Sample records for conventional warfare

  1. About the bears and the bees: Adaptive responses to asymmetric warfare

    NASA Astrophysics Data System (ADS)

    Ryan, Alex

    Conventional military forces are organised to generate large scale effects against similarly structured adversaries. Asymmetric warfare is a 'game' between a conventional military force and a weaker adversary that is unable to match the scale of effects of the conventional force. In asymmetric warfare, an insurgents' strategy can be understood using a multi-scale perspective: by generating and exploiting fine scale complexity, insurgents prevent the conventional force from acting at the scale they are designed for. This paper presents a complex systems approach to the problem of asymmetric warfare, which shows how future force structures can be designed to adapt to environmental complexity at multiple scales and achieve full spectrum dominance.

  2. About the bears and the bees: Adaptive responses to asymmetric warfare

    NASA Astrophysics Data System (ADS)

    Ryan, Alex

    Conventional military forces are organised to generate large scale effects against similarly structured adversaries. Asymmetric warfare is a `game' between a conventional military force and a weaker adversary that is unable to match the scale of effects of the conventional force. In asymmetric warfare, an insurgents' strategy can be understood using a multi-scale perspective: by generating and exploiting fine scale complexity, insurgents prevent the conventional force from acting at the scale they are designed for. This paper presents a complex systems approach to the problem of asymmetric warfare, which shows how future force structures can be designed to adapt to environmental complexity at multiple scales and achieve full spectrum dominance.

  3. Beyond-the-Box Thinking on Future War: The Art and Science of Unrestricted Warfare

    DTIC Science & Technology

    2009-04-01

    Studies Institute, US Army War College, 2008. Mattis , James N., and Frank Hoffman. “Future Warfare: The Rise of Hybrid Warfare.” Proceedings...nanotechnologies will augment the current bio -chemical capabilities, moving the battlefield into a microscopic arena. As seen before, the traditional American way...Military Trans-military Non-military Atomic Warfare Diplomatic Warfare Financial Warfare Conventional Warfare Network Warfare Trade Warfare Bio

  4. Conventional Warfare and United States Military Involvement in Latin America: Early Adolescents' Views.

    ERIC Educational Resources Information Center

    Roscoe, Bruce; And Others

    1988-01-01

    Assessed adolescents' views concerning conventional war and compared views to those of adolescents 15 years ago. Surveyed 362 seventh graders regarding conventional warfare and United States military involvement in Latin America. Compared to adolescents in 1971, adolescents in 1986 were somewhat more accepting of war. Many were skeptical of…

  5. Cyber Security: A Road Map for Turkey

    DTIC Science & Technology

    2012-03-19

    Cyber warfare is a form of information warfare, sometimes seen as analogous to conventional warfare, among a range of potential actors, including...nation states, non-state groups, and a complex hybrid of conflict involving both state and non-state actors. Cyber warfare is a tool of national power...An entire nation s ability to operate and fight in the information age is vital toward survival. Nowadays, cyber warfare is mostly focused on

  6. Military medicine and the ethics of war: British colonial warfare during the Seven Years War (1756-63).

    PubMed

    Charters, Erica

    2010-01-01

    This article examines 18th-century European warfare, tracing the first formal codifications of conventions of war, frequently introduced by military physicians and initially regarding the treatment of the sick and wounded. It outlines to what extent these conventions were followed in practice, particularly in the challenging environment of American irregular warfare, with a focus on the most well-known incident of "biological warfare" in the period: the deliberate spread of smallpox by British officers among Amerindians in 1763. More broadly, it demonstrates that the history of military medicine provides a fruitful method with which to uncover assumptions about the ethics of war.

  7. Anxiety, depression, and posttraumatic stress in Iranian survivors of chemical warfare.

    PubMed

    Hashemian, Farnoosh; Khoshnood, Kaveh; Desai, Mayur M; Falahati, Farahnaz; Kasl, Stanislav; Southwick, Steven

    2006-08-02

    In the 1980-1988 Iran-Iraq War, extensive use of chemical weapons resulted in high rates of morbidity and mortality. While much is known about the physical consequences of chemical warfare, there is a paucity of information about the long-term effects of chemical attacks on mental health. To assess the long-term psychological impact of chemical warfare on a civilian population. Cross-sectional randomized survey conducted in July 2004 of 153 civilians in 3 towns exposed to warfare in northwestern Iran: Oshnaviyeh (low-intensity conventional warfare), Rabat (high-intensity conventional warfare), and Sardasht (both high-intensity conventional warfare and chemical weapons). Full or partial posttraumatic stress disorder (PTSD) diagnosis, anxiety symptoms, and depressive symptoms were assessed using Farsi versions of the Clinician-Administered PTSD Scale, Hamilton Scale for Anxiety, and Beck Depression Inventory, respectively. Overall participation rate was 93%. Respondents had a mean age of 45 years and were all of Kurdish ethnicity. Among individuals exposed to both high-intensity warfare and chemical weapons, prevalence rates for lifetime PTSD, current PTSD, major anxiety symptoms, and severe depressive symptoms were 59%, 33%, 65%, and 41%, respectively. Among the low-intensity warfare group, the corresponding rates were 8%, 2%, 18%, and 6%, respectively, while intermediate rates were found among those exposed to high-intensity warfare but not to chemical weapons (31%, 8%, 26%, and 12%, respectively). Compared with individuals exposed to low-intensity warfare, those exposed to both high-intensity warfare and chemical weapons were at higher risk for lifetime PTSD (odds ratio [OR], 18.6; 95% confidence interval [CI], 5.8-59.4), current PTSD (OR, 27.4; 95% CI, 3.4-218.2), increased anxiety symptoms (OR, 14.6; 95% CI, 6.0-35.6), and increased depressive symptoms (OR, 7.2; 95% CI, 3.3-15.9). Exposure to high-intensity warfare but not to chemical weapons was also significantly associated with lifetime PTSD (OR, 5.4; 95% CI, 1.7-17.6), compared with those in the low-intensity warfare group. Further, compared with individuals exposed to high-intensity warfare alone, those exposed to both high-intensity warfare and chemical weapons were at higher risk for lifetime PTSD (OR, 3.4; 95% CI, 1.5-7.4), current PTSD (OR, 6.2; 95% CI, 2.0-20.1), increased anxiety symptoms (OR, 5.6; 95% CI, 2.5-12.6), and increased depressive symptoms (OR, 3.7; 95% CI, 1.8-7.2). Exposure to chemical warfare is an extreme traumatic event that has long-lasting adverse consequences on mental health.

  8. Textbook of Military Medicine. Part 1. Warfare, Weaponry, and the Casualty. Part 5. Conventional Warfare. Ballistic, Blast, and Burn Injuries

    DTIC Science & Technology

    1991-01-01

    United States. Because the vast majority of our patients are not active -duty military personnel, it may seem that our day-to-day ac- tivities are far... activated . A designated time-delay fuse uses an Source: Reference 8 15 Conventional Warfare: Ballistic, Blast, and Burn Injuries explosion and the...be found embedded and unexploded in tissue. The fuse is located at the tip of the warhead, and is activated and will deionate on contact only after

  9. Creating Paths of Change: Under What Conditions Can Special Operations be the Supported Command

    DTIC Science & Technology

    2018-03-01

    goals.” Daft, Essentials of Organization Theory and Design , 48); I. V. Gordon et al., Comparing US Army Systems with Foreign Counterparts: Identifying...CODE A 13. ABSTRACT (maximum 200 words) This thesis focuses on command and control for irregular warfare operations and the organizational design ...compound warfare, unconventional warfare, special action force, village stability operations, organizational design , conventional warfare

  10. Technology Transition for Hybrid Warfare

    DTIC Science & Technology

    2010-02-16

    and Iraq. At the same time, the science and technology base must provide the disruptive technologies to defeat future conventional enemies. This... disruptive technologies will be needed to retain long-term technological superiority in conventional warfare. Incremental improvement is the most...technology to be missed. Disruptive technologies are the second type of technological change and involve revolutionary concepts involving large technological

  11. Impact of Alleged Russian Cyber Attacks

    DTIC Science & Technology

    2009-05-01

    security. 15. SUBJECT TERMS Cyber Security, Cyber Warfare , Estonia, Georgia, Russian Federation Cyber Strategy, Convention on Cybercrime, NATO Center...Federation ......................................................................................... 33  X.  The Future of Russian Cyber Warfare ................................................................... 39...Issue 15.09); Binoy Kampmark, Cyber Warfare Between Estonia And Russia, (Contemporary Review: Autumn, 2003), p 288-293; Jaak Aaviksoo, Address by the

  12. RPA Field Simulations:Dilemma Training for Legal and Ethical Decision Making

    DTIC Science & Technology

    2015-11-07

    Simulation  Two phases in RPA Field Simulation – classroom phase and field phase  Purpose: link theoretical understanding/ moral reasoning with...rapid, informed decision-making/ moral behavior IRREGULAR WARFARE  U.S. dominates conventional warfare, but irregular warfare falls under Things...aspects: Mental simulation of action Modify Implement Will it work? MORAL REASONING/BEHAVIOR Military-Leader Responsibility requires

  13. The Future of Warfare and Impact of Space Operations

    DTIC Science & Technology

    2011-01-01

    cyber warfare is occurring as a preferred method of conflict between large players on the global stage. Smaller players also have reasons to avoid conventional warfare and remain hidden. In Iraq and Afghanistan, those who fight against us attempt to remain hidden. The individual who places an improvised explosive device (IED) attempts to engage us without exposure or identification. Those who aid the individual emplacing an IED do so with hidden networks of support. The IED is an anonymous weapon. Both cyber warfare and insurgent use of IEDs depend

  14. Finding the Balance to Combat a Hybrid Threat

    DTIC Science & Technology

    2013-05-23

    supporting operation to conventional warfare. Mao Tse -tung stated that guerrilla warfare is one aspect of total war, because it cannot win a war by itself.15...of Military and Associated Terms, 147. 15Mao Tse -tung, On Guerrilla Warfare, trans. Samuel B. Griffith II (Champaign, IL: University of Illinois...to deny the Vietcong or the North Vietnamese sanctuary in neither Laos nor Cambodia. Summary In Afghanistan, insurgency has become more a

  15. Chemical warfare agents

    PubMed Central

    Ganesan, K.; Raza, S. K.; Vijayaraghavan, R.

    2010-01-01

    Among the Weapons of Mass Destruction, chemical warfare (CW) is probably one of the most brutal created by mankind in comparison with biological and nuclear warfare. Chemical weapons are inexpensive and are relatively easy to produce, even by small terrorist groups, to create mass casualties with small quantities. The characteristics of various CW agents, general information relevant to current physical as well as medical protection methods, detection equipment available and decontamination techniques are discussed in this review article. A brief note on Chemical Weapons Convention is also provided. PMID:21829312

  16. Just War and Postmodern Warfare: A German Case Study

    DTIC Science & Technology

    2015-04-01

    warfare construct, Germany is shaping a military concept based on recent conflicts and unfettered by biases of conventional strategies, organizations...remain sovereign while subconsciously evolving toward liberal democratic ideas. In respecting each country’s political sensitivities, Germany’s...before exhausting all diplomatic, economic and information instruments. Whereas the term AU/ACSC/PINSON/AY15 13 “interests” may bias the United

  17. Strategic Choice: United States Special Forces’ Comparative Advantage in Irregular Warfare

    DTIC Science & Technology

    2017-03-01

    UNITED STATES SPECIAL FORCES’ COMPARATIVE ADVANTAGE IN IRREGULAR WARFARE by Steven F. Payne March 2017 Thesis Advisor: Hy S. Rothstein...REPORT TYPE AND DATES COVERED Master’s thesis 4. TITLE AND SUBTITLE STRATEGIC CHOICE: UNITED STATES SPECIAL FORCES’ COMPARATIVE ADVANTAGE IN...methodology, this thesis concludes that U.S. Army Special Forces have a comparative advantage over conventional forces to provide the National Command

  18. Women in Combat Roles: Past and Future

    DTIC Science & Technology

    1988-03-01

    to warfare. Most intelligence officers are males whose world-view is born of conventional Eastern European stereotypic sex-role attitudes. If woman’s...warfare in any capacity except as industrial workers and quasi-servants and clerical people." (2:5) British Wome Unlike German women in both wars...changing from relatively full participation early in the conflict toward a more specialized and limited division of labor. (17:149) By October 1948

  19. Listening to Historys Rhyme:Preparing the United States Army for Future Irregular Warfare

    DTIC Science & Technology

    2014-04-01

    of the most likely, which typically results in developing technologically advanced, conventional solutions to potential rivals, options poorly...What makes hybrid wars so challenging is that different elements execute the various modes of warfare and are typically coordinated at various... Morocco to train its forces on logistics, combined arms maneuver, and other skills. 72 Atlas Accord is a new exercise started in 2012 to provide

  20. Another weapon too far: the anti-personnel laser.

    PubMed

    Gillow, J T

    1995-06-01

    The last decade has seen the development of military lasers designed to blind. Medical professionals dedicated to the prevention and treatment of visual disability, and particularly ophthalmologists under the terms of their newly acquired Royal Charter, have a responsibility to: document this new technology; explain its medical effects; and influence the threshold at which these weapons might be used. Proposals to prohibit anti-eye laser warfare at The United Nations Convention Conference in September 1995 present a unique opportunity to stigmatize blinding as a method of warfare.

  1. A Square Peg in a Round Hole: A Case Study of Center Gravity Application in Counter Insurgency Warfare

    DTIC Science & Technology

    2011-06-01

    paradigm historically based on conventional warfare and state-based actors. Underlying questions related to the research question are: Is there a CoG...analysis is still useful by proposing 5 new interpretations of this aged concept. This thesis will examine whether CoG is still useful in...cuts through the confusion and contradictions related to CoG by translating it functionally for the war-fighter. He does this through a

  2. Forms of war.

    PubMed

    Vogel, H; Bartelt, D

    2007-08-01

    Under war conditions, employed weapons can be identified on radiographs obtained in X-ray diagnostic. The analysis of such X-ray films allows concluding that there are additional information about the conditions of transport and treatment; it shall be shown that there are X-ray findings which are typical and characteristic for certain forms of warfare. The radiograms have been collected during thirty years; they come from hospitals, where war casualties had been treated, and personal collections. The material is selected, because in war X-ray diagnostic will be limited and the interest of the opposing parties influence the access to the material; furthermore the possibilities to publish or to communicate facts and thoughts are different. Citizens of the USA, GB, France, or Israel will have easier access to journals than those of Vietnam, Chad, and Zimbabwe. Under war conditions, poor countries, like North Vietnam may develop own concepts of medical care. There are X-ray findings which are typical or even characteristic for air warfare, guerrilla warfare, gas war, desert warfare, conventional warfare, and annihilation warfare, and city guerrilla warfare/civil war. The examples demonstrate that weapons and the conditions of transport and treatment can be recognized by X-ray findings. The radiogram can be read like a document. In War, there are differences between a treatment and imaging diagnostic in countries, which control the air space and in those who do not. Medical care of the poor, i.e. in countries (in general those opposing the western nations) will hardly be published, and poverty has no advocate.

  3. Operational advantages of using Cyber Electronic Warfare (CEW) in the battlefield

    NASA Astrophysics Data System (ADS)

    Yasar, Nurgul; Yasar, Fatih M.; Topcu, Yucel

    2012-06-01

    While cyberspace is emerging as a new battlefield, conventional Electronic Warfare (EW) methods and applications are likely to change. Cyber Electronic Warfare (CEW) concept which merges cyberspace capabilities with traditional EW methods, is a new and enhanced form of the electronic attack. In this study, cyberspace domain of the battlefield is emphazised and the feasibility of integrating Cyber Warfare (CW) concept into EW measures is researched. The SWOT (Strengths, Weaknesses, Opportunities and Threats) analysis method is used to state the operational advantages of using CEW concept in the battlefield. The operational advantages of CEW are assessed by means of its effects on adversary air defense systems, communication networks and information systems. Outstanding technological and operational difficulties are pointed out as well. As a result, a comparison of CEW concept and conventional EW applications is presented. It is concluded that, utilization of CEW concept is feasible at the battlefield and it may yield important operational advantages. Even though the computers of developed military systems are less complex than normal computers, they are not subjected to cyber threats since they are closed systems. This concept intends to show that these closed systems are also open to the cyber threats. As a result of the SWOT analysis, CEW concept provides Air Forces to be used in cyber operations effectively. On the other hand, since its Collateral Damage Criteria (CDC) is low, the usage of cyber electronic attack systems seems to grow up.

  4. Integration and Interoperability of Special Operations Forces and Conventional Forces in Irregular Warfare

    DTIC Science & Technology

    2009-06-12

    Phasing Model ......................................................................................................9 Figure 2. The Continuum of...the communist periphery. In a high-intensity conflict, doctrine at the time called for conventional forces to fight the traditional, linear fight...operations and proximity of cross component forces in a non- linear battlespace – Rigid business rules, translator applications, or manual workarounds to

  5. Chemical and biological warfare. Should defenses be researched and deployed?

    PubMed

    Orient, J M

    1989-08-04

    The threat of chemical and biological weapons of mass destruction has intensified because of improved delivery systems and advances in chemistry, genetics, and other sciences. Possible US responses to this threat include deterrence, defenses, and/or disarmament, including a reaffirmation of the Biological and Toxin Weapons Convention of 1972, which is now in jeopardy. This article discusses the history of chemical and biological warfare, existing and potential weapons, the proliferation of weapons and delivery systems, ways to prevent the use of these weapons, and ways to protect populations from their effects.

  6. Laser mass spectrometry of chemical warfare agents using ultrashort laser pulses

    NASA Astrophysics Data System (ADS)

    Weickhardt, C.; Grun, C.; Grotemeyer, J.

    1998-12-01

    Fast relaxation processes in excited molecules such as IC, ISC, and fragmentation are observed in many environmentally and technically relevant substances. They cause severe problems to resonance ionization mass spectrometry because they reduce the ionization yield and lead to mass spectra which do not allow the identification of the compound. By the use of ultrashort laser pulses these problems can be overcome and the advantages of REMPI over conventional ionization techniques in mass spectrometry can be regained. This is demonstrated using soil samples contaminated with a chemical warfare agent.

  7. Another weapon too far: the anti-personnel laser.

    PubMed Central

    Gillow, J T

    1995-01-01

    The last decade has seen the development of military lasers designed to blind. Medical professionals dedicated to the prevention and treatment of visual disability, and particularly ophthalmologists under the terms of their newly acquired Royal Charter, have a responsibility to: document this new technology; explain its medical effects; and influence the threshold at which these weapons might be used. Proposals to prohibit anti-eye laser warfare at The United Nations Convention Conference in September 1995 present a unique opportunity to stigmatize blinding as a method of warfare. PMID:7629769

  8. Strategic Usefulness of Conventional Force/Special Operations Force Interdependence in Irregular Warfare

    DTIC Science & Technology

    2017-06-01

    17  III.  METHODOLOGY ..............................................................................................19  A... CASE STUDY SELECTION ..................................................................19  B.  RESEARCH APPROACH...20  IV.  GLOBAL WAR ON TERRORISM CASE STUDY .........................................21  A.  AFGHANISTAN

  9. Chemical munitions dumped at sea

    NASA Astrophysics Data System (ADS)

    Edwards, Margo; Bełdowski, Jacek

    2016-06-01

    Modern chemical warfare is a byproduct of the industrial revolution, which created factories capable of rapidly producing artillery shells that could be filled with toxic chemicals such as chlorine, phosgene and mustard agent. The trench warfare of World War I inaugurated extensive deployments of modern chemical weapons in 1915. Concomitantly, the need arose to dispose of damaged, captured or excess chemical munitions and their constituents. Whereas today chemical warfare agents (CWA) are destroyed via chemical neutralization processes or high-temperature incineration in tandem with environmental monitoring, in the early to middle 20th century the options for CWA disposal were limited to open-air burning, burial and disposal at sea. The latter option was identified as the least likely of the three to impact mankind, and sea dumping of chemical munitions commenced. Eventually, the potential impacts of sea dumping human waste were recognized, and in 1972 an international treaty, the Convention on the Prevention of Marine Pollution by Dumping of Wastes and Other Matter, was developed to protect the marine environment from pollution caused by the dumping of wastes and other matter into the ocean. By the time this treaty, referred to as the London Convention, was signed by a majority of nations, millions of tons of munitions were known to have been disposed throughout the world's oceans.

  10. High-temperature superconductivity for avionic electronic warfare and radar systems

    NASA Astrophysics Data System (ADS)

    Ryan, Paul A.

    1994-01-01

    The electronic warfare (EW) and radar communities expect to be major beneficiaries of the performance advantages high-temperature superconductivity (HTS) has to offer over conventional technology. Near term upgrades to system hardware can be envisioned using extremely small, high Q, microwave filters and resonators; compact, wideband, low loss, microwave delay and transmission lines; as well as, wideband, low loss, monolithic microwave integrated circuit phase shifters. The most dramatic impact will be in the far term, using HTS to develop new, real time threat identification and response strategy receiver/processing systems designed to utilize the unique high frequency properties of microwave and ultimately digital HTS.

  11. Niobium(V) saponite clay for the catalytic oxidative abatement of chemical warfare agents.

    PubMed

    Carniato, Fabio; Bisio, Chiara; Psaro, Rinaldo; Marchese, Leonardo; Guidotti, Matteo

    2014-09-15

    A Nb(V)-containing saponite clay was designed to selectively transform toxic organosulfur chemical warfare agents (CWAs) under extremely mild conditions into nontoxic products with reduced environmental impact. Thanks to the insertion of Nb(V) sites within the saponite framework, a bifunctional catalyst with strong oxidizing and acid properties was obtained. Remarkable activity and high selectivity were observed for the oxidative abatement of (2-chloroethyl)ethyl sulfide (CEES), a simulant of sulfur mustard, at room temperature with aqueous hydrogen peroxide. This performance was significantly better compared to a conventional commercial decontamination powder. © 2014 WILEY-VCH Verlag GmbH & Co. KGaA, Weinheim.

  12. Smallpox and biological warfare: the case for abandoning vaccination of military personnel.

    PubMed Central

    Capps, L; Vermund, S H; Johnsen, C

    1986-01-01

    Smallpox was officially declared eradicated from the world in 1980. Earlier, in 1972, over 50 nations signed the Biological Weapons Convention renouncing this entire category of weapons. Despite this international agreement, both the United States and the Soviet Union continue to vaccinate their military troops against smallpox, thus implying that each fears the other might still use it in biological warfare. Vaccination is not a harmless procedure, and vaccinia infections continue to be reported in troops and their contacts. Negotiating an end to the vaccination of troops would be a final step in ending the fear of smallpox. PMID:2944401

  13. Landmine Warfare in Support of Multi-domain Battle: Balancing Discrimination and Military Effectiveness

    DTIC Science & Technology

    2017-05-25

    Combat Team CCW Convention on Certain Conventional Weapons CTC Combat Training Center EMS Electro- Magnetic Spectrum FASCAM Family of...of a person or vehicle .”13 In the immediate aftermath of WWII, the economy of force, counter- mobility, and protection functions of landmines were...threat posed by the Soviet Union and the need for discrimination in the employment of persistent landmines by organizing them into well-marked fields

  14. General Purpose Force Capability; the Challenge of Versatility and Achieving Balance Along the Widest Possible Spectrum of Conflict

    DTIC Science & Technology

    2010-04-01

    billion dollar systems and platforms. In the looming era of limited resources for defense spending, military and civilian leaders light of recent...conventional systems .”28 Finding the Proper Balance Abandoning our military superiority in conventional warfare would b On the other hand, swinging...Defense Strategy published in March 2005. The 2005 version of the National Defense Strategy recognized that, “we are confronting fundamentally

  15. Intraosseous vascular access in the treatment of chemical warfare casualties assessed by advanced simulation: proposed alteration of treatment protocol.

    PubMed

    Vardi, Amir; Berkenstadt, Haim; Levin, Inbal; Bentencur, Ariel; Ziv, Amitai

    2004-06-01

    Current treatment protocols for chemical warfare casualties assume no IV access during the early treatment stages. Time constraints in mass casualty scenarios, impaired manual dexterity of medical personnel wearing protective gear, and victims' complex clinical presentations render standard IV access techniques impractical. A newly developed spring-driven, trigger-operated intraosseous infusion device may offer an effective solution. Sophisticated simulators were developed and used to mimic scenarios of chemical warfare casualties for assessing the feasibility of intraosseous infusion delivery. We evaluated the clinical performance of medical teams in full protective gear. The success rate in intraosseous insertion, time to completion of treatment goals, and outcome were measured in a simulated setting. Medical teams from major hospitals in Israel, designated for emergency response in a real chemical warfare mass casualty scenario, were trained in a simulated setting. All 94 participating physicians were supplied with conventional treatment modalities: only the 64 study group physicians received intraosseous devices. The simulated survival rate was 73.4% for the study group and 3.3% for the controls (P < 0.001). Treatment goals were achieved within 3.5 min (range, 1-9 min) in the study group and within >10 min for controls (P < 0.001), and the complication rate for intraosseous use was 13.8%. Personnel satisfaction with the intraosseous device was unanimous and high. New-generation intraosseous infusions have great potential value in the early treatment stages of chemical warfare casualties. In a chemical warfare mass casualty scenario, the protective gear worn by medical personnel, the time constraints, and the casualties' medical condition impose limitations on the establishment of IV access during early treatment of the victims. A spring-driven, trigger-operated intraosseous infusion delivery system may offer an effective solution.

  16. International Consultation on Peace Education and Research in Higher Education.

    ERIC Educational Resources Information Center

    Higher Education in Europe, 1986

    1986-01-01

    A January 1986 UNESCO international conference on the role of higher education in promoting international understanding, cooperation, peace, and respect for human rights focused on the nuclear threat and conventional warfare, the role of international governmental and nongovernmental organizations, research and education for peace, and…

  17. Irregular Warfare as a National Military Strategy Approach for Small States

    DTIC Science & Technology

    2013-12-01

    the most effective strategy for them. Analyses of large numbers of historical cases show that a conventional approach is a road to defeat for...this thesis is to illuminate the potential for small states to improve the effect of their military by adopting an irregular strategy. The thesis is... effective strategy for them. Analyses of large numbers of historical cases show that a conventional approach is a road to defeat for small states

  18. The nuclear dilemma and the just war tradition

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    O'Brien, W.V.; Langan, J.

    This book presents papers on the ethical aspects of nuclear weapons. Topics considered include the concept of a ''just'' war, national defense, political aspects, religion and politics, the failure of deterrence, conventional warfare, nuclear deterrence and democratic politics, the future of the nuclear debate, non-proliferation policy, arms control, national security, and government policies.

  19. New method for comprehensive detection of chemical warfare agents using an electron-cyclotron-resonance ion-source mass spectrometer

    NASA Astrophysics Data System (ADS)

    Kidera, Masanori; Seto, Yasuo; Takahashi, Kazuya; Enomoto, Shuichi; Kishi, Shintaro; Makita, Mika; Nagamatsu, Tsuyoshi; Tanaka, Tatsuhiko; Toda, Masayoshi

    2011-03-01

    We developed a detection technology for vapor forms of chemical warfare agents (CWAs) with an element analysis system using an electron cyclotron resonance ion source. After the vapor sample was introduced directly into the ion source, the molecular material was decomposed into elements using electron cyclotron resonance plasma and ionized. The following CWAs and stimulants were examined: diisopropyl fluorophosphonate (DFP), 2-chloroethylethylsulfide (2CEES), cyanogen chloride (CNCl), and hydrogen cyanide (HCN). The type of chemical warfare agents, specifically, whether it was a nerve agent, blister agent, blood agent, or choking agent, could be determined by measuring the quantities of the monatomic ions or CN + using mass spectrometry. It was possible to detect gaseous CWAs that could not be detected by a conventional mass spectrometer. The distribution of electron temperature in the plasma could be closely controlled by adjusting the input power of the microwaves used to generate the electron cyclotron resonance plasma, and the target compounds could be detected as molecular ions or fragment ions, enabling identification of the target agents.

  20. Detection of aqueous phase chemical warfare agent degradation products by negative mode ion mobility time-of-flight mass spectrometry [IM(tof)MS].

    PubMed

    Steiner, Wes E; Harden, Charles S; Hong, Feng; Klopsch, Steve J; Hill, Herbert H; McHugh, Vincent M

    2006-02-01

    The use of negative ion monitoring mode with an atmospheric pressure ion mobility orthogonal reflector time-of-flight mass spectrometer [IM(tof)MS] to detect chemical warfare agent (CWA) degradation products from aqueous phase samples has been determined. Aqueous phase sampling used a traditional electrospray ionization (ESI) source for sample introduction and ionization. Certified reference materials (CRM) of CWA degradation products for the detection of Schedule 1, 2, or 3 toxic chemicals or their precursors as defined by the chemical warfare convention (CWC) treaty verification were used in this study. A mixture of six G-series nerve related CWA degradation products (EMPA, IMPA, EHEP, IHEP, CHMPA, and PMPA) and their related collision induced dissociation (CID) fragment ions (MPA and EPA) were found in each case to be clearly resolved and detected using the IM(tof)MS instrument in negative ion monitoring mode. Corresponding ions, masses, drift times, K(o) values, and signal intensities for each of the CWA degradation products are reported.

  1. Nanoplatforms for Detection, Remediation and Protection Against Chem-Bio Warfare

    NASA Astrophysics Data System (ADS)

    Denkbaş, E. B.; Bayram, C.; Kavaz, D.; Çirak, T.; Demirbilek, M.

    Chemical and biological substances have been used as warfare agents by terrorists by varying degree of sophistication. It is critical that these agents be detected in real-time with high level of sensitively, specificity, and accuracy. Many different types of techniques and systems have been developed to detect these agents. But there are some limitations in these conventional techniques and systems. Limitations include the collection, handling and sampling procedures, detection limits, sample transfer, expensive equipment, personnel training, and detection materials. Due to the unique properties such as quantum effect, very high surface/volume ratio, enhanced surface reactivity, conductivity, electrical and magnetic properties of the nanomaterials offer great opportunity to develop very fast, sensitive, accurate and cost effective detection techniques and systems to detect chemical and biological (chem.-bio) warfare agents. Furthermore, surface modification of the materials is very easy and effective way to get functional or smart surfaces to be used as nano-biosensor platform. In that respect many different types of nanomaterials have been developed and used for the detection, remediation and protection, such as gold and silver nanoparticles, quantum dots, Nano chips and arrays, fluorescent polymeric and magnetic nanoparticles, fiber optic and cantilever based nanobiosensors, nanofibrillar nanostructures etc. This study summarizes preparation and characterization of nanotechnology based approaches for the detection of and remediation and protection against chem.-bio warfare agents.

  2. Integrated Nuclear and Conventional Theater Warfare Simulation (INWARS) Documentation. Part IV. User’s Manual Component. Volume III. EAD C2I Inputs.

    DTIC Science & Technology

    1980-02-08

    hours 0 Input Format: Integer b. Creatina Rescource Allocation Blocks The creation of a specific resource allocation block as a directive component is...is directed. 0 Range: N/A . Input Format: INT/NUC/CHM b. Creatina Employment Packages An employment package block has the structure portrayed in Figure

  3. Quality of life in caregivers of severely disabled war survivors.

    PubMed

    Mousavi, Batool; Seyed Hoseini Davarani, Seyed Hosein; Soroush, Mohammadreza; Jamali, Arsia; Khateri, Shahriar; Talebi, Morteza; Montazeri, Ali

    2015-01-01

    To evaluate quality of life (QOL) of caregivers of severely disabled war survivors and identify variables threatening caregivers' QOL. A cross-sectional study was performed on 532 caregivers of Iran-Iraq war related injured survivors by using Persian version of 36-item Short Form Health Survey (SF-36). Caregivers had lower QOL compared to the Iranian female population (p < .001). Caregivers of amputees had better SF-36 scores compared to caregivers of two groups of chemical warfare survivors (p ranging from .01 to <.001). Caregiving to chemical warfare and being married at the time of trauma were the independent predictors of poor QOL in both the physical component summary (OR = 5.08, 95% CI = 3.35-7.7; OR = 0.57, 95% CI = 0.37-0.89) and the mental component summary (OR = 4.12, 95% CI = 2.68-6.32; OR = 0.63, 95% CI = 0.40-0.98). Caregivers of war veterans suffer from poor QOL. Chemical warfare agents contribute to more persistent poor QOL in caregivers than the injuries caused by conventional weapons. © 2014 Association of Rehabilitation Nurses.

  4. Ballistic Missile Defense Final Programmatic Environmental Impact Statement

    DTIC Science & Technology

    1994-10-01

    included: the need for BMD; budget allocations; procedural problems related to NEPA; nuclear weapon dangers; arms reductions; and potential contravention...2-26 2.6.2 TECHNOLOGY ALTERNATIVES ........................... 2-26 2.6.2.1 Directed Energy Weapons ..................... 2-26 2.6.2.2 Nuclear ...national defense strategy of mutually assured destruction to keep conflicts from escalating beyond conventional warfare to nuclear war. In 1955, the

  5. Chemical and Biological Defense Program Annual Report to Congress

    DTIC Science & Technology

    2006-03-01

    activities , which are closely guarded secrets. The prevalence of dual-use technologies and legitimate civilian applications means nuclear, chemical and...and non-state actors can conceal WMD programs and related activities , the United States, its allies and partners must expect further intelligence gaps... activities into three objective areas: Homeland Defense, War on Terror/Irregular (Asymmetric) Warfare, and Conventional Campaigns. In each area, it

  6. Bytes: Weapons of Mass Disruption

    DTIC Science & Technology

    2002-04-01

    advances compound the problems of protecting complex global infrastructures from attacks. How should the U.S. integrate the many disparate...deploy and sustain military forces.".16 According to the direst of information warfare theories , all computer systems are vulnerable to attack. The...Crisis Show of Force Punitive Strikes Armed Intervention Regional Conflict Regional War Global Conventional War Strategic Nuclear War IW & C2W area of

  7. Hand-held analyser based on microchip electrophoresis with contactless conductivity detection for measurement of chemical warfare agent degradation products

    NASA Astrophysics Data System (ADS)

    Duran, Karolina-Petkovic; Zhu, Yonggang; Chen, Chuanpin; Swallow, Anthony; Stewart, Robert; Hoobin, Pam; Leech, Patrick; Ovenden, Simon

    2008-12-01

    This paper reports on the development of a hand-held device for on-site detection of organophosphonate nerve agent degradation products. This field-deployable analyzer relies on efficient microchip electrophoresis separation of alkyl methylphosphonic acids and their sensitive contactless conductivity detection. Miniaturized, low-powered design is coupled with promising analytical performance for separating the breakdown products of chemical warfare agents such as Soman, Sarin and VX . The detector has a detection limit of about 10 μg/mL and has a good linear response in the range 10-300 μg/mL concentration range. Applicability to environmental samples is demonstrated .The new hand-held analyzer offers great promise for converting conventional ion chromatography or capillary electrophoresis sophisticated systems into a portable forensic laboratory for faster, simpler and more reliable on-site screening.

  8. Non-Kinetic Capabilities for Irregular Warfare: Four Case Studies

    DTIC Science & Technology

    2009-03-01

    on the job, absenteeism , receiving free “perks”) 2. “Conventional” Corruption—Something is done or not done for some reward (bribery, kickbacks...occupational deviance that breaks departmental rules and regulations, such as sleeping on the job, absenteeism , and receiving free “perks.” “Conventional...African Security Review, Vol. 7, No. 1, 1998. Tanzi, Vito, “Corruption Around the World: Causes, Consequences, Scope, and Cures ,” IMF Staff Papers

  9. Neurotoxic Weapons and Syndromes.

    PubMed

    Carota, Antonio; Calabrese, Pasquale; Bogousslavsky, Julien

    2016-01-01

    The modern era of chemical and biological warfare began in World War I with the large-scale production and use of blistering and choking agents (chlorine, phosgene and mustard gases) in the battlefield. International treaties (the 1925 Geneva Protocol, the 1975 Biological and Toxin Weapons Convention and the 1993 Chemical Weapons Convention) banned biological and chemical weapons. However, several countries are probably still engaged in their development. Hence, there is risk of these weapons being used in the future. This chapter will focus on neurotoxic weapons (e.g. nerve agents, chemical and biological neurotoxins, psychostimulants), which act specifically or preeminently on the central nervous system and/or the neuromuscular junction. Deeply affecting the function of the nervous system, these agents either have incapacitating effects or cause clusters of casualties who manifest primary symptoms of encephalopathy, seizures, muscle paralysis and respiratory failure. The neurologist should be prepared both to notice patterns of symptoms and signs that are sufficiently consistent to raise the alarm of neurotoxic attacks and to define specific therapeutic interventions. Additionally, extensive knowledge on neurotoxic syndromes should stimulate scientific research to produce more effective antidotes and antibodies (which are still lacking for most neurotoxic weapons) for rapid administration in aerosolized forms in the case of terrorist or warfare scenarios. © 2016 S. Karger AG, Basel.

  10. Impact of the Munitions Rule on management of military chemical warfare agents and associated waste

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Kimmell, T.A.; Green, D.R.; Rosenblatt, D.H.

    1997-07-01

    The Federal Facility Compliance Act (FFCA), an amendment to the Resource Conservation and Recovery Act (RCRA), was signed by President Bush on October 6, 1992. Section 107 of the FFCA amended RCRA by adding a new Section 3004(y) that required the US Environmental Protection Agency (EPA) to develop, after consultation with the US Department of Defense (DOD) and appropriate state officials, regulations that identify when conventional and chemical munitions become hazardous waste and that provide for the safe transportation and storage of these wastes. The Military Munitions Rule (MMR) was proposed by EPA on November 8, 1995. The impact ofmore » the MMR on the management of military chemical warfare agents and associated waste is an important topic. There has been significant controversy regarding the disposition, under RCRA, of military chemical stockpile materials, and the MMR, in addition to issues with respect to conventional munitions, was expected to clarify the applicability of RCRA in these situations. The purpose of this paper is to review the applicability of the RCRA regulations to military chemical munitions that become waste and to discuss the impacts of the final MMR on the management of these wastes. The focus is on selected chemical agents that are part of the US chemical stockpile.« less

  11. Cyber Warfare/Cyber Terrorism

    DTIC Science & Technology

    2004-03-19

    Section 1 of this paper provides an overview of cyber warfare as an element of information warfare, starting with the general background of the...alternative form of conflict, reviews the traditional principles of warfare and why they may or may not apply to cyber warfare , and proposes new principles of...warfare that may be needed to conduct cyber warfare . Section 1 concludes with a review of offensive and defensive cyber warfare concepts. Section 2

  12. Anticipating the Gap: The Reality Between Aim and the Object

    DTIC Science & Technology

    2010-12-01

    Huffington Post.com, July 29. This type of attritional warfare post -conventional battle can by termed barbarism. Jeffrey Record points out that: “Reliance...than a military victory. (monograph author’s emphasis); Jodie T. Allen, “Polling Wars: Hawks vs. Doves,” Pew Research Center, posted November 23, 2009...29 George H.W. Bush, Bush makes historic speech on warship, CNN.com/U.S., posted May 1st, 2003, http

  13. Cognitive Depth and Hybrid Warfare: Exploring the Nature of Unique Time, Space, and Logic Frames

    DTIC Science & Technology

    2017-05-25

    ELEMENT NUMBER 6. AUTHOR(S) MAJ Jerrid Allen 5d. PROJECT NUMBER 5e. TASK NUMBER 5f. WORK UNIT NUMBER 7. PERFORMING ORGANIZATION NAME(S) AND...their irregular organization , conventional capabilities, and perceived efficacy against the Israeli Defense Forces. This is an incomplete interpretation...and it misses how Hezbollah’s organization and capabilities were functions of an operational system informed by a unique and contextual hybrid

  14. Health Risk Assessment of Consuming Deer from Aberdeen Proving Ground, Maryland. Report and Appendices A-D

    DTIC Science & Technology

    1995-05-01

    has been in operation for over 75 years with primary mission of research, development, and testing of munitions and military vehicles. A.s a...development, and testing of munitions and military vehicles. As a results of APG being on the National Priorities List, an installation-wide health...development, and testing of chemical warfare agents and conventional munitions. The installation occupies approximately 32,400 hectares of relatively

  15. Picking the Bone: The B-1 Bomber as a Platform for Innovation

    DTIC Science & Technology

    2010-06-01

    light of the U-2 shoot down and developing missile technology, the LAMPS design name indicated a shift in Air Force requirements, demanding a bomber...in light of growing concerns over the changing global situation and increasing strategic capabilities in the Soviet Union. The latest studies...the engagement and targeting enemy military forces during a regional conventional conflict.1 In light of this vision for future warfare, General

  16. SOF/Convention Force Light Footprint Interdependence in Asia and Beyond

    DTIC Science & Technology

    2013-04-01

    risk for food and waterborne illness.47 In many of these isolated rural areas, farming of crops is barely at a subsistence level, and livestock...mostly sheep and goats, compete for food with people. After thirty years of warfare, most modern infrastructure and many traditional institutions...These water sources are often of questionable quality, with animal and human waste run-off contaminating many of them. Men work farm fields to

  17. Analysis of chemical warfare agents by gas chromatography-mass spectrometry: methods for their direct detection and derivatization approaches for the analysis of their degradation products

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Valdez, Carlos A.; Leif, Roald N.; Hok, Saphon

    Abstract Chemical warfare agents (CWAs) are unarguably one of the most feared toxic substances produced by mankind. Their inception in conventional warfare can be traced as far back as the Middle Ages but their full breakthrough as central players in bellic conflicts was not realized until World War I. Since then, more modern CWAs along with efficient methods for their manufacture have emerged and violently shaped the way modern warfare and diplomatic relations are conducted. Owing to their mass destruction ability, counter methods to mitigate their impact appeared almost immediately on par with their development. These efforts have focused onmore » their efficient destruction, development of medical countermeasures and their detection by modern analytical chemistry methods. The following review seeks to provide the reader with a broad introduction on their direct detection by gas chromatography-mass spectrometry (GC-MS) and the various sample derivatization methods available for the analysis of their degradation products. The review concentrates on three of the main CWA classes and includes the nerve agents, the blistering agents and lastly, the incapacitating agents. Each section begins with a brief introduction of the CWA along with discussions of reports dealing with their detection in the intact form by GC-MS. Furthermore, as products arising from their degradation carry as much importance as the agents themselves in the field of forensic analysis, the available derivatization methods of these species are presented for each CWA highlighting some examples from our lab in the Forensic Science Center at the Lawrence Livermore National Laboratory.« less

  18. Analysis of chemical warfare agents by gas chromatography-mass spectrometry: methods for their direct detection and derivatization approaches for the analysis of their degradation products

    DOE PAGES

    Valdez, Carlos A.; Leif, Roald N.; Hok, Saphon; ...

