Academic literature on the topic 'United States. Office of Research and Development. National Defense Research Committee'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'United States. Office of Research and Development. National Defense Research Committee.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "United States. Office of Research and Development. National Defense Research Committee"

1

Holthaus, Kathryn, David Goldberg, Carolyn Connelly, et al. "Facilitating collaborative animal research: The development and implementation of a Master Reciprocal Institutional Agreement for Animal Care and Use." Journal of Clinical and Translational Science 4, no. 2 (2020): 96–101. http://dx.doi.org/10.1017/cts.2019.431.

Full text
Abstract:
AbstractEnsuring appropriate review, approval, and oversight of research involving animals becomes increasingly complex when researchers collaborate across multiple sites. In these situations, it is important that the division of responsibilities is clear and that all involved parties share a common understanding. The National Institutes of Health Office of Laboratory Animal Welfare and the United States Department of Agriculture Animal Plant Health Inspection Service require an Institutional Animal Care and Use Committee (IACUC) to review the care and use of animals in research, and both agree that it is acceptable for one IACUC to review the work taking place at multiple institutions. With this in mind, several Harvard-affiliated hospitals and academic centers developed the Master Reciprocal Institutional Agreement for Animal Care and Use (Master IACUC Agreement) to support collaboration, decrease administrative burden, increase efficiencies, reduce duplicative efforts, and ensure appropriate protections for animals used in research. Locally, the Master IACUC Agreement has fostered greater collaboration and exchange while ensuring appropriate review and oversight of research involving animals. As multisite animal protocols become more prevalent, this Agreement could provide a model for a distributed, national network of IACUC reliance.
APA, Harvard, Vancouver, ISO, and other styles
2

Burt, Lindsay, Dennis C. Shrieve, and Jonathan D. Tward. "Prostate patterns of care." Journal of Clinical Oncology 33, no. 7_suppl (2015): 117. http://dx.doi.org/10.1200/jco.2015.33.7_suppl.117.

Full text
Abstract:
117 Background: The aim of this study is to describe initial treatment of men diagnosed with prostate cancer in the United States (US) between 2004 and 2011. Methods: Subjects with adenocarcinoma of the prostate were identified using the National Cancer Institute’s (NCI) Surveillance, Epidemiology and End Results (SEER) Program between 2004 and 2011. Subjects were staged according the American Joint Committee on Cancer (AJCC) 7th edition criteria. The National Comprehensive Cancer Network (NCCN) risk group classifications were used to stratify subjects into low risk (LR) including very low risk, intermediate risk (IR), high risk (HR) and very high (VHR) groups. Surgical intervention was grouped into no surgery, prostatectomy or other which included cyroablative therapy, hyperthermia, laser ablation, TURP, etc. Descriptive statistics and analysis were performed using Microsoft Office 2013 Excel. Results: There were 306,694 PC subjects with sufficient data to be risk categorized. Overall, 35.0% of subjects had LR, 36.1% had IR, 22.5% had HR, 1.2% had VHR, 0.6% had node positive and 4.6% had metastatic disease. Table 1 reveals the surgical and radiation treatment distribution for each risk group. Between 2004 and 2011 the use of prostatectomy, no treatment and external beam RT (EBRT) increased and the use of brachy including brachy monotherapy and brachytherapy in combination with EBRT decreased. Age is a strong influence on treatment delivered. Conclusions: This patterns of care study shows the heterogeneity of therapy for PC stratified by risk group in a contemporary series. Trends in treatment may reflect the development of new technology and findings from randomized trials. [Table: see text]
APA, Harvard, Vancouver, ISO, and other styles
3

Thompson, Marian K. (Kay), Melissa V. Lapsa, Robert B. Shelton, and Kim R. Grubb. "Communications and Data Exchange Via The Black Sea and Caspian Sea Environmental Information Center (http://pims.ed.ornl.gov)." International Oil Spill Conference Proceedings 2003, no. 1 (2003): 873–76. http://dx.doi.org/10.7901/2169-3358-2003-1-873.

Full text
Abstract:
ABSTRACT A U.S. interagency committee (including representatives from the U.S. Departments of Energy, Defense, Commerce, and State, and others) was formed to deal with Black Sea and Caspian Sea environmental issues. Oil tanker traffic is expected to increase significantly on the Black and Caspian Seas in the coming years, and the United States decided to address this issue, with the Department of Energy's (DOE s) Office of Policy and International Affairs taking the lead. The goal is to facilitate cooperation among the countries of the region to develop contingency plans should a spill occur. This is being done through a series of workshops held in the Black Sea countries and Kazakhstan and through the establishment of a regional information and communications center. The activity has strong support from the oil industry, whose representatives participate in all of the workshops. The Black Sea and Caspian Sea Environmental Information Center web site (http://pims.ed.ornl.gov), created by Oak Ridge National Laboratory (ORNL) for DOE, facilitates information flow and dialog between the countries of the region. The web site is intended to provide a comprehensive source for information onoil spill cleanup, monitoring, and related commercial technologies;scientists requests for research partners;the laws, regulations, and standards of various countries relating to the environmental condition of the seas;publication of scientific papers, and on-line discussions of these issues; andlists of individuals and companies working on Black Sea and Caspian Sea environmental issues. The web site also provides a real-time chat capability where meetings are organized. Several meetings among regional officials and scientists have been conducted by this means. The web site is also host to a growing database of historical pollution testing data from research institutes in the region.
APA, Harvard, Vancouver, ISO, and other styles
4

Office, Editorial. "Medical researchers unite for study on cancer intervention." Advances in Modern Oncology Research 2, no. 4 (2016): 184. http://dx.doi.org/10.18282/amor.v2.i4.158.

Full text
Abstract:
<p><em>We introduce Drs. Antoine Snijders and Jian-Hua Mao, whose article is published in this issue of AMOR and discuss their views on cancer genetics, targeted therapy, and personalized medicine.</em></p><p><em><br /></em></p><p>Having worked together in numerous joint investigations that have yielded significant results, Dr. Snijders and Dr. Mao would most definitely agree that two heads are better than one. “Researchers these days need to have the ability to collaborate across many different disciplines,” said the duo in an exclusive interview with AMOR. Dr. Snijders and Dr. Mao, both with PhDs in cancer genetics and genomics, are currently based at the Biological Systems and Engineering Division of Lawrence Berkeley National Laboratory, California, which is a member of the national laboratory system supported by the U.S Department of Energy through its Office of Science. </p><p> </p><p>The Berkeley Lab is well known for producing excellent scholars, as thirteen Nobel Prize winners are affiliated with the Lab and seventy of its scientists are members of the National Academy of Sciences (NAS), one of the highest honors for a scientist in the United States. Dr. Snijders, a Dutch who has conducted his research at Berkeley Lab for the past eight years, did his Masters in Science (Medical Biology) at the Vrije Universiteit Amsterdam, Netherlands – an institute with a strong focus on scientific research and is home to five Spinoza Prize (a.k.a. the “Dutch Nobel”) winners.</p><p> </p><p>Dr. Snijders’s PhD (<em>cum laude</em>) in cancer and molecular biology was awarded by University Utrecht in Netherlands, but his research work was carried out at the University of California San Francisco. Subsequently, he continued his postdoctoral research in molecular cytogenetics at the same institution. A prolific author of 114 publications (with 3,851 citations) according to ResearchGate, Dr. Snijders – who also volunteers with California’s Contra Costa County Search and Rescue team for missing persons – has interests in the areas of molecular biology, cell biology, and cancer research.</p><p> </p><p>Some of the awards received by Dr. Snijders include the prestigious President’s Award for Excellence and the Student Travel Award at the 2014’s XXII International Congress of the International Society for Analytical Cytology in Montpellier, France. He was also the co-recipient of the AACR Team Science Award for the conception, technical implementation, dissemination, and pioneering applications of an array comparative genomic hybridization technique from the American Association of Cancer Research in 2008.</p><p> </p><p>Meanwhile, Dr. Mao studied applied mathematics at Southeast University, Nanjing, China, and pursued his masters in biostatistics and cancer epidemiology at Beijing Medical University (now Peking University Health Science Center). In 1988, Dr. Mao received the Outstanding Postgraduate Award from Beijing Medical University and two years later, was awarded an Outstanding Lecturer Award from the same university. He then pursued his PhD in cancer genetics at the Department of Radiation Oncology, University of Glasgow, UK. During this period, Dr. Mao was awarded the Oversea Research Student Awards from the Committee of Vice-Chancellor and Principals of the Universities of the United Kingdom, along with the Glasgow University Travel fellowship.</p><p> </p><p>Dr. Snijders and Dr. Mao joined Berkeley Lab in 2008 as resident scientist and genetic staff scientist, respectively, where their work focuses on using the multi-omics approach to identify critical genes as potential therapeutic targets and prognostic biomarkers. “At the same time, we investigate underlying biological mechanisms and functions using different model systems, including genetically engineered mouse models,” they told AMOR.</p><p> </p><p>“Mouse models offer many advantages for the study of the genetic basis of complex traits, including radiation-induced cancers, because of our ability to control both the genetic and environmental components of risk. The goal is the understanding of all stages of multi-step carcinogenesis in the mouse, in particular the relationships between germ line predisposition and somatic genetic changes in tumors.” explained Dr. Mao in a news feature released by Berkeley Lab. “The identification of human homologues of these predisposition genes and the</p><p> </p><p>discovery of their roles in carcinogenesis will ultimately be important for the development of methods for the prediction of risk, diagnosis, prevention, and therapy for human cancers,” he further added. </p><p> </p><p class="Body1" align="center"><strong><span class="Heading1Char">“Although targeted therapy has given hope to patients, drug resistance usually takes place within short time. We need to figure out a way to combine multiple targeted therapies to treat patient s and somehow circumvent drug resistance to cure cancer.”</span></strong></p><p class="Body1" align="center"><strong><span class="Heading1Char"><br /></span></strong></p><p>Both scientists confessed to having a deep interest in the biology of cancer, which motivates them to focus their efforts in developing therapeutics as cancer intervention. However, they are sometimes subdued by numerous challenges in their research works, namely the heterogeneity and complexity of the tumors, which make it difficult to successfully treat patients. In addition, they highlighted a common challenge in their field, which also happens to be one of the main concerns for a majority of cancer researchers all over the world – lack of funding for research. “It remains challenging to obtain sufficient funds to do the research we believe is important,” they said.</p><p> </p><p>When asked for their opinion of targeted therapy, which is a growing part of many cancer treatment regimens, both scientists claimed, “Although targeted therapy has given hope to patients, drug resistance usually takes place within a short time. We need to figure out a way to combine multiple targeted therapies to treat patients and somehow circumvent drug resistance to cure cancer.” For researchers who are studying the biology of cancer, Dr. Snijders and Dr. Mao believe that they should ideally take into account individual genetic variation and environmental factors to study human’s susceptibility to complex diseases. This would in turn allow the researchers to execute personalized medicine in a clinical setting. “In the future, we envision an increase in disease treatment and prevention that take into account the individual genetic variation,” they concluded. </p><p class="Body1" align="center"><strong><span class="Heading1Char"><br /></span></strong></p><hr />Drs. Antoine Snijders and Jian-Hua Mao publish their work entitled “Multi-omics approach to infer cancer therapeutic targets on chromosome 20q across tumor types” in this issue of AMOR (page 215–223).
APA, Harvard, Vancouver, ISO, and other styles
5

Page, Lawrence M., and Michael R. Jeffords. "Our Living Heritage: the Biological Resources of Illinois." Illinois Natural History Survey Bulletin 34, no. 1-6 (1991): 357–477. http://dx.doi.org/10.21900/j.inhs.v34.134.

