In Paradoxes of Professionalism
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
The Position of Secretary of Defense: Statutory Restrictions and Civilian-Military Relations
The Position of Secretary of Defense: Statutory Restrictions and Civilian-Military Relations Updated January 6, 2021 Congressional Research Service https://crsreports.congress.gov R44725 Position of Secretary of Defense: Statutory Restrictions and Civilian-Military Relations Summary The position of Secretary of Defense is unique within the United States government; it is one of two civilian positions within the military chain of command, although unlike the President, the Secretary of Defense is not elected. Section 113 of the United States Code states that the Secretary of Defense is to be “appointed from civilian life by the President, by and with the advice and consent of the Senate.” The section goes on to elaborate a key mechanism by which civilian control of the armed forces is maintained: A person may not be appointed as Secretary of Defense within seven years after relief from active duty as a commissioned officer of a regular component of an armed force. The proposed nomination of General (Ret.) Lloyd Austin, United States Army, who retired from the military in 2016, to be Secretary of Defense may lead both houses of Congress to consider whether and how to suspend, change, or remove that provision. This provision was originally contained in the 1947 National Security Act (P.L. 80-253), which mandated that 10 years pass between the time an officer is relieved from active duty and when he or she could be appointed to the office of the Secretary of Defense. In 2007, Section 903 of the FY2008 National Defense Authorization Act (P.L. 110-181), Congress changed the period of time that must elapse between relief from active duty and appointment to the position of Secretary of Defense to seven years. -
Recent Developments in Cybersecurity Melanie J
American University Business Law Review Volume 2 | Issue 2 Article 1 2013 Fiddling on the Roof: Recent Developments in Cybersecurity Melanie J. Teplinsky Follow this and additional works at: http://digitalcommons.wcl.american.edu/aublr Part of the Law Commons Recommended Citation Teplinsky, Melanie J. "Fiddling on the Roof: Recent Developments in Cybersecurity." American University Business Law Review 2, no. 2 (2013): 225-322. This Article is brought to you for free and open access by the Washington College of Law Journals & Law Reviews at Digital Commons @ American University Washington College of Law. It has been accepted for inclusion in American University Business Law Review by an authorized administrator of Digital Commons @ American University Washington College of Law. For more information, please contact [email protected]. ARTICLES FIDDLING ON THE ROOF: RECENT DEVELOPMENTS IN CYBERSECURITY MELANIE J. TEPLINSKY* TABLE OF CONTENTS Introduction .......................................... ..... 227 I. The Promise and Peril of Cyberspace .............. ........ 227 II. Self-Regulation and the Challenge of Critical Infrastructure ......... 232 III. The Changing Face of Cybersecurity: Technology Trends ............ 233 A. Mobile Technology ......................... 233 B. Cloud Computing ........................... ...... 237 C. Social Networking ................................. 241 IV. The Changing Face of Cybersecurity: Cyberthreat Trends ............ 244 A. Cybercrime ................................. ..... 249 1. Costs of Cybercrime -
OASD Satellite Engagement Communications Plan (Feb
The University of Mississippi School of Law The National Center for Remote Sensing, Air, and Space Law Informational resources on the legal aspects of human activities using aerospace technologies USA-193: Selected Documents Compiled by P.J. Blount P.J. Blount, editor Joanne Irene Gabrynowicz, editor This page intentionally left blank. Disclaimer The information contained in this compilation represents information as of February 20, 2009. It does not constitute legal representation by the National Center for Remote Sensing, Air, and Space Law (Center), its faculty or staff. Before using any information in this publication, it is recommended that an attorney be consulted for specific legal advice. This publication is offered as a convenience to the Center's readership. The