Advanced search Help
Searching for terms: ALL (Cyber AND Crime) in: title or summary
Clear all search criteria
Only 2/3! You are seeing results from the Public Collection, not the complete Full Collection. Sign in to search everything (see eligibility).
-
Maritime Security Regime Concept: A Global Approach to Regional Challenges
"Unhindered ability to utilize the Maritime Domain is essential to a healthy global economy and is vital to the strategic security interests of all nations. Loss of access to this significant global supply chain that connects nations, people, markets and manufacturers around the world quickly expands to impact all nations. Direct threats to ensured maritime access include disruption of commerce, interference with the lawful use of the Maritime Domain, and transnational crimes such as piracy and terrorism. Natural phenomena such as severe weather, ice or geological disasters may limit access. Since these threats and events can be expected to continue it would be prudent to prepare for a future where the impact of a variety of access challenges could be prevented, mitigated or resolved. No single nation can ensure access for the global community. The complexity and uncertainty facing the nations of each unique maritime region are compounded by the problems and opportunities of cyber, air, and space domain interdependencies and regional relationships. The interdependence with other domains is evident in that the physical flow in the Maritime Domain is coupled with the information flow in cyberspace, a physical connection to the air domain, and the reliance on space assets for navigation and communication. Maritime Security Regime (MSR) is the term used to describe a group of states and/or organizations acting together, with an agreed upon framework of rules and procedures, to ensure security within the maritime environment. This Concept was developed under the Multinational Experiment 7 (MNE 7). An underlying insight of the Concept is that the global linking of MSRs to other regions and other domains can enhance the ability of the MSR to mitigate their own regional access challenges. It is clear that the nature of maritime access challenges is potentially global in scope and impact. This calls for a global and agile framework designed to support regional challenges."
United States. Joint Chiefs of Staff. Joint and Coalition Operational Analysis
2012-09-27
-
Annotated Worldwide Threat Assessment 2016
This is an interactive replication of the "Worldwide Threat Assessment of the US Intelligence Community." This multimedia production created by the Center for Homeland Security and Defense (CHDS) at the Naval Postgraduate School highlights major threats (Global and Regional). Global Threats focuses on the different mediums: Cyber and Technology, Terrorism, WMDs [Weapons of Mass Destruction] and Proliferation, Space and Counterspace, Counterintelligence, Transnational Organized Crime, Economic and Natural Resources, and Human Security. Regional Threats highlight the recent hostile activity in that given region and provide documents (found on the Homeland Security Digital Library (HSDL) advanced search) to provide in-depth findings. The threat assessment document in its entirety is available at [https://www.hsdl.org/?abstract&did=802039].
Naval Postgraduate School (U.S.). Center for Homeland Defense and Security
2016
-
Test Results for Software Write Block Tools: RCMP HDL VO.7
The Computer Forensics Tool Testing (CFTT) program is a joint project of the National Institute of Justice (NIJ), the research and development organization of the U.S. Department of Justice, and the National Institute of Standards and Technology's (NIST's) Office of Law Enforcement Standards (OLES) and Information Technology Laboratory (ITL). The program is supported by other organizations, including the Federal Bureau of Investigation, the U.S. Department of Defense Cyber Crime Center, the U.S. Department of Homeland Security's Bureau of Immigration and Customs Enforcement, and the U.S. Secret Service. The objective of the CFTT project is to provide measurable assurance for practitioners, researchers, and other users that the tools used in computer forensics investigations provide accurate results. Accomplishing this requires the development of specifications and testing methods for computer forensics tools and the testing of specific tools against those specifications. Test results provide the information necessary for developers to improve tools, for users to make informed choices, and for the legal community and others to understand the tools' capabilities. This approach to testing computer forensic tools is based on well-recognized methodologies for conformance and quality testing. The specifications and testing methods are posted on the CFTT Web site (http://www.cftt.nist.gov) for both comment and review by the computer forensics community. This document reports the results from testing the Royal Canadian Mounted Police Hard-Disk Write Lock V0.7 (RCMP HDL) against the Software Write Block Tool Specification & Test Plan Version 3.0, available from the CFTT Web site.
National Institute of Justice (U.S.)
