Calendar No. 84

Total Page:16

File Type:pdf, Size:1020Kb

Calendar No. 84 Calendar No. 84 105TH CONGRESS REPORT 1st Session SENATE 105±29 "! NATIONAL DEFENSE AUTHORIZATION ACT FOR FISCAL YEAR 1998 REPORT [TO ACCOMPANY S. 924] ON AUTHORIZING APPROPRIATIONS FOR FISCAL YEAR 1998 FOR MILI- TARY ACTIVITIES OF THE DEPARTMENT OF DEFENSE, FOR MILI- TARY CONSTRUCTION, AND FOR DEFENSE ACTIVITIES OF THE DEPARTMENT OF ENERGY, TO PRESCRIBE PERSONNEL STRENGTHS FOR SUCH FISCAL YEAR FOR THE ARMED FORCES, AND FOR OTHER PURPOSES TOGETHER WITH ADDITIONAL VIEWS COMMITTEE ON ARMED SERVICES UNITED STATES SENATE JUNE 17, 1997.ÐOrdered to be printed NATIONAL DEFENSE AUTHORIZATION ACT FOR FISCAL YEAR 1998 1 Calendar No. 84 105TH CONGRESS REPORT 1st Session SENATE 105±29 "! NATIONAL DEFENSE AUTHORIZATION ACT FOR FISCAL YEAR 1998 REPORT [TO ACCOMPANY S. 924] ON AUTHORIZING APPROPRIATIONS FOR FISCAL YEAR 1998 FOR MILI- TARY ACTIVITIES OF THE DEPARTMENT OF DEFENSE, FOR MILI- TARY CONSTRUCTION, AND FOR DEFENSE ACTIVITIES OF THE DEPARTMENT OF ENERGY, TO PRESCRIBE PERSONNEL STRENGTHS FOR SUCH FISCAL YEAR FOR THE ARMED FORCES, AND FOR OTHER PURPOSES TOGETHER WITH ADDITIONAL VIEWS COMMITTEE ON ARMED SERVICES UNITED STATES SENATE JUNE 17, 1997.ÐOrdered to be printed U.S. GOVERNMENT PRINTING OFFICE 41±406 WASHINGTON : 1997 COMMITTEE ON ARMED SERVICES (105th Congress, 1st Session) STROM THURMOND, South Carolina, Chairman JOHN W. WARNER, Virginia CARL LEVIN, Michigan JOHN MCCAIN, Arizona EDWARD M. KENNEDY, Massachusetts DAN COATS, Indiana JEFF BINGAMAN, New Mexico BOB SMITH, New Hampshire JOHN GLENN, Ohio DIRK KEMPTHORNE, Idaho ROBERT C. BYRD, West Virginia JAMES M. INHOFE, Oklahoma CHARLES S. ROBB, Virginia RICK SANTORUM, Pennsylvania JOSEPH I. LIEBERMAN, Connecticut OLYMPIA J. SNOWE, Maine MAX CLELAND, Georgia PAT ROBERTS, Kansas LES BROWNLEE, Staff Director DAVID S. LYLES, Staff Director for the Minority ii C O N T E N T S Page Purpose of the Bill ................................................................................................... 1 Committee overview and recommendations .......................................................... 2 Explanation of funding summary ........................................................................... 4 DIVISION AÐDEPARTMENT OF DEFENSE AUTHORIZATION Title IÐProcurement ............................................................................................... 11 Explanation of tables ............................................................................................... 11 Subtitle AÐAuthorization of Appropriations ................................................. 12 Section 107. Chemical Demilitarization Program .................................. 12 Chemical Weapons Convention (CWC) ............................................ 12 Russian Ratification of the Chemical Weapons Convention ........... 13 Subtitle BÐArmy Programs ............................................................................ 15 Section 111. Army helicopter modernization plan ................................. 31 Section 112. Multiyear procurement authority for AH±64D Longbow Apache fire control radar ...................................................................... 31 Other Army Programs ...................................................................................... 31 Army Aircraft ............................................................................................ 31 C±XX(UC±35) ..................................................................................... 31 UH±60 Blackhawk helicopters .......................................................... 32 CH±47 cargo helicopter ...................................................................... 32 UH±1 modifications ............................................................................ 32 OH±58D Kiowa Warrior .................................................................... 32 Aircraft survivability equipment ...................................................... 33 Training devices ................................................................................. 33 Common ground equipment .............................................................. 33 Army Missile .............................................................................................. 33 Avenger modifications ........................................................................ 33 Hellfire missile ................................................................................... 34 Extended range Multiple Launch Rocket System rockets .............. 34 Multiple Launch Rocket System launchers ..................................... 34 Army Tactical Missile System ........................................................... 34 Stinger modifications ......................................................................... 35 Weapons and Tracked Combat Vehicles .................................................. 35 Bradley base sustainment ................................................................. 35 Carrier modifications-M113A3 .......................................................... 35 M1 Abrams tank modifications ......................................................... 35 Small arms programs ......................................................................... 35 Army Ammunition ..................................................................................... 36 Army ammunition .............................................................................. 36 Armament Retooling and Manufacturing Support .......................... 37 Other Army Procurement ......................................................................... 37 High Mobility Multi-Purpose Wheeled Vehicle ............................... 37 Family of Medium Tactical Vehicles ................................................ 