Full text
Abstract:
We live in a world of near continuous monitoring. In our automobiles we monitor the status of fuel, oil pressure, temperature, and seat belts through gauges, lights, and electronic voices. The consumption of electricity and fuel in our homes is monitored as is the chlorine in our drinking water and the alcohol in our beer. Manufacturers retain quality assurance inspectors and issue warrantees and guarantees to convince us that all is well. We monitor our schools and measure our own progress through grades and proficiency scores. It seemed appropriate, therefore, that the Illinois Natural History Survey should take a measure of the living natural resources of Illinois by bringing together a knowledgeable group of persons to summarize the state of the State. In order to share this information and to provide an opportunity for discussion, a symposium, "Our Living Heritage: The Biological Resources of Illinois," was sponsored by the Illinois Department of Energy and Natural Resources and organized by the Survey. The event, timed to coincide with Earth Day 1990 celebrations, was held on April 2.^ and 24 on the campus of the University of Illinois at Urbana-Champaign. It was attended by nearly 250 professional scientists from some 50 agencies and institutions along with a number of interested and dedicated citizens. To share the results of that symposium with an even larger audience, we have issued this publication of its proceedings. To address the salient features of the living resources of Illinois in an ordered fashion, the symposium was presented in five sessions: forests, prairies and barrens, wetlands, streams and caves, and agro-urban ecology. When we consider that only (.).59t of Illinois remains in undisturbed natural areas, that Illinois ranks 46th among states in publicly owned open space per person, that forest acreage has decreased by 73% in the past century and tallgrass prairie by over 99%, that 85% of our wetlands have been lost, that soil erosion proceeds at the rate of 200 million tons per year, and that approximately 30,000 tons of herbicide and 3,500 tons of insecticides are used annually on agricultural crops in Illinois, we can scarcely imagine the tone of the symposium to have been anything but pessimistic. In part, there was discouragement, but it was tempered by positive developments, including the designation of the Middle Fork of the Vermilion River as a National Wild and Scenic River, the acquisition of the Cache River Basin, the initiation of a study to identify high-quality Illinois streams based on biodiversity, and the ever quickening actions of the Nature Preserves Commission. Preservation/conservation has been in conflict with consumption/development since the days of Theodore Roosevelt. At times one side seems to prevail over the other, but the balance has been clearly on the side of consumption. Special interest groups have to a considerable extent managed to give the word environmentalist a pejorative cast and the word development a positive ring. During the past decade, the executive branch of the federal government has determinedly downplayed environmental concerns, and that stance has been translated into inertia in a number of federal agencies with responsibility for natural resources. The focus of the United States Environmental Protection Agency, for example, has until very recently ignored the living components of the environment. At the same time, public sensitivity to environmental concerns has dramatically increased, primarily through public service television and other media-generated presentations on tropical deforestation, extinction of species, depletion of the ozone layer, agro-chemical contamination of groundwater, and the effects of acid rain. Some of this concern is now being transformed into political action. Polls suggest that the public understanding of environmental matters is quite high, and some beheve that it exceeds the perceptions of elected officials. A Green Party has emerged in this country only very recently, but Greens are a part of both major political parties and the trend in federal legislation may soon begin to sway in favor of conservation/preservation and away from consumption/development. The National Institutes for the Environment may well become a reality within the next several years. Within this tentatively encouraging national picture, the symposium was timely indeed. One symposium event of special interest cannot be documented in these proceedings — the "citizens respond" program of Monday evening, April 23—and I would like to note it here. Michael Jeffords and Susan Post of the Survey opened that session with a mulitmedia presentation on the biodiversity of Illinois. Their slides of representative plants and animals and habitats of the natural divisions of Illinois brought home to us the beauty and fragility that can yet be discovered in the landscape of our state. A panel presentation by five environmental activists followed: Clark Bullard, Office of Energy Research at the University of Illinois at Urbana-Champaign; Max Hutchison, Natural Land Institute of The Nature Conservancy; Lawrence Page of the Illinois Natural History Survey; Donna Prevedell, farmwife and contributing editor to the Progressive Farmer, and Michael Reuter, Volunteer Stewardship Network of The Nature Conservancy. They spoke briefly but openly on preservation activities in which they had been closely involved. The discussion was then turned over to the audience, who asked questions and shared their experiences—successes and failures—with preservation efforts. I urge you to read on in order to understand the status of the biological resources of Illinois and to appreciate how much remains to be accomplished to secure their future—and ours. I would be remiss, however, if I did not conclude by acknowledging the committee of Survey staff who planned and conducted the symposium: Lawrence Page, Michael Jeffords, Joyce Hofmann, Susan Post, Louis Iverson, and Audrey Hodgins. Their efforts included developing the program, arranging for speakers and facilities, producing and mailing promotional materials, and welcomine the audience. Without their enthusiasm and hard work, the symposium v^ould not have materialized and our understanding of the biological resources of Illinois would be much diminished. Lorin I. Nevling. ChiefIllinois Natural History Suney
APA, Harvard, Vancouver, ISO, and other styles
6

"INTERNATIONAL UNIVERSAL ORGANIZATIONAL AND LEGAL FRAMEWORK FOR DISARMAMENT AND ARMS CONTROL." Journal of V. N. Karazin Kharkiv National University, Series "Law", no. 27 (2019). http://dx.doi.org/10.26565/2075-1834-2019-27-12.

Full text
Abstract:
The article analyzes the legal and institutional framework for the United Nations in the field of disarmament and arms control. The competence of the main institutional organs of the United Nations – the General Assembly, the Security Council and the specially created structures that deal with disarmament and arms control issues – are identified, in particular: the Committee on Disarmament and International Security (First Committee), the Disarmament Commission, the Disarmament Advisory Council , Disarmament Office, 1540 Committee for the Prevention of the Proliferation of Nuclear, Chemical, or Biological Weapons and their means of delivery. The importance of international forums is highlighted, in particular the Conference on Disarmament, which focuses on the following aspects: the cessation of the nuclear arms race and nuclear disarmament; the prevention of nuclear war, including all related issues; preventing the arms race in space and so on. The functions of the United Nations Institute for Disarmament Research responsible for carrying out independent research on security, disarmament and development at the national, regional and global levels are considered as interrelated aspects of human security in general. The attention is paid to the UN programs, which are a platform that combines the various instruments and approaches of the Organization in the field of comprehensive security, in particular Joint UNDP-DPA Programmes “Strengthening National Capacity for Conflict Prevention and Peacebuilding” and “Coordinating Action on Small Arms” are disclosed. Taking into account the fact that great importance for the achievement of progress in the field of disarmament and the strengthening of the stability and security of its member states plays the role of the United Nations at the regional level, the agreements concluded by the Organization in this area and the regional centers established under its auspices and the ways of improving their work.
APA, Harvard, Vancouver, ISO, and other styles
7

Burns, Alex. "Doubting the Global War on Terror." M/C Journal 14, no. 1 (2011). http://dx.doi.org/10.5204/mcj.338.

