8 Matching Results

Search Results

Assessing the Potential for Civil-Military Integration: Technologies, Processes, and Practices

Description: This report responds to requests by the Senate and the House Armed Services Committees to investigate the potential for civil-military integration and the implications of such integration. It is divided into six chapters and five appendices.
Date: September 1994
Creator: United States. Congress. Office of Technology Assessment.
Partner: UNT Libraries Government Documents Department

The defense technology base: introduction & overview

Description: This special report is the first product of that assessment. It provides an overview of the subject, including specific concerns about the health of the defense technology base and the related issues before Congress. Subsequent reports will probe aspects of this immense problem in greater detail.
Date: March 1988
Creator: United States. Congress. Office of Technology Assessment.
Partner: UNT Libraries Government Documents Department

Arctic Strategy

Description: Report detailing the Department of Defense's strategy for maintaining stability and protecting United States interests in the Arctic region as receding ice enables increased human access.
Date: November 2013
Creator: United States. Department of Defense.
Partner: UNT Libraries Government Documents Department

FISA and warrantless wire-tapping: Does FISA conform to Fourth Amendment standards?

Description: Electronic surveillance for foreign intelligence purposes was largely unregulated prior to 1978. The Foreign Intelligence Surveillance Act of 1978 (hereinafter "FISA") was enacted to implement a judicial authorization process for foreign intelligence electronic surveillance that would effectively balance competing needs for national security and civil liberty under the Fourth Amendment. This study examines the evolution of FISA and its effectiveness under the Fourth Amendment, as assessed by federal reviewing courts and scholars since the statute's enactment. The study concludes that the FISA electronic surveillance authorization process has been effective in providing a constitutional mechanism to obtain foreign intelligence information.
Date: May 2009
Creator: Meyer, Aric
Partner: UNT Libraries

National security risks of dual-use transfers to China

Description: This report addresses several basic question about China's military-industrial complex to help provide a framework that policy maker can use in evaluating the likely effects of dual use transfers on Chinese military capability, and the attendant national security risks to the US.
Date: July 7, 1986
Creator: Frieman, Wendy
Partner: UNT Libraries Government Documents Department

The 9/11 Commission Report: Final Report of the National Commission on Terrorist Attacks Upon the United States

Description: The official Government edition of the Final Report of the National Commission on Terrorist Attacks Upon the United States (also known as the 9-11 Commission, an independent, bipartisan commission created by congressional legislation and the signature of President George W. Bush in late 2002), provides a full and complete account of the circumstances surrounding the September 11, 2001 terrorist attacks, including preparedness for and the immediate response to the attacks. Provides recommendations designed to guard against future attacks.
Date: July 22, 2004
Creator: National Commission on Terrorist Attacks upon the United States
Partner: UNT Libraries Government Documents Department