Advanced search Help
Clear all search criteria
Only 2/3! You are seeing results from the Public Collection, not the complete Full Collection. Sign in to search everything (see eligibility).
-
Army Science Planning and Strategy Meeting: The Fog of Cyber War
From the technical report abstract: "The Army Science Planning and Strategy Meeting on The Fog of Cyber War took place on January 7-8, 2016, at the US Army Research Laboratory's Adelphi Laboratory Center. The meeting examined the theoretical foundations of the 'fog of cyber war' concept for Army battlefield operations. The workshop identified several key research questions associated with this concept: 1) What theoretically grounded models can help characterize the complex tradeoff inherent in radical dispersion of information among mobile tactical edge devices (and related diversification of channels and protocols), including tradeoffs of communications overhead, energy consumption, and security impacts? 2) What approaches, including semantic-based techniques, can help minimize the impact of dispersion on timely, secure and efficient regathering of information in a fashion that would support formation of situational awareness appropriate to the time, place, and mission of the user? 3) Could risk or other related metrics, along with new analytical methods that are in part game-theoretic, serve as a comprehensive framework for characterizing the 'goodness' of cyber fog? 4) What formal models, theories, methods, and tools can be devised to execute and manage successful obfuscations of friendly information within cyber fog?"
U.S. Army Research Laboratory
Kott, Alexander; Swami, Ananthram; West, Bruce J.
2016-12
-
Funding of Boko Haram and Nigerias Actions to Stop it
From the thesis abstract: "Since 9/11, the United States and the international community have taken numerous steps to combat the financing of terrorism. Terrorist organizations have adapted and become innovative to ensure their monetary funds are secure and undetectable. Boko Haram is one organization that has found ways to ensure its finances are almost undetectable. Over the past 12 years, Boko Haram has become a powerful and destructive violent extremist organization while obtaining millions of dollars in funding. The United States and the international community must look for ways to disrupt Boko Haram's financial apparatus outside conventional counter threat finance measures. The goal of this paper is to examine Boko Haram's finances and the steps that have been taken to stop its funding, including identifying what, if any, new approaches can be used to prevent the ongoing funding of Boko Haram."
Naval Postgraduate School (U.S.)
Rock, Jason L.
2016-12
-
SAVER Market Survey Report: Asset Tracking and Inventory Systems [December 2016]
"Asset tracking and inventory systems read information from labels or tags affixed to physical assets and help manage information such as item quantities, locations, personnel assignments, and maintenance needs. Emergency response agencies use them to keep track of important items such as firearms, vehicles, evidence, tools, medical kits, and disaster relief supplies. To provide emergency responders with information on asset tracking and inventory systems, the System Assessment and Validation for Emergency Responders (SAVER) Program conducted a market survey. This market survey report is based on information gathered from February through April, 2016 from vendors, Internet research, and a government issued Request for Information that was posted on the Federal Business Opportunities website. For inclusion in this report, the asset tracking and inventory systems had to meet the following criteria: (1) Commercially available software for the tracking and/or inventory of physical assets (2) Integrate barcode, radio frequency identification (RFID), and/or global position system (GPS) technologies Due diligence was performed to develop a report that is representative of products in the marketplace."
United States. Department of Homeland Security; System Assessment and Validation for Emergency Responders (SAVER)
2016-12
-
ITL Bulletin: Rethinking Security Through Systems Security Engineering (December 2016)
This document is the Information Technology Laboratory (ITL) Bulletin for December 2016 from the National Institute of Standards and Technology. From the Introduction: "After four years of research and development, NIST [National Institute of Standards and Technology] has published a groundbreaking new security guideline, Special Publication (SP) 800-160, Systems Security Engineering. The publication draws from proven system engineering processes to address the longstanding problem of how to build trustworthy, secure systems--systems that can provide continuity of capabilities, functions, services, and operations during a wide range of disruptions, threats, and other hazards. Development was led by NIST Fellow Dr. Ron Ross who said he thinks NIST SP 800-160 'is the most important publication that I have been associated with in my two decades of service with NIST.' NIST SP 800-160 addresses the engineering-driven perspective and actions necessary to develop more defensible and survivable systems, inclusive of the machine, physical, and human components that compose the systems and the capabilities and services delivered by those systems. It starts with, and builds upon, a set of well-established international standards for systems and software engineering published by the International Organization for Standardization (ISO), the International Electrotechnical Commission (IEC), and the Institute of Electrical and Electronics Engineers (IEEE) and infuses systems security engineering methods, practices, and techniques into those systems and software engineering activities."
