Member agencies of the intelligence community (IC) collect, maintain, and store large amounts of data. There is a profusion of sensors and communications options that has led to a dramatic escalation in the amount of data readily available for a wide variety of purposes. Much more data are being created than are being deleted. But a large fraction, as much as 30 to 35 percent of enterprise data, is data that are rarely accessed (with weeks to years elapsing between uses) and may sit for a long period of time. This poses a challenge because it means that, worldwide, a massive number of exabytes of data need to be securely maintained, managed, and administered in some sort of way. Additionally, the amount of data that will need to be archived for short- and long-term use will continue to rise. In particular, the IC has the potential to be one of the largest customers for cold data storage because of its wide-ranging need for information.
At the request of the Office of the Director of National Intelligence (ODNI), this Rapid Expert Consultation (REC) explores options for technologies for archival data storage, focusing primarily on current data storage technologies, particularly magnetic storage, Flash, MRAM, and optical storage. While not all of these technologies are well suited to archival storage applications, the ODNI indicated a desire to hear about all possible options. Brief overviews of emerging technologies are included. Finally, the REC offers comments on the importance of non-technological aspects of archiving, including policies and personnel, which should be considered in the design and acquisition of long-term data storage systems.
Topics: Computers and Information Technology » Information Security and Privacy | Conflict and Security Issues » Policy, Reviews and Evaluations
U.S. leadership in technology innovation is central to our nation’s interests, including its security, economic prosperity, and quality of life. Our nation has created a science and technology ecosystem that fosters innovation, risk taking, and the discovery of new ideas that lead to new technologies through robust collaborations across and within academia, industry, and government, and our research and development enterprise has attracted the best and brightest scientists, engineers, and entrepreneurs from around the world. The quality and openness of our research enterprise have been the basis of our global leadership in technological innovation, which has brought enormous advantages to our national interests.
In today’s rapidly changing landscapes of technology and competition, however, the assumption that the United States will continue to hold a dominant competitive position by depending primarily on its historical approach of identifying specific and narrow technology areas requiring controls or restrictions is not valid. Further challenging that approach is the proliferation of highly integrated and globally shared platforms that power and enable most modern technology applications.
To review the protection of technologies that have strategic importance for national security in an era of openness and competition, Protecting U.S. Technological Advantage considers policies and practices related to the production and commercialization of research in domains critical to national security. This report makes recommendations for changes to technology protection policies and practices that reflect the current realities of how technologies are developed and incorporated into new products and processes.
Topics: Conflict and Security Issues » Prevention, Security and Response | Conflict and Security Issues » Weapons and Technology | Conflict and Security Issues » Policy, Reviews and Evaluations
The Department of Defense operates several ranges across all service branches to test the effectiveness of military systems in the land, sea, air, space, and cyberspace domains. These ranges and infrastructure represent a critical part of the DoD acquisition and systems development process.
The DoD's Office of Test and Evaluation (DOT&E) has asked the Board on Army Research and Development to assess how effectively these ranges fulfill DOT&E's mission to determine operational effectiveness and lethality of systems currently under development. This study will specifically evaluate whether these ranges are prepared to simulate threats, countermeasures, and operations against near-peer adversaries. This publication is the unclassified version of the classified report.
Topics: Conflict and Security Issues » Military and Defense Studies | Conflict and Security Issues » Prevention, Security and Response | Conflict and Security Issues » Policy, Reviews and Evaluations
At the request of the Chief of Naval Operations, the National Academies of Sciences, Engineering, and Medicine conducted a classified study that examined U.S. Naval Forces' capabilities to maintain operational effectiveness in the face of an adversary's efforts to deny and degrade mission-critical data. This abbreviated version of the report includes the information available for the public.
Topics: Conflict and Security Issues » Military and Defense Studies | Conflict and Security Issues » Policy, Reviews and Evaluations
At the request of then-Chief of Naval Operations Admiral John Richardson, the National Academies of Sciences, Engineering, and Medicine appointed an expert committee to study the extent to which state-of-the-art data science, data analytics, networking, communications, and architecture approaches could be potentially applied to broader U.S. Naval Forces' "decision space" needs to ensure that the speed and flexibility of the Navy's decision-making process is better than that of its potential adversaries. The Department of the Navy has determined that the full report prepared by the Committee on Maintaining Operational Effectiveness for U.S. Naval Forces in Highly Degraded Environments—Phase 1 is subject to Department of Defense (DoD) Distribution Statement D: Release Restricted to DoD and DoD Contractors. This abbreviated report provides additional information on the full report and the committee that prepared it. Copies of the full report will be available to authorized individuals in DoD from the National Academies' Naval Studies Board. Other requests for the report should be submitted to the Department of the Navy.
Topics: Conflict and Security Issues » Weapons and Technology | Conflict and Security Issues » Military and Defense Studies | Conflict and Security Issues » Policy, Reviews and Evaluations
The National Academies of Sciences, Engineering, and Medicine was asked to articulate a 5-year strategic vision for international health security programs and provide findings and recommendations on how to optimize the impact of the Department of Defense (DOD) Biological Threat Reduction Program (BTRP) in fulfilling its biosafety and biosecurity mission. Because BTRP is just one of several U.S. government programs conducting international health security engagement, both the strategic vision and the success of the program rely on coordinating actions with the U.S. government as a whole and with its international partners. This report provides several recommendations for optimizing BTRP success in its current mission and the wider-looking strategic vision it proposes.
Topics: Conflict and Security Issues » Biosecurity | Conflict and Security Issues » Prevention, Security and Response | Conflict and Security Issues » Policy, Reviews and Evaluations
The Committee on Initial Closure Planning for the Blue Grass and Pueblo Chemical Agent Destruction Pilot Plants was tasked to review documents related to the closure of legacy chemical demilitarization plants and use their expert judgment to identify key areas and issues that should be considered when planning for closing Blue Grass and Pueblo Chemical Agent Destruction Pilot Plants (BGCAPP and PCAPP). This letter report presents those key issues in the following three broad categories: decontamination and hazardous waste; worker safety and industrial hygiene; and environmental safety, regulations, and permitting.
Topics: Conflict and Security Issues » Military and Defense Studies | Conflict and Security Issues » Policy, Reviews and Evaluations
This study originated with congressionally directed language from the House Permanent Select Committee for Intelligence (HPSCI) in 2016 and titled “Acquisition Strategies for Future Space Based Optics”. This publication is an unclassified summary of the classified report.
Topics: Conflict and Security Issues » Military and Defense Studies | Conflict and Security Issues » Weapons and Technology | Space and Aeronautics » Space Systems and Hardware
Scientific advances over the past several decades have accelerated the ability to engineer existing organisms and to potentially create novel ones not found in nature. Synthetic biology, which collectively refers to concepts, approaches, and tools that enable the modification or creation of biological organisms, is being pursued overwhelmingly for beneficial purposes ranging from reducing the burden of disease to improving agricultural yields to remediating pollution. Although the contributions synthetic biology can make in these and other areas hold great promise, it is also possible to imagine malicious uses that could threaten U.S. citizens and military personnel. Making informed decisions about how to address such concerns requires a realistic assessment of the capabilities that could be misused.
Biodefense in the Age of Synthetic Biology explores and envisions potential misuses of synthetic biology. This report develops a framework to guide an assessment of the security concerns related to advances in synthetic biology, assesses the levels of concern warranted for such advances, and identifies options that could help mitigate those concerns.
Topics: Biology and Life Sciences » Biotechnology | Conflict and Security Issues » Military and Defense Studies
Improvised explosive devices (IEDs) are a type of unconventional explosive weapon that can be deployed in a variety of ways, and can cause loss of life, injury, and property damage in both military and civilian environments. Terrorists, violent extremists, and criminals often choose IEDs because the ingredients, components, and instructions required to make IEDs are highly accessible. In many cases, precursor chemicals enable this criminal use of IEDs because they are used in the manufacture of homemade explosives (HMEs), which are often used as a component of IEDs.
Many precursor chemicals are frequently used in industrial manufacturing and may be available as commercial products for personal use. Guides for making HMEs and instructions for constructing IEDs are widely available and can be easily found on the internet. Other countries restrict access to precursor chemicals in an effort to reduce the opportunity for HMEs to be used in IEDs. Although IED attacks have been less frequent in the United States than in other countries, IEDs remain a persistent domestic threat. Restricting access to precursor chemicals might contribute to reducing the threat of IED attacks and in turn prevent potentially devastating bombings, save lives, and reduce financial impacts.
Reducing the Threat of Improvised Explosive Device Attacks by Restricting Access to Explosive Precursor Chemicals prioritizes precursor chemicals that can be used to make HMEs and analyzes the movement of those chemicals through United States commercial supply chains and identifies potential vulnerabilities. This report examines current United States and international regulation of the chemicals, and compares the economic, security, and other tradeoffs among potential control strategies.
Topics: Conflict and Security Issues » Weapons and Technology | Conflict and Security Issues » Prevention, Security and Response | Math, Chemistry, and Physics » Chemistry
At the request of the Special Cyber Operations Research and Engineering (SCORE) Interagency Working Group and sponsored with assistance from the National Science Foundation and from the Office of the Director of National Intelligence, the National Academies of Sciences, Engineering, and Medicine appointed an expert committee to explore future research goals and directions for cybersecurity. The committee for this multi-phased sequential study considered future research goals and directions for foundational science in cybersecurity, and included relevant efforts in economics and behavioral science as well as more “traditional” cybersecurity topics. It considered major challenge problems, explored proposed new directions, identified gaps in the current portfolio, considered the complementary roles of research in unclassified and classified settings, and considered how foundational work in an unclassified setting can be translated to meet national security objectives. This abbreviated annex provides background information on the full classified annex resulting from the study.
Topics: Computers and Information Technology » Information Security and Privacy | Conflict and Security Issues » Prevention, Security and Response
The academic biomedical research community is a hub of employment, economic productivity, and scientific progress. Academic research institutions are drivers of economic development in their local and state economies and, by extension, the national economy. Beyond the economic input that the academic biomedical research community both receives and provides, it generates knowledge that in turn affects society in myriad ways.
