WorldWideScience

Sample records for warfare special operations

  1. Toward Operational Art in Special Warfare

    Science.gov (United States)

    2016-02-23

    combatant commanders develop special warfare cam- paign options for their theaters that can be integral parts of the national approach. Getting buy -in at...the resistance spawning franchise operations at home or abroad? – Is the resistance attracting funding or other forms of assistance (indigenous

  2. Special Operations And Cyber Warfare

    Science.gov (United States)

    2016-12-01

    Cyber weapons have multiple functions and can be used for espionage or OPE. It is important to highlight the similarities between the intelligence...James Clapper, Director of National Intelligence, emphasized the importance of cyber operations as he identified cyber as the third major hazard facing...support the development of the capacity and capability of foreign security forces and their supporting institutions.”52 The DOD’s Cyber Strategy states

  3. Irregular Warfare: Special Operations Joint Professional Military Education Transformation

    National Research Council Canada - National Science Library

    Cannady, Bryan H

    2008-01-01

    ... on today's battlefront in Afghanistan and Iraq and in the Global War on Terrorism (GWOT). At the forefront of the GWOT and irregular warfare are the United States Special Operations Command (USSOCOM...

  4. Toward Operational Art in Special Warfare: Appendixes

    Science.gov (United States)

    2016-01-01

    language, proficiency in small-unit tactics, and the ability to build and fight alongside indigenous combat formations in a permissive, uncertain, or...counterinsurgency through and with indigenous forces or personnel.”1 The report has four aims: (1) to adapt conventional operational art to the unique...perfect near-real-time situational awareness,” at least at the tactical level of land warfare in complex terrain. But the idea of leveraging information

  5. Special Operations Forces: C-130 Upgrade Plan Could Help Fix Electronic Warfare Deficiencies

    National Research Council Canada - National Science Library

    1998-01-01

    In response to a concern that threats to the U.S. Special Operations Command's (USSOCOM) aircraft are increasing, while funds available for electronic warfare are decreasing, the General Accounting Office...

  6. Assessing the Role of Surgical Strike Operations in Support of a Special Warfare Campaign

    Science.gov (United States)

    2017-06-09

    classic example of special warfare in action is the use of Special Forces soldiers to facilitate the Northern Alliance’s overthrow of the Taliban...Finally, the tempo of surgical strike operations must be taken into account. Renowned British counterinsurgent of the Boer War, Charles Callwell...December 2016, accessed 15 December 2016, http://edition.cnn.com/2010/ WORLD /asiapcf/10/09/ afghanistan.british.worker.death/index.html?hpt=T2. 43 camps

  7. Hybrid Warfare: How to Shape Special Operations Forces

    Science.gov (United States)

    2016-06-10

    irregular tactics, information operations, and deliberate terrorism as they waged war against Russia in the territory of Chechnya and o deep in Russian...Russia initially had to withdraw its forces from Chechnya , but later led by a former KGB operative, Vladimir Putin, were able to defeat the Chechen rebels

  8. Special Forces and the Art of Influence: A Grassroots Approach to Psychological Operations in an Unconventional Warfare Environment

    National Research Council Canada - National Science Library

    Thomas, II, Joel W

    2006-01-01

    This thesis researches the intricacies of the art of influence in an unconventional warfare environment to develop a model of influence that can be utilized by Special Forces conducting unconventional warfare...

  9. The Manipulation of Human Behavior in Guerrilla Warfare: Can It Enhance U.S. Army Special Forces Guerrilla Warfare Operations?

    National Research Council Canada - National Science Library

    Harris, William

    1997-01-01

    .... Proper integration of psychological communications to manipulate behavior in guerrilla warfare may facilitate the recruiting1 motivation, morale, sustainment and popular support for a guerrilla movement and its cause...

  10. Electronic Warfare: Army Special Operations Acquisition Strategy for Improved Equipment Is Sound

    National Research Council Canada - National Science Library

    1999-01-01

    ... to you. The Army Special Operations Command employs modified Chinook and Blackhawk helicopters, the MH-47D/E and MH-60K/L, respectively, in support of special operations missions worldwide These aircraft...

  11. Special Forces and the Art of Influence: A Grassroots Approach to Psychological Operations in an Unconventional Warfare Environment

    National Research Council Canada - National Science Library

    Thomas, II, Joel W

    2006-01-01

    .... The research was based on several premises: (1) the strategic utility of Special Forces (SF) lies in its ability to influence a target audience in an unconventional warfare (UW) environment; (2...

  12. Integrating Defense, Diplomacy, and Development (3 D) in the Naval Special Warfare Operator

    Science.gov (United States)

    2010-12-01

    usually filling the executive positions, is equivalent to different roles of the players of a sports team and their coaches. The operators are the...them on what SOF resources can be provided to a country team’s counterterrorism campaign plan. 1. The Operator With Al Qaeda developing franchise

  13. Cyber warfare and electronic warfare integration in the operational environment of the future: cyber electronic warfare

    Science.gov (United States)

    Askin, Osman; Irmak, Riza; Avsever, Mustafa

    2015-05-01

    For the states with advanced technology, effective use of electronic warfare and cyber warfare will be the main determining factor of winning a war in the future's operational environment. The developed states will be able to finalize the struggles they have entered with a minimum of human casualties and minimum cost thanks to high-tech. Considering the increasing number of world economic problems, the development of human rights and humanitarian law it is easy to understand the importance of minimum cost and minimum loss of human. In this paper, cyber warfare and electronic warfare concepts are examined in conjunction with the historical development and the relationship between them is explained. Finally, assessments were carried out about the use of cyber electronic warfare in the coming years.

  14. Structuring Naval Special Warfare junior officer professional military education

    OpenAIRE

    Donovan, Thomas A.

    2007-01-01

    Naval Special Warfare does not currently have a designated career path for an officer that requires professional military education (PME) for SEAL junior officers after the rank of Ensign (O-1) and before the rank of Lieutenant Commander (O-4). There currently is interest in this subject matter at the Naval Special Warfare Command and Center. SEAL officers increasingly hold key leadership positions and influence critical decisions in the execution of national strategy. This growing respo...

  15. Navy Operational Planner - Undersea Warfare Module

    Science.gov (United States)

    2016-09-01

    concepts are considered in NOP–USW that are not in previous research: time phasing of missions, mutually exclusive missions, and asset availability...operational planning efforts. NOP–USW suggests the correct allocation of assets across a wide theater of operation to accomplish missions in the...Master’s thesis 4. TITLE AND SUBTITLE NAVY OPERATIONAL PLANNER – UNDERSEA WARFARE MODULE 5. FUNDING NUMBERS 6. AUTHOR(S) Guy A. Molina 7

  16. Special Warfare: Restructuring for the Future

    Science.gov (United States)

    2016-06-01

    Civil affairs CAPs combined action platoons CAS close-air support CBI China-Burma-India [theater] CDI Community Defense Initiative CENTCOM [U.S...special forces’ creed has changed over time, the sentiment has remained. The history of the basic unit of special forces—the SFODA—can be traced back to...reassigned CIDG forces no longer held the advantage of insight into local cultural norms and daily activities since they were no longer operating near

  17. OFFICER AND COMMANDER IN ASYMMETRIC WARFARE OPERATIONS

    Directory of Open Access Journals (Sweden)

    Giuseppe CAFORIO

    2013-01-01

    Full Text Available Starting from the data of a field research conducted among soldiers with asymmetric warfare experiences from nine different countries, the author seeks to identify and shed light on the various problems that officers with command responsibilities had to face during their missions. A picture emerges of feelings and experiences relating to their first impression upon arriving in the theatre, relations with local armed forces, relations with the local population and local authorities, relations with NGOs, relations with other armies, the impact of the rules of engagement (ROEs, training and education, and operational experiences. The paper ends with a discussion of the lessons learned.

  18. Information operation/information warfare modeling and simulation

    OpenAIRE

    Buettner, Raymond

    2000-01-01

    Information Operations have always been a part of warfare. However, this aspect of warfare is having ever-greater importance as forces rely more and more on information as an enabler. Modern information systems make possible very rapid creation, distribution, and utilization of information. These same systems have vulnerabilities that can be exploited by enemy forces. Information force-on-force is important and complex. New tools and procedures are needed for this warfare arena. As these t...

  19. Network Centric Warfare Case Study: U.S. V Corps and 3rd Infantry Division (Mechanized) During Operation Iraqi Freedom Combat Operations (Mar-Apr 2003). Volume 3. Network Centric Warfare Insights

    Science.gov (United States)

    2003-01-01

    OPSEC), military deception, psychological operations (PSYOPS), special information operations (IO), information assurance, physical security...nonlethal effects, such as operational 8 Network Centric Warfare Case Study security (OPSEC), military deception, psychological operations (PSYOP...Support Operations Group ASR Alternate Supply Route; or, Ammunition Supply Rate ATACMS Army Tactical Missile System ATARS Advanced

  20. 75 FR 6642 - Notice of Proposed Information Collection; Naval Special Warfare Recruiting Directorate

    Science.gov (United States)

    2010-02-10

    ... Information Collection; Naval Special Warfare Recruiting Directorate AGENCY: Department of the Navy, DoD. ACTION: Notice. SUMMARY: The Naval Special Warfare (NSW) Recruiting Directorate announces the submission... any of the following methods: Federal eRulemaking Portal: http://www.regulations.gov . Follow the...

  1. blitzkrieg to desert storm: the evolution of operational warfare

    African Journals Online (AJOL)

    a_nabb

    disease of stalemates infecting militaries before the Second World War. The invasion did not change the world; instead, it brought about an increased awareness of the importance of the operational level of war, a dimension of warfare previously neglected. The German operational effectiveness represented an evolution ...

  2. Capstone Concept for Special Operations

    National Research Council Canada - National Science Library

    2006-01-01

    The United States and its allies will remain at war for the foreseeable future. They will continue to battle a networked, technologically modern adversary that utilizes nonconventional methods of warfare as its primary means of operation...

  3. The Covert Use of the Global Special Operations Network and the Militarization of Covert Action in Political Warfare and the Gray Zone

    Science.gov (United States)

    2017-06-09

    methods to deliver the message. MISO uses everything from digital media and social networks, to billboards and airdropped fliers, to word -of- mouth and...overt and covert diplomacy is also beginning. As the digital, social media age continues, the USG is unable to compete with non-state actors...were CIA assassination squads. There may be some truth to that as “in the words of Douglas Valentine, a CIA operations chief in the Northern

  4. Globalization and Asymmetrical Warfare: Operation Athena

    Directory of Open Access Journals (Sweden)

    Paul Clep

    2011-02-01

    Full Text Available Since 2003, Operation Athena represents Canada’s contribution to the International Security Assistance Force (ISAF in Afghanistan. This article explains the Canadian role as an international security provider in general and a closer look on the background, the rationale and the structure of Operation Athena - how it supports the Canadian priorities and objectives in Afghanistan toward 2011.

  5. Special Operation. Module 20.

    Science.gov (United States)

    South Carolina State Dept. of Education, Columbia. Office of Vocational Education.

    This module on special operations, one in a series dealing with industrial sewing machines, their attachments, and operation, covers two topics: topstitching and mitering. For each topic these components are provided: an introduction, directions, an objective, learning activities, student information, a student self-check, and a check-out…

  6. Postural Stability of Special Warfare Combatant-Craft Crewmen With Tactical Gear.

    Science.gov (United States)

    Morgan, Paul M; Williams, Valerie J; Sell, Timothy C

    The US Naval Special Warfare's Special Warfare Combatant-Craft Crewmen (SWCC) operate on small, high-speed boats while wearing tactical gear (TG). The TG increases mission safety and success but may affect postural stability, potentially increasing risk for musculoskeletal injury. Therefore, the purpose of this study was to examine the effects of TG on postural stability during the Sensory Organization Test (SOT). Eight SWCC performed the SOT on NeuroCom's Balance Manager with TG and with no tactical gear (NTG). The status of gear was performed in randomized order. The SOT consisted of six different conditions that challenge sensory systems responsible for postural stability. Each condition was performed for three trials, resulting in a total of 18 trials. Overall performance, each individual condition, and sensory system analysis (somatosensory, visual, vestibular, preference) were scored. Data were not normally distributed therefore Wilcoxon signed-rank tests were used to compare each variable (ρ = .05). No significant differences were found between NTG and TG tests. No statistically significant differences were detected under the two TG conditions. This may be due to low statistical power, or potentially insensitivity of the assessment. Also, the amount and distribution of weight worn during the TG conditions, and the SWCC's unstable occupational platform, may have contributed to the findings. The data from this sample will be used in future research to better understand how TG affects SWCC. The data show that the addition of TG used in our study did not affect postural stability of SWCC during the SOT. Although no statistically significant differences were observed, there are clinical reasons for continued study of the effect of increased load on postural stability, using more challenging conditions, greater surface perturbations, dynamic tasks, and heavier loads. 2016.

  7. Are Current Psychological Operations Procedures Adequate in Information Warfare?

    National Research Council Canada - National Science Library

    Duff, Murray

    1997-01-01

    .... While some aspects of information warfare are conducted domestically, many are executed on foreign soil and involve extensive interaction with other governments, their population, non-governmental...

  8. Special Operations Research Topics 2016

    Science.gov (United States)

    2015-01-01

    Senior Fellow Alvaro de Souza Pinheiro Major General, Brazilian Army, Ret. JSOU Associate Fellow James F. Powers, Jr. Colonel, U.S. Army, Ret. JSOU...goal is to shape the operating environment, counter threats, and advance U.S. interests prior to a threat or crisis neces- sitating large-scale...Role of SOF in political warfare: Achieving national objectives short of war E9. The human domain in crisis , conflict, and war: Influencing

  9. Ending the Debate: Unconventional Warfare, Foreign Internal Defense, and Why Words Matter

    National Research Council Canada - National Science Library

    Jones, D

    2006-01-01

    There is an ongoing debate within the Special Forces community whether unconventional warfare and foreign internal defense are applicable in the contemporary and future Special Operations environments...

  10. Cyber-Enabled Unconventional Warfare: The Convergence of Cyberspace, Social Mobilization, and Special Warfare

    Science.gov (United States)

    2015-12-01

    Internet, to recruit, indoctrinate and train individuals.223 Cinema -quality propaganda videos are produced...ideological identity to participate in a perceived to be legitimate UW-like operation without actually physically showing-up on the battlefield, if

  11. Modeling Anti-Air Warfare With Discrete Event Simulation and Analyzing Naval Convoy Operations

    Science.gov (United States)

    2016-06-01

    W., & Scheaffer, R. L. (2008). Mathematical statistics with applications . Belmont, CA: Cengage Learning. 118 THIS PAGE INTENTIONALLY LEFT BLANK...WARFARE WITH DISCRETE EVENT SIMULATION AND ANALYZING NAVAL CONVOY OPERATIONS by Ali E. Opcin June 2016 Thesis Advisor: Arnold H. Buss Co...REPORT DATE June 2016 3. REPORT TYPE AND DATES COVERED Master’s thesis 4. TITLE AND SUBTITLE MODELING ANTI-AIR WARFARE WITH DISCRETE EVENT

  12. Naval Special Warfare Injury Prevention and Human Performance Initiative

    Science.gov (United States)

    2012-06-30

    or tactical training when the injury occurred. In 13.6% of the injuries, Operators were engaged in recreational activity/ sports when the injury...Collegiate Athletic Association (NCAA) and World Anti- Doping Agency (WADA) supplement list. Based on self-reported dietary intake, the current data indicate...knee tendonitis/ITBS (11%), and biceps and supraspinatus tendonopathy (11%) • Command PT and recreational/ sports activities accounted for 70% of

  13. Built to Outlast: Operational Approaches to Hybrid Warfare

    Science.gov (United States)

    2012-05-17

    29Robert T. Ames, Sun Tzu: The Art of War (New York: Ballantine Books, 1993), 78-80; Mao Tse -Tung, On Guerrilla Warfare, trans. Samuel B. Griffith...Chicago: University of Illinois Press, 1961), 25, 42.The works of Sun Tzu and Mao Tse -Tung both illustrate aspects of this concept. In a work...toreador’s cape, not the toreador himself. - Norman B. Hannah, The Key to Failure: Laos and the Vietnam War114 Against the backdrop of the Cold

  14. Transforming Norwegian Special Operation Forces

    National Research Council Canada - National Science Library

    Robertsen, Tom A

    2006-01-01

    This paper explores the transformation of Norwegian Special Operation Forces (NORSOF), raising the hypothesis that its current organizational structure is inconsistent with its future roles and missions...

  15. Mountain Warfare: The Need for Specialist Training

    National Research Council Canada - National Science Library

    Malik, Muhammad

    2003-01-01

    This study focuses on the need for specialist training for mountain warfare. It analyzes the special characteristics of mountain and high altitude terrain which affect conduct of military operations...

  16. Electronic Warfare (EW) Historical Perspectives and Its Relationship to Information Operations (IO) - Considerations for Turkey

    Science.gov (United States)

    2006-09-01

    Information Operations IW Information Warfare JDAM Joint Direct Attack Munition JRFL Joint Restricted Frequency List JSTARS Joint...through the preparation of the joint restricted frequency list (JRFL), which includes taboo, guarded and protected frequencies. The EC-130H Compass Call

  17. A cost and operational effectiveness analysis of alternative anti-surface warfare platforms

    OpenAIRE

    Skinner, Walter Mark.

    1993-01-01

    Approved for public release; distribution is unlimited. A Cost and Operational Effectiveness Analysis (COEA) is performed for three alternative anti-surface warfare (ASUW) platforms that will conduct operations in multi-service regional scenarios. Estimated program costs, historical cost variances, and measures of operational effectiveness are determined for each COEA alternative, and service life extension effects are examined. The data is merged in a mixed-integer optimization model, MPA...

  18. Models, Analysis, and Recommendations Pertaining to the Retention of Naval Special Warfare s Mid-Level Officers

    Science.gov (United States)

    2013-12-01

    The Analytic Hierarch/Network Process,” in Rev. R. Acad. Cien. Serie A. Mat (RACSAM), submitted by Francisco Javier Giron (Real Academia de Ciencias ...Academia de Ciencias : Spain. Scott, Nathan. Naval Special Warfare Officer Retention Survey. Monterey, CA: NPS Press, September 2013. Whittenberger

  19. Operant Conditioning for Special Educators.

    Science.gov (United States)

    Pedrini, Bonnie C.; Pedrini, D. T.

    The paper briefly explains operant conditioning as it pertains to special educators. Operant conditioning is thought to be an efficient method for modifying student behavior. Using the B. F. Skinner frame of reference, operant conditioning is said to include behavior modification and therapy, programed instruction, and computer assisted and…

  20. 2015 Special Operations Essays

    Science.gov (United States)

    2015-05-01

    this emerging technology, but how to operate within it as well. Figure 1. Egypt population pyramid . Source: United States Census Bureau...vital during events in Egypt in 2011. In comparing the 100 days it took to overthrow the Shah in the 1979 Iranian Revolution to the 18 days in which the...Figure 1, which is expected to continue to be seen in Egypt over the next several decades.12 The popularity of social media within this demographic was

  1. Learning on the Move, OSS Detachment 101 Special Operations in Burma

    Science.gov (United States)

    2015-06-12

    actions would serve as shaping effects for larger conventional operations. Modern US Army Special Operations doctrine further supports this...their irregular brand of warfare as the decisive operation for a campaign where conventional forces were not suitable, prepared, or politically...Operations doctrine, America’s early SOF did not have the luxury of implementing schoolhouse solution sets and designed each solution as a campaign unfolded

  2. Operational advantages of using Cyber Electronic Warfare (CEW) in the battlefield

    Science.gov (United States)

    Yasar, Nurgul; Yasar, Fatih M.; Topcu, Yucel

    2012-06-01

    While cyberspace is emerging as a new battlefield, conventional Electronic Warfare (EW) methods and applications are likely to change. Cyber Electronic Warfare (CEW) concept which merges cyberspace capabilities with traditional EW methods, is a new and enhanced form of the electronic attack. In this study, cyberspace domain of the battlefield is emphazised and the feasibility of integrating Cyber Warfare (CW) concept into EW measures is researched. The SWOT (Strengths, Weaknesses, Opportunities and Threats) analysis method is used to state the operational advantages of using CEW concept in the battlefield. The operational advantages of CEW are assessed by means of its effects on adversary air defense systems, communication networks and information systems. Outstanding technological and operational difficulties are pointed out as well. As a result, a comparison of CEW concept and conventional EW applications is presented. It is concluded that, utilization of CEW concept is feasible at the battlefield and it may yield important operational advantages. Even though the computers of developed military systems are less complex than normal computers, they are not subjected to cyber threats since they are closed systems. This concept intends to show that these closed systems are also open to the cyber threats. As a result of the SWOT analysis, CEW concept provides Air Forces to be used in cyber operations effectively. On the other hand, since its Collateral Damage Criteria (CDC) is low, the usage of cyber electronic attack systems seems to grow up.

  3. The Need for a USAF Information Warfare(IW) Strategy for Military Operations Other Than War (MOOTW)

    National Research Council Canada - National Science Library

    Butler, Bradley

    1996-01-01

    .... Two areas having an impact on the answer to this question but not normally examined together are information warfare and the broad area of military operations short of large scale conventional combat...

  4. Special Operations - Myths and facts

    DEFF Research Database (Denmark)

    Jensen, Lars H. Ehrensvärd

    The brief addresses some of the myths, which have induced an institutional resistance at the political and military decision levels against understanding and considering special operations as a valuable strategic tool in contemporary and future conflict prevention, crisis management, and conflict...

  5. Special Operations, Irregular Warfare, and Operational Art: A Theory of Special Operations

    Science.gov (United States)

    2013-12-10

    is mostly but not wholly a land phenomenon. Naval forces have combatted maritime irregulars such as pirates for millennia, for example see: Plutarch ...SW2502SocialMediaAndUW.html (accessed June 15, 2013). Plaster, John L. SOG: Secret Wars of America’s Commandos in Vietnam. New York: Simon & Schuster, 1997. Plutarch

  6. Multi-platform operations in the Underwater Warfare Testbed (UWT)

    NARCIS (Netherlands)

    Keus, D; Benders, F.P.A.; Fitski, H.J.; Grootendorst, H.J.

    2009-01-01

    More than a decade ago, the long-term NATO scientific study “Maritime Operations in 2015” (MO 2015) identified the so-called multi-platform and co-operative multi-static Low Frequency Active Sonar (LFAS) concept, involving co-operative sonar data exchange between surface ships and submarines.

  7. The Limits of Special Operations Forces

    Science.gov (United States)

    2016-12-07

    in Oman, suc- cess took five years—most efforts take much longer. In a more typical case, U.S. and allied SOF began partnering with Colombian SOF...Spec Ops: Case Studies in Operational Warfare: Theory and Practice (New York: Presidio Press, 1996), chapter 2. 4 Cornelius Ryan, A Bridge Too...of Military History, 2002). 13 Thomas L. Ahern Jr., CIA and Rural Pacification in South Vietnam (Washington, DC: Center for the Study of

  8. Special Operations Doctrine: Is it Needed

    Science.gov (United States)

    2016-12-07

    AOB), eight Special Forces Operational Detachment-Alphas (SFODAs)2, and Civil Affairs and Psychological Operations teams working alongside two bat...Operations doctrine. Sixty years after the Army’s first special operations units were formed, the time had arrived for writing how Army special operations...Affairs, Psychological Operations, and Special Forces, the effort inte- grated the roles and missions of the Ranger Regiment, Special Mission Units, and

  9. Influence Operations in Insurgencies: Identifying Framing Strategies for Special Warfare

    Science.gov (United States)

    2014-12-01

    1979; Tilly 1978), civil war termination (Walter 1997; Licklider 1993), the political and social consequences of civil war ( Rich and Stubbs 1997), the...from two challenges in the literature. First, scholarship on religious terrorism tends to focus on one particular motivation— apocalyptic, millennial ...factors that motivate some members of ethnic minorities to become radicalized, to form activist organizations, and to move from conventional means

  10. Simulation of Operations in the Underwater Warfare Testbed (UWT)

    NARCIS (Netherlands)

    Keus, D.; Benders, F.P.A.; Fitski, H.J.; Grootendorst, H.J.

    2009-01-01

    Surface vessels and submarines must be able to defend themselves against a torpedo attack. Several studies have shown the benefits of multi-platform and multi-static operations. To facilitate torpedo defence system studies and the development of future tactics, TNO Defence, Security and Safety

  11. Any Time, Any Place, Any Gender The Risks and Rewards of Integrating Females into Special Operations Forces

    Science.gov (United States)

    2015-06-02

    Service report to Congress in 1987, subsequently published commercially as John Collins, Green Berets, SEALs, and Spetsnaz: US & Soviet Special...warfare activities are their Special Forces (SF), more commonly known as “ Green Berets” due their specific cultural artifact, with the assistance of CA...2004. Howarth, Patrick. Undercover: The Men and Women of the Special Operations Executive. London, UK: Routledge and Kegan Paul, 1980. Howes, Ruth

  12. Interdisciplinary Perspectives on Special Operations Forces

    DEFF Research Database (Denmark)

    is the result of a research projec tproviding international interdisciplinary perspectives on special operations forces, based on three main themes: - Leading and organizing for strategic effect - Professional entrepreneurship and self-perceptions in special operations forces - Political and popular perceptions...

  13. Strategic Choice: United States Special Forces’ Comparative Advantage in Irregular Warfare

    Science.gov (United States)

    2017-03-01

    metrics. 124 James Kiras, Special Operations and the Nature of Strategy : From World War II to the War on Terrorism , Vol. 17 (New York: Routledge...Operations and the nature of Strategy : From World War II to the War on Terrorism . Vol. 17. New York: Routledge. 2006. Liddell Hart, B. H. Strategy . New...indirect strategies . This thesis examines the conflict interaction between weak and strong actors. For the strong actor, this thesis identifies that

  14. Psychological and Unconventional Warfare, 1941-1952: Origins of a Special Warfare Capability for the United States Army

    Science.gov (United States)

    1979-11-01

    nic -,L-dant orer unconventional wsr:fare? In shnrt, wfiat were-the pre-1952 roots of tbe’ P9ych𔃺rg1.ca1 WArfArPg Contme" artx], cMocom~tant y, the...General Robert A. McClure, 30 March 1948, from Co’.onel William S. Biddle , Assistant Chief, Plans and Policy Group, 1, 319, Plans and Operations Division

  15. Cyber Warfare/Cyber Terrorism

    National Research Council Canada - National Science Library

    O'Hara, Timothy

    2004-01-01

    Section 1 of this paper provides an overview of cyber warfare as an element of information warfare, starting with the general background of the current strategic environment the United States is operating...

  16. Cultural Competence and the Operational Commander: Moving Beyond Cultural Awareness into Culture-Centric Warfare

    National Research Council Canada - National Science Library

    Karcanes, James A

    2007-01-01

    .... Understanding the different levels of cultural awareness -- cultural consideration, cultural understanding, and cultural competence -- will help usher in a new focus on culture-centric warfare...

  17. U.S. Special Operations Command Training and Education Program

    National Research Council Canada - National Science Library

    Gimble, Thomas

    1996-01-01

    .... Special Operations Command (USCINCSOC), to train assigned forces to meet special operations mission taskings and to ensure interoperability with conventional forces and other special operations forces (SOF...

  18. Electronic Warfare Signature Measurement Facility

    Data.gov (United States)

    Federal Laboratory Consortium — The Electronic Warfare Signature Measurement Facility contains specialized mobile spectral, radiometric, and imaging measurement systems to characterize ultraviolet,...

  19. Danish Politicians' Views on Special Operations

    DEFF Research Database (Denmark)

    Jensen, Lars Henrik Ehrensvärd

    2017-01-01

    and willingness of Danish politicians regarding the use of special operations. This may indicate a difference between the potential opportunities for employing special operations and what the politicians believe these to be and are willing to promote or allow. Conclusion: Pending further analysis of the data...

  20. Special Operations Officer Talent Management

    Science.gov (United States)

    2013-04-01

    employees , and then create a self-development program for their employees to maximize the potential of each worker. “In Microsoft , Bill Gates has... Malaysia , Pakistan, Indonesia, Singapore, Republic of Korea, China, Taiwan.15 SOF officers have specialized training and education to train, work, and...Instruction 12410.25: Civilian Employee and Training Development (Washington DC: Department of the Navy, 5 July 2011), 1. 47 Like their military

  1. Are Large Scale (Brigade Combat Team or Regimental Level and Above) United States Army Airborne Operations Effective in the Context of 21st Century Warfare

    National Research Council Canada - National Science Library

    Childress, Mark S

    2008-01-01

    Several recommendations, in regards to the use of large scale airborne operations in the context of 21st century warfare and identified shortfalls in airborne organization, are presented in this monograph...

  2. Comprehensive Performance Nutrition for Special Operations Forces.

    Science.gov (United States)

    Daigle, Karen A; Logan, Christi M; Kotwal, Russ S

    2015-01-01

    Special Operations Forces (SOF) training, combat, and contingency operations are unique and demanding. Performance nutrition within the Department of Defense has emphasized that nutrition is relative to factors related to the desired outcome, which includes successful performance of mentally and physically demanding operations and missions of tactical and strategic importance, as well as nonoperational assignments. Discussed are operational, nonoperational, and patient categories that require different nutrition strategies to facilitate category-specific performance outcomes. Also presented are 10 major guidelines for a SOF comprehensive performance nutrition program, practical nutrition recommendations for Special Operators and medical providers, as well as resources for dietary supplement evaluation. Foundational health concepts, medical treatment, and task-specific performance factors should be considered when developing and systematically implementing a comprehensive SOF performance nutrition program. When tailored to organizational requirements, SOF unit- and culture-specific nutrition education and services can optimize individual Special Operator performance, overall unit readiness, and ultimately, mission success. 2015.

  3. Detachment 101 and North Burma: Historical Conditions for Future Unconventional Warfare Operations

    Science.gov (United States)

    2016-05-26

    Detachment 101’s early UW operations also illustrate how enemy actions, conventional partner force capabilities and limitations, and indigenous populations...Publication ARSOF Army Special Operations Forces ATC Air Transport Command CBI China -Burma-India CMO Civil Military Operations CNAC China National Aviation...a smaller force size as well as budget, the US Army will place increased emphasis on “ innovative , low-cost and small-footprint engagements across the

  4. Irregular Warfare (IW) Joint Operating Concept (JOC), Version 1.0

    Science.gov (United States)

    2007-09-11

    environment). Country C is a state sponsor of terrorism that promotes fundamentalist ideology and conducts a campaign of genocide in portions of the... Cambodians , these forces were led by US and/or South Vietnamese Special Forces personnel. Operating largely in sparsely populated areas, the Mobile

  5. The effect of specialization on operational performance

    DEFF Research Database (Denmark)

    Halkjær, Søren; Lueg, Rainer

    2017-01-01

    -methods approach that includes proprietary data from the management control system of the hospital, public documentation on the policy change, as well as interviews with key informants. These data suggest that operational deficiency is related to the fact that specialization was externally enforced through......Purpose - The purpose of this paper is to analyze how specialization in hospitals affects operational performance, measured by the length of stay and readmission rate. The authors assess a public policy change in the Danish healthcare sector from 2011 which required that some hospital services had...

  6. UNITED STATES SPECIAL OPERATIONS FORCES IN AFRICA

    Science.gov (United States)

    2016-02-16

    hundreds of traditional African religions associated with the plethora of tribal groups as well as large populations of Muslims, primarily in the...engagement, and the complexities of the African continent, Special Operations Forces (SOF) are uniquely suited to further those interests. Additionally...protecting access to abundant strategic resources, fostering integration into the global economy, and empowering Africans and their partners to deal

  7. Defining cyber warfare

    Directory of Open Access Journals (Sweden)

    Dragan D. Mladenović

    2012-04-01

    Full Text Available Cyber conflicts represent a new kind of warfare that is technologically developing very rapidly. Such development results in more frequent and more intensive cyber attacks undertaken by states against adversary targets, with a wide range of diverse operations, from information operations to physical destruction of targets. Nevertheless, cyber warfare is waged through the application of the same means, techniques and methods as those used in cyber criminal, terrorism and intelligence activities. Moreover, it has a very specific nature that enables states to covertly initiate attacks against their adversaries. The starting point in defining doctrines, procedures and standards in the area of cyber warfare is determining its true nature. In this paper, a contribution to this effort was made through the analysis of the existing state doctrines and international practice in the area of cyber warfare towards the determination of its nationally acceptable definition.

  8. Chemical Warfare Agent Operational Exposure Hazard Assessment Research: FY07 Report and Analysis

    Science.gov (United States)

    2010-07-01

    agent migration rates. As stated by Armour and Sturgeon (1992), the extent of the contact hazard depends on the initial degree of contamination, the...with a contaminated surface. 2.1.5 Literature Cited 1. Armour , S.J; Sturgeon, W.R. Liquid Hazard from Chemical Warfare Agents for Pilots of High...the neck area was clipped and prepped with betadine, and the animal covered with a sterile surgical drape . The planned incision areas in the

  9. Optimizing Armed Forces Capabilities for Hybrid Warfare – New Challenge for Slovak Armed Forces

    Directory of Open Access Journals (Sweden)

    Peter PINDJÁK

    2015-09-01

    Full Text Available The paper deals with the optimization of military capabilities of the Slovak Armed Forces for conducting operations in a hybrid conflict, which represents one of the possible scenarios of irregular warfare. Whereas in the regular warfare adversaries intend to eliminate the centers of gravity of each other, most often command and control structures, in irregular conflicts, the center of gravity shifts towards the will and cognitive perception of the target population. Hybrid warfare comprises a thoroughly planned combination of conventional military approaches and kinetic operations with subversive, irregular activities, including information and cyber operations. These efforts are often accompanied by intensified activities of intelligence services, special operation forces, and even mercenary and other paramilitary groups. The development of irregular warfare capabilities within the Slovak Armed Forces will require a progressive transformation process that may turn the armed forces into a modern and adaptable element of power, capable of deployment in national and international crisis management operations.

  10. Special Operations Forces Reference Manual. Fourth Edition

    Science.gov (United States)

    2015-06-01

    activities that support an adversary’s ability to negatively affect U.S. interests. CTF support can assist SOF in the execution of core activities in...the split team concept making up two six-man teams. Assistant Detachment Operations Sergeant Methods of Infiltration Special Forces soldiers possess...Twelve ODAs per SFG can infil- trate and exfiltrate by surface swim techniques. Unless specifically identified, the only teams with designated specialty

  11. The Role of Civil Affairs in Unconventional Warfare

    Science.gov (United States)

    2012-12-01

    neighbor to the west, and secured the eastern border of Laos 32 Mao Tse -Tung, On Guerrilla Warfare...INTRODUCTION..........................................................................................19  B.  BRIEF HISTORY OF LAOS ...Royal Lao Army SCA Support to Civil Administration SCIRI Supreme Council of Iraq SG Shadow Government SOF Special Operations Forces TAI Targeted

  12. Understanding the Threat Ecosystem: A Concept for Intelligence Support to Special Warfare

    Science.gov (United States)

    2016-05-10

    international law, national law, behavioral norms and ethical principles have no restraining effects on them.5 This emerging complexity paradigm is one...similar to a biome: a major ecological community of organisms adapted to a particular climatic or environmental condition on a large geographic area in...Awareness through tracking agents and agency in the threat environment is paramount to building an accurate ecological frame of the operational environment

  13. USN/USMC Antiair Warfare and Command, Control and Communications for Amphibious Operations

    Science.gov (United States)

    1992-03-01

    NUMBERS W’Vf~ * ic0"W O plows k; to., W..ia 0;41 40A.YWfI 11 TITLE (Inclucle Securily CiaSsifkcaticin) U8N/U8SUC Antiuar Warflire and4 CommaskC~Ual...the CWC to be a manager of all the warfare areas and frees him from becoming entangled in one tactical problem while another grows undetected elsewhere...hostile enemy actions (i.e., jamming) the potential begins to decrease rapidly . [Ref. 19:pp. 185-194] F. MARINE CORPS PRINCIPLES OF AAW There are three

  14. Governing Warfare

    DEFF Research Database (Denmark)

    Harste, Gorm

      It would seem as though warfare has gotten out of control, not only in Iraq and Afghanistan, but also in Central Africa. The paper outlines the strategic history of politically controlled warfare since the early Enlightenment. The argument is that control is implausible. The idea of control has...

  15. 2008 13th Expeditionary Warfare Conference

    Science.gov (United States)

    2008-10-23

    platforms – Emphasize a mixed fleet approach that spans the “iron triangle” – Integrate MRAP into the fleet mix – Transition to a fleet of tactical...Urban Warfare Mountain Warfare Desert Warfare Jungle Riverine Special Skills Recon LOG CSS ENG MT HS Ord Maint EOD Pers Retrival ...Detection (Specialized Platform FLGPR)Stand-off (60M) Scaleable Neutralization (Area coverage) ABV Delivery Ground Cueing Stand-off (800M) Scaleable

  16. Special Operations can make a difference in integrated conflict prevention

    DEFF Research Database (Denmark)

    Jensen, Lars H. Ehrensvärd

    The fifth brief in the series about special operations highlights the possible strategic role of special operations in connection with Denmark's revitalized vision of integration of the state's instruments to create security through preventive stabilization efforts. The brief offers suggestion...

  17. PSYCHOLOGICAL PROBLEMS AND STRESS FACED BY SOLDIERS WHO OPERATE IN ASYMMETRIC WARFARE ENVIRONMENTS: EXPERIENCES IN THE FIELD

    Directory of Open Access Journals (Sweden)

    Giuseppe CAFORIO

    2014-10-01

    Full Text Available This article deals with the problems of anxiety, stress and psychological discomfort that can affect soldiers sent on asymmetric warfare operations. It is based on secondary analysis of the data of two important field researches whose results have recently (2013 been published. Although the two researches adopted different methodologies, the testimonies are fully comparable and show that soldiers from different countries and cultures display common or similar reactions when they are placed in the stress conditions that the asymmetric environment involves. The approach of the paper is drawn up in such a way as to make the reader a participating observer of the reality of such missions. It is therefore centered on the personal testimonies of the soldiers interviewed in the two researches, testimonies reported just as they are, in their simplicity and, often, drama, with comments by the author kept to a minimum in order to give readers ample opportunity to evaluate and interpret the reported texts on their own. The research data, drawn from the declarations of those directly concerned, reveal the existence of a problem of psychological distress resulting from deployment in asymmetric warfare situations that is in part different in the causes of the problems resulting from deployment in traditional combat and affects percentages of participating soldiers that are not high but definitely significant. The highest incidence appears to be constituted by problems relating to reintegration into normal social and working life upon returning from the mission. This is followed in percentage terms by anxiety situations relating to life far from the family, due in large part to a sense of powerlessness for the scant possibility of managing family situations that may have cropped up or already existed beforehand.

  18. Redefining the Indirect Approach, Defining Special Operations Forces (SOF Power, and the Global Networking of SOF

    Directory of Open Access Journals (Sweden)

    Scott Morrison

    2014-07-01

    Full Text Available The current Defense Strategy assigns Special Operations Forces (SOF to play a central role in countering terrorism, weapons of mass destruction, and irregular warfare. However, there has been little published that defines the role of Special Operations alongside air, land, and sea domains. The U.S. Special Operations Community struggles to define its own theoretical concepts such as direct approach and indirect approach. The U.S. SOF circles typically define direct approach with direct action and the indirect approach with foreign internal defense or security force assistance. Military theorist Liddell Hart viewed the indirect approach as a method to orient upon, target, and upset an adversary’s equilibrium in order to plan for and direct decisive blows. Today, the SOF indirect approach is arguable more applicable due to the prevalence of non-state threats and internal conflicts. Following Hart’s definition, precision raids are among the integral components of a broader application of the indirect approach. The approach also networks U.S. government power as a force when used in concert with allies and local partners. Global networking along with balanced precision raids will exponentially increase the utility of SOF power and position it to appropriately complement all domains to tackle 21st century challenges.

