Advanced search Help
Clear all search criteria
Only 2/3! You are seeing results from the Public Collection, not the complete Full Collection. Sign in to search everything (see eligibility).
-
Why Didn't You Tell Me?: Toward Building a Model of Why Information is Not Shared Well in Organizations
The effective use of information in an organization is vital to its success. One of the biggest investments being made today by companies is in their information infrastructures. However, with all of the resources being dedicated to improving information flows, evidence shows that organizations still do not share information as widely as they could or should be. Many studies have been conducted to learn the reasons why people in organizations do not share information as well as would be good. However, no study was found that reported the relative frequency of reported reasons for not sharing information. This paper gathers and reports that information. A study such as this can help information managers identify areas within their organizations where information is not being shared well and decide where focusing their efforts will be most productive when trying to increase information sharing.
Air Force Institute of Technology (U.S.)
Kitchen, Robert C.
1999-12
-
1997 National Youth Gang Survey: Summary
"The largest and most comprehensive national gang survey to date, the 1997 National Youth Gang Survey, conducted by the National Youth Gang Center, contacted nearly 5,000 law enforcement agencies across the country. To allow for both comparative and trend analysis, the 1997 survey used the same sample as the 1996 survey. Survey results indicate that the percentage of jurisdictions reporting active youth gangs decreased from the previous year, from 53 percent in 1996 to 51 percent in 1997. Some 816,000 gang members were active in some 30,500 youth gangs in 1997, a modest decrease from the previous year's figures of 846,000 and 31,000, respectively. Despite these declines, however, there are still serious problems to be addressed. For example, every city with a population of 250,000 or greater reported the presence of youth gangs. In addition, the number of gang members increased in small cities and rural counties, as youth gangs continued to spread beyond the confines of the Nation's major cities."
United States. Office of Juvenile Justice and Delinquency Prevention
National Youth Gang Center (U.S.)
1999-12
-
Report of the CDC/ATSDR Working Group on a Shared Vision for Environmental Public Health at CDC/ATSDR
"Reports from The Future of Public Health, published by the Institute of Medicine in 1988, to the Pew Environmental Health Commission report, Americas Environmental Health Gap, published in 2000, point to the need to establish a strengthened national focus on environmental public health. In August 2000, Dr. Jeffrey P. Koplan, Director, Centers for Disease Control and Prevention (CDC), and Administrator, Agency for Toxic Substances and Disease Registry (ATSDR), charged the National Center for Environmental Health (NCEH), CDC, and
ATSDR with developing a plan that would describe the elements of a comprehensive environmental public health program and the strategies that could advance such a program at CDC and ATSDR. In response to this charge, we formed a Working Group comprised of senior scientists and managers from NCEH and ATSDR to develop a shared vision for environmental public health at NCEH and ATSDR. The product of the Working Group, Report of the CDC/ATSDR Working Group on a Shared Vision for Environmental Public Health at CDC/ATSDR, is designed as a first step to build an enhanced national and international resource at NCEH and ATSDR for jointly addressing environmental public health threats and promoting health by improving the environment in which we live. The environmental public health objectives presented in Healthy People 2010, published by the Department of Health and Human Services; the Pew Report; and input from our external partners will help guide NCEH's and ATSDR's work."
United States. Agency for Toxic Substances and Disease Registry
2000
-
Use of Biometric Identification Technology to Reduce Fraud in the Food Stamp Program: Final Report
"This report provides an overview of the experience of nine States with biometric identification technologies as of September 1999 and discusses some of the major policy and operational issues encountered during implementation and testing. The report also synthesizes available information on the effectiveness of the technology in reducing duplicate participation and provides a discussion of measurement complexities and issues on the horizon as use of the technology continues to expand. A companion report contains an overview of biometric identification technology, examining the functional capabilities, performance, and applications of the various technologies with a particular focus on finger imaging, the most commonly used and well known."
