Advanced search Help
Searching for terms: ALL (Border AND Security) in: title or summary
Clear all search criteria
Only 2/3! You are seeing results from the Public Collection, not the complete Full Collection. Sign in to search everything (see eligibility).
-
Seventh Public Hearing of the National Commission on Terrorist Attacks Upon the United States: Staff Statement No. 2: Three 9/11 Hijackers: Identification, January 26, 2004
The seventh public hearing of the National Commission on Terrorist Attacks Upon the United States was held January 26-27, 2004 in Washington, DC. The two-day investigative hearing developed facts and circumstances relating to border and aviation security, two central aspects of the Commission's mandate. The focus of this Staff Statement is on "Three 9/11 Hijackers: Identification, Watchlisting, and Tracking." The following is an excerpt from the introduction: "The Congressional Joint Inquiry highlighted this story as one of failed opportunities to put these suspected terrorists on a watchlist to prevent them from entering the United States. Therefore the lesson learned, as Director of Central Intelligence George Tenet put it, was to do a better job of putting people on the watchlist, to correct what he called 'a weakness in our internal training and an inconsistent understanding of watchlist thresholds.' We believe the portrayal of this story as a 'watchlisting' failure may literally be true. But we think this label is profoundly misleading. [...] We suggest instead that the watchlisting failure was just one symptom of a larger intelligence failure. The failure raises questions for the Commission about the CIA's and the Intelligence Community's management of transnational intelligence operations."
National Commission on Terrorist Attacks Upon the United States
2004-01-26
-
Seventh Public Hearing of the National Commission on Terrorist Attacks Upon the United States: Statement of Donna A. Bucella, January 26, 2004
The seventh public hearing of the National Commission on Terrorist Attacks Upon the United States was held January 26-27, 2004 in Washington, DC. The two-day investigative hearing developed facts and circumstances relating to border and aviation security, two central aspects of the Commission's mandate. This testimony was part of a panel entitled "Visas and Watchlisting Today". In this statement, Donna A. Bucella discusses the mission and objectives of the new Terrorist Screening Center (TSC) which was created to ensure that government investigators, screeners, agents and state and local law enforcement officers have ready access to the information and expertise they need to respond quickly when a suspected terrorist is screened or stopped.
National Commission on Terrorist Attacks Upon the United States
2004-01-26
-
Giving Lip Service with an Attitude: North Korea's China Debate
"China's influence in North Korea is grossly misrepresented and exaggerated. In the past five years, Beijing's economic assistance to Pyongyang and the latter's economic dependence on China in terms of food, fuel, fertilizers, and monetary remittances declined in both absolute and relative terms. China's military-technical assistance is sporadic and of questionable value. The DPRK-PRC mutual defense alliance is hollow and on paper only. Controversial cross-border contacts aggravate tensions and increase uncertainty in the overall stressful bilateral relationship. North Korean elite perceptions and popular images of China grow increasingly ambiguous and negative. Strategic interaction on international security issues is self-interested, with very few common interests and shared approaches. Despite calendar exchanges of standard reverences, political relations are frosty. Revolutionary traditions have faded away, and personal loyalties and leadership bonds have already dissolved. The North Korean breed of resurgent neo-traditionalist and isolationist nationalism is hardly compatible with the hegemonic ideology of the revisionist Chinese pseudo-Marxist internationalism. Pragmatism and rational calculation of national interests prevail in both capitals. The United States should not count on China's perceived ability 'to deliver the DPRK'--it hardly can. Although Beijing may be able to bring Pyongyang to 'the party' occasionally, it definitely cannot make North Korea dance to its music, let alone to the tunes emanating from Washington. North Korea would rather spoil the multinational party than give the spoils to its Chinese 'benefactor' or American 'villain,' if its concerns are not satisfied 'in a just and appropriate manner.'"
Asia-Pacific Center for Security Studies
Mansourov, Alexandre Y.
