Posts tagged ‘terrorism’

Defense Department Cyber Efforts: DoD Faces Challenges in Its Cyber Activities

Geographic Differences in the Relative Price of Healthy Foods

by Davi D’Agostino, Greg Wilshusen
Paperback, 79 pages, 2011, $25.00
ISBN: 9781437989281

The DoD is in the midst of a global cyberspace crisis as foreign nation states and other actors, such as hackers, criminals, terrorists, and activists exploit DoD and other U.S. government computer networks to further a variety of national, ideological, and personal objectives.

This report identifies: (1) how DoD is organized to address cybersecurity threats; and assesses the extent to which DoD has: (2) developed joint doctrine that addresses cyberspace oeprations; (3) assigned command and control responsibilities; and (4) identified and taken actions to mitigate any key capability gaps involving cyberspace operations.

It is an unclassified version of a previously issued classified report. Charts and tables. This is a print on demand report.

Purchase this print-on-demand publication for $25.00:

Add to CartE-mail a Friend

August 4, 2011 at 10:00 am Leave a comment

New Government Report: Cybersecurity

Cybersecurity: Continued Attention Needed to Protect Our Nation’s Critical Infrastructure and Federal Information Systems: Congressional Testimony

by Gregory C. Wilshusen
Paperback, 16 pages, 2011, $15.00
ISBN: 1437984398

Discusses the cyber threats to critical infrastructure and the American economy. Pervasive and sustained cyber attacks against the U.S. continue to pose a potentially devastating impact on federal and non-federal systems and operations. In Feb. 2011, the Director of National Intelligence testified that, in the past year, there had been a dramatic increase in malicious cyber activity targeting U.S. computers and networks, including a more than tripling of the volume of malicious software since 2009. This testimony describes: (1) cyber threats to cyber-reliant critical infrastructures and federal information systems; and (2) the continuing challenges federal agencies face in protecting the nation’s cyber-reliant critical infrastructures and federal systems. A print on demand report.

Purchase this print-on-demand publication for $15.00:

Add to CartE-mail a Friend Share This

April 11, 2011 at 11:38 am Leave a comment

New Government Report: Security of Air Cargo During Ground Transportation [Redacted]

Security of Air Cargo During Ground Transportation [Redacted]
by Richard L. Skinner
Paperback, 34 pages, 2009, $20.00
ISBN: 1437930522

“This report addresses the effectiveness of the Transport. Security Admin’s. (TSA) efforts to secure air cargo while it is handled or transported on the ground, prior to being shipped on passenger aircraft. Conclusions: Personnel were accessing, handling, or transporting air cargo without the required background checks or training. Also, 23% of drivers did not satisfy the required training and testing requirements. Automated tools to assist inspectors in analyzing results and focusing on high-risk areas in air cargo security were not adequate. As a result, air cargo is vulnerable to the introduction of explosives and other destructive items before it is loaded onto planes. The report makes six recommendations to strengthen the security of air cargo during ground transportation.”

Purchase this print-on-demand publication for $25.00:

Add to CartE-mail a Friend Share This

October 12, 2010 at 11:45 am Leave a comment

New Government Report: Saudi Arabia: Background and U.S. Relations

Saudi Arabia: Background and U.S. Relations
by Christopher M. Blanchard
Paperback, 51 pages, 2009, $30.00
ISBN: 1437928382

Contents: (I) Recent Developments; (II) Background: Saudi Arabia’s Political Development; Saudi-U.S. Relations, 1931-2001; September 11, 2001, and its Aftermath; The 9/11 Commission Report; Saudi Responses; Recent Assessments; Terrorist Financing Concerns; Toward a New Relationship?; New Bilateral Agreements;

(III) Recent Congressional Interest in Saudi Arabia: U.S. Foreign Assistance to Saudi Arabia and Congressional Prohibitions; International Military Education and Training (IMET); Counterterrorism Assistance; Prohibitions on Foreign Assistance; FY2010 Appropriations Debate; U.S. Arms Sales to Saudi Arabia; Background; Criticism and Action in the 110th Congress; BAE Corruption Inquiry;

(IV) Current Issues in U.S.-Saudi Relations; U.S.-Saudi Military Cooperation: U.S. Military Training Mission in Saudi Arabia (USMTM); Saudi Arabian National Guard Modernization Program (PM-SANG); Office of Program Mgt. Ministry of Interior – Facilities Security Forces (OPM MOI-FSF); Counterterrorism; Al Qaeda in the Arabian Peninsula; Combating Extremism; The Arab-Israeli Conflict; Saudi-Palestinian Relations; Saudi Peace Proposals; Iraq;Saudi Policy Priorities in Iraq; Saudi-Iraqi Diplomatic and Economic Relations; Economic Relations and Trade; U.S.-Saudi Trade; U.S. Oil Imports and Saudi Policy; U.S.-Saudi Foreign Direct Investment; Saudi Boycott of Israel and WTO Membership; Human Rights, Religious Freedom, and Political Reform; Political Reform Debates and Elections; Leadership and Succession; Social Reform Debates and Recent Leadership Changes; Human Rights; Religious Freedom; Consular Issues;

(V) Further Reading and Historical Resources; Appendix A. Recent Proposed Arms Sales; Appendix B. Text of Saudi Peace Initiatives. Figures.

