Sample records for information warfare analysis

  1. Information Operations: A Research Aid Includes Coverage of: Information Warfare, Information Assurance, and Infrastructure Protection.

    DTIC Science & Technology

    1997-09-01

    Policy Implications Stephen D. Biddle, IDA Papaer P-3123 Institute for Defense Analysis (IDA), Strategy Forces and Research Division 1801 N...IDA INSTITUTE FOR DEFENSE ANALYSES Information Operations: A Research Aid Includes Coverage of: Information Warfare, Information Assurance...Gray, Principal Investigator [pBC Q^^E^ nsSSPECTBD 8’ 19980303 031 This work was conducted under IDA’S central research program. The publication of

  2. Strategic Information Warfare: Challenges for the United States.

    DTIC Science & Technology

    1998-05-01

    Professor Richard H. Shultz Jr. as Director of the International Security Studies Program at the Fletcher School, helped provide both the academic...of Information Warfare and Strategy at National Defense University; and Larry Rothenberg, Institute for Foreign Policy Analysis. Captain Richard P...War in the Information Age" in War in the Information Age. Robert L. Pfaltzgraff, Jr. and Richard P. Shultz, Jr., eds. London: Brassey’s, 1997

  3. 75 FR 6642 - Notice of Proposed Information Collection; Naval Special Warfare Recruiting Directorate

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-02-10

    ... Information Collection; Naval Special Warfare Recruiting Directorate AGENCY: Department of the Navy, DoD. ACTION: Notice. SUMMARY: The Naval Special Warfare (NSW) Recruiting Directorate announces the submission... the proposal and associated collection instruments, write to the Director, Naval Special Warfare...

  4. Replication Does Survive Information Warfare Attacks

    DTIC Science & Technology

    1997-01-01

    warfare, storage jamming, unauthorized modification, Trojan horse 1 INTRODUCTION Ammann, Jajodia, McCollum, and Blaustein define information warfare as the...information warfare, and we adopt the latter term. To provide context, Amman et al. specifically do not consider Trojan horses within the database system...called internal jammers (McDermott and Goldschalg, 1996b)), but instead consider a wide range of attacks other than Trojan horses . Both groups agree that

  5. Cyber Security: A Road Map for Turkey

    DTIC Science & Technology

    2012-03-19

    Cyber warfare is a form of information warfare, sometimes seen as analogous to conventional warfare, among a range of potential actors, including...nation states, non-state groups, and a complex hybrid of conflict involving both state and non-state actors. Cyber warfare is a tool of national power...An entire nation s ability to operate and fight in the information age is vital toward survival. Nowadays, cyber warfare is mostly focused on

  6. Bridging the Gap in the Realm of Information Dominance: A Concept of Operations for the Naval Postgraduate School Center for Cyber Warfare

    DTIC Science & Technology

    2010-09-01

    THE REALM OF INFORMATION DOMINANCE : A CONCEPT OF OPERATIONS FOR THE NAVAL POSTGRADUATE SCHOOL CENTER FOR CYBER WARFARE by Cynthia R. Duke...Bridging the Gap in the Realm of Information Dominance : A Concept of Operations for the Naval Postgraduate School Center for Cyber Warfare 6...of importance to the U.S. Military service and its allies. 15. NUMBER OF PAGES 102 14. SUBJECT TERMS Cyber Warfare, Information Dominance 16

  7. Cyber Warfare/Cyber Terrorism

    DTIC Science & Technology

    2004-03-19

    Section 1 of this paper provides an overview of cyber warfare as an element of information warfare, starting with the general background of the...alternative form of conflict, reviews the traditional principles of warfare and why they may or may not apply to cyber warfare , and proposes new principles of...warfare that may be needed to conduct cyber warfare . Section 1 concludes with a review of offensive and defensive cyber warfare concepts. Section 2

  8. Cyber Warfare: China’s Strategy to Dominate in Cyber Space

    DTIC Science & Technology

    2011-06-10

    CYBER WARFARE : CHINA‘S STRATEGY TO DOMINATE IN CYBER SPACE A thesis presented to the Faculty of the U.S. Army Command and...warfare supports the use of cyber warfare in future conflict. The IW militia unit organization provides each Chinese military region commander with...China, Strategy, Cyber Warfare , Cyber Space, Information Warfare, Electronic Warfare 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF ABSTRACT 18

  9. Initial Report of the Deans Cyber Warfare Ad Hoc Committee

    DTIC Science & Technology

    2011-12-22

    in a cyber warfare environment. Among the more notable recent developments have been the establishment of a new Cyber Warfare Command (USCYBERCOM) at...information-warfare-centric organization. Clearly, future Naval Academy graduates will be expected to know more about cyber warfare than those we have...graduated in the past. The Academic Dean and Provost tasked an ad hoc committeethe Cyber Warfare ad hoc Committeeto examine how USNA can best ensure that

  10. Simulating cyber warfare and cyber defenses: information value considerations

    NASA Astrophysics Data System (ADS)

    Stytz, Martin R.; Banks, Sheila B.

    2011-06-01

    Simulating cyber warfare is critical to the preparation of decision-makers for the challenges posed by cyber attacks. Simulation is the only means we have to prepare decision-makers for the inevitable cyber attacks upon the information they will need for decision-making and to develop cyber warfare strategies and tactics. Currently, there is no theory regarding the strategies that should be used to achieve objectives in offensive or defensive cyber warfare, and cyber warfare occurs too rarely to use real-world experience to develop effective strategies. To simulate cyber warfare by affecting the information used for decision-making, we modify the information content of the rings that are compromised during in a decision-making context. The number of rings affected and value of the information that is altered (i.e., the closeness of the ring to the center) is determined by the expertise of the decision-maker and the learning outcome(s) for the simulation exercise. We determine which information rings are compromised using the probability that the simulated cyber defenses that protect each ring can be compromised. These probabilities are based upon prior cyber attack activity in the simulation exercise as well as similar real-world cyber attacks. To determine which information in a compromised "ring" to alter, the simulation environment maintains a record of the cyber attacks that have succeeded in the simulation environment as well as the decision-making context. These two pieces of information are used to compute an estimate of the likelihood that the cyber attack can alter, destroy, or falsify each piece of information in a compromised ring. The unpredictability of information alteration in our approach adds greater realism to the cyber event. This paper suggests a new technique that can be used for cyber warfare simulation, the ring approach for modeling context-dependent information value, and our means for considering information value when assigning cyber resources to information protection tasks. The first section of the paper introduces the cyber warfare simulation challenge and the reasons for its importance. The second section contains background information related to our research. The third section contains a discussion of the information ring technique and its use for simulating cyber attacks. The fourth section contains a summary and suggestions for research.

  11. Intelligence, Information Technology, and Information Warfare.

    ERIC Educational Resources Information Center

    Davies, Philip H. J.

    2002-01-01

    Addresses the use of information technology for intelligence and information warfare in the context of national security and reviews the status of clandestine collection. Discusses hacking, human agent collection, signal interception, covert action, counterintelligence and security, and communications between intelligence producers and consumers…

  12. Cyber Warfare: An Evolution in Warfare not Just War Theory

    DTIC Science & Technology

    2013-04-05

    cyber warfare is greatly debated. While some argue that Just War Theory is irrelevant to cyber warfare , a careful analysis demonstrates that it is a...useful tool for considering the morality of cyber warfare . This paper examines the application of Just War Theory to cyber warfare and contends that...Just War Theory is a useful tool for considering the morality of cyber warfare .

  13. Information Warfare and the Principles of War.

    DTIC Science & Technology

    1997-02-07

    information dominance , control of ’cyberspace’ or the ’Infosphere’ and Information Warfare. Some argue that Information Warfare (IW) is just a repackaging of old concepts and current practices, while others contend it is the next Revolution in Military Affairs (RMA). The question that needs to be addressed is; can IW achieve strategic and operational military objectives on its on merit? A way to answer this questions is to analyze IW against our current doctrine. Using the principles of war as a framework, does IW fit (or can it be employed) in the

  14. The Handicap Principle, Strategic Information Warfare and the Paradox of Asymmetry

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Ma, Zhanshan; Sheldon, Frederick T; Krings, Axel

    2010-01-01

    The term asymmetric threat (or warfare) often refers to tactics utilized by countries, terrorist groups, or individuals to carry out attacks on a superior opponent while trying to avoid direct confrontation. Information warfare is sometimes also referred to as a type of asymmetric warfare perhaps due to its asymmetry in terms of cost and efficacy. Obviously, there are differences and commonalities between two types of asymmetric warfare. One major difference lies in the goal to avoid confrontation and one commonality is the asymmetry. Regardless, the unique properties surrounding asymmetric warfare warrant a strategic-level study. Despite enormous studies conducted in themore » last decade, a consensus on the strategy a nation state should take to deal with asymmetric threat seems still intriguing. In this article, we try to shed some light on the issue from the handicap principle in the context of information warfare. The Handicap principle was first proposed by Zahavi (1975) to explain the honesty or reliability of animal communication signals. He argued that in a signaling system such as one used in mate selection, a superior male is able to signal with a highly developed "handicap" to demonstrate its quality, and the handicap serves "as a kind of (quality) test imposed on the individual" (Zahavi 1975, Searcy and Nowicki 2005). The underlying thread that inspires us for the attempt to establish a connection between the two apparently unrelated areas is the observation that competition, communication and cooperation (3C), which are three fundamental processes in nature and against which natural selection optimize living things, may also make sense in human society. Furthermore, any communication networks, whether it is biological networks (such as animal communication networks) or computer networks (such as the Internet) must be reasonably reliable (honest in the case of animal signaling) to fulfill its missions for transmitting and receiving messages. The strategic goal of information warfare is then to destroy or defend the reliability (honesty) of communication networks. The handicap principle that governs the reliability (honesty) of animal communication networks can be considered as the nature s version of information warfare strategy because it is a product of natural selection. What is particularly interesting is to transfer the evolutionary game theory models [e.g., Sir Philip Sydney (SPS) game] for the handicap principle to the study of information warfare. In a broad perspective, we realize that the handicap principle may actually contradict the principle of asymmetry in asymmetric warfare. Anyway, not every species of animals has evolved expensive signaling equipments like male peacocks (whose exaggerated train is an example of handicap). Furthermore, the handicap principle is not only about communication, and it also embodies the spirits of cooperation and competition. In human societies, communication modulates cooperation and competition; so does in animal communication networks. Therefore, to evolve or maintain a sustainable communication network, the proper strategy should be to balance (modulate) the cooperation and competition with communication tools (information warfare tools), which is perhaps in contradiction with the asymmetric strategy. There might be a paradox in the strategy of asymmetric warfare, and whether or not information warfare can be used as an asymmetric tool is still an open question.« less

  15. Application of Solid Phase Microextraction Coupled with Gas Chromatography/Mass Spectrometry as a Rapid Method for Field Sampling and Analysis of Chemical Warfare Agents and Toxic Industrial Chemicals

    DTIC Science & Technology

    2003-01-01

    PHASE MICROEXTRACTION COUPLED WITH GAS CHROMATOGRAPHY/MASS SPECTROMETRY AS A RAPID METHOD FOR FIELD SAMPLING AND ANALYSIS OF CHEMICAL WARFARE AGENTS...SAMPLING AND ANALYSIS OF CHEMICAL WARFARE AGENTS AND TOXIC INDUSTRIAL CHEMICALS 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER 6...GAS CHROMATOGRAPHY/MASS SPECTROMETRY AS A RAPID METHOD FOR FIELD SAMPLING AND ANALYSIS OF CHEMICAL WARFARE AGENTS AND TOXIC INDUSTRIAL CHEMICALS

  16. Employing U.S. Information Operations Against Hybrid Warfare Threats

    DTIC Science & Technology

    2013-03-01

    Article 51.24 Cyber warfare is unique in that vulnerabilities that a network target may have could be discovered by software developers who then... cyber warfare rather than physical combat, a future subject to air strikes or ground-forces raids would likely be a powerful deterrent. Some in the U.S...Manwaring, The Complexity of Modern Asymmetric Warfare, (Norman, OK: Univ. of Oklahoma Press, 2012), 126-129. 23 Arie J. Schaap, “ Cyber Warfare Operations

  17. Maneuver Warfare in Cyberspace

    DTIC Science & Technology

    1997-01-01

    government departments and agencies; (2) National security and military strategies must outline a response to the threats and opportunities of cyber ... warfare ; and (3) the Department of Defense’s offensive and defensive responsibilities, parameters, and capabilities for strategic information warfare need

  18. Forms of war.

    PubMed

    Vogel, H; Bartelt, D

    2007-08-01

    Under war conditions, employed weapons can be identified on radiographs obtained in X-ray diagnostic. The analysis of such X-ray films allows concluding that there are additional information about the conditions of transport and treatment; it shall be shown that there are X-ray findings which are typical and characteristic for certain forms of warfare. The radiograms have been collected during thirty years; they come from hospitals, where war casualties had been treated, and personal collections. The material is selected, because in war X-ray diagnostic will be limited and the interest of the opposing parties influence the access to the material; furthermore the possibilities to publish or to communicate facts and thoughts are different. Citizens of the USA, GB, France, or Israel will have easier access to journals than those of Vietnam, Chad, and Zimbabwe. Under war conditions, poor countries, like North Vietnam may develop own concepts of medical care. There are X-ray findings which are typical or even characteristic for air warfare, guerrilla warfare, gas war, desert warfare, conventional warfare, and annihilation warfare, and city guerrilla warfare/civil war. The examples demonstrate that weapons and the conditions of transport and treatment can be recognized by X-ray findings. The radiogram can be read like a document. In War, there are differences between a treatment and imaging diagnostic in countries, which control the air space and in those who do not. Medical care of the poor, i.e. in countries (in general those opposing the western nations) will hardly be published, and poverty has no advocate.

  19. Situation Awareness Information Dominance & Information Warfare.

    DTIC Science & Technology

    1997-02-01

    Information warfare and its primary objective of achieving information dominance over enemy forces have arisen as a major area of emphasis for future...military actions. The concept of information dominance and the issues involved in attaining it are explored through a model of situation awareness...directions for the development of systems to support the goal of information dominance can be established.

  20. Network Centric Warfare Case Study: U.S. V Corps and 3rd Infantry Division (Mechanized) During Operation Iraqi Freedom Combat Operations (Mar-Apr 2003). Volume 3. Network Centric Warfare Insights

    DTIC Science & Technology

    2003-01-01

    OPSEC), military deception, psychological operations (PSYOPS), special information operations (IO), information assurance, physical security...nonlethal effects, such as operational 8 Network Centric Warfare Case Study security (OPSEC), military deception, psychological operations (PSYOP...Support Operations Group ASR Alternate Supply Route; or, Ammunition Supply Rate ATACMS Army Tactical Missile System ATARS Advanced

  1. Establishing a Cyber Warrior Force

    DTIC Science & Technology

    2004-09-01

    Cyber Warfare is widely touted to be the next generation of warfare. As America’s reliance on automated systems and information technology increases...so too does the potential vulnerability to cyber attack. Nation and non-nation states are developing the capability to wage cyber warfare . Historically

  2. IW Cyberlaw. The Legal Issues of Information Warfare

    DTIC Science & Technology

    1999-01-01

    actions. The Information Warfare Center at Kelly AFB, Texas, casts a wide net in its definition of information war- fare. Its view is that... Maura T. McGowan, in an unpublished study en- titled “Law of Armed Conflict” (Colorado Springs, Colo.: United States Air Force Academy, Department of

  3. Mission Accomplished! Or Not? A Study about Success in Information Operations

    DTIC Science & Technology

    2012-09-01

    sensors and presented on a man-machine interface, e.g., a computer screen or on a radar plan position indicator. In modern warfare, staff and...has to be achievable; otherwise, it can be viewed simply as dreaming. Compared to sea, land and even air warfare, information warfare is a young...shares some of its characteristics with the air and sea domains. All of them exist without borders. In addition, they cannot be fortified or

  4. Biological warfare agents

    PubMed Central

    Thavaselvam, Duraipandian; Vijayaraghavan, Rajagopalan

    2010-01-01

    The recent bioterrorist attacks using anthrax spores have emphasized the need to detect and decontaminate critical facilities in the shortest possible time. There has been a remarkable progress in the detection, protection and decontamination of biological warfare agents as many instrumentation platforms and detection methodologies are developed and commissioned. Even then the threat of biological warfare agents and their use in bioterrorist attacks still remain a leading cause of global concern. Furthermore in the past decade there have been threats due to the emerging new diseases and also the re-emergence of old diseases and development of antimicrobial resistance and spread to new geographical regions. The preparedness against these agents need complete knowledge about the disease, better research and training facilities, diagnostic facilities and improved public health system. This review on the biological warfare agents will provide information on the biological warfare agents, their mode of transmission and spread and also the detection systems available to detect them. In addition the current information on the availability of commercially available and developing technologies against biological warfare agents has also been discussed. The risk that arise due to the use of these agents in warfare or bioterrorism related scenario can be mitigated with the availability of improved detection technologies. PMID:21829313

  5. A Deeper Level of Network Intelligence: Combating Cyber Warfare

    DTIC Science & Technology

    2010-04-01

    A Deeper Level of Network Intelligence: Combating Cyber Warfare This information is provided for your review only and is not for any distribution...A Deeper Level of Network Intelligence: Combating Cyber Warfare 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER 6. AUTHOR(S) 5d

  6. Offensive Cyber Capability: Can it Reduce Cyberterrorism

    DTIC Science & Technology

    2010-12-02

    33 Lech J. Janczewski, and Andrew M. Colarik, eds., Cyber Warfare and Cyber Terrorism (New York: Information Science Reference, 2008...Science and Business Media, 2008. Janczewski, Lech , J. and Andrew M. Colarik, eds., Cyber Warfare and Cyber Terrorism. New York: Information Science

  7. Training Community Modeling and Simulation Business Plan: 2009 Edition

    DTIC Science & Technology

    2010-04-01

    strategic information assurance 33 33 Provide crisis action procedures training 34 34 Provide the IC SOF-specific training at the operational level... information and products • Collaborative analysis processes • Dissemination of information throughout a command and to subordinates by redundant means...centric M&S capabilities will improve training for information warfare, assist with training for homeland defense operations, crisis -management plan- ning

  8. GIS applications for military operations in coastal zones

    USGS Publications Warehouse

    Fleming, S.; Jordan, T.; Madden, M.; Usery, E.L.; Welch, R.

    2009-01-01

    In order to successfully support current and future US military operations in coastal zones, geospatial information must be rapidly integrated and analyzed to meet ongoing force structure evolution and new mission directives. Coastal zones in a military-operational environment are complex regions that include sea, land and air features that demand high-volume databases of extreme detail within relatively narrow geographic corridors. Static products in the form of analog maps at varying scales traditionally have been used by military commanders and their operational planners. The rapidly changing battlefield of 21st Century warfare, however, demands dynamic mapping solutions. Commercial geographic information system (GIS) software for military-specific applications is now being developed and employed with digital databases to provide customized digital maps of variable scale, content and symbolization tailored to unique demands of military units. Research conducted by the Center for Remote Sensing and Mapping Science at the University of Georgia demonstrated the utility of GIS-based analysis and digital map creation when developing large-scale (1:10,000) products from littoral warfare databases. The methodology employed-selection of data sources (including high resolution commercial images and Lidar), establishment of analysis/modeling parameters, conduct of vehicle mobility analysis, development of models and generation of products (such as a continuous sea-land DEM and geo-visualization of changing shorelines with tidal levels)-is discussed. Based on observations and identified needs from the National Geospatial-Intelligence Agency, formerly the National Imagery and Mapping Agency, and the Department of Defense, prototype GIS models for military operations in sea, land and air environments were created from multiple data sets of a study area at US Marine Corps Base Camp Lejeune, North Carolina. Results of these models, along with methodologies for developing large-scale littoral warfare databases, aid the National Geospatial-Intelligence Agency in meeting littoral warfare analysis, modeling and map generation requirements for US military organizations. ?? 2008 International Society for Photogrammetry and Remote Sensing, Inc. (ISPRS).

  9. GIS applications for military operations in coastal zones

    NASA Astrophysics Data System (ADS)

    Fleming, S.; Jordan, T.; Madden, M.; Usery, E. L.; Welch, R.

    In order to successfully support current and future US military operations in coastal zones, geospatial information must be rapidly integrated and analyzed to meet ongoing force structure evolution and new mission directives. Coastal zones in a military-operational environment are complex regions that include sea, land and air features that demand high-volume databases of extreme detail within relatively narrow geographic corridors. Static products in the form of analog maps at varying scales traditionally have been used by military commanders and their operational planners. The rapidly changing battlefield of 21st Century warfare, however, demands dynamic mapping solutions. Commercial geographic information system (GIS) software for military-specific applications is now being developed and employed with digital databases to provide customized digital maps of variable scale, content and symbolization tailored to unique demands of military units. Research conducted by the Center for Remote Sensing and Mapping Science at the University of Georgia demonstrated the utility of GIS-based analysis and digital map creation when developing large-scale (1:10,000) products from littoral warfare databases. The methodology employed-selection of data sources (including high resolution commercial images and Lidar), establishment of analysis/modeling parameters, conduct of vehicle mobility analysis, development of models and generation of products (such as a continuous sea-land DEM and geo-visualization of changing shorelines with tidal levels)-is discussed. Based on observations and identified needs from the National Geospatial-Intelligence Agency, formerly the National Imagery and Mapping Agency, and the Department of Defense, prototype GIS models for military operations in sea, land and air environments were created from multiple data sets of a study area at US Marine Corps Base Camp Lejeune, North Carolina. Results of these models, along with methodologies for developing large-scale littoral warfare databases, aid the National Geospatial-Intelligence Agency in meeting littoral warfare analysis, modeling and map generation requirements for US military organizations.

  10. Defending the Borderland: Ukrainian Military Experiences with IO, Cyber, and EW

    DTIC Science & Technology

    2017-12-01

    31 Tactical Information Operations...seeks to understand the current state of hybrid warfare in Ukraine with a particular emphasis on the use of Information Operations (IO), Electronic...understanding of the conditions that enabled this style of warfare and how Russia has exploited those conditions in Ukraine will serve to inform

  11. Developing and Fielding Information Dominance

    DTIC Science & Technology

    2002-01-01

    Developing and Fielding Information Dominance Space and Naval Warfare Systems Command’s IT-21 Blocks 1 and 2 2002 Command and Control Research and...00-00-2002 4. TITLE AND SUBTITLE Developing and Fielding Information Dominance 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER...force levels were uncertain, the necessary role of information dominance to maintaining strategic superiority was not. Platform Centric Warfare, with its

  12. Information Operations Team Training & Information Operations Training Aid, Information Warfare Effectiveness (IWE) Program, Delivery Order 8

    DTIC Science & Technology

    2010-03-01

    submenus and toolbar with icon buttons 4. The IFOTA shall conform to Defense Information Infrastructure Common Operating Environment ( DII COE) and...him my business card , but it might come in the package we request via AFRL). PSYOP Instructor IWST is now called IWT (??) SME MD MD Instructor...Engineering and Software Engineering CTA Cognitive Task Analysis DII COE Defense Information Infrastructure Common Operating Environment EJB Enterprise Java

  13. THE COMMAND OF THE TREND: SOCIAL MEDIA AS A WEAPON IN THE INFORMATION AGE

    DTIC Science & Technology

    2017-06-01

    and a bot network) based on the analysis within this case study . Table 3. ISIS Case Study Analysis Propaganda Narratives 1. ISIS is strong...get started with an interview and included me in a cyber think-tank for the study of ISIS activity on social media. Additionally, I am still... study demonstrates how social media is a tool for modern warfare in the information age. The report builds on analysis of three distinct topics

  14. Design and implementation of intelligent electronic warfare decision making algorithm

    NASA Astrophysics Data System (ADS)

    Peng, Hsin-Hsien; Chen, Chang-Kuo; Hsueh, Chi-Shun

    2017-05-01

    Electromagnetic signals and the requirements of timely response have been a rapid growth in modern electronic warfare. Although jammers are limited resources, it is possible to achieve the best electronic warfare efficiency by tactical decisions. This paper proposes the intelligent electronic warfare decision support system. In this work, we develop a novel hybrid algorithm, Digital Pheromone Particle Swarm Optimization, based on Particle Swarm Optimization (PSO), Ant Colony Optimization (ACO) and Shuffled Frog Leaping Algorithm (SFLA). We use PSO to solve the problem and combine the concept of pheromones in ACO to accumulate more useful information in spatial solving process and speed up finding the optimal solution. The proposed algorithm finds the optimal solution in reasonable computation time by using the method of matrix conversion in SFLA. The results indicated that jammer allocation was more effective. The system based on the hybrid algorithm provides electronic warfare commanders with critical information to assist commanders in effectively managing the complex electromagnetic battlefield.

  15. Application of Solid Phase Microextraction with Gas Chromatography-Mass Spectrometry as a Rapid, Reliable, and Safe Method for Field Sampling and Analysis of Chemical Warfare Agent Precursors

    DTIC Science & Technology

    2005-03-01

    in hair samples with analysis by GC-MS [41,42]. The research discussed here examined a polydimethylsiloxane polymer with 10% activated charcoal (PDMS...Field Sampling and Analysis of Chemical Warfare Agent Precursors” Name of Candidate: LT Douglas Parrish Doctor of Philosophy, Environmental...Microextraction with Gas Chromatography-Mass Spectrometry as a Rapid, Reliable, and Safe Method for Field Sampling and Analysis of Chemical Warfare

  16. RPA Field Simulations:Dilemma Training for Legal and Ethical Decision Making

    DTIC Science & Technology

    2015-11-07

    Simulation  Two phases in RPA Field Simulation – classroom phase and field phase  Purpose: link theoretical understanding/ moral reasoning with...rapid, informed decision-making/ moral behavior IRREGULAR WARFARE  U.S. dominates conventional warfare, but irregular warfare falls under Things...aspects: Mental simulation of action Modify Implement Will it work? MORAL REASONING/BEHAVIOR Military-Leader Responsibility requires

  17. Navy Operational Planner: Anti-Submarine Warfare with Time-Dependent Performance

    DTIC Science & Technology

    2017-09-01

    PLANNER: ANTI-SUBMARINE WARFARE WITH TIME -DEPENDENT PERFORMANCE by Anthony M. Baldessari September 2017 Thesis Advisor: W. Matthew...reporting burden for this collection of information is estimated to average 1 hour per response, including the time for reviewing instruction, searching...REPORT TYPE AND DATES COVERED Master’s thesis 4. TITLE AND SUBTITLE NAVY OPERATIONAL PLANNER: ANTI-SUBMARINE WARFARE WITH TIME -DEPENDENT

  18. "No practical capabilities": American biological and chemical warfare programs during the Korean war.

    PubMed

    Crane, Conrad C

    2002-01-01

    Much controversy still surrounds accusations that American forces in the Far East during the Korean War used biological warfare against North Korea and China. An analysis of recently declassified documents reveals that, although the United States attempted to accelerate its development and acquisition of such weapons during that period, its efforts to create a viable biological warfare capability were unsuccessful. Plans to similarly expand chemical warfare stocks and capabilities were also frustrated. Technological difficulties, personnel shortages, bureaucratic battles between the armed services, and policy limitations combined to hold back advances in American chemical and biological warfare. In light of the recent fears of terrorist attacks with such weapons, this analysis highlights the great difficulties involved in developing, acquiring, and delivering such capabilities.

  19. CFD Analysis of a Maneuvering F/A-18E Super Hornet

    DTIC Science & Technology

    2016-10-12

    UNCLASSIFIED UNCLASSIFIED NAVAL AIR WARFARE CENTER AIRCRAFT DIVISION PATUXENT RIVER, MARYLAND TECHNICAL INFORMATION MEMORANDUM...THE ABOVE ADDRESS. 1. REPORT DATE 12 October 2016 2. REPORT TYPE Technical Information Memorandum 3. DATES COVERED 2016 4. TITLE...dynamic unsteady effects of rapid motions of both the vehicle and its associated control surfaces is a known technical challenge. When aircraft

  20. Coalition FORCEnet Implementation Analysis

    DTIC Science & Technology

    2006-09-01

    C2 grid, and Engagement grid. As a result, enabled Network- Centric warfare for Coalition Forces shows a significant increase in capabilities. Joint...209 14. SUBJECT TERMS FORCEnet, Coalition Forces, AUSCANNZUKUS, Network- Centric Warfare (NCW), Data Mining, EXTEND Modeling, Expeditionary...NETWORK- CENTRIC WARFARE AND FORCENET .....................................................................................................1 B

  1. A Model of Low Grazing Angle Sea Clutter for Coherent Radar Performance Analysis

    DTIC Science & Technology

    2013-06-01

    Navy Communications & Information Warfare Doc. Data Sheet Director General Navy Certification and Safety Doc. Data Sheet Director General Submarine...Abstracts, US 1 Documents Librarian , The Center for Research Libraries, US 1 International Technology and Science Center (ITSC) Library 1 Spare Copies 4

  2. Active Cyber Defense: Enhancing National Cyber Defense

    DTIC Science & Technology

    2011-12-01

    Prevention System ISP Internet Service Provider IT Information Technology IWM Information Warfare Monitor LOAC Law of Armed Conflict NATO...the Information Warfare Monitor ( IWM ) discovered that GhostNet had infected 1,295 computers in 103 countries. As many as thirty percent of these...By monitoring the computers in Dharamsala and at various Tibetan missions, IWM was able to determine the IP addresses of the servers hosting Gh0st

  3. Chemical Warfare: Many Unanswered Questions.

    DTIC Science & Technology

    1983-04-29

    of Defense DSB Defense Science Board GAO U.S. General Accounting Office IDA Institute for Defense Analyses JCS Joint Chiefs of Staff SIPRI Stockholm...Defense Science Board in 1980, DOD specifically asked it to review intelligence data on chemical warfare, and DSB’s 1981 report accordingly presents its...Defense Science Board report suggests, however, that its com- - ments are based on a composite of intelligence information on Soviet chemical warfare

  4. US Army Special Warfare. Its Origins: Psychological and Unconventional Warfare, 1941-1952

    DTIC Science & Technology

    1982-01-01

    remained a fundamental military organization. Simultaneously, however, a few thinkers began to consider the possibility of forces capable of operating at...guerrilla warfare. He had been impressed as well by the British system of intelligence and counter- intelligence, as conducted by their Secret Intelligence...highly respected Columbia Broadcasting System reporter like Elmer Davis as its first director. Although most existing information services were trans

  5. Operational advantages of using Cyber Electronic Warfare (CEW) in the battlefield

    NASA Astrophysics Data System (ADS)

    Yasar, Nurgul; Yasar, Fatih M.; Topcu, Yucel

    2012-06-01

    While cyberspace is emerging as a new battlefield, conventional Electronic Warfare (EW) methods and applications are likely to change. Cyber Electronic Warfare (CEW) concept which merges cyberspace capabilities with traditional EW methods, is a new and enhanced form of the electronic attack. In this study, cyberspace domain of the battlefield is emphazised and the feasibility of integrating Cyber Warfare (CW) concept into EW measures is researched. The SWOT (Strengths, Weaknesses, Opportunities and Threats) analysis method is used to state the operational advantages of using CEW concept in the battlefield. The operational advantages of CEW are assessed by means of its effects on adversary air defense systems, communication networks and information systems. Outstanding technological and operational difficulties are pointed out as well. As a result, a comparison of CEW concept and conventional EW applications is presented. It is concluded that, utilization of CEW concept is feasible at the battlefield and it may yield important operational advantages. Even though the computers of developed military systems are less complex than normal computers, they are not subjected to cyber threats since they are closed systems. This concept intends to show that these closed systems are also open to the cyber threats. As a result of the SWOT analysis, CEW concept provides Air Forces to be used in cyber operations effectively. On the other hand, since its Collateral Damage Criteria (CDC) is low, the usage of cyber electronic attack systems seems to grow up.

  6. Information Operations and Warfare: Fundamental Challenges for the 21st Century

    DTIC Science & Technology

    1997-05-01

    Perritt, Jr., Access To The National Information Infrastructure, 30 WAKE FOREST L. REV. 51 (1995); John I. Alger, Declaring Information War, JANE’S...Sought For Info Warfare, COMPUTERWORLD, Jun. 5, 1995, at 55 [hereinafter New Laws]; John Arquilla & David Ronfeldt, Cyberwat is Coming!, COMPARATIVE...at 82. See also John T. Correll, Signs of a Revolution, AIR FORCE MAG., Aug. 1995, at 2 ("Over the years, there have been periodic innovations

  7. In Pursuit of an Aptitude Test for Potential Cyberspace Warriors

    DTIC Science & Technology

    2007-03-01

    may well be training their soldiers in the art of cyber warfare to attack our infrastructure and defend their own. It seems like a no-brainer that...communications. Certainly this is an area that could be exploited in cyber warfare . Another subject with little reference was regarding linguistic...Journal, 40(3), 769-780. Parks, R. C., & duggan, D. P. (2001). Principles of cyber - warfare . Proceeding of the 2001 IEEE Workshop on Information

  8. LESSONS FROM THE FRONT: A CASE STUDY OF RUSSIAN CYBER WARFARE

    DTIC Science & Technology

    2015-12-01

    Lessons From The Front: A Case Study Of Russian Cyber Warfare looks to capitalize on the lessons learned from the alleged Russian cyber-offensive on...through the careful analysis and comparison of two disparate conflicts related by their collision with Russian cyber - warfare . Following case study

  9. J. F. C. Fuller: His Methods, Insights, and Vision

    DTIC Science & Technology

    1999-04-01

    contributed immensely to the body of knowledge concerning warfare. As a military scientist, MG Fuller attempted to do for warfare what Copernicus did for... astronomy , Newton for physics, and Darwin for natural history: establish a higher order for the study warfare based on scientific analysis and methods

  10. Countering Gray-Zone Hybrid Threats: An Analysis of Russias New Generation Warfare and Implications for the US Army

    DTIC Science & Technology

    2016-10-18

    education ...Publication (JP) 1, Doctrine for the Armed Forces of the United States, there are two forms of warfare, traditional and irregular, and...combat mission in 2010. Looking at OIF, the US Army participated in both traditional and irregular warfare and the characterization of

  11. A FORCEnet Framework for Analysis of Existing Naval C4I Architectures

    DTIC Science & Technology

    2003-06-01

    best qualities of humans and computers. f. Information Weapons Information weapons integrate the use of military deception, psychological ...operations, to include electronic warfare, psychological operations, computer network attack, computer network defense, operations security, and military...F/A-18 ( ATARS /SHARP), S-3B (SSU), SH-60 LAMPS (HAWKLINK) and P-3C (AIP, Special Projects). CDL-N consists of two antennas (one meter diameter

  12. Coercive Air Strategy in Post-Cold War Peace Operations

    DTIC Science & Technology

    1999-06-01

    Fariborz L. Mokhtari , ed., Peacemaking, Peacekeeping and Coalition Warfare: The Future Role of the United Nations (Washington, D.C: National Defense...Technical Information Center, 1993. Mokhtari , Fariborz L. ed. “Peacemaking, Peacekeeping and Coalition Warfare: The Future Role of the United Nations

  13. Chemical warfare agents

    PubMed Central

    Ganesan, K.; Raza, S. K.; Vijayaraghavan, R.

    2010-01-01

    Among the Weapons of Mass Destruction, chemical warfare (CW) is probably one of the most brutal created by mankind in comparison with biological and nuclear warfare. Chemical weapons are inexpensive and are relatively easy to produce, even by small terrorist groups, to create mass casualties with small quantities. The characteristics of various CW agents, general information relevant to current physical as well as medical protection methods, detection equipment available and decontamination techniques are discussed in this review article. A brief note on Chemical Weapons Convention is also provided. PMID:21829312

  14. Defining Islamic Way of Warfare and Its Comparison with Al Qaeda Doctrine

    DTIC Science & Technology

    2012-06-08

    DEFINING ISLAMIC WAY OF WARFARE AND ITS COMPARISON WITH AL QAEDA DOCTRINE A thesis presented to the Faculty of the U.S. Army...subject to any penalty for failing to comply with a collection of information if it does not display a currently valid OMB control number. PLEASE DO...Islamic way of warfare. It is important to understand that anything, to be qualified as Islamic, has to have a reference from the core sources of Islam

  15. Russian and Chinese Information Warfare: Theory and Practice

    DTIC Science & Technology

    2004-06-01

    Integral neurolinguistic programming •Placing essential programs into the conscious or sub- conscious mind •Subconscious suggestions that modify human...Generators of special rays •Optical systems • Neurolinguistic programming •Computer psychotechnology •The mass media •Audiovisual effects •Special effects...Information Warfare: Theory and Practice 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER 6. AUTHOR(S) 5d. PROJECT NUMBER 5e

  16. Information Warfare: Legal, Regulatory, Policy and Organizational Considerations for Assurance. Second Edition.

    DTIC Science & Technology

    1996-07-04

    of Information Warfare and Strategy graduated 32 students from its 10-month senior level (war college ) program on 12 June 1996. The event marked the...1989 prosecution of Robert Tappan Morris, a Cornell University graduate student who, on November 2, 1988, released a computer worm across the...2-25 2-2-1 Constitutional Amendments with Privacy Implications .................................... 2-28 2-2-2 Privacy and Access to Government

  17. The Impacts of Modern Warfare on Freshwater Ecosystems

    NASA Astrophysics Data System (ADS)

    Francis, Robert A.

    2011-11-01

    There is increasing recognition and concern regarding the impacts of modern industrial warfare on the environment. Freshwater ecosystems are perhaps the most vulnerable to warfare-related impacts, which is of concern given that they provide so many essential environmental resources and services to society. Despite this, there has been little work to establish and quantify the types of impacts (both negative and positive) that warfare may have on such systems. This paper firstly highlights why rivers and lakes may be susceptible to warfare-related impacts, before synthesizing the available literature to explore the following main themes: intensification of wartime resource acquisition, use of water as an offensive or defensive weapon, direct and indirect effects of explosive ordnance, increased pollution, introduction of invasive alien species, and positive ecological impacts. This is then followed by a discussion of the implications of such impacts in relation to future warfare, including a consideration of the efficacy of existing legal instruments to protect the environment during conflict, and the trend for war to become more localized and `informal', and therefore less regulated. Finally, the paper identifies key research foci for understanding and mitigating the effects of warfare on freshwater ecosystems.

  18. Item Unique Identification Capability Expansion: Established Process Analysis, Cost Benefit Analysis, and Optimal Marking Procedures

    DTIC Science & Technology

    2014-12-01

    chemical etching EDM electrical discharge machine EID enterprise identifier EOSS Engineering Operational Sequencing System F Fahrenheit...Center in Corona , California, released a DoN IUID Marking Guide, which made recommendations on how to mark legacy items. It provides technical...uploaded into the IUID registry managed by the Naval Surface Warfare Center (NSWC) in Corona , California. There is no set amount of information

  19. Chemical warfare, past and future. Study project

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Tzihor, A.

