Search

Search results

  1. MIDCAREER COURSE NO. 8 COURSE REPORT

    students complained about the use of too much "computer jargon" which appeared to confuse ... reported having acquired a previously lacking appreciation for the use of computers in the intelligence ... in Society" or Robert Ryan on "Urbanization", some of the key points of these talks were covered ...

  2. NOTICE OF JOINT LEGISLATIVE HEARINGS ON PRIVACY AND GOVERNMENT INFORMATION SYSTEMS

    of these studies, "Records, Computers and Rights of Citizens," was ordered by the former Secretary ... legislation, in 1971 on "Fed- eral Data Banks, Computers and the Bill of Rights," and in 1969 ... to acquire and keep and share information about citizens is en- hanced by computer technology ...

  3. TINKER, TURNER, SAILOR, SPY

    from some of the more exaggerated forms of congressional scrutiny, such as the Hughes-Ryan` Amendment, which gives more than 200 ... not a computer. While there was great resentment of Schlesinger's ac- tions, there was consequently a general ... the computers printed out the name of one of the top clandestine operatives in Western Eu- rope, a man ...

  4. TWO HUNDRED AND TWENTY SECOND MEETING WEDNESDAY, JUNE 6, 1979

    The number will be placed on source document microfiche in an NMA format (98 page) and Computer Output ... Executive Seccr 8arT FROM!/David Ryan Reference memorandum, SECOM-D-529, o S TAT Executive Secretary, SECOM, ...

  5. TALKING POINTS DCI MEETING WITH SECDEF-- 19 NOVEMBER 1982

    is being wings. The modified Air Force/Teledyne Ryan BQM-34F Firebee target drone is designed to perform high-risk ... control. software integration, and the NATO-fund- ^ Target recognizer technology for the ed large computer ...

  6. CONGRESS AND INTELLIGENCE OVERSIGHT

    repealed the con- gressionaJ reporting requirement of the un- workable Hughes-Ryan amendment and re- quired ... decisions which thousands of computers can never make. If we are to maintain a successful intelligence ...

  7. ADMIRAL STANSFIELD TURNER, DCI, ADDRESS TO AMHERST, SMITH, VASSAR AND WILLIAMS, WASH., D.C., ALUMNI CLUBS 19 MARCH 1980

    intelligence information on technology, on satellites, on listening posts, on computers, on data processing. ... The Hughes-Ryan Amendment, enacted in 1974 requires that anytime we are to undertake covert action, we must notify ...

  8. (UNTITLED)

    that. comp uters and computer present Export Control rules and p parts,- which with the enemy in time ... dren-even if Reds-to escape from (By Richard A. Ryan) heavily Negro schools. So the experiment ...

  9. CONGRESS AND INTELLIGENCE OVERSIGHT

    requirement of the un- workable Hughes-Ryan amendment and re- quired that significant, anticipated intelli- ... decisions which thousands of computers can never make. If we are to maintain a successful intelligence ...

  10. RECENT SPEECHES BY DIRECTOR OF CENTRAL INTELLIGENCE, WILLIAM H. WEBSTER

    a Dallas communications firm. 4. Mike Ryan: Mike worked on the Economic Crime Proposal and also helped ... develop the Hostage Crisis Center. He also worked on the Bureau's computer programs under Assistant ...

  11. ADDRESS OF THE HARVARD UNIVERSITY JOHN F. KENNEDY SCHOOL OF GOVERNMENT EXECUTIVE PROGRAM IN NATIONAL AND INTERNATIONAL SECURITY

    page 5 BG Michael E. Ryan, USAF Air Force Mr. Anthony D. Salvucci, Department of the Air Force MG Roger ... courts. He has published extensively in the fields of civil procedure, copyright, and privacy and computer ...

  12. PIKE RESPONSE PRODUCTION OF NATIONAL INTELLIGENCE

    and maintenance problems with their third-generation RYAN computer series. This estimate had important ... of a major plague that could have caused massive crop destruction.-Computer technology has long been an area ... military capabilities. For the Soviets,, the RYAD was the first series of computing machines designed ...

  13. JOURNAL- OFFICE OF LEGISLATIVE COUNSEL FRIDAY- 29 OCTOBER 1965

    would raise the neces- sary revenue. Some would be more desir- able than others. When computing tax liability ... the approximately 1.800 computers installed directly in Federal agencies. The Bureau of the Budget recently esti- ... mated that an additional 3.600 computers are employed in unique military opera- tions and by private ...

  14. 1976 ANNUAL REPORT AEROSPACE INDUSTRIES ASSOCIATION

    equiprrdeent, computer manufacturers and the academic community. The report treats all aspects of automatic ... the project managership. Computer Aided Manufacturing (CAM) The project to establish a long range plan ... for Computer Aided Manufacturing (CAM) was completed and the report. presents a discussion of each project ...

  15. COMMERCIAL BUILDINGS CHAPTER FIVE

    (see Fig. 2-61). All engineering design computations, of course, are based on actual sizes. ... to those in the Medical Arts Building.- norct-r rO12 DQIC1C berTT STI2A1G-11-r b.A.25? cOLurnn F. COMPUTER APPLICATIONS ... of the computer. Numerous architectural and engineering offices now use the digital computer to more efficiently ...

  16. MAKING IN ORDER THE CONSIDERATION OF H.R. 5171, USE OF DATA PROCESSING EQUIPMENT BY FEDERAL DEPARTMENTS AND AGENCIES

    purchase, buy, or otherwise utilize a given data computer? Mr. FORD. That is correct. Mr. BROOKS. ... and technical data computers that would ob- viously be for unique defense and secu- Declassified in Part- ... and which were really be- yond the ken of the average computer expert and, can justifiably be classified as sPecialized ...

  17. SCIENTIFIC ABSTRACT RYSAKOV, N.P.- RYSANEK, A.

    V..M.-'_---" TITLE: Appro,,dmate methods of computation and simulation techniques of transient processes ... and require application of a computer even for simple signals of the type & (t), are of interest, however, ... a computer solution but special cases, such as with negligible upper layer conductance, are easily handled ...

  18. H.R. 5092- REGISTRATION OF NSDD'S: HEARING BEFORE BROOKS SUBCOMMITTEE

    and NSDD 145 which established a role for the National Security Agency in the government's computer ... AGENCY-IN CHARGE OF THE COMPUTER SECURITY--FOR THE ENTIRE FEDERAL GOVERNMENT AND PARTS OF THE PRIVATE ... and pre-publication censorship; NSDD145, concerning computer security standards; NSDD 259, outlining protection plans ...

  19. REPORT ON THE 26TH SESSION OF THE NATIONAL INTERDEPARTMENTAL SEMINAR

    T. Daly, Chief of the U. S. Military Supply Mission to India; Army Major General Ward S. Ryan, Chief, ... if they had "asked" the computer for background on Col. Abel or perhaps Co. Pentkovsky (sic). Somehow the CIA mission, ... would have a computer and an operations center and did not have to be shown these. I was impressed 25X1A ...

  20. PENTAGON PRESSED TO NAME MANPOWER COMMISSION

    Subcommittee." Retired Pay Computation The Comptroller General ruled this week that the retired rank and there- ... ability retirement pay to be computed on the rank to which he is eligible for promo- tion ... guards-Ziegler, Ryan. Right tackles-Doremus, Weaver, Kovacik. Right ends-Mischak, Chamberlin. Quart, rbacks-Vann, ...

Pages