Advanced search Help
Searching for terms: ALL ("human AND trafficking") in: full text and any metadata
Clear all search criteria
Only 2/3! You are seeing results from the Public Collection, not the complete Full Collection. Sign in to search everything (see eligibility).
-
Report of the Attorney General's Cyber Digital Task Force: Cryptocurrency Enforcement Framework
From the Introduction: "At the outset, it bears emphasizing that distributed ledger technology, upon which all cryptocurrencies build, raises breathtaking possibilities for human flourishing. These possibilities are rightly being explored around the globe, from within academia and industry, and from within governments-- including our own. [...] But as the following pages make clear, despite its relatively brief existence, this technology already plays a role in many of the most significant criminal and national security threats our nation faces. As the Task Force has found, illicit uses of cryptocurrency typically fall into three categories: (1) financial transactions associated with the commission of crimes; (2) money laundering and the shielding of legitimate activity from tax, reporting, or other legal requirements; or (3) crimes, such as theft, directly implicating the cryptocurrency marketplace itself. Part I of this Enforcement Framework examines in detail each of those categories. Our society is not powerless in the face of these threats. As Part II demonstrates, the government has legal and regulatory tools available at its disposal to confront the threats posed by cryptocurrency's illicit uses. [...] This report concludes in Part III with a discussion of the ongoing challenges the government faces in cryptocurrency enforcement--particularly with respect to business models (employed by certain cryptocurrency exchanges, platforms, kiosks, and casinos), and to activity (like 'mixing' and 'tumbling,' 'chain hopping,' and certain instances of jurisdictional arbitrage) that may facilitate criminal activity."
United States. Department of Justice. Office of the Attorney General
2020-10
-
Department of Homeland Security 'U.S. Customs and Border Protection' Budget Overview (Fiscal Year 2018 Congressional Justification)
From the Component Overview: "U.S. Customs and Border Protection (CBP) is comprised of [various] mission-oriented programs that support achievement of the DHS strategic missions, goals, and objectives. Some programs are indented to show that this is the Procurement, Construction, and Improvements program that supports the related programs. In addition, some fees and funds are indented below the program it most closely aligns to as a funding source."
United States. Department of Homeland Security
-
Reforming the Bank Secrecy Act to Address Emerging Technology and Prevent Illicit Financing
From the Thesis Abstract: "The Bank Secrecy Act (BSA) was enacted by Congress to prevent criminals from hiding or laundering their illicit gains through the U.S. banking system. Over the years, criminals continue to exploit the financial system by moving illegal money using new technology. Lawmakers should amend the age-old BSA to address monetary thresholds of currency transaction reports and suspicious activity reports, along with addressing emerging financial technology (Fintech). In dealing with these issues, a delicate balance exists between increasing regulation to prevent crime and hindering the growth of innovation and customer convenience, along with privacy concerns. This thesis provides policy analysis and proposals for legislative and technological improvements to financial fraud detection. Furthermore, policy leaders will have a comprehensive understanding of the benefits and consequences of specific policy actions. This thesis concludes with policy recommendations of the BSA to include increasing the currency transaction report from $10,000 to $60,000 along with incorporating the controversial beneficial ownership provision. Last, add a minimum standard for a client opening financial accounts, increase know-your-customer requirements, and regulate peer-to-peer devices. As criminal organizations continue to move money throughout the U.S. financial services sector, legislators should amend the BSA to address these areas of concern to ensure financial stability and integrity."
Naval Postgraduate School (U.S.); Naval Postgraduate School (U.S.). Center for Homeland Defense and Security
Bradstreet, Shawn M.
2019-12
-
Department of Homeland Security 'U.S. Customs and Border Protection' Budget Overview (Fiscal Year 2019 Congressional Justification)
From the Document: "U.S. Customs and Border Protection (CBP) is responsible for securing America's borders to protect the United States against terrorist threats and prevent the illegal entry of inadmissible persons and contraband, while facilitating lawful travel, trade, and immigration. Along over 5,000 miles of border with Canada; 1,900 miles of border with Mexico; and approximately 95,000 miles of shoreline, CBP is responsible for preventing the illegal movement of people and contraband. The FY 2019 President's Budget provides $16.7B in total budget authority to support CBP's mission. This represents an increase of $362.9M over the FY 2018 President's Budget."