    1992-05-15

    World War I was arena for the first use of chemical warfare. The enormous tactical success brought about by this first time use of chemical weapons caused the continued development of more sophisticated tactics and weapons in this category of unconventional warfare. This phenomenon has carried through to today. However, at present, because of technological developments, the global economic situation, and political factors, coupled with the inability of the western world to control the proliferation of chemical weapons, a situation weapon of mass destruction. Recent use by Iraq against Kurdish civilian indicates that chemical warfare is no longer limited tomore » the battlefield. The western nations have a need to understand the risk. This paper conducts an analysis of past lessons and the factors which will affect the use of chemical warfare in the future. From this analysis, the paper reaches conclusions concerning the significant threat chemical weapons pose for the entire world in the not too distant future.« less

  20. Information Warfare and International Law

    DTIC Science & Technology

    1998-01-01

    OMB control number. 1. REPORT DATE 1998 2. REPORT TYPE 3. DATES COVERED 00-00-1998 to 00-00-1998 4. TITLE AND SUBTITLE Information Warfare and...international law where those dictates endanger or conflict with the pursuit of their fundamental interests , including national security. The Legal...34war," and may not be covered by the humanitarian provisions that attempt to lessen war’s cruelty.28 FIGURE 3 The Purpose of This Book The

  1. Anxiety, depression, and posttraumatic stress in Iranian survivors of chemical warfare.

    PubMed

    Hashemian, Farnoosh; Khoshnood, Kaveh; Desai, Mayur M; Falahati, Farahnaz; Kasl, Stanislav; Southwick, Steven

    2006-08-02

    In the 1980-1988 Iran-Iraq War, extensive use of chemical weapons resulted in high rates of morbidity and mortality. While much is known about the physical consequences of chemical warfare, there is a paucity of information about the long-term effects of chemical attacks on mental health. To assess the long-term psychological impact of chemical warfare on a civilian population. Cross-sectional randomized survey conducted in July 2004 of 153 civilians in 3 towns exposed to warfare in northwestern Iran: Oshnaviyeh (low-intensity conventional warfare), Rabat (high-intensity conventional warfare), and Sardasht (both high-intensity conventional warfare and chemical weapons). Full or partial posttraumatic stress disorder (PTSD) diagnosis, anxiety symptoms, and depressive symptoms were assessed using Farsi versions of the Clinician-Administered PTSD Scale, Hamilton Scale for Anxiety, and Beck Depression Inventory, respectively. Overall participation rate was 93%. Respondents had a mean age of 45 years and were all of Kurdish ethnicity. Among individuals exposed to both high-intensity warfare and chemical weapons, prevalence rates for lifetime PTSD, current PTSD, major anxiety symptoms, and severe depressive symptoms were 59%, 33%, 65%, and 41%, respectively. Among the low-intensity warfare group, the corresponding rates were 8%, 2%, 18%, and 6%, respectively, while intermediate rates were found among those exposed to high-intensity warfare but not to chemical weapons (31%, 8%, 26%, and 12%, respectively). Compared with individuals exposed to low-intensity warfare, those exposed to both high-intensity warfare and chemical weapons were at higher risk for lifetime PTSD (odds ratio [OR], 18.6; 95% confidence interval [CI], 5.8-59.4), current PTSD (OR, 27.4; 95% CI, 3.4-218.2), increased anxiety symptoms (OR, 14.6; 95% CI, 6.0-35.6), and increased depressive symptoms (OR, 7.2; 95% CI, 3.3-15.9). Exposure to high-intensity warfare but not to chemical weapons was also significantly associated with lifetime PTSD (OR, 5.4; 95% CI, 1.7-17.6), compared with those in the low-intensity warfare group. Further, compared with individuals exposed to high-intensity warfare alone, those exposed to both high-intensity warfare and chemical weapons were at higher risk for lifetime PTSD (OR, 3.4; 95% CI, 1.5-7.4), current PTSD (OR, 6.2; 95% CI, 2.0-20.1), increased anxiety symptoms (OR, 5.6; 95% CI, 2.5-12.6), and increased depressive symptoms (OR, 3.7; 95% CI, 1.8-7.2). Exposure to chemical warfare is an extreme traumatic event that has long-lasting adverse consequences on mental health.

  2. Performance Analysis of the Probabilistic Multi-Hypothesis Tracking Algorithm on the SEABAR Data Sets

    DTIC Science & Technology

    2009-07-01

    Performance Analysis of the Probabilistic Multi- Hypothesis Tracking Algorithm On the SEABAR Data Sets Dr. Christian G . Hempel Naval...Hypothesis Tracking,” NUWC-NPT Technical Report 10,428, Naval Undersea Warfare Center Division, Newport, RI, 15 February 1995. [2] G . McLachlan, T...the 9th International Conference on Information Fusion, Florence Italy, July, 2006. [8] C. Hempel, “Track Initialization for Multi-Static Active Sonay

  3. 75 FR 58373 - Notice of Intent To Grant Exclusive Patent License; DQE, Inc.

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-09-24

    ... objections are to be filed with Naval Surface Warfare Center, Crane Division, Code OOL, Bldg 2, 300 Highway 361, Crane, IN 47522-5001. FOR FURTHER INFORMATION CONTACT: Mr. Christopher Monsey, Naval Surface Warfare Center, Crane Division, Code OOL, Bldg 2, 300 Highway 361, Crane, IN 47522-5001, telephone 812-854...

  4. 77 FR 14508 - Notice of Availability of Government-Owned Inventions; Available for Licensing

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-03-12

    ... launching device). ADDRESSES: Written objections are to be filed with Naval Surface Warfare Center, Crane Div, Code OOL, Bldg 2, 300 Highway 361, Crane, IN 47522-5001. FOR FURTHER INFORMATION CONTACT: Mr. Christopher Monsey, Naval Surface Warfare Center, Crane Div, Code OOL, Bldg 2, 300 Highway 361, Crane, IN...

  5. 77 FR 5242 - Notice of Availability of Government-Owned Invention; Available for Licensing

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-02-02

    ... weapon mount). ADDRESSES: Written objections are to be filed with Naval Surface Warfare Center, Crane Div, Code OOL, Bldg 2, 300 Highway 361, Crane, IN 47522-5001. FOR FURTHER INFORMATION CONTACT: Mr. Christopher Monsey, Naval Surface Warfare Center, Crane Div, Code OOL, Bldg 2, 300 Highway 361, Crane, IN...

  6. Integrating Space Systems Operations at the Marine Expeditionary Force Level

    DTIC Science & Technology

    2015-06-01

    Electromagnetic Interference ENVI Environment for Visualizing Images EW Electronic Warfare xvi FA40 Space Operations Officer FEC Fires and Effects...Information Facility SFE Space Force Enhancement SIGINT Signals Intelligence SSA Space Situational Awareness SSE Space Support Element STK Systems...April 23, 2015. 65 • GPS Interference and Navigation Tool (GIANT) for providing GPS accuracy prediction reports • Systems Toolkit ( STK ) Analysis

  7. The DTIC Review: Volume 2, Number 4, Surviving Chemical and Biological Warfare

    DTIC Science & Technology

    1996-12-01

    CHROMATOGRAPHIC ANALYSIS, NUCLEAR MAGNETIC RESONANCE, INFRARED SPECTROSCOPY , ARMY RESEARCH, DEGRADATION, VERIFICATION, MASS SPECTROSCOPY , LIQUID... mycotoxins . Such materials are not attractive as weapons of mass destruction however, as large amounts are required to produce lethal effects. In...VERIFICATION, ATOMIC ABSORPTION SPECTROSCOPY , ATOMIC ABSORPTION. AL The DTIC Review Defense Technical Information Center AD-A285 242 AD-A283 754 EDGEWOOO

  8. An Ecological Examination of Rural Mozambican Women's Attainment of Postwar Wellbeing

    ERIC Educational Resources Information Center

    Deacon, Zermarie; Sullivan, Cris

    2010-01-01

    Women's experiences of warfare and postwar recovery are qualitatively different from those of men. However, to date, the processes whereby women recover from the gendered impacts of war have not been sufficiently explored. In order to address this gap in the literature and to inform policies and services aimed at women recovering from warfare, a…

  9. 78 FR 55687 - Notice of Intent To Grant Partially Exclusive Patent License; Silvanus, LLC

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-09-11

    ... with Naval Surface Warfare Center, Crane Div, Code OOL, Bldg 2, 300 Highway 361, Crane, IN 47522-5001. FOR FURTHER INFORMATION CONTACT: Mr. Christopher Monsey, Naval Surface Warfare Center, Crane Div, Code OOL, Bldg 2, 300 Highway 361, Crane, IN 47522-5001, telephone 812-854-4100. Authority: 35 U.S.C. 207...

  10. 76 FR 23314 - Notice of Intent To Grant Partially Exclusive Patent License; Sean Linehan

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-04-26

    ... are to be filed with Naval Surface Warfare Center, Crane Division, Code OOL, Bldg 2, 300 Highway 361, Crane, IN 47522-5001. FOR FURTHER INFORMATION CONTACT: Mr. Christopher Monsey, Naval Surface Warfare Center, Crane Division, Code OOL, Bldg 2, 300 Highway 361, Crane, IN 47522-5001, telephone 812-854-4100...

  11. 77 FR 5242 - Notice of Intent To Grant Exclusive Patent License; Daniel Defense, Inc.

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-02-02

    ... Naval Surface Warfare Center, Crane Div, Code OOL, Bldg 2, 300 Highway 361, Crane, IN 47522-5001. FOR FURTHER INFORMATION CONTACT: Mr. Christopher Monsey, Naval Surface Warfare Center, Crane Div, Code OOL, Bldg 2, 300 Highway 361, Crane, IN 47522-5001, telephone (812) 854-4100. Authority: 35 U.S.C. 207, 37...

  12. 77 FR 23673 - Notice of Intent To Grant Exclusive Patent License; Aurora Technologies, LLC

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-04-20

    ... objections are to be filed with the Naval Surface Warfare Center, Crane Div, Code OOL, Bldg. 2, 300 Highway 361, Crane, IN 47522-5001. FOR FURTHER INFORMATION CONTACT: Mr. Christopher Monsey, Naval Surface Warfare Center, Crane Div, Code OOL, Bldg 2, 300 Highway 361, Crane, IN 47522-5001, telephone 812-854-4100...

  13. Transitioning mine warfare to network-centric sensor analysis: future PMA technologies & capabilities

    NASA Astrophysics Data System (ADS)

    Stack, J. R.; Guthrie, R. S.; Cramer, M. A.

    2009-05-01

    The purpose of this paper is to outline the requisite technologies and enabling capabilities for network-centric sensor data analysis within the mine warfare community. The focus includes both automated processing and the traditional humancentric post-mission analysis (PMA) of tactical and environmental sensor data. This is motivated by first examining the high-level network-centric guidance and noting the breakdown in the process of distilling actionable requirements from this guidance. Examples are provided that illustrate the intuitive and substantial capability improvement resulting from processing sensor data jointly in a network-centric fashion. Several candidate technologies are introduced including the ability to fully process multi-sensor data given only partial overlap in sensor coverage and the ability to incorporate target identification information in stride. Finally the critical enabling capabilities are outlined including open architecture, open business, and a concept of operations. This ability to process multi-sensor data in a network-centric fashion is a core enabler of the Navy's vision and will become a necessity with the increasing number of manned and unmanned sensor systems and the requirement for their simultaneous use.

  14. Atmospheric Data Requirements for Battlefield Obscuration Applications.

    DTIC Science & Technology

    1980-06-01

    34 ECOM-5572, August 1975. 9. Miers, B., G. Blackman, D. Langer, and N. Lorimier, " Analysis of SMS/GOES Film Data," ECOM-5573, September 1975. 10...ATEC-PL-M Combined Arms Combat Developments Activity; ATZLCA-RS Concepts Analysis Agency; CSCA-SMC Dugway Proving Ground; STEDP-PP Electronic Warfare...CS-SA Materiel Systems Analysis Activity, Ground Warfare Division; DRXSY-GS Missile Research and Development Command, Research Directorate; DRDMI-TRA

  15. Research in Computer Forensics

    DTIC Science & Technology

    2002-06-01

    systems and how they can aid in the recovery of digital evidence in a forensic analysis. Exposures to hacking techniques and tools in CS3675—Internet...cryptography, access control, authentication, biometrics, actions to be taken during an attack and case studies of hacking and information warfare. 11...chat, surfing, instant messaging and hacking with powerful access control and filter capabilities. The monitor can operates in a Prevention mode to

  16. Identity, Attribution, and the Challenge of Targeting in the Cyberdomain

    DTIC Science & Technology

    2018-03-07

    icts, hybrid warfare, Islamic State, terrorism, biometrics, net- work analysis, big data, activity-based intelligence, high -value individuals One of...environment, combatant identity and pattern of life information became crucial elements of high -value targeting and the process of removing...alytical methods deeply infl uenced by social network theory and targeting pro- cesses specifi cally designed for engaging high -value individuals and

  17. The Venus "Shell-over-Star" hieroglyph and Maya warfare: An examination of the interpretation of a Mayan symbol

    NASA Astrophysics Data System (ADS)

    Voit, Claudia Ann

    For decades, Maya scholars have associated the Mayan "Shell-Star" (also referred to as "Star-War") hieroglyph with Maya warfare. Put forward by scholars such as Floyd Lounsbury and David Kelley, and later advanced by Linda Schele, David Freidel, Ian Graham, Peter Matthews, Anthony Aveni and others, there are now dozens of published articles and chapters relating the hieroglyph to Venus and warfare. Venus is one of the most notable celestial objects outside of the Sun and Moon and was highly visible to the inhabitants of the Maya world. The Dresden Codex (an astronomical almanac) contains important information about the planet Venus, and the calendar section was deciphered by the librarian and mathematician, Ernst Förstemann in the late 1800s. In his decipherment, he deduced that the numbers contained in the tables must be connected to the orbital period of the planet. There is no other planet with the same orbital period 3 as Venus. Förstemann suggested that the decoded astronomy tables were used by the Maya to determine when to wage war. This interpretation, along with others, like Floyd Lounsbury`s study of Venus and the Long Count date at Bonampak were the seeds that have led to methodological errors that first began to take root in Maya research. The idea of the Venus association with warfare took hold and continues to propagate. Many scholars continue to assert that the "shell-star" glyph is related to warfare events. Others, like Gerardo Aldana, and Stanley Guenter, have recently come forward to reexamine and question the hieroglyph and its relationship, if any, to Maya warfare. I suggest, further, that methodological errors may have occurred along the way. I propose that these errors include data lost in translation, and inaccurate translations. In addition, the statistical analysis of Venus cycles has weak points. If this identification of the errors is correct, we need to re-evaluate the weakened foundation on which we are building our assertions about the role of Venus in Maya warfare. In this work, I examine the initial and subsequent interpretations of the Mayan "shell-star" hieroglyph, a symbol that has begun to generate an increasing amount of discussion among Mayan scholars over the last several years. In addition, I discuss new arguments (like that of Gerardo Aldana) regarding the role of Venus in Maya warfare. Finally, I would like to provide some suggestions for future research regarding this subject.

  18. Just War and Postmodern Warfare: A German Case Study

    DTIC Science & Technology

    2015-04-01

    warfare construct, Germany is shaping a military concept based on recent conflicts and unfettered by biases of conventional strategies, organizations...remain sovereign while subconsciously evolving toward liberal democratic ideas. In respecting each country’s political sensitivities, Germany’s...before exhausting all diplomatic, economic and information instruments. Whereas the term AU/ACSC/PINSON/AY15 13 “interests” may bias the United

  19. 78 FR 55687 - Notice of Availability of Government-Owned Invention; Available for Licensing

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-09-11

    ... Warfare Center, Crane Div, Code OOL, Bldg 2, 300 Highway 361, Crane, IN 47522-5001. FOR FURTHER INFORMATION CONTACT: Mr. Christopher Monsey, Naval Surface Warfare Center, Crane Div, Code OOL, Bldg 2, 300 Highway 361, Crane, IN 47522-5001, telephone 812-854-4100. (Authority: 35 U.S.C. 207, 37 CFR Part 404) N.A...

  20. FOA Information from the Research Institute of Swedish National Defence on Electronic Warfare (FOA Orientar om Electronic Warfare),

    DTIC Science & Technology

    1967-01-01

    probablity ot penetring to target in the preaence of atr do- fance . Curve P, =probebility of destro),ing target in the presence of air defence. Weapon...so rendering the lions. At high frequencies ( gen - quency range and sector of ter- traffic less sensitive to jamming. erally those tsed on radio links

  1. Network Centric Warfare in the U.S. Navy’s Fifth Fleet. Network-Supported Operational Level Command and Control in Operation Enduring Freedom

    DTIC Science & Technology

    2004-06-01

    Mark Adkins Director of Research Ph.D Human Communication adkins@arizona.edu Dr. John Kruse Director of Programming Ph.D Management Information Systems...Theory • Network Centric Warfare • Technology Adoption – Technology Adoption Model – Technology Transition Model • Human Communication – Social Context

  2. Containing Revolutionary Islam: Reassessing the Problem and the Approach

    DTIC Science & Technology

    2017-03-01

    2011), xx. 83 Russ Rodgers, Fundamentals of Islamic Asymmetric Warfare: A Documentary Analysis of the Principles of Muhammad (Lewiston, NY: Edwin...have not yet effectively coalesced or managed to spark the greater revolution they seek. They remain fragmented, choosing divergent activities in...Libertarian Rebuttal. Auburn, AL: Ludwig von Mises Institute, 2015. Rodgers, Russ. Fundamentals of Islamic Asymmetric Warfare: A Documentary Analysis

  3. Information Management in the Department of Defense: The Role of Librarians. Proceedings of the Military Librarians Workshop (24th) 15-17 October 1980, held at Monterey, California

    DTIC Science & Technology

    1983-07-01

    space desperately. We have a new building program in the mill which may be many years in coming. Our original library design was for a much larger...pace with and efficiently controlling the dissemination of that information. I would like to say just a word about our School. The vast ma- Jority of...raphy, air ocean science, systems technoloqy orograms In antisubmarine warfare, electronic warfare, and command, control and communications. "-4

  4. A hybrid method for protection against threats to a network infrastructure for an electronic warfare management system

    NASA Astrophysics Data System (ADS)

    Byłak, Michał; RóŻański, Grzegorz

    2017-04-01

    The article presents the concept of ensuring the security of network information infrastructure for the management of Electronic Warfare (EW) systems. The concept takes into account the reactive and proactive tools against threats. An overview of the methods used to support the safety of IT networks and information sources about threats is presented. Integration of mechanisms that allow for effective intrusion detection and rapid response to threats in a network has been proposed. The architecture of the research environment is also presented.

  5. North Korean Protective Mine Warfare: An Analysis of the Naval Minefields at Wonsan, Chinnampo and Hungnam during the Korean War

    DTIC Science & Technology

    2010-04-01

    the United States Navy and the general military history community as well. As a result, studies involving mine warfare have been neglected. In...that particular campaign. The Navy, lulled into a sense of complacency, has neglected mine warfare studies . Naval Intelligence has made little attempt...Farragut famously ignored the mineline there to destroy the Confederate fleet nearby. While extensive mining also occurred during World War One , the United

  6. Maneuver Warfare revisited: a plea for balance

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Hamilton, M,R.

    1986-04-01

    This paper is a plea for balance in the current pursuit of understanding of the concept and the teaching of Maneuver Warfare. It specifically addresses the need for a more-complete analysis of some of the more-common historical examples commonly offered as examples of the supremecy of Maneuver Warfare. The paper in no way disagrees with the desirability of conducting the kinds of operations associated with the ill-defined concepts offered by advocates of Maneuver Warfare but suggests that the desirable results of historical battles may be too readily ascribed to the dynamic, offensive actions of the victorious side. Secondly, the papermore » points out the lack of utility and applicability of some common buzzwords being used in today's Army. Specifically assailed is the concept of turning within a decision cycle. The paper describes the reasons that this commonly used phrase has little applicability to ground warfare. Finally, the paper mentions the tendency for the Maneuver Warfare camp to cloud discussion of doctrine in a kind of intellectualism and elitism that has no use in forming the necessary consensus demanded by doctrine.« less

  7. Intelligence and Electronic Warfare (IEW) Streamlining Project. Volume 1. Sustainment Analysis Report. Revision

    DTIC Science & Technology

    1992-10-30

    I Sustainment Analysis Report Accesion For NTIS CRA&I DTIC 1 AP- U. an-;o u,ced [] jj ~~~Y INSPECTED 5 Js~~~o By.......... ............ Dit Ib ’tiot...ELECTRONIC WARFARE (1EW) STREAMUNING PROJECT Vohune I Sustainment Analysis Report Revised October 30, 1992 93-29047 The views, opinions, and findings...Streamlining Project, C OPM-91-2964 Volume I, Sustainment Analysis Report PR 02TO2K 6. AUTHORIS) David P. Nicholas, Robert E. Klebo. Wolodymyr J. Mokey

  8. Multistage Deployment of the Army Theater Hospital

    DTIC Science & Technology

    2013-12-01

    analysis on the effects warfare tactics, casualty timing, and casualty types had on the medical treatment facility (Cecchine et al., 2001). This proved...the 44-bed mobile portion of the current CSH was potentially inadequate to support approximately four brigades in an asymmetrical warfare scenario...systems and its increased force effectiveness on the fleet. He utilized quantitative analysis with Lanchester and Hughes-Salvo models to show that

  9. A Historical Study of Operational Command: A Resource for Researchers

    DTIC Science & Technology

    2005-03-01

    PJHQ) in the United Kingdom. Control, the impact of command arrangements on the proper functioning of operational level headquarters is shown...might interact in a joint environment, identifying the different types of communication and social networks that exist, determining the influence of...introduction of information technology and its tools has spawned ideas such as Network Centric Warfare (NCW) or Network Enabled Warfare (NEW), there is

  10. A Historical Study of Operational: A Resource for Researches

    DTIC Science & Technology

    2005-03-01

    PJHQ) in the United Kingdom. Control, the impact of command arrangements on the proper functioning of operational level headquarters is shown...might interact in a joint environment, identifying the different types of communication and social networks that exist, determining the influence of...introduction of information technology and its tools has spawned ideas such as Network Centric Warfare (NCW) or Network Enabled Warfare (NEW), there is

  11. Unconventional Cyber Warfare: Cyber Opportunities in Unconventional Warfare

    DTIC Science & Technology

    2014-06-01

    thanks to Tunisia’s modern communications infrastructure , pervasive Internet, and mobile phone network.”151 Although the use of information and...and physical space. Tunisia had a well-developed mobile phone and Internet infrastructure with nearly nine out of 10 Tunisians owning a mobile phone...OF TABLES Table 1. Top 20 countries of mobile phones per 100 people .........................................60 Table 2. Top 20 countries by number

  12. Russian Strategic Communications and Implications for NATO

    DTIC Science & Technology

    2017-04-06

    officially opened its doors on 20 August 2015 in the Latvian capital of Riga. Today, the center conducts analysis and study of Russian information and...Walden: Military Studies Press. 2011. 23 Dr. Steve Tatham and LTC Rita Le Page. NATO Strategic Communication: More to be Done? Case Study . Riga...Fokin, Alexander. Internet Trolling as a Tool of Hybrid Warfare: The Case of Latvia. Case Study , Riga: NATO Strategic Communication Center of

  13. Developing a Whole-of-Government Approach to Complex Problems

    DTIC Science & Technology

    2007-04-01

    increase of globalism. Nye, Joseph S. Power in the Global Information Age. Routledge. New York. 2004. P. 191. 8 Layton , Peter. Redefining...Project. Available online at: http://www.gwu.edu/~nsarchiv/NSAEBB/NSAEBB198/index.htm accessed 14 October 2006. 61 Eric Schmitt and Joel Brinkley, New...www.cap-lmu.de/download/CAP-Policy-Analysis-2006-01.pdf (accessed 14 Oct 06). Layton , Peter. Redefining Warfare. Royal United Services Institute

  14. Research of ad hoc network based on SINCGARS network

    NASA Astrophysics Data System (ADS)

    Nie, Hao; Cai, Xiaoxia; Chen, Hong; Chen, Jian; Weng, Pengfei

    2016-03-01

    In today's world, science and technology make a spurt of progress, so society has entered the era of information technology, network. Only the comprehensive use of electronic warfare and network warfare means can we maximize their access to information and maintain the information superiority. Combined with the specific combat mission and operational requirements, the research design and construction in accordance with the actual military which are Suitable for the future of information technology needs of the tactical Adhoc network, tactical internet, will greatly improve the operational efficiency of the command of the army. Through the study of the network of the U.S. military SINCGARS network, it can explore the routing protocol and mobile model, to provide a reference for the research of our army network.

  15. Strategic Analysis of Irregular Warfare

    DTIC Science & Technology

    2010-03-01

    the same mathematical equations used by Lanchester .10 Irregular Warfare Theory and Doctrine It is time to develop new analytical methods and models...basis on which to build, similar to what Lanchester provided almost 100 years ago. Figure 9 portrays both Lanchester’s approach and an irregular 17

  16. U.S. Army Chemical Corps Historical Studies, Gas Warfare in World War I: The 5th Division Captures Frapelle, August 1918

    DTIC Science & Technology

    1958-03-01

    U. S . ARMY CHEMICAL CORPS HISTORICAL STUDIES GAS WARFARE IN WORLD WAR I THE 5t1h DIVISION CAPTURES FRAPELLF, 00 August 1918 CTD Offce t e Chef Ch mal...j JNSPECrrr / D~iJ f ; t t] GA o WARFARE IN WORLD WAR I By - --------- St ixdy Number 7 t:a . • ’ I : : . .. s U.S. ARMY CHEIICAL CORPS [ist...Analysi s Concerning the Weight of Shell . . . . . . . ... . 38 The Cost of Frapelle . . . . . . . . . . . .. 41 Medical Department Comments

  17. Natural Language Processing Of Online Propaganda As A Means Of Passively Monitoring An Adversarial Ideology

    DTIC Science & Technology

    2017-03-01

    Warfare. 14. SUBJECT TERMS data mining, natural language processing, machine learning, algorithm design , information warfare, propaganda 15. NUMBER OF...Speech Tags. Adapted from [12]. CC Coordinating conjunction PRP$ Possessive pronoun CD Cardinal number RB Adverb DT Determiner RBR Adverb, comparative ... comparative UH Interjection JJS Adjective, superlative VB Verb, base form LS List item marker VBD Verb, past tense MD Modal VBG Verb, gerund or

  18. The Rise of iWar: Identity, Information, and the Individualization of Modern Warfare

    DTIC Science & Technology

    2015-10-01

    INDMDUALIZATION OF MODERN WARFARE Glenn J. Voelz U.S. ARMY WAR COLLEGE ~~ ..... ~O.L STRATEGIC STUDIES INSTITUTE Report Documentation Page Form...ORGANIZATION NAME(S) AND ADDRESS(ES) U.S. Army War College,Strategic Studies Institute,47 Ashburn Drive,Carlisle,PA,17013-5010 8. PERFORMING...concerning the role of ground forces in achieving national security objectives. The Strategic Studies Institute publishes national security and

  19. Models, Analysis, and Recommendations Pertaining to the Retention of Naval Special Warfare s Mid-Level Officers

    DTIC Science & Technology

    2013-12-01

    The Analytic Hierarch/Network Process,” in Rev. R. Acad. Cien. Serie A. Mat (RACSAM), submitted by Francisco Javier Giron (Real Academia de Ciencias ...Academia de Ciencias : Spain. Scott, Nathan. Naval Special Warfare Officer Retention Survey. Monterey, CA: NPS Press, September 2013. Whittenberger

  20. Conquest from Within: A Comparative Analysis between Soviet Active Measures and United States Unconventional Warfare Doctrine

    DTIC Science & Technology

    2015-05-27

    irregular threats. Unconventional Warfare (UW), traditionally a Special Operations Forces core activity, has served U.S. strategic interests in a variety...Special Operations Forces core activity, has served U.S. strategic interests in a variety of operational environments. Throughout the Cold War, the

  1. Animals as sentinels of chemical terrorism agents: an evidence-based review.

    PubMed

    Rabinowitz, Peter; Wiley, James; Odofin, Lynda; Wilcox, Matthew; Dein, F Joshua

    2008-02-01

    The goal of this systematic review was to identify evidence that animals could serve as sentinels of an attack with a chemical terrorism agent. The biomedical literature was systematically searched for evidence that wild or domestic animals exposed to certain chemical weapons of terrorism had either greater susceptibility, shorter latency period, or increased exposure risk versus humans. Additionally, we searched for documented reports of such animals historically serving as sentinels for chemical warfare agents. For a small number of agents, there was limited evidence that domestic and/or wild animals could provide sentinel information to humans following an airborne attack with chemical agents, usually related to increased potential for environmental exposure. Some of this evidence was based on anecdotal case reports, and in many cases high quality chemical terrorism agent evidence regarding comparative susceptibility, exposure, and latency between humans and sentinel animal species was not found. Currently, there is insufficient evidence for routine use of animals as sentinels for airborne chemical warfare agents. At the same time, Poison Center surveillance systems should include animal calls, and greater communication between veterinarians and physicians could help with preparedness for a chemical terrorism attack. Further analysis of comparative chemical warfare agent toxicity between sentinel animal species and humans is needed.

  2. Why people believe they were exposed to biological or chemical warfare: a survey of Gulf War veterans.

    PubMed

    Brewer, Noel T; Lillie, Sarah E; Hallman, William K

    2006-04-01

    The study sought to understand better how people come to believe they have been exposed to biological and chemical warfare. We conducted telephone interviews with 1,009 American veterans (65% response rate) deployed and not deployed to the Gulf War, a conflict during which there were credible threats that such warfare could be used. Only 6% of non-Gulf War veterans reported exposure to biological or chemical warfare, but most of Gulf War veterans reported exposure (64%). The majority of these were unsure whether the exposure was chemical or biological in nature. The most commonly reported exposure indicators were receiving an alert from the military and having physical symptoms. Veterans who were certain of the type of exposure (biological or chemical) were more likely to recall having been told by the military and to recall physical symptoms. Future communications with soldiers and the general public about biological and chemical warfare may need to emphasize the uncertain nature of such risk information. Evaluations of exposure diagnostic technologies should take into account the problem of people initially believing, but not later discounting, false positive results.

  3. Understanding Information Age Warfare

    DTIC Science & Technology

    2001-08-01

    involves actors activelysharing data, information , knowledge , perceptions ( awareness of facts or factors, understandings of situations, etc.), or concepts... knowledge , awareness , the degree to which information is shared, shared awareness , the nature of collaboration, and its effect on synchronization, and...

  4. An Analysis of the Twenty-One Missions of the Marine Corps Expeditionary Unit (Special Operations Capable)

    DTIC Science & Technology

    1994-06-03

    unconventional warfare capability, consist of Army Special Forces and certain Navy, Air Force, and Marine Corps units as assigned. 4. Foreign ;ntgnal Pef~nse (JCS...7. Psychological Operations (JC5 Pub J-Q2): Planned operations to convey selected information and indicators to foreign audiences to influence their...emotions, motives, objective reasoning, and ultimately, the behavior of foreign governments, organizations groups, and individuals. The purpose of

  5. IEEE 1982. Proceedings of the international conference on cybernetics and society

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Not Available

    1982-01-01

    The following topics were dealt with: knowledge-based systems; risk analysis; man-machine interactions; human information processing; metaphor, analogy and problem-solving; manual control modelling; transportation systems; simulation; adaptive and learning systems; biocybernetics; cybernetics; mathematical programming; robotics; decision support systems; analysis, design and validation of models; computer vision; systems science; energy systems; environmental modelling and policy; pattern recognition; nuclear warfare; technological forecasting; artificial intelligence; the Turin shroud; optimisation; workloads. Abstracts of individual papers can be found under the relevant classification codes in this or future issues.

  6. Contamination source review for Building E5974, Edgewood Area, Aberdeen Proving Ground, Maryland

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Billmark, K.A.; Emken, M.E.; O`Reilly, D.P.

    1995-09-01

    This report documents the results of a contamination source review of Building E5974 at the Aberdeen Proving Ground (APG) in Maryland. The primary mission at APG has been the testing and evaluation of US Army warfare materials. Since its beginning in 1917, the Edgewood Area of APG has been the principal location for chemical warfare agent research, development, and testing in the US. APG was also used for producing chemical warfare agents during both world wars, and it has been a center for the storage of chemical warfare material. An attempt was made to identify and define areas of toxicmore » or hazardous contaminants and to assess the physical condition and accessibility of APG buildings. The information obtained from this review may be used to assist the US Army in planning for the future use or disposition of the buildings. The contamination source review consisted of the following tasks: historical records search, physical inspection, photographic documentation, geophysical investigation, and collection of air samples.« less

  7. Entering the Dragon’s Lair: Chinese Antiaccess Strategies and Their Implications for the United States

    DTIC Science & Technology

    2007-01-01

    possible expansion of electronic warfare into outer space in future conflicts (Peng and Yao, 2001, p. 363): As a result of the continuous development of...information warfare units to develop viruses to attack enemy computer systems and networks .” Potential Effects of Chinese Antiaccess Measures 87...computers, enhanced user identi- fication measures, and monitoring of network activity. Given the possibility that China could nonetheless succeed in

  8. Unconventional Warfare: A Mission Metamorphosis for the 21st Century?

    DTIC Science & Technology

    2000-06-01

    technology, the trend for insurgent groups to use the internet to advance their cause or exploit propaganda is sure to increase. Insurgent groups using ...Zapatistas, they used “social net war” to put pressure on the Mexican government. Efforts such as this are expected to continue and are extremely important...authority of the local government or occupying power, and using primarily irregular and informal groupings and measures.246 FM 31-21 Guerrilla Warfare

  9. Naval Special Warfare: Identifying and Prioritizing Core Attributes of the Profession

    DTIC Science & Technology

    2014-12-01

    literature review supports the need for research that is designed to advance the NSW profession. Analytic rigor could inform how NSW should refine its...B. SKILLS REQUIRED - WHAT (QUESTIONS 10–25, 26, 30) This research was designed to answer the following question: “What are the practical skills...NSW PRODEV: Naval Special Warfare Professional Development This research is designed to answer the following question. What are the practical

  10. Toward Multi-Domain Battle: Combined Arms Precedents to Inform Today’s Joint Force

    DTIC Science & Technology

    2017-03-31

    of war. Americans brought about several technical and operational innovations that supported the strategic bombing campaign. Combined-Systems...defense, strategic bombing , and amphibious warfare as examples of “combined-systems revolutions.”’8 Each of these innovations took decades to develop... bombing , and amphibious warfare, each of the interwar combined- system revolutions identified by Watts and Murray, are examples of the type of cross- domain

  11. What’s Operations Research? and Why Should We (Interagents) Care?

    DTIC Science & Technology

    2010-02-09

    OR (from DSB Report on ISR applications) – World War I • Thomas Edison led anti-submarine warfare tactics study/development – World War II • English...Operations – Joint Warfare – Resources/Readiness/Training – Acquisition – Interdisciplinary Advances in OR • Recent Special Meetings – Power and Energy...the scientific method to inform decisions • Early applications were military operations focused – Lanchester equations of combat – Anti-submarine

  12. International Law: How It Affects Rules of Engagement and Responses in Information Warfare

    DTIC Science & Technology

    1997-03-01

    with the least expenditure of life, time, and physical resources. Humanity. Prohibits the employment of any kind or degree of force not necessary...the beginning of warfare, the intent has been to physically and psychologically destroy an adversary. Little consideration was given to the amount of...threat to US security interests. For example, core interests are those interests dealing with the physical survival of a country or directly threatening

  13. Integration of Robotics and 3D Visualization to Modernize the Expeditionary Warfare Demonstrator (EWD)

    DTIC Science & Technology

    2009-09-01

    his schedule is. I learned most from our informal discussions and collaboration with other industry professionals. Amela was instrumental in allowing...me to effectively analyze, structure and critique my work. I take many professional lessons learned from Amela with me as I leave NPS. Thanks to...observers began learning about maneuver warfare in a large-scale battle. The demonstration was recognized as a huge success after General von Muffling

  14. Rethinking Cultural Influences on Warfare

    DTIC Science & Technology

    2012-05-17

    36 Jarole B. Manheim, Richard C. Lars Willnat, and Craig Brians , Empirical Political...Willnat, and Craig Brians , Empirical Political Analysis: Quantitative and Qualitative Research Methods (New York: Pearson Education Inc, 2008... Boxer Rebellions. In 1950, China was emerging from 13 years of protracted warfare with Japan and a civil war between the Chinese Communist Party (CCP

  15. Chemical analysis of bleach and hydroxide-based solutions after decontamination of the chemical warfare agent O-ethyl S-2-diisopropylaminoethyl methylphosphonothiolate (VX).

    PubMed

    Hopkins, F B; Gravett, M R; Self, A J; Wang, M; Chua, Hoe-Chee; Hoe-Chee, C; Lee, H S Nancy; Sim, N Lee Hoi; Jones, J T A; Timperley, C M; Riches, J R

    2014-08-01

    Detailed chemical analysis of solutions used to decontaminate chemical warfare agents can be used to support verification and forensic attribution. Decontamination solutions are amongst the most difficult matrices for chemical analysis because of their corrosive and potentially emulsion-based nature. Consequently, there are relatively few publications that report their detailed chemical analysis. This paper describes the application of modern analytical techniques to the analysis of decontamination solutions following decontamination of the chemical warfare agent O-ethyl S-2-diisopropylaminoethyl methylphosphonothiolate (VX). We confirm the formation of N,N-diisopropylformamide and N,N-diisopropylamine following decontamination of VX with hypochlorite-based solution, whereas they were not detected in extracts of hydroxide-based decontamination solutions by nuclear magnetic resonance (NMR) spectroscopy or gas chromatography-mass spectrometry. We report the electron ionisation and chemical ionisation mass spectroscopic details, retention indices, and NMR spectra of N,N-diisopropylformamide and N,N-diisopropylamine, as well as analytical methods suitable for their analysis and identification in solvent extracts and decontamination residues.

  16. The role of the sand in chemical warfare agent exposure among Persian Gulf War veterans: Al Eskan disease and "dirty dust".

    PubMed

    Korényi-Both, A L; Svéd, L; Korényi-Both, G E; Juncer, D J; Korényi-Both, A L; Székely, A

    2000-05-01

    The purpose of this paper is to inquire into the relationship between Al Eskan disease and the probable exposure to chemical warfare agents by Persian Gulf War veterans. Al Eskan disease, first reported in 1991, compromises the body's immunological defense and is a result of the pathogenic properties of the extremely fine, dusty sand located in the central and eastern region of the Arabian peninsula. The disease manifests with localized expression of multisystem disorder. Signs and symptoms of Al Eskan disease have been termed by the news media "Persian Gulf syndrome." The dust becomes a warfare agent when toxic chemicals are microimpregnated into inert particles. The "dirty dust" concept, that the toxicity of an agent could be enhanced by absorption into inactive particles, dates from World War I. A growing body of evidence shows that coalition forces have encountered Iraqi chemical warfare in the theater of operation/Persian Gulf War to a much greater extent than early U.S. Department of Defense information had indicated. Veterans of that war were exposed to chemical warfare agents in the form of direct (deliberate) attacks by chemical weapons, such as missiles and mines, and indirect (accidental) contamination from demolished munition production plants and storage areas, or otherwise. We conclude that the microimpregnated sand particles in the theater of operation/Persian Gulf War depleted the immune system and simultaneously acted as vehicles for low-intensity exposure to chemical warfare agents and had a modifying-intensifying effect on the toxicity of exposed individuals. We recommend recognition of a new term, "dirty sand," as a subcategory of dirty dust/dusty chemical warfare agents. Our ongoing research efforts to investigate the health impact of chemical warfare agent exposure among Persian Gulf War veterans suggest that Al Eskan disease is a plausible and preeminent explanation for the preponderance of Persian Gulf War illnesses.

  17. Toward Omniscient command: How to Lead in the Information Age

    DTIC Science & Technology

    2005-05-26

    7 Early Industrial Revolution – Napoleonic Warfare...9 Middle Industrial Revolution – The American Civil War......................................................... 12 Late... Industrial Revolution – World War II ............................................................................... 15 Early Information Age

  18. Information Warfare-Worthy Jamming Attack Detection Mechanism for Wireless Sensor Networks Using a Fuzzy Inference System

    PubMed Central

    Misra, Sudip; Singh, Ranjit; Rohith Mohan, S. V.

    2010-01-01

    The proposed mechanism for jamming attack detection for wireless sensor networks is novel in three respects: firstly, it upgrades the jammer to include versatile military jammers; secondly, it graduates from the existing node-centric detection system to the network-centric system making it robust and economical at the nodes, and thirdly, it tackles the problem through fuzzy inference system, as the decision regarding intensity of jamming is seldom crisp. The system with its high robustness, ability to grade nodes with jamming indices, and its true-detection rate as high as 99.8%, is worthy of consideration for information warfare defense purposes. PMID:22319307

  19. Global Complexity: Information, Chaos, and Control at ASIS 1996 Annual Meeting.

    ERIC Educational Resources Information Center

    Jacob, M. E. L.