  19. Danish Special Operations - Comprehensive Reorganization and Innovation are Necessary

    DEFF Research Database (Denmark)

    Jensen, Lars H. Ehrensvärd

    This fourth paper in a series of research briefs about Danish special operations is focusing on how a "system's failure" has blocked the development of Danish special operations for almost 50 years. The brief suggests the repair of this system's failure by creating either a fourth service...... or a special operations command. The paper points out that a political decision is necessary, as there is no known empirical evidence that the conventional military has ever created any special operations institutions by it's own will. (The establishment of a Danish Special Operations Command was actually...

  20. Drone warfare

    Science.gov (United States)

    Gusterson, Hugh

    2017-11-01

    Crude drones existed as early as World War I, but the technology matured in the Yugoslav Wars of the 1990s and the current wars around the Middle East. The U.S. first used a weaponized drone in late 2001, in Afghanistan. Drones may cause more or less civilian casualties depending on the targeting protocols employed by their operators. There is an inherent ambiguity in determining who is an insurgent from several thousand feet, but civilian casualties are likely to be higher if targeters emphasize "signature strikes" over "personality strikes," if they engage in "double-tap strikes," if they rely too much on local informants, and if they rely too heavily on cellphone identification in the absence of corroboration from other intelligence sources. The legality of drone warfare is fairly clear in established battle zones such as Afghanistan, but is more problematic in terms of both international and domestic law when it comes to drone strikes in countries such as Yemen, Pakistan and Somalia with which the U.S. is not at war. Looking to the future, the U.S. would be well advised to sponsor negotiations for an international drone convention that might establish clear international rules for the use of drones, ban autonomous smart drones, and establish adjudicatory procedures to handle allegations of war crimes.

  1. Small-State Special Operations in a Comprehensive Stabilisation Context

    DEFF Research Database (Denmark)

    Johnsen, Anton Asklund

    takeaways were: Special operations as a force multiplier: Can special operations enable other stabilisation agents, locals as well as internationals, to accomplish their missions more effectively? This includes NGOs, diplomats or other officials, other military units, etc. How can the mindset required...... to enable ‘whole-of-government’ approaches be promoted? Economy of force considerations: Are special operations truly a cheaper means of reaching certain ends? When are small and indirect approaches involving special operations forces effective and when are they not? Special operations as expansion......“Small-State Special Operations in a Comprehensive Stabilisation Context: What to Know and Where to Go?” was the headline of a conference held at the Royal Danish Defence College, facilitated by the Institute for Strategy. As a product of this conference, a report has been written which highlights...

  2. Biodegradation of chloroethene compounds in groundwater at Operable Unit 1, Naval Undersea Warfare Center, Division Keyport, Washington, 1999-2010

    Science.gov (United States)

    Dinicola, R.S.; Huffman, R.L.

    2012-01-01

    The U.S. Geological Survey evaluated the biodegradation of chloroethene compounds in groundwater beneath the former landfill at Operable Unit 1 (OU 1) of the U.S. Naval Undersea Warfare Center (NUWC), Division Keyport. The predominant contaminants in groundwater are the chloroethene compounds trichloroethene, cis-1,2-dichloroethene, and vinyl chloride. The remedy selected for groundwater contamination at OU 1 includes phytoremediation and natural attenuation. In 1999, the U.S. Navy planted two hybrid poplar plantations, referred to as the northern and southern plantations, over the most contaminated parts of the landfill. The U.S. Navy monitors tree health, groundwater levels, and contaminant concentrations to assess the effectiveness of phytoremediation. The U.S. Geological Survey began a cooperative effort with the U.S. Navy in 1995 to monitor the effectiveness of natural attenuation processes for removing and controlling the migration of chloroethenes and chloroethanes. Field and laboratory studies from 1996 through 2000 demonstrated that biodegradation of chloroethenes and chloroethanes in shallow groundwater at OU 1 was substantial. The U.S. Geological Survey monitored geochemical and contaminant concentrations in groundwater annually from 2001 through 2010. This report presents groundwater geochemical and contaminant data collected by the U.S. Geological Survey during June 2010 and evaluates evidence for continued biodegradation of chloroethenes in groundwater.

  3. Identifying Special Operations as a Distinct Foreign Policy Instrument

    DEFF Research Database (Denmark)

    Johnsen, Anton Asklund

    2017-01-01

    to clarify and explain what special operations strategic qualities exactly are. The author then elaborates on specific elements of special operations with a point of departure in the “cognitive maps of SOF” as formulated in the research question. The author recommends that in order to influence policy...... on special operations, it is essential to have insight into the instrument’s capabilities and limitations, as this provides the prerequisites for sound contextual strategic analysis....

  4. The Impact of Irregular Warfare on the US Army

    National Research Council Canada - National Science Library

    McDonald, III, Roger L

    2006-01-01

    Although the U.S. Army has yet to clearly define irregular warfare, it is imperative that the Army take near-term action to enhance the ability of Soldiers and units to operate effectively in an irregular warfare environment...

  5. Dilemmas of Warfare in Densely Populated Civilian Areas

    OpenAIRE

    Moshe Tamir

    2012-01-01

    This essay attempts to present operational perspectives on conducting warfare in densely populated areas. It also distinguishes between three types of combat within this general category, with the goal of shedding light on this complex type of warfare.

  6. Special Operations - the Central Role of Air Capabilities

    DEFF Research Database (Denmark)

    Jensen, Lars H. Ehrensvärd

    the ground and maritime elements of special operations, such as the Navy’s Frogman Corps and the Army Jaeger Corps. The paper gives a practical example of how a joint (all-services) special operations capacity may enlarge the strategic options of Denmark beyond what most people think is possible for a small...

  7. Trust and Influence in the Information Age: Operational Requirements for Network Centric Warfare

    National Research Council Canada - National Science Library

    Blatt, Nicole

    2004-01-01

    ...) based on information technology. This thesis will show that the Information RMA not only exists, but will also reshape how we plan, operate, educate, organize, train, and equip forces for the 21st century...

  8. Electronic Warfare (EW) Historical Perspectives and Its Relationship to Information Operations (IO) - Considerations for Turkey

    National Research Council Canada - National Science Library

    Kucukozyigit, Ali C

    2006-01-01

    ...) and Information Operations (IO) core, supporting and related competencies. Understanding the definitions of information and its value, information superiority, and the decision making cycle provides the foundation for the thesis...

  9. Information Operations, Electronic Warfare, and Cyberwar: Capabilities and Related Policy Issues

    National Research Council Canada - National Science Library

    Wilson, Clay

    2007-01-01

    .... It also suggests related policy issues of potential interest to Congress. For military planners, the control of information is critical to military success, and communications networks and computers are of vital operational importance...

  10. Electronic Warfare: Comprehensive Strategy Needed for Suppressing Enemy Air Defenses

    National Research Council Canada - National Science Library

    2001-01-01

    .... To achieve this suppression, the services use specialized aircraft designed to neutralize, destroy, or temporarily degrade enemy air defense systems through either physical attack or electronic warfare...

  11. 2011 Special Operations Forces Industry Conference

    Science.gov (United States)

    2011-05-19

    Fixed Operators Wateen : First nationwide WiMAX 4G deployment in the world (Nov 2008) UNCLASSIFIED UNCLASSIFIED 13 Mobile WiMax Phones Samsung (Korea...Currently 582 operators in 150 countries • $1.2 B investment planned for 2011 (China, US, Taiwan, Korea, Malaysia ) • Coverage of 823 mil persons end of 2010...Steam! • January 2010 – First public LTE network operational in Stockholm/Oslo – Uses Samsung devices, Ericsson network core – 50 Mbps download, 20

  12. The Role of Special Operations Forces in Information Warfare: Enablers, Not Cyber Warriors

    National Research Council Canada - National Science Library

    Edgar, Jeffry

    2000-01-01

    ... (IW) - is not unique to SOF. Conventional forces also execute IW. As a result, SOF runs the risk of losing its unique character as it tries to assume a role that conventional forces can fulfill...

  13. Detachment 101 in the CBI: An Unconventional Warfare Paradigm for Contemporary Special Operations

    Science.gov (United States)

    2010-05-13

    have been based on either a total misreading of the situation in Japan, or a readiness for war.”15 Churchill wanted to find a softer approach to...developed to decipher Japanese diplomatic traffic during World War II. Initially, Japanese traffic was intercepted and labeled as the Japanese ‘Red’ Codes...Donovan had to face the issue and make a decision, which he did by relieving Carl “for physical and medical reasons.”67

  14. Strategic Usefulness of Conventional Force/Special Operations Force Interdependence in Irregular Warfare

    Science.gov (United States)

    2017-06-01

    surgical strike missions, often deep in denied territory like the Osama bin Laden raid in Pakistan or counterterrorism raids in Yemen . “Surgical strike...70 Rothstein, “Less is More,” 283. 71 Alexander George and Andrew Bennett, Case Studies and Theory Development in the Social Sciences... Media Network, September 16, 2011. 75 Ibid. 76 Max Boot, War Made New: Weapons, Warriors, and the Making of the Modern World (New York: Penguin

  15. Past and Potential Theory for Special Warfare Operational Art: People’s War and Contentious Politics

    Science.gov (United States)

    2015-03-04

    bourgeoisie revolution, revolution from above, and peasant revolution.123 These events produced three corresponding revolutionary outcomes...the key structural variables that determined these paths and outcomes within a country were the strength of the bourgeoisie

  16. Attacking the Lion: A Study of Cohesion in Naval Special Warfare Operational Units

    Science.gov (United States)

    2011-06-01

    of Existential Courage.‖ Journal of Humanistic Psychology 44, no. 3 (Summer 2004): 279–298. ———. ―Relevance of Hardiness Assessment and Training to...stealth, teamwork, and violence of action to survive and succeed in missions against larger opponents. Developing bonds of trust between individuals and...a force that conducts kinetic action missions with an emphasis on speed, surprise, and violence of action. For the most part, this mentality

  17. The Art of Limited Warfare: Operational Art in the 1970 Cambodian Campaign

    Science.gov (United States)

    2017-03-16

    Publication (JP) 1-02, Department of Defense Dictionary of Military and Associated Terms (Washington, DC: Government Printing Office, 2016), 227. 5 Ibid...All three of III Corps’ task forces made heavy contact with the enemy, but were able to overwhelm pockets of heavy enemy resistance by integrating... Dictionary of Military and Associated Terms. Washington, DC: Government Printing Office, 2016. Joint Publication (JP) 3-0, Joint Operations

  18. War in the Information Age: A Primer for Cyberspace Operations in 21st Century Warfare

    Science.gov (United States)

    2010-01-01

    funds transfers ( EFT ). 30 Paralleling the rapid expansion of civilian cyberspace use is the increasing use of cyberspace by modern militaries...company files by using a thumb drive to tap the corporate system. Boeing estimated that the stolen documents would have cost it between $5 billion...tactics and intelligence operations such as collecting data, recruiting members of state security services, and setting up phone taps .‖ 69

  19. Cyberspace as a Complex Adaptive System and the Policy and Operational Implications for Cyber Warfare

    Science.gov (United States)

    2014-05-22

    victims would fall prey to the attack vector. Both state and non-state actors alike, driven by a combination of intrinsic and extrinsic motivations ...different roles, motivations , and intentions. Associated complexities of safeguarding cyberspace contribute to the lack of a United States (US... psychological operations. The infosphere is also the entity that DOD doctrine refers to as the information environment in which humans and automated

  20. Adapting Unconventional Warfare Doctrine to Cyberspace Operations: An Examination of Hacktivist Based Insurgencies

    Science.gov (United States)

    2015-06-12

    Agency by Edward Snowden exposed only intelligence collection activities, and not means and methods of cyberspace operations under Title 10 and Joint...Kopstein, Joshua. 2014. “How the NSA Recruits in a Post- Snowden World.” The Daily Beast. Accessed May 6, 2015. http://www.thedailybeast.com...articles/ 2014/01/17/how-the-nsa-recruits-in-a-post- snowden -world.html. Koyfman, Tanya. 2014. “Ukraine versus Russia in a Cyber-Duel.” SenseCy. Accessed

  1. Adaptive Reorganization of German Special Operations Forces

    Science.gov (United States)

    2013-12-01

    properly supported. Materialistically motivated supporters are not preferable for SOF. However, immaterial rewards serve as 76 better motivation...than materialistic rewards. But there is no immaterial or material reward system at all for them. Thus, a reward system for non-operators thus is surely

  2. The ethics of drone warfare

    Directory of Open Access Journals (Sweden)

    Fatić Aleksandar

    2017-01-01

    Full Text Available The paper investigates the compatibility of the modern technologies of warfare, specifically the use of offensive drones, with traditional military ethics and suggests that the new technologies radically change the value system of the military in ways which make large parts of the traditional military ethics inapplicable. The author suggests that Agamben’s concept of ‘effectivity’ through ‘special actions’ which mark one’s belonging to a particular community or profession is a useful conceptual strategy to explore the compatibility of drone warfare with traditional military ethics; this strategy shows mixed results at best.

  3. The Need to Increase Marine Corps Special Operations Command

    Science.gov (United States)

    2009-01-01

    Operations University presentation by Major Mark Raney for USSOCOM elective (lecture, MCU, Quantico VA, 17 Feb 20Q9). 5 Stew Magnuson, "Marine Special...2008 Posture Statement.doc (Accessed 23 December, 2008) 20 David Tucker and Christopher J. Lamb , United States Special Operations Forces (New York...invasion of Afghanistan encroached on the Marine Corps historical role of being "soldiers from the sea." 38 David Tucker and Christopher J. lamb , 182

  4. Operationalizing Special Operations Aviation in Indonesia

    Science.gov (United States)

    2006-12-15

    operations and helped send Indonesians and Malaysians to Afghanistan, first to fight the Soviets and later to train in al-Qaeda camps. They began...execute all its missions with all its aircraft with one exception. The AH-6 “Little Bird Attack” is designed to execute close air support missions. That...is the one and only role the AH-6 executes. As for the other three aircraft, the MH-6, Little Bird Lift; MH-60, Blackhawk; and MH-47, Chinook--are

  5. Electronic Warfare in Operations

    Science.gov (United States)

    2009-02-25

    intelligence-related portion of the EW running estimate. Provides input to the restricted frequency list by recommending guarded frequencies. Provides...preparation of the restricted frequency list and issuance of emissions control guidance. Coordinates frequency allotment, assignment, and use... frequency list . Validating and approving or denying cease-jamming requests. Maintaining situational awareness of all jamming-capable systems in the area

  6. Joint Special Operations University SOF-Power Workshop: A Way Forward for Special Operations Theory and Strategic Art

    Science.gov (United States)

    2011-08-01

    participants‘ particular points of view and may be helpful in researching, developing, testing, and explaining theory. The Secret War in Laos was...Jan 1985. Tse -Tung, Mao. On Guerrilla Warfare. Praeger, New York: 1961. The Use and Utility of Force; Force Fungibles Art, Robert J. and...Penguin Books, New York: 1968. Griffith, Samuel B., (BrigGen (Ret) USMC). On Guerrilla Warfare – Mao Tse -Tung. Praeger, New York: 1961

  7. Oxygen Toxicity and Special Operations Forces Diving: Hidden and Dangerous

    NARCIS (Netherlands)

    Wingelaar, Thijs T.; van Ooij, Pieter-Jan A. M.; van Hulst, Rob A.

    2017-01-01

    In Special Operations Forces (SOF) closed-circuit rebreathers with 100% oxygen are commonly utilized for covert diving operations. Exposure to high partial pressures of oxygen (PO2) could cause damage to the central nervous system (CNS) and pulmonary system. Longer exposure time and higher PO2 leads

  8. Selected Natural Attenuation Monitoring Data, Operable Unit 1, Naval Undersea Warfare Center, Division Keyport, Washington, 2007 and 2008

    Science.gov (United States)

    Dinicola, R.S.; Huffman, R.L.

    2009-01-01

    Previous investigations indicate that natural attenuation and biodegradation of chlorinated volatile organic compounds (VOCs) are substantial in groundwater beneath the 9-acre former landfill at Operable Unit 1 (OU 1), Naval Undersea Warfare Center, Division Keyport, Washington. Phytoremediation combined with on-going natural attenuation processes was the preferred remedy selected by the Navy, as specified in the Record of Decision for the site. The Navy planted two hybrid poplar plantations on the landfill in spring 1999 to remove and to control the migration of chlorinated VOCs in shallow groundwater. The U.S. Geological Survey (USGS) has continued to monitor groundwater geochemistry to ensure that conditions remain favorable for contaminant biodegradation as specified in the Record of Decision. In this report are groundwater geochemical and selected VOC data collected at OU 1 by the USGS during June 18-21, 2007, and June 16-18, 2008, in support of long-term monitoring for natural attenuation. For 2007 and 2008, strongly reducing conditions (sulfate reduction and methanogenesis) most favorable for reductive dechlorination of VOCs were inferred for 9 of 16 upper-aquifer wells and piezometers in the northern and southern phytoremediation plantations. Predominant redox conditions in groundwater from the intermediate aquifer just downgradient from the landfill remained mildly reducing and somewhat favorable for reductive dechlorination of VOCs. Dissolved hydrogen (H2) concentrations measured in the upper aquifer during 2007 and 2008 generally have been lower than H2 concentrations measured before 2002. However, widespread and relatively high methane and sulfide concentrations indicate that the lower H2 concentrations measured do not support a trend from strongly to mildly reducing redox conditions because no widespread changes in groundwater redox conditions were identified that should result in less favorable conditions for the reductive dechlorination of the

  9. Organizing Special Operations Forces: Navigating the Paradoxical Requirements of Institutional-Bureaucratic and operational Environments

    DEFF Research Database (Denmark)

    Dalgaard-Nielsen, Anja

    2017-01-01

    Increased focus on the potential of special operations has lead several countries to establish dedicated special operations organizations. Analysts have warned against bureaucratization, yet little research has explored the effect of organizational formalization or asked how best to organize....... This article draws from research into high-reliability organizations and interviews in Denmark’s Special Operations Command. It contrasts the demands of the command’s institutional-bureaucratic and operational environments and argues that the ability to straddle them is key to success. The high...

  10. Hybrid Maritime Warfare

    DEFF Research Database (Denmark)

    Schaub Jr, Gary John; Murphy, Martin; Hoffman, Frank

    2017-01-01

    Russia’s use of hybrid warfare techniques has raised concerns about the security of the Baltic States. Gary Schaub, Jr, Martin Murphy and Frank G Hoffman recommend a series of measures to augment NATO’s Readiness Action Plan in the Baltic region, including increasing the breadth and depth of naval...... exercises, and improving maritime domain awareness through cooperative programmes. They also suggest unilateral and cooperative measures to develop a sound strategic communications strategy to counter Moscow’s information operations, reduce dependence on Russian energy supplies and build the resilience...

  11. Military Engineers and Chemical Warfare Troops (Inzhenernye Voiska Khimicheskie Voiska),

    Science.gov (United States)

    MILITARY FORCES(FOREIGN), *MILITARY ORGANIZATIONS, MILITARY ENGINEERING , INFANTRY, AMPHIBIOUS OPERATIONS, MINELAYING, ARMORED VEHICLES, NUCLEAR...RADIATION, DOSIMETERS, CHEMICAL WARFARE, PROTECTIVE CLOTHING, DECONTAMINATION, HEALTH PHYSICS.

  12. Journal of Special Operations Medicine, Volume 3, Edition 3

    Science.gov (United States)

    2003-01-01

    focuses on the basic design, construction, uti - lization, components, and nomenclature associated with the ICS. Objectives: 1. Maximize the overall...TX 76134 9. American Society of Health-System Pharmacists : AHFS Drug Information. Bethesda, Maryland; 2002:1305 Journal of Special Operations

  13. 46 CFR 167.30-10 - Special operating requirements.

    Science.gov (United States)

    2010-10-01

    ..., (3) Within or on the boundaries of fuel tanks; or, (4) To pipe lines, heating coils, pumps, fittings, or other appurtenances connected to such cargo or fuel tanks. (c) Such inspections shall be made and... SCHOOL SHIPS Repairs or Alterations § 167.30-10 Special operating requirements. Inspection and testing...

  14. The ethics of drone warfare

    OpenAIRE

    Fatić Aleksandar

    2017-01-01

    The paper investigates the compatibility of the modern technologies of warfare, specifically the use of offensive drones, with traditional military ethics and suggests that the new technologies radically change the value system of the military in ways which make large parts of the traditional military ethics inapplicable. The author suggests that Agamben’s concept of ‘effectivity’ through ‘special actions’ which mark one’s belonging to a particular communit...

  15. Assessment of specialized educational programs for licensed nuclear reactor operators

    International Nuclear Information System (INIS)

    Melber, B.D.; Saari, L.M.; White, A.S.; Geisendorfer, C.L.; Huenefeld, J.C.

    1986-02-01

    This report assesses the job-relatedness of specialized educational programs for licensed nuclear reactor operators. The approach used involved systematically comparing the curriculum of specialized educational programs for college credit, to academic knowledge identified as necessary for carrying out the jobs of licenses reactor operators. A sample of eight programs, including A.S. degree, B.S. degree, and coursework programs were studied. Subject matter experts in the field of nuclear operations curriculum and training determined the extent to which individual program curricula covered the identified job-related academic knowledge. The major conclusions of the report are: There is a great deal of variation among individual programs, ranging from coverage of 15% to 65% of the job-related academic knowledge. Four schools cover at least half, and four schools cover less than one-third of this knowledge content; There is no systematic difference in the job-relatedness of the different types of specialized educational programs, A.S. degree, B.S. degree, and coursework; and Traditional B.S. degree programs in nuclear engineering cover as much job-related knowledge (about one-half of this knowledge content) as most of the specialized educational programs

  16. Unconventional Cyber Warfare: Cyber Opportunities in Unconventional Warfare

    Science.gov (United States)

    2014-06-01

    Internet service provider IW irregular warfare MCO major combat operations MySQL open-source relational database management system NATO North...today, often with no regard for legal or ethical constraints. A better course of action would be to conduct operations in cyberspace within the precepts...built in feature of MySQL that 97 John Markoff, “Before the Gunfire, Cyberattacks,” York Times, August 13, 2008, sec. Technology, 1, http

  17. New special operators in W-gravity theories

    International Nuclear Information System (INIS)

    Rama, S.K.

    1991-01-01

    This paper reports on special physical operators of W 3 -gravity having non-trivial ghost sectors. Some of these operators may be viewed as the Liouville dressings of the energy operator of the Ising model coupled to two-dimensional (2D) gravity and this fills in the gap in the connection between pure W 3 -gravity and Ising model coupled to 2D gravity found in the authors' previous work. The authors formulate a selection rule required for the calculation of correlators in W-gravity theories. Using this rule, the authors construct the non-ghost part of the new operators of W N -gravity and find that they represent the (N,N + 1) minimal model operators from both inside and outside the minimal table. Along the way the authors obtain the canonical spectrum of W N -gravity for all N

  18. The Roles of Decision Makers in Special Operations

    Science.gov (United States)

    2016-12-01

    Forces’ role in solving complex problems. Government leadership is eager to use Special Operations Forces (SOF) to respond to these complex problems...international community and the Israeli authorities as well. The PFLP leadership , in particular, favored hijacking as a terrorist action.12 Other...people’s problems. The members of the Democratic Revolutionary Front of the Liberation of Arabistan thought that calling the rest of the world’s attention

  19. Knowing Your Partner: The Evolution of Brazilian Special Operations Forces

    Science.gov (United States)

    2012-08-01

    Group’s Rescue and Retaking Special Group carrying out a counterterrorism tactical exercise. (Photo courtesy Tecnologia & Defesa) Bottom right...Forces Battalion supported by an Army Aviation HM-1 Pantera helicopter; “Operation ASPA” May 2005, Brasilia/Fed- eral District (Photo: Tecnologia ...Defesa) Top right: Amphibious Commandos carry out a maritime infiltration sup- ported by an S34-Tikuna submarine. (Photo: Tecnologia & Defesa) Bottom

  20. Establishing Cyber Warfare Doctrine

    Directory of Open Access Journals (Sweden)

    Andrew M. Colarik

    2012-01-01

    Full Text Available Over the past several decades, advances in technology have transformed communications and the ability to acquire, disseminate, and utilize information in a range of environments. Modern societies and their respective militaries have taken advantage of a robust information space through network-centric systems. Because military and commercial operations have increasingly converged, communication and information infrastructures are now high-priority military objectives in times of war. This article examines the theoretical underpinning of current cyber warfare research, what we have learned so far about its application, and some of the emerging themes to be considered; it also postulates the development of a (national cyber warfare doctrine (CWD. An endeavor of this scale requires lots of considerations and preparation for its development if it is to be cooperatively embraced. This article considers why information technology systems and their supporting infrastructures should be considered legitimate military targets in conflicts, and offers several events that support this supposition. In addition, it identifies the various forms of doctrine that will become the basis for developing a CWD, discusses a CWD's possible components, and proposes a national collaborative and discussion framework for obtaining a nation's stakeholder buy-in for such an endeavor.

  1. Impact Assessment In Special Warfare

    Science.gov (United States)

    2017-12-01

    Systematic Review and Meta-analysis,” Journal of Research in Crime and Delinquency 52, no. 4 (2015). 27 additional rigorous evaluations” of its... statistical methods, can simulate the randomized assignment into treatment and control and improve understanding of cause and effect. Lyall, Blair...demographic information and the geospatial location of each interview. I used the R statistical program to process the original survey data, filter for

  2. Innovative Practices for Special Warfare

    Science.gov (United States)

    2015-12-01

    stealing customers from traditional quick service fast food restaurants .243 Innovations in restaurant design, food preparation and distribution, are...and diverse organizations to reap the benefits of loyalty and connectivity that small teams enjoy.152 To create the linkages, JSOC strove to dissolve...those new to a field. Garage startups generate many disruptive innovations because “they are not tied to any specific customer base, product design

  3. Special Warfare: A Selected Bibliography.

    Science.gov (United States)

    1983-10-01

    Strategy. Boston: Routledge & Kegan Paul, 1981. (U162 .A78) 8. Atlantic Research Corporation. Georgetown Research Project. A Histori- cal Survey of...Corps Gazette. The Guerrillp. and How to Fight Him: Selections, ed. by T.N. Greene . Nev ’ork: Praeger, 1962. (U240 K33) 108. Martic, Milos. Insurrection

  4. Telemanipulation - a special activity in remotely controlled operations

    International Nuclear Information System (INIS)

    Rose, K.W.; Andre, Y.

    1992-01-01

    Work to be done in areas hostile to humans needs special and careful preparation. If short-term entry is possible, groups of men can be trained to do the necessary work. If not, special devices have to be designed, built, and tested on mockups before the real work can be executed. Based on experience gained from maintenance in car production and test programs for a reprocessing facility, it was decided to train a special group of men to do remotely controlled work in hostile areas without endangering them and to use their personal experience as the basis for future work. This is the old-fashioned way of all professions. Some needs to be able to do that remotely controlled work with normally existing operational means and combinations of them like cranes, mechanical and electromechanical master slave manipulators (MMSMs and EMSMs), saws, files, hammer, tig-welding equipment, etc., in air as well as underwater. This paper discusses use of a remote operator manipulator (ROM), remote operator welder (ROW), a test of underwater work, and the repair of two activated jets pumps of a boiling water reactor BWR with a fueling machine, reactor crane, EMSM, and conventional tools

  5. Creating SOF Networks: The Role of NATO Special Operations as a Testing Ground for SOF Integration

    Science.gov (United States)

    2011-06-01

    Partner Collaborative Network (APCN).” 196 Ibid. 197 Alan Dron , “Special Network—Alliance Aims to Improve Cooperation among Special Operators...198 Dron , “Special Network—Alliance Aims to Improve Cooperation Among Special Operators.” 199 Ibid. 200 Briefing...manning-20110303. 205 Dron , “Special Network -Alliance Aims to Improve Cooperation Among Special Operators.” 69 expanding network of trusted global

  6. Decoding Computer Games: Studying “Special Operation 85”

    Directory of Open Access Journals (Sweden)

    Bahareh Jalalzadeh

    2009-11-01

    Full Text Available As other media, computer games convey messages which have tow features: explicit and implicit. Semiologically studying computer games and comparing them with narrative structures, the present study attempts to discover the messages they convey. Therefore we have studied and decoded “Special operation 85” as a semiological text. Results show that the game’s features, as naming, interests and motivations of the engaged people, and the events narrated, all lead the producers to their goals of introducing and publicizing Iranian-Islamic cultural values. Although this feature makes “Special Opreation 85” a unique game, it fails in its attempt to produce a mythical personage in Iranian-Islamic cultural context.

  7. Flying Electronic Warfare Laboratory

    Data.gov (United States)

    Federal Laboratory Consortium — FUNCTION: Provides NP-3D aircraft host platforms for Effectiveness of Navy Electronic Warfare Systems (ENEWS) Program antiship missile (ASM) seeker simulators used...

  8. Journal of Special Operations Medicine, Training Supplement. Winter 2011

    Science.gov (United States)

    2011-01-01

    Conjunctivitis 46 Cough U Crusll Syndrome See Taclical Trauma Protocols Deep Venous Thrombosis (DVT ) 43 Dehydration 49 Dental Pain SO eet.rmlnatlon of Death...Pnt:lrlty .... acualoon II I1etl)’drallorl pBfS򓮷 atler trealmMt. - Journal of Special Operations Medicine / Training SupplementTMEPS 50 DENTAL ...gynecomastill . Impol8flce. kidll8y calculus , nep/WltiI. ,nd urine abnormality. o SIOIlI KALETRA son !lelatin capsules fli 36· F - .6· F (2· C - 8· C) until

  9. Basing the US Air Force Special Operations Forces.

    Science.gov (United States)

    1986-12-01

    Headquarters Military Airlift Command (Hq MAC/XONP), Scott AFB, IL, July 8, 1986. 2. Daskin , Mark S. " A Maximum Expected Covering Location Model: Formulation...7942 m~ I SAIR F ORME S ECI L PE DO S CHOOL’ 1 OF EMNIEERINO A E KCRAUS DEC 66 RFIT/OOLOS/MN-6 IUCLRS SIFIE F.’G1F/OI L Ehhmhmmhhhhhhl smomhmhmhhum...Ap a . %Ř ~ ,~, ~~%9~ q%%~ * % . i %%~ . ~* - out; ’-ILE Copy / AFIT/GOR/OS/86D-6 II BASING THE US AIR FORCE SPECIAL OPERATIONS FORCES THESIS Mark E

  10. Analysis on Joint Operational Capability in the Condition of Information and Psychological Warfares%信息心理对抗条件下联合作战能力分析

    Institute of Scientific and Technical Information of China (English)

    闫家传; 秦伟; 陈璐; 张仁友

    2011-01-01

    In the information age, operational capabilities of troops include firepower, defense power, maintainance power, information power and many other factors, and the warfares between the opponents represent force confrontation, psychological confrontation, information warfares and many other complex forms. Based on the quantity analysis of joint operational capability, mutual functional mechanism of information, psychology and combat power is analyzed, and three feedback loops of operational confrontation, information warfares and psychological warfares are educed, and then system dynamical models are established, and effects on joint operational capability by information, psychology and other factors are deduced in the prospect of quantity.%信息化条件下作战,部队的作战能力表现为包括火力、防护力、保障力、信息力等多种因素的联合作战能力,作战双方的对抗表现为兵力对抗,心理对抗,信息对抗等多种复杂的形式.在联合作战能力量化分析基础上,分析了信息、心理和战斗力相互作用机制,得出了战斗对抗、信息对抗、心理对抗3个反馈回路环,并据此建立了系统动力学模型,从定量的角度分析了信息、心理等因素对联合作战能力的影响.

  11. Oxygen Toxicity and Special Operations Forces Diving: Hidden and Dangerous

    Directory of Open Access Journals (Sweden)

    Thijs T. Wingelaar

    2017-07-01

    Full Text Available In Special Operations Forces (SOF closed-circuit rebreathers with 100% oxygen are commonly utilized for covert diving operations. Exposure to high partial pressures of oxygen (PO2 could cause damage to the central nervous system (CNS and pulmonary system. Longer exposure time and higher PO2 leads to faster development of more serious pathology. Exposure to a PO2 above 1.4 ATA can cause CNS toxicity, leading to a wide range of neurologic complaints including convulsions. Pulmonary oxygen toxicity develops over time when exposed to a PO2 above 0.5 ATA and can lead to inflammation and fibrosis of lung tissue. Oxygen can also be toxic for the ocular system and may have systemic effects on the inflammatory system. Moreover, some of the effects of oxygen toxicity are irreversible. This paper describes the pathophysiology, epidemiology, signs and symptoms, risk factors and prediction models of oxygen toxicity, and their limitations on SOF diving.

  12. Special Operations Forces (SOF) technical analysis and evaluation

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1987-08-31

    In response to Task Order 001, Los Alamos National Laboratory Contract 9-L5H-1508P-1, Betac Corporation is pleased to provide ten quick-response, short-term analytical papers in support of Low Intensity Conflict (LIC) and Special Operations (SO). The papers are study methodologies which provide background, baseline, concepts, approaches, and recommendations in the mission areas identified in the Statement of Work. Although the Statement of Work specifies only nine papers, a tenth paper has been included addressing Command Relationships, since this subject affects all other topics and is of critical importance to USCINCSOC in establishing the United States Special Operations Command (USSOCOM). Each paper addresses the feasibility of further effort in each area of interest. The ten papers address: (1) mission support systems; (2) research, development, and acquisition; (3) headquarters equipment; (4) C3I architecture; (5) intelligence dissemination; (6) intelligence collection management; (7) intelligence support to SOF targeting; (8) joint mission area analysis (JMAA); (9) joint SOF master plan; and (10) command relationships.

  13. Ion mobility spectrometric analysis of vaporous chemical warfare agents by the instrument with corona discharge ionization ammonia dopant ambient temperature operation.

    Science.gov (United States)

    Satoh, Takafumi; Kishi, Shintaro; Nagashima, Hisayuki; Tachikawa, Masumi; Kanamori-Kataoka, Mieko; Nakagawa, Takao; Kitagawa, Nobuyoshi; Tokita, Kenichi; Yamamoto, Soichiro; Seto, Yasuo

    2015-03-20

    The ion mobility behavior of nineteen chemical warfare agents (7 nerve gases, 5 blister agents, 2 lachrymators, 2 blood agents, 3 choking agents) and related compounds including simulants (8 agents) and organic solvents (39) was comparably investigated by the ion mobility spectrometry instrument utilizing weak electric field linear drift tube with corona discharge ionization, ammonia doping, purified inner air drift flow circulation operated at ambient temperature and pressure. Three alkyl methylphosphonofluoridates, tabun, and four organophosphorus simulants gave the intense characteristic positive monomer-derived ion peaks and small dimer-derived ion peaks, and the later ion peaks were increased with the vapor concentrations. VX, RVX and tabun gave both characteristic positive monomer-derived ions and degradation product ions. Nitrogen mustards gave the intense characteristic positive ion peaks, and in addition distinctive negative ion peak appeared from HN3. Mustard gas, lewisite 1, o-chlorobenzylidenemalononitrile and 2-mercaptoethanol gave the characteristic negative ion peaks. Methylphosphonyl difluoride, 2-chloroacetophenone and 1,4-thioxane gave the characteristic ion peaks both in the positive and negative ion mode. 2-Chloroethylethylsulfide and allylisothiocyanate gave weak ion peaks. The marker ion peaks derived from two blood agents and three choking agents were very close to the reactant ion peak in negative ion mode and the respective reduced ion mobility was fluctuated. The reduced ion mobility of the CWA monomer-derived peaks were positively correlated with molecular masses among structurally similar agents such as G-type nerve gases and organophosphorus simulants; V-type nerve gases and nitrogen mustards. The slope values of the calibration plots of the peak heights of the characteristic marker ions versus the vapor concentrations are related to the detection sensitivity, and within chemical warfare agents examined the slope values for sarin, soman

  14. Special issue on quantum physics with non-Hermitian operators Special issue on quantum physics with non-Hermitian operators

    Science.gov (United States)

    Bender, Carl M.; Fring, Andreas; Guenther, Uwe; Jones, Hugh F.

    2012-01-01

    This is a call for contributions to a special issue of Journal of Physics A: Mathematical and Theoretical dedicated to quantum physics with non-Hermitian operators. The main motivation behind this special issue is to gather together recent results, developments and open problems in this rapidly evolving field of research in a single comprehensive volume. We expect that such a special issue will become a valuable reference for the broad scientific community working in mathematical and theoretical physics. The issue will be open to all contributions containing new results on non-Hermitian theories which are explicitly PT-symmetric and/or pseudo-Hermitian or quasi-Hermitian. The main novelties in the past years in this area have been many experimental observations, realizations, and applications of PT symmetric Hamiltonians in optics and microwave cavities. We especially invite contributions on the theoretical interpretations of these recent PT-symmetric experiments and on theoretical proposals for new experiments. Editorial policy The Guest Editors for this issue are Carl Bender, Andreas Fring, Uwe Guenther and Hugh Jones. The areas and topics for this issue include, but are not limited to: spectral problems novel properties of complex optical potentials PT-symmetry related threshold lasers and spectral singularities construction of metric operators scattering theory supersymmetric theories Lie algebraic and Krein-space methods random matrix models classical and semi-classical models exceptional points in model systems operator theoretic approaches microwave cavities aspects of integrability and exact solvability field theories with indefinite metric All contributions will be refereed and processed according to the usual procedure of the journal. Papers should report original and significant research that has not already been published. Guidelines for preparation of contributions The deadline for contributed papers will be 31 March 2012. This deadline will allow the

  15. Surgical Instrument Sets for Special Operations Expeditionary Surgical Teams.

    Science.gov (United States)

    Hale, Diane F; Sexton, Justin C; Benavides, Linda C; Benavides, Jerry M; Lundy, Jonathan B

    The deployment of surgical assets has been driven by mission demands throughout years of military operations in Iraq and Afghanistan. The transition to the highly expeditious Golden Hour Offset Surgical Transport Team (GHOST- T) now offers highly mobile surgical assets in nontraditional operating rooms; the content of the surgical instrument sets has also transformed to accommodate this change. The 102nd Forward Surgical Team (FST) was attached to Special Operations assigned to southern Afghanistan from June 2015 to March 2016. The focus was to decrease overall size and weight of FST instrument sets without decreasing surgical capability of the GHOST-T. Each instrument set was evaluated and modified to include essential instruments to perform damage control surgery. The overall number of main instrument sets was decreased from eight to four; simplified augmentation sets have been added, which expand the capabilities of any main set. The overall size was decreased by 40% and overall weight decreased by 58%. The cardiothoracic, thoracotomy, and emergency thoracotomy trays were condensed to thoracic set. The orthopedic and amputation sets were replaced with an augmentation set of a prepackaged orthopedic external fixator set). An augmentation set to the major or minor basic sets, specifically for vascular injuries, was created. Through the reorganization of conventional FST surgical instrument sets to maintain damage control capabilities and mobility, the 102nd GHOST-T reduced surgical equipment volume and weight, providing a lesson learned for future surgical teams operating in austere environments. 2017.

  16. Information Warfare and Ethics

    Directory of Open Access Journals (Sweden)

    M.J. Warren

    2001-05-01

    Full Text Available This paper examines the ethics of the practice of information warfare at both the national and corporate levels. Initially examining the present and past actions of individual hackers, it moves to the more organised, future military and economic warfare scenarios. It examines the lack of legal or policy initiatives in this area.

  17. Difficult Decisions: Chemical Warfare.

    Science.gov (United States)

    Slesnick, Irwin L.; Miller, John A.

    1988-01-01

    Gives the background history and chemistry of modern day chemical warfare from World War I to the present. Provides discussion questions to stimulate deeper thinking on the issue. Contains a discussion activity called "Can New Chemical Weapons Lead to Humane Warfare?" (CW)

  18. Anti-Air Warfare Research for Naval Forces

    NARCIS (Netherlands)

    Bloemen, A.A.F.; Witberg, R.