National Institute of Standards and Technology (U.S.); Information Technology Laboratory (National Institute of Standards and Technology). Computer Security Division
Ross, Ron; Feldman, Larry; Witte, Greg
2016-12
-
Is NATO Ready for a Cyberwar?
From the this abstract: "This thesis analyzes the sufficiency and effectiveness of the North Atlantic Treaty Organization's (NATO) cyber policies against cyber threats, considering the recent cyber cases and incidents that could be related to NATO's cyber defense. The authors use analytical and descriptive approaches to answer the research questions by examining the categories of cyber threats facing NATO and the policies implemented to fight against cyber operations and attacks. Finally, the authors make policy recommendations in order to respond to cyber threats more effectively in regard to eight specific areas: cooperation with the European Union; relations with business enterprises; information sharing among members; education, training, and exercises; capabilities of NATO Communications and Information Agency (NCIA); critical infrastructure protection; cyber law and legislature; and collective cyber defense. The cyber domain is a challenging arena in which to carry out operations and develop policies. NATO can be considered successful in cyberspace; however, the alliance should be aware that there is no limit to the development of capabilities, especially in cyber defense issues."
Naval Postgraduate School (U.S.)
Canbolat, Mustafa; Sezgin, Emrah
2016-12
-
Special Operations And Cyber Warfare
From the thesis abstract: "As the United States Special Operations Command (USSOCOM) prepares for future conflicts, some have questioned its ability to conduct Special Warfare and Surgical Strike in all domains of warfare, to include the cyber domain. This thesis examines the applicability of cyber operations to U.S. special operations and whether the cyber support provided by the United States Cyber Command (USCYBERCOM) is sufficient to meet USSOCOM's potential cyber requirements. It explores USSOCOM's congressionally mandated core activities and how cyber operations could promote such activities. Finally, the thesis provides a decision theory and operational design analysis of how USSOCOM could build its own internal cyber capability - if USSOCOM determines USCYBERCOM cannot meet the cyber requirements of the special operations community. The researcher was unable to conclude as to whether USCYBERCOM's cyber support to USSOCOM was sufficient. USCYBERCOM's cyber support structure is still too immature for analysis and therefore necessitates future research by USSOCOM. The thesis does conclude USSOCOM can improve their special operation's efficacy by incorporating the cyber domain. Finally, the research concludes, if USSOCOM were to build a cyber capacity, the reflagging of the 95th Civil Affairs Brigade would be the best course of action."
Naval Postgraduate School (U.S.)
Tebedo, Jason C.
2016-12
-
American Red Cross: A History and Analysis
From the thesis abstract: "We, in this research, provide a detailed history and highlight current operations of the American National Red Cross (ANRC). We analyze the organization's mission, purpose, structure, and relationship with the U.S. government and provide an analysis of its financial status and capabilities and competencies based on the Sphere Project standards in order to inform government organizations and disaster planners. We find that the ANRC generates sufficient revenue to execute relief operations and other services and is efficient and competent in all essential services and capabilities for disaster response. We also find that its fundraising efficiencies are directly tied to the size of domestic disasters the organization responds to in any given year. However, the ANRC is struggling to break even in its biomedical services program."
Naval Postgraduate School (U.S.)
Egan, Tim; Pravongviengkham, Thanousone
2016-12
-
Fighting with the Air: Airpower, Violence, and Public Sentiment in Irregular Warfare
"What are the impacts of airstrikes on civilian sentiment and political violence? With increased air campaigns and technology proliferation in the Middle East and Africa, there exists a significant gap exploring airstrike associations within irregular warfare. In response, this thesis uses new geospatial measurements to map civilian sentiment in Yemen. Then, spatiotemporal windows are utilized to assess associations between airstrikes, sentiments, and political violence. The findings imply that airstrikes are associated with an increase in extreme sentiment--for both states, and for insurgencies--suggesting that airstrike effects mobilize bystanders to participate in the political process. Furthermore, the findings indicate that airstrikes raise the level of post-strike political violence in Yemen and Pakistan, but may decrease post-strike political violence in Afghanistan and Somalia. This gives credence to the theory that narrative distribution may be a critical link that connects secondary airstrike effects with policy goals within the human domain. In addition, information asymmetry between competing narrative campaigns and civilians may be a viable theory to connect extreme sentiment and political violence."
