Advanced search Help
Clear all search criteria
Only 2/3! You are seeing results from the Public Collection, not the complete Full Collection. Sign in to search everything (see eligibility).
-
Dual Channel Matched Filtering and Space-Time Adaptive Processing
We propose a dual channel matched filtering system that addresses two key challenges in the practical implementation of a single channel matched filtering system: secondary data support and computational cost. We derive an exact expression of the dual channel normalized signal-to-interference plus noise ratio (SINR) in terms of random variables with known distributions and approximate expressions of the mean and variance of the normalized SINR. Using these approximate expressions, we demonstrated that the dual channel system requires half the secondary data to achieve nearly the same SINR performance as an equivalent single channel system. With the dual channel system, two reduced dimension weight vectors are used in place of the larger single channel weight vector, offering the potential reduction in computational cost. The key to the dual channel system is the efficient block diagonalization of the interference plus noise correlation matrix with a fixed transformation. The dual channel system is a viable replacement for a single channel system in applications involving real, wide-sense stationary random processes. We investigate the application of this dual channel concept to the problem domain of space-time adaptive processing (STAP), referring to the system as Block STAP. We provide evidence that the family of STAP correlation matrices cannot be simultaneously block diagonalized with a fixed transformation and thus, the implementation of the Block STAP processor will be suboptimal. We propose a transformation selection criterion for minimizing the loss in SINR performance of a suboptimal Block STAP processor. Finally, we introduce the SINR metric and a new eigen-based, reduced-rank direct form STAP processor based on the SINR metric. The SINR metric is used to identify the eigenvectors of the correlation matrix that have the greatest impact on SINR performance of a direct form processor. If the rank reduction transformation is constructed from r eigenvectors of the correlation matrix, then the r eigenvectors with the largest SINR are the optimal set of eigenvectors in terms of minimizing the loss in SINR performance of an eigen-based, reduced-rank direct form processor.
Air Force Institute of Technology (U.S.)
Berger, Scott D.
1999-06
-
Protestant Paramilitaries in Northern Ireland, 1969-1992
Northern Ireland has been the scene of a violent conflict between Catholics and Protestants for the past thirty years. Each side in the conflict has its own paramilitary or terrorist groups. The Catholic terrorists, the Irish Republican Army (IRA), are well known. However, the Protestant community produced its own band of terrorists who are responsible for about one third of deaths related to the conflict. This thesis is a case study of those Protestant paramilitary organizations in Northern Ireland and the nature of what has been described as "pro-state" terror. It examines the rise of two key paramilitary groups, the Ulster Volunteer Force (UVF) and the Ulster Defense Association (UDA), as well as their composition, operations, and shortcomings. The roots of the paramilitary activity, Protestant strategic culture, and Ulster Protestants' unique relationship with Great Britain are discussed. The close relationship with Britain led to claims of security force collusion with the Protestant groups. This notion of collusion and a specific intelligence operation against the UDA involving a British Army agent, Brian Nelson, are assessed. The thesis concludes with observations regarding the impact of Protestant paramilitaries on the conflict and the need for continued intelligence on their activities and intentions.
Naval Postgraduate School (U.S.)
Rose, Robert E.
1999-06
-
Assessing the Fire Investigation and Fire Code Enforcement Practices of Arkansas Fire Departments
"The problem facing fire jurisdictions in Arkansas is that they receive little or no training or intervention from the state regarding fire code enforcement, fire cause investigations and or the necessary training to support these activities. The purpose of this applied research project was to identify the current fire code enforcement and fire investigation practices of surveyed Arkansas Fire Departments. A historical research methodology was employed to gain information concerning practices of the Arkansas Fire Marshal's Office. A descriptive research methodology was used to analyze the fire investigation and fire code enforcement practices of Arkansas Fire Departments. The descriptive research questions: 1. Are Arkansas Fire Departments capable of conducting fire code enforcement activities? 2. Are Arkansas Fire Departments conducting the fire code inspection activities required by Act 411 of 1989? 3. What are the fire investigation practices of Arkansas Fire Departments? 4. What fire code enforcement and fire investigation services are needed by Arkansas Fire Departments from the Arkansas Fire Marshals Office? A survey concerning fire investigation and fire code enforcement practices was mailed to all nine hundred eighteen fire departments known to exist in the state of Arkansas. The results of this research project illustrate that the majority of Arkansas Fire Departments responding to the survey are incapable of adequately fulfilling the tasks of fire code enforcement and fire investigation. Proactive legislative action is required to impact the problem and bring about proper levels of staffing and an increase in funding for the Arkansas Fire Marshal's Office."
