Sample records for security intelligence agency

  1. 76 FR 62630 - Information Security Regulations

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-10-11

    ... CENTRAL INTELLIGENCE AGENCY 32 CFR Part 1902 Information Security Regulations AGENCY: Central Intelligence Agency. ACTION: Final rule. SUMMARY: The Central Intelligence agency is removing certain information security regulations which have become outdated. The Executive Order upon which the regulations...

  2. 32 CFR 1903.1 - Definitions.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... Defense Other Regulations Relating to National Defense CENTRAL INTELLIGENCE AGENCY CONDUCT ON AGENCY..., leased, or otherwise controlled by the Central Intelligence Agency). Authorized person. An officer of the Security Protective Service, or any other Central Intelligence Agency employee who has been authorized by...

  3. 32 CFR 1903.1 - Definitions.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... Defense Other Regulations Relating to National Defense CENTRAL INTELLIGENCE AGENCY CONDUCT ON AGENCY..., leased, or otherwise controlled by the Central Intelligence Agency). Authorized person. An officer of the Security Protective Service, or any other Central Intelligence Agency employee who has been authorized by...

  4. 32 CFR 1903.1 - Definitions.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... Defense Other Regulations Relating to National Defense CENTRAL INTELLIGENCE AGENCY CONDUCT ON AGENCY..., leased, or otherwise controlled by the Central Intelligence Agency). Authorized person. An officer of the Security Protective Service, or any other Central Intelligence Agency employee who has been authorized by...

  5. 32 CFR 1903.1 - Definitions.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... Defense Other Regulations Relating to National Defense CENTRAL INTELLIGENCE AGENCY CONDUCT ON AGENCY..., leased, or otherwise controlled by the Central Intelligence Agency). Authorized person. An officer of the Security Protective Service, or any other Central Intelligence Agency employee who has been authorized by...

  6. 32 CFR 1903.1 - Definitions.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... Defense Other Regulations Relating to National Defense CENTRAL INTELLIGENCE AGENCY CONDUCT ON AGENCY..., leased, or otherwise controlled by the Central Intelligence Agency). Authorized person. An officer of the Security Protective Service, or any other Central Intelligence Agency employee who has been authorized by...

  7. 5 CFR 733.105 - Permitted political activities-employees who reside in designated localities and are employed in...

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... Investigation; (3) United States Secret Service; (4) Central Intelligence Agency; (5) National Security Council; (6) National Security Agency; (7) Defense Intelligence Agency; (8) Merit Systems Protection Board; (9... Section 733.105 Administrative Personnel OFFICE OF PERSONNEL MANAGEMENT (CONTINUED) CIVIL SERVICE...

  8. 32 CFR 285.2 - Applicability.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ...) National Security Agency/Central Security Service records, unless the records are exempt according to 50 U.S.C. 402. (c) Defense Intelligence Agency, National Reconnaissance Office, and National Geospatial-Intelligence Agency records, unless the records are exempt according to 50 U.S.C. 403-5e, 10 U.S.C. 424 and 455...

  9. 5 CFR 734.401 - Coverage.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... Commission; (2) The Federal Bureau of Investigation; (3) The Secret Service; (4) The Central Intelligence Agency; (5) The National Security Council; (6) The National Security Agency; (7) The Defense Intelligence... Administrative Personnel OFFICE OF PERSONNEL MANAGEMENT (CONTINUED) CIVIL SERVICE REGULATIONS (CONTINUED...

  10. 78 FR 35606 - Privacy Act of 1974; System of Records

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-06-13

    ...; System of Records AGENCY: National Geospatial-Intelligence Agency, DoD. ACTION: Notice to alter a System of Records. SUMMARY: The National Geospatial-Intelligence Agency is altering a system of records in.... FOR FURTHER INFORMATION CONTACT: National Geospatial-Intelligence Agency (NGA), ATTN: Security...

  11. Knowledge Flow Mesh and Its Dynamics: A Decision Support Environment

    DTIC Science & Technology

    2008-06-01

    paper was the ability of the United States military to achieve dominance through information superiority. The use of intelligent sensors and... Intelligence Agency, National Security Agency, Defense Intelligence Agency, and individual Service intelligence agencies). In fact, these edge entities would... intelligence , design, choice, and implementation. 6. Support variety of decision processes and styles. 7. DSS should be adaptable and flexible. 8. DSS

  12. 5 CFR 630.1002 - Definitions.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... Intelligence Agency, the Defense Intelligence Agency, the National Security Agency, the Federal Bureau of... Administrative Personnel OFFICE OF PERSONNEL MANAGEMENT CIVIL SERVICE REGULATIONS ABSENCE AND LEAVE Voluntary... function is the conduct of foreign intelligence or counterintelligence activities. Available paid leave has...

  13. 78 FR 962 - Agency Information Collection Activities

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-01-07

    ... OFFICE OF THE DIRECTOR OF NATIONAL INTELLIGENCE Agency Information Collection Activities AGENCY: Office of the Director of National Intelligence (ODNI). ACTION: Notice. SUMMARY: In December 2011, the... responsibilities assigned to the Director of National Intelligence (DNI) as Security Executive Agent. Accordingly...

  14. 32 CFR 1910.1 - General.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... Other Regulations Relating to National Defense CENTRAL INTELLIGENCE AGENCY DEBARMENT AND SUSPENSION PROCEDURES § 1910.1 General. The Central Intelligence Agency (CIA), in accordance with its authorities under the Central Intelligence Agency Act of 1949, as amended, and the National Security Act of 1947, as...

  15. 32 CFR 1910.1 - General.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... Other Regulations Relating to National Defense CENTRAL INTELLIGENCE AGENCY DEBARMENT AND SUSPENSION PROCEDURES § 1910.1 General. The Central Intelligence Agency (CIA), in accordance with its authorities under the Central Intelligence Agency Act of 1949, as amended, and the National Security Act of 1947, as...

  16. 32 CFR 1910.1 - General.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... Other Regulations Relating to National Defense CENTRAL INTELLIGENCE AGENCY DEBARMENT AND SUSPENSION PROCEDURES § 1910.1 General. The Central Intelligence Agency (CIA), in accordance with its authorities under the Central Intelligence Agency Act of 1949, as amended, and the National Security Act of 1947, as...

  17. 32 CFR 1910.1 - General.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... Other Regulations Relating to National Defense CENTRAL INTELLIGENCE AGENCY DEBARMENT AND SUSPENSION PROCEDURES § 1910.1 General. The Central Intelligence Agency (CIA), in accordance with its authorities under the Central Intelligence Agency Act of 1949, as amended, and the National Security Act of 1947, as...

  18. 32 CFR 1910.1 - General.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... Other Regulations Relating to National Defense CENTRAL INTELLIGENCE AGENCY DEBARMENT AND SUSPENSION PROCEDURES § 1910.1 General. The Central Intelligence Agency (CIA), in accordance with its authorities under the Central Intelligence Agency Act of 1949, as amended, and the National Security Act of 1947, as...

  19. Congress and National Security: Interest, Influence and Speed

    DTIC Science & Technology

    2010-03-01

    impact of these variables in two case studies of security agency organizational reform. The Intelligence Reform and Terrorism Prevention Act of 2004...all the stars in order to move fast on an issue of national security. Instead the positive impact of one or two variables combined with the... impact of these variables in two case studies of security agency organizational reform. The Intelligence Reform and Terrorism Prevention Act of 2004 and

  20. 32 CFR 1906.102 - Application.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... Defense Other Regulations Relating to National Defense CENTRAL INTELLIGENCE AGENCY ENFORCEMENT OF NONDISCRIMINATION ON THE BASIS OF HANDICAP IN PROGRAMS OR ACTIVITIES CONDUCTED BY THE CENTRAL INTELLIGENCE AGENCY... National Security Act of 1947 (50 U.S.C. 402 et seq.), as amended; the Central Intelligence Agency Act of...

  1. 32 CFR 1906.102 - Application.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... Defense Other Regulations Relating to National Defense CENTRAL INTELLIGENCE AGENCY ENFORCEMENT OF NONDISCRIMINATION ON THE BASIS OF HANDICAP IN PROGRAMS OR ACTIVITIES CONDUCTED BY THE CENTRAL INTELLIGENCE AGENCY... National Security Act of 1947 (50 U.S.C. 402 et seq.), as amended; the Central Intelligence Agency Act of...

  2. 78 FR 5504 - Agency Information Collection Activities: Extension of Information Collection; Comment Request

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-01-25

    ... OFFICE OF THE DIRECTOR OF NATIONAL INTELLIGENCE Agency Information Collection Activities: Extension of Information Collection; Comment Request AGENCY: Office of the Director of National Intelligence... Intelligence (DNI) as Security Executive Agent. Accordingly, ODNI is giving public notice regarding extension...

  3. 32 CFR 1906.102 - Application.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... Defense Other Regulations Relating to National Defense CENTRAL INTELLIGENCE AGENCY ENFORCEMENT OF NONDISCRIMINATION ON THE BASIS OF HANDICAP IN PROGRAMS OR ACTIVITIES CONDUCTED BY THE CENTRAL INTELLIGENCE AGENCY... National Security Act of 1947 (50 U.S.C. 402 et seq.), as amended; the Central Intelligence Agency Act of...

  4. 32 CFR 1906.102 - Application.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... Defense Other Regulations Relating to National Defense CENTRAL INTELLIGENCE AGENCY ENFORCEMENT OF NONDISCRIMINATION ON THE BASIS OF HANDICAP IN PROGRAMS OR ACTIVITIES CONDUCTED BY THE CENTRAL INTELLIGENCE AGENCY... National Security Act of 1947 (50 U.S.C. 402 et seq.), as amended; the Central Intelligence Agency Act of...

  5. 32 CFR 1906.102 - Application.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... Defense Other Regulations Relating to National Defense CENTRAL INTELLIGENCE AGENCY ENFORCEMENT OF NONDISCRIMINATION ON THE BASIS OF HANDICAP IN PROGRAMS OR ACTIVITIES CONDUCTED BY THE CENTRAL INTELLIGENCE AGENCY... National Security Act of 1947 (50 U.S.C. 402 et seq.), as amended; the Central Intelligence Agency Act of...

  6. 32 CFR 1907.03 - Contact for general information and requests.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ..., Agency Release Panel, Central Intelligence Agency, Washington, DC 20505. The commercial (non-secure... INTELLIGENCE AGENCY CHALLENGES TO CLASSIFICATION OF DOCUMENTS BY AUTHORIZED HOLDERS PURSUANT TO § 1.9 OF...

  7. 5 CFR 9.1 - Definition.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... Code, but does not include the Federal Bureau of Investigation, the Central Intelligence Agency, the Defense Intelligence Agency, the National Imagery and Mapping Agency, the National Security Agency, and... Administrative Personnel OFFICE OF PERSONNEL MANAGEMENT CIVIL SERVICE RULES WORKFORCE INFORMATION (RULE IX) § 9.1...

  8. 32 CFR Appendix F to Part 286 - DoD Freedom of Information Act Program Components

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... Defense Information Systems Agency Defense Contract Audit Agency Defense Intelligence Agency Defense Security Service Defense Logistics Agency National Imagery and Mapping Agency Defense Special Weapons Agency National Security Agency Office of the Inspector General, Department of Defense Defense Finance...

  9. A Study of Security Awareness Information Delivery within the Defense Intelligence Community

    ERIC Educational Resources Information Center

    Krasley, Paul F.

    2011-01-01

    Due to limited resources and inconsistent guidance from the U.S. Federal Government, Department of Defense, and multiple environments within the intelligence community, the defense intelligence agencies each developed their own methods to deliver security awareness information. These multiple delivery methods may be providing different levels of…

  10. 14 CFR 1203.603 - Systematic review for declassification.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... National Security Agency. (3) Systematic review for declassification of classified information pertaining... coordinated through the Central Intelligence Agency. (4) The Chairperson, NASA Information Security Program... guidelines. The Chairperson, NASA Information Security Program Committee, shall develop, in coordination with...

  11. 77 FR 47767 - Privacy Act of 1974: Implementation of Exemptions; Department of Homeland Security U.S. Customs...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-08-10

    ... Protection, DHS/CBP--017 Analytical Framework for Intelligence (AFI) System of Records AGENCY: Privacy Office... Homeland Security/U.S. Customs and Border Protection, DHS/CBP--017 Analytical Framework for Intelligence... Analytical Framework for Intelligence (AFI) System of Records'' from one or more provisions of the Privacy...

  12. Impacts of psychological science on national security agencies post-9/11.

    PubMed

    Brandon, Susan E

    2011-09-01

    Psychologists have been an integral part of national security agencies since World War I, when psychological science helped in personnel selection. A robust infrastructure supporting wider applications of psychology to military and intelligence problems developed further during World War II and the years following, primarily in the areas of testing, human factors, perception, and the decision sciences. Although the nature of the attacks on 9/11 raised the level of perceived need for increased human-based intelligence, the impacts of psychologists on the policies and practices of national security agencies in the decade since have not increased significantly. © 2011 American Psychological Association

  13. 78 FR 55270 - Privacy Act of 1974; Department of Homeland Security Transportation Security Administration-DHS...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-09-10

    ... subsection (a) to add records containing the results from TSA's intelligence-driven risk- based analysis of... information. 49 CFR Sec. 1560. \\1\\ 77 FR 69491 (Nov. 19, 2012). Under sec. 4012(a)(1)-(2) of the Intelligence... the Central Intelligence Agency, the Secretary of the Treasury, and the Secretary of Defense. The...

  14. Bringing the National Security Agency into the Classroom: Ethical Reflections on Academia-Intelligence Agency Partnerships.

    PubMed

    Kampe, Christopher; Reid, Gwendolynne; Jones, Paul; S, Colleen; S, Sean; Vogel, Kathleen M

    2018-01-09

    Academia-intelligence agency collaborations are on the rise for a variety of reasons. These can take many forms, one of which is in the classroom, using students to stand in for intelligence analysts. Classrooms, however, are ethically complex spaces, with students considered vulnerable populations, and become even more complex when layering multiple goals, activities, tools, and stakeholders over those traditionally present. This does not necessarily mean one must shy away from academia-intelligence agency partnerships in classrooms, but that these must be conducted carefully and reflexively. This paper hopes to contribute to this conversation by describing one purposeful classroom encounter that occurred between a professor, students, and intelligence practitioners in the fall of 2015 at North Carolina State University: an experiment conducted as part of a graduate-level political science class that involved students working with a prototype analytic technology, a type of participatory sensing/self-tracking device, developed by the National Security Agency. This experiment opened up the following questions that this paper will explore: What social, ethical, and pedagogical considerations arise with the deployment of a prototype intelligence technology in the college classroom, and how can they be addressed? How can academia-intelligence agency collaboration in the classroom be conducted in ways that provide benefits to all parties, while minimizing disruptions and negative consequences? This paper will discuss the experimental findings in the context of ethical perspectives involved in values in design and participatory/self-tracking data practices, and discuss lessons learned for the ethics of future academia-intelligence agency partnerships in the classroom.

  15. 77 FR 37004 - Privacy Act of 1974; System of Records

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-06-20

    ...-Intelligence Agency (NGA), ATTN: Security Specialist, Mission Support, MSRS P-12, 7500 GEOINT Drive..., Alternate OSD Federal Register Liaison Officer, Department of Defense. NGA-005 System name: National... maintained at National Geospatial-Intelligence Agency (NGA) Headquarters in Washington, DC metro area...

  16. 78 FR 43868 - Privacy Act of 1974; System of Records; Correction

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-07-22

    ... notice altering a Privacy Act System of Records notice (NGA-013, National Geospatial-Intelligence Agency (NGA) Inspector General Investigative and Complaint Files). Subsequent to the publication of that... omission. FOR FURTHER INFORMATION CONTACT: National Geospatial-Intelligence Agency (NGA), ATTN: Security...

  17. Life of an Idea: DLIFLC Annual Program Review.

    ERIC Educational Resources Information Center

    Woytak, Lidia

    1999-01-01

    Discusses the Defense Language Institute's Foreign Language Center's (DLIFLC) annual program review. Representatives from the Army, Air Force, Marine Corps, HQ TRADOC, National Security Agency, Defense Intelligence Agency, and the Office of the Assistant Secretary of Defense for Command, Control, Communication, and Intelligence met to discuss…

  18. 32 CFR 1900.01 - Authority and purpose.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 32 National Defense 6 2011-07-01 2011-07-01 false Authority and purpose. 1900.01 Section 1900.01 National Defense Other Regulations Relating to National Defense CENTRAL INTELLIGENCE AGENCY PUBLIC ACCESS... National Security Act of 1947, as amended (50 U.S.C. 403); and sec. 6 of the Central Intelligence Agency...

  19. 32 CFR 1900.01 - Authority and purpose.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 32 National Defense 6 2013-07-01 2013-07-01 false Authority and purpose. 1900.01 Section 1900.01 National Defense Other Regulations Relating to National Defense CENTRAL INTELLIGENCE AGENCY PUBLIC ACCESS... National Security Act of 1947, as amended (50 U.S.C. 403); and sec. 6 of the Central Intelligence Agency...

  20. 32 CFR 1900.01 - Authority and purpose.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 32 National Defense 6 2010-07-01 2010-07-01 false Authority and purpose. 1900.01 Section 1900.01 National Defense Other Regulations Relating to National Defense CENTRAL INTELLIGENCE AGENCY PUBLIC ACCESS... National Security Act of 1947, as amended (50 U.S.C. 403); and sec. 6 of the Central Intelligence Agency...

  1. 32 CFR 154.14 - Civilian employment.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... intelligence and security agencies with respect to granting security clearances in an expeditious manner under... National Defense Department of Defense OFFICE OF THE SECRETARY OF DEFENSE SECURITY DEPARTMENT OF DEFENSE PERSONNEL SECURITY PROGRAM REGULATION Personnel Security Investigative Requirements § 154.14 Civilian...

  2. 77 FR 56625 - Privacy Act of 1974; Systems of Records

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-09-13

    ... Internet at http://www.regulations.gov as they are received without change, including any personal.... George G. Meade, MD 20755-6000. Decentralized segments: Defense Intelligence Agency (DIA) Headquarters... decentralized system locations, write to the National Security Agency/Central Security Service, Freedom of...

  3. The Information Edge: Imagery Intelligence and Geospatial Information in an Evolving National Security Environment

    DTIC Science & Technology

    2000-12-01

    8. PERFORMING ORGANIZATION REPORT NUMBER 9. SPONSORING/MONITORING AGENCY NAME(S) AND ADDRESS(ES) 10 . SPONSOR/MONITOR’S ACRONYM(S) 11. SPONSOR...Activities................................................................................ 48 10 . NIMA and Its Suppliers...Agency (DIA), the National Reconnaissance Office (NRO), the Defense Airborne Reconnaissance Office (DARO), and the Central Intelligence Agency” ibid. 10

  4. 360 PORT MDA - A Strategy to Improve Port Security

    DTIC Science & Technology

    2006-09-01

    Participating Agencies (After: Executive Briefing..........................27 Table 6. Designated Joint Operations Center Participants (From: SAFE...Investigations CGIP Coast Guard Intelligence Program CHOC Charleston Harbor Operations Center CIO Command Intelligence Officer CMT Combating Maritime... EXECUTIVE SUMMARY Ports are critical to our economy and national security. Key hubs in the international trade network, U.S. ports accounted for more than

  5. Intelligence Community Spending: Trends and Issues

    DTIC Science & Technology

    2016-11-08

    who provide financial and economic expertise. Financial intelligence analysts focus on terrorist financing, counterfeiting, money laundering , funds...but also agreed that disclosure of numbers below the topline could cause damage to national security. It recommended that the amount of money spent...associated with intelligence spending. How Much is Enough? America’s intelligence agencies may spend more money on gathering and disseminating intelligence

  6. Impacts of Psychological Science on National Security Agencies Post-9/11

    ERIC Educational Resources Information Center

    Brandon, Susan E.

    2011-01-01

    Psychologists have been an integral part of national security agencies since World War I, when psychological science helped in personnel selection. A robust infrastructure supporting wider applications of psychology to military and intelligence problems developed further during World War II and the years following, primarily in the areas of…

  7. 32 CFR 154.2 - Applicability.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... , Director of Central Intelligence Directive (DCID) 1/14 2 and regulations of the National Security Agency. 1... Defense Department of Defense OFFICE OF THE SECRETARY OF DEFENSE SECURITY DEPARTMENT OF DEFENSE PERSONNEL SECURITY PROGRAM REGULATION General Provisions § 154.2 Applicability. (a) This part implements the...

