...POSTGRADUATE SCHOOL MONTEREY, CALIFORNIA THESIS ANTHRAX VACCINE AS A COMPONENT OF THE STRATEGIC NATIONAL STOCKPILE: A DILEMMA FOR HOMELAND SECURITY by Thomas L. Rempfer December 2009 Thesis Advisor: Second Reader: Stanley Supinski Dean Lynch Approved for public release; distribution is unlimited THIS PAGE INTENTIONALLY LEFT BLANK REPORT DOCUMENTATION PAGE Form Approved OMB No. 0704-0188 Public reporting burden for this collection of information is estimated to average 1 hour per response, including the time for reviewing instruction, searching existing data sources, gathering and maintaining the data needed, and completing and reviewing the collection of information. Send comments regarding this burden estimate or any other aspect of this collection of information, including suggestions for reducing this burden, to Washington headquarters Services, Directorate for Information Operations and Reports, 1215 Jefferson Davis Highway, Suite 1204, Arlington, VA 22202-4302, and to the Office of Management and Budget, Paperwork Reduction Project (0704-0188) Washington DC 20503. 1. AGENCY USE ONLY (Leave blank) 4. TITLE AND SUBTITLE 2. REPORT DATE December 2009 3. REPORT TYPE AND DATES COVERED Master’s Thesis 5. FUNDING NUMBERS Anthrax Vaccine as a Component of the Strategic National Stockpile: A Dilemma for Homeland Security 6. AUTHOR(S) Thomas L. Rempfer 7. PERFORMING ORGANIZATION NAME(S) AND ADDRESS(ES) Naval Postgraduate School Monterey, CA 93943-5000 9. SPONSORING...
Words: 3672 - Pages: 15
...Cyber Security by American Military University Professor Derrick Thomas June 22, 2014 Cyber security is a difficulty that everyone faces in today’s society. It is defined in a variety of ways by many. One definition is that cyber security focuses on protecting computer networks, systems, data, and programs from unwanted access. Cyber security is sometimes referred to as information security, information network security, cyberspace security, or even computer security. There are many viewpoints by highly educated people on cyber security but the purpose of this paper is to tell my viewpoint on the subject. Every aspect of a persons life has some sort of cyber dimension. People paying for bills online, cloud computing, and even online gaming. This year in 2014, everyone is bombarded with news headlines that say cyber threats are up. Many of these headlines always include some kind of phishing attack trying to steal someones identity, a hacker that breached the network of a company, a new technique that attacks mobile devices like smart phones, or a government trying to monitor and take secrets from another government!!br0ken!! The concern for cyber security is now a real-world concern globally. The concern over cyber security is what is driving the governments worldwide to make it priority one on their list's now. This is so, because technology is growing at a very fast and continuous pace. The technology field itself is very vast and has much variety. Cyber security in...
Words: 4041 - Pages: 17
...R2P: Doomed from the Start? According to law that dates back to 1648, nations have the right to govern within their borders in whatever manner determined fitting. Some states, although granted this right that is inherent to the foundation of the international system, fail to protect their citizens from harm. Too often in recent history have governments neglected to protect their people during conflicts or crises, and with a world with increasing visibility and communication, states have responded with a basic plan to prevent mass crimes such as Bosnia and Rwanda. Thus, Responsibility to Protect (R2P) was developed as a caveat for the international community to intervene when a government fails to protect its own citizens from mass atrocities. Genocide, war crimes, crimes against humanity, and ethnic cleansing are the four conditions under which the international community is authorized to intervene, should a state fail to protect its citizens (Rudolph 2014). In the past 20 years, R2P has been under construction and constantly under evolution from theory to practice. While parameter definition and norm building continue to cycle from lessons learned, the three foundational pillars upon which the R2P model dangles from remains the same: “Pillar 1: Every state has the responsibility to protect its populations from the four mass atrocity crimes Pillar 2: The wider international community has the responsibility to encourage and assist individual states in meeting that responsibility ...
