SEARCH THE HSDL
Set an Alert to get future results
Results 130351 - 130380 (of 141,141) sort by relevance sorted by date
Only 2/3! You are seeing results from the Public Collection, not the complete Full Collection. Sign in to search everything (see eligibility).
-
Immigration: Visa Entry/Exit Control System [Updated November 9, 1998]"Section 110 of the Illegal Immigration Reform and Immigrant Responsibility Act of 1996 (Division C of P.L. [Public Law] 104-208) requires the Attorney General to establish an automated entry/exit control system to record non-citizen arrivals and departures at all ports of entry by September 30, 1998. The FY1999 Omnibus Consolidated and Emergency Supplemental Appropriations Act (P.L. 105-277) amends Section 110 to extend the September 30, 1998 deadline to March 31, 2001 for land border and sea ports of entry, but leaves the FY1998 deadline (now October 15, 1998) in place for air ports of entry. This report provides background and analysis on Section 110 and issues related to increasing arrival/departure management at air, land border, and sea ports of entry. This report reflects final action of the 105th Congress and will not be updated."Library of Congress. Congressional Research ServiceKrouse, William J.; Wasem, Ruth Ellen1998-11-09
-
Presidential Determination Allowing Financial Assistance to Tibet: Memorandum Opinion for the General Counsel, Export-Import Bank [November 6, 1998]"President Carter's 1980 determination that financial assistance to the People's Republic of China would be in the national interest satisfies the requirements of section 2(b)(2) of the Export-Import Bank Act of 1945 and thus permits the Export-Import Bank to provide assistance to the region of Tibet, its provincial government, and its residents without any presidential action in addition to the prior determination made with respect to China."United States. Department of Justice. Office of Legal Counsel1998-11-06
-
Stress: A Study of Post Traumatic Stress Disorder in the MilitaryFrom the thesis abstract: "Post-Traumatic Stress Disorder (PTSD) can occur in veterans, regardless of exposure to various combat environments. This study shows how prevalent Post-Traumatic Stress Disorder is among veterans, using examples from World War I, World War II, Korean conflict, Vietnam War, and the Persian Gulf War. For better understanding, one must explore the evolution, symptoms, characteristic, and the classifications of Post-Traumatic Stress Disorder."US Army Sergeants Major AcademyRitter, Scott; Robertson, Ken; Treon, Bill1998-11-02
-
AF Instruction 14-101: Intelligence Contigency FundsThis instruction implements Air Force Policy Directive (AFPD) 14-1, Air Force Intelligence Planning and Operations. It provides guidance and procedures for executing the Air Force Intelligence Contingency Funds (ICF) program. This instruction does not apply to the Air National Guard or Air Force Reserves. It supercedes AFI 14-101 from September 1997. This is a partial revision of AFI 14-101. This revision deletes the requirement that ICF use is only authorized for classified intelligence purposes. All references of following guidance prescribed in AFI 65-603, Official Representation Funds-Guidance and Procedures was removed. The monetary limitations for the appropriate approval levels were increased. The requirement for HQ USAF/XOII and HQ AIA/FMP to perform periodic reviews of command ICF programs were eliminated because ICF program execution is audited annually by the AF Audit Agency.United States. Department of the Air Force1998-11-01
-
National Security Report: Background and Perspective on Important National Security and Defense Policy Issues"Iraqi President Saddam Hussein's most recent and most serious challenge to the international community halting all Cooperation with United Nations weapons in inspectors has brought the United State the closest to war with Iraq since 1991. Moreover, the United States has again refrained from military action in exchange for a last-minute promise from Saddam Hussein that he will allow UN weapons Inspectors to resume their work unconditionally. This continuing pattern of Iraqi behavior placing obstacles in the path of weapons inspectors and then removing them in the face of a threatened military response has raised new questions regarding the credibility of the United States and the effectiveness of efforts to prevent Iraq from reconstituting its ability to develop or use weapons of mass destruction."United States. Congress. House. Committee on National SecuritySpence, Floyd D., 1928-20011998-11
-
'Designing Out' Gang Homicides and Street Assaults"The hottest spot for gang-on-gang homicide and assault in the city of Los Angeles had seen gang violence becoming a cycle of attacks followed by reprisals, followed by the inevitable counterattacks. Using a deceptively simple tactic, the Los Angeles Police Department (LAPD) intervened in an attempt to restore order to the area. Under the direction of then Assistant Chief of Operations Robert Vernon, an experiment involving the use of traffic barriers to block access by automobiles was launched in 1990 as a means to 'design out' crime by reducing the opportunities to commit it."National Institute of Justice (U.S.)Lasley, James1998-11
-
