Emergency Response Plan Guidance for Small and Medium Community Water Systems to Comply With the Public Health Security and Bioterrorism Preparedness and Response Act of 2002
The U.S. Environmental Protection Agency (EPA) was introduced on December 2, 1970 by President Richard Nixon. The agency is charged with protecting human health and the environment, by writing and enforcing regulations based on laws passed by Congress. The EPA's struggle to protect health and the environment is seen through each of its official publications. These publications outline new policies, detail problems with enforcing laws, document the need for new legislation, and describe new tactics to use to solve these issues. This collection of publications ranges from historic documents to reports released in the new millennium, and features works like: Bicycle for a Better Environment, Health Effects of Increasing Sulfur Oxides Emissions Draft, and Women and Environmental Health.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Assessing the US's Current Ability to Understand and Test EMP Effects on Systems
During the Cold War, the United States as a nation, and its military in particular, were very focused on nuclear warfighting. After winning the Cold War this focus became significantly lessened. However, in the past decade new concerns have arisen and it is once again realistic to think that the US military might have to operate in a nuclear environment. The one nuclear effect with the possibility to effect very large areas almost immediately after a nuclear explosion is the electromagnetic pulse (EMP). The EMP has the ability to affect any system which is or is composed of electronics or conductive media (e.g., metal). As the most advanced military in the world, the US military is highly dependent upon advanced electronic systems to operate. By obtaining a better understanding of how an EMP is formed and propagated and then affects systems, the military can better design, test, and certify its systems to ensure that they are capable of operating in an EMP environment, and the better understanding will enable this to be done in a cost-effective manner. This paper shall look at what we know about EMP, the facilities and resources we have for improving that understanding, and make some recommendations for how to best move forward with future programs.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
The Progress That Has Been Made in the Application of the Moncrieff-System to Garrison, Siege, and Naval Ordnance, and to Coast Works
Explore the advancements in military technology with Captain Alexander Moncrieff's detailed account, "The Progress That Has Been Made in the Application of the Moncrieff-System to Garrison, Siege, and Naval Ordnance, and to Coast Works." This historical work, originally published in 1879, provides a comprehensive overview of the innovative Moncrieff system and its impact on military applications. Delve into the specifics of how the Moncrieff system was applied to enhance garrison defenses, siege weaponry, naval artillery, and coastal fortifications. This book offers valuable insights into the technological landscape of 19th-century military engineering and the strategic importance of these advancements. A must-read for military historians, engineering enthusiasts, and anyone interested in the evolution of defense systems.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Gaseous Continuous Emission Monitoring Systems
The U.S. Environmental Protection Agency (EPA) was introduced on December 2, 1970 by President Richard Nixon. The agency is charged with protecting human health and the environment, by writing and enforcing regulations based on laws passed by Congress. The EPA's struggle to protect health and the environment is seen through each of its official publications. These publications outline new policies, detail problems with enforcing laws, document the need for new legislation, and describe new tactics to use to solve these issues. This collection of publications ranges from historic documents to reports released in the new millennium, and features works like: Bicycle for a Better Environment, Health Effects of Increasing Sulfur Oxides Emissions Draft, and Women and Environmental Health.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Space 2035
Space capabilities are vital to United States national power, commerce, science, and prestige. These capabilities will grow even more vital to the United States' and the global economy by 2035. What will the space technology and operating environment look like in 2035? Technology trends in two fundamental areas -- spacecraft and space transportation -- indicate space technologies, capabilities, products, and services will become far more affordable, ubiquitous, globally available, and interconnected. By 2035, the Space Cloud will emerge. Analogous to the network model of cloud computing, the primary nodes of the Space Cloud will be globally accessible, space-based, have access to virtually limitless solar power resources, possess a global high altitude field of regard, and will be both distributed and collaborative.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Employment of Unmanned Aircraft Systems for Canadian Forces Anti-Submarine Warfare
Fixed-wing Unmanned Aircraft Systems (UAS) technology has experienced exponential growth over the past 10-15 years and is now employed as an intelligence, surveillance, and reconnaissance (ISR) asset by virtually every modern military force in the world, as well as by civil law enforcement agencies. Currently, more than 30 nations are developing or manufacturing more than 250 models of UAS. Substantial commercial market growth and competition in fixed wing UAS platforms for military and law enforcement applications resulted in a wide variety of UAS platforms from small, hand-launched aircraft that operate at low altitudes for short-duration, to large, complex turbo-prop and jet powered aircraft capable of long-endurance operations at medium and high altitudes. Employment of Medium-Altitude, Long-Endurance (MALE) and High-Altitude, Long Endurance (HALE) UAS in the anti-submarine warfare (ASW) role is rapidly becoming feasible through emerging technologies and expanded payload capacities, the most significant of which are secure high-bandwidth Beyond Line of Sight (BLOS) satellite datalink communications, miniature light-weight sonobuoys, and real-time shore-based acoustic processing. As a result, UAS may be a technically feasible future Canadian Forces (CF) ASW capability as a complementary or stand-alone alternative to manned fixed-wing and rotary-wing maritime ASW platforms.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Sleep Deprivation and Its Effect on Combat Effectiveness