    1996-01-01

    Discusses proceedings of the 1996 ASIS (American Society for Information Science) annual meeting in Baltimore (Maryland), including chaos theory; electronic universities; distance education; intellectual property, including information privacy on the Internet; the need for leadership in libraries and information centers; information warfare and…

  20. Beyond-the-Box Thinking on Future War: The Art and Science of Unrestricted Warfare

    DTIC Science & Technology

    2009-04-01

    Studies Institute, US Army War College, 2008. Mattis , James N., and Frank Hoffman. “Future Warfare: The Rise of Hybrid Warfare.” Proceedings...nanotechnologies will augment the current bio -chemical capabilities, moving the battlefield into a microscopic arena. As seen before, the traditional American way...Military Trans-military Non-military Atomic Warfare Diplomatic Warfare Financial Warfare Conventional Warfare Network Warfare Trade Warfare Bio

  1. Organizational Analysis of Energy Manpower Requirements in the United States Navy

    DTIC Science & Technology

    2013-06-01

    ix LIST OF FIGURES Figure 1.  A 1.5 Megawatt wind turbine set up at the Marine Corps Logistics Base in Barstow, CA. (From Flores, 2010...Figure 1. A 1.5 Megawatt wind turbine set up at the Marine Corps Logistics Base in Barstow, CA. (From Flores, 2010) 9 In an effort to capture...electronic and information warfare systems ) (h ) Network Engineering (including wireless networks, sensor networks, high speed data networking, and

  2. The Spectrum of Warfare Challenge. Joint Center for Operational Analysis Journal, Volume 11, Issue 2, Spring 2009

    DTIC Science & Technology

    2009-01-01

    all missing. The opinion at the time was that these problems—coupled with many other issues— signifi cantly undermined the overall effectiveness of...and provide clarify- ing information. The second method involved using timely and effective press releases from MNF-I. These press releases...by Lyman Cutlar several times before to stay off his property and quit eating his potatoes . Cutlar, a Kentuckian, was an American miner who had

  3. Weathering the Cyber Storm: The Military’s Resiliency to Cyber Attacks in Future Warfare

    DTIC Science & Technology

    2012-06-01

    observation. While the ability to collect intelligence is important, it falls under a different rubric than warfare itself. 20 Another term worth...the use of antivirus programs, firewalls, and security policies. These measures also fall under the rubric of information assurance, or “measures that...specifying how it is to be accomplished.” of genetic diversity. 13 A complaint after Operation Iraqi Freedom (OIF) was that soldiers had to

  4. C3 in Maneuver Warfare: The Expanding Role of the Communications Officer

    DTIC Science & Technology

    1991-04-01

    command, control, and communications (C3 ) process employed within the Marine Air Ground Task Force (MAGTF). Over the past two decades, the rapid...information to the right people at the right time. This paper presents a philosophical understanding of maneuver C3 and the communication officer’s...necessary to support maneuver warfare. Figure 1 depicts; thi:; dual role of C3 and serves as an outline for our paper . Maneuver C3 Architecture

  5. Trade-offs Between Command and Control Architectures and Force Capabilities Using Battlespace Awareness

    DTIC Science & Technology

    2014-06-01

    information superiority in Network- centric warfare .34 A brief discussion of the implementation of battlespace awareness is given. The method 3 Figure 2...developing the model used for this study. Lanchester Equations,39 System Dynamics models,40–42 Discrete Event Simulation, and Agent-based models (ABMs) were...popularity in the military modeling community in recent years due to their ability to effectively capture complex interactions in warfare scenarios with many

  6. Naval Postgraduate School Research. Volume 9, Number 3, October 1999

    DTIC Science & Technology

    1999-10-01

    this effort so far. It is an exciting field. “ Quantum computers are the atomic bomb of the information age ,” according to Professor Baer, “ but it...Transactions on Image Processing, Octo- ber 1999 R. Hippenstiel and U. Aktas, “Difference of Arrival Estimation Using Wavelet Transforms,” 42nd Midwest...Electronic Warfare Conference Naval Air Warfare Center (SECRET) 23-24 Jun 00 Thirty-Fifth Annual Colonel Allyn D. Burke Memorial U.S. Army Dental Symposium

  7. Seeking Shadows in the Sky: The Strategy of Air Guerrilla Warfare

    DTIC Science & Technology

    2000-06-01

    Air Power for the Small Air Force,” in Air Power Confronts an Unstable World, ed. Richard P. Hallion (London: Brassey’s, 1997), 181. 12 Shaun Clarke...Information Age, ed. John Arquilla and David Ronfeldt (Santa Monica, Calif., RAND, 1997), 207. 71 Air Commodore Andrew G. B. Vallance , “The Changing Nature...of Air Warfare,” in Air Power Confronts an Unstable World, ed. Richard P. Hallion (London: Brassey’s, 1997), xv; Alan Stephens, The Implications of

  8. Legitimacy as an Operational Factor: An Alternative Analysis

    DTIC Science & Technology

    2006-10-23

    Napoleon I9 In his book, Operational Warfare, Dr. Milan Vego notes, “All great military leaders had an uncommon ability to...elements of one, or perhaps both, of the remaining factors. 9 Milan Vego, Operational Warfare...44 Ibid., 161. 45 Richard Schultz , In the Aftermath of War (Newport RI: U.S. Naval War College, 2006; reprint, Montgomery, AL: Air University

  9. Rapid Analysis of Chemical Warfare Agents and Their Hydrolysis Products by Desorption Electrospray Ionization Mass Spectrometry (DESI-MS)

    DTIC Science & Technology

    2009-10-01

    of chemical warfare agents in natural water samples by solid-phase microextraction. Anal. Chem., 69, 1866-72. [36] Sng , M.T. and Ng ,W.F. (1999). In...liquid phase microextraction of alkylphosphonic acids from water. J. Chromatogr. A., 1141, 151-157. [43] Lee, H.S.N., Sng , M.T., Basheer, C., and Lee

  10. Military chemical warfare agent human subjects testing: part 1--history of six-decades of military experiments with chemical warfare agents.

    PubMed

    Brown, Mark

    2009-10-01

    Military chemical warfare agent testing from World War I to 1975 produced thousands of veterans with concerns of possible long-term health consequences. Clinical and research evaluation of potential long-term health effects has been difficult because the exposures occurred decades ago, the identity of troops exposed and exposure magnitudes are uncertain, and acute effects during experiments poorly documented. In contrast, a companion article describes the large amount of information available about the specific agents tested and their long-term health effects. This short history describes U.S. military chemical-agent experiments with human subjects and identifies tested agents. Finally, the demonstrated need to anticipate future health concerns from military personnel involved in such military testing suggests current and future military researchers should be required, by law and regulation, to fully record the identity of those exposed, relevant exposure magnitude, and complete medical information for all subjects. New study protocols and institutional review board approvals for research involving military personnel should reflect this need.

  11. Multifunctional ultra-high vacuum apparatus for studies of the interactions of chemical warfare agents on complex surfaces

    NASA Astrophysics Data System (ADS)

    Wilmsmeyer, Amanda R.; Gordon, Wesley O.; Davis, Erin Durke; Mantooth, Brent A.; Lalain, Teri A.; Morris, John R.

    2014-01-01

    A fundamental understanding of the surface chemistry of chemical warfare agents is needed to fully predict the interaction of these toxic molecules with militarily relevant materials, catalysts, and environmental surfaces. For example, rules for predicting the surface chemistry of agents can be applied to the creation of next generation decontaminants, reactive coatings, and protective materials for the warfighter. Here, we describe a multifunctional ultra-high vacuum instrument for conducting comprehensive studies of the adsorption, desorption, and surface chemistry of chemical warfare agents on model and militarily relevant surfaces. The system applies reflection-absorption infrared spectroscopy, x-ray photoelectron spectroscopy, and mass spectrometry to study adsorption and surface reactions of chemical warfare agents. Several novel components have been developed to address the unique safety and sample exposure challenges that accompany the research of these toxic, often very low vapor pressure, compounds. While results of vacuum-based surface science techniques may not necessarily translate directly to environmental processes, learning about the fundamental chemistry will begin to inform scientists about the critical aspects that impact real-world applications.

  12. Contamination source review for Building E5978, Edgewood Area, Aberdeen Proving Ground, Maryland

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Mosqueda, G.; Dougherty, J.; Draugelis, A.K.

    1995-09-01

    This report documents the results of a contamination source review of Building E5978 at the Aberdeen Proving Group (APG) in Maryland. The primary mission at APG has been the testing and evaluation of US Army warfare materials. Since its beginning in 1917, the Edgewood Area of APG has been the principal location for chemical warfare agent research, development, and testing in the US. APG was also used for producing chemical warfare agents during both world wars, and it has been a center for the storage of chemical warfare material. An attempt was made to identify and define areas of toxicmore » or hazardous contaminants and to assess the physical condition and accessibility of APG buildings. The information obtained from this review may be used to assist the US Army in planning for the future use or disposition of the buildings. The contamination source review consisted of the following tasks: historical records search, physical inspection, photographic documentation, geophysical investigation, and collection of air samples for the presence of volatile organic compounds.« less

  13. Contamination source review for Building E3641, Edgewood Area, Aberdeen Proving Ground, Maryland

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Zellmer, S.D.; Draugelis, A.K.; Rueda, J.

    1995-09-01

    This report documents the results of a contamination source review of Building E3641 at the Aberdeen Proving Ground (APG) in Maryland. The primary mission at APG has been the testing and evaluation of US Army warfare materials. Since its beginning in 1917, the Edgewood Area of APG has been the principal location for chemical warfare agent research, development, and testing in the US. APG was also used for producing chemical warfare agents during both world wars, and it has been a center for the storage of chemical warfare material. An attempt was made to identify and define areas of toxicmore » or hazardous contaminants and to assess the physical condition and accessibility of APG buildings. The information obtained from this review may be used to assist the US Army in planning for the future use or disposition of the buildings. The contamination source review consisted of the following tasks: historical records search, physical inspection, photographic documentation, geophysical investigation, and review of available records regarding underground storage tanks associated with each building.« less

  14. Multifunctional ultra-high vacuum apparatus for studies of the interactions of chemical warfare agents on complex surfaces.

    PubMed

    Wilmsmeyer, Amanda R; Gordon, Wesley O; Davis, Erin Durke; Mantooth, Brent A; Lalain, Teri A; Morris, John R

    2014-01-01

    A fundamental understanding of the surface chemistry of chemical warfare agents is needed to fully predict the interaction of these toxic molecules with militarily relevant materials, catalysts, and environmental surfaces. For example, rules for predicting the surface chemistry of agents can be applied to the creation of next generation decontaminants, reactive coatings, and protective materials for the warfighter. Here, we describe a multifunctional ultra-high vacuum instrument for conducting comprehensive studies of the adsorption, desorption, and surface chemistry of chemical warfare agents on model and militarily relevant surfaces. The system applies reflection-absorption infrared spectroscopy, x-ray photoelectron spectroscopy, and mass spectrometry to study adsorption and surface reactions of chemical warfare agents. Several novel components have been developed to address the unique safety and sample exposure challenges that accompany the research of these toxic, often very low vapor pressure, compounds. While results of vacuum-based surface science techniques may not necessarily translate directly to environmental processes, learning about the fundamental chemistry will begin to inform scientists about the critical aspects that impact real-world applications.

  15. Multifunctional ultra-high vacuum apparatus for studies of the interactions of chemical warfare agents on complex surfaces

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Wilmsmeyer, Amanda R.; Morris, John R.; Gordon, Wesley O.

    2014-01-15

    A fundamental understanding of the surface chemistry of chemical warfare agents is needed to fully predict the interaction of these toxic molecules with militarily relevant materials, catalysts, and environmental surfaces. For example, rules for predicting the surface chemistry of agents can be applied to the creation of next generation decontaminants, reactive coatings, and protective materials for the warfighter. Here, we describe a multifunctional ultra-high vacuum instrument for conducting comprehensive studies of the adsorption, desorption, and surface chemistry of chemical warfare agents on model and militarily relevant surfaces. The system applies reflection-absorption infrared spectroscopy, x-ray photoelectron spectroscopy, and mass spectrometry tomore » study adsorption and surface reactions of chemical warfare agents. Several novel components have been developed to address the unique safety and sample exposure challenges that accompany the research of these toxic, often very low vapor pressure, compounds. While results of vacuum-based surface science techniques may not necessarily translate directly to environmental processes, learning about the fundamental chemistry will begin to inform scientists about the critical aspects that impact real-world applications.« less

  16. A Critical Analysis of the Acquisition Review Journal: Are We in Step with the Field?

    DTIC Science & Technology

    2006-12-01

    ART # YEAR AUTHOR(S) TITLE THEMES 1 1994 Preston, Colleen Acquisition Reform: Making it a Reality Acquisition Reform 2 1994 LaBerge , Walter B...Going? Technology 33 1996 Hewitt, Clyde Getting to the On-Ramp of the Information Highway Technology 34 1996 LaBerge , Walter B. Cycle Time: A...Learned from Developing the ABCs 6.4 Solution System of Systems 204 2005 Zenishek, Steven G.; Usechak, David Net-Centric Warfare and its Impact on

  17. New studies disputing allegations of bacteriological warfare during the Korean War.

    PubMed

    Rolicka, M

    1995-03-01

    In the television series Korea the Unknown War produced jointly by Thames Television (London) and WGBH (Boston) in 1990, General Matthew Ridgway, Commander in Chief of United Nations forces during the Korean War, called the accusations that the United States waged bacteriological warfare "black propaganda." The charges discredited the United States and, despite denials and many international discussions, have not been completely refuted until new. Following studies in archives previously not available for research and after uncovering new sources, many specific examples of black propaganda were discovered that contained false information and lies discrediting the United States. The mechanism of lies, which convinced the Korean population that bacteriological warfare was going on and that the only way not to become victims of the United States' inhuman cruelty was to fight, are shown in this paper.

  18. Fluorescent discrimination between traces of chemical warfare agents and their mimics.

    PubMed

    Díaz de Greñu, Borja; Moreno, Daniel; Torroba, Tomás; Berg, Alexander; Gunnars, Johan; Nilsson, Tobias; Nyman, Rasmus; Persson, Milton; Pettersson, Johannes; Eklind, Ida; Wästerby, Pär

    2014-03-19

    An array of fluorogenic probes is able to discriminate between nerve agents, sarin, soman, tabun, VX and their mimics, in water or organic solvent, by qualitative fluorescence patterns and quantitative multivariate analysis, thus making the system suitable for the in-the-field detection of traces of chemical warfare agents as well as to differentiate between the real nerve agents and other related compounds.

  19. Proceedings on Combating the Unrestricted Warfare Threat: Integrating Strategy, Analysis, and Technology, 20-21 March 2007

    DTIC Science & Technology

    2007-03-01

    Prosthetics to enable return to units without loss of capability Quantum...and will give us a big advantage in terms of unrestricted warfare. Figure 17 high-Productivity Computing System PRoSThETICS We have an exciting...program in prosthetics (Figure 18). It started with a monkey at Duke University. We put microelectronic implants into her brain, taught her

  20. Desorption Electrospray Ionization Mass Spectrometry (DESI-MS) Analysis of Organophosphorus Chemical Warfare Agents: Rapid Acquisition of Time-Aligned Parallel (TAP) Fragmentation Data

    DTIC Science & Technology

    2010-06-01

    phase microextraction. Anal. Chem., 69, 1866-72. [39] Sng , M.T. and Ng ,W.F. (1999). In-situ derivatisation of degradation products of chemical warfare...Chromatogr. A., 1141, 151-157. [46] Lee, H.S.N., Sng , M.T., Basheer, C., and Lee, H.K. (2007). Determination of degradation products of chemical

  1. Adapting Unconventional Warfare Doctrine to Cyberspace Operations: An Examination of Hacktivist Based Insurgencies

    DTIC Science & Technology

    2015-06-12

    Unconventional Warfare, Cyberspace Operations, Cyber Warfare , Hacktivism, China, Russia, Georgia, Estonia, Umbrella Revolution, UW, Cyber, Guerilla, Hacktivist...6 Cyber Warfare ............................................................................................................. 7...Internet, and cyber warfare , the nature of the human element in cyberspace exhibits only a scientific advancement in the evolution of warfare, not a

  2. 78 FR 58524 - Takes of Marine Mammals Incidental to Specified Activities; U.S. Navy Training and Testing...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-09-24

    ... and testing activities: anti-surface warfare; anti- submarine warfare; mine warfare; naval special warfare; major training activities; Naval Air Systems Command (NAVAIR) testing; anti-surface warfare testing; anti-submarine warfare testing; Naval Sea Systems Command (NAVSEA) testing; and Office of Naval...

  3. Analyzing the Effects of Network Centric Warfare on Warfighter Empowerment

    DTIC Science & Technology

    2002-06-01

    5 D ORGANIZATION OF THE STUDY...16 D . THEORETICAL MODEL OF EMPOWERMENT...Technology Defined ............................................................................33 D . IMPLEMENTING IT THROUGH INTEGRATED INFORMATION

  4. Science and Technology Strategic Plan 2012 (Office of Naval Research C4ISR Department)

    DTIC Science & Technology

    2012-01-01

    Information Dominance domain. Information-based warfare will be fundamentally transformed from today’s paradigm. Today, data resides in mission specific networks, sensors and communication architectures. Information requirements are tied to a mission or mission phase where information for prosecution is generated and held for each mission in separate

  5. On Cyber Warfare Command and Control Systems

    DTIC Science & Technology

    2004-06-01

    longer adequate to rely solely on the now traditional defense-in-depth strategy. We must recognize that we are engaged in a form of warfare, cyber warfare , and... warfare . This causes security devices to be used ineffectively and responses to be untimely. Cyber warfare then becomes a one-sided battle where the... cyber warfare strategy and tactics requires a cyber warfare command and control system. Responses to cyber attacks do not require offensive measures

  6. Evaluation of U.S. Navy Surface Ship Operations in the Information Domain

    DTIC Science & Technology

    2013-03-01

    information dominance . An evaluation of past experiences and current technology will be used to recommend how to employ current surface assets information operations (IO) capabilities. This thesis also will include an evaluation of current topics regarding information dominance and the cyber domain, focusing on the areas of electronic warfare, cyberwarfare, and military information support operations

  7. Asserting National Sovereignty in Cyberspace: The Case for Internet Border Inspection

    DTIC Science & Technology

    2003-06-01

    Influencing Foreign Policy. in Internet and International Systems: Information Technology and American Foreign Policy Decisionmaking Workshop. 1999...investigative Agencies that investigate violations of federal law IO Information Operations, military operations in information realm IP Internet ...Protocol, a specific format for Internet packet headers IW Information Warfare, part of information operations NCP Network Control Protocol NSA

  8. Health-related quality of life of chemical warfare victims: an assessment with the use of a specific tool.

    PubMed

    Biat Saeed, Khaled; Parandeh, Akram; Alhani, Fatemeh; Salaree, Mohammad Mehdi

    2014-02-01

    Exposure to chemical warfare gases significantly changes the quality of life (QoL) of victims and has significant chronic adverse effects. This study sought to assess the health-related QoL (HRQoL) of chemical victims by means of a tool specifically designed for this purpose. The correlation of their QoL with several demographic factors was evaluated as well. In this descriptive cross-sectional study, 120 chemical warfare victims were selected from subjects presenting to selected medical centers in Tehran in 2012 using convenience sampling. Two questionnaires of demographic information and HRQoL of chemical warfare victims (specific tool) were used for data collection. The data were analyzed using SPSS version 20 software (IBM, Armonk, NY, USA). The mean and standard deviation (mean ± SD) of scores obtained by chemical warfare victims in physical, psychosocial and spiritual domains was 39.6 ± 16.5, 42.1 ± 15.2 and 82.4 ± 15.4, respectively. Different age groups showed a significant difference in the psychosocial domain score (P < 0.01). Also, the physical and spiritual domain scores had significant differences with respect to the level of education (P < 0.001). The occupational status showed significant differences in the psychosocial and spiritual domains scores of QoL (P < 0.001). The physical and psychosocial domain scores also accounted for a significant difference with respect to the duration and severity of pulmonary symptoms (P < 0.05). Considering the importance and high value of spirituality in chemical warfare victims, it can be used as strategically for these patients to help them cope with their injury and improve their physical and psychosocial health and QoL.

  9. Health-Related Quality of Life of Chemical Warfare Victims: An Assessment with the Use of a Specific Tool

    PubMed Central

    Biat Saeed, Khaled; Parandeh, Akram; Alhani, Fatemeh; Salaree, Mohammad Mehdi

    2014-01-01

    Background: Exposure to chemical warfare gases significantly changes the quality of life (QoL) of victims and has significant chronic adverse effects. Objective: This study sought to assess the health-related QoL (HRQoL) of chemical victims by means of a tool specifically designed for this purpose. The correlation of their QoL with several demographic factors was evaluated as well. Patients and Methods: In this descriptive cross-sectional study, 120 chemical warfare victims were selected from subjects presenting to selected medical centers in Tehran in 2012 using convenience sampling. Two questionnaires of demographic information and HRQoL of chemical warfare victims (specific tool) were used for data collection. The data were analyzed using SPSS version 20 software (IBM, Armonk, NY, USA). Results: The mean and standard deviation (mean ± SD) of scores obtained by chemical warfare victims in physical, psychosocial and spiritual domains was 39.6 ± 16.5, 42.1 ± 15.2 and 82.4 ± 15.4, respectively. Different age groups showed a significant difference in the psychosocial domain score (P < 0.01). Also, the physical and spiritual domain scores had significant differences with respect to the level of education (P < 0.001). The occupational status showed significant differences in the psychosocial and spiritual domains scores of QoL (P < 0.001). The physical and psychosocial domain scores also accounted for a significant difference with respect to the duration and severity of pulmonary symptoms (P < 0.05). Conclusions: Considering the importance and high value of spirituality in chemical warfare victims, it can be used as strategically for these patients to help them cope with their injury and improve their physical and psychosocial health and QoL. PMID:24719824

  10. Network Centric Warfare: A Realistic Defense Alternative for Smaller Nations?

    DTIC Science & Technology

    2004-06-01

    organic information sources. The degree to which force entities are networked will determine the quality of information that is available to various...control processes will determine the extent that information is shared, as well as the nature and quality of the interactions that occur between and...

  11. Littoral Combat Ship Open Ocean Anti-Submarine Warfare

    DTIC Science & Technology

    2014-06-01

    maintain stealth and its defense in order to properly conduct an attack on a surface vessel (Sternhell and Thorndike 2014, 102). This statement...its target, the surface combatants can counter by increasing their speed (Sternhell and Thorndike 2014). While the maximum speed of the current...120316_PS.pdf Sternhell, Charles M, and Alan M Thorndike . 2014. “Antisubmarine Warfare in World War II.” CNA Analysis & Solutions. Accessed April 14, 2014

  12. Analysis of Maritime Support Vessels and Acquisition Methods Utilized to Support Maritime Irregular Warfare

    DTIC Science & Technology

    2010-06-01

    1 identifies five fundamental IW operations as they relate to the maritime environment and domain. Maritime IrregularWarfare Activities...they relate to MIW. Figure 2 identifies five fundamental IW operations as they relate to the maritime environment and domain. Maritime...meter RHIB is designed for the insertion and extraction of SEAL Team personnel. It is a twin- turbocharged diesel engine, waterjet-propelled personnel

  13. Characterization of the MEMS Directional Sound Sensor Fabricated Using the SOIMUMPS Process

    DTIC Science & Technology

    2008-06-01

    ABBREVIATIONS AND ACRONYMS ASW Anti- Submarine Warfare AUV Autonomous Underwater Vehicle DRIE Deep Reactive Ion Etching FAS Federation of American...as the frequency diverges from the resonant frequency (2980 Hz ) of the sensor. This analysis points out some disadvantages of the current set up of...sound sensor has important military applications, in particular to anti- submarine warfare (ASW). The sensor considered in this thesis is modeled on

  14. Hybrid Threat Center of Gravity Analysis: Cutting the Gordian Knot

    DTIC Science & Technology

    2016-04-04

    U.S. Marine Corps General James Mattis summed this best when he stated that “we expect future enemies to look at the four approaches [Traditional...synthesis is what we call hybrid warfare.”15 15 James N. Mattis and Frank Hoffman, "Future...accoun tid=12686 (accessed August 16, 2015). Mattis , James N. and Frank Hoffman. "Future Warfare: The Rise of Hybrid wars." United States Naval

  15. A Comparison of Neutron-Based Non-Destructive Assessment Methods for Chemical Warfare Materiel and High Explosives

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    E.H. Seabury; D.L. Chichester; C.J. Wharton

    2008-08-01

    Prompt Gamma Neutron Activation Analysis (PGNAA) systems employ neutrons as a probe to interrogate items, e.g. chemical warfare materiel-filled munitions. The choice of a neutron source in field-portable systems is determined by its ability to excite nuclei of interest, operational concerns such as radiological safety and ease-of-use, and cost. Idaho National Laboratory’s PINS Chemical Assay System has traditionally used a Cf-252 isotopic neutron source, but recently a Deuterium-Tritium (DT) Electronic Neutron Generator (ENG) has been tested as an alternate neutron source. This paper presents the results of using both of these neutron sources to interrogate chemical warfare materiel (CWM) andmore » high explosive (HE) filled munitions.« less

  16. A Comparison of Neutron-Based Non-Destructive Assessment Methods for Chemical Warfare Material and High Explosives

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Seabury, E. H.; Chichester, D. L.; Wharton, C. J.

    2009-03-10

    Prompt Gamma Neutron Activation Analysis (PGNAA) systems employ neutrons as a probe to interrogate items, e.g. chemical warfare materiel-filled munitions. The choice of a neutron source in field-portable systems is determined by its ability to excite nuclei of interest, operational concerns such as radiological safety and ease-of-use, and cost. Idaho National Laboratory's PINS Chemical Assay System has traditionally used a {sup 252}Cf isotopic neutron source, but recently a deuterium-tritium (DT) electronic neutron generator (ENG) has been tested as an alternate neutron source. This paper presents the results of using both of these neutron sources to interrogate chemical warfare materiel (CWM)more » and high explosive (HE) filled munitions.« less

  17. Does the Economy or Surface Warfare Officer Career Pay Affect Surface Warfare Officer Retention?

    DTIC Science & Technology

    2014-12-01

    be a career SWO (Surface Warfare Enterprise, 2013). 6 Military pay was more important to men than women ...OR SURFACE WARFARE OFFICER CAREER PAY AFFECT SURFACE WARFARE OFFICER RETENTION? by Meagan B. Makarenko December 2014 Thesis Advisor...2014 3. REPORT TYPE AND DATES COVERED Master’s Thesis 4. TITLE AND SUBTITLE DOES THE ECONOMY OR SURFACE WARFARE OFFICER CAREER PAY AFFECT

  18. Is There Space for the Objective Force?

    DTIC Science & Technology

    2003-04-07

    force through the combination of precision weapons and knowledge-based warfare. Army forces will survive through information dominance , provided by a...Objective Forces. Space-based systems will be foundational building blocks for the Objective Force to achieve information dominance and satellite...communications required for information dominance across a distributed battlefield? Second, what exists to provide the Objective Force information

  19. Concepts for Conducting Warfare in Cyberspace

    DTIC Science & Technology

    2018-04-20

    REPORT DOCUMENTATION PAGE Form Approved OMB No. 0704-0188 Public reporting burden for this collection of information is estimated to average 1...completing and reviewing this collection of information . Send comments regarding this burden estimate or any other aspect of this collection of... information , including suggestions for reducing this burden to Department of Defense, Washington Headquarters Services, Directorate for Information

  20. Investigation of Requirements and Capabilities of Next Generation Mine Warfare Unmanned Underwater Vehicles

    DTIC Science & Technology

    2017-12-01

    increases, TtC decreases. The increased travel time allows for more analysis to be completed on-board instead of through PMA and the parallel...Distance the UUV must travel past each track to have time and realign with the next track Local X X X X X X km N/A N/A TrackFlag Flag use to reroute...No. 0704-0188 Public reporting burden for this collection of information is estimated to average 1 hour per response, including the time for reviewing

  1. The Soldier-Cyborg Transformation: A Framework for Analysis of Social and Ethical Issues of Future Warfare

    DTIC Science & Technology

    1998-05-26

    attitude about the use of chemical and biologic weapons , one must question the deterrent value of WMD. With perhaps the 19 exception of nuclear...ENHANCING, TRANSFORMING AND TRANSCENDING 1 TRENDS AND PREDICTIONS ABOUT FUTURE WARFARE 3 CHANGING DEMOGRAPHICS 8 THE BIOLOGIC SHIFT 10 STRATEGIC...without widespread loss of life. Thus, low lethality weapons and distant applications of precisely- applied force are mandatory to make future

  2. 2003 Industry Studies: Shipbuilding

    DTIC Science & Technology

    2003-01-01

    Vessel (HSV),” Navy Warfare Development Command (undated). Online. Internet . 1 March 2003. Industrial Technology Information Services, Taiwan... Technology Information Services, “Taiwan Industrial Outlook: Shipbuilding Industry” (2001), http://www.itis.org.tw/English/n17.html. Online. Internet ...likely see similar, if not equal improvements in the yards of global competitors. Information Technology (IT) Shipbuilders are incorporating

  3. Development of an automated on-line pepsin digestion-liquid chromatography-tandem mass spectrometry configuration for the rapid analysis of protein adducts of chemical warfare agents.

    PubMed

    Carol-Visser, Jeroen; van der Schans, Marcel; Fidder, Alex; Hulst, Albert G; van Baar, Ben L M; Irth, Hubertus; Noort, Daan

    2008-07-01

    Rapid monitoring and retrospective verification are key issues in protection against and non-proliferation of chemical warfare agents (CWA). Such monitoring and verification are adequately accomplished by the analysis of persistent protein adducts of these agents. Liquid chromatography-mass spectrometry (LC-MS) is the tool of choice in the analysis of such protein adducts, but the overall experimental procedure is quite elaborate. Therefore, an automated on-line pepsin digestion-LC-MS configuration has been developed for the rapid determination of CWA protein adducts. The utility of this configuration is demonstrated by the analysis of specific adducts of sarin and sulfur mustard to human butyryl cholinesterase and human serum albumin, respectively.

  4. Battle-Wise: Gaining Advantage in Networked Warfare

    DTIC Science & Technology

    2005-01-01

    Al Qaeda, using very different doctrines, are showing interest in tapping the power of information. Indeed, Al Qaeda and its franchised affiliates...having to engage at all because the time-information- disadvantaged force—even though networked—knows it will lose. To illustrate the importance of

  5. Strategic Impact of Cyber Warfare Rules for the United States

    DTIC Science & Technology

    2010-03-01

    Despite the growing complexities of cyberspace and the significant strategic challenge cyber warfare poses on the United States’ vital interests few...specific rules for cyber warfare exist. The United States should seek to develop and maintain cyber warfare rules in order to establish...exemplify the need for multilaterally prepared cyber warfare rules that will reduce the negative influence cyber warfare presently has on the United States’ national interests.

  6. Analysis of chemical warfare agents by gas chromatography-mass spectrometry: methods for their direct detection and derivatization approaches for the analysis of their degradation products

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Valdez, Carlos A.; Leif, Roald N.; Hok, Saphon

    Abstract Chemical warfare agents (CWAs) are unarguably one of the most feared toxic substances produced by mankind. Their inception in conventional warfare can be traced as far back as the Middle Ages but their full breakthrough as central players in bellic conflicts was not realized until World War I. Since then, more modern CWAs along with efficient methods for their manufacture have emerged and violently shaped the way modern warfare and diplomatic relations are conducted. Owing to their mass destruction ability, counter methods to mitigate their impact appeared almost immediately on par with their development. These efforts have focused onmore » their efficient destruction, development of medical countermeasures and their detection by modern analytical chemistry methods. The following review seeks to provide the reader with a broad introduction on their direct detection by gas chromatography-mass spectrometry (GC-MS) and the various sample derivatization methods available for the analysis of their degradation products. The review concentrates on three of the main CWA classes and includes the nerve agents, the blistering agents and lastly, the incapacitating agents. Each section begins with a brief introduction of the CWA along with discussions of reports dealing with their detection in the intact form by GC-MS. Furthermore, as products arising from their degradation carry as much importance as the agents themselves in the field of forensic analysis, the available derivatization methods of these species are presented for each CWA highlighting some examples from our lab in the Forensic Science Center at the Lawrence Livermore National Laboratory.« less

  7. Analysis of chemical warfare agents by gas chromatography-mass spectrometry: methods for their direct detection and derivatization approaches for the analysis of their degradation products

    DOE PAGES

    Valdez, Carlos A.; Leif, Roald N.; Hok, Saphon; ...

    2017-07-25

    Abstract Chemical warfare agents (CWAs) are unarguably one of the most feared toxic substances produced by mankind. Their inception in conventional warfare can be traced as far back as the Middle Ages but their full breakthrough as central players in bellic conflicts was not realized until World War I. Since then, more modern CWAs along with efficient methods for their manufacture have emerged and violently shaped the way modern warfare and diplomatic relations are conducted. Owing to their mass destruction ability, counter methods to mitigate their impact appeared almost immediately on par with their development. These efforts have focused onmore » their efficient destruction, development of medical countermeasures and their detection by modern analytical chemistry methods. The following review seeks to provide the reader with a broad introduction on their direct detection by gas chromatography-mass spectrometry (GC-MS) and the various sample derivatization methods available for the analysis of their degradation products. The review concentrates on three of the main CWA classes and includes the nerve agents, the blistering agents and lastly, the incapacitating agents. Each section begins with a brief introduction of the CWA along with discussions of reports dealing with their detection in the intact form by GC-MS. Furthermore, as products arising from their degradation carry as much importance as the agents themselves in the field of forensic analysis, the available derivatization methods of these species are presented for each CWA highlighting some examples from our lab in the Forensic Science Center at the Lawrence Livermore National Laboratory.« less

  8. Research in Evaluation Methods for Data Fusion-Capable Tactical Platforms and Distributed Multi-platform Systems in Electronic Warfare and Information-Warfare Related Missions

    DTIC Science & Technology

    2009-02-01

    They support their launches until both outside reds are killed or until second shots are needed. In the baseline scenario shown, US2 achieves 2 kills ...red 5/6 kills . The SUT gate multiplication factor was 5 and 15. The PE gate multiplication factors of 3 and 5, PE designs for Vogel and Hungarian... ploughed in various sections of this land by splitting it into sub plots came to be known as the subplot factor. Such a design is used only when there

  9. Sources of Occupational Stress and Prevalence of Burnout and Clinical Distress Among U.S. Air Force Cyber Warfare Operators

    DTIC Science & Technology

    2013-01-01

    distress within the cyber warfare community. This study involved cyber warfare operators including active duty (n = 376) and civilian contractor and...revealed that when compared to civilian cyber warfare operators, active duty cyber warfare operators are more likely to suffer from the facets of...8217 write-in responses revealed cyber warfare operators attributed shift work, shift changes, and hours worked as the primary sources of high occupational

  10. Cyber warfare and electronic warfare integration in the operational environment of the future: cyber electronic warfare

    NASA Astrophysics Data System (ADS)

    Askin, Osman; Irmak, Riza; Avsever, Mustafa

    2015-05-01

    For the states with advanced technology, effective use of electronic warfare and cyber warfare will be the main determining factor of winning a war in the future's operational environment. The developed states will be able to finalize the struggles they have entered with a minimum of human casualties and minimum cost thanks to high-tech. Considering the increasing number of world economic problems, the development of human rights and humanitarian law it is easy to understand the importance of minimum cost and minimum loss of human. In this paper, cyber warfare and electronic warfare concepts are examined in conjunction with the historical development and the relationship between them is explained. Finally, assessments were carried out about the use of cyber electronic warfare in the coming years.

  11. Analysis of Vessels and Acquisition Methods Utilized to Support Maritime Irregular Warfare

    DTIC Science & Technology

    2010-05-27

    is the maritime component of irregular warfare (IW) or IW conducted from or on a body of water. Figure 1 identifies five fundamental IW operations as...important to examine the listed operations as they relate to MIW. Figure 7 identifies five fundamental IW operations as they relate to the maritime...designed for the insertion and extraction of SEAL team personnel. It is a twin- turbocharged diesel engine, waterjet-propelled personnel carrier with

  12. Unorthodox Thoughts about Asymmetric Warfare

    DTIC Science & Technology

    2003-01-01

    Unorthodox Thoughts about Asymmetric Warfare MONTGOMERY C. MEIGS “Bad terminology is the enemy of good thinking.” — Warren Buffett 1 I n the last few...Mr. Buffett , the Sage of Omaha, and agree on a set of definitions that will provide our tools for analysis. In preempting the terrorist are we really...still apt. 10. Warren Bennis and Burt Nanus, Leaders (New York: HarperCollins, 1997), pp. 102-40. Bennis and Nanus provide a useful construct for

  13. Statistical Analysis of Warfare: Identification of Winning Factors with a Focus on Irregular Warfare

    DTIC Science & Technology

    2015-09-01

    Defense HERO Historical Evaluation and Research Organization IDPs Internally Displaced Persons IFR Initial Force Ratio INITA Relative Imitative...armies started combating non-state, widely dispersed groups. Although this change appears to be quite simple, it has had a deep impact on military...1789–1961: A Study of the Impact of the French, Industrial, and Russian Revolutions on War and its Conduct (Boston, MA: Da Capo Press, 1992). 10 Ibid

  14. Volume 3. Information Age Anthology: The Information Age Military

    DTIC Science & Technology

    2001-03-01

    Science Applications International Corporation, 1996 “Information- Based Warfare and the PRC” by M. Ehsan Ahrari, appeared as an earlier version of...GSRT fused sensor data, tapped data bases , activated resources, and passed templated neurally collated information to each person in exactly the format...because IT binds together hitherto disparate social organizations, including the armed forces, into networks based on shared information and situational

  15. Information Dominance: Can We Afford It

    DTIC Science & Technology

    1997-03-01

    dominate all campaign areas such as air and fire superiority. This paper focuses on information warfare (IW) and its subset, information dominance (ID...the U.S. need information dominance , especially offensively, against second and third world countries, or should it put resources into active defense...Does the U.S. need defensive and offensive modes of information dominance ; can we afford both? Are we headed for information ’overkill’ to gain

  16. MILITARY OPERATIONS IN THE INFORMATION AGE: PUTTING THE COGNITIVE DOMAIN ON TOP

    DTIC Science & Technology

    2017-04-06

    i AIR WAR COLLEGE AIR UNIVERSITY MILITARY OPERATIONS IN THE INFORMATION AGE: PUTTING THE COGNITIVE DOMAIN ON TOP by Sidney A. Connor...in the Information Age: Putting the Cognitive Domain on Top focuses on the application of information to influence combined and synchronized with the...kinetic component of military power as the essence of information age warfare. In the information age, the proliferation of cell phone and

  17. Training Community Modeling and Simulation Business Plan: 2008 Edition

    DTIC Science & Technology

    2009-12-01

    Collaborative information environment. Collaborative tools will help CCDRs and joint staffs plan and disseminate operations, link the staffs to subject matter...anticipating direct and indirect effects as they propagate through political, military, economic, sociological, and information infrastructures. Capabilities...will also 5-11 enhance training for joint staffs and task forces; crisis management; JUO; information warfare; interagency, intergovernmental, and

  18. Information Management and the Biological Warfare Threat

    DTIC Science & Technology

    2002-03-01

    24 2. Scientific-Security Paradigm Interaction........................................ 25 3. Business - Security Paradigm...policies of openness and guardedness and discuss the three paradigms (scientific, business , security ) as a developing factor for information sharing...Trade Center. 3. Business - Security Paradigm Interaction Gene patenting (discussed previously) is utilized by business to protect their

  19. How is the United States Naval Academy Developing and Preparing Surface Warfare Officers: A Needs Analysis of the SWO Leadership Capstone Course

    DTIC Science & Technology

    2007-06-01

    the ship. These cognitive needs can be thought of as what would be taught at the five-month SWOSDOC, the DOSP computer -based training modules, at a...137 a. Can NL401 Provide both Closure and Further Exploration? ...................138 b. Can Both be Accomplished in the Time Allotted...Warfare Officer Community, has no follow-on school; SWO Ensigns are trained by coupling the Division Officer at Sea Program (DOSP) computer based

  20. A Square Peg in a Round Hole: A Case Study of Center Gravity Application in Counter Insurgency Warfare

    DTIC Science & Technology

    2011-06-01

    paradigm historically based on conventional warfare and state-based actors. Underlying questions related to the research question are: Is there a CoG...analysis is still useful by proposing 5 new interpretations of this aged concept. This thesis will examine whether CoG is still useful in...cuts through the confusion and contradictions related to CoG by translating it functionally for the war-fighter. He does this through a

  1. Military chemical warfare agent human subjects testing: part 2--long-term health effects among participants of U.S. military chemical warfare agent testing.

    PubMed

    Brown, Mark

    2009-10-01

    Military chemical warfare agent testing from World War I to 1975 produced thousands of veterans with concerns about how their participation affected their health. A companion article describes the history of these experiments, and how the lack of clinical data hampers evaluation of long-term health consequences. Conversely, much information is available about specific agents tested and their long-term health effects in other populations, which may be invaluable for helping clinicians respond effectively to the health care and other needs of affected veterans. The following review describes tested agents and their known long-term health consequences. Although hundreds of chemicals were tested, they fall into only about a half-dozen pharmaceutical classes, including common pharmaceuticals; anticholinesterase agents including military nerve agents and pesticides; anticholinergic glycolic acid esters such as atropine; acetylcholine reactivators such as 2-PAM; psychoactive compounds including cannabinoids, phencyclidine, and LSD; and irritants including tear gas and riot control agents.

