The Risks and Effects of Indirect, Covert, Terrorist, and Extremist Attacks with Weapons of Mass Destruction

Total Page:16

File Type:pdf, Size:1020Kb

The Risks and Effects of Indirect, Covert, Terrorist, and Extremist Attacks with Weapons of Mass Destruction CSIS_______________________________ Center for Strategic and International Studies 1800 K Street N.W. Washington, DC 20006 (202) 775-3270 Updates from: CSIS.ORG, “Homeland Defense” Comments to: [email protected] DEFENDING AMERICA REDEFINING THE CONCEPTUAL BORDERS OF HOMELAND DEFENSE THE RISKS AND EFFECTS OF INDIRECT, COVERT, TERRORIST, AND EXTREMIST ATTACKS WITH WEAPONS OF MASS DESTRUCTION CHALLENGES FOR DEFENSE AND RESPONSE Final Draft Anthony H. Cordesman Senior Fellow for Strategic Assessment FEBRUARY 14, 2001 Copyright CSIS, all rights reserved. CSIS Homeland Defense: Asymmetric Warfare & Terrorism 2/16/01 Page ii The following report is an excerpt from the final draft of a book on Homeland Defense being prepared as part of the CSIS Homeland Defense project. A substantially revised version will be published as a Praeger book later in 2001. Copyright CSIS, all rights reserved. CSIS Homeland Defense: Asymmetric Warfare & Terrorism 2/16/01 Page iii Table of Contents THE RISKS AND EFFECTS OF INDIRECT, COVERT, TERRORIST, AND EXTREMIST ATTACKS WITH WEAPONS OF MASS DESTRUCTION..................................................................................................I CHALLENGES FOR DEFENSE AND RESPONSE ...........................................................................................I Final Draft .............................................................................................................................................i FEBRUARY 14, 2001 ..........................................................................................................................................i ILLUSTRATIVE ATTACK SCENARIOS ................................................................................................................. 3 “CONVENTIONAL” MEANS OF ATTACK ............................................................................................................ 6 WEAPONS OF MASS DESTRUCTION ................................................................................................................... 7 CHEMICAL WEAPONS AS MEANS OF ATTACK ................................................................................................. 15 The Impact and Variety of Possible Chemical Weapons ............................................................................... 15 The Probable Lethality and Effectiveness of Chemical Attacks..................................................................... 17 Methods of Delivery.................................................................................................................................... 21 Detection and Interception .......................................................................................................................... 22 Acquiring Chemical Weapons ..................................................................................................................... 23 The Impact of Technological Change........................................................................................................... 26 The Aum Shinrikyo Case Study.................................................................................................................... 27 Political and Psychological Effects.............................................................................................................. 29 The Problem of Response ............................................................................................................................ 29 BIOLOGICAL WEAPONS AS MEANS OF ATTACK .............................................................................................. 44 Case Studies: Iraq and Russia..................................................................................................................... 51 State Actor, Proxy, and Terrorist/Extremist Incidents to Date ...................................................................... 54 The Yugoslav Smallpox Incident.................................................................................................................. 57 Cases in the US........................................................................................................................................... 58 The Lethality and Effectiveness of Current Biological Weapons ................................................................... 58 Anthrax as a Case Example...................................................................................................................................... 59 Botulism as a Case Example .................................................................................................................................... 61 Plague as a Case Example........................................................................................................................................ 62 Smallpox as a Case Example ................................................................................................................................... 64 Detect, Defend, and Respond to What? .................................................................................................................... 65 Means of Delivery....................................................................................................................................... 66 Manufacturing Biological Weapons............................................................................................................. 68 Changes in Technology and the Difficulty of Manufacture ........................................................................... 72 The Growing Lethality of Biological Weapons and Growing Ease of Manufacture ....................................... 