2003-12
-
Near-Space Airships: The Solution to Persistent ISR
From the thesis abstract: "Long duration conflicts have become the staple for 21st century engagements. Whether for counter-insurgency operations, humanitarian assistance, border patrol, or homeland security, the need for years or even decades of persistent intelligence, surveillance, and reconnaissance (ISR) has place tremendous strain on collection platforms. The Department of Defense (DOD) has strove to field improved capabilities but has consistently overlooked a major region of operations: near-space. Near-space provides a tremendous opportunity to provide persistent ISR. Operating at altitudes above 65,000 feet, near-space vehicles enjoy wide fields of view than can encompass an entire theater of operations such as Iraq or Afghanistan. Unlike low-earth orbit (LEO) satellites, which only briefly pass through the area of operations, near-space vehicles have the ability to loiter over the area of responsibility and provide the persistence necessary for current operations. Near-space airships, with the ability to host large payloads and loiter in near-space for months at a time, provide the solution to the DOD's problem of persistent ISR. Technology demonstrations have drastically reduced the technical risk of fielding near-space airships. With a unit cost similar to that of a Global Hawk Remotely Piloted Aircraft (RPA), near-space airships improve support to the warfighter while substantially reducing long-term operational costs. The DOD needs to invest significant effort into developing near-space airships now to ensure it can meet the ISR needs of the future."
Air University (U.S.). Air Command and Staff College
Gulden, Ryan J.
2010-03
-
Antipersonnel Landmines Convention and the Evolving Politics of Arms Control
From the thesis abstract: "The setting and cast of characters involved in arms control have changed since the end of the Cold War. Changes in world dynamics occurring in tandem with globalization have brought about an increasing focus on human rights and human security. National borders and state sovereignty, still the foundation of our current international system, are declining in importance with these trends in globalization. This trend flowed into the arena of arms control in 1997 by banning a weapon stockpiled and used in almost every nation's military. This paper seeks to answer questions concerning these changes and about the implications of the 1997 Antipersonnel Landmine Convention as an example of a possible new framework for arms control. This paper seeks to answer the questions of whether or not the Ottawa Convention was an aberration or is likely to become a new way of doing business. It also seeks to understand the likelihood that certain weapon systems will become the target of such a future ban. From this analysis, this paper seeks to increase awareness of the Air Force and DoD with regard to international and domestic political contexts facilitating such a framework. The author provides general recommendations concerning U.S. policy approach with regard to conventional weapons and arms control negotiations."
United States. Department of the Air Force
Deam, Seth R.
2001-09
-
Draft Environmental Assessment: Town of Florence Communications Tower
"The Town of Florence, Arizona has a need to improve its public safety communications system in order to provide complete radio coverage to all areas of the town, particularly including the Anthem@Merrill Ranch development in the northern portion of the town. To assist the town in this effort, the Arizona Department of Homeland Security (AZDOHS), through FEMA [Federal Emergency Management], has provided grant funding to assist with the purchase and installation of a communications tower, a storage building, an emergency generator and related equipment. A review by FEMA of the Town's initial environmental submission has determined the need for an Environmental Assessment. The proposed tower site is located within the Anthem@Merrill Ranch development on the parcel set aside through a development agreement with the Town of Florence described as the Community Facilities parcel. This parcel is intended for the future location of a fire station and a public library, and perhaps other government facilities. Access to the parcel is from the Hunt Highway, which borders the parcel on the west side. The parcel, as well as all of the surrounding area, is typical Sonoran Desert terrain. Residential development has already occurred on the north side of the parcel and future development is planned for the east and south sides."
United States. Federal Emergency Management Agency
2011-09
-
Holy Jerusalem: The Key to Lasting Peace in the Middle East
From the thesis abstract: "This paper explores the Middle East Peace Process in terms of the historical and cultural attachment the three monolithic religions have toward the city of Jerusalem. Although conventional wisdom ascribes to four majors issues preventing a comprehensive settlement between the Israelis and the Palestinians: namely borders, security, right of return and Jerusalem, it is actually only Jerusalem that is paramount. If the issue of Jerusalem's sovereignty can be solved a compromise solution for the other three will be found. Unfortunately, the common ground required for a negotiated settlement in regards to Jerusalem will never be found. Its religious value to Muslims, Jews and Christians alike have contributed to three millennia of monumental abuse, depravity and sacrifice, which acts as a limitless reservoir of cultural sunk costs no contemporary government can or will ignore. [...] This paper suggests a new international construct. Instead of the old Corpus Separatum proposed by the United Nations, more appropriate form would be a Corpus Universitas, or world city, where everyone is a citizen of Jerusalem. One where the city is administered under revocable power by a UN member nation not associated with any of the three monolithic religions, is sanctioned, supervised and legitimized by the United Nations and it legislated by a two-tier system controlled by a council equally represented by Jews, Christians and Muslims."