Full text
Abstract:
Photograph by Gonzalo Echeverria (2010)Declaring War Soon after Al Qaeda’s terrorist attacks on 11 September 2001, the Bush Administration described its new grand strategy: the “Global War on Terror”. This underpinned the subsequent counter-insurgency in Afghanistan and the United States invasion of Iraq in March 2003. Media pundits quickly applied the Global War on Terror label to the Madrid, Bali and London bombings, to convey how Al Qaeda’s terrorism had gone transnational. Meanwhile, international relations scholars debated the extent to which September 11 had changed the international system (Brenner; Mann 303). American intellectuals adopted several variations of the Global War on Terror in what initially felt like a transitional period of US foreign policy (Burns). Walter Laqueur suggested Al Qaeda was engaged in a “cosmological” and perpetual war. Paul Berman likened Al Qaeda and militant Islam to the past ideological battles against communism and fascism (Heilbrunn 248). In a widely cited article, neoconservative thinker Norman Podhoretz suggested the United States faced “World War IV”, which had three interlocking drivers: Al Qaeda and trans-national terrorism; political Islam as the West’s existential enemy; and nuclear proliferation to ‘rogue’ countries and non-state actors (Friedman 3). Podhoretz’s tone reflected a revival of his earlier Cold War politics and critique of the New Left (Friedman 148-149; Halper and Clarke 56; Heilbrunn 210). These stances attracted widespread support. For instance, the United States Marine Corp recalibrated its mission to fight a long war against “World War IV-like” enemies. Yet these stances left the United States unprepared as the combat situations in Afghanistan and Iraq worsened (Ricks; Ferguson; Filkins). Neoconservative ideals for Iraq “regime change” to transform the Middle East failed to deal with other security problems such as Pakistan’s Musharraf regime (Dorrien 110; Halper and Clarke 210-211; Friedman 121, 223; Heilbrunn 252). The Manichean and open-ended framing became a self-fulfilling prophecy for insurgents, jihadists, and militias. The Bush Administration quietly abandoned the Global War on Terror in July 2005. Widespread support had given way to policymaker doubt. Why did so many intellectuals and strategists embrace the Global War on Terror as the best possible “grand strategy” perspective of a post-September 11 world? Why was there so little doubt of this worldview? This is a debate with roots as old as the Sceptics versus the Sophists. Explanations usually focus on the Bush Administration’s “Vulcans” war cabinet: Vice President Dick Cheney, Secretary of Defense Donald Rumsfield, and National Security Advisor Condoleezza Rice, who later became Secretary of State (Mann xv-xvi). The “Vulcans” were named after the Roman god Vulcan because Rice’s hometown Birmingham, Alabama, had “a mammoth fifty-six foot statue . . . [in] homage to the city’s steel industry” (Mann x) and the name stuck. Alternatively, explanations focus on how neoconservative thinkers shaped the intellectual climate after September 11, in a receptive media climate. Biographers suggest that “neoconservatism had become an echo chamber” (Heilbrunn 242) with its own media outlets, pundits, and think-tanks such as the American Enterprise Institute and Project for a New America. Neoconservatism briefly flourished in Washington DC until Iraq’s sectarian violence discredited the “Vulcans” and neoconservative strategists like Paul Wolfowitz (Friedman; Ferguson). The neoconservatives' combination of September 11’s aftermath with strongly argued historical analogies was initially convincing. They conferred with scholars such as Bernard Lewis, Samuel P. Huntington and Victor Davis Hanson to construct classicist historical narratives and to explain cultural differences. However, the history of the decade after September 11 also contains mis-steps and mistakes which make it a series of contingent decisions (Ferguson; Bergen). One way to analyse these contingent decisions is to pose “what if?” counterfactuals, or feasible alternatives to historical events (Lebow). For instance, what if September 11 had been a chemical and biological weapons attack? (Mann 317). Appendix 1 includes a range of alternative possibilities and “minimal rewrites” or slight variations on the historical events which occurred. Collectively, these counterfactuals suggest the role of agency, chance, luck, and the juxtaposition of better and worse outcomes. They pose challenges to the classicist interpretation adopted soon after September 11 to justify “World War IV” (Podhoretz). A ‘Two-Track’ Process for ‘World War IV’ After the September 11 attacks, I think an overlapping two-track process occurred with the “Vulcans” cabinet, neoconservative advisers, and two “echo chambers”: neoconservative think-tanks and the post-September 11 media. Crucially, Bush’s “Vulcans” war cabinet succeeded in gaining civilian control of the United States war decision process. Although successful in initiating the 2003 Iraq War this civilian control created a deeper crisis in US civil-military relations (Stevenson; Morgan). The “Vulcans” relied on “politicised” intelligence such as a United Kingdom intelligence report on Iraq’s weapons development program. The report enabled “a climate of undifferentiated fear to arise” because its public version did not distinguish between chemical, biological, radiological or nuclear weapons (Halper and Clarke, 210). The cautious 2003 National Intelligence Estimates (NIE) report on Iraq was only released in a strongly edited form. For instance, the US Department of Energy had expressed doubts about claims that Iraq had approached Niger for uranium, and was using aluminium tubes for biological and chemical weapons development. Meanwhile, the post-September 11 media had become a second “echo chamber” (Halper and Clarke 194-196) which amplified neoconservative arguments. Berman, Laqueur, Podhoretz and others who framed the intellectual climate were “risk entrepreneurs” (Mueller 41-43) that supported the “World War IV” vision. The media also engaged in aggressive “flak” campaigns (Herman and Chomsky 26-28; Mueller 39-42) designed to limit debate and to stress foreign policy stances and themes which supported the Bush Administration. When former Central Intelligence Agency director James Woolsey’s claimed that Al Qaeda had close connections to Iraqi intelligence, this was promoted in several books, including Michael Ledeen’s War Against The Terror Masters, Stephen Hayes’ The Connection, and Laurie Mylroie’s Bush v. The Beltway; and in partisan media such as Fox News, NewsMax, and The Weekly Standard who each attacked the US State Department and the CIA (Dorrien 183; Hayes; Ledeen; Mylroie; Heilbrunn 237, 243-244; Mann 310). This was the media “echo chamber” at work. The group Accuracy in Media also campaigned successfully to ensure that US cable providers did not give Al Jazeera English access to US audiences (Barker). Cosmopolitan ideals seemed incompatible with what the “flak” groups desired. The two-track process converged on two now infamous speeches. US President Bush’s State of the Union Address on 29 January 2002, and US Secretary of State Colin Powell’s presentation to the United Nations on 5 February 2003. Bush’s speech included a line from neoconservative David Frumm about North Korea, Iraq and Iran as an “Axis of Evil” (Dorrien 158; Halper and Clarke 139-140; Mann 242, 317-321). Powell’s presentation to the United Nations included now-debunked threat assessments. In fact, Powell had altered the speech’s original draft by I. Lewis “Scooter” Libby, who was Cheney’s chief of staff (Dorrien 183-184). Powell claimed that Iraq had mobile biological weapons facilities, linked to Abu Musab al-Zarqawi. However, the International Atomic Energy Agency’s (IAEA) Mohamed El-Baradei, the Defense Intelligence Agency, the State Department, and the Institute for Science and International Security all strongly doubted this claim, as did international observers (Dorrien 184; Halper and Clarke 212-213; Mann 353-354). Yet this information was suppressed: attacked by “flak” or given little visible media coverage. Powell’s agenda included trying to rebuild an international coalition and to head off weather changes that would affect military operations in the Middle East (Mann 351). Both speeches used politicised variants of “weapons of mass destruction”, taken from the counterterrorism literature (Stern; Laqueur). Bush’s speech created an inflated geopolitical threat whilst Powell relied on flawed intelligence and scientific visuals to communicate a non-existent threat (Vogel). However, they had the intended effect on decision makers. US Under-Secretary of Defense, the neoconservative Paul Wolfowitz, later revealed to Vanity Fair that “weapons of mass destruction” was selected as an issue that all potential stakeholders could agree on (Wilkie 69). Perhaps the only remaining outlet was satire: Armando Iannucci’s 2009 film In The Loop parodied the diplomatic politics surrounding Powell’s speech and the civil-military tensions on the Iraq War’s eve. In the short term the two track process worked in heading off doubt. The “Vulcans” blocked important information on pre-war Iraq intelligence from reaching the media and the general public (Prados). Alternatively, they ignored area specialists and other experts, such as when Coalition Provisional Authority’s L. Paul Bremer ignored the US State Department’s fifteen volume ‘Future of Iraq’ project (Ferguson). Public “flak” and “risk entrepreneurs” mobilised a range of motivations from grief and revenge to historical memory and identity politics. This combination of private and public processes meant that although doubts were expressed, they could be contained through the dual echo chambers of neoconservative policymaking and the post-September 11 media. These factors enabled the “Vulcans” to proceed with their “regime change” plans despite strong public opposition from anti-war protestors. Expressing DoubtsMany experts and institutions expressed doubt about specific claims the Bush Administration made to support the 2003 Iraq War. This doubt came from three different and sometimes overlapping groups. Subject matter experts such as the IAEA’s Mohamed El-Baradei and weapons development scientists countered the UK intelligence report and Powell’s UN speech. However, they did not get the media coverage warranted due to “flak” and “echo chamber” dynamics. Others could challenge misleading historical analogies between insurgent Iraq and Nazi Germany, and yet not change the broader outcomes (Benjamin). Independent journalists one group who gained new information during the 1990-91 Gulf War: some entered Iraq from Kuwait and documented a more humanitarian side of the war to journalists embedded with US military units (Uyarra). Finally, there were dissenters from bureaucratic and institutional processes. In some cases, all three overlapped. In their separate analyses of the post-September 11 debate on intelligence “failure”, Zegart and Jervis point to a range of analytic misperceptions and institutional problems. However, the intelligence community is separated from policymakers such as the “Vulcans”. Compartmentalisation due to the “need to know” principle also means that doubting analysts can be blocked from releasing information. Andrew Wilkie discovered this when he resigned from Australia’s Office for National Assessments (ONA) as a transnational issues analyst. Wilkie questioned the pre-war assessments in Powell’s United Nations speech that were used to justify the 2003 Iraq War. Wilkie was then attacked publicly by Australian Prime Minister John Howard. This overshadowed a more important fact: both Howard and Wilkie knew that due to Australian legislation, Wilkie could not publicly comment on ONA intelligence, despite the invitation to do so. This barrier also prevented other intelligence analysts from responding to the “Vulcans”, and to “flak” and “echo chamber” dynamics in the media and neoconservative think-tanks. Many analysts knew that the excerpts released from the 2003 NIE on Iraq was highly edited (Prados). For example, Australian agencies such as the ONA, the Department of Foreign Affairs and Trade, and the Department of Defence knew this (Wilkie 98). However, analysts are trained not to interfere with policymakers, even when there are significant civil-military irregularities. Military officials who spoke out about pre-war planning against the “Vulcans” and their neoconservative supporters were silenced (Ricks; Ferguson). Greenlight Capital’s hedge fund manager David Einhorn illustrates in a different context what might happen if analysts did comment. Einhorn gave a speech to the Ira Sohn Conference on 15 May 2002 debunking the management of Allied Capital. Einhorn’s “short-selling” led to retaliation from Allied Capital, a Securities and Exchange Commission investigation, and growing evidence of potential fraud. If analysts adopted Einhorn’s tactics—combining rigorous analysis with targeted, public denunciation that is widely reported—then this may have short-circuited the “flak” and “echo chamber” effects prior to the 2003 Iraq War. The intelligence community usually tries to pre-empt such outcomes via contestation exercises and similar processes. This was the goal of the 2003 NIE on Iraq, despite the fact that the US Department of Energy which had the expertise was overruled by other agencies who expressed opinions not necessarily based on rigorous scientific and technical analysis (Prados; Vogel). In counterterrorism circles, similar disinformation arose about Aum Shinrikyo’s biological weapons research after its sarin gas attack on Tokyo’s subway system on 20 March 1995 (Leitenberg). Disinformation also arose regarding nuclear weapons proliferation to non-state actors in the 1990s (Stern). Interestingly, several of the “Vulcans” and neoconservatives had been involved in an earlier controversial contestation exercise: Team B in 1976. The Central Intelligence Agency (CIA) assembled three Team B groups in order to evaluate and forecast Soviet military capabilities. One group headed by historian Richard Pipes gave highly “alarmist” forecasts and then attacked a CIA NIE about the Soviets (Dorrien 50-56; Mueller 81). The neoconservatives adopted these same tactics to reframe the 2003 NIE from its position of caution, expressed by several intelligence agencies and experts, to belief that Iraq possessed a current, covert program to develop weapons of mass destruction (Prados). Alternatively, information may be leaked to the media to express doubt. “Non-attributable” background interviews to establishment journalists like Seymour Hersh and Bob Woodward achieved this. Wikileaks publisher Julian Assange has recently achieved notoriety due to US diplomatic cables from the SIPRNet network released from 28 November 2010 onwards. Supporters have favourably compared Assange to Daniel Ellsberg, the RAND researcher who leaked the Pentagon Papers (Ellsberg; Ehrlich and Goldsmith). Whilst Elsberg succeeded because a network of US national papers continued to print excerpts from the Pentagon Papers despite lawsuit threats, Assange relied in part on favourable coverage from the UK’s Guardian newspaper. However, suspected sources such as US Army soldier Bradley Manning are not protected whilst media outlets are relatively free to publish their scoops (Walt, ‘Woodward’). Assange’s publication of SIPRNet’s diplomatic cables will also likely mean greater restrictions on diplomatic and military intelligence (Walt, ‘Don’t Write’). Beyond ‘Doubt’ Iraq’s worsening security discredited many of the factors that had given the neoconservatives credibility. The post-September 11 media became increasingly more critical of the US military in Iraq (Ferguson) and cautious about the “echo chamber” of think-tanks and media outlets. Internet sites for Al Jazeera English, Al-Arabiya and other networks have enabled people to bypass “flak” and directly access these different viewpoints. Most damagingly, the non-discovery of Iraq’s weapons of mass destruction discredited both the 2003 NIE on Iraq and Colin Powell’s United Nations presentation (Wilkie 104). Likewise, “risk entrepreneurs” who foresaw “World War IV” in 2002 and 2003 have now distanced themselves from these apocalyptic forecasts due to a series of mis-steps and mistakes by the Bush Administration and Al Qaeda’s over-calculation (Bergen). The emergence of sites such as Wikileaks, and networks like Al Jazeera English and Al-Arabiya, are a response to the politics of the past decade. They attempt to short-circuit past “echo chambers” through providing access to different sources and leaked data. The Global War on Terror framed the Bush Administration’s response to September 11 as a war (Kirk; Mueller 59). Whilst this prematurely closed off other possibilities, it has also unleashed a series of dynamics which have undermined the neoconservative agenda. The “classicist” history and historical analogies constructed to justify the “World War IV” scenario are just one of several potential frameworks. “Flak” organisations and media “echo chambers” are now challenged by well-financed and strategic alternatives such as Al Jazeera English and Al-Arabiya. Doubt is one defence against “risk entrepreneurs” who seek to promote a particular idea: doubt guards against uncritical adoption. Perhaps the enduring lesson of the post-September 11 debates, though, is that doubt alone is not enough. What is needed are individuals and institutions that understand the strategies which the neoconservatives and others have used, and who also have the soft power skills during crises to influence critical decision-makers to choose alternatives. Appendix 1: Counterfactuals Richard Ned Lebow uses “what if?” counterfactuals to examine alternative possibilities and “minimal rewrites” or slight variations on the historical events that occurred. The following counterfactuals suggest that the Bush Administration’s Global War on Terror could have evolved very differently . . . or not occurred at all. Fact: The 2003 Iraq War and 2001 Afghanistan counterinsurgency shaped the Bush Administration’s post-September 11 grand strategy. Counterfactual #1: Al Gore decisively wins the 2000 U.S. election. Bush v. Gore never occurs. After the September 11 attacks, Gore focuses on international alliance-building and gains widespread diplomatic support rather than a neoconservative agenda. He authorises Special Operations Forces in Afghanistan and works closely with the Musharraf regime in Pakistan to target Al Qaeda’s muhajideen. He ‘contains’ Saddam Hussein’s Iraq through measurement and signature, technical intelligence, and more stringent monitoring by the International Atomic Energy Agency. Minimal Rewrite: United 93 crashes in Washington DC, killing senior members of the Gore Administration. Fact: U.S. Special Operations Forces failed to kill Osama bin Laden in late November and early December 2001 at Tora Bora. Counterfactual #2: U.S. Special Operations Forces kill Osama bin Laden in early December 2001 during skirmishes at Tora Bora. Ayman al-Zawahiri is critically wounded, captured, and imprisoned. The rest of Al Qaeda is scattered. Minimal Rewrite: Osama bin Laden’s death turns him into a self-mythologised hero for decades. Fact: The UK Blair Government supplied a 50-page intelligence dossier on Iraq’s weapons development program which the Bush Administration used to support its pre-war planning. Counterfactual #3: Rogue intelligence analysts debunk the UK Blair Government’s claims through a series of ‘targeted’ leaks to establishment news sources. Minimal Rewrite: The 50-page intelligence dossier is later discovered to be correct about Iraq’s weapons development program. Fact: The Bush Administration used the 2003 National Intelligence Estimate to “build its case” for “regime change” in Saddam Hussein’s Iraq. Counterfactual #4: A joint investigation by The New York Times and The Washington Post rebuts U.S. Secretary of State Colin Powell’s speech to the United National Security Council, delivered on 5 February 2003. Minimal Rewrite: The Central Intelligence Agency’s whitepaper “Iraq’s Weapons of Mass Destruction Programs” (October 2002) more accurately reflects the 2003 NIE’s cautious assessments. Fact: The Bush Administration relied on Ahmed Chalabi for its postwar estimates about Iraq’s reconstruction. Counterfactual #5: The Bush Administration ignores Chalabi’s advice and relies instead on the U.S. State Department’s 15 volume report “The Future of Iraq”. Minimal Rewrite: The Coalition Provisional Authority appoints Ahmed Chalabi to head an interim Iraqi government. Fact: L. Paul Bremer signed orders to disband Iraq’s Army and to De-Ba’athify Iraq’s new government. Counterfactual #6: Bremer keeps Iraq’s Army intact and uses it to impose security in Baghdad to prevent looting and to thwart insurgents. Rather than a De-Ba’athification policy, Bremer uses former Baath Party members to gather situational intelligence. Minimal Rewrite: Iraq’s Army refuses to disband and the De-Ba’athification policy uncovers several conspiracies to undermine the Coalition Provisional Authority. AcknowledgmentsThanks to Stephen McGrail for advice on science and technology analysis.References Barker, Greg. “War of Ideas”. PBS Frontline. Boston, MA: 2007. ‹http://www.pbs.org/frontlineworld/stories/newswar/video1.html› Benjamin, Daniel. “Condi’s Phony History.” Slate 29 Aug. 2003. ‹http://www.slate.com/id/2087768/pagenum/all/›. Bergen, Peter L. The Longest War: The Enduring Conflict between America and Al Qaeda. New York: The Free Press, 2011. Berman, Paul. Terror and Liberalism. W.W. Norton & Company: New York, 2003. Brenner, William J. “In Search of Monsters: Realism and Progress in International Relations Theory after September 11.” Security Studies 15.3 (2006): 496-528. Burns, Alex. “The Worldflash of a Coming Future.” M/C Journal 6.2 (April 2003). ‹http://journal.media-culture.org.au/0304/08-worldflash.php›. Dorrien, Gary. Imperial Designs: Neoconservatism and the New Pax Americana. New York: Routledge, 2004. Ehrlich, Judith, and Goldsmith, Rick. The Most Dangerous Man in America: Daniel Ellsberg and the Pentagon Papers. Berkley CA: Kovno Communications, 2009. Einhorn, David. Fooling Some of the People All of the Time: A Long Short (and Now Complete) Story. Hoboken NJ: John Wiley & Sons, 2010. Ellison, Sarah. “The Man Who Spilled The Secrets.” Vanity Fair (Feb. 2011). ‹http://www.vanityfair.com/politics/features/2011/02/the-guardian-201102›. Ellsberg, Daniel. Secrets: A Memoir of Vietnam and the Pentagon Papers. New York: Viking, 2002. Ferguson, Charles. No End in Sight, New York: Representational Pictures, 2007. Filkins, Dexter. The Forever War. New York: Vintage Books, 2008. Friedman, Murray. The Neoconservative Revolution: Jewish Intellectuals and the Shaping of Public Policy. New York: Cambridge UP, 2005. Halper, Stefan, and Jonathan Clarke. America Alone: The Neo-Conservatives and the Global Order. New York: Cambridge UP, 2004. Hayes, Stephen F. The Connection: How Al Qaeda’s Collaboration with Saddam Hussein Has Endangered America. New York: HarperCollins, 2004. Heilbrunn, Jacob. They Knew They Were Right: The Rise of the Neocons. New York: Doubleday, 2008. Herman, Edward S., and Noam Chomsky. Manufacturing Consent: The Political Economy of the Mass Media. Rev. ed. New York: Pantheon Books, 2002. Iannucci, Armando. In The Loop. London: BBC Films, 2009. Jervis, Robert. Why Intelligence Fails: Lessons from the Iranian Revolution and the Iraq War. Ithaca NY: Cornell UP, 2010. Kirk, Michael. “The War behind Closed Doors.” PBS Frontline. Boston, MA: 2003. ‹http://www.pbs.org/wgbh/pages/frontline/shows/iraq/›. Laqueur, Walter. No End to War: Terrorism in the Twenty-First Century. New York: Continuum, 2003. Lebow, Richard Ned. Forbidden Fruit: Counterfactuals and International Relations. Princeton NJ: Princeton UP, 2010. Ledeen, Michael. The War against The Terror Masters. New York: St. Martin’s Griffin, 2003. Leitenberg, Milton. “Aum Shinrikyo's Efforts to Produce Biological Weapons: A Case Study in the Serial Propagation of Misinformation.” Terrorism and Political Violence 11.4 (1999): 149-158. Mann, James. Rise of the Vulcans: The History of Bush’s War Cabinet. New York: Viking Penguin, 2004. Morgan, Matthew J. The American Military after 9/11: Society, State, and Empire. New York: Palgrave Macmillan, 2008. Mueller, John. Overblown: How Politicians and the Terrorism Industry Inflate National Security Threats, and Why We Believe Them. New York: The Free Press, 2009. Mylroie, Laurie. Bush v The Beltway: The Inside Battle over War in Iraq. New York: Regan Books, 2003. Nutt, Paul C. Why Decisions Fail. San Francisco: Berrett-Koelher, 2002. Podhoretz, Norman. “How to Win World War IV”. Commentary 113.2 (2002): 19-29. Prados, John. Hoodwinked: The Documents That Reveal How Bush Sold Us a War. New York: The New Press, 2004. Ricks, Thomas. Fiasco: The American Military Adventure in Iraq. New York: The Penguin Press, 2006. Stern, Jessica. The Ultimate Terrorists. Boston, MA: Harvard UP, 2001. Stevenson, Charles A. Warriors and Politicians: US Civil-Military Relations under Stress. New York: Routledge, 2006. Walt, Stephen M. “Should Bob Woodward Be Arrested?” Foreign Policy 10 Dec. 2010. ‹http://walt.foreignpolicy.com/posts/2010/12/10/more_wikileaks_double_standards›. Walt, Stephen M. “‘Don’t Write If You Can Talk...’: The Latest from WikiLeaks.” Foreign Policy 29 Nov. 2010. ‹http://walt.foreignpolicy.com/posts/2010/11/29/dont_write_if_you_can_talk_the_latest_from_wikileaks›. Wilkie, Andrew. Axis of Deceit. Melbourne: Black Ink Books, 2003. Uyarra, Esteban Manzanares. “War Feels like War”. London: BBC, 2003. Vogel, Kathleen M. “Iraqi Winnebagos™ of Death: Imagined and Realized Futures of US Bioweapons Threat Assessments.” Science and Public Policy 35.8 (2008): 561–573. Zegart, Amy. Spying Blind: The CIA, the FBI and the Origins of 9/11. Princeton NJ: Princeton UP, 2007.
APA, Harvard, Vancouver, ISO, and other styles
8