United States. Department of Homeland Security
-
Comparison of Criminal-History Information Systems in the United States and Other Countries
From the Abstract: "Official criminal-history record information is an important component of criminal justice systems worldwide, but little is known about how the United States' criminal-history system compares to those in other industrialized countries. To address this knowledge gap, the Bureau of Justice Statistics sponsored a study to document and compare the national criminal-history systems in the United States, Australia, Canada, England and Wales, Germany, and the Netherlands. The topics include the operational uses and sources of the criminal-history data, procedures to assess record accuracy and completeness, efforts to improve the systems, and the availability of records to government and non-government entities for operational and research purposes. Sub-national criminal-history systems (e.g., the state repositories in the U.S.) and other data systems that maintain and disseminate criminal justice information were outside the scope of this study."
United States. Bureau of Justice Statistics; United States. Federal Bureau of Investigation; RAND Corporation
Alper, Mariel; Durose, Matthew R.
2020-04-02
-
Department of Homeland Security Annual Performance Report, Fiscal Years 2017-2019: Appendix B: Relevant GAO and OIG Reports
From the About Section: "The U.S. Department of Homeland Security Annual Performance Report for Fiscal Years (FY) 2017-2019 presents the Department's performance measures and applicable results, provides the planned performance targets for FY 2018 and FY 2019, and includes information on the Department's Strategic Review and our Agency Priority Goals. Additionally, this report presents information on the Department's reform agenda (in compliance with Executive Order 13781), regulatory reform, the Human Capital Operating Plan, and a summary of our performance challenges and high-risk areas identified by the DHS Office of the Inspector General and the Government Accountability Office. The report is consolidated to incorporate our annual performance plan and annual performance report."
United States. Department of Homeland Security
2018-02-05
-
Strategic Plan to Secure Civilian Federal Networks (Fiscal Year 2017 Report to Congress)
From the Document: "This report highlights the Department of Homeland Security's (DHS) strategic plan for securing civilian Federal networks, and has been compiled pursuant to the language set forth in the Joint Explanatory Statement accompanying the Fiscal Year 2017 DHS Appropriations Act (P .L. 115-31 )."
United States. Department of Homeland Security
2019-04-11
-
Arizona Border Wall Case Study
From the thesis abstract: "Illegal immigration is a popular topic. Obtaining operational control of the southwest border and adding infrastructure was deemed necessary and important when Congress voted for the Secure Fence Act in 2006. This thesis determines how much, and where, additional infrastructure should be added. How effective can a border wall or fence be in securing the U.S.-Mexico border? Under what circumstances are walls and fences effective? When are other types of security measures more effective? The Yuma and Tucson sectors are examined to determine the current border infrastructure's effectiveness using arrest and geographical data. Current border infrastructure, the complete wall system's cost, and results realized in reducing illegal crossings are reviewed. Government documents, congressional testimonies, and think-tank analyses are analyzed. This thesis focused on barriers and tactical infrastructure on the southwest border. It found that a wall or fence is a viable option to improve the security of some border sections. The Yuma sector is already under operational control and is lower priority. The Tucson sector is higher priority and needs additional infrastructure. It is recommended that all urban and rural zones under 80 percent effectiveness be upgraded to modern fencing, while very remote areas below 80 percent effectiveness remain exempt if zone activity stays low."
