[Kent, England] : The Rendition Project, July 2019
Book — 1 online resource (xxv, 380 pages) Digital: text file.
"Presents the findings from a four-year joint investigation by The Rendition Project and The Bureau of Investigative Journalism into the use of rendition, secret detention and torture by the CIA and its partners in the 'War on Terror'. Between 2001 and 2009, the CIA established a global network of secret prisons ('black sites') for the purpose of detaining terrorism suspects, in secret and indefinitely, and interrogating them through the use of torture and other cruel, inhuman and degrading treatment. The abuses which took place were severe, sustained, and in clear violation of domestic and international law. The perpetrators have never been held to account."--Document home page.
[Washington, D.C.] : [Joint Committee on Taxation], 2018.
Book — 1 online resource (56 pages). Digital: text file.
The Joint Select Committee on the Solvency of Multiemployer Pension Plans has scheduled a public hearing on April 18, 2018, on an overview of the multiemployer pension system. This document,1 prepared by the staff of the Joint Committee on Taxation, provides a discussion of present law relating to retirement plans generally and to multiemployer defined benefit plans in particular, as well as selected data relating to multiemployer defined benefit plans.
[Draft]. - [Place of publication not identified] : [publisher not identified], [January 2017]
Book — 1 online resource (5 unnumbered pages). Digital: text file.
This is a draft memo submitted via the State Department's Dissent Channel and signed by an unknown number of US State Department Foreign Service officers and other US diplomats. The memo was a dissenting opinion in response to President Trump's executive order entitled, "Protecting the Nation from Foreign Terrorist Entry into the United States," signed January 27, 2017 instituting a suspension of entry to the U.S. and issuances of visas for people from Iran, Iraq, Libya, Somalia, Sudan, Syria, and Yemen. The order also temporarily suspends all refugee admission and indefinitely suspends refugee admissions from Syria. The State Department's Dissent Channel is a mechanism for employees to confidentially express policy disagreement, created in 1971 as a response to concerns within the Department over the government's handling of the Vietnam War. Authors of a memo submitted through the Channel, which is open to all regular employees of the State Department and USAID, may not be subject to any penalty or disciplinary action in response. Once a memo is submitted, the Secretary of State's Policy Planning Staff must acknowledge its receipt within two working days and will usually distribute it to the Secretary of State, the Deputy Secretary of State, the Under Secretary for Political Affairs, the Chairperson of the Open Forum, and, if the memo's author is employed by USAID, by the head of that agency as well. Taking into account the wishes of the author, the memo may also be distributed more broadly within the State Department and may be done so anonymously. The ultimate significance of the channel is that memos must receive a substantive response within 30-60 working days.
Washington, DC : Center for Strategic & International Studies, 
Book — 1 online resource (iii, 26 pages) Digital: text file; PDF.
Recommendations for the next administration. Policy recommendations
Moving ahead in the next four years.
"This report lays out specific recommendations for the next administration's cybersecurity policy. It identifies the policies, organizational improvements, and resources needed for this. It builds on the 2009 Commission on Cybersecurity for the 44th Presidency, a foundational document for creating a strategic approach to cybersecurity. In the eight years since that report was published, there has been much activity, but despite an exponential increase in attention to cybersecurity, we are still at risk and there is much for the next administration to do"--Introduction.
Book — 1 online resource (ii. 48 pages) : illustrations
"The goals of this project were to evaluate the impact of juvenile sex offender registration and notification policies on first-time sexual offenses (general deterrence; Goal 1), sexual and violent recidivism offenses (specific deterrence; Goal 2), and on juvenile case processing including case dismissals, diversions, and plea bargains (Goal 3). Previous research has failed to support general or specific deterrent effects but has linked juvenile registration policies to unintended increases in case dismissals, diversions, and plea bargains. We aimed to replicate these findings. To date, we have addressed Goal 1 by evaluating the general deterrent effects of six states' juvenile registration policies, Oregon, Maryland, Idaho, South Carolina, Utah, and Virginia. In no case was any state's policy associated with a general deterrent effect, thus replicating the existing research. We continue to pursue the remaining goals of this project. However, in light of the fact that no published study has identified any community safety benefit of juvenile registration and that several published studies have identifed unintended policy effects on juvenile case processing and on children subjected to registration and/or notification requirements, we recommend that juvenile registratioin and notification policies be replaced with more effective approaches to the prevention of juvenile sexual offending."--PDF Abstract.