2004-08
-
Test Results for Software Write Block Tools: RCMP HDL VO.4
The Computer Forensics Tool Testing (CFTT) program is a joint project of the National Institute of Justice (NIJ), the research and development organization of the U.S. Department of Justice, and the National Institute of Standards and Technology's (NIST's) Office of Law Enforcement Standards (OLES) and Information Technology Laboratory (ITL). The program is supported by other organizations, including the Federal Bureau of Investigation, the U.S. Department of Defense Cyber Crime Center, the U.S. Department of Homeland Security's Bureau of Immigration and Customs Enforcement, and the U.S. Secret Service. The objective of the CFTT project is to provide measurable assurance for practitioners, researchers, and other users that the tools used in computer forensics investigations provide accurate results. Accomplishing this requires the development of specifications and testing methods for computer forensics tools and the testing of specific tools against those specifications. Test results provide the information necessary for developers to improve tools, for users to make informed choices, and for the legal community and others to understand the tools' capabilities. This approach to testing computer forensic tools is based on well-recognized methodologies for conformance and quality testing. The specifications and testing methods are posted on the CFTT Web site (http://www.cftt.nist.gov) for comment and review by the computer forensics community. This document reports the results from testing the Royal Canadian Mounted Police Hard-Disk Write Lock V0.4 (RCMP HDL) against the Software Write Block Tool Specification & Test Plan Version 3.0, available from the CFTT Web site.
National Institute of Justice (U.S.)
2004-08
-
Test Results for Software Write Block Tools: RCMP HDL VO.5
The Computer Forensics Tool Testing (CFTT) program is a joint project of the National Institute of Justice (NIJ), the research and development organization of the U.S. Department of Justice, and the National Institute of Standards and Technology's (NIST's) Office of Law Enforcement Standards (OLES) and Information Technology Laboratory (ITL); The program is supported by other organizations, including the Federal Bureau of Investigation, the U.S. Department of Defense Cyber Crime Center, the U.S. Department of Homeland Security's Bureau of Immigration and Customs Enforcement and the U.S. Secret Service. The objective of the CFTT project is to provide measurable assurance for practitioners, researchers, and other applicable users that the tools used in computer forensics investigations provide accurate results. Accomplishing this requires the development of specifications and testing methods for computer forensics tools and subsequent testing of specific tools against those specifications. Test results provide the information necessary for developers to improve tools, users to make informed choices, and the legal community and others to understand the tools' capabilities. This approach to testing computer forensic tools is based on well-recognized methodologies for conformance and quality testing. The specifications and test methods are posted on the CFTT Web site (http://www.cftt.nist.gov) for both comment and review by the computer forensics community. This document reports the results from testing the Royal Canadian Mounted Police Hard-Disk Write Lock V0.5 (RCMP HDL) against the Software Write Block Tool Specification & Test Plan Version 3.0, available from the CFTT Web site.
National Institute of Justice (U.S.)
2004-08
-
State and Local Governments: Adapting to Change
This journal examines the vital roles played by U.S. state and local governments and presents several case studies of how both governments and the people they represent are responding to the challenges they now face. The first two articles focus on state efforts at political, social, and technical modernization and the constituencies that are affected by these changes. Ellis Katz provides an in-depth look at the methods that states have used to modernize, adapt to changes and forge policy on behalf of their local constituencies. Sharon Crouch Steidel offers a concrete example of this modernization in her article about e-government and its positive effect on the states and their citizens. In addition to the social and technological changes that state and local governments must address, they have a crucial new role in protecting citizens in the wake of the September 11, 2001, terrorist attacks... Donald L. Plusquellic, describes the way cities, with help from the U.S. Department of Homeland Security, are developing teams of first responders and educating citizens to cope with possible attacks. Deborah Brown speaks with Dennis Taylor about examples of partnerships between American and international cities that address problems of mutual interest. Eric Green explores the partnership between federal, state and local enforcement agencies in combating cyber crime in his interview with Utah State Attorney General Mark L. Shurtleff.
United States. Department of State. Bureau of International Information Programs
2003-10
-
Financial Services Sector Open Source Digest: May 2010
"The Sector Open Source Digest (SOSD) is a sector-wide summary of events that have taken place during the past month domestically and internationally. The SOSD is primarily a compilation and reorganization of reporting drawn from the Daily Open Source Intelligence Report (OSIR). The SOSD may also contain additional reporting not originally published in the OSIR. The source materials for the OSIR and SOSD are found using open source research methodologies and include imagery; local, national, and international media reports; academia and industry sources; multimedia and blogs; and other relevant publicly available sources. The SOSD is a compilation of unclassified source material and does not provide analysis or projection. The content found within the SOSD is strictly for sector situational awareness." Articles in this edition include: "Telecom DoS [Department of State] hides cyber crime", "Two-thirds of all phishing attacks generated by a single criminal group, researchers say"; "Authorities arrest first suspect in massive identity-theft ring"; "Schapiro: SEC may push for market circuit-breakers"; "Researcher finds new type of phishing attack"; "3 dead in fire at Greek bank during Athens riots"; "Sad stories as mortgage scam complaints leap"; "FBI [Federal Bureau of Investigation] promises action against money mules"; "Underground broker network a bane in terror probes"; "RBC Bank, Wachovia, SunTrust on Weiss list of vulnerable banks"; and "Walmart to support smartcard payments".