Naval Postgraduate School (U.S.); Naval Postgraduate School (U.S.). Center for Homeland Defense and Security
Bristow, Justin Alexander
2017-12
-
Options for Reforming the H-2B Visa Program and Improving Late Season Employers' Access to Workers (Fiscal Year 2018 Report to Congress)
From the Executive Summary: "This report provides the information requested by the House and Senate Appropriations Subcommittees on Homeland Security by describing options that generally are phrased in terms of actions that Congress or the Departments could take to improve late season employers' access to H-2B [Temporary Non-Agricultural Workers] workers. The report also provides additional options for improving the overall H-2B program. Such references should not be construed as expressing an opinion on the scope of DHS's or DOL's [U.S. Department of Labor] current statutory or regulatory authorities. As requested, the report provides options to improve visa availability under the existing annual cap of 66,000 workers for employers that need workers to start work late in a semiannual period of the fiscal year."
United States. Department of Homeland Security
2019-06-07
-
Military Review: The Professional Journal of the U.S. Army [November-December 2020]
This November-December 2020 edition of "Military Review: The Professional Journal of the U.S. Army" features the following articles: "History and Heritage in the Operational Force: An Action Plan" by Charles R. Bowery Jr.; "Denuclearization through Peace: A Policy Approach to Change North Korea from Foe to Friend" by James M. Minnich; "Finding the Enemy on the Data-Swept Battlefield of 2035" by T. S. Allen; "The Human-Machine Paradox: A Balanced Approach to Finding and Fixing in 2035" by Michael P. Ferguson, Jesse R. Crifasi, and Nick Rife; "The Ostrich Complex and Leadership in Crisis" by Kevron W. Henry; "Great Staff Officers and Great Commanders: What's the Difference?" by Meghan Starr; "Multi-Domain Operations and Information Warfare in the European Theater" by Jennifer L. Purser; "Leading the Change to Holistic Health and Fitness" by Jason M. Payne; "Older Than You Realize: Teaching Branch History to Army Cyberwarriors" by Scott Anderson; "The Fourth Domain" by Brian R. Hildebrand; "Chinese Soft Power: Creating Anti-Access Challenges in the Indo-Pacific" by Robert F. Gold; and "Discipline as a Vital Tool to Maintain the Army Profession" by Michael Petrusic.
Army University Press (U.S.)
2020
-
Perfect Storm: Climate-Induced Migration to the United States
From the Thesis Abstract: "From the Mariel boatlift in the 1980s to the recent mass migration of familial units from the Northern Triangle in 2019, the United States has consistently been unprepared to handle mass migration events. With the world approximately 1.0°C warmer than pre-industrial levels, climatic-driven migration events will now challenge the U.S. borders. This thesis explores how the United States might prepare to handle cross-border climate change-induced migration from a homeland security perspective. Using the research methodology of scenario planning, this study assesses the many ways the future might unfold by focusing on intersecting global megatrends and an array of global warming projections in the year 2050. As a result, this thesis finds that regardless of how the world chooses to combat global warming in the coming decades, migration will continue. If the United States is to prepare for such a future, regional agreements and national legislation will be necessary. In turn, if leveraged correctly, climate migrants can help the United States compete with future emerging economies. This thesis ultimately concludes that a proactive approach to cross-border climate change-induced migration might not only benefit climate migrants but also the future resiliency of United States well into the mid-century."
Naval Postgraduate School (U.S.); Naval Postgraduate School (U.S.). Center for Homeland Defense and Security
Wright, Katelin M.
2020-09
-
Lone Actor Terrorists: The Performance of Hegemonic Masculinity Through Acts of Violence
From the Thesis Abstract: "As the United States faces the threat of lone actor terrorism, researchers have struggled to reach a consensus on how to profile these actors and fully understand causation and motivation. The media frequently report attackers' histories of gender-based violence; however, there is a lack of gendered analysis of lone actor terrorism. This thesis explores the role of gender-based violence and hegemonic masculinity in the radicalization and attacks carried out in the United States by post-9/11 lone actor terrorists. It finds that a majority of the attackers experienced stressors related to the performance of hegemonic masculinity, a culturally constructed set of norms that values dominance and accomplishment in terms of wealth, heterosexual romantic partners, and control. This thesis explores these stressors as identity threats in the context of social identity theory. In the absence of group dynamics, it connects referent informational influence to social identity theory concepts and radicalization models for lone actor terrorists. This thesis presents a thematic diagram that coalesces social identity theory with lone actor terrorism, radicalization, and studies of hegemonic masculinity. Furthermore, this thesis finds that collecting data on gender-based violence will be critical to understanding lone actor terrorism and violence prevention strategies."