    2017-07-25

    Abstract Chemical warfare agents (CWAs) are unarguably one of the most feared toxic substances produced by mankind. Their inception in conventional warfare can be traced as far back as the Middle Ages but their full breakthrough as central players in bellic conflicts was not realized until World War I. Since then, more modern CWAs along with efficient methods for their manufacture have emerged and violently shaped the way modern warfare and diplomatic relations are conducted. Owing to their mass destruction ability, counter methods to mitigate their impact appeared almost immediately on par with their development. These efforts have focused onmore » their efficient destruction, development of medical countermeasures and their detection by modern analytical chemistry methods. The following review seeks to provide the reader with a broad introduction on their direct detection by gas chromatography-mass spectrometry (GC-MS) and the various sample derivatization methods available for the analysis of their degradation products. The review concentrates on three of the main CWA classes and includes the nerve agents, the blistering agents and lastly, the incapacitating agents. Each section begins with a brief introduction of the CWA along with discussions of reports dealing with their detection in the intact form by GC-MS. Furthermore, as products arising from their degradation carry as much importance as the agents themselves in the field of forensic analysis, the available derivatization methods of these species are presented for each CWA highlighting some examples from our lab in the Forensic Science Center at the Lawrence Livermore National Laboratory.« less

  19. Cyber Warfare: China’s Strategy to Dominate in Cyber Space

    DTIC Science & Technology

    2011-06-10

    CYBER WARFARE : CHINA‘S STRATEGY TO DOMINATE IN CYBER SPACE A thesis presented to the Faculty of the U.S. Army Command and...warfare supports the use of cyber warfare in future conflict. The IW militia unit organization provides each Chinese military region commander with...China, Strategy, Cyber Warfare , Cyber Space, Information Warfare, Electronic Warfare 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF ABSTRACT 18

  20. Cyber Warfare: An Evolution in Warfare not Just War Theory

    DTIC Science & Technology

    2013-04-05

    cyber warfare is greatly debated. While some argue that Just War Theory is irrelevant to cyber warfare , a careful analysis demonstrates that it is a...useful tool for considering the morality of cyber warfare . This paper examines the application of Just War Theory to cyber warfare and contends that...Just War Theory is a useful tool for considering the morality of cyber warfare .

  1. Adapting Unconventional Warfare Doctrine to Cyberspace Operations: An Examination of Hacktivist Based Insurgencies

    DTIC Science & Technology

    2015-06-12

    Unconventional Warfare, Cyberspace Operations, Cyber Warfare , Hacktivism, China, Russia, Georgia, Estonia, Umbrella Revolution, UW, Cyber, Guerilla, Hacktivist...6 Cyber Warfare ............................................................................................................. 7...Internet, and cyber warfare , the nature of the human element in cyberspace exhibits only a scientific advancement in the evolution of warfare, not a

  2. 78 FR 58524 - Takes of Marine Mammals Incidental to Specified Activities; U.S. Navy Training and Testing...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-09-24

    ... and testing activities: anti-surface warfare; anti- submarine warfare; mine warfare; naval special warfare; major training activities; Naval Air Systems Command (NAVAIR) testing; anti-surface warfare testing; anti-submarine warfare testing; Naval Sea Systems Command (NAVSEA) testing; and Office of Naval...

  3. On Cyber Warfare Command and Control Systems

    DTIC Science & Technology

    2004-06-01

    longer adequate to rely solely on the now traditional defense-in-depth strategy. We must recognize that we are engaged in a form of warfare, cyber warfare , and... warfare . This causes security devices to be used ineffectively and responses to be untimely. Cyber warfare then becomes a one-sided battle where the... cyber warfare strategy and tactics requires a cyber warfare command and control system. Responses to cyber attacks do not require offensive measures

  4. German flooding of the Pontine Marshes in World War II.

    PubMed

    Geissler, Erhard; Guillemin, Jeanne

    2010-03-01

    The German army's 1943 flooding of the Pontine Marshes south of Rome, which later caused a sharp rise in malaria cases among Italian civilians, has recently been described by historian Frank Snowden as a unique instance of biological warfare and bioterrorism in the European theater of war and, consequently, as a violation of the 1925 Geneva Protocol prohibiting chemical and biological warfare. We argue that archival documents fail to support this allegation, on several counts. As a matter of historical record, Hitler prohibited German biological weapons (BW) development and consistently adhered to the Geneva Protocol. Rather than biological warfare against civilians, the Wehrmacht used flooding, land mines, and the destruction of vital infrastructure to obstruct the Allied advance. To protect its own troops in the area, the German army sought to contain the increased mosquito breeding likely to be caused by the flooding. Italians returning to the Pontine Marshes after the German retreat in 1944 suffered malaria as a result of environmental destruction, which was banned by the 1899 and 1907 Hague Conventions and by subsequent treaties. In contrast, a state's violation of the Geneva Protocol, whether past or present, involves the use of germ weapons and, by inference, a state-level capability. Any allegation of such a serious violation demands credible evidence that meets high scientific and legal standards of proof.

  5. The Logic of Hybrid Warfare: How the Concepts of Depth and Vulnerability Still Shape Russian Operational Approaches

    DTIC Science & Technology

    2017-03-15

    those two countries allowed Russia to couple a multi-faceted information campaign with an asymmetric ground- game to enable conventional military...organizations, Russia simply needed a ground- game to balance coercion and information around specific vulnerabilities. Russia seems to have followed a...article/whos-who-in-the-donetsk-peoples-republic 19 Who then are the “crisis managers” that run the ground game ? A US Army Special Operations

  6. Why So Conventional? America’s Propensity to Wage Traditional Large-Scale Warfare

    DTIC Science & Technology

    2013-12-01

    74 Mao Zedong, “Strategy in China’s Revolution,” Selected Military Writings of Mao Tse -tung, (Beijing: Foreign Language...After the defeat of the French, the United States took up the mantle of defending Laos , Cambodia, and the southern portion of Vietnam below the...the war299;300 2) the invasion and bombing of Cambodia and Laos to destroy NVA sanctuaries and the Central Office for South Vietnam (COSVN); the

  7. Multi Service Tactics, Techniques, and Procedures for Treatment of Chemical Warfare Agent Casualties and Conventional Military Chemical Injuries

    DTIC Science & Technology

    2016-08-02

    at mechanical ventilation of a severely exposed casualty until atropine takes effect . Administering supplemental oxygen as available. Chapter 3 3-10...Scavengers; hydroxocobalamin, and dicobalt edetate (2) Provision of S-Groups, thiosulfate (3) Assisted ventilation (4) Oxygen cyanogen... temperature index for light work. Refer to table 1-3 on page 1-12 for work and rest cycles and also water consumption chart. Chapter 1 1-12 ATP 4

  8. μ-PADs for detection of chemical warfare agents.

    PubMed

    Pardasani, Deepak; Tak, Vijay; Purohit, Ajay K; Dubey, D K

    2012-12-07

    Conventional methods of detection of chemical warfare agents (CWAs) based on chromogenic reactions are time and solvent intensive. The development of cost, time and solvent effective microfluidic paper based analytical devices (μ-PADs) for the detection of nerve and vesicant agents is described. The detection of analytes was based upon their reactions with rhodamine hydroxamate and para-nitrobenzyl pyridine, producing red and blue colours respectively. Reactions were optimized on the μ-PADs to produce the limits of detection (LODs) as low as 100 μM for sulfur mustard in aqueous samples. Results were quantified with the help of a simple desktop scanner and Photoshop software. Sarin achieved a linear response in the two concentration ranges of 20-100 mM and 100-500 mM, whereas the response of sulfur mustard was found to be linear in the concentration range of 10-75 mM. Results were precise enough to establish the μ-PADs as a valuable tool for security personnel fighting against chemical terrorism.

  9. Extraction of chemical warfare agents from water with hydrophilic-lipophilic balance and C18 cartridges: comparative study.

    PubMed

    Kanaujia, Pankaj K; Pardasani, Deepak; Gupta, A K; Dubey, D K

    2007-01-19

    Efficient extraction of chemical warfare agents (CWAs) from water is essential before subjecting them to gas chromatographic and spectral analysis aiming towards verification of the Chemical Weapons Convention (CWC). It requires development of fast, reliable, simple and reproducible sample preparation of CWAs from water which is likely to be contaminated during deliberate or inadvertent spread of CWAs. This work describes development of a solid-phase extraction method using hydrophilic-lipophilic balance (HLB) cartridges for extraction of CWAs from water. The extraction efficiencies of HLB and C18 cartridges were compared and the results revealed that HLB sorbents performed better. Extracts were analyzed by gas chromatography-mass spectrometry. Extraction parameters, such as extraction solvent, its volume and rinsing solvent were optimized. Best recoveries of target analytes were obtained using 1mL methanol and limits of detection were achieved up to 0.05microg/mL with dichloromethane. Precision of the method was found to be less than 9.2% RSD.

  10. [Decontamination of chemical warfare agents by photocatalysis].

    PubMed

    Hirakawa, Tsutomu; Mera, Nobuaki; Sano, Taizo; Negishi, Nobuaki; Takeuchi, Koji

    2009-01-01

    Photocatalysis has been widely applied to solar-energy conversion and environmental purification. Photocatalyst, typically titanium dioxide (TiO(2)), produces active oxygen species under irradiation of ultraviolet light, and can decompose not only conventional pollutants but also different types of hazardous substances at mild conditions. We have recently started the study of photocatalytic decontamination of chemical warfare agents (CWAs) under collaboration with the National Research Institute of Police Science. This article reviews environmental applications of semiconductor photocatalysis, decontamination methods for CWAs, and previous photocatalytic studies applied to CWA degradation, together with some of our results obtained with CWAs and their simulant compounds. The data indicate that photocatalysis, which may not always give a striking power, certainly helps detoxification of such hazardous compounds. Unfortunately, there are not enough data obtained with real CWAs due to the difficulty in handling. We will add more scientific data using CWAs in the near future to develop useful decontamination systems that can reduce the damage caused by possible terrorism.

  11. Agroterrorism, Biological Crimes, and Biological Warfare Targeting Animal Agriculture

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Wilson, Terry M.; Logan-Henfrey, Linda; Weller, Richard E.

    2000-04-12

    There is a rising level of concern that agriculture might be targeted for economic sabotage by terrorists. Knowledge gathered about the Soviet Union biological weapons program and Iraq following the Gulf War, confirmed that animals and agricultural crops were targets of bioweapon development. These revelations are particularly disturbing in light of the fact that both countries are States Parties to the Biological and Toxin Weapons Convention that entered into force in 1975. The potential for misusing biotechnology to create more virulent pathogens and the lack of international means to detect unethical uses of new technologies to create destructive bioweapons ismore » of increasing concern. Disease outbreaks, whether naturally occurring or intentionally, involving agricultural pathogens that destroy livestock and crops would have a profound impact on a country's infrastructure, economy and export markets. This chapter deals with the history of agroterrorism, biological crimes and biological warfare directed toward animal agriculture, specifically, horses, cattle, swine, sheep, goats, and poultry.« less

  12. Does the Economy or Surface Warfare Officer Career Pay Affect Surface Warfare Officer Retention?

    DTIC Science & Technology

    2014-12-01

    be a career SWO (Surface Warfare Enterprise, 2013). 6 Military pay was more important to men than women ...OR SURFACE WARFARE OFFICER CAREER PAY AFFECT SURFACE WARFARE OFFICER RETENTION? by Meagan B. Makarenko December 2014 Thesis Advisor...2014 3. REPORT TYPE AND DATES COVERED Master’s Thesis 4. TITLE AND SUBTITLE DOES THE ECONOMY OR SURFACE WARFARE OFFICER CAREER PAY AFFECT

  13. Airpower, Afghanistan, and the Future of Warfare: An Alternative View

    DTIC Science & Technology

    2006-11-01

    Air War, 15. 19. Beaumont et al., “Rout of the Taliban.” 20. Bonin , “First Year,” 30. 21. Ibid. 22. Ricks and Struck, “US Troops Coordinating...over 1,000 US conventional forces in Afghanistan when the Taliban fell. Bonin , “First Year,” 33; and Stewart, US Army in Afghanistan. 30. Secretary of... Bonin , “First Year,” 34; and Stewart, US Army in Afghanistan, 24. 50. Haas to the author, letter. 51. Stewart, US Army in Afghanistan, 24. 52. Glasser

  14. The King is Dead: Regaining the Throne -- The Current State of the Field Artillery, Core Competency Atrophy, and the Way Ahead

    DTIC Science & Technology

    2011-03-17

    with a built -in glass ceiling is not likely to retain or attract the best and the brightest. If it hasn’t happened already, FA accessions will begin...officer. This would also facilitate removing the glass ceiling currently atop the field 19 artillery with only six tactical command opportunities. This...missions excluding conventional warfare strategic failure can result. 71 In summer 2006 in southern Lebanon , the Israeli army suffered a significant

  15. Department of the Navy Justification of Estimates for Fiscal Year 1984 Submitted to Congress January 1983. Procurement. Aircraft Procurement, Navy

    DTIC Science & Technology

    1983-01-01

    is anti-submarine warfare ’(ASW): o de -ct, classify, track, localize, and destroy conventional and high performance .3ubmarines; to conauct long...powered personnel/cargo transport type aircraft, capable of all weather carrier operatluns. The internal payload configuration is variable, allowing...several modifications to the VH-3D (Executive transport ) he]icopters. Foremost among them is the Main Gear Box Improvements ($11.8 million in FY 1984

  16. Integrated Nuclear and Conventional Theater Warfare Simulation (INWARS) Level III Specifications. Volume III. Air Combat Modeling.

    DTIC Science & Technology

    1978-07-24

    will include an implicit air function that will perform the air planning and requesting associated with the various headquarters. The decision structure...air headquarters (The ATAF/TAA) will be included in the CIC to perform the implementation of the decisions /goals of the C21 elements, 1-4...realistic fashion. Once the AMPs have been formed, the operational process of launching, mission implementation etc. is no longer keyed to the decision cycle

  17. Strategic Impact of Cyber Warfare Rules for the United States

    DTIC Science & Technology

    2010-03-01

    Despite the growing complexities of cyberspace and the significant strategic challenge cyber warfare poses on the United States’ vital interests few...specific rules for cyber warfare exist. The United States should seek to develop and maintain cyber warfare rules in order to establish...exemplify the need for multilaterally prepared cyber warfare rules that will reduce the negative influence cyber warfare presently has on the United States’ national interests.

  18. Initial Report of the Deans Cyber Warfare Ad Hoc Committee

    DTIC Science & Technology

    2011-12-22

    in a cyber warfare environment. Among the more notable recent developments have been the establishment of a new Cyber Warfare Command (USCYBERCOM) at...information-warfare-centric organization. Clearly, future Naval Academy graduates will be expected to know more about cyber warfare than those we have...graduated in the past. The Academic Dean and Provost tasked an ad hoc committeethe Cyber Warfare ad hoc Committeeto examine how USNA can best ensure that

  19. Sources of Occupational Stress and Prevalence of Burnout and Clinical Distress Among U.S. Air Force Cyber Warfare Operators

    DTIC Science & Technology

    2013-01-01

    distress within the cyber warfare community. This study involved cyber warfare operators including active duty (n = 376) and civilian contractor and...revealed that when compared to civilian cyber warfare operators, active duty cyber warfare operators are more likely to suffer from the facets of...8217 write-in responses revealed cyber warfare operators attributed shift work, shift changes, and hours worked as the primary sources of high occupational

  20. Cyber warfare and electronic warfare integration in the operational environment of the future: cyber electronic warfare

    NASA Astrophysics Data System (ADS)

    Askin, Osman; Irmak, Riza; Avsever, Mustafa

    2015-05-01

    For the states with advanced technology, effective use of electronic warfare and cyber warfare will be the main determining factor of winning a war in the future's operational environment. The developed states will be able to finalize the struggles they have entered with a minimum of human casualties and minimum cost thanks to high-tech. Considering the increasing number of world economic problems, the development of human rights and humanitarian law it is easy to understand the importance of minimum cost and minimum loss of human. In this paper, cyber warfare and electronic warfare concepts are examined in conjunction with the historical development and the relationship between them is explained. Finally, assessments were carried out about the use of cyber electronic warfare in the coming years.

  1. Passive front-ends for wideband millimeter wave electronic warfare

    NASA Astrophysics Data System (ADS)

    Jastram, Nathan Joseph

    This thesis presents the analysis, design and measurements of novel passive front ends of interest to millimeter wave electronic warfare systems. However, emerging threats in the millimeter waves (18 GHz and above) has led to a push for new systems capable of addressing these threats. At these frequencies, traditional techniques of design and fabrication are challenging due to small size, limited bandwidth and losses. The use of surface micromachining technology for wideband direction finding with multiple element antenna arrays for electronic support is demonstrated. A wideband tapered slot antenna is first designed and measured as an array element for the subsequent arrays. Both 18--36 GHz and 75--110 GHz amplitude only and amplitude/phase two element direction finding front ends are designed and measured. The design of arrays using Butler matrix and Rotman lens beamformers for greater than two element direction finding over W band and beyond using is also presented. The design of a dual polarized high power capable front end for electronic attack over an 18--45 GHz band is presented. To combine two polarizations into the same radiating aperture, an orthomode transducer (OMT) based upon a new double ridge waveguide cross section is developed. To provide greater flexibility in needed performance characteristics, several different turnstile junction matching sections are tested. A modular horn section is proposed to address flexible and ever changing operational requirements, and is designed for performance criteria such as constant gain, beamwidth, etc. A multi-section branch guide coupler and low loss Rotman lens based upon the proposed cross section are also developed. Prototyping methods for the herein designed millimeter wave electronic warfare front ends are investigated. Specifically, both printed circuit board (PCB) prototyping of micromachined systems and 3D printing of conventionally machined horns are presented. A 4--8 GHz two element array with integrated beamformer fabricated using the stacking of PCB boards is shown, and measured results compare favorably with the micromachined front ends. A 3D printed small aperture horn is compared with a conventionally machined horn, and measured results show similar performance with a ten-fold reduction in cost and weight.

  2. Department of Defenses Enhanced Requirement for Offensive Cyber Warfare Operations

    DTIC Science & Technology

    2010-04-01

    The Department of Defense (DoD) needs to further develop its offensive cyber warfare capabilities at all levels. In an asymmetric environment...battlefields. If the DoD does not prosecute offensive cyber warfare tactics then the DoD has effectively allowed a significant advantage to be given...offensive cyber warfare operations, These states utilize their cyber warfare capabilities to support their national, operational and strategic

  3. Beyond Mission Command: Maneuver Warfare for Cyber Command and Control

    DTIC Science & Technology

    2015-05-18

    operation in an A2AD environment. 15. SUBJECT TERMS command and control; maneuver warfare; cyberspace; cyberspace operations; cyber warfare , mission...Some Principles of Cyber Warfare (NWC 2160) (U.S. Naval War College, Joint Military Operations Department, Newport, RI: U.S. Naval War College...research/ innovationleadership.pdf. Crowell, Richard M. Some Principles of Cyber Warfare (NWC 2160). U.S. Naval War College, Joint Military Operations

  4. The Theory of Unconventional Warfare: Win, Lose, and Draw

    DTIC Science & Technology

    2008-12-01

    UNCONVENTIONAL WARFARE MODEL ...................................12 1. Planning Phase...Superiority over Time........................................................................11  Figure 3.  Unconventional Warfare Model ...superiority through the six principles of UW illustrated below in the UW model . . B. THE UNCONVENTIONAL WARFARE MODEL Figure 3. Unconventional

  5. Cyber warfare: Armageddon in a Teacup?

    DTIC Science & Technology

    2009-12-11

    Security concerns over the growing capability of Cyber Warfare are in the forefront of national policy and security discussions. In order to enable a...realistic discussion of the topic this thesis seeks to analyze demonstrated Cyber Warfare capability and its ability to achieve strategic political...objectives. This study examines Cyber Warfare conducted against Estonia in 2007, Georgia in 2008, and Israel in 2008. In all three cases Cyber Warfare did

  6. At the Crossroads of Cyber Warfare: Signposts for the Royal Australian Air Force

    DTIC Science & Technology

    2011-06-01

    At the Crossroads of Cyber Warfare : Signposts for the Royal Australian Air Force by Craig Stallard, Squadron leader, Royal...in the conduct of cyber warfare . The 2009 Defence White Paper provided some clarity by indentifying cyber warfare as critical to the maintenance...of national security, but left open the most important issue: should cyber warfare be a joint engagement or a service oriented fight? The RAAF

  7. Cyber Warfare: New Character with Strategic Results

    DTIC Science & Technology

    2013-03-01

    The advent of cyber warfare has sparked a debate amongst theorists as to whether timeless Clausewitzian principles remain true in the 21st century...Violence, uncertainty, and rationality still accurately depict the nature of cyber warfare , however, its many defining attributes and means by which...this style of warfare is conducted has definitively changed the character of war. Although cyber warfare is contested in the cyber domain, it often

  8. A Better State of War: Surmounting the Ethical Cliff in Cyber Warfare

    DTIC Science & Technology

    2014-06-01

    This study analyzes the emergent field of cyber warfare through the lens of commonly-accepted tenets of ethical warfare. By comparing the...foundational understanding of concepts that determine the justice of wars (jus ad bellum) and justice in war (jus en bello) with the capabilities cyber warfare offers...analyzing how cyber warfare affects each of the core concepts introduced above. The fourth chapter presents a case study that tests the theoretical

  9. Proceedings of the Air Power Symposium on the Role of Airpower in Low Intensity Conflict (9th) Held at Maxwell AFB, Alabama on 11-13 March 1985. Appendix 2. Symposium Papers,

    DTIC Science & Technology

    1985-05-01

    Much has been written recently on the subject of non- nuclear , unconventional, limited war--or, low intensity conflict. These articles have raised...341 Low intensity conflict, for the purpose of this paper, is defined as conflict at the lower end of the warfare spectrum.* (Global nuclear war is at...conflict and conventional and nuclear war--priorities and forces disposition. BACKGROUND Traditionally, the U.S. has thought in global or regional terms

  10. The Knowledge Level of United States Air Force Flight Nurses Regarding the Injuries of Conventional Warfare Casualties

    DTIC Science & Technology

    1989-01-01

    d) lack of supplies; (e) sexual harassment; ( f ) problems with some professional relatiouships; (g) survivor guilt; and (h) threat to life. After...Demographic Profile of the Subjects Characteristics Samplea f (t) Sx Male 26(28) Female 66(72) Age 25-29 10(11) 30-34 37(40) 35-39 30(33) 40-44 11(12) 45+ 4(4...20 3(3) 21-24 2(2) Note. Only 90 of 92 reported. (table continues) 44 Table I (continued) Characteristics Samplea f (e) Area of Clinical Practice

  11. Biofuel Pilot at St. Juliens Creek and Proposed NAVFAC Policy on Use of Biofuel In Heating Boilers

    DTIC Science & Technology

    2013-09-01

    Engineering and Expeditionary Warfare Center (NAVFAC EXWC) was tasked by NAVFAC HQ with facilitating a pilot study on the use of B20 Biodiesel (20...by NAVFAC HQ with facilitating a pilot study on the use of B20 Biodiesel (20 % biofuel mixed with 80 % fossil fuel oil hereafter referred to as B20...renewable) attributes of B20 as compared to conventional fossil fuel oil, and the ease of boiler and fuel system conversion to the biodiesel fuel

  12. Cyber-Warfare: Jus Post Bellum

    DTIC Science & Technology

    2015-03-01

    used to design a cyber - warfare jus post bellum framework. It also analyzes analogies to traditional warfare in the damage assessment and aid provided...and the ability to contain and reverse cyberattacks. This thesis proposes a cyber - warfare jus post bellum framework, with emphasis on prevention and

  13. 75 FR 6642 - Notice of Proposed Information Collection; Naval Special Warfare Recruiting Directorate

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-02-10

    ... Information Collection; Naval Special Warfare Recruiting Directorate AGENCY: Department of the Navy, DoD. ACTION: Notice. SUMMARY: The Naval Special Warfare (NSW) Recruiting Directorate announces the submission... the proposal and associated collection instruments, write to the Director, Naval Special Warfare...

  14. The role of rewards in motivating participation in simple warfare.

    PubMed

    Glowacki, Luke; Wrangham, Richard W

    2013-12-01

    In the absence of explicit punitive sanctions, why do individuals voluntarily participate in intergroup warfare when doing so incurs a mortality risk? Here we consider the motivation of individuals for participating in warfare. We hypothesize that in addition to other considerations, individuals are incentivized by the possibility of rewards. We test a prediction of this "cultural rewards war-risk hypothesis" with ethnographic literature on warfare in small-scale societies. We find that a greater number of benefits from warfare is associated with a higher rate of death from conflict. This provides preliminary support for the relationship between rewards and participation in warfare.

  15. Employing U.S. Information Operations Against Hybrid Warfare Threats

    DTIC Science & Technology

    2013-03-01

    Article 51.24 Cyber warfare is unique in that vulnerabilities that a network target may have could be discovered by software developers who then... cyber warfare rather than physical combat, a future subject to air strikes or ground-forces raids would likely be a powerful deterrent. Some in the U.S...Manwaring, The Complexity of Modern Asymmetric Warfare, (Norman, OK: Univ. of Oklahoma Press, 2012), 126-129. 23 Arie J. Schaap, “ Cyber Warfare Operations

  16. Developing a Hybrid Virtualization Platform Design for Cyber Warfare Training and Education

    DTIC Science & Technology

    2010-06-01

    CYBER WARFARE TRAINING AND EDUCATION THESIS Kyle E. Stewart 2nd...Government. AFIT/GCE/ENG/10-06 DEVELOPING A HYBRID VIRTUALIZATION PLATFORM DESIGN FOR CYBER WARFARE TRAINING...APPROVED FOR PUBLIC RELEASE; DISTRIBUTION UNLIMITED. AFIT/GCE/ENG/10-06 DEVELOPING A HYBRID VIRTUALIZATION PLATFORM DESIGN FOR CYBER WARFARE

  17. Chinese National Strategy of Total War

    DTIC Science & Technology

    2008-06-01

    Cyber Warfare Michael J. Good, BA Major, USA June 2008 APPROVED FOR PUBLIC RELEASE; DISTRIBUTION IS...who allowed me into the Cyber Warfare , my fellow students in the Cyber Warfare IDE program who have been great friends and mentors, and my fellow...Hackers and Other Cyber Criminals .............................................................................41 PLA Cyber Warfare

  18. 77 FR 60678 - Takes of Marine Mammals Incidental to Specified Activities; U.S. Navy Training and Testing...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-10-04

    ...-submarine warfare; mine warfare; naval special warfare; Naval Air Systems Command (NAVAIR) testing; Naval Sea Systems Command (NAVSEA) testing; Space and Naval Warfare Systems Command (SPAWAR) testing; and Office of Naval Research (ONR) and Naval Research Laboratory (NRL) testing. Detailed descriptions of...

  19. Hybrid Warfare: the 21st Century Russian Way of Warfare

    DTIC Science & Technology

    2017-05-25

    in Ukraine, can be best understood by examining it in relation to the ideas and theories of such preeminent theorists as Sun Tzu and Carl von...theories of warfare, of which Russia’s hybrid warfare is one of the most recent. Writing over two thousand years ago, Sun Tzu stated, “The art of...warfare is deceit.”17 Sun Tzu continued, stating that the “highest excellence” in war was not in winning every battle, but in subduing the enemy’s

  20. 78 FR 53109 - Security Zones; Naval Base Point Loma; Naval Mine Anti-Submarine Warfare Command; San Diego Bay...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-08-28

    ...-AA87 Security Zones; Naval Base Point Loma; Naval Mine Anti-Submarine Warfare Command; San Diego Bay... Anti-Submarine Warfare Command to protect the relocated marine mammal program. These security zone... Warfare Command, the Commander of Naval Region Southwest, or a designated representative of those...

  1. Nano-Structured Solids and Heterogeneous Catalysts: Powerful Tools for the Reduction of CBRN Threats

    NASA Astrophysics Data System (ADS)

    Guidotti, M.; Rossodivita, A.; Ranghieri, M. C.

    In the field of non-conventional CBRN weapons, the recent rapid development of nanotechnology and catalysis over nanosized solids provides innovative tools for the detection, protection and decontamination against these threats. By improving the efficiency of the countermeasures and by minimizing the negative effects of a deliberate use of CBRN agents, the practical application of the new technologies will readily represent a step forward in lowering the vulnerability of the civilian populations and in preventing the use of mass destruction weapons by terrorist groups or by `rogue states' supporting terrorists' activity. In such scenario, some relevant examples of nanosystems applied to the defense from non-conventional warfare agents will be here presented and commented. The key role of nanotechnology and heterogeneous catalysis for a multidisciplinary approach in counteracting CBRN threats will be highlighted too.

  2. Deactivating Chemical Agents Using Enzyme-Coated Nanofibers Formed by Electrospinning

    DTIC Science & Technology

    2016-01-01

    7.3mM/mg). Key words Coaxial electrospinning, DFPase, Enzyme, chemical warfare , nanofiber, decontamination . Introduction Chemical warfare ...Krile, R.; Nishioka, M.; Taylor, M.; Riggs, K.; Stone, H. Decontamination of Toxic Industrial Chemicals and Chemical Warfare Agents On Building...298 (Rev. 8-98) Prescribed by ANSI Std. Z39.18 MATS COATINGS ELECTROSPINNING CHEMICAL WARFARE

  3. Toxic Warfare

    DTIC Science & Technology

    2002-02-01

    Prepared for the United States Air Force Approved for public release; distribution unlimited Theodore Karasik Project AIR FORCE R TOXIC WARFARE...Report Documentation Page Report Date 000002002 Report Type N/A Dates Covered (from... to) - Title and Subtitle Toxic Warfare Contract Number Grant...310) 451-6915; Email: order@rand.org Library of Congress Cataloging-in-Publication Data Karasik, Theodore William. Toxic warfare / Theodore Karasik

  4. Small Ships Revival: From Cold War Anti-Invasion and Guerrilla Warfare Tactics to Highly Capable Force Multiplier in Littoral and Expeditionary Warfare

    DTIC Science & Technology

    2010-05-03

    this gap might be filled. It will focus on the surface warfare aspect of sea control, though it touches on antiair warfare, mine warfare and...Sea As the flotilla acquired battle power […] the vital, most difficult, and most absorbing problem has become not how to increase the power of a...proving that their performance is absolutely necessary to these operations. Com Fr Amphib TG of the NATO Reaction Force-8 after Exercise Brilliant Midas

  5. 78 FR 72025 - Security Zones; Naval Base Point Loma; Naval Mine Anti Submarine Warfare Command; San Diego Bay...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-12-02

    ...-AA87 Security Zones; Naval Base Point Loma; Naval Mine Anti Submarine Warfare Command; San Diego Bay... establishing a new security zone at the Naval Mine and Anti-Submarine Warfare Command to protect the relocated... Commander of Naval Base Point Loma, the Commander of the Naval Mine Anti Submarine Warfare Command, and the...

  6. Intrafamily and intragenomic conflicts in human warfare

    PubMed Central

    2017-01-01

    Recent years have seen an explosion of multidisciplinary interest in ancient human warfare. Theory has emphasized a key role for kin-selected cooperation, modulated by sex-specific demography, in explaining intergroup violence. However, conflicts of interest remain a relatively underexplored factor in the evolutionary-ecological study of warfare, with little consideration given to which parties influence the decision to go to war and how their motivations may differ. We develop a mathematical model to investigate the interplay between sex-specific demography and human warfare, showing that: the ecology of warfare drives the evolution of sex-biased dispersal; sex-biased dispersal modulates intrafamily and intragenomic conflicts in relation to warfare; intragenomic conflict drives parent-of-origin-specific patterns of gene expression—i.e. ‘genomic imprinting’—in relation to warfare phenotypes; and an ecological perspective of conflicts at the levels of the gene, individual, and social group yields novel predictions as to pathologies associated with mutations and epimutations at loci underpinning human violence. PMID:28228515

  7. Intrafamily and intragenomic conflicts in human warfare.

    PubMed

    Micheletti, Alberto J C; Ruxton, Graeme D; Gardner, Andy

    2017-02-22

    Recent years have seen an explosion of multidisciplinary interest in ancient human warfare. Theory has emphasized a key role for kin-selected cooperation, modulated by sex-specific demography, in explaining intergroup violence. However, conflicts of interest remain a relatively underexplored factor in the evolutionary-ecological study of warfare, with little consideration given to which parties influence the decision to go to war and how their motivations may differ. We develop a mathematical model to investigate the interplay between sex-specific demography and human warfare, showing that: the ecology of warfare drives the evolution of sex-biased dispersal; sex-biased dispersal modulates intrafamily and intragenomic conflicts in relation to warfare; intragenomic conflict drives parent-of-origin-specific patterns of gene expression-i.e. 'genomic imprinting'-in relation to warfare phenotypes; and an ecological perspective of conflicts at the levels of the gene, individual, and social group yields novel predictions as to pathologies associated with mutations and epimutations at loci underpinning human violence. © 2017 The Authors.

  8. Replication Does Survive Information Warfare Attacks

    DTIC Science & Technology

    1997-01-01

    warfare, storage jamming, unauthorized modification, Trojan horse 1 INTRODUCTION Ammann, Jajodia, McCollum, and Blaustein define information warfare as the...information warfare, and we adopt the latter term. To provide context, Amman et al. specifically do not consider Trojan horses within the database system...called internal jammers (McDermott and Goldschalg, 1996b)), but instead consider a wide range of attacks other than Trojan horses . Both groups agree that

  9. 14th Annual Expeditionary Warfare Conference

    DTIC Science & Technology

    2009-11-19

    Untitled Document 2009expedition.html[5/12/2016 8:33:22 AM] 14th ANNUAL EXPEDITIONARY WARFARE CONFERENCE “Expeditionary Warfare in a Complex Joint...WWW.NDIA.ORG/MEETINGS/0700 “Expeditionary Warfare in a Complex Joint Operating Environment” BAY POINT MARRIOTT HOTEL, PANAMA CITY, FL...Focus: The purpose of the Quadrennial Defense Review (QDR) is to determine the nation’s defense strategy and establish a defense program for

  10. Electronic Warfare for Cyber Warriors

    DTIC Science & Technology

    2008-06-01

    This research paper provides complete course content for the AFIT EENG 509, Electronic Warfare class. It is intended as a replacement for the existing course and designed for Intermediate Developmental Education (IDE) students in the Cyber Warfare degree program. This course provides relevant academic courseware and study material to give cyber warriors an academic and operational perspective on electronic warfare and its integration in the cyber domain.

  11. U.S. Command Relationships in the Conduct of Cyber Warfare: Establishment, Exercise, and Institutionalization of Cyber Coordinating Authority

    DTIC Science & Technology

    2010-05-03

    FINAL 3. DATES COVERED (From - To) 4. TITLE AND SUBTITLE U.S. Command Relationships in the Conduct of Cyber Warfare : Establishment...U.S. Command Relationships in the Conduct of Cyber Warfare : Establishment, Exercise, and Institutionalization of Cyber Coordinating Authority...Relationships in the Conduct of Cyber Warfare : Establishment, Exercise, and Institutionalization of Cyber Coordinating Authority The character of

  12. Remote sensing of chemical warfare agent by CO2 -lidar

    NASA Astrophysics Data System (ADS)

    Geiko, Pavel P.; Smirnov, Sergey S.

    2014-11-01

    The possibilities of remote sensing of chemical warfare agent by differential absorption method were analyzed. The CO2 - laser emission lines suitable for sounding of chemical warfare agent with provision for disturbing absorptions by water vapor were choose. The detection range of chemical warfare agents was estimated for a lidar based on CO2 - laser The other factors influencing upon echolocation range were analyzed.

  13. 33 CFR 165.1103 - Security Zone; Naval Mine Anti Submarine Warfare Command; San Diego Bay, San Diego, CA.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... Submarine Warfare Command; San Diego Bay, San Diego, CA. 165.1103 Section 165.1103 Navigation and Navigable... Eleventh Coast Guard District § 165.1103 Security Zone; Naval Mine Anti Submarine Warfare Command; San... the Naval Mine Anti Submarine Warfare Command, bound by the following coordinates: 32°43′40.9″ N, 117...

  14. Electronic Warfare Closed Loop Laboratory (EWCLL) Antenna Motor Software and Hardware Development

    DTIC Science & Technology

    2016-09-01

    ARL-TN-0779 ● SEP 2016 US Army Research Laboratory Electronic Warfare Closed Loop Laboratory (EWCLL) Antenna Motor Software and...Electronic Warfare Closed Loop Laboratory (EWCLL) Antenna Motor Software and Hardware Development by Neal Tesny Sensors and Electron Devices Directorate...TITLE AND SUBTITLE Electronic Warfare Closed Loop Laboratory (EWCLL) Antenna Motor Software and Hardware Development 5a. CONTRACT NUMBER 5b

  15. Mammalian Toxicology Testing: Problem Definition Study, Global Army Toxicology Requirements.

    DTIC Science & Technology

    1981-03-01

    Electronic Warfare Equipment (D251) Tactical ECK System (64750A) Protective Electronic Warfare Equipment (D540) High Energy Electromagnetic Radiation...Fighting Portable Weapon (for IFV) Smoke Grenade Launcher Staff Smart, Target-Activated Fire-and-Forget Tactical ECK System (63755A) Protective Electronic...Warfare Equipment (D251) Tactical ECK System (64750A) Protective Electronic Warfare Equipment (D540) High Energy Electromagnetic Radiation Weapons (e.g

  16. Chemical weapons: documented use and compounds on the horizon.

    PubMed

    Bismuth, Chantal; Borron, Stephen W; Baud, Frederic J; Barriot, Patrick

    2004-04-01

    Man's inhumanity to man is expressed through a plethora of tools of modern warfare and terror. The use of chemical and biological weapons with the goals of assault, demoralisation and lethality has been documented in recent history, both on the battlefield and in urban terror against civilians. A general review of a few of the currently employed chemical weapons and biological toxins, along with a look at potential chemical weapons and tools of counter-terrorism, follows. While these weapons are fearsome elements, the dangers should be viewed in the context of the widespread availability and efficacy of conventional weapons.

  17. Quick response airborne command post communications

    NASA Astrophysics Data System (ADS)

    Blaisdell, Randy L.

    1988-08-01

    National emergencies and strategic crises come in all forms and sizes ranging from natural disasters at one end of the scale up to and including global nuclear warfare at the other. Since the early 1960s the U.S. Government has spent billions of dollars fielding airborne command posts to ensure continuity of government and the command and control function during times of theater conventional, theater nuclear, and global nuclear warfare. Unfortunately, cost has prevented the extension of the airborne command post technology developed for these relatively unlikely events to the lower level, though much more likely to occur, crises such as natural disasters, terrorist acts, political insurgencies, etc. This thesis proposes the implementation of an economical airborne command post concept to address the wide variety of crises ignored by existing military airborne command posts. The system is known as the Quick Response Airborne Command Post (QRAC Post) and is based on the exclusive use of commercially owned and operated aircraft, and commercially available automated data processing and communications resources. The thesis addresses the QRAC Post concept at a systems level and is primarily intended to demonstrate how current technology can be exploited to economically achieve a national objective.