Losh, Elizabeth. "Artificial Intelligence." M/C Journal 10, no. 5 (2007). http://dx.doi.org/10.5204/mcj.2710.

Full text
Abstract:
On the morning of Thursday, 4 May 2006, the United States House Permanent Select Committee on Intelligence held an open hearing entitled “Terrorist Use of the Internet.” The Intelligence committee meeting was scheduled to take place in Room 1302 of the Longworth Office Building, a Depression-era structure with a neoclassical façade. Because of a dysfunctional elevator, some of the congressional representatives were late to the meeting. During the testimony about the newest political applications for cutting-edge digital technology, the microphones periodically malfunctioned, and witnesses complained of “technical problems” several times. By the end of the day it seemed that what was to be remembered about the hearing was the shocking revelation that terrorists were using videogames to recruit young jihadists. The Associated Press wrote a short, restrained article about the hearing that only mentioned “computer games and recruitment videos” in passing. Eager to have their version of the news item picked up, Reuters made videogames the focus of their coverage with a headline that announced, “Islamists Using US Videogames in Youth Appeal.” Like a game of telephone, as the Reuters videogame story was quickly re-run by several Internet news services, each iteration of the title seemed less true to the exact language of the original. One Internet news service changed the headline to “Islamic militants recruit using U.S. video games.” Fox News re-titled the story again to emphasise that this alert about technological manipulation was coming from recognised specialists in the anti-terrorism surveillance field: “Experts: Islamic Militants Customizing Violent Video Games.” As the story circulated, the body of the article remained largely unchanged, in which the Reuters reporter described the digital materials from Islamic extremists that were shown at the congressional hearing. During the segment that apparently most captured the attention of the wire service reporters, eerie music played as an English-speaking narrator condemned the “infidel” and declared that he had “put a jihad” on them, as aerial shots moved over 3D computer-generated images of flaming oil facilities and mosques covered with geometric designs. Suddenly, this menacing voice-over was interrupted by an explosion, as a virtual rocket was launched into a simulated military helicopter. The Reuters reporter shared this dystopian vision from cyberspace with Western audiences by quoting directly from the chilling commentary and describing a dissonant montage of images and remixed sound. “I was just a boy when the infidels came to my village in Blackhawk helicopters,” a narrator’s voice said as the screen flashed between images of street-level gunfights, explosions and helicopter assaults. Then came a recording of President George W. Bush’s September 16, 2001, statement: “This crusade, this war on terrorism, is going to take a while.” It was edited to repeat the word “crusade,” which Muslims often define as an attack on Islam by Christianity. According to the news reports, the key piece of evidence before Congress seemed to be a film by “SonicJihad” of recorded videogame play, which – according to the experts – was widely distributed online. Much of the clip takes place from the point of view of a first-person shooter, seen as if through the eyes of an armed insurgent, but the viewer also periodically sees third-person action in which the player appears as a running figure wearing a red-and-white checked keffiyeh, who dashes toward the screen with a rocket launcher balanced on his shoulder. Significantly, another of the player’s hand-held weapons is a detonator that triggers remote blasts. As jaunty music plays, helicopters, tanks, and armoured vehicles burst into smoke and flame. Finally, at the triumphant ending of the video, a green and white flag bearing a crescent is hoisted aloft into the sky to signify victory by Islamic forces. To explain the existence of this digital alternative history in which jihadists could be conquerors, the Reuters story described the deviousness of the country’s terrorist opponents, who were now apparently modifying popular videogames through their wizardry and inserting anti-American, pro-insurgency content into U.S.-made consumer technology. One of the latest video games modified by militants is the popular “Battlefield 2” from leading video game publisher, Electronic Arts Inc of Redwood City, California. Jeff Brown, a spokesman for Electronic Arts, said enthusiasts often write software modifications, known as “mods,” to video games. “Millions of people create mods on games around the world,” he said. “We have absolutely no control over them. It’s like drawing a mustache on a picture.” Although the Electronic Arts executive dismissed the activities of modders as a “mustache on a picture” that could only be considered little more than childish vandalism of their off-the-shelf corporate product, others saw a more serious form of criminality at work. Testifying experts and the legislators listening on the committee used the video to call for greater Internet surveillance efforts and electronic counter-measures. Within twenty-four hours of the sensationalistic news breaking, however, a group of Battlefield 2 fans was crowing about the idiocy of reporters. The game play footage wasn’t from a high-tech modification of the software by Islamic extremists; it had been posted on a Planet Battlefield forum the previous December of 2005 by a game fan who had cut together regular game play with a Bush remix and a parody snippet of the soundtrack from the 2004 hit comedy film Team America. The voice describing the Black Hawk helicopters was the voice of Trey Parker of South Park cartoon fame, and – much to Parker’s amusement – even the mention of “goats screaming” did not clue spectators in to the fact of a comic source. Ironically, the moment in the movie from which the sound clip is excerpted is one about intelligence gathering. As an agent of Team America, a fictional elite U.S. commando squad, the hero of the film’s all-puppet cast, Gary Johnston, is impersonating a jihadist radical inside a hostile Egyptian tavern that is modelled on the cantina scene from Star Wars. Additional laughs come from the fact that agent Johnston is accepted by the menacing terrorist cell as “Hakmed,” despite the fact that he utters a series of improbable clichés made up of incoherent stereotypes about life in the Middle East while dressed up in a disguise made up of shoe polish and a turban from a bathroom towel. The man behind the “SonicJihad” pseudonym turned out to be a twenty-five-year-old hospital administrator named Samir, and what reporters and representatives saw was nothing more exotic than game play from an add-on expansion pack of Battlefield 2, which – like other versions of the game – allows first-person shooter play from the position of the opponent as a standard feature. While SonicJihad initially joined his fellow gamers in ridiculing the mainstream media, he also expressed astonishment and outrage about a larger politics of reception. In one interview he argued that the media illiteracy of Reuters potentially enabled a whole series of category errors, in which harmless gamers could be demonised as terrorists. It wasn’t intended for the purpose what it was portrayed to be by the media. So no I don’t regret making a funny video . . . why should I? The only thing I regret is thinking that news from Reuters was objective and always right. The least they could do is some online research before publishing this. If they label me al-Qaeda just for making this silly video, that makes you think, what is this al-Qaeda? And is everything al-Qaeda? Although Sonic Jihad dismissed his own work as “silly” or “funny,” he expected considerably more from a credible news agency like Reuters: “objective” reporting, “online research,” and fact-checking before “publishing.” Within the week, almost all of the salient details in the Reuters story were revealed to be incorrect. SonicJihad’s film was not made by terrorists or for terrorists: it was not created by “Islamic militants” for “Muslim youths.” The videogame it depicted had not been modified by a “tech-savvy militant” with advanced programming skills. Of course, what is most extraordinary about this story isn’t just that Reuters merely got its facts wrong; it is that a self-identified “parody” video was shown to the august House Intelligence Committee by a team of well-paid “experts” from the Science Applications International Corporation (SAIC), a major contractor with the federal government, as key evidence of terrorist recruitment techniques and abuse of digital networks. Moreover, this story of media illiteracy unfolded in the context of a fundamental Constitutional debate about domestic surveillance via communications technology and the further regulation of digital content by lawmakers. Furthermore, the transcripts of the actual hearing showed that much more than simple gullibility or technological ignorance was in play. Based on their exchanges in the public record, elected representatives and government experts appear to be keenly aware that the digital discourses of an emerging information culture might be challenging their authority and that of the longstanding institutions of knowledge and power with which they are affiliated. These hearings can be seen as representative of a larger historical moment in which emphatic declarations about prohibiting specific practices in digital culture have come to occupy a prominent place at the podium, news desk, or official Web portal. This environment of cultural reaction can be used to explain why policy makers’ reaction to terrorists’ use of networked communication and digital media actually tells us more about our own American ideologies about technology and rhetoric in a contemporary information environment. When the experts come forward at the Sonic Jihad hearing to “walk us through the media and some of the products,” they present digital artefacts of an information economy that mirrors many of the features of our own consumption of objects of electronic discourse, which seem dangerously easy to copy and distribute and thus also create confusion about their intended meanings, audiences, and purposes. From this one hearing we can see how the reception of many new digital genres plays out in the public sphere of legislative discourse. Web pages, videogames, and Weblogs are mentioned specifically in the transcript. The main architecture of the witnesses’ presentation to the committee is organised according to the rhetorical conventions of a PowerPoint presentation. Moreover, the arguments made by expert witnesses about the relationship of orality to literacy or of public to private communications in new media are highly relevant to how we might understand other important digital genres, such as electronic mail or text messaging. The hearing also invites consideration of privacy, intellectual property, and digital “rights,” because moral values about freedom and ownership are alluded to by many of the elected representatives present, albeit often through the looking glass of user behaviours imagined as radically Other. For example, terrorists are described as “modders” and “hackers” who subvert those who properly create, own, legitimate, and regulate intellectual property. To explain embarrassing leaks of infinitely replicable digital files, witness Ron Roughead says, “We’re not even sure that they don’t even hack into the kinds of spaces that hold photographs in order to get pictures that our forces have taken.” Another witness, Undersecretary of Defense for Policy and International Affairs, Peter Rodman claims that “any video game that comes out, as soon as the code is released, they will modify it and change the game for their needs.” Thus, the implication of these witnesses’ testimony is that the release of code into the public domain can contribute to political subversion, much as covert intrusion into computer networks by stealthy hackers can. However, the witnesses from the Pentagon and from the government contractor SAIC often present a contradictory image of the supposed terrorists in the hearing transcripts. Sometimes the enemy is depicted as an organisation of technological masterminds, capable of manipulating the computer code of unwitting Americans and snatching their rightful intellectual property away; sometimes those from the opposing forces are depicted as pre-modern and even sub-literate political innocents. In contrast, the congressional representatives seem to focus on similarities when comparing the work of “terrorists” to the everyday digital practices of their constituents and even of themselves. According to the transcripts of this open hearing, legislators on both sides of the aisle express anxiety about domestic patterns of Internet reception. Even the legislators’ own Web pages are potentially disruptive electronic artefacts, particularly when the demands of digital labour interfere with their duties as lawmakers. Although the subject of the hearing is ostensibly terrorist Websites, Representative Anna Eshoo (D-California) bemoans the difficulty of maintaining her own official congressional site. As she observes, “So we are – as members, I think we’re very sensitive about what’s on our Website, and if I retained what I had on my Website three years ago, I’d be out of business. So we know that they have to be renewed. They go up, they go down, they’re rebuilt, they’re – you know, the message is targeted to the future.” In their questions, lawmakers identify Weblogs (blogs) as a particular area of concern as a destabilising alternative to authoritative print sources of information from established institutions. Representative Alcee Hastings (D-Florida) compares the polluting power of insurgent bloggers to that of influential online muckrakers from the American political Right. Hastings complains of “garbage on our regular mainstream news that comes from blog sites.” Representative Heather Wilson (R-New Mexico) attempts to project a media-savvy persona by bringing up the “phenomenon of blogging” in conjunction with her questions about jihadist Websites in which she notes how Internet traffic can be magnified by cooperative ventures among groups of ideologically like-minded content-providers: “These Websites, and particularly the most active ones, are they cross-linked? And do they have kind of hot links to your other favorite sites on them?” At one point Representative Wilson asks witness Rodman if he knows “of your 100 hottest sites where the Webmasters are educated? What nationality they are? Where they’re getting their money from?” In her questions, Wilson implicitly acknowledges that Web work reflects influences from pedagogical communities, economic networks of the exchange of capital, and even potentially the specific ideologies of nation-states. It is perhaps indicative of the government contractors’ anachronistic worldview that the witness is unable to answer Wilson’s question. He explains that his agency focuses on the physical location of the server or ISP rather than the social backgrounds of the individuals who might be manufacturing