United States. Department of the Treasury. Financial and Banking Information Infrastructure Committee
2010-05
-
Readout of Secretary Napolitano's Visit to Budapest, Hungary [April 14, 2011]
"Secretary of Homeland Security Janet Napolitano today joined U.S. Attorney General Eric Holder for the biannual U.S.-European Union (EU) Justice and Home Affairs Ministerial in Budapest, Hungary, to discuss international collaboration on counterterrorism and homeland security issues with Hungarian Deputy Prime Minister, Public Administration and Justice Minister Tibor Navracsics, Hungarian Interior Minister Sándor Pintér, EU Commissioner for Justice, Fundamental Rights, and Citizenship Viviane Reding and EU Commissioner for Home Affairs Cecilia Malmström. 'The United States is fully committed to working with our European partners to combat threats to our mutual security and economic stability,' said Secretary Napolitano. 'Together, we will enhance information sharing, strengthen cybersecurity and ensure the security and resilience of our global supply chain systems against terrorism and transnational crime.' While in Budapest, Secretary Napolitano underscored the significant progress made in negotiations on the U.S.-EU Passenger Name Record (PNR) agreement--reiterating the important role that information collection and analysis plays in ensuring the safety of the traveling public through information sharing while protecting the privacy of passengers. She also commended the World Customs Organization (WCO) for its continued collaboration on Program Global Shield----a multilateral effort led by DHS and the WCO and involving over 68 countries to prevent the illegal movement or diversion of precursor chemicals that can be used to make improvised explosive devices. She further underscored the United States and EU's shared commitment to continue strengthening international air cargo security and overall global supply chain security standards in partnership with WCO, the International Civil Aviation Organization (ICAO), the International Maritime Organization (IMO), and the Universal Postal Union (UPU)."
United States. Department of Homeland Security. Press Office
2011-04-14
-
Readout of Secretary Johnson and Deputy Secretary Mayorkas' Participation in Law Enforcement Roundtable [March 14, 2014]
On March 14, 2014, the Department of Homeland Security issued the following press release: "As part of the Department of Homeland Security's (DHS) ongoing partnership with law enforcement to advance the homeland security mission, Secretary of Homeland Security Jeh Johnson and Deputy Secretary of Homeland Security Alejandro Mayorkas today hosted a roundtable meeting with federal, state, local, tribal and campus law enforcement officials to discuss the important role the law enforcement community plays in keeping our nation safe and secure. Secretary Johnson expressed support for strengthening DHS's law enforcement partnerships through enhanced communication, information sharing, and collaboration between the Department and all levels of law enforcement. He also noted that in today's constantly evolving threat environment, law enforcement has the dual mission to combat cyber crime as well as traditional criminal activity facilitated through the Internet."
United States. Department of Homeland Security. Press Office
2014-03-14
-
Joint Vision Statement for the U.S.-Mongolia Security Relationship
"The United States and Mongolia have a common strategic interest in sustaining a stable international security environment and regional order based on peaceful resolution of disputes, democratic governance, political freedom, economic openness, and a universal respect for human rights. Mongolia serves as a stabilizing influence in Asia and is seeking to modernize its military in a transparent fashion. Mongolia welcomes and supports the role that the United States plays in securing peace, stability, and prosperity in the Asia-Pacific region. Both nations see the 21st century as a time of opportunity for the Asia-Pacific region in economic growth, empowerment of people, and democratic advancement. At the same time, both nations see challenges in dealing with common threats in the form of weapons of mass destruction (WMD) proliferation, terrorism, climate change, transnational crime, pandemic disease, mass migration, and cyber-attacks. The United States commends Mongolia's efforts to expand its contributions to international security through its cooperative security partnership with the United States. The United States reaffirms its support for Mongolia's active promotion of friendly relations with its neighbors. Furthermore, the United States recognizes that Mongolia's transparent democracy, security policy, and market economy provide a positive model in the region. U.S.-Mongolia cooperation has furthered international stability, validating the basis of the bilateral relationship and justifying deeper defense cooperation."