Words: 4554 - Pages: 19
...From Compliance to Practice Mining Companies and the Voluntary Principles on Security and Human Rights in the Democratic Republic of Congo Tanja A. Börzel/Jana Hönke SFB-Governance Working Paper Series 25 • October 2011 DFG Sonderforschungsbereich 700 Governance in Räumen begrenzter Staatlichkeit - Neue Formen des Regierens? DFG Research Center (SFB) 700 Governance in Areas of Limited Statehood - New Modes of Governance? SFB-Governance Working Paper Series Edited by the Research Center (SFB) 700 „Governance In Areas of Limited Statehood - New Modes of Governance?“ The SFB-Governance Working Paper Series serves to disseminate the research results of work in progress prior to publication to encourage the exchange of ideas and academic debate. Inclusion of a paper in the Working Paper Series should not limit publication in any other venue. Copyright remains with the authors. Copyright for this issue: Tanja A. Börzel/Jana Hönke Editorial assistance and production: Tanja Kilper/Sara Gebh/Anna Jüschke All SFB-Governance Working Papers can be downloaded free of charge from our website www.sfb-governance.de/en/ publikationen or ordered in print via e-mail to sfb700@zedat.fu-berlin.de. Börzel, Tanja A./ Hönke, Jana 2011: From Compliance to Practice. Mining Companies and the Voluntary Principles on Security and Human Rights in the Democratic Republic of Congo, SFB-Governance Working Paper Series, No. 25, Research Center (SFB) 700, Berlin, October 2011. ISSN 1864-1024 (Internet)...
Words: 16584 - Pages: 67
...an example of fruitless academic debate with little policy relevance.3 Such divergent readings of the scholarly literature are often explained by differences in ideology or fundamentally different theoretical orientations. This does not seem to be the case with respect to the sanctions debate. Under appropriate circumstances, it is quite possible for liberals, neoliberals, realists, neorealists, or globalists to argue in favor of using economic sanctions. If the sanctions debate is bogged down, the explanation does not seem to lie in the essentially contested nature of the subject matter. A second potential explanation is that scholars are talking past one another because they ask different questions, use different concepts, and set the discussion in different analytical contexts. In short, they are talking about different things. This article explores the second explanation. The basic paradox at the heart of the sanctions debate is that policymakers continue to use sanctions with increasing frequency, while scholars continue to deny the utility of such tools of foreign policy. 4 Two explanations for this David A. Baldwin is Ira D. Wallach Professor of World Order Studies in the Institute of War and Peace Studies at Columbia University. The author would like to thank the following for helpful comments on earlier versions of this article: Richard Betts, Alexander George,...
Words: 12612 - Pages: 51
... DESIGNING INTERNATIONAL RELATIONS ENQUIRY RESEARCH PROPOSAL TITLE: Economic Community of West African States (ECOWAS): Challenges for sustainable peace and security in West Africa? NAME: MICHELLE GOH YIN MEI STUDENT ID: 009937 DATE: May 7th, 2012 LECTURER: Howard Loewen INTRODUCTION This research will investigate and analyse how the Economic Community of West African States (ECOWAS) and Economic Community of West African States Monitoring Group (ECOMOG) functions as a peace keeping military security unit in the West African sub-region. It is also an analytical project relevant to the peacekeeping efforts and national security of the region that would identify challenges that ECOWAS may face, in keeping with their objectives. This research will also provide suggestions and explore ways to combat issues in order for ECOWAS to achieve their objectives. This research will be able to identify the cause and possible solutions to the political instability in the West African sub-region. REGIONS The issues of West African regions are important and pose fundamental findings that would that would tackle issues such as military intervention, governance, peace building, peacekeeping, and national security. Peacekeeping and security will intensify and promote economic benefits as well as development process in the West African region benefitting the region, the people and the overall prosperity of the nation...