Information Warfare Threat Demands More Attention on All SidesNeither the administration, nor the Congress, nor the public at large is devoting enough serious attention to the growing threat of information warfare, says Senator Jon Kyl. Potential adversaries are honing their ability to attack the critical infrastructure that increasingly runs the nation's communications, transportation, and financial systems -- and its vital defense establishment as well, he warns. Kyl, an Arizona Republican, serves as chairman of the Subcommittee on Technology, Terrorism, and Government Information of the Senate Judiciary Committee. He also is a member of the Senate Select Committee on Intelligence. Kyl was interviewed by Contributing Editor Ralph Dannheisser. Topics discussed include vulnerability of digital systems to attack, national security and public safety concerns, possible damage if the information grid is broken into, and legislative attention on this issue. According to Kyl, a large number of countries have information warfare programs under way, some of which are aimed at the United States. In his opinion the United States is, by far, the most vulnerable country because of the degree of our reliance upon technology.United States. Department of StateDannheisser, Ralph1998-11
-
Information Assurance and the New Security EpochThe United States has faced five security epochs, with each change involving transitions from a certain past to an uncertain future. The first epoch was from the Revolutionary War to the mid-1820s, with the United States at the fringe of an international security environment still dominated by Europe. The most recent epoch -- the Cold War -- was dominated by a bipolar world. The United States led the international community in creating institutions to rebuild the shattered economies of Europe and to deal with the collapse of the old Europe-dominated empires in the Third World. At the same time, the United States was leading the free world states to contain communism until the Soviet Union collapsed. Now we are in transition to a new epoch, seemingly characterized by the revival of old dangers -- nationalism and ethnicity. We now live with the unsettling fear of "loose nukes" and chemical and biological weapons in the hands of terrorists. The next security epoch also will present the challenge of cyber security. The explosive growth in the use of information technologies (IT) has had a profound effect on all sectors of the American economy and government. IT has fueled amazing economic growth, dramatically improved communications, and allowed American businesses to compete more effectively than ever. The United States -- and the world -- truly rely on information technology in ways unimaginable even just a few years ago. Information assurance, encryption, and network security pose some of the most daunting challenges the Department of Defense has ever faced. To take advantage of the IT revolution, we must ensure access to and protection of the very assets on which we depend. We are taking giant strides to make this happen, but much more remains to be done. These challenging days require that we turn to the expertise of information professionals both in DOD and in the broader government and private sectors to protect systems vital to all of us. We must ensure that our nation's journey into the new security epoch is as successful as the last.United States. Department of StateHamre, John J.1998-11
-
Year 2000 ProblemThe world currently faces one of the great challenges of the Information Age. As we head toward a new millennium, many computer systems, as well as the computer chips embedded in everything from personal computers to household appliances and sophisticated manufacturing equipment, are set to shift backwards in time. The problem is that many older computer systems and microprocessors, as computer chips are known, use only the last two digits of a year to keep track of the date. So, when the year 2000 arrives, those chips may recognize 00 as the year 1900, not 2000. The resulting malfunctions could cause serious disruptions of power grids, water treatment plants, financial networks, telecommunications systems, and air traffic control systems worldwide. In an increasingly wired world with a global economy, computer networks are only as strong as their weakest link. While each nation is likely to experience its own particular system problems, in a very real sense we are all in this together. Year 2000-related disruptions are likely to begin before the new millennium as outmoded systems attempt to calculate or schedule future events. Precisely what will happen is difficult to predict at this point. There are a number of Internet Web sites in the United States where some experts that one would not normally think of as alarmists have predicted widespread system failures that will result in power outages, traffic problems, economic recession, and possibly, in some regions, food shortages. While the author tends to be more optimistic than these doomsayers, he is concerned particularly about countries where inactivity and lack of awareness could lead to fulfillment of some worst-case scenarios. The point is that by taking action now we can minimize the disruptions and, hopefully, effect a seamless transition to the year 2000.United States. Department of StateKoskinen, John Andrew, 1939-1998-11
-
Ghosts in the Machines?The author cites law enforcement as a primary area where global information security can be enhanced. He calls for "the harmonization of national laws against computer attack, multinational cooperation in tracing attacks across national lines, international treaties on extradition of attackers, and a readiness to impose sanctions on those who protect attackers." He believes a willingness to share information on research and development, on attack indications and warnings, and on attack incidents and responses "can also improve the efficacy of each nation's protective measures." Computer attacks, if sufficiently systematic, may be war by other means -- hence "information warfare," as an overarching concept. But information warfare understood broadly -- attacking an adversary's information and decision processes -- is as old as warfare itself. Such tactics encompass psychological operations, attacks on an enemy's command apparatus, espionage and counter-espionage, and operations against adversary infrastructures and surveillance systems. During