33,296 research outputs found

    The Need for Information Sharing and Analysis Organizations to Combat Attacks on States and Community Public and Private Networks

    Get PDF
    An ever increasing number of attacks are being reported on various city and state computer systems and networks worldwide. These attacks have resulted in the disruption of city operations or the release of personal information. Cities and states need to protect their systems but frequently plans to do so are lacking and the ability to respond to cybersecurity events is non-existent. This is especially true for smaller communities that do not have the budget to hire full-time security personnel or contract for security services. A critical step that states and communities can take is the establishment of a state or community Information Sharing and Analysis Organization (ISAO). This paper will describe how a state or community can use the creation of an ISAO to jumpstart various aspects of its cybersecurity program, incorporating a number of established programs in a single initiative

    Public Good Theory and the 'Added Value' of the EU's Counterterrorism Policy

    Get PDF
    This paper develops a deductive theoretical framework for assessing the EU's added value in the fight against terrorism. The first part argues that public good theory helps to conceptualize objectives of international counterterrorism cooperation and the respective role of international organizations. It critically evaluates existing discussions of security cooperation from this theoretical perspective and sets out a typology of policies according to three aggregation technologies (weaker links, summation, better shot), each of which is linked to a specific set of governance challenges. The second part surveys the EU's counterterrorism efforts on this basis. Weaker link issues - such as the protection of the movement of people, goods and capital - and the related problem of mutual assurance have been quite successfully addressed, even if there is increasing uncertainty over the boundaries of cooperation. In contrast, the EU fell short with regard to joint efforts in the fight against terrorism due to the non-excludable nature of benefits, as in the case of foreign policy, or (partial) rivalry of consumption, as in the case of intelligence sharing or disaster response capacities. Finally, the EU increasingly supports better shot initiatives to develop new instruments and technologies to combat terrorism, but is often overtaken by mini-lateral forms of cooperation.counterterrorism, public good theory, international organisations, European Union

    Fusing drug enforcement: a study of the El Paso Intelligence Center

    Get PDF
    This article examines the evolution of the El Paso Intelligence Center (EPIC), a key intelligence component of the Drug Enforcement Administration, to shed light on fusion efforts in drug enforcement. Since 1974, EPIC has strived to fuse the resources and capabilities of multiple government agencies to counter drug trafficking and related threats along the Southwest US border. While undergoing a steady growth, the Center has confronted a host of challenges that illuminate the uses and limits of multi-agency endeavors in drug enforcement. An evaluative study of the Center shows that it is well aligned with the federal government priorities in the realm of drug enforcement; however the extent to which the Center’s activities support the government’s efforts in this domain is not so clear. The Center needs to improve the way it reviews its own performance to better adapt and serve its customers

    The Critical Challenges from International High-Tech and Computer-Related Crime at the Millennium

    Get PDF
    The automotive industry stands in front of a great challenge, to decrease its impact on the environment. One important part in succeeding with this is to decrease the structural weight of the body structure and by that the fuel consumption or the required battery power. Carbon fibre composites are by many seen as the only real option when traditional engineering materials are running out of potential for further weight reduction. However, the automotive industry lacks experience working with structural composites and the methods for high volume composite manufacturing are immature. The development of a composite automotive body structure, therefore, needs methods to support and guide the conceptual work to improve the financial and technical results. In this thesis a framework is presented which will provide guidelines for the conceptual phase of the development of an automotive body structure. The framework follows two main paths, one to strive for the ideal material diversity, which also defines an initial partition of the body structure based on the process and material selection. Secondly, a further analysis of the structures are made to evaluate if a more cost and weight efficient solution can be found by a more differential design and by that define the ideal part size. In the case and parameter studies performed, different carbon fibre composite material systems and processes are compared and evaluated. The results show that high performance material system with continuous fibres becomes both more cost and performance effective compared to industrialised discontinuous fibre composites. But also that cycle times, sometimes, are less important than a competitive feedstock cost for a manufacturing process. When further analysing the manufacturing design of the structures it is seen that further partition(s) can become cost effective if the size and complexity is large enough.      QC 20140527</p