The United States has experienced and continues to face the threat of disasters, and, like all entities, the academic biomedical research community can be affected. Recent disasters, from hurricanes to cyber-attacks, and their consequences have shown that the investments of the federal government and of the many other entities that sponsor academic research are not uniformly secure. First and foremost, events that damage biomedical laboratories and the institutions that house them can have impacts on the safety and well-being of humans and research animals. Furthermore, disasters can affect career trajectories, scientific progress, and financial stability at the individual and institutional levels.
Strengthening the Disaster Resilience of the Academic Biomedical Research Community offers recommendations and guidance to enhance the disaster resilience of the academic biomedical research community, with a special focus on the potential actions researchers, academic research institutions, and research sponsors can take to mitigate the impact of future disasters.
Topics: Conflict and Security Issues » Disaster Response
The National Academies of Sciences, Engineering, and Medicine was asked by the Assistant Secretary of the Air Force for Science, Technology and Engineering to assess the threat of high-speed weapons and recommendations to counter the threat. This report reviews the current and evolving threats, and the current and planned U.S. efforts and capabilities to counter these threats, identifies current gaps and future opportunities where the United States Air Force (USAF) could provide significant contribution to the U.S. effort to counter high-speed threats, and recommends actions the USAF could take in terms of materiel, non-materiel, and technology development to address the identified opportunities and gaps in U.S. efforts to address these threats.
Topics: Conflict and Security Issues » Weapons and Technology | Conflict and Security Issues » Military and Defense Studies
The U.S. Congress asked the National Academy of Sciences to conduct a technical study on lessons learned from the Fukushima Daiichi nuclear accident for improving safety and security of commercial nuclear power plants in the United States. This study was carried out in two phases: Phase 1, issued in 2014, focused on the causes of the Fukushima Daiichi accident and safety-related lessons learned for improving nuclear plant systems, operations, and regulations exclusive of spent fuel storage. This Phase 2 report focuses on three issues: (1) lessons learned from the accident for nuclear plant security, (2) lessons learned for spent fuel storage, and (3) reevaluation of conclusions from previous Academies studies on spent fuel storage.
Topics: Conflict and Security Issues » Prevention, Security and Response | Conflict and Security Issues » Disaster Response | Environment and Environmental Studies » Radiation | Energy and Energy Conservation » Policy, Reviews and Evaluations
At the request of the former Chief of Naval Operations, the National Academies of Sciences, Engineering, and Medicine appointed an expert committee to assess the potential of unmanned undersea vehicles (UUVs) in enhancing future U.S. naval operations. The Department of the Navy has determined that the final report prepared by the committee is restricted in its entirety under exemption 3 of the Freedom of Information Act (5 USC § 552 (b) (3)), via 10 USC § 130 and therefore cannot be made available to the public. This abbreviated report provides background information on the full report and the committee that prepared it.
Topics: Conflict and Security Issues » Weapons and Technology | Conflict and Security Issues » Military and Defense Studies
River and coastal floods are among the nation's most costly natural disasters. One component in the nation's approach to managing flood risk is availability of flood insurance policies, which are offered on an individual basis primarily through the National Flood Insurance Program (NFIP). Established in 1968, the NFIP is overseen by the Federal Emergency Management Agency (FEMA) and there are about 5.4 million individual policies in the NFIP. The program has experienced a mixture of successes and persistent challenges. Successes include a large number of policy holders, the insurance of approximately $1.3 trillion of property, and the fact that the large majority of policy holders - 80% - pay rates that are risk based. NFIP challenges include large program debt, relatively low rates of purchase in many flood-prone areas, a host of issues regarding affordability of premiums, ensuring that premiums collected cover payouts and administrative fees, and a large number of properties that experience severe repetitive flood losses.
At the request of FEMA, A Community-Based Flood Insurance Option identifies a range of key issues and questions that would merit consideration and further analysis as part of a community-based flood insurance program. As the report describes, the community-based option certainly offers potential benefits, such as the prospect of providing coverage for all (or nearly all) at-risk residents and properties in flood-prone communities. At the same time, many current challenges facing the NFIP may not necessarily be resolved by a community-based approach. This report discusses these and other prominent issues to be considered and further assessed.
Topics: Conflict and Security Issues » Disaster Response | Environment and Environmental Studies » Environmental Health and Safety | Math, Chemistry, and Physics » Math and Statistics | Surveys and Statistics » Surveys and Statistics
In the devastation that follows a major disaster, there is a need for multiple sectors to unite and devote new resources to support the rebuilding of infrastructure, the provision of health and social services, the restoration of care delivery systems, and other critical recovery needs. In some cases, billions of dollars from public, private and charitable sources are invested to help communities recover. National rhetoric often characterizes these efforts as a "return to normal." But for many American communities, pre-disaster conditions are far from optimal. Large segments of the U.S. population suffer from preventable health problems, experience inequitable access to services, and rely on overburdened health systems. A return to pre-event conditions in such cases may be short-sighted given the high costs - both economic and social - of poor health. Instead, it is important to understand that the disaster recovery process offers a series of unique and valuable opportunities to improve on the status quo. Capitalizing on these opportunities can advance the long-term health, resilience, and sustainability of communities - thereby better preparing them for future challenges.
Healthy, Resilient, and Sustainable Communities After Disasters identifies and recommends recovery practices and novel programs most likely to impact overall community public health and contribute to resiliency for future incidents. This book makes the case that disaster recovery should be guided by a healthy community vision, where health considerations are integrated into all aspects of recovery planning before and after a disaster, and funding streams are leveraged in a coordinated manner and applied to health improvement priorities in order to meet human recovery needs and create healthy built and natural environments. The conceptual framework presented in Healthy, Resilient, and Sustainable Communities After Disasters lays the groundwork to achieve this goal and provides operational guidance for multiple sectors involved in community planning and disaster recovery.
Healthy, Resilient, and Sustainable Communities After Disasters calls for actions at multiple levels to facilitate recovery strategies that optimize community health. With a shared healthy community vision, strategic planning that prioritizes health, and coordinated implementation, disaster recovery can result in a communities that are healthier, more livable places for current and future generations to grow and thrive - communities that are better prepared for future adversities.
Topics: Health and Medicine » Public Health and Prevention | Conflict and Security Issues » Disaster Response
Diplomacy for the 21st Century recommends steps that the department should embrace in order to take full advantage of the leading science and technology (S&T) capabilities of the United States. These capabilities provide the department with many opportunities to promote a variety of the interests of the United States and its allies in a rapidly changing world wherein S&T are important drivers of economic development at home and abroad and help ensure international security. This summary version highlights the main ideas and key messages of the full report.
Topics: Conflict and Security Issues » Prevention, Security and Response | Conflict and Security Issues » Policy, Reviews and Evaluations
Every year, the U.S. Army must select from an applicant pool in the hundreds of thousands to meet annual enlistment targets, currently numbering in the tens of thousands of new soldiers. A critical component of the selection process for enlisted service members is the formal assessments administered to applicants to determine their performance potential. Attrition for the U.S. military is hugely expensive. Every recruit that does not make it through basic training or beyond a first enlistment costs hundreds of thousands of dollars. Academic and other professional settings suffer similar losses when the wrong individuals are accepted into the wrong schools and programs or jobs and companies. Picking the right people from the start is becoming increasingly important in today's economy and in response to the growing numbers of applicants. Beyond cognitive tests of ability, what other attributes should selectors be considering to know whether an individual has the talent and the capability to perform as well as the mental and psychological drive to succeed?
Measuring Human Capabilities: An Agenda for Basic Research on the Assessment of Individual and Group Performance Potential for Military Accession examines promising emerging theoretical, technological, and statistical advances that could provide scientifically valid new approaches and measurement capabilities to assess human capability. This report considers the basic research necessary to maximize the efficiency, accuracy, and effective use of human capability measures in the military's selection and initial occupational assignment process. The research recommendations of Measuring Human Capabilities will identify ways to supplement the Army's enlisted soldier accession system with additional predictors of individual and collective performance. Although the primary audience for this report is the U.S. military, this book will be of interest to researchers of psychometrics, personnel selection and testing, team dynamics, cognitive ability, and measurement methods and technologies. Professionals interested in of the foundational science behind academic testing, job selection, and human resources management will also find this report of interest.
Topics: Behavioral and Social Sciences » Defense and Security | Behavioral and Social Sciences » Human Systems and Technology | Conflict and Security Issues » Military and Defense Studies
In order to conduct operations successfully and defend its capabilities against all warfighting domains, many have warned the Department of Defense (DoD) of the severity of the cyber threat and called for greater attention to defending against potential cyber attacks. For several years, many within and outside DoD have called for even greater attention to addressing threats to cyberspace.
At the request of the Chief of Naval Operations, the National Research Council appointed an expert committee to review the U.S. Navy's cyber defense capabilities. The Department of the Navy has determined that the final report prepared by the committee is classified in its entirety under Executive Order 13526 and therefore cannot be made available to the public. A Review of U.S. Navy Cyber Defense Capabilities is the abbreviated report and provides background information on the full report and the committee that prepared it.
Topics: Conflict and Security Issues » Prevention, Security and Response | Conflict and Security Issues » Military and Defense Studies | Computers and Information Technology » Information Security and Privacy
The March 11, 2011, Great East Japan Earthquake and tsunami sparked a humanitarian disaster in northeastern Japan. They were responsible for more than 15,900 deaths and 2,600 missing persons as well as physical infrastructure damages exceeding $200 billion. The earthquake and tsunami also initiated a severe nuclear accident at the Fukushima Daiichi Nuclear Power Station. Three of the six reactors at the plant sustained severe core damage and released hydrogen and radioactive materials. Explosion of the released hydrogen damaged three reactor buildings and impeded onsite emergency response efforts. The accident prompted widespread evacuations of local populations, large economic losses, and the eventual shutdown of all nuclear power plants in Japan.
Lessons Learned from the Fukushima Nuclear Accident for Improving Safety and Security of U.S. Nuclear Plants is a study of the Fukushima Daiichi accident. This report examines the causes of the crisis, the performance of safety systems at the plant, and the responses of its operators following the earthquake and tsunami. The report then considers the lessons that can be learned and their implications for U.S. safety and storage of spent nuclear fuel and high-level waste, commercial nuclear reactor safety and security regulations, and design improvements. Lessons Learned makes recommendations to improve plant systems, resources, and operator training to enable effective ad hoc responses to severe accidents. This report's recommendations to incorporate modern risk concepts into safety regulations and improve the nuclear safety culture will help the industry prepare for events that could challenge the design of plant structures and lead to a loss of critical safety functions.