Naval Postgraduate School (U.S.); Naval Postgraduate School (U.S.). Center for Homeland Defense and Security
Windisch, Beth
2020-09
-
Department of Homeland Security Annual Performance Report, Fiscal Years 2017-2019: Appendix A: Measure Descriptions, Data Collection Methodologies, and Verification and Validation Information
From the About Section: "The U.S. Department of Homeland Security Annual Performance Report for Fiscal Years (FY) 2017-2019 presents the Department's performance measures and applicable results, provides the planned performance targets for FY 2018 and FY 2019, and includes information on the Department's Strategic Review and our Agency Priority Goals. Additionally, this report presents information on the Department's reform agenda (in compliance with Executive Order 13781), regulatory reform, the Human Capital Operating Plan, and a summary of our performance challenges and high-risk areas identified by the DHS Office of the Inspector General and the Government Accountability Office. The report is consolidated to incorporate our annual performance plan and annual performance report."
United States. Department of Homeland Security
2018-02-05
-
Enhancing Basic Governance: Japan's Comprehensive Counterterrorism Assistance to Southeast Asia
"Japan's support for counterterrorism in Southeast Asia (SEA) partly reflects its commitment to the U.S.-Japan alliance, but is also part of a wider strategy for enhancing its political and security role in the region. Japan's focus has been to develop a comprehensive set of initiatives aimed at enhancing SEA countries' basic governance capabilities in areas such as law enforcement, export control, money laundering, anti-piracy, air and sea port security, immigration ration control and proliferation of WMD. Due to domestic political constraints, Japan's contributions in the area of counterterrorism emphasize non-military means of cooperation. Japan's constitutional ban against collective defense continues to be cited as an obstacle to Self Defense Force participation in counterterrorism (CT), but this has not hindered cooperation in civilian law enforcement, including Coast Guard cooperation. Recently, the Maritime Self Defense Force (MSDF) has begun to cautiously expand its CT efforts. Bureaucratic turf battles inside SEA countries receiving Japanese aid can be a problem for CT cooperation with Japan, especially when the domestic law enforcement role is partly shared by the military. Japan's aid is greatly appreciated by Southeast Asia's least CT-capable states, such as the Philippines and Indonesia. Nevertheless, SEA remains a laggard in terms of ratifying the twelve UN counter-terrorism conventions and protocols. Because of the limitations on Japan's military, its programs aimed at cooperating with Southeast Asian countries in various subfields of CT are perceived by some Southeast Asian countries to be less threatening than programs initiated by the United States. Japan's CT programs are, however, still in their initial stages and continue to evolve. Assistance to Southeast Asia is quantitatively insufficient, and redundancies among aid givers are not yet a problem. As quantity of aid increases, however, donor consultations and coordination between Japan and the"
Asia-Pacific Center for Security Studies
Fouse, David; Sato, Yoichiro, 1966-
2006-02
-
Journal of Indo-Pacific Affairs (Vol.3 No.4) [Winter 2020]
This Winter 2020 edition of the Journal of Indo-Pacific Affairs contains the following articles: "戰略競爭?--Strategic Competition?" by Scott D. McDonald; "Risks and Benefits of Autonomous Weapon Systems: Perceptions among Future Australian Defence Force Officers" by Jai Galliott and Austin Wyatt; "India and the Quadrilateral Forum as a Means of US Deterrence in the Indo-Pacific" by Daniel Myers; "Penetrating Artificial Intelligence-enhanced Antiaccess/Area Denial: A Challenge for Tomorrow's Pacific Air Forces" by Richard Uber; "Indonesia: Lessons for the US-China Geo-economic Competition" by Kyle Richardson; "Sticks and Stones: Nuclear Deterrence and Conventional Conflict" by Kathryn M.G. Boehlefeld; "A War by Words: Language and Cultural Understanding in the Age of Information Warfare" by Peter Loftus, F. Jon Nesselhuf, and Howard Ward; "Japan Cancels Aegis Ashore: Reasons, Consequences, and International Implications" by Michael Unbehauen and Christian Decker; "Lassoing the Haboob: Countering Jama'at Nasr al-Islam wal Muslimin in Mali, Part I" by Ryan CK Hess; "Lassoing the Haboob: Countering Jama'at Nasr al-Islam wal Muslimin in Mali, Part II" by Ryan CK Hess; "A Peacekeeping Mission in Afghanistan: Pipedream or Path to Stability?" by Ryan C. Van Wie; "Path to Nuclear Weapons: Balancing Deterrence, Preemption, and Defense for South Korea" by Hyun Ji Rim; Stout Pilots and Aircraft: "Air Transport in the 1944 Burma-India Campaigns" by Christopher L. Kolakowski; and "Space Entanglements: The India-Pakistan Rivalry and a US-China Security Dilemma" by J. Wesley Hutto.