37 Family of Heavy Tactical Vehicles .................................................... 37 Army data distribution systems ........................................................ 38 Echelon Above Corps Communications-Warfighter Information Network ........................................................................................... 38 Information system security program .............................................. 38 Sentinel ............................................................................................... 38 Night vision devices ........................................................................... 39 Standard Army management information system tactical com- puter platform ................................................................................. 39 Reserve component automation system ........................................... 39 Dump truck ......................................................................................... 39 (III) IV Page Explanation of tablesÐContinued Other Army ProgramsÐContinued Other Army ProcurementÐContinued Generators and associated equipment .............................................. 40 Simulation Network/Close Combat Tactical Trainer ...................... 40 Special equipment for user testing ................................................... 40 Subtitle C±Navy Programs .............................................................................. 41 Section 121. New attack submarine program ........................................ 62 Section 122. Nuclear aircraft carrier program ....................................... 64 Section 123. Exception to cost limitation for Seawolf submarine pro- gram ........................................................................................................ 67 Section 124. Airborne self-protection jammer program ......................... 68 Other Navy Programs ...................................................................................... 68 Navy Aircraft ............................................................................................. 68 AV±8B Harrier remanufacture ......................................................... 68 Aircrew trainer/simulators ................................................................ 69 V±22 Osprey ....................................................................................... 69 EC Hawkeye early warning aircraft ................................................. 69 T±45 trainer ........................................................................................ 69 EA±6B support jamming upgrade .................................................... 70 Helicopter crash attenuating seats ................................................... 70 P±3C anti-surface warfare improvement program .......................... 70 Navy Weapons ........................................................................................... 72 Tomahawk land attack missile ......................................................... 72 Penguin missile program ................................................................... 73 Standard missile modification ........................................................... 74 Navy and Marine Corps Ammunition ..................................................... 74 Marine Corps ammunition ................................................................ 74 Shoulder Launched Multi-Purpose Assault Weapon ....................... 74 Navy Shipbuilding and Conversion ......................................................... 75 Advanced submarine technology insertion ....................................... 75 Arleigh Burke class destroyer program ............................................ 75 Oceanographic survey ship ...............................................................
Recommended publications
  • Public Law 161 CHAPTER 368 Be It Enacted Hy the Senate and House of Representatives of the ^^"'^'/Or^ C ^ United States Of
    324 PUBLIC LAW 161-JULY 15, 1955 [69 STAT. Public Law 161 CHAPTER 368 July 15.1955 AN ACT THa R 68291 *• * To authorize certain construction at inilitai-y, naval, and Air F<n"ce installations, and for otlier purposes. Be it enacted hy the Senate and House of Representatives of the an^^"'^'/ord Air Forc^e conc^> United States of America in Congress assembled^ struction TITLE I ^'"^" SEC. 101. The Secretary of the Army is authorized to establish or develop military installations and facilities by the acquisition, con­ struction, conversion, rehabilitation, or installation of permanent or temporary public works in respect of the following projects, which include site preparation, appurtenances, and related utilities and equipment: CONTINENTAL UNITED STATES TECHNICAL SERVICES FACILITIES (Ordnance Corps) Aberdeen Proving Ground, Maryland: Troop housing, community facilities, utilities, and family housing, $1,736,000. Black Hills Ordnance Depot, South Dakota: Family housing, $1,428,000. Blue Grass Ordnance Depot, Kentucky: Operational and mainte­ nance facilities, $509,000. Erie Ordnance Depot, Ohio: Operational and maintenance facilities and utilities, $1,933,000. Frankford Arsenal, Pennsylvania: Utilities, $855,000. LOrdstown Ordnance Depot, Ohio: Operational and maintenance facilities, $875,000. Pueblo Ordnance Depot, (^olorado: Operational and maintenance facilities, $1,843,000. Ked River Arsenal, Texas: Operational and maintenance facilities, $140,000. Redstone Arsenal, Alabama: Research and development facilities and community facilities, $2,865,000. E(.>ck Island Arsenal, Illinois: Operational and maintenance facil­ ities, $347,000. Rossford Ordnance Depot, Ohio: Utilities, $400,000. Savanna Ordnance Depot, Illinois: Operational and maintenance facilities, $342,000. Seneca Ordnance Depot, New York: Community facilities, $129,000.
