Preparing the US Army for Homeland Security

Total Page:16

File Type:pdf, Size:1020Kb

Preparing the US Army for Homeland Security Preparing the U.S. Army for HOMELANDHOMELAND SECURITYSECURITY Concepts, Issues, and Options Eric V. Larson, John E.Peters Arroyo Center R The research described in this report was sponsored by the United States Army under Contract No. DASW01-96-C-0004. Library of Congress Cataloging-in-Publication Data Larson, Eric V. (Eric Victor), 1957– Preparing the U.S. Army for homeland security : concepts, issues, and options / Eric V. Larson, John E. Peters. p. cm. Includes bibliographical references. MR-1251-A ISBN 0-8330-2919-3 1. United States. Army. 2. United States—Defenses. I. Peters, John E., 1947– II. Title. UA25 .L27 2000 355' 033273—dc21 00-045819 RAND is a nonprofit institution that helps improve policy and decisionmaking through research and analysis. RAND® is a registered trademark. RAND’s publications do not necessarily reflect the opinions or policies of its research sponsors. © Copyright 2001 RAND All rights reserved. No part of this book may be reproduced in any form by any electronic or mechanical means (including photocopying, recording, or information storage and retrieval) without permission in writing from RAND. Published 2001 by RAND 1700 Main Street, P.O. Box 2138, Santa Monica, CA 90407-2138 1200 South Hayes Street, Arlington, VA 22202-5050 RAND URL: http://www.rand.org/ To order RAND documents or to obtain additional information, contact Distribution Services: Telephone: (310) 451-7002; Fax: (310) 451-6915; Internet: [email protected] PREFACE This report addresses the many conceptual, programmatic, and practical issues associated with an emergent mission area for the U.S. Army and Department of Defense (DoD) called “homeland security” (until recently the mission was known as “homeland defense”). At the most basic level, the report seeks to provide Army and other DoD audiences with an introduction to, and overview of, four of the five homeland security task areas,1 and the various organizations at the federal, state, and local level that the Army and DoD may need to interface with under different circumstances. More ambitiously, it seeks to define homeland security in a concrete way and to provide the necessary background and conceptual and analytic constructs for wrestling with the key issues and choices the Army will face as the mission area matures. The research reported here was initiated as homeland security was emerging as an issue of policy concern and was conducted during Fiscal Year 1999, a year in which the Army and Department of Defense considered but had not yet resolved many key homeland security–related issues. These include a definition of homeland security, the key task areas that constitute homeland security, and the programs and capabilities needed to respond to these various threats. In a similar vein, the broader federal government enacted or ______________ 1Because it already is the focus of substantial analytic attention, national missile defense is not addressed in this report. iii iv Preparing the U.S. Army for Homeland Security refined numerous programs to combat terrorism and weapons of mass destruction and to mitigate the threat to critical infrastructure. While we have made every effort to stay apprised of these develop- ments, the complexity and dynamism of the broader policy envi- ronment led to a conscious choice to focus on broad issues, principles, and options in this report, rather than specific organiza- tional solutions. Indeed, at the time the report was being completed, a new Unified Command Plan (UCP) was announced, specifying responsibilities for some homeland security activities. We have, nev- ertheless, provided observations regarding organizational issues where we felt it useful and appropriate. The research was sponsored by the Office of the Deputy Chief of Staff, Operations and Plans, Headquarters, Department of the Army, and was conducted in the Arroyo Center’s Strategy, Doctrine, and Resources Program, and was concluded in September 1999. The Arroyo Center is a federally funded research and development center sponsored by the U.S. Army. For more information on the RAND Arroyo Center, contact the Director of Operations, (310) 393-0411, extension 6500, or visit the Arroyo Center’s Web site at http://www.rand.org/organization/ard/ CONTENTS Preface ......................................... iii Figures ......................................... xi Tables.......................................... xiii Summary ....................................... xv Acknowledgments................................. xxix Abbreviations .................................... xxxi Chapter One INTRODUCTION .............................. 1 Organization of This Report....................... 3 Chapter Two UNDERSTANDING HOMELAND SECURITY .......... 