Words: 3007 - Pages: 13
...Browse Essays Read full version essay Fred Stern &Amp; Co Acc492 Case Study Fred Stern &Amp; Co Acc492 Case Study Print version essay is available for you! You can search Free Term Papers and College Essay Examples written by students!. Join Essays24.com and get instant access to Fred Stern &Amp; Co Acc492 Case Study and over 30,000 other Papers and Essays Category: Business Autor: anton 07 May 2011 Words: 2202 | Pages: 9 Week Five Case Studies Team D ACC 492 January 15, 2007 CASE 8.1 FRED STERN & COMPANY, INC. 1. Observers of the accounting profession suggest that many courts attempt to Ў§socializeЎРinvestment losses by extending auditorsЎ¦ liability to third-party financial statement users. Discuss the benefits and costs of such a policy to public accounting firms, audit clients, and third-party financial statement users, such as investors and creditors. In your view, should the courts have the authority to socialize investment losses? If not, who should determine how investment losses are distributed in our society? The word "socialize" is used to suggest a socialist society in which profits and losses are shared by and distributed to the general public by the central government through taxation, legistration, social welfare, or some other legal means. In contrast, the capitalist society is rewarded to the risk takers alone (the auditors in this case). Until the case of Ultramares Corp. v. Touche, auditors admitted no liability whatsoever...
Words: 1249 - Pages: 5
...Ladwig III Predoctoral Fellow Miller Center of Public Affairs University of Virginia A paper prepared for International Studies Association Annual Conference 16-18 February 2009 New York ***Note: This paper is a provisional study of India’s attempts to manage separatist insurgency movements in the Northeast, consequently it provides only a preliminary analysis of the counterinsurgency campaigns in Mizoram and Nagaland.*** 1 From the time of its independence in 1947, India has been plagued by a host of separatist movements as the central government has struggled to integrate a number of religious, racial and ethnic groups into a single multicultural state. Impressively, despite facing a multitude of secessionist movements, India has yet to lose any of its territory. This paper examines the Indian government’s response to the outbreak of separatist violence in Nagaland and Mizoram in the state of Assam. Not only were these insurgencies the Republic of India’s first experience with the phenomenon of separatist insurgency, they were among the most severe. They required an untested government and military to adapt to a form of political warfare with which they had little experience. Through a process of trial and error, India developed an approach to political violence in the Northeast that would guide its response to future insurgencies. The Mizo case is also significant because it was India’s first successfully concluded counterinsurgency campaign, while in Nagaland, political...
Words: 12193 - Pages: 49
...the Moral Justification of Force in the UK Police Consequentialism and the Use of Deadly Force Among Police Personnel in the UK Against a backdrop of a democratic society, the use of deadly force by the police in countries such as the UK seems implausible for human rights activists. First, police officers are expected to uphold the human rights of every individual hence, civilian rights are always preserved even in criminal cases where the due process of law is considered to be the golden standard in the judicial system. Thus, threading the line between regulations and policies of the agency as well as the ethical and moral dilemma in the use of deadly force predisposes police officers to question the legitimacy as well as the moral justifications in their use of deadly force. While several philosophical theorists have argued for different justifications through philosophical theories, the theory of consequentialism appears to be the one that closely justifies the use of deadly force among the police. Before examining the moral and ethical arguments for the use of deadly force using the consequentialist paradigm, let us first examine the important aspects of deadly force and the use of it by the UK police. First, deadly force as defined by Geller and Scott (23) pertains to the force reasonably capable of causing death or bodily harm. According to this definition, an act that can kill should be consumated before it can be considered as a deadly force hence; threats are not considered...