documents contained in this publication do not purport to be official copies. Some pages have sections blocked out. These blocked sections do not appear in the original documents. Blocked out sections contain information wholly unrelated to the space law materials intended to be compiled. The sections were blocked out by the Center's faculty and staff to facilitate focus on the relevant materials. i National Center for Remote Sensing, Air, and Space Law Founded in 1999, the National Center for Remote Sensing, Air, and Space Law is a reliable source for creating, gathering, and disseminating objective and timely remote sensing, space, and aviation legal research and materials. The Center serves the public good and the aerospace industry by addressing and conducting education and outreach activities related to the legal aspects of aerospace technologies to human activities. Faculty and Staff Prof. Joanne Irene Gabrynowicz, Director Prof. -
Table of Cases
Tulsa Law Review Volume 25 Issue 4 Symposium on Feminist Jurisprudence Summer 1990 Table of Cases Follow this and additional works at: https://digitalcommons.law.utulsa.edu/tlr Part of the Law Commons Recommended Citation Table of Cases, 25 Tulsa L. J. 870 (2013). Available at: https://digitalcommons.law.utulsa.edu/tlr/vol25/iss4/11 This End Matter is brought to you for free and open access by TU Law Digital Commons. It has been accepted for inclusion in Tulsa Law Review by an authorized editor of TU Law Digital Commons. For more information, please contact [email protected]. et al.: Table of Cases TABLE OF CASES Abbot Laboratories v. Gardner 21:99 Antonio v. Kirkpatrick 23:131 Abbot Laboratories v. Gardner 22:614 Area Rate Proceeding (Permian Basin) 24:663 Acker v. Guinn 22:17 Argersinger v. Hamlin 22:414 Ada Coca-Cola Bottling Co. v. Snead 23:473 Arkla Exploration Co. v. Watt 22:621 Addington v. Texas 23:454 Armstrong v. United States 23:179 Adoption of Anonymous, In re 21:467 Aspen Skiing Co. v. Aspen Highlands Adoption of Baby Girl, In re 22:304 Skiing Corp. 24:606 Aegean Fare, Inc. v. Licensing Board 21:210 Associated Gas Distributors v. FERC 23:567 Affiliated Ute Citizens v. United States 21:551 Associated Gas Distributors v. FERC 24:611 Agins v. City of Tiburon 24:50 Associated Press v. United States 24:614 Ahlers, In re 23:40 Atchison, Topeka & Santa Fe Railway Ake v. Oklahoma 21:121 v. Buell 25:824 Alice Faye Rice v. -
The Chief Management Officer of the Department of Defense: an Assessment
DEFENSE BUSINESS BOARD Submitted to the Secretary of Defense The Chief Management Officer of the Department of Defense: An Assessment DBB FY 20-01 An assessment of the effectiveness, responsibilities, and authorities of the Chief Management Officer of the Department of Defense as required by §904 of the FY20 NDAA June 1, 2020 DBB FY20-01 CMO Assessment 1 Executive Summary Tasking and Task Force: The Fiscal Year (FY) 2020 National Defense Authorization Act (NDAA) (Public Law (Pub. L. 116-92) required the Secretary of Defense (SD) to conduct an independent assessment of the Chief Management Officer (CMO) with six specific areas to be evaluated. The Defense Business Board (DBB) was selected on February 3, 2020 to conduct the independent assessment, with Arnold Punaro and Atul Vashistha assigned to co-chair the effort. Two additional DBB board members comprised the task force: David Walker and David Van Slyke. These individuals more than meet the independence and competencies required by the NDAA. Approach: The DBB task force focused on the CMO office and the Department of Defense (DoD) business transformation activities since 2008 when the office was first established by the Congress as the Deputy Chief Management Officer (DCMO), and in 2018 when the Congress increased its statutory authority and elevated it to Executive Level (EX) II and the third ranking official in DoD. The taskforce reviewed all previous studies of DoD management and organizations going back twenty years and completed over ninety interviews, including current and former DoD, public and private sector leaders. The assessments of CMO effectiveness since 2008 are focused on the performance of the CMO as an organizational entity, and is not an appraisal of any administration or appointee. -
Process Makes Perfect Best Practices in the Art of National Security Policymaking
