Sample records for warfare

  1. Beyond-the-Box Thinking on Future War: The Art and Science of Unrestricted Warfare

    DTIC Science & Technology

    2009-04-01

    Studies Institute, US Army War College, 2008. Mattis , James N., and Frank Hoffman. “Future Warfare: The Rise of Hybrid Warfare.” Proceedings...nanotechnologies will augment the current bio -chemical capabilities, moving the battlefield into a microscopic arena. As seen before, the traditional American way...Military Trans-military Non-military Atomic Warfare Diplomatic Warfare Financial Warfare Conventional Warfare Network Warfare Trade Warfare Bio

  2. Cyber Warfare/Cyber Terrorism

    DTIC Science & Technology

    2004-03-19

    Section 1 of this paper provides an overview of cyber warfare as an element of information warfare, starting with the general background of the...alternative form of conflict, reviews the traditional principles of warfare and why they may or may not apply to cyber warfare , and proposes new principles of...warfare that may be needed to conduct cyber warfare . Section 1 concludes with a review of offensive and defensive cyber warfare concepts. Section 2

  3. Cyber Warfare: China’s Strategy to Dominate in Cyber Space

    DTIC Science & Technology

    2011-06-10

    CYBER WARFARE : CHINA‘S STRATEGY TO DOMINATE IN CYBER SPACE A thesis presented to the Faculty of the U.S. Army Command and...warfare supports the use of cyber warfare in future conflict. The IW militia unit organization provides each Chinese military region commander with...China, Strategy, Cyber Warfare , Cyber Space, Information Warfare, Electronic Warfare 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF ABSTRACT 18

  4. Cyber Warfare: An Evolution in Warfare not Just War Theory

    DTIC Science & Technology

    2013-04-05

    cyber warfare is greatly debated. While some argue that Just War Theory is irrelevant to cyber warfare , a careful analysis demonstrates that it is a...useful tool for considering the morality of cyber warfare . This paper examines the application of Just War Theory to cyber warfare and contends that...Just War Theory is a useful tool for considering the morality of cyber warfare .

  5. Adapting Unconventional Warfare Doctrine to Cyberspace Operations: An Examination of Hacktivist Based Insurgencies

    DTIC Science & Technology

    2015-06-12

    Unconventional Warfare, Cyberspace Operations, Cyber Warfare , Hacktivism, China, Russia, Georgia, Estonia, Umbrella Revolution, UW, Cyber, Guerilla, Hacktivist...6 Cyber Warfare ............................................................................................................. 7...Internet, and cyber warfare , the nature of the human element in cyberspace exhibits only a scientific advancement in the evolution of warfare, not a

  6. 78 FR 58524 - Takes of Marine Mammals Incidental to Specified Activities; U.S. Navy Training and Testing...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-09-24

    ... and testing activities: anti-surface warfare; anti- submarine warfare; mine warfare; naval special warfare; major training activities; Naval Air Systems Command (NAVAIR) testing; anti-surface warfare testing; anti-submarine warfare testing; Naval Sea Systems Command (NAVSEA) testing; and Office of Naval...

  7. On Cyber Warfare Command and Control Systems

    DTIC Science & Technology

    2004-06-01

    longer adequate to rely solely on the now traditional defense-in-depth strategy. We must recognize that we are engaged in a form of warfare, cyber warfare , and... warfare . This causes security devices to be used ineffectively and responses to be untimely. Cyber warfare then becomes a one-sided battle where the... cyber warfare strategy and tactics requires a cyber warfare command and control system. Responses to cyber attacks do not require offensive measures

  8. Does the Economy or Surface Warfare Officer Career Pay Affect Surface Warfare Officer Retention?

    DTIC Science & Technology

    2014-12-01

    be a career SWO (Surface Warfare Enterprise, 2013). 6 Military pay was more important to men than women ...OR SURFACE WARFARE OFFICER CAREER PAY AFFECT SURFACE WARFARE OFFICER RETENTION? by Meagan B. Makarenko December 2014 Thesis Advisor...2014 3. REPORT TYPE AND DATES COVERED Master’s Thesis 4. TITLE AND SUBTITLE DOES THE ECONOMY OR SURFACE WARFARE OFFICER CAREER PAY AFFECT

  9. Strategic Impact of Cyber Warfare Rules for the United States

    DTIC Science & Technology

    2010-03-01

    Despite the growing complexities of cyberspace and the significant strategic challenge cyber warfare poses on the United States’ vital interests few...specific rules for cyber warfare exist. The United States should seek to develop and maintain cyber warfare rules in order to establish...exemplify the need for multilaterally prepared cyber warfare rules that will reduce the negative influence cyber warfare presently has on the United States’ national interests.

  10. Initial Report of the Deans Cyber Warfare Ad Hoc Committee

    DTIC Science & Technology

    2011-12-22

    in a cyber warfare environment. Among the more notable recent developments have been the establishment of a new Cyber Warfare Command (USCYBERCOM) at...information-warfare-centric organization. Clearly, future Naval Academy graduates will be expected to know more about cyber warfare than those we have...graduated in the past. The Academic Dean and Provost tasked an ad hoc committeethe Cyber Warfare ad hoc Committeeto examine how USNA can best ensure that

  11. Sources of Occupational Stress and Prevalence of Burnout and Clinical Distress Among U.S. Air Force Cyber Warfare Operators

    DTIC Science & Technology

    2013-01-01

    distress within the cyber warfare community. This study involved cyber warfare operators including active duty (n = 376) and civilian contractor and...revealed that when compared to civilian cyber warfare operators, active duty cyber warfare operators are more likely to suffer from the facets of...8217 write-in responses revealed cyber warfare operators attributed shift work, shift changes, and hours worked as the primary sources of high occupational

  12. Cyber warfare and electronic warfare integration in the operational environment of the future: cyber electronic warfare

    NASA Astrophysics Data System (ADS)

    Askin, Osman; Irmak, Riza; Avsever, Mustafa

    2015-05-01

    For the states with advanced technology, effective use of electronic warfare and cyber warfare will be the main determining factor of winning a war in the future's operational environment. The developed states will be able to finalize the struggles they have entered with a minimum of human casualties and minimum cost thanks to high-tech. Considering the increasing number of world economic problems, the development of human rights and humanitarian law it is easy to understand the importance of minimum cost and minimum loss of human. In this paper, cyber warfare and electronic warfare concepts are examined in conjunction with the historical development and the relationship between them is explained. Finally, assessments were carried out about the use of cyber electronic warfare in the coming years.

  13. Department of Defenses Enhanced Requirement for Offensive Cyber Warfare Operations

    DTIC Science & Technology

    2010-04-01

    The Department of Defense (DoD) needs to further develop its offensive cyber warfare capabilities at all levels. In an asymmetric environment...battlefields. If the DoD does not prosecute offensive cyber warfare tactics then the DoD has effectively allowed a significant advantage to be given...offensive cyber warfare operations, These states utilize their cyber warfare capabilities to support their national, operational and strategic

  14. Beyond Mission Command: Maneuver Warfare for Cyber Command and Control

    DTIC Science & Technology

    2015-05-18

    operation in an A2AD environment. 15. SUBJECT TERMS command and control; maneuver warfare; cyberspace; cyberspace operations; cyber warfare , mission...Some Principles of Cyber Warfare (NWC 2160) (U.S. Naval War College, Joint Military Operations Department, Newport, RI: U.S. Naval War College...research/ innovationleadership.pdf. Crowell, Richard M. Some Principles of Cyber Warfare (NWC 2160). U.S. Naval War College, Joint Military Operations

  15. Anxiety, depression, and posttraumatic stress in Iranian survivors of chemical warfare.

    PubMed

    Hashemian, Farnoosh; Khoshnood, Kaveh; Desai, Mayur M; Falahati, Farahnaz; Kasl, Stanislav; Southwick, Steven

    2006-08-02

    In the 1980-1988 Iran-Iraq War, extensive use of chemical weapons resulted in high rates of morbidity and mortality. While much is known about the physical consequences of chemical warfare, there is a paucity of information about the long-term effects of chemical attacks on mental health. To assess the long-term psychological impact of chemical warfare on a civilian population. Cross-sectional randomized survey conducted in July 2004 of 153 civilians in 3 towns exposed to warfare in northwestern Iran: Oshnaviyeh (low-intensity conventional warfare), Rabat (high-intensity conventional warfare), and Sardasht (both high-intensity conventional warfare and chemical weapons). Full or partial posttraumatic stress disorder (PTSD) diagnosis, anxiety symptoms, and depressive symptoms were assessed using Farsi versions of the Clinician-Administered PTSD Scale, Hamilton Scale for Anxiety, and Beck Depression Inventory, respectively. Overall participation rate was 93%. Respondents had a mean age of 45 years and were all of Kurdish ethnicity. Among individuals exposed to both high-intensity warfare and chemical weapons, prevalence rates for lifetime PTSD, current PTSD, major anxiety symptoms, and severe depressive symptoms were 59%, 33%, 65%, and 41%, respectively. Among the low-intensity warfare group, the corresponding rates were 8%, 2%, 18%, and 6%, respectively, while intermediate rates were found among those exposed to high-intensity warfare but not to chemical weapons (31%, 8%, 26%, and 12%, respectively). Compared with individuals exposed to low-intensity warfare, those exposed to both high-intensity warfare and chemical weapons were at higher risk for lifetime PTSD (odds ratio [OR], 18.6; 95% confidence interval [CI], 5.8-59.4), current PTSD (OR, 27.4; 95% CI, 3.4-218.2), increased anxiety symptoms (OR, 14.6; 95% CI, 6.0-35.6), and increased depressive symptoms (OR, 7.2; 95% CI, 3.3-15.9). Exposure to high-intensity warfare but not to chemical weapons was also significantly associated with lifetime PTSD (OR, 5.4; 95% CI, 1.7-17.6), compared with those in the low-intensity warfare group. Further, compared with individuals exposed to high-intensity warfare alone, those exposed to both high-intensity warfare and chemical weapons were at higher risk for lifetime PTSD (OR, 3.4; 95% CI, 1.5-7.4), current PTSD (OR, 6.2; 95% CI, 2.0-20.1), increased anxiety symptoms (OR, 5.6; 95% CI, 2.5-12.6), and increased depressive symptoms (OR, 3.7; 95% CI, 1.8-7.2). Exposure to chemical warfare is an extreme traumatic event that has long-lasting adverse consequences on mental health.

  16. The Theory of Unconventional Warfare: Win, Lose, and Draw

    DTIC Science & Technology

    2008-12-01

    UNCONVENTIONAL WARFARE MODEL ...................................12 1. Planning Phase...Superiority over Time........................................................................11  Figure 3.  Unconventional Warfare Model ...superiority through the six principles of UW illustrated below in the UW model . . B. THE UNCONVENTIONAL WARFARE MODEL Figure 3. Unconventional

  17. Cyber warfare: Armageddon in a Teacup?

    DTIC Science & Technology

    2009-12-11

    Security concerns over the growing capability of Cyber Warfare are in the forefront of national policy and security discussions. In order to enable a...realistic discussion of the topic this thesis seeks to analyze demonstrated Cyber Warfare capability and its ability to achieve strategic political...objectives. This study examines Cyber Warfare conducted against Estonia in 2007, Georgia in 2008, and Israel in 2008. In all three cases Cyber Warfare did

  18. At the Crossroads of Cyber Warfare: Signposts for the Royal Australian Air Force

    DTIC Science & Technology

    2011-06-01

    At the Crossroads of Cyber Warfare : Signposts for the Royal Australian Air Force by Craig Stallard, Squadron leader, Royal...in the conduct of cyber warfare . The 2009 Defence White Paper provided some clarity by indentifying cyber warfare as critical to the maintenance...of national security, but left open the most important issue: should cyber warfare be a joint engagement or a service oriented fight? The RAAF

  19. Cyber Warfare: New Character with Strategic Results

    DTIC Science & Technology

    2013-03-01

    The advent of cyber warfare has sparked a debate amongst theorists as to whether timeless Clausewitzian principles remain true in the 21st century...Violence, uncertainty, and rationality still accurately depict the nature of cyber warfare , however, its many defining attributes and means by which...this style of warfare is conducted has definitively changed the character of war. Although cyber warfare is contested in the cyber domain, it often

  20. Cyber Security: A Road Map for Turkey

    DTIC Science & Technology

    2012-03-19

    Cyber warfare is a form of information warfare, sometimes seen as analogous to conventional warfare, among a range of potential actors, including...nation states, non-state groups, and a complex hybrid of conflict involving both state and non-state actors. Cyber warfare is a tool of national power...An entire nation s ability to operate and fight in the information age is vital toward survival. Nowadays, cyber warfare is mostly focused on

  1. A Better State of War: Surmounting the Ethical Cliff in Cyber Warfare

    DTIC Science & Technology

    2014-06-01

    This study analyzes the emergent field of cyber warfare through the lens of commonly-accepted tenets of ethical warfare. By comparing the...foundational understanding of concepts that determine the justice of wars (jus ad bellum) and justice in war (jus en bello) with the capabilities cyber warfare offers...analyzing how cyber warfare affects each of the core concepts introduced above. The fourth chapter presents a case study that tests the theoretical

  2. Cyber-Warfare: Jus Post Bellum

    DTIC Science & Technology

    2015-03-01

    used to design a cyber - warfare jus post bellum framework. It also analyzes analogies to traditional warfare in the damage assessment and aid provided...and the ability to contain and reverse cyberattacks. This thesis proposes a cyber - warfare jus post bellum framework, with emphasis on prevention and

  3. 75 FR 6642 - Notice of Proposed Information Collection; Naval Special Warfare Recruiting Directorate

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-02-10

    ... Information Collection; Naval Special Warfare Recruiting Directorate AGENCY: Department of the Navy, DoD. ACTION: Notice. SUMMARY: The Naval Special Warfare (NSW) Recruiting Directorate announces the submission... the proposal and associated collection instruments, write to the Director, Naval Special Warfare...

  4. The role of rewards in motivating participation in simple warfare.

    PubMed

    Glowacki, Luke; Wrangham, Richard W

    2013-12-01

    In the absence of explicit punitive sanctions, why do individuals voluntarily participate in intergroup warfare when doing so incurs a mortality risk? Here we consider the motivation of individuals for participating in warfare. We hypothesize that in addition to other considerations, individuals are incentivized by the possibility of rewards. We test a prediction of this "cultural rewards war-risk hypothesis" with ethnographic literature on warfare in small-scale societies. We find that a greater number of benefits from warfare is associated with a higher rate of death from conflict. This provides preliminary support for the relationship between rewards and participation in warfare.

  5. Employing U.S. Information Operations Against Hybrid Warfare Threats

    DTIC Science & Technology

    2013-03-01

    Article 51.24 Cyber warfare is unique in that vulnerabilities that a network target may have could be discovered by software developers who then... cyber warfare rather than physical combat, a future subject to air strikes or ground-forces raids would likely be a powerful deterrent. Some in the U.S...Manwaring, The Complexity of Modern Asymmetric Warfare, (Norman, OK: Univ. of Oklahoma Press, 2012), 126-129. 23 Arie J. Schaap, “ Cyber Warfare Operations

  6. Developing a Hybrid Virtualization Platform Design for Cyber Warfare Training and Education

    DTIC Science & Technology

    2010-06-01

    CYBER WARFARE TRAINING AND EDUCATION THESIS Kyle E. Stewart 2nd...Government. AFIT/GCE/ENG/10-06 DEVELOPING A HYBRID VIRTUALIZATION PLATFORM DESIGN FOR CYBER WARFARE TRAINING...APPROVED FOR PUBLIC RELEASE; DISTRIBUTION UNLIMITED. AFIT/GCE/ENG/10-06 DEVELOPING A HYBRID VIRTUALIZATION PLATFORM DESIGN FOR CYBER WARFARE

  7. Chinese National Strategy of Total War

    DTIC Science & Technology

    2008-06-01

    Cyber Warfare Michael J. Good, BA Major, USA June 2008 APPROVED FOR PUBLIC RELEASE; DISTRIBUTION IS...who allowed me into the Cyber Warfare , my fellow students in the Cyber Warfare IDE program who have been great friends and mentors, and my fellow...Hackers and Other Cyber Criminals .............................................................................41 PLA Cyber Warfare

  8. 77 FR 60678 - Takes of Marine Mammals Incidental to Specified Activities; U.S. Navy Training and Testing...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-10-04

    ...-submarine warfare; mine warfare; naval special warfare; Naval Air Systems Command (NAVAIR) testing; Naval Sea Systems Command (NAVSEA) testing; Space and Naval Warfare Systems Command (SPAWAR) testing; and Office of Naval Research (ONR) and Naval Research Laboratory (NRL) testing. Detailed descriptions of...

  9. Hybrid Warfare: the 21st Century Russian Way of Warfare

    DTIC Science & Technology

    2017-05-25

    in Ukraine, can be best understood by examining it in relation to the ideas and theories of such preeminent theorists as Sun Tzu and Carl von...theories of warfare, of which Russia’s hybrid warfare is one of the most recent. Writing over two thousand years ago, Sun Tzu stated, “The art of...warfare is deceit.”17 Sun Tzu continued, stating that the “highest excellence” in war was not in winning every battle, but in subduing the enemy’s

  10. 78 FR 53109 - Security Zones; Naval Base Point Loma; Naval Mine Anti-Submarine Warfare Command; San Diego Bay...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-08-28

    ...-AA87 Security Zones; Naval Base Point Loma; Naval Mine Anti-Submarine Warfare Command; San Diego Bay... Anti-Submarine Warfare Command to protect the relocated marine mammal program. These security zone... Warfare Command, the Commander of Naval Region Southwest, or a designated representative of those...

  11. Deactivating Chemical Agents Using Enzyme-Coated Nanofibers Formed by Electrospinning

    DTIC Science & Technology

    2016-01-01

    7.3mM/mg). Key words Coaxial electrospinning, DFPase, Enzyme, chemical warfare , nanofiber, decontamination . Introduction Chemical warfare ...Krile, R.; Nishioka, M.; Taylor, M.; Riggs, K.; Stone, H. Decontamination of Toxic Industrial Chemicals and Chemical Warfare Agents On Building...298 (Rev. 8-98) Prescribed by ANSI Std. Z39.18 MATS COATINGS ELECTROSPINNING CHEMICAL WARFARE

  12. Toxic Warfare

    DTIC Science & Technology

    2002-02-01

    Prepared for the United States Air Force Approved for public release; distribution unlimited Theodore Karasik Project AIR FORCE R TOXIC WARFARE...Report Documentation Page Report Date 000002002 Report Type N/A Dates Covered (from... to) - Title and Subtitle Toxic Warfare Contract Number Grant...310) 451-6915; Email: order@rand.org Library of Congress Cataloging-in-Publication Data Karasik, Theodore William. Toxic warfare / Theodore Karasik

  13. Small Ships Revival: From Cold War Anti-Invasion and Guerrilla Warfare Tactics to Highly Capable Force Multiplier in Littoral and Expeditionary Warfare

    DTIC Science & Technology

    2010-05-03

    this gap might be filled. It will focus on the surface warfare aspect of sea control, though it touches on antiair warfare, mine warfare and...Sea As the flotilla acquired battle power […] the vital, most difficult, and most absorbing problem has become not how to increase the power of a...proving that their performance is absolutely necessary to these operations. Com Fr Amphib TG of the NATO Reaction Force-8 after Exercise Brilliant Midas

  14. 78 FR 72025 - Security Zones; Naval Base Point Loma; Naval Mine Anti Submarine Warfare Command; San Diego Bay...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-12-02

    ...-AA87 Security Zones; Naval Base Point Loma; Naval Mine Anti Submarine Warfare Command; San Diego Bay... establishing a new security zone at the Naval Mine and Anti-Submarine Warfare Command to protect the relocated... Commander of Naval Base Point Loma, the Commander of the Naval Mine Anti Submarine Warfare Command, and the...

  15. Intrafamily and intragenomic conflicts in human warfare

    PubMed Central

    2017-01-01

    Recent years have seen an explosion of multidisciplinary interest in ancient human warfare. Theory has emphasized a key role for kin-selected cooperation, modulated by sex-specific demography, in explaining intergroup violence. However, conflicts of interest remain a relatively underexplored factor in the evolutionary-ecological study of warfare, with little consideration given to which parties influence the decision to go to war and how their motivations may differ. We develop a mathematical model to investigate the interplay between sex-specific demography and human warfare, showing that: the ecology of warfare drives the evolution of sex-biased dispersal; sex-biased dispersal modulates intrafamily and intragenomic conflicts in relation to warfare; intragenomic conflict drives parent-of-origin-specific patterns of gene expression—i.e. ‘genomic imprinting’—in relation to warfare phenotypes; and an ecological perspective of conflicts at the levels of the gene, individual, and social group yields novel predictions as to pathologies associated with mutations and epimutations at loci underpinning human violence. PMID:28228515

  16. Intrafamily and intragenomic conflicts in human warfare.

    PubMed

    Micheletti, Alberto J C; Ruxton, Graeme D; Gardner, Andy

    2017-02-22

    Recent years have seen an explosion of multidisciplinary interest in ancient human warfare. Theory has emphasized a key role for kin-selected cooperation, modulated by sex-specific demography, in explaining intergroup violence. However, conflicts of interest remain a relatively underexplored factor in the evolutionary-ecological study of warfare, with little consideration given to which parties influence the decision to go to war and how their motivations may differ. We develop a mathematical model to investigate the interplay between sex-specific demography and human warfare, showing that: the ecology of warfare drives the evolution of sex-biased dispersal; sex-biased dispersal modulates intrafamily and intragenomic conflicts in relation to warfare; intragenomic conflict drives parent-of-origin-specific patterns of gene expression-i.e. 'genomic imprinting'-in relation to warfare phenotypes; and an ecological perspective of conflicts at the levels of the gene, individual, and social group yields novel predictions as to pathologies associated with mutations and epimutations at loci underpinning human violence. © 2017 The Authors.

  17. Replication Does Survive Information Warfare Attacks

    DTIC Science & Technology

    1997-01-01

    warfare, storage jamming, unauthorized modification, Trojan horse 1 INTRODUCTION Ammann, Jajodia, McCollum, and Blaustein define information warfare as the...information warfare, and we adopt the latter term. To provide context, Amman et al. specifically do not consider Trojan horses within the database system...called internal jammers (McDermott and Goldschalg, 1996b)), but instead consider a wide range of attacks other than Trojan horses . Both groups agree that

  18. 14th Annual Expeditionary Warfare Conference

    DTIC Science & Technology

    2009-11-19

    Untitled Document 2009expedition.html[5/12/2016 8:33:22 AM] 14th ANNUAL EXPEDITIONARY WARFARE CONFERENCE “Expeditionary Warfare in a Complex Joint...WWW.NDIA.ORG/MEETINGS/0700 “Expeditionary Warfare in a Complex Joint Operating Environment” BAY POINT MARRIOTT HOTEL, PANAMA CITY, FL...Focus: The purpose of the Quadrennial Defense Review (QDR) is to determine the nation’s defense strategy and establish a defense program for

  19. Creating Paths of Change: Under What Conditions Can Special Operations be the Supported Command

    DTIC Science & Technology

    2018-03-01

    goals.” Daft, Essentials of Organization Theory and Design , 48); I. V. Gordon et al., Comparing US Army Systems with Foreign Counterparts: Identifying...CODE A 13. ABSTRACT (maximum 200 words) This thesis focuses on command and control for irregular warfare operations and the organizational design ...compound warfare, unconventional warfare, special action force, village stability operations, organizational design , conventional warfare

  20. Electronic Warfare for Cyber Warriors

    DTIC Science & Technology

    2008-06-01

    This research paper provides complete course content for the AFIT EENG 509, Electronic Warfare class. It is intended as a replacement for the existing course and designed for Intermediate Developmental Education (IDE) students in the Cyber Warfare degree program. This course provides relevant academic courseware and study material to give cyber warriors an academic and operational perspective on electronic warfare and its integration in the cyber domain.

  1. U.S. Command Relationships in the Conduct of Cyber Warfare: Establishment, Exercise, and Institutionalization of Cyber Coordinating Authority

    DTIC Science & Technology

    2010-05-03

    FINAL 3. DATES COVERED (From - To) 4. TITLE AND SUBTITLE U.S. Command Relationships in the Conduct of Cyber Warfare : Establishment...U.S. Command Relationships in the Conduct of Cyber Warfare : Establishment, Exercise, and Institutionalization of Cyber Coordinating Authority...Relationships in the Conduct of Cyber Warfare : Establishment, Exercise, and Institutionalization of Cyber Coordinating Authority The character of

  2. Remote sensing of chemical warfare agent by CO2 -lidar

    NASA Astrophysics Data System (ADS)

    Geiko, Pavel P.; Smirnov, Sergey S.

    2014-11-01

    The possibilities of remote sensing of chemical warfare agent by differential absorption method were analyzed. The CO2 - laser emission lines suitable for sounding of chemical warfare agent with provision for disturbing absorptions by water vapor were choose. The detection range of chemical warfare agents was estimated for a lidar based on CO2 - laser The other factors influencing upon echolocation range were analyzed.

  3. 33 CFR 165.1103 - Security Zone; Naval Mine Anti Submarine Warfare Command; San Diego Bay, San Diego, CA.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... Submarine Warfare Command; San Diego Bay, San Diego, CA. 165.1103 Section 165.1103 Navigation and Navigable... Eleventh Coast Guard District § 165.1103 Security Zone; Naval Mine Anti Submarine Warfare Command; San... the Naval Mine Anti Submarine Warfare Command, bound by the following coordinates: 32°43′40.9″ N, 117...

  4. Electronic Warfare Closed Loop Laboratory (EWCLL) Antenna Motor Software and Hardware Development

    DTIC Science & Technology

    2016-09-01

    ARL-TN-0779 ● SEP 2016 US Army Research Laboratory Electronic Warfare Closed Loop Laboratory (EWCLL) Antenna Motor Software and...Electronic Warfare Closed Loop Laboratory (EWCLL) Antenna Motor Software and Hardware Development by Neal Tesny Sensors and Electron Devices Directorate...TITLE AND SUBTITLE Electronic Warfare Closed Loop Laboratory (EWCLL) Antenna Motor Software and Hardware Development 5a. CONTRACT NUMBER 5b

  5. Mammalian Toxicology Testing: Problem Definition Study, Global Army Toxicology Requirements.

    DTIC Science & Technology

    1981-03-01

    Electronic Warfare Equipment (D251) Tactical ECK System (64750A) Protective Electronic Warfare Equipment (D540) High Energy Electromagnetic Radiation...Fighting Portable Weapon (for IFV) Smoke Grenade Launcher Staff Smart, Target-Activated Fire-and-Forget Tactical ECK System (63755A) Protective Electronic...Warfare Equipment (D251) Tactical ECK System (64750A) Protective Electronic Warfare Equipment (D540) High Energy Electromagnetic Radiation Weapons (e.g

  6. The Characterization and Measurement of Cyber Warfare, Spring 2008 - Project 08-01

    DTIC Science & Technology

    2008-05-01

    Global Innovation and Strategy Center The Characterization and Measurement of Cyber Warfare Spring 2008 – Project 08-01 May 2008...and Measurement of Cyber Warfare N/A N/A N/A 08-01Dobitz, Kyle Haas, Brad Holtje, Michael Jokerst, Amanda Ochsner, Geoff Silva, Stephanie...research team as critical for purposes of cyber act characterization: Motivation, Intent, Target, Effects, and Actors. cyberspace, cyber warfare , targets

  7. Refocusing Cyber Warfare Thought

    DTIC Science & Technology

    2013-02-01

    January–February 2013 Air & Space Power Journal | 44 FeatureCyber Focus Refocusing Cyber Warfare Thought Maj Sean C. Butler, USAF In September 2007...1. REPORT DATE FEB 2013 2. REPORT TYPE 3. DATES COVERED 00-00-2013 to 00-00-2013 4. TITLE AND SUBTITLE Refocusing Cyber Warfare Thought 5a...2013 Air & Space Power Journal | 45 Butler Refocusing Cyber Warfare Thought FeatureCyber Focus characterized by the use of electronics and the

  8. Nodes and Codes: The Reality of Cyber Warfare

    DTIC Science & Technology

    2012-05-17

    Nodes and Codes explores the reality of cyber warfare through the story of Stuxnet, a string of weaponized code that reached through a domain...nodes. Stuxnet served as a proof-of-concept for cyber weapons and provided a comparative laboratory to study the reality of cyber warfare from the...military powers most often associated with advanced, offensive cyber attack capabilities. The reality of cyber warfare holds significant operational

  9. Cyberspace as a Complex Adaptive System and the Policy and Operational Implications for Cyber Warfare

    DTIC Science & Technology

    2014-05-22

    CYBERSPACE AS A COMPLEX ADAPTIVE SYSTEM AND THE POLICY AND OPERTIONAL IMPLICATIONS FOR CYBER WARFARE A Monograph by Major Albert O. Olagbemiro...serves the US, especially in regards to the protect ion o f the 1S. SUBJECT TERMS omplex Adaptive System, Cyberspace, lnfosphere, Cyber Warfare ber...System and the Policy and Operational Implications for Cyber Warfare Approved by: __________________________________, Monograph Director Jeffrey

  10. Warfighting in Cyberspace

    DTIC Science & Technology

    2007-01-01

    warfare ). Although the defensive elements of IO and cyber warfare are important, to narrow the scope of our thesis, the remainder of the argu- ment...adversary decisions away from taking action against our will. Now, let us contrast IO doctrine with what we propose for cyber warfare . The focus of... cyber warfare is on using cyberspace (by operating within or through it) to attack personnel, facilities, or equipment with the intent of degrading

  11. Defending Our Satellites: The Need for Electronic Warfare Education and Training

    DTIC Science & Technology

    2015-12-01

    intercept Allied bombers attacking at night.9 As a result of the electronic warfare advantage that systems like Window and Airborne Cigar be- stowed...74 | Air & Space Power Journal Defending Our Satellites The Need for Electronic Warfare Education and Training Lt Col E. Lincoln Bonner, USAF...expanding education and training in the use of electronic warfare to defend US satellites and improve their survivability. The following discussion

  12. Highlights of the Department of the Navy FY 2013 Budget

    DTIC Science & Technology

    2012-02-01

    ability to perform undersea warfare to include high altitude launched torpedo capability, surface warfare and ISR missions make it a critical force...60B and SH-60F helicopters, whose primary mission areas are undersea warfare and surface warfare. This platform will have numerous capability...sensors to detect, localize, classify and identify undersea threats at a safe distance from friendly ships. The Remote Multi-Mission Vehicle provides

  13. Remaining Relevant: Historical Contributions, Civil-Military Challenges, and Anti-Submarine Warfare Capabilities on Coast Guard Cutters

    DTIC Science & Technology

    2018-03-01

    HISTORICAL CONTRIBUTIONS, CIVIL-MILITARY CHALLENGES, AND ANTI-SUBMARINE WARFARE CAPABILITIES ON COAST GUARD CUTTERS by Brian A. Smicklas...CONTRIBUTIONS, CIVIL- MILITARY CHALLENGES, AND ANTI-SUBMARINE WARFARE CAPABILITIES ON COAST GUARD CUTTERS 5. FUNDING NUMBERS 6. AUTHOR(S) Brian A...MILITARY CHALLENGES, AND ANTI-SUBMARINE WARFARE CAPABILITIES ON COAST GUARD CUTTERS Brian A. Smicklas Commander, U.S. Coast Guard B.S., Coast

  14. The Art of Aerial Warfare

    DTIC Science & Technology

    2005-03-01

    14 3 THE POLITICAL DIMENSIONS OF AERIAL WARFARE . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17 How Political Effects in...Aerial Warfare . . . . . . Outweigh Military Effects . . . . . . . . . . . . . . . 19 Political Targets Versus Military Targets . . . . . 22...34 4 MILITARY AND POLITICAL EFFECTS OF STRATEGIC ATTACK . . . . . . . . . . . . . . . . . . 35 The Premise of

  15. Development of JSDF Cyber Warfare Defense Critical Capability

    DTIC Science & Technology

    2010-03-01

    attack identification capability is essential for a nation to defend her vital infrastructures against offensive cyber warfare . Although the necessity of...cyber-attack identification capability is quite clear, the Japans preparation against cyber warfare is quite limited.

  16. 15th Annual Expeditionary Warfare Conference - Expeditionary Operations - What’s Next

    DTIC Science & Technology

    2010-10-07

    00 PM - 5:00 PM Mine Warfare Capabilities Essential for Expeditionary Warfare Salon 1 (limited to first 120 registrants) Session Focus...have priority – Requires additional conceptual development, gaming & exercises Questions? 23

  17. CYBER WARFARE GOVERNANCE: EVALUATION OF CURRENT INTERNATIONAL AGREEMENTS ON THE OFFENSIVE USE OF CYBER

    DTIC Science & Technology

    2015-10-01

    AIR COMMAND AND STAFF COLLEGE DISTANCE LEARNING AIR UNIVERSITY CYBER WARFARE GOVERNANCE: EVALUATION OF CURRENT INTERNATIONAL AGREEMENTS ON THE...order to prevent catastrophic second and third order effects. Rule 43 “prohibits means or methods of cyber warfare that indiscriminate by nature...Means and methods of cyber warfare are indiscriminate by nature if they cannot be: directed at a specific military objective, or limited in their

  18. Cyber Warfare: A Need for Beyond Goldwater-Nichols

    DTIC Science & Technology

    2011-05-13

    of Military Studies Research Paper September 2010- May 2011 4. TITLE AND SUBTITLE 5a. CONTRACT NUMBER Cyber Warfare : "A Need for Beyond Goldwater...22134-5068 MASTER OF MlLIT AR Y STUDJES Cyber Warfare : "A Need for Beyond Goldwater Nichols" SlffiMITTED IN PARTIAL FULFitLMENT OF THE...DOCUMENT IS PERMITTED PROVIDED PROPER ACKNOWLEDGEMENT IS MADE.· l . ii EXECUTIVE SUMMARY Title: Cyber Warfare : "A Need for Beyond Goldwater Nichols

  19. Civil Affairs in Unconventional Warfare

    DTIC Science & Technology

    2013-05-23

    goals as Mao Tse -tung states, “Military action is a method used to attain a political goal. While military affairs and political affairs are not...OSS to Green Beret: The Birth at Special Forces (Novato, CA: Presidio Press, 1986), 149-51. 25Mao Tse -tung, On Guerrilla Warfare (New York: Classic...House Books, 2009), 39. 26David Galula, Counterinsurgency Warfare, 4; and Mao Tse -tung, On Guerrilla Warfare, 3-4. 27Ibid., 12-13. 28Ibid

  20. Piezocomposites for Active Surface Control

    DTIC Science & Technology

    1999-01-19

    and the Underwater Sound Reference Detachment (USRD) in Orlando, FL. During the period of the program, USRD became part of the Naval Undersea Warfare...Appendix B DEPARTMENT OF THE NAVY NAVAL UNDERSEA WARFARE CENTER 1176 HOWELL STREET NEWPORT Rl 02«41-170i NAVAL UNDERSEA WARFARE CENTER...dissemination only as directed by Commanding Officer, Naval Undersea Warfare Center (18 AUG i99o ) or higher DoD authority. Page 1 of 1 USRD CALIBRATION

  1. Chemical warfare and the Gulf War: a review of the impact on Gulf veterans' health.

    PubMed

    Riddle, James R; Brown, Mark; Smith, Tyler; Ritchie, Elspeth Cameron; Brix, Kelley Ann; Romano, James

    2003-08-01

    It is unlikely that Gulf War veterans are suffering chronic effects from illnesses caused by chemical warfare nerve agent exposure. Extensive investigation and review by several expert panels have determined that no evidence exists that chemical warfare nerve agents were used during the Gulf War. At no time before, during, or after the war was there confirmation of symptoms among anyone, military or civilian, caused by chemical warfare nerve agent exposure. However, studies of Gulf War veterans have found belief that chemical weapons were used, significantly associated with both severe and mild-moderate illnesses. The psychological impact of a chemical warfare attack, either actual or perceived, can result in immediate and long-term health consequences. The deployment or war-related health impact from life-threatening experiences of the Gulf War, including the perceived exposure to chemical warfare agents, should be considered as an important cause of morbidity among Gulf War veterans.

  2. Maneuver Warfare in Cyberspace

    DTIC Science & Technology

    1997-01-01

    government departments and agencies; (2) National security and military strategies must outline a response to the threats and opportunities of cyber ... warfare ; and (3) the Department of Defense’s offensive and defensive responsibilities, parameters, and capabilities for strategic information warfare need

  3. Cyber Power in the 21st Century

    DTIC Science & Technology

    2008-12-01

    Cyber Warfare .................................................................86 V. Conclusions and Recommendations...40 2 – Asymmetric Effects of Cyber Warfare ........................................................................41 1 CYBER POWER... cyber warfare capabilities with other elements of national power, as evidenced by the concept of “informationization” (xinxihua) put forward in

  4. Difficult Decisions: Chemical Warfare.

    ERIC Educational Resources Information Center

    Slesnick, Irwin L.; Miller, John A.

    1988-01-01

    Gives the background history and chemistry of modern day chemical warfare from World War I to the present. Provides discussion questions to stimulate deeper thinking on the issue. Contains a discussion activity called "Can New Chemical Weapons Lead to Humane Warfare?" (CW)

  5. Technological advancements for the detection of and protection against biological and chemical warfare agents.

    PubMed

    Eubanks, Lisa M; Dickerson, Tobin J; Janda, Kim D

    2007-03-01

    There is a growing need for technological advancements to combat agents of chemical and biological warfare, particularly in the context of the deliberate use of a chemical and/or biological warfare agent by a terrorist organization. In this tutorial review, we describe methods that have been developed both for the specific detection of biological and chemical warfare agents in a field setting, as well as potential therapeutic approaches for treating exposure to these toxic species. In particular, nerve agents are described as a typical chemical warfare agent, and the two potent biothreat agents, anthrax and botulinum neurotoxin, are used as illustrative examples of potent weapons for which countermeasures are urgently needed.