  8. The Curious National Security Pendulum: Openness and/or Censorship.

    ERIC Educational Resources Information Center

    Marwick, Christine M.

    1979-01-01

    Lawsuits illustrate the increasing concern over national security in regulating the security classification system, and government attitudes toward information have shifted from secrecy to openness to censorship. The Central Intelligence Agency's suppression of unclassified printed information is a case in point. (SW)

  9. 75 FR 11940 - Office of the Chief Human Capital Officer; Information Collection; Ancestry and Ethnicity Data...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-03-12

    ... OFFICE OF THE DIRECTOR OF NATIONAL INTELLIGENCE [OMB Control No.-3440-NEW] Office of the Chief... Intelligence (ODNI). ACTION: Information Collection Activities: Proposed Collection; Comment Request--30 Day... procedures for use by the Intelligence Community agencies and elements, as defined by the National Security...

  10. 77 FR 33683 - Privacy Act of 1974: Implementation of Exemptions; Department of Homeland Security, U.S. Customs...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-06-07

    ... Border Protection, DHS/CBP--017 Analytical Framework for Intelligence (AFI) System of Records AGENCY... Framework for Intelligence (AFI) System of Records'' and this proposed rulemaking. In this proposed... Protection, DHS/CBP--017 Analytical Framework for Intelligence (AFI) System of Records.'' AFI enhances DHS's...

  11. 49 CFR 1012.6 - Petitions seeking to open or close a meeting.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... confidential investigation agency or a national security intelligence agency; (v) disclose investigative... business at the meeting, in which case the decision will be communicated to the petitioner orally through...

  12. Fifty Years of Silent Service: A Peek Inside the CIA Library.

    ERIC Educational Resources Information Center

    Newlen, Robert R.

    1998-01-01

    Describes the CIA (Central Intelligence Agency) library. Highlights include security measures, a day in the life of two CIA librarians, sample reference questions, collection development, the Historical Intelligence Collection, the CIA Web site, and library modernization. (JAK)

  13. 32 CFR 1901.61 - Purpose and authority.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... and security suitability investigations (or promotion material in the case of the armed services... National Defense Other Regulations Relating to National Defense CENTRAL INTELLIGENCE AGENCY PUBLIC RIGHTS... Central Intelligence has determined to exempt from the procedures established by this regulation and from...

  14. Security During Nigeria’s 2015 National Elections: What Should We Expect From the Police?

    DTIC Science & Technology

    2015-03-01

    of Transition Initiatives PDP Peoples Democratic Party PSC Police Service Commission SSS State Security Service USAID United States Agency for...enforcement powers. State Security Service ( SSS ) The SSS , Nigeria’s internal intelligence agency, was established by military decree in 1986, although...its origins can be traced to the colonial-era police Special Branch. The remit of the SSS is considerable and includes the prevention, detection, and

  15. Domestic Trends in the United States, China, and Iran. Implications for U.S. Navy Strategic Planning

    DTIC Science & Technology

    2008-01-01

    ABUSE TERRORISM AND HOMELAND SECURITY TRANSPORTATION AND INFRASTRUCTURE WORKFORCE AND WORKPLACE The RAND Corporation is a nonprofit research...Marine Corps, the defense agencies, and the defense Intelligence Community under Contract W74V8H-06-C-0002. iii Preface This book examines the future... Intelligence Community. For more information on RAND’s International Security and Defense Policy Center, contact the Director, James Dobbins. He can be

  16. 5 CFR 340.101 - Principal statutory requirements.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ...) the Federal Bureau of Investigation, Department of Justice; “(vii) the Central Intelligence Agency; and “(viii) the National Security Agency, Department of Defense; and “(2) ‘part-time career employment...’ means— “(A) an Executive agency; “(B) a military department; “(C) an agency in the judicial branch; “(D...

  17. 5 CFR 340.101 - Principal statutory requirements.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ...) the Federal Bureau of Investigation, Department of Justice; “(vii) the Central Intelligence Agency; and “(viii) the National Security Agency, Department of Defense; and “(2) ‘part-time career employment...’ means— “(A) an Executive agency; “(B) a military department; “(C) an agency in the judicial branch; “(D...

  18. 5 CFR 340.101 - Principal statutory requirements.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ...) the Federal Bureau of Investigation, Department of Justice; “(vii) the Central Intelligence Agency; and “(viii) the National Security Agency, Department of Defense; and “(2) ‘part-time career employment...’ means— “(A) an Executive agency; “(B) a military department; “(C) an agency in the judicial branch; “(D...

  19. 5 CFR 340.101 - Principal statutory requirements.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ...) the Federal Bureau of Investigation, Department of Justice; “(vii) the Central Intelligence Agency; and “(viii) the National Security Agency, Department of Defense; and “(2) ‘part-time career employment...’ means— “(A) an Executive agency; “(B) a military department; “(C) an agency in the judicial branch; “(D...

  20. Campaign 2008: Innovative Ideas for Securing America. A Guide for Candidates

    DTIC Science & Technology

    2008-09-03

    leadership to the Intelligence Community on “ cloak and dagger ” intelligence operations issues but is less involved in addressing key challenges in the day...that allow people in our intelligence agencies to do their jobs. “ Cloak and dagger ” issues typically garner public and media attention, but without...can we prevent future attacks by strengthening U.S. intelligence op- erations, tracking terrorist financing and preventing weapons of mass destruction

  1. 32 CFR 99.3 - General definitions.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... Defense Department of Defense OFFICE OF THE SECRETARY OF DEFENSE PERSONNEL, MILITARY AND CIVILIAN... justice. Department of Defense: the Defense Investigative Service, National Security Agency, Naval.... Federal agency: the Department of Defense, the Office of Personnel Management, or the Central Intelligence...

  2. 32 CFR 99.3 - General definitions.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... Defense Department of Defense OFFICE OF THE SECRETARY OF DEFENSE PERSONNEL, MILITARY AND CIVILIAN... justice. Department of Defense: the Defense Investigative Service, National Security Agency, Naval.... Federal agency: the Department of Defense, the Office of Personnel Management, or the Central Intelligence...

  3. 32 CFR 99.3 - General definitions.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... Defense Department of Defense OFFICE OF THE SECRETARY OF DEFENSE PERSONNEL, MILITARY AND CIVILIAN... justice. Department of Defense: the Defense Investigative Service, National Security Agency, Naval.... Federal agency: the Department of Defense, the Office of Personnel Management, or the Central Intelligence...

  4. 32 CFR 99.3 - General definitions.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... Defense Department of Defense OFFICE OF THE SECRETARY OF DEFENSE PERSONNEL, MILITARY AND CIVILIAN... justice. Department of Defense: the Defense Investigative Service, National Security Agency, Naval.... Federal agency: the Department of Defense, the Office of Personnel Management, or the Central Intelligence...

  5. 32 CFR 99.3 - General definitions.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... Defense Department of Defense OFFICE OF THE SECRETARY OF DEFENSE PERSONNEL, MILITARY AND CIVILIAN... justice. Department of Defense: the Defense Investigative Service, National Security Agency, Naval.... Federal agency: the Department of Defense, the Office of Personnel Management, or the Central Intelligence...

  6. 44 CFR 18.600 - Semi-annual compilation.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... OF HOMELAND SECURITY GENERAL NEW RESTRICTIONS ON LOBBYING Agency Reports § 18.600 Semi-annual... after receipt of the report by the Secretary and the Clerk. (c) Information that involves intelligence matters shall be reported only to the Select Committee on Intelligence of the Senate, the Permanent Select...

  7. Australian Defense.

    DTIC Science & Technology

    1979-12-01

    the Joint Intelligence Organization ( JIO ) came into existence. It was only an analysis and information agency and did not collect intelligence. It was...34to provide expert technical analysis and the best kind of judgment on kinds of security problems that might arise." 3 The JIO brought sections of the... JIO char er detailed its function of intelligence assessments "on military, economic, scientific, and technical matters affecting Australia’s defence

  8. 12 CFR 4.12 - Information available under the FOIA.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... commercial or financial information, furnished in confidence, that relates to the business, personal, or... commercial information); (5) An intra-agency or interagency memorandum or letter not routinely available by... an agency conducting a lawful national security intelligence investigation; (vi) Disclose techniques...

  9. 10 CFR 9.104 - Closed meetings.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... an agency conducting a lawful national security intelligence investigation, confidential information... knowledge of which could substantially affect the outcome or conduct of pending or reasonably anticipated...

  10. 10 CFR 9.104 - Closed meetings.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... an agency conducting a lawful national security intelligence investigation, confidential information... knowledge of which could substantially affect the outcome or conduct of pending or reasonably anticipated...

  11. 10 CFR 9.104 - Closed meetings.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... an agency conducting a lawful national security intelligence investigation, confidential information... knowledge of which could substantially affect the outcome or conduct of pending or reasonably anticipated...

  12. 10 CFR 9.104 - Closed meetings.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... an agency conducting a lawful national security intelligence investigation, confidential information... knowledge of which could substantially affect the outcome or conduct of pending or reasonably anticipated...

  13. An Overview of the United States Intelligence Community

    DTIC Science & Technology

    2007-01-01

    PROGRAM ELEMENT NUMBER 6. AUTHOR(S) 5d. PROJECT NUMBER 5e. TASK NUMBER 5f. WORK UNIT NUMBER 7. PERFORMING ORGANIZATION NAME(S) AND ADDRESS(ES...Office of the Director of National Intelligence,Washington,DC,20511 8. PERFORMING ORGANIZATION REPORT NUMBER 9. SPONSORING/MONITORING AGENCY NAME(S...based on budget proposals provided by IC component organizations . ü Oversee coordination of relationships with the intelligence or security services

  14. A Domestic Intelligence Agency for the United States? A Comparative Analysis of Domestic Intelligence Agencies and Their Implications for Homeland Security

    DTIC Science & Technology

    2007-06-01

    cooperate with everybody, bilaterally, regionally, at the global level, in the fight against terror.”70 Manmoham Singh , Prime Minister of India...As Swati Pandey states: For a counterterrorism law, lawmakers should consider the state’s police capabilities, the legal system, and the political...Enemy Within, 50. 70 Manmoham Singh , “Interview of Prime Minister Dr. Manmoham Singh ,” interview by Charlie Rose, Charlie Rose Show (21 September

  15. 77 FR 69491 - Privacy Act of 1974: System of Records; Secure Flight Records

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-11-19

    ... page at http://www.regulations.gov ; (2) Accessing the Government Printing Office's Web page at http...) of the Intelligence Reform and Terrorism Prevention Act of 2004 (IRTPA),\\4\\ Congress directed TSA and... Intelligence Agency, the Secretary of the Treasury, and the Secretary of Defense. The Attorney General, acting...

  16. 7 CFR 1409.4 - Exemptions.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... refers to particular types of matters to be withheld; (4) Disclose trade secrets and commercial or... a criminal investigation, or by an agency conducting a lawful national security intelligence...

  17. 2015 Annual Report on Security Clearance Determinations

    DTIC Science & Technology

    2016-06-28

    completed or pending security clearance determinations for government employees and contractors during the preceding fiscal year that have taken longer...each level during the preceding fiscal year. Similar data pertaining to USG contractors is also required. Also, for each element of the Intelligence...for USG Employees and USG Contractors Security Clearance Determination Processing Metrics for the Seven IC Agencies The number of individuals

  18. 12 CFR 604.420 - Exemptive provisions.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... types of matters to be withheld; (d) Disclose trade secrets and privileged or confidential commercial or... investigation, or by an agency conducting a lawful national security intelligence investigation, confidential...

  19. 36 CFR 1007.2 - Records available.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ...) Trade secrets and commercial or financial information obtained from a person and privileged or... course of a criminal investigation, or by an agency conducting a lawful national security intelligence...

  20. 29 CFR 2203.3 - Public attendance at Commission meetings.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    .... (a) Policy. Commissioners will not jointly conduct or dispose of official Commission business in a... criminal investigation, or by an agency conducting a lawful national security intelligence investigation...

  1. Looming Discontinuities in U.S. Military Strategy and Defense Planning: Colliding RMAs Necessitate a New Strategy

    DTIC Science & Technology

    2011-01-01

    CARE INFRASTRUCTURE AND TRANSPORTATION INTERNATIONAL AFFAIRS LAW AND BUSINESS NATIONAL SECURITY POPULATION AND AGING PUBLIC SAFETY SCIENCE AND...research was conducted within the International Security and Defense Policy Center of the RAND National Defense Research Institute, a federally funded...Marine Corps, the defense agencies, and the defense Intelligence Community. For more information on the International Security and Defense Policy

  2. Biological Weapons -- Still a Relevant Threat

    DTIC Science & Technology

    2012-03-22

    destruction in general, and biological weapons in particular. The IHS Janes: Defence and Security Intelligence & Analysis website notes that a number of...responder capabilities, and intelligence agency inputs. There needs, as well, to be continued research and development of sensor technologies, which...Mass Destruction – Radiological, Chemical and Biological,‖ 109 10 Mark, J. Carson; Taylor, Theodore; Eyster, Eugene; Maraman, William; Wechsler

  3. Identifying Enemies Among Us: Evolving Terrorist Threats and the Continuing Challenges of Domestic Intelligence Collection and Information Sharing

    DTIC Science & Technology

    2014-01-01

    the Los Angeles Police Department ( LAPD ) and the FBI recently negotiated an agreement increasing...Coordination Group JTTF Joint Terrorism Task Force LAPD Los Angeles Police Department NCTC National Counterterrorism Center NSA National Security Agency WMD...Agency (CIA), the Department of Defense (DoD), state and local law enforcement agencies, first-responder organizations, and state- level

  4. 49 CFR 1012.7 - Meetings which may be closed to the public.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... withholding or refers to particular types of matters to be withheld. (4) Disclose trade secrets or commercial... criminal investigation, or by an agency conducting a lawful national security intelligence investigation...

  5. 32 CFR 1907.26 - Notification of decision and prohibition on adverse action.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... made to the Interagency Security Classification Appeals Panel (ISCAP) established pursuant to § 5.4 of... CENTRAL INTELLIGENCE AGENCY CHALLENGES TO CLASSIFICATION OF DOCUMENTS BY AUTHORIZED HOLDERS PURSUANT TO Â...

  6. 32 CFR 1907.26 - Notification of decision and prohibition on adverse action.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... made to the Interagency Security Classification Appeals Panel (ISCAP) established pursuant to § 5.4 of... CENTRAL INTELLIGENCE AGENCY CHALLENGES TO CLASSIFICATION OF DOCUMENTS BY AUTHORIZED HOLDERS PURSUANT TO Â...

  7. To require the Director of the National Security Agency and the Inspector General of the National Security Agency to be appointed by the President, by and with the advice and consent of the Senate, and for other purposes.

    THOMAS, 113th Congress

    Rep. Sanford, Mark [R-SC-1

    2013-10-30

    House - 10/30/2013 Referred to the Committee on Intelligence (Permanent Select), and in addition to the Committee on Oversight and Government Reform, for a period to be subsequently determined by the Speaker, in each case for consideration of such provisions as fall within the... (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  8. Overview of Climate Confluence Security Issues

    NASA Astrophysics Data System (ADS)

    Reisman, J. P.

    2011-12-01

    Presentation will focus on an overview of the security perspectives based on the confluence considerations including energy, economics and climate change. This will include perspectives from reports generated by the Quadrennial Defense Review, Joint Forces Command, the Center for Strategic International Studies, MIT, the Inter-agency Climate Change Adaptation Task Force, the Central Intelligence Agency, the Center for Naval Analysis, and other relevant reports. The presentation will highlight the connections between resource issues and climate change which can be interpreted into security concerns. General discussion of global issues, contextual review of AR4 WGII may be included and any other report updates as applicable. The purpose of this presentation is to give a rounded view of the general qualitative and quantitative perspectives regarding climate related security considerations.

  9. 44 CFR 5.71 - Categories of records exempt from disclosure under 5 U.S.C. 552.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ...) Trade secrets and commercial or financial information obtained from a person and privileged or... course of a criminal investigation, or by an agency conducting a lawful national security intelligence...

  10. 36 CFR 1275.52 - Restriction of materials of general historical significance unrelated to abuses of governmental...

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ..., when the release of these materials would: (1) Disclose trade secrets and commercial or financial... of a criminal investigation or by an agency conducting a lawful national security intelligence...

  11. 40 CFR 11.4 - Definitions.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 40 Protection of Environment 1 2011-07-01 2011-07-01 false Definitions. 11.4 Section 11.4 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY GENERAL SECURITY CLASSIFICATION REGULATIONS... revelation of sensitive intelligence operations; and the disclosure of scientific or technological...

  12. 40 CFR 11.4 - Definitions.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 40 Protection of Environment 1 2013-07-01 2013-07-01 false Definitions. 11.4 Section 11.4 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY GENERAL SECURITY CLASSIFICATION REGULATIONS... revelation of sensitive intelligence operations; and the disclosure of scientific or technological...

  13. 40 CFR 11.4 - Definitions.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 40 Protection of Environment 1 2014-07-01 2014-07-01 false Definitions. 11.4 Section 11.4 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY GENERAL SECURITY CLASSIFICATION REGULATIONS... revelation of sensitive intelligence operations; and the disclosure of scientific or technological...

  14. 40 CFR 11.4 - Definitions.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 40 Protection of Environment 1 2012-07-01 2012-07-01 false Definitions. 11.4 Section 11.4 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY GENERAL SECURITY CLASSIFICATION REGULATIONS... revelation of sensitive intelligence operations; and the disclosure of scientific or technological...

  15. 42 CFR 73.10 - Restricting access to select agents and toxins; security risk assessments.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... AND HUMAN SERVICES QUARANTINE, INSPECTION, LICENSING SELECT AGENTS AND TOXINS § 73.10 Restricting... or intelligence agency of committing a crime specified in 18 U.S.C. 2332b(g)(5), knowing involvement...

  16. 39 CFR 7.3 - Exceptions.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... and commercial or financial information obtained from a person and privileged or confidential, such as... related to postal mechanization, or commercial information related to purchases of real estate; (e... investigation, or by an agency conducting a lawful national security intelligence investigation, confidential...

  17. Study of the Military Intelligence Support to Domestic Law Enforcement in Counterdrug and Counterterrorism Operations

    DTIC Science & Technology

    2012-06-08

    havens–Southwest Asia, the Horn of Africa, Southeast Asia, and Latin America . This data is collected in military intelligence databases and accessible to...National Security Agency ONDCP Office of National Drug Control Policy ORA Organization Risk Analyzer REMBASS Remotely Monitored Battlefield...The Crime Drop in America .”4 Law enforcement officials the author talked with stated this is a limitation in that police officers remain reactive to

  18. 32 CFR 2004.22 - Operational Responsibilities [202(a)].

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ...; (3) Sign agreements with the Department of Defense as the Executive Agent for industrial security services; and, (4) Ensure applicable department and agency personnel having NISP implementation... of the Director of National Intelligence (ODNI) for Sensitive Compartmented Information, and DOE for...

  19. 32 CFR 1902.13 - Declassification and downgrading policy.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 32 National Defense 6 2011-07-01 2011-07-01 false Declassification and downgrading policy. 1902.13 Section 1902.13 National Defense Other Regulations Relating to National Defense CENTRAL INTELLIGENCE AGENCY INFORMATION SECURITY REGULATIONS Declassification and Downgrading § 1902.13 Declassification and...

  20. 32 CFR 1902.13 - Declassification and downgrading policy.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 32 National Defense 6 2010-07-01 2010-07-01 false Declassification and downgrading policy. 1902.13 Section 1902.13 National Defense Other Regulations Relating to National Defense CENTRAL INTELLIGENCE AGENCY INFORMATION SECURITY REGULATIONS Declassification and Downgrading § 1902.13 Declassification and...

  1. 44 CFR 334.2 - Policy.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... information developed by the intelligence community and policy statements of the President. (d) Emergency... made on the economy in a full range of possible national security emergencies. Similarly, DOD planning... and agencies and with state and local governments and, therefore, is responsible for developing a...

  2. 39 CFR 7.3 - Exceptions.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... and commercial or financial information obtained from a person and privileged or confidential, such as... unwarranted invasion of personal privacy, (4) Disclose the identity of a confidential source and, in the case... investigation, or by an agency conducting a lawful national security intelligence investigation, confidential...

  3. 39 CFR 7.3 - Exceptions.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... and commercial or financial information obtained from a person and privileged or confidential, such as... unwarranted invasion of personal privacy, (4) Disclose the identity of a confidential source and, in the case... investigation, or by an agency conducting a lawful national security intelligence investigation, confidential...