  18. The Characterization and Measurement of Cyber Warfare, Spring 2008 - Project 08-01

    DTIC Science & Technology

    2008-05-01

    Global Innovation and Strategy Center The Characterization and Measurement of Cyber Warfare Spring 2008 – Project 08-01 May 2008...and Measurement of Cyber Warfare N/A N/A N/A 08-01Dobitz, Kyle Haas, Brad Holtje, Michael Jokerst, Amanda Ochsner, Geoff Silva, Stephanie...research team as critical for purposes of cyber act characterization: Motivation, Intent, Target, Effects, and Actors. cyberspace, cyber warfare , targets

  19. Refocusing Cyber Warfare Thought

    DTIC Science & Technology

    2013-02-01

    January–February 2013 Air & Space Power Journal | 44 FeatureCyber Focus Refocusing Cyber Warfare Thought Maj Sean C. Butler, USAF In September 2007...1. REPORT DATE FEB 2013 2. REPORT TYPE 3. DATES COVERED 00-00-2013 to 00-00-2013 4. TITLE AND SUBTITLE Refocusing Cyber Warfare Thought 5a...2013 Air & Space Power Journal | 45 Butler Refocusing Cyber Warfare Thought FeatureCyber Focus characterized by the use of electronics and the

  20. Nodes and Codes: The Reality of Cyber Warfare

    DTIC Science & Technology

    2012-05-17

    Nodes and Codes explores the reality of cyber warfare through the story of Stuxnet, a string of weaponized code that reached through a domain...nodes. Stuxnet served as a proof-of-concept for cyber weapons and provided a comparative laboratory to study the reality of cyber warfare from the...military powers most often associated with advanced, offensive cyber attack capabilities. The reality of cyber warfare holds significant operational

  1. Cyberspace as a Complex Adaptive System and the Policy and Operational Implications for Cyber Warfare

    DTIC Science & Technology

    2014-05-22

    CYBERSPACE AS A COMPLEX ADAPTIVE SYSTEM AND THE POLICY AND OPERTIONAL IMPLICATIONS FOR CYBER WARFARE A Monograph by Major Albert O. Olagbemiro...serves the US, especially in regards to the protect ion o f the 1S. SUBJECT TERMS omplex Adaptive System, Cyberspace, lnfosphere, Cyber Warfare ber...System and the Policy and Operational Implications for Cyber Warfare Approved by: __________________________________, Monograph Director Jeffrey

  2. Warfighting in Cyberspace

    DTIC Science & Technology

    2007-01-01

    warfare ). Although the defensive elements of IO and cyber warfare are important, to narrow the scope of our thesis, the remainder of the argu- ment...adversary decisions away from taking action against our will. Now, let us contrast IO doctrine with what we propose for cyber warfare . The focus of... cyber warfare is on using cyberspace (by operating within or through it) to attack personnel, facilities, or equipment with the intent of degrading

  3. Defending Our Satellites: The Need for Electronic Warfare Education and Training

    DTIC Science & Technology

    2015-12-01

    intercept Allied bombers attacking at night.9 As a result of the electronic warfare advantage that systems like Window and Airborne Cigar be- stowed...74 | Air & Space Power Journal Defending Our Satellites The Need for Electronic Warfare Education and Training Lt Col E. Lincoln Bonner, USAF...expanding education and training in the use of electronic warfare to defend US satellites and improve their survivability. The following discussion

  4. Highlights of the Department of the Navy FY 2013 Budget

    DTIC Science & Technology

    2012-02-01

    ability to perform undersea warfare to include high altitude launched torpedo capability, surface warfare and ISR missions make it a critical force...60B and SH-60F helicopters, whose primary mission areas are undersea warfare and surface warfare. This platform will have numerous capability...sensors to detect, localize, classify and identify undersea threats at a safe distance from friendly ships. The Remote Multi-Mission Vehicle provides

  5. Remaining Relevant: Historical Contributions, Civil-Military Challenges, and Anti-Submarine Warfare Capabilities on Coast Guard Cutters

    DTIC Science & Technology

    2018-03-01

    HISTORICAL CONTRIBUTIONS, CIVIL-MILITARY CHALLENGES, AND ANTI-SUBMARINE WARFARE CAPABILITIES ON COAST GUARD CUTTERS by Brian A. Smicklas...CONTRIBUTIONS, CIVIL- MILITARY CHALLENGES, AND ANTI-SUBMARINE WARFARE CAPABILITIES ON COAST GUARD CUTTERS 5. FUNDING NUMBERS 6. AUTHOR(S) Brian A...MILITARY CHALLENGES, AND ANTI-SUBMARINE WARFARE CAPABILITIES ON COAST GUARD CUTTERS Brian A. Smicklas Commander, U.S. Coast Guard B.S., Coast

  6. The Art of Aerial Warfare

    DTIC Science & Technology

    2005-03-01

    14 3 THE POLITICAL DIMENSIONS OF AERIAL WARFARE . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17 How Political Effects in...Aerial Warfare . . . . . . Outweigh Military Effects . . . . . . . . . . . . . . . 19 Political Targets Versus Military Targets . . . . . 22...34 4 MILITARY AND POLITICAL EFFECTS OF STRATEGIC ATTACK . . . . . . . . . . . . . . . . . . 35 The Premise of

  7. On adaptive robustness approach to Anti-Jam signal processing

    NASA Astrophysics Data System (ADS)

    Poberezhskiy, Y. S.; Poberezhskiy, G. Y.

    An effective approach to exploiting statistical differences between desired and jamming signals named adaptive robustness is proposed and analyzed in this paper. It combines conventional Bayesian, adaptive, and robust approaches that are complementary to each other. This combining strengthens the advantages and mitigates the drawbacks of the conventional approaches. Adaptive robustness is equally applicable to both jammers and their victim systems. The capabilities required for realization of adaptive robustness in jammers and victim systems are determined. The employment of a specific nonlinear robust algorithm for anti-jam (AJ) processing is described and analyzed. Its effectiveness in practical situations has been proven analytically and confirmed by simulation. Since adaptive robustness can be used by both sides in electronic warfare, it is more advantageous for the fastest and most intelligent side. Many results obtained and discussed in this paper are also applicable to commercial applications such as communications in unregulated or poorly regulated frequency ranges and systems with cognitive capabilities.

  8. Development of JSDF Cyber Warfare Defense Critical Capability

    DTIC Science & Technology

    2010-03-01

    attack identification capability is essential for a nation to defend her vital infrastructures against offensive cyber warfare . Although the necessity of...cyber-attack identification capability is quite clear, the Japans preparation against cyber warfare is quite limited.

  9. 15th Annual Expeditionary Warfare Conference - Expeditionary Operations - What’s Next

    DTIC Science & Technology

    2010-10-07

    00 PM - 5:00 PM Mine Warfare Capabilities Essential for Expeditionary Warfare Salon 1 (limited to first 120 registrants) Session Focus...have priority – Requires additional conceptual development, gaming & exercises Questions? 23

  10. CYBER WARFARE GOVERNANCE: EVALUATION OF CURRENT INTERNATIONAL AGREEMENTS ON THE OFFENSIVE USE OF CYBER

    DTIC Science & Technology

    2015-10-01

    AIR COMMAND AND STAFF COLLEGE DISTANCE LEARNING AIR UNIVERSITY CYBER WARFARE GOVERNANCE: EVALUATION OF CURRENT INTERNATIONAL AGREEMENTS ON THE...order to prevent catastrophic second and third order effects. Rule 43 “prohibits means or methods of cyber warfare that indiscriminate by nature...Means and methods of cyber warfare are indiscriminate by nature if they cannot be: directed at a specific military objective, or limited in their

  11. Cyber Warfare: A Need for Beyond Goldwater-Nichols

    DTIC Science & Technology

    2011-05-13

    of Military Studies Research Paper September 2010- May 2011 4. TITLE AND SUBTITLE 5a. CONTRACT NUMBER Cyber Warfare : "A Need for Beyond Goldwater...22134-5068 MASTER OF MlLIT AR Y STUDJES Cyber Warfare : "A Need for Beyond Goldwater Nichols" SlffiMITTED IN PARTIAL FULFitLMENT OF THE...DOCUMENT IS PERMITTED PROVIDED PROPER ACKNOWLEDGEMENT IS MADE.· l . ii EXECUTIVE SUMMARY Title: Cyber Warfare : "A Need for Beyond Goldwater Nichols

  12. Civil Affairs in Unconventional Warfare

    DTIC Science & Technology

    2013-05-23

    goals as Mao Tse -tung states, “Military action is a method used to attain a political goal. While military affairs and political affairs are not...OSS to Green Beret: The Birth at Special Forces (Novato, CA: Presidio Press, 1986), 149-51. 25Mao Tse -tung, On Guerrilla Warfare (New York: Classic...House Books, 2009), 39. 26David Galula, Counterinsurgency Warfare, 4; and Mao Tse -tung, On Guerrilla Warfare, 3-4. 27Ibid., 12-13. 28Ibid

  13. Piezocomposites for Active Surface Control

    DTIC Science & Technology

    1999-01-19

    and the Underwater Sound Reference Detachment (USRD) in Orlando, FL. During the period of the program, USRD became part of the Naval Undersea Warfare...Appendix B DEPARTMENT OF THE NAVY NAVAL UNDERSEA WARFARE CENTER 1176 HOWELL STREET NEWPORT Rl 02«41-170i NAVAL UNDERSEA WARFARE CENTER...dissemination only as directed by Commanding Officer, Naval Undersea Warfare Center (18 AUG i99o ) or higher DoD authority. Page 1 of 1 USRD CALIBRATION

  14. Chemical warfare and the Gulf War: a review of the impact on Gulf veterans' health.

    PubMed

    Riddle, James R; Brown, Mark; Smith, Tyler; Ritchie, Elspeth Cameron; Brix, Kelley Ann; Romano, James

    2003-08-01

    It is unlikely that Gulf War veterans are suffering chronic effects from illnesses caused by chemical warfare nerve agent exposure. Extensive investigation and review by several expert panels have determined that no evidence exists that chemical warfare nerve agents were used during the Gulf War. At no time before, during, or after the war was there confirmation of symptoms among anyone, military or civilian, caused by chemical warfare nerve agent exposure. However, studies of Gulf War veterans have found belief that chemical weapons were used, significantly associated with both severe and mild-moderate illnesses. The psychological impact of a chemical warfare attack, either actual or perceived, can result in immediate and long-term health consequences. The deployment or war-related health impact from life-threatening experiences of the Gulf War, including the perceived exposure to chemical warfare agents, should be considered as an important cause of morbidity among Gulf War veterans.

  15. Maneuver Warfare in Cyberspace

    DTIC Science & Technology

    1997-01-01

    government departments and agencies; (2) National security and military strategies must outline a response to the threats and opportunities of cyber ... warfare ; and (3) the Department of Defense’s offensive and defensive responsibilities, parameters, and capabilities for strategic information warfare need

  16. Cyber Power in the 21st Century

    DTIC Science & Technology

    2008-12-01

    Cyber Warfare .................................................................86 V. Conclusions and Recommendations...40 2 – Asymmetric Effects of Cyber Warfare ........................................................................41 1 CYBER POWER... cyber warfare capabilities with other elements of national power, as evidenced by the concept of “informationization” (xinxihua) put forward in

  17. Difficult Decisions: Chemical Warfare.

    ERIC Educational Resources Information Center

    Slesnick, Irwin L.; Miller, John A.

    1988-01-01

    Gives the background history and chemistry of modern day chemical warfare from World War I to the present. Provides discussion questions to stimulate deeper thinking on the issue. Contains a discussion activity called "Can New Chemical Weapons Lead to Humane Warfare?" (CW)

  18. Technological advancements for the detection of and protection against biological and chemical warfare agents.

    PubMed

    Eubanks, Lisa M; Dickerson, Tobin J; Janda, Kim D

    2007-03-01

    There is a growing need for technological advancements to combat agents of chemical and biological warfare, particularly in the context of the deliberate use of a chemical and/or biological warfare agent by a terrorist organization. In this tutorial review, we describe methods that have been developed both for the specific detection of biological and chemical warfare agents in a field setting, as well as potential therapeutic approaches for treating exposure to these toxic species. In particular, nerve agents are described as a typical chemical warfare agent, and the two potent biothreat agents, anthrax and botulinum neurotoxin, are used as illustrative examples of potent weapons for which countermeasures are urgently needed.

  19. Chemical and biological warfare: General studies. (Latest citations from the NTIS bibliographic database). NewSearch

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Not Available

    1994-10-01

    The bibliography contains citations concerning federally sponsored and conducted studies into chemical and biological warfare operations and planning. These studies cover areas not addressed in other parts of this series. The topics include production and storage of agents, delivery techniques, training, military and civil defense, general planning studies, psychological reactions to chemical warfare, evaluations of materials exposed to chemical agents, and studies on banning or limiting chemical warfare. Other published searches in this series on chemical warfare cover detection and warning, defoliants, protection, and biological studies, including chemistry and toxicology. (Contains 250 citations and includes a subject term index andmore » title list.)« less

  20. Chemical and biological warfare: General studies. (Latest citations from the NTIS bibliographic database). Published Search

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    NONE

    1997-11-01

    The bibliography contains citations concerning federally sponsored and conducted studies into chemical and biological warfare operations and planning. These studies cover areas not addressed in other parts of this series. The topics include production and storage of agents, delivery techniques, training, military and civil defense, general planning studies, psychological reactions to chemical warfare, evaluations of materials exposed to chemical agents, and studies on banning or limiting chemical warfare. Other published searches in this series on chemical warfare cover detection and warning, defoliants, protection, and biological studies, including chemistry and toxicology.(Contains 50-250 citations and includes a subject term index and titlemore » list.) (Copyright NERAC, Inc. 1995)« less

  1. Chemical and biological warfare: General studies. (Latest citations from the NTIS bibliographic database). Published Search

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    NONE

    1996-10-01

    The bibliography contains citations concerning federally sponsored and conducted studies into chemical and biological warfare operations and planning. These studies cover areas not addressed in other parts of this series. The topics include production and storage of agents, delivery techniques, training, military and civil defense, general planning studies, psychological reactions to chemical warfare, evaluations of materials exposed to chemical agents, and studies on banning or limiting chemical warfare. Other published searches in this series on chemical warfare cover detection and warning, defoliants, protection, and biological studies, including chemistry and toxicology. (Contains 50-250 citations and includes a subject term index andmore » title list.) (Copyright NERAC, Inc. 1995)« less

  2. Chemical and biological warfare: General studies. (Latest citations from the NTIS bibliographic database). Published Search

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    NONE

    1995-09-01

    The bibliography contains citations concerning federally sponsored and conducted studies into chemical and biological warfare operations and planning. These studies cover areas not addressed in other parts of this series. The topics include production and storage of agents, delivery techniques, training, military and civil defense, general planning studies, psychological reactions to chemical warfare, evaluations of materials exposed to chemical agents, and studies on banning or limiting chemical warfare. Other published searches in this series on chemical warfare cover detection and warning, defoliants, protection, and biological studies, including chemistry and toxicology.(Contains 50-250 citations and includes a subject term index and titlemore » list.) (Copyright NERAC, Inc. 1995)« less

  3. Air & Space Power Journal. Volume 22, Number 3, Fall 2008

    DTIC Science & Technology

    2008-09-01

    PHd, UsaF, retired* Red Flag exercises, well known as training components of air warfare, will also become a staple of cyber warfare . —Former...it wishes to meet former secretary Wynne’s vision of a significantly enhanced cyber - warfare environ­ ment. This change is so monumental that full...this reviewer’s judgment, only one area does not receive adequate examination: cyber warfare . Although Drew and Snow make note of it in several

  4. RFID as a Tool in Cyber Warfare

    DTIC Science & Technology

    2010-11-01

    RTO-MP-IST-091 P4 - 1 RFID as a Tool in Cyber Warfare Mikko Kiviharju P.O.Box 10 FIN-11311 Riihimaki FINLAND mikko.kiviharju@mil.fi...auditing existing systems and planning new establishments. 1 INTRODUCTION Cyber warfare , especially computer network operations (CNO) have a deep...SUBTITLE RFID as a Tool in Cyber Warfare 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER 6. AUTHOR(S) 5d. PROJECT NUMBER 5e. TASK

  5. Cyber Warfare as an Operational Fire

    DTIC Science & Technology

    2010-04-03

    This paper explores cyber warfare as an option for creating operational fires effects. Initially, cyberspace is defined and explained from the...fires are defined and the advantages of their use are explained. From there, discussion focuses on how cyber warfare fulfills the purposes of...operational fires. Finally, the paper draws conclusions about the viability of cyber warfare as an operational fire and makes recommendations about how to prioritize the activities of the newly approved U.S. Cyber Command.

  6. Emerging Roles of Combat Communication Squadrons in Cyber Warfare as Related to Computer Network Attack, Defense and Exploitation

    DTIC Science & Technology

    2011-06-01

    EMERGING ROLES OF COMBAT COMMUNICATION SQUADRONS IN CYBER WARFARE AS RELATED TO COMPUTER NETWORK ATTACK, DEFENSE AND EXPLOITATION GRADUATE RESEARCH...Communication Squadrons in Cyber Warfare as Related to Computer Network Attack, Defense and Exploitation GRADUATE RESEARCH PROJECT Presented to the Faculty...Education and Training Command In Partial Fulfillment of the Requirements for the Degree of Master of Cyber Warfare Michael J. Myers Major, USAF June 2011

  7. Counter-Unmanned Aerial Vehicle Warfare: Kill Authorizations for the Carrier Strike Group

    DTIC Science & Technology

    2016-06-10

    COUNTER-UNMANNED AERIAL VEHICLE WARFARE: KILL AUTHORIZATIONS FOR THE CARRIER STRIKE GROUP A thesis presented to the Faculty...the Carrier Strike Group 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER 6. AUTHOR(S) LCDR Joshua C. Mattingly, U.S...including armed UAVs in an offensive role, but counter- UAV warfare is a new warfare area within the larger realm of air defense. Small Group 1 and 2

  8. Warfare or partnership: which way for health care?

    PubMed

    MacStravic, R S

    1990-01-01

    There are many voices urging health care organizations to adopt aggressive competitive warfare, but a careful look at the dynamics affecting health care suggests that partnership may be at least as promising a strategy as warfare to promote mission and survival.

  9. Cyber Warfare: Protecting Military Systems

    DTIC Science & Technology

    2000-01-01

    Software is a key component in nearly every critical system used by the Department of Defense. Attacking the software in a system- cyber warfare - is a...revolutionary method of pursuing war. This article describes various cyber warfare approaches and suggests methods to counter them.

  10. Biological warfare agents

    PubMed Central

    Thavaselvam, Duraipandian; Vijayaraghavan, Rajagopalan

    2010-01-01

    The recent bioterrorist attacks using anthrax spores have emphasized the need to detect and decontaminate critical facilities in the shortest possible time. There has been a remarkable progress in the detection, protection and decontamination of biological warfare agents as many instrumentation platforms and detection methodologies are developed and commissioned. Even then the threat of biological warfare agents and their use in bioterrorist attacks still remain a leading cause of global concern. Furthermore in the past decade there have been threats due to the emerging new diseases and also the re-emergence of old diseases and development of antimicrobial resistance and spread to new geographical regions. The preparedness against these agents need complete knowledge about the disease, better research and training facilities, diagnostic facilities and improved public health system. This review on the biological warfare agents will provide information on the biological warfare agents, their mode of transmission and spread and also the detection systems available to detect them. In addition the current information on the availability of commercially available and developing technologies against biological warfare agents has also been discussed. The risk that arise due to the use of these agents in warfare or bioterrorism related scenario can be mitigated with the availability of improved detection technologies. PMID:21829313

  11. The Impacts of Modern Warfare on Freshwater Ecosystems

    NASA Astrophysics Data System (ADS)

    Francis, Robert A.

    2011-11-01

    There is increasing recognition and concern regarding the impacts of modern industrial warfare on the environment. Freshwater ecosystems are perhaps the most vulnerable to warfare-related impacts, which is of concern given that they provide so many essential environmental resources and services to society. Despite this, there has been little work to establish and quantify the types of impacts (both negative and positive) that warfare may have on such systems. This paper firstly highlights why rivers and lakes may be susceptible to warfare-related impacts, before synthesizing the available literature to explore the following main themes: intensification of wartime resource acquisition, use of water as an offensive or defensive weapon, direct and indirect effects of explosive ordnance, increased pollution, introduction of invasive alien species, and positive ecological impacts. This is then followed by a discussion of the implications of such impacts in relation to future warfare, including a consideration of the efficacy of existing legal instruments to protect the environment during conflict, and the trend for war to become more localized and `informal', and therefore less regulated. Finally, the paper identifies key research foci for understanding and mitigating the effects of warfare on freshwater ecosystems.

  12. Coalition FORCEnet Implementation Analysis

    DTIC Science & Technology

    2006-09-01

    C2 grid, and Engagement grid. As a result, enabled Network- Centric warfare for Coalition Forces shows a significant increase in capabilities. Joint...209 14. SUBJECT TERMS FORCEnet, Coalition Forces, AUSCANNZUKUS, Network- Centric Warfare (NCW), Data Mining, EXTEND Modeling, Expeditionary...NETWORK- CENTRIC WARFARE AND FORCENET .....................................................................................................1 B

  13. Summary of Research 1998, Interdisciplinary Academic Groups

    DTIC Science & Technology

    1999-08-01

    Seismic Sonar, Biosonar SEISMO ACOUSTIC DETECTION OF MINES BURIED IN THE SURF ZONE Thomas Muir, Chair of Mine Warfare Undersea Warfare Academic Group...Mine Warfare KEYWORDS: Mining, Mine Countermeasures, Surf Zone, Seismic Sonar, Biosonar PHYSICS OF SEISMIC INTERFACE WAVES IN THE SURF ZONE

  14. History of the Chemical Warfare Service in World War II. Biological Warfare Research in the United States, Volume 2

    DTIC Science & Technology

    1947-11-01

    of proteins and other substances of high molecular weight derived from bacteria, or from natural products with antibacterial activity Proteins and...WARFARE RESEARCH IS THE UNITED r STATES, is one of a series of historical monographs on the research and development activities of the Chemical...TSC Committee 16 War Research Service 13 A5C Committee •• 21 CWS Activities Under TSRS 22 Transfer of Biological Warfare Program to TTar

  15. Bridging the Gap in the Realm of Information Dominance: A Concept of Operations for the Naval Postgraduate School Center for Cyber Warfare

    DTIC Science & Technology

    2010-09-01

    THE REALM OF INFORMATION DOMINANCE : A CONCEPT OF OPERATIONS FOR THE NAVAL POSTGRADUATE SCHOOL CENTER FOR CYBER WARFARE by Cynthia R. Duke...Bridging the Gap in the Realm of Information Dominance : A Concept of Operations for the Naval Postgraduate School Center for Cyber Warfare 6...of importance to the U.S. Military service and its allies. 15. NUMBER OF PAGES 102 14. SUBJECT TERMS Cyber Warfare, Information Dominance 16

  16. USAF Cyber Capability Development: A Vision for Future Cyber Warfare & a Concept for Education of Cyberspace Leaders

    DTIC Science & Technology

    2009-04-01

    Significant and interrelated problems are hindering the Air Force’s development of cyber warfare capabilities. The first is a lack of awareness about...why the AF has chosen to take cyber warfare on as a core capability on par with air and space. The second stems from the lack of a commonly...the cyber capabilities needed in the future? The contributions of this research include a strategic vision for future cyber warfare capabilities that

  17. Capability of the People’s Republic of China to Conduct Cyber Warfare and Computer Network Exploitation

    DTIC Science & Technology

    2009-10-09

    Capability of the People’s Republic of China to Conduct Cyber Warfare and Computer Network Exploitation Prepared for The US-China Economic and...the People?s Republic of China to Conduct Cyber Warfare and Computer Network Exploitation 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM ELEMENT...Capability of the People’s Republic of China to Conduct Cyber Warfare and Computer Network Exploitation 2 US-China Economic and Security Review

  18. Application of Solid Phase Microextraction Coupled with Gas Chromatography/Mass Spectrometry as a Rapid Method for Field Sampling and Analysis of Chemical Warfare Agents and Toxic Industrial Chemicals

    DTIC Science & Technology

    2003-01-01

    PHASE MICROEXTRACTION COUPLED WITH GAS CHROMATOGRAPHY/MASS SPECTROMETRY AS A RAPID METHOD FOR FIELD SAMPLING AND ANALYSIS OF CHEMICAL WARFARE AGENTS...SAMPLING AND ANALYSIS OF CHEMICAL WARFARE AGENTS AND TOXIC INDUSTRIAL CHEMICALS 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER 6...GAS CHROMATOGRAPHY/MASS SPECTROMETRY AS A RAPID METHOD FOR FIELD SAMPLING AND ANALYSIS OF CHEMICAL WARFARE AGENTS AND TOXIC INDUSTRIAL CHEMICALS

  19. Status of dental health in chemical warfare victims: the case of Isfahan, Iran.

    PubMed

    Mottaghi, Ahmad; Hoseinzade, Abolfath; Zamani, Elham; Araghizade, Habib Allah

    2012-01-01

    Little evidence is available regarding the dental health of victims of chemical warfare in Iran. Therefore, in this study, we examined the decayed, missing, and filled teeth index (DMFT), community periodontal index of treatment needs (CPITN), and saliva secretion rate of chemical warfare victims living in the province of Isfahan in Iran. This case-control study was conducted with 300 chemical warfare victims as the treatment group and 300 age-matched individuals without exposure to chemical warfare as the control group. DMFT and CPITN indices and saliva secretion rate were measured and compared between the two groups. Chemical warfare victims had significantly higher scores than the control group for decayed teeth (4.25 ± 3.88 vs 3.52 ± 2.81; P=0.009), missing teeth (8.79 ± 9.3 vs 6.15 ± 8.43; P<0.001), total DMFT index (17.00 ± 6.72 vs 13.20 ± 6.89; P<0.001), and CPTIN (2.81 ± 0.81 vs 1.71 ± 1.04; P<0.001). However, no significant difference was observed between the two groups in filled teeth (4.00 ± 4.2 vs 3.59 ± 2.48; P=0.148). The level of saliva secretion in warfare victims was significantly lower than that in the control group (1.71 ± 0.05 vs 3.85 ± 1.95 cc/5 min; P<0.001). Chemical warfare victims have relatively poor dental/oral health. Chemical injury might cause a dysfunction in saliva secretion, with decrease in saliva secretion increasing the risk for tooth decay and periodontal disorders. Further research is required to find out the exact underlying mechanisms and the factors associated with poor dental/oral health in chemical warfare victims.

  20. "No practical capabilities": American biological and chemical warfare programs during the Korean war.

    PubMed

    Crane, Conrad C

    2002-01-01

    Much controversy still surrounds accusations that American forces in the Far East during the Korean War used biological warfare against North Korea and China. An analysis of recently declassified documents reveals that, although the United States attempted to accelerate its development and acquisition of such weapons during that period, its efforts to create a viable biological warfare capability were unsuccessful. Plans to similarly expand chemical warfare stocks and capabilities were also frustrated. Technological difficulties, personnel shortages, bureaucratic battles between the armed services, and policy limitations combined to hold back advances in American chemical and biological warfare. In light of the recent fears of terrorist attacks with such weapons, this analysis highlights the great difficulties involved in developing, acquiring, and delivering such capabilities.

  1. Establishing a Cyber Warrior Force

    DTIC Science & Technology

    2004-09-01

    Cyber Warfare is widely touted to be the next generation of warfare. As America’s reliance on automated systems and information technology increases...so too does the potential vulnerability to cyber attack. Nation and non-nation states are developing the capability to wage cyber warfare . Historically

  2. Detecting Biological Warfare Agents

    PubMed Central

    Song, Linan; Ahn, Soohyoun

    2005-01-01

    We developed a fiber-optic, microsphere-based, high-density array composed of 18 species-specific probe microsensors to identify biological warfare agents. We simultaneously identified multiple biological warfare agents in environmental samples by looking at specific probe responses after hybridization and response patterns of the multiplexed array. PMID:16318712

  3. Accurate positioning based on acoustic and optical sensors

    NASA Astrophysics Data System (ADS)

    Cai, Kerong; Deng, Jiahao; Guo, Hualing

    2009-11-01

    Unattended laser target designator (ULTD) was designed to partly take the place of conventional LTDs for accurate positioning and laser marking. Analyzed the precision, accuracy and errors of acoustic sensor array, the requirements of laser generator, and the technology of image analysis and tracking, the major system modules were determined. The target's classification, velocity and position can be measured by sensors, and then coded laser beam will be emitted intelligently to mark the excellent position at the excellent time. The conclusion shows that, ULTD can not only avoid security threats, be deployed massively, and accomplish battle damage assessment (BDA), but also be fit for information-based warfare.

  4. Surface Warfare Officers Initial Training For Future Success

    DTIC Science & Technology

    2018-03-01

    updating and creating learning modules and Surface Warfare Officer School (SWOS) staffing as well as weaknesses in the methodologies used for...and Surface Warfare Officer School (SWOS) staffing as well as weaknesses in the methodologies used for training. We conclude that the Basic Division... METHODOLOGY ....................................................................................9 1. Staff Interviews

  5. A Deeper Level of Network Intelligence: Combating Cyber Warfare

    DTIC Science & Technology

    2010-04-01

    A Deeper Level of Network Intelligence: Combating Cyber Warfare This information is provided for your review only and is not for any distribution...A Deeper Level of Network Intelligence: Combating Cyber Warfare 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER 6. AUTHOR(S) 5d

  6. LESSONS FROM THE FRONT: A CASE STUDY OF RUSSIAN CYBER WARFARE

    DTIC Science & Technology

    2015-12-01

    Lessons From The Front: A Case Study Of Russian Cyber Warfare looks to capitalize on the lessons learned from the alleged Russian cyber-offensive on...through the careful analysis and comparison of two disparate conflicts related by their collision with Russian cyber - warfare . Following case study

  7. The Implications of Preemptive and Preventive War Doctrines: A Reconsideration

    DTIC Science & Technology

    2007-07-01

    geopolitics, ideology , and personality as combining to produce the fatal brew which resulted in 42 years of nuclear shadowed global menace.26 But...preventive war. 49 1. Preventive war is war, and preventive warfare is warfare. It is not a distinctive genus of war and warfare. The distinguishing

  8. 15 CFR 742.2 - Proliferation of chemical and biological weapons.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... in ECCN 1C350 (precursor and intermediate chemicals used in the production of chemical warfare agents... on the CCL, chemical detection systems controlled by 1A004.c for detecting chemical warfare agents... used in the production of chemical weapons precursors or chemical warfare agents. (vii) Equipment and...

  9. J. F. C. Fuller: His Methods, Insights, and Vision

    DTIC Science & Technology

    1999-04-01

    contributed immensely to the body of knowledge concerning warfare. As a military scientist, MG Fuller attempted to do for warfare what Copernicus did for... astronomy , Newton for physics, and Darwin for natural history: establish a higher order for the study warfare based on scientific analysis and methods

  10. Biodegradation of Organophosphate Chemical Warfare Agents by Activated Sludge

    DTIC Science & Technology

    2012-03-01

    Holmstedt, B. (1963). Structure- activity relationships of the organophosphorus anticholinesterase agents. In: Koelle, G.B. (ed.), Handbuch...BIODEGRADATION OF ORGANOPHOSPHATE CHEMICAL WARFARE AGENTS BY ACTIVATED SLUDGE Steven J. Schuldt...AFIT/GES/ENV/12-M04 BIODEGRADATION OF ORGANOPHOSPHATE CHEMICAL WARFARE AGENTS BY ACTIVATED SLUDGE THESIS Presented to the

  11. Examining U.S. Irregular Warfare Doctrine

    DTIC Science & Technology

    2008-06-01

    48 Future Theories ...Questions, and Hypotheses The classic warfare theories (i.e. Sun Tzu, Clausewitz, and so forth) directly apply to this research since they form the...Tzu, their theories on the conduct of warfare, and its close tie to politics, form the basis for examining the content of the manuals. The Marine

  12. Technical Support Services for the Office of Naval Research Littoral Warfare Advanced Development Project

    DTIC Science & Technology

    2005-09-30

    Technical Support Services for the Office of Naval Research Littoral Warfare Advanced Development Project William R. Metzger Marine...Support Services for the Office of Naval Research Littoral Warfare Advanced Development Project 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM ELEMENT

  13. Software Acquisition in the Age of Cyber Warfare

    DTIC Science & Technology

    2011-05-01

    s c h o o l o f S Y S T E M S a n d L O G I S T I C S education service research Software Acquisition in the Age of Cyber Warfare Maj...DATE MAY 2011 2. REPORT TYPE 3. DATES COVERED 00-00-2011 to 00-00-2011 4. TITLE AND SUBTITLE Software Acquisition in the Age of Cyber Warfare 5a...AFIT Cyber 200/300 Courses Cyber Warfare IDE Program 34 Special Emphasis On… Enterprise Integration (Active Directory, PKI) Security

  14. The Fate of Chemical Warfare Agents in the Environment

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Talmage, Sylvia Smith; Munro, Nancy B; Watson, Annetta Paule

    2007-01-01

    Chemical Warfare Agents, Second Edition has been totally revised since the successful first edition and expanded to about three times the length, with many new chapters and much more in-depth consideration of all the topics. The chapters have been written by distinguished international experts in various aspects of chemical warfare agents and edited by an experienced team to produce a clear review of the field. The book now contains a wealth of material on the mechanisms of action of the major chemical warfare agents, including the nerve agent cyclosarin, formally considered to be of secondary importance, as well as ricinmore » and abrin. Chemical Warfare Agents, Second Edition discusses the physico-chemical properties of chemical warfare agents, their dispersion and fate in the environment, their toxicology and management of their effects on humans, decontamination and protective equipment. New chapters cover the experience gained after the use of sarin to attack travelers on the Tokyo subway and how to deal with the outcome of the deployment of riot control agents such as CS gas. This book provides a comprehensive review of chemical warfare agents, assessing all available evidence regarding the medical, technical and legal aspects of their use. It is an invaluable reference work for physicians, public health planners, regulators and any other professionals involved in this field.« less

  15. Metal organic frameworks for the catalytic detoxification of chemical warfare nerve agents

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Hupp, Joseph T.; Farha, Omar K.; Katz, Michael J.

    A method of using a metal organic framework (MOF) comprising a metal ion and an at least bidendate organic ligand to catalytically detoxify chemical warfare nerve agents including exposing the metal-organic-framework (MOF) to the chemical warfare nerve agent and catalytically decomposing the nerve agent with the MOF.

  16. United States Coast Guard Antisubmarine Warfare (ASW) in the Maritime Defense Zone (MDZ) - A Strategic Approach

    DTIC Science & Technology

    1989-03-01

    RIC ILE COPY AIR WAR COLLGE REEAC R~pCR UNITED STATES COAST GUARD ANTISUBMARINE WARFARE (ASW) IN THE MARITIME DEFENSE ZONE (MDZ) -A STRATEGIC...going to perform in these MDZs. Those tasks identified so far include: port and coastal physical security & preventive safety, mine warfare

  17. Countering Gray-Zone Hybrid Threats: An Analysis of Russias New Generation Warfare and Implications for the US Army

    DTIC Science & Technology

    2016-10-18

    education ...Publication (JP) 1, Doctrine for the Armed Forces of the United States, there are two forms of warfare, traditional and irregular, and...combat mission in 2010. Looking at OIF, the US Army participated in both traditional and irregular warfare and the characterization of

  18. Identification of chemical warfare agents using a portable microchip-based detection device

    NASA Astrophysics Data System (ADS)

    Petkovic-Duran, K.; Swallow, A.; Sexton, B. A.; Glenn, F.; Zhu, Y.

    2011-12-01

    Analysis of chemical warfare agents (CWAs) and their degradation products is an important verification component in support of the Chemical Weapons Convention and urgently demanding rapid and reliable analytical methods. A portable microchip electrophoresis (ME) device with contactless conductivity (CCD) detection was developed for the in situ identification of CWA and their degradation products. A 10mM MES/His, 0.4mM CTAB - based separation electrolyte accomplished the analysis of Sarin (GB), Tabun( GA) and Soman (GD) in less than 1 min, which is the fastest screening of nerve agents achieved with portable ME and CCD based detection methods to date. Reproducibility of detection was successfully demonstrated on simultaneous detection of GB (200ppm) and GA (278ppm). Reasonable agreement for the four consecutive runs was achieved with the mean peak time for Sarin of 29.15s, and the standard error of 0.58s or 2%. GD and GA were simultaneously detected with their degradation products methylphosphonic acid (MPA), pinacolyl methylphosphonic acid (PMPA) and O-Ethyl Phosphorocyanidate (GAHP and GAHP1) respectively. The detection limit for Sarin was around 35ppb. To the best of our knowledge this is the best result achieved in microchip electrophoresis and contactless conductivity based detection to date.

  19. Transition from intelligence cycle to intelligence process: the network-centric intelligence in narrow seas

    NASA Astrophysics Data System (ADS)

    Büker, Engin

    2015-05-01

    The defence technologies which have been developing and changing rapidly, today make it difficult to be able to foresee the next environment and spectrum of warfare. When said change and development is looked in specific to the naval operations, it can be said that the possible battlefield and scenarios to be developed in the near and middle terms (5-20 years) are more clarified with compare to other force components. Network Centric Naval Warfare Concept that was developed for the floating, diving and flying fleet platforms which serves away from its own mainland for miles, will keep its significance in the future. Accordingly, Network Centric Intelligence structure completely integrating with the command and control systems will have relatively more importance. This study will firstly try to figure out the transition from the traditional intelligence cycle that is still used in conventional war to Network Centric Intelligence Production Process. In the last part, the use of this new approach on the base of UAV that is alternative to satellite based command control and data transfer systems in the joint operations in narrow seas will be examined, a model suggestion for the use of operative and strategic UAVs which are assured within the scope of the NATO AGS2 for this aim will be brought.

  20. Analysis of the Precursors, Simulants and Degradation Products of Chemical Warfare Agents.

    PubMed

    Witkiewicz, Zygfryd; Neffe, Slawomir; Sliwka, Ewa; Quagliano, Javier

    2018-09-03

    Recent advances in analysis of precursors, simulants and degradation products of chemical warfare agents (CWA) are reviewed. Fast and reliable analysis of precursors, simulants and CWA degradation products is extremely important at a time, when more and more terrorist groups and radical non-state organizations use or plan to use chemical weapons to achieve their own psychological, political and military goals. The review covers the open source literature analysis after the time, when the chemical weapons convention had come into force (1997). The authors stated that during last 15 years increased number of laboratories are focused not only on trace analysis of CWA (mostly nerve and blister agents) in environmental and biological samples, but the growing number of research are devoted to instrumental analysis of precursors and degradation products of these substances. The identification of low-level concentration of CWA degradation products is often more important and difficult than the original CWA, because of lower level of concentration and a very large number of compounds present in environmental and biological samples. Many of them are hydrolysis products and are present in samples in the ionic form. For this reason, two or three instrumental methods are used to perform a reliable analysis of these substances.

  1. Is this the time for a high-energy laser weapon program?

    NASA Astrophysics Data System (ADS)

    Kiel, David H.

    2013-02-01

    The U.S. Department of Defense (DoD) has made large investments weaponizing laser technology for air defense. Despite billions of dollars spent, there has not been a successful transition of a high-energy laser (HEL) weapon from the lab to the field. Is the dream of a low-cost-per-shot, deep-magazine, speed-of-light HEL weapon an impossible dream or a set of technologies that are ready to emerge on the modern battlefield? Because of the rapid revolution taking place in modern warfare that is making conventional defensive weapons very expensive relative to the offensive weapons systems, the pull for less expensive air defense may necessitate a HEL weapon system. Also, due to the recent technological developments in solid-state lasers (SSL), especially fiber lasers, used throughout manufacturing for cutting and welding, a HEL weapon finally may be able to meet all the requirements of ease of use, sustainability, and reliability. Due to changes in warfare and SSL technology advances, the era of HEL weapons isn't over; it may be just starting if DoD takes an evolutionary approach to fielding a HEL weapon. The U.S. Navy, with its large ships and their available electric power, should lead the way.

  2. Drone warfare

    NASA Astrophysics Data System (ADS)

    Gusterson, Hugh

    2017-11-01

    Crude drones existed as early as World War I, but the technology matured in the Yugoslav Wars of the 1990s and the current wars around the Middle East. The U.S. first used a weaponized drone in late 2001, in Afghanistan. Drones may cause more or less civilian casualties depending on the targeting protocols employed by their operators. There is an inherent ambiguity in determining who is an insurgent from several thousand feet, but civilian casualties are likely to be higher if targeters emphasize "signature strikes" over "personality strikes," if they engage in "double-tap strikes," if they rely too much on local informants, and if they rely too heavily on cellphone identification in the absence of corroboration from other intelligence sources. The legality of drone warfare is fairly clear in established battle zones such as Afghanistan, but is more problematic in terms of both international and domestic law when it comes to drone strikes in countries such as Yemen, Pakistan and Somalia with which the U.S. is not at war. Looking to the future, the U.S. would be well advised to sponsor negotiations for an international drone convention that might establish clear international rules for the use of drones, ban autonomous smart drones, and establish adjudicatory procedures to handle allegations of war crimes.