This paper examines the effects of sleep loss on the combat effectiveness of the US Army's leaders and soldiers. It begins with an examination of US and Soviet doctrine for conducting continuous operations. This section discusses the doctrinal methods and procedures that both major powers employ to maintain continuous pressure on their opponent. After laying the theoretical groundwork, it then examines the changes that have occurred in tactical force design since World War II to determine what has been done to enhance or degrade our ability to execute that doctrine. After this discussion on the mechanical aspect of combat, the paper discusses the effects of sleep loss on units and the individual soldier. It concludes that the US Army currently has no doctrine for the conduct of combat over an extended period of time. Adequate doctrine has been provided for the conduct of operations in periods of both limited and unlimited visibility, but the doctrine necessary to transition to continuous operations is not available. Furthermore, recent changes in the force structure of our combat units (primarily Armor and Mechanized Infantry) have significantly reduced the redundancy and robustness in those units that is necessary to conduct continuous operations. During continuous operations our units will be affected by loss of sleep. Sleep deprivation affects the cognitive skills of our leaders greater than the physical skills of our soldiers. To fight the continuous operations that will be forced upon us by our opponent, we must prepare ourselves to combat the effects of sleep loss first.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Stunning Swarms
This paper proposes and advocates the concept of Micro-Air Vehicle Incapacitating Swarms (MAVIS) as an effective non-lethal capability for irregular warfare as well as other spectrum-of-warfare applications. The intent of MAVIS is to provide an alternative to the conventional USAF arsenal that typically produces unacceptable collateral damage in the COIN/IW (counter-insurgency/irregular warfare) fight. Collateral damage has proven counterproductive to winning the hearts and minds of the populace afflicted with the cancer of insurgency/terrorism. Due to the difficulty in determining the exact targets in a dynamic urban environment or in any situation with imperfect intelligence, MAVIS will be used in an "area attack" fashion to administer metered doses of medication to subdue combatants as well as nearby civilians. Rendered unconscious from the fast-acting and long-lasting medication, the insurgents/terrorists will be removed from the populace while sedated, processed to gather intelligence, and permanently separated from the people. MAVIS will deny insurgents/terrorists their cherished martyrdom, allowing the threatened government to process them as it sees fit.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Unmanned Horizons
The one and only shot the US had against Osama bin Laden was all down to a new surveillance aircraft the CIA was still testing and evaluating at the time. Commanders decided putting the small unmanned drone, what was then called a UAV, through a little 'real world' experience might be interesting. The shot was not taken due to a mix of domestic political and diplomatic reasons. Indeed one problem was that the closest 'shooter' or USAF fighter would have had to violate allied airspace unannounced - a tough ask during an unstable nuclear stand-off between Pakistan and India.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Can You See Me Now? Visualizing Battlefield Facial Recognition Technology in 2035
Facial recognition technology will create the capability to provide positive identification of persons in a battlefield environment in the year 2035. This paper examines the state-of-the-art in facial recognition technology in the areas of access control and law enforcement. The technologies are then projected forward to examine a notional facial recognition system in the year 2035 and examine its components. In discussions with biometric experts from both the United States and United Kingdom, the viability of such a system is examined. Challenges, both in the technology and political/bureaucratic realms, are examined and possible solutions are posited. The paper poses three scenarios in which a facial recognition system could be of use to Coalition forces operating in a counterinsurgency environment. These three scenarios--passive identification in a crowd, intelligence source verification, and sector control--show the range of applications for facial recognition on the battlefield. The paper concludes with a roadmap to assist in the focusing of research and allocation of resources as facial recognition technology evolves. With appropriate levels of effort, a technology that is currently capable only in very controlled conditions will evolve into a viable system for positive identification on the battlefield by the year 2035.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Talking Back
The information age is altering weapon system development and improvement. Information communications, storage, and computing technologies will revolutionize system development, operations, maintenance, and logistic processes. Based on the so-called laws of Gilder, Metcalfe and Moore and current DoD weapons trends the futures of these technologies provide opportunities to progress the paradigm of weapons development and improvement.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Integrating the B-2 Into Link 16 Operations
Network centric warfare is a key enabler to present day military operations. Link 16, a tactical data link, is one means that combat air forces utilize to leverage network centric warfare. In the past, the B-2 community relied on stove-piped communications systems, but now the B-2 is in the early stages of implementing a fully integrated Link 16 system. This paper will show that the current integration of Link 16 will enhance the B-2's overall mission effectiveness by decreasing aircrew workload, increasing situational awareness, and eliminating many opportunities for human error. However, the current Link 16 implementation also has several hurdles to overcome in order to be fully effective. These hurdles, which include implementing hardware and software improvements, maximizing training opportunities, and emphasizing a commitment to Link 16 use in combat operations, are also addressed.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Unmanned Undersea Vehicles and Guided Missile Submarines
During the Cold War the United States developed the Trident class ballistic missile submarine (SSBN) to replace the aging fleet of forty-one Poseidon ballistic missile submarines. Each of the eighteen Trident class submarines built to carry the mantle of strategic nuclear deterrence was extremely large and quiet with tubes for twenty-four ballistic missiles. Following the breakup of the Soviet Union and the end of the Cold War, the United States conducted a review of its nuclear posture, which determined that only fourteen of these submarines were necessary to meet the needs of U.S. national security.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Air Force Satellite Control Network
