techniques are discussed in this review article. A brief note on Chemical Weapons Convention is also provided.

  13. Biological and Chemical Warfare

    African Journals Online (AJOL)

    civilian population. (k) The history of research, trial and use of germ warfare continues to the present day. North Korea claimed dirty tricks were used by the USA during the Korean war in 1952, when American POW's confessed to drop- ping germ bombs including infected foun- tain pens. This was supposedly confirmed.

  14. Countermine Warfare Analysis

    Science.gov (United States)

    1981-06-01

    PASSED) ENEMY DEFENSE POSITION DEFENSIVE ENGAGEMENT CANAIZaE SECURE AN ENEMY MANEUVER OPFN Fl.AhK PORCE ENEMY AVENUES Or APROACH REAR AREAS II XVIE’NFOFSE...Sidorenko, A. A., "The Offensive - A Soviet View," Translated and Published by the US Air Force, 1970 Simpkin, Brigadier Richard, "Tank Warfare," With

  15. The Physics of Warfare

    Science.gov (United States)

    Giordano, Gerardo

    2015-01-01

    Recently, I was tasked with the creation and execution of a new themed general education physics class called The Physics of Warfare. In the past, I had used the theme of a class, such as the physics of sports medicine, as a way to create homework and in-class activities, generate discussions, and provide an application to demonstrate that physics…

  16. Changing Face of Warfare

    Science.gov (United States)

    2015-06-12

    1862 to his mother in Goldsboro, NC. Southern Historical Collection, University Archives, Southern Folk Life Collection, Louis Round Wilson Special...carnage" that "no human tongue or pen can adequately describe" was not new to warfare.20 What was new and different were the numbers of wounded

  17. Network Centric Warfare Implementation and Assessment

    National Research Council Canada - National Science Library

    Braunlinger, Thomas K

    2005-01-01

    ...) Are the military services implementing the network-centric warfare concept?, and (3) Is the network-centric warfare concept a new theory of warfare or rather a modification or extension of previous theories...

  18. Hybrid Warfare: the 21st Century Russian Way of Warfare

    Science.gov (United States)

    2017-05-25

    images is not permissible. iii Abstract Hybrid Warfare: The 21st Century Russian Way of Warfare, by MAJ Amos C. Fox, US Army, 73 pages. In...echelons far above a tactical battalion. Robert Leonhard suggests, “As the Cold War receded into the history books , the day-to-day reality of...Russian brand of hybrid warfare. Furthermore, Leonhard’s definition has more far-reaching applicability than other definitions analyzed, making it usable

  19. The Sound of Freedom. Naval Weapons Technology at Dahlgren, Virginia, 1918-2006

    Science.gov (United States)

    2006-01-01

    original concept was to develop a pilotless, explosive-laden aircraft, or Flying Bomb (with the rather obvious code designation " FB "), also known as...philosophy was derived from Thompson but with a tougher edge: Give people complete authority and turn them loose. If they cannot hack it, then relieve...with the center concept. His office argued that "a grouping of related scientific talents is a more powerful and versatile tool than any of its

  20. The considerations on informational warfare

    OpenAIRE

    Agata Popescu

    2015-01-01

    Strictly military information warfare can be defined as all informational operations at tactical, operational and strategic level, in peacetime, crisis and conflict escalation, with the common goals of achieving or influencing certain targets. Information warfare has a military component, command and control warfare which has the following meaning according to NATO: "integrated use of all military capabilities including operations security, deception, psychological operations, electronic warf...

  1. Electronic Warfare Signature Measurement Facility

    Data.gov (United States)

    Federal Laboratory Consortium — The Electronic Warfare Signature Measurement Facility contains specialized mobile spectral, radiometric, and imaging measurement systems to characterize ultraviolet,...

  2. Dehumanization and Irregular Warfare

    Science.gov (United States)

    2013-06-01

    1997). French , John and Raven , Bertram. “The Bases of Social Power.” Studies in Social Power, 1959 . Galula, David. Counterinsurgency Warfare Theory...of the threats depend on both the 109 John R. P. French and Bertram Raven , “The Bases of Social...police to bring about better security. 112 French and Raven , “The Bases of Social Power,” 167. 38 Ramadan, as I described in the Introduction. It

  3. JT Bachman Leadership Framework

    Science.gov (United States)

    2017-07-01

    DAHLGREN DIVISION NAVAL SURFACE WARFARE CENTER Dahlgren, Virginia 22448-5100 NSWCDD/MP-17/300 JT BACHMAN LEADERSHIP FRAMEWORK...REPORT TYPE Miscellaneous Publication 3. DATES COVERED (From - To) 27 Sept 2016 – 08 June 2017 4. TITLE AND SUBTITLE JT BACHMAN LEADERSHIP FRAMEWORK...distribution is unlimited. 13. SUPPLEMENTARY NOTES 14. ABSTRACT This document describes the leadership framework of a civil servant following

  4. Cyber warfare and electronic warfare integration in the operational environment of the future: cyber electronic warfare

    Science.gov (United States)

    Askin, Osman; Irmak, Riza; Avsever, Mustafa

    2015-05-01

    For the states with advanced technology, effective use of electronic warfare and cyber warfare will be the main determining factor of winning a war in the future's operational environment. The developed states will be able to finalize the struggles they have entered with a minimum of human casualties and minimum cost thanks to high-tech. Considering the increasing number of world economic problems, the development of human rights and humanitarian law it is easy to understand the importance of minimum cost and minimum loss of human. In this paper, cyber warfare and electronic warfare concepts are examined in conjunction with the historical development and the relationship between them is explained. Finally, assessments were carried out about the use of cyber electronic warfare in the coming years.

  5. Establishing Cyber Warfare Doctrine

    Directory of Open Access Journals (Sweden)

    Andrew M. Colarik

    2012-01-01

    Full Text Available Over the past several decades, advances in technology have transformed communications and the ability to acquire, disseminate, and utilize information in a range of environments. Modern societies and their respective militaries have taken advantage of a robust information space through network-centric systems. Because military and commercial operations have increasingly converged, communication and information infrastructures are now high-priority military objectives in times of war. This article examines the theoretical underpinning of current cyber warfare research, what we have learned so far about its application, and some of the emerging themes to be considered; it also postulates the development of a (national cyber warfare doctrine (CWD. An endeavor of this scale requires lots of considerations and preparation for its development if it is to be cooperatively embraced. This article considers why information technology systems and their supporting infrastructures should be considered legitimate military targets in conflicts, and offers several events that support this supposition. In addition, it identifies the various forms of doctrine that will become the basis for developing a CWD, discusses a CWD's possible components, and proposes a national collaborative and discussion framework for obtaining a nation's stakeholder buy-in for such an endeavor.

  6. The ethics of information warfare

    CERN Document Server

    Floridi, Luciano

    2014-01-01

    This book offers an overview of the ethical problems posed by Information Warfare, and of the different approaches and methods used to solve them, in order to provide the reader with a better grasp of the ethical conundrums posed by this new form of warfare.The volume is divided into three parts, each comprising four chapters. The first part focuses on issues pertaining to the concept of Information Warfare and the clarifications that need to be made in order to address its ethical implications. The second part collects contributions focusing on Just War Theory and its application to the case of Information Warfare. The third part adopts alternative approaches to Just War Theory for analysing the ethical implications of this phenomenon. Finally, an afterword by Neelie Kroes - Vice President of the European Commission and European Digital Agenda Commissioner - concludes the volume. Her contribution describes the interests and commitments of the European Digital Agenda with respect to research for the developme...

  7. Daugherty Memorial Assessment Center (DMAC)

    Data.gov (United States)

    Federal Laboratory Consortium — Daugherty Memorial Assessment Center (DMAC) is a 39,000-square-foot facility that doubles the warfare center's high-secured performance assessment capabilities. DMAC...

  8. Optimizing Armed Forces Capabilities for Hybrid Warfare – New Challenge for Slovak Armed Forces

    Directory of Open Access Journals (Sweden)

    Peter PINDJÁK

    2015-09-01

    Full Text Available The paper deals with the optimization of military capabilities of the Slovak Armed Forces for conducting operations in a hybrid conflict, which represents one of the possible scenarios of irregular warfare. Whereas in the regular warfare adversaries intend to eliminate the centers of gravity of each other, most often command and control structures, in irregular conflicts, the center of gravity shifts towards the will and cognitive perception of the target population. Hybrid warfare comprises a thoroughly planned combination of conventional military approaches and kinetic operations with subversive, irregular activities, including information and cyber operations. These efforts are often accompanied by intensified activities of intelligence services, special operation forces, and even mercenary and other paramilitary groups. The development of irregular warfare capabilities within the Slovak Armed Forces will require a progressive transformation process that may turn the armed forces into a modern and adaptable element of power, capable of deployment in national and international crisis management operations.

  9. The ethics of drone warfare

    Directory of Open Access Journals (Sweden)

    Fatić Aleksandar

    2017-01-01

    Full Text Available The paper investigates the compatibility of the modern technologies of warfare, specifically the use of offensive drones, with traditional military ethics and suggests that the new technologies radically change the value system of the military in ways which make large parts of the traditional military ethics inapplicable. The author suggests that Agamben’s concept of ‘effectivity’ through ‘special actions’ which mark one’s belonging to a particular community or profession is a useful conceptual strategy to explore the compatibility of drone warfare with traditional military ethics; this strategy shows mixed results at best.

  10. Coalition Warfare: the Leadership Challenges

    Science.gov (United States)

    2011-05-19

    multinational operations, leadership challenges, leadership attributes, unity of command. 16. SECURITY CLASSIFICATION OF: UNCLASSIFIED 17. LIMITATION OF...Approved for Public Release; Distribution is Unlimited Coalition Warfare: The leadership challenges A Monograph by Colonel Mark J Thornhill...The leadership challenges. 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER 6. AUTHOR(S) Colonel Mark J. Thornhill

  11. The American Way of Warfare

    Science.gov (United States)

    2012-05-17

    an overview of Shy’s theory of history and learning is required. Shy challenged the practice of interpreting warfare through the lens of the...necessary for victory. The military planners of Operation NEPTUNE during World War II felt that overwhelming superiority was a necessity in establishing a

  12. Biological warfare, bioterrorism, and biocrime

    NARCIS (Netherlands)

    Jansen, H. J.; Breeveld, F. J.; Stijnis, C.; Grobusch, M. P.

    2014-01-01

    Biological weapons achieve their intended target effects through the infectivity of disease-causing infectious agents. The ability to use biological agents in warfare is prohibited by the Biological and Toxin Weapon Convention. Bioterrorism is defined as the deliberate release of viruses, bacteria

  13. The Anatomy of Counterinsurgency Warfare

    DEFF Research Database (Denmark)

    Mouritsen, Lars; Pedersen, Kenneth; Thruelsen, Peter Dahl

    Since the beginning of the new millennium, the West has been increasingly involved in a tiresome and rather particular type of conflict: insurgency warfare. The bloody and shocking terrorist attacks on New York and Washington in September 2001 marked the beginning of a new era, and the introducti...

  14. Simulating cyber warfare and cyber defenses: information value considerations

    Science.gov (United States)

    Stytz, Martin R.; Banks, Sheila B.

    2011-06-01

    Simulating cyber warfare is critical to the preparation of decision-makers for the challenges posed by cyber attacks. Simulation is the only means we have to prepare decision-makers for the inevitable cyber attacks upon the information they will need for decision-making and to develop cyber warfare strategies and tactics. Currently, there is no theory regarding the strategies that should be used to achieve objectives in offensive or defensive cyber warfare, and cyber warfare occurs too rarely to use real-world experience to develop effective strategies. To simulate cyber warfare by affecting the information used for decision-making, we modify the information content of the rings that are compromised during in a decision-making context. The number of rings affected and value of the information that is altered (i.e., the closeness of the ring to the center) is determined by the expertise of the decision-maker and the learning outcome(s) for the simulation exercise. We determine which information rings are compromised using the probability that the simulated cyber defenses that protect each ring can be compromised. These probabilities are based upon prior cyber attack activity in the simulation exercise as well as similar real-world cyber attacks. To determine which information in a compromised "ring" to alter, the simulation environment maintains a record of the cyber attacks that have succeeded in the simulation environment as well as the decision-making context. These two pieces of information are used to compute an estimate of the likelihood that the cyber attack can alter, destroy, or falsify each piece of information in a compromised ring. The unpredictability of information alteration in our approach adds greater realism to the cyber event. This paper suggests a new technique that can be used for cyber warfare simulation, the ring approach for modeling context-dependent information value, and our means for considering information value when assigning cyber

  15. CENTER FOR CYBER SECURITY STUDIES

    Data.gov (United States)

    Federal Laboratory Consortium — The mission of the Center for Cyber Security Studies is to enhance the education of midshipmen in all areas of cyber warfare, to facilitate the sharing of expertise...

  16. MEANS AND METHODS OF CYBER WARFARE

    Directory of Open Access Journals (Sweden)

    Dan-Iulian VOITAȘEC

    2016-06-01

    Full Text Available According to the Declaration of Saint Petersburg of 1868 “the only legitimate object which States should endeavor to accomplish during war is to weaken the military forces of the enemy”. Thus, International Humanitarian Law prohibits or limits the use of certain means and methods of warfare. The rapid development of technology has led to the emergence of a new dimension of warfare. The cyber aspect of armed conflict has led to the development of new means and methods of warfare. The purpose of this paper is to study how the norms of international humanitarian law apply to the means and methods of cyber warfare.

  17. Cyber warfare building the scientific foundation

    CERN Document Server

    Jajodia, Sushil; Subrahmanian, VS; Swarup, Vipin; Wang, Cliff

    2015-01-01

    This book features a wide spectrum of the latest computer science research relating to cyber warfare, including military and policy dimensions. It is the first book to explore the scientific foundation of cyber warfare and features research from the areas of artificial intelligence, game theory, programming languages, graph theory and more. The high-level approach and emphasis on scientific rigor provides insights on ways to improve cyber warfare defense worldwide. Cyber Warfare: Building the Scientific Foundation targets researchers and practitioners working in cyber security, especially gove

  18. Air Power and Maneuver Warfare

    Science.gov (United States)

    1994-07-01

    the Germans fully understand the extent of the revolution that they had wrought in warfare, and only then did blitzkrieg receive its name . Meanwhile...Macmillan, 1969), 1166 , on the development of the Allied plans. 58. Michael Garder, La Guerre Secrete des Services speciaux francaises , 1939-1945 (Paris...to protect the proletarian revolution by possessing an industrial base capable of producing the new weapons ofwar was perhaps the major motivator

  19. Special Warfare: A Selected Bibliography.

    Science.gov (United States)

    1983-10-01

    145. Smith, Robert M. The Revolutionary Doctrine of Comunist China . Thesis, American University, 1971. Ann Arbor: University Microfilms, 1972. (UA835...JC328.5 .L43) 99. Liu, Chi-aing. Lessons from China (Kiansi, 1934) and a Strategy for Counter-Insurgency (Viet Nam, 1966). Taipei: N.p., 1966...O’Ballance, Edgar. The Indo- China War. 1945-1954: A Study in Guerrilla Warfare. London: Faber and Faber, 1964. (DS550 0 3) 8 123. Organization of

  20. Political Warfare and Contentious Politics

    Science.gov (United States)

    2015-06-01

    provides a definition of political warfare, offers strategy approaches with associated actions, and develops analytical tools to evaluate PW actions...McAdam, Tarrow, and Tilly, Dynamics of Contention, 12. 21 the interests of at least one of the claimants. Roughly translated, the definition refers...indicates the effect of broad social processes on organizational strength. Broad social processes like migration or overpopulation provide an increase

  1. Antisubmarine Warfare (ASW) Lexicon

    Science.gov (United States)

    1990-01-01

    Command Unit Development Activity MDL Minimum Detectable Level NORM Normal Position MDM Magnetic Drum Memory NOSC Naval Ocean Systems Center MDR ...Sor~ cea . Directoratefor Infoematon Operiftne and Repofts. 121 SJeferson Dao& Highes. Suite 1204. Arilrngon VA 22202-4302. and to the Offce Maaemn and

  2. Undersea Warfare Academic Group Home Page

    OpenAIRE

    1997-01-01

    Collected from the Internet Archive "Wayback machine". The Undersea Warfare Curriculum educates officers in the engineering fundamentals, physical principles and analytical concepts that govern operational employment of undersea warfare (USW) sensors and weapons systems. Program is interdisciplinary and integrates; mathematics, physics, acoustics, electrical engineering, oceanography, operations analysis, human factors, computer science and meteorology.

  3. The Information Warfare Life Cycle Model

    Directory of Open Access Journals (Sweden)

    Brett van Niekerk

    2011-03-01

    Full Text Available Information warfare (IW is a dynamic and developing concept, which constitutes a number of disciplines. This paper aims to develop a life cycle model for information warfare that is applicable to all of the constituent disciplines. The model aims to be scalable and applicable to civilian and military incidents where information warfare tactics are employed. Existing information warfare models are discussed, and a new model is developed from the common aspects of these existing models. The proposed model is then applied to a variety of incidents to test its applicability and scalability. The proposed model is shown to be applicable to multiple disciplines of information warfare and is scalable, thus meeting the objectives of the model.

  4. WARFARE IN THE INFORMATION AGE

    Directory of Open Access Journals (Sweden)

    Laurian GHERMAN

    2010-01-01

    Full Text Available The paper is focused on changes occurred in military organizations in Information Age. During Industrial Age the military structure of forces evolved according with principles of decomposition, specialization, hierarchy, optimization, deconfliction, centralized planning, and decentralized execution. But now the solutions based upon Industrial Age assumptions and practices will break down and fail in the Information Age. This will happen no matter how well intentioned, hardworking, or dedicated the leadership and the force are. Two key force capabilities needed by Information Age militaries are interoperability and agility. Both interoperability and agility are provided by Network centric warfare theory of war.

  5. Information warfare technologies in political discourse

    Directory of Open Access Journals (Sweden)

    Karpova Anna Yu.

    2016-01-01

    Full Text Available We attempt to examine the technology of «information warfare» in this paper. The dominant theme of the paper is that the outcome of the information warfare is important not only for the future of a state itself but for the future of the world balance of forces. The main task of geopolitical actors in information warfare is to introduce ideas corresponding to their interests into mass consciousness. All participants of political conflicts have common features in technologies of Information warfare. The information anomie is the indicator of the great geopolitical actors’ personified interests on the stage of «information warfare» - the process resulted in destroying the communicative line: report-information understanding and disrupting the social order in society. In this paper authors describe the following Information Warfare technologies: "Political volcano" technology; "SPIN" technology; "Widening media resource" technology; "specific gravity" technology; "Cold War 2.0" technology and Information cleaningup technology. It is assumed that in the future there will be new instructions on applying technologies of information warfare. To impart perspective to the paper we consider examples, opinions and trends.

  6. Cyber-Enabled Unconventional Warfare: The Convergence of Cyberspace, Social Mobilization, and Special Warfare

    Science.gov (United States)

    2015-12-01

    cyber warfare, cyber terrorism, DDoS attacks, department of defense, hackers, hacktivists, hybrid warfare, information warfare, insurgency...INTENTIONALLY LEFT BLANK xv LIST OF ACRONYMS AND ABBREVIATIONS CBI China, Burma, and India (theater in WWII) CIA Central Intelligence Agency DDoS ...as a distributed denial of service ( DDoS ) attack. By pushing too much data to a computer, site, or server, these types of attacks effectively

  7. History of biological warfare and bioterrorism.

    Science.gov (United States)

    Barras, V; Greub, G

    2014-06-01

    Bioterrorism literally means using microorganisms or infected samples to cause terror and panic in populations. Bioterrorism had already started 14 centuries before Christ, when the Hittites sent infected rams to their enemies. However, apart from some rare well-documented events, it is often very difficult for historians and microbiologists to differentiate natural epidemics from alleged biological attacks, because: (i) little information is available for times before the advent of modern microbiology; (ii) truth may be manipulated for political reasons, especially for a hot topic such as a biological attack; and (iii) the passage of time may also have distorted the reality of the past. Nevertheless, we have tried to provide to clinical microbiologists an overview of some likely biological warfare that occurred before the 18th century and that included the intentional spread of epidemic diseases such as tularaemia, plague, malaria, smallpox, yellow fever, and leprosy. We also summarize the main events that occurred during the modern microbiology era, from World War I to the recent 'anthrax letters' that followed the World Trade Center attack of September 2001. Again, the political polemic surrounding the use of infectious agents as a weapon may distort the truth. This is nicely exemplified by the Sverdlovsk accident, which was initially attributed by the authorities to a natural foodborne outbreak, and was officially recognized as having a military cause only 13 years later. © 2014 The Authors Clinical Microbiology and Infection © 2014 European Society of Clinical Microbiology and Infectious Diseases.

  8. Topic modelling in the information warfare domain

    CSIR Research Space (South Africa)

    De

    2013-11-01

    Full Text Available In this paper the authors provide context to Topic Modelling as an Information Warfare technique. Topic modelling is a technique that discovers latent topics in unstructured and unlabelled collection of documents. The topic structure can be searched...

  9. Guiding Warfare to Reach Sustainable Peace

    DEFF Research Database (Denmark)

    Vestenskov, David; Drewes, Line

    The conference report Guiding Warfare to Reach Sustainable Peace constitutes the primary outcome of the conference It is based on excerpts from the conference presenters and workshop discussions. Furthermore, the report contains policy recommendations and key findings, with the ambition of develo......The conference report Guiding Warfare to Reach Sustainable Peace constitutes the primary outcome of the conference It is based on excerpts from the conference presenters and workshop discussions. Furthermore, the report contains policy recommendations and key findings, with the ambition...

  10. Gray Zone Warfare: German and Russian Political Warfare, 1935-1939, and 2001

    Science.gov (United States)

    2017-06-09

    Irregular Warfare, Unconventional Warfare, Hybrid, and 107 John Chambers , Countering Gray-Zone...111 Chambers , 5. Diplomatic, Information, Military, and Economic variables refers to the U.S. Army analytical framework. 112 Dickey et al. 113...media under German control reported, “ bloody terror, unleashed mobs, massacre and looting,” with reports of widespread murder of Sudeten Germans.193

  11. On the Probability of Predicting and Mapping Traditional Warfare Measurements to the Cyber Warfare Domain

    CSIR Research Space (South Africa)

    Grobler, M

    2014-07-01

    Full Text Available Cyber warfare is a contentious topic, with no agreement on whether this is a real possibility or an unrealistic extension of the physical battlefield. This article will not debate the validity and legality of the concept of cyber warfare...

  12. US Army Special Warfare. Its Origins: Psychological and Unconventional Warfare, 1941-1952

    Science.gov (United States)

    1982-01-01

    Saul K. Padover and Harold D. Lasswell , "Psychological Warfare," Headline Series, no. 86 (20 March 1951), pp. 14f.; Daugherty and Janowitz, Casebook...of the North African Theater of Operations, National Archives. 41. Padover and Lasswell , "Psychological Warfare," p. 16. 42. Military Intelligence

  13. Towards a framework for a network warfare capability

    CSIR Research Space (South Africa)

    Veerasamy, N

    2008-07-01

    Full Text Available Information warfare has surfaced as an emerging concept that affects not only military institutions but ordinary organisations as well. Information warfare in itself consists of various components ranging from its electronic and psychological...

  14. Hybrid Warfare – A Form of Asymmetric Conflict

    National Research Council Canada - National Science Library

    Laura-Maria Herța

    2017-01-01

    ... century features novel aspects. Several concepts have been coined in order to describe the nature and dynamic of warfare in a post-clausewitzian/post-conventional era, such as new wars, Fourth Generation Warfare, compound wars...

  15. Recognizing and Adapting to Unrestricted Warfare Practices by China

    Science.gov (United States)

    2012-02-15

    the areas of Lawfare , Economic Warfare, and Cyber-Warfare. Although the U.S. has made improvements to identify and respond to some key URW... lawfare ) to undermine the spirit and ideological commitment of an adversary before and during a conflict, weaken international support for the...paragraphs, I will discuss potential examples of Chinese URW practices in the areas of Lawfare , Economic Warfare, and Network Warfare and let the

  16. "Beyond-the-Box" Thinking on Future War: The Art and Science of Unrestricted Warfare

    Science.gov (United States)

    2009-04-01

    chemical Warfare Intelligence Warfare Resources Warfare Ecological Warfare Psycological Warfare Economic Aid Warfare Space Warfare Smuggling Warfare...state adjust to the prospect of URW? As seen before, state actors no longer have a monopoly over the catastrophic use of violence . The...civilianization of warfare is a natural consequence of URW, and the democratization of violence allows virtually everyone to 21 AU/ACSC/1172/AY09 join the

  17. Cyber Attacks, Information Attacks, and Postmodern Warfare

    Directory of Open Access Journals (Sweden)

    Valuch Jozef

    2017-06-01

    Full Text Available The aim of this paper is to evaluate and differentiate between the phenomena of cyberwarfare and information warfare, as manifestations of what we perceive as postmodern warfare. We describe and analyse the current examples of the use the postmodern warfare and the reactions of states and international bodies to these phenomena. The subject matter of this paper is the relationship between new types of postmodern conflicts and the law of armed conflicts (law of war. Based on ICJ case law, it is clear that under current legal rules of international law of war, cyber attacks as well as information attacks (often performed in the cyberspace as well can only be perceived as “war” if executed in addition to classical kinetic warfare, which is often not the case. In most cases perceived “only” as a non-linear warfare (postmodern conflict, this practice nevertheless must be condemned as conduct contrary to the principles of international law and (possibly a crime under national laws, unless this type of conduct will be recognized by the international community as a “war” proper, in its new, postmodern sense.

  18. ISIL's Hybrid Warfare in Syria & Iraq

    DEFF Research Database (Denmark)

    Sørensen, Heine

    2016-01-01

    The case study specifically seeks to answer the following problem statement: Does ISIL qualify as an actor using hybrid warfare and if so what characterizes their particular use of this type of warfare? Based on an analysis of ISIL’s warfare from August 2012 to August 2016 the chapter argues......, that it is possible to answer the first part of the problem statement in an affirmative way. Hence, ISIL is not only theoretically prone to hybridity by organizational setup, and by the people comprising the organization, but has in fact continuously acted according to a hybrid logic in its prioritization...... of and ability to synchronize various instruments of power with a view to achieving their end-state. With regards to the second part of the problem statement, the analysis demonstrates how ISIL employed horizontal escalation and ambiguity initially, but later on turned to vertical escalation, within the military...

  19. Survey on Urban Warfare Augmented Reality

    Directory of Open Access Journals (Sweden)

    Xiong You

    2018-01-01

    Full Text Available Urban warfare has become one of the main forms of modern combat in the twenty-first century. The main reason why urban warfare results in hundreds of casualties is that the situational information of the combatant is insufficient. Accessing information via an Augmented Reality system can elevate combatants’ situational awareness to effectively improve the efficiency of decision-making and reduce the injuries. This paper begins with the concept of Urban Warfare Augmented Reality (UWAR and illuminates the objectives of developing UWAR, i.e., transparent battlefield, intuitional perception and natural interaction. Real-time outdoor registration, information presentation and natural interaction are presented as key technologies of a practical UWAR system. Then, the history and current research state of these technologies are summarized and their future developments are highlighted from three perspectives, i.e., (1 Better integration with Geographic Information System and Virtual Geographic Environment; (2 More intelligent software; (3 More powerful hardware.

  20. Biological warfare, bioterrorism, and biocrime.

    Science.gov (United States)

    Jansen, H J; Breeveld, F J; Stijnis, C; Grobusch, M P

    2014-06-01

    Biological weapons achieve their intended target effects through the infectivity of disease-causing infectious agents. The ability to use biological agents in warfare is prohibited by the Biological and Toxin Weapon Convention. Bioterrorism is defined as the deliberate release of viruses, bacteria or other agents used to cause illness or death in people, but also in animals or plants. It is aimed at creating casualties, terror, societal disruption, or economic loss, inspired by ideological, religious or political beliefs. The success of bioterroristic attempts is defined by the measure of societal disruption and panic, and not necessarily by the sheer number of casualties. Thus, making only a few individuals ill by the use of crude methods may be sufficient, as long as it creates the impact that is aimed for. The assessment of bioterrorism threats and motives have been described before. Biocrime implies the use of a biological agent to kill or make ill a single individual or small group of individuals, motivated by revenge or the desire for monetary gain by extortion, rather than by political, ideological, religious or other beliefs. The likelihood of a successful bioterrorist attack is not very large, given the technical difficulties and constraints. However, even if the number of casualties is likely to be limited, the impact of a bioterrorist attack can still be high. Measures aimed at enhancing diagnostic and therapeutic capabilities and capacities alongside training and education will improve the ability of society to combat 'regular' infectious diseases outbreaks, as well as mitigating the effects of bioterrorist attacks. © 2014 The Authors Clinical Microbiology and Infection © 2014 European Society of Clinical Microbiology and Infectious Diseases.

  1. Cognitive systems in electronic warfare

    Science.gov (United States)

    Kulpa, Krzysztof; Szczepankiewicz, Michał; Żywek, Marcin; Malanowski, Mateusz; Misiurewicz, Jacek; Samczyński, Piotr

    2017-04-01

    Electronic warfare (EW) techniques were invented 70 years ago and are still being developed, all the time with a key role played by their operators. However, a human operator responds far too slowly for the on-going needs since to be adequate to current threats the EW system reaction should be within 1 ms or less. Too slow reaction defers an achievement of the objectives, and generally may lead to disclosure of the applied strategy and to waste of resources. Developing the adequate response to the threat is a multifaceted matter that requires considerable experience and knowledge on the one hand, and thorough observation of outcomes of the applied strategy on the other hand. Such action requires the use of not only intelligence but also more complex algorithms for automatic control than the classical ones, and it heavily builds on the experience. It is therefore a cognitive task in its nature, and a human operator acts naturally this way. Consequently, a proper training and experience gained are what really matters. As a result of tests and actions in EW the operator builds his own knowledge base, thus, gains a capability of responding to the known threats in a balanced way. New threats, however, are much more challenging since they should be handled as fast as possible but in a fresh and creative manner. To this end, adapting the algorithms of radar jamming protection for the new conditions of the battlefield is an example of such challenging tasks. At present, such adjustments are done in a long feedback loop when the operator, after recognizing the problem, notifies the equipment manufacturers, and then, their engineers work on required solutions accordingly. Thus, the reaction time is counted in years, not a single milliseconds or seconds. Speeding up the response time is therefore the key issue, and a solution to it would be feasible only when cognitive systems were used. A concept of such cognitive system is presented in this paper.

  2. On Cyber Warfare Command and Control Systems

    Science.gov (United States)

    2004-06-01

    network defense management system are sometimes used to describe systems that are used for the remote management of firewalls, intrusion detection...different. Certainly, the remote management of firewalls and intrusion detection systems, etc. should be part of a cyber warfare command and control

  3. Chemical and Biological Warfare: A Selected Bibliography

    Science.gov (United States)

    1991-04-01

    WORLD ARMA - MENTS AND DISARMAMENT. SIPRI Yearbook 1990. New York: Oxford University Press, 1990. (REF JX1974 S775 1990) Pp. 107-133: "Chemical and...Report. Norton D. Zinder, Chairman. Washington: National Academy Press, 1984. (UG447 N33 1984) LEGACY OF CHEMICAL AND BIOLOGICA !L WARFARE Some 20th

  4. Warfare tourism experiences and national identity

    NARCIS (Netherlands)

    Gieling, Joost; Ong, Chin Ee

    2016-01-01

    This paper examines through an analysis of Dutch warfare tourism whether there is a relationship between the subjective perceived salience of Dutch identity and heritage tourists’ motives, emotions and overall satisfaction. Using a social identity theory framework, this study provides a view of

  5. Unconventional Warfare: A Mission Metamorphosis for the 21st Century?

    Science.gov (United States)

    2000-06-01

    brigadier general and publish several more noted works on Mao and revolutionary warfare. See Samuel B. Giffith, Mao Tse-Tung on Guerrilla Warfare (New...and propagators of the faith. The bibles (in English translation) are Mao Tse-tung on Guerrilla Warfare by Brigadier General Samuel B. Griffith...Barnett, B. Hugh Tovar , and Richard H. Schultz eds., Special Operations in US Strategy (Washington, D.C.: US Government Printing Office, 1984), 2. 58

  6. Chemical Warfare Agent Decontaminant Solution Using Quaternary Ammonium Complexes

    Science.gov (United States)

    1997-12-11

    warfare agents, which include a variety of organophosphorus and organosulfur compounds, are known in the art. 15 However, these known methods use...chemical warfare agents, and works particularly well for neutralization of organosulfur agents such as mustard gas (HD), and organophosphorus agents such...detoxifying/neutralizing a variety of chemical warfare agents, including organosulfur agents such as mustard gas (HD), and organophosphorus agents such as

  7. Book Review: Composite warfare: the conduct of successful ground ...

    African Journals Online (AJOL)

    Abstract. Book Title: Composite warfare: the conduct of successful ground force operations in Africa. Book Author: Eeben Barlow. Pinetown: 30 Degrees South Publishers. 2015, 576 pages. ISBN 9781928211761.

  8. Handbook of toxicology of chemical warfare agents

    CERN Document Server

    2010-01-01

    This groundbreaking book covers every aspect of deadly toxic chemicals used as weapons of mass destruction and employed in conflicts, warfare and terrorism. Including findings from experimental as well as clinical studies, this one-of-a-kind handbook is prepared in a very user- friendly format that can easily be followed by students, teachers and researchers, as well as lay people. Stand-alone chapters on individual chemicals and major topics allow the reader to easily access required information without searching through the entire book. This is the first book that offers in-depth coverage of individual toxicants, target organ toxicity, major incidents, toxic effects in humans, animals and wildlife, biosensors, biomarkers, on-site and laboratory analytical methods, decontamination and detoxification procedures, prophylactic, therapeutic and countermeasures, and the role of homeland security. Presents a comprehensive look at all aspects of chemical warfare toxicology in one reference work. This saves research...

  9. Computational models of intergroup competition and warfare.

    Energy Technology Data Exchange (ETDEWEB)

    Letendre, Kenneth (University of New Mexico); Abbott, Robert G.

    2011-11-01

    This document reports on the research of Kenneth Letendre, the recipient of a Sandia Graduate Research Fellowship at the University of New Mexico. Warfare is an extreme form of intergroup competition in which individuals make extreme sacrifices for the benefit of their nation or other group to which they belong. Among animals, limited, non-lethal competition is the norm. It is not fully understood what factors lead to warfare. We studied the global variation in the frequency of civil conflict among countries of the world, and its positive association with variation in the intensity of infectious disease. We demonstrated that the burden of human infectious disease importantly predicts the frequency of civil conflict and tested a causal model for this association based on the parasite-stress theory of sociality. We also investigated the organization of social foraging by colonies of harvester ants in the genus Pogonomyrmex, using both field studies and computer models.

  10. Drone Warfare : Visual Primacy as a Weapon

    OpenAIRE

    Lee-Morrison, Lila

    2015-01-01

    This paper articulates drone warfare through a critical analysis of an actual drone operation and a study into its developing technologies. The first chapter moves through a discussion of the intervening role of the camera as described by Walter Benjamin and societal perspective of visual reproduction technology. This discussion then departs from the mechanical to the digital realm of realtime video, utilizing theory of Paul Virilio. The second chapter focuses on developing technologies withi...

  11. Hybrid Warfare: Implications for CAF Force Development

    Science.gov (United States)

    2014-08-01

    Scientific Terms (TEST) and that thesaurus identified. If it is not possible to select indexing terms which are Unclassified, the classification of...the assumption, almost universally cited by much hybrid warfare literature, that intervention in failed and fragile state scenarios is an automatic ...CONTROL DATA (Security markings for the title, abstract and indexing annotation must be entered when the document is Classified or Designated) 1

  12. Animal plant warfare and secondary metabolite evolution

    OpenAIRE

    Wöll, Steffen; Kim, Sun Hee; Greten, Henry Johannes; Efferth, Thomas

    2013-01-01

    Abstract The long-lasting discussion, why plants produce secondary metabolites, which are pharmacologically and toxicologically active towards mammals traces back to the eminent role of medicinal plants in the millennia-old history of manhood. In recent years, the concept of an animal plant warfare emerged, which focused on the co-evolution between plants and herbivores. As a reaction to herbivory, plants developed mechanical defenses such as thorns and hard shells, which paved the way for ad...

  13. Cyber-Warfare: Jus Post Bellum

    Science.gov (United States)

    2015-03-01

    states take to ethically end wars and transition to peace. Immanuel Kant is the first philosopher thought of as the founder of viewing warfare as...in Stahn, 2006, p. 935). Kant also expressed in his Toward Perpetual Peace, as translated and publish by Yale University Press, that states involved...in armed conflict should not conduct acts that will prohibit them from being able to reach peace ( Kant , 2006). As an example, Kant (2006) believed

  14. Finding Lawrence: Recruiting Talent for Unconventional Warfare

    Science.gov (United States)

    2011-06-01

    Velky, ―Special Forces Assessment and Selection,‖ Special Warfare 3, no. 1 (1990): 12–15; Alan Vick, Snakes in the Eagles nest: A History of Ground...skills at BUD/S. They also learn SEAL heritage, history, military bearing, ethics, the SEAL Ethos, mental toughness, nutrition , stretching and... nutrition , and the nature of a SEAL career. The website even provides a forum on which young men can discuss their preparations with each other and

  15. Modeling the Thermal Destruction of Chemical Warfare ...

    Science.gov (United States)

    Symposium Paper In the event of a terrorist attack with chemical warfare agents (CWAs), large quantities of materials, both indoor and outdoor, may be treated with thermal incineration during the site remediation process. This paper reports on a study to examine the thermal decomposition of surrogate CWAs and formation of decomposition by-products bound in model building materials (in this case, ceiling tile) in a pilot-scale rotary kiln incinerator simulator.

  16. Naval Air Warfare Center Aircraft Division Patent Portfolio

    Science.gov (United States)

    2012-01-01

    School gyms, gymnastic applications • Obstacle and rope courses • Playgrounds • Other rope containing products that may benefit from the...fire hose nozzles • Replace building fire sprinkler systems for public buildings, offices, hospitals, schools , factories, restaurants, etc. • A...necessary for payment purposes. It supports the goal of a paperless acquisition process. You can register on-line at no charge. Buying Products & Services

  17. Characteristics of the Navy Laboratory Warfare Center Technical Workforce

    Science.gov (United States)

    2013-09-29

    Astronomy & Space Sci. 1330 Cartography 1370 Chemistry 1320 Gen. Physical Science 1301 Geodesy 1372 Geology 1350 Geophysics 1313 Health Physics 1306...workforce was sub-divided into six broad occupational groups: Life Science, Physical Science, Engineering, Mathematics, Computer Science and Information...occupational groups: Life Science (Life), Physical Science ( Physical ), Engineering (Engineering), Mathematics (Math), Computer Science and

  18. Naval Surface Warfare Center Carderock Division, Technical Digest

    Science.gov (United States)

    2001-12-01

    was validated on a second separate flight test aircraft also instrumented with strain gauges.3 Figure 4 shows sample results for the pushrod and damper ...been the impetus to investigate new technologies previously unknown in the maritime environ- ment. For example, magnetorheological (MR) fluids are...engineering to protect structures through foundation isolation and structural mode dampers . Personnel transfer problems from small craft to or from ships

  19. Correlation Analysis of Fleet Information Warfare Center Network Incidents

    National Research Council Canada - National Science Library

    Ginn, Patrick

    2001-01-01

    .... To allow for efficient access and utilization of the information systems sharing the network the Intrusion Detection Systems must be set at a level that filters out activity deemed as normal or non...

  20. The Chinese People’s Liberation Army and Information Warfare

    Science.gov (United States)

    2014-03-01

    information warfare concepts as a barometer of how the PLA approached the concept, by 2007 the threads of integrated network electronic warfare... water filtration systems” against the chaos that could result from successful cyber attacks.75 PLA Lieutenant General Liu Jixian, of the PLA’s

  1. Employing U.S. Information Operations Against Hybrid Warfare Threats

    Science.gov (United States)

    2013-03-01

    leadership .60 Why Adversaries Will Use Hybrid Warfare Desert Storm, operations in former Yugoslavia, as well as Afghanistan and Iraq, demonstrated...February 26, 2013). 128 Manwaring, The Complexity of Modern Asymmetric Warfare, 130-131 129 Ben Sherwood , President of ABC News, discussion with author

  2. Containment 2.0: U.S. Political Warfare

    Science.gov (United States)

    2016-12-01

    emphasized dismal living conditions and blamed the Soviet Union for shortages of fuel, vegetables , and dairy. They also reported on widespread arrests and...a more traditional form of warfare. Special operations leaders agree that SOF’s proficiency in special warfare in “low-visibility, small- footprint

  3. Anti-Air Warfare Research for Naval Forces

    NARCIS (Netherlands)

    Bloemen, A.A.F.; Witberg, R.

    2000-01-01

    AAW is a warfare area with wide-spread spectrum. Command and Control Systems, sensors, effectors and electronic warfare are integrated to a system, they influence each other and must eventually be effective in coordinated action. This complexity asks for Operations Research methods to measure

  4. Relevance of information warfare models to critical infrastructure ...

    African Journals Online (AJOL)

    This article illustrates the relevance of information warfare models to critical infrastructure protection. Analogies of information warfare models to those of information security and information systems were used to deconstruct the models into their fundamental components and this will be discussed. The models were applied ...

  5. Hybrid Warfare Studies and Russia’s Example in Crimea

    Directory of Open Access Journals (Sweden)

    Mehmet Seyfettin EROL

    2015-12-01

    Full Text Available Although Hybrid Warfare is an old concept, theoretical studies in the western countries mainly began in the post-Col War era, focusing on asymmetrical threats against conventional superiority of western countries such as USA or Israel. September 11th attacks and 2006 Israel-Lebanon war played important roles for the evolution of hybrid warfare theories. However, there has not any consensus among scholars on a exact or unique definition of hybrid warfare. Hybrid warfare became one of the main security issues for the West and especially for NATO after the Russia-Ukraine crisis. Russian military strategies, called “hybrid warfare” by the western countries, resulted in the successful annexation of Crimea and, caused a serious security problem for the West resulting important structural and functional changes for the military system of NATO. Russian activities, which have been based on surprise, ambiguity and deniability, presented a unique example for hybrid warfare studies.

  6. Axial Vircator for Electronic Warfare Applications

    Directory of Open Access Journals (Sweden)

    L. Drazan

    2009-12-01

    Full Text Available This paper deals with a high power microwave generator with virtual cathode – vircator in axial release for electronic warfare applications. The classification of directed energy weapons microwave (DEWM is introduced together with basic block diagrams of a particular class of DEWM. In the paper, methods for designing vircator pulsed power supply, axial vircator structure, measurement methods and experimental results are presented. The vircator in electromagnetic ammunition is powered by magneto-cumulative generator and in weapons for defense of objects (WDO, it is powered by Marx generator. The possible applications of a vircator in the DEWM area are discussed.