the U.S. Civil War (1861-1865) there were incidents of propaganda operations, snipers targeting opposing generals and observers in hot-air balloons, marauders tearing up telegraph lines, cavalry pickets and counter-cavalry demonstrations -- all information warfare. World War II saw the advent of electronic warfare in the form of radar, electronic deception, radio-frequency jamming, codemaking, and computer-aided codebreaking. Two indicators may reveal a great deal about the true risk from systems attack. One is how people react to the year 2000 computer problem. Assume a large share of the world's information systems crash at midnight on December 31, 1999. Will panic and paralysis result, or will people quickly find ways of working around the problem or doing without information for awhile? If lawsuits erupt, what precedents will be established to assign responsibility to people for harm done if their systems fail? The other harbinger is of more recent origin. Were one to imagine the most plausible perpetrator of serious information warfare terrorism, it would be someone with nothing that can be held at risk (i.e., not a country), several hundred million dollars in hidden cash, an appreciation of technology, an international network of nefarious friends, and a vicious score (real or imagined) to settle with the United States or some other nation. Sound familiar? If it does, what happens in the next year may reveal whether powerful individuals or groups might try to bring a country to its knees through information warfare -- or whether they direct their efforts elsewhere.United States. Department of StateLibicki, Martin C.1998-11
-
CIAO: An Integrated Approach to Counter Threats of a 'New Era'"The full support of the private sector" is vital in protecting U.S. critical infrastructures against cyber attack, says Dr. Jeffrey A. Hunker, Director of the Critical Infrastructure Assurance Office (CIAO). "The threat that we are facing is a threat that's growing over time," he says. "And so we need to respond with a sense of urgency and produce real results very quickly to combat it." Hunker was interviewed by Contributing Editor Susan Ellis. This interview includes questions on Hunker's responsibilities, challenges, and plans as CIAO director. Topics include telecommunications, vulnerabilities to cyber attack, the agancies assigned to work together and with the public on these issues, and the nature and gravity of threats to U.S. critical infrastructures.United States. Department of StateEllis, Susan1998-11
-
Response of Higher Education to Information WarfareThere is a growing demand for information security professionals in an era when "malicious vandalism, criminal activity, and international information warfare" all may threaten the nation's information infrastructure, says Dr. Charles Reynolds. He describes how the academic community is collaborating with government and industry to meet that need through an initiative launched in 1997 called the National Colloquium for Information Systems Security Education (NCISSE). The author, 1998 chairman of NCISSE's executive committee, also outlines James Madison University's efforts to respond to emerging national priorities in countering the threats to U.S. information networks. To counter the threats of the new era in information technology, our nation needs an information-literate work force that is aware of the emerging vulnerabilities of critical infrastructures, as well as a cadre of information security professionals who are knowledgeable about the recognized "best practices" available in information security and information assurance. Participants who complete the Information Security Program at James Madison University earn a Master of Science degree in computer science with a concentration in information security. The program is based on a standard endorsed by the National Security Agency and is designed to develop the knowledge and skills necessary to understand the interrelationships between information security and information technology and to relate both the technical and human components of information security and information technology. The program begins with a preparatory segment for those who need to strengthen their computing skills before beginning the computer science core. This is followed by three courses in computer science that cover data-base management, operating systems and networks, and application software development. Building on this strong foundation, the third period introduces information security, the concepts of trusted information systems, and techniques for secure information storage and transmission, especially by encryption. The fourth segment teaches management and administrative issues in information security including risk and vulnerability analysis, information system audit tools and procedures, and legal, ethical, and policy issues. A final capstone project integrates the whole program with a project that challenges participants to analyze the security of an information system.United States. Department of StateReynolds, Charles W., 1948-1998-11
-