Air University (U.S.). Press
2020
-
Citizenship and Immigration Services Ombudsman Recommendation on the Central American Minors (CAM) Refugee/Parole Program
From the Executive Summary: "In recent years, unprecedented numbers of unaccompanied children from the 'Northern Triangle' of Central America -- El Salvador, Guatemala, and Honduras -- have made the difficult journey to the United States. Many of these minors flee their home countries to escape victimization, only to endure further harm on the journey north in the form of extortion, abduction, rape, or other exploitation. The U.S. Citizenship and Immigration Services (USCIS), along with the U.S. Department of State (DOS), launched the Central American Minors (CAM) Refugee/Parole program in December 2014 to '…provide a safe, legal, and orderly alternative to [this] dangerous journey.…' Through CAM, parents lawfully present in the United States may apply for their children at risk in the Northern Triangle countries to be considered for relocation to the United States as refugees or parolees. [...] the Ombudsman has identified the following key issues of concern in CAM program operations: Lengthy processing times; Need for enhanced protection mechanisms for particularly vulnerable qualifying children; Restrictive eligibility criteria; Costs associated with DNA testing; Uncertainty regarding program eligibility, application process, and case status; Insufficient funding for resettlement agencies' CAM-related activities; Lack of access to counsel during CAM interviews; and 8) Barriers for CAM parolees, such as travel costs, lack of resettlement assistance, and adjustment of status limitations."
United States. Department of Homeland Security. Office of the Citizenship and Immigration Services Ombudsman
2016-12-21
-
DHS Privacy Office: 2010 Data Mining Report to Congress
This report discusses the Department of Homeland Security's (DHS) use of data mining. From the executive summary: "The Department of Homeland Security Privacy Office (DHS Privacy Office or Office) is providing this report to the Congress pursuant to the Department's obligations under section 804 of the Implementing the Recommendations of the 9/11 Commission Act of 2007 (9/11 Commission Act), entitled the Federal Agency Data Mining Reporting Act of 2007 (Data Mining Reporting Act or the Act). This report discusses activities currently deployed or under development in the Department that meet the Data Mining Reporting Act's definition of data mining, and provides the information set out in the Act's reporting requirements for data mining activities."
United States. Department of Homeland Security
2010-12
-
Department of Homeland Security, Privacy Office: 2012 Data Mining Report to Congress
"The Department of Homeland Security (DHS) Privacy Office (DHS Privacy Office or Office) is providing this report to Congress pursuant to Section 804 of the Implementing Recommendations of the 9/11 Commission Act of 2007 (9/11 Commission Act), entitled the Federal Agency Data Mining Reporting Act of 2007 (Data Mining Reporting Act or the Act). This report discusses activities currently deployed or under development in the Department that meet the Data Mining Reporting Act's definition of data mining, and provides the information set out in the Act's reporting requirements for data mining activities."