Carlisle, PA : Strategic Studies Institute and U.S. Army War College Press, 
Book — 1 online resource (xiii, 32 pages). Digital: text file; PDF.
How does the Army leverage social media?
Social media and information operations (IO)
Force structures, training & education, and equipment
"The impact of social media on the media environment has been widely recognized; as has the ability of extremist and adversarial organizations to exploit social media to publicize their cause, spread their propaganda, and recruit vulnerable individuals. Supporting the growth of social media has been the phenomenal global increase in mobile telephone usage, and much of this increase is in areas where there are existing conflicts or conflicts are highly likely. These combined revolutions will increasingly have a direct impact on virtually all aspects of military operations in the 21st century. In doing so, social media will force significant changes to policy, doctrine, and force structures. This Letort Paper explores the implications of social media for the U.S. Army"--Publisher's web site.
Final draft. - [New York, New York] : [New York Times], 
Book — 1 online resource (iv, 669 pages) : color illustrations Digital: text file.
NOTE: This copy is the FINAL DRAFT report obtained by the NY Times ahead of official publication. The final report is estimated to be released in fall, 2017. The report was completed this year and is a special science section of the National Climate Assessment, which is congressionally mandated every four years. The National Academy of Sciences has signed off on the draft report, and the authors are awaiting permission from the Trump administration to release it. As a key input into the Fourth National Climate Assessment (NCA4), the U.S. Global Change Research Program (USGCRP) oversaw the production of this special, stand-alone report of the state of science relating to climate change and its physical impacts. This report is designed to be an authoritative assessment of the science of climate change, with a focus on the United States, to serve as the foundation for efforts to assess climate-related risks and inform decision-making about responses. In accordance with this purpose, it does not include an assessment of literature on climate change mitigation, adaptation, economic valuation, or societal responses, nor does it include policy recommendations. The Climate Science Special Report (CSSR) serves several purposes for NCA4, including providing 1) an updated detailed analysis of the findings of how climate change is affecting weather and climate across the United States; 2) an executive summary that will be used as the basis for the science summary of NCA4; and 3) foundational information and projections for climate change, including extremes, to improve "end-to-end" consistency in sectoral, regional, and resilience analyses for NCA4. As an assessment and analysis of the science, this report provides important input to the development of NCA4 and its primary focus on the human welfare, societal, economic and environmental elements of climate change.
Washington, D.C. : Assistant Secretary for Planning and Evaluation, U.S. Department of Health and Human Services, [2016?]
Dataset — 1 online resource Digital: data file; text file.
2016 state-by-state data
2016 state-by-state spreadsheet sources by column.
This excel table contains the most up to date state-level data available related to certain provisions of the Affordable Care Act. This table includes data on the uninsured, private market reforms, employer coverage, Medicaid, the individual market (including the Health Insurance Marketplace), and Medicare. These data are drawn from previously published sources and new analyses. Also includes a text document with sources and additional details.
[Washington, D.C.] : Congressional Research Service, November 30, 2016.
Book — 1 online resource (21 pages). Digital: text file.
