Advanced search Help
Clear all search criteria
Only 2/3! You are seeing results from the Public Collection, not the complete Full Collection. Sign in to search everything (see eligibility).
-
Federal Prosecution of Human-Trafcking Cases, 2015
"A total of 1,923 criminal suspects were referred to U.S. attorneys for human-trafficking offenses in fiscal year 2015 (figure 1). This was a 41% increase from a total of 1,360 suspects referred in 2011. The number of suspects prosecuted for human trafficking increased from 729 in 2011 to 1,049 in 2015, a 44% increase."
United States. Bureau of Justice Statistics
Motivans, Mark; Snyder, Howard N.
2018-06
-
U.S. Customs and Border Protection: Progress and Challenges in Recruiting, Hiring, and Retaining Law Enforcement Personnel, Report to Congressional Requesters
"CBP [Customs and Border Protection] is responsible for securing U.S. borders and employs nearly 45,000 law enforcement officers across its three operational components at and between U.S. ports of entry, in the air and maritime environment, and at certain overseas locations. In recent years, CBP has not attained target staffing levels for its law enforcement positions, citing high attrition rates in some locations, a protracted hiring process, and competition from other law enforcement agencies. GAO [Government Accountability Office] was asked to review CBP's efforts to recruit, hire, and retain law enforcement personnel. This report examines CBP's efforts to (1) recruit qualified law enforcement officers, (2) more efficiently hire law enforcement applicants, and (3) retain law enforcement officers. GAO analyzed CBP data on recruitment, hiring, and retention from FY 2013 through 2017, as well as selected data for the first two quarters of FY 2018. GAO also reviewed CBP strategies and the recent contract it awarded to augment its recruiting and hiring activities and interviewed officials from CBP and three other selected law enforcement agencies."
United States. Government Accountability Office
2018-06
-
Drug Discount Program: Federal Oversight of Compliance at 340B Contract Pharmacies Needs Improvement, Report to Congressional Requesters
"Covered entities can provide 340B drugs to eligible patients and generate revenue by receiving reimbursementfrom patients' insurance. The number of pharmacies covered entities have contracted with has increased from about 1,300 in 2010 to nearly 20,000 in 2017. GAO [Government Accountability Office] was asked to provide information on the use of contract pharmacies. Among other things, this report: 1) describes financial arrangements selected covered entities have with contract pharmacies; 2) describes the extent that selected covered entities provide discounts on 340B drugs dispensed by contract pharmacies to low-income, uninsured patients; and 3) examines HRSA's [Health Resources and Services Administration] efforts to ensure compliance with 340B Program requirements at contract pharmacies. GAO selected and reviewed a nongeneralizable sample of 30 contracts between covered entities and pharmacies, 20 HRSA audit files, and 55 covered entities to obtain variation in the types of entities and other factors. GAO also interviewed officials from HRSA and 10 covered entities."
United States. Government Accountability Office
2018-06
-
ITL Bulletin: Putting Things First - a Model Process for Criticality Analysis (June 2018)
This document is the Information Technology Laboratory (ITL) Bulletin for June 2018 from the National Institute of Standards and Technology. From the Introduction: "In the modern world, where complex systems-of -systems are integral to the functioning of businesses and society, it is increasingly important to be able to understand and manage risks that these systems and components may present to the missions that they support. Where resources are finite, it is not possible to apply equal protection to all assets for every type of risk - especially since those assets are increasingly complex, interdependent, and externally provided. Risk management can be improved with processes and techniques to prioritize assets for a detailed risk analysis and for applying information security and privacy controls. Existing standards and guidelines provide only high-level and scattered guidance about how to prioritize systems and components relative to organizational goals. Additionally, these existing standards and guidelines are most often focused on prioritizing projects according to organizational goals, or prioritizing components according to system functionality. A broader approach is needed to avoid an incomplete understanding of the potentially critical nature of a component to organizational goals. NIST [National Institute of Standards and Technology] Internal Report (NISTIR) 8179, Criticality Analysis Process Model, describes a comprehensive model ('the Model') for prioritizing programs, systems, and components based on their importance to the goals of an organization and the impact that their inadequate operation or loss may present to those goals. The Model adopts and adapts concepts presented in publications regarding business and risk management, engineering principles, safety applications, and cyber supply chain. The authors of NISTIR 8179 researched and compared various existing methods to develop an approach specifically to the needs of information security and privacy risk management."