United States. Department of Defense
2014-04-10
-
Readout of Deputy Secretary Mayorkas' Trip to the United Kingdom
On November 6, 2014, the Department of Homeland Security issued the following press release: "LONDON -- Yesterday, Deputy Secretary of Homeland Security Alejandro Mayorkas concluded a two-day trip to London, where he met with United Kingdom counterparts to discuss counterterrorism efforts, aviation security, and efforts to stem illegal immigration and global human trafficking. During his visit, Deputy Secretary Mayorkas participated in the United States-United Kingdom Joint Contact Group Plenary where he highlighted the importance of bilateral collaboration on a wide-range of common homeland security-related priorities, including counterterrorism efforts, collaboration in law enforcement, and information sharing. He also discussed the enhancements to the Visa Waiver Program's Electronic System for Travel Authorization announced earlier this week. These enhancements were designed to address terrorism threats from overseas and provide added security for the continued facilitation of visa-free travel to the United States from our closest friends and allies. Deputy Secretary Mayorkas also met with U.S. Ambassador to the United Kingdom Matthew Barzun and U.K. Home Secretary Theresa May to underscore the inextricable link between the security of the United States and United Kingdom. Yesterday, Deputy Secretary Mayorkas also delivered remarks at the London School of Economics, where he discussed the importance of international collaboration to combat terrorism, human trafficking and cyber crime, while facilitating lawful trade and travel that supports the global economy. Today, Deputy Secretary Mayorkas will be in Paris, where he will participate in the G6 Ministerial and meet with international counterparts to discuss efforts to counter violent extremism and extremist travel to and from Syria."
United States. Department of Homeland Security. Press Office
2014-11-06
-
Preventing Point-of-Sale System Intrusions
From the thesis abstract: "Several major United States retailers have suffered large-scale thefts of payment card information as the result of intrusions against point-of-sale systems (smart cash registers). Point-of-sale attacks present a growing threat and can constitute a homeland-security problem due to a trans-national cyber crime element. This thesis presents results of a survey of point-of-sale intrusions that reached at least the start of criminal investigation. The survey showed that attacks were generally quite simple, and predominantly involved guessing passwords and subsequent installation of keyboard loggers. That suggests that countermeasures can be relatively simple although they must overcome organizational inertia. Our analysis leads to several recommendations to improve point-of-sale system security."
Naval Postgraduate School (U.S.)
Smith, David C.
2014-06
-
Information as Power: An Anthology of Selected United States Army War College Student Papers [Volume 6]
This Information in Warfare Working Group (I2WG) anthology presents selected student work from the U.S. Army War College (USAWC) Academic Year 2011. It includes examples of well-written and in-depth analyses on the vital subject of Information as Power. Section 1, "Information Effects in the Cyberspace Domain," includes the following: "Introduction," "Securing Cyberspace: Approaches to Developing an Effective Cybersecurity Strategy," "A Strategic Approach to Network Defense: Framing the Cloud," and "Crime or War: Cyberspace Law and its Implications for Intelligence." Section 2, "Information Effects in the Cognitive Dimension," includes the following: "Introduction," " Can't Count it, Can't Change it: Assessing Influence Operations Effectiveness ," and "Strategic Communication: The Meaning is in the People ." Section 3, "Information Sharing," includes the following: includes the following: "Introduction," "DOD Information Sharing with Domestic Emergency Partners for Defense Support of Civil Authorities Missions ," and "Coalition Mission Command: Balancing Information Security and Sharing Requirements."
Army War College (U.S.). Information in Warfare Group
Murphy, Dennis M.; Leitzel, Benjamin; Groh, Jeffrey L.
2012-05
-
In Support of the Common Defense: Homeland Defense & Security Journal [Volume 1]
This publication includes selected student work from the U.S. Army War College (USAWC) Academic Years 2010 and 2011. Section 1, titled "Threats Facing Our Nation: Challenges and Responses," includes the following articles: "Introduction"; "A New Mindset for Countering Terrorism"; "Systems Analysis, Centers of Gravity and Homeland Security"; "Electromagnetic Pulse: A Catastrophic Threat to the Homeland"; "DIME [Diplomatic, Information, Military, and Economic] Elements of Jihad"; "Cyber Attack! Crime or Act of War?"; and "History and Evolution of MalWare". Section 2, titled "Strengthening Defense Support of Civil Authorities," includes the following articles: "Introduction"; "Reforming Disaster and Emergency Response"; "Homeland Security Regional Unity of Effort"; "Miltary [sic] Police Mutual Aid and the Posse Comitatus Act"; and "Contingency Dual Status Commander: Balancing Title 10 and 32 Responsibilities". Section 3, titled "Securing our Borders," includes the following articles: "Introduction"; " The Mexican Cartels and Jihadist Terrorism"; "Securing the U.S. Southern Land Border: Enhancing the Interagency Effort"; and "U.S.-Mexico Security Cooperation: The Time to Act is Now".