5 The Constitutional and Legal Context ............... 5 The Strategic Context ........................... 6 National Security Strategy ...................... 7 National Military Strategy ...................... 9 The Army Strategic Plan ........................ 9 The Domestic Political Context .................... 11 White House Actions .......................... 11 Congressional Action .......................... 13 Leadership Statements ........................ 16 Public Attitudes................................ 17 Homeland Security Task Areas .................... 21 Conclusions .................................. 22 v vi Preparing the U.S. Army for Homeland Security Chapter Three ANALYTIC FRAMEWORK ........................ 25 Threat and Risk Analyses ......................... 26 Establishing Desired Performance Levels ............. 31 Identifying Cost-Effective Program Mixes ............ 36 Budgeting and Resourcing........................ 39 Process and Strategy ............................ 40 Iterative in the Short Term ...................... 41 Part of an Adaptive Long-Term Strategy ............ 41 Conclusions .................................. 42 Chapter Four PROTECTING AMERICANS AT HOME: WMD DOMESTIC PREPAREDNESS AND CIVIL SUPPORT .............. 45 Threats and Risks .............................. 45 Threat Assessment............................ 46 Risk Assessment.............................. 53 Planning Magnitudes.......................... 55 Measures of Performance ........................ 57 Notional Performance Levels...................... 60 Program Design Issues .......................... 61 The Federal Setting ........................... 62 Prevention Programs .......................... 64 Preparedness Programs ........................ 71 Response Programs ........................... 76 Domestic Preparedness-Related R&D.............. 91 Budgeting and Resourcing Issues................... 92 Budget Shares ............................... 92 Planning, Programming, and Budgeting ............ 94 Conclusions .................................. 96 Chapter Five ENSURING CONSTITUTIONAL AUTHORITY: CONTINUITY OF GOVERNMENT .................. 99 Threat and Risk Analyses ......................... 100 Threats and Weapons ......................... 100 Targets .................................... 100 Performance Measures and Notional Performance Levels ......................... 102 Program Design Issues .......................... 103 Federal COG ................................ 103 Contents vii State and Local COG .......................... 105 Budgeting Issues ............................... 106 Conclusions .................................. 107 Chapter Six ENSURING MILITARY CAPABILITY: CONTINUITY OF OPERATIONS ................................. 109 Threat and Risk Analyses ......................... 109 Threats .................................... 109 Weapons ................................... 117 Potential Targets ............................. 118 Net Assessment .............................. 120 Threat Campaigns ............................ 121 Performance Measures .......................... 121 Prevention Activities .......................... 121 Preparedness Activities ........................ 122 Response and Reconstitution Activities ............ 122 Threat Campaigns ............................ 123 Notional Performance Levels...................... 123 Program Design Issues .......................... 123 Force Protection ............................. 123 Continuity of Operations ....................... 126 Mission-Critical Facilities....................... 126 Mission-Critical Systems ....................... 128 Threat Campaigns ............................ 133 Budgeting Issues ............................... 133 Federal Spending............................. 133 Army Spending .............................. 135 Conclusions .................................. 136 Chapter Seven PROTECTING SOVEREIGNTY: BORDER AND COASTAL DEFENSE .................................... 139 WMD Smuggling............................... 140 Threats and Risks ............................ 140 Measures of Performance ...................... 140 Notional Performance Levels .................... 141 Program Design Issues......................... 142 Budgeting Issues ............................. 149 Large-Scale Refugee Flows ....................... 149 Threat and Risk Analyses ....................... 149 viii Preparing the U.S. Army for Homeland Security Measures of Performance ...................... 153 Notional Performance Levels .................... 154 Program Design Issues......................... 154 Budgeting Issues ............................. 157 Conclusions .................................. 158 Chapter Eight ILLUSTRATIVE PLANNING VIGNETTES ............. 159 Domestic Preparedness.........................
