774 resultados para military modernization, military operation, Emerging Threats, National Security, National Defense, Asymmetric War, Armed Conflict.
Resumo:
Mode of access: Internet.
Resumo:
National Highway Traffic Safety Administration, National Center for Statistics and Analysis, Washington, D.C.
Resumo:
Mode of access: Internet.
Resumo:
A new ed. of "Trifles from my portfolio," which "has been entirely rewritten, with some omissions and alterations, and much new matter."
Resumo:
Continues the numbering and the pagination of Interstate migration, hearing before the Select Committee to Investigate the Interstate Migraion of Destitute Citizens, which Committee was the predecessor of the Select Committee Investigating National Defense Migration.
Resumo:
Mode of access: Internet.
Resumo:
Peter Norbeck, chairman.
Resumo:
Chan Gurney, Chairman.
Resumo:
Mode of access: Internet.
Resumo:
Page [4] at front and p. [1] at end blank.
Resumo:
This edition contains legislation March 4, 1911-March 3, 1913; Supreme Court cases June 1, 1911-May 31, 1913; Opinions of attorney general March 4, 1911-March 3, 1913; Executive orders of the President March 4, 1898-March 3, 1913; List of officials January 1, 1913.
Resumo:
Kenneth McKellar, chairman.
Resumo:
Schuyler O. Bland, chairman.
Resumo:
The Internet poses a number of threats to the safety of young people. Using numerous examples, this article discusses a wide range of such threats, including: cyberstalking; the 'grooming' of potential victims of sexual abuse; a new 'wish list' scene (where teenagers encourage contact with potential abusers); the creation and distribution of child pornography; and the emergence of services that create child pornography to order. It is suggested that the latter has provided individuals with the ability to inflict sexual abuse on young people from a distance, an act the authors have termed virtual sex tourism. The final section of the article suggests that paedophiles and pornographers have been quick to adopt new technology as a means of concealing their activities. The article concludes by warning of the danger of overestimating or underestimating the threats described.