AP PHOTO/CHARLES DHARAPAK PHOTO/CHARLES AP Process Makes Perfect Best Practices in the Art of National Security Policymaking By Kori Schake, Hoover Institution, and William F. Wechsler, Center for American Progress January 2017 WWW.AMERICANPROGRESS.ORG Process Makes Perfect Best Practices in the Art of National Security Policymaking By Kori Schake, Hoover Institution, and William F. Wechsler, Center for American Progress January 2017 Contents 1 Introduction and summary 6 Findings 14 First-order questions for the next president 17 Best practices to consider 26 Policymaking versus oversight versus crisis management 36 Meetings, meetings, and more meetings 61 Internal NSC staff management 72 Appendix A 73 About the authors 74 Endnotes Introduction and summary Most modern presidents have found that the transition from campaigning to governing presents a unique set of challenges, especially regarding their newfound national security responsibilities. Regardless of their party affiliation or preferred diplomatic priorities, presidents have invariably come to appreciate that they can- not afford to make foreign policy decisions in the same manner as they did when they were a candidate. The requirements of managing an enormous and complex national security bureau- cracy reward careful deliberation and strategic consistency, while sharply punishing the kind of policy shifts that are more common on the campaign trail. Statements by the president are taken far more seriously abroad than are promises by a candidate, by both allies and adversaries alike. And while policy mistakes made before entering office can damage a candidate’s personal political prospects, a serious misstep made once in office can put the country itself at risk. -
AT&L Workforce—Key Leadership Changes
AT&L Workforce—Key Leadership Changes Esper Would Continue Pentagon Emphasis on Readiness, Partnerships, Reform DEPARTMENT OF DEFENSE NEWS (JULY 16, 2019) David Vergun Army Secretary Dr. Mark T. Esper told senators that he would continue to prioritize training, modernization, build- ing alliances and partnerships, and reforming the Pentagon if he’s confirmed to serve as secretary of defense. Esper, President Donald J. Trump’s nominee to assume the Pentagon’s top post, testified at his Senate Armed Services Committee confirmation hearing. The committee will make a recommendation to the full Senate for its vote on whether to confirm Esper for the job. In his opening statement, Esper noted the growing threats posed by great power competitors such as China and Rus- sia and told the panel that these threats warrant a refocus to training, research and development, and equipping for Army Secretary Dr. Mark Esper high-intensity conflict, particularly in the space and cyber domains. DoD photo At the same time, he said, the military must be prepared considerations last month. The president then appointed to respond to regional threats posed by Iran, North Korea, Esper to serve as acting defense secretary. and terrorist groups around the world. ‘’Our adversaries must see diplomacy as their best option, because war with Yesterday, the Senate received the president’s formal nomi- the United States will force them to bear enormous costs,’’ nation of Esper to be secretary of defense. At that time, by he said. law, Esper ceased to serve as acting defense secretary, and his sole title became secretary of the Army. -
Usma Class of 2006 War Studies Conference Reassessing Deterrence in the 21St Century
USMA CLASS OF 2006 WAR STUDIES CONFERENCE REASSESSING DETERRENCE IN THE 21ST CENTURY UNITED STATES MILITARY ACADEMY NOVEMBER 13–15, 2016 CONTENTS Welcome Letter 2 About West Point 3 Agenda 4 Important Administrative Information 8 Conference Staff 9 Keynote Speaker Profiles 10 Participant Profiles 15 1 WELCOME TO THE USMA CLASS OF 2006 WAR STUDIES CONFERENCE On behalf of Lieutenant General Robert L. Caslen, Jr., the superintendent of the United States Military Academy, it is my honor to welcome you to West Point. This is our inaugural War Studies Conference, an annual event organized by the Modern War Institute within West Point’s Department of Military Instruction. The purpose of this conference is to convene a select and interdisciplinary group of thinkers across government, academia, media, and the business world to discuss a