In providing a broad-scope, high-level examination of the accident, Lessons Learned is meant to complement earlier evaluations by industry and regulators. This in-depth review will be an essential resource for the nuclear power industry, policy makers, and anyone interested in the state of U.S. preparedness and response in the face of crisis situations.
Topics: Conflict and Security Issues » Prevention, Security and Response | Conflict and Security Issues » Disaster Response | Environment and Environmental Studies » Radiation | Energy and Energy Conservation » Policy, Reviews and Evaluations
Recent serious and sometimes fatal accidents in chemical research laboratories at United States universities have driven government agencies, professional societies, industries, and universities themselves to examine the culture of safety in research laboratories. These incidents have triggered a broader discussion of how serious incidents can be prevented in the future and how best to train researchers and emergency personnel to respond appropriately when incidents do occur. As the priority placed on safety increases, many institutions have expressed a desire to go beyond simple compliance with regulations to work toward fostering a strong, positive safety culture: affirming a constant commitment to safety throughout their institutions, while integrating safety as an essential element in the daily work of laboratory researchers.
Safe Science takes on this challenge. This report examines the culture of safety in research institutions and makes recommendations for university leadership, laboratory researchers, and environmental health and safety professionals to support safety as a core value of their institutions. The report discusses ways to fulfill that commitment through prioritizing funding for safety equipment and training, as well as making safety an ongoing operational priority.
A strong, positive safety culture arises not because of a set of rules but because of a constant commitment to safety throughout an organization. Such a culture supports the free exchange of safety information, emphasizes learning and improvement, and assigns greater importance to solving problems than to placing blame. High importance is assigned to safety at all times, not just when it is convenient or does not threaten personal or institutional productivity goals. Safe Science will be a guide to make the changes needed at all levels to protect students, researchers, and staff.
Topics: Math, Chemistry, and Physics » Chemistry | Policy for Science and Technology » Research and Data | Conflict and Security Issues » Biosecurity
The summary version of Emerging and Readily Available Technologies and National Security distills the findings and recommendations of the complete report into a a booklet format.
The full report is available here.
Topics: Conflict and Security Issues » Policy, Reviews and Evaluations
Emerging and Readily Available Technologies and National Security is a study on the ethical, legal, and societal issues relating to the research on, development of, and use of rapidly changing technologies with low barriers of entry that have potential military application, such as information technologies, synthetic biology, and nanotechnology. The report also considers the ethical issues associated with robotics and autonomous systems, prosthetics and human enhancement, and cyber weapons. These technologies are characterized by readily available knowledge access, technological advancements that can take place in months instead of years, the blurring of lines between basic research and applied research, and a high uncertainty about how the future trajectories of these technologies will evolve and what applications will be possible.
Emerging and Readily Available Technologies and National Security addresses topics such as the ethics of using autonomous weapons that may be available in the future; the propriety of enhancing the physical or cognitive capabilities of soldiers with drugs or implants or prosthetics; and what limits, if any, should be placed on the nature and extent of economic damage that cyber weapons can cause. This report explores three areas with respect to emerging and rapidly available technologies: the conduct of research; research applications; and unanticipated, unforeseen, or inadvertent ethical, legal, and societal issues. The report articulates a framework for policy makers, institutions, and individual researchers to think about issues as they relate to these technologies of military relevance and makes recommendations for how each of these groups should approach these considerations in its research activities. Emerging and Readily Available Technologies and National Security makes an essential contribution to incorporate the full consideration of ethical, legal, and societal issues in situations where rapid technological change may outpace our ability to foresee consequences.
Topics: Conflict and Security Issues » Policy, Reviews and Evaluations
At the request of the former Chief of Naval Operations, the National Research Council appointed an expert committee to examine U.S. Naval Forces' capabilities for responding to the potential exploitation of small vessels by adversaries. The Department of the Navy determined that the report prepared by the committee is classified in its entirety under Executive Order 13526 and therefore cannot be made available to the public. This abbreviated report provides background information on the full report and the committee that prepared it.
Topics: Conflict and Security Issues » Military and Defense Studies | Conflict and Security Issues » Prevention, Security and Response
A letter dated December 21, 2011, to National Academy of Sciences President Dr. Ralph Cicerone from the Chief of Naval Operations, ADM Jonathan W. Greenert, U.S. Navy, requested that the National Research Council's (NRC's) Naval Studies Board (NSB) conduct a study to examine the issues surrounding capability surprise—both operationally and technically related—facing the U.S. naval services. Accordingly, in February 2012, the NRC, under the auspices of its NSB, established the Committee on Capability Surprise for U.S. Naval Forces. The study's terms of reference, provided in Enclosure A of this interim report, were formulated by the Office of the Chief of Naval Operations (CNO) in consultation with the NSB chair and director. The terms of reference charge the committee to produce two reports over a 15-month period. The present report is the first of these, an interim report issued, as requested, following the third full committee meeting.
The terms of reference direct that the committee in its two reports do the following: (1) Select a few potential capability surprises across the continuum from disruptive technologies, to intelligence inferred capability developments, through operational deployments and assess what U.S. Naval Forces are doing (and could do) about these surprises while mindful of future budgetary declines; (2) Review and assess the adequacy of current U.S. Naval Forces' policies, strategies, and operational and technical approaches for addressing these and other surprises; and (3) Recommend any changes, including budgetary and organizational changes, as well as identify any barriers and/or leadership issues that must be addressed for responding to or anticipating such surprises including developing some of our own surprises to mitigate against unanticipated surprises.
Capability Surprise for U.S. Naval Forces: Initial Observations and Insights: Interim Report highlights issues brought to the committee's attention during its first three meetings and provides initial observations and insights in response to each of the three tasks above. It is very much an interim report that neither addresses in its entirety any one element of the terms of reference nor reaches final conclusions on any aspect of capability surprise for naval forces. The committee will continue its study during the coming months and expects to complete by early summer 2013 its final report, which will address all of the elements in the study's terms of reference and explore many potential issues of capability surprise for U.S. naval forces not covered in this interim report.
Topics: Conflict and Security Issues » Military and Defense Studies
In 2012, the Defense Intelligence Agency (DIA) approached the National Research Council and asked that a committee be formed to develop a list of workshop topics to explore the impact of emerging science and technology. One topic that came out of that list was directed evolution for development and production of bioactive agents. This workshop was held on February 21-22, 2013.
Directed Evolution for Development and Production of Bioactive Agents explains the objectives of the workshop, which were to explore the potential use of directed evolution1 for military science and technology. Understanding the current research in this area, and the potential opportunities for U.S. adversaries to use this research, might allow the DIA to advise U.S. policy makers in an appropriate and timely manner. The workshop featured invited presentations and discussions that aimed to:
-Inform the U.S. intelligence community of the current status of directed evolution technology and related research, and
-Discuss possible approaches involving directed evolution that might be used by an adversary to develop toxic biological agents that could pose a threat to the United States or its allies, and how they could be identified.
Members of the Committee on Science and Technology for Defense Warning planned the agenda for the workshop, selected the presenters, and helped moderate discussions in which meeting participants probed issues of national security related to directed evolution in an effort to gain an understanding of potential vulnerabilities. Experts were invited from the areas of directed evolution, biosynthesis, detection, and biological agents.
Topics: Conflict and Security Issues » Prevention, Security and Response | Conflict and Security Issues » Policy, Reviews and Evaluations
Topics: Conflict and Security Issues » Prevention, Security and Response | Environment and Environmental Studies » Waste Disposal and Clean Up
Climate change can reasonably be expected to increase the frequency and intensity of a variety of potentially disruptive environmental events—slowly at first, but then more quickly. It is prudent to expect to be surprised by the way in which these events may cascade, or have far-reaching effects. During the coming decade, certain climate-related events will produce consequences that exceed the capacity of the affected societies or global systems to manage; these may have global security implications. Although focused on events outside the United States, Climate and Social Stress: Implications for Security Analysis recommends a range of research and policy actions to create a whole-of-government approach to increasing understanding of complex and contingent connections between climate and security, and to inform choices about adapting to and reducing vulnerability to climate change.
Topics: Environment and Environmental Studies » Climate Change | Behavioral and Social Sciences » Environment and Society | Behavioral and Social Sciences » Defense and Security | Earth Sciences » Climate, Weather and Meteorology | Conflict and Security Issues » Policy, Reviews and Evaluations
No person or place is immune from disasters or disaster-related losses. Infectious disease outbreaks, acts of terrorism, social unrest, or financial disasters in addition to natural hazards can all lead to large-scale consequences for the nation and its communities. Communities and the nation thus face difficult fiscal, social, cultural, and environmental choices about the best ways to ensure basic security and quality of life against hazards, deliberate attacks, and disasters. Beyond the unquantifiable costs of injury and loss of life from disasters, statistics for 2011 alone indicate economic damages from natural disasters in the United States exceeded $55 billion, with 14 events costing more than a billion dollars in damages each.
One way to reduce the impacts of disasters on the nation and its communities is to invest in enhancing resilience—the ability to prepare and plan for, absorb, recover from and more successfully adapt to adverse events. Disaster Resilience: A National Imperative addresses the broad issue of increasing the nation's resilience to disasters. This book defines "national resilience", describes the state of knowledge about resilience to hazards and disasters, and frames the main issues related to increasing resilience in the United States. It also provide goals, baseline conditions, or performance metrics for national resilience and outlines additional information, data, gaps, and/or obstacles that need to be addressed to increase the nation's resilience to disasters. Additionally, the book's authoring committee makes recommendations about the necessary approaches to elevate national resilience to disasters in the United States.
Enhanced resilience allows better anticipation of disasters and better planning to reduce disaster losses-rather than waiting for an event to occur and paying for it afterward. Disaster Resilience confronts the topic of how to increase the nation's resilience to disasters through a vision of the characteristics of a resilient nation in the year 2030. Increasing disaster resilience is an imperative that requires the collective will of the nation and its communities. Although disasters will continue to occur, actions that move the nation from reactive approaches to disasters to a proactive stance where communities actively engage in enhancing resilience will reduce many of the broad societal and economic burdens that disasters can cause.