United States. Department of Agriculture
1999-12
-
Recommendations for Tribal Integration into the Radiological Emergency Preparedness (REP) Program
This document examines how best to include Tribal governments in the Radiological Emergency Preparedness (REP) program. "The United States has a trust relationship with all federally recognized Indian Tribes. This trust responsibility, which has always existed, is the unique fiduciary and legal duty of the United States to assist Indian Tribes in the protection of property and rights. It arises from treaties, statutes, executive orders, legal precedence, and the United States Constitution. The purpose of the trust is and always has been to insure the survival and welfare of Indian Tribes and people. This includes an obligation to provide those services required to protect and enhance Indian lands, resources, and self-government, and also includes those economic and social programs which are necessary to raise the standard of living and social well-being of the Indian people to a level comparable to the non-Indian society. This duty has long been recognized implicitly by Congress in numerous acts... Consequently, at its core, the trust relationship has meant to them the guarantee of the U.S. that solemn promises of federal protection for lands and people would be kept."
United States. Federal Emergency Management Agency
2000
-
Citizen's Guide to Risk Assessments and Public Health Assessments at Contaminated Sites
"Contaminated sites may include federally identified Comprehensive Environmental Response, Compensation, and Liability Act (CERCLA or Superfund) sites and Resource Conservation and Recovery Act (RCRA) sites managed under state environmental programs, state Superfund sites, NPL sites, emergency response sites, and removal action sites. The Agency for Toxic Substances and Disease Registry (ATSDR) is a federal public health agency charged with protecting people from hazardous substances in the environment. ATSDR works at both CERCLA and RCRA sites, as well as other sites at which citizens are concerned about contamination. ATSDR is responsible for evaluating the public health impact (i.e., diseases or illnesses) of past, current, or future site contamination. ATSDR and state public health offices use the public health assessment process to evaluate the health impact of sites and to develop appropriate recommendations to ensure that people will not be exposed to harmful levels of chemicals released from contaminated sites. A complete guide to how ATSDR becomes involved in working on contaminated sites and to the public health assessment process can be accessed at ATSDR's Web site, www.atsdr.cdc.gov."
United States. Agency for Toxic Substances and Disease Registry
2000
-
Threats and Opportunities for Advancing the Major Global Interests of the United States
"Politicians within our government have often justified their actions in the international arena as taken in support of the national interest. During the Cold War, just about any reasonable action could have been defended in terms of supporting the national interest, which was to counter the spread of Soviet sponsored communism. But in the complex, ever-changing, increasingly globalized and interdependent world we live in today, the Red menace threat is no longer the primary unifying element of national security policy. Appropriate responses to threats such as regional conflicts, the proliferation of weapons of mass destruction, terrorism and international crime are difficult to gauge, especially if they occur in unfamiliar regions of the globe (e.g., East Timor). In addition, the American public and Congress (with the help of the media), now demands more accountability and they repeatedly challenge the President to clearly outline exactly which of our important interests are to be served by taking the proactive or reactive steps in question. Challenges will be more intense when long and short term costs associated with taking those actions are not defined nor appropriately balanced against the risks. In order to develop an informed opinion on the justification for taking actions to counter threats or availing ourselves of opportunities for advancing our major global interests, an understanding of the term national interest is necessary."
National Defense University
Kerski, Mark J.
2000
-
Annual Energy Outlook 2000 with Projections to 2020
"The Annual Energy Outlook 2000 (AEO2000) presents midterm forecasts of energy supply, demand, and prices through 2020 prepared by the Energy Information Administration (EIA). The projections are based on results from EIA's National Energy Modeling System (NEMS). The report begins with an 'Overview' summarizing the AEO2000 reference case. The next section, 'Legislation and Regulations,' describes the assumptions made with regard to laws that affect energy markets and discusses evolving legislative and regulatory issues. 'Issues in Focus' discusses current energy issues--appliance standards, gasoline and diesel fuel standards, natural gas industry expansion, competitive electricity pricing, renewable portfolio standards, and carbon emissions. It is followed by the analysis of energy market trends. The analysis in AEO2000 focuses primarily on a reference case and four other cases that assume higher and lower economic growth and higher and lower world oil prices than in the reference case. Forecast tables for these cases are provided in Appendixes A through C. Appendixes D and E present a summary of the reference case forecasts in units of oil equivalence and household energy expenditures. Other cases explore the impacts of varying key assumptions in NEMS--generally, technology penetration. The major results are shown in Appendix F. Appendix G briefly describes NEMS and the AEO2000 assumptions, with a summary table of the cases. Appendix H provides tables of energy and metric conversion factors."