  7. Electronic warfare receivers and receiving systems

    CERN Document Server

    Poisel, Richard A

    2014-01-01

    Receivers systems are considered the core of electronic warfare (EW) intercept systems. Without them, the fundamental purpose of such systems is null and void. This book considers the major elements that make up receiver systems and the receivers that go in them.This resource provides system design engineers with techniques for design and development of EW receivers for modern modulations (spread spectrum) in addition to receivers for older, common modulation formats. Each major module in these receivers is considered in detail. Design information is included as well as performance tradeoffs o

  8. Microwave receivers with electronic warfare applications

    CERN Document Server

    Tsui, James

    2005-01-01

    This book by the author of Digital Techniques for Wideband Receivers willbe like no other one on your book shelf as the definitive word on electronicwarfare (EW) receiver design and performance. Whether you are an EWscientist involved in the test and evaluation of EW receivers or a designerof RWR's and other EW-related receivers, Microwave Receivers withElectronic Warfare Applications is a handy reference through which you canperfect your technical art. Lucidly written, this book is a treatise on EWreceivers that is relevant to you if you are just looking for a top-levelinsight into EW receive

  9. History of chemical and biological warfare agents.

    Science.gov (United States)

    Szinicz, L

    2005-10-30

    Chemical and biological warfare agents constitute a low-probability, but high-impact risk both to the military and to the civilian population. The use of hazardous materials of chemical or biological origin as weapons and for homicide has been documented since ancient times. The first use of chemicals in terms of weapons of mass destruction goes back to World War I, when on April 22, 1915 large amounts of chlorine were released by German military forces at Ypres, Belgium. Until around the 1970s of the 20th century, the awareness of the threat by chemical and biological agents had been mainly confined to the military sector. In the following time, the development of increasing range delivery systems by chemical and biological agents possessors sensitised public attention to the threat emanating from these agents. Their proliferation to the terrorists field during the 1990s with the expanding scale and globalisation of terrorist attacks suggested that these agents are becoming an increasing threat to the whole world community. The following article gives a condensed overview on the history of use and development of the more prominent chemical and biological warfare agents.

  10. Managing the Double Edged Sword of Network-Centric Warfare

    National Research Council Canada - National Science Library

    Wells, David

    2003-01-01

    Network Centric Warfare can tend to collapse the operational level war by allowing information to flow around or past hierarchical staff structures and directly between tactical and strategic level decision makers...

  11. The Cycle of Warfare - Analysis of an Analytical Model

    DEFF Research Database (Denmark)

    Jensen, Mikkel Storm

    2016-01-01

    The abstract has the title: “The Cycle of Warfare - Analysis of an Analytical Model” The Cycle of Warfare is an analytical model designed to illustrate the coherence between the organization, doctrine and technology of a military entity and the influence of the surrounding society as expressed...... by its economic, political and ideological characteristics. With the single assumption of economic rationality in human behaviour, Cycle of Warfare is not only coherent, it is applicable to all entities engaged in competition anywhere in the world at any point in history. The Cycle of Warfare can be used...... both retrospectively and predictively. As a tool for historians the model can help to identify decisive factors in developments and outcomes. As a tool for intelligence analysts, it can be used predictively to identify likely possible outcomes or unknown elements in analysed entities....

  12. Information Warfare: Defining the Legal Response to An Attack

    National Research Council Canada - National Science Library

    Pottorff, James

    1999-01-01

    This paper discusses the difficulty in determining whether an information warfare attack, such as a computer virus, can be treated as an "armed attack" for purposes of national defense under the United Nations charter. As the U.S...

  13. Irregular Warfare: Impact on Future Professional Military Education

    National Research Council Canada - National Science Library

    Paschal, David G

    2006-01-01

    ... to operate effectively in an irregular warfare environment. The utility of a decisive war between nation states continues to decline and will eventually reach critical mass based upon the extreme imbalance of military power and a U.S. monopoly...

  14. Design and implementation of intelligent electronic warfare decision making algorithm

    Science.gov (United States)

    Peng, Hsin-Hsien; Chen, Chang-Kuo; Hsueh, Chi-Shun

    2017-05-01

    Electromagnetic signals and the requirements of timely response have been a rapid growth in modern electronic warfare. Although jammers are limited resources, it is possible to achieve the best electronic warfare efficiency by tactical decisions. This paper proposes the intelligent electronic warfare decision support system. In this work, we develop a novel hybrid algorithm, Digital Pheromone Particle Swarm Optimization, based on Particle Swarm Optimization (PSO), Ant Colony Optimization (ACO) and Shuffled Frog Leaping Algorithm (SFLA). We use PSO to solve the problem and combine the concept of pheromones in ACO to accumulate more useful information in spatial solving process and speed up finding the optimal solution. The proposed algorithm finds the optimal solution in reasonable computation time by using the method of matrix conversion in SFLA. The results indicated that jammer allocation was more effective. The system based on the hybrid algorithm provides electronic warfare commanders with critical information to assist commanders in effectively managing the complex electromagnetic battlefield.

  15. Hybrid Warfare and the Changing Character of Conflict

    National Research Council Canada - National Science Library

    Bastian Giegerich

    2016-01-01

      The idea that international conflict might be seeing more hybrid warfare and hybrid threats has animated debate among security and defense establishments in the run-up to NATO's 2016 Warsaw Summit...

  16. Hybrid warfare of the USA in South America

    National Research Council Canada - National Science Library

    A. V. Budaev

    2015-01-01

    Washington’s hybrid warfare in Latin American region differs by its inventive and sophisticated methods and in fact represents a complex and multidimensional phenomenon including symbiosis of the “soft” and “hard...

  17. Trends in electro-optical electronic warfare

    Science.gov (United States)

    Smith, Carl R.; Grasso, Robert; Pledger, Jack; Murarka, Naveen

    2012-09-01

    Protection of military aircraft from hostile threats is paramount to ensure the survivability of aircrews, platforms, and mission success. While the threat environment continues to become more complex, shrinking defense budgets places new challenges on the development of electronic warfare (EW) systems. This paper presents the trends in electro-optical EW system development including 1) features, 2) affordability, 3) open architecture, 4) multi-functionality, 5) integrated avionics survivability equipment, and 6) enabling technologies for sensors, and optical sources. While these system attributes are not new, they have grown in importance in the design of EW systems. And, if treated correctly can have a beneficial symbiotic relationship to each other and to the airframe they support.

  18. Information Warfare, Threats and Information Security

    Directory of Open Access Journals (Sweden)

    Dmitriy Nikolaevich Bespalov

    2014-01-01

    Full Text Available The article presents the opposite, but dependent on each other's reality - Revolutionary War information,information security goals and objectives of their study within the scheme "challenge-response", methodological and analytical support, the role of elites and the information society in promoting information security. One of the features of contemporaneityis the global spread of ICT, combined with poor governance and other difficulties in the construction of innovation infrastructures that are based on them in some countries. This leads to the reproduction of threats, primarily related to the ability to use ICT for purposes that are inconsistent with the objectives of maintaining international peace and security, compliance with the principles of non-use of force, non-interference in the internal affairs of states, etc. In this regard, include such terms as "a threat of information warfare", "information terrorism" and so forth. Information warfare, which stay in the policy declared the struggle for existence, and relationships are defined in terms of "friend-enemy", "ours-foreign". Superiority over the opponent or "capture of its territory" is the aim of political activity. And information security, serving activities similar process of political control, including a set of components, is a technology until their humanitarian. From the context and the decision itself is the ratio of the achieved results of information and political influence to the target - a positive image of Russia. Bringing its policy in line with the demands of a healthy public opinion provides conductivity of theauthorities initiatives in the country and increases the legitimacy of the Russian Federation actions in the world.

  19. Understanding the elementary considerations in a network warfare environment: an introductory framework

    CSIR Research Space (South Africa)

    Veerasamy, N

    2008-07-01

    Full Text Available Information warfare has surfaced as an emerging concept that affects not only military institutions but ordinary organisations as well. Information warfare in itself consists of various components ranging from its electronic and psychological...

  20. Nuclear, biological and chemical warfare. Part I: Medical aspects of nuclear warfare.

    Science.gov (United States)

    Kasthuri, A S; Pradhan, A B; Dham, S K; Bhalla, I P; Paul, J S

    1990-04-01

    Casualties in earlier wars were due much more to diseases than to weapons. Mention has been made in history of the use of biological agents in warfare, to deny the enemy food and water and to cause disease. In the first world war chemical agents were used to cause mass casualties. Nuclear weapons were introduced in the second world war. Several countries are now involved in developing nuclear, biological and chemical weapon systems, for the mass annihilation of human beings, animals and plants, and to destroy the economy of their enemies. Recently, natural calamities and accidents in nuclear, chemical and biological laboratories and industries have caused mass instantaneous deaths in civilian population. The effects of future wars will not be restricted to uniformed persons. It is time that physicians become aware of the destructive potential of these weapons. Awareness, immediate protective measures and first aid will save a large number of persons. This series of articles will outline the medical aspects of nuclear, biological and chemical weapon systems in three parts. Part I will deal with the biological effects of a nuclear explosion. The short and long term effects due to blast, heat and associated radiation are highlighted. In Part II, the role of biological agents which cause commoner or new disease patterns is mentioned. Some of the accidents from biological warfare laboratories are a testimony to its potential deleterious effects. Part III deals with medical aspects of chemical warfare agents, which in view of their mass effects can overwhelm the existing medical resources, both civilian and military.(ABSTRACT TRUNCATED AT 250 WORDS)

  1. Numerical simulation of RCS for carrier electronic warfare airplanes

    Directory of Open Access Journals (Sweden)

    Yue Kuizhi

    2015-04-01

    Full Text Available This paper studies the radar cross section (RCS of carrier electronic warfare airplanes. Under the typical naval operations section, the mathematical model of the radar wave’s pitch angle incidence range analysis is established. Based on the CATIA software, considering dynamic deflections of duck wing leading edge flaps, flaperons, horizontal tail, and rudder, as well as aircraft with air-to-air missile, anti-radiation missile, electronic jamming pod, and other weapons, the 3D models of carrier electronic warfare airplanes Model A and Model B with weapons were established. Based on the physical optics method and the equivalent electromagnetic flow method, by the use of the RCSAnsys software, the characteristics of carrier electronic warfare airplanes’ RCS under steady and dynamic flights were simulated under the UHF, X, and S radar bands. This paper researches the detection probability of aircraft by radars under the condition of electronic warfare, and completes the mathematical statistical analysis of the simulation results. The results show that: The Model A of carrier electronic warfare airplane is better than Model B on stealth performance and on discover probability by radar detection effectively.

  2. Chemical Warfare Agent Degradation and Decontamination

    Energy Technology Data Exchange (ETDEWEB)

    Talmage, Sylvia Smith [ORNL; Watson, Annetta Paule [ORNL; Hauschild, Veronique [U.S. Environmental Protection Agency; Munro, Nancy B [ORNL; King, J. [U.S. Army Environmental Center

    2007-02-01

    The decontamination of chemical warfare agents (CWA) from structures, environmental media, and even personnel has become an area of particular interest in recent years due to increased homeland security concerns. In addition to terrorist attacks, scenarios such as accidental releases of CWA from U.S. stockpile sites or from historic, buried munitions are also subjects for response planning. To facilitate rapid identification of practical and effective decontamination approaches, this paper reviews pathways of CWA degradation by natural means as well as those resulting from deliberately applied solutions and technologies; these pathways and technologies are compared and contrasted. We then review various technologies, both traditional and recent, with some emphasis on decontamination materials used for surfaces that are difficult to clean. Discussion is limited to the major threat CWA, namely sulfur mustard (HD, bis(2-chloroethyl)sulfide), VX (O-ethyl S-(2-diisopropylaminoethyl) methylphosphonothioate), and the G-series nerve agents. The principal G-agents are GA (tabun, ethyl N,N-dimethylphosphoramidocyanidate), GB (sarin, isopropyl methylphosphonofluoridate), and GD (soman, pinacolyl methylphosphonofluoridate). The chemical decontamination pathways of each agent are outlined, with some discussion of intermediate and final degradation product toxicity. In all cases, and regardless of the CWA degradation pathway chosen for decontamination, it will be necessary to collect and analyze pertinent environmental samples during the treatment phase to confirm attainment of clearance levels.

  3. IMS software developments for the detection of chemical warfare agent

    Science.gov (United States)

    Klepel, ST.; Graefenhain, U.; Lippe, R.; Stach, J.; Starrock, V.

    1995-01-01

    Interference compounds like gasoline, diesel, burning wood or fuel, etc. are presented in common battlefield situations. These compounds can cause detectors to respond as a false positive or interfere with the detector's ability to respond to target compounds such as chemical warfare agents. To ensure proper response of the ion mobility spectrometer to chemical warfare agents, two special software packages were developed and incorporated into the Bruker RAID-1. The programs suppress interferring signals caused by car exhaust or smoke gases resulting from burning materials and correct the influence of variable sample gas humidity which is important for detection and quantification of blister agents like mustard gas or lewisite.

  4. Hybrid warfare of the USA in South America

    Directory of Open Access Journals (Sweden)

    A. V. Budaev

    2015-01-01

    Full Text Available Washington’s hybrid warfare in Latin American region differs by its inventive and sophisticated methods and in fact represents a complex and multidimensional phenomenon including symbiosis of the “soft” and “hard” power as well as their combination in the form of the “smart power”. The increasing importance of hybrid warfare technologies in the US foreign policy in Latin America predetermines the necessity of thorough studies and analysis of this phenomenon for providing Russian interests.

  5. Theory of information warfare: basic framework, methodology and conceptual apparatus

    Directory of Open Access Journals (Sweden)

    Олександр Васильович Курбан

    2015-11-01

    Full Text Available It is conducted a comprehensive theoretical study and determine the basic provisions of the modern theory of information warfare in on-line social networks. Three basic blocks, which systematized the theoretical and methodological basis of the topic, are established. There are information and psychological war, social off-line and on-line network. According to the three blocks, theoretical concepts are defined and methodological substantiation of information processes within the information warfare in the social on-line networks is formed

  6. Hybrid Warfare: an Orientating or Misleading Concept in Analysing Russia’s Military Actions in Ukraine?

    Directory of Open Access Journals (Sweden)

    Kilinskas Kęstutis

    2016-12-01

    Full Text Available Hybrid warfare is perhaps the most frequently used concept in seeking to explain and define Russia‘s military actions in Ukraine. This article thoroughly analyses the development of the theory of hybrid warfare and circumstances of its formation, draws a line between hybrid warfare and hybrid threats, and discusses the perception of hybrid warfare in the armies of Western states and Russia. Actions of the Russian army in Crimea are analysed on the grounds of the provisions of the theory of hybrid warfare formulated by Frank Hoffman through revealing the impact on a military operation not only of the changing warfare tendencies but also of political, cultural, demographic and military conditions that existed on the Crimean peninsula. The article ends with an assessment of the capability of the hybrid warfare theory, as an analytical category, to explain Russia’s military actions in Crimea.

  7. Biological warfare in a historical perspective.

    Science.gov (United States)

    Roffey, R; Tegnell, A; Elgh, F

    2002-08-01

    There are some early examples of biological warfare (BW), but in modern times it was used first for sabotage by Germany during WWI. Development of biological weapons on a military significant scale was initiated in several countries in the period between the world wars. During WWII, several countries had active programs such as the USA, UK, Canada, Germany, Japan and the Soviet Union. It was only Japan that on a fairly large scale used BW. The US program continued until 1969, when President Nixon took a decision to end it in connection with signing the BTWC. The Soviet Union had also continued its program after the war, and this was enhanced after signing the BTWC: in the 1980s the program consisted of around fifty facilities and involved around 60,000 people. The Soviet Union produced and maintained a large stockpile of BW-agents. After the collapse of the Soviet Union, and due to pressure from USA and UK, President Yeltsin issued a decree in 1992 banning continued offensive BW activity. However, there are still concerns of residual activity in Russia. Another program of concern is the Iraqi BW-program. After 10 years of UN inspections that were stopped in 1998, there are still many unanswered questions concerning the BW program. There was also a covert BW-program in South Africa that was terminated around 1993. There have also been a number of allegations of alleged use or possession. In addition, there are indications that 10-12 states are now trying to acquire BW, and this assessment is based on intelligence information, mainly from the USA. For example Iraq, North Korea, Iran, Syria, Sudan and Libya. Another aspect is the strong driving force of technology developments to promote this type of program, opening new risks for future potential military misuse.

  8. Should the Concept of Network-Centric Warfare Form a Central Pillar of the Australian Army’s Transformation, as Articulated in the Hardened and Networked Army Concept?

    Science.gov (United States)

    2007-05-08

    Clausewitz Kantian philosophic framework for war, which contends that due to the inherent nature of war, it cannot be predicted or controlled by man. The...the key themes identified within Clausewitz On War has identified that NCW could be considered the anti-thesis of Clausewitz Kantian study of warfare...industries and centers of population remote from the surface forces. While not discussing the ethical implication of legitimizing the attack of civilian

  9. Manoeuvre warfare analysis of South Africa's 1914-1915 German ...

    African Journals Online (AJOL)

    The article consists of two parts: the theory of manoeuvre warfare and the history of the 1914-1915 South African campaign in German South West Africa (GSWA). The GSWA campaign has been described in many ways as a secondary theatre within the greater geostrategic chess game of the First World War. The objective ...

  10. relevance of information warfare models to critical infrastructure

    African Journals Online (AJOL)

    ismith

    information security and information systems were used to deconstruct the models into their fundamental components and this .... emptive strikes on communications and logistics may be conducted using computer- based information warfare or physical ..... and risk to infrastructure. Preventing an aggressor from acquiring ...

  11. Environmental assessments of sea dumped chemical warfare agents

    DEFF Research Database (Denmark)

    Sanderson, Hans; Fauser, Patrik

    This is a report on the information gathered during work related to sea dumped chemical warfare agents. It mainly reviews the work conducted in relation to the installation of the two Nord Stream gas pipeline from 2008-2012. The focus was on the weight-of-evidence risk assessment of disturbed CWA...

  12. Surface Warfare, Concept to Reality November/December 1997

    National Research Council Canada - National Science Library

    Sabalos, Nicholas

    1997-01-01

    ... Navy will require tomorrow. From an overview of Network-Centric Warfare to a detailed look at modeling and simulation, we examine the broad spectrum of effort and intellectual capital being invested in the future of the Navy and Marine Corps...

  13. US and UK Military Cultural Relevance for Future Warfare

    Science.gov (United States)

    2009-03-01

    thinking from ‘heavy metal ’, armour oriented manoeuvre warfare thinking to more agile and intellectual military actions then those adjectives serve their...flourish the power distance and excess testosterone needs to be reduced. A similar problem of Power Distance exists in the British Army but is perhaps less

  14. Biomonitoring of exposure to chemical warfare agents: A review

    NARCIS (Netherlands)

    Noort, D.; Benschop, H.P.; Black, R.M.

    2002-01-01

    In this report an overview of the methods currently available for detection of exposure to a number of chemical warfare agents (CWA), i.e., sulfur mustard, lewisite and nerve agents, is presented. Such methods can be applied for various purposes, e.g., diagnosis and dosimetry of exposure of

  15. Command and Control for Large-Scale Hybrid Warfare Systems

    Science.gov (United States)

    2014-06-05

    warfare have included couriers on horseback, sig- nal flags, encryption and code breaking, telegraph , wire- less radio, aerial reconnaissance and...Leavenworth, KS, 1990). [18] P. C. Niedfeldt, B. T. Carroll, J. A. Howard, R. W. Beard, B. S. Morse , and S. Pledgie, Enhanced UAS surveillance using a

  16. Public Discussion of Nuclear Warfare: A Time for Hope.

    Science.gov (United States)

    Cooper, Martha

    Anti-nuclear discourse, which peaked in 1981-82, signaled an emergence of public discourse on the nuclear warfare issue. During the development of the original atomic bomb, public discussion of the issue was severely restricted, but immediately after the bombing of Hiroshima and Nagasaki, discourse on the subject increased. During the Cold War…

  17. The political economy of warfare in nineteeth century Benin kingdom ...

    African Journals Online (AJOL)

    This paper examines how the interactions of politics and economy influenced the changing perspective on warfare in nineteenth century Benin Kingdom. The study investigates how the combined political and economic behaviour of Benin affected the rebuilding of military power as instrument of political policy in furtherance ...

  18. Composite warfare : the conduct of successful ground force ...

    African Journals Online (AJOL)

    COMPOSITE WARFARE: THE CONDUCT OF. SUCCESSFUL GROUND FORCE. OPERATIONS IN AFRICA. Eeben Barlow. Abel Esterhuyse, PhD. Stellenbosch University. Pinetown: 30 Degrees South Publishers. 2015, 576 pages. ISBN 9781928211761. Africa is still one of the most conflict-ridden places on earth – from ...

  19. The Enemy Below: Preparing Ground Forces for Subterranean Warfare

    Science.gov (United States)

    2013-12-01

    underground structure through social media. Social media such as Facebook , Twitter, Instagram , and YouTube are this generation’s leaflet technology for...66 E . TUNNEL WARFARE DURING THE VIETNAM WAR (1966) ..............67 1. Introduction...89 d. Indicators and Detection of Subterranean Activity ...............90 e . Alternate Approaches

  20. Management information systems for electronic warfare command and decision support

    CSIR Research Space (South Africa)

    Van Niekerk, B

    2015-04-01

    Full Text Available information to allow them to manage their own spectrum, to identify threats, and to deny adversaries’ use of the spectrum. In this paper, the concepts of integrated electronic warfare and spectrum battle management are introduced, and the relevant information...

  1. History of the Chemical Warfare Service in World War II. Biological Warfare Research in the United States, Volume 2

    Science.gov (United States)

    1947-11-01

    Hired Commission for the Reduction of Arma - ments (A. 16. 1924.. H), Geneva, 30 Jul 1924., pp. 29-30. In Hist files. Extracts from this League...Department of Agriculture in Kay 1942, several rice pathogens were considered as potential biologica warfare agents, one of «rich »as Hel

  2. Psychological and Unconventional Warfare, 1941-1952: Origins of a Special Warfare Capability for the United States Army

    Science.gov (United States)

    1979-11-01

    over the conferral of First Special Service and Ranger unit colors , lineage, and honors to the Army’s Special Forces. Looking back upon that scene...Against E-e y, n D_:2a to VE-V1. New York: George. W. Stewart, Inc., 1949. Linebarger, Paul M. A. Psichological Warfare, New York: ]>jell, Sloan and Pearce

  3. The Law Governing Aerospace Warfare in the Twenty-First Century

    Science.gov (United States)

    2000-07-01

    Yet, there are currently no treaties dealing specifically with the law of armed conflict in the air and space environments. Chapter 1 describes the...evolution to date of the law governing aerospace warfare. Chapter II analyzes the relevance of military interventions in Iraq and Yugoslavia (Bosnia...Kosovo) to the law of air and space warfare. Chapter III discusses the impact of humanitarian intervention’ on the law of aerospace warfare. Chapters IV

  4. Stuxnet and Cyber-Warfare (2/2)

    CERN Multimedia

    CERN. Geneva

    2016-01-01

    The first part of the lecture is devoted to the description of the Stuxnet worm, the first cyber-weapon whose existence has been made public, discovered in 2010 and targeting a specific industrial control system; the worm is responsible for the damaging of many centrifuges at an uranium enrichment facility, with the goal of sabotaging Iran's nuclear program. In the second part, the main features of cyber-warfare in conflict and pre-conflict activities will be discussed and compared to the conventional warfare domains, with also a general view at the international political debate on this topic.   Check the http://pugwash.org web site, an organisation that seeks a world free of nuclear weapons and other weapons of mass destruction. The lecturer invites comments via email to Gian.Piero.Siroli@cern.ch NB! All Academic Training lectures are recorded and are publicly available. There is no live webcast.

  5. Stuxnet and Cyber-Warfare (1/2)

    CERN Multimedia

    CERN. Geneva

    2016-01-01

    The first part of the lecture is devoted to the description of the Stuxnet worm, the first cyber-weapon whose existence has been made public, discovered in 2010 and targeting a specific industrial control system; the worm is responsible for the damaging of many centrifuges at an uranium enrichment facility, with the goal of sabotaging Iran's nuclear program. In the second part, the main features of cyber-warfare in conflict and pre-conflict activities will be discussed and compared to the conventional warfare domains, with also a general view at the international political debate on this topic. Check the http://pugwash.org web site, an organisation that seeks a world free of nuclear weapons and other weapons of mass destruction.   NB! All Academic Training lectures are recorded and are publicly available. There is no live webcast.

  6. Heterogeneity in the long term health effects of warfare.

    Science.gov (United States)

    Akbulut-Yuksel, Mevlude; Yuksel, Mutlu

    2017-11-01

    This paper estimates the long-term heterogeneous legacies of exposures to war in utero and during early childhood on height in adulthood. Using a novel dataset on the regional WWII destruction in Germany, combined with the German Socio-Economic Panel (SOEP), we find that individuals who experienced warfare in utero and during childhood are an average of 2cm shorter as adults, suggesting that the negative scarring effect of WWII dominated the positive effect coming from a selection. Among war survivors, children from less privileged families who resided in highly destroyed regions, particularly girls, suffered the greatest health consequences of warfare. Our analyses also show that wartime children who lost their parents during the war years are an average of 1.3cm shorter as adults. However, the father's conscription during WWII had no long-term effect on adult height. Copyright © 2017 Elsevier B.V. All rights reserved.

  7. Fighting Networks: The Defining Challenge of Irregular Warfare

    Science.gov (United States)

    2011-06-01

    ambush is a form of offensive attack that utilizes principles of the defense and relies on deception. Jon Latimer describes the ambush and “…the use...of lures to draw the enemy into them…” as fundamental aspects of irregular and guerrilla warfare; Jon Latimer , Deception in War (New York: Overlook...Theory of Intelligence,” in Intelligence Theory, 10. 296 Latimer , Deception in War, 272. 297 Organizationally, fusion provides a structural framework

  8. A Study of Combined Arms Warfare by Alexander the Great.

    Science.gov (United States)

    1998-06-05

    Arms Warfare by Alexander the Great Approved by: ^§FC ^ohn T. Broom, Ph.D. ^c^. Thesis Committee Chairman y v^X^; ■-. ■SA: Gary J. Bjorge ...research. Dr. Bjorge and LTC Clay have provided technical advice and copy editing for much of this thesis. Special acknowledgment is due LTC David...objective to destroy or disrupt the enemy forces. Additionally, ancient armies did not have the communication ability that the modern army possess

  9. Theoretical, Legal and Ethical Impact of Robots on Warfare

    Science.gov (United States)

    2007-03-30

    with the Theory of War Carl von Clausewitz believed that there were certain laws and principles of warfare but that they tended to exist at the... Carl von Clausewitz ,” Parameters (Spring 2006): 83-84. 47 Peter Paret, ed. Makers of Modern Strategy from Machiavelli to the Nuclear Age...Princeton, NJ: Princeton University Press, 1986), 193. 48 Paret, 107. 49 Michael Howard and Peter Paret, ed and trans, Carl Von Clausewitz : On War

  10. Numerical simulation of RCS for carrier electronic warfare airplanes

    OpenAIRE

    Yue, Kuizhi; Liu, Wenlin; Li, Guanxiong; Ji, Jinzu; Yu, Dazhao

    2015-01-01

    This paper studies the radar cross section (RCS) of carrier electronic warfare airplanes. Under the typical naval operations section, the mathematical model of the radar wave’s pitch angle incidence range analysis is established. Based on the CATIA software, considering dynamic deflections of duck wing leading edge flaps, flaperons, horizontal tail, and rudder, as well as aircraft with air-to-air missile, anti-radiation missile, electronic jamming pod, and other weapons, the 3D models of carr...

  11. Nodes and Codes: The Reality of Cyber Warfare

    Science.gov (United States)

    2012-05-17

    Agency that claimed Stuxnet infected over one thousand Chinese industrial computer networks, including the Three Gorges Dam hydroelectric facility...infrastructure. Three case studies evaluate cyber policy, discourse, and procurement in the US, Russia, and China before and after Stuxnet to illustrate their...similar, yet unique, realities of cyber warfare. Evidence suggests that all three nations are taking extraordinary measures to build cyber armies

  12. Sub state Unconventional Warfare: Expanding United States Military Political Options

    Science.gov (United States)

    2016-05-26

    de Colombia FID Foreign Internal Defense FM Field Manual GVN Government of South Vietnam ICP Indochinese Communist Party ISIL Islamic State of Iraq...abound throughout the world. Hezbollah, Hamas, ISIL, and the Taliban in the Middle East, the Fuerzas Armadas Revolucionarias de Colombia (FARC) in South...describing what UW consists of, and how it is applied, in FM 31-21 (1969). “Unconventional warfare consists of military, political, psychological , or

  13. Friction in the U.S. Army During Irregular Warfare

    Science.gov (United States)

    2014-05-22

    32Nic Fields and Peter Dennis, Boudicca’s Rebellion AD 60-61: The Britons Rise up against Rome (Long Island City, NY: Osprey Publication, 2011), 47–51...Colonial Pacification in Tonkin and Madagascar , 1885-1900, 2013, 13. 19 validated entrenched ideas of traditional warfare codified in General...counterinsurgency operation. The Philippine-American War, the unintended result of purchasing the island chain from Spain after a naval victory at

  14. Major General George Crook's Use of Counterinsurgency Compound Warfare during the Great Sioux War of 1876-77

    National Research Council Canada - National Science Library

    Pirkle, Wesley M

    2008-01-01

    ... implementing the concept of counterinsurgency compound warfare. Counterinsurgency Compound Warfare is the simultaneous use of a regular or conventional force and an irregular, indigenous force in unison against a common enemy...

  15. ALR-46 Computer Graphics System for the Robins Air Force Base Electronic Warfare Division Engineering Branch Laboratory.

    Science.gov (United States)

    1981-12-01

    Warfare EWAISF Electronic Warfare Avionics Integration Support Facility EWOLS Electronic Warfare Open Loop Simulator GRA Graphics Command HIPO ...Softech’s Structured Analysis and Design Technique (SADT)(Ref 16). and IBM’s Hierarchical Input-Process-Output ( HIPO ) diagrams (Ref 8). Structured

  16. Procurements by the Non-Acoustic Anti-Submarine Warfare Program Through the Environmental Technologies Laboratory

    Science.gov (United States)

    1994-06-14

    General, DoD, on contract offloading, including Report No. 93-068, " Procurement of Services for the Non-Acoustic Anti-Submarine Warfare Program...contract administration in response to Audit Report No. 93-042. Report No. 93-068, " Procurement of Services for the Non-Acoustic Anti- Submarine Warfare

  17. Metal organic frameworks for the catalytic detoxification of chemical warfare nerve agents

    Energy Technology Data Exchange (ETDEWEB)

    Hupp, Joseph T.; Farha, Omar K.; Katz, Michael J.; Mondloch, Joseph E.

    2017-04-18

    A method of using a metal organic framework (MOF) comprising a metal ion and an at least bidendate organic ligand to catalytically detoxify chemical warfare nerve agents including exposing the metal-organic-framework (MOF) to the chemical warfare nerve agent and catalytically decomposing the nerve agent with the MOF.

  18. Proctoring the Joint Force: Networks, Hierarchy, and 21st Century Warfare

    Science.gov (United States)

    2005-06-01

    PROCTORING THE JOINT FORCE: NETWORKS, HIERARCHY, AND 21ST CENTURY WARFARE BY MAJOR DANIEL W. TIPPETT A THESIS PRESENTED...4. TITLE AND SUBTITLE Proctoring the Joint Force: Networks, Hierarchy, and 21st Century Warfare 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c

  19. Cyber Warfare: China’s Strategy to Dominate in Cyber Space

    Science.gov (United States)

    2011-06-10

    Revolution.‖ 64Jason Fritz, ―How China will use cyber warfare to leapfrog in military competitiveness,‖ Culture Mandala : The Bulletin of the Centre for East...cyber warfare to leapfrog in military competitiveness.‖ Culture Mandala : The Bulletin of the Centre for East-West Culture and Economic Studies 8 no. 1

  20. Status of dental health in chemical warfare victims: The case of Isfahan, Iran

    Directory of Open Access Journals (Sweden)

    Ahmad Mottaghi

    2012-01-01

    Conclusion: Chemical warfare victims have relatively poor dental/oral health. Chemical injury might cause a dysfunction in saliva secretion, with decrease in saliva secretion increasing the risk for tooth decay and periodontal disorders. Further research is required to find out the exact underlying mechanisms and the factors associated with poor dental/oral health in chemical warfare victims.

  1. Nonstandard Logistics Success in Unconventional Warfare

    Science.gov (United States)

    2015-11-01

    government or occupying power by operating through or with an underground, auxiliary, and guer- rilla force in a denied area.” The UW environment...another OE be forced to use another item that has value. Cash may work in a city center, but a goat in a rural area is just as valuable and easily sold...tain low visibility as opposed to items that may appear American. A class I request could be met with a sack of grain and maybe even a live goat

  2. Motivation and requirements for determining a Network Warfare Capability

    CSIR Research Space (South Africa)

    Veerasamy, N

    2010-06-01

    Full Text Available technology for their day-to-day operation (Panda, Giordano 1999). A report by the Defense Science Board in the United States of America (USA) explains that challenges in the present age include information assurance, and that this requires new...", International Journal of Information Security, vol. 1, no. 1, pp. 3-13. Munro, N. 1996, "Sketching a national Information Warfare defense plan", Communications of the ACM, vol. 39, no. 11, pp. 15-17. Panda, B. & Giordano, J. 1999, "Defensive Information...

  3. Lawfare in Hybrid Wars: The 21st Century Warfare

    OpenAIRE

    Mosquera, A.; Bachmann, Sascha-Dominik

    2016-01-01

    In the context of ‘Hybrid Warfare’ as 21st Century’s threat to peace and security, this paper intends to address the role of Lawfare. The use of law as a weapon, Lawfare,1can have a tangible impact on democratic States when their adversaries use it in an exploitative way. Lawfare can be used in the context of Hybrid War.2 Examples of Hybrid Warfare as witnessed in the Russian/Ukrainian conflict of 2014/2015 and the ongoing conflict with Daesh are particularly sensitive to Lawfare due to an ap...

  4. Russian Military Thinking – A New Generation of Warfare

    Directory of Open Access Journals (Sweden)

    Mattsson Peter A.

    2015-06-01

    Full Text Available This article deals with how Russian warfighting is described and discussed in contemporary Russian military theory. The approach has been studies, analyses and interpretations of primarily Russian sources as prominent Russian journals, but also Western analyses and interpretations of contemporary Russian warfighting discussions. Theoretical considerations are limited to the period from the 1980s to the present day - 2014. Mainly Russian experts on military theory (Bogdanov, Chekinov, Gareev, Kiselyov, Kuralenko, Morozov, Slipchenko, Vinogradov, Vladimirov, Vorobyov have been studied, but also sources from some prominent Western experts on Russian warfare (FitzGerald, Gileotti, Kipp, McDermott.

  5. Cybersecurity protecting critical infrastructures from cyber attack and cyber warfare

    CERN Document Server

    Johnson, Thomas A

    2015-01-01

    The World Economic Forum regards the threat of cyber attack as one of the top five global risks confronting nations of the world today. Cyber attacks are increasingly targeting the core functions of the economies in nations throughout the world. The threat to attack critical infrastructures, disrupt critical services, and induce a wide range of damage is becoming more difficult to defend against. Cybersecurity: Protecting Critical Infrastructures from Cyber Attack and Cyber Warfare examines the current cyber threat landscape and discusses the strategies being used by governments and corporatio

  6. China's Use of Cyber Warfare: Espionage Meets Strategic Deterrence

    Directory of Open Access Journals (Sweden)

    Magnus Hjortdal

    2011-01-01

    Full Text Available This article presents three reasons for states to use cyber warfare and shows that cyberspace is—and will continue to be—a decisive element in China's strategy to ascend in the international system. The three reasons are: deterrence through infiltration of critical infrastructure; military technological espionage to gain military knowledge; and industrial espionage to gain economic advantage. China has a greater interest in using cyberspace offensively than other actors, such as the United States, since it has more to gain from spying on and deterring the United States than the other way around. The article also documents China's progress in cyber warfare and shows how it works as an extension of its traditional strategic thinking and the current debate within the country. Several examples of cyber attacks traceable to China are also presented. This includes cyber intrusions on a nuclear arms laboratory, attacks on defense ministries (including the Joint Strike Fighter and an airbase and the U.S. electric grid, as well as the current Google affair, which has proved to be a small part of a broader attack that also targeted the U.S. Government. There are, however, certain constraints that qualify the image of China as an aggressive actor in cyberspace. Some believe that China itself is the victim of just as many attacks from other states. Furthermore, certain actors in the United States and the West have an interest in overestimating China's capabilities in cyberspace in order to maintain their budgets.

  7. Between Female Dialogics and Traces of Essentialism: Gender and Warfare in Christa Wolf's Major Writings

    Directory of Open Access Journals (Sweden)

    Sabine Wilke

    1993-06-01

    Full Text Available The relationship between memory, writing, and the question of how we define ourselves as gendered subjects is at the center of Christa Wolf's work. Her literary production, starting in the late fifties with a rather naive and un-selfconscious love story, has undergone a dramatic shift. In her more recent texts, Wolf sets out to rewrite classical mythology to make us aware of those intersections in the history of Western civilization at which women were made economically and psychologically into objects. The present essay seeks to locate Christa Wolf's evolving conception of gender and warfare within the contemporary theoretical discussion on identity and the subject sketched briefly above. While of late there has been a wealth of studies into the construction of gender in particular works by Wolf, no scholarly contribution has yet addressed the range of answers regarding those questions in her overall oeuvre. I will argue that whereas Wolf's earlier works present a dialogic conception of gender, her later narratives more and more expound a notion of the essentially more peaceful female subject that is counterposed to the essentially warloving male. In these works "female subjectivity is taken to be capable of articulating itself fully in its radical otherness outside of male discourse," which seems to support ideas of an ontological essence of "woman."

  8. The Data Warehouse in Service Oriented Architectures and Network Centric Warfare

    National Research Council Canada - National Science Library

    Lenahan, Jack

    2005-01-01

    Since Network Centric Warfare (NCW) theory stresses shared understanding, command dispersal, and improved situational awareness does it not follow then, that data availability, mining, and superior analytics must be available at all...

  9. Measuring the Operational Readiness of an Air Force Network Warfare Squadron

    National Research Council Canada - National Science Library

    Orth, Paul H

    2008-01-01

    As part of its squadron activation, the 315th Network Warfare Squadron (NWS) requested assistance from the Air Force Institute of Technology in developing criteria for declaring Initial Operational Capability (IOC...

  10. The Third World War? In The Cyberspace. Cyber Warfare in the Middle East.

    Directory of Open Access Journals (Sweden)

    Martina

    2014-06-01

    Full Text Available This article aims to provide a brief and comprehensive introduction to the issue of cyber warfare and to display the recent development in this area. Geographically, it focuses on the Middle East region, since the vast majority of the most important recent cyber attacks appeared just in there or were connected to it. The first part of the article tries to define the key notion of cyber warfare, compares it to the standard warfare and presents different types of cyber weapons that are known today. The second part points out examples of the most striking recent cyber attacks and uses them as evidences to demonstrate today's importance and dissemination of cyber warfare. Finally, the article sums up pros and cons of the cyber weapons and, in view of these, predicts a significant increase in their use in any future war conflicts.

  11. Nathanael Greene's Implementation of Compound Warfare during the Southern Campaign of the American Revolution

    National Research Council Canada - National Science Library

    Johnson, Todd J

    2007-01-01

    This monograph is an analysis of Major General Nathanael Greene's implementation of compound warfare in the Southern Department from December 1780 until the British surrender at Yorktown in October 1781...

  12. The Rapier or the Club: The Relationship between Attrition and Maneuver Warfare

    National Research Council Canada - National Science Library

    Springman, Jeffrey A

    2006-01-01

    ...? This project compares the relationship between attrition and maneuver warfare. The study considers whether there are times when wars of attrition should be fought, and whether there are conditions that force wars of attrition...

  13. "No practical capabilities": American biological and chemical warfare programs during the Korean war.

    Science.gov (United States)

    Crane, Conrad C

    2002-01-01

    Much controversy still surrounds accusations that American forces in the Far East during the Korean War used biological warfare against North Korea and China. An analysis of recently declassified documents reveals that, although the United States attempted to accelerate its development and acquisition of such weapons during that period, its efforts to create a viable biological warfare capability were unsuccessful. Plans to similarly expand chemical warfare stocks and capabilities were also frustrated. Technological difficulties, personnel shortages, bureaucratic battles between the armed services, and policy limitations combined to hold back advances in American chemical and biological warfare. In light of the recent fears of terrorist attacks with such weapons, this analysis highlights the great difficulties involved in developing, acquiring, and delivering such capabilities.

  14. An Assessment of China's View an the Revolution in Military Affairs and Future Warfare

    National Research Council Canada - National Science Library

    Christian, Paul

    1998-01-01

    China's explosive economy has financed her recent modernization program. Not only is China modernizing her armed forces but many of her senior military authors are advocating a RMA and expounding on its potential value to future warfare...

  15. Combinatorial Auction Theory Applied to the Selection of Surface Warfare Officer Retention Incentives

    National Research Council Canada - National Science Library

    Denmond, Constance M; Johnson, Derek N; Lewis, Chavius G; Zegley, Christopher R

    2007-01-01

    The purpose of this project is to investigate the potential retention and cost impacts of offering combinations of retention base incentives to members of the Surface Warfare Officer (SWO) community...

  16. Optimizing Armed Forces Capabilities for Hybrid Warfare - New Challenge for Slovak Armed Forces

    National Research Council Canada - National Science Library

    Peter Pindják

    2015-01-01

      The paper deals with the optimization of military capabilities of the Slovak Armed Forces for conducting operations in a hybrid conflict, which represents one of the possible scenarios of irregular warfare...

  17. Global Trends and Future Warfare (Strategic Insights. Special Issue, October 2011)

    Science.gov (United States)

    2011-10-01

    Watching Hainan, Remembering Murmansk : Cold War Analogies, Maritime Access, and the Future of Warfare Adam Grissom 78 10 Irregular Warfare and Future War...77 Betz The Mystique of "Cyberwar" and the Strategic Latency of Networked Social Movements 9. Watching Hainan, Remembering Murmansk Cold War...issues. Strategic Insights • October 2011 Volume 10, Special Issue 79 Grissom Watching Hainan, Remembering Murmansk : Cold War Analogies, Maritime

  18. Past and Potential Theory for Special Warfare Operational Art: People’s War and Contentious Politics

    Science.gov (United States)

    2015-03-04

    for a constructivist perspective of social movement theory that emphasized the role of subjective interpretation and meaning in causing and sustaining...Approved for public release; distribution is unlimited. Past and Potential Theory for Special Warfare Operational Art: People’s War and...Potential Theory for Special Warfare Operational Art: People’s War and Contentious Politics 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM

  19. The effect of graduate education timing on the retention of surface warfare officers

    OpenAIRE

    Clark, Eric S.