Topics: Earth Sciences » Earthquakes, Floods and Natural Disasters | Policy for Science and Technology » Policy for Science and Technology | Conflict and Security Issues » Disaster Response
The electric power delivery system that carries electricity from large central generators to customers could be severely damaged by a small number of well-informed attackers. The system is inherently vulnerable because transmission lines may span hundreds of miles, and many key facilities are unguarded. This vulnerability is exacerbated by the fact that the power grid, most of which was originally designed to meet the needs of individual vertically integrated utilities, is being used to move power between regions to support the needs of competitive markets for power generation. Primarily because of ambiguities introduced as a result of recent restricting the of the industry and cost pressures from consumers and regulators, investment to strengthen and upgrade the grid has lagged, with the result that many parts of the bulk high-voltage system are heavily stressed.
Electric systems are not designed to withstand or quickly recover from damage inflicted simultaneously on multiple components. Such an attack could be carried out by knowledgeable attackers with little risk of detection or interdiction. Further well-planned and coordinated attacks by terrorists could leave the electric power system in a large region of the country at least partially disabled for a very long time. Although there are many examples of terrorist and military attacks on power systems elsewhere in the world, at the time of this study international terrorists have shown limited interest in attacking the U.S. power grid. However, that should not be a basis for complacency. Because all parts of the economy, as well as human health and welfare, depend on electricity, the results could be devastating.
Terrorism and the Electric Power Delivery System focuses on measures that could make the power delivery system less vulnerable to attacks, restore power faster after an attack, and make critical services less vulnerable while the delivery of conventional electric power has been disrupted.
Topics: Conflict and Security Issues » Prevention, Security and Response | Energy and Energy Conservation » Energy Use, Supply, Demand | Conflict and Security Issues » Policy, Reviews and Evaluations
Catastrophic disasters occurring in 2011 in the United States and worldwide—from the tornado in Joplin, Missouri, to the earthquake and tsunami in Japan, to the earthquake in New Zealand—have demonstrated that even prepared communities can be overwhelmed. In 2009, at the height of the influenza A (H1N1) pandemic, the Assistant Secretary for Preparedness and Response at the Department of Health and Human Services, along with the Department of Veterans Affairs and the National Highway Traffic Safety Administration, asked the Institute of Medicine (IOM) to convene a committee of experts to develop national guidance for use by state and local public health officials and health-sector agencies and institutions in establishing and implementing standards of care that should apply in disaster situations-both naturally occurring and man-made-under conditions of scarce resources.
Building on the work of phase one (which is described in IOM's 2009 letter report, Guidance for Establishing Crisis Standards of Care for Use in Disaster Situations), the committee developed detailed templates enumerating the functions and tasks of the key stakeholder groups involved in crisis standards of care (CSC) planning, implementation, and public engagement-state and local governments, emergency medical services (EMS), hospitals and acute care facilities, and out-of-hospital and alternate care systems. Crisis Standards of Care provides a framework for a systems approach to the development and implementation of CSC plans, and addresses the legal issues and the ethical, palliative care, and mental health issues that agencies and organizations at each level of a disaster response should address. Please note: this report is not intended to be a detailed guide to emergency preparedness or disaster response. What is described in this report is an extrapolation of existing incident management practices and principles.
Crisis Standards of Care is a seven-volume set: Volume 1 provides an overview; Volume 2 pertains to state and local governments; Volume 3 pertains to emergency medical services; Volume 4 pertains to hospitals and acute care facilities; Volume 5 pertains to out-of-hospital care and alternate care systems; Volume 6 contains a public engagement toolkit; and Volume 7 contains appendixes with additional resources.
Topics: Health and Medicine » Emergency Medicine | Health and Medicine » Public Health and Prevention | Conflict and Security Issues » Disaster Response
The practice of engineering is continually changing. Engineers today must be able not only to thrive in an environment of rapid technological change and globalization, but also to work on interdisciplinary teams. Cutting-edge research is being done at the intersections of engineering disciplines, and successful researchers and practitioners must be aware of developments and challenges in areas that may not be familiar to them.
At the U.S. Frontiers of Engineer Symposium, engineers have the opportunity to learn from their peers about pioneering work being done in many areas of engineering. Frontiers of Engineering 2011: Reports on Leading-Edge Engineering from the 2011 Symposium highlights the papers presented at the event. This book covers four general topics from the 2011 symposium: additive manufacturing, semantic processing, engineering sustainable buildings, and neuro-prosthetics. The papers from these presentations provide an overview of the challenges and opportunities of these fields of inquiry, and communicate the excitement of discovery.
Topics: Engineering and Technology » Construction: Design, Research, Planning | Conflict and Security Issues » Military and Defense Studies
If terrorists released Bacillus anthracis over a large city, hundreds of thousands of people could be at risk of the deadly disease anthrax-caused by the B. anthracis spores-unless they had rapid access to antibiotic medical countermeasures (MCM). Although plans for rapidly delivering MCM to a large number of people following an anthrax attack have been greatly enhanced during the last decade, many public health authorities and policy experts fear that the nation's current systems and plans are insufficient to respond to the most challenging scenarios, such as a very large-scale anthrax attack. The U.S. Department of Health and Human Services' Office of the Assistant Secretary for Preparedness and Response commissioned the Institute of Medicine to examine the potential uses, benefits, and disadvantages of strategies for repositioning antibiotics. This involves storing antibiotics close to or in the possession of the people who would need rapid access to them should an attack occur.
Prepositioning Antibiotics for Anthrax reviews the scientific evidence on the time window in which antibiotics successfully prevent anthrax and the implications for decision making about prepositioning, describes potential prepositioning strategies, and develops a framework to assist state, local, and tribal public health authorities in determining whether prepositioning strategies would be beneficial for their communities. However, based on an analysis of the likely health benefits, health risks, and relative costs of the different prepositioning strategies, the book also develops findings and recommendations to provide jurisdictions with some practical insights as to the circumstances in which different prepositioning strategies may be beneficial. Finally, the book identifies federal- and national-level actions that would facilitate the evaluation and development of prepositioning strategies.
Recognizing that communities across the nation have differing needs and capabilities, the findings presented in this report are intended to assist public health officials in considering the benefits, costs, and trade-offs involved in developing alternative prepositioning strategies appropriate to their particular communities.
Topics: Health and Medicine » Public Health and Prevention | Conflict and Security Issues » Prevention, Security and Response | Conflict and Security Issues » Biosecurity
During the last decade, national and international scientific organizations have become increasingly engaged in considering how to respond to the biosecurity implications of developments in the life sciences and in assessing trends in science and technology (S&T) relevant to biological and chemical weapons nonproliferation. The latest example is an international workshop, Trends in Science and Technology Relevant to the Biological Weapons Convention, held October 31 - November 3, 2010 at the Institute of Biophysics of the Chinese Academy of Sciences in Beijing.
Life Sciences and Related Fields summarizes the workshop, plenary, and breakout discussion sessions held during this convention. Given the immense diversity of current research and development, the report is only able to provide an overview of the areas of science and technology the committee believes are potentially relevant to the future of the Biological and Toxic Weapons Convention (BWC), although there is an effort to identify areas that seemed particularly ripe for further exploration and analysis. The report offers findings and conclusions organized around three fundamental and frequently cited trends in S&T that affect the scope and operation of the convention:
The report does not make recommendations about policy options to respond to the implications of the identified trends. The choice of such responses rests with the 164 States Parties to the Convention, who must take into account multiple factors beyond the project's focus on the state of the science.
Topics: Biology and Life Sciences » Biotechnology | Conflict and Security Issues » Weapons and Technology | Conflict and Security Issues » Biosecurity
The United States will certainly be subject to damaging earthquakes in the future. Some of these earthquakes will occur in highly populated and vulnerable areas. Coping with moderate earthquakes is not a reliable indicator of preparedness for a major earthquake in a populated area. The recent, disastrous, magnitude-9 earthquake that struck northern Japan demonstrates the threat that earthquakes pose. Moreover, the cascading nature of impacts-the earthquake causing a tsunami, cutting electrical power supplies, and stopping the pumps needed to cool nuclear reactors-demonstrates the potential complexity of an earthquake disaster. Such compound disasters can strike any earthquake-prone populated area. National Earthquake Resilience presents a roadmap for increasing our national resilience to earthquakes.
The National Earthquake Hazards Reduction Program (NEHRP) is the multi-agency program mandated by Congress to undertake activities to reduce the effects of future earthquakes in the United States. The National Institute of Standards and Technology (NIST)-the lead NEHRP agency-commissioned the National Research Council (NRC) to develop a roadmap for earthquake hazard and risk reduction in the United States that would be based on the goals and objectives for achieving national earthquake resilience described in the 2008 NEHRP Strategic Plan. National Earthquake Resilience does this by assessing the activities and costs that would be required for the nation to achieve earthquake resilience in 20 years.
National Earthquake Resilience interprets resilience broadly to incorporate engineering/science (physical), social/economic (behavioral), and institutional (governing) dimensions. Resilience encompasses both pre-disaster preparedness activities and post-disaster response. In combination, these will enhance the robustness of communities in all earthquake-vulnerable regions of our nation so that they can function adequately following damaging earthquakes. While National Earthquake Resilience is written primarily for the NEHRP, it also speaks to a broader audience of policy makers, earth scientists, and emergency managers.
Topics: Earth Sciences » Earthquakes, Floods and Natural Disasters | Earth Sciences » Policy, Reviews and Evaluations | Conflict and Security Issues » Disaster Response
Less than a month after the September 11, 2001 attacks, letters containing spores of anthrax bacteria (Bacillus anthracis, or B. anthracis) were sent through the U.S. mail. Between October 4 and November 20, 2001, 22 individuals developed anthrax; 5 of the cases were fatal.
During its investigation of the anthrax mailings, the FBI worked with other federal agencies to coordinate and conduct scientific analyses of the anthrax letter spore powders, environmental samples, clinical samples, and samples collected from laboratories that might have been the source of the letter-associated spores. The agency relied on external experts, including some who had developed tests to differentiate among strains of B. anthracis. In 2008, seven years into the investigation, the FBI asked the National Research Council (NRC) of the National Academy of Sciences (NAS) to conduct an independent review of the scientific approaches used during the investigation of the 2001 B. anthracis mailings.