    [Show full text]
  • Appendix A. Navy Activity Descriptions
    Atlantic Fleet Training and Testing Draft EIS/OEIS June 2017 APPENDIX A Navy Activity Descriptions Appendix A Navy Activity Descriptions Atlantic Fleet Training and Testing Draft EIS/OEIS June 2017 This page intentionally left blank. Appendix A Navy Activity Descriptions Atlantic Fleet Training and Testing Draft EIS/OEIS June 2017 Draft Environmental Impact Statement/Overseas Environmental Impact Statement Atlantic Fleet Training and Testing TABLE OF CONTENTS A. NAVY ACTIVITY DESCRIPTIONS ................................................................................................ A-1 A.1 Description of Sonar, Munitions, Targets, and Other Systems Employed in Atlantic Fleet Training and Testing Events .................................................................. A-1 A.1.1 Sonar Systems and Other Acoustic Sources ......................................................... A-1 A.1.2 Munitions .............................................................................................................. A-7 A.1.3 Targets ................................................................................................................ A-11 A.1.4 Defensive Countermeasures ............................................................................... A-13 A.1.5 Mine Warfare Systems ........................................................................................ A-13 A.1.6 Military Expended Materials ............................................................................... A-16 A.2 Training Activities ..................................................................................................
    [Show full text]
  • US Base Closings in Newfoundland, 1961–1994 Steven High
    Document generated on 09/29/2021 3:10 a.m. Newfoundland and Labrador Studies Farewell Stars and Stripes US Base Closings in Newfoundland, 1961–1994 Steven High Volume 32, Number 1, Spring 2017 URI: https://id.erudit.org/iderudit/nflds32_1art02 See table of contents Publisher(s) Faculty of Arts, Memorial University ISSN 1719-1726 (print) 1715-1430 (digital) Explore this journal Cite this article High, S. (2017). Farewell Stars and Stripes: US Base Closings in Newfoundland, 1961–1994. Newfoundland and Labrador Studies, 32(1), 42–85. All rights reserved © Memorial University, 2017 This document is protected by copyright law. Use of the services of Érudit (including reproduction) is subject to its terms and conditions, which can be viewed online. https://apropos.erudit.org/en/users/policy-on-use/ This article is disseminated and preserved by Érudit. Érudit is a non-profit inter-university consortium of the Université de Montréal, Université Laval, and the Université du Québec à Montréal. Its mission is to promote and disseminate research. https://www.erudit.org/en/ Farewell Stars and Stripes: US Base Closings in Newfoundland, 1961–1994 Steven High Despite a chilly wind off of Placentia Bay, thousands of people gath- ered in Argentia to watch the controlled implosion of the 10-storey Combined Bachelor Quarters, known affectionately as the “Q,” on 6 November 1999. Cars lined up bumper to bumper for eight kilometres on the only road leading to the former US Navy base on Newfound- land’s Avalon Peninsula. In anticipation, the organizers had prepared a designated viewing area, a bandstand, a first aid station, and conces- sion stands where visitors could purchase their “Implosion ’99” t-shirts.