Air University (U.S.). Air Command and Staff College
Harness, Christopher D.
2009-05
-
Ill-Structured Militia Problem in Africa's Great Lakes Region
"The presence of armed illegal non-state actors in the DRC [Democratic Republic of Congo] continues to pose a security challenge not only to Uganda but also to the entire region. The study analyzes several of the militias that have established bases in the DRC. The militias to have dispersed to distant locations that make it hard for the military to counter them. The resulting insecurity has forced some communities to acquire arms for self-defense, which drives insurgency. Cross border, attacks have dragged the affected neighboring countries to intervene in the DRC. The DRC must build capacity to defeat the militias with the help of the regional partners, the international community, the restructured UN intervention force and the US in support and enabling roles."
Army War College (U.S.)
Nyarwa, Michael
2013-03
-
Borders in Cyberspace: Strategic Information Conflict Since 9/11
"Ancient ways of mobilizing power for force and using it to scatter foes have gained new reach and impact in the last two decades, both on the battlefield and for internal security. It lies beyond the scope of this paper to explain how these new means became subject, for the sake of efficiency, to automated logical programs sorting digitized data and new concepts of international law. What the paper narrates is how that very technology opened new avenues for force and extraordinary opportunities for surveillance, while new ideas of law ironically canalized conflict in a 'humanitarian' direction. The question of trust remained throughout, at the level of the leader, the commander, and the individual. Can you trust those with whom you would do business? Can you trust that your computer is guarding your data, or presenting you the truth? Can you trust that international law will protect your sovereignty -- or protect you from your government? Conflict endured as regimes and organizations that could not live at live at peace with their own citizens ultimately could not remain at peace with their neighbors. The liberal ascendancy that President Clinton described in 1993 thus brought not peace but a long struggle for survival on the part of dictators against the ostensibly universal appeal of liberal ideals. For the foreseeable future that struggle will proceed on physical, legal, and virtual battlefields, with the 'borders' between narratives and visions - and the questions of trust - cutting across geographic terrain and reaching into every nation."
Army Cyber Institute, West Point
Warner, Michael
2018-11-14
-
Drug Interdiction Along the Southwest Border: U.S. Counterdrug Policy, History and Future Implications
From the thesis abstract: "Drug trafficking, a central issue of dispute with Mexico and other source and transit nations, also threatens their sovereignty and U.S. security. U.S. border interdiction efforts, to include military, have had more political impact, than serious effect, on the cartels. Implementation of the NDCS [National Drug Control Strategy] is deficient, though current strategic focus is sound. Intelligence management and interagency efficiency is poor. DoD will be a part of the solution. [...] U.S. must seize initiative to protect own vulnerabilities and attack those of traffickers. National interest of counterdrug is important, but not the absolute highest priority. It is a major quality of life issue. U.S. concepts of defense are changing and federal infrastructure is slow to adapt. Opportunities abound to shift initiative from traffickers to U.S."
Marine Corps University (U.S.). Marine Corps War College
Cooney, J. J.
1998-05-13
-
Making the Merida Initiative Work
From the thesis abstract: "For several decades, the United States and Mexico both had to deal with major transnational border issues. Those issues continue to escalate. Violence and instability in Mexico reached unprecedented levels over the last five years. The U.S. is attempting to neutralize the violence by assisting Mexico through several major interagency efforts. One of the leading efforts is through a Department of State (DoS) led plan titled the Merida Initiative. To date, the Merida Initiative is only achieving limited success as a strategy to curb violence and the war on drugs. It is possible to do better by improving cooperation and synchronization in the interagency and multinational process. According to Professor Paul Kan, 'defining the nature of the problem brings inherent challenges of establishing U.S. policy to support Mexico but more important, developing a comprehensive strategy that is going to achieve results.' The U.S. must isolate the key issues, develop appropriate measures and better structure the interagency lead for success. The Department of State is currently leading in name only. The Merida Initiative can work, but not without an overhaul of the strategy in order to support Mexico and ensure the security of the U.S."
Army War College (U.S.)