Purchase this print-on-demand publication for $30.00:
Add to CartE-mail a Friend Share This

August 11, 2010 at 7:00 am Leave a comment

New Government Report: Renditions: Constraints Imposed by Laws on Torture

Constraints Imposed by Laws on Torture
by Michael John Garcia
Paperback, 24 pages, 2009, $20.00
ISBN: 1437920632

Persons suspected of criminal or terrorist activity may be transferred from one State (i.e., country) to another for arrest, detention, and/or interrogation. Commonly, this is done through extradition, by which one State surrenders a person within its jurisdiction to a requesting State via a formal legal process, typically established by treaty.

Far less often, such transfers are effectuated through a process known as “extraordinary rendition” or “irregular rendition.” These terms have often been used to refer to the extrajudicial transfer of a person from one State to another. Although the particularities regarding the usage of extraordinary renditions and the legal authority behind such renditions are not publicly available, various U.S. officials have acknowledged the practice’s existence.

During the Bush Admin., there was some controversy as to the usage of renditions by the U.S., particularly with regard to the alleged transfer of suspected terrorists to countries known to employ harsh interrogation techniques that may rise to the level of torture, purportedly with the knowledge or acquiescence of the U.S.

This report discusses relevant international and domestic law restricting the transfer of persons to foreign states for the purpose of torture. The U.N. Convention against Torture and Other Cruel, Inhuman, or Degrading Treatment or Punishment (CAT), and its domestic implementing legislation (the Foreign Affairs Reform and Restructuring Act of 1998) impose the primary legal restrictions on the transfer of persons to countries where they would face torture.

Both CAT and U.S. implementing legislation generally prohibit the rendition of persons to countries in most cases where they would more likely than not be tortured, though there are arguably limited exceptions to this prohibition. Under U.S. regulations implementing CAT, a person may be transferred to a country that provides credible assurances that the rendered person will not be tortured.

Neither CAT nor its implementing legislation prohibit the rendition of persons to countries where they would be subject to harsh treatment not rising to the level of torture. Besides CAT, additional obligations may be imposed upon U.S. rendition practice via the Geneva Conventions, the War Crimes Act (as amended by the Military Commissions Act (P.L. 109-366)), the International Covenant on Civil and Political Rights (ICCPR), and the Universal Declaration on Human Rights.

Purchase this print-on-demand publication for $20.00:
Add to CartE-mail a Friend Share This

August 10, 2010 at 6:00 am Leave a comment

New Government Report: Terrorism in Southeast Asia (ISBN: 9781437925685)

Questioning Supreme Court Nominees About Their Views on Legal or Constitutional Issues: A Recurring Issue (ISBN: 9781437935899)
By Denis Steven Rutkus
(Paperback, 25 pages, 2010, $20.00)

Contents of this report: (I) The Rise of Islamist Militancy in Southeast Asia: Overview; The Rise of Al Qaeda in Southeast Asia; (II) The Jemaah Islamiyah Network: History of Jemaah Islamiyah; Jemaah Islamiyah’s Relationship to Al Qaeda; Jemaah Islamiyah’s Size and Structure; Major Plots; (III) Indonesia: Recent Events; Background; The Bali Bombings and Other JI attacks in Indonesia; The Trial and Release of Baasyir; U.S.-Indonesia Cooperation; (IV) The Philippines: Abu Sayyaf; The MILF; The Philippine Communist Party (CPP); U.S. Support for Philippine Military Operations; (V) Thailand: Southern Insurgency; Approaches of Recent Governments; Current Government’s Approach; Little Evidence of Transnational Elements; Leadership of Insurgency Unclear; U.S.-Thai Cooperation; (VI) Malaysia: Recent Events; A Muslim Voice of Moderation; Maritime Concerns; Terrorism and Counter-Terrorism in Malaysia; Terrorist Groups in Malaysia; Malaysia’s Counter-Terrorism Efforts and Their Critics; U.S.-Malaysia Counter-Terrorism Cooperation; (VII) Singapore: U.S.-Singapore Cooperation; Enhanced Homeland Security. Maps.

Purchase this print-on-demand publication for $25.00:
Add to CartE-mail a Friend Share This

July 15, 2010 at 8:00 am Leave a comment

New Government Report: Cybersecurity: Continued Attention is Needed to Protect Federal Information Systems from Evolving Threats: Congressional Testimony (ISBN: 9781437935073)

Cybersecurity: Continued Attention is Needed to Protect Federal Information Systems from Evolving Threats: Congressional Testimony (ISBN: 9781437935073)
By Gregory C. Wilshusen
(Paperback, 15 pages, 2010, $15)

Pervasive and sustained cyber attacks continue to pose a potentially devastating threat to the systems and operations of the federal government. Many nation states, terrorist networks, and organized criminal groups have the capability to target elements of the U.S. information infrastructure for intelligence collection, intellectual property theft, or disruption. The dependence of federal agencies on information systems to carry out essential, everyday operations can make them vulnerable to an array of cyber-based risks.

This statement describes: (1) cyber threats to federal information systems and cyber-based critical infrastructures; (2) control deficiencies that make federal systems vulnerable to those threats; and (3) opportunities that exist for improving federal cybersecurity.

Purchase this report for $15:Add to CartE-mail a Friend

Tell a Friend

July 2, 2010 at 9:00 am Leave a comment

Older Posts

About Diane Publishing

Diane Publishing is your source for nearly 40,000 hard-to-find books and government reports, catering to readers of all ages. We also distribute the publications of 10 Philadelphia non-profit institutions.

@DianePub Tweets

Enter your e-mail address to subscribe to this blog and be notified of new posts by email.

Join 8 other followers

Share This Blog

Tell a Friend Bookmark and Share