  4. 39 CFR 7.3 - Exceptions.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... and commercial or financial information obtained from a person and privileged or confidential, such as... unwarranted invasion of personal privacy, (4) Disclose the identity of a confidential source and, in the case... investigation, or by an agency conducting a lawful national security intelligence investigation, confidential...

  5. 39 CFR 7.3 - Exceptions.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... and commercial or financial information obtained from a person and privileged or confidential, such as... unwarranted invasion of personal privacy, (4) Disclose the identity of a confidential source and, in the case... investigation, or by an agency conducting a lawful national security intelligence investigation, confidential...

  6. Annual Report to Congress on Foreign Economic Collection and Industrial Espionage - 2004

    DTIC Science & Technology

    2005-04-01

    Administration ( DTSA ) • Department of Energy (DOE) • Department of Justice (DOJ) • Department of State, including the Bureau of Intelligence and...Threat Reduction Agency DTSA Defense Technology Security Administration EAR Export Administration Regulations 18 EEA Economic Espionage Act of 1996

  7. 45 CFR 2507.10 - What records are specifically exempt from disclosure?

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... exempted from disclosure by statute. (d) Information of a commercial or financial nature including trade secrets given in confidence. Included in this category are records containing commercial or financial... criminal investigation, or by an agency conducting a lawful security intelligence investigation...

  8. Mapping the Risks. Assessing the Homeland Security Implications of Publicly Available Geospatial Information

    DTIC Science & Technology

    2004-01-01

    Defense Nuclear Facilities Safety Board 1 0.2 Export-Import Bank 1 0.2 National Archives and Records Administration 1 0.2 Supreme Court of the United...Agency Commodity Futures Trading Commission Consumer Product Safety Commission Defense Nuclear Facilities Safety Board Environmental Protection Agency...Intelligence www.cia.gov Defense Nuclear Facilities Safety Board Defense Nuclear Facilities Safety Board www.dnfsb.gov Department of

  9. Foreign Languages: Workforce Planning Could Help Address Staffing and Proficiency Shortfalls. Testimony before the Subcommittee on International Security, Proliferation, and Federal Services, Committee on Governmental Affairs, U.S. Senate.

    ERIC Educational Resources Information Center

    Westin, Susan S.

    This statement examines the nature and impact of foreign language proficiency and personnel shortages in the Army, State Department, Central Intelligence Agency, and Federal Bureau of Investigation (FBI), discussing strategies used to address these shortages and efforts made to address current and projected shortages. All four agencies reported…

  10. Enabling the MLSpOC (Multi-Level Space Operations Center) of the Future

    NASA Astrophysics Data System (ADS)

    Missal, D.

    2012-09-01

    The Intelligence Reform and Terrorism Prevention Act, passed by Congress in 2004, established the expectation that the "vast intelligence enterprise" of the United States would become more unified, coordinated, and effective. This law charged the intelligence community and government agencies to integrate foreign intelligence and domestic US intelligence components to reduce gaps in understanding threats to our national security and to improve our reaction. This intelligence strategy — designed to provide more comprehensive and accurate intelligence analysis—substantially increases requirements for secure data sharing capabilities. An information system must be Certified & Accredited (C&A) by the appropriate Accreditation Authority in accordance with each Authority's prescribed compliance requirements and governance. Cross-Domain Solutions (CDSs) can provide the ability to share data between multiple operating domains (e.g. among users on Top Secret and Secret networks). However, sharing sensitive data across security domains and networks has been impeded by both technical and cultural challenges. A viable CDS requires a tremendous investment for initial C&A and many solutions are limited with respect to the integration of an organization's applications. As a result, most of today's highly secured systems have been designed to restrict access to entire user populations rather than implement data sharing on the basis of mandatory access controls and an individual's need-to-know. Most CDSs today are based on one-way replication through data transfer guards that copy data from one network to another. This model inherently builds in additional and extensive Operations and Maintenance (O&M) costs. Oracle's National Security Group challenged its top engineers and security architects to engineer the first Cross-Domain database providing a practical and robust solution to the Cross-Domain security problem. The result is the MLSpOC, which is deployed, fielded, and accredited today at multiple sites both CONUS and OCONUS. It is designed to assist information systems developers achieve DCID 6/3 Protection Level 4 or 5 (PL4 or PL5) or DoD SABI C&A for SECRET-to-UNCLASSIFIED systems (PL3). The product is on the DoD/DNI Unified Cross-domain Management Office's (UCDMO) Baseline of accredited solutions, and is the only solution on the Baseline which the Government considers to be an "All-in-One" approach to the Cross-domain Security challenge. Our solution is also the only PL-4 Cloud in existence and that is deployed and operational in the entire world today (at DIA). The Space marketplace is a very unique cross-domain challenge, as a need exists for Unclassified SSA Data Sharing at a deeper and more fundamental level than anywhere else in the IC or DoD. For instance, certain Agencies and/or Programs have a requirement to share information with Partner Nations that are not considered to be "friendly" (e.g. China). Our Solution is the ONLY solution in the world today that's achieved C&A, and that is uniquely positioned to enable the Multi-level Space Operations Center (MLSpOC) of the Future.

  11. To designate the facility of the United States Postal Service located at 787 State Route 17M in Monroe, New York, as the "National Clandestine Service of the Central Intelligence Agency NCS Officer Gregg David Wenzel Memorial Post Office".

    THOMAS, 112th Congress

    Rep. Hayworth, Nan A. S. [R-NY-19

    2011-12-07

    Senate - 08/29/2012 Committee on Homeland Security and Governmental Affairs referred to Subcommittee on Federal Financial Management, Government Information, Federal Services, and International Security. (All Actions) Tracker: This bill has the status Passed HouseHere are the steps for Status of Legislation:

  12. 99 Facts about the FBI: Questions and Answers.

    ERIC Educational Resources Information Center

    Federal Bureau of Investigation, Quantico, VA.

    This booklet on the Federal Bureau of Investigation (FBI) attempts to provide an overview of the FBI's functions. Presented in a question and answer format, the 99 questions and answers discuss the federal government agency's history, administrative matters, jurisdiction, criminal investigations, security matters, foreign counter-intelligence, and…

  13. 39 CFR 265.6 - Availability of records.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... by the human eye, such as a computer print-out. On request, records will be provided in a different... investigation, or by an agency conducting a lawful national security intelligence investigation, information... authorized user of a postage meter or PC Postage product (postage evidencing systems) printing a specified...

  14. 75 FR 32639 - Defense Federal Acquisition Regulation Supplement; Limitations on Procurements With Non-Defense...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-06-08

    ... elements of the Department of Homeland Security concerned with the analysis of intelligence information... DEPARTMENT OF DEFENSE Defense Acquisition Regulations System 48 CFR Part 217 RIN 0750-AG67 Defense Federal Acquisition Regulation Supplement; Limitations on Procurements With Non-Defense Agencies (DFARS...

  15. 5 CFR 841.503 - Amounts of employee deductions.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... Section 841.503 Administrative Personnel OFFICE OF PERSONNEL MANAGEMENT (CONTINUED) CIVIL SERVICE... cost of social security. (b) The rate of employee deductions from basic pay for FERS coverage for a... under section 302 of the Central Intelligence Agency Act of 1964 for Certain Employees is seven and one...

  16. 24 CFR 2002.21 - Authority to deny requests for records and form of denial.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... criminal investigation or by an agency conducting a lawful national security intelligence investigation... commercial or financial information, predisclosure notification to business submitters is required by Executive Order 12600 (3 CFR, 1987 Comp., p. 235) to afford the business submitter an opportunity to object...

  17. 78 FR 77663 - Threat Reduction Advisory Committee; Notice of Federal Advisory Committee Meeting

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-12-24

    ..., Technology and Logistics), DoD. ACTION: Federal Advisory Committee meeting notice. SUMMARY: The Department of...: National Geospatial-Intelligence Agency, Springfield, Virginia on January 28 and CENTRA Technology Inc... related to the Committee's mission to advise on technology security, Combating Weapons of Mass Destruction...

  18. Providing for consideration of the bill (H.R. 5743) to authorize appropriations for fiscal year 2013 for intelligence and intelligence-related activities of the United States Government, the Community Management Account, and the Central Intelligence Agency Retirement and Disability System, and for other purposes; providing for consideration of the bill (H.R. 5854) making appropriations for military construction, the Department of Veterans Affairs, and related agencies for the fiscal year ending September 30, 2013, and for other purposes; providing for consideration of the bill (H.R. 5855) making appropriations for the Department of Homeland Security for the fiscal year ending September 30, 2013, and for other purposes; and providing for consideration of the bill (H.R. 5325) making appropriations for energy and water development and related agencies for the fiscal year ending September 30, 2013, and for other purposes.

    THOMAS, 112th Congress

    Rep. Nugent, Richard B. [R-FL-5

    2012-05-30

    House - 05/31/2012 Pursuant to a previous special order, amendments numbered 4 and 6 printed in House Report 112-504 are modified to include amendatory instructions. (All Actions) Tracker: This bill has the status Agreed to in HouseHere are the steps for Status of Legislation:

  19. American Who Spied against Their Country Since World War 2

    DTIC Science & Technology

    1992-05-01

    Navy (33), Army (22), AF (21), DoD contractors (8), 113 5 CIA (7), Manhattan Project (6), NSA (5), Marine Corps (4), others (7) Occupation Commun/intel...with the Central Intelligence Agency, five from the National Security Agency, six associated with the Manhattan Project in the 1940s, four from the...associated with the Manhattan Project were highly educated. Their wives were involved in the spying, resulting in the 1940s having a high percentage of

  20. Integrating public health and medical intelligence gathering into homeland security fusion centres.

    PubMed

    Lenart, Brienne; Albanese, Joseph; Halstead, William; Schlegelmilch, Jeffrey; Paturas, James

    Homeland security fusion centres serve to gather, analyse and share threat-related information among all levels of governments and law enforcement agencies. In order to function effectively, fusion centres must employ people with the necessary competencies to understand the nature of the threat facing a community, discriminate between important information and irrelevant or merely interesting facts and apply domain knowledge to interpret the results to obviate or reduce the existing danger. Public health and medical sector personnel routinely gather, analyse and relay health-related inform-ation, including health security risks, associated with the detection of suspicious biological or chemical agents within a community to law enforcement agencies. This paper provides a rationale for the integration of public health and medical personnel in fusion centres and describes their role in assisting law enforcement agencies, public health organisations and the medical sector to respond to natural or intentional threats against local communities, states or the nation as a whole.

  1. Renewable Energy on the Front Lines - Continuum Magazine | NREL

    Science.gov Websites

    , vehicles, the microgrid, and intelligent controls. Functional models of this system could be used to of the multi-year, multi-agency Smart Power Infrastructure Demonstration for Energy Reliability and Security (SPIDERS) project, which focuses on improving energy surety for military installations. Funded by

  2. Identifying and Eliminating Barriers Faced by Nontraditional Department of Defense Suppliers

    DTIC Science & Technology

    2014-01-01

    organization that develops solutions to public policy challenges to help make communities throughout the world safer and more secure, healthier and more...Commands, the Department of the Navy, the Marine Corps, the defense agencies, and the defense Intelligence Community . For more information on the RAND...17 Lack of Access to and Communication

  3. 49 CFR 1.69 - Delegations to the Director of Intelligence, Security, and Emergency Response.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 49 Transportation 1 2010-10-01 2010-10-01 false Delegations to the Director of Intelligence... Intelligence, Security, and Emergency Response. The Director of Intelligence, Security, and Emergency Response is delegated authority for the following: (a) Intelligence and Security. Carry out the functions...

  4. 49 CFR 1.69 - Delegations to the Director of Intelligence, Security, and Emergency Response.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 49 Transportation 1 2011-10-01 2011-10-01 false Delegations to the Director of Intelligence... Intelligence, Security, and Emergency Response. The Director of Intelligence, Security, and Emergency Response is delegated authority for the following: (a) Intelligence and Security. Carry out the functions...

  5. In-Q-Tel, the strategic investment firm for the U.S. Intelligence Community

    NASA Astrophysics Data System (ADS)

    Ulvick, S. J.; Tighe, D. W.

    2008-04-01

    In-Q-Tel is a strategic investment firm that works to identify, adapt, and deliver innovative technology solutions to support the missions of the Central Intelligence Agency and the broader U.S. Intelligence Community (IC). Launched by the CIA in 1999 as a private, independent, not-for-profit organization, IQT's mission is to identify and partner with companies developing cutting-edge technologies that serve the national security interests of the United States. Working from an evolving strategic blueprint defining the Intelligence Community's critical technology needs, IQT engages with entrepreneurs, growth companies, researchers, and venture capitalists to deliver technologies that provide superior capabilities for the CIA and the broader IC. To date, IQT has reviewed more than 6,300 business proposals, invested in more than 100 companies, and delivered more than 140 technology solutions to the U.S. Intelligence Community.

  6. An Assessment of Contractor Personnel Security Clearance Processes in the Four Defense Intelligence Agencies

    DTIC Science & Technology

    2014-04-14

    Davis Highway, Suite 1204, Arlington VA 22202-4302. Respondents should be aware that notwithstanding any other provision of law, no person shall be...NUMBER OF PAGES 62 19a. NAME OF RESPONSIBLE PERSON a. REPORT unclassified b. ABSTRACT unclassified c. THIS PAGE unclassified Standard Form...Methodology ........................................................................................................................... 1 Finding A. Lack of

  7. EUROPE IN CRISIS

    DTIC Science & Technology

    2017-04-06

    the only international organization that can manage the Syrian refugee security crisis causing problems for the EU from root to branch because NATO is...AIR WAR COLLEGE AIR UNIVERSITY EUROPE IN CRISIS By Peter Halseth, Civilian, Defense Logistics Agency A Research Report Submitted...Syrian refugee crisis and providing intelligence assistance to member countries in the European Union (EU) of foreign fighters returning from the

  8. Intelligence and arms control - a marriage of convenience

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Hirschfeld, T.J.

    1987-01-01

    This book offers the first comprehensive look at how the vast US intelligence network enables negotiators to forge viable arms control agreements. The intelligence role in all three phases of the arms control process is discussed - from the design phase when reliable information is needed, to the execution phase when proposals are modified, to the maintenance phase when agreed-upon obligations begin to constrain adversary behavior and compliance becomes the key political issue. Contributors include: former CIA Director William E. Colby; Douglas George, Chief of the CIA's Control Intelligence Staff, Admiral Bobby R. Inman, former NSA Director; Hans Mark, formermore » Air Force Secretary and NSA administrator; Walt W. Rostow, National Security Adviser to President Johnson; and Paul Warnke, former Director of the Arms Control and Disarmament Agency and Chief Negotiator for SALT II.« less

  9. 49 CFR 1.44 - Office of Intelligence, Security and Emergency Response.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 49 Transportation 1 2013-10-01 2013-10-01 false Office of Intelligence, Security and Emergency... DELEGATION OF POWERS AND DUTIES Office of the Secretary Ost Officials § 1.44 Office of Intelligence, Security and Emergency Response. The Director of the Office of Intelligence, Security and Emergency Response is...

  10. 49 CFR 1.44 - Office of Intelligence, Security and Emergency Response.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 49 Transportation 1 2014-10-01 2014-10-01 false Office of Intelligence, Security and Emergency... DELEGATION OF POWERS AND DUTIES Office of the Secretary Ost Officials § 1.44 Office of Intelligence, Security and Emergency Response. The Director of the Office of Intelligence, Security and Emergency Response is...

  11. 49 CFR 1.44 - Office of Intelligence, Security and Emergency Response.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 49 Transportation 1 2012-10-01 2012-10-01 false Office of Intelligence, Security and Emergency... DELEGATION OF POWERS AND DUTIES Office of the Secretary Ost Officials § 1.44 Office of Intelligence, Security and Emergency Response. The Director of the Office of Intelligence, Security and Emergency Response is...

  12. 77 FR 32952 - Defense Intelligence Agency National Intelligence University Board of Visitors Closed Meeting

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-06-04

    ... DEPARTMENT OF DEFENSE Office of the Secretary Defense Intelligence Agency National Intelligence University Board of Visitors Closed Meeting AGENCY: Department of Defense, Defense Intelligence Agency, National Intelligence University. ACTION: Notice of closed meeting. SUMMARY: Pursuant to the provisions of...

  13. 75 FR 76423 - Defense Intelligence Agency National Defense Intelligence College Board of Visitors Closed Meeting

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-12-08

    ... DEPARTMENT OF DEFENSE Office of the Secretary Defense Intelligence Agency National Defense Intelligence College Board of Visitors Closed Meeting AGENCY: National Defense Intelligence College, Defense Intelligence Agency, Department of Defense. ACTION: Notice of Closed Meeting. SUMMARY: Pursuant to the...

  14. 78 FR 32241 - Defense Intelligence Agency National Intelligence University Board of Visitors; Notice of Closed...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-05-29

    ... DEPARTMENT OF DEFENSE Office of the Secretary Defense Intelligence Agency National Intelligence University Board of Visitors; Notice of Closed Meeting AGENCY: National Intelligence University, Defense Intelligence Agency, Department of Defense. ACTION: Notice of closed meeting. SUMMARY: Pursuant to the...

  15. 76 FR 28960 - Defense Intelligence Agency National Defense Intelligence College Board of Visitors Closed Meeting

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-05-19

    ... DEPARTMENT OF DEFENSE Office of the Secretary Defense Intelligence Agency National Defense Intelligence College Board of Visitors Closed Meeting AGENCY: National Defense Intelligence College, Defense Intelligence Agency, Department of Defense. ACTION: Notice of Closed Meeting. SUMMARY: Pursuant to the...

  16. 49 CFR 1.45 - Delegations to the Director of the Office of Intelligence, Security and Emergency Response.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... Intelligence, Security and Emergency Response. 1.45 Section 1.45 Transportation Office of the Secretary of... Delegations to the Director of the Office of Intelligence, Security and Emergency Response. The Director of Intelligence, Security, and Emergency Response is delegated authority to: (a) Carry out the functions related...

  17. 49 CFR 1.45 - Delegations to the Director of the Office of Intelligence, Security and Emergency Response.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... Intelligence, Security and Emergency Response. 1.45 Section 1.45 Transportation Office of the Secretary of... Delegations to the Director of the Office of Intelligence, Security and Emergency Response. The Director of Intelligence, Security, and Emergency Response is delegated authority to: (a) Carry out the functions related...

  18. 49 CFR 1.45 - Delegations to the Director of the Office of Intelligence, Security and Emergency Response.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... Intelligence, Security and Emergency Response. 1.45 Section 1.45 Transportation Office of the Secretary of... Delegations to the Director of the Office of Intelligence, Security and Emergency Response. The Director of Intelligence, Security, and Emergency Response is delegated authority to: (a) Carry out the functions related...

  19. 78 FR 56263 - HydroGen Corp., QueryObject Systems Corp., Security Intelligence Technologies, Inc., Skins, Inc...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-09-12

    ... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] HydroGen Corp., QueryObject Systems Corp., Security Intelligence Technologies, Inc., Skins, Inc., SLM Holdings, Inc., Spring Creek Healthcare Systems... securities of Security Intelligence Technologies, Inc. because it has not filed any periodic reports since...

  20. 78 FR 90 - Defense Intelligence Agency National Intelligence University Board of Visitors Closed Meeting

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-01-02

    ... DEPARTMENT OF DEFENSE Office of the Secretary Defense Intelligence Agency National Intelligence University Board of Visitors Closed Meeting AGENCY: National Intelligence University, Defense Intelligence... hereby given that a closed meeting of the National Intelligence University Board of Visitors has been...

  1. Low Intensity Conflict. Volume 2. Appendices.

    DTIC Science & Technology

    1983-06-30

    parapsychology, which includes extrasensory perception (ESP). U.S. intelligence agencies, according to NBC Inc., have not taken the Soviet effort too seriously...theoreti- cal adjustment. What remains important is the perceptions of those involved concerning the implications of winning or losing. Perceotions are...opponents feel about such matters is of great concern. In 1948, over 100,000 British security forces withdrew from Palestine because of perceptions of

  2. An Initial Look at Alternative Computing Technologies for the Intelligence Community

    DTIC Science & Technology

    2014-01-01

    Recommendation (N-1): Guide hardware development with lessons from machine learning and neuroscience . Neuro-inspired computing suffers from a lack...not new to either the government or industry. We have described Google’s approach. The government—most notably The National Security Agency ( NSA ) and...increasing accumulation of knowledge in neuroscience and bio-molecular methods, new computational techniques may become available in the near future

  3. 75 FR 24926 - Federal Advisory Committee; Defense Intelligence Agency Advisory Board; Closed Meeting

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-05-06

    ... DEPARTMENT OF DEFENSE Office of the Secretary Federal Advisory Committee; Defense Intelligence Agency Advisory Board; Closed Meeting AGENCY: Defense Intelligence Agency, DoD. ACTION: Meeting notice... Department of Defense announces that Defense Intelligence Agency Advisory Board, and its subcommittees, will...