National Fire Academy
Davis, Edward V.
1999-06
-
Intelligence Essentials for Everyone
"In this paper, the author has articulated clearly the fundamentals of sound intelligence practice and has identified some guidelines that can lead toward creation of a solid intelligence infrastructure. These signposts apply both to government intelligence and to business. Good intelligence should always be based on validated requirements, but it may be derived from a wide variety of sources, not all of which are reliable. Understanding the needs of the consumer and the sources available enable an analyst to choose the correct methodology to arrive at useful answers. The author has laid out in clear, concise language a logical approach to creating an infrastructure for government and business. Every system will have flaws but this discussion should help the reader minimize those weaknesses. It is an important contribution to the education of government and business intelligence professionals."
Joint Military Intelligence College (U.S.)
Krizan, Lisa
1999-06
-
Use Multiple Data Sources for Safer Emergency Response
"The Environmental Protection Agency (EPA) issued this Alert as part of its ongoing effort to protect human health and the environment by preventing chemical accidents. EPA is striving to learn the causes and contributing factors associated with chemical accidents and to prevent their recurrence. Major chemical accidents cannot be prevented solely through command and control regulatory requirements. Rather, understanding the fundamental root causes, widely disseminating the lessons learned, and integrating these lessons learned into safe operations is also required. EPA publishes Alerts to increase awareness of possible hazards. It is important that facilities, SERCs, LEPCs, emergency responders and others review this information and take appropriate steps to minimize risk."
United States. Environmental Protection Agency
1999-06
-
Department of Energy: DOE's Nuclear Safety Enforcement Program Should Be Strengthened, Report to the Chairman, Committee on Commerce, House of Representatives
"Since 1988, DOE has issued enforceable rules covering only 2 of 11 safety areas originally proposed radiation protection for workers and quality assurance issues that define how work is planned and carried out. The other nine safety areas not included in the rules, such as training and certification of employees performing vital operations, are still covered in DOE orders, and DOE generally includes compliance with them as part of its contracts. However, enforceable rules provide another mechanism to help DOE ensure safe nuclear practices. DOE officials said that finalizing safety rules has gone slowly for several reasons, including the need to work on other safety issues and internal discussions about how best to proceed. DOE currently has no definite schedule for issuing additional rules. Not elevating safety orders to the status of enforceable rules means that DOE has fewer options to ensure that contractors are meeting safety requirements and quickly correcting any deficiencies. Nuclear safety rules are to be enforced at any DOE facility with the potential to cause radiological harm to workers, the public, or the environment. Although no problems have been identified with the application of the occupational radiation protection rule, DOE field offices have been inconsistent in the degree to which they have placed facilities under the quality assurance rule. For example, closed-down nuclear reactors are subject to the rule at DOEs Savannah River site in South Carolina, but not at the Hanford site in Washington State. Not properly classifying DOE facilities as subject to the rules could potentially affect the type of safety oversight carried out by contractors, as well as the enforcement activity undertaken by DOE."