    2016-01-01

    Approved for public release; distribution is unlimited This thesis examines the effect of the timing of graduation education attainment on retention of officers within the Surface Warfare community. Navy Surface Warfare Officers (SWOs) commissioned between fiscal years 1999 and 2003 were classified as having no graduate degree, or earning their master’s prior to service, before five years of service, between five and 10 years of service, and after 10 years of service. Differential bivariat...

  20. Electronic Warfare Closed Loop Laboratory (EWCLL) Antenna Motor Software and Hardware Development

    Science.gov (United States)

    2016-09-01

    Electronic Warfare Closed Loop Laboratory (EWCLL) Antenna Motor Software and Hardware Development by Neal Tesny Sensors and Electron Devices Directorate...TITLE AND SUBTITLE Electronic Warfare Closed Loop Laboratory (EWCLL) Antenna Motor Software and Hardware Development 5a. CONTRACT NUMBER 5b...14. ABSTRACT Software and hardware were developed to control the rotation of the 6 double-ridged waveguide horn antennas that are used in the

  1. FY 15/16 Warfare Innovation Continuum "Creating Asymmetric Warfighting Advantages" executive summary

    OpenAIRE

    Kline, Jeff; O’Neal, Carol

    2016-01-01

    The purpose of the Warfare Innovation Continuum is to coordinate and execute a series of cross‐campus educational and research activities synchronized by the Chair of Systems Engineering Analysis with a central theme of exploring the creation of asymmetric warfighting advantages across all domains. The focus will be on leveraging unmanned systems to enhance cross domain operations and developing the Electromagnetic Maneuver Warfare (EMW) concept by extending research in electro...

  2. Estimated Chemical Warfare Agent Surface Clearance Goals for Remediation Pre-Planning

    Energy Technology Data Exchange (ETDEWEB)

    Dolislager, Frederick [University of Tennessee, Knoxville (UTK); Bansleben, Dr. Donald [U.S. Department of Homeland Security; Watson, Annetta Paule [ORNL

    2010-01-01

    Health-based surface clearance goals, in units of mg/cm2, have been developed for the persistent chemical warfare agents sulfur mustard (HD) and nerve agent VX as well as their principal degradation products. Selection of model parameters and critical receptor (toddler child) allow calculation of surface residue estimates protective for the toddler child, the general population and adult employees of a facilty that has undergone chemical warfare agent attack.

  3. A Survey of Game Theoretic Approaches to Modelling Decision-Making in Information Warfare Scenarios

    Directory of Open Access Journals (Sweden)

    Kathryn Merrick

    2016-07-01

    Full Text Available Our increasing dependence on information technologies and autonomous systems has escalated international concern for information- and cyber-security in the face of politically, socially and religiously motivated cyber-attacks. Information warfare tactics that interfere with the flow of information can challenge the survival of individuals and groups. It is increasingly important that both humans and machines can make decisions that ensure the trustworthiness of information, communication and autonomous systems. Subsequently, an important research direction is concerned with modelling decision-making processes. One approach to this involves modelling decision-making scenarios as games using game theory. This paper presents a survey of information warfare literature, with the purpose of identifying games that model different types of information warfare operations. Our contribution is a systematic identification and classification of information warfare games, as a basis for modelling decision-making by humans and machines in such scenarios. We also present a taxonomy of games that map to information warfare and cyber crime problems as a precursor to future research on decision-making in such scenarios. We identify and discuss open research questions including the role of behavioural game theory in modelling human decision making and the role of machine decision-making in information warfare scenarios.

  4. RELATIONAL APPROACHES REGARDING FOCUSED LOGISTICS IN MODERN WARFARE JOINT OPERATIONS

    Directory of Open Access Journals (Sweden)

    Gheorghe MINCULETE

    2015-10-01

    Full Text Available The military joint operations of the future are characterized by large concentrations of forces and conventional means on the directions that permit the exploitation of the technological superiority and the manifestation of the offensive spirit of the commanders of the joint operation force groups. Having in mind the fact that the relation between the combatant forces and the logistic ones will shift more and more in favour of the latter, the aforementioned operations will be usually supported by modern flexible logistic structures. The constituted force groups will have a significant joint force character, ensuring superior quality of the troops’ combat training, both at individual level and collective level of units and large units. The current article presents innovative aspects of focused logistics, adapted for the modern warfare, which should be designed and achieved in order to increase the operational potential of the joint force groups.

  5. Biological warfare training: infectious disease outbreak differentiation criteria.

    Science.gov (United States)

    Noah, D L; Sobel, A L; Ostroff, S M; Kildew, J A

    1998-04-01

    The threat of biological terrorism and warfare may increase as the availability of weaponizable agents increases, the relative production costs of these agents decrease, and, most importantly, there exist terrorist groups willing to use them. Therefore, an important consideration during the current period of heightened surveillance for emerging infectious diseases is the ability to differentiate between natural and intentional outbreaks. Certain attributes of a disease outbreak, although perhaps not pathognomonic for a biological attack when considered singly, may combine to provide convincing evidence of intentional causation. These potentially differentiating criteria include proportion of combatants at risk, temporal patterns of illness onset, number of cases, clinical presentation, strain/variant, economic impact, geographic location, morbidity/mortality, antimicrobial resistance patterns, seasonal distribution, zoonotic potential, residual infectivity/toxicity, prevention/therapeutic potential, route of exposure, weather/climate conditions, incubation period, and concurrence with belligerent activities of potential adversaries.

  6. Biological warfare training. Infectious disease outbreak differentiation criteria.

    Science.gov (United States)

    Noah, D L; Sobel, A L; Ostroff, S M; Kildew, J A

    1999-01-01

    The threat of biological terrorism and warfare may increase as the availability of weaponizable agents increase, the relative production costs of these agents decrease, and, most importantly, there exist terrorist groups willing to use them. Therefore, an important consideration during the current emphasis of heightened surveillance for emerging infectious diseases is the capability to differentiate between natural and intentional outbreaks. Certain attributes of a disease outbreak, while perhaps not pathognomic for a biological attack when considered singly, may in combination with other attributes provide convincing evidence for intentional causation. These potentially differentiating criteria include proportion of combatants at risk, temporal patterns of illness onset, number of cases, clinical presentation, strain/variant, economic impact, geographic location, morbidity/mortality, antimicrobial resistance patterns, seasonal distribution, zoonotic potential, residual infectivity/toxicity, prevention/therapeutic potential, route of exposure, weather/climate conditions, incubation period, and concurrence with belligerent activities of potential adversaries.

  7. Information Warfare on Social Media: A Brand Management Perspective

    Directory of Open Access Journals (Sweden)

    Kalpokas Ignas

    2017-06-01

    Full Text Available Employing a perspective informed by brand management, this article aims at understanding information warfare operations in social media. The state, seen as brand, must project an image of itself to both internal and foreign audiences to unite the domestic audience and/or attract global support. However, in constructing a brand, states are vulnerable to ‘sofa warriors’ – ordinary individuals who have been unwittingly recruited by hostile actors to disseminate (over social media or other platforms a counter-brand, harmful to the state concerned. These new threats are investigated in light of recent tendencies in online branding, elucidating their status as a national security threat, with the potential to significantly disrupt life in political communities.

  8. Book Review: Conquest in Cyberspace: National Security and Information Warfare

    Directory of Open Access Journals (Sweden)

    Gary C. Kessler

    2007-06-01

    Full Text Available Libicki, M.C. (2007. Conquest in Cyberspace: National Security and Information Warfare. New York: Cambridge University Press. 323 pages, ISBN: 978-0-521-69214-4 (paper, US$80Reviewed by Gary C. Kessler (gary.kessler@champlain.eduMany books -- and even movies ("Live Free or Die Hard" -- are based upon the premise of an impending information war. In these scenarios -- made all too plausible by the increased frequency with which we read about and experience major information security incidents -- a Bad Guy exploits known computer security vulnerabilities in order to control major national infrastructures via the Internet so as to reap financial, economic, and/or personal power.(see PDF for full review

  9. Military medicine and the ethics of war: British colonial warfare during the Seven Years War (1756-63)

    National Research Council Canada - National Science Library

    Charters, Erica

    2010-01-01

    This article examines 18th-century European warfare, tracing the first formal codifications of conventions of war, frequently introduced by military physicians and initially regarding the treatment...

  10. PSYCHOLOGICAL PROBLEMS AND STRESS FACED BY SOLDIERS WHO OPERATE IN ASYMMETRIC WARFARE ENVIRONMENTS: EXPERIENCES IN THE FIELD

    Directory of Open Access Journals (Sweden)

    Giuseppe CAFORIO

    2014-10-01

    Full Text Available This article deals with the problems of anxiety, stress and psychological discomfort that can affect soldiers sent on asymmetric warfare operations. It is based on secondary analysis of the data of two important field researches whose results have recently (2013 been published. Although the two researches adopted different methodologies, the testimonies are fully comparable and show that soldiers from different countries and cultures display common or similar reactions when they are placed in the stress conditions that the asymmetric environment involves. The approach of the paper is drawn up in such a way as to make the reader a participating observer of the reality of such missions. It is therefore centered on the personal testimonies of the soldiers interviewed in the two researches, testimonies reported just as they are, in their simplicity and, often, drama, with comments by the author kept to a minimum in order to give readers ample opportunity to evaluate and interpret the reported texts on their own. The research data, drawn from the declarations of those directly concerned, reveal the existence of a problem of psychological distress resulting from deployment in asymmetric warfare situations that is in part different in the causes of the problems resulting from deployment in traditional combat and affects percentages of participating soldiers that are not high but definitely significant. The highest incidence appears to be constituted by problems relating to reintegration into normal social and working life upon returning from the mission. This is followed in percentage terms by anxiety situations relating to life far from the family, due in large part to a sense of powerlessness for the scant possibility of managing family situations that may have cropped up or already existed beforehand.

  11. Measuring Customer and Employee Loyalty at Space and Naval Warfare Systems Center Charleston

    Science.gov (United States)

    2005-09-01

    commercial space to promote employee retention through awards to employees for their actions and performance. Understanding these relationships is... employee retention , productivity and loyalty and their perception of a company’s culture. This has been true in manufacturing since the discovery of

  12. 78 FR 29699 - Transfer of Administrative Jurisdiction: Marine Corps Mountain Warfare Training Center...

    Science.gov (United States)

    2013-05-21

    ... Office of the Regional Forester, Intermountain Region, USDA, Forest Service, 324 25th Street, Ogden, UT... INFORMATION CONTACT: A.L. Richard, Washington Office Lands and Realty Staff, USDA, Forest Service, 201 14th Street SW., Washington, DC 20250, Telephone: (202) 205-1792 or [email protected] . ] Dated: May 16, 2013...

  13. Undersea Laser Communications Field Test at the Naval Undersea Warfare Center (NUWC)

    Science.gov (United States)

    2016-08-30

    August 2016 This material is based on work supported by the Assistant Secretary of Defense for Research and Engineering under Air Force Contract No... Engineering , ASD(R&E), under Air Force Contract No. FA8721-05-C-0002 and/or FA8702-15-D-0001. Any opinions, findings and conclusions or recommendations...field of view of the two detectors and the characterization camera. The IMS-25A Pacific Laser Equipment motorized iris utilized a stepper motor to

  14. Naval Surface Warfare Center Technical Digest. Research and Technology - Shaping Future Naval Systems

    Science.gov (United States)

    1991-09-01

    Techniques to Reduce Signal Kentucky University in 1967 Multipath from the Global Positioning System." Interno - and an M.A. degree in tionnl Association...the Fast Sciences Branch. Since 1974, lane," Proceedings of ION GPS-89, The Second Interno - he has worked on numerous 167 tional Technical Meeting of

  15. Passive front-ends for wideband millimeter wave electronic warfare

    Science.gov (United States)

    Jastram, Nathan Joseph

    This thesis presents the analysis, design and measurements of novel passive front ends of interest to millimeter wave electronic warfare systems. However, emerging threats in the millimeter waves (18 GHz and above) has led to a push for new systems capable of addressing these threats. At these frequencies, traditional techniques of design and fabrication are challenging due to small size, limited bandwidth and losses. The use of surface micromachining technology for wideband direction finding with multiple element antenna arrays for electronic support is demonstrated. A wideband tapered slot antenna is first designed and measured as an array element for the subsequent arrays. Both 18--36 GHz and 75--110 GHz amplitude only and amplitude/phase two element direction finding front ends are designed and measured. The design of arrays using Butler matrix and Rotman lens beamformers for greater than two element direction finding over W band and beyond using is also presented. The design of a dual polarized high power capable front end for electronic attack over an 18--45 GHz band is presented. To combine two polarizations into the same radiating aperture, an orthomode transducer (OMT) based upon a new double ridge waveguide cross section is developed. To provide greater flexibility in needed performance characteristics, several different turnstile junction matching sections are tested. A modular horn section is proposed to address flexible and ever changing operational requirements, and is designed for performance criteria such as constant gain, beamwidth, etc. A multi-section branch guide coupler and low loss Rotman lens based upon the proposed cross section are also developed. Prototyping methods for the herein designed millimeter wave electronic warfare front ends are investigated. Specifically, both printed circuit board (PCB) prototyping of micromachined systems and 3D printing of conventionally machined horns are presented. A 4--8 GHz two element array with

  16. Guerilla Warfare & Law Enforcement: Combating the 21st Century Terrorist Cell within the U.S.

    Directory of Open Access Journals (Sweden)

    Major Richard Hughbank

    2009-01-01

    Full Text Available Both domestic and international terrorist organizations employ guerrilla warfare tactics, techniques, and procedures. Thus, the ability to identify and defeat the members of these organizations, cripple their infrastructures, and disrupt their financial resources lies in the understanding of modern guerrilla warfare as it develops in the twenty-first century within the United States.3 The forms of asymmetric warfare4 adopted by domestic and international terrorist groups alike is no longer intended to gain simple media exposure or governmental manipulation; they want to make an overpowering impact by causing massive loss of life and severe damage to infrastructure and are often motivated by religious imperatives and political goals. As terrorism analyst Stephen Flynn has observed, "Throughout the 20th century [Americans] were able to treat national security as essentially an out-of-body experience. When confronted by threats, [America] dealt with them on the turf of our allies or our adversaries. Aside from the occasional disaster and heinous crime, civilian life [in the United States] has been virtually terror-free." With the turn of the twenty-first century, terrorist operations have become more prevalent in the United States and are taking shape in the form of modern guerrilla warfare, thus creating new challenges for federal, state, and local law enforcement agencies. After reviewing the origin and nature of these challenges, this article will offer some suggestions for countering guerilla warfare in the United States.

  17. Advances in toxicology and medical treatment of chemical warfare nerve agents.

    Science.gov (United States)

    Moshiri, Mohammd; Darchini-Maragheh, Emadodin; Balali-Mood, Mahdi

    2012-11-28

    Organophosphorous (OP) Nerve agents (NAs) are known as the deadliest chemical warfare agents. They are divided into two classes of G and V agents. Most of them are liquid at room temperature. NAs chemical structures and mechanisms of actions are similar to OP pesticides, but their toxicities are higher than these compounds. The main mechanism of action is irreversible inhibition of Acetyl Choline Esterase (AChE) resulting in accumulation of toxic levels of acetylcholine (ACh) at the synaptic junctions and thus induces muscarinic and nicotinic receptors stimulation. However, other mechanisms have recently been described. Central nervous system (CNS) depression particularly on respiratory and vasomotor centers may induce respiratory failure and cardiac arrest. Intermediate syndrome after NAs exposure is less common than OP pesticides poisoning. There are four approaches to detect exposure to NAs in biological samples: (I) AChE activity measurement, (II) Determination of hydrolysis products in plasma and urine, (III) Fluoride reactivation of phosphylated binding sites and (IV) Mass spectrometric determination of cholinesterase adducts. The clinical manifestations are similar to OP pesticides poisoning, but with more severity and fatalities. The management should be started as soon as possible. The victims should immediately be removed from the field and treatment is commenced with auto-injector antidotes (atropine and oximes) such as MARK I kit. A 0.5% hypochlorite solution as well as novel products like M291 Resin kit, G117H and Phosphotriesterase isolated from soil bacterias, are now available for decontamination of NAs. Atropine and oximes are the well known antidotes that should be infused as clinically indicated. However, some new adjuvant and additional treatment such as magnesium sulfate, sodium bicarbonate, gacyclidine, benactyzine, tezampanel, hemoperfusion, antioxidants and bioscavengers have recently been used for OP NAs poisoning.

  18. Advances in toxicology and medical treatment of chemical warfare nerve agents

    Directory of Open Access Journals (Sweden)

    Moshiri Mohammd

    2012-11-01

    Full Text Available Abstract Organophosphorous (OP Nerve agents (NAs are known as the deadliest chemical warfare agents. They are divided into two classes of G and V agents. Most of them are liquid at room temperature. NAs chemical structures and mechanisms of actions are similar to OP pesticides, but their toxicities are higher than these compounds. The main mechanism of action is irreversible inhibition of Acetyl Choline Esterase (AChE resulting in accumulation of toxic levels of acetylcholine (ACh at the synaptic junctions and thus induces muscarinic and nicotinic receptors stimulation. However, other mechanisms have recently been described. Central nervous system (CNS depression particularly on respiratory and vasomotor centers may induce respiratory failure and cardiac arrest. Intermediate syndrome after NAs exposure is less common than OP pesticides poisoning. There are four approaches to detect exposure to NAs in biological samples: (I AChE activity measurement, (II Determination of hydrolysis products in plasma and urine, (III Fluoride reactivation of phosphylated binding sites and (IV Mass spectrometric determination of cholinesterase adducts. The clinical manifestations are similar to OP pesticides poisoning, but with more severity and fatalities. The management should be started as soon as possible. The victims should immediately be removed from the field and treatment is commenced with auto-injector antidotes (atropine and oximes such as MARK I kit. A 0.5% hypochlorite solution as well as novel products like M291 Resin kit, G117H and Phosphotriesterase isolated from soil bacterias, are now available for decontamination of NAs. Atropine and oximes are the well known antidotes that should be infused as clinically indicated. However, some new adjuvant and additional treatment such as magnesium sulfate, sodium bicarbonate, gacyclidine, benactyzine, tezampanel, hemoperfusion, antioxidants and bioscavengers have recently been used for OP NAs poisoning.

  19. Microbiological, biological, and chemical weapons of warfare and terrorism.

    Science.gov (United States)

    Greenfield, Ronald A; Brown, Brent R; Hutchins, James B; Iandolo, John J; Jackson, Rhett; Slater, Leonard N; Bronze, Michael S

    2002-06-01

    Microbiological, biological, and chemical toxins have been employed in warfare and in terrorist attacks. In this era, it is imperative that health care providers are familiar with illnesses caused by these agents. Botulinum toxin produces a descending flaccid paralysis. Staphylococcal enterotoxin B produces a syndrome of fever, nausea, and diarrhea and may produce a pulmonary syndrome if aerosolized. Clostridium perfringens epsilon-toxin could possibly be aerosolized to produce acute pulmonary edema. Ricin intoxication can manifest as gastrointestinal hemorrhage after ingestion, severe muscle necrosis after intramuscular injection, and acute pulmonary disease after inhalation. Nerve agents inhibit acetylcholinesterase and thus produce symptoms of increased cholinergic activity. Ammonia, chlorine, vinyl chloride, phosgene, sulfur dioxide, and nitrogen dioxide, tear gas, and zinc chloride primarily injure the upper respiratory tract and the lungs. Sulfur mustard (and nitrogen mustard) are vesicant and alkylating agents. Cyanide poisoning ranges from sudden-onset headache and drowsiness to severe hypoxemia, cardiovascular collapse, and death. Health care providers should be familiar with the medical consequences of toxin exposure, and understand the pathophysiology and management of resulting illness.

  20. Drone Warfare: Twenty-First Century Empire and Communications

    Directory of Open Access Journals (Sweden)

    Kevin Howley

    2017-02-01

    Full Text Available This paper, part of a larger project that examines drones from a social-construction of technology perspective, considers drone warfare in light of Harold Innis’s seminal work on empire and communication. Leveraging leading-edge aeronautics with advanced optics, data processing, and networked communication, drones represent an archetypal “space-biased” technology. Indeed, by allowing remote operators and others to monitor, select, and strike targets from half a world away, and in real-time, these weapon systems epitomize the “pernicious neglect of time” Innis sought to identify and remedy in his later writing. With Innis’s time-space dialectic as a starting point, then, the paper considers drones in light of a longstanding paradox of American culture: the impulse to collapse the geographical distance between the United States and other parts of the globe, while simultaneously magnifying the cultural difference between Americans and other peoples and societies. In the midst of the worldwide proliferation of drones, this quintessentially sublime technology embodies this (disconnect in important, profound, and ominous ways.

  1. Lessons learned from the former Soviet biological warfare program

    Science.gov (United States)

    Anderson, Debra A.

    The purpose of this doctoral project was to develop the most credible educational tool openly available to enhance the understanding and the application of biological weapons threat analysis. The theory governing the effectiveness of biological weapons was integrated from publications, lectures, and seminars primarily provided by Kenneth Alibek and William C. Patrick III, the world's foremost authorities on the topic. Both experts validated the accuracy of the theory compiled from their work and provided forewords. An exercise requiring analysis of four national intelligence estimates of the former Soviet biological warfare program was included in the form of educational case studies to enhance retention, experience, and confidence by providing a platform against which the reader can apply the newly learned theory. After studying the chapters on BW theory, the reader can compare his/her analysis of the national intelligence estimates against the analysis provided in the case studies by this researcher. This training aid will be a valuable tool for all who are concerned with the threat posed by biological weapons and are therefore seeking the most reliable source of information in order to better understand the true nature of the threat.

  2. Back to the future: aerial warfare in Libya

    Directory of Open Access Journals (Sweden)

    João Paulo Nunes Vicente

    2013-05-01

    Full Text Available A century after the first air bomb mission, a new intervention in the same geographic space has made evident the changes in Airpower. The Aerial Warfare in Libya has radically changed the civil war, complying with a UN mission to protect Libyan population, imposing a no-fly zone and an arms embargo. Therefore, Operation Unified Protector became one of the most successful campaigns in the history of NATO. We aim to assess the operational efficiency of Airpower in the conflict in Libya, focusing on the challenges of a War essentially Aerial. Despite the military results and the fact that some political objectives were met, we can identify some concerning trends that, if not shifted, may negatively influence future NATO operations. We do not aim to draw general and universal conclusions on the strategic value of Airpower based on the analysis of a specific case. Above all, we focus on identifying some lessons which have influenced OUP operational efficiency. Thus, we must analyze some factors, such as the scope of objectives, the type of opposing action and aerial strategy used by the coalition and then focus on the challenges arising from the OUP.

  3. The enemy as animal: Symmetric dehumanization during asymmetric warfare.

    Directory of Open Access Journals (Sweden)

    Emile Bruneau

    Full Text Available Historically, dehumanization has enabled members of advantaged groups to 'morally disengage' from disadvantaged group suffering, thereby facilitating acts of intergroup aggression such as colonization, slavery and genocide. But is blatant dehumanization exclusive to those at the top 'looking down', or might disadvantaged groups similarly dehumanize those who dominate them? We examined this question in the context of intergroup warfare in which the disadvantaged group shoulders a disproportionate share of casualties and may be especially likely to question the humanity of the advantaged group. Specifically, we assessed blatant dehumanization in the context of stark asymmetric conflict between Israelis (Study 1; N = 521 and Palestinians (Study 2; N = 354 during the 2014 Gaza war. We observed that (a community samples of Israelis and Palestinians expressed extreme (and comparable levels of blatant dehumanization, (b blatant dehumanization was uniquely associated with outcomes related to outgroup hostility for both groups, even after accounting for political ideologies known to strongly predict outgroup aggression, and (c the strength of association between blatant dehumanization and outcomes was similar across both groups. This study illuminates the striking potency and symmetry of blatant dehumanization among those on both sides of an active asymmetric conflict.

  4. The United States and biological warfare: secrets from the early cold war and Korea.

    Science.gov (United States)

    Bruwer, A

    2001-01-01

    The United States and Biological Warfare is about accusations that the United States resorted to bacteriological warfare at a time of great military stress during the Korean War. In December 1951, the then US Secretary of Defense ordered early readiness for offensive use of biological weapons. Soon afterwards, the North Korean and Chinese armies accused the United States of starting a large-scale biological warfare experiment in Korea. The US State Department denied the accusation. Both parties to the dispute maintain their positions today. The authors spent 20 years researching the accusations in North America, Europe and Japan. They were the first foreigners to be given access to Chinese classified documents. The reader is also introduced to the concept of 'plausible denial', an official US policy which allowed responsible governmental representatives to deny knowledge of certain events. The authors hope that their work will contribute to the understanding of a time when modern war expanded into a new type of violence.

  5. SiGe-based re-engineering of electronic warfare subsystems

    CERN Document Server

    Lambrechts, Wynand

    2017-01-01

    This book equips readers with a thorough understanding of the applicability of new-generation silicon-germanium (SiGe) electronic subsystems for the military purposes of electronic warfare and defensive countermeasures. The theoretical and technical background is extensively explained and all aspects of the integration of SiGe as an enabling technology for maritime, land, and airborne (including space) electronic warfare are addressed, including research, design, development, and implementation. The coverage is supported by mathematical derivations, informative illustrations, practical examples, and case studies. While SiGe technology provides speed, performance, and price advantages in many markets, sharing of information on its use in electronic warfare systems has to date been limited, especially in developing nations. This book will therefore be warmly welcomed as an engineering guideline that focuses especially on the speed and reliability of current-generation SiGe circuits and highlights emerging innov...

  6. Fear as a medium of communication in asymmetric forms of warfare

    DEFF Research Database (Denmark)

    Harste, Gorm

    2011-01-01

    of fear evolves in asymmetric warfare. Asymmetric war induces fear in both parties, but in a communicative form that leads to very different experiences of fear. Fear is observed and analysed with Niklas Luhmann’s theory of self-referential systems of communication and well as his theory of risk......Fear is defined as the distinction between risk and danger, a distinction that operates in communicative forms. War is always also warfare about the form of war. The article describes how fear in warfare becomes a symbolically generalized medium of communication, mainly focusing on how the form....... Following Luhmann and in continuation of Clausewitz’ conceptual tools, yet with other means, the article proposes to observe war as a system that can de-ontologize itself and thereby concern moving centres of gravity such as communication lines, motivation, public fear as well as perceptions of risk...

  7. An evolutionary theory of large-scale human warfare: Group-structured cultural selection.

    Science.gov (United States)

    Zefferman, Matthew R; Mathew, Sarah

    2015-01-01

    When humans wage war, it is not unusual for battlefields to be strewn with dead warriors. These warriors typically were men in their reproductive prime who, had they not died in battle, might have gone on to father more children. Typically, they are also genetically unrelated to one another. We know of no other animal species in which reproductively capable, genetically unrelated individuals risk their lives in this manner. Because the immense private costs borne by individual warriors create benefits that are shared widely by others in their group, warfare is a stark evolutionary puzzle that is difficult to explain. Although several scholars have posited models of the evolution of human warfare, these models do not adequately explain how humans solve the problem of collective action in warfare at the evolutionarily novel scale of hundreds of genetically unrelated individuals. We propose that group-structured cultural selection explains this phenomenon. © 2015 Wiley Periodicals, Inc.

  8. THE CYBER DIMENSION OF MODERN HYBRID WARFARE AND ITS RELEVANCE FOR NATO

    Directory of Open Access Journals (Sweden)

    Sorin DUCARU

    2016-06-01

    Full Text Available The technological development and the instant communication possibilities advanced not only economic and social developments, but also evolving threats from those who exploit the vulnerabilities of communication and information systems. The cyber threat landscape points to a significant increase of the frequency, intensity, duration and sophistication of cyber-attacks. One of the new and concerning trends is the use of cyber capabilities in relation with military of hybrid operations – the so-called cyber dimension of hybrid warfare. NATO’s strategy on countering hybrid warfare is based on the triad: prepare-deter-defend, which also applies to cyber. Nations represent the first line of defence in countering hybrid strategies. International cooperation is also a key factor in this sense. It is in this context that NATO’s response to cyber-attacks in the context of hybrid warfare must be further refined.

  9. Particle Swarm Social Adaptive Model for Multi-Agent Based Insurgency Warfare Simulation

    Energy Technology Data Exchange (ETDEWEB)

    Cui, Xiaohui [ORNL; Potok, Thomas E [ORNL

    2009-12-01

    To better understand insurgent activities and asymmetric warfare, a social adaptive model for modeling multiple insurgent groups attacking multiple military and civilian targets is proposed and investigated. This report presents a pilot study using the particle swarm modeling, a widely used non-linear optimal tool to model the emergence of insurgency campaign. The objective of this research is to apply the particle swarm metaphor as a model of insurgent social adaptation for the dynamically changing environment and to provide insight and understanding of insurgency warfare. Our results show that unified leadership, strategic planning, and effective communication between insurgent groups are not the necessary requirements for insurgents to efficiently attain their objective.

  10. Electronic Warfare M-on-N Digital Simulation Logging Requirements and HDF5: A Preliminary Analysis

    Science.gov (United States)

    2017-04-12

    beamwidth  entity, sensor  entity, time, mode  entity, time, x, y, z  entity, time,  image   After processing the logging stream the tables will have...E. Jarvis Electronic Warfare M-on-N Digital Simulation Logging Requirements and HDF5: A Preliminary Analysis Advanced Techniques Branch Tactical...12-04-2017 NRL Memorandum Report Electronic Warfare M-on-N Digital Simulation Logging Requirements and HDF5: A Preliminary Analysis Donald E

  11. Efikasnost sistema PVO u uslovima elektronskih dejstava / Efficiency of antiaircraft system in electronic warfare

    Directory of Open Access Journals (Sweden)

    Vladimir V. Šepec

    2007-01-01

    Full Text Available U radu je primenjena teorija masovnog opsluživanja u analizi efikasnosti sistema protivvazduhoplovne odbrane (sistema PVO u uslovima elektronskih dejstava protivnika. Prikazan je model za ocenu efikasnosti sistema PVO i predstavljeni su izrazi za procenu efikasnosti sistema PVO u uslovima elektronskih dejstava. / In this article the theory of mass servicing is used in the analysis of efficiency of antiaircraft system in the conditions of electronic warfare. The model for analysis of the antiaircraft system efficiency has been shown and formulas for qualitative analysis of antiaircraft system efficiency have been presented in the conditions of electronic warfare.

  12. The history and threat of biological warfare and terrorism.

    Science.gov (United States)

    Noah, Donald L; Huebner, Kermit D; Darling, Robert G; Waeckerle, Joseph F

    2002-05-01

    The inevitable conclusion is that the availability of biological warfare agents and supporting technologic infrastructure, coupled with the fact that there are many people motivated to do harm to the United States, means that America must be prepared to defend her homeland against biological agents. Some have argued to the contrary, that the threat and risks from a biological weapon attack are not to be considered serious, because [39]: They've not been used yet on a large scale so they probably won't be in the near future. Their use is so morally repugnant that they probably won't be used at all. The technologic hurdles associated with isolating, growing, purifying, weaponizing, and disseminating adequate quantities of pathologic agents are so high that only the most advanced laboratories could attempt the process. Similar to a 'nuclear winter,' the aftermath of a biological attack is so unthinkable that none would attempt it. Unfortunately, the trends associated with biotechnology globalization, terrorist group dynamics, and global/regional politics render these beliefs untenable and inappropriate, as recent events have underscored. To that end, the United States has accelerated its program of defense against biological weapons, as it must. Biological weapons are such dreadful weapons of uniqueness and complexity that a specific defense strategy is paramount. Elements of this program include pharmaceutical stockpiles, heightened surveillance systems, energized vaccine development programs, and comprehensive training initiatives. Although the depth and breadth of these efforts are unprecedented, above all these efforts is the absolute necessity for medical and public health care professionals to be educated and actively involved. These professionals are the sine qua non of future defensive readiness. This is just the start; unfortunately, there is no end yet in sight.

  13. An Empirical Examination of the Warfare Metaphor with Respect to Pre-Service Elementary Teachers

    Science.gov (United States)

    Cobern, William W.; Loving, Cathleen C.; Davis, Edward B.; Terpstra, Jeff

    2013-01-01

    Since its origination in the late nineteenth century, the warfare metaphor has been used to characterize the relationship between science and religion, especially orthodox Christianity. Though thoroughly discredited by historians of science, the ideological descendants of Thomas Huxley, who spoke of science in quasi-religious terms, have kept the…

  14. Diagnosis of exposure to chemical warfare agents: An essential tool to counteract chemical terrorism

    NARCIS (Netherlands)

    Noort, D.; Schans, M.J. van der; Bikker, F.J.; Benschop, H.P.

    2009-01-01

    Methods to analyze chemical warfare agents (CW-agents) and their decomposition products in environmental samples were developed over the last decades. In contrast herewith, procedures for analysis in biological samples have only recently been developed. Retrospective detection of exposure to

  15. A statistical analysis of the effect of warfare on the human secondary sex ratio

    NARCIS (Netherlands)

    Graffelman, J.; Hoekstra, R.F.

    2000-01-01

    Many factors have been hypothesized to affect the human secondary sex ratio (the annual percentage of males among all live births), among them race, parental ages, and birth order. Some authors have even proposed warfare as a factor influencing live birth sex ratios. The hypothesis that during and

  16. A Proficiency-Based Cost Estimate of Surface Warfare Officer On-the-Job Training

    Science.gov (United States)

    2011-12-01

    for “better schooling, and a surface warfare pin equivalent to the dolphins worn by submariners or the wings by the aviators” (Robinson, 2008...Historical Perspective from World War II to 2008. Fort Leavenworth: U.S. Army Command and General Staff College. Rocci, R. (2003). A Cognitive and

  17. (Review of) Reno, William. 2011. Warfare in Independent Africa. Cambridge: Cambridge University Press

    DEFF Research Database (Denmark)

    Hagmann, Tobias

    2013-01-01

    Warfare in Independent Africa is Reno’s bold attempt to analyze the modern history of African insurgencies. The book tackles this task through the prism of five generations of rebel, which left their mark on the continent; anti-colonial rebels, majority rule rebels, reform rebels, warlord rebels...

  18. Electronic Warfare: Rethinking the Importance of Its Role In Military Operations

    Science.gov (United States)

    2016-06-10

    mindset devalues EW, and how its effect on EW employment will negatively impact control of the information domain. Before discussing IO, EW, JEMSO...electronic warfare support (ES). Electronic attack utilizes the radiation or re- radiation of electromagnetic energy, directed energy, electromagnetic ... electromagnetic energy, directed energy, or anti- radiation weapons to attack enemy personnel or facilities in order to degrade or destroy his

  19. The influence of the Ratel infantry fighting vehicle on mobile warfare ...

    African Journals Online (AJOL)

    This article traces the story of how the author and a number of daring young commanders and soldiers had cast aside military textbooks in developing their own military doctrine for mobile warfare, South African style. It is clear that the Ratel infantry fighting vehicle had wielded huge influence on the development and ...

  20. French Ground Force Organizational Development for Counterrevolutionary Warfare between 1945 and 1962

    Science.gov (United States)

    2005-06-17

    the major counterinsurgent wars in Indochina and Algeria. The first facet of study is the French experience and organizational development up to the... organizational development in Algeria is studied as the penultimate example of the French model. Derived from previous colonial warfare experience

  1. Military medicine and the ethics of war: British colonial warfare during the Seven Years War (1756-63).

    Science.gov (United States)

    Charters, Erica

    2010-01-01

    This article examines 18th-century European warfare, tracing the first formal codifications of conventions of war, frequently introduced by military physicians and initially regarding the treatment of the sick and wounded. It outlines to what extent these conventions were followed in practice, particularly in the challenging environment of American irregular warfare, with a focus on the most well-known incident of "biological warfare" in the period: the deliberate spread of smallpox by British officers among Amerindians in 1763. More broadly, it demonstrates that the history of military medicine provides a fruitful method with which to uncover assumptions about the ethics of war.

  2. An Initial Critical Summary of Models for Predicting the Attenuation of Radio Waves by Trees

    Science.gov (United States)

    1982-07-01

    iiI UNCLASSIFIED SECURITY CLAISIPICAY10h OIP THIS PAGE tMhet Dot & Enlerfii)________________ REPORT DOCUMENTATION PAGE PAo ISTRUCTNS 1. REPORT NUMUER 2...SURFACE WEAPONS CENTER DAHLGREN LABORATORY DAHLGREN, VA 22448 DR. DAVID DEUCE , CODE 34 NAVAL UNDERWATER SYSTEMS CENTER NNM LONDON LABORATORY NEW LONDON

  3. Evolution of war and cyber attacks in the concept of conventional warfare

    Directory of Open Access Journals (Sweden)

    Huseyin Kuru

    2018-01-01

    Full Text Available Humanity have witnessed many confrontations of states whose interests challenge at some points and their struggle to neutralize problems in battlefield. While war was perceived as a way of eliminating deadlocks for some parties, some considered it as one of the international policy materials. The definition and content of conventional warfare have been subject to change for centuries, while the new weapons and technologies have been developed by human beings that it has brought constant change in the law of war and at the same time more lethal and devastating consequences. The struggle for superiority in international relations played an impulsive role in the development of weapons used in the battlefield. Countries have used their labor and financial resources to improve their military skills. Beginning with stones and sticks in the battlefield, this struggle has reached the point of using the next generation satellite controlled unmanned and armed aircrafts and having nuclear weapons has become more deterrent than using them. The struggle between strong countries and the limited countries in terms of technology and armed groups that do not have enough technology and skills completely changed the definition of conventional warfare. This fight has led Asymmetric warfare born which can turn commercial airline planes full of innocent people into a weapon like September-11 attacks. In this study, the historical development and the change in the content of the warfare were briefly explained and then cyber-attacks in the concept of the fourth generation warfare was analyzed taking into account of prominent attacks.

  4. Dynamics of positional warfare malaria: Finland and Korea compared.

    Science.gov (United States)

    Huldén, Lena; Huldén, Larry

    2008-09-08

    A sudden outbreak of vivax malaria among Finnish troops in SE-Finland and along the front line in Hanko peninsula in the southwest occurred in 1941 during World War II. The common explanation has been an invasion of infective Anopheles mosquitoes from the Russian troops crossing the front line between Finland and Soviet Union. A revised explanation is presented based on recent studies of Finnish malaria. The exact start of the epidemic and the phenology of malaria cases among the Finnish soldiers were reanalyzed. The results were compared with the declining malaria in Finland. A comparison with a corresponding situation starting in the 1990's in Korea was performed. The malaria cases occurred in July in 1941 when it was by far too early for infective mosquitoes to be present. The first Anopheles mosquitoes hatched at about the same time as the first malaria cases were observed among the Finnish soldiers. It takes about 3-6 weeks for the completion of the sporogony in Finland. The new explanation is that soldiers in war conditions were suddenly exposed to uninfected mosquitoes and those who still were carriers of hypnozoites developed relapses triggered by these mosquitoes. It is estimated that about 0.5% of the Finnish population still were carriers of hypnozoites in the 1940's. A corresponding outbreak of vivax malaria in Korea in the 1990's is similarly interpreted as relapses from activated hypnozoites among Korean soldiers. The significance of the mosquito induced relapses is emphasized by two benefits for the Plasmodium. There is a synchronous increase of gametocytes when new mosquitoes emerge. It also enables meiotic recombination between different strains of the Plasmodium. The malaria peak during the positional warfare in the 1940's was a short outbreak during the last phase of declining indigenous malaria in Finland. The activation of hypnozoites among a large number of soldiers and subsequent medication contributed to diminishing the reservoir of malaria

  5. Dynamics of positional warfare malaria: Finland and Korea compared

    Directory of Open Access Journals (Sweden)

    Huldén Larry

    2008-09-01

    Full Text Available Abstract Background A sudden outbreak of vivax malaria among Finnish troops in SE-Finland and along the front line in Hanko peninsula in the southwest occurred in 1941 during World War II. The common explanation has been an invasion of infective Anopheles mosquitoes from the Russian troops crossing the front line between Finland and Soviet Union. A revised explanation is presented based on recent studies of Finnish malaria. Methods The exact start of the epidemic and the phenology of malaria cases among the Finnish soldiers were reanalyzed. The results were compared with the declining malaria in Finland. A comparison with a corresponding situation starting in the 1990's in Korea was performed. Results and discussion The malaria cases occurred in July in 1941 when it was by far too early for infective mosquitoes to be present. The first Anopheles mosquitoes hatched at about the same time as the first malaria cases were observed among the Finnish soldiers. It takes about 3 – 6 weeks for the completion of the sporogony in Finland. The new explanation is that soldiers in war conditions were suddenly exposed to uninfected mosquitoes and those who still were carriers of hypnozoites developed relapses triggered by these mosquitoes. It is estimated that about 0.5% of the Finnish population still were carriers of hypnozoites in the 1940's. A corresponding outbreak of vivax malaria in Korea in the 1990's is similarly interpreted as relapses from activated hypnozoites among Korean soldiers. The significance of the mosquito induced relapses is emphasized by two benefits for the Plasmodium. There is a synchronous increase of gametocytes when new mosquitoes emerge. It also enables meiotic recombination between different strains of the Plasmodium. Conclusion The malaria peak during the positional warfare in the 1940's was a short outbreak during the last phase of declining indigenous malaria in Finland. The activation of hypnozoites among a large number of

  6. How Agent Based Models can be Utilized to Explore and Exploit Non-Linearity and Intangibles Inherent in Guerrilla Warfare

    National Research Council Canada - National Science Library

    Ipekci, Arif

    2002-01-01

    ...) to explore non-linearity and intangibles inherent in guerrilla warfare. An infiltration scenario is developed based on the author's experiences fighting guerrillas in the mountains of Southeast Turkey...

  7. Developmental Toxic Effects of Exposure to Chemical Warfare Nerve Agents in Rats: Effects on Brain and Behavior

    Science.gov (United States)

    2015-03-01

    Yourick D (2009) Analyzing large data sets acquired through telemetry from rats exposed to organophosphorus compounds: an EEG study. J Neurosci Methods...AWARD NUMBER: W81XWH-13-2-0082 TITLE: Developmental Toxic Effects of Exposure to Chemical Warfare Nerve Agents in Rats : Effects on Brain and...2014 4. TITLE AND SUBTITLE 5a. CONTRACT NUMBER Developmental Toxic Effects of Exposure to Chemical Warfare Nerve Agents in Rats : Effects on Brain

  8. Sources of Occupational Stress and Prevalence of Burnout and Clinical Distress Among U.S. Air Force Cyber Warfare Operators

    Science.gov (United States)

    2013-01-01

    AFRL-SA-WP-TR-2013-0006 Sources of Occupational Stress and Prevalence of Burnout and Clinical Distress Among U.S. Air Force Cyber Warfare... Burnout and Clinical Distress Among U.S. Air Force Cyber Warfare Operators 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER 6...the prevalence of occupational burnout and clinical distress among this critical workforce. The purpose of this study is to identify the main

  9. Lithium Ion Testing at NSWC Crane in Support of NASA Goddard Space Flight Center

    Science.gov (United States)

    Brown, Harry; Jung, David; Lee, Leonine

    2010-01-01

    This viewgraph presentation reviews Lithium Ion Cell testing at the Naval Surface Warfare Center in Crane, India. The contents include: 1) Quallion 15 Ahr Lithium-Ion Cells, LEO Life Cycle Test; 2) Lithion 50 Ahr Lithium-Ion Cells, LEO Life Cycle Test; 3) ABSL 5 Ahr Lithium-Ion Battery, LRO-LLO Life Cycle Test, SDO-GEO Life Cycle Test; and 4) A123 40 Ahr Lithium-Ion Battery, GPM Life Cycle Test, MMS Life Cycle Test.

