Study Document
Countering the Threat of weapon of Mass Destruction (WMDs)
Purpose Statement
Chemical, biological, radiological, and nuclear (CBRN) weapon of mass destruction (WMD) area a threat that can completely disrupt an entire nation’s way of life. The current situation in China is … disrupt an entire nation’s way of life. The current situation in China is a perfect illustration of what can happen when a biological weapon is used to destabilize a nation’s economy. China is currently grinding to a halt as the Covin-19 virus spreads like wildfire through China. … reduce the threat of WMD development and dispersal.
This may be way there was such uproar when President Trump decided to abandon the nuclear treaty with Iran. European nations were shocked that the US should pull out of what to all intents and purposes appeared to be … that the US should pull out of what to all intents and……
References
Asada, M. (2008). Security Council Resolution 1540 to combat WMD terrorism: effectiveness and legitimacy in international legislation. Journal of Conflict & Security Law, 13(3), 303-332.
Carter, A. B. (2004). Overhauling counterproliferation. Technology in Society 26(2-3), 257-269.
CBS. (2011). Clinton on Qaddafi: We came, we saw, he died. Retrieved from https://www.youtube.com/watch?v=mlz3-OzcExI
The Commission to Assess the Organization of the Federal Government to Combat the Proliferation of Weapons of Mass Destruction. (1999). Combating Proliferation of Weapons of Mass Destruction. Washington, D.C.
Forest, J.J.F. (2012, Winter). Framework for Analyzing the Future Threat of WMD Terrorism. Journal of Strategic Security 5, 4. Retrieved from http://scholarcommons.usf.edu/cgi/viewcontent.cgi?article=1193&context=jss
Hochman, D. (2006). Rehabilitating a rogue: Libya's WMD reversal and lessons for US policy. Parameters, 36(1), 63.
Lang, C. G. (1937). Archbishop's Appeal: Individual Will and Action; Guarding Personality. London Times, 28.
Stone, O., & Kuznick, P. (2013). The untold history of the United States. Simon and Schuster.
Study Document
weapon of Mass Destruction
1
An electro-magnetic pulse (EMP) attack could crash the American economy and bring virtually every industry to a standstill—such is ……
References
Chatfield, A. T., Reddick, C. G., & Brajawidagda, U. (2015, May). Tweeting propaganda, radicalization and recruitment: Islamic state supporters multi-sided twitter networks. In Proceedings of the 16th Annual International Conference on Digital Government Research (pp. 239-249).
Christenson, G. (2015). CBRN response. National Guard Bureau.
Freberg, K., Graham, K., McGaughey, K., & Freberg, L. A. (2011). Who are the social media influencers? A study of public perceptions of personality. Public Relations Review, 37(1), 90-92.
Garellek, A. (2016, March 4). The ISIS WMD Threat. The Cipher Brief. Retrieved from https://www.thecipherbrief.com/article/middle-east/isis-wmd-threat
Jennings, P. (2006). Miami port poses serious risks. Retrieved from https://abcnews.go.com/WNT/story?id=131634&page=1
Johnston, W.R. (2016, November 30). Summary of historical attacks using chemical or biological weapons. The Johnston Archive. Retrieved from http://www.johnstonsarchive.net/terrorism/chembioattacks.html
Klein, A. (2019). From Twitter to Charlottesville: Analyzing the Fighting Words Between the Alt-Right and Antifa. International Journal of Communication, 13, 22.
Maras, M-H. (2014). Transnational Security. Florida: CRC Press.
Study Document
The FBI, Counterproliferation, and weapon of Mass Destruction
The United States government significantly increased activities in programs involved in the protection of the nation and the world against … of Mass Destruction
The United States government significantly increased activities in programs involved in the protection of the nation and the world against weapon of mass destruction (WMD) in 2009 and 2010. The Obama Administration, in December 2009, gave a presidential policy directive aimed at countering biological … in 2010 emphasized on how WMD’s proliferation was a threat to global security. In April of the same year, the Administration unclassified the nuclear Posture Review for the first time and it was released alongside the Strategic Arms Reduction Treaty. The treaty was aimed at lowering the … and it was released alongside the Strategic Arms Reduction Treaty. The treaty was aimed at lowering the number of deployable US and Russian weapon. Representatives……
References
Busch, Nathan, and Joyner, Daniel (ed). 2009. “Introduction: Nonproliferation at a Crossroads.” In Combating Weapons of Mass Destruction: The Future of Nonproliferation Policy. Athens, GA: The University of Georgia Press.