75 Copyright CSIS, all rights reserved. CSIS Homeland Defense: Asymmetric Warfare & Terrorism 2/16/01 Page iv New Types of Biological Weapons............................................................................................................... 76 Changes in Disease: Piggybacking on the Threat from Nature..................................................................... 76 Agricultural and Ecological Attacks ............................................................................................................ 80 The Problem of Response ............................................................................................................................ 84 Funding Half-Measures and False Solutions? ........................................................................................................... 85 The Need for Constantly Updated Net Technical Assessments.................................................................................. 92 Reconsidering the Practical Problems in Defense and Response................................................................................ 93 The Problem of Large-Scale or Highly Efficient Attacks........................................................................................... 94 Other Problems in the Present Response Effort......................................................................................................... 96 Cost-Effectiveness of Real-World Options ............................................................................................................... 98 Bacteria ...................................................................................................................................................... 102 Viruses ....................................................................................................................................................... 102 Toxins......................................................................................................................................................... 102 Arthropods.................................................................................................................................................. 102 Fungi .......................................................................................................................................................... 102 Other .......................................................................................................................................................... 102 RADIOLOGICAL WEAPONS AS MEANS OF ATTACK........................................................................................ 114 The Practical Chances of Using Radiological Weapons............................................................................. 115 The Practical Risks and Effects of Using Radiological Weapons ................................................................ 116 NUCLEAR WEAPONS AS MEANS OF ATTACK ................................................................................................. 119 Lethality and Effectiveness ........................................................................................................................ 120 Is There a Threat from State Actors, Proxies, Terrorists, and Extremists? The Problem of Getting the Weapon ................................................................................................................................................................. 123 The Problem of Delivery ........................................................................................................................... 128 Dealing with the Risk and Impact of Nuclear Attacks................................................................................. 129 Problems in Responding to a Nuclear Attack.........................................................................................................
Recommended publications
  • Cryptography
    Cryptography From Wikipedia, the free encyclopedia Jump to: navigation, search "Secret code" redirects here. For the Aya Kamiki album, see Secret Code. German Lorenz cipher machine, used in World War II to encrypt very-high-level general staff messages Cryptography (or cryptology; from Greek κρυπτός, kryptos, "hidden, secret"; and γράφ, gráph, "writing", or -λογία, -logia, respectively)[1] is the practice and study of hiding information. Modern cryptography intersects the disciplines of mathematics, computer science, and engineering. Applications of cryptography include ATM cards, computer passwords, and electronic commerce. Cryptology prior to the modern age was almost synonymous with encryption, the conversion of information from a readable state to nonsense. The sender retained the ability to decrypt the information and therefore avoid unwanted persons being able to read it. Since WWI and the advent of the computer, the methods used to carry out cryptology have become increasingly complex and its application more widespread. Alongside the advancement in cryptology-related technology, the practice has raised a number of legal issues, some of which remain unresolved. Contents [hide] • 1 Terminology • 2 History of cryptography and cryptanalysis o 2.1 Classic cryptography o 2.2 The computer era • 3 Modern cryptography o 3.1 Symmetric-key cryptography o 3.2 Public-key cryptography o 3.3 Cryptanalysis o 3.4 Cryptographic primitives o 3.5 Cryptosystems • 4 Legal issues o 4.1 Prohibitions o 4.2 Export controls o 4.3 NSA involvement o 4.4 Digital rights management • 5 See also • 6 References • 7 Further reading • 8 External links [edit] Terminology Until modern times cryptography referred almost exclusively to encryption, which is the process of converting ordinary information (plaintext) into unintelligible gibberish (i.e., ciphertext).[2] Decryption is the reverse, in other words, moving from the unintelligible ciphertext back to plaintext.