  3. Maneuver Warfare revisited: a plea for balance

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Hamilton, M,R.

    1986-04-01

    This paper is a plea for balance in the current pursuit of understanding of the concept and the teaching of Maneuver Warfare. It specifically addresses the need for a more-complete analysis of some of the more-common historical examples commonly offered as examples of the supremecy of Maneuver Warfare. The paper in no way disagrees with the desirability of conducting the kinds of operations associated with the ill-defined concepts offered by advocates of Maneuver Warfare but suggests that the desirable results of historical battles may be too readily ascribed to the dynamic, offensive actions of the victorious side. Secondly, the papermore » points out the lack of utility and applicability of some common buzzwords being used in today's Army. Specifically assailed is the concept of turning within a decision cycle. The paper describes the reasons that this commonly used phrase has little applicability to ground warfare. Finally, the paper mentions the tendency for the Maneuver Warfare camp to cloud discussion of doctrine in a kind of intellectualism and elitism that has no use in forming the necessary consensus demanded by doctrine.« less

  4. The evolution of human warfare.

    PubMed

    Pitman, George R

    2011-01-01

    Here we propose a new theory for the origins and evolution of human warfare as a complex social phenomenon involving several behavioral traits, including aggression, risk taking, male bonding, ingroup altruism, outgroup xenophobia, dominance and subordination, and territoriality, all of which are encoded in the human genome. Among the family of great apes only chimpanzees and humans engage in war; consequently, warfare emerged in their immediate common ancestor that lived in patrilocal groups who fought one another for females. The reasons for warfare changed when the common ancestor females began to immigrate into the groups of their choice, and again, during the agricultural revolution.

  5. Computer-Assisted Performance Evaluation for Navy Anti-Air Warfare Training: Concepts, Methods, and Constraints.

    ERIC Educational Resources Information Center

    Chesler, David J.

    An improved general methodological approach for the development of computer-assisted evaluation of trainee performance in the computer-based simulation environment is formulated in this report. The report focuses on the Tactical Advanced Combat Direction and Electronic Warfare system (TACDEW) at the Fleet Anti-Air Warfare Training Center at San…

  6. Smart Climatology Applications for Undersea Warfare

    DTIC Science & Technology

    2008-09-01

    Comparisons of these climatologies with existing Navy climatologies based on the Generalized Digital Environmental Model ( GDEM ) reveal differences in sonic...undersea warfare. 15. NUMBER OF PAGES 117 14. SUBJECT TERMS antisubmarine warfare, climate variations, climatology, GDEM , ocean, re...climatologies based on the Generalized Digital Environmental Model ( GDEM ) to our smart ocean climatologies reveal a number of differences. The

  7. DETERMINING ELECTRONIC AND CYBER ATTACK RISK LEVEL FOR UNMANNED AIRCRAFT IN A CONTESTED ENVIRONMENT

    DTIC Science & Technology

    2016-08-01

    AIR COMMAND AND STAFF COLLEGE AIR UNIVERSITY DETERMINING ELECTRONIC AND CYBER ATTACK RISK LEVEL FOR UNMANNED AIRCRAFT IN A CONTESTED ENVIRONMENT...iii ABSTRACT During operations in a contested air environment, adversary electronic warfare (EW) and cyber-attack capability will pose a high...10 Russian Federation Electronic Warfare Systems ...................................................12 Chinese Cyber Warfare Program

  8. Manufacturing Technology and Industrial Modernization Incentive Programs

    DTIC Science & Technology

    1991-07-01

    report are those of the contractors and should not be Interpreted as representing the official policies, either expressed or Impli.d, of tte Naval Ocean...Countaermeaue * Undersea countermeasures. special warfare, amphibious warfare. tamc mine countermeasures, and diving Dkected energy . Naval Surface Warfare...Insensitie highly energetic materials -Command control, commiunications, ocean surveillance, surface- and air-launched undersea weapons, and submarine arctic

  9. The Handicap Principle, Strategic Information Warfare and the Paradox of Asymmetry

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Ma, Zhanshan; Sheldon, Frederick T; Krings, Axel

    2010-01-01

    The term asymmetric threat (or warfare) often refers to tactics utilized by countries, terrorist groups, or individuals to carry out attacks on a superior opponent while trying to avoid direct confrontation. Information warfare is sometimes also referred to as a type of asymmetric warfare perhaps due to its asymmetry in terms of cost and efficacy. Obviously, there are differences and commonalities between two types of asymmetric warfare. One major difference lies in the goal to avoid confrontation and one commonality is the asymmetry. Regardless, the unique properties surrounding asymmetric warfare warrant a strategic-level study. Despite enormous studies conducted in themore » last decade, a consensus on the strategy a nation state should take to deal with asymmetric threat seems still intriguing. In this article, we try to shed some light on the issue from the handicap principle in the context of information warfare. The Handicap principle was first proposed by Zahavi (1975) to explain the honesty or reliability of animal communication signals. He argued that in a signaling system such as one used in mate selection, a superior male is able to signal with a highly developed "handicap" to demonstrate its quality, and the handicap serves "as a kind of (quality) test imposed on the individual" (Zahavi 1975, Searcy and Nowicki 2005). The underlying thread that inspires us for the attempt to establish a connection between the two apparently unrelated areas is the observation that competition, communication and cooperation (3C), which are three fundamental processes in nature and against which natural selection optimize living things, may also make sense in human society. Furthermore, any communication networks, whether it is biological networks (such as animal communication networks) or computer networks (such as the Internet) must be reasonably reliable (honest in the case of animal signaling) to fulfill its missions for transmitting and receiving messages. The strategic goal of information warfare is then to destroy or defend the reliability (honesty) of communication networks. The handicap principle that governs the reliability (honesty) of animal communication networks can be considered as the nature s version of information warfare strategy because it is a product of natural selection. What is particularly interesting is to transfer the evolutionary game theory models [e.g., Sir Philip Sydney (SPS) game] for the handicap principle to the study of information warfare. In a broad perspective, we realize that the handicap principle may actually contradict the principle of asymmetry in asymmetric warfare. Anyway, not every species of animals has evolved expensive signaling equipments like male peacocks (whose exaggerated train is an example of handicap). Furthermore, the handicap principle is not only about communication, and it also embodies the spirits of cooperation and competition. In human societies, communication modulates cooperation and competition; so does in animal communication networks. Therefore, to evolve or maintain a sustainable communication network, the proper strategy should be to balance (modulate) the cooperation and competition with communication tools (information warfare tools), which is perhaps in contradiction with the asymmetric strategy. There might be a paradox in the strategy of asymmetric warfare, and whether or not information warfare can be used as an asymmetric tool is still an open question.« less

  10. Antidotes and treatments for chemical warfare/terrorism agents: an evidence-based review.

    PubMed

    Rodgers, G C; Condurache, C T

    2010-09-01

    This article reviews the evidence supporting the efficacy of antidotes used or recommended for the potential chemical warfare agents of most concern. Chemical warfare agents considered include cyanide, vesicants, pulmonary irritants such as chlorine and phosgene, and nerve agents. The strength of evidence for most antidotes is weak, highlighting the need for additional research in this area.

  11. Navy Operational Planner: Anti-Submarine Warfare with Time-Dependent Performance

    DTIC Science & Technology

    2017-09-01

    PLANNER: ANTI-SUBMARINE WARFARE WITH TIME -DEPENDENT PERFORMANCE by Anthony M. Baldessari September 2017 Thesis Advisor: W. Matthew...reporting burden for this collection of information is estimated to average 1 hour per response, including the time for reviewing instruction, searching...REPORT TYPE AND DATES COVERED Master’s thesis 4. TITLE AND SUBTITLE NAVY OPERATIONAL PLANNER: ANTI-SUBMARINE WARFARE WITH TIME -DEPENDENT

  12. Pacific Missile Range Facility Intercept Test Support. Environmental Assessment/Overseas Environmental Assessment

    DTIC Science & Technology

    2010-04-01

    frequency monitoring, target control, and electronic warfare and networked operations. Kokee supports tracking radars, telemetry, communications, and...owned island of Niihau provide support and sites for a remotely operated PMRF surveillance radar, a Test Vehicle Recovery Site, an electronic warfare...site, multiple electronic warfare portable simulator sites, a marker for aircraft mining exercise programs, and a helicopter terrain-following

  13. Chemical Weapons Disposal: Improvements Needed in Program Accountability and Financial Management

    DTIC Science & Technology

    2000-05-01

    United States General Accounting Office PAQ Report to Congressional Committees May 2000 CHEMICAL WEAPONS DISPOSAL Improvements Needed in Program...warfare materiel, and former production facilities and identify and locate buried chemical warfare materiel. Alternative Technologies and Approaches...production facilities, and buried chemical warfare materiel. These items are described in table 1. Table 1: Nonstockpile Chemical Materiel Category

  14. Homeland Biological Warfare Consequence Management: Capabilities and Needs Assessment

    DTIC Science & Technology

    2001-04-01

    AU/ACSC/105/2001-04 AIR COMMAND AND STAFF COLLEGE AIR UNIVERSITY HOMELAND BIOLOGICAL WARFARE CONSEQUENCE MANAGEMENT: CAPABILITIES AND NEEDS...Dates Covered (from... to) - Title and Subtitle Homeland biological Warfare Consequence Management: Capabilities and Needs Assessment Contract...FEMA, DoJ, DoD, HHS, etc.) make a comprehensive, organized solution to the problem difficult. Focusing on the consequence management functions

  15. Chemical warfare agents.

    PubMed

    Kuca, Kamil; Pohanka, Miroslav

    2010-01-01

    Chemical warfare agents are compounds of different chemical structures. Simple molecules such as chlorine as well as complex structures such as ricin belong to this group. Nerve agents, vesicants, incapacitating agents, blood agents, lung-damaging agents, riot-control agents and several toxins are among chemical warfare agents. Although the use of these compounds is strictly prohibited, the possible misuse by terrorist groups is a reality nowadays. Owing to this fact, knowledge of the basic properties of these substances is of a high importance. This chapter briefly introduces the separate groups of chemical warfare agents together with their members and the potential therapy that should be applied in case someone is intoxicated by these agents.

  16. Sink or Swim: The Marine Corps Capacity to Conduct a Marine Expeditionary Brigade Amphibious Assault using Expeditionary Maneuver Warfare

    DTIC Science & Technology

    2010-03-01

    Expeditionary Maneuver Warfare? This study addresses the equipment issues surrounding the Marine expeditionary brigade ’s’ ability to conduct an amphibious...addresses the equipment issues surrounding the expeditionary brigade’s ability to conduct an amphibious assault under expeditionary maneuver warfare in...1 Issues and Elements of the Modern-Day MEB Assault .................................................................. 2 The Marine Corps

  17. User Guide for Unmanned Aerial System (UAS) Operations on the National Ranges

    DTIC Science & Technology

    2007-11-01

    WARFARE CENTER WEAPONS DIVISION, PT. MUGU NAVAL AIR WARFARE CENTER WEAPONS DIVISION, CHINA LAKE NAVAL AIR WARFARE CENTER AIRCRAFT DIVISION, PATUXENT...with IFR Instrument Flight Rules MRTFB Major Range and Test Facility Base NAS National Airspace System NM nautical mile NTIA National...sectional charts, Instrument Flight Rules ( IFR ) enroute charts, and terminal area charts. The floor and ceiling, operating hours, and controlling

  18. Coast Guard SOF

    DTIC Science & Technology

    2006-02-01

    Forces units into known Viet Cong (VC) strongholds, participating in direct action raids on VC junk bases, conducting psychological operations, and...and General McClure established the Army’s Psychological Warfare Cen- ter and 10th Special Forces Group in 1952.62 President Kennedy’s interest in...counterinsurgency warfare paved the way for the “Green Beret,” for which Army Special Forces renamed the Psychological Warfare Center the JFK Special

  19. Simulated experiment for elimination of chemical and biological warfare agents by making use of microwave plasma torch

    NASA Astrophysics Data System (ADS)

    Hong, Yong C.; Kim, Jeong H.; Uhm, Han S.

    2004-02-01

    The threat of chemical and biological warfare agents in a domestic terrorist attack and in military conflict is increasing worldwide. Elimination and decontamination of chemical and biological warfare (CBW) agents are immediately required after such an attack. Simulated experiment for elimination of CBW agents by making use of atmospheric-pressure microwave plasma torches is carried out. Elimination of biological warfare agents indicated by the vitrification or burnout of sewage sludge powders and decomposition of toluene gas as a chemical agent stimulant are presented. A detailed characterization for the elimination of the simulant chemicals using Fourier transform infrared and gas chromatography is also presented.

  20. Design and implementation of intelligent electronic warfare decision making algorithm

    NASA Astrophysics Data System (ADS)

    Peng, Hsin-Hsien; Chen, Chang-Kuo; Hsueh, Chi-Shun

    2017-05-01

    Electromagnetic signals and the requirements of timely response have been a rapid growth in modern electronic warfare. Although jammers are limited resources, it is possible to achieve the best electronic warfare efficiency by tactical decisions. This paper proposes the intelligent electronic warfare decision support system. In this work, we develop a novel hybrid algorithm, Digital Pheromone Particle Swarm Optimization, based on Particle Swarm Optimization (PSO), Ant Colony Optimization (ACO) and Shuffled Frog Leaping Algorithm (SFLA). We use PSO to solve the problem and combine the concept of pheromones in ACO to accumulate more useful information in spatial solving process and speed up finding the optimal solution. The proposed algorithm finds the optimal solution in reasonable computation time by using the method of matrix conversion in SFLA. The results indicated that jammer allocation was more effective. The system based on the hybrid algorithm provides electronic warfare commanders with critical information to assist commanders in effectively managing the complex electromagnetic battlefield.

  1. Chemical warfare, past and future. Study project

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Tzihor, A.

    1992-05-15

    World War I was arena for the first use of chemical warfare. The enormous tactical success brought about by this first time use of chemical weapons caused the continued development of more sophisticated tactics and weapons in this category of unconventional warfare. This phenomenon has carried through to today. However, at present, because of technological developments, the global economic situation, and political factors, coupled with the inability of the western world to control the proliferation of chemical weapons, a situation weapon of mass destruction. Recent use by Iraq against Kurdish civilian indicates that chemical warfare is no longer limited tomore » the battlefield. The western nations have a need to understand the risk. This paper conducts an analysis of past lessons and the factors which will affect the use of chemical warfare in the future. From this analysis, the paper reaches conclusions concerning the significant threat chemical weapons pose for the entire world in the not too distant future.« less

  2. Efficacy Evaluation of Current and Future Naval Mine Warfare Neutralization Method

    DTIC Science & Technology

    2016-12-01

    Distribution is unlimited. EFFICACY EVALUATION OF CURRENT AND FUTURE NAVAL MINE WARFARE NEUTRALIZATION METHOD by Team MIW Cohort SE311-152O...EFFICACY EVALUATION OF CURRENT AND FUTURE NAVAL MINE WARFARE NEUTRALIZATION METHOD 5. FUNDING NUMBERS 6. AUTHOR (S) Team MIW, Systems Engineering...NEUTRALIZATION METHOD Team MIW, Systems Engineering Cohort SE311-152O Submitted in partial fulfillment of the requirements for the degrees of

  3. Computer Network Attack: An Operational Tool?

    DTIC Science & Technology

    2003-01-17

    Spectrum of Conflict, Cyber Warfare , Preemptive Strike, Effects Based Targeting. 15. Abstract: Computer Network Attack (CNA) is defined as...great deal of attention as the world’s capabilities in cyber - warfare grow. 11 Although addressing the wide ranging legal aspects of CNA is beyond the...the notion of cyber - warfare has not yet developed to the point that international norms have been established.15 These norms will be developed in

  4. The U.S. Needs International Cyber Treaties

    DTIC Science & Technology

    2010-03-01

    formed to deal with issues surrounding cyber warfare . However, no major treaties between nations exist regarding this form of combat. Examining...the history of cyber warfare , the inadequate international response, the obstacles to international agreement, and poor U.S. readiness demonstrates...the current need for the U.S. to lead the effort to codify treaties. First, a brief history of cyber warfare helps to shed light on the international

  5. Cyber Capabilities for Global Strike in 2035

    DTIC Science & Technology

    2012-02-15

    operations force, by treating cyber warfare capabilities in the same manner as it treats its other weapon systems. It argues that despite preconceptions of...As such, while automation is required, cyber warfare will be much more manpower intensive than is currently understood, and will require a force that...constantly keeping cyber warfare capabilities in pace with the technologies of the environment.This paper reaches these conclusions by first providing a

  6. Cyber Capabilities for Global Strike in 2035

    DTIC Science & Technology

    2012-02-15

    operations force, by treating cyber warfare capabilities in the same manner as it treats its other weapon systems. It argues that despite preconceptions of...As such, while automation is required, cyber warfare will be much more manpower intensive than is currently understood, and will require a force...constantly keeping cyber warfare capabilities in pace with the technologies of the environment. This paper reaches these conclusions by first providing a

  7. Integrating Defense, Diplomacy, and Development (3 D) in the Naval Special Warfare Operator

    DTIC Science & Technology

    2010-12-01

    DIPLOMACY, AND DEVELOPMENT (3 D) IN THE NAVAL SPECIAL WARFARE OPERATOR by William Fiack William Roberts Tim Sulick December 2010...Development (3 D) in the Naval Special Warfare Operator 6. AUTHOR(S) William Fiack, William Roberts, Timothy Sulick 5. FUNDING NUMBERS 7. PERFORMING...MONITORING AGENCY NAME(S) AND ADDRESS(ES) N/A 10. SPONSORING/MONITORING AGENCY REPORT NUMBER 11. SUPPLEMENTARY NOTES The views expressed in

  8. Chemical Warfare: Many Unanswered Questions.

    DTIC Science & Technology

    1983-04-29

    of Defense DSB Defense Science Board GAO U.S. General Accounting Office IDA Institute for Defense Analyses JCS Joint Chiefs of Staff SIPRI Stockholm...Defense Science Board in 1980, DOD specifically asked it to review intelligence data on chemical warfare, and DSB’s 1981 report accordingly presents its...Defense Science Board report suggests, however, that its com- - ments are based on a composite of intelligence information on Soviet chemical warfare

  9. The Airpower Advantage in Future Warfare: The Need for Strategy

    DTIC Science & Technology

    2007-12-01

    political situation which gener- ates war and therefore warfare, foreign and domestic; the social- cultural ideologies , attitudes, habits of mind, and...the ideological rivalries that contributed so powerfully to interstate rivalry, ambition, and anxiety are all but defunct, save only in two respects...instead to fit that still improving competence into a truly holistic approach to warfare. That approach, in its turn, needs to fit into a genu - inely

  10. Calming the Churn: Resolving the Dilemma of Rotational Warfare in Counterinsurgency

    DTIC Science & Technology

    2013-12-01

    warfare in counterinsurgency Publisher Monterey, California: Naval Postgraduate School Issue Date 2013-12 URL http://hdl.handle.net/10945/38873... TYPE AND DATES COVERED Master’s Thesis 4. TITLE AND SUBTITLE CALMING THE CHURN: RESOLVING THE DILEMMA OF ROTATIONAL WARFARE IN COUNTERINSURGENCY...operations, however, would not last and, after only a year, MacArthur was sent to other duties thanks to personality conflicts with Taft. His replacement

  11. A Game Theoretic Model Of Strategic Conflict In Cyberspace

    DTIC Science & Technology

    2012-01-01

    EXECUTIVE SUMMARY Conflict in cyberspace is difficult to analyze; methods developed for other dimensions of conflict, such as land warfare , war at sea...and missile warfare , do not adequately address cyber conflict. A characteristic that distinguishes cyber conflict is that actors do not know the...strategic and policy guidance. To analyze the strategic decisions involved in cyber conflict, we use a game theoretic framework—we view cyber warfare as a

  12. US Army Special Warfare. Its Origins: Psychological and Unconventional Warfare, 1941-1952

    DTIC Science & Technology

    1982-01-01

    remained a fundamental military organization. Simultaneously, however, a few thinkers began to consider the possibility of forces capable of operating at...guerrilla warfare. He had been impressed as well by the British system of intelligence and counter- intelligence, as conducted by their Secret Intelligence...highly respected Columbia Broadcasting System reporter like Elmer Davis as its first director. Although most existing information services were trans

  13. Technology Strategy Integration

    DTIC Science & Technology

    2012-06-01

    History of Weaponry and Warfare from Prehistory to the Present (New York: Free Press : Distributed by Simon & Schuster, 2002), 191. 57 Robert L... Prehistory to the Present, 182. 60 O’Connell and Batchelor, Soul of the Sword: An Illustrated History of Weaponry and Warfare from Prehistory to the...Illustrated History of Weaponry and Warfare from Prehistory to the Present, 390. 62 O’Connell and Batchelor, Soul of the Sword: An Illustrated

  14. Sub state Unconventional Warfare: Expanding United States Military Political Options

    DTIC Science & Technology

    2016-05-26

    phases due to competing incumbent efforts. Giap was influenced in his understanding of revolutionary war phasing by Sun Tzu who Giap called one of his...Challenge of Unconventional Warfare. London: Routledge, 2012. Ames, Roger T. Sun - Tzu The Art of Warfare. New York: Ballantine Books, 1993. Amin, Samir...Guerrilla: Insurgents, Patriots, and Terrorists from Sun Tzu to Bin Laden. London: Brassey’s Inc., 2004. Rosenau, William, Subversion and Insurgency

  15. The role of the sand in chemical warfare agent exposure among Persian Gulf War veterans: Al Eskan disease and "dirty dust".

    PubMed

    Korényi-Both, A L; Svéd, L; Korényi-Both, G E; Juncer, D J; Korényi-Both, A L; Székely, A

    2000-05-01

    The purpose of this paper is to inquire into the relationship between Al Eskan disease and the probable exposure to chemical warfare agents by Persian Gulf War veterans. Al Eskan disease, first reported in 1991, compromises the body's immunological defense and is a result of the pathogenic properties of the extremely fine, dusty sand located in the central and eastern region of the Arabian peninsula. The disease manifests with localized expression of multisystem disorder. Signs and symptoms of Al Eskan disease have been termed by the news media "Persian Gulf syndrome." The dust becomes a warfare agent when toxic chemicals are microimpregnated into inert particles. The "dirty dust" concept, that the toxicity of an agent could be enhanced by absorption into inactive particles, dates from World War I. A growing body of evidence shows that coalition forces have encountered Iraqi chemical warfare in the theater of operation/Persian Gulf War to a much greater extent than early U.S. Department of Defense information had indicated. Veterans of that war were exposed to chemical warfare agents in the form of direct (deliberate) attacks by chemical weapons, such as missiles and mines, and indirect (accidental) contamination from demolished munition production plants and storage areas, or otherwise. We conclude that the microimpregnated sand particles in the theater of operation/Persian Gulf War depleted the immune system and simultaneously acted as vehicles for low-intensity exposure to chemical warfare agents and had a modifying-intensifying effect on the toxicity of exposed individuals. We recommend recognition of a new term, "dirty sand," as a subcategory of dirty dust/dusty chemical warfare agents. Our ongoing research efforts to investigate the health impact of chemical warfare agent exposure among Persian Gulf War veterans suggest that Al Eskan disease is a plausible and preeminent explanation for the preponderance of Persian Gulf War illnesses.

  16. Distribution of chemical warfare agent, energetics, and metals in sediments at a deep-water discarded military munitions site

    NASA Astrophysics Data System (ADS)

    Briggs, Christian; Shjegstad, Sonia M.; Silva, Jeff A. K.; Edwards, Margo H.

    2016-06-01

    There is a strong need to understand the behavior of chemical warfare agent (CWA) at underwater discarded military munitions (DMM) sites to determine the potential threat to human health or the environment, yet few studies have been conducted at sites in excess of 250 m, the depth at which most U.S. chemical munitions were disposed. As part of the Hawai'i Undersea Military Munitions Assessment (HUMMA), sediments adjacent to chemical and conventional DMM at depths of 400-650 m were sampled using human occupied vehicles (HOVs) in order to quantify the distribution of CWA, energetics, and select metals. Sites in the same general area, with no munitions within 50 m in any direction were sampled as a control. Sulfur mustard (HD) and its degradation product 1,4-dithiane were detected at each CWA DMM site, as well as a single sample with the HD degradation product 1,4-thioxane. An energetic compound was detected in sediment to a limited extent at one CWA DMM site. Metals common in munitions casings (i.e., Fe, Cu, and Pb) showed similar trends at the regional and site-wide scales, likely reflecting changes in marine sediment deposition and composition. This study shows HD and its degradation products can persist in the deep-marine environment for decades following munitions disposal.

  17. Estimated Chemical Warfare Agent Surface Clearance Goals for Remediation Pre-Planning

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Dolislager, Frederick; Bansleben, Dr. Donald; Watson, Annetta Paule

    2010-01-01

    Health-based surface clearance goals, in units of mg/cm2, have been developed for the persistent chemical warfare agents sulfur mustard (HD) and nerve agent VX as well as their principal degradation products. Selection of model parameters and critical receptor (toddler child) allow calculation of surface residue estimates protective for the toddler child, the general population and adult employees of a facilty that has undergone chemical warfare agent attack.

  18. COIN in Cyberspace: Focusing Air Force Doctrine Development

    DTIC Science & Technology

    2007-01-01

    cyberspace and began codifying its cyber warfare doctrine. This effort is hampered, however, by a limited understanding of cyberspace by rank and file Air...Force members. Many believe cyberspace and cyber warfare are the responsibility of the communications community. If this new doctrine is to be...doctrine to build upon, the Air Force can create unity of effort among Airmen at all levels, ensure unity of purpose in the prosecution of cyber warfare , and

  19. In Pursuit of an Aptitude Test for Potential Cyberspace Warriors

    DTIC Science & Technology

    2007-03-01

    may well be training their soldiers in the art of cyber warfare to attack our infrastructure and defend their own. It seems like a no-brainer that...communications. Certainly this is an area that could be exploited in cyber warfare . Another subject with little reference was regarding linguistic...Journal, 40(3), 769-780. Parks, R. C., & duggan, D. P. (2001). Principles of cyber - warfare . Proceeding of the 2001 IEEE Workshop on Information

  20. Self-Development for Cyber Warriors

    DTIC Science & Technology

    2011-11-10

    Aggressive self-development is a critical task for the cyber warfare professional. No matter the quality, formal training and education programs age...Books and Science Fiction); Technology and Cyber-Related Magazines and Blogs; Specific Cyber Warfare Journal and Magazine Articles; Key Documents on...the strengths and weaknesses of the major donor career fields to the cyber workforce, and a Self-Assessment of Cyber Domain Expertise for readers who wish to assess their own cyber warfare expertise.

  1. The Combat Vehicle Command and Control System: Combat Performance of Armor Battalions Using Interactive Simulation

    DTIC Science & Technology

    1994-05-01

    Command and Control display. Using Ml tank simulators in the Mounted Warfare Test Bed at Fort Knox, Kentucky, the researchers evaluated tank battalion... Warfare Test Bed (MWTB) at Fort Knox, Kentucky, eight MOS-qualified armor crews (battalion commander, battalion opera- tions officer, three company...concerned with identifying ways that the CVCC system might best benefit the battlefield commander, and potential modifications to mounted warfare TTPs

  2. Modeling Anti-Air Warfare With Discrete Event Simulation and Analyzing Naval Convoy Operations

    DTIC Science & Technology

    2016-06-01

    WARFARE WITH DISCRETE EVENT SIMULATION AND ANALYZING NAVAL CONVOY OPERATIONS by Ali E. Opcin June 2016 Thesis Advisor: Arnold H. Buss Co...REPORT DATE June 2016 3. REPORT TYPE AND DATES COVERED Master’s thesis 4. TITLE AND SUBTITLE MODELING ANTI-AIR WARFARE WITH DISCRETE EVENT...In this study, a discrete event simulation (DES) was built by modeling ships, and their sensors and weapons, to simulate convoy operations under

  3. Fractal Effects in Lanchester Models of Combat

    DTIC Science & Technology

    2009-08-01

    Lanchester models. 8. References 1 Aircraft in Warfare : The Dawn of the Fourth Arm, F W Lanchester , Constable & Co., London, 1916. 2 The Calculus of...Intermediate Asymptotics, G I Barenblatt, CUP, 1996. 14 Lanchester Models of Warfare Volumes 1 and 2, J G Taylor, Operations Research Society of America...Nagabhushana, Computers and Operations Research, 21, 615-628, 1994. 20 DSTO-TR-2331 18 Lanchester Type Models of Warfare , H K Weiss, Proc.First

  4. A Heuristic Decision Making Model to Mitigate Adverse Consequences in a Network Centric Warfare/Sense and Respond System

    DTIC Science & Technology

    2005-05-01

    made. 4. Do military decision makers identify / analyze adverse consequences presently? Few do based on this research and most don’t do it effectively ...A HEURISTIC DECISION MAKING MODEL TO MITIGATE ADVERSE CONSEQUENCES IN A NETWORK CENTRIC WARFARE / SENSE AND RESPOND SYSTEM...ENS/05-01 A HEURISTIC DECISION MAKING MODEL TO MITIGATE ADVERSE CONSEQUENCES IN A NETWORK CENTRIC WARFARE / SENSE AND RESPOND SYSTEM

  5. The Strategic and Political Impacts of Collateral Damage from Strike Warfare

    DTIC Science & Technology

    2015-03-01

    damage from strike warfare focuses on legal, humanitarian, and moral issues . To oversimplify, killing non-combatants is bad, but it happens, and not...humanitarian, and moral issues . To oversimplify, killing non- combatants is bad, but it happens, and not always by accident. Therefore, it is instructive...method of bombing. A significant amount of research on the effects of collateral damage from strike warfare focuses on humanitarian and moral issues

  6. Network Centric Warfare Case Study: U.S. V Corps and 3rd Infantry Division (Mechanized) During Operation Iraqi Freedom Combat Operations (Mar-Apr 2003). Volume 3. Network Centric Warfare Insights

    DTIC Science & Technology

    2003-01-01

    OPSEC), military deception, psychological operations (PSYOPS), special information operations (IO), information assurance, physical security...nonlethal effects, such as operational 8 Network Centric Warfare Case Study security (OPSEC), military deception, psychological operations (PSYOP...Support Operations Group ASR Alternate Supply Route; or, Ammunition Supply Rate ATACMS Army Tactical Missile System ATARS Advanced

  7. Biomaterials for mediation of chemical and biological warfare agents.

    PubMed

    Russell, Alan J; Berberich, Jason A; Drevon, Geraldine F; Koepsel, Richard R

    2003-01-01

    Recent events have emphasized the threat from chemical and biological warfare agents. Within the efforts to counter this threat, the biocatalytic destruction and sensing of chemical and biological weapons has become an important area of focus. The specificity and high catalytic rates of biological catalysts make them appropriate for decommissioning nerve agent stockpiles, counteracting nerve agent attacks, and remediation of organophosphate spills. A number of materials have been prepared containing enzymes for the destruction of and protection against organophosphate nerve agents and biological warfare agents. This review discusses the major chemical and biological warfare agents, decontamination methods, and biomaterials that have potential for the preparation of decontamination wipes, gas filters, column packings, protective wear, and self-decontaminating paints and coatings.

  8. Military Engineers and Chemical Warfare Troops (Inzhenernye Voiska Khimicheskie Voiska),

    DTIC Science & Technology

    MILITARY FORCES(FOREIGN), *MILITARY ORGANIZATIONS, MILITARY ENGINEERING , INFANTRY, AMPHIBIOUS OPERATIONS, MINELAYING, ARMORED VEHICLES, NUCLEAR...RADIATION, DOSIMETERS, CHEMICAL WARFARE, PROTECTIVE CLOTHING, DECONTAMINATION, HEALTH PHYSICS.

  9. Blaptica dubia as sentinels for exposure to chemical warfare agents - a pilot study.

    PubMed

    Worek, Franz; Seeger, Thomas; Neumaier, Katharina; Wille, Timo; Thiermann, Horst

    2016-11-16

    The increased interest of terrorist groups in toxic chemicals and chemical warfare agents presents a continuing threat to our societies. Early warning and detection is a key component for effective countermeasures against such deadly agents. Presently available and near term solutions have a number of major drawbacks, e.g. lack of automated, remote warning and detection of primarily low volatile chemical warfare agents. An alternative approach is the use of animals as sentinels for exposure to toxic chemicals. To overcome disadvantages of vertebrates the present pilot study was initiated to investigate the suitability of South American cockroaches (Blaptica dubia) as warning system for exposure to chemical warfare nerve and blister agents. Initial in vitro experiments with nerve agents showed an increasing inhibitory potency in the order tabun - cyclosarin - sarin - soman - VX of cockroach cholinesterase. Exposure of cockroaches to chemical warfare agents resulted in clearly visible and reproducible reactions, the onset being dependent on the agent and dose. With nerve agents the onset was related to the volatility of the agents. The blister agent lewisite induced signs largely comparable to those of nerve agents while sulfur mustard exposed animals exhibited a different sequence of events. In conclusion, this first pilot study indicates that Blaptica dubia could serve as a warning system to exposure of chemical warfare agents. A cockroach-based system will not detect or identify a particular chemical warfare agent but could trigger further actions, e.g. specific detection and increased protective status. By designing appropriate boxes with (IR) motion sensors and remote control (IR) camera automated off-site warning systems could be realized. Copyright © 2016 Elsevier Ireland Ltd. All rights reserved.

  10. Coalition Logistics: A Case Study in Operation Restore Hope

    DTIC Science & Technology

    1994-06-03

    coalition operations."° In Seland’s interview with Colonel Wolfgang Kopp, chief of staff, German/Franco Brigade, Colonel Kopp stated that key members...February 1994. 21William G. Pagonis and Michael D. Krause , "Operational Logistics and the Gulf War," The Institute of Land Warfare: The Land Warfare...Headquarters, 1989. Pagonis, William G. and Michael D. Krause . "Operational Logistics and the Gulf War." The Land Warfare Paper No. 13. Arlington, Virginia

  11. Mission Accomplished! Or Not? A Study about Success in Information Operations

    DTIC Science & Technology

    2012-09-01

    sensors and presented on a man-machine interface, e.g., a computer screen or on a radar plan position indicator. In modern warfare, staff and...has to be achievable; otherwise, it can be viewed simply as dreaming. Compared to sea, land and even air warfare, information warfare is a young...shares some of its characteristics with the air and sea domains. All of them exist without borders. In addition, they cannot be fortified or

  12. Pirates of the Nuclear Age: The Role of U.S. Submarines in Modern Trade Warfare

    DTIC Science & Technology

    2016-07-14

    have sought to influence the outcome of the conflict by targeting enemy commerce . This influence historically called for the use of privateers...submarines took the position of privateers as the ideal force for conducting commerce warfare. Throughout World War Two (WWII) commerce warfare using... commerce ) remains. From the time of Greek city-states, to the privateers of the age of sail, to the submarines of WWI and WWII, targeting the

  13. The Combat Vehicle Command and Control System. Combat Performance of Armor Battalions Using Interactive Simulation

    DTIC Science & Technology

    1994-01-31

    ncluded the Commander’s Independent Thermal Viewer and a Command and Control display. Using 1 tank simulators in the Mounted Warfare Test Bed at Fort...CCD), the Commander’s Independent Thermal Viewer (CITV), and digital TOC workstations. Using autoloading tank simulators in the Mounted Warfare Test...identifying ways that the CVCC system might best benefit the battlefield commander, and potential modifications to mounted warfare TTPs. Another area of

  14. The Combat Vehicle Command and Control System. Combat Performance of Armor Battalions Using Distributed Interactive Simulation

    DTIC Science & Technology

    1993-12-15

    and Control disqlay. Using M1 tank simulators in the Mounted Warfare Test Bed at Fort Knox, KY, the evaluation focused on tank battalion oierations...and digital TOC workstations. Using autoloading tank simulators in the Mounted Warfare Test Bed (MWTB) at Fort Knox, Kentucky, eight MOS-qualified...might best benefit the battlefield commander, and potential modifications to mounted warfare TTPs. Another area of interest is the implication for

  15. Gray Zone Warfare: German and Russian Political Warfare, 1935-1939, and 2001

    DTIC Science & Technology

    2017-06-09

    Stretching and Exploiting Thresholds for High -Order War: How Russia, China, and Iran are Eroding American Influence Using Time-Tested Measures...PSYOP Terminology,” in American Institutes for Research, Department of the Army Pamphlet 525-7-1-2, The Art and Science of Psychological Operations...efforts to attack the enemies’ “ power , influence, and will.”88 In the United States, Irregular Warfare was not a part of doctrine until 2007, when the

  16. Winning the Counterinsurgency Fight in Iraq: The Role of Political Culture in Counterinsurgency Warfare 2003-2006 in Iraq

    DTIC Science & Technology

    2006-05-26

    Winning the Counterinsurgency Fight in Iraq: The Role of Political Culture in Counterinsurgency Warfare 2003-2006 in Iraq A Monograph by Major...Counterinsurgency Fight in Iraq: The Role of Political Culture in Counterinsurgency Warfare 2003-2006 in Iraq 5c. PROGRAM ELEMENT NUMBER 5d. PROJECT NUMBER 5e...14. ABSTRACT This monograph provides insight into the importance of political culture in relation to developing a counterinsurgency strategy. This

  17. Linear Goal Programming as a Military Decision Aid.

    DTIC Science & Technology

    1988-04-01

    JAMES F. MAJOR9 USAF 13a. TYPE OF REPORT 13b. TIME COVERED 14. DATE OF REPORT (Year, Month, Day) 15. PAGE COUNT IFROM____ TO 1988 APRIL 64 16...air warfare, advanced armour warfare, the potential f or space warfare, and many other advances have expanded the breadth of weapons employed to the...written by A. Charnes and W. W. Cooper, Management Models and Industrial Applications of Linear Programming In 1961.(3:5) Since this time linear

  18. Submarine Warfare in the 20th & 21st Centuries: A Bibliography

    DTIC Science & Technology

    2003-12-01

    International studies series ser. no. 02-019). 49 p. Bailey, Thomas Andrew and Paul B. Ryan. The Lusitania disaster: an episode in modern warfare and...verlagshandlung, 1939. 212 p. Ellis, Frederick D. The tragedy of the Lusitania : embracing authentic stories by the survivors and eye-witnesses of the disaster...warfare; a study of its methods and spirit, including the crime of the " Lusitania ," a record of observations and evidence. New York, London, D. Appleton

  19. The Human Domain and the Future of Army Warfare: Present as Prelude to 2050

    DTIC Science & Technology

    2017-07-01

    ERDC/CERL MP-17-2 ii Abstract Studies on the future of warfare tend to focus on technology and place but largely overlook the actors. Warfare in 2050...will be predominantly urban, utilizing robotics and other advanced technologies , but at the core will re- main an inherently human and political...collaboration for success. Despite the ap- peal of advanced technology , the U.S. Army could greatly benefit by looking beyond strictly technological

  20. Feasibility Study for the Use of Green, Bio-Based, Efficient Reactive Sorbent Material to Neutralize Chemical Warfare Agents

    DTIC Science & Technology

    2012-08-02

    REPORT Feasibility study for the use of green, bio-based, efficient reactive sorbent material to neutralize chemical warfare agents 14. ABSTRACT 16...way cellulose, lignin and hemicelluloses interact as well as whole wood dissolution occurs in ILs. The present project was conducted to 1. REPORT...Feasibility study for the use of green, bio-based, efficient reactive sorbent material to neutralize chemical warfare agents Report Title ABSTRACT Over the

  1. Personal protection during resuscitation of casualties contaminated with chemical or biological warfare agents--a survey of medical first responders.

    PubMed

    Brinker, Andrea; Prior, Kate; Schumacher, Jan

    2009-01-01

    The threat of mass casualties caused by an unconventional terrorist attack is a challenge for the public health system, with special implications for emergency medicine, anesthesia, and intensive care. Advanced life support of patients injured by chemical or biological warfare agents requires an adequate level of personal protection. The aim of this study was to evaluate the personal protection knowledge of emergency physicians and anesthetists who would be at the frontline of the initial health response to a chemical/biological warfare agent incident. After institutional review board approval, knowledge of personal protection measures among emergency medicine (n = 28) and anesthetics (n = 47) specialty registrars in the South Thames Region of the United Kingdom was surveyed using a standardized questionnaire. Participants were asked for the recommended level of personal protection if a chemical/biological warfare agent(s) casualty required advanced life support in the designated hospital resuscitation area. The best awareness within both groups was regarding severe acute respiratory syndrome, and fair knowledge was found regarding anthrax, plague, Ebola, and smallpox. In both groups, knowledge about personal protection requirements against chemical warfare agents was limited. Knowledge about personal protection measures for biological agents was acceptable, but was limited for chemical warfare agents. The results highlight the need to improve training and education regarding personal protection measures for medical first receivers.