Reiss, Mitchell. 2009. “Foreword.” In Combating Weapons of Mass Destruction: The Future of Nonproliferation Policy. Edited by Nathan Busch, and Daniel Joyner. Athens, GA: The University of Georgia Press.
Cameron, Gavin, Pate, Jason & Vogel, Kathleen. (2001). “Planting Fear: How Real is the Threat of Agricultural Terrorism?” Bulletin of Atomic Scientists, 57(5), 38-44.
Jennings, Elain. 2013. U. S. proliferation policy and the campaign against transnational terror: Linking the U.S. non-proliferation regime to homeland security efforts. Master’s Thesis. Naval Postgraduate School.
Levi, Michael. 2009. “On Nuclear Terrorism.” Cambridge, MA: Cambridge University Press.
Mauroni, Albert. J. 2010. “A Counter-WMD Strategy for the Future.” Parameters, 58-73.
Ogilvie-White, Tanya. 2008. “Facilitating Implementation of Resolution 1540 in South- East Asia, and the South Pacific.” In Implementing Resolution 1540: The Role of Regional Organizations. Edited by Lawrence Scheinman. New York: United Nations Institute for Disarmament Research.
Pilat Joseph F. 2009. “Dealing with Proliferation and Terrorism.” In Combating Weapons of Mass Destruction: The Future of International Nonproliferation Policy, edited by Nathan E. Busch and Daniel H. Joyner. Athens, GA: University of Georgia Press.
Study Document
… distinguished military strategist and theorist, the strategy is how to utilize battles to win wars and tactics is how to utilize troops and weapon in battles (Phifer, 2012). However, both tactics and strategies have been theorized, defined, or utilized in different ways at different times in history. … supply challenges, maneuvers, and fortifications. However, between the nineteenth and twentieth centuries, bigger armies started emerging, massive alliances began forming, and more complicated weapon started appearing on battlefields. These challenges made it difficult to continue utilizing old strategies. They also led to the formation of a grand … warfare are very interdependent, unlike most of the principles of warfare utilized in the past.
Maneuvers
It is important to note that new weapon and technologies have not significantly changed several classic offensive maneuvers, including penetration, defense-offensive maneuvers, turning movements, and envelopment.
The penetration maneuver, which is … the main enemy line. It……
Bibliography
Grieco, K. A. (2018). The 2018 national defense strategy: continuity and competition. Strategic Studies Quarterly, 12(2), 3-8.
Henry, R. S. (2016). “First With the Most” Forrest. Pickle Partners Publishing.
Hundley, R. O. (1999). Past Revolutions, Future Transformations. What Can the History of Revolutions in Military Affairs Tell us about Transforming the US Military? (No. RAND-MR-1029-DARPA). RAND CORP SANTA MONICA CA.
Noel, E. (1905). Gustaf Adolf (King of Sweden): The Father of Modern War. Bale & Danielsson.
Parrot, D. A. (1985). Strategy and Tactics in the Thirty Years\\\\\\\\\\\\' War: The\\\\\\\\\\\\" Military Revolution.\\\\\\\\\\\\" Militärgeschichtliche Zeitschrift, (2), 7.
Phifer, M. (2012). A Handbook of Military Strategy and Tactics. Vij Books India Pvt Ltd.
RisCassi, R. W. (1997). Doctrine for joint operations in a combined environment: A necessity. Military Review, 77(1), 103.
Steele, B. (2005). Military Reengineering Between the World Wars. RAND NATIONAL DEFENSE RESEARCH INST SANTA MONICA CA.
Study Document
… its Alpha 5 project. The stated mission of the DOE is “to ensure America’s security and prosperity by addressing its energy, environmental and nuclear challenges through transformative science and technology solutions” (About DOE, 2020, para. 1).