    2000-01-01

    AAW is a warfare area with wide-spread spectrum. Command and Control Systems, sensors, effectors and electronic warfare are integrated to a system, they influence each other and must eventually be effective in coordinated action. This complexity asks for Operations Research methods to measure

  19. What’s Operations Research? and Why Should We (Interagents) Care?

    Science.gov (United States)

    2010-02-09

    OR (from DSB Report on ISR applications) – World War I • Thomas Edison led anti-submarine warfare tactics study/development – World War II • English...Operations – Joint Warfare – Resources/Readiness/Training – Acquisition – Interdisciplinary Advances in OR • Recent Special Meetings – Power and Energy...the scientific method to inform decisions • Early applications were military operations focused – Lanchester equations of combat – Anti-submarine

  20. U.S. Special Forces: culture warriors

    OpenAIRE

    Hill, Joshua L.

    2014-01-01

    Approved for public release; distribution is unlimited U.S. Army Special Forces (SF) are consistently called upon to work by, with, and through indigenous forces to conduct special warfare. Current SF doctrine reflects an increasing desire for SF operators to be culturally proficient in order to work closely with locals, advise foreign militaries, and build relationships with host-nation counterparts. Despite the doctrinal emphasis on cultural proficiency, SF doctrine offers little concret...

  1. 46 CFR 153.1000 - Special operating requirements for cargoes reactive with water.

    Science.gov (United States)

    2010-10-01

    ... 46 Shipping 5 2010-10-01 2010-10-01 false Special operating requirements for cargoes reactive with water. 153.1000 Section 153.1000 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED... MATERIALS Operations Special Cargo Procedures § 153.1000 Special operating requirements for cargoes reactive...

  2. Improving Integrated Operation in the Joint Integrated Mission Model (JIMM) and the Simulated Warfare Environment Data Transfer (SWEDAT) Protocol

    National Research Council Canada - National Science Library

    Mutschler, David W

    2005-01-01

    ...). It allows integrated operation of resources whereby the JIMM threat environment, stimulators virtual cockpits, systems under test, and other agents are combined within the same simulation exercise...

  3. MOSES, development of an Underwater Warfare Testbed

    NARCIS (Netherlands)

    Lentze, S.G.

    2001-01-01

    The TNO underwater warfare (UWW) research programme results in a large number of models used in operational research projects. To enhance the accessibility and re-use of these models for new projects, TNO-FEL has developed the modelling environment ‘MOSES - Maritime Operations Simulation and

  4. Detection of Special Operations Forces Using Night Vision Devices

    Energy Technology Data Exchange (ETDEWEB)

    Smith, C.M.

    2001-10-22

    Night vision devices, such image intensifiers and infrared imagers, are readily available to a host of nations, organizations, and individuals through international commerce. Once the trademark of special operations units, these devices are widely advertised to ''turn night into day''. In truth, they cannot accomplish this formidable task, but they do offer impressive enhancement of vision in limited light scenarios through electronically generated images. Image intensifiers and infrared imagers are both electronic devices for enhancing vision in the dark. However, each is based upon a totally different physical phenomenon. Image intensifiers amplify the available light energy whereas infrared imagers detect the thermal energy radiated from all objects. Because of this, each device operates from energy which is present in a different portion of the electromagnetic spectrum. This leads to differences in the ability of each device to detect and/or identify objects. This report is a compilation of the available information on both state-of-the-art image intensifiers and infrared imagers. Image intensifiers developed in the United States, as well as some foreign made image intensifiers, are discussed. Image intensifiers are categorized according to their spectral response and sensitivity using the nomenclature of GEN I, GEN II, and GEN III. As the first generation of image intensifiers, GEN I, were large and of limited performance, this report will deal with only GEN II and GEN III equipment. Infrared imagers are generally categorized according to their spectral response, sensor materials, and related sensor operating temperature using the nomenclature Medium Wavelength Infrared (MWIR) Cooled and Long Wavelength Infrared (LWIR) Uncooled. MWIR Cooled refers to infrared imagers which operate in the 3 to 5 {micro}m wavelength electromagnetic spectral region and require either mechanical or thermoelectric coolers to keep the sensors operating at 77 K

  5. Increasing Airpower’s Effectiveness: Applying the U.S. Army’s Operational Design Methodology to Airpower in Warfare

    Science.gov (United States)

    2010-04-01

    understanding choice.”24 Another way of demonstrating the kind of systems thinking that is used to power operational design is found in Checkland and...interactive design (redesigning the future and inventing ways to bring it about).” 25 Peter Checkland and John Poulter, Learning for Action: A Short...26 Checkland and Poulter, Learning for Action, 22. 9 ideas.”27 The next foundation of operational design is the concept of reflection or reflective

  6. Harsh Climates, Poor Transportation, And Irregular Warfare: Logistical Difficulties From Napoleon To The Soviet - Afghan War That Affect Operational Campaigns

    Science.gov (United States)

    2014-04-01

    confident about having two operational campaigns in the Iberian Peninsula and Russia where the climate , transportation infrastructure, and threats...campaigns in the Iberian Peninsula and Russia exhibited effects of the harsh climates on logistical effectiveness. The climates in the Iberian Peninsula ...decreasing). The Iberian Peninsula climate consists of vast infertile areas with mountains, hills, and dry regions ill-suited for logistically

  7. Expeditionary Warfare- Force Protection

    National Research Council Canada - National Science Library

    Higgins, Eric

    2004-01-01

    In 2003, the Systems Engineering and Analysis students were tasked to develop a system of systems conceptual solution to provide force protection for the Sea Base conceptualized in the 2002 Expeditionary Warfare study...

  8. 14 CFR 93.177 - Operations in the Special Air Traffic Rule Area.

    Science.gov (United States)

    2010-01-01

    ... 14 Aeronautics and Space 2 2010-01-01 2010-01-01 false Operations in the Special Air Traffic Rule Area. 93.177 Section 93.177 Aeronautics and Space FEDERAL AVIATION ADMINISTRATION, DEPARTMENT OF TRANSPORTATION (CONTINUED) AIR TRAFFIC AND GENERAL OPERATING RULES SPECIAL AIR TRAFFIC RULES Special Flight Rules in the Vicinity of Luke AFB, AZ §...

  9. Unmanned Warfare: Second and Third Order Effects Stemming from the Afghan Operational Environment between 2001 and 2010

    Science.gov (United States)

    2011-06-10

    water. They do not get tired after being engaged in combat operations for hours or days. They simply need fuel and a resupply of weapons. If an area...modern conflicts. Kaplan captures this concept first hand in a quote from another remotely piloted aircraft pilot that said, “we‟re in the thick of...in an attempt to capture high level Al Qaeda leaders but “wanted to tread cautiously in Pakistan for fear of undermining” senior leadership within

  10. Biological warfare agents

    Directory of Open Access Journals (Sweden)

    Duraipandian Thavaselvam

    2010-01-01

    Full Text Available The recent bioterrorist attacks using anthrax spores have emphasized the need to detect and decontaminate critical facilities in the shortest possible time. There has been a remarkable progress in the detection, protection and decontamination of biological warfare agents as many instrumentation platforms and detection methodologies are developed and commissioned. Even then the threat of biological warfare agents and their use in bioterrorist attacks still remain a leading cause of global concern. Furthermore in the past decade there have been threats due to the emerging new diseases and also the re-emergence of old diseases and development of antimicrobial resistance and spread to new geographical regions. The preparedness against these agents need complete knowledge about the disease, better research and training facilities, diagnostic facilities and improved public health system. This review on the biological warfare agents will provide information on the biological warfare agents, their mode of transmission and spread and also the detection systems available to detect them. In addition the current information on the availability of commercially available and developing technologies against biological warfare agents has also been discussed. The risk that arise due to the use of these agents in warfare or bioterrorism related scenario can be mitigated with the availability of improved detection technologies.

  11. Biological warfare agents

    Science.gov (United States)

    Thavaselvam, Duraipandian; Vijayaraghavan, Rajagopalan

    2010-01-01

    The recent bioterrorist attacks using anthrax spores have emphasized the need to detect and decontaminate critical facilities in the shortest possible time. There has been a remarkable progress in the detection, protection and decontamination of biological warfare agents as many instrumentation platforms and detection methodologies are developed and commissioned. Even then the threat of biological warfare agents and their use in bioterrorist attacks still remain a leading cause of global concern. Furthermore in the past decade there have been threats due to the emerging new diseases and also the re-emergence of old diseases and development of antimicrobial resistance and spread to new geographical regions. The preparedness against these agents need complete knowledge about the disease, better research and training facilities, diagnostic facilities and improved public health system. This review on the biological warfare agents will provide information on the biological warfare agents, their mode of transmission and spread and also the detection systems available to detect them. In addition the current information on the availability of commercially available and developing technologies against biological warfare agents has also been discussed. The risk that arise due to the use of these agents in warfare or bioterrorism related scenario can be mitigated with the availability of improved detection technologies. PMID:21829313

  12. The formulation of a peer evaluation measure for special forces: operational forces operator traits and attitude questionnaire (SFO-TAQ)

    CSIR Research Space (South Africa)

    Van Heerden, A

    2016-11-01

    Full Text Available International Military Testing Association (IMTA) Conference, New Delhi, India, 7-11 November 2016 The formulation of a peer evaluation measure for special forces: operational forces operator traits and attitude questionnaire (SFO-TAQ) Van Heerden A...

  13. Book Review COMPOSITE WARFARE: THE CONDUCT OF ...

    African Journals Online (AJOL)

    COMPOSITE WARFARE: THE CONDUCT OF. SUCCESSFUL GROUND FORCE. OPERATIONS IN AFRICA. Eeben Barlow. Abel Esterhuyse, PhD. Stellenbosch University. Pinetown: 30 Degrees South Publishers. 2015, 576 pages. ISBN 9781928211761. Africa is still one of the most conflict-ridden places on earth – from ...

  14. New Developments in Chinese Strategic Psychological Warfare

    Science.gov (United States)

    2005-01-01

    Taoism , which coupled hardness with softness in warfare, was not the only influence on the theory of psychological operations in ancient China. Other...portraying Islamic martyrs who appear to speak to soldiers from the clouds.38 In contemporary wars, such as the Gulf War, the first targets attacked have

  15. Irregular Warfare: Impact on Future Professional Military Education

    National Research Council Canada - National Science Library

    Paschal, David G

    2006-01-01

    ... to operate effectively in an irregular warfare environment. The utility of a decisive war between nation states continues to decline and will eventually reach critical mass based upon the extreme imbalance of military power and a U.S. monopoly...

  16. The Role of Airpower in Urban Warfare. An Airman's Perspective

    National Research Council Canada - National Science Library

    Saffold, Timothy

    1998-01-01

    .... This emphasis on surface force employment stifles innovative thought as to how military forces can achieve operational and strategic effects by employing airpower as the key instrument of force in urban warfare...

  17. Fourth Generation Warfare: The Need for a Comprehensive Approach

    National Research Council Canada - National Science Library

    Benton, LeRoy D

    2008-01-01

    .... A definition of Fourth Generation Warfare is developed, based on Col. Thomas X. Hammes' writings. The definition is further developed to show relevance and applicability to current operations in the Long War on Terrorism...

  18. Defense.gov Special Report: Defense Officials Release Operational Energy

    Science.gov (United States)

    , DOD Operational Energy Strategy DOD's Operational Energy Strategy will guide the Defense Department to operations are among the goals of the Defense Department's operational energy strategy, a senior Pentagon operational energy footprint, experts in solar power, microgrids and "smart" generators recently

  19. Chemical warfare agents.

    Science.gov (United States)

    Kuca, Kamil; Pohanka, Miroslav

    2010-01-01

    Chemical warfare agents are compounds of different chemical structures. Simple molecules such as chlorine as well as complex structures such as ricin belong to this group. Nerve agents, vesicants, incapacitating agents, blood agents, lung-damaging agents, riot-control agents and several toxins are among chemical warfare agents. Although the use of these compounds is strictly prohibited, the possible misuse by terrorist groups is a reality nowadays. Owing to this fact, knowledge of the basic properties of these substances is of a high importance. This chapter briefly introduces the separate groups of chemical warfare agents together with their members and the potential therapy that should be applied in case someone is intoxicated by these agents.

  20. Operant Conditioning: A Tool for Special Physical Educators in the 1980s.

    Science.gov (United States)

    Dunn, John M.; French, Ron

    1982-01-01

    The usefulness of operant conditioning for the special physical educator in managing behavior problems is pointed out, and steps to follow in applying operant conditioning techniques are outlined. (SB)

  1. Moral Warfare in Counterinsurgency Operations

    National Research Council Canada - National Science Library

    Chiarenza, David C

    2007-01-01

    .... This monograph argues that resistance to U.S. endeavors in Iraq is due to losses in the moral realm for the compliance and support of the Iraqi people, which is critical in defeating any insurgency...

  2. Chemical warfare agents

    Directory of Open Access Journals (Sweden)

    Vijayaraghavan R

    2010-01-01

    Full Text Available Among the Weapons of Mass Destruction, chemical warfare (CW is probably one of the most brutal created by mankind in comparison with biological and nuclear warfare. Chemical weapons are inexpensive and are relatively easy to produce, even by small terrorist groups, to create mass casualties with small quantities. The characteristics of various CW agents, general information relevant to current physical as well as medical protection methods, detection equipment available and decontamination techniques are discussed in this review article. A brief note on Chemical Weapons Convention is also provided.

  3. Chemical warfare agents

    Science.gov (United States)

    Ganesan, K.; Raza, S. K.; Vijayaraghavan, R.

    2010-01-01

    Among the Weapons of Mass Destruction, chemical warfare (CW) is probably one of the most brutal created by mankind in comparison with biological and nuclear warfare. Chemical weapons are inexpensive and are relatively easy to produce, even by small terrorist groups, to create mass casualties with small quantities. The characteristics of various CW agents, general information relevant to current physical as well as medical protection methods, detection equipment available and decontamination techniques are discussed in this review article. A brief note on Chemical Weapons Convention is also provided. PMID:21829312

  4. 30 CFR 710.12 - Special exemption for small operators.

    Science.gov (United States)

    2010-07-01

    ... dates of operation. (5) A copy of coal severance tax returns for coal produced during the year ending on... intends to conduct surface coal mining operations on or after May 3, 1978, that permittee may receive from... handling of spoil; (2) Apply to surface coal mining operations to be conducted under a permit or renewed...

  5. U.S. Special Operations Forces (SOF): Background and Issues for Congress

    Science.gov (United States)

    2017-01-06

    3 Information in this section is taken from USSOCOM Information Paper , “Special Operations Forces: 2020: Theater Special Operations...1985), Panama (1989), the Mideast during the Gulf War (1991), Somalia (1993), Haiti (1994), the Balkans (1996-2002), Afghanistan (2001-present), and

  6. 14 CFR Appendix A to Part 136 - Special Operating Rules for Air Tour Operators in the State of Hawaii

    Science.gov (United States)

    2010-01-01

    ... Operators in the State of Hawaii A Appendix A to Part 136 Aeronautics and Space FEDERAL AVIATION... Appendix A to Part 136—Special Operating Rules for Air Tour Operators in the State of Hawaii Section 1... flights conducted in the State of Hawaii under 14 CFR parts 91, 121, and 135. This appendix does not apply...

  7. Special Operations Forces Language and Culture Needs Assessment: Immersion Training

    Science.gov (United States)

    2010-11-01

    in TL Listen in TL Train or teach other in TL Conduct business negotiations in TL Use TL to maintain control Use TL to persuade people Use informal... teach what you’re going to do, you do a practical exercise where they’re integrating, the person’s integrating what you just taught them in a...1990). Investigating fluency in EFL : A quantitative approach. Language Learning, 3, 387– 417. Owens, W. (2010). Improving cultural education of Special

  8. The Physics of Warfare

    Science.gov (United States)

    Giordano, Gerardo

    2015-01-01

    Recently, I was tasked with the creation and execution of a new themed general education physics class called The Physics of Warfare. In the past, I had used the theme of a class, such as the physics of sports medicine, as a way to create homework and in-class activities, generate discussions, and provide an application to demonstrate that physics…

  9. Mappings for Special Functions on Cantor Sets and Special Integral Transforms via Local Fractional Operators

    Directory of Open Access Journals (Sweden)

    Yang Zhao

    2013-01-01

    Full Text Available The mappings for some special functions on Cantor sets are investigated. Meanwhile, we apply the local fractional Fourier series, Fourier transforms, and Laplace transforms to solve three local fractional differential equations, and the corresponding nondifferentiable solutions were presented.

  10. Natural attenuation of chlorinated volatile organic compounds in ground water at Operable Unit 1, Naval Undersea Warfare Center, Division Keyport, Washington

    Science.gov (United States)

    Dinicola, Richard S.; Cox, S.E.; Landmeyer, J.E.; Bradley, P.M.

    2002-01-01

    The U.S. Geological Survey (USGS) evaluated the natural attenuation of chlorinated volatile organic compounds (CVOCs) in ground water beneath the former landfill at Operable Unit 1 (OU 1), Naval Undersea Warfare Center, Division Keyport, Washington. The predominant contaminants in ground water are trichloroethene (TCE) and its degradation byproducts cis-1,2-dichloroethene (cisDCE) and vinyl chloride (VC). The Navy planted two hybrid poplar plantations on the landfill in spring of 1999 to remove and control the migration of CVOCs in shallow ground water. Previous studies provided evidence that microbial degradation processes also reduce CVOC concentrations in ground water at OU 1, so monitored natural attenuation is a potential alternative remedy if phytoremediation is ineffective. This report describes the current (2000) understanding of natural attenuation of CVOCs in ground water at OU 1 and the impacts that phytoremediation activities to date have had on attenuation processes. The evaluation is based on ground-water and surface-water chemistry data and hydrogeologic data collected at the site by the USGS and Navy contractors between 1991 and 2000. Previously unpublished data collected by the USGS during 1996-2000 are presented. Natural attenuation of CVOCs in shallow ground water at OU 1 is substantial. For 1999-2000 conditions, approximately 70 percent of the mass of dissolved chlorinated ethenes that was available to migrate from the landfill was completely degraded in shallow ground water before it could migrate to the intermediate aquifer or discharge to surface water. Attenuation of CVOC concentrations appears also to be substantial in the intermediate aquifer, but biodegradation appears to be less significant; those conclusions are less certain because of the paucity of data downgradient of the landfill beneath the tide flats. Attenuation of CVOC concentrations is also substantial in surface water as it flows through the adjacent marsh and out to the tide

  11. The Utility of Freedom: A Principal-Agent Model for Unconventional Warfare

    Science.gov (United States)

    2011-06-01

    Lanchester Model of Guerrilla Warfare,‖ Operations Research 10, no. 6 (December 1962): 818–827; William A. Niskanen, ―Review: The Economics of Insurgency...http://galenet.galegroup.com/servlet/DDRS?locID=navalps. Deitchman, S. J. ―A Lanchester Model of Guerrilla Warfare.‖ Operations Research 10, no

  12. Role of Special Forces Liaison Elements in Future Multinational Operations

    National Research Council Canada - National Science Library

    Swatek, Bruce

    2002-01-01

    ... of variables than those experienced during the Gulf War and subsequent combined operations. Thus, US commanders will require a conduit, such as SFLEs, also referred to as coalition support teams (CSTs...

  13. Microhematuria Associated with a Special Operations Craft Mission

    National Research Council Canada - National Science Library

    Hodgdon, James A; Walsh, Brandon J; Hackney, Anthony C

    2004-01-01

    .... In order to determine whether or not a similar hematuria accompanies mechanical shock exposure associated with small boat operations in the open ocean, urinary variables were measured in two boat crews (total N = 12...

  14. Biometrics in support of special forces medical operations.

    Science.gov (United States)

    Kershner, Michael R

    2012-01-01

    Recommendations on ways in which the ODA can leverage biometrics in medical operations to improve their security, improve relations with indigenous personnel, and contribute to the larger theater biometrics program. 2012.

  15. The Role of Army National Guard Special Forces Domestically And in Special Operations Command - North

    Science.gov (United States)

    2014-12-01

    Domestic Cannabis Suppression Operations Support ...................20 4. Counterdrug-Related Training and Training LEA/Military Personnel...domestic operations that the regular Army is prevented by Posse Comitatus1 restrictions, is a worthy topic for deeper exploration. This thesis...ones that include offensive measures taken to prevent , deter, preempt, and respond to terrorism. Hostage rescue, recovery of sensitive materials and

  16. Time cycle calculation procedure for the special crew during the mining mobile machine complex operation

    International Nuclear Information System (INIS)

    Shmurygin, V; Lukyanov, V; Maslovsky, A

    2015-01-01

    The relevance of the research is specified by the necessity to optimize the delft mobile tunneling equipment operation. Target of the research is tunneling time cycle justification for the special crew during the mining mobile machine complex operation. Methods of the research included the consideration of operation organization schemes in the drifting face and effective use of the mobile equipment during mine exploratory working operations. Time cycle calculation procedures for major processes have been considered. This has been done for the special crew during the mobile machine complex operations for several working faces and various organization schemes

  17. Journal of Special Operations Medicine, Volume 3, Edition 2

    Science.gov (United States)

    2003-01-01

    types of fluids and drugs uti - lized and their rates of infusion, as well as the poten- tial for intraosseous infusion in military operations. Many of...Pharmacologic Basis of Therapeutics. Tenth edition: 695 16. American Society of Health-System Pharmacists : AHFS Drug Information. Bethesda, Maryland

  18. Journal of Special Operations Medicine Volume 1, Edition 1

    Science.gov (United States)

    2001-01-01

    the enemy, and generally regard them with unspo- ken respect. The feelings they must have for those who are realistically threatening their lives...Cobras from the 1st Cav Division area of operation just down to the south of us, Loaches , even a Chi- nook. And fixed wing! We had everything but a B-52

  19. 48 CFR 970.1504-1-3 - Special considerations: Laboratory management and operation.

    Science.gov (United States)

    2010-10-01

    ...: Laboratory management and operation. 970.1504-1-3 Section 970.1504-1-3 Federal Acquisition Regulations System DEPARTMENT OF ENERGY AGENCY SUPPLEMENTARY REGULATIONS DOE MANAGEMENT AND OPERATING CONTRACTS Contracting by Negotiation 970.1504-1-3 Special considerations: Laboratory management and operation. (a) For the management...

  20. 14 CFR Special Federal Aviation... - Air Traffic Control System Emergency Operation

    Science.gov (United States)

    2010-01-01

    ... 14 Aeronautics and Space 2 2010-01-01 2010-01-01 false Air Traffic Control System Emergency Operation Federal Special Federal Aviation Regulation No. 60 Aeronautics and Space FEDERAL AVIATION ADMINISTRATION, DEPARTMENT OF TRANSPORTATION (CONTINUED) AIR TRAFFIC AND GENERAL OPERATING RULES GENERAL OPERATING AND FLIGHT RULES Pt. 91, SFAR No. 60...

  1. Association of prospective lower extremity musculoskeletal injury and musculoskeletal, balance, and physiological characteristics in Special Operations Forces.

    Science.gov (United States)

    Keenan, Karen A; Wohleber, Meleesa F; Perlsweig, Katherine A; Baldwin, Thomas M; Caviston, Michael; Lovalekar, Mita; Connaboy, Christopher; Nindl, Bradley C; Beals, Kim

    2017-11-01

    Previous research has examined lower extremity (LE) musculoskeletal injury (MSI) patterns and risk factors in Special Operations Forces (SOF) trainees, conventional military personnel, and athletes; however, it is unclear if SOF have the same patterns/risk factors. This study aimed to determine the association of musculoskeletal, balance, and physiological characteristics with LE MSI in SOF. Cohort study. A total of 726 Air Force (N=140), Navy Sea, Air, and Land (N=301), and Special Warfare Combatant Crewmen (N=285) SOF (age=25.72±4.77years, height=178.34±6.63cm, weight=84.28±9.03kg) participated in laboratory testing, including: LE muscular strength and flexibility; balance; body composition; anaerobic power/capacity; and aerobic capacity. Medical charts were reviewed for LE MSI 365days following laboratory testing. Participants were assigned by injury status and laboratory data stratified by tertile. Chi-square statistics were calculated to determine the frequency of LE MSI across tertiles for each characteristic. There was a significant association between LE MSI and: ankle inversion strength (weaker side: Χ(2)=17.703; stronger side: Χ(2)=18.911; p≤0.001); ankle eversion/inversion strength ratio (lower side: Χ(2)=13.456; higher side: Χ(2)=16.885; p≤0.001); hamstring flexibility (less flexible: Χ(2)=19.930; more flexible Χ(2)=15.185; p≤0.001); gastrocnemius-soleus flexibility (less flexible: Χ(2)=7.889, p=0.019); dynamic balance asymmetry (Χ(2)=7.444, p=0.024); Vestibular and Preference ratios (Χ(2)=9.124, p=0.010 and Χ(2)=6.572, p=0.037, respectively); and aerobic capacity (Χ(2)=13.935, p=0.001). Characteristics associated with LE MSI are unique in SOF. Human performance program initiatives should include efforts to optimize ankle strength and flexibility, maintain moderate hamstring flexibility, expand dynamic balance strategies, and maximize aerobic capacity to reduce LE MSI risk. Copyright © 2017 Sports Medicine Australia. All rights

  2. Information Warfare and International Law

    National Research Council Canada - National Science Library

    Greenberg, Lawrence T; Goodman, Seymour E; Soo Hoo, Kevin J

    1998-01-01

    .... Some legal constraints will certainly apply to information warfare, either because the constraints explicitly regulate particular actions, or because more general principles of international law...

  3. Implications of Network Centric Warfare

    National Research Council Canada - National Science Library

    Bailey, Alvin

    2004-01-01

    .... These areas of dependence also provide numerous vulnerabilities. This paper will focus specifically on Network Centric Warfare's vulnerabilities in terms of sensors cyberterrorism/ Electro-Magnetic Pulse (EMP...

  4. Journal of Special Operations Medicine, Volume 7, Edition 1

    Science.gov (United States)

    2007-01-01

    operational funds (OPFUNDs) when available. The local pharmacist provides basic medications and can acquire scarce items when he trav- els to Kandahar...demonstrate a strong capacity to predict resource uti - lization in the contemporary battlefield environment. In the future, such predictive yield could...in Afghanistan. The Russians in Chechnya uti - lized their normal evacuation system designed for conventional war and most often employed ground med

  5. Editorial Special issue: Operations Management in Service Systems Downloaded from

    OpenAIRE

    Babai , Mohamed Zied; Jouini , Oualid

    2013-01-01

    International audience; The service sector is the largest sector of the economy in most industrialized nations, and is fast becoming the largest sector in developing nations as well. Driven by today's new business environment, including advanced telecommunications, accelerated business globalization, increased automation and highly on-demand and competitive innovations, the complexity of the operations management of service systems is continuously increasing. Managers of service systems are w...

  6. Analysis of Special Operations Forces in Decision Aids: Recommendations,

    Science.gov (United States)

    1994-01-01

    Soviet-made armored scout cars operated by Malaysian troops. By that time, the United States had lost 102 men-18 killed and 84 wounded. Somali leaders...designation of targets; attack by F-15E and F-16C using CBU-87, -89 Execution and GBU; attack by A-10 using Maverick and 30-mm cannon; attack by B-52 using...patrolling designated areas of the battlefield and attacking individual armored vehicles with precision-guided weapons such as Maverick . Discontinuity

  7. 29 CFR 1910.126 - Additional requirements for special dipping and coating operations.

    Science.gov (United States)

    2010-07-01

    ... 29 Labor 5 2010-07-01 2010-07-01 false Additional requirements for special dipping and coating... Dipping and Coating Operations § 1910.126 Additional requirements for special dipping and coating... requirements apply to flow coating? (1) You must use a direct low-pressure pumping system or a 10-gallon (38 L...

  8. 77 FR 45921 - Alaskan Fuel Hauling as a Restricted Category Special Purpose Flight Operation

    Science.gov (United States)

    2012-08-02

    ... operations, each aircraft used to transport fuel will be required to receive FAA certification for the... regulations. The special purpose of Alaskan fuel hauling was considered for aircraft type-certificated under... required for this special purpose. The fuel hauling system must be shown to meet the applicable...

  9. 48 CFR 3036.570 - Special precautions for work at operating airports.

    Science.gov (United States)

    2010-10-01

    ... 48 Federal Acquisition Regulations System 7 2010-10-01 2010-10-01 false Special precautions for work at operating airports. 3036.570 Section 3036.570 Federal Acquisition Regulations System DEPARTMENT OF HOMELAND SECURITY, HOMELAND SECURITY ACQUISITION REGULATION (HSAR) SPECIAL CATEGORIES OF...

  10. 76 FR 70342 - Quarterly Listings; Safety Zones, Security Zones, Special Local Regulations, Drawbridge Operation...

    Science.gov (United States)

    2011-11-14

    ...] Quarterly Listings; Safety Zones, Security Zones, Special Local Regulations, Drawbridge Operation... published in the Federal Register. This notice lists temporary safety zones, security zones, special local... Commanders and Captains of the Port (COTP) must be immediately responsive to the safety and security needs...

  11. IEP (Individualized Educational Program) Co-operation between Optimal Support of Students with Special Needs

    Science.gov (United States)

    Ogoshi, Yasuhiro; Nakai, Akio; Ogoshi, Sakiko; Mitsuhashi, Yoshinori; Araki, Chikahiro

    A key aspect of the optimal support of students with special needs is co-ordination and co-operation between school, home and specialized agencies. Communication between these entities is of prime importance and can be facilitated through the use of a support system implementing ICF guidelines as outlined. This communication system can be considered to be a preventative rather than allopathic support.

  12. Apollo's Warriors: US Air Force Special Operations during the Cold War

    National Research Council Canada - National Science Library

    Hass, Michael

    1997-01-01

    .... Attempting to capture the history of USAF special operations from the beginning of the cold war to the end of the Second Indochina War is an exercise in humility the historian's worst nightmare in some respects...

  13. Reform of Command and Control Structures in North Atlantic Treaty Organization Special Operations Forces

    National Research Council Canada - National Science Library

    Berg, Robert S

    2007-01-01

    .... The central research question is as follows: Does NATO require a standing Special Operations Force Command and Control structure and combat capability to meet the emerging global security requirements of the Alliance...

  14. A Health-Risk Appraisal of Naval Special Operations Forces Personnel Executive Summary

    National Research Council Canada - National Science Library

    Johnson, K

    2000-01-01

    The relationship between exposure to extreme physical and mental activities and adverse environments to the susceptibility to injuries, disease, and death has not been examined for Special Operations Forces (SOF) personnel...

  15. 77 FR 6007 - Quarterly Listings; Safety Zones, Security Zones, Special Local Regulations, Drawbridge Operation...

    Science.gov (United States)

    2012-02-07

    ...] Quarterly Listings; Safety Zones, Security Zones, Special Local Regulations, Drawbridge Operation... they could be published in the Federal Register. This notice lists temporary safety zones, security... the safety and security needs within their jurisdiction; therefore, District Commanders and COTPs have...

  16. Redefining Hybrid Warfare: Russia's Non-linear War against the West

    Directory of Open Access Journals (Sweden)

    Tad Schnaufer

    2017-03-01

    Full Text Available The term hybrid warfare fails to properly describe Russian operations in Ukraine and elsewhere. Russia has undertaken unconventional techniques to build its influence and test the boundaries of a shaken international system. Notably, Russia’s actions in Ukraine display an evolved style of warfare that goes beyond its initial label of hybrid warfare. The term non-linear war (NLW will be defined in this article to encompass Russia’s actions and allow policymakers the correct framework to discuss and respond to Russia. NLW plays to the advantage of countries like Russia and constitute the future of warfare.

  17. Mapping the Spread of Mounted Warfare

    Directory of Open Access Journals (Sweden)

    Peter Turchin

    2016-12-01

    Full Text Available Military technology is one of the most important factors affecting the evolution of complex societies. In particular, mounted warfare, the use of horse-riders in military operations, revolutionized war as it spread to different parts of Eurasia and Africa during the Ancient and Medieval eras, and to the Americas during the Early Modern period. Here we use a variety of sources to map this spread.

  18. UML modelling of network warfare examples

    CSIR Research Space (South Africa)

    Veerasamy, N

    2011-08-01

    Full Text Available ] Affects both civilian and military domains [8] [9] Related to the concepts of infowar, information operations, hacking, hackivism, cyberterrorism and cybotage depending on motivations and techniques [10] Encompasses both technological solutions...]. In addition, Williers as well as Qingbao and Anwar discuss more offensive aspects of information security and Network Warfare like Hacking, Vulnerability Injection, Network Attacks, Denial of Capability, Interception and Blockage [6] [18] [19]. Various...

  19. Maritime Trade Warfare Against a Modern Power

    Science.gov (United States)

    2013-05-20

    Malaysian and Singaporean support. Operational Environment The previous sections have assessed that an oil embargo would be effective at influencing...will be addressed. The first approach is to stop the trade at its source. This approach forms the foundation of many contemporary sanctions. Under...antisubmarine warfare capable ships, could be sufficient to defend against forces attempting to break a blockade, and a carrier battle group in the Indian Ocean

  20. Antifragile Electronic Warfare

    OpenAIRE

    Lichtman, Marc

    2014-01-01

    This letter introduces the concept of antifragile electronic warfare (EW), which we define as the ability to allow a communications link to improve performance due to the presence of a jammer. This concept should not be confused with jamming countermeasures (a.k.a. anti-jamming or electronic protection). Rather, antifragile EW can be thought of as the next step beyond simply avoiding or mitigating jamming. After introducing the concept we narrow down the subset of jammers this concept can be ...

  1. The Regional Special Operations Headquarters: Franchising the NATO Model as a Hedge in Lean Times

    Science.gov (United States)

    2012-04-01

    1 AIR FORCE FELLOWS AIR UNIVERSITY THE REGIONAL SPECIAL OPERATIONS HEADQUARTERS: FRANCHISING THE NATO MODEL AS A HEDGE IN LEAN...Headquarters: Franchising The NATO Model As A Hedge In Lean Times 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER 6. AUTHOR(S) 5d...it is not copyrighted, but is the property of the United States government. 3 The Regional Special Operations Headquarters: Franchising the

  2. Strategic Reality and Tactical Mirages: Special Operations and the Iranian Hostage Rescue, 1979-1980

    Science.gov (United States)

    2017-06-01

    STRATEGIC REALITY & TACTICAL MIRAGES: SPECIAL OPERATIONS & THE IRANIAN HOSTAGE RESCUE, 1979-1980 BY MARK L. HAMILTON...remaining significant observations, such as technological capabilities,3 are not applicable to this thesis which focuses on decision making by government...not surviving the post–Vietnam drawdown.”9 While the Air Force reduced special operations personnel and equipment, the Army’s response was mixed

  3. Psychological effects of nuclear warfare

    International Nuclear Information System (INIS)

    Mickley, G.A.

    1987-01-01

    This report is divided into five parts. (1) Discussion of the psychological milieu before a nuclear confrontation. (2) Acute psychological reactions to nuclear warfare (some of which may reflect, in part, direct radiogenic alteration of nervous system functions). (3) Chronic psychological effects of a nuclear confrontation. (4) Issues concerning treatment of these psychological changes. (5) Prevention of adverse psychological reactions to nuclear warfare

  4. IMS software developments for the detection of chemical warfare agent

    Science.gov (United States)

    Klepel, ST.; Graefenhain, U.; Lippe, R.; Stach, J.; Starrock, V.

    1995-01-01

    Interference compounds like gasoline, diesel, burning wood or fuel, etc. are presented in common battlefield situations. These compounds can cause detectors to respond as a false positive or interfere with the detector's ability to respond to target compounds such as chemical warfare agents. To ensure proper response of the ion mobility spectrometer to chemical warfare agents, two special software packages were developed and incorporated into the Bruker RAID-1. The programs suppress interferring signals caused by car exhaust or smoke gases resulting from burning materials and correct the influence of variable sample gas humidity which is important for detection and quantification of blister agents like mustard gas or lewisite.

  5. A Remedy to Crises: Danish Special Operations Forces in Whole-of-Government Stabilization Engagements

    Science.gov (United States)

    2016-06-01

    special operations forces, capacity building, state building 15. NUMBER OF PAGES 89 16. PRICE CODE 17. SECURITY CLASSIFICATION OF REPORT... psychology , beliefs (such as religion), and behaviors.”66 This knowledge is essential for decision makers who maneuver not only against adversaries, but...To further influence and inform target audiences, the military uses a variety of information-operation capabilities, including psychological

  6. 47 CFR 90.475 - Operation of internal transmitter control systems in specially equipped systems.

    Science.gov (United States)

    2010-10-01

    ... 47 Telecommunication 5 2010-10-01 2010-10-01 false Operation of internal transmitter control... Control Internal Transmitter Control Systems § 90.475 Operation of internal transmitter control systems in specially equipped systems. (a) An internal transmitter control system need not be designed to meet the...

  7. The Secret Air War Over France USAAF Special Operations Units in the French Campaign of 1944

    Science.gov (United States)

    1992-05-01

    Branch, or SI, and its Special Operations Branch, known as SO. The Secret Intelligence Branch was responsible for collecting foreign intelligence...infiltrating its own intelligence agents into France. The Secret Intelligence Branch staff in London (SI/London) began planning for joint operations

  8. Advance of Hazardous Operation Robot and its Application in Special Equipment Accident Rescue

    Science.gov (United States)

    Zeng, Qin-Da; Zhou, Wei; Zheng, Geng-Feng

    A survey of hazardous operation robot is given out in this article. Firstly, the latest researches such as nuclear industry robot, fire-fighting robot and explosive-handling robot are shown. Secondly, existing key technologies and their shortcomings are summarized, including moving mechanism, control system, perceptive technology and power technology. Thirdly, the trend of hazardous operation robot is predicted according to current situation. Finally, characteristics and hazards of special equipment accident, as well as feasibility of hazardous operation robot in the area of special equipment accident rescue are analyzed.

  9. Use of Special Operations Forces in United Nations Missions: a Method to Resolve Complexity

    Science.gov (United States)

    2015-05-21

    physical stamina and psychological stability, followed by a rigorous training program are the imperatives to create SOF soldiers.42 Mark Bowden in...recommendation is that the United Nations should establish a Special Operations planning cell within the UN Department of Peacekeeping Operations. As of...now, the cell is nonexistent. This cell should be able to facilitate the integration of SOF into the overall peace operations concept. Finally, the

  10. Sexy is what you make it: organizational culture and U.S. Army Special Forces

    OpenAIRE

    Hawk, David L.

    2014-01-01

    Approved for public release; distribution is unlimited The U.S. Army Special Forces (SF) are the most highly trained, best equipped, and most seasoned soldiers to which the United States can turn to achieve national security objectives. The future, however, will require more indirect application of SF, through special warfare operations (e.g., UW, FID, etc.), in a host of hostile and undefined areas around the globe. This manner of employment is a change in emphasis from the direct combat ...

  11. Uncloaking the dagger: does adherence to the Geneva Conventions betray Special Operations Forces?

    OpenAIRE

    Staab, Charles

    2016-01-01

    Bombs, Special Operations Forces (SOF), and proxy forces are growth industries in the modern fight. As President Obama identified in an address covering the nation's strategy in Syria, "airstrikes, Special Forces, and working with local forces who are fighting to regain control of their own country -- that is how we'll achieve a more sustainable victory." [i] These remarks capture the nation's current policy for combating terrorist threats. From its origins in the Second World War to prese...

  12. Russian and Chinese Information Warfare: Theory and Practice

    Science.gov (United States)

    2004-06-01

    Integral neurolinguistic programming •Placing essential programs into the conscious or sub- conscious mind •Subconscious suggestions that modify human...Generators of special rays •Optical systems • Neurolinguistic programming •Computer psychotechnology •The mass media •Audiovisual effects •Special effects...Information Warfare: Theory and Practice 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER 6. AUTHOR(S) 5d. PROJECT NUMBER 5e

  13. The US Navy SEAL Special Operation of Killing Bin Laden and Its Enlightenment%美军海豹突击队击毙拉登的特战行动及启示

    Institute of Scientific and Technical Information of China (English)

    田苗苗; 杨育兵

    2011-01-01

    美军海豹突击队击毙拉登的作战行动再次证明了特种作战的重大战略意义,凸显了特战行动中体能和技能的需求,以及模拟实战训练的必要性。实战进程中运用了奔袭、隐蔽、机动、机降,达成垂直接敌、爆破、进攻、快速封控、准确射击、抓捕清剿、迅速撤离的快速作战过程。主要启示:高层决策和指挥、训练实战化及"行动中心战"是特战行动的保障,技能多样和心理稳定是获胜的基础。%the Osama Bin Laden's operation was done by the US Navy Seal.It proved that special operation has a major strategic significance.It also highlighted the demands of physical fitness and skills in special operation and the necessity of the simulated combat training.The process of the operation applied long-range raid,concealment,manoeuvre,airland,reaching the enemy vetically and directly,explosion,attack,quick blockade and control,accurate shooting,arrest and cleaning up,and quick evacuating from the operation place.The main enlightenment: high-level decision-making and command,training under battle conditions and Operation-centric Warfare are guarantees of special operation,diverse siklls and psychological stability are the foundation of suceess in the operation.