Army War College (U.S.). Center for Strategic Leadership
2012-04
-
Readout Of Secretary Napolitano's Visit To Stockholm, Sweden [November 15, 2011]
On November 15, 2011, the Department of Homeland Security issued the following press release: "Secretary of Homeland Security Janet Napolitano today traveled to Stockholm, Sweden to meet with international partners, and underscore the Department's ongoing commitment to collaborating with our international partners to address cybersecurity as well as combat violent extremism and transnational crime and terrorism."
United States. Department of Homeland Security. Press Office
2011-11-15
-
Statement by Press Secretary Matt Chandler on Secretary Napolitano's Upcoming Visit to Norway and Sweden [November 10, 2011]
On November 10, 2011, the Department of Homeland Security issued the following press release by Press Secretary Matt Chandler: "Secretary of Homeland Security Janet Napolitano will travel to Oslo, Norway, and Stockholm, Sweden, Nov. 14-15, to meet with international partners and discuss the Department's ongoing collaboration with the two countries on cybersecurity and combating violent extremism and transnational crime. While in Oslo, Secretary Napolitano will meet with the Norweigian Minister of Justice and the Police Knut Storberget, Norwegian Police Security Service Director Janne Kristiansen, and U.S. Ambassador to Norway Barry White, and will offer condolences at the Oslo Cathedral for the victims of the 7/22 bombing and attack on Utoya Island."
United States. Department of Homeland Security. Press Office
2011-11-10
-
Statement by Press Secretary Matt Chandler on Secretary Napolitano's Upcoming Visit to the Bahamas [November 8, 2011]
On November 8, 2011, the Department of Homeland Security issued the following press release: "Secretary of Homeland Security Janet Napolitano will travel to Nassau, Bahamas on Nov. 9th-10th to deliver the keynote address at the second Caribbean Basin Security Initiative (CBSI) Dialogue and meet with senior U.S. State Department officials and regional security partners - highlighting the Department's commitment to collaboration in the Caribbean on a variety of security initiatives to combat transnational crime, cyber threats, and terrorism."
United States. Department of Homeland Security. Press Office
2011-11-08
-
Electronic Communications Privacy Act: Promoting Security and Protecting Privacy in the Digital Age, Hearing Before the Committee on the Judiciary, United States Senate, One Hundred Eleventh Congress, Second Session, September 22, 2010
From the opening statement of Patrick J. Leahy: "For many years, ECPA [Electronic Communications Privacy Act] has provided vital tools to law enforcement to investigate crime and to keep us safe, while at the same time protecting individual privacy online. As the country continues to grapple with the urgent need to develop a comprehensive national cybersecurity strategy, determining how best to bring this privacy law into the Digital Age is going to be one of our biggest challenges, especially here in Congress." Statements, letters, and materials submitted for the record include those of the following: Patrick J. Leahy, Benjamin L. Cardin, Russell D. Feingold, Al Franken, James A. Baker, James X. Dempsey, Jamil N. Jaffer, Cameron F. Kerry, Brad Smith, Laura W. Murphy, Nicole A Ozer, Matt Blaze, J. Beckwith Burr, Ryan Radia, Berin Szoka, Thomas A. Schatz, Kelly William Cobb, J. Bradley Jansen, Frederick W. Freeman, and David Schellhase.