  10. The Value of Field Fortifications in Modern Warfare, Volume 1

    Science.gov (United States)

    1979-12-01

    for OPS, Nuc Plans 4cy ATTN: TITL ATTN. US Doc Ofc for Intel Defense Technical Information Center Under Secretary of Defense for Policy 12 cyATTN: DO...Intelligence Agency BOM Corp ATTN: Tech Library ATTN: Corporate Library ATTN: M. Ellis Federal Emergency Manegement Agency Office of Research/NPP BDM Corp...JAYCOR Pan Technics, Inc ATTN: S. Brucker ATTN: L. Lennon John Morse R&D Associates ATTN: J. Morse ATTN: P. Haas ATTN: Technical Information Center Kamen

  11. Determination of scattering center of multipath signals using geometric optics and Fresnel zone concepts

    Directory of Open Access Journals (Sweden)

    Kamil Yavuz Kapusuz

    2014-06-01

    Full Text Available In this study, a method for determining scattering center (or center of scattering points of a multipath is proposed, provided that the direction of arrival of the multipath is known by the receiver. The method is based on classical electromagnetic wave principles in order to determine scattering center over irregular terrain. Geometrical optics (GO along with Fresnel zone concept is employed, as the receiver, the transmitter positions and irregular terrain data are assumed to be provided. The proposed method could be used at UHF bands, especially, operations of radars and electronic warfare applications.

  12. New studies disputing allegations of bacteriological warfare during the Korean War.

    Science.gov (United States)

    Rolicka, M

    1995-03-01

    In the television series Korea the Unknown War produced jointly by Thames Television (London) and WGBH (Boston) in 1990, General Matthew Ridgway, Commander in Chief of United Nations forces during the Korean War, called the accusations that the United States waged bacteriological warfare "black propaganda." The charges discredited the United States and, despite denials and many international discussions, have not been completely refuted until new. Following studies in archives previously not available for research and after uncovering new sources, many specific examples of black propaganda were discovered that contained false information and lies discrediting the United States. The mechanism of lies, which convinced the Korean population that bacteriological warfare was going on and that the only way not to become victims of the United States' inhuman cruelty was to fight, are shown in this paper.

  13. MOFwich: Sandwiched Metal-Organic Framework-Containing Mixed Matrix Composites for Chemical Warfare Agent Removal.

    Science.gov (United States)

    Peterson, Gregory W; Lu, Annie X; Hall, Morgan G; Browe, Matthew A; Tovar, Trenton; Epps, Thomas H

    2018-02-13

    This work describes a new strategy for fabricating mixed matrix composites containing layered metal-organic framework (MOF)/polymer films as functional barriers for chemical warfare agent protection. Through the use of mechanically robust polymers as the top and bottom encasing layers, a high-MOF-loading, high-performance-core layer can be sandwiched within. We term this multifunctional composite "MOFwich". We found that the use of elastomeric encasing layers enabled core layer reformation after breakage, an important feature for composites and membranes alike. The incorporation of MOFs into the core layer led to enhanced removal of chemical warfare agents while simultaneously promoting moisture vapor transport through the composite, showcasing the promise of these composites for protection applications.

  14. The Military-Entertainment Complex: A New Facet of Information Warfare

    Directory of Open Access Journals (Sweden)

    Adam Muir

    2003-01-01

    Full Text Available The second Gulf War will become synonymous with the emergence of fully-fledged information warfare where the military-entertainment complex has so influenced strategic and logistic possibilities that it becomes apparent that the war was waged as entertainment. This is entertainment not as an amusement or diversion but utilising the techniques and tropes of the burgeoning entertainment industry as a means to achieve military objectives. This paper offers a short history of the military-entertainment complex as reality and simulation become fused in the practices of the US military machine. The paper then briefly explores three central aspects of this phenomenon evident in recent developments: the military function of computer games; the role of the Hollywood scenario and the blurring between news and reality TV. Finally the suggestion is made that subverting, co-opting and reconstructing the military-entertainment complex provides new possibilities for alternative strategies of information warfare.

  15. Clinical recognition and management of patients exposed to biological warfare agents.

    Science.gov (United States)

    Franz, D R; Jahrling, P B; Friedlander, A M; McClain, D J; Hoover, D L; Bryne, W R; Pavlin, J A; Christopher, G W; Eitzen, E M

    1997-08-06

    Concern regarding the use of biological agents--bacteria, viruses, or toxins--as tools of warfare or terrorism has led to measures to deter their use or, failing that, to deal with the consequences. Unlike chemical agents, which typically lead to violent disease syndromes within minutes at the site of exposure, diseases resulting from biological agents have incubation periods of days. Therefore, rather than a paramedic, it will likely be a physician who is first faced with evidence of the results of a biological attack. We provide here a primer on 10 classic biological warfare agents to increase the likelihood of their being considered in a differential diagnosis. Although the resultant diseases are rarely seen in many countries today, accepted diagnostic and epidemiologic principles apply; if the cause is identified quickly, appropriate therapy can be initiated and the impact of a terrorist attack greatly reduced.

  16. How Power-Laws Re-Write The Rules Of Cyber Warfare

    Directory of Open Access Journals (Sweden)

    David L. Bibighaus

    2015-12-01

    Full Text Available All warfare contains and element of randomness. This article will argue that, the kind uncertainty encountered in cyber warfare (Power-Law randomness is fundamentally different from the uncertainty the military has evolved to deal with in the physical world (Gaussian-Randomness. The article will explain the difference between these two kinds of randomness, and how cyber weapons appear to operate under Power-Law randomness. It then will show how in cyberspace, key aspects of strategic thought are based on a flaws assumption of randomness. Finally, this article shall argue that if the American military is going to be effective in cyberspace, it must re-examine the way the military assumes risk, recruits is forces, plans for war and maintains the peace.

  17. The Three Warfares: PLA Soft Power Aspirations Along the Cognitive Dimension

    Science.gov (United States)

    2011-06-01

    Michael Pillsbury, "Strategic Acupuncture ," Foreign Policy, no. 41 (1980), 53. 43 Blasko, The Chinese Army Today: Tradition and Transformation for the...2002), 60. 59 Pillsbury, Strategic Acupuncture , 57–58. 60 Ibid., 54. 61 Ibid., 54. 62 Shambaugh, Modernizing China’s Military: Progress... efficiency of the whole operational system” of warfare would help prevent the PRC from being in a similar disadvantageous position in a future

  18. Hybrid Warfare Dilemmas in the Middle Colonies during the American Revolution

    Science.gov (United States)

    2017-05-25

    Hybrid Warfare Dilemmas in the Middle Colonies during the American Revolution A Monograph by MAJ William C. Murray II US Army...in the Middle Colonies during the American Revolution 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER 6. AUTHOR(S) MAJ ...OF RESPONSIBLE PERSON MAJ William C. Murray a. REPORT b. ABSTRACT c. THIS PAGE 19b. PHONE NUMBER (include area code) (U) (U) (U) (U) 43 Standard

  19. Toward a Theory of Hybrid Warfare: The Russian Conduct of War During Peace

    Science.gov (United States)

    2015-12-01

    Warfare CIS Commonwealth of Independent States DDOS Distributed Denial of Service DIME-FIL Diplomacy, Information, Military, Economics, Finance...for over a week, Estonian government and financial institutions were subjected to a wave of distributed denial of service ( DDoS ) attacks, supposedly...Using a now familiar mix of non-attributable government cyber security organizations and independent hackers, Russia conducted botnet and DDoS attacks

  20. Integrated Non-kinetic Operations: The Frontier of Warfare in Search of Doctrine

    Science.gov (United States)

    2010-06-01

    as Operation GLADIATOR PHOENIX, the operation to operate in and defend the global information grid (GIG), for introducing new strategies to confront...information technology’s vulnerabilities. Thanks to the emphasis of non-kinetic warfare in Operation GLADIATOR PHOENIX, the Navy has outlined a...army has also embraced the benefits of Operation GLADIATOR PHOENIX and the establishment of a unified command dedicated to cyberspace. General

  1. Deterrence in the Human Domain: A COIN Framework to Deterring Unconventional Warfare in Shaping Operations

    Science.gov (United States)

    2017-05-25

    problems of conflicts that impact the human domain, focusing largely on government-to-government relations or shaping military operational conditions .35...Deterrence in the Human Domain: A COIN Framework to Deterring Unconventional Warfare in Shaping Operations A Monograph by MAJ Matthew P...YYYY) 05-25-2017 2. REPORT TYPE Master’s Thesis 3. DATES COVERED (From - To) JUN 2016 – MAY 2017 4. TITLE AND SUBTITLE Deterrence in the Human

  2. [War and medicine in a culture of peace. 3. Synopsis of chemical warfare agents].

    Science.gov (United States)

    Piérard, G E

    2002-01-01

    A variety of chemical components can be used as warfare threats directly targeting humans. They can be classified according to their main biological effects as nerve agents, vesicants, lung damaging agents, cyanogen agents and incapacitants. Other chemical agents are water and food contaminants. Still other less aggressive compounds are mainly used to control riots. Smokes, flame materials and herbicides belong to other classes of chemical agents of the warlike armamentum exhibiting a direct effect on man.

  3. Lawfare and hybrid warfare-how Russia is using the law as a weapon

    OpenAIRE

    Mosquera, A.; Bachmann, Sascha-Dominik

    2015-01-01

    This short paper introduces the reader to the mutating military concept of hybrid warfare and one of its implementing methods, the use of law as a weapon. We aim to provide a current, comprehensive definition of the terms “hybrid warfare” and “lawfare”. This submission focuses on the following areas: where law has been/is being used as a method of war, namely the Jus ad bellum, the jus in bello and the law of treaties in international relations.

  4. Determination of Chemical Warfare Agents in Water Samples by Solid Phase Microextraction and GC-FID

    OpenAIRE

    Hussain, Fatima

    2007-01-01

    The Norwegian Defence Research Establishment (FFI) is presently developing a mobile laboratory for the identification of chemical warfare agents (CWA) and related compounds. The laboratory will be used in the field, and it is therefore advantageous that the analytical methods give a high priority to low solvent consumption and minimal need for sample preparation. Solid phase microextraction (SPME) meets these requirements, since the technique is based on automatic extraction and concentration...

  5. Equipping Network Warfare: Industrial-Era Bureaucracies for Information-Era Weapons

    Science.gov (United States)

    2009-04-01

    to operational shortfalls. Clearly, there are benefits in following known methods in organizing the cyberspace mission and its capabilities...sid26_gci853845,00.html (accessed 15 December 2008). 9 BX.com Terminology Reference, “Web Year,” http://www.bx.com/dictionary/ ecommerce /Web_year.cfm... benefits of the process, while amplifying the negative aspects of the bureaucracy. Network warfare capabilities are much more vulnerable to

  6. Heme-Containing Metal-Organic Frameworks for the Oxidative Degradation of Chemical Warfare Agents

    Science.gov (United States)

    2016-04-14

    coordinate cobaltous porphyrin site in a metal – organic framework: structural , EPR, and O, Inorg. Chem. Front., (04 2016): 536. doi: 10.1039...SECURITY CLASSIFICATION OF: This project sought to employ heme-containing metal - organic framework (MOF) materials to carry out the oxidative...15-Apr-2015 14-Jan-2016 Final Report: Heme-Containing Metal - Organic Frameworks for the Oxidative Degradation of Chemical Warfare Agents The views

  7. Acquisition streamlining efforts within the space and Naval Warfare Systems Command.

    OpenAIRE

    McKeever, Michelle Cecille

    1987-01-01

    Approved for public release; distribution is unlimited In 1986, Deputy Secretary of Defense W. H. Taft IV, established an "Acquisition Streamlining Initiative** (ASI) which addresses and attempts to "streamline" the acquisition process and mandated requirements. This research reviews efforts of one Hardware Systems Command—the Space and Naval Warfare Systems Command (SPAWAR) —to implement AS I . In reviewing the five major programs streamlined thus far at -SPAUAR, it w...

  8. Assessing the Role of Surgical Strike Operations in Support of a Special Warfare Campaign

    Science.gov (United States)

    2017-06-09

    Penguin Book, 2013), 161. 20 Eric T. Olson, “A Balanced Approach to Irregular Warfare,” The Journal of International Security Affairs (2009): 4-6...volatile Uruzgon district of Chora. The district of Chora is mainly composed of inhospitable desert and steep mountains . The majority of the... mountain passes. Again, SOTF-SE assisted through the employment of the 8th Commando Kandak to disrupt enemy forces through targeted raids and clearing

  9. Advances in toxicology and medical treatment of chemical warfare nerve agents

    OpenAIRE

    Moshiri, Mohammd; Darchini-Maragheh, Emadodin; Balali-Mood, Mahdi

    2012-01-01

    Abstract Organophosphorous (OP) Nerve agents (NAs) are known as the deadliest chemical warfare agents. They are divided into two classes of G and V agents. Most of them are liquid at room temperature. NAs chemical structures and mechanisms of actions are similar to OP pesticides, but their toxicities are higher than these compounds. The main mechanism of action is irreversible inhibition of Acetyl Choline Esterase (AChE) resulting in accumulation of toxic levels of acetylcholine (ACh) at the ...

  10. Air University Research Paper: Asymmetric Warfare - Exposing America’s Weaknesses

    Science.gov (United States)

    2003-04-01

    AU/ACSC/ 03-1261R/2003-04 AIR COMMAND AND STAFF COLLEGE AIR UNIVERSITY AIR UNIVERSITY RESEARCH PAPER ASYMMETRIC WARFARE - EXPOSING AMERICA’S...Air University Research Paper : Asymmetric Wafare - Exposing America’s Weaknesses 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER...Std Z39-18 Disclaimer The views expressed in this academic research paper are those of the author(s) and do not reflect the official policy or

  11. Aerospace Power in Urban Warfare: Beware the Hornet’s Nest

    Science.gov (United States)

    2001-05-01

    Board Task Force on Military Operations in Built-Up Areas ( MOBA )," (Washington, DC: Office of the Undersecretary of Defense for Acquisition and...Smithsonian Institute Press, 1999), 130. 45 Vick, et al., 120. 46 Rebecca A. Grant, "The Radar Game ," Air Force Magazine, February 1999, 52-60. Grant...University Press, 1962. Grant, Rebecca A. "The Radar Game ." Air Force Magazine, February 1999, 52-60. Hawkins, William R. Putting Urban Warfare in

  12. General George Crooks Development as a Practitioner of Irregular Warfare During the Indian Wars

    Science.gov (United States)

    2017-06-09

    SCIENCE Military History by NICHOLAS J. CRUZ, MAJOR, U.S. MARINE CORPS B.A., North Carolina Central University, Durham, North Carolina...interconnectivity the internet would soon provide, the impact of social media, the proliferation of unmanned aerial vehicle technology, and the...continue to prepare, train, and equip for large-scale peer or near-peer conventional warfare, the breadth of the republic’s history teaches that Irregular

  13. Development of Nanocrystalline Zeolite Materials for the Decontamination of Chemical Warfare Agents

    Science.gov (United States)

    2008-11-17

    intermediates. Bellamy also found that HD could be decontaminated by 13X zeolites .(10) These previous studies suggest that nanomaterials may have unique...REPORT Development of Nanocrystalline Zeolite Materials for the Decontamination of Chemical Warfare Agents 14. ABSTRACT 16. SECURITY CLASSIFICATION OF...The main objective of this research is to use novel nanocrystalline zeolite materials synthesized in our laboratories for the decontamination of

  14. Cyberspace as a Complex Adaptive System and the Policy and Operational Implications for Cyber Warfare

    Science.gov (United States)

    2014-05-22

    accessed 13 February 2014). 66Teresa Degenhard “Between War and Crime: The Overlap between War and Crime: Unpacking Foucault and Agamben’s Studies...Article-2-Revision- for- Foucault -and-Agamben-Degenhardt-July-2013.pdf (accessed 5 April 2014). 26... Foucault and Agamben’s Studies within the Context of the War on Terror.”, 34. 68US Department of Defense, Electronic Warfare, Joint Publication 3-13, I-2

  15. The Rollback of South Africa’s Chemical and Biological Warfare Program

    Science.gov (United States)

    2001-04-01

    chemical and biological warfare plant that received outside aid from South Africa. In assisting Rhodesia, South African researchers continued to...with South African involvement, planted anthrax spores in grain fed to cattle in guerrilla-held areas and caused an anthrax epidemic that struck...ricin and botulinum. Reportedly, they had acquired anthrax, Plague, cholera, E. coli, staph, necrotizing fasciitis , ricin, botulinum, gas gangrene, anti

  16. Destruction of chemical warfare surrogates using a portable atmospheric pressure plasma jet

    Science.gov (United States)

    Škoro, Nikola; Puač, Nevena; Živković, Suzana; Krstić-Milošević, Dijana; Cvelbar, Uroš; Malović, Gordana; Petrović, Zoran Lj.

    2018-01-01

    Today's reality is connected with mitigation of threats from the new chemical and biological warfare agents. A novel investigation of cold plasmas in contact with liquids presented in this paper demonstrated that the chemically reactive environment produced by atmospheric pressure plasma jet (APPJ) is potentially capable of rapid destruction of chemical warfare agents in a broad spectrum. The decontamination of three different chemical warfare agent surrogates dissolved in liquid is investigated by using an easily transportable APPJ. The jet is powered by a kHz signal source connected to a low-voltage DC source and with He as working gas. The detailed investigation of electrical properties is performed for various plasmas at different distances from the sample. The measurements of plasma properties in situ are supported by the optical spectrometry measurements, whereas the high performance liquid chromatography measurements before and after the treatment of aqueous solutions of Malathion, Fenitrothion and Dimethyl Methylphosphonate. These solutions are used to evaluate destruction and its efficiency for specific neural agent simulants. The particular removal rates are found to be from 56% up to 96% during 10 min treatment. The data obtained provide basis to evaluate APPJ's efficiency at different operating conditions. The presented results are promising and could be improved with different operating conditions and optimization of the decontamination process.

  17. Operational advantages of using Cyber Electronic Warfare (CEW) in the battlefield

    Science.gov (United States)

    Yasar, Nurgul; Yasar, Fatih M.; Topcu, Yucel

    2012-06-01

    While cyberspace is emerging as a new battlefield, conventional Electronic Warfare (EW) methods and applications are likely to change. Cyber Electronic Warfare (CEW) concept which merges cyberspace capabilities with traditional EW methods, is a new and enhanced form of the electronic attack. In this study, cyberspace domain of the battlefield is emphazised and the feasibility of integrating Cyber Warfare (CW) concept into EW measures is researched. The SWOT (Strengths, Weaknesses, Opportunities and Threats) analysis method is used to state the operational advantages of using CEW concept in the battlefield. The operational advantages of CEW are assessed by means of its effects on adversary air defense systems, communication networks and information systems. Outstanding technological and operational difficulties are pointed out as well. As a result, a comparison of CEW concept and conventional EW applications is presented. It is concluded that, utilization of CEW concept is feasible at the battlefield and it may yield important operational advantages. Even though the computers of developed military systems are less complex than normal computers, they are not subjected to cyber threats since they are closed systems. This concept intends to show that these closed systems are also open to the cyber threats. As a result of the SWOT analysis, CEW concept provides Air Forces to be used in cyber operations effectively. On the other hand, since its Collateral Damage Criteria (CDC) is low, the usage of cyber electronic attack systems seems to grow up.

  18. The Navy’s Educational Programs in Electronic Warfare,

    Science.gov (United States)

    1977-05-01

    Test & Evaluation 6 Training 8 Operational (Ship or A/C Sqdn). . 7 Operational (Staff or Support). . 48 Tota l 89 Grand Total: H + P/Q Billets 179 9...California 92055 31. Alfred B. Nejame , Training Director Naval Electronic Lab Center 271 Catalina Blvd - ~ San Diego , Californai 92152 32. William

  19. Initial Report of the Deans Cyber Warfare Ad Hoc Committee

    Science.gov (United States)

    2011-12-22

    16 III. Alignment with USNA 2020 Vision, Graduate Attributes and USNA Strategic Imperatives The Naval Academy continually adapts its academic...Articulate. Effective communicators. • Adaptable . Adaptable individuals who understand and appreciate global and cross-cultural dynamics...organization of guest speakers/lecturers, student extra curricular activities)? Under what organization is your center run (CS-Department, Dean

  20. Improved Anti-Submarine Warfare (ASW) Effectiveness MSSE Capstone Project

    Science.gov (United States)

    2008-06-01

    costumer consider a course of action that includes pursuit of both the Barrier capability and the Advance Capabilities Build solution. The team...Apr 2008 from http://mae.pennnet.com/ articles /article_display.cfm?article_id=280765 [47] Defense Technical Information Center (DTIC), OSD RDT&E

  1. The Further Integration of the Intelligence and Surface Warfare Communities

    Science.gov (United States)

    2012-05-03

    professionals into a position to influence the outcome of the war. However, this demand for quality intelligence products came at a price , and in WWII...that price was manpower. The Intelligence center in Hawaii grew from just 126 personnel at the beginning of WWII to 1,767 at war’s end. 14...use intelligence as filler to establish the scene setter for the next evaluated evolution. Conclusions and Recommendations Command and control

  2. International humanitarian law applied to cyber-warfare: Precautions, proportionality and the notion of ‘attack’ under the humanitarian law of armed conflict

    NARCIS (Netherlands)

    Gill, T.D.; Tsagourias, N.; Buchan, R.

    2015-01-01

    This chapter examines the application of international humanitarian law to cyber warfare in the sense of rising to the level of an armed conflict. Building upon the work of the Tallinn Manual on the Application of International Law to Cyber Warfare, it places particular emphasis on the application

  3. Ultrawideband synthetic vision sensor for airborne wire detection

    Science.gov (United States)

    Fontana, Robert J.; Larrick, J. F.; Cade, Jeffrey E.; Rivers, Eugene P., Jr.

    1998-07-01

    A low cost, miniature ultra wideband (UWB) radar has demonstrated the ability to detect suspended wires and other small obstacles at distances exceeding several hundred feet using an average output power of less than 10 microwatts. Originally developed as a high precision UWB radar altimeter for the Navy's Program Executive Office for Unmanned Aerial Vehicles and Cruise Missiles, an improved sensitivity version was recently developed for the Naval Surface Warfare Center (NSWC Dahlgren Division) as part of the Marine Corps Warfighting Laboratory's Hummingbird program for rotary wing platforms. Utilizing a short pulse waveform of approximately 2.5 nanoseconds in duration, the receiver processor exploits the leading edge of the radar return pulse to achieve range resolutions of less than one foot. The resultant 400 MHz bandwidth spectrum produces both a broad frequency excitation for enhanced detection, as well as a low probability of intercept and detection (LPI/D) signature for covert applications. This paper describes the design and development of the ultra wideband sensor, as well as performance results achieved during field testing at NSWC's Dahlgren, VA facility. These results are compared with those achieved with a high resolution EHF radar and a laser-based detection system.

  4. Usage Center

    DEFF Research Database (Denmark)

    Kleinaltenkamp, Michael; Plewa, Carolin; Gudergan, Siegfried

    2017-01-01

    -actor value cocreation, this paper is the first to comprehensively andcoherently conceptualize the notion of a usage center. In doing so, the authorsbuild an important foundation for future theorizing related to the potentialemergence of usage centers as well as the cocreation of individual andcollective...

  5. General Urban Warfare Amphibious Logistics Applications. Volume 2. Operations Plan.

    Science.gov (United States)

    1983-06-23

    UNCLASSIFIE UNCLASSIFIED 0 r J0 IV 0 w> C. = < -J LK = LA r- e iz- c~ JCZ =~ >->CD - 4.)4- L&U. -j 00 oc .6 c~, Zo -= 0~A 4= ,Lh.CUNCLASSIFIED... detonations within the AOA. In the event that Aggressor forces employ NBC weapons to disrupt the heloborne and/or surface ship-to-shore movement of the Landing...concerning biological attacks chemical attacks, and nuclear detonations within Pe FBH. (c) NBC control center teams will direct NBC monitoring, survey

  6. Quality of life in chemical warfare survivors with ophthalmologic injuries: the first results form Iran Chemical Warfare Victims Health Assessment Study

    Directory of Open Access Journals (Sweden)

    Soroush Mohammad

    2009-01-01

    Full Text Available Abstract Background Iraq used chemical weapons extensively against the Iranians during the Iran-Iraq war (1980–1988. The aim of this study was to assess the health related quality of life (HRQOL in people who had ophthalmologic complications due to the sulfur mustard gas exposure during the war. Methods The Veterans and Martyrs Affair Foundation (VMAF database indicated that there were 196 patients with severe ophthalmologic complications due to chemical weapons exposure. Of these, those who gave consent (n = 147 entered into the study. Quality of life was measured using the 36-item Short Form Health Survey (SF-36 and scores were compared to those of the general public. In addition logistic regression analysis was performed to indicate variables that contribute to physical and mental health related quality of life. Results The mean age of the patients was 44.8 (SD = 8.7 ranging from 21 to 75 years. About one-third of the cases (n= 50 reported exposure to chemical weapons more than once. The mean exposure duration to sulfur mustard gas was 21.6 years (SD = 1.2. The lowest scores on the SF-36 subscales were found to be: the role physical and the general health. Quality of life in chemical warfare victims who had ophthalmologic problems was significantly lower than the general public (P Conclusion The study findings suggest that chemical warfare victims with ophthalmologic complications suffer from poor health related quality of life. It seems that the need for provision of health and support for this population is urgent. In addition, further research is necessary to measure health related quality of life in victims with different types of disabilities in order to support and enhance quality of life among this population.

  7. Mass Spectrometry Applications for the Identification and Quantitation of Biomarkers Resulting from Human Exposure to Chemical Warfare Agents

    Science.gov (United States)

    Smith, J. Richard; Capacio, Benedict R.

    In recent years, a number of analytical methods using biomedical samples such as blood and urine have been developed for the verification of exposure to chemical warfare agents. The majority of methods utilize gas or liquid chromatography in conjunction with mass spectrometry. In a small number of cases of suspected human exposure to chemical warfare agents, biomedical specimens have been made available for testing. This chapter provides an overview of biomarkers that have been verified in human biomedical samples, details of the exposure incidents, the methods utilized for analysis, and the biomarker concentration levels determined in the blood and/or urine.

  8. U.S. Army Land Warfare Laboratory. Volume 1. Project Report, Appendix A. Documentation

    Science.gov (United States)

    1974-06-01

    A B Corporation , Anywhere, USA DATE OF LETTER OF ACkNOWLEDGMENT: 8 February 1972 SUSPENSE DATE FOR FINAL REPLY: 9 March 1972 REVIEW GROUPS CCI$ENTS...A B Corporation Anywhere, U. S. A. Dear Sir: Your unsolicited proposal No. 123 entitled "ABC System," submitted by your letter of 2 February 1972...RDLW- i-RAO 6 March 1972 A B Corporation Anywhere, U. S. A. Dear Sir: The US Army Land Warfare Laboratory s in-house investigation pertaining to the

  9. Unconventional War and Warfare in the Gray Zone. The New Spectrum of Modern Conflicts

    Directory of Open Access Journals (Sweden)

    Miroslaw Banasik

    2016-06-01

    Full Text Available Experiences of the last couple of years indicate that political objectives are increasingly achieved without official declarations of war. Armed forces are used in untraditional ways and the so-called substitute troops begin to play an increasingly bigger part. The article aims to characterize the conflicts of alternative nature below the level of open war that are on the border between war and peace. The content of the article presents the theory of unconventional warfare and its description, and familiarizes the reader with the concept of grey zone conflicts. It further shows the challenges linked to rivalry for influence zones and security provisions.

  10. Design of a channel board used in an electronic warfare target simulator

    OpenAIRE

    Andersson, Peter

    2006-01-01

    A channel board was designed for a DRFM circuit. The DRFM is implemented in a Virtex-4 FPGA from Xilinx. In the future a similar channel board is intended to be used for target echo generation in ELSI which is an electronic warfare simulator at Saab Bofors Dynamics in Linköping. Besides the DRFM circuit the channel board consists of analog-to-digital converters, digital-to-analog converters, Ethernet plug-in board with a microcontroller, voltage regulators, FPGA configuration memory, voltage ...

  11. Rand Arroyo Center 2014

    Science.gov (United States)

    2015-01-01

    building readiness—in the U.S. Army and in allies and partners • cyber war—at the tactical through strategic levels • logistics effi ciencies ...warfare, signals intel- ligence, electromagnetic spectrum operations, public affairs, and psychological operations in the U.S. military to inform the...stable international environment best serves its three core national interests— regime survival, social order, and economic growth. As for U.S

  12. International Symposium 100 Years of Chemical Warfare : Research, Deployment, Consequences

    CERN Document Server

    Hoffmann, Dieter; Renn, Jürgen; Schmaltz, Florian; Wolf, Martin; One hundred years of chemical warfare : research, deployment, consequences; 100 Jahre Giftgaskrieg : Forschung, Einsatz, Folgen chemischer Massenvernichtungswaffen

    2017-01-01

    On April 22, 1915, the German military released 150 tons of chlorine gas at Ypres, Belgium. Carried by a long-awaited wind, the chlorine cloud passed within a few minutes through the British and French trenches, leaving behind at least 1,000 dead and 4,000 injured. This chemical attack, which amounted to the first use of a weapon of mass destruction, marks a turning point in world history. The preparation as well as the execution of the gas attack was orchestrated by Fritz Haber, the director of the Kaiser Wilhelm Institute for Physical Chemistry and Electrochemistry in Berlin-Dahlem. During World War I, Haber transformed his research institute into a center for the development of chemical weapons (and of the means of protection against them). Bretislav Friedrich and Martin Wolf (Fritz Haber Institute of the Max Planck Society, the successor institution of Haber’s institute) together with Dieter Hoffmann, Jürgen Renn, and Florian Schmaltz (Max Planck Institute for the History of Science) organized an inte...

  13. Information warfare as ICT influence on public consciousness and public opinion

    Directory of Open Access Journals (Sweden)

    A. H. Stadnyk

    2015-12-01

    Full Text Available The article defines the key aspects of the merits and impact of information warfare on public consciousness and public opinion. In the article, we review the information war not as an auxiliary mechanism for real war, but as a mechanism of affecting the public opinion. The public opinion can not be formed completely (while there is information content, public opinion changes constantly because the information in the hands of the media acts as a real weapon aimed at the mass consciousness. The article discusses in detail the four main factors that determine the effectiveness of the impact of information: 1 information warfare agents that affect the population, mass consciousness, public opinion; 2 information weapon of war; 3 the content itself, the content that is broadcast during the information war; 4 the specifics of mass awareness in different countries, the formation and functioning of their public opinion. And how much information war characteristic of the crisis (as an example to Ukraine since the beginning of the Maidan in 2013, the presentation of information aimed at manipulating public consciousness and, accordingly, the public opinion as the outward expression of consciousness.

  14. Consumer of concern early entry program (C-CEEP): protecting against the biological suicidal warfare host

    Science.gov (United States)

    Fish, Janet D.

    2014-05-01

    Man has used poisons for assassination purposes ever since the dawn of civilization, not only against individual enemies but also occasionally against armies. According to (Frischknecht, 2003)11 article on the History of Biological Warfare, during the past century, more than 500 million people died of infectious diseases. Several tens of thousands of these deaths were due to the deliberate release of pathogens or toxins. Two international treaties outlawed biological weapons in 1925 and 1972, but they have largely failed to stop countries from conducting offensive weapons research and large-scale production of biological weapons. Before the 20th century, biological warfare took on three main forms: (1) deliberate poisoning of food and water with infectious material, (2) use of microorganisms or toxins in some form of weapon system, and (3) use of biologically inoculated fabrics (Dire, 2013)8. This action plan is aimed at the recognition of the lack of current processes in place under an unidentified lead agency to detect, identify, track, and contain biological agents that can enter into the United States through a human host. This action plan program has been identified as the Consumer of Concern Early Entry Program or a simpler title is C-CEEP.

  15. Academic Training Lectures | Stuxnet and Cyber-Warfare | 13-14 January 2016

    CERN Multimedia

    2015-01-01

    Please note that the next series of Academic Training Lectures will take place on 13 and 14 January 2016. The lectures will be given by Gian Piero Siroli (Università e INFN, Bologna (IT))   Stuxnet and Cyber-Warfare (1/2)​ on Wednesday, 13 January from 11 a.m. to 12 p.m. http://indico.cern.ch/event/438525/ Stuxnet and Cyber-Warfare (2/2) on Thursday, 14 January from 11 a.m. to 12 p.m. http://indico.cern.ch/event/438526/ at CERN, Council Chamber (503-1-001)  Description: The first part of the lecture is devoted to the description of the Stuxnet worm, the first cyber-weapon whose existence has been made public, discovered in 2010 and targeting a specific industrial control system; the worm is responsible for the damaging of many centrifuges at an uranium enrichment facility, with the goal of sabotaging Iran&...

  16. Computational enzymology for degradation of chemical warfare agents: promising technologies for remediation processes

    Directory of Open Access Journals (Sweden)

    2017-03-01

    Full Text Available Chemical weapons are a major worldwide problem, since they are inexpensive, easy to produce on a large scale and difficult to detect and control. Among the chemical warfare agents, we can highlight the organophosphorus compounds (OP, which contain the phosphorus element and that have a large number of applications. They affect the central nervous system and can lead to death, so there are a lot of works in order to design new effective antidotes for the intoxication caused by them. The standard treatment includes the use of an anticholinergic combined to a central nervous system depressor and an oxime. Oximes are compounds that reactivate Acetylcholinesterase (AChE, a regulatory enzyme responsible for the transmission of nerve impulses, which is one of the molecular targets most vulnerable to neurotoxic agents. Increasingly, enzymatic treatment becomes a promising alternative; therefore, other enzymes have been studied for the OP degradation function, such as phosphotriesterase (PTE from bacteria, human serum paraoxonase 1 (HssPON1 and diisopropyl fluorophosphatase (DFPase that showed significant performances in OP detoxification. The understanding of mechanisms by which enzymes act is of extreme importance for the projection of antidotes for warfare agents, and computational chemistry comes to aid and reduce the time and costs of the process. Molecular Docking, Molecular Dynamics and QM/MM (quantum-mechanics/molecular-mechanics are techniques used to investigate the molecular interactions between ligands and proteins.

  17. Investigating the Relationship Between Drone Warfare and Civilian Casualties in Gaza

    Directory of Open Access Journals (Sweden)

    Dr. Ann Rogers

    2014-12-01

    Full Text Available Unmanned aerial vehicles (UAVs, better known as drones, are increasingly touted as ‘humanitarian’ weapons that contribute positively to fighting just wars and saving innocent lives. At the same time, civilian casualties have become the most visible and criticized aspect of drone warfare. It is argued here that drones contribute to civilian casualties not in spite of, but because of, their unique attributes. They greatly extend war across time and space, pulling more potential threats and targets into play over long periods, and because they are low-risk and highly accurate, they are more likely to be used. The assumption that drones save lives obscures a new turn in strategic thinking that sees states such as Israel and the US rely on large numbers of small, highly discriminating attacks applied over time to achieve their objectives. This examination of Israel’s 2014 war in Gaza argues that civilian casualties are not an unexpected or unintended consequence of drone warfare, but an entirely predictable outcome.

  18. Zirconium doped nano-dispersed oxides of Fe, Al and Zn for destruction of warfare agents

    Energy Technology Data Exchange (ETDEWEB)

    Stengl, Vaclav, E-mail: stengl@uach.cz [Institute of Inorganic Chemistry AS CR v.v.i., 250 68 Rez (Czech Republic); Houskova, Vendula; Bakardjieva, Snejana; Murafa, Nataliya; Marikova, Monika [Institute of Inorganic Chemistry AS CR v.v.i., 250 68 Rez (Czech Republic); Oplustil, Frantisek; Nemec, Tomas [Military Technical Institute of Protection Brno, Veslarska 230, 628 00 Brno (Czech Republic)

    2010-11-15

    Zirconium doped nano dispersive oxides of Fe, Al and Zn were prepared by a homogeneous hydrolysis of the respective sulfate salts with urea in aqueous solutions. Synthesized metal oxide hydroxides were characterized using Brunauer-Emmett-Teller (BET) surface area and Barrett-Joiner-Halenda porosity (BJH), X-ray diffraction (XRD), infrared spectroscopy (IR), scanning electron microscopy (SEM) and energy-dispersive X-ray microanalysis (EDX). These oxides were taken for an experimental evaluation of their reactivity with sulfur mustard (HD or bis(2-chloroethyl)sulfide), soman (GD or (3,3'-Dimethylbutan-2-yl)-methylphosphonofluoridate) and VX agent (S-[2-(diisopropylamino)ethyl]-O-ethyl-methylphosphonothionate). The presence of Zr{sup 4+} dopant can increase both the surface area and the surface hydroxylation of the resulting doped oxides, decreases their crystallites' sizes thereby it may contribute in enabling the substrate adsorption at the oxide surface thus it can accelerate the rate of degradation of warfare agents. Addition of Zr{sup 4+} converts the product of the reaction of ferric sulphate with urea from ferrihydrite to goethite. We found out that doped oxo-hydroxides Zr-FeO(OH) - being prepared by a homogeneous hydrolysis of ferric and zirconium oxo-sulfates mixture in aqueous solutions - exhibit a comparatively higher degradation activity towards chemical warfare agents (CWAs). Degradation of soman or VX agent on Zr-doped FeO(OH) containing ca. 8.3 wt.% of zirconium proceeded to completion within 30 min.

  19. The challenges experienced by Iranian war veterans living with chemical warfare poisoning: a descriptive, exploratory study.

    Science.gov (United States)

    Hassankhani, Hadi; Taleghani, Fariba; Mills, Jane; Birks, Melanie; Francis, Karen; Ahmadi, Fazlolah

    2010-06-01

    This exploratory, descriptive study investigates the experiences of Iranian war veterans living with chronic disease acquired as a result of chemical warfare. Sulphur mustard (SM) is considered one of the most important agents of chemical warfare and was widely used during the Iran-Iraq conflict in 1980-1988. There are approximately 100 000 Iranian SM casualties who suffer from serious long-term progressive health problems involving their respiratory organs, eyes and skin. Seventeen male Iranian war veterans aged between 30 and 59 years and four victims' family members participated in the study. Data was generated during individual in-depth interviews that used open-ended questions. Grounded theory techniques, including the constant comparative method of concurrent data generation and analysis, were employed in the analysis of data. Preliminary results indicate two main thematic categories: social isolation and physical disability. It is argued that a lack of knowledge about the outcomes of SM poisoning, physical restrictions and difficulty in adjusting socially decreases war veterans' functional capacity and levels of independence.

  20. Next Generation Non-particulate Dry Nonwoven Pad for Chemical Warfare Agent Decontamination

    Energy Technology Data Exchange (ETDEWEB)

    Ramkumar, S S; Love, A; Sata, U R; Koester, C J; Smith, W J; Keating, G A; Hobbs, L; Cox, S B; Lagna, W M; Kendall, R J

    2008-05-01

    New, non-particulate decontamination materials promise to reduce both military and civilian casualties by enabling individuals to decontaminate themselves and their equipment within minutes of exposure to chemical warfare agents or other toxic materials. One of the most promising new materials has been developed using a needlepunching nonwoven process to construct a novel and non-particulate composite fabric of multiple layers, including an inner layer of activated carbon fabric, which is well-suited for the decontamination of both personnel and equipment. This paper describes the development of a composite nonwoven pad and compares efficacy test results for this pad with results from testing other decontamination systems. The efficacy of the dry nonwoven fabric pad was demonstrated specifically for decontamination of the chemical warfare blister agent bis(2-chloroethyl)sulfide (H or sulfur mustard). GC/MS results indicate that the composite fabric was capable of significantly reducing the vapor hazard from mustard liquid absorbed into the nonwoven dry fabric pad. The mustard adsorption efficiency of the nonwoven pad was significantly higher than particulate activated carbon (p=0.041) and was similar to the currently fielded US military M291 kit (p=0.952). The nonwoven pad has several advantages over other materials, especially its non-particulate, yet flexible, construction. This composite fabric was also shown to be chemically compatible with potential toxic and hazardous liquids, which span a range of hydrophilic and hydrophobic chemicals, including a concentrated acid, an organic solvent and a mild oxidant, bleach.

  1. Modern sample preparation techniques for gas chromatography-mass spectrometry analysis of environmental markers of chemical warfare agents use

    NARCIS (Netherlands)

    Terzic, O.; de Voogt, P.; Banoub, J.

