The National Defense University recently hosted a major symposium to address the challenges to U.S. national security and international stability posed by the spread of weapons of mass destruction: nuclear, chemical, and biological weapons, and missiles as a means of delivery. The need to examine such issues is clear. Perhaps no problem facing civilian and military decision makers today is as urgent and important as the effort to control the proliferation of such weapons. Put simply, WMD proliferation represents one of the most complex and fundamental threats to security today. Attended by many of the premier experts in the field, the NDU Symposium explored a broad spectrum of issues ranging from the incentives and disincentives for proliferation to non- and counterproliferation policies and programs. The panelists discussed such critical issues as how effectively present controls to prevent proliferation are working and how to protect against proliferation when it occurs. Most impressively, the participants ventured to identify alternative perspectives and approaches that may contribute to meeting the common challenges. All this unfolds in the pages that follow. It is a search for wisdom, for, as Cicero said twenty centuries ago, "Weapons are of little use on the field of battle if there is no wise counsel at home." Ervin J. Rokke Lieutenant General, USAF President, National Defense University
The working paper is divided into two main parts. The first part is a descriptive analysis of the illicit use of biological agents by criminals and terrorists. It draws on a series of case studies documented in the second part. The case studies describe every instance identifiable in open source materials in which a perpetrator used, acquired, or threatened to use a biological agent. While the inventory of cases is clearly incomplete, it provides an empirical basis for addressing a number of important questions relating to both biocrimes and bioterrorism. This material should enable policymakers concerned with bioterrorism to make more informed decisions. In the course of this project, the author has researched over 270 alleged cases involving biological agents. This includes all incidents found in open sources that allegedly occurred during the 20th Century. While the list is certainly not complete, it provides the most comprehensive existing unclassified coverage of instances of illicit use of biological agents.
The focus of this book is on current ocean law and policy issues particularly in the region around China. The work will be useful to anyone concerned with law of the sea in general and the evolving attitudes of States near China in particular.
Beyond conventional warfare considerations, the United States now faces an acute challenge in nuclear, biological, and chemical (NBC) weapons proliferation-a principal asymmetric warfare capability. These weapons pose a diverse array of risks to U.S. and allied armed forces, civilians, and to the U.S. homeland itself. In the hands of irresponsible or aggressive states, NBC weapons undermine regional stability and threaten U.S. and allied interests. For defense planners, these weapons present significant, and difficult, strategic and operational challenges. Nor is the emerging threat limited solely to state actors: in the future, some subnational entities, perhaps with state sponsorship, could become capable of delivering NBC weapons globally. Contents: The NBC Threat: Perspectives on Intentions and Capabilities Counterproliferation Policy: Current and Emerging Issues Operations in NBC Environments: Perspectives on the Warfight Counterproliferation Acquisition Responding to the Biological Warfare Challenge Medical Dimensions of Counterproliferation Deterring NBC Use Preemption in Peacetime, Crisis, and War Counterproliferation Past and Future: Key Considerations Endnotes
A thorough examination of the nation of Saudi Arabia, focusing on the current state of affairs and potential future challenges. Saudi Arabia: National Security in a Troubled Region provides a comprehensive, up-to-date analysis of Saudi Arabia's strategic security efforts, both within the country and as a stabilizing regional presence. In this meticulously researched book, acclaimed geopolitical scholar Anthony Cordesman, well-known for his role as ABC News's national security analyst, takes readers inside the Saudi security structure for an unprecedented look at its internal and external forces, policymaking, and careful balancing of regional and East/West relationships. In Saudi Arabia, Anthony Cordesman shows how the Kingdom is responding to an unstable Iraq, a potentially nuclear Iran, the needs of its fellow Southern Gulf states, and the ongoing threat of terrorism inside its borders. Cordesman also considers a number of socioeconomic and demographic factors that could bring dramatic changes within the Kingdom in the near future. Nonpartisan, unbiased, and based on the author's unparalleled access to high profile Saudi officials, the book offers a level of expertise and insight no other consideration of the subject can match.
Documents a study whose goals were to develop an understanding of commanders' information requirements for cultural and other "soft" factors in order to improve the effectiveness of combined arms operations, and to develop practical ways for commanders to integrate information and influence operations activities into combined arms planning/assessment in order to increase the usefulness to ground commanders of such operations.
This publication gives a history of biological warfare (BW) from the prehistoric period through the present, with a section on the future of BW. The publication relies on works by historians who used primary sources dealing with BW. In-depth definitions of biological agents, biological weapons, and biological warfare (BW) are included, as well as an appendix of further reading on the subject. Related items: Arms & Weapons publications can be found here: https://bookstore.gpo.gov/catalog/arms-weapons Hazardous Materials (HAZMAT & CBRNE) publications can be found here: https://bookstore.gpo.gov/catalog/hazardous-materials-hazmat-cbrne
The working paper is divided into two main parts. The first part is a descriptive analysis of the illicit use of biological agents by criminals and terrorists. It draws on a series of case studies documented in the second part. The case studies describe every instance identifiable in open source materials in which a perpetrator used, acquired, or threatened to use a biological agent. While the inventory of cases is clearly incomplete, it provides an empirical basis for addressing a number of important questions relating to both biocrimes and bioterrorism. This material should enable policymakers concerned with bioterrorism to make more informed decisions. In the course of this project, the author has researched over 270 alleged cases involving biological agents. This includes all incidents found in open sources that allegedly occurred during the 20th Century. While the list is certainly not complete, it provides the most comprehensive existing unclassified coverage of instances of illicit use of biological agents.
The Federal Law Enforcement Training Centers (FLETC) train the world's best law enforcement agents. The Legal Division (LGD) of the Office of Chief Counsel provides superior training to both beginner and advanced law enforcement agents in all areas of criminal law and procedure, such as: Constitutional law, authority and jurisdiction, search and seizure, use of force, self-incrimination, courtroom evidence, courtroom testimony, electronic law and evidence, criminal statutes, and civil liability. This handbook is to be used for study and also in the field. Related items: Law Enforcement & Criminal Justice publications can be found here: https://bookstore.gpo.gov/catalog/law-enforcement-criminal-justice
This will help us customize your experience to showcase the most relevant content to your age group
Please select from below
Login
Not registered?
Sign up
Already registered?
Success – Your message will goes here
We'd love to hear from you!
Thank you for visiting our website. Would you like to provide feedback on how we could improve your experience?
This site does not use any third party cookies with one exception — it uses cookies from Google to deliver its services and to analyze traffic.Learn More.