Originally designed in the late 1950s, the Air Force Satellite Network (AFSCN) was activated to support the Discoverer Program. Now the AFSCN provides global support for over 80 communication, navigation, missile warning, and meteorological satellites and other satellite systems for the DoD and Air Force. It has the flexibility to support Low-, Medium-, and High-altitude satellites operating in various orbits. The AFSCN is comprised of two satellite control centers, eight Remote Tracking Stations, a test facility, and a communications network linking it all together.This research paper demonstrates that the AFSCN is a force multiplier, and the center of gravity for military space operations, which needs increased security measures and upgrading. The AFSCN provides command and control capabilities for satellites that enhance several principles of war which regional commanders use to their advantage to shape the battlefield. The AFSCN faces the threats of terrorism, frequency intrusions, aging infrastructure, and budgetary constraints. In order to ensure the future of the AFSCN these threats need to be addressed. The DoD and the Air Force need to address these AFSCN threats by increasing security measures, re-writing operations orders, diplomatic relations, upgrading the infrastructure, and creating AFSCN interoperability. Taking these measures will ensure future survivability and sustainment of the AFSCN.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Integrating Unmanned Aerial Vehicles With Current Combat Search and Rescue Doctrine
The events of September 11, 2001 brought home to the United States (U.S.) the realities of the Post Cold War World. With the realization that our Republic's armed forces are fighting a new type of enemy came a demand that the United States military defeat this new threat using every tool in our arsenal.1 The use of United States Air Force Predator Unmanned Aerial Vehicles (UAVs) and externally carried Hellfire anti-armor missiles against selected Taliban and al Qaeda targets was the first modern-day UAVs to do so in combat.2 This use of UAVs in a direct combat role, as opposed to their traditional Reconnaissance, Surveillance and Target Acquisition (RSTA) role, led me to the idea of using UAVs for other non-traditional roles in combat. As an Army UH-60 Black Hawk helicopter pilot, Combat Search and Rescue (CSAR) is an integral part of our Army Aviation mission. This is also true among the other services' rotary-wing and fixed-wing communities. A common problem among all the services, particularly the Air Force, is the limited amount of resources and manpower that are devoted to the CSAR mission. Under the current force structure, exactly 105 HH-60G Pave Hawks in the Air Combat Command inventory are too few to perform the potential number of missions required to support current operations.3 The rescues of Lieutenant Colonel Iceal Hambleton in Vietnam and Captain Scott O'Grady in Bosnia illustrate the difficulty associated with CSAR operations on the modern battlefield.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Tactical Reconnaissance
Ever since the Isrealis demonstrated how Unmanned Aerial Vehicles (UAVs) could be effectively used in operations, interest in UAVs has intensified. Following their successful employment on the battlefield in Desert Storm, technology has driven the development of more capable UAVs. The major improvements in UAVs in recent years have been in the role of tactical reconnaissance. In this role the UAV has significant capabilities to offer, some that are unmatched by other platforms. This paper will demonstrate that with the growing importance of information in warfare the UAV is suited to fill the information gap on the battlefield. The doctrine for UAV operations has not kept pace with the fast paced developments in this field. Their organization also needs to break out of the traditional mind-set. When employed in an efficient manner, the inherent qualities of expendability and low cost make the UAV capable of significantly complementing manned aircraft platforms in the role of tactical reconnaissance.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Spectrum Management
As recently as September 2007, Deputy Secretary of Defense Gordon England directed the establishment of a task force to coordinate unmanned aircraft systems (UAS) issues and determine a way ahead to provide for "common, joint, and operationally effective UAS programs."1 Aren't the systems we have now common, joint, and operationally effective? Why the need for a task force and why did he mention specific areas to address including streamlining acquisition and management, interoperability, integration of UAS into civil airspace, frequency spectrum and bandwidth use, and payload and sensor management?2 The answers are not easy ones, but mainly concern the issue of increasing demand for these systems and their products, and the current existing challenges. The communications area of frequency and bandwidth availability is one case where these challenges will continue to increase as demand increases.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Force-Multiplier for the F-15C
The Joint Tactical Information Distribution System (JTIDS) data link for the F-15C is a force-multiplier for the year 2000 and beyond. The Department of Defense must commit the funds to this critical program now. It will enable the USAF to gain and maintain air superiority over enemy airspace even with the dwindling numbers of airframes left in the inventory. The operational F-15C is over 20 years old and has had many major upgrades to the basic platform to extend and enhance its superiority over any potential opponent. The USAF must be allowed to purchase JTIDS for its F-15C's to preserve air superiority over future battlefields. The critical operational issues that must be addressed when evaluating an upgrade as a force-multiplier are: is mission effectiveness increased, is situational awareness increased, is mutual support enhanced, and is it interoperable with other C4I systems?This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Improving F-15C Air Combat Training With Distributed Mission Training Advanced Simulation
Air Combat Command is investing in Distributed Mission Training (DMT) to provide realistic mission training to the Combat Air Forces (CAF) using advances in simulation technology. DMT will network advanced simulators (and some real-world systems) to provide combat aircrews with team training in a synthetic wartime environment. F-15C units will be first in the CAF to incorporate DMT; they are confronted with developing training programs utilizing this new tool without previous experience of how to exploit the benefits of simulation for air combat training. This paper seeks to assist syllabus developers by providing a summary of lessons learned from years of air combat simulation study, and applying those lessons to DMT. A comprehensive analysis of air combat simulation training studies provides insight on how to improve F-15C air combat training using DMT. Studies not only demonstrate simulators can provide effective training, but also identify unique benefits and limitations of simulator training, and offer several training program considerations to achieve the most effective results. DMT benefits not available in flight training include unique instruction options, the capability to repeatedly practice desired tasks or missions, and the opportunity to train in complex combat scenarios. Identified limitations include sources of negative training and the lack of physiological stresses or inputs that may be desired in training. For training programs, simulator studies suggest which tasks should be emphasized in DMT, how metrics can identify training needs, who is expected to gain the most benefit from DMT, and how to intermix DMT and flight scheduling to optimize training.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