Recommended publications
  • Mary Beth Chrissis, Mike Konrad, Sandra
    ptg Process Areas by Category Process Management OPD Organizational Process Definition OPF Organizational Process Focus OPM Organizational Performance Management OPP Organizational Process Performance OT Organizational Training Project Management IPM Integrated Project Management PMC Project Monitoring and Control PP Project Planning QPM Quantitative Project Management REQM Requirements Management RSKM Risk Management SAM Supplier Agreement Management Engineering PI Product Integration RD Requirements Development TS Technical Solution ptg VAL Validation VER Verification Support CAR Causal Analysis and Resolution CM Configuration Management DAR Decision Analysis and Resolution MA Measurement and Analysis PPQA Process and Product Quality Assurance Generic Goals and Practices GG1 Achieve Specific Goals GP 1.1 Perform Specific Practices GG2 Institutionalize a Managed Process GP2.1 Establish an Organizational Policy GP 2.2 Plan the Process GP 2.3 Provide Resources GP 2.4 Assign Responsibility GP 2.5 Train People GP 2.6 Control Work Products GP 2.7 Identify and Involve Relevant Stakeholders GP 2.8 Monitor and Control the Process GP 2.9 Objectively Evaluate Adherence GP 2.10 Review Status with Higher Level Management GG3 Institutionalize a Defined Process GP 3.1 Establish a Defined Process GP 3.2 Collect Process Related Experiences ptg CMMI® for Development Third Edition ptg Wow! eBook <WoweBook.Com> The SEI Series in Software Engineering Visit informit.com/sei for a complete list of available products. ptg he SEI Series in Software Engineering represents is a collaborative Tundertaking of the Carnegie Mellon Software Engineering Institute (SEI) and Addison-Wesley to develop and publish books on software engineering and related topics. The common goal of the SEI and Addison-Wesley is to provide the most current information on these topics in a form that is easily usable by practitioners and students.
    [Show full text]
  • The Chemical Weapons Conventions at 1
    Rudderless: The Chemical Weapons Convention At 1 ½ Amy E. Smithson Report No. 25 September 1998 Copyright© 1998 11 Dupont Circle, NW Ninth Floor Washington, DC 20036 phone 202.223.5956 fax 202.238.9604 http://www.stimson.org email [email protected] Rudderless: The Chemical Weapons Convention At 1 1/2 Amy E. Smithson INTRODUCTION On the 29th of April 1997, the majority of the world’s nations joined to activate an arms control and nonproliferation accord that will gradually compel the elimination of one of the most abhorred classes of weapons of all times. Previously, the international community had fallen short of the mark in efforts to try to abolish poison gas, despite the opprobrium following its widespread use in World War I.1 The new Chemical Weapons Convention (CWC) extends the no use-prohibitions of the 1925 Geneva Protocol2 to outlaw the development, acquisition, production, transfer, and stockpiling of chemical weapons as well. The CWC requires the destruction of chemical weapons production facilities and arsenals over a ten-year period, and countries will witness the shrinking numbers of poison gas factories and munitions. A less tangible function of the CWC, but one that may turn out to be equally valued over the long term is that the CWC will help redefine how states assure their national security. The CWC requires nations to declare activities that were previously considered state secrets and private business information. The treaty authorizes routine and challenge inspections to monitor compliance with its prohibitions. Instead of building large caches of arms, the CWC’s verification processes give governments reason to be confident that managed transparency—a limited waiver of state sovereignty—can enhance national and international security.