  2. Department of Defenses Enhanced Requirement for Offensive Cyber Warfare Operations

    DTIC Science & Technology

    2010-04-01

    The Department of Defense (DoD) needs to further develop its offensive cyber warfare capabilities at all levels. In an asymmetric environment...battlefields. If the DoD does not prosecute offensive cyber warfare tactics then the DoD has effectively allowed a significant advantage to be given...offensive cyber warfare operations, These states utilize their cyber warfare capabilities to support their national, operational and strategic

  3. Beyond Mission Command: Maneuver Warfare for Cyber Command and Control

    DTIC Science & Technology

    2015-05-18

    operation in an A2AD environment. 15. SUBJECT TERMS command and control; maneuver warfare; cyberspace; cyberspace operations; cyber warfare , mission...Some Principles of Cyber Warfare (NWC 2160) (U.S. Naval War College, Joint Military Operations Department, Newport, RI: U.S. Naval War College...research/ innovationleadership.pdf. Crowell, Richard M. Some Principles of Cyber Warfare (NWC 2160). U.S. Naval War College, Joint Military Operations

  4. The Theory of Unconventional Warfare: Win, Lose, and Draw

    DTIC Science & Technology

    2008-12-01

    UNCONVENTIONAL WARFARE MODEL ...................................12 1. Planning Phase...Superiority over Time........................................................................11  Figure 3.  Unconventional Warfare Model ...superiority through the six principles of UW illustrated below in the UW model . . B. THE UNCONVENTIONAL WARFARE MODEL Figure 3. Unconventional

  5. Cyber warfare: Armageddon in a Teacup?

    DTIC Science & Technology

    2009-12-11

    Security concerns over the growing capability of Cyber Warfare are in the forefront of national policy and security discussions. In order to enable a...realistic discussion of the topic this thesis seeks to analyze demonstrated Cyber Warfare capability and its ability to achieve strategic political...objectives. This study examines Cyber Warfare conducted against Estonia in 2007, Georgia in 2008, and Israel in 2008. In all three cases Cyber Warfare did

  6. At the Crossroads of Cyber Warfare: Signposts for the Royal Australian Air Force

    DTIC Science & Technology

    2011-06-01

    At the Crossroads of Cyber Warfare : Signposts for the Royal Australian Air Force by Craig Stallard, Squadron leader, Royal...in the conduct of cyber warfare . The 2009 Defence White Paper provided some clarity by indentifying cyber warfare as critical to the maintenance...of national security, but left open the most important issue: should cyber warfare be a joint engagement or a service oriented fight? The RAAF

  7. Cyber Warfare: New Character with Strategic Results

    DTIC Science & Technology

    2013-03-01

    The advent of cyber warfare has sparked a debate amongst theorists as to whether timeless Clausewitzian principles remain true in the 21st century...Violence, uncertainty, and rationality still accurately depict the nature of cyber warfare , however, its many defining attributes and means by which...this style of warfare is conducted has definitively changed the character of war. Although cyber warfare is contested in the cyber domain, it often

  8. The challenges experienced by Iranian war veterans living with chemical warfare poisoning: a descriptive, exploratory study.

    PubMed

    Hassankhani, Hadi; Taleghani, Fariba; Mills, Jane; Birks, Melanie; Francis, Karen; Ahmadi, Fazlolah

    2010-06-01

    This exploratory, descriptive study investigates the experiences of Iranian war veterans living with chronic disease acquired as a result of chemical warfare. Sulphur mustard (SM) is considered one of the most important agents of chemical warfare and was widely used during the Iran-Iraq conflict in 1980-1988. There are approximately 100 000 Iranian SM casualties who suffer from serious long-term progressive health problems involving their respiratory organs, eyes and skin. Seventeen male Iranian war veterans aged between 30 and 59 years and four victims' family members participated in the study. Data was generated during individual in-depth interviews that used open-ended questions. Grounded theory techniques, including the constant comparative method of concurrent data generation and analysis, were employed in the analysis of data. Preliminary results indicate two main thematic categories: social isolation and physical disability. It is argued that a lack of knowledge about the outcomes of SM poisoning, physical restrictions and difficulty in adjusting socially decreases war veterans' functional capacity and levels of independence.

  9. The disasters of war in Darfur, 1950-2004.

    PubMed

    Reyna, Stephen P

    2010-01-01

    This article investigates the conflict that had been developing since the 1950s in Darfur and which in 2003 and 2004 burst into intense warfare. A 'complex-structuring of violence' standpoint explains the warfare. The argument is organised in two parts. The first section formulates the position by introducing Darfur, next evaluating the prevailing barbarisation perspective's attempts to explicate Darfur warring and, finally, formally presenting the complex structuring standpoint. The second section offers evidence bearing upon this standpoint. This involves information showing that four interrelated structural realms form a causal complex producing the violence. The article ends with discussion of the US government's role in Darfurian disasters of war.

  10. Countering Internet Extremism

    DTIC Science & Technology

    2009-01-01

    early stages of the conflict, and secure an information warfare victory. Extremists’ use of the Internet has developed rapidly since the Chechen...activities Countering Internet Extremism By Mr. Timothy L. Thomas Editorial Abstract: The author examines the modern informational environment, and...spite of all of these resources—plus all of the money the west has thrown into information (read Internet ) security—an individual known as Irhabi

  11. Rethinking Defensive Information Warfare

    DTIC Science & Technology

    2004-06-01

    Countless studies, however, have demonstrated the weakness in this system.15 The tension between easily remembered passwords and suffi...vulnerabilities Undiscovered flaws The patch model for Internet security has failed spectacularly. Caida , 2004 Signature-Based Defense Anti virus, intrusion

  12. A Better State of War: Surmounting the Ethical Cliff in Cyber Warfare

    DTIC Science & Technology

    2014-06-01

    This study analyzes the emergent field of cyber warfare through the lens of commonly-accepted tenets of ethical warfare. By comparing the...foundational understanding of concepts that determine the justice of wars (jus ad bellum) and justice in war (jus en bello) with the capabilities cyber warfare offers...analyzing how cyber warfare affects each of the core concepts introduced above. The fourth chapter presents a case study that tests the theoretical

  13. Characteristics of the Navy Laboratory Warfare Center Technical Workforce

    DTIC Science & Technology

    2013-09-29

    Mathematics and Information Science (M&IS) Actuarial Science 1510 Computer Science 1550 Gen. Math & Statistics 1501 Mathematics 1520 Operations...Admin. Network Systems & Data Communication Analysts Actuaries Mathematicians Operations Research Analyst Statisticians Social Science (SS...workforce was sub-divided into six broad occupational groups: Life Science , Physical Science , Engineering, Mathematics, Computer Science and Information

  14. Cyber-Warfare: Jus Post Bellum

    DTIC Science & Technology

    2015-03-01

    used to design a cyber - warfare jus post bellum framework. It also analyzes analogies to traditional warfare in the damage assessment and aid provided...and the ability to contain and reverse cyberattacks. This thesis proposes a cyber - warfare jus post bellum framework, with emphasis on prevention and

  15. The role of rewards in motivating participation in simple warfare.

    PubMed

    Glowacki, Luke; Wrangham, Richard W

    2013-12-01

    In the absence of explicit punitive sanctions, why do individuals voluntarily participate in intergroup warfare when doing so incurs a mortality risk? Here we consider the motivation of individuals for participating in warfare. We hypothesize that in addition to other considerations, individuals are incentivized by the possibility of rewards. We test a prediction of this "cultural rewards war-risk hypothesis" with ethnographic literature on warfare in small-scale societies. We find that a greater number of benefits from warfare is associated with a higher rate of death from conflict. This provides preliminary support for the relationship between rewards and participation in warfare.

  16. Portable Solid Phase Micro-Extraction Coupled with Ion Mobility Spectrometry System for On-Site Analysis of Chemical Warfare Agents and Simulants in Water Samples

    PubMed Central

    Yang, Liu; Han, Qiang; Cao, Shuya; Yang, Jie; Yang, Junchao; Ding, Mingyu

    2014-01-01

    On-site analysis is an efficient approach to facilitate analysis at the location of the system under investigation as it can result in more accurate, more precise and quickly available analytical data. In our work, a novel self-made thermal desorption based interface was fabricated to couple solid-phase microextraction with ion mobility spectrometry for on-site water analysis. The portable interface can be connected with the front-end of an ion mobility spectrometer directly without other modifications. The analytical performance was evaluated via the extraction of chemical warfare agents and simulants in water samples. Several parameters including ionic strength and extraction time have been investigated in detail. The application of the developed method afforded satisfactory recoveries ranging from 72.9% to 114.4% when applied to the analysis of real water samples. PMID:25384006

  17. Developing a Hybrid Virtualization Platform Design for Cyber Warfare Training and Education

    DTIC Science & Technology

    2010-06-01

    CYBER WARFARE TRAINING AND EDUCATION THESIS Kyle E. Stewart 2nd...Government. AFIT/GCE/ENG/10-06 DEVELOPING A HYBRID VIRTUALIZATION PLATFORM DESIGN FOR CYBER WARFARE TRAINING...APPROVED FOR PUBLIC RELEASE; DISTRIBUTION UNLIMITED. AFIT/GCE/ENG/10-06 DEVELOPING A HYBRID VIRTUALIZATION PLATFORM DESIGN FOR CYBER WARFARE

  18. Chinese National Strategy of Total War

    DTIC Science & Technology

    2008-06-01

    Cyber Warfare Michael J. Good, BA Major, USA June 2008 APPROVED FOR PUBLIC RELEASE; DISTRIBUTION IS...who allowed me into the Cyber Warfare , my fellow students in the Cyber Warfare IDE program who have been great friends and mentors, and my fellow...Hackers and Other Cyber Criminals .............................................................................41 PLA Cyber Warfare

  19. 77 FR 60678 - Takes of Marine Mammals Incidental to Specified Activities; U.S. Navy Training and Testing...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-10-04

    ...-submarine warfare; mine warfare; naval special warfare; Naval Air Systems Command (NAVAIR) testing; Naval Sea Systems Command (NAVSEA) testing; Space and Naval Warfare Systems Command (SPAWAR) testing; and Office of Naval Research (ONR) and Naval Research Laboratory (NRL) testing. Detailed descriptions of...

  20. Long-Term Effects of Chemical Warfare on Post-traumatic Stress Disorder, Depression, and Chronic Medical Conditions in Veterans.

    PubMed

    Safi-Aghdam, Hamideh; Shafie, Mehrzad; Khoshdel, Alireza; Moazen-Zadeh, Ehsan; Avakh, Farhad; Rahmani, Arash

    2018-04-24

    We investigated the association between exposure to chemical warfare and chronic mental/physical conditions. This was a secondary analysis of data from a case-control study on Iranian male veterans. Participants with neuropsychiatric disorders other than depressive/anxiety disorders, anatomical defects, or malignancies were excluded. Compared to non-exposed veterans, exposed veterans demonstrated significantly higher odds of PTSD [OR (95% CI) = 5.23 (1.98-13.85)], hypertension [OR (95% CI) = 5.57 (1.68-18.48)], coronary heart disease [OR (95% CI) = 6.8 (1.62-28.49)], and diabetes [OR (95% CI) = 3.88 (1.35-11.16)], and marginally higher odds of moderate to severe depressive symptoms [OR (95% CI) = 2.21 (0.93-5.28)]. This study provides preliminary evidence on association of exposure to chemical warfare with long-term mental disorders as well as chronic medical conditions.

  1. Hybrid Warfare: the 21st Century Russian Way of Warfare

    DTIC Science & Technology

    2017-05-25

    in Ukraine, can be best understood by examining it in relation to the ideas and theories of such preeminent theorists as Sun Tzu and Carl von...theories of warfare, of which Russia’s hybrid warfare is one of the most recent. Writing over two thousand years ago, Sun Tzu stated, “The art of...warfare is deceit.”17 Sun Tzu continued, stating that the “highest excellence” in war was not in winning every battle, but in subduing the enemy’s

  2. Active Computer Network Defense: An Assessment

    DTIC Science & Technology

    2001-04-01

    sufficient base of knowledge in information technology can be assumed to be working on some form of computer network warfare, even if only defensive in...the Defense Information Infrastructure (DII) to attack. Transmission Control Protocol/ Internet Protocol (TCP/IP) networks are inherently resistant to...aims to create this part of information superiority, and computer network defense is one of its fundamental components. Most of these efforts center

  3. Introducing the Canadian Information Centric Workspace Concept

    DTIC Science & Technology

    2004-03-01

    information, and (3) collaboration. » Chaum [14] goes even further by arguing that to fully exploit such NCW concept, there must exist a common...Technical Memorandum 2003-085; September 2003, Canada, Unclassified [12] Alberts, David S.; Garstka, John J.; and Stein, Frederick P.; “Netwrok...Centric Warfare: Developing and Leveraging Information Superiority”. Washington, DC, CCRP. August 1999, Unclassified [13] Alberts, David S.; DoD Command

  4. Information Warfare: Evaluation of Operator Information Processing Models

    DTIC Science & Technology

    1997-10-01

    that people can describe or report, including both episodic and semantic information. Declarative memory contains a network of knowledge represented...second dimension corresponds roughly to the distinction between episodic and semantic memory that is commonly made in cognitive psychology. Episodic ...3 is long-term memory for the discourse, a subset of episodic memory . Partition 4 is long-term semantic memory , or the knowledge-base. According to

  5. Fusion of Hierarchical Identity Declaration for Naval Command and Control

    DTIC Science & Technology

    1996-09-06

    potential threat. Deductive reasoning plays a key role in determining behavioral information (Wilson, Ref. 1 ). In warfare, no one piece of...identity information can be obtained. P499630.PDF [Page: 17 of 122] UNCLASSIFIED 6 FIGURE 2- Examples ofinformation Sources and Co:rresponding...with more accurate and timely information concerning the position and identity of detected objects. Examples of such technology advancement follow

  6. Space War Meets Info War: The Integration of Space and Information Operations

    DTIC Science & Technology

    2000-04-01

    spacelift, command and control of satellites, and surveillance and deconfliction of systems in space.” (4, xi) These operations provide the physical ...PSYOPS), electronic warfare (EW), physical attack/destruction, special information operations (SIO), and may include computer network attack. (3, viii... physical security, counter-deception, counter- propaganda, counter-intelligence, EW, and SIO. (3, viii) Information operations employ both lethal and non

  7. Cyberspace Warfare: A New DoD Core Mission Area

    DTIC Science & Technology

    2013-05-01

    information in the same way that people thrive on sumptuous cuisine . What sort of information? Stuff like how to crack passwords that open the portals... French , demonstrating the use of information to shape the strategic environment.”17 This united Northern Germany and Southern Germany as one nation...28 defeat their adversary in detail. On the other hand, the French elected to adopt a

  8. Understanding the operational environment: implications for advanced visualizations

    NASA Astrophysics Data System (ADS)

    Aleva, Denise; Fitzhugh, Elisabeth; Dixon, Sharon

    2009-05-01

    With the changing character of warfare, information superiority is a high priority. Given the complexity of current and future operating environments, analysts, strategists and planners need a multidimensional understanding of the battlespace. Asymmetric warfare necessitates that our strategists look beyond targets-based operations, where we simply identify and destroy enemy entities. Effects-based operations models the enemy as a system which reacts to our actions. This requires the capability to predict the adversary response to a selected action. Actions may be diplomatic, information, military or economic (DIME). Effects may be political, military, economic, social, information or infrastructure (PMESII). Timing must be explicitly considered and effects dynamically assessed. Visualizations of intelligence information are needed which will promote full understanding of all aspects of adversary strengths and weaknesses by providing the extensive data about adversary forces, organic essentials, infrastructure, leadership, population, and science and technology in an easily accessible and understandable format. This will enhance Effectsbased operations, and therefore, the capability to predict and counter adversary courses of action. This paper outlines a systems engineering approach to designing visualizations which convey the multidimensional information to decision makers. Visualization issues inherent in understanding the multidimensional operational environment will be discussed.

  9. 78 FR 53109 - Security Zones; Naval Base Point Loma; Naval Mine Anti-Submarine Warfare Command; San Diego Bay...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-08-28

    ...-AA87 Security Zones; Naval Base Point Loma; Naval Mine Anti-Submarine Warfare Command; San Diego Bay... Anti-Submarine Warfare Command to protect the relocated marine mammal program. These security zone... Warfare Command, the Commander of Naval Region Southwest, or a designated representative of those...

  10. Identification - Friend or Foe? The Strategic Uses and Future Implications of the Revolutionary New ID Technologies

    DTIC Science & Technology

    2006-04-26

    technologies might offer us those means. The Means – Securing the Battlespace by Leveraging Information Dominance A suicide bomber intent on achieving his...be a watershed for netcentric warfare – the transition of information dominance from force multiplier to new capability. 67 It would serve as a prime

  11. The Information Revolution and International Stability: A Multi-Article Exploration of Computing, Cyber, and Incentives for Conflict

    ERIC Educational Resources Information Center

    Schneider, Jacquelyn

    2017-01-01

    Over the last twenty years, the digital technologies of the information revolution have fundamentally impacted the nature of modern warfare and introduced significant uncertainty about capabilities, intentions, and the limits of conflict. How do these digital advances and the explosion of cyber technologies on and off the battlefield impact…

  12. Insurgent Uprising: An Unconventional Warfare Wargame

    DTIC Science & Technology

    2017-12-01

    collection of information, including suggestions for reducing this burden, to Washington headquarters Services , Directorate for Information Operations...Command (USSOCOM) trains , equips, and restructures to meet future UW requirements, a classroom-based practical exercise educational tool may prove critical...preparation of UW exercises in all training environments including the qualification courses, JADE HELM, and the Combined Training Center (CTC) rotations

  13. Ontology for the Intelligence Analyst

    DTIC Science & Technology

    2012-12-01

    Intelligence and Information Warfare Directorate Shouvik Bardhan , High Performance Technologies, Incorporated Jamie Johnson, EOIR Technologies...to soldiers. E-mail: kesny.parent@us.army.mil Shouvik Bardhan has more than 25 years of experience in the field of complex software design and

  14. Battlespace Dominance 󈨤: Winning the Information War

    DTIC Science & Technology

    1996-06-01

    NRaD is uniquely qualified to provide the expertise and tools to achieve information dominance . Almost every NRaD effort deals with acquiring data, transforming data into...prototyping to fully produced systems. NRaD is applying these capabilities to the central element of future naval warfare information dominance . NRaD’s vision...making information dominance for the warrior a reality is based on achieving five interrelated objectives, or Corporate Initiatives. Our first

  15. Employing Inform and Influence Activities to Neutralize Cross-Border Sanctuaries in Counterinsurgency Operations

    DTIC Science & Technology

    2013-05-20

    II-9 – II-10. 17 Boehnert, John and Nasi , Jamie, “Military Information Support Operations in the Trans-Sahel” (Special Warfare, January-March 2013...Boehnert, and Nasi , “Military Information Support Operations in the Trans-Sahel.” 19 Boehnert and Nasi , “Military Information Support Operations in...messaging nested with strategic objectives. According to Boehnert and Nasi , “All MIST activities are nested in the various theater, operational and

  16. Navy Information Dominance, the Battle of Midway, and the Joint Force Commander: It Worked Then, It Needs to Work Now

    DTIC Science & Technology

    2013-05-19

    cyberspace, is putting increased emphasis on the need for the Joint Force Commander to employ his force to achieve Information Dominance . The information... Information Dominance is to assist in achieving Decision Superiority, Assured Command and Control, Battlespace Awareness, and Integrated Fires. Navy... Information Dominance aims to use information in cyberspace as a way and means in warfare -- as a battery in the Joint Force Commander’s arsenal. The

  17. Deactivating Chemical Agents Using Enzyme-Coated Nanofibers Formed by Electrospinning

    DTIC Science & Technology

    2016-01-01

    7.3mM/mg). Key words Coaxial electrospinning, DFPase, Enzyme, chemical warfare , nanofiber, decontamination . Introduction Chemical warfare ...Krile, R.; Nishioka, M.; Taylor, M.; Riggs, K.; Stone, H. Decontamination of Toxic Industrial Chemicals and Chemical Warfare Agents On Building...298 (Rev. 8-98) Prescribed by ANSI Std. Z39.18 MATS COATINGS ELECTROSPINNING CHEMICAL WARFARE

  18. Toxic Warfare

    DTIC Science & Technology

    2002-02-01

    Prepared for the United States Air Force Approved for public release; distribution unlimited Theodore Karasik Project AIR FORCE R TOXIC WARFARE...Report Documentation Page Report Date 000002002 Report Type N/A Dates Covered (from... to) - Title and Subtitle Toxic Warfare Contract Number Grant...310) 451-6915; Email: order@rand.org Library of Congress Cataloging-in-Publication Data Karasik, Theodore William. Toxic warfare / Theodore Karasik

  19. Small Ships Revival: From Cold War Anti-Invasion and Guerrilla Warfare Tactics to Highly Capable Force Multiplier in Littoral and Expeditionary Warfare

    DTIC Science & Technology

    2010-05-03

    this gap might be filled. It will focus on the surface warfare aspect of sea control, though it touches on antiair warfare, mine warfare and...Sea As the flotilla acquired battle power […] the vital, most difficult, and most absorbing problem has become not how to increase the power of a...proving that their performance is absolutely necessary to these operations. Com Fr Amphib TG of the NATO Reaction Force-8 after Exercise Brilliant Midas

  20. The Chinese People’s Liberation Army and Information Warfare

    DTIC Science & Technology

    2014-03-01

    information confrontation operations across the elec- tromagnetic spectrum. In doing so, as Dr. Wortzel’s monograph explains, the PLA used innovative means...and in- formation confrontation operations across the electro- magnetic spectrum. As this monograph explains, the PLA used innovative means to...depend on information technology. Naviga- tion and positioning is no longer done with compasses or sextants, maps , or charts; it is done with satellite

  1. Redefining Information Warfare Boundaries for an Army in a Wireless World

    DTIC Science & Technology

    2013-01-01

    development. For example, such a generic requirement might involve detection, identification, tracking, and kill - ing a class of targets by nonkinetic...Merging Information Operations and Psychological Operations,” Military Review, January–February 2008, pp. 108–111. Rosin, Randolph, “To Kill a... Mockingbird : The Deconstruction of Information Operations,” Small Wars Journal, August 17, 2009. As of December 6, 2010: http://smallwarsjournal.com/blog

  2. 78 FR 72025 - Security Zones; Naval Base Point Loma; Naval Mine Anti Submarine Warfare Command; San Diego Bay...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-12-02

    ...-AA87 Security Zones; Naval Base Point Loma; Naval Mine Anti Submarine Warfare Command; San Diego Bay... establishing a new security zone at the Naval Mine and Anti-Submarine Warfare Command to protect the relocated... Commander of Naval Base Point Loma, the Commander of the Naval Mine Anti Submarine Warfare Command, and the...

  3. Intrafamily and intragenomic conflicts in human warfare

    PubMed Central

    2017-01-01

    Recent years have seen an explosion of multidisciplinary interest in ancient human warfare. Theory has emphasized a key role for kin-selected cooperation, modulated by sex-specific demography, in explaining intergroup violence. However, conflicts of interest remain a relatively underexplored factor in the evolutionary-ecological study of warfare, with little consideration given to which parties influence the decision to go to war and how their motivations may differ. We develop a mathematical model to investigate the interplay between sex-specific demography and human warfare, showing that: the ecology of warfare drives the evolution of sex-biased dispersal; sex-biased dispersal modulates intrafamily and intragenomic conflicts in relation to warfare; intragenomic conflict drives parent-of-origin-specific patterns of gene expression—i.e. ‘genomic imprinting’—in relation to warfare phenotypes; and an ecological perspective of conflicts at the levels of the gene, individual, and social group yields novel predictions as to pathologies associated with mutations and epimutations at loci underpinning human violence. PMID:28228515

  4. Intrafamily and intragenomic conflicts in human warfare.

    PubMed

    Micheletti, Alberto J C; Ruxton, Graeme D; Gardner, Andy

    2017-02-22

    Recent years have seen an explosion of multidisciplinary interest in ancient human warfare. Theory has emphasized a key role for kin-selected cooperation, modulated by sex-specific demography, in explaining intergroup violence. However, conflicts of interest remain a relatively underexplored factor in the evolutionary-ecological study of warfare, with little consideration given to which parties influence the decision to go to war and how their motivations may differ. We develop a mathematical model to investigate the interplay between sex-specific demography and human warfare, showing that: the ecology of warfare drives the evolution of sex-biased dispersal; sex-biased dispersal modulates intrafamily and intragenomic conflicts in relation to warfare; intragenomic conflict drives parent-of-origin-specific patterns of gene expression-i.e. 'genomic imprinting'-in relation to warfare phenotypes; and an ecological perspective of conflicts at the levels of the gene, individual, and social group yields novel predictions as to pathologies associated with mutations and epimutations at loci underpinning human violence. © 2017 The Authors.

  5. Accurate positioning based on acoustic and optical sensors

    NASA Astrophysics Data System (ADS)

    Cai, Kerong; Deng, Jiahao; Guo, Hualing

    2009-11-01

    Unattended laser target designator (ULTD) was designed to partly take the place of conventional LTDs for accurate positioning and laser marking. Analyzed the precision, accuracy and errors of acoustic sensor array, the requirements of laser generator, and the technology of image analysis and tracking, the major system modules were determined. The target's classification, velocity and position can be measured by sensors, and then coded laser beam will be emitted intelligently to mark the excellent position at the excellent time. The conclusion shows that, ULTD can not only avoid security threats, be deployed massively, and accomplish battle damage assessment (BDA), but also be fit for information-based warfare.

  6. Information Warfare and Cyber Defense

    DTIC Science & Technology

    2002-04-22

    Information Technology Trends Power Is Up 1980 1982 1986 1989 1992 1996 1998 2000 286 386 486 Pentium P6 Pentium 4 286k 1MB 4MB 16MB 64MB 256 MB...384 MBDRAM CPU (Source: EIA, CNET, Gartner, Dell -- 2000) 2002 512 MB Pentium 4/ Celeron 5 Information Technology Trends Price Is Down Cost per MIPS...Operations Architecture Technology Info Assurance PDD-56 PDD-63 PDD-68 Information Operations Focus Areas Elements • PSYOP • Deception • EW •

  7. 14th Annual Expeditionary Warfare Conference

    DTIC Science & Technology

    2009-11-19

    Untitled Document 2009expedition.html[5/12/2016 8:33:22 AM] 14th ANNUAL EXPEDITIONARY WARFARE CONFERENCE “Expeditionary Warfare in a Complex Joint...WWW.NDIA.ORG/MEETINGS/0700 “Expeditionary Warfare in a Complex Joint Operating Environment” BAY POINT MARRIOTT HOTEL, PANAMA CITY, FL...Focus: The purpose of the Quadrennial Defense Review (QDR) is to determine the nation’s defense strategy and establish a defense program for

  8. Creating Paths of Change: Under What Conditions Can Special Operations be the Supported Command

    DTIC Science & Technology

    2018-03-01

    goals.” Daft, Essentials of Organization Theory and Design , 48); I. V. Gordon et al., Comparing US Army Systems with Foreign Counterparts: Identifying...CODE A 13. ABSTRACT (maximum 200 words) This thesis focuses on command and control for irregular warfare operations and the organizational design ...compound warfare, unconventional warfare, special action force, village stability operations, organizational design , conventional warfare

  9. Electronic Warfare for Cyber Warriors

    DTIC Science & Technology

    2008-06-01

    This research paper provides complete course content for the AFIT EENG 509, Electronic Warfare class. It is intended as a replacement for the existing course and designed for Intermediate Developmental Education (IDE) students in the Cyber Warfare degree program. This course provides relevant academic courseware and study material to give cyber warriors an academic and operational perspective on electronic warfare and its integration in the cyber domain.

  10. U.S. Command Relationships in the Conduct of Cyber Warfare: Establishment, Exercise, and Institutionalization of Cyber Coordinating Authority

    DTIC Science & Technology

    2010-05-03

    FINAL 3. DATES COVERED (From - To) 4. TITLE AND SUBTITLE U.S. Command Relationships in the Conduct of Cyber Warfare : Establishment...U.S. Command Relationships in the Conduct of Cyber Warfare : Establishment, Exercise, and Institutionalization of Cyber Coordinating Authority...Relationships in the Conduct of Cyber Warfare : Establishment, Exercise, and Institutionalization of Cyber Coordinating Authority The character of

  11. Remote sensing of chemical warfare agent by CO2 -lidar

    NASA Astrophysics Data System (ADS)

    Geiko, Pavel P.; Smirnov, Sergey S.

    2014-11-01

    The possibilities of remote sensing of chemical warfare agent by differential absorption method were analyzed. The CO2 - laser emission lines suitable for sounding of chemical warfare agent with provision for disturbing absorptions by water vapor were choose. The detection range of chemical warfare agents was estimated for a lidar based on CO2 - laser The other factors influencing upon echolocation range were analyzed.

  12. 33 CFR 165.1103 - Security Zone; Naval Mine Anti Submarine Warfare Command; San Diego Bay, San Diego, CA.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... Submarine Warfare Command; San Diego Bay, San Diego, CA. 165.1103 Section 165.1103 Navigation and Navigable... Eleventh Coast Guard District § 165.1103 Security Zone; Naval Mine Anti Submarine Warfare Command; San... the Naval Mine Anti Submarine Warfare Command, bound by the following coordinates: 32°43′40.9″ N, 117...

  13. Electronic Warfare Closed Loop Laboratory (EWCLL) Antenna Motor Software and Hardware Development

    DTIC Science & Technology

    2016-09-01

    ARL-TN-0779 ● SEP 2016 US Army Research Laboratory Electronic Warfare Closed Loop Laboratory (EWCLL) Antenna Motor Software and...Electronic Warfare Closed Loop Laboratory (EWCLL) Antenna Motor Software and Hardware Development by Neal Tesny Sensors and Electron Devices Directorate...TITLE AND SUBTITLE Electronic Warfare Closed Loop Laboratory (EWCLL) Antenna Motor Software and Hardware Development 5a. CONTRACT NUMBER 5b

  14. Mammalian Toxicology Testing: Problem Definition Study, Global Army Toxicology Requirements.

    DTIC Science & Technology

    1981-03-01

    Electronic Warfare Equipment (D251) Tactical ECK System (64750A) Protective Electronic Warfare Equipment (D540) High Energy Electromagnetic Radiation...Fighting Portable Weapon (for IFV) Smoke Grenade Launcher Staff Smart, Target-Activated Fire-and-Forget Tactical ECK System (63755A) Protective Electronic...Warfare Equipment (D251) Tactical ECK System (64750A) Protective Electronic Warfare Equipment (D540) High Energy Electromagnetic Radiation Weapons (e.g

  15. Cyberspace, the 7th Joint Function for 21st Century Warfare

    DTIC Science & Technology

    2017-03-31

    such as final, technical, interim, memorandum, master’s thesis, progress, quarterly, research, special, group study, etc . 3. DATE COVERED...procedures, e.g. RD/FRD, PROPIN, ITAR, etc . Include copyright information. 13. SUPPLEMENTARY NOTES. Enter information not included...elsewhere such as: prepared in cooperation with; translation of; report supersedes; old edition number, etc . 14. ABSTRACT. A brief (approximately

  16. Complexity Theory and Network Centric Warfare

    DTIC Science & Technology

    2003-09-01

    realms of the unknown. Defence thinkers everywhere are searching forward for the science and alchemy that will deliver operational success. CCRP...0188 Public reporting burden for the collection of information is estimated to average 1 hour per response, including the time for reviewing...instructions, searching existing data sources, gathering and maintaining the data needed, and completing and reviewing the collection of information. Send

  17. Enterprises as Inquiring Systems with Implications for Information Warfare

    DTIC Science & Technology

    2014-06-01

    Systems Engineering Department 777 Dyer Rd. Monterey, CA 93943 (831) 656-2957 gamiller@nps.edu Ronald E. Giachetti Naval Postgraduate School...Systems Engineering Department regiache@nps.edu Abstract This paper incorporates what is termed an inquiry model into a model of information...ES) Naval Postgraduate School,Systems Engineering Department,777 Dyer Rd.,Monterey,CA,93943 8. PERFORMING ORGANIZATION REPORT NUMBER 9. SPONSORING

  18. 78 FR 22527 - Army Science Board Request for Information on Technology and Core Competencies

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-04-16

    ...); Edgewood Chemical Biological Command (ECBC); Natick Soldier Research, Development & Engineering Center...; C4ISR; Night Vision; Chemical/Biological Warfare; and Soldier Systems. The study will focus on...); Armament Research, Development & Engineering Center (ARDEC); Aviation & Missile Research, Development...

  19. An Inverse Analysis Approach to the Characterization of Chemical Transport in Paints

    PubMed Central

    Willis, Matthew P.; Stevenson, Shawn M.; Pearl, Thomas P.; Mantooth, Brent A.

    2014-01-01

    The ability to directly characterize chemical transport and interactions that occur within a material (i.e., subsurface dynamics) is a vital component in understanding contaminant mass transport and the ability to decontaminate materials. If a material is contaminated, over time, the transport of highly toxic chemicals (such as chemical warfare agent species) out of the material can result in vapor exposure or transfer to the skin, which can result in percutaneous exposure to personnel who interact with the material. Due to the high toxicity of chemical warfare agents, the release of trace chemical quantities is of significant concern. Mapping subsurface concentration distribution and transport characteristics of absorbed agents enables exposure hazards to be assessed in untested conditions. Furthermore, these tools can be used to characterize subsurface reaction dynamics to ultimately design improved decontaminants or decontamination procedures. To achieve this goal, an inverse analysis mass transport modeling approach was developed that utilizes time-resolved mass spectroscopy measurements of vapor emission from contaminated paint coatings as the input parameter for calculation of subsurface concentration profiles. Details are provided on sample preparation, including contaminant and material handling, the application of mass spectrometry for the measurement of emitted contaminant vapor, and the implementation of inverse analysis using a physics-based diffusion model to determine transport properties of live chemical warfare agents including distilled mustard (HD) and the nerve agent VX. PMID:25226346

  20. Methods of Organizational Information Security

    NASA Astrophysics Data System (ADS)

    Martins, José; Dos Santos, Henrique

    The principle objective of this article is to present a literature review for the methods used in the security of information at the level of organizations. Some of the principle problems are identified and a first group of relevant dimensions is presented for an efficient management of information security. The study is based on the literature review made, using some of the more relevant certified articles of this theme, in international reports and in the principle norms of management of information security. From the readings that were done, we identified some of the methods oriented for risk management, norms of certification and good practice of security of information. Some of the norms are oriented for the certification of the product or system and others oriented to the processes of the business. There are also studies with the proposal of Frameworks that suggest the integration of different approaches with the foundation of norms focused on technologies, in processes and taking into consideration the organizational and human environment of the organizations. In our perspective, the biggest contribute to the security of information is the development of a method of security of information for an organization in a conflicting environment. This should make available the security of information, against the possible dimensions of attack that the threats could exploit, through the vulnerability of the organizational actives. This method should support the new concepts of "Network centric warfare", "Information superiority" and "Information warfare" especially developed in this last decade, where information is seen simultaneously as a weapon and as a target.

  1. The Characterization and Measurement of Cyber Warfare, Spring 2008 - Project 08-01

    DTIC Science & Technology

    2008-05-01

    Global Innovation and Strategy Center The Characterization and Measurement of Cyber Warfare Spring 2008 – Project 08-01 May 2008...and Measurement of Cyber Warfare N/A N/A N/A 08-01Dobitz, Kyle Haas, Brad Holtje, Michael Jokerst, Amanda Ochsner, Geoff Silva, Stephanie...research team as critical for purposes of cyber act characterization: Motivation, Intent, Target, Effects, and Actors. cyberspace, cyber warfare , targets

  2. Refocusing Cyber Warfare Thought

    DTIC Science & Technology

    2013-02-01

    January–February 2013 Air & Space Power Journal | 44 FeatureCyber Focus Refocusing Cyber Warfare Thought Maj Sean C. Butler, USAF In September 2007...1. REPORT DATE FEB 2013 2. REPORT TYPE 3. DATES COVERED 00-00-2013 to 00-00-2013 4. TITLE AND SUBTITLE Refocusing Cyber Warfare Thought 5a...2013 Air & Space Power Journal | 45 Butler Refocusing Cyber Warfare Thought FeatureCyber Focus characterized by the use of electronics and the

  3. Nodes and Codes: The Reality of Cyber Warfare

    DTIC Science & Technology

    2012-05-17

    Nodes and Codes explores the reality of cyber warfare through the story of Stuxnet, a string of weaponized code that reached through a domain...nodes. Stuxnet served as a proof-of-concept for cyber weapons and provided a comparative laboratory to study the reality of cyber warfare from the...military powers most often associated with advanced, offensive cyber attack capabilities. The reality of cyber warfare holds significant operational

  4. Cyberspace as a Complex Adaptive System and the Policy and Operational Implications for Cyber Warfare

    DTIC Science & Technology

    2014-05-22

    CYBERSPACE AS A COMPLEX ADAPTIVE SYSTEM AND THE POLICY AND OPERTIONAL IMPLICATIONS FOR CYBER WARFARE A Monograph by Major Albert O. Olagbemiro...serves the US, especially in regards to the protect ion o f the 1S. SUBJECT TERMS omplex Adaptive System, Cyberspace, lnfosphere, Cyber Warfare ber...System and the Policy and Operational Implications for Cyber Warfare Approved by: __________________________________, Monograph Director Jeffrey

  5. Warfighting in Cyberspace

    DTIC Science & Technology

    2007-01-01

    warfare ). Although the defensive elements of IO and cyber warfare are important, to narrow the scope of our thesis, the remainder of the argu- ment...adversary decisions away from taking action against our will. Now, let us contrast IO doctrine with what we propose for cyber warfare . The focus of... cyber warfare is on using cyberspace (by operating within or through it) to attack personnel, facilities, or equipment with the intent of degrading

  6. Defending Our Satellites: The Need for Electronic Warfare Education and Training

    DTIC Science & Technology

    2015-12-01

    intercept Allied bombers attacking at night.9 As a result of the electronic warfare advantage that systems like Window and Airborne Cigar be- stowed...74 | Air & Space Power Journal Defending Our Satellites The Need for Electronic Warfare Education and Training Lt Col E. Lincoln Bonner, USAF...expanding education and training in the use of electronic warfare to defend US satellites and improve their survivability. The following discussion

  7. Highlights of the Department of the Navy FY 2013 Budget

    DTIC Science & Technology

    2012-02-01

    ability to perform undersea warfare to include high altitude launched torpedo capability, surface warfare and ISR missions make it a critical force...60B and SH-60F helicopters, whose primary mission areas are undersea warfare and surface warfare. This platform will have numerous capability...sensors to detect, localize, classify and identify undersea threats at a safe distance from friendly ships. The Remote Multi-Mission Vehicle provides

  8. Remaining Relevant: Historical Contributions, Civil-Military Challenges, and Anti-Submarine Warfare Capabilities on Coast Guard Cutters

    DTIC Science & Technology

    2018-03-01

    HISTORICAL CONTRIBUTIONS, CIVIL-MILITARY CHALLENGES, AND ANTI-SUBMARINE WARFARE CAPABILITIES ON COAST GUARD CUTTERS by Brian A. Smicklas...CONTRIBUTIONS, CIVIL- MILITARY CHALLENGES, AND ANTI-SUBMARINE WARFARE CAPABILITIES ON COAST GUARD CUTTERS 5. FUNDING NUMBERS 6. AUTHOR(S) Brian A...MILITARY CHALLENGES, AND ANTI-SUBMARINE WARFARE CAPABILITIES ON COAST GUARD CUTTERS Brian A. Smicklas Commander, U.S. Coast Guard B.S., Coast

  9. An Australian Land Force for Conflict in a World Without Precedent (Future Warfare Concept Paper)

    DTIC Science & Technology

    2009-01-01

    Michael B. Ryan, Australian Army Thesis: The current pace of change in the global security environment and information technology demands that, like...information) Wave societies.6 The current pace of change in the global security environment and information technology demands that, like all...Blue, downloaded from www.defence.gov.au/navy; La Franchi , Peter, “High Level Interoperability: Future Development of t Peter, “Development Role

  10. The Art of Aerial Warfare

    DTIC Science & Technology

    2005-03-01

    14 3 THE POLITICAL DIMENSIONS OF AERIAL WARFARE . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17 How Political Effects in...Aerial Warfare . . . . . . Outweigh Military Effects . . . . . . . . . . . . . . . 19 Political Targets Versus Military Targets . . . . . 22...34 4 MILITARY AND POLITICAL EFFECTS OF STRATEGIC ATTACK . . . . . . . . . . . . . . . . . . 35 The Premise of

  11. A Statistical Analysis of the Output Signals of an Acousto-Optic Spectrum Analyzer for CW (Continuous-Wave) Signals

    DTIC Science & Technology

    1988-10-01

    A statistical analysis on the output signals of an acousto - optic spectrum analyzer (AOSA) is performed for the case when the input signal is a...processing, Electronic warfare, Radar countermeasures, Acousto - optic , Spectrum analyzer, Statistical analysis, Detection, Estimation, Canada, Modelling.