  14. Operational stressors on physical performance in special operators and countermeasures to improve performance: a review of the literature.

    Science.gov (United States)

    O'Hara, Reginald; Henry, Amy; Serres, Jennifer; Russell, Dawn; Locke, Robert

    2014-01-01

    Military training in elite warfighters (e.g., U.S. Army Rangers, Navy SEALs, and U.S. Air Force Battlefield Airmen) is challenging and requires mental and physical capabilities that are akin to that of professional athletes. However, unlike professional athletes, the competitive arena is the battlefield, with winning and losing replaced by either life or death. The rigors of both physical training and prolonged deployments without adequate rest and food intake can compromise physical performance. Therefore, the primary purpose of this effort was to identify occupational stressors on the physical performance of Special Operators during training and while on missions. The secondary purpose was to suggest specific countermeasures to reduce or prevent significant decrements in physical performance and reduce musculoskeletal injuries. A search of the literature for 2000?2012 was performed using the Air Force Institute of Technology search engines (i.e., PubMed and ProQuest). There were 29 articles located and selected that specifically addressed the primary and secondary purposes of this literature review. The remaining 32 of 61 referenced articles were reviewed after initial review of the primary literature. This review indicates that operational stress (e.g., negative energy balance, high-energy expenditure, sleep deprivation, environmental extremes, heavy load carriage, etc.) associated with rigorous training and sustained operations negatively affects hormonal levels, lean muscle mass, and physical performance of Special Operators. The number of musculoskeletal injuries also increases as a result of these stressors. Commanders may use simple field tests to assess physical decrements before and during deployment to effectively plan for missions. Specific countermeasures for these known decrements are lacking in the scientific literature. Therefore, future researchers should focus on studying specific physical training programs, equipment, and other methods to

  15. Effects of Combat Deployment on Anthropometrics and Physiological Status of U.S. Army Special Operations Forces Soldiers.

    Science.gov (United States)

    Farina, Emily K; Taylor, Jonathan C; Means, Gary E; Williams, Kelly W; Murphy, Nancy E; Margolis, Lee M; Pasiakos, Stefan M; Lieberman, Harris R; McClung, James P

    2017-03-01

    U.S. Army Special Operations Forces (SOF) soldiers deploy frequently and conduct military operations through special warfare and surgical strike capabilities. Tasks required to execute these capabilities may induce physical and mental stress and have the potential to degrade soldier physiological status. No investigations have longitudinally characterized whether combat deployment alters anthropometrics or biochemical markers of physiological status in a SOF population of frequent deployers. Effects of modern combat deployment on longitudinal changes in anthropometrics and physiological status of elite U.S. Army SOF soldiers (n = 50) were assessed. Changes in measures of body composition, grip strength, physiological status, and health behaviors from baseline to postdeployment were determined with paired t test and McNemar's statistic. Baseline measures were obtained between 4 and 8 weeks before deployment. Deployment length was a uniform duration of time between 3 and 6 months (all soldiers completed the same length of deployment). Post hoc analyses determined change in body mass within quartiles of baseline body mass with paired t test and associations between change in sex hormone-binding globulin (SHBG) and change in body mass with correlation coefficient. The study was approved by the Human Use Review Committee at the U.S. Army Research Institute of Environmental Medicine, Natick, Massachusetts. In response to deployment, increases in lean mass (77.1 ± 7.6 to 77.8 ± 7.5 kg), maximum grip strength (57.9 ± 7.2 to 61.6 ± 8.8 kg), and conduct of aerobic (156 ± 106 to 250 ± 182 minutes/week) and strength training (190 ± 101 to 336 ± 251 minutes/week) exercise were observed (p < 0.05). Increases in serum SHBG (35.42 ± 10.68 to 38.77 ± 12.26 nmol/L) and decreases in serum cortisol (443.2 ± 79.3 to 381.9 ± 111.6 nmol/L) were also observed (p < 0.05). Body mass changes were dependent on baseline body mass. Soldiers in the lowest quartile of baseline body

  16. Cyber Warfare/Cyber Terrorism

    National Research Council Canada - National Science Library

    O'Hara, Timothy

    2004-01-01

    .... Section 1 concludes with a review of offensive and defensive cyber warfare concepts. Section 2 presents a general overview of cyber terrorism, including definitions of cyber terrorism and cyber terrorism support...

  17. Attrition in Network Centric Warfare

    National Research Council Canada - National Science Library

    Erbetta, John

    2003-01-01

    .... Information warfare means that positive attacks on systems themselves compound the problem. Emerging technologies applicable to NCW as a force multiplier need to be recognized as counter to the impediments to progress...

  18. The ethics of information warfare

    CERN Document Server

    Floridi, Luciano

    2014-01-01

    This book offers an overview of the ethical problems posed by Information Warfare, and of the different approaches and methods used to solve them, in order to provide the reader with a better grasp of the ethical conundrums posed by this new form of warfare.The volume is divided into three parts, each comprising four chapters. The first part focuses on issues pertaining to the concept of Information Warfare and the clarifications that need to be made in order to address its ethical implications. The second part collects contributions focusing on Just War Theory and its application to the case of Information Warfare. The third part adopts alternative approaches to Just War Theory for analysing the ethical implications of this phenomenon. Finally, an afterword by Neelie Kroes - Vice President of the European Commission and European Digital Agenda Commissioner - concludes the volume. Her contribution describes the interests and commitments of the European Digital Agenda with respect to research for the developme...

  19. Introduction to the Special Issue on Marketing and Operations Management Interfaces and Coordination

    OpenAIRE

    Teck H. Ho; Christopher S. Tang

    2004-01-01

    This special issue, by addressing problems surrounding marketing and operations management, depicts state-of-the-art approaches, methodologies, and insights to improve a firm's or supply chain's overall performance. Top scholars in the field address many of the ways in which companies can synchronize their marketing and operations departments or their supply chain partners to improve competitiveness and profit. The information in this issue should be of interest both to academics and managers...

  20. Strategy for the Long Haul. Special Operations Forces: Future Challenges and Opportunities

    Science.gov (United States)

    2008-01-01

    College, 2006); and David Tucker and Chris- topher Lamb , “Restructuring Special Operations Forces for Emerging Threats, NDU Strategic Forum, January...Secretary of Defense Gates, SOCOM commander Admiral Eric Olson, and Assistant Secretary of Defense for SOLIC/IC Michael Vickers. See: Stew Mag- nuson

  1. Journal of Special Operations Medicine. Volume 5, Edition 1, Winter 2005

    Science.gov (United States)

    2005-01-01

    New Mexico State EMS Licensing Board until mobilized Jan 2002. COL Anderson is the Associate Dean (Army), Joint Special Operations Medical Training...Medicine 2002; 347: 1549-56. 4. Gilden DH et al. Neurologic complications of the reacti- vation of varicella -zoster virus. New England Journal of

  2. 76 FR 9646 - Quarterly Listings; Safety Zones, Security Zones, Special Local Regulations, Drawbridge Operation...

    Science.gov (United States)

    2011-02-22

    ... DEPARTMENT OF HOMELAND SECURITY Coast Guard 33 CFR Parts 100, 117, 147, and 165 [USCG-2010-0399] Quarterly Listings; Safety Zones, Security Zones, Special Local Regulations, Drawbridge Operation Regulations and Regulated Navigation Areas AGENCY: Coast Guard, DHS. ACTION: Notice of expired temporary rules...

  3. Nuclear radiation in warfare

    International Nuclear Information System (INIS)

    Rotblat, J.

    1986-01-01

    The subject is covered in chapters, entitled: introduction; digest of nuclear weaponry (characteristics of nuclear weapons; effects of nuclear weapons other than ionizing radiation (fire-ball, fall-out, thermal radiation, blast wave, electromagnetic pulse); the nuclear arms race; war scenarios; biological effects of radiations on man (radiation doses; natural sources of radiation; acute effects of radiation; long-term somatic effects; genetic effects; factors affecting the biological response to radiation; internal exposure; synergistic effects; protection against radiation effects); radiations from nuclear explosions (initial radiation; fall-out; effects of fall-out on animal and plant life; contamination of water and food supplies by fall-out); radiation casualties in a nuclear war; effectiveness of civil defence; other warlike uses of radiation (attacks on civilian nuclear power installations; radiological warfare; terrorist activities); conclusion. (orig./HP) [de

  4. Nuclear radiation in warfare

    International Nuclear Information System (INIS)

    Rotblat, J.

    1981-01-01

    The subject is covered in chapters, entitled: introduction; digest of nuclear weaponry (characteristics of nuclear weapons; effects of nuclear weapons other than ionizing radiation (fire-ball, fall-out, thermal radiation, blast wave, electromagnetic pulse); the nuclear arms race; war scenarios); biological effects of radiations on man (radiation doses; natural sources of radiation; acute effects of radiation; long-term somatic effects; genetic effects; factors affecting the biological response to radiation; internal exposure; synergistic effects; protection against radiation effects); radiations from nuclear explosions (initial radiation; fall-out; effects of fall-out on animal and plant life; contamination of water and food supplies by fall-out); radiation casualties in a nuclear war; effectiveness of civil defence; other warlike uses of radiation (attacks on civilian nuclear power installations; radiological warfare; terrorist activities); conclusion. (U.K.)

  5. Reflections on nuclear warfare

    International Nuclear Information System (INIS)

    Evans, J.P.

    1983-01-01

    The author looks back on his more than 70 years of familiarity with Americans involved in warfare, noting their loyal support for our country's objectives. Drawing on the Einstein equation, his own visits to Hiroshima and Nagasaki, and current literature, he, as a physician, belatedly concurs with those who look on the use of nuclear weapons as irrational and untenable. Their employment under present circumstances would create a ''final epidemic'' to be avoided only by prevention. He suggests that medical perceptions must be considered by our national leaders in assessing the many factors that he hopes will lead to rational answers to this urgent, highly complex, and vital enigma. He cites physicians' efforts to help in finding answers and asks that his colleagues consider the issues with attention to the gravity of the situation and act according to their best judgment

  6. Numerical simulation of RCS for carrier electronic warfare airplanes

    Directory of Open Access Journals (Sweden)

    Yue Kuizhi

    2015-04-01

    Full Text Available This paper studies the radar cross section (RCS of carrier electronic warfare airplanes. Under the typical naval operations section, the mathematical model of the radar wave’s pitch angle incidence range analysis is established. Based on the CATIA software, considering dynamic deflections of duck wing leading edge flaps, flaperons, horizontal tail, and rudder, as well as aircraft with air-to-air missile, anti-radiation missile, electronic jamming pod, and other weapons, the 3D models of carrier electronic warfare airplanes Model A and Model B with weapons were established. Based on the physical optics method and the equivalent electromagnetic flow method, by the use of the RCSAnsys software, the characteristics of carrier electronic warfare airplanes’ RCS under steady and dynamic flights were simulated under the UHF, X, and S radar bands. This paper researches the detection probability of aircraft by radars under the condition of electronic warfare, and completes the mathematical statistical analysis of the simulation results. The results show that: The Model A of carrier electronic warfare airplane is better than Model B on stealth performance and on discover probability by radar detection effectively.

  7. Lanchester-Type Models of Warfare, Volume II

    OpenAIRE

    Taylor, James G.

    1980-01-01

    This monograph is a comprehensive treatist on Lanchester-type models of warfare, i.e. differential-equation models of attrition in force-on-force combat operations. Its goal is to provide both an introduction to and current-state-of-the-art overview of Lanchester-type models of warfare as well as a comprehensive and unified in-depth treatment of them. Both deterministic as well as stochastic models are considered. Such models have been widely used in the United States and elsewhere for the...

  8. 9/11 and Canadian Special Operations Forces: How 40 Selected Men Indelibly Influenced the Future of the Force

    Science.gov (United States)

    2013-05-23

    Terrorism strategy/plan and an unresolved dialogue surrounding special operations aviation (SO Avn ) deficiencies are but two specific examples of...Regiment-like sister unit (the Canadian Special Operations Regiment (CSOR)) is created, an expanded SO Avn capability is formed (427 Special Operations...an adequate SO Avn Squadron under command, maturing CJIRU and CSOR sister units and lately a small but effective SOF training organization.127

  9. Integrating of renewable energy in operation system: the Special Regime Control Centre (CECRE)

    International Nuclear Information System (INIS)

    Division, M.

    2007-01-01

    The implementation of Red Electrica de Espana Special Regime Control Centre (CECRE) has demonstrated the Spanish System Operators commitment of integrating the maximum possible wind power generation into the electrical system compatible with secure operation. With this leadership initiative,for the first time in the world, a System Operator Control Centre (CECRE) has succeeded in sending power control instructions to wind power generators over the country through Generation Control Centres (CGC) to which these generators must be connected complying with the Spanish Rules. (Author)

  10. Intelligence Strategy for Fourth Generation Warfare

    National Research Council Canada - National Science Library

    Jamison, Edward P

    2006-01-01

    ...." They have named this new era of war "fourth generation warfare." Currently the Department of Defense's intelligence strategy is designed to defeat conventional adversaries vise a fourth generation warfare opponent...

  11. A note on the correspondence between qubit quantum operations and special relativity

    Energy Technology Data Exchange (ETDEWEB)

    Arrighi, Pablo [Computer Laboratory, University of Cambridge, 15 JJ Thomson Avenue, Cambridge CB3 0FD (United Kingdom); Patricot, Christophe [DAMTP, Centre for Mathematical Sciences, University of Cambridge, Wilberforce Road, Cambridge CB3 0WA (United Kingdom)

    2003-05-23

    We exploit a well-known isomorphism between complex Hermitian 2 x 2 matrices and R{sup 4}, which yields a convenient real vector representation of qubit states. Because these do not need to be normalized we find that they map onto a Minkowskian future cone in E{sup 1,3}, whose vertical cross-sections are nothing but Bloch spheres. Pure states are represented by light-like vectors, unitary operations correspond to special orthogonal transforms about the axis of the cone, positive operations correspond to pure Lorentz boosts. We formalize the equivalence between the generalized measurement formalism on qubit states and the Lorentz transformations of special relativity, or more precisely elements of the restricted Lorentz group together with future-directed null boosts. The note ends with a discussion of the equivalence and some of its possible consequences. (letter to the editor)

  12. STRATEGIC COMBINED JOINT SPECIAL OPERATIONS AND THE BALANCE BETWEEN NATIONAL AND COMMON INTEREST

    Directory of Open Access Journals (Sweden)

    Florin NEGULESCU

    2011-01-01

    Full Text Available This paper’s purpose is to explore how the relation between national interest and common interest of different countries determine them to build a transnational military alliance in order to achieve common strategic aims by launching strategic combined joint special operations. Those common strategic aims are composed, in variable percentages, of the partners’ national goals. The use of special operations for achieving national objectives is made after all political possibilities are ruled out and when using conventional forces is neither necessary nor recommended. The balance between the coalition’s common interest and member states’ national interest influences the strength of the partnership. There are three types of relations between the common interest of the coalition and the national interest of a state: direct, complementary, and opportunistic relationships

  13. A note on the correspondence between qubit quantum operations and special relativity

    International Nuclear Information System (INIS)

    Arrighi, Pablo; Patricot, Christophe

    2003-01-01

    We exploit a well-known isomorphism between complex Hermitian 2 x 2 matrices and R 4 , which yields a convenient real vector representation of qubit states. Because these do not need to be normalized we find that they map onto a Minkowskian future cone in E 1,3 , whose vertical cross-sections are nothing but Bloch spheres. Pure states are represented by light-like vectors, unitary operations correspond to special orthogonal transforms about the axis of the cone, positive operations correspond to pure Lorentz boosts. We formalize the equivalence between the generalized measurement formalism on qubit states and the Lorentz transformations of special relativity, or more precisely elements of the restricted Lorentz group together with future-directed null boosts. The note ends with a discussion of the equivalence and some of its possible consequences. (letter to the editor)

  14. Understanding A Special Operations Role: Network Caretakers Of Knowledge-Based Communities Of Practice

    Science.gov (United States)

    2017-12-01

    contextual understanding of an area. In Team of Teams, the landmark doctrinal book describing McChrystalian management styles , the author writes, “Team...4302, and to the Office of Management and Budget, Paperwork Reduction Project (0704-0188) Washington, DC 20503. 1. AGENCY USE ONLY (Leave blank) 2...practice, design, knowledge management , knowledge, learning, Libya, organizational design, SOCAFRICA, Special Operations, strategic arena 15. NUMBER OF

  15. By, with, and through: the theory and practice of special operations capacity-building

    OpenAIRE

    Heisler, Anthony F.

    2014-01-01

    Approved for public release; distribution is unlimited This thesis presents a theory of how U.S. special operations forces (USSOF) build partner capacity. Building partner capacity (BPC) is a cornerstone of America’s post-9/11 security strategy and a signature mission of USSOF. However, USSOF lacks a theory that articulates how capacity is built or the keys to its success. This thesis explores BPC from the top down, through national security documents, doctrine, and case studies. It identi...

  16. Journal of Special Operations Medicine. Volume 10, Edition 3, Summer 2010

    Science.gov (United States)

    2010-01-01

    Harvard School of Public Health at (www.hsph.harvard.edu) 5. Journal of Nutrition at (www.jn.nutrition.org) 6. University of Maryland Medical Center at... recoveries , manifested as large swings in vital signs that increased the overall data range (i.e., vital sign variability) even in the absence of strong...whether it was baseball, basketball, soccer , or football. Now add to that the 10-15 years lifespan of active Special Operations deployments, where

  17. Inside the Wire: American Security and Cyber Warfare

    Science.gov (United States)

    2017-03-01

    Roberts, Kerry V. " SUN TZU and The Art of Cyber Warfare." Journal of Counterterrorism & Homeland Security International 19, no. 1(Spring 2013): 12-4...12. REPORT TYPE 3. DATES COVERED (From - To) 01-03-2017 Bibliography 4. TITLE AND SUBTITLE Sa. CONTRACT NUMBER Inside the Wire: American Security...MCDERMOTT LIBRARY U.S. AIR FORCE ACADEMY 11. SPONSOR/MONITOR’S REPORT USAF ACADEMY CO 80840-6214 NUMBER(S) Special Bibliography Series # 119 12

  18. Creating Paths of Change: Under What Conditions Can Special Operations be the Supported Command

    Science.gov (United States)

    2018-03-01

    will cause an organization’s leadership to selectively decentralize units to deal with the more diverse characteristics of its environment.40 The U.S...infrastructure, which were initially attempted with local leadership . The Taliban’s ability to insert itself into villages and produce a counter narrative...Symbol for Change.”. 100 James A. Russell, “Counter-insurgency American Style : Considering David Patreus and Twenty- First Century Irregular Warfare

  19. Journal of Special Operations Medicine. Volume 9, Edition 2, Spring 2009

    Science.gov (United States)

    2009-01-01

    patient. The most accessible veins for intra- venous catheterization include the cephalic vein on the thoracic limb (Figure 10), the saphenous vein on...threatening hypotension by restoring central blood vol- ume through enhancement of venous blood flow back to the heart with each inspiratory effort. HOW...examination of the latest advancements in medicine and the history of unconventional warfare medicine. Content: Content of this publication is not

  20. The doctor and nuclear warfare

    International Nuclear Information System (INIS)

    Anon.

    1982-01-01

    At the 34th World Medical Assembly in Lisbon in 1981 the World Medical Association adopted a motion proposed by the American Medical Association that national medical associations should develop programs to educate the civilian population on the medical consequences of nuclear war. This article discusses the attitude the medical professions should have, should nuclear warfare in some form confront them in the future. The conclusion is drawn that defence against nuclear warfare is only a part of civil defence against any disaster, including the natural disasters such as flood and fire and the man-made disasters of transport accidents, even of problems at nuclear plants designed to supply energy

  1. QUANTITATIVE CHANGES OF MOTORIC ABILITIES CONDITIONED BY KINEZIOLOGY OPERATORS AT THE CHILDREN WITH SPECIAL NEEDS

    Directory of Open Access Journals (Sweden)

    Branimir Mikić

    2008-08-01

    Full Text Available The basic mission of the physical training and health education of children with special needs is to satisfy bio-pshico-social need for motion as an expression of satisfying certain needs that can effect on adaptive and creative abilities in modern life circum stances, as well as, on development of health culture of pupils in order to preserve health, correction of inborn and acquired deviation during their growth in early childhood. The most important goal of this research was to define transformation process of basic-motoric abilities, under the influence of experimental program with special needs pupils categorized in light and moderate category of retardation. The research was performed with the children in the „Centre for special needs children youth“.Sample was made with girls and boys, with total of 71 children devided in to three sub-sample according to gender, age and level of retardation. Euro-fit battery was taken as an instrument of research.During this research it was concluded that systematic influence of kineziology operators can positively influence on improved motoric functions of special needs children which is directly refered to intelectual abilities(balance and orientation.

  2. Operational Art of Maritime Straits

    National Research Council Canada - National Science Library

    Lowell, James P

    2008-01-01

    .... Given the expanding role of asymmetric warfare in littoral sea control and the growing importance of strait integrity in the global economy, understanding the intricacies of operational factors...

  3. Combined Arms Warfare in the 21st Century: Maximizing the Capability of U.S. Army Future Combat System Equipped Brigade Combat Teams to Conduct Combined Arms Operations

    Science.gov (United States)

    2008-06-13

    defenses, and surf ; a landing from the air but free of the 65 inflexibility, tactical disorder, and disorganization of parachute operations; an...taken place since the Cold War include Aceh province on the island of Sumatra in the country of Indonesia and the Darfur region of western Sudan

  4. Cyber crime and cyber warfare with international cyber collaboration for RSA – preparing communities

    CSIR Research Space (South Africa)

    Grobler, M

    2012-03-01

    Full Text Available aspects come into play that may have an influence on the manner in which the military reacts to cyber attacks (Wilson 2007): ? new national security policy issues; ? consideration of psychological operations used to affect friendly nations... relationship between modern cyber space, cyber warfare and traditional legislation. As a starting point, cyber warfare is defined for the purpose of this article as the use of exploits in cyber space as a way to intentionally cause harm to people, assets...

  5. Biological warfare, bioterrorism, and biocrime

    NARCIS (Netherlands)

    Jansen, H. J.; Breeveld, F. J.; Stijnis, C.; Grobusch, M. P.

    2014-01-01

    Biological weapons achieve their intended target effects through the infectivity of disease-causing infectious agents. The ability to use biological agents in warfare is prohibited by the Biological and Toxin Weapon Convention. Bioterrorism is defined as the deliberate release of viruses, bacteria

  6. European Curricula, Xenophobia and Warfare.

    Science.gov (United States)

    Coulby, David

    1997-01-01

    Examines school and university curricula in Europe and the extent of their influence on xenophobia. Considers the pluralistic nature of the European population. Discusses the role of curriculum selection and language policy in state efforts to promote nationalism. Assesses the role of curricular systems in the actual encouragement of warfare,…

  7. The Anatomy of Counterinsurgency Warfare

    DEFF Research Database (Denmark)

    Mouritsen, Lars; Pedersen, Kenneth; Thruelsen, Peter Dahl

    Since the beginning of the new millennium, the West has been increasingly involved in a tiresome and rather particular type of conflict: insurgency warfare. The bloody and shocking terrorist attacks on New York and Washington in September 2001 marked the beginning of a new era, and the introducti...

  8. Strategic Analysis of Irregular Warfare

    Science.gov (United States)

    2010-03-01

    the same mathematical equations used by Lanchester .10 Irregular Warfare Theory and Doctrine It is time to develop new analytical methods and models...basis on which to build, similar to what Lanchester provided almost 100 years ago. Figure 9 portrays both Lanchester’s approach and an irregular 17

  9. Roots of Russian Irregular Warfare

    Science.gov (United States)

    2016-12-01

    PAGE INTENTIONALLY LEFT BLANK xiii ACKNOWLEDGMENTS Crissy, your encouragement throughout my career and especially during this project has been...all of the Russian disinformation techniques in Ukraine came directly “from Soviet toolkits .” Maria Snegovaya, “Putin’s Information Warfare In

  10. Technology Transition for Hybrid Warfare

    Science.gov (United States)

    2010-02-16

    and Iraq. At the same time, the science and technology base must provide the disruptive technologies to defeat future conventional enemies. This... disruptive technologies will be needed to retain long-term technological superiority in conventional warfare. Incremental improvement is the most...technology to be missed. Disruptive technologies are the second type of technological change and involve revolutionary concepts involving large technological

  11. Planning for success: desired characteristics of special operations surgeons, a pilot study.

    Science.gov (United States)

    Campbell, Barrett H; Alderman, Shawn M

    2012-01-01

    Selection criteria for Special Operations Forces (SOF) physicians are often unclear to potential candidates without prior SOF experience. To date, no published career resource exists to guide the careers of physicians interested in becoming a SOF surgeon. Using a survey tool, desirable characteristics and personal attributes were identified that can be used to inform candidate career decisions and better prepare them for a future position in Special Operations. A descriptive, cross-sectional survey instrument was developed and distributed to current Army SOF Command Surgeons for further distribution to subordinate surgeons. RESULTS were analyzed as a cohort and by subordinate command. Respondents consisted of current SOF Surgeons. Uniformly, the individual characteristics most strongly desired are professionalism, being a team player, and leadership. Possessing or obtaining Airborne and Flight Surgeon qualifications prior to consideration for a surgeon position was highly desired. Residency training within Family Medicine or Emergency Medicine constituted the vast majority of specialty preference. Understanding which characteristics and attributes are desirable to current surgeons and commanders can aid physicians interested in SOF surgeon positions. Using this study and future studies can guide career planning and foster the selection of ideally trained physicians who will operate at the tip of the spear. The views expressed are those of the author(s) and do not reflect the official policy of the Department of the Army, the Department of Defense or the U.S. Government. 2012.

  12. Organizing for Information Operations Within The Joint Task Force

    National Research Council Canada - National Science Library

    McLaughlin, Lawrence

    2003-01-01

    .... Joint doctrine defines information operations as a broad range of capabilities and related activities that include operations security, psychological operations, electronic warfare, physical attack...

  13. Environmental Audit at Santa Barbara Operations, Special Technologies Laboratory, Remote Sensing Laboratory, North Las Vegas Facilities

    International Nuclear Information System (INIS)

    1991-03-01

    This report documents the results of the Environmental Audit of selected facilities under the jurisdiction of the DOE Nevada Operations Office (NV) that are operated by EG and G Energy Measurements, Incorporated (EG and G/EM). The facilities included in this Audit are those of Santa Barbara Operation (SBO) at Goleta, California; the Special Technologies Laboratory (STL) at Santa Barbara, California; and Las Vegas Area Operations (LVAO) including the Remote Sensing Laboratory (RSL) at Nellis Air Force Base in Nevada, and the North Las Vegas Facilities (NLVF) at North Las Vegas, Nevada. The Environmental Audit was conducted by the US Department of Energy's (DOE) Office of Environmental Audit, commencing on January 28, 1991 and ending on February 15, 1991. The scope of the Audit was comprehensive, addressing environmental activities in the technical areas of air, surface water/drinking water, groundwater, waste management, toxic and chemical materials, quality assurance, radiation, inactive waste sites, and environmental management. Also assessed was compliance with applicable Federal, state, and local regulations and requirements; internal operating requirements; DOE Orders; and best management practices. 8 tabs

  14. 46 CFR 153.903 - Operating a United States ship in special areas: Categories A, B, and C.

    Science.gov (United States)

    2010-10-01

    ... NLS residue in a special area unless— (a) The ship's Certificate of Inspection is endorsed in... 46 Shipping 5 2010-10-01 2010-10-01 false Operating a United States ship in special areas... (CONTINUED) CERTAIN BULK DANGEROUS CARGOES SHIPS CARRYING BULK LIQUID, LIQUEFIED GAS, OR COMPRESSED GAS...

  15. 47 CFR 25.256 - Special Requirements for operations in the 3.65-3.7 GHz band.

    Science.gov (United States)

    2010-10-01

    ... 47 Telecommunication 2 2010-10-01 2010-10-01 false Special Requirements for operations in the 3.65-3.7 GHz band. 25.256 Section 25.256 Telecommunication FEDERAL COMMUNICATIONS COMMISSION (CONTINUED) COMMON CARRIER SERVICES SATELLITE COMMUNICATIONS Technical Standards § 25.256 Special Requirements for...

  16. Finding the Right Indigenous Leader and Force for Counterinsurgency Operations

    Science.gov (United States)

    2011-12-01

    Shooting at the Moon: The Story of Americas Clandestine War in Laos (South Royalton: Steerforth Press, 1996). 53Defense, Army Special Operations...warfare can only be accomplished with the support of the indigenous population. One of Mao Tse -tung’s most famous aphorisms is that “the people are...Sept 2011 93 Mao Tse -Tung, Aspects of China’s Anti-Japanese Struggle (Bombay: Open library, 1948), 48. 52 partnership between the FMF and LIF does

  17. An Analysis of the Twenty-Nine Capabilities of the Marine Corps Expeditionary Unit (Special Operations Capable)

    National Research Council Canada - National Science Library

    Love, John

    1998-01-01

    ... (Special Operations Capable) (MEU (SOC) to determine their relative validity. The methodology utilizes a multiple criteria decision-making model to determine the relative validity of each MEU (SOC) capability...

  18. Hybrid Warfare: the 21st Century Russian Way of Warfare

    Science.gov (United States)

    2017-05-25

    to wage information operations— from television, to the Internet, to unconventional forces on the ground spreading the message word -of- mouth ...adversarial vulnerabilities. Many of the peculiarities of hybrid warfare described herein are inextricably linked to Russia’s social , political, and...the US election. Then they utilized various means of media to distribute that information with the goal to discredit the US political process and

  19. Information Warfare in the Cyber Domain

    National Research Council Canada - National Science Library

    Takemoto, Glenn

    2001-01-01

    ...). This paper lays a foundation by defining the terminology associated with Information Warfare in the Cyber Domain, reviews the threat and illustrates the vulnerabilities of our information systems...

  20. MEANS AND METHODS OF CYBER WARFARE

    Directory of Open Access Journals (Sweden)

    Dan-Iulian VOITAȘEC

    2016-06-01

    Full Text Available According to the Declaration of Saint Petersburg of 1868 “the only legitimate object which States should endeavor to accomplish during war is to weaken the military forces of the enemy”. Thus, International Humanitarian Law prohibits or limits the use of certain means and methods of warfare. The rapid development of technology has led to the emergence of a new dimension of warfare. The cyber aspect of armed conflict has led to the development of new means and methods of warfare. The purpose of this paper is to study how the norms of international humanitarian law apply to the means and methods of cyber warfare.

  1. Cyber warfare building the scientific foundation

    CERN Document Server

    Jajodia, Sushil; Subrahmanian, VS; Swarup, Vipin; Wang, Cliff

    2015-01-01

    This book features a wide spectrum of the latest computer science research relating to cyber warfare, including military and policy dimensions. It is the first book to explore the scientific foundation of cyber warfare and features research from the areas of artificial intelligence, game theory, programming languages, graph theory and more. The high-level approach and emphasis on scientific rigor provides insights on ways to improve cyber warfare defense worldwide. Cyber Warfare: Building the Scientific Foundation targets researchers and practitioners working in cyber security, especially gove

  2. Shadow Wars: An Analysis of Counterinsurgency Warfare

    National Research Council Canada - National Science Library

    Dogan, Osman

    2005-01-01

    ... of the current strategic approaches to counterinsurgency warfare. Toward this end, a systems model approach, which views insurgent organizations as open systems, is adapted to the insurgent environment...

  3. Numerical simulation of RCS for carrier electronic warfare airplanes

    OpenAIRE

    Yue Kuizhi; Liu Wenlin; Li Guanxiong; Ji Jinzu; Yu Dazhao

    2015-01-01

    This paper studies the radar cross section (RCS) of carrier electronic warfare airplanes. Under the typical naval operations section, the mathematical model of the radar wave’s pitch angle incidence range analysis is established. Based on the CATIA software, considering dynamic deflections of duck wing leading edge flaps, flaperons, horizontal tail, and rudder, as well as aircraft with air-to-air missile, anti-radiation missile, electronic jamming pod, and other weapons, the 3D models of carr...

  4. Annihilation Prediction for Lanchester-Type Models of Modern Warfare

    OpenAIRE

    Brown, G.G.; Taylor, J.

    1983-01-01

    Operations Research, 31, p.752. This paper introduces important new functions for analytic solution of Launch-ester-type equations of modern warfare for combat between two homogeneous forces modeled by power attrtition-rate coefficients with "no offset". Tabulations of these Lanchester-Clifford-Schlatii (or LCS) functions allow one to study this particular variable-coefficient model almost as easily and thoroughly as Lanchester's classic constant-coefficient one. LCS functions allow one ...

  5. Hungarys Alternative to Counter Hybrid Warfare - Small States Weaponized Citizenry

    Science.gov (United States)

    2017-06-09

    said “Resilience as a terminological and operational factor, will become the newest ‘ brand ’ and communication name for the Alliance.”70 He also...audiences to influence their emotions , motives, objective reasoning, and ultimately the behavior of foreign governments, organizations, groups, and...so-called influence warfare. His study pinpointed the importance of emotion over rational facts in messages. Second, Edward Lucas and Ben Nimmo on

  6. Radioecological aspects of nuclear warfare

    International Nuclear Information System (INIS)

    Edvardson, Kay

    1977-01-01

    Radioactive fallout, one of the major effects of nuclear warfare, will cause acute radiation sickness within the close-in or intermediate areas downwind from surface bursts. Global fallout from high yield explosions will be fairly evenly distributed in the hemisphere where the explosions occur, and will cause irradiation from ground deposit, inhaled material and contaminated food. Estimates of collective doses and the approximate number of late casualties from the global contamination are presented for a given total explosion yield. (author)

  7. Methodology for the design of the method of siliceous sandstones operation using special software

    Directory of Open Access Journals (Sweden)

    Luis Ángel Lara-González

    2014-12-01

    Full Text Available The methodologies used for the design of the method of sandstones explotation by descending staggered banks using specialized software tools are reported. The data analyzed were collected in the field for the operating license 14816 in Melgar, Tolima. The characterization of the rock mass was held from physical and mechanical tests, performed on cylindrical test tubes in order to obtain the value of the maximum strenght and elastic modulus of the rock. The direction and dip of the sandstone package was rock. The direction and dip of the sandstone package was determined by using the stereographic projection whit DIPS®  software, and the safety factor of the slope was obtained with established banks whit SLIDE® . The slops are 8 meters high and 8 meters wide whit a tilt angle 60°, which generated a safety factor  of 2.1. The design  of the mining method was carried out with GEOVIA SURPAC® , at an early stage of development ascending to the level 11 of the exploitation, to then start mining in descending order to control the stabiLity of slopes. The results obtained allow a general methodology for the development of projects to optimize the process of evaluation and selection of mining method by using specialized design tools.

  8. The lifesaving potential of specialized on-scene medical support for urban tactical operations.

    Science.gov (United States)

    Metzger, Jeffery C; Eastman, Alexander L; Benitez, Fernando L; Pepe, Paul E

    2009-01-01

    Since the 1980s, the specialized field of tactical medicine has evolved with growing support from numerous law-enforcement and medical organizations. On-scene backup from tactical emergency medical support (TEMS) providers has not only permitted more immediate advanced medical aid to injured officers, victims, bystanders, and suspects, but also allows for rapid after-incident medical screening or minor treatments that can obviate an unnecessary transport to an emergency department. The purpose of this report is to document one very explicit benefit of TEMS deployment, namely, a situation in which a police officer's life was saved by the routine on-scene presence of specialized TEMS physicians. In this specific case, a police officer was shot in the anterior neck during a law-enforcement operation and became moribund with massive hemorrhage and compromised airway. Two TEMS physicians, who had been integrated into the tactical law-enforcement team, were on scene, controlled the hemorrhage, and provided a surgical airway. By the time of arrival at the hospital, the patient had begun purposeful movements and, within 12 hours, was alert and oriented. Considering the rapid decline in the patient's condition, it was later deemed by quality assurance reviewers that the on-scene presence of these TEMS providers was lifesaving.

  9. Prediction equation for estimating total daily energy requirements of special operations personnel.

    Science.gov (United States)

    Barringer, N D; Pasiakos, S M; McClung, H L; Crombie, A P; Margolis, L M

    2018-01-01

    Special Operations Forces (SOF) engage in a variety of military tasks with many producing high energy expenditures, leading to undesired energy deficits and loss of body mass. Therefore, the ability to accurately estimate daily energy requirements would be useful for accurate logistical planning. Generate a predictive equation estimating energy requirements of SOF. Retrospective analysis of data collected from SOF personnel engaged in 12 different SOF training scenarios. Energy expenditure and total body water were determined using the doubly-labeled water technique. Physical activity level was determined as daily energy expenditure divided by resting metabolic rate. Physical activity level was broken into quartiles (0 = mission prep, 1 = common warrior tasks, 2 = battle drills, 3 = specialized intense activity) to generate a physical activity factor (PAF). Regression analysis was used to construct two predictive equations (Model A; body mass and PAF, Model B; fat-free mass and PAF) estimating daily energy expenditures. Average measured energy expenditure during SOF training was 4468 (range: 3700 to 6300) Kcal·d- 1 . Regression analysis revealed that physical activity level ( r  = 0.91; P  plan appropriate feeding regimens to meet SOF nutritional requirements across their mission profile.

  10. Special issue on ageing management and long term operation of light water reactors

    International Nuclear Information System (INIS)

    Kashima, Koichi; Kanno, Masanori; Kimura, Itsurou

    2008-01-01

    Ageing management and long term operation of light water reactors became important in Japan and relevant research on physical and materials ageing has been carried out among organizations of government, academia and industry and establishment of technical standards and guideline based on the results is under way. The Japan Energy Policy Institute (JEPI) issued a special number discussing this theme, which consisted of ten reports of experts describing these activities. Main topics were ageing evaluation of reactor components due to neutron irradiation embrittlement and stress corrosion cracking, regulatory evaluation of deteriorations due to ageing with technical information basis, technology development in the area of inspection/monitoring, ageing evaluation and preventive maintenance/repairs, nuclear power plant life management of electric utilities, and advancement of reactor maintenance and inspection. (T. Tanaka)

  11. Energy expenditure and intake during Special Operations Forces field training in a jungle and glacial environment.

    Science.gov (United States)

    Johnson, Caleb D; Simonson, Andrew J; Darnell, Matthew E; DeLany, James P; Wohleber, Meleesa F; Connaboy, Christopher

    2018-04-01

    The purpose of this study was to identify and compare energy requirements specific to Special Operations Forces in field training, in both cool and hot environments. Three separate training sessions were evaluated, 2 in a hot environment (n = 21) and 1 in a cool environment (n = 8). Total energy expenditure was calculated using doubly labeled water. Dietary intake was assessed via self-report at the end of each training mission day, and macronutrient intakes were calculated. Across the 3 missions, mean energy expenditure (4618 ± 1350 kcal/day) exceeded mean energy intake (2429 ± 838 kcal/day) by an average of 2200 kcal/day. Macronutrient intakes (carbohydrates (g/(kg·day body weight (bw)) -1 ) = 3.2 ± 1.2; protein (g/(kg·day bw) -1 ) = 1.3 ± 0.7; fat (g/(kg·day bw) -1 ) = 1.2 ± 0.7) showed inadequate carbohydrate and possibly protein intake across the study period, compared with common recommendations. Total energy expenditures were found to be similar between hot (4664 ± 1399 kcal/day) and cool (4549 ± 1221 kcal/day) environments. However, energy intake was found to be higher in the cool (3001 ± 900 kcal/day) compared with hot (2200 ± 711 kcal/day) environments. Based on the identified energy deficit, high variation in energy expenditures, and poor macronutrient intake, a greater attention to feeding practices during similar training scenarios for Special Operations Forces is needed to help maintain performance and health. The differences in environmental heat stress between the 2 climates/environments had no observed effect on energy expenditures, but may have influenced intakes.