Review of the Scientific Approaches Used During the FBI's Investigation of the Anthrax Letters evaluates the scientific foundation for the techniques used by the FBI to determine whether these techniques met appropriate standards for scientific reliability and for use in forensic validation, and whether the FBI reached appropriate scientific conclusions from its use of these techniques. This report reviews and assesses scientific evidence considered in connection with the 2001 Bacillus anthracis mailings.
Topics: Conflict and Security Issues » Policy, Reviews and Evaluations | Biology and Life Sciences » Policy, Reviews and Evaluations | Math, Chemistry, and Physics » Chemistry | Conflict and Security Issues » Prevention, Security and Response | Conflict and Security Issues » Biosecurity
Prudent Practices in the Laboratory—the book that has served for decades as the standard for chemical laboratory safety practice—now features updates and new topics. This revised edition has an expanded chapter on chemical management and delves into new areas, such as nanotechnology, laboratory security, and emergency planning.
Developed by experts from academia and industry, with specialties in such areas as chemical sciences, pollution prevention, and laboratory safety, Prudent Practices in the Laboratory provides guidance on planning procedures for the handling, storage, and disposal of chemicals. The book offers prudent practices designed to promote safety and includes practical information on assessing hazards, managing chemicals, disposing of wastes, and more.
Prudent Practices in the Laboratory will continue to serve as the leading source of chemical safety guidelines for people working with laboratory chemicals: research chemists, technicians, safety officers, educators, and students.
Topics: Math, Chemistry, and Physics » Chemistry | Environment and Environmental Studies » Waste Disposal and Clean Up | Conflict and Security Issues » Biosecurity
Many coastal areas of the United States are at risk for tsunamis. After the catastrophic 2004 tsunami in the Indian Ocean, legislation was passed to expand U.S. tsunami warning capabilities. Since then, the nation has made progress in several related areas on both the federal and state levels. At the federal level, NOAA has improved the ability to detect and forecast tsunamis by expanding the sensor network. Other federal and state activities to increase tsunami safety include: improvements to tsunami hazard and evacuation maps for many coastal communities; vulnerability assessments of some coastal populations in several states; and new efforts to increase public awareness of the hazard and how to respond.
Tsunami Warning and Preparedness explores the advances made in tsunami detection and preparedness, and identifies the challenges that still remain. The book describes areas of research and development that would improve tsunami education, preparation, and detection, especially with tsunamis that arrive less than an hour after the triggering event. It asserts that seamless coordination between the two Tsunami Warning Centers and clear communications to local officials and the public could create a timely and effective response to coastal communities facing a pending tsuanami.
According to Tsunami Warning and Preparedness, minimizing future losses to the nation from tsunamis requires persistent progress across the broad spectrum of efforts including: risk assessment, public education, government coordination, detection and forecasting, and warning-center operations. The book also suggests designing effective interagency exercises, using professional emergency-management standards to prepare communities, and prioritizing funding based on tsunami risk.
Topics: Earth Sciences » Earthquakes, Floods and Natural Disasters | Earth Sciences » Geology and Landforms | Conflict and Security Issues » Disaster Response
The Army is in the process of destroying projectiles and mortars that contain the chemical agent mustard at the Anniston Chemical Agent Disposal Facility (ANCDF) located on the Anniston Army Depot (ANAD) in Anniston, Alabama. Were the faulty devices to eventually be processed through the ANCDF, it would require that they be disassembled manually by workers wearing personnel protective equipment known as demilitarization protective ensemble suits. This operation nonetheless would expose the operators to a high safety risk.
Rather than exposing the workers to this additional risk, the Army will use an explosive detonation technology (EDT) to destroy the munitions without disassembling them. The particular EDT system that the Army plans to use is a static detonation chamber (SDC) system manufactured by the Swedish company, Dynasafe AB.
In response to a request from the Army, the present report reviews the design of the Dynasafe Static Detonation Chamber (SDC) system for the Anniston Chemical Agent Disposal Facility.
Topics: Environment and Environmental Studies » Pollutants and Toxics | Environment and Environmental Studies » Waste Disposal and Clean Up | Conflict and Security Issues » Weapons and Technology
The Department of Defense (DOD) supports basic research to advance fundamental knowledge in fields important to national defense. Over the past six years, however, several groups have raised concern about whether the nature of DOD-funded basic research is changing. The concerns include these: Funds are being spent for research that does not fall under DOD's definition of basic research; reporting requirements have become cumbersome and onerous; and basic research is handled differently by the three services. To explore these concerns, the Congress directed DOD to request a study from the National Research Council (NRC) about the nature of basic research now being funded by the Department. Specifically the NRC was to determine if the programs in the DOD basic research portfolio are consistent with the DOD definition of basic research and with the characteristics associated with fundamental research.
Topics: Conflict and Security Issues » Policy, Reviews and Evaluations | Computers and Information Technology » Information Security and Privacy
This report assesses the methodologies used for body armor testing. This Phase II report considers in greater detail [than in Phase I] the validity of using the column drop performance test described by the Army for assessing the part-to-part consistency of a clay body within the level of precision that is identified by the Army test procedures. More detailed evaluations of the array of issues surrounding body armor testing, both present and future, will be presented in the final Phase III report.
Topics: Conflict and Security Issues » Weapons and Technology
The terrorist attacks of September 11, 2001 (9/11) on the United States prompted a rethinking of how the United States prepares for disasters. Federal policy documents written since 9/11 have stressed that the private and public sectors share equal responsibility for the security of the nation's critical infrastructure and key assets. Private sector entities have a role in the safety, security, and resilience of the communities in which they operate. Incentivizing the private sector to expend resources on community efforts remains challenging. Disasters in the United States since 9/11 (e.g., Hurricane Katrina in 2005) indicate that the nation has not yet been successful in making its communities resilient to disaster.
In this book, the National Research Council assesses the current states of the art and practice in private-public sector collaboration dedicated to strengthening community disaster resilience.
Topics: Policy for Science and Technology » Policy for Science and Technology | Earth Sciences » Earthquakes, Floods and Natural Disasters | Conflict and Security Issues » Disaster Response
The effort to understand and combat infectious diseases has, during the centuries, produced many key advances in science and medicine—including the development of vaccines, drugs, and other treatments. A subset of this research is conducted with agents that, like anthrax, not only pose a severe threat to the health of humans, plants, and animals but can also be used for ill-intended purposes. Such agents have been listed by the government as biological select agents and toxins. The 2001 anthrax letter attacks prompted the creation of new regulations aimed at increasing security for research with dangerous pathogens. The outcome of the anthrax letter investigation has raised concern about whether these measures are adequate.
Responsible Research with Biological Select Agents and Toxins evaluates both the physical security of select agent laboratories and personnel reliability measures designed to ensure the trustworthiness of those with access to biological select agents and toxins. The book offers a set of guiding principles and recommended changes to minimize security risk and facilitate the productivity of research. The book recommends fostering a culture of trust and responsibility in the laboratory, engaging the community in oversight of the Select Agent Program, and enhancing the operation of the Select Agent Program.
Topics: Conflict and Security Issues » Prevention, Security and Response | Biology and Life Sciences » Policy, Reviews and Evaluations | Conflict and Security Issues » Biosecurity
The National Research Council of the National Academies established a study to assess the methodologies used by the U.S. Army for the testing of body armor. This Phase I report is focused primarily on the validity of laser-profiling techniques for body armor test measurements. More comprehensive and detailed evaluations of an array of issues surrounding body armor testing will be presented in the forthcoming Phase II and Phase III reports.
Topics: Conflict and Security Issues » Military and Defense Studies
H1N1 ("swine flu"), SARS, mad cow disease, and HIV/AIDS are a few examples of zoonotic diseases-diseases transmitted between humans and animals. Zoonotic diseases are a growing concern given multiple factors: their often novel and unpredictable nature, their ability to emerge anywhere and spread rapidly around the globe, and their major economic toll on several disparate industries.
Infectious disease surveillance systems are used to detect this threat to human and animal health. By systematically collecting data on the occurrence of infectious diseases in humans and animals, investigators can track the spread of disease and provide an early warning to human and animal health officials, nationally and internationally, for follow-up and response. Unfortunately, and for many reasons, current disease surveillance has been ineffective or untimely in alerting officials to emerging zoonotic diseases.
Sustaining Global Surveillance and Response to Emerging Zoonotic Diseases assesses some of the disease surveillance systems around the world, and recommends ways to improve early detection and response. The book presents solutions for improved coordination between human and animal health sectors, and among governments and international organizations.
Parties seeking to improve the detection and response to zoonotic diseases—including U.S. government and international health policy makers, researchers, epidemiologists, human health clinicians, and veterinarians—can use this book to help curtail the threat zoonotic diseases pose to economies, societies, and health.
Topics: Health and Medicine » Other Diseases | Health and Medicine » Global Health | Agriculture » Animal Health and Nutrition | Health and Medicine » Infectious Disease | Conflict and Security Issues » Biosecurity
The United States is increasingly dependent on information and information technology for both civilian and military purposes, as are many other nations. Although there is a substantial literature on the potential impact of a cyberattack on the societal infrastructure of the United States, little has been written about the use of cyberattack as an instrument of U.S. policy.
Cyberattacks--actions intended to damage adversary computer systems or networks--can be used for a variety of military purposes. But they also have application to certain missions of the intelligence community, such as covert action. They may be useful for certain domestic law enforcement purposes, and some analysts believe that they might be useful for certain private sector entities who are themselves under cyberattack. This report considers all of these applications from an integrated perspective that ties together technology, policy, legal, and ethical issues.
Focusing on the use of cyberattack as an instrument of U.S. national policy, Technology, Policy, Law and Ethics Regarding U.S. Acquisition and Use of Cyberattack Capabilities explores important characteristics of cyberattack. It describes the current international and domestic legal structure as it might apply to cyberattack, and considers analogies to other domains of conflict to develop relevant insights. Of special interest to the military, intelligence, law enforcement, and homeland security communities, this report is also an essential point of departure for nongovernmental researchers interested in this rarely discussed topic.