    [Show full text]
  • A Study of the Demand for Information Technology Professionals in Selected Internet Job Portals
    Journal of Information Systems Education, Vol 13(1) A Study of the Demand for Information Technology Professionals in Selected Internet Job Portals Kai S. Koong Lai C. Liu Computer Information Systems Southern University at New Orleans New Orleans, Louisiana 70126, USA Xia Liu FYI.Net, Incorporated Houston, Texas 77027, USA ABSTRACT The demand for information technology (IT) professionals has grown rapidly in the last decade. Parallel to this increasing need for IT personnel is the continuous change in the type of skills that are brought about by innovations in cutting edge technologies. However, the type of new IT skills and knowledge needed to keep companies competitive in the global market extend beyond the ability to apply the updated hardware and software to make business processes more efficient. Communication excellence and managerial expertise are just two of the other more commonly needed skills demanded by employers. This study identifies and classifies information technology related job listings that are disclosed in the databases of two leading e-recruiting services. Two secondary variables, written and oral communica- tions and experience, were also collected and examined in this study. The results of this research should be of interest to job seekers, human resources administrators, career counselors, corporate trainers, information systems consultants, labor attorneys, immigration and naturalization officers, and agency recruiters. Educators will find the outcomes of this study useful for the design and development of new curricula that can prepare students for the job market. Stu- dents will find this study particularly helpful since the trends identified in this research can have important implications for them in their selection of elective courses and in choosing a track for specialization.
    [Show full text]
  • Distributing Liability: the Legal and Political Battles of Y2K LSE Research Online URL for This Paper: Version: Accepted Version
    Distributing liability: the legal and political battles of Y2K LSE Research Online URL for this paper: http://eprints.lse.ac.uk/103330/ Version: Accepted Version Article: Mulvin, Dylan (2020) Distributing liability: the legal and political battles of Y2K. IEEE Annals of the History of Computing. ISSN 1058-6180 Reuse Items deposited in LSE Research Online are protected by copyright, with all rights reserved unless indicated otherwise. They may be downloaded and/or printed for private study, or other acts as permitted by national copyright laws. The publisher or other rights holders may allow further reproduction and re-use of the full text version. This is indicated by the licence information on the LSE Research Online record for the item. [email protected] https://eprints.lse.ac.uk/ Distributing Liability The legal and political battles of Y2K Dylan Mulvin* • Dylan Mulvin is an Assistant Professor in the Department of Media and Communications at the London School of Economics and Political Science – London, UK WC2A 2AE. E-mail: [email protected]. Abstract In 1999 the United States Congress passed the Y2K Act, a major—but temporary— effort at reshaping American tort law. The Act strictly limited the scope and applicability of lawsuits related to liability for the Year 2000 Problem. This paper excavates the process that led to the Act, including its unlikely signature by President Clinton. The history presented here is based on a reconsideration of the Y2K crisis as a major episode in the history of computing. The Act, and the Y2K crisis more broadly, expose the complex interconnections of software, code, and law at the end of the 20th century, and, taken seriously, argue for the appreciation of the role of liability in the history of technology.
    [Show full text]
  • The Year 2000 Problem
    Journal of International Information Management Volume 8 Issue 1 Article 9 1999 The year 2000 problem Marshal Whatley California State University, San Bernardino Follow this and additional works at: https://scholarworks.lib.csusb.edu/jiim Part of the Management Information Systems Commons Recommended Citation Whatley, Marshal (1999) "The year 2000 problem," Journal of International Information Management: Vol. 8 : Iss. 1 , Article 9. Available at: https://scholarworks.lib.csusb.edu/jiim/vol8/iss1/9 This Article is brought to you for free and open access by CSUSB ScholarWorks. It has been accepted for inclusion in Journal of International Information Management by an authorized editor of CSUSB ScholarWorks. For more information, please contact [email protected]. Whatley: The year 2000 problem The Year 2000 Problem Journal of International Infonnatioii^lanageme^ The year 2000 problem Marshal Whatley California State University, San Bernardino ABSTRACT The purpose of this article is to discuss the root causes of the Year 200 Problem, the effects of the problem and how a systematic approach can be used to solve this problem. INTRODUCTION The Year 2000 Problem (Y2K), also known as the 'millennium bug,' may well be one of the largest problems facing organizations as they enter the 21st century. Computers are an integral component of an organization, organically of equal importance as financial resources and human resources. An organization's information system is the base on which all strategic and informa­ tional processes are developed, defined, and redefined. Therefore, the Y2K problem is not just a computer problem, it is a systemic business problem. A systemic approach will be needed to solve this problem.