  2. [Medecine, Law, and Knowledge Production about the "Civilized" War in the Long 19th Century].

    PubMed

    Goltermann, Svenja

    2015-01-01

    The aim to 'civilize' warfare accompanied Medicine and International Law ever since the mid-19th century. However, the entanglement of Medicine and Law, crucial for such an endeavour, has not been taken into consideration so far; likewise, the huge importance of medical knowledge for the perception of wars and their ramifications did not garner much attention in historical research. Hence, by focusing on the 'long' 19th century, this paper shows, firstly, that the production of surgical knowledge during warfare aimed at measuring the effects of combat on human bodies in order to develop prognostic medical knowledge for future wars, as well as maintaining the combat strength of soldiers. Moreover, this knowledge production during warfare strived for the enhancement of medical competence in the diagnosis and treatment of wounds in general. Secondly, I show that this medical knowledge was not only relevant for warfare, but also crucial for the design of International Law: it served to nourish the debates among the so called 'civilized' nations about legitimate and illegitimate weaponry and warfare.

  3. Autonomous intelligent military robots: Army ants, killer bees, and cybernetic soldiers

    NASA Astrophysics Data System (ADS)

    Finkelstein, Robert

    The rationale for developing autonomous intelligent robots in the military is to render conventional warfare systems ineffective and indefensible. The Desert Storm operation demonstrated the effectiveness of such systems as unmanned air and ground vehicles and indicated the future possibilities of robotic technology. Robotic military vehicles would have the advantages of expendability, low cost, lower complexity compared to manned systems, survivability, maneuverability, and a capability to share in instantaneous communication and distributed processing of combat information. Basic characteristics of intelligent systems and hierarchical control systems with sensor inputs are described. Genetic algorithms are seen as a means of achieving appropriate levels of intelligence in a robotic system. Potential impacts of robotic technology in the military are outlined.

  4. Environment Monitor

    NASA Technical Reports Server (NTRS)

    1988-01-01

    Viking landers touched down on Mars equipped with a variety of systems to conduct automated research, each carrying a compact but highly sophisticated instrument for analyzing Martian soil and atmosphere. Instrument called a Gas Chromatography/Mass Spectrometer (GC/MS) had to be small, lightweight, shock resistant, highly automated and extremely sensitive, yet require minimal electrical power. Viking Instruments Corporation commercialized this technology and targeted their primary market as environmental monitoring, especially toxic and hazardous waste site monitoring. Waste sites often contain chemicals in complex mixtures, and the conventional method of site characterization, taking samples on-site and sending them to a laboratory for analysis is time consuming and expensive. Other terrestrial applications are explosive detection in airports, drug detection, industrial air monitoring, medical metabolic monitoring and for military, chemical warfare agents.

  5. Device for collecting chemical compounds and related methods

    DOEpatents

    Scott, Jill R.; Groenewold, Gary S.; Rae, Catherine

    2013-01-01

    A device for sampling chemical compounds from fixed surfaces and related methods are disclosed. The device may include a vacuum source, a chamber and a sorbent material. The device may utilize vacuum extraction to volatilize the chemical compounds from the fixed surfaces so that they may be sorbed by the sorbent material. The sorbent material may then be analyzed using conventional thermal desorption/gas chromatography/mass spectrometry (TD/GC/MS) instrumentation to determine presence of the chemical compounds. The methods may include detecting release and presence of one or more chemical compounds and determining the efficacy of decontamination. The device may be useful in collection and analysis of a variety of chemical compounds, such as residual chemical warfare agents, chemical attribution signatures and toxic industrial chemicals.

  6. Devices for collecting chemical compounds

    DOEpatents

    Scott, Jill R; Groenewold, Gary S

    2013-12-24

    A device for sampling chemical compounds from fixed surfaces and related methods are disclosed. The device may include a vacuum source, a chamber and a sorbent material. The device may utilize vacuum extraction to volatilize the chemical compounds from a fixed surface so that they may be sorbed by the sorbent material. The sorbent material may then be analyzed using conventional thermal desorption/gas chromatography/mass spectrometry (TD/GC/MS) instrumentation to determine presence of the chemical compounds. The methods may include detecting release and presence of one or more chemical compounds and determining the efficacy of decontamination. The device may be useful in collection and analysis of a variety of chemical compounds, such as residual chemical warfare agents, chemical attribution signatures and toxic industrial chemicals.

  7. Functionalized polymer nanofibre membranes for protection from chemical warfare stimulants

    NASA Astrophysics Data System (ADS)

    Ramaseshan, Ramakrishnan; Sundarrajan, Subramanian; Liu, Yingjun; Barhate, R. S.; Lala, Neeta L.; Ramakrishna, S.

    2006-06-01

    A catalyst for the detoxification of nerve agents is synthesized from β-cyclodextrin (β-CD) and o-iodosobenzoic acid (IBA). Functionalized polymer nanofibre membranes from PVC polymer are fabricated with β-CD, IBA, a blend of β-CD+IBA, and the synthesized catalyst. These functionalized nanofibres are then tested for the decontamination of paraoxon, a nerve agent stimulant, and it is observed that the stimulant gets hydrolysed. The kinetics of hydrolysis is investigated using UV spectroscopy. The rates of hydrolysis for different organophosphate hydrolyzing agents are compared. The reactivity and amount of adsorption of these catalysts are of higher capacity than the conventionally used activated charcoal. A new design for protective wear is proposed based on the functionalized nanofibre membrane.

  8. 48 CFR 205.301 - General.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... not available, in accordance with 225.7002-2(b); or (B) The acquisition is for chemical warfare... determined that this acquisition of chemical warfare protective clothing furthers an agreement with a...

  9. 48 CFR 205.301 - General.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... not available, in accordance with 225.7002-2(b); or (B) The acquisition is for chemical warfare... determined that this acquisition of chemical warfare protective clothing furthers an agreement with a...

  10. 48 CFR 205.301 - General.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... not available, in accordance with 225.7002-2(b); or (B) The acquisition is for chemical warfare... determined that this acquisition of chemical warfare protective clothing furthers an agreement with a...

  11. North Korean Protective Mine Warfare: An Analysis of the Naval Minefields at Wonsan, Chinnampo and Hungnam during the Korean War

    DTIC Science & Technology

    2010-04-01

    the United States Navy and the general military history community as well. As a result, studies involving mine warfare have been neglected. In...that particular campaign. The Navy, lulled into a sense of complacency, has neglected mine warfare studies . Naval Intelligence has made little attempt...Farragut famously ignored the mineline there to destroy the Confederate fleet nearby. While extensive mining also occurred during World War One , the United

  12. Cyber ACTS/SAASS: A Second Year of Command and Staff College for the Future Leaders of Our Cyber Forces

    DTIC Science & Technology

    2009-01-01

    objectives. The Air Force is struggling to determine the best way of developing offensive and defensive capabilities for cyber warfare . Our warfighting...education (IDE) cyber warfare program at the Air Force Institute of Technology (AFIT), located at Wright-Patterson AFB, Ohio. I propose that the Air...Force create a two-year professional military education (PME) path consisting of ACSC followed by AFIT’s cyber warfare program, paralleling the current path of ACSC followed by SAASS.

  13. Application of Solid Phase Microextraction with Gas Chromatography-Mass Spectrometry as a Rapid, Reliable, and Safe Method for Field Sampling and Analysis of Chemical Warfare Agent Precursors

    DTIC Science & Technology

    2005-03-01

    in hair samples with analysis by GC-MS [41,42]. The research discussed here examined a polydimethylsiloxane polymer with 10% activated charcoal (PDMS...Field Sampling and Analysis of Chemical Warfare Agent Precursors” Name of Candidate: LT Douglas Parrish Doctor of Philosophy, Environmental...Microextraction with Gas Chromatography-Mass Spectrometry as a Rapid, Reliable, and Safe Method for Field Sampling and Analysis of Chemical Warfare

  14. Liquid Chromatography Electrospray Ionization Mass Spectrometric (LC-ESI-MS) and Desorption Electrospray Ionization Mass Spectrometric (DESI-MS) Identification of Chemical Warfare Agents in Consumer Products

    DTIC Science & Technology

    2007-06-01

    T ACanadaY Approved for PublicR Distribution Uln& Liquid Chromatography Electrospray Ionization Mass Spectrometric ( LC -ESI- MS) and Desorption...consumer products with chemical warfare agents or other toxic chemicals. Liquid chromatography electrospray ionization mass spectrometry ( LC -ESI-MS) and...house LC -ESI-MS and LC -ESI-MS/MS methods were evaluated for the determination of chemical warfare agents in spiked bottled water samples. The

  15. Continuous Acoustic Sensing With an Unmanned Aerial Vehicle System for Anti-Submarine Warfare in a High-Threat Area

    DTIC Science & Technology

    2015-12-01

    strive in multiple warfare areas. This research benefits not only the Navy, through enhancement of offensive warfighting by testing the next...multiple warfare areas. This research benefits not only the Navy, through enhancement of offensive warfighting by testing the next generation of...produce and definitely worth the research and testing to be a positive asset for the Navy. It not only can stay on station for an exponential amount of

  16. Set Up for Failure: The Use of US Security Force Assistance to Prepare Foreign Security Forces for Traditional Combat Operations

    DTIC Science & Technology

    2017-05-17

    Do the SFA lessons drawn from the unconventional warfare focus of the post-9-11 paradigm hold true across the spectrum of conflict, or are there...relevance. Do the SFA lessons drawn from the unconventional warfare focus of the post-9-11 paradigm hold true across the spectrum of conflict, or...traditional warfare is fought changes from epoch to epoch as technology, armament, and other factors change, but certain immutable principles hold true

  17. Defining Islamic Way of Warfare and Its Comparison with Al Qaeda Doctrine

    DTIC Science & Technology

    2012-06-08

    DEFINING ISLAMIC WAY OF WARFARE AND ITS COMPARISON WITH AL QAEDA DOCTRINE A thesis presented to the Faculty of the U.S. Army...subject to any penalty for failing to comply with a collection of information if it does not display a currently valid OMB control number. PLEASE DO...Islamic way of warfare. It is important to understand that anything, to be qualified as Islamic, has to have a reference from the core sources of Islam

  18. What Good Are Warfare Models?

    DTIC Science & Technology

    1981-05-01

    PROFESSIONAL PAPER 306 / May 1981 WHAT GOOD ARE WARFARE MODELS? Thomas E. Anger DTICS E LECTE ,JUN 2198 1 j CENTER FOR NAVAL ANALYSES 81 6 19 025 V...WHAT GOOD ARE WARFARE MODELS? Thomas E. /Anger J Accession For !ETIS GRA&I DTIC TAB thonnounceldŕ 5 By-C Availability Codes iAva il aand/or Di1st...least flows from a life-or-death incenLive to make good guesses when choosing weapons, forces, or strategies. It is not surprising, however, that

  19. Unmanned Warfare: Second and Third Order Effects Stemming from the Afghan Operational Environment between 2001 and 2010

    DTIC Science & Technology

    2011-06-10

    the very nature of warfare took a dramatic step into the future. With new assets capable of remaining airborne for nearly 24 hours and live video ...warfare took a dramatic step into the future. With new assets capable of remaining airborne for nearly 24 hours and live video feeds streaming to...shape the battlefield during protracted combat operations. From the real time video feeds, to the 24 hour coverage of an area of interest, tangible

  20. Space and Naval Warfare Systems Command and Overall Navy Needs to Improve Management of Waiver and Deferral Requests

    DTIC Science & Technology

    2015-10-08

    Management of Waiver and Deferral Requests Visit us at www.dodig.mil Objective Our objective for this audit was to evaluate the Space and Naval Warfare...We conducted this audit in accordance with generally accepted government auditing standards. We considered management comments on a draft of...OFFICIAL USE ON Y Introduction DODIG-2016-003 │ 1 Introduction Objective Our objective for this audit was to evaluate the Space and Naval Warfare

  1. Chemical and biological weapons in the 'new wars'.

    PubMed

    Ilchmann, Kai; Revill, James

    2014-09-01

    The strategic use of disease and poison in warfare has been subject to a longstanding and cross-cultural taboo that condemns the hostile exploitation of poisons and disease as the act of a pariah. In short, biological and chemical weapons are simply not fair game. The normative opprobrium is, however, not fixed, but context dependent and, as a social phenomenon, remains subject to erosion by social (or more specifically, antisocial) actors. The cross cultural understanding that fighting with poisons and disease is reprehensible, that they are taboo, is codified through a web of interconnected measures, principal amongst these are the 1925 Geneva Protocol; the Biological Weapons Convention; and the Chemical Weapons Convention. Whilst these treaties have weathered the storm of international events reasonably well, their continued health is premised on their being 'tended to' in the face of contextual changes, particularly facing changes in science and technology, as well as the changed nature and character of conflict. This article looks at the potential for normative erosion of the norm against chemical and biological weapons in the face of these contextual changes and the creeping legitimization of chemical and biological weapons.

  2. Femoral vessel injuries in modern warfare since Vietnam.

    PubMed

    Pearl, Jonathan P; McNally, Michael P; Perdue, Philip W

    2003-09-01

    The incidence of lower extremity injuries is high in modern warfare; however the mortality rate from these injuries is low. Despite the overall low mortality of lower extremity injuries, many deaths in modern conflicts are due to femoral vessel injury. The modern warfare literature was reviewed. In Somalia, 1 of the 14 reported deaths was due to a laceration of the superficial femoral artery. In the Persian Gulf, three deaths were reported in an Army field hospital, one resulted from uncontrolled hemorrhage from a profunda femoris artery wound and two others resulted from traumatic amputations with consequent major arterial injury. Despite the advances in modern body armor, the groin is left unprotected. A strategy to help minimize U.S. casualties in modern warfare may be a method of field hemostasis specifically designed for femoral vessel injury.

  3. Detection of biological warfare agents using ultra violet-laser induced fluorescence LIDAR

    NASA Astrophysics Data System (ADS)

    Joshi, Deepti; Kumar, Deepak; Maini, Anil K.; Sharma, Ramesh C.

    This review has been written to highlight the threat of biological warfare agents, their types and detection. Bacterial biological agent Bacillus anthracis (bacteria causing the disease anthrax) which is most likely to be employed in biological warfare is being discussed in detail. Standoff detection of biological warfare agents in aerosol form using Ultra violet-Laser Induced Fluorescence (UV-LIF) spectroscopy method has been studied. Range-resolved detection and identification of biological aerosols by both nano-second and non-linear femto-second LIDAR is also discussed. Calculated received fluorescence signal for a cloud of typical biological agent Bacillus globigii (Simulants of B. anthracis) at a location of ˜5.0 km at different concentrations in presence of solar background radiation has been described. Overview of current research efforts in internationally available working UV-LIF LIDAR systems are also mentioned briefly.

  4. Gender differences in the impact of warfare exposure on self-rated health.

    PubMed

    Wang, Joyce M; Lee, Lewina O; Spiro, Avron

    2015-01-01

    This study examined gender differences in the impact of warfare exposure on self-reported physical health. Data are from the 2010 National Survey of Veterans, a nationally representative survey of veterans from multiple eras of service. Regression analyses assessed gender differences in the association between warfare exposure (deployment to a war zone, exposure to casualties) and health status and functional impairment, adjusting for sociodemographics. Women reported better health status but greater functional impairment than men. Among men, those who experienced casualties only or both casualties and deployment to a war zone had worse health compared with those who experienced neither stressor or deployment to a war zone only. Among women, those who experienced casualties only or both stressors reported worse health than those who experienced war zone only, who did not differ from the unexposed. No association was found between warfare exposure and functional impairment in women; in men, however, those who experienced exposure to casualties or both stressors had greater odds of functional impairment compared with those who experienced war zone only or neither stressor. Exposure to casualties may be more predictive of health than deployment to a war zone, especially for men. We did not find a stronger association between warfare exposure and health for women than men. Given that the expansion of women's military roles has allowed them to serve in direct combat, their degree and scope of warfare exposure is likely to increase in the future. Copyright © 2015 Jacobs Institute of Women's Health. All rights reserved.

  5. Gender Differences in the Impact of Warfare Exposure on Self-Rated Health

    PubMed Central

    Wang, Joyce M.; Lee, Lewina O.; Spiro, Avron

    2014-01-01

    BACKGROUND This study examined gender differences in the impact of warfare exposure on self-reported physical health. METHODS Data are from the 2010 National Survey of Veterans, a nationally representative survey of veterans from multiple eras of service. Regression analyses assessed gender differences in the association between warfare exposure (deployment to a war zone, exposure to casualties) and health status and functional impairment, adjusting for sociodemographics. FINDINGS Women reported better health status but greater functional impairment than men. In men, those who experienced casualties only or both casualties and deployment to a war zone had worse health compared to those who experienced neither stressor or deployment to a war zone only. In women, those who experienced casualties only or both stressors reported worse health than those who experienced war zone only, who did not differ from the unexposed. No association was found between warfare exposure and functional impairment in women, but in men, those who experienced exposure to casualties or both stressors had greater odds of functional impairment compared to those who experienced war zone only or neither stressor. CONCLUSIONS Exposure to casualties may be more predictive of health than deployment to a war zone, especially for men. We did not find a stronger association between warfare exposure and health for women than men. Given that the expansion of women's military roles has allowed them to serve in direct combat, their degree and scope of warfare exposure is likely to increase in the future. PMID:25442366

  6. Why people believe they were exposed to biological or chemical warfare: a survey of Gulf War veterans.

    PubMed

    Brewer, Noel T; Lillie, Sarah E; Hallman, William K

    2006-04-01

    The study sought to understand better how people come to believe they have been exposed to biological and chemical warfare. We conducted telephone interviews with 1,009 American veterans (65% response rate) deployed and not deployed to the Gulf War, a conflict during which there were credible threats that such warfare could be used. Only 6% of non-Gulf War veterans reported exposure to biological or chemical warfare, but most of Gulf War veterans reported exposure (64%). The majority of these were unsure whether the exposure was chemical or biological in nature. The most commonly reported exposure indicators were receiving an alert from the military and having physical symptoms. Veterans who were certain of the type of exposure (biological or chemical) were more likely to recall having been told by the military and to recall physical symptoms. Future communications with soldiers and the general public about biological and chemical warfare may need to emphasize the uncertain nature of such risk information. Evaluations of exposure diagnostic technologies should take into account the problem of people initially believing, but not later discounting, false positive results.

  7. Oxidative decontamination of chemical and biological warfare agents using L-Gel.

    PubMed

    Raber, Ellen; McGuire, Raymond

    2002-08-05

    A decontamination method has been developed using a single reagent that is effective both against chemical warfare (CW) and biological warfare (BW) agents. The new reagent, "L-Gel", consists of an aqueous solution of a mild commercial oxidizer, Oxone, together with a commercial fumed silica gelling agent, Cab-O-Sil EH-5. L-Gel is non-toxic, environmentally friendly, relatively non-corrosive, maximizes contact time because of its thixotropic nature, clings to walls and ceilings, and does not harm carpets or painted surfaces. The new reagent also addresses the most demanding requirements for decontamination in the civilian sector, including availability, low maintenance, ease of application and deployment by a variety of dispersal mechanisms, minimal training and acceptable expense. Experiments to test the effectiveness of L-Gel were conducted at Lawrence Livermore National Laboratory and independently at four other locations. L-Gel was tested against all classes of chemical warfare agents and against various biological warfare agent surrogates, including spore-forming bacteria and non-virulent strains of real biological agents. Testing showed that L-Gel is as effective against chemical agents and biological materials, including spores, as the best military decontaminants.

  8. The Cyber Warfare Professional: Realizations for Developing the Next Generation

    DTIC Science & Technology

    2011-01-01

    consequences for the others. However, just as airpower soon emerged as a revolution in military affairs during the early twentieth century, so may cyber warfare become the next revolution for the new millennium.

  9. Encyclopedia of Explosives and Related Items. Volume 10

    DTIC Science & Technology

    1983-01-01

    trinitroethyl stearate 6 E330 Ethyiphosphorodimethylamidycyanadate se Ethyl-substituted acid amides, N-trinitro derivs GA chemical warfare agent 2.C 167; 6...6 GI Galex 6 G8-G9 GA (chemical warfare agent ) 6 G 1 Galil rifle 6 G9 GA see Dimethylaminocyanophosphoric acid Galil rifle 6 G9 5 D1308-D1309 Gabeaud...G45 Gas volumes produced on expln or detonation Gelatina explosiva de guerra 6 G45 of expls 6 G36-G41 Gelatina gomma 6 G45 Gas warfare agents 2 C165

  10. SIGINT, EW, and EIW in the Korean People’s Army: An Overview of Development and Organization

    DTIC Science & Technology

    2005-08-01

    Joseph S. Bermudez Jr. "The basic key to victory in modern warfare is to do well in electronic warfare …" Kim Jong Il96 For many years now the...96 “ Kim Jong Il Stresses Electronic Warfare Capabilities,” Radio P’yongyang, 24 September 1999, as cited in FBIS. Bytes and Bullets... Kim Jong Il98 Details concerning how the MPAF developed this understanding, and how it has organized and planned to conduct SIGINT, EW and EIW

  11. Information Warfare and the Principles of War.

    DTIC Science & Technology

    1997-02-07

    information dominance , control of ’cyberspace’ or the ’Infosphere’ and Information Warfare. Some argue that Information Warfare (IW) is just a repackaging of old concepts and current practices, while others contend it is the next Revolution in Military Affairs (RMA). The question that needs to be addressed is; can IW achieve strategic and operational military objectives on its on merit? A way to answer this questions is to analyze IW against our current doctrine. Using the principles of war as a framework, does IW fit (or can it be employed) in the

  12. Air Force Cyber Warfare: Now and the Future

    DTIC Science & Technology

    2013-10-01

    cyber warfare in popular culture. Most of them focus on the individual s uncanny grasp of technology the ability to exploit any system with a dizzying flurry of keystrokes or to fend off adversaries with a smartphone, a paper clip, and an ingenious plan. These socially awkward heroes and heroines fill the silver screen with visions of a new kind of warfare. Contradicting these stereotypes, Air Force cyber operations are carefully planned and controlled by disciplined, rigorously trained operators. Rather than acting alone, these professionals produce effects in support of

  13. U.S. Army Chemical Corps Historical Studies, Gas Warfare in World War I: The 5th Division Captures Frapelle, August 1918

    DTIC Science & Technology

    1958-03-01

    U. S . ARMY CHEMICAL CORPS HISTORICAL STUDIES GAS WARFARE IN WORLD WAR I THE 5t1h DIVISION CAPTURES FRAPELLF, 00 August 1918 CTD Offce t e Chef Ch mal...j JNSPECrrr / D~iJ f ; t t] GA o WARFARE IN WORLD WAR I By - --------- St ixdy Number 7 t:a . • ’ I : : . .. s U.S. ARMY CHEIICAL CORPS [ist...Analysi s Concerning the Weight of Shell . . . . . . . ... . 38 The Cost of Frapelle . . . . . . . . . . . .. 41 Medical Department Comments

  14. Science, Technology, and Warfare. Proceedings of the Military History Symposium (3rd) Held at the United States Air Force Academy (Colorado Springs, Colorado) on 8-9 May 1969

    DTIC Science & Technology

    1970-09-01

    between science-technology and warfare. The stereotyped theory of a linear relationship between science, technology, and warfare satisfies the facts...therefore discarded piecemeal. Only with Mahan’s theory did this condition change. Morison then considers the opposite problem today: one in which the...1938), 1:531. = A s is now very well known, the impetus theory expounded with variations by all the most important writers on philosophy of motion

  15. Interagency Cooperation for Irregular Warfare at the Combatant Command

    DTIC Science & Technology

    2009-01-01

    Directorate, and the USSOCOM Interagency Task Force ( IATF ) offer examples of JIACGs coping with the issues of IW. Each organization possesses strengths...46 USSOCOM IATF History...Force for Irregular Warfare ( IATF IW).33 EUCOM conducts interagency

  16. A history of biological and chemical warfare and terrorism.

    PubMed

    Malloy, C D

    2000-07-01

    This article provides a brief history of biological warfare and terrorism. It contends that examining disease in history provides public health specialists with the knowledge necessary to improve our surveillance system for potential acts of bioterrorism.

  17. Fluorescent sensors for the detection of chemical warfare agents.

    PubMed

    Burnworth, Mark; Rowan, Stuart J; Weder, Christoph

    2007-01-01

    Along with biological and nuclear threats, chemical warfare agents are some of the most feared weapons of mass destruction. Compared to nuclear weapons they are relatively easy to access and deploy, which makes them in some aspects a greater threat to national and global security. A particularly hazardous class of chemical warfare agents are the nerve agents. Their rapid and severe effects on human health originate in their ability to block the function of acetylcholinesterase, an enzyme that is vital to the central nervous system. This article outlines recent activities regarding the development of molecular sensors that can visualize the presence of nerve agents (and related pesticides) through changes of their fluorescence properties. Three different sensing principles are discussed: enzyme-based sensors, chemically reactive sensors, and supramolecular sensors. Typical examples are presented for each class and different fluorescent sensors for the detection of chemical warfare agents are summarized and compared.

  18. An evolutionary theory of large-scale human warfare: Group-structured cultural selection.

    PubMed

    Zefferman, Matthew R; Mathew, Sarah

    2015-01-01

    When humans wage war, it is not unusual for battlefields to be strewn with dead warriors. These warriors typically were men in their reproductive prime who, had they not died in battle, might have gone on to father more children. Typically, they are also genetically unrelated to one another. We know of no other animal species in which reproductively capable, genetically unrelated individuals risk their lives in this manner. Because the immense private costs borne by individual warriors create benefits that are shared widely by others in their group, warfare is a stark evolutionary puzzle that is difficult to explain. Although several scholars have posited models of the evolution of human warfare, these models do not adequately explain how humans solve the problem of collective action in warfare at the evolutionarily novel scale of hundreds of genetically unrelated individuals. We propose that group-structured cultural selection explains this phenomenon. © 2015 Wiley Periodicals, Inc.

  19. Changing the Scale and Efficiency of Chemical Warfare Countermeasure Discovery Using the Zebrafish

    PubMed Central

    Peterson, Randall T.; MacRae, Calum A.

    2013-01-01

    As the scope of potential chemical warfare agents grows rapidly and as the diversity of potential threat scenarios expands with non-state actors, so a need for innovative approaches to countermeasure development has emerged. In the last few years, the utility of the zebrafish as a model organism that is amenable to high-throughput screening has become apparent and this system has been applied to the unbiased discovery of chemical warfare countermeasures. This review summarizes the in vivo screening approach that has been pioneered in the countermeasure discovery arena, and highlights the successes to date as well as the potential challenges in moving the field forward. Importantly, the establishment of a zebrafish platform for countermeasure discovery would offer a rapid response system for the development of antidotes to the continuous stream of new potential chemical warfare agents. PMID:24273586

  20. Detection of biological warfare agents using ultra violet-laser induced fluorescence LIDAR.

    PubMed

    Joshi, Deepti; Kumar, Deepak; Maini, Anil K; Sharma, Ramesh C

    2013-08-01

    This review has been written to highlight the threat of biological warfare agents, their types and detection. Bacterial biological agent Bacillus anthracis (bacteria causing the disease anthrax) which is most likely to be employed in biological warfare is being discussed in detail. Standoff detection of biological warfare agents in aerosol form using Ultra violet-Laser Induced Fluorescence (UV-LIF) spectroscopy method has been studied. Range-resolved detection and identification of biological aerosols by both nano-second and non-linear femto-second LIDAR is also discussed. Calculated received fluorescence signal for a cloud of typical biological agent Bacillus globigii (Simulants of B. anthracis) at a location of ~5.0 km at different concentrations in presence of solar background radiation has been described. Overview of current research efforts in internationally available working UV-LIF LIDAR systems are also mentioned briefly. Copyright © 2013 Elsevier B.V. All rights reserved.

  1. Advances in analytical technologies for environmental protection and public safety.

    PubMed

    Sadik, O A; Wanekaya, A K; Andreescu, S

    2004-06-01

    Due to the increased threats of chemical and biological agents of injury by terrorist organizations, a significant effort is underway to develop tools that can be used to detect and effectively combat chemical and biochemical toxins. In addition to the right mix of policies and training of medical personnel on how to recognize symptoms of biochemical warfare agents, the major success in combating terrorism still lies in the prevention, early detection and the efficient and timely response using reliable analytical technologies and powerful therapies for minimizing the effects in the event of an attack. The public and regulatory agencies expect reliable methodologies and devices for public security. Today's systems are too bulky or slow to meet the "detect-to-warn" needs for first responders such as soldiers and medical personnel. This paper presents the challenges in monitoring technologies for warfare agents and other toxins. It provides an overview of how advances in environmental analytical methodologies could be adapted to design reliable sensors for public safety and environmental surveillance. The paths to designing sensors that meet the needs of today's measurement challenges are analyzed using examples of novel sensors, autonomous cell-based toxicity monitoring, 'Lab-on-a-Chip' devices and conventional environmental analytical techniques. Finally, in order to ensure that the public and legal authorities are provided with quality data to make informed decisions, guidelines are provided for assessing data quality and quality assurance using the United States Environmental Protection Agency (US-EPA) methodologies.

  2. 77 FR 60679 - Takes of Marine Mammals Incidental to Specified Activities; U.S. Navy Training and Testing...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-10-04

    ...; the Undersea Warfare Training Range; the Key West Range Complex; the Naval Surface Warfare Center... of Protected Resources, National Marine Fisheries Service, 1315 East-West Highway, Silver Spring, MD...

  3. Simulating cyber warfare and cyber defenses: information value considerations

    NASA Astrophysics Data System (ADS)

    Stytz, Martin R.; Banks, Sheila B.

    2011-06-01

    Simulating cyber warfare is critical to the preparation of decision-makers for the challenges posed by cyber attacks. Simulation is the only means we have to prepare decision-makers for the inevitable cyber attacks upon the information they will need for decision-making and to develop cyber warfare strategies and tactics. Currently, there is no theory regarding the strategies that should be used to achieve objectives in offensive or defensive cyber warfare, and cyber warfare occurs too rarely to use real-world experience to develop effective strategies. To simulate cyber warfare by affecting the information used for decision-making, we modify the information content of the rings that are compromised during in a decision-making context. The number of rings affected and value of the information that is altered (i.e., the closeness of the ring to the center) is determined by the expertise of the decision-maker and the learning outcome(s) for the simulation exercise. We determine which information rings are compromised using the probability that the simulated cyber defenses that protect each ring can be compromised. These probabilities are based upon prior cyber attack activity in the simulation exercise as well as similar real-world cyber attacks. To determine which information in a compromised "ring" to alter, the simulation environment maintains a record of the cyber attacks that have succeeded in the simulation environment as well as the decision-making context. These two pieces of information are used to compute an estimate of the likelihood that the cyber attack can alter, destroy, or falsify each piece of information in a compromised ring. The unpredictability of information alteration in our approach adds greater realism to the cyber event. This paper suggests a new technique that can be used for cyber warfare simulation, the ring approach for modeling context-dependent information value, and our means for considering information value when assigning cyber resources to information protection tasks. The first section of the paper introduces the cyber warfare simulation challenge and the reasons for its importance. The second section contains background information related to our research. The third section contains a discussion of the information ring technique and its use for simulating cyber attacks. The fourth section contains a summary and suggestions for research.

  4. Intelligence, Information Technology, and Information Warfare.

    ERIC Educational Resources Information Center

    Davies, Philip H. J.

    2002-01-01

    Addresses the use of information technology for intelligence and information warfare in the context of national security and reviews the status of clandestine collection. Discusses hacking, human agent collection, signal interception, covert action, counterintelligence and security, and communications between intelligence producers and consumers…

  5. 78 FR 22529 - Notice of Intent To Grant Partially Exclusive Patent License; Max-Viz, Inc.

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-04-16

    ... Technology Applications, Space and Naval Warfare Systems Center Pacific, Code 72120, 53560 Hull St, Bldg A33... Technology Applications, Space and Naval Warfare Systems Center Pacific, Code 72120, 53560 Hull St, Bldg A33...

  6. Offensive Cyber Capability: Can it Reduce Cyberterrorism

    DTIC Science & Technology

    2010-12-02

    33 Lech J. Janczewski, and Andrew M. Colarik, eds., Cyber Warfare and Cyber Terrorism (New York: Information Science Reference, 2008...Science and Business Media, 2008. Janczewski, Lech , J. and Andrew M. Colarik, eds., Cyber Warfare and Cyber Terrorism. New York: Information Science

  7. Electronic Warfare and Radar Systems Engineering Handbook

    DTIC Science & Technology

    1999-04-01

    EWRL Electronic Warfare Reprogrammable ELNOT Emitter Library Notation Library (USN) EM Electromagnetic EWSI EW Systems Integration E-Mail Electronic...ram air turbine (RAT) propellers used to power aircraft pods, helicopter rotor blades, and protruding surfaces of automobile hubcaps will all provide

  8. Tissue-based water quality biosensors for detecting chemical warfare agents

    DOEpatents

    Greenbaum, Elias [Oak Ridge, TN; Sanders, Charlene A [Knoxville, TN

    2003-05-27

    A water quality sensor for detecting the presence of at least one chemical or biological warfare agent includes: a cell; apparatus for introducing water into the cell and discharging water from the cell adapted for analyzing photosynthetic activity of naturally occurring, free-living, indigenous photosynthetic organisms in water; a fluorometer for measuring photosynthetic activity of naturally occurring, free-living, indigenous photosynthetic organisms drawn into the cell; and an electronics package that analyzes raw data from the fluorometer and emits a signal indicating the presence of at least one chemical or biological warfare agent in the water.

  9. Exploring the Human Fabric through an Analyst's Eyes

    NASA Astrophysics Data System (ADS)

    Belov, Nadya; Patti, Jeff; Wilcox, Saki; Almanzar, Rafael; Kim, Janet; Kellogg, Jennifer; Dang, Steven

    The nature and type of conflicts drastically changed in the last half of the twentieth century. Wars are no longer limited to the field; they are supplemented with guerrilla warfare and other asymmetric warfare tactics including domestic terrorism. Domestic terrorism has demonstrated a need for improved homeland security capabilities. Establishing and maintaining the understanding of the key players and the underlying social networks is essential to combating asynchronous warfare tactics. Herein, we identify the key challenges addressed by our Collection/Exploitation Decision System (CEDS) that assist analysts in maintaining an up-to-date understanding of dynamic human networks.

  10. Coercive Air Strategy in Post-Cold War Peace Operations

    DTIC Science & Technology

    1999-06-01

    Fariborz L. Mokhtari , ed., Peacemaking, Peacekeeping and Coalition Warfare: The Future Role of the United Nations (Washington, D.C: National Defense...Technical Information Center, 1993. Mokhtari , Fariborz L. ed. “Peacemaking, Peacekeeping and Coalition Warfare: The Future Role of the United Nations

  11. Adaptive Army: Embracing the Concept of Operational Manoeuvre from the Sea

    DTIC Science & Technology

    2010-05-05

    PEACE Source: Headquarters Training Command- Army. Land Warfare Doctrine LWD 3-01: Formation Tactics. Australian Army, November 27, 2003. 27...Amphibious Capability Implementation Team, June 15, 2009. Headquarters Training Comrriand- Army. Land Warfare Doctrine LWD 3-0: Operations. Australian Army

  12. Health-related quality of life of chemical warfare victims: an assessment with the use of a specific tool.

    PubMed

    Biat Saeed, Khaled; Parandeh, Akram; Alhani, Fatemeh; Salaree, Mohammad Mehdi

    2014-02-01

    Exposure to chemical warfare gases significantly changes the quality of life (QoL) of victims and has significant chronic adverse effects. This study sought to assess the health-related QoL (HRQoL) of chemical victims by means of a tool specifically designed for this purpose. The correlation of their QoL with several demographic factors was evaluated as well. In this descriptive cross-sectional study, 120 chemical warfare victims were selected from subjects presenting to selected medical centers in Tehran in 2012 using convenience sampling. Two questionnaires of demographic information and HRQoL of chemical warfare victims (specific tool) were used for data collection. The data were analyzed using SPSS version 20 software (IBM, Armonk, NY, USA). The mean and standard deviation (mean ± SD) of scores obtained by chemical warfare victims in physical, psychosocial and spiritual domains was 39.6 ± 16.5, 42.1 ± 15.2 and 82.4 ± 15.4, respectively. Different age groups showed a significant difference in the psychosocial domain score (P < 0.01). Also, the physical and spiritual domain scores had significant differences with respect to the level of education (P < 0.001). The occupational status showed significant differences in the psychosocial and spiritual domains scores of QoL (P < 0.001). The physical and psychosocial domain scores also accounted for a significant difference with respect to the duration and severity of pulmonary symptoms (P < 0.05). Considering the importance and high value of spirituality in chemical warfare victims, it can be used as strategically for these patients to help them cope with their injury and improve their physical and psychosocial health and QoL.

  13. Health-Related Quality of Life of Chemical Warfare Victims: An Assessment with the Use of a Specific Tool

    PubMed Central

    Biat Saeed, Khaled; Parandeh, Akram; Alhani, Fatemeh; Salaree, Mohammad Mehdi

    2014-01-01

    Background: Exposure to chemical warfare gases significantly changes the quality of life (QoL) of victims and has significant chronic adverse effects. Objective: This study sought to assess the health-related QoL (HRQoL) of chemical victims by means of a tool specifically designed for this purpose. The correlation of their QoL with several demographic factors was evaluated as well. Patients and Methods: In this descriptive cross-sectional study, 120 chemical warfare victims were selected from subjects presenting to selected medical centers in Tehran in 2012 using convenience sampling. Two questionnaires of demographic information and HRQoL of chemical warfare victims (specific tool) were used for data collection. The data were analyzed using SPSS version 20 software (IBM, Armonk, NY, USA). Results: The mean and standard deviation (mean ± SD) of scores obtained by chemical warfare victims in physical, psychosocial and spiritual domains was 39.6 ± 16.5, 42.1 ± 15.2 and 82.4 ± 15.4, respectively. Different age groups showed a significant difference in the psychosocial domain score (P < 0.01). Also, the physical and spiritual domain scores had significant differences with respect to the level of education (P < 0.001). The occupational status showed significant differences in the psychosocial and spiritual domains scores of QoL (P < 0.001). The physical and psychosocial domain scores also accounted for a significant difference with respect to the duration and severity of pulmonary symptoms (P < 0.05). Conclusions: Considering the importance and high value of spirituality in chemical warfare victims, it can be used as strategically for these patients to help them cope with their injury and improve their physical and psychosocial health and QoL. PMID:24719824

  14. The Aircraft Infrared Measurements Guide

    DTIC Science & Technology

    1983-03-01

    the infrared portion of the electromagnetic spectrum, but should include measure- ments across that portion of the spectrum using optical /electro... optical tech- nology. Comments should be addressed to: Commander/Director Office of Missile Electronic Warfare US Army Electronic Warfare Laboratory ATTN...58 Spatial Radiometer ................................................ 58 Seekers ( Nonimaging

  15. 13. Photocopy of drawing (original in possession of Naval Surface ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    13. Photocopy of drawing (original in possession of Naval Surface Warfare Center Carderock Division, Bethesda, MD) WIND TUNNEL BUILDING, ELEVATIONS, 1941 - Naval Surface Warfare Center, Subsonic Wind Tunnel Building, Bounded by Clara Barton Parkway & McArthur Boulevard, Silver Spring, Montgomery County, MD

  16. 50 CFR 216.274 - Mitigation.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... safe speed. Release of ordnance through cloud cover is prohibited: aircraft must be able to actually... would be used. These aircraft would be capable of flying at the slow safe speeds necessary to enable... patrol aircraft aircrews, and Anti-submarine Warfare (ASW)/Mine Warfare (MIW) helicopter crews shall...

  17. 50 CFR 216.274 - Mitigation.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... safe speed. Release of ordnance through cloud cover is prohibited: aircraft must be able to actually... would be used. These aircraft would be capable of flying at the slow safe speeds necessary to enable... patrol aircraft aircrews, and Anti-submarine Warfare (ASW)/Mine Warfare (MIW) helicopter crews shall...

  18. 50 CFR 216.274 - Mitigation.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... safe speed. Release of ordnance through cloud cover is prohibited: aircraft must be able to actually... would be used. These aircraft would be capable of flying at the slow safe speeds necessary to enable... patrol aircraft aircrews, and Anti-submarine Warfare (ASW)/Mine Warfare (MIW) helicopter crews shall...

  19. Environmental Warfare

    ERIC Educational Resources Information Center

    Barnaby, Frank

    1976-01-01

    Recent discussions at the Conference of the Committee on Disarmament have focused on the use of artificial changes in the environment as a method of warfare. A far more urgent task is development of a specific ban on already available techniques of environmental damage and a general and complete disarmament. (BT)

  20. Contamination source review for Building E5974, Edgewood Area, Aberdeen Proving Ground, Maryland

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Billmark, K.A.; Emken, M.E.; O`Reilly, D.P.