  6. Chemical and biological warfare: General studies. (Latest citations from the NTIS bibliographic database). NewSearch

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Not Available

    1994-10-01

    The bibliography contains citations concerning federally sponsored and conducted studies into chemical and biological warfare operations and planning. These studies cover areas not addressed in other parts of this series. The topics include production and storage of agents, delivery techniques, training, military and civil defense, general planning studies, psychological reactions to chemical warfare, evaluations of materials exposed to chemical agents, and studies on banning or limiting chemical warfare. Other published searches in this series on chemical warfare cover detection and warning, defoliants, protection, and biological studies, including chemistry and toxicology. (Contains 250 citations and includes a subject term index andmore » title list.)« less

  7. Chemical and biological warfare: General studies. (Latest citations from the NTIS bibliographic database). Published Search

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    NONE

    1997-11-01

    The bibliography contains citations concerning federally sponsored and conducted studies into chemical and biological warfare operations and planning. These studies cover areas not addressed in other parts of this series. The topics include production and storage of agents, delivery techniques, training, military and civil defense, general planning studies, psychological reactions to chemical warfare, evaluations of materials exposed to chemical agents, and studies on banning or limiting chemical warfare. Other published searches in this series on chemical warfare cover detection and warning, defoliants, protection, and biological studies, including chemistry and toxicology.(Contains 50-250 citations and includes a subject term index and titlemore » list.) (Copyright NERAC, Inc. 1995)« less

  8. Chemical and biological warfare: General studies. (Latest citations from the NTIS bibliographic database). Published Search

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    NONE

    1996-10-01

    The bibliography contains citations concerning federally sponsored and conducted studies into chemical and biological warfare operations and planning. These studies cover areas not addressed in other parts of this series. The topics include production and storage of agents, delivery techniques, training, military and civil defense, general planning studies, psychological reactions to chemical warfare, evaluations of materials exposed to chemical agents, and studies on banning or limiting chemical warfare. Other published searches in this series on chemical warfare cover detection and warning, defoliants, protection, and biological studies, including chemistry and toxicology. (Contains 50-250 citations and includes a subject term index andmore » title list.) (Copyright NERAC, Inc. 1995)« less

  9. Chemical and biological warfare: General studies. (Latest citations from the NTIS bibliographic database). Published Search

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    NONE

    1995-09-01

    The bibliography contains citations concerning federally sponsored and conducted studies into chemical and biological warfare operations and planning. These studies cover areas not addressed in other parts of this series. The topics include production and storage of agents, delivery techniques, training, military and civil defense, general planning studies, psychological reactions to chemical warfare, evaluations of materials exposed to chemical agents, and studies on banning or limiting chemical warfare. Other published searches in this series on chemical warfare cover detection and warning, defoliants, protection, and biological studies, including chemistry and toxicology.(Contains 50-250 citations and includes a subject term index and titlemore » list.) (Copyright NERAC, Inc. 1995)« less

  10. Air & Space Power Journal. Volume 22, Number 3, Fall 2008

    DTIC Science & Technology

    2008-09-01

    PHd, UsaF, retired* Red Flag exercises, well known as training components of air warfare, will also become a staple of cyber warfare . —Former...it wishes to meet former secretary Wynne’s vision of a significantly enhanced cyber - warfare environ­ ment. This change is so monumental that full...this reviewer’s judgment, only one area does not receive adequate examination: cyber warfare . Although Drew and Snow make note of it in several

  11. RFID as a Tool in Cyber Warfare

    DTIC Science & Technology

    2010-11-01

    RTO-MP-IST-091 P4 - 1 RFID as a Tool in Cyber Warfare Mikko Kiviharju P.O.Box 10 FIN-11311 Riihimaki FINLAND mikko.kiviharju@mil.fi...auditing existing systems and planning new establishments. 1 INTRODUCTION Cyber warfare , especially computer network operations (CNO) have a deep...SUBTITLE RFID as a Tool in Cyber Warfare 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER 6. AUTHOR(S) 5d. PROJECT NUMBER 5e. TASK

  12. Cyber Warfare as an Operational Fire

    DTIC Science & Technology

    2010-04-03

    This paper explores cyber warfare as an option for creating operational fires effects. Initially, cyberspace is defined and explained from the...fires are defined and the advantages of their use are explained. From there, discussion focuses on how cyber warfare fulfills the purposes of...operational fires. Finally, the paper draws conclusions about the viability of cyber warfare as an operational fire and makes recommendations about how to prioritize the activities of the newly approved U.S. Cyber Command.

  13. Emerging Roles of Combat Communication Squadrons in Cyber Warfare as Related to Computer Network Attack, Defense and Exploitation

    DTIC Science & Technology

    2011-06-01

    EMERGING ROLES OF COMBAT COMMUNICATION SQUADRONS IN CYBER WARFARE AS RELATED TO COMPUTER NETWORK ATTACK, DEFENSE AND EXPLOITATION GRADUATE RESEARCH...Communication Squadrons in Cyber Warfare as Related to Computer Network Attack, Defense and Exploitation GRADUATE RESEARCH PROJECT Presented to the Faculty...Education and Training Command In Partial Fulfillment of the Requirements for the Degree of Master of Cyber Warfare Michael J. Myers Major, USAF June 2011

  14. Counter-Unmanned Aerial Vehicle Warfare: Kill Authorizations for the Carrier Strike Group

    DTIC Science & Technology

    2016-06-10

    COUNTER-UNMANNED AERIAL VEHICLE WARFARE: KILL AUTHORIZATIONS FOR THE CARRIER STRIKE GROUP A thesis presented to the Faculty...the Carrier Strike Group 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER 6. AUTHOR(S) LCDR Joshua C. Mattingly, U.S...including armed UAVs in an offensive role, but counter- UAV warfare is a new warfare area within the larger realm of air defense. Small Group 1 and 2

  15. Warfare or partnership: which way for health care?

    PubMed

    MacStravic, R S

    1990-01-01

    There are many voices urging health care organizations to adopt aggressive competitive warfare, but a careful look at the dynamics affecting health care suggests that partnership may be at least as promising a strategy as warfare to promote mission and survival.

  16. Cyber Warfare: Protecting Military Systems

    DTIC Science & Technology

    2000-01-01

    Software is a key component in nearly every critical system used by the Department of Defense. Attacking the software in a system- cyber warfare - is a...revolutionary method of pursuing war. This article describes various cyber warfare approaches and suggests methods to counter them.

  17. Biological warfare agents

    PubMed Central

    Thavaselvam, Duraipandian; Vijayaraghavan, Rajagopalan

    2010-01-01

    The recent bioterrorist attacks using anthrax spores have emphasized the need to detect and decontaminate critical facilities in the shortest possible time. There has been a remarkable progress in the detection, protection and decontamination of biological warfare agents as many instrumentation platforms and detection methodologies are developed and commissioned. Even then the threat of biological warfare agents and their use in bioterrorist attacks still remain a leading cause of global concern. Furthermore in the past decade there have been threats due to the emerging new diseases and also the re-emergence of old diseases and development of antimicrobial resistance and spread to new geographical regions. The preparedness against these agents need complete knowledge about the disease, better research and training facilities, diagnostic facilities and improved public health system. This review on the biological warfare agents will provide information on the biological warfare agents, their mode of transmission and spread and also the detection systems available to detect them. In addition the current information on the availability of commercially available and developing technologies against biological warfare agents has also been discussed. The risk that arise due to the use of these agents in warfare or bioterrorism related scenario can be mitigated with the availability of improved detection technologies. PMID:21829313

  18. The Impacts of Modern Warfare on Freshwater Ecosystems

    NASA Astrophysics Data System (ADS)

    Francis, Robert A.

    2011-11-01

    There is increasing recognition and concern regarding the impacts of modern industrial warfare on the environment. Freshwater ecosystems are perhaps the most vulnerable to warfare-related impacts, which is of concern given that they provide so many essential environmental resources and services to society. Despite this, there has been little work to establish and quantify the types of impacts (both negative and positive) that warfare may have on such systems. This paper firstly highlights why rivers and lakes may be susceptible to warfare-related impacts, before synthesizing the available literature to explore the following main themes: intensification of wartime resource acquisition, use of water as an offensive or defensive weapon, direct and indirect effects of explosive ordnance, increased pollution, introduction of invasive alien species, and positive ecological impacts. This is then followed by a discussion of the implications of such impacts in relation to future warfare, including a consideration of the efficacy of existing legal instruments to protect the environment during conflict, and the trend for war to become more localized and `informal', and therefore less regulated. Finally, the paper identifies key research foci for understanding and mitigating the effects of warfare on freshwater ecosystems.

  19. Coalition FORCEnet Implementation Analysis

    DTIC Science & Technology

    2006-09-01

    C2 grid, and Engagement grid. As a result, enabled Network- Centric warfare for Coalition Forces shows a significant increase in capabilities. Joint...209 14. SUBJECT TERMS FORCEnet, Coalition Forces, AUSCANNZUKUS, Network- Centric Warfare (NCW), Data Mining, EXTEND Modeling, Expeditionary...NETWORK- CENTRIC WARFARE AND FORCENET .....................................................................................................1 B

  20. Summary of Research 1998, Interdisciplinary Academic Groups

    DTIC Science & Technology

    1999-08-01

    Seismic Sonar, Biosonar SEISMO ACOUSTIC DETECTION OF MINES BURIED IN THE SURF ZONE Thomas Muir, Chair of Mine Warfare Undersea Warfare Academic Group...Mine Warfare KEYWORDS: Mining, Mine Countermeasures, Surf Zone, Seismic Sonar, Biosonar PHYSICS OF SEISMIC INTERFACE WAVES IN THE SURF ZONE

  1. History of the Chemical Warfare Service in World War II. Biological Warfare Research in the United States, Volume 2

    DTIC Science & Technology

    1947-11-01

    of proteins and other substances of high molecular weight derived from bacteria, or from natural products with antibacterial activity Proteins and...WARFARE RESEARCH IS THE UNITED r STATES, is one of a series of historical monographs on the research and development activities of the Chemical...TSC Committee 16 War Research Service 13 A5C Committee •• 21 CWS Activities Under TSRS 22 Transfer of Biological Warfare Program to TTar

  2. Bridging the Gap in the Realm of Information Dominance: A Concept of Operations for the Naval Postgraduate School Center for Cyber Warfare

    DTIC Science & Technology

    2010-09-01

    THE REALM OF INFORMATION DOMINANCE : A CONCEPT OF OPERATIONS FOR THE NAVAL POSTGRADUATE SCHOOL CENTER FOR CYBER WARFARE by Cynthia R. Duke...Bridging the Gap in the Realm of Information Dominance : A Concept of Operations for the Naval Postgraduate School Center for Cyber Warfare 6...of importance to the U.S. Military service and its allies. 15. NUMBER OF PAGES 102 14. SUBJECT TERMS Cyber Warfare, Information Dominance 16

  3. USAF Cyber Capability Development: A Vision for Future Cyber Warfare & a Concept for Education of Cyberspace Leaders

    DTIC Science & Technology

    2009-04-01

    Significant and interrelated problems are hindering the Air Force’s development of cyber warfare capabilities. The first is a lack of awareness about...why the AF has chosen to take cyber warfare on as a core capability on par with air and space. The second stems from the lack of a commonly...the cyber capabilities needed in the future? The contributions of this research include a strategic vision for future cyber warfare capabilities that

  4. Capability of the People’s Republic of China to Conduct Cyber Warfare and Computer Network Exploitation

    DTIC Science & Technology

    2009-10-09

    Capability of the People’s Republic of China to Conduct Cyber Warfare and Computer Network Exploitation Prepared for The US-China Economic and...the People?s Republic of China to Conduct Cyber Warfare and Computer Network Exploitation 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM ELEMENT...Capability of the People’s Republic of China to Conduct Cyber Warfare and Computer Network Exploitation 2 US-China Economic and Security Review

  5. Application of Solid Phase Microextraction Coupled with Gas Chromatography/Mass Spectrometry as a Rapid Method for Field Sampling and Analysis of Chemical Warfare Agents and Toxic Industrial Chemicals

    DTIC Science & Technology

    2003-01-01

    PHASE MICROEXTRACTION COUPLED WITH GAS CHROMATOGRAPHY/MASS SPECTROMETRY AS A RAPID METHOD FOR FIELD SAMPLING AND ANALYSIS OF CHEMICAL WARFARE AGENTS...SAMPLING AND ANALYSIS OF CHEMICAL WARFARE AGENTS AND TOXIC INDUSTRIAL CHEMICALS 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER 6...GAS CHROMATOGRAPHY/MASS SPECTROMETRY AS A RAPID METHOD FOR FIELD SAMPLING AND ANALYSIS OF CHEMICAL WARFARE AGENTS AND TOXIC INDUSTRIAL CHEMICALS

  6. Status of dental health in chemical warfare victims: the case of Isfahan, Iran.

    PubMed

    Mottaghi, Ahmad; Hoseinzade, Abolfath; Zamani, Elham; Araghizade, Habib Allah

    2012-01-01

    Little evidence is available regarding the dental health of victims of chemical warfare in Iran. Therefore, in this study, we examined the decayed, missing, and filled teeth index (DMFT), community periodontal index of treatment needs (CPITN), and saliva secretion rate of chemical warfare victims living in the province of Isfahan in Iran. This case-control study was conducted with 300 chemical warfare victims as the treatment group and 300 age-matched individuals without exposure to chemical warfare as the control group. DMFT and CPITN indices and saliva secretion rate were measured and compared between the two groups. Chemical warfare victims had significantly higher scores than the control group for decayed teeth (4.25 ± 3.88 vs 3.52 ± 2.81; P=0.009), missing teeth (8.79 ± 9.3 vs 6.15 ± 8.43; P<0.001), total DMFT index (17.00 ± 6.72 vs 13.20 ± 6.89; P<0.001), and CPTIN (2.81 ± 0.81 vs 1.71 ± 1.04; P<0.001). However, no significant difference was observed between the two groups in filled teeth (4.00 ± 4.2 vs 3.59 ± 2.48; P=0.148). The level of saliva secretion in warfare victims was significantly lower than that in the control group (1.71 ± 0.05 vs 3.85 ± 1.95 cc/5 min; P<0.001). Chemical warfare victims have relatively poor dental/oral health. Chemical injury might cause a dysfunction in saliva secretion, with decrease in saliva secretion increasing the risk for tooth decay and periodontal disorders. Further research is required to find out the exact underlying mechanisms and the factors associated with poor dental/oral health in chemical warfare victims.

  7. "No practical capabilities": American biological and chemical warfare programs during the Korean war.

    PubMed

    Crane, Conrad C

    2002-01-01

    Much controversy still surrounds accusations that American forces in the Far East during the Korean War used biological warfare against North Korea and China. An analysis of recently declassified documents reveals that, although the United States attempted to accelerate its development and acquisition of such weapons during that period, its efforts to create a viable biological warfare capability were unsuccessful. Plans to similarly expand chemical warfare stocks and capabilities were also frustrated. Technological difficulties, personnel shortages, bureaucratic battles between the armed services, and policy limitations combined to hold back advances in American chemical and biological warfare. In light of the recent fears of terrorist attacks with such weapons, this analysis highlights the great difficulties involved in developing, acquiring, and delivering such capabilities.

  8. Establishing a Cyber Warrior Force

    DTIC Science & Technology

    2004-09-01

    Cyber Warfare is widely touted to be the next generation of warfare. As America’s reliance on automated systems and information technology increases...so too does the potential vulnerability to cyber attack. Nation and non-nation states are developing the capability to wage cyber warfare . Historically

  9. Detecting Biological Warfare Agents

    PubMed Central

    Song, Linan; Ahn, Soohyoun

    2005-01-01

    We developed a fiber-optic, microsphere-based, high-density array composed of 18 species-specific probe microsensors to identify biological warfare agents. We simultaneously identified multiple biological warfare agents in environmental samples by looking at specific probe responses after hybridization and response patterns of the multiplexed array. PMID:16318712

  10. Surface Warfare Officers Initial Training For Future Success

    DTIC Science & Technology

    2018-03-01

    updating and creating learning modules and Surface Warfare Officer School (SWOS) staffing as well as weaknesses in the methodologies used for...and Surface Warfare Officer School (SWOS) staffing as well as weaknesses in the methodologies used for training. We conclude that the Basic Division... METHODOLOGY ....................................................................................9 1. Staff Interviews

  11. A Deeper Level of Network Intelligence: Combating Cyber Warfare

    DTIC Science & Technology

    2010-04-01

    A Deeper Level of Network Intelligence: Combating Cyber Warfare This information is provided for your review only and is not for any distribution...A Deeper Level of Network Intelligence: Combating Cyber Warfare 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER 6. AUTHOR(S) 5d

  12. LESSONS FROM THE FRONT: A CASE STUDY OF RUSSIAN CYBER WARFARE

    DTIC Science & Technology

    2015-12-01

    Lessons From The Front: A Case Study Of Russian Cyber Warfare looks to capitalize on the lessons learned from the alleged Russian cyber-offensive on...through the careful analysis and comparison of two disparate conflicts related by their collision with Russian cyber - warfare . Following case study

  13. The Implications of Preemptive and Preventive War Doctrines: A Reconsideration

    DTIC Science & Technology

    2007-07-01

    geopolitics, ideology , and personality as combining to produce the fatal brew which resulted in 42 years of nuclear shadowed global menace.26 But...preventive war. 49 1. Preventive war is war, and preventive warfare is warfare. It is not a distinctive genus of war and warfare. The distinguishing

  14. 15 CFR 742.2 - Proliferation of chemical and biological weapons.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... in ECCN 1C350 (precursor and intermediate chemicals used in the production of chemical warfare agents... on the CCL, chemical detection systems controlled by 1A004.c for detecting chemical warfare agents... used in the production of chemical weapons precursors or chemical warfare agents. (vii) Equipment and...

  15. J. F. C. Fuller: His Methods, Insights, and Vision

    DTIC Science & Technology

    1999-04-01

    contributed immensely to the body of knowledge concerning warfare. As a military scientist, MG Fuller attempted to do for warfare what Copernicus did for... astronomy , Newton for physics, and Darwin for natural history: establish a higher order for the study warfare based on scientific analysis and methods

  16. Biodegradation of Organophosphate Chemical Warfare Agents by Activated Sludge

    DTIC Science & Technology

    2012-03-01

    Holmstedt, B. (1963). Structure- activity relationships of the organophosphorus anticholinesterase agents. In: Koelle, G.B. (ed.), Handbuch...BIODEGRADATION OF ORGANOPHOSPHATE CHEMICAL WARFARE AGENTS BY ACTIVATED SLUDGE Steven J. Schuldt...AFIT/GES/ENV/12-M04 BIODEGRADATION OF ORGANOPHOSPHATE CHEMICAL WARFARE AGENTS BY ACTIVATED SLUDGE THESIS Presented to the

  17. Examining U.S. Irregular Warfare Doctrine

    DTIC Science & Technology

    2008-06-01

    48 Future Theories ...Questions, and Hypotheses The classic warfare theories (i.e. Sun Tzu, Clausewitz, and so forth) directly apply to this research since they form the...Tzu, their theories on the conduct of warfare, and its close tie to politics, form the basis for examining the content of the manuals. The Marine

  18. Technical Support Services for the Office of Naval Research Littoral Warfare Advanced Development Project

    DTIC Science & Technology

    2005-09-30

    Technical Support Services for the Office of Naval Research Littoral Warfare Advanced Development Project William R. Metzger Marine...Support Services for the Office of Naval Research Littoral Warfare Advanced Development Project 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM ELEMENT

  19. The Future of Warfare and Impact of Space Operations

    DTIC Science & Technology

    2011-01-01

    cyber warfare is occurring as a preferred method of conflict between large players on the global stage. Smaller players also have reasons to avoid conventional warfare and remain hidden. In Iraq and Afghanistan, those who fight against us attempt to remain hidden. The individual who places an improvised explosive device (IED) attempts to engage us without exposure or identification. Those who aid the individual emplacing an IED do so with hidden networks of support. The IED is an anonymous weapon. Both cyber warfare and insurgent use of IEDs depend

  20. Software Acquisition in the Age of Cyber Warfare

    DTIC Science & Technology

    2011-05-01

    s c h o o l o f S Y S T E M S a n d L O G I S T I C S education service research Software Acquisition in the Age of Cyber Warfare Maj...DATE MAY 2011 2. REPORT TYPE 3. DATES COVERED 00-00-2011 to 00-00-2011 4. TITLE AND SUBTITLE Software Acquisition in the Age of Cyber Warfare 5a...AFIT Cyber 200/300 Courses Cyber Warfare IDE Program 34 Special Emphasis On… Enterprise Integration (Active Directory, PKI) Security

  1. The Fate of Chemical Warfare Agents in the Environment

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Talmage, Sylvia Smith; Munro, Nancy B; Watson, Annetta Paule

    2007-01-01

    Chemical Warfare Agents, Second Edition has been totally revised since the successful first edition and expanded to about three times the length, with many new chapters and much more in-depth consideration of all the topics. The chapters have been written by distinguished international experts in various aspects of chemical warfare agents and edited by an experienced team to produce a clear review of the field. The book now contains a wealth of material on the mechanisms of action of the major chemical warfare agents, including the nerve agent cyclosarin, formally considered to be of secondary importance, as well as ricinmore » and abrin. Chemical Warfare Agents, Second Edition discusses the physico-chemical properties of chemical warfare agents, their dispersion and fate in the environment, their toxicology and management of their effects on humans, decontamination and protective equipment. New chapters cover the experience gained after the use of sarin to attack travelers on the Tokyo subway and how to deal with the outcome of the deployment of riot control agents such as CS gas. This book provides a comprehensive review of chemical warfare agents, assessing all available evidence regarding the medical, technical and legal aspects of their use. It is an invaluable reference work for physicians, public health planners, regulators and any other professionals involved in this field.« less

  2. Metal organic frameworks for the catalytic detoxification of chemical warfare nerve agents

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Hupp, Joseph T.; Farha, Omar K.; Katz, Michael J.

    A method of using a metal organic framework (MOF) comprising a metal ion and an at least bidendate organic ligand to catalytically detoxify chemical warfare nerve agents including exposing the metal-organic-framework (MOF) to the chemical warfare nerve agent and catalytically decomposing the nerve agent with the MOF.

  3. Impact of Alleged Russian Cyber Attacks

    DTIC Science & Technology

    2009-05-01

    security. 15. SUBJECT TERMS Cyber Security, Cyber Warfare , Estonia, Georgia, Russian Federation Cyber Strategy, Convention on Cybercrime, NATO Center...Federation ......................................................................................... 33  X.  The Future of Russian Cyber Warfare ................................................................... 39...Issue 15.09); Binoy Kampmark, Cyber Warfare Between Estonia And Russia, (Contemporary Review: Autumn, 2003), p 288-293; Jaak Aaviksoo, Address by the

  4. United States Coast Guard Antisubmarine Warfare (ASW) in the Maritime Defense Zone (MDZ) - A Strategic Approach

    DTIC Science & Technology

    1989-03-01

    RIC ILE COPY AIR WAR COLLGE REEAC R~pCR UNITED STATES COAST GUARD ANTISUBMARINE WARFARE (ASW) IN THE MARITIME DEFENSE ZONE (MDZ) -A STRATEGIC...going to perform in these MDZs. Those tasks identified so far include: port and coastal physical security & preventive safety, mine warfare

  5. Countering Gray-Zone Hybrid Threats: An Analysis of Russias New Generation Warfare and Implications for the US Army

    DTIC Science & Technology

    2016-10-18

    education ...Publication (JP) 1, Doctrine for the Armed Forces of the United States, there are two forms of warfare, traditional and irregular, and...combat mission in 2010. Looking at OIF, the US Army participated in both traditional and irregular warfare and the characterization of

  6. Maneuver Warfare revisited: a plea for balance

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Hamilton, M,R.

    1986-04-01

    This paper is a plea for balance in the current pursuit of understanding of the concept and the teaching of Maneuver Warfare. It specifically addresses the need for a more-complete analysis of some of the more-common historical examples commonly offered as examples of the supremecy of Maneuver Warfare. The paper in no way disagrees with the desirability of conducting the kinds of operations associated with the ill-defined concepts offered by advocates of Maneuver Warfare but suggests that the desirable results of historical battles may be too readily ascribed to the dynamic, offensive actions of the victorious side. Secondly, the papermore » points out the lack of utility and applicability of some common buzzwords being used in today's Army. Specifically assailed is the concept of turning within a decision cycle. The paper describes the reasons that this commonly used phrase has little applicability to ground warfare. Finally, the paper mentions the tendency for the Maneuver Warfare camp to cloud discussion of doctrine in a kind of intellectualism and elitism that has no use in forming the necessary consensus demanded by doctrine.« less

  7. The evolution of human warfare.

    PubMed

    Pitman, George R

    2011-01-01

    Here we propose a new theory for the origins and evolution of human warfare as a complex social phenomenon involving several behavioral traits, including aggression, risk taking, male bonding, ingroup altruism, outgroup xenophobia, dominance and subordination, and territoriality, all of which are encoded in the human genome. Among the family of great apes only chimpanzees and humans engage in war; consequently, warfare emerged in their immediate common ancestor that lived in patrilocal groups who fought one another for females. The reasons for warfare changed when the common ancestor females began to immigrate into the groups of their choice, and again, during the agricultural revolution.

  8. Computer-Assisted Performance Evaluation for Navy Anti-Air Warfare Training: Concepts, Methods, and Constraints.

    ERIC Educational Resources Information Center

    Chesler, David J.

    An improved general methodological approach for the development of computer-assisted evaluation of trainee performance in the computer-based simulation environment is formulated in this report. The report focuses on the Tactical Advanced Combat Direction and Electronic Warfare system (TACDEW) at the Fleet Anti-Air Warfare Training Center at San…

  9. Smart Climatology Applications for Undersea Warfare

    DTIC Science & Technology

    2008-09-01

    Comparisons of these climatologies with existing Navy climatologies based on the Generalized Digital Environmental Model ( GDEM ) reveal differences in sonic...undersea warfare. 15. NUMBER OF PAGES 117 14. SUBJECT TERMS antisubmarine warfare, climate variations, climatology, GDEM , ocean, re...climatologies based on the Generalized Digital Environmental Model ( GDEM ) to our smart ocean climatologies reveal a number of differences. The

  10. DETERMINING ELECTRONIC AND CYBER ATTACK RISK LEVEL FOR UNMANNED AIRCRAFT IN A CONTESTED ENVIRONMENT

    DTIC Science & Technology

    2016-08-01

    AIR COMMAND AND STAFF COLLEGE AIR UNIVERSITY DETERMINING ELECTRONIC AND CYBER ATTACK RISK LEVEL FOR UNMANNED AIRCRAFT IN A CONTESTED ENVIRONMENT...iii ABSTRACT During operations in a contested air environment, adversary electronic warfare (EW) and cyber-attack capability will pose a high...10 Russian Federation Electronic Warfare Systems ...................................................12 Chinese Cyber Warfare Program

  11. Manufacturing Technology and Industrial Modernization Incentive Programs

    DTIC Science & Technology

    1991-07-01

    report are those of the contractors and should not be Interpreted as representing the official policies, either expressed or Impli.d, of tte Naval Ocean...Countaermeaue * Undersea countermeasures. special warfare, amphibious warfare. tamc mine countermeasures, and diving Dkected energy . Naval Surface Warfare...Insensitie highly energetic materials -Command control, commiunications, ocean surveillance, surface- and air-launched undersea weapons, and submarine arctic

  12. The Handicap Principle, Strategic Information Warfare and the Paradox of Asymmetry

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Ma, Zhanshan; Sheldon, Frederick T; Krings, Axel

    2010-01-01

    The term asymmetric threat (or warfare) often refers to tactics utilized by countries, terrorist groups, or individuals to carry out attacks on a superior opponent while trying to avoid direct confrontation. Information warfare is sometimes also referred to as a type of asymmetric warfare perhaps due to its asymmetry in terms of cost and efficacy. Obviously, there are differences and commonalities between two types of asymmetric warfare. One major difference lies in the goal to avoid confrontation and one commonality is the asymmetry. Regardless, the unique properties surrounding asymmetric warfare warrant a strategic-level study. Despite enormous studies conducted in themore » last decade, a consensus on the strategy a nation state should take to deal with asymmetric threat seems still intriguing. In this article, we try to shed some light on the issue from the handicap principle in the context of information warfare. The Handicap principle was first proposed by Zahavi (1975) to explain the honesty or reliability of animal communication signals. He argued that in a signaling system such as one used in mate selection, a superior male is able to signal with a highly developed "handicap" to demonstrate its quality, and the handicap serves "as a kind of (quality) test imposed on the individual" (Zahavi 1975, Searcy and Nowicki 2005). The underlying thread that inspires us for the attempt to establish a connection between the two apparently unrelated areas is the observation that competition, communication and cooperation (3C), which are three fundamental processes in nature and against which natural selection optimize living things, may also make sense in human society. Furthermore, any communication networks, whether it is biological networks (such as animal communication networks) or computer networks (such as the Internet) must be reasonably reliable (honest in the case of animal signaling) to fulfill its missions for transmitting and receiving messages. The strategic goal of information warfare is then to destroy or defend the reliability (honesty) of communication networks. The handicap principle that governs the reliability (honesty) of animal communication networks can be considered as the nature s version of information warfare strategy because it is a product of natural selection. What is particularly interesting is to transfer the evolutionary game theory models [e.g., Sir Philip Sydney (SPS) game] for the handicap principle to the study of information warfare. In a broad perspective, we realize that the handicap principle may actually contradict the principle of asymmetry in asymmetric warfare. Anyway, not every species of animals has evolved expensive signaling equipments like male peacocks (whose exaggerated train is an example of handicap). Furthermore, the handicap principle is not only about communication, and it also embodies the spirits of cooperation and competition. In human societies, communication modulates cooperation and competition; so does in animal communication networks. Therefore, to evolve or maintain a sustainable communication network, the proper strategy should be to balance (modulate) the cooperation and competition with communication tools (information warfare tools), which is perhaps in contradiction with the asymmetric strategy. There might be a paradox in the strategy of asymmetric warfare, and whether or not information warfare can be used as an asymmetric tool is still an open question.« less

  13. RPA Field Simulations:Dilemma Training for Legal and Ethical Decision Making

    DTIC Science & Technology

    2015-11-07

    Simulation  Two phases in RPA Field Simulation – classroom phase and field phase  Purpose: link theoretical understanding/ moral reasoning with...rapid, informed decision-making/ moral behavior IRREGULAR WARFARE  U.S. dominates conventional warfare, but irregular warfare falls under Things...aspects: Mental simulation of action Modify Implement Will it work? MORAL REASONING/BEHAVIOR Military-Leader Responsibility requires

  14. Antidotes and treatments for chemical warfare/terrorism agents: an evidence-based review.

    PubMed

    Rodgers, G C; Condurache, C T

    2010-09-01

    This article reviews the evidence supporting the efficacy of antidotes used or recommended for the potential chemical warfare agents of most concern. Chemical warfare agents considered include cyanide, vesicants, pulmonary irritants such as chlorine and phosgene, and nerve agents. The strength of evidence for most antidotes is weak, highlighting the need for additional research in this area.

  15. Navy Operational Planner: Anti-Submarine Warfare with Time-Dependent Performance

    DTIC Science & Technology

    2017-09-01

    PLANNER: ANTI-SUBMARINE WARFARE WITH TIME -DEPENDENT PERFORMANCE by Anthony M. Baldessari September 2017 Thesis Advisor: W. Matthew...reporting burden for this collection of information is estimated to average 1 hour per response, including the time for reviewing instruction, searching...REPORT TYPE AND DATES COVERED Master’s thesis 4. TITLE AND SUBTITLE NAVY OPERATIONAL PLANNER: ANTI-SUBMARINE WARFARE WITH TIME -DEPENDENT

  16. Pacific Missile Range Facility Intercept Test Support. Environmental Assessment/Overseas Environmental Assessment

    DTIC Science & Technology

    2010-04-01

    frequency monitoring, target control, and electronic warfare and networked operations. Kokee supports tracking radars, telemetry, communications, and...owned island of Niihau provide support and sites for a remotely operated PMRF surveillance radar, a Test Vehicle Recovery Site, an electronic warfare...site, multiple electronic warfare portable simulator sites, a marker for aircraft mining exercise programs, and a helicopter terrain-following

  17. Chemical Weapons Disposal: Improvements Needed in Program Accountability and Financial Management

    DTIC Science & Technology

    2000-05-01

    United States General Accounting Office PAQ Report to Congressional Committees May 2000 CHEMICAL WEAPONS DISPOSAL Improvements Needed in Program...warfare materiel, and former production facilities and identify and locate buried chemical warfare materiel. Alternative Technologies and Approaches...production facilities, and buried chemical warfare materiel. These items are described in table 1. Table 1: Nonstockpile Chemical Materiel Category

  18. Homeland Biological Warfare Consequence Management: Capabilities and Needs Assessment

    DTIC Science & Technology

    2001-04-01

    AU/ACSC/105/2001-04 AIR COMMAND AND STAFF COLLEGE AIR UNIVERSITY HOMELAND BIOLOGICAL WARFARE CONSEQUENCE MANAGEMENT: CAPABILITIES AND NEEDS...Dates Covered (from... to) - Title and Subtitle Homeland biological Warfare Consequence Management: Capabilities and Needs Assessment Contract...FEMA, DoJ, DoD, HHS, etc.) make a comprehensive, organized solution to the problem difficult. Focusing on the consequence management functions

  19. Chemical warfare agents.

    PubMed

    Kuca, Kamil; Pohanka, Miroslav

    2010-01-01

    Chemical warfare agents are compounds of different chemical structures. Simple molecules such as chlorine as well as complex structures such as ricin belong to this group. Nerve agents, vesicants, incapacitating agents, blood agents, lung-damaging agents, riot-control agents and several toxins are among chemical warfare agents. Although the use of these compounds is strictly prohibited, the possible misuse by terrorist groups is a reality nowadays. Owing to this fact, knowledge of the basic properties of these substances is of a high importance. This chapter briefly introduces the separate groups of chemical warfare agents together with their members and the potential therapy that should be applied in case someone is intoxicated by these agents.

  20. Forms of war.

    PubMed

    Vogel, H; Bartelt, D

    2007-08-01

    Under war conditions, employed weapons can be identified on radiographs obtained in X-ray diagnostic. The analysis of such X-ray films allows concluding that there are additional information about the conditions of transport and treatment; it shall be shown that there are X-ray findings which are typical and characteristic for certain forms of warfare. The radiograms have been collected during thirty years; they come from hospitals, where war casualties had been treated, and personal collections. The material is selected, because in war X-ray diagnostic will be limited and the interest of the opposing parties influence the access to the material; furthermore the possibilities to publish or to communicate facts and thoughts are different. Citizens of the USA, GB, France, or Israel will have easier access to journals than those of Vietnam, Chad, and Zimbabwe. Under war conditions, poor countries, like North Vietnam may develop own concepts of medical care. There are X-ray findings which are typical or even characteristic for air warfare, guerrilla warfare, gas war, desert warfare, conventional warfare, and annihilation warfare, and city guerrilla warfare/civil war. The examples demonstrate that weapons and the conditions of transport and treatment can be recognized by X-ray findings. The radiogram can be read like a document. In War, there are differences between a treatment and imaging diagnostic in countries, which control the air space and in those who do not. Medical care of the poor, i.e. in countries (in general those opposing the western nations) will hardly be published, and poverty has no advocate.

  1. Sink or Swim: The Marine Corps Capacity to Conduct a Marine Expeditionary Brigade Amphibious Assault using Expeditionary Maneuver Warfare

    DTIC Science & Technology

    2010-03-01

    Expeditionary Maneuver Warfare? This study addresses the equipment issues surrounding the Marine expeditionary brigade ’s’ ability to conduct an amphibious...addresses the equipment issues surrounding the expeditionary brigade’s ability to conduct an amphibious assault under expeditionary maneuver warfare in...1 Issues and Elements of the Modern-Day MEB Assault .................................................................. 2 The Marine Corps

  2. User Guide for Unmanned Aerial System (UAS) Operations on the National Ranges

    DTIC Science & Technology

    2007-11-01

    WARFARE CENTER WEAPONS DIVISION, PT. MUGU NAVAL AIR WARFARE CENTER WEAPONS DIVISION, CHINA LAKE NAVAL AIR WARFARE CENTER AIRCRAFT DIVISION, PATUXENT...with IFR Instrument Flight Rules MRTFB Major Range and Test Facility Base NAS National Airspace System NM nautical mile NTIA National...sectional charts, Instrument Flight Rules ( IFR ) enroute charts, and terminal area charts. The floor and ceiling, operating hours, and controlling

  3. Coast Guard SOF

    DTIC Science & Technology

    2006-02-01

    Forces units into known Viet Cong (VC) strongholds, participating in direct action raids on VC junk bases, conducting psychological operations, and...and General McClure established the Army’s Psychological Warfare Cen- ter and 10th Special Forces Group in 1952.62 President Kennedy’s interest in...counterinsurgency warfare paved the way for the “Green Beret,” for which Army Special Forces renamed the Psychological Warfare Center the JFK Special

  4. Military medicine and the ethics of war: British colonial warfare during the Seven Years War (1756-63).

    PubMed

    Charters, Erica

    2010-01-01

    This article examines 18th-century European warfare, tracing the first formal codifications of conventions of war, frequently introduced by military physicians and initially regarding the treatment of the sick and wounded. It outlines to what extent these conventions were followed in practice, particularly in the challenging environment of American irregular warfare, with a focus on the most well-known incident of "biological warfare" in the period: the deliberate spread of smallpox by British officers among Amerindians in 1763. More broadly, it demonstrates that the history of military medicine provides a fruitful method with which to uncover assumptions about the ethics of war.

  5. Simulated experiment for elimination of chemical and biological warfare agents by making use of microwave plasma torch

    NASA Astrophysics Data System (ADS)

    Hong, Yong C.; Kim, Jeong H.; Uhm, Han S.

    2004-02-01

    The threat of chemical and biological warfare agents in a domestic terrorist attack and in military conflict is increasing worldwide. Elimination and decontamination of chemical and biological warfare (CBW) agents are immediately required after such an attack. Simulated experiment for elimination of CBW agents by making use of atmospheric-pressure microwave plasma torches is carried out. Elimination of biological warfare agents indicated by the vitrification or burnout of sewage sludge powders and decomposition of toluene gas as a chemical agent stimulant are presented. A detailed characterization for the elimination of the simulant chemicals using Fourier transform infrared and gas chromatography is also presented.

  6. About the bears and the bees: Adaptive responses to asymmetric warfare

    NASA Astrophysics Data System (ADS)

    Ryan, Alex

    Conventional military forces are organised to generate large scale effects against similarly structured adversaries. Asymmetric warfare is a 'game' between a conventional military force and a weaker adversary that is unable to match the scale of effects of the conventional force. In asymmetric warfare, an insurgents' strategy can be understood using a multi-scale perspective: by generating and exploiting fine scale complexity, insurgents prevent the conventional force from acting at the scale they are designed for. This paper presents a complex systems approach to the problem of asymmetric warfare, which shows how future force structures can be designed to adapt to environmental complexity at multiple scales and achieve full spectrum dominance.

  7. About the bears and the bees: Adaptive responses to asymmetric warfare

    NASA Astrophysics Data System (ADS)

    Ryan, Alex

    Conventional military forces are organised to generate large scale effects against similarly structured adversaries. Asymmetric warfare is a `game' between a conventional military force and a weaker adversary that is unable to match the scale of effects of the conventional force. In asymmetric warfare, an insurgents' strategy can be understood using a multi-scale perspective: by generating and exploiting fine scale complexity, insurgents prevent the conventional force from acting at the scale they are designed for. This paper presents a complex systems approach to the problem of asymmetric warfare, which shows how future force structures can be designed to adapt to environmental complexity at multiple scales and achieve full spectrum dominance.

