CONTACT FIRST-CLASS MAIL More from Fire from the Sky, Part VI, P.22 P.O

Total Page:16

File Type:pdf, Size:1020Kb

CONTACT FIRST-CLASS MAIL More from Fire from the Sky, Part VI, P.22 P.O ONTACT ThePhoenix Project: A LIGHT IN EVERY MIND! uYE SHALL KNOW THE TRUTH AND THE TRUTH SHALL MAKE YOU MAD!” “NOW THAT YOU’RE MAD, LET’S Fi-X IT!” VOLUME 14, NUMBER 10 NEWS REVIEW $ 3.00 OCTOBER 15, 1996 What Are Our ArmedForces DoingIn SaudiArabia? 10/13/96 #l HATONN fact that it is late in the game. W&.still haven’t heard the last of it and note that Coleman also shared the JOHN COLEMAN OUESTIONED WHY as to James Baker III. [Please see Armed Forces In Saudi Arabia?, p.3~7 A correspondent just wrote a note asking “me” why John Coleman, in his newsletter, expected Dole to choose Baker III INSIDE THIS ISSUE to run as vice president but it didn’t come to pass? From The News Monitor: Baker III was well up on Dole’s “short list” of desired FinCEN: Big Brother’s All-seeing Financial Eye, p.2 running mates. but something happened on the way to the forum-WI3 GOT IN THE WAY. James Baker III was to his GATT, APEC & NAFTA, p.8 eyes and PRESENT at the last meetings of Bush, et al., with Thoughts Of Tough Love, IF The Shoes Fit, p.9 Russell Herman trying to get Russell to sign over the Gold Ray Bilger: The Untold History Of America, Part X, p. 12 Certificate and contracts of which we write and speak. Did HAAR.P Or ELF Down The Aeroperu 757 On lOj2/96? p. 15 However, never mind this turn of events, but Bakerdidn’t The News Desk, p. 16 ruleout his own run for the PRESIDENCY; also never mind the Learning To Watch, Work And Wait Upon God, p. 19 CONTACT FIRST-CLASS MAIL More From Fire From The Sky, Part VI, p.22 P.O. Box 27800 U.S. ?OSTAGE Calvin Burgin’s Newsletter: WORLDLINE, p.28 Las Vegas, NV 89126 PAID V.K. Durham: A Tip Of The Iceberg, p-30 Mojjrrt, C8.93501 Germain: Catching Subtle.Tricks Of The Adversary, p.32 Ptrmit No. 111 FIRST CLASS MAIL Reprinted From Last Week: Attorneys Abbott & Horton Exposed As Unscrupulous civil Rights Violators, p-34 I CORRECTION NOTICE: CONTACT immrectly ascribed tht authorhip of our 9/24f% FromtPtp atoryon Bob Dtlt to Dr. Jokn Colemu when, b fact, tht muret ir uknowa. Wt rinctnly regret tkiir trror. See tkiir wcek’a Front Pap story for more on tkir matter. < Page 2 CONTACT: THE PHOENIX PROJECT OCTOBER 15, 1996 ZQe %hmittw No. 12 Volume 4l4 Publish and Conceal Not. Jer. So:2 f IF YOU WANT A PLACE IN THE SUN, YOU HAVE TO EXPECT SOME BLISTERS. FitKEN: BIG BROTHER’S ALL-SEEINGFINANCIAL EYE . The following article by Mark Nestmann in the 2/95 issue of Low ptofik paints an ominous picture of the government’s emerging Financial Surveillance and En- forcemeh d&work. As author&d in 1988 anti&g legislation, in 1990, Treasury Secretary Nicholas Brady sigired an executive order establishing the Treasury Department intelligence division, the Financial Crimes Enforcement Network [FinCEN]. FinCENisaoomputerisedoperati~intemationalinscope, FinCEN BUSTS A DRUG DEALER A TAX thatcdlectsandanalysesdatatounearthaiminalactivity.lts arts inuoimnon fhan ituodownfkiend agencies; state, local, and action: 77urewsn’tmuch 7kpoliasaft@fheslipo/ fomln poke agencies; and a rm-iery of public and private &to paper that a small-t@ne Eosr Coastdrug d&r trkd to est before bases. being but on they @nd only a FiCENb computersuse a programcalled an “scpertsys- number and appmi to the name tern” whose reasoning mimics that of human experts, but 77tisfiustmkd the Thy had m inc+$- millions of times faster. FinCEN’s expert system, the Cus- in~tion on man fhy wol&c not t0mStificial Intelligence System [CA&J, investigates finan- only to the dealer th#d jusl busted, also to dozensof other ciai fraud and suspicious transactions. (A new pqram the Sm?l crad peddlers. “Artificia Intelligence/h4assive Parallel P-g” System, two slim the police we&t technically quipped to bWMPPS1.was Muled for installation in late 1%). domuch mowthananhpataidet&ituwtk ihatpmh6lywnddn’~ FinCEN compares the unusual transxtions flagged by yield cuidence could UK indict John. So they turned CAIS with personal