Naval Postgraduate School (U.S.)
Capra, James L.
2016-12
-
Analysis of Unmanned Systems in Military Logistics
"The purpose of this thesis is to analyze the current and potential applications of unmanned systems in military logistics. In seeking to evaluate uses of unmanned systems, initially, we aimed to define current and proposed unmanned applications in civilian-sector logistics and current military logistics challenges. Then, justifying uses of unmanned systems in the commercial sector and military, we analyzed the potential advantages and risks of these systems by using archival analysis and case studies. Finally, we addressed recommendations on the current and future uses of unmanned systems in military logistics. Unmanned technology is an area open to development. There has been extensive use of unmanned vehicles in military operations such as reconnaissance, surveillance, and armed attacks. Changing economic conditions and advances in technology indicate that there may also be opportunities to employ unmanned systems to support logistic operations."
Naval Postgraduate School (U.S.)
Ergene, Yigit
2016-12
-
Nexus of Crime and Terrorism: The Case of the Abu Sayyaf Group
From the thesis abstract: "The purpose of this study is to provide a clear understanding of the nexus of crime and terrorism, using the Abu Sayyaf Group (ASG) as a case study. This terrorist group in the southern part of the Philippines has evolved as a hybrid organization, combining terrorist and criminal activities to achieve its objectives. Moreover, as a terrorist organization, ASG effectively employs criminal tactics for its survival. This group draws its strength and resilience from collusion with various lawless elements and other criminal groups in Mindanao. This paper examines the theoretical framework of Makarenko's Crime-Terror (CT) Continuum to provide compelling explanations of the interaction and interoperability of crime and terrorism in the case of the ASG. It also highlights the Philippine CT strategy and approach to counter terrorism and discusses some notable gaps and problems, particularly its failure to recognize the ASG as a hybrid organization. This thesis concludes that the current Philippine counterterrorism strategy, although effective and in good shape, seems inadequate against hybrid organizations. Thus, this paper proposes that the Philippines reexamine its current CT strategy to be more appropriate, effective, and responsive against hybrid terrorist organizations."
Naval Postgraduate School (U.S.)
Salem, Allan Jones A.
2016-12
-
Norms in Conflict: Statecraft, Preventive Force, and Counter Proliferation
From the thesis abstract: "Israel's preventive attacks against Iraq's Osirak nuclear reactor in 1981 and Syria's Al-Kibar nuclear site in 2007 are often used to illustrate a fundamental precept of realism--that states will use military force to halt the rise of a rival state, especially if that rival attempts to gain a nuclear weapons capability. However, this approach does not fully explain the timing of such attacks, nor does it account for the consequences of violating another state's sovereignty. In contrast to realism's emphasis on the material balance of power, constructivism focuses on how ideational factors, such as norms of appropriate behavior, shape and constrain a state's behavior. By process tracing the events surrounding the attacks at Osirak and Al-Kibar, this thesis finds that the international norms of sovereignty, intervention, and non-proliferation had a strong influence over Israel's behavior. It builds a normative theory of preventive attack that highlights the role that national identity, sanctions, and ethics play in counter-proliferation strategies. Finally, it concludes by offering policy recommendations for predicting future preventive attacks and leveraging international norms to halt nuclear proliferation."
Naval Postgraduate School (U.S.)
Allbright, James J.