"Congress annually considers several appropriations measures, which provide discretionary funding for numerous activities--for example, national defense, education, and homeland security--as well as general government operations. Congress has developed certain rules and practices for the consideration of appropriations measures, referred to as the congressional appropriations process. The purpose of this report is to provide an overview of this process. Appropriations measures are under the jurisdiction of the House and Senate Appropriations Committees. In recent years these measures have provided approximately 35% to 39% of total federal spending. The remainder of federal spending comprises direct (or mandatory) spending, controlled by House and Senate legislative committees, and net interest on the public debt. The annual appropriations cycle is initiated with the President's budget submission, which is due on the first Monday in February. This is followed by congressional consideration of a budget resolution that, in part, sets spending ceilings for the upcoming fiscal year. The target date for completion of the budget resolution is April 15. Committee and floor consideration of the annual appropriations bills occurs during the spring and summer months and may continue through the fall and winter until annual appropriations are enacted. Floor consideration of appropriations measures is subject to procedural rules that may limit the content of those measures and any amendments thereto. Congress has established a process that provides for two separate types of measures associated with discretionary spending: authorization bills and appropriation bills. These measures perform different functions. Authorization bills establish, continue, or modify agencies or programs. Appropriations measures subsequently provide funding for the agencies and programs authorized. There are three types of appropriations measures. Regular appropriations bills provide most of the funding that is provided in all appropriations measures for a fiscal year and must be enacted by October 1, the beginning of the fiscal year. If regular bills are not enacted by the beginning of the new fiscal year, Congress adopts continuing resolutions to continue funding, generally until regular bills are enacted. Supplemental appropriations bills provide additional appropriations to become available during a fiscal year. Budget enforcement for appropriations measures under the congressional budget process has both statutory and procedural elements. The statutory elements are derived from the Budget Control Act of 2011, which imposes limits on discretionary spending for each of the fiscal years between FY2012 and FY2021. The procedural elements generally stem from requirements under the Congressional Budget Act that are normally associated with the budget resolution. Through this Budget Act process, the Appropriations Committee in each chamber, as well as each of their subcommittees, receives procedural limits on the total amount of budget authority for the upcoming fiscal year (referred to as 302(a) and 302(b) allocations). Enforcement of the statutory limits occurs primarily through sequestration, while enforcement of the procedural limits occurs through points of order. Discretionary appropriations may be designated or otherwise provided so that they are effectively exempt from statutory and procedural budget enforcement. Such designations include "emergency requirements, " "overseas contingency operations/global war on terrorism, " and for "disaster relief." Rescissions are provisions of law that cancel previously enacted budget authority. As budget authority providing the funding must be enacted into law, so too a rescission cancelling the budget authority must be enacted into law. Rescissions can be included either in separate rescission measures or any of the three types of appropriations measures."--PDF page 2.
Washington, DC : Office of Research and Development, U.S. Environmental Protection Agency, 2016.
Book — 1 online resource : color illustrations Digital: text file; PDF; 41 MB.
"This final report provides a review and synthesis of available scientific information concerning the relationship between hydraulic fracturing activities and drinking water resources in the United States. The report is organized around activities in the hydraulic fracturing water cycle and their potential to impact drinking water resources. The stages include: (1) acquiring water to be used for hydraulic fracturing (Water Acquisition), (2) mixing the water with chemical additives to prepare hydraulic fracturing fluids (Chemical Mixing), (3) injecting the hydraulic fracturing fluids into the production well to create fractures in the targeted production zone (Well Injection), (4) collecting the wastewater that returns through the well after injection (Produced Water Handling), and (5) managing the wastewater via disposal or reuse methods (Wastewater Disposal and Reuse). EPA found scientific evidence that hydraulic fracturing activities can impact drinking water resources under some circumstances. The report identifies certain conditions under which impacts from hydraulic fracturing activities can be more frequent or severe."
[Washington, D.C.] : National Intelligence Council, 2016.
Book — 1 online resource (13 pages) : illustrations.(color) Digital: text file; PDF.
In the Intelligence Community’s (IC) analysis of the possible impacts of climate change on national security over the next 20 years, the IC takes as a scientific baseline the reports produced by the Intergovernmental Panel on Climate Change (IPCC), the international body responsible for assessing the science related to climate change. This memorandum does not assess effects on the homeland, nor does it evaluate the science of the IPCC reports. Long-term changes in climate will produce more extreme weather events and put greater stress on critical Earth systems like oceans, freshwater, and biodiversity. These in turn will almost certainly have significant effects, both direct and indirect, across social, economic, political, and security realms during the next 20 years. These effects will be all the more pronounced as people continue to concentrate in climate-vulnerable locations, such as coastal areas, water-stressed regions, and ever-growing cities. Climate change and its resulting effects are likely to pose wide-ranging national security challenges for the United States and other countries over the next 20 years through the following pathways:threats to the stability of countries, heightened social and political tensions, adverse effects on food prices and availability, increased risks to human health, negative impacts on investments and economic competitiveness, potential climate discontinuities and secondary surprises.
Video — 1 videodisc (approximately 44 min.) : sound, color with black and white sequences ; 4 3/4 in. Sound: digital; optical; stereo. Video: NTSC. Digital: video file; DVD video; all regions.DVD video.
