249,392 research outputs found
Fusing drug enforcement: a study of the El Paso Intelligence Center
This article examines the evolution of the El Paso Intelligence Center (EPIC), a key intelligence component of the Drug Enforcement Administration, to shed light on fusion efforts in drug enforcement. Since 1974, EPIC has strived to fuse the resources and capabilities of multiple government agencies to counter drug trafficking and related threats along the Southwest US border. While undergoing a steady growth, the Center has confronted a host of challenges that illuminate the uses and limits of multi-agency endeavors in drug enforcement. An evaluative study of the Center shows that it is well aligned with the federal government priorities in the realm of drug enforcement; however the extent to which the Center’s activities support the government’s efforts in this domain is not so clear. The Center needs to improve the way it reviews its own performance to better adapt and serve its customers
How U.S. Ocean Policy and Market Power Can Reform the Coral Reef Wildlife Trade
As the world’s largest importer of marine ornamental species for the aquaria, curio, home décor, and jewelry industries, the United States has an opportunity to leverage its considerable market power to promote more sustainable trade and reduce the effects of ornamental trade stress on coral reefs worldwide. Evidence indicates that collection of some coral reef animals for these trades has caused virtual elimination of local populations, major changes in age structure, and promotion of collection practices that destroy reef habitats. Management and enforcement of collection activities in major source countries such as Indonesia and the Philippines remain weak. Strengthening US trade laws and enforcement capabilities combined with increasing consumer and industry demand for responsible conservation can create strong incentives for improving management in source countries. This is particularly important in light of the March 2010 failure of the parties to the Convention on International Trade in Endangered Species (CITES) to take action on key groups of corals
Tradeoff analysis of technology needs for public service helicopters
The design requirements for a family or type of Public Service Helicopter (PSH) is examined which will satisfy the needs of municipal and state governments in the following mission areas: Emergency Medical Service--Airborne Rescue Squad; Law Enforcement; Search and Rescue; and Environmental Control (Fire Fighting, Pollution, Resource Management). The report compares both design and performance requirements as specified by the PSH user's group against current technological capabilities, RTOPS and US Army LHX design requirements. The study explores various design trade-offs and options available to the aircraft designer/manufacturer in order to meet the several criteria specified by the PSH user's group. In addition, the report includes a brief assessment of the feasibility of employing certain advanced rotorcraft designs to meet the stringent combination of operational capabilities desired by the Public Service Helicopter Users
Understanding the role of technology in the commercial sexual exploitation of children: the perspective of law enforcement.
This exploratory study was conducted to better assess how technology can be used in criminal investigations; it is important to get a better understanding of how technology is currently employed in child sex trafficking as well as the approaches and needs of law enforcement. 144 investigators from Internet Crimes Against Children (ICAC) Task Forces and affiliate agencies responded to an online semi‐structured survey, including 45 investigators with experience conducting investigations of the commercial sexual exploitation of children (CSEC) that involved technology. Participants included investigators working in local, county, and state law enforcement agencies in the United States. The discussion suggested a great deal of variation in perspectives and experiences surrounding the problem of CSEC and technology. Investigators were able to highlight both benefits and obstacles. Benefits included the availability of digital evidence instead of relying on personal accounts, the monitoring capabilities of police, and the ability to conduct extensive undercover operations. Obstacles tended to focus on financial concerns, the continual need for training and technical assistance, and the rapidly changing technological environment. Findings highlight the vast complexity and variability in these crimes. There is still quite a bit of the unknown when it comes to investigating CSEC – technology changes rapidly and avenues for marketing and communicating are vast. Continual education, training and technical assistance are central to investigators’ needs in this area
Obligations of trust for privacy and confidentiality in distributed transactions
Purpose – This paper aims to describe a bilateral symmetric approach to authorization, privacy protection and obligation enforcement in distributed transactions. The authors introduce the concept of the obligation of trust (OoT) protocol as a privacy assurance and authorization mechanism that is built upon the XACML standard. The OoT allows two communicating parties to dynamically exchange their privacy and authorization requirements and capabilities, which the authors term a notification of obligation (NoB), as well as their commitments to fulfilling each other's requirements, which the authors term signed acceptance of obligations (SAO). The authors seek to describe some applicability of these concepts and to show how they can be integrated into distributed authorization systems for stricter privacy and confidentiality control.
Design/methodology/approach – Existing access control and privacy protection systems are typically unilateral and provider-centric, in that the enterprise service provider assigns the access rights, makes the access control decisions, and determines the privacy policy. There is no negotiation between the client and the service provider about which access control or privacy policy to use. The authors adopt a symmetric, more user-centric approach to privacy protection and authorization, which treats the client and service provider as peers, in which both can stipulate their requirements and capabilities, and hence negotiate terms which are equally acceptable to both parties.
Findings – The authors demonstrate how the obligation of trust protocol can be used in a number of different scenarios to improve upon the mechanisms that are currently available today.
Practical implications – This approach will serve to increase trust in distributed transactions since each communicating party receives a difficult to repudiate digitally signed acceptance of obligations, in a standard language (XACML), which can be automatically enforced by their respective computing machinery.
Originality/value – The paper adds to current research in trust negotiation, privacy protection and authorization by combining all three together into one set of standardized protocols. Furthermore, by providing hard to repudiate signed acceptance of obligations messages, this strengthens the legal case of the injured party should a dispute arise
Voting in Cartels: Theory and Evidence from the Shipping Industry
We examine the choice of voting rules by legal cartels with enforcement capabilities in the presence of uncertainty about demand and costs. We show that cartels face a trade-off between the commitment advantages of more stringent majority requirements and the loss of flexibility resulting from them. Expected heterogeneity in costs or demand conditions leads away from simple majority toward more stringent rules, while larger membership to the cartel leads away from unanimity toward less restrictive rules. Evidence from the shipping conferences of the late 1950s largely supports our model. With few firms, the rule favored by heterogeneous conferences is unanimity. In larger cartels, the favored rule is either 2/3 or 3/4-majority rule.
Disrupt, Deny, Dismantle: A Special Operations Forces (SOF) Model for Combatting New Terrorism
Terrorism in the new millennium has morphed drastically since the 1970s. The terrorist organizations of today are a hybrid between the insurgent group models of the 1960s and modern terrorist organizations such as Al Qaeda. This hybrid model has created what has become a transnational insurgency recruited, trained, and led by major terrorist networks such as the Islamic State of Iraq and the Levant (ISIL). Even smaller regional groups such as Boko Haram have surpassed merely conducting terrorist attacks. These smaller groups are also focused on controlling territory. Tan (2008) refers to this change as “New Terrorism”. To combat New Terrorism, a combination of counterinsurgency tactics and counterterrorism tactics must be employed. This study will examine the need to define roles and responsibilities for various organization and various echelons through the introduction of a new Special Operations Forces model; Disrupt, Deny, Dismantle. The acronym to be used for this model is D3. This model recommends different tactics, techniques, and procedures for forces not specifically assigned the counterterrorism mission. As new terrorism continues to change, only counterterrorism forces should be tasked with the Find Fix Finish, Exploit, Analyze, and Disseminate (F3EAD) model of targeting (Counterterrorism 2014). All other military and law enforcement elements should disrupt and deny the enemy in support of the counterterrorism effort. This study is based on extensive research and the author’s 23 years of experience serving in U.S. Army Special Forces. Throughout his career, the author interacted with people from various social, economic, and professional backgrounds throughout the Middle East, Africa, and the Balkans
- …