2016-12
-
Department of Defense: Law of War Manual [December 2016]
This document is the updated version of the Department of Defense Law of War Manual. "This manual is a Department of Defense (DoD)-wide resource for DoD personnel -
including commanders, legal practitioners, and other military and civilian personnel - on the law of war. This manual has many distinguished antecedents that have provided important guidance to the U.S. Armed Forces. For example, General Order No. 100, the Instructions for the Government of Armies of the United States in the Field, commonly known as the Lieber Code, was prepared by Professor Francis Lieber and approved by President Abraham Lincoln during the Civil War in 1863. A similar code related to naval warfare titled The Law and Usages of War at Sea: A Naval War Code was prepared by then-Captain Charles H. Stockton and approved by President William McKinley in 1900. The War Department published instructions for the armed land forces of the United States in a 1914 manual titled Rules of Land Warfare, which was updated in 1917, 1934, and 1940."
United States. Department of Defense; United States. Department of Defense. Office of General Counsel
2016-12
-
FBI Law Enforcement Bulletin: December 2016
This edition of the FBI Law Enforcement Bulletin contains the following articles: "Theft: A Real Threat to Religious Heritage" by Paul Denton, and John Kleber; "Teams: A Pathway to Organizational Success" by Dan Bradley, and James A. Jancewicz; "Redefining School Resource Officers' Roles" by Christopher Boyd, and Chief Tomas Sanchez; and "Communicating with Millennials: Using Brevity" by Cory McGookin.
United States. Federal Bureau of Investigation
2016-12
-
EMR-ISAC: InfoGram, Volume 16 Issue 47 [December 01, 2016]
The Emergency Management and Response Information Sharing and Analysis Center's (EMR-ISAC) InfoGram is a weekly publication of information concerning the protection of critical infrastructures relevant to members of the Emergency Services Sector. This issue includes the following articles: "Chimney Fires Spike as Winter Arrives," "When a Disaster Exceeds Expectations," "New Preparedness Rule for Healthcare Providers," and "ESS Webinar: Measuring Readiness."
Emergency Management and Response-Information Sharing and Analysis Center (U.S.)
2016-12-01
-
Overseas Contingency Operations: Observations on the Use of Force Management Levels in Afghanistan, Iraq, and Syria, Statement of Cary Russell, Director, Defense Capabilities and Management, Testimony before the Subcommittee on Oversight and Investigations, Committee on Armed Services, House of Representatives
"The United States has engaged in
multiple efforts in Afghanistan, Iraq, and
Syria since declaring a global war on
terrorism in 2001. Currently, in
Afghanistan, Iraq, and Syria, U.S. forces
are deployed under force management
levels set by the administration. Force
management levels and similar caps
limit the number of U.S. military
personnel deployed to a given region
and have been a factor in military
operations at least since the Vietnam
War. Force management levels were
also used to shape the drawdowns of
operations in Afghanistan and Iraq. In
June 2016, the President announced
that the force management level for
Afghanistan is 9,800. According to
DOD, in September 2016 the United
States authorized additional troops for
Iraq and Syria, for a total of 5,262.
Today's testimony discusses some of
the actions DOD has taken to maximize
military capabilities while operating
under force management levels in
ongoing operations.
In preparing this statement, GAO [Government Accountability Office] relied
on previously published work related to
operations in Afghanistan, Iraq, and
Syria since 2001. GAO made 18 recommendations in
prior work cited in this statement. DOD
has implemented 12 of them. Continued
attention is needed to ensure that some
recommendations are addressed, such
as improving visibility in total Special
Operations funding to determine
whether opportunities exist to balance
deployments across the joint force."
United States. Government Accountability Office
Russell, Cary
2016-12-01
-
2015 Yearbook of Immigration Statistics
From the Introduction: "Statistical data on immigration have been published annually by the U.S. government since the 1860s. Over the years, the federal agencies responsible for reporting on immigration have changed, as have the content, format, and title of the annual publication. Currently, immigration data are published in the Yearbook of Immigration Statistics by the Office of Immigration Statistics in the Policy Directorate of the Department of Homeland Security."
United States. Office of Immigration Statistics
Johnson, Jeh Charles; Bersin, Alan Douglas, 1946-; Rosenblum, Marc R.