    2014-01-01

    The chapter introduces problematics of on-site chemical analysis in the investigations of past chemical warfare agents (CWA) events. An overview of primary environmental degradation pathways of CWA leading to formation of chemical markers of their use is given. Conventional and modern sample

  2. Chemical and biological warfare: Biology, chemistry, and toxicology. (Latest citations from the NTIS bibliographic database). Published Search

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1997-11-01

    The bibliography contains citations concerning the physiological effects, physicochemical effects, and toxicology of chemical and biological warfare agents. Citations discuss toxic chemicals, chemical agent simulants, detoxification and decontamination, environmental toxicity, and land pollution. Detection techniques and warning systems are examined in a separate bibliography. (Contains 50-250 citations and includes a subject term index and title list.) (Copyright NERAC, Inc. 1995)

  3. Boyd and the Past: A Look at the Utility of Ancient History in the Development of Modern Theories of Warfare

    Science.gov (United States)

    2013-05-23

    developed while studying air-to-air combat.44 When Boyd looked at the works of armor pioneer Heinz Guderian , he found historical references with... Guderian , Tukhachevsky, Fuller and later Boyd are all adherents of the maneuver warfare as practiced by the Mongols. Boyd went beyond his

  4. Harsh Climates, Poor Transportation, And Irregular Warfare: Logistical Difficulties From Napoleon To The Soviet - Afghan War That Affect Operational Campaigns

    Science.gov (United States)

    2014-04-01

    AU/ACSC/CALDWELL/AY14 AIR COMMAND AND STAFF COLLEGE AIR UNIVERSITY HARSH CLIMATES, POOR TRANSPORTAION , AND IRREGULAR WARFARE: LOGISTICAL...2012. http://www.bbc.co.uk/news/magazine-16929522 ( accessed October 24, 2013). Elting, John R. Swords Around a Throne: Napoleon’s Grande Armee. New

  5. Warfare tourism experiences and national identity: The case of Airborne Museum ‘Hartenstein’ in Oosterbeek, the Netherlands

    NARCIS (Netherlands)

    Gieling, Johannes

    2016-01-01

    This paper examines through an analysis of Dutch warfare tourism whether there is a relationship between the subjective perceived salience of Dutch identity and heritage tourists' motives, emotions and overall satisfaction. Using a social identity theory framework, this study provides a view of

  6. Warfare has changed - so should have methods: Ammunition and weapon performance induced operational risk and safety issues

    NARCIS (Netherlands)

    Verhagen, T.L.A.; Voorde, M.J. van de

    2010-01-01

    Warfare has changed. Out-of-area operations have increased the awareness that we are unfamiliar with the performance of the current conventional medium and large calibre ammunitions in day-to-day practice. Current ammunition is primarily developed and procured to defeat the traditional ‘steel’

  7. Reevaluation of 1999 Health-Based Environmental Screening Levels (HBESLs) for Chemical Warfare Agents

    Energy Technology Data Exchange (ETDEWEB)

    Watson, Annetta Paule [ORNL; Dolislager, Fredrick G [ORNL

    2007-05-01

    This report evaluates whether new information and updated scientific models require that changes be made to previously published health-based environmental soil screening levels (HBESLs) and associated environmental fate/breakdown information for chemical warfare agents (USACHPPM 1999). Specifically, the present evaluation describes and compares changes that have been made since 1999 to U.S. Environmental Protection Agency (EPA) risk assessment models, EPA exposure assumptions, as well as to specific chemical warfare agent parameters (e.g., toxicity values). Comparison was made between screening value estimates recalculated with current assumptions and earlier health-based environmental screening levels presented in 1999. The chemical warfare agents evaluated include the G-series and VX nerve agents and the vesicants sulfur mustard (agent HD) and Lewisite (agent L). In addition, key degradation products of these agents were also evaluated. Study findings indicate that the combined effect of updates and/or changes to EPA risk models, EPA default exposure parameters, and certain chemical warfare agent toxicity criteria does not result in significant alteration to the USACHPPM (1999) health-based environmental screening level estimates for the G-series and VX nerve agents or the vesicant agents HD and L. Given that EPA's final position on separate Tier 1 screening levels for indoor and outdoor worker screening assessments has not yet been released as of May 2007, the study authors find that the 1999 screening level estimates (see Table ES.1) are still appropriate and protective for screening residential as well as nonresidential sites. As such, risk management decisions made on the basis of USACHPPM (1999) recommendations do not require reconsideration. While the 1999 HBESL values are appropriate for continued use as general screening criteria, the updated '2007' estimates (presented below) that follow the new EPA protocols currently under development

  8. The Venus "Shell-over-Star" hieroglyph and Maya warfare: An examination of the interpretation of a Mayan symbol

    Science.gov (United States)

    Voit, Claudia Ann

    For decades, Maya scholars have associated the Mayan "Shell-Star" (also referred to as "Star-War") hieroglyph with Maya warfare. Put forward by scholars such as Floyd Lounsbury and David Kelley, and later advanced by Linda Schele, David Freidel, Ian Graham, Peter Matthews, Anthony Aveni and others, there are now dozens of published articles and chapters relating the hieroglyph to Venus and warfare. Venus is one of the most notable celestial objects outside of the Sun and Moon and was highly visible to the inhabitants of the Maya world. The Dresden Codex (an astronomical almanac) contains important information about the planet Venus, and the calendar section was deciphered by the librarian and mathematician, Ernst Förstemann in the late 1800s. In his decipherment, he deduced that the numbers contained in the tables must be connected to the orbital period of the planet. There is no other planet with the same orbital period 3 as Venus. Förstemann suggested that the decoded astronomy tables were used by the Maya to determine when to wage war. This interpretation, along with others, like Floyd Lounsbury`s study of Venus and the Long Count date at Bonampak were the seeds that have led to methodological errors that first began to take root in Maya research. The idea of the Venus association with warfare took hold and continues to propagate. Many scholars continue to assert that the "shell-star" glyph is related to warfare events. Others, like Gerardo Aldana, and Stanley Guenter, have recently come forward to reexamine and question the hieroglyph and its relationship, if any, to Maya warfare. I suggest, further, that methodological errors may have occurred along the way. I propose that these errors include data lost in translation, and inaccurate translations. In addition, the statistical analysis of Venus cycles has weak points. If this identification of the errors is correct, we need to re-evaluate the weakened foundation on which we are building our assertions about

  9. A Model for Effective Systems Engineering Workforce Development at Space and Naval Warfare Systems Center (SSC) Atlantic

    Science.gov (United States)

    2013-09-01

    Written Recognizes and uses correct English grammar , punctuation, and spelling . Entry Communication - Written Communicates written information (for...customer. Knows the safety rules . Key Words: defines, describes, identifies, knows, labels, lists, matches, names, outlines, recalls, recognizes...Questions new ideals, concepts, models, etc. in order to fully understand them. Know the safety rules and practices them. Key Words: answers, assists

  10. A Square Peg in a Round Hole: A Case Study of Center Gravity Application in Counter Insurgency Warfare

    Science.gov (United States)

    2011-06-01

    Iraq subject matter experts claimed while there would be an increase in looting and common crime, they ―did not predict the rise of any organized...Kilcullen, The Accidental Guerrilla, 153. 30 Ellen Knickmeyer and K.I. Ibrahim, ―Bombing Shatters Mosque In Iraq Attack on Shiite Shrine Sets Off...accessed 10 May 2011. Knickmeyer, Ellen and Ibrahim, K.I., ―Bombing Shatters Mosque In Iraq Attack on Shiite Shrine Sets Off Protests, Violence

  11. 75 FR 3395 - Taking and Importing Marine Mammals; U.S. Naval Surface Warfare Center Panama City Division...

    Science.gov (United States)

    2010-01-21

    ... Fisheries Service (NMFS), National Oceanic and Atmospheric Administration (NOAA), Commerce. ACTION: Final... Education Division, Office of Protected Resources, National Marine Fisheries Service, 1315 East-West Highway... logs and records documenting RDT&E activities should they be required for event reconstruction purposes...

  12. The Spectrum of Warfare Challenge. Joint Center for Operational Analysis Journal, Volume 11, Issue 2, Spring 2009

    Science.gov (United States)

    2009-01-01

    marked difference that in a civil war a nation is normally split into two or more parts, each occupied by different groups and armed by the rem - nants...conventional wars, but seemed to think of Vietnam as a bad dream best ignored. The key civilian agencies, US Agency for International Development

  13. The Evolving Nature of Warfare. Joint Center for Operational Analysis. Quarterly Bulletin, Volume 10, Issue 3, Fall 2008

    Science.gov (United States)

    2008-01-01

    Embassy, Mexico , and operator and staff status in national asset special mission units, where he conducted and supervised both overt and controlled...exhibit machismo characteristics, is quick to argue but slow to fi ght, has no sense of urgency when completing tasks, and operates with a very non...1917-1922), Mexico (1914), Haiti (1915-1922), and the Dominican Republic (1912-1924), very few spoke Spanish or knew much about Latin society or

  14. Quality of life in chemical warfare survivors with ophthalmologic injuries: the first results form Iran Chemical Warfare Victims Health Assessment Study

    Science.gov (United States)

    Mousavi, Batool; Soroush, Mohammad Reza; Montazeri, Ali

    2009-01-01

    Background Iraq used chemical weapons extensively against the Iranians during the Iran-Iraq war (1980–1988). The aim of this study was to assess the health related quality of life (HRQOL) in people who had ophthalmologic complications due to the sulfur mustard gas exposure during the war. Methods The Veterans and Martyrs Affair Foundation (VMAF) database indicated that there were 196 patients with severe ophthalmologic complications due to chemical weapons exposure. Of these, those who gave consent (n = 147) entered into the study. Quality of life was measured using the 36-item Short Form Health Survey (SF-36) and scores were compared to those of the general public. In addition logistic regression analysis was performed to indicate variables that contribute to physical and mental health related quality of life. Results The mean age of the patients was 44.8 (SD = 8.7) ranging from 21 to 75 years. About one-third of the cases (n= 50) reported exposure to chemical weapons more than once. The mean exposure duration to sulfur mustard gas was 21.6 years (SD = 1.2). The lowest scores on the SF-36 subscales were found to be: the role physical and the general health. Quality of life in chemical warfare victims who had ophthalmologic problems was significantly lower than the general public (P < 0.001). The results obtained from logistic regression analysis indicated that those who did not participate in sport activities suffer from a poorer physical health (OR = 2.93, 95% CI = 1.36 to 6.30, P = 0.006). The analysis also showed that poor mental health was associated with longer time since exposure (OR = 1.58, 95% CI = 1.04 to 2.39, P = 0.03) and lower education (OR = 3.03, 95% CI = 1.21 to 7.56, P = 0.01). Conclusion The study findings suggest that chemical warfare victims with ophthalmologic complications suffer from poor health related quality of life. It seems that the need for provision of health and support for this population is urgent. In addition, further research

  15. Transmission Loss and Frequency-Angle-Time Spread: Issues and Model Analysis for the Littoral Warfare Advanced Development Focused Technology Experiment 96-1

    National Research Council Canada - National Science Library

    Yang, T

    1997-01-01

    ...) sponsored by the Littoral Warfare Advanced Development (LWAD) program. Specifically, the BSDS directional projector was used as the source, an echo repeater was used to simulate the target, and the MUF (multiple frequency...

  16. The Rise and Fall of the Brown Water Navy: Changes in the United States Navy Riverine Warfare Capabilities from the Vietnam War to Operation Iraqi Freedom

    Science.gov (United States)

    2005-01-01

    Gary J. Bjorge , Ph.D. , Member Mark T. Gerges, M.A. , Member Brian J. Gerling, M.S. Accepted this 17th day of June 2005...niche in the special warfare community . This migration is largely undocumented. Finally, although the war in Iraq has brought riverine warfare back...craft of the Dinassauts maintained control of the vital lines of communication over the inland waterways. The actual craft and numbers assigned

  17. Surface-enhanced Raman as a water monitor for warfare agents

    Science.gov (United States)

    Spencer, Kevin M.; Sylvia, James M.; Clauson, Susan L.; Janni, James A.

    2002-02-01

    The threat of chemical warfare agents being released upon civilian and military personnel continues to escalate. One aspect of chemical preparedness is to analyze and protect the portable water supply for the military. Chemical nerve, blister, and choking agents, as well as biological threats must all be analyzed and low limits of detection must be verified. For chemical agents, this generally means detection down to the low ppb levels. Surface-Enhanced Raman Spectroscopy (SERS) is a spectroscopic technique that can detect trace levels of contaminants directly in the aqueous environment. In this paper, results are presented on the use of SERS to detect chemical and biological agent simulants with an end goal of creating a Joint Service Agent Water Monitor. Detection of cyanide, 2-chloroethyl ethyl sulfide, phosphonates, Gram-positive and Gram-negative bacteria using SERS has been performed and is discussed herein. Aspects of transferring laboratory results to an unattended field instrument are also discussed.

  18. [Toxicological effects of weapons of mass destruction and noxious agents in modern warfare and terrorism].

    Science.gov (United States)

    Vucemilović, Ante

    2010-06-01

    Weapons of mass destruction (WMD) best portray the twisted use of technological achievements against the human species. Despite arm control efforts, WMD threat continues to exist and even proliferate. This in turn calls for improvement in defensive measures against this threat. The modern soldier is exposed to a number of chemical, biological, and radiological agents in military and peace operations, while civilians are mainly exposed to terrorist attacks. Regardless of origin or mode of action, WMDs and other noxious agents aim for the same - to make an organism dysfunctional. Because their effects are often delayed, these agents are hard to spot on time and treat. This review presents a biomedical aspect of agents used in warfare and terrorism, including polonium-210, depleted uranium, salmonella, anthrax, genetically modified bacteria, cobweb-like polymer fibre, sarin, and mustard gas.

  19. NETWORK-CENTRIC WARFARE AND SOME PARTICULAR ASPECTS OF LOGISTICS BASED ON NETWORKING

    Directory of Open Access Journals (Sweden)

    Petrişor JALBĂ

    2015-04-01

    Full Text Available Within the framework of the current revolution in military affairs, at the End of the Cold War a new concept was born: the concept of War Based on Computer Networking or NCW Network Centric-Warfare which was established as a central element of modern military operations. Determined by theprogress recorded in the field of communication systems of all types, technology of information (HI-Tech, IT, war based on computer networking brings a change in the war paradigm and its inherent components In this respect, logistics based on computer networking represents one of the ways in which the reality of the battlefield is preserved which enhances the joint perspective upon the military forces.

  20. A war psychiatry approach to warfare in the Middle Byzantine period.

    Science.gov (United States)

    Ntafoulis, Pavlos

    2016-12-01

    Combat stress cases were traced in historical texts and military manuals on warfare from the Middle Byzantine period; they were mainly labelled as cowardice. Soldiers suffered from nostalgia or exhaustion; officers looked stunned, or could not speak during the battle. Cruel punishments were often enforced. Suicide and alcohol abuse were rarely mentioned. The Byzantines' evacuation system for battle casualties was well organized. Psychological operations were conducted and prisoners-of-war were usually part of them. The Byzantine army had 'parakletores', officers assigned to encourage soldiers before combat. The leaders dealt with combat stress by using their rhetoric skills and emphasizing religious faith in eternal life. The treatment of the 'cowards' was rather similar to modern war psychiatry principles of treatment. No description of PTSD was found. © The Author(s) 2016.

  1. Symptoms of Gulf War veterans possibly exposed to organophosphate chemical warfare agents at Khamisiyah, Iraq.

    Science.gov (United States)

    McCauley, L A; Rischitelli, G; Lambert, W E; Lasarev, M; Sticker, D L; Spencer, P S

    2001-01-01

    During the 1991 Gulf War, some Allied troops were potentially exposed to sarin/cyclosarin as the result of the destruction of Iraqi munitions at Khamisiyah. To evaluate the prevalence of past and current symptoms known to be associated with exposure to these chemical warfare agents, the authors conducted a computer-assisted telephone survey of 2,918 U.S. Gulf War veterans. Veterans who had participated in or witnessed the demolition in 1991 were more likely to report historical or extant symptoms than were veterans from other military units. These results should be viewed cautiously because they are based on symptoms recalled nine years after the event without precise characterization of exposure. Nonetheless, the findings suggest that symptoms consistent with low-level sarin exposure may have initially occurred, and health effects may have persisted in the veterans who were nearest to the demolition activity. Further research is warranted.

  2. Love-Wave Sensors Combined with Microfluidics for Fast Detection of Biological Warfare Agents

    Directory of Open Access Journals (Sweden)

    Daniel Matatagui

    2014-07-01

    Full Text Available The following paper examines a time-efficient method for detecting biological warfare agents (BWAs. The method is based on a system of a Love-wave immunosensor combined with a microfluidic chip which detects BWA samples in a dynamic mode. In this way a continuous flow-through of the sample is created, promoting the reaction between antigen and antibody and allowing a fast detection of the BWAs. In order to prove this method, static and dynamic modes have been simulated and different concentrations of BWA simulants have been tested with two immunoreactions: phage M13 has been detected using the mouse monoclonal antibody anti-M13 (AM13, and the rabbit immunoglobulin (Rabbit IgG has been detected using the polyclonal antibody goat anti-rabbit (GAR. Finally, different concentrations of each BWA simulants have been detected with a fast response time and a desirable level of discrimination among them has been achieved.

  3. Fate of chemical warfare agents and toxic indutrial chemicals in landfills

    DEFF Research Database (Denmark)

    Bartelt-Hunt, D.L.; Barlaz, M.A.; Knappe, D.R.U.

    2006-01-01

    One component of preparedness for a chemical attack is planning for the disposal of contaminated debris. To assess the feasibility of contaminated debris disposal in municipal solid waste (MSW) landfills, the fate of selected chemical warfare agents (CWAs) and toxic industrial chemicals (TICs......], and two TICs [furan and carbon disulfide] were studied. The effects of both infiltration (climate) and contaminant biodegradability on fate predictions were assessed. Model results showed that hydrolysis and gas-phase advection were the principal fate pathways for CWAs and TICs, respectively. Apart from...... CX and the TICs, none of the investigated compounds was predicted to persist in a landfill for more than 5 years. Climate had little impact on CWA/TIC fate, and biodegradability was only important for compounds with long hydrolysis halflives. Monte Carlo simulations were performed to assess...

  4. Naval electronic warfare simulation for effectiveness assessment and softkill programmability facility

    Science.gov (United States)

    Lançon, F.

    2011-06-01

    The Anti-ship Missile (ASM) threat to be faced by ships will become more diverse and difficult. Intelligence, rules of engagement constraints, fast reaction-time for effective softkill solution require specific tools to design Electronic Warfare (EW) systems and to integrate it onboard ship. SAGEM Company provides decoy launcher system [1] and its associated Naval Electronic Warfare Simulation tool (NEWS) to permit softkill effectiveness analysis for anti-ship missile defence. NEWS tool generates virtual environment for missile-ship engagement and counter-measure simulator over a wide spectrum: RF, IR, EO. It integrates EW Command & Control (EWC2) process which is implemented in decoy launcher system and performs Monte-Carlo batch processing to evaluate softkill effectiveness in different engagement situations. NEWS is designed to allow immediate EWC2 process integration from simulation to real decoy launcher system. By design, it allows the final operator to be able to program, test and integrate its own EWC2 module and EW library onboard, so intelligence of each user is protected and evolution of threat can be taken into account through EW library update. The objectives of NEWS tool are also to define a methodology for trial definition and trial data reduction. Growth potential would permit to design new concept for EWC2 programmability and real time effectiveness estimation in EW system. This tool can also be used for operator training purpose. This paper presents the architecture design, the softkill programmability facility concept and the flexibility for onboard integration on ship. The concept of this operationally focused simulation, which is to use only one tool for design, development, trial validation and operational use, will be demonstrated.

  5. Bioterrorism and Biological Warfare, from Past to the Present: A classic review

    Directory of Open Access Journals (Sweden)

    Majid Zare Bidaki

    2015-10-01

    Full Text Available Bioterrorism is defined as any terrorist action of intentional release or dissemination of highly pathogenic biological agents, including a variety of microorganisms or biological toxins. With the growing threat of terrorism, is necessary that the potential danger of various microorganisms – as a powerful tool of aggression and threat- to be taken seriously. This review tries to explain the concept of biological weapons and their historical development process with an emphasis on efforts to control the proliferation of these types of weapons over the last century. Potential impact of infectious diseases on people and armed forces was known from since 600 BC. Using the victims of the plague as a weapon in medieval warfare and spread of smallpox as a weapon during the war against the Indians when initially America was discovered, the development of biological weapons during the World War I, World War II and the Cold War, and even since the beginning of the third millennium, all show the strategic importance of pathogenic microorganisms as a deterrent power for the superiority of some governments and cults. Historical attempts to use infectious diseases as biological weapons reveal that the distinction between a natural outbreak of an infectious disease and that of a deliberate biological attack is very difficult. Abusing this characteristic of infectious diseases has made it possible for the purposes of superiority. International agreements to control the development of biological weapons, such as “the 1925 Geneva Protocol” and “the Convention on the Prohibition of the Development, Production and Stockpiling of Biological and Toxic Weapons” have not been able to control the development and using of biological warfare.  The current paper is a classic review (Overview article aiming at increasing the knowledge and awareness of people especially of health authorities and government officials.

  6. Postural Stability of Special Warfare Combatant-Craft Crewmen With Tactical Gear.

    Science.gov (United States)

    Morgan, Paul M; Williams, Valerie J; Sell, Timothy C

    The US Naval Special Warfare's Special Warfare Combatant-Craft Crewmen (SWCC) operate on small, high-speed boats while wearing tactical gear (TG). The TG increases mission safety and success but may affect postural stability, potentially increasing risk for musculoskeletal injury. Therefore, the purpose of this study was to examine the effects of TG on postural stability during the Sensory Organization Test (SOT). Eight SWCC performed the SOT on NeuroCom's Balance Manager with TG and with no tactical gear (NTG). The status of gear was performed in randomized order. The SOT consisted of six different conditions that challenge sensory systems responsible for postural stability. Each condition was performed for three trials, resulting in a total of 18 trials. Overall performance, each individual condition, and sensory system analysis (somatosensory, visual, vestibular, preference) were scored. Data were not normally distributed therefore Wilcoxon signed-rank tests were used to compare each variable (ρ = .05). No significant differences were found between NTG and TG tests. No statistically significant differences were detected under the two TG conditions. This may be due to low statistical power, or potentially insensitivity of the assessment. Also, the amount and distribution of weight worn during the TG conditions, and the SWCC's unstable occupational platform, may have contributed to the findings. The data from this sample will be used in future research to better understand how TG affects SWCC. The data show that the addition of TG used in our study did not affect postural stability of SWCC during the SOT. Although no statistically significant differences were observed, there are clinical reasons for continued study of the effect of increased load on postural stability, using more challenging conditions, greater surface perturbations, dynamic tasks, and heavier loads. 2016.

  7. Nuclear warfare

    CERN Multimedia

    Broda

    1981-01-01

    Le Prof.Broda a étudié à Vienne et Berlin et a travaillé pendant la dernière guerre mondiale en Grande Bretagne pour le conseil de la recherche médicale, notamment sur la chimie de la vision. Il est maintenant Prof. de la chimie, physique et radiochimie à l'Université de Vienne, où il concentre ses travaux sur les méchanisme de transport d'énergie à travers les cellules de membranes.

  8. Toxic Warfare

    Science.gov (United States)

    2002-02-01

    suicide squad from the LTTE sea ______________ 34See “FARC Allegedly Using Acid, Tar, Feces to Make Bombs,” El Tiempo , September 6, 2001, accessed from...Program and ser - vices provided by the University of Texas A&M Emergency Re- sponder Training Program. Three interactive training CD-ROMs for the emergency...Bombs,” El Tiempo , September 6, 2001, accessed from FBIS-LAP-20010906000034. “FBI Starts Nationwide Records Check on HAZMAT Truckers,” CNN Online

  9. Electronic Warfare

    Science.gov (United States)

    2012-02-08

    nuclear burst. A high-altitude electromagnetic pulse ( HEMP ) can generate significant disruptive field strengths over a continental-size area. The...portion of the EMS most affected by EMP and HEMP is the radio spectrum. Planning for communications system protection is significant when the potential...international law (e.g., Protocol IV of the 1980 Convention on Certain Conventional Weapons that prohibits the use of laser weapons with a combat function to

  10. Prehistoric Warfare in the American Southwest, by Stephen A. LeBlanc. University of Utah Press, 1999

    Directory of Open Access Journals (Sweden)

    Richard B. Woodbury

    2000-05-01

    Full Text Available The history of archaeology has often, not surprisingly, bene mainly concerned with sites, their excava­tors, and what they found. But of equal importance are the attitudes, beliefs, and assumptions that shape the interpretation of archaeological data. LeBlanc, in Prehistoric Warfare in American Southwest, argues that the long held belief in the essential peacefulness of the prehistoric Anasazi and other South­ western peoples can be shown to be wholly incorrect, and therefore much that has been written about the prehistoric Southwest needs extensive rethinking. Warfare was an important feature of the ancient Southwest, and he presents carefully marshalled evidence, in great details, to uphold his conclusions.

  11. A Comparison of Neutron-Based Non-Destructive Assessment Methods for Chemical Warfare Materiel and High Explosives

    Energy Technology Data Exchange (ETDEWEB)

    E.H. Seabury; D.L. Chichester; C.J. Wharton; A.J. Caffrey

    2008-08-01

    Prompt Gamma Neutron Activation Analysis (PGNAA) systems employ neutrons as a probe to interrogate items, e.g. chemical warfare materiel-filled munitions. The choice of a neutron source in field-portable systems is determined by its ability to excite nuclei of interest, operational concerns such as radiological safety and ease-of-use, and cost. Idaho National Laboratory’s PINS Chemical Assay System has traditionally used a Cf-252 isotopic neutron source, but recently a Deuterium-Tritium (DT) Electronic Neutron Generator (ENG) has been tested as an alternate neutron source. This paper presents the results of using both of these neutron sources to interrogate chemical warfare materiel (CWM) and high explosive (HE) filled munitions.

  12. Modeling and Optimal Control of a Class of Warfare Hybrid Dynamic Systems Based on Lanchester (n,1 Attrition Model

    Directory of Open Access Journals (Sweden)

    Xiangyong Chen

    2014-01-01

    hybrid dynamic systems is established based on Lanchester equation in a (n,1 battle, where a heterogeneous force of n different troop types faces a homogeneous force. This model can be characterized by the interaction of continuous-time models (governed by Lanchester equation, and discrete event systems (described by variable tactics. Furthermore, an expository discussion is presented on an optimal variable tactics control problem for warfare hybrid dynamic system. The optimal control strategies are designed based on dynamic programming and differential game theory. As an example of the consequences of this optimal control problem, we take the (2, 1 case and solve the optimal strategies in a (2, 1 case. Simulation results show the feasibility of warfare hybrid system model and the effectiveness of the optimal control strategies designed.

  13. The Logic of Hybrid Warfare: How the Concepts of Depth and Vulnerability Still Shape Russian Operational Approaches

    Science.gov (United States)

    2017-03-15

    case further publication or sale of copyrighted images is not permissible iii Abstract The Logic of Hybrid Warfare: How the Concepts of Depth...four conflicts. Further, the Moldovan and Ukrainian conflicts book -ended those in Chechnya and Georgia – begging the question of whether Russian...recent action in Ukraine indicates a brand new operational approach for future operations. This work cautions against such a view. Given this

  14. An examination of the collateral psychological and political damage of drone warfare in the FATA region of Pakistan

    OpenAIRE

    Dengler, Judson J.

    2013-01-01

    CHDS State/Local This research will examine the collateral psychological and political damage of the United States drone warfare program on Pakistani society in the Federally Administered Tribal Areas (FATA), to determine if this is an effective, proactive homeland defense tactic. The use of drone aircraft by the United States government has increased worldwide since this evolving technology was first utilized in 2001. Each drone strike impacts militants, noncombatants, and ordinary civili...

  15. Space and Naval Warfare Systems Command and Overall Navy Needs to Improve Management of Waiver and Deferral Requests

    Science.gov (United States)

    2015-10-08

    system reliability were not, or were not projected to be, satisfied. As a result, the DTS entered and completed IOT &E with unresolved deficiencies...2016-003 ( Project No. D2015-D000AE-0157.000) │ i Results in Brief Space and Naval Warfare Systems Command and Overall Navy Needs to Improve...not request waivers when the program did not meet the certification criteria needed to enter initial operational test and evaluation ( IOT &E

  16. Models, Analysis, and Recommendations Pertaining to the Retention of Naval Special Warfare s Mid-Level Officers

    Science.gov (United States)

    2013-12-01

    drawdown for Afghanistan nearing, opportunities to forge an officer corps through actual combat experience are diminishing.”10 B. A CALL FOR...The Analytic Hierarch/Network Process,” in Rev. R. Acad. Cien. Serie A. Mat (RACSAM), submitted by Francisco Javier Giron (Real Academia de Ciencias ...Academia de Ciencias : Spain. Scott, Nathan. Naval Special Warfare Officer Retention Survey. Monterey, CA: NPS Press, September 2013. Whittenberger

  17. A hybrid method for protection against threats to a network infrastructure for an electronic warfare management system

    Science.gov (United States)

    Byłak, Michał; RóŻański, Grzegorz

    2017-04-01

    The article presents the concept of ensuring the security of network information infrastructure for the management of Electronic Warfare (EW) systems. The concept takes into account the reactive and proactive tools against threats. An overview of the methods used to support the safety of IT networks and information sources about threats is presented. Integration of mechanisms that allow for effective intrusion detection and rapid response to threats in a network has been proposed. The architecture of the research environment is also presented.

  18. Quimiotaxonomia da superordem Zingiberiflorae (sensu Dahlgren I: flavonóides como marcadores quimiossistemáticos Chemotaxonomy of superorder Zingiberiflorae [sensu Dahlgren] I: flavonoids

    Directory of Open Access Journals (Sweden)

    Helena Regina Lima Pugialli

    1993-12-01

    Full Text Available A análise das características flavonoídicas da ordem Zingiberales (superordem Zingiberiflorae, Monocotyledonae reforçou a separação das suas famílias em dois grupos: grupo I (Strelitziaceae, Heliconiaceae, Musaceae e Lowiaceae e grupo II (Zingiberaceae, Costaceae, Marantaceae e Cannaceae. Baseado nos dados químicos e morfológicos sugeriu-se um esquema que caracteriza os diferentes estádios de avanço evolutivo dessas famílias.The analysis of flavonoids in the order Zingiberales (superorder Zingiberiflorae, Monocotyledonae reinforced the separation of its families into two groups: group I (Strelitziaceae, Heliconiaceae, Musaceae and Lowiaceae and group II (Zingiberaceae, Costaceae, Marantaceae and Cannaceae. Chemical and morphological data suggested the relative stages of evolutionary advancement of these families.

  19. Wound care centers

    Science.gov (United States)

    ... wound care center; Diabetic ulcer - wound care center; Surgical wound - wound center; Ischemic ulcer - wound center ... types of non-healing wounds include: Pressure sores Surgical wounds Radiation sores Foot ulcers due to diabetes , poor ...

  20. Virtual Warfare: Masculinity, Sexuality, and Propaganda in the Russo-Ukrainian War

    Directory of Open Access Journals (Sweden)

    Maryna Romanets

    2017-03-01

    Full Text Available This paper explores the intersection of sexual and political discourses as a particular aspect of the body politics that Russia has employed, among other strategies, in its massive propaganda offensive during the hybrid warfare against Ukraine.While recognizing sexuality as one of the mainstream concepts in political analysis, the paper draws on sexually explicit imagery and idiom used in Russian social media, and public discursive space in general, as propaganda techniques, and maps their “genealogy” within wider sociocultural and political contexts. Being conceptualized in terms of Russian hegemonic masculinity in relation to subordinated femininity and non-hegemonic masculinities of its adversarial others, these setups reveal how sexuality constitutes uneven and contradictory nexuses of power once being co-opted by Putin’s propaganda machine. It is noteworthy that Russia’s neo-imperial discursive tactics of homologizing sexual and political dominance—when supplemented with the official rhetoric of restituting Russia as a great power, Orthodox Christian fundamentalism as an integral part of Russian unique “state-civilization,” state-sanctioned homophobia, and traditional macho gender ideology—contribute quite effectively to sustaining public support in Russia for aggression against Ukraine in the process of Russian reimperialization of the former Soviet space.

  1. Reactions of psychiatric inpatients to the threat of biological and chemical warfare in Israel.

    Science.gov (United States)

    Strous, Rael D; Ofir, Dana; Brodsky, Ori; Yakirevitch, Janna; Drannikov, Angela; Navo, Nadav; Kotler, Moshe

    2004-04-01

    In the months before the Second Gulf War, the threat of biological and chemical warfare led many Israelis to experience significant stress and mood changes. In this study, we investigated whether this threat affected the subjective mood and behavior of inpatients with schizophrenia and compared the results with effects noted in their clinical staff. Subjects were evaluated at two points in time-2 months before the war and on day 1 of the war-with a specially designed questionnaire and with the Spielberger Scale for Trait Anxiety. Although the responses of the two groups did not differ radically before the war, on the first day of war, significant differences were noted, with patients demonstrating increases in anxiety and level of concern. Both groups reported similar effects on their mood. Patients were more concerned about the potential for the outbreak of World War III, whereas staff were more concerned about economic effects. Female subjects in both groups demonstrated greater anxiety and mood changes after the outbreak of war compared with before the war. Effects observed on the patients may be related to the decreased coping threshold resulting from their illness, which renders psychotic patients more vulnerable to any acute stressor; however, effects on the staff members should not be ignored.

  2. Nucleic acid approaches for detection and identification of biological warfare and infectious disease agents.

    Science.gov (United States)

    Ivnitski, Dmitri; O'Neil, Daniel J; Gattuso, Anthony; Schlicht, Roger; Calidonna, Michael; Fisher, Rodney

    2003-10-01

    Biological warfare agents are the most problematic of the weapons of mass destruction and terror. Both civilian and military sources predict that over the next decade the threat from proliferation of these agents will increase significantly. In this review we summarize the state of the art in detection and identification of biological threat agents based on PCR technology with emphasis on the new technology of microarrays. The advantages and limitations of real-time PCR technology and a review of the literature as it applies to pathogen and virus detection are presented. The paper covers a number of issues related to the challenges facing biological threat agent detection technologies and identifies critical components that must be overcome for the emergence of reliable PCR-based DNA technologies as bioterrorism countermeasures and for environmental applications. The review evaluates various system components developed for an integrated DNA microchip and the potential applications of the next generation of fully automated DNA analyzers with integrated sample preparation and biosensing elements. The article also reviews promising devices and technologies that are near to being, or have been, commercialized.

  3. Descriptive Epidemiology of Musculoskeletal Injuries in Naval Special Warfare Sea, Air, and Land Operators.

    Science.gov (United States)

    Lovalekar, Mita; Abt, John P; Sell, Timothy C; Wood, Dallas E; Lephart, Scott M

    2016-01-01

    The purpose of this analysis was to describe medical chart reviewed musculoskeletal injuries among Naval Special Warfare Sea, Air, and Land Operators. 210 Operators volunteered (age: 28.1 ± 6.0 years, height: 1.8 ± 0.1 m, weight: 85.4 ± 9.3 kg). Musculoskeletal injury data were extracted from subjects' medical charts, and injuries that occurred during 1 year were described. Anatomic location of injury, cause of injury, activity when injury occurred, and injury type were described. The frequency of injuries was 0.025 per Operator per month. Most injuries involved the upper extremity (38.1% of injuries). Frequent anatomic sublocations for injuries were the shoulder (23.8%) and lumbopelvic region of the spine (12.7%). Lifting was the cause of 7.9% of injuries. Subjects were participating in training when 38.1% of injuries occurred and recreational activity/sports when 12.7% of injuries occurred. Frequent injury types were strain (20.6%), pain/spasm/ache (19.0%), fracture (11.1%), and sprain (11.1%). The results of this analysis underscore the need to investigate the risk factors, especially of upper extremity and physical activity related injuries, in this population of Operators. There is a scope for development of a focused, customized injury prevention program, targeting the unique injury profile of this population. Reprint & Copyright © 2016 Association of Military Surgeons of the U.S.

  4. Deep sea habitats in the chemical warfare dumping areas of the Baltic Sea.

    Science.gov (United States)

    Czub, Michał; Kotwicki, Lech; Lang, Thomas; Sanderson, Hans; Klusek, Zygmunt; Grabowski, Miłosz; Szubska, Marta; Jakacki, Jaromir; Andrzejewski, Jan; Rak, Daniel; Bełdowski, Jacek

    2018-03-01

    The Baltic Sea is a severely disturbed marine ecosystem that has previously been used as a dumping ground for Chemical Warfare Agents (CW). The presence of unexploded underwater ordnance is an additional risk factor for offshore activities and an environmental risk for the natural resources of the sea. In this paper, the focus is on descriptions of the marine habitat based on the observations arising from studies linked to the CHEMSEA, MODUM and DAIMON projects. Investigated areas of Bornholm, Gotland and Gdańsk Deeps are similarly affected by the Baltic Sea eutrophication, however, at depths greater than 70m several differences in local hydrological regimes and pore-water heavy metal concentrations between those basins were observed. During the lifespan of presented studies, we were able to observe the effects of Major Baltic Inflow, that started in December 2014, on local biota and their habitats, especially in the Bornholm Deep area. Reappearance of several meiofauna taxa and one macrofauna specimen was observed approximately one year after this phenomenon, however it's ecological effects already disappeared in March 2017. According to our findings and to the EUNIS Habitat Classification, the three reviewed areas should be characterized as Deep Sea Muddy Sands, while the presence of suspicious bomb-like objects both beneath and on top of the sediments confirms their CW dumpsite status. Copyright © 2017 Elsevier B.V. All rights reserved.

  5. Extraordinary Measures: Drone Warfare, Securitization, and the “War on Terror”

    Directory of Open Access Journals (Sweden)

    Romaniuk Scott Nicholas

    2015-07-01

    Full Text Available The use of unmanned aerial vehicles or “drones,” as part of the United States’ (US targeted killing (TK program dramatically increased after the War on Terror (WoT was declared. With the ambiguous nature and parameters of the WoT, and stemming from the postulation of numerous low-level, niche-, and other securitizations producing a monolithic threat, US drone operations now constitute a vital stitch in the extensive fabric of US counterterrorism policy. This article employs the theories of securitization and macrosecuritization as discussed by Buzan (1991, 2006, and Buzan and Wæver (2009 to understand targeted killing, by means of weaponized drones, as an extraordinary measure according to the Copenhagen School’s interpretation. An overarching securitization and the use of the “security” label warrants the emergency action of targeted killing through the use of drones as an extraordinary measure. We argue that the WoT serves as a means of securitizing global terrorism as a threat significant enough to warrant the use of drone warfare as an extraordinary use of force. By accepting the WoT as a securitization process we can reasonably accept that the US’ response(s against that threat are also securitized and therefore become extraordinary measures.

  6. Hollow fiber-mediated liquid-phase microextraction of chemical warfare agents from water.

    Science.gov (United States)

    Dubey, D K; Pardasani, Deepak; Gupta, A K; Palit, Meehir; Kanaujia, Pankaj K; Tak, Vijay

    2006-02-24

    Unambiguous detection and identification of chemical warfare agents (CWAs) and related compounds are of paramount importance from verification point of view of Chemical Weapons Convention (CWC). It requires development of fast, reliable, simple and reproducible sample preparation of CWAs from water which is likely to be contaminated during deliberate or inadvertent spread of CWAs. This work describes development of hollow fiber liquid-phase microextraction (HF-LPME) method for efficient extraction of CWAs (such as sarin, sulfur mustard and their analogues) from water followed by gas chromatography-mass spectrometric analysis. Extraction parameters, such as organic solvent, agitation, extraction time, and salt concentration were optimized. Best recoveries of target analytes were achieved using 1 microL trichloroethylene as extracting solvent, 1000 rpm stirring rate, 15 min extraction time, and 30% NaCl. Excellent precision was observed with less than 7.6% RSD. The limit of detection by HF-LPME was achieved up to 0.1 microg/L at 30% salt concentration.

  7. Chemical warfare agent detection in complex environments with comprehensive two-dimensional gas chromatography

    Science.gov (United States)

    Reichenbach, Stephen E.; Ni, Mingtian; Kottapalli, Visweswara; Visvanathan, Arvind; Ledford, Edward B., Jr.; Oostdijk, John; Trap, Henk C.

    2003-08-01

    Comprehensive two-dimensional gas chromatography (GCxGC) is an emerging technology for chemical separation that provides an order-of-magnitude increase in separation capacity over traditional gas chromatography. GCxGC separates chemical species with two capillary columns interfaced by two-stage thermal desorption. Because GCxGC is comprehensive and has high separation capacity, it can perform multiple traditional analytical methods with a single analysis. GCxGC has great potential for a wide variety of environmental sensing applications, including detection of chemical warfare agents (CWA) and other harmful chemicals. This paper demonstrates separation of nerve agents sarin and soman from a matrix of gasoline and diesel fuel. Using a combination of an initial column separating on the basis of boiling point and a second column separating on the basis of polarity, GCxGC clearly separates the nerve agents from the thousands of other chemicals in the sample. The GCxGC data is visualized, processed, and analyzed as a two-dimensional digital image using a software system for GCxGC image processing developed at the University of Nebraska - Lincoln.

  8. Global physics: from percolation to terrorism, guerilla warfare and clandestine activities

    Science.gov (United States)

    Galam, Serge

    2003-12-01

    The September 11 attack on the US has revealed an unprecedented terrorism with worldwide range of destruction. It is argued to result from the first worldwide percolation of passive supporters. They are people sympathetic to the terrorism cause but without being involved with it. They just do not oppose it in case they could. This scheme puts suppression of the percolation as the major strategic issue in the fight against terrorism. Acting on the population is shown to be useless. Instead a new strategic scheme is suggested to increase the terrorism percolation threshold and in turn suppress the percolation. The relevant associated space is identified as a multi-dimensional social space including both the ground earth surface and all various independent flags displayed by the terrorist group. Some hints are given on how to shrink the geographical spreading of terrorism threat. The model apply to a large spectrum of clandestine activities including guerilla warfare as well as tax evasion, corruption, illegal gambling, illegal prostitution and black markets.

  9. Raman Spectroscopic Detection for Simulants of Chemical Warfare Agents Using a Spatial Heterodyne Spectrometer.

    Science.gov (United States)

    Hu, Guangxiao; Xiong, Wei; Luo, Haiyan; Shi, Hailiang; Li, Zhiwei; Shen, Jing; Fang, Xuejing; Xu, Biao; Zhang, Jicheng

    2018-01-01

    Raman spectroscopic detection is one of the suitable methods for the detection of chemical warfare agents (CWAs) and simulants. Since the 1980s, many researchers have been dedicated to the research of chemical characteristic of CWAs and simulants and instrumental improvement for their analysis and detection. The spatial heterodyne Raman spectrometer (SHRS) is a new developing instrument for Raman detection that appeared in 2011. It is already well-known that SHRS has the characteristics of high spectral resolution, a large field-of-view, and high throughput. Thus, it is inherently suitable for the analysis and detection of these toxic chemicals and simulants. The in situ and standoff detection of some typical simulants of CWAs, such as dimethyl methylphosphonate (DMMP), diisopropyl methylphosphonate (DIMP), triethylphosphate (TEP), diethyl malonate (DEM), methyl salicylate (MES), 2-chloroethyl ethyl sulfide (CEES), and malathion, were tried. The achieved results show that SHRS does have the ability of in situ analysis or standoff detection for simulants of CWAs. When the laser power was set to as low as 26 mW, the SHRS still has a signal-to-noise ratio higher than 5 in in situ detection. The standoff Raman spectra detection of CWAs simulants was realized at a distance of 11 m. The potential feasibility of standoff detection of SHRS for CWAs simulants has been proved.

  10. Ultra-Fast Degradation of Chemical Warfare Agents Using MOF-Nanofiber Kebabs.

    Science.gov (United States)

    Zhao, Junjie; Lee, Dennis T; Yaga, Robert W; Hall, Morgan G; Barton, Heather F; Woodward, Ian R; Oldham, Christopher J; Walls, Howard J; Peterson, Gregory W; Parsons, Gregory N

    2016-10-10

    The threat associated with chemical warfare agents (CWAs) motivates the development of new materials to provide enhanced protection with a reduced burden. Metal-organic frame-works (MOFs) have recently been shown as highly effective catalysts for detoxifying CWAs, but challenges still remain for integrating MOFs into functional filter media and/or protective garments. Herein, we report a series of MOF-nanofiber kebab structures for fast degradation of CWAs. We found TiO 2 coatings deposited via atomic layer deposition (ALD) onto polyamide-6 nanofibers enable the formation of conformal Zr-based MOF thin films including UiO-66, UiO-66-NH 2 , and UiO-67. Cross-sectional TEM images show that these MOF crystals nucleate and grow directly on and around the nanofibers, with strong attachment to the substrates. These MOF-functionalized nanofibers exhibit excellent reactivity for detoxifying CWAs. The half-lives of a CWA simulant compound and nerve agent soman (GD) are as short as 7.3 min and 2.3 min, respectively. These results therefore provide the earliest report of MOF-nanofiber textile composites capable of ultra-fast degradation of CWAs. © 2016 WILEY-VCH Verlag GmbH & Co. KGaA, Weinheim.