    1995-09-01

    This report documents the results of a contamination source review of Building E5974 at the Aberdeen Proving Ground (APG) in Maryland. The primary mission at APG has been the testing and evaluation of US Army warfare materials. Since its beginning in 1917, the Edgewood Area of APG has been the principal location for chemical warfare agent research, development, and testing in the US. APG was also used for producing chemical warfare agents during both world wars, and it has been a center for the storage of chemical warfare material. An attempt was made to identify and define areas of toxicmore » or hazardous contaminants and to assess the physical condition and accessibility of APG buildings. The information obtained from this review may be used to assist the US Army in planning for the future use or disposition of the buildings. The contamination source review consisted of the following tasks: historical records search, physical inspection, photographic documentation, geophysical investigation, and collection of air samples.« less

  1. The United States and biological warfare: secrets from the early cold war and Korea.

    PubMed

    Bruwer, A

    2001-01-01

    The United States and Biological Warfare is about accusations that the United States resorted to bacteriological warfare at a time of great military stress during the Korean War. In December 1951, the then US Secretary of Defense ordered early readiness for offensive use of biological weapons. Soon afterwards, the North Korean and Chinese armies accused the United States of starting a large-scale biological warfare experiment in Korea. The US State Department denied the accusation. Both parties to the dispute maintain their positions today. The authors spent 20 years researching the accusations in North America, Europe and Japan. They were the first foreigners to be given access to Chinese classified documents. The reader is also introduced to the concept of 'plausible denial', an official US policy which allowed responsible governmental representatives to deny knowledge of certain events. The authors hope that their work will contribute to the understanding of a time when modern war expanded into a new type of violence.

  2. Violence in the prehistoric period of Japan: the spatio-temporal pattern of skeletal evidence for violence in the Jomon period.

    PubMed

    Nakao, Hisashi; Tamura, Kohei; Arimatsu, Yui; Nakagawa, Tomomi; Matsumoto, Naoko; Matsugi, Takehiko

    2016-03-01

    Whether man is predisposed to lethal violence, ranging from homicide to warfare, and how that may have impacted human evolution, are among the most controversial topics of debate on human evolution. Although recent studies on the evolution of warfare have been based on various archaeological and ethnographic data, they have reported mixed results: it is unclear whether or not warfare among prehistoric hunter-gatherers was common enough to be a component of human nature and a selective pressure for the evolution of human behaviour. This paper reports the mortality attributable to violence, and the spatio-temporal pattern of violence thus shown among ancient hunter-gatherers using skeletal evidence in prehistoric Japan (the Jomon period: 13 000 cal BC-800 cal BC). Our results suggest that the mortality due to violence was low and spatio-temporally highly restricted in the Jomon period, which implies that violence including warfare in prehistoric Japan was not common. © 2016 The Author(s).

  3. Violence in the prehistoric period of Japan: the spatio-temporal pattern of skeletal evidence for violence in the Jomon period

    PubMed Central

    Nakao, Hisashi; Tamura, Kohei; Arimatsu, Yui; Nakagawa, Tomomi; Matsumoto, Naoko; Matsugi, Takehiko

    2016-01-01

    Whether man is predisposed to lethal violence, ranging from homicide to warfare, and how that may have impacted human evolution, are among the most controversial topics of debate on human evolution. Although recent studies on the evolution of warfare have been based on various archaeological and ethnographic data, they have reported mixed results: it is unclear whether or not warfare among prehistoric hunter–gatherers was common enough to be a component of human nature and a selective pressure for the evolution of human behaviour. This paper reports the mortality attributable to violence, and the spatio-temporal pattern of violence thus shown among ancient hunter–gatherers using skeletal evidence in prehistoric Japan (the Jomon period: 13 000 cal BC–800 cal BC). Our results suggest that the mortality due to violence was low and spatio-temporally highly restricted in the Jomon period, which implies that violence including warfare in prehistoric Japan was not common. PMID:27029838

  4. Chemical warfare agents. Classes and targets.

    PubMed

    Schwenk, Michael

    2018-09-01

    Synthetic toxic chemicals (toxicants) and biological poisons (toxins) have been developed as chemical warfare agents in the last century. At the time of their initial consideration as chemical weapon, only restricted knowledge existed about their mechanisms of action. There exist two different types of acute toxic action: nonspecific cytotoxic mechanisms with multiple chemo-biological interactions versus specific mechanisms that tend to have just a single or a few target biomolecules. TRPV1- and TRPA-receptors are often involved as chemosensors that induce neurogenic inflammation. The present work briefly surveys classes and toxicologically relevant features of chemical warfare agents and describes mechanisms of toxic action. Copyright © 2017 Elsevier B.V. All rights reserved.

  5. IMS software developments for the detection of chemical warfare agent

    NASA Technical Reports Server (NTRS)

    Klepel, ST.; Graefenhain, U.; Lippe, R.; Stach, J.; Starrock, V.

    1995-01-01

    Interference compounds like gasoline, diesel, burning wood or fuel, etc. are presented in common battlefield situations. These compounds can cause detectors to respond as a false positive or interfere with the detector's ability to respond to target compounds such as chemical warfare agents. To ensure proper response of the ion mobility spectrometer to chemical warfare agents, two special software packages were developed and incorporated into the Bruker RAID-1. The programs suppress interferring signals caused by car exhaust or smoke gases resulting from burning materials and correct the influence of variable sample gas humidity which is important for detection and quantification of blister agents like mustard gas or lewisite.

  6. Development of practical methods for removal of radiological, biological, and chemical contaminants from water supplies. Final report

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Woodward, R.L.; Robeck, G.G.

    1958-06-01

    Laboratory and engineering studies were conducted to determine the design criteria and cost estimated of providing and operating devices to protect against radiological, biological and chemical warfare agents that may contaminate shore based Naval water supplies. Small disposable columns of mixed cation-anion exchange resins will remove the soluble radionuclides enough to suffice for immediate drinking and culinary purposes. Chemical warfare agents are so numerous and varied that it is not feasible to provide a single protective device to cope with them. Chlorination with free available chlorine residuals of 1 mg liter will handle most biological warfare agents.

  7. Protective Garments for Public Officials

    DTIC Science & Technology

    1973-08-01

    Approved for public release; distribution urlimited. U. S. ARMY IAND WARFARE LABORATORY Aberdeen Proving Ground , Maryland 21005 ABSTRACT TThis task has...unlimited. - U. S. ARMY LAND WARFARE LABORATORY .&1 A~ereemProinaGroun~d. Morviarnd 21005 Aberden Pov\\J TECHNICAL REPORT NO. LW j<B0B73 PROTECTIVE

  8. 10. Photocopy of drawing (original in possession of Naval Surface ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    10. Photocopy of drawing (original in possession of Naval Surface Warfare Center Carderock Division, Bethesda, MD) SUPERSONIC WIND TUNNEL BUILDING, GROUND FLOOR PLAN, 1947 - Naval Surface Warfare Center, Supersonic Wind Tunnel Building, Bounded by Clara Barton Parkway & McArthur Boulevard, Silver Spring, Montgomery County, MD

  9. PERMANENCE OF BIOLOGICAL AND CHEMICAL WARFARE AGENTS IN MUNICIPAL SOLID WASTE LANDFILL LEACHATES

    EPA Science Inventory

    The objective of this work is to permit EPA/ORD's National Homeland Security Research Center (NHSRC) and Edgewood Chemical Biological Center to collaborate together to test the permanence of biological and chemical warfare agents in municipal solid waste landfills. Research into ...

  10. Anti-Submarine Warfare (ASW) Capability Transformation: Strategy of Response to Effects Based Warfare

    DTIC Science & Technology

    2011-06-01

    the ROK Cheonan destroyer by a probable PRK submarine. Despite the authoritative findings of an International team that forensically examined the...evidence of the sinking implicating PRK , North Korea continues to maintain its innocence and deny any involvement, especially since there is

  11. Strategic Analysis of Irregular Warfare

    DTIC Science & Technology

    2010-03-01

    the same mathematical equations used by Lanchester .10 Irregular Warfare Theory and Doctrine It is time to develop new analytical methods and models...basis on which to build, similar to what Lanchester provided almost 100 years ago. Figure 9 portrays both Lanchester’s approach and an irregular 17

  12. 14. Photocopy of drawing (original in possession of Naval Surface ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    14. Photocopy of drawing (original in possession of Naval Surface Warfare Center Carderock Division, Bethesda, MD) WIND TUNNEL, FRAMING PLAN, TOP AND BOTTOM, 1941 - Naval Surface Warfare Center, Subsonic Wind Tunnel Building, Bounded by Clara Barton Parkway & McArthur Boulevard, Silver Spring, Montgomery County, MD

  13. WASTE MINIZATION OPPORTUNITY ASSESSMENT: NAVAL UNDERSEA WARFARE ENGINEERING STATION - KEYPORT, WA

    EPA Science Inventory

    This report describes the application of EPA's waste minimization assessment procedures to a torpedo maintenance facility at the Naval Undersea Warfare Engineering Station, Keyport, WA. he assessment focused on the Mark 48 shop and the Mark 46 shop. hese shops service the Mark 48...

  14. The Venus "Shell-over-Star" hieroglyph and Maya warfare: An examination of the interpretation of a Mayan symbol

    NASA Astrophysics Data System (ADS)

    Voit, Claudia Ann

    For decades, Maya scholars have associated the Mayan "Shell-Star" (also referred to as "Star-War") hieroglyph with Maya warfare. Put forward by scholars such as Floyd Lounsbury and David Kelley, and later advanced by Linda Schele, David Freidel, Ian Graham, Peter Matthews, Anthony Aveni and others, there are now dozens of published articles and chapters relating the hieroglyph to Venus and warfare. Venus is one of the most notable celestial objects outside of the Sun and Moon and was highly visible to the inhabitants of the Maya world. The Dresden Codex (an astronomical almanac) contains important information about the planet Venus, and the calendar section was deciphered by the librarian and mathematician, Ernst Förstemann in the late 1800s. In his decipherment, he deduced that the numbers contained in the tables must be connected to the orbital period of the planet. There is no other planet with the same orbital period 3 as Venus. Förstemann suggested that the decoded astronomy tables were used by the Maya to determine when to wage war. This interpretation, along with others, like Floyd Lounsbury`s study of Venus and the Long Count date at Bonampak were the seeds that have led to methodological errors that first began to take root in Maya research. The idea of the Venus association with warfare took hold and continues to propagate. Many scholars continue to assert that the "shell-star" glyph is related to warfare events. Others, like Gerardo Aldana, and Stanley Guenter, have recently come forward to reexamine and question the hieroglyph and its relationship, if any, to Maya warfare. I suggest, further, that methodological errors may have occurred along the way. I propose that these errors include data lost in translation, and inaccurate translations. In addition, the statistical analysis of Venus cycles has weak points. If this identification of the errors is correct, we need to re-evaluate the weakened foundation on which we are building our assertions about the role of Venus in Maya warfare. In this work, I examine the initial and subsequent interpretations of the Mayan "shell-star" hieroglyph, a symbol that has begun to generate an increasing amount of discussion among Mayan scholars over the last several years. In addition, I discuss new arguments (like that of Gerardo Aldana) regarding the role of Venus in Maya warfare. Finally, I would like to provide some suggestions for future research regarding this subject.

  15. [Perspectives in the treatments of poisonings by organophosphorus insecticides and warfare nerve agents].

    PubMed

    Sogorb-Sánchez, M A; Vilanova-Gisbert, E; Carrera-González, V

    Organophosphorus compounds are worldwide employed as insecticides and are yearly responsible of several millions of poisonings. The chemical structure of most of the warfare nerve agents also corresponds with an organophosphorus compound. Organophosphorus insecticides and warfare nerve agents exert their main toxicological effects through inhibition of acetylcholinesterase. Current treatments of patients poisoned with organophosphorus compounds include atropine (in order to protect muscarinic receptors), oximes (in order to accelerate the reactivation of the inhibited acetylcholinesterase) and benzodiazepines (in order to avoid convulsions). The administration of phosphotriesterases (enzymes involved in the detoxication of organophosphorus compounds through hydrolysis) is a very effective treatment against poisonings by organophosphorus insecticides and warfare nerve agents. There are experimental preventive treatments based on the simultaneous administration of carbamates and certain antimuscarinic drugs, different from atropine, which notably improve the efficacy of the classical treatments applied after poisonings by warfare nerve agents. The treatments based in the administration of phosphotriesterases might be the response to the call of the World Health Organization for searching new treatments with capability to reduce the high mortality recorded in the cases of poisonings by organophosphorus compounds. These treatments can be applied in a preventive way without the intrinsic neurotoxicity associated to the preventive treatments based on carbamates and antimuscarinic drugs. Therefore, these treatments are specially interesting for people susceptible to suffer severe exposures, i.e. sprayers in the farms.

  16. The Age of Irregular Warfare: So What?

    DTIC Science & Technology

    2010-01-01

    Lynne Rienner, 2002), and Michael Vlahos , Fighting Identity: Sacred War and World Change (Westport, CT: Praeger Security Interna- tional, 2009). 7...the forms that warfare will take.” 8 I agree with Michael Vlahos that we poten- tially make matters worse by using the image of a triangle to depict

  17. IW Cyberlaw. The Legal Issues of Information Warfare

    DTIC Science & Technology

    1999-01-01

    actions. The Information Warfare Center at Kelly AFB, Texas, casts a wide net in its definition of information war- fare. Its view is that... Maura T. McGowan, in an unpublished study en- titled “Law of Armed Conflict” (Colorado Springs, Colo.: United States Air Force Academy, Department of

  18. Defining Deterrence in Cyberspace Working Toward a Framework to Integrate Cyber Deterrence

    DTIC Science & Technology

    2011-04-01

    The goal of deterrence is not to deter the use of a particular weapon. Rather, a nation deters undesirable behavior. Cyber warfare can produce three...associated limitations will not produce a strategically decisive result. Cyber warfare must be used in conjunction with other instruments of power to

  19. Defense Standardization Program Journal, April/Jun 2007

    DTIC Science & Technology

    2007-06-01

    Delivers Far-Reaching Standardization 9 Air Force Cyber Warfare Training 14 DMSMS Working Group Reaches Out to Programs 18 An Effects-Based Metrics...defend- ers their first 10 cyber warfare combat "sorties" and prepared them for net- work crew positions. Four MAJCOMs participated in BD 2002.The Air

  20. Models, Analysis, and Recommendations Pertaining to the Retention of Naval Special Warfare s Mid-Level Officers

    DTIC Science & Technology

    2013-12-01

    The Analytic Hierarch/Network Process,” in Rev. R. Acad. Cien. Serie A. Mat (RACSAM), submitted by Francisco Javier Giron (Real Academia de Ciencias ...Academia de Ciencias : Spain. Scott, Nathan. Naval Special Warfare Officer Retention Survey. Monterey, CA: NPS Press, September 2013. Whittenberger

  1. 12. Photocopy of drawing (original in possession of Naval Surface ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    12. Photocopy of drawing (original in possession of Naval Surface Warfare Center Carderock Division, Bethesda, MD) SUPERSONIC WIND TUNNEL, STEEL VACUUM SPHERE, FOUNDATION PLAN, ELEVATION AND DETAILS, 1947 - Naval Surface Warfare Center, Supersonic Wind Tunnel Building, Bounded by Clara Barton Parkway & McArthur Boulevard, Silver Spring, Montgomery County, MD

  2. 23. Photocopy of drawing (original in possession of Naval Surface ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    23. Photocopy of drawing (original in possession of Naval Surface Warfare Center Carderock Division, Bethesda, MD) 7 X 10 FOOT SONIC WIND TUNNEL, FAN HOUSING ASSEMBLY, 1952 - Naval Surface Warfare Center, Transonic Wind Tunnel Building, Bounded by Clara Barton Parkway & McArthur Boulevard, Silver Spring, Montgomery County, MD

  3. 9. Photocopy of photograph (original photograph in the collection of ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    9. Photocopy of photograph (original photograph in the collection of Naval Surface Warfare Center Carderock Division, Bethesda, MD) VIEW SOUTH, SUPERSONIC WIND TUNNEL TEST SECTION, ca 1950 - Naval Surface Warfare Center, Supersonic Wind Tunnel Building, Bounded by Clara Barton Parkway & McArthur Boulevard, Silver Spring, Montgomery County, MD

  4. 10. Photocopy of photograph (original photograph in the collection of ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    10. Photocopy of photograph (original photograph in the collection of Naval Surface Warfare Center Carderock Division, Bethesda, MD) VIEW SOUTHWEST, SUBSONIC WIND TUNNEL BUILDING, 1943 - Naval Surface Warfare Center, Subsonic Wind Tunnel Building, Bounded by Clara Barton Parkway & McArthur Boulevard, Silver Spring, Montgomery County, MD

  5. 19. Photocopy of drawing (original In possession of Naval Surface ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    19. Photocopy of drawing (original In possession of Naval Surface Warfare Center Carderock Division, Bethesda, MD) 7 X 10 FOOT SONIC WIND TUNNEL PLOT AND GRADING PLAN, 1952 - Naval Surface Warfare Center, Transonic Wind Tunnel Building, Bounded by Clara Barton Parkway & McArthur Boulevard, Silver Spring, Montgomery County, MD

  6. 21. Photocopy of drawing (original in possession of Naval Surface ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    21. Photocopy of drawing (original in possession of Naval Surface Warfare Center Carderock Division, Bethesda, MD) 7 X 10 FOOT SONIC WIND TUNNEL, LABORATORY AND OFFICE BUILDING, 1950 - Naval Surface Warfare Center, Transonic Wind Tunnel Building, Bounded by Clara Barton Parkway & McArthur Boulevard, Silver Spring, Montgomery County, MD

  7. 12. Photocopy of drawing (original in possession of Naval Surface ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    12. Photocopy of drawing (original in possession of Naval Surface Warfare Center Carderock Division, Bethesda, MD) WIND TUNNEL BUILDING, FIRST FLOOR PLAN, NOTE OPEN SHOP, 1941 - Naval Surface Warfare Center, Subsonic Wind Tunnel Building, Bounded by Clara Barton Parkway & McArthur Boulevard, Silver Spring, Montgomery County, MD

  8. 11. Photocopy of drawing (original in possession of Naval Surface ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    11. Photocopy of drawing (original in possession of Naval Surface Warfare Center Carderock Division, Bethesda, MD) SUPERSONIC WIND TUNNEL BUILDING, SECTIONS AND DETAILS, MECHANICAL, 1947 - Naval Surface Warfare Center, Supersonic Wind Tunnel Building, Bounded by Clara Barton Parkway & McArthur Boulevard, Silver Spring, Montgomery County, MD

  9. 11. Photocopy of photograph (original photograph In the collection of ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    11. Photocopy of photograph (original photograph In the collection of Naval Surface Warfare Center Carderock Division, Bethesda, MD) VIEW NORTHEAST, INTERIOR, SUBSONIC WIND TUNNEL FAN ASSEMBLY, 1943 - Naval Surface Warfare Center, Subsonic Wind Tunnel Building, Bounded by Clara Barton Parkway & McArthur Boulevard, Silver Spring, Montgomery County, MD

  10. New Developments in Chinese Strategic Psychological Warfare

    DTIC Science & Technology

    2005-01-01

    Taoism , which coupled hardness with softness in warfare, was not the only influence on the theory of psychological operations in ancient China. Other...portraying Islamic martyrs who appear to speak to soldiers from the clouds.38 In contemporary wars, such as the Gulf War, the first targets attacked have

  11. Conquest from Within: A Comparative Analysis between Soviet Active Measures and United States Unconventional Warfare Doctrine

    DTIC Science & Technology

    2015-05-27

    irregular threats. Unconventional Warfare (UW), traditionally a Special Operations Forces core activity, has served U.S. strategic interests in a variety...Special Operations Forces core activity, has served U.S. strategic interests in a variety of operational environments. Throughout the Cold War, the

  12. Binding of chemical warfare agent simulants as guests in a coordination cage: contributions to binding and a fluorescence-based response.

    PubMed

    Taylor, Christopher G P; Piper, Jerico R; Ward, Michael D

    2016-05-07

    Cubic coordination cages act as competent hosts for several alkyl phosphonates used as chemical warfare agent simulants; a range of cage/guest structures have been determined, contributions to guest binding analysed, and a fluorescent response to guest binding demonstrated.

  13. Al Qaeda and Fourth Generation Warfare as its Strategy

    DTIC Science & Technology

    2008-01-01

    and materia ~ as well as money, from one point ofthe non- linear battlefield to another, thereby giving more flexibility to obtain the right materials...translated by Griffith, Samuel B., On Guerilla Warfare, (1937),21-22. 14 Bodansky, Yossef, Bin Laden The Man Who Declared War on America (Rocklin: Prima

  14. Portable Sensor for Chemical Nerve Agents and Organophosphorus Compounds

    DTIC Science & Technology

    2015-08-18

    as pesticides in crop, livestock, and poultry products and as chemical and biological warfare agents. As a result of the high toxicity and the...agents have been exploited for use as pesticides in crop, livestock, and poultry products and as chemical and biological warfare agents. As a result of

  15. Prognostication: Do the Services See the Same Future of Warfare?

    DTIC Science & Technology

    2008-05-01

    conduct of war, warfare. 24 Dana Johnson, Scott Pace, C. Bryan Gabbard , Space: Emerging Options for National Power, (RAND, 1998), 10. 25 Creveld, 145...Bryan Gabbard . Space: Emerging Options for National Power, RAND http://www.rand.org/pubs/monograph_reports/MR517/, 1998. (Accessed 5 January 2008

  16. Integrated Biological Warfare Technology Platform (IBWTP). Intelligent Software Supporting Situation Awareness, Response, and Operations

    DTIC Science & Technology

    2007-01-01

    15 4.2.3. Users of Systems for Combating Biological Warfare ................................ 16 4.2.4...21 4.3.1. Existing Biosurveillance Systems .............................................................. 22 4.3.2. Automatic Integration...74 6.4.4. Multi-Agent System Management System (MMS).................................... 75 6.4.5. Agent Glossary

  17. The Role of the National Guard in Homeland Security

    DTIC Science & Technology

    2007-05-01

    Fulcrum Publishing, 1996), 19. 22Ibid., 20. 23Thomas Andrew Bailey and Paul B. Ryan, The Lusitania Disaster: An Episode in Modern Warfare and...Bailey, Thomas Andrew, and Paul B. Ryan. The Lusitania Disaster: An Episode in Modern Warfare and Diplomacy. New York, NY: Free Press, 1975. Ball

  18. Role of Reconnaissance in the Counterattack.

    DTIC Science & Technology

    2016-05-26

    Bejing: Foreign Language Press, 1967), 107. Sun - Tzu , The Art of Warfare, translated by Robert Ames (New York: Ballantine Books, 1993), 113. 14 B.H...dhat: qissat hayati. Cairo, Egypt: al-Maktab al-Misri al-Hadith, 1985. Sun - Tzu . The Art of Warfare. Translated by Robert Ames. New York: Ballantine...39 Bibliography

  19. The Decline of Air Assault Operations

    DTIC Science & Technology

    2016-05-26

    Anthology (Carlisle Barracks: US Army War College, 2000), 6-7. 94 Clausewitz, 198; Sun Tzu , The Art of Warfare, trans. Robert Ames (New York...Encyclopedia of World War II. Santa Barbara: ABC-CLIO, 2004. Tzu , Sun . The Art of Warfare. Trans. Robert Ames. New York: Ballentine Books, 1993. 55... Bibliography ...................................................................................................................................51 iv

  20. 15. Photocopy of drawing (original in possession of Naval Surface ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    15. Photocopy of drawing (original in possession of Naval Surface Warfare Center Carderock Division, Bethesda, MD) WIND TUNNEL, ELEVATIONS E-E TO H-H AND SECTIONS, 1941 - Naval Surface Warfare Center, Subsonic Wind Tunnel Building, Bounded by Clara Barton Parkway & McArthur Boulevard, Silver Spring, Montgomery County, MD

  1. Anti-biofilm peptides as a new weapon in antimicrobial warfare.

    PubMed

    Pletzer, Daniel; Coleman, Shannon R; Hancock, Robert Ew

    2016-10-01

    Microorganisms growing in a biofilm state are very resilient in the face of treatment by many antimicrobial agents. Biofilm infections are a significant problem in chronic and long-term infections, including those colonizing medical devices and implants. Anti-biofilm peptides represent a very promising approach to treat biofilm-related infections and have an extraordinary ability to interfere with various stages of the biofilm growth mode. Anti-biofilm peptides possess promising broad-spectrum activity in killing both Gram-positive and Gram-negative bacteria in biofilms, show strong synergy with conventional antibiotics, and act by targeting a universal stringent stress response. Understanding downstream processes at the molecular level will help to develop and design peptides with increased activity. Anti-biofilm peptides represent a novel, exciting approach to treating recalcitrant bacterial infections. Copyright © 2016 Elsevier Ltd. All rights reserved.

  2. Ectopic banking of amputated great toe for delayed thumb reconstruction: case report.

    PubMed

    Valerio, Ian L; Hui-Chou, Helen G; Zelken, Jonathan; Basile, Patrick L; Ipsen, Derek; Higgins, James P

    2014-07-01

    Ectopic banking of amputated parts is a recognized technique for delayed replantation of an amputated part when the amputation stump will not permit immediate replantation. This is conventionally performed with the intent of transferring the injured part back to its anatomic position when the amputation stump is more appropriate for replantation. Current warfare conditions have led to a commonly encountered military trauma injury pattern of multiple extremity amputations with protected trunk and core structures. This pattern poses many challenges, including the limit or absence of donor sites for immediate or delayed flap reconstructive procedures. We describe a case in which we ectopically banked the great toe of an amputated lower extremity for delayed thumb reconstruction. Copyright © 2014 American Society for Surgery of the Hand. Published by Elsevier Inc. All rights reserved.

  3. Medical challenges of internal conflicts.

    PubMed

    Leppäniemi, A K

    1998-12-01

    The most prevalent menace since the end of the cold war is the occurrence of civil wars and local and regional conflicts. The term "low intensity conflict" describes the new threat environment and covers a multitude of phenomena, such as civil wars, guerrilla warfare, terrorism and counterinsurgency operations occurring between routine, peaceful inter- or intrastate competition, and a sustained conventional conflict. There is a great challenge to alert the physicians in general, and the surgical community of the world in particular, to the new threat environment and the medical challenges involved in treating casualties of low intensity conflicts. Specifically, a new international body of surgeons might be required to coordinate the recruitment, training, and creditation for surgeons with special expertise in the management of victims of such conflicts and to facilitate research and general knowledge of the medical challenges of modern conflicts.

  4. Hair analysis as a useful procedure for detection of vapour exposure to chemical warfare agents: simulation of sulphur mustard with methyl salicylate.

    PubMed

    Spiandore, Marie; Piram, Anne; Lacoste, Alexandre; Josse, Denis; Doumenq, Pierre

    2014-06-01

    Chemical warfare agents (CWA) are highly toxic compounds which have been produced to kill or hurt people during conflicts or terrorist attacks. Despite the fact that their use is strictly prohibited according to international convention, populations' exposure still recently occurred. Development of markers of exposure to CWA is necessary to distinguish exposed victims from unexposed ones. We present the first study of hair usage as passive sampler to assess contamination by chemicals in vapour form. This work presents more particularly the hair adsorption capacity for methyl salicylate used as a surrogate of the vesicant sulphur mustard. Chemical vapours toxicity through the respiratory route has historically been defined through Haber's law's concentration-time (Ct) product, and vapour exposure of hair to methyl salicylate was conducted with various times or doses of exposure in the range of incapacitating and lethal Ct products corresponding to sulphur mustard. Following exposure, extraction of methyl salicylate from hair was conducted by simple soaking in dichloromethane. Methyl salicylate could be detected on hair for vapour concentration corresponding to about one fifth of the sulphur mustard concentration that would kill 50% of exposed individuals (LCt50). The amount of methyl salicylate recovered from hair increased with time or dose of exposure. It showed a good correlation with the concentration-time product, suggesting that hair could be used like a passive sampler to assess vapour exposure to chemical compounds. It introduces great perspectives concerning the use of hair as a marker of exposure to CWA. Copyright © 2014 John Wiley & Sons, Ltd.

  5. Tissue-based standoff biosensors for detecting chemical warfare agents

    DOEpatents

    Greenbaum, Elias; Sanders, Charlene A.

    2003-11-18

    A tissue-based, deployable, standoff air quality sensor for detecting the presence of at least one chemical or biological warfare agent, includes: a cell containing entrapped photosynthetic tissue, the cell adapted for analyzing photosynthetic activity of the entrapped photosynthetic tissue; means for introducing an air sample into the cell and contacting the air sample with the entrapped photosynthetic tissue; a fluorometer in operable relationship with the cell for measuring photosynthetic activity of the entrapped photosynthetic tissue; and transmitting means for transmitting analytical data generated by the fluorometer relating to the presence of at least one chemical or biological warfare agent in the air sample, the sensor adapted for deployment into a selected area.

  6. Chemical-warfare techniques for insect control: insect 'pests' in Germany before and after World War I.

    PubMed

    Jansen, S

    2000-01-01

    During World War I, chemical-warfare practices were introduced into economic entomology in Germany. Fritz Haber, 'the father of chemical warfare', realized that Germany could not win the war and thus looked for 'civilian' uses for his chemical arsenal. Before the war, there was a rhetoric of dangerous 'masses' of insects but the large-scale techniques needed to deal with them had not been developed. The gap between rhetoric and practices enabled entomology to integrate chemical weapons into its working methods. This article traces transformations in the ways of seeing insects and their control from the mid-nineteenth century to after World War I.

  7. The Entomological Institute of the Waffen-SS: evidence for offensive biological warfare research in the third Reich.

    PubMed

    Reinhardt, Klaus

    2013-12-01

    In January 1942, Heinrich Himmler, head of the Schutzstaffel (SS) and police in Nazi Germany, ordered the creation of an entomological institute to study the physiology and control of insects that inflict harm to humans. Founded in the grounds of the concentration camp at Dachau, it has been the focus of previous research, notably into the question of whether it was involved in biological warfare research. This article examines research protocols by the appointed leader Eduard May, presented here for the first time, which confirm the existence of an offensive biological warfare research programme in Nazi Germany. Copyright © 2013 Elsevier Ltd. All rights reserved.

  8. Immobilization of Enzymes in Nanoporous Host Materials: A Nanobiotechnological Approach to Decontamination and Demilitarization of Chemical and Biological Warfare Agents

    DTIC Science & Technology

    2002-05-06

    Organophosphorus compounds (OPs) are highly toxic and found extensive use as pesticides , insecticides and potential chemical warfare (CW) agents . Recently...commonly used substrate, the serine protease inhibitor diisopropyl fluorophosphates (DFP), and different fluoride-containing G-type nerve agents such as...

  9. Joint Command and Control of Cyber Operations: The Joint Force Cyber Component Command (JFCCC)

    DTIC Science & Technology

    2012-05-04

    relies so heavily on complex command and control systems and interconnectivity in general, cyber warfare has become a serious topic of interest at the...defensive cyber warfare into current and future operations and plans. In particular, Joint Task Force (JTF) Commanders must develop an optimum method to

  10. 21st Century Cyber Security: Legal Authorities and Requirements

    DTIC Science & Technology

    2012-03-22

    Cyber warfare has risen to the level of strategic effect. Exigent threats in cyberspace are a critical U.S. strategic vulnerability for which U.S...operations cross many sections of United States Code. But, they have not yielded a genuine whole-of-government approach. This SRP argues that cyber warfare has

  11. Defending a New Domain: The Pentagon’s Cyberstrategy

    DTIC Science & Technology

    2010-01-01

    mentali.tT will not work. The United States cannot retreat behind a Maginot Line offire- wttlls or it will risk being overrun. Cyber - warfare is like...provides a dear and accountable way to marshal cyber - warfare resources from across tl~e military. A single chain of command runs f’rom the U.S

  12. Rethinking Cultural Influences on Warfare

    DTIC Science & Technology

    2012-05-17

    36 Jarole B. Manheim, Richard C. Lars Willnat, and Craig Brians , Empirical Political...Willnat, and Craig Brians , Empirical Political Analysis: Quantitative and Qualitative Research Methods (New York: Pearson Education Inc, 2008... Boxer Rebellions. In 1950, China was emerging from 13 years of protracted warfare with Japan and a civil war between the Chinese Communist Party (CCP

  13. 20. Photocopy of drawing (original in possession of Naval Surface ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    20. Photocopy of drawing (original in possession of Naval Surface Warfare Center Carderock Division, Bethesda, MD) 7 X 10 FOOT SONIC WIND TUNNEL FIRST FLOOR PLANS AND DETAILS, 1948 - Naval Surface Warfare Center, Transonic Wind Tunnel Building, Bounded by Clara Barton Parkway & McArthur Boulevard, Silver Spring, Montgomery County, MD

  14. 22. Photocopy of drawing (original in possession of Naval Surface ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    22. Photocopy of drawing (original in possession of Naval Surface Warfare Center Carderock Division, Bethesda, MD) 7 X 10 FOOT SONIC WIND TUNNEL, INSTALLATION OF POWER EQUIPMENT AND ACCESSORIES, 1950 - Naval Surface Warfare Center, Transonic Wind Tunnel Building, Bounded by Clara Barton Parkway & McArthur Boulevard, Silver Spring, Montgomery County, MD

  15. Canada’s Army and the Concept of Maneuver Warfare: The Legacy of the Twentieth Century (1899-1998)

    DTIC Science & Technology

    2002-01-01

    comprehensiveness and authenticity. Canadian operational experience in peace and war over the last century has been characterized by: static warfare; attrition; lack...2 THE BOER WAR (1899 - 1901) .............................................................................................5...PRELUDE TO WORLD WAR I (1902 - 1913) ........................................................................8 WORLD WAR ONE (1914 - 1918

  16. Above the Influence: The Strategic Effects of Airpower in Irregular Warfare

    DTIC Science & Technology

    2010-06-01

    INDOCHINA. . . . . . . . . . . . . . . . . . . . . 105 APPENDIX B: MAP OF LAOS . . . . . . . . . . . . . . . . . . . . . . . . . . . 106 APPENDIX...perspectives. These perspectives involve the use of airpower in North Vietnam, South Vietnam, and Laos . The overarching political endstate or...Nagl, ―Principles, Imperatives, and Paradoxes of Counterinsurgency,‖ 50; Mao Tse -Tung, Problems of Strategy in Guerrilla Warfare, 215-216; Gray

  17. 75 FR 20828 - Availability for Non-Exclusive, Exclusive, or Partially Exclusive Licensing of U.S. Patent...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-04-21

    ... all types of harmful chemicals, specifically chemical warfare agents (CWAs). The topical skin protectant offers a barrier property and an active moiety that serves to neutralize chemical warfare agents...: Department of the Army, DoD. ACTION: Notice. SUMMARY: Announcement is made of the availability for licensing...

  18. 78 FR 63971 - Notice of Availability of Record of Decision for Outdoor Research, Development, Test and...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-10-25

    ... Outdoor Research, Development, Test and Evaluation Activities at Naval Surface Warfare Center, Dahlgren Division, Dahlgren, VA AGENCY: Department of the Navy, DoD. ACTION: Notice. SUMMARY: The Department of the... proposed action, announces its decision to expand the Naval Surface Warfare Center, Dahlgren Division's...

  19. 78 FR 55326 - Determinations Regarding Use of Chemical Weapons in Syria Under the Chemical and Biological...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-09-10

    ... DEPARTMENT OF STATE [Public Notice 8460] Determinations Regarding Use of Chemical Weapons in Syria Under the Chemical and Biological Weapons Control and Warfare Elimination Act of 1991 AGENCY: Bureau of...(d) of the Chemical and Biological Weapons Control and Warfare Elimination Act of 1991, as amended...

  20. 75 FR 58373 - Notice of Intent To Grant Exclusive Patent License; DQE, Inc.

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-09-24

    ... objections are to be filed with Naval Surface Warfare Center, Crane Division, Code OOL, Bldg 2, 300 Highway 361, Crane, IN 47522-5001. FOR FURTHER INFORMATION CONTACT: Mr. Christopher Monsey, Naval Surface Warfare Center, Crane Division, Code OOL, Bldg 2, 300 Highway 361, Crane, IN 47522-5001, telephone 812-854...

  1. 77 FR 14508 - Notice of Availability of Government-Owned Inventions; Available for Licensing

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-03-12

    ... launching device). ADDRESSES: Written objections are to be filed with Naval Surface Warfare Center, Crane Div, Code OOL, Bldg 2, 300 Highway 361, Crane, IN 47522-5001. FOR FURTHER INFORMATION CONTACT: Mr. Christopher Monsey, Naval Surface Warfare Center, Crane Div, Code OOL, Bldg 2, 300 Highway 361, Crane, IN...

  2. 77 FR 5242 - Notice of Availability of Government-Owned Invention; Available for Licensing

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-02-02

    ... weapon mount). ADDRESSES: Written objections are to be filed with Naval Surface Warfare Center, Crane Div, Code OOL, Bldg 2, 300 Highway 361, Crane, IN 47522-5001. FOR FURTHER INFORMATION CONTACT: Mr. Christopher Monsey, Naval Surface Warfare Center, Crane Div, Code OOL, Bldg 2, 300 Highway 361, Crane, IN...

  3. Public Discussion of Nuclear Warfare: A Time for Hope.

    ERIC Educational Resources Information Center

    Cooper, Martha

    Anti-nuclear discourse, which peaked in 1981-82, signaled an emergence of public discourse on the nuclear warfare issue. During the development of the original atomic bomb, public discussion of the issue was severely restricted, but immediately after the bombing of Hiroshima and Nagasaki, discourse on the subject increased. During the Cold War…

  4. Defending the Borderland: Ukrainian Military Experiences with IO, Cyber, and EW

    DTIC Science & Technology

    2017-12-01

    31 Tactical Information Operations...seeks to understand the current state of hybrid warfare in Ukraine with a particular emphasis on the use of Information Operations (IO), Electronic...understanding of the conditions that enabled this style of warfare and how Russia has exploited those conditions in Ukraine will serve to inform

  5. An Empirical Examination of the Warfare Metaphor with Respect to Pre-Service Elementary Teachers

    ERIC Educational Resources Information Center

    Cobern, William W.; Loving, Cathleen C.; Davis, Edward B.; Terpstra, Jeff

    2013-01-01

    Since its origination in the late nineteenth century, the warfare metaphor has been used to characterize the relationship between science and religion, especially orthodox Christianity. Though thoroughly discredited by historians of science, the ideological descendants of Thomas Huxley, who spoke of science in quasi-religious terms, have kept the…

  6. Nuclear Arms and National Security. 1983 National Issues Forum.

    ERIC Educational Resources Information Center

    Melville, Keith, Ed.

    Appropriate for secondary school social studies, this booklet outlines approaches for dealing with the threat of nuclear warfare in six sections. The first section, "Learning to Live with Nuclear Weapons," introduces the topic and considers what can be done to decrease the risk of nuclear warfare without jeopardizing the nation's security. "Arms…

  7. Unmanned Systems In Integrating Cross domain Naval Fires

    DTIC Science & Technology

    2016-06-01

    requirement for the battery . Lithium - Ion batteries have the remarkable characteristic of high energy density. A Lithium -Sulphur-Dioxide battery can...163 xi LIST OF FIGURES Figure 1. NPS Warfare Innovation Continuum...during the Warfare Innovation Workshop during Enrichment Week, September 2015. This four-day forum brought together students and faculty, defense

  8. Joint Operations

    DTIC Science & Technology

    2006-09-17

    the GCC must evaluate the need for force protection support following the guidelines of DOD Instruction 3020.41, Contractor Personnel Authorized to...EA electronic attack EM electromagnetic EP emergency preparedness EW electronic warfare FCC functional combatant commander FDO flexible deterrent...their primary destructive mechanism (lasers, radio frequency weapons, particle beams). b. electronic protection. That division of electronic warfare

  9. Waste minimization opportunity assessment: Naval Undersea Warfare Engineering Station, Keyport, Washington. Project summary

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    NONE

    The Environmental Protection Agency (EPA) has developed a systematic approach to identify, select and implement options to reduce or eliminate hazardous waste. The report describes the application of the waste minimization assessment procedures to a torpedo maintenance facility at the Naval Undersea Warfare Engineering Station in Keyport, WA (NUWES Keyport).