Coward, Clem
2012-03-14
-
H. Rept. 116-318, Part 1: Synthetic Opioid Exposure Prevention and Training Act, Report to Accompany H.R. 4739, December 3, 2019
From the Purpose and Summary: "H.R. 4739, the 'Synthetic Opioid Exposure Prevention and Training Act,' would amend the Homeland Security Act of 2002 to protect U.S. Customs and Border Protection officers, agents, other personnel, and canines against potential synthetic opioid exposure."
United States. Government Publishing Office
2019-12-03
-
H. Rept. 114-480, Part 1: Enhancing Overseas Traveler Vetting Act, Report to Accompany H.R. 4403, Including Cost Estimate of the Congressional Budget Office, April 11, 2016
From the Purpose and Summary: "The purpose of H.R. 4403 is to authorize the development of open-source software based on certain systems of the Department of Homeland Security and the Department of State to facilitate the vetting of travelers against terrorist watchlists and law enforcement databases, enhance border management, and improve targeting and analysis, and for other purposes."
United States. Government Publishing Office
2016-04-11
-
Defense Civil Support: DOD, HHS, and DHS Should Use Existing Coordination Mechanisms to Improve Their Pandemic Preparedness, Report to the Committee on Armed Services, House of Representatives
From the document: "The U.S. Army estimates that if a severe infectious disease pandemic were to occur today, the number of U.S. fatalities could be almost twice the total number of battlefield fatalities in all of America's wars since the American Revolution in 1776. A pandemic occurs when an infectious agent emerges that can be efficiently transmitted between humans and has crossed international borders. DOD's day-to-day functioning and the military's readiness and operations abroad could be impaired if a large percentage of its personnel are sick or absent, and DOD's assistance to civil authorities might be limited. House Report 114-102 included a provision for GAO (Government Accountability Office) to assess DOD's planning and coordination to support civil authorities during a pandemic. This report assesses the extent to which (1) DOD has guidance and plans for supporting civil authorities in the event of a domestic outbreak of a pandemic disease and (2) HHS (Health and Human Services) and DHS have plans to respond to a pandemic if DOD support capabilities are limited, and they have mechanisms to coordinate their pandemic preparedness and response. GAO reviewed agency pandemic guidance and plans, interagency coordination mechanisms, and pandemic-related exercises and after-action reports"
United States. Government Accountability Office
2017-02
-
Pandemic Influenza Impact on Workforce and Critical Infrastructure
This document is a fact sheet regarding pandemic influenza impact analysis produced by the National Infrastructure Simulation and Analysis Center (NISAC) under the Department of Homeland Security. "Conclusions from the epidemiological and mitigation strategy analyses conducted to date include: response time is most important, other factors are secondary; partially effective response early is best; geospatial dynamics are important; face masks can reduce or prevent an epidemic; border control can only delay an epidemic and a 95% reduction in the contagious individuals entering the country delays the epidemic by 5 weeks; and social distancing is also effective in delaying an epidemic, but returning to normal interactions without other mitigation measures causes waves of outbreaks."
United States. Department of Homeland Security
2006
-
Intellectual Property Rights, Fiscal Year 2018 Seizure Statistics
From the Executive Summary: "Products that infringe U.S. trademarks and copyrights are subject to exclusion orders issued by the United States International Trade Commission threaten the health and safety of American consumers and pose risks to our national interests. U.S. Customs and Border Protection (CBP) and U.S. Immigration and Customs Enforcement (ICE) Homeland Security Investigations' (HSI) enforcement of intellectual property rights (IPR) mitigates the financial and welfare risks posed by imports of illicit products. [...] In fiscal year (FY) 2018, the number of IPR seizures decreased by 333 seizures to 33,810 from 34,143 in FY 2017. The total estimated manufacturer's suggested retail price (MSRP) of the seized goods, had they been genuine, increased to nearly $1.4 billion from over $1.2 billion in FY 2017. In FY 2018, ICE-HSI arrested 381 individuals, obtained 296 indictments, and received 260 convictions related to intellectual property crimes."
U.S. Customs and Border Protection. Office of Trade
2019-08?