United States. Energy Information Administration
1999-12
-
Second Report on Inadvertent Releases of Restricted Data and Formerly Restricted Data under Executive Order 12958 (U): Report to the Committee on Armed Services of the Senate, the Committee on Armed Services of the House of Representatives, the Assistant to the President for National Security Affairs
"The National Defense Authorization Acts for Fiscal Year 1999 and 2000 (Public Laws 105-261 and 106-65), require that the Secretary of Energy notify the Committee on Armed Services of the Senate, the Committee on Armed Services of the House of Representatives, and the Assistant to the President for National Security Affairs of inadvertent releases of Restricted Data (RD) or Formerly Restricted Data (FRD) associated with records processed under Executive Order (E.O.) 12958. As a result of the Department of Energy's (DOE's) audits of approximately 52 million pages of publicly available records accessioned by the National Archives and Records Administration (NARA), the Department discovered 25 documents containing RD and FRD which were inadvertently released. The documents total approximately 560 pages of which about 40 pages were classified. The documents were marked Secret or Confidential, except for two marked Top Secret and one which was unmarked."
United States. Department of Energy. Office of Classified and Controlled Information Review
1999-12
-
Cyber Warfare: Protecting Military Systems
Software is a key component in nearly every critical system used by the
Department of Defense. Attacking the software in a system--cyber warfare--
is a revolutionary method of pursuing war. This article describes various cyber
warfare approaches and suggests methods to counter them.
Defense Acquisition University (U.S.). Press
Alford, Lionel D., Jr.
2000
-
Process Safety Management
"This booklet summarizes the OSHA final process safety management (PSM) standard. Employers and employees may prefer to read this booklet and a companion one entitled, 'Process Safety Management - Guidelines for Compliance' (OSHA 3133), before studying the rule itself. The standard mainly applies to manufacturing industries--particularly, those pertaining to chemicals, transportation equipment, and fabricated metal products. Other affected sectors include natural gas liquids; farm product warehousing; electric, gas, and sanitary services; and wholesale trade. It also applies to pyrotechnics and explosives manufacturers covered under other OSHA rules and has special provisions for contractors working in covered facilities."
United States. Occupational Safety and Health Administration
2000
-
Fire Risks for the Blind of Visually Impaired
"Blind or visually impaired people are faced with many challenges, not the least of which is personal safety. Interaction with an environment one cannot see creates potential health and safety hazards. As a result, blind or visually impaired people are at increased risk of injury and death in the event of a fire. Depending on the severity of vision loss, they may be more likely to ignite a fire accidentally through common household activities, while they are less likely to extinguish or escape one. Further, a blind or visually impaired individual is highly vulnerable to sustaining burns by attempting to suppress a small fire. Practicing fire safety is the most effective means for a blind or visually impaired person to improve his or her chances of surviving a fire. For example, by planning and practicing an escape plan, a blind or visually impaired person can escape to safety, in the event of an actual emergency, with little time lost searching and feeling for an exit. The general fire safety tips that are targeted at the seeing population also address the needs of the blind or visually impaired. Unfortunately, blind or visually impaired people often have been overlooked by public fire education campaigns. Innovative mechanisms by which to disseminate these life-saving messages must be sought in order to raise awareness and foster fire safety practices in the blind and visually impaired community."
United States Fire Administration
1999-12
-
Measurement of White-Collar Crime Using Uniform Crime Reporting (UCR) Data
This document outlines how the Uniform Crime Reporting (UCR) program measures the severity of various types of white-collar crime. "Although it is acceptable to use socioeconomic characteristics of the offender to define white-collar crime, it is impossible to measure white-collar crime with Uniform Crime Reporting (UCR) data if the working definition revolves around the type of offender. There are no socioeconomic or occupational indicators of the offender in the data. Additionally, there are no measures of corporate structure in UCR data elements. Given that, research using UCR data must approach white-collar crime in terms of type of offense."
United States. Federal Bureau of Investigation. Criminal Justice Information Services Division
2000
-
Political Violence against Americans 1998
"Political Violence Against Americans, formerly Significant Incidents of Political Violence Against Americans, is produced by the Bureau of Diplomatic Securitys Office of Intelligence and Threat Analysis (DS/DSS/ITA) to provide readers with a comprehensive picture of the broad spectrum of political violence that American citizens and interests have encountered abroad on an annual basis. This publication encompasses major anti-U.S. incidents; however, some incidents have been omitted due to the sensitive information associated with them. Incidents for this study were selected based upon lethality, substantial property damage, use of unusual tactics or weapons, and perceptibility of targets as U.S. or representative of U.S. interests."