Topics: Conflict and Security Issues » Weapons and Technology | Computers and Information Technology » Information Security and Privacy | Conflict and Security Issues » Prevention, Security and Response | Conflict and Security Issues » Policy, Reviews and Evaluations
Smallpox was a devastating disease that decimated human populations for centuries, and its eradication in 1980 was a monumental achievement for the global health community. Since then the remaining known strains of its causative agent, variola virus, have been contained in two World Health Organization (WHO)-approved repositories.
In 1999, the World Health Assembly (WHA) debated the issue of destroying these remaining strains. Arguments were presented on the need to retain the live virus for use in additional important research, and the decision to destroy the virus was deferred until this research could be completed. In that same year, the Institute of Medicine (IOM) convened a consensus committee to explore scientific needs for the live virus.
In the ten years since the first IOM report, the scientific, political, and regulatory environments have changed. In this new climate, the IOM was once again tasked to consider scientific needs for live variola virus. The committee evaluated the scientific need for live variola virus in four areas: development of therapeutics, development of vaccines, genomic analysis, and discovery research.
Topics: Health and Medicine » Policy, Reviews and Evaluations | Conflict and Security Issues » Prevention, Security and Response | Conflict and Security Issues » Biosecurity
The government's first Cooperative Threat Reduction (CTR) programs were created in 1991 to eliminate the former Soviet Union's nuclear, chemical, and other weapons and prevent their proliferation. The programs have accomplished a great deal: deactivating thousands of nuclear warheads, neutralizing chemical weapons, converting weapons facilities for peaceful use, and redirecting the work of former weapons scientists and engineers, among other efforts. Originally designed to deal with immediate post-Cold War challenges, the programs must be expanded to other regions and fundamentally redesigned as an active tool of foreign policy that can address contemporary threats from groups that are that are agile, networked, and adaptable. As requested by Congress, Global Security Engagement proposes how this goal can best be achieved.
To meet the magnitude of new security challenges, particularly at the nexus of weapons of mass destruction and terrorism, Global Security Engagement recommends a new, more flexible, and responsive model that will draw on a broader range of partners than current programs have. The White House, working across the Executive Branch and with Congress, must lead this effort.
Topics: Conflict and Security Issues » Prevention, Security and Response | Conflict and Security Issues » Biosecurity
In 2006, the U.S. Congress and the National Nuclear Security Administration of the Department of Energy requested an evaluation of the quantification of margins and uncertainties framework used by the national security laboratories in support of their nuclear weapons stockpile stewardship activities.
The first part of the request resulted in the book, Evaluation of Quantification of Margins and Uncertainties Methodology for Assessing and Certifying the Reliability of the Nuclear Stockpile. The present letter report fulfills the second part of that request: a high-level overview of the way the archival underground nuclear test data are used by the labs in its application of QMU. Specifically the committee was asked to assess how archived data are used in the evaluation of margins and uncertainties, and whether or not design labs are fully exploiting the data for QMU. This includes use for baselining codes, informing annual assessment, assessing significant finding investigations, and more.
This letter report presents the results of the study committee's analysis based on two meetings-one to Los Alamos National Laboratory and another to Lawrence Livermore National Laboratory. The report begins with a short background section followed by the findings, recommendations, and analysis.
Topics: Conflict and Security Issues » Policy, Reviews and Evaluations
The same technologies that fuel scientific advances also pose potential risks—that the knowledge, tools, and techniques gained through legitimate biotechnology research could be misused to create biological weapons or for bioterrorism. This is often called the dual use dilemma of the life sciences. Yet even research with the greatest potential for misuse may offer significant benefits. Determining how to constrain the danger without harming essential scientific research is critical for national security as well as prosperity and well-being.
This book discusses a 2007 survey of American Association for the Advancement of Science (AAAS) members in the life sciences about their knowledge of dual use issues and attitudes about their responsibilities to help mitigate the risks of misuse of their research.
Overall, the results suggest that there may be considerable support for approaches to oversight that rely on measures that are developed and implemented by the scientific community itself. The responses also suggest that there is a need to clarify the scope of research activities of concern and to provide guidance about what actions scientists can take to reduce the risk that their research will be misused by those with malicious intent.
Topics: Policy for Science and Technology » Policy for Science and Technology | Biology and Life Sciences » Policy, Reviews and Evaluations | Conflict and Security Issues » Policy, Reviews and Evaluations | Conflict and Security Issues » Prevention, Security and Response | Conflict and Security Issues » Biosecurity
The national security controls that regulate access to and export of science and technology are broken. As currently structured, many of these controls undermine our national and homeland security and stifle American engagement in the global economy, and in science and technology. These unintended consequences arise from policies that were crafted for an earlier era. In the name of maintaining superiority, the U.S. now runs the risk of becoming less secure, less competitive and less prosperous.
Beyond "Fortress America" provides an account of the costs associated with building walls that hamper our access to global science and technology that dampen our economic potential. The book also makes recommendations to reform the export control process, ensure scientific and technological competitiveness, and improve the non-immigrant visa system that regulates entry into the United States of foreign science and engineering students, scholars, and professionals.
Beyond "Fortress America" contains vital information and action items for the President and policy makers that will affect the United States' ability to compete globally. Interested parties—including military personnel, engineers, scientists, professionals, industrialists, and scholars—will find this book a valuable tool for stemming a serious decline affecting broad areas of the nation's security and economy.
Topics: Policy for Science and Technology » Policy for Science and Technology | Conflict and Security Issues » Policy, Reviews and Evaluations
In response to a request from the U.S. Congress, this book examines how the unique experience and extensive capabilities of the Department of Defense (DOD) can be extended to reduce the threat of bioterrorism within developing countries outside the former Soviet Union (FSU). During the past 12 years, DOD has invested $800 million in reducing the risk from bioterrorism with roots in the states of the FSU. The program's accomplishments are many fold. The risk of bioterrorism in other countries is too great for DOD not to be among the leaders in addressing threats beyond the FSU.
Taking into account possible sensitivities about a U.S. military presence, DOD should engage interested governments in about ten developing countries outside the FSU in biological threat reduction programs during the next five years. Whenever possible, DOD should partner with other organizations that have well established humanitarian reputations in the countries of interest. For example, the U.S. Agency for International Development, the Centers for Disease Control and Prevention, and the World Health Organization should be considered as potential partners.
Topics: Conflict and Security Issues » Prevention, Security and Response | Conflict and Security Issues » Biosecurity
The U.S. National Academies (NAS) and the Russian Academy of Sciences (RAS), building on a foundation of years of interacademy cooperation, conducted a joint project to identify U.S. and Russian views on what the international nuclear security environment will be in 2015, what challenges may arise from that environment, and what options the U.S. and Russia have in partnering to address those challenges.
The project's discussions were developed and expanded upon during a two-day public workshop held at the International Atomic Energy Agency in November 2007. A key aspect of that partnership may be cooperation in third countries where both the U.S. and Russia can draw on their experiences over the last decade of non-proliferation cooperation. More broadly, the following issues analyzed over the course of this RAS-NAS project included: safety and security culture, materials protection, control and accounting (MPC&A) best practices, sustainability, nuclear forensics, public-private partnerships, and the expansion of nuclear energy.
Topics: Conflict and Security Issues » Prevention, Security and Response | Industry and Labor » Industrial and Manufacturing Technologies
The so-called nuclear renaissance has increased worldwide interest in nuclear power. This potential growth also has increased, in some quarters, concern that nonproliferation considerations are not being given sufficient attention. In particular, since introduction of many new power reactors will lead to requiring increased uranium enrichment services to provide the reactor fuel, the proliferation risk of adding enrichment facilities in countries that do not have them now led to proposals to provide the needed fuel without requiring indigenous enrichment facilities. Similar concerns exist for reprocessing facilities.
Internationalization of the Nuclear Fuel Cycle summarizes key issues and analyses of the topic, offers some criteria for evaluating options, and makes findings and recommendations to help the United States, the Russian Federation, and the international community reduce proliferation and other risks, as nuclear power is used more widely.
This book is intended for all those who are concerned about the need for assuring fuel for new reactors and at the same time limiting the spread of nuclear weapons. This audience includes the United States and Russia, other nations that currently supply nuclear material and technology, many other countries contemplating starting or growing nuclear power programs, and the international organizations that support the safe, secure functioning of the international nuclear fuel cycle, most prominently the International Atomic Energy Agency.
Topics: Energy and Energy Conservation » Policy, Reviews and Evaluations | Conflict and Security Issues » Policy, Reviews and Evaluations | Industry and Labor » Industrial and Manufacturing Technologies
Growing numbers of pet owners are giving their pets dietary supplements in hopes of supporting their health. Many people presume that supplements are safer than drugs, but the reality is that there are very limited safety data on dietary supplements for pets.
Many challenges stand in the way of determining whether animal dietary supplements are safe and at what dosage. Supplements considered safe in humans and other species are not always safe in horses, dogs, and cats. An improved adverse event reporting system is badly needed. Also, the absence of laws and regulations that specifically address animal dietary supplements causes considerable confusion to the industry and to the public. Clear and precise regulations are needed to allow only safe dietary supplements on the market.
This book examines issues in determining safety of animal dietary supplements in general, and the safety of three animal dietary supplements; lutein, evening primrose oil, and garlic, in particular.
Topics: Agriculture » Animal Health and Nutrition | Conflict and Security Issues » Military and Defense Studies
All U.S. agencies with counterterrorism programs that collect or "mine" personal data -- such as phone records or Web sites visited -- should be required to evaluate the programs' effectiveness, lawfulness, and impacts on privacy. A framework is offered that agencies can use to evaluate such information-based programs, both classified and unclassified. The book urges Congress to re-examine existing privacy law to assess how privacy can be protected in current and future programs and recommends that any individuals harmed by violations of privacy be given a meaningful form of redress.
Two specific technologies are examined: data mining and behavioral surveillance. Regarding data mining, the book concludes that although these methods have been useful in the private sector for spotting consumer fraud, they are less helpful for counterterrorism because so little is known about what patterns indicate terrorist activity. Regarding behavioral surveillance in a counterterrorist context, the book concludes that although research and development on certain aspects of this topic are warranted, there is no scientific consensus on whether these techniques are ready for operational use at all in counterterrorism.