-
National Strategy for Combating Wildlife Trafficking
"Like other forms of illicit trade, wildlife trafficking undermines security across nations. Well-armed, well-equipped, and well-organized networks of criminals and corrupt officials exploit porous borders and weak institutions to profit from trading in poached wildlife. Record high demand for wildlife products, coupled with inadequate preventative measures and weak institutions has resulted in an explosion of illicit trade in wildlife in recent years.That trade is decimating iconic animal populations. Today, because of the actions of poachers, species like elephants and rhinoceroses face the risk of significant decline or even extinction. But it does not have to be that way. We can take action to stop these illicit networks and ensure that our children have the chance to grow up in a world with and experience for themselves the wildlife we know and love. Addressing these challenges requires a U.S. strategy that is proactive, recognizes immediate imperatives, and balances our strengths and expertise to address challenges comprehensively over the long term. This is a global challenge requiring global solutions. So we will work with foreign governments, international organizations, nongovernmental organizations, and the private sector to maximize our impacts together. Our efforts will aim to strengthen enforcement, reduce demand, and increase cooperation to address these challenges. The entire world has a stake in protecting the world's iconic animals, and the United States is strongly committed to meeting its obligation to help preserve the Earth's natural beauty for future generations."
United States. White House Office
2014-02-11
-
Afghanistan's Information and Communications Technology Sector: U.S. Agencies Obligated Over $2.6 Billion to the Sector, but the Full Scope of U.S. Efforts is Unknown
"In 2001, Afghanistan had only a rudimentary telecommunications system located in major cities and along its borders. Since then, considerable development has taken place as a result of private sector investment, as well as the Afghan government and international partners' efforts. According to U.S. and Afghan officials, the information and communications technology (ICT) sector is generally seen as a success. The U.S. Agency for International Development (USAID) reports that, among other things, the sector contributed $1.81 billion in revenues to the Afghan government in 2013, employs about 130,000 Afghans, and provides mobile phone services to roughly 90 percent of the population. Private sector investment alone had reached $2 billion by 2013. Additionally, the Department of Defense (DOD) estimates that the ICT sector could generate an additional $1 billion in revenue per year to the Afghan government within the next decade from data transit tariffs and the provision of information services. U.S. agencies and other stakeholders have recognized the importance of the ICT sector to Afghanistan's economic success. For example, the ICT sector has become a key enabler of the Afghan government and has expanded its ability to communicate with Afghan citizens. In addition, the sector includes communications networks that are critical to the Afghan National Defense and Security Forces' (ANDSF) operations. The objectives of the audit were to determine (1) the scope of U.S. agencies' efforts to develop Afghanistan's ICT sector since 2002 and (2) the extent to which the agencies coordinated these efforts."
United States. Office of the Special Inspector General for Afghanistan Reconstruction
Sopko, John F.
2016-07
-
Meeting the Challenge of White Nationalist Terrorism at Home and Abroad, Joint Hearing Before the Subcommittee on the Middle East, North Africa, and International Terrorism of the Committee on Foreign Affairs, with the Subcommittee on Intelligence and Conterterrorism of the Committee on Homeland Security, House of Representatives, One Hundred Sixteenth Congress, First Session, September 18, 2019
This is the September 18, 2019 hearing on "Meeting the Challenge of White Nationalist Terrorism at Home and Abroad," held before the U.S. House Subcommittee on the Middle East, North Africa, and International Terrorism of the Committee on Foreign Affairs with the Subcommittee on Intelligence and Conterterrorism of the Committee on Homeland Security. From the Opening Statement of Max Rose: "White nationalist terrorists have killed more people in recent years than any other type of domestic extremist. We also know that 78 percent of extremist-related murders in the United States last year were attributed to those adhering to a white nationalist ideology. [...] Unsurprisingly, all of this has also shed a light on the world of social media companies as a catalyst for the spread of white nationalist propaganda both here and abroad. [...] This threat knows no boundaries. It does not end at traditional borders, and it tears across continents. [...] We have to make sure that the Federal Government is working better at data provision. Right now, the capacity of the Federal Government to provide high-level analytics on the white nationalist threat, the white extremist threat, and domestic terrorism is not nearly satisfactory." Statements, letters, and materials submitted for the record include those of the following: Cynthia Miller-Idriss, Christian Picciolini, and Sharon Nazarian.