The Comanche Helicopter
On 23 February 2004, the Acting Secretary of the Army Les Aspin and the Chief of Staff of the Army General Peter Schoomaker, announced the cancellation of the Comanche program. In the minds of these two gentlemen, the evidence presented in a 2003 comprehensive review of aviation-a changing environment, an aging fleet, and budgetary concerns-demanded immediate and drastic action. This paper investigates those claims through the eyes of the Comanche program managers during the final seven years of the program. After numerous interviews, it is apparent that the claims made during the cancellation briefing do hold merit. However, they only portray a snapshot in time. To understand why the program suffered its eventual fate, one needs to consider the program in its entirety.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
A Simulation Based Methodology to Examine the B-1B's AN/ALQ-161 Maintenance Process
This thesis looks at the maintenance procedures associated with the defensive electronic counter measure (ECM) system on the B-1B, designated the AN/ALQ-161. Computer simulation of the current line-replaceable-unit (LRU) maintenance network for Ellsworth AFB and Dyess AFB is modeled. In addition, two hypothetical repair networks are proposed and analyzed. This research considers the applicability of this type of computer simulation, using ARENA software to study the AN/ALQ-161 repair system. The contribution of this research is a discrete simulation methodology specific to the AN/ALQ-161 LRU repair line. Two response variables of interest were addressed, work-in-process and machine utilization. A total of 20 different repair scenarios were analyzed for the three different LRU networks simulated. A best-case scenario is selected from each model and the results are compared to one another.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Modeling Urban Warfare
The United States military is performing operations in urban environments with increasing frequency. Current Department of Defense doctrine is poorly suited to train and equip today's warriors with the tools and experience necessary to fight and win in modern sprawling cities. In order to close the gap, the U.S. Joint Forces Command's Joint Experimentation Directorate led an effort to run a massively distributed simulation of a synthetic urban environment utilizing human-in-the-loop operators called URBAN RESOLVE. The synthetic environment simulated the city of Jakarta with over 1,000,000 buildings and structures and over 120,000 civilian entities. A Red force retreated into the city while a Blue force attempted to determine the enemy's Order of Battle. The exercise generated over 3.7 terabytes of data in seven distinct trials.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Security Force Assistance Logistics
When are a nation's security forces deemed self-reliant? Security force assistance (SFA) is one process of building or rebuilding a nation's security forces. If the ultimate goal of SFA is producing a self-reliant force capable of responding to a nation's security requirements, then accurately assessing that force's ability to sustain itself should be of great interest to assisting and assisted nations alike. A self-reliant security force with an autonomous sustainment system gives the assisted nation a measure of independence and self-determination. In turn, the assisting nation benefits from the regional (perhaps even global) stability generated in addition to relief from having to provide trainers, materiel, and funding. This monograph proposes that fully integrating efforts to build logistics capability, capacity, and infrastructure into the overall SFA effort will produce enduring, self-reliant foreign security forces able to sustain themselves across the spectrum of the logistics functions. However, achieving self-reliance not only requires the integration of efforts. It also means providing honest assessment and appraisal of the foreign security force (FSF) by the assisting nation's advisors and senior leaders. Not fully integrating logistics development into our SFA programs or not providing candid assessments of SFA logistics efforts in Iraq, Afghanistan, and future venues risks the formation of unsustainable security force structures that will ultimately collapse after assistance ends.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
A Shot to the Space Brain
The US military is becoming reliant on space systems. These systems provide us the essential information and communication means required to dominate the future battle-space. This reliance has extended beyond military programs, however, and now includes a reliance on commercial and civil systems. While this trend towards non-military systems is inevitable, does reliance on civil and commercial space systems create a unique center of gravity for the US military? This paper evaluates this issue by first identifying the need to use non-military systems and then developing a theory for analysis of realistic vulnerabilities of space systems. The focal point for this analysis is the command and control segment for a particular program. Four specific civil and commercial systems (Landsat, SPOT, Radarsat, and INTELSAT) are evaluated in light of this analysis.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Deep Battle Exploitation in Rapid Decisive Operations
This research offers new doctrine guiding use of airborne forces. The primary method was synthesizing past and current airborne doctrine and practice with recent advances in technology and capabilities to come up with a fresh look at solving airborne problems. The traditional problems encountered by airborne forces are fratricide, assembly delays, aircraft vulnerability to AAA, SAMs, and enemy aircraft, resupply, and vulnerabilities after insertion. These include foot speed maneuver limits, little protection against heavy forces, and potential of being isolated. These problems can be overcome by following a new doctrine of Deep Battle Exploitation building on existing technology improvements like GPS, satellite communications, NVGs, improved intelligence, and data links such as Blue Force Tracker and Link 16. This doctrine integrates overarching Rapid Decisive Operations concepts applied at the operational level and is stated as using multiple (15+) simultaneous airborne force insertions forward of the main battle lines with no requirement of link up operations. These company to battalion size forces will operate like SOF, but focus overtly on JFC objectives in either a supporting or supported role. Implementing this doctrine requires no new aircraft or hardware, but needs significant changes in Army and Air Force doctrine and training in tactics, techniques, and proceduresthat can be done today! Key words: Rapid Decisive Operations (RDO), non-linear, simultaneous, non-contiguous, swarm, Strategic Brigade Airdrop (SBA), Airland Battle, Joint Targeting, airborne, airdrop, air assault, simultaneity and depth.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Military Space Control