  12. A Survey of Game Theoretic Approaches to Modelling Decision-Making in Information Warfare Scenarios

    Directory of Open Access Journals (Sweden)

    Kathryn Merrick

    2016-07-01

    Full Text Available Our increasing dependence on information technologies and autonomous systems has escalated international concern for information- and cyber-security in the face of politically, socially and religiously motivated cyber-attacks. Information warfare tactics that interfere with the flow of information can challenge the survival of individuals and groups. It is increasingly important that both humans and machines can make decisions that ensure the trustworthiness of information, communication and autonomous systems. Subsequently, an important research direction is concerned with modelling decision-making processes. One approach to this involves modelling decision-making scenarios as games using game theory. This paper presents a survey of information warfare literature, with the purpose of identifying games that model different types of information warfare operations. Our contribution is a systematic identification and classification of information warfare games, as a basis for modelling decision-making by humans and machines in such scenarios. We also present a taxonomy of games that map to information warfare and cyber crime problems as a precursor to future research on decision-making in such scenarios. We identify and discuss open research questions including the role of behavioural game theory in modelling human decision making and the role of machine decision-making in information warfare scenarios.

  13. The Military Assistance Command-Vietnam Studies and Observations Group-A Case Study in Special Operations Campaigning

    Science.gov (United States)

    2016-06-10

    realistically rehearsed , and executed with surprise, speed and purpose.”13 McRaven’s 11 William H...objective of special operations rather than the techniques used. For SOF to continue to achieve operational surprise, and to innovate in a constantly ...achieve success in 91 Peterson, 4-5. 49 an ever changing environment, they will need to constantly

  14. Foreword for the Special Section on Power System Planning and Operation Towards a Low-Carbon Economy

    Energy Technology Data Exchange (ETDEWEB)

    Ding, Yi; Kang, Chongqing; Wang, Jianhui; Chen, Yihsu; Hobbs, Benjamin F.

    2015-03-01

    The nine papers in this special section on power system planning and operation towards a low-cost economy cover the following topics: power system planning models; power system operation methods and market behavior analysis; and risk assessment and emission management.

  15. Deconflicting Electronic Warfare in Joint Operations

    National Research Council Canada - National Science Library

    Huber, Arthur F; Carlberg, Gary; Gilliard, Prince; Marquet, L. D

    2007-01-01

    ... in velocity and lethality, it is becoming a growing issue for those who conduct EW. More and more systems both weapons and purely commercial devices are vying for their place in an increasingly crowded frequency spectrum...

  16. Mountain Warfare and Cold Weather Operations

    Science.gov (United States)

    2016-04-29

    is important to determine whether the bottom is composed of sand, gravel, silt, clay , or rock and in what proportions. For more information see ATP...these planning factors by about two quarts per individual. 6-22. Water increases in viscosity in extreme cold weather, and therefore moves slower...In arctic conditions, fuel spilled on flesh can cause instant frostbite if the proper gloves are not worn. 6-32. Multi- viscosity oil (15W-40) is

  17. Hybrid Warfare: Preparing for Future Conflict

    Science.gov (United States)

    2015-02-17

    ciceromagazine.com/?s=getting+behind+hybrid+warfare. Brown , Col Leslie F. “Twenty-First Century Warfare Will be Hybrid.” Carlisle Barracks, PA...Lebanon and Gaza.” Rand Corporation Occasional Paper. Santa Monica, CA: Rand Corporation, 2010. Jones, Gareth and Darya Korsunskaya. “U.S., EU

  18. Tissue-based standoff biosensors for detecting chemical warfare agents

    Science.gov (United States)

    Greenbaum, Elias; Sanders, Charlene A.

    2003-11-18

    A tissue-based, deployable, standoff air quality sensor for detecting the presence of at least one chemical or biological warfare agent, includes: a cell containing entrapped photosynthetic tissue, the cell adapted for analyzing photosynthetic activity of the entrapped photosynthetic tissue; means for introducing an air sample into the cell and contacting the air sample with the entrapped photosynthetic tissue; a fluorometer in operable relationship with the cell for measuring photosynthetic activity of the entrapped photosynthetic tissue; and transmitting means for transmitting analytical data generated by the fluorometer relating to the presence of at least one chemical or biological warfare agent in the air sample, the sensor adapted for deployment into a selected area.

  19. Stress-induced deficits in working memory and visuo-constructive abilities in Special Operations soldiers.

    Science.gov (United States)

    Morgan, Charles A; Doran, Anthony; Steffian, George; Hazlett, Gary; Southwick, Steven M

    2006-10-01

    Pre-clinical and clinical studies have shown acute stress may impair working memory and visuo-spatial ability. This study was designed to clarify the nature of stress-induced cognitive deficits in soldiers and how such deficits may contribute to operational or battlefield errors. One hundred eighty-four Special Operations warfighters enrolled in Survival School completed pre-stress measures of dissociation and trauma exposure. Subjects were randomized to one of three assessment groups (Pre-stress, Stress, Post-stress) and were administered the Rey Ostereith Complex Figure (ROCF). All subjects completed post-stress measures of dissociation. ROCF copy and recall were normal in the Pre- and Post-stress groups. ROCF copy and recall were significantly impaired in the Stress Group. Stress group ROCF copy performance was piecemeal, and ROCF recall was impaired. Symptoms of dissociation were negatively associated with ROCF recall in the Stress group. Baseline dissociation and history of traumatic stress predicted cognitive impairment during stress. Stress exposure impaired visuo-spatial capacity and working memory. In rats, monkeys, and humans, high dopamine and NE turnover in the PFC induce deficits in cognition and spatial working memory. Improved understanding of stress-induced cognitive deficits may assist in identification of soldiers at risk and lead to the development of better countermeasures.

  20. Reactivity of Dual-Use Decontaminants with Chemical Warfare Agents

    Science.gov (United States)

    2016-07-01

    REACTIVITY OF DUAL-USE DECONTAMINANTS WITH CHEMICAL WARFARE AGENTS ECBC-TR-1384... Decontaminants with Chemical Warfare Agents 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER 6. AUTHOR(S) Willis, Matthew P...extraction) of chemical warfare agents from materials. 15. SUBJECT TERMS GD HD Decontamination Hazard mitigation VX Chemical warfare agent Liquid-phase

  1. The Information Warfare Life Cycle Model

    Directory of Open Access Journals (Sweden)

    Brett van Niekerk

    2011-11-01

    Full Text Available Information warfare (IW is a dynamic and developing concept, which constitutes a number of disciplines. This paper aims to develop a life cycle model for information warfare that is applicable to all of the constituent disciplines. The model aims to be scalable and applicable to civilian and military incidents where information warfare tactics are employed. Existing information warfare models are discussed, and a new model is developed from the common aspects of these existing models. The proposed model is then applied to a variety of incidents to test its applicability and scalability. The proposed model is shown to be applicable to multiple disciplines of information warfare and is scalable, thus meeting the objectives of the model.

  2. The Information Warfare Life Cycle Model

    Directory of Open Access Journals (Sweden)

    Brett van Niekerk

    2011-03-01

    Full Text Available Information warfare (IW is a dynamic and developing concept, which constitutes a number of disciplines. This paper aims to develop a life cycle model for information warfare that is applicable to all of the constituent disciplines. The model aims to be scalable and applicable to civilian and military incidents where information warfare tactics are employed. Existing information warfare models are discussed, and a new model is developed from the common aspects of these existing models. The proposed model is then applied to a variety of incidents to test its applicability and scalability. The proposed model is shown to be applicable to multiple disciplines of information warfare and is scalable, thus meeting the objectives of the model.

  3. Rethinking Defensive Information Warfare

    National Research Council Canada - National Science Library

    French, Geoffrey S

    2004-01-01

    .... This paper examines defensive tactics and strategies from the German defense in depth that emerged from World War I to the American Active Defense that developed in the Cold War and proposes a new mindset for DIW that draws on these operational concepts from military history.

  4. Cyber warfare: critical perspectives

    NARCIS (Netherlands)

    Ducheine, P.; Osinga, F.; Soeters, J.

    2012-01-01

    Next to sea, land, air and space, ‘cyber space’ appears to be the fifth operational domain for the military. This manmade and virtual sphere brings along opportunities and threats. In this book, academics of the Netherlands Defence Academy as well as specialists and military professionals from other

  5. DefenseLink.mil - Special Report - Soldiers Train with Non-lethal Weapons

    Science.gov (United States)

    Spc. Yevgeniy Popov, a chemical warfare specialist with Headquarters and Headquarters Company, 3rd warfare specialist with Headquarters and Headquarters Company, 3rd Special Troops Battalion, 3rd Brigade , center, a combat engineer with Company A, 3rd Special Troops Battalion, 3rd Brigade Combat Team, 10th

  6. Radioecological aspects of nuclear warfare

    International Nuclear Information System (INIS)

    Edvarson, K.

    1975-01-01

    The radioactive fallout from nuclear explosions is one of the major effects of nuclear warfare. Those levels causing acute radiation sickness are to be expected only within the close-in or intermediate areas downwind from surface bursts. Global fallout from high yield explosions will be fairly evenly distributed in the hemisphere where the explosions occurred and cause irradiation from ground deposit, inhaled material and contaminated food. The collective doses and the order of magnitude of late casualties from this global contamination are estimated for a given total explosion yield. (auth)

  7. Seroprevalence of Dengue Fever in US Army Special Operations Forces: Initial Results and the Way Ahead.

    Science.gov (United States)

    Caci, Jennifer B; Blaylock, Jason M; De La Barrera, Rafael; Griggs, April N; Lin, Leyi; Jarman, Richard G; Thomas, Stephen J; Lyons, Arthur G

    2014-01-01

    The endemicity of dengue fever (DF) and, consequently, sequelae of DF are increasing worldwide. The increases are largely a result of widespread international travel and the increased range of the mosquito vectors. US Army Special Operations Command (USASOC) personnel are at an increased risk of exposure to dengue based on their frequent deployments to and presence in dengue endemic areas worldwide. Repeated deployments to different endemic areas can increase the risk for developing the more serious sequelae of dengue: dengue hemorrhagic fever (DHF) and dengue shock syndrome (DSS). Information about the seroprevalence rate of dengue in USASOC personnel, in particular, is lacking and is critical to assessing the risk, tailoring preventive medicine countermeasures, leveraging field diagnostics, and maintaining mission capability. In the first part of a two-part project to assess baseline seroprevalence in USASOC units, a random, unit-stratified sample of 500 anonymous serum specimens from personnel assigned to the highest-risk units in USASOC were screened for dengue using a microneutralization assay. Of the 500 specimens screened, 56 (11.2%) of 500 had neutralizing titers (NT) (MN₅₀≥10) against at least one DENV serotype. Subsequent sample titration resulted in 48 (85.7%) of 56 of the samples with NT (MN₅₀≥10) against at least one dengue serotype for an overall dengue exposure rate of 9.6% (48 of 500). The second part of the ongoing project, started in 2012, was a multicenter, serosurveillance project using predeployment and postdeployment sera collected from USASOC personnel deployed to South and Central America, Africa, and Southeast Asia. Preliminary results show a 13.2% (55 of 414) seropositivity rate. The significance of these findings as they relate to personal risk and operational impact is discussed. 2014.

  8. Information warfare technologies in political discourse

    Directory of Open Access Journals (Sweden)

    Karpova Anna Yu.

    2016-01-01

    Full Text Available We attempt to examine the technology of «information warfare» in this paper. The dominant theme of the paper is that the outcome of the information warfare is important not only for the future of a state itself but for the future of the world balance of forces. The main task of geopolitical actors in information warfare is to introduce ideas corresponding to their interests into mass consciousness. All participants of political conflicts have common features in technologies of Information warfare. The information anomie is the indicator of the great geopolitical actors’ personified interests on the stage of «information warfare» - the process resulted in destroying the communicative line: report-information understanding and disrupting the social order in society. In this paper authors describe the following Information Warfare technologies: "Political volcano" technology; "SPIN" technology; "Widening media resource" technology; "specific gravity" technology; "Cold War 2.0" technology and Information cleaningup technology. It is assumed that in the future there will be new instructions on applying technologies of information warfare. To impart perspective to the paper we consider examples, opinions and trends.

  9. 14 CFR Special Federal Aviation... - Operating Limitations for Unscheduled Operations at Chicago's O'Hare International Airport

    Science.gov (United States)

    2010-01-01

    .... Operators may contact the ARO at (703) 904-4452 if they have a technical problem making a Reservation using..., law enforcement, military aircraft operations or public-use aircraft operations may be accommodated... system asks for a date or time, it is expecting an input of numbers. A problem arises when entering a...

  10. Risk factors and musculoskeletal complaints in non-specialized nurses, IC nurses, operation room nurses, and X-ray technologists

    NARCIS (Netherlands)

    Bos, Ellen; Krol, Boudien; van der Star, Lex; Groothoff, Johan

    Objectives: To gain more insight into the prevalence rates of musculoskeletal complaints of neck-shoulder and low back and to determine the relation between physical and psychosocial work-related risk factors and the complaints mentioned in non-specialized nurses, operation room nurses, Intensive

  11. 76 FR 81360 - Special Conditions: Gulfstream Aerospace LP (GALP) Model G280 Airplane, Operation Without Normal...

    Science.gov (United States)

    2011-12-28

    ... DEPARTMENT OF TRANSPORTATION Federal Aviation Administration 14 CFR Part 25 [Docket No. FAA-2011-1172: Special Conditions No. 25-453-SC] Special Conditions: Gulfstream Aerospace LP (GALP) Model G280... Aerospace LP (GALP) Model G280 airplane. This airplane will have a novel or unusual design feature...

  12. Moltke as a Model for Information Warfare

    National Research Council Canada - National Science Library

    Gallagher, Daniel P

    1998-01-01

    ... with late 20th century Information Warfare (IW). Clausewitz, with his emphasis on concentrating forces for a decisive battle, or Sun Tzu, with his focus on an indirect approach and subduing the enemy without battle, might appear to be more...

  13. Gas Warfare in World War I.

    Science.gov (United States)

    Flintham, A. J.

    1978-01-01

    The effectiveness of gas warfare during World War I was increased by the lack of a basic understanding of the behavior of gases on the part of the soldiers. This was a result of deficiencies in science education. (BB)

  14. Prehistoric ceremonial warfare: beginning of institutionalized violence

    Czech Academy of Sciences Publication Activity Database

    Turek, Jan

    2017-01-01

    Roč. 13, č. 3 (2017), s. 535-548 ISSN 1555-8622 Institutional support: RVO:67985912 Keywords : human aggression * ceremonial warfare * archery symbolism * Neolithic * Chalcolithic * Europe Subject RIV: AC - Archeology, Anthropology, Ethnology OBOR OECD: Archaeology

  15. On Cyber Warfare Command and Control Systems

    National Research Council Canada - National Science Library

    Howes, Norman R; Mezzino, Michael; Sarkesain, John

    2004-01-01

    .... Cyber warfare then becomes a one-sided battle where the attacker makes all the strikes and the target of the attack responds so slowly that the attacker usually gets away without being identified...

  16. Enzymatic Decontamination of Chemical Warfare Agents

    National Research Council Canada - National Science Library

    Raushel, Frank

    2000-01-01

    The primary objective of this research program is the development of a versatile enzyme-based system that is fully optimized for the decontamination, destruction, and detection of know chemical warfare agents...

  17. Insurgent Uprising: An Unconventional Warfare Wargame

    Science.gov (United States)

    2017-12-01

    Cleveland, Charles T. Connett, and Will Irwin. “Unconventional Warfare in the Gray Zone.” Joint Forces Quarterly 80, no. 1 (2016). Work, Robert O...CODE 13. ABSTRACT (maximum 200 words) Today, and in the future, unconventional solutions will present U.S. policymakers with options for dealing...training objectives and will complement existing training exercises. 14. SUBJECT TERMS unconventional warfare, foreign internal defense, direct

  18. Distributed computing environment for Mine Warfare Command

    OpenAIRE

    Pritchard, Lane L.

    1993-01-01

    Approved for public release; distribution is unlimited. The Mine Warfare Command in Charleston, South Carolina has been converting its information systems architecture from a centralized mainframe based system to a decentralized network of personal computers over the past several years. This thesis analyzes the progress Of the evolution as of May of 1992. The building blocks of a distributed architecture are discussed in relation to the choices the Mine Warfare Command has made to date. Ar...

  19. Route survey periodicity for mine warfare

    OpenAIRE

    Coke, Hartwell F.

    2009-01-01

    Approved for public release, distribution unlimited One of the Navy's most long standing challenges has been conquering the mine warfare threat. As mines and mine warfare techniques evolve and become more sophisticated, so does the United States' ability to counter the threat. The United States newest technique for countering a potential mined harbor, or route, is a process known as "change detection." This concept uses previous side scan sonar images of the area prior to a mining event an...

  20. Guerilla Warfare & Law Enforcement: Combating the 21st Century Terrorist Cell within the U.S.

    Directory of Open Access Journals (Sweden)

    Major Richard Hughbank

    2009-01-01

    Full Text Available Both domestic and international terrorist organizations employ guerrilla warfare tactics, techniques, and procedures. Thus, the ability to identify and defeat the members of these organizations, cripple their infrastructures, and disrupt their financial resources lies in the understanding of modern guerrilla warfare as it develops in the twenty-first century within the United States.3 The forms of asymmetric warfare4 adopted by domestic and international terrorist groups alike is no longer intended to gain simple media exposure or governmental manipulation; they want to make an overpowering impact by causing massive loss of life and severe damage to infrastructure and are often motivated by religious imperatives and political goals. As terrorism analyst Stephen Flynn has observed, "Throughout the 20th century [Americans] were able to treat national security as essentially an out-of-body experience. When confronted by threats, [America] dealt with them on the turf of our allies or our adversaries. Aside from the occasional disaster and heinous crime, civilian life [in the United States] has been virtually terror-free." With the turn of the twenty-first century, terrorist operations have become more prevalent in the United States and are taking shape in the form of modern guerrilla warfare, thus creating new challenges for federal, state, and local law enforcement agencies. After reviewing the origin and nature of these challenges, this article will offer some suggestions for countering guerilla warfare in the United States.

  1. On the Probability of Predicting and Mapping Traditional Warfare Measurements to the Cyber Warfare Domain

    CSIR Research Space (South Africa)

    Grobler, M

    2014-07-01

    Full Text Available Cyber warfare is a contentious topic, with no agreement on whether this is a real possibility or an unrealistic extension of the physical battlefield. This article will not debate the validity and legality of the concept of cyber warfare...

  2. THE CYBER DIMENSION OF MODERN HYBRID WARFARE AND ITS RELEVANCE FOR NATO

    Directory of Open Access Journals (Sweden)

    Sorin DUCARU

    2016-06-01

    Full Text Available The technological development and the instant communication possibilities advanced not only economic and social developments, but also evolving threats from those who exploit the vulnerabilities of communication and information systems. The cyber threat landscape points to a significant increase of the frequency, intensity, duration and sophistication of cyber-attacks. One of the new and concerning trends is the use of cyber capabilities in relation with military of hybrid operations – the so-called cyber dimension of hybrid warfare. NATO’s strategy on countering hybrid warfare is based on the triad: prepare-deter-defend, which also applies to cyber. Nations represent the first line of defence in countering hybrid strategies. International cooperation is also a key factor in this sense. It is in this context that NATO’s response to cyber-attacks in the context of hybrid warfare must be further refined.

  3. Public health foodborne illness case study during a Special Operations Forces deployment to South America.

    Science.gov (United States)

    McCown, Michael; Grzeszak, Benjamin

    2010-01-01

    Although many public health articles have been published detailing foodborne illness outbreaks, a medical literature search revealed no articles that detail a case study or a specific response of a deployed U.S. military unit to a potential foodborne illness. This article describes a recent public health case study of a U.S. Special Operations Forces (SOF) team sickened while deployed to South America. It highlights public health factors which may affect U.S. personnel deployed or serving overseas and may serve as a guide for a deployed SOF medic to reference in response to a potential food- or waterborne illness outbreak. Eight food samples and five water samples were collected. The food samples were obtained from the host nation kitchen that provided food to the SOF team. The water samples were collected from the kitchen as well as from multiple sites on the host nation base. These samples were packaged in sterile containers, stored at appropriate temperatures, and submitted to a U.S. Army diagnostic laboratory for analysis. Laboratory results confirmed the presence of elevated aerobic plate counts (APCs) in the food prepared by the host nation and consumed by the SOF team. High APCs in food are the primary indicator of improper sanitation of food preparation surfaces and utensils. This case study concluded that poor kitchen sanitation, improper food storage, preparation, and/or holding were the probable conditions that led to the team?s symptoms. These results emphasize the importance of ensuring safe food and water for U.S. personnel serving overseas, especially in a deployment or combat setting. Contaminated food and/or water will negatively impact the health and availability of forces, which may lead to mission failure. The SOF medic must respond to potential outbreaks and be able to (1) critically inspect food preparation areas and accurately advise commanders in order to correct deficiencies and (2) perform food/water surveillance testing consistently

  4. User Guide for Unmanned Aerial System (UAS) Operations on the National Ranges

    Science.gov (United States)

    2007-11-01

    WARFARE CENTER WEAPONS DIVISION, PT. MUGU NAVAL AIR WARFARE CENTER WEAPONS DIVISION, CHINA LAKE NAVAL AIR WARFARE CENTER AIRCRAFT DIVISION, PATUXENT...with IFR Instrument Flight Rules MRTFB Major Range and Test Facility Base NAS National Airspace System NM nautical mile NTIA National...sectional charts, Instrument Flight Rules ( IFR ) enroute charts, and terminal area charts. The floor and ceiling, operating hours, and controlling

  5. Energy Balance and Diet Quality During the US Marine Corps Forces Special Operations Command Individual Training Course.

    Science.gov (United States)

    Sepowitz, John J; Armstrong, Nicholes J; Pasiakos, Stefan M

    This study characterized the total daily energy expenditure (TDEE), energy intake (EI), body weight, and diet quality (using the Healthy Eating Index-2010 [HEI]) of 20 male US Marines participating in the 9-month US Marine Corps Forces Special Operations Command Individual Training Course (ITC). TDEE was highest (ρ energy balance. Education regarding the importance of maintaining healthy eating patterns while in garrison, consuming more carbohydrate and protein, and better matching EI with TDEE during strenuous training exercises may be warranted. 2017.

  6. Special operations in the heavy water system, III-2; III-2 Posebne operacije u sistemu teske vode

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1989-07-01

    Special operations in the heavy water system described in this chapter are as follows: treatment, drainage and pouring of heavy water, emptying of the heavy water system, cleaning and vacuuming of the heavy water system. [Serbo-Croat] Posebne operacije u sistemu teske vode opisane u ovom poglavlju su: tretiranje, dreniranje i razlivanje teske vode, praznjenje sistema teske vode, 'ispiranje' i vakumiranje sistema teske vode.

  7. New Tools for a New Terrain Air Force Support to Special Operations in the Cyber Environment

    Science.gov (United States)

    2016-08-01

    54 3 PREFACE As a career targeteer for the US...capabilities of a toolkit of cyber options, from hardware on the front lines to “digital reachback” relationships with USCYBERCOM, is to leave...of career fields, including, but not limited to, cyberspace operations, intelligence, aircrew operations, command and control systems operations, and

  8. Special method of coal winning in Hambach open-cast mine in 1987 using large machines in tandem operation

    Energy Technology Data Exchange (ETDEWEB)

    Krug, M; Muellensiefen, K

    1988-05-01

    In 1987 an additional 1,75 Mt coal, which were only overlain by slight layers of overburden, were won from the marginal batter system at Hambach open-cast mine by using a bucket wheel dredger with a daily output of 240 000 m/sup 3/ (solid) and at the same time bringing up the inside dump. During this working method the dredger and the spreader operated with a common belt conveyor in so-called tandem operation. Thanks to the efficient co-operation of the head planning department, field mining department, opencast mine surveying department and rock and soil mechanics department of the head office of the Rheinische Braunkohlenwerke AG, this special coal winning operation could be completed successfully.

  9. 76 FR 8314 - Special Conditions: Gulfstream Model GVI Airplane; Operation Without Normal Electric Power

    Science.gov (United States)

    2011-02-14

    ... issue a finding of regulatory adequacy pursuant to section 611 of Public Law 92-574, the ``Noise Control....101. Novel or Unusual Design Features The GVI incorporates an electronic flight control system that... Special Conditions The GVI incorporates an electronic flight control system that requires a continuous...

  10. Accomplishing American Strategic Goals in the Middle East through Persistent Special Operations

    Science.gov (United States)

    2011-06-01

    LIST OF TABLES Table 1. Utility of SOF Vs . GPF in Various Conflicts ..................................................27 xii THIS PAGE...Headquarters and Support Company , 3 rd Battalion, 5 th Special Forces Group (Airborne) who have tirelessly stayed in the fight. xviii THIS... franchise industry by extending ties to regional extremist groups through financing and training. Al Qaeda Arabian Peninsula (AQAP) and Iranian influence

  11. 76 FR 36864 - Special Conditions: Gulfstream Model GVI Airplane; Operation Without Normal Electric Power

    Science.gov (United States)

    2011-06-23

    ... Normal Electric Power AGENCY: Federal Aviation Administration (FAA), DOT. ACTION: Final special... Interface Branch, ANM-111, Transport Standards Staff, Transport Airplane Directorate, Aircraft Certification... Model GVI airplane will be an all-new, two- engine jet transport airplane. The maximum takeoff weight...

  12. 76 FR 66660 - Special Conditions: Gulfstream Aerospace LP (GALP) Model G280 Airplane, Operation Without Normal...

    Science.gov (United States)

    2011-10-27

    ... DEPARTMENT OF TRANSPORTATION Federal Aviation Administration 14 CFR Part 25 [Docket No. FAA-2011-1172: Notice No. 25-11-17-SC] Special Conditions: Gulfstream Aerospace LP (GALP) Model G280 Airplane... Aerospace LP (GALP) Model G280 airplane. This airplane will have a novel or unusual design feature...

  13. Cyber Attacks, Information Attacks, and Postmodern Warfare

    Directory of Open Access Journals (Sweden)

    Valuch Jozef

    2017-06-01

    Full Text Available The aim of this paper is to evaluate and differentiate between the phenomena of cyberwarfare and information warfare, as manifestations of what we perceive as postmodern warfare. We describe and analyse the current examples of the use the postmodern warfare and the reactions of states and international bodies to these phenomena. The subject matter of this paper is the relationship between new types of postmodern conflicts and the law of armed conflicts (law of war. Based on ICJ case law, it is clear that under current legal rules of international law of war, cyber attacks as well as information attacks (often performed in the cyberspace as well can only be perceived as “war” if executed in addition to classical kinetic warfare, which is often not the case. In most cases perceived “only” as a non-linear warfare (postmodern conflict, this practice nevertheless must be condemned as conduct contrary to the principles of international law and (possibly a crime under national laws, unless this type of conduct will be recognized by the international community as a “war” proper, in its new, postmodern sense.

  14. IAEA technical co-operation with least developed Member States. Special evaluation

    International Nuclear Information System (INIS)

    1993-01-01

    The main purposes of this evaluation were to: Review the overall situation with regard to IAEA technical co-operation with least developed Member States, including specific conditions in nuclear-related activities prevailing in these countries, approaches and practices used by the IAEA in providing assistance to LDCs, and the main results of the co-operation in question. Identify any adjustments to technical co-operation with LDC Member States that may strengthen this activity

  15. Journal of Special Operations Medicine. Volume 8, Edition 4, Fall 2008

    Science.gov (United States)

    2008-01-01

    specificities. The technology also can reliably identify ab- dominal aortic aneurysms and can image gall bladders and intrauterine pregnancies , as well...special scenarios (pediatrics, pregnancy , etc). The de- tailed case presentation is exceptionally valuable with each case having a sometimes dogma...glucose in- gestion. J Physiol (Lond) 1999; 51: 579. 18. Coyle EF, Coggan AR, Hemmert MK, Ivy JL: Muscle glycogen uti - lization during prolonged

  16. INTRODUCTION TO THE SPECIAL ISSUE ON "OPERATIONAL RESEARCH AND ASIA RISK MANAGEMENT"

    OpenAIRE

    DESHENG DASH WU; DAVID L. OLSON; LUIS A. SECO; JOHN BIRGE

    2011-01-01

    Risks are traditionally defined as the combination of probability and severity, but are actually characterized by additional factors. We believe the characteristics of risks include uncertainties, dynamics, dependence, clusterings and complexities, which motivate the utilization of various operational research tools. The objective of this issue is to survey the practice of using operational research tools in risk management, especially Asian risk management.

  17. ISIL's Hybrid Warfare in Syria & Iraq

    DEFF Research Database (Denmark)

    Sørensen, Heine

    2016-01-01

    of and ability to synchronize various instruments of power with a view to achieving their end-state. With regards to the second part of the problem statement, the analysis demonstrates how ISIL employed horizontal escalation and ambiguity initially, but later on turned to vertical escalation, within the military......The case study specifically seeks to answer the following problem statement: Does ISIL qualify as an actor using hybrid warfare and if so what characterizes their particular use of this type of warfare? Based on an analysis of ISIL’s warfare from August 2012 to August 2016 the chapter argues......, that it is possible to answer the first part of the problem statement in an affirmative way. Hence, ISIL is not only theoretically prone to hybridity by organizational setup, and by the people comprising the organization, but has in fact continuously acted according to a hybrid logic in its prioritization...

  18. Survey on Urban Warfare Augmented Reality

    Directory of Open Access Journals (Sweden)

    Xiong You

    2018-01-01

    Full Text Available Urban warfare has become one of the main forms of modern combat in the twenty-first century. The main reason why urban warfare results in hundreds of casualties is that the situational information of the combatant is insufficient. Accessing information via an Augmented Reality system can elevate combatants’ situational awareness to effectively improve the efficiency of decision-making and reduce the injuries. This paper begins with the concept of Urban Warfare Augmented Reality (UWAR and illuminates the objectives of developing UWAR, i.e., transparent battlefield, intuitional perception and natural interaction. Real-time outdoor registration, information presentation and natural interaction are presented as key technologies of a practical UWAR system. Then, the history and current research state of these technologies are summarized and their future developments are highlighted from three perspectives, i.e., (1 Better integration with Geographic Information System and Virtual Geographic Environment; (2 More intelligent software; (3 More powerful hardware.

  19. Mongol Warfare in the Pre-Dissolution Period »

    Directory of Open Access Journals (Sweden)

    Timothy May

    2015-01-01

    Full Text Available Although the Mongols used many of the tactics and strategies that steppe nomads had used for centuries, the Mongols refined steppe warfare so that this style of warfare reached its apogee during the Mongol Empire. Furthermore, the Mongols developed a style of warfare that made them possibly the greatest military force in history. This work examines several facets of the pre-dissolution period (1200–1260. With the dissolution of the Mongol Empire, Mongol warfare once again changed. In some areas it remained complex while in others it regressed to traditional forces of steppe warfare, still potent but not as effective as the pre-dissolution period.

  20. Guiding Warfare to Reach Sustainable Peace

    DEFF Research Database (Denmark)

    Vestenskov, David; Drewes, Line

    The conference report Guiding Warfare to Reach Sustainable Peace constitutes the primary outcome of the conference It is based on excerpts from the conference presenters and workshop discussions. Furthermore, the report contains policy recommendations and key findings, with the ambition of develo......The conference report Guiding Warfare to Reach Sustainable Peace constitutes the primary outcome of the conference It is based on excerpts from the conference presenters and workshop discussions. Furthermore, the report contains policy recommendations and key findings, with the ambition...... of developing best practices in the education and implementation of IHL in capacity building of security forces....

  1. Special Army Reports Prepared by Defense Finance and Accounting Service Indianapolis Operations

    National Research Council Canada - National Science Library

    Granetto, Paul J; Marsh, Patricia A; Armstrong, Jack L; Wenzel, Paul C; Barnes, Leslie M; Grum, Andrew D; Kleiman, E. E; Baer, Joseph A; Maroska, Chad A; Thompson, Ann L

    2007-01-01

    .... This is the second in a series of reports related to Army budget execution operations. The first report discussed the transmission of Army budget execution data by the Defense Finance and Accounting Service (DFAS...

  2. Proper Role of Special Operations Forces in the Pan Sahel Region of Africa

    National Research Council Canada - National Science Library

    Baker, Anthony P

    2006-01-01

    .... As the designated lead on synchronizing the GWOT efforts for DOD, US SOF remain focused on the Middle East, while continuing to operate in other regions where terrorists may seek sanctuary. The main U.S...

  3. Strategy for the Long Haul. Special Operations Forces: Future Challenges and Opportunities

    National Research Council Canada - National Science Library

    Martinage, Robert

    2008-01-01

    .... They have figured prominently in US military operations since 2001 and have become central to the implementation of US national defense strategy with respect to the war against violent Islamic radicalism...

  4. 78 FR 66419 - Seventy Sixth Meeting: RTCA Special Committee 147, Minimum Operational Performance Standards for...

    Science.gov (United States)

    2013-11-05

    ... TCAS Program Office ACAS X Functional Architecture Verification & Validation Activities Overview [ssquf... [ssquf] Initial Actions [ssquf] Scheduling of teleconferences, etc. Working Group Sign-up Other Business... Paige Williams, Management Analyst, NextGen, Business Operations Group, Federal Aviation Administration...

  5. Design and operation of the National Survey of Children with Special Health Care Needs, 2009-2010.

    Science.gov (United States)

    Bramlett, Matthew D; Blumberg, Stephen J; Ormson, A Elizabeth; George, Jacquelyn M; Williams, Kim L; Frasier, Alicia M; Skalland, Benjamin J; Santos, Kathleen B; Vsetecka, Danielle M; Morrison, Heather M; Pedlow, Steven; Wang, Fang

    2014-11-01

    This report presents the development, plan, and operation of the 2009-2010 National Survey of Children with Special Health Care Needs, a module of the State and Local Area Integrated Telephone Survey. The survey is conducted by the Centers for Disease Control and Prevention's National Center for Health Statistics. This survey was designed to produce national and state-specific prevalence estimates of children with special health care needs (CSHCN), to describe the types of services that they need and use, and to assess aspects of the system of care for CSHCN. A random-digit-dial sample of households with children under age 18 years was constructed for each of the 50 states and the District of Columbia. The sampling frame consisted of landline phone numbers and cellular(cell) phone numbers of households that reported a cell-phone-only or cell-phone-mainly status. Children in identified households were screened for special health care needs. If CSHCN were identified in the household, a detailed interview was conducted for one randomly selected child with special health care needs. Respondents were parents or guardians who knew about the children's health and health care. A total of 196,159 household screening interviews were completed from July 2009 through March 2011, resulting in 40,242 completed special-needs interviews, including 2,991 from cell-phone interviews. The weighted overall response rate was 43.7% for the landline sample, 15.2% for the cell-phone sample, and 25.5% overall. All material appearing in this report is in the public domain and may be reproduced or copied without permission; citation as to source, however, is appreciated.

  6. Personal protection during resuscitation of casualties contaminated with chemical or biological warfare agents--a survey of medical first responders.

    Science.gov (United States)

    Brinker, Andrea; Prior, Kate; Schumacher, Jan

    2009-01-01

    The threat of mass casualties caused by an unconventional terrorist attack is a challenge for the public health system, with special implications for emergency medicine, anesthesia, and intensive care. Advanced life support of patients injured by chemical or biological warfare agents requires an adequate level of personal protection. The aim of this study was to evaluate the personal protection knowledge of emergency physicians and anesthetists who would be at the frontline of the initial health response to a chemical/biological warfare agent incident. After institutional review board approval, knowledge of personal protection measures among emergency medicine (n = 28) and anesthetics (n = 47) specialty registrars in the South Thames Region of the United Kingdom was surveyed using a standardized questionnaire. Participants were asked for the recommended level of personal protection if a chemical/biological warfare agent(s) casualty required advanced life support in the designated hospital resuscitation area. The best awareness within both groups was regarding severe acute respiratory syndrome, and fair knowledge was found regarding anthrax, plague, Ebola, and smallpox. In both groups, knowledge about personal protection requirements against chemical warfare agents was limited. Knowledge about personal protection measures for biological agents was acceptable, but was limited for chemical warfare agents. The results highlight the need to improve training and education regarding personal protection measures for medical first receivers.

  7. Operating in the Muskwa-Kechika special management zone : a case study

    International Nuclear Information System (INIS)

    Maclean, G.I.; Anderson, B.; Laing, S.; Robert, J.

    1998-01-01

    The many challenges of exploring for natural gas in an area known as the Muskwa-Kechika special management zone of British Columbia were described. A key component of the stakeholder issues was addressing the concerns of the local First Nations that use the area for traditional purposes. Other stakeholders in the area are tour guides, trappers, non-government organizations that promote environmental and recreational values, and provincial ministries that are responsible for establishing regulations. The Muskwa-Kechika Protected Area was created in 1997 after Land and Resource Management plans reached a consensus on land use in the area. There are 4.4 million hectares in the area, 1.2 of which are designated as permanently protected. In support of this decision, Amoco Canada and Mobil surrendered 1420 hectares of petroleum and natural gas tenure in the area. The other 3.2 million hectares of the area lie in special management zones that allow for resource development under guidelines sensitive to wildlife and environmental values

  8. Biological warfare, bioterrorism, and biocrime.

    Science.gov (United States)

    Jansen, H J; Breeveld, F J; Stijnis, C; Grobusch, M P

    2014-06-01

    Biological weapons achieve their intended target effects through the infectivity of disease-causing infectious agents. The ability to use biological agents in warfare is prohibited by the Biological and Toxin Weapon Convention. Bioterrorism is defined as the deliberate release of viruses, bacteria or other agents used to cause illness or death in people, but also in animals or plants. It is aimed at creating casualties, terror, societal disruption, or economic loss, inspired by ideological, religious or political beliefs. The success of bioterroristic attempts is defined by the measure of societal disruption and panic, and not necessarily by the sheer number of casualties. Thus, making only a few individuals ill by the use of crude methods may be sufficient, as long as it creates the impact that is aimed for. The assessment of bioterrorism threats and motives have been described before. Biocrime implies the use of a biological agent to kill or make ill a single individual or small group of individuals, motivated by revenge or the desire for monetary gain by extortion, rather than by political, ideological, religious or other beliefs. The likelihood of a successful bioterrorist attack is not very large, given the technical difficulties and constraints. However, even if the number of casualties is likely to be limited, the impact of a bioterrorist attack can still be high. Measures aimed at enhancing diagnostic and therapeutic capabilities and capacities alongside training and education will improve the ability of society to combat 'regular' infectious diseases outbreaks, as well as mitigating the effects of bioterrorist attacks. © 2014 The Authors Clinical Microbiology and Infection © 2014 European Society of Clinical Microbiology and Infectious Diseases.

  9. Co-operation of medical and chemical services to provide radiation safety in special zone during Chernobyl' accident response

    International Nuclear Information System (INIS)

    Terent'ev, V.I.

    1990-01-01

    Cooperation of medical and chemical services of the operation group in the special zone during intensive decontamination of the site and neighboring herritories at the Chernobyl NPP are considered. Responsibilities of medical and chemical services, their relations with civie and millitary organizations within the ChNPP region and 30-km zone are reviewed. Cooperation of the services mentioned above consisted in information exchange aimed at overall comprehension of the situation, cooperative activities in the commision and at elaboration of recommendations with an account of radiation safety measures

  10. 36 CFR 251.124 - Preferred operator competitive special use authorization procedures.