National Institute of Standards and Technology (U.S.); Information Technology Laboratory (National Institute of Standards and Technology). Computer Security Division
Paulsen, Celia; Feldman, Larry; Witte, Greg
2018-06
-
Office of Special Counsel: Actions Needed to Improve Processing of Prohibited Personnel Practice and Whistleblower Disclosure Cases, Report to Congressional Committees
"OSC (Office of Special Counsel) is responsible for safeguarding the merit system in federal employment by protecting employees and applicants, including whistleblowers. Consequently, OSC must ensure its case processes are adequate to protect the federal workforce, including its own employees. GAO (Government Accountability Office) was asked to review OSC case processes and procedures for whistleblower disclosures and PPPs (prohibited personnel practice). For both types of cases, this report among other things (1) examines trends in cases received and closed from fiscal year 2011 to 2016, (2) examines timeliness of cases closed from fiscal year 2011 to 2016, and (3) assesses the extent to which safeguards are in place for OSC employees who make allegations."
United States. Government Accountability Office
2018-06
-
2020 Census: Actions Needed to Improve In-Field Address Canvassing Operation, Report to Congressional Requesters
"The success of the decennial census depends in large part on the Bureau's ability to locate every household in the United States. To accomplish this monumental task, the Bureau must maintain accurate address and map information for every location where a person could reside. For the 2018 End-to-End Test, census workers known as listers went door-to-door to verify and update address lists and associated maps in selected areas of three test sites--Bluefield-Beckley-Oak Hill, West Virginia; Pierce County, Washington; and Providence County, Rhode Island. GAO (Government Accountability Office) was asked to review in-field address canvassing during the End-to-End Test. This report determines whether key address listing activities functioned as planned during the End-to-End Test and identifies any lessons learned that could inform pending decisions for the 2020 Census. To address these objectives, GAO reviewed key documents including test plans and training manuals, as well as workload, productivity and hiring data. At the three test sites, GAO observed listers conducting address canvassing."
United States. Government Accountability Office
2018-06
-
Characterization and Abuse of Electronic Cigarettes: The Efficacy of 'Personal Vaporizers' as an Illicit Drug Delivery System
"Electronic cigarettes (e-cigarettes or e-cigs) [...] have experienced a significant increase in popularity for those seeking an alternative to smoking traditional tobacco products. [...]The lack of enforced regulation prior to May 2016 has resulted in easy accesses to e-cigarettes and has shepherded their nefarious uses. The use of the e-cigarettes as an illicit drug delivery device is touted on websites, forums, blogs, and videos describing how best to use them for specific illicit drugs such as tetrahydrocannabinol, methamphetamine, fentanyl, and heroin. [...] Significant efforts have been made to educate law enforcement, medical examiners, toxicologists, and crime lab practitioners about drug use and abuse employing e-cigarettes. Public awareness has increased as to the potential dangers, and crime scene investigators and death investigators have 4 This resource was prepared by the author(s) using Federal funds provided by the U.S. Department of Justice. Opinions or points of view expressed are those of the author(s) and do not necessarily reflect the official position or policies of the U.S. Department of Justice. reported collecting these and sending them to crime labs. Ultimately, this study has provided greater understanding in the court systems nationwide as to the nature of drug usage, abuse, and overdose cases in which e-cigarettes were used to deliver an illicit drug."
United States. Office of Justice Programs; National Criminal Justice Reference Service (U.S.)