2016-12
-
U.S.-China Strategic Dialogue: Phase IX Report
From the Document: "In this meeting, participants on the Chinese side included a mix of active and retired senior PLA [People's Liberation Army] officers, officials from the MFA [Ministry of Foreign Affairs] and Ministry of National Defense (MND), experts from government-run civilian Chinese think tanks, and scholars from Chinese universities. The U.S. delegation included participants from government, including Lawrence Livermore National Laboratory (LLNL) and National Defense University (NDU); think tanks such as Pacific Forum CSIS [Center for Strategic and International Studies]; and universities such as the University of California-San Diego. It also included observers from the State Department, the Joint Staff, USPACOM [United States Pacific Command], USSTRATCOM [United States Strategic Command], Global Strike Command, and DTRA [Defense Threat Reduction Agency], among others. In total, there were more than 25 American participants. One of the goals of this series of meetings is to create a community of regular participants who develop accumulated learning and the personal trust needed to facilitate a more open discussion. This effort met with much success this year in frank, substantive discussions unhindered by boilerplate debates and the increasingly tense tenor of the overall bilateral relationship." Note: This document has been added to the Homeland Security Digital Library in agreement with the Project on Advanced Systems and Concepts for Countering WMD (PASCC) as part of the PASCC collection. Permission to download and/or retrieve this resource has been obtained through PASCC.
Naval Postgraduate School (U.S.). Center for Contemporary Conflict
Twomey, Christopher P.; Glosny, Michael A.; Wueger, Diana . . .
2016-12
-
Middle Ground on Gun Control
From the thesis abstract: "Each tragic shooting incident that the American news media covers highlights the problem of gun violence in the United States. However, the focus of this reporting is rarely on the largest component of total gun deaths: suicides. Suicides make up two-thirds of all gun deaths. Limiting access to firearms for individuals with suicidal tendencies could cause a significant reduction in the total number of casualties included in gun violence statics. This thesis examines the efficacy of adding more mental health information to the FBI's database of persons who are prohibited from gun purchases, and also compares U.S. gun laws to the National Firearms Agreement in Australia, which is widely accepted as an effective gun control measure. This research finds that mental health information on clinical depression and schizophrenia can be a strong predictor of suicidal tendencies, and reporting of this information could be improved in order to reduce overall gun violence. Improved mental health reporting must be a matter of federal law, because current state laws on guns vary widely and have limited effectiveness."
Naval Postgraduate School (U.S.)
Stewart, Peter A.
2016-12
-
National Near-Earth Object Preparedness Strategy
"This document was developed by the Interagency Working Group (IWG) for Detecting and Mitigating the Impact of Earth-bound Near-Earth Objects (NEOs) (DAMIEN). The Strategy seeks to improve our Nation's preparedness to address the hazard of near-Earth object (NEO) impacts by enhancing the integration of existing national and international assets and adding important capabilities that are currently lacking. The Strategy builds on efforts at the National Aeronautics and Space Administration (NASA) to better detect and characterize the NEO population as well as recent efforts at the Department of Homeland Security (DHS) to prepare for and respond to a NEO impact."
National Science and Technology Council (U.S.); United States. White House Office
2016-12
-
Then and Now: Comparing the Flow of Foreign Fighters to AQI and the Islamic State
"It is not known if Ahmad `Abd al-Sayyid Hamad and Murad Khalid al-Tayhi knew each another. Yet, they shared a common bond. A number of factors about the two young men were similar. Both were from Libya, and both grew up in the eastern city of Darnah. In search of adventure and greater purpose, both also decided to leave their homes--and they were some of the first ones from their town to go. They ended up in a similar place: Ahmad in Iraq and Murad in Syria. Their common bond? Both wanted to become suicide bombers, albeit at diferent times, for the group that now calls itself the Islamic State. Despite the connections that these two Libyans shared, there are also a number of important diferences between them. When Ahmad left home he was 23; Murad was 15, eight years younger. Seven years, and multiple twists and turns in world events, separated their journeys. Ahmad arrived in Iraq on the same day as three other Libyans (who were likely his travel companions); Murad, however, appears to have been the only Libyan foreign fighter to arrive in Syria on the day he entered that country. Lastly, while they both ended up with derivatives of the same organization, the groups that Ahmad and Murad volunteered to serve were run diferently and had diferent levels of appeal."
Combating Terrorism Center (U.S.)