  8. Design and implementation of intelligent electronic warfare decision making algorithm

    NASA Astrophysics Data System (ADS)

    Peng, Hsin-Hsien; Chen, Chang-Kuo; Hsueh, Chi-Shun

    2017-05-01

    Electromagnetic signals and the requirements of timely response have been a rapid growth in modern electronic warfare. Although jammers are limited resources, it is possible to achieve the best electronic warfare efficiency by tactical decisions. This paper proposes the intelligent electronic warfare decision support system. In this work, we develop a novel hybrid algorithm, Digital Pheromone Particle Swarm Optimization, based on Particle Swarm Optimization (PSO), Ant Colony Optimization (ACO) and Shuffled Frog Leaping Algorithm (SFLA). We use PSO to solve the problem and combine the concept of pheromones in ACO to accumulate more useful information in spatial solving process and speed up finding the optimal solution. The proposed algorithm finds the optimal solution in reasonable computation time by using the method of matrix conversion in SFLA. The results indicated that jammer allocation was more effective. The system based on the hybrid algorithm provides electronic warfare commanders with critical information to assist commanders in effectively managing the complex electromagnetic battlefield.

  9. Chemical warfare, past and future. Study project

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Tzihor, A.

    1992-05-15

    World War I was arena for the first use of chemical warfare. The enormous tactical success brought about by this first time use of chemical weapons caused the continued development of more sophisticated tactics and weapons in this category of unconventional warfare. This phenomenon has carried through to today. However, at present, because of technological developments, the global economic situation, and political factors, coupled with the inability of the western world to control the proliferation of chemical weapons, a situation weapon of mass destruction. Recent use by Iraq against Kurdish civilian indicates that chemical warfare is no longer limited tomore » the battlefield. The western nations have a need to understand the risk. This paper conducts an analysis of past lessons and the factors which will affect the use of chemical warfare in the future. From this analysis, the paper reaches conclusions concerning the significant threat chemical weapons pose for the entire world in the not too distant future.« less

  10. Efficacy Evaluation of Current and Future Naval Mine Warfare Neutralization Method

    DTIC Science & Technology

    2016-12-01

    Distribution is unlimited. EFFICACY EVALUATION OF CURRENT AND FUTURE NAVAL MINE WARFARE NEUTRALIZATION METHOD by Team MIW Cohort SE311-152O...EFFICACY EVALUATION OF CURRENT AND FUTURE NAVAL MINE WARFARE NEUTRALIZATION METHOD 5. FUNDING NUMBERS 6. AUTHOR (S) Team MIW, Systems Engineering...NEUTRALIZATION METHOD Team MIW, Systems Engineering Cohort SE311-152O Submitted in partial fulfillment of the requirements for the degrees of

  11. Computer Network Attack: An Operational Tool?

    DTIC Science & Technology

    2003-01-17

    Spectrum of Conflict, Cyber Warfare , Preemptive Strike, Effects Based Targeting. 15. Abstract: Computer Network Attack (CNA) is defined as...great deal of attention as the world’s capabilities in cyber - warfare grow. 11 Although addressing the wide ranging legal aspects of CNA is beyond the...the notion of cyber - warfare has not yet developed to the point that international norms have been established.15 These norms will be developed in

  12. The U.S. Needs International Cyber Treaties

    DTIC Science & Technology

    2010-03-01

    formed to deal with issues surrounding cyber warfare . However, no major treaties between nations exist regarding this form of combat. Examining...the history of cyber warfare , the inadequate international response, the obstacles to international agreement, and poor U.S. readiness demonstrates...the current need for the U.S. to lead the effort to codify treaties. First, a brief history of cyber warfare helps to shed light on the international

  13. Cyber Capabilities for Global Strike in 2035

    DTIC Science & Technology

    2012-02-15

    operations force, by treating cyber warfare capabilities in the same manner as it treats its other weapon systems. It argues that despite preconceptions of...As such, while automation is required, cyber warfare will be much more manpower intensive than is currently understood, and will require a force that...constantly keeping cyber warfare capabilities in pace with the technologies of the environment.This paper reaches these conclusions by first providing a

  14. Cyber Capabilities for Global Strike in 2035

    DTIC Science & Technology

    2012-02-15

    operations force, by treating cyber warfare capabilities in the same manner as it treats its other weapon systems. It argues that despite preconceptions of...As such, while automation is required, cyber warfare will be much more manpower intensive than is currently understood, and will require a force...constantly keeping cyber warfare capabilities in pace with the technologies of the environment. This paper reaches these conclusions by first providing a

  15. Integrating Defense, Diplomacy, and Development (3 D) in the Naval Special Warfare Operator

    DTIC Science & Technology

    2010-12-01

    DIPLOMACY, AND DEVELOPMENT (3 D) IN THE NAVAL SPECIAL WARFARE OPERATOR by William Fiack William Roberts Tim Sulick December 2010...Development (3 D) in the Naval Special Warfare Operator 6. AUTHOR(S) William Fiack, William Roberts, Timothy Sulick 5. FUNDING NUMBERS 7. PERFORMING...MONITORING AGENCY NAME(S) AND ADDRESS(ES) N/A 10. SPONSORING/MONITORING AGENCY REPORT NUMBER 11. SUPPLEMENTARY NOTES The views expressed in

  16. Chemical Warfare: Many Unanswered Questions.

    DTIC Science & Technology

    1983-04-29

    of Defense DSB Defense Science Board GAO U.S. General Accounting Office IDA Institute for Defense Analyses JCS Joint Chiefs of Staff SIPRI Stockholm...Defense Science Board in 1980, DOD specifically asked it to review intelligence data on chemical warfare, and DSB’s 1981 report accordingly presents its...Defense Science Board report suggests, however, that its com- - ments are based on a composite of intelligence information on Soviet chemical warfare

  17. The Airpower Advantage in Future Warfare: The Need for Strategy

    DTIC Science & Technology

    2007-12-01

    political situation which gener- ates war and therefore warfare, foreign and domestic; the social- cultural ideologies , attitudes, habits of mind, and...the ideological rivalries that contributed so powerfully to interstate rivalry, ambition, and anxiety are all but defunct, save only in two respects...instead to fit that still improving competence into a truly holistic approach to warfare. That approach, in its turn, needs to fit into a genu - inely

  18. Calming the Churn: Resolving the Dilemma of Rotational Warfare in Counterinsurgency

    DTIC Science & Technology

    2013-12-01

    warfare in counterinsurgency Publisher Monterey, California: Naval Postgraduate School Issue Date 2013-12 URL http://hdl.handle.net/10945/38873... TYPE AND DATES COVERED Master’s Thesis 4. TITLE AND SUBTITLE CALMING THE CHURN: RESOLVING THE DILEMMA OF ROTATIONAL WARFARE IN COUNTERINSURGENCY...operations, however, would not last and, after only a year, MacArthur was sent to other duties thanks to personality conflicts with Taft. His replacement

  19. A Game Theoretic Model Of Strategic Conflict In Cyberspace

    DTIC Science & Technology

    2012-01-01

    EXECUTIVE SUMMARY Conflict in cyberspace is difficult to analyze; methods developed for other dimensions of conflict, such as land warfare , war at sea...and missile warfare , do not adequately address cyber conflict. A characteristic that distinguishes cyber conflict is that actors do not know the...strategic and policy guidance. To analyze the strategic decisions involved in cyber conflict, we use a game theoretic framework—we view cyber warfare as a

  20. US Army Special Warfare. Its Origins: Psychological and Unconventional Warfare, 1941-1952

    DTIC Science & Technology

    1982-01-01

    remained a fundamental military organization. Simultaneously, however, a few thinkers began to consider the possibility of forces capable of operating at...guerrilla warfare. He had been impressed as well by the British system of intelligence and counter- intelligence, as conducted by their Secret Intelligence...highly respected Columbia Broadcasting System reporter like Elmer Davis as its first director. Although most existing information services were trans

  1. Technology Strategy Integration

    DTIC Science & Technology

    2012-06-01

    History of Weaponry and Warfare from Prehistory to the Present (New York: Free Press : Distributed by Simon & Schuster, 2002), 191. 57 Robert L... Prehistory to the Present, 182. 60 O’Connell and Batchelor, Soul of the Sword: An Illustrated History of Weaponry and Warfare from Prehistory to the...Illustrated History of Weaponry and Warfare from Prehistory to the Present, 390. 62 O’Connell and Batchelor, Soul of the Sword: An Illustrated

  2. Sub state Unconventional Warfare: Expanding United States Military Political Options

    DTIC Science & Technology

    2016-05-26

    phases due to competing incumbent efforts. Giap was influenced in his understanding of revolutionary war phasing by Sun Tzu who Giap called one of his...Challenge of Unconventional Warfare. London: Routledge, 2012. Ames, Roger T. Sun - Tzu The Art of Warfare. New York: Ballantine Books, 1993. Amin, Samir...Guerrilla: Insurgents, Patriots, and Terrorists from Sun Tzu to Bin Laden. London: Brassey’s Inc., 2004. Rosenau, William, Subversion and Insurgency

  3. The role of the sand in chemical warfare agent exposure among Persian Gulf War veterans: Al Eskan disease and "dirty dust".

    PubMed

    Korényi-Both, A L; Svéd, L; Korényi-Both, G E; Juncer, D J; Korényi-Both, A L; Székely, A

    2000-05-01

    The purpose of this paper is to inquire into the relationship between Al Eskan disease and the probable exposure to chemical warfare agents by Persian Gulf War veterans. Al Eskan disease, first reported in 1991, compromises the body's immunological defense and is a result of the pathogenic properties of the extremely fine, dusty sand located in the central and eastern region of the Arabian peninsula. The disease manifests with localized expression of multisystem disorder. Signs and symptoms of Al Eskan disease have been termed by the news media "Persian Gulf syndrome." The dust becomes a warfare agent when toxic chemicals are microimpregnated into inert particles. The "dirty dust" concept, that the toxicity of an agent could be enhanced by absorption into inactive particles, dates from World War I. A growing body of evidence shows that coalition forces have encountered Iraqi chemical warfare in the theater of operation/Persian Gulf War to a much greater extent than early U.S. Department of Defense information had indicated. Veterans of that war were exposed to chemical warfare agents in the form of direct (deliberate) attacks by chemical weapons, such as missiles and mines, and indirect (accidental) contamination from demolished munition production plants and storage areas, or otherwise. We conclude that the microimpregnated sand particles in the theater of operation/Persian Gulf War depleted the immune system and simultaneously acted as vehicles for low-intensity exposure to chemical warfare agents and had a modifying-intensifying effect on the toxicity of exposed individuals. We recommend recognition of a new term, "dirty sand," as a subcategory of dirty dust/dusty chemical warfare agents. Our ongoing research efforts to investigate the health impact of chemical warfare agent exposure among Persian Gulf War veterans suggest that Al Eskan disease is a plausible and preeminent explanation for the preponderance of Persian Gulf War illnesses.

  4. Estimated Chemical Warfare Agent Surface Clearance Goals for Remediation Pre-Planning

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Dolislager, Frederick; Bansleben, Dr. Donald; Watson, Annetta Paule

    2010-01-01

    Health-based surface clearance goals, in units of mg/cm2, have been developed for the persistent chemical warfare agents sulfur mustard (HD) and nerve agent VX as well as their principal degradation products. Selection of model parameters and critical receptor (toddler child) allow calculation of surface residue estimates protective for the toddler child, the general population and adult employees of a facilty that has undergone chemical warfare agent attack.

  5. COIN in Cyberspace: Focusing Air Force Doctrine Development

    DTIC Science & Technology

    2007-01-01

    cyberspace and began codifying its cyber warfare doctrine. This effort is hampered, however, by a limited understanding of cyberspace by rank and file Air...Force members. Many believe cyberspace and cyber warfare are the responsibility of the communications community. If this new doctrine is to be...doctrine to build upon, the Air Force can create unity of effort among Airmen at all levels, ensure unity of purpose in the prosecution of cyber warfare , and

  6. In Pursuit of an Aptitude Test for Potential Cyberspace Warriors

    DTIC Science & Technology

    2007-03-01

    may well be training their soldiers in the art of cyber warfare to attack our infrastructure and defend their own. It seems like a no-brainer that...communications. Certainly this is an area that could be exploited in cyber warfare . Another subject with little reference was regarding linguistic...Journal, 40(3), 769-780. Parks, R. C., & duggan, D. P. (2001). Principles of cyber - warfare . Proceeding of the 2001 IEEE Workshop on Information

  7. Self-Development for Cyber Warriors

    DTIC Science & Technology

    2011-11-10

    Aggressive self-development is a critical task for the cyber warfare professional. No matter the quality, formal training and education programs age...Books and Science Fiction); Technology and Cyber-Related Magazines and Blogs; Specific Cyber Warfare Journal and Magazine Articles; Key Documents on...the strengths and weaknesses of the major donor career fields to the cyber workforce, and a Self-Assessment of Cyber Domain Expertise for readers who wish to assess their own cyber warfare expertise.

  8. Finding the Balance to Combat a Hybrid Threat

    DTIC Science & Technology

    2013-05-23

    supporting operation to conventional warfare. Mao Tse -tung stated that guerrilla warfare is one aspect of total war, because it cannot win a war by itself.15...of Military and Associated Terms, 147. 15Mao Tse -tung, On Guerrilla Warfare, trans. Samuel B. Griffith II (Champaign, IL: University of Illinois...to deny the Vietcong or the North Vietnamese sanctuary in neither Laos nor Cambodia. Summary In Afghanistan, insurgency has become more a

  9. The Combat Vehicle Command and Control System: Combat Performance of Armor Battalions Using Interactive Simulation

    DTIC Science & Technology

    1994-05-01

    Command and Control display. Using Ml tank simulators in the Mounted Warfare Test Bed at Fort Knox, Kentucky, the researchers evaluated tank battalion... Warfare Test Bed (MWTB) at Fort Knox, Kentucky, eight MOS-qualified armor crews (battalion commander, battalion opera- tions officer, three company...concerned with identifying ways that the CVCC system might best benefit the battlefield commander, and potential modifications to mounted warfare TTPs

  10. Modeling Anti-Air Warfare With Discrete Event Simulation and Analyzing Naval Convoy Operations

    DTIC Science & Technology

    2016-06-01

    WARFARE WITH DISCRETE EVENT SIMULATION AND ANALYZING NAVAL CONVOY OPERATIONS by Ali E. Opcin June 2016 Thesis Advisor: Arnold H. Buss Co...REPORT DATE June 2016 3. REPORT TYPE AND DATES COVERED Master’s thesis 4. TITLE AND SUBTITLE MODELING ANTI-AIR WARFARE WITH DISCRETE EVENT...In this study, a discrete event simulation (DES) was built by modeling ships, and their sensors and weapons, to simulate convoy operations under

  11. Fractal Effects in Lanchester Models of Combat

    DTIC Science & Technology

    2009-08-01

    Lanchester models. 8. References 1 Aircraft in Warfare : The Dawn of the Fourth Arm, F W Lanchester , Constable & Co., London, 1916. 2 The Calculus of...Intermediate Asymptotics, G I Barenblatt, CUP, 1996. 14 Lanchester Models of Warfare Volumes 1 and 2, J G Taylor, Operations Research Society of America...Nagabhushana, Computers and Operations Research, 21, 615-628, 1994. 20 DSTO-TR-2331 18 Lanchester Type Models of Warfare , H K Weiss, Proc.First

  12. A Heuristic Decision Making Model to Mitigate Adverse Consequences in a Network Centric Warfare/Sense and Respond System

    DTIC Science & Technology

    2005-05-01

    made. 4. Do military decision makers identify / analyze adverse consequences presently? Few do based on this research and most don’t do it effectively ...A HEURISTIC DECISION MAKING MODEL TO MITIGATE ADVERSE CONSEQUENCES IN A NETWORK CENTRIC WARFARE / SENSE AND RESPOND SYSTEM...ENS/05-01 A HEURISTIC DECISION MAKING MODEL TO MITIGATE ADVERSE CONSEQUENCES IN A NETWORK CENTRIC WARFARE / SENSE AND RESPOND SYSTEM

  13. The Strategic and Political Impacts of Collateral Damage from Strike Warfare

    DTIC Science & Technology

    2015-03-01

    damage from strike warfare focuses on legal, humanitarian, and moral issues . To oversimplify, killing non-combatants is bad, but it happens, and not...humanitarian, and moral issues . To oversimplify, killing non- combatants is bad, but it happens, and not always by accident. Therefore, it is instructive...method of bombing. A significant amount of research on the effects of collateral damage from strike warfare focuses on humanitarian and moral issues

  14. Network Centric Warfare Case Study: U.S. V Corps and 3rd Infantry Division (Mechanized) During Operation Iraqi Freedom Combat Operations (Mar-Apr 2003). Volume 3. Network Centric Warfare Insights

    DTIC Science & Technology

    2003-01-01

    OPSEC), military deception, psychological operations (PSYOPS), special information operations (IO), information assurance, physical security...nonlethal effects, such as operational 8 Network Centric Warfare Case Study security (OPSEC), military deception, psychological operations (PSYOP...Support Operations Group ASR Alternate Supply Route; or, Ammunition Supply Rate ATACMS Army Tactical Missile System ATARS Advanced

  15. Biomaterials for mediation of chemical and biological warfare agents.

    PubMed

    Russell, Alan J; Berberich, Jason A; Drevon, Geraldine F; Koepsel, Richard R

    2003-01-01

    Recent events have emphasized the threat from chemical and biological warfare agents. Within the efforts to counter this threat, the biocatalytic destruction and sensing of chemical and biological weapons has become an important area of focus. The specificity and high catalytic rates of biological catalysts make them appropriate for decommissioning nerve agent stockpiles, counteracting nerve agent attacks, and remediation of organophosphate spills. A number of materials have been prepared containing enzymes for the destruction of and protection against organophosphate nerve agents and biological warfare agents. This review discusses the major chemical and biological warfare agents, decontamination methods, and biomaterials that have potential for the preparation of decontamination wipes, gas filters, column packings, protective wear, and self-decontaminating paints and coatings.

  16. Military Engineers and Chemical Warfare Troops (Inzhenernye Voiska Khimicheskie Voiska),

    DTIC Science & Technology

    MILITARY FORCES(FOREIGN), *MILITARY ORGANIZATIONS, MILITARY ENGINEERING , INFANTRY, AMPHIBIOUS OPERATIONS, MINELAYING, ARMORED VEHICLES, NUCLEAR...RADIATION, DOSIMETERS, CHEMICAL WARFARE, PROTECTIVE CLOTHING, DECONTAMINATION, HEALTH PHYSICS.

  17. Blaptica dubia as sentinels for exposure to chemical warfare agents - a pilot study.

    PubMed

    Worek, Franz; Seeger, Thomas; Neumaier, Katharina; Wille, Timo; Thiermann, Horst

    2016-11-16

    The increased interest of terrorist groups in toxic chemicals and chemical warfare agents presents a continuing threat to our societies. Early warning and detection is a key component for effective countermeasures against such deadly agents. Presently available and near term solutions have a number of major drawbacks, e.g. lack of automated, remote warning and detection of primarily low volatile chemical warfare agents. An alternative approach is the use of animals as sentinels for exposure to toxic chemicals. To overcome disadvantages of vertebrates the present pilot study was initiated to investigate the suitability of South American cockroaches (Blaptica dubia) as warning system for exposure to chemical warfare nerve and blister agents. Initial in vitro experiments with nerve agents showed an increasing inhibitory potency in the order tabun - cyclosarin - sarin - soman - VX of cockroach cholinesterase. Exposure of cockroaches to chemical warfare agents resulted in clearly visible and reproducible reactions, the onset being dependent on the agent and dose. With nerve agents the onset was related to the volatility of the agents. The blister agent lewisite induced signs largely comparable to those of nerve agents while sulfur mustard exposed animals exhibited a different sequence of events. In conclusion, this first pilot study indicates that Blaptica dubia could serve as a warning system to exposure of chemical warfare agents. A cockroach-based system will not detect or identify a particular chemical warfare agent but could trigger further actions, e.g. specific detection and increased protective status. By designing appropriate boxes with (IR) motion sensors and remote control (IR) camera automated off-site warning systems could be realized. Copyright © 2016 Elsevier Ireland Ltd. All rights reserved.

  18. Coalition Logistics: A Case Study in Operation Restore Hope

    DTIC Science & Technology

    1994-06-03

    coalition operations."° In Seland’s interview with Colonel Wolfgang Kopp, chief of staff, German/Franco Brigade, Colonel Kopp stated that key members...February 1994. 21William G. Pagonis and Michael D. Krause , "Operational Logistics and the Gulf War," The Institute of Land Warfare: The Land Warfare...Headquarters, 1989. Pagonis, William G. and Michael D. Krause . "Operational Logistics and the Gulf War." The Land Warfare Paper No. 13. Arlington, Virginia

  19. Mission Accomplished! Or Not? A Study about Success in Information Operations

    DTIC Science & Technology

    2012-09-01

    sensors and presented on a man-machine interface, e.g., a computer screen or on a radar plan position indicator. In modern warfare, staff and...has to be achievable; otherwise, it can be viewed simply as dreaming. Compared to sea, land and even air warfare, information warfare is a young...shares some of its characteristics with the air and sea domains. All of them exist without borders. In addition, they cannot be fortified or

  20. Pirates of the Nuclear Age: The Role of U.S. Submarines in Modern Trade Warfare

    DTIC Science & Technology

    2016-07-14

    have sought to influence the outcome of the conflict by targeting enemy commerce . This influence historically called for the use of privateers...submarines took the position of privateers as the ideal force for conducting commerce warfare. Throughout World War Two (WWII) commerce warfare using... commerce ) remains. From the time of Greek city-states, to the privateers of the age of sail, to the submarines of WWI and WWII, targeting the

  1. The Combat Vehicle Command and Control System. Combat Performance of Armor Battalions Using Interactive Simulation

    DTIC Science & Technology

    1994-01-31

    ncluded the Commander’s Independent Thermal Viewer and a Command and Control display. Using 1 tank simulators in the Mounted Warfare Test Bed at Fort...CCD), the Commander’s Independent Thermal Viewer (CITV), and digital TOC workstations. Using autoloading tank simulators in the Mounted Warfare Test...identifying ways that the CVCC system might best benefit the battlefield commander, and potential modifications to mounted warfare TTPs. Another area of

  2. The Combat Vehicle Command and Control System. Combat Performance of Armor Battalions Using Distributed Interactive Simulation

    DTIC Science & Technology

    1993-12-15

    and Control disqlay. Using M1 tank simulators in the Mounted Warfare Test Bed at Fort Knox, KY, the evaluation focused on tank battalion oierations...and digital TOC workstations. Using autoloading tank simulators in the Mounted Warfare Test Bed (MWTB) at Fort Knox, Kentucky, eight MOS-qualified...might best benefit the battlefield commander, and potential modifications to mounted warfare TTPs. Another area of interest is the implication for

  3. Gray Zone Warfare: German and Russian Political Warfare, 1935-1939, and 2001

    DTIC Science & Technology

    2017-06-09

    Stretching and Exploiting Thresholds for High -Order War: How Russia, China, and Iran are Eroding American Influence Using Time-Tested Measures...PSYOP Terminology,” in American Institutes for Research, Department of the Army Pamphlet 525-7-1-2, The Art and Science of Psychological Operations...efforts to attack the enemies’ “ power , influence, and will.”88 In the United States, Irregular Warfare was not a part of doctrine until 2007, when the

  4. Winning the Counterinsurgency Fight in Iraq: The Role of Political Culture in Counterinsurgency Warfare 2003-2006 in Iraq

    DTIC Science & Technology

    2006-05-26

    Winning the Counterinsurgency Fight in Iraq: The Role of Political Culture in Counterinsurgency Warfare 2003-2006 in Iraq A Monograph by Major...Counterinsurgency Fight in Iraq: The Role of Political Culture in Counterinsurgency Warfare 2003-2006 in Iraq 5c. PROGRAM ELEMENT NUMBER 5d. PROJECT NUMBER 5e...14. ABSTRACT This monograph provides insight into the importance of political culture in relation to developing a counterinsurgency strategy. This

  5. Linear Goal Programming as a Military Decision Aid.

    DTIC Science & Technology

    1988-04-01

    JAMES F. MAJOR9 USAF 13a. TYPE OF REPORT 13b. TIME COVERED 14. DATE OF REPORT (Year, Month, Day) 15. PAGE COUNT IFROM____ TO 1988 APRIL 64 16...air warfare, advanced armour warfare, the potential f or space warfare, and many other advances have expanded the breadth of weapons employed to the...written by A. Charnes and W. W. Cooper, Management Models and Industrial Applications of Linear Programming In 1961.(3:5) Since this time linear

  6. Submarine Warfare in the 20th & 21st Centuries: A Bibliography

    DTIC Science & Technology

    2003-12-01

    International studies series ser. no. 02-019). 49 p. Bailey, Thomas Andrew and Paul B. Ryan. The Lusitania disaster: an episode in modern warfare and...verlagshandlung, 1939. 212 p. Ellis, Frederick D. The tragedy of the Lusitania : embracing authentic stories by the survivors and eye-witnesses of the disaster...warfare; a study of its methods and spirit, including the crime of the " Lusitania ," a record of observations and evidence. New York, London, D. Appleton

  7. The Human Domain and the Future of Army Warfare: Present as Prelude to 2050

    DTIC Science & Technology

    2017-07-01

    ERDC/CERL MP-17-2 ii Abstract Studies on the future of warfare tend to focus on technology and place but largely overlook the actors. Warfare in 2050...will be predominantly urban, utilizing robotics and other advanced technologies , but at the core will re- main an inherently human and political...collaboration for success. Despite the ap- peal of advanced technology , the U.S. Army could greatly benefit by looking beyond strictly technological

  8. Feasibility Study for the Use of Green, Bio-Based, Efficient Reactive Sorbent Material to Neutralize Chemical Warfare Agents

    DTIC Science & Technology

    2012-08-02

    REPORT Feasibility study for the use of green, bio-based, efficient reactive sorbent material to neutralize chemical warfare agents 14. ABSTRACT 16...way cellulose, lignin and hemicelluloses interact as well as whole wood dissolution occurs in ILs. The present project was conducted to 1. REPORT...Feasibility study for the use of green, bio-based, efficient reactive sorbent material to neutralize chemical warfare agents Report Title ABSTRACT Over the

  9. Personal protection during resuscitation of casualties contaminated with chemical or biological warfare agents--a survey of medical first responders.

    PubMed

    Brinker, Andrea; Prior, Kate; Schumacher, Jan

    2009-01-01

    The threat of mass casualties caused by an unconventional terrorist attack is a challenge for the public health system, with special implications for emergency medicine, anesthesia, and intensive care. Advanced life support of patients injured by chemical or biological warfare agents requires an adequate level of personal protection. The aim of this study was to evaluate the personal protection knowledge of emergency physicians and anesthetists who would be at the frontline of the initial health response to a chemical/biological warfare agent incident. After institutional review board approval, knowledge of personal protection measures among emergency medicine (n = 28) and anesthetics (n = 47) specialty registrars in the South Thames Region of the United Kingdom was surveyed using a standardized questionnaire. Participants were asked for the recommended level of personal protection if a chemical/biological warfare agent(s) casualty required advanced life support in the designated hospital resuscitation area. The best awareness within both groups was regarding severe acute respiratory syndrome, and fair knowledge was found regarding anthrax, plague, Ebola, and smallpox. In both groups, knowledge about personal protection requirements against chemical warfare agents was limited. Knowledge about personal protection measures for biological agents was acceptable, but was limited for chemical warfare agents. The results highlight the need to improve training and education regarding personal protection measures for medical first receivers.

  10. [Medecine, Law, and Knowledge Production about the "Civilized" War in the Long 19th Century].

    PubMed

    Goltermann, Svenja

    2015-01-01

    The aim to 'civilize' warfare accompanied Medicine and International Law ever since the mid-19th century. However, the entanglement of Medicine and Law, crucial for such an endeavour, has not been taken into consideration so far; likewise, the huge importance of medical knowledge for the perception of wars and their ramifications did not garner much attention in historical research. Hence, by focusing on the 'long' 19th century, this paper shows, firstly, that the production of surgical knowledge during warfare aimed at measuring the effects of combat on human bodies in order to develop prognostic medical knowledge for future wars, as well as maintaining the combat strength of soldiers. Moreover, this knowledge production during warfare strived for the enhancement of medical competence in the diagnosis and treatment of wounds in general. Secondly, I show that this medical knowledge was not only relevant for warfare, but also crucial for the design of International Law: it served to nourish the debates among the so called 'civilized' nations about legitimate and illegitimate weaponry and warfare.

  11. 48 CFR 205.301 - General.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... not available, in accordance with 225.7002-2(b); or (B) The acquisition is for chemical warfare... determined that this acquisition of chemical warfare protective clothing furthers an agreement with a...

  12. 48 CFR 205.301 - General.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... not available, in accordance with 225.7002-2(b); or (B) The acquisition is for chemical warfare... determined that this acquisition of chemical warfare protective clothing furthers an agreement with a...

  13. 48 CFR 205.301 - General.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... not available, in accordance with 225.7002-2(b); or (B) The acquisition is for chemical warfare... determined that this acquisition of chemical warfare protective clothing furthers an agreement with a...

  14. North Korean Protective Mine Warfare: An Analysis of the Naval Minefields at Wonsan, Chinnampo and Hungnam during the Korean War

    DTIC Science & Technology

    2010-04-01

    the United States Navy and the general military history community as well. As a result, studies involving mine warfare have been neglected. In...that particular campaign. The Navy, lulled into a sense of complacency, has neglected mine warfare studies . Naval Intelligence has made little attempt...Farragut famously ignored the mineline there to destroy the Confederate fleet nearby. While extensive mining also occurred during World War One , the United

  15. Cyber ACTS/SAASS: A Second Year of Command and Staff College for the Future Leaders of Our Cyber Forces

    DTIC Science & Technology

    2009-01-01

    objectives. The Air Force is struggling to determine the best way of developing offensive and defensive capabilities for cyber warfare . Our warfighting...education (IDE) cyber warfare program at the Air Force Institute of Technology (AFIT), located at Wright-Patterson AFB, Ohio. I propose that the Air...Force create a two-year professional military education (PME) path consisting of ACSC followed by AFIT’s cyber warfare program, paralleling the current path of ACSC followed by SAASS.

  16. Application of Solid Phase Microextraction with Gas Chromatography-Mass Spectrometry as a Rapid, Reliable, and Safe Method for Field Sampling and Analysis of Chemical Warfare Agent Precursors

    DTIC Science & Technology

    2005-03-01

    in hair samples with analysis by GC-MS [41,42]. The research discussed here examined a polydimethylsiloxane polymer with 10% activated charcoal (PDMS...Field Sampling and Analysis of Chemical Warfare Agent Precursors” Name of Candidate: LT Douglas Parrish Doctor of Philosophy, Environmental...Microextraction with Gas Chromatography-Mass Spectrometry as a Rapid, Reliable, and Safe Method for Field Sampling and Analysis of Chemical Warfare

  17. Liquid Chromatography Electrospray Ionization Mass Spectrometric (LC-ESI-MS) and Desorption Electrospray Ionization Mass Spectrometric (DESI-MS) Identification of Chemical Warfare Agents in Consumer Products

    DTIC Science & Technology

    2007-06-01

    T ACanadaY Approved for PublicR Distribution Uln& Liquid Chromatography Electrospray Ionization Mass Spectrometric ( LC -ESI- MS) and Desorption...consumer products with chemical warfare agents or other toxic chemicals. Liquid chromatography electrospray ionization mass spectrometry ( LC -ESI-MS) and...house LC -ESI-MS and LC -ESI-MS/MS methods were evaluated for the determination of chemical warfare agents in spiked bottled water samples. The

  18. Continuous Acoustic Sensing With an Unmanned Aerial Vehicle System for Anti-Submarine Warfare in a High-Threat Area

    DTIC Science & Technology

    2015-12-01

    strive in multiple warfare areas. This research benefits not only the Navy, through enhancement of offensive warfighting by testing the next...multiple warfare areas. This research benefits not only the Navy, through enhancement of offensive warfighting by testing the next generation of...produce and definitely worth the research and testing to be a positive asset for the Navy. It not only can stay on station for an exponential amount of

  19. Chemical warfare agents

    PubMed Central

    Ganesan, K.; Raza, S. K.; Vijayaraghavan, R.

    2010-01-01

    Among the Weapons of Mass Destruction, chemical warfare (CW) is probably one of the most brutal created by mankind in comparison with biological and nuclear warfare. Chemical weapons are inexpensive and are relatively easy to produce, even by small terrorist groups, to create mass casualties with small quantities. The characteristics of various CW agents, general information relevant to current physical as well as medical protection methods, detection equipment available and decontamination techniques are discussed in this review article. A brief note on Chemical Weapons Convention is also provided. PMID:21829312

  20. Set Up for Failure: The Use of US Security Force Assistance to Prepare Foreign Security Forces for Traditional Combat Operations

    DTIC Science & Technology

    2017-05-17

    Do the SFA lessons drawn from the unconventional warfare focus of the post-9-11 paradigm hold true across the spectrum of conflict, or are there...relevance. Do the SFA lessons drawn from the unconventional warfare focus of the post-9-11 paradigm hold true across the spectrum of conflict, or...traditional warfare is fought changes from epoch to epoch as technology, armament, and other factors change, but certain immutable principles hold true

  1. Defining Islamic Way of Warfare and Its Comparison with Al Qaeda Doctrine

    DTIC Science & Technology

    2012-06-08

    DEFINING ISLAMIC WAY OF WARFARE AND ITS COMPARISON WITH AL QAEDA DOCTRINE A thesis presented to the Faculty of the U.S. Army...subject to any penalty for failing to comply with a collection of information if it does not display a currently valid OMB control number. PLEASE DO...Islamic way of warfare. It is important to understand that anything, to be qualified as Islamic, has to have a reference from the core sources of Islam

  2. What Good Are Warfare Models?

    DTIC Science & Technology

    1981-05-01

    PROFESSIONAL PAPER 306 / May 1981 WHAT GOOD ARE WARFARE MODELS? Thomas E. Anger DTICS E LECTE ,JUN 2198 1 j CENTER FOR NAVAL ANALYSES 81 6 19 025 V...WHAT GOOD ARE WARFARE MODELS? Thomas E. /Anger J Accession For !ETIS GRA&I DTIC TAB thonnounceldŕ 5 By-C Availability Codes iAva il aand/or Di1st...least flows from a life-or-death incenLive to make good guesses when choosing weapons, forces, or strategies. It is not surprising, however, that

  3. Unmanned Warfare: Second and Third Order Effects Stemming from the Afghan Operational Environment between 2001 and 2010

    DTIC Science & Technology

    2011-06-10

    the very nature of warfare took a dramatic step into the future. With new assets capable of remaining airborne for nearly 24 hours and live video ...warfare took a dramatic step into the future. With new assets capable of remaining airborne for nearly 24 hours and live video feeds streaming to...shape the battlefield during protracted combat operations. From the real time video feeds, to the 24 hour coverage of an area of interest, tangible

  4. Space and Naval Warfare Systems Command and Overall Navy Needs to Improve Management of Waiver and Deferral Requests

    DTIC Science & Technology

    2015-10-08

    Management of Waiver and Deferral Requests Visit us at www.dodig.mil Objective Our objective for this audit was to evaluate the Space and Naval Warfare...We conducted this audit in accordance with generally accepted government auditing standards. We considered management comments on a draft of...OFFICIAL USE ON Y Introduction DODIG-2016-003 │ 1 Introduction Objective Our objective for this audit was to evaluate the Space and Naval Warfare

  5. Femoral vessel injuries in modern warfare since Vietnam.

    PubMed

    Pearl, Jonathan P; McNally, Michael P; Perdue, Philip W

    2003-09-01

    The incidence of lower extremity injuries is high in modern warfare; however the mortality rate from these injuries is low. Despite the overall low mortality of lower extremity injuries, many deaths in modern conflicts are due to femoral vessel injury. The modern warfare literature was reviewed. In Somalia, 1 of the 14 reported deaths was due to a laceration of the superficial femoral artery. In the Persian Gulf, three deaths were reported in an Army field hospital, one resulted from uncontrolled hemorrhage from a profunda femoris artery wound and two others resulted from traumatic amputations with consequent major arterial injury. Despite the advances in modern body armor, the groin is left unprotected. A strategy to help minimize U.S. casualties in modern warfare may be a method of field hemostasis specifically designed for femoral vessel injury.

  6. Detection of biological warfare agents using ultra violet-laser induced fluorescence LIDAR

    NASA Astrophysics Data System (ADS)

    Joshi, Deepti; Kumar, Deepak; Maini, Anil K.; Sharma, Ramesh C.

    This review has been written to highlight the threat of biological warfare agents, their types and detection. Bacterial biological agent Bacillus anthracis (bacteria causing the disease anthrax) which is most likely to be employed in biological warfare is being discussed in detail. Standoff detection of biological warfare agents in aerosol form using Ultra violet-Laser Induced Fluorescence (UV-LIF) spectroscopy method has been studied. Range-resolved detection and identification of biological aerosols by both nano-second and non-linear femto-second LIDAR is also discussed. Calculated received fluorescence signal for a cloud of typical biological agent Bacillus globigii (Simulants of B. anthracis) at a location of ˜5.0 km at different concentrations in presence of solar background radiation has been described. Overview of current research efforts in internationally available working UV-LIF LIDAR systems are also mentioned briefly.

  7. Gender differences in the impact of warfare exposure on self-rated health.

    PubMed

    Wang, Joyce M; Lee, Lewina O; Spiro, Avron

    2015-01-01

    This study examined gender differences in the impact of warfare exposure on self-reported physical health. Data are from the 2010 National Survey of Veterans, a nationally representative survey of veterans from multiple eras of service. Regression analyses assessed gender differences in the association between warfare exposure (deployment to a war zone, exposure to casualties) and health status and functional impairment, adjusting for sociodemographics. Women reported better health status but greater functional impairment than men. Among men, those who experienced casualties only or both casualties and deployment to a war zone had worse health compared with those who experienced neither stressor or deployment to a war zone only. Among women, those who experienced casualties only or both stressors reported worse health than those who experienced war zone only, who did not differ from the unexposed. No association was found between warfare exposure and functional impairment in women; in men, however, those who experienced exposure to casualties or both stressors had greater odds of functional impairment compared with those who experienced war zone only or neither stressor. Exposure to casualties may be more predictive of health than deployment to a war zone, especially for men. We did not find a stronger association between warfare exposure and health for women than men. Given that the expansion of women's military roles has allowed them to serve in direct combat, their degree and scope of warfare exposure is likely to increase in the future. Copyright © 2015 Jacobs Institute of Women's Health. All rights reserved.

