For over a quarter of a century, our news, educational, technical, scientific, and medical publications have made unique and valuable references accessible to all people.
Our imprints include PM Medical Health News, Advanced Professional Education and News Service, Auto Racing Analysis, and World Spaceflight News.
Many of our publications synthesize official information with original material. They are designed to provide a convenient user-friendly reference work to uniformly present authoritative knowledge that can be rapidly read, reviewed or searched. Vast archives of important data that might otherwise remain inaccessible are available for instant review no matter where you are.
The e-book format makes a great reference work and educational tool. There is no other reference book that is as convenient, comprehensive, thoroughly researched, and portable - everything you need to know, from renowned experts you trust.
Our e-books put knowledge at your fingertips, and an expert in your pocket!
It has now been demonstrated beyond a reasonable doubt that the Russian State was behind a systematic effort to dope their athletes and defraud the Olympics. No one can see how deep this rabbit hole goes, and how long these corrupt practices have gone on. But what we can say is that it is a microcosm of the conflicts playing out across the world.
The purpose of this report is to provide the American people with the findings of the Committee's investigation into Russian efforts to influence U.S. energy markets. First, the report discusses several factors driving the Kremlin's desire to interfere with U.S. energy markets and influence domestic energy policy.
The list of threats to our elections are numerous, and it is our job to address the weaknesses with the utmost haste and diligence. Our intelligence community is united in its findings that the U.S. will once again face Russian threats to our elections and our democratic process, and other countries could indeed follow suit.
Published: December 11, 2019.
Nonfiction » History » European
The Senate Armed Services Committee met to receive testimony on the attempted coup in Montenegro and malign Russian influence in Europe. In the worst case scenario, if the plans had succeeded, there would have been chaos and serious violence and extremely dangerous instability with intention to undermine the constitutional order and institutions of Montenegro.
Russia launched a targeted military intervention in Syria to save the regime of Bashar al-Assad and ensure access to military bases on the Mediterranean Sea. Moscow has used this foothold to assert its interests, to expand its political and military and economic influence, to reclaim its status as a great power, and to offer itself as an authoritarian alternative to the United States.
The Kremlin's sadistic pursuit of the Bitkov family is, in its way, just as shocking as the cruel murder of Litvinenko and the attempted murders of the Skripals. The Bitkovs are still alive today, but they have been hounded for over a decade to the opposite ends of the world and beyond the limits of human endurance merely for resisting Putin's favorites.
Three authoritative reports have been professionally converted for accurate flowing-text e-book format reproduction: Security Challenges in Europe and Posture for Inter-State Competition With Russia; Russia's Counterproductive Counterterrorism; and Countering a Resurgent Russia.
Four authoritative reports have been professionally converted for accurate flowing-text e-book format reproduction: Russia's Nuclear Weapons: Doctrine, Forces, and Modernization; Russia, the Skripal Poisoning, and U.S. Sanctions; U.S. Sanctions on Russia: An Overview; and Russia and Arms Control: Extending New Start or Starting Over?
This report was prepared by the minority staff of the Senate Committee on Finance and issued in September 2019. Senate Finance Committee Ranking Member Ron Wyden, D-Ore., in February 2018 began an inquiry of the NRA following public reporting of potential improper activities related to financial contributions and its role in the 2016 presidential election.
The Chinese Communist Party believes there are several threats that exist along China's maritime periphery. These threat perceptions have a defined geographic focus and are informed by fears about Taiwan independence, challenges to China's claims in the South China Sea, and Japan's administrative control of the Senkaku Islands in the East China Sea.
This unique NASA document compilation, with over 140 illustrations, provides a comprehensive and up-to-date review of all aspects of the exciting new Artemis moon landing program, which aims to put the first woman and next man on the moon by 2024.
This authoritative report has been professionally converted for accurate flowing-text e-book format reproduction. It covers a public hearing of the U.S.-China Economic and Security Review Commission on China's Information Controls, Global Media Influence, and Cyber Warfare Strategy.
This authoritative report has been professionally converted for accurate flowing-text e-book format reproduction. The Commission report is offered to Congress in the hope that it will be useful for assessing progress and challenges in U.S.-China relations.
This U.S. - China Economic and Security Review Commission hearing covered China's economic and security relations with Thailand, Cambodia, Burma, and Laos as well as China's relations with Northeast Asian countries in light of North Korea's nuclearization.
This commission hearing considers U.S. companies' access to China's consumer market, focusing on China's e-commerce, logistics, and financial services sectors. Services make up the largest part of our economy and services trade is a key facet of the U.S.-China economic relationship.