United States. Department of Homeland Security. Privacy Office
2013-02
-
Department of Homeland Security Privacy Office: 2016 Data Mining Report to Congress
"The Department of Homeland Security (DHS) Privacy Office (Privacy Office or Office) is providing this report to Congress pursuant to Section 804 of the Implementing Recommendations of the 9/11 Commission Act of 2007 (9/11 Commission Act), entitled the Federal Agency Data Mining Reporting Act of 2007 (Data Mining Reporting Act or the Act). This report discusses activities currently deployed or under development in the Department that meet the Data Mining Reporting Act's definition of data mining, and provides the information set out in the Act's reporting requirements for data mining activities."
United States. Department of Homeland Security
2017-04
-
Department of Homeland Security: Privacy Office 2014 Data Mining Report to Congress
From the Executive Summary, "The Department of Homeland Security (DHS) Privacy Office (DHS Privacy Office or Office) is providing this report to Congress pursuant to Section 804 of the Implementing Recommendations of the 9/11 Commission Act of 2007 (9/11 Commission Act), entitled the Federal Agency Data Mining Reporting Act of 2007 (Data Mining Reporting Act or the Act). This report discusses activities currently deployed or under development in the Department that meet the Data Mining Reporting Act's definition of data mining, and provides the information set out in the Act's reporting requirements for data mining activities."
United States. Department of Homeland Security
2015-01
-
Department of Homeland Security Privacy Office: 2015 Data Mining Report to Congress
"The Department of Homeland Security (DHS) Privacy Office (Privacy Office or Office) is
providing this report to Congress pursuant to Section 804 of the Implementing
Recommendations of the 9/11 Commission Act of 2007 (9/11 Commission Act), entitled the
Federal Agency Data Mining Reporting Act of 2007 (Data Mining Reporting Act or the Act).
This report discusses activities currently deployed or under development in the Department that
meet the Data Mining Reporting Act's definition of data mining, and provides the information
set out in the Act's reporting requirements for data mining activities. [...] This year's report, covering the period January 1, 2015, through December 31, 2015, provides
updates on modifications, additions, and other developments that have occurred during the
reporting year. Additional information on DARTTS [Data Analysis and Research for Trade Transparency System] and the Transportation Security
Administration's (TSA) Secure Flight Program's use of ATS [Automated Targeting System] is being provided separately to
Congress in two annexes to this report. These programs contain Law Enforcement Sensitive
Information and Sensitive Security Information, respectively."
United States. Department of Homeland Security
2016-02
-
Department of Homeland Security: Privacy Office 2013 Data Mining Report to Congress
"This year's report, covering the period January 1, 2013, through December 31, 2013, provides updates on modifications, additions, and other developments that have occurred in the current reporting year including use of ATS [Automated Targeting System] by DHS components other than CBP [Customs and Border Protection]. The report also presents two new programs currently in development that will include data mining capabilities: the DHS Data Framework, a DHS-wide pilot initiative, and FALCON-Roadrunner, which is administered by ICE [Immigration and Customs Enforcement]. Additional information on DARTTS [Data Analysis and Research for Trade Transparency System] and on the Transportation Security Administration's (TSA) Secure Flight Program's use of ATS is being provided separately to Congress in two annexes to this report that contain Law Enforcement Sensitive Information and Sensitive Security Information, respectively."
United States. Department of Homeland Security
2014-02
-
U.S. Department of Homeland Security: FY 2015-2017 Annual Performance Report
From the Introduction: "The 'U.S. Department of Homeland Security (DHS) Annual Performance Report (APR) for Fiscal Years (FYs) 2015-2017' presents the Department's performance measures and applicable results for FY 2015, associated performance targets for FY 2016 and FY 2017, and includes information on the Department's FY 2015 Strategic Review and our Agency Priority Goals (APGs). In addition, this report presents several FY 2015 Department-wide management initiatives followed by a summary of major management and performance challenges and high-risk areas identified by the DHS Office of Inspector General and the Government Accountability Office. The FY 2015-2017 APR satisfies the 'Government Performance and Results Act (GPRA) and the GPRA Modernization Act (GPRAMA) of 2010' requirement to publish the Department's Annual Performance Report and Annual Performance Plan."