objectionable digital texts. The premise behind the contractors’ working method – surveilling the technical apparatus not the social network – may be related to other beliefs expressed by government witnesses, such as the supposition that jihadist Websites are collectively produced and spontaneously emerge from the indigenous, traditional, tribal culture, instead of assuming that Iraqi insurgents have analogous beliefs, practices, and technological awareness to those in first-world countries. The residual subtexts in the witnesses’ conjectures about competing cultures of orality and literacy may tell us something about a reactionary rhetoric around videogames and digital culture more generally. According to the experts before Congress, the Middle Eastern audience for these videogames and Websites is limited by its membership in a pre-literate society that is only capable of abortive cultural production without access to knowledge that is archived in printed codices. Sometimes the witnesses before Congress seem to be unintentionally channelling the ideas of the late literacy theorist Walter Ong about the “secondary orality” associated with talky electronic media such as television, radio, audio recording, or telephone communication. Later followers of Ong extend this concept of secondary orality to hypertext, hypermedia, e-mail, and blogs, because they similarly share features of both speech and written discourse. Although Ong’s disciples celebrate this vibrant reconnection to a mythic, communal past of what Kathleen Welch calls “electric rhetoric,” the defence industry consultants express their profound state of alarm at the potentially dangerous and subversive character of this hybrid form of communication. The concept of an “oral tradition” is first introduced by the expert witnesses in the context of modern marketing and product distribution: “The Internet is used for a variety of things – command and control,” one witness states. “One of the things that’s missed frequently is how and – how effective the adversary is at using the Internet to distribute product. They’re using that distribution network as a modern form of oral tradition, if you will.” Thus, although the Internet can be deployed for hierarchical “command and control” activities, it also functions as a highly efficient peer-to-peer distributed network for disseminating the commodity of information. Throughout the hearings, the witnesses imply that unregulated lateral communication among social actors who are not authorised to speak for nation-states or to produce legitimated expert discourses is potentially destabilising to political order. Witness Eric Michael describes the “oral tradition” and the conventions of communal life in the Middle East to emphasise the primacy of speech in the collective discursive practices of this alien population: “I’d like to point your attention to the media types and the fact that the oral tradition is listed as most important. The other media listed support that. And the significance of the oral tradition is more than just – it’s the medium by which, once it comes off the Internet, it is transferred.” The experts go on to claim that this “oral tradition” can contaminate other media because it functions as “rumor,” the traditional bane of the stately discourse of military leaders since the classical era. The oral tradition now also has an aspect of rumor. A[n] event takes place. There is an explosion in a city. Rumor is that the United States Air Force dropped a bomb and is doing indiscriminate killing. This ends up being discussed on the street. It ends up showing up in a Friday sermon in a mosque or in another religious institution. It then gets recycled into written materials. Media picks up the story and broadcasts it, at which point it’s now a fact. In this particular case that we were telling you about, it showed up on a network television, and their propaganda continues to go back to this false initial report on network television and continue to reiterate that it’s a fact, even though the United States government has proven that it was not a fact, even though the network has since recanted the broadcast. In this example, many-to-many discussion on the “street” is formalised into a one-to many “sermon” and then further stylised using technology in a one-to-many broadcast on “network television” in which “propaganda” that is “false” can no longer be disputed. This “oral tradition” is like digital media, because elements of discourse can be infinitely copied or “recycled,” and it is designed to “reiterate” content. In this hearing, the word “rhetoric” is associated with destructive counter-cultural forces by the witnesses who reiterate cultural truisms dating back to Plato and the Gorgias. For example, witness Eric Michael initially presents “rhetoric” as the use of culturally specific and hence untranslatable figures of speech, but he quickly moves to an outright castigation of the entire communicative mode. “Rhetoric,” he tells us, is designed to “distort the truth,” because it is a “selective” assembly or a “distortion.” Rhetoric is also at odds with reason, because it appeals to “emotion” and a romanticised Weltanschauung oriented around discourses of “struggle.” The film by SonicJihad is chosen as the final clip by the witnesses before Congress, because it allegedly combines many different types of emotional appeal, and thus it conveniently ties together all of the themes that the witnesses present to the legislators about unreliable oral or rhetorical sources in the Middle East: And there you see how all these products are linked together. And you can see where the games are set to psychologically condition you to go kill coalition forces. You can see how they use humor. You can see how the entire campaign is carefully crafted to first evoke an emotion and then to evoke a response and to direct that response in the direction that they want. Jihadist digital products, especially videogames, are effective means of manipulation, the witnesses argue, because they employ multiple channels of persuasion and carefully sequenced and integrated subliminal messages. To understand the larger cultural conversation of the hearing, it is important to keep in mind that the related argument that “games” can “psychologically condition” players to be predisposed to violence is one that was important in other congressional hearings of the period, as well one that played a role in bills and resolutions that were passed by the full body of the legislative branch. In the witness’s testimony an appeal to anti-game sympathies at home is combined with a critique of a closed anti-democratic system abroad in which the circuits of rhetorical production and their composite metonymic chains are described as those that command specific, unvarying, robotic responses. This sharp criticism of the artful use of a presentation style that is “crafted” is ironic, given that the witnesses’ “compilation” of jihadist digital material is staged in the form of a carefully structured PowerPoint presentation, one that is paced to a well-rehearsed rhythm of “slide, please” or “next slide” in the transcript. The transcript also reveals that the members of the House Intelligence Committee were not the original audience for the witnesses’ PowerPoint presentation. Rather, when it was first created by SAIC, this “expert” presentation was designed for training purposes for the troops on the ground, who would be facing the challenges of deployment in hostile terrain. According to the witnesses, having the slide show showcased before Congress was something of an afterthought. Nonetheless, Congressman Tiahrt (R-KN) is so impressed with the rhetorical mastery of the consultants that he tries to appropriate it. As Tiarht puts it, “I’d like to get a copy of that slide sometime.” From the hearing we also learn that the terrorists’ Websites are threatening precisely because they manifest a polymorphously perverse geometry of expansion. For example, one SAIC witness before the House Committee compares the replication and elaboration of digital material online to a “spiderweb.” Like Representative Eshoo’s site, he also notes that the terrorists’ sites go “up” and “down,” but the consultant is left to speculate about whether or not there is any “central coordination” to serve as an organising principle and to explain the persistence and consistency of messages despite the apparent lack of a single authorial ethos to offer a stable, humanised, point of reference. In the hearing, the oft-cited solution to the problem created by the hybridity and iterability of digital rhetoric appears to be “public diplomacy.” Both consultants and lawmakers seem to agree that the damaging messages of the insurgents must be countered with U.S. sanctioned information, and thus the phrase “public diplomacy” appears in the hearing seven times. However, witness Roughhead complains that the protean “oral tradition” and what Henry Jenkins has called the “transmedia” character of digital culture, which often crosses several platforms of traditional print, projection, or broadcast media, stymies their best rhetorical efforts: “I think the point that we’ve tried to make in the briefing is that wherever there’s Internet availability at all, they can then download these – these programs and put them onto compact discs, DVDs, or post them into posters, and provide them to a greater range of people in the oral tradition that they’ve grown up in. And so they only need a few Internet sites in order to distribute and disseminate the message.” Of course, to maintain their share of the government market, the Science Applications International Corporation also employs practices of publicity and promotion through the Internet and digital media. They use HTML Web pages for these purposes, as well as PowerPoint presentations and online video. The rhetoric of the Website of SAIC emphasises their motto “From Science to Solutions.” After a short Flash film about how SAIC scientists and engineers solve “complex technical problems,” the visitor is taken to the home page of the firm that re-emphasises their central message about expertise. The maps, uniforms, and specialised tools and equipment that are depicted in these opening Web pages reinforce an ethos of professional specialisation that is able to respond to multiple threats posed by the “global war on terror.” By 26 June 2006, the incident finally was being described as a “Pentagon Snafu” by ABC News. From the opening of reporter Jake Tapper’s investigative Webcast, established government institutions were put on the spot: “So, how much does the Pentagon know about videogames? Well, when it came to a recent appearance before Congress, apparently not enough.” Indeed, the very language about “experts” that was highlighted in the earlier coverage is repeated by Tapper in mockery, with the significant exception of “independent expert” Ian Bogost of the Georgia Institute of Technology. If the Pentagon and SAIC deride the legitimacy of rhetoric as a cultural practice, Bogost occupies himself with its defence. In his recent book Persuasive Games: The Expressive Power of Videogames, Bogost draws upon the authority of the “2,500 year history of rhetoric” to argue that videogames represent a significant development in that cultural narrative. Given that Bogost and his Watercooler Games Weblog co-editor Gonzalo Frasca were actively involved in the detective work that exposed the depth of professional incompetence involved in the government’s line-up of witnesses, it is appropriate that Bogost is given the final words in the ABC exposé. As Bogost says, “We should be deeply bothered by this. We should really be questioning the kind of advice that Congress is getting.” Bogost may be right that Congress received terrible counsel on that day, but a close reading of the transcript reveals that elected officials were much more than passive listeners: in fact they were lively participants in a cultural conversation about regulating digital media. After looking at the actual language of these exchanges, it seems that the persuasiveness of the misinformation from the Pentagon and SAIC had as much to do with lawmakers’ preconceived anxieties about practices of computer-mediated communication close to home as it did with the contradictory stereotypes that were presented to them about Internet practices abroad. In other words, lawmakers found themselves looking into a fun house mirror that distorted what should have been familiar artefacts of American popular culture because it was precisely what they wanted to see. References ABC News. “Terrorist Videogame?” Nightline Online. 21 June 2006. 22 June 2006 http://abcnews.go.com/Video/playerIndex?id=2105341>. Bogost, Ian. Persuasive Games: Videogames and Procedural Rhetoric. Cambridge, MA: MIT Press, 2007. Game Politics. “Was Congress Misled by ‘Terrorist’ Game Video? We Talk to Gamer Who Created the Footage.” 11 May 2006. http://gamepolitics.livejournal.com/285129.html#cutid1>. Jenkins, Henry. Convergence Culture: Where Old and New Media Collide. New York: New York UP, 2006. julieb. “David Morgan Is a Horrible Writer and Should Be Fired.” Online posting. 5 May 2006. Dvorak Uncensored Cage Match Forums. http://cagematch.dvorak.org/index.php/topic,130.0.html>. Mahmood. “Terrorists Don’t Recruit with Battlefield 2.” GGL Global Gaming. 16 May 2006 http://www.ggl.com/news.php?NewsId=3090>. Morgan, David. “Islamists Using U.S. Video Games in Youth Appeal.” Reuters online news service. 4 May 2006 http://today.reuters.com/news/ArticleNews.aspx?type=topNews &storyID=2006-05-04T215543Z_01_N04305973_RTRUKOC_0_US-SECURITY- VIDEOGAMES.xml&pageNumber=0&imageid=&cap=&sz=13&WTModLoc= NewsArt-C1-ArticlePage2>. Ong, Walter J. Orality and Literacy: The Technologizing of the Word. London/New York: Methuen, 1982. Parker, Trey. Online posting. 7 May 2006. 9 May 2006 http://www.treyparker.com>. Plato. “Gorgias.” Plato: Collected Dialogues. Princeton: Princeton UP, 1961. Shrader, Katherine. “Pentagon Surfing Thousands of Jihad Sites.” Associated Press 4 May 2006. SonicJihad. “SonicJihad: A Day in the Life of a Resistance Fighter.” Online posting. 26 Dec. 2005. Planet Battlefield Forums. 9 May 2006 http://www.forumplanet.com/planetbattlefield/topic.asp?fid=13670&tid=1806909&p=1>. Tapper, Jake, and Audery Taylor. “Terrorist Video Game or Pentagon Snafu?” ABC News Nightline 21 June 2006. 30 June 2006 http://abcnews.go.com/Nightline/Technology/story?id=2105128&page=1>. U.S. Congressional Record. Panel I of the Hearing of the House Select Intelligence Committee, Subject: “Terrorist Use of the Internet for Communications.” Federal News Service. 4 May 2006. Welch, Kathleen E. Electric Rhetoric: Classical Rhetoric, Oralism, and the New Literacy. Cambridge, MA: MIT Press, 1999. Citation reference for this article MLA Style Losh, Elizabeth. "Artificial Intelligence: Media Illiteracy and the SonicJihad Debacle in Congress." M/C Journal 10.5 (2007). echo date('d M. Y'); ?> <http://journal.media-culture.org.au/0710/08-losh.php>. APA Style Losh, E. (Oct. 2007) "Artificial Intelligence: Media Illiteracy and the SonicJihad Debacle in Congress," M/C Journal, 10(5). Retrieved echo date('d M. Y'); ?> from <http://journal.media-culture.org.au/0710/08-losh.php>.
APA, Harvard, Vancouver, ISO, and other styles
9