  11. The possible role of intravenous lipid emulsion in the treatment of chemical warfare agent poisoning

    Directory of Open Access Journals (Sweden)

    Arik Eisenkraft

    2016-01-01

    Full Text Available Organophosphates (OPs are cholinesterase inhibitors that lead to a characteristic toxidrome of hypersecretion, miosis, dyspnea, respiratory insufficiency, convulsions and, without proper and early antidotal treatment, death. Most of these compounds are highly lipophilic. Sulfur mustard is a toxic lipophilic alkylating agent, exerting its damage through alkylation of cellular macromolecules (e.g., DNA, proteins and intense activation of pro-inflammatory pathways. Currently approved antidotes against OPs include the peripheral anticholinergic drug atropine and an oxime that reactivates the inhibited cholinesterase. Benzodiazepines are used to stop organophosphate-induced seizures. Despite these approved drugs, efforts have been made to introduce other medical countermeasures in order to attenuate both the short-term and long-term clinical effects following exposure. Currently, there is no antidote against sulfur mustard poisoning. Intravenous lipid emulsions are used as a source of calories in parenteral nutrition. In recent years, efficacy of lipid emulsions has been shown in the treatment of poisoning by fat-soluble compounds in animal models as well as clinically in humans. In this review we discuss the usefulness of intravenous lipid emulsions as an adjunct to the in-hospital treatment of chemical warfare agent poisoning.

  12. Healthcare and warfare. Medical space, mission and apartheid in twentieth century northern Namibia.

    Science.gov (United States)

    Nord, Catharina

    2014-07-01

    In the year 1966, the first government hospital, Oshakati hospital, was inaugurated in northern South-West Africa. It was constructed by the apartheid regime of South Africa which was occupying the territory. Prior to this inauguration, Finnish missionaries had, for 65 years, provided healthcare to the indigenous people in a number of healthcare facilities of which Onandjokwe hospital was the most important. This article discusses these two agents' ideological standpoints. The same year, the war between the South-West African guerrillas and the South African state started, and continued up to 1988. The two hospitals became involved in the war; Oshakati hospital as a part of the South African war machinery, and Onandjokwe hospital as a 'terrorist hospital' in the eyes of the South Africans. The missionary Onandjokwe hospital was linked to the Lutheran church in South-West Africa, which became one of the main critics of the apartheid system early in the liberation war. Warfare and healthcare became intertwined with apartheid policies and aggression, materialised by healthcare provision based on strategic rationales rather than the people's healthcare needs. When the Namibian state took over a ruined healthcare system in 1990, the two hospitals were hubs in a healthcare landscape shaped by missionary ambitions, war and apartheid logic.

  13. Trade, Diplomacy, and Warfare: The Quest for Elite Rhizobia Inoculant Strains.

    Science.gov (United States)

    Checcucci, Alice; DiCenzo, George C; Bazzicalupo, Marco; Mengoni, Alessio

    2017-01-01

    Rhizobia form symbiotic nitrogen-fixing nodules on leguminous plants, which provides an important source of fixed nitrogen input into the soil ecosystem. The improvement of symbiotic nitrogen fixation is one of the main challenges facing agriculture research. Doing so will reduce the usage of chemical nitrogen fertilizer, contributing to the development of sustainable agriculture practices to deal with the increasing global human population. Sociomicrobiological studies of rhizobia have become a model for the study of the evolution of mutualistic interactions. The exploitation of the wide range of social interactions rhizobia establish among themselves, with the soil and root microbiota, and with the host plant, could constitute a great advantage in the development of a new generation of highly effective rhizobia inoculants. Here, we provide a brief overview of the current knowledge on three main aspects of rhizobia interaction: trade of fixed nitrogen with the plant; diplomacy in terms of communication and possible synergistic effects; and warfare, as antagonism and plant control over symbiosis. Then, we propose new areas of investigation and the selection of strains based on the combination of the genetic determinants for the relevant rhizobia symbiotic behavioral phenotypes.

  14. Social networks as a new tool of information warfare in the modern world

    Directory of Open Access Journals (Sweden)

    B. W. Kovalevych

    2014-03-01

    Full Text Available With the rapid development of information technologies, especially the Internet, people are becoming increasingly dependent on information that surrounds them. And social networks, where a person spends most of their time, become the ideal instruments of influence on the people consciousness and information warfare. Due to psychological factors ( such as ‘spiral of silence’, the herd instinct, the entire credibility of published information, opinion leaders, the desire for self­realization or replacement of reality that influence the human behavior in the network and the use of models of influence (model of network attack, model of involving users as volunteers, total block model, social networks become a platform for the dissemination of political ideas, ideologies and implementation of the ‘color revolutions’. However, social media play a positive role, especially in the establishment of civil society and the free flow of information. Positive or negative impact of networks primary depends on the purpose of use of social networking tools.

  15. Medical effects of internal contamination with actinides: further controversy on depleted uranium and radioactive warfare.

    Science.gov (United States)

    Durakovic, Asaf

    2016-05-01

    The Nuclear Age began in 1945 with testing in New Mexico, USA, and the subsequent bombings of Hiroshima and Nagasaki. Regardless of attempts to limit the development of nuclear weapons, the current world arsenal has reached the staggering dimensions and presents a significant concern for the biosphere and mankind. In an explosion of a nuclear weapon, over 400 radioactive isotopes are released into the biosphere, 40 of which pose potential dangers including iodine, cesium, alkaline earths, and actinides. The immediate health effects of nuclear explosions include thermal, mechanical, and acute radiation syndrome. Long-term effects include radioactive fallout, internal contamination, and long-term genotoxicity. The current controversial concern over depleted uranium's somatic and genetic toxicity is still a subject of worldwide sustained research. The host of data generated in the past decades has demonstrated conflicting findings, with the most recent evidence showing that its genotoxicity is greater than previously considered. Of particular concern are the osteotropic properties of uranium isotopes due to their final retention in the crystals of exchangeable and nonexchangeable bone as well as their proximity to pluripotent stem cells. Depleted uranium remains an unresolved issue in both warfare and the search for alternative energy sources.

  16. China’s Three Warfares Strategy Mitigates Fallout From Cyber Espionage Activities

    Directory of Open Access Journals (Sweden)

    Emilio Iasiello

    2016-06-01

    Full Text Available China is engaged in longstanding cyber espionage against the U.S., as well as other nations, to collect sensitive public and private information in support of national objectives laid out in its 12th Five Year Plan. Foreign governments citing China’s malfeasance have rebuked these activities, a claim vehemently denied by Beijing. In response, China is leveraging the “Three Warfares” an integrated three-prong information warfare strategy to combat these accusations by leveraging Media, Legal, and Psychological components designed to influence the international community. While the United States has threatened the imposition of economic sanctions, Beijing has successfully parried consequential actions by arresting U.S.-identified hackers, thereby demonstrating its commitment toward preserving a stable and peaceful cyberspace. These interrelated “Three Warfares” disciplines have targeted the cognitive processes of the U.S. leadership, as well as the international public’s perception of China as a global threat, thereby having successfully forestalled the implementation of any effective punitive or economic deterrence strategy to include the imposition of cyber sanctions.

  17. Effects of lactoferrin derived peptides on simulants of biological warfare agents.

    Science.gov (United States)

    Sijbrandij, Tjitske; Ligtenberg, Antoon J; Nazmi, Kamran; Veerman, Enno C I; Bolscher, Jan G M; Bikker, Floris J

    2017-01-01

    Lactoferrin (LF) is an important immune protein in neutrophils and secretory fluids of mammals. Bovine LF (bLF) harbours two antimicrobial stretches, lactoferricin and lactoferampin, situated in close proximity in the N1 domain. To mimic these antimicrobial domain parts a chimeric peptide (LFchimera) has been constructed comprising parts of both stretches (LFcin17-30 and LFampin265-284). To investigate the potency of this construct to combat a set of Gram positive and Gram negative bacteria which are regarded as simulants for biological warfare agents, the effect on bacterial killing, membrane permeability and membrane polarity were determined in comparison to the constituent peptides and the native bLF. Furthermore we aimed to increase the antimicrobial potency of the bLF derived peptides by cationic amino acid substitutions. Overall, the bactericidal activity of the peptides could be related to membrane disturbing effects, i.e. membrane permeabilization and depolarization. Those effects were most prominent for the LFchimera. Arginine residues were found to be crucial for displaying antimicrobial activity, as lysine to arginine substitutions resulted in an increased antimicrobial activity, affecting mostly LFampin265-284 whereas arginine to lysine substitutions resulted in a decreased bactericidal activity, predominantly in case of LFcin17-30.

  18. Metabolic Syndrome in Chemical Warfare Patients with Chronic Obstructive Pulmonary Disease

    Directory of Open Access Journals (Sweden)

    Shahrzad M. Lari

    2014-11-01

    Full Text Available   Introduction: Sulfur mustard (SM, a toxic alkylating gas, can cause serious long-term pulmonary complications such as chronic obstructive pulmonary disease (COPD. Metabolic syndrome (MetS is one of the important comorbidities of COPD. This study was designed to evaluate the frequency of metabolic syndrome in Iranian chemical warfare patients (CWPs with COPD. Materials and Methods: Thirty CWPs with a mean age of 46.93± 6.8 were enrolled in this study. The following parameters were studied in: complete pulmonary function tests, health-related quality of life, serum triglycerides (TG, high density lipoprotein (HDL and fasting blood sugar (FBS levels. Additionally, 32 COPD patients and 56 healthy persons were considered as control groups who were matched to CWPs. Results: We found a statistically significant difference in the frequency of MetS between the COPD patients and the healthy control group (p=0.04. Additionally, we observed a statistically significant difference in the mean HDL levels among these groups (p=

  19. First-line rescue system of Chinese army in non-warfare military operations

    Directory of Open Access Journals (Sweden)

    Wei ZHAO

    2016-03-01

    Full Text Available In the 21st century, non traditional security threats have become increasingly prominent, non warfare military activity has become general trend of global military development, and it has become the main activities of the peacetime arm forces in all countries. Therefore, to carry out and strengthen the medical support in non-war military operations is a long-term strategic task of Chinese Army medical service. The concept about non-war military activities and characteristics of medical support, and the existing problems, and measures of establishment of first-line rescue system are presented in this paper. Under the reformation of military affairs, the front-line ambulance system in non-war military action will work closely around the key security such as disaster relief, peacekeeping operations, public health emergencies and major events. It is necessary to learn the advanced experience from developed countries, and continuously deepen medical security work in non-war military operations on the basis of "non-combat" and "war"-oriented concept. DOI: 10.11855/j.issn.0577-7402.2016.01.17

  20. COPD assessment test (CAT): simple tool for evaluating quality of life of chemical warfare patients with chronic obstructive pulmonary disease.

    Science.gov (United States)

    Lari, Shahrzad M; Ghobadi, Hassan; Attaran, Davood; Mahmoodpour, Afsoun; Shadkam, Omid; Rostami, Maryam

    2014-01-01

    Chronic obstructive pulmonary disease (COPD) is one of the serious late pulmonary complications caused by sulphur mustard exposure. Health status evaluations of chemical warfare patients with COPD are important to the management of these patients. The aim of this study was to determine the efficacy of the COPD assessment test (CAT) in evaluating the health-related quality of life (HRQOL) of chemical warfare patients with COPD. Eighty-two consecutive patients with stable COPD were enrolled in this study. All subjects were visited by one physician, and the HRQOL was evaluated by the CAT and St. George Respiratory Questionnaires (SGRQs). In addition, a standard spirometry test, 6-min walk distance test and pulse oxymetry were conducted. The severity of the COPD was determined using Global Initiative for Chronic Obstructive Lung Disease (GOLD) staging and the body mass index, obstruction, dyspnoea and exercise (BODE) index. The mean age of the patients was 47.30 ± 7.08 years. The mean CAT score was 26.03 ± 8.28. Thirty-five (43%) patients were in CAT stage 3. There were statistically significant correlations between the CAT and the SGRQ (r = 0.70, P = 0.001) and the BODE index (r = 0.70, P = 0.001). A statistically significant inverse correlation was found between the CAT score and the forced expiratory volume in 1 s (r = -0.30, P = 0.03). Our results demonstrated that the CAT is a simple and valid tool for assessment of HRQOL in chemical warfare patients with COPD and can be used in clinical practice. © 2013 John Wiley & Sons Ltd.

  1. Identification of vapor-phase chemical warfare agent simulants and rocket fuels using laser-induced breakdown spectroscopy

    Energy Technology Data Exchange (ETDEWEB)

    Stearns, Jaime A.; McElman, Sarah E.; Dodd, James A.

    2010-05-01

    Application of laser-induced breakdown spectroscopy (LIBS) to the identification of security threats is a growing area of research. This work presents LIBS spectra of vapor-phase chemical warfare agent simulants and typical rocket fuels. A large dataset of spectra was acquired using a variety of gas mixtures and background pressures and processed using partial least squares analysis. The five compounds studied were identified with a 99% success rate by the best method. The temporal behavior of the emission lines as a function of chamber pressure and gas mixture was also investigated, revealing some interesting trends that merit further study.

  2. Heat exchange during encapsulation in a Chemical-Warfare Agent Protective Patient Wrap in four hot environments. Technical report

    Energy Technology Data Exchange (ETDEWEB)

    Stephenson, L.A.; Kolka, M.A.; Allan, A.E.; Santee, W.R.

    1987-04-01

    The purpose of this study was to determine safe encapsulation time limits in four hot environments including a simulated solar heat load and thereby generate an equation predicting safe time limits for hot environments. Eight male subjects were studied during encapsulation in a Chemical Warfare Agent Protective Patient Wrap in each of four environments. Rectal temperature, mean skin temperature, mean body temperature air temperature and dew point temperature within the wrap and wrap temperature were measured every minute. Metabolic rate was measured during encapsulation by partitional calorimetry. The data shows that safe encapsulation time is severely limited in Hot/Dry and Hot/Wet environments when a solar heat load is included.

  3. Chemical Warfare Materiel in Sediment at a Deep-Water Discarded Military Munitions Site

    Science.gov (United States)

    Briggs, C. W.; Bissonnette, M. C.; Edwards, M.; Shjegstad, S. M.

    2016-12-01

    Understanding the release and transformation of chemical agent (CA) at underwater discarded military munitions (DMM) sites is essential to determine the potential risk to human health and impact on the ocean environment; yet few studies have been conducted at sites in excess of 250 m, the depth at which most U.S. CA munitions were disposed. Maritime construction workers installing cables or pipelines at a CA DMM site, as well as fishermen and scientific researchers deploying bottom-contact gear, represent possible exposure pathways to human receptors. The Hawai`i Undersea Military Munitions Assessment (HUMMA) sought to characterize a historic munitions sea-disposal site at depths between 400-650 m. During the 2014 HUMMA Sampling Survey, the Jason 2 remotely operated vehicle was used to collect sediments within two meters of suspected World War II chemical munitions, confirmed to be 100-lb M47 series bombs containing sulfur mustard. When environmental media was brought to the surface, samples were screened for distilled sulfur mustard (HD) and related agent breakdown products (ABP) (collectively referred to as chemical warfare materiel [CWM]). Detectable concentrations of HD and/or its ABP 1,4-dithiane were found in sediments collected at all CA DMM sites; HD was also detected at two control sites. The location and extent of munitions casing deterioration strongly influenced the distribution and level of CWM in sediment. The interior of the casing contained levels of CWM orders of magnitudes higher than that observed in the surrounding sediment at one meter distance, indicating the majority of the CWM is hydrolyzed as it is released from the munitions casing and a fraction of the fill materiel persists in the environment for decades following disposal. Although the potential for future site users to become exposed to CWA in recovered sediments and debris exists, the level of risk is significantly mitigated by the depth and location of the sea-disposal site.

  4. Tuning Mobility Separation Factors of Chemical Warfare Agent Degradation Products via Selective Ion-Neutral Clustering.

    Science.gov (United States)

    Kwantwi-Barima, Pearl; Ouyang, Hui; Hogan, Christopher J; Clowers, Brian H

    2017-11-21

    Combining experimental data with computational modeling, we illustrate the capacity of selective gas-phase interactions using neutral gas vapors to yield an additional dimension of gas-phase ion mobility separation. Not only are the mobility shifts as a function of neutral gas vapor concentration reproducible, but also the selective alteration of mobility separation factors is closely linked to existing chemical functional groups. Such information may prove advantageous in elucidating chemical class and resolving interferences. Using a set of chemical warfare agent simulants with nominally the same reduced mobility values as a test case, we illustrate the ability of the drift-gas doping approach to achieve separation of these analytes. In nitrogen, protonated forms of dimethyl methyl phosphonate (DMMP) and methyl phosphonic acid (MPA) exhibit the reduced mobility values of 1.99 ± 0.01 cm2 V-1s-1 at 175 °C. However, when the counter current drift gas of the system is doped with 2-propanol at 20 μL/h, full baseline resolution of the two species is possible. By varying the concentration of the neutral modifier, the separation factor of the respective clusters can be adjusted. For the two species examined and at a 2-propanol flow rate of 160 μL/h, MPA demonstrated the greatest shift in mobility (1.58 cm2V-1s-1) compared the DMMP monomer (1.63 cm2V-1s-1). Meanwhile, the DMMP dimer experienced no change in mobility (1.45 cm2V-1s-1). The enhancement of separation factors appears to be brought about by the differential clustering of neutral modifiers onto different ions and can be explained by a model which considers the transient binding of a single 2-propanol molecule during mobility measurements. Furthermore, the application of the binding models not only provides a thermodynamic foundation for the results obtained but also creates a predictive tool toward a quantitative approach.

  5. Heat exchange during encapsulation in a chemical warfare agent protective patient wrap in four hot environments

    Energy Technology Data Exchange (ETDEWEB)

    Stephenson, L.A.; Kolka, M.A.; Allan, A.E.; Santee, W.R.

    1988-04-01

    Tolerable encapsulation time in a Chemical Warfare Agent Protective Patient Wrap (dry insulative value = 1.44 clo; permeability index = 0.25) was determined in four hot environments including a simulated solar heat load (1152 W.m-2) for eight males. Mean body temperature (Tb), evaporative heat loss (EHL), dry heat gain (R + C), metabolic rate (M), and net heat flow (Msk) were measured or calculated from the heat balance equation. The ambient temperature (Ta) ranged from 54.7 degrees C (I) to 35.7 degrees C (IV) and the relative humidity ranged from 17% (I) to 63% (IV). EHL ranged from 173.5 W.m-2 (IV) to 277.8 W.m-2 (I) at min 30 of encapsulation. R + C ranged from -129 W.m-2 (IV) to -230 W.m-2 (I) at that time and Tb averaged 37.6(+/- 0.3) degrees C (IV) and 38.1(+/- 0.2) degrees C (I). The average time of encapsulation ranged from 61.8(+/- 0.2) degrees C (I). The average time of encapsulation ranged from 61.8(+/- 13.2) min (IV) to 38.4(+/- 5.0) min (I). A multiple linear regression equation to predict tolerable encapsulation was developed. These data show that tolerable encapsulation is severely limited in hot environments which have a marked solar heat load. A preliminary study (n = 2) indicated that encapsulation time in 54.7 degrees C/17%rh could be extended by some 23 min by covering the WRAP with wetted towels, thereby decreasing body heat storage by enhancing EHL from the surface of the WRAP.

  6. The Environment as an Operational Center of Gravity

    Science.gov (United States)

    1993-02-22

    The potential of means and methods of warfare to damage the environment is described from an historical and ecological domain (air, land, water, and...operational commander....DoD and the Environment in the 1990’s, Ecological Warfare, Limitations on the Operational Commander.

  7. Carbon Monoxide Information Center

    Medline Plus

    Full Text Available ... Education Centers Carbon Monoxide Information Center Carbon Monoxide Information Center En Español The Invisible Killer Carbon monoxide, ... Install one and check its batteries regularly. View Information About CO Alarms Other CO Topics Safety Tips ...

  8. Carbon Monoxide Information Center

    Medline Plus

    Full Text Available ... Education Safety Education Centers Carbon Monoxide Information Center Carbon Monoxide Information Center En Español The Invisible Killer Carbon monoxide, also known as CO, is called the "Invisible ...

  9. Womens Business Center

    Data.gov (United States)

    Small Business Administration — Women's Business Centers (WBCs) represent a national network of nearly 100 educational centers throughout the United States and its territories, which are designed...

  10. Carbon Monoxide Information Center

    Medline Plus

    Full Text Available ... OnSafety Blog Safety Education Centers Neighborhood Safety Network Community Outreach Resource Center Toy ... Research & Statistics Technical Reports Injury Statistics NEISS ...

  11. Southern California Particle Center

    Data.gov (United States)

    Federal Laboratory Consortium — At the Southern California Particle Center, center researchers will investigate the underlying mechanisms that produce the health effects associated with exposure to...

  12. Developmental Testing of Liquid and Gaseous/Vaporous Decontamination on Bacterial Spores and Other Biological Warfare Agents on Military Relevant Surfaces

    Science.gov (United States)

    2016-02-11

    Vaporous Decontamination on Bacterial Spores and Other Biological Warfare Agents on Military-Relevant Surfaces 5a. CONTRACT NUMBER 5b. GRANT...biological decontamination protocol to analyze the efficacy of liquid and gaseous/vaporous decontaminants on military-relevant surfaces. The...acquisition program, and are not intended for operational testing. 15. SUBJECT TERMS Decontaminant ; spore-forming; vegetative; virus

  13. System architecture and operational analysis of medium displacement unmanned surface vehicle sea hunter as a surface warfare component of distributed lethality

    Science.gov (United States)

    2017-06-01

    NAVAL POSTGRADUATE SCHOOL MONTEREY, CALIFORNIA THESIS Approved for public release. Distribution is unlimited. SYSTEM ARCHITECTURE ...TITLE AND SUBTITLE SYSTEM ARCHITECTURE AND OPERATIONAL ANALYSIS OF MEDIUM DISPLACEMENT UNMANNED SURFACE VEHICLE SEA HUNTER AS A SURFACE WARFARE...traceability, requirements and capabilities while determining the architecture framework in accordance with the Department of Defense Architectural

  14. The United States Navy’s Ability to Counter the Diesel and Nuclear Submarine Threat With Long-Range Antisubmarine Warfare Aircraft

    Science.gov (United States)

    2002-05-31

    patrol have a future? U.S. Naval Institute Proceedings, April, 74-77. Knowles , John. 1998. Out of the blue: Airborne maritime patrol goes littoral...Naval Intelligence, 13 April. _________. 1999b. Submarine warfare in the 21st century. Statement of Rear Admiral Malcom I. Fages, USN, Director of

  15. Proceedings of the 4th Workshop on ICT Uses in Warfare and the Safeguarding of Peace 2012 (IWSP 2012), Protea Hotel Balalaika, Sandton, 16 August 2012

    CSIR Research Space (South Africa)

    Van Niekerk, B

    2012-07-01

    Full Text Available been developed by South Africans in order to meet the challenges delivered by globalisation in terms of information security. The workshop will be hosted by the CSIR Defence, Peace, Safety and Security s (DPSS) Command, Control, and Information Warfare...

  16. Impact of psychological problems in chemical warfare survivors with severe ophthalmologic complication, a cross sectional study

    Directory of Open Access Journals (Sweden)

    Ghaedi Gholamhosein

    2012-04-01

    Full Text Available Abstract Background Sulfur mustard (SM has been used as a chemical warfare agent since the early twentieth century. Despite the large number of studies that have investigated SM induced ocular injuries, few of those studies have also focused on the psychological health status of victims. This study has evaluated the most prominent influences on the psychological health status of patients with severe SM induced ocular injuries. Methods This descriptive study was conducted on 149 Iranian war veterans with severe SM induced eye injuries. The psychological health status of all patients was assessed using the Iranian standardized Symptom Check List 90-Revised (SCL90-R questionnaire. The results of patients' Global Severity Index (GSI were compared with the optimal cut-off point of 0.4 that has previously been calculated for GSI in Iranian community. The Mann-Whitney U test, T tests and effect sizes (using Cohen's d were employed as statistical methods. Data were analyzed using SPSS software. Results The mean age of patients was 44.86 (SD = 8.7 and mean duration of disease was 21.58 (SD = 1.20 years. Rate of exposure was once in 99 (66.4% cases. The mean GSI (1.46 of the study group was higher compared to standardized cut off point (0.4 of the Iranian community. The results of this study showed that the mean of total GSI score was higher in participants with lower educational levels (effect size = 0.507, unemployment (effect size = 0.464 and having more than 3 children (effect size = 0.62. Among the participants, 87 (58.4% cases had a positive psychological history for hospitalization or receiving outpatient cares previously and 62 (41.6% cases had a negative psychological history. In addition, the mean of GSI in participants with negative psychological history was lower than those with positive psychological history (Mean Change Difference = -0.621 with SD = 0.120. There was a significant difference between positive and negative psychological history

  17. Exposures recorded for participants in the UK Chemical Warfare Agent Human Research Programme, 1941-1989.

    Science.gov (United States)

    Keegan, T J; Walker, S A S; Brooks, C; Langdon, T; Linsell, L; Maconochie, N E S; Doyle, P; Fletcher, T; Nieuwenhuijsen, M J; Carpenter, L M; Venables, K M

    2009-01-01

    This study describes exposures to military veterans who participated between 1941 and 1989 in British research at Porton Down on the effects of exposure to chemical warfare agents and to defences against those agents. The study is part of a programme of epidemiological research initiated in response to service veterans' concerns about possible long-term health effects of their participation. All entries in 97 books held in the Porton Down historical experimental archive covering the years 1939-1989 were reviewed. For tests between April 1941 and December 1989, data were abstracted on chemicals used, with additional detail abstracted for tests involving vesicants and nerve agents. For tests recorded during 1939-1941, similar data were abstracted for a representative sample of tests. Historical data were abstracted for 17 303 veterans included in the cohort study of 18,276 servicemen who took part in tests at Porton Down between 1941 and 1989. The median number of days per veteran on which tests were carried out was 2 days. The median difference between the last and first day of testing was 4 days. A large number of chemicals were tested over this period (n = 492). The type of chemical tested varied over time. Exposures were often modified by respirator use or use of protective clothing or protective equipment. It was possible to assign a quantitative measure of cumulative exposure to 73% of veterans exposed to the vesicant sulphur mustard--3491 (34%) of exposed veterans had cumulative exposures > or =10.63 mg and for 70% of veterans exposed to the nerve agent sarin--658 (29%) of exposed veterans had cumulative exposures > or =15.0 mg min m(-3). Ninety-three per cent of veterans exposed to sulphur mustard were classified to a semi-quantitative scale of dermal effect--3771 (37%) had a vesicle or necrosed area, and 69% of veterans exposed to sarin could be categorized by change in blood cholinesterase activity--1033 (31%) had a depression in cholinesterase activity of

  18. Anthropogenic landforms of warfare origin and their ecological significance: the Verdun Forest, NE France

    Science.gov (United States)

    De Matos Machado, Rémi; Amat, Jean-Paul; Arnaud-Fassetta, Gilles; Bétard, François; Bilodeau, Clélia; Jacquemot, Stéphanie; Toumazet, Jean-Pierre

    2017-04-01

    By its unprecedented industrial character, the First World War marked landscapes like no other conflict in the world. As a result of artillery bombardment and building facilities, the relief suffered major disturbances giving rise to millions anthropogenic landforms of warfare origin on the Western front: shell craters, trenches, shelters and gun sites. This landscape made of bumps and holes that dominated the lands of West Flanders and North-eastern France during the four years of war took chaotic aspects on the great battle sites. In some areas, substrate crushing by repeated bombings resulted in a field lowering of several metres. Although these geomorphological legacies of war are still present on these scarred lands, their effects on local environment and on present-day biodiversity patterns are not fully understood. On the battlefield of Verdun, where a huge number and range of conflict-induced landforms may be observed, special attention is being paid to the ecological significance of these anthropogenic landforms in a current landscape matrix dominated by forest. In 2013, an airborne LiDAR mission conducted over the battlefield has brought to light the relief inherited from the fighting that was until now concealed by the Verdun forest planted in the 1930's. Through a digital terrain model (DTM) with centimetre level accuracy, it is now possible to observe the smallest traces of the fighting. A first programmatic mapping work allowed to inventory and to locate these reliefs on the whole 10,000 hectares covered by the DTM. Also, the calculation of their geometry enabled us to quantify the erosion rate due to the military activities on the battlefield. On the basis of these morphometric measurements, a typology was developed to better appreciate the morphological diversity of conflict-induced landforms. The results show that these anthropogenic landforms are generally hollow. Because of this particular morphology, the conflict-induced landforms provide

  19. Estimating areas threatened by contamination from leaking chemical warfare agents dumped into the Baltic Sea

    Science.gov (United States)

    Jakacki, Jaromir; Przyborska, Anna; Andrzejewski, Jan

    2017-04-01

    Approximately 60,000 tons of chemical munitions were dumped into the Baltic Sea after World War II (the exact amount is unknown and some sources estimate it as more than 200,000 tons). Dumped munitions still pose a risk of leakage caused by erosion and corrosion, and it is important to know the danger areas. Because of wide dispersion of the dumped munitions, modelling is only one tool that could provide wide image of physical state of the sea at all locations and which could also be used for analysing contamination during a potential leakage. Obviously, it is possible to take samples at each dumpsite, but modelling also allows to develop possible scenarios of leakages under specific physical conditions. For the purpose of analysis of potential leakage a high-resolution model (HRM) of the contamination will be embedded in the hydrodynamic model (HM) of the Baltic Sea. The HRM will use data from general circulation model results of estimated resolution of nearly 2 km. The Parallel Ocean Program will be implemented as the HM for the whole Baltic Sea. Atmospheric data from regional implementation of the Weather Research and Forecasting System (WRF) have been used as the top boundary conditions of the HM, and sea level data from Gothenburg had been included into model barotropic equation as lateral boundary conditions. Passive tracer will represent the contamination in the HRM and horizontal resolution of the HRM will be close to 50 meters. Passive tracers will also be implemented in the HM - for comparison of the results. For proper representation of potential leakage of chemical warfare agents the HRM will have included diffusion and advection processes. The results from the HM are going to be interpolated into the HRM domain and then integration will be performed. Based on the implemented simulations, estimated contaminated area and its comparison from the HRM as well as from the HM will be presented. The research work was fund by the European Union (European

  20. Coalition Warfare Program (CWP): secure policy controlled information query and dissemination over a Bices network

    Science.gov (United States)

    Toth, Andrew; Pham, Tien; Karr, Todd; Bent, Graham; Harries, Dominic; Knox, Alan

    2013-05-01

    In 2006, the US Army Research Laboratory (ARL) and the UK Ministry of Defence (MoD) established a collaborative research alliance with academia and industry, called the International Technology Alliance (ITA) to address fundamental issues concerning Network and Information Sciences. Under the ITA research program, a US-UK transition project on "ITA Policy Controlled Information Query and Dissemination" was funded in 2011 by OSD's Coalition Warfare Program (CWP). The goal of this CWP project is to develop an extensible capability of performing distributed federated query and information dissemination across a coalition network of distributed disparate data/information sources with access­ controlled policies. The CWP project is lead by US Army Research Laboratory (ARL) and UK Defence Science Technology Laboratory (Dstl) with software development by IBM UK and IBM US. The CWP project exploits two key technology components developed within the ITA, namely the Gaian Database and integrated Access Policy Decision and Enforcement mechanisms. The Gaian Database (GaianDB) is a Dynamic Distributed Federated Database (DDFD) that addresses a need to share information among coalition members by providing a means for policy-controlled access to data across a network of heterogeneous data sources. GaianDB implements a SQL-compliant Store-Locally-Query-Anywhere (SLQA) approach providing software applications with global access to data from any node in the database network via standard SQL queries. Security policy is stored locally and enforced at the database node level, reducing potential for unauthorized data access and waste of network bandwidth. A key metric of success for a CWP project is the transition of coalition-related technology from TRL-3 or 4 to TRL-6 or higher. Thus, the end goal of this CWP project was to demonstrate the GaianDB and policy technology within an operational environment at the NATO Intelligence Fusion Centre (NIFC) at Molesworth RAF. An initial

  1. Capillary zone electrophoresis analysis and detection of mid-spectrum biological warfare agents. Suffield memorandum No. 1463

    Energy Technology Data Exchange (ETDEWEB)

    Boulet, C.A.

    1995-12-31

    Mid-spectrum biological warfare agents such as proteins, peptides, and toxins are often difficult to analyze and often require individually developed assay methods for detection and identification. In this regard, capillary electrophoresis is an important, emerging technique for separation and quantitation of peptides and proteins, providing separation efficiencies up to two orders of magnitude greater than high performance liquid chromatography. The technique can also analyze a broad range of compounds, has a simple instrument design which can be automated, and has low sample volume requirements. In this study, a highly efficient and reproducible capillary zone electrophoresis method was developed to separate and identify a series of nine peptides of defense interest including bradykinin, leucine enkephalin, and oxytocin. The paper demonstrates three strategies which could be used in a fully automated field detection and identification system for unknown peptides.

  2. NATO Advanced Research Workshop on Fluorescence and other Optical Properties of Biological Particles for Biological Warfare Agent Sensors

    CERN Document Server

    Hoekstra, Alfons; Videen, Gorden; Optics of Biological Particles

    2007-01-01

    This book covers the optics of single biological particles, both theory and experiment, with emphasis on Elastic Light Scattering and Fluorescence. It deals with the optics of bacteria (bio-aerosols), marine particles (selected phytoplankton communities) and red and white blood cells. Moreover, there are dedicated chapters on a general theory for scattering by a cell, and modelling and simulation of scattering by inhomogeneous biological cells. Finally, one chapter is dedicated to astro-biological signatures, discussing the possibilities for detecting non-terrestrial biological material. The volume has up-to-date discussions on new experimental and numerical techniques, and many examples of applications of these techniques in real-life systems, as used to detect and characterize e.g. biological warfare agents or human blood cells.

  3. Discrimination of chemical warfare simulants via multiplex coherent anti-Stokes Raman scattering and multivariate statistical analysis

    Science.gov (United States)

    Brady, John J.; Farrell, Mikella E.; Pellegrino, Paul M.

    2014-02-01

    Multiplex coherent anti-Stokes Raman scattering (MCARS) is used to detect several chemical warfare simulants, such as dimethyl methylphosphonate and 2-chloroethyl ethyl sulfide, with high specificity. The spectral bandwidth of the femtosecond laser pulse used in these studies is sufficient to coherently and simultaneously drive all the vibrational modes in the molecule of interest. Evidence shows that MCARS is capable of overcoming common sensitivity limitations of spontaneous Raman scattering, thus allowing for the detection of the target material in milliseconds with standard, uncooled universal serial bus spectrometers as opposed to seconds with cooled, intensified CCD-based spectrometers. In addition, the obtained MCARS spectrum of the investigated sample provides multiple unique signatures. These signatures are used in an off-line multivariate statistical analysis allowing for the material's discrimination with high fidelity.

  4. Biological warfare warriors, secrecy and pure science in the Cold War: how to understand dialogue and the classifications of science.

    Science.gov (United States)

    Bud, Robert

    2014-01-01

    This paper uses a case study from the Cold War to reflect on the meaning at the time of the term 'Pure Science'. In 1961, four senior scientists from Britain's biological warfare centre at Porton Down visited Moscow both attending an International Congress and visiting Russian microbiological and biochemical laboratories. The reports of the British scientists in talking about a limited range of topics encountered in the Soviet Union expressed qualities of openness, sociologists of the time associated with pure science. The paper reflects on the discourses of "Pure Science", secrecy and security in the Cold War. Using Bakhtin's approach, I suggest the cordial communication between scientists from opposing sides can be seen in terms of the performance, or speaking, of one language among several at their disposal. Pure science was the language they were allowed to share outside their institutions, and indeed political blocs.

  5. Wearable Atmospheric Pressure Plasma Fabrics Produced by Knitting Flexible Wire Electrodes for the Decontamination of Chemical Warfare Agents

    Science.gov (United States)

    Jung, Heesoo; Seo, Jin Ah; Choi, Seungki

    2017-01-01

    One of the key reasons for the limited use of atmospheric pressure plasma (APP) is its inability to treat non-flat, three-dimensional (3D) surface structures, such as electronic devices and the human body, because of the rigid electrode structure required. In this study, a new APP system design—wearable APP (WAPP)—that utilizes a knitting technique to assemble flexible co-axial wire electrodes into a large-area plasma fabric is presented. The WAPP device operates in ambient air with a fully enclosed power electrode and grounded outer electrode. The plasma fabric is flexible and lightweight, and it can be scaled up for larger areas, making it attractive for wearable APP applications. Here, we report the various plasma properties of the WAPP device and successful test results showing the decontamination of toxic chemical warfare agents, namely, mustard (HD), soman (GD), and nerve (VX) agents.

  6. Javelin; The Potential Beginning of a New Era in Land Warfare

    National Research Council Canada - National Science Library

    Sullivan, Dennis

    2001-01-01

    .... During numerous fielding tests, live fire tests, and force on force tests at the National Training Center, technological and tactical experts have closely monitored the performance of the Javelin...

  7. Find a Health Center

    Data.gov (United States)

    U.S. Department of Health & Human Services — HRSA Health Centers care for you, even if you have no health insurance – you pay what you can afford based on your income. Health centers provide services that...

  8. NIH Clinical Centers

    Data.gov (United States)

    Federal Laboratory Consortium — The NIH Clinical Center consists of two main facilities: The Mark O. Hatfield Clinical Research Center, which opened in 2005, houses inpatient units, day hospitals,...

  9. Center for Functional Nanomaterials

    Data.gov (United States)

    Federal Laboratory Consortium — The Center for Functional Nanomaterials (CFN) explores the unique properties of materials and processes at the nanoscale. The CFN is a user-oriented research center...

  10. Carbon Monoxide Information Center

    Medline Plus

    Full Text Available ... Center Carbon Monoxide Information Center En Español The Invisible Killer Carbon monoxide, also known as CO, is called the "Invisible Killer" because it's a colorless, odorless, poisonous gas. ...

  11. MARYLAND ROBOTICS CENTER

    Data.gov (United States)

    Federal Laboratory Consortium — The Maryland Robotics Center is an interdisciplinary research center housed in the Institute for Systems Research (link is external)within the A. James Clark School...

  12. Hydrologic Engineering Center

    Data.gov (United States)

    Federal Laboratory Consortium — The Hydrologic Engineering Center (HEC), an organization within the Institute for Water Resources, is the designated Center of Expertise for the U.S. Army Corps of...

  13. Day Care Centers

    Data.gov (United States)

    Department of Homeland Security — This database contains locations of day care centers for 50 states and Washington D.C. and Puerto Rico. The dataset only includes center based day care locations...

  14. Carbon Monoxide Information Center

    Medline Plus

    Full Text Available Skip to main content Languages 简体中文 English Bahasa ... Blog Safety Education Centers Neighborhood Safety Network Community Outreach Resource Center Toy Recall Statistics CO Poster ...

  15. Poison Control Centers

    Science.gov (United States)

    ... 1222 immediately. Name State American Association of Poison Control Centers Address AAPCC Central Office NOT A POISON ... not for emergency use. Arkansas ASPCA Animal Poison Control Center Address 1717 S. Philo Road, Suite 36 Urbana, ...

  16. RSW Cell Centered Grids

    Data.gov (United States)

    National Aeronautics and Space Administration — New cell centered grids are generated to complement the node-centered ones uploaded. Six tarballs containing the coarse, medium, and fine mixed-element and pure tet....

  17. Carbon Monoxide Information Center

    Medline Plus

    Full Text Available ... Resources OnSafety Blog Safety Education Centers Neighborhood Safety Network Community Outreach Resource Center Toy Recall Statistics CO Poster Contest Pool Safely Business & Manufacturing Business & Manufacturing Business Education Small Business Resources ...

  18. High Value Talent: Identifying, Developing, and Retaining Naval Special Warfare’s Best Leaders

    Science.gov (United States)

    2012-06-01

    will borrow the Center for Creative Leadership’s list of “strategies for creating developmental experiences.” These include developmental job...also takes the “whole family” approach to incentivizing its top performers. The company has established a daycare program in its Manhattan office...commitment to its employees by geographically centering the majority of its operations in the greater Dallas-Ft. Worth area. According to Mr

  19. A Theory of Revolutionary Warfare and its Application to the Bolivian Adventure of Che Guevara

    Science.gov (United States)

    1973-01-01

    Central Committee CUBANS Alejandro Gustavo R. Maohin Hoed de Beche (Tavo) Member of Center; Chief of Operations; because of ill- ness remained...of Vanguard Deserted Sep 26, 󈨇 arrested Not known Carlos Lorgio Vaoa Participant, exploratory maroh Drowned Mar 17, 󈨇, during march...training in Cuba Molses Nato Molses Guevara Rodriguez Julio Mendez Cano .Member of Center; later Joined the Rearguard; recrui ter Member of

  20. The Alpini Effect: Why the US Army Should Train Units for Mountain Warfare

    Science.gov (United States)

    2014-05-22

    Madagascar , Maldives, Malta, Marshall Islands , Mauritius, Micronesia, Nauru, New Zealand, Palau, Philippines, Qatar, Saint Kitts and Nevis, Saint...held territory in central Italy centered on Rome, the Kingdom of Piedmont-Sardinia held the island of Sardinia and northwestern Italy centered on...the city of Turin, and the Kingdom of Two Sicilies was located in southern Italy and the island of Sicily. 7

  1. “John A. MacMillan: Pioneer Missionary of Spiritual Warfare and the Believer’s Authority”

    Directory of Open Access Journals (Sweden)

    Paul King

    2016-01-01

    Full Text Available Many people associate teaching on spiritual warfare and the authority of the believer from charismatic or Word of Faith sources, especially like Kenneth Hagin. However, the original source of teaching on this doctrine comes from classic holiness roots in the Higher Life and Keswick movements, especially from John A. MacMillan, a missionary, writer, editor, and professor with the Christian and Missionary Alliance. In 1932 he wrote a series of articles entitled “The Authority of the Believer,” eventually published in book form, distributed widely and republished in other periodicals. MacMillan had a remarkable and extensive ministry in the exercise of the authority of the believer and spiritual warfare spanning more than thirty years. His experiences include divine protection, healing, divine intervention, power encounters with demonic forces, and teaching on territorial spirits and generational bondages. Numerous evangelical and charismatic leaders have quoted or referred to his teachings and principles.Banyak orang mengasosiasikan pengajaran peperangan rohani dan otoritas orang percaya dari karismatik atau sumber Firman Iman, terutama seperti Kenneth Hagin. Namun, sumber asli dari pengajaran doktrin ini berasal dari akar kekudusan klasik dalam gerakan Higher Life dan Keswick, terutama dari John A. MacMillan, seorang misionaris, penulis, editor, dan profesor dengan Christian and Missionary Alliance. Pada tahun 1932 ia menulis serangkaian artikel yang berjudul “Otoritas orang percaya,” akhirnya diterbitkan dalam bentuk buku, didistribusikan secara luas dan diterbitkan di majalah lainnya. MacMillan memiliki pelayanan yang luar biasa dan luas dalam pelaksanaan otoritas orang percaya dan peperangan rohani yang lebih dari tiga puluh tahun. Pengalamannya termasuk perlindungan ilahi, penyembuhan, campur tangan ilahi, pertemuan kuasa dengan kekuatan jahat, dan pengajaran tentang roh teritorial dan perbudakan generasi. Banyak pemimpin injili dan

  2. Carbon Monoxide Information Center

    Medline Plus

    Full Text Available ... and Bans Report an Unsafe Product Consumers Businesses Home Safety Education Safety Education Centers Carbon Monoxide Information Center Carbon ... All CO Safety Guides ")); jQuery(".node-type-safety-education-center ... Camping Equipment Home Heating Equipment On Safety Blogs: CO Safety More ...