There have been numerous congressional hearings on cybersecurity and how to stop the bad guys. What has not been discussed in great detail is what the consequence will be from a massive cyberattack that brings down, for example, a large portion of the electrical grid for an extended period of time.
This manual provides procedures for the National Guard (NG) Chemical, Biological, Radiological, and Nuclear (CBRN) Response Enterprise (NG-CRE) which includes Homeland Response Forces (HRF) and Chemical, Biological, Radiological, and Nuclear, and High-Yield Explosive (CBRNE) Enhanced Response Force Package (CERFP) units.
Professionally converted for accurate flowing-text e-book format reproduction, this unique compilation reproduces all five official Homeland Security reports about their important series of cyber security exercised known as Cyber Storm, including the 2016 exercise.
Overlooked, under-policed, and highly lucrative, international wildlife trafficking has become a low-risk/high-return illegal trade estimated at $7 billion to $23 billion annually. While China's share of this trade is unknown due to the trade's illicit nature, China is widely recognized as the world's largest market for trafficked wildlife products.
This authoritative report has been professionally converted for accurate flowing-text e-book format reproduction. China's process of modernizing its armed forces has involved the development of indigenously designed weapons systems—some of which appeared to undergo a process of development, procurement, and/or deployment that outpaced the estimates of U.S. and other foreign observers.
This authoritative report with the input of nine esteemed experts has been professionally converted for accurate flowing-text e-book format reproduction. A hearing on September 4, 2019 reviewed key developments in the U.S.-China relationship in 2019. Panel 1 evaluated developments in China's political economy and the impact of U.S.-China trade frictions on the Chinese economy.
The Guide to Wildland Fire Cause and Determination provides recommended procedures, practices and techniques (methods) for use within a problem solving framework to conduct a systematic wildland fire investigation resulting in a determination of the ignition area, cause, and ignition sequence.
This study analyzes how the U.S. Air Force can use training to prepare its F-22 and F-35 pilots to meet future operational requirements. The author begins by reviewing six historic examples of the Air Force's use of combined flight and simulator training to provide a representative environment for pilot training.
Three important federal government papers have been professionally converted for accurate flowing-text e-book format reproduction: (a) The 5G Ecosystem: Risks & Opportunities for DoD; (b) National Security Implications of Fifth Generation (5G) Mobile Technologies; (c) Network Reliability and Security Risks to Emerging 5G Wireless Networks.
This important compilation of three 2019 cybersecurity papers has been professionally converted for accurate flowing-text e-book format reproduction: (a) Overview of Risks Introduced by 5G Adoption in the United States; (b) Insider Threat Programs for the Critical Manufacturing Sector Implementation Guide; and (c) Strategic Intent: "Defend Today, Secure Tomorrow".
Numerous irregular warfare practitioners and scholars have offered a method for engaging irregular threats as an alternative to expensive large-scale counterinsurgency. That alternative is small-scale foreign internal defense (FID).
The United States Air Force (USAF) does not adequately organize, train, and equip for building partnerships with foreign militaries, despite this activity's stated importance in national strategy, joint doctrine, and official USAF guidance. The USAF does boast an array of air advisor units—some permanent, and some ad hoc. The different units are stove-piped within different major commands.
This history, issued in August 2019, has been professionally converted for accurate flowing-text e-book format reproduction. This study will examine in more detail how CIA’s growing capability to do independent analysis of the Soviet military threat led to major disagreements with the U.S. armed services over Soviet military capabilities and intentions, beginning in the Dulles era.
The U.S. Army chartered the University of Foreign Military and Cultural Studies (UFMCS) with the mission to teach Red Teaming to the U.S. Army and other authorized organizations. As the nature of warfare has evolved, so too has our curriculum and academic offerings. Version 9.0 of the Red Team Handbook represents the current state of our program.
This report provides a long-term perspective on possible space futures to inform strategic decisionmaking. Economic, political, technological, and military space trends indicate that we have passed the tipping point for space as a vastly increased domain of human endeavor and a key element of national power. Other countries recognize the advantages of U.S. space leadership.
The factors that fuel the success or failure of insurgencies are an important and debated topic in national security circles. This work examines the cases of the Fuerzas Armadas Revolucionarias de Colombia (FARC) in Colombia, an insurgency failure, and the Frente Sandinista de Liberation Nacional (FSLN) in Nicaragua, an insurgency success.
There currently exists a critical consensus that India's leaders lack a grand strategy to direct internal and external policies. Recent literature focuses increasingly on this issue to address the question of India's ability to counter China's rising influence in South Asia and the Indian Ocean Region.