United States. Government Printing Office
2011
-
Department of Homeland Security: Budget-in-Brief, Fiscal Year 2013
"Today's threats are not limited to any one individual, group or ideology and are not defined nor contained by international borders. Terrorist tactics can be as simple as a homemade bomb and as sophisticated as a biological threat or a coordinated cyber attack. We have had success in thwarting numerous terrorist plots including the attempted bombings of the New York City subways and Times Square, foiled attacks against air cargo, and other attempts across the country. […] To continue to address these evolving threats, DHS employs risk-based, intelligence-driven operations to prevent terrorist attacks. Through a multi-layered detection system focusing on enhanced targeting and information sharing, DHS works to interdict threats and dangerous people at the earliest point possible. DHS also works closely with its Federal, State and local law enforcement partners on a wide range of critical homeland security issues in order to provide those on the frontlines with the tools they need to address threats in their communities. Strengthening homeland security also includes a significant international dimension. To most effectively carry out DHS's core missions - including preventing terrorism, securing our borders, and protecting cyberspace - we must partner with countries around the world. This work ranges from strengthening cargo, aviation, and supply chain security to joint investigations, information sharing, and science and technology cooperation. Through international collaboration, we not only enhance our ability to prevent terrorism and transnational crime, we also leverage the resources of our international partners to more efficiently and cost-effectively secure global trade and travel. Today, DHS works in more than 75 different countries, the third largest foreign footprint of any civilian U.S.
Government agency, in order to address and respond to evolving threats before they reach our shores."
United States. Department of Homeland Security
2012?
-
Office of the U.S. Intellectual Property Enforcement Coordinator: Hearing Before the Subcommittee on Intellectual Property, Competition, and the Internet of the Committee on the Judiciary, House of Representatives, One Hundred Twelfth Congress, First Session, March 1, 2011
From the opening statement of Bob Goodlatte: "Companies that rely upon strong intellectual property [IP] protection employ 18 million Americans, account for more than 50 percent of our exports, contribute 40 percent of our economic growth, and 6 percent of our gross domestic product. Given these numbers, it is apparent that our continued ability to promote creativity and innovation and protect American intellectual property lie at the center of vital U.S. economic and national security interests. But how serious are the challenges to U.S. IP leadership? What should be our priorities, and what are the appropriate roles of the public and private sectors in preserving our competitive advantages and protecting intellectual property? […] Industry has estimated the loss of intellectual property worldwide to cyber crime in 2008 alone cost businesses approximately $1 trillion. We believe this trend has gotten worse. Last year, some of our largest information technology companies discovered that through-out much of 2009, they had been the targets of systematic efforts to penetrate their networks and acquire proprietary data. […] It is clear that the challenges faced by IP holders are serious and that protecting intellectual property has important implications for our Nation's economy innovation and national security. The U.S. Government clearly has both strategic and practical interests in ensuring our Nation's IP laws foster the continued development of innovative and creative products here at home. We also have obligations to ensure our laws are administered efficiently and enforced appropriately." Statements, letters, and materials submitted for the record include those of the following: Bob Goodlatte, Melvin L. Watt, John Conyers, Howard Coble, Victoria A. Espinel, Howard L. Berman, Debbie Wasserman Schultz, and Tom Reed.
United States. Government Printing Office
2011
-
African Peace and Security Architecture: A Strategic Analysis
From the thesis abstract: "In recent years, global players such as the United States, the European Union (EU) and the People's Republic of China (PRC) have noted Africa's growing strategic importance to their respective interests. Among those interests is the increasing importance of Africa's natural resources particularly oil, agricultural raw materials, and mineral resources, but also growing concerns over other peace and security threats such as conflicts, terrorism, cross-border crimes, cyber threats, or piracy. African Union (AU) Member States are developing an African Peace and Security Architecture (APSA) to address all these types of threats. This study is a descriptive study in the realm of strategy, focused on creating a holistic and meaningful picture about the mechanisms and purpose of the APSA. The overall intent of this study is to analyze the mechanisms developed, or in a developing stage, by the AU and regional organizations to address peace and security issues in the Africa, with the ultimate goal of contributing to a better understanding of African security context at the strategic level. By using the strategic model of Ends-Ways-Means, this study concluded that the APSA is a viable security strategy to deal with the principal threats in Africa. However, there are still important shortcomings and its effectiveness is dependent upon three critical ingredients: political will of AU Member States, developments at the regional level, and by addressing the external threats much more consistently, covering the security dimension of the APSA in the same extent of its peace dimension."
U.S. Army Command and General Staff College
Escorrega, Luis Carlos Falcão
2011-12-16
-
Cyberweapons: Leveling the International Playing Field
"One of the largest security concerns facing the United States today is how to mitigate its vulnerability to cyberweapons. Over the past twenty years, cyberthreats have evolved from solitary hackers motivated by monetary gain and prestige to organized crime and state actors. The sophistication and capabilities of these threats grows in direct proportion to the level of connectivity in society. Despite this steady development of cyberthreats, relatively little attention is given to discerning how these threats will impact warfighting and the international system. Most of the current literature on cyberwarfare considers it, at best, a force multiplier. Many scholars disregard its effects as a standalone attack vector, citing various reasons from US responses to Pearl Harbor and 9/11 to the inability of strategic bombing in World War II to subdue the civilian populations in England and Germany, absent combined military operations. These perspectives are correct in arguing that offensive cyberoperations without traditional, conventional power will be largely futile. This analytical approach, however, presumes that cyberweapons will be used in an offensive, first-strike manner. The long-range strike capabilities of cyberwar have the potential to be extremely effective when employed as an anticoercion weapon. In essence, a strong cyber capability is a deterrent force that will largely mitigate outside interference in domestic and regional affairs."