  10. The Future of Amphibious Operations: Shaping the Expeditionary Strike Group to Fight in the Joint Task Force

    DTIC Science & Technology

    2010-02-01

    1 Charles E. Wilhelm, Expeditionary Warfare.marine corps gazette, 79(6), 28-30. Retrieved October 15, 2009, from Career and Technical Education . (Document...Expeditionary warfare.marine corps gazette, 79(6), 28- 30. Retrieved October 15, 2009, from Career and Technical Education . (Document ID: 4455650

  11. Surface Warfare. Mainstreaming, Mine Warfare. May/June 1998, Vol. 23, No. 3

    DTIC Science & Technology

    1998-06-01

    grappling with a paper tiger. Nor is it a fleeting thought process — some- thing heard in briefings and filed away in the warrior’s subconscious ...tecting device designed to work with the Quickstrike series of bottom mines. This new TDD can be reprogrammed to enable the Quickstrike mines to

  12. A SAFE AND RAPID METHOD FOR BIOLOGICAL AND CHEMICAL DECONTAMINATION OF BUILDINGS AND EQUIPMENT USING THE TERRACAP™ CB DECON SYSTEM - PHASE I

    EPA Science Inventory

    Today’s world and political climate lends itself to potential attacks by hostile forces and terrorists where both exterior and interior surfaces of vehicles, buildings, or equipment could become contaminated with biological warfare (BW) or chemical warfare (CW) agents. R...

  13. Multifunctional ultra-high vacuum apparatus for studies of the interactions of chemical warfare agents on complex surfaces

    NASA Astrophysics Data System (ADS)

    Wilmsmeyer, Amanda R.; Gordon, Wesley O.; Davis, Erin Durke; Mantooth, Brent A.; Lalain, Teri A.; Morris, John R.

    2014-01-01

    A fundamental understanding of the surface chemistry of chemical warfare agents is needed to fully predict the interaction of these toxic molecules with militarily relevant materials, catalysts, and environmental surfaces. For example, rules for predicting the surface chemistry of agents can be applied to the creation of next generation decontaminants, reactive coatings, and protective materials for the warfighter. Here, we describe a multifunctional ultra-high vacuum instrument for conducting comprehensive studies of the adsorption, desorption, and surface chemistry of chemical warfare agents on model and militarily relevant surfaces. The system applies reflection-absorption infrared spectroscopy, x-ray photoelectron spectroscopy, and mass spectrometry to study adsorption and surface reactions of chemical warfare agents. Several novel components have been developed to address the unique safety and sample exposure challenges that accompany the research of these toxic, often very low vapor pressure, compounds. While results of vacuum-based surface science techniques may not necessarily translate directly to environmental processes, learning about the fundamental chemistry will begin to inform scientists about the critical aspects that impact real-world applications.

  14. Contamination source review for Building E5978, Edgewood Area, Aberdeen Proving Ground, Maryland

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Mosqueda, G.; Dougherty, J.; Draugelis, A.K.

    1995-09-01

    This report documents the results of a contamination source review of Building E5978 at the Aberdeen Proving Group (APG) in Maryland. The primary mission at APG has been the testing and evaluation of US Army warfare materials. Since its beginning in 1917, the Edgewood Area of APG has been the principal location for chemical warfare agent research, development, and testing in the US. APG was also used for producing chemical warfare agents during both world wars, and it has been a center for the storage of chemical warfare material. An attempt was made to identify and define areas of toxicmore » or hazardous contaminants and to assess the physical condition and accessibility of APG buildings. The information obtained from this review may be used to assist the US Army in planning for the future use or disposition of the buildings. The contamination source review consisted of the following tasks: historical records search, physical inspection, photographic documentation, geophysical investigation, and collection of air samples for the presence of volatile organic compounds.« less

  15. Contamination source review for Building E3641, Edgewood Area, Aberdeen Proving Ground, Maryland

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Zellmer, S.D.; Draugelis, A.K.; Rueda, J.

    1995-09-01

    This report documents the results of a contamination source review of Building E3641 at the Aberdeen Proving Ground (APG) in Maryland. The primary mission at APG has been the testing and evaluation of US Army warfare materials. Since its beginning in 1917, the Edgewood Area of APG has been the principal location for chemical warfare agent research, development, and testing in the US. APG was also used for producing chemical warfare agents during both world wars, and it has been a center for the storage of chemical warfare material. An attempt was made to identify and define areas of toxicmore » or hazardous contaminants and to assess the physical condition and accessibility of APG buildings. The information obtained from this review may be used to assist the US Army in planning for the future use or disposition of the buildings. The contamination source review consisted of the following tasks: historical records search, physical inspection, photographic documentation, geophysical investigation, and review of available records regarding underground storage tanks associated with each building.« less

  16. Multifunctional ultra-high vacuum apparatus for studies of the interactions of chemical warfare agents on complex surfaces.

    PubMed

    Wilmsmeyer, Amanda R; Gordon, Wesley O; Davis, Erin Durke; Mantooth, Brent A; Lalain, Teri A; Morris, John R

    2014-01-01

    A fundamental understanding of the surface chemistry of chemical warfare agents is needed to fully predict the interaction of these toxic molecules with militarily relevant materials, catalysts, and environmental surfaces. For example, rules for predicting the surface chemistry of agents can be applied to the creation of next generation decontaminants, reactive coatings, and protective materials for the warfighter. Here, we describe a multifunctional ultra-high vacuum instrument for conducting comprehensive studies of the adsorption, desorption, and surface chemistry of chemical warfare agents on model and militarily relevant surfaces. The system applies reflection-absorption infrared spectroscopy, x-ray photoelectron spectroscopy, and mass spectrometry to study adsorption and surface reactions of chemical warfare agents. Several novel components have been developed to address the unique safety and sample exposure challenges that accompany the research of these toxic, often very low vapor pressure, compounds. While results of vacuum-based surface science techniques may not necessarily translate directly to environmental processes, learning about the fundamental chemistry will begin to inform scientists about the critical aspects that impact real-world applications.

  17. Airborne exposure limits for chemical and biological warfare agents: is everything set and clear?

    PubMed

    Sabelnikov, Alex; Zhukov, Vladimir; Kempf, C Ruth

    2006-08-01

    Emergency response strategies (guidelines) for biological, chemical, nuclear, or radiological terrorist events should be based on scientifically established exposure limits for all the agents or materials involved. In the case of a radiological terrorist event, emergency response guidelines (ERG) have been worked out. In the case of a terrorist event with the use of chemical warfare (CW) agents the situation is not that clear, though the new guidelines and clean-up values are being generated based on re-evaluation of toxicological and risk data. For biological warfare (BW) agents, such guidelines do not yet exist. In this paper the current status of airborne exposure limits (AELs) for chemical and biological warfare (CBW) agents are reviewed. Particular emphasis is put on BW agents that lack such data. An efficient, temporary solution to bridge the gap in experimental infectious data and to set provisional AELs for BW agents is suggested. It is based on mathematically generated risks of infection for BW agents grouped by their alleged ID50 values in three categories: with low, intermediate and high ID50 values.

  18. Modeling the transport of chemical warfare agents and simulants in polymeric substrates for reactive decontamination

    NASA Astrophysics Data System (ADS)

    Pearl, Thomas; Mantooth, Brent; Varady, Mark; Willis, Matthew

    2014-03-01

    Chemical warfare agent simulants are often used for environmental testing in place of highly toxic agents. This work sets the foundation for modeling decontamination of absorbing polymeric materials with the focus on determining relationships between agents and simulants. The correlations of agents to simulants must consider the three way interactions in the chemical-material-decontaminant system where transport and reaction occur in polymer materials. To this end, diffusion modeling of the subsurface transport of simulants and live chemical warfare agents was conducted for various polymer systems (e.g., paint coatings) with and without reaction pathways with applied decontamination. The models utilized 1D and 2D finite difference diffusion and reaction models to simulate absorption and reaction in the polymers, and subsequent flux of the chemicals out of the polymers. Experimental data including vapor flux measurements and dynamic contact angle measurements were used to determine model input parameters. Through modeling, an understanding of the relationship of simulant to live chemical warfare agent was established, focusing on vapor emission of agents and simulants from materials.

  19. Multifunctional ultra-high vacuum apparatus for studies of the interactions of chemical warfare agents on complex surfaces

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Wilmsmeyer, Amanda R.; Morris, John R.; Gordon, Wesley O.

    2014-01-15

    A fundamental understanding of the surface chemistry of chemical warfare agents is needed to fully predict the interaction of these toxic molecules with militarily relevant materials, catalysts, and environmental surfaces. For example, rules for predicting the surface chemistry of agents can be applied to the creation of next generation decontaminants, reactive coatings, and protective materials for the warfighter. Here, we describe a multifunctional ultra-high vacuum instrument for conducting comprehensive studies of the adsorption, desorption, and surface chemistry of chemical warfare agents on model and militarily relevant surfaces. The system applies reflection-absorption infrared spectroscopy, x-ray photoelectron spectroscopy, and mass spectrometry tomore » study adsorption and surface reactions of chemical warfare agents. Several novel components have been developed to address the unique safety and sample exposure challenges that accompany the research of these toxic, often very low vapor pressure, compounds. While results of vacuum-based surface science techniques may not necessarily translate directly to environmental processes, learning about the fundamental chemistry will begin to inform scientists about the critical aspects that impact real-world applications.« less

  20. Situation Awareness Information Dominance & Information Warfare.

    DTIC Science & Technology

    1997-02-01

    Information warfare and its primary objective of achieving information dominance over enemy forces have arisen as a major area of emphasis for future...military actions. The concept of information dominance and the issues involved in attaining it are explored through a model of situation awareness...directions for the development of systems to support the goal of information dominance can be established.

  1. An Ecological Examination of Rural Mozambican Women's Attainment of Postwar Wellbeing

    ERIC Educational Resources Information Center

    Deacon, Zermarie; Sullivan, Cris

    2010-01-01

    Women's experiences of warfare and postwar recovery are qualitatively different from those of men. However, to date, the processes whereby women recover from the gendered impacts of war have not been sufficiently explored. In order to address this gap in the literature and to inform policies and services aimed at women recovering from warfare, a…

  2. FY04 NDCEE Annual Technologies Publications

    DTIC Science & Technology

    2006-03-14

    Crane Division, Indiana Naval Surface Warfare Center, Indian Head Division (IHDiv), Maryland Navy Ammunition Program Office New Jersey Institute of...full-scale field demonstrations • Coordinated literature reviews, data requests, and telephone interviews with Naval Surface Warfare Center, Crane ...Armored Recon ABN Assault Vehicle, Bridge Launcher Armored Vehicle, Carrier Ammunition, Crane Shovel 20-ton, Hammer Pile Drivers, and Howitzers. Points of

  3. FY04 NDCEE Annual Technologies Publication

    DTIC Science & Technology

    2006-03-14

    Crane Division, Indiana Naval Surface Warfare Center, Indian Head Division (IHDiv), Maryland Navy Ammunition Program Office New Jersey Institute of...full-scale field demonstrations • Coordinated literature reviews, data requests, and telephone interviews with Naval Surface Warfare Center, Crane ...Armored Recon ABN Assault Vehicle, Bridge Launcher Armored Vehicle, Carrier Ammunition, Crane Shovel 20-ton, Hammer Pile Drivers, and Howitzers. Points of

  4. An outbreak of chickenpox in a military field hospital--the implications for biological warfare.

    PubMed Central

    Hepburn, N C; Brooks, T J

    1991-01-01

    An outbreak of chickenpox with spread to patients and staff on the isolation ward of a British field hospital during the Gulf war is described. The implications for the design and operation of field hospital isolation units should transmissible biological warfare agents be encountered in any future conflict are discussed. PMID:1774746

  5. Coalition Warfare: the Leadership Challenges

    DTIC Science & Technology

    2011-05-19

    Approved for Public Release; Distribution is Unlimited Coalition Warfare: The leadership challenges A Monograph by Colonel Mark J Thornhill...The leadership challenges . 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER 6. AUTHOR(S) Colonel Mark J. Thornhill...multinational operations, leadership challenges , leadership attributes, unity of command. 16. SECURITY CLASSIFICATION OF: UNCLASSIFIED 17. LIMITATION OF

  6. 78 FR 55687 - Notice of Intent To Grant Partially Exclusive Patent License; Silvanus, LLC

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-09-11

    ... with Naval Surface Warfare Center, Crane Div, Code OOL, Bldg 2, 300 Highway 361, Crane, IN 47522-5001. FOR FURTHER INFORMATION CONTACT: Mr. Christopher Monsey, Naval Surface Warfare Center, Crane Div, Code OOL, Bldg 2, 300 Highway 361, Crane, IN 47522-5001, telephone 812-854-4100. Authority: 35 U.S.C. 207...

  7. 76 FR 23314 - Notice of Intent To Grant Partially Exclusive Patent License; Sean Linehan

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-04-26

    ... are to be filed with Naval Surface Warfare Center, Crane Division, Code OOL, Bldg 2, 300 Highway 361, Crane, IN 47522-5001. FOR FURTHER INFORMATION CONTACT: Mr. Christopher Monsey, Naval Surface Warfare Center, Crane Division, Code OOL, Bldg 2, 300 Highway 361, Crane, IN 47522-5001, telephone 812-854-4100...

  8. 77 FR 5242 - Notice of Intent To Grant Exclusive Patent License; Daniel Defense, Inc.

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-02-02

    ... Naval Surface Warfare Center, Crane Div, Code OOL, Bldg 2, 300 Highway 361, Crane, IN 47522-5001. FOR FURTHER INFORMATION CONTACT: Mr. Christopher Monsey, Naval Surface Warfare Center, Crane Div, Code OOL, Bldg 2, 300 Highway 361, Crane, IN 47522-5001, telephone (812) 854-4100. Authority: 35 U.S.C. 207, 37...

  9. 77 FR 23673 - Notice of Intent To Grant Exclusive Patent License; Aurora Technologies, LLC

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-04-20

    ... objections are to be filed with the Naval Surface Warfare Center, Crane Div, Code OOL, Bldg. 2, 300 Highway 361, Crane, IN 47522-5001. FOR FURTHER INFORMATION CONTACT: Mr. Christopher Monsey, Naval Surface Warfare Center, Crane Div, Code OOL, Bldg 2, 300 Highway 361, Crane, IN 47522-5001, telephone 812-854-4100...

  10. Delivering Savings with Open Architecture and Product Lines

    DTIC Science & Technology

    2011-04-30

    p.m. Chair: Christopher Deegan , Executive Director, Program Executive Office for Integrated Warfare Systems Delivering Savings with Open...Architectures Walt Scacchi and Thomas Alspaugh, Institute for Software Research Christopher Deegan —Executive Director, Program Executive Officer...Integrated Warfare Systems (PEO IWS). Mr. Deegan directs the development, acquisition, and fleet support of 150 combat weapon system programs managed by 350

  11. Anti-Submarine Warfare: Still an Essential Warfare Art

    DTIC Science & Technology

    1993-02-19

    34 U.S. Naval Institute ProceedinQs, June 1992, 52. 11. Ibid., 53. 21. Ibid., 53. "D. Holland, 33. 2. Robert 0. Crawshaw , "What Is a Maritime Action...June 1992, 52-54. 4. Byron, John L. "A New Target for the Submarine Force." U.S. Naval Institute Proceedings, January 1990, 38-39. 5. Crawshaw

  12. The Physics of Warfare

    ERIC Educational Resources Information Center

    Giordano, Gerardo

    2015-01-01

    Recently, I was tasked with the creation and execution of a new themed general education physics class called The Physics of Warfare. In the past, I had used the theme of a class, such as the physics of sports medicine, as a way to create homework and in-class activities, generate discussions, and provide an application to demonstrate that physics…

  13. Technology Transfer Summary Report (FY92), Naval Surface Warfare Center Dahlgren Division

    DTIC Science & Technology

    1994-04-20

    communications; no formal records are kept of these. Community Technical Outreach NSWCDD participates in the "Science and Engineering Apprentice" and the " Bay ...ADMINISTRATOR’S OFFICE NAVAL UNDERSEA WARFARE CENTER PO BOX 545 DIVISION NEWPORT SEQUIM WA 98382 NEWPORI’ RI 02841-5047 ATTN GIFT AND EXCHANGE DIV 4 ATTN CODE 00

  14. Military Air Power: The CADRE Digest of Air Power Opinions and Thoughts

    DTIC Science & Technology

    1990-10-01

    SUPPLEMENTARY NOTES 14. ABSTRACT 15. SUBJECT TERMS Air warfare; Air power; Military art and science 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF...bibliographical references. 1. Air warfare. 2. Air power. 3. Military art and science . 1. Air University (US). Center for Aerospace Doctrine, Research, and...on Policy and War........................................ ........................................57 War as Art and Science

  15. Control of Supercavitating Vehicles using Transverse Jets

    DTIC Science & Technology

    2016-03-15

    Experimental Technique All experiments reported here were conducted at the Naval Undersea Warfare Center (NUWC) closed loop research water tunnel in Newport...mass of moving parts of the assembly. The second element considered was tte loss term associated with flow restriction across the orifice which was...W. Henoch, Hydrodynamics Branch, Naval Undersea Warfare Center, Newport, RI. 49

  16. Ultrasensitive detection of explosives and chemical warfare agents by low-pressure photoionization mass spectrometry.

    PubMed

    Sun, Wanqi; Liang, Miao; Li, Zhen; Shu, Jinian; Yang, Bo; Xu, Ce; Zou, Yao

    2016-08-15

    On-spot monitoring of threat agents needs high sensitive instrument. In this study, a low-pressure photoionization mass spectrometer (LPPI-MS) was employed to detect trace amounts of vapor-phase explosives and chemical warfare agent mimetics under ambient conditions. Under 10-s detection time, the limits of detection of 2,4-dinitrotoluene, nitrotoluene, nitrobenzene, and dimethyl methyl phosphonate were 30, 0.5, 4, and 1 parts per trillion by volume, respectively. As compared to those obtained previously with PI mass spectrometric techniques, an improvement of 3-4 orders of magnitude was achieved. This study indicates that LPPI-MS will open new opportunities for the sensitive detection of explosives and chemical warfare agents. Copyright © 2016 Elsevier B.V. All rights reserved.

  17. MOFwich: Sandwiched Metal-Organic Framework-Containing Mixed Matrix Composites for Chemical Warfare Agent Removal.

    PubMed

    Peterson, Gregory W; Lu, Annie X; Hall, Morgan G; Browe, Matthew A; Tovar, Trenton; Epps, Thomas H

    2018-02-28

    This work describes a new strategy for fabricating mixed matrix composites containing layered metal-organic framework (MOF)/polymer films as functional barriers for chemical warfare agent protection. Through the use of mechanically robust polymers as the top and bottom encasing layers, a high-MOF-loading, high-performance-core layer can be sandwiched within. We term this multifunctional composite "MOFwich". We found that the use of elastomeric encasing layers enabled core layer reformation after breakage, an important feature for composites and membranes alike. The incorporation of MOFs into the core layer led to enhanced removal of chemical warfare agents while simultaneously promoting moisture vapor transport through the composite, showcasing the promise of these composites for protection applications.

  18. A Comparison of Neutron-Based Non-Destructive Assessment Methods for Chemical Warfare Materiel and High Explosives

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    E.H. Seabury; D.L. Chichester; C.J. Wharton

    2008-08-01

    Prompt Gamma Neutron Activation Analysis (PGNAA) systems employ neutrons as a probe to interrogate items, e.g. chemical warfare materiel-filled munitions. The choice of a neutron source in field-portable systems is determined by its ability to excite nuclei of interest, operational concerns such as radiological safety and ease-of-use, and cost. Idaho National Laboratory’s PINS Chemical Assay System has traditionally used a Cf-252 isotopic neutron source, but recently a Deuterium-Tritium (DT) Electronic Neutron Generator (ENG) has been tested as an alternate neutron source. This paper presents the results of using both of these neutron sources to interrogate chemical warfare materiel (CWM) andmore » high explosive (HE) filled munitions.« less

  19. A Comparison of Neutron-Based Non-Destructive Assessment Methods for Chemical Warfare Material and High Explosives

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Seabury, E. H.; Chichester, D. L.; Wharton, C. J.

    2009-03-10

    Prompt Gamma Neutron Activation Analysis (PGNAA) systems employ neutrons as a probe to interrogate items, e.g. chemical warfare materiel-filled munitions. The choice of a neutron source in field-portable systems is determined by its ability to excite nuclei of interest, operational concerns such as radiological safety and ease-of-use, and cost. Idaho National Laboratory's PINS Chemical Assay System has traditionally used a {sup 252}Cf isotopic neutron source, but recently a deuterium-tritium (DT) electronic neutron generator (ENG) has been tested as an alternate neutron source. This paper presents the results of using both of these neutron sources to interrogate chemical warfare materiel (CWM)more » and high explosive (HE) filled munitions.« less

  20. Particle Swarm Social Adaptive Model for Multi-Agent Based Insurgency Warfare Simulation

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Cui, Xiaohui; Potok, Thomas E

    2009-12-01

    To better understand insurgent activities and asymmetric warfare, a social adaptive model for modeling multiple insurgent groups attacking multiple military and civilian targets is proposed and investigated. This report presents a pilot study using the particle swarm modeling, a widely used non-linear optimal tool to model the emergence of insurgency campaign. The objective of this research is to apply the particle swarm metaphor as a model of insurgent social adaptation for the dynamically changing environment and to provide insight and understanding of insurgency warfare. Our results show that unified leadership, strategic planning, and effective communication between insurgent groups are notmore » the necessary requirements for insurgents to efficiently attain their objective.« less

  1. Evidence of VX nerve agent use from contaminated white mustard plants

    PubMed Central

    Gravett, Matthew R.; Hopkins, Farrha B.; Self, Adam J.; Webb, Andrew J.; Timperley, Christopher M.; Baker, Matthew J.

    2014-01-01

    The Chemical Weapons Convention prohibits the development, production, acquisition, stockpiling, retention, transfer or use of chemical weapons by Member States. Verification of compliance and investigations into allegations of use require accurate detection of chemical warfare agents (CWAs) and their degradation products. Detection of CWAs such as organophosphorus nerve agents in the environment relies mainly upon the analysis of soil. We now present a method for the detection of the nerve agent VX and its hydrolysis products by gas chromatography and liquid chromatography mass spectrometry of ethanol extracts of contaminated white mustard plants (Sinapis alba) which retained the compounds of interest for up to 45 days. VX is hydrolysed by the plants to ethyl methylphosphonic acid and then to methylphosphonic acid. The utility of white mustard as a nerve agent detector and remediator of nerve agent-polluted sites is discussed. The work described will help deter the employment of VX in conflict. PMID:25104906

  2. Nuclear, biological and chemical warfare. Part I: Medical aspects of nuclear warfare.

    PubMed

    Kasthuri, A S; Pradhan, A B; Dham, S K; Bhalla, I P; Paul, J S

    1990-04-01

    Casualties in earlier wars were due much more to diseases than to weapons. Mention has been made in history of the use of biological agents in warfare, to deny the enemy food and water and to cause disease. In the first world war chemical agents were used to cause mass casualties. Nuclear weapons were introduced in the second world war. Several countries are now involved in developing nuclear, biological and chemical weapon systems, for the mass annihilation of human beings, animals and plants, and to destroy the economy of their enemies. Recently, natural calamities and accidents in nuclear, chemical and biological laboratories and industries have caused mass instantaneous deaths in civilian population. The effects of future wars will not be restricted to uniformed persons. It is time that physicians become aware of the destructive potential of these weapons. Awareness, immediate protective measures and first aid will save a large number of persons. This series of articles will outline the medical aspects of nuclear, biological and chemical weapon systems in three parts. Part I will deal with the biological effects of a nuclear explosion. The short and long term effects due to blast, heat and associated radiation are highlighted. In Part II, the role of biological agents which cause commoner or new disease patterns is mentioned. Some of the accidents from biological warfare laboratories are a testimony to its potential deleterious effects. Part III deals with medical aspects of chemical warfare agents, which in view of their mass effects can overwhelm the existing medical resources, both civilian and military.(ABSTRACT TRUNCATED AT 250 WORDS)

  3. Legitimacy as an Operational Factor: An Alternative Analysis

    DTIC Science & Technology

    2006-10-23

    Napoleon I9 In his book, Operational Warfare, Dr. Milan Vego notes, “All great military leaders had an uncommon ability to...elements of one, or perhaps both, of the remaining factors. 9 Milan Vego, Operational Warfare...44 Ibid., 161. 45 Richard Schultz , In the Aftermath of War (Newport RI: U.S. Naval War College, 2006; reprint, Montgomery, AL: Air University

  4. 75 FR 52518 - Meeting of the Chief of Naval Operations (CNO) Executive Panel

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-08-26

    ...The Chief of Naval Operations (CNO) Executive Panel will report on the findings and recommendations of the Cyber Warfare Subcommittee to the CNO. The meeting will consist of discussions of current and future Navy strategy, plans, and policies in support of the organizing, manning, training, and equipping of Cyber Warfare forces for current and future operations.

  5. Oceanography and Mine Warfare

    DTIC Science & Technology

    2000-03-13

    of breaking waves , the position and strength of surface currents, and the propagation of the tide into very shallow waters. In the surf zone...6) sediment properties determine shock wave propagation , a method for mine neutralization in the surf zone. 48 OCEANOGRAPHY AND MINE WARFARE...mines will be buried in the sediments, sedimentary explosive shock wave propagation is critical for determining operational performance. Presently, we

  6. The United States Army 1996 Modernization Plan.

    DTIC Science & Technology

    1996-03-08

    and a cadre of operations, intelligence, fire support, air defense, and nuclear, biological, and chemical warfare personnel. As required, ARSPACE will...aerial and stand-off chemical and biological detection systems. " Decontamination improvements include Modular Decontamination System fielding in the near... Chemical . As many as 25 nations are producing and stockpiling chemical weapons. Weapons systems from mortars to missiles can deliver chemical warfare (CW

  7. 78 FR 55687 - Notice of Availability of Government-Owned Invention; Available for Licensing

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-09-11

    ... Warfare Center, Crane Div, Code OOL, Bldg 2, 300 Highway 361, Crane, IN 47522-5001. FOR FURTHER INFORMATION CONTACT: Mr. Christopher Monsey, Naval Surface Warfare Center, Crane Div, Code OOL, Bldg 2, 300 Highway 361, Crane, IN 47522-5001, telephone 812-854-4100. (Authority: 35 U.S.C. 207, 37 CFR Part 404) N.A...

  8. FOA Information from the Research Institute of Swedish National Defence on Electronic Warfare (FOA Orientar om Electronic Warfare),

    DTIC Science & Technology

    1967-01-01

    probablity ot penetring to target in the preaence of atr do- fance . Curve P, =probebility of destro),ing target in the presence of air defence. Weapon...so rendering the lions. At high frequencies ( gen - quency range and sector of ter- traffic less sensitive to jamming. erally those tsed on radio links

  9. Naval Warfare

    DTIC Science & Technology

    2010-03-01

    Naval Doctrine Publication 1 Naval Warfare March 2010 Doctrine The only satisfactory method of ensuring unity of effort lies in due...LCDR Dudley W. Knox, USN “The Role of Doctrine in Naval Warfare” U.S. Naval Institute Proceedings, 1915 01 March 2010 FOREWORD United States (US...naval doctrine is the foundation upon which our tactics, techniques, and procedures are built. It articulates operational concepts that govern the

  10. Network Centric Warfare in the U.S. Navy’s Fifth Fleet. Network-Supported Operational Level Command and Control in Operation Enduring Freedom

    DTIC Science & Technology

    2004-06-01

    Mark Adkins Director of Research Ph.D Human Communication adkins@arizona.edu Dr. John Kruse Director of Programming Ph.D Management Information Systems...Theory • Network Centric Warfare • Technology Adoption – Technology Adoption Model – Technology Transition Model • Human Communication – Social Context

  11. Naval Surface Warfare Center Carderock Division, Technical Digest

    DTIC Science & Technology

    2001-12-01

    Survivability Systems: An Overview Fred J. Fisch 139 Modeling and Simulation of Weapons Effects on Ships Robert R. Wunderlick 143 Intelligent Networks ...communications capability of forces afloat to support emerging network -centric warfare doc- trines. Stealth, for our next generation of warships...fully-inte- grated, fully- networked electronic countermeasures system, developed in parallel and in close coordination with sister systems. An

  12. Military Reengineering Between the World Wars

    DTIC Science & Technology

    2005-01-01

    University. I am also grateful to Tamera Dorland for her much-needed perspectives. Any inaccura- cies remain mine alone. xxiii Abbreviations FFRDC...or shape any motorization opportunities that under- mined their branch’s immediate interests. Infantry chiefs such as Robert Allen, Stephen Fuqua...Warfare, An- napolis, Md.: Naval Institute Press, 1983, p. 187. 85 Kenneth J. Clifford, Amphibious Warfare Development in Britannia and America from

  13. Containing Revolutionary Islam: Reassessing the Problem and the Approach

    DTIC Science & Technology

    2017-03-01

    2011), xx. 83 Russ Rodgers, Fundamentals of Islamic Asymmetric Warfare: A Documentary Analysis of the Principles of Muhammad (Lewiston, NY: Edwin...have not yet effectively coalesced or managed to spark the greater revolution they seek. They remain fragmented, choosing divergent activities in...Libertarian Rebuttal. Auburn, AL: Ludwig von Mises Institute, 2015. Rodgers, Russ. Fundamentals of Islamic Asymmetric Warfare: A Documentary Analysis

  14. Command Post Program Study. Volume 1 - Main Report

    DTIC Science & Technology

    1973-03-01

    Field Manual 30-9, Military Intelligence Battalion - Field Am. Washington: March 1968. _ Field Manual 32-20, Electronic Warfare. Washington: 14...Mechanized). A-18 TOE 30-88T, Military Intelligence Support Detachment, Military Intelligence Battalion, Field Army. TOE 30-206T, Headquarters and... Field Manual 30-9, Military Intelligence Battalion - Field Army. Washington: March 1968. _ Field Manual 32-20, Electronic Warfare. Washington: 14

  15. Rapid Analysis of Chemical Warfare Agents and Their Hydrolysis Products by Desorption Electrospray Ionization Mass Spectrometry (DESI-MS)

    DTIC Science & Technology

    2009-10-01

    of chemical warfare agents in natural water samples by solid-phase microextraction. Anal. Chem., 69, 1866-72. [36] Sng , M.T. and Ng ,W.F. (1999). In...liquid phase microextraction of alkylphosphonic acids from water. J. Chromatogr. A., 1141, 151-157. [43] Lee, H.S.N., Sng , M.T., Basheer, C., and Lee

  16. The Sea of Simulation: Improving Naval Shiphandling Training and Readiness through Game-Based Learning

    DTIC Science & Technology

    2012-03-01

    Officer SWOI Surface Warfare Officer Introduction SWOS Surface Warfare Officers School xvii TFT Thin Film Transistor ULTRA Unit Level Training...designed the experiment , including participants, procedures, facilities selection, and materials. Chapter IV: Results and Discussion. This chapter...contains the results of experimentation and an interpretation of those results . Chapter V: Conclusions. This chapter provides an overall assessment

  17. Factors Affecting the Retention Decisions of Female Surface Warfare Officers

    DTIC Science & Technology

    2003-03-01

    NAVAL POSTGRADUATE SCHOOL Monterey, California THESIS Approved for public release; distribution is unlimited. FACTORS AFFECTING THE RETENTION...Warfare Officers 6. AUTHOR(S) Clifton, Elizabeth A. 5. FUNDING NUMBERS 7. PERFORMING ORGANIZATION NAME(S) AND ADDRESS(ES) Naval Postgraduate School ...for the degree of MASTER OF SCIENCE IN LEADERSHIP AND HUMAN RESOURCE DEVELOPMENT from the NAVAL POSTGRADUATE SCHOOL March 2003

  18. Maritime In Situ Sensing Inter-Operable Networks (MISSION)

    DTIC Science & Technology

    2013-09-30

    creating acoustic communications (acomms) technologies enabling underwater sensor networks and distributed systems. Figure 1. Project MISSION...Marn, S. Ramp, F. Bahr, “Implementation of an Underwater Wireless Sensor Network in San Francisco Bay,” Proc. 10th International Mine Warfare...NILUS – An Underwater Acoustic Sensor Network Demonstrator System,” Proc. 10th International Mine Warfare Technology Symposium, Monterey, CA, May 7

  19. Miniaturized low-cost ion mobility spectrometer for fast detection of chemical warfare agents.

    PubMed

    Zimmermann, Stefan; Barth, Sebastian; Baether, Wolfgang K M; Ringer, Joachim

    2008-09-01

    Ion mobility spectrometry (IMS) is a well-known method for detecting hazardous compounds in air. Typical applications are the detection of chemical warfare agents, highly toxic industrial compounds, explosives, and drugs of abuse. Detection limits in the low part per billion range, fast response times, and simple instrumentation make this technique more and more popular. In particular, there is an increasing demand for miniaturized low-cost IMS for hand-held devices and air monitoring of public areas by sensor networks. In this paper, we present a miniaturized aspiration condenser type ion mobility spectrometer for fast detection of chemical warfare agents. The device is easy to manufacture and allows single substance identification down to low part per billion-level concentrations within seconds. The improved separation power results from ion focusing by means of geometric constraints and fluid dynamics. A simple pattern recognition algorithm is used for the identification of trained substances in air. The device was tested at the German Armed Forces Scientific Institute for Protection Technologies-NBC-Protection. Different chemical warfare agents, such as sarin, tabun, soman, US-VX, sulfur mustard, nitrogen mustard, and lewisite were tested. The results are presented here.

  20. A feasibility study of the destruction of chemical weapons by photocatalytic oxidation

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Hitchman, M.L.; Spackman, A.R.; Yusta, F.J.

    1997-01-01

    The destruction of existing arsenals or deposits of chemical weapons is an important obstacle on the way to the successful implementation of the Chemical Weapons Convention which was opened for signature in 1993. Many approaches have been proposed and none can be seen as panacea. Each has its merits and shortcomings. In this paper we review the different technologies and propose a new one, photocatalytic oxidation, which has the potential to fill an important gap; a cheap, small, mobile facility for chemical warfare agents which are difficult to transport or are deposited in a remote area. We report some relevantmore » experimental results with this technology for the destruction of chemical weapons. After many years of negotiation, a convention banning the production, possession and use of chemical weapons was opened for signature in Paris on January 13, 1993. The convention, once it is ratified, will provide a framework and a program for the destruction of chemical weapons by the nations party to it. The framework will cover such topics as definitions of terminology, general rules of verification and verification measures, level of destruction of chemical weapons, activities not prohibited under the convention, and investigations in cases of alleged use of chemical weapons. The program will require that countries with chemical weapons shall start their destruction not later than one year after they have ratified the convention, and that they shall complete it within a ten year period. For this period involved countries are required to declare their plans for destruction. These plans have to include a time schedule for the destruction process, an inventory of equipment and buildings to be destroyed, proposed measures for verification, safety measures to be observed during destruction, specification of the types of chemical weapons and the type and quantity of chemical fill to be destroyed, and specification of the destruction method. 38 refs.« less

  1. Metal-organic frameworks for the removal of toxic industrial chemicals and chemical warfare agents.

    PubMed

    Bobbitt, N Scott; Mendonca, Matthew L; Howarth, Ashlee J; Islamoglu, Timur; Hupp, Joseph T; Farha, Omar K; Snurr, Randall Q

    2017-06-06

    Owing to the vast diversity of linkers, nodes, and topologies, metal-organic frameworks can be tailored for specific tasks, such as chemical separations or catalysis. Accordingly, these materials have attracted significant interest for capture and/or detoxification of toxic industrial chemicals and chemical warfare agents. In this paper, we review recent experimental and computational work pertaining to the capture of several industrially-relevant toxic chemicals, including NH 3 , SO 2 , NO 2 , H 2 S, and some volatile organic compounds, with particular emphasis on the challenging issue of designing materials that selectively adsorb these chemicals in the presence of water. We also examine recent research on the capture and catalytic degradation of chemical warfare agents such as sarin and sulfur mustard using metal-organic frameworks.

  2. Defending networks against denial-of-service attacks

    NASA Astrophysics Data System (ADS)

    Gelenbe, Erol; Gellman, Michael; Loukas, George

    2004-11-01

    Denial of service attacks, viruses and worms are common tools for malicious adversarial behavior in networks. Experience shows that over the last few years several of these techniques have probably been used by governments to impair the Internet communications of various entities, and we can expect that these and other information warfare tools will be used increasingly as part of hostile behavior either independently, or in conjunction with other forms of attack in conventional or asymmetric warfare, as well as in other forms of malicious behavior. In this paper we concentrate on Distributed Denial of Service Attacks (DDoS) where one or more attackers generate flooding traffic and direct it from multiple sources towards a set of selected nodes or IP addresses in the Internet. We first briefly survey the literature on the subject, and discuss some examples of DDoS incidents. We then present a technique that can be used for DDoS protection based on creating islands of protection around a critical information infrastructure. This technique, that we call the CPN-DoS-DT (Cognitive Packet Networks DoS Defence Technique), creates a self-monitoring sub-network surrounding each critical infrastructure node. CPN-DoS-DT is triggered by a DDoS detection scheme, and generates control traffic from the objects of the DDoS attack to the islands of protection where DDOS packet flows are destroyed before they reach the critical infrastructure. We use mathematical modelling, simulation and experiments on our test-bed to show the positive and negative outcomes that may result from both the attack, and the CPN-DoS-DT protection mechanism, due to imperfect detection and false alarms.

  3. Mass spectral analysis of N-oxides of Chemical Weapons Convention related aminoethanols under electrospray ionization conditions.

    PubMed

    Sridhar, L; Karthikraj, R; Murty, M R V S; Raju, N Prasada; Vairamani, M; Prabhakar, S

    2011-02-28

    N,N'-Dialkylaminoethanols are the hydrolyzed products or precursors of chemical warfare agents such as V-agents and nitrogen mustards, and they are prone to undergo oxidation in environmental matrices or during decontamination processes. Consequently, screening of the oxidized products of aminoethanols in aqueous samples is an important task in the verification of chemical weapons convention-related chemicals. Here we report the successful characterization of the N-oxides of N,N'-dialkylaminoethanols, alkyl diethanolamines, and triethanolamine using positive ion electrospray ionization mass spectrometry. The collision-induced dissociation (CID) spectra of the [M+H](+) and [M+Na](+) ions show diagnostic product ions that enable the unambiguous identification of the studied N-oxides, including those of isomeric compounds. The proposed fragmentation pathways are supported by high-resolution mass spectrometry data and product/precursor ion spectra. The CID spectra of [M+H](+) ions included [MH-CH(4)O(2)](+) as the key product ion, in addition to a distinctive alkene loss that allowed us to recognize the alkyl group attached to the nitrogen. The [M+Na](+) ions show characteristic product ions due to the loss of groups (R) attached to nitrogen either as a radical (R) or as a molecule [R+H or (R-H)] after hydrogen migration. Copyright © 2011 John Wiley & Sons, Ltd.

  4. Ion Mobility Spectrometry (IMS) and Mass Spectrometry

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Shvartsburg, Alexandre A.

    2010-04-20

    In a media of finite viscosity, the Coulomb force of external electric field moves ions with some terminal speed. This dynamics is controlled by “mobility” - a property of the interaction potential between ions and media molecules. This fact has been used to separate and characterize gas-phase ions in various modes of ion mobility spectrometry (IMS) developed since 1970. Commercial IMS devices were introduced in 1980-s for field detection of volatile traces such as explosives and chemical warfare agents. Coupling to soft-ionization sources, mass spectrometry (MS), and chromatographic methods in 1990-s had allowed IMS to handle complex samples, enabling newmore » applications in biological and environmental analyses, nanoscience, and other areas. Since 2003, the introduction of commercial systems by major instrument vendors started bringing the IMS/MS capability to broad user community. The other major development of last decade has been the differential IMS or “field asymmetric waveform IMS” (FAIMS) that employs asymmetric time-dependent electric field to sort ions not by mobility itself, but by the difference between its values in strong and weak electric fields. Coupling of FAIMS to conventional IMS and stacking of conventional IMS stages have enabled two-dimensional separations that dramatically expand the power of ion mobility methods.« less

  5. Modern Warfare: NATO’s War amongst the People in Kosovo

    DTIC Science & Technology

    2013-05-23

    Defense Initiative and director of research for the Foreign Policy program at the Brookings Institution; Misha Glenny, then the Central... the Kosovo military campaign and offers useful incites regarding future 21st century warfare for those who are interested in advancing their...estimated to average 1 hour per response, including the time for reviewing instructions, searching existing data sources, gathering and maintaining the

  6. Implementation and Testing of the JANUS Standard with SSC Pacific’s Software-Defined Acoustic Modem

    DTIC Science & Technology

    2017-12-01

    Communications Outpost (FDECO) Innovative Naval Prototype (INP) Program by the Advanced Photonic Technologies Branch (Code 55360), Space and Naval Warfare... Communications and Networks Division iii EXECUTIVE SUMMARY This report presents Space and Naval Warfare (SPAWAR) Systems Center Pacific’s (SSC... Frequency -Hopped Binary Frequency Shift Keying Office of Naval Research Innovative Naval Prototype Forward Deployed Energy and Communications Outpost

  7. Satellite and Ground Communication Systems: Space and Electronic Warfare Threats to the United States Army

    DTIC Science & Technology

    2017-02-01

    communication satellites—operating high above the earth and at higher frequencies —are often better suited to communicate across much longer distances and...Satellite and Ground Communication Systems: Space and Electronic Warfare Threats to the...TYPE SAMS Monograph 3. DATES COVERED (From - To) JUN 2016 – MAY 2017 4. TITLE AND SUBTITLE Satellite and Ground Communication Systems: Space and

  8. Developing and Fielding Information Dominance

    DTIC Science & Technology

    2002-01-01

    Developing and Fielding Information Dominance Space and Naval Warfare Systems Command’s IT-21 Blocks 1 and 2 2002 Command and Control Research and...00-00-2002 4. TITLE AND SUBTITLE Developing and Fielding Information Dominance 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER...force levels were uncertain, the necessary role of information dominance to maintaining strategic superiority was not. Platform Centric Warfare, with its

  9. Mortality data in the age of drones ‡.

    PubMed

    Carruthers, Elspeth

    2018-03-01

    Mortality data plays an essential role in shaping humanitarian, legal and ethical responses to conflict situations. The rise of drone warfare poses new questions regarding the accuracy and reliability of mortality data in conflict. This article examines some of the methodological and political challenges to collecting mortality data in drone warfare, and how the way in which drones are framed in public discourse contributes to these challenges.