The Socialist Federal Republic of Yugoslavia (SFRY) broke apart violently in the early 1990s. This thesis explores evidence about the root causes of Yugoslavia's turbulent disintegration. It evaluates the cogency of the most prominent suggested causes of the SFRY's breakup, and draws conclusions regarding the most convincing explanations.
It is in the best interest of the United States to lead the effort to provide laws that govern space colonies. A gap exists in international law. This gap in the framework should be viewed as an opportunity, rather than a hindrance. The commercial sector is taking the lead in developing technologies that enable human beings to live and work in space.
This paper examines the USAF role in managing space and makes recommendations for the future of space in the United States military. Though it echoes specific recommendations made elsewhere by previous authors, the main purpose of this paper is to consider a legislative framework required to sever space from Air Force oversight, and to establish a separate United States Space Force (USSF).
This analytical study looks at the importance of Deep Space Operations and recommends an approach for senior policy leaders. Section 1 presents a capability requirements definition with candidate solutions and technology strategies. Section 2 recommends an acquisition and organizational approach. Section 3 provides an extended strategic rationale for deep space operations as a national priority.
This study, conducted by a team of leaders in industry, research and development, finance, policy and strategy, explores whether and how the USAF can form private sector partnerships to create a virtuous cycle of launch cost reductions of between 3 and 10 times lower than today's costs. Doing so could enable completely new approaches for the Air Force to defend American values.
The United States and Cuba have long had a contentious relationship. Following Fidel Castro's revolution, the antagonism was bolstered by the Soviet Union's support for Cuba. After the collapse of the Soviet Union and the end of the Cold War, it was predicted by some that the end of Castro's regime was near and the United States would be there to help with democratization of Cuba.
China's rise as a space power has coincided with its quest for hegemony in the Indo-Pacific. Advances in China's space capabilities constitute a threat to regional states' national security, economic competitiveness, and national prestige.
Anti-government protest movements have been increasingly significant in Russian politics. This thesis investigates why these movements have risen, as well as if and how they resonate with the broader segments of Russian society. It draws inferences based on scholarly research regarding the durability of these movements.
In the last decade, the integration of unmanned aerial systems (UAS) into military operations has grown substantially. UAS have significantly contributed to U.S. military tactical, operational and strategic operations.
In March 2018, the Chinese National People's Congress voted to abolish presidential term limits, paving the way for Chinese President Xi Jinping to rule the country indefinitely. This decision was but one part of a broader trend of power centralization taking place within the People's Republic of China.
The collapse of the Soviet Union left the United States as the preeminent global power. China's rise has marked it as the primary threat to the United States' top position, but its economic rise alone has not been enough, and it found a ready partner in Russia to bolster its balancing efforts.
As malicious actors advance their capabilities to exploit and penetrate computer networks, the Department of the Navy (DoN) must be able to verify whether or not its computer systems are susceptible to cyber-attacks. A current mitigation technique is to use a cyber red team to assess a friendly network in a controlled environment.
Existing literature on the topic of a potential Korean reunification focuses primarily on three major areas of concern: the impact to regional and international security, fiscal costs analysis, and anticipation of various reunification scenarios. Assuming a unification under Seoul's guidance, this study will seek to bridge a gap that exists in the field by examining the likely social implications.
Throughout their twenty-five-year insurgency, the Afghan Taliban have evolved from a small group of madrasa students, mujahedeen fighters, and tribal Afghans into one of the most innovative and adaptive insurgencies in modern history. As a result, the U.S.-declared War on Terror in Afghanistan has persisted for eighteen years as the Afghan Taliban continue to threaten regional security.
After the 9/11 attacks, the United States has made many sacrifices to combat terrorism; this includes losing almost 7000 service members in the campaigns of the War on Terror. The United States has spent nearly $3 trillion on counterterrorism funding between fiscal years 2002 and 2017.
Technological advances have led to an increase in data available to commanders and their staffs. Sorting through collected data and identifying what is present that is relevant and what is relevant-but-not-present is necessary to identify and eliminate information gaps that hinder a commander's decision-making ability.
This report, released by the NRO in May 2019, has been professionally converted for accurate flowing-text e-book format reproduction. Between 1965 and 1969, quietly and without fanfare, 17 non-NASA individuals were astronaut-trained in order to meet the reconnaissance needs of the United States. They came from across the military services.
The malicious insider threat is one of the most nefarious of potential cyber security breaches. There have been egregious insider data thefts in the last 10 years within the government. The Unintentional Insider Threat (UIT)—the individual who is incompetent or careless and accidentally divulges sensitive information—is also a major concern.