    [Show full text]
  • 2010 CERT Research Report
    The CERT® Program’s research mission is to leverage our operational experience and access to state-of-the-art research to fill gaps for our customers, collaborate with the cyber security research community, and provide longer-range perspectives on cyber-security research, technology, and policy. Table of Contents CERT Research Vision .................................................... 2 Executive Summary ..................................................... 3 2010 Research Report Abstracts . 4 CERT in the News ....................................................... 7 Special Project: Recommending Cyber Security Research Topics ................. 9 Critical Code ............................................................11 Insider Threat .......................................................... 14 Insider Threat Vulnerability Assessment Measurement . 17 Modeling and Analysis of Insider Fraud . 19 Insider Threat Lab . 21 Insider Threat in the Financial Services Sector . 22 Preventing the Federal Government from Being the Victim of Identity Theft . 24 Secure Coding ......................................................... 25 Secure Coding Initiative . 28 Software Security Assurance ............................................. 34 Building Assured Systems Framework (BASF) . 37 Supply Chain Assurance . 39 Measuring Software Security Assurance . 42 Security Requirements Engineering . 45 Using Trusted Hardware as a Foundation for Cyber Security . 47 Analysis of Catastrophic Failures . 50 Complexity Modeling and Analysis . 52 Science of Cyber
    [Show full text]
  • Technical Secretariat
    OPCW Technical Secretariat Verification Division S/1207/2014 8 August 2014 Original: ENGLISH NOTE BY THE DIRECTOR–GENERAL SUMMARY OF VERIFICATION ACTIVITIES IN 2013 1. The Second Special Session of the Conference of the States Parties to Review the Operation of the Chemical Weapons Convention (hereinafter “the Second Review Conference”) reaffirmed the importance of factual reporting by the Technical Secretariat (hereinafter “the Secretariat”) on verification results “in the interests of transparency and continued assurance of States Parties’ compliance” (paragraph 9.51 of RC-2/4, dated 18 April 2008). In addition, as stated in paragraphs 3.187 and 3.188 of the Note by the Secretariat issued for the Third Special Session of the Conference of the States Parties to Review of the Operation of the Chemical Weapons Convention (hereinafter “the Third Review Conference”), “Review of the Operation of the Chemical Weapons Convention since the Second Review Conference” (RC-3/S/1, dated 12 March 2013 and Corr.1, dated 20 March 2013), “Recent developments in the Secretariat’s factual reporting on verification have further enhanced transparency and the continued assurance of States Parties’ compliance …. The Secretariat will continue its efforts to improve the way it reports on verification results”. 2. In light of the above, the Secretariat has prepared the attached OPCW verification summary for 2013, which reflects the verification work undertaken by the Secretariat during that year. 3. The summary provides valuable feedback on the Secretariat’s verification activities, especially to States Parties that are not represented in The Hague. In terms of public outreach, it is consistent with the OPCW’s Media and Public Affairs Policy (C-I/DEC.55, dated 16 May 1997) and presents pertinent information on such work to a wider audience.
    [Show full text]
  • Creating and Managing Csirts Page 1 Creating and Managing Csirts
    Creating and Managing Computer Security Incident Response Teams (CSIRTs) CERT® Coordination Center Networked Systems Survivability Program Software Engineering Institute Carnegie Mellon University Pittsburgh, PA 15213-3890 © 1996-2004 Carnegie Mellon University ® CERT, CERT Coordination Center, and Carnegie Mellon are registered in the U.S. Patent and Trademark Office This material is approved for public release. Distribution is limited by the Software Engineering Institute to attendees. The CERT® Coordination Center (CERT/CC) was created in November 1988 by the Defense Advanced Research Projects Agency (DARPA) in the aftermath of an Internet Worm incident. The CERT/CC is located at Carnegie Mellon University’s Software Engineering Institute (SEI). The SEI is a federally funded research