United States. Department of Homeland Security
2016-02-09
-
Ready for the Future: Assessing the Collaborative Capacity of State Emergency Management Organizational Structures
From the thesis abstract: "Emerging needs of the emergency management discipline are outlined in recent presidential directives, national strategies and federal emergency management strategic initiative documents. Meeting these needs requires collaboration as a core capability. Collaboration with diverse communities, volunteers and the private sector are essential, as are strategic and operational actions for collaboration, building social capital, and using social media for collaboration. The future of our nation's resilience to disasters depends on a collaborative network of partners that reaches from the Federal Emergency Management Agency to individual citizens and the communities they inhabit. State emergency management agencies are the hub of this network and must lead the effort to effectively collaborate at all levels. The research findings of this thesis show that state emergency management organizations have not yet fully developed the collaborative capacities necessary to meet emerging needs. In addition, data shows that organizational structures of state emergency management organizations are impacting collaborative capacity development. In particular, military-based organizations lag behind their civilian-based counterparts in every area of collaborative capacity building. Reasons for these differences, and research into more effective structural models, should be explored."
Naval Postgraduate School (U.S.). Center for Homeland Defense and Security; Naval Postgraduate School (U.S.)
Schaal, Jennifer
2013-03
-
Implementation of the National Defense Strategy in the United States Southern Command Area of Responsibility, Hearing Before the Subcommittee on Emerging Threats and Capabilities of the Committee on Armed Services, United States Senate, One Hundred Sixteenth Congress, First Session, July 9, 2019
This is the July 9, 2019 hearing on "Implementation of the National Defense Strategy in the United States Southern Command Area of Responsibility," held before the U.S. Senate Subcommittee on Emerging Threats and Capabilities of the Committee on Armed Services. From the opening statement of Joni Ernst: "Today's hearing is a continuation of the subcommittee's efforts to provide oversight over National Defense Strategy implementation. This is an important component of our efforts to ensure our military is appropriately resourced, equipped, and postured to defend the nation against a growing array of threats." Statements, letters, and materials submitted for the record include those of the following: Craig S. Faller.
United States. Government Publishing Office
2020
-
Effective State, Local, and Tribal Police Intelligence: The New York City Police Department's Intelligence Enterprise- a Smart Practice
"State, local, and tribal law enforcement (SLTLE) agencies play a significant role in homeland security. Their intelligence function supports their hometown and the nation's homeland security. The New York City Police Department (NYPD) recognized that the same intelligence that secures the homeland is required to secure New York City. NYPD restructured its organizational structure and external business practices to acquire the requisite intelligence to secure NYC and in effect facilitated the nation's homeland security. This thesis identifies NYPD's intelligence practices as a smart practice that SLTLE agencies should adopt, scaled and tailored to their realities and needs, to secure their hometowns and to compound a national effort to secure the homeland."
Naval Postgraduate School (U.S.). Center for Homeland Defense and Security; Naval Postgraduate School (U.S.)
Comiskey, John G.
2010-03
-
Advancing U.S. Foreign Policy Through Homeland Security: The Logic for International Training and Professional Exchanges
From the thesis abstract: "The role of soft power in U.S. foreign policy has become a common theme amongst government agencies. International training and professional exchanges are a part of soft power. Since the egregious attacks on 9/11, many have argued for an increase in this tool of statecraft. This thesis reviews the role of soft power in U.S. foreign policy and how that pertains to homeland security. Specifically, the study notes the importance of international military and law enforcement training and how these exchanges can enhance U.S. security and advance foreign policy. Moreover, the research reviews models of current Department of Defense international training efforts for consideration by the Department of Homeland Security. The many professional exchanges and international training efforts from agencies such as U.S. Customs and Border Protection, U.S. Coast Guard, and the International Law Enforcement Academies are also reviewed. A model for an international program to take place at the Global Borders College is presented. In conclusion, the paper will argue that through attraction and influence, the U.S. will be better suited for security in the future. Furthermore, the encouraging of international training and exchanges will assist in improving U.S. multilateral relationships in the twenty-first century."