and fiicial information drawn from . ..FinCENfir sfeuthing they needed. government, private, and foreign databases. Essentially, the .. ..A FinCEN began the He started que- system uzata afinancial dossier of individuals making largccw- rying database of phone numbers. scored a nmy fmaactions, hen mat&es theseprqiles again& typical pat- with the of a restau?ant. Next entered . an terns ofpersons engaged in illegal activity. TO ~~Wruct these profiles, FinCEN uses databases fmm the Internal RevenueService (IRS], Federal Bureau of Investigation [FBI], Drug Enfgrce- ment Administration [ DEA], Secret Service, Customs Service, Postal Service, w Bu- reau, Central Intelligence Agency [CIA], National Security Agency [NSA] (which identified CTRs his terminal, intercepts data on international wire FinCEN analyst that the transfers; Defence Intelligence Agency tions were by a whose first (DIA), Bureau of Alcohol,Tobxco, and Fw [ BATF], the Immigration and ted for ties of ‘ens each Naturalization Service [INS], National theamountofS9,soo,justbelowthecrR Security Council (NSC], the Federal De- posit InsuranceCorporation [FDICJ, the Comptroller of the Currency, the Federal Reserve. and the State Demerit’s Bureau of intelligence and Research. FinCEN also accesses state records of real es- review, analyst got full name, tate ownership, property tax payments, motor vehi- Security Number date of horn++address, cles, driver licenses, etc along with commexial databases that license number, other vital including assist it in obtaining credit records, telephone records, maga- bank numbers. zine subscrip@x lists and even supexmarket purchase data. Plunging into the database, the broad- All are available to FinCEN without a warrant. ened search for CI% filed behalf of suspect, FinCEN has negotiated a data-sharing agreement with including CTRs . More 150 Cl% hterpl that gives it on-line access to worldwide aiminal txack- filed in . On several, listed his as the ing data. Other nations have developed financial intelligence or manager the restaurant by the agencies that swap data with, Fin-CEN: TRACFIN (France): ephone number the slip paper taken the arrested NClN (Great Britain); and >AUSTRAC (Australia) < FmCEN dealer. The between the and the has built similar alliances with authorities in Japan, Italy, and number originally to FinCEN secured. Switzerland. The analyst then axnmer6al and This level of computer matching is unprecedented histori- ment databases turned up information on tally, and indeed, was banned under the Privacy Act But the restaurant showing John had an expected databases exist, and FmCEN has US Congressional authority nualrevenueforhiseateryofsubstantiaUykssthanthemoney to assemble data in forms useful to law enforcement. hehadbeendepositinkasindicatedbythe~Fishingina Initially, FinCEN’s mission was to help detect narcotics of local assessment records, analyst discov- traffickers as they laundered money. However, its efforts have that John other properties businesses. With ewpandedtodetedingalIaiminalactivity.AsaformerTreas- uxy official explained to me: 7Varly all crimes bun ofinunciul into them and found suspicious transa&on rmtiw FincEN’S mission is to unaprth lhot motiu. fjyac can do thatwecansalwnewlyailcnhts.” kssthan4smin~afterreceivingthedfiaialpoucere- Page 3 OCTOBER 15, 1996 CONTACT: THE PHOENIX PROJECT quest for help, FiiCEN had retrieved enough evidence of bank and credit card accounts. The DTS would create a finan- secuted?’ aimhal wrongdoing from govemmen t databa!B-that the cial dossier not only on sqected uiminals, but on every d&ictattcxneypmsecutingthecasewasabletoseekindii- person with a U.S. bank acanmt or credit card. (Those of you GOVERNMENT USE OF COMPUTERS TO mentsagainstJohnonchargesofmoneylaunderingandcon- who are proud holders of ‘American Express’, ‘VISA’, Etc. - DESTROY OUR PRIVACY spiracybtraffiinarcotics. welcome tow nightmare. Ed.). Apart from tracking down drug dealers, FiCEN’s cur- FinCEN, the CIA, and other intelligence agencies that sup TRAVELING BIG BROTHER’S INFORMATION SU- rentfocusistogatherevidenceinaimestiasfraudagainst port the DTS initiative claim that the system is needed: PER-HIGHWAY -George Orwell’s 1984 provided a terrify- financial institutions, commerd crimes, and tax evasion. l to assess the funding level needed for federal deposit ing look at a future world in which both man and machine cIiminalinvestigator wassittingathiscurn- ln1991anlRs insurance became mere instruments to serve the-evil purpose of the puter in Flint, Michigan, USA searching a database of suspi- totalitarian state. Winston Smith and the other tragic subjects l to locate assets of individuals ordered to make restitution cious bank deposits of cash. The name of John E. Long ap of Orwelt’sgrim world were suffocated with theomnipresent for financial crimes and pearedonhisscreen.Atthenextdesk,anagentso;tingpaper surveillance network of Big Brother - who electronically ob- a-hid referral forms from banks saw the same name. ‘@st l to track financial transactions of suspected terrorists in served ever move which every person made (even in the, bylodringr!thccompulaKlrrnwkMurwrhado~”~ys conjunction with the CIA’s DESIST computer program. bedroom) even as the ubiquitous posters of the supreme dic- supervisory special agent Leonard Nawrocki. Providing the CIA with domestic intelligence functions - tatorscreamed out the waning BIG BROTHER 1s WATCH- Buildiig on those leads the IRS got Long, his &n-in-law prohibited by Congress after abuses were unearthed in the ING YOU. and their wives to pay more than $12 million in back taxes, 1970s - is ominous. According to Wired: Orwell’s nightmare is about to become a reality in the interest, penalties and forfeiters. It even collected a down pay- ‘The CL4 routinely digsfor@nxial dirt on peoplejrom whom latter half of the 1990s with Government Administration ment by seizing a 5Ofoot yacht and $1.4 million of currency. the agency wunts specific inform4tion. Typic4lfy. they onjorcign throughout the Western World aggressively pushing for a The two men are now serving 21 month terms in a prison in teelligenceofficers w&ring in the United 5ates under a diplomatic computer&d national ID card, a national “information su- amp, after which their wives will do shorter terms.
Recommended publications
  • High Energy Materials Related Titles
    Jai Prakash Agrawal High Energy Materials Related Titles M. Lackner, F. Winter, A.K. Agrawal M. Hattwig, H. Steen (Eds.) (Eds.) Handbook of Explosion Prevention Handbook of Combustion and Protection 5 Volumes 2004 2010 ISBN: 978-3-527-30718-0 ISBN: 978-3-527-32449-1 R. Meyer, J. Köhler, A. Homburg R. Meyer, J. Köhler, A. Homburg Explosivstoffe Explosives 2008 2007 ISBN: 978-3-527-32009-7 ISBN: 978-3-527-31656-4 J.P. Agrawal, R.D. Hodgson N. Kubota Organic Chemistry of Explosives Propellants and Explosives Thermochemical Aspects of 2007 ISBN: 978-0-470-02967-1 Combustion 2007 ISBN: 978-3-527-31424-9 U. Teipel (Ed.) Energetic Materials Particle Processing and Characterization 2005 ISBN: 978-3-527-30240-6 Jai Prakash Agrawal High Energy Materials Propellants, Explosives and Pyrotechnics The Author All books published by Wiley-VCH are carefully produced. Nevertheless, authors, editors, and Dr. Jai Prakash Agrawal publisher do not warrant the information C Chem FRSC (UK) contained in these books, including this book, to Former Director of Materials be free of errors. Readers are advised to keep in Defence R&D Organization mind that statements, data, illustrations, DRDO Bhawan, New Delhi, India procedural details or other items may [email protected] inadvertently be inaccurate. Library of Congress Card No.: applied for Sponsored by the Department of Science and Technology under its Utilization of Scientifi c British Library Cataloguing-in-Publication Data Expertise of Retired Scientists Scheme A catalogue record for this book is available from the British Library. Bibliographic information published by the Deutsche Nationalbibliothek The Deutsche Nationalbibliothek lists this publication in the Deutsche Nationalbibliografi e; detailed bibliographic data are available on the Internet at http://dnb.d-nb.de.