Keogh, Luke. "The First Four Wells: Unconventional Gas in Australia." M/C Journal 16, no. 2 (2013). http://dx.doi.org/10.5204/mcj.617.

Full text
Abstract:
Unconventional energy sources have become increasingly important to the global energy mix. These include coal seam gas, shale gas and shale oil. The unconventional gas industry was pioneered in the United States and embraced following the first oil shock in 1973 (Rogers). As has been the case with many global resources (Hiscock), many of the same companies that worked in the USA carried their experience in this industry to early Australian explorations. Recently the USA has secured significant energy security with the development of unconventional energy deposits such as the Marcellus shale gas and the Bakken shale oil (Dobb; McGraw). But this has not come without environmental impact, including contamination to underground water supply (Osborn, Vengosh, Warner, Jackson) and potential greenhouse gas contributions (Howarth, Santoro, Ingraffea; McKenna). The environmental impact of unconventional gas extraction has raised serious public concern about the introduction and growth of the industry in Australia. In coal rich Australia coal seam gas is currently the major source of unconventional gas. Large gas deposits have been found in prime agricultural land along eastern Australia, such as the Liverpool Plains in New South Wales and the Darling Downs in Queensland. Competing land-uses and a series of environmental incidents from the coal seam gas industry have warranted major protest from a coalition of environmentalists and farmers (Berry; McLeish). Conflict between energy companies wanting development and environmentalists warning precaution is an easy script to cast for frontline media coverage. But historical perspectives are often missing in these contemporary debates. While coal mining and natural gas have often received “boosting” historical coverage (Diamond; Wilkinson), and although historical themes of “development” and “rushes” remain predominant when observing the span of the industry (AGA; Blainey), the history of unconventional gas, particularly the history of its environmental impact, has been little studied. Few people are aware, for example, that the first shale gas exploratory well was completed in late 2010 in the Cooper Basin in Central Australia (Molan) and is considered as a “new” frontier in Australian unconventional gas. Moreover many people are unaware that the first coal seam gas wells were completed in 1976 in Queensland. The first four wells offer an important moment for reflection in light of the industry’s recent move into Central Australia. By locating and analysing the first four coal seam gas wells, this essay identifies the roots of the unconventional gas industry in Australia and explores the early environmental impact of these wells. By analysing exploration reports that have been placed online by the Queensland Department of Natural Resources and Mines through the lens of environmental history, the dominant developmental narrative of this industry can also be scrutinised. These narratives often place more significance on economic and national benefits while displacing the environmental and social impacts of the industry (Connor, Higginbotham, Freeman, Albrecht; Duus; McEachern; Trigger). This essay therefore seeks to bring an environmental insight into early unconventional gas mining in Australia. As the author, I am concerned that nearly four decades on and it seems that no one has heeded the warning gleaned from these early wells and early exploration reports, as gas exploration in Australia continues under little scrutiny. Arrival The first four unconventional gas wells in Australia appear at the beginning of the industry world-wide (Schraufnagel, McBane, and Kuuskraa; McClanahan). The wells were explored by Houston Oils and Minerals—a company that entered the Australian mining scene by sharing a mining prospect with International Australian Energy Company (Wiltshire). The International Australian Energy Company was owned by Black Giant Oil Company in the US, which in turn was owned by International Royalty and Oil Company also based in the US. The Texan oilman Robert Kanton held a sixteen percent share in the latter. Kanton had an idea that the Mimosa Syncline in the south-eastern Bowen Basin was a gas trap waiting to be exploited. To test the theory he needed capital. Kanton presented the idea to Houston Oil and Minerals which had the financial backing to take the risk. Shotover No. 1 was drilled by Houston Oil and Minerals thirty miles south-east of the coal mining town of Blackwater. By late August 1975 it was drilled to 2,717 metres, discovered to have little gas, spudded, and, after a spend of $610,000, abandoned. The data from the Shotover well showed that the porosity of the rocks in the area was not a trap, and the Mimosa Syncline was therefore downgraded as a possible hydrocarbon location. There was, however, a small amount of gas found in the coal seams (Benbow 16). The well had passed through the huge coal seams of both the Bowen and Surat basins—important basins for the future of both the coal and gas industries. Mining Concepts In 1975, while Houston Oil and Minerals was drilling the Shotover well, US Steel and the US Bureau of Mines used hydraulic fracture, a technique already used in the petroleum industry, to drill vertical surface wells to drain gas from a coal seam (Methane Drainage Taskforce 102). They were able to remove gas from the coal seam before it was mined and sold enough to make a profit. With the well data from the Shotover well in Australia compiled, Houston returned to the US to research the possibility of harvesting methane in Australia. As the company saw it, methane drainage was “a novel exploitation concept” and the methane in the Bowen Basin was an “enormous hydrocarbon resource” (Wiltshire 7). The Shotover well passed through a section of the German Creek Coal measures and this became their next target. In September 1976 the Shotover well was re-opened and plugged at 1499 meters to become Australia’s first exploratory unconventional gas well. By the end of the month the rig was released and gas production tested. At one point an employee on the drilling operation observed a gas flame “the size of a 44 gal drum” (HOMA, “Shotover # 1” 9). But apart from the brief show, no gas flowed. And yet, Houston Oil and Minerals was not deterred, as they had already taken out other leases for further prospecting (Wiltshire 4). Only a week after the Shotover well had failed, Houston moved the methane search south-east to an area five miles north of the Moura township. Houston Oil and Minerals had researched the coal exploration seismic surveys of the area that were conducted in 1969, 1972, and 1973 to choose the location. Over the next two months in late 1976, two new wells—Kinma No.1 and Carra No.1—were drilled within a mile from each other and completed as gas wells. Houston Oil and Minerals also purchased the old oil exploration well Moura No. 1 from the Queensland Government and completed it as a suspended gas well. The company must have mined the Department of Mines archive to find Moura No.1, as the previous exploration report from 1969 noted methane given off from the coal seams (Sell). By December 1976 Houston Oil and Minerals had three gas wells in the vicinity of each other and by early 1977 testing had occurred. The results were disappointing with minimal gas flow at Kinma and Carra, but Moura showed a little more promise. Here, the drillers were able to convert their Fairbanks-Morse engine driving the pump from an engine run on LPG to one run on methane produced from the well (Porter, “Moura # 1”). Drink This? Although there was not much gas to find in the test production phase, there was a lot of water. The exploration reports produced by the company are incomplete (indeed no report was available for the Shotover well), but the information available shows that a large amount of water was extracted before gas started to flow (Porter, “Carra # 1”; Porter, “Moura # 1”; Porter, “Kinma # 1”). As Porter’s reports outline, prior to gas flowing, the water produced at Carra, Kinma and Moura totalled 37,600 litres, 11,900 and 2,900 respectively. It should be noted that the method used to test the amount of water was not continuous and these amounts were not the full amount of water produced; also, upon gas coming to the surface some of the wells continued to produce water. In short, before any gas flowed at the first unconventional gas wells in Australia at least 50,000 litres of water were taken from underground. Results show that the water was not ready to drink (Mathers, “Moura # 1”; Mathers, “Appendix 1”; HOMA, “Miscellaneous Pages” 21-24). The water had total dissolved solids (minerals) well over the average set by the authorities (WHO; Apps Laboratories; NHMRC; QDAFF). The well at Kinma recorded the highest levels, almost two and a half times the unacceptable standard. On average the water from the Moura well was of reasonable standard, possibly because some water was extracted from the well when it was originally sunk in 1969; but the water from Kinma and Carra was very poor quality, not good enough for crops, stock or to be let run into creeks. The biggest issue was the sodium concentration; all wells had very high salt levels. Kinma and Carra were four and two times the maximum standard respectively. In short, there was a substantial amount of poor quality water produced from drilling and testing the three wells. Fracking Australia Hydraulic fracturing is an artificial process that can encourage more gas to flow to the surface (McGraw; Fischetti; Senate). Prior to the testing phase at the Moura field, well data was sent to the Chemical Research and Development Department at Halliburton in Oklahoma, to examine the ability to fracture the coal and shale in the Australian wells. Halliburton was the founding father of hydraulic fracture. In Oklahoma on 17 March 1949, operating under an exclusive license from Standard Oil, this company conducted the first ever hydraulic fracture of an oil well (Montgomery and Smith). To come up with a program of hydraulic fracturing for the Australian field, Halliburton went back to the laboratory. They bonded together small slabs of coal and shale similar to Australian samples, drilled one-inch holes into the sample, then pressurised the holes and completed a “hydro-frac” in miniature. “These samples were difficult to prepare,” they wrote in their report to Houston Oil and Minerals (HOMA, “Miscellaneous Pages” 10). Their program for fracturing was informed by a field of science that had been evolving since the first hydraulic fracture but had rapidly progressed since the first oil shock. Halliburton’s laboratory test had confirmed that the model of Perkins and Kern developed for widths of hydraulic fracture—in an article that defined the field—should also apply to Australian coals (Perkins and Kern). By late January 1977 Halliburton had issued Houston Oil and Minerals with a program of hydraulic fracture to use on the central Queensland wells. On the final page of their report they warned: “There are many unknowns in a vertical fracture design procedure” (HOMA, “Miscellaneous Pages” 17). In July 1977, Moura No. 1 became the first coal seam gas well hydraulically fractured in Australia. The exploration report states: “During July 1977 the well was killed with 1% KCL solution and the tubing and packer were pulled from the well … and pumping commenced” (Porter 2-3). The use of the word “kill” is interesting—potassium chloride (KCl) is the third and final drug administered in the lethal injection of humans on death row in the USA. Potassium chloride was used to minimise the effect on parts of the coal seam that were water-sensitive and was the recommended solution prior to adding other chemicals (Montgomery and Smith 28); but a word such as “kill” also implies that the well and the larger environment were alive before fracking commenced (Giblett; Trigger). Pumping recommenced after the fracturing fluid was unloaded. Initially gas supply was very good. It increased from an average estimate of 7,000 cubic feet per day to 30,000, but this only lasted two days before coal and sand started flowing back up to the surface. In effect, the cleats were propped open but the coal did not close and hold onto them which meant coal particles and sand flowed back up the pipe with diminishing amounts of gas (Walters 12). Although there were some interesting results, the program was considered a failure. In April 1978, Houston Oil and Minerals finally abandoned the methane concept. Following the failure, they reflected on the possibilities for a coal seam gas industry given the gas prices in Queensland: “Methane drainage wells appear to offer no economic potential” (Wooldridge 2). At the wells they let the tubing drop into the hole, put a fifteen foot cement plug at the top of the hole, covered it with a steel plate and by their own description restored the area to its “original state” (Wiltshire 8). Houston Oil and Minerals now turned to “conventional targets” which included coal exploration (Wiltshire 7). A Thousand Memories The first four wells show some of the critical environmental issues that were present from the outset of the industry in Australia. The process of hydraulic fracture was not just a failure, but conducted on a science that had never been tested in Australia, was ponderous at best, and by Halliburton’s own admission had “many unknowns”. There was also the role of large multinationals providing “experience” (Briody; Hiscock) and conducting these tests while having