topic of vital importance to our ability to fight and win modern wars. The title of this year’s conference is “Reassessing Deterrence in the 21st Century.” To encourage a free and open exchange of views, all comments during the conference’s panels are “not for attribution,” but our keynote addresses will be “on the record.” Fifty years after Thomas Schelling wrote Arms and Influence, globalization, modernization, and the pervasiveness of non-state actors have fundamentally changed our credibility as well as our capacity to deter. Put simply, tomorrow’s potential threats require a new approach for American strategic deterrence. If deterrence is “the art of coercion and intimidation,” as Schelling noted, how do we deter non-state adversaries with no return address? How do we deter potential cyber warriors? How do we keep our 20th-century alliances strong and capable of extended deterrence going forward? Finally, how can we enhance our geo-economic and other non-military tools of deterrence? The discussions we have over the next few days will shape our first edited conference volume, which will inform the national debate we have on this important issue. -
The History and Politics of Defense Reviews
C O R P O R A T I O N The History and Politics of Defense Reviews Raphael S. Cohen For more information on this publication, visit www.rand.org/t/RR2278 Library of Congress Cataloging-in-Publication Data is available for this publication. ISBN: 978-0-8330-9973-0 Published by the RAND Corporation, Santa Monica, Calif. © Copyright 2018 RAND Corporation R® is a registered trademark. Limited Print and Electronic Distribution Rights This document and trademark(s) contained herein are protected by law. This representation of RAND intellectual property is provided for noncommercial use only. Unauthorized posting of this publication online is prohibited. Permission is given to duplicate this document for personal use only, as long as it is unaltered and complete. Permission is required from RAND to reproduce, or reuse in another form, any of its research documents for commercial use. For information on reprint and linking permissions, please visit www.rand.org/pubs/permissions. The RAND Corporation is a research organization that develops solutions to public policy challenges to help make communities throughout the world safer and more secure, healthier and more prosperous. RAND is nonprofit, nonpartisan, and committed to the public interest. RAND’s publications do not necessarily reflect the opinions of its research clients and sponsors. Support RAND Make a tax-deductible charitable contribution at www.rand.org/giving/contribute www.rand.org Preface The 1993 Bottom-Up Review starts with this challenge: “Now that the Cold War is over, the questions we face in the Department of Defense are: How do we structure the armed forces of the United States for the future? How much defense is enough in the post–Cold War era?”1 Finding a satisfactory answer to these deceptively simple questions not only motivated the Bottom-Up Review but has arguably animated defense strategy for the past quarter century. -
American War and Military Operations Casualties: Lists and Statistics
American War and Military Operations Casualties: Lists and Statistics Updated July 29, 2020 Congressional Research Service https://crsreports.congress.gov RL32492 American War and Military Operations Casualties: Lists and Statistics Summary This report provides U.S. war casualty statistics. It includes data tables containing the number of casualties among American military personnel who served in principal wars and combat operations from 1775 to the present. It also includes data on those wounded in action and information such as race and ethnicity, gender, branch of service, and cause of death. The tables are compiled from various Department of Defense (DOD) sources. Wars covered include the Revolutionary War, the War of 1812, the Mexican War, the Civil War, the Spanish-American War, World War I, World War II, the Korean War, the Vietnam Conflict, and the Persian Gulf War. Military operations covered include the Iranian Hostage Rescue Mission; Lebanon Peacekeeping; Urgent Fury in Grenada; Just Cause in Panama; Desert Shield and Desert Storm; Restore Hope in Somalia; Uphold Democracy in Haiti; Operation Enduring Freedom (OEF); Operation