"Marathon for Justice tells the story of past and present environmental inequalities in the United States. The film introduces us to communities around the country who have experienced the detrimental effects of pollution, contamination and the degradation of their lands, and shows how these citizens are mobilizing in the long race for justice." -- Publisher's website.
Alexandria, VA : Office of the Deputy Under Secretary of Defense for Installations and Environment, 2014.
Book — 1 online resource (16 pages) : color illustrations Digital: text file; PDF.
Among the future trends that will impact our national security is climate change. Rising global temperatures, changing precipitation patterns, climbing sea levels, and more extreme weather events will intensify the challenges of global instability, hunger, poverty, and conflict. They will likely lead to food and water shortages, pandemic disease, disputes over refugees and resources, and destruction by natural disasters in regions across the globe. In our defense strategy, we refer to climate change as a 'threat multiplier' because it has the potential to exacerbate many of the challenges we are dealing with today, from infectious disease to terrorism. We are already beginning to see some of these impacts. A changing climate will have real impacts on our military and the way it executes its missions. The military could be called upon more often to support civil authorities, and provide humanitarian assistance and disaster relief in the face of more frequent and more intense natural disasters. Our coastal installations are vulnerable to rising sea levels and increased flooding, while droughts, wildfires, and more extreme temperatures could threaten many of our training activities. Our supply chains could be impacted, and we will need to ensure our critical equipment works under more extreme weather conditions. Weather has always affected military operations, and as the climate changes, the way we execute operations may be altered or constrained. It is in this context that DoD is releasing a Climate Change Adaptation Roadmap. Climate change is a long-term trend, but with wise planning and risk mitigation now, we can reduce adverse impacts downrange.
Washington, D.C. : Center for the Study of Intelligence, January 2014.
Book — 1 online resource (14 pages) Digital: text file.
This compendium of previously published articles from Studies in Intelligence spans some fifty years and focuses on key aspects of the Intelligence Community (IC) relationship with US policymakers. It could not be more timely. These essays touch upon fundamental issues that perpetually test intelligence producers and consumers alike issues at the heart of current day controversies swirling around the US intelligence community.
Dataset — 1 online resource (3 data files, 1 text file) Digital: data file.
The Loan Level Market Analytics data set is comprised of detailed loan prime and subprime loan data. It includes data on loan origination, loan performance, and inferred and contributed loan modification data. Data covers 1990-2014.
[Stanford, Calif.] : Stanford University Libraries, 2014.
Book — 79 p. : ill., port. ; 28 cm
Acquiring the Bob Fitch Photography Archive / Roberto Trujillo
Placing the Fitch Archive in Stanford's Special Collections / Ben Stone
Introduction / Bob Fitch
The civil rights movement in the South, 1965-1970 : Martin Luther King Jr. and the Southern Christian Leadership Conference ; Paving the way for black candidates ; Voter education and registration ; The Meredith march against fear ; Black power ; Martin Luther King Jr.'s funeral ; Continuing the work
The United Farm Workers, 1969-1975 : Origins of the United Farm Workers ; Organizing farmworkers
The anti-Vietnam War movement and the resistance, 1967-1970
Dorothy Day and the Catholic Worker Movement, 1970-1973
Bob Fitch oral history : Excerpts from an interview with Bob Fitch / Leslie G. Kelen.
Washington, DC : Police Executive Research Forum, 
Book — 1 online resource (vii, 40 pages) : portraits
"This report from the Police Executive Research Forum (PERF) examines the impact of Compstat on police performance and accountability. Compstat is a “performance management system that is used to reduce crime and achieve other police department goals.” The system has four core components and emphasizes information-sharing, responsibility and accountability, and improving effectiveness. The components are: 1) timely and accurate information or intelligence; 2) rapid deployment of resources; 3) effective tactics; and 4) relentless follow-up. The report has three major sections. The first section details what Compstat is and how it was developed and adopted, first by the New York City Police Department and subsequently by other law enforcement and non-law enforcement agencies. The second section of the report discusses what is known about Compstat in today’s criminal justice system. The third section of the report discusses the future of Compstat and presents the views of agency officials on their plans for the use of Compstat"--NCJRS website.
Book — 1 online resource (17 pages in various pagings) : illustrations.