    Science.gov (United States)

    2010-07-01

    ... entrepreneurship, nonprofit entity, or other form of organization shall be considered valid only when the... entrepreneurship, nonprofit entity, or other form of organization. (f) A qualified preferred operator shall be... shall be given the opportunity, by amending its application, to meet the terms and conditions of the...

  11. We Will Find A Way: Understanding the Legacy of Canadian Special Operations Forces

    Science.gov (United States)

    2012-02-01

    planners briefed him on the Commando raiding program and, more importantly, the work of Brigadier Colin Gubbins’ SOE and their Norwegian sabotage... Drury , Assistant Military Attaché, Canadian 53. Legation, Washington to the Directorate of Military Operations & Intelligence, NDHQ, Washington, 7

  12. Terrorist-Insurgent Thinking and Joint Special Operational Planning Doctrine and Procedures

    Science.gov (United States)

    2010-09-01

    b. Often organized planners, with some military training/experience c. Usually the brains behind operations or targeting and having the most detailed... Storytelling and Terrorism: Towards a Compre- hensive ‘Counter-Narrative Strategy,’ ” Strategic Insights IV:3 (March 2005), 1-16. Center for Army Lessons

  13. 78 FR 38093 - First Meeting: RTCA Special Committee 228-Minimum Operational Performance Standards for Unmanned...

    Science.gov (United States)

    2013-06-25

    ... Activity. SC-228 Scope and Terms of Reference. SC-228 Structure and Organization of Work. [cir] Working Group 1--Detect and Avoid (DAA) [cir] Working Group 2--Command and Control (C2) Other Business Date and..., Business Operations Group, ANG-A12, Federal Aviation Administration. [FR Doc. 2013-15139 Filed 6-24-13; 8...

  14. 78 FR 61445 - Seventy-Sixth Meeting: RTCA Special Committee 147, Minimum Operational Performance Standards for...

    Science.gov (United States)

    2013-10-03

    ... of FAA TCAS Program Office ACAS X Functional Architecture Verification & Validation Activities... Other Business Action Items Time and Place of Next Meeting Plenary Adjourn Attendance is open to the... September 25, 2013. Paige Williams, Management Analyst, NextGen, Business Operations Group, Federal Aviation...

  15. Warfare and the Teaching of History.

    Science.gov (United States)

    Salevouris, Michael J.

    1989-01-01

    Maintains that history teachers must challenge simplistic romantic notions about war. Proposes two approaches to teaching about war: the use of personal war narratives; and examining the relationship between warfare and society. Discusses literature related to these approaches. Contends that only through realistic assessments of war can peace be…

  16. The technical Dimensions of Nuclear Warfare

    International Nuclear Information System (INIS)

    Broda, E.

    1977-01-01

    This text, written by Engelbert Broda in 1977 is about the dimensions of nuclear warfare. Broda describes the devastating effects of the nuclear bombs dropped in 1945 in Hiroshima and Nagasaki and compares these effects with the explosive power of Hydrogen weapons. He also expresses his concerns about another nuclear ware and analyses possible worsening situations like change in the military doctrine. (nowak)

  17. Biomonitoring of exposure to chemical warfare agents

    NARCIS (Netherlands)

    Noort, D.; Schans, M.J. van der; Benschop, H.P.

    2006-01-01

    An overview is presented of the major methods that are presently available for biomonitoring of exposure to chemical warfare agents, i.e., nerve agents and sulfur mustard. These methods can be applied for a variety of purposes such as diagnosis and dosimetry of exposure of casualties, verification

  18. The Cinderella Front: Allied Special Air Operations in Yugoslavia during World War II

    Science.gov (United States)

    1997-03-01

    the 21st Century: An Effect-Based Approach to the Planning Process”, War Theory Coursebook , Air Command and Staff College: Maxwell AFB, 1996, 36. 6...French and other operations allowed. Of all the contextual elements, the leadership and physical environment were perhaps most influential in the...military liaisons to the Partisans and Chetniks and to gather reliable information about their effectiveness.7 The physical environment of Yugoslavia

  19. An Uncertain Relationship: Special Operations and Clausewitz’s on War

    Science.gov (United States)

    2011-05-04

    Conclusion Bibliography 11 lll 7 8 9 10 11 12 13 15 17 18 20 22 23 24 27 5 Shakespeare offers only an incomplete truth in noting, "[t...execution 1 William Shakespeare , "Coriolanus," V, iii, 141. 6 of speciai operations, and reveals that contemporary models for synchronizing the role of...Those overawed by the uncertainty Shakespeare ascribes to war might "profess . ourselves to be the slaves of chance, and flies. of every wind that

  20. Advising the Command: Best Practices from the Special Operations Advisory Experience in Afghanistan

    Science.gov (United States)

    2015-01-01

    in their spare time. They looked for opportunities to have lunch with Afghans and reportedly extended offers for dinner .18 The SMW ETT cultivated...extremely close relationships with their counterparts, in part by routinely eating with colleagues in the Afghan dining facility. They initiated the...October 21 and November 21, 2013. The practice is very much akin to that of Task Force (TF) 51, where Norwegian SOF operators eat daily meals with

  1. Encapsulated subdural empyema. A case report with special reference to CT findings and operative indications

    Energy Technology Data Exchange (ETDEWEB)

    Tokunaga, Yoshiharu; Inoue, Masaru; Ishizaka, Hiroaki; Koga, Hiroaki; Kawano, Teruaki; Mori, Kazuo

    1985-04-01

    A case of encapsulated subdural empyema was reported. This 1.5-year-old boy was admitted with the increasing confusion and convulsion. Eight months prior to admission, he had craniotomy for traumatic acute epidural hematoma on the left side. Following a coagulation of the middle meningeal artery which was the bleeding source, the dura was opened but no cortical damage was noted at that time. The computed tomographic (CT) scan on admission revealed a large subdural collection with a thin enhancing rim on the left side. Emergency craniotomy revealed a collection of subdural pus, which was irrigated and a catheter was put for continuous drainage. Postoperatively, the patient did well, however, following removal of the catheter, three weeks after the first operation, the subdural empyema was reexpanded with a very thick enhancing rim on CT scan. Ultrasonography also clearly demonstrated the formation of the thick membranes. The large craniotomy was performed and empyema with the outer and inner memberanes of 8mm thick was totally excised. Post-operative CT scan did not show any enhancing rim, indicating that enchancement was caused by newly formed vessels within the membranes per se. This findings are totally different from those observed in the brain abscess in which ring enhancement on CT continues months to years following so-called extracapsular excision of abscess. In the brain abscess, surrounding glial tissue with plenty neovascularization is left intact, even after the operation. (author).

  2. Depth vs. Breadth: Talent Management for Special Warfare

    Science.gov (United States)

    2016-12-01

    a valuable and important tool when it comes to managing officer talent. In the corporate world, business skill has been strongly linked to leader ...Taking Charge, Harvard Business Professor John Gabarro discusses his research into the process behind successful (and failed) leader rotation. Gabarro’s...spend five years in a leadership role, agrees with Google’s experience. He believes that strategic leaders , like the SOCOM Commander, benefit from

  3. Naval Special Warfare Command's Implementation of the CFO Act

    National Research Council Canada - National Science Library

    Sabel, Martin

    2001-01-01

    ... out." Differences in definitions and classifications of finance categories, human error, and lack of training, and faulty accounting systems can result in inaccurate data and inability to properly utilize...

  4. A Predictive Model of Surface Warfare Officer Retention: Factors Affecting Turnover

    National Research Council Canada - National Science Library

    Gjurich, Gregory

    1999-01-01

    Junior Surface Warfare Officer retention is in a crisis. The Surface Warfare Officer community anticipates an inability to fill Department Head billets due to the number of junior Surface Warfare Officers leaving military service...

  5. Journal of Special Operations Medicine, Volume 4, Edition 4, Fall 2004

    Science.gov (United States)

    2004-01-01

    Donahue My American Journey Colin Powell (GEN Ret) & Joseph E Persico My Secret War Richard S Drury Night Jungle Operations Thomas B Bennett TITLE AUTHOR...USN Command Surgeon I keep General Colin Powell’s leadership primer on my desk top for reference and pull it out regular- ly to remind myself of what’s...point is important – immunization rates rivaled or exceeded those of the United States. Now, as Secretary of State Colin Powell may or may not have said

  6. Lessons learned from the special inspection program for emergency operating procedures: Conducted March--October 1988

    International Nuclear Information System (INIS)

    1989-04-01

    The results of the team inspections conducted during 1988 for the Nuclear Regulatory Commission (NRC) Emergency Operating Procedures (EOPs) Inspection Program are summarized in this report. Inspection results are discussed in relation to past staff guidance provided to utilities for upgrade of EOPs. In this report the NRC presents information of particular interest to the nuclear power industry regarding concerns that were identified during the EOP team inspections and restates the staff's previous guidance in a format that more clearly illustrates the consequences of programmatic weaknesses. The information contained in this report is provided so that licensees may take advantage of the lessons learned from the EOP inspection effort. This report does not impose any new requirements related to the upgrading of EOPs. 7 refs

  7. Special considerations on operating a fuel cell power plant using natural gas with marginal heating value

    Energy Technology Data Exchange (ETDEWEB)

    Moses, L. Ng; Chien-Liang Lin [Industrial Technology Research Institute, Taiwan (China); Ya-Tang Cheng [Power Research Institute, Taiwan (China)

    1996-12-31

    In realizing new power generation technologies in Taiwan, a phosphoric acid fuel cell power plant (model PC2513, ONSI Corporation) has been installed in the premises of the Power Research Institute of the Taiwan Power Company in Taipei County of Taiwan. The pipeline gas supplying to the site of this power plant has a high percentage of carbon dioxide and thus a slightly lower heating value than that specified by the manufacturer. Because of the lowering of heating value of input gas, the highest Output power from the power plant is understandably less than the rated power of 200 kW designed. Further, the transient response of the power plant as interrupted from the Grid is also affected. Since this gas is also the pipeline gas supplying to the heavily populated Taipei Municipal area, it is conceivable that the success of the operations of fuel cells using this fuel is of vital importance to the promotion of the use of this power generation technology in Taiwan. Hence, experiments were set up to assess the feasibility of this fuel cell power plant using the existing pipeline gas in this part of Taiwan where fuel cells would most likely find useful.

  8. Athabasca--special report No. 2, sand behavior key to operation size

    Energy Technology Data Exchange (ETDEWEB)

    Daly, W J

    1966-09-01

    Before production of the crude oil from the Athabasca tar sands could be initiated, a feasibility and economic study based on field test work was made. It was concluded that the project was technically feasible and a plant could be constructed for approximately $137 million, but that the engineering design must be preceded by a field test program, laboratory work, and by ground surveys. A test program, using the hot water recovery process and sized to handle 3 tons of sand per hour, was begun in Oct. 1963. As the test program proceeded, the unit was frequently renovated as capacity was increased from 3 tons to finally 10 tons per hour. Included in the tests was the determination of the effect that raw bitumen pools (indicated by the government coring program) would have on production operations. It was determined that no problems would arise from this situation because no such pools could be found and were considered not to be in existence. The test model was successful in clearly illustrating the principles to use in the overall layout, which is approximately 50% complete.

  9. U.S. Special Forces: Culture Warriors

    Science.gov (United States)

    2014-12-01

    definitions include:  “ culture is that complex whole which includes knowledge, beliefs, art, law, morals , custom, and any other capabilities and habits...perceptions towards others, such as ethnocentrism, cultural relativism , stereotypes, biases and worldview. Readings: ARSOF 2022, Special Warfare, Vol. 26...FORCES: CULTURE WARRIORS by Joshua L. Hill December 2014 Thesis Advisor: Heather S. Gregg Second Reader: Robert Burks THIS PAGE

  10. Information Warfare on Social Media: A Brand Management Perspective

    Directory of Open Access Journals (Sweden)

    Kalpokas Ignas

    2017-06-01

    Full Text Available Employing a perspective informed by brand management, this article aims at understanding information warfare operations in social media. The state, seen as brand, must project an image of itself to both internal and foreign audiences to unite the domestic audience and/or attract global support. However, in constructing a brand, states are vulnerable to ‘sofa warriors’ – ordinary individuals who have been unwittingly recruited by hostile actors to disseminate (over social media or other platforms a counter-brand, harmful to the state concerned. These new threats are investigated in light of recent tendencies in online branding, elucidating their status as a national security threat, with the potential to significantly disrupt life in political communities.

  11. Computational models of intergroup competition and warfare.

    Energy Technology Data Exchange (ETDEWEB)

    Letendre, Kenneth (University of New Mexico); Abbott, Robert G.

    2011-11-01

    This document reports on the research of Kenneth Letendre, the recipient of a Sandia Graduate Research Fellowship at the University of New Mexico. Warfare is an extreme form of intergroup competition in which individuals make extreme sacrifices for the benefit of their nation or other group to which they belong. Among animals, limited, non-lethal competition is the norm. It is not fully understood what factors lead to warfare. We studied the global variation in the frequency of civil conflict among countries of the world, and its positive association with variation in the intensity of infectious disease. We demonstrated that the burden of human infectious disease importantly predicts the frequency of civil conflict and tested a causal model for this association based on the parasite-stress theory of sociality. We also investigated the organization of social foraging by colonies of harvester ants in the genus Pogonomyrmex, using both field studies and computer models.

  12. Handbook of toxicology of chemical warfare agents

    CERN Document Server

    2010-01-01

    This groundbreaking book covers every aspect of deadly toxic chemicals used as weapons of mass destruction and employed in conflicts, warfare and terrorism. Including findings from experimental as well as clinical studies, this one-of-a-kind handbook is prepared in a very user- friendly format that can easily be followed by students, teachers and researchers, as well as lay people. Stand-alone chapters on individual chemicals and major topics allow the reader to easily access required information without searching through the entire book. This is the first book that offers in-depth coverage of individual toxicants, target organ toxicity, major incidents, toxic effects in humans, animals and wildlife, biosensors, biomarkers, on-site and laboratory analytical methods, decontamination and detoxification procedures, prophylactic, therapeutic and countermeasures, and the role of homeland security. Presents a comprehensive look at all aspects of chemical warfare toxicology in one reference work. This saves research...

  13. Chemical warfare agents. Classes and targets.

    Science.gov (United States)

    Schwenk, Michael

    2018-09-01

    Synthetic toxic chemicals (toxicants) and biological poisons (toxins) have been developed as chemical warfare agents in the last century. At the time of their initial consideration as chemical weapon, only restricted knowledge existed about their mechanisms of action. There exist two different types of acute toxic action: nonspecific cytotoxic mechanisms with multiple chemo-biological interactions versus specific mechanisms that tend to have just a single or a few target biomolecules. TRPV1- and TRPA-receptors are often involved as chemosensors that induce neurogenic inflammation. The present work briefly surveys classes and toxicologically relevant features of chemical warfare agents and describes mechanisms of toxic action. Copyright © 2017 Elsevier B.V. All rights reserved.

  14. Russian Perspectives on Network-Centric Warfare: The Key Aim of Serdyukov’s Reform

    Science.gov (United States)

    2011-01-01

    has faced with its GLObal’naya NAvigatsionnaya Sputnikovaya Sistema —(GLONASS) system, and introducing advanced digitized communications in the armed...of targeting data will be accomplished by organizing virtual channels for data transmission or via a web -portal. The successful function- ing of the...Operations: Tactical Web Takes Shape,” Signal, November 2003; Col. Alan D. Campen, USAF (Ret.), “Look Closely At Network-Centric Warfare: Technology Can

  15. Weathering the Cyber Storm: The Military’s Resiliency to Cyber Attacks in Future Warfare

    Science.gov (United States)

    2012-06-01

    observation. While the ability to collect intelligence is important, it falls under a different rubric than warfare itself. 20 Another term worth...the use of antivirus programs, firewalls, and security policies. These measures also fall under the rubric of information assurance, or “measures that...specifying how it is to be accomplished.” of genetic diversity. 13 A complaint after Operation Iraqi Freedom (OIF) was that soldiers had to

  16. Bits or Shots in Combat? The Generalized Deitchman Model of Guerrilla Warfare

    OpenAIRE

    Kress, Moshe; MacKay, Niall J.

    2013-01-01

    Operations Research Letters, accepted. We generalize Deitchman's guerrilla warfare model to account for trade-off between intelligence ('bits') and firepower ('shots'). Intelligent targeting leads to aimed fire, absence of intelligence leads to unaimed fire, dependent on targets' density. We propose a new Lanchester-type model that mixes aimed with unaimed fire, the balance between these being determined by quality of information. We derive the model's conserved quantity, and use it ...

  17. Forgeting Lessons Learned: The United States Army’s Inability To Embrace Irregular Warfare

    Science.gov (United States)

    2014-04-01

    Revolutionary Development Support, commonly referred to as “CORDS”, was established in 1967 under Robert “Blowtorch” Komer. As the director of CORDS, Robert ...combat operations spanning the complete spectrum of warfare. As Robert Citino, the author of Blitzkrieg to Desert Storm wrote about the development of...US forces in Somalia. Haiti In 1915, Smedley Butler and 3,000 Marines invaded Haiti and quickly pacified the entire island. Eighty years

  18. Special Operations Forces’ Turn: Recommendations for Leading the Way in Governance and Development in the Afghan Districts Post-DSTs

    Directory of Open Access Journals (Sweden)

    Carlos Terrones

    2014-05-01

    Full Text Available The work of the Provincial Reconstruction Teams (PRTs and District Support Teams (DSTs in Afghanistan emphasized building the district government structures, improving their capacity, and mobilizing economic development. With the completion of the mandate of the PRTs and DSTs, the Special Operations Forces (SOF will take a greater role in governance and development activities in districts and communities throughout the country. In 2014, security responsibility will fall under the Afghan security forces, but the war is not over. SOF will remain in the districts through the early fall of 2014. This practice note examines the role of the DSTs and how SOF should engage in governance and development in the districts. It provides recommendations from the field despite the challenging and minimal resources available in a district. With the right strategic approaches, SOF should be able to maximize the impact of their stability operations; however, it must not be forgotten that achieving stability will depend on whether Afghans are willing to take the lead.

  19. The Strategy of Drone Warfare

    Directory of Open Access Journals (Sweden)

    Mike Fowler

    2014-12-01

    Full Text Available There is a budding controversy with the combat use of Remotely Piloted Aircraft (RPA. Also known as Unmanned Aerial Vehicles (UAV, there is a growing literature critiquing the use of RPAs, often using the pejorative term “drone.” RPAs seem to get the blame for a variety of complaints about policy and employment that have little to do with the airframe or its processes. While all of the military functions of an RPA can and are done by manned aircraft, the RPAs must endure additional scrutiny. The decision to employ RPAs requires additional considerations at both the strategic and operational levels of war. This article explores the strategic issues that govern the decisions to employ RPAs in combat. The decision to employ RPAs involves a variety of strategic and operational concerns involving legal issues, technological constraints, operational efficiency, and an interdependency upon information operations.

  20. Implications for US Special Operations Forces and the Interagency in Phase Zero: Case Studies in the Pacific Theater, 2000 to 2014

    Science.gov (United States)

    2016-06-10

    What Would Sun Tzu Say?” Military Review (May-June 2004): 20. A note of Special Forces Groups: There are five active duty Special Forces Groups that...2004): 2-4. Maxwell, David. “Operation Enduring Philippines: What Would Sun Tzu Say?” Military Review (May-June 2004): 20-23. Nye Jr., Joseph S...Recommendations for Further Study ............................................................................ 84 BIBLIOGRAPHY

  1. The Cycle of Warfare - Analysis of an Analytical Model

    DEFF Research Database (Denmark)

    Jensen, Mikkel Storm

    2016-01-01

    by its economic, political and ideological characteristics. With the single assumption of economic rationality in human behaviour, Cycle of Warfare is not only coherent, it is applicable to all entities engaged in competition anywhere in the world at any point in history. The Cycle of Warfare can be used...

  2. Surface Warfare Officers Initial Training For Future Success

    Science.gov (United States)

    2018-03-01

    9 A school is initial rating specific technical training that is given to sailors. 14 Figure 4. Less...NAVAL POSTGRADUATE SCHOOL MONTEREY, CALIFORNIA MBA PROFESSIONAL REPORT SURFACE WARFARE OFFICERS— INITIAL TRAINING FOR FUTURE SUCCESS March 2018...professional report 4. TITLE AND SUBTITLE SURFACE WARFARE OFFICERS—INITIAL TRAINING FOR FUTURE SUCCESS 5. FUNDING NUMBERS 6. AUTHOR(S) Arron J

  3. Chemical profiling of chemical warfare agents for forensic purposes

    NARCIS (Netherlands)

    Noort, D.; Reuver, L.P.J. de; Fidder, A.; Tromp, M.; Verschraagen, M.

    2010-01-01

    A program has been initiated towards the chemical profiling of chemical warfare agents, in order to support forensic investigations towards synthesis routes, production sites and suspect chemical suppliers. Within the first stage of the project various chemical warfare agents (VX, sulfur mustard,

  4. No Special Equipment Required: The Accessibility Features Built into the Windows and Macintosh Operating Systems make Computers Accessible for Students with Special Needs

    Science.gov (United States)

    Kimball,Walter H.; Cohen,Libby G.; Dimmick,Deb; Mills,Rick

    2003-01-01

    The proliferation of computers and other electronic learning devices has made knowledge and communication accessible to people with a wide range of abilities. Both Windows and Macintosh computers have accessibility options to help with many different special needs. This documents discusses solutions for: (1) visual impairments; (2) hearing…

  5. How Power-Laws Re-Write The Rules Of Cyber Warfare

    Directory of Open Access Journals (Sweden)

    David L. Bibighaus

    2015-12-01

    Full Text Available All warfare contains and element of randomness. This article will argue that, the kind uncertainty encountered in cyber warfare (Power-Law randomness is fundamentally different from the uncertainty the military has evolved to deal with in the physical world (Gaussian-Randomness. The article will explain the difference between these two kinds of randomness, and how cyber weapons appear to operate under Power-Law randomness. It then will show how in cyberspace, key aspects of strategic thought are based on a flaws assumption of randomness. Finally, this article shall argue that if the American military is going to be effective in cyberspace, it must re-examine the way the military assumes risk, recruits is forces, plans for war and maintains the peace.

  6. Destruction of chemical warfare surrogates using a portable atmospheric pressure plasma jet

    Science.gov (United States)

    Škoro, Nikola; Puač, Nevena; Živković, Suzana; Krstić-Milošević, Dijana; Cvelbar, Uroš; Malović, Gordana; Petrović, Zoran Lj.

    2018-01-01

    Today's reality is connected with mitigation of threats from the new chemical and biological warfare agents. A novel investigation of cold plasmas in contact with liquids presented in this paper demonstrated that the chemically reactive environment produced by atmospheric pressure plasma jet (APPJ) is potentially capable of rapid destruction of chemical warfare agents in a broad spectrum. The decontamination of three different chemical warfare agent surrogates dissolved in liquid is investigated by using an easily transportable APPJ. The jet is powered by a kHz signal source connected to a low-voltage DC source and with He as working gas. The detailed investigation of electrical properties is performed for various plasmas at different distances from the sample. The measurements of plasma properties in situ are supported by the optical spectrometry measurements, whereas the high performance liquid chromatography measurements before and after the treatment of aqueous solutions of Malathion, Fenitrothion and Dimethyl Methylphosphonate. These solutions are used to evaluate destruction and its efficiency for specific neural agent simulants. The particular removal rates are found to be from 56% up to 96% during 10 min treatment. The data obtained provide basis to evaluate APPJ's efficiency at different operating conditions. The presented results are promising and could be improved with different operating conditions and optimization of the decontamination process.

  7. Hybrid Warfare Studies and Russia’s Example in Crimea

    Directory of Open Access Journals (Sweden)

    Mehmet Seyfettin EROL

    2015-12-01

    Full Text Available Although Hybrid Warfare is an old concept, theoretical studies in the western countries mainly began in the post-Col War era, focusing on asymmetrical threats against conventional superiority of western countries such as USA or Israel. September 11th attacks and 2006 Israel-Lebanon war played important roles for the evolution of hybrid warfare theories. However, there has not any consensus among scholars on a exact or unique definition of hybrid warfare. Hybrid warfare became one of the main security issues for the West and especially for NATO after the Russia-Ukraine crisis. Russian military strategies, called “hybrid warfare” by the western countries, resulted in the successful annexation of Crimea and, caused a serious security problem for the West resulting important structural and functional changes for the military system of NATO. Russian activities, which have been based on surprise, ambiguity and deniability, presented a unique example for hybrid warfare studies.

  8. Understanding the Form, Function, and Logic of Clandestine Insurgent and Terrorist Networks: The First Step in Effective Counternetwork Operations

    Science.gov (United States)

    2012-04-01

    are examples of this external non- professional genre . These groups function much like the U.S. Army Special Forces conducting unconventional warfare...security force vehicle the IED was built to destroy, and conducts the operation. If he films the event, then he drops off the film at a drop-off point...and notifies the cell leader that the operation is complete. The cell leader directs the media cell to pick up the film from the drop-off site, and

  9. Back to the future: aerial warfare in Libya

    Directory of Open Access Journals (Sweden)

    João Paulo Nunes Vicente

    2013-05-01

    Full Text Available A century after the first air bomb mission, a new intervention in the same geographic space has made evident the changes in Airpower. The Aerial Warfare in Libya has radically changed the civil war, complying with a UN mission to protect Libyan population, imposing a no-fly zone and an arms embargo. Therefore, Operation Unified Protector became one of the most successful campaigns in the history of NATO. We aim to assess the operational efficiency of Airpower in the conflict in Libya, focusing on the challenges of a War essentially Aerial. Despite the military results and the fact that some political objectives were met, we can identify some concerning trends that, if not shifted, may negatively influence future NATO operations. We do not aim to draw general and universal conclusions on the strategic value of Airpower based on the analysis of a specific case. Above all, we focus on identifying some lessons which have influenced OUP operational efficiency. Thus, we must analyze some factors, such as the scope of objectives, the type of opposing action and aerial strategy used by the coalition and then focus on the challenges arising from the OUP.

  10. Causes of death in U.S. Special Operations Forces in the global war on terrorism: 2001-2004.

    Science.gov (United States)

    Holcomb, John B; McMullin, Neil R; Pearse, Lisa; Caruso, Jim; Wade, Charles E; Oetjen-Gerdes, Lynne; Champion, Howard R; Lawnick, Mimi; Farr, Warner; Rodriguez, Sam; Butler, Frank K

    2007-06-01

    Effective combat trauma management strategies depend upon an understanding of the epidemiology of death on the battlefield. A panel of military medical experts reviewed photographs and autopsy and treatment records for all Special Operations Forces (SOF) who died between October 2001 and November 2004 (n = 82). Fatal wounds were classified as nonsurvivable or potentially survivable. Training and equipment available at the time of injury were taken into consideration. A structured analysis was conducted to identify equipment, training, or research requirements for improved future outcomes. Five (6%) of 82 casualties had died in an aircraft crash, and their bodies were lost at sea; autopsies had been performed on all other 77 soldiers. Nineteen deaths, including the deaths at sea were noncombat; all others were combat related. Deaths were caused by explosions (43%), gunshot wounds (28%), aircraft accidents (23%), and blunt trauma (6%). Seventy of 82 deaths (85%) were classified as nonsurvivable; 12 deaths (15%) were classified as potentially survivable. Of those with potentially survivable injuries, 16 causes of death were identified: 8 (50%) truncal hemorrhage, 3 (19%) compressible hemorrhage, 2 (13%) hemorrhage amenable to tourniquet, and 1 (6%) each from tension pneumothorax, airway obstruction, and sepsis. The population with nonsurvivable injuries was more severely injured than the population with potentially survivable injuries. Structured analysis identified improved methods of truncal hemorrhage control as a principal research requirement. The majority of deaths on the modern battlefield are nonsurvivable. Improved methods of intravenous or intracavitary, noncompressible hemostasis combined with rapid evacuation to surgery may increase survival.

  11. Resonance Frequency Breathing Biofeedback to Reduce Symptoms of Subthreshold PTSD with an Air Force Special Tactics Operator: A Case Study.

    Science.gov (United States)

    Petta, Lorene M

    2017-06-01

    The prevalence rates of post-traumatic stress disorder (PTSD) have been estimated to be several times higher in military populations compared to the national average. Special Tactics operators are a group that is more likely to avoid seeking psychological care due to the stigma and other consequences the diagnosis may have on their military careers. There is a need for more effective and less stigmatizing interventions to treat this population. Psychophysiological methods have been proven to be efficacious in treating PTSD, yet have received less attention as an adjunctive intervention. Resonance frequency (RF) biofeedback is a form of cardiorespiratory intervention that has shown promise as an effective treatment. The current case study examined the use of RF biofeedback in combination with other physiological and evidence-based methods as part of a comprehensive treatment approach. The client showed a significant drop from his initial scores on a screening assessment by the end of treatment, and demonstrated continued progress despite a 3-month break from the therapy. This author proposed that the synergistic effects of the multi-phased treatment approach contributed to the client's progress. Furthermore, a case was made for using multiple techniques when treating subthreshold PTSD and related symptoms within a treatment resistant population.

  12. German Views of Irregular Warfare

    Science.gov (United States)

    2015-06-01

    retreated westward following the invasion of Russia. Karl Marx , in an 1849 speech, emphasized, A nation, fighting for its liberty, ought not to adhere...characterized these forces. “Irregular” forces, on the other hand, fell outside of such characterizations and state subordination. 82 Karl von Clausewitz, On...operations. Of note, this edition of On War uses “ Karl ” instead of “Carl.” 28 Tyrolean uprising (1809), and the Spanish insurrection and Peninsula

  13. 4-D COMMON OPERATIONAL PICTURE (COP) FOR MISSION ASSURANCE (4D COP) Task Order 0001: Air Force Research Laboratory (AFRL) Autonomy Collaboration in Intelligence, Surveillance, and Reconnaissance (ISR), Electronic Warfare (EW)/Cyber and Combat Identification (CID)

    Science.gov (United States)

    2016-10-27

    across disciplines that might yield significant benefits if their relationships were better understood. 9 Approved for public release; distribution is... benefit from reading a common narrative with detailed operational situations that might offer a tangible and memorable set of references that would...north to the ocean. This cold black knuckle of ancient rock was the tip of some submerged coastal mountain, and he liked to hike out to it and

  14. Axial Vircator for Electronic Warfare Applications

    Directory of Open Access Journals (Sweden)

    L. Drazan

    2009-12-01

    Full Text Available This paper deals with a high power microwave generator with virtual cathode – vircator in axial release for electronic warfare applications. The classification of directed energy weapons microwave (DEWM is introduced together with basic block diagrams of a particular class of DEWM. In the paper, methods for designing vircator pulsed power supply, axial vircator structure, measurement methods and experimental results are presented. The vircator in electromagnetic ammunition is powered by magneto-cumulative generator and in weapons for defense of objects (WDO, it is powered by Marx generator. The possible applications of a vircator in the DEWM area are discussed.

  15. Electronic warfare receivers and receiving systems

    CERN Document Server

    Poisel, Richard A

    2014-01-01

    Receivers systems are considered the core of electronic warfare (EW) intercept systems. Without them, the fundamental purpose of such systems is null and void. This book considers the major elements that make up receiver systems and the receivers that go in them.This resource provides system design engineers with techniques for design and development of EW receivers for modern modulations (spread spectrum) in addition to receivers for older, common modulation formats. Each major module in these receivers is considered in detail. Design information is included as well as performance tradeoffs o

  16. 47 CFR 25.254 - Special requirements for ancillary terrestrial components operating in the 1610-1626.5 MHz/2483.5...

    Science.gov (United States)

    2010-10-01

    ... 47 Telecommunication 2 2010-10-01 2010-10-01 false Special requirements for ancillary terrestrial components operating in the 1610-1626.5 MHz/2483.5-2500 MHz bands. 25.254 Section 25.254 Telecommunication FEDERAL COMMUNICATIONS COMMISSION (CONTINUED) COMMON CARRIER SERVICES SATELLITE COMMUNICATIONS Technical...

  17. 47 CFR 25.257 - Special requirements for operations in the band 29.1-29.25 GHz between NGSO MSS and LMDS.

    Science.gov (United States)

    2010-10-01

    ... 47 Telecommunication 2 2010-10-01 2010-10-01 false Special requirements for operations in the band 29.1-29.25 GHz between NGSO MSS and LMDS. 25.257 Section 25.257 Telecommunication FEDERAL COMMUNICATIONS COMMISSION (CONTINUED) COMMON CARRIER SERVICES SATELLITE COMMUNICATIONS Technical Standards § 25...

  18. Studies on residue-free decontaminants for chemical warfare agents.

    Science.gov (United States)

    Wagner, George W

    2015-03-17

    Residue-free decontaminants based on hydrogen peroxide, which decomposes to water and oxygen in the environment, are examined as decontaminants for chemical warfare agents (CWA). For the apparent special case of CWA on concrete, H2O2 alone, without any additives, effectively decontaminates S-2-(diisopropylamino)ethyl O-ethyl methylphosphonothioate (VX), pinacolyl methylphosphorofluoridate (GD), and bis(2-choroethyl) sulfide (HD) in a process thought to involve H2O2 activation by surface-bound carbonates/bicarbonates (known H2O2 activators for CWA decontamination). A plethora of products are formed during the H2O2 decontamination of HD on concrete, and these are characterized by comparison to synthesized authentic compounds. As a potential residue-free decontaminant for surfaces other than concrete (or those lacking adsorbed carbonate/bicarbonate) H2O2 activation for CWA decontamination is feasible using residue-free NH3 and CO2 as demonstrated by reaction studies for VX, GD, and HD in homogeneous solution. Although H2O2/NH3/CO2 ("HPAC") decontaminants are active for CWA decontamination in solution, they require testing on actual surfaces of interest to assess their true efficacy for surface decontamination.

  19. History of chemical and biological warfare agents

    International Nuclear Information System (INIS)

    Szinicz, L.

    2005-01-01

    Chemical and biological warfare agents constitute a low-probability, but high-impact risk both to the military and to the civilian population. The use of hazardous materials of chemical or biological origin as weapons and for homicide has been documented since ancient times. The first use of chemicals in terms of weapons of mass destruction goes back to World War I, when on April 22, 1915 large amounts of chlorine were released by German military forces at Ypres, Belgium. Until around the 1970s of the 20th century, the awareness of the threat by chemical and biological agents had been mainly confined to the military sector. In the following time, the development of increasing range delivery systems by chemical and biological agents possessors sensitised public attention to the threat emanating from these agents. Their proliferation to the terrorists field during the 1990s with the expanding scale and globalisation of terrorist attacks suggested that these agents are becoming an increasing threat to the whole world community. The following article gives a condensed overview on the history of use and development of the more prominent chemical and biological warfare agents

  20. History of chemical and biological warfare agents.

    Science.gov (United States)

    Szinicz, L

    2005-10-30

    Chemical and biological warfare agents constitute a low-probability, but high-impact risk both to the military and to the civilian population. The use of hazardous materials of chemical or biological origin as weapons and for homicide has been documented since ancient times. The first use of chemicals in terms of weapons of mass destruction goes back to World War I, when on April 22, 1915 large amounts of chlorine were released by German military forces at Ypres, Belgium. Until around the 1970s of the 20th century, the awareness of the threat by chemical and biological agents had been mainly confined to the military sector. In the following time, the development of increasing range delivery systems by chemical and biological agents possessors sensitised public attention to the threat emanating from these agents. Their proliferation to the terrorists field during the 1990s with the expanding scale and globalisation of terrorist attacks suggested that these agents are becoming an increasing threat to the whole world community. The following article gives a condensed overview on the history of use and development of the more prominent chemical and biological warfare agents.

  1. [Decontamination of chemical and biological warfare agents].

    Science.gov (United States)

    Seto, Yasuo

    2009-01-01

    Chemical and biological warfare agents (CBWA's) are diverse in nature; volatile acute low-molecular-weight toxic compounds, chemical warfare agents (CWA's, gaseous choking and blood agents, volatile nerve gases and blister agents, nonvolatile vomit agents and lacrymators), biological toxins (nonvolatile low-molecular-weight toxins, proteinous toxins) and microbes (bacteria, viruses, rickettsiae). In the consequence management against chemical and biological terrorism, speedy decontamination of victims, facilities and equipment is required for the minimization of the damage. In the present situation, washing victims and contaminated materials with large volumes of water is the basic way, and additionally hypochlorite salt solution is used for decomposition of CWA's. However, it still remains unsolved how to dispose large volumes of waste water, and the decontamination reagents have serious limitation of high toxicity, despoiling nature against the environments, long finishing time and non-durability in effective decontamination. Namely, the existing decontamination system is not effective, nonspecifically affecting the surrounding non-target materials. Therefore, it is the urgent matter to build up the usable decontamination system surpassing the present technologies. The symposiast presents the on-going joint project of research and development of the novel decontamination system against CBWA's, in the purpose of realizing nontoxic, fast, specific, effective and economical terrorism on-site decontamination. The projects consists of (1) establishment of the decontamination evaluation methods and verification of the existing technologies and adaptation of bacterial organophosphorus hydrolase, (2) development of adsorptive elimination technologies using molecular recognition tools, and (4) development of deactivation technologies using photocatalysis.

  2. Massachusetts State Police Special Tactical Operations Team User Focus Group Report - Law Enforcement Advanced Protection (LEAP) Duty Uniforms, Integrated Head Protection, Chemical/Biological Protection and Human Systems Integration

    National Research Council Canada - National Science Library

    Creighton, II, Thomas E; Hibbard, Bradley; Doherty, Stephen; McManus, Kelly

    2008-01-01

    ...) from representatives within the law enforcement community. This focus group consisted exclusively of personnel assigned to the Massachusetts State Police Special Tactical Operations (STOP) Team...

  3. Realigning Coast Guard Enhanced Maritime Capabilities: A Lesson Learned from the U.S. Special Operations Command

    National Research Council Canada - National Science Library

    Poulin, Steven D

    2005-01-01

    .... The Coast Guard faces major challenges in executing its responsibilities and must leverage the capabilities of its specially trained boarding teams, small boat security forces, and hazardous materials response teams...

  4. The West-African Special Operations Forces: Development and Integration in the Context of the Sub-Saharan Growing Threats

    Science.gov (United States)

    2016-06-10

    Consequently, criminal groups and armed militant gangs have engaged in kidnappings, extortion, car bombings, murder, and other forms of violent attacks...under severe financial constraints, limiting their access to late-model, “high- tech ” weapons and to substantial quantities of materiel. The example...tool, the Special Forces “the fact Special Forces proved today”: the 2014- 2019 military planning law takes it into account, by integrating it into

  5. Lost Unconventional Warfare Lessons from the Yugoslav Front

    Science.gov (United States)

    2012-12-06

    James D. Kiras, Special Operations and Strategy: From World War II to the War on Terror (NY: Routledge, Taylor and Francis Group, 2006), 93. 74 Walter...77 James D. Kiras, Special Operations and Strategy: From World War II to the War on Terror (NY: Routledge, Taylor and Francis Group, 2006), 94...79 Nigel West, Secret War: The Story of SOE, Britain’s Wartime Sabotage Organization (UK: Hodder & Stoughton Ltd., 1992), 189. 80

  6. Information Warfare: Defining the Legal Response to An Attack

    National Research Council Canada - National Science Library

    Pottorff, James

    1999-01-01

    This paper discusses the difficulty in determining whether an information warfare attack, such as a computer virus, can be treated as an "armed attack" for purposes of national defense under the United Nations charter. As the U.S...

  7. FFT Based VLSI Digital One Bit Electronic Warfare Receiver

    National Research Council Canada - National Science Library

    Chien-In, Henry

    1998-01-01

    ... (1 GHz) digital receiver designed for electronic warfare applications. The receiver can process two simultaneous signals and has the potential for fabrication on a single multi-chip module (MCM...

  8. Back to the Basics: An Aviation Solution to Counterinsurgent Warfare

    National Research Council Canada - National Science Library

    Davis, Arthur D

    2005-01-01

    .... By examining past examples of the use of air power in counterinsurgent warfare, this study sheds light on the United States' current failings in both equipment and doctrine as it wages this type of war...