    [Show full text]
  • Nuclear Weapons Versus International Law: a Contextual Reassessment
    Nuclear Weapons Versus International Law: A Contextual Reassessment Burns H. Weston* While it is true that the world community has Quoiqu'il soit vrai que ]a communaut6 mon- yet to enact a treaty explicitly outlawing nu- diale n'ait pas r6ussi A conclure un traitd clear weapons in general, the author argues interdisant formellement l'usage d'armes that restraints on the conduct of war never nucl6aires, l'auteur soutient que les moyens have been limited to treaty law alone. Reject- de r6glementer les conflits arm6s ne sont pas ing a purely hegemonic and statist concep- limit6s au seul domaine du droit des trait6s. tion of international law, it is suggested in- Rejetant une conception purement h6g6mo- stead that an argument against the legality of nique et dtatiste du droit international, l'au- most - and clearly all dominant - uses of teur propose plut6t qu'il est possible d'arti- nuclear weapons can be fashioned from im- culer une position contre ]a 16galit6 de l'u- plicit treaty provisions, international cus- sage d'armes nucl6aires dans la tr~s grande toms, general principles, judicial decisions, majorit6 des cas, A partir des dispositions United Nations declarations, and even from implicites de trait6s existants, du droit coutu- initiatives by groups having little formal in- mier international, des principes g6n6raux, ternational status. The author employs the des d6cisionsjudiciaires, des d6clarations de "coordinate communication flow" theory of I'ONU, et m~me des initiatives de groupes norm prescription to demonstrate that the sans statut international reconnu. L'auteur laws of war, including their humanitarian fait appel A la th6orie de la prescription de components, do apply to nuclear weapons normes par flot d'information coordonn6 and warfare.
    [Show full text]
  • R:\TEMP\Bobbi\RDD-8 3-16-04 Reprint.Wpd
    OFFICIAL USE ONLY RESTRICTED DATA DECLASSIFICATION DECISIONS 1946 TO THE PRESENT (RDD-8) January 1, 2002 U.S. Department of Energy Office of Health, Safety and Security Office of Classification Contains information which may be exempt from public release under the Freedom of Information Act (5 U.S.C. 552), exemption number(s) 2. Approval by the Department of Energy prior to public release is required. Reviewed by: Richard J. Lyons Date: 3/20/2002 NOTICE This document provides historical perspective on the sequence of declassification actions performed by the Department of Energy and its predecessor agencies. It is meant to convey the amount and types of information declassified over the years. Although the language of the original declassification authorities is cited verbatim as much as possible to preserve the historical intent of the declassification, THIS DOCUMENT IS NOT TO BE USED AS THE BASIS FOR DECLASSIFYING DOCUMENTS AND MATERIALS without specific authorization from the Director, Information Classification and Control Policy. Classification guides designed for that specific purpose must be used. OFFICIAL USE ONLY OFFICIAL USE ONLY This page intentionally left blank OFFICIAL USE ONLY OFFICIAL USE ONLY FOREWORD This document supersedes Restricted Data Declassification Decisions - 1946 To The Present (RDD-7), January 1, 2001. This is the eighth edition of a document first published in June 1994. This latest edition includes editorial corrections to RDD-7, all declassification actions that have been made since the January 1, 2001, publication date of RDD-7 and any additional declassification actions which were subsequently discovered or confirmed. Note that the terms “declassification” or “declassification action,” as used in this document, refer to changes in classification policy which result in a specific fact or concept that was classified in the past being now unclassified.