Peace, Michelle; Turner, Joseph
2018-06
-
Study on Countering Anti-Access Systems with Longer Range and Standoff Capabilities: Assault Breaker II
"In November 2016, the Under Secretary for Acquisition, Technology and Logistics (USD(AT&L)) requested that the Defense Science Board (DSB) conduct a Summer Study on Countering Anti-Access Systems with Longer Range and Standoff Capabilities. The DSB assembled a task force composed of national leaders in science and technology and Department of Defense (DoD) industry with expertise in all aspects of delivering long range effects. This report presents the key findings and recommendations that resulted from task force deliberations. Nine specific recommendations for delivering long range effects in a contested Anti-Access/Area Denial (A2/AD) environment through employment of the Assault Breaker II (AB II) concept are offered for consideration by the Department of Defense."
United States. Department of Defense. Office of the Secretary of Defense
2018-06
-
Studies in Intelligence: Journal of the American Intelligence Professional [June 2018]
The June 208 edition of "Studies in Intelligence" includes the following articles: "Intelligence and Policy: The Case for Thin Walls as Seen by a Veteran of INR [State Department's Bureau of Intelligence and Research]," by Bowman H. Miller; "The OSS Role in Ho Chi Minh's Rise to Political Power," by Bob Bergin; "'A Road Not Taken': But a Road to Where?," by Thomas L. Ahern; and "CIA Analysis of the 1967 Arab-Israeli War," by David S. Robarge. This edition also includes 11 book reviews.
Center for the Study of Intelligence (U.S.)
2018-06
-
Regulation of Air Pollution
"This report by the foreign law research staff of the Law Library of Congress's Global Legal Research Directorate includes surveys of eleven jurisdictions on the regulation of air pollution. The covered jurisdictions include one supranational entity, the European Union, and a diverse array of countries, including some with common-law legal systems (Australia, Canada, and the United Kingdom), some civil-law countries (Brazil, China, France, Israel, Japan, and Switzerland), and one with a mixed legal system (South Africa). Some of the countries are unitary in nature, while others have federated governments. The report details the regimes these diverse jurisdictions have developed in recent decades to regulate air pollution. The country surveys cover each jurisdiction's regulation of both stationary and mobile sources of air pollution, and of pollutants including sulfur oxides, nitrogen oxides, carbon monoxide, ozone, particulate matter, and hazardous air pollutants. Fuel quality standards, renewable fuel requirements, and vehicle emissions standards are covered, as are strategies for meeting international requirements to address climate change."
Law Library of Congress (U.S.)
2018-06
-
Task Force on Cyber as a Strategic Capability, Executive Summary
"The Defense Science Board (DSB) Task Force on Cyber as a Strategic Capability was established to assess how cyber capabilities are being used by U.S. competitors and adversaries to achieve strategic effects, and provide recommendations for how the United States can develop and employ a strategic cyber capability of our own. While the United States retains significant advantages in most military domains, the United States has fallen behind its competitors in the cyber domain, both conceptually and operationally. The threat that adversary nations and non-state actors pose is not a hypothetical one - the United States has witnessed the effectiveness of strategic cyber operations, both against other countries and against the United States itself, on multiple occasions. Given the degree to which U.S. civilian and military infrastructure depend on cyber-enabled technologies, U.S. risks in the cyber domain present a serious and growing challenge to the Nation's ability to defend itself at home and advance its interests abroad. The DSB report on Cyber as a Strategic Capability concludes that U.S. strategic competitors and other states possess effective strategic cyber capabilities and doctrine. These may, in certain scenarios, stress U.S. ability to deter adversary cyber aggression. The study, therefore, examines the laws, governance structures, and culture that impair the United States from fully possessing strategic cyber capabilities. The United States must act quickly to enable strategic cyber as an option in the spectrum of effects. Doing so will help ensure the United States maintains its current global posture and the U.S. homeland is protected against adversary blackmail and aggression."
United States. Defense Science Board; United States. Department of Defense
2018-06
-
Monitoring Changes in the Novel Psychoactive Substance (NPS) Market Through Enhanced Identification of Emerging Drugs and Their Metabolites in Biological Samples
"Electronic dance music (EDM) festivals have become a popular venue for various types of recreational drug use, including the reported ingestion of 'Ecstasy,' 'Molly,' and/or 'MDMA,' [3,4-Methylenedioxymethamphetamine, commonly known as ecstasy] which has been documented by surveys with attendees and is reflected in online discussion groups associated within the EDM culture. These terms are used interchangeably, and users are often naïve as to what active substance(s) their pills, powders, or capsules contain. Within the last four years, several adverse events associated with novel psychoactive substance (NPS) use were reported at various EDM festivals in the United States. Both the dynamics of the synthetic drug market and diversity of NPS have resulted in analytical challenges within the forensic community in detecting and monitoring novel drug use. Currently, there is not a formalized approach to identify novel substances in toxicologically tested populations. Novel substances often go undetected or their discovery is serendipitous. Metabolic studies for novel drugs remain limited and, generally, metabolite elucidation occurs sometime after establishing the identity of the parent compound, if at all. Using our established operational model of collecting paired specimens and self-reported drug use data from EDM festival attendees, we address some of the research needs focused on characterizing chemical compounds of forensic interest in biological systems, by providing confirmation of the parent drugs of abuse (established and emerging) and identifying metabolites in authentic specimens from a population of recreational drug users."
United States. Office of Justice Programs; National Criminal Justice Reference Service (U.S.)
Krotulski, Alex J.; Mohr, Amanda L.A.; Friscia, Melissa . . .
2018-06
-
Identity Theft: IRS Needs to Strengthen Taxpayer Authentication Efforts, Report to Congressional Requesters
"The Internal Revenue Service (IRS) has identified over 100 interactions requiring taxpayer authentication based on potential risks to IRS and individuals. IRS authenticates millions of taxpayers each year via telephone, online, in person, and correspondence to ensure that it is interacting with legitimate taxpayers. IRS's estimated costs to authenticate taxpayers vary by channel. [...] Strong preventive controls can help IRS defend itself against identity theft refund fraud. These controls include taxpayer authentication--the process by which IRS verifies identities before allowing people access to a resource; sensitive data; or, in some cases, a tax refund. The risk of fraud has increased as more personally identifiable information has become available as a result of, for example, large- scale cyberattacks on various entities. IRS's ability to continuously monitor and improve taxpayer authentication is a critical step in protecting billions of dollars from fraudsters. GAO [Government Accountability Office] was asked to examine IRS's efforts to authenticate taxpayers. This report (1) describes the taxpayer interactions that require authentication and IRS's methods; (2) assesses what IRS is doing to monitor and improve taxpayer authentication; and (3) determines w hat else, if anything, IRS can do to strengthen taxpayer authentication in the future. To meet these objectives, GAO reviewed IRS documents and data, evaluated IRS processes against relevant federal internal control standards and guidance, and interviewed IRS officials and state and industry representatives."
United States. Government Accountability Office
2018-06
-
Enemy is US: How Allied and U.S. Strategy in Yemen Contributes to AQAP's Survival
"In this monograph, Dr. Norman Cigar provides Special Operations Forces (SOF) commanders and planners with an overview of Al-Qaeda in the Arabian Peninsula's (AQAP) operational framework and presence in the area. He analyzes the strategic and operational issues that confront policymakers in responding to the threat posed by AQAP within Yemen's challenging social, political, and physical environment. This monograph presents the far-reaching implications for SOF, from recognizing the nuances of Yemen's tribal-based human terrain to understanding key relationships, rivalries, and competition between AQAP and other Yemeni players. AQAP will likely continue to represent a threat to U.S. interests and regional stability for the foreseeable future."
Joint Special Operations University (U.S.)
Cigar, Norman L.
2018-06
-
CTC Sentinel [June/July 2018]
This CTC Sentinel published by the Combating Terrorism Center (CTC) at West Point features the following articles: "The Surabaya Bombings and the Evolution of the Jihadi Threat in Indonesia," by Kirsten E. Schulze; "A View from the CT Foxhole: Lieutenant Colonel Bryan Price, Ph.D., Outgoing Director, Combating Terrorism Center at West Point," by Brian Dodwell; "Children at War: Foreign Child Recruits of the Islamic State," by Dakota Foster and Daniel Milton; "The Islamic State's Veterans: Contrasting the Cohorts with Jihadi Experience in Libya and Afghanistan," by David Sterman; and "The 2016 French Female Attack Cell: A Case Study," by Robin Simcox.
Combating Terrorism Center (U.S.)
2018-06
-
Regulation of Cryptocurrency Around the World
"This report surveys the legal and policy landscape surrounding cryptocurrencies around the world. While not dissimilar in form to the 2014 Law Library of Congress report on the same subject, which covered forty foreign jurisdictions and the European Union, this report is significantly more comprehensive, covering 130 countries as well as some regional organizations that have issued laws or policies on the subject. This expansive growth is primarily attributable to the fact that over the past four years cryptocurrencies have become ubiquitous, prompting more national and regional authorities to grapple with their regulation. The resulting availability of a broader set of information regarding how various jurisdictions are handling the fast-growing cryptocurrency market makes it possible to identify emerging patterns, some of which are described below. The country surveys are also organized regionally to allow for region-specific comparisons."
Library of Congress; Law Library of Congress (U.S.)
2018-06
-
Regulation of Cryptocurrency in Selected Jurisdictions
"This report summarizes the cryptocurrency policies and regulatory regimes in fourteen jurisdictions around the world. Among the key issues covered in the report are matters relating to the legality of cryptocurrency markets; the tax treatment of cryptocurrencies; and the applicability of anti-money laundering, anti-organized crime, and anti-terrorism-financing laws. [...] Many of the countries that permit cryptocurrency markets to operate have enacted laws subjecting organizations that participate in these markets to rules designed to prevent money-laundering, terrorism financing, and organized crime. These include Australia, Belarus, Canada, Gibraltar, Japan, Jersey, and Switzerland. While a bill that would have the same effect is working its way through the Brazilian legislative process, countries like Argentina, France, and Mexico have yet to follow suit."
Library of Congress; Law Library of Congress (U.S.)
2018-06
-
Department of Defense Digital Engineering Strategy
"The DoD Office of the Deputy Assistant Secretary of Defense for Systems Engineering (ODASD(SE)) developed this strategy in cooperation with stakeholders across government, industry, and academia. The strategy is a living document and will evolve to support the Department's continuing need to provide critical capability to the warfighter as quickly as possible. The Department intends to remain actively engaged with partners internal and external to the DoD, including the Defense Industrial Base, to maintain communication and alignment on the implementation of this strategy. The strategy is intended to guide the planning, development, and implementation of the digital engineering transformation across the DoD. As the DoD Components continue to make progress in digital engineering, this document will help align implementation efforts across the Department. This strategy does not intend to be prescriptive. It is designed to foster shared vision and ignite timely and focused action."
United States. Department of Defense; United States. Office of the Director of Defense Research and Engineering
2018-06
-
Medical Surveillance Monthly Report [June 2018]
"Medical Surveillance Monthly Report (MSMR), in continuous publication since 1995, is produced by the Armed Forces Health Surveillance Branch (AFHSB). The MSMR provides evidence-based estimates of the incidence, distribution, impact and trends of illness and injuries among United States military members and associated populations. Most reports in the MSMR are based on summaries of medical administrative data that are routinely provided to the AFHSB and integrated into the Defense Medical Surveillance System for health surveillance purposes." This edition includes the following articles: "Polypharmacy Involving Opioid, Psychotropic, and Central Nervous System Depressant Medications, Period Prevalence and Association with Suicidal Ideation, Active Component, U.S. Armed Forces, 2016" by Richard P. Eide III and Shauna Stahlman; "Variations in the Incidence and Burden of Illnesses and Injuries Among Non-retiree Service Members in the Earliest, Middle, and Last 6 Months of Their Careers, Active Component, U.S. Armed Forces, 2000-2015" by Colby C. Uptegraft and Shauna Stahlman; "Diagnoses of Eating Disorders, Active Component Service Members, U.S. Armed Forces, 2013-2017" by Valerie F. Williams, Shauna Stahlman, and Stephen B. Taubman; and "Department of Defense Midseason Vaccine Effectiveness Estimates for the 2017--2018 Influenza Season" by Lisa Shoubaki et al.
Armed Forces Health Surveillance Center (U.S.)
2018-06
-
Reducing Gang Violence: A Randomized Trial of Functional Family Therapy
"During the past quarter century adolescent street gangs, once primarily a phenomenon of a few major metropolitan areas, have spread rapidly throughout the United States. In its most recent survey, the National Youth Gang Center estimated that there were 30,700 gangs with 850,000 members located in over 3,100 jurisdictions throughout the country. Gangs were found in 85% of larger cities, 50% of suburban counties, 32% of smaller cities, and 15% of rural counties. The number of gangs, gang members, and gang-related homicides are on the rise when compared to the previous 5-year average and the problem of street gangs now reaches into all corners of American society (Egley, et al., 2014). [...] The purpose of this study was to produce knowledge about how to prevent at-risk youth from joining gangs and reduce delinquency among active gang members. The study evaluated a modification of Functional Family Therapy, a model program from the Blueprints for Healthy Youth Development initiative, to assess its effectiveness for reducing gang membership and delinquency in a gang-involved population."
National Criminal Justice Reference Service (U.S.)
Gottfredson, Denise C.; Thornberry, Terence P.; Slothower, Molly . . .
2018-06
-
VA National Suicide Data Report 2005-2015
"This report provides information on suicide mortality for the years 2005-2015. It incorporates the most recent mortality data from the joint VA [Veterans Affairs]/DoD Joint Suicide Data Repository and includes information for deaths from suicide among all known Veterans of U.S. military service. Data for the joint VA/DoD Suicide Data Repository were obtained from the National Center for Health Statistics' National Death Index (NDI) through collaboration a with the DoD. Data available from the NDI include reports of mortality submitted from vital statistics systems in all 50 U.S. states, Washington, D.C., and Puerto Rico. This report builds upon prior analyses of Veteran suicide and provides additional and updated information on all known suicides among Veterans living in the United States from 2005 to 2015. Findings include direct comparisons of Veterans' suicide rates with those of analogous non-Veteran populations, calculations of suicide rates among high-risk subgroups (e.g., Veterans diagnosed with mental health and opioid use disorders), and comparisons of Veterans with and without recent receipt of VHA [Veterans Health Administration] services. Rates of suicide were calculated by calendar year to facilitate comparison with national statistics and reports from other agencies."
United States. Department of Veterans Affairs
2018-06
-
Border Security and Immigration: Initial Executive Order Actions and Resource Implications, Report to Congressional Requesters
"In January and March 2017, the President issued a series of executive orders related to border security and immigration. The orders direct federal agencies to take a broad range of actions with potential resource implications. For example, Executive Order 13767 instructs DHS to construct a wall or other physical barriers along the U.S. southern border and to hire an additional 5,000 U.S. Border Patrol agents. Executive Order 13768 instructs federal agencies, including DHS and DOJ [Department of Justice], to ensure that U.S immigration law is enforced against all removable individuals and directs ICE to hire an additional 10,000 immigration officers. Executive Order 13780 directs agencies to develop a uniform baseline for screening and vetting standards and procedures; and established nationality-based entry restrictions with respect to visa travelers for a 90-day period, and refugees for 120 days. GAO [Government Accountability Office] was asked to review agencies' implementation of the executive orders and related spending. This report addresses (1) actions DHS, DOJ, and State have taken, or plan to take, to implement provisions of the executive orders; and (2) resources to implement provisions of the executive orders, particularly funds DHS, DOJ, and State have obligated, expended, or shifted. GAO reviewed agency planning, tracking, and guidance documents related to the orders, as well as budget requests, appropriations acts, and internal budget information. GAO also interviewed agency officials regarding actions and budgetary costs associated with implementing the orders."
United States. Government Accountability Office
2018-06
-
Cryptocurrency and State Sovereignty
From the thesis abstract: "Since Bitcoin's release in late 2008, the cryptocurrency has grown and proven itself as a disruptive technology, resistant to sovereign law and international financial regulations, and an alternative to the sovereign state's concept of fiat money. The Wild West nature of cryptocurrency has enabled a number of individuals, criminal organizations, terrorist groups, and sovereign states to use Bitcoin, among other cryptocurrencies, to avoid detection, interference, or punishment from regulatory agencies to commit actions such as money laundering, trafficking narcotics, purchasing weapons, and bypassing international sanctions. This thesis addresses the disruptive nature of cryptocurrency by asking what legislative options are available to sovereign states to maximize the effectiveness of sovereign laws while limiting undesired cryptocurrency use. To tackle this question, this thesis breaks down the legislative actions countries may take into three categories--prohibition, regulation, and adoption--to investigate the benefits, limitations, and effects of each policy. By examining the legislative actions of countries like China, the United States, and Russia, this thesis finds that sovereign states have had limited success in preventing illicit cryptocurrency use; however, without implementing a refined, multifaceted global regulatory standard on cryptocurrency transactions in the near future, cryptocurrency will remain an unchecked means to transact on an international scale."
Naval Postgraduate School (U.S.)
Frebowitz, Ryan L.
2018-06
-
Do Political Appointments Create Politicized Intelligence?
From the thesis abstract: "A resilient nation must not only have a strong and functional military for defense, but also have the capability to collect tactical intelligence about adversaries to inflict the greatest potential damage in potential conflict. Regardless of the size and strength of forces, intelligence sharpens the military force's lethality, ultimately making a nation powerful. Fundamentally, intelligence should be unbiased and objective. However, as the United States polarizes itself politically today between its two dominant parties, that objectivity is at risk. Political bias has been included in U.S. intelligence analysis and through a study of two cases, it is apparent that politicized intelligence often negatively impacts the intelligence community (IC), the military, and the citizens of the United States. The current system of appointing senior intelligence officials inevitably fosters politicized intelligence because of an inherent obligation of those appointed to serve the administration that selected them. This thesis recommends that to reduce politicization, legislation must require IC leaders to have served as intelligence officers first and with positional term limits, essentially making them professional, not political, appointments. The objective of this legislation would be to maintain the policymaker and IC leadership relationship while ensuring the public that the IC remains capable, knowledgeable, and unbiased."
Naval Postgraduate School (U.S.)
McDermott, Kevin C.
2018-06
-
School Shooter: A Rapidly Growing Problem for Homeland Security
From the thesis abstract: "School shootings have significantly impacted many aspects of our lives across the United States. They first became a recognized problem in American society in the 1960s and have since continued to increase in frequency and severity. Casualty numbers from school shootings have steadily increased since 1990, and even though such shootings are rarer than homicide, mass murder, and off-campus violence, they have a great impact on a community. Normally, techniques and tactics used by school administrations and law enforcement change over time to adapt to growing threats. Cases such as the University of Texas shooting in 1966 and Columbine High School in 1999, for example, led to changes in law enforcement tactics. While UT Austin and Columbine are landmark examples, from 2000 to 2015, there have been 45 school shootings. Attacks in Sandy Hook Elementary School and Marjory Stoneman Douglas High School have focused demands for change, and school and law enforcement procedures have not yet adapted to the rising threat. This thesis examines how educators, first responders, and law enforcement should respond to school shooters today using threat assessment processes and facility security upgrades."
Naval Postgraduate School (U.S.)
Kennedy, Dylan F.
2018-06
-
Defense Management: DOD Senior Leadership Has Not Fully Implemented Statutory Requirements to Promote Department-Wide Collaboration
From the Highlights: "DOD continues to confront organizational challenges that hinder collaboration. To address these challenges, section 911 of the NDAA [National Defense Authorization Act] for FY 2017 directed the Secretary of Defense to issue an organizational strategy that identifies critical objectives that span multiple functional boundaries and would benefit from the use of cross-functional teams. Additionally, DOD is to establish cross-functional teams to support this strategy, issue guidance on these teams, and provide training to team members and civilian leaders in the Office of the Secretary of Defense. The NDAA also included a provision for GAO [Government Accountability Office] to periodically assess DOD's actions in response to section 911. This is GAO's third report on the implementation of section 911. It assesses the status of DOD's efforts to (1) establish cross-functional teams, (2) issue an organizational strategy, and (3) issue guidance on cross-functional teams and provide training to team members and Office of the Secretary of Defense leaders. GAO reviewed documentation on DOD's implementation of its cross-functional teams and DOD's draft organizational strategy, draft guidance on establishing cross-functional teams, and draft training curricula. GAO also interviewed DOD officials on efforts to implement section 911. GAO is not making new recommendations in this report. DOD concurred and is taking actions to address GAO's previous recommendations on DOD's implementation of section 911. DOD also concurred with the findings in a draft of this report."
United States. Government Accountability Office
2018-06
-
DOD Dictionary of Military and Associated Terms (June 2018)
"The 'DOD Dictionary of Military and Associated Terms' (DOD Dictionary) sets forth standard US military and associated terminology to encompass the joint activity of the Armed Forces of the United States. These military and associated terms, together with their definitions, constitute approved Department of Defense (DOD) terminology for general use by all DOD components."
United States. Joint Chiefs of Staff
2018-06
-
Risk Factors and Indicators Associated with Radicalization to Terrorism in the United States: What Research Sponsored by the National Institute of Justice Tells US
"Since its creation in 2012, the National Institute of Justice's Domestic Radicalization to Terrorism program has sponsored research to support community members and practitioners in (1) identifying individuals who are radicalizing to terrorism and (2) developing prevention and intervention efforts. Although several of these projects are ongoing, important findings regarding the potential risk factors and indicators associated with engaging -- or attempting to engage -- in terrorism have begun to emerge. As many of these findings were based on analyses that compared individuals who engaged or attempted to engage in terrorism with those who did not, there is increasingly strong evidence that these risk factors and indicators may help practitioners to distinguish between individuals who are more or less likely to attempt to conduct a terrorist attack, as well as provide a foundation for prevention and intervention programs. [...] Taken together, these findings again suggest that efforts that focus on treating mental health issues, improving individuals' employment prospects, and/or helping them to develop and sustain positive relationships may contribute to prevention and intervention efforts. They also provide some evidence that these efforts may need to take into account individuals' personal and political grievances."
National Institute of Justice (U.S.); United States. Office of Justice Programs
Smith, Allison G.
2018-06
-
Enhancing Security and Stability in Afghanistan [June 2018]
"This report describes efforts to enhance security and stability in Afghanistan from December 1, 2017, through May 31, 2018. This report complements other reports and information about Afghanistan provided to Congress and is not intended to be the single source of all information about the combined efforts or the future strategy of the United States, its coalition partners, or Afghanistan. A classified annex accompanies this report. The next report will include an analysis of efforts to enhance security and stability in Afghanistan from June 1, 2018, through November 30, 2018."
United States. Department of Defense
2018-06
-
Report on the Effectiveness of the Terrorism Risk Insurance Program
From the Background: "Prior to September 11, 2001, commercial P&C insurance policies generally did not exclude coverage for losses resulting from terrorism. The events of September 11, 2001 (September 11 attacks) resulted in approximately $44 billion of P&C insurance losses, more than two-thirds of which were reimbursed by reinsurers to insurers. Following the September 11 attacks, insurers and reinsurers began to exclude coverage for terrorism risk from commercial P&C policies. The Terrorism Risk Insurance Act of 2002 (TRIA) was enacted, in part, because the widespread unavailability of terrorism risk insurance 'could seriously hamper ongoing and planned construction, property acquisition, and other business projects, generate a dramatic increase in rents, and otherwise suppress economic activity.' TRIA established the Program, which requires insurers to make terrorism risk coverage available within certain lines of commercial P&C insurance (TRIP [Terrorism Risk Insurance Program]-eligible lines of insurance)."
United States. Department of the Treasury
2018-06