  12. Distributed collaborative environments for predictive battlespace awareness

    NASA Astrophysics Data System (ADS)

    McQuay, William K.

    2003-09-01

    The past decade has produced significant changes in the conduct of military operations: asymmetric warfare, the reliance on dynamic coalitions, stringent rules of engagement, increased concern about collateral damage, and the need for sustained air operations. Mission commanders need to assimilate a tremendous amount of information, make quick-response decisions, and quantify the effects of those decisions in the face of uncertainty. Situational assessment is crucial in understanding the battlespace. Decision support tools in a distributed collaborative environment offer the capability of decomposing complex multitask processes and distributing them over a dynamic set of execution assets that include modeling, simulations, and analysis tools. Decision support technologies can semi-automate activities, such as analysis and planning, that have a reasonably well-defined process and provide machine-level interfaces to refine the myriad of information that the commander must fused. Collaborative environments provide the framework and integrate models, simulations, and domain specific decision support tools for the sharing and exchanging of data, information, knowledge, and actions. This paper describes ongoing AFRL research efforts in applying distributed collaborative environments to predictive battlespace awareness.

  13. The Bear Went Through the Mountain: Russia Appraises its Five-Day War in South Ossetia

    DTIC Science & Technology

    2009-01-01

    troops in an information deficit . The main problem was noted as “the lack of the requisite space grouping and GLONASS receivers.”26 Electronic warfare...people while imposing on them goals useful to the one using the information weapon. Methods include both constant information noise and an information...American Gillette because its steel was better. The latter produced a smoother shave only because the West coated their blades with a polymer compound of

  14. The Story of the Defense Technical Information Center 1945 - 1995, 50 Years of Information for Defense

    DTIC Science & Technology

    1995-07-01

    necessary. As John Naisbitt observed in his 1982 book Megatrends , ...with the coming of the infor- mation society, we have for the first time an economy...information in the hands of many. —John Naisbitt Megatrends As the Defense Technical Information Center moves forward into the last decade of the...Gulf War, for example, Iraq’s leader, Saddam Hussein, threatened to use biological or biochemical warfare. To defend against this threat, the U.S

  15. Development of JSDF Cyber Warfare Defense Critical Capability

    DTIC Science & Technology

    2010-03-01

    attack identification capability is essential for a nation to defend her vital infrastructures against offensive cyber warfare . Although the necessity of...cyber-attack identification capability is quite clear, the Japans preparation against cyber warfare is quite limited.

  16. 15th Annual Expeditionary Warfare Conference - Expeditionary Operations - What’s Next

    DTIC Science & Technology

    2010-10-07

    00 PM - 5:00 PM Mine Warfare Capabilities Essential for Expeditionary Warfare Salon 1 (limited to first 120 registrants) Session Focus...have priority – Requires additional conceptual development, gaming & exercises Questions? 23

  17. CYBER WARFARE GOVERNANCE: EVALUATION OF CURRENT INTERNATIONAL AGREEMENTS ON THE OFFENSIVE USE OF CYBER

    DTIC Science & Technology

    2015-10-01

    AIR COMMAND AND STAFF COLLEGE DISTANCE LEARNING AIR UNIVERSITY CYBER WARFARE GOVERNANCE: EVALUATION OF CURRENT INTERNATIONAL AGREEMENTS ON THE...order to prevent catastrophic second and third order effects. Rule 43 “prohibits means or methods of cyber warfare that indiscriminate by nature...Means and methods of cyber warfare are indiscriminate by nature if they cannot be: directed at a specific military objective, or limited in their

  18. Cyber Warfare: A Need for Beyond Goldwater-Nichols

    DTIC Science & Technology

    2011-05-13

    of Military Studies Research Paper September 2010- May 2011 4. TITLE AND SUBTITLE 5a. CONTRACT NUMBER Cyber Warfare : "A Need for Beyond Goldwater...22134-5068 MASTER OF MlLIT AR Y STUDJES Cyber Warfare : "A Need for Beyond Goldwater Nichols" SlffiMITTED IN PARTIAL FULFitLMENT OF THE...DOCUMENT IS PERMITTED PROVIDED PROPER ACKNOWLEDGEMENT IS MADE.· l . ii EXECUTIVE SUMMARY Title: Cyber Warfare : "A Need for Beyond Goldwater Nichols

  19. Civil Affairs in Unconventional Warfare

    DTIC Science & Technology

    2013-05-23

    goals as Mao Tse -tung states, “Military action is a method used to attain a political goal. While military affairs and political affairs are not...OSS to Green Beret: The Birth at Special Forces (Novato, CA: Presidio Press, 1986), 149-51. 25Mao Tse -tung, On Guerrilla Warfare (New York: Classic...House Books, 2009), 39. 26David Galula, Counterinsurgency Warfare, 4; and Mao Tse -tung, On Guerrilla Warfare, 3-4. 27Ibid., 12-13. 28Ibid

  20. Piezocomposites for Active Surface Control

    DTIC Science & Technology

    1999-01-19

    and the Underwater Sound Reference Detachment (USRD) in Orlando, FL. During the period of the program, USRD became part of the Naval Undersea Warfare...Appendix B DEPARTMENT OF THE NAVY NAVAL UNDERSEA WARFARE CENTER 1176 HOWELL STREET NEWPORT Rl 02«41-170i NAVAL UNDERSEA WARFARE CENTER...dissemination only as directed by Commanding Officer, Naval Undersea Warfare Center (18 AUG i99o ) or higher DoD authority. Page 1 of 1 USRD CALIBRATION

  1. Chemical warfare and the Gulf War: a review of the impact on Gulf veterans' health.

    PubMed

    Riddle, James R; Brown, Mark; Smith, Tyler; Ritchie, Elspeth Cameron; Brix, Kelley Ann; Romano, James

    2003-08-01

    It is unlikely that Gulf War veterans are suffering chronic effects from illnesses caused by chemical warfare nerve agent exposure. Extensive investigation and review by several expert panels have determined that no evidence exists that chemical warfare nerve agents were used during the Gulf War. At no time before, during, or after the war was there confirmation of symptoms among anyone, military or civilian, caused by chemical warfare nerve agent exposure. However, studies of Gulf War veterans have found belief that chemical weapons were used, significantly associated with both severe and mild-moderate illnesses. The psychological impact of a chemical warfare attack, either actual or perceived, can result in immediate and long-term health consequences. The deployment or war-related health impact from life-threatening experiences of the Gulf War, including the perceived exposure to chemical warfare agents, should be considered as an important cause of morbidity among Gulf War veterans.

  2. Report of the Defense Science Board Task Force On Information Warfare - Defense (IW-D)

    DTIC Science & Technology

    1996-11-01

    pathogens. Partnerships NCID provides epidemiological, microbiologic , and consultative services to federal agencies, state and local health departments...FOR DETECTING LOCAL OR LARGE-SCALE ATTACKS, AND FOR ADAPTATION TO SUPPORT GRACEFUL DEGRADATION * TESi •BEDS AND SIMULATION-BASED MECHANISMS FOR

  3. American Policy toward Eastern Bloc Countries Influencing the Hungarian Revolution of 1956

    DTIC Science & Technology

    2013-06-13

    Brochure ........................................................................38 Figure 4. Organizational Chart of Contributing Agencies for the...Figure 3. Crusade for Freedom Brochure Source: Dwight D. Eisenhower Official Files, Psychological Warfare, Box...Crusade published informational pamphlets to be distributed by well known civic organizations and clubs. The

  4. Management of chemical warfare injuries (on CD-ROM). Data file

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    NONE

    1996-08-01

    The threat of use of chemical warfare agents (agents of `mass destruction`) is no longer confined to the battlefield. Agent releases by terrorists in Japan in 1995 served to awaken the world to the dangers faced by civilian communities far removed from centers of armed conflict. The ability to save lives in the event of a chemical agent release turns on provision of immediate and correct medical care in the field and hospital. Being able to ensure availability of life-saving care depends on reaching both military and civilian medical personnel with information on chemical warfare agents and on keeping theirmore » skills and knowledge current. While this is of critical importance both to the Department of Defense and to civilian agencies charged with protecting the public, it also is a daunting and potentially expensive task in view of the numbers and geographic dispersion of persons to be trained. The Department of Defense has addressed and overcome these challenges, to the benefit of the military and civilians, by using computer technology as the vehicle by which cost-effective chemical warfare agent training may be conveniently delivered to all who require it. The multi-media instructional program, Management of Chemical Warfare Injuries, was developed for military use by the Naval Health Sciences Education and Training Command, with the technical assistance of the U.S. Army Medical Command. It was originally designed for delivery via video disc, a format used extensively within the Navy. However, in response to a request from the Federal Emergency Management Agency, the Office of the Secretary of Defense agreed to repackage the materials for delivery on CD-ROM in order to make them accessible to a larger audience. In addition, the Navy agreed to include on the two CD-ROMs which contain the program a ready reference not found on the video disc: the Army`s `Medical Management of Chemical Casualties` handbooks for field and medical personnel.« less

  5. The implicit rules of combat.

    PubMed

    Romero, Gorge A; Pham, Michael N; Goetz, Aaron T

    2014-12-01

    Conspecific violence has been pervasive throughout evolutionary history. The current research tested the hypotheses that individuals implicitly categorize combative contexts (i.e., play fighting, status contests, warfare, and anti-exploitative violence) and use the associated contextual information to guide expectations of combative tactics. Using U.S. and non-U.S. samples, Study 1 demonstrated consistent classification of combative contexts from scenarios for which little information was given and predictable shifts in the acceptability of combative tactics across contexts. Whereas severe tactics (e.g., eye-gouging) were acceptable in warfare and anti-exploitative violence, they were unacceptable in status contests and play fights. These results suggest the existence of implicit rules governing the contexts of combat. In Study 2, we explored the reputational consequences of violating these implicit rules. Results suggest that rule violators (e.g., those who use severe tactics in a status contest) are given less respect. These are the first studies to implicate specialized mechanisms for aggression that use contextual cues of violence to guide expectations and behavior.

  6. Detection of hazardous chemicals using field-portable Raman spectroscopy

    NASA Astrophysics Data System (ADS)

    Wright, Cherylyn W.; Harvey, Scott D.; Wright, Bob W.

    2003-07-01

    A major challenge confronting emergency response, border control, and other security-related functions is the accurate, rapid, and safe identification of potentially hazardous chemicals outside a laboratory environment. Raman spectroscopy is a rapid, non-intrusive technique that can be used to confidently identify many classes of hazardous and potentially explosive compounds based on molecular vibration information. Advances in instrumentation now allow reliable field - portable measurements to be made. Before the Raman technique can be effectively applied and be accepted within the scientific community, realistic studies must be performed to develop methods, define limitations, and rigorously evaluate its effectiveness. Examples of a variety of chemicals (including neat and diluted chemical warfare [CW] agents, a CW agent precursor, a biological warfare (BW)-related compound, an illicit drug, and explosives) identified using Raman spectroscopy in various types of containers and on surfaces are given, as well as results from a blind field test of 29 unknown samples which included CW agent precursors and/or degradation products, solvents associated with CW agent production, pesticides, explosives, and BW toxins (mostly mycotoxins). Additionally, results of experimental studies to evaluate the analysis of flammable organic solvents, propellants, military explosives, mixtures containing military explosives, shock-sensitive explosives, and gun powders are described with safety guidelines. Spectral masks for screening unknown samples for explosives and nerve agents are given.

  7. An evolving joint space campaign concept and the Army's role

    NASA Astrophysics Data System (ADS)

    Franke, Henry G., III

    1992-05-01

    This monograph examines the question of an evolving joint space campaign concept and the Army's role in it over the next 20 years. Analysis progresses logically through a series of topics in order to arrive at a complete picture of this evolutionary space campaign concept, as well as the Army's place in it. Space plays an increasingly important role in US military operations, particularly when tied together with advances in information management. The synergistic impact due to the combination of these two areas suggests a revolution in the nature of modern warfare which saw its emergence during the 1991 Gulf War. With this theme in mind, I review the Army's roles, missions, and historical involvement in space, then present technological opportunities and a perspective on investment strategies for military space. A detailed discussion of a near-term military space theory and current space doctrines supports the need for an accepted military space theory as a foundation for Joint and Service space doctrines, space campaign design and conduct, and space force generation. The basis for such a theory is established using Julian Corbett's maritime warfare theory as a point of departure, while recognizing that space as a unique military operating medium requires its own theory and a regime to govern the application of space forces.

  8. Organizing the Army for Information Warfare

    DTIC Science & Technology

    2013-03-01

    US’s reputation in the global community, but by pilfering intellectual property, foiling industrial controls, and ‘ hacking ’ into secured networks...human factors can be exploited to discern passwords and circumvent other physical safeguards that secure cyber infrastructure.48 The increasing...Ranking of America’s Largest Corporations.” 7 David F. Carr, Information Week, January 25, 2012, “ Facebook : The Database Of Wealth And Power,” http

  9. Protecting the United States Against Information Warfare

    DTIC Science & Technology

    2000-04-01

    Information Systems Protection, An Invitation to a Dialogue, 2. ECommerce , "Business to Business to Consumer, Transaction Enabled Internet Solutions," n.d...available from <http://www.cplus.net/ ecommerce /estats.html>; Internet; accessed 7 February 2000. 7 Clinton, Defending America’s Cyberspace... ECommerce . "Business to Business to Consumer, Transaction Enabled Internet Solutions." n.d. Available from < http://www.cplus.net/ ecommerce

  10. Network Centric Warfare, Command, and the Nature of War

    DTIC Science & Technology

    2009-05-21

    technologies. This future is a possibility arising from the current trend of developments in information and communication technologies. These...technologies are developing at such a rate that it is difficult for organizations to adapt quickly enough to exploit the advantages of emerging new...revolution. In fact, some contemporary military theorists argue that developments in information technologies are the catalyst for a new military

  11. Cyber Power in the 21st Century

    DTIC Science & Technology

    2008-12-01

    Cyber Warfare .................................................................86 V. Conclusions and Recommendations...40 2 – Asymmetric Effects of Cyber Warfare ........................................................................41 1 CYBER POWER... cyber warfare capabilities with other elements of national power, as evidenced by the concept of “informationization” (xinxihua) put forward in

  12. Difficult Decisions: Chemical Warfare.

    ERIC Educational Resources Information Center

    Slesnick, Irwin L.; Miller, John A.

    1988-01-01

    Gives the background history and chemistry of modern day chemical warfare from World War I to the present. Provides discussion questions to stimulate deeper thinking on the issue. Contains a discussion activity called "Can New Chemical Weapons Lead to Humane Warfare?" (CW)

  13. Technological advancements for the detection of and protection against biological and chemical warfare agents.

    PubMed

    Eubanks, Lisa M; Dickerson, Tobin J; Janda, Kim D

    2007-03-01

    There is a growing need for technological advancements to combat agents of chemical and biological warfare, particularly in the context of the deliberate use of a chemical and/or biological warfare agent by a terrorist organization. In this tutorial review, we describe methods that have been developed both for the specific detection of biological and chemical warfare agents in a field setting, as well as potential therapeutic approaches for treating exposure to these toxic species. In particular, nerve agents are described as a typical chemical warfare agent, and the two potent biothreat agents, anthrax and botulinum neurotoxin, are used as illustrative examples of potent weapons for which countermeasures are urgently needed.

  14. Chemical and biological warfare: General studies. (Latest citations from the NTIS bibliographic database). NewSearch

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Not Available

    1994-10-01

    The bibliography contains citations concerning federally sponsored and conducted studies into chemical and biological warfare operations and planning. These studies cover areas not addressed in other parts of this series. The topics include production and storage of agents, delivery techniques, training, military and civil defense, general planning studies, psychological reactions to chemical warfare, evaluations of materials exposed to chemical agents, and studies on banning or limiting chemical warfare. Other published searches in this series on chemical warfare cover detection and warning, defoliants, protection, and biological studies, including chemistry and toxicology. (Contains 250 citations and includes a subject term index andmore » title list.)« less

  15. Chemical and biological warfare: General studies. (Latest citations from the NTIS bibliographic database). Published Search

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    NONE

    1997-11-01

    The bibliography contains citations concerning federally sponsored and conducted studies into chemical and biological warfare operations and planning. These studies cover areas not addressed in other parts of this series. The topics include production and storage of agents, delivery techniques, training, military and civil defense, general planning studies, psychological reactions to chemical warfare, evaluations of materials exposed to chemical agents, and studies on banning or limiting chemical warfare. Other published searches in this series on chemical warfare cover detection and warning, defoliants, protection, and biological studies, including chemistry and toxicology.(Contains 50-250 citations and includes a subject term index and titlemore » list.) (Copyright NERAC, Inc. 1995)« less

  16. Chemical and biological warfare: General studies. (Latest citations from the NTIS bibliographic database). Published Search

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    NONE

    1996-10-01

    The bibliography contains citations concerning federally sponsored and conducted studies into chemical and biological warfare operations and planning. These studies cover areas not addressed in other parts of this series. The topics include production and storage of agents, delivery techniques, training, military and civil defense, general planning studies, psychological reactions to chemical warfare, evaluations of materials exposed to chemical agents, and studies on banning or limiting chemical warfare. Other published searches in this series on chemical warfare cover detection and warning, defoliants, protection, and biological studies, including chemistry and toxicology. (Contains 50-250 citations and includes a subject term index andmore » title list.) (Copyright NERAC, Inc. 1995)« less

  17. Chemical and biological warfare: General studies. (Latest citations from the NTIS bibliographic database). Published Search

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    NONE

    1995-09-01

    The bibliography contains citations concerning federally sponsored and conducted studies into chemical and biological warfare operations and planning. These studies cover areas not addressed in other parts of this series. The topics include production and storage of agents, delivery techniques, training, military and civil defense, general planning studies, psychological reactions to chemical warfare, evaluations of materials exposed to chemical agents, and studies on banning or limiting chemical warfare. Other published searches in this series on chemical warfare cover detection and warning, defoliants, protection, and biological studies, including chemistry and toxicology.(Contains 50-250 citations and includes a subject term index and titlemore » list.) (Copyright NERAC, Inc. 1995)« less

  18. Air & Space Power Journal. Volume 22, Number 3, Fall 2008

    DTIC Science & Technology

    2008-09-01

    PHd, UsaF, retired* Red Flag exercises, well known as training components of air warfare, will also become a staple of cyber warfare . —Former...it wishes to meet former secretary Wynne’s vision of a significantly enhanced cyber - warfare environ­ ment. This change is so monumental that full...this reviewer’s judgment, only one area does not receive adequate examination: cyber warfare . Although Drew and Snow make note of it in several

  19. RFID as a Tool in Cyber Warfare

    DTIC Science & Technology

    2010-11-01

    RTO-MP-IST-091 P4 - 1 RFID as a Tool in Cyber Warfare Mikko Kiviharju P.O.Box 10 FIN-11311 Riihimaki FINLAND mikko.kiviharju@mil.fi...auditing existing systems and planning new establishments. 1 INTRODUCTION Cyber warfare , especially computer network operations (CNO) have a deep...SUBTITLE RFID as a Tool in Cyber Warfare 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER 6. AUTHOR(S) 5d. PROJECT NUMBER 5e. TASK

  20. Cyber Warfare as an Operational Fire

    DTIC Science & Technology

    2010-04-03

    This paper explores cyber warfare as an option for creating operational fires effects. Initially, cyberspace is defined and explained from the...fires are defined and the advantages of their use are explained. From there, discussion focuses on how cyber warfare fulfills the purposes of...operational fires. Finally, the paper draws conclusions about the viability of cyber warfare as an operational fire and makes recommendations about how to prioritize the activities of the newly approved U.S. Cyber Command.

  1. Emerging Roles of Combat Communication Squadrons in Cyber Warfare as Related to Computer Network Attack, Defense and Exploitation

    DTIC Science & Technology

    2011-06-01

    EMERGING ROLES OF COMBAT COMMUNICATION SQUADRONS IN CYBER WARFARE AS RELATED TO COMPUTER NETWORK ATTACK, DEFENSE AND EXPLOITATION GRADUATE RESEARCH...Communication Squadrons in Cyber Warfare as Related to Computer Network Attack, Defense and Exploitation GRADUATE RESEARCH PROJECT Presented to the Faculty...Education and Training Command In Partial Fulfillment of the Requirements for the Degree of Master of Cyber Warfare Michael J. Myers Major, USAF June 2011

  2. Counter-Unmanned Aerial Vehicle Warfare: Kill Authorizations for the Carrier Strike Group

    DTIC Science & Technology

    2016-06-10

    COUNTER-UNMANNED AERIAL VEHICLE WARFARE: KILL AUTHORIZATIONS FOR THE CARRIER STRIKE GROUP A thesis presented to the Faculty...the Carrier Strike Group 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER 6. AUTHOR(S) LCDR Joshua C. Mattingly, U.S...including armed UAVs in an offensive role, but counter- UAV warfare is a new warfare area within the larger realm of air defense. Small Group 1 and 2

  3. Warfare or partnership: which way for health care?

    PubMed

    MacStravic, R S

    1990-01-01

    There are many voices urging health care organizations to adopt aggressive competitive warfare, but a careful look at the dynamics affecting health care suggests that partnership may be at least as promising a strategy as warfare to promote mission and survival.

  4. Cyber Warfare: Protecting Military Systems

    DTIC Science & Technology

    2000-01-01

    Software is a key component in nearly every critical system used by the Department of Defense. Attacking the software in a system- cyber warfare - is a...revolutionary method of pursuing war. This article describes various cyber warfare approaches and suggests methods to counter them.

  5. Black Lights: Chaos, Complexity, and the Promise of Information Warfare

    DTIC Science & Technology

    1997-01-01

    control— cybernetics—and the etymology of control, a term which comes from the Latin contrarotulare, mean- ing to mark similarities and differences...in the brain and central nervous system. Chemistry domi- nated life processes for four billion years until primitive electronics became important when

  6. Information Fusion and Visualisation in Anti Asymmetric Warfare

    DTIC Science & Technology

    2006-12-01

    thermal detectors (e.g. bolometers). They used the MWIR and LWIR part of the IR spectrum. Quantum detectors realize an image rate of over 100Hz while... panorama image by image fusion of several sensors components. EO designators are distinguished through their agility and increased resolution

  7. Computer Networks and Information Warfare: Implications for Military Operations

    DTIC Science & Technology

    2000-07-01

    specifically referring to this network.” Marshall T. Rose, The Simple Book: An Introduction to Management of TCP/IP based internets (Englewood...Cliffs, New Jersey: Prentice Hall, 1991), p. 2. 22. Marshall T. Rose, The Simple Book: An Introduction to Management of TCP/IP based internets

  8. Cyberspace Dependence in Air Force Flying Squadrons and its Effect on Mission Assurance

    DTIC Science & Technology

    2010-06-01

    book Managerial Guide for Handling Cyber-Terrorism and Information Warfare, Lech Janczewski and Andrew Colarik advocate the need for organizations...of Cyber Operations,” High Frontier, 5(3): 11-15 (May 2009). Janczewski, Lech and Andrew Colarik. Managerial Guide for Handling Cyber

  9. The Three Warfares: PLA Soft Power Aspirations Along the Cognitive Dimension

    DTIC Science & Technology

    2011-06-01

    U.S.A.: Meridian, 1991; 1967), 147. 79 Gabriel Marcella and Army War College (U.S.). Strategic Studies Institute, Teaching Strategy: Challenge and...Research Service; for sale by the National Technical Information Service. Marcella , Gabriel, and Army War College (U.S.). Strategic Studies Institute

  10. Identification of vapor-phase chemical warfare agent simulants and rocket fuels using laser-induced breakdown spectroscopy

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Stearns, Jaime A.; McElman, Sarah E.; Dodd, James A.

    2010-05-01

    Application of laser-induced breakdown spectroscopy (LIBS) to the identification of security threats is a growing area of research. This work presents LIBS spectra of vapor-phase chemical warfare agent simulants and typical rocket fuels. A large dataset of spectra was acquired using a variety of gas mixtures and background pressures and processed using partial least squares analysis. The five compounds studied were identified with a 99% success rate by the best method. The temporal behavior of the emission lines as a function of chamber pressure and gas mixture was also investigated, revealing some interesting trends that merit further study.

  11. Summary of Research 1998, Interdisciplinary Academic Groups

    DTIC Science & Technology

    1999-08-01

    Seismic Sonar, Biosonar SEISMO ACOUSTIC DETECTION OF MINES BURIED IN THE SURF ZONE Thomas Muir, Chair of Mine Warfare Undersea Warfare Academic Group...Mine Warfare KEYWORDS: Mining, Mine Countermeasures, Surf Zone, Seismic Sonar, Biosonar PHYSICS OF SEISMIC INTERFACE WAVES IN THE SURF ZONE

  12. History of the Chemical Warfare Service in World War II. Biological Warfare Research in the United States, Volume 2

    DTIC Science & Technology

    1947-11-01

    of proteins and other substances of high molecular weight derived from bacteria, or from natural products with antibacterial activity Proteins and...WARFARE RESEARCH IS THE UNITED r STATES, is one of a series of historical monographs on the research and development activities of the Chemical...TSC Committee 16 War Research Service 13 A5C Committee •• 21 CWS Activities Under TSRS 22 Transfer of Biological Warfare Program to TTar

  13. USAF Cyber Capability Development: A Vision for Future Cyber Warfare & a Concept for Education of Cyberspace Leaders

    DTIC Science & Technology

    2009-04-01

    Significant and interrelated problems are hindering the Air Force’s development of cyber warfare capabilities. The first is a lack of awareness about...why the AF has chosen to take cyber warfare on as a core capability on par with air and space. The second stems from the lack of a commonly...the cyber capabilities needed in the future? The contributions of this research include a strategic vision for future cyber warfare capabilities that

  14. Capability of the People’s Republic of China to Conduct Cyber Warfare and Computer Network Exploitation

    DTIC Science & Technology

    2009-10-09

    Capability of the People’s Republic of China to Conduct Cyber Warfare and Computer Network Exploitation Prepared for The US-China Economic and...the People?s Republic of China to Conduct Cyber Warfare and Computer Network Exploitation 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM ELEMENT...Capability of the People’s Republic of China to Conduct Cyber Warfare and Computer Network Exploitation 2 US-China Economic and Security Review

  15. Status of dental health in chemical warfare victims: the case of Isfahan, Iran.

    PubMed

    Mottaghi, Ahmad; Hoseinzade, Abolfath; Zamani, Elham; Araghizade, Habib Allah

    2012-01-01

    Little evidence is available regarding the dental health of victims of chemical warfare in Iran. Therefore, in this study, we examined the decayed, missing, and filled teeth index (DMFT), community periodontal index of treatment needs (CPITN), and saliva secretion rate of chemical warfare victims living in the province of Isfahan in Iran. This case-control study was conducted with 300 chemical warfare victims as the treatment group and 300 age-matched individuals without exposure to chemical warfare as the control group. DMFT and CPITN indices and saliva secretion rate were measured and compared between the two groups. Chemical warfare victims had significantly higher scores than the control group for decayed teeth (4.25 ± 3.88 vs 3.52 ± 2.81; P=0.009), missing teeth (8.79 ± 9.3 vs 6.15 ± 8.43; P<0.001), total DMFT index (17.00 ± 6.72 vs 13.20 ± 6.89; P<0.001), and CPTIN (2.81 ± 0.81 vs 1.71 ± 1.04; P<0.001). However, no significant difference was observed between the two groups in filled teeth (4.00 ± 4.2 vs 3.59 ± 2.48; P=0.148). The level of saliva secretion in warfare victims was significantly lower than that in the control group (1.71 ± 0.05 vs 3.85 ± 1.95 cc/5 min; P<0.001). Chemical warfare victims have relatively poor dental/oral health. Chemical injury might cause a dysfunction in saliva secretion, with decrease in saliva secretion increasing the risk for tooth decay and periodontal disorders. Further research is required to find out the exact underlying mechanisms and the factors associated with poor dental/oral health in chemical warfare victims.

  16. Detecting Biological Warfare Agents

    PubMed Central

    Song, Linan; Ahn, Soohyoun

    2005-01-01

    We developed a fiber-optic, microsphere-based, high-density array composed of 18 species-specific probe microsensors to identify biological warfare agents. We simultaneously identified multiple biological warfare agents in environmental samples by looking at specific probe responses after hybridization and response patterns of the multiplexed array. PMID:16318712

  17. Reevaluation of 1999 Health-Based Environmental Screening Levels (HBESLs) for Chemical Warfare Agents

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Watson, Annetta Paule; Dolislager, Fredrick G

    2007-05-01

    This report evaluates whether new information and updated scientific models require that changes be made to previously published health-based environmental soil screening levels (HBESLs) and associated environmental fate/breakdown information for chemical warfare agents (USACHPPM 1999). Specifically, the present evaluation describes and compares changes that have been made since 1999 to U.S. Environmental Protection Agency (EPA) risk assessment models, EPA exposure assumptions, as well as to specific chemical warfare agent parameters (e.g., toxicity values). Comparison was made between screening value estimates recalculated with current assumptions and earlier health-based environmental screening levels presented in 1999. The chemical warfare agents evaluated include themore » G-series and VX nerve agents and the vesicants sulfur mustard (agent HD) and Lewisite (agent L). In addition, key degradation products of these agents were also evaluated. Study findings indicate that the combined effect of updates and/or changes to EPA risk models, EPA default exposure parameters, and certain chemical warfare agent toxicity criteria does not result in significant alteration to the USACHPPM (1999) health-based environmental screening level estimates for the G-series and VX nerve agents or the vesicant agents HD and L. Given that EPA's final position on separate Tier 1 screening levels for indoor and outdoor worker screening assessments has not yet been released as of May 2007, the study authors find that the 1999 screening level estimates (see Table ES.1) are still appropriate and protective for screening residential as well as nonresidential sites. As such, risk management decisions made on the basis of USACHPPM (1999) recommendations do not require reconsideration. While the 1999 HBESL values are appropriate for continued use as general screening criteria, the updated '2007' estimates (presented below) that follow the new EPA protocols currently under development are also protective. When EPA finalizes and documents a position on the matter of indoor and outdoor worker screening assessments, site-specific risk assessments should make use of modified models and criteria. Screening values such as those presented in this report may be used to assess soil or other porous media to determine whether chemical warfare agent contamination is present as part of initial site investigations (whether due to intentional or accidental releases) and to determine whether weather/decontamination has adequately mitigated the presence of agent residual to below levels of concern. However, despite the availability of scientifically supported health-based criteria, there are significant resources needs that should be considered during sample planning. In particular, few analytical laboratories are likely to be able to meet these screening levels. Analyses will take time and usually have limited confidence at these concentrations. Therefore, and particularly for the more volatile agents, soil/destructive samples of porous media should be limited and instead enhanced with headspace monitoring and presence-absence wipe sampling.« less

  18. Open-Air Biowarfare Testing and the Evolution of Values

    PubMed Central

    2016-01-01

    The United States and the United Kingdom ended outdoor biological warfare testing in populated areas nearly half a century ago. Yet, the conduct, health effects, and propriety of those tests remain controversial. The varied views reflect the limits of currently available test information and evolving societal values on research involving human subjects. Western political culture has changed since the early days of the American and British testing programs. People have become less reluctant to question authority, and institutional review boards must now pre-approve research involving human subjects. Further, the heightened stringency of laboratory containment has accentuated the safety gap between a confined test space and one without physical boundaries. All this makes it less likely that masses of people would again be unwittingly subjected to secret open-air biological warfare tests. PMID:27564984

  19. PHILIS (PORTABLE HIGH-THROUGHPUT INTEGRATED LABORATORY IDENTIFICATION SYSTEM)

    EPA Pesticide Factsheets

    These mobile laboratory assets, for the on-site analysis of chemical warfare agent (CWA) and toxic industrial compound (TIC) contaminated environmental samples, are part of the evolving Environmental Response Laboratory Network (ERLN).

  20. Metal-Organic Framework Modified Glass Substrate for Analysis of Highly Volatile Chemical Warfare Agents by Paper Spray Mass Spectrometry.

    PubMed

    Dhummakupt, Elizabeth S; Carmany, Daniel O; Mach, Phillip M; Tovar, Trenton M; Ploskonka, Ann M; Demond, Paul S; DeCoste, Jared B; Glaros, Trevor

    2018-03-07

    Paper spray mass spectrometry has been shown to successfully analyze chemical warfare agent (CWA) simulants. However, due to the volatility differences between the simulants and real G-series (i.e., sarin, soman) CWAs, analysis from an untreated paper substrate proved difficult. To extend the analytical lifetime of these G-agents, metal-organic frameworks (MOFs) were successfully integrated onto the paper spray substrates to increase adsorption and desorption. In this study, several MOFs and nanoparticles were tested to extend the analytical lifetimes of sarin, soman, and cyclosarin on paper spray substrates. It was found that the addition of either UiO-66 or HKUST-1 to the paper substrate increased the analytical lifetime of the G-agents from less than 5 min detectability to at least 50 min.

  1. Proceedings from the conference on high speed computing: High speed computing and national security

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Hirons, K.P.; Vigil, M.; Carlson, R.

    1997-07-01

    This meeting covered the following topics: technologies/national needs/policies: past, present and future; information warfare; crisis management/massive data systems; risk assessment/vulnerabilities; Internet law/privacy and rights of society; challenges to effective ASCI programmatic use of 100 TFLOPs systems; and new computing technologies.

  2. Hybrid Warfare: How to Shape Special Operations Forces

    DTIC Science & Technology

    2016-06-10

    irregular tactics, information operations, and deliberate terrorism as they waged war against Russia in the territory of Chechnya and o deep in Russian...Russia initially had to withdraw its forces from Chechnya , but later led by a former KGB operative, Vladimir Putin, were able to defeat the Chechen rebels

  3. Communications Security: A Timeless Requirement While Conducting Warfare

    DTIC Science & Technology

    2012-04-10

    services remotely to connect to the Global Information Grid ( GIG ). The GIG is the essential gateway to the Internet that DISA uses to allow service...nations that 16 thrive off free market and global economies . These hostile actors, such as Al Qaida or Hezbollah, do not posses the

  4. Night Jungle Operations

    DTIC Science & Technology

    1993-02-19

    and artificial features to march on, and sometimes by 5th columnists who would light bonfires to serve as points to march on. Control was maintained...Feb 1943, p.9. 7. U.S. War Department, Military Intellegence Division, "Notes on Japanese Warfare", Information Bulletin No. 8, (Washington D.C.: U.S

  5. Restraint in Urban Warfare: The Canadian Attack on Groningen, Netherlands, 13-16 April 1945

    DTIC Science & Technology

    2013-06-13

    Netherlands under orders to limit civilian casualties and collateral damage. Their reasons for imposing these limitations and their experiences in...firepower were offset by information on enemy locations. The key to success turned out to be the closest possible cooperation between armour and...

  6. Movie Images of Disability and War: Framing History and Political Ideology.

    ERIC Educational Resources Information Center

    Safran, Stephen P.

    2001-01-01

    In this article, six Academy Award-winning movies about warfare and disability are analyzed by synthesizing historical information, characteristics of specific disability conditions, and disability-related social issues. Each film's content is examined, with emphasis on how each may potentially influence viewer understanding of disability.…

  7. A Description of the DoD Test and Evaluation Process for Electronic Warfare Systems

    DTIC Science & Technology

    1994-06-13

    Center J-MASS Joint Modeling and Simulation System A-2 MDA Milestone Decision Authority MNS Mission Need Statement MOE Measument of Effectivenes MOP...PSYCHOLOGICAL OPERATIONS (PSYOP) Planned operations to convey selected information and indicators to foreign audiences to influence their emotions, motive

  8. Armed with Information: Evolving Public Affairs to Deliver Operational Effects

    DTIC Science & Technology

    2009-04-01

    Recommendations and Conclusions The epitome of skill is to defeat your enemy without physically engaging him in battle. —Sun Szu Evolving existing PA...Applied Warfare Course coursebook , edited by Sharon McBride, 19-36. Maxwell AFB, AL: Air University Press, October 2008. Krepinevich, Andrew F

  9. Application of the Strategic Alignment Model and Information Technology Governance Concepts to Support Network Centric Warfare

    DTIC Science & Technology

    2006-03-01

    Defense, Editor. 2001. 12. Defense, D.o., Department of Defense Architecture Framework Deskbook. 2004, Department of Defense. 13. Denzin , N. and...Y. Lincoln , Handbook of Qualitative Research. 2000, California: Sage. 14. Flick, U., An Introduction to Qualitative research: Theory, method and

  10. Fighting Networks: The Defining Challenge of Irregular Warfare

    DTIC Science & Technology

    2011-06-01

    Terror on the Internet, describes the collection of this information as “data mining ,” and describes extensive research, information sharing using...suicide bombings. The first, a dramatically increased use of mines and IEDs, reflects both their ability to emplace such explosive devices stealthfully, as...well as the Russian reliance on more static positions supported by road arteries. The ‘ mine warfare’ employed by the Chechen fighters presented

  11. Modern Warfare From the Colombian Perspective

    DTIC Science & Technology

    2008-01-01

    Approved: ~-e::::- - Date: 1?’ r;>-- Zd’.tf? r . Oral Defense Committee Member:~f).~ r~::Y· Approved: ...----- .) Date: 8’ ,«4’"\\ 260& Report Documentation...Page Form ApprovedOMB No. 0704-0188 Public reporting burden for the collection of information is estimated to average 1 hour per response, including...reducing this burden, to Washington Headquarters Services, Directorate for Information Operations and Reports , 1215 Jefferson Davis Highway, Suite 1204

  12. Vital Interests, Virtual Threats: Reconciling International Law with Information Warfare and United States Security

    DTIC Science & Technology

    2001-03-01

    natural resources and physical labor were broad meas­ urements of the wealth of a business , a corporation , or a state.18 With the globalization of ...5 Global Grid . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23 6 Components of Information Superiority...point where the source of attacks can be verified. 6 Notes 1. John D. Jones and Marc F. Griesbach, eds., Just War Theory in the Nuclear Age (Lanham

  13. Equipping Network Warfare: Industrial-Era Bureaucracies for Information-Era Weapons

    DTIC Science & Technology

    2009-04-01

    Scientist , Air Force Research Lab Information Directorate; Dr. John Parker, Chief Technical Officer, GlimmerGlass Corportation; Mr. J. Michael Kretzer...operations.2 Additionally, the Air Force has established a functional management office within the Air Staff, has created a formal schoolhouse and...found that overall research and development costs exceeded their budget by 40% in Fiscal Year 2005 (up from 27% in 2000), while total acquisition costs

  14. Russia’s Approach to Cyber Warfare (1Rev)

    DTIC Science & Technology

    2017-03-01

    Steinitz, CNA. Approved by: March 2017 Ken E. Gause, RTL International Affairs Group Center for Strategic Studies REPORT DOCUMENTATION PAGE...the help of information networks.”7 Russian military thinkers on information operations IO and asymmetric military tactics, Col. S.G. Chekinov (Res...adversaries, influence public opinion, and reduce an opponent’s will to resist.8 Cyber IO affords the Russian government covert means to achieve these

  15. KITAE I: Edge Organisation in Battlespace Helmand

    DTIC Science & Technology

    2011-06-01

    military organization with its own culture that frustrates the timely delivery of complete information to the authority with assets to take synchronized...21st century information technologies, we have a 19th century military organization with its own culture that frustrates the timely delivery of...Table 5.0 QEQ NOV Table 6.0 QEQ DEC Table 7.0 QEQ JAN 4 Asymmetric warfare is a confrontation between political, cultural , social and

  16. The New Wizard War: Challenges and Opportunities for Electronic Warfare in the Information Age

    DTIC Science & Technology

    2007-11-06

    Camp: Preparing for Conflict in the Information Age (Santa Monica, CA: RAND Corporation, 1997):175. 17. Jeffrey R . Cares, “An Information Age Combat...60. Stephen Trimble, “US Army Moves Back Into Electronic Attack Mission.” 61. Richard R . Burgess, “Jamming: The Marine Corps Refines Its Vision of...November 7, 2005), http://www.aviationweek.com/aw/generic/story_generic.jsp?channel= awst &id=news/11075p 2.xml (accessed 29 Oct 07). 74. David A

  17. Surface Warfare Officers Initial Training For Future Success

    DTIC Science & Technology

    2018-03-01

    updating and creating learning modules and Surface Warfare Officer School (SWOS) staffing as well as weaknesses in the methodologies used for...and Surface Warfare Officer School (SWOS) staffing as well as weaknesses in the methodologies used for training. We conclude that the Basic Division... METHODOLOGY ....................................................................................9 1. Staff Interviews

  18. The Implications of Preemptive and Preventive War Doctrines: A Reconsideration

    DTIC Science & Technology

    2007-07-01

    geopolitics, ideology , and personality as combining to produce the fatal brew which resulted in 42 years of nuclear shadowed global menace.26 But...preventive war. 49 1. Preventive war is war, and preventive warfare is warfare. It is not a distinctive genus of war and warfare. The distinguishing

  19. 15 CFR 742.2 - Proliferation of chemical and biological weapons.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... in ECCN 1C350 (precursor and intermediate chemicals used in the production of chemical warfare agents... on the CCL, chemical detection systems controlled by 1A004.c for detecting chemical warfare agents... used in the production of chemical weapons precursors or chemical warfare agents. (vii) Equipment and...