    [Show full text]
  • Dissertation Ist an Der Hauptbibliothek Der Technischen Universität Wien Aufgestellt (
    Die approbierte Originalversion dieser Dissertation ist an der Hauptbibliothek der Technischen Universität Wien aufgestellt (http://www.ub.tuwien.ac.at). The approved original version of this thesis is available at the main library of the Vienna University of Technology (http://www.ub.tuwien.ac.at/englweb/). DISSERTATION Development and quantification of new methods for the determination and preparation of short-lived xenon isotopes for the verification of the Comprehensive Nuclear Test Ban Treaty (CTBT) in a laboratoy ausgefuhrt zum Zwecke der Erlangung des akademischen Grades eines Doktors der technischen Wissenschaften unter der Leitung von Ao. Univ. Prof. Dr. phil. Manfred Tschurlovits E141 Atominstitut der Osterreichischen Universitaten durchgefuhrt im Forschungszentrum Seibersdorf ARC Seibersdorf research GmbH, Health Physics, Risk & Safety Betreuer:. Mug. Dr. Erich Hrnecek eingereicht an der Technischen Universitat Wien Fakultat fur Physik von Mag. Raith Maria Matrikelnummer: 9401122 St. Wendelin-Gasse 6/7 1220 Wien Wien, im Marz 2006 DANKSAGUNG An erster Stelle mochte ich mich bei meinem Doktorvater Prof. Manfred Tschurlovits fur seine grogartige Unterstiitzung und Betreuung sowie die vielen anregenden Diskussionen bedanken. Den Austrian research centers Seibersdorf GmbH danke ich herzlichst, dass sie die vorliegende Arbeit finanziert haben sowie mir die Gelegenheit gegeben haben, diese durchzufuhren. Personlich gilt mein grogter Dank Dr. Erich Hrnecek fiir seine wirklich tolle Betreuung und die grogartige Zusammenarbeit, an welche ich mich bestimmt irnmer gerne zuruck erinnern werde. Allgemein mochte ich der Gruppe ,,Sicherheit und Risiko" fur die gute Zusammenarbeit in den drei Jahren danken. Ein groger Dank auch fur die Reaktorgruppe am Atominstitut der Osterreichischen Universitaten, die mich immer unterstutzt haben, wenn Proben bestrahlt wurden.
    [Show full text]
  • Dangerous Thermonuclear Quest: the Potential of Explosive Fusion Research for the Development of Pure Fusion Weapons
    Dangerous Thermonuclear Quest: The Potential of Explosive Fusion Research for the Development of Pure Fusion Weapons Arjun Makhijani, Ph.D. Hisham Zerriffi July 1998 Minor editing revisions made in 2003. Table of Contents Preface i Summary and Recommendations v Summary of Findings vi Recommendations vii Chapter 1: Varieties of Nuclear Weapons 1 A. Historical Background 1 B. Converting Matter into Energy 4 C. Fission energy 5 D. Fusion energy 8 E. Fission-fusion weapons 16 Chapter 2: Inertial Confinement Fusion Basics 19 A. Deposition of driver energy 24 B. Driver requirements 25 C. Fuel pellet compression 27 D. Thermonuclear ignition 29 Chapter 3: Various ECF Schemes 31 A. Laser Drivers 32 B. Ion Beam Drivers 34 1. Heavy Ion Beams 35 a. Induction Accelerators 36 b. Radio-Frequency Accelerators 36 2. Light Ion Beams 37 C. Z-pinch 39 D. Chemical Explosives 40 E. Advanced materials manufacturing 42 1. Nanotechnology 42 2. Metallic Hydrogen 45 Chapter 4: The Prospects for Pure Fusion Weapons 47 A. Requirements for pure fusion weapons 47 B. Overall assessment of non-fission-triggered nuclear weapons 48 1. Ignition 48 2. Drivers 53 C. Overall technical prognosis for non-fission triggered nuclear weapons 54 D. Fusion power and fusion weapons - comparative requirements 56 Chapter 5: Nuclear Disarmament and Non-Proliferation Issues Related to Explosive Confinement Fusion 59 A. The Science Based Stockpile Stewardship Program 62 1. Reliability 62 a. Reliability definition 63 b. Future reliability problems 64 c. Relevance of NIF to reliability of the current stockpile 65 2. The US laser fusion program as a weapons development program 65 3.