    [Show full text]
  • Zerohack Zer0pwn Youranonnews Yevgeniy Anikin Yes Men
    Zerohack Zer0Pwn YourAnonNews Yevgeniy Anikin Yes Men YamaTough Xtreme x-Leader xenu xen0nymous www.oem.com.mx www.nytimes.com/pages/world/asia/index.html www.informador.com.mx www.futuregov.asia www.cronica.com.mx www.asiapacificsecuritymagazine.com Worm Wolfy Withdrawal* WillyFoReal Wikileaks IRC 88.80.16.13/9999 IRC Channel WikiLeaks WiiSpellWhy whitekidney Wells Fargo weed WallRoad w0rmware Vulnerability Vladislav Khorokhorin Visa Inc. Virus Virgin Islands "Viewpointe Archive Services, LLC" Versability Verizon Venezuela Vegas Vatican City USB US Trust US Bankcorp Uruguay Uran0n unusedcrayon United Kingdom UnicormCr3w unfittoprint unelected.org UndisclosedAnon Ukraine UGNazi ua_musti_1905 U.S. Bankcorp TYLER Turkey trosec113 Trojan Horse Trojan Trivette TriCk Tribalzer0 Transnistria transaction Traitor traffic court Tradecraft Trade Secrets "Total System Services, Inc." Topiary Top Secret Tom Stracener TibitXimer Thumb Drive Thomson Reuters TheWikiBoat thepeoplescause the_infecti0n The Unknowns The UnderTaker The Syrian electronic army The Jokerhack Thailand ThaCosmo th3j35t3r testeux1 TEST Telecomix TehWongZ Teddy Bigglesworth TeaMp0isoN TeamHav0k Team Ghost Shell Team Digi7al tdl4 taxes TARP tango down Tampa Tammy Shapiro Taiwan Tabu T0x1c t0wN T.A.R.P. Syrian Electronic Army syndiv Symantec Corporation Switzerland Swingers Club SWIFT Sweden Swan SwaggSec Swagg Security "SunGard Data Systems, Inc." Stuxnet Stringer Streamroller Stole* Sterlok SteelAnne st0rm SQLi Spyware Spying Spydevilz Spy Camera Sposed Spook Spoofing Splendide
    [Show full text]
  • Intelligence and Net Assessment
    GW-5 Intelligence 6/28/2016 Page 1 Chapter Five: Intelligence and Net Assessment Like command and control and battle management, the lessons to be drawn from intelligence during the Gulf War are not only valuable in themselves, they lay the ground work for understanding many of the other aspects and lessons of the war. This is particularly true when intelligence is broadened to cover net assessment, and intelligence- related policy. A narrow definition of the role of intelligence not only gives intelligence responsibility for actions and priorities that were often beyond its control, it ignores critical problems and issues that need to be transformed into lessons for the future. Any such, analysis, however, must be shaped by the fact that the Gulf War was in many ways a war between a Coalition that could "see" and an Iraq that was "blind." The COALITION had a near monopoly of sophisticated intelligence, reconnaissance, near real time analysis capability, and secure communication and dissemination assets. In addition, the Coalition could secure its territory against most Iraqi over flights and incursions, while Iraq effectively had "open skies," with basic intelligence problems greatly reinforced by the rigidities in its strategy and tactics, decision making, and command and control process.1 This war between the "seeing" and the "blind" shaped each side's ability to understand the other's military actions and capabilities throughout Desert Shield. It affected every aspect of battle management during Desert Storm, including such basic military functions as targeting. Superior intelligence played a key role in every aspect of Coalition operations, in giving Coalition forces superior effectiveness, in allowing the Coalition to react to Iraq, in achieving surprise and a superior tempo of operations, and in reducing Coalition casualties.