  8. Gender Differences in the Impact of Warfare Exposure on Self-Rated Health

    PubMed Central

    Wang, Joyce M.; Lee, Lewina O.; Spiro, Avron

    2014-01-01

    BACKGROUND This study examined gender differences in the impact of warfare exposure on self-reported physical health. METHODS Data are from the 2010 National Survey of Veterans, a nationally representative survey of veterans from multiple eras of service. Regression analyses assessed gender differences in the association between warfare exposure (deployment to a war zone, exposure to casualties) and health status and functional impairment, adjusting for sociodemographics. FINDINGS Women reported better health status but greater functional impairment than men. In men, those who experienced casualties only or both casualties and deployment to a war zone had worse health compared to those who experienced neither stressor or deployment to a war zone only. In women, those who experienced casualties only or both stressors reported worse health than those who experienced war zone only, who did not differ from the unexposed. No association was found between warfare exposure and functional impairment in women, but in men, those who experienced exposure to casualties or both stressors had greater odds of functional impairment compared to those who experienced war zone only or neither stressor. CONCLUSIONS Exposure to casualties may be more predictive of health than deployment to a war zone, especially for men. We did not find a stronger association between warfare exposure and health for women than men. Given that the expansion of women's military roles has allowed them to serve in direct combat, their degree and scope of warfare exposure is likely to increase in the future. PMID:25442366

  9. Why people believe they were exposed to biological or chemical warfare: a survey of Gulf War veterans.

    PubMed

    Brewer, Noel T; Lillie, Sarah E; Hallman, William K

    2006-04-01

    The study sought to understand better how people come to believe they have been exposed to biological and chemical warfare. We conducted telephone interviews with 1,009 American veterans (65% response rate) deployed and not deployed to the Gulf War, a conflict during which there were credible threats that such warfare could be used. Only 6% of non-Gulf War veterans reported exposure to biological or chemical warfare, but most of Gulf War veterans reported exposure (64%). The majority of these were unsure whether the exposure was chemical or biological in nature. The most commonly reported exposure indicators were receiving an alert from the military and having physical symptoms. Veterans who were certain of the type of exposure (biological or chemical) were more likely to recall having been told by the military and to recall physical symptoms. Future communications with soldiers and the general public about biological and chemical warfare may need to emphasize the uncertain nature of such risk information. Evaluations of exposure diagnostic technologies should take into account the problem of people initially believing, but not later discounting, false positive results.

  10. Oxidative decontamination of chemical and biological warfare agents using L-Gel.

    PubMed

    Raber, Ellen; McGuire, Raymond

    2002-08-05

    A decontamination method has been developed using a single reagent that is effective both against chemical warfare (CW) and biological warfare (BW) agents. The new reagent, "L-Gel", consists of an aqueous solution of a mild commercial oxidizer, Oxone, together with a commercial fumed silica gelling agent, Cab-O-Sil EH-5. L-Gel is non-toxic, environmentally friendly, relatively non-corrosive, maximizes contact time because of its thixotropic nature, clings to walls and ceilings, and does not harm carpets or painted surfaces. The new reagent also addresses the most demanding requirements for decontamination in the civilian sector, including availability, low maintenance, ease of application and deployment by a variety of dispersal mechanisms, minimal training and acceptable expense. Experiments to test the effectiveness of L-Gel were conducted at Lawrence Livermore National Laboratory and independently at four other locations. L-Gel was tested against all classes of chemical warfare agents and against various biological warfare agent surrogates, including spore-forming bacteria and non-virulent strains of real biological agents. Testing showed that L-Gel is as effective against chemical agents and biological materials, including spores, as the best military decontaminants.

  11. The Cyber Warfare Professional: Realizations for Developing the Next Generation

    DTIC Science & Technology

    2011-01-01

    consequences for the others. However, just as airpower soon emerged as a revolution in military affairs during the early twentieth century, so may cyber warfare become the next revolution for the new millennium.

  12. Textbook of Military Medicine. Part 1. Warfare, Weaponry, and the Casualty. Part 5. Conventional Warfare. Ballistic, Blast, and Burn Injuries

    DTIC Science & Technology

    1991-01-01

    United States. Because the vast majority of our patients are not active -duty military personnel, it may seem that our day-to-day ac- tivities are far... activated . A designated time-delay fuse uses an Source: Reference 8 15 Conventional Warfare: Ballistic, Blast, and Burn Injuries explosion and the...be found embedded and unexploded in tissue. The fuse is located at the tip of the warhead, and is activated and will deionate on contact only after

  13. Encyclopedia of Explosives and Related Items. Volume 10

    DTIC Science & Technology

    1983-01-01

    trinitroethyl stearate 6 E330 Ethyiphosphorodimethylamidycyanadate se Ethyl-substituted acid amides, N-trinitro derivs GA chemical warfare agent 2.C 167; 6...6 GI Galex 6 G8-G9 GA (chemical warfare agent ) 6 G 1 Galil rifle 6 G9 GA see Dimethylaminocyanophosphoric acid Galil rifle 6 G9 5 D1308-D1309 Gabeaud...G45 Gas volumes produced on expln or detonation Gelatina explosiva de guerra 6 G45 of expls 6 G36-G41 Gelatina gomma 6 G45 Gas warfare agents 2 C165

  14. SIGINT, EW, and EIW in the Korean People’s Army: An Overview of Development and Organization

    DTIC Science & Technology

    2005-08-01

    Joseph S. Bermudez Jr. "The basic key to victory in modern warfare is to do well in electronic warfare …" Kim Jong Il96 For many years now the...96 “ Kim Jong Il Stresses Electronic Warfare Capabilities,” Radio P’yongyang, 24 September 1999, as cited in FBIS. Bytes and Bullets... Kim Jong Il98 Details concerning how the MPAF developed this understanding, and how it has organized and planned to conduct SIGINT, EW and EIW

  15. Information Warfare and the Principles of War.

    DTIC Science & Technology

    1997-02-07

    information dominance , control of ’cyberspace’ or the ’Infosphere’ and Information Warfare. Some argue that Information Warfare (IW) is just a repackaging of old concepts and current practices, while others contend it is the next Revolution in Military Affairs (RMA). The question that needs to be addressed is; can IW achieve strategic and operational military objectives on its on merit? A way to answer this questions is to analyze IW against our current doctrine. Using the principles of war as a framework, does IW fit (or can it be employed) in the

  16. Air Force Cyber Warfare: Now and the Future

    DTIC Science & Technology

    2013-10-01

    cyber warfare in popular culture. Most of them focus on the individual s uncanny grasp of technology the ability to exploit any system with a dizzying flurry of keystrokes or to fend off adversaries with a smartphone, a paper clip, and an ingenious plan. These socially awkward heroes and heroines fill the silver screen with visions of a new kind of warfare. Contradicting these stereotypes, Air Force cyber operations are carefully planned and controlled by disciplined, rigorously trained operators. Rather than acting alone, these professionals produce effects in support of

  17. U.S. Army Chemical Corps Historical Studies, Gas Warfare in World War I: The 5th Division Captures Frapelle, August 1918

    DTIC Science & Technology

    1958-03-01

    U. S . ARMY CHEMICAL CORPS HISTORICAL STUDIES GAS WARFARE IN WORLD WAR I THE 5t1h DIVISION CAPTURES FRAPELLF, 00 August 1918 CTD Offce t e Chef Ch mal...j JNSPECrrr / D~iJ f ; t t] GA o WARFARE IN WORLD WAR I By - --------- St ixdy Number 7 t:a . • ’ I : : . .. s U.S. ARMY CHEIICAL CORPS [ist...Analysi s Concerning the Weight of Shell . . . . . . . ... . 38 The Cost of Frapelle . . . . . . . . . . . .. 41 Medical Department Comments

  18. Science, Technology, and Warfare. Proceedings of the Military History Symposium (3rd) Held at the United States Air Force Academy (Colorado Springs, Colorado) on 8-9 May 1969

    DTIC Science & Technology

    1970-09-01

    between science-technology and warfare. The stereotyped theory of a linear relationship between science, technology, and warfare satisfies the facts...therefore discarded piecemeal. Only with Mahan’s theory did this condition change. Morison then considers the opposite problem today: one in which the...1938), 1:531. = A s is now very well known, the impetus theory expounded with variations by all the most important writers on philosophy of motion

  19. Interagency Cooperation for Irregular Warfare at the Combatant Command

    DTIC Science & Technology

    2009-01-01

    Directorate, and the USSOCOM Interagency Task Force ( IATF ) offer examples of JIACGs coping with the issues of IW. Each organization possesses strengths...46 USSOCOM IATF History...Force for Irregular Warfare ( IATF IW).33 EUCOM conducts interagency

  20. A history of biological and chemical warfare and terrorism.

    PubMed

    Malloy, C D

    2000-07-01

    This article provides a brief history of biological warfare and terrorism. It contends that examining disease in history provides public health specialists with the knowledge necessary to improve our surveillance system for potential acts of bioterrorism.

  1. Fluorescent sensors for the detection of chemical warfare agents.

    PubMed

    Burnworth, Mark; Rowan, Stuart J; Weder, Christoph

    2007-01-01

    Along with biological and nuclear threats, chemical warfare agents are some of the most feared weapons of mass destruction. Compared to nuclear weapons they are relatively easy to access and deploy, which makes them in some aspects a greater threat to national and global security. A particularly hazardous class of chemical warfare agents are the nerve agents. Their rapid and severe effects on human health originate in their ability to block the function of acetylcholinesterase, an enzyme that is vital to the central nervous system. This article outlines recent activities regarding the development of molecular sensors that can visualize the presence of nerve agents (and related pesticides) through changes of their fluorescence properties. Three different sensing principles are discussed: enzyme-based sensors, chemically reactive sensors, and supramolecular sensors. Typical examples are presented for each class and different fluorescent sensors for the detection of chemical warfare agents are summarized and compared.

  2. An evolutionary theory of large-scale human warfare: Group-structured cultural selection.

    PubMed

    Zefferman, Matthew R; Mathew, Sarah

    2015-01-01

    When humans wage war, it is not unusual for battlefields to be strewn with dead warriors. These warriors typically were men in their reproductive prime who, had they not died in battle, might have gone on to father more children. Typically, they are also genetically unrelated to one another. We know of no other animal species in which reproductively capable, genetically unrelated individuals risk their lives in this manner. Because the immense private costs borne by individual warriors create benefits that are shared widely by others in their group, warfare is a stark evolutionary puzzle that is difficult to explain. Although several scholars have posited models of the evolution of human warfare, these models do not adequately explain how humans solve the problem of collective action in warfare at the evolutionarily novel scale of hundreds of genetically unrelated individuals. We propose that group-structured cultural selection explains this phenomenon. © 2015 Wiley Periodicals, Inc.

  3. Changing the Scale and Efficiency of Chemical Warfare Countermeasure Discovery Using the Zebrafish

    PubMed Central

    Peterson, Randall T.; MacRae, Calum A.

    2013-01-01

    As the scope of potential chemical warfare agents grows rapidly and as the diversity of potential threat scenarios expands with non-state actors, so a need for innovative approaches to countermeasure development has emerged. In the last few years, the utility of the zebrafish as a model organism that is amenable to high-throughput screening has become apparent and this system has been applied to the unbiased discovery of chemical warfare countermeasures. This review summarizes the in vivo screening approach that has been pioneered in the countermeasure discovery arena, and highlights the successes to date as well as the potential challenges in moving the field forward. Importantly, the establishment of a zebrafish platform for countermeasure discovery would offer a rapid response system for the development of antidotes to the continuous stream of new potential chemical warfare agents. PMID:24273586

  4. Detection of biological warfare agents using ultra violet-laser induced fluorescence LIDAR.

    PubMed

    Joshi, Deepti; Kumar, Deepak; Maini, Anil K; Sharma, Ramesh C

    2013-08-01

    This review has been written to highlight the threat of biological warfare agents, their types and detection. Bacterial biological agent Bacillus anthracis (bacteria causing the disease anthrax) which is most likely to be employed in biological warfare is being discussed in detail. Standoff detection of biological warfare agents in aerosol form using Ultra violet-Laser Induced Fluorescence (UV-LIF) spectroscopy method has been studied. Range-resolved detection and identification of biological aerosols by both nano-second and non-linear femto-second LIDAR is also discussed. Calculated received fluorescence signal for a cloud of typical biological agent Bacillus globigii (Simulants of B. anthracis) at a location of ~5.0 km at different concentrations in presence of solar background radiation has been described. Overview of current research efforts in internationally available working UV-LIF LIDAR systems are also mentioned briefly. Copyright © 2013 Elsevier B.V. All rights reserved.

  5. 77 FR 60679 - Takes of Marine Mammals Incidental to Specified Activities; U.S. Navy Training and Testing...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-10-04

    ...; the Undersea Warfare Training Range; the Key West Range Complex; the Naval Surface Warfare Center... of Protected Resources, National Marine Fisheries Service, 1315 East-West Highway, Silver Spring, MD...

  6. Simulating cyber warfare and cyber defenses: information value considerations

    NASA Astrophysics Data System (ADS)

    Stytz, Martin R.; Banks, Sheila B.

    2011-06-01

    Simulating cyber warfare is critical to the preparation of decision-makers for the challenges posed by cyber attacks. Simulation is the only means we have to prepare decision-makers for the inevitable cyber attacks upon the information they will need for decision-making and to develop cyber warfare strategies and tactics. Currently, there is no theory regarding the strategies that should be used to achieve objectives in offensive or defensive cyber warfare, and cyber warfare occurs too rarely to use real-world experience to develop effective strategies. To simulate cyber warfare by affecting the information used for decision-making, we modify the information content of the rings that are compromised during in a decision-making context. The number of rings affected and value of the information that is altered (i.e., the closeness of the ring to the center) is determined by the expertise of the decision-maker and the learning outcome(s) for the simulation exercise. We determine which information rings are compromised using the probability that the simulated cyber defenses that protect each ring can be compromised. These probabilities are based upon prior cyber attack activity in the simulation exercise as well as similar real-world cyber attacks. To determine which information in a compromised "ring" to alter, the simulation environment maintains a record of the cyber attacks that have succeeded in the simulation environment as well as the decision-making context. These two pieces of information are used to compute an estimate of the likelihood that the cyber attack can alter, destroy, or falsify each piece of information in a compromised ring. The unpredictability of information alteration in our approach adds greater realism to the cyber event. This paper suggests a new technique that can be used for cyber warfare simulation, the ring approach for modeling context-dependent information value, and our means for considering information value when assigning cyber resources to information protection tasks. The first section of the paper introduces the cyber warfare simulation challenge and the reasons for its importance. The second section contains background information related to our research. The third section contains a discussion of the information ring technique and its use for simulating cyber attacks. The fourth section contains a summary and suggestions for research.

  7. Intelligence, Information Technology, and Information Warfare.

    ERIC Educational Resources Information Center

    Davies, Philip H. J.

    2002-01-01

    Addresses the use of information technology for intelligence and information warfare in the context of national security and reviews the status of clandestine collection. Discusses hacking, human agent collection, signal interception, covert action, counterintelligence and security, and communications between intelligence producers and consumers…

  8. 78 FR 22529 - Notice of Intent To Grant Partially Exclusive Patent License; Max-Viz, Inc.

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-04-16

    ... Technology Applications, Space and Naval Warfare Systems Center Pacific, Code 72120, 53560 Hull St, Bldg A33... Technology Applications, Space and Naval Warfare Systems Center Pacific, Code 72120, 53560 Hull St, Bldg A33...

  9. Offensive Cyber Capability: Can it Reduce Cyberterrorism

    DTIC Science & Technology

    2010-12-02

    33 Lech J. Janczewski, and Andrew M. Colarik, eds., Cyber Warfare and Cyber Terrorism (New York: Information Science Reference, 2008...Science and Business Media, 2008. Janczewski, Lech , J. and Andrew M. Colarik, eds., Cyber Warfare and Cyber Terrorism. New York: Information Science

  10. Electronic Warfare and Radar Systems Engineering Handbook

    DTIC Science & Technology

    1999-04-01

    EWRL Electronic Warfare Reprogrammable ELNOT Emitter Library Notation Library (USN) EM Electromagnetic EWSI EW Systems Integration E-Mail Electronic...ram air turbine (RAT) propellers used to power aircraft pods, helicopter rotor blades, and protruding surfaces of automobile hubcaps will all provide

  11. Tissue-based water quality biosensors for detecting chemical warfare agents

    DOEpatents

    Greenbaum, Elias [Oak Ridge, TN; Sanders, Charlene A [Knoxville, TN

    2003-05-27

    A water quality sensor for detecting the presence of at least one chemical or biological warfare agent includes: a cell; apparatus for introducing water into the cell and discharging water from the cell adapted for analyzing photosynthetic activity of naturally occurring, free-living, indigenous photosynthetic organisms in water; a fluorometer for measuring photosynthetic activity of naturally occurring, free-living, indigenous photosynthetic organisms drawn into the cell; and an electronics package that analyzes raw data from the fluorometer and emits a signal indicating the presence of at least one chemical or biological warfare agent in the water.

  12. Exploring the Human Fabric through an Analyst's Eyes

    NASA Astrophysics Data System (ADS)

    Belov, Nadya; Patti, Jeff; Wilcox, Saki; Almanzar, Rafael; Kim, Janet; Kellogg, Jennifer; Dang, Steven

    The nature and type of conflicts drastically changed in the last half of the twentieth century. Wars are no longer limited to the field; they are supplemented with guerrilla warfare and other asymmetric warfare tactics including domestic terrorism. Domestic terrorism has demonstrated a need for improved homeland security capabilities. Establishing and maintaining the understanding of the key players and the underlying social networks is essential to combating asynchronous warfare tactics. Herein, we identify the key challenges addressed by our Collection/Exploitation Decision System (CEDS) that assist analysts in maintaining an up-to-date understanding of dynamic human networks.

  13. Coercive Air Strategy in Post-Cold War Peace Operations

    DTIC Science & Technology

    1999-06-01

    Fariborz L. Mokhtari , ed., Peacemaking, Peacekeeping and Coalition Warfare: The Future Role of the United Nations (Washington, D.C: National Defense...Technical Information Center, 1993. Mokhtari , Fariborz L. ed. “Peacemaking, Peacekeeping and Coalition Warfare: The Future Role of the United Nations

  14. Adaptive Army: Embracing the Concept of Operational Manoeuvre from the Sea

    DTIC Science & Technology

    2010-05-05

    PEACE Source: Headquarters Training Command- Army. Land Warfare Doctrine LWD 3-01: Formation Tactics. Australian Army, November 27, 2003. 27...Amphibious Capability Implementation Team, June 15, 2009. Headquarters Training Comrriand- Army. Land Warfare Doctrine LWD 3-0: Operations. Australian Army

  15. Health-related quality of life of chemical warfare victims: an assessment with the use of a specific tool.

    PubMed

    Biat Saeed, Khaled; Parandeh, Akram; Alhani, Fatemeh; Salaree, Mohammad Mehdi

    2014-02-01

    Exposure to chemical warfare gases significantly changes the quality of life (QoL) of victims and has significant chronic adverse effects. This study sought to assess the health-related QoL (HRQoL) of chemical victims by means of a tool specifically designed for this purpose. The correlation of their QoL with several demographic factors was evaluated as well. In this descriptive cross-sectional study, 120 chemical warfare victims were selected from subjects presenting to selected medical centers in Tehran in 2012 using convenience sampling. Two questionnaires of demographic information and HRQoL of chemical warfare victims (specific tool) were used for data collection. The data were analyzed using SPSS version 20 software (IBM, Armonk, NY, USA). The mean and standard deviation (mean ± SD) of scores obtained by chemical warfare victims in physical, psychosocial and spiritual domains was 39.6 ± 16.5, 42.1 ± 15.2 and 82.4 ± 15.4, respectively. Different age groups showed a significant difference in the psychosocial domain score (P < 0.01). Also, the physical and spiritual domain scores had significant differences with respect to the level of education (P < 0.001). The occupational status showed significant differences in the psychosocial and spiritual domains scores of QoL (P < 0.001). The physical and psychosocial domain scores also accounted for a significant difference with respect to the duration and severity of pulmonary symptoms (P < 0.05). Considering the importance and high value of spirituality in chemical warfare victims, it can be used as strategically for these patients to help them cope with their injury and improve their physical and psychosocial health and QoL.

  16. Intraosseous vascular access in the treatment of chemical warfare casualties assessed by advanced simulation: proposed alteration of treatment protocol.

    PubMed

    Vardi, Amir; Berkenstadt, Haim; Levin, Inbal; Bentencur, Ariel; Ziv, Amitai

    2004-06-01

    Current treatment protocols for chemical warfare casualties assume no IV access during the early treatment stages. Time constraints in mass casualty scenarios, impaired manual dexterity of medical personnel wearing protective gear, and victims' complex clinical presentations render standard IV access techniques impractical. A newly developed spring-driven, trigger-operated intraosseous infusion device may offer an effective solution. Sophisticated simulators were developed and used to mimic scenarios of chemical warfare casualties for assessing the feasibility of intraosseous infusion delivery. We evaluated the clinical performance of medical teams in full protective gear. The success rate in intraosseous insertion, time to completion of treatment goals, and outcome were measured in a simulated setting. Medical teams from major hospitals in Israel, designated for emergency response in a real chemical warfare mass casualty scenario, were trained in a simulated setting. All 94 participating physicians were supplied with conventional treatment modalities: only the 64 study group physicians received intraosseous devices. The simulated survival rate was 73.4% for the study group and 3.3% for the controls (P < 0.001). Treatment goals were achieved within 3.5 min (range, 1-9 min) in the study group and within >10 min for controls (P < 0.001), and the complication rate for intraosseous use was 13.8%. Personnel satisfaction with the intraosseous device was unanimous and high. New-generation intraosseous infusions have great potential value in the early treatment stages of chemical warfare casualties. In a chemical warfare mass casualty scenario, the protective gear worn by medical personnel, the time constraints, and the casualties' medical condition impose limitations on the establishment of IV access during early treatment of the victims. A spring-driven, trigger-operated intraosseous infusion delivery system may offer an effective solution.

  17. Health-Related Quality of Life of Chemical Warfare Victims: An Assessment with the Use of a Specific Tool

    PubMed Central

    Biat Saeed, Khaled; Parandeh, Akram; Alhani, Fatemeh; Salaree, Mohammad Mehdi

    2014-01-01

    Background: Exposure to chemical warfare gases significantly changes the quality of life (QoL) of victims and has significant chronic adverse effects. Objective: This study sought to assess the health-related QoL (HRQoL) of chemical victims by means of a tool specifically designed for this purpose. The correlation of their QoL with several demographic factors was evaluated as well. Patients and Methods: In this descriptive cross-sectional study, 120 chemical warfare victims were selected from subjects presenting to selected medical centers in Tehran in 2012 using convenience sampling. Two questionnaires of demographic information and HRQoL of chemical warfare victims (specific tool) were used for data collection. The data were analyzed using SPSS version 20 software (IBM, Armonk, NY, USA). Results: The mean and standard deviation (mean ± SD) of scores obtained by chemical warfare victims in physical, psychosocial and spiritual domains was 39.6 ± 16.5, 42.1 ± 15.2 and 82.4 ± 15.4, respectively. Different age groups showed a significant difference in the psychosocial domain score (P < 0.01). Also, the physical and spiritual domain scores had significant differences with respect to the level of education (P < 0.001). The occupational status showed significant differences in the psychosocial and spiritual domains scores of QoL (P < 0.001). The physical and psychosocial domain scores also accounted for a significant difference with respect to the duration and severity of pulmonary symptoms (P < 0.05). Conclusions: Considering the importance and high value of spirituality in chemical warfare victims, it can be used as strategically for these patients to help them cope with their injury and improve their physical and psychosocial health and QoL. PMID:24719824

  18. The Aircraft Infrared Measurements Guide

    DTIC Science & Technology

    1983-03-01

    the infrared portion of the electromagnetic spectrum, but should include measure- ments across that portion of the spectrum using optical /electro... optical tech- nology. Comments should be addressed to: Commander/Director Office of Missile Electronic Warfare US Army Electronic Warfare Laboratory ATTN...58 Spatial Radiometer ................................................ 58 Seekers ( Nonimaging

  19. 13. Photocopy of drawing (original in possession of Naval Surface ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    13. Photocopy of drawing (original in possession of Naval Surface Warfare Center Carderock Division, Bethesda, MD) WIND TUNNEL BUILDING, ELEVATIONS, 1941 - Naval Surface Warfare Center, Subsonic Wind Tunnel Building, Bounded by Clara Barton Parkway & McArthur Boulevard, Silver Spring, Montgomery County, MD

  20. 50 CFR 216.274 - Mitigation.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... safe speed. Release of ordnance through cloud cover is prohibited: aircraft must be able to actually... would be used. These aircraft would be capable of flying at the slow safe speeds necessary to enable... patrol aircraft aircrews, and Anti-submarine Warfare (ASW)/Mine Warfare (MIW) helicopter crews shall...

  1. 50 CFR 216.274 - Mitigation.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... safe speed. Release of ordnance through cloud cover is prohibited: aircraft must be able to actually... would be used. These aircraft would be capable of flying at the slow safe speeds necessary to enable... patrol aircraft aircrews, and Anti-submarine Warfare (ASW)/Mine Warfare (MIW) helicopter crews shall...

  2. 50 CFR 216.274 - Mitigation.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... safe speed. Release of ordnance through cloud cover is prohibited: aircraft must be able to actually... would be used. These aircraft would be capable of flying at the slow safe speeds necessary to enable... patrol aircraft aircrews, and Anti-submarine Warfare (ASW)/Mine Warfare (MIW) helicopter crews shall...

  3. Environmental Warfare

    ERIC Educational Resources Information Center

    Barnaby, Frank

    1976-01-01

    Recent discussions at the Conference of the Committee on Disarmament have focused on the use of artificial changes in the environment as a method of warfare. A far more urgent task is development of a specific ban on already available techniques of environmental damage and a general and complete disarmament. (BT)

  4. Contamination source review for Building E5974, Edgewood Area, Aberdeen Proving Ground, Maryland

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Billmark, K.A.; Emken, M.E.; O`Reilly, D.P.

    1995-09-01

    This report documents the results of a contamination source review of Building E5974 at the Aberdeen Proving Ground (APG) in Maryland. The primary mission at APG has been the testing and evaluation of US Army warfare materials. Since its beginning in 1917, the Edgewood Area of APG has been the principal location for chemical warfare agent research, development, and testing in the US. APG was also used for producing chemical warfare agents during both world wars, and it has been a center for the storage of chemical warfare material. An attempt was made to identify and define areas of toxicmore » or hazardous contaminants and to assess the physical condition and accessibility of APG buildings. The information obtained from this review may be used to assist the US Army in planning for the future use or disposition of the buildings. The contamination source review consisted of the following tasks: historical records search, physical inspection, photographic documentation, geophysical investigation, and collection of air samples.« less

  5. The United States and biological warfare: secrets from the early cold war and Korea.

    PubMed

    Bruwer, A

    2001-01-01

    The United States and Biological Warfare is about accusations that the United States resorted to bacteriological warfare at a time of great military stress during the Korean War. In December 1951, the then US Secretary of Defense ordered early readiness for offensive use of biological weapons. Soon afterwards, the North Korean and Chinese armies accused the United States of starting a large-scale biological warfare experiment in Korea. The US State Department denied the accusation. Both parties to the dispute maintain their positions today. The authors spent 20 years researching the accusations in North America, Europe and Japan. They were the first foreigners to be given access to Chinese classified documents. The reader is also introduced to the concept of 'plausible denial', an official US policy which allowed responsible governmental representatives to deny knowledge of certain events. The authors hope that their work will contribute to the understanding of a time when modern war expanded into a new type of violence.

  6. Violence in the prehistoric period of Japan: the spatio-temporal pattern of skeletal evidence for violence in the Jomon period.

    PubMed

    Nakao, Hisashi; Tamura, Kohei; Arimatsu, Yui; Nakagawa, Tomomi; Matsumoto, Naoko; Matsugi, Takehiko

    2016-03-01

    Whether man is predisposed to lethal violence, ranging from homicide to warfare, and how that may have impacted human evolution, are among the most controversial topics of debate on human evolution. Although recent studies on the evolution of warfare have been based on various archaeological and ethnographic data, they have reported mixed results: it is unclear whether or not warfare among prehistoric hunter-gatherers was common enough to be a component of human nature and a selective pressure for the evolution of human behaviour. This paper reports the mortality attributable to violence, and the spatio-temporal pattern of violence thus shown among ancient hunter-gatherers using skeletal evidence in prehistoric Japan (the Jomon period: 13 000 cal BC-800 cal BC). Our results suggest that the mortality due to violence was low and spatio-temporally highly restricted in the Jomon period, which implies that violence including warfare in prehistoric Japan was not common. © 2016 The Author(s).

  7. Violence in the prehistoric period of Japan: the spatio-temporal pattern of skeletal evidence for violence in the Jomon period

    PubMed Central

    Nakao, Hisashi; Tamura, Kohei; Arimatsu, Yui; Nakagawa, Tomomi; Matsumoto, Naoko; Matsugi, Takehiko

    2016-01-01

    Whether man is predisposed to lethal violence, ranging from homicide to warfare, and how that may have impacted human evolution, are among the most controversial topics of debate on human evolution. Although recent studies on the evolution of warfare have been based on various archaeological and ethnographic data, they have reported mixed results: it is unclear whether or not warfare among prehistoric hunter–gatherers was common enough to be a component of human nature and a selective pressure for the evolution of human behaviour. This paper reports the mortality attributable to violence, and the spatio-temporal pattern of violence thus shown among ancient hunter–gatherers using skeletal evidence in prehistoric Japan (the Jomon period: 13 000 cal BC–800 cal BC). Our results suggest that the mortality due to violence was low and spatio-temporally highly restricted in the Jomon period, which implies that violence including warfare in prehistoric Japan was not common. PMID:27029838

  8. Chemical warfare agents. Classes and targets.

    PubMed

    Schwenk, Michael

    2018-09-01

    Synthetic toxic chemicals (toxicants) and biological poisons (toxins) have been developed as chemical warfare agents in the last century. At the time of their initial consideration as chemical weapon, only restricted knowledge existed about their mechanisms of action. There exist two different types of acute toxic action: nonspecific cytotoxic mechanisms with multiple chemo-biological interactions versus specific mechanisms that tend to have just a single or a few target biomolecules. TRPV1- and TRPA-receptors are often involved as chemosensors that induce neurogenic inflammation. The present work briefly surveys classes and toxicologically relevant features of chemical warfare agents and describes mechanisms of toxic action. Copyright © 2017 Elsevier B.V. All rights reserved.

  9. IMS software developments for the detection of chemical warfare agent

    NASA Technical Reports Server (NTRS)

    Klepel, ST.; Graefenhain, U.; Lippe, R.; Stach, J.; Starrock, V.

    1995-01-01

    Interference compounds like gasoline, diesel, burning wood or fuel, etc. are presented in common battlefield situations. These compounds can cause detectors to respond as a false positive or interfere with the detector's ability to respond to target compounds such as chemical warfare agents. To ensure proper response of the ion mobility spectrometer to chemical warfare agents, two special software packages were developed and incorporated into the Bruker RAID-1. The programs suppress interferring signals caused by car exhaust or smoke gases resulting from burning materials and correct the influence of variable sample gas humidity which is important for detection and quantification of blister agents like mustard gas or lewisite.

  10. Development of practical methods for removal of radiological, biological, and chemical contaminants from water supplies. Final report

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Woodward, R.L.; Robeck, G.G.

    1958-06-01

    Laboratory and engineering studies were conducted to determine the design criteria and cost estimated of providing and operating devices to protect against radiological, biological and chemical warfare agents that may contaminate shore based Naval water supplies. Small disposable columns of mixed cation-anion exchange resins will remove the soluble radionuclides enough to suffice for immediate drinking and culinary purposes. Chemical warfare agents are so numerous and varied that it is not feasible to provide a single protective device to cope with them. Chlorination with free available chlorine residuals of 1 mg liter will handle most biological warfare agents.

  11. Protective Garments for Public Officials

    DTIC Science & Technology

    1973-08-01

    Approved for public release; distribution urlimited. U. S. ARMY IAND WARFARE LABORATORY Aberdeen Proving Ground , Maryland 21005 ABSTRACT TThis task has...unlimited. - U. S. ARMY LAND WARFARE LABORATORY .&1 A~ereemProinaGroun~d. Morviarnd 21005 Aberden Pov\\J TECHNICAL REPORT NO. LW j<B0B73 PROTECTIVE

  12. 10. Photocopy of drawing (original in possession of Naval Surface ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    10. Photocopy of drawing (original in possession of Naval Surface Warfare Center Carderock Division, Bethesda, MD) SUPERSONIC WIND TUNNEL BUILDING, GROUND FLOOR PLAN, 1947 - Naval Surface Warfare Center, Supersonic Wind Tunnel Building, Bounded by Clara Barton Parkway & McArthur Boulevard, Silver Spring, Montgomery County, MD

  13. PERMANENCE OF BIOLOGICAL AND CHEMICAL WARFARE AGENTS IN MUNICIPAL SOLID WASTE LANDFILL LEACHATES

    EPA Science Inventory

    The objective of this work is to permit EPA/ORD's National Homeland Security Research Center (NHSRC) and Edgewood Chemical Biological Center to collaborate together to test the permanence of biological and chemical warfare agents in municipal solid waste landfills. Research into ...

  14. Anti-Submarine Warfare (ASW) Capability Transformation: Strategy of Response to Effects Based Warfare

    DTIC Science & Technology

    2011-06-01

    the ROK Cheonan destroyer by a probable PRK submarine. Despite the authoritative findings of an International team that forensically examined the...evidence of the sinking implicating PRK , North Korea continues to maintain its innocence and deny any involvement, especially since there is

  15. Strategic Analysis of Irregular Warfare

    DTIC Science & Technology

    2010-03-01

    the same mathematical equations used by Lanchester .10 Irregular Warfare Theory and Doctrine It is time to develop new analytical methods and models...basis on which to build, similar to what Lanchester provided almost 100 years ago. Figure 9 portrays both Lanchester’s approach and an irregular 17

  16. 14. Photocopy of drawing (original in possession of Naval Surface ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    14. Photocopy of drawing (original in possession of Naval Surface Warfare Center Carderock Division, Bethesda, MD) WIND TUNNEL, FRAMING PLAN, TOP AND BOTTOM, 1941 - Naval Surface Warfare Center, Subsonic Wind Tunnel Building, Bounded by Clara Barton Parkway & McArthur Boulevard, Silver Spring, Montgomery County, MD

  17. WASTE MINIZATION OPPORTUNITY ASSESSMENT: NAVAL UNDERSEA WARFARE ENGINEERING STATION - KEYPORT, WA

    EPA Science Inventory

    This report describes the application of EPA's waste minimization assessment procedures to a torpedo maintenance facility at the Naval Undersea Warfare Engineering Station, Keyport, WA. he assessment focused on the Mark 48 shop and the Mark 46 shop. hese shops service the Mark 48...

  18. The Venus "Shell-over-Star" hieroglyph and Maya warfare: An examination of the interpretation of a Mayan symbol

    NASA Astrophysics Data System (ADS)

    Voit, Claudia Ann

    For decades, Maya scholars have associated the Mayan "Shell-Star" (also referred to as "Star-War") hieroglyph with Maya warfare. Put forward by scholars such as Floyd Lounsbury and David Kelley, and later advanced by Linda Schele, David Freidel, Ian Graham, Peter Matthews, Anthony Aveni and others, there are now dozens of published articles and chapters relating the hieroglyph to Venus and warfare. Venus is one of the most notable celestial objects outside of the Sun and Moon and was highly visible to the inhabitants of the Maya world. The Dresden Codex (an astronomical almanac) contains important information about the planet Venus, and the calendar section was deciphered by the librarian and mathematician, Ernst Förstemann in the late 1800s. In his decipherment, he deduced that the numbers contained in the tables must be connected to the orbital period of the planet. There is no other planet with the same orbital period 3 as Venus. Förstemann suggested that the decoded astronomy tables were used by the Maya to determine when to wage war. This interpretation, along with others, like Floyd Lounsbury`s study of Venus and the Long Count date at Bonampak were the seeds that have led to methodological errors that first began to take root in Maya research. The idea of the Venus association with warfare took hold and continues to propagate. Many scholars continue to assert that the "shell-star" glyph is related to warfare events. Others, like Gerardo Aldana, and Stanley Guenter, have recently come forward to reexamine and question the hieroglyph and its relationship, if any, to Maya warfare. I suggest, further, that methodological errors may have occurred along the way. I propose that these errors include data lost in translation, and inaccurate translations. In addition, the statistical analysis of Venus cycles has weak points. If this identification of the errors is correct, we need to re-evaluate the weakened foundation on which we are building our assertions about the role of Venus in Maya warfare. In this work, I examine the initial and subsequent interpretations of the Mayan "shell-star" hieroglyph, a symbol that has begun to generate an increasing amount of discussion among Mayan scholars over the last several years. In addition, I discuss new arguments (like that of Gerardo Aldana) regarding the role of Venus in Maya warfare. Finally, I would like to provide some suggestions for future research regarding this subject.

  19. [Perspectives in the treatments of poisonings by organophosphorus insecticides and warfare nerve agents].

    PubMed

    Sogorb-Sánchez, M A; Vilanova-Gisbert, E; Carrera-González, V

    Organophosphorus compounds are worldwide employed as insecticides and are yearly responsible of several millions of poisonings. The chemical structure of most of the warfare nerve agents also corresponds with an organophosphorus compound. Organophosphorus insecticides and warfare nerve agents exert their main toxicological effects through inhibition of acetylcholinesterase. Current treatments of patients poisoned with organophosphorus compounds include atropine (in order to protect muscarinic receptors), oximes (in order to accelerate the reactivation of the inhibited acetylcholinesterase) and benzodiazepines (in order to avoid convulsions). The administration of phosphotriesterases (enzymes involved in the detoxication of organophosphorus compounds through hydrolysis) is a very effective treatment against poisonings by organophosphorus insecticides and warfare nerve agents. There are experimental preventive treatments based on the simultaneous administration of carbamates and certain antimuscarinic drugs, different from atropine, which notably improve the efficacy of the classical treatments applied after poisonings by warfare nerve agents. The treatments based in the administration of phosphotriesterases might be the response to the call of the World Health Organization for searching new treatments with capability to reduce the high mortality recorded in the cases of poisonings by organophosphorus compounds. These treatments can be applied in a preventive way without the intrinsic neurotoxicity associated to the preventive treatments based on carbamates and antimuscarinic drugs. Therefore, these treatments are specially interesting for people susceptible to suffer severe exposures, i.e. sprayers in the farms.