limited knowledge of the Australian landscape. Before any gas came to the surface, a large amount of water was produced that was loaded with a mixture of salt and other heavy minerals. The source of water for both the mud drilling of Carra and Kinma, as well as the hydraulic fracture job on Moura, was extracted from Kianga Creek three miles from the site (HOMA, “Carra # 1” 5; HOMA, “Kinma # 1” 5; Porter, “Moura # 1”). No location was listed for the disposal of the water from the wells, including the hydraulic fracture liquid. Considering the poor quality of water, if the water was disposed on site or let drain into a creek, this would have had significant environmental impact. Nobody has yet answered the question of where all this water went. The environmental issues of water extraction, saline water and hydraulic fracture were present at the first four wells. At the first four wells environmental concern was not a priority. The complexity of inter-company relations, as witnessed at the Shotover well, shows there was little time. The re-use of old wells, such as the Moura well, also shows that economic priorities were more important. Even if environmental information was considered important at the time, no one would have had access to it because, as handwritten notes on some of the reports show, many of the reports were “confidential” (Sell). Even though coal mines commenced filing Environmental Impact Statements in the early 1970s, there is no such documentation for gas exploration conducted by Houston Oil and Minerals. A lack of broader awareness for the surrounding environment, from floral and faunal health to the impact on habitat quality, can be gleaned when reading across all the exploration reports. Nearly four decades on and we now have thousands of wells throughout the world. Yet, the challenges of unconventional gas still persist. The implications of the environmental history of the first four wells in Australia for contemporary unconventional gas exploration and development in this country and beyond are significant. Many environmental issues were present from the beginning of the coal seam gas industry in Australia. Owning up to this history would place policy makers and regulators in a position to strengthen current regulation. The industry continues to face the same challenges today as it did at the start of development—including water extraction, hydraulic fracturing and problems associated with drilling through underground aquifers. Looking more broadly at the unconventional gas industry, shale gas has appeared as the next target for energy resources in Australia. Reflecting on the first exploratory shale gas wells drilled in Central Australia, the chief executive of the company responsible for the shale gas wells noted their deliberate decision to locate their activities in semi-desert country away from “an area of prime agricultural land” and conflict with environmentalists (quoted in Molan). Moreover, the journalist Paul Cleary recently complained about the coal seam gas industry polluting Australia’s food-bowl but concluded that the “next frontier” should be in “remote” Central Australia with shale gas (Cleary 195). It appears that preference is to move the industry to the arid centre of Australia, to the ecologically and culturally unique Lake Eyre Basin region (Robin and Smith). Claims to move the industry away from areas that might have close public scrutiny disregard many groups in the Lake Eyre Basin, such as Aboriginal rights to land, and appear similar to other industrial projects that disregard local inhabitants, such as mega-dams and nuclear testing (Nixon). References AGA (Australian Gas Association). “Coal Seam Methane in Australia: An Overview.” AGA Research Paper 2 (1996). Apps Laboratories. “What Do Your Water Test Results Mean?” Apps Laboratories 7 Sept. 2012. 1 May 2013 ‹http://appslabs.com.au/downloads.htm›. Benbow, Dennis B. “Shotover No. 1: Lithology Report for Houston Oil and Minerals Corporation.” November 1975. Queensland Digital Exploration Reports. Company Report 5457_2. Brisbane: Queensland Department of Resources and Mines 4 June 2012. 1 May 2013 ‹https://qdexguest.deedi.qld.gov.au/portal/site/qdex/search?REPORT_ID=5457&COLLECTION_ID=999›. Berry, Petrina. “Qld Minister Refuses to Drink CSG Water.” news.com.au, 22 Apr. 2013. 1 May 2013 ‹http://www.news.com.au/breaking-news/national/qld-minister-refuses-to-drink-csg-water/story-e6frfku9-1226626115742›. Blainey, Geofrey. The Rush That Never Ended: A History of Australian Mining. Carlton: Melbourne University Publishing, 2003. Briody, Dan. The Halliburton Agenda: The Politics of Oil and Money. Singapore: Wiley, 2004. Cleary, Paul. Mine-Field: The Dark Side of Australia’s Resource Rush. Collingwood: Black Inc., 2012. Connor, Linda, Nick Higginbotham, Sonia Freeman, and Glenn Albrecht. “Watercourses and Discourses: Coalmining in the Upper Hunter Valley, New South Wales.” Oceania 78.1 (2008): 76-90. Diamond, Marion. “Coal in Australian History.” Coal and the Commonwealth: The Greatness of an Australian Resource. Eds. Peter Knights and Michael Hood. St Lucia: University of Queensland, 2009. 23-45. 20 Apr. 2013 ‹http://www.peabodyenergy.com/mm/files/News/Publications/Special%20Reports/coal_and_commonwealth%5B1%5D.pdf›. Dobb, Edwin. “The New Oil Landscape.” National Geographic (Mar. 2013): 29-59. Duus, Sonia. “Coal Contestations: Learning from a Long, Broad View.” Rural Society Journal 22.2 (2013): 96-110. Fischetti, Mark. “The Drillers Are Coming.” Scientific American (July 2010): 82-85. Giblett, Rod. “Terrifying Prospects and Resources of Hope: Minescapes, Timescapes and the Aesthetics of the Future.” Continuum: Journal of Media and Cultural Studies 23.6 (2009): 781-789. Hiscock, Geoff. Earth Wars: The Battle for Global Resources. Singapore: Wiley, 2012. HOMA (Houston Oil and Minerals of Australia). “Carra # 1: Well Completion Report.” July 1977. Queensland Digital Exploration Reports. Company Report 6054_1. Brisbane: Queensland Department of Resources and Mines. 21 Feb. 2012 ‹https://qdexguest.deedi.qld.gov.au/portal/site/qdex/search?REPORT_ID=6054&COLLECTION_ID=999›. ———. “Kinma # 1: Well Completion Report.” August 1977. Queensland Digital Exploration Reports. Company Report 6190_2. Brisbane: Queensland Department of Resources and Mines. 21 Feb. 2012 ‹https://qdexguest.deedi.qld.gov.au/portal/site/qdex/search?REPORT_ID=6190&COLLECTION_ID=999›. ———. “Miscellaneous Pages. Including Hydro-Frac Report.” August 1977. Queensland Digital Exploration Reports. Company Report 6190_17. Brisbane: Queensland Department of Resources and Mines. 31 May 2012 ‹https://qdexguest.deedi.qld.gov.au/portal/site/qdex/search?REPORT_ID=6190&COLLECTION_ID=999›. ———. “Shotover # 1: Well Completion Report.” March 1977. Queensland Digital Exploration Reports. Company Report 5457_1. Brisbane: Queensland Department of Resources and Mines. 22 Feb. 2012 ‹https://qdexguest.deedi.qld.gov.au/portal/site/qdex/search?REPORT_ID=5457&COLLECTION_ID=999›. Howarth, Robert W., Renee Santoro, and Anthony Ingraffea. “Methane and the Greenhouse-Gas Footprint of Natural Gas from Shale Formations: A Letter.” Climatic Change 106.4 (2011): 679-690. Mathers, D. “Appendix 1: Water Analysis.” 1-2 August 1977. Brisbane: Government Chemical Laboratory. Queensland Digital Exploration Reports. Company Report 6054_4. Brisbane: Queensland Department of Resources and Mines. 21 Feb. 2012 ‹https://qdexguest.deedi.qld.gov.au/portal/site/qdex/search?REPORT_ID=6054&COLLECTION_ID=999›. ———. “Moura # 1: Testing Report Appendix D Fluid Analyses.” 2 Aug. 1977. Brisbane: Government Chemical Laboratory. Queensland Digital Exploration Reports. Company Report 5991_5. Brisbane: Queensland Department of Resources and Mines. 22 Feb. 2012 ‹https://qdexguest.deedi.qld.gov.au/portal/site/qdex/search?REPORT_ID=5991&COLLECTION_ID=999›. McClanahan, Elizabeth A. “Coalbed Methane: Myths, Facts, and Legends of Its History and the Legislative and Regulatory Climate into the 21st Century.” Oklahoma Law Review 48.3 (1995): 471-562. McEachern, Doug. “Mining Meaning from the Rhetoric of Nature—Australian Mining Companies and Their Attitudes to the Environment at Home and Abroad.” Policy Organisation and Society (1995): 48-69. McGraw, Seamus. The End of Country. New York: Random House, 2011. McKenna, Phil. “Uprising.” Matter 21 Feb. 2013. 1 Mar. 2013 ‹https://www.readmatter.com/a/uprising/›.McLeish, Kathy. “Farmers to March against Coal Seam Gas.” ABC News 27 Apr. 2012. 22 Apr. 2013 ‹http://www.abc.net.au/news/2012-04-27/farmers-to-march-against-coal-seam-gas/3977394›. Methane Drainage Taskforce. Coal Seam Methane. Sydney: N.S.W. Department of Mineral Resources and Office of Energy, 1992. Molan, Lauren. “A New Shift in the Global Energy Scene: Australian Shale.” Gas Today Online. 4 Nov. 2011. 3 May 2012 ‹http://gastoday.com.au/news/a_new_shift_in_the_global_energy_scene_australian_shale/064568/›. Montgomery, Carl T., and Michael B. Smith. “Hydraulic Fracturing: History of an Enduring Technology.” Journal of Petroleum Technology (2010): 26-32. 30 May 2012 ‹http://www.spe.org/jpt/print/archives/2010/12/10Hydraulic.pdf›. NHMRC (National Health and Medical Research Council). National Water Quality Management Strategy: Australian Drinking Water Guidelines 6. Canberra: Australian Government, 2004. 7 Sept. 2012 ‹http://www.nhmrc.gov.au/guidelines/publications/eh52›. Nixon, Rob. “Unimagined Communities: Developmental Refugees, Megadams and Monumental Modernity.” New Formations 69 (2010): 62-80. Osborn, Stephen G., Avner Vengosh, Nathaniel R. Warner, and Robert B. Jackson. “Methane Contamination of Drinking Water Accompanying Gas-Well Drilling and Hydraulic Fracturing.” Proceedings of the National Academy of Sciences 108.20 (2011): 8172-8176. Perkins, T.K., and L.R. Kern. “Widths of Hydraulic Fractures.” Journal of Petroleum Technology 13.9 (1961): 937-949. Porter, Seton M. “Carra # 1:Testing Report, Methane Drainage of the Baralaba Coal Measures, A.T.P. 226P, Central Queensland, Australia.” Oct. 1977. Queensland Digital Exploration Reports. Company Report 6054_7. Brisbane: Queensland Department of Resources and Mines. 21 Feb. 2012 ‹https://qdexguest.deedi.qld.gov.au/portal/site/qdex/search?REPORT_ID=6054&COLLECTION_ID=999›. ———. “Kinma # 1: Testing Report, Methane Drainage of the Baralaba Coal Measures, A.T.P. 226P, Central Queensland, Australia.” Oct. 1977. Queensland Digital Exploration Reports. Company Report 6190_16. Brisbane: Queensland Department of Resources and Mines. 21 Feb. 2012 ‹https://qdexguest.deedi.qld.gov.au/portal/site/qdex/search?REPORT_ID=6190&COLLECTION_ID=999›. ———. “Moura # 1: Testing Report: Methane Drainage of the Baralaba Coal Measures: A.T.P. 226P, Central Queensland, Australia.” Oct. 1977. Queensland Digital Exploration Reports. Company Report 6190_15. Brisbane: Queensland Department of Resources and Mines. 21 Feb. 2012 ‹https://qdexguest.deedi.qld.gov.au/portal/site/qdex/search?REPORT_ID=6190&COLLECTION_ID=999›. QDAFF (Queensland Department of Agriculture, Fisheries and Forestry). “Interpreting Water Analysis for Crop and Pasture.” 1 Aug. 2012. 1 May 2013 ‹http://www.daff.qld.gov.au/ 26_4347.htm›. Robin, Libby, and Mike Smith. “Prologue.” Desert Channels: The Impulse To Conserve. Eds. Libby Robin, Chris Dickman and Mandy Martin. Collingwood: CSIRO Publishing, 2010. XIII-XVII. Rogers, Rudy E. Coalbed Methane: Principles and Practice. Englewood Cliffs: Prentice Hill, 1994. Sell, B.H. “T.E.P.L. Moura No.1 Well Completion Report.” October 1969. Queensland Digital Exploration Reports. Company Report 2899_1. Brisbane: Queensland Department of Resources and Mines. 26 Feb. 2013 ‹https://qdexguest.deedi.qld.gov.au/portal/site/qdex/search?REPORT_ID=2899&COLLECTION_ID=999›. Senate. Management of the Murray Darling Basin: Interim Report: The Impact of Coal Seam Gas on the Management of the Murray Darling Basin. Canberra: Rural Affairs and Transport References Committee, 2011. Schraufnagel, Richard, Richard McBane, and Vello Kuuskraa. “Coalbed Methane Development Faces Technology Gaps.” Oil & Gas Journal 88.6 (1990): 48-54. Trigger, David. “Mining, Landscape and the Culture of Development Ideology in Australia.” Ecumene 4 (1997): 161-180. Walters, Ronald L. Letter to Dennis Benbow. 29 August 1977. In Seton M. Porter, “Moura # 1: Testing Report: Methane Drainage of the Baralaba Coal Measures: A.T.P. 226P, Central Queensland, Australia.” October 1977, 11-14. Queensland Digital Exploration Reports. Company Report 6190_15. Brisbane: Queensland Department of Resources and Mines. 21 Feb. 2012 ‹https://qdexguest.deedi.qld.gov.au/portal/site/qdex/search?REPORT_ID=6190&COLLECTION_ID=999›. WHO (World Health Organization). International Standards for Drinking-Water. 3rd Ed. Geneva, 1971. Wilkinson, Rick. A Thirst for Burning: The Story of Australia's Oil Industry. Sydney: David Ell Press, 1983. Wiltshire, M.J. “A Review to ATP 233P, 231P (210P) – Bowen/Surat Basins, Queensland for Houston Oil Minerals Australia, Inc.” 19 Jan. 1979. Queensland Digital Exploration Reports Database. Company Report 6816. Brisbane: Queensland Department of Resources and Mines. 21 Feb. 2012 ‹https://qdexguest.deedi.qld.gov.au/portal/site/qdex/search?REPORT_ID=6816&COLLECTION_ID=999›. Wooldridge, L.C.P. “Methane Drainage in the Bowen Basin – Queensland.” 25 Aug. 1978. Queensland Digital Exploration Reports Database. Company Report 6626_1. Brisbane: Queensland Department of Resources and Mines. 31 May 2012 ‹https://qdexguest.deedi.qld.gov.au/portal/site/qdex/search?REPORT_ID=6626&COLLECTION_ID=999›.
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "United States. Office of Research and Development. National Defense Research Committee"