and development center (FFRDC) sponsored by the Office of the Under Secretary of Defense for Acquisition, Technology, and Logistics [OUSD (AT&L)]. The mission of the CERT/CC is to • act as a coordination center, • foster collaboration across the network community to achieve effective incident response, • assist other organizations in forming response teams, and • conduct research and analysis of incident trends. Parts of this work were derived from work originally sponsored by the U.S. Army Land Information Warfare Activity (LIWA) and the U.S. Defense Information Systems Agency (DISA). Creating and Managing CSIRTs Page 1 Creating and Managing CSIRTs Introduction Creating an Effective CSIRT CSIRT Components Operational Management Issues Incident Handling
    [Show full text]
  • Us-Cert.Gov) in Partnership with DHS
    Cyber Security—Reality and Perspectives Dr. Angel Jordan Director of the Software Engineering Institute Provost Emeritus Carnegie Mellon University Brazil, March 2004 © 2004 by Carnegie Mellon University 1 Cyber Security—Reality and Perspectives Dr. Angel Jordan Director of the Software Engineering Institute CERT® Coordination Center Software Engineering Institute Carnegie Mellon University Pittsburgh, PA 15213-3890 The CERT Coordination Center is part of the Software Engineering Institute. The Software Engineering Institute is sponsored by the U.S. Department of Defense. © 2004 by Carnegie Mellon University 2 Overview • The Cyber Environment • Statistics • Implementing Cyber Security • CERT Advisories • Cyberterror Vulnerabilities • The CERT Centers and their Initiatives © 2004 by Carnegie Mellon University 3 The Cyber Environment Cyberspace • Borderless • Dynamic • Anonymous • Accessible Not limited to the Internet • Includes isolated networks • Embedded systems • Wireless technology • Environment expanding to include new technologies © 2004 by Carnegie Mellon University 4 The Cyber Environment “Urban Sprawl” in Cyberspace • Cyberspace has grown exponentially in recent years, now especially with wireless technologies Expansion leads to increased threat • More people are aware of the capabilities of cyberspace (including criminals and terrorists) • The cyber and physical environments now overlap and are interdependent • Critical infrastructures now rely on the cyber environment • As networks, systems, and service multiply, so do vulnerabilities
    [Show full text]
  • Assessment of Plasma Arc Technology for Processing of Chemical Demilitarization Wastes
    Program Manager for Chemical Demilitarization Technology Evaluation for Chemical Demilitarization Assessment of Plasma Arc Technology for Processing of Chemical Demilitarization Wastes Contract: DAAD13-01-D-0007 Task: T-02-AT-003 Final Science Applications International Corporation The findings in this report are not to be construed as an official Department of the Army position unless so designated by other authorizing documents Program Manager for Chemical Demilitarization Technology Evaluation for Chemical Demilitarization Assessment of Plasma Arc Technology for Processing of Chemical Demilitarization Wastes Contract: DAAD13-01-D-0007 Task: T-02-AT-003 Final October 2002 Science Applications International Corporation EXECUTIVE SUMMARY Introduction Plasma arc (PA) technology has been used predominantly for steel making in electric arc furnaces. Several commercial-scale facilities were built as the result of efforts in the early 1970s to use PA for processing hazardous waste, including low-level mixed waste, medical waste, contaminated soils, and industrial wastes. PA technology was also evaluated for destruction of chemical warfare agents in the early stages of the U.S. Chemical Demilitarization Program (CDP). Through the 1990s, PA technology was investigated by several federal agencies for treating various wastes, including chemical warfare agent simulants and surrogate agent neutralent solutions. The heart of PA technology is sustaining an electric arc by passing an electric current through a diatomic gas. High temperatures are achieved as the resistivity of the gas converts electrical energy to heat energy. The gases dissociate into their atomic state at 2,000°C, and ionize, as electrons are stripped away at 3,000°C. Electrically generated plasmas can achieve temperatures of 20,000°C while burning of fossil fuels has an upper practical limit of 2,000°C.