  20. The Age of Irregular Warfare: So What?

    DTIC Science & Technology

    2010-01-01

    Lynne Rienner, 2002), and Michael Vlahos , Fighting Identity: Sacred War and World Change (Westport, CT: Praeger Security Interna- tional, 2009). 7...the forms that warfare will take.” 8 I agree with Michael Vlahos that we poten- tially make matters worse by using the image of a triangle to depict

  1. IW Cyberlaw. The Legal Issues of Information Warfare

    DTIC Science & Technology

    1999-01-01

    actions. The Information Warfare Center at Kelly AFB, Texas, casts a wide net in its definition of information war- fare. Its view is that... Maura T. McGowan, in an unpublished study en- titled “Law of Armed Conflict” (Colorado Springs, Colo.: United States Air Force Academy, Department of

  2. Defining Deterrence in Cyberspace Working Toward a Framework to Integrate Cyber Deterrence

    DTIC Science & Technology

    2011-04-01

    The goal of deterrence is not to deter the use of a particular weapon. Rather, a nation deters undesirable behavior. Cyber warfare can produce three...associated limitations will not produce a strategically decisive result. Cyber warfare must be used in conjunction with other instruments of power to

  3. Defense Standardization Program Journal, April/Jun 2007

    DTIC Science & Technology

    2007-06-01

    Delivers Far-Reaching Standardization 9 Air Force Cyber Warfare Training 14 DMSMS Working Group Reaches Out to Programs 18 An Effects-Based Metrics...defend- ers their first 10 cyber warfare combat "sorties" and prepared them for net- work crew positions. Four MAJCOMs participated in BD 2002.The Air

  4. Models, Analysis, and Recommendations Pertaining to the Retention of Naval Special Warfare s Mid-Level Officers

    DTIC Science & Technology

    2013-12-01

    The Analytic Hierarch/Network Process,” in Rev. R. Acad. Cien. Serie A. Mat (RACSAM), submitted by Francisco Javier Giron (Real Academia de Ciencias ...Academia de Ciencias : Spain. Scott, Nathan. Naval Special Warfare Officer Retention Survey. Monterey, CA: NPS Press, September 2013. Whittenberger

  5. 12. Photocopy of drawing (original in possession of Naval Surface ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    12. Photocopy of drawing (original in possession of Naval Surface Warfare Center Carderock Division, Bethesda, MD) SUPERSONIC WIND TUNNEL, STEEL VACUUM SPHERE, FOUNDATION PLAN, ELEVATION AND DETAILS, 1947 - Naval Surface Warfare Center, Supersonic Wind Tunnel Building, Bounded by Clara Barton Parkway & McArthur Boulevard, Silver Spring, Montgomery County, MD

  6. 23. Photocopy of drawing (original in possession of Naval Surface ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    23. Photocopy of drawing (original in possession of Naval Surface Warfare Center Carderock Division, Bethesda, MD) 7 X 10 FOOT SONIC WIND TUNNEL, FAN HOUSING ASSEMBLY, 1952 - Naval Surface Warfare Center, Transonic Wind Tunnel Building, Bounded by Clara Barton Parkway & McArthur Boulevard, Silver Spring, Montgomery County, MD

  7. 9. Photocopy of photograph (original photograph in the collection of ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    9. Photocopy of photograph (original photograph in the collection of Naval Surface Warfare Center Carderock Division, Bethesda, MD) VIEW SOUTH, SUPERSONIC WIND TUNNEL TEST SECTION, ca 1950 - Naval Surface Warfare Center, Supersonic Wind Tunnel Building, Bounded by Clara Barton Parkway & McArthur Boulevard, Silver Spring, Montgomery County, MD

  8. 10. Photocopy of photograph (original photograph in the collection of ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    10. Photocopy of photograph (original photograph in the collection of Naval Surface Warfare Center Carderock Division, Bethesda, MD) VIEW SOUTHWEST, SUBSONIC WIND TUNNEL BUILDING, 1943 - Naval Surface Warfare Center, Subsonic Wind Tunnel Building, Bounded by Clara Barton Parkway & McArthur Boulevard, Silver Spring, Montgomery County, MD

  9. 19. Photocopy of drawing (original In possession of Naval Surface ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    19. Photocopy of drawing (original In possession of Naval Surface Warfare Center Carderock Division, Bethesda, MD) 7 X 10 FOOT SONIC WIND TUNNEL PLOT AND GRADING PLAN, 1952 - Naval Surface Warfare Center, Transonic Wind Tunnel Building, Bounded by Clara Barton Parkway & McArthur Boulevard, Silver Spring, Montgomery County, MD

  10. 21. Photocopy of drawing (original in possession of Naval Surface ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    21. Photocopy of drawing (original in possession of Naval Surface Warfare Center Carderock Division, Bethesda, MD) 7 X 10 FOOT SONIC WIND TUNNEL, LABORATORY AND OFFICE BUILDING, 1950 - Naval Surface Warfare Center, Transonic Wind Tunnel Building, Bounded by Clara Barton Parkway & McArthur Boulevard, Silver Spring, Montgomery County, MD

  11. 12. Photocopy of drawing (original in possession of Naval Surface ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    12. Photocopy of drawing (original in possession of Naval Surface Warfare Center Carderock Division, Bethesda, MD) WIND TUNNEL BUILDING, FIRST FLOOR PLAN, NOTE OPEN SHOP, 1941 - Naval Surface Warfare Center, Subsonic Wind Tunnel Building, Bounded by Clara Barton Parkway & McArthur Boulevard, Silver Spring, Montgomery County, MD

  12. 11. Photocopy of drawing (original in possession of Naval Surface ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    11. Photocopy of drawing (original in possession of Naval Surface Warfare Center Carderock Division, Bethesda, MD) SUPERSONIC WIND TUNNEL BUILDING, SECTIONS AND DETAILS, MECHANICAL, 1947 - Naval Surface Warfare Center, Supersonic Wind Tunnel Building, Bounded by Clara Barton Parkway & McArthur Boulevard, Silver Spring, Montgomery County, MD

  13. 11. Photocopy of photograph (original photograph In the collection of ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    11. Photocopy of photograph (original photograph In the collection of Naval Surface Warfare Center Carderock Division, Bethesda, MD) VIEW NORTHEAST, INTERIOR, SUBSONIC WIND TUNNEL FAN ASSEMBLY, 1943 - Naval Surface Warfare Center, Subsonic Wind Tunnel Building, Bounded by Clara Barton Parkway & McArthur Boulevard, Silver Spring, Montgomery County, MD

  14. New Developments in Chinese Strategic Psychological Warfare

    DTIC Science & Technology

    2005-01-01

    Taoism , which coupled hardness with softness in warfare, was not the only influence on the theory of psychological operations in ancient China. Other...portraying Islamic martyrs who appear to speak to soldiers from the clouds.38 In contemporary wars, such as the Gulf War, the first targets attacked have

  15. Conquest from Within: A Comparative Analysis between Soviet Active Measures and United States Unconventional Warfare Doctrine

    DTIC Science & Technology

    2015-05-27

    irregular threats. Unconventional Warfare (UW), traditionally a Special Operations Forces core activity, has served U.S. strategic interests in a variety...Special Operations Forces core activity, has served U.S. strategic interests in a variety of operational environments. Throughout the Cold War, the

  16. Binding of chemical warfare agent simulants as guests in a coordination cage: contributions to binding and a fluorescence-based response.

    PubMed

    Taylor, Christopher G P; Piper, Jerico R; Ward, Michael D

    2016-05-07

    Cubic coordination cages act as competent hosts for several alkyl phosphonates used as chemical warfare agent simulants; a range of cage/guest structures have been determined, contributions to guest binding analysed, and a fluorescent response to guest binding demonstrated.

  17. Al Qaeda and Fourth Generation Warfare as its Strategy

    DTIC Science & Technology

    2008-01-01

    and materia ~ as well as money, from one point ofthe non- linear battlefield to another, thereby giving more flexibility to obtain the right materials...translated by Griffith, Samuel B., On Guerilla Warfare, (1937),21-22. 14 Bodansky, Yossef, Bin Laden The Man Who Declared War on America (Rocklin: Prima

  18. Portable Sensor for Chemical Nerve Agents and Organophosphorus Compounds

    DTIC Science & Technology

    2015-08-18

    as pesticides in crop, livestock, and poultry products and as chemical and biological warfare agents. As a result of the high toxicity and the...agents have been exploited for use as pesticides in crop, livestock, and poultry products and as chemical and biological warfare agents. As a result of

  19. Prognostication: Do the Services See the Same Future of Warfare?

    DTIC Science & Technology

    2008-05-01

    conduct of war, warfare. 24 Dana Johnson, Scott Pace, C. Bryan Gabbard , Space: Emerging Options for National Power, (RAND, 1998), 10. 25 Creveld, 145...Bryan Gabbard . Space: Emerging Options for National Power, RAND http://www.rand.org/pubs/monograph_reports/MR517/, 1998. (Accessed 5 January 2008

  20. Integrated Biological Warfare Technology Platform (IBWTP). Intelligent Software Supporting Situation Awareness, Response, and Operations

    DTIC Science & Technology

    2007-01-01

    15 4.2.3. Users of Systems for Combating Biological Warfare ................................ 16 4.2.4...21 4.3.1. Existing Biosurveillance Systems .............................................................. 22 4.3.2. Automatic Integration...74 6.4.4. Multi-Agent System Management System (MMS).................................... 75 6.4.5. Agent Glossary

  1. The Role of the National Guard in Homeland Security

    DTIC Science & Technology

    2007-05-01

    Fulcrum Publishing, 1996), 19. 22Ibid., 20. 23Thomas Andrew Bailey and Paul B. Ryan, The Lusitania Disaster: An Episode in Modern Warfare and...Bailey, Thomas Andrew, and Paul B. Ryan. The Lusitania Disaster: An Episode in Modern Warfare and Diplomacy. New York, NY: Free Press, 1975. Ball

  2. Role of Reconnaissance in the Counterattack.

    DTIC Science & Technology

    2016-05-26

    Bejing: Foreign Language Press, 1967), 107. Sun - Tzu , The Art of Warfare, translated by Robert Ames (New York: Ballantine Books, 1993), 113. 14 B.H...dhat: qissat hayati. Cairo, Egypt: al-Maktab al-Misri al-Hadith, 1985. Sun - Tzu . The Art of Warfare. Translated by Robert Ames. New York: Ballantine...39 Bibliography

  3. The Decline of Air Assault Operations

    DTIC Science & Technology

    2016-05-26

    Anthology (Carlisle Barracks: US Army War College, 2000), 6-7. 94 Clausewitz, 198; Sun Tzu , The Art of Warfare, trans. Robert Ames (New York...Encyclopedia of World War II. Santa Barbara: ABC-CLIO, 2004. Tzu , Sun . The Art of Warfare. Trans. Robert Ames. New York: Ballentine Books, 1993. 55... Bibliography ...................................................................................................................................51 iv

  4. 15. Photocopy of drawing (original in possession of Naval Surface ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    15. Photocopy of drawing (original in possession of Naval Surface Warfare Center Carderock Division, Bethesda, MD) WIND TUNNEL, ELEVATIONS E-E TO H-H AND SECTIONS, 1941 - Naval Surface Warfare Center, Subsonic Wind Tunnel Building, Bounded by Clara Barton Parkway & McArthur Boulevard, Silver Spring, Montgomery County, MD

  5. Tissue-based standoff biosensors for detecting chemical warfare agents

    DOEpatents

    Greenbaum, Elias; Sanders, Charlene A.

    2003-11-18

    A tissue-based, deployable, standoff air quality sensor for detecting the presence of at least one chemical or biological warfare agent, includes: a cell containing entrapped photosynthetic tissue, the cell adapted for analyzing photosynthetic activity of the entrapped photosynthetic tissue; means for introducing an air sample into the cell and contacting the air sample with the entrapped photosynthetic tissue; a fluorometer in operable relationship with the cell for measuring photosynthetic activity of the entrapped photosynthetic tissue; and transmitting means for transmitting analytical data generated by the fluorometer relating to the presence of at least one chemical or biological warfare agent in the air sample, the sensor adapted for deployment into a selected area.

  6. Chemical-warfare techniques for insect control: insect 'pests' in Germany before and after World War I.

    PubMed

    Jansen, S

    2000-01-01

    During World War I, chemical-warfare practices were introduced into economic entomology in Germany. Fritz Haber, 'the father of chemical warfare', realized that Germany could not win the war and thus looked for 'civilian' uses for his chemical arsenal. Before the war, there was a rhetoric of dangerous 'masses' of insects but the large-scale techniques needed to deal with them had not been developed. The gap between rhetoric and practices enabled entomology to integrate chemical weapons into its working methods. This article traces transformations in the ways of seeing insects and their control from the mid-nineteenth century to after World War I.

  7. The Entomological Institute of the Waffen-SS: evidence for offensive biological warfare research in the third Reich.

    PubMed

    Reinhardt, Klaus

    2013-12-01

    In January 1942, Heinrich Himmler, head of the Schutzstaffel (SS) and police in Nazi Germany, ordered the creation of an entomological institute to study the physiology and control of insects that inflict harm to humans. Founded in the grounds of the concentration camp at Dachau, it has been the focus of previous research, notably into the question of whether it was involved in biological warfare research. This article examines research protocols by the appointed leader Eduard May, presented here for the first time, which confirm the existence of an offensive biological warfare research programme in Nazi Germany. Copyright © 2013 Elsevier Ltd. All rights reserved.

  8. Immobilization of Enzymes in Nanoporous Host Materials: A Nanobiotechnological Approach to Decontamination and Demilitarization of Chemical and Biological Warfare Agents

    DTIC Science & Technology

    2002-05-06

    Organophosphorus compounds (OPs) are highly toxic and found extensive use as pesticides , insecticides and potential chemical warfare (CW) agents . Recently...commonly used substrate, the serine protease inhibitor diisopropyl fluorophosphates (DFP), and different fluoride-containing G-type nerve agents such as...

  9. Joint Command and Control of Cyber Operations: The Joint Force Cyber Component Command (JFCCC)

    DTIC Science & Technology

    2012-05-04

    relies so heavily on complex command and control systems and interconnectivity in general, cyber warfare has become a serious topic of interest at the...defensive cyber warfare into current and future operations and plans. In particular, Joint Task Force (JTF) Commanders must develop an optimum method to

  10. 21st Century Cyber Security: Legal Authorities and Requirements

    DTIC Science & Technology

    2012-03-22

    Cyber warfare has risen to the level of strategic effect. Exigent threats in cyberspace are a critical U.S. strategic vulnerability for which U.S...operations cross many sections of United States Code. But, they have not yielded a genuine whole-of-government approach. This SRP argues that cyber warfare has

  11. Defending a New Domain: The Pentagon’s Cyberstrategy

    DTIC Science & Technology

    2010-01-01

    mentali.tT will not work. The United States cannot retreat behind a Maginot Line offire- wttlls or it will risk being overrun. Cyber - warfare is like...provides a dear and accountable way to marshal cyber - warfare resources from across tl~e military. A single chain of command runs f’rom the U.S

  12. Rethinking Cultural Influences on Warfare

    DTIC Science & Technology

    2012-05-17

    36 Jarole B. Manheim, Richard C. Lars Willnat, and Craig Brians , Empirical Political...Willnat, and Craig Brians , Empirical Political Analysis: Quantitative and Qualitative Research Methods (New York: Pearson Education Inc, 2008... Boxer Rebellions. In 1950, China was emerging from 13 years of protracted warfare with Japan and a civil war between the Chinese Communist Party (CCP

  13. 20. Photocopy of drawing (original in possession of Naval Surface ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    20. Photocopy of drawing (original in possession of Naval Surface Warfare Center Carderock Division, Bethesda, MD) 7 X 10 FOOT SONIC WIND TUNNEL FIRST FLOOR PLANS AND DETAILS, 1948 - Naval Surface Warfare Center, Transonic Wind Tunnel Building, Bounded by Clara Barton Parkway & McArthur Boulevard, Silver Spring, Montgomery County, MD

  14. 22. Photocopy of drawing (original in possession of Naval Surface ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    22. Photocopy of drawing (original in possession of Naval Surface Warfare Center Carderock Division, Bethesda, MD) 7 X 10 FOOT SONIC WIND TUNNEL, INSTALLATION OF POWER EQUIPMENT AND ACCESSORIES, 1950 - Naval Surface Warfare Center, Transonic Wind Tunnel Building, Bounded by Clara Barton Parkway & McArthur Boulevard, Silver Spring, Montgomery County, MD

  15. Canada’s Army and the Concept of Maneuver Warfare: The Legacy of the Twentieth Century (1899-1998)

    DTIC Science & Technology

    2002-01-01

    comprehensiveness and authenticity. Canadian operational experience in peace and war over the last century has been characterized by: static warfare; attrition; lack...2 THE BOER WAR (1899 - 1901) .............................................................................................5...PRELUDE TO WORLD WAR I (1902 - 1913) ........................................................................8 WORLD WAR ONE (1914 - 1918

  16. Above the Influence: The Strategic Effects of Airpower in Irregular Warfare

    DTIC Science & Technology

    2010-06-01

    INDOCHINA. . . . . . . . . . . . . . . . . . . . . 105 APPENDIX B: MAP OF LAOS . . . . . . . . . . . . . . . . . . . . . . . . . . . 106 APPENDIX...perspectives. These perspectives involve the use of airpower in North Vietnam, South Vietnam, and Laos . The overarching political endstate or...Nagl, ―Principles, Imperatives, and Paradoxes of Counterinsurgency,‖ 50; Mao Tse -Tung, Problems of Strategy in Guerrilla Warfare, 215-216; Gray

  17. 75 FR 20828 - Availability for Non-Exclusive, Exclusive, or Partially Exclusive Licensing of U.S. Patent...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-04-21

    ... all types of harmful chemicals, specifically chemical warfare agents (CWAs). The topical skin protectant offers a barrier property and an active moiety that serves to neutralize chemical warfare agents...: Department of the Army, DoD. ACTION: Notice. SUMMARY: Announcement is made of the availability for licensing...

  18. 78 FR 63971 - Notice of Availability of Record of Decision for Outdoor Research, Development, Test and...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-10-25

    ... Outdoor Research, Development, Test and Evaluation Activities at Naval Surface Warfare Center, Dahlgren Division, Dahlgren, VA AGENCY: Department of the Navy, DoD. ACTION: Notice. SUMMARY: The Department of the... proposed action, announces its decision to expand the Naval Surface Warfare Center, Dahlgren Division's...

  19. 78 FR 55326 - Determinations Regarding Use of Chemical Weapons in Syria Under the Chemical and Biological...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-09-10

    ... DEPARTMENT OF STATE [Public Notice 8460] Determinations Regarding Use of Chemical Weapons in Syria Under the Chemical and Biological Weapons Control and Warfare Elimination Act of 1991 AGENCY: Bureau of...(d) of the Chemical and Biological Weapons Control and Warfare Elimination Act of 1991, as amended...

  20. 75 FR 58373 - Notice of Intent To Grant Exclusive Patent License; DQE, Inc.

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-09-24

    ... objections are to be filed with Naval Surface Warfare Center, Crane Division, Code OOL, Bldg 2, 300 Highway 361, Crane, IN 47522-5001. FOR FURTHER INFORMATION CONTACT: Mr. Christopher Monsey, Naval Surface Warfare Center, Crane Division, Code OOL, Bldg 2, 300 Highway 361, Crane, IN 47522-5001, telephone 812-854...

  1. 77 FR 14508 - Notice of Availability of Government-Owned Inventions; Available for Licensing

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-03-12

    ... launching device). ADDRESSES: Written objections are to be filed with Naval Surface Warfare Center, Crane Div, Code OOL, Bldg 2, 300 Highway 361, Crane, IN 47522-5001. FOR FURTHER INFORMATION CONTACT: Mr. Christopher Monsey, Naval Surface Warfare Center, Crane Div, Code OOL, Bldg 2, 300 Highway 361, Crane, IN...

  2. 77 FR 5242 - Notice of Availability of Government-Owned Invention; Available for Licensing

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-02-02

    ... weapon mount). ADDRESSES: Written objections are to be filed with Naval Surface Warfare Center, Crane Div, Code OOL, Bldg 2, 300 Highway 361, Crane, IN 47522-5001. FOR FURTHER INFORMATION CONTACT: Mr. Christopher Monsey, Naval Surface Warfare Center, Crane Div, Code OOL, Bldg 2, 300 Highway 361, Crane, IN...

  3. Public Discussion of Nuclear Warfare: A Time for Hope.

    ERIC Educational Resources Information Center

    Cooper, Martha

    Anti-nuclear discourse, which peaked in 1981-82, signaled an emergence of public discourse on the nuclear warfare issue. During the development of the original atomic bomb, public discussion of the issue was severely restricted, but immediately after the bombing of Hiroshima and Nagasaki, discourse on the subject increased. During the Cold War…

  4. Defending the Borderland: Ukrainian Military Experiences with IO, Cyber, and EW

    DTIC Science & Technology

    2017-12-01

    31 Tactical Information Operations...seeks to understand the current state of hybrid warfare in Ukraine with a particular emphasis on the use of Information Operations (IO), Electronic...understanding of the conditions that enabled this style of warfare and how Russia has exploited those conditions in Ukraine will serve to inform

  5. An Empirical Examination of the Warfare Metaphor with Respect to Pre-Service Elementary Teachers

    ERIC Educational Resources Information Center

    Cobern, William W.; Loving, Cathleen C.; Davis, Edward B.; Terpstra, Jeff

    2013-01-01

    Since its origination in the late nineteenth century, the warfare metaphor has been used to characterize the relationship between science and religion, especially orthodox Christianity. Though thoroughly discredited by historians of science, the ideological descendants of Thomas Huxley, who spoke of science in quasi-religious terms, have kept the…

  6. Nuclear Arms and National Security. 1983 National Issues Forum.

    ERIC Educational Resources Information Center

    Melville, Keith, Ed.

    Appropriate for secondary school social studies, this booklet outlines approaches for dealing with the threat of nuclear warfare in six sections. The first section, "Learning to Live with Nuclear Weapons," introduces the topic and considers what can be done to decrease the risk of nuclear warfare without jeopardizing the nation's security. "Arms…

  7. Unmanned Systems In Integrating Cross domain Naval Fires

    DTIC Science & Technology

    2016-06-01

    requirement for the battery . Lithium - Ion batteries have the remarkable characteristic of high energy density. A Lithium -Sulphur-Dioxide battery can...163 xi LIST OF FIGURES Figure 1. NPS Warfare Innovation Continuum...during the Warfare Innovation Workshop during Enrichment Week, September 2015. This four-day forum brought together students and faculty, defense

  8. Joint Operations

    DTIC Science & Technology

    2006-09-17

    the GCC must evaluate the need for force protection support following the guidelines of DOD Instruction 3020.41, Contractor Personnel Authorized to...EA electronic attack EM electromagnetic EP emergency preparedness EW electronic warfare FCC functional combatant commander FDO flexible deterrent...their primary destructive mechanism (lasers, radio frequency weapons, particle beams). b. electronic protection. That division of electronic warfare

  9. Waste minimization opportunity assessment: Naval Undersea Warfare Engineering Station, Keyport, Washington. Project summary

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    NONE

    The Environmental Protection Agency (EPA) has developed a systematic approach to identify, select and implement options to reduce or eliminate hazardous waste. The report describes the application of the waste minimization assessment procedures to a torpedo maintenance facility at the Naval Undersea Warfare Engineering Station in Keyport, WA (NUWES Keyport).

  10. The Future of Amphibious Operations: Shaping the Expeditionary Strike Group to Fight in the Joint Task Force

    DTIC Science & Technology

    2010-02-01

    1 Charles E. Wilhelm, Expeditionary Warfare.marine corps gazette, 79(6), 28-30. Retrieved October 15, 2009, from Career and Technical Education . (Document...Expeditionary warfare.marine corps gazette, 79(6), 28- 30. Retrieved October 15, 2009, from Career and Technical Education . (Document ID: 4455650

  11. Conventional Warfare and United States Military Involvement in Latin America: Early Adolescents' Views.

    ERIC Educational Resources Information Center

    Roscoe, Bruce; And Others

    1988-01-01

    Assessed adolescents' views concerning conventional war and compared views to those of adolescents 15 years ago. Surveyed 362 seventh graders regarding conventional warfare and United States military involvement in Latin America. Compared to adolescents in 1971, adolescents in 1986 were somewhat more accepting of war. Many were skeptical of…

  12. Surface Warfare. Mainstreaming, Mine Warfare. May/June 1998, Vol. 23, No. 3

    DTIC Science & Technology

    1998-06-01

    grappling with a paper tiger. Nor is it a fleeting thought process — some- thing heard in briefings and filed away in the warrior’s subconscious ...tecting device designed to work with the Quickstrike series of bottom mines. This new TDD can be reprogrammed to enable the Quickstrike mines to

  13. A SAFE AND RAPID METHOD FOR BIOLOGICAL AND CHEMICAL DECONTAMINATION OF BUILDINGS AND EQUIPMENT USING THE TERRACAP™ CB DECON SYSTEM - PHASE I

    EPA Science Inventory

    Today’s world and political climate lends itself to potential attacks by hostile forces and terrorists where both exterior and interior surfaces of vehicles, buildings, or equipment could become contaminated with biological warfare (BW) or chemical warfare (CW) agents. R...

  14. Multifunctional ultra-high vacuum apparatus for studies of the interactions of chemical warfare agents on complex surfaces

    NASA Astrophysics Data System (ADS)

    Wilmsmeyer, Amanda R.; Gordon, Wesley O.; Davis, Erin Durke; Mantooth, Brent A.; Lalain, Teri A.; Morris, John R.

    2014-01-01

    A fundamental understanding of the surface chemistry of chemical warfare agents is needed to fully predict the interaction of these toxic molecules with militarily relevant materials, catalysts, and environmental surfaces. For example, rules for predicting the surface chemistry of agents can be applied to the creation of next generation decontaminants, reactive coatings, and protective materials for the warfighter. Here, we describe a multifunctional ultra-high vacuum instrument for conducting comprehensive studies of the adsorption, desorption, and surface chemistry of chemical warfare agents on model and militarily relevant surfaces. The system applies reflection-absorption infrared spectroscopy, x-ray photoelectron spectroscopy, and mass spectrometry to study adsorption and surface reactions of chemical warfare agents. Several novel components have been developed to address the unique safety and sample exposure challenges that accompany the research of these toxic, often very low vapor pressure, compounds. While results of vacuum-based surface science techniques may not necessarily translate directly to environmental processes, learning about the fundamental chemistry will begin to inform scientists about the critical aspects that impact real-world applications.

  15. Contamination source review for Building E5978, Edgewood Area, Aberdeen Proving Ground, Maryland

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Mosqueda, G.; Dougherty, J.; Draugelis, A.K.

    1995-09-01

    This report documents the results of a contamination source review of Building E5978 at the Aberdeen Proving Group (APG) in Maryland. The primary mission at APG has been the testing and evaluation of US Army warfare materials. Since its beginning in 1917, the Edgewood Area of APG has been the principal location for chemical warfare agent research, development, and testing in the US. APG was also used for producing chemical warfare agents during both world wars, and it has been a center for the storage of chemical warfare material. An attempt was made to identify and define areas of toxicmore » or hazardous contaminants and to assess the physical condition and accessibility of APG buildings. The information obtained from this review may be used to assist the US Army in planning for the future use or disposition of the buildings. The contamination source review consisted of the following tasks: historical records search, physical inspection, photographic documentation, geophysical investigation, and collection of air samples for the presence of volatile organic compounds.« less

  16. Contamination source review for Building E3641, Edgewood Area, Aberdeen Proving Ground, Maryland

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Zellmer, S.D.; Draugelis, A.K.; Rueda, J.

    1995-09-01

    This report documents the results of a contamination source review of Building E3641 at the Aberdeen Proving Ground (APG) in Maryland. The primary mission at APG has been the testing and evaluation of US Army warfare materials. Since its beginning in 1917, the Edgewood Area of APG has been the principal location for chemical warfare agent research, development, and testing in the US. APG was also used for producing chemical warfare agents during both world wars, and it has been a center for the storage of chemical warfare material. An attempt was made to identify and define areas of toxicmore » or hazardous contaminants and to assess the physical condition and accessibility of APG buildings. The information obtained from this review may be used to assist the US Army in planning for the future use or disposition of the buildings. The contamination source review consisted of the following tasks: historical records search, physical inspection, photographic documentation, geophysical investigation, and review of available records regarding underground storage tanks associated with each building.« less

  17. Multifunctional ultra-high vacuum apparatus for studies of the interactions of chemical warfare agents on complex surfaces.

    PubMed

    Wilmsmeyer, Amanda R; Gordon, Wesley O; Davis, Erin Durke; Mantooth, Brent A; Lalain, Teri A; Morris, John R

    2014-01-01

    A fundamental understanding of the surface chemistry of chemical warfare agents is needed to fully predict the interaction of these toxic molecules with militarily relevant materials, catalysts, and environmental surfaces. For example, rules for predicting the surface chemistry of agents can be applied to the creation of next generation decontaminants, reactive coatings, and protective materials for the warfighter. Here, we describe a multifunctional ultra-high vacuum instrument for conducting comprehensive studies of the adsorption, desorption, and surface chemistry of chemical warfare agents on model and militarily relevant surfaces. The system applies reflection-absorption infrared spectroscopy, x-ray photoelectron spectroscopy, and mass spectrometry to study adsorption and surface reactions of chemical warfare agents. Several novel components have been developed to address the unique safety and sample exposure challenges that accompany the research of these toxic, often very low vapor pressure, compounds. While results of vacuum-based surface science techniques may not necessarily translate directly to environmental processes, learning about the fundamental chemistry will begin to inform scientists about the critical aspects that impact real-world applications.

  18. Airborne exposure limits for chemical and biological warfare agents: is everything set and clear?

    PubMed

    Sabelnikov, Alex; Zhukov, Vladimir; Kempf, C Ruth

    2006-08-01

    Emergency response strategies (guidelines) for biological, chemical, nuclear, or radiological terrorist events should be based on scientifically established exposure limits for all the agents or materials involved. In the case of a radiological terrorist event, emergency response guidelines (ERG) have been worked out. In the case of a terrorist event with the use of chemical warfare (CW) agents the situation is not that clear, though the new guidelines and clean-up values are being generated based on re-evaluation of toxicological and risk data. For biological warfare (BW) agents, such guidelines do not yet exist. In this paper the current status of airborne exposure limits (AELs) for chemical and biological warfare (CBW) agents are reviewed. Particular emphasis is put on BW agents that lack such data. An efficient, temporary solution to bridge the gap in experimental infectious data and to set provisional AELs for BW agents is suggested. It is based on mathematically generated risks of infection for BW agents grouped by their alleged ID50 values in three categories: with low, intermediate and high ID50 values.

  19. Modeling the transport of chemical warfare agents and simulants in polymeric substrates for reactive decontamination

    NASA Astrophysics Data System (ADS)

    Pearl, Thomas; Mantooth, Brent; Varady, Mark; Willis, Matthew

    2014-03-01

    Chemical warfare agent simulants are often used for environmental testing in place of highly toxic agents. This work sets the foundation for modeling decontamination of absorbing polymeric materials with the focus on determining relationships between agents and simulants. The correlations of agents to simulants must consider the three way interactions in the chemical-material-decontaminant system where transport and reaction occur in polymer materials. To this end, diffusion modeling of the subsurface transport of simulants and live chemical warfare agents was conducted for various polymer systems (e.g., paint coatings) with and without reaction pathways with applied decontamination. The models utilized 1D and 2D finite difference diffusion and reaction models to simulate absorption and reaction in the polymers, and subsequent flux of the chemicals out of the polymers. Experimental data including vapor flux measurements and dynamic contact angle measurements were used to determine model input parameters. Through modeling, an understanding of the relationship of simulant to live chemical warfare agent was established, focusing on vapor emission of agents and simulants from materials.

  20. Multifunctional ultra-high vacuum apparatus for studies of the interactions of chemical warfare agents on complex surfaces

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Wilmsmeyer, Amanda R.; Morris, John R.; Gordon, Wesley O.

    2014-01-15

    A fundamental understanding of the surface chemistry of chemical warfare agents is needed to fully predict the interaction of these toxic molecules with militarily relevant materials, catalysts, and environmental surfaces. For example, rules for predicting the surface chemistry of agents can be applied to the creation of next generation decontaminants, reactive coatings, and protective materials for the warfighter. Here, we describe a multifunctional ultra-high vacuum instrument for conducting comprehensive studies of the adsorption, desorption, and surface chemistry of chemical warfare agents on model and militarily relevant surfaces. The system applies reflection-absorption infrared spectroscopy, x-ray photoelectron spectroscopy, and mass spectrometry tomore » study adsorption and surface reactions of chemical warfare agents. Several novel components have been developed to address the unique safety and sample exposure challenges that accompany the research of these toxic, often very low vapor pressure, compounds. While results of vacuum-based surface science techniques may not necessarily translate directly to environmental processes, learning about the fundamental chemistry will begin to inform scientists about the critical aspects that impact real-world applications.« less

  1. Situation Awareness Information Dominance & Information Warfare.

    DTIC Science & Technology

    1997-02-01

    Information warfare and its primary objective of achieving information dominance over enemy forces have arisen as a major area of emphasis for future...military actions. The concept of information dominance and the issues involved in attaining it are explored through a model of situation awareness...directions for the development of systems to support the goal of information dominance can be established.

  2. An Ecological Examination of Rural Mozambican Women's Attainment of Postwar Wellbeing

    ERIC Educational Resources Information Center

    Deacon, Zermarie; Sullivan, Cris

    2010-01-01

    Women's experiences of warfare and postwar recovery are qualitatively different from those of men. However, to date, the processes whereby women recover from the gendered impacts of war have not been sufficiently explored. In order to address this gap in the literature and to inform policies and services aimed at women recovering from warfare, a…

  3. FY04 NDCEE Annual Technologies Publications

    DTIC Science & Technology

    2006-03-14

    Crane Division, Indiana Naval Surface Warfare Center, Indian Head Division (IHDiv), Maryland Navy Ammunition Program Office New Jersey Institute of...full-scale field demonstrations • Coordinated literature reviews, data requests, and telephone interviews with Naval Surface Warfare Center, Crane ...Armored Recon ABN Assault Vehicle, Bridge Launcher Armored Vehicle, Carrier Ammunition, Crane Shovel 20-ton, Hammer Pile Drivers, and Howitzers. Points of

  4. FY04 NDCEE Annual Technologies Publication

    DTIC Science & Technology

    2006-03-14

    Crane Division, Indiana Naval Surface Warfare Center, Indian Head Division (IHDiv), Maryland Navy Ammunition Program Office New Jersey Institute of...full-scale field demonstrations • Coordinated literature reviews, data requests, and telephone interviews with Naval Surface Warfare Center, Crane ...Armored Recon ABN Assault Vehicle, Bridge Launcher Armored Vehicle, Carrier Ammunition, Crane Shovel 20-ton, Hammer Pile Drivers, and Howitzers. Points of

  5. An outbreak of chickenpox in a military field hospital--the implications for biological warfare.

    PubMed Central

    Hepburn, N C; Brooks, T J

    1991-01-01

    An outbreak of chickenpox with spread to patients and staff on the isolation ward of a British field hospital during the Gulf war is described. The implications for the design and operation of field hospital isolation units should transmissible biological warfare agents be encountered in any future conflict are discussed. PMID:1774746

  6. Coalition Warfare: the Leadership Challenges

    DTIC Science & Technology

    2011-05-19

    Approved for Public Release; Distribution is Unlimited Coalition Warfare: The leadership challenges A Monograph by Colonel Mark J Thornhill...The leadership challenges . 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER 6. AUTHOR(S) Colonel Mark J. Thornhill...multinational operations, leadership challenges , leadership attributes, unity of command. 16. SECURITY CLASSIFICATION OF: UNCLASSIFIED 17. LIMITATION OF

  7. 78 FR 55687 - Notice of Intent To Grant Partially Exclusive Patent License; Silvanus, LLC

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-09-11

    ... with Naval Surface Warfare Center, Crane Div, Code OOL, Bldg 2, 300 Highway 361, Crane, IN 47522-5001. FOR FURTHER INFORMATION CONTACT: Mr. Christopher Monsey, Naval Surface Warfare Center, Crane Div, Code OOL, Bldg 2, 300 Highway 361, Crane, IN 47522-5001, telephone 812-854-4100. Authority: 35 U.S.C. 207...

  8. 76 FR 23314 - Notice of Intent To Grant Partially Exclusive Patent License; Sean Linehan

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-04-26

    ... are to be filed with Naval Surface Warfare Center, Crane Division, Code OOL, Bldg 2, 300 Highway 361, Crane, IN 47522-5001. FOR FURTHER INFORMATION CONTACT: Mr. Christopher Monsey, Naval Surface Warfare Center, Crane Division, Code OOL, Bldg 2, 300 Highway 361, Crane, IN 47522-5001, telephone 812-854-4100...

  9. 77 FR 5242 - Notice of Intent To Grant Exclusive Patent License; Daniel Defense, Inc.

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-02-02

    ... Naval Surface Warfare Center, Crane Div, Code OOL, Bldg 2, 300 Highway 361, Crane, IN 47522-5001. FOR FURTHER INFORMATION CONTACT: Mr. Christopher Monsey, Naval Surface Warfare Center, Crane Div, Code OOL, Bldg 2, 300 Highway 361, Crane, IN 47522-5001, telephone (812) 854-4100. Authority: 35 U.S.C. 207, 37...

  10. 77 FR 23673 - Notice of Intent To Grant Exclusive Patent License; Aurora Technologies, LLC

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-04-20

    ... objections are to be filed with the Naval Surface Warfare Center, Crane Div, Code OOL, Bldg. 2, 300 Highway 361, Crane, IN 47522-5001. FOR FURTHER INFORMATION CONTACT: Mr. Christopher Monsey, Naval Surface Warfare Center, Crane Div, Code OOL, Bldg 2, 300 Highway 361, Crane, IN 47522-5001, telephone 812-854-4100...