  9. Precision Warfare Enables Interdependent Fires and Maneuver in 2010

    National Research Council Canada - National Science Library

    Smith, John

    1997-01-01

    The U.S. Army is in the midst of a revolution in military affairs (RMA). Significant advancements in informational technologies and precision weapons are providing unprecedented potential for future warfare...

  10. Irregular Warfare: New Challenges for Civil-Military Relations

    National Research Council Canada - National Science Library

    Cronin, Patrick M

    2008-01-01

    .... Irregular warfare introduces new complications to what Eliot Cohen has called an unequal dialogue between civilian and military leaders in which civilian leaders hold the true power but must modulate...

  11. Echoes of Chechnya Warfare Resound in Moscow, Quantico

    National Research Council Canada - National Science Library

    Ackerman, Robert

    2000-01-01

    .... thinking about urban warfare. After suffering stunning public defeats just a few years ago, Russian forces applied painful lessons learned then to drive Chechen forces out of their capital city, Grozny, this year...

  12. zero day exploits and national readiness for cyber-warfare

    African Journals Online (AJOL)

    HOD

    A zero day vulnerability is an unknown exploit that divulges security flaws in software before such a flaw is publicly ... Keywords: exploits, zero day, vulnerability, cyberspace, cyber-warfare. 1. ..... industries and companies across the globe. The.

  13. Towards a framework for a network warfare capability

    CSIR Research Space (South Africa)

    Veerasamy, N

    2008-07-01

    Full Text Available . These include the legal issues, ethical dilemmas, technical solutions, financial impact and skill/manpower investment. Logical constraints/implications have been grouped together in the discussion that follows. 5.1.1 Legal Ethical Issues As network warfare... but the underlying causes of crime also needs to be understood. Ethics and morals play a significant role in determining the personality traits of an individual. Users will need to balance ethical dilemmas before engaging in offensive network warfare. Computers...

  14. Strategy in the Robotic Age: A Case for Autonomous Warfare

    Science.gov (United States)

    2014-09-01

    enabling technology that augments human performance, such as exoskeleton suits, and other complementary fields that make robotics function...philosophy of maneuver warfare with new technologies from the Robotic Age, such as unmanned systems and exoskeleton suits, to present a new warfighting...and Brimley, “20YY,” 12. 49 the exoskeleton suit, but rather that the full benefit of autonomous warfare will be achieved by leveraging mass and

  15. The Impacts of Modern Warfare on Freshwater Ecosystems

    Science.gov (United States)

    Francis, Robert A.

    2011-11-01

    There is increasing recognition and concern regarding the impacts of modern industrial warfare on the environment. Freshwater ecosystems are perhaps the most vulnerable to warfare-related impacts, which is of concern given that they provide so many essential environmental resources and services to society. Despite this, there has been little work to establish and quantify the types of impacts (both negative and positive) that warfare may have on such systems. This paper firstly highlights why rivers and lakes may be susceptible to warfare-related impacts, before synthesizing the available literature to explore the following main themes: intensification of wartime resource acquisition, use of water as an offensive or defensive weapon, direct and indirect effects of explosive ordnance, increased pollution, introduction of invasive alien species, and positive ecological impacts. This is then followed by a discussion of the implications of such impacts in relation to future warfare, including a consideration of the efficacy of existing legal instruments to protect the environment during conflict, and the trend for war to become more localized and `informal', and therefore less regulated. Finally, the paper identifies key research foci for understanding and mitigating the effects of warfare on freshwater ecosystems.

  16. Information Warfare, Threats and Information Security

    Directory of Open Access Journals (Sweden)

    Dmitriy Nikolaevich Bespalov

    2014-01-01

    Full Text Available The article presents the opposite, but dependent on each other's reality - Revolutionary War information,information security goals and objectives of their study within the scheme "challenge-response", methodological and analytical support, the role of elites and the information society in promoting information security. One of the features of contemporaneityis the global spread of ICT, combined with poor governance and other difficulties in the construction of innovation infrastructures that are based on them in some countries. This leads to the reproduction of threats, primarily related to the ability to use ICT for purposes that are inconsistent with the objectives of maintaining international peace and security, compliance with the principles of non-use of force, non-interference in the internal affairs of states, etc. In this regard, include such terms as "a threat of information warfare", "information terrorism" and so forth. Information warfare, which stay in the policy declared the struggle for existence, and relationships are defined in terms of "friend-enemy", "ours-foreign". Superiority over the opponent or "capture of its territory" is the aim of political activity. And information security, serving activities similar process of political control, including a set of components, is a technology until their humanitarian. From the context and the decision itself is the ratio of the achieved results of information and political influence to the target - a positive image of Russia. Bringing its policy in line with the demands of a healthy public opinion provides conductivity of theauthorities initiatives in the country and increases the legitimacy of the Russian Federation actions in the world.

  17. H.S.H. Prince Radu of Hohenzollern-Veringen, Special Representative of the Romanian Government for Integration, Co-operation and Sustainable Development

    CERN Multimedia

    Maximilien Brice

    2002-01-01

    H.S.H. Prince Radu of Hohenzollern-Veringen, Special Representative of the Romanian Government for Integration, Co-operation and Sustainable Development (third from left) with (left to right) Florian Ciolacu (Romanian Mission in Geneva), Cornel Comsa (personal adviser to the Prince), Sorin Ilie (CERN), Calin Alexa (ATLAS), Iosif Legrand (Caltech/CMS), Mihaela Gheata (ALICE), Andrei Gheata (ALICE), and Sorin Zgura (ALICE).

  18. U.S. Joint Special Operations Forces: Two Few, Overworked, Young, Homogenous & Macho to Fulfill the Unconventional Demands of the Long War?

    Science.gov (United States)

    2008-05-28

    OVERWORKED , YOUNG, HOMOGENOUS, & MACHO TO FULFILL THE UNCONVENTIONAL DEMANDS OF THE LONG WAR? SUBMITTED IN PARTIAL FULFILLMENT OF THE REQUIREMENTS FOR...U.S. Joint Special Operations Forces: Two Few, Overworked , Young, Homogenous & Macho to Fulfill the Unconventional Demands of the Long War? 5a...to be the targets of nearly daily mortar, improvised explosive devices (IEDs), and occasional suicide vehicle-borne IED (SVBIED) attacks. It

  19. The Effect of Special Operations Training on Testosterone, Lean Body Mass, and Strength and the Potential for Therapeutic Testosterone Replacement: A Review of the Literature

    Science.gov (United States)

    2016-07-01

    low bone mass, and physical frailty. J Am Geriatr Soc. 2010; 58(6):1134-1143. 22. Hildreth KL, Barry DW, Moreau KL, Vande Griend J, Meacham RB, et...88PA, Case # 2016-0120, 15 Jan 2016. 14. ABSTRACT Special Operations Forces (SOF) are routinely exposed to physically demanding missions that...deprivation, and decreased testosterone. A secondary purpose is to summarize the effects of exogenous testosterone therapy in healthy males as well as to

  20. Operational Planning for Theater Anti-Submarine Warfare

    Science.gov (United States)

    2017-03-01

    or P-8 as a supplementary platform to a ship or sub and never assigned to search alone . This thesis allows the MPRA to search alone and has 10 a...Marina, I will truly miss sitting in class with you guys wondering what a basis is. Finally, to my dog, Dougie: thank you for not eating my homework...can have trouble searching and tracking one submarine, let alone multiple submarines in different regions or mission areas. B. LITERATURE REVIEW

  1. Zarqawi’s Sfumato: Operational Art in Irregular Warfare

    Science.gov (United States)

    2013-05-23

    in Baghdad and Karbala during the Shia festival of Ashura in March of 2004.80 These attacks were preceded by the bombing of the Jordanian embassy...American contractors Nick Berg and Eugene Armstrong. Zarqawi released edited videos with music and logos detailing multiple suicide bombings against

  2. General Urban Warfare Amphibious Logistics Applications. Volume 4. Operational Plans.

    Science.gov (United States)

    1983-06-23

    coastal community , S ""B-7-A-7 UNCLASSIFIED 2- K Q - - ---. - UNCLASSIFIED north of SYN City, at EIO5-N113.5 on the 200 km supplemental map and tracks...becomes a minor, unimproved road extending from SYN City to the coastal community . Convoy movement will be canalized by the ocean to the east and...HLZ, providing access to the coastal community . j. Adjacent Terrain. The HLZ is opposed to the north by a small community backed by lowland coastal

  3. General Urban Warfare Amphibious Logistics Applications. Volume 2. Operations Plan.

    Science.gov (United States)

    1983-06-23

    accordance with Joint Uniform Military Pay System procedures. (3) Control of Financial Institutions. See Force 0 7200.1. (4) Inspection and Audit . Conducted...1CA -- z; a ex r-- - C.’ on~ oCa a 10. 6 Z OZOOOOO 0 0.CCi- ~~flflfl1 Ce aA~ aC0i0SCCS- do.C. m ca f Cit U - CaS.Li CCL*n 0LLaJ ACCA CU ZC CS. . C CA

  4. Information Operations and Asymmetric Warfare...Are We Ready?

    National Research Council Canada - National Science Library

    Patterson, LaWarren

    2002-01-01

    .... These in turn raise passions and compel people to rethink their own closely held beliefs, prejudices and hatreds, and in some cases morphing into actions such as espionage, sabotage or terrorism...

  5. Simulation-based planning for theater air warfare

    Science.gov (United States)

    Popken, Douglas A.; Cox, Louis A., Jr.

    2004-08-01

    Planning for Theatre Air Warfare can be represented as a hierarchy of decisions. At the top level, surviving airframes must be assigned to roles (e.g., Air Defense, Counter Air, Close Air Support, and AAF Suppression) in each time period in response to changing enemy air defense capabilities, remaining targets, and roles of opposing aircraft. At the middle level, aircraft are allocated to specific targets to support their assigned roles. At the lowest level, routing and engagement decisions are made for individual missions. The decisions at each level form a set of time-sequenced Courses of Action taken by opposing forces. This paper introduces a set of simulation-based optimization heuristics operating within this planning hierarchy to optimize allocations of aircraft. The algorithms estimate distributions for stochastic outcomes of the pairs of Red/Blue decisions. Rather than using traditional stochastic dynamic programming to determine optimal strategies, we use an innovative combination of heuristics, simulation-optimization, and mathematical programming. Blue decisions are guided by a stochastic hill-climbing search algorithm while Red decisions are found by optimizing over a continuous representation of the decision space. Stochastic outcomes are then provided by fast, Lanchester-type attrition simulations. This paper summarizes preliminary results from top and middle level models.

  6. Drone Warfare: Twenty-First Century Empire and Communications

    Directory of Open Access Journals (Sweden)

    Kevin Howley

    2017-02-01

    Full Text Available This paper, part of a larger project that examines drones from a social-construction of technology perspective, considers drone warfare in light of Harold Innis’s seminal work on empire and communication. Leveraging leading-edge aeronautics with advanced optics, data processing, and networked communication, drones represent an archetypal “space-biased” technology. Indeed, by allowing remote operators and others to monitor, select, and strike targets from half a world away, and in real-time, these weapon systems epitomize the “pernicious neglect of time” Innis sought to identify and remedy in his later writing. With Innis’s time-space dialectic as a starting point, then, the paper considers drones in light of a longstanding paradox of American culture: the impulse to collapse the geographical distance between the United States and other parts of the globe, while simultaneously magnifying the cultural difference between Americans and other peoples and societies. In the midst of the worldwide proliferation of drones, this quintessentially sublime technology embodies this (disconnect in important, profound, and ominous ways.

  7. Effects of deployment on diet quality and nutritional status markers of elite U.S. Army special operations forces soldiers.

    Science.gov (United States)

    Farina, Emily K; Taylor, Jonathan C; Means, Gary E; Murphy, Nancy E; Pasiakos, Stefan M; Lieberman, Harris R; McClung, James P

    2017-07-03

    Special Operations Forces (SOF) Soldiers deploy frequently and require high levels of physical and cognitive performance. Nutritional status is linked to cognitive and physical performance. Studies evaluating dietary intake and nutritional status in deployed environments are lacking. Therefore, this study assessed the effects of combat deployment on diet quality and serum concentrations of nutritional status markers, including iron, vitamin D, parathyroid hormone (PTH), glucose, and lipids, among elite United States (U.S.) Army SOF Soldiers. Changes from baseline to post-deployment were determined with a repeated measure within-subjects design for Healthy Eating Index-2010 (HEI-2010) scores, intake of foods, food groups, key nutrients, and serum nutritional status markers. Dietary intake was assessed with a Block Food Frequency Questionnaire. The association between post-deployment serum 25-hydroxy vitamin D (25-OH vitamin D) and PTH was determined. Analyses of serum markers were completed on 50 participants and analyses of dietary intake were completed on 33 participants. In response to deployment, HEI-2010 scores decreased for total HEI-2010 (70.3 ± 9.1 vs. 62.9 ± 11.1), total fruit (4.4 ± 1.1 vs. 3.7 ± 1.5), whole fruit (4.6 ± 1.0 vs. 4.2 ± 1.4), dairy (6.2 ± 2.7 vs. 4.8 ± 2.4), and empty calories (14.3 ± 3.2 vs. 11.1 ± 4.5) (P ≤ 0.05). Average daily intakes of foods and food groups that decreased included total dairy (P < 0.01), milk (P < 0.01), and non-juice fruit (P = 0.03). Dietary intake of calcium (P = 0.05) and vitamin D (P = 0.03) decreased. PTH increased from baseline (3.4 ± 1.6 vs. 3.8 ± 1.4 pmol/L, P = 0.04), while there was no change in 25-OH vitamin D. Ferritin decreased (385 ± 173 vs. 354 ± 161 pmol/L, P = 0.03) and soluble transferrin receptor increased (16.3 ± 3.7 vs. 17.1 ± 3.5 nmol/L, P = 0.01). There were no changes in glucose or lipids. Post-deployment, serum 25-OH vitamin

  8. 14 CFR 91.327 - Aircraft having a special airworthiness certificate in the light-sport category: Operating...

    Science.gov (United States)

    2010-01-01

    ... 14 Aeronautics and Space 2 2010-01-01 2010-01-01 false Aircraft having a special airworthiness... without adhering to the applicable consensus standard; (5) Each alteration accomplished after the aircraft's date of manufacture meets the applicable and current consensus standard and has been authorized by...

  9. Modeling Methodologies for Representing Urban Cultural Geographies in Stability Operations

    National Research Council Canada - National Science Library

    Ferris, Todd P

    2008-01-01

    ... 2.0.0, in an effort to provide modeling methodologies for a single simulation tool capable of exploring the complex world of urban cultural geographies undergoing Stability Operations in an irregular warfare (IW) environment...

  10. Combat Training Centers: Training for Full-Spectrum Operations?

    National Research Council Canada - National Science Library

    Diano, Oscar F

    2007-01-01

    The changing strategic environment has necessitated a shift in Army training from traditional maneuver warfare to full-spectrum operations to defeat irregular, catastrophic, and disruptive challenges more effectively...

  11. Contributions of Women to U.S. Combat Operations

    National Research Council Canada - National Science Library

    Burnes, Thresa

    2008-01-01

    .... combat operations from the Revolutionary War to present-day conflicts. The U.S. military continues to fight a transnational, dispersed enemy that employs irregular tactics and asymmetric warfare...

  12. Adaptive Army: Embracing the Concept of Operational Manoeuvre from the Sea

    Science.gov (United States)

    2010-05-05

    PEACE Source: Headquarters Training Command- Army. Land Warfare Doctrine LWD 3-01: Formation Tactics. Australian Army, November 27, 2003. 27...Amphibious Capability Implementation Team, June 15, 2009. Headquarters Training Comrriand- Army. Land Warfare Doctrine LWD 3-0: Operations. Australian Army

  13. Nuclear, biological and chemical warfare. Part I: Medical aspects of nuclear warfare.

    Science.gov (United States)

    Kasthuri, A S; Pradhan, A B; Dham, S K; Bhalla, I P; Paul, J S

    1990-04-01

    Casualties in earlier wars were due much more to diseases than to weapons. Mention has been made in history of the use of biological agents in warfare, to deny the enemy food and water and to cause disease. In the first world war chemical agents were used to cause mass casualties. Nuclear weapons were introduced in the second world war. Several countries are now involved in developing nuclear, biological and chemical weapon systems, for the mass annihilation of human beings, animals and plants, and to destroy the economy of their enemies. Recently, natural calamities and accidents in nuclear, chemical and biological laboratories and industries have caused mass instantaneous deaths in civilian population. The effects of future wars will not be restricted to uniformed persons. It is time that physicians become aware of the destructive potential of these weapons. Awareness, immediate protective measures and first aid will save a large number of persons. This series of articles will outline the medical aspects of nuclear, biological and chemical weapon systems in three parts. Part I will deal with the biological effects of a nuclear explosion. The short and long term effects due to blast, heat and associated radiation are highlighted. In Part II, the role of biological agents which cause commoner or new disease patterns is mentioned. Some of the accidents from biological warfare laboratories are a testimony to its potential deleterious effects. Part III deals with medical aspects of chemical warfare agents, which in view of their mass effects can overwhelm the existing medical resources, both civilian and military.(ABSTRACT TRUNCATED AT 250 WORDS)

  14. Using Agent Based Distillation to Explore Issues Related to Asymmetric Warfare

    Science.gov (United States)

    2009-10-01

    official definition of asymmetric warfare , considering that its use was redundant to irregular warfare [30]. 2 Such as the Lanchester Equations...RTP-MP-MSG-069 23 - 1 Using Agent Based Distillation to Explore Issues Related to Asymmetric Warfare Martin Adelantado, Jean-Michel Mathé...shows that both conventional and asymmetric warfare are characterised by nonlinear behaviours and that engagement is a Complex Adaptive System (CAS

  15. Validity, Reliability, and Performance Determinants of a New Job-Specific Anaerobic Work Capacity Test for the Norwegian Navy Special Operations Command.

    Science.gov (United States)

    Angeltveit, Andreas; Paulsen, Gøran; Solberg, Paul A; Raastad, Truls

    2016-02-01

    Operators in Special Operation Forces (SOF) have a particularly demanding profession where physical and psychological capacities can be challenged to the extremes. The diversity of physical capacities needed depend on the mission. Consequently, tests used to monitor SOF operators' physical fitness should cover a broad range of physical capacities. Whereas tests for strength and aerobic endurance are established, there is no test for specific anaerobic work capacity described in the literature. The purpose of this study was therefore to evaluate the reliability, validity, and to identify performance determinants of a new test developed for testing specific anaerobic work capacity in SOF operators. Nineteen active young students were included in the concurrent validity part of the study. The students performed the evacuation (EVAC) test 3 times and the results were compared for reliability and with performance in the Wingate cycle test, 300-m sprint, and a maximal accumulated oxygen deficit (MAOD) test. In part II of the study, 21 Norwegian Navy Special Operations Command operators conducted the EVAC test, anthropometric measurements, a dual x-ray absorptiometry scan, leg press, isokinetic knee extensions, maximal oxygen uptake test, and countermovement jump (CMJ) test. The EVAC test showed good reliability after 1 familiarization trial (intraclass correlation = 0.89; coefficient of variance = 3.7%). The EVAC test correlated well with the Wingate test (r = -0.68), 300-m sprint time (r = 0.51), and 300-m mean power (W) (r = -0.67). No significant correlation was found with the MAOD test. In part II of the study, height, body mass, lean body mass, isokinetic knee extension torque, maximal oxygen uptake, and maximal power in a CMJ was significantly correlated with performance in the EVAC test. The EVAC test is a reliable and valid test for anaerobic work capacity for SOF operators, and muscle mass, leg strength, and leg power seem to be the most important determinants

  16. Distribution of MRI signal alterations of the cartilage endplate in pre-operated patients with special focus on recurrent lumbar disc herniation

    International Nuclear Information System (INIS)

    Becker, G.T.; Liphofer, J.; Koester, O.; Willburger, R.E.; Schmid, G.

    2006-01-01

    Purpose: To study the location of (Modic) MR signal alterations (SA) of the cartilage endplate (CEP) in pre- and non-operated segments L3-S1 with special focus on the presence of recurrent lumbar disc herniation (RLDH). Materials and Methods: In a retrospective study the MR images of vertebrae L3-S1 of 65 consecutive patients with a history of microdiscectomy were evaluated. Of the 190 segments studied, 67 were pre-operated. These were divided into a group with recurrent lumbar disc herniation (RLDH) (n=19) and a group without evidence of RLDH (n=48). Non-operated segments (n=123) were also considered as a separate group. In these three groups the prevalence of different Modic types was determined using the sag. T1- and T2-weighted images, and, in particular, the distribution of SA at the upper and lower CEP was examined by evaluating the sag. T2-weighted images. In order to achieve this, each CEP was divided into nine regions. Results: Pre-operated segments showed significantly more frequent (p<0.001) and more expansive (p<0.001) SA than non-operated segments. Non-operated segments showed SA less frequently in the central region of both upper and lower CEP (p=0.056 and p=0.015, respectively). In operated segments without RLDH, the upper CEP had significantly more SA on the operation side than in the mid-sagittal and contra-lateral regions (p=0.016, p=0.037) and significantly more on the operation side of the lower CEP than in the contra-lateral region (p=0.027). Operated segments with RLDH did not show an emphasis of SA on the operation side. In this group SA occurred significantly more often in the central and ventral mid-sagittal regions of the upper CEP than in the preoperated segments without RLDH. (orig.)

  17. Transport and Reactivity of Decontaminants to Provide Hazard Mitigation of Chemical Warfare Agents from Materials

    Science.gov (United States)

    2016-06-01

    2013 4. TITLE AND SUBTITLE Transport and Reactivity of Decontaminants to Provide Hazard Mitigation of Chemical Warfare Agents from Materials 5a...directions for future decontamination formulation approaches. 15. SUBJECT TERMS GD HD Decontamination Hazard mitigation VX Chemical warfare agent... DECONTAMINANTS TO PROVIDE HAZARD MITIGATION OF CHEMICAL WARFARE AGENTS FROM MATERIALS 1. INTRODUCTION Decontamination of materials is the

  18. Russian New Art of Hybrid Warfare in Ukraine

    Directory of Open Access Journals (Sweden)

    Rusnáková Soňa

    2017-10-01

    Full Text Available The main aim of this paper is to analyse the annexation of Crimea by the Russian Federation. For the purposes of the paper, the theory of hybrid warfare was chosen as an analytical category. Throughout the paper, the concept of hybrid warfare is examined and applied on case study of Crimean annexation. Hybrid warfare, especially in connection with Russian actions in Crimea has been an intensely debated concept. There is an ongoing debate among scholars concerning the meaning of the concept, its existence and employment by the Russian Federation. This paper showed that the article of Valeriy Gerasimov – the incumbent Chief of the General Staff of the Russian Federation-invoked a new warfare strategy for the Russian Federation which was consequently for the very first time in its full spectre and effectivity employed on case of Crimean annexation in March 2014. Observing the application of the hybrid warfare in practice serves the purposes of countering its further potential application in post-Soviet space and Russian ‘near abroad’.

  19. Nondestructive inspection of chemical warfare based on API-TOF

    International Nuclear Information System (INIS)

    Wang Xinhua; Zheng Pu; He Tie; An Li; Yang Jie; Fan Yu

    2013-01-01

    Background: Real-time, fast, accurate, nondestructive inspection (NDI) and quantitative analysis for chemical warfare are very imperative for chemical defense, anti-terror and nation security. Purpose: Associated Particles Technique (APT)/Neutron Time of Flight (TOF) has been developed for non-invasive inspection of sealed containers with chemical warfare agents. Methods: A prototype equipment for chemical warfare is consisted of an APT neutron generator with a 3×3 matrix of semiconductor detectors of associated alpha-particles, the shielding protection of neutron and gamma-ray, arrayed NaI(Tl)-based detectors of gamma-rays, fully-digital data acquisition electronics, data analysis, decision-making software, support platform and remote control system. Inelastic scattering gamma-ray pulse height spectra of sarin, VX, mustard gas and adamsite induced by 14-MeV neutron are measured. The energies of these gamma rays are used to identify the inelastic scattering elements, and the intensities of the peaks at these energies are used to reveal their concentrations. Results: The characteristic peaks of inelastic scattering gamma-ray pulse height spectra show that the prototype equipment can fast and accurately inspect chemical warfare. Conclusion: The equipment can be used to detect not only chemical warfare agents but also other hazardous materials, such as chemical/toxic/drug materials, if their chemical composition is in any way different from that of the surrounding materials. (authors)

  20. Can North Korean Airborne Special Purpose Forces Successfully Conduct Military Operations Against the United States and South Korea?

    National Research Council Canada - National Science Library

    Allmond, Samuel

    2003-01-01

    ...; and secondly by producing the world's largest SPF. North Korea (NK) has built the world's largest SPF in the world with more than 100,000 men to support surprise attacks to disrupt CFC combat buildup and operations...

  1. A Comparison of Neutron-Based Non-Destructive Assessment Methods for Chemical Warfare Material and High Explosives

    International Nuclear Information System (INIS)

    Seabury, E. H.; Chichester, D. L.; Wharton, C. J.; Caffrey, A. J.

    2009-01-01

    Prompt Gamma Neutron Activation Analysis (PGNAA) systems employ neutrons as a probe to interrogate items, e.g. chemical warfare materiel-filled munitions. The choice of a neutron source in field-portable systems is determined by its ability to excite nuclei of interest, operational concerns such as radiological safety and ease-of-use, and cost. Idaho National Laboratory's PINS Chemical Assay System has traditionally used a 252 Cf isotopic neutron source, but recently a deuterium-tritium (DT) electronic neutron generator (ENG) has been tested as an alternate neutron source. This paper presents the results of using both of these neutron sources to interrogate chemical warfare materiel (CWM) and high explosive (HE) filled munitions.

  2. [Decontamination of chemical warfare agents by photocatalysis].

    Science.gov (United States)

    Hirakawa, Tsutomu; Mera, Nobuaki; Sano, Taizo; Negishi, Nobuaki; Takeuchi, Koji

    2009-01-01

    Photocatalysis has been widely applied to solar-energy conversion and environmental purification. Photocatalyst, typically titanium dioxide (TiO(2)), produces active oxygen species under irradiation of ultraviolet light, and can decompose not only conventional pollutants but also different types of hazardous substances at mild conditions. We have recently started the study of photocatalytic decontamination of chemical warfare agents (CWAs) under collaboration with the National Research Institute of Police Science. This article reviews environmental applications of semiconductor photocatalysis, decontamination methods for CWAs, and previous photocatalytic studies applied to CWA degradation, together with some of our results obtained with CWAs and their simulant compounds. The data indicate that photocatalysis, which may not always give a striking power, certainly helps detoxification of such hazardous compounds. Unfortunately, there are not enough data obtained with real CWAs due to the difficulty in handling. We will add more scientific data using CWAs in the near future to develop useful decontamination systems that can reduce the damage caused by possible terrorism.

  3. How Do I Know? A Guide to the Selection of Personal Protective Equipment for Use in Responding to A Release of Chemical Warfare Agents

    Energy Technology Data Exchange (ETDEWEB)

    Foust, C.B.

    1999-05-01

    An incident involving chemical warfare agents requires a unique hazardous materials (HAZMAT) response. As with an HAZMAT event, federal regulations prescribe that responders must be protected from exposure to the chemical agents. But unlike other HAZMAT events, special considerations govern selection of personal protective equipment (PPE). PPE includes all clothing, respirators and monitoring devices used to respond to a chemical release. PPE can differ depending on whether responders are military or civilian personnel.

  4. Biomaterials for mediation of chemical and biological warfare agents.

    Science.gov (United States)

    Russell, Alan J; Berberich, Jason A; Drevon, Geraldine F; Koepsel, Richard R

    2003-01-01

    Recent events have emphasized the threat from chemical and biological warfare agents. Within the efforts to counter this threat, the biocatalytic destruction and sensing of chemical and biological weapons has become an important area of focus. The specificity and high catalytic rates of biological catalysts make them appropriate for decommissioning nerve agent stockpiles, counteracting nerve agent attacks, and remediation of organophosphate spills. A number of materials have been prepared containing enzymes for the destruction of and protection against organophosphate nerve agents and biological warfare agents. This review discusses the major chemical and biological warfare agents, decontamination methods, and biomaterials that have potential for the preparation of decontamination wipes, gas filters, column packings, protective wear, and self-decontaminating paints and coatings.

  5. Influence of special attributes of zeotropic refrigerant mixtures on design and operation of vapour compression refrigeration and heat pump systems

    International Nuclear Information System (INIS)

    Rajapaksha, Leelananda

    2007-01-01

    The use of zeotropic refrigerant mixtures introduces a number of novel issues that affect the established design and operational practices of vapour compression systems used in refrigeration, air conditioning and heat pump applications. Two attributes; composition shift and temperature glide, associated with the phase changing process of zeotropic mixtures are the primary phenomena that bring in these issues. However, relevant researches are uncovering ways how careful system designs and selection of operational parameters allow improving the energy efficiency and the capacity of vapour compression refrigeration systems. Most of these concepts exploit the presence of composition shift and temperature glide. This paper qualitatively discusses how the mixture attributes influence the established heat exchanger design practices, performance and operation of conventional vapour compression systems. How the temperature glide and composition shift can be incorporated to improve the system performance and the efficiency are also discussed

  6. H.S.H. Prince Radu of Hohenzollern-Veringen, Special Representative of the Romanian Government for Integration, Co-operation and Sustainable Development

    CERN Multimedia

    Maximilien Brice

    2002-01-01

    H.S.H. Prince Radu of Hohenzollern-Veringen, Special Representative of the Romanian Government for Integration, Co-operation and Sustainable Development, is seen here visiting Microcosm, CERN's on-site exhibition centre. Photo 01: H.S.H. Prince Radu of Hohenzollern-Veringen (right) with his personal adviser Cornel Comsa inside Microcosm's full-scale model of a six-metre section of the LHC. Photos 04-06: H.S.H. Prince Radu of Hohenzollern-Veringen with Emma Sanders from ETT Division.

  7. Environmental considerations associated with siting, constructing, and operating a special isotope separation plant at INEL: Volume 1, Proceedings: Report of public hearings

    International Nuclear Information System (INIS)

    1987-03-01

    This report documents the two public hearings conducted for the purpose of determining the scope of issues to be addressed in relation to the siting, constructing, and operating of a special isotope separation plant at INEL. The report includes transcripts of the public hearings held in Idaho Falls, Idaho, February 24, 1987, and in Boise, Idaho, February 26, 1987, and includes the exhibits of records relating to those hearings. The review and hearing process meets pertinent National Environmental Policy Act (NEPA) requirements, Council on Environmental Quality (CEQ) regulations, and DOE guidelines

  8. Environmental considerations associated with siting, constructing, and operating a special isotope separation plant at INEL: Volume 2, Proceedings: Report of public hearings

    International Nuclear Information System (INIS)

    1987-03-01

    This report documents the two public hearings conducted for the purpose of determining the scope of issues to be addressed in relation to the siting, constructing, and operating of a special isotope separation plant at INEL. The report includes transcripts of the public hearings held in Idaho Falls, Idaho, February 24, 1987, and in Boise, Idaho, February 26, 1987, and includes the exhibits of record relating to those hearings. The review and hearing process meets pertinent National Environmental Policy Act (NEPA) requirements, Council on Environmental Quality (CEQ) regulations, and DOE guidelines

  9. Automatic optimization of constants and special mathematic ensuring algorithms SKALA-micro system of RBMK-1000 reactor self-certification in operation

    International Nuclear Information System (INIS)

    Aleksandrov, S.I.; Dmitrenko, V.V.; Postnikov, V.V.; Sviridenkov, A.N.; Yurkin, G.V.; Yakunin, I.S.

    2007-01-01

    Paper dwells upon problems dealing with accuracy improvement of the energy release distribution and the safety margin of the RBMK-1000 operation. The accuracy is improved through the automatic optimization of some constants used in the SKALA-micro system special mathematic ensuring program and the regular self-validation of the algorithm to determine the energy release distribution calculation error. The validation based on the regular scanning of the reactor core by a calibrating detector and through the sequence disabling of the internal detectors is shown to give the close results [ru

  10. The Atmospheric Radiation Measurement Program May 2003 Intensive Operations Period Examining Aerosol Properties and Radiative Influences: Preface to Special Section

    Science.gov (United States)

    Ferrare, Richard; Feingold, Graham; Ghan, Steven; Ogren, John; Schmid, Beat; Schwartz, Stephen E.; Sheridan, Pat

    2006-01-01

    Atmospheric aerosols influence climate by scattering and absorbing radiation in clear air (direct effects) and by serving as cloud condensation nuclei, modifying the microphysical properties of clouds, influencing radiation and precipitation development (indirect effects). Much of present uncertainty in forcing of climate change is due to uncertainty in the relations between aerosol microphysical and optical properties and their radiative influences (direct effects) and between microphysical properties and their ability to serve as cloud condensation nuclei at given supersaturations (indirect effects). This paper introduces a special section that reports on a field campaign conducted at the Department of Energy Atmospheric Radiation Measurement site in North Central Oklahoma in May, 2003, examining these relations using in situ airborne measurements and surface-, airborne-, and space-based remote sensing.

  11. Theory of information warfare: basic framework, methodology and conceptual apparatus

    Directory of Open Access Journals (Sweden)

    Олександр Васильович Курбан

    2015-11-01

    Full Text Available It is conducted a comprehensive theoretical study and determine the basic provisions of the modern theory of information warfare in on-line social networks. Three basic blocks, which systematized the theoretical and methodological basis of the topic, are established. There are information and psychological war, social off-line and on-line network. According to the three blocks, theoretical concepts are defined and methodological substantiation of information processes within the information warfare in the social on-line networks is formed

  12. Hybrid warfare of the USA in South America

    Directory of Open Access Journals (Sweden)

    A. V. Budaev

    2015-01-01

    Full Text Available Washington’s hybrid warfare in Latin American region differs by its inventive and sophisticated methods and in fact represents a complex and multidimensional phenomenon including symbiosis of the “soft” and “hard” power as well as their combination in the form of the “smart power”. The increasing importance of hybrid warfare technologies in the US foreign policy in Latin America predetermines the necessity of thorough studies and analysis of this phenomenon for providing Russian interests.

  13. 47 CFR 25.252 - Special requirements for ancillary terrestrial components operating in the 2000-2020 MHz/2180...

    Science.gov (United States)

    2010-10-01

    ..., including takeoff and landing paths. (5) Exceed an aggregate power flux density of −51.8 dBW/m2 in a 1.23 MHz bandwidth at all airport runways and aircraft stand areas, including takeoff and landing paths and...) Be located less than 820 meters from a U.S. Earth Station facility operating in the 2200-2290 MHz...

  14. 77 FR 25129 - Environmental Impact Statement for Issuance of a Special Use Permit for the Continued Operation...

    Science.gov (United States)

    2012-04-27

    ... Use Permit for the Continued Operation of the Winchester Canyon Gun Club; Los Padres National Forest... environmental impact statement (EIS). SUMMARY: The USDA, Forest Service, Los Padres National Forest, gives...: Send written comments to: Los Padres National Forest, 6755 Hollister Avenue, Suite 150, Goleta, CA...

  15. 14 CFR 63.23 - Special purpose flight engineer and flight navigator certificates: Operation of U.S.-registered...

    Science.gov (United States)

    2010-01-01

    ... purpose flight engineer and flight navigator certificates: Operation of U.S.-registered civil airplanes... flight engineer or flight navigator duties on a civil airplane of U.S. registry, leased to a person not a... certificate holder is performing flight engineer or flight navigator duties on the U.S.-registered civil...

  16. Operational Analysis on Torpedo Defence

    NARCIS (Netherlands)

    Grootendorst, H.J.; Benders, F.P.A.; Fitski, H.J.; Veldhoven, E.R. van

    2007-01-01

    Since 1998, TNO Defence, Security and Safety has performed operational analysis with the Underwater Warfare Testbed, which provides an environment for evaluation and validation of systems, concepts, and tactics. On top of this testbed the Torpedo Defence System TestBed has been built to simulate

  17. Logistically Sustaining Afloat-Staged Special Operations Forces through an LPD-17 Class Single-Ship Seabase

    Science.gov (United States)

    2007-03-01

    simulation are analyzed using regression, statistical and marginal benefit techniques to show how the MOEs are affected by varying levels of the...being supported by the seabase increases. A large marginal benefit is realized in reducing a unit’s frequency and time spent in a balk state by...units. SOF units operate within the range of sea-based helicopter assets; therefore the risk of a ‘ bingo ’ (i.e., near empty) fuel state is nearly

  18. Special effects.

    Science.gov (United States)

    Davis, Carol

    The nursing team on the day case ward at Alder Hey Hospital has introduced changes to the environment to help children with special needs, who often attend the ward repeatedly. Small changes, such as keeping colours on the ward neutral, can help children relax. Nurses contact parents a week before admission to find out about their child's likes and dislikes. Parents are encouraged to bring a child's favourite items with them. Operating sessions are scheduled to meet these children's needs.

  19. Service Through Cyberspace Science: 262nd Network Warfare Squadron

    Science.gov (United States)

    an attack on the States, and units like the Cyber Operations Group provide the necessary support to Home About Disclaimer Privacy Policy Search... Search Featured Technology Space Matters Cyber Activity Cyber security is one of the top priorities of the U.S. armed forces today. It takes a special

  20. Nanostructured Metal Oxides for Stoichiometric Degradation of Chemical Warfare Agents

    Czech Academy of Sciences Publication Activity Database

    Štengl, Václav; Henych, Jiří; Janos, P.; Skoumal, M.

    2016-01-01

    Roč. 236, č. 2016 (2016), s. 239-258 ISSN 0179-5953 R&D Projects: GA ČR(CZ) GAP106/12/1116 Institutional support: RVO:61388980 Keywords : chemical warfare agent * metal nanoparticle * unique surface- chemistry * mesoporous manganese oxide Subject RIV: CA - Inorganic Chemistry Impact factor: 3.930, year: 2016

  1. Management information systems for electronic warfare command and decision support

    CSIR Research Space (South Africa)

    Van Niekerk, B

    2015-04-01

    Full Text Available information to allow them to manage their own spectrum, to identify threats, and to deny adversaries’ use of the spectrum. In this paper, the concepts of integrated electronic warfare and spectrum battle management are introduced, and the relevant information...

  2. Manoeuvre warfare analysis of South Africa's 1914-1915 German ...

    African Journals Online (AJOL)

    The study reported in this article explored the nexus between military theory and history. Military theory attempts to quantify, qualify and illuminate the often unpredictable phenomenon of war. The article consists of two parts: the theory of manoeuvre warfare and the history of the 1914-1915 South African campaign in ...

  3. A identification system for chemical warfare agents with PGNAA method

    International Nuclear Information System (INIS)

    Wang Bairong; Yin Guanghua; Yang Zhongping

    2006-01-01

    The principle and the experimental commanding of Chemical warfare Agents Identification with PGNAA method are discussed in this paper. The choosing of Detector, neutron source and the data processing method are detailed. Finally, a set of experimental instruments composed of Cf-232 and BGO detector is developed based on the theory discussed above. (authors)

  4. Identification system for chemical warfare agents with PGNAA method

    International Nuclear Information System (INIS)

    Wang Bairong; Yin Guanghua; Yang Zhongpin

    2007-01-01

    The principle and the experimental commanding of Chemical warfare Agents Identification with PGNAA method are discussed in this paper. The choosing of detector, neutron source and the data processing method are detailed. Finally, a set of experimental instruments composed of Cf-232 and BGO detector is developed based on this theory discussed above. (authors)

  5. Biomonitoring of exposure to chemical warfare agents: A review

    NARCIS (Netherlands)

    Noort, D.; Benschop, H.P.; Black, R.M.

    2002-01-01

    In this report an overview of the methods currently available for detection of exposure to a number of chemical warfare agents (CWA), i.e., sulfur mustard, lewisite and nerve agents, is presented. Such methods can be applied for various purposes, e.g., diagnosis and dosimetry of exposure of

  6. Researchers study decontamination of chemical, biological warfare agents

    OpenAIRE

    Trulove, Susan

    2007-01-01

    The U.S. Army Research Office has awarded Virginia Tech a $680,000 grant over two years to build an instrument that can be used to study the chemistry of gases that will decompose both chemical and biological warfare agents on surfaces.