United States. Government Accountability Office
1999-06
-
Nuclear Weapons: DOE Needs to Improve Oversight of the $5 Billion Strategic Computing Initiative, Report to the Chairman, Subcommittee on Military Procurement, House Committee on Armed Services
"Historically, the United States used actual nuclear detonations as the primary method of validating designs and certifying the weapons as safe and reliable. Since September 1992, there has been a moratorium on testing. To ensure the continued safety and reliability of nuclear weapons, the Department of Energy (DOE), which is responsible for designing and building nuclear weapons, developed the 15-year Stockpile Stewardship and Management Program in 1995 as a substitute for actual testing. The stockpile stewardship program employs a variety of means to ensure weapons safety and reliability, including examining weapons, conducting laboratory experiments and tests, and conducting computer modeling and simulation. The computer modeling and simulation part of the program is known as the Accelerated Strategic Computing Initiative (ASCI). The ASCI program aims to replace actual testing with advanced computer models that will simulate nuclear detonations. This effort requires modeling in 3-dimensions (3-D), with higher resolution than previous models and with better treatment of the underlying physical processes that occur during an actual nuclear detonation. To run the models, DOE is developing, as part of the ASCI program, the largest and fastest computers, which may ultimately be able to perform 100 trillion mathematical operations per second"10,000 times more powerful than those used to design the weapons originally. The ASCI program is expected to cost about $5.2 billion for fiscal years 1996 through 2004."
United States. Government Accountability Office
1999-06
-
Wireless Performance Evaluation Comparison & Applicability Report
"The Commercial Wireless Applicability Report provides a tool for public safety communications system planners to help them make informed decisions when considering the use and purchase of commercial wireless services. This report identifies key characteristics of commercial wireless services, analyzes these services, and compares and evaluates these services based on the communication requirements of the public safety community."
United States. Department of Homeland Security. SAFECOM
1999-06
-
Technical Information Bulletin 99-5: ITU-T GII Standardization Initiative
This Technical Information Bulletin was prepared by ARTEL, Inc. for the National
Communications System (NCS), Technology and Standards Division, under contract DCA100-97-C-0069. The purpose of this Bulletin is twofold: First to describe a major initiative on the part of the International Telecommunication Union (ITU) to facilitate the development of a global information infrastructure (GII). In this regard, the Figures contained in Section 2 have been extracted from the relevant ITU documentation with permission from the Deputy Director, ITU
Telecommunication Standardization Bureau (TSB). The second purpose of this Bulletin is to provide an independent assessment of the significance of
the GII Program Initiative for achieving national security and emergency preparedness standardization objectives. It will be pointed out that the basic framework concepts that have been developed under the ITU program initiative, and published in the "Y-series" of ITU-T Recommendations, provide the essential core foundation upon which all future developmental
efforts will depend.
National Communications System (U.S.). Office of the Manager
1999-06
-
Maritime Security Report [June 1999]
Three international port security training courses were organized and managed by the U.S. Maritime Administration (MARAD) and conducted during the autumn of 1998 in Panama, Peru, and Barbados as principal activities of the Infer-American Port Security, Training Program (IAPSTP). The venues selected for the week- long courses attracted 100 regional participants from port authority police and security personnel as well as coast guard, customs service, and national police organizations from Central and South America and the Caribbean. The training team consisted of experienced professionals from the Port of Miami, the U.S. Customs Service, and the Port Authority of New York and New Jersey Police. The multinational format of the IAPSTP courses provided each group of participants the opportunity for five days of interaction with their regional counterparts on port and cargo security issues of mutual concern. As a result, insightful recommendations were developed for follow-on activities through regional cooperative initiatives. The recommendations are an important product of the training and constitute a transfer of technical information and expertise to the participants as well as an enhancement to Western Hemispheric international relations. Many of the recommendations are relevant to the goals and objectives of existing multilateral initiatives involving the United States and the other OAS member countries. For example, by focusing the emphasis of near-term activities on the Caribbean sub region, security elements of the principles contained in the 1997 Bridgetown Accord can be further advanced, resulting in multilateral mutual benefits and precedence for wider regional agreement.