United States. Government Publishing Office
2019
-
FATA/NWFP Dilemma; Defining United States Policy for Long Term Stability on the Afghanistan-Pakistan Border
From the thesis abstract: "During the 9-11 Commission Report, a question was asked to American and foreign government officials, as well as military officers on the front lines fighting terrorists. The question was 'if you were a terrorist leader today, where would you locate your base?' The number one answer was western Pakistan and the Pakistan-Afghanistan border region. A failure of the United States and its Allies to engage the region with a coherent long-term policy, strategic goals and objectives will result in the FATA/NWFP [Federally Administered Tribal Areas/North-West Frontier Province] becoming the long-term 'center of gravity' (COG) for al Qaeda and Islamic fundamentalist extremism. The Obama administration is facing the most complex set of National Security issues in recent history. All of these issues require well-defined national policy and a focused strategy integrating all elements of national power and a whole-of-government approach. Since 9-11, the United States has not clarified its vision to deny the extremists safe havens in the FATA/NWFP region. This thesis demonstrates through case studies how the United States, its allies, the United Nations, and the International Community unwittingly enabled, and later successfully denied al Qaeda center's of gravity in the Middle East, Africa, and Central Asia. It is imperative that the United States demonstrate the resolve to deny al Qaeda future COG's, starting in the FATA/NWFP."
Joint Forces Staff College (U.S.). Joint Advanced Warfighting School
Voorhees, Van J.
2010-05-18
-
Improved Multispectral Skin Detection and its Application to Search Space Reduction for Dismount Detection Based on Histograms of Oriented Gradients
From the thesis abstract: "Due to the general shift from conventional warfare to terrorism and urban warfare by enemies of the United States in the late 20th Century, locating and tracking individuals of interest have become critically important. Dismount detection and tracking are vital to provide security and intelligence in both combat and homeland defense scenarios including base defense, combat search and rescue (CSAR), and border patrol. This thesis focuses on exploiting recent advances in skin detection research to reliably detect dismounts in a scene. To this end, a signal-plus-noise model is developed to map modeled skin spectra to the imaging response of an arbitrary sensor, enabling an in-depth exploration of multispectral features as they are encountered in the real world for improved skin detection. Knowledge of skin locations within an image is exploited to cue a robust dismount detection algorithm, significantly improving dismount detection performance and efficiency. This research explores multiple spectral features and detection algorithms to find the best features and algorithms for detecting skin in multispectral visible and short wave infrared (SWIR) imagery. This study concludes that using SWIR imagery for skin detection and color information for false alarm suppression results in 95% probability of skin detection at a false alarm rate of only 0.4%."
Air Force Institute of Technology (U.S.)
Brooks, Adam Lee
2010-03
-
Independent Auditor's Report on the FY 2019 DoD Detailed Accounting Report for the Funds Obligated for National Drug Control Program Activities
From the Document: "Public Law 105-277, Title VII, 'Office of National Drug Control Policy Reauthorization Act of 1998 (the Act),' October 21, 1998, requires National Drug Control Program agencies to submit detailed accounting each year to the Director of the Office of National Drug Control Policy (ONDCP). The detailed accounting reports all funds expended by the agencies for National Drug Control Program activities during the previous fiscal year. The Act also requires each agency Inspector General to authenticate the detailed accounting before it is submitted to the ONDCP Director (section 1704(d), title 21, United States Code). The ONDCP National Drug Control Strategy, 'FY 2020 Budget and Performance Summary,' May 2019, identified that the DoD enacted $1.4 billion in FY 2019 for DoD drug control spending. Additionally, $2.5 billion was transferred to the Drug Interdiction and Counterdrug Activities appropriation for the U.S. Army Corps of Engineers' construction of the Southwest Border barrier in support of the Department of Homeland Security."
United States. Department of Defense. Office of the Inspector General
2020-01-30
-
National Strategy to Combat Terrorist Travel of the United States of America
"The National Strategy to Combat Terrorist Travel presents an integrated plan to ensure the United States stops terrorist attempts to travel to conduct attacks on the homeland or against our interests abroad. The strategy outlines how the United States Government will expand coordination and maximize the full capabilities of Federal departments and agencies to identify, detect, and deter terrorists from transiting international borders. The United States Government will use all available tools to constrain terrorist travel planning, facilitation, and mobilization, including providing support to law enforcement, private-sector partners, and communities. Key to detecting and interdicting terrorists attempting to travel will be enhancing systems that validate identities and advancing the use of biometric technologies. The United States Government will work closely with state, local, tribal, and territorial governments to achieve these goals. The strategy also recognizes that the United States cannot pursue these goals alone - our foreign partners are vital to the effort to identify, disrupt and deter terrorist travel. The United States Government will therefore leverage foreign partners to improve global travel security capabilities and capacity consistent with strong counterterrorism (CT) measures that the United States has pioneered since the attacks of September 11, 2001."