    [Show full text]
  • Rudderless: the Chemical Weapons Convention at 1 ½
    Rudderless: The Chemical Weapons Convention At 1 ½ Amy E. Smithson Report No. 25 September 1998 Copyright© 1998 11 Dupont Circle, NW Ninth Floor Washington, DC 20036 phone 202.223.5956 fax 202.238.9604 http://www.stimson.org email [email protected] Rudderless: The Chemical Weapons Convention At 1 1/2 Amy E. Smithson INTRODUCTION On the 29th of April 1997, the majority of the world’s nations joined to activate an arms control and nonproliferation accord that will gradually compel the elimination of one of the most abhorred classes of weapons of all times. Previously, the international community had fallen short of the mark in efforts to try to abolish poison gas, despite the opprobrium following its widespread use in World War I.1 The new Chemical Weapons Convention (CWC) extends the no use-prohibitions of the 1925 Geneva Protocol2 to outlaw the development, acquisition, production, transfer, and stockpiling of chemical weapons as well. The CWC requires the destruction of chemical weapons production facilities and arsenals over a ten-year period, and countries will witness the shrinking numbers of poison gas factories and munitions. A less tangible function of the CWC, but one that may turn out to be equally valued over the long term is that the CWC will help redefine how states assure their national security. The CWC requires nations to declare activities that were previously considered state secrets and private business information. The treaty authorizes routine and challenge inspections to monitor compliance with its prohibitions. Instead of building large caches of arms, the CWC’s verification processes give governments reason to be confident that managed transparency—a limited waiver of state sovereignty—can enhance national and international security.
    [Show full text]
  • The CERT Guide to Coordinated Vulnerability Disclosure
    The CERT® Guide to Coordinated Vulnerability Disclosure Allen D. Householder Garret Wassermann Art Manion Chris King August 2017 SPECIAL REPORT CMU/SEI-2017-SR-022 CERT Division Distribution Statement A: Approved for Public Release; Distribution is Unlimited http://www.sei.cmu.edu Copyright 2017 Carnegie Mellon University. All Rights Reserved. This material is based upon work funded and supported by the Department of Defense under Contract No. FA8702-15-D-0002 with Carnegie Mellon University for the operation of the Software Engineer- ing Institute, a federally funded research and development center. The view, opinions, and/or findings contained in this material are those of the author(s) and should not be construed as an official Government position, policy, or decision, unless designated by other docu- mentation. This report was prepared for the SEI Administrative Agent AFLCMC/AZS 5 Eglin Street Hanscom AFB, MA 01731-2100 NO WARRANTY. THIS CARNEGIE MELLON UNIVERSITY AND SOFTWARE ENGINEERING INSTITUTE MATERIAL IS FURNISHED ON AN "AS-IS" BASIS. CARNEGIE MELLON UNIVERSITY MAKES NO WARRANTIES OF ANY KIND, EITHER EXPRESSED OR IMPLIED, AS TO ANY MATTER INCLUDING, BUT NOT LIMITED TO, WARRANTY OF FITNESS FOR PURPOSE OR MERCHANTABILITY, EXCLUSIVITY, OR RESULTS OBTAINED FROM USE OF THE MATERIAL. CARNEGIE MELLON UNIVERSITY DOES NOT MAKE ANY WARRANTY OF ANY KIND WITH RESPECT TO FREEDOM FROM PATENT, TRADEMARK, OR COPYRIGHT INFRINGEMENT. [DISTRIBUTION STATEMENT A] This material has been approved for public release and unlimited distribution. Please see Copyright notice for non-US Government use and distribution. Internal use:* Permission to reproduce this material and to prepare derivative works from this material for internal use is granted, provided the copyright and “No Warranty” statements are included with all reproductions and derivative works.
    [Show full text]
  • The Tartan Style Manual — Fall 2005
    29 November 2005 The Tartan Style Manual — Fall 2005 This is a style guide intended for The Tartan’s writers, proofreaders, and section editors. This is not your only resource; we also have a Tartan layout manual, as well as the dictionary, the thesaurus, and the AP stylebook. And, as always, the copy manager has the last word. — Arthur O’Dwyer October 2004 How to Use This Guide • Examples of a term’s usage are given in quotes: “Like this.” • Main ideas of items in a list are bolded. • Entries that appear with no further explanation are there for spelling, italicization, or punctuation reference. • Acronyms are given with their full names afterward. • If a cross-listing is within the same section, the reference is in bold: “See affect.” • If a cross-listing is in another section, both the reference and the section’s name are given in bold: “See pronouns in the Punctuation and Grammar section.” • If a cross-listing is a section, it will be referred to by name and bolded: “See the Carnival section for more information.” Contents General 2 Sports 21 Student Organizations 25 Punctuation and Grammar 27 Technology and the Internet 31 General added, adds — Do not use these words to attribute A quotes; use “said” or “says” instead. See quoting. AB — Activities Board ad hoc committee abbreviations — Follow these rules: administration — not capitalized. “The Bush adminis- tration.” See also president. In general, don’t abbreviate a word you can spell out. Use “department” instead of “dept.” and “October” administrator — Use this term only when the person instead of “Oct.” being referred to is acting in an administrative and not a faculty role.