United States. Department of Transportation
1999-06
-
Toward Improved Geographic Information Services within a Digital Government
The worlds of computer and information sciences, statistics, geography, ecology, and cognitive science all converge in Geographical Information Systems (GIS) to provide glimpses into the world we live in. The ultimate application of any particular GIS view of the world can be as diverse as building a dam, planning a city, combating terrorism, or charting the destruction of a rain forest. While specific applications of GIS are diverse, the essential need is to share data across sources. In effect, any data from any source could be required for any GIS application regardless of whether the analysis is sponsored by government agency or private interest. To address the need for cooperation across government, academia, and industry as well as among research disciplines, an invitational workshop was held to begin defining a research agenda for geographic information systems and technologies. This workshop was held in response to the Digital Government Initiative (DGI) of the Federal Information Services and Applications Council. The recommendations from the workshop that are summarized in this report strongly support the need for cooperation in setting the national GIS research agenda and in linking innovative research with practice. The final recommendation specifically addresses the need for a national prototyping center that would not only bring together research results and experts but also provide a natural link among the communities focused on research, practice, and policy. All three of these communities are necessary to successfully define, develop, and fund a national GIS agenda.
National Science Foundation (U.S.)
1999-06
-
Shifting Paradigm of Post-Cold War Counterintelligence Support to USAF Operations: A Middle Eastern Case Study
"The threat to US Operations in the Middle East has changed significantly since the end of the Cold War, and although counterintelligence methodology has changed with it, additional modifications are needed. This thesis demonstrates the gap that has emerged in the ability of counterintelligence forces to counter the threat. Increased military presence in the Middle East and the removal of the Cold War's checks and balances increase the impact of 'rogue states' and non-state actors. Current counterintelligence methodology fails to adequately address the non-state-based threat. Revolutionary information technologies and the proliferation of nuclear, chemical and biological weapons ensure that non- state actors will pose a counterintelligence threat as great, or greater, than the state-based threat. The implication of this is significant. The Air Force Office of Special Investigations (AFOSI), the USAF Agency tasked with counterintelligence support, must restructure itself to meet this emerging threat. A Classified annex to this thesis is published under separate cover. This annex outlines current AFOSI methodology and makes policy recommendations to allow AFOSI to better address the non-state-based threat."
Naval Postgraduate School (U.S.)
Lajeunesse, Gabriel C.
1999-06
-
High Resolution Modeling of a Terrorist Chemical Attack in an Urban Area
"This thesis demonstrates the use of Janus in Modeling Military Operations Other Than War, MOOTW. Janus has many uses throughout the United States military. Lately, MOOTW have become a major percentage of the U.S. military's efforts. Using Janus to model these operations can help predict casualties, determine if new pieces of equipment make a difference in the operation, and help evaluate "what ifs" in operations. More importantly, conducting a simulation before carrying out an actual exercise saves money and people's time and effort. The threat of a terrorist chemical attack is a very likely event in this day and age as demonstrated by the 1995 chemical attack in a Japanese subway. Current U.S. policy has allocated certain resources to assist local governments in the event of an emergency. Unfortunately, these assets can not immediately respond to a chemical crisis. Time waiting for these assets to arrive must be spent wisely to save lives. Local governments do not all have the same capabilities available to respond to a chemical attack. Using a high resolution combat model such as Janus at the local level will help determine assets that will save lives and money."
Naval Postgraduate School (U.S.)
Broadwater, Jeffery D.
1999-06
-
Marine Corps Strategy 21
"Marine Corps Strategy 21 is our axis of advance into the 21st century and focuses our efforts and resources toward a common objective. It is by design a broad axis, that will adapt to changes in the strategic environment. This strategy enables the Marine Corps to build upon its foundations of heritage, innovation, and excellence to move beyond the objective and succeed on tomorrows battlefields. Marine Corps Strategy 21 provides the vision, goals, and aims to support the development of future combat capabilities. It provides our strategic guidance to the active and reserve Marines, sailors, and civilian personnel who will make Americas Marines, win our Nations battles, and create quality citizens by optimizing the Corps operating forces, support and sustainment base, and unique capabilities; and capitalizing on innovation, experimentation, and technology."