Dodwell, Brian; Milton, Daniel J. (Daniel James); Rassler, Don
2016-12
-
Congressional Budget Office Cost Estimate: H.R. 6297: Iran Sanctions Extension Act
"H.R. [House Bill] 6297 would reauthorize the Iran Sanctions Act of 1996 (Public Law 104-172) through calendar year 2026. That act will expire at the end of calendar year 2016. The Administration has indicated that it has existing authorities to impose those sanctions on Iran. Thus, CBO [Congressional Budget Office] estimates that enacting H.R. 6297 would not affect direct spending or revenues, and that pay-as-you-go procedures do not apply to the act. CBO estimates that enacting H.R. 6297 would not increase net direct spending or on-budget deficits in any of the four consecutive 10-year periods beginning in 2027."
United States. Congressional Budget Office
2016-12-01
-
COIN Conundrum: The Future of Counterinsurgency and U.S. Land Power
"The debate over counterinsurgency (COIN), seemingly dormant since the end of the Vietnam War, has been rekindled by the conflicts in Iraq and Afghanistan. Since the 2006 publication of the U.S. Army/
Marine Corps Field Manual (FM) 3-24, 'Counterinsurgency', practitioners and scholars have argued over the efficacy of COIN. Supporters insist that the new approach outlined in the manual led to the creation of a strategy that defeated the Iraqi insurgents between 2006-2009. Critics argue that the surge of 30,000 additional troops, robust conventional operations, and the end of the Shia uprising-not a new COIN strategy-caused violence in Iraq to decline dramatically. They point to the failure of the campaign in Afghanistan as further evidence that COIN does not work. In an era of declining Pentagon budgets, this debate has significant implications for U.S. land forces. This monograph considers the place of COIN in U.S. Army doctrine, training, and resource allocation. It begins with a brief overview of the U.S. military's historical experience combating insurgency before considering the recent campaigns in Iraq and Afghanistan. The monograph then examines in detail the contemporary, scholarly, and professional debate over the efficacy of COIN and its place in U.S. defense planning. Recognizing that consideration of this important issue must be grounded in an examination of the contemporary security environment, the monograph reviews official threat assessments. It then considers the current U.S. military capacity for addressing identified threats. That capacity includes force structure, doctrine, and learning institutions."
Army War College (U.S.). Strategic Studies Institute
Mockaitis, Thomas R., 1955-
2016-12
-
Medical Surveillance Monthly Report [December 2016]
This December 2016 issue of the "Medical Surveillance Monthly Report" contains the following articles: "Incident Diagnoses of Non-Melanoma Skin Cancer, Active Component, U.S. Armed Forces, 2005-2014"; "Zika Virus Infections in Military Health System Beneficiaries Since the Introduction of the Virus in the Western Hemisphere, 1 January 2016 Through 30 November 2016"; "Surveillance Snapshot: Findings from the Department of Defense Global, Laboratory-based, Influenza Surveillance Program, 2015-2016 Influenza Season"; and "Deployment-related Conditions of Special Surveillance Interest".
Armed Forces Health Surveillance Center (U.S.)
2016-12
-
Special Warfare, July-December 2016
This is the second entry in volume 29 of Special Warfare magazine. This edition specifically focuses on the cyber realm and Special Operations Forces training. "Special Warfare is an authorized, official quarterly publication of the United States Army John F. Kennedy Special Warfare Center and School, Fort Bragg, N.C. Its mission is to promote the professional development of special-operations forces by providing a forum for the examination of established doctrine and new ideas."
John F. Kennedy Special Warfare Center and School (U.S.)
2016-12
-
Terror Threat Snapshot [December 2016]
From the press release: "The December Terror Threat Snapshot was released today by Homeland Security Committee Chairman Michael McCaul (R-TX). The 'snapshot' is a monthly Committee assessment of the growing threat America, the West, and the world face from ISIS and other Islamist terrorists. […] Key takeaways in this month's Terror Threat Snapshot: [1] Since 9/11, the nation has seen 227 homegrown jihadist cases with a recent surge of 115 cases in 2015 and 2016 alone. [2] Throughout the year, ISIS conducted 62 attacks, wounding 732 and killing 215 in places like the United States, France, and Belgium. [3] The Iran nuclear deal--coupled with instability in Iraq, Syria, and Yemen--has reenergized Tehran's hardliners and placed the regime in a stronger position to achieve regional hegemony. [4] The Obama Administration transferred 48 prisoners from Guantanamo Bay in 2016."