  4. 75 FR 81245 - Federal Advisory Committee; Defense Intelligence Agency Advisory Board; Closed Meeting

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-12-27

    ... DEPARTMENT OF DEFENSE Office of the Secretary Federal Advisory Committee; Defense Intelligence Agency Advisory Board; Closed Meeting AGENCY: Defense Intelligence Agency, DoD. ACTION: Notice. SUMMARY... Defense announces that Defense Intelligence Agency Advisory Board and two of its subcommittees will meet...

  5. 75 FR 9588 - Defense Intelligence Agency Advisory Board; Closed Meeting

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-03-03

    ... DEPARTMENT OF DEFENSE Office of the Secretary Defense Intelligence Agency Advisory Board; Closed Meeting AGENCY: Defense Intelligence Agency, DoD. ACTION: Notice of closed meeting. SUMMARY: Pursuant to... Law 94-409, notice is hereby given that the Defense Intelligence Agency Advisory Board, will meet on...

  6. 76 FR 41220 - Federal Advisory Committee; Defense Intelligence Agency Advisory Board; Closed Meeting

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-07-13

    ... DEPARTMENT OF DEFENSE Office of the Secretary Federal Advisory Committee; Defense Intelligence Agency Advisory Board; Closed Meeting AGENCY: Defense Intelligence Agency, DoD. ACTION: Meeting notice... Department of Defense announces that Defense Intelligence Agency Advisory Board and two of its subcommittees...

  7. 76 FR 53671 - Federal Advisory Committee; Defense Intelligence Agency Advisory Board; Closed Meeting

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-08-29

    ... DEPARTMENT OF DEFENSE Office of the Secretary Federal Advisory Committee; Defense Intelligence Agency Advisory Board; Closed Meeting AGENCY: Defense Intelligence Agency (DIA), Department of Defense... amended), and 41 CFR 102-3.150 the Department of Defense announces that Defense Intelligence Agency...

  8. 75 FR 43493 - Office of the Secretary; Federal Advisory Committee; Defense Intelligence Agency Advisory Board...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-07-26

    ... DEPARTMENT OF DEFENSE Office of the Secretary; Federal Advisory Committee; Defense Intelligence Agency Advisory Board; Closed Meeting AGENCY: Defense Intelligence Agency, DOD. ACTION: Meeting notice... Department of Defense announces that Defense Intelligence Agency Advisory Board will meet on September 1 and...

  9. 76 FR 20338 - Closed Meeting of the Defense Intelligence Agency Advisory Board

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-04-12

    ... DEPARTMENT OF DEFENSE Office of the Secretary Closed Meeting of the Defense Intelligence Agency Advisory Board AGENCY: Defense Intelligence Agency, DoD. ACTION: Meeting notice. SUMMARY: Under the... announces that Defense Intelligence Agency Advisory Board and two of its subcommittees will meet on May 9...

  10. 77 FR 57013 - Privacy Act; Implementation

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-09-17

    ... Act; Implementation AGENCY: Defense Intelligence Agency, DoD. ACTION: Direct final rule with request for comments. SUMMARY: The Defense Intelligence Agency is updating the Defense Intelligence Agency... records in the system of records notice LDIA 10-0002, Foreign Intelligence and Counterintelligence...

  11. The Secret Sentinels: Careers in Intelligence.

    ERIC Educational Resources Information Center

    Stanton, Michael

    1985-01-01

    This article profiles the principal practitioners of the craft of intelligence. It also examines other agencies that play supporting roles in this arcane arena, including the Central Intelligence Agency, the State Department's Bureau of Intelligence and Research, the Defense Intelligence Agency, the service intelligence branches of the Department…

  12. 75 FR 28786 - Federal Advisory Committee; National Defense Intelligence College Board of Visitors; Closed Meeting

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-05-24

    ... Intelligence College Board of Visitors; Closed Meeting AGENCY: Defense Intelligence Agency, National Defense Intelligence College, DoD. ACTION: Notice of closed meeting. SUMMARY: Pursuant to the provisions of subsection... hereby given that a closed meeting of the Defense Intelligence Agency, National Defense Intelligence...

  13. A 3D Split Manufacturing Approach to Trustworthy System Development

    DTIC Science & Technology

    2012-12-01

    addition of any cryptographic algorithm or implementation to be included in the system as a foundry-level option. Essentially, 3D security introduces...8192 bytes). We modeled our cryptographic process after the AES algorithm , which can occupy up to 4640 bytes with an enlarged T-Box implementation [4...Reconfigurable Systems and Algorithms (ERSA), Las Vegas, NV, July 2011. [10] Intelligence Advanced Research Projects Agency (IARPA). Trusted integrated

  14. MDA DS COI Spiral 3 - NOA, SILO and ABAC

    DTIC Science & Technology

    2009-06-01

    agencies. The National Plan to Achieve MDA, a by-product of the Maritime Security Policy, established the national maritime common operating picture...information about vessels determined to be of interest by intelligence and operational organizations and is normally classified or highly sensitive. Exposing...makes it available to its users. For Spiral 3, the Coast Guard team, consisting of CG-26, the Operations Systems Center (OSC), and the Coast Guard

  15. Federal Research: Opportunities Exist to Improve the Management and Oversight of Federally Funded Research and Development Centers

    DTIC Science & Technology

    2008-10-01

    intelligence DCAA Defense Contract Audit Agency DHS Department of Homeland Security DOD Departments of Defense GAAP generally accepted accounting...In some cases, DOE’s Office of Science holds scientific merit competitions between national laboratories (including FFRDCs), universities, and...3) standards promulgated by the Cost Accounting Standards Board, if applicable; otherwise GAAP ; (4) the terms of the contract; and (5) any

  16. 32 CFR 319.3 - Scope.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... INTELLIGENCE AGENCY PRIVACY PROGRAM § 319.3 Scope. (a) Any individual who is a citizen of the United States or... Defense Intelligence Agency. (b) These rules apply to those systems of records: (1) Maintained by the Defense Intelligence Agency; (2) For which the Defense Intelligence Agency prescribes the content and...

  17. 32 CFR 319.3 - Scope.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... INTELLIGENCE AGENCY PRIVACY PROGRAM § 319.3 Scope. (a) Any individual who is a citizen of the United States or... Defense Intelligence Agency. (b) These rules apply to those systems of records: (1) Maintained by the Defense Intelligence Agency; (2) For which the Defense Intelligence Agency prescribes the content and...

  18. 32 CFR 319.3 - Scope.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... INTELLIGENCE AGENCY PRIVACY PROGRAM § 319.3 Scope. (a) Any individual who is a citizen of the United States or... Defense Intelligence Agency. (b) These rules apply to those systems of records: (1) Maintained by the Defense Intelligence Agency; (2) For which the Defense Intelligence Agency prescribes the content and...

  19. 76 FR 59073 - Privacy Act

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-09-23

    ... CENTRAL INTELLIGENCE AGENCY 32 CFR Part 1901 Privacy Act AGENCY: Central Intelligence Agency. ACTION: Proposed rule. SUMMARY: Consistent with the Privacy Act (PA), the Central Intelligence Agency... the Director, Information Management [[Page 59074

  20. 75 FR 37253 - Classified National Security Information

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-06-28

    ..., Intelligence, National defense, National security information, Presidential documents, Security information... reveal the identity of a confidential human source or a human intelligence source or key design concepts... or a human intelligence source, the duration shall be up to 75 years and shall be designated with the...

  1. Effects of War Tax Collection in Honduran Society: Evaluating the Social and Economic Cost

    DTIC Science & Technology

    2015-06-12

    information gathering for this thesis relied on open electronic sources and statistical data from security and intelligence agencies. There are no...commission of this crime have identified. However, the main limitation encountered is the poor reliability of the statistical data because the high...justice systems with crime and violence. According to statistical data presented in Air & Space Power Journal, at least 60 percent of the 2,576 murders

  2. 76 FR 59031 - Classification Challenge Regulations

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-09-23

    ... CENTRAL INTELLIGENCE AGENCY 32 CFR Part 1907 Classification Challenge Regulations AGENCY: Central Intelligence Agency. ACTION: Final rule. SUMMARY: Consistent with Executive Order 13526, the Central Intelligence Agency (CIA) has undertaken and completed a review of its public Classification Challenge...

  3. Medical intelligence, security and global health: the foundations of a new health agenda.

    PubMed

    Bowsher, G; Milner, C; Sullivan, R

    2016-07-01

    Medical intelligence, security and global health are distinct fields that often overlap, especially as the drive towards a global health security agenda gathers pace. Here, we outline some of the ways in which this has happened in the recent past during the recent Ebola epidemic in West Africa and in the killing of Osama Bin laden by US intelligence services. We evaluate medical intelligence and the role it can play in global health security; we also attempt to define a framework that illustrates how medical intelligence can be incorporated into foreign policy action in order delineate the boundaries and scope of this growing field. © The Royal Society of Medicine.

  4. Assessing the Effectiveness of Post-9/11 Intelligence Information Sharing

    DTIC Science & Technology

    2010-03-01

    distribution unlimited. 13. SUPPLEMENTARY NOTES 14. ABSTRACT see attached 15. SUBJECT TERMS 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF ABSTRACT...March 2010 WORD COUNT: 5,677 PAGES: 30 KEY TERMS: Intelligence Reform, Intelligence Sharing, 9/11 Commission, Homeland Security , National Security ...such as the creation of the Department of Homeland Security (DHS). In fact, both the 2007 National Strategy for Information Sharing and the IC’s

  5. 78 FR 69393 - Privacy Act of 1974; System of Records

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-11-19

    .... FOR FURTHER INFORMATION CONTACT: National Geospatial-Intelligence Agency (NGA), ATTN: Human...: Delete entry and replace with ``Human Development Directorate, National Geospatial-Intelligence Agency...; System of Records AGENCY: National Geospatial-Intelligence Agency, DoD. ACTION: Notice to alter a System...

  6. 77 FR 15591 - Privacy Act; Implementation

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-03-16

    ... Act; Implementation AGENCY: Defense Intelligence Agency, DoD. ACTION: Direct final rule with request for comments. SUMMARY: The Defense Intelligence Agency is deleting an exemption rule for LDIA 0275... Defense Intelligence Agency Privacy Program rules. These changes will allow the Department to transfer...

  7. 76 FR 59071 - Freedom of Information Act Regulations

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-09-23

    ... CENTRAL INTELLIGENCE AGENCY 32 CFR Part 1900 Freedom of Information Act Regulations AGENCY: Central Intelligence Agency. ACTION: Proposed rule. SUMMARY: Consistent with the Freedom of Information...,'' and Executive Orders 13526 and 13392, the Central Intelligence Agency (CIA) has undertaken and...

  8. 76 FR 49658 - Privacy Act; Implementation

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-08-11

    ... Act; Implementation AGENCY: Defense Intelligence Agency, DoD. ACTION: Direct final rule with request for comments. SUMMARY: The Defense Intelligence Agency is deleting an exemption rule for LDIA 0275... Defense Intelligence Agency Privacy Program rules. These changes will allow the Department to transfer...

  9. 77 FR 57017 - Privacy Act; Implementation

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-09-17

    ... Act; Implementation AGENCY: Defense Intelligence Agency, DoD. ACTION: Direct final rule with request for comments. SUMMARY: Defense Intelligence Agency (DIA) is proposing to update the DIA Privacy Act... Records. This direct final rule makes nonsubstantive changes to the Defense Intelligence Agency Program...

  10. 77 FR 15594 - Privacy Act; Implementation

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-03-16

    ... Act; Implementation AGENCY: Defense Intelligence Agency, DoD. ACTION: Direct final rule with request for comments. SUMMARY: The Defense Intelligence Agency is deleting an exemption rule for LDIA 0800... Defense Intelligence Agency Privacy Program rules. These changes will allow the Department to transfer...

  11. 77 FR 15590 - Privacy Act; Implementation

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-03-16

    ... Act; Implementation AGENCY: Defense Intelligence Agency, DoD. ACTION: Direct final rule with request for comments. SUMMARY: Defense Intelligence Agency (DIA) is proposing to update the DIA Privacy Act... nonsubstantive changes to the Defense Intelligence Agency (DIA) Privacy Program rules. These changes will allow...

  12. 32 CFR 1901.02 - Definitions.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... Defense Other Regulations Relating to National Defense CENTRAL INTELLIGENCE AGENCY PUBLIC RIGHTS UNDER THE... meanings indicated: (a) Agency or CIA means the United States Central Intelligence Agency acting through... individual that is maintained by the Central Intelligence Agency in a system of records; (k) Requester or...

  13. 32 CFR 1901.02 - Definitions.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... Defense Other Regulations Relating to National Defense CENTRAL INTELLIGENCE AGENCY PUBLIC RIGHTS UNDER THE... meanings indicated: (a) Agency or CIA means the United States Central Intelligence Agency acting through... individual that is maintained by the Central Intelligence Agency in a system of records; (k) Requester or...

  14. 77 FR 57016 - Privacy Act; Implementation

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-09-17

    ... Act; Implementation AGENCY: Defense Intelligence Agency, DoD. ACTION: Direct final rule with request for comments. SUMMARY: Defense Intelligence Agency (DIA) is updating the DIA Privacy Act Program by... final rule makes non-substantive changes to the Defense Intelligence Agency Program rules. These changes...

  15. 78 FR 32635 - Privacy Act of 1974; System of Records

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-05-31

    ...; System of Records AGENCY: National Geospatial-Intelligence Agency, DoD. ACTION: Notice to Add a New System of Records. SUMMARY: The National Geospatial-Intelligence Agency is establishing a new system of... information. FOR FURTHER INFORMATION CONTACT: National Geospatial-Intelligence Agency [[Page 32636

  16. The Customer Metaphor and the Defense Intelligence Agency

    DTIC Science & Technology

    2016-05-26

    the foregoing statement.) Fair use determination or copyright permission has been obtained for the inclusion of pictures, maps, graphics, and any...agencies to refer to the policymakers and war fighters who use intelligence as their customers. The Defense Intelligence Agency, which was founded in...highly inappropriate for the profession of intelligence. The profit motive inherent in the term customer means that intelligence leaders who use it

  17. Weak and Failing States: Evolving Security Threats and U.S. Policy

    DTIC Science & Technology

    2008-04-18

    Instability Task Force, a research group commissioned by the Central Intelligence Agency, found in a 2003 report that terrorists operate in both “ caves ...Bank Support to Low-Income Countries Under Stress (Washington, DC: The World Bank, 2006); Chauvet and Collier, “Helping Hand? Aid to Failing States...income, 50% higher debt-to-gross domestic product ratios, and double the poverty CRS-9 27 See Chauvet and Collier (2004), op. cit.; Francois Bourguignon

  18. Bordering on Failure: Mexican Instability, Drug Wars, and the Threat to U.S. Security

    DTIC Science & Technology

    2012-04-19

    NAFTA was that Mexico had to demonstrate it was not a one party political system; thus, the PRI began to loosen its suppression of opposition...events of 9/11, e.g., the employment of physical barriers, heightened technology, and increased law enforcement efforts along the U.S.-Mexico border...promises as he initially addressed Mexico as its president was to increase the budgets of the military, intelligence agencies, and law enforcement

  19. Humanitarian Relief Capabilities in the Horn of Africa.

    DTIC Science & Technology

    2014-06-13

    surface runways (Central Intelligence Agency 2014a). Camp Lemonnier, the only U.S. military base in Africa, is located in Djibouti. The camp is in close... Intelligence Agency 2014d). Somalia has sixty-one airports, of which six have permanent surface runways (Central 10 Intelligence Agency 2014e). Ethiopia...has fifty-seven airports, of which seventeen have permanent surface runways (Central Intelligence Agency 2014c). The country with the same number

  20. A threat intelligence framework for access control security in the oil industry

    NASA Astrophysics Data System (ADS)

    Alaskandrani, Faisal T.

    The research investigates the problem raised by the rapid development in the technology industry giving security concerns in facilities built by the energy industry containing diverse platforms. The difficulty of continuous updates to network security architecture and assessment gave rise to the need to use threat intelligence frameworks to better assess and address networks security issues. Focusing on access control security to the ICS and SCADA systems that is being utilized to carry out mission critical and life threatening operations. The research evaluates different threat intelligence frameworks that can be implemented in the industry seeking the most suitable and applicable one that address the issue and provide more security measures. The validity of the result is limited to the same environment that was researched as well as the technologies being utilized. The research concludes that it is possible to utilize a Threat Intelligence framework to prioritize security in Access Control Measures in the Oil Industry.

  1. 75 FR 43497 - Privacy Act of 1974; System of Records

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-07-26

    ...; System of Records AGENCY: National Geospatial-Intelligence Agency (NGA), DoD. ACTION: Notice to add a system of records. SUMMARY: The National Geospatial-Intelligence Agency (NGA) proposes to add a system of...-3808. SUPPLEMENTARY INFORMATION: The National Geospatial-Intelligence Agency notices for systems of...

  2. 76 FR 64237 - Access by Historical Researchers and Certain Former Government Personnel; Correction

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-10-18

    ... CENTRAL INTELLIGENCE AGENCY 32 CFR Part 1909 Access by Historical Researchers and Certain Former Government Personnel; Correction AGENCY: Central Intelligence Agency. ACTION: Final rule; correction. SUMMARY: On September 23, 2011, the Central Intelligence Agency published a final rule resulting from a review...

  3. Security Operations Curriculum Package: BS in Global Security and Intelligence Studies, Security Operations Management Track, Embry-Riddle Aeronautical University, Prescott, AZ. BS in Security Operations Management, Model Curriculum

    DTIC Science & Technology

    2011-10-24

    Operations Management Track in the established B.S. in Global Security and Intelligence Studies Degree offered at Embry-Riddle Aeronautical University...and a model 4 -year college curriculum for a BS degree in Security Operations Management

  4. 78 FR 47308 - Privacy Act of 1974; System of Records

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-08-05

    ...; System of Records AGENCY: Defense Intelligence Agency, DoD. ACTION: Notice to alter a System of Records. SUMMARY: The Defense Intelligence Agency is proposing to alter a system of records in its existing.... FOR FURTHER INFORMATION CONTACT: Ms. Theresa Lowery at Defense Intelligence Agency, DAN 1-C, 600...

  5. 75 FR 17904 - Privacy Act of 1974; System of Records

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-04-08

    ...; System of Records AGENCY: Defense Intelligence Agency, DoD. ACTION: Notice to alter a system of records. Summary: The Defense Intelligence Agency is proposing to alter a system in its existing inventory of.... SUPPLEMENTARY INFORMATION: The Defense Intelligence Agency system of records notices subject to the Privacy Act...

  6. 78 FR 22524 - Privacy Act of 1974; System of Records

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-04-16

    ...; System of Records AGENCY: Defense Intelligence Agency, DoD. ACTION: Notice to alter a System of Records. SUMMARY: The Defense Intelligence Agency is proposing to alter a system to its existing inventory of.... FOR FURTHER INFORMATION CONTACT: Ms. Theresa Lowery at Defense Intelligence Agency, DAN 1-C, 600...

  7. 76 FR 35191 - Privacy Act of 1974; System of Records

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-06-16

    ...; System of Records AGENCY: Defense Intelligence Agency, DoD. ACTION: Notice to alter a system of records. SUMMARY: The Defense Intelligence Agency is proposing to alter a system to its existing inventory of...: Ms. Theresa Lowery, Defense Intelligence Agency, DAN 1-C, 600 McDill Blvd., Washington, DC 20340...

  8. 77 FR 57077 - Privacy Act of 1974; System of Records

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-09-17

    ...; System of Records AGENCY: Defense Intelligence Agency, DoD. ACTION: Notice to Add a System of Records. SUMMARY: The Defense Intelligence Agency is proposing the add a system to its existing inventory of... information. FOR FURTHER INFORMATION CONTACT: Ms. Theresa Lowery at Defense Intelligence Agency, DAN 1-C, 600...