  3. Mode Theory of Multi-Armed Spiral Antennas and Its Application to Electronic Warfare Antennas

    Science.gov (United States)

    Radway, Matthew J.

    Since their invention about 55 years ago, spiral antennas have earned a reputation for providing stable impedance and far-field patterns over multi-decade frequency ranges. For the first few decades these antennas were researched for electronic warfare receiving applications, primarily in the 2-18 GHz range. This research was often done under conditions of secrecy, and often by private contractors who did not readily share their research, and now have been defunct for decades. Even so, the body of literature on the two-armed variant of these antennas is rich, often leading non-specialists to the misconception that these antennas are completely understood. Furthermore, early work was highly experimental in nature, and was conducted before modern data collection and postprocessing capabilities were widespread, which limited the range of the studies. Recent research efforts have focused on extending the application of spirals into new areas, as well as applying exotic materials to `improve' their performance and reduce their size. While interesting results have been obtained, in most instances these were incomplete, often compromising the frequency independent nature of these antennas. This thesis expands the role of the multi-armed spiral outside of its traditional niche of receive-only monopulse direction finding. As a first step, careful study of the spiral-antenna mode theory is undertaken with particular attention paid to the concepts of mode filtering and modal decomposition. A technique for reducing the modal impedance of high arm-count spirals is introduced. The insights gained through this theoretical study are first used to improve the far-field performance of the coiled-arm spiral antenna. Specifically, expanding the number of arms on a coiled arm spiral from two to four while providing proper excitation enables dramatically improved broadside axial ratio and azimuthal pattern uniformity. The multiarming technique is then applied to the design of an antenna

  4. How Do I Know? A Guide to the Selection of Personal Protective Equipment for Use in Responding to A Release of Chemical Warfare Agents

    Energy Technology Data Exchange (ETDEWEB)

    Foust, C.B.

    1999-05-01

    An incident involving chemical warfare agents requires a unique hazardous materials (HAZMAT) response. As with an HAZMAT event, federal regulations prescribe that responders must be protected from exposure to the chemical agents. But unlike other HAZMAT events, special considerations govern selection of personal protective equipment (PPE). PPE includes all clothing, respirators and monitoring devices used to respond to a chemical release. PPE can differ depending on whether responders are military or civilian personnel.

  5. A New Approach to Organization and Implementation of Military Medical Treatment in Response to Military Reform and Modern Warfare in the Chinese Army.

    Science.gov (United States)

    Pei, Yang; Song, Yue; Yu, Min

    2017-11-01

    Recent system reforms within the People's Liberation Army (PLA) have led to establishment of 5 theatre commands and a general joint logistics command. These reforms have presented new challenges to the organization and implementation of medical services. The medical service of the PLA must keep pace with these reforms by applying innovative theories to establish appropriate organizational guidelines and structures. The medical service must also adapt to the modern and future eras of information warfare. We review the existing structure and features of the military medical service of the PLA, highlighting issues related to ongoing reform within the PLA and the characteristics of modern and future information warfare. Reflection on current rules for medical evacuation and treatment of war-related injuries were made, and related organizational and structural innovations were proposed. Recent reforms and the characteristics of modern information warfare have rendered the current medical service and medical evacuation system of the PLA inefficient. The scale of the echelon configuration should be adjusted to establish a more focused, effective, and intelligent medical service. Resource allocation and general joint logistics should be optimized to establish a new well-rounded, three-dimensional medical evacuation system, and the "stabilize before healing" rule should be applied at all levels of the medical service. These changes should help to create a modern, effective, and responsive medical service within the PLA. This article explores how the military medical service of the PLA could adapt to system reform in order to implement efficient treatment of war injuries, reduce mortality and morbidity rates, and maintain combat readiness in the modern era of information warfare. Reprint & Copyright © 2017 Association of Military Surgeons of the U.S.

  6. The Role and Values of Combat Leadership in Modern Warfare: Can Combat Leadership and Personal Leadership Skills be Replaced by Modern Technology?

    Science.gov (United States)

    2011-04-29

    FUNDING NUMBERS THE ROLE AND VALUE OF COMBAT LEADERSHIP IN ODERN WARFARE NIA CAN COMBAT LEADERSHIP AND PERSONAL LEADERSHIP SKILLS BE REPLACED BY MODERN...safer way than before, the role of commanders and the role of leadership are even more important than ever. The complexity of the modem battlefield...decisions requires strong and dynamic leadership skills. More distributed operations will make it impossible for the commander to be everywhere at the

  7. Combined Arms Warfare in the 21st Century: Maximizing the Capability of U.S. Army Future Combat System Equipped Brigade Combat Teams to Conduct Combined Arms Operations

    Science.gov (United States)

    2008-06-13

    was a form of fast moving, highly mobile armored warfare. The brain child of German officer General Heinz Guderian and others, German blitzkrieg...rear area quickly. Guderian served as a signal officer in World War I, and so understood the importance of radio communications. This experience... Guderian argued that the real value to be 52 gained from the use of tanks would be wasted if they were to be placed in infantry divisions. Instead

  8. Political Warfare in Sub-Saharan Africa: U.S. Capabilities and Chinese Operations in Ethiopia, Kenya, Nigeria, and South Africa

    Science.gov (United States)

    2007-03-01

    PRC government and completed by Chinese constructor workers, was delivered to the Addis Aba - ba city government. The project, with the first phase...warfare operations resulted in tan- gible benefits as well. In December 2003, the Gotera- Wollo Areas Road Project, located south of Addis Aba - 25 ba...Kenyan diplomatic relations, the PRC embassy in Kenya and the Kenyan Ministry of Gender, Sports , Culture, and Social Services sponsored an 8- day

  9. Relativistic Guiding Center Equations

    Energy Technology Data Exchange (ETDEWEB)

    White, R. B. [PPPL; Gobbin, M. [Euratom-ENEA Association

    2014-10-01

    In toroidal fusion devices it is relatively easy that electrons achieve relativistic velocities, so to simulate runaway electrons and other high energy phenomena a nonrelativistic guiding center formalism is not sufficient. Relativistic guiding center equations including flute mode time dependent field perturbations are derived. The same variables as used in a previous nonrelativistic guiding center code are adopted, so that a straightforward modifications of those equations can produce a relativistic version.

  10. Hybrid Threat Center of Gravity Analysis: Cutting the Gordian Knot

    Science.gov (United States)

    2016-04-04

    political contest, to military officers whose formal education was 20 U.S. Joint Chiefs of...warfare operations.”24 Russian cyber operations against Ukraine included a type of malware known as “ Snake .” The Snake “infections” targeted Ukrainian...of Gravity,” 23. 45 Third, Joint and Service doctrines and education programs need to account for hybrid threats and hybrid warfare in a

  11. Test Control Center (TCC)

    Data.gov (United States)

    Federal Laboratory Consortium — The Test Control Center (TCC) provides a consolidated facility for planning, coordinating, controlling, monitoring, and analyzing distributed test events. ,The TCC...

  12. Electron Microscopy Center (EMC)

    Data.gov (United States)

    Federal Laboratory Consortium — The Electron Microscopy Center (EMC) at Argonne National Laboratory develops and maintains unique capabilities for electron beam characterization and applies those...

  13. Center for Deployment Psychology

    Data.gov (United States)

    Federal Laboratory Consortium — The Center for Deployment Psychology was developed to promote the education of psychologists and other behavioral health specialists about issues pertaining to the...

  14. Great Lakes Science Center

    Data.gov (United States)

    Federal Laboratory Consortium — Since 1927, Great Lakes Science Center (GLSC) research has provided critical information for the sound management of Great Lakes fish populations and other important...

  15. Small Business Development Center

    Data.gov (United States)

    Small Business Administration — Small Business Development Centers (SBDCs) provide assistance to small businesses and aspiring entrepreneurs throughout the United States and its territories. SBDCs...

  16. Environmental Modeling Center

    Data.gov (United States)

    Federal Laboratory Consortium — The Environmental Modeling Center provides the computational tools to perform geostatistical analysis, to model ground water and atmospheric releases for comparison...

  17. Chemical Security Analysis Center

    Data.gov (United States)

    Federal Laboratory Consortium — In 2006, by Presidential Directive, DHS established the Chemical Security Analysis Center (CSAC) to identify and assess chemical threats and vulnerabilities in the...

  18. Audio Visual Center

    Data.gov (United States)

    Federal Laboratory Consortium — The Audiovisual Services Center provides still photographic documentation with laboratory support, video documentation, video editing, video duplication, photo/video...

  19. Bridging the Gap in the Realm of Information Dominance: A Concept of Operations for the Naval Postgraduate School Center for Cyber Warfare

    Science.gov (United States)

    2010-09-01

    learning. Hershey, Pennsylvania: IRM Press. Nonaka , I., & Takeuchi , H. (1995). The knowledge-creating company. New York, New York: Oxford University...transmittable in formal, systematic language whereas tacit knowledge is personal, context-specific, and therefore hard to formalize and communicate ( Nonaka ... Takeuchi , 1995). The key takeaway here is that to acquire this knowledge requires some form of learning. As suggested earlier, CCW has ECE

  20. The Abbott and Costello Effect: Who’s on What, and What’s Where When? A Human-Centered Method to Investigate Network Centric Warfare Systems

    Science.gov (United States)

    2007-09-01

    Bennis & Nanus , 1985; Bennis & Shepard, 1956; Bion, 1961; Schultz, 1958; Tuckman, 1965; Tuckman & Jenson, 1977). These models provide a...2003). Power to the edge: Command... control.., in the information age. Washington: Command & Control Research Program. Bennis , W.G. & Nanus , G... Bennis , W. G., & Shepard, H. A. (1956). A theory of group development. Human Relations, 9, 415-437. Bion, W. R. (1961). Experiences in groups

  1. MODFLOW-2005 and MT3DMS models used to design and evaluate a bioremediation experiment at the former Naval Air Warfare Center, West Trenton, NJ

    Data.gov (United States)

    U.S. Geological Survey, Department of the Interior — MODFLOW-2005 groundwater flow models and MT3DMS solute transport models were developed to represent conditions in the vicinity of a bioremediation experiment...

  2. Call Center Capacity Planning

    DEFF Research Database (Denmark)

    Nielsen, Thomas Bang

    The main topics of the thesis are theoretical and applied queueing theory within a call center setting. Call centers have in recent years become the main means of communication between customers and companies, and between citizens and public institutions. The extensively computerized infrastructu...

  3. Carbon Monoxide Information Center

    Medline Plus

    Full Text Available ... main content Languages 简体中文 English Bahasa Indonesia 한국어 Español ภาษาไทย Tiếng Việt Text Size: Decrease Font Increase ... Monoxide Information Center Carbon Monoxide Information Center En Español The Invisible Killer Carbon monoxide, also known as ...

  4. Dimensioning large call centers

    NARCIS (Netherlands)

    S.C. Borst (Sem); A. Mandelbaum; M.I. Reiman

    2000-01-01

    textabstractWe develop a framework for asymptotic optimization of a queueing system. The motivation is the staffing problem of call centers with 100's of agents (or more). Such a call center is modeled as an M/M/N queue, where the number of agents~$N$ is large. Within our framework, we determine the

  5. Warfare and Socio-political hierarchies: reflections on non-State societies of the predynastic Nile Valley

    Directory of Open Access Journals (Sweden)

    Gayubas, Augusto

    2015-12-01

    Full Text Available In a recent article, anthropologist Robert L. Carneiro reassessed his most debated hypothesis about the emergence of chiefdoms and the State as a result of environmental or social circumscription, theorized for a series of historical contexts including that of the Predynastic Nile Valley. The problem of the origin of the State is beyond our scope, but regarding the emergence of institutionalized leadership and chiefdoms in the Nile Valley, Carneiro’s ideas about warfare as a main factor in the process of social change remain interesting, even when his insistence in circumscription is still debatable. The aim of the present paper is to briefly review the available archaeological evidence of warfare among non-State societies of the Predynastic Nile Valley, and to evaluate its possible relation to the emergence of socio-political hierarchies, in turn refering to and criticizing some of Carneiro’s recent ideas about the issue.En un artículo reciente, Robert L. Carneiro presentó una reconsideración de su muy debatida hipótesis acerca de la emergencia de sociedades de jefatura y del Estado como resultado de un contexto de circunscripción ambiental, teorizada para una serie de situaciones históricas, entre ellas el valle del Nilo predinástico. El problema del origen del Estado excede las posibilidades de este trabajo, pero en lo que respecta al surgimiento de jefaturas, consideramos que las ideas de Carneiro acerca de la guerra como factor de importancia en el proceso revisten cierto interés, aun cuando su insistencia en la circunscripción continúa siendo discutible. El objetivo del presente artículo es considerar la evidencia arqueológica de guerra disponible para las sociedades no estatales del valle del Nilo predinástico y evaluar la posible relación entre dichos testimonios y la emergencia de jerarquías sociopolíticas, refiriendo y criticando algunas de las ideas recientes de Carneiro sobre el problema.

  6. HRSA: Find a Health Center

    Science.gov (United States)

    ... and Seasonal Head Start Center (MSHS) HELP: HRSA Contact Center is available at 877-464-4772, 8 a. ... p.m. ET, weekdays (except federal holidays) HRSA Contact Center Close × Center Name Close Close Panel OPOs Transplant ...

  7. PTSD: National Center for PTSD

    Medline Plus

    Full Text Available ... Locator Hospitals and Clinics Vet Centers Regional Benefits Offices Regional Loan Centers Cemetery Locations Search Enter your ... Clinic Locations Hospitals & Clinics Vet Centers Regional Benefits Offices Regional Loan Centers Cemetery Locations Contact Us FAQs ...

  8. A Need for Systems Architecture Approach for Next Generation Mine Warfare Capability

    Science.gov (United States)

    2006-09-01

    Naval Historical Center. 17 Michael Palmer (1992). Guardians of the Gulf. [Photograph], Free Press, New York. 18 Following operations in the Suez...operation. If not they must be airlifted by C-5 Galaxy aircraft, or transported by a surface vessel. When conducting operations, AMCM forces sacrifice...Palmer, M. (1992). Guardians of the Gulf. [Photograph], Free Press, New York. Petroski, H (1992). To Engineer is Human: The Role of Failure in

  9. New Bottom Roughness Calculation from Multibeam Echo Sounders for Mine Warfare

    Science.gov (United States)

    2012-09-01

    Oceanographic Office, 1002 Balch Blvd Stennis Space Center, MS 39529; Office of Naval Research /CRUSER 10. SPONSORING/MONITORING AGENCY REPORT...complex including craters, gullies, seaweed , rocks, sand ridges, tall obstructions, deep holes and sloping regions. Underwater mines can be hidden...and shadows for detecting objects lying on the seafloor. The seafloor is rather complex including craters, gullies, seaweed , rocks, sand ridges, tall

  10. The Rapier or the Club: The Relationship between Attrition and Maneuver Warfare

    Science.gov (United States)

    2006-03-15

    falls back on its resource centers. Harsh terrain, mountains , jungles, and large urban areas, offer many of the same opportunities as large areas...the East were facing each other outside Petersburg and those in the West were at Kennesaw Mountain , northwest of Atlanta.30 With all armies short of...Ferdinand Foch, a Frenchman , supreme commander. This produced much better coordination between the Allied forces. Third, the Allies possessed greater

  11. CYBER WARFARE GOVERNANCE: EVALUATION OF CURRENT INTERNATIONAL AGREEMENTS ON THE OFFENSIVE USE OF CYBER

    Science.gov (United States)

    2015-10-01

    Herzog uses the success of the attacks to point out that the globalization of the internet will require multinational agreements in order to effectively...Journal. Jan 60, 211. 4 Herzog , S. Revisiting the Estonian Cyber Attacks: Digital Threats and Multinational Responses. Journal of Strategic Security...and Operational Law Department, The United States Army Judge advocate General’s Legal Center and School. Charlottesville VA. 2012 15 Herzog , S

  12. Energy efficient data centers

    Energy Technology Data Exchange (ETDEWEB)

    Tschudi, William; Xu, Tengfang; Sartor, Dale; Koomey, Jon; Nordman, Bruce; Sezgen, Osman

    2004-03-30

    Data Center facilities, prevalent in many industries and institutions are essential to California's economy. Energy intensive data centers are crucial to California's industries, and many other institutions (such as universities) in the state, and they play an important role in the constantly evolving communications industry. To better understand the impact of the energy requirements and energy efficiency improvement potential in these facilities, the California Energy Commission's PIER Industrial Program initiated this project with two primary focus areas: First, to characterize current data center electricity use; and secondly, to develop a research ''roadmap'' defining and prioritizing possible future public interest research and deployment efforts that would improve energy efficiency. Although there are many opinions concerning the energy intensity of data centers and the aggregate effect on California's electrical power systems, there is very little publicly available information. Through this project, actual energy consumption at its end use was measured in a number of data centers. This benchmark data was documented in case study reports, along with site-specific energy efficiency recommendations. Additionally, other data center energy benchmarks were obtained through synergistic projects, prior PG&E studies, and industry contacts. In total, energy benchmarks for sixteen data centers were obtained. For this project, a broad definition of ''data center'' was adopted which included internet hosting, corporate, institutional, governmental, educational and other miscellaneous data centers. Typically these facilities require specialized infrastructure to provide high quality power and cooling for IT equipment. All of these data center types were considered in the development of an estimate of the total power consumption in California. Finally, a research ''roadmap'' was developed

  13. Relative Lyapunov Center Bifurcations

    DEFF Research Database (Denmark)

    Wulff, Claudia; Schilder, Frank

    2014-01-01

    Relative equilibria (REs) and relative periodic orbits (RPOs) are ubiquitous in symmetric Hamiltonian systems and occur, for example, in celestial mechanics, molecular dynamics, and rigid body motion. REs are equilibria, and RPOs are periodic orbits of the symmetry reduced system. Relative Lyapunov...... center bifurcations are bifurcations of RPOs from REs corresponding to Lyapunov center bifurcations of the symmetry reduced dynamics. In this paper we first prove a relative Lyapunov center theorem by combining recent results on the persistence of RPOs in Hamiltonian systems with a symmetric Lyapunov...

  14. The application of single particle aerosol mass spectrometry for the detection and identification of high explosives and chemical warfare agents

    Energy Technology Data Exchange (ETDEWEB)

    Martin, Audrey Noreen [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States)

    2006-01-01

    Single Particle Aerosol Mass Spectrometry (SPAMS) was evaluated as a real-time detection technique for single particles of high explosives. Dual-polarity time-of-flight mass spectra were obtained for samples of 2,4,6-trinitrotoluene (TNT), 1,3,5-trinitro-1,3,5-triazinane (RDX), and pentaerythritol tetranitrate (PETN); peaks indicative of each compound were identified. Composite explosives, Comp B, Semtex 1A, and Semtex 1H were also analyzed, and peaks due to the explosive components of each sample were present in each spectrum. Mass spectral variability with laser fluence is discussed. The ability of the SPAMS system to identify explosive components in a single complex explosive particle (~1 pg) without the need for consumables is demonstrated. SPAMS was also applied to the detection of Chemical Warfare Agent (CWA) simulants in the liquid and vapor phases. Liquid simulants for sarin, cyclosarin, tabun, and VX were analyzed; peaks indicative of each simulant were identified. Vapor phase CWA simulants were adsorbed onto alumina, silica, Zeolite, activated carbon, and metal powders which were directly analyzed using SPAMS. The use of metal powders as adsorbent materials was especially useful in the analysis of triethyl phosphate (TEP), a VX stimulant, which was undetectable using SPAMS in the liquid phase. The capability of SPAMS to detect high explosives and CWA simulants using one set of operational conditions is established.

  15. Extraordinary Adaptive Plasticity of Colorado Potato Beetle: “Ten-Striped Spearman” in the Era of Biotechnological Warfare

    Directory of Open Access Journals (Sweden)

    Aleksandar Cingel

    2016-09-01

    Full Text Available Expanding from remote areas of Mexico to a worldwide scale, the ten-striped insect, the Colorado potato beetle (CPB, Leptinotarsa decemlineata Say, has risen from being an innocuous beetle to a prominent global pest. A diverse life cycle, phenotypic plasticity, adaptation to adverse conditions, and capability to detoxify or tolerate toxins make this insect appear to be virtually “indestructible”. With increasing advances in molecular biology, tools of biotechnological warfare were deployed to combat CPB. In the last three decades, genetically modified potato has created a new challenge for the beetle. After reviewing hundreds of scientific papers dealing with CPB control, it became clear that even biotechnological means of control, if used alone, would not defeat the Colorado potato beetle. This control measure once again appears to be provoking the potato beetle to exhibit its remarkable adaptability. Nonetheless, the potential for adaptation to these techniques has increased our knowledge of this pest and thus opened possibilities for devising more sustainable CPB management programs.

  16. In Situ Probes of Capture and Decomposition of Chemical Warfare Agent Simulants by Zr-Based Metal Organic Frameworks

    Energy Technology Data Exchange (ETDEWEB)

    Plonka, Anna M.; Wang, Qi; Gordon, Wesley O.; Balboa, Alex; Troya, Diego; Guo, Weiwei; Sharp, Conor H.; Senanayake, Sanjaya D.; Morris, John R.; Hill, Craig L.; Frenkel, Anatoly I. (BNL); (Virginia Tech); (ECBC); (Emory); (SBU)

    2017-01-18

    Zr-based metal organic frameworks (MOFs) have been recently shown to be among the fastest catalysts of nerve-agent hydrolysis in solution. We report a detailed study of the adsorption and decomposition of a nerve-agent simulant, dimethyl methylphosphonate (DMMP), on UiO-66, UiO-67, MOF-808, and NU-1000 using synchrotron-based X-ray powder diffraction, X-ray absorption, and infrared spectroscopy, which reveals key aspects of the reaction mechanism. The diffraction measurements indicate that all four MOFs adsorb DMMP (introduced at atmospheric pressures through a flow of helium or air) within the pore space. In addition, the combination of X-ray absorption and infrared spectra suggests direct coordination of DMMP to the Zr6 cores of all MOFs, which ultimately leads to decomposition to phosphonate products. These experimental probes into the mechanism of adsorption and decomposition of chemical warfare agent simulants on Zr-based MOFs open new opportunities in rational design of new and superior decontamination materials.

  17. Express analysis of explosives, chemical warfare agents and drugs with multicapillary column gas chromatography and ion mobility increment spectrometry.

    Science.gov (United States)

    Buryakov, Igor A

    2004-02-05

    Description of a gas chromatograph designed for express analysis of explosives (2,4-dinitrotoluene, 2,4,6-trinitrotoluene, pentaerythritol tetranitrate), chemical warfare agents (mustard gas, lewisite, sarin) and drugs (heroin, cocaine hydrochloride, crack) is given. The devices comprises a multicapillary chromatographic column and an ion mobility increment spectrometer (MCC-IMIS). The main analytical characteristics of an IMIS (estimated detection limit (DL), linear dynamic range (LDR), speed of response) and a chromatographic column (separation power, degree of separation, a number of possible peaks at a chromatogram section, divided by analysis time) are determined. The maximum value of DL equal to 5 pg/ml was registered for cis-alpha-LW, and the lowest one of 0.001 pg/ml was for cocaine. The maximum value of LDR equal to 1000 was registered for sarin and the lowest one of 150 was for the ions of lewisite. Speed of response of one compound detection with the IMIS was 0.7 s.

  18. A Polyoxoniobate-Polyoxovanadate Double-Anion Catalyst for Simultaneous Oxidative and Hydrolytic Decontamination of Chemical Warfare Agent Simulants.

    Science.gov (United States)

    Dong, Jing; Hu, Jufang; Chi, Yingnan; Lin, Zhengguo; Zou, Bo; Yang, Song; Hill, Craig L; Hu, Changwen

    2017-04-10

    A novel double-anion complex, H13 [(CH3 )4 N]12 [PNb12 O40 (VV O)2 ⋅(VIV4 O12 )2 ]⋅22 H2 O (1), based on bicapped polyoxoniobate and tetranuclear polyoxovanadate was synthesized, characterized by routine techniques and used in the catalytic decontamination of chemical warfare agents. Under mild conditions, 1 catalyzes both hydrolysis of the nerve agent simulant, diethyl cyanophosphonate (DECP) and selective oxidation of the sulfur mustard simulant, 2-chloroethyl ethyl sulfide (CEES). In the oxidative decontamination system 100 % CEES was transformed selectively to nontoxic 2-chloroethyl ethyl sulfoxide and vinyl ethyl sulfoxide using nearly stoichiometric 3 % aqueous H2 O2 with a turnover frequency (TOF) of 16 000 h-1 . Importantly, the catalytic activity is maintained even after ten recycles and CEES is completely decontaminated in 3 mins without formation of the highly toxic sulfone by-product. A three-step oxidative mechanism is proposed. © 2017 Wiley-VCH Verlag GmbH & Co. KGaA, Weinheim.

  19. Facility monitoring of chemical warfare agent simulants in air using an automated, field-deployable, miniature mass spectrometer.

    Science.gov (United States)

    Smith, Jonell N; Noll, Robert J; Cooks, R Graham

    2011-05-30

    Vapors of four chemical warfare agent (CWA) stimulants, 2-chloroethyl ethyl sulfide (CEES), diethyl malonate (DEM), dimethyl methylphosphonate (DMMP), and methyl salicylate (MeS), were detected, identified, and quantitated using a fully automated, field-deployable, miniature mass spectrometer. Samples were ionized using a glow discharge electron ionization (GDEI) source, and ions were mass analyzed with a cylindrical ion trap (CIT) mass analyzer. A dual-tube thermal desorption system was used to trap compounds on 50:50 Tenax TA/Carboxen 569 sorbent before their thermal release. The sample concentrations ranged from low parts per billion [ppb] to two parts per million [ppm]. Limits of detection (LODs) ranged from 0.26 to 5.0 ppb. Receiver operating characteristic (ROC) curves are presented for each analyte. A sample of CEES at low ppb concentration was combined separately with two interferents, bleach (saturated vapor) and diesel fuel exhaust (1%), as a way to explore the capability of detecting the simulant in an environmental matrix. Also investigated was a mixture of the four CWA simulants (at concentrations in air ranging from 270 to 380 ppb). Tandem mass (MS/MS) spectral data were used to identify and quantify the individual components. Copyright © 2011 John Wiley & Sons, Ltd.

  20. Decontamination of chemical-warfare agent simulants by polymer surfaces doped with the singlet oxygen generator zinc octaphenoxyphthalocyanine.

    Science.gov (United States)

    Gephart, Raymond T; Coneski, Peter N; Wynne, James H

    2013-10-23

    Using reactive singlet oxygen (1O2), the oxidation of chemical-warfare agent (CWA) simulants has been demonstrated. The zinc octaphenoxyphthalocyanine (ZnOPPc) complex was demonstrated to be an efficient photosensitizer for converting molecular oxygen (O2) to 1O2 using broad-spectrum light (450-800 nm) from a 250 W halogen lamp. This photosensitization produces 1O2 in solution as well as within polymer matrices. The oxidation of 1-naphthol to naphthoquinone was used to monitor the rate of 1O2 generation in the commercially available polymer film Hydrothane that incorporates ZnOPPc. Using electrospinning, nanofibers of ZnOPPc in Hydrothane and polycarbonate were formed and analyzed for their ability to oxidize demeton-S, a CWA simulant, on the surface of the polymers and were found to have similar reactivity as their corresponding films. The Hydrothane films were then used to oxidize CWA simulants malathion, 2-chloroethyl phenyl sulfide (CEPS), and 2-chloroethyl ethyl sulfide (CEES). Through this oxidation process, the CWA simulants are converted into less toxic compounds, thus decontaminating the surface using only O2 from the air and light.

  1. Child Soldiery as a Tool of Modern Warfare(?: the Role of Child Soldiers in “New Wars”

    Directory of Open Access Journals (Sweden)

    Dóra SZIJJ

    2010-12-01

    Full Text Available The hardly-known but regrettably prevalent phenomenon of child soldiery, which can be considered as a new development of modern warfare, might affect approximately 250,000 – 300,000 children worldwide. According to the estimates, 40% of our planet’s armed forces or armed groups deploy “child combatants” for different tasks, while the international community is still struggling against this form of the abuse of children. The global nature of child soldiery raises many questions in many fields, because it has deep political, social, economic, military, environmental, ethnic and religious etc. roots and far reaching consequences in the so-called Third World. Moreover, if we focus on the African peacekeeping missions of the European Union, child soldiery might also have indirect impacts on the European community. The aim of this study is to offer a comprehensive approach in connection with child soldiery, and pointing out the links between the post-colonial conflicts and this form of human rights breaches.

  2. Transport behavior of surrogate biological warfare agents in a simulated landfill: Effect of leachate recirculation and water infiltration

    KAUST Repository

    Saikaly, Pascal

    2010-11-15

    An understanding of the transport behavior of biological warfare (BW) agents in landfills is required to evaluate the suitability of landfills for the disposal of building decontamination residue (BDR) following a bioterrorist attack on a building. Surrogate BW agents, Bacillus atrophaeus spores and Serratia marcescens, were spiked into simulated landfill reactors that were filled with synthetic building debris (SBD) and operated for 4 months with leachate recirculation or water infiltration. Quantitative polymerase chain reaction (Q-PCR) was used to monitor surrogate transport. In the leachate recirculation reactors, <10% of spiked surrogates were eluted in leachate over 4 months. In contrast, 45% and 31% of spiked S. marcescens and B. atrophaeus spores were eluted in leachate in the water infiltration reactors. At the termination of the experiment, the number of retained cells and spores in SBD was measured over the depth of the reactor. Less than 3% of the total spiked S. marcescens cells and no B. atrophaeus spores were detected in SBD. These results suggest that significant fractions of the spiked surrogates were strongly attached to SBD. © 2010 American Chemical Society.

  3. Evaluation of Chemical Warfare Agent Percutaneous Vapor Toxicity: Derivation of Toxicity Guidelines for Assessing Chemical Protective Ensembles.

    Energy Technology Data Exchange (ETDEWEB)

    Watson, A.P.

    2003-07-24

    Percutaneous vapor toxicity guidelines are provided for assessment and selection of chemical protective ensembles (CPEs) to be used by civilian and military first responders operating in a chemical warfare agent vapor environment. The agents evaluated include the G-series and VX nerve agents, the vesicant sulfur mustard (agent HD) and, to a lesser extent, the vesicant Lewisite (agent L). The focus of this evaluation is percutaneous vapor permeation of CPEs and the resulting skin absorption, as inhalation and ocular exposures are assumed to be largely eliminated through use of SCBA and full-face protective masks. Selection of appropriately protective CPE designs and materials incorporates a variety of test parameters to ensure operability, practicality, and adequacy. One aspect of adequacy assessment should be based on systems tests, which focus on effective protection of the most vulnerable body regions (e.g., the groin area), as identified in this analysis. The toxicity range of agent-specific cumulative exposures (Cts) derived in this analysis can be used as decision guidelines for CPE acceptance, in conjunction with weighting consideration towards more susceptible body regions. This toxicity range is bounded by the percutaneous vapor estimated minimal effect (EME{sub pv}) Ct (as the lower end) and the 1% population threshold effect (ECt{sub 01}) estimate. Assumptions of exposure duration used in CPE certification should consider that each agent-specific percutaneous vapor cumulative exposure Ct for a given endpoint is a constant for exposure durations between 30 min and 2 hours.

  4. From energy-rich phosphate compounds to warfare agents: A review on the chemistry of organic phosphate compounds

    Directory of Open Access Journals (Sweden)

    Luciano Albino Giusti

    2008-12-01

    Full Text Available The chemistry of the phosphorus-oxygen bond is widely used in biological systems in many processes, such as energy transduction and the storage, transmission and expression of genetic information, which are essential to living beings in relation to a wide variety of functions. Compounds containing this bond have been designed for many purposes, ranging from agricultural defense systems, in order to increase food production, to nerve agents, for complaining use in warfare. In this review, features related to the chemistry of organic phosphate compounds are discussed, with particular emphasis on the role of phosphate compounds in biochemical events and in nerve agents. To this aim, the energy-rich phosphate compounds are focused, particularly the mode of their use as energy currency in cells. Historical and recent studies carried out by research groups have tried to elucidate the mechanism of action of enzymes responsible for energy transduction through the use of biochemical studies, enzyme models, and artificial enzymes. Finally, recent studies on the detoxification of nerve agents based on phosphorous esters are presented, and on the utilization of chromogenic and fluorogenic chemosensors for the detection of these phosphate species.

  5. Navy Warfare Development Command’s NEXT Magazine, Spring 2014 Edition. Volume 2, Number 1

    Science.gov (United States)

    2014-05-01

    m~plqy pr«i:ion """ apron :. (tlld ~rm barrk> damag" a:sfl:-sm.gnt. (U..S. ,.IQ\\.)’ photo by Kun L0tg{lllkf~IU1«SSN) 14 nEXT SPRING2014 lead <o an...result of NWDC’s role as the lead agent for Concept Generation and Concept Development (CGCD) and it’s role as the Navy’s Center for Innovation. Perssonel...Concept Development (CGCO). Navy Watfare Development Command {NWOC) is designated as the lead agent fo.r CGCD. Our cover story on the Distributed

  6. Application of Polynomial Neural Networks to Classification of Acoustic Warfare Signals

    Science.gov (United States)

    1993-04-01

    fcf’𔄁IC nf20 uqe o.’ C eouinq thil b4𔃺*e to yWash’nOntq .1u0tos Svverl’ t. O’at r ;0, rl’ -f’ Of 0ly ,"non s *( O no 4’ W~c’mt 1)$ ’T .c~qOuQ~O ’ llno...Report NOSC TD 1855, Naval Ocean Systems Center, San Diego, May, 1990. [34] Ghosh, J., L. Deuser, and S. Beck, "A neural network based hybrid system

  7. Center Innovation Fund Program

    Data.gov (United States)

    National Aeronautics and Space Administration — To stimulate and encourage creativity and innovation within the NASA Centers. The activities are envisioned to fall within the scope of NASA Space Technology or...

  8. FEMA Disaster Recovery Centers

    Data.gov (United States)

    Department of Homeland Security — This is a search site for FEMA's Disaster Recovery Centers (DRC). A DRC is a readily accessible facility or mobile office set up by FEMA where applicants may go for...

  9. Center for Contaminated Sediments

    Data.gov (United States)

    Federal Laboratory Consortium — The U.S. Army Corps of Engineers Center for Contaminated Sediments serves as a clearinghouse for technology and expertise concerned with contaminated sediments. The...

  10. National Automotive Center - NAC

    Data.gov (United States)

    Federal Laboratory Consortium — Encouraged by the advantages of collaboration, the U.S. Army Tank Automotive Research, Development and Engineering Center (TARDEC) worked with the Secretary of the...

  11. Cooperative Tagging Center (CTC)

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — The Cooperative Tagging Center (CTC) began as the Cooperative Game Fish Tagging Program (GTP) at Woods Hole Oceanographic Institute (WHOI) in 1954. The GTP was...

  12. HUD Homeownership Centers

    Data.gov (United States)

    Department of Housing and Urban Development — HUD Homeownership Centers (HOCs) insure single family Federal Housing Administration (FHA) mortgages and oversee the selling of HUD homes. FHA has four Homeownership...

  13. Children's cancer centers

    Science.gov (United States)

    ... workers Mental health experts Therapists Child life workers Teachers Clergy Centers also offer many specific benefits such ... M. is also a founding member of Hi-Ethics and subscribes to the principles of the Health ...

  14. USU Patient Simulation Center

    Data.gov (United States)

    Federal Laboratory Consortium — he National Capital Area (NCA) Medical Simulation Center is a state-of-the-art training facility located near the main USU campus. It uses simulated patients (i.e.,...

  15. Center for Hydrogen Storage.

    Science.gov (United States)

    2013-06-01

    The main goals of this project were to (1) Establish a Center for Hydrogen Storage Research at Delaware State University for the preparation and characterization of selected complex metal hydrides and the determination their suitability for hydrogen ...

  16. Advanced Missile Signature Center

    Data.gov (United States)

    Federal Laboratory Consortium — The Advanced Missile Signature Center (AMSC) is a national facility supporting the Missile Defense Agency (MDA) and other DoD programs and customers with analysis,...

  17. Mobility Data Analytics Center.

    Science.gov (United States)

    2016-01-01

    Mobility Data Analytics Center aims at building a centralized data engine to efficiently manipulate : large-scale data for smart decision making. Integrating and learning the massive data are the key to : the data engine. The ultimate goal of underst...

  18. World Trade Center

    Index Scriptorium Estoniae

    2006-01-01

    Esilinastus katastroofifilm "World Trade Center" : stsenarist Andrea Berloff : režissöör Oliver Stone : kunstnik Jan Roelfs : osades Nicholas Cage, Michael Pena, Stephen Dorff jpt : Ameerika Ühendriigid 2006. Ka filmi prototüüpidest

  19. Mental Health Screening Center

    Science.gov (United States)

    ... Releases & Announcements Public Service Announcements Partnering with DBSA Mental Health Screening Center These online screening tools are not ... you have any concerns, see your doctor or mental health professional. Depression Screening for Adult Depression Screening for ...

  20. Global Hydrology Research Center

    Data.gov (United States)

    National Aeronautics and Space Administration — The GHRC is the data management and user services arm of the Global Hydrology and Climate Center. It encompasses the data and information management, supporting...

  1. Facility Focus: Athletic Centers.

    Science.gov (United States)

    College Planning & Management, 2002

    2002-01-01

    Describes the designs of the Jesse Owens Memorial Stadium at Ohio State University and the fitness center of Scottsdale Community College in Arizona. Discusses design goals and unique features and includes photographs. (EV)

  2. Carbon Monoxide Information Center

    Medline Plus

    Full Text Available ... CONSUMER PRODUCT SAFETY COMMISSION Search CPSC Search Menu Home Recalls Recall List CPSC Recall API Recall Lawsuits ... and Bans Report an Unsafe Product Consumers Businesses Home Safety Education Safety Education Centers Carbon Monoxide Information ...

  3. Accredited Birth Centers

    Science.gov (United States)

    ... Birthing Center-Cedar Park Accredited 1130 Cottonwood Creek Trail Building D Suite 2 Cedar Park, TX 78613 ... Health Accredited 29135 Ellensburg Avenue PO Box 1710 Gold Beach, OR 97444 541-425-5311 Accredited since ...

  4. Carbon Monoxide Information Center

    Medline Plus

    Full Text Available ... Community Outreach Resource Center Toy Recall Statistics CO Poster Contest Pool Safely Business & Manufacturing Business & Manufacturing Business ... Featured Resources CPSC announces winners of carbon monoxide poster contest Video View the blog Clues You Can ...

  5. Beringin Youth Center

    OpenAIRE

    Putra, Yogi Pratama

    2016-01-01

    Development Kualanamu International Airport will have an impact on the growth of a region. Regional growth requires improving the quality of human resources in the area. Beringin Youth Development Center in addition to a youth facility and infrastructure is also useful to improve the quality of the resource the youth, with youth activities are creative. In addition to local youth activities, Beringin Youth Center can be used to perform youth international scale, with mess facil...

  6. Centering device for casings

    Energy Technology Data Exchange (ETDEWEB)

    Abdulzade, A.M.G.; Aliyev, R.K.; Karash, E.B.; Mamedov, T.R.G.; Puzanov, A.N.; Yakobashvili, M.V.

    1982-01-01

    A centering device is proposed for casings consisting of 2 rings connected by spring planks, and bushing with support element. In order to improve operating reliability of the centering device in the twisted well, the support element of the bushing is made in a cross section in the form of an ellipse and on the outer surface has spiral slits. A support element can be made of elastic material.

  7. Koncepcija partizanskoj vojny v Litve v 1920— 1930-e gody [The concept of guerrilla warfare in Lithuania in the 1920—1930s

    Directory of Open Access Journals (Sweden)

    Jokubauskas Vytautas

    2012-01-01

    Full Text Available This article analyses the military and tactical training of the members of the Lithuanian Riflemen’s Union for guerrilla warfare in the interwar period. Small nations, such as Lithuania and other Baltic states, being unable to build up military strength in order to ensure national security, were forced to seek for unconventional methods of warfare, including guerrilla strategies. The study places emphasis on the development of the guerrilla war concept in the Union periodicals. The author retraces a change in the intensity of the guerrilla warfare concept propagation amongst Lithuanian population and riflemen, in particular, through publications in the Trimitas — a periodical of the Lithuanian Riflemen’s Union. The author also identifies the narratives associated with the guerrilla matters employed for propaganda purposes in order to create an image of a guerrilla as a defender of the Homeland — Lithuania. Additionally, the structure and numbers of the Union are analysed through a comparison with similar organisations of the other «small nations» of the Baltic North-East. The author addresses the issue of military missions planned by the Lithuanian Army, as well as the way riflemen implemented them. Since the Union did not only offer military training, but was also engaged in the patriotic propaganda, the article focuses on the network of cultural institutions, homes of riflemen, orchestras, libraries, choirs, and athletic clubs used by the Union. The article sets out to establish whether the loss of Lithuanian sovereignty could have been possible without giving rise to a protracted guerrilla war.