Topics: Computers and Information Technology » Information Security and Privacy | Behavioral and Social Sciences » Law and Justice | Conflict and Security Issues » Prevention, Security and Response | Behavioral and Social Sciences » Surveys and Statistics | Surveys and Statistics » Surveys and Statistics
Topics: Conflict and Security Issues » Policy, Reviews and Evaluations | Environment and Environmental Studies » Radiation | Health and Medicine » Environmental Health | Health and Medicine » Military and Veterans
Topics: Conflict and Security Issues » Prevention, Security and Response | Behavioral and Social Sciences » Law and Justice
Topics: Behavioral and Social Sciences » Defense and Security | Conflict and Security Issues » Military and Defense Studies
Topics: Earth Sciences » Earthquakes, Floods and Natural Disasters | Conflict and Security Issues » Disaster Response
From 1962 to 1971, the U.S. military sprayed herbicides over Vietnam to strip the thick jungle canopy that could conceal opposition forces, to destroy crops that those forces might depend on, and to clear tall grasses and bushes from the perimeters of U.S. base camps and outlying fire-support bases.
In response to concerns and continuing uncertainty about the long-term health effects of the sprayed herbicides on Vietnam veterans, Veterans and Agent Orange provides a comprehensive evaluation of scientific and medical information regarding the health effects of exposure to Agent Orange and other herbicides used in Vietnam. The 2006 report is the seventh volume in this series of biennial updates. It will be of interest to policy makers and physicians in the federal government, veterans and their families, veterans' organizations, researchers, and health professionals.
Topics: Conflict and Security Issues » Military and Defense Studies | Health and Medicine » Military and Veterans
Toward a Safer and More Secure Cyberspace examines these Internet security vulnerabilities and offers a strategy for future research aimed at countering cyber attacks. It also explores the nature of online threats and some of the reasons why past research for improving cybersecurity has had less impact than anticipated, and considers the human resource base needed to advance the cybersecurity research agenda. This book will be an invaluable resource for Internet security professionals, information technologists, policy makers, data stewards, e-commerce providers, consumer protection advocates, and others interested in digital security and safety.
Topics: Computers and Information Technology » Information Security and Privacy | Computers and Information Technology » Internet and Networking | Conflict and Security Issues » Prevention, Security and Response
Topics: Conflict and Security Issues » Military and Defense Studies | Health and Medicine » Military and Veterans
Topics: Behavioral and Social Sciences » Population Studies | Earth Sciences » Earthquakes, Floods and Natural Disasters | Conflict and Security Issues » Disaster Response
Topics: Math, Chemistry, and Physics » Physics | Conflict and Security Issues » Weapons and Technology
Topics: Conflict and Security Issues » Weapons and Technology
Infectious diseases have been a problem for military personnel throughout history. The consequences in previous conflicts have ranged from frequent illnesses disrupting daily activities and readiness to widespread deaths. Preventive measures, early diagnosis, and treatment greatly limit the exposures and acute illnesses of troops today in comparison with those in armies of the past, but infections and consequent acute illnesses still occur.
Thousands of US veterans of the Persian Gulf War have reported an array of unexplained illnesses since the war ended in 1991. Many veterans have believed that the illnesses were associated with their military service in southwest Asia during the war. This volume of Gulf War and Health evaluates the scientific literature on chemical, biologic, and physical agents to which military personnel in the gulf were potentially exposed and possible long-term adverse health outcomes.
Topics: Health and Medicine » Military and Veterans | Conflict and Security Issues » Military and Defense Studies
Gulf War and Health Volume 4: Health Effects of Serving in the Gulf War summarizes in one place the current status of health effects in veterans deployed to the Persian Gulf irrespective of exposure information. This book reviews, evaluates, and summarizes both peer-reviewed scientific and medical literature addressing the health status of Gulf War veterans.
Topics: Conflict and Security Issues » Military and Defense Studies | Health and Medicine » Military and Veterans | Environment and Environmental Studies » Environmental Health and Safety
Social science research conducted since the late 1970's has contributed greatly to society's ability to mitigate and adapt to natural, technological, and willful disasters. However, as evidenced by Hurricane Katrina, the Indian Ocean tsunami, the September 11, 2001 terrorist attacks on the United States, and other recent events, hazards and disaster research and its application could be improved greatly. In particular, more studies should be pursued that compare how the characteristics of different types of events—including predictability, forewarning, magnitude, and duration of impact—affect societal vulnerability and response. This book includes more than thirty recommendations for the hazards and disaster community.
Topics: Behavioral and Social Sciences » Women and Minorities | Earth Sciences » Earthquakes, Floods and Natural Disasters | Conflict and Security Issues » Disaster Response
The National Institute of Allergy and Infectious Diseases (NIAID) gives the highest priority to developing countermeasures against bioterrorism agents that are highly infective when dispersed in aerosol form. Developing drugs to prevent or treat illnesses caused by bioterrorism agents requires testing their effectiveness in animals since human clinical trials would be unethical. At the request of NIAID, the National Academies conducted a study to examine how such testing could be improved. Overcoming Challenges to Develop Countermeasures Against Aerosolized Bioterrorism Agents provides recommendations to researchers on selecting the kinds of animal models, aerosol generators, and bioterrorism agent doses that would produce conditions that most closely mimic the disease process in humans. It also urges researchers to fully document experimental parameters in the literature so that studies can be reproduced and compared. The book recommends that all unclassified data on bioterrorism agent studies--including unclassified, unpublished data from U.S. Army Medical Research Institute of Infectious Diseases (USAMRIID)--be published in the open literature. The book also calls on the U.S. Food and Drug Administration to improve the process by which bioterrorism countermeasures are approved based on the results of animal studies.
Topics: Conflict and Security Issues » Policy, Reviews and Evaluations | Biology and Life Sciences » Laboratory Animal Research | Conflict and Security Issues » Biosecurity
Topics: Environment and Environmental Studies » Waste Disposal and Clean Up | Environment and Environmental Studies » Radiation | Conflict and Security Issues » Prevention, Security and Response
Biomedical advances have made it possible to identify and manipulate features of living organisms in useful ways—leading to improvements in public health, agriculture, and other areas. The globalization of scientific and technical expertise also means that many scientists and other individuals around the world are generating breakthroughs in the life sciences and related technologies. The risks posed by bioterrorism and the proliferation of biological weapons capabilities have increased concern about how the rapid advances in genetic engineering and biotechnology could enable the production of biological weapons with unique and unpredictable characteristics. Globalization, Biosecurity, and the Future of Life Sciences examines current trends and future objectives of research in public health, life sciences, and biomedical science that contain applications relevant to developments in biological weapons 5 to 10 years into the future and ways to anticipate, identify, and mitigate these dangers.
Topics: Biology and Life Sciences » Biotechnology | Conflict and Security Issues » Prevention, Security and Response | Policy for Science and Technology » Policy for Science and Technology | Conflict and Security Issues » Biosecurity
Topics: Policy for Science and Technology » Policy for Science and Technology | Conflict and Security Issues » Policy, Reviews and Evaluations
The Vietnam War was fought in a jungle environment that provided cover to the enemy and made battlefield observations difficult, so military strategists used herbicides to remove foliage along key roads and waterways, defoliate areas surrounding enemy bases and supply and communications routes, and improve visibility in heavily canopied forests. The last three decades have seen an ongoing debate about the effects of this military use of herbicides and the potential adverse long-term health effects on those who may have been exposed to these herbicides.
In response to these concerns, the Air Force Health Study (AFHS) was created to investigate the potential relationship between the herbicides used and the health problems of those exposed. Disposition of the Air Force Health Study assesses the scientific merit of the AFHS operations and procedures, and makes recommendations for improvement.
Topics: Health and Medicine » Military and Veterans | Conflict and Security Issues » Military and Defense Studies
The U.S. Department of Defense (DoD) faces short-term and long-term challenges in selecting and recruiting an enlisted force to meet personnel requirements associated with diverse and changing missions. The DoD has established standards for aptitudes/abilities, medical conditions, and physical fitness to be used in selecting recruits who are most likely to succeed in their jobs and complete the first term of service (generally 36 months). In 1999, the Committee on the Youth Population and Military Recruitment was established by the National Research Council (NRC) in response to a request from the DoD. One focus of the committee's work was to examine trends in the youth population relative to the needs of the military and the standards used to screen applicants to meet these needs.
When the committee began its work in 1999, the Army, the Navy, and the Air Force had recently experienced recruiting shortfalls. By the early 2000s, all the Services were meeting their goals; however, in the first half of calendar year 2005, both the Army and the Marine Corps experienced recruiting difficulties and, in some months, shortfalls. When recruiting goals are not being met, scientific guidance is needed to inform policy decisions regarding the advisability of lowering standards and the impact of any change on training time and cost, job performance, attrition, and the health of the force.
Assessing Fitness for Military Enlistment examines the current physical, medical, and mental health standards for military enlistment in light of (1) trends in the physical condition of the youth population; (2) medical advances for treating certain conditions, as well as knowledge of the typical course of chronic conditions as young people reach adulthood; (3) the role of basic training in physical conditioning; (4) the physical demands and working conditions of various jobs in today's military services; and (5) the measures that are used by the Services to characterize an individual's physical condition. The focus is on the enlistment of 18- to 24-year-olds and their first term of service.
Topics: Health and Medicine » Military and Veterans | Conflict and Security Issues » Military and Defense Studies | Behavioral and Social Sciences » Children, Youth and Families
Topics: Earth Sciences » Earthquakes, Floods and Natural Disasters | Conflict and Security Issues » Disaster Response
Topics: Computers and Information Technology » Internet and Networking | Conflict and Security Issues » Weapons and Technology
Topics: Conflict and Security Issues » Military and Defense Studies | Food and Nutrition » Diet and Health
Topics: Conflict and Security Issues » Policy, Reviews and Evaluations
Underground facilities are used extensively by many nations to conceal and protect strategic military functions and weapons' stockpiles. Because of their depth and hardened status, however, many of these strategic hard and deeply buried targets could only be put at risk by conventional or nuclear earth penetrating weapons (EPW). Recently, an engineering feasibility study, the robust nuclear earth penetrator program, was started by DOE and DOD to determine if a more effective EPW could be designed using major components of existing nuclear weapons. This activity has created some controversy about, among other things, the level of collateral damage that would ensue if such a weapon were used. To help clarify this issue, the Congress, in P.L. 107-314, directed the Secretary of Defense to request from the NRC a study of the anticipated health and environmental effects of nuclear earth-penetrators and other weapons and the effect of both conventional and nuclear weapons against the storage of biological and chemical weapons. This report provides the results of those analyses. Based on detailed numerical calculations, the report presents a series of findings comparing the effectiveness and expected collateral damage of nuclear EPW and surface nuclear weapons under a variety of conditions.