  11. Delivering Savings with Open Architecture and Product Lines

    DTIC Science & Technology

    2011-04-30

    p.m. Chair: Christopher Deegan , Executive Director, Program Executive Office for Integrated Warfare Systems Delivering Savings with Open...Architectures Walt Scacchi and Thomas Alspaugh, Institute for Software Research Christopher Deegan —Executive Director, Program Executive Officer...Integrated Warfare Systems (PEO IWS). Mr. Deegan directs the development, acquisition, and fleet support of 150 combat weapon system programs managed by 350

  12. Anti-Submarine Warfare: Still an Essential Warfare Art

    DTIC Science & Technology

    1993-02-19

    34 U.S. Naval Institute ProceedinQs, June 1992, 52. 11. Ibid., 53. 21. Ibid., 53. "D. Holland, 33. 2. Robert 0. Crawshaw , "What Is a Maritime Action...June 1992, 52-54. 4. Byron, John L. "A New Target for the Submarine Force." U.S. Naval Institute Proceedings, January 1990, 38-39. 5. Crawshaw

  13. The Physics of Warfare

    ERIC Educational Resources Information Center

    Giordano, Gerardo

    2015-01-01

    Recently, I was tasked with the creation and execution of a new themed general education physics class called The Physics of Warfare. In the past, I had used the theme of a class, such as the physics of sports medicine, as a way to create homework and in-class activities, generate discussions, and provide an application to demonstrate that physics…

  14. Technology Transfer Summary Report (FY92), Naval Surface Warfare Center Dahlgren Division

    DTIC Science & Technology

    1994-04-20

    communications; no formal records are kept of these. Community Technical Outreach NSWCDD participates in the "Science and Engineering Apprentice" and the " Bay ...ADMINISTRATOR’S OFFICE NAVAL UNDERSEA WARFARE CENTER PO BOX 545 DIVISION NEWPORT SEQUIM WA 98382 NEWPORI’ RI 02841-5047 ATTN GIFT AND EXCHANGE DIV 4 ATTN CODE 00

  15. Technology Transition for Hybrid Warfare

    DTIC Science & Technology

    2010-02-16

    and Iraq. At the same time, the science and technology base must provide the disruptive technologies to defeat future conventional enemies. This... disruptive technologies will be needed to retain long-term technological superiority in conventional warfare. Incremental improvement is the most...technology to be missed. Disruptive technologies are the second type of technological change and involve revolutionary concepts involving large technological

  16. Military Air Power: The CADRE Digest of Air Power Opinions and Thoughts

    DTIC Science & Technology

    1990-10-01

    SUPPLEMENTARY NOTES 14. ABSTRACT 15. SUBJECT TERMS Air warfare; Air power; Military art and science 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF...bibliographical references. 1. Air warfare. 2. Air power. 3. Military art and science . 1. Air University (US). Center for Aerospace Doctrine, Research, and...on Policy and War........................................ ........................................57 War as Art and Science

  17. Control of Supercavitating Vehicles using Transverse Jets

    DTIC Science & Technology

    2016-03-15

    Experimental Technique All experiments reported here were conducted at the Naval Undersea Warfare Center (NUWC) closed loop research water tunnel in Newport...mass of moving parts of the assembly. The second element considered was tte loss term associated with flow restriction across the orifice which was...W. Henoch, Hydrodynamics Branch, Naval Undersea Warfare Center, Newport, RI. 49

  18. Ultrasensitive detection of explosives and chemical warfare agents by low-pressure photoionization mass spectrometry.

    PubMed

    Sun, Wanqi; Liang, Miao; Li, Zhen; Shu, Jinian; Yang, Bo; Xu, Ce; Zou, Yao

    2016-08-15

    On-spot monitoring of threat agents needs high sensitive instrument. In this study, a low-pressure photoionization mass spectrometer (LPPI-MS) was employed to detect trace amounts of vapor-phase explosives and chemical warfare agent mimetics under ambient conditions. Under 10-s detection time, the limits of detection of 2,4-dinitrotoluene, nitrotoluene, nitrobenzene, and dimethyl methyl phosphonate were 30, 0.5, 4, and 1 parts per trillion by volume, respectively. As compared to those obtained previously with PI mass spectrometric techniques, an improvement of 3-4 orders of magnitude was achieved. This study indicates that LPPI-MS will open new opportunities for the sensitive detection of explosives and chemical warfare agents. Copyright © 2016 Elsevier B.V. All rights reserved.

  19. MOFwich: Sandwiched Metal-Organic Framework-Containing Mixed Matrix Composites for Chemical Warfare Agent Removal.

    PubMed

    Peterson, Gregory W; Lu, Annie X; Hall, Morgan G; Browe, Matthew A; Tovar, Trenton; Epps, Thomas H

    2018-02-28

    This work describes a new strategy for fabricating mixed matrix composites containing layered metal-organic framework (MOF)/polymer films as functional barriers for chemical warfare agent protection. Through the use of mechanically robust polymers as the top and bottom encasing layers, a high-MOF-loading, high-performance-core layer can be sandwiched within. We term this multifunctional composite "MOFwich". We found that the use of elastomeric encasing layers enabled core layer reformation after breakage, an important feature for composites and membranes alike. The incorporation of MOFs into the core layer led to enhanced removal of chemical warfare agents while simultaneously promoting moisture vapor transport through the composite, showcasing the promise of these composites for protection applications.

  20. A Comparison of Neutron-Based Non-Destructive Assessment Methods for Chemical Warfare Materiel and High Explosives

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    E.H. Seabury; D.L. Chichester; C.J. Wharton

    2008-08-01

    Prompt Gamma Neutron Activation Analysis (PGNAA) systems employ neutrons as a probe to interrogate items, e.g. chemical warfare materiel-filled munitions. The choice of a neutron source in field-portable systems is determined by its ability to excite nuclei of interest, operational concerns such as radiological safety and ease-of-use, and cost. Idaho National Laboratory’s PINS Chemical Assay System has traditionally used a Cf-252 isotopic neutron source, but recently a Deuterium-Tritium (DT) Electronic Neutron Generator (ENG) has been tested as an alternate neutron source. This paper presents the results of using both of these neutron sources to interrogate chemical warfare materiel (CWM) andmore » high explosive (HE) filled munitions.« less

  1. A Comparison of Neutron-Based Non-Destructive Assessment Methods for Chemical Warfare Material and High Explosives

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Seabury, E. H.; Chichester, D. L.; Wharton, C. J.

    2009-03-10

    Prompt Gamma Neutron Activation Analysis (PGNAA) systems employ neutrons as a probe to interrogate items, e.g. chemical warfare materiel-filled munitions. The choice of a neutron source in field-portable systems is determined by its ability to excite nuclei of interest, operational concerns such as radiological safety and ease-of-use, and cost. Idaho National Laboratory's PINS Chemical Assay System has traditionally used a {sup 252}Cf isotopic neutron source, but recently a deuterium-tritium (DT) electronic neutron generator (ENG) has been tested as an alternate neutron source. This paper presents the results of using both of these neutron sources to interrogate chemical warfare materiel (CWM)more » and high explosive (HE) filled munitions.« less

  2. Particle Swarm Social Adaptive Model for Multi-Agent Based Insurgency Warfare Simulation

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Cui, Xiaohui; Potok, Thomas E

    2009-12-01

    To better understand insurgent activities and asymmetric warfare, a social adaptive model for modeling multiple insurgent groups attacking multiple military and civilian targets is proposed and investigated. This report presents a pilot study using the particle swarm modeling, a widely used non-linear optimal tool to model the emergence of insurgency campaign. The objective of this research is to apply the particle swarm metaphor as a model of insurgent social adaptation for the dynamically changing environment and to provide insight and understanding of insurgency warfare. Our results show that unified leadership, strategic planning, and effective communication between insurgent groups are notmore » the necessary requirements for insurgents to efficiently attain their objective.« less

  3. Nuclear, biological and chemical warfare. Part I: Medical aspects of nuclear warfare.

    PubMed

    Kasthuri, A S; Pradhan, A B; Dham, S K; Bhalla, I P; Paul, J S

    1990-04-01

    Casualties in earlier wars were due much more to diseases than to weapons. Mention has been made in history of the use of biological agents in warfare, to deny the enemy food and water and to cause disease. In the first world war chemical agents were used to cause mass casualties. Nuclear weapons were introduced in the second world war. Several countries are now involved in developing nuclear, biological and chemical weapon systems, for the mass annihilation of human beings, animals and plants, and to destroy the economy of their enemies. Recently, natural calamities and accidents in nuclear, chemical and biological laboratories and industries have caused mass instantaneous deaths in civilian population. The effects of future wars will not be restricted to uniformed persons. It is time that physicians become aware of the destructive potential of these weapons. Awareness, immediate protective measures and first aid will save a large number of persons. This series of articles will outline the medical aspects of nuclear, biological and chemical weapon systems in three parts. Part I will deal with the biological effects of a nuclear explosion. The short and long term effects due to blast, heat and associated radiation are highlighted. In Part II, the role of biological agents which cause commoner or new disease patterns is mentioned. Some of the accidents from biological warfare laboratories are a testimony to its potential deleterious effects. Part III deals with medical aspects of chemical warfare agents, which in view of their mass effects can overwhelm the existing medical resources, both civilian and military.(ABSTRACT TRUNCATED AT 250 WORDS)

  4. Legitimacy as an Operational Factor: An Alternative Analysis

    DTIC Science & Technology

    2006-10-23

    Napoleon I9 In his book, Operational Warfare, Dr. Milan Vego notes, “All great military leaders had an uncommon ability to...elements of one, or perhaps both, of the remaining factors. 9 Milan Vego, Operational Warfare...44 Ibid., 161. 45 Richard Schultz , In the Aftermath of War (Newport RI: U.S. Naval War College, 2006; reprint, Montgomery, AL: Air University

  5. 75 FR 52518 - Meeting of the Chief of Naval Operations (CNO) Executive Panel

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-08-26

    ...The Chief of Naval Operations (CNO) Executive Panel will report on the findings and recommendations of the Cyber Warfare Subcommittee to the CNO. The meeting will consist of discussions of current and future Navy strategy, plans, and policies in support of the organizing, manning, training, and equipping of Cyber Warfare forces for current and future operations.

  6. Just War and Postmodern Warfare: A German Case Study

    DTIC Science & Technology

    2015-04-01

    warfare construct, Germany is shaping a military concept based on recent conflicts and unfettered by biases of conventional strategies, organizations...remain sovereign while subconsciously evolving toward liberal democratic ideas. In respecting each country’s political sensitivities, Germany’s...before exhausting all diplomatic, economic and information instruments. Whereas the term AU/ACSC/PINSON/AY15 13 “interests” may bias the United

  7. Oceanography and Mine Warfare

    DTIC Science & Technology

    2000-03-13

    of breaking waves , the position and strength of surface currents, and the propagation of the tide into very shallow waters. In the surf zone...6) sediment properties determine shock wave propagation , a method for mine neutralization in the surf zone. 48 OCEANOGRAPHY AND MINE WARFARE...mines will be buried in the sediments, sedimentary explosive shock wave propagation is critical for determining operational performance. Presently, we

  8. The United States Army 1996 Modernization Plan.

    DTIC Science & Technology

    1996-03-08

    and a cadre of operations, intelligence, fire support, air defense, and nuclear, biological, and chemical warfare personnel. As required, ARSPACE will...aerial and stand-off chemical and biological detection systems. " Decontamination improvements include Modular Decontamination System fielding in the near... Chemical . As many as 25 nations are producing and stockpiling chemical weapons. Weapons systems from mortars to missiles can deliver chemical warfare (CW

  9. 78 FR 55687 - Notice of Availability of Government-Owned Invention; Available for Licensing

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-09-11

    ... Warfare Center, Crane Div, Code OOL, Bldg 2, 300 Highway 361, Crane, IN 47522-5001. FOR FURTHER INFORMATION CONTACT: Mr. Christopher Monsey, Naval Surface Warfare Center, Crane Div, Code OOL, Bldg 2, 300 Highway 361, Crane, IN 47522-5001, telephone 812-854-4100. (Authority: 35 U.S.C. 207, 37 CFR Part 404) N.A...

  10. FOA Information from the Research Institute of Swedish National Defence on Electronic Warfare (FOA Orientar om Electronic Warfare),

    DTIC Science & Technology

    1967-01-01

    probablity ot penetring to target in the preaence of atr do- fance . Curve P, =probebility of destro),ing target in the presence of air defence. Weapon...so rendering the lions. At high frequencies ( gen - quency range and sector of ter- traffic less sensitive to jamming. erally those tsed on radio links

  11. Naval Warfare

    DTIC Science & Technology

    2010-03-01

    Naval Doctrine Publication 1 Naval Warfare March 2010 Doctrine The only satisfactory method of ensuring unity of effort lies in due...LCDR Dudley W. Knox, USN “The Role of Doctrine in Naval Warfare” U.S. Naval Institute Proceedings, 1915 01 March 2010 FOREWORD United States (US...naval doctrine is the foundation upon which our tactics, techniques, and procedures are built. It articulates operational concepts that govern the

  12. Network Centric Warfare in the U.S. Navy’s Fifth Fleet. Network-Supported Operational Level Command and Control in Operation Enduring Freedom

    DTIC Science & Technology

    2004-06-01

    Mark Adkins Director of Research Ph.D Human Communication adkins@arizona.edu Dr. John Kruse Director of Programming Ph.D Management Information Systems...Theory • Network Centric Warfare • Technology Adoption – Technology Adoption Model – Technology Transition Model • Human Communication – Social Context

  13. Naval Surface Warfare Center Carderock Division, Technical Digest

    DTIC Science & Technology

    2001-12-01

    Survivability Systems: An Overview Fred J. Fisch 139 Modeling and Simulation of Weapons Effects on Ships Robert R. Wunderlick 143 Intelligent Networks ...communications capability of forces afloat to support emerging network -centric warfare doc- trines. Stealth, for our next generation of warships...fully-inte- grated, fully- networked electronic countermeasures system, developed in parallel and in close coordination with sister systems. An

  14. Military Reengineering Between the World Wars

    DTIC Science & Technology

    2005-01-01

    University. I am also grateful to Tamera Dorland for her much-needed perspectives. Any inaccura- cies remain mine alone. xxiii Abbreviations FFRDC...or shape any motorization opportunities that under- mined their branch’s immediate interests. Infantry chiefs such as Robert Allen, Stephen Fuqua...Warfare, An- napolis, Md.: Naval Institute Press, 1983, p. 187. 85 Kenneth J. Clifford, Amphibious Warfare Development in Britannia and America from

  15. Containing Revolutionary Islam: Reassessing the Problem and the Approach

    DTIC Science & Technology

    2017-03-01

    2011), xx. 83 Russ Rodgers, Fundamentals of Islamic Asymmetric Warfare: A Documentary Analysis of the Principles of Muhammad (Lewiston, NY: Edwin...have not yet effectively coalesced or managed to spark the greater revolution they seek. They remain fragmented, choosing divergent activities in...Libertarian Rebuttal. Auburn, AL: Ludwig von Mises Institute, 2015. Rodgers, Russ. Fundamentals of Islamic Asymmetric Warfare: A Documentary Analysis

  16. Command Post Program Study. Volume 1 - Main Report

    DTIC Science & Technology

    1973-03-01

    Field Manual 30-9, Military Intelligence Battalion - Field Am. Washington: March 1968. _ Field Manual 32-20, Electronic Warfare. Washington: 14...Mechanized). A-18 TOE 30-88T, Military Intelligence Support Detachment, Military Intelligence Battalion, Field Army. TOE 30-206T, Headquarters and... Field Manual 30-9, Military Intelligence Battalion - Field Army. Washington: March 1968. _ Field Manual 32-20, Electronic Warfare. Washington: 14

  17. Rapid Analysis of Chemical Warfare Agents and Their Hydrolysis Products by Desorption Electrospray Ionization Mass Spectrometry (DESI-MS)

    DTIC Science & Technology

    2009-10-01

    of chemical warfare agents in natural water samples by solid-phase microextraction. Anal. Chem., 69, 1866-72. [36] Sng , M.T. and Ng ,W.F. (1999). In...liquid phase microextraction of alkylphosphonic acids from water. J. Chromatogr. A., 1141, 151-157. [43] Lee, H.S.N., Sng , M.T., Basheer, C., and Lee

  18. The Sea of Simulation: Improving Naval Shiphandling Training and Readiness through Game-Based Learning

    DTIC Science & Technology

    2012-03-01

    Officer SWOI Surface Warfare Officer Introduction SWOS Surface Warfare Officers School xvii TFT Thin Film Transistor ULTRA Unit Level Training...designed the experiment , including participants, procedures, facilities selection, and materials. Chapter IV: Results and Discussion. This chapter...contains the results of experimentation and an interpretation of those results . Chapter V: Conclusions. This chapter provides an overall assessment

  19. Factors Affecting the Retention Decisions of Female Surface Warfare Officers

    DTIC Science & Technology

    2003-03-01

    NAVAL POSTGRADUATE SCHOOL Monterey, California THESIS Approved for public release; distribution is unlimited. FACTORS AFFECTING THE RETENTION...Warfare Officers 6. AUTHOR(S) Clifton, Elizabeth A. 5. FUNDING NUMBERS 7. PERFORMING ORGANIZATION NAME(S) AND ADDRESS(ES) Naval Postgraduate School ...for the degree of MASTER OF SCIENCE IN LEADERSHIP AND HUMAN RESOURCE DEVELOPMENT from the NAVAL POSTGRADUATE SCHOOL March 2003

  20. Maritime In Situ Sensing Inter-Operable Networks (MISSION)

    DTIC Science & Technology

    2013-09-30

    creating acoustic communications (acomms) technologies enabling underwater sensor networks and distributed systems. Figure 1. Project MISSION...Marn, S. Ramp, F. Bahr, “Implementation of an Underwater Wireless Sensor Network in San Francisco Bay,” Proc. 10th International Mine Warfare...NILUS – An Underwater Acoustic Sensor Network Demonstrator System,” Proc. 10th International Mine Warfare Technology Symposium, Monterey, CA, May 7

  1. Miniaturized low-cost ion mobility spectrometer for fast detection of chemical warfare agents.

    PubMed

    Zimmermann, Stefan; Barth, Sebastian; Baether, Wolfgang K M; Ringer, Joachim

    2008-09-01

    Ion mobility spectrometry (IMS) is a well-known method for detecting hazardous compounds in air. Typical applications are the detection of chemical warfare agents, highly toxic industrial compounds, explosives, and drugs of abuse. Detection limits in the low part per billion range, fast response times, and simple instrumentation make this technique more and more popular. In particular, there is an increasing demand for miniaturized low-cost IMS for hand-held devices and air monitoring of public areas by sensor networks. In this paper, we present a miniaturized aspiration condenser type ion mobility spectrometer for fast detection of chemical warfare agents. The device is easy to manufacture and allows single substance identification down to low part per billion-level concentrations within seconds. The improved separation power results from ion focusing by means of geometric constraints and fluid dynamics. A simple pattern recognition algorithm is used for the identification of trained substances in air. The device was tested at the German Armed Forces Scientific Institute for Protection Technologies-NBC-Protection. Different chemical warfare agents, such as sarin, tabun, soman, US-VX, sulfur mustard, nitrogen mustard, and lewisite were tested. The results are presented here.

  2. Metal-organic frameworks for the removal of toxic industrial chemicals and chemical warfare agents.

    PubMed

    Bobbitt, N Scott; Mendonca, Matthew L; Howarth, Ashlee J; Islamoglu, Timur; Hupp, Joseph T; Farha, Omar K; Snurr, Randall Q

    2017-06-06

    Owing to the vast diversity of linkers, nodes, and topologies, metal-organic frameworks can be tailored for specific tasks, such as chemical separations or catalysis. Accordingly, these materials have attracted significant interest for capture and/or detoxification of toxic industrial chemicals and chemical warfare agents. In this paper, we review recent experimental and computational work pertaining to the capture of several industrially-relevant toxic chemicals, including NH 3 , SO 2 , NO 2 , H 2 S, and some volatile organic compounds, with particular emphasis on the challenging issue of designing materials that selectively adsorb these chemicals in the presence of water. We also examine recent research on the capture and catalytic degradation of chemical warfare agents such as sarin and sulfur mustard using metal-organic frameworks.

  3. Modern Warfare: NATO’s War amongst the People in Kosovo

    DTIC Science & Technology

    2013-05-23

    Defense Initiative and director of research for the Foreign Policy program at the Brookings Institution; Misha Glenny, then the Central... the Kosovo military campaign and offers useful incites regarding future 21st century warfare for those who are interested in advancing their...estimated to average 1 hour per response, including the time for reviewing instructions, searching existing data sources, gathering and maintaining the

  4. Implementation and Testing of the JANUS Standard with SSC Pacific’s Software-Defined Acoustic Modem

    DTIC Science & Technology

    2017-12-01

    Communications Outpost (FDECO) Innovative Naval Prototype (INP) Program by the Advanced Photonic Technologies Branch (Code 55360), Space and Naval Warfare... Communications and Networks Division iii EXECUTIVE SUMMARY This report presents Space and Naval Warfare (SPAWAR) Systems Center Pacific’s (SSC... Frequency -Hopped Binary Frequency Shift Keying Office of Naval Research Innovative Naval Prototype Forward Deployed Energy and Communications Outpost

  5. Satellite and Ground Communication Systems: Space and Electronic Warfare Threats to the United States Army

    DTIC Science & Technology

    2017-02-01

    communication satellites—operating high above the earth and at higher frequencies —are often better suited to communicate across much longer distances and...Satellite and Ground Communication Systems: Space and Electronic Warfare Threats to the...TYPE SAMS Monograph 3. DATES COVERED (From - To) JUN 2016 – MAY 2017 4. TITLE AND SUBTITLE Satellite and Ground Communication Systems: Space and

  6. Strategic Choice: United States Special Forces’ Comparative Advantage in Irregular Warfare

    DTIC Science & Technology

    2017-03-01

    UNITED STATES SPECIAL FORCES’ COMPARATIVE ADVANTAGE IN IRREGULAR WARFARE by Steven F. Payne March 2017 Thesis Advisor: Hy S. Rothstein...REPORT TYPE AND DATES COVERED Master’s thesis 4. TITLE AND SUBTITLE STRATEGIC CHOICE: UNITED STATES SPECIAL FORCES’ COMPARATIVE ADVANTAGE IN...methodology, this thesis concludes that U.S. Army Special Forces have a comparative advantage over conventional forces to provide the National Command

  7. Developing and Fielding Information Dominance

    DTIC Science & Technology

    2002-01-01

    Developing and Fielding Information Dominance Space and Naval Warfare Systems Command’s IT-21 Blocks 1 and 2 2002 Command and Control Research and...00-00-2002 4. TITLE AND SUBTITLE Developing and Fielding Information Dominance 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER...force levels were uncertain, the necessary role of information dominance to maintaining strategic superiority was not. Platform Centric Warfare, with its

  8. Mortality data in the age of drones ‡.

    PubMed

    Carruthers, Elspeth

    2018-03-01

    Mortality data plays an essential role in shaping humanitarian, legal and ethical responses to conflict situations. The rise of drone warfare poses new questions regarding the accuracy and reliability of mortality data in conflict. This article examines some of the methodological and political challenges to collecting mortality data in drone warfare, and how the way in which drones are framed in public discourse contributes to these challenges.

  9. Asymmetric Warfare in the Simulation and Training Environment: Comprehensive Approach Wanted!

    DTIC Science & Technology

    2009-10-01

    Covering Support to Operations, Human Behaviour Representation, Irregular Warfare, Defence against Terrorism and Coalition Tactical Force Integration...learned behaviours arising from shared knowledge and it is passed on from one generation to the next. The behaviours that have become embedded as part of...symbols and behaviours . While culture changes, the change is usually slow, particularly in terms of military operations timeframes. Urban environments

  10. Back to the Future: The UH-1Y Utility Helicopter; A Multi-Role Solution for a Changing Security Environment

    DTIC Science & Technology

    2008-01-01

    Johnson, "Teaching Irregular Warfare; Deja vu All Over Again?" a paper presented to the Joint conference Pedagogy for the Long War: Teaching Irregular...Do about Them." Marine Corps Gazette 92, no. 2 (February 2008): 18- 23. Johnson, Wray. "Teaching Irregular Warfare; Deja vu All Over Again?" a paper

  11. Fluorescent discrimination between traces of chemical warfare agents and their mimics.

    PubMed

    Díaz de Greñu, Borja; Moreno, Daniel; Torroba, Tomás; Berg, Alexander; Gunnars, Johan; Nilsson, Tobias; Nyman, Rasmus; Persson, Milton; Pettersson, Johannes; Eklind, Ida; Wästerby, Pär

    2014-03-19

    An array of fluorogenic probes is able to discriminate between nerve agents, sarin, soman, tabun, VX and their mimics, in water or organic solvent, by qualitative fluorescence patterns and quantitative multivariate analysis, thus making the system suitable for the in-the-field detection of traces of chemical warfare agents as well as to differentiate between the real nerve agents and other related compounds.

  12. Battle Command Staff Training

    DTIC Science & Technology

    1992-12-01

    warfare ? • How does one develop training exercises to exploit this medium? • What are some of the implications for institutional training? The DARPA...IDT Inactive Duty Training JEW IIntelligencel•ectronic Warfare I FOR Intelligent Forces IPB Intelligence Preparation of the Battlefield JAAT Joint Air... Chemical xiI NFA No Fire Area NGB Nationhl Guard Bureau NTC National Training Center OAC Officers Advanced Cours- OC Observer/Controllcr OCI Observer

  13. Advances in the Acquisition of Secure Systems Based on Open Architectures

    DTIC Science & Technology

    2011-04-30

    2011 11:15 a.m. – 12:45 p.m. Chair: Christopher Deegan , Executive Director, Program Executive Office for Integrated Warfare Systems Delivering...Systems Based on Open Architectures Walt Scacchi and Thomas Alspaugh, Institute for Software Research Christopher Deegan —Executive Director, Program...Executive Officer, Integrated Warfare Systems (PEO IWS). Mr. Deegan directs the development, acquisition, and fleet support of 150 combat weapon system

  14. A Historical Study of Operational Command: A Resource for Researchers

    DTIC Science & Technology

    2005-03-01

    PJHQ) in the United Kingdom. Control, the impact of command arrangements on the proper functioning of operational level headquarters is shown...might interact in a joint environment, identifying the different types of communication and social networks that exist, determining the influence of...introduction of information technology and its tools has spawned ideas such as Network Centric Warfare (NCW) or Network Enabled Warfare (NEW), there is

  15. A Historical Study of Operational: A Resource for Researches

    DTIC Science & Technology

    2005-03-01

    PJHQ) in the United Kingdom. Control, the impact of command arrangements on the proper functioning of operational level headquarters is shown...might interact in a joint environment, identifying the different types of communication and social networks that exist, determining the influence of...introduction of information technology and its tools has spawned ideas such as Network Centric Warfare (NCW) or Network Enabled Warfare (NEW), there is

  16. Unconventional Cyber Warfare: Cyber Opportunities in Unconventional Warfare

    DTIC Science & Technology

    2014-06-01

    thanks to Tunisia’s modern communications infrastructure , pervasive Internet, and mobile phone network.”151 Although the use of information and...and physical space. Tunisia had a well-developed mobile phone and Internet infrastructure with nearly nine out of 10 Tunisians owning a mobile phone...OF TABLES Table 1. Top 20 countries of mobile phones per 100 people .........................................60 Table 2. Top 20 countries by number

  17. Naval War College Review. Volume 65, Number 2, Spring 2012

    DTIC Science & Technology

    2012-01-01

    warfare doctrine that scarcely exists in today’s American military. Finally, as part of our long-standing effort to understand capabilities and...long before network-centric warfare became a central feature of joint doctrine , the Navy established a program called “Copernicus” to assimilate...exchange data if the right technology, doctrine , tactics, techniques, and procedures were in place. The importance of coalition partners effectively

  18. Special Operations And Cyber Warfare

    DTIC Science & Technology

    2016-12-01

    with the high level of Soldier competency in the 95th for CA Soldiers to retrain and fulfill the cyber requirement. With the reorganization of the...NAVAL POSTGRADUATE SCHOOL MONTEREY, CALIFORNIA THESIS Approved for public release. Distribution is unlimited. SPECIAL OPERATIONS AND CYBER...OPERATIONS AND CYBER WARFARE 5. FUNDING NUMBERS 6. AUTHOR(S) Jason C. Tebedo 7. PERFORMING ORGANIZATION NAME(S) AND ADDRESS(ES) Naval Postgraduate School

  19. Proceedings on Combating the Unrestricted Warfare Threat: Integrating Strategy, Analysis, and Technology, 20-21 March 2007

    DTIC Science & Technology

    2007-03-01

    Prosthetics to enable return to units without loss of capability Quantum...and will give us a big advantage in terms of unrestricted warfare. Figure 17 high-Productivity Computing System PRoSThETICS We have an exciting...program in prosthetics (Figure 18). It started with a monkey at Duke University. We put microelectronic implants into her brain, taught her

  20. Moral Warfare in Counterinsurgency Operations

    DTIC Science & Technology

    2007-05-11

    Moral Warfare in Counterinsurgency Operations A Monograph by MAJOR David C. Chiarenza US Army School of Advanced Military Studies United...OMB control number. PLEASE DO NOT RETURN YOUR FORM TO THE ABOVE ADDRESS. 1. REPORT DATE (DD-MM-YYYY) 11-05-2007 2. REPORT TYPE AMSP Monograph 3...Public Release; Distribution is Unlimited 13. SUPPLEMENTARY NOTES 14. ABSTRACT This study explores the moral level of war in the context of

  1. Multistage Deployment of the Army Theater Hospital

    DTIC Science & Technology

    2013-12-01

    analysis on the effects warfare tactics, casualty timing, and casualty types had on the medical treatment facility (Cecchine et al., 2001). This proved...the 44-bed mobile portion of the current CSH was potentially inadequate to support approximately four brigades in an asymmetrical warfare scenario...systems and its increased force effectiveness on the fleet. He utilized quantitative analysis with Lanchester and Hughes-Salvo models to show that

  2. Operational Ethics: Just War and Implications for Contemporary American Warfare

    DTIC Science & Technology

    2003-05-22

    will mutually share those values.12 Today, those values are manifested in the secular society in the form of ethics and basic human morality, what is...Approved for Public Release; Distribution is Unlimited Operational Ethics : Just War and Implications for Contemporary American Warfare A Monograph...a denkschrift through which the author hopes to inspire discussions on operational ethics among professional officers and civilian proponents of

  3. Evaluation of Organisational Interoperabiity in a Network Centric Warfare Environment

    DTIC Science & Technology

    2004-09-01

    understanding developed. Command and Coordination examines issues related to command structure, command and leadership styles . Ethos covers socio...harmonisation of command arrangements and the accommodation of differences in command and leadership styles . 3.2.4 Ethos Future warfare will... leadership styles . • changes to give less emphasis to hierarchy and command and more to coordination. Any reference to a single chain of command has been

  4. 37. Photograph of plan for repairs to computer room, 1958, ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    37. Photograph of plan for repairs to computer room, 1958, prepared by the Public Works Office, Underwater Sound Laboratory. Drawing on file at Caretaker Site Office, Naval Undersea Warfare Center, New London. Copyright-free. - Naval Undersea Warfare Center, Bowditch Hall, 600 feet east of Smith Street & 350 feet south of Columbia Cove, West bank of Thames River, New London, New London County, CT

  5. Israel’s Second Lebanon War: A Failure of Afghan Model Warfare?

    DTIC Science & Technology

    2007-05-10

    Israeli experience in the Second Lebanon War will be compared against the American experience in Afghanistan as analyzed by Dr. Stephen Biddle in his...Biddle’s arguments regarding the so-called “Afghan Model” reinforces the validity of the conclusions Dr. Biddle derives regarding the U.S. success in...an irregular guerilla force. 2 Stephen Biddle , Afghanistan and the Future of Warfare

  6. Unconventional Warfare in the American Civil War

    DTIC Science & Technology

    2004-06-18

    Miller Thesis Title: Unconventional Warfare in the American Civil War Approved by: , Thesis Committee Chair LTC ( R ) Gregory T. Beck...M.A. , Member LTC ( R ) Richard Barbuto, Ph.D. , Consulting Faculty LTC ( R ) James B. Martin, Ph.D. Accepted this 18th day of...troops and supplies to forward areas. In official correspondence dated 26 May 1864 from Captain A. V. Barringer , Chief Quartermaster, Department of West

  7. Constitution aims to bring an end to health economy warfare.

    PubMed

    Harding, Mary-Louise; Martin, Daniel

    2005-02-10

    A rough new constitution is being drawn up for the NHS in a bid to prevent health economies sliding into bitter 'Bradford-style' warfare in the era of foundations trusts and payment by results. The rules of engagement are part of a package of measures designed to rescue some of the government's flagship reforms amid warnings from audit chiefs on the impact of PbR.

  8. 31. Photographic copy of historic views of lecture room, first ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    31. Photographic copy of historic views of lecture room, first floor, Bowditch Hall, c. 1955, taken from album in building photo files in Caretaker Site Office, Naval Undersea Warfare Center, New London. Copyright-free. - Naval Undersea Warfare Center, Bowditch Hall, 600 feet east of Smith Street & 350 feet south of Columbia Cove, West bank of Thames River, New London, New London County, CT

  9. Unconventional Warfare and Counterinsurgency in Pakistan: A Brief History

    DTIC Science & Technology

    2012-11-01

    inter-connected. Punjabi Pakistani militants with sophisticated asymmetric warfare training and experience fighting Indian forces in Kashmir...factions. These Punjabi Pakistani militants would prove to be some of the most dangerous opponents of the government after 2006. From 2003 to 2006, the...68 Khan. “Untangling the Punjabi Taliban Network”. CTC Sentinel, March 2010; Franco, “Tehrik-e-Taliban Pakistan.” 69 Iqbal

  10. Electronic warfare antenna systems - Past and present

    NASA Astrophysics Data System (ADS)

    Yaw, D.

    1981-09-01

    In discussing fixed beam arrays, it is noted that an array may be used to create simultaneous fixed beams or to form asymmetric beams of a desired shape. Attention is also given to arrays and beam control, noting that for some electronic warfare applications combinations of broad and narrow beam antenna response are needed. Other topics include ECM jamming antenna techniques and advanced array systems.

  11. Desorption Electrospray Ionization Mass Spectrometry (DESI-MS) Analysis of Organophosphorus Chemical Warfare Agents: Rapid Acquisition of Time-Aligned Parallel (TAP) Fragmentation Data

    DTIC Science & Technology

    2010-06-01

    phase microextraction. Anal. Chem., 69, 1866-72. [39] Sng , M.T. and Ng ,W.F. (1999). In-situ derivatisation of degradation products of chemical warfare...Chromatogr. A., 1141, 151-157. [46] Lee, H.S.N., Sng , M.T., Basheer, C., and Lee, H.K. (2007). Determination of degradation products of chemical

  12. Thumping the Hive: Russian Neocortical Warfare in Chechnya

    DTIC Science & Technology

    2004-09-01

    against the determined, resourceful Muslim tribes of the mountains and forests of the Central Caucasus, Russia’s military forces compiled a frustrating...warfare against minds and envisioning weapons as any means used to change the enemy’s will.” The merging of these two hemispheric approaches produces... single adviser in the Soviet system 40 Ibid., 5. 41 Szafranski, 409. 19 can allow himself to

  13. Potassium Ferrate: A Novel Chemical Warfare Agent Decontaminant

    DTIC Science & Technology

    2004-11-16

    POTASSIUM FERRATE : A NOVEL CHEMICAL WARFARE AGENT DECONTAMINANT Russell Greene greener@battelle.org (Battelle Memorial Institute, West...difficulties, and/or unsatisfactory CWA destruction efficiencies. Potassium ferrate (K2FeO4) addresses all of these issues through its high oxidation...used and proposed, are unstable (with respect to loss of activity) and/or difficult to prepare, store and transport. Potassium ferrate (K2FeO4) has

  14. Development of biosensors for the detection of biological warfare agents: its issues and challenges.

    PubMed

    Kumar, Harish; Rani, Renu

    2013-01-01

    This review discusses current development in biosensors for the detection of biological warfare agents (BWAs). BWAs include bacteria, virus and toxins that are added deliberately into air water and food to spread terrorism and cause disease or death. The rapid and unambiguous detection and identification of BWAs with early warning signals for detecting possible biological attack is a major challenge for government agencies particularly military and health. The detection devices--biosensors--can be classified (according to their physicochemical transducers) into four types: electrochemical, nucleic acid, optical and piezoelectric. Advantages and limitations of biosensors are discussed in this review followed by an assessment of the current state of development of different types of biosensors. The research and development in biosensors for biological warfare agent detection is of great interest for the public as well as for governments.

  15. Screening methods for chemical warfare agents in environmental samples at the Edgewood area of Aberdeen Proving Ground, Maryland

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Jakubowski, E.M.; Borland, M.M.; Norris, L.

    1995-06-01

    The U.S. Army Edgewood Research, Development and Engineering Center, the U.S. Army Aberdeen Proving Ground Support Activity, Directorate of Safety, Health and the Environment and SciTech Services Inc., an independent contractor, have developed an approach for screening environmental samples for the presence of chemical warfare agents. Since 1918, the Edgewood area of Aberdeen Proving Ground has been a research and testing ground for toxic agent compounds. Since these materials are considered highly toxic, screening for their presence in environmental samples is necessary for safe shipment to contract laboratories for testing by EPA guidelines. The screening ensures worker safety and maintainsmore » U.S. Army standards for transportation of materials potentially contaminated with chemical warfare agents. This paper describes the screening methodology.« less

  16. New studies disputing allegations of bacteriological warfare during the Korean War.

    PubMed

    Rolicka, M

    1995-03-01

    In the television series Korea the Unknown War produced jointly by Thames Television (London) and WGBH (Boston) in 1990, General Matthew Ridgway, Commander in Chief of United Nations forces during the Korean War, called the accusations that the United States waged bacteriological warfare "black propaganda." The charges discredited the United States and, despite denials and many international discussions, have not been completely refuted until new. Following studies in archives previously not available for research and after uncovering new sources, many specific examples of black propaganda were discovered that contained false information and lies discrediting the United States. The mechanism of lies, which convinced the Korean population that bacteriological warfare was going on and that the only way not to become victims of the United States' inhuman cruelty was to fight, are shown in this paper.

  17. Chemical warfare agents: their past and continuing threat and evolving therapies. Part I of II.

    PubMed

    Smith, Kathleen J; Skelton, Henry

    2003-01-01

    Chemical warfare agents are potentially accessible to even underdeveloped nations because they are easily and inexpensively produced. This means that they are ideal for use by terrorists and in military operations against civilian populations and troops. In terms of cutaneous injury, vesicants-mainly sulfur mustard-are the most significant chemical warfare agents. Advances in understanding the pathophysiology of the lesions produced by sulfur mustard have led to the research and development of barrier creams as well as pre- and post-exposure therapies to moderate the damage and accelerate healing. Part I of this paper will discuss the history and classification of chemical agents; Part II, which will appear in the September/October 2003 issue of SKINmed, will discuss characteristic manifestations of exposure to chemical agents, as well as prevention and therapy.