  7. Recent canadian experience in chemical warfare agent destruction. An overview

    Energy Technology Data Exchange (ETDEWEB)

    McAndless, J.M.

    1995-09-01

    A Canadian chemical warfare agent destruction project (Swiftsure) was recently completed in which stockpiles of aged mustard, lewisite, nerve agents and contaminated scrap metal were incinerated or chemically neutralized in a safe, environmentally-responsible manner. The project scope, destruction technologies, environmental monitoring and public consultation programs are described.

  8. Simulating cyber warfare and cyber defenses: information value considerations

    Science.gov (United States)

    Stytz, Martin R.; Banks, Sheila B.

    2011-06-01

    Simulating cyber warfare is critical to the preparation of decision-makers for the challenges posed by cyber attacks. Simulation is the only means we have to prepare decision-makers for the inevitable cyber attacks upon the information they will need for decision-making and to develop cyber warfare strategies and tactics. Currently, there is no theory regarding the strategies that should be used to achieve objectives in offensive or defensive cyber warfare, and cyber warfare occurs too rarely to use real-world experience to develop effective strategies. To simulate cyber warfare by affecting the information used for decision-making, we modify the information content of the rings that are compromised during in a decision-making context. The number of rings affected and value of the information that is altered (i.e., the closeness of the ring to the center) is determined by the expertise of the decision-maker and the learning outcome(s) for the simulation exercise. We determine which information rings are compromised using the probability that the simulated cyber defenses that protect each ring can be compromised. These probabilities are based upon prior cyber attack activity in the simulation exercise as well as similar real-world cyber attacks. To determine which information in a compromised "ring" to alter, the simulation environment maintains a record of the cyber attacks that have succeeded in the simulation environment as well as the decision-making context. These two pieces of information are used to compute an estimate of the likelihood that the cyber attack can alter, destroy, or falsify each piece of information in a compromised ring. The unpredictability of information alteration in our approach adds greater realism to the cyber event. This paper suggests a new technique that can be used for cyber warfare simulation, the ring approach for modeling context-dependent information value, and our means for considering information value when assigning cyber

  9. Operational Law Handbook,2007

    National Research Council Canada - National Science Library

    2007-01-01

    ... & SOFAs, legal assistance, combating terrorism, domestic operations, noncombatant evacuation operations, special operations, civil affairs, air, sea, and space law, detainee operations, reserve...

  10. Predictive modelling of chromium removal using multiple linear and nonlinear regression with special emphasis on operating parameters of bioelectrochemical reactor.

    Science.gov (United States)

    More, Anand Govind; Gupta, Sunil Kumar

    2018-03-24

    Bioelectrochemical system (BES) is a novel, self-sustaining metal removal technology functioning on the utilization of chemical energy of organic matter with the help of microorganisms. Experimental trials of two chambered BES reactor were conducted with varying substrate concentration using sodium acetate (500 mg/L to 2000 mg/L COD) and different initial chromium concentration (Cr i ) (10-100 mg/L) at different cathode pH (pH 1-7). In the current study mathematical models based on multiple linear regression (MLR) and non-linear regression (NLR) approach were developed using laboratory experimental data for determining chromium removal efficiency (CRE) in the cathode chamber of BES. Substrate concentration, rate of substrate consumption, Cr i , pH, temperature and hydraulic retention time (HRT) were the operating process parameters of the reactor considered for development of the proposed models. MLR showed a better correlation coefficient (0.972) as compared to NLR (0.952). Validation of the models using t-test analysis revealed unbiasedness of both the models, with t critical value (2.04) greater than t-calculated values for MLR (-0.708) and NLR (-0.86). The root-mean-square error (RMSE) for MLR and NLR were 5.06 % and 7.45 %, respectively. Comparison between both models suggested MLR to be best suited model for predicting the chromium removal behavior using the BES technology to specify a set of operating conditions for BES. Modelling the behavior of CRE will be helpful for scale up of BES technology at industrial level. Copyright © 2018 The Society for Biotechnology, Japan. Published by Elsevier B.V. All rights reserved.

  11. Thought about Strategic Demonstration Simulation Warfare Experiment%关于战略级推演模拟型作战实验的思考

    Institute of Scientific and Technical Information of China (English)

    周绍亮; 李雄; 董斐; 付佳

    2011-01-01

    Abstract:Based on classification of warfare experiments, the concept of strategic demonstration simulation warfare experiment is defined. From the standpoint of establishment of national strategic goals, grasping of international situation and education of joint operation command talents, the function and signification of strategic demonstration simulation warfare experiment are discussed. The basic requirements on military strategic policy, coordinated development of army construction and military operations, warfare lab and warfare experiment technologies are analyzed. The strategic demonstration simulation warfare lab is designed by presenting its functional framework, logic concept framework and running mode. The research results provide theoretical reference to promoting innovation development of warfare experiment.%摘要:在划分作战实验类别的基础上,界定了战略级推演模拟型作战实验的基本概念;从国家战略目标确立、国际局势把握、联合作战指挥人才培养的角度,阐述了战略级推演模拟型作战实验的作用及意义;从以军事战略方针为指导、与军队建设和军事作战协调发展、以作战实验机构为依托、以作战实验技术手段为支撑的角度,分析了战略级推演模拟型作战实验的基本要求;从功能结构、逻辑概念结构、运行模式的角度,进行了战略级推演模拟型作战实验室的初步设计。研究结果可为推动作战实验的创新发展提供理论参考。

  12. Network Centric Operations NCO Case Study. The British Approach to Low-Intensity Operations: Part I

    Science.gov (United States)

    2007-02-12

    Army’s institutional memory of jungle warfare (during WW2 ) had dissipated by 1948. Nonetheless, individuals within the Army who had experienced such...with a specially stabilised TV camera mounting. It also fitted infrared surveillance systems to its Beaver spotter planes, which helped detect

  13. Naval electronic warfare simulation for effectiveness assessment and softkill programmability facility

    Science.gov (United States)

    Lançon, F.

    2011-06-01

    The Anti-ship Missile (ASM) threat to be faced by ships will become more diverse and difficult. Intelligence, rules of engagement constraints, fast reaction-time for effective softkill solution require specific tools to design Electronic Warfare (EW) systems and to integrate it onboard ship. SAGEM Company provides decoy launcher system [1] and its associated Naval Electronic Warfare Simulation tool (NEWS) to permit softkill effectiveness analysis for anti-ship missile defence. NEWS tool generates virtual environment for missile-ship engagement and counter-measure simulator over a wide spectrum: RF, IR, EO. It integrates EW Command & Control (EWC2) process which is implemented in decoy launcher system and performs Monte-Carlo batch processing to evaluate softkill effectiveness in different engagement situations. NEWS is designed to allow immediate EWC2 process integration from simulation to real decoy launcher system. By design, it allows the final operator to be able to program, test and integrate its own EWC2 module and EW library onboard, so intelligence of each user is protected and evolution of threat can be taken into account through EW library update. The objectives of NEWS tool are also to define a methodology for trial definition and trial data reduction. Growth potential would permit to design new concept for EWC2 programmability and real time effectiveness estimation in EW system. This tool can also be used for operator training purpose. This paper presents the architecture design, the softkill programmability facility concept and the flexibility for onboard integration on ship. The concept of this operationally focused simulation, which is to use only one tool for design, development, trial validation and operational use, will be demonstrated.

  14. Indoor air bacterial load and antibiotic susceptibility pattern of isolates in operating rooms and surgical wards at jimma university specialized hospital, southwest ethiopia.

    Science.gov (United States)

    Genet, Chalachew; Kibru, Gebre; Tsegaye, Wondewosen

    2011-03-01

    Surgical site infection is the second most common health care associated infection. One of the risk factors for such infection is bacterial contamination of operating rooms' and surgical wards' indoor air. In view of that, the microbiological quality of air can be considered as a mirror of the hygienic condition of these rooms. Thus, the objective of this study was to determine the bacterial load and antibiotic susceptibility pattern of isolates in operating rooms' and surgical wards' indoor air of Jimma University Specialized Hospital. A cross sectional study was conducted to measure indoor air microbial quality of operating rooms and surgical wards from October to January 2009/2010 on 108 indoor air samples collected in twelve rounds using purposive sampling technique by Settle Plate Method (Passive Air Sampling following 1/1/1 Schedule). Sample processing and antimicrobial susceptibility testing were done following standard bacteriological techniques. The data was analyzed using SPSS version 16 and interpreted according to scientifically determined baseline values initially suggested by Fisher. The mean aerobic colony counts obtained in OR-1(46cfu/hr) and OR-2(28cfu/hr) was far beyond the set 5-8cfu/hr acceptable standards for passive room. Similarly the highest mean aerobic colony counts of 465cfu/hr and 461cfu/hr were observed in Female room-1 and room-2 respectively when compared to the acceptable range of 250-450cfu/hr. In this study only 3 isolates of S. pyogenes and 48 isolates of S. aureus were identified. Over 66% of S. aureus was identified in Critical Zone of Operating rooms. All isolates of S. aureus showed 100% and 82.8% resistance to methicillin and ampicillin respectively. Higher degree of aerobic bacterial load was measured from operating rooms' and surgical wards' indoor air. Reducing foot trafficking, improving the ventilation system and routine cleaning has to be made to maintain the aerobic bacteria load with in optimal level.

  15. International Specialization

    DEFF Research Database (Denmark)

    Kleindienst, Ingo; Geisler Asmussen, Christian; Hutzschenreuter, Thomas

    2012-01-01

    Whether and how international diversification and cross-border arbitrage affects firm performance remains one of the major unresolved research questions in the strategy and international business literatures. We propose that knowing how much a firm has internationally diversified tells us very...... little about performance implications, if we do not know, and do not ask, how the firm has diversified. Therefore, building on the two broad arguments of operating flexibility and location-specific commitment, we develop a theoretical framework that focuses on the extent to which a firm's international...... arbitrage strategy is characterized by specialization versus replication and argue that these different strategies may have differential impact on profitability and risk reduction. Developing a sophisticated measure of international specialization and using a unique panel data set of 92 German MNEs to test...

  16. Vertical-Sensing Effectiveness and CONOPS Tool for Operational Requirements (VECTOR)

    National Research Council Canada - National Science Library

    Green, Gary; Catanzarite, James; Jacobs, Denice

    2005-01-01

    Network-Centric Warfare (NCW) is the emerging concept of operations for the U.S. Armed Forces. It will allow for a decisive warfighting advantage through the increased speed of command and also the high quality shared awareness...

  17. What Is the Role of Survivability Operations in the Current Force?

    National Research Council Canada - National Science Library

    Smallfield, Jason

    2003-01-01

    .... The problem, however, is that most of these changes do not adequately address the role that survivability operations should play across the full spectrum of conflict at the tactical level of warfare...

  18. Commercial Fast Freight Ferry Designs and Their Application to Operational Logistics

    National Research Council Canada - National Science Library

    McIntyre, Ian

    2000-01-01

    .... As we enter the era of Network Centric Warfare (NCW), where Speed of Command is often measured in seconds, theater operational logistics must keep pace with an increased demand for speed in the battlespace...

  19. Defending Our Satellites: The Need for Electronic Warfare Education and Training

    Science.gov (United States)

    2015-12-01

    intercept Allied bombers attacking at night.9 As a result of the electronic warfare advantage that systems like Window and Airborne Cigar be- stowed...74 | Air & Space Power Journal Defending Our Satellites The Need for Electronic Warfare Education and Training Lt Col E. Lincoln Bonner, USAF...expanding education and training in the use of electronic warfare to defend US satellites and improve their survivability. The following discussion

  20. Special energies and special frequencies

    International Nuclear Information System (INIS)

    Endrullis, M.; Englisch, H.

    1987-01-01

    ''Special frequencies'' have been asserted to be zeros of the density of frequencies corresponding to a random chain of coupled oscillators. Our investigation includes both this model and the random one-dimensional Schroedinger operator describing an alloy or its discrete analogue. Using the phase method we exactly determine a bilateral Lifsic asymptotic of the integrated density of states k(E) at special energies G s , which is not only of the classical type exp(-c/vertical strokeE-E s vertical stroke 1/2 ) but also exp(-c'/vertical strokeE-E s vertical stroke) is a typical behaviour. In addition, other asymptotics occur, e.g. vertical strokeE-E c vertical stroke c '', which show that k(E) need not be C ∞ . (orig.)

  1. Mass Spectrometric Determination of Chemical Warfare Agents in Indoor Sample Media Typically Collected During Forensic Investigations

    National Research Council Canada - National Science Library

    D'Agostino, P. A; Hancock, J. R; Chenier, C. L

    2005-01-01

    .... DRDC Suffield, in collaboration with the Royal Canadian Mounted Police, identified a need for analytical methods for chemical warfare agent identification in media, including flooring, wall surfaces...

  2. Technological advancements for the detection of and protection against biological and chemical warfare agents.

    Science.gov (United States)

    Eubanks, Lisa M; Dickerson, Tobin J; Janda, Kim D

    2007-03-01

    There is a growing need for technological advancements to combat agents of chemical and biological warfare, particularly in the context of the deliberate use of a chemical and/or biological warfare agent by a terrorist organization. In this tutorial review, we describe methods that have been developed both for the specific detection of biological and chemical warfare agents in a field setting, as well as potential therapeutic approaches for treating exposure to these toxic species. In particular, nerve agents are described as a typical chemical warfare agent, and the two potent biothreat agents, anthrax and botulinum neurotoxin, are used as illustrative examples of potent weapons for which countermeasures are urgently needed.

  3. Development of Bicarbonate-Activated Peroxide as a Chemical and Biological Warfare Agent Decontaminant

    National Research Council Canada - National Science Library

    Richardson, David E

    2006-01-01

    ...) and other chemistry for the decontamination of chemical and biological warfare agents. The mechanism of formation of the active oxidant, peroxymonocarbonate, has been investigated in detail. New surfoxidants...

  4. Decontamination and Detoxification of Toxic Chemical Warfare Agents Using Polyurethane Sponges

    National Research Council Canada - National Science Library

    Gordon, Richard K; Gunduz, Alper T; Askins, LaTawnya Y; Strating, Simon J; Doctor, Bhupendra P; Clarkson, Edward D; Mitchelree, Larry W; Lukey, Brian; Railer, Roy; Schulz, Susan

    2003-01-01

    .... Another serious problem that may be encountered while caring for personnel contaminated with organophosphorus chemical warfare nerve agents is the possibility that there will be cross-contamination...

  5. Chemiresistor Devices for Chemical Warfare Agent Detection Based on Polymer Wrapped Single-Walled Carbon Nanotubes.

    Science.gov (United States)

    Fennell, John F; Hamaguchi, Hitoshi; Yoon, Bora; Swager, Timothy M

    2017-04-28

    Chemical warfare agents (CWA) continue to present a threat to civilian populations and military personnel in operational areas all over the world. Reliable measurements of CWAs are critical to contamination detection, avoidance, and remediation. The current deployed systems in United States and foreign militaries, as well as those in the private sector offer accurate detection of CWAs, but are still limited by size, portability and fabrication cost. Herein, we report a chemiresistive CWA sensor using single-walled carbon nanotubes (SWCNTs) wrapped with poly(3,4-ethylenedioxythiophene) (PEDOT) derivatives. We demonstrate that a pendant hexafluoroisopropanol group on the polymer that enhances sensitivity to a nerve agent mimic, dimethyl methylphosphonate, in both nitrogen and air environments to concentrations as low as 5 ppm and 11 ppm, respectively. Additionally, these PEDOT/SWCNT derivative sensor systems experience negligible device performance over the course of two weeks under ambient conditions.

  6. Organizing for Irregular Warfare: Implications for the Brigade Combat Team

    Science.gov (United States)

    2007-12-01

    program on October 13, 2006. For further information see, Stew Magnuson, “Eyes Wide Open,” National Defense May 2007, 46. 227 John A. English...David Tucker and Christopher J. Lamb , “Restructuring Special Operations Forces for Emerging Threats,” Strategic Forum no. 219 (January 2006) to... Stew . “Eyes Wide Open.” National Defense, May 2007. Malcom, Ben S. White Tigers, My Secret War in Korea. U.S.: Brassey’s, 2003

  7. Stuxnet and Cyber-Warfare (2/2)

    CERN Multimedia

    CERN. Geneva

    2016-01-01

    The first part of the lecture is devoted to the description of the Stuxnet worm, the first cyber-weapon whose existence has been made public, discovered in 2010 and targeting a specific industrial control system; the worm is responsible for the damaging of many centrifuges at an uranium enrichment facility, with the goal of sabotaging Iran's nuclear program. In the second part, the main features of cyber-warfare in conflict and pre-conflict activities will be discussed and compared to the conventional warfare domains, with also a general view at the international political debate on this topic.   Check the http://pugwash.org web site, an organisation that seeks a world free of nuclear weapons and other weapons of mass destruction. The lecturer invites comments via email to Gian.Piero.Siroli@cern.ch NB! All Academic Training lectures are recorded and are publicly available. There is no live webcast.

  8. Stuxnet and Cyber-Warfare (1/2)

    CERN Multimedia

    CERN. Geneva

    2016-01-01

    The first part of the lecture is devoted to the description of the Stuxnet worm, the first cyber-weapon whose existence has been made public, discovered in 2010 and targeting a specific industrial control system; the worm is responsible for the damaging of many centrifuges at an uranium enrichment facility, with the goal of sabotaging Iran's nuclear program. In the second part, the main features of cyber-warfare in conflict and pre-conflict activities will be discussed and compared to the conventional warfare domains, with also a general view at the international political debate on this topic. Check the http://pugwash.org web site, an organisation that seeks a world free of nuclear weapons and other weapons of mass destruction.   NB! All Academic Training lectures are recorded and are publicly available. There is no live webcast.

  9. Cutaneous reactions in nuclear, biological and chemical warfare

    Directory of Open Access Journals (Sweden)

    Arora Sandeep

    2005-03-01

    Full Text Available Nuclear, biological and chemical warfare have in recent times been responsible for an increasing number of otherwise rare dermatoses. Many nations are now maintaining overt and clandestine stockpiles of such arsenal. With increasing terrorist threats, these agents of mass destruction pose a risk to the civilian population. Nuclear and chemical attacks manifest immediately while biological attacks manifest later. Chemical and biological attacks pose a significant risk to the attending medical personnel. The large scale of anticipated casualties in the event of such an occurrence would need the expertise of all physicians, including dermatologists, both military and civilian. Dermatologists are uniquely qualified in this respect. This article aims at presenting a review of the cutaneous manifestations in nuclear, chemical and biological warfare and their management.

  10. Identification of chemical warfare agent with radiological measurements

    International Nuclear Information System (INIS)

    Liu Boxue; Li Yun; Ai Xianyun

    2000-01-01

    There are three non-destructive radiological methods for identification of warfare agents and TNT. Their principles and problems related were discussed. Portable isotopic neutron spectroscopy is based on the assay of key elemental composition (such as Cl, P, H, As, S, N) in chemical agents by neutron induced prompt gamma ray analysis. Hydrogen concentration measurement by means of using thermal neutron can be employed to identify chemical warfare agents and TNT that contains different hydrogen fraction. The calibration curves of thermal neutron count rate against hydrogen concentration were measured. X ray imagination system can be used to determine the internal structure of chemical bombs, there by to identify them. The radiological methods are very useful for identification of old chemical weapons abandoned by Japan Army during World War 2

  11. Distinct Analgesic Actions of DHA and DHA-Derived Specialized Pro-Resolving Mediators on Post-operative Pain After Bone Fracture in Mice.

    Science.gov (United States)

    Zhang, Linlin; Terrando, Niccolò; Xu, Zhen-Zhong; Bang, Sangsu; Jordt, Sven-Eric; Maixner, William; Serhan, Charles N; Ji, Ru-Rong

    2018-01-01

    Mechanisms of pain resolution are largely unclear. Increasing evidence suggests that specialized pro-resolving mediators (SPMs), derived from fish oil docosahexaenoic acid (DHA), promote the resolution of acute inflammation and potently inhibit inflammatory and neuropathic pain. In this study, we examined the analgesic impact of DHA and DHA-derived SPMs in a mouse model of post-operative pain induced by tibial bone fracture (fPOP). Intravenous perioperative treatment with DHA (500 μg), resolvin D1 (RvD1, 500 ng) and maresin 1 (MaR1, 500 ng), 10 min and 24 h after the surgery, delayed the development of fPOP (mechanical allodynia and cold allodynia). In contrast, post-operative intrathecal (IT) administration of DHA (500 μg) 2 weeks after the surgery had no effects on established mechanical and cold allodynia. However, by direct comparison, IT post-operative treatment (500 ng) with neuroprotectin D1 (NPD1), MaR1, and D-resolvins, RvD1 and RvD5, but not RvD3 and RvD4, effectively reduced mechanical and cold allodynia. ELISA analysis showed that perioperative DHA treatment increased RvD1 levels in serum and spinal cord samples after bone fracture. Interestingly, sham surgery resulted in transient allodynia and increased RvD1 levels, suggesting a correlation of enhanced SPM levels with acute pain resolution after sham surgery. Our findings suggest that (1) perioperative treatment with DHA is effective in preventing and delaying the development of fPOP and (2) post-treatment with some SPMs can attenuate established fPOP. Our data also indicate that orthopedic surgery impairs SPM production. Thus, DHA and DHA-derived SPMs should be differentially supplemented for treating fPOP and improving recovery.

  12. Distinct Analgesic Actions of DHA and DHA-Derived Specialized Pro-Resolving Mediators on Post-operative Pain After Bone Fracture in Mice

    Directory of Open Access Journals (Sweden)

    Linlin Zhang

    2018-05-01

    Full Text Available Mechanisms of pain resolution are largely unclear. Increasing evidence suggests that specialized pro-resolving mediators (SPMs, derived from fish oil docosahexaenoic acid (DHA, promote the resolution of acute inflammation and potently inhibit inflammatory and neuropathic pain. In this study, we examined the analgesic impact of DHA and DHA-derived SPMs in a mouse model of post-operative pain induced by tibial bone fracture (fPOP. Intravenous perioperative treatment with DHA (500 μg, resolvin D1 (RvD1, 500 ng and maresin 1 (MaR1, 500 ng, 10 min and 24 h after the surgery, delayed the development of fPOP (mechanical allodynia and cold allodynia. In contrast, post-operative intrathecal (IT administration of DHA (500 μg 2 weeks after the surgery had no effects on established mechanical and cold allodynia. However, by direct comparison, IT post-operative treatment (500 ng with neuroprotectin D1 (NPD1, MaR1, and D-resolvins, RvD1 and RvD5, but not RvD3 and RvD4, effectively reduced mechanical and cold allodynia. ELISA analysis showed that perioperative DHA treatment increased RvD1 levels in serum and spinal cord samples after bone fracture. Interestingly, sham surgery resulted in transient allodynia and increased RvD1 levels, suggesting a correlation of enhanced SPM levels with acute pain resolution after sham surgery. Our findings suggest that (1 perioperative treatment with DHA is effective in preventing and delaying the development of fPOP and (2 post-treatment with some SPMs can attenuate established fPOP. Our data also indicate that orthopedic surgery impairs SPM production. Thus, DHA and DHA-derived SPMs should be differentially supplemented for treating fPOP and improving recovery.

  13. Just War and Postmodern Warfare: A German Case Study

    Science.gov (United States)

    2015-04-01

    warfare construct, Germany is shaping a military concept based on recent conflicts and unfettered by biases of conventional strategies, organizations...remain sovereign while subconsciously evolving toward liberal democratic ideas. In respecting each country’s political sensitivities, Germany’s...before exhausting all diplomatic, economic and information instruments. Whereas the term AU/ACSC/PINSON/AY15 13 “interests” may bias the United

  14. Conflict Without Casualties: Non-Lethal Weapons in Irregular Warfare

    Science.gov (United States)

    2007-09-01

    the body,” and the Geneva Protocol of 1925, bans the use of chemical and biological weapons .11 On 8 April 1975, President Ford issued Executive...E Funding – PE 63851M) (accessed 15 December 2006). The American Journal of Bioethics . “Medical Ethics and Non-Lethal Weapons .” Bioethics.net...CASUALTIES: NON-LETHAL WEAPONS IN IRREGULAR WARFARE by Richard L. Scott September 2007 Thesis Advisor: Robert McNab Second Reader

  15. Nodes and Codes: The Reality of Cyber Warfare

    Science.gov (United States)

    2012-05-17

    respectively. The avionics in Boeing’s 787 Dreamliner require approximately 6.5 million lines of code while the current S-Class Mercedes Benz requires over 20...leaders (demonstrated through outdated policy, theory, and doctrine) and the reality of warfare in 1914 (dictated by innovation, technology , and...or the guidelines to military action codified in doctrine? How are states using the latest technological innovations as violent instruments of

  16. Attacking the infrastructure: exploring potential uses of offensive information warfare

    OpenAIRE

    Elam, Donald Emmett.

    1996-01-01

    The world has entered the Third Wave; it has entered the Information Age. One of the fundamentals of this paradigm shift is the fact that information is power. The side that controls information more effectively will be victorious. Thus, countries and militaries must change their mentality in order to survive. A new form of conflict, Information Warfare, has been born. This new discipline is large, dynamic, and complex. The need exists for education among military officers and other concerned...

  17. Warfare, genocide, and ethnic conflict: a Darwinian approach

    OpenAIRE

    Dimijian, Gregory G.

    2010-01-01

    As the 21st century dawns, I reflect on the history of humankind with growing concern about the need to understand the underlying biological and cultural roots of ethnic conflict and warfare. In the many studies of human conflict, innate biological predispositions have been neglected. This article is the third part of a series of seminars for medical residents at the University of Texas Southwestern Medical School at Dallas (see http://adarwinstudygroup.org/). The series starts with in-depth ...

  18. Recent Advances in Decontamination of Chemical Warfare Agents

    OpenAIRE

    Abdul Wadood Khan; Sabna Kotta; Shahid Husain Ansari; Javed Ali; Rakesh Kumar Sharma

    2013-01-01

    The recent turmoil and volatile situation in many countries and the increased risk of terrorist activities have raised alarm bells for the field of defense against toxic chemical/materials. These situations poses threats to society as terrorists can take advantage of such situations to strike and cause public mayhem. A number of chemicals have the potential of being used as chemical warfare (CW) agents. CW agents could immediately kill or incapacitate the affected individuals even when they a...

  19. Cyber warfare:terms, issues, laws and controversies

    OpenAIRE

    Seviş, Kamile Nur; Şeker, Ensar

    2016-01-01

    Recent years have shown us the importance of cybersecurity. Especially, when the matter is national security, it is even more essential and crucial. Increasing cyber attacks, especially between countries in governmental level, created a new term cyber warfare. Creating some rules and regulations for this kind of war is necessary therefore international justice systems are working on it continuously. In this paper, we mentioned fundamental terms of cyber...

  20. Littoral Combat Ship Open Ocean Anti-Submarine Warfare

    Science.gov (United States)

    2014-06-01

    maintain stealth and its defense in order to properly conduct an attack on a surface vessel (Sternhell and Thorndike 2014, 102). This statement...its target, the surface combatants can counter by increasing their speed (Sternhell and Thorndike 2014). While the maximum speed of the current...120316_PS.pdf Sternhell, Charles M, and Alan M Thorndike . 2014. “Antisubmarine Warfare in World War II.” CNA Analysis & Solutions. Accessed April 14, 2014

  1. The Acme of Skill: Nonkinetic Warfare

    Science.gov (United States)

    2008-05-01

    results are mixed. For the im- mense cost that often accompanies war, the returns of war are not guaranteed. On nonkinetic operations, it may appear that...ing, together with other kinetic capabilities such as emphasizing irregular operations, increasing ground troop levels, and recruiting foreign

  2. Forging Norwegian Special Operation Forces

    Science.gov (United States)

    2014-06-01

    comparison of the two units’ cultures we therefore needed another tool. The only viable option was to use a more quantitative method, namely to analyze...disagree a great deal more with the claim that there is good communication in FS. In the search to find quantitative answers to what should be...believes that he or she can have a positive impact. Alle mener at de kan ha en positiv innvirkning. 5 Involvement Empowerment Planning is ongoing and

  3. Special Operations Research Topics 2014

    Science.gov (United States)

    2014-01-01

    ally government-sponsored and funded roles such as post-traumatic stress/traumatic brain injury research and treatment, family/child counseling, other...connected young adults in their teens and twenties versus the old man in the coffee shop? Which social media venues are best suited to interfacing

  4. Special Operations Forces: Looking Forward

    National Research Council Canada - National Science Library

    Shelton, Henry

    1998-01-01

    The article introduces the United States as the sole superpower. As such the U.S. is obligated to assist other countries in need or threatened by adversaries, as long as it's in our national interests. Future U.S...

  5. The Theory of Special Operations

    Science.gov (United States)

    1993-06-17

    Brigade. An avid boxer and rugby player, he earned the troops r-espect through hard work, discipline and a desir.! to make them the best commandos in the...34, 22nd September, 1943, B1 . 312 0 Figure 6-1. X-Craft ?zwpadng to Dock. (Couttusy Imperial Wair Museum) Figure6-2 Captain at Peuuowpe. 313 Figure 6-3

  6. Chemical warfare agents identification by thermal neutron detection

    International Nuclear Information System (INIS)

    Liu Boxue; Ai Xianyun; Tan Daoyuan; Zhang Dianqin

    2000-01-01

    The hydrogen concentration determination by thermal neutron detection is a non-destructive, fast and effective method to identify chemical warfare agents and TNT that contain different hydrogen fraction. When an isotropic neutron source is used to irradiate chemical ammunition, hydrogen atoms of the agent inside shell act as a moderator and slow down neutrons. The number of induced thermal neutrons depends mainly upon hydrogen content of the agent. Therefore measurement of thermal neutron influence can be used to determine hydrogen atom concentration, thereby to determine the chemical warfare agents. Under a certain geometry three calibration curves of count rate against hydrogen concentration were measured. According to the calibration curves, response of a chemical agent or TNT could be calculated. Differences of count rate among chemical agents and TNT for each kind of shells is greater than five times of standard deviations of count rate for any agent, so chemical agents or TNT could be identified correctly. Meanwhile, blast tube or liquid level of chemical warfare agent could affect the response of thermal neutron count rate, and thereby the result of identification. (author)

  7. Quality of Life in Iranian Chemical Warfare Veteran's.

    Science.gov (United States)

    Ebadi, Abbas; Moradian, Tayeb; Mollahadi, Mohsen; Saeed, Yaser; Refahi, Ali Akbar

    2014-05-01

    Mustard gas has different effects on different body systems such as respiratory tract, blood, gastrointestinal, skin, eye, endocrine and peripheral nervous system. The purpose of this study was to determine the quality of life in chemical warfare veterans due to sulfur mustard exposure. In a cross-sectional and analytic study, 242 patients who had a chemical injury during the Iran-Iraq war (1980-1983) and their lung damage was proven were investigated in our study. The quality of life was measured in these patients using an extensively validated Iranian version of SF-36. The mean age of veterans was 44.12 ± 4.9 ranging from 22 to 62 years. Our results showed that chemical warfare had a decreased quality of life in all subscales of the SF-36. The lowest scores in SF-36 subscales were related to role physical and general health. The data also showed a significant relationship between the number of organs involved and the quality of life in these patients (P chemical warfare survivors suffering from late complications have a low health related quality of life.

  8. Mine Warfare: Lessons Learned and Forgotten

    National Research Council Canada - National Science Library

    Evangelista, Rickson E

    2008-01-01

    .... This analysis focuses on four battles/operations that involved mine countermeasures: The Battle of Mobile Bay, the amphibious landings at Inchon and Wonsan, and the planned amphibious landing into Kuwait. If the U.S...

  9. Risk, Military Ethics and Irregular Warfare

    Science.gov (United States)

    2011-12-01

    permissible; they are obligatory. Given the state’s moral obligation to protect its citizens, 6 military operations conducted in their defense are prima ... facie obligated, even when conducting those operations exposes combatants to harm. 7 Thus, in what I will refer to as the “traditional view,” by taking...feature of the traditional view. In an article co-written in 2005 with then Major General Amos Yadlin, Kasher remarked: “the duty to minimize casualties

  10. Loch ness, special operations executive and the first surgeon in paradise: Robert Kenneth Wilson (26.1.1899-6.6.1969).

    Science.gov (United States)

    Watters, David A K

    2007-12-01

    Lieutenant Colonel Robert Kenneth Wilson (1899-1969) was a surgeon who fought in both world wars and joined the Special Operations Executive parachuting behind enemy lines into Holland, France and Borneo, the last mission being with Australian forces (Semut II). He was an expert on firearms and gave opinion on ballistics at the Old Bailey during the 1930s. He also wrote a definitive text on automatic pistols with editions published in 1943 and 1975. He was an Edinburgh Fellow (1926), who had a practice in general surgery and gynaecology in Queen Anne Street during the 1930s. He took the famous 1934 'surgeon's photo' of the Loch Ness monster that was not admitted to be a hoax until 1994. After World War II, he became the first surgical specialist to work in the public service of the then Territory of Papua and New Guinea (1950-1956), where he wrote several papers on surgical topics. He married Gwen (1924), the daughter of Henrietta Gulliver, an Australian painter. They had two sons, Richard and Phillip. After practice he retired to Melbourne where he died of carcinoma oesophagus.

  11. 特种作战力量网络空间防御作战效能评估方法∗%Effectiveness Evaluation Method of Cyberspace Defense Operations of Special Operations Forces

    Institute of Scientific and Technical Information of China (English)

    李新颖; 邓启正; 刘靖旭

    2016-01-01

    In this paper, according to the special operations forces cyberspace defense operations system structure model of early warning, protection, detection, response and recovery in five aspects, and according to the different types and charac⁃teristics of indicators, using the fuzzy comprehensive evaluation method to quantify the indexes, consistent, and standardized processing, using the analytic hierarchy process (AHP) to determine the weight of each index, and finally the comprehen⁃sive effectiveness evaluation model was established based on comprehensive weighting method so as to realize the effectiveness evaluation of the defence against cyber space. Strong applicability and practicability of this method for cyber⁃space defense operations effectiveness evaluation to provide a method and train of thought.%根据特种作战力量网络空间防御作战系统的结构模型的预警、保护、检测、响应和恢复五个方面,按照指标的不同类型和特点,利用模糊综合评判法对指标进行量化、一致化和标准化处理,利用层次分析法确定各指标的权值,最后利用综合加权法建立综合效能评估模型从而实现对网络空间防御作战的效能评估。该方法适用性和实用性强,为网络空间防御作战效能的评估提供一种方法和思路。

  12. Program specialization

    CERN Document Server

    Marlet, Renaud

    2013-01-01

    This book presents the principles and techniques of program specialization - a general method to make programs faster (and possibly smaller) when some inputs can be known in advance. As an illustration, it describes the architecture of Tempo, an offline program specializer for C that can also specialize code at runtime, and provides figures for concrete applications in various domains. Technical details address issues related to program analysis precision, value reification, incomplete program specialization, strategies to exploit specialized program, incremental specialization, and data speci

  13. United States Coast Guard Antisubmarine Warfare (ASW) in the Maritime Defense Zone (MDZ) - A Strategic Approach

    Science.gov (United States)

    1989-03-01

    RIC ILE COPY AIR WAR COLLGE REEAC R~pCR UNITED STATES COAST GUARD ANTISUBMARINE WARFARE (ASW) IN THE MARITIME DEFENSE ZONE (MDZ) -A STRATEGIC...going to perform in these MDZs. Those tasks identified so far include: port and coastal physical security & preventive safety, mine warfare

  14. Understanding the elementary considerations in a network warfare environment: an introductory framework

    CSIR Research Space (South Africa)

    Veerasamy, N

    2008-07-01

    Full Text Available . It seeks to offer a better introductory understanding to the field of network warfare. This paper addresses the requirements for a network warfare capability and will look at the high-level approach, constraints, focus areas, levels, techniques...

  15. Metal organic frameworks for the catalytic detoxification of chemical warfare nerve agents

    Science.gov (United States)

    Hupp, Joseph T.; Farha, Omar K.; Katz, Michael J.; Mondloch, Joseph E.

    2017-04-18

    A method of using a metal organic framework (MOF) comprising a metal ion and an at least bidendate organic ligand to catalytically detoxify chemical warfare nerve agents including exposing the metal-organic-framework (MOF) to the chemical warfare nerve agent and catalytically decomposing the nerve agent with the MOF.

  16. Study on the identification method of chemical warfare agents with spectroscopy of neutron induced γ rays

    International Nuclear Information System (INIS)

    Liu Boxue; Li Yun; Li Xiangbao

    1996-01-01

    The paper briefly describes some non-destructive verification technologies of chemical warfare agents in-site, and some application of neutron induced gamma ray analysis, such as multi-elements analysis of coal, hidden explosive detection and identification of chemical agents. It also describes some problems in developing the portable isotopic neutron spectroscopy for non-destructive evaluation of chemical warfare agents

  17. Antidotes and treatments for chemical warfare/terrorism agents: an evidence-based review.

    Science.gov (United States)

    Rodgers, G C; Condurache, C T

    2010-09-01

    This article reviews the evidence supporting the efficacy of antidotes used or recommended for the potential chemical warfare agents of most concern. Chemical warfare agents considered include cyanide, vesicants, pulmonary irritants such as chlorine and phosgene, and nerve agents. The strength of evidence for most antidotes is weak, highlighting the need for additional research in this area.

  18. Status of dental health in chemical warfare victims: The case of Isfahan, Iran

    Directory of Open Access Journals (Sweden)

    Ahmad Mottaghi

    2012-01-01

    Conclusion: Chemical warfare victims have relatively poor dental/oral health. Chemical injury might cause a dysfunction in saliva secretion, with decrease in saliva secretion increasing the risk for tooth decay and periodontal disorders. Further research is required to find out the exact underlying mechanisms and the factors associated with poor dental/oral health in chemical warfare victims.

  19. Warfare Ecology on an Underwater Demolition Range: Acoustic Observations of Marine Life and Shallow Water Detonations in Hawai`i

    Science.gov (United States)

    Shannon, Lee H.

    Most studies investigating the effects of military-associated anthropogenic noise concentrate on deep sea or open ocean propagation of sonar and its effect on marine mammals. In littoral waters, U.S. military special operations units regularly conduct shallow water explosives training, yet relatively little attention has been given to the potential impact on nearshore marine ecosystems from these underwater detonations. This dissertation research focused on the Pu'uloa Underwater Detonation Range off the coast of O`ahu, and examined multiple aspects of the surrounding marine ecosystem and the effects of detonations using acoustic monitoring techniques. The soundscape of a nearshore reef ecosystem adjacent to the UNDET range was characterized through analysis of passive acoustic recordings collected over the span of 6 years. Snapping shrimp were the predominant source of noise, and a diel pattern was present, with increased sound energy during the night hours. Results revealed a difference of up to 7dB between two Ecological Acoustic Recorder locations 2.5km apart along the 60ft isobath. Passive acoustic recording files were searched visually and aurally for odontocete whistles. Whistles were detected in only 0.6% of files analyzed, indicating this area is not frequently transited by coastal odontocete emitting social sounds. The study also opportunistically captured a humpback whale singing during a detonation event, during which the animal showed no obvious alteration of its singing behavior. Four separate underwater detonation events were recorded using a surface deployed F-42C transducer, and the resulting analysis showed no measurable drop in the biologically produced acoustic energy in reaction to the explosive events. Coral reef fishes were recorded visually and acoustically during detonation events at a known distance and bearing from a known explosive sound source. Individual fish behavioral responses to the explosion varied, and a sharp uptick in fish

  20. Electronic Warfare and Radar Systems Engineering Handbook

    Science.gov (United States)

    2012-06-01

    Program GIG Global Information Grid GIGO Garbage In / Garbage Out GOCO Government Owned Contract Operated GOFO General Officer / Flag Officer...Usually, for economy , signals are sampled at the minimum rate required, with the result that the quantization noise introduced is white noise spread