United States. Department of State. Bureau of Diplomatic Security
1999-12
-
Computer Security: FAA Needs to Improve Controls over Use of Foreign Nationals to Remediate and Review Software, Report to the Chairman, Committee on Science, House of Representatives
"During our review, we found instances where background searches of foreign nationals were not performed. For example, no background searches were performed on the 36 mainland Chinese nationals who performed code reviews, according to FAA and the contractor, Primeon. FAA's failure to perform risk assessments, its lack of complete information on whether background searches were performed, and the fact that some foreign nationals did not undergo background searches have increased the risk that inappropriate individuals may have gained access to FAA's facilities, information, or resources. As a result, the air traffic control system may be more susceptible to intrusion and malicious attacks. To address these issues, we are making recommendations to the FAA Administrator to improve FAA's security controls, identify the risk of malicious attacks on critical systems, and mitigate this risk. FAA has agreed with our recommendations in these areas and is moving to implement them. In addition, FAA officials stated that the agency has five layers of system protection, which they believe make the risk of intrusion extremely low. We anticipate evaluating the five layers of system protection as part of our continuing efforts to monitor the agency's progress in addressing computer security weaknesses."
United States. General Accounting Office
1999-12
-
Guideposts for the United States Military in the Twenty-first Century
"Near the close of the Twentieth Century, in September 1999, fifteen general officers- active duty and retired--representing all of the armed forces, met at Bolling AFB, DC, to consider the impact of air power on warfare. The discussion ranged widely across the spectrum of conflict, including combat, education, advanced technology, space weapons, strategy, information warfare, and intelligence. The aim of the symposium participants was to provide guideposts for future leaders."
United States. Air Force. History Support Office
Neufeld, Jacob.
2000
-
Network Security Versus Network Connectivity: A Framework for Addressing the Issues Facing the Air Force Medical Community
"Air Force organizations have been directed to implement the Barrier Reef concept to secure their unclassified networks. The Air Force medical community relies on much of its network connectivity through the Air Force networks, yet it maintains other network links to numerous other governmental and civilian organizations. For the Air Force medical community to comply with Barrier Reef, it will either have to sever its external links or configure them in such a way that the links meet the requirements of Barrier Reef. These links are mandated by direction from the office of the Assistant Secretary of Defense for Health Affairs (OASD(HA)) and support more than 100 automated information systems. To resolve this problem, the OASD(HA) directed the Tri-Service Infrastructure Management Program Office (TIMPO) to develop a robust, secure, standards based an infrastructure that will interoperate with the Air Force, Army, and Navy networks and comply with each Service's network security measures. The TIMPO is moving forward with that direction. Of concern, however, is that there is not a clear understanding of all the underlying issues. This research performed an exploratory study to further clarify the underlying issues."
Air Force Institute of Technology (U.S.)
Cunningham, Franklin E., Jr.
1999-12
-
Public Port Finance Survey for FY 1998
"This report is the result of a cooperative effort between the agency and the American Association of Port Authorities (AAPA). MARAD prepared the report using financial information furnished by AAPA. This report has been compiled for over 20 years, first by AAPA or a member port and now, for the second year, by MARAD. It is the only report of its kind in the port industry covering U.S. and Canadian ports. The report contains primarily financial data on maritime activities at ports, including the income statement, balance sheet, outstanding bonds, debt service, sales offices, and cargo tonnage. Two additional sections cover (1) data on contributions, donations, and grants received in FY 1997 [sic], and (2) ratio analyses."
United States. Office of Ports and Domestic Shipping
1999-12
-
Mapping Crime: Principle and Practice
"This guide introduces the science of crime mapping to police officers, crime analysts, and other people interested in visualizing crime data through the medium of maps. Presumably most readers will be working in law enforcement agencies, broadly interpreted to include courts, corrections, the military police, and Federal agencies such as the FBI, U.S. Bureau of Alcohol, Tobacco and Firearms, National Park Service, U.S. Customs Service, and U.S. Secret Service, as well as police departments. The material is designed primarily for those who know little or nothing about mapping crime and who are motivated to learn more. This is not a guide to software. Nowhere is there more than a word or two on how to do anything technical involving a computer. A purely technical guide would quickly be out of date, and a guide that served one set of software devotees would not serve others. Technical guidance is best sought from the manuals and interest groups specific to each software package. What will be found here is a broad approach addressing the kinds of questions crime mapping can answer and how, in general terms, it can answer them. Caveats are given from time to time, notably the caution against uncritically accepting all the default settings that crime mapping software so conveniently provides. Most readers will not read this guide from cover to cover. Some will concentrate on application-oriented material. Others will have an interest in the history of crime mapping, realizing that where we have been can help us figure out where we are going."