  18. InterAgency Journal (Volume 2, Issue 2, Summer 2011)

    DTIC Science & Technology

    2011-01-01

    Interagency Task Force for Irregular Warfare ( IATF -IW). It is fair to say that in prosecuting foreign policy which currently includes open warfare...With the introduction of the IATF -IW, CENTCOM is actively developing and promoting plans in conjunction with the civilian entities of government. The...opposite extreme, in the IATF - IW being the agent of the State Department. This subordination to State Department lead ensured rebuilding Iraq would

  19. Littoral Combat Ship Open Ocean Anti-Submarine Warfare

    DTIC Science & Technology

    2014-06-01

    maintain stealth and its defense in order to properly conduct an attack on a surface vessel (Sternhell and Thorndike 2014, 102). This statement...its target, the surface combatants can counter by increasing their speed (Sternhell and Thorndike 2014). While the maximum speed of the current...120316_PS.pdf Sternhell, Charles M, and Alan M Thorndike . 2014. “Antisubmarine Warfare in World War II.” CNA Analysis & Solutions. Accessed April 14, 2014

  20. Implementation and Testing of the JANUS Standard with SSC Pacific’s Software-Defined Acoustic Modem

    DTIC Science & Technology

    2017-10-01

    Communications Outpost (FDECO) Innovative Naval Prototype (INP) Program by the Advanced Photonic Technologies Branch (Code 55360), Space and Naval Warfare...underwater acoustic communication operations with NATO and non-NATO military and civilian maritime assets. iv ACRONYMS SPAWAR Space and Naval Warfare...the center frequency [1]. The ease of implementation and proven robustness in harsh underwater acoustic communication channels paved the way for

  1. Natural Language Processing Of Online Propaganda As A Means Of Passively Monitoring An Adversarial Ideology

    DTIC Science & Technology

    2017-03-01

    Warfare. 14. SUBJECT TERMS data mining, natural language processing, machine learning, algorithm design , information warfare, propaganda 15. NUMBER OF...Speech Tags. Adapted from [12]. CC Coordinating conjunction PRP$ Possessive pronoun CD Cardinal number RB Adverb DT Determiner RBR Adverb, comparative ... comparative UH Interjection JJS Adjective, superlative VB Verb, base form LS List item marker VBD Verb, past tense MD Modal VBG Verb, gerund or

  2. The Rise of iWar: Identity, Information, and the Individualization of Modern Warfare

    DTIC Science & Technology

    2015-10-01

    INDMDUALIZATION OF MODERN WARFARE Glenn J. Voelz U.S. ARMY WAR COLLEGE ~~ ..... ~O.L STRATEGIC STUDIES INSTITUTE Report Documentation Page Form...ORGANIZATION NAME(S) AND ADDRESS(ES) U.S. Army War College,Strategic Studies Institute,47 Ashburn Drive,Carlisle,PA,17013-5010 8. PERFORMING...concerning the role of ground forces in achieving national security objectives. The Strategic Studies Institute publishes national security and

  3. Organizing for Irregular Warfare: Implications for the Brigade Combat Team

    DTIC Science & Technology

    2007-12-01

    suggestions to improve his beloved institution. xii THIS PAGE INTENTIONALLY LEFT BLANK 1 I. INTRODUCTION The Army ended up trying to fight...Secretary of Defense and supported by the Chairman of the Joint Chiefs of Staff, was improving Special Operations Forces (SOF) and general purpose...applicable to all three missions within the larger term of irregular warfare. This paper may interchange some terms due their associations from varying

  4. Analysis of Maritime Support Vessels and Acquisition Methods Utilized to Support Maritime Irregular Warfare

    DTIC Science & Technology

    2010-06-01

    1 identifies five fundamental IW operations as they relate to the maritime environment and domain. Maritime IrregularWarfare Activities...they relate to MIW. Figure 2 identifies five fundamental IW operations as they relate to the maritime environment and domain. Maritime...meter RHIB is designed for the insertion and extraction of SEAL Team personnel. It is a twin- turbocharged diesel engine, waterjet-propelled personnel

  5. U.S. Army Special Forces Roles in Asymmetric Warfare

    DTIC Science & Technology

    2001-06-01

    1Jonathan B . Tucker, “Asymmetric Warfare: An Emerging Threat to U.S. Security,” Forum For Applied Research and Public Policy (Monterey...8Ibid., 34. 9Tucker, 11. 10Ibid., 2. 11 Henry H . Shelton, GEN, USA, Commander in Chief, U.S. Special Operations Command...the Senate Armed Services Committee, “Military Threats and Security Challenges Through 2015,” (Washington: 3 February 2000), 3. 26GEN Henry H

  6. Characterization of the MEMS Directional Sound Sensor Fabricated Using the SOIMUMPS Process

    DTIC Science & Technology

    2008-06-01

    ABBREVIATIONS AND ACRONYMS ASW Anti- Submarine Warfare AUV Autonomous Underwater Vehicle DRIE Deep Reactive Ion Etching FAS Federation of American...as the frequency diverges from the resonant frequency (2980 Hz ) of the sensor. This analysis points out some disadvantages of the current set up of...sound sensor has important military applications, in particular to anti- submarine warfare (ASW). The sensor considered in this thesis is modeled on

  7. Crimson Tide: Comparing Chinese Naval Expansion With Existing Naval Powers

    DTIC Science & Technology

    2016-09-01

    Amphibious Assault Ship MHV Mine Hunting Vehicle x MOOTW Military Operations Other Than War MPRA Marine Patrol and Reconnaissance Aircraft MSG...in mind, including 9 corvettes, 175 missile boats, 27 mine warfare vessels, and 75 submarine chasers.19 China’s expanding blue water assets...damage to an enemy fleet and operate silently and effectively in 16 the littorals. Mine warfare is another relatively inexpensive way to inflict

  8. The Feasibility of Instituting a Department Head Screen in the Naval Special Warfare Community.

    DTIC Science & Technology

    1985-12-01

    community, and through use of the Structured Accession Planning System for Officers (STRAP-O) model, projects the community from 1985 to 1991 both with and...Placement Officer. It looks at the current state of the NSW community, and through use of the Structured Accession Planning System for Officers (STRAP-0...ACCESSION PLANNING SYSTEM FOR OFFICERS----------------------------------------19 Ill. NAVAL SPECIAL WARFARE COMMUNITY RESPONSE TO PROPOSAL

  9. Active Cyber Defense: Enhancing National Cyber Defense

    DTIC Science & Technology

    2011-12-01

    Prevention System ISP Internet Service Provider IT Information Technology IWM Information Warfare Monitor LOAC Law of Armed Conflict NATO...the Information Warfare Monitor ( IWM ) discovered that GhostNet had infected 1,295 computers in 103 countries. As many as thirty percent of these...By monitoring the computers in Dharamsala and at various Tibetan missions, IWM was able to determine the IP addresses of the servers hosting Gh0st

  10. Hybrid Threat Center of Gravity Analysis: Cutting the Gordian Knot

    DTIC Science & Technology

    2016-04-04

    U.S. Marine Corps General James Mattis summed this best when he stated that “we expect future enemies to look at the four approaches [Traditional...synthesis is what we call hybrid warfare.”15 15 James N. Mattis and Frank Hoffman, "Future...accoun tid=12686 (accessed August 16, 2015). Mattis , James N. and Frank Hoffman. "Future Warfare: The Rise of Hybrid wars." United States Naval

  11. Atmospheric Data Requirements for Battlefield Obscuration Applications.

    DTIC Science & Technology

    1980-06-01

    34 ECOM-5572, August 1975. 9. Miers, B., G. Blackman, D. Langer, and N. Lorimier, " Analysis of SMS/GOES Film Data," ECOM-5573, September 1975. 10...ATEC-PL-M Combined Arms Combat Developments Activity; ATZLCA-RS Concepts Analysis Agency; CSCA-SMC Dugway Proving Ground; STEDP-PP Electronic Warfare...CS-SA Materiel Systems Analysis Activity, Ground Warfare Division; DRXSY-GS Missile Research and Development Command, Research Directorate; DRDMI-TRA

  12. Engineering Provision of Assault Crossing of Rivers,

    DTIC Science & Technology

    1983-01-21

    in the first place, in the missile and nuclear weapons warfare sharply they increased frontage and the depth of troop dispositions in the defense...modern missile and nuclear weapons warfare the medium * and wide rivers, reinforced by mine fields and decomposition of water-engineering and other...PMP and transport motor pool PVD -20. The existing pontoon trains make it possible to mechanize labor-consuming fitters work, to the minimum to bring

  13. Optimizing Training Event Schedules at Naval Air Station Fallon

    DTIC Science & Technology

    2018-03-01

    popularly known as Topgun. Fallon training range airspace overlays 10,200 square miles and contains ground ranges for bombing and electronic warfare. In...Fighter Weapons School, popularly known as Topgun. Fallon training range airspace overlays 10,200 square miles and contains ground ranges for bombing and...popularly known as Topgun. Fallon training range airspace overlays 10,200 squaremiles, and contains ground ranges for bombing and electronic warfare. In

  14. Russian and Chinese Information Warfare: Theory and Practice

    DTIC Science & Technology

    2004-06-01

    Integral neurolinguistic programming •Placing essential programs into the conscious or sub- conscious mind •Subconscious suggestions that modify human...Generators of special rays •Optical systems • Neurolinguistic programming •Computer psychotechnology •The mass media •Audiovisual effects •Special effects...Information Warfare: Theory and Practice 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER 6. AUTHOR(S) 5d. PROJECT NUMBER 5e

  15. Considerations for the Design and Implementation of a Management Support System for the Electronic Warfare System Support Laboratory.

    DTIC Science & Technology

    1985-06-01

    Division Organization Chart . . . . . . . . . . . . . . . . 54 4.4 Uaval Air Systeis Commana Organization Relationships...56 4.5 Groups Within AIR -05 Responsible For Electronic Warfare Projects ................. 57 8 I. IN OODUCTION A. BACKGRCUNID With technological...environment. Navy, Air Force, and Army developers of EW systems utilize the EWSSL. In the past 15 years the size of the EWSSL has greatly increased

  16. Women in Combat Roles: Past and Future

    DTIC Science & Technology

    1988-03-01

    to warfare. Most intelligence officers are males whose world-view is born of conventional Eastern European stereotypic sex-role attitudes. If woman’s...warfare in any capacity except as industrial workers and quasi-servants and clerical people." (2:5) British Wome Unlike German women in both wars...changing from relatively full participation early in the conflict toward a more specialized and limited division of labor. (17:149) By October 1948

  17. Information Warfare: Legal, Regulatory, Policy and Organizational Considerations for Assurance. Second Edition.

    DTIC Science & Technology

    1996-07-04

    of Information Warfare and Strategy graduated 32 students from its 10-month senior level (war college ) program on 12 June 1996. The event marked the...1989 prosecution of Robert Tappan Morris, a Cornell University graduate student who, on November 2, 1988, released a computer worm across the...2-25 2-2-1 Constitutional Amendments with Privacy Implications .................................... 2-28 2-2-2 Privacy and Access to Government

  18. Strategic Information Warfare: Challenges for the United States.

    DTIC Science & Technology

    1998-05-01

    Professor Richard H. Shultz Jr. as Director of the International Security Studies Program at the Fletcher School, helped provide both the academic...of Information Warfare and Strategy at National Defense University; and Larry Rothenberg, Institute for Foreign Policy Analysis. Captain Richard P...War in the Information Age" in War in the Information Age. Robert L. Pfaltzgraff, Jr. and Richard P. Shultz, Jr., eds. London: Brassey’s, 1997

  19. Iran and Latin America: Strategic Security Issues

    DTIC Science & Technology

    2011-05-01

    written extensively on asymmetrical warfare. known as Carlos the Jackal )3 for helping to expand the parameters of what irregular warfare should...international furor. See: "Troops Get Provocative Book," Miami Herald, Nov. II, 2005. 4 Ian James, "Chavez Praises Carlos the Jackal ," Associated Press...November 21, 2009, accessed January 24, 20 II, at: http:/ /www.independent.co. uk!news/world/americas/chavez-praises-carlos-the- jackal - 1825135.html

  20. Human Reliability Prediction System User’s Manual

    DTIC Science & Technology

    1977-12-01

    L Oh.~Nt C.A ICIA I I OMIII ots ?if# IVte AEA AL #4001Im.4,4 up I.-. tte )’fhawA ta *(.qOtte bim.s -vtait hP lSoulp * V1CALS ChET TING 0 IKIVA ofI...on human fectorsin under- sea warfare. Washington, D.C.: Committee on Undersea Warfare, 1949. 8. Blanchard, R.E. Survey of Navy user needs for human

  1. German Views of Irregular Warfare

    DTIC Science & Technology

    2015-06-01

    closely observed much of the Napoleonic Wars (1803–1815). His military experiences occurred during the end of the Age of Absolutism10 in Europe when...10 The Age of Absolutism refers to a period when absolute monarchs controlled much of Europe and is commonly considered to...concluded with a chapter related to irregular warfare and the nuclear age and an appendix dedicated to the training notes of the famed English

  2. Yoking Unequal Oxen: Organizing Forces for Dissimilar Missions

    DTIC Science & Technology

    2012-06-01

    with Change 1 20 March 2009, I-15, V-2. 2 Michael S. Neiberg, Warfare in World History (New York: Routledge, 2001), 10-11. 3 Lynn White, Jr ., Medieval...need a greater ability to deal with guerrilla 5 Andrew F. Krepinevich, Jr ., The Army and...to show the administration the Army was taking action. The Army established the Special Warfare Directorate and placed Brig Gen William B. Rosson

  3. Listening to Historys Rhyme:Preparing the United States Army for Future Irregular Warfare

    DTIC Science & Technology

    2014-04-01

    of the most likely, which typically results in developing technologically advanced, conventional solutions to potential rivals, options poorly...What makes hybrid wars so challenging is that different elements execute the various modes of warfare and are typically coordinated at various... Morocco to train its forces on logistics, combined arms maneuver, and other skills. 72 Atlas Accord is a new exercise started in 2012 to provide

  4. Absenteeism Management

    DTIC Science & Technology

    1995-01-01

    1995 Ship Production Symposium Paper No. 24: Absenteeism Manage- ment U.S. DEPARTMENT OF THE NAVY CARDEROCK DIVISION, NAVAL SURFACE WARFARE CENTER...Paper No. 24: Absenteeism Management 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER 6. AUTHOR(S) 5d. PROJECT NUMBER 5e. TASK NUMBER...5f. WORK UNIT NUMBER 7. PERFORMING ORGANIZATION NAME(S) AND ADDRESS(ES) Naval Surface Warfare Center CD Code 2230 - Design Integration Tools Bldg

  5. Revolution or Evolution: Combined Arms Warfare in the Twenty-First Century

    DTIC Science & Technology

    1999-06-04

    of the relationship of technological development and its impact on the military . Technology has always been a major factor in the initiation, execution...this technology revolutionized warfare? 1 There has been much argument lately that the U.S. Army is participating in the latest revolution in military ...their impact on strategic concerns: The emergence of technology that has military applications is accelerating, but revolutionary changes in military

  6. Irregular Warfare Centric Foreign Internal Defense

    DTIC Science & Technology

    2013-06-01

    goods, its weak security forces and the gap unfilled by international forces.126 Scott Mann conducted a video interview on October 3 , 2012 and...Reduction Project (0704–0188) Washington DC 20503. 1. AGENCY USE ONLY (Leave blank) 2. REPORT DATE June 2013 3 . REPORT TYPE AND DATES COVERED...DISTRIBUTION CODE A 13. ABSTRACT (maximum 200 words) Conflict over the past few decades has changed drastically. Warfare changed with the conflict

  7. Absent Authority: Failure to Plan Funding and Command Authorities in USAF Security Assistance Units

    DTIC Science & Technology

    2013-03-01

    Warfare and Psychological Operations of the United States Air Force in Special Air Warfare (New York: Richards Rosen , 1969), 149. 73 Westermann...because we are naïve about the dangers we face, but because engagement can more durably lift suspicion and fear.” —President Barak Obama140...involved everyone from USSOCOM to AFSOC to the Embassy. While this worked for 140 Barak Obama

  8. Results of the Part-Task Shiphandling Trainer Pre-Prototype Training Effectiveness Evaluation (TEE)

    DTIC Science & Technology

    1985-03-01

    Navy officers from many dfferent operational and school commands were asked to visit the trainer, witness and partake in a demonstration, and evaluate...maneuvering in restricted waters. Sixty-three students from the Surface Warfare Officers School (Basic) participated in these training experiments...officers of the Surface Warfare Officer School (Basic) in Newport. - Rhode Island for their participation in this study. Special thanks is extended to

  9. Cyber-Enabled Unconventional Warfare: The Convergence of Cyberspace, Social Mobilization, and Special Warfare

    DTIC Science & Technology

    2015-12-01

    10945/31295; Roger Hilsman, American Guerrilla: My War behind Japanese Lines (Nebraska: Potomac Books, 1990); Derek Jones, “Ending the Debate...them in the war against the Japanese . Through the use of UW techniques, Detachment 101 was able to identify, recruit, indoctrinate, and... Japanese enemy. Through these proxy forces, DET 101 was able to inflict severe causalities while sustaining minimal losses to its own force (the

  10. More Effective Warfare: Warfare Waged Psychologically

    DTIC Science & Technology

    2012-06-01

    32 "Timeline of Hezbollah Violence," Committee for Accuracy in Middle East Reporting in America , accessed August 12, 2011, http...in Middle East Reporting in America . 15 objectives, as outlined by their 1985 “open letter,” were: Israel’s withdrawal from Lebanon and subsequent...repressed by Israel, America , and France and will continue fighting until Israel is eradicated from the face of the earth. There are several core

  11. Recognizing and Adapting to Unrestricted Warfare Practices by China

    DTIC Science & Technology

    2012-02-15

    Sun Zi, are of particular significance. These men taught obedience to the state, the primacy of relationships over law, and the importance of...Von Clausewitz and Baron Antoine Jomini. Whereas Clausewitz provided a theoretical strategic framework for warfare where “war is a continuation of...of family (filial Piety), ritual, loyalty, meritocracy, relationships , and the desire to avoid shame and losing face.17 Chinese rulers often used

  12. Destruction of chemical warfare surrogates using a portable atmospheric pressure plasma jet

    NASA Astrophysics Data System (ADS)

    Škoro, Nikola; Puač, Nevena; Živković, Suzana; Krstić-Milošević, Dijana; Cvelbar, Uroš; Malović, Gordana; Petrović, Zoran Lj.

    2018-01-01

    Today's reality is connected with mitigation of threats from the new chemical and biological warfare agents. A novel investigation of cold plasmas in contact with liquids presented in this paper demonstrated that the chemically reactive environment produced by atmospheric pressure plasma jet (APPJ) is potentially capable of rapid destruction of chemical warfare agents in a broad spectrum. The decontamination of three different chemical warfare agent surrogates dissolved in liquid is investigated by using an easily transportable APPJ. The jet is powered by a kHz signal source connected to a low-voltage DC source and with He as working gas. The detailed investigation of electrical properties is performed for various plasmas at different distances from the sample. The measurements of plasma properties in situ are supported by the optical spectrometry measurements, whereas the high performance liquid chromatography measurements before and after the treatment of aqueous solutions of Malathion, Fenitrothion and Dimethyl Methylphosphonate. These solutions are used to evaluate destruction and its efficiency for specific neural agent simulants. The particular removal rates are found to be from 56% up to 96% during 10 min treatment. The data obtained provide basis to evaluate APPJ's efficiency at different operating conditions. The presented results are promising and could be improved with different operating conditions and optimization of the decontamination process.

  13. Entering the Dragon’s Lair: Chinese Antiaccess Strategies and Their Implications for the United States

    DTIC Science & Technology

    2007-01-01

    possible expansion of electronic warfare into outer space in future conflicts (Peng and Yao, 2001, p. 363): As a result of the continuous development of...information warfare units to develop viruses to attack enemy computer systems and networks .” Potential Effects of Chinese Antiaccess Measures 87...computers, enhanced user identi- fication measures, and monitoring of network activity. Given the possibility that China could nonetheless succeed in

  14. Information Operations and Warfare: Fundamental Challenges for the 21st Century

    DTIC Science & Technology

    1997-05-01

    Perritt, Jr., Access To The National Information Infrastructure, 30 WAKE FOREST L. REV. 51 (1995); John I. Alger, Declaring Information War, JANE’S...Sought For Info Warfare, COMPUTERWORLD, Jun. 5, 1995, at 55 [hereinafter New Laws]; John Arquilla & David Ronfeldt, Cyberwat is Coming!, COMPARATIVE...at 82. See also John T. Correll, Signs of a Revolution, AIR FORCE MAG., Aug. 1995, at 2 ("Over the years, there have been periodic innovations

  15. Information Operations: A Research Aid Includes Coverage of: Information Warfare, Information Assurance, and Infrastructure Protection.

    DTIC Science & Technology

    1997-09-01

    Policy Implications Stephen D. Biddle, IDA Papaer P-3123 Institute for Defense Analysis (IDA), Strategy Forces and Research Division 1801 N...IDA INSTITUTE FOR DEFENSE ANALYSES Information Operations: A Research Aid Includes Coverage of: Information Warfare, Information Assurance...Gray, Principal Investigator [pBC Q^^E^ nsSSPECTBD 8’ 19980303 031 This work was conducted under IDA’S central research program. The publication of

  16. Social Mobilization, Influence, and Political Warfare: Unconventional Warfare Strategies for Shaping the 21st Century Security Environment

    DTIC Science & Technology

    2012-06-08

    This research effectively argues the existence and importance of the very “human dynamic” of social mobilization and social revolutions. While there...managed to mobilize activism and protest. Many emerged and achieved success without the luxury of modern media and communications technologies let alone...were able to achieve significant social and political effects using social mobilization and non-violent collective action. Activists in both Tunisia

  17. Plan Colombia: A Case For Political Warfare To Defeat Transnational Criminal Organizations In The Gray Zone

    DTIC Science & Technology

    2016-05-26

    Approved for public release; distribution is unlimited Plan Colombia: A Case for Political Warfare to Defeat Transnational Criminal Organizations ...to Defeat Transitional Criminal Organizations 5a. CONTRACT NUMBER in the Gray Zone 5b. GRANT NUMBER 5c. PROGRAM ELEMENT...NUMBER 6. AUTHOR(S) MAJ Kyle M. Spade 5d. PROJECT NUMBER 5e. TASK NUMBER 5f. WORK UNIT NUMBER 7. PERFORMING ORGANIZATION

  18. Unconventional Warfare: A Mission Metamorphosis for the 21st Century?

    DTIC Science & Technology

    2000-06-01

    technology, the trend for insurgent groups to use the internet to advance their cause or exploit propaganda is sure to increase. Insurgent groups using ...Zapatistas, they used “social net war” to put pressure on the Mexican government. Efforts such as this are expected to continue and are extremely important...authority of the local government or occupying power, and using primarily irregular and informal groupings and measures.246 FM 31-21 Guerrilla Warfare

  19. Conflict Without Casualties: Non-Lethal Weapons in Irregular Warfare

    DTIC Science & Technology

    2007-09-01

    the body,” and the Geneva Protocol of 1925, bans the use of chemical and biological weapons .11 On 8 April 1975, President Ford issued Executive...E Funding – PE 63851M) (accessed 15 December 2006). The American Journal of Bioethics . “Medical Ethics and Non-Lethal Weapons .” Bioethics.net...CASUALTIES: NON-LETHAL WEAPONS IN IRREGULAR WARFARE by Richard L. Scott September 2007 Thesis Advisor: Robert McNab Second Reader

  20. The Soldier-Cyborg Transformation: A Framework for Analysis of Social and Ethical Issues of Future Warfare

    DTIC Science & Technology

    1998-05-26

    attitude about the use of chemical and biologic weapons , one must question the deterrent value of WMD. With perhaps the 19 exception of nuclear...ENHANCING, TRANSFORMING AND TRANSCENDING 1 TRENDS AND PREDICTIONS ABOUT FUTURE WARFARE 3 CHANGING DEMOGRAPHICS 8 THE BIOLOGIC SHIFT 10 STRATEGIC...without widespread loss of life. Thus, low lethality weapons and distant applications of precisely- applied force are mandatory to make future

  1. Multifunctional Ultra-high Vacuum Apparatus for Studies of the Interactions of Chemical Warfare Agents on Complex Surfaces

    DTIC Science & Technology

    2014-01-02

    of the formation of a hydrogen-bonded hydroxyl. Characteristic modes of the sarin molecule itself are also ob- served. These experimental results show...chemical warfare agent, surface science, uptake, decontamination, filtration , UHV, XPS, FTIR, TPD REPORT DOCUMENTATION PAGE 11. SPONSOR/MONITOR’S...challenges that accompany the research of these toxic, often very low vapor pressure, compounds. While results of vacuum-based surface science

  2. Naval Special Warfare: Identifying and Prioritizing Core Attributes of the Profession

    DTIC Science & Technology

    2014-12-01

    literature review supports the need for research that is designed to advance the NSW profession. Analytic rigor could inform how NSW should refine its...B. SKILLS REQUIRED - WHAT (QUESTIONS 10–25, 26, 30) This research was designed to answer the following question: “What are the practical skills...NSW PRODEV: Naval Special Warfare Professional Development This research is designed to answer the following question. What are the practical

  3. American Military History and its Insights into Fourth Generation Warfare

    DTIC Science & Technology

    2006-01-01

    8William S . Lind, Colonel Keith Nightengale (USA), Captain John F. Schmitt (USMC), Colonel Joseph W. Sutton (USA), and Lieutenant Colonel Gary I. Wilson...Lind, William S ., Colonel Keith Nightengale (USA), Captain John F. Schmitt (USMC), Colonel Joseph W. Sutton (USA), and Lieutenant Colonel Gary I...military history and its insights into fourth generation warfare. 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER 6. AUTHOR( S

  4. Categorical Confusion? The Strategic Implications of Recognizing Challenges Either as Irregular or Traditional

    DTIC Science & Technology

    2012-02-01

    its perpetrator. The signature military style of irregular belligerents is guerrilla tactics privileging a hit-and-run, which is to say raiding... style in warfare. Option 2. The challenge or threat environment for the Unit- ed States does not divide neatly into menaces readily and unambiguously...appears to be a fatal flaw in the proposition that there are distinctively hybrid challenges, wars, strategies, and styles of warfare. Hybridity is not

  5. Russian Perspectives on Network-Centric Warfare: The Key Aim of Serdyukov’s Reform

    DTIC Science & Technology

    2011-01-01

    has faced with its GLObal’naya NAvigatsionnaya Sputnikovaya Sistema —(GLONASS) system, and introducing advanced digitized communications in the armed...of targeting data will be accomplished by organizing virtual channels for data transmission or via a web -portal. The successful function- ing of the...Operations: Tactical Web Takes Shape,” Signal, November 2003; Col. Alan D. Campen, USAF (Ret.), “Look Closely At Network-Centric Warfare: Technology Can

  6. The Army Research Laboratory Presents Proceedings of the Advance Planning Briefing for Industry, Providing Technology to the Soldier

    DTIC Science & Technology

    1993-01-28

    j- .FLI )ORO-EL.ASTOMERS BOOTS IF POLYMER-BLENDS SEALS COATINGS (rigid& flexible) PROGRAM FOCUS EFFECTS OF CHEMICAL AGENTS AND DECONTAMINANTS ON...threats: - Ballistic - Electronic Warfare - Nuclear - Chemical and Biological - Directed Energy GOALS AND OBJECTIVES Suiwabidy/Lefta Anasis Directorate...Proceedings APBI held at the Naval Surface Warfare Center, White Oak, Maryland on 27 - 28 January 1993 .STATEMENT 93-13681 Approved for Public Release; 1

  7. Making Riflemen from Mud: Restoring the Army’s Culture of Irregular Warfare

    DTIC Science & Technology

    2007-04-01

    Guerrilla Warfare2 In the summer of 1899, Lieutenant Matthew Batson was commanding L Troop, 4th U.S. Cavalry, during operations in the ...conquest of the Sudan completed at the Battle of Omdurman in 1898. The full line from the poem reads, “Said England unto Pharaoh, “You’ve had miracles ...neighboring tribes as well.11 11 Allen R. Millett and Peter Maslowski, For the Common Defense (New

  8. Toward Multi-Domain Battle: Combined Arms Precedents to Inform Today’s Joint Force

    DTIC Science & Technology

    2017-03-31

    of war. Americans brought about several technical and operational innovations that supported the strategic bombing campaign. Combined-Systems...defense, strategic bombing , and amphibious warfare as examples of “combined-systems revolutions.”’8 Each of these innovations took decades to develop... bombing , and amphibious warfare, each of the interwar combined- system revolutions identified by Watts and Murray, are examples of the type of cross- domain

  9. United States Air Force Training Management 2010. Volume 2. A Strategy for Superiority

    DTIC Science & Technology

    1989-03-01

    decontaminate the ramp area with the remote robotic Chemical- Biological Warfare (CBW) sterilizers. If the Chemical- Biological (CB) attacks continue, she will be...Of Skilled Craftsmen Troubles Some Firms." The Wall Street Journal. 14 September 1987, pp. 1,8. 44. Naisbitt, John. Megatrends : Ten New Directions...Computer Based Training CBW Chemical- Biological Warfare CMAS Computer-Based Maintenance Aids System CMI Computer-Managed Instruction DOD Department of

  10. The Human Drones of Isis: How 21st Century Terrorism Uses Remote Warfare

    DTIC Science & Technology

    2017-06-01

    aftermath of 9/11 is Lorenzo Vidino’s Al Qaeda in Europe. Focusing on Al Qaeda (AQ) attacks in Europe, Vidino uses case studies of the major...the main focuses of our theory-building case study . 62 “The European Union’s Policies on Counter...it will consider case studies , and conduct cross- case comparisons in order to identify gaps in existing remote warfare theory. It will further

  11. Revolution at Sea Starts Here. A 1987 History of the Naval Surface Warfare Center

    DTIC Science & Technology

    1988-03-01

    MONITORING AGENCY NAME(S) AND ADDRESS(ES) 10 . SPONSOR/MONITOR’S ACRONYM(S) 11. SPONSOR/MONITOR’S REPORT NUMBER(S) 12. DISTRIBUTION/AVAILABILITY...Blake, Mary H. Hagen, Mark E. Chase, Gary Kendrick, Barbara Wisdom, George L. Hamlin, Pamela 0. Lama, Marcella Westermeyer, and Dave Meggs. Without...needs over the next 10 to 20 years. These thrusts were to: * Emphasize development and integration of Shipboard Electronic Warfare Systems; * Increase

  12. Surface Warfare Junior Officer Retention; Spouses’ Influence on Career Decisions

    DTIC Science & Technology

    1981-08-01

    1974), and (4) Self - esteem ( Rosenberg , 1965 ). In November 1978, the survey questionnaire was mailed to a random sample of 691 male surface warfare... Rosenberg , M. Society and the adolescent self -image. Princeton, NJ: Princeton University Press, 1965 . 29 ___________ Stumpf, S. 5., & Kieckhaefer, N...these services with no loss in st.- is or self - esteem . If this approach is not sLIccessful, a separate branch of Family Service. may be required

  13. Conducting Expeditionary Operations in the Contested Littorals

    DTIC Science & Technology

    2015-10-21

    240 kg) Trim weight 2.2 lbs (1 kg) Maximum operating depth 1969 feet (600 m) Energy 5.2 kWh rechargeable lithium ion battery Endurance Typically...conducted as one part of the NPS Warfare Innovation Continuum, “Warfighting in the Contested Littorals” series of cross-campus educational and research...activities beginning in the summer of 2014 through the spring of 2015. The purpose of the Warfare Innovation Continuum is to provide a central theme

  14. Implications of the Military Reform Movement for the Army’s PPBES.

    DTIC Science & Technology

    1986-05-15

    outnumbered and outgunned. Consequently we should employ a Jacksonian/Wehrnacht style of maneuver warfare. This warfare emphasizes the use of grand scale...World Affairs, Volume 27, Number 2, Summer 1983, p. 247. Note that the particulars under the three groups were abstracted by me. 2. Kevin N. Lewis...to assure coordination. The classical solution for this problem is "gang planking ", i.e., coordination is assured because of horizontal relationships

  15. 2009 High Performance Computing Modernization Program Users Group Conference

    DTIC Science & Technology

    2009-06-17

    Asymmetric Threats Future Peer GWoT / ungoverned areas Irregular Warfare Low-end Asymmetric 1-4-2-1 (State-to-State War) Disruptive technologies Superiority...2008 “As changes in this century’s threat environment create strategic challenges – irregular warfare, weapons of mass destruction, disruptive ... technologies – this request places greater emphasis on basic research, which in recent years has not kept pace with other parts of the budget.” • Personnel

  16. Air Power and Warfare: A Supplement

    DTIC Science & Technology

    2002-02-01

    The Aeronautical History Collection of Colonel Richard Gimbel. , This bibliography, Number 99 in the Library’s Special Bibliography Series, was...H848 1992) Kohn, Richard H., and Joseph P. Harahan. Air Superiority in World War II and Korea: An Interview with Gen. James Fereuson, Gen. Robert M...Mark A. "Airpower as a Second Front." Airpowcr Journal 9 (Fall 1995): 63-73 Hallion, Richard P. "Airpower and the Changing Nature of Warfare." Joint

  17. What’s Operations Research? and Why Should We (Interagents) Care?

    DTIC Science & Technology

    2010-02-09

    OR (from DSB Report on ISR applications) – World War I • Thomas Edison led anti-submarine warfare tactics study/development – World War II • English...Operations – Joint Warfare – Resources/Readiness/Training – Acquisition – Interdisciplinary Advances in OR • Recent Special Meetings – Power and Energy...the scientific method to inform decisions • Early applications were military operations focused – Lanchester equations of combat – Anti-submarine

  18. Psychological and Unconventional Warfare, 1941-1952: Origins of a Special Warfare Capability for the United States Army

    DTIC Science & Technology

    1979-11-01

    nic -,L-dant orer unconventional wsr:fare? In shnrt, wfiat were-the pre-1952 roots of tbe’ P9ych𔃺rg1.ca1 WArfArPg Contme" artx], cMocom~tant y, the...General Robert A. McClure, 30 March 1948, from Co’.onel William S. Biddle , Assistant Chief, Plans and Policy Group, 1, 319, Plans and Operations Division

  19. Persistence and Effective Half-Life of Chemical Warfare Agent VX on Grass Foliage

    DTIC Science & Technology

    2017-08-01

    obtain results applicable to VX- contaminated battlefields. The Effective Half-Life of VX on grass foliage was determined as the net effect of factors...Soldiers on VX- contaminated battlefields. 15. SUBJECT TERMS Chemical warfare agent (CWA) Agent–plant Echinochloa crus-galli Foliage Effective Half...The use of either trade or manufacturers ’ names in this report does not constitute an official endorsement of any commercial products. This report may

  20. Stormy Waters: Technology, Sea Control and Regional Warfare

    DTIC Science & Technology

    1994-06-01

    AD-A283 945 NAVAL POSTGRADUATE SCHOOL MONTEREY, CALIFORNIA "DTIC TI ELECTETHESIS • S Sop()z 994 v G STOwM NATERS "T"CDOLOGY, SEA CNTROL AND REGIONAL... S . FUNDING NUMBERS Stormy Waters: Technology, Sea Control and Regional Warfare 6. AUTHOR( S ) David A. Schnell 7. PERFORMING ORGANIZATION NAME( S ) AND...ADDRESSRES) 8. PERFORMING ORGANIZATION Naval Postgraduate School REPORT NUMBER Monterey, CA 93943-5000 9. SPONSORING/MONITORING AGENCY NAME( S ) AND

  1. Aircraft Survivability: Modeling and Simulation Credibility, Summer 2002

    DTIC Science & Technology

    2002-01-01

    Weapons Center at China Lake in 1982 as a warfare analyst (Air-to- Air and Strike Warfare) for the Weapons Planning Group. In 1987 , he took over as...goal, the Workshop Executive Advisory Committee (WEAC) immediately fol- lowing WSII began sifting through the workshop presentations, panel discus...context is key.” V&V must be anchored to purpose (Hollenbach, pg 4) • Need to anchor across fidelity (Greaney)— maps to aggregation/de-aggregation

  2. Information Warfare and International Law

    DTIC Science & Technology

    1998-01-01

    OMB control number. 1. REPORT DATE 1998 2. REPORT TYPE 3. DATES COVERED 00-00-1998 to 00-00-1998 4. TITLE AND SUBTITLE Information Warfare and...international law where those dictates endanger or conflict with the pursuit of their fundamental interests , including national security. The Legal...34war," and may not be covered by the humanitarian provisions that attempt to lessen war’s cruelty.28 FIGURE 3 The Purpose of This Book The

  3. Maritime Trade Warfare: A Challenge to the Chinese A2/AD System

    DTIC Science & Technology

    2014-05-15

    China should only be initiated by political leadership if the decision to wage war on China has been made and the consequences of such a decision...Department of Malaysia , Government of Malaysia , accessed May 3, 2014, http://www.marine.gov.my/jlmeng/pic/article...blockade of China would be counter- productive and waging warfare focused on maritime trade is unthinkable in an era of globalization. It is true

  4. Goal Orientation Framing and Its Influence on Performance

    DTIC Science & Technology

    2012-12-01

    first-person shooter computer games Call of Duty: Modern Warfare 2 and Call of Duty: Modern Warfare 3. During the simulation, participants were...working understanding of social expectations and norms (Duda & Nicholis, 1992). It is true that obese people, drug addicts and abusive parents exist in...Monterey Student Activity Center. B. MEASURES Performance was assessed in two tests, a math test and a first-person shooter game . It was the intent of

  5. International Law: How It Affects Rules of Engagement and Responses in Information Warfare

    DTIC Science & Technology

    1997-03-01

    with the least expenditure of life, time, and physical resources. Humanity. Prohibits the employment of any kind or degree of force not necessary...the beginning of warfare, the intent has been to physically and psychologically destroy an adversary. Little consideration was given to the amount of...threat to US security interests. For example, core interests are those interests dealing with the physical survival of a country or directly threatening

  6. Bio Warfare and Terrorism: Toxins and Other Mid-Spectrum Agents

    DTIC Science & Technology

    2005-01-01

    biotechnology, toxicogenomics, toxin, tetrodotoxin, and others. Once an agent has and proteomics may also help to open the door to the 276 Bio Warfare...also interferon gamma, interleukin-6, and tumor alsointrfern gmma intrlekin6, ad tmor by the mold Aspergillus flavus and commonly conta- necrosis factor...as bullets. No the new sciences of genomics and proteomics to alter toxoid or antitoxin is available, genetic code and to affect the expression of

  7. Integration of Robotics and 3D Visualization to Modernize the Expeditionary Warfare Demonstrator (EWD)

    DTIC Science & Technology

    2009-09-01

    his schedule is. I learned most from our informal discussions and collaboration with other industry professionals. Amela was instrumental in allowing...me to effectively analyze, structure and critique my work. I take many professional lessons learned from Amela with me as I leave NPS. Thanks to...observers began learning about maneuver warfare in a large-scale battle. The demonstration was recognized as a huge success after General von Muffling

  8. The role of professionals in the South African chemical and biological warfare programme.

    PubMed

    Gould, Chandré; Folb, Peter

    2002-01-01

    This paper provides a short account of the South African Defence Force's chemical and biological warfare programme during apartheid, specifically during the period 1980 to 1994. It examines the circumstances of recruitment of the scientists and physicians and their retention in the programme; details the 'scientific efforts' of the programme and its aberrations; and explores ethical issues in relation to the involvement of scientists in the programme.