  9. 77 FR 26262 - Privacy Act of 1974; System of Records

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-05-03

    ...; System of Records AGENCY: Defense Intelligence Agency, DoD. ACTION: Notice to alter a system of records. SUMMARY: The Defense Intelligence Agency is proposing to alter a system to its existing inventory of.... FOR FURTHER INFORMATION CONTACT: Ms. Theresa Lowery. Defense Intelligence Agency, DAN 1-C, 600 McDill...

  10. 75 FR 26201 - Privacy Act of 1974; System of Records

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-05-11

    ...; System of Records AGENCY: Defense Intelligence Agency, DoD. ACTION: Notice to amend a system of records. SUMMARY: The Defense Intelligence Agency is proposing to amend a system in its existing inventory of.... SUPPLEMENTARY INFORMATION: The Defense Intelligence Agency systems of records notices subject to the Privacy Act...

  11. 75 FR 30791 - Privacy Act of 1974; System of Records

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-06-02

    ...; System of Records AGENCY: Defense Intelligence Agency, DoD. ACTION: Notice to alter a system of records. SUMMARY: The Defense Intelligence Agency is proposing to alter a system of records in its existing... Lowery at (202) 231-1193. SUPPLEMENTARY INFORMATION: The Defense Intelligence Agency system of records...

  12. 78 FR 5787 - Privacy Act of 1974; System of Records

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-01-28

    ...; System of Records AGENCY: Defense Intelligence Agency, DoD. ACTION: Notice to alter a System of Records. SUMMARY: The Defense Intelligence Agency is proposing to alter a system to its existing inventory of.... FOR FURTHER INFORMATION CONTACT: Ms. Theresa Lowery at Defense Intelligence Agency, DAN 1-C, 600...

  13. 77 FR 26256 - Privacy Act of 1974; System of Records

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-05-03

    ...; System of Records AGENCY: Defense Intelligence Agency, DoD. ACTION: Notice to Alter a System of Records. SUMMARY: The Defense Intelligence Agency is proposing to alter a system to its existing inventory of.... FOR FURTHER INFORMATION CONTACT: Ms. Theresa Lowery, Defense Intelligence Agency, DAN 1-C, 600 McDill...

  14. Maritime domain awareness community of interest net centric information sharing

    NASA Astrophysics Data System (ADS)

    Andress, Mark; Freeman, Brian; Rhiddlehover, Trey; Shea, John

    2007-04-01

    This paper highlights the approach taken by the Maritime Domain Awareness (MDA) Community of Interest (COI) in establishing an approach to data sharing that seeks to overcome many of the obstacles to sharing both within the federal government and with international and private sector partners. The approach uses the DOD Net Centric Data Strategy employed through Net Centric Enterprise Services (NCES) Service Oriented Architecture (SOA) foundation provided by Defense Information Systems Agency (DISA), but is unique in that the community is made up of more than just Defense agencies. For the first pilot project, the MDA COI demonstrated how four agencies from DOD, the Intelligence Community, Department of Homeland Security (DHS), and Department of Transportation (DOT) could share Automatic Identification System (AIS) data in a common format using shared enterprise service components.

  15. Improving the Security of the U.S. Aeronautical Domain: Adopting an Intelligence-Led, Risk-Based Strategy and Partnership

    DTIC Science & Technology

    2010-12-01

    Methodology RMAT Risk Management Assessment Tool SIDA Security Identification Display Area SIGINT Signals Intelligence SO18 Aviation Security...aircraft operate (§ 1542.203); • Provide detection and physical security measures for the “Security Identification Display Area” ( SIDA ), i.e., the area

  16. 78 FR 53172 - Agency Information Collection Activities

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-08-28

    ... OFFICE OF THE DIRECTOR OF NATIONAL INTELLIGENCE Agency Information Collection Activities AGENCY: Office of the Director of National Intelligence (ODNI). ACTION: Notice. SUMMARY: The Whistleblower... Information Officer, Information Management Division, Office of the Director of National Intelligence...

  17. Factors underlying the psychological and behavioral characteristics of Office of Strategic Services candidates: the assessment of men data revisited.

    PubMed

    Lenzenweger, Mark F

    2015-01-01

    During World War II, the Office of Strategic Services (OSS), the forerunner of the Central Intelligence Agency, sought the assistance of clinical psychologists and psychiatrists to establish an assessment program for evaluating candidates for the OSS. The assessment team developed a novel and rigorous program to evaluate OSS candidates. It is described in Assessment of Men: Selection of Personnel for the Office of Strategic Services (OSS Assessment Staff, 1948). This study examines the sole remaining multivariate data matrix that includes all final ratings for a group of candidates (n = 133) assessed near the end of the assessment program. It applies the modern statistical methods of both exploratory and confirmatory factor analysis to this rich and highly unique data set. An exploratory factor analysis solution suggested 3 factors underlie the OSS assessment staff ratings. Confirmatory factor analysis results of multiple plausible substantive models reveal that a 3-factor model provides the best fit to these data. The 3 factors are emotional/interpersonal factors (social relations, emotional stability, security), intelligence processing (effective IQ, propaganda skills, observing and reporting), and agency/surgency (motivation, energy and initiative, leadership, physical ability). These factors are discussed in terms of their potential utility for personnel selection within the intelligence community.

  18. Dysfunction Junction: Intelligence, Peacekeeping, and the United Nations

    DTIC Science & Technology

    2007-09-01

    Limitations,” Peacekeeping and International Relations 24, no. 6 (November 1995): 3. 25 Thomas Quiggin, “Response to No Cloak and Dagger Required...Johnston, “No Cloak and Dagger Required: Intelligence Support to UN Peacekeeping,” Intelligence and National Security 12, no. 4 (October 1997): 103...No Cloak and Dagger Required: Intelligence Support to UN Peacekeeping.” Intelligence and National Security 12, no. 4 (October 1997): 102-112

  19. 32 CFR 1907.02 - Definitions.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... Defense Other Regulations Relating to National Defense CENTRAL INTELLIGENCE AGENCY CHALLENGES TO... means the United States Central Intelligence Agency acting through the CIA Information and Privacy... specifically authorized by the Central Intelligence Agency to possess and use on official business classified...

  20. 75 FR 81247 - Privacy Act of 1974; System of Records

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-12-27

    ...; System of Records AGENCY: Defense Intelligence Agency, DoD. ACTION: Notice to delete a system of records. SUMMARY: The Defense Intelligence Agency proposes to delete a system of records notice in its existing... Defense Intelligence Agency systems of records notices subject to the Privacy Act of 1974, (5 U.S.C. 552a...

  1. 77 FR 21974 - Privacy Act of 1974; System of Records

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-04-12

    ...; System of Records AGENCY: Defense Intelligence Agency, DoD. ACTION: Notice to alter a system of records. SUMMARY: The Defense Intelligence Agency proposes to alter a system in its existing inventory of records... Intelligence Agency, DAN 1-C, 600 McDill Boulevard, Washington, DC 20340-0001, or by phone at (202) 231-1193...

  2. 77 FR 57076 - Privacy Act of 1974; System of Records

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-09-17

    ...; System of Records AGENCY: Defense Intelligence Agency, DoD. ACTION: Notice to alter a System of Records. SUMMARY: The Defense Intelligence Agency is proposing to alter a system to its existing inventory of...: Ms. Theresa Lowery at Defense Intelligence Agency, DAN 1-C, 600 MacDill Blvd., Washington, DC 20340...

  3. 75 FR 13089 - Privacy Act of 1974; Systems of Records

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-03-18

    ...; Systems of Records AGENCY: Defense Intelligence Agency, (DoD). ACTION: Notice to amend a system of records. SUMMARY: The Defense Intelligence Agency proposes to amend a system of records notice of its inventory of... INFORMATION: The Defense Intelligence Agency notices for systems of records subject to the Privacy Act of 1974...

  4. 77 FR 26260 - Privacy Act of 1974; System of Records

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-05-03

    ...; System of Records AGENCY: Defense Intelligence Agency, DoD. ACTION: Notice to Delete a System of Records. SUMMARY: The Defense Intelligence Agency proposes to delete a system of records notice in its existing...: The Defense Intelligence Agency systems of records notices subject to the Privacy Act of 1974 (5 U.S.C...

  5. 76 FR 10010 - Privacy Act of 1974; System of Records

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-02-23

    ...; System of Records AGENCY: Defense Intelligence Agency, DoD. ACTION: Notice to Delete a System of Records. SUMMARY: The Defense Intelligence Agency proposes to delete a system of records notice in its existing... Defense Intelligence Agency systems of records notices subject to the Privacy Act of 1974, (5 U.S.C. 552a...

  6. 75 FR 33791 - Privacy Act of 1974; System of Records

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-06-15

    ...; System of Records AGENCY: Defense Intelligence Agency, DoD. ACTION: Notice to add a system of records. SUMMARY: The Defense Intelligence Agency proposes to add a system of records to its inventory of record...: The Defense Intelligence Agency systems of records notices subject to the Privacy Act of 1974, (5 U.S...

  7. 77 FR 29615 - Privacy Act of 1974; System of Records

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-05-18

    ...; System of Records AGENCY: Defense Intelligence Agency, DoD. ACTION: Notice to amend a system of records. SUMMARY: The Defense Intelligence Agency is amending a system of records notice in its existing inventory... Intelligence Agency, DAN 1-C, 600 MacDill Blvd., Washington, DC 20340- 0001 or by phone at (202) 231-1193...

  8. Intelligence, Information Technology, and Information Warfare.

    ERIC Educational Resources Information Center

    Davies, Philip H. J.

    2002-01-01

    Addresses the use of information technology for intelligence and information warfare in the context of national security and reviews the status of clandestine collection. Discusses hacking, human agent collection, signal interception, covert action, counterintelligence and security, and communications between intelligence producers and consumers…

  9. Unholy Charity

    DTIC Science & Technology

    2011-05-05

    groups emerge sporadic.ally. In patticular, the JMJB is widely perceived by the security and intelligent officials in Bangladesh to be the youth wing...organizations and protect others. According to National Security Intelligence sources, there are 20 to 33 Islamist ten·orist groups active in Bangladesh.29 Only...Additional Direction, National Security Intelligence , Bangladesh, broke down how the influx of charitable money is being used and misused in Bangladesh

  10. 32 CFR 1906.103 - Definitions.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... Defense Other Regulations Relating to National Defense CENTRAL INTELLIGENCE AGENCY ENFORCEMENT OF NONDISCRIMINATION ON THE BASIS OF HANDICAP IN PROGRAMS OR ACTIVITIES CONDUCTED BY THE CENTRAL INTELLIGENCE AGENCY..., and other similar services and devices. The Central Intelligence Agency may prohibit from any of its...

  11. 32 CFR 1906.103 - Definitions.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... Defense Other Regulations Relating to National Defense CENTRAL INTELLIGENCE AGENCY ENFORCEMENT OF NONDISCRIMINATION ON THE BASIS OF HANDICAP IN PROGRAMS OR ACTIVITIES CONDUCTED BY THE CENTRAL INTELLIGENCE AGENCY..., and other similar services and devices. The Central Intelligence Agency may prohibit from any of its...

  12. 32 CFR 1906.103 - Definitions.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... Defense Other Regulations Relating to National Defense CENTRAL INTELLIGENCE AGENCY ENFORCEMENT OF NONDISCRIMINATION ON THE BASIS OF HANDICAP IN PROGRAMS OR ACTIVITIES CONDUCTED BY THE CENTRAL INTELLIGENCE AGENCY..., and other similar services and devices. The Central Intelligence Agency may prohibit from any of its...

  13. 32 CFR 1906.103 - Definitions.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... Defense Other Regulations Relating to National Defense CENTRAL INTELLIGENCE AGENCY ENFORCEMENT OF NONDISCRIMINATION ON THE BASIS OF HANDICAP IN PROGRAMS OR ACTIVITIES CONDUCTED BY THE CENTRAL INTELLIGENCE AGENCY..., and other similar services and devices. The Central Intelligence Agency may prohibit from any of its...

  14. 5 CFR 432.102 - Coverage.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ...) The Government Printing Office. (d) Agencies excluded. This part does not apply to: (1) A Government corporation; (2) The Central Intelligence Agency; (3) The Defense Intelligence Agency; (4) The National... principal function of which is the conduct of foreign intelligence or counterintelligence activities; (6...

  15. A bill to designate the facility of the United States Postal Service located at 787 State Route 17M in Monroe, New York, as the "National Clandestine Service of the Central Intelligence Agency NCS Officer Gregg David Wenzel Memorial Post Office".

    THOMAS, 113th Congress

    Sen. Schumer, Charles E. [D-NY

    2014-07-24

    Senate - 07/24/2014 Read twice and referred to the Committee on Homeland Security and Governmental Affairs. (All Actions) Notes: For further action, see H.R.2112, which became Public Law 113-209 on 12/16/2014. Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  16. Classification Management. Journal of the National Classification Management Society, Volume 18, 1982,

    DTIC Science & Technology

    1983-01-01

    changes. Concurrently, CIA formed and AD HOC esting to step back and look at the U.S. security Intelligence Community Working Group to re...administrative error; to prevent embarrassment to expected damage will be. If you foresee the dam- a person, organization, or agency; to restrain com- age...the decision will be to classify the informa- petition; or to pTevent or delay the public release of tion. But note that in this thought process, you

  17. 32 CFR 1906.170 - Compliance procedures.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... National Defense Other Regulations Relating to National Defense CENTRAL INTELLIGENCE AGENCY ENFORCEMENT OF NONDISCRIMINATION ON THE BASIS OF HANDICAP IN PROGRAMS OR ACTIVITIES CONDUCTED BY THE CENTRAL INTELLIGENCE AGENCY... of this section. Complaints may be sent to Central Intelligence Agency, Director, Office of Equal...

  18. 32 CFR 1906.170 - Compliance procedures.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... National Defense Other Regulations Relating to National Defense CENTRAL INTELLIGENCE AGENCY ENFORCEMENT OF NONDISCRIMINATION ON THE BASIS OF HANDICAP IN PROGRAMS OR ACTIVITIES CONDUCTED BY THE CENTRAL INTELLIGENCE AGENCY... of this section. Complaints may be sent to Central Intelligence Agency, Director, Office of Equal...

  19. 32 CFR 1904.2 - Definitions.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... Defense Other Regulations Relating to National Defense CENTRAL INTELLIGENCE AGENCY PROCEDURES GOVERNING ACCEPTANCE OF SERVICE OF PROCESS § 1904.2 Definitions. (a) Agency or CIA means the Central Intelligence Agency and include all staff elements of the Director of Central Intelligence. (b) Process means a...

  20. 32 CFR 1906.170 - Compliance procedures.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... National Defense Other Regulations Relating to National Defense CENTRAL INTELLIGENCE AGENCY ENFORCEMENT OF NONDISCRIMINATION ON THE BASIS OF HANDICAP IN PROGRAMS OR ACTIVITIES CONDUCTED BY THE CENTRAL INTELLIGENCE AGENCY... of this section. Complaints may be sent to Central Intelligence Agency, Director, Office of Equal...

  1. 32 CFR 1904.2 - Definitions.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... Defense Other Regulations Relating to National Defense CENTRAL INTELLIGENCE AGENCY PROCEDURES GOVERNING ACCEPTANCE OF SERVICE OF PROCESS § 1904.2 Definitions. (a) Agency or CIA means the Central Intelligence Agency and include all staff elements of the Director of Central Intelligence. (b) Process means a...

  2. 32 CFR 1904.2 - Definitions.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... Defense Other Regulations Relating to National Defense CENTRAL INTELLIGENCE AGENCY PROCEDURES GOVERNING ACCEPTANCE OF SERVICE OF PROCESS § 1904.2 Definitions. (a) Agency or CIA means the Central Intelligence Agency and include all staff elements of the Director of Central Intelligence. (b) Process means a...

  3. 32 CFR 1904.2 - Definitions.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... Defense Other Regulations Relating to National Defense CENTRAL INTELLIGENCE AGENCY PROCEDURES GOVERNING ACCEPTANCE OF SERVICE OF PROCESS § 1904.2 Definitions. (a) Agency or CIA means the Central Intelligence Agency and include all staff elements of the Director of Central Intelligence. (b) Process means a...

  4. 32 CFR 1904.2 - Definitions.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... Defense Other Regulations Relating to National Defense CENTRAL INTELLIGENCE AGENCY PROCEDURES GOVERNING ACCEPTANCE OF SERVICE OF PROCESS § 1904.2 Definitions. (a) Agency or CIA means the Central Intelligence Agency and include all staff elements of the Director of Central Intelligence. (b) Process means a...

  5. 32 CFR 1906.170 - Compliance procedures.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... National Defense Other Regulations Relating to National Defense CENTRAL INTELLIGENCE AGENCY ENFORCEMENT OF NONDISCRIMINATION ON THE BASIS OF HANDICAP IN PROGRAMS OR ACTIVITIES CONDUCTED BY THE CENTRAL INTELLIGENCE AGENCY... of this section. Complaints may be sent to Central Intelligence Agency, Director, Office of Equal...

  6. 32 CFR 1906.170 - Compliance procedures.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... National Defense Other Regulations Relating to National Defense CENTRAL INTELLIGENCE AGENCY ENFORCEMENT OF NONDISCRIMINATION ON THE BASIS OF HANDICAP IN PROGRAMS OR ACTIVITIES CONDUCTED BY THE CENTRAL INTELLIGENCE AGENCY... of this section. Complaints may be sent to Central Intelligence Agency, Director, Office of Equal...

  7. 77 FR 21975 - Privacy Act of 1974; System of Records

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-04-12

    ...; System of Records AGENCY: Defense Intelligence Agency, DoD. ACTION: Notice to add a system of records. SUMMARY: The Defense Intelligence Agency is proposing to add a system to its existing inventory of records... Intelligence Agency, DAN 1-C, 600 MacDill Blvd., Washington, DC 20340- 0001 or by phone at (202) 231-1193...

  8. 77 FR 21976 - Privacy Act of 1974; System of Records

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-04-12

    ...; System of Records AGENCY: Defense Intelligence Agency, DoD. ACTION: Notice to alter a system of records. SUMMARY: The Defense Intelligence Agency proposes to alter a system of records in its inventory of record... Intelligence Agency, DAN 1-C, 600 MacDill Boulevard, Washington, DC 20340-0001, or by phone at (202) 231-1193...

  9. 32 CFR 319.13 - Specific exemptions.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... PROGRAM DEFENSE INTELLIGENCE AGENCY PRIVACY PROGRAM § 319.13 Specific exemptions. (a) All systems of records maintained by the Director Intelligence Agency shall be exempt from the requirements of 5 U.S.C... has been properly classified. (b) The Director, Defense Intelligence Agency, designated the systems of...

  10. 32 CFR 319.13 - Specific exemptions.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... PROGRAM DEFENSE INTELLIGENCE AGENCY PRIVACY PROGRAM § 319.13 Specific exemptions. (a) All systems of records maintained by the Director Intelligence Agency shall be exempt from the requirements of 5 U.S.C... has been properly classified. (b) The Director, Defense Intelligence Agency, designated the systems of...

  11. 32 CFR 319.13 - Specific exemptions.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... PROGRAM DEFENSE INTELLIGENCE AGENCY PRIVACY PROGRAM § 319.13 Specific exemptions. (a) All systems of records maintained by the Director Intelligence Agency shall be exempt from the requirements of 5 U.S.C... has been properly classified. (b) The Director, Defense Intelligence Agency, designated the systems of...

  12. 32 CFR 319.13 - Specific exemptions.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... PROGRAM DEFENSE INTELLIGENCE AGENCY PRIVACY PROGRAM § 319.13 Specific exemptions. (a) All systems of records maintained by the Director Intelligence Agency shall be exempt from the requirements of 5 U.S.C... has been properly classified. (b) The Director, Defense Intelligence Agency, designated the systems of...

  13. 32 CFR 1903.11 - Restrictions on photographic, transmitting, and recording equipment.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... CENTRAL INTELLIGENCE AGENCY CONDUCT ON AGENCY INSTALLATIONS § 1903.11 Restrictions on photographic... Agency installation. The Central Intelligence Agency may regulate or otherwise administratively control...

  14. 32 CFR 1903.11 - Restrictions on photographic, transmitting, and recording equipment.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... CENTRAL INTELLIGENCE AGENCY CONDUCT ON AGENCY INSTALLATIONS § 1903.11 Restrictions on photographic... Agency installation. The Central Intelligence Agency may regulate or otherwise administratively control...

  15. 32 CFR 1903.11 - Restrictions on photographic, transmitting, and recording equipment.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... CENTRAL INTELLIGENCE AGENCY CONDUCT ON AGENCY INSTALLATIONS § 1903.11 Restrictions on photographic... Agency installation. The Central Intelligence Agency may regulate or otherwise administratively control...