  20. Biodegradation of Organophosphate Chemical Warfare Agents by Activated Sludge

    DTIC Science & Technology

    2012-03-01

    Holmstedt, B. (1963). Structure- activity relationships of the organophosphorus anticholinesterase agents. In: Koelle, G.B. (ed.), Handbuch...BIODEGRADATION OF ORGANOPHOSPHATE CHEMICAL WARFARE AGENTS BY ACTIVATED SLUDGE Steven J. Schuldt...AFIT/GES/ENV/12-M04 BIODEGRADATION OF ORGANOPHOSPHATE CHEMICAL WARFARE AGENTS BY ACTIVATED SLUDGE THESIS Presented to the

  1. Examining U.S. Irregular Warfare Doctrine

    DTIC Science & Technology

    2008-06-01

    48 Future Theories ...Questions, and Hypotheses The classic warfare theories (i.e. Sun Tzu, Clausewitz, and so forth) directly apply to this research since they form the...Tzu, their theories on the conduct of warfare, and its close tie to politics, form the basis for examining the content of the manuals. The Marine

  2. Technical Support Services for the Office of Naval Research Littoral Warfare Advanced Development Project

    DTIC Science & Technology

    2005-09-30

    Technical Support Services for the Office of Naval Research Littoral Warfare Advanced Development Project William R. Metzger Marine...Support Services for the Office of Naval Research Littoral Warfare Advanced Development Project 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM ELEMENT

  3. The Future of Warfare and Impact of Space Operations

    DTIC Science & Technology

    2011-01-01

    cyber warfare is occurring as a preferred method of conflict between large players on the global stage. Smaller players also have reasons to avoid conventional warfare and remain hidden. In Iraq and Afghanistan, those who fight against us attempt to remain hidden. The individual who places an improvised explosive device (IED) attempts to engage us without exposure or identification. Those who aid the individual emplacing an IED do so with hidden networks of support. The IED is an anonymous weapon. Both cyber warfare and insurgent use of IEDs depend

  4. Software Acquisition in the Age of Cyber Warfare

    DTIC Science & Technology

    2011-05-01

    s c h o o l o f S Y S T E M S a n d L O G I S T I C S education service research Software Acquisition in the Age of Cyber Warfare Maj...DATE MAY 2011 2. REPORT TYPE 3. DATES COVERED 00-00-2011 to 00-00-2011 4. TITLE AND SUBTITLE Software Acquisition in the Age of Cyber Warfare 5a...AFIT Cyber 200/300 Courses Cyber Warfare IDE Program 34 Special Emphasis On… Enterprise Integration (Active Directory, PKI) Security

  5. The Fate of Chemical Warfare Agents in the Environment

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Talmage, Sylvia Smith; Munro, Nancy B; Watson, Annetta Paule

    2007-01-01

    Chemical Warfare Agents, Second Edition has been totally revised since the successful first edition and expanded to about three times the length, with many new chapters and much more in-depth consideration of all the topics. The chapters have been written by distinguished international experts in various aspects of chemical warfare agents and edited by an experienced team to produce a clear review of the field. The book now contains a wealth of material on the mechanisms of action of the major chemical warfare agents, including the nerve agent cyclosarin, formally considered to be of secondary importance, as well as ricinmore » and abrin. Chemical Warfare Agents, Second Edition discusses the physico-chemical properties of chemical warfare agents, their dispersion and fate in the environment, their toxicology and management of their effects on humans, decontamination and protective equipment. New chapters cover the experience gained after the use of sarin to attack travelers on the Tokyo subway and how to deal with the outcome of the deployment of riot control agents such as CS gas. This book provides a comprehensive review of chemical warfare agents, assessing all available evidence regarding the medical, technical and legal aspects of their use. It is an invaluable reference work for physicians, public health planners, regulators and any other professionals involved in this field.« less

  6. An Advanced Platform for Biomolecular Detection and Analysis Systems

    DTIC Science & Technology

    2005-02-01

    AFRL-IF-RS-TR-2005-54 Final Technical Report February 2005 AN ADVANCED PLATFORM FOR BIOMOLECULAR DETECTION AND ANALYSIS SYSTEMS...SUBTITLE AN ADVANCED PLATFORM FOR BIOMOLECULAR DETECTION AND ANALYSIS SYSTEMS 6. AUTHOR(S) David J. Beebe 5. FUNDING NUMBERS G...detection, analysis and response as well as many non BC warfare applications such as environmental toxicology, clinical detection and diagnosis

  7. New method for comprehensive detection of chemical warfare agents using an electron-cyclotron-resonance ion-source mass spectrometer

    NASA Astrophysics Data System (ADS)

    Kidera, Masanori; Seto, Yasuo; Takahashi, Kazuya; Enomoto, Shuichi; Kishi, Shintaro; Makita, Mika; Nagamatsu, Tsuyoshi; Tanaka, Tatsuhiko; Toda, Masayoshi

    2011-03-01

    We developed a detection technology for vapor forms of chemical warfare agents (CWAs) with an element analysis system using an electron cyclotron resonance ion source. After the vapor sample was introduced directly into the ion source, the molecular material was decomposed into elements using electron cyclotron resonance plasma and ionized. The following CWAs and stimulants were examined: diisopropyl fluorophosphonate (DFP), 2-chloroethylethylsulfide (2CEES), cyanogen chloride (CNCl), and hydrogen cyanide (HCN). The type of chemical warfare agents, specifically, whether it was a nerve agent, blister agent, blood agent, or choking agent, could be determined by measuring the quantities of the monatomic ions or CN + using mass spectrometry. It was possible to detect gaseous CWAs that could not be detected by a conventional mass spectrometer. The distribution of electron temperature in the plasma could be closely controlled by adjusting the input power of the microwaves used to generate the electron cyclotron resonance plasma, and the target compounds could be detected as molecular ions or fragment ions, enabling identification of the target agents.

  8. An Analysis of Effects of Variable Factors on Weapon Performance

    DTIC Science & Technology

    1993-03-01

    ALTERNATIVE ANALYSIS A. CATEGORICAL DATA ANALYSIS Statistical methodology for categorical data analysis traces its roots to the work of Francis Galton in the...choice of statistical tests . This thesis examines an analysis performed by Surface Warfare Development Group (SWDG). The SWDG analysis is shown to be...incorrect due to the misapplication of testing methods. A corrected analysis is presented and recommendations suggested for changes to the testing

  9. Specificity enhancement by electrospray ionization multistage mass spectrometry--a valuable tool for differentiation and identification of 'V'-type chemical warfare agents.

    PubMed

    Weissberg, Avi; Tzanani, Nitzan; Dagan, Shai

    2013-12-01

    The use of chemical warfare agents has become an issue of emerging concern. One of the challenges in analytical monitoring of the extremely toxic 'V'-type chemical weapons [O-alkyl S-(2-dialkylamino)ethyl alkylphosphonothiolates] is to distinguish and identify compounds of similar structure. MS analysis of these compounds reveals mostly fragment/product ions representing the amine-containing residue. Hence, isomers or derivatives with the same amine residue exhibit similar mass spectral patterns in both classical EI/MS and electrospray ionization-MS, leading to unavoidable ambiguity in the identification of the phosphonate moiety. A set of five 'V'-type agents, including O-ethyl S-(2-diisopropylamino)ethyl methylphosphonothiolate (VX), O-isobutyl S-(2-diethylamino)ethyl methylphosphonothiolate (RVX) and O-ethyl S-(2-diethylamino)ethyl methylphosphonothiolate (VM) were studied by liquid chromatography/electrospray ionization/MS, utilizing a QTRAP mass detector. MS/MS enhanced product ion scans and multistage MS(3) experiments were carried out. Based on the results, possible fragmentation pathways were proposed, and a method for the differentiation and identification of structural isomers and derivatives of 'V'-type chemical warfare agents was obtained. MS/MS enhanced product ion scans at various collision energies provided information-rich spectra, although many of the product ions obtained were at low abundance. Employing MS(3) experiments enhanced the selectivity for those low abundance product ions and provided spectra indicative of the different phosphonate groups. Study of the fragmentation pathways, revealing some less expected structures, was carried out and allowed the formulation of mechanistic rules and the determination of sets of ions typical of specific groups, for example, methylphosphonothiolates versus ethylphosphonothiolates. The new group-specific ions elucidated in this work are also useful for screening unknown 'V'-type agents and related compounds, utilizing precursor ion scan experiments. Copyright © 2013 John Wiley & Sons, Ltd.

  10. Metal organic frameworks for the catalytic detoxification of chemical warfare nerve agents

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Hupp, Joseph T.; Farha, Omar K.; Katz, Michael J.

    A method of using a metal organic framework (MOF) comprising a metal ion and an at least bidendate organic ligand to catalytically detoxify chemical warfare nerve agents including exposing the metal-organic-framework (MOF) to the chemical warfare nerve agent and catalytically decomposing the nerve agent with the MOF.

  11. Impact of Alleged Russian Cyber Attacks

    DTIC Science & Technology

    2009-05-01

    security. 15. SUBJECT TERMS Cyber Security, Cyber Warfare , Estonia, Georgia, Russian Federation Cyber Strategy, Convention on Cybercrime, NATO Center...Federation ......................................................................................... 33  X.  The Future of Russian Cyber Warfare ................................................................... 39...Issue 15.09); Binoy Kampmark, Cyber Warfare Between Estonia And Russia, (Contemporary Review: Autumn, 2003), p 288-293; Jaak Aaviksoo, Address by the

  12. United States Coast Guard Antisubmarine Warfare (ASW) in the Maritime Defense Zone (MDZ) - A Strategic Approach

    DTIC Science & Technology

    1989-03-01

    RIC ILE COPY AIR WAR COLLGE REEAC R~pCR UNITED STATES COAST GUARD ANTISUBMARINE WARFARE (ASW) IN THE MARITIME DEFENSE ZONE (MDZ) -A STRATEGIC...going to perform in these MDZs. Those tasks identified so far include: port and coastal physical security & preventive safety, mine warfare

  13. Information Age Transformation: Getting to a 21st Century Military (revised)

    DTIC Science & Technology

    2002-06-01

    strategy for transformation is built around experimentation with network- centric concepts designed to leverage the power of Information Age technologies and...Edward A. Smith: From Network- Centric to Effects-Based Operations. 7 CHAPTER 2 Background and Purpose DoD is fully committed to taking advantage...Network Centric Warfare3 (NCW) translates these broad vision statements into a way ahead. NCW is a set of warfighting concepts4 designed to create and

  14. Intelligence and Electronic Warfare (IEW) Streamlining Project. Volume 3. Reference Documentation (Part 5)

    DTIC Science & Technology

    1992-11-18

    Army. He is a graduate of Henderson State Univer- sity, Arkadelphia, Arkansas, and holds a master ofspend on financial management controls. Asset...supply system, he will receive credit receipts, and making monthly reconciliations with from the tactical unit financial management infor- activi ies at...obtain financial management rather than being added to the daily batch of requests information, and provide supply status information passed to the direct

  15. Battle-Wise: Seeking Time-Information Superiority in Networked Warfare

    DTIC Science & Technology

    2006-07-01

    idiosyncratic and thus not repeatable—each person’s perceptions , experiences, and thought processes are different. This makes it difficult to rely on... perception management’ is central to the conduct of its war with the West.”26 It does not require dedicated information-network infrastructure or expensive...to leave a house after several failed attempts to fight flare-ups in the first floor kitchen. The chief attributed his decision to extrasensory

  16. 2006 Net Centric Operations Conference - Facilitating Net Centric Operations and Warfare

    DTIC Science & Technology

    2006-03-16

    22, 2005 • White Paper, “Facilitating Shared Services in the DoD,” Feb 12, 2006 • White Paper, “ Shared Services : Performance Accountability and Risk...who demand a culture of information sharing and improved organizational effectiveness.” 12 Facilitating Shared Services : Task “What should be the...distinct programs.” 13 Facilitating Shared Services : Focus Areas • Governance and Control Policy • Common Information Standards and Technical

  17. The Electronic Intrusion Threat to National Security and Emergency Preparedness (NS/EP) Telecommunications. An Awareness Document

    DTIC Science & Technology

    1999-03-01

    Responsibilities, a national security emergency is “any occurrence, including natural disaster, military attack, technological emergency, or other...in information systems increase in Russia, “the growing role of information- technology warfare is rapidly lowering the barrier between war and peace...waging war. As one Russian military theorist stated, “it is necessary to place paramount importance on technological indicators of new weapons, which are

  18. Detection of toxic industrial chemicals in water supplies using surface-enhanced Raman spectroscopy

    NASA Astrophysics Data System (ADS)

    Spencer, Kevin M.; Sylvia, James M.; Spencer, Sarah A.; Clauson, Susan L.

    2010-04-01

    An effective method to create fear in the populace is to endanger the water supply. Homeland Security places significant importance on ensuring drinking water integrity. Beyond terrorism, accidental supply contamination from a spill or chemical residual increases is a concern. A prominent class of toxic industrial chemicals (TICs) is pesticides, which are prevalent in agricultural use and can be very toxic in minute concentrations. Detection of TICs or warfare agents must be aggressive; the contaminant needs to be rapidly detected and identified to enable isolation and remediation of the contaminated water while continuing a clean water supply for the population. Awaiting laboratory analysis is unacceptable as delay in identification and remediation increases the likelihood of infection. Therefore, a portable or online water quality sensor is required that can produce rapid results. In this presentation, Surface-Enhanced Raman Spectroscopy (SERS) is discussed as a viable fieldable sensor that can be immersed directly into the water supply and can provide results in <5 minutes from the time the instrument is turned on until analysis is complete. The ability of SERS to detect several chemical warfare agent degradation products, simulants and toxic industrial chemicals in distilled water, tap water and untreated water will be shown. In addition, results for chemical warfare agent degradation products and simulants will be presented. Receiver operator characteristic (ROC) curves will also be presented.

  19. The evolution of human warfare.

    PubMed

    Pitman, George R

    2011-01-01

    Here we propose a new theory for the origins and evolution of human warfare as a complex social phenomenon involving several behavioral traits, including aggression, risk taking, male bonding, ingroup altruism, outgroup xenophobia, dominance and subordination, and territoriality, all of which are encoded in the human genome. Among the family of great apes only chimpanzees and humans engage in war; consequently, warfare emerged in their immediate common ancestor that lived in patrilocal groups who fought one another for females. The reasons for warfare changed when the common ancestor females began to immigrate into the groups of their choice, and again, during the agricultural revolution.

  20. Determination of trace amounts of chemical warfare agent degradation products in decontamination solutions with NMR spectroscopy.

    PubMed

    Koskela, Harri; Rapinoja, Marja-Leena; Kuitunen, Marja-Leena; Vanninen, Paula

    2007-12-01

    Decontamination solutions are used for an efficient detoxification of chemical warfare agents (CWAs). As these solutions can be composed of strong alkaline chemicals with hydrolyzing and oxidizing properties, the analysis of CWA degradation products in trace levels from these solutions imposes a challenge for any analytical technique. Here, we present results of application of nuclear magnetic resonance spectroscopy for analysis of trace amounts of CWA degradation products in several untreated decontamination solutions. Degradation products of the nerve agents sarin, soman, and VX were selectively monitored with substantially reduced interference of background signals by 1D 1H-31P heteronuclear single quantum coherence (HSQC) spectrometry. The detection limit of the chemicals was at the low part-per-million level (2-10 microg/mL) in all studied solutions. In addition, the concentration of the degradation products was obtained with sufficient confidence with external standards.

  1. Detection of nerve gases using surface-enhanced Raman scattering substrates with high droplet adhesion

    NASA Astrophysics Data System (ADS)

    Hakonen, Aron; Rindzevicius, Tomas; Schmidt, Michael Stenbæk; Andersson, Per Ola; Juhlin, Lars; Svedendahl, Mikael; Boisen, Anja; Käll, Mikael

    2016-01-01

    Threats from chemical warfare agents, commonly known as nerve gases, constitute a serious security issue of increasing global concern because of surging terrorist activity worldwide. However, nerve gases are difficult to detect using current analytical tools and outside dedicated laboratories. Here we demonstrate that surface-enhanced Raman scattering (SERS) can be used for sensitive detection of femtomol quantities of two nerve gases, VX and Tabun, using a handheld Raman device and SERS substrates consisting of flexible gold-covered Si nanopillars. The substrate surface exhibits high droplet adhesion and nanopillar clustering due to elasto-capillary forces, resulting in enrichment of target molecules in plasmonic hot-spots with high Raman enhancement. The results may pave the way for strategic life-saving SERS detection of chemical warfare agents in the field.Threats from chemical warfare agents, commonly known as nerve gases, constitute a serious security issue of increasing global concern because of surging terrorist activity worldwide. However, nerve gases are difficult to detect using current analytical tools and outside dedicated laboratories. Here we demonstrate that surface-enhanced Raman scattering (SERS) can be used for sensitive detection of femtomol quantities of two nerve gases, VX and Tabun, using a handheld Raman device and SERS substrates consisting of flexible gold-covered Si nanopillars. The substrate surface exhibits high droplet adhesion and nanopillar clustering due to elasto-capillary forces, resulting in enrichment of target molecules in plasmonic hot-spots with high Raman enhancement. The results may pave the way for strategic life-saving SERS detection of chemical warfare agents in the field. Electronic supplementary information (ESI) available. See DOI: 10.1039/c5nr06524k

  2. Tree regeneration following group selection harvesting in southern Indiana

    Treesearch

    Dale R. Weigel; George R. Parker

    1995-01-01

    An increased interest in the use of group selection harvesting in the Central Hardwood forests has emphasized the lack of scientific information about species response under this uneven-aged management system. Tree regeneration response following group selection harvesting was studied on thirty-six group selection openings on the Naval Surface Warfare Center, Crane...

  3. The Further Integration of the Intelligence and Surface Warfare Communities

    DTIC Science & Technology

    2012-05-03

    The establishment of the Information Dominance Corps and the subsequent adjustment of naval resources to accommodate this newly formed cadre provide a ripe opportunity to close the gap between the Surface and Intelligence communities, and in doing so, enhance United States Navy s ability to dominate the global maritime domain.

  4. Childhood: Impressions of the Intifada.

    ERIC Educational Resources Information Center

    Hanoun, Rasmyah Abdelgader

    While most studies on the effects violence has on children concentrate on exposure to warfare or single cases of trauma, this document focuses on the effects of chronic violent events on the well-being of Palestinian youth. Information in this paper was attained from discussions with Palestinian youth ages 5-16 in Israel. The purpose of these…

  5. From Foreign Internal Defense to Unconventional Warfare: Campaign Transitions When US-Support to Friendly Governments Fails

    DTIC Science & Technology

    2015-05-27

    counter the spread of communism .20 FID as a whole involves “the instruments of national power (diplomatic, informational , military, and economic) through... A thesis presented to the Faculty of the Western Hemisphere Institute for Security Cooperation and the U.S. Army Command and General Staff College ...

  6. Shaping future Naval warfare with unmanned systems, the impact across the fleet, and joint considerations

    NASA Astrophysics Data System (ADS)

    Hudson, E. C.; Johnson, Gordon; Summey, Delbert C.; Portmann, Helmut H., Jr.

    2004-09-01

    This paper discusses a comprehensive vision for unmanned systems that will shape the future of Naval Warfare within a larger Joint Force concept, and examines the broad impact that can be anticipated across the Fleet. The vision has been articulated from a Naval perspective in NAVSEA technical report CSS/TR-01/09, Shaping the Future of Naval Warfare with Unmanned Systems, and from a Joint perspective in USJFCOM Rapid Assessment Process (RAP) Report #03-10 (Unmanned Effects (UFX): Taking the Human Out of the Loop). Here, the authors build on this foundation by reviewing the major findings and laying out the roadmap for achieving the vision and truly transforming how we fight wars. The focus is on broad impact across the Fleet - but the implications reach across all Joint forces. The term "Unmanned System" means different things to different people. Most think of vehicles that are remotely teleoperated that perform tasks under remote human control. Actually, unmanned systems are stand-alone systems that can execute missions and tasks without direct physical manned presence under varying levels of human control - from teleoperation to full autonomy. It is important to note that an unmanned system comprises a lot more than just a vehicle - it includes payloads, command and control, and communications and information processing.

  7. Military clouds: utilization of cloud computing systems at the battlefield

    NASA Astrophysics Data System (ADS)

    Süleyman, Sarıkürk; Volkan, Karaca; İbrahim, Kocaman; Ahmet, Şirzai

    2012-05-01

    Cloud computing is known as a novel information technology (IT) concept, which involves facilitated and rapid access to networks, servers, data saving media, applications and services via Internet with minimum hardware requirements. Use of information systems and technologies at the battlefield is not new. Information superiority is a force multiplier and is crucial to mission success. Recent advances in information systems and technologies provide new means to decision makers and users in order to gain information superiority. These developments in information technologies lead to a new term, which is known as network centric capability. Similar to network centric capable systems, cloud computing systems are operational today. In the near future extensive use of military clouds at the battlefield is predicted. Integrating cloud computing logic to network centric applications will increase the flexibility, cost-effectiveness, efficiency and accessibility of network-centric capabilities. In this paper, cloud computing and network centric capability concepts are defined. Some commercial cloud computing products and applications are mentioned. Network centric capable applications are covered. Cloud computing supported battlefield applications are analyzed. The effects of cloud computing systems on network centric capability and on the information domain in future warfare are discussed. Battlefield opportunities and novelties which might be introduced to network centric capability by cloud computing systems are researched. The role of military clouds in future warfare is proposed in this paper. It was concluded that military clouds will be indispensible components of the future battlefield. Military clouds have the potential of improving network centric capabilities, increasing situational awareness at the battlefield and facilitating the settlement of information superiority.

  8. Computer-Assisted Performance Evaluation for Navy Anti-Air Warfare Training: Concepts, Methods, and Constraints.

    ERIC Educational Resources Information Center

    Chesler, David J.

    An improved general methodological approach for the development of computer-assisted evaluation of trainee performance in the computer-based simulation environment is formulated in this report. The report focuses on the Tactical Advanced Combat Direction and Electronic Warfare system (TACDEW) at the Fleet Anti-Air Warfare Training Center at San…

  9. Smart Climatology Applications for Undersea Warfare

    DTIC Science & Technology

    2008-09-01

    Comparisons of these climatologies with existing Navy climatologies based on the Generalized Digital Environmental Model ( GDEM ) reveal differences in sonic...undersea warfare. 15. NUMBER OF PAGES 117 14. SUBJECT TERMS antisubmarine warfare, climate variations, climatology, GDEM , ocean, re...climatologies based on the Generalized Digital Environmental Model ( GDEM ) to our smart ocean climatologies reveal a number of differences. The

  10. DETERMINING ELECTRONIC AND CYBER ATTACK RISK LEVEL FOR UNMANNED AIRCRAFT IN A CONTESTED ENVIRONMENT

    DTIC Science & Technology

    2016-08-01

    AIR COMMAND AND STAFF COLLEGE AIR UNIVERSITY DETERMINING ELECTRONIC AND CYBER ATTACK RISK LEVEL FOR UNMANNED AIRCRAFT IN A CONTESTED ENVIRONMENT...iii ABSTRACT During operations in a contested air environment, adversary electronic warfare (EW) and cyber-attack capability will pose a high...10 Russian Federation Electronic Warfare Systems ...................................................12 Chinese Cyber Warfare Program

  11. Manufacturing Technology and Industrial Modernization Incentive Programs

    DTIC Science & Technology

    1991-07-01

    report are those of the contractors and should not be Interpreted as representing the official policies, either expressed or Impli.d, of tte Naval Ocean...Countaermeaue * Undersea countermeasures. special warfare, amphibious warfare. tamc mine countermeasures, and diving Dkected energy . Naval Surface Warfare...Insensitie highly energetic materials -Command control, commiunications, ocean surveillance, surface- and air-launched undersea weapons, and submarine arctic

  12. Systems Approach to Defeating Maritime Improvised Explosive Devices in U.S. Ports

    DTIC Science & Technology

    2008-12-01

    DETECTION Pfi PROBABILITY OF FALSE IDENTIFICATION PHPK PROBABILITY OF HIT/PROBABILITY OF KILL PMA POST MISSION ANALYSIS PNNL PACIFIC...16 Naval Warfare Publication 27-2(Rev. B), Section 1.8.4.1(unclassified) 42 detection analysis is conducted...NAVAL POSTGRADUATE SCHOOL MONTEREY, CALIFORNIA Approved for public release; distribution is unlimited Prepared

  13. Towards the implementation of a spectral database for the detection of biological warfare agents

    NASA Astrophysics Data System (ADS)

    Carestia, M.; Pizzoferrato, R.; Gelfusa, M.; Cenciarelli, O.; D'Amico, F.; Malizia, A.; Scarpellini, D.; Murari, A.; Vega, J.; Gaudio, P.

    2014-10-01

    The deliberate use of biological warfare agents (BWA) and other pathogens can jeopardize the safety of population, fauna and flora, and represents a concrete concern from the military and civil perspective. At present, the only commercially available tools for fast warning of a biological attack can perform point detection and require active or passive sampling collection. The development of a stand-off detection system would be extremely valuable to minimize the risk and the possible consequences of the release of biological aerosols in the atmosphere. Biological samples can be analyzed by means of several optical techniques, covering a broad region of the electromagnetic spectrum. Strong evidence proved that the informative content of fluorescence spectra could provide good preliminary discrimination among those agents and it can also be obtained through stand-off measurements. Such a system necessitates a database and a mathematical method for the discrimination of the spectral signatures. In this work, we collected fluorescence emission spectra of the main BWA simulants, to implement a spectral signature database and apply the Universal Multi Event Locator (UMEL) statistical method. Our preliminary analysis, conducted in laboratory conditions with a standard UV lamp source, considers the main experimental setups influencing the fluorescence signature of some of the most commonly used BWA simulants. Our work represents a first step towards the implementation of a spectral database and a laser-based biological stand-off detection and identification technique.

  14. Mid-infrared gas absorption sensor based on a broadband external cavity quantum cascade laser

    NASA Astrophysics Data System (ADS)

    Sun, Juan; Deng, Hao; Liu, Ningwu; Wang, Hongliang; Yu, Benli; Li, Jingsong

    2016-12-01

    We developed a laser absorption sensor based on a pulsed, broadband tunable external cavity quantum cascade laser (ECQCL) centered at 1285 cm-1. Unlike traditional infrared spectroscopy system, a quartz crystal tuning fork (QCTF) as a light detector was used for laser signal detection. Fast Fourier transform was applied to extract vibration intensity information of QCTF. The sensor system is successfully tested on nitrous oxide (N2O) spectroscopy measurements and compared with a standard infrared detector. The wide wavelength tunability of ECQCL will allow us to access the fundamental vibrational bands of many chemical agents, which are well-suited for trace explosive, chemical warfare agent, and toxic industrial chemical detection and spectroscopic analysis.

  15. Mid-infrared gas absorption sensor based on a broadband external cavity quantum cascade laser.

    PubMed

    Sun, Juan; Deng, Hao; Liu, Ningwu; Wang, Hongliang; Yu, Benli; Li, Jingsong

    2016-12-01

    We developed a laser absorption sensor based on a pulsed, broadband tunable external cavity quantum cascade laser (ECQCL) centered at 1285 cm -1 . Unlike traditional infrared spectroscopy system, a quartz crystal tuning fork (QCTF) as a light detector was used for laser signal detection. Fast Fourier transform was applied to extract vibration intensity information of QCTF. The sensor system is successfully tested on nitrous oxide (N 2 O) spectroscopy measurements and compared with a standard infrared detector. The wide wavelength tunability of ECQCL will allow us to access the fundamental vibrational bands of many chemical agents, which are well-suited for trace explosive, chemical warfare agent, and toxic industrial chemical detection and spectroscopic analysis.

  16. MINDSET: National Styles in Warfare and the Operational Level of Planning, Conduct and Analysis

    DTIC Science & Technology

    1980-03-10

    correspondingly increased, making it more difficult for the opponent to react coherently. The ultimate result is a cor.,mand and organizational agility that amounts to a military ju - jitsu . 1-4 I. .

  17. Antidotes and treatments for chemical warfare/terrorism agents: an evidence-based review.

    PubMed

    Rodgers, G C; Condurache, C T

    2010-09-01

    This article reviews the evidence supporting the efficacy of antidotes used or recommended for the potential chemical warfare agents of most concern. Chemical warfare agents considered include cyanide, vesicants, pulmonary irritants such as chlorine and phosgene, and nerve agents. The strength of evidence for most antidotes is weak, highlighting the need for additional research in this area.

  18. Pacific Missile Range Facility Intercept Test Support. Environmental Assessment/Overseas Environmental Assessment

    DTIC Science & Technology

    2010-04-01

    frequency monitoring, target control, and electronic warfare and networked operations. Kokee supports tracking radars, telemetry, communications, and...owned island of Niihau provide support and sites for a remotely operated PMRF surveillance radar, a Test Vehicle Recovery Site, an electronic warfare...site, multiple electronic warfare portable simulator sites, a marker for aircraft mining exercise programs, and a helicopter terrain-following

  19. Chemical Weapons Disposal: Improvements Needed in Program Accountability and Financial Management

    DTIC Science & Technology

    2000-05-01

    United States General Accounting Office PAQ Report to Congressional Committees May 2000 CHEMICAL WEAPONS DISPOSAL Improvements Needed in Program...warfare materiel, and former production facilities and identify and locate buried chemical warfare materiel. Alternative Technologies and Approaches...production facilities, and buried chemical warfare materiel. These items are described in table 1. Table 1: Nonstockpile Chemical Materiel Category

  20. Homeland Biological Warfare Consequence Management: Capabilities and Needs Assessment

    DTIC Science & Technology

    2001-04-01

    AU/ACSC/105/2001-04 AIR COMMAND AND STAFF COLLEGE AIR UNIVERSITY HOMELAND BIOLOGICAL WARFARE CONSEQUENCE MANAGEMENT: CAPABILITIES AND NEEDS...Dates Covered (from... to) - Title and Subtitle Homeland biological Warfare Consequence Management: Capabilities and Needs Assessment Contract...FEMA, DoJ, DoD, HHS, etc.) make a comprehensive, organized solution to the problem difficult. Focusing on the consequence management functions

  1. Chemical warfare agents.

    PubMed

    Kuca, Kamil; Pohanka, Miroslav

    2010-01-01

    Chemical warfare agents are compounds of different chemical structures. Simple molecules such as chlorine as well as complex structures such as ricin belong to this group. Nerve agents, vesicants, incapacitating agents, blood agents, lung-damaging agents, riot-control agents and several toxins are among chemical warfare agents. Although the use of these compounds is strictly prohibited, the possible misuse by terrorist groups is a reality nowadays. Owing to this fact, knowledge of the basic properties of these substances is of a high importance. This chapter briefly introduces the separate groups of chemical warfare agents together with their members and the potential therapy that should be applied in case someone is intoxicated by these agents.

  2. The Revision of FM 3-24 is Overdue: Rethinking Classical Counterinsurgency to Defeat Contemporary Insurgents

    DTIC Science & Technology

    2011-06-17

    for Information Operations and Reports, 1215 Jefferson Davis Highway, Suite 1204, Arlington, VA 22202-4302, and to the Office of Management and Budget...COIN doctrine also has one primary and enduring theme which is stressed throughout the manual and suggests that success in COIN depends on learning...because they have been validated repeatedly over the last century of warfare. COIN imperatives such as managing information, learning and adapting, and

  3. The Logic of Hybrid Warfare: How the Concepts of Depth and Vulnerability Still Shape Russian Operational Approaches

    DTIC Science & Technology

    2017-03-15

    those two countries allowed Russia to couple a multi-faceted information campaign with an asymmetric ground- game to enable conventional military...organizations, Russia simply needed a ground- game to balance coercion and information around specific vulnerabilities. Russia seems to have followed a...article/whos-who-in-the-donetsk-peoples-republic 19 Who then are the “crisis managers” that run the ground game ? A US Army Special Operations

  4. A novel framework for command and control of networked sensor systems

    NASA Astrophysics Data System (ADS)

    Chen, Genshe; Tian, Zhi; Shen, Dan; Blasch, Erik; Pham, Khanh

    2007-04-01

    In this paper, we have proposed a highly innovative advanced command and control framework for sensor networks used for future Integrated Fire Control (IFC). The primary goal is to enable and enhance target detection, validation, and mitigation for future military operations by graphical game theory and advanced knowledge information fusion infrastructures. The problem is approached by representing distributed sensor and weapon systems as generic warfare resources which must be optimized in order to achieve the operational benefits afforded by enabling a system of systems. This paper addresses the importance of achieving a Network Centric Warfare (NCW) foundation of information superiority-shared, accurate, and timely situational awareness upon which advanced automated management aids for IFC can be built. The approach uses the Data Fusion Information Group (DFIG) Fusion hierarchy of Level 0 through Level 4 to fuse the input data into assessments for the enemy target system threats in a battlespace to which military force is being applied. Compact graph models are employed across all levels of the fusion hierarchy to accomplish integrative data fusion and information flow control, as well as cross-layer sensor management. The functional block at each fusion level will have a set of innovative algorithms that not only exploit the corresponding graph model in a computationally efficient manner, but also permit combined functional experiments across levels by virtue of the unifying graphical model approach.

  5. Environmental and forensic applications of field-portable GC-MS: an overview.

    PubMed

    Eckenrode, B A

    2001-06-01

    GC-MS can provide analytical information that is most reliable for many types of organic analyses. As field-portable GC-MS analytical systems evolve, the application scenarios have diversified as well. With the development of rugged fieldable systems, these instruments were demonstrated to be usable in the harsh environment of the jungle and in chemical demilitarization or military reconnaissance situations. Continuous unattended operations of a GC-MS for 12- or 24-hour monitoring applications in the field have been shown to be possible. A real-time algorithm strategy is proposed, which can be developed to aid in the advancement of field-portable mass spectrometry applied to chemical warfare agent analysis in military vehicles and can be used to raise the standard for field data quality. Each of these capabilities is discussed with the intent on reviewing analysis situations that can be expanded because of developments in field GC-MS instrumentation.

  6. Convoy Protection under Multi-Threat Scenario

    DTIC Science & Technology

    2017-06-01

    14. SUBJECT TERMS antisubmarine warfare, convoy protection, screening, design of experiments, agent-based simulation 15. NUMBER OF...46 5. Scenarios 33–36 (Red Submarine Tactic-2) ...............................46 IV. DESIGN OF EXPERIMENT...47 C. NEARLY ORTHOGONAL LATIN HYPERCUBE DESIGN ............51 V. DATA ANALYSIS

  7. 2012 U.S. Marine Corps S&T Strategic Plan

    DTIC Science & Technology

    2012-01-17

    29 Training and Education...required capabilities through Doctrine, Organization, Training , Materiel, Leadership and Education, Personnel, and Facilities (DOTMLPF) analysis to...Escalation of Force, Expeditionary Energy, Training and Education, and Irregular Warfare. e. The maneuver functional area specifically addresses the

  8. COMPILATION OF AVAILABLE DATA ON BUILDING DECONTAMINATION ALTERNATIVES

    EPA Science Inventory

    The report presents an analysis of selected technologies that have been tested for their potential effectiveness in decontaminating a building that has been attacked using biological or chemical warfare agents, or using toxic industrial compounds. The technologies selected to be ...

  9. DoD CIO Annual Information Assurance Report

    DTIC Science & Technology

    2000-04-01

    cyber - warfare group, or a cyber-terrorist driven by ideology, religion, or money. The new warfighter is the cyber-warrior with technical and non-traditional skills. Complicating this new dimension is the need for the Department of Defense (DoD) to change its defensive strategy, because of cost and complexity issues, from the risk-avoidance approach to the risk management

  10. Information Technology Certification Training Implementation: Exploratory Case Study of Air Force and Civilian Leaders Experiences

    ERIC Educational Resources Information Center

    Munn, Jamie E.

    2017-01-01

    Military leaders, both active duty and General Schedule (GS), must understand cyber warfare with its environmental connections and rapid evolution while finding ways to develop strategies that may lessen threats and attacks to government infrastructure. The Department of Defense (DoD) sought training and certification programs from the civilian…

  11. Operation Anaconda: Lessons Learned, or Lessons Observed?

    DTIC Science & Technology

    2009-06-12

    commentators have noted that suboptimal command and control relationships, lack of communication , and confusion all contributed to the initial...lack of communication , and confusion all contributed to the initial problems in air/ground coordination, few have examined the joint and service...continuous challenge in modern warfare. Despite the vast increases in communications and information sharing capabilities that have accompanied

  12. 77 FR 23673 - Notice of Availability of Government-Owned Inventions; Available for Licensing

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-04-20

    ... Center, Crane Div, Code OOL, Bldg 2, 300 Highway 361, Crane, IN 47522-5001. FOR FURTHER INFORMATION CONTACT: Mr. Christopher Monsey, Naval Surface Warfare Center, Crane Div, Code OOL, Bldg 2, 300 Highway 361, Crane, IN 47522-5001, telephone 812-854-4100. Authority: 35 U.S.C. 207, 37 CFR part 404. Dated...

  13. Establishing Viable and Effective Information-Warfare Capability in Developing Nations Based on the U.S. Model

    DTIC Science & Technology

    2012-12-01

    include law enforcement and intelligence capabilities in the lineup . However, national security strategy reflects the first four only. Figure 1...Term Joint Doctrine Identification Air Force Doctrine Identification Army Doctrine Identification Navy Doctrine Identification EW...59 Ibid., 39. 34 Term Joint Doctrine Identification Air Force Doctrine Identification Army Doctrine Identification Navy

  14. Viva Colombia/Colombia Viva! A Fantasy Trip for the Five Senses

    ERIC Educational Resources Information Center

    de Ramirez, Lori Langer

    2006-01-01

    In the author's experience, Colombia is among the most misunderstood Spanish-speaking countries. Most of the news about Columbia involves drug trafficking or guerilla warfare, due to the many social and political problems that face the country. It is rare that the public is informed about the culture and people of this beautiful South American…

  15. Information Warfare: An Air Force Policy for the Role of Public Affairs

    DTIC Science & Technology

    1996-06-01

    munitions. — Albert Camus An Option Two role for PA would entail proactive management of the news. PA does this now, but it does not admit it, and...existed or not.14 But, like Wash­ ington, generals were not beyond using the press to sow their own seeds of disinformation. Confederate Gen Albert

  16. Operational Planning for Theater Anti-Submarine Warfare

    DTIC Science & Technology

    2017-03-01

    NAVAL POSTGRADUATE SCHOOL MONTEREY, CALIFORNIA THESIS Approved for public release. Distribution is unlimited. OPERATIONAL ...headquarters Services, Directorate for Information Operations and Reports, 1215 Jefferson Davis Highway, Suite 1204, Arlington, VA 22202-4302, and to the...Office of Management and Budget, Paperwork Reduction Project (0704-0188) Washington, DC 20503. 1. AGENCY USE ONLY (Leave blank) 2. REPORT DATE March

  17. Sink or Swim: The Marine Corps Capacity to Conduct a Marine Expeditionary Brigade Amphibious Assault using Expeditionary Maneuver Warfare

    DTIC Science & Technology

    2010-03-01

    Expeditionary Maneuver Warfare? This study addresses the equipment issues surrounding the Marine expeditionary brigade ’s’ ability to conduct an amphibious...addresses the equipment issues surrounding the expeditionary brigade’s ability to conduct an amphibious assault under expeditionary maneuver warfare in...1 Issues and Elements of the Modern-Day MEB Assault .................................................................. 2 The Marine Corps

  18. User Guide for Unmanned Aerial System (UAS) Operations on the National Ranges

    DTIC Science & Technology

    2007-11-01

    WARFARE CENTER WEAPONS DIVISION, PT. MUGU NAVAL AIR WARFARE CENTER WEAPONS DIVISION, CHINA LAKE NAVAL AIR WARFARE CENTER AIRCRAFT DIVISION, PATUXENT...with IFR Instrument Flight Rules MRTFB Major Range and Test Facility Base NAS National Airspace System NM nautical mile NTIA National...sectional charts, Instrument Flight Rules ( IFR ) enroute charts, and terminal area charts. The floor and ceiling, operating hours, and controlling

  19. Coast Guard SOF

    DTIC Science & Technology

    2006-02-01

    Forces units into known Viet Cong (VC) strongholds, participating in direct action raids on VC junk bases, conducting psychological operations, and...and General McClure established the Army’s Psychological Warfare Cen- ter and 10th Special Forces Group in 1952.62 President Kennedy’s interest in...counterinsurgency warfare paved the way for the “Green Beret,” for which Army Special Forces renamed the Psychological Warfare Center the JFK Special

  20. Provisional Advisory Levels (PALs) for Hazardous Agents ...

    EPA Pesticide Factsheets

    Technical Brief PROVISIONAL ADVISORY LEVELS. Few health-based guidelines are available to inform decisions regarding the reoccupation of buildings or sites, or the re-use of water resources, following their contamination through the accidental or intentional release of toxic chemicals or chemical warfare agents, or following a large-scale disaster. To address this need, EPA/ORD’s National Homeland Security Research Center (NHSRC) develops health-based Provisional Advisory Levels (PALs) for high priority chemicals including toxic industrial chemicals and chemical warfare agents, for both inhalation and oral exposures. Oral PALs are targeted to drinking water ingestion, but are applicable to other oral exposures such as soil ingestion. This product will be used as a hand-out at professional meetings to promote awareness of NHSRC's Provisional Advisory values. It will be posted on the intra and internet sites describing activities and products of EPA/ORD/NHSRC.