Army War College (U.S.)
Rustici, Ross
2011
-
EMR-ISAC: InfoGram, Volume 17 Issue 44, November 2, 2017
The Emergency Management and Response Information Sharing and Analysis Center's (EMR-ISAC) InfoGram is a weekly publication of information concerning the protection of critical infrastructures relevant to members of the Emergency Services Sector. This issue includes the following articles:"Truck ramming attacks appeal in their simplicity and success"; "SOP guidance and a new final standard for sUAS operations"; "Training and resources for cybersecurity professionals"; and "Assisting victims of violent crime".
Emergency Management and Response-Information Sharing and Analysis Center (U.S.)
2017-11-02
-
Statement by Press Secretary Marsha Catron on Deputy Secretary Mayorkas' Upcoming Trip to China [November 9, 2015]
On November 9, the Department of Homeland Security issued the following press release: "On November 12-13, Deputy Secretary of Homeland Security Alejandro Mayorkas will visit Beijing, China to participate in meetings with senior Chinese officials to advance implementation of bilateral commitments on cyber issues and prepare for the first US-China Ministerial Dialogue on Cybercrime and Related Issues in December. Deputy Secretary Mayorkas will also discuss other homeland security-related issues, including counterterrorism, combating transnational crime, and Coast Guard conduct at sea."
United States. Department of Homeland Security. Press Office
2015-11-09
-
Readout of Deputy Secretary Mayorkas' Trip to Latvia [June 3, 2015]
On June 3, 2015, the Department of Homeland Security issued the following press release: "RIGA, Latvia--Today, Deputy Secretary of Homeland Security Alejandro Mayorkas concluded his trip to Latvia where he met with his European Union (EU) counterparts to discuss a range of shared global security-related priorities, including counterterrorism, foreign terrorist fighters, and aviation security. Earlier today, Deputy Secretary Mayorkas, along with U.S. Attorney General Loretta Lynch, participated in the U.S.-EU Justice and Home Affairs Ministerial meeting. During the meeting, EUROPOL [European Police Office] presented a report on its cooperation with U.S. agencies, including U.S. Immigration and Customs Enforcement and the U.S. Secret Service, to counter cyber crime, and Deputy Secretary Mayorkas addressed international efforts to identify and interdict foreign terrorist fighter travel through improved information sharing, interdiction and arrests, and border security measures. Deputy Secretary Mayorkas also highlighted the Department's work to counter violent extremism. While in Latvia, Deputy Secretary Mayorkas also met with Latvian Minister for the Interior Rihards Kozlovskis and EU Commissioner for Migration and Home Affairs Dimitris Avramopoulos to underscore the ties between the security of the United States and that of its EU partners. Following their meetings, the United States and Latvia issued a joint statement on enhancing transatlantic cooperation in the areas of justice, freedom and security. "
United States. Department of Homeland Security. Press Office
2015-06-03
-
Serial No. 115-73: Examining the Current Data Security and Breach Notification Regulatory Regime, Hearing Before the Subcommittee on Financial Institutions and Consumer Credit of the Committee on Financial Services, U.S. House of Representatives, One Hundred Fifteenth Congress, Second Session, February 14, 2018
This is the February 14, 2018 hearing titled "Examining the Current Data Security and Breach Notification Regulatory Regime," held before the House Subcommittee on Financial Institutions and Consumer Credit of the Committee on Financial Services. From the opening statement of Blaine Luetkemeyer: "Every year, the number and severity of data breaches seems to increase and more and more Americans seem to become victims of fraud and identity theft. Consumers are left not only facing financial harm, but also the daunting task of restoring the integrity of their personal information. With constant technological advancements come more sophisticated threats to data security. Some of the largest financial institutions in the United States deal with hundreds if not thousands of cyber threats on a daily basis. [...] As we consider reform of the current regulatory regime surrounding data security standards and notification requirements, we should bear in mind that in many instances it is both the entity and the consumer that has been the victim of the crime." Statements, letters, and materials submitted for the record include those of the following: Aaron Cooper, Paul Rosenzweig, Marc Rotenberg, Kim Sponem, and Nathan D. Taylor.