  8. "Infotonics Technology Center"

    Energy Technology Data Exchange (ETDEWEB)

    Fritzemeier, L. [Infotonics Technology Center Inc., Canandaigua, NY (United States); Boysel, M. B. [Infotonics Technology Center Inc., Canandaigua, NY (United States); Smith, D. R. [Infotonics Technology Center Inc., Canandaigua, NY (United States)

    2004-09-30

    During this grant period July 15, 2002 thru September 30, 2004, the Infotonics Technology Center developed the critical infrastructure and technical expertise necessary to accelerate the development of sensors, alternative lighting and power sources, and other specific subtopics of interest to Department of Energy. Infotonics fosters collaboration among industry, universities and government and operates as a national center of excellence to drive photonics and microsystems development and commercialization. A main goal of the Center is to establish a unique, world-class research and development facility. A state-of-the-art microsystems prototype and pilot fabrication facility was established to enable rapid commercialization of new products of particular interest to DOE. The Center has three primary areas of photonics and microsystems competency: device research and engineering, packaging and assembly, and prototype and pilot-scale fabrication. Center activities focused on next generation optical communication networks, advanced imaging and information sensors and systems, micro-fluidic systems, assembly and packaging technologies, and biochemical sensors. With targeted research programs guided by the wealth of expertise of Infotonics business and scientific staff, the fabrication and packaging facility supports and accelerates innovative technology development of special interest to DOE in support of its mission and strategic defense, energy, and science goals.

  9. Engineer Research and Development Center's Materials Testing Center (MTC)

    Data.gov (United States)

    Federal Laboratory Consortium — The Engineer Research and Development Center's Materials Testing Center (MTC) is committed to quality testing and inspection services that are delivered on time and...

  10. More Effective Warfare: Warfare Waged Psychologically

    Science.gov (United States)

    2012-06-01

    thus nationalizing Hezbollah and adding support to the movement.57 Consequently, a cruel paradox was discovered by Israel: “The more force is used to...Crude, 1st ed. (New York: Crown , 2003). 96 Individuals that were unlikely to support a terrorist organization now saw that Hezbollah was... Crown , 2003. Baldauf, Scott. "Taliban Turn to Suicide Attacks." Christian Science Monitor, February 3, 2006, sec. World. Bar, Shmuel. "Deterring

  11. Characterization of viscoelastic materials for low-magnitude blast mitigation

    Science.gov (United States)

    Bartyczak, S.; Mock, W.

    2014-05-01

    Recent research indicates that exposure to low amplitude blast waves, such as IED detonation or multiple firings of a weapon, causes damage to brain tissue resulting in Traumatic Brain Injury (TBI) and Post Traumatic Stress Disorder (PTSD). Current combat helmets are not sufficiently protecting warfighters from this danger and the effects are debilitating, costly, and long-lasting. The objective of the present work is to evaluate the blast mitigating behavior of current helmet materials and new materials designed for blast mitigation using a test fixture recently developed at the Naval Surface Warfare Center Dahlgren Division for use with an existing gas gun. The 40-mm-bore gas gun was used as a shock tube to generate blast waves (ranging from 0.5 to 2 bar) in the test fixture mounted on the gun muzzle. A fast opening valve was used to release helium gas from the breech which formed into a blast wave and impacted instrumented targets in the test fixture. Blast attenuation of selected materials was determined through the measurement of stress data in front of and behind the target. Materials evaluated in this research include polyurethane foam from currently fielded US Army and Marine Corps helmets, polyurea 1000, and three hardnesses of Sorbothane (48, 58, and 70 durometer, Shore 00). Polyurea 1000 and 6061-T6 aluminum were used to calibrate the stress gauges.

  12. Performance of reinforced polymer ablators exposed to a solid rocket motor exhaust. Technical report

    Energy Technology Data Exchange (ETDEWEB)

    Boyer, C.; Burgess, T.; Bowen, J.; Deloach, K.; Talmy, I.

    1992-10-01

    Summarized in this report is the effort by the Naval Surface Warfare Center Dahlgren Division (NSWCDD) and FMC Corporation (a launcher manufacturer) to identify new high performance ablators suitable for use on Navy guided missile launchers (GML) and ships' structures. The goal is to reduce ablator erosion by 25 to 50 percent compared to that of the existing ablators such as MXBE350 (rubbermodified phenolic containing glass fiber reinforcement). This reduction in erosion would significantly increase the number of new missiles with higher-thrust, longer burn rocket motors that can be launched prior to ablator refurbishment. In fact, there are a number of new Navy missiles being considered for development and introduction into existing GML: e.g., the Antisatellite Missile (ASM) and the Theater High-Altitude Area Defense (THAAD) Missile. The U.S. Navy experimentally evaluated the eight best fiber-reinforced, polymer composites from a possible field of 25 off-the-shelf ablators previously screened by FMC Corporation. They were tested by the Navy in highly aluminized solid rocket motor exhaust plumes to determine their ability to resist erosion and to insulate.... Ablator, Guided Missile Launchers, Erosion, Tactical missiles, Convective heating, Solid rocket motors, Aluminum oxide particles.

  13. Virginia Demonstration Project Encouraging Middle School Students in Pursuing STEM Careers

    Science.gov (United States)

    Bachman, Jane T.; Kota, Dena H.; Kota, Aaron J.

    2011-01-01

    Encouraging students at all grade levels to consider pursuing a career in Science, Technology, Engineering, and Mathematics (STEM) fields i s a national focus. In 2005, the Naval Surface Warfare Center, Dahlgren Division (NSWCDD), a Department of Defense laboratory located in Da hlgren, Virginia, began work on the Virginia Demonstration Project (VDP) with the goal of increasing more student interest in STEM educatio n and pursuing STEM careers. This goal continues as the program enters its sixth year. This project has been successful through the partici pation of NSWCDD's scientists and engineers who are trained as mentor s to work in local middle school classrooms throughout the school year, As an extension of the in-class activities, several STEM summer aca demies have been conducted at NSWCDD, These academies are supported by the Navy through the VDP and the STEM Learning Module Project. These projects are part of more extensive outreach efforts offered by the National Defense Education Program (NDEP), sponsored by the Director, Defense Research and Engineering. The focus of this paper is on the types of activities conducted at the summer academy, an overview of the academy planning process, and recommendations to help support a nati onal plan of integrating modeling and simulation-based engineering and science into all grade levels. based upon the lessons learned

  14. Entanglement with centers

    Energy Technology Data Exchange (ETDEWEB)

    Ma, Chen-Te [Department of Physics and Center for Theoretical Sciences, National Taiwan University, Taipei 10617 (China)

    2016-01-13

    Entanglement is a physical phenomenon that each state cannot be described individually. Entanglement entropy gives quantitative understanding to the entanglement. We use decomposition of the Hilbert space to discuss properties of the entanglement. Therefore, partial trace operator becomes important to define the reduced density matrix from different centers, which commutes with all elements in the Hilbert space, corresponding to different entanglement choices or different observations on entangling surface. Entanglement entropy is expected to satisfy the strong subadditivity. We discuss decomposition of the Hilbert space for the strong subadditivity and other related inequalities. The entanglement entropy with centers can be computed from the Hamitonian formulations systematically, provided that we know wavefunctional. In the Hamitonian formulation, it is easier to obtain symmetry structure. We consider massless p-form theory as an example. The massless p-form theory in (2p+2)-dimensions has global symmetry, similar to the electric-magnetic duality, connecting centers in ground state. This defines a duality structure in centers. Because it is hard to exactly compute the entanglement entropy from partial trace operator, we propose the Lagrangian formulation from the Hamitonian formulation to compute the entanglement entropy with centers. From the Lagrangian method and saddle point approximation, the codimension two surface term (leading order) in the Einstein gravity theory or holographic entanglement entropy should correspond to non-tensor product decomposition (center is not identity). Finally, we compute the entanglement entropy of the SU(N) Yang-Mills lattice gauge theory in the fundamental representation using the strong coupling expansion in the extended lattice model to obtain spatial area term in total dimensions larger than two for N>1.

  15. Entanglement with centers

    Science.gov (United States)

    Ma, Chen-Te

    2016-01-01

    Entanglement is a physical phenomenon that each state cannot be described individually. Entanglement entropy gives quantitative understanding to the entanglement. We use decomposition of the Hilbert space to discuss properties of the entanglement. Therefore, partial trace operator becomes important to define the reduced density matrix from different centers, which commutes with all elements in the Hilbert space, corresponding to different entanglement choices or different observations on entangling surface. Entanglement entropy is expected to satisfy the strong subadditivity. We discuss decomposition of the Hilbert space for the strong subadditivity and other related inequalities. The entanglement entropy with centers can be computed from the Hamitonian formulations systematically, provided that we know wavefunctional. In the Hamitonian formulation, it is easier to obtain symmetry structure. We consider massless p-form theory as an example. The massless p-form theory in (2 p + 2)-dimensions has global symmetry, similar to the electric-magnetic duality, connecting centers in ground state. This defines a duality structure in centers. Because it is hard to exactly compute the entanglement entropy from partial trace operator, we propose the Lagrangian formulation from the Hamitonian formulation to compute the entanglement entropy with centers. From the Lagrangian method and saddle point approximation, the codimension two surface term (leading order) in the Einstein gravity theory or holographic entanglement entropy should correspond to non-tensor product decomposition (center is not identity). Finally, we compute the entanglement entropy of the SU( N) Yang-Mills lattice gauge theory in the fundamental representation using the strong coupling expansion in the extended lattice model to obtain spatial area term in total dimensions larger than two for N > 1.

  16. PTSD: National Center for PTSD

    Medline Plus

    Full Text Available ... Us FAQs Ask a Question Toll Free Numbers Homeless Veterans Chat VA » Health Care » PTSD: National Center ... Vet Centers) War Related Illness & Injury Study Center Homeless Veterans Returning Service Members Rural Veterans Seniors & Aging ...

  17. Vet Centers. Final rule.

    Science.gov (United States)

    2016-03-02

    The Department of Veterans Affairs (VA) adopts as final an interim final rule that amends its medical regulation that governs Vet Center services. The National Defense Authorization Act for Fiscal Year 2013 (the 2013 Act) requires Vet Centers to provide readjustment counseling services to broader groups of veterans, members of the Armed Forces, including a member of a reserve component of the Armed Forces, and family members of such veterans and members. This final rule adopts as final the regulatory criteria to conform to the 2013 Act, to include new and revised definitions.

  18. User Centered Design

    DEFF Research Database (Denmark)

    Egbert, Maria; Matthews, Ben

    2012-01-01

    The interdisciplinary approach of User Centered Design is presented here with a focus on innovation in the design and use of hearing technologies as well as on the potential of innovation in interaction. This approach is geared towards developing new products, systems, technologies and practices...... based on an understanding of why so few persons with hearing loss use the highly advanced hearing technologies. In integrating Conversation Analysis (“CA”), audiology and User Centered Design, three disciplines which are collaborating together for the first time, we are addressing the following...

  19. Development of portable mass spectrometer with electron cyclotron resonance ion source for detection of chemical warfare agents in air.

    Science.gov (United States)

    Urabe, Tatsuya; Takahashi, Kazuya; Kitagawa, Michiko; Sato, Takafumi; Kondo, Tomohide; Enomoto, Shuichi; Kidera, Masanori; Seto, Yasuo

    2014-01-01

    A portable mass spectrometer with an electron cyclotron resonance ion source (miniECRIS-MS) was developed. It was used for in situ monitoring of trace amounts of chemical warfare agents (CWAs) in atmospheric air. Instrumental construction and parameters were optimized to realize a fast response, high sensitivity, and a small body size. Three types of CWAs, i.e., phosgene, mustard gas, and hydrogen cyanide were examined to check if the mass spectrometer was able to detect characteristic elements and atomic groups. From the results, it was found that CWAs were effectively ionized in the miniECRIS-MS, and their specific signals could be discerned over the background signals of air. In phosgene, the signals of the 35Cl+ and 37Cl+ ions were clearly observed with high dose-response relationships in the parts-per-billion level, which could lead to the quantitative on-site analysis of CWAs. A parts-per-million level of mustard gas, which was far lower than its lethal dosage (LCt50), was successfully detected with a high signal-stability of the plasma ion source. It was also found that the chemical forms of CWAs ionized in the plasma, i.e., monoatomic ions, fragment ions, and molecular ions, could be detected, thereby enabling the effective identification of the target CWAs. Despite the disadvantages associated with miniaturization, the overall performance (sensitivity and response time) of the miniECRIS-MS in detecting CWAs exceeded those of sector-type ECRIS-MS, showing its potential for on-site detection in the future. Copyright © 2013 Elsevier B.V. All rights reserved.

  20. Guerra biológica, bioterrorismo e saúde pública Biological warfare, bioterrorism and public health

    Directory of Open Access Journals (Sweden)

    Luiz Jacintho da Silva

    2001-12-01

    Full Text Available O uso de agentes biológicos como arma não é novidade para a humanidade. Durante séculos, até a atualidade, a guerra biológica tem sido objeto de muita pesquisa e especulação, mas de pouca ação. O medo de efeitos contrários e dúvidas sobre sua eficiência como armas devem ter limitado seu uso. Recentemente, se verificou uma nova forma de terrorismo, empregando agentes infecciosos, devagar e sem muito alarde, até as ocorrências recentes com o Bacillus anthracis nos Estados Unidos. A varíola é possivelmente o mais devastador desses agentes. Menos de 25 anos passados desde sua erradicação, a saúde pública tem que lidar com a possibilidade de sua re-introdução. O cenário da re-introdução da varíola no Brasil é discutido.Biological agents as weapons are not new to mankind. For centuries and into the present, biological warfare has been the subject of much research and speculation, but little action. Their limited use has probably been due to fear of unexpected counter-effects and doubts about their efficiency as weapons. Recently a new form of terrorism employing infectious agents has emerged slowly and without much fanfare, until the recent events with Bacillus anthracis in the United States. Smallpox is potentially the most devastating of these agents. Less than 25 years after the eradication of smallpox, the public health field is now forced to deal with the possibility of its re-introduction. The author discusses the scenario of smallpox re-introduction into Brazil.

  1. Remote Continuous Wave and Pulsed Laser Raman Detection of Chemical Warfare Agents Simulants and Toxic Industrial Compounds

    Science.gov (United States)

    Ortiz-Rivera, William; Pacheco-Londoño, Leonardo C.; Hernández-Rivera, Samuel P.

    2010-09-01

    This study describes the design, assembly, testing and comparison of two Remote Raman Spectroscopy (RRS) systems intended for standoff detection of hazardous chemical liquids. Raman spectra of Chemical Warfare Agents Simulants (CWAS) and Toxic Industrial Compounds (TIC) were measured in the laboratory at a 6.6 m source-target distance using continuous wave (CW) laser detection. Standoff distances for pulsed measurements were 35 m for dimethyl methylphosphonate (DMMP) detection and 60, 90 and 140 m for cyclohexane detection. The prototype systems consisted of a Raman spectrometer equipped with a CCD detector (for CW measurements) and an I-CCD camera with time-gated electronics (for pulsed laser measurements), a reflecting telescope, a fiber optic assembly, a single-line CW laser source (514.5, 488.0, 351.1 and 363.8 nm) and a frequency-doubled single frequency Nd:YAG 532 nm laser (5 ns pulses at 10 Hz). The telescope was coupled to the spectrograph using an optical fiber, and filters were used to reject laser radiation and Rayleigh scattering. Two quartz convex lenses were used to collimate the light from the telescope from which the telescope-focusing eyepiece was removed, and direct it to the fiber optic assembly. To test the standoff sensing system, the Raman Telescope was used in the detection of liquid TIC: benzene, chlorobenzene, toluene, carbon tetrachloride, cyclohexane and carbon disulfide. Other compounds studied were CWAS: dimethylmethyl phosphonate, 2-chloroethyl ethyl sulfide and 2-(butylamino)-ethanethiol. Relative Raman scattering cross sections of liquid CWAS were measured using single-line sources at 532.0, 488.0, 363.8 and 351.1 nm. Samples were placed in glass and quartz vials at the standoff distances from the telescope for the Remote Raman measurements. The mass of DMMP present in water solutions was also quantified as part of the system performance tests.

  2. Mortality in British military participants in human experimental research into chemical warfare agents at Porton Down: cohort study.

    Science.gov (United States)

    Venables, K M; Brooks, C; Linsell, L; Keegan, T J; Langdon, T; Fletcher, T; Nieuwenhuijsen, M J; Maconochie, N E S; Doyle, P; Beral, V; Carpenter, L M

    2009-03-24

    To investigate any long term effects on mortality in participants in experimental research related to chemical warfare agents from 1941 to 1989. Historical cohort study. Data sources Archive of UK government research facility at Porton Down, UK military personnel records, and national death and cancer records. Participants 18,276 male members of the UK armed forces who had spent one or more short periods (median 4 days between first and last test) at Porton Down and a comparison group of 17,600 non-Porton Down veterans followed to 31 December 2004. Mortality rate ratio of Porton Down compared with non-Porton Down veterans and standardised mortality ratio of each veteran group compared with the general population. Both ratios adjusted for age group and calendar period. Porton Down veterans were similar to non-Porton Down veterans in year of enlistment (median 1951) but had longer military service (median 6.2 v 5.0 years). After a median follow-up of 43 years, 40% (7306) of Porton Down and 39% (6900) of non-Porton Down veterans had died. All cause mortality was slightly greater in Porton Down veterans (rate ratio 1.06, 95% confidence interval 1.03 to 1.10, Pchemical exposure and cause specific mortality. The mortality in both groups of veterans was lower than that in the general population (standardised mortality ratio 0.88, 0.85 to 0.90; 0.82, 0.80 to 0.84). Mortality was slightly higher in Porton Down than non-Porton Down veterans. With lack of information on other important factors, such as smoking or service overseas, it is not possible to attribute the small excess mortality to chemical exposures at Porton Down.

  3. Real-time, wide-area hyperspectral imaging sensors for standoff detection of explosives and chemical warfare agents

    Science.gov (United States)

    Gomer, Nathaniel R.; Tazik, Shawna; Gardner, Charles W.; Nelson, Matthew P.

    2017-05-01

    Hyperspectral imaging (HSI) is a valuable tool for the detection and analysis of targets located within complex backgrounds. HSI can detect threat materials on environmental surfaces, where the concentration of the target of interest is often very low and is typically found within complex scenery. Unfortunately, current generation HSI systems have size, weight, and power limitations that prohibit their use for field-portable and/or real-time applications. Current generation systems commonly provide an inefficient area search rate, require close proximity to the target for screening, and/or are not capable of making real-time measurements. ChemImage Sensor Systems (CISS) is developing a variety of real-time, wide-field hyperspectral imaging systems that utilize shortwave infrared (SWIR) absorption and Raman spectroscopy. SWIR HSI sensors provide wide-area imagery with at or near real time detection speeds. Raman HSI sensors are being developed to overcome two obstacles present in standard Raman detection systems: slow area search rate (due to small laser spot sizes) and lack of eye-safety. SWIR HSI sensors have been integrated into mobile, robot based platforms and handheld variants for the detection of explosives and chemical warfare agents (CWAs). In addition, the fusion of these two technologies into a single system has shown the feasibility of using both techniques concurrently to provide higher probability of detection and lower false alarm rates. This paper will provide background on Raman and SWIR HSI, discuss the applications for these techniques, and provide an overview of novel CISS HSI sensors focusing on sensor design and detection results.

  4. Handheld and mobile hyperspectral imaging sensors for wide-area standoff detection of explosives and chemical warfare agents

    Science.gov (United States)

    Gomer, Nathaniel R.; Gardner, Charles W.; Nelson, Matthew P.

    2016-05-01

    Hyperspectral imaging (HSI) is a valuable tool for the investigation and analysis of targets in complex background with a high degree of autonomy. HSI is beneficial for the detection of threat materials on environmental surfaces, where the concentration of the target of interest is often very low and is typically found within complex scenery. Two HSI techniques that have proven to be valuable are Raman and shortwave infrared (SWIR) HSI. Unfortunately, current generation HSI systems have numerous size, weight, and power (SWaP) limitations that make their potential integration onto a handheld or field portable platform difficult. The systems that are field-portable do so by sacrificing system performance, typically by providing an inefficient area search rate, requiring close proximity to the target for screening, and/or eliminating the potential to conduct real-time measurements. To address these shortcomings, ChemImage Sensor Systems (CISS) is developing a variety of wide-field hyperspectral imaging systems. Raman HSI sensors are being developed to overcome two obstacles present in standard Raman detection systems: slow area search rate (due to small laser spot sizes) and lack of eye-safety. SWIR HSI sensors have been integrated into mobile, robot based platforms and handheld variants for the detection of explosives and chemical warfare agents (CWAs). In addition, the fusion of these two technologies into a single system has shown the feasibility of using both techniques concurrently to provide higher probability of detection and lower false alarm rates. This paper will provide background on Raman and SWIR HSI, discuss the applications for these techniques, and provide an overview of novel CISS HSI sensors focused on sensor design and detection results.

  5. Data Analysis and Assessment Center

    Data.gov (United States)

    Federal Laboratory Consortium — The DoD Supercomputing Resource Center (DSRC) Data Analysis and Assessment Center (DAAC) provides classified facilities to enhance customer interactions with the ARL...

  6. Center for Infrastructure Defense

    OpenAIRE

    2013-01-01

    Includes an image of the main page on this date and compressed file containing additional web pages. The Center for Infrastructure Defense (CID) focuses on the continued operation of critical military and civilian infrastructure in the presence of accident, failure, and attack. Operations Research (OR) Department in the Graduate School of Operational and Information Sciences at the Naval Postgraduate School.

  7. Carbon Monoxide Information Center

    Medline Plus

    Full Text Available ... English Bahasa Indonesia 한국어 Español ภาษาไทย Tiếng Việt Text Size: Decrease Font Increase Font Contact CPSC Consumers: ... Guide View All CO Safety Guides ")); jQuery(".node-type-safety-education-center .region-sidebar-second").css('display', " ...

  8. Queering the Writing Center

    Science.gov (United States)

    Denny, Harry

    2010-01-01

    Composition classrooms and writing centers are spaces where negotiation of academic, social, cultural, and political identities are ubiquitous, yet research has not produced adequate theory and practice to help tutors and writers navigate identity production and its politics. This article seeks to begin conversations that might lead to better…

  9. vCenter troubleshooting

    CERN Document Server

    Mills, Chuck

    2015-01-01

    The book is designed for the competent vCenter administrator or anyone who is responsible for the vSphere environment. It can be used as a guide by vSphere architects and VMware consultants for a successful vSphere solution. You should have good knowledge and an understanding of core elements and applications of the vSphere environment.

  10. NASA NEESPI Data Center

    Science.gov (United States)

    Leptoukh, G.; Loboda, T.; Romanov, P.; Gerasimov, I.; Csiszar, I.

    2006-12-01

    The Northern Eurasia Earth Science Partnership Initiative (NEESPI) is an international program of coordinated research on the state and dynamics of ecosystems in Northern Eurasia and their interactions with the Earth's Climate system. The program is designed to enhance scientific knowledge of these ecosystems as well as to develop predictive capabilities to support informed decision-making and practical applications. The NASA NEESPI Data Center is a multi-sensor, online, easy access data archive and distribution system to provide advanced data management capabilities in support of the NEESPI scientific objectives. Its tools include data analysis and visualization, and other techniques for better science data usage. The NASA NEESPI Data Center portal integrates remote sensing data from MODIS, AIRS, OMI, and other instruments on board polar- orbiting satellites, along with customized data products from climatology data sets and models into a single one-stop-shopping interdisciplinary NASA-NEESPI data center. The presentation will provide status and the most recent achievements of the NASA NEESPI Data Center. In the recent months, the emphasis has been put on analyzing and then preparing steps for the online data analysis by bringing data to common grids while preserving available and statistically important information from the higher resolution inputs. The NESSPI instance of Giovanni, the popular online visualization and analysis tool, features the first batch of atmospheric, fire and snow data products, organized to provide quick and user-friendly exploration means.

  11. Johnson Space Center Overview

    Science.gov (United States)

    Gafka, Tammy; Terrier, Doug; Smith, James

    2011-01-01

    This slide presentation is a review of the work of Johnson Space Center. It includes a section on technology development areas, (i.e., composite structures, non-destructive evaluation, applied nanotechnology, additive manufacturing, and fracture and fatigue analytical methods), a section on structural analysis capabilities within NASA/JSC and a section on Friction stir welding and laser peening.

  12. National Health Information Center

    Science.gov (United States)

    ... you can: Educate the public about health risks Organize successful health promotion events and campaigns Get new ... Centers and Clearinghouses provide free public information and resources. Many offer toll-free numbers and websites. Their ... Department of Health and Human Services. Office of Disease Prevention and Health Promotion ...

  13. Precision Joining Center

    Energy Technology Data Exchange (ETDEWEB)

    Powell, J.W.; Westphal, D.A.

    1991-08-01

    A workshop to obtain input from industry on the establishment of the Precision Joining Center (PJC) was held on July 10--12, 1991. The PJC is a center for training Joining Technologists in advanced joining techniques and concepts in order to promote the competitiveness of US industry. The center will be established as part of the DOE Defense Programs Technology Commercialization Initiative, and operated by EG G Rocky Flats in cooperation with the American Welding Society and the Colorado School of Mines Center for Welding and Joining Research. The overall objectives of the workshop were to validate the need for a Joining Technologists to fill the gap between the welding operator and the welding engineer, and to assure that the PJC will train individuals to satisfy that need. The consensus of the workshop participants was that the Joining Technologist is a necessary position in industry, and is currently used, with some variation, by many companies. It was agreed that the PJC core curriculum, as presented, would produce a Joining Technologist of value to industries that use precision joining techniques. The advantage of the PJC would be to train the Joining Technologist much more quickly and more completely. The proposed emphasis of the PJC curriculum on equipment intensive and hands-on training was judged to be essential.

  14. Nicolaus Copernicus Astronomical Center

    Science.gov (United States)

    Murdin, P.

    2000-11-01

    Nicolaus Copernicus Astronomical Center is the largest astronomical institution in Poland, located in Warsaw and founded in 1956. At present it is a government-funded research institute supervised by the Polish Academy of Sciences and licensed by the government of Poland to award PhD and doctor habilitatus degrees in astronomy and astrophysics. In September 1999 staff included 21 senior scientist...

  15. LCA Center Denmark

    DEFF Research Database (Denmark)

    Hauschild, Michael Zwicky; Frydendal, Jeppe

    2006-01-01

    product-oriented environmental tools in companies, to ensure that the LCA efforts is based on a solid and scientific basis, and to maintain the well-established co-operation between all important actors in the LCA field in Denmark. A status is given on the achievements of LCA Center Denmark...

  16. Carolinas Energy Career Center

    Energy Technology Data Exchange (ETDEWEB)

    Classens, Anver; Hooper, Dick; Johnson, Bruce

    2013-03-31

    Central Piedmont Community College (CPCC), located in Charlotte, North Carolina, established the Carolinas Energy Career Center (Center) - a comprehensive training entity to meet the dynamic needs of the Charlotte region's energy workforce. The Center provides training for high-demand careers in both conventional energy (fossil) and renewable energy (nuclear and solar technologies/energy efficiency). CPCC completed four tasks that will position the Center as a leading resource for energy career training in the Southeast: • Development and Pilot of a New Advanced Welding Curriculum, • Program Enhancement of Non-Destructive Examination (NDE) Technology, • Student Support through implementation of a model targeted toward Energy and STEM Careers to support student learning, • Project Management and Reporting. As a result of DOE funding support, CPCC achieved the following outcomes: • Increased capacity to serve and train students in emerging energy industry careers; • Developed new courses and curricula to support emerging energy industry careers; • Established new training/laboratory resources; • Generated a pool of highly qualified, technically skilled workers to support the growing energy industry sector.

  17. User-Centered Design through Learner-Centered Instruction

    Science.gov (United States)

    Altay, Burçak

    2014-01-01

    This article initially demonstrates the parallels between the learner-centered approach in education and the user-centered approach in design disciplines. Afterward, a course on human factors that applies learner-centered methods to teach user-centered design is introduced. The focus is on three tasks to identify the application of theoretical and…

  18. Tuning the Morphology and Activity of Electrospun Polystyrene/UiO-66-NH2Metal-Organic Framework Composites to Enhance Chemical Warfare Agent Removal.

    Science.gov (United States)

    Peterson, Gregory W; Lu, Annie X; Epps, Thomas H

    2017-09-20

    This work investigates the processing-structure-activity relationships that ultimately facilitate the enhanced performance of UiO-66-NH 2 metal-organic frameworks (MOFs) in electrospun polystyrene (PS) fibers for chemical warfare agent detoxification. Key electrospinning processing parameters including solvent type (dimethylformamide [DMF]) vs DMF/tetrahydrofuran [THF]), PS weight fraction in solution, and MOF weight fraction relative to PS were varied to optimize MOF incorporation into the fibers and ultimately improve composite performance. It was found that composites spun from pure DMF generally resulted in MOF crystal deposition on the surface of the fibers, while composites spun from DMF/THF typically led to MOF crystal deposition within the fibers. For cases in which the MOF was incorporated on the periphery of the fibers, the composites generally demonstrated better gas uptake (e.g., nitrogen, chlorine) because of enhanced access to the MOF pores. Additionally, increasing both the polymer and MOF weight percentages in the electrospun solutions resulted in larger diameter fibers, with polymer concentration having a more pronounced effect on fiber size; however, these larger fibers were generally less efficient at gas separations. Overall, exploring the electrospinning parameter space resulted in composites that outperformed previously reported materials for the detoxification of the chemical warfare agent, soman. The data and strategies herein thus provide guiding principles applicable to the design of future systems for protection and separations as well as a wide range of environmental remediation applications.

  19. Destruction of hazardous air pollutants using a fast rise time pulsed corona reactor

    Energy Technology Data Exchange (ETDEWEB)

    Korzekwa, R.A. [Los Alamos National Laboratory, Los Alamos, New Mexico87545-1663 (United States); Grothaus, M.G. [Southwest Research Institute, 6220 Culebra Road, P.O. Drawer 28510, San Antonio, Texas78228-0510 (United States); Hutcherson, R.K. [OSRAM Sylvania, Inc., 71 Cherry Hill Drive, Beverly, Massachusetts 01915 (United States); Roush, R.A. [Federal Bureau of Investigation, Engineering Research Facility, MS EST-5, Building 27958-A, Quantico, Virginia22135 (United States); Brown, R. [Naval Surface Warfare Center, Dahlgren, Virginia22448-5100 (United States)

    1998-04-01

    Increasingly stringent environmental regulation imposed on both the military and civilian sectors has created a growing demand for alternative abatement methods for a variety of hazardous compounds. One alternative, the nonthermal plasma, shows promise of providing an efficient means for the destruction of dilute concentrations of hazardous air pollutants. The Dahlgren Laboratory of the Naval Surface Warfare Center has extensively investigated one type of nonthermal plasma discharge, the pulsed corona reactor, for the destruction of volatile organic compounds and chemical warfare agents. In this reactor, a fast rise time ({approximately}10ns), short duration ({lt}100ns), high-voltage pulse is repetitively delivered to a wire-cylinder electrode geometry, thereby producing a multitude of streamer discharges along its length. The resulting nonthermal plasma contains highly reactive chemical radicals which can interact with and destroy the hazardous molecules entrained in the ambient atmosphere flowing through the reactor volume. Increased electrical efficiency was obtained using a combination of high efficiency constant-current capacitor-charging, high repetition-rate spark gap switching, and resonant energy transfer to the reactor. Promising results have been obtained for toluene, methylene chloride, and dichlorodifluoromethane in air at concentrations of a few hundred parts per million. The device has been operated at voltages up to 30 kV, pulse repetition rates up to 1.4 kHz, and flow rates up to 60 scr(l)/min. Detailed electrical measurements have been made to properly characterize the electrical properties of the pulsed corona reactor and to validate subsequent improvements in the reactor energy efficiency. {copyright} {ital 1998 American Institute of Physics.}

  20. COMPUTATIONAL SCIENCE CENTER

    Energy Technology Data Exchange (ETDEWEB)

    DAVENPORT,J.

    2004-11-01

    The Brookhaven Computational Science Center brings together researchers in biology, chemistry, physics, and medicine with applied mathematicians and computer scientists to exploit the remarkable opportunities for scientific discovery which have been enabled by modern computers. These opportunities are especially great in computational biology and nanoscience, but extend throughout science and technology and include for example, nuclear and high energy physics, astrophysics, materials and chemical science, sustainable energy, environment, and homeland security.

  1. Nanomaterials Commercialization Center

    Science.gov (United States)

    2013-02-01

    October 2009, with input from the AFRL an additional technology thrust was added to the Technology Roadmap which focused on nanomaterials for new energy...NanoCenter’s Technology Advisory Committee, an additional technology thrust was added to the Technology Roadmap which focused on nanomaterials for new...the moisture sensor were questionable. Besides, we could not really tell the moisture value was from environment, clinician hands or user’s hip

  2. Computational Investigations of Potential Energy Function Development for Metal--Organic Framework Simulations, Metal Carbenes, and Chemical Warfare Agents

    Science.gov (United States)

    Cioce, Christian R.

    sigma donates, and subsequent back-bonding occurs into a pi* antibonding orbital. This is a different type of interaction not seen in the three existing classes of metal-carbene complexes, namely Fischer, Schrock, and Grubbs. Finally, the virtual engineering of enhanced chemical warfare agent (CWA) detection systems is discussed. As part of a U.S. Department of Defense supported research project, in silico chemical modifications to a previously synthesized zinc-porphyrin, ZnCS1, were made to attempt to achieve preferential binding of the nerve agent sarin versus its simulant, DIMP (diisopropyl methylphosphonate). Upon modification, a combination of steric effects and induced hydrogen bonding allowed for the selective binding of sarin. The success of this work demonstrates the role that high performance computing can play in national security research, without the associated costs and high security required for experimentation.

  3. Warfare Ecology on an Underwater Demolition Range: Acoustic Observations of Marine Life and Shallow Water Detonations in Hawai`i

    Science.gov (United States)

    Shannon, Lee H.

    vocalizations was recorded immediately following the blast, with rapid (within 30s) return to baseline visual and acoustic behavior. The results and conclusions of these studies are placed within the broader context of warfare ecology as an emerging scientific discipline.

  4. Rapid screening of N-oxides of chemical warfare agents degradation products by ESI-tandem mass spectrometry.

    Science.gov (United States)

    Sridhar, L; Karthikraj, R; Lakshmi, V V S; Raju, N Prasada; Prabhakar, S

    2014-08-01

    Rapid detection and identification of chemical warfare agents and related precursors/degradation products in various environmental matrices is of paramount importance for verification of standards set by the chemical weapons convention (CWC). Nitrogen mustards, N,N-dialkylaminoethyl-2-chlorides, N,N-dialkylaminoethanols, N-alkyldiethanolamines, and triethanolamine, which are listed CWC scheduled chemicals, are prone to undergo N-oxidation in environmental matrices or during decontamination process. Thus, screening of the oxidized products of these compounds is also an important task in the verification process because the presence of these products reveals alleged use of nitrogen mustards or precursors of VX compounds. The N-oxides of aminoethanols and aminoethylchlorides easily produce [M + H](+) ions under electrospray ionization conditions, and their collision-induced dissociation spectra include a specific neutral loss of 48 u (OH + CH2OH) and 66 u (OH + CH2Cl), respectively. Based on this specific fragmentation, a rapid screening method was developed for screening of the N-oxides by applying neutral loss scan technique. The method was validated and the applicability of the method was demonstrated by analyzing positive and negative samples. The method was useful in the detection of N-oxides of aminoethanols and aminoethylchlorides in environmental matrices at trace levels (LOD, up to 500 ppb), even in the presence of complex masking agents, without the use of time-consuming sample preparation methods and chromatographic steps. This method is advantageous for the off-site verification program and also for participation in official proficiency tests conducted by the Organization for the Prohibition of Chemical Weapons (OPCW), the Netherlands. The structure of N-oxides can be confirmed by the MS/MS experiments on the detected peaks. A liquid chromatography-mass spectrometry (LC-MS) method was developed for the separation of isomeric N-oxides of aminoethanols and

  5. Beyond Control Centers

    Science.gov (United States)

    Trimble, Jay

    2017-01-01

    For NASA's Resource Prospector (RP) Lunar Rover Mission, we are moving away from a control center concept, to a fully distributed operation utilizing control nodes, with decision support from anywhere via mobile devices. This operations concept will utilize distributed information systems, notifications, mobile data access, and optimized mobile data display for off-console decision support. We see this concept of operations as a step in the evolution of mission operations from a central control center concept to a mission operations anywhere concept. The RP example is part of a trend, in which mission expertise for design, development and operations is distributed across countries and across the globe. Future spacecraft operations will be most cost efficient and flexible by following this distributed expertise, enabling operations from anywhere. For the RP mission we arrived at the decision to utilize a fully distributed operations team, where everyone operates from their home institution, based on evaluating the following factors: the requirement for physical proximity for near-real time command and control decisions; the cost of distributed control nodes vs. a centralized control center; the impact on training and mission preparation of flying the team to a central location. Physical proximity for operational decisions is seldom required, though certain categories of decisions, such as launch abort, or close coordination for mission or safety-critical near-real-time command and control decisions may benefit from co-location. The cost of facilities and operational infrastructure has not been found to be a driving factor for location in our studies. Mission training and preparation benefit from having all operators train and operate from home institutions.

  6. Memorial Center - Milwaukee

    Directory of Open Access Journals (Sweden)

    Saarinen, Eero

    1959-12-01

    Full Text Available El Memorial Center de Milwaukee ha sido erigido en la parte más alta de la ciudad, coronando una enorme colina que domina ampliamente el conjunto urbano y un hermoso lago. Su emplazamiento, al final de un puente de grandes dimensiones, exigía que fuese tratado en armonía con éste, habiéndose adoptado por ello el sistema de colocar la edificación reposando sobre una planta totalmente diáfana que deja vista la estructura, cuyos esbeltos soportes dan sensación de monumentalidad.

  7. COMPUTATIONAL SCIENCE CENTER

    Energy Technology Data Exchange (ETDEWEB)

    DAVENPORT, J.

    2005-11-01

    The Brookhaven Computational Science Center brings together researchers in biology, chemistry, physics, and medicine with applied mathematicians and computer scientists to exploit the remarkable opportunities for scientific discovery which have been enabled by modern computers. These opportunities are especially great in computational biology and nanoscience, but extend throughout science and technology and include, for example, nuclear and high energy physics, astrophysics, materials and chemical science, sustainable energy, environment, and homeland security. To achieve our goals we have established a close alliance with applied mathematicians and computer scientists at Stony Brook and Columbia Universities.

  8. Self-Access Centers: Maximizing Learners' Access to Center Resources

    Science.gov (United States)

    McMurry, Benjamin L.; Tanner, Mark W.; Anderson, Neil J.

    2009-01-01

    Although some students have discovered how to use self-access centers effectively, the majority appear to be unaware of available resources. A website and database of materials were created to help students locate materials and use the Self-Access Study Center (SASC) at Brigham Young University's English Language Center (ELC) more effectively.…

  9. Sustainable Biofuels Development Center

    Energy Technology Data Exchange (ETDEWEB)

    Reardon, Kenneth F. [Colorado State Univ., Fort Collins, CO (United States)

    2015-03-01

    The mission of the Sustainable Bioenergy Development Center (SBDC) is to enhance the capability of America’s bioenergy industry to produce transportation fuels and chemical feedstocks on a large scale, with significant energy yields, at competitive cost, through sustainable production techniques. Research within the SBDC is organized in five areas: (1) Development of Sustainable Crops and Agricultural Strategies, (2) Improvement of Biomass Processing Technologies, (3) Biofuel Characterization and Engine Adaptation, (4) Production of Byproducts for Sustainable Biorefining, and (5) Sustainability Assessment, including evaluation of the ecosystem/climate change implication of center research and evaluation of the policy implications of widespread production and utilization of bioenergy. The overall goal of this project is to develop new sustainable bioenergy-related technologies. To achieve that goal, three specific activities were supported with DOE funds: bioenergy-related research initiation projects, bioenergy research and education via support of undergraduate and graduate students, and Research Support Activities (equipment purchases, travel to attend bioenergy conferences, and seminars). Numerous research findings in diverse fields related to bioenergy were produced from these activities and are summarized in this report.

  10. National Center on Family Homelessness

    Science.gov (United States)

    ... You are here Home National Center on Family Homelessness Center A staggering 2.5 million children are ... raise awareness of the current state of child homelessness in the United States, documents the number of ...

  11. PTSD: National Center for PTSD

    Medline Plus

    Full Text Available ... Topics For Veterans For Researchers Research Oversight Special Groups Caregivers Combat Veterans & their Families Readjustment Counseling (Vet Centers) War Related Illness & Injury Study Center Homeless Veterans Returning Service Members Rural Veterans ...

  12. PTSD: National Center for PTSD

    Medline Plus

    Full Text Available ... Toll Free Numbers Media Contact Locator Hospitals and Clinics Vet Centers Regional Benefits Offices Regional Loan Centers ... Creative Arts Festival Golden Age Games Summer Sports Clinic Training - Exposure - Experience (TEE) Tournament Wheelchair Games Winter ...

  13. Center for Veterinary Medicine (CVM)

    Data.gov (United States)

    Federal Laboratory Consortium — As seen on the center's logo, the mission statement for FDA's Center for Veterinary Medicine (CVM) reads: "Protecting Human and Animal Health." To achieve this broad...

  14. PTSD: National Center for PTSD

    Medline Plus

    Full Text Available ... a Question Toll Free Numbers Media Contact Locator Hospitals and Clinics Vet Centers Regional Benefits Offices Regional ... TEE) Tournament Wheelchair Games Winter Sports Clinic Locations Hospitals & Clinics Vet Centers Regional Benefits Offices Regional Loan ...

  15. PTSD: National Center for PTSD

    Medline Plus

    Full Text Available ... America's Freedoms Special Events Adaptive Sports Program Creative Arts Festival Golden Age Games Summer Sports Clinic Training - ... Community Providers and Clergy Co-Occurring Conditions Continuing Education Publications List of Center Publications Articles by Center ...

  16. PTSD: National Center for PTSD

    Medline Plus

    Full Text Available ... Conditions Continuing Education Publications List of Center Publications Articles by Center Staff Clinician’s Trauma Update PTSD Research ... Search Tips Modify Your Search How to Obtain Articles Alerts User Guide Purpose and Scope Find Assessment ...

  17. PTSD: National Center for PTSD

    Medline Plus

    Full Text Available ... Room Public Affairs News Releases Speeches Videos Publications National Observances Veterans Day Memorial Day Celebrating America's Freedoms ... PTSD: National Center for PTSD » Public » Videos PTSD: National Center for PTSD Menu Menu PTSD PTSD Home ...

  18. Italy INAF Data Center Report

    Science.gov (United States)

    Negusini, M.; Sarti, P.

    2013-01-01

    This report summarizes the activities of the Italian INAF VLBI Data Center. Our Data Center is located in Bologna, Italy and belongs to the Institute of Radioastronomy, which is part of the National Institute of Astrophysics.

  19. PTSD: National Center for PTSD

    Medline Plus

    Full Text Available ... Plans, Budget, & Performance VA Center for Innovation (VACI) Agency Financial Report (AFR) Budget Submission Recovery Act Resources ... Locations Contact Us FAQs Ask a Question Toll Free Numbers VA » Health Care » PTSD: National Center for ...

  20. Center for Prostate Disease Research

    Data.gov (United States)

    Federal Laboratory Consortium — The Center for Prostate Disease Research is the only free-standing prostate cancer research center in the U.S. This 20,000 square foot state-of-the-art basic science...