United States. Office of Justice Programs
Harries, Keith
1999-12
-
S. Hrg. 106-297: Extremist Movements and their Threat to the United States: Hearing before the Subcommittee on Near Eastern and South Asian Affairs of the Committee on Foreign Relations, United States Senate, One Hundred Sixth Congress, First Session, November 2, 1999
S. HRG. 106-297: Testimony addresses the sources of anti-Western extremism, what keeps it alive, where we are now, and what policies the United States should be pursuing to deal with this threat. Statements, letters, and material submitted for the record include those of the following: Milton Bearden, Mansoor Ijaz, Michael Krepon, Michael A. Sheehan, and S. Frederick Starr.
United States. Government Printing Office
2000
-
S. Hrg. 106-565: Russian Intelligence Activities Directed at Department of State: Hearing before the Committee on Foreign Relations, United States Senate, One Hundred Sixth Congress, Second Session, February 10, 2000
S. Hrg. 106-565: Testimony discusses security issues related to the US State Department, following the revelation of a bug planted by Russians in the Secretary of State's office. Senator Grams expresses concern that the State Department has become a soft target for foreign intelligence services, because of a lack of security consciousness in the State Department culture. Statement included is that of David G. Carpenter.
United States. Government Printing Office
2000
-
S. Hrg. 106-298: Crisis in Pakistan: Hearing before the Subcommittee on Near Eastern and South Asian Affairs of the Committee on Foreign Affairs, United States Senate, One Hundred Sixth Congress, First Session, October 14, 1999
S. HRG. 106-298: Testimony discusses US policy toward Pakistan after the Sharif Government's overthrow, including sanctions imposed under the Pressler amendment, and methods for restoring democracy in Pakistan. Statement of Karl Frederick Inderfurth is included.
United States. Government Printing Office
2000
-
SLOC Security in the Asia Pacific
The economic development of Asian Pacific countries in the passing two to three decades has been closely related to seaborne trade, and the importance of sea lines of communication (SLOC). SLOC security is now one of the priorities in regional countries' strategic thinking and policy making. However, SLOC insecurities do exist, and the problems therein do not warrant optimistic views. Factors affecting SLOC security include: the unstable political relationship among regional countries; different interpretation over the freedom of the seas principle; islands' sovereignty disputes and overlapping maritime jurisdictional claims; the emerging naval build-up; and non-traditional threats such as pollution, piracy, drug-trafficking, etc. China attaches much importance to SLOC security, and would play a positive role in the safeguarding of SLOC together with other regional countries. However, China needs to make sustained efforts to let the world community believe its sincerity in maintaining SLOC security.
Asia-Pacific Center for Security Studies
Matano, Kagechika
2000
-
FBI Law Enforcement Bulletin: December 1999
This issue provides an article discussing how law enforcement officers must become familiar with the methods available to gather evidence abroad and bring international criminals to justice. It also includes an article about understanding subjects with paranoid Schizophrenia, as well as an article about vehicle stops involving extremist group members. Regular departments provide information on official negligence, task force training, and the FBI Leadership Fellows Program.
United States. Federal Bureau of Investigation
1999-12
-
Hazard Communication Guidelines for Compliance
OSHA's Hazard Communication Standard (HCS) is based on a simple concept--that employees have both a need and a right to know the hazards and identities of the chemicals they are exposed to when working. They also need to know what protective measures are available to prevent adverse effects from occurring. OSHA designed the HCS to provide employees with the information they need to know. Knowledge acquired under the HCS will help employers provide safer workplaces for their employees. When employees have information about the chemicals being used, they can take steps to reduce exposures, substitute less hazardous materials, and establish proper work practices. These efforts will help prevent the occurrence of work-related illnesses and injuries caused by chemicals.