Words: 3190 - Pages: 13
...ase SAILAJA BODEPUDI USS COLE BOMBING (2000) On October 12, 2000, suicide terrorists exploded a small boat alongside the USS Cole—a Navy Destroyer—as it was refueling in the Yemeni port of Aden. Yemen plays a key part in the ability for U.S. and coalition maritime forces to operate in the region. The blast ripped a 40-foot-wide hole near the waterline of the Cole, killing 17 American sailors and injuring many more. This boat bombing was a new methodology, which was used by the terrorists to attacks on their counterparts. As a consequence of the attack, concentrated on executing approaches to enhance U.S strategies and practices for mitigating terrorist attacks on U.S. was used by the terrorists to attacks on their counterparts. Three groups claimed responsibility for the Aden attack – the Islamic Army of Aden-Abyan previously unknown in Yemen, the Army of Mohammed, and the Islamic Deterrence Forces (IDF). A suspected al Qaeda terrorist wanted in connection with the October 2000 bombing of the USS Cole exploded himself with a grenade late Wednesday as Yemeni security strengths surrounded him in Yemen's capital city, security sources said. Authorities had gone to a suspected al Qaeda fort, a house in a poor area of Sana's downtown, and a firefight resulted. The suspect bounced into a taxi, and as authorities attempted to stop the vehicle, the man hauled out an explosive and was clearly attempting to toss it when it blasted in his grasp, sources said. A police identified the...
Words: 726 - Pages: 3
...SECR 6000 Research Study – Time to update the DoD Personnel Security regulation Submitted by R. Allen Green Prepared for Dr. Beth Vivaldi SECR 6000 Security Management Fall II, 2012 Webster University December 12, 2012 CERTIFICATE OF AUTHORSHIP: I certify that I am the author. I have cited all sources from which I used data, ideas, or words, either quoted directly or paraphrased. I also certify that this paper was prepared by me specifically for this course. TABLE OF CONTENTS Cover Page……...…………………………………………………………………………………1 Table of Contents…………....…………………………………………………………………….2 Definitions and Terms…………………………………………………………………………......4 Chapter 1 – Introduction…………………………………………………………….…………….6 Background………………………………………………………………………………..6 Statement of the Problem………………………………………………………………….8 Purpose of the Study…………………………………………………………………..…10 Research Question(s)………………………………………………………………...…..10 Chapter 2 – Literature Review………………………………………………………………...…11 Legal and Ethical Issues in Security……………………………………………………..11 Security Administration and Management………………………………………………14 Business Asset Protection………………………………………………………………..16 Emergency Planning………………………………………………………………......…17 Information System Security……………………………………………………….……18 Behavior Issues……………………………………………………………………..……20 Chapter 3 – Methodology…………...………………………………………………………..….23 Research Design………………………………………………………………………….23 Data collection…………………………………………………………………...25 Data Analysis……………………………………………………………………...
Words: 7232 - Pages: 29
...process of US-North Korean interaction from the transition to the Administration of George W. Bush in 2001 to Pyongyang’s June 2008 demolition of the cooling tower at the Yongbyon nuclear facility. Secondly, and based on the findings of my empirical case study in Chapters Four and Five, I comparatively examine the strength of offensive realism, defensive realism and constructivism in explaining the extent to which US-North Korean security competition was mitigated from 1993 to 2000. The third section considers the implications of this research project’s findings for the ability of policymakers to exercise security dilemma sensibility. The fourth section concludes this PhD thesis by laying out a proposed research agenda that builds on the findings of this research project. 1. Postscript: Transition to George W. Bush George W. Bush succeeded to the US presidency in early 2001 on a political platform that pointed to elements of ideological fundamentalism and assumptions of inherent bad faith in Pyongyang. Robert Woodward argued that the Bush Administration’s outlook was based on moral absolutism that cast the US as a crusader against the ‘evil’ North Korean leadership. Similarly, Charles L. Pritchard, who served as National Security Council Director for Asian Affairs under the Clinton Administration, and the US Representative to Korean Peninsula Energy Development Organization (KEDO) under the Bush Administration, reflected that the transition to Bush marked a hundred percent...