    [Show full text]
  • Navy Supplement to the Dod Dictionary of Military and Associated Terms
    NAVY TACTICAL REFERENCE PUBLICATION NAVY SUPPLEMENT TO THE DOD DICTIONARY OF MILITARY AND ASSOCIATED TERMS NTRP 1-02 EDITION APR 2011 UNCLASSIFIED DEPARTMENT OF THE NAVY OFFICE OF THE CHIEF OF NAVAL OPERATIONS DISTRIBUTION RESTRICTION: APPROVED FOR PUBLIC RELEASE; DISTRIBUTION IS UNLIMITED. PRIMARY REVIEW AUTHORITY: COMMANDER, NAVY WARFARE DEVELOPMENT COMMAND STOCK NUMBER: 0411LP1090273 Form Approved Report Documentation Page OMB No. 0704-0188 Public reporting burden for the collection of information is estimated to average 1 hour per response, including the time for reviewing instructions, searching existing data sources, gathering and maintaining the data needed, and completing and reviewing the collection of information. Send comments regarding this burden estimate or any other aspect of this collection of information, including suggestions for reducing this burden, to Washington Headquarters Services, Directorate for Information Operations and Reports, 1215 Jefferson Davis Highway, Suite 1204, Arlington VA 22202-4302. Respondents should be aware that notwithstanding any other provision of law, no person shall be subject to a penalty for failing to comply with a collection of information if it does not display a currently valid OMB control number. 1. REPORT DATE 3. DATES COVERED 2. REPORT TYPE APR 2011 00-00-2011 to 00-00-2011 4. TITLE AND SUBTITLE 5a. CONTRACT NUMBER Navy Supplement To The DOD Dictionary Of Military And Associated 5b. GRANT NUMBER Terms 5c. PROGRAM ELEMENT NUMBER 6. AUTHOR(S) 5d. PROJECT NUMBER 5e. TASK NUMBER 5f. WORK UNIT NUMBER 7. PERFORMING ORGANIZATION NAME(S) AND ADDRESS(ES) 8. PERFORMING ORGANIZATION Commander, Navy Warfare Development Command,ATTN: N5T,1530 REPORT NUMBER Gilbert Street, Suite 2128,Norfolk,VA,23511 9.
    [Show full text]
  • Annual Report, 2018-2019
    University of Arkansas, Fayetteville ScholarWorks@UARK College of Arts and Sciences Annual Report College of Arts and Sciences 2019 Annual Report, 2018-2019 University of Arkansas Fayetteville. J. William Fulbright College of Arts and Sciences Follow this and additional works at: https://scholarworks.uark.edu/arsc-annual Citation University of Arkansas Fayetteville. J. William Fulbright College of Arts and Sciences. (2019). Annual Report, 2018-2019. College of Arts and Sciences Annual Report. Retrieved from https://scholarworks.uark.edu/arsc-annual/3 This Periodical is brought to you for free and open access by the College of Arts and Sciences at ScholarWorks@UARK. It has been accepted for inclusion in College of Arts and Sciences Annual Report by an authorized administrator of ScholarWorks@UARK. For more information, please contact [email protected]. Annual Report for the J. William Fulbright College of Arts and Sciences July 1, 2018 – June 30, 2019 Table of Contents Executive Summary 3 Significant Achievements and Changes 3 Achievements in Teaching, Research & Public Service 5 Student & Alumni Achievements 6 Appendices See Attachments Appendix A Lists and Codes Departments and Schools Majors Minors Appendix B Guiding Priorities Appendix C Prestigious Faculty Appointments Appendix D Faculty Awards Appendix E Reports from Departments & Schools Appendix F Reports from Programs & Centers Fulbright College Annual Report 2018 – 2019 page 1 of 7 Annual Report for the J. William Fulbright College of Arts and Sciences July 1, 2018 – June 30, 2019 Table of Contents Executive Summary 3 Significant Achievements and Changes 3 Achievements in Teaching, Research & Public Service 5 Student & Alumni Achievements 6 Appendices See Attachments Appendix A Lists and Codes Departments and Schools Majors Minors Appendix B Guiding Priorities Appendix C Prestigious Faculty Appointments Appendix D Faculty Awards Appendix E Reports from Departments & Schools Appendix F Reports from Programs & Centers page 2 of 7 Annual Report for the J.