Naval Postgraduate School (U.S.). Center for Homeland Defense and Security; Naval Postgraduate School (U.S.)
Traina, Dominic J.,III
2013-12
-
Export Control Reform Implementation: Outside Perspectives, Hearing Before the Committee on Banking, Housing, and Urban Affairs, United States Senate, One Hundred Sixteenth Congress, First Session on Conducting Oversight on Implementation of the Export Control Reform Act (ECRA), July 18, 2019
This is the July 18, 2019 hearing "Export Control Reform Implementation: Outside Perspectives" held before the Senate Committee on Banking, Housing, and Urban Affairs. From the opening statement of Mike Crapo: "In August of 2018, the President signed the Foreign Investment Review Modernization Act, called 'FIRRMA,' and the Export Control Reform Act, known as 'ECRA,' into law. FIRRMA is designed to strengthen the existing regulatory architecture in significant ways to deal with inbound foreign investments that would have the potential to threaten U.S. national security interests. ECRA importantly reauthorizes an otherwise moribund Export Administration Act, continued only by annual reissuances of Presidential national security declarations. It authorizes the Bureau of Industry and Security, or BIS, at Commerce to update controls on exports designed to prevent certain U.S. dual-use technologies, lower-level military items, and other things from ending up in the wrong hands. [...] Today's hearing picks up where the Committee left off when it last looked at assessing investment controls on technology in its June 4th hearing on 'Confronting Threats from China.' [...] Today the Committee shifts gears slightly to examine control issues surrounding exports of things outbound from the United States and other re-exports or transfers that may occur abroad." Statements, letters, and materials submitted for the record include those of the following: Eric L. Hirschhorn, Nova J. Daly, Ben Buchanan, and Dennis Ralston.
United States. Government Publishing Office
2020
-
Public Law 116-113: United States-Mexico-Canada Agreement Implementation Act
From the Document: "An Act [t]o implement the Agreement between the United States of America, the United Mexican States, and Canada attached as an Annex to the Protocol Replacing the North American Free Trade Agreement."
United States. Government Publishing Office
2020-01-29
-
Military Review: The Professional Journal of the U.S. Army [September-October 2020]
This September-October 2020 edition of "Military Review: The Professional Journal of the U.S. Army" features the following articles: "The Question: Why Would China Not Invade Taiwan Now?" by Tim Willasey-Wilsey; "Time Horizons Drive Potential Taiwan Cross-Strait Conflict" by David An; "How to Counter China's Disinformation Campaign in Taiwan" by Linda Zhang; "Economic Warfare: China's Financial Alternative to Military Reunification with Taiwan" by Bethany G. Russell; "Taiwan and the U.S. Army New Opportunities amid Increasing Threats" by Eric Setzekorn; "Deterring the Dragon: Returning U.S. Forces to Taiwan" by Walker D. Mills; "Drive Them into the Sea" by Brian J. Dunn; "Russian New Generation Warfare: Deterring and Winning the Tactical Fight" by James Derleth; "Steal the Firewood from Under the Pot: The Role of Intellectual Property Theft in Chinese Global Strategy" by Scott Tosi; "Venezuela in Light of Anti-American Parties and Affiliations in Latin America" by Geoffrey Demarest; "The 2003 Battle of Baghdad: A Case Study of Urban Battle during Large-Scale Combat Operations" by Nicolas Fiore; "Strong Reasons Make Strong Actions: Closing the Leadership Gap in the Army Medical Corps" by Victoria Fernandes Sullivan; and "Unit Status Reports and the Gaming of Readiness" by Theo Lipsky.
Army University Press (U.S.)
2020