Military space control describes the capability to secure a military asymmetric advantage in space. Space control protects space assets to guarantee access to space services, and at the same time, prevents an enemy from benefiting from resources in space. The tremendous growth in the integration of space systems into today's warfighting machinery is driving a remarkable transition in the military space domain. The growing need for information dominance is the impetus for an increasing military dependence on space services. This reliance on space systems is compelling military decision makers to make key strategic choices about the future of space control.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
High Power Microwaves
The conclusion of this study is that high power microwave technology is ready for the transition to active weapons in the U.S. military. It reviews various applications of high power microwave weapons in strategic and operational missions for the Air Force, considers the implications of the integration of microwave technology into operational weapons, and examines numerous constraints and challenges associated with the transition of new technologies and systems into the Air Force inventory. This study concludes that high power microwave weapons systems offer the prospect of significant offensive and defensive capabilities for all of the military services. The principal recommendations include the suggestion that the Department of Defense and the Air Force establish a High Power Microwave Systems Program Office for the purpose of developing these weapons and integrating them into the combatant commands. This systems program office should be a joint program office that involves the participa-tion of the Army, Navy, and Marine Corps as well as other agencies. Only then will the U.S. military be able to maximize the development of microwave applications, minimize costs, and facilitate the transition of this unique technology to the military services and other government agencies. Not only should defense contractors be encouraged to develop the technical capabilities that would permit them to participate in microwave weapons programs, but this study also concludes that all U.S. military systems should be hardened to protect them against the effects of microwaves.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Sentinel Chameleon
Sentinel Chameleon: A Concept of Operations for Employment of Unmanned Aerial Systems for Persistent Information Operations in 2030 The year is 2031. Coalition Forces are conducting Foreign Internal Defense and stabilization operations at the request of a terrorist-plagued nation in North-East Africa. There have been credible threats of a Weapons of Mass Destruction (WMD) attack using conventional delivery methods; most likely in the form of a dirty bomb. There is no indication that the host country has an organic WMD capability. A Sentinel Chameleon (SENCHEON) constellation has been operating over a designated area for 37 hours where the coast and the borders of a neighboring country, known to deal in WMD materials, can be closely monitored. The Master Planning Tasking Command and Control Mission Lead (MPTC2ML) is a Marine Corps Joint Forces Commander established by Africa Command (AFRICOM) and has set up headquarters in the troubled country. The MPTC2 center is located in the Coalition Air Operations Center. The Combined Forces Maritime Component Commander (CFMCC), comprised of US Navy combatants from Commander FIFTH Fleet (C5F), has been conducting Maritime Interdiction Operations (MIO) from the straight of Babel Mandeb to the Northern Kenyan coast. Although piracy interdiction has been successful, the Navy's Visit Board Search and Seizure (VBSS) of suspect vessels has not yielded indications of Chemical Biological Radiological or Nuclear (CBRN) materials. The Combined Forces Land Component Commander (CFLCC) is providing support to boarder control authorities, but for the most part this responsibility has fallen to the host nation. WMD proliferation is growing and the threat to the FID operation is imminent. So, what kind of Unmanned Aerial System is SENCHEON? How is it different from any other? What can it do to help eliminate the threat?This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Protecting Commercial Space Systems
Key questions will address the impact on U.S. national security due to attacks on commercial space assets. What is the `real' impact of commercial space on the U.S. economy (not just spending)? How would loss of commercial space capabilities impact U.S. warfighting capability? What constitutes an attack on a commercial space system? How do we deter and detect an attack? How should the U.S. respond to such attacks, proportionally or massively? Finally, what policy and process changes are needed to protect our national security?This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
JSTARS, E-10A and the Kill Chain
This research paper examines the Joint Surveillance Target Attack Radar System (JSTARS), its successes and shortfalls, its eventual replacement, the E-10A, and how both fit into the Find, Fix, Track, Target, Engage, and Assess (F2T2EA) Kill Chain construct for Effects-Based Operations in a Network-Centric environment. Information Superiority is a key enabler for dominance of the 21st Century battlespace. To this end, sensor-to-shooter operations are crucial for timely enemy force attrition. JSTARS' ability to conduct Intelligence, Surveillance, and Reconnaissance (ISR) as well as command and control operations is a lynchpin to providing the Joint Force Commander the predictive battlespace awareness (PBA) necessary for combat operations. Despite limitations in training, joint force education and experience, and its utilization in the Kill Chain, JSTARS' role will only increase in importance and expand with the fielding of the E-10A aircraft to provide real-time ISR and Battle Management Command and Control (BMC2) support to the Joint Force Commander.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Impact of Weapon System Complexity on Systems Acquisition
This paper reviews the previous use of the term complexity with respect to weapon systems. It then moves past these dated inferences that weapon system complexity is merely a synonym for cost or technical challenge and establishes a formal definition of complexity based on the interactions between the entities comprising the system. Due to difficulties in direct measurement of interactions, an equation is introduced to calculate the theoretical maximum number of interactions and to use this as the measurement of complexity. Based on this definition, analysis of data for aircraft avionics and airborne reconnaissance sensors suggests convincingly that system complexity is indeed increasing exponentially. Increasing complexity can be linked to system development cost and schedule and production cost as previously inferred by at least some researchers. No single solution exists for addressing this trend of increasing complexity. Attempts can be made to either limit the amount of complexity of future weapon systems while still providing adequate performance increases or to better cope with complexity. In regard to the latter, it has been suggested that acquisition is analogous to Clausewitzian warfare in some key respects and that the cultivation of acquisition genius should be pursued in like manner to the cultivation of war genius.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Tactical Information Gathering in the High Technology Command and Control Environment