United States. Marine Corps
1999-06
-
Responding to the Threat of Cyberterrorism through Information Assurance
"The number of people connecting to the Internet is growing at an astounding rate: estimates range from 100% to 400% annually over the next five years. This unprecedented level of interconnectedness has brought with it the specter of a new threat: cyberterrorism. This thesis examines the impact of this threat on the critical infrastructure of the United States, specifically focusing on Department of Defense issues and the National Information Infrastructure (NII). A working definition for cyberterrorism is derived, and a description of the Nation's critical infrastructure is provided. A number of possible measures for countering the threat of cyberterrorism are discussed, with particular attention given to the concept of information assurance. Information assurance demands that trustworthy systems be developed from untrustworthy components within power-generation systems, banking, transportation, emergency services, and telecommunications. The importance of vulnerability testing (or red-teaming) is emphasized as part of the concept of information assurance. To support this, a cyberterrorist red team was formed to participate in the Marine Corps' Urban Warrior Experiment. The objective of this thesis is to address the impact of these issues from a Systems Management perspective. This includes taking into account the changes that must occur in order to improve the U.S.' ability to detect, protect against, contain, neutralize, mitigate the effects of, and recover from attacks on the Nation's Critical Infrastructure."
Naval Postgraduate School (U.S.)
Ogren, Joel G.; Langevin, James R.
1999-06
-
President's National Security Telecommunications Advisory Committee (NSTAC): Network Group Report [June 1999]
"Since the last meeting of the President's National Security Telecommunications Advisory Committee (NSTAC) in September 1998, the Network Group (NG) has directed its efforts to four activities. Two of these activities involve the NG's ongoing responsibilities: facilitating the exchange of network security research and development (R&D) information between industry and Government and overseeing the NSTAC Network Security Information Exchange (NSIE). Discussions at NSTAC XX resulted in an additional tasking that has now been completed: examining how national security and emergency preparedness (NS/EP) operations might be affected by a severe disruption of Internet service. Lastly, in conjunction with the gap analysis effort by the Office of the Manager, National Communications System (OMNCS), NG members provided their individual perspectives on the Public Network (PN) Alternative Analysis Report developed by the OMNCS. R&D Exchange: The NG's network security R&D Exchange was held in collaboration with Purdue University's Computer Operations, Audit, and Security Technology Laboratory (COAST), the Institute of Electrical and Electronics Engineers (IEEE), and the Office of Science and Technology Policy (OSTP) at a workshop on security in large-scale distributed systems, held at Purdue University on October 20-21, 1998. The R&D Exchange addressed the growing convergence of telecommunications and the Internet, and methods for improving the collaboration among industry, Government, and academia on R&D efforts. NSIE: During the previous NSTAC cycle, the Government and NSTAC NSIEs sponsored a workshop on the insider threat to information systems and developed two white papers to provide background material for the workshop. The workshop offered an overview of the emerging insider threat and suggested measures organizations could take to reduce their vulnerability to it. During the current NSTAC cycle, the NSIEs developed an After-Action Report reflecting the insights that emerged from the workshop discussion so this material can be shared with a broader audience. The NSIEs also completed their 1999 Assessment of the Risk to the Security of the Public Network. Lastly, the NSTAC NSIE charter was amended to bring it in line with the way the NSIEs function. Internet Issue: Following discussion at NSTAC XX, the Industry Executive Subcommittee (IES) tasked the NG to examine how NS/EP operations might be affected by Internet failures over the next 3 years. At NSTAC XXI, the NG presented a status update of the problem and discussed data gathering efforts. The NG completed its report and has made recommendations to both the President and the NSTAC. Gap Analysis: As part of its effort to identify alternative PN telecommunications services that are partially or totally non-dependent on the PN during various levels of service impairment, the OMNCS developed a PN Alternatives Analysis Report. NG members were asked to consider the thoroughness of selected alternatives, consistency of evaluations, accuracy of information, and ease of understanding."