  1. Military medicine and the ethics of war: British colonial warfare during the Seven Years War (1756-63).

    PubMed

    Charters, Erica

    2010-01-01

    This article examines 18th-century European warfare, tracing the first formal codifications of conventions of war, frequently introduced by military physicians and initially regarding the treatment of the sick and wounded. It outlines to what extent these conventions were followed in practice, particularly in the challenging environment of American irregular warfare, with a focus on the most well-known incident of "biological warfare" in the period: the deliberate spread of smallpox by British officers among Amerindians in 1763. More broadly, it demonstrates that the history of military medicine provides a fruitful method with which to uncover assumptions about the ethics of war.

  2. Simulated experiment for elimination of chemical and biological warfare agents by making use of microwave plasma torch

    NASA Astrophysics Data System (ADS)

    Hong, Yong C.; Kim, Jeong H.; Uhm, Han S.

    2004-02-01

    The threat of chemical and biological warfare agents in a domestic terrorist attack and in military conflict is increasing worldwide. Elimination and decontamination of chemical and biological warfare (CBW) agents are immediately required after such an attack. Simulated experiment for elimination of CBW agents by making use of atmospheric-pressure microwave plasma torches is carried out. Elimination of biological warfare agents indicated by the vitrification or burnout of sewage sludge powders and decomposition of toluene gas as a chemical agent stimulant are presented. A detailed characterization for the elimination of the simulant chemicals using Fourier transform infrared and gas chromatography is also presented.

  3. About the bears and the bees: Adaptive responses to asymmetric warfare

    NASA Astrophysics Data System (ADS)

    Ryan, Alex

    Conventional military forces are organised to generate large scale effects against similarly structured adversaries. Asymmetric warfare is a 'game' between a conventional military force and a weaker adversary that is unable to match the scale of effects of the conventional force. In asymmetric warfare, an insurgents' strategy can be understood using a multi-scale perspective: by generating and exploiting fine scale complexity, insurgents prevent the conventional force from acting at the scale they are designed for. This paper presents a complex systems approach to the problem of asymmetric warfare, which shows how future force structures can be designed to adapt to environmental complexity at multiple scales and achieve full spectrum dominance.

  4. About the bears and the bees: Adaptive responses to asymmetric warfare

    NASA Astrophysics Data System (ADS)

    Ryan, Alex

    Conventional military forces are organised to generate large scale effects against similarly structured adversaries. Asymmetric warfare is a `game' between a conventional military force and a weaker adversary that is unable to match the scale of effects of the conventional force. In asymmetric warfare, an insurgents' strategy can be understood using a multi-scale perspective: by generating and exploiting fine scale complexity, insurgents prevent the conventional force from acting at the scale they are designed for. This paper presents a complex systems approach to the problem of asymmetric warfare, which shows how future force structures can be designed to adapt to environmental complexity at multiple scales and achieve full spectrum dominance.

  5. Analysis of the Precursors, Simulants and Degradation Products of Chemical Warfare Agents.

    PubMed

    Witkiewicz, Zygfryd; Neffe, Slawomir; Sliwka, Ewa; Quagliano, Javier

    2018-09-03

    Recent advances in analysis of precursors, simulants and degradation products of chemical warfare agents (CWA) are reviewed. Fast and reliable analysis of precursors, simulants and CWA degradation products is extremely important at a time, when more and more terrorist groups and radical non-state organizations use or plan to use chemical weapons to achieve their own psychological, political and military goals. The review covers the open source literature analysis after the time, when the chemical weapons convention had come into force (1997). The authors stated that during last 15 years increased number of laboratories are focused not only on trace analysis of CWA (mostly nerve and blister agents) in environmental and biological samples, but the growing number of research are devoted to instrumental analysis of precursors and degradation products of these substances. The identification of low-level concentration of CWA degradation products is often more important and difficult than the original CWA, because of lower level of concentration and a very large number of compounds present in environmental and biological samples. Many of them are hydrolysis products and are present in samples in the ionic form. For this reason, two or three instrumental methods are used to perform a reliable analysis of these substances.

  6. Efficacy Evaluation of Current and Future Naval Mine Warfare Neutralization Method

    DTIC Science & Technology

    2016-12-01

    Distribution is unlimited. EFFICACY EVALUATION OF CURRENT AND FUTURE NAVAL MINE WARFARE NEUTRALIZATION METHOD by Team MIW Cohort SE311-152O...EFFICACY EVALUATION OF CURRENT AND FUTURE NAVAL MINE WARFARE NEUTRALIZATION METHOD 5. FUNDING NUMBERS 6. AUTHOR (S) Team MIW, Systems Engineering...NEUTRALIZATION METHOD Team MIW, Systems Engineering Cohort SE311-152O Submitted in partial fulfillment of the requirements for the degrees of

  7. Computer Network Attack: An Operational Tool?

    DTIC Science & Technology

    2003-01-17

    Spectrum of Conflict, Cyber Warfare , Preemptive Strike, Effects Based Targeting. 15. Abstract: Computer Network Attack (CNA) is defined as...great deal of attention as the world’s capabilities in cyber - warfare grow. 11 Although addressing the wide ranging legal aspects of CNA is beyond the...the notion of cyber - warfare has not yet developed to the point that international norms have been established.15 These norms will be developed in

  8. The U.S. Needs International Cyber Treaties

    DTIC Science & Technology

    2010-03-01

    formed to deal with issues surrounding cyber warfare . However, no major treaties between nations exist regarding this form of combat. Examining...the history of cyber warfare , the inadequate international response, the obstacles to international agreement, and poor U.S. readiness demonstrates...the current need for the U.S. to lead the effort to codify treaties. First, a brief history of cyber warfare helps to shed light on the international

  9. Cyber Capabilities for Global Strike in 2035

    DTIC Science & Technology

    2012-02-15

    operations force, by treating cyber warfare capabilities in the same manner as it treats its other weapon systems. It argues that despite preconceptions of...As such, while automation is required, cyber warfare will be much more manpower intensive than is currently understood, and will require a force that...constantly keeping cyber warfare capabilities in pace with the technologies of the environment.This paper reaches these conclusions by first providing a

  10. Cyber Capabilities for Global Strike in 2035

    DTIC Science & Technology

    2012-02-15

    operations force, by treating cyber warfare capabilities in the same manner as it treats its other weapon systems. It argues that despite preconceptions of...As such, while automation is required, cyber warfare will be much more manpower intensive than is currently understood, and will require a force...constantly keeping cyber warfare capabilities in pace with the technologies of the environment. This paper reaches these conclusions by first providing a

  11. Integrating Defense, Diplomacy, and Development (3 D) in the Naval Special Warfare Operator

    DTIC Science & Technology

    2010-12-01

    DIPLOMACY, AND DEVELOPMENT (3 D) IN THE NAVAL SPECIAL WARFARE OPERATOR by William Fiack William Roberts Tim Sulick December 2010...Development (3 D) in the Naval Special Warfare Operator 6. AUTHOR(S) William Fiack, William Roberts, Timothy Sulick 5. FUNDING NUMBERS 7. PERFORMING...MONITORING AGENCY NAME(S) AND ADDRESS(ES) N/A 10. SPONSORING/MONITORING AGENCY REPORT NUMBER 11. SUPPLEMENTARY NOTES The views expressed in

  12. The Airpower Advantage in Future Warfare: The Need for Strategy

    DTIC Science & Technology

    2007-12-01

    political situation which gener- ates war and therefore warfare, foreign and domestic; the social- cultural ideologies , attitudes, habits of mind, and...the ideological rivalries that contributed so powerfully to interstate rivalry, ambition, and anxiety are all but defunct, save only in two respects...instead to fit that still improving competence into a truly holistic approach to warfare. That approach, in its turn, needs to fit into a genu - inely

  13. Calming the Churn: Resolving the Dilemma of Rotational Warfare in Counterinsurgency

    DTIC Science & Technology

    2013-12-01

    warfare in counterinsurgency Publisher Monterey, California: Naval Postgraduate School Issue Date 2013-12 URL http://hdl.handle.net/10945/38873... TYPE AND DATES COVERED Master’s Thesis 4. TITLE AND SUBTITLE CALMING THE CHURN: RESOLVING THE DILEMMA OF ROTATIONAL WARFARE IN COUNTERINSURGENCY...operations, however, would not last and, after only a year, MacArthur was sent to other duties thanks to personality conflicts with Taft. His replacement

  14. A Game Theoretic Model Of Strategic Conflict In Cyberspace

    DTIC Science & Technology

    2012-01-01

    EXECUTIVE SUMMARY Conflict in cyberspace is difficult to analyze; methods developed for other dimensions of conflict, such as land warfare , war at sea...and missile warfare , do not adequately address cyber conflict. A characteristic that distinguishes cyber conflict is that actors do not know the...strategic and policy guidance. To analyze the strategic decisions involved in cyber conflict, we use a game theoretic framework—we view cyber warfare as a

  15. Technology Strategy Integration

    DTIC Science & Technology

    2012-06-01

    History of Weaponry and Warfare from Prehistory to the Present (New York: Free Press : Distributed by Simon & Schuster, 2002), 191. 57 Robert L... Prehistory to the Present, 182. 60 O’Connell and Batchelor, Soul of the Sword: An Illustrated History of Weaponry and Warfare from Prehistory to the...Illustrated History of Weaponry and Warfare from Prehistory to the Present, 390. 62 O’Connell and Batchelor, Soul of the Sword: An Illustrated

  16. Sub state Unconventional Warfare: Expanding United States Military Political Options

    DTIC Science & Technology

    2016-05-26

    phases due to competing incumbent efforts. Giap was influenced in his understanding of revolutionary war phasing by Sun Tzu who Giap called one of his...Challenge of Unconventional Warfare. London: Routledge, 2012. Ames, Roger T. Sun - Tzu The Art of Warfare. New York: Ballantine Books, 1993. Amin, Samir...Guerrilla: Insurgents, Patriots, and Terrorists from Sun Tzu to Bin Laden. London: Brassey’s Inc., 2004. Rosenau, William, Subversion and Insurgency

  17. Virtual Collaboration: Advantages and Disadvantages in the Planning and Execution of Operations in the Information Age

    DTIC Science & Technology

    2004-02-09

    FINAL 3. DATES COVERED (From - To) 4. TITLE AND SUBTITLE VIRTUAL COLLABORATION: 5a. CONTRACT NUMBER ADVANTAGES AND DISADVANTAGES IN THE PLANNING AND...warfare is not one system; it is a system of systems from sensors to information flow. In analyzing the specific advantages and disadvantages of one of...Standard Form 298 (Rev. 8-98) NAVAL WAR COLLEGE Newport, R.I. VIRTUAL COLLABORATION: ADVANTAGES AND DISADVANTAGES IN THE PLANNING AND EXECUTION OF OPERATIONS

  18. Studies and Analyses of Aided Adversarial Decision Making. Phase 2: Research on Human Trust in Automation

    DTIC Science & Technology

    1998-04-01

    34AFRL-HE-WP-TR-1999-0216 UNITED STATES AIR FORCE RESEARCH LABORATORY STUDIES AND ANALYSES OF AIDED ADVERSARIAL DECISION MAKING PHASE 2: RESEARCH ON...Analyses of Aided Adversarial Decision Making . C: F41624-94-D-6000 Phase 2: Research on Human Trust in Automation PE: 62202F PR: 7184 6. AUTHOR(S) TA...Buffalo. This work focused on Aided Adversarial Decision Making (AADM) in Information Warfare (1W) environments. Previous work examined informational

  19. Surfacing Rescue Container Concept Design for Trident Submarines

    DTIC Science & Technology

    2009-05-08

    crew of their decompression obligation and will give undersea medical officers (UMO) on land the information they need to treat the crew upon arrival...ard . B ead boa ) Ba wit to ntly ora sa en s o is d OX ld er s h ule los is e v of t . L ec pu tin tte hin ad a te fety den f s to ma t...Technical Information Service, 1970. [34] SURVIVEX 2003, Exercise Tests Disabled Submarine Survival. Horn, Wayne G. 1, s.l. : Undersea Warfare

  20. Optimal Estimation of Glider’s Underwater Trajectory with Depth-Dependent Correction Using the Navy Coastal Ocean Model with Application to Antisubmarine Warfare

    DTIC Science & Technology

    2014-09-01

    deployed simultaneously. For example, a fleet of gliders would be able to act as an intelligence network by gathering underwater target information ...and to verify our novel method, a glider’s real underwater trajectory information must be obtained by using additional sensors like ADCP or DVL (see...lacks of inexpensive and efficient localization sensors during its subsurface mission. Therefore, knowing its precise underwater position is a

  1. Development of the HS-SPME-GC-MS/MS method for analysis of chemical warfare agent and their degradation products in environmental samples.

    PubMed

    Nawała, Jakub; Czupryński, Krzysztof; Popiel, Stanisław; Dziedzic, Daniel; Bełdowski, Jacek

    2016-08-24

    After World War II approximately 50,000 tons of chemical weapons were dumped in the Baltic Sea by the Soviet Union under the provisions of the Potsdam Conference on Disarmament. These dumped chemical warfare agents still possess a major threat to the marine environment and to human life. Therefore, continue monitoring of these munitions is essential. In this work, we present the application of new solid phase microextraction fibers in analysis of chemical warfare agents and their degradation products. It can be concluded that the best fiber for analysis of sulfur mustard and its degradation products is butyl acrylate (BA), whereas for analysis of organoarsenic compounds and chloroacetophenone, the best fiber is a co-polymer of methyl acrylate and methyl methacrylate (MA/MMA). In order to achieve the lowest LOD and LOQ the samples should be divided into two subsamples. One of them should be analyzed using a BA fiber, and the second one using a MA/MMA fiber. When the fast analysis is required, the microextraction should be performed by use of a butyl acrylate fiber because the extraction efficiency of organoarsenic compounds for this fiber is acceptable. Next, we have elaborated of the HS-SPME-GC-MS/MS method for analysis of CWA degradation products in environmental samples using laboratory obtained fibers The analytical method for analysis of organosulfur and organoarsenic compounds was optimized and validated. The LOD's for all target chemicals were between 0.03 and 0.65 ppb. Then, the analytical method developed by us, was used for the analysis of sediment and pore water samples from the Baltic Sea. During these studies, 80 samples were analyzed. It was found that 25 sediments and 5 pore water samples contained CWA degradation products such as 1,4-dithiane, 1,4-oxathiane or triphenylarsine, the latter being a component of arsine oil. The obtained data is evidence that the CWAs present in the Baltic Sea have leaked into the general marine environment. Copyright © 2016 Elsevier B.V. All rights reserved.

  2. Estimated Chemical Warfare Agent Surface Clearance Goals for Remediation Pre-Planning

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Dolislager, Frederick; Bansleben, Dr. Donald; Watson, Annetta Paule

    2010-01-01

    Health-based surface clearance goals, in units of mg/cm2, have been developed for the persistent chemical warfare agents sulfur mustard (HD) and nerve agent VX as well as their principal degradation products. Selection of model parameters and critical receptor (toddler child) allow calculation of surface residue estimates protective for the toddler child, the general population and adult employees of a facilty that has undergone chemical warfare agent attack.

  3. COIN in Cyberspace: Focusing Air Force Doctrine Development

    DTIC Science & Technology

    2007-01-01

    cyberspace and began codifying its cyber warfare doctrine. This effort is hampered, however, by a limited understanding of cyberspace by rank and file Air...Force members. Many believe cyberspace and cyber warfare are the responsibility of the communications community. If this new doctrine is to be...doctrine to build upon, the Air Force can create unity of effort among Airmen at all levels, ensure unity of purpose in the prosecution of cyber warfare , and

  4. Self-Development for Cyber Warriors

    DTIC Science & Technology

    2011-11-10

    Aggressive self-development is a critical task for the cyber warfare professional. No matter the quality, formal training and education programs age...Books and Science Fiction); Technology and Cyber-Related Magazines and Blogs; Specific Cyber Warfare Journal and Magazine Articles; Key Documents on...the strengths and weaknesses of the major donor career fields to the cyber workforce, and a Self-Assessment of Cyber Domain Expertise for readers who wish to assess their own cyber warfare expertise.

  5. Finding the Balance to Combat a Hybrid Threat

    DTIC Science & Technology

    2013-05-23

    supporting operation to conventional warfare. Mao Tse -tung stated that guerrilla warfare is one aspect of total war, because it cannot win a war by itself.15...of Military and Associated Terms, 147. 15Mao Tse -tung, On Guerrilla Warfare, trans. Samuel B. Griffith II (Champaign, IL: University of Illinois...to deny the Vietcong or the North Vietnamese sanctuary in neither Laos nor Cambodia. Summary In Afghanistan, insurgency has become more a

  6. The Combat Vehicle Command and Control System: Combat Performance of Armor Battalions Using Interactive Simulation

    DTIC Science & Technology

    1994-05-01

    Command and Control display. Using Ml tank simulators in the Mounted Warfare Test Bed at Fort Knox, Kentucky, the researchers evaluated tank battalion... Warfare Test Bed (MWTB) at Fort Knox, Kentucky, eight MOS-qualified armor crews (battalion commander, battalion opera- tions officer, three company...concerned with identifying ways that the CVCC system might best benefit the battlefield commander, and potential modifications to mounted warfare TTPs

  7. Modeling Anti-Air Warfare With Discrete Event Simulation and Analyzing Naval Convoy Operations

    DTIC Science & Technology

    2016-06-01

    WARFARE WITH DISCRETE EVENT SIMULATION AND ANALYZING NAVAL CONVOY OPERATIONS by Ali E. Opcin June 2016 Thesis Advisor: Arnold H. Buss Co...REPORT DATE June 2016 3. REPORT TYPE AND DATES COVERED Master’s thesis 4. TITLE AND SUBTITLE MODELING ANTI-AIR WARFARE WITH DISCRETE EVENT...In this study, a discrete event simulation (DES) was built by modeling ships, and their sensors and weapons, to simulate convoy operations under

  8. Fractal Effects in Lanchester Models of Combat

    DTIC Science & Technology

    2009-08-01

    Lanchester models. 8. References 1 Aircraft in Warfare : The Dawn of the Fourth Arm, F W Lanchester , Constable & Co., London, 1916. 2 The Calculus of...Intermediate Asymptotics, G I Barenblatt, CUP, 1996. 14 Lanchester Models of Warfare Volumes 1 and 2, J G Taylor, Operations Research Society of America...Nagabhushana, Computers and Operations Research, 21, 615-628, 1994. 20 DSTO-TR-2331 18 Lanchester Type Models of Warfare , H K Weiss, Proc.First

  9. A Heuristic Decision Making Model to Mitigate Adverse Consequences in a Network Centric Warfare/Sense and Respond System

    DTIC Science & Technology

    2005-05-01

    made. 4. Do military decision makers identify / analyze adverse consequences presently? Few do based on this research and most don’t do it effectively ...A HEURISTIC DECISION MAKING MODEL TO MITIGATE ADVERSE CONSEQUENCES IN A NETWORK CENTRIC WARFARE / SENSE AND RESPOND SYSTEM...ENS/05-01 A HEURISTIC DECISION MAKING MODEL TO MITIGATE ADVERSE CONSEQUENCES IN A NETWORK CENTRIC WARFARE / SENSE AND RESPOND SYSTEM

  10. The Strategic and Political Impacts of Collateral Damage from Strike Warfare

    DTIC Science & Technology

    2015-03-01

    damage from strike warfare focuses on legal, humanitarian, and moral issues . To oversimplify, killing non-combatants is bad, but it happens, and not...humanitarian, and moral issues . To oversimplify, killing non- combatants is bad, but it happens, and not always by accident. Therefore, it is instructive...method of bombing. A significant amount of research on the effects of collateral damage from strike warfare focuses on humanitarian and moral issues

  11. Biomaterials for mediation of chemical and biological warfare agents.

    PubMed

    Russell, Alan J; Berberich, Jason A; Drevon, Geraldine F; Koepsel, Richard R

    2003-01-01

    Recent events have emphasized the threat from chemical and biological warfare agents. Within the efforts to counter this threat, the biocatalytic destruction and sensing of chemical and biological weapons has become an important area of focus. The specificity and high catalytic rates of biological catalysts make them appropriate for decommissioning nerve agent stockpiles, counteracting nerve agent attacks, and remediation of organophosphate spills. A number of materials have been prepared containing enzymes for the destruction of and protection against organophosphate nerve agents and biological warfare agents. This review discusses the major chemical and biological warfare agents, decontamination methods, and biomaterials that have potential for the preparation of decontamination wipes, gas filters, column packings, protective wear, and self-decontaminating paints and coatings.

  12. Analysis of Multilayered Printed Circuit Boards using Computed Tomography

    DTIC Science & Technology

    2014-05-01

    complex PCBs that present a challenge for any testing or fault analysis. Set-to- work testing and fault analysis of any electronic circuit require...Electronic Warfare and Radar Division in December 2010. He is currently in Electro- Optic Countermeasures Group. Samuel works on embedded system design...and software optimisation of complex electro-optical systems, including the set to work and characterisation of these systems. He has a Bachelor of

  13. Analysis of Urinary Metabolites of Nerve and Blister Chemical Warfare Agents

    DTIC Science & Technology

    2014-08-01

    of CWAs. The analysis methods use UHPLC-MS/MS in Multiple Reaction Monitoring ( MRM ) mode to enhance the selectivity and sensitivity of the method...Chromatography Mass Spectrometry LOD Limit Of Detection LOQ Limit of Quantitation MRM Multiple Reaction Monitoring MSMS Tandem mass...urine [1]. Those analysis methods use UHPLC- MS/MS in Multiple Reaction Monitoring ( MRM ) mode to enhance the selectivity and sensitivity of the method

  14. Discourses of Indiscipline: An Informal Hobbesian Riposte to Cate Watson

    ERIC Educational Resources Information Center

    McManus, Michael

    2006-01-01

    Classroom battles are real and not a metaphor. Warfare is a historical and present fact of human life. Life really is a battle and conflict inevitable; injuries to the psyche are just as real as those to the body. Schools cannot step outside society. It is not Foucault but Thomas Hobbes who offers the most perceptive insight into human behaviour…

  15. Using Computer Games to Train Information Warfare Teams

    DTIC Science & Technology

    2004-01-01

    Interservice/Industry Training, Simulation, and Education Conference (I/ITSEC) 2004 2004 Paper No 1729 Page 1 of 10 Using Computer Games to...responses they will experience on real missions is crucial. 3D computer games have proved themselves to be highly effective in engaging players...motivationally and emotionally. This effort, therefore, uses gaming technology to provide realistic simulations. These games are augmented with

  16. Chemical Demilitarization Assembled Chemical Weapons Alternatives (Chem Demil-ACWA)

    DTIC Science & Technology

    2015-12-01

    Weapons Alternatives (Chem Demil-ACWA) is performing a portion of the chemical warfare materiel elimination mission. In 1996, Congress and the...Selected Acquisition Report (SAR) RCS: DD-A&T(Q&A)823-243 Chemical Demilitarization-Assembled Chemical Weapons Alternatives (Chem Demil-ACWA) As...Date Assigned: December 19, 2010 Program Information Program Name Chemical Demilitarization-Assembled Chemical Weapons Alternatives (Chem Demil

  17. Summary of Research 1997, Interdisciplinary Academic Groups.

    DTIC Science & Technology

    1999-01-01

    Os 656-3775 iosmundson @npsinavy.mii Channel, Ralph N. Senior Lecturer NS/Ch 656-2409 nchannell @nps.navv.mil Kemple, William G. Assistant...Research) Lieutenant Commander Steven J. Iatrou, USN (Information Warfare) Professor Carl R. Jones (Systems Management) Associate Professor William G...to assess the effectiveness of the newly developed decision support system. Adaptive Architectures for Command and Control William Kemple and

  18. Improving Influence Operations by Defining Influence and Influence Operations

    DTIC Science & Technology

    2013-12-10

    Operations PSYOP Psychological Operations PSYWAR Psychological Warfare SAMS School of Advanced Military Studies SC Strategic Communications USAID...assumed the topic to actually mean what many personnel commonly conceive of as IO or perhaps even so-called strategic communications (SC)? How...affect behaviors, protect operations, communicate commander’s intent, and project accurate information to achieve desired effects across the cognitive

  19. Millennial Warfare

    DTIC Science & Technology

    2017-06-09

    for this collection of information is estimated to average 1 hour per response, including the time for reviewing instructions, searching existing data...for these adaptations. Although the fundamentals are not changed, the global Millennial Generation has expanded them. They are traveling to Syria...Generation has expanded them. They are traveling to Syria, Iraq, Afghanistan, and North Africa in support, as well as remaining a significant threat in

  20. CSP - Hyperspectral Imaging and Sounding of the Environment Meeting Scholarship Fund

    DTIC Science & Technology

    2017-05-09

    performance via adaptation to the environment. The meeting has also contributed to the focus area of Electromagnetic Maneuver Warfare through disseminating the...latest information about advanced sensing techniques and understanding the electromagnetic environment through sensing. Additional sessions on...across the electromagnetic spectrum. The attendees at this event from the Naval Research Enterprise were Dr. Michael Yetzbacher, as a Program Co

  1. Workshop on Education in Computer Security (WECS6) (6th): Avoiding Fear, Uncertainty and Doubt Through Effective Security Education, Held in Monterey, California on 12-16 July 2004

    DTIC Science & Technology

    2004-07-01

    Melissa ) is created in the controlled environment and propagated. The students learn how viruses are written, how they are propagated via mediums like...vulnerabilities and threats, establishing disaster response and recovery procedures. Joseph Giordano , Technical Advisor, Information Warfare Branch, AFRL 60 The

  2. Electronic Warfare

    DTIC Science & Technology

    2007-01-25

    the joint staff (J-6) and the intelligence directorate of a joint staff (J-2). The joint restricted frequency list (JRFL) is prepared and promulgated...J-3, and J-6, prepares a joint restricted frequency list (JRFL) for approval by the J-3 (through the information operations [IO] cell or equivalent...SPECTRUM MANAGEMENT PLAN DEGRADATION REPORTS ASSESS FREQUENCY PLAN EFFECTIVENESS UPDATE ASSIGNMENTS UPDATE JOINT RESTRICTED FREQUENCY LIST (JRFL

  3. Joint Doctrine for Electronic Warfare

    DTIC Science & Technology

    2000-04-07

    Command, Control, Communications, and Computer Systems Directorate (J-6) and the Intelligence Directorate (J-2). The joint restricted frequency list (JRFL...for exercises and operations within the operational area. EW interests in the preparation of the joint restricted frequency list for specific... frequency list (JRFL) for approval by the J-3 (through the information operations [IO] cell or equivalent). Periodically updates and distributes the JRFL

  4. Counter Tunnel Project

    DTIC Science & Technology

    2014-03-01

    ADMINISTRATIVE INFORMATION The work described in this report was performed by the Unmanned Systems Science & Technology Branch (Code 71710) and the...Unmanned Systems Advanced Development Branch (Code 71720), Space and Naval Warfare Systems Center Pacific (SSC Pacific), San Diego, CA, and the Air...Earth™ is a trademark of Google Inc. Released by T. Pastore, Head Unmanned Systems Science & Technology Branch Under authority of A. D

  5. Army Airmobility Handbook

    DTIC Science & Technology

    1967-03-01

    is restricted only by the practical range of its organic aerial vehicles which provide its high degree of mobility; a form of warfare that not only... ORGANIC AIRCRAFT RADIOS 1* Chapter and Appendix. APPENDIX 4 ARMY AIRCRAFT WEAPONS SYSTEMS APPENDIX 5 ARMY AVIATION ORGANIZATIONS IL. APPENDIX 6 AIRMOBILE...helicopters, fix,:d wing aircraft, and organizations and equipment associatetd with Army aviation. It provides basic and general information, and

  6. Organisational Structure and Information Technology (IT): Exploring the Implications of IT for Future Military Structures

    DTIC Science & Technology

    2006-07-01

    4 Abbreviations AI Artificial Intelligence AM Artificial Memory CAD Computer Aided...memory (AM), artificial intelligence (AI), and embedded knowledge systems it is possible to expand the “effective span of competence” of...Technology J Joint J2 Joint Intelligence J3 Joint Operations NATO North Atlantic Treaty Organisation NCW Network Centric Warfare NHS National Health

  7. The Soldier Medic Mettle Study

    DTIC Science & Technology

    2011-10-01

    Editorial Manager ® and Preprint Manager ® from Aries Systems Corporation issues on the battlefield. For Medics, this should be from two perspectives ...D.T. (2000). Tactical management of urban warfare casualties in special operations . Military Medicine, 165(1), 1-48. 2. United States Department...Headquarters Services, Directorate for Information Operations and Reports (0704-0188), 1215 Jefferson Davis Highway, Suite 1204, Arlington, VA 22202

  8. The Use of Tobacco Products Among Naval Special Warfare Personnel

    DTIC Science & Technology

    1992-07-01

    assistance with analysis. ’Naval Healh Research Center, Physiological Perfomfance and Operational Medicine Depanment, Special Operations Division, P.O...Iwamoto, & L. Davis (Edo.), Tobacco smoking and nicotine (p. 502). New York: Plenum Press. Rowell, P. (1987). Current concepts on the effects of nicotine

  9. Automated Sentiment Analysis

    DTIC Science & Technology

    2009-06-01

    questions. Our prototype text classifier uses a “vector similarity” approach. This is a well-known technique introduced by Salton , Wong, and Yang (1975...Loveman & T.M. Davies Jr. (Eds.), Guerrilla warfare. Lincoln, NE: University of Nebraska Press, 1985, 47-69. Salton , G., Wong, A., & Yang, C.S. “A

  10. An Evaluation of the Air-to-Air Engagement Models in the Naval Warfare Gaming System.

    DTIC Science & Technology

    1984-03-01

    documentaticr 9valuation phase andI ths =acomera-aticns Phasr?. During tzhe descri-ption ph as e, a closs examira-tion and analysi-s of the : cutines and...modelin asoacts ,Of the = cutines . In this appendix, most o f thIe- alimizis rativs- programming isbypassed. In Appendix B, the 23 Mod-? _1ira nIs ocr

  11. Hungarys Alternative to Counter Hybrid Warfare - Small States Weaponized Citizenry

    DTIC Science & Technology

    2017-06-09

    case , the thesis applies qualitative intrinsic case study methodology to answer the primary and secondary research questions. Documents in the...literature review provide two 237 Robert E. Stake, The Art of Case Study Research (Thousand Oaks, CA: SAGE...solution for Hungary. The following paragraphs present criteria for the analysis. Criteria The case study analysis concentrates on the first two

  12. Military Engineers and Chemical Warfare Troops (Inzhenernye Voiska Khimicheskie Voiska),

    DTIC Science & Technology

    MILITARY FORCES(FOREIGN), *MILITARY ORGANIZATIONS, MILITARY ENGINEERING , INFANTRY, AMPHIBIOUS OPERATIONS, MINELAYING, ARMORED VEHICLES, NUCLEAR...RADIATION, DOSIMETERS, CHEMICAL WARFARE, PROTECTIVE CLOTHING, DECONTAMINATION, HEALTH PHYSICS.

  13. Blaptica dubia as sentinels for exposure to chemical warfare agents - a pilot study.

    PubMed

    Worek, Franz; Seeger, Thomas; Neumaier, Katharina; Wille, Timo; Thiermann, Horst

    2016-11-16

    The increased interest of terrorist groups in toxic chemicals and chemical warfare agents presents a continuing threat to our societies. Early warning and detection is a key component for effective countermeasures against such deadly agents. Presently available and near term solutions have a number of major drawbacks, e.g. lack of automated, remote warning and detection of primarily low volatile chemical warfare agents. An alternative approach is the use of animals as sentinels for exposure to toxic chemicals. To overcome disadvantages of vertebrates the present pilot study was initiated to investigate the suitability of South American cockroaches (Blaptica dubia) as warning system for exposure to chemical warfare nerve and blister agents. Initial in vitro experiments with nerve agents showed an increasing inhibitory potency in the order tabun - cyclosarin - sarin - soman - VX of cockroach cholinesterase. Exposure of cockroaches to chemical warfare agents resulted in clearly visible and reproducible reactions, the onset being dependent on the agent and dose. With nerve agents the onset was related to the volatility of the agents. The blister agent lewisite induced signs largely comparable to those of nerve agents while sulfur mustard exposed animals exhibited a different sequence of events. In conclusion, this first pilot study indicates that Blaptica dubia could serve as a warning system to exposure of chemical warfare agents. A cockroach-based system will not detect or identify a particular chemical warfare agent but could trigger further actions, e.g. specific detection and increased protective status. By designing appropriate boxes with (IR) motion sensors and remote control (IR) camera automated off-site warning systems could be realized. Copyright © 2016 Elsevier Ireland Ltd. All rights reserved.

  14. Quality of life in chemical warfare survivors with ophthalmologic injuries: the first results form Iran Chemical Warfare Victims Health Assessment Study

    PubMed Central

    Mousavi, Batool; Soroush, Mohammad Reza; Montazeri, Ali

    2009-01-01

    Background Iraq used chemical weapons extensively against the Iranians during the Iran-Iraq war (1980–1988). The aim of this study was to assess the health related quality of life (HRQOL) in people who had ophthalmologic complications due to the sulfur mustard gas exposure during the war. Methods The Veterans and Martyrs Affair Foundation (VMAF) database indicated that there were 196 patients with severe ophthalmologic complications due to chemical weapons exposure. Of these, those who gave consent (n = 147) entered into the study. Quality of life was measured using the 36-item Short Form Health Survey (SF-36) and scores were compared to those of the general public. In addition logistic regression analysis was performed to indicate variables that contribute to physical and mental health related quality of life. Results The mean age of the patients was 44.8 (SD = 8.7) ranging from 21 to 75 years. About one-third of the cases (n= 50) reported exposure to chemical weapons more than once. The mean exposure duration to sulfur mustard gas was 21.6 years (SD = 1.2). The lowest scores on the SF-36 subscales were found to be: the role physical and the general health. Quality of life in chemical warfare victims who had ophthalmologic problems was significantly lower than the general public (P < 0.001). The results obtained from logistic regression analysis indicated that those who did not participate in sport activities suffer from a poorer physical health (OR = 2.93, 95% CI = 1.36 to 6.30, P = 0.006). The analysis also showed that poor mental health was associated with longer time since exposure (OR = 1.58, 95% CI = 1.04 to 2.39, P = 0.03) and lower education (OR = 3.03, 95% CI = 1.21 to 7.56, P = 0.01). Conclusion The study findings suggest that chemical warfare victims with ophthalmologic complications suffer from poor health related quality of life. It seems that the need for provision of health and support for this population is urgent. In addition, further research is necessary to measure health related quality of life in victims with different types of disabilities in order to support and enhance quality of life among this population. PMID:19152700

  15. Quality of life in chemical warfare survivors with ophthalmologic injuries: the first results form Iran Chemical Warfare Victims Health Assessment Study.

    PubMed

    Mousavi, Batool; Soroush, Mohammad Reza; Montazeri, Ali

    2009-01-19

    Iraq used chemical weapons extensively against the Iranians during the Iran-Iraq war (1980-1988). The aim of this study was to assess the health related quality of life (HRQOL) in people who had ophthalmologic complications due to the sulfur mustard gas exposure during the war. The Veterans and Martyrs Affair Foundation (VMAF) database indicated that there were 196 patients with severe ophthalmologic complications due to chemical weapons exposure. Of these, those who gave consent (n = 147) entered into the study. Quality of life was measured using the 36-item Short Form Health Survey (SF-36) and scores were compared to those of the general public. In addition logistic regression analysis was performed to indicate variables that contribute to physical and mental health related quality of life. The mean age of the patients was 44.8 (SD = 8.7) ranging from 21 to 75 years. About one-third of the cases (n= 50) reported exposure to chemical weapons more than once. The mean exposure duration to sulfur mustard gas was 21.6 years (SD = 1.2). The lowest scores on the SF-36 subscales were found to be: the role physical and the general health. Quality of life in chemical warfare victims who had ophthalmologic problems was significantly lower than the general public (P < 0.001). The results obtained from logistic regression analysis indicated that those who did not participate in sport activities suffer from a poorer physical health (OR = 2.93, 95% CI = 1.36 to 6.30, P = 0.006). The analysis also showed that poor mental health was associated with longer time since exposure (OR = 1.58, 95% CI = 1.04 to 2.39, P = 0.03) and lower education (OR = 3.03, 95% CI = 1.21 to 7.56, P = 0.01). The study findings suggest that chemical warfare victims with ophthalmologic complications suffer from poor health related quality of life. It seems that the need for provision of health and support for this population is urgent. In addition, further research is necessary to measure health related quality of life in victims with different types of disabilities in order to support and enhance quality of life among this population.