This study investigates the US Army division commander's leadership responsibilities in directing the information gathering effort of his high technology command and control systems. The study first summarizes some major criteria for effective command and control. The study briefly describes today's command and control environment, recognizing the effects of the latest technology, revised doctrine, and the timeless human element of war. It then examines the potential effects of high technology information gathering on effective command and control. The study identifies five leadership requirements for the division commander in directing the information gathering effort. Those requirements are to: emphasize "command" over "control", organize the systems for the information gathering effort, focus the information gathering effort, discipline the information gathering systems, and train for the effort. The study concludes that the division commander's personal and organizational leadership is necessary to gain the great advantages of the US Army division's modern information gathering systems while minimizing the inherent adverse effects of those systems on effective command and control.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
The Need for a Dedicated Space Vehicle for Defensive Counterspace Operations
This paper investigates the defensive counterspace function as defined in Air Force Doctrine Document 1 and considers whether an on-orbit capability is needed for its fulfillment. The discussion begins with the examination of threats to space systems, how they are likely to be attacked and the means with which to counter those attacks. The examination focuses on the space element and determines that a space-based defensive capability will be needed to protect orbital assets in the future. The defensive potential of ground-based systems and self-defending spacecraft are determined to be inadequate, leading to the conclusion that a dedicated, mission specific vehicle design is the best option for fulfilling the defensive counterspace function. Finally, preliminary considerations of vehicle design and mission capability indicate that the first iteration of this vehicle should be ground-stationed, reusable, and prepared to launch into earth orbit in time of heightened tensions or war to carry out the defensive counterspace mission.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Lt. Gen. Forrest S. Mccartney
The achievements of the earliest space professionals teach some key lessons about what a space professional looks like. The first space professional was retired Air Force Lieutenant General Forrest Striplin McCartney. His career is a perfect example of a professional space career. After graduation from college and an assignment at Cape Canaveral, Florida, laying the same communications cables he would later use, McCartney had assignments in space operations taking pictures of the Soviet Union from Corona satellites, in acquisitions buying the Titan III space launch booster and communications satellites, and along the climb to lieutenant general, developed his professional skills as a leader of military organizations. This paper is about a space professional reveals the value of studying the development of space professionals in the 20th century as a means of developing space professionals in the 21st century.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Shaping the Engineer Force for the Asymmetric Threat
This monograph looks at the current state of the divisional engineer capability in both the heavy and light U.S. Army divisions. Its intent is to determine whether or not the divisional engineers are sufficiently capable of dealing with the challenges of the emerging asymmetric environment. The central theme behind this investigation is to investigate how world has changed since the end of the cold war and whether or not Army Engineers are reacting to the changes. The loss of the global bipolar environment has given way to a new era of increased instability and the emergence of dangerous asymmetric threats. The Army has begun the process of adapting to the new environment thru a long term Transformation process that will eventually yield the Objective Force. Unfortunately, it will be several years before that force is ready to be used and the current force must be ready to counter real world threats. The methodology for this paper began with an investigation of the new asymmetric environment. The Contemporary Operational Environment (COE) was chosen as the best model to compare engineer capabilities to. Divisional engineer capabilities were compared to several key principals that an asymmetric foe will likely use and a prioritized list of shortfalls was developed. The investigation looked at possible solutions to the shortfalls through reliance on echelon above division (EAD) augmentation and the new force developments embodied in the Force XXI concept and the Interim Force concept. The solutions suggested by EAD augmentation and force modernization both proved inadequate to overcome the shortfalls. The temporary solution to engineer shortfalls lies with a reorganization of engineer structure within the heavy and light "legacy" divisions. This reorganization calls for the inclusion of several engineer capabilities that are not currently resident in the division structure. The most significant of these are the addition of a modest general engineering capability andThis work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
The Future Role of the USAF Technical Officer
This paper examines the role of USAF technical officers (TOs) as envisioned by the post-World War II Scientific Advisory Board (SAB) report, Toward New Horizons, co-authored by General Henry 'Hap' Arnold and the renowned aerodynamicist Dr. Theodore von Karman. The current role of TOs according to existing career path guides and the future role as envisioned in the latest SAB report, New World Vistas are also examined. The examination of the TO role addresses advanced technical education and a clear path to senior leadership positions. The current path to senior leadership positions for TOs appears to be solely through acquisition management. These two areas are addressed explicitly in New World Vistas, which highlights the importance of these issues and the future role of TOs ensuring USAF technological superiority in the 21st century. A working definition of USAF TOs is formulated which includes the scientific research and development Air Force Specialty Code (AFSC) (61SX) and the developmental engineering AFSC (62EX) as well as the acquisition manager AFSC (63AX). These specialties currently reside within the acquisition and financial management career area. The author concludes by proposing a number of innovative ideas. Concepts such as the formation of a technical officer corps (TOC) and its vigorous management by the personnel system to ensure there are no recruitment and retention shortfalls are recommended. This vital national security resource-the USAF technological superiority and the men and women of the TOC who are key to America's current and future technical supremacy-guards our nation from any future technological surprises which may threaten America and the free world.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Beyond Awareness