The $52.6 billion "black budget" for fiscal 2013, obtained by The Washington Post from former intelligence contractor Edward Snowden, maps a bureaucratic and operational landscape that has never been subject to public scrutiny. Although the government has annually released its overall level of intelligence spending since 2007, it has not divulged how it uses the money or how it performs against the goals set by the president and Congress. The 178-page budget summary for the National Intelligence Program details the successes, failures and objectives of the 16 spy agencies that make up the U.S. intelligence community, which has 107,035 employees. The summary describes cutting-edge technologies, agent recruiting and ongoing operations. The Post is withholding some information after consultation with U.S. officials who expressed concerns about the risk to intelligence sources and methods. Sensitive details are so pervasive in the documents that The Post is publishing only summary tables and charts online. The Post has decided to only publish 17 pages of the 178 page document.
Book — 1 online resource (x, 560 p.) : digital, PDF file.
Members of the Constitution Projects's Task Force on Detainee Treatment.
A word on reading this report.
Statement of the Task Force.
Findings and recommendations.
Detention at Guantanamo.
The legal process of the Federal Government after September
Rendition and the "black sites".
The role of medical professionals in detention and interrogation operations.
True and false confessions: the efficacy of torture and brutal interrogations.
Effects and consequences of U.S. policies.
The Obama Administration.
The role of Congress.
Memo in support of Finding #1.
Memo in support of finding #2.
Guide to acronyms.
This report by the Constitution Project's blue ribbon Task Force on Detainee Treatment is the most comprehensive, bipartisan investigation into the detention and treatment of suspected terrorists yet published. The product of more than two years of research, analysis and deliberation by the Task Force members and staff, it provides the American people with a broad understanding of what is known, and what may still be unknown, about the past and current treatment of suspected terrorists detained by the U.S. government during the Clinton, Bush and Obama administrations, and across multiple geographic theatres, including Iraq, Afghanistan, Guantánamo and the so-called "black sites." Its conclusion: "It is indisputable that the United States engaged in the practice of torture" after September 11, 2001 "and that the nation's highest officials bore ultimate responsibility for it."
Book — 1 online resource (xiv, 153 pages) : color illustrations Digital: text file; PDF.
Strategic planning and policy
CCDR mission and capability needs
Technologies for unmanned systems
Logistics and sustainment
"The purpose of this Roadmap is to articulate a vision and strategy for the continued development, production, test, training, operation , and sustainment of unmanned systems technology across DoD. This "Unmanned Systems Integrated Roadmap" establishes a technological vision for the next 25 years and outlines actions and technologies for DoD and industry to pursue to intelligently and affordably align with this vision."--Page v.
Washington, D.C. : U.S. Department of Justice, National Institute of Corrections, 2012.
Book — 1 online resource (128 pages) : PDF, color illustrations
"The APEX Assessment Tools Protocol includes the APEX Screener, the APEX Organizational Profile, and the APEX Inventory. These tools provide correctional agencies with processes to assess their internal and external environments, their readiness for change, and their performance on key indicators from the APEX Public Safety Model domains. These self-assessment tools are designed specifically for correctional agencies to use in a variety of ways: (1) sequentially: Screener--Organizational Profile--Inventory, (2) one or two of the tools as chosen by the agency, (3) as a checkup to see how the agency is performing, and (4) as a pretest or posttest to measure progress as a whole organization or by one department only. The assessment tool reports are designed to guide discussions of the results and how the agency wants to use the results to create a performance improvement plan"--Page 39.
[Washington, D.C.] : [U.S. Census Bureau], [2002?]
Book — 1 online resource (24 pages) : color illustrations Digital: text file.
This is a profile of California's population with some comparisons to the United States population. It is based on recently released demographic, social, economic, and housing characteristics collected in the 2000 census
Washington, D.C. : U.S. Department of Justice, Office of Legislative Affairs, Office of Assistant Attorney General, 2012.
Book — 1 online resource (399 pages) : PDF, illustrations
"The DNA Analysis Backlog Elimination Act of 2000 as amended directs the Attorney General to submit a report to Congress no later, than 90 days at the end of each Fiscal Year ... The Office of Justice Programs' National Institute of Justice (NIJ) has primary responsibility for the administration of assistance programs related to DNA and forensics. NIJ has assembled the enclosed Report and accompanying attachments, which provide the information required by the Act."