Information Warfare: Challenge and Opportunity"I have the power, the capability, sitting in my home with my computer and my modem...to wage war," says James Adams. "That is a very different environment than anything that we have experienced in the past." Adams is Chief Executive Officer of Infrastructure Defense, Inc., which provides a forum for exchange of information and decision making on the critical infrastructure within the private sector and between the private and public sectors worldwide. This article is adapted from comments by Adams at the U.S. Information Agency in August 1998. The U.S. military last year organized an exercise that involved a simulation in which an international crisis was brewing and a foreign government had hired 35 computer hackers to disrupt the United States' response to that crisis. The "hackers" taking part in the exercise -- called Eligible Receiver -- were, in fact, U.S. government employees. They were given no advance intelligence. They bought their laptops from a local computer store. What this exercise demonstrated was that 35 people using publicly available information with skills that were available around the world really could have prevented the United States from responding to the crisis. A vital element is the private sector because it's the private sector that is the engine now driving the change unfolding around us. The government has to demonstrate its relevance and to take some form of leadership here, which I believe is noticeably absent. The private sector can articulate many of these things to defend itself and, thus, to defend each one of us. If we fail to recognize that, I think we will experience some very serious trouble, beginning with Y2K. We will become victims of the new aggressors out there, who will have power that we have never really begun to understand, and when we understand it, it will be too late.United States. Department of StateAdams, James1998-11
-
Private, Public Sectors Benefit by Sharing Expertise on SecurityGovernment agencies and many private corporations now have the ability "to contact each other and support each other" in the event of threats against their information and other critical systems, says Howard Schmidt, Director of Information Security for Microsoft Corporation. He also cites extensive cooperation among corporations to deal with information warfare questions. "When it comes to security issues, there are very few things that relate to competition," says Schmidt. "We work with our competitors and partners alike to assist in standard developments so that we can all succeed in developing and maintaining good security." Schmidt was interviewed by Managing Editor Dian McDonald. Topics discussed include an assessment of U.S. vulnerability critical infrastructures to attack and how prepared the U.S. is for such attacks, Mr. Schmidt's work with the commission, strategies and cooperation with other corporations on this issue, the government's role in protecting critical infrastructures, and how public and private sectors can work better together to develop effective defensive capabilities against terrorist or other hostile action. According to Mr. Schmidt, Microsoft representatives meet regularly with their customers about security. Microsoft's product development employees are constantly working to ensure that all of their products are more secure, according to Schmidt. The conclusion of this interview is that we have come a long way in fixing the problem of denial of service attacks and e-mail bombs.United States. Department of StateMcDonald, Dian1998-11
-
Presidential Decision Directive 63: Protecting America's Critical Infrastructures [Fact Sheet]This Presidential Directive builds on the recommendations of the President's Commission on Critical Infrastructure Protection. In October 1997 the Commission issued its report, calling for a national effort to assure the security of the United States' increasingly vulnerable and interconnected infrastructures, such as telecommunications, banking and finance, energy, transportation, and essential government services. Presidential Decision Directive 63 is the culmination of an intense, interagency effort to evaluate those recommendations and produce a workable and innovative framework for critical infrastructure protection. Included is the President's policy, and the new structure to deal with this important challenge.United States. Department of State1998-11
-
Strategies for Countering Threats to Information Technology AssetsThe primary threat to information systems is not the evil super hacker, says Lingerfelt, an expert in technology and strategic planning in law enforcement. "Rather, the greatest dangers to computer systems and data bases are trusted' sources." The author emphasizes that "a realistic assessment of security needs and threats, followed by meaningful formulation and implementation of a security plan, can provide effective protection against the vast majority of threats, and at a reasonable cost." He identifies areas that are the most frequent sources of real threats and provides seven basic strategies for planning information technology security. Law enforcement and criminal justice agencies have an unprecedented opportunity to use information technology (IT) to transform their operations and to provide better, more effective service. However, many agencies are reluctant to pursue the opportunity because they fear that by replacing or supplementing their closed mainframe systems with networked PCs, and implementing automated reports and computer networks, they would expose themselves to attacks by hackers. The high estimated costs of protecting an entire IT system against penetration by super hackers, combined with the damage that could result from the loss of extremely sensitive information, make avoiding the (perceived) risk altogether seem reasonable, despite the gains to be achieved by the use of IT. As already noted, internal threats from sources within the trusted domain cause more damage than intruders. In the transition from centralized to dispersed operations, the headquarters as center of the decision-making and information universe has been replaced by remote independent business units supported by distributed IT. Overall IT planning must be done with the big picture in mind: the IT plan should flow directly from the organization's operational plans. The plan should describe business requirements that will fulfill operational goals: it is not an IT wish list. Focus on what needs to be done, not on how it will be done. There are usually many ways to meet a requirement with big differences in cost. There should be a clear justification for every dollar spent. And security must be built into the IT plan from the beginning. Architectures should be kept simple. This provides a major security advantage. Multiple systems, regardless of how tightly integrated, offer multiple points of access and require multiple security administration and support systems which translate into increased costs. Included here are seven strategies to ensure information technology security.United States. Department of StateLingerfelt, James A.1998-11