Ever since the United States beat the Soviet Union in the space race, the United States has lived with an illusion of space superiority. In military terms, this means that the United States has enjoyed both freedom of action and freedom from action in space. The Chinese shoot-down of the FY-1C satellite on January 11, 2007 forced the United States to look over its shoulder, and when it did, the United States realized that not only was the race still on, but the dragon and others were rapidly gaining ground. One year later the United States responded by shooting down the US-193 satellite in what may be the opening volley of a new contest to control space. The 2007 Chinese anti-satellite (ASAT) test clearly shows that other nations are aware of the US dependence on space and some of them may be unwilling to let US space superiority go unchallenged. In order to maintain freedom of action in space, the United States must move beyond the present paradigm of space situational awareness and towards one of comprehensive space situational knowledge.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Analysis of GPS Satellite Allocation for the United States Nuclear Detonation Detection System (USNDS)
The United States Nuclear Detonation Detection System (USNDS) relies on sensors onboard NAVSTAR Global Positioning System (GPS) satellites to detect atmospheric nuclear detonations. Though there are currently over 24 operational GPS satellites, USNDS ground based antennas are only capable of actively monitoring 24 satellites at a time. Personnel at the Air Force Technical Applications Center (AFTAC) desire a well-defined methodology for selecting which 24 satellites should be monitored to maximize global coverage capability. This research introduces a means to numerically quantify each satellite's individual contribution to the coverage provided by the constellation as a whole. A heuristic generates a set of possible combinations of satellites that yield high global coverage.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Upon This Rock
The use of space permeates all aspects of the American way of life. If the U.S. is to protect its space capabilities, it must increase its space situational awareness (SSA) to provide the foundation for activities in space. In the year 2030, congestion will describe the space environment. Space debris will be abundant, and satellite size will diminish through technology proliferation. The Air Force, as the Executive Agent for Space, will need to diagnose and attribute space events to meet this threat; however, current radar and optical telescopes cannot resolve these small objects.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Retaining Army Engineer Officers
Policy and doctrine require the U.S. Army to provide certain capabilities during the conduct of stability operations. The Department of Defense now considers stability operations as critical to success as offensive and defensive operations. Operations that require technical engineer capabilities, specifically infrastructure reconstruction operations, require a portion of the engineer officer corps to possess a technical engineering education. Trends in officer accessions and retention indicate a shortfall in technical engineering education among the engineer officer corps, casting doubt in the ability of the Engineer Regiment to meet anticipated future requirements. Senior engineer leaders identified these conditions and initiated a campaign to increase technical competence within the regiment. This monograph contributes to this effort by identifying factors that affect the retention of engineer officers who possess engineering degrees. The results of a survey of engineer officers at Fort Leavenworth reveal these officers possess lower job satisfaction than officers who possess non-engineering degrees and officers across the Army. These officers are more likely to believe their experiences in the Army did not match their pre-commissioning expectations contributing to perceived "psychological contract violations." The monograph suggests leaders conduct a series of studies over time to assess the effects of initiatives to increase technical competence within the Engineer Regiment.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Robotics
New technology may be able to help answer the cries to reduce casualties resulting from friendly fire and collateral damage, as well as assist the military in performing urban operations. Unmanned vehicles, whether air, land or sea, are one means to get our airmen, soldiers, marines, and sailors out of harm's way and are most likely a key driver to an upcoming revolution in military affairs (RMA) for all services. The major objective of the paper is to bring attention to Tactical Mobile Robots (TMR) and hopefully encourage follow-on studies and to cultivate an enthusiasm to employ them correctly to help get our troops out of harms way and win battles. This study focuses primarily on the use of TMRs in the special operations environment. The paper discusses the current and immediate TMR capabilities; key logistics concerns regarding maintenance, supply, and transportation; and two possible scenarios, one in an unconstrained battlefield and the other in an urban environment. The data collected was primarily via conducting interviews and witnessing experiments and they highlight a few barriers, which must be addressed if unmanned platforms are to keep pace with congressional orders.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Small Power
The United States Air Force (USAF) will face several difficult choices as it procures unmanned aerial vehicles (UAVs) in the near future. Decreasing budgets and increasing UAV costs will significantly impact the Air Force's ability to procure large numbers of "high cost" UAVs. As defense dollars shrink, so will the robustness of the USAF's UAV fleet. In addition, these low density assets will operate in a more lethal battlefield environment brought about by the rapid advancement of dual use technologies and the worldwide proliferation of advanced Integrated Air Defense Systems (IADS). Unlike Afghanistan and Iraq, future enemy IADS could render "high cost" conventional UAVs, such as the Predator and Global Hawk, unviable from an operational risk perspective. However, technological advances and new operational concepts, such as cooperative behavior and swarming, are expanding the capabilities of micro and small UAVs and providing the Air Force with a low cost solution to this potential problem. In the future, these small unmanned vehicles will perform many missions once reserved for large high cost UAVs. Procured in large numbers and at a fraction of the cost of today's UAVs, micro and small UAVs will be effective force multipliers for the USAF in the future.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Air Force Development Test and Evaluation Under Acquisition Reform