United States. Congress. House. Committee on Homeland Security
2016-12
-
Frontline: [Vol. 8, Issue 3]
This edition of the U.S. Customs and Border Protection's (CBP) "Frontline" contains the following articles: "Homecoming" ; "A New Way Forward" ; "Around the Agency" ; "Exploring Law Enforcement" ; and "The Express Lane is Open for Business".
U.S. Customs and Border Protection
2016-12
-
Viewpoints in Homeland Defense and Security: Using Collaboration to Understand Border Security and Cartels [video]
"Jaeson Jones, Captain (ret) Texas Department of Public Safety, is interviewed in this first episode of a series of Casual Conversations with CHDS [Center for Homeland Defense and Security] Alumni and other subject matter experts in Homeland Security. This video focuses on the importance of collaboration among US organizations to understand cartels and border security."
Naval Postgraduate School (U.S.). Center for Homeland Defense and Security
2016-12-01
-
Evaluation of Diesel Exhaust Exposures at Multiple Fire Stations in a City Fire Department
"We evaluated three fire stations because fire fighters were concerned about exposure to diesel exhaust in the fire station from fire fighting apparatus. We measured low levels of diesel exhaust in the living areas and apparatus bay at all three fire stations. We recommended having the apparatus bay exhaust fans operate automatically when bay doors are opened, moving turnout gear away from apparatus exhaust pipes, and removing exercise equipment from the apparatus bay."
Centers for Disease Control and Prevention (U.S.); National Institute for Occupational Safety and Health
Couch, James B.; Broadwater, Kendra; de Perio, Marie A.
2016-12
-
Transitioning North American Energy Independence: U.S. Coast Guard/District 8 View
"North American energy commerce is thriving with dramatic increases to energy production and transportation. A maritime nation, the United States depends on the seas and inland waterways for economic prosperity and security, both of which are intertwined and face evolving challenges. With lead Federal responsibility for ensuring the safety, security, and stewardship of the Nation's waters, the Coast Guard must have the capabilities to enable Coast Guard men and women to do their jobs in an inherently dangerous environment. Continuing growth in global energy trade, increased use of the seas and inland waterways, and the demand for strong maritime governance demands a U.S. Coast Guard that is Always Ready. The Coast Guard protects the Nation's scarce marine resources, and enables the safe exploitation of mineral and energy resources in the territorial sea, Exclusive Economic Zone (EEZ), and continental shelf. The United States relies on its ports and coastal and inland waterways as safe avenues of trade and transportation for the majority of U.S. global commerce, fueling America's economy. However, with the continuous expansion of the North American energy market, U.S. ports, inland and coastal waterways, and offshore zones are vulnerable to illicit activities, manmade disasters, and other threats. The U.S. Marine Transportation system IS national critical infrastructure."
United States. Coast Guard
2016-12
-
Enhancing Security and Stability in Afghanistan [December 2016]
"The Afghan National Defense and Security Forces (ANDSF) have shown promising but inconsistent progress as they near the end of their third year in the lead for security of their country and the second year maintaining full security responsibility with limited U.S. or coalition support on the battlefield. During the June 1 to November 30, 2016, reporting period, the ANDSF effectively executed their 2016 summer campaign plan, Operation 'Shafaq'; capability gaps in key areas such as intelligence, aviation, and logistics are improving but still hinder effectiveness. The ANDSF retained control of major population areas and quickly responded to and reversed any Taliban gains. [...] The President's July 2016 decision reaffirms the U.S. Government's enduring commitment to the ANDSF, to the Afghan Government, and most importantly to the Afghan people. The decision also recognizes that the ANDSF will require more time and assistance to develop into an effective, sustainable, and affordable force that can protect the Afghan people and contribute to regional and international security. During this reporting period, 39 NATO Allies and partner nations and the broader international community also reaffirmed their commitment to enhancing security and stability in Afghanistan."
United States. Department of Defense
2016-12