[Washington, DC] : U.S. House of Representatives, 2012.
Book — 1 online resource (vii, 52 p.) : digital, PDF file.
The threat posed to U.S. national-security interests by vulnerabilities in the telecommunications supply chain is an increasing priority given the country's reliance on interdependent critical infrastructure systems; the range of threats these systems face; the rise in cyber espionage; and the growing dependence all consumers have on a small group of equipment providers. China has the means, opportunity, and motive to use telecommunications companies for malicious purposes. Suggested 'mitigation measures' cannot fully address the threat posed by Chinese telecommunications companies providing equipment and services to United States critical infrastructure. The Committee launched this investigation to seek answers to some persistent questions about the Chinese telecommunications companies Huawei and ZTE and their ties to the Chinese government. Throughout the months-long investigation, both Huawei and ZTE sought to describe, in different terms, why neither company is a threat to U.S. national-security interests. Unfortunately, neither ZTE nor Huawei have cooperated fully with the investigation, and both companies have failed to provide documents or other evidence that would substantiate their claims or lend support for their narratives.
[Stanford, Calif.] : Stanford Law School ; [New York] : NYU School of Law, c2012.
Book — 1 online resource (x, 165 p.) : col. ill.
"In the United States, the dominant narrative about the use of drones in Pakistan is of a surgically precise and effective tool that makes the US safer by enabling "targeted killing" of terrorists, with minimal downsides or collateral impacts. This narrative is false. Following nine months of intensive research-- including two investigations in Pakistan, more than 130 interviews with victims, witnesses, and experts, and review of thousands of pages of documentation and media reporting-- this report presents evidence of the damaging and counterproductive effects of current US drone strike policies. Based on extensive interviews with Pakistanis living in the regions directly affected, as well as humanitarian and medical workers, this report provides new and firsthand testimony about the negative impacts US policies are having on the civilians living under drones."--Exec. sum.
[Washintgon, D.C.] : U.S. Department of the Interior, Bureau of Ocean Energy Management, 2012.
Book — 1 online resource (4 volumes (2057 pages in various paging) : color illustrations, color maps
Describes the potential environmental impacts of the Proposed Final 2012-2017 Outer Continental Shelf (OCS) Oil and Gas Leasing Program (PFP), which establishes a schedule that is used as a basis for considering where and when oil and gas leasing might be appropriate over a 5-year period.
This study examines the history of the Defense Intelligence Agency during the Vietnam War, examining DIA's early efforts to assess the expanding conflict, its role in the U.S. bombing campaign against North Vietnam, and its place in the important order of battle controversy. It also explores DIA's expanding role late in the war and after U.S. forces departed South Vietnam.
"This study examines the early history of the Defense Intelligence Agency with a particular focus on the various organizational challenges confronting the new agency and DIA's response to the Cuban Missile Crisis."--Series home page.
[Silver Spring, Md. : U.S. Dept. of Commerce, National Oceanic and Atmospheric Administration, National Ocean Service, Office of National Marine Sanctuaries, 2010]
Book — 1 online resource (vi, 103 p.) : PDF file, maps (1 col.) ; 3.5 MB.
"This Final Programmatic Environmental Impact Statement (FPEIS) addresses restoration techniques for anthropogenic physical injury to coral reef resources within Gulf of Mexico and Caribbean waters of the National Marine Sanctuary System (NMSS). There is a wide range of restoration techniques available for use, varying from those that are frequently used to those that are innovative and not commonly implemented. The purpose of this document is to present and analyze the current technologies available for effective implementation of restoration to address injury to coral reef resources in these areas of the NMSS; appropriate analysis of the technologies in this document will provide for efficient selection and implementation of action when needed"--Executive summary (p. 1).
Washington, D.C. : Headquarters, Department of the Army, February 2010.
Book — 1 online resource (326 pages in various pagings) : illustrations. Digital: text file.