With more than 14,000 employees and operations that span the country, … manufacturing facility dedicated to making our nation and the world a safer place and plays a vital role in the Department of Energy’s nuclear Security Enterprise. Y?12 helps ensure a safe and effective U.S. nuclear weapon deterrent” (About Y-12, 2020, para. 3).
The multiple responsibilities assigned to the Y-12 complex include the storage and retrieval of nuclear materials, the provision of fuel for the country’s naval nuclear fleet, and collaborating with other public and private sector organizations in furtherance of these responsibilities. Since its creation nearly three-quarters of a century … 1944, Building 9201-5 (Alpha 5) operated in a number of……
References
About DOE. (2020). U.S. Department of Energy. Retrieved from https://www.energy.gov/about-us ,
About Y-12. (2020). U.S. Department of Energy. Retrieved from https://www.y12.doe.gov/ about.
Birchfield, J. W. & Albrecht, L. (2012). Successful characterization strategies for the active high risk Y-12 National Security Complex 9201-5 (Alpha-5) Facility, Oak Ridge, TN - 12164. United States.
Recovery cleanup project at Y-12. (2010). U.S. Department of Energy. Retrieved from https://www.energy.gov/orem/articles/recovery-cleanup-project-y-12-leaves-alpha-5-empty-feeling .
Standard review plan: Acquisition strategy review module. (2010, March). Washington, DC: Office of Environmental Management.
Supplement analysis for the site-wide environmental impact statement for the Y-12 National Security Complex (DOE/EIS-0387-SA-02). (2018, May). U.S. Department of Energy. Retrieved from https://www.energy.gov/sites/prod/files/2018/05/f51/EIS-0387-SA02-2018_0.pdf .
Teamwork successfully brings down the Alpha 5 Annex. (2018). U.S. Department of Energy. Retrieved from
Study Document
… premise that military power is key to achieving key strategic goals and global influence. As a result, the country continues to invest in nuclear weapon as part of her power projection and deterrence abilities. For example, the Russian military carries out “regular nuclear-capable Tu-95 Bear bomber long-range aviation flights off the coasts of Japan, Korea, Canada, and Alaska.”[footnoteRef:5] In the past few years, Russia has increased … will be combined with destruction of China’s military production, which will weaken her forces by lessening the aggregate quantities of war materials and weapon. [11: Ibid., 7.]
With regards to space, this coercive air power strategy will entail controlling the adversary’s air space. The United States will … to utilize Chinese air space in strategic bombing of civilians. Through weakening Chinese forces and lessening the overall quantities of war materials and weapon, U.S. forces will control Chinese fielded forces and homeland territory……
Bibliography
Davidson, P.S. “Statement of Admiral Philip S. Davidson, U.S. Navy Commander, U.S. Indo-Pacific Command Before the House Armed Services Committee on U.S. Indo-Pacific Command Posture.” United States Senate, March 27, 2019, https://www.armed-services.senate.gov/imo/media/doc/Davidson_02-12-19.pdf
Department of Defense. “Summary of the 2018 National Defense Strategy of the United States of America.” National Defense Strategy, 2018, https://dod.defense.gov/Portals/1/Documents/pubs/2018-National-Defense-Strategy-Summary.pdf
Muller, K. “The Essence of Coercive Air Power: A Primer for Military Strategies.” Air University, https://www.airuniversity.af.edu/Portals/10/ASPJ/journals/Chronicles/mueller.pdf
Pape, R.A. Bombing to Win: Air Power and Coercion in War, 1st ed. Ithaca, NY: Cornell University Press, 1996.
Tammen, R.L., Kugler, J. & Lemke, D. “Power Transition Theory.” International Relations, June 27, 2017, DOI: 10.1093/OBO/9780199743292-0038
The White House. “National Security Strategy of the United States of America.” The White House, December 2017, https://www.whitehouse.gov/wp-content/uploads/2017/12/NSS-Final-12-18-2017-0905.pdf
Withers, P. “Integrating Cyber with Air Power in the Second Century of the Royal Air Force.” Medium, March 4, 2019, https://medium.com/raf-caps/integrating-cyber-with-air-power-in-the-second-century-of-the-royal-air-force-bca74b8d42ed
Study Document
… American public held its collective breath to see whether Hussein’s threat to wage “the mother of all battles,” including threats to use chemical weapon of mass destruction, would come to fruition. Although the Iraqi military was never able to live up to their leader’s claims, the political … to dilute their war-fighting capabilities (Taylor, 2015).