Acquisition Reform changed government involvement in system acquisition with transition to best commercial practices. Shortened acquisition timelines, reduced budgets and increased contractor test responsibilities intensifed several issues. These issues are test planning and execution capabilities, joint contractor and government test efficiency, and both government and industry test experience levels. Today's DTE methods are insufficient to successfully overcome increased system complexity, decreased test budgets, and reduced manpower challenges of the future. To meet these challenges, this project presents six test recommendations which enhance DTE contributions to the acquisition process. The six recommendations are: 1. Develop a single commercial industry standard governing military aviation testing. 2. Emphasize greater simulation configuration control and technological simulation advances, with software test and avionics integration simulation the highest priorities. 3. Refine the Integrated Test Team Concept to combine contractor, development, and operational test requirements in addition to innovative test program teaming. 4. Streamline development and operational test data requirements and allow contractor and development test personnel to supplement operational test teams. 5. Automate test planning and execution functions to reduce manpower investments. 6. Modify the Federal Aviation Administration Designated Engineering Representative concept to increase contractor test autonomy.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Optimal Adoption of Green Roofs
New growth within established communities puts undue pressure on existing infrastructure which in turn, drives tax rate increases for all residents to cover. However, there are sustainable methods that municipalities can turn to that diminishes the local impacts of new growth on the community. Based on the absorptive nature of green roofs, the delayed release of stored rainfall volume diminishes the instances of combined sewer outflows as well as reduces the need for increased infrastructure to convey and treat stormwater discharge. A municipality can introduce planned percentages of green roof coverage which will diminish infrastructure improvement costs over time and increase the population's sustainable footprint. By employing the curve number method for determining runoff volumes from specific rain events and attaching cost-per-unit increase values to the interacting variables, the runoff-cost model produces cost curves in relation to the percentages of green roof coverage. From this runoff-cost model, (based on a specific area), a calculated 40% green roof coverage can be fully reimbursed to the builders through tax abatements, eliminating the perceived cost premium of green over conventional roofs.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Analysis of Online-Delaunay Navigation for Time-Sensitive Targeting
Given the drawbacks of leaving time-sensitive targeting (TST) strictly to humans, there is value to the investigation of alternative approaches to TST operations that employ autonomous systems. This paper accomplishes five things. First, it proposes a short-hop abbreviated routing paradigm (SHARP) -- based on Delaunay triangulations (DT), ad-hoc communication, and autonomous control -- for recognizing and engaging TSTs that, in theory, will improve upon persistence, the volume of influence, autonomy, range, and situational awareness. Second, it analyzes the minimum timeframe need by a strike (weapons enabled) aircraft to navigate to the location of a TST under SHARP. Third, it shows the distribution of the transmission radius required to communicate between an arbitrary sender and receiver. Fourth, it analyzes the extent to which connectivity, among nodes with constant communication range, decreases as the number of nodes decreases. Fifth, it shows the how SHARP reduces the amount of energy required to communicate between two nodes. Mathematica 5.0.1.0 is used to generate data for all metrics. JMP 5.0.1.2 is used to analyze the statistical nature of Mathematica's output.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Deux Ex Machina
With the rapid growth of communication and computational capacity, one area of the military that is an obvious candidate for transformation is command and control (C2). Network Centric Warfare (NCW) advocates believe that linked sensors, shooters, and decision makers will be able to plan and execute combat action more rapidly and more effectively than non-linked units. Skeptics of NCW believe it has the potential to place too much emphasis on the technical and tactical aspects of warfare. Another potential weakness of the NCW concept is information overload at all levels of command. Sensor fusion is a method of using computer algorithms to combine information from various sensors into one track to reduce information overload. Sensor fusion algorithms may combine discrete tracks or may combine measurements from two or more sensors. Sensor fusion may involve input from similar sensors, such as two radars, or dissimilar sensors such as a radar and a forward looking infrared (FLIR).This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
An Examination of Latency and Degradation Issues in Unmanned Combat Aerial Vehicle Environments
There are two basic ways to control an Unmanned Combat Aerial Vehicle (UCAV) as it searches for targets: allow the UCAV to act autonomously or employ man-in-the-loop control. There are also two target sets of interest: fixed or mobile targets. This research focuses on UCAV-based targeting of mobile targets using man-in-the-loop control. In particular, the interest is in how levels of satellite signal latency or signal degradation affect the ability to accurately track, target, and attack mobile targets. This research establishes a weapon effectiveness model assessing targeting inaccuracies as a function of signal latency and/or signal degradation. The research involved three phases. The first phase in the research was to identify the levels of signal latency associated with satellite communications.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
The Elimination of Corrosion
United States Air Force aircraft currently average 30 years old. As this aircraft fleet continues to age, the cost of corrosion maintenance, both in terms of dollars spent and lost operational readiness, increases correspondingly. Corrosion maintenance cost the Air Force over $1.5 billion in 2004, and trends show that number quickly rising, as it cost only $800 million in 1998. These rising costs must be reversed before Air Force operations suffer serious detrimental effects. Nanotechnology offers one possible solution for creating new revolutionary anticorrosion coatings capable of adapting to environmental damage and conditions.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.