United States. President's National Security Telecommunications Advisory Committee
1999-06
-
President's National Security Telecommunications Advisory Committee (NSTAC): Legislative and Regulatory Group Report [June 1999]
This President's National Security Telecommunications Advisory Committee (NSTAC) report discusses "The Fiscal Year 1999 Omnibus Spending Law (Public Law 105-277) passed in November 1998, [which] includes a provision that directs the Office of Management and Budget (OMB) to revise Circular A-110 to ensure that all data produced under an award will be made available to the public through the procedures established under the Freedom of Information Act (FOIA). At a practical level, Congress is requiring Federal agencies to proactively collect all data that meets the criteria of the legislation. As a result, information voluntarily provided by the telecommunications and/or information industry relating to protecting critical infrastructures (e.g., information pursuant to PDD-63), as well as background data supporting the voluntarily provided information, could be subject to FOIA requests. Thus, the proposed revision to Circular A-110 could impact information sharing between industry and Government by increasing industry concerns regarding the release of sensitive threat and vulnerability data. The LRG initiated review of the proposed revision and is assessing options for safeguarding against potentially increased exposure of the telecommunications and information industries to FOIA. Per a request by the President's Council on Y2K Conversion, the IES tasked the LRG to look at relevant Year 2000 (Y2K) legal and regulatory issues, particularly the success of the Y2K Readiness and Disclosure Act in being a catalyst to information sharing within industry. The LRG sent a letter to the NSTAC's IES representatives seeking comments on the Y2K Act and any additional legislative or regulatory actions that could facilitate Y2K-related information sharing and remediation. While a limited number of companies responded and no consensus was achieved, valuable information was received from the participating NSTAC companies. A nonattributional summary of the responses was shared with the Council in February 1999."
United States. President's National Security Telecommunications Advisory Committee
1999-06
-
Science at Its Best, Security at Its Worst: A Report on Security Problems at the U.S. Department of Energy: Appendix
This document is an appendix to the full report with the same name regarding security problems at the U.S. Department of Energy. This appendix provides a chronology of events and DOE reports, a damage assessment of China's acquisition of U.S. nuclear information, presidential directive 61, a bibliography, and a map of DOE field facilities.
President's Foreign Intelligence Advisory Board (U.S.)
1999-06
-
Fleet Support Community: Meeting Its Mission in the 21st Century
This thesis evaluates the effectiveness of the Fleet Support community's management practices in meeting the dynamic changes in the complex fleet support arena, while increasing its value to the Navy in the future. The Fleet Support community's mission statement was used as a benchmark in the evaluation process. Data on billet base management, accession policies, education and the detailing process were evaluated against the mission statement to determine the extent to which these practices support it. The results of the study indicate that current practices provide limited support in meeting the Fleet Support community's mission statement.
Naval Postgraduate School (U.S.)
Murdy, Deanna M.
1999-06
-
Transnational Threats from the Middle East: Crying Wolf or Crying Havoc?
There is no doubt that the Middle East can present significant potential threats to the West. The author of this monograph examines these threats in order to put them into perspective to distinguish between "crying wolf' and "crying havoc." After thorough analysis, he contends that the problems caused by narcotics and organized crime, immigration, terrorism, and weapons of mass destruction do not as yet require draconian action by the Western nations. However, he asserts that if the threats of Middle Eastern terrorism and proliferation were to be combined into super-terrorism, the result would create a new form of asymmetric warfare for which the West is singularly ill-prepared.
Army War College (U.S.)
Cordesman, Anthony H.
1999-05-31
-
Japan's Maritime Imperative
"This thesis identifies factors that may induce Japan to create greater military capabilities and normalize military force as a potential source of national power in its security policies. A realist theoretical framework for analysis and assumptions is constructed. It consists of Great Power Theory, the Law of Comparative Advantage, and the Utility of Military Force, and dismisses the artificial divisions between levels of analysis. The thesis examines the failure of Japan's national security doctrine in the post-Cold War world. It explores the impact of economics, Japan's national goals, security threats, and the US-Japan alliance on the country's construction and normalization of increased military capabilities. Japan's primary obstacles to military normalization, Article 9 of its constitution and domestic opinion, are assessed. The thesis concludes that Japan's national talents, production capabilities, and status as a maritime nation make it likely that it will construct more capable naval forces to respond to imperatives in the post-Cold War environment."
Naval Postgraduate School (U.S.)
Goff, Jonathan C.