-
Measuring and Improving Organizational Change Readiness in the Libertyville Fire Department"The Libertyville Fire Department was encountering problems of instability and change resistance because a number of changes that occurred within the last three years. Leadership succession coupled with the privatization of a new station threatened organizational paralysis. The purpose of this resarch project was to measure and improve the change-readiness of the organization. The research used both historic and evaluative methodologies, including survey and research. Analysis of the literature concerning organizational change was also undertaken. The following research questions were considered: (1) What information can organizational change literature or research offer regarding the changes occurring within the Libertyville Fire Department? (2) What is the level of change-readiness or change-acceptance of the active members of the Libertyville Fire Department at the onset of this study? (3) What is the level of change-readiness or change-acceptance of these members following an intervention designed to enhance these characteristics? The procedures included an extensive literature review, initial surveys of the department's members, a SWOT (Strength, Weakness, Opportunity, Threat) analysis of the department, and a final application of the surveys. The results found that the department was already change-ready with the strongest measure of this trait exhibited by the chief officers and the lowest measure by the lieutenants. The intervention of the SWOT analysis did not appear to have any significant impact. The study recommended that organizational change-readiness was preferred to change management; visionary leadership and a stong supportive coalition were critical to success; and succession strategies and lieutenant change-traits needed to be developed."National Fire AcademyZamor, Robert L.1998-11
-
Roadway Incident Management and Safety"Several firefighters and Emergency Medical Service (EMS) workers are killed and many are injured each year by vehicles striking them while performing emergency functions at roadway incidents. The main problem is that in some departments, formal training and procedures do not exist for establishing warning devices and managing vehicle traffic as it approaches the incident scene. The purpose of this research is to review literature available on roadway safety, survey fire departments for current procedures, and develop a training lesson plan. This research project used both evaluative and action research to answer the following questions: Is there a universal way to establish a roadway incident scene? What safety procedures by members must be reinforced? What are the guidelines for setting out cones and flares? What other warning devices are being used by fire departments? The procedures to collect data included a literature review and a survey instrument. The survey was used to determine if the departments were (1) following a written Standard Operating Procedure (SOP) or had developed lesson plans on roadway safety, (2) what type of training was conducted, and (3) what types of warning devices are used. The results of the research produced a method to develop a Traffic Control Zone, that may be used on any type roadway incident and safe crew activities that should be reinforced with training and exercises. The recommendations are that all fire service organizations should develop a training lesson on roadway safety and establish a SOP. Departments that do not have enhanced warning devices or equipment such as reflective florescent vests, lighted arrow boards vests, light-wand flashlights, or apparatus reflective stripping should evaluate this equipment for inclusion in their apparatus inventory."National Fire AcademyPrice, Michael W.1998-11
-
Making a Case for Effective Scheduling of Arson Investigators"The Anne Arundel County Fire Investigation Unit was not meeting national averages of arson cases cleared by arrest. Attempts to implement case management strategies seemed to be hindered by the investigators' shift schedule. The schedule, put into use a few years ago in an effort to reduce overtime, had investigators off-duty four days in a row. This schedule, as many others found in use for arson investigation, are typically used for suppression and EMS [Emergency Management Services] delivery. The problem identified for the research was to determine if the shift schedules were effective for arson investigations. The research attempted to gather information on effectual scheduling of arson units and police detectives units. While the research did not find a specific schedule that was promoted as a model for criminal investigation, it did reveal shortcomings in the schedule being used. Information was identified to support scheduling of investigators during certain times of the day to effectively carry out the investigative function. The results of the applied research project showed that the shift being used by Anne Arundel County was not practical for the criminal phase of an arson investigation. The research revealed that the follow-up investigation is more critical than a timely response. It was also shown that the shift was not conducive for the use of case management strategies shown effective in improving arson casework. Since no one shift was shown as a model schedule, the design of a shift needed to account for several factors. In addition to the investigation, several external factors, such as available staffing, FLSA [Fair Labor Standards Act], overtime limitations, investigator safety, and training needs also needed to be considered. Unfortunately, the research also revealed that little information is available on how to go about designing shift schedules. However, based on the information gathered, three possible schedules were proposed."National Fire AcademyRay, J. Robert1998-11