Words: 9664 - Pages: 39
...SAILAJA BODEPUDI USS COLE BOMBING (2000) On October 12, 2000, suicide terrorists exploded a small boat alongside the USS Cole—a Navy Destroyer—as it was refueling in the Yemeni port of Aden. Yemen plays a key part in the ability for U.S. and coalition maritime forces to operate in the region. The blast ripped a 40-foot-wide hole near the waterline of the Cole, killing 17 American sailors and injuring many more. This boat bombing was a new methodology, which was used by the terrorists to attacks on their counterparts. As a consequence of the attack, concentrated on executing approaches to enhance U.S strategies and practices for mitigating terrorist attacks on U.S. was used by the terrorists to attacks on their counterparts. Three groups claimed responsibility for the Aden attack – the Islamic Army of Aden-Abyan previously unknown in Yemen, the Army of Mohammed, and the Islamic Deterrence Forces (IDF). A suspected al Qaeda terrorist wanted in connection with the October 2000 bombing of the USS Cole exploded himself with a grenade late Wednesday as Yemeni security strengths surrounded him in Yemen's capital city, security sources said. Authorities had gone to a suspected al Qaeda fort, a house in a poor area of Sana's downtown, and a firefight resulted. The suspect bounced into a taxi, and as authorities attempted to stop the vehicle, the man hauled out an explosive and was clearly attempting to toss it when it blasted in his grasp, sources said. A police identified the suspect...
Words: 725 - Pages: 3
...THE RELEVANCE OF THE UNITED NATIONS IN THE POST-COLD WAR ERA: IRAQI INVASION AS A CASE STUDY BY ALADENIYI, EMMANUEL ABIODUN APRIL 2005 CHAPTER ONE INTRODUCTION BACKGROUND 1. The basic concepts and assumptions that led to the formation of the United Nations (UN) dates back to the beginning of statecraft and humanity’s first efforts to foster international cooperation. The treaty of the peace of Westphalia of 1648 is regarded at humanity’s first effort in statehood and fostering international cooperation. The formation of the UN is predicated on the evolution of diplomacy, alliances, conferences, rules of warfare, means of peaceful settlement of conflicts and the development of international law. The overriding purpose of the UN is war prevention. This purpose was earlier pursued by ancient Greek Philosophers, Plato and Aristotle, who wrote on the conditions necessary for peace.1 The church in the Middle Ages also enunciated a doctrine of “Just War” to limit violence and destruction by sanctioning only wars fought for justifiable courses. The pacifists and internationalists, like Desiderius Erasmus, condemned war in its entirety as “immoral and wasteful”. 2. The need to institute mechanics for peaceful settlement of disputes and prevent war encouraged the formation of various international organizations over time. These include the Congress of Vienna and Concert of Europe in 1815. The Hague System worked towards the codification...
Words: 11211 - Pages: 45
...PHILIPPINE AIR FORCE AIR EDUCATION AND TRAINING COMMAND AIR FORCE OFFICER SCHOOL Col. Jesus Villamor Air Base, Pasay City COMMANDANT’S PAPER THE IMPACT OF INTERNAL SECURITY OPERATION IN THE STRATEGIC MANAGEMENT OF AIR DEFENSE WING CHAPTER I THE PROBLEM AND ITS SETTING 1.1 INTRODUCTION "Victory smiles upon those who anticipate the changes in the character of war, not upon those who wait to adapt themselves after the changes occur." - Giulio Douhet, Command of the Air A fitting quotation by Douhet for the case of Air Defense Wing wherein the organization was not able to anticipate the streamlining strategy of the government, leaving the Wing no choice but to adapt to the changes in the Command’s thrust of prioritizing Internal Security Operations rather than Territorial Defense Operations to prove its relevance as one of the primary unit of the Philippine Air Force. Caught unprepared of the significant changes in governments thrust, ADW is now suffering in terms of its force structure and budget allocation as it continues to fight for its relevance and existence as one of the premier unit of the PAF. The Background and Rationale of the Study Budget Allocation Statistically, the lowest percentage of allocation in National Budget is in Defense. Debt service gets the biggest share in the proposed budget at 34.1 percent. Social services and economic services follow with 27.9 percent and...
Words: 19632 - Pages: 79