    [Show full text]
  • Force Health Protection in a Global Environment
    FM 4-02 (FM 8-10) FORCE HEALTH PROTECTION IN A GLOBAL ENVIRONMENT HEADQUARTERS, DEPARTMENT OF THE ARMY FEBRUARY 2003 DISTRIBUTION RESTRICTION: Approved for public release; distribution is unlimited. C1, FM 4-02 (FM 8-10) Change 1 HEADQUARTERS DEPARTMENT OF THE ARMY Washington, DC, 30 July 2009 FORCE HEALTH PROTECTION IN A GLOBAL ENVIRONMENT 1. Change FM 4-02, 13 February 2003, as follows: Remove old pages Insert new pages v and vi v and vi 5-3 and 5-4 5-3 and 5-4 Glossary-7 and Glossary-8 Glossary-7 and Glossary-8 2. New or changed material is indicated by a star (). 3. File this transmittal sheet in front of the publication. DISTRIBUTION RESTRICTION: Approved for public release, distribution is unlimited. By order of the Secretary of the Army: GEORGE W. CASEY, JR. General, United States Army Chief of Staff Official: JOYCE E. MORROW Administrative Assistant to the Secretary of the Army 0919001 DISTRIBUTION: Active Army, Army National Guard, and United States Army Reserve: Not to be distributed. Electronic media only. *FM 4-02 (FM 8-10) FIELD MANUAL HEADQUARTERS NO. 4-02 DEPARTMENT OF THE ARMY Washington, DC, 13 February 2003 FORCE HEALTH PROTECTION IN A GLOBAL ENVIRONMENT TABLE OF CONTENTS Page PREFACE .......................................................................................................... vi CHAPTER 1. FORCE HEALTH PROTECTION ............................................ 1-1 1-1. Overview ............................................................................. 1-1 1-2. Joint Vision 2020 ................................................................... 1-1 1-3. Joint Health Service Support Vision ............................................. 1-1 1-4. Healthy and Fit Force .............................................................. 1-1 1-5. Casualty Prevention ................................................................ 1-2 1-6. Casualty Care and Management .................................................. 1-2 CHAPTER 2.
    [Show full text]
  • Joint Publication 1-02, Department of Defense Dictionary of Military and Associated Terms
    Joint Publication 1-02 Department of Defense Dictionary of Military and Associated Terms 8 November 2010 (As Amended Through 15 February 2016) As Amended Through 15 February 2016 PREFACE 1. Scope The Joint Publication (JP) 1-02, Department of Defense Dictionary of Military and Associated Terms, sets forth standard US military and associated terminology to encompass the joint activity of the Armed Forces of the United States. These military and associated terms, together with their definitions, constitute approved Department of Defense (DOD) terminology for general use by all DOD components. 2. Purpose This publication supplements standard English-language dictionaries and standardizes military and associated terminology to improve communication and mutual understanding within DOD, with other federal agencies, and among the United States and its allies. 3. Application This publication applies to the Office of the Secretary of Defense, the Services, the Joint Staff, combatant commands, DOD agencies, and all other DOD components. It is the primary terminology source when preparing correspondence, to include policy, strategy, doctrine, and planning documents. Criteria for inclusion of terminology in JP 1-02 is enumerated in Department of Defense Instruction 5025.12, Standardization of Military and Associated Terminology, and Chairman of the Joint Chiefs of Staff Instruction (CJCSI) 5705.01, Standardization of Military and Associated Terminology. 4. Publication Format This edition of JP 1-02 has been published in two basic parts: a. Terms and definitions. These are annotated with the source publication. b. Abbreviations and acronyms. The source publication establishes the authoritative context for proper understanding and management of the associated term. 5. JP 1-02 Online Availability and Update Schedule JP 1-02 is accessible online as a searchable database and in PDF format at the following Internet address: http://www.dtic.mil/doctrine/dod_dictionary and at the following NIPRNET i Preface As Amended Through 15 February 2016 address: https://jdeis.js.mil/jdeis/.