"Field manual (FM) 3-39.40 is aligned with FM 3-39, the military police keystone FM. FM 3-39.40 provides guidance for commanders and staffs on internment and resettlement (I/R) operations. This manual addresses I/R operations across the spectrum of conflict, specifically the doctrinal paradigm shift from traditional enemy prisoner of war (EPW) operations to the broader and more inclusive requirements of detainee operations. Additionally, FM 3-39.40 discusses the critical issue of detainee rehabilitation. It describes the doctrinal foundation, principles, and processes that military police and other elements will employ when dealing with I/R populations. As part of internment, these populations include U.S. military prisoners, and multiple categories of detainees (civilian internees [CIs], retained personnel [RP], and enemy combatants), while resettlement operations are focused on multiple categories of dislocated civilians (DCs). Military police conduct I/R operations during offensive, defensive, stability, or civil support operations. I/R operations include military police support to U.S. military prisoner and detainee operations within operational environments (OEs), ranging from major combat operations to humanitarian-assistance missions in support of a host nation (HN) or civil agency. I/R operations are a major subordinate Army tactical task under the sustainment warfighting function. (See FM 7-15.) Placement under the sustainment warfighting function does not mean that I/R operations do not have relevance in the other warfighting functions. While I/R is listed under the sustainment warfighting function, it should be noted this is not a specified or implied mission of all sustainment units or commands. Most sustainment units provide logistics, personnel services, and health service support to I/R operations. Military police are uniquely qualified to perform the full range of I/R operations. They have the requisite skill sets provided through specific training and operational experience. The skills necessary for performing confinement operations for U.S. military prisoners in permanent facilities are directly transferable and adaptable for tactical confinement of U.S. military prisoners and detention of detainees. All military police units are specifically manned, equipped, and trained to perform I/R operations across the spectrum and those identified as I/R units are the specialists within the Army for this role. FM 3-39.40 depicts the changes in terminology from the focus on the contiguous battlefield to reflect the types of operations being conducted in today's OEs. These changes address the modifications made to previous EPW processing operations. The terms division forward, central collection point, and corps holding area no longer apply. They have been replaced with the terms detainee collection point (DCP) (brigade level), detainee holding area (DHA) (division level), theater internment facility (TIF), and strategic internment facility (SIF).This manual recognizes the role of police intelligence operations in I/R operations and enhances the critical importance of military police and military intelligence interaction at all echelons. It further highlights the long-standing requirement to treat all individuals humanely according to applicable U.S. laws and regulations, international laws, execution orders, fragmentary orders (FRAGOs), and other operationally specific guidelines such as Department of Defense (DOD) policies. Moreover, it stipulates that ill treatment of U.S. military prisoners, detainees (EPWs, CIs, and RP), and DCs is strictly prohibited, regardless of any circumstances or the chaos of major operations. FM 3-39.40 aligns with FM 3-0, FM 3-39, FM 7-15, and other Army and joint doctrine, to include Joint Publication (JP) 3-63. This manual is organized into 10 chapters with 14 appendixes to provide additional details on I/R topics. Chapters 1 through 3 follow the flow of FM 3-39, and describe the military police function of I/R operations. Chapters 4 through 6 focus primarily on detainee operations, to include planning, preparing, executing, and sustaining all I/R operations. Chapters 7 through 10 focus on the confinement of U.S. military prisoners, rehabilitative programs for U.S. military prisoners and detainees, parole and release or transfer programs, and resettlement operations for DCs"--Preface.
Book — 1 online resource (52 p.) : digital, PDF file.
"Our national security strategy is, therefore, focused on renewing American leadership so that we can more effectively advance our interests in the 21st century. We will do so by building upon the sources of our strength at home, while shaping an international order that can meet the challenges of our time. This strategy recognizes the fundamental connection between our national security, our national competitiveness, resilience, and moral example. And it reaffirms America's commitment to pursue our interests through an international system in which all nations have certain rights and responsibilities."--P. 1
[Unredacted version]. - [Washington, D.C.] : [George Washington University, National Security Archive], .
Book — 1 online resource (x, 607 pages) : text file, PDF
An internal history of the United States government’s Nazi-hunting operation provides gripping new evidence about some of the most notorious Nazi cases of the last three decades. The Justice Department kept the 600-page report secret for the last four years, releasing a heavily redacted version in Nov. 2010 to a private research group that sued to force its release. A complete version was obtained by The New York Times. Background for the document can be found at http://www.gwu.edu/~nsarchiv/NSAEBB/NSAEBB331/index.htm and http://www.nytimes.com/2010/11/14/us/14nazis.html