    [Show full text]
  • Appendix A: Navy Activities Descriptions
    Appendix A: Navy Activities Descriptions NORTHWEST TRAINING AND TESTING FINAL EIS/OEIS OCTOBER 2015 TABLE OF CONTENTS APPENDIX A NAVY ACTIVITIES DESCRIPTIONS .............................................................................. A-1 A.1 TRAINING ACTIVITIES ................................................................................................................. A-1 A.1.1 ANTI-AIR WARFARE TRAINING ............................................................................................................ A-1 A.1.1.1 Air Combat Maneuver ............................................................................................................... A-2 A.1.1.2 Missile Exercise (Air-to-Air) ....................................................................................................... A-3 A.1.1.3 Gunnery Exercise (Surface-to-Air) ............................................................................................. A-4 A.1.1.4 Missile Exercise (Surface-to-Air) ................................................................................................ A-5 A.1.2 ANTI-SURFACE WARFARE TRAINING ..................................................................................................... A-6 A.1.2.1 Gunnery Exercise Surface-to-Surface (Ship) .............................................................................. A-7 A.1.2.2 Missile Exercise Air-to-Surface .................................................................................................. A-8 A.1.2.3 High-speed Anti-Radiation Missile
    [Show full text]
  • Red Cliff Museum Enhancement Project a Collection O/Interviews, Research, Pictures and Stories
    Red Cliff Museum Enhancement Project A collection o/Interviews, Research, Pictures and Stories Table of Contents 1.0 Background Information/Summaries 1.1 Red Clitf - American Radar Station 1951-1962 1.2 The American Connection of Red Cliff on our Town 2.0 Interview Reports and Consent Forms: 2.1 Lannis Huckabee 2.2 Jeremiah Pahukula 2.3 Norvell and Alice Simpson 2.4 Jay Stephens 2.5 Paul Winterson 3.0 Stories 3.1 All's Fair in Love and War 3.2 How I met my wife 3.3 My First Day at Red Cliff 3.4 On Duty? or On Air? 4.0 Red Cliff Questionnaires 4.1 Summary of respondents 4.2 Original copies of completed questionnaires 5.0 Pictures 5. I Present day (2007) Red CI i ff 6.0 Miscellaneous/Appendix 6.1 Picture of a USAF Squadron Emblem 6.2 Open House Poster 6.3 Emails 7.0 Sources of Research 7.1 "US Military Locations" 7.2 "St. John's (Red Clift), NF" 7.3 "Pinetreeline Miscellaneous" 7.4 "Memories of Red Clift" 7.5 "Life Goes On" Red Cliff American Radar Station 1951-1962 Construction of the American Air Force radar station at Red Cliff began in 1951. The station became operational in 1954. The facility was one of a series of AAF radar stations called the Pine Tree Line. The Pine Tree Line included radar stations across North America and as far as Greenland, and its purpose was to be a defense system against enemy aircraft during the Cold War.
    [Show full text]
  • Social and Ethical Aspects of the Y2K Problem László Ropolyi
    Social and ethical aspects of the Y2K problem László Ropolyi [email protected] Originally presented at ETHICOMP 2001 Abstract It will be shown that the Year 2000 computer problem has three (a technical, a business related and a social) aspects. From the controversial tendencies of the independent and interconnected relationships of the problem a framework of the postmodern network society can be associated. The Year 2000 computer problem can be considered as a measurement of the postmodernity of the present societies. Introduction The Year 2000 computer problem (the Millennium Bug, Y2K Crisis, Time Bomb 2000, etc.) emerged from the common programmer's practice of the 1950s and 1960s that for representation of the year in computers they used two rather four digits. In that time this practice was reasonable and economic. [Fallows, 1999, Information] On the one hand according to the common opinion of the age the development and complete renew of computer software will be a very fast process, in this way within a few decades the two-digits representation of the year will be considered as the interplay of the forgotten past, on the other hand the computer memory and processing time was very expensive. However, if we compare these expectations to the real processes we will find the technological development run in a different way. The development of computer hardware was really very fast, but the relevant software changed and developed relatively slowly, and in many cases a version of the basically same, old software were used in the new computers even close to the Millennium, too.