    [Show full text]
  • FM 3-05.132: Army Special Operations Forces Chemical
    FM 3-05.132 (FM 3-05.105) Army Special Operations Forces Chemical, Biological, Radiological, and Nuclear Operations August 2007 DISTRIBUTION RESTRICTION: Distribution authorized to U.S. Government agencies and their contractors only to protect technical or operational information from automatic dissemination under the International Exchange Program or by other means. This determination was made on 2 July 2007. Other requests for this document must be referred to Commander, United States Army John F. Kennedy Special Warfare Center and School, ATTN: AOJK-DTD-JA, Fort Bragg, NC 28310-9610, or by e-mail to [email protected]. DESTRUCTION NOTICE: Destroy by any method that will prevent disclosure of contents or reconstruction of the document. FOREIGN DISCLOSURE RESTRICTION (FD 6): This publication has been reviewed by the product developers in coordination with the United States Army John F. Kennedy Special Warfare Center and School foreign disclosure authority. This product is releasable to students from foreign countries on a case-by-case basis only. Headquarters, Department of the Army i This publication is available at Army Knowledge Online <www.us.army.mil> and the General Dennis J. Reimer Training and Doctrine Digital Library at <www.train.army.mil>. *FM 3-05.132 (3-05.105) Field Manual Headquarters No. 3-05.132 (3-05.105) Department of the Army Washington, DC, 31 August 2007 Army Special Operations Forces Chemical, Biological, Radiological, and Nuclear Operations Contents Page PREFACE .............................................................................................................iv
    [Show full text]
  • Reviewers Who Made at Least One Non-Blind Review in the Iiis 2011 Conferences
    REVIEWERS WHO MADE AT LEAST ONE NON-BLIND REVIEW IN THE IIIS 2011 CONFERENCES Reviewer Institution Conference Paper's Title A MARTIN, Airton Universidade do Vale do Paraíba CICIC CONSTRUCCIÓN DE MATERIAL DIDÁCTICO DIGITAL: LA EXPERIENCIA DE LA UNIVAP VIRTUAL - Univap, Brasil A SAPUAN, Dewi Univerciti Tun Abdul Razak, MEI The Rise of an Innovative Manager: Soft skills or Technical skills? Malaysia AARS, Michael Baylor University, United States ISPR Review-by-Few or Review-by-Many? ABASCAL MENA, Rocío Universidad Autónoma SIECI Preparando a los futuros desarrolladores de software:una metodología que apoya en la elaboración de la Metropolitana, México Especificacion de requerimientos. ABD EL-RAOUF, Amal Southern Connecticut State IMCIC A Characterization of Bit Torrent Systems Based on Performance and Features University- CT, United States ABD WAHAB, Mohd Helmy Universiti Tun Hussein Onn CCCT Rigorous Calculation of the Partition Function for the Finite Number of Ising Spins Malaysia, Malaysia ABD WAHAB, Mohd Helmy Universiti Tun Hussein Malaysia, ICSIT Face Recognition Using Local Graph Structure Malaysia ABDEL GHAFFAR, Hany Assistant Professor at the The ISAS Use of Information Systems and Electronic Commerce Success Models to Assess Electronic Government Projects German University in Cairo., Egypt ABDOLLAHYAN, Hamid University of Tehran, Iran SOIC Experts’ Virtual Social Networks: Technology-Mediated Culture of (Mis)Participation and (Mis)Collaboration in Knowledge Management in Cyberspace ABDUL HALEEM, Mohamed King Fahd University of
    [Show full text]
  • JP 1-02, Department of Defense Dictionary of Military and Associated Terms, 12 April 2001
    Joint Publication 1-02 Department of Defense Dictionary of Military and Associated Terms 8 November 2010 (As Amended Through 15 November 2014) PREFACE 1. Scope The Joint Publication 1-02, Department of Defense Dictionary of Military and Associated Terms sets forth standard US military and associated terminology to encompass the joint activity of the Armed Forces of the United States. These military and associated terms, together with their definitions, constitute approved Department of Defense (DOD) terminology for general use by all DOD components. 2. Purpose This publication supplements standard English-language dictionaries and standardizes military and associated terminology to improve communication and mutual understanding within DOD, with other federal agencies, and among the United States and its allies. 3. Application This publication applies to the Office of the Secretary of Defense, the Services, the Joint Staff, combatant commands, DOD agencies, and all other DOD components. It is the primary terminology source when preparing correspondence, to include policy, strategy, doctrine, and planning documents. Criteria for inclusion of terminology in JP 1-02 is enumerated in Department of Defense Instruction (DODI) 5025.12, Standardization of Military and Associated Terminology, and Chairman of the Joint Chiefs of Staff Instruction (CJCSI) 5705.01, Standardization of Military and Associated Terminology. 4. Publication Format This edition of JP 1-02 has been published in two basic parts: a. Terms and definitions. These are annotated with the source publication. b. Abbreviations and acronyms. The source publication establishes the authoritative context for proper understanding and management of the associated term. i Preface 5. JP 1-02 Online Availability and Update Schedule JP 1-02 is accessible online as a searchable database and in PDF format at the following Internet address: http://www.dtic.mil/doctrine/dod_dictionary and at the following NIPRNET address: https://jdeis.js.mil.