1999-06
-
Development of a Common Security and Defense Policy in Europe
"Since the end of the Cold War, multifaceted risks have constituted the main danger to the security of Europe. These range from interstate disputes and social, ethnic, religious and economic crises, to the effects of globalization on economic and ecological development. To face these risks, the European nations, unified within the European Union, are going to develop along with their common economic and financial policies a common, .integrated, mutually agreed-upon security and defense policy. Last year, the British initiative to take the lead in creating a European Union defense force calls to mind the European Defense Community Treaty (EDC) of 1952, which was a remarkable attempt by Western European powers to develop a supranational European army. France's failure to endorse the EDC Treaty made it perfectly clear that France is a key actor in European security, and is crucial to the progress of a common security and defense policy in Europe. The recent Franco-British joint declaration on European defense is reminiscent of the Treaty of Amsterdam, which sketched out a new framework of a common foreign and security policy (CFSP) in Europe and will come into force this year. All have in common the attempt to integrate the European nations' security and defense policies into a common framework in order to overcome the prevalence of national interests in the area of security and defense issues."
Naval Postgraduate School (U.S.)
Kleindienst, Ralf
1999-06
-
Science at Its Best, Security at Its Worst: A Report on Security Problems at the U.S. Department of Energy
"Specifically, the President asked the PFIAB to 'address the nature of the present counterintelligence security threat, the way in which it has evolved over the last two decades and the steps we have taken to counter it, as well as to recommend any additional steps that may be needed.' He also asked the PFIAB 'to deliver
its completed report to the Congress, and to the fullest extent possible consistent with our national security, release an unclassified version to the public.'"
President's Foreign Intelligence Advisory Board (U.S.)
1999-06
-
FinCEN Advisory: Black Market Peso Exchange Update, June 1999, Issue 12
The FinCEN Advisory "...is a recurring series designed for the financial, regulatory and law enforcement communities. Subsequent advisories will describe trends and developments related to money laundering and financial crime." In this issue of FinCEN: "FinCEN Advisory Issue 9 (November 1997) discussed in detail a largescale, complex money laundering system that is used extensively by Colombian drug cartels to launder the proceeds of United States narcotics sales. The system is called the Black Market Peso Exchange (BMPE) because its purpose is to facilitate 'swaps' of dollars owned by the cartels in the United States for pesos already in Colombia, by selling the dollars to Colombian businessmen who are seeking to buy United States goods for export."
Financial Crimes Enforcement Network (U.S.)
1999-06
-
'Crisis on the Coast:' Federal on Scene Coordinator's Report and Assessment of M/V New Carissa Oil Spill Response, Volume II
This document describes the grounding of the M/V New Carissa near Coos Bay, Oregon on February 3, 1999 and the subsequent measures taken to prevent a large-scale oil spill from resulting. "The grounding of the M/V NEW CARISSA was unusual in that the ship became grounded twice, the response set a precedent by burning the ship's oil on board, and extraordinary means, including 69 rounds from a Navy destroyer and a MK-48 torpedo from a nuclear-powered submarine, were required to sink the ship in order to reduce the risk of a major oil spill. This document describes the 'macro' issues we encountered and the lessons learned during a complex pollution response that spanned 106 days. This document also includes an in-depth discussion of some of the key issues that arose between the grounding on 4 February 1999 and my determination on 20 May that the substantial threat of a discharge had been mitigated."
United States. Environmental Protection Agency; United States. Coast Guard
Hall, M.J.
1999-06
-
'Crisis on the Coast:' Federal on Scene Coordinator's Report and Assessment of M/V New Carissa Oil Spill Response, Volume I
This document describes the grounding of the M/V New Carissa near Coos Bay, Oregon on February 3, 1999 and the subsequent measures taken to prevent a large-scale oil spill from resulting. "The grounding of the M/V NEW CARISSA was unusual in that the ship became grounded twice, the response set a precedent by burning the ship's oil on board, and extraordinary means, including 69 rounds from a Navy destroyer and a MK-48 torpedo from a nuclear-powered submarine, were required to sink the ship in order to reduce the risk of a major oil spill. This document describes the 'macro' issues we encountered and the lessons learned during a complex pollution response that spanned 106 days. This document also includes an in-depth discussion of some of the key issues that arose between the grounding on 4 February 1999 and my determination on 20 May that the substantial threat of a discharge had been mitigated."