  16. 32 CFR 1903.11 - Restrictions on photographic, transmitting, and recording equipment.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... CENTRAL INTELLIGENCE AGENCY CONDUCT ON AGENCY INSTALLATIONS § 1903.11 Restrictions on photographic... Agency installation. The Central Intelligence Agency may regulate or otherwise administratively control...

  17. 32 CFR 1903.11 - Restrictions on photographic, transmitting, and recording equipment.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... CENTRAL INTELLIGENCE AGENCY CONDUCT ON AGENCY INSTALLATIONS § 1903.11 Restrictions on photographic... Agency installation. The Central Intelligence Agency may regulate or otherwise administratively control...

  18. 32 CFR 1903.17 - Soliciting, vending, and debt collection.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... INTELLIGENCE AGENCY CONDUCT ON AGENCY INSTALLATIONS § 1903.17 Soliciting, vending, and debt collection... 5 CFR parts 110 and 950 as amended and sponsored or approved by the Director of Central Intelligence... compliance with Central Intelligence Agency rules governing the use of such authorized bulletin boards...

  19. 32 CFR 1903.17 - Soliciting, vending, and debt collection.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... INTELLIGENCE AGENCY CONDUCT ON AGENCY INSTALLATIONS § 1903.17 Soliciting, vending, and debt collection... 5 CFR parts 110 and 950 as amended and sponsored or approved by the Director of Central Intelligence... compliance with Central Intelligence Agency rules governing the use of such authorized bulletin boards...

  20. 32 CFR 1903.17 - Soliciting, vending, and debt collection.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... INTELLIGENCE AGENCY CONDUCT ON AGENCY INSTALLATIONS § 1903.17 Soliciting, vending, and debt collection... 5 CFR parts 110 and 950 as amended and sponsored or approved by the Director of Central Intelligence... compliance with Central Intelligence Agency rules governing the use of such authorized bulletin boards...

  1. 32 CFR 1903.17 - Soliciting, vending, and debt collection.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... INTELLIGENCE AGENCY CONDUCT ON AGENCY INSTALLATIONS § 1903.17 Soliciting, vending, and debt collection... 5 CFR parts 110 and 950 as amended and sponsored or approved by the Director of Central Intelligence... compliance with Central Intelligence Agency rules governing the use of such authorized bulletin boards...

  2. 32 CFR 1903.17 - Soliciting, vending, and debt collection.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... INTELLIGENCE AGENCY CONDUCT ON AGENCY INSTALLATIONS § 1903.17 Soliciting, vending, and debt collection... 5 CFR parts 110 and 950 as amended and sponsored or approved by the Director of Central Intelligence... compliance with Central Intelligence Agency rules governing the use of such authorized bulletin boards...

  3. Assessing Irregular Warfare: A Framework for Intelligence Analysis

    DTIC Science & Technology

    2008-01-01

    AND HEALTH CARE INTERNATIONAL AFFAIRS NATIONAL SECURITY POPULATION AND AGING PUBLIC SAFETY SCIENCE AND TECHNOLOGY SUBSTANCE ABUSE TERRORISM AND...Interim FSTC Foreign Science and Technology Center GMI general military intelligence IED improvised explosive device INSCOM Intelligence and Security...ground forces intelligence in the Department of Defense (DoD).1 NGIC was created in March 1995, when the U.S. Army Foreign Science and Technology

  4. Nuclear Terrorism - Dimensions, Options, and Perspectives in Moldova

    NASA Astrophysics Data System (ADS)

    Vaseashta, Ashok; Susmann, P.; Braman, Eric W.; Enaki, Nicolae A.

    Securing nuclear materials, controlling contraband and preventing proliferation is an international priority to resolve using technology, diplomacy, strategic alliances, and if necessary, targeted military exercises. Nuclear security consists of complementary programs involving international legal and regulatory structure, intelligence and law enforcement agencies, border and customs forces, point and stand-off radiation detectors, personal protection equipment, preparedness for emergency and disaster, and consequence management teams. The strategic goal of UNSCR 1540 and the GICNT is to prevent nuclear materials from finding their way into the hands of our adversaries. This multi-jurisdictional and multi-agency effort demands tremendous coordination, technology assessment, policy development and guidance from several sectors. The overall goal envisions creating a secured environment that controls and protects nuclear materials while maintaining the free flow of commerce and individual liberty on international basis. Integral to such efforts are technologies to sense/detect nuclear material, provide advance information of nuclear smuggling routes, and other advanced means to control nuclear contraband and prevent proliferation. We provide an overview of GICNT and several initiatives supporting such efforts. An overview is provided of technological advances in support of point and stand-off detection and receiving advance information of nuclear material movement from perspectives of the Republic of Moldova.

  5. 77 FR 26258 - Privacy Act of 1974; System of Records

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-05-03

    ...; System of Records AGENCY: Defense Intelligence Agency, DoD. ACTION: Notice to Alter a System of Records. SUMMARY: The Defense Intelligence Agency is proposing to alter a system to its existing inventory of... identifiers or contact information. FOR FURTHER INFORMATION CONTACT: Ms. Theresa Lowery, Defense Intelligence...

  6. 32 CFR 1901.01 - Authority and purpose.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... National Defense Other Regulations Relating to National Defense CENTRAL INTELLIGENCE AGENCY PUBLIC RIGHTS... Intelligence Agency Act of 1949, as amended (50 U.S.C. 403g). (b) Purpose in general. This part prescribes... Intelligence Agency maintains a record concerning them in any non-exempt portion of a system of records or any...

  7. 32 CFR 1901.01 - Authority and purpose.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... National Defense Other Regulations Relating to National Defense CENTRAL INTELLIGENCE AGENCY PUBLIC RIGHTS... Intelligence Agency Act of 1949, as amended (50 U.S.C. 403g). (b) Purpose in general. This part prescribes... Intelligence Agency maintains a record concerning them in any non-exempt portion of a system of records or any...

  8. 75 FR 49946 - National Drug Intelligence Center: Agency Information Collection Activities: Proposed Extension...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-08-16

    ... DEPARTMENT OF JUSTICE [OMB Number 1105-0087] National Drug Intelligence Center: Agency Information...), National Drug Intelligence Center (NDIC), will be submitting the following information collection request... Kevin M. Walker, General Counsel, National Drug Intelligence Center, Fifth Floor, 319 Washington Street...

  9. 32 CFR 319.5 - Procedures for requests pertaining to individual records in a record system.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... OF THE SECRETARY OF DEFENSE (CONTINUED) PRIVACY PROGRAM DEFENSE INTELLIGENCE AGENCY PRIVACY PROGRAM... seeking notification of whether a system of records, maintained by the Defense Intelligence Agency... request to the Defense Intelligence Agency, DSP-1A, Washington, DC 20340-3299 and indicate clearly on the...

  10. 32 CFR 319.5 - Procedures for requests pertaining to individual records in a record system.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... OF THE SECRETARY OF DEFENSE (CONTINUED) PRIVACY PROGRAM DEFENSE INTELLIGENCE AGENCY PRIVACY PROGRAM... seeking notification of whether a system of records, maintained by the Defense Intelligence Agency... request to the Defense Intelligence Agency, DSP-1A, Washington, DC 20340-3299 and indicate clearly on the...

  11. 32 CFR 319.5 - Procedures for requests pertaining to individual records in a record system.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... OF THE SECRETARY OF DEFENSE (CONTINUED) PRIVACY PROGRAM DEFENSE INTELLIGENCE AGENCY PRIVACY PROGRAM... seeking notification of whether a system of records, maintained by the Defense Intelligence Agency... request to the Defense Intelligence Agency, DSP-1A, Washington, DC 20340-3299 and indicate clearly on the...

  12. 78 FR 55274 - Privacy Act of 1974; Department of Homeland Security/Transportation Security Administration-DHS...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-09-10

    ... enforcement, immigration, and intelligence databases, including a fingerprint-based criminal history records... boarding pass printing instruction. If the passenger's identifying information matches the entry on the TSA... enforcement, immigration, intelligence, or other homeland security functions. In addition, TSA may share...

  13. 78 FR 31847 - Designation of National Security Positions in the Competitive Service, and Related Matters

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-05-28

    ... Chapter IV OFFICE OF THE DIRECTOR OF NATIONAL INTELLIGENCE 5 CFR Chapter IV RIN 3206-AM73 Designation of... Management; Office of the Director of National Intelligence. ACTION: Proposed rule and withdrawal of prior... National Intelligence (ODNI) are proposing to issue regulations regarding designation of national security...

  14. Secure, Autonomous, Intelligent Controller for Integrating Distributed Sensor Webs

    NASA Technical Reports Server (NTRS)

    Ivancic, William D.

    2007-01-01

    This paper describes the infrastructure and protocols necessary to enable near-real-time commanding, access to space-based assets, and the secure interoperation between sensor webs owned and controlled by various entities. Select terrestrial and aeronautics-base sensor webs will be used to demonstrate time-critical interoperability between integrated, intelligent sensor webs both terrestrial and between terrestrial and space-based assets. For this work, a Secure, Autonomous, Intelligent Controller and knowledge generation unit is implemented using Virtual Mission Operation Center technology.

  15. Defense.gov Special Report: Leon E. Panetta

    Science.gov Websites

    the Central Intelligence Agency from February 2009 to June 2011. Mr. Panetta led the Agency and managed human intelligence and open source collection programs on behalf of the Intelligence Community

  16. 77 FR 43814 - Privacy Act of 1974; System of Records

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-07-26

    ... Intelligence Agency, DAN 1-C, 600 MacDill Blvd., Washington, DC 20340- 0001 or by phone at (202) 231-1193... Freedom of Information Act Office (DAN-1A), Defense Intelligence Agency, 200 MacDill Blvd., Washington, DC... Information Act Office, Defense Intelligence Agency (DAN-1A), 200 MacDill Blvd., Washington, DC 20340-0001...

  17. Common Criteria related security design patterns--validation on the intelligent sensor example designed for mine environment.

    PubMed

    Bialas, Andrzej

    2010-01-01

    The paper discusses the security issues of intelligent sensors that are able to measure and process data and communicate with other information technology (IT) devices or systems. Such sensors are often used in high risk applications. To improve their robustness, the sensor systems should be developed in a restricted way to provide them with assurance. One of assurance creation methodologies is Common Criteria (ISO/IEC 15408), used for IT products and systems. The contribution of the paper is a Common Criteria compliant and pattern-based method for the intelligent sensors security development. The paper concisely presents this method and its evaluation for the sensor detecting methane in a mine, focusing on the security problem of the intelligent sensor definition and solution. The aim of the validation is to evaluate and improve the introduced method.

  18. 32 CFR 319.2 - Purpose.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... INTELLIGENCE AGENCY PRIVACY PROGRAM § 319.2 Purpose. (a) To promulgate rules providing procedures by which individuals may exercise their rights granted by the act to: (1) Determine whether a Defense Intelligence... for which the Director, Defense Intelligence Agency, claims an exemption. ...

  19. 32 CFR 319.2 - Purpose.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... INTELLIGENCE AGENCY PRIVACY PROGRAM § 319.2 Purpose. (a) To promulgate rules providing procedures by which individuals may exercise their rights granted by the act to: (1) Determine whether a Defense Intelligence... for which the Director, Defense Intelligence Agency, claims an exemption. ...

  20. 32 CFR 319.2 - Purpose.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... INTELLIGENCE AGENCY PRIVACY PROGRAM § 319.2 Purpose. (a) To promulgate rules providing procedures by which individuals may exercise their rights granted by the act to: (1) Determine whether a Defense Intelligence... for which the Director, Defense Intelligence Agency, claims an exemption. ...

  1. Assessing the Impact of Security Behavior on the Awareness of Open-Source Intelligence: A Quantitative Study of IT Knowledge Workers

    ERIC Educational Resources Information Center

    Daniels, Daniel B., III

    2014-01-01

    There is a lack of literature linking end-user behavior to the availability of open-source intelligence (OSINT). Most OSINT literature has been focused on the use and assessment of open-source intelligence, not the proliferation of personally or organizationally identifiable information (PII/OII). Additionally, information security studies have…

  2. 32 CFR 320.12 - Exemptions.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... NATIONAL GEOSPATIAL-INTELLIGENCE AGENCY (NGA) PRIVACY § 320.12 Exemptions. Link to an amendment published... intelligence agencies which may be exempt from certain provisions of the Privacy Act. However, NGA does not... in this system, including law enforcement counterterrorism, investigatory and intelligence records...

  3. Security architecture for health grid using ambient intelligence.

    PubMed

    Naqvi, S; Riguidel, M; Demeure, I

    2005-01-01

    To propose a novel approach of incorporating ambient intelligence in the health grid security architecture. Security concerns are severely impeding the grid community effort in spreading its wings in health applications. In this paper, we have proposed a high level approach to incorporate ambient intelligence for health grid security architecture and have argued that this will significantly improve the current state of the grid security paradigm with an enhanced user-friendly environment. We believe that the time is right to shift the onus of traditional security mechanisms onto the new technologies. The incorporation of ambient intelligence in the security architecture of a grid will not only render a security paradigm robust but also provide an attractive vision for the future of computing by bringing the two worlds together. In this article we propose an evolutionary approach of utilizing smart devices for grid security architecture. We argue that such an infrastructure will impart unique features to the existing grid security paradigms by offering fortified and relentless monitoring. This new security architecture will be comprehensive in nature but will not be cumbersome for the users due to its typical characteristics of not prying into their lives and adapting to their needs. We have identified a new paradigm of the security architecture for a health grid that will not only render a security mechanism robust but will also provide the high levels of user-friendliness. As our approach is a first contribution to this problem, a number of other issues for future research remain open. However, the prospects are fascinating.

  4. Common Criteria Related Security Design Patterns—Validation on the Intelligent Sensor Example Designed for Mine Environment

    PubMed Central

    Bialas, Andrzej

    2010-01-01

    The paper discusses the security issues of intelligent sensors that are able to measure and process data and communicate with other information technology (IT) devices or systems. Such sensors are often used in high risk applications. To improve their robustness, the sensor systems should be developed in a restricted way to provide them with assurance. One of assurance creation methodologies is Common Criteria (ISO/IEC 15408), used for IT products and systems. The contribution of the paper is a Common Criteria compliant and pattern-based method for the intelligent sensors security development. The paper concisely presents this method and its evaluation for the sensor detecting methane in a mine, focusing on the security problem of the intelligent sensor definition and solution. The aim of the validation is to evaluate and improve the introduced method. PMID:22399888

  5. Intelligent Interoperable Agent Toolkit (I2AT)

    DTIC Science & Technology

    2005-02-01

    Agents, Agent Infrastructure, Intelligent Agents 16. PRICE CODE 17. SECURITY CLASSIFICATION OF REPORT UNCLASSIFIED 18. SECURITY ...CLASSIFICATION OF THIS PAGE UNCLASSIFIED 19. SECURITY CLASSIFICATION OF ABSTRACT UNCLASSIFIED 20. LIMITATION OF ABSTRACT UL NSN 7540-01...those that occur while the submarine is submerged. Using CoABS Grid/Jini service discovery events backed up with a small amount of internal bookkeeping

  6. Intelligent Sensors Security

    PubMed Central

    Bialas, Andrzej

    2010-01-01

    The paper is focused on the security issues of sensors provided with processors and software and used for high-risk applications. Common IT related threats may cause serious consequences for sensor system users. To improve their robustness, sensor systems should be developed in a restricted way that would provide them with assurance. One assurance creation methodology is Common Criteria (ISO/IEC 15408) used for IT products and systems. The paper begins with a primer on the Common Criteria, and then a general security model of the intelligent sensor as an IT product is discussed. The paper presents how the security problem of the intelligent sensor is defined and solved. The contribution of the paper is to provide Common Criteria (CC) related security design patterns and to improve the effectiveness of the sensor development process. PMID:22315571

  7. 5 CFR 752.401 - Coverage.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... title 38, United States Code; and (9) An employee of the Government Printing Office. (d) Employees... employee of the Central Intelligence Agency or the General Accounting Office; (8) An employee of the..., the Defense Intelligence Agency, or an intelligence activity of a military department covered under...

  8. 32 CFR 1907.02 - Definitions.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... Defense Other Regulations Relating to National Defense CENTRAL INTELLIGENCE AGENCY CHALLENGES TO... means the United States Central Intelligence Agency acting through the CIA Information and Privacy... Agency Release Panel; (g) Information means any knowledge that can be communicated or documentary...

  9. 32 CFR 1907.02 - Definitions.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... Defense Other Regulations Relating to National Defense CENTRAL INTELLIGENCE AGENCY CHALLENGES TO... means the United States Central Intelligence Agency acting through the CIA Information and Privacy... Agency Release Panel; (g) Information means any knowledge that can be communicated or documentary...

  10. 32 CFR 1907.02 - Definitions.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... Defense Other Regulations Relating to National Defense CENTRAL INTELLIGENCE AGENCY CHALLENGES TO... means the United States Central Intelligence Agency acting through the CIA Information and Privacy... Agency Release Panel; (g) Information means any knowledge that can be communicated or documentary...

  11. Standards-based sensor interoperability and networking SensorWeb: an overview

    NASA Astrophysics Data System (ADS)

    Bolling, Sam

    2012-06-01

    The War fighter lacks a unified Intelligence, Surveillance, and Reconnaissance (ISR) environment to conduct mission planning, command and control (C2), tasking, collection, exploitation, processing, and data discovery of disparate sensor data across the ISR Enterprise. Legacy sensors and applications are not standardized or integrated for assured, universal access. Existing tasking and collection capabilities are not unified across the enterprise, inhibiting robust C2 of ISR including near-real time, cross-cueing operations. To address these critical needs, the National Measurement and Signature Intelligence (MASINT) Office (NMO), and partnering Combatant Commands and Intelligence Agencies are developing SensorWeb, an architecture that harmonizes heterogeneous sensor data to a common standard for users to discover, access, observe, subscribe to and task sensors. The SensorWeb initiative long term goal is to establish an open commercial standards-based, service-oriented framework to facilitate plug and play sensors. The current development effort will produce non-proprietary deliverables, intended as a Government off the Shelf (GOTS) solution to address the U.S. and Coalition nations' inability to quickly and reliably detect, identify, map, track, and fully understand security threats and operational activities.

  12. Common Criteria Related Security Design Patterns for Intelligent Sensors—Knowledge Engineering-Based Implementation

    PubMed Central

    Bialas, Andrzej

    2011-01-01

    Intelligent sensors experience security problems very similar to those inherent to other kinds of IT products or systems. The assurance for these products or systems creation methodologies, like Common Criteria (ISO/IEC 15408) can be used to improve the robustness of the sensor systems in high risk environments. The paper presents the background and results of the previous research on patterns-based security specifications and introduces a new ontological approach. The elaborated ontology and knowledge base were validated on the IT security development process dealing with the sensor example. The contribution of the paper concerns the application of the knowledge engineering methodology to the previously developed Common Criteria compliant and pattern-based method for intelligent sensor security development. The issue presented in the paper has a broader significance in terms that it can solve information security problems in many application domains. PMID:22164064

  13. Common criteria related security design patterns for intelligent sensors--knowledge engineering-based implementation.

    PubMed

    Bialas, Andrzej

    2011-01-01

    Intelligent sensors experience security problems very similar to those inherent to other kinds of IT products or systems. The assurance for these products or systems creation methodologies, like Common Criteria (ISO/IEC 15408) can be used to improve the robustness of the sensor systems in high risk environments. The paper presents the background and results of the previous research on patterns-based security specifications and introduces a new ontological approach. The elaborated ontology and knowledge base were validated on the IT security development process dealing with the sensor example. The contribution of the paper concerns the application of the knowledge engineering methodology to the previously developed Common Criteria compliant and pattern-based method for intelligent sensor security development. The issue presented in the paper has a broader significance in terms that it can solve information security problems in many application domains.