1

Guerlac, Henry. Radar in World War II. Tomash, 1985.

APA, Harvard, Vancouver, ISO, and other styles
2

Radar in World War II. Tomash Publishers, 1987.

APA, Harvard, Vancouver, ISO, and other styles
3

Office, General Accounting. Drug control: Reauthorization of the Office of National Drug Control Policy : report to the Committee on Government Operations, House of Representatives. The Office, 1993.

APA, Harvard, Vancouver, ISO, and other styles
4

Development, United States Congress House Committee on National Security Subcommittee on Military Research and. Hearings on National Defense Authorization Act for fiscal year 1997--H.R. 3230 and oversight of previously authorized programs before the Committee on National Security, House of Representatives, One Hundred Fourth Congress, second session: Military Research and Development Subcommittee hearings on Title II--Research, development, test, and evaluation : hearings held March 5 and 12, 1996. U.S. G.P.O., 1997.

APA, Harvard, Vancouver, ISO, and other styles
5

United States. Congress. House. Committee on National Security. Subcommittee on Military Research and Development. Hearings on National Defense Authorization Act for fiscal year 1996--H.R. 1530 and oversight of previously authorized programs before the Committee on National Security, House of Representatives, One Hundred Fourth Congress, first session: Military Research and Development Subcommittee hearings on Title II--Research, development, test, and evaluation : hearings held March 28 and August 3, 1995. U.S. G.P.O., 1997.

APA, Harvard, Vancouver, ISO, and other styles
6

United States. Congress. House. Committee on National Security. Subcommittee on Military Research and Development. Hearings on National Defense Authorization Act for fiscal year 1997--H.R. 3230 and oversight of previously authorized programs before the Committee on National Security, House of Representatives, One Hundred Fourth Congress, second session: Military Research and Development Subcommittee hearings on Title II--Research, development, test, and evaluation : hearings held March 5 and 12, 1996. U.S. G.P.O., 1997.

APA, Harvard, Vancouver, ISO, and other styles
7

United States. Congress. House. Committee on National Security. Subcommittee on Military Research and Development. Hearings on National Defense Authorization Act for fiscal year 1996--H.R. 1530 and oversight of previously authorized programs before the Committee on National Security, House of Representatives, One Hundred Fourth Congress, first session: Military Research and Development Subcommittee hearings on Title II--Research, development, test, and evaluation : hearings held March 28 and August 3, 1995. U.S. G.P.O., 1997.

APA, Harvard, Vancouver, ISO, and other styles
8

Hearings on National Defense Authorization Act for fiscal year 1996--H.R. 1530 and oversight of previously authorized programs before the Committee on National Security, House of Representatives, One Hundred Fourth Congress, first session: Military Research and Development Subcommittee hearings on Title II--Research, development, test, and evaluation : hearings held March 28 and August 3, 1995. U.S. G.P.O., 1997.

APA, Harvard, Vancouver, ISO, and other styles
9

Hearings on National Defense Authorization Act for fiscal year 1998--H.R. 1119 and oversight of previously authorized programs before the Committee on National Security, House of Representatives, One Hundred Fifth Congress, first session: Military Research and Development Subcommittee hearings on Title II--Research, development, test, and evaluation : hearings held February 27, 28, March 6, 13, and May 7, 1997. U.S. G.P.O., 1998.

APA, Harvard, Vancouver, ISO, and other styles
10

Office, General Accounting. Drug control: An overview of U.S. counterdrug intelligence activities : report to the Chairman, Subcommittee on National Security, International Affairs, and Criminal Justice, Committee on Government Reform and Oversight, House of Representatives. The Office, 1998.

APA, Harvard, Vancouver, ISO, and other styles
More sources
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography