Advanced search Help
Clear all search criteria
Only 2/3! You are seeing results from the Public Collection, not the complete Full Collection. Sign in to search everything (see eligibility).
-
Underwater Security Vehicle
"The objective of the Underwater Security Vehicle (USV) program was to evaluate the feasibility of using an underwater remotely operated vehicle (ROV) system to aid in underwater security. The USV system is to be used to assess designated contacts in a near-shore environment augmenting existing security systems such as the Waterside Security System (WSS). A series of demonstration tests were conducted to evaluate the capabilities of various commercially available ROVs. Based on the available systems and mission requirements, a specification was developed for the USV proof-of-concept system. The system procured was the Benthos SUPER SeaROVER vehicle with the Smiths Hi-Scan 600 sonar."
Naval Ocean Systems Center (U.S.)
Fletcher, B.E.
1991-12
-
Financial Crimes Enforcement Network Advisory: Advisory to Financial Institutions on Filing Suspicious Activity Reports regarding Trade-Based Money Laundering, February 18, 2010
"The Financial Crimes Enforcement Network (FinCEN) is issuing this advisory to inform and assist the financial industry in reporting suspected instances of trade-based money laundering. This advisory contains examples of 'red flags' based on activity observed in Suspicious Activity Reports (SARs) that may indicate trade-based money laundering. While SARs are not proof of illegal activity, they can provide law enforcement with valuable indicators that this type of money laundering may be occurring. The examples discussed in this advisory are based on specific law enforcement experience involving U.S. trade with Central and South America, but the types of activity detailed herein are by no means confined to those regions, and financial institutions are advised to take appropriate measures to mitigate the risks of analogous activity occurring globally."
Financial Crimes Enforcement Network (U.S.)
2010-02-18
-
Financial Crimes Enforcement Network Advisory: Advisory to Financial Institutions on Filing Suspicious Activity Reports Regarding Home Equity Conversion Mortgage Fraud Schemes, April 27, 2010
"The Financial Crimes Enforcement Network (FinCEN), in consultation with the U.S. Department of Housing and Urban Development's (HUD) Office of Inspector General (OIG), is issuing this advisory to highlight reverse mortgage fraud schemes potentially related to the Federal Housing Administration (FHA) Home Equity Conversion Mortgage (HECM) program so that financial institutions may better assist law enforcement when filing Suspicious Activity Reports (SARs). With the recent difficulties within the housing market, the ability of homeowners to access existing home equity quickly through the HECM and other reverse-mortgage programs may be increasing their attractiveness as a target for financial fraud. This advisory contains examples of common fraud schemes and potential 'red flags' for fraudulent activity related to HECMs. To assist law enforcement in its efforts to target this type of fraudulent activity, this advisory also suggests key words for financial institutions to use when completing SARs involving fraud related to the HECM program. Using this additional information, the vigilance of financial institutions together with law enforcement efforts against illicit mortgage-related activities will make an important contribution to the economic recovery of the housing market."
Financial Crimes Enforcement Network (U.S.)
2010-04-27
-
Technical Assistance Catalog: Preparedness and Program Program Management Technical Assistance
"The U.S. Department of Homeland Security (DHS), Federal Emergency Management Agency (FEMA), National Preparedness Directorate (NPD) and Grant Programs Directorate (GPD), Technical Assistance (TA) Program seeks to build and sustain capabilities through specific services and analytical capacities across two primary functional areas: 1. Preparedness TA activities in support of the four homeland security mission areas (prevention, protection, response, and recovery) 2. Homeland security program management This two-pronged approach ensures that initiatives measurably contribute to the enhancement of homeland security capabilities through State and local homeland security programs. The TA program addresses the areas of greatest State and local need by institutionalizing knowledge at the State and local level and providing a dynamic menu of services that is responsive to national priorities."
United States. Federal Emergency Management Agency
2006-06
-
Commercialization Office - Pilot Operational Requirements Document: Crisis Decision-Support Software
"The decision-support system shall, through a database-oriented software capability, integrate decision processes, decision-support tools, and a knowledge base needed to make effective decisions in a recognition-primed (or other performance-equivalent or superior types) decision environment. The system will interact with a decision maker to: 1) Pose and answer key questions about the event in an interview environment 2) Choose an analogous event and decision from a knowledge base 3) Modify the analogous event and decision based on the actual conditions 4) Provide a recommended decision that a user can quickly and unambiguously implement The field-portable software system will combine knowledge databases, artificial intelligence database search functions, scenario modification tools, and an interface that operates on hardware platforms and operating systems typically available and used by crisis decision makers (e.g., MS Windows XP or Vista desktop computers, laptop computers, portable digital assistants [PDAs], etc.)."
United States. Department of Homeland Security. Science and Technology Directorate
2009-02
-
Operational Requirements Document (ORD) for the Blast Resistant Autonomous Video Equipment (BRAVE)
"The proposed system will be a stand-alone fixed video surveillance unit that will produce and maintain a continuous video recording of a designated transit vehicle, infrastructure component, access control point, or other location of interest within its designated field of view. It is expected that multiple such units will be necessary to provide full coverage of individual transit vehicles and other areas of interest. Each unit will record continuously and store data for a specified period of time, after which data will automatically be overwritten as necessary. Following installation, the system will not require user intervention to maintain continued operation. In the event of a terrorist attack or catastrophic event, the unit will protect the recorded data from damage or tampering until retrieval by authorities. Only survival of the video data sufficient for retrieval and playback of the collected video surveillance is expected. The system will also allow for data retrieval by authorized individuals as required for other mission applications. Each BRAVE unit will be a self contained device that includes a camera, removable data storage, and protective hardening for the data storage. System power may be provided by the installed platform (e.g. bus) or by an included power source. In the case of an external power option, a transformer, as necessary, will be included within the system housing."
United States. Department of Homeland Security
2009
-
Commercialization Office - Pilot Operational Requirements Document: Blast Mitigation of Fuel Tank Explosions
"This Operational Requirements Document (ORD) describes the use of an explosion suppression system to protect fuel containers. A 'fuel container' ranges from fuel tanks found in vehicles, boats or trains to fuel storage tanks at airports, seaports and the neighborhood gas station. Some of today's largest terrorist targets are our country's critical infrastructure/key resources (CI/KR) such as airports, seaports, bridges, energy facilities, railways, and mass transit systems. The use of an explosion suppression system in fuel containers can mitigate the IED threat by preventing fuel tank explosions. Attacks have the potential of causing disastrous consequences, resulting in catastrophic loss of life, destruction of assets, environmental issues and financial turmoil through the interruption of operations. While many areas central to our national infrastructure are exposed to the threat posed by the targeting of fuel storage facilities, a field-proven system to protect these assets is required. An explosion suppression system provides the capability to 'render safe and neutralize explosive threats' across a broad range of applications. The operational capability described herein will provide the user community (DHS, state, local and tribal government agencies) with anti- explosion technology that will support the hardening of strategic assets and mitigate dangerous explosions from terrorist attacks or accidents. The solution should be applicable to explosion suppression needs within border security, cargo security, transportation security, counter-IED, maritime security, and critical infrastructure protection."
United States. Department of Homeland Security
2009-02
-
Financial Crimes Enforcement Network Advisory: Guidance to Financial Institutions on Filing Suspicious Activity Reports regarding Loan Modification/Foreclosure Rescue Scams, April 06, 2009
"The Financial Crimes Enforcement Network (FinCEN) is issuing this advisory to highlight loan modification/foreclosure rescue scams so that financial institutions may better assist law enforcement when filing Suspicious Activity Reports. This guidance is consistent with the Department of the Treasury's broader efforts to ensure that U.S. financial institutions are not used as conduits for illicit activity, including loan modification/foreclosure rescue scams. In the current economic environment, many homeowners are encountering significant difficulty in making their mortgage payments, which has led to an increasing amount of fraud in the form of loan modification/foreclosure 'rescue' schemes that take advantage of those homeowners in desperate situations. Under the pretense of helping homeowners modify their mortgage obligations, these schemes result in the loss of money, equity and in many cases the home itself."
Financial Crimes Enforcement Network (U.S.)
2009-04-06
-
Financial Crimes Enforcement Network Guidance: Application of the Definition of Money Transmitter to Brokers and Dealers in Currency and Other Commodities, September 10, 2008
"The Financial Crimes Enforcement Network ('FinCEN') is issuing this interpretive guidance to clarify whether a person who conducts transactions in currency or other commodities is a money services business for purposes of complying with the Bank Secrecy Act and its implementing regulations. Specifically, this guidance addresses whether a broker or dealer in currency or other commodities is a money transmitter when, in the ordinary course of business, the broker or dealer accepts and transmits funds in order to effect transactions in currency or other commodities for or with a customer."
Financial Crimes Enforcement Network (U.S.)
2008-09-10
-
Fiscal Year 2008: Urban Areas Security Initiative Nonprofit Security Grant Program, Guidance and Application Kit
"The Fiscal Year (FY) 2008 Urban Areas Security Initiative (UASI) Nonprofit Security Grant Program (NSGP) provides funding support for target hardening activities to nonprofit organizations that are at high risk of international terrorist attack. While this funding is provided specifically to high-risk nonprofit organizations, the program seeks to integrate nonprofit preparedness activities with broader state and local preparedness efforts. It is also designed to promote coordination and collaboration in emergency preparedness activities among public and private community representatives, State and local government agencies, and Citizen Corps Councils."
United States. Department of Homeland Security
2008-02
-
Interoperability Technology Today, Spring 2007
"Interoperability Technology Today is published quarterly by OIC [Office for Interoperability and Compatibility] at no cost to subscribers. Its mission is to provide the emergency response community, policy makers, and local officials with information about interoperability initiatives nationwide, best practices, and lessons learned." This edition contains the following articles: "High-Speed Pursuit of Interoperability"; "Disaster Management Wins Excellence.Gov Award"; "Director's Message"; "Gateways: Bridging Gaps for the Near-Term"; "Benchmarking Success with Standards Working Group"; "Innovation and Cooperation in the Lone Star State"; "Blazing the Trail in Virginia"; "Ten-Codes: Over and Out?"
United States. Department of Homeland Security. Science and Technology Directorate
2007
-
Financial Crimes Enforcement Network Guidance: Guidance on Supporting Information Suitable for Determining the Portion of a Business Customer's Annual Gross Revenues that is Derived from Activities Ineligible for Exemption from Currency Transaction Reporting Requirements, April 27, 2009
"The Financial Crimes Enforcement Network (FinCEN) is issuing this guidance to assist banks in determining the appropriateness of exempting from currency transaction reporting requirements non-listed business customers that derive some portion of their annual gross revenues from ineligible business activities. Pursuant to the Bank Secrecy Act, a bank is required to file a Currency Transaction Report for each transaction in currency of more than $10,000 by, through, or to that bank. Additionally, multiple currency transactions totaling more than $10,000 during any one business day must be treated as a single transaction if the bank has knowledge that they are by or on behalf of the same person."
Financial Crimes Enforcement Network (U.S.)
2009-04-27
-
Financial Crimes Enforcement Network Advisory: Structuring by Casino Patrons and Personnel, July 1, 2009
"The Financial Crimes Enforcement Network ('FinCEN') recently received information from law enforcement and regulatory authorities that certain casino personnel may have complied with requests from patrons to evade, or provided instructions to patrons on how to evade, reporting and recordkeeping requirements under the Bank Secrecy Act ('BSA'). It appears that casino patrons and personnel may have engaged in 'structuring' certain transactions to evade such requirements. The BSA prohibits any person, for the purpose of evading the requirement to report currency transactions or evading recordkeeping requirements under the BSA, from causing or attempting to cause a casino not to file a currency transaction report, to file a currency transaction report with material misstatements or omissions, not to maintain records required under the BSA, or to maintain these records in a form that is incomplete or inaccurate. FinCEN is issuing this advisory to remind casinos and card clubs that structuring is unlawful, and that such activity can give rise to significant civil and criminal penalties under the BSA. FinCEN is authorized to impose civil money penalties against casinos violating the BSA, and the U.S. Department of Justice prosecutes criminal violations of the BSA and related money-laundering statutes."
Financial Crimes Enforcement Network (U.S.)
2009-07-01
-
Financial Crimes Enforcement Network Guidance: Guidance on the Scope of Permissible Information Sharing Covered by Section 314(b) Safe Harbor of the USA PATRIOT Act, June 16, 2009
"The Financial Crimes Enforcement Network ('FinCEN') is issuing this interpretive guidance to clarify the application of the rule implementing section 314(b) (the '314(b) rule')1 of the USA PATRIOT Act (the 'Act').2 Specifically, this guidance clarifies that a financial institution participating in the section 314(b) program may share information relating to transactions that the institution suspects may involve the proceeds of one or more specified unlawful activities ('SUAs') and such an institution will still remain within the protection of the section 314(b) safe harbor from liability."
Financial Crimes Enforcement Network (U.S.)
2009-06-16
-
NRC Information Notice 2002-28: Appointment of Radiation Safety Officers and Authorized Users under 10 CFR Part 35
The purpose of this U.S. Nuclear Regulatory Commission (NRC) information notice (IN) is "to inform licensees of the importance of ensuring that Radiation Safety Officers (RSOs) and Authorized Users (AUs) are appointed with the individuals' knowledge and consent. This IN is also being issued to inform licensees of the new requirement affecting the appointment of RSOs under the revised 10 CFR [Code of Federal Regulations] Part 35, 'Medical Use of Byproduct Material.' It is expected that recipients will review the information for applicability to their facilities and consider actions, as appropriate, to ensure compliance with the new NRC requirement. However, no specific action nor written response is required."
U.S. Nuclear Regulatory Commission. Office of Nuclear Material Safety and Safeguards
2002-09-27
-
Illegal Alien Resident Population
"About 5.0 million undocumented immigrants were residing in the United States in October 1996, with a range of about 4.6 to 5.4 million (See Table 1). The population was estimated to be growing by about 275,000 each year, which is about 25,000 lower than the annual level of growth estimated by the INS in 1994. California is the leading state of residence, with 2.0 million, or 40 percent of the undocumented population. The 7 states with the largest estimated numbers of undocumented immigrants-- California (2.0 million), Texas (700,000), New York (540,000), Florida (350,000), Illinois (290,000), New Jersey (135,000), and Arizona (115,000)--accounted for 83 percent of the total population in October 1996. The 5.0 million undocumented immigrants made up about 1.9 percent of the total U.S. population, with the highest percentages in California, the District of Columbia, and Texas. In the majority of states, undocumented residents comprise less than 1 percent of the population."
United States. Department of Homeland Security
2001
-
Fiscal Year 2008: Transit Security Grant Program Program, Guidance and Application Kit
"The Transit Security Grant Program (TSGP) is one of five grant programs that constitute the Department of Homeland Security (DHS) Fiscal Year (FY) 2008 focus on infrastructure protection activities. TSGP is one tool among a comprehensive set of measures authorized by Congress and implemented by the Administration to help strengthen the nation's critical infrastructure against risks associated with potential terrorist attacks. The TSGP is an important component of the Department's effort to enhance the security of the Nation's critical infrastructure. The program provides funds to owners and operators of transit systems (which include intracity bus, rail, and ferry systems) to protect critical surface transportation infrastructure and the traveling public from acts of terrorism, major disasters, and other emergencies. The bulk of America's critical infrastructure is owned and/or operated by State, local and private sector partners. The funds provided by the TSGP are primarily intended to improve the security of public transit to include bus, passenger rail, and ferry systems. The TSGP also supports security funding for the National Passenger Rail Corporation (Amtrak), and freight railroad carriers.3 The purpose of this package is to provide: (1) an overview of the TSGP; and (2) the formal grant guidance and application materials needed to apply for funding under the program. Also included is an explanation of DHS management requirements for implementation of a successful application."
United States. Department of Homeland Security
2008-02
-
Fiscal Year 2010: Port Security Grant Program, Guidance and Application Kit
"The Port Security Grant Program (PSGP) is one of five grant programs that constitute the Department of Homeland Security (DHS) Fiscal Year (FY) 2010 focus on transportation infrastructure security activities. The PSGP is one tool in the comprehensive set of measures authorized by Congress and implemented by the Administration to strengthen the Nation's critical infrastructure against risks associated with potential terrorist attacks. Section 102 of the Maritime Transportation Security Act of 2002, as amended (Public Law 107-295), established the PSGP at 46 U.S.C. §70107 to implement Area Maritime Transportation Security Plans and facility security plans among port authorities, facility operators, and State and local government agencies required to provide port security services. The vast bulk of U.S. critical infrastructure is owned and/or operated by State, local and private sector partners. PSGP funds support increased port-wide risk management; enhanced domain awareness; training and exercises; and further capabilities to prevent, detect, respond to, and recover from attacks involving improvised explosive devices (IEDs) and other non-conventional weapons."
United States. Department of Homeland Security
2009-12
-
Financial Crimes Enforcement Network Guidance: Frequently Asked Questions Anti-Money Laundering Program and Suspicious Activity Reporting Requirements for Insurance Companies, March 20, 2008
"This guidance originally was issued on October 31, 2005. We have updated the guidance provided in these frequently asked questions at question 7, further coordinating the answer with guidance provided in the final anti-money laundering program rule for insurance companies that was published in the Federal Register on November 3, 2005. We additionally published frequently asked questions for insurance companies as FIN-2006-G010 on May 31, 2006. Insurance companies may continue to rely on the guidance contained in FIN-2006-G010, which has not been incorporated into this publication."
Financial Crimes Enforcement Network (U.S.)
2008-03-20
-
Directive-Type Memorandum (DTM) 09-031: Videotaping or Otherwise Electronically Recording Strategic Intelligence Interrogations of Persons in the Custody of the Department of Defense, May 10, 2010 [Incorporating Change 1, September 29, 2010]
This Department of Defense (DoD) Directive-Type Memorandum "establishes policy, assigns responsibilities, and provides uniform guidelines for videotaping or otherwise electronically recording each strategic intelligence interrogation of any person who is in the custody or under the effective control of the Department of Defense or under detention in a DoD facility, as required by subsection 1080(a) of Public Law 111-84 (Reference (a)). This DTM is effective immediately; it shall be incorporated into DoD Directive 3115.09 (Reference (b)). This DTM shall expire effective November 10, 2011."
United States. Department of Defense
2010-09-29
-
FY 2005 Transit Security Grant Program Requirements [August 19, 2005]
"The Office of State and Local Government Coordination and Preparedness (SLGCP) has established a policy for the handling and use of Sensitive Security Information (SSI) submitted by grantees as required by the FY 2005 Transit Security Grant Program (TSGP). This information is intended to provide additional information regarding this policy."
United States. Department of Homeland Security
Mayer, Matt A.
2005-08-19
-
Information Security: National Archives and Records Administration Needs to Implement Key Program Elements and Controls, Report to the Ranking Member, Committee on Finance, U.S. Senate
"Administration (NARA) is responsible for preserving access to government documents and other records of historical significance and overseeing records management throughout the federal government. NARA relies on the use of information systems to receive, process, store, and track government records. As such, NARA is tasked with preserving and maintaining access to increasing volumes of electronic records. GAO [Government Accountability Office] was asked to determine whether NARA has effectively implemented appropriate information security controls to protect the confidentiality, integrity, and availability of the information and systems that support its mission. To do this, GAO tested security controls over NARA's key networks and systems; reviewed policies, plans, and reports; and interviewed officials at nine sites. [...] GAO is making 11 recommendations to the Archivist of the United States to implement elements of NARA's information security program. In commenting on a draft of this report, the Archivist generally concurred with GAO's recommendations but disagreed with some of the report's findings. GAO continues to believe that the findings are valid."
United States. Government Accountability Office
2010-10-21
-
Charter for the Project 25 Compliance Assessment Program
"The Project 25 Compliance Assessment Program (P25 CAP) is a voluntary program that allows P25 equipment suppliers to formally demonstrate their products' compliance with a select group of requirements within the suite of P25 standards. The purpose of the program is to provide emergency response agencies with evidence that the communications equipment they are purchasing meet P25 standards for performance, conformance, and interoperability. The program requires test laboratories to demonstrate their competence through a rigorous and objective assessment process. Such a process promotes the user community's confidence in, and acceptance of, test results from recognized laboratories. All equipment suppliers that participate in the P25 CAP must use recognized laboratories to conduct performance, conformance, and interoperability tests on their products. P25 equipment suppliers will release summary test reports from recognized labs along with declarations of compliance. This documentation will serve to increase the public's confidence in the performance, conformance, and interoperability of P25 equipment. [...]. P25 CAP will provide the more than 60,000 emergency response agencies nationwide with a consistent and tractable perspective of P25 product compliance. It will also provide a means of verifying that Federal grant dollars are being invested in standardized solutions and equipment that promotes interoperability. This document serves as the charter for the P25 CAP program. It outlines the roles and responsibilities of the involved parties. This document also includes an overview of the program including what is required of testing laboratories, vendors, and other participants."
United States. Department of Homeland Security. Office for Interoperability and Compatibility
2008-04
-
Status of the Federal Bureau of Investigation's Implementation of the Sentinel Project
"This report is the seventh in the series of reviews that the Office of the Inspector General (OIG) has conducted to examine the Federal Bureau of Investigation's (FBI) progress in developing and implementing Sentinel, its new information and investigative case management system. According to the FBI's original plan, established in March 2006, Sentinel would be developed in four phases with the total cost estimated at $425 million and the completion date was estimated to be December 2009. Our prior reports examined the development and implementation of Sentinel, and in those reports we expressed concerns about Sentinel's overall progress, schedule, increased costs, and inability to satisfy user requirements. [...]. In this report, we examine the current status of the Sentinel project. We discuss the deployment of Sentinel's Phase 2 as of July 2010, and we assess the functionality of the system delivered by Phase 2 of Sentinel, including comparing what the FBI intended to deliver to its agents and analysts and what was actually delivered. We also describe the FBI's recent decision to change the partial stop-work order for Phases 3 and 4 to a full stop-work order. We discuss our concerns that the implementation of Sentinel is delayed, over budget, and in danger of not delivering a fully functioning automated case management system. Finally, we discuss the status of the FBI's newly announced plans to complete Sentinel, and our initial questions and concerns about that new strategy."
United States. Department of Justice. Office of the Inspector General
2010-10
-
DoD Global Emerging Infections Surveillance & Response System: Annual Report Fiscal Year 2008
"On 26 February 2008, the Department of Defense Global Emerging Infections Surveillance and Response System (DoD-GEIS) became a core component of the newly formed Armed Forces Health Surveillance Center (AFHSC). Now known as the GEIS Operations Division of the AFHSC, GEIS joins the Defense Medical Surveillance System and the DoD Serum Repository as part of this larger and more diverse and capable organization serving the DoD. In addition, a new director assumed leadership of DoD-GEIS on 14 July 2008. Within this new organizational framework, the worldwide partnership that is GEIS continued to promote and facilitate national and international preparedness for emerging infections while maintaining its focus on protecting the health of all DoD health care beneficiaries. GEIS continued to promote, expand, and execute its strategic goals of surveillance and detection, response and readiness, integration and innovation, and cooperation and capacity building. Five categories of infectious diseases and associated clinical states remained the GEIS priority surveillance pillars: respiratory diseases, especially influenza; gastroenteritis syndromes; febrile illness syndromes, especially dengue and malaria; antimicrobial resistance; and sexually transmitted infections."
United States. Department of Defense. Global Emerging Infections Surveillance and Response System
2010-02
-
Defense Standardization Program Journal: Homeland Security, July/September 2003
This edition of Defense Standardization Program Journal focuses on Homeland Security [Department of Homeland Security] Standardization. The following articles are included in this edition: "Interoperability and Standardization for National Homeland Security"; "Dick Tracy Comes of Age: Digital Radio Technology for the First Responders"; "Information Technology Standards and Interoperability: The Challenge of Homeland Security"; "Inter-Enterprise Architectures: Using a Collaborative Approach to Standardizing Enterprise Architecture Components"; "Radio Interoperability: One Step at a Time"; "Keynote Address at the 2003 Defense Standardization Symposium"; "2003 Defense Standardization Symposium Photo Gallery"; and "2002 Defense Standardization Program Award Winners".
Defense Standardization Program (U.S.)
2003-09
-
Remarks by President Obama and President Komorowski of Poland after Bilateral Meeting [December 8, 2010]
In their December 8, 2010 remarks, President Obama and Polish President Komorowski discuss a number of issues, including the North Atlantic Treaty Organization, missile defense, the New START treaty [Strategic Arms Reduction Treaty], and Afghanistan.
United States. Office of the White House Press Secretary
2010-12-08
-
Classifying Failing States
"The US is heavily involved in the first major war of the 21st Century - The Global War on Terrorism (GWOT). As with any militant group, the foundation of the enemy's force is their people. There are two primary strategies for defeating the terrorists and achieving victory in the GWOT. First, we must root out terrorists where they live, train, plan, and recruit and attack them militarily. Second, we must suffocate them by cutting off the supply of new soldiers willing to choose aggression or even death over their current life. This thesis helps to achieve these objectives by applying Multivariate Analysis techniques to identify the states most likely to provide asylum for terrorists. Weak and Failed States are attractive to terrorist groups looking for safe haven and recruits. Governments in these states are often unable to prevent illegal activity, and are vulnerable to corruption or takeover. Citizens of failing states often experience poverty, disease, and unemployment, and may see little hope for improvement. Terrorists can meet these disenfranchised people's basic needs and promise brighter futures for families of those willing to fight and perhaps die for the cause. [...] This thesis uses a Factor Analysis approach to identify the key indicators of state failure, and Discriminant Analysis to classify states as Stable, Borderline, or Failing based on these indicators. Furthermore, each nation's discriminant function scores are used to determine their degree of instability. The methodology is applied to 200 countries for which open source data was available on 167 variables. Results of the classification are compared with subject matter experts in the field of state failure."
Air Force Institute of Technology (U.S.)
Nysether, Nathan E.
2007-03
-
Defense Standardization Program Journal: Biometrics Standardization, October/December 2008
This edition of Defense Standardization Program Journal focuses on Biometrics Standardization. The following articles are included in this edition: "Ensuring the Interoperability of Biometrics Technology"; "A New Approach for Measuring Facial Image Quality"; "Development of a Biometrics Glossary, Data Dictionary, and Logical Data Model"; and "A Cultural Shift in Army Enterprise Architecture Paves the Way for Mission Success in an Era of Persistent Conflict".
Defense Standardization Program (U.S.)
2008-12
-
Protect New York [website]
"The catastrophic risks that New York State faces from terrorism and other disasters will challenge us for generations. To create and disseminate knowledge on ever better ways of protecting ourselves, New York must foster excellence in research, education, and public service. Founded at SUNY Downstate Medical Center, in Brooklyn, N.Y., on April 24, 2006, Protect New York is dedicated to helping New York State and New York City meet this challenge."
Protect New York