United States. Government Publishing Office
2018
-
Security and Defense Studies Review: Volume 15
This issue of the National Defense University's William Perry Center for Hemispheric Defense Studies' Security and Defense Studies Review contains the following articles: "Toward an Integral Counter-Organized Crime Strategy in Mexico: Complexities, Asymmetries, and Approaches to an International Security Matter" by José Medina González Dávila; "Symbolic Politics and Democratic Consolidation in Mexico" by Dwight Wilson; "Latin America's Foreign Policy as the Region Engages China" by R. Evan Ellis; "The Challenge of Cybersecurity for the Caribbean: What Are the Policy Options?" by Kevin Newmeyer; (Spanish), "Colaboración para la Lucha Contra Redes Ilícitas a través de Esfuerzos Interdepartamentales e Internacionales" by Celina B. Realuyo; (Portugese), "Análise Exploratória da Securitizacão Militar do Ciberespaço nos EUA, Brasil e Canada" by Gills Lopes, and "The Most Important Cases of the Inter-American Commission on Human Rights" by Richard J. Wilson and Pat Paterson. The issue publishes the following Book Review: (Spanish) "Organización de la Defensa y Control Civil de las Fuerzas Armadas en América Latina" edited by David Pion-Berlin and José Manuel Ugarte.
William J. Perry Center for Hemispheric Defense Studies
2014
-
Strategic Challenges Facing Our Nation - U.S. Coast Guard Perspective
Challenges included in "Strategic Challenges Facing Our Nation - U.S. Coast Guard Perspective" include: Combating Transnational Organized Crime in our Hemisphere; Preserving Sovereignty and Expanding Access and Presence in the Polar Regions; Protecting Critical Infrastructure from all-domain Threats, Including Cyber; Facilitating Maritime Commerce; and Building the 21st Century Coast Guard.
United States. Coast Guard
2016-12-02
-
Serial No. 115-78: Legislative Proposals to Reform the Current Data Security and Breach Notification Regulatory Regime, Hearing Before the Subcommittee on Financial Institutions and Consumer Credit of the Committee on Financial Services, U.S. House of Representatives, One Hundred Fifteenth Congress, Second Session, March 7, 2018
This is the March 7, 2018 hearing on "Legislative Proposals to Reform the Current Data Security and Breach Notification Regulatory Regime," held before the U.S. House of Representatives Subcommittee on Financial Institutions and Consumer Credit of the Committee on Financial Services. From the opening statement of Blaine Luetkemeyer: "Forty-eight States, the District of Columbia, Guam, Puerto Rico, and the Virgin Islands have all enacted differing laws requiring private companies to notify individuals of breaches of personal information. For each State with robust safeguards or requirements in place, there is another with protections that are simply insufficient, creating a labyrinth that causes compliance nightmares while leaving uncertainty or certainty as needed the most, consumer notification. [...] First and foremost, our legislation would create a national security standard for entities that access, maintain, store, or handle personal information, while providing flexibility based on an individual company's size, complexity, and sensitivity of the information it maintains. With a responsible Federal standard in place, companies will no longer have to spend valuable time tracking a maze of regulations. That time can be better spent actually securing the personal information of their customers and innovating to fight against cyber crime. The draft legislation also includes robust law enforcement and consumer notification regimes. A covered entity has the responsibility to conduct an immediate investigation and take responsible measures to restore the compromised system." Statements, letters, and materials submitted for the record include those of the following: Sara Cable, Francis Creighton, Jason Kratovil, and John S. Miller."
United States. Government Publishing Office
2018
-
Russian Interference in the 2016 United States Election, Hearing Before the Subcommittee on Crime and Terrorism of the Committee on the Judiciary, United States Senate, One Hundred Fifteenth Congress, First Session, May 8, 2017
This testimony compilation is from the May 8, 2017 hearing on "Russian Interference in the 2016 United States Election" before the Subcommittee on Crime and Terrorism of the Senate Committee on the Judiciary. The purpose of this hearing was to discuss "three key tactics - cyber espionage, propaganda, and the exploitation of personal or business relationships" that were employed by Russia to attempt to influence the 2016 election. Statements, letters, and materials submitted for the record include those of the following: Sally Q. Yates and James R. Clapper.
United States. Congress. Senate. Committee on the Judiciary
2017-05-08