    [Show full text]
  • Web-Based Innovation Indicators – Which Firm Web- Site Characteristics Relate to Firm-Level Innovation Activity?
    // NO.19-063 | 12/2019 DISCUSSION PAPER // JANNA AXENBECK AND PATRICK BREITHAUPT Web-Based Innovation Indicators – Which Firm Web- site Characteristics Relate to Firm-Level Innovation Activity? Web-Based Innovation Indicators – Which Firm Website Characteristics Relate to Firm-Level Innovation Activity? Janna Axenbeck†+* & Patrick Breithaupt†* † Department of Digital Economy, ZEW – Leibniz Centre for European Economic Research, L7 1, 68161 Mannheim, Germany +Justus-Liebig-University Giessen, Faculty of Economics, Licher Straße 64, 35394 Gießen, Germany * Correspondence: [email protected]; Phone: +49 621 1235 – 188, [email protected]; Phone: +49 621 1235 – 217 December 31, 2019 Abstract Web-based innovation indicators may provide new insights into firm-level innovation activities. However, little is known yet about the accuracy and relevance of web-based information. In this study, we use 4,485 German firms from the Mannheim Innovation Panel (MIP) 2019 to analyze which website characteristics are related to innovation activities at the firm level. Website characteristics are measured by several text mining methods and are used as features in different Random Forest classification models that are compared against each other. Our results show that the most relevant website characteristics are the website’s language, the number of subpages, and the total text length. Moreover, our website characteristics show a better performance for the prediction of product innovations and innovation expenditures than for the prediction of process innovations. Keywords: Text as data, innovation indicators, machine learning JEL Classification: C53, C81, C83, O30 Acknowledgments: The authors would like to thank the German Federal Ministry of Education and Research for providing funding for the research project (TOBI - Text Data Based Output Indicators as Base of a New Innovation Metric; funding ID: 16IFI001).
    [Show full text]
  • The Arms Race Revisited David W
    Science and society test VIII: The arms race revisited David W. Hafemeister Physics Department. California Polytechnic University. San Luis Obispa. California 93407 Approximate numerical estimates are developed in order to quantify a variety of aspects of the arms race. The results ofthese calculations are consistent with either direct observations or with more sophisticated calculations. This paper will cover some of the following aspects of the arms race: (1) the electromagnetic pulse (EMP); (2) spy satellites; (3) ICBM accuracy; (4) NAVSTAR global positioning satellites; (5) particle and laserbeam weapons; (6) the neutron bomb: and (7) war games. INTRODUCTION serious problems man is presently faced with, problems directly related to progress made in science. The initial paper in this series) dealt with a number of This paper and its predecessor are an attempt to respond to aspects ofthe arms race such as the Spartan (high altitude) this challenge. Our goal is to encourage a dispassionate and Sprint (low altitude) and antiballistic missile (ABM) methodology for analyzing the technical aspects of these systems; the tradeoff between accuracy and yield, and its problems which emphasizes the basic science involved impact on superhardening missile sites and on multiple in­ without using overly sophisticated mathematics and phys­ dependently targetable re-entry vehicles (MIRV); cost-ex­ ics. Only by first considering these difficult technical prob­ change ratios; and other issues. Almost a decade has passed lems can we hope to make some progress towards develop­ and the arms race continues. Because of advances in tech­ ing viable solutions. Our calculations on the physics ofthe nology, the arms race has become more of a qualitative arms race will use only widely accepted numerical param­ (new technologies) rather than a quantitative (numbers of eters; our results agree with either direct observation or launchers) arms race.