  16. Coalition Logistics: A Case Study in Operation Restore Hope

    DTIC Science & Technology

    1994-06-03

    coalition operations."° In Seland’s interview with Colonel Wolfgang Kopp, chief of staff, German/Franco Brigade, Colonel Kopp stated that key members...February 1994. 21William G. Pagonis and Michael D. Krause , "Operational Logistics and the Gulf War," The Institute of Land Warfare: The Land Warfare...Headquarters, 1989. Pagonis, William G. and Michael D. Krause . "Operational Logistics and the Gulf War." The Land Warfare Paper No. 13. Arlington, Virginia

  17. Pirates of the Nuclear Age: The Role of U.S. Submarines in Modern Trade Warfare

    DTIC Science & Technology

    2016-07-14

    have sought to influence the outcome of the conflict by targeting enemy commerce . This influence historically called for the use of privateers...submarines took the position of privateers as the ideal force for conducting commerce warfare. Throughout World War Two (WWII) commerce warfare using... commerce ) remains. From the time of Greek city-states, to the privateers of the age of sail, to the submarines of WWI and WWII, targeting the

  18. The Combat Vehicle Command and Control System. Combat Performance of Armor Battalions Using Interactive Simulation

    DTIC Science & Technology

    1994-01-31

    ncluded the Commander’s Independent Thermal Viewer and a Command and Control display. Using 1 tank simulators in the Mounted Warfare Test Bed at Fort...CCD), the Commander’s Independent Thermal Viewer (CITV), and digital TOC workstations. Using autoloading tank simulators in the Mounted Warfare Test...identifying ways that the CVCC system might best benefit the battlefield commander, and potential modifications to mounted warfare TTPs. Another area of

  19. The Combat Vehicle Command and Control System. Combat Performance of Armor Battalions Using Distributed Interactive Simulation

    DTIC Science & Technology

    1993-12-15

    and Control disqlay. Using M1 tank simulators in the Mounted Warfare Test Bed at Fort Knox, KY, the evaluation focused on tank battalion oierations...and digital TOC workstations. Using autoloading tank simulators in the Mounted Warfare Test Bed (MWTB) at Fort Knox, Kentucky, eight MOS-qualified...might best benefit the battlefield commander, and potential modifications to mounted warfare TTPs. Another area of interest is the implication for

  20. Gray Zone Warfare: German and Russian Political Warfare, 1935-1939, and 2001

    DTIC Science & Technology

    2017-06-09

    Stretching and Exploiting Thresholds for High -Order War: How Russia, China, and Iran are Eroding American Influence Using Time-Tested Measures...PSYOP Terminology,” in American Institutes for Research, Department of the Army Pamphlet 525-7-1-2, The Art and Science of Psychological Operations...efforts to attack the enemies’ “ power , influence, and will.”88 In the United States, Irregular Warfare was not a part of doctrine until 2007, when the

  1. Winning the Counterinsurgency Fight in Iraq: The Role of Political Culture in Counterinsurgency Warfare 2003-2006 in Iraq

    DTIC Science & Technology

    2006-05-26

    Winning the Counterinsurgency Fight in Iraq: The Role of Political Culture in Counterinsurgency Warfare 2003-2006 in Iraq A Monograph by Major...Counterinsurgency Fight in Iraq: The Role of Political Culture in Counterinsurgency Warfare 2003-2006 in Iraq 5c. PROGRAM ELEMENT NUMBER 5d. PROJECT NUMBER 5e...14. ABSTRACT This monograph provides insight into the importance of political culture in relation to developing a counterinsurgency strategy. This

  2. Linear Goal Programming as a Military Decision Aid.

    DTIC Science & Technology

    1988-04-01

    JAMES F. MAJOR9 USAF 13a. TYPE OF REPORT 13b. TIME COVERED 14. DATE OF REPORT (Year, Month, Day) 15. PAGE COUNT IFROM____ TO 1988 APRIL 64 16...air warfare, advanced armour warfare, the potential f or space warfare, and many other advances have expanded the breadth of weapons employed to the...written by A. Charnes and W. W. Cooper, Management Models and Industrial Applications of Linear Programming In 1961.(3:5) Since this time linear

  3. Submarine Warfare in the 20th & 21st Centuries: A Bibliography

    DTIC Science & Technology

    2003-12-01

    International studies series ser. no. 02-019). 49 p. Bailey, Thomas Andrew and Paul B. Ryan. The Lusitania disaster: an episode in modern warfare and...verlagshandlung, 1939. 212 p. Ellis, Frederick D. The tragedy of the Lusitania : embracing authentic stories by the survivors and eye-witnesses of the disaster...warfare; a study of its methods and spirit, including the crime of the " Lusitania ," a record of observations and evidence. New York, London, D. Appleton

  4. The Human Domain and the Future of Army Warfare: Present as Prelude to 2050

    DTIC Science & Technology

    2017-07-01

    ERDC/CERL MP-17-2 ii Abstract Studies on the future of warfare tend to focus on technology and place but largely overlook the actors. Warfare in 2050...will be predominantly urban, utilizing robotics and other advanced technologies , but at the core will re- main an inherently human and political...collaboration for success. Despite the ap- peal of advanced technology , the U.S. Army could greatly benefit by looking beyond strictly technological

  5. Feasibility Study for the Use of Green, Bio-Based, Efficient Reactive Sorbent Material to Neutralize Chemical Warfare Agents

    DTIC Science & Technology

    2012-08-02

    REPORT Feasibility study for the use of green, bio-based, efficient reactive sorbent material to neutralize chemical warfare agents 14. ABSTRACT 16...way cellulose, lignin and hemicelluloses interact as well as whole wood dissolution occurs in ILs. The present project was conducted to 1. REPORT...Feasibility study for the use of green, bio-based, efficient reactive sorbent material to neutralize chemical warfare agents Report Title ABSTRACT Over the

  6. Personal protection during resuscitation of casualties contaminated with chemical or biological warfare agents--a survey of medical first responders.

    PubMed

    Brinker, Andrea; Prior, Kate; Schumacher, Jan

    2009-01-01

    The threat of mass casualties caused by an unconventional terrorist attack is a challenge for the public health system, with special implications for emergency medicine, anesthesia, and intensive care. Advanced life support of patients injured by chemical or biological warfare agents requires an adequate level of personal protection. The aim of this study was to evaluate the personal protection knowledge of emergency physicians and anesthetists who would be at the frontline of the initial health response to a chemical/biological warfare agent incident. After institutional review board approval, knowledge of personal protection measures among emergency medicine (n = 28) and anesthetics (n = 47) specialty registrars in the South Thames Region of the United Kingdom was surveyed using a standardized questionnaire. Participants were asked for the recommended level of personal protection if a chemical/biological warfare agent(s) casualty required advanced life support in the designated hospital resuscitation area. The best awareness within both groups was regarding severe acute respiratory syndrome, and fair knowledge was found regarding anthrax, plague, Ebola, and smallpox. In both groups, knowledge about personal protection requirements against chemical warfare agents was limited. Knowledge about personal protection measures for biological agents was acceptable, but was limited for chemical warfare agents. The results highlight the need to improve training and education regarding personal protection measures for medical first receivers.

  7. [Medecine, Law, and Knowledge Production about the "Civilized" War in the Long 19th Century].

    PubMed

    Goltermann, Svenja

    2015-01-01

    The aim to 'civilize' warfare accompanied Medicine and International Law ever since the mid-19th century. However, the entanglement of Medicine and Law, crucial for such an endeavour, has not been taken into consideration so far; likewise, the huge importance of medical knowledge for the perception of wars and their ramifications did not garner much attention in historical research. Hence, by focusing on the 'long' 19th century, this paper shows, firstly, that the production of surgical knowledge during warfare aimed at measuring the effects of combat on human bodies in order to develop prognostic medical knowledge for future wars, as well as maintaining the combat strength of soldiers. Moreover, this knowledge production during warfare strived for the enhancement of medical competence in the diagnosis and treatment of wounds in general. Secondly, I show that this medical knowledge was not only relevant for warfare, but also crucial for the design of International Law: it served to nourish the debates among the so called 'civilized' nations about legitimate and illegitimate weaponry and warfare.

  8. 48 CFR 205.301 - General.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... not available, in accordance with 225.7002-2(b); or (B) The acquisition is for chemical warfare... determined that this acquisition of chemical warfare protective clothing furthers an agreement with a...

  9. 48 CFR 205.301 - General.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... not available, in accordance with 225.7002-2(b); or (B) The acquisition is for chemical warfare... determined that this acquisition of chemical warfare protective clothing furthers an agreement with a...

  10. 48 CFR 205.301 - General.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... not available, in accordance with 225.7002-2(b); or (B) The acquisition is for chemical warfare... determined that this acquisition of chemical warfare protective clothing furthers an agreement with a...

  11. Sowing the seeds of skepticism: Russian state news and anti-GMO sentiment.

    PubMed

    Dorius, Shawn F; Lawrence-Dill, Carolyn J

    2018-03-21

    Biotech news coverage in English-language Russian media fits the profile of the Russian information warfare strategy described in recent military reports. This raises the question of whether Russia views the dissemination of anti-GMO information as just one of many divisive issues it can exploit as part of its information war, or if GMOs serve more expansive disruptive purposes. Distinctive patterns in Russian news provide evidence of a coordinated information campaign that could turn public opinion against genetic engineering. The recent branding of Russian agriculture as the ecologically clean alternative to genetically engineered foods is suggestive of an economic motive behind the information campaign against western biotechnologies.

  12. Decontamination issues for chemical and biological warfare agents: how clean is clean enough?

    PubMed

    Raber, E; Jin, A; Noonan, K; McGuire, R; Kirvel, R D

    2001-06-01

    The objective of this assessment is to determine what level of cleanup will be required to meet regulatory and stakeholder needs in the case of a chemical and/or biological incident at a civilian facility. A literature review for selected, potential chemical and biological warfare agents shows that dose information is often lacking or controversial. Environmental regulatory limits or other industrial health guidelines that could be used to help establish cleanup concentration levels for such agents are generally unavailable or not applicable for a public setting. Although dose information, cleanup criteria, and decontamination protocols all present challenges to effective planning, several decontamination approaches are available. Such approaches should be combined with risk-informed decision making to establish reasonable cleanup goals for protecting health, property, and resources. Key issues during a risk assessment are to determine exactly what constitutes a safety hazard and whether decontamination is necessary or not for a particular scenario. An important conclusion is that cleanup criteria are site dependent and stakeholder specific. The results of a modeling exercise for two outdoor scenarios are presented to reinforce this conclusion. Public perception of risk to health, public acceptance of recommendations based on scientific criteria, political support, time constraints, and economic concerns must all be addressed in the context of a specific scenario to yield effective and acceptable decontamination.

  13. Cyber ACTS/SAASS: A Second Year of Command and Staff College for the Future Leaders of Our Cyber Forces

    DTIC Science & Technology

    2009-01-01

    objectives. The Air Force is struggling to determine the best way of developing offensive and defensive capabilities for cyber warfare . Our warfighting...education (IDE) cyber warfare program at the Air Force Institute of Technology (AFIT), located at Wright-Patterson AFB, Ohio. I propose that the Air...Force create a two-year professional military education (PME) path consisting of ACSC followed by AFIT’s cyber warfare program, paralleling the current path of ACSC followed by SAASS.

  14. Liquid Chromatography Electrospray Ionization Mass Spectrometric (LC-ESI-MS) and Desorption Electrospray Ionization Mass Spectrometric (DESI-MS) Identification of Chemical Warfare Agents in Consumer Products

    DTIC Science & Technology

    2007-06-01

    T ACanadaY Approved for PublicR Distribution Uln& Liquid Chromatography Electrospray Ionization Mass Spectrometric ( LC -ESI- MS) and Desorption...consumer products with chemical warfare agents or other toxic chemicals. Liquid chromatography electrospray ionization mass spectrometry ( LC -ESI-MS) and...house LC -ESI-MS and LC -ESI-MS/MS methods were evaluated for the determination of chemical warfare agents in spiked bottled water samples. The

  15. Continuous Acoustic Sensing With an Unmanned Aerial Vehicle System for Anti-Submarine Warfare in a High-Threat Area

    DTIC Science & Technology

    2015-12-01

    strive in multiple warfare areas. This research benefits not only the Navy, through enhancement of offensive warfighting by testing the next...multiple warfare areas. This research benefits not only the Navy, through enhancement of offensive warfighting by testing the next generation of...produce and definitely worth the research and testing to be a positive asset for the Navy. It not only can stay on station for an exponential amount of

  16. Set Up for Failure: The Use of US Security Force Assistance to Prepare Foreign Security Forces for Traditional Combat Operations

    DTIC Science & Technology

    2017-05-17

    Do the SFA lessons drawn from the unconventional warfare focus of the post-9-11 paradigm hold true across the spectrum of conflict, or are there...relevance. Do the SFA lessons drawn from the unconventional warfare focus of the post-9-11 paradigm hold true across the spectrum of conflict, or...traditional warfare is fought changes from epoch to epoch as technology, armament, and other factors change, but certain immutable principles hold true

  17. What Good Are Warfare Models?

    DTIC Science & Technology

    1981-05-01

    PROFESSIONAL PAPER 306 / May 1981 WHAT GOOD ARE WARFARE MODELS? Thomas E. Anger DTICS E LECTE ,JUN 2198 1 j CENTER FOR NAVAL ANALYSES 81 6 19 025 V...WHAT GOOD ARE WARFARE MODELS? Thomas E. /Anger J Accession For !ETIS GRA&I DTIC TAB thonnounceldŕ 5 By-C Availability Codes iAva il aand/or Di1st...least flows from a life-or-death incenLive to make good guesses when choosing weapons, forces, or strategies. It is not surprising, however, that

  18. Unmanned Warfare: Second and Third Order Effects Stemming from the Afghan Operational Environment between 2001 and 2010

    DTIC Science & Technology

    2011-06-10

    the very nature of warfare took a dramatic step into the future. With new assets capable of remaining airborne for nearly 24 hours and live video ...warfare took a dramatic step into the future. With new assets capable of remaining airborne for nearly 24 hours and live video feeds streaming to...shape the battlefield during protracted combat operations. From the real time video feeds, to the 24 hour coverage of an area of interest, tangible

  19. Space and Naval Warfare Systems Command and Overall Navy Needs to Improve Management of Waiver and Deferral Requests

    DTIC Science & Technology

    2015-10-08

    Management of Waiver and Deferral Requests Visit us at www.dodig.mil Objective Our objective for this audit was to evaluate the Space and Naval Warfare...We conducted this audit in accordance with generally accepted government auditing standards. We considered management comments on a draft of...OFFICIAL USE ON Y Introduction DODIG-2016-003 │ 1 Introduction Objective Our objective for this audit was to evaluate the Space and Naval Warfare

  20. An Empirical Examination of the Warfare Metaphor with Respect to Pre-Service Elementary Teachers

    NASA Astrophysics Data System (ADS)

    Cobern, William W.; Loving, Cathleen C.; Davis, Edward B.; Terpstra, Jeff

    2013-08-01

    Since its origination in the late nineteenth century, the warfare metaphor has been used to characterize the relationship between science and religion, especially orthodox Christianity. Though thoroughly discredited by historians of science, the ideological descendants of Thomas Huxley, who spoke of science in quasi-religious terms, have kept the warfare metaphor alive. On the other hand, there are substantial numbers of Christians who at least appear to oppose science given their high-profile opposition to the general theory of evolution. The research reported in this paper asked, "Does anti-science sentiment increase with increasing orthodox Christian belief?" Two validated, published instruments were used: The Thinking about Science Survey Instrument and the Christian Fundamentalist Belief Scale. The subjects for the study were 545 preservice elementary teachers. The analysis did not show that anti-science sentiment increases with increasing Christian belief. Subjects with strong Christian beliefs were found to be just as supportive of science, if not more so, than subjects with no Christian beliefs. The study concludes with a caution against projecting attitudes toward science "on the whole" based on attitudes specifically toward evolution when working with preservice elementary teachers. Such a projection could well be counterproductive. The study has implications for other modern countries having highly religious populations such as Turkey.

  1. Evaluating Courses of Actions at the Strategic Planning Level

    DTIC Science & Technology

    2013-03-01

    and statistical decision theory ( Schultz , Borrowman and Small 2011). Nowadays, it is hard to make a decision by ourselves. Modern organizations...Analysis." Lecture Slides, October 2011. Schultz , Martin T., Thomas D. Borrowman, and Mitchell J. Small. Bayesian Networks for Modeling Dredging...www.ukessays.com/essays/business/strategic-analysis-of-procter-and-gamble.php (accessed October 09, 2012). Vego, Milan . Joint Operational Warfare. Vol. Vol 1

  2. Cost Benefit Analysis of MARSOC Marines in the Naval Postgraduate School Department of Defense Analysis

    DTIC Science & Technology

    2011-12-01

    Policy. Graduates will develop an ability to think strategically, analyze past operations, and apply historical lessons to future joint and combined...Naval Special Warfare Development Group O-## Officer, ## Rank OPMEP Officer, Professional Military Education Program OPTEMPO Operational Tempo...Marine Corps. 2 Joint Special Operations University (2007). MCSOCOM Prrof of Concept Deployment Evaluation Report. Hurlburt Field : Joint Special

  3. Psychokinesis and Its Possible Implication to Warfare Strategy

    DTIC Science & Technology

    1985-01-01

    E. 4Rhine began to study psychic phenomena; their research "initially focused on telepathy and clairvoyance. In 1934, J. B. Rhine instituted PK... dream recall (1983 PRL Annual Report). The efforts of PRL to standardize or at least to establish uniformity within the subject populations being...64 -77). Soviet Parapsychology Research. Medical Intelligence and Information Agency. (CLASSIFIED). (S18841.80). Ix, Stanescu, S. Telepathy in

  4. Effects Based Operations: Applying Network Centric Warfare in Peace, Crisis, and War

    DTIC Science & Technology

    2003-01-01

    understanding what factors play in the cognitive process of the leadership (e.g., the survival of the organization), and then threatening those...concept. To address the “why” of the stimulus and response, we must understand something of the cognitive processes involved in observing and responding to...between the cognitive domain and the information domain. It is the problem of communicating understanding

  5. Using Target Network Modelling to Increase Battlespace Agility

    DTIC Science & Technology

    2013-06-01

    Moffat, James. (2003) Complexity Theory and Network Centric Warfare. Washington DC: CCRP Moore, David T.. Sensemaking : A Structure for an Intelligence...Ted Hopf’s “Promise of Constructivism in International Relations Theory ” presented in International Security in 1998; and Adler 1998. 5 Look to...of warfighting within a doctrinal framework. Based on 10 years of research12 informed by social theory , experimentation, NATO doctrinal studies and

  6. Naval Expeditionary Logistics: A Handbook for Complementing and Supporting Land Forces

    DTIC Science & Technology

    2006-09-01

    required for Navy or Marine Corps forces assigned or attached to other commands, services, or nations. (5) (U) Assign responsibilities to support...PAGE Form Approved OMB No. 0704-0188 Public reporting burden for this collection of information is estimated to average 1 hour per response , including...accomplished by reviewing numerous documents of military units and federal agencies whose principal responsibility is expeditionary warfare and

  7. Future War: An Assessment of Aerospace Campaigns in 2010,

    DTIC Science & Technology

    1996-01-01

    theoretician: "The impending sixth generation of warfare, with its centerpiece of superior data-processing to support precision smart weaponry, will radically...tions concept of " smart push, warrior pull." If JFACC were colocated with the worldwide intelligence manager, unit taskings and the applicable...intelligence information could be distributed concurrently (" smart push"). Intelligence officers sitting alongside the operational tasking officers would

  8. Defeating Adversary Network Intelligence Efforts with Active Cyber Defense Techniques

    DTIC Science & Technology

    2008-06-01

    Hide Things from Hackers: Processes, Principles, and Techniques,” Journal of Information Warfare , 5 (3): 26-40 (2006). 20. Rosenau, William ...54 Additional Sources Apel , Thomas. Generating Fingerprints of Network Servers and their Use in Honeypots. Thesis. Aachen University, Aachen...Paul Williams , PhD (ENG) REPORT U ABSTRACT U c. THIS PAGE U 17. LIMITATION OF ABSTRACT UU 18. NUMBER OF PAGES 55

  9. Background Perchlorate Source Identification Technical Guidance

    DTIC Science & Technology

    2013-12-01

    Sciences Branch (Code 71752) of the Advanced Systems and Applied Sciences Division (Code 71700), Space and Naval Warfare Systems Center (SSC Pacific), San...Head Advanced Systems & Applied Sciences Division iii EXECUTIVE SUMMARY The objective of this document is to outline the approach, tools, and...Helium HMX Octahydro-1,3,5,7-Tetranitro-1,3,5,7- Tetrazocine IR Installation Restoration IRIS Integrated Risk Information System IR-MS Isotope-Ratio

  10. A Network Centric Warfare (NCW) Compliance Process for Australian Defence

    DTIC Science & Technology

    2006-08-01

    discovery and access by a wide range of authorised Defence users. The information could be used to simplify future NCW Compliance Assessments by re-using...Security standards 1. General Security Services - General Table 5.1 2. General Security services - Authentication Table 5.2 3. General Security...Personnel Positions in an authorised establishment must be filled by individuals who satisfy the necessary individual readiness requirements

  11. Bytes: Weapons of Mass Disruption

    DTIC Science & Technology

    2002-04-01

    advances compound the problems of protecting complex global infrastructures from attacks. How should the U.S. integrate the many disparate...deploy and sustain military forces.".16 According to the direst of information warfare theories , all computer systems are vulnerable to attack. The...Crisis Show of Force Punitive Strikes Armed Intervention Regional Conflict Regional War Global Conventional War Strategic Nuclear War IW & C2W area of

  12. Command and Control Common Semantic Core Required to Enable Net-centric Operations

    DTIC Science & Technology

    2008-05-20

    automated processing capability. A former US Marine Corps component C4 director during Operation Iraqi Freedom identified the problems of 1) uncertainty...interoperability improvements to warfighter community processes, thanks to ubiquitous automated processing , are likely high and somewhat easier to quantify. A...synchronized with the actions of other partners / warfare communities. This requires high- quality information, rapid sharing and automated processing – which

  13. Deception: Theory and Practice

    DTIC Science & Technology

    2012-06-01

    original ] on the enemy is made by surprise obtained by deception and ambush…. By feint and demonstration… by spreading false information, the...Cover and Deception Training (Fort Monroe, VA: Department of the Army, 1948). 39 Alfred Paddock Jr, US Army Special Warfare. Its Origins ...desires are frequently reflected in U.S. Army doctrine. For example, FM 100-5 (1939) states: The ultimate objective [emphasis in original ] of all

  14. A Strategic Approach to Joint Officer Management: Analysis and Modeling Results

    DTIC Science & Technology

    2009-01-01

    rules. 5 Johnson and Wichern, 2002, p. 643. 6 Sullivan and Perry, 2004, p. 370. 7 Francesco Mola and Raffaele Miele, “Evolutionary Algorithms for...in Military Affairs, Newport, R.I.: Center for Naval Warfare Studies, 2003. Mola , Francesco, and Raffaele Miele, “Evolutionary Algorithms for

  15. Systems Analysis of Alternative Architectures for Riverine Warfare in 2010

    DTIC Science & Technology

    2006-12-01

    propose system of systems improvements for the RF in 2010. With the RF currently working to establish a command structure, train and equip its forces...opposing force. Measures of performance such as time to first enemy detection and loss exchange ratio were collected from MANA. A detailed statistical

  16. Understanding Information Uncertainty within the Context of a Net-Centric Data Model: A Mine Warfare Example

    DTIC Science & Technology

    2008-06-01

    key assumption in the calculation of the primary MIW MOEs of the estimated risk to a transitor and the expected time required to clear all of the mines...primary MOE of Risk, or Probability of Damage to a Ship Transitor , is calculated by using information in the highlighted circle on the left, to include...percent clearance achieved. 0 E( ) Pr( | , ) r R r r m p ∞ = = ∗∑ (0.2) Risk can be calculated for each transitor given the expected number of

  17. Surfacing Rescue Container Concept Design for Trident Submarines

    DTIC Science & Technology

    2009-06-01

    crew of their decompression obligation and will give undersea medical officers (UMO) on land the information they need to treat the crew upon arrival...ard . B ead boa ) Ba wit to ntly ora sa en s o is d OX ld er s h ule los is e v of t . L ec pu tin tte hin ad a te fety den f s to ma t...Information Service, 1970. [34] SURVIVEX 2003, Exercise Tests Disabled Submarine Survival. Horn, Wayne G. 1, s.l. : Undersea Warfare, 2003, Vol. 6, pp

  18. Femoral vessel injuries in modern warfare since Vietnam.

    PubMed

    Pearl, Jonathan P; McNally, Michael P; Perdue, Philip W

    2003-09-01

    The incidence of lower extremity injuries is high in modern warfare; however the mortality rate from these injuries is low. Despite the overall low mortality of lower extremity injuries, many deaths in modern conflicts are due to femoral vessel injury. The modern warfare literature was reviewed. In Somalia, 1 of the 14 reported deaths was due to a laceration of the superficial femoral artery. In the Persian Gulf, three deaths were reported in an Army field hospital, one resulted from uncontrolled hemorrhage from a profunda femoris artery wound and two others resulted from traumatic amputations with consequent major arterial injury. Despite the advances in modern body armor, the groin is left unprotected. A strategy to help minimize U.S. casualties in modern warfare may be a method of field hemostasis specifically designed for femoral vessel injury.

  19. Detection of biological warfare agents using ultra violet-laser induced fluorescence LIDAR

    NASA Astrophysics Data System (ADS)

    Joshi, Deepti; Kumar, Deepak; Maini, Anil K.; Sharma, Ramesh C.

    This review has been written to highlight the threat of biological warfare agents, their types and detection. Bacterial biological agent Bacillus anthracis (bacteria causing the disease anthrax) which is most likely to be employed in biological warfare is being discussed in detail. Standoff detection of biological warfare agents in aerosol form using Ultra violet-Laser Induced Fluorescence (UV-LIF) spectroscopy method has been studied. Range-resolved detection and identification of biological aerosols by both nano-second and non-linear femto-second LIDAR is also discussed. Calculated received fluorescence signal for a cloud of typical biological agent Bacillus globigii (Simulants of B. anthracis) at a location of ˜5.0 km at different concentrations in presence of solar background radiation has been described. Overview of current research efforts in internationally available working UV-LIF LIDAR systems are also mentioned briefly.

  20. Gender differences in the impact of warfare exposure on self-rated health.

    PubMed

    Wang, Joyce M; Lee, Lewina O; Spiro, Avron

    2015-01-01

    This study examined gender differences in the impact of warfare exposure on self-reported physical health. Data are from the 2010 National Survey of Veterans, a nationally representative survey of veterans from multiple eras of service. Regression analyses assessed gender differences in the association between warfare exposure (deployment to a war zone, exposure to casualties) and health status and functional impairment, adjusting for sociodemographics. Women reported better health status but greater functional impairment than men. Among men, those who experienced casualties only or both casualties and deployment to a war zone had worse health compared with those who experienced neither stressor or deployment to a war zone only. Among women, those who experienced casualties only or both stressors reported worse health than those who experienced war zone only, who did not differ from the unexposed. No association was found between warfare exposure and functional impairment in women; in men, however, those who experienced exposure to casualties or both stressors had greater odds of functional impairment compared with those who experienced war zone only or neither stressor. Exposure to casualties may be more predictive of health than deployment to a war zone, especially for men. We did not find a stronger association between warfare exposure and health for women than men. Given that the expansion of women's military roles has allowed them to serve in direct combat, their degree and scope of warfare exposure is likely to increase in the future. Copyright © 2015 Jacobs Institute of Women's Health. All rights reserved.

  1. Gender Differences in the Impact of Warfare Exposure on Self-Rated Health

    PubMed Central

    Wang, Joyce M.; Lee, Lewina O.; Spiro, Avron

    2014-01-01

    BACKGROUND This study examined gender differences in the impact of warfare exposure on self-reported physical health. METHODS Data are from the 2010 National Survey of Veterans, a nationally representative survey of veterans from multiple eras of service. Regression analyses assessed gender differences in the association between warfare exposure (deployment to a war zone, exposure to casualties) and health status and functional impairment, adjusting for sociodemographics. FINDINGS Women reported better health status but greater functional impairment than men. In men, those who experienced casualties only or both casualties and deployment to a war zone had worse health compared to those who experienced neither stressor or deployment to a war zone only. In women, those who experienced casualties only or both stressors reported worse health than those who experienced war zone only, who did not differ from the unexposed. No association was found between warfare exposure and functional impairment in women, but in men, those who experienced exposure to casualties or both stressors had greater odds of functional impairment compared to those who experienced war zone only or neither stressor. CONCLUSIONS Exposure to casualties may be more predictive of health than deployment to a war zone, especially for men. We did not find a stronger association between warfare exposure and health for women than men. Given that the expansion of women's military roles has allowed them to serve in direct combat, their degree and scope of warfare exposure is likely to increase in the future. PMID:25442366

  2. Surface-enhanced Raman detection of CW agents in water using gold sol gel substrates

    NASA Astrophysics Data System (ADS)

    Premasiri, W. Ranjith; Clarke, Richard H.; Womble, M. Edward

    2002-02-01

    The development of a water analysis system capable of detecting both inanimate trace chemical contaminants and viable microbial contaminants has long been a project of interest to our group. The capability of detecting both chemical and biological agent sources in a single device configuration would clearly add to the value of such a product. In the present work, we describe results with chemical warfare agents from our efforts to produce a Raman system for the detection of both chemical and biological warfare agents in water. We utilize laser Raman light scattering and employ Surface Enhanced Raman Spectroscopy (SERS)on solid state gold sol-gel detectors combined with fiber optic collection of the enhanced light signal in the sampling system to augment the normally low intensity Raman Scattering signal from trace materials.

  3. Introduction to electronic warfare

    NASA Astrophysics Data System (ADS)

    Schleher, D. C.

    A broad overview of electronic warfare (EW) is given, emphasizing radar-related EW applications. A broad perspective of the EW field is first given, defining EW terms and giving methods of EW threat analysis and simulation. Electronic support measures and electronic countermeasures (ECM) systems are described, stressing their application to radar EW. Radars are comprehensively discussed from a system viewpoint with emphasis on their application in weapon systems and their electronic counter-countermeasures capabilities. Some general topics in C3 systems are described, stressing communication systems, C3I systems, and air defense systems. Performance calculations for EW and radar systems are covered, and modern EW signal processing is described from an airborne ECM perspective. Future trends and technology in the EW world are considered, discussing such topics as millimeter-wave EW, low-observable EW technology, GaAs monolithic circuits, VHSIC, and AI.

  4. Oxidative decontamination of chemical and biological warfare agents using L-Gel.

    PubMed

    Raber, Ellen; McGuire, Raymond

    2002-08-05

    A decontamination method has been developed using a single reagent that is effective both against chemical warfare (CW) and biological warfare (BW) agents. The new reagent, "L-Gel", consists of an aqueous solution of a mild commercial oxidizer, Oxone, together with a commercial fumed silica gelling agent, Cab-O-Sil EH-5. L-Gel is non-toxic, environmentally friendly, relatively non-corrosive, maximizes contact time because of its thixotropic nature, clings to walls and ceilings, and does not harm carpets or painted surfaces. The new reagent also addresses the most demanding requirements for decontamination in the civilian sector, including availability, low maintenance, ease of application and deployment by a variety of dispersal mechanisms, minimal training and acceptable expense. Experiments to test the effectiveness of L-Gel were conducted at Lawrence Livermore National Laboratory and independently at four other locations. L-Gel was tested against all classes of chemical warfare agents and against various biological warfare agent surrogates, including spore-forming bacteria and non-virulent strains of real biological agents. Testing showed that L-Gel is as effective against chemical agents and biological materials, including spores, as the best military decontaminants.

  5. The Cyber Warfare Professional: Realizations for Developing the Next Generation

    DTIC Science & Technology

    2011-01-01

    consequences for the others. However, just as airpower soon emerged as a revolution in military affairs during the early twentieth century, so may cyber warfare become the next revolution for the new millennium.

  6. Textbook of Military Medicine. Part 1. Warfare, Weaponry, and the Casualty. Part 5. Conventional Warfare. Ballistic, Blast, and Burn Injuries

    DTIC Science & Technology

    1991-01-01

    United States. Because the vast majority of our patients are not active -duty military personnel, it may seem that our day-to-day ac- tivities are far... activated . A designated time-delay fuse uses an Source: Reference 8 15 Conventional Warfare: Ballistic, Blast, and Burn Injuries explosion and the...be found embedded and unexploded in tissue. The fuse is located at the tip of the warhead, and is activated and will deionate on contact only after

  7. Encyclopedia of Explosives and Related Items. Volume 10

    DTIC Science & Technology

    1983-01-01

    trinitroethyl stearate 6 E330 Ethyiphosphorodimethylamidycyanadate se Ethyl-substituted acid amides, N-trinitro derivs GA chemical warfare agent 2.C 167; 6...6 GI Galex 6 G8-G9 GA (chemical warfare agent ) 6 G 1 Galil rifle 6 G9 GA see Dimethylaminocyanophosphoric acid Galil rifle 6 G9 5 D1308-D1309 Gabeaud...G45 Gas volumes produced on expln or detonation Gelatina explosiva de guerra 6 G45 of expls 6 G36-G41 Gelatina gomma 6 G45 Gas warfare agents 2 C165

  8. SIGINT, EW, and EIW in the Korean People’s Army: An Overview of Development and Organization

    DTIC Science & Technology

    2005-08-01

    Joseph S. Bermudez Jr. "The basic key to victory in modern warfare is to do well in electronic warfare …" Kim Jong Il96 For many years now the...96 “ Kim Jong Il Stresses Electronic Warfare Capabilities,” Radio P’yongyang, 24 September 1999, as cited in FBIS. Bytes and Bullets... Kim Jong Il98 Details concerning how the MPAF developed this understanding, and how it has organized and planned to conduct SIGINT, EW and EIW

  9. Air Force Cyber Warfare: Now and the Future

    DTIC Science & Technology

    2013-10-01

    cyber warfare in popular culture. Most of them focus on the individual s uncanny grasp of technology the ability to exploit any system with a dizzying flurry of keystrokes or to fend off adversaries with a smartphone, a paper clip, and an ingenious plan. These socially awkward heroes and heroines fill the silver screen with visions of a new kind of warfare. Contradicting these stereotypes, Air Force cyber operations are carefully planned and controlled by disciplined, rigorously trained operators. Rather than acting alone, these professionals produce effects in support of

  10. Science, Technology, and Warfare. Proceedings of the Military History Symposium (3rd) Held at the United States Air Force Academy (Colorado Springs, Colorado) on 8-9 May 1969

    DTIC Science & Technology

    1970-09-01

    between science-technology and warfare. The stereotyped theory of a linear relationship between science, technology, and warfare satisfies the facts...therefore discarded piecemeal. Only with Mahan’s theory did this condition change. Morison then considers the opposite problem today: one in which the...1938), 1:531. = A s is now very well known, the impetus theory expounded with variations by all the most important writers on philosophy of motion

  11. Reconstructing exposures from the UK chemical warfare agent human research programme.

    PubMed

    Keegan, Tj; Nieuwenhuijsen, Mj; Fletcher, T; Brooks, C; Doyle, P; Maconochie, Nes; Carpenter, Lm; Venables, Km

    2007-07-01

    The UK government has carried out a research programme studying military capability under conditions of chemical warfare at a facility at Porton Down, Wiltshire, since World War I. In 2001 the Ministry of Defence commissioned a cohort study to investigate the long-term health effects on military veterans of their participation in this programme. We assessed the availability and quality of exposure assessment data held in the archive at Porton Down for the purpose of this study. This involved looking in detail at exposure data in a sample of 150 veterans and undertaking a general review of all available records held in the archive. These sources suggested that the Porton Down records were largely complete and included sufficient identifying information for linkage with service personnel data and with national mortality and cancer registration records. Servicemen usually had multiple tests so data were most readily available in a test-wise format, allowing subsequent aggregation of tests by individual. The name of the chemical used in each test could be determined for most tests and most of the named chemicals could be categorized into major groups for epidemiological analyses. For the major groups (vesicants and nerve agents), quantitative data were available on exposure and on acute toxicity. Standardization will be required of the several different units which were used. Based on this study, exposure assessment for the cohort study of Porton Down veterans will involve abstraction of the name of the chemical used in each test, with quantitative data on exposure and acute toxicity for vesicants and nerve agents. Our results here show that experimental records at Porton Down offer a unique and valuable resource for reconstructing the chemical exposures used in this research programme. The resulting cohort study has the potential to provide information which will assist in understanding the long-term health impact of chemical warfare agent exposure on these veterans.

  12. Hybrid Threat Center of Gravity Analysis: Cutting the Gordian Knot

    DTIC Science & Technology

    2016-04-04

    water avoids the heights … so an army avoids strengths and strikes weakness … water has no constant form.”1 - Sun Tzu Hybrid warfare is a topic...1 Sun Tzu , The Art of War, (Oxford University Press, London, 1963), 101. 2 Alba Iulia...and Boyer, Matthew. Vulnerability Assessment Method Pocket Guide: A Tool for Center of Gravity Analysis. RAND, 2014. Tzu , Sun . The Art of War

  13. Interagency Cooperation for Irregular Warfare at the Combatant Command

    DTIC Science & Technology

    2009-01-01

    Directorate, and the USSOCOM Interagency Task Force ( IATF ) offer examples of JIACGs coping with the issues of IW. Each organization possesses strengths...46 USSOCOM IATF History...Force for Irregular Warfare ( IATF IW).33 EUCOM conducts interagency

  14. A history of biological and chemical warfare and terrorism.

    PubMed

    Malloy, C D

    2000-07-01

    This article provides a brief history of biological warfare and terrorism. It contends that examining disease in history provides public health specialists with the knowledge necessary to improve our surveillance system for potential acts of bioterrorism.

  15. Fluorescent sensors for the detection of chemical warfare agents.

    PubMed

    Burnworth, Mark; Rowan, Stuart J; Weder, Christoph

    2007-01-01

    Along with biological and nuclear threats, chemical warfare agents are some of the most feared weapons of mass destruction. Compared to nuclear weapons they are relatively easy to access and deploy, which makes them in some aspects a greater threat to national and global security. A particularly hazardous class of chemical warfare agents are the nerve agents. Their rapid and severe effects on human health originate in their ability to block the function of acetylcholinesterase, an enzyme that is vital to the central nervous system. This article outlines recent activities regarding the development of molecular sensors that can visualize the presence of nerve agents (and related pesticides) through changes of their fluorescence properties. Three different sensing principles are discussed: enzyme-based sensors, chemically reactive sensors, and supramolecular sensors. Typical examples are presented for each class and different fluorescent sensors for the detection of chemical warfare agents are summarized and compared.

  16. An evolutionary theory of large-scale human warfare: Group-structured cultural selection.

    PubMed

    Zefferman, Matthew R; Mathew, Sarah

    2015-01-01

    When humans wage war, it is not unusual for battlefields to be strewn with dead warriors. These warriors typically were men in their reproductive prime who, had they not died in battle, might have gone on to father more children. Typically, they are also genetically unrelated to one another. We know of no other animal species in which reproductively capable, genetically unrelated individuals risk their lives in this manner. Because the immense private costs borne by individual warriors create benefits that are shared widely by others in their group, warfare is a stark evolutionary puzzle that is difficult to explain. Although several scholars have posited models of the evolution of human warfare, these models do not adequately explain how humans solve the problem of collective action in warfare at the evolutionarily novel scale of hundreds of genetically unrelated individuals. We propose that group-structured cultural selection explains this phenomenon. © 2015 Wiley Periodicals, Inc.

  17. Changing the Scale and Efficiency of Chemical Warfare Countermeasure Discovery Using the Zebrafish

    PubMed Central

    Peterson, Randall T.; MacRae, Calum A.

    2013-01-01

    As the scope of potential chemical warfare agents grows rapidly and as the diversity of potential threat scenarios expands with non-state actors, so a need for innovative approaches to countermeasure development has emerged. In the last few years, the utility of the zebrafish as a model organism that is amenable to high-throughput screening has become apparent and this system has been applied to the unbiased discovery of chemical warfare countermeasures. This review summarizes the in vivo screening approach that has been pioneered in the countermeasure discovery arena, and highlights the successes to date as well as the potential challenges in moving the field forward. Importantly, the establishment of a zebrafish platform for countermeasure discovery would offer a rapid response system for the development of antidotes to the continuous stream of new potential chemical warfare agents. PMID:24273586

  18. Detection of biological warfare agents using ultra violet-laser induced fluorescence LIDAR.

    PubMed

    Joshi, Deepti; Kumar, Deepak; Maini, Anil K; Sharma, Ramesh C

    2013-08-01

    This review has been written to highlight the threat of biological warfare agents, their types and detection. Bacterial biological agent Bacillus anthracis (bacteria causing the disease anthrax) which is most likely to be employed in biological warfare is being discussed in detail. Standoff detection of biological warfare agents in aerosol form using Ultra violet-Laser Induced Fluorescence (UV-LIF) spectroscopy method has been studied. Range-resolved detection and identification of biological aerosols by both nano-second and non-linear femto-second LIDAR is also discussed. Calculated received fluorescence signal for a cloud of typical biological agent Bacillus globigii (Simulants of B. anthracis) at a location of ~5.0 km at different concentrations in presence of solar background radiation has been described. Overview of current research efforts in internationally available working UV-LIF LIDAR systems are also mentioned briefly. Copyright © 2013 Elsevier B.V. All rights reserved.

  19. Learning to Adapt to Asymmetric Threats

    DTIC Science & Technology

    2005-08-01

    College, Carlisle, PA, September 2003. Book, Howard, “Gauge your Awareness,” Inside the Mind of the Leader, January 2004, pp. 32 Bourke , Canice...biblio/b-explrn.htm, February 8, 2005. Lambakis, Steven J., “Reconsidering Asymmetric Warfare,” JFQ, issue 36, Spring 2005. Latour, Sharon M., (USAF...Sword: What if Sun Tzu and John Boyd did a National Defense Review?,” Washington, DC, Center for Defense Information, February 2003. Riedel, Sharon L

  20. The Grand Challenges of Command and Control Policy

    DTIC Science & Technology

    2006-06-01

    Memetic Warfare Memes are ideas that can be modeled and simulated. In a modern journalistic environment, dynamic information feedback from the theater...output type such that both adversarial meme processes and our counter anti- memetic activity could be modeled, simulated, and assessed. I am now...opposing force of the consequence of using biological or chemical weapons on the invading American forces. Do we have the proper memetic dynamics

Top