  10. Asymmetric Warfare in the Simulation and Training Environment: Comprehensive Approach Wanted!

    DTIC Science & Technology

    2009-10-01

    Covering Support to Operations, Human Behaviour Representation, Irregular Warfare, Defence against Terrorism and Coalition Tactical Force Integration...learned behaviours arising from shared knowledge and it is passed on from one generation to the next. The behaviours that have become embedded as part of...symbols and behaviours . While culture changes, the change is usually slow, particularly in terms of military operations timeframes. Urban environments

  11. Back to the Future: The UH-1Y Utility Helicopter; A Multi-Role Solution for a Changing Security Environment

    DTIC Science & Technology

    2008-01-01

    Johnson, "Teaching Irregular Warfare; Deja vu All Over Again?" a paper presented to the Joint conference Pedagogy for the Long War: Teaching Irregular...Do about Them." Marine Corps Gazette 92, no. 2 (February 2008): 18- 23. Johnson, Wray. "Teaching Irregular Warfare; Deja vu All Over Again?" a paper

  12. Fluorescent discrimination between traces of chemical warfare agents and their mimics.

    PubMed

    Díaz de Greñu, Borja; Moreno, Daniel; Torroba, Tomás; Berg, Alexander; Gunnars, Johan; Nilsson, Tobias; Nyman, Rasmus; Persson, Milton; Pettersson, Johannes; Eklind, Ida; Wästerby, Pär

    2014-03-19

    An array of fluorogenic probes is able to discriminate between nerve agents, sarin, soman, tabun, VX and their mimics, in water or organic solvent, by qualitative fluorescence patterns and quantitative multivariate analysis, thus making the system suitable for the in-the-field detection of traces of chemical warfare agents as well as to differentiate between the real nerve agents and other related compounds.

  13. Battle Command Staff Training

    DTIC Science & Technology

    1992-12-01

    warfare ? • How does one develop training exercises to exploit this medium? • What are some of the implications for institutional training? The DARPA...IDT Inactive Duty Training JEW IIntelligencel•ectronic Warfare I FOR Intelligent Forces IPB Intelligence Preparation of the Battlefield JAAT Joint Air... Chemical xiI NFA No Fire Area NGB Nationhl Guard Bureau NTC National Training Center OAC Officers Advanced Cours- OC Observer/Controllcr OCI Observer

  14. Advances in the Acquisition of Secure Systems Based on Open Architectures

    DTIC Science & Technology

    2011-04-30

    2011 11:15 a.m. – 12:45 p.m. Chair: Christopher Deegan , Executive Director, Program Executive Office for Integrated Warfare Systems Delivering...Systems Based on Open Architectures Walt Scacchi and Thomas Alspaugh, Institute for Software Research Christopher Deegan —Executive Director, Program...Executive Officer, Integrated Warfare Systems (PEO IWS). Mr. Deegan directs the development, acquisition, and fleet support of 150 combat weapon system

  15. A Historical Study of Operational Command: A Resource for Researchers

    DTIC Science & Technology

    2005-03-01

    PJHQ) in the United Kingdom. Control, the impact of command arrangements on the proper functioning of operational level headquarters is shown...might interact in a joint environment, identifying the different types of communication and social networks that exist, determining the influence of...introduction of information technology and its tools has spawned ideas such as Network Centric Warfare (NCW) or Network Enabled Warfare (NEW), there is

  16. A Historical Study of Operational: A Resource for Researches

    DTIC Science & Technology

    2005-03-01

    PJHQ) in the United Kingdom. Control, the impact of command arrangements on the proper functioning of operational level headquarters is shown...might interact in a joint environment, identifying the different types of communication and social networks that exist, determining the influence of...introduction of information technology and its tools has spawned ideas such as Network Centric Warfare (NCW) or Network Enabled Warfare (NEW), there is

  17. Unconventional Cyber Warfare: Cyber Opportunities in Unconventional Warfare

    DTIC Science & Technology

    2014-06-01

    thanks to Tunisia’s modern communications infrastructure , pervasive Internet, and mobile phone network.”151 Although the use of information and...and physical space. Tunisia had a well-developed mobile phone and Internet infrastructure with nearly nine out of 10 Tunisians owning a mobile phone...OF TABLES Table 1. Top 20 countries of mobile phones per 100 people .........................................60 Table 2. Top 20 countries by number

  18. Naval War College Review. Volume 65, Number 2, Spring 2012

    DTIC Science & Technology

    2012-01-01

    warfare doctrine that scarcely exists in today’s American military. Finally, as part of our long-standing effort to understand capabilities and...long before network-centric warfare became a central feature of joint doctrine , the Navy established a program called “Copernicus” to assimilate...exchange data if the right technology, doctrine , tactics, techniques, and procedures were in place. The importance of coalition partners effectively

  19. Special Operations And Cyber Warfare

    DTIC Science & Technology

    2016-12-01

    with the high level of Soldier competency in the 95th for CA Soldiers to retrain and fulfill the cyber requirement. With the reorganization of the...NAVAL POSTGRADUATE SCHOOL MONTEREY, CALIFORNIA THESIS Approved for public release. Distribution is unlimited. SPECIAL OPERATIONS AND CYBER...OPERATIONS AND CYBER WARFARE 5. FUNDING NUMBERS 6. AUTHOR(S) Jason C. Tebedo 7. PERFORMING ORGANIZATION NAME(S) AND ADDRESS(ES) Naval Postgraduate School

  20. Proceedings on Combating the Unrestricted Warfare Threat: Integrating Strategy, Analysis, and Technology, 20-21 March 2007

    DTIC Science & Technology

    2007-03-01

    Prosthetics to enable return to units without loss of capability Quantum...and will give us a big advantage in terms of unrestricted warfare. Figure 17 high-Productivity Computing System PRoSThETICS We have an exciting...program in prosthetics (Figure 18). It started with a monkey at Duke University. We put microelectronic implants into her brain, taught her

  1. Moral Warfare in Counterinsurgency Operations

    DTIC Science & Technology

    2007-05-11

    Moral Warfare in Counterinsurgency Operations A Monograph by MAJOR David C. Chiarenza US Army School of Advanced Military Studies United...OMB control number. PLEASE DO NOT RETURN YOUR FORM TO THE ABOVE ADDRESS. 1. REPORT DATE (DD-MM-YYYY) 11-05-2007 2. REPORT TYPE AMSP Monograph 3...Public Release; Distribution is Unlimited 13. SUPPLEMENTARY NOTES 14. ABSTRACT This study explores the moral level of war in the context of

  2. Multistage Deployment of the Army Theater Hospital

    DTIC Science & Technology

    2013-12-01

    analysis on the effects warfare tactics, casualty timing, and casualty types had on the medical treatment facility (Cecchine et al., 2001). This proved...the 44-bed mobile portion of the current CSH was potentially inadequate to support approximately four brigades in an asymmetrical warfare scenario...systems and its increased force effectiveness on the fleet. He utilized quantitative analysis with Lanchester and Hughes-Salvo models to show that

  3. Operational Ethics: Just War and Implications for Contemporary American Warfare

    DTIC Science & Technology

    2003-05-22

    will mutually share those values.12 Today, those values are manifested in the secular society in the form of ethics and basic human morality, what is...Approved for Public Release; Distribution is Unlimited Operational Ethics : Just War and Implications for Contemporary American Warfare A Monograph...a denkschrift through which the author hopes to inspire discussions on operational ethics among professional officers and civilian proponents of

  4. Evaluation of Organisational Interoperabiity in a Network Centric Warfare Environment

    DTIC Science & Technology

    2004-09-01

    understanding developed. Command and Coordination examines issues related to command structure, command and leadership styles . Ethos covers socio...harmonisation of command arrangements and the accommodation of differences in command and leadership styles . 3.2.4 Ethos Future warfare will... leadership styles . • changes to give less emphasis to hierarchy and command and more to coordination. Any reference to a single chain of command has been

  5. 37. Photograph of plan for repairs to computer room, 1958, ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    37. Photograph of plan for repairs to computer room, 1958, prepared by the Public Works Office, Underwater Sound Laboratory. Drawing on file at Caretaker Site Office, Naval Undersea Warfare Center, New London. Copyright-free. - Naval Undersea Warfare Center, Bowditch Hall, 600 feet east of Smith Street & 350 feet south of Columbia Cove, West bank of Thames River, New London, New London County, CT

  6. Israel’s Second Lebanon War: A Failure of Afghan Model Warfare?

    DTIC Science & Technology

    2007-05-10

    Israeli experience in the Second Lebanon War will be compared against the American experience in Afghanistan as analyzed by Dr. Stephen Biddle in his...Biddle’s arguments regarding the so-called “Afghan Model” reinforces the validity of the conclusions Dr. Biddle derives regarding the U.S. success in...an irregular guerilla force. 2 Stephen Biddle , Afghanistan and the Future of Warfare

  7. Unconventional Warfare in the American Civil War

    DTIC Science & Technology

    2004-06-18

    Miller Thesis Title: Unconventional Warfare in the American Civil War Approved by: , Thesis Committee Chair LTC ( R ) Gregory T. Beck...M.A. , Member LTC ( R ) Richard Barbuto, Ph.D. , Consulting Faculty LTC ( R ) James B. Martin, Ph.D. Accepted this 18th day of...troops and supplies to forward areas. In official correspondence dated 26 May 1864 from Captain A. V. Barringer , Chief Quartermaster, Department of West

  8. Constitution aims to bring an end to health economy warfare.

    PubMed

    Harding, Mary-Louise; Martin, Daniel

    2005-02-10

    A rough new constitution is being drawn up for the NHS in a bid to prevent health economies sliding into bitter 'Bradford-style' warfare in the era of foundations trusts and payment by results. The rules of engagement are part of a package of measures designed to rescue some of the government's flagship reforms amid warnings from audit chiefs on the impact of PbR.

  9. 31. Photographic copy of historic views of lecture room, first ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    31. Photographic copy of historic views of lecture room, first floor, Bowditch Hall, c. 1955, taken from album in building photo files in Caretaker Site Office, Naval Undersea Warfare Center, New London. Copyright-free. - Naval Undersea Warfare Center, Bowditch Hall, 600 feet east of Smith Street & 350 feet south of Columbia Cove, West bank of Thames River, New London, New London County, CT

  10. Unconventional Warfare and Counterinsurgency in Pakistan: A Brief History

    DTIC Science & Technology

    2012-11-01

    inter-connected. Punjabi Pakistani militants with sophisticated asymmetric warfare training and experience fighting Indian forces in Kashmir...factions. These Punjabi Pakistani militants would prove to be some of the most dangerous opponents of the government after 2006. From 2003 to 2006, the...68 Khan. “Untangling the Punjabi Taliban Network”. CTC Sentinel, March 2010; Franco, “Tehrik-e-Taliban Pakistan.” 69 Iqbal

  11. Electronic warfare antenna systems - Past and present

    NASA Astrophysics Data System (ADS)

    Yaw, D.

    1981-09-01

    In discussing fixed beam arrays, it is noted that an array may be used to create simultaneous fixed beams or to form asymmetric beams of a desired shape. Attention is also given to arrays and beam control, noting that for some electronic warfare applications combinations of broad and narrow beam antenna response are needed. Other topics include ECM jamming antenna techniques and advanced array systems.

  12. Desorption Electrospray Ionization Mass Spectrometry (DESI-MS) Analysis of Organophosphorus Chemical Warfare Agents: Rapid Acquisition of Time-Aligned Parallel (TAP) Fragmentation Data

    DTIC Science & Technology

    2010-06-01

    phase microextraction. Anal. Chem., 69, 1866-72. [39] Sng , M.T. and Ng ,W.F. (1999). In-situ derivatisation of degradation products of chemical warfare...Chromatogr. A., 1141, 151-157. [46] Lee, H.S.N., Sng , M.T., Basheer, C., and Lee, H.K. (2007). Determination of degradation products of chemical

  13. Thumping the Hive: Russian Neocortical Warfare in Chechnya

    DTIC Science & Technology

    2004-09-01

    against the determined, resourceful Muslim tribes of the mountains and forests of the Central Caucasus, Russia’s military forces compiled a frustrating...warfare against minds and envisioning weapons as any means used to change the enemy’s will.” The merging of these two hemispheric approaches produces... single adviser in the Soviet system 40 Ibid., 5. 41 Szafranski, 409. 19 can allow himself to

  14. Potassium Ferrate: A Novel Chemical Warfare Agent Decontaminant

    DTIC Science & Technology

    2004-11-16

    POTASSIUM FERRATE : A NOVEL CHEMICAL WARFARE AGENT DECONTAMINANT Russell Greene greener@battelle.org (Battelle Memorial Institute, West...difficulties, and/or unsatisfactory CWA destruction efficiencies. Potassium ferrate (K2FeO4) addresses all of these issues through its high oxidation...used and proposed, are unstable (with respect to loss of activity) and/or difficult to prepare, store and transport. Potassium ferrate (K2FeO4) has

  15. Development of biosensors for the detection of biological warfare agents: its issues and challenges.

    PubMed

    Kumar, Harish; Rani, Renu

    2013-01-01

    This review discusses current development in biosensors for the detection of biological warfare agents (BWAs). BWAs include bacteria, virus and toxins that are added deliberately into air water and food to spread terrorism and cause disease or death. The rapid and unambiguous detection and identification of BWAs with early warning signals for detecting possible biological attack is a major challenge for government agencies particularly military and health. The detection devices--biosensors--can be classified (according to their physicochemical transducers) into four types: electrochemical, nucleic acid, optical and piezoelectric. Advantages and limitations of biosensors are discussed in this review followed by an assessment of the current state of development of different types of biosensors. The research and development in biosensors for biological warfare agent detection is of great interest for the public as well as for governments.

  16. Screening methods for chemical warfare agents in environmental samples at the Edgewood area of Aberdeen Proving Ground, Maryland

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Jakubowski, E.M.; Borland, M.M.; Norris, L.

    1995-06-01

    The U.S. Army Edgewood Research, Development and Engineering Center, the U.S. Army Aberdeen Proving Ground Support Activity, Directorate of Safety, Health and the Environment and SciTech Services Inc., an independent contractor, have developed an approach for screening environmental samples for the presence of chemical warfare agents. Since 1918, the Edgewood area of Aberdeen Proving Ground has been a research and testing ground for toxic agent compounds. Since these materials are considered highly toxic, screening for their presence in environmental samples is necessary for safe shipment to contract laboratories for testing by EPA guidelines. The screening ensures worker safety and maintainsmore » U.S. Army standards for transportation of materials potentially contaminated with chemical warfare agents. This paper describes the screening methodology.« less

  17. New studies disputing allegations of bacteriological warfare during the Korean War.

    PubMed

    Rolicka, M

    1995-03-01

    In the television series Korea the Unknown War produced jointly by Thames Television (London) and WGBH (Boston) in 1990, General Matthew Ridgway, Commander in Chief of United Nations forces during the Korean War, called the accusations that the United States waged bacteriological warfare "black propaganda." The charges discredited the United States and, despite denials and many international discussions, have not been completely refuted until new. Following studies in archives previously not available for research and after uncovering new sources, many specific examples of black propaganda were discovered that contained false information and lies discrediting the United States. The mechanism of lies, which convinced the Korean population that bacteriological warfare was going on and that the only way not to become victims of the United States' inhuman cruelty was to fight, are shown in this paper.

  18. Chemical warfare agents: their past and continuing threat and evolving therapies. Part I of II.

    PubMed

    Smith, Kathleen J; Skelton, Henry

    2003-01-01

    Chemical warfare agents are potentially accessible to even underdeveloped nations because they are easily and inexpensively produced. This means that they are ideal for use by terrorists and in military operations against civilian populations and troops. In terms of cutaneous injury, vesicants-mainly sulfur mustard-are the most significant chemical warfare agents. Advances in understanding the pathophysiology of the lesions produced by sulfur mustard have led to the research and development of barrier creams as well as pre- and post-exposure therapies to moderate the damage and accelerate healing. Part I of this paper will discuss the history and classification of chemical agents; Part II, which will appear in the September/October 2003 issue of SKINmed, will discuss characteristic manifestations of exposure to chemical agents, as well as prevention and therapy.

  19. InterAgency Journal (Volume 2, Issue 2, Summer 2011)

    DTIC Science & Technology

    2011-01-01

    Interagency Task Force for Irregular Warfare ( IATF -IW). It is fair to say that in prosecuting foreign policy which currently includes open warfare...With the introduction of the IATF -IW, CENTCOM is actively developing and promoting plans in conjunction with the civilian entities of government. The...opposite extreme, in the IATF - IW being the agent of the State Department. This subordination to State Department lead ensured rebuilding Iraq would

  20. Littoral Combat Ship Open Ocean Anti-Submarine Warfare

    DTIC Science & Technology

    2014-06-01

    maintain stealth and its defense in order to properly conduct an attack on a surface vessel (Sternhell and Thorndike 2014, 102). This statement...its target, the surface combatants can counter by increasing their speed (Sternhell and Thorndike 2014). While the maximum speed of the current...120316_PS.pdf Sternhell, Charles M, and Alan M Thorndike . 2014. “Antisubmarine Warfare in World War II.” CNA Analysis & Solutions. Accessed April 14, 2014

  1. Implementation and Testing of the JANUS Standard with SSC Pacific’s Software-Defined Acoustic Modem

    DTIC Science & Technology

    2017-10-01

    Communications Outpost (FDECO) Innovative Naval Prototype (INP) Program by the Advanced Photonic Technologies Branch (Code 55360), Space and Naval Warfare...underwater acoustic communication operations with NATO and non-NATO military and civilian maritime assets. iv ACRONYMS SPAWAR Space and Naval Warfare...the center frequency [1]. The ease of implementation and proven robustness in harsh underwater acoustic communication channels paved the way for

  2. Natural Language Processing Of Online Propaganda As A Means Of Passively Monitoring An Adversarial Ideology

    DTIC Science & Technology

    2017-03-01

    Warfare. 14. SUBJECT TERMS data mining, natural language processing, machine learning, algorithm design , information warfare, propaganda 15. NUMBER OF...Speech Tags. Adapted from [12]. CC Coordinating conjunction PRP$ Possessive pronoun CD Cardinal number RB Adverb DT Determiner RBR Adverb, comparative ... comparative UH Interjection JJS Adjective, superlative VB Verb, base form LS List item marker VBD Verb, past tense MD Modal VBG Verb, gerund or

  3. The Rise of iWar: Identity, Information, and the Individualization of Modern Warfare

    DTIC Science & Technology

    2015-10-01

    INDMDUALIZATION OF MODERN WARFARE Glenn J. Voelz U.S. ARMY WAR COLLEGE ~~ ..... ~O.L STRATEGIC STUDIES INSTITUTE Report Documentation Page Form...ORGANIZATION NAME(S) AND ADDRESS(ES) U.S. Army War College,Strategic Studies Institute,47 Ashburn Drive,Carlisle,PA,17013-5010 8. PERFORMING...concerning the role of ground forces in achieving national security objectives. The Strategic Studies Institute publishes national security and

  4. Organizing for Irregular Warfare: Implications for the Brigade Combat Team

    DTIC Science & Technology

    2007-12-01

    suggestions to improve his beloved institution. xii THIS PAGE INTENTIONALLY LEFT BLANK 1 I. INTRODUCTION The Army ended up trying to fight...Secretary of Defense and supported by the Chairman of the Joint Chiefs of Staff, was improving Special Operations Forces (SOF) and general purpose...applicable to all three missions within the larger term of irregular warfare. This paper may interchange some terms due their associations from varying

  5. Analysis of Maritime Support Vessels and Acquisition Methods Utilized to Support Maritime Irregular Warfare

    DTIC Science & Technology

    2010-06-01

    1 identifies five fundamental IW operations as they relate to the maritime environment and domain. Maritime IrregularWarfare Activities...they relate to MIW. Figure 2 identifies five fundamental IW operations as they relate to the maritime environment and domain. Maritime...meter RHIB is designed for the insertion and extraction of SEAL Team personnel. It is a twin- turbocharged diesel engine, waterjet-propelled personnel

  6. U.S. Army Special Forces Roles in Asymmetric Warfare

    DTIC Science & Technology

    2001-06-01

    1Jonathan B . Tucker, “Asymmetric Warfare: An Emerging Threat to U.S. Security,” Forum For Applied Research and Public Policy (Monterey...8Ibid., 34. 9Tucker, 11. 10Ibid., 2. 11 Henry H . Shelton, GEN, USA, Commander in Chief, U.S. Special Operations Command...the Senate Armed Services Committee, “Military Threats and Security Challenges Through 2015,” (Washington: 3 February 2000), 3. 26GEN Henry H

  7. Characterization of the MEMS Directional Sound Sensor Fabricated Using the SOIMUMPS Process

    DTIC Science & Technology

    2008-06-01

    ABBREVIATIONS AND ACRONYMS ASW Anti- Submarine Warfare AUV Autonomous Underwater Vehicle DRIE Deep Reactive Ion Etching FAS Federation of American...as the frequency diverges from the resonant frequency (2980 Hz ) of the sensor. This analysis points out some disadvantages of the current set up of...sound sensor has important military applications, in particular to anti- submarine warfare (ASW). The sensor considered in this thesis is modeled on

  8. Crimson Tide: Comparing Chinese Naval Expansion With Existing Naval Powers

    DTIC Science & Technology

    2016-09-01

    Amphibious Assault Ship MHV Mine Hunting Vehicle x MOOTW Military Operations Other Than War MPRA Marine Patrol and Reconnaissance Aircraft MSG...in mind, including 9 corvettes, 175 missile boats, 27 mine warfare vessels, and 75 submarine chasers.19 China’s expanding blue water assets...damage to an enemy fleet and operate silently and effectively in 16 the littorals. Mine warfare is another relatively inexpensive way to inflict

  9. The Feasibility of Instituting a Department Head Screen in the Naval Special Warfare Community.

    DTIC Science & Technology

    1985-12-01

    community, and through use of the Structured Accession Planning System for Officers (STRAP-O) model, projects the community from 1985 to 1991 both with and...Placement Officer. It looks at the current state of the NSW community, and through use of the Structured Accession Planning System for Officers (STRAP-0...ACCESSION PLANNING SYSTEM FOR OFFICERS----------------------------------------19 Ill. NAVAL SPECIAL WARFARE COMMUNITY RESPONSE TO PROPOSAL

  10. Active Cyber Defense: Enhancing National Cyber Defense

    DTIC Science & Technology

    2011-12-01

    Prevention System ISP Internet Service Provider IT Information Technology IWM Information Warfare Monitor LOAC Law of Armed Conflict NATO...the Information Warfare Monitor ( IWM ) discovered that GhostNet had infected 1,295 computers in 103 countries. As many as thirty percent of these...By monitoring the computers in Dharamsala and at various Tibetan missions, IWM was able to determine the IP addresses of the servers hosting Gh0st

  11. Hybrid Threat Center of Gravity Analysis: Cutting the Gordian Knot

    DTIC Science & Technology

    2016-04-04

    U.S. Marine Corps General James Mattis summed this best when he stated that “we expect future enemies to look at the four approaches [Traditional...synthesis is what we call hybrid warfare.”15 15 James N. Mattis and Frank Hoffman, "Future...accoun tid=12686 (accessed August 16, 2015). Mattis , James N. and Frank Hoffman. "Future Warfare: The Rise of Hybrid wars." United States Naval

  12. Atmospheric Data Requirements for Battlefield Obscuration Applications.

    DTIC Science & Technology

    1980-06-01

    34 ECOM-5572, August 1975. 9. Miers, B., G. Blackman, D. Langer, and N. Lorimier, " Analysis of SMS/GOES Film Data," ECOM-5573, September 1975. 10...ATEC-PL-M Combined Arms Combat Developments Activity; ATZLCA-RS Concepts Analysis Agency; CSCA-SMC Dugway Proving Ground; STEDP-PP Electronic Warfare...CS-SA Materiel Systems Analysis Activity, Ground Warfare Division; DRXSY-GS Missile Research and Development Command, Research Directorate; DRDMI-TRA

  13. Engineering Provision of Assault Crossing of Rivers,

    DTIC Science & Technology

    1983-01-21

    in the first place, in the missile and nuclear weapons warfare sharply they increased frontage and the depth of troop dispositions in the defense...modern missile and nuclear weapons warfare the medium * and wide rivers, reinforced by mine fields and decomposition of water-engineering and other...PMP and transport motor pool PVD -20. The existing pontoon trains make it possible to mechanize labor-consuming fitters work, to the minimum to bring

  14. Optimizing Training Event Schedules at Naval Air Station Fallon

    DTIC Science & Technology

    2018-03-01

    popularly known as Topgun. Fallon training range airspace overlays 10,200 square miles and contains ground ranges for bombing and electronic warfare. In...Fighter Weapons School, popularly known as Topgun. Fallon training range airspace overlays 10,200 square miles and contains ground ranges for bombing and...popularly known as Topgun. Fallon training range airspace overlays 10,200 squaremiles, and contains ground ranges for bombing and electronic warfare. In

  15. Russian and Chinese Information Warfare: Theory and Practice

    DTIC Science & Technology

    2004-06-01

    Integral neurolinguistic programming •Placing essential programs into the conscious or sub- conscious mind •Subconscious suggestions that modify human...Generators of special rays •Optical systems • Neurolinguistic programming •Computer psychotechnology •The mass media •Audiovisual effects •Special effects...Information Warfare: Theory and Practice 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER 6. AUTHOR(S) 5d. PROJECT NUMBER 5e

  16. Considerations for the Design and Implementation of a Management Support System for the Electronic Warfare System Support Laboratory.

    DTIC Science & Technology

    1985-06-01

    Division Organization Chart . . . . . . . . . . . . . . . . 54 4.4 Uaval Air Systeis Commana Organization Relationships...56 4.5 Groups Within AIR -05 Responsible For Electronic Warfare Projects ................. 57 8 I. IN OODUCTION A. BACKGRCUNID With technological...environment. Navy, Air Force, and Army developers of EW systems utilize the EWSSL. In the past 15 years the size of the EWSSL has greatly increased

  17. Information Warfare: Legal, Regulatory, Policy and Organizational Considerations for Assurance. Second Edition.

    DTIC Science & Technology

    1996-07-04

    of Information Warfare and Strategy graduated 32 students from its 10-month senior level (war college ) program on 12 June 1996. The event marked the...1989 prosecution of Robert Tappan Morris, a Cornell University graduate student who, on November 2, 1988, released a computer worm across the...2-25 2-2-1 Constitutional Amendments with Privacy Implications .................................... 2-28 2-2-2 Privacy and Access to Government

  18. Strategic Information Warfare: Challenges for the United States.

    DTIC Science & Technology

    1998-05-01

    Professor Richard H. Shultz Jr. as Director of the International Security Studies Program at the Fletcher School, helped provide both the academic...of Information Warfare and Strategy at National Defense University; and Larry Rothenberg, Institute for Foreign Policy Analysis. Captain Richard P...War in the Information Age" in War in the Information Age. Robert L. Pfaltzgraff, Jr. and Richard P. Shultz, Jr., eds. London: Brassey’s, 1997

  19. Iran and Latin America: Strategic Security Issues

    DTIC Science & Technology

    2011-05-01

    written extensively on asymmetrical warfare. known as Carlos the Jackal )3 for helping to expand the parameters of what irregular warfare should...international furor. See: "Troops Get Provocative Book," Miami Herald, Nov. II, 2005. 4 Ian James, "Chavez Praises Carlos the Jackal ," Associated Press...November 21, 2009, accessed January 24, 20 II, at: http:/ /www.independent.co. uk!news/world/americas/chavez-praises-carlos-the- jackal - 1825135.html

  20. Human Reliability Prediction System User’s Manual

    DTIC Science & Technology

    1977-12-01

    L Oh.~Nt C.A ICIA I I OMIII ots ?if# IVte AEA AL #4001Im.4,4 up I.-. tte )’fhawA ta *(.qOtte bim.s -vtait hP lSoulp * V1CALS ChET TING 0 IKIVA ofI...on human fectorsin under- sea warfare. Washington, D.C.: Committee on Undersea Warfare, 1949. 8. Blanchard, R.E. Survey of Navy user needs for human

  1. German Views of Irregular Warfare

    DTIC Science & Technology

    2015-06-01

    closely observed much of the Napoleonic Wars (1803–1815). His military experiences occurred during the end of the Age of Absolutism10 in Europe when...10 The Age of Absolutism refers to a period when absolute monarchs controlled much of Europe and is commonly considered to...concluded with a chapter related to irregular warfare and the nuclear age and an appendix dedicated to the training notes of the famed English

  2. Yoking Unequal Oxen: Organizing Forces for Dissimilar Missions

    DTIC Science & Technology

    2012-06-01

    with Change 1 20 March 2009, I-15, V-2. 2 Michael S. Neiberg, Warfare in World History (New York: Routledge, 2001), 10-11. 3 Lynn White, Jr ., Medieval...need a greater ability to deal with guerrilla 5 Andrew F. Krepinevich, Jr ., The Army and...to show the administration the Army was taking action. The Army established the Special Warfare Directorate and placed Brig Gen William B. Rosson

  3. Absenteeism Management

    DTIC Science & Technology

    1995-01-01

    1995 Ship Production Symposium Paper No. 24: Absenteeism Manage- ment U.S. DEPARTMENT OF THE NAVY CARDEROCK DIVISION, NAVAL SURFACE WARFARE CENTER...Paper No. 24: Absenteeism Management 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER 6. AUTHOR(S) 5d. PROJECT NUMBER 5e. TASK NUMBER...5f. WORK UNIT NUMBER 7. PERFORMING ORGANIZATION NAME(S) AND ADDRESS(ES) Naval Surface Warfare Center CD Code 2230 - Design Integration Tools Bldg

  4. Revolution or Evolution: Combined Arms Warfare in the Twenty-First Century

    DTIC Science & Technology

    1999-06-04

    of the relationship of technological development and its impact on the military . Technology has always been a major factor in the initiation, execution...this technology revolutionized warfare? 1 There has been much argument lately that the U.S. Army is participating in the latest revolution in military ...their impact on strategic concerns: The emergence of technology that has military applications is accelerating, but revolutionary changes in military

  5. Irregular Warfare Centric Foreign Internal Defense

    DTIC Science & Technology

    2013-06-01

    goods, its weak security forces and the gap unfilled by international forces.126 Scott Mann conducted a video interview on October 3 , 2012 and...Reduction Project (0704–0188) Washington DC 20503. 1. AGENCY USE ONLY (Leave blank) 2. REPORT DATE June 2013 3 . REPORT TYPE AND DATES COVERED...DISTRIBUTION CODE A 13. ABSTRACT (maximum 200 words) Conflict over the past few decades has changed drastically. Warfare changed with the conflict

  6. Absent Authority: Failure to Plan Funding and Command Authorities in USAF Security Assistance Units

    DTIC Science & Technology

    2013-03-01

    Warfare and Psychological Operations of the United States Air Force in Special Air Warfare (New York: Richards Rosen , 1969), 149. 73 Westermann...because we are naïve about the dangers we face, but because engagement can more durably lift suspicion and fear.” —President Barak Obama140...involved everyone from USSOCOM to AFSOC to the Embassy. While this worked for 140 Barak Obama

  7. Results of the Part-Task Shiphandling Trainer Pre-Prototype Training Effectiveness Evaluation (TEE)

    DTIC Science & Technology

    1985-03-01

    Navy officers from many dfferent operational and school commands were asked to visit the trainer, witness and partake in a demonstration, and evaluate...maneuvering in restricted waters. Sixty-three students from the Surface Warfare Officers School (Basic) participated in these training experiments...officers of the Surface Warfare Officer School (Basic) in Newport. - Rhode Island for their participation in this study. Special thanks is extended to

  8. Cyber-Enabled Unconventional Warfare: The Convergence of Cyberspace, Social Mobilization, and Special Warfare

    DTIC Science & Technology

    2015-12-01

    10945/31295; Roger Hilsman, American Guerrilla: My War behind Japanese Lines (Nebraska: Potomac Books, 1990); Derek Jones, “Ending the Debate...them in the war against the Japanese . Through the use of UW techniques, Detachment 101 was able to identify, recruit, indoctrinate, and... Japanese enemy. Through these proxy forces, DET 101 was able to inflict severe causalities while sustaining minimal losses to its own force (the

  9. More Effective Warfare: Warfare Waged Psychologically

    DTIC Science & Technology

    2012-06-01

    32 "Timeline of Hezbollah Violence," Committee for Accuracy in Middle East Reporting in America , accessed August 12, 2011, http...in Middle East Reporting in America . 15 objectives, as outlined by their 1985 “open letter,” were: Israel’s withdrawal from Lebanon and subsequent...repressed by Israel, America , and France and will continue fighting until Israel is eradicated from the face of the earth. There are several core

  10. Recognizing and Adapting to Unrestricted Warfare Practices by China

    DTIC Science & Technology

    2012-02-15

    Sun Zi, are of particular significance. These men taught obedience to the state, the primacy of relationships over law, and the importance of...Von Clausewitz and Baron Antoine Jomini. Whereas Clausewitz provided a theoretical strategic framework for warfare where “war is a continuation of...of family (filial Piety), ritual, loyalty, meritocracy, relationships , and the desire to avoid shame and losing face.17 Chinese rulers often used

  11. Destruction of chemical warfare surrogates using a portable atmospheric pressure plasma jet

    NASA Astrophysics Data System (ADS)

    Škoro, Nikola; Puač, Nevena; Živković, Suzana; Krstić-Milošević, Dijana; Cvelbar, Uroš; Malović, Gordana; Petrović, Zoran Lj.

    2018-01-01

    Today's reality is connected with mitigation of threats from the new chemical and biological warfare agents. A novel investigation of cold plasmas in contact with liquids presented in this paper demonstrated that the chemically reactive environment produced by atmospheric pressure plasma jet (APPJ) is potentially capable of rapid destruction of chemical warfare agents in a broad spectrum. The decontamination of three different chemical warfare agent surrogates dissolved in liquid is investigated by using an easily transportable APPJ. The jet is powered by a kHz signal source connected to a low-voltage DC source and with He as working gas. The detailed investigation of electrical properties is performed for various plasmas at different distances from the sample. The measurements of plasma properties in situ are supported by the optical spectrometry measurements, whereas the high performance liquid chromatography measurements before and after the treatment of aqueous solutions of Malathion, Fenitrothion and Dimethyl Methylphosphonate. These solutions are used to evaluate destruction and its efficiency for specific neural agent simulants. The particular removal rates are found to be from 56% up to 96% during 10 min treatment. The data obtained provide basis to evaluate APPJ's efficiency at different operating conditions. The presented results are promising and could be improved with different operating conditions and optimization of the decontamination process.

  12. Entering the Dragon’s Lair: Chinese Antiaccess Strategies and Their Implications for the United States

    DTIC Science & Technology

    2007-01-01

    possible expansion of electronic warfare into outer space in future conflicts (Peng and Yao, 2001, p. 363): As a result of the continuous development of...information warfare units to develop viruses to attack enemy computer systems and networks .” Potential Effects of Chinese Antiaccess Measures 87...computers, enhanced user identi- fication measures, and monitoring of network activity. Given the possibility that China could nonetheless succeed in

  13. Information Operations and Warfare: Fundamental Challenges for the 21st Century

    DTIC Science & Technology

    1997-05-01

    Perritt, Jr., Access To The National Information Infrastructure, 30 WAKE FOREST L. REV. 51 (1995); John I. Alger, Declaring Information War, JANE’S...Sought For Info Warfare, COMPUTERWORLD, Jun. 5, 1995, at 55 [hereinafter New Laws]; John Arquilla & David Ronfeldt, Cyberwat is Coming!, COMPARATIVE...at 82. See also John T. Correll, Signs of a Revolution, AIR FORCE MAG., Aug. 1995, at 2 ("Over the years, there have been periodic innovations

  14. Information Operations: A Research Aid Includes Coverage of: Information Warfare, Information Assurance, and Infrastructure Protection.

    DTIC Science & Technology

    1997-09-01

    Policy Implications Stephen D. Biddle, IDA Papaer P-3123 Institute for Defense Analysis (IDA), Strategy Forces and Research Division 1801 N...IDA INSTITUTE FOR DEFENSE ANALYSES Information Operations: A Research Aid Includes Coverage of: Information Warfare, Information Assurance...Gray, Principal Investigator [pBC Q^^E^ nsSSPECTBD 8’ 19980303 031 This work was conducted under IDA’S central research program. The publication of

  15. Social Mobilization, Influence, and Political Warfare: Unconventional Warfare Strategies for Shaping the 21st Century Security Environment

    DTIC Science & Technology

    2012-06-08

    This research effectively argues the existence and importance of the very “human dynamic” of social mobilization and social revolutions. While there...managed to mobilize activism and protest. Many emerged and achieved success without the luxury of modern media and communications technologies let alone...were able to achieve significant social and political effects using social mobilization and non-violent collective action. Activists in both Tunisia

  16. Plan Colombia: A Case For Political Warfare To Defeat Transnational Criminal Organizations In The Gray Zone

    DTIC Science & Technology

    2016-05-26

    Approved for public release; distribution is unlimited Plan Colombia: A Case for Political Warfare to Defeat Transnational Criminal Organizations ...to Defeat Transitional Criminal Organizations 5a. CONTRACT NUMBER in the Gray Zone 5b. GRANT NUMBER 5c. PROGRAM ELEMENT...NUMBER 6. AUTHOR(S) MAJ Kyle M. Spade 5d. PROJECT NUMBER 5e. TASK NUMBER 5f. WORK UNIT NUMBER 7. PERFORMING ORGANIZATION

  17. Unconventional Warfare: A Mission Metamorphosis for the 21st Century?

    DTIC Science & Technology

    2000-06-01

    technology, the trend for insurgent groups to use the internet to advance their cause or exploit propaganda is sure to increase. Insurgent groups using ...Zapatistas, they used “social net war” to put pressure on the Mexican government. Efforts such as this are expected to continue and are extremely important...authority of the local government or occupying power, and using primarily irregular and informal groupings and measures.246 FM 31-21 Guerrilla Warfare

  18. Conflict Without Casualties: Non-Lethal Weapons in Irregular Warfare

    DTIC Science & Technology

    2007-09-01

    the body,” and the Geneva Protocol of 1925, bans the use of chemical and biological weapons .11 On 8 April 1975, President Ford issued Executive...E Funding – PE 63851M) (accessed 15 December 2006). The American Journal of Bioethics . “Medical Ethics and Non-Lethal Weapons .” Bioethics.net...CASUALTIES: NON-LETHAL WEAPONS IN IRREGULAR WARFARE by Richard L. Scott September 2007 Thesis Advisor: Robert McNab Second Reader

  19. The Soldier-Cyborg Transformation: A Framework for Analysis of Social and Ethical Issues of Future Warfare

    DTIC Science & Technology

    1998-05-26

    attitude about the use of chemical and biologic weapons , one must question the deterrent value of WMD. With perhaps the 19 exception of nuclear...ENHANCING, TRANSFORMING AND TRANSCENDING 1 TRENDS AND PREDICTIONS ABOUT FUTURE WARFARE 3 CHANGING DEMOGRAPHICS 8 THE BIOLOGIC SHIFT 10 STRATEGIC...without widespread loss of life. Thus, low lethality weapons and distant applications of precisely- applied force are mandatory to make future

  20. Multifunctional Ultra-high Vacuum Apparatus for Studies of the Interactions of Chemical Warfare Agents on Complex Surfaces

    DTIC Science & Technology

    2014-01-02

    of the formation of a hydrogen-bonded hydroxyl. Characteristic modes of the sarin molecule itself are also ob- served. These experimental results show...chemical warfare agent, surface science, uptake, decontamination, filtration , UHV, XPS, FTIR, TPD REPORT DOCUMENTATION PAGE 11. SPONSOR/MONITOR’S...challenges that accompany the research of these toxic, often very low vapor pressure, compounds. While results of vacuum-based surface science

Top