    [Show full text]
  • Introduction
    Cambridge University Press 978-1-107-04274-2 - Nuclear Weapons Under International Law Edited by Gro Nystuen , Stuart Casey-maslen and Annie Golden Bersagel Excerpt More information Introduction Gro Nystuen and Stuart Casey-Maslen Unlike biological and chemical weapons – the other ‘weapons of mass destruc- tion’ (WMDs) 1 – nuclear weapons are not subject to a specifi c prohibition under international law. Th e 1968 Nuclear Non-Proliferation Treaty (NPT)2 b a n s t h e possession and production of nuclear weapons by all non-nuclear weapon states that are party to the NPT, but it does not impose a prohibition on the use of nuclear weapons, and it is unspecifi c when it comes to disarmament obliga- tions . In contrast, the other WMD treaties prohibit the possession, production and transfer of biological and chemical weapons, respectively, 3 and oblige states parties to destroy all stockpiles within specifi c timelines.4 Given the assumed larger potential for harm and destruction that use of nuclear weapons could cause compared to other WMDs, this legal situation seems diffi cult to compre- hend. In fact, despite the inherently dangerous nature of nuclear weapons, the fabric of the world’s security politics as it has evolved since 1945 (including the signifi cant link between nuclear weapons and the fi ve permanent members of 1 See the 1972 Convention on the Prohibition of the Development, Production and Stockpiling of Bacteriological (Biological) and Toxin Weapons and on Th eir Destruction (1972 Biological Weapons Convention), London, Moscow, and Washington DC, 10 April 1972, in force 26 March 1975, 1015 UNTS 163; and the 1992 Convention on the Prohibition of the Development, Production, Stockpiling and Use of Chemical Weapons and on their Destruction (1992 Chemical Weapons Convention), Geneva, 3 September 1992, in force 29 April 1993, 1974 UNTS 45.
    [Show full text]
  • Restricted Data Declassification Decisions 1946 to the Present (RDD 8)
    OFFICIAL USE ONLY RESTRICTED DATA DECLASSIFICATION DECISIONS 1946 TO THE PRESENT (RDD-8) January 1, 2002 U.S. Department of Energy Office of Health, Safety and Security Office of Classification Contains information which may be exempt from public release under the Freedom of Information Act (5 U.S.C. 552), exemption number(s) 2. Approval by the Department of Energy prior to public release is required. Reviewed by: Richard J. Lyons Date: 3/20/2002 NOTICE This document provides historical perspective on the sequence of declassification actions performed by the Department of Energy and its predecessor agencies. It is meant to convey the amount and types of information declassified over the years. Although the language of the original declassification authorities is cited verbatim as much as possible to preserve the historical intent of the declassification, THIS DOCUMENT IS NOT TO BE USED AS THE BASIS FOR DECLASSIFYING DOCUMENTS AND MATERIALS without specific authorization from the Director, Information Classification and Control Policy. Classification guides designed for that specific purpose must be used. OFFICIAL USE ONLY OFFICIAL USE ONLY This page intentionally left blank OFFICIAL USE ONLY OFFICIAL USE ONLY FOREWORD This document supersedes Restricted Data Declassification Decisions - 1946 To The Present (RDD-7), January 1, 2001. This is the eighth edition of a document first published in June 1994. This latest edition includes editorial corrections to RDD-7, all declassification actions that have been made since the January 1, 2001, publication date of RDD-7 and any additional declassification actions which were subsequently discovered or confirmed. Note that the terms “declassification” or “declassification action,” as used in this document, refer to changes in classification policy which result in a specific fact or concept that was classified in the past being now unclassified.
    [Show full text]
  • Implications for Nigeria's Higher Education Curricular
    Emerging Technologies and the Internet of all Things: Implications for Nigeria’s higher education curricular Osuagwu, O.E. 1, Eze Udoka Felicia 2, Edebatu D. 3, Okide S. 4, Ndigwe Chinwe 5 and, UzomaJohn-Paul 6 1Department of Computer Science, Imo State University + South Eastern College of Computer Engineering & Information Technology, Owerri, Tel: +234 803 710 1792 [email protected]. 2 Department of Information Mgt. Technology, FUTO 3,4 Department of Computer Science, Nnamdi Azikiwe University, Akwa, Anambra State 5 Department of Computer Science, Anambra State University of Science & Technology 6 Department of Computer Science, Alvan Ikoku Federal College of Education, Owerri Abstract The quality of education and graduates emerging from a country’s educational system is a catalyst for technology innovation and national development index. World class universities are showcasing their innovations in science and technology because their high education curricular put the future of Research and Development as their pillar for a brighter world. Our curricular in the higher education system needs a rethink, recasting to embrace innovation, design and production at the heart of what our new generation graduates should be. This article discusses an array of such emerging technologies. Because emerging technologies in all sectors are over 150. we had decided to select three key technologies from each sector for our sample questionnaire. A questionnaire was distributed mainly to educational planners, Lecturers and managers of the industry for purposes of having a feel of how knowledgeable these professionals are understanding developments in science technology and what plans they have to integrate these new knowledge domains so that educational planners can integrate them into the curricular of undergraduate and graduate degree programs in our tertiary institutions.