-
Making a Case for Universal Fire Service Professional Qualifications Certification Reciprocity"The importance of fire service professional qualifications certification has increased dramatically in recent years. Being certified is not only a source of pride and sense of accomplishment for the individual, it is fast becoming a prerequisite for hire as a career fire fighter. The problem was that individuals certified by the state of Wisconsin, even though their certification criteria met established national standards, could not receive reciprocal certification from other certification entities. Likewise, individuals certified by other entities would not be granted reciprocal Wisconsin certification in many cases, even though their certification criteria met the same national standards. The purpose of this research project was to analyze the many equivalency and reciprocity policies of fire service certification entities, and develop recommendations for the establishment of a universal certification reciprocity policy. The project utilized an action research procedure. Research questions to be answered were: 1. Which national standards address the qualifications and resulting certifications of fire service personnel? 2. What does the available data say about the certification programs of selected states or other entities? 3. What does the available data say regarding accreditation of fire service certification programs? 4. What are the positions of various certification entities regarding recognition of accreditation agencies? 5. What are the positions of various certification entities regarding reciprocity? 6. What are the obstacles to establishing a uniform national certification reciprocity policy? The procedures required a review of available literature on the subject and interviews with administrators of selected certification entities regarding their policies, observation, experiences, opinions, beliefs and recommendations relative to the issue."National Fire AcademyBrooks, David J.1998-11
-
Development of a Department Web Page"The public and general industries have responded to the availability of a low cost, immediate, and effective communications medium with the public by utilizing the Internet. This communications medium is available to millions of people but was not used by the City of Deltona. In conjunction with the development of an actual Web page for the City of Deltona, this research project was conducted to determine how many Florida fire departments utilize a Web page as well as to determine what methodology should be used to plan and develop a Web page. A descriptive research methodology was used to assess the present status of fire department Web page use in the State of Florida and general methodology for the development of a Web page through the use of literature sources, interview, and written survey. The survey asked the following questions: 1) How many Florida fire departments' parent agency (city/county/district/etc.) have a Web page representing their entire organization? 2) How many Florida fire departments are specifically represented in the Web page? 3) How many Florida fire departments have a department specific Web page? The survey continues only if the fire department has, or is part of a Web page: 4) Does the fire department have input regarding the Web page content? 5) Who hosts the Web page? 6) What type of services or information are offered via the Web page? The results indicate that less than half of the fire departments in Florida utilize the Internet as a means of communicating with its public. Those departments utilizing a Web page have indicated that the effort has been warranted or successful."National Fire AcademyKoczan, James1998-11
-
'Business' of User Fees: A Superior Revenue Source for Fire and Emergency Medical Service Agencies"This research project reviewed alternative funding for fire and emergency medical service agencies, and specifically user fees as a superior revenue source to supplement traditional tax revenues. The Westminster Fire Department was considering expanding its user fee program in anticipation of a downturn in sales tax revenue. The problem was that before expanding fees or implementing new ones, the department needed a better understanding of user fees and what type of fees have been successful in other fire departments. The purpose of this research is to define user fees, evaluate related benefits and concerns of fee-based services, determine types of fees assessed by other fire departments, and decide whether the Westminster Fire Department should expand its user fee programs. Descriptive and evaluative research was used to answer the following research questions: (1) What are user fees and what types are other fire departments charging their customers? (2) What are the benefits and problems associated with user fees? (3) What steps can be taken to 'sell' these fees to the decision-makers, the public, and the employee group?"National Fire AcademyWatkins, Kenneth R.1998-11
-