    [Show full text]
  • Distributing Liability: the Legal and Political Battles of Y2K
    Theme Article: Computing and Capitalism Distributing Liability: The Legal and Political Battles of Y2K Dylan Mulvin London School of Economics and Political Science Abstract—In 1999 the United States Congress passed the Y2K Act, a major—but temporary—effort at reshaping American tort law. The Act strictly limited the scope and applicability of lawsuits related to liability for the Year 2000 Problem. This article excavates the process that led to the Act, including its unlikely signature by President Clinton. The history presented here is based on a reconsideration of the Y2K crisis as a major episode in the history of computing. The Act, and the Y2K crisis more broadly, expose the complex interconnections of software, code, and law at the end of the 20th century, and, taken seriously, argue for the appreciation of the role of liability in the history of technology. & It’s almost a betrayal. After being told for The United States’ “Y2K Act” of 1999 took years that technology is the path to a highly drastic steps to protect American companies evolved future, it’s come as something of a shock to discover that a computer system is from lawsuits related to the Year 2000 Problem not a shining city on a hill - perfect and ever (the “Y2K bug”).3 Among other changes, the new - but something more akin to an old Act gave all companies ninety days to solve any farmhouse built bit by bit over decades by Y2K malfunctions, capped punitive damages, and non-union carpenters.1 stipulated that legal and financial responsibility –– Ellen Ullman, “The Myth of Order” Wired, would have to be distributed proportionately April 1999 among any liable companies.
    [Show full text]
  • Is the Millennium Bug Really Just a Fly in the Ointment?
    Is the Millennium Bug Really Just a Fly in the Ointment? by G. Richard Fisher Y2K — only two letters and a with M. Kurt Goedelman mers will begin no later than 1999.’’2 number, but it has some churches, He also says that it is impossible to ministries and individual Christians make computers compliant. reeling with paranoia. This three- A FRIGHTENING PLOT LINE North has pressed his conspiracy character abbreviation simply stands Doomsday is just a few short theory ideas to the utmost degree. His for the year A.D. 2000. However, the months away, they say. This massive web site contains hundreds of articles fear and trepidation arise not so much shutdown will throw the world into warning of the impending dangers. from the ushering of a new millen- upheaval. Some have scenarios that He has further put his reputation on nium, but from what some say will be include the president declaring mar- the line: a computer apocalypse on Jan. 1, tial law or even the notion that these ‘‘I have been writing for over a 2000. failed computers will usher in Arma- year on this with all the skill I Due to enormous costs, at the ad- geddon, setting the stage for the have. I simply cannot get it vent of computers nearly 40 years Antichrist and the end. Most of the across to all of you or even to ago, software programmers conserved doomsday prognosticators have a most of you. I am never at a loss on memory and data storage by using book or program for sale on how to for words, but I am at a loss for only two digits for the year-date code.
    [Show full text]
  • Underwater Mines - Past, Present and Future
    UNDERWATER MINES - PAST, PRESENT AND FUTURE Prof. S.Veerabhadraiah1, Dr. M.Purnachandra Rao2 1Department of Electronics and Communication Engineering, Raghu Engineering College, Visakhapatnam, Andhra Pradesh, (India) 2Professor of Physics, Head, Department of Systems Design, Andhra University, Visakhapatnam, Andhra Pradesh, (India) ABSTRACT Some examples of past, present and future mines available in the world are initially covered in this paper. This paper makes an assessment of present day underwater Mines technology for various applications in the area of defensive as well as offensive mining. The capabilities of underwater mines namely, operating as automatic sentinels in deep waters and easy deployment for offensive applications as well, meeting the future needs of naval task forces have also been covered in this paper. Finally the limitations of past and present mines are identified and the solutions to overcome these limitations so as to develop a state of the art mine are suggested towards the end of this paper. Keywords: Automatic Sentinels, Contact Mines, Influence Mines, Underwater Mine, World War I. I. INTRODUCTION A naval mine is a self-contained explosive device placed in water to damage or destroy surface ships or submarines. Unlike depth charges, mines are deposited and left to wait until they are triggered by the approach of, or contact with, an enemy vessel. Naval mines can be used offensively—to hamper enemy shipping movements or lock vessels into a harbour; or defensively—to protect friendly vessels and create "safe" zones. The Sea Mine which was earlier thought to be a poor nation‘s weapon has attained a position of prime importance in the armories of many navies of the world.
    [Show full text]