    [Show full text]
  • Science =Democratic Action
    - -- VOLUME 6 N0.4 andVOLUME 7 NO. I OCTOBER 1998 I Science =Democratic Action Achieving Enduring Nuclear Disarmament BY: ARJUN MAKHIJANI espite increasing calls for nuclear disarmament throughout the world and among a growing list of promi- nent figures, the world's nuclear . weapon powers seem intent on maintain- ing nuclear weapons for the indefinite future. Those nuclear weapon states that ; could offer the greatest leadership on . disarmament measures, notably the United : States, have shown by their actions and statements that they have no plans to : eliminate their nuclear arsenals. Steps towards disarmament are halting, inad- - '. : equate and reversible. Moreover, they are UI MNIAlI K)KCE(CWM NAWM RWtCYOWN CW The of is the piecemeal and too narrow in scope, and rocket motorstage a Pershing I1 missile dernoyedat Longhorn Amy Ammuni- : rion Plant in Kamack, m,September 8, 1988.This w thefirst of more than 200 that . : are undermined by a prevailing reliance on ume desmoyed ac a renrlt of the 1987 1NF T~eary. nuclear weaDons. Manv of them seem oriented to non-proliferation to the exclusion of disarmament by the nuclear weapons states. About this Issue : To create and implement a more comprehensive and enduring plan : his special double issue of Science for : for nuclear disarmament we must address a broad range of issues: Democratic AcDbn and Enqy 8 socioeconomic factors (especiallyeconomic inequality and instability), Security addresses various aspects of : collective security needs, energy policy, and the whole range of issues : nuclear disarmament. This long- related more directly to the research, development, testing, production, desired goal has many facets, ranging and deployment of nuclear weapons, including the environmental and : fromshort-term measures to de-activate public health consequences of those activities.
    [Show full text]
  • Nuclear Weapon
    Nuclear weapon “A-bomb” redirects here. For other uses, see A-bomb fare, both times by the United States against Japan near (disambiguation). the end of World War II. On August 6, 1945, the U.S. Army Air Forces detonated a uranium gun-type fission bomb nicknamed “Little Boy” over the Japanese city of Hiroshima; three days later, on August 9, the U.S. Army Air Forces detonated a plutonium implosion-type fission bomb codenamed "Fat Man" over the Japanese city of Nagasaki. The bombings resulted in the deaths of approximately 200,000 civilians and military personnel from acute injuries sustained from the explosions.[3] The ethics of the bombings and their role in Japan’s surrender remain the subject of scholarly and popular debate. Since the atomic bombings of Hiroshima and Nagasaki, nuclear weapons have been detonated on over two thou- sand occasions for the purposes of testing and demon- stration. Only a few nations possess such weapons or are suspected of seeking them. The only countries known to have detonated nuclear weapons—and acknowledge pos- sessing them—are (chronologically by date of first test) the United States, the Soviet Union (succeeded as a nu- clear power by Russia), the United Kingdom, France, the People’s Republic of China, India, Pakistan, and North Korea. Israel is also believed to possess nuclear weapons, though in a policy of deliberate ambiguity, it does not acknowledge having them. Germany, Italy, Turkey, The mushroom cloud of the atomic bombing of the Japanese city Belgium and the Netherlands are nuclear weapons sharing [4][5][6] of Nagasaki on August 9, 1945 rose some 11 miles (18 km) above states.
    [Show full text]