EPA Chemical Accident Investigation Report, Tosco Avon Refinery, Martinez, CaliforniaThis document is a report from the Environmental Protection Agency, Chemical Emergency Preparedness and Prevention Office about an explosion and fire at the Tosco Avon Refinery in Martinez, California. "At approximately 7:41 p.m. on January 21, 1997 at the Tosco Avon Refinery in Martinez, CA, a section of effluent piping ruptured on the Hydrocracker Stage 2 Reactor 3. […] The excursion was not brought under control because the Stage 2 reactors were not depressured and shut down as required when the reactor temperatures exceeded the 800oF temperature limit specified in the written operating procedures." Investigators identified the causes and contributing factors of the explosion and developed recommendations to prevent similar occurrences at Tosco and other facilities. "EPA has a responsibility to investigate and understand why certain chemical accidents have occurred. A key objective of the EPA chemical accident investigation program is to determine and report to the public the facts, conditions, circumstances, and causes or likely causes of chemical accidents that result, or could have resulted, in a fatality, serious injury, substantial property damage, or serious off-site impacts, including a large scale evacuation of the general public. The ultimate goal of an accident investigation is to determine the root causes in order to reduce the likelihood of recurrence, minimize the consequences associated with accidental releases, and to make chemical production, processing, handling, and storage safer. This report is a result of an EPA investigation to describe an accident, determine its root causes and contributing factors, and identify findings and recommendations."United States. Environmental Protection Agency. Chemical Emergency Preparedness and Prevention Office1998-11
-
Your Meeting in Usama bin Laden Part II"This report is a briefing between Assistant Secretary Karl F. Inderfurth and Secretary of State Madeleine Albright that has been recently declassified." […] "Diplomatic negotiations with the Taliban and with Pakistan regarding the extradition of Osama bin Laden have been unsuccessful and bin Laden's network continues to operate and threaten American lives. An upcoming December meeting with Pakistani Prime Minister Nawaz Sharif may provide the Secretary with an opportunity to get this message across at the highest level in direct terms. Months after the Embassy bombings bin Laden remains active and under Taliban protection. Time for a diplomatic solution may be running out. Taliban brush-off of our indictment and other evidence may indicate movement from tolerance of UBL's presence to more active support." Part I of this report is also in the HSDL collection.United States. Department of State1998-11
-
Your Meeting in Usama bin Laden Part I"This report is [a] briefing between Assistant Secretary Karl F. Inderfurth and Secretary of State Madeleine Albright that has been recently declassified." […] "Three months following the U.S. retaliatory strikes on al-Qaeda training camps in Afghanistan, the Assistant Secretary outlines key points on Osama bin Laden in an effort to discuss [how we can persuade the Taliban to expel Usama bin Laden from Afghanistan to a country where he can be brought to justice or otherwise end or limit the threat he poses to U.S. interests.] According to the Assistant Secretary the U.S. holds the Taliban responsible for bin Laden's activities, however efforts [to get UBL expelled have been frustrated, we believe, by his ties to Taliban leader Mullah Omar.] Bin Laden is a threat to U.S. interests and people, the U.S. [can not allow this to continue.]" There is a part II to this report in the HSDL collection.United States. Department of State1998-11
-
State Legislative Responses to Violent Juvenile Crime: 1996-97 Update"Serious and violent juvenile offenders have precipitated unprecedented change in the juvenile justice system. In 1996, the Office of Juvenile Justice and Delinquency Prevention [OJJDP] published State Responses to Serious and Violent Juvenile Crime. The Report summarized changes in jurisdictional authority, sentencing, corrections programming, confidentiality of records and court hearings, and victim involvement in juvenile proceedings, undertaken by States from 1992 through 1995. Initially, these changes focused on the small percentage of serious and violent juvenile offenders. In recent years, however, States have revised policies and procedures that impact the juvenile justice system as a whole and the full range of offenders. During the past 2 years, additional States have passed reforms and their forerunners have refined past reforms in light of their experiences. State Legislative Responses to Violent Juvenile Crime: 1996-97 Update summarizes those changes."United States. Office of Juvenile Justice and Delinquency PreventionTorbet, Patricia M.; Szymanski, Linda A.1998-11
-
Managing the Dragon; Influencing the Influencers"In keeping with the Department of Defense (DoD) agenda for realignment, the Marine Corps Air Ground Combat Center Fire Department was faced with several external influences by the Command, the most significant influence being a call to Public Private Venture (PPV) involving the base housing department. Since base housing provides indirect support for fire protection in the amount of 767K, this posed a direct impact to the fire department infrastructure. The problem faced by the organization was a possible reduction in force (RIF) of personnel if housing funds were lost. This research used historical research to answer the following questions: (a) what are the external influences (what does the dragon want)?, (b) can a RIF action be avoided?, (c) are there risks to a RIF action?, and (d) what are the possible options and costs? This research used action research to develop a series of tables outlining the options and costs, the proposed and alternative solutions to a RIF action, legal and regulatory requirements along with an organizational structure to clarify the chain of command with respect to the organization. The principle procedure applied was review of information gathered through legal documents, case studies, reviews and periodicals, and interviews with affected personnel relative to privatization actions. Data collected was formatted into a series of tables reflective of the external influences and their impact on the organization."National Fire AcademyThixton, Julie A.1998-11