Iraqi Freedom (OIF); Operation New Dawn (OND); Operation Inherent Resolve (OIR); and Operation Freedom’s Sentinel (OFS). Starting with the Korean War and the more recent conflicts, this report includes additional detailed information on types of casualties and, when available, demographics. It also cites a number of resources for further information, including sources of historical statistics on active duty military deaths, published lists of military personnel killed in combat actions, data on demographic indicators among U.S. military personnel, related websites, and relevant CRS reports. Congressional Research Service American War and Military Operations Casualties: Lists and Statistics Contents Introduction .................................................................................................................................... -
CTC Sentinel Welcomes Submissions
Combating Terrorism Center at West Point Objective • Relevant • Rigorous | April 2018 • Volume 11, Issue 4 FEATURE ARTICLE A VIEW FROM THE CT FOXHOLE Five Years After the NYPD vs. Revolution Muslim Boston Marathon Bombing The inside story of how the NYPD defeated the radicalization hub Jesse Morton and Mitchell Silber William Weinreb and Harold Shaw FEATURE ARTICLE Editor in Chief 1 NYPD vs. Revolution Muslim: The Inside Story of the Defeat of a Local Radicalization Hub Paul Cruickshank Jesse Morton and Mitchell Silber Managing Editor INTERVIEW Kristina Hummel 8 A View from the CT Foxhole: Five Years After the Boston Marathon Bombing EDITORIAL BOARD Nicholas Tallant Colonel Suzanne Nielsen, Ph.D. ANALYSIS Department Head Dept. of Social Sciences (West Point) 15 The Islamic State's Lingering Legacy among Young Men from the Mosul Area Scott Atran, Hoshang Waziri, Ángel Gómez, Hammad Sheikh, Lucía Lieutenant Colonel Bryan Price, Ph.D. López-Rodríguez, Charles Rogan, and Richard Davis Director, CTC 23 Challenging the ISK Brand in Afghanistan-Pakistan: Rivalries and Divided Loyalties Brian Dodwell Amira Jadoon, Nakissa Jahanbani, and Charmaine Willis Deputy Director, CTC 30 The British Hacker Who Became the Islamic State's Chief Terror Cyber- Coach: A Profile of Junaid Hussain CONTACT Nafees Hamid Combating Terrorism Center U.S. Military Academy Between 2006 and 2012, two men working on opposite sides of the strug- 607 Cullum Road, Lincoln Hall gle between global jihadis and the United States faced of in New York City. Jesse Morton was the founder of Revolution Muslim, a group that prosely- West Point, NY 10996 tized—online and on New York City streets—on behalf of al-Qa`ida. -
MASS CASUALTY TRAUMA TRIAGE PARADIGMS and PITFALLS July 2019
1 Mass Casualty Trauma Triage - Paradigms and Pitfalls EXECUTIVE SUMMARY Emergency medical services (EMS) providers arrive on the scene of a mass casualty incident (MCI) and implement triage, moving green patients to a single area and grouping red and yellow patients using triage tape or tags. Patients are then transported to local hospitals according to their priority group. Tagged patients arrive at the hospital and are assessed and treated according to their priority. Though this triage process may not exactly describe your agency’s system, this traditional approach to MCIs is the model that has been used to train American EMS As a nation, we’ve got a lot providers for decades. Unfortunately—especially in of trailers with backboards mass violence incidents involving patients with time- and colored tape out there critical injuries and ongoing threats to responders and patients—this model may not be feasible and may result and that’s not what the focus in mis-triage and avoidable, outcome-altering delays of mass casualty response is in care. Further, many hospitals have not trained or about anymore. exercised triage or re-triage of exceedingly large numbers of patients, nor practiced a formalized secondary triage Dr. Edward Racht process that prioritizes patients for operative intervention American Medical Response or transfer to other facilities. The focus of this paper is to alert EMS medical directors and EMS systems planners and hospital emergency planners to key differences between “conventional” MCIs and mass violence events when: • the scene is dynamic, • the number of patients far exceeds usual resources; and • usual triage and treatment paradigms may fail.