United States. Environmental Protection Agency; United States. Coast Guard
Hall, M.J.
1999-06
-
Formalization and Proof of Secrecy Properties
"After looking at the security literature, you will find secrecy is formalized in different ways depending on the application. Applications have threat models that influence our choice of secrecy properties. A property may be reasonable in one context and completely unsatisfactory in another if other threats exist. The primary goal of this panel is to foster discussion on what sorts of secrecy properties are appropriate for different applications and to investigate what they have in common. We also want to explore what is meant by secrecy in different contexts. Perhaps there is enough overlap among our threat models that we can begin to identify some key secrecy properties for wider application. Currently, secrecy is treated in rather ad hoc ways. With some agreement among calculi for expressing protocols and systems, we might even be able to use one another's proof techniques for proving secrecy. Four experts were invited as panelists. Two panelists, Riccardo Focardi and Martin Abadi, represent formalizations of secrecy as demanded by secure systems that aim to prohibit various channels or insecure information flows. More specifically, they represent noninterference-based secrecy. The other two panelists, Cathy Meadows and Jon Millen, represent formalizations of secrecy for protocols based on the Dolev-Yao threat model. Below are some specific questions that were asked of each of the panelists."
Naval Postgraduate School (U.S.). Department of Computer Science
Volpano, Dennis
1999-06
-
Strategic Assessment 1999: Priorities for a Turbulent World
This national strategic assessment discusses global political trends, economic globalization, global military balance, managing military affairs, dealing with rogue states and proliferation and regional dynamics.
National Defense University. Institute for National Strategic Studies
1999-06
-
Remote Sensing In Federal Disaster Operations: Standard Operating Procedures
"This Remote Sensing Standard Operating Procedures identifies and outlines the policies, procedures, and responsibilities associated with the use of remote sensing and ancillary data to support and facilitate disaster and emergency response operations. It directly supports -- and is applicable to all Federal departments and agencies operating under -- the Federal Response Plan (FRP). Within FEMA, the responsibility for disaster-related remote sensing coordination is assigned to the Response and Recovery Directorate (at Headquarters) or Division (at Regions). Within a FRP environment, the field-level responsibility for remote sensing coordination is vested in the Information and Planning Section of the applicable Federal response element (i.e., Emergency Response Team or Regional Operations Center Staff)."
United States. Federal Emergency Management Agency
1999-06
-
Breaking the Cycle of Violence: Recommendations to Improve the Criminal Justice Response to Child Victims and Witnesses
"Children represent one-quarter of American crime victims. They suffer abuse at the hands of their parents and caretakers; they are victimized by strangers; they are exposed to violence when they witness crimes in their homes and neighborhoods. Children have a limited capacity to understand the violence they experience and almost no capacity to protect themselves. They need to be treated with compassion and professionalism by criminal justice personnel from the first response to the crime and throughout the prosecution process. Effective, age-appropriate interaction and practices adapted to the child can reduce the trauma child victims and child witnesses experience and minimize their long-term physical, emotional, and social problems. This monograph offers recommendations and sample practices that can improve the response of criminal justice personnel to children who are victims of and witnesses to crime. Child victims and child witnesses provide our society and our judicial system with a huge challenge. Children who are victims of or witnesses to violent crime are at an increased risk for delinquency, adult criminality, and violent behavior. National studies show that neglected, abused, and otherwise victimized children grow up to have an increased risk of criminal behavior, substance abuse, mental illness, and suicide. If our criminal justice system can intervene effectively in the lives of victimized children as soon as the crime occurs, we have a real opportunity to prevent the spawning of future violence in our streets and in our homes. This monograph describes the best practices and programs that focus on the most effective response to child victims and child witnesses by all those who work in our criminal justice system, beginning at the crime scene and continuing through the prosecution. We hope that the information, skills, programs, and practices described in this document will serve as a blueprint for policymakers, criminal justice professionals, and all those who recognize the importance of effective intervention in the lives of victimized children as a way to prevent future crime and violence."
United States. Office of Justice Programs. Office for Victims of Crime
1999-06