-
Benefits of a Competency-Based Training Program"This research project identified advantages of a formalized training program and developed a competency-based program that was utilized to initiate and train newly hired personnel of the Willoughby Hills Fire Department. This was done after it became evident that the Department did not have a well structured, reliable indoctrination or training program for newly hired personnel, either career or part-paid. Historical, action, and descriptive research were used to (1) Identify the current usage of competencies in fire department training programs, (2) Identify advantages of utilizing a competency-based training program for newly hired personnel, (3) Define what task skills and local specifics should be included in the training program, and (4) Determine if a competency-based training program can be used in areas other than training. The principle procedure used to gather information was to review existing literature from both the fire service and the private sector concerning the topic of competency-based training. Additionally, a survey on the current usage and benefits of competencies in fire department training programs was conducted at Fire-Rescue International September 12-15, 1998 in Louisville, Kentucky. The results of the research identified the popularity of competencies, the numerous advantages of using competencies for the department as well as the students and instructors, and other areas that competencies can be useful. The recommendation is for the Willoughby Hills Fire Department to immediately institute a competency-based training program for newly hired employees and also to extend this type of program to the department's training program."National Fire AcademyShaw, William J.1998-11
-
Addressing a Problem of Employee Morale"After two hurricane disasters a morale problem existed among the employees of the town of Wrightsville Beach. The problem extended across departmental lines and included the fire department. It was determined that stress symptoms extended beyond those associated with the two disasters and were dormant in the workforce prior to and after the disaster events. The purpose of this research was to identify stress factors within the employee ranks, review select concepts of leadership and associated subjects, and make recommendations to alleviate the impact of stress factors in the workforce. An action research methodology was utilized. Research questions that were answered were: (1) What is wrong? (2) What does literature offer to address the problem? (3) What action can be taken? (4) What is the expected outcome? Procedures included employee stress assessments and evaluation. An action plan to improve the workplace environment for the town body was derived following the initiation of a key mission statement. The fire department created its own action plan including a series of employee group sessions identifying specific factors of communication, trust, respect, and teamwork. An in-house correspondence study on leadership was initiated. Surveys were taken to measure success rates. Literature was reviewed that was central to the identified issues. Expected outcomes relative to the survey, observations, and action plans were evaluated and recorded. The result of the research indicated that efforts both town-wide and in the fire department were effecting a positive change to improve the workplace environment. Recommendations call for continuation of the action plans and further evaluation."National Fire AcademyWard, Everett1998-11
-
Strategies to Positively Impact Sick Leave Usage Within the Fort Worth Fire Department"The Fort Worth Fire Department has provided sick leave in accordance with state civil service law since 1940. Chapter 143 of the State of Texas Local Government Code requires that municipalities provide firefighters with fifteen days annually of sick leave to be used for a bona fide injury or illness. Unused sick leave is accruable throughout an employee's career and is available for use as described by state law. Upon retirement, an employee is entitled to be paid for up to ninety days of unused sick leave and all accrued sick leave in excess of ninety days is calculated as years of service for retirement purposes. Outside of the legally required sell back, there are no other incentive programs nor is there an option to sell or convert sick leave hours in excess of ninety days to cash. This had resulted in the department experiencing high usage of sick leave hours by employees immediately prior to retirement. Additionally, there had been an increase in overall sick leave usage with an associated rise in overtime cost due to this usage. The purpose of this study was to analyze the Fort Worth Fire Department's sick leave use history, compare it to the average usage of similar fire departments and to identify strategies to reduce sick leave usage within the Fort Worth Fire Department. The evaluative research method was employed to conduct this study. Research questions that were to be answered by this study were: (1) What is the current sick leave use experience within the Fort Worth Fire Department? (2) How does Fort Worth's usage compare with similar departments? (3) What strategies are employed by other departments to reduce sick leave usage? (4) What strategies could be employed to reduce sick leave usage within the Fort Worth Fire Department?"National Fire AcademyPeacock, Jay D.1998-11