Following the cessation of the bombing campaign and despite concerns that Saddam Hussein might unleash chemical weapon at the time, coalition forces initiated a ground invasion in February 1991 which was successful in quickly driving Iraqi forces out of Kuwait. … prolonged march to war, the public was divided and ambivalent about the wisdom of invading Iraq rather than relying on continued United Nations weapon inspections” (p. 21). Despite these negative views, however, the Bush administration’s public relations campaign in support of military intervention in Iraq was highly … won the wars in Korea……
References
Curtis, J. (2015, November). Reflecting on strategic results of Operation Desert Storm. Army, 65(11), 24-27.
Khan, H. (2011, July 1). An unbiased estimate of present American competitiveness from deontological and teleological perspectives of utilitarianism. Competition Forum, 9(2), 348-352.
Klotzer, C. L. (2002, October). A lesson for Americans: Desert Storm operation reports were full of lies and distortions. St. Louis Journalism Review, 32(250), 34-39.
Lindsey, J. M. & Smith, C. (2003, Summer). Rally 'round the flag: Opinion in the United States before and after the Iraq War. Brookings Review, 21(3), 20-24.
Operation Desert Storm. (2020). U.S. History. Retrieved from https://www.ushistory.org/ us/60a.asp.
Stilwell, B. (2015, September 12). 21 facts about the first Gulf War. Military.com. Retrieved from https://www.military.com/undertheradar/2015/09/21-facts-about-the-first-gulf-war .
Taylor, A. (2016, January 14). Operation Desert Storm: 25 years since the first Gulf War. The Atlantic. Retrieved from https://www.theatlantic.com/photo/2016/01/operation-desert-storm-25-years-since-the-first-gulf-war/424191/ .
Tilford, K. H., Jr. (1993, Summer). Review: The meaning of victory in Operation Desert Storm: A review essay. Political Science Quarterly, 108(2), 327-331.
Study Document
Introduction
The USS Cole Bombing in October 2000 was a prelude to the intense focus on the spread of weapon of mass destruction (WMDs) that the FBI took up in earnest one year later in the wake of and in response to 9/11. … usage of WMDs by terrorists against America and American interests was “based on a counterproliferation strategy developed in response to the threat of nuclear, biological, and chemical (NBC) weapon to military forces in the 1990s.”[footnoteRef:3] Yet, it was 9/11 that truly introduced the intensely broadened scope, especially with regards to homeland security.[footnoteRef:4] … and the walking away from treaties, such as recently took place between the U.S. and Russia with respect to the suspension of the nuclear Arms Control Treaty.[footnoteRef:7] The destabilization of the relationship between the East and the West is evidence of the growing nature of this challenge. … to exist. Thus, there has……
Bibliography
Arnold, Aaron and Daniel Salisbury, “The Long Arm,” Belfer Center, 2019. https://www.belfercenter.org/publication/long-arm
Carter, Ashton B. "Overhauling counterproliferation." Technology in Society 26, no. 2-3 (2004): 257-269.
The Commission to Assess the Organization of the Federal Government to Combat the Proliferation of Weapons of Mass Destruction. “Combating Proliferation of Weapons of Mass Destruction,” Washington, D.C., 1999.
FBI. “COINTELPRO.” https://vault.fbi.gov/cointel-pro
FBI Counterproliferation Center. “About.” https://www.fbi.gov/about/leadership-and-structure/national-security-branch/fbi-counterproliferation-center
Fischer, Rowena Rege. “Guide to the Study of Intelligence: Counterproliferation,” Journal of U.S. Intelligence Studies 21, no. 1 (Winter 2014-15), 78-82.
Liow, Joseph Chinyong. "The Mahathir administration's war against Islamic militancy: operational and ideological challenges." Australian Journal of International Affairs 58, no. 2 (2004): 241-256.