  9. Immunohistopathology in the Guinea Pig Following Chronic Low-Level Exposure to Chemical Warfare Agents

    DTIC Science & Technology

    2005-11-01

    U.S. Army Medical Research Institute of Chemical Defense USAMRICD-TR-05-09 Immunohistopathology in the Guinea Pig Following Chronic Low...2005 2. REPORT TYPE Technical Report 3. DATES COVERED (From - To) May 2003 to April 2005 4. TITLE AND SUBTITLE Immunohistopathology in the Guinea Pig Following...release; distribution unlimited 13. SUPPLEMENTARY NOTES 14. ABSTRACT Guinea pigs exposed repeatedly to low levels of chemical warfare nerve agents

  10. Development of vaccines for bio-warfare agents.

    PubMed

    Rosenthal, S R; Clifford, J C M

    2002-01-01

    There is a recognized need for the development of new vaccines (as well as other biologicals and drugs) to counteract the effects of a potential bio-terrorist or bio-warfare event in the U.S. domestic population and military forces. Regulation of products to protect against potential bio-warfare agents poses unique challenges since the usual measures of efficacy that require exposure to natural disease may not currently be possible, for epidemiological and ethical reasons. To help to address this issue, the FDA has published and requested comments on a proposed animal rule intended to address certain efficacy issues for new agents for use against lethal or permanently disabling toxic substances. Recent product development activity has focused on Bacillus anthracis (anthrax) and variola major (smallpox), agents that are regarded as highest priority in posing a risk to national security. FDA resources exist to assist vaccine developers with regard to the novel challenges posed in the dinical development of these products.

  11. The Physics of Warfare

    NASA Astrophysics Data System (ADS)

    Giordano, Gerardo

    2015-03-01

    Recently, I was tasked with the creation and execution of a new themed general education physics class called The Physics of Warfare. In the past, I had used the theme of a class, such as the physics of sports medicine, as a way to create homework and in-class activities, generate discussions, and provide an application to demonstrate that physics isn't always abstract. It is true that the examples and applications in this warfare class practically wrote themselves, but I wanted more for my students. I wanted them to embrace the iterative nature of scientific understanding. I wanted them to yearn for the breakthroughs that lead to paradigm shifts. I wanted them to demand experimental verification of each novel idea. This paper discusses the formation and implementation of a conceptual physics course, full of in-class demonstrations and solidly rooted in the context of humankind's ever-evolving methods of waging war.

  12. Long-Term Effects of Chemical Warfare on Post-traumatic Stress Disorder, Depression, and Chronic Medical Conditions in Veterans.

    PubMed

    Safi-Aghdam, Hamideh; Shafie, Mehrzad; Khoshdel, Alireza; Moazen-Zadeh, Ehsan; Avakh, Farhad; Rahmani, Arash

    2018-04-24

    We investigated the association between exposure to chemical warfare and chronic mental/physical conditions. This was a secondary analysis of data from a case-control study on Iranian male veterans. Participants with neuropsychiatric disorders other than depressive/anxiety disorders, anatomical defects, or malignancies were excluded. Compared to non-exposed veterans, exposed veterans demonstrated significantly higher odds of PTSD [OR (95% CI) = 5.23 (1.98-13.85)], hypertension [OR (95% CI) = 5.57 (1.68-18.48)], coronary heart disease [OR (95% CI) = 6.8 (1.62-28.49)], and diabetes [OR (95% CI) = 3.88 (1.35-11.16)], and marginally higher odds of moderate to severe depressive symptoms [OR (95% CI) = 2.21 (0.93-5.28)]. This study provides preliminary evidence on association of exposure to chemical warfare with long-term mental disorders as well as chronic medical conditions.

  13. Reactive skin decontamination lotion (RSDL) for the decontamination of chemical warfare agent (CWA) dermal exposure.

    PubMed

    Schwartz, M D; Hurst, C G; Kirk, M A; Reedy, S J D; Braue, E H

    2012-08-01

    Rapid decontamination of the skin is the single most important action to prevent dermal absorption of chemical contaminants in persons exposed to chemical warfare agents (CWA) and toxic industrial chemicals (TICs) as a result of accidental or intentional release. Chemicals on the skin may be removed by mechanical means through the use of dry sorbents or water. Recent interest in decontamination systems which both partition contaminants away from the skin and actively neutralize the chemical has led to the development of several reactive decontamination solutions. This article will review the recently FDA-approved Reactive Skin Decontamination Lotion (RSDL) and will summarize the toxicity and efficacy studies conducted to date. Evidence of RSDL's superior performance against vesicant and organophosphorus chemical warfare agents compared to water, bleach, and dry sorbents, suggests that RSDL may have a role in mass human exposure chemical decontamination in both the military and civilian arenas.

  14. Textile/metal-organic-framework composites as self-detoxifying filters for chemical-warfare agents.

    PubMed

    López-Maya, Elena; Montoro, Carmen; Rodríguez-Albelo, L Marleny; Aznar Cervantes, Salvador D; Lozano-Pérez, A Abel; Cenís, José Luis; Barea, Elisa; Navarro, Jorge A R

    2015-06-01

    The current technology of air-filtration materials for protection against highly toxic chemicals, that is, chemical-warfare agents, is mainly based on the broad and effective adsorptive properties of hydrophobic activated carbons. However, adsorption does not prevent these materials from behaving as secondary emitters once they are contaminated. Thus, the development of efficient self-cleaning filters is of high interest. Herein, we report how we can take advantage of the improved phosphotriesterase catalytic activity of lithium alkoxide doped zirconium(IV) metal-organic framework (MOF) materials to develop advanced self-detoxifying adsorbents of chemical-warfare agents containing hydrolysable P-F, P-O, and C-Cl bonds. Moreover, we also show that it is possible to integrate these materials onto textiles, thereby combining air-permeation properties of the textiles with the self-detoxifying properties of the MOF material. © 2015 WILEY-VCH Verlag GmbH & Co. KGaA, Weinheim.

  15. Biological Warfare at the 1346 Siege of Caffa

    PubMed Central

    2002-01-01

    On the basis of a 14th-century account by the Genoese Gabriele de’ Mussi, the Black Death is widely believed to have reached Europe from the Crimea as the result of a biological warfare attack. This is not only of great historical interest but also relevant to current efforts to evaluate the threat of military or terrorist use of biological weapons. Based on published translations of the de’ Mussi manuscript, other 14th-century accounts of the Black Death, and secondary scholarly literature, I conclude that the claim that biological warfare was used at Caffa is plausible and provides the best explanation of the entry of plague into the city. This theory is consistent with the technology of the times and with contemporary notions of disease causation; however, the entry of plague into Europe from the Crimea likely occurred independent of this event. PMID:12194776

  16. Computational models of intergroup competition and warfare.

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Letendre, Kenneth; Abbott, Robert G.

    2011-11-01

    This document reports on the research of Kenneth Letendre, the recipient of a Sandia Graduate Research Fellowship at the University of New Mexico. Warfare is an extreme form of intergroup competition in which individuals make extreme sacrifices for the benefit of their nation or other group to which they belong. Among animals, limited, non-lethal competition is the norm. It is not fully understood what factors lead to warfare. We studied the global variation in the frequency of civil conflict among countries of the world, and its positive association with variation in the intensity of infectious disease. We demonstrated that themore » burden of human infectious disease importantly predicts the frequency of civil conflict and tested a causal model for this association based on the parasite-stress theory of sociality. We also investigated the organization of social foraging by colonies of harvester ants in the genus Pogonomyrmex, using both field studies and computer models.« less

  17. General Alphonse Juin: A Case Study in Leadership and Coalition Warfare (Italy 1943-1944)

    DTIC Science & Technology

    2011-04-04

    Master of Military Studies Research Paper September 2009 - April 2010 4. TITLE AND SUBTITLE Sa. CONTRACT NUMBER GENERAL ALPHONSE JUIN .. N/A A CASE...the command of General Alphonse Juin to the Italian Campaign during World War.ll was of cri.tical importance to the Allied war effort. It enabled...Command Quantico, Virginia 22134-5068 MASTER OF :MILITARY STUDIES TITLE: GENERAL ALPHONSE JUIN A CASE STUDY IN LEADERSIDP AND COALITION WARFARE

  18. Proximal detection of chemical warfare agents using PMIRRAS

    NASA Astrophysics Data System (ADS)

    Petryk, Michael W. P.; Marenco, Armando J.

    2010-04-01

    Non-contact chemical warfare agent detection has been demonstrated on military painted surfaces using polarization modulation infrared reflection-absorption spectroscopy (PMIRRAS). Notably, VX has been detected on chemical agent resistance coating (CARC) paint at a distance of approximately 10 cm. PMIRRAS does not rely on the presence of chemical vapors and is not affected by many common battlefield interferants such as aerosolized dust, water and diesel vapors, etc., making it highly suitable for use in operational environments.

  19. Analysis of Vessels and Acquisition Methods Utilized to Support Maritime Irregular Warfare

    DTIC Science & Technology

    2010-05-27

    is the maritime component of irregular warfare (IW) or IW conducted from or on a body of water. Figure 1 identifies five fundamental IW operations as...important to examine the listed operations as they relate to MIW. Figure 7 identifies five fundamental IW operations as they relate to the maritime...designed for the insertion and extraction of SEAL team personnel. It is a twin- turbocharged diesel engine, waterjet-propelled personnel carrier with

  20. Navy Virginia (SSN-774) Class Attack Submarine Procurement: Background and Issues for Congress

    DTIC Science & Technology

    2016-02-12

    Tomahawk cruise missiles or other payloads, such as large-diameter unmanned underwater vehicles (UUVs). The Navy’s FY2016 30-year SSN procurement plan, if...again on a smaller scale than possible with the SSGNs);  covert offensive and defensive mine warfare;  anti-submarine warfare (ASW); and  anti...Tomahawk cruise missiles or other payloads, such as large-diameter unmanned underwater vehicles (UUVs). 17 The four additional launch tubes in the

  1. Joint Force Quarterly. Issue 52, 1st Quarter, January 2009

    DTIC Science & Technology

    2009-01-01

    hazard potential n self -contained operations with minimal heat or waste effluents n largely robotic operation n inherently safe operation volume...Moreover, even if a node is destroyed or a link cut, these systems are self - healing , allowing them to continue functioning with no apparent degra...Maxie Y. Davis, and Lee T. Wight 97 Irregular Warfare Is Warfare By Kenneth C. Coons, Jr., and Glenn M. Harned 104 Wired for War? Robots and Military

  2. Joint Special Operations University SOF-Power Workshop: A Way Forward for Special Operations Theory and Strategic Art

    DTIC Science & Technology

    2011-08-01

    participants‘ particular points of view and may be helpful in researching, developing, testing, and explaining theory. The Secret War in Laos was...Jan 1985. Tse -Tung, Mao. On Guerrilla Warfare. Praeger, New York: 1961. The Use and Utility of Force; Force Fungibles Art, Robert J. and...Penguin Books, New York: 1968. Griffith, Samuel B., (BrigGen (Ret) USMC). On Guerrilla Warfare – Mao Tse -Tung. Praeger, New York: 1961

  3. Camouflage and Deception Techniques for Urban Warfare

    DTIC Science & Technology

    1980-10-01

    ý 1 97418W / 7. AU"Olil’a) . CONTRACT GA GRANT NUMBER~o) 06. 01911TRMUINORGANIATIOENT NAME AND ADRSS1. RGRMELM ROETTS Cappoulagad forpubl apic ...of air to achieve rigidity as well as~ flotation . lii’ dco br g wohll le iul~lvel iiear real rilbbonl bridlges in order to con1fuse ellicini...A.. (PT. Spain. "~Attackingr and Defending, Populated Places?" Military Review, (October 19414). Felts. Robert. "Urban Warfare. Emerging Material

  4. The Need For Continued Development Of Ricin Countermeasures

    DTIC Science & Technology

    2012-01-01

    ricin was code named compound W and considered for weapon - ization during the US offensive Biological Warfare Program [3]. The US intelligence community...similarly maintained that ricin is more compatible with a tool of assassination instead of a weapon of mass destruc- tion [42]. However, Radosavljevic...Nottingham, A Survey of Chemical and Bio - logical Warfare, vol. 6, Monthly Review Press, New York, NY, USA, 1969. [4] M. A. Poli, C. Roy, K. D. Huebner, D. R

  5. Weathering the Cyber Storm: The Military’s Resiliency to Cyber Attacks in Future Warfare

    DTIC Science & Technology

    2012-06-01

    observation. While the ability to collect intelligence is important, it falls under a different rubric than warfare itself. 20 Another term worth...the use of antivirus programs, firewalls, and security policies. These measures also fall under the rubric of information assurance, or “measures that...specifying how it is to be accomplished.” of genetic diversity. 13 A complaint after Operation Iraqi Freedom (OIF) was that soldiers had to

  6. Unorthodox Thoughts about Asymmetric Warfare

    DTIC Science & Technology

    2003-01-01

    Unorthodox Thoughts about Asymmetric Warfare MONTGOMERY C. MEIGS “Bad terminology is the enemy of good thinking.” — Warren Buffett 1 I n the last few...Mr. Buffett , the Sage of Omaha, and agree on a set of definitions that will provide our tools for analysis. In preempting the terrorist are we really...still apt. 10. Warren Bennis and Burt Nanus, Leaders (New York: HarperCollins, 1997), pp. 102-40. Bennis and Nanus provide a useful construct for

  7. Factors Influencing the Use of Child Soldiers in Armed Conflicts: Perspectives on Liberia and a Way Forward for Future Wars

    DTIC Science & Technology

    2016-06-10

    and international laws that have jurisdictions over non-state actors amid changing twenty-first century threats impacting warfare today. 15...international laws that have jurisdictions over non-state actors amid changing twenty-first century threats impacting warfare today. v ACKNOWLEDGMENTS Let...States.25 By the late 1910 and early 1920s, this mismatch in culture soon resulted in conflicts between the settlers and natives and generally impacted

  8. Potential Science and Technology Game Changers for the Ground Warfare of 2050: Selected Projections Made in 2017

    DTIC Science & Technology

    2018-02-01

    ARL-TR-8283 ● FEB 2018 US Army Research Laboratory Potential Science and Technology Game Changers for the Ground Warfare of 2050...report when it is no longer needed. Do not return it to the originator. ARL-TR-8283 ● FEB 2018 US Army Research Laboratory Potential...ARL Kwong Choi and Joseph Mait Sensors and Electron Devices Directorate, ARL Brad Forch and Shashi Karna Weapons and Materials Research

  9. C3 in Maneuver Warfare: The Expanding Role of the Communications Officer

    DTIC Science & Technology

    1991-04-01

    command, control, and communications (C3 ) process employed within the Marine Air Ground Task Force (MAGTF). Over the past two decades, the rapid...information to the right people at the right time. This paper presents a philosophical understanding of maneuver C3 and the communication officer’s...necessary to support maneuver warfare. Figure 1 depicts; thi:; dual role of C3 and serves as an outline for our paper . Maneuver C3 Architecture

  10. The Alpini Effect: Why the US Army Should Train Units for Mountain Warfare

    DTIC Science & Technology

    2014-05-22

    than on training units and its leaders how to conduct mountain warfare.34 MOUNTAINS AND WHERE THEY ARE It is essential to understand what a...The first level is considered key terrain in counterinsurgencies, such as what the US Army has experienced in Afghanistan, because this is where...copyrighted. 40Andrew Young, “Distance to the Horizon,” San Diego State Department of Astronomy , http://mintaka.sdsu.edu/GF/explain/atmos_refr

  11. The Inadequacy of Definition and the Utility of a Theory of Hybrid Conflict: Is the Hybrid Threat New?

    DTIC Science & Technology

    2012-05-17

    Era of Persistent Conflict, edited by Paul Brister, William H. Natter III, & Robert R. Tomes, 60-69. Washington, DC: CENSA, 2011. Gott, Kendall G...Conflict.” In Hybrid Warfare and Transnational Threats: Perspectives for an Era of Persistent Conflict, edited by Paul Brister, William H. Natter...Hybrid Warfare and Transnational Threats: Perspectives for an Era of Persistent Conflict, edited by Paul Brister, William H. Natter III, & Robert R

  12. Statistical Analysis of Warfare: Identification of Winning Factors with a Focus on Irregular Warfare

    DTIC Science & Technology

    2015-09-01

    Defense HERO Historical Evaluation and Research Organization IDPs Internally Displaced Persons IFR Initial Force Ratio INITA Relative Imitative...armies started combating non-state, widely dispersed groups. Although this change appears to be quite simple, it has had a deep impact on military...1789–1961: A Study of the Impact of the French, Industrial, and Russian Revolutions on War and its Conduct (Boston, MA: Da Capo Press, 1992). 10 Ibid

  13. Ending the Debate: Unconventional Warfare, Foreign Internal Defense, and Why Words Matter

    DTIC Science & Technology

    2006-06-01

    JCS] apparently was fearful of what it perceived to be the stigma of having the military accused of engaging in subrosa [sic], cloak -and­ dagger ...was fearful of what it perceived to be the stigma of having the military accused of engaging in sub-rosa, cloak - and- dagger activities in the event of...disrupted by the terrorist attacks of 11 September. Less than two years later, Special Forces had successfully prosecuted two unconventional warfare

  14. War gaming for strategic and tactical nuclear warfare. January 1970-January 1988 (citations from the NTIS data base). Report for January 1970-January 1988

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Not Available

    1988-01-01

    This bibliography contains citations concerning non-quick war gaming for strategic and tactical nuclear warfare. Analyses and comparative evaluations, based upon computerized simulations, are considered as are manuals and specification for the various computer programs employed. Stage 64 and Satan II and III are covered prominently. (This updated bibliography contains 356 citations, 36 of which are new entries to the previous edition.)

  15. CYBER THREAT AWARENESS FOR THE WARFIGHTER

    DTIC Science & Technology

    2016-02-16

    Writing on the future of cyber warfare, Col William Poirier and Maj James Lotspeich posit that eventually advances in the Air Force’s cyber...Defending the Walls,” 3. 7 Col William J. Poirier and Maj James Lotspeich, “Air Force Cyber Warfare - Now and the Future,” Air and Space Power Journal 27...and Associated Terms, 8 November 2010. http://www.dtic.mil/doctrine/new_pubs/jp1_02.pdf. Poirier , Col William J., and Lotspeich, Maj James. “Air

  16. Seeking Shadows in the Sky: The Strategy of Air Guerrilla Warfare

    DTIC Science & Technology

    2001-11-01

    Structuring Air Power for the Small Air Force,” in Air Power Confronts an Unstable World, ed. Richard P. Hallion (London: Brassey’s, 1997), 181. 12...Santa Monica, Calif.: RAND, 1997), 207. 6. Air Commodore Andrew G. B. Vallance , “The Changing Nature of Air Warfare,” in Air Power Confronts an...Unstable World, ed. Richard P. Hallion (London: Brassey’s, 1997), xv; and Alan Stephens, The Implications of Modern Airpower for Defence Strategy, Air

  17. Trade-offs Between Command and Control Architectures and Force Capabilities Using Battlespace Awareness

    DTIC Science & Technology

    2014-06-01

    information superiority in Network- centric warfare .34 A brief discussion of the implementation of battlespace awareness is given. The method 3 Figure 2...developing the model used for this study. Lanchester Equations,39 System Dynamics models,40–42 Discrete Event Simulation, and Agent-based models (ABMs) were...popularity in the military modeling community in recent years due to their ability to effectively capture complex interactions in warfare scenarios with many

  18. The Implications of the Rise of China’s Military for Mongolian Security

    DTIC Science & Technology

    2010-06-01

    Regional Forum ASAT – Anti-satellite ASUW – Anti- surface warfare ASW – Antisubmarine Warfare AWACS – Airborne Warning and Control System CCP – Chinese...Military Region NAM – Non-Aligned Movements NATO – North Atlantic Treaty Organization NCO – Non-commissioned Officer NWFZ – Nuclear-Weapon- Free Zone...currency ROC – Republic of China RRU – Rapid Reaction Units SAM – Surface to Air Missile SCO – Shanghai Cooperation Organization SIPRI – Stockholm

  19. Control of Supercavitating Vehicles using Transverse Jets

    DTIC Science & Technology

    2016-03-15

    All experiments reported here were conducted at the Naval Undersea Warfare Center (NUWC) closed loop research water tunnel in Newport, RI . The...parts of the assembly. The second element considered was tte loss term associated with flow restriction across the orifice which was modeled by the...completed his M.S. in Mechanical Engineering from California State University, Northridge in August 2015. Navy Lab Mentor Dr. Charles W. Henoch, Hydrodynamics Branch, Naval Undersea Warfare Center, Newport, RI. 49

  20. The Effect of Shipboard Design Decisions in Amphibious Warfare

    DTIC Science & Technology

    2012-06-01

    appreciate all that you have done for me over the past 18 months. Lastly, I would like to thank The Bosn for teaching me all about amphibs and...amphibious warfare field of expertise were also conducted to gain firsthand knowledge and gather data. Once all of the data were collected, a comparative...the U.S. entered World War II, Japan was able to extend their empire across the entire Pacific Ocean relatively unopposed, which in all probably led

  1. The Threat of the Premium Tank: The Product and Process of the Soviet Experience

    DTIC Science & Technology

    1992-06-05

    one of the Soviet Army’s most significant developments in land warfare remains. The demonstrated capability to develop, produce, and field innovative ...T-34, it clearly did not display the innovations and advanced capabilities that would bring Soviet post-war heavy tanks and the modern premium tank on...antitank warfare caused by the historically demonstrated capability to develop, produce, and field innovative and high technology tanks must be prevented

  2. Measuring the Operational Readiness of an Air Force Network Warfare Squadron

    DTIC Science & Technology

    2008-06-01

    Abstract As part of its unit activation, the 315th Network Warfare Squadron (NWS) needed to measure and report its progression of unit readiness...NWS unit readiness should be measured and reported by SORTS Category Levels (C-Level) to support wartime missions, not by IOC and FOC milestones...This paper reviews SORTS computations and provides a case study of a notional Air Force NWS to propose that any new cyber squadron should report

  3. Combat Pair: The Evolution of Air Force-Navy Integration in Strike Warfare

    DTIC Science & Technology

    2007-01-01

    Force–Navy Integration in Strike Warfare our departure for the carrier. I am equally indebted to Rear Admiral David Buss , USN, at the time Commanding... mari - time component commander (CFMCC) in Enduring Freedom, Vice Admiral Charles Moore, Jr., who drew a sharp contrast between the spotty...fired several Ababil 100 theater ballistic missiles at Kuwait in a response to the opening U.S. attack, the Navy’s Arleigh Burke -class destroyer USS

  4. Bugs, Gas, and Joint Maritime Operations--Are we Immune?

    DTIC Science & Technology

    1992-06-19

    asPira::on - and an opp rtunity. ŗ Even with the collapse of Soviet communism , there are powers who would challenge our aspirations: a technological ... technological data are used to analyze the effects of chemica’l warfare on joint naval operations throughout the continuum of peace, conflict and war. A judgement...IM1MUNE? Historical and technological data are used to analyze the effects of chemical warfare on joint naval operations throughout the continuum of

  5. Naval Postgraduate School Research. Volume 9, Number 3, October 1999

    DTIC Science & Technology

    1999-10-01

    this effort so far. It is an exciting field. “ Quantum computers are the atomic bomb of the information age ,” according to Professor Baer, “ but it...Transactions on Image Processing, Octo- ber 1999 R. Hippenstiel and U. Aktas, “Difference of Arrival Estimation Using Wavelet Transforms,” 42nd Midwest...Electronic Warfare Conference Naval Air Warfare Center (SECRET) 23-24 Jun 00 Thirty-Fifth Annual Colonel Allyn D. Burke Memorial U.S. Army Dental Symposium

  6. Flattening the Learning Curve: SOF as the Supported Command in the Irregular Warfare Environment

    DTIC Science & Technology

    2012-06-01

    Afghanistan and the Troubled Future of Unconventional Warfare (Annapolis: Naval Institute Press, 2006). 45 Hy Rothstein, A Tale of Two Wars – Why...In recognition that all future wars and conflicts will be engaged in in a joint manner, something must be done to ensure that GPF have a base...CODE A 13. ABSTRACT (maximum 200 words) When the United States commits forces to a war , overseas contingency operations, or any other large

  7. Sandals and Robes to Business Suits and Gulf Streams: Warfare in the 21st Century

    DTIC Science & Technology

    2011-04-20

    movements and the extremist environments in which these movements operate. However, much like a franchise business enterprise, AQ is expanding its...2011, Small Wars Foundation April 20, 2011 Sandals and Robes to Business Suits and Gulf Streams: Warfare in the 21st Century by MG Michael T...comfortable in sandals and robes as they are wearing business suits and flying around the world in gulfstream aircraft. As confident in their ability to

  8. Nanoplatforms for Detection, Remediation and Protection Against Chem-Bio Warfare

    NASA Astrophysics Data System (ADS)

    Denkbaş, E. B.; Bayram, C.; Kavaz, D.; Çirak, T.; Demirbilek, M.

    Chemical and biological substances have been used as warfare agents by terrorists by varying degree of sophistication. It is critical that these agents be detected in real-time with high level of sensitively, specificity, and accuracy. Many different types of techniques and systems have been developed to detect these agents. But there are some limitations in these conventional techniques and systems. Limitations include the collection, handling and sampling procedures, detection limits, sample transfer, expensive equipment, personnel training, and detection materials. Due to the unique properties such as quantum effect, very high surface/volume ratio, enhanced surface reactivity, conductivity, electrical and magnetic properties of the nanomaterials offer great opportunity to develop very fast, sensitive, accurate and cost effective detection techniques and systems to detect chemical and biological (chem.-bio) warfare agents. Furthermore, surface modification of the materials is very easy and effective way to get functional or smart surfaces to be used as nano-biosensor platform. In that respect many different types of nanomaterials have been developed and used for the detection, remediation and protection, such as gold and silver nanoparticles, quantum dots, Nano chips and arrays, fluorescent polymeric and magnetic nanoparticles, fiber optic and cantilever based nanobiosensors, nanofibrillar nanostructures etc. This study summarizes preparation and characterization of nanotechnology based approaches for the detection of and remediation and protection against chem.-bio warfare agents.

  9. Iron-montmorillonite clays as active sorbents for the decontamination of hazardous chemical warfare agents.

    PubMed

    Carniato, F; Bisio, C; Evangelisti, C; Psaro, R; Dal Santo, V; Costenaro, D; Marchese, L; Guidotti, M

    2018-02-27

    A class of heterogeneous catalysts based on commercial bentonite from natural origin, containing at least 80 wt% of montmorillonite clay, was designed to transform selectively and under mild conditions toxic organosulfur and organophosphorus chemical warfare agents into non-noxious products with a reduced impact on health and environment. The bentonite from the natural origin was modified by introducing iron species and acid sites in the interlayer space, aiming to obtain a sorbent with strong catalytic oxidising and hydrolytic properties. The catalytic performance of these materials was evaluated in the oxidative abatement of (2-chloroethyl)ethyl sulfide (CEES), a simulant of sulfur mustard, in the presence of aqueous hydrogen peroxide as an oxidant. A new decontamination formulation was, moreover, proposed and obtained by mixing sodium perborate, as a solid oxidant, to iron-bentonite catalysts. Solid-phase decontamination tests, performed on a cotton textile support contaminated with organosulfide and organophosphonate simulant agents revealed the good activity of the solid formulation, especially in the in situ detoxification of blistering agents. Tests carried out on the real blistering warfare agent, sulfur mustard (HD agent), showed that, thanks to the co-presence of the iron-based clay together with the solid oxidant component, a good decontamination of the test surface from the real warfare agent could be achieved (80% contaminant degradation, under ambient conditions, in 24 h).

  10. Quality of Life in Iranian Chemical Warfare Veteran's.

    PubMed

    Ebadi, Abbas; Moradian, Tayeb; Mollahadi, Mohsen; Saeed, Yaser; Refahi, Ali Akbar

    2014-05-01

    Mustard gas has different effects on different body systems such as respiratory tract, blood, gastrointestinal, skin, eye, endocrine and peripheral nervous system. The purpose of this study was to determine the quality of life in chemical warfare veterans due to sulfur mustard exposure. In a cross-sectional and analytic study, 242 patients who had a chemical injury during the Iran-Iraq war (1980-1983) and their lung damage was proven were investigated in our study. The quality of life was measured in these patients using an extensively validated Iranian version of SF-36. The mean age of veterans was 44.12 ± 4.9 ranging from 22 to 62 years. Our results showed that chemical warfare had a decreased quality of life in all subscales of the SF-36. The lowest scores in SF-36 subscales were related to role physical and general health. The data also showed a significant relationship between the number of organs involved and the quality of life in these patients (P < 0.001, r = - 0.33). So that the patients who had more than three organs involved had lower quality of life. 95.4% of our participants experienced another complication with respiratory complication and the ophthalmologic complications were the most frequent accompanying condition. The results imply that chemical warfare survivors suffering from late complications have a low health related quality of life.

  11. Quality of Life in Iranian Chemical Warfare Veteran's

    PubMed Central

    Ebadi, Abbas; Moradian, Tayeb; Mollahadi, Mohsen; Saeed, Yaser; Refahi, Ali Akbar

    2014-01-01

    Background: Mustard gas has different effects on different body systems such as respiratory tract, blood, gastrointestinal, skin, eye, endocrine and peripheral nervous system. Objectives: The purpose of this study was to determine the quality of life in chemical warfare veterans due to sulfur mustard exposure. Patients and Methods: In a cross-sectional and analytic study, 242 patients who had a chemical injury during the Iran-Iraq war (1980-1983) and their lung damage was proven were investigated in our study. The quality of life was measured in these patients using an extensively validated Iranian version of SF-36. Results: The mean age of veterans was 44.12 ± 4.9 ranging from 22 to 62 years. Our results showed that chemical warfare had a decreased quality of life in all subscales of the SF-36. The lowest scores in SF-36 subscales were related to role physical and general health. The data also showed a significant relationship between the number of organs involved and the quality of life in these patients (P < 0.001, r = − 0.33). So that the patients who had more than three organs involved had lower quality of life. 95.4% of our participants experienced another complication with respiratory complication and the ophthalmologic complications were the most frequent accompanying condition. Conclusions: The results imply that chemical warfare survivors suffering from late complications have a low health related quality of life. PMID:25031863

  12. A model for warfare in stratified small-scale societies: The effect of within-group inequality.

    PubMed

    Pandit, Sagar; Pradhan, Gauri; van Schaik, Carel

    2017-01-01

    In order to predict the features of non-raiding human warfare in small-scale, socially stratified societies, we study a coalitionary model of war that assumes that individuals participate voluntarily because their decisions serve to maximize fitness. Individual males join the coalition if war results in a net economic and thus fitness benefit. Within the model, viable offensive war ensues if the attacking coalition of males can overpower the defending coalition. We assume that the two groups will eventually fuse after a victory, with ranks arranged according to the fighting abilities of all males and that the new group will adopt the winning group's skew in fitness payoffs. We ask whether asymmetries in skew, group size and the amount of resources controlled by a group affect the likelihood of successful war. The model shows, other things being equal, that (i) egalitarian groups are more likely to defeat their more despotic enemies, even when these are stronger, (ii) defection to enemy groups will be rare, unless the attacked group is far more despotic than the attacking one, and (iii) genocidal war is likely under a variety of conditions, in particular when the group under attack is more egalitarian. This simple optimality model accords with several empirically observed correlations in human warfare. Its success underlines the important role of egalitarianism in warfare.

  13. A model for warfare in stratified small-scale societies: The effect of within-group inequality

    PubMed Central

    Pandit, Sagar; van Schaik, Carel

    2017-01-01

    In order to predict the features of non-raiding human warfare in small-scale, socially stratified societies, we study a coalitionary model of war that assumes that individuals participate voluntarily because their decisions serve to maximize fitness. Individual males join the coalition if war results in a net economic and thus fitness benefit. Within the model, viable offensive war ensues if the attacking coalition of males can overpower the defending coalition. We assume that the two groups will eventually fuse after a victory, with ranks arranged according to the fighting abilities of all males and that the new group will adopt the winning group’s skew in fitness payoffs. We ask whether asymmetries in skew, group size and the amount of resources controlled by a group affect the likelihood of successful war. The model shows, other things being equal, that (i) egalitarian groups are more likely to defeat their more despotic enemies, even when these are stronger, (ii) defection to enemy groups will be rare, unless the attacked group is far more despotic than the attacking one, and (iii) genocidal war is likely under a variety of conditions, in particular when the group under attack is more egalitarian. This simple optimality model accords with several empirically observed correlations in human warfare. Its success underlines the important role of egalitarianism in warfare. PMID:29228014

  14. Guerilla Warfare on the Pancreas? A Case of Acute Pancreatitis From a Supplement Known to Contain Anabolic-Androgenic Steroids.

    PubMed

    Liane, Billy-Joe; Magee, Charles

    2016-10-01

    Performance-enhancing drugs (PEDs) are commonly consumed in the United States with high prevalence of use in athlete populations and increased use by deployed service members. Many PEDs may contain anabolic-androgenic steroids (AAS), which are legally restricted and prohibited by many agencies due to their health risk. A unique case of acute pancreatitis associated with the use of the PED "Guerilla Warfare," a labeled AAS-containing supplement, is presented. The patient is a healthy 20-year-old male Marine who presented with multiple episodes of abdominal cramps each day for a month with decreased appetite and nonbilious vomiting. He reported a 6-week history of "Guerilla Warfare" PED use and review of systems identified fatigue and 12 lb reported weight loss. He presented with normal vital signs, tenderness in upper abdominal quadrants, elevated lipase (909 units/L), lactate dehydrogenase (193 units/L), and an enlarged pancreas with surrounding inflammation on computed tomography. This constitutes the first report of acute pancreatitis with the use of "Guerilla Warfare," and the second reported case with the use of any AAS-containing PED. Increased awareness of significant PED-associated adverse effects by both the civilian and military communities is needed to better characterize these risks moving forward. Reprint & Copyright © 2016 Association of Military Surgeons of the U.S.

  15. Management of chemical warfare injuries (on CD-ROM). Data file

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    NONE

    1996-08-01

    The threat of use of chemical warfare agents (agents of `mass destruction`) is no longer confined to the battlefield. Agent releases by terrorists in Japan in 1995 served to awaken the world to the dangers faced by civilian communities far removed from centers of armed conflict. The ability to save lives in the event of a chemical agent release turns on provision of immediate and correct medical care in the field and hospital. Being able to ensure availability of life-saving care depends on reaching both military and civilian medical personnel with information on chemical warfare agents and on keeping theirmore » skills and knowledge current. While this is of critical importance both to the Department of Defense and to civilian agencies charged with protecting the public, it also is a daunting and potentially expensive task in view of the numbers and geographic dispersion of persons to be trained. The Department of Defense has addressed and overcome these challenges, to the benefit of the military and civilians, by using computer technology as the vehicle by which cost-effective chemical warfare agent training may be conveniently delivered to all who require it. The multi-media instructional program, Management of Chemical Warfare Injuries, was developed for military use by the Naval Health Sciences Education and Training Command, with the technical assistance of the U.S. Army Medical Command. It was originally designed for delivery via video disc, a format used extensively within the Navy. However, in response to a request from the Federal Emergency Management Agency, the Office of the Secretary of Defense agreed to repackage the materials for delivery on CD-ROM in order to make them accessible to a larger audience. In addition, the Navy agreed to include on the two CD-ROMs which contain the program a ready reference not found on the video disc: the Army`s `Medical Management of Chemical Casualties` handbooks for field and medical personnel.« less

  16. The Effect of Graduate Education Timing on the Retention of Surface Warfare Officers

    DTIC Science & Technology

    2016-03-01

    DATES COVERED Master’s thesis 4 . TITLE AND SUBTITLE THE EFFECT OF GRADUATE EDUCATION TIMING ON THE RETENTION OF SURFACE WARFARE OFFICERS 5. FUNDING...of graduated education attainment on retention to the tenth, eleventh, and twelfth year of service as well as promotion to O- 4 . The findings show...Department Heads earning a master’s degree at any point within their careers are more likely to promote to O- 4 , compared with those who had not

  17. Chemical warfare nerve agents. A review of cardiopulmonary pathophysiology and resuscitation. Technical report

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Franz, D.R.

    1986-12-01

    The purpose of this document is to provide the medical research community with a digest of the open and internal literature related to cardiopulmonary pathophysiology, resuscitation, and animal modeling of chemical warfare nerve agent intoxication. Though not comprehensive, this review makes available to the reader a cross section of what research was done in this small but important part of the medical chemical defense research program between World War II and the early 1980's.

  18. Intelligence and Electronic Warfare (IEW) Streamlining Project. Volume 1. Sustainment Analysis Report. Revision

    DTIC Science & Technology

    1992-10-30

    I Sustainment Analysis Report Accesion For NTIS CRA&I DTIC 1 AP- U. an-;o u,ced [] jj ~~~Y INSPECTED 5 Js~~~o By.......... ............ Dit Ib ’tiot...ELECTRONIC WARFARE (1EW) STREAMUNING PROJECT Vohune I Sustainment Analysis Report Revised October 30, 1992 93-29047 The views, opinions, and findings...Streamlining Project, C OPM-91-2964 Volume I, Sustainment Analysis Report PR 02TO2K 6. AUTHORIS) David P. Nicholas, Robert E. Klebo. Wolodymyr J. Mokey

  19. Leadership of Cyber Warriors: Enduring Principles and New Directions

    DTIC Science & Technology

    2011-07-11

    cyber warfare threat against the United States, the creation of United States Cyber Command and the designation of cyberspace as a warfighting domain now necessitate study of the attributes of successful cyber warfare leaders and the leadership techniques required to successfully lead cyber warriors. In particular, we must develop an understanding of where traditional kinetic leadership paradigms succeed, where they fail, and where new techniques must be adopted. Leadership is not a one size fits all endeavor. The capabilities and characteristics of

  20. Naval Coastal Warfare Operations from 2000 to Operation Iraqi Freedom and the Deficiencies that Prompted their Addition to the Naval Expeditionary Combat Command

    DTIC Science & Technology

    2009-11-02

    overmatched small boats sought refuge with the Boutwell but very little could be done and the 25ft boats were sent back to MABOT under the escort of a zodiac ...NAVAL COASTAL WARFARE OPERATIONS FROM 2000 TO OPERATION IRAQI FREEDOM AND THE DEFICIENCIES THAT PROMPTED THEIR ADDITION TO THE NAVAL EXPEDITIONARY...including the time for reviewing instructions, searching existing data sources, gathering and maintaining the data needed, and completing and reviewing

Top