United States. White House Office
2018-12
-
Caucasus Emirate: Emerging Force or Jihadist Fantasy?
From the thesis abstract: "The ongoing conflict in Russia's North Caucasus region continues to pose a threat to the stability of not only Russia, but to areas well beyond its borders. What began as an independence movement for one small ethnic group from the Russian Federation has evolved into a front in the global jihadist movement. As the movement for Chechen independence faltered, insurgents increasingly relied on Islamic ideologies to expand the conflict and attract support and funding from the greater Islamic community. The current insurgent leader declared the creation of the Caucasus Emirate in 2007, which corresponds to Russia's North Caucasus region and purports to represent Russia's Muslim community. After nearly two decades of war, Russia has been unable to fully return stability to the area and the insurgents continue to attack Russian security forces in the region, as well as engage in horrific terror attacks in the heart of the Russian Federation. This Strategy Research Project examines the most likely outcome of this conflict based on key factors identified in contemporary theories explaining weak actor victories in asymmetric conflicts."
Army War College (U.S.)
Predmore, Jeffrey C.
2011-03-22
-
Combating Transnational Organized Crime: International Money Laundering as a Threat to Our Financial Systems, Hearing Before the Subcommittee on Crime, Terrorism, and Homeland Security of the Committee on the Judiciary, House of Representatives, One Hundred Twelfth Congress, Second Session, February 8, 2012
From the opening statement of F. James Sensenbrenner, Jr.: "Today's hearing examines the subject of transnational organized crime [TOC], specifically how international money laundering is a threat to our financial and banking systems. As a part of its overall national security strategy, the Administration has proposed a strategy to combat transnational organized crime. TOC is organized crime coordinated across national borders for the purpose of attaining power, influence, or financial gain, wholly or in part by illegal means. These criminal networks protect their activities through a pattern of corruption and violence, while exploiting transnational commerce. The networks can take many forms, such as cells, clans, or cartels, and may involve into other criminal structures. Although the crimes they commit vary, these criminal organizations share the similar primary goal of financial gain, and they use similar methods to achieve their profits. The use of violence to intimidate or threaten, the exploitation of differences between countries, and the influence of government, politics, and commerce through corrupt and legitimate means." Statements, letters, and materials submitted for the record include those of the following: F. James Sensenbrenner, Jr., Robert C. Scott, Jennifer Shasky Calvery, Luke A. Bronin, and David B. Smith.
United States. Government Printing Office
2012
-
Posse Comitatus: An Impediment to Our National Security
From the thesis abstract: "The Posse Comitatus Act (PCA) is often the so called linchpin that bars the use of our military forces to support and enforce civil law within the borders of the United States. This act has in effect, denied the citizens of the United States the utmost protection they should be afforded by the federal government by restricting the use of Department of Defense assets to be used as force multipliers to our federal law enforcement and intelligence agencies. The United States will be required to once again do more with less as federal spending is decreased on not only homeland defense, but its security as well. The Federal Government will need to effectively utilize the combined resources of its numerous departments in order to accomplish this endeavor. Currently, the misinterpretation of the Posse Comitatus Act and the addition of subsequent restrictions have degraded our ability to properly protect the homeland. The Posse Comitatus Act is am ambiguous and highly misinterpreted law that needs to be rescinded and replaced with a new law that clearly identifies the terms in which the use of military forces in protection the homeland is appropriate. This research paper focuses on the use of military forces in domestic affairs within the historical context of posse comitatus within the United States, the subsequent Posse Comitatus Act of 1878, the interpretation of the Posse Comitatus Act since its passage, and its current influence on the United States ability to defend its homeland."