Manchikanti, Laxmaiah, Jaya Sanapati, Ramsin M. Benyamin, Sairam Atluri, Alan D. Kaye, and Joshua A. Hirsch. "Reframing the prevention strategies of the opioid crisis: focusing on prescription opioids, fentanyl, and heroin epidemic." Pain physician 21, no. 4 (2018): 309-326.
Study Document
...Nuclear weapon Trust and Relationships in Negotiation
Introduction
Successful negotiations rely heavily upon the ability of those involved to develop trust and build solid relationships. If parties to a negotiation cannot trust one another and do not develop the kind of relationships required, it is highly unlikely that they will arrive at the kind of satisfactory, win-win outcome that all sides desire. But how does one define trust? What steps can be taken to best support a working relationship? How can one tell if one is moving towards a successful negotiation or working against one’s own best interests? This paper will review the topic of trust and relationship development in negotiations to show how one can approach the problem of trust and relationship building while working on negotiating an outcome that satisfies all parties.
What is Trust?
Trust is a concept that has different meanings depending on how one thinks of its……
References
Butler Jr, J. K. (1999). Trust expectations, information sharing, climate of trust, and negotiation effectiveness and efficiency. Group & Organization Management, 24(2), 217-238.
Lewicki, R. J., & Stevenson, M. A. (1997). Trust development in negotiation: Proposed actions and a research agenda. Business & Professional Ethics Journal, 16(1/3), 99-132.
Olekalns, M., & Smith, P. L. (2009). Mutually dependent: Power, trust, affect and the use of deception in negotiation. Journal of Business Ethics, 85(3), 347-365.
Ross, W., & LaCroix, J. (1996). Multiple meanings of trust in negotiation theory and research: A literature review and integrative model. International Journal of Conflict Management. 7(4), 314–360.
Shell, G. R. (1991). Opportunism and trust in the negotiation of commercial contracts:Toward a new cause of action. Vand. L. Rev., 44, 221.
Study Document
...Nuclear weapon Introduction
The Caribbean nations of Haiti, Jamaica, and Puerto Rico share in common a history of tumultuous colonial rule. Yet different Old World colonial governments had presided over each of these countries, leading to completely different languages, cultures, customs, and institutions. The French left the most lingering legacy on Haiti, and Haitian slaves ended up leading the world’s first successful large-scale slave rebellion. British rule in Jamaica would also eventually dissolve, as slavery became an untenable model for the global labor market. Spanish-ruled Puerto Rico likewise capitalized on the slave trade and the free labor extracted from it, but slavery in Puerto Rico was less linked to race as it was in either Haiti or Jamaica. This is not to say that Puerto Rico is not as marred by slavery as were Jamaica or Haiti, but the colonial system did ensure a lingering social stratification based on class status. This……
Works Cited
Dubois, Laurent. “Fire in the Cane,” in Avengers of the New World, Cambridge: Harvard University Press, 2007.
Geggus, David. “The Caribbean in the Age of Revolution.”
Godreau, Isar P., Cruz, Mariolga Reyes, Ortiz, Mariluz, et al. “The Lessons of Slavery: Discourses of Slavery, Mestizaje, and Blanqueamiento in an Elementary School in Puerto Rico.” American Ethnologist, Vol. 35, No. 1, 2008, pp. 115-135.
Laguerre, Michael. “The Place of Voodoo in the Social Structure of Haiti.” Caribbean Quarterly, Vol. 19, No. 3, 1973, pp. 36-50.
Mintz, Sidney Three Ancient Colonies: Caribbean Themes and Variations, Harvard University Press, 2012.
Safa, Helen. “The Matrifocal Family and Patriarchal Ideology in Cuba and the Caribbean,” Journal of Latin American Anthropology, Vol. 10, No.2, 2005.
Stinchcombe, Arthur. “Planter power, Freedom, and Oppression of Slaves in 18th century Caribbean”, from Sugar Island Slavery in the Age of Enlightenment, Princeton University Press, pp. 125-158.
Stinchcombe, Arthur. “Race as a Social Boundary: Free Colored versus Slaves and Blacks,” from Sugar Island Slavery in the Age of Enlightenment, Princeton University Press, pp. 159-172.
We have over 150,000+ study documents to help you.
Sign Up for FREE