    What Next? The Quest to Protect Journalists and Human Rights Defenders in a Digital World

    Get PDF
    Around the world, governments and non-state actors are using sophisticated techniques to monitor, threaten, and harass human rights defenders (HRDs) and journalists. The growing use of digital technology has empowered activists to rally citizens around common causes and hold governments accountable, but it has also opened new doors for surveillance and harassment of activists and citizens' activities online. On November 14 -- 15, 2013, Freedom House, funded by the United States Agency for International Development (USAID), held a global conference in Mexico City entitled "What Next? The Quest to Protect Journalists and Human Rights Defenders in a Digital World," which brought together over 60 policymakers, donors, and activists to explore the full range of emerging threats and best strategies to overcome them; take an honest look at what is and is not working; and chart a path forward for more proactive and realistic solutions to build the resilience, sustainability, and relevance of HRDs and their movements. The conference sought to answer "what's next?" by identifying opportunities that can be exploited to build up frontline defenders and their ability to uphold human rights principles fearlessly and strategically at home and abroad

    Improving Information Sharing: Local Fusion Centers and Their Role in the Intelligence Cycle

    Get PDF
    Abstract My Master’s Project focuses on local fusion centers and the need for improved information sharing practices among law enforcement partners. After the tragic event of September 11th in 2001, the Department of Homeland Security and the Department of Justice recognized a communication gap between law enforcement agencies and a lack of effective information sharing efforts. Fusion centers play a significant role in supporting both criminal and terrorist investigations due to their ability to act as a conduit between various law enforcement partners. Due to their important responsibilities as information sharing hubs that provide valuable analysis and dissemination of information and intelligence, it is essential to enhance information practices among the centers. My Master’s Project details a strategy that will assist in advancing information sharing capabilities among local fusion centers to better detect, investigate, mitigate, and avert threats. Specifically, this paper proposes a two-part strategy that entails strengthening current partnerships among fusion centers and law enforcement agencies and developing and implementing a standardized training program for intelligence analysts. Through improved collaborative efforts, fusion centers will be able to better identify, mitigate, and prevent threats to ensure public safety and the security of the country

    Negotiating the 'trading zone'. Creating a shared information infrastructure in the Dutch public safety sector

    Get PDF
    Our main concern in this article is whether nation-wide information technology (IT) infrastructures or systems in emergency response and disaster management are the solution to the communication problems the safety sector suffers from. It has been argued that implementing nation-wide IT systems will help to create shared cognition and situational awareness among relief workers. We put this claim to the test by presenting a case study on the introduction of ‘netcentric work’, an IT system-based platform aiming at the creation of situational awareness for professionals in the safety sector in the Netherlands. The outcome of our research is that the negotiation with relevant stakeholders by the Dutch government has lead to the emergence of several fragmented IT systems. It becomes clear that a top-down implementation strategy for a single nation-wide information system will fail because of the fragmentation of the Dutch safety sector it is supposed to be a solution to. As the US safety sector is at least as fragmented as its Dutch counterpart, this may serve as a caveat for the introduction of similar IT systems in the US

    Law Enforcement Intelligence: Implications for Self-Radicalized Terrorism

    Get PDF
    A series of tragic events over the last three years has further strengthened the emerging preventative and proactive philosophies adopted by US law enforcement post-September 11, 2001. Law enforcement and the American public now have a heightened awareness of homegrown terrorism. While these terrorist actors operate independent of traditional terrorist networks and groups, they are often influenced by such groups through a process where they enter as a non-violent individual and exit as a violent ‘true believer’. Efforts by law enforcement to mitigate or prevent such threats rely on the implementation of intelligence-led policing practices. Central to these practices is the input of raw information into the intelligence cycle. This paper will discuss the importance and application of suspicious activity reporting as it impacts law enforcement intelligence practices to prevent threats from self-radicalized terrorism
    corecore