    [Show full text]
  • THE CBW CONVENTIONS BULLETIN News, Background and Comment on Chemical and Biological Weapons Issues
    THE CBW CONVENTIONS BULLETIN News, Background and Comment on Chemical and Biological Weapons Issues ISSUE NO. 44 JUNE 1999 Quarterly Journal of the Harvard Sussex Program on CBW Armament and Arms Limitation IMPLEMENTING THE CHEMICAL WEAPONS CONVENTION: TECHNICAL AND POLITICAL CHALLENGES IN THE US AND RUSSIA Paul F Walker Global Green USA After years of tedious and contentious negotiations, most by the end of 1999 and that 90 per cent of the initial 31,495 everyone breathed a deep sigh of relief when the Chemical tons in the stockpile is now under contract for destruction. Weapons Convention (CWC) was signed by 130 countries Only two of the nine major American stockpile sites remain in January 1993. The immediate challenge thereafter was without a contract or technology for stockpile destruction. to achieve ratification by the required 65 nations for entry The total estimated cost for stockpile destruction has grown into force and by the two major chemical weapon powers – to $12.4 billion, for non-stockpile chemical materiel to $1.4 Russia and the United States. Over four years later, on 29 billion, and for emergency preparedness to $1.2 billion; the April 1997 the CWC entered into force with the United grand total of $15 billion far exceeds early estimates of $2 States just making it under the wire with its ratification four billion or less and, as Prociv pointed out, will be subject to days earlier. Russia ratified on 5 November 1997. “out-year cost growth” if schedules continue to slip, addi- For some observers, this was the long-awaited culmina- tional technology development is necessary, or more buried tion of many decades of effort to abolish a whole class of chemical weapon materiel is identified.
    [Show full text]
  • Managing Technical Debt: Reducing Friction in Software Development
    Managing Technical Debt Managing Technical Debt Reducing Friction in Software Development Philippe Kruchten Robert Nord Ipek Ozkaya Executive Editor Kim Spenceley The SEI Series in Software Engineering Development Editor Kiran Kumar Panigrahi Many of the designations used by manufacturers and sellers to distinguish their products are claimed as trademarks. Where those designations appear in this book, Managing Editor and the publisher was aware of a trademark claim, the designations have been printed Sandra Schroeder with initial capital letters or in all capitals. No warranty. This Carnegie Mellon University and Software Engineering Institute Senior Project Editor material is furnished on an “as-is” basis. Carnegie Mellon University makes no warranties Lori Lyons of any kind, either expressed or implied, as to any matter including, but not limited to, warranty of fitness for purpose or merchantability, exclusivity, or results obtained from Copy Editor use of the material. Carnegie Mellon University does not make any warranty of any kind Catherine D. Wilson with respect to freedom from patent, trademark, or copyright infringement. Indexer Special permission to reproduce portions of the texts and images was granted by the Ken Johnson Software Engineering Institute. CMM, CMMI, Capability Maturity Model, Capability Maturity Modeling, Proofreader Carnegie Mellon, CERT, and CERT Coordination Center are registered in the U.S. Abigail Manheim Patent and Trademark Office by Carnegie Mellon University. Cover Designer The authors and publisher have taken care in the preparation of this book, but make no Chuti Prasertsith expressed or implied warranty of any kind and assume no responsibility for errors or omissions. No liability is assumed for incidental or consequential damages in connection Compositor with or arising out of the use of the information or programs contained herein.
    [Show full text]