Joint Forces Staff College (U.S.). Joint Advanced Warfighting School
Schad, Jason Thomas
2012-04-25
-
COVID-19 and the Liberal International Order: Exposing Instabilities and Weaknesses in an Open International System
From the Document: "The Covid-19 [coronavirus disease 2019] pandemic is threatening the liberal international order in three ways. First, the open nature of the LIO [liberal international order] provides favourable conditions for the proliferation of infectious diseases. With the spread of the disease, governments also started implementing political and economic policies inconsistent with the liberal international order. The health crisis presents a second test for the LIO insofar as it undermines political freedoms. Border closures, ethnic differentiation and biometric surveillance have ensued since the outbreak. Third, both coordinated and uncoordinated actions to cope with Covid-19 put economic freedoms at risk as pecuniary activity declines and 'economic security' policies consistent with economic nationalism start to jeopardize liberal policies."
Finnish Institute of International Affairs (FIIA)
Norrlof, Carla
2020-04
-
Roundtable: Are We Prepared? Protecting the U.S. from Global Pandemics [video]
From the Opening Statement of Ron Johnson: "The emergence of the novel coronavirus from Wuhan, China and its arrival on our doorstep shows the threat that pandemics pose to our nation. Already, around the world, this coronavirus has infected tens of thousands of people and killed hundreds. […] If we want to stop infectious diseases from becoming global problems, then we must ensure that our policies and procedures are thoughtfully developed and ready to go before the next infection crosses our borders. To achieve this goal, we must be able to answer some key questions: First and foremost, who's in charge? We have learned that an effective response to a pandemic requires a whole-of-government approach: health officials who identify and treat the disease, homeland security officials who protect against infection, and a host of others. But our response is not effective if it is not well-managed. Second, do we have clear strategies and plans to combat these global diseases and pandemics? Third, what lessons have we learned from previous responses? Have we addressed and resolved those issues?" Witnesses for this roundtable include the following: Nikki Clowers, Julie L. Gerberding, Scott Gottlieb, Luciana Borio, and Asha M. George. A transcript for the opening statement in this 2 hour, 12 minute, 32 second video is also available [https://www.hsgac.senate.gov/imo/media/doc/Opening Statement-Johnson-2020-02-12.pdf].
United States. Congress. Senate. Committee on Homeland Security and Governmental Affairs
2020-02-12
-
Commission Recommendation of 8.4.2020 on a Common Union Toolbox for the Use of Technology and Data to Combat and Exit from the Covid-19 Crisis, in Particular Concerning Mobile Applications and the Use of Anonymised Mobility Data
From the Document: "(1) This recommendation sets up a process for developing a common approach, referred to as a Toolbox, to use digital means to address the crisis. The Toolbox will consist of practical measures for making effective use of technologies and data, with a focus on two areas in particular: (1) A pan-European approach for the use of mobile applications, coordinated at Union level, for empowering citizens to take effective and more targeted social distancing measures, and for warning, preventing and contact tracing to help limit the propagation of the COVID-19 [coronavirus disease 2019] disease. This will involve a methodology monitoring and sharing assessments of effectiveness of these applications, their interoperability and cross-border implications, and their respect for security, privacy and data protection; and (2) A common scheme for using anonymized and aggregated data on mobility of populations in order (i) to model and predict the evolution of the disease, (ii) to monitor the effectiveness of decision-making by Member States' authorities on measures such as social distancing and confinement, and (iii) to inform a coordinated strategy for exiting from the COVID-19 crisis."
European Commission
2020-04-08
-
Responding to the Impact of the COVID-19 Outbreak on Food Value Chains Through Efficient Logistics
From the Document: "To contain the COVID-19 [coronavirus disease 2019] pandemic (caused by the virus SARS-CoV-2 [severe acute respiratory syndrome coronavirus 2]), governments around the world have implemented measures, including a severe reduction in the transportation of goods (ground, ocean freight and air freight), services that rely on transport, as well as migration of labour domestically and internationally. Workers are less available reflecting both disruptions in transportation systems and restrictions to stop the transmission of the disease, within and across borders. These factors induce overall disruptions in the logistics of the food supply chains, impeding the shipment of food and agricultural inputs, threatening food security and nutrition, particularly for the most vulnerable population segments. [...] The Food and Agriculture Organization of the United Nations (FAO) urges countries to maintain functioning food value chains to avoid food shortages, following practices that are being proven to work. This note summarizes some practices that could be useful for governments and the private sector to maintain critical logistical elements in food value chain."
Food and Agriculture Organization of the United Nations
2020-04-04