Search Results

open access

Assessing Terrorist Motivations for Attacking Critical Infrastructure

Description: Certain types of infrastructure--critical infrastructure (CI)--play vital roles in underpinning our economy, security and way of life. These complex and often interconnected systems have become so ubiquitous and essential to day-to-day life that they are easily taken for granted. Often it is only when the important services provided by such infrastructure are interrupted--when we lose easy access to electricity, health care, telecommunications, transportation or water, for example--that we are … more
Date: December 4, 2006
Creator: Ackerman, G.; Abhayaratne, P.; Bale, J.; Bhattacharjee, A.; Blair, C.; Hansell, L. et al.
Partner: UNT Libraries Government Documents Department
open access

Landmine policy in the near-term: a framework for technology analysis and action

Description: Any effective solution to the problem of leftover landmines and other post-conflict unexploded ordnance (UXO) must take into account the real capabilities of demining technologies and the availability of sufficient resources to carry out demining operations. Economic and operational factors must be included in analyses of humanitarian demining. These factors will provide a framework for using currently available resources and technologies to complete this task in a time frame that is both pract… more
Date: August 1, 1997
Creator: Eimerl, D., LLNL
Partner: UNT Libraries Government Documents Department
open access

REDUCTIONS WITHOUT REGRET: DETAILS - AVOIDING BOX CANYONS, ROACH MOTELS, AND WRONG TURNS

Description: The United States is concurrently pursuing the goals of reducing the size of its nuclear weapons force – strategic and non-strategic, deployed and non-deployed – and of modernizing the weapons it continues to possess. Many of the existing systems were deployed 30 to 50 years ago, and the modernization process can be expected to extend over the next decade or more. Given the impossibility of predicting the future over the lifetime of systems that could extend to the end of this century, it is es… more
Date: August 9, 2013
Creator: Swegle, John A. & Tincher, Douglas J.
Partner: UNT Libraries Government Documents Department
open access

Historical precedence and technical requirements of biological weapons use : a threat assessment.

Description: The threat from biological weapons is assessed through both a comparative historical analysis of the patterns of biological weapons use and an assessment of the technological hurdles to proliferation and use that must be overcome. The history of biological weapons is studied to learn how agents have been acquired and what types of states and substate actors have used agents. Substate actors have generally been more willing than states to use pathogens and toxins and they have focused on those a… more
Date: May 1, 2004
Creator: Estes, Daniel P.; Vogel, Kathleen Margaret; Gaudioso, Jennifer Marie; Hickok, Lauren T.; Jung, Danielle F.; Barnett, Natalie Beth et al.
Partner: UNT Libraries Government Documents Department
Back to Top of Screen