  14. Pathfinder, v7 n1, Jan/Feb 2009. Making an Intelligence Difference

    DTIC Science & Technology

    2009-02-01

    ORGANIZATION NAME(S) AND ADDRESS(ES) National Geospatial-Intelligence Agency,Office of Corporate Communications,4600 Sangamore Road ,Bethesda,MD, 20816 ...Published by the National Geospatial-Intelligence Agency Office of Corporate Communications 4600 Sangamore Road, Mail Stop D-54 Bethesda, MD 20816

  15. 75 FR 30003 - Privacy Act of 1974; System of Records

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-05-28

    ...; System of Records AGENCY: Defense Intelligence Agency, DoD. ACTION: Notice to delete a system of records. SUMMARY: The Defense Intelligence Agency proposes to delete a system of records notice in its existing...) 231-1193. [[Page 30004

  16. Power Grid Maintenance Scheduling Intelligence Arrangement Supporting System Based on Power Flow Forecasting

    NASA Astrophysics Data System (ADS)

    Xie, Chang; Wen, Jing; Liu, Wenying; Wang, Jiaming

    With the development of intelligent dispatching, the intelligence level of network control center full-service urgent need to raise. As an important daily work of network control center, the application of maintenance scheduling intelligent arrangement to achieve high-quality and safety operation of power grid is very important. By analyzing the shortages of the traditional maintenance scheduling software, this paper designs a power grid maintenance scheduling intelligence arrangement supporting system based on power flow forecasting, which uses the advanced technologies in maintenance scheduling, such as artificial intelligence, online security checking, intelligent visualization techniques. It implements the online security checking of maintenance scheduling based on power flow forecasting and power flow adjusting based on visualization, in order to make the maintenance scheduling arrangement moreintelligent and visual.

  17. 49 CFR 33.40 - General provisions.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... Priorities Assistance § 33.40 General provisions. (a) TPAS is designed to be largely self-executing. However... immediately contact DOT's Defense Production Act Activities Coordinator, Office of Intelligence, Security, and... rule) to the Defense Production Act Activities Coordinator, Office of Intelligence, Security, and...

  18. 49 CFR 33.40 - General provisions.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... Priorities Assistance § 33.40 General provisions. (a) TPAS is designed to be largely self-executing. However... immediately contact DOT's Defense Production Act Activities Coordinator, Office of Intelligence, Security, and... rule) to the Defense Production Act Activities Coordinator, Office of Intelligence, Security, and...

  19. State of Maryland Intelligent Transportation Systems: Security and Implementation Recommendations.

    DOT National Transportation Integrated Search

    1997-11-01

    At the direction of the Volpe National Transportation Systems Center of the US Department of Transportation (US DOT), a two-phase study of the security vulnerability of Maryland Intelligent Transportation Systems (ITS) was conducted from July until N...

  20. 76 FR 59032 - Mandatory Declassification Review

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-09-23

    ... CENTRAL INTELLIGENCE AGENCY 32 CFR Part 1908 Mandatory Declassification Review AGENCY: Central... Central Intelligence Agency (CIA) has undertaken and completed a review of its public Mandatory Declassification Review (MDR) regulations that govern certain aspects of its processing of MDR requests. As a...

  1. 32 CFR 1903.9 - Explosives.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 32 National Defense 6 2011-07-01 2011-07-01 false Explosives. 1903.9 Section 1903.9 National Defense Other Regulations Relating to National Defense CENTRAL INTELLIGENCE AGENCY CONDUCT ON AGENCY... applicable Central Intelligence Agency rules and/or regulations. (b) Using, possessing, storing, or...

  2. 32 CFR 1903.9 - Explosives.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 32 National Defense 6 2013-07-01 2013-07-01 false Explosives. 1903.9 Section 1903.9 National Defense Other Regulations Relating to National Defense CENTRAL INTELLIGENCE AGENCY CONDUCT ON AGENCY... applicable Central Intelligence Agency rules and/or regulations. (b) Using, possessing, storing, or...

  3. 32 CFR 1903.9 - Explosives.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 32 National Defense 6 2012-07-01 2012-07-01 false Explosives. 1903.9 Section 1903.9 National Defense Other Regulations Relating to National Defense CENTRAL INTELLIGENCE AGENCY CONDUCT ON AGENCY... applicable Central Intelligence Agency rules and/or regulations. (b) Using, possessing, storing, or...

  4. 32 CFR 1903.9 - Explosives.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 32 National Defense 6 2010-07-01 2010-07-01 false Explosives. 1903.9 Section 1903.9 National Defense Other Regulations Relating to National Defense CENTRAL INTELLIGENCE AGENCY CONDUCT ON AGENCY... applicable Central Intelligence Agency rules and/or regulations. (b) Using, possessing, storing, or...

  5. 32 CFR 1903.9 - Explosives.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 32 National Defense 6 2014-07-01 2014-07-01 false Explosives. 1903.9 Section 1903.9 National Defense Other Regulations Relating to National Defense CENTRAL INTELLIGENCE AGENCY CONDUCT ON AGENCY... applicable Central Intelligence Agency rules and/or regulations. (b) Using, possessing, storing, or...

  6. Intelligent Processing Equipment Within the Environmental Protection Agency

    NASA Technical Reports Server (NTRS)

    Greathouse, Daniel G.; Nalesnik, Richard P.

    1992-01-01

    Protection of the environment and environmental remediation requires the cooperation, at all levels, of government and industry. Intelligent processing equipment, in addition to other artificial intelligence based tools, was used by the Environmental Protection Agency to provide personnel safety and improve the efficiency of those responsible for protection and remediation of the environment. These exploratory efforts demonstrate the feasibility and utility of expanding development and widespread use of these tools. A survey of current intelligent processing equipment applications in the Agency is presented and is followed by a brief discussion of possible uses in the future.

  7. Neuroscience, ethics, and national security: the state of the art.

    PubMed

    Tennison, Michael N; Moreno, Jonathan D

    2012-01-01

    National security organizations in the United States, including the armed services and the intelligence community, have developed a close relationship with the scientific establishment. The latest technology often fuels warfighting and counter-intelligence capacities, providing the tactical advantages thought necessary to maintain geopolitical dominance and national security. Neuroscience has emerged as a prominent focus within this milieu, annually receiving hundreds of millions of Department of Defense dollars. Its role in national security operations raises ethical issues that need to be addressed to ensure the pragmatic synthesis of ethical accountability and national security.

  8. Information security system quality assessment through the intelligent tools

    NASA Astrophysics Data System (ADS)

    Trapeznikov, E. V.

    2018-04-01

    The technology development has shown the automated system information security comprehensive analysis necessity. The subject area analysis indicates the study relevance. The research objective is to develop the information security system quality assessment methodology based on the intelligent tools. The basis of the methodology is the information security assessment model in the information system through the neural network. The paper presents the security assessment model, its algorithm. The methodology practical implementation results in the form of the software flow diagram are represented. The practical significance of the model being developed is noted in conclusions.

  9. Democratization of Intelligence: Melding Strategic Intelligence and National Discourse

    DTIC Science & Technology

    2009-07-01

    encourages research on intelligence issues that distills lessons and improves Intelligence Community capabilities for policy-level and operational...2006). “Organizational Culture Challenges to Interagency and Intelligence Community Communication and Interaction.” A paper submitted to the Faculty...HOCHSTEIN, Miles. (1993). “Epistemic Communities : Intelligence Studies and International Relations,” Intelligence and National Security, 8, no. 3

  10. 75 FR 62857 - Agency Information Collection Activities: Proposed Extension With Change of a Previously Approved...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-10-13

    ... DEPARTMENT OF JUSTICE National Drug Intelligence Center [OMB Number 1105-0087] Agency Information... of Justice (DOJ), National Drug Intelligence Center (NDIC), will be submitting the following... technicians, medical examiners); and other specific groups such as drug intelligence analysts. The NDIC has...

  11. United States Air Force Statistical Digest, Jan 1949-Jun 1950, Fifth Edition

    DTIC Science & Technology

    1951-04-25

    94.7437 0 • 51 (Face p. 10) PERSONNEL - MILITARY AND CIVILIAN The data presented in this part of the ~USAF Statistical DigesP are bll.$ed on audited ...Quarter ~rtor ~""r ~""r II’ORUlll’IDB ’TOrage Personnel Strength 159,757 16>,996 626,871 168,101 154,643 150,574 152,953 Acca "ioM _ ToW • ~ ~ ~ ~ UU l...Strategic Intelligence Army Language School Accountin& and Auditing AJ’lllJ’ Security Agency Officer, General Automatic Telephone syst8m 1l.aintenance Basic

  12. 78 FR 69551 - Privacy Act; Implementation

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-11-20

    ... Privacy Act; Implementation AGENCY: Defense Intelligence Agency, DoD. ACTION: Direct final rule with request for comments. SUMMARY: Defense Intelligence Agency (DIA) is proposing to update the DIA Privacy... Privacy Program rules that will exempt applicable Department records and/or material from certain portions...

  13. National Intelligence: A Consumer’s Guide

    DTIC Science & Technology

    2009-01-01

    execution of that budget. The National Intelligence Program (NIP), formerly known as the National Foreign Intelligence Program ( NFIP ), provides the...Clandestine Service NCTC: National Counterterrorism Center NDIC: National Defense Intelligence College (DIA – formerly JMIC) NFIP : National Foreign...Center (ODNI) NIE: National Intelligence Estimate NIP: National Intelligence Program (formerly NFIP ) NIPRNet: Non-Secure Internet Protocol Router

  14. Thutmose - Investigation of Machine Learning-Based Intrusion Detection Systems

    DTIC Science & Technology

    2016-06-01

    research is being done to incorporate the field of machine learning into intrusion detection. Machine learning is a branch of artificial intelligence (AI...adversarial drift." Proceedings of the 2013 ACM workshop on Artificial intelligence and security. ACM. (2013) Kantarcioglu, M., Xi, B., and Clifton, C. "A...34 Proceedings of the 4th ACM workshop on Security and artificial intelligence . ACM. (2011) Dua, S., and Du, X. Data Mining and Machine Learning in

  15. The Federal Conference on Intelligent Processing Equipment

    NASA Technical Reports Server (NTRS)

    1992-01-01

    Research and development projects involving intelligent processing equipment within the following U.S. agencies are addressed: Department of Agriculture, Department of Commerce, Department of Energy, Department of Defense, Environmental Protection Agency, Federal Emergency Management Agency, NASA, National Institutes of Health, and the National Science Foundation.

  16. 32 CFR 1906.149 - Program accessibility: Discrimination prohibited.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... INTELLIGENCE AGENCY ENFORCEMENT OF NONDISCRIMINATION ON THE BASIS OF HANDICAP IN PROGRAMS OR ACTIVITIES CONDUCTED BY THE CENTRAL INTELLIGENCE AGENCY § 1906.149 Program accessibility: Discrimination prohibited...

  17. 32 CFR 1906.149 - Program accessibility: Discrimination prohibited.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... INTELLIGENCE AGENCY ENFORCEMENT OF NONDISCRIMINATION ON THE BASIS OF HANDICAP IN PROGRAMS OR ACTIVITIES CONDUCTED BY THE CENTRAL INTELLIGENCE AGENCY § 1906.149 Program accessibility: Discrimination prohibited...

  18. 32 CFR 1906.149 - Program accessibility: Discrimination prohibited.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... INTELLIGENCE AGENCY ENFORCEMENT OF NONDISCRIMINATION ON THE BASIS OF HANDICAP IN PROGRAMS OR ACTIVITIES CONDUCTED BY THE CENTRAL INTELLIGENCE AGENCY § 1906.149 Program accessibility: Discrimination prohibited...

  19. 32 CFR 1906.149 - Program accessibility: Discrimination prohibited.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... INTELLIGENCE AGENCY ENFORCEMENT OF NONDISCRIMINATION ON THE BASIS OF HANDICAP IN PROGRAMS OR ACTIVITIES CONDUCTED BY THE CENTRAL INTELLIGENCE AGENCY § 1906.149 Program accessibility: Discrimination prohibited...

  20. 32 CFR 1906.149 - Program accessibility: Discrimination prohibited.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... INTELLIGENCE AGENCY ENFORCEMENT OF NONDISCRIMINATION ON THE BASIS OF HANDICAP IN PROGRAMS OR ACTIVITIES CONDUCTED BY THE CENTRAL INTELLIGENCE AGENCY § 1906.149 Program accessibility: Discrimination prohibited...

  1. 77 FR 56625 - Privacy Act of 1974; System of Records

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-09-13

    ...: Ms. Theresa Lowery at Defense Intelligence Agency, DAN 1-C, 600 MacDill Blvd., Washington, DC 20340... address written inquiries to the DIA Freedom of Information Act Office (DAN-1A), Defense Intelligence... written inquiries to the DIA Freedom of Information Act Office, Defense Intelligence Agency (DAN-1A), 200...

  2. 32 CFR 1906.150 - Program accessibility: Existing facilities.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... INTELLIGENCE AGENCY ENFORCEMENT OF NONDISCRIMINATION ON THE BASIS OF HANDICAP IN PROGRAMS OR ACTIVITIES CONDUCTED BY THE CENTRAL INTELLIGENCE AGENCY § 1906.150 Program accessibility: Existing facilities. (a...

  3. 32 CFR 1906.150 - Program accessibility: Existing facilities.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... INTELLIGENCE AGENCY ENFORCEMENT OF NONDISCRIMINATION ON THE BASIS OF HANDICAP IN PROGRAMS OR ACTIVITIES CONDUCTED BY THE CENTRAL INTELLIGENCE AGENCY § 1906.150 Program accessibility: Existing facilities. (a...

  4. 32 CFR 1906.150 - Program accessibility: Existing facilities.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... INTELLIGENCE AGENCY ENFORCEMENT OF NONDISCRIMINATION ON THE BASIS OF HANDICAP IN PROGRAMS OR ACTIVITIES CONDUCTED BY THE CENTRAL INTELLIGENCE AGENCY § 1906.150 Program accessibility: Existing facilities. (a...

  5. 32 CFR 1906.150 - Program accessibility: Existing facilities.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... INTELLIGENCE AGENCY ENFORCEMENT OF NONDISCRIMINATION ON THE BASIS OF HANDICAP IN PROGRAMS OR ACTIVITIES CONDUCTED BY THE CENTRAL INTELLIGENCE AGENCY § 1906.150 Program accessibility: Existing facilities. (a...

  6. 32 CFR 1906.150 - Program accessibility: Existing facilities.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... INTELLIGENCE AGENCY ENFORCEMENT OF NONDISCRIMINATION ON THE BASIS OF HANDICAP IN PROGRAMS OR ACTIVITIES CONDUCTED BY THE CENTRAL INTELLIGENCE AGENCY § 1906.150 Program accessibility: Existing facilities. (a...

  7. A Dynamic Security Framework for Ambient Intelligent Systems: A Smart-Home Based eHealth Application

    NASA Astrophysics Data System (ADS)

    Compagna, Luca; El Khoury, Paul; Massacci, Fabio; Saidane, Ayda

    Providing context-dependent security services is an important challenge for ambient intelligent systems. The complexity and the unbounded nature of such systems make it difficult even for the most experienced and knowledgeable security engineers, to foresee all possible situations and interactions when developing the system. In order to solve this problem context based self- diagnosis and reconfiguration at runtime should be provided.

  8. 32 CFR 319.6 - Disclosure of requested information to individuals.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... DEFENSE (CONTINUED) PRIVACY PROGRAM DEFENSE INTELLIGENCE AGENCY PRIVACY PROGRAM § 319.6 Disclosure of requested information to individuals. The Defense Intelligence Agency, upon receiving a request for...

  9. 32 CFR 319.6 - Disclosure of requested information to individuals.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... DEFENSE (CONTINUED) PRIVACY PROGRAM DEFENSE INTELLIGENCE AGENCY PRIVACY PROGRAM § 319.6 Disclosure of requested information to individuals. The Defense Intelligence Agency, upon receiving a request for...

  10. 32 CFR 1906.130 - General prohibitions against discrimination.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... INTELLIGENCE AGENCY ENFORCEMENT OF NONDISCRIMINATION ON THE BASIS OF HANDICAP IN PROGRAMS OR ACTIVITIES CONDUCTED BY THE CENTRAL INTELLIGENCE AGENCY § 1906.130 General prohibitions against discrimination. (a) No...

  11. 32 CFR 319.6 - Disclosure of requested information to individuals.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... DEFENSE (CONTINUED) PRIVACY PROGRAM DEFENSE INTELLIGENCE AGENCY PRIVACY PROGRAM § 319.6 Disclosure of requested information to individuals. The Defense Intelligence Agency, upon receiving a request for...

  12. 32 CFR 319.1 - Authority.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... INTELLIGENCE AGENCY PRIVACY PROGRAM § 319.1 Authority. Pursuant to the requirements of section 553 of Title 5 of the United States Code, the Defense Intelligence Agency promulgates its rules for the...

  13. 32 CFR 319.1 - Authority.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... INTELLIGENCE AGENCY PRIVACY PROGRAM § 319.1 Authority. Pursuant to the requirements of section 553 of Title 5 of the United States Code, the Defense Intelligence Agency promulgates its rules for the...

  14. 32 CFR 319.1 - Authority.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... INTELLIGENCE AGENCY PRIVACY PROGRAM § 319.1 Authority. Pursuant to the requirements of section 553 of Title 5 of the United States Code, the Defense Intelligence Agency promulgates its rules for the...

  15. 32 CFR 1906.130 - General prohibitions against discrimination.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... INTELLIGENCE AGENCY ENFORCEMENT OF NONDISCRIMINATION ON THE BASIS OF HANDICAP IN PROGRAMS OR ACTIVITIES CONDUCTED BY THE CENTRAL INTELLIGENCE AGENCY § 1906.130 General prohibitions against discrimination. (a) No...

  16. 32 CFR 1906.130 - General prohibitions against discrimination.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... INTELLIGENCE AGENCY ENFORCEMENT OF NONDISCRIMINATION ON THE BASIS OF HANDICAP IN PROGRAMS OR ACTIVITIES CONDUCTED BY THE CENTRAL INTELLIGENCE AGENCY § 1906.130 General prohibitions against discrimination. (a) No...

  17. 32 CFR 1906.130 - General prohibitions against discrimination.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... INTELLIGENCE AGENCY ENFORCEMENT OF NONDISCRIMINATION ON THE BASIS OF HANDICAP IN PROGRAMS OR ACTIVITIES CONDUCTED BY THE CENTRAL INTELLIGENCE AGENCY § 1906.130 General prohibitions against discrimination. (a) No...

  18. 32 CFR 1906.130 - General prohibitions against discrimination.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... INTELLIGENCE AGENCY ENFORCEMENT OF NONDISCRIMINATION ON THE BASIS OF HANDICAP IN PROGRAMS OR ACTIVITIES CONDUCTED BY THE CENTRAL INTELLIGENCE AGENCY § 1906.130 General prohibitions against discrimination. (a) No...

  19. Neuroscience, Ethics, and National Security: The State of the Art

    PubMed Central

    Tennison, Michael N.; Moreno, Jonathan D.

    2012-01-01

    National security organizations in the United States, including the armed services and the intelligence community, have developed a close relationship with the scientific establishment. The latest technology often fuels warfighting and counter-intelligence capacities, providing the tactical advantages thought necessary to maintain geopolitical dominance and national security. Neuroscience has emerged as a prominent focus within this milieu, annually receiving hundreds of millions of Department of Defense dollars. Its role in national security operations raises ethical issues that need to be addressed to ensure the pragmatic synthesis of ethical accountability and national security. PMID:22448146

  20. 32 CFR 320.1 - Purpose and scope.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... NATIONAL GEOSPATIAL-INTELLIGENCE AGENCY (NGA) PRIVACY § 320.1 Purpose and scope. (a) This part is published... whether the National Geospatial-Intelligence Agency (NGA) maintains or has disclosed a record pertaining...

  1. 32 CFR 320.1 - Purpose and scope.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... NATIONAL GEOSPATIAL-INTELLIGENCE AGENCY (NGA) PRIVACY § 320.1 Purpose and scope. (a) This part is published... whether the National Geospatial-Intelligence Agency (NGA) maintains or has disclosed a record pertaining...

  2. 32 CFR 1906.151 - Program accessibility: New construction and alterations.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... INTELLIGENCE AGENCY ENFORCEMENT OF NONDISCRIMINATION ON THE BASIS OF HANDICAP IN PROGRAMS OR ACTIVITIES CONDUCTED BY THE CENTRAL INTELLIGENCE AGENCY § 1906.151 Program accessibility: New construction and...

  3. 32 CFR 1906.151 - Program accessibility: New construction and alterations.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... INTELLIGENCE AGENCY ENFORCEMENT OF NONDISCRIMINATION ON THE BASIS OF HANDICAP IN PROGRAMS OR ACTIVITIES CONDUCTED BY THE CENTRAL INTELLIGENCE AGENCY § 1906.151 Program accessibility: New construction and...