United States. Occupational Safety and Health Administration
Jeffress, Charles N.
2000
-
Random Gunfire Problems and Gunshot Detection Systems
This Research in Brief summarizes the findings of field studies of two gunshot
detection systems: Trilon Technology's ShotSpotter(TM) system, which has operated
in Redwood City, California, since early 1996, and Alliant Techsystems
Inc.'s SECURES(TM) system, installed for 2 months in 1996 in a neighborhood
with high levels of random gunfire in Dallas, Texas. This Research in Brief
also outlines how the police used the gunshot detection system in Dallas and
what officers working in the test sites think of the technology.
National Institute of Justice (U.S.)
Travis, Jeremy
1999-12
-
Protecting Global Utilities: Safeguarding the Next Millenium's Space-Based Public Services
Article begins by defining Global Utilities as "Civil, military, or commercial systems - some or all of which are based in space - that provide communication, environmental, position, image, location, timing, or other vital technical services or data to global users." Cuurrently no physical system exists for protecting these global utilities. What if threat comes from nongovernment organizations, terrorist groups, or an adversarial nation? What if we are unable to identify the sources of the offense? Treaties and sanctions may not prove so effective. We will need some other source of protection. Author argues that protecting global utilities is a natural extension of the Air Force mission to protect other high-value airborne assets; it is also an extension of the DOD protection of all friendly assets. Major topics discussed in article include Why Protect Global Utilities?, Who Should Protect Global Utilities?, and Where Should We Place the Protection?
United States. Department of the Air Force
Carlson, Bruce
2000
-
DOE Limited Standard: Hazard Analysis Reports for Nuclear Explosive Operations
This technical standard applies to the conduct of hazard analyses and preparation of hazard analysis reports (HARs) for nuclear explosive operations (NEOs) conducted by the Department of Energy (DOE). This standard addresses operation-specific HARs and their interface with facility safety basis
documents (Safety Analysis Reports [SARs] or other DOE-approved safety basis documents). The purpose of this technical standard is to clarify the requirements and provide guidance for conducting hazard analyses and preparing HARs for NEOs and associated activities. It is intended to supplement the guidance contained in DOE Guide 452.2A-1A, "IMPLEMENTATION GUIDE FOR
DOE ORDER 452.2A, SAFETY OF NUCLEAR EXPLOSIVE OPERATIONS."
United States. Department of Energy
1999-12
-
Summary Report: National Health Surveillance System Workshop
On October 3, 2000, the Defense Threat Reduction Agency's Advanced Systems and Concepts Office (ASCO) and the Centers for Disease Control and Prevention (CDC) co-sponsored a workshop aimed at identifying the essential elements of a national health surveillance system. There were a variety of participants, spanning the local, state and national public and animal health communities. Based on the workshop discussions, there are some near-term actions that can move ahead the process of developing a national health surveillance system: Assess in detail the advantages and disadvantages of the three types of surveillance methods discussed: syndromic, data mining, and rapid diagnostics; develop requirements and an approach for addressing the problems associated with each; identify and benchmark current surveillance programs, including the Laboratory Response Network for Bioterrorism, in both the public health and animal health communities; identify and promulgate lessons learned; use this as a point of departure for developing initial standards for syndromic definitions and informatics; identify biological agents for which surveillance should be conducted; establish expert groups to determine thresholds for reporting on each agent; and define the range of required medical and non-medical data sources. For example, environmental health agencies may have useful data related to possible disease outbreaks, as might schools (i.e., absentee information) and insurance companies.
United States. Defense Threat Reduction Agency; Centers for Disease Control and Prevention (U.S.)
2000
-
Networked Information Systems: Protecting Against the Threat 2000
The explosion in affordable computing power and the rapid expansion of interconnected, publicly accessible networks has dramatically altered the way sensitive personal, financial, or proprietary information is acquired, processed, distributed, shared, stored and retrieved. The advances that have made this possible have simultaniously increased the risk that this information may be compromised, manipulated, stolen, or lost. This has created a paradox. We now have the dilemma of choosing between the advantages of using networks, weighed against the probability of becoming a victim of cyber thieves. Although this paradox remains, the decision has already been astoundingly made in the favor of using the networks, and people have become dependent on these networks. This 14 page booklet regarding this issue was developed by the NACIC with this background in mind.
United States. Office of the National Counterintelligence Executive
2000