Topics: Conflict and Security Issues » Weapons and Technology | Environment and Environmental Studies » Radiation
December 13, 2002, the president of the United States announced that smallpox vaccination would be offered to some categories of civilians and administered to members of the military and government representatives in high-risk areas of the world. The events that precipitated that historic announcement included a series of terrorist attacks during the 1990s, which culminated in the catastrophic events of 2001.
Although preparedness for deliberate attacks with biologic weapons was already the subject of much public health planning, meetings, and publications as the twentieth century neared its end, the events of 2001 led to a steep rise in bioterrorism-related government policies and funding, and in state and local preparedness activities, for example, in public health, health care, and the emergency response and public safety communities. The national smallpox vaccination program is but one of many efforts to improve readiness to respond to deliberate releases of biologic agents.
The Institute of Medicine (IOM) Committee on Smallpox Vaccination Program Implementation was convened in October 2002 at the request of the Centers for Disease Control and Prevention (CDC), the federal agency charged with implementing the government's policy of providing smallpox vaccine first to public health and health care workers on response teams, then to all interested health care workers and other first responders, and finally to members of the general public who might insist on receiving the vaccine. The committee was charged with providing "advice to the CDC and the program investigators on selected aspects of the smallpox program implementation and evaluation."
The committee met six times over 19 months and wrote a series of brief "letter" reports. The Smallpox Vaccination Program: Public Health in an Age of Terrorism constitutes the committee's seventh and final report, and the committee hopes that it will fulfill three purposes: 1) To serve as an archival document that brings together the six reports addressed to Julie Gerberding, director of CDC, and previously released on line and as short, unbound papers; 2) To serve as a historical document that summarizes milestones in the smallpox vaccination program, and ; 3) To comment on the achievement of overall goals of the smallpox vaccination program (in accordance with the last item in the charge), including lessons learned from the program.
Topics: Conflict and Security Issues » Prevention, Security and Response | Health and Medicine » Public Health and Prevention
Topics: Conflict and Security Issues » Policy, Reviews and Evaluations
Topics: Conflict and Security Issues » Policy, Reviews and Evaluations | Conflict and Security Issues » Prevention, Security and Response | Conflict and Security Issues » Biosecurity
Autonomous vehicles (AVs) have been used in military operations for more than 60 years, with torpedoes, cruise missiles, satellites, and target drones being early examples.1 They have also been widely used in the civilian sector--for example, in the disposal of explosives, for work and measurement in radioactive environments, by various offshore industries for both creating and maintaining undersea facilities, for atmospheric and undersea research, and by industry in automated and robotic manufacturing.
Recent military experiences with AVs have consistently demonstrated their value in a wide range of missions, and anticipated developments of AVs hold promise for increasingly significant roles in future naval operations. Advances in AV capabilities are enabled (and limited) by progress in the technologies of computing and robotics, navigation, communications and networking, power sources and propulsion, and materials.
Autonomous Vehicles in Support of Naval Operations is a forward-looking discussion of the naval operational environment and vision for the Navy and Marine Corps and of naval mission needs and potential applications and limitations of AVs. This report considers the potential of AVs for naval operations, operational needs and technology issues, and opportunities for improved operations.
Topics: Conflict and Security Issues » Military and Defense Studies | Space and Aeronautics » Aircraft and Flight
Misuse of handguns is a significant factor in deaths, morbidity, and crime in the United States. One approach to reducing certain types of handgun misuse is to create a user-authorized handgun (UAHG), a firearm that can be operated only by an authorized user(s). Technological Options for User-Authorized Handguns clarifies the technical challenges of developing a reliable UAHG. This report determines the requirements and specifications of UAHGs for those concerned with public and/or personal safety, and identifies technologies that could satisfy these needs.
Topics: Engineering and Technology » Applications of Technology | Conflict and Security Issues » Prevention, Security and Response
Topics: Conflict and Security Issues » Military and Defense Studies | Conflict and Security Issues » Prevention, Security and Response
This book arises from a joint NAS-Russian Academy of Sciences program to explore possible new approaches to the control of sensitive dual-use technologies, with respect to expanded trade between Western advanced industrialized countries and the republics of the former Soviet Union as well as to the export trade of the Russian and other CIS republics with countries of proliferation concern.
Topics: Conflict and Security Issues » Prevention, Security and Response
The debate about appropriate purposes and policies for U.S. nuclear weapons has been under way since the beginning of the nuclear age. With the end of the Cold War, the debate has entered a new phase, propelled by the post-Cold War transformations of the international political landscape. This volume—based on an exhaustive reexamination of issues addressed in The Future of the U.S.-Soviet Nuclear Relationship (NRC, 1991)—describes the state to which U.S. and Russian nuclear forces and policies have evolved since the Cold War ended. The book evaluates a regime of progressive constraints for future U.S. nuclear weapons policy that includes further reductions in nuclear forces, changes in nuclear operations to preserve deterrence but enhance operational safety, and measures to help prevent proliferation of nuclear weapons. In addition, it examines the conditions and means by which comprehensive nuclear disarmament could become feasible and desirable.
Topics: Conflict and Security Issues » Policy, Reviews and Evaluations | Conflict and Security Issues » Military and Defense Studies
The Ada programming language was created by the U.S. Department of Defense (DOD) nearly two decades ago to provide a general-purpose programming language for defense and commercial use, but has evolved into a niche solution for safety-critical systems, primarily in defense applications. Ada and Beyond presents an approach for the DOD to move beyond the debate over its policy that requires the use of Ada for all new software development.
It describes the importance of the software engineering process and recommends to DOD mechanisms for more effective review of software development and improved collection of data on software project outcomes. The volume also analyzes the technical, empirical, and business cases for using Ada and other programming languages, makes recommendations regarding the appropriate conditions under which DOD should continue to require the use of Ada, and details activities that require funding by DOD in order for Ada to remain a viable programming language.
Topics: Computers and Information Technology » Information Security and Privacy | Computers and Information Technology » Internet and Networking | Conflict and Security Issues » Military and Defense Studies
This report examines alternative methods for detection of explosives in commercial aviation. The report's primary conclusion is that "there does not appear to be any single detection technology that can provide the levels of sensitivity and specificity that will have both a significant effect on reducing the threat and an acceptable impact on airport operations." The report analyzes a number of detection technologies and provides broad priorities for allocation of funding for continued research and development.
Topics: Engineering and Technology » Applications of Technology | Conflict and Security Issues » Prevention, Security and Response
The successor states of the former Soviet Union have enormous stocks of weapons-usable nuclear material and other militarily significant commodities and technologies. Preventing the flow of such items to countries of proliferation concern and to terrorist groups is a major objective of U.S. national security policy. This book reviews the effectiveness of two U.S. programs directed to this objective. These programs have supported the efforts of Russia, Ukraine, Belarus, and Kazakstan in upgrading the physical protection, control, and accountability of highly enriched uranium and plutonium and strengthening systems to control the export of many types of militarily sensitive items.
Topics: Conflict and Security Issues » Prevention, Security and Response | Conflict and Security Issues » Weapons and Technology
This report addresses consequences of current and proposed restrictions on international contacts by the U.S. Department of Energy's (DOE) national laboratories and explores methods of best serving national security through positive new scientific advances facilitated by international communication among scientists, through scientific contacts to further non-proliferation, and through careful protection of crucial classified information from foreign espionage. The report summarizes a symposium that examined: the role of the DOE's national laboratories in national security and the contributions by foreign laboratories and scientists, proposals for amending security policies of the weapons laboratories in regard to contact with foreign laboratories and scientists, and the risks and benefits of scientific openness in this context. Finally, the report reviews current policies and proposals designed to enhance security at the weapons laboratories, primarily those related to restrictions on foreign contacts by DOE scientists.
Topics: Conflict and Security Issues » Weapons and Technology | Conflict and Security Issues » Prevention, Security and Response
This book responds to an request by the U.S. Army to study the applicability of commercial multimedia technologies to command, control, communications and intelligence needs on future battlefields. After reviewing Army's needs and discussing relevant commercial technologies within the context of a generic architecture, the book recommends approaches for meeting the Army's needs. Battlefield potential is illustrated, and—drawing on lessons learned from the private sector—a technology management strategy consisting of specific recommendations to the Army is provided. The key to future benefits is for the Army to accommodate the rapid changes taking place in the commercial world of multimedia technologies.
Topics: Conflict and Security Issues » Military and Defense Studies
In this volume, the National Research Council examines problems arising throughout government-owned, contractor-operated facilities in the United States engaged in activities to build nuclear weapons. The book draws conclusions about and makes recommendations for the health and safety of the nuclear weapons complex and addresses pressing environmental concerns. In addition, the book examines the future of the complex and offers suggestions for its modernization. Several explanatory appendixes provide useful background information on the functioning of the complex, criticality safety, plutonium chemistry, and weapons physics.
Topics: Conflict and Security Issues » Weapons and Technology
The Principal Deputy to the Assistant Secretary of the Air Force for Acquisition requested that the National Research Council (NRC) review the Air Force's planned acquisition programs to determine if, given its scale, the highly talented scientific, technical, and engineering personnel base could be maintained, to identify issues affecting the engineering and science work force, and to identify issues affecting the aerospace industry's leadership in technology development, innovation, and product quality, as well as its ability to support Air Force missions.
Topics: Space and Aeronautics » Aircraft and Flight | Conflict and Security Issues » Military and Defense Studies
Topics: » Engineering and Technology | Conflict and Security Issues » Weapons and Technology