    [Show full text]
  • JP 2-01.1, Joint Tactics, Techniques, and Procedures for Intelligence
    Joint Publication 2-01.1 Joint Tactics, Techniques, and Procedures for Intelligence Support to Targeting 9 January 2003 PREFACE 1. Scope This publication provides joint tactics, techniques, and procedures (JTTP) for joint intelligence organizations to implement the fundamental principles of Joint Publication (JP) 2-0, Doctrine for Intelligence Support to Joint Operations, supporting the doctrinal guidance of JP 3-60, Joint Doctrine for Targeting, across the range of military operations. This JTTP publication describes the relationships and procedures necessary for intelligence support to joint targeting (including the operations and intelligence relationships) and roles and responsibilities at the national, combatant command, subordinate joint force, and component levels. This publication describes intelligence processes and procedures supporting the joint force commander (JFC) throughout all phases of the targeting cycle. 2. Purpose This publication has been prepared under the direction of the Chairman of the Joint Chiefs of Staff. It sets forth doctrine and selected JTTP to govern the joint activities and performance of the Armed Forces of the United States in joint operations and provides the doctrinal basis for US military involvement in multinational and interagency operations. It provides military guidance for the exercise of authority by combatant commanders and other JFCs and prescribes doctrine and selected tactics, techniques, and procedures for joint operations and training. It provides military guidance for use by the Armed Forces in preparing their appropriate plans. It is not the intent of this publication to restrict the authority of the JFC from organizing the force and executing the mission in a manner the JFC deems most appropriate to ensure unity of effort in the accomplishment of the overall mission.
    [Show full text]
  • Entire Document (7.8
    left blank intentionally Department of Defense Performance and Accountability Report FY 2006 Table of Contents ...................................................................................... Table of Contents Message from the Deputy Secretary of Defense ii Overview iii Year in Review iv Section 1: Management’s Discussion and Analysis Mission and Organizational Structure 1 Analysis of Financial Statements and Stewardship Information 5 Performance Objectives, Goals, and Results 9 Analysis of Systems, Controls, and Legal Compliance 13 Statement of Assurance 14 Other Management Information, Initiatives, and Issues 17 Section 2: Performance Information Overview 27 Performance Results 30 Program Assessment Rating Tool Summary 68 Section 3: Financial Information Message from the Chief Financial Officer 73 Independent Auditor’s Report 74 Principal Financial Statements and Note 85 Required Supplementary Stewardship Information 158 Required Supplementary Information 162 Section 4: Other Accompanying Information Management Assurance Details 173 Auditor-Identified Financial Statement Weaknesses 198 Inspector General’s Summary of Management and Performance Challenges 198 Government Accountability Office High-Risk Areas 206 Management’s Response to Auditor Challenges 206 Improper Payments Information Act Reporting Details 206 Funds Managed by the Department for the Executive Office of the President 215 Appendixes A - Glossary A-1 B - Internet Links B-1 i Department of Defense Performance and Accountability Report FY 2006 ..........................................
    [Show full text]