  4. 32 CFR 1906.151 - Program accessibility: New construction and alterations.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... INTELLIGENCE AGENCY ENFORCEMENT OF NONDISCRIMINATION ON THE BASIS OF HANDICAP IN PROGRAMS OR ACTIVITIES CONDUCTED BY THE CENTRAL INTELLIGENCE AGENCY § 1906.151 Program accessibility: New construction and...

  5. 32 CFR 320.1 - Purpose and scope.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... NATIONAL GEOSPATIAL-INTELLIGENCE AGENCY (NGA) PRIVACY § 320.1 Purpose and scope. (a) This part is published... whether the National Geospatial-Intelligence Agency (NGA) maintains or has disclosed a record pertaining...

  6. 32 CFR 1906.151 - Program accessibility: New construction and alterations.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... INTELLIGENCE AGENCY ENFORCEMENT OF NONDISCRIMINATION ON THE BASIS OF HANDICAP IN PROGRAMS OR ACTIVITIES CONDUCTED BY THE CENTRAL INTELLIGENCE AGENCY § 1906.151 Program accessibility: New construction and...

  7. 32 CFR 1906.151 - Program accessibility: New construction and alterations.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... INTELLIGENCE AGENCY ENFORCEMENT OF NONDISCRIMINATION ON THE BASIS OF HANDICAP IN PROGRAMS OR ACTIVITIES CONDUCTED BY THE CENTRAL INTELLIGENCE AGENCY § 1906.151 Program accessibility: New construction and...

  8. Defense.gov Special Report: Defense Intelligence

    Science.gov Websites

    Department of Defense Submit Search Defense intelligence is critical to the Defense Department's role in and conduct successful military and security operations that protect America. Defense Intelligence News Story Intelligence Chief Describes 'Pervasive Uncertainty' of Worldwide Threats "

  9. 32 CFR 1901.03 - Contact for general information and requests.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... INTELLIGENCE AGENCY PUBLIC RIGHTS UNDER THE PRIVACY ACT OF 1974 General § 1901.03 Contact for general... and Privacy Coordinator, Central Intelligence Agency, Washington, DC. 20505. Requests with the...

  10. 32 CFR 1901.03 - Contact for general information and requests.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... INTELLIGENCE AGENCY PUBLIC RIGHTS UNDER THE PRIVACY ACT OF 1974 General § 1901.03 Contact for general... and Privacy Coordinator, Central Intelligence Agency, Washington, DC. 20505. Requests with the...

  11. Assessing Intelligence Operation/Fusion/Coordination Centers for Efficiency Opportunities

    DTIC Science & Technology

    2013-02-28

    intelligence ], HUMINT [human intelligence ], GEOINT [geospatial intelligence ], or even open source information into the NIC-C. There is no...centers have and continue to be stood up to improve the collaboration across intelligence organizatons addressing national security threats. Open ... source review of journals and books describing changes in the intelligence community organizational structure since September 2001, were reviewed to

  12. The Literature of Competitive Intelligence.

    ERIC Educational Resources Information Center

    Walker, Thomas D.

    1994-01-01

    Describes competitive intelligence (CI) literature in terms of its location, quantity, authorship, length, and problems of bibliographic access. Highlights include subject access; competitive intelligence research; espionage and security; monographs; and journals. (21 references) (LRW)

  13. 32 CFR 319.8 - Request for correction or amendment to record.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... DEFENSE (CONTINUED) PRIVACY PROGRAM DEFENSE INTELLIGENCE AGENCY PRIVACY PROGRAM § 319.8 Request for correction or amendment to record. (a) An individual may request that the Defense Intelligence Agency correct...

  14. 32 CFR 319.8 - Request for correction or amendment to record.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... DEFENSE (CONTINUED) PRIVACY PROGRAM DEFENSE INTELLIGENCE AGENCY PRIVACY PROGRAM § 319.8 Request for correction or amendment to record. (a) An individual may request that the Defense Intelligence Agency correct...

  15. 32 CFR 319.8 - Request for correction or amendment to record.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... DEFENSE (CONTINUED) PRIVACY PROGRAM DEFENSE INTELLIGENCE AGENCY PRIVACY PROGRAM § 319.8 Request for correction or amendment to record. (a) An individual may request that the Defense Intelligence Agency correct...

  16. Blood and Treasure: The U.S. Debt and Its Implications for National Defense and Security

    DTIC Science & Technology

    2012-12-01

    Reserve Board, “Major Foreign Holders of Treasury Securities ,” 15 May 2012. http://www.treasury.gov/resource-center/ data -chart- center/tic/Documents...Coupled with numerous cyber -attacks and theft of intelligence, China could be performing dry runs and gaining intelligence on every occasion for the...THE U.S. DEBT AND ITS IMPLICATIONS FOR NATIONAL DEFENSE AND SECURITY by Nicholas C. Malokofsky December 2012 Thesis Advisor: Carolyn

  17. Counter-Intelligence as a Chaotic Phenomenon and Its Importance in National Security

    NASA Astrophysics Data System (ADS)

    Kuloğlu, Gökhan; Gül, Zakir; Erçetin, Şefika Şule

    In today's rapidly changing globalized world, remarkably fast and important developments have been faced in the area of national security as in almost all other areas. Advancements in communication and transportation technologies have removed physical boundaries almost completely. National security institutions now have to fight against new and complicated security threats that go beyond the boundaries such as organized crimes and terror crimes. These ever-changing threats and dangerous environment which become more and more complex every single day force nations to review their current security structures and to take new and effective measures in the required areas in order to ensure their national security. As a matter of fact, counter-intelligence, which was quite important due to the frequency of spying acts during the Cold War but lost its importance after the Cold War had ended, has been one of these measures. Today, counterintelligence has once again become one of the most important functions in the fight against national security threats with changing dimensions. It is only possible for a nation to ensure its national security fully by having not only a defensive and passive approach but also offensive counter-intelligence.

  18. Managing the Aviation Insider Threat

    DTIC Science & Technology

    2010-12-01

    World Airport NSAS National Strategy for Aviation Security OIS Office of Intelligence SIDA Security Identification Display Area STA Security...Security of the secured area”, 1542.205, “Security of the security identification display area ( SIDA )”, and 1542.209, “Fingerprint-based criminal

  19. A Collection of Technical Studies Completed for the Computer-Aided Acquisition and Logistic Support (CALS) Program Fiscal Year 1988. Volume 1. Text, Security and Data Management

    DTIC Science & Technology

    1991-03-01

    management methodologies claim to be "expert systems" with security intelligence built into them to I derive a body of both facts and speculative data ... Data Administration considerations . III -21 IV. ARTIFICIAL INTELLIGENCE . .. .. .. . .. IV - 1 A. Description of Technologies . . . . . .. IV - 1 1...as intelligent gateways, wide area networks, and distributed databases for the distribution of logistics products. The integrity of CALS data and the

  20. Intelligent cloud computing security using genetic algorithm as a computational tools

    NASA Astrophysics Data System (ADS)

    Razuky AL-Shaikhly, Mazin H.

    2018-05-01

    An essential change had occurred in the field of Information Technology which represented with cloud computing, cloud giving virtual assets by means of web yet awesome difficulties in the field of information security and security assurance. Currently main problem with cloud computing is how to improve privacy and security for cloud “cloud is critical security”. This paper attempts to solve cloud security by using intelligent system with genetic algorithm as wall to provide cloud data secure, all services provided by cloud must detect who receive and register it to create list of users (trusted or un-trusted) depend on behavior. The execution of present proposal has shown great outcome.

  1. 32 CFR 292.7 - Filing an appeal for refusal to make records available.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... DEFENSE (CONTINUED) FREEDOM OF INFORMATION ACT PROGRAM DEFENSE INTELLIGENCE AGENCY (DIA) FREEDOM OF...: Defense Intelligence Agency, ATTN: DSP-1A (FOIA), Washington, DC 20340-3299. (b) The requester shall be...

  2. 32 CFR 292.6 - FOIA exemptions.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... INFORMATION ACT PROGRAM DEFENSE INTELLIGENCE AGENCY (DIA) FREEDOM OF INFORMATION ACT § 292.6 FOIA exemptions... footnote 1 to § 292.3(a)(3). 5 Forward requests to: Defense Intelligence Agency, ATTN: DSP-1A (FOIA...

  3. 32 CFR 292.6 - FOIA exemptions.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... INFORMATION ACT PROGRAM DEFENSE INTELLIGENCE AGENCY (DIA) FREEDOM OF INFORMATION ACT § 292.6 FOIA exemptions... footnote 1 to § 292.3(a)(3). 5 Forward requests to: Defense Intelligence Agency, ATTN: DSP-1A (FOIA...

  4. 32 CFR 292.6 - FOIA exemptions.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... INFORMATION ACT PROGRAM DEFENSE INTELLIGENCE AGENCY (DIA) FREEDOM OF INFORMATION ACT § 292.6 FOIA exemptions... footnote 1 to § 292.3(a)(3). 5 Forward requests to: Defense Intelligence Agency, ATTN: DSP-1A (FOIA...

  5. 32 CFR 292.7 - Filing an appeal for refusal to make records available.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... DEFENSE (CONTINUED) FREEDOM OF INFORMATION ACT PROGRAM DEFENSE INTELLIGENCE AGENCY (DIA) FREEDOM OF...: Defense Intelligence Agency, ATTN: DSP-1A (FOIA), Washington, DC 20340-3299. (b) The requester shall be...

  6. 32 CFR 292.7 - Filing an appeal for refusal to make records available.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... DEFENSE (CONTINUED) FREEDOM OF INFORMATION ACT PROGRAM DEFENSE INTELLIGENCE AGENCY (DIA) FREEDOM OF...: Defense Intelligence Agency, ATTN: DSP-1A (FOIA), Washington, DC 20340-3299. (b) The requester shall be...

  7. 32 CFR 1900.03 - Contact for general information and requests.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... INTELLIGENCE AGENCY PUBLIC ACCESS TO CIA RECORDS UNDER THE FREEDOM OF INFORMATION ACT (FOIA) General § 1900.03... communication in writing to the Information and Privacy Coordinator, Central Intelligence Agency, Washington, DC...

  8. 32 CFR 1900.03 - Contact for general information and requests.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... INTELLIGENCE AGENCY PUBLIC ACCESS TO CIA RECORDS UNDER THE FREEDOM OF INFORMATION ACT (FOIA) General § 1900.03... communication in writing to the Information and Privacy Coordinator, Central Intelligence Agency, Washington, DC...

  9. Population, environment and security: a new trinity.

    PubMed

    Hartmann, B

    1998-10-01

    This paper critically examines the literature on the interaction between population, the environment, and development. It posits that population pressure and resource scarcities are unfairly blamed for internal conflicts in Africa, Asia, and Latin America. Internal conflicts are, in fact, affected by underlying economic and political causes (international companies, development assistance agencies, and military). This reasoning implies that the national security threats are environmental groups, poor women, and social change groups, which in fact should be integrated within solutions to poverty, environmental destruction, and violence. The US military's focus on "neutralizing environmental consequences that could lead to instability" and promoting sustainable development is misspecified and falls within the domain of civilian agencies. Use of military satellites by the US Central Intelligence Agency in environmental surveillance raises questions about the management of secret archives. The scarcity-conflict model has an indirect role in misshaping public opinion, legitimizes population control as a top priority, neglects gender issues, and dehumanizes refugees. Evidence indicates that the conflicts in Rwanda were the result of institutional failure and ethnic divisions. Homer-Dixon's model fails due to weak definitions of scarcity, ignorance of the role of colonial history and economic inequities, idealized views of the state, and neglect of external factors. The scarcity-conflict model is popular due to opportunism and political pragmatism. For the military, it provides new rationales for a huge budget.

  10. Measures for assessing architectural speech security (privacy) of closed offices and meeting rooms.

    PubMed

    Gover, Bradford N; Bradley, John S

    2004-12-01

    Objective measures were investigated as predictors of the speech security of closed offices and rooms. A new signal-to-noise type measure is shown to be a superior indicator for security than existing measures such as the Articulation Index, the Speech Intelligibility Index, the ratio of the loudness of speech to that of noise, and the A-weighted level difference of speech and noise. This new measure is a weighted sum of clipped one-third-octave-band signal-to-noise ratios; various weightings and clipping levels are explored. Listening tests had 19 subjects rate the audibility and intelligibility of 500 English sentences, filtered to simulate transmission through various wall constructions, and presented along with background noise. The results of the tests indicate that the new measure is highly correlated with sentence intelligibility scores and also with three security thresholds: the threshold of intelligibility (below which speech is unintelligible), the threshold of cadence (below which the cadence of speech is inaudible), and the threshold of audibility (below which speech is inaudible). The ratio of the loudness of speech to that of noise, and simple A-weighted level differences are both shown to be well correlated with these latter two thresholds (cadence and audibility), but not well correlated with intelligibility.

  11. A review of physical security robotics at Sandia National Laboratories

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Roerig, S.C.

    1990-01-01

    As an outgrowth of research into physical security technologies, Sandia is investigating the role of robotics in security systems. Robotics may allow more effective utilization of guard forces, especially in scenarios where personnel would be exposed to harmful environments. Robots can provide intrusion detection and assessment functions for failed sensors or transient assets, can test existing fixed site sensors, and can gather additional intelligence and dispense delaying elements. The Robotic Security Vehicle (RSV) program for DOE/OSS is developing a fieldable prototype for an exterior physical security robot based upon a commercial four wheel drive vehicle. The RSV will be capablemore » of driving itself, being driven remotely, or being driven by an onboard operator around a site and will utilize its sensors to alert an operator to unusual conditions. The Remote Security Station (RSS) program for the Defense Nuclear Agency is developing a proof-of-principle robotic system which will be used to evaluate the role, and associated cost, of robotic technologies in exterior security systems. The RSS consists of an independent sensor pod, a mobile sensor platform and a control and display console. Sensor data fusion is used to optimize the system's intrusion detection performance. These programs are complementary, the RSV concentrates on developing autonomous mobility, while the RSS thrust is on mobile sensor employment. 3 figs.« less

  12. 2009 National Intelligence: A Consumer’s Guide

    DTIC Science & Technology

    2009-04-01

    Program (NIP), formerly known as the National Foreign Intelligence Program ( NFIP ), provides the resources needed to develop and maintain...Clandestine Service NCTC: National Counterterrorism Center NDIC: National Defense Intelligence College (DIA – formerly JMIC) NFIP : National Foreign...Coordination Center (ODNI) NIE: National Intelligence Estimate NIP: National Intelligence Program (formerly NFIP ) NIPRNet: Non-Secure Internet Protocol Router

  13. The Next Big Thing - Eric Haseltine

    ScienceCinema

    Eric Haseltine

    2017-12-09

    Eric Haseltine, Haseltine Partners president and former chief of Walt Disney Imagineering, presented "The Next Big Thing," on Sept. 11, at the ORNL. He described the four "early warning signs" that a scientific breakthrough is imminent, and then suggested practical ways to turn these insights into breakthrough innovations. Haseltine is former director of research at the National Security Agency and associate director for science and technology for the director of National Intelligence, former executive vice president of Walt Disney Imagineering and director of engineering for Hughes Aircraft. He has 15 patents in optics, special effects and electronic media, and more than 100 publications in science and technical journals, the web and Discover Magazine.

  14. Maritime security report number 1. August 1995

    DOT National Transportation Integrated Search

    1995-08-01

    Maritime Security Reports are unclassified periodic publications prepared to inform the commercial maritime industry, senior Maritime Administration officials, the Secretary of Transportation's Office of Intelligence and Security, and the Security Su...

  15. Intelligence-Driven Border Security: A Promethean View of U.S. Border Patrol Intelligence Operations

    DTIC Science & Technology

    2015-12-01

    USBP agent, intelligence ( BPA -I), information sharing, capability gap analysis process (CGAP), Tucson Sector Red Team 15. NUMBER OF PAGES 109 16...27 2. BPA -I .............................................................................................28 3. BPA -I Requirements...71 APPENDIX A. PROFESSIONAL INTELLIGENCE ASSOCIATIONS— ADDITIONAL OPPORTUNITIES FOR BPA -IS

  16. Improving the All-Hazards Homeland Security Enterprise Through the Use of an Emergency Management Intelligence Model

    DTIC Science & Technology

    2013-09-01

    Office of the Inspector General OSINT Open Source Intelligence PPD Presidential Policy Directive SIGINT Signals Intelligence SLFC State/Local Fusion...Geospatial Intelligence (GEOINT) from Geographic Information Systems (GIS), and Open Source Intelligence ( OSINT ) from Social Media. GIS is widely...and monitor make it a feasible tool to capitalize on for OSINT . A formalized EM intelligence process would help expedite the processing of such

  17. INTELLIGENT PROCESSING EQUIPMENT WITHIN THE ENVIRONMENTAL PROTECTION AGENCY

    EPA Science Inventory

    Protection of the environment and environmental remediation requires the cooperation -at all levels- of government and industry. ntelligent processing equipment, in addition to other artificial intelligence based tools, has been used by the Environmental Protection Agency to prov...

  18. Distributed Problem Solving: Adaptive Networks with a Computer Intermediary Resource. Intelligent Executive Computer Communication

    DTIC Science & Technology

    1991-06-01

    Proceedings of The National Conference on Artificial Intelligence , pages 181-184, The American Association for Aritificial Intelligence , Pittsburgh...Intermediary Resource: Intelligent Executive Computer Communication John Lyman and Carla J. Conaway University of California at Los Angeles for Contracting...Include Security Classification) Interim Report: Distributed Problem Solving: Adaptive Networks With a Computer Intermediary Resource: Intelligent

  19. Successful public-private partnerships: The NYPD shield model.

    PubMed

    Amadeo, Vincent; Iannone, Stephen

    2017-12-01

    This article will identify the challenges that post 9/11 law enforcement faces regarding privatepublic partnerships and describe in detail the NYPD Shield programme, created to combat those challenges. Recommendations made by the 911 Commission included the incorporation of the private sector into future homeland security strategies. One such strategy is NYPD Shield. This programme is a nationally recognized award-winning public-private partnership dedicated to providing counterterrorism training and information sharing with government agencies, non-government organizations, private businesses, and the community. Information is shared through several platforms that include a dedicated website, instruction of counterterrorism training curricula, e-mail alerts, intelligence assessments and the hosting of quarterly conferences. This article also details how the NYPD Shield is providing its successful template to other law enforcement agencies enabling them to initiate similar programmes in their respective jurisdictions, and in doing so joining a National Shield Network.

  20. 76 FR 43993 - Privacy Act of 1974; System of Records

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-07-22

    ...; System of Records AGENCY: National Security Agency/Central Security Service, Department of Defense. ACTION: Notice to Delete a System of Records. SUMMARY: The National Security Agency/Central Security.... FOR FURTHER INFORMATION CONTACT: Ms. Anne Hill, National Security Agency/Central Security Service...

  1. Conclusions

    NASA Astrophysics Data System (ADS)

    Ahonen, Pasi; Alahuhta, Petteri; Daskala, Barbara; Delaitre, Sabine; Hert, Paul De; Lindner, Ralf; Maghiros, Ioannis; Moscibroda, Anna; Schreurs, Wim; Verlinden, Michiel

    Some say that an increase in security does not necessarily mean a further encroachment on privacy - indeed, security is necessary to protect personal data and our privacy. Networks must be secure, our personal devices, reliable, dependable and trustworthy. But security is a multifaceted term, with many dimensions. We are of the view that an increase in security most likely will encroach upon our privacy in an ambient intelligence world. Surveillance cameras will continue to proliferate. We assume that, whatever the law is, whatever privacy protections government and business say they honour, our telecommunications, e-mails and Internet usage will be monitored to an increasing degree. The same will be true of our interfaces with the world of ambient intelligence.

  2. 32 CFR 1906.131-1906.139 - [Reserved

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 32 National Defense 6 2013-07-01 2013-07-01 false [Reserved] 1906.131-1906.139 Section 1906.131-1906.139 National Defense Other Regulations Relating to National Defense CENTRAL INTELLIGENCE AGENCY... INTELLIGENCE AGENCY §§ 1906.131-1906.139 [Reserved] ...

  3. 32 CFR 1906.131-1906.139 - [Reserved

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 32 National Defense 6 2014-07-01 2014-07-01 false [Reserved] 1906.131-1906.139 Section 1906.131-1906.139 National Defense Other Regulations Relating to National Defense CENTRAL INTELLIGENCE AGENCY... INTELLIGENCE AGENCY §§ 1906.131-1906.139 [Reserved] ...

  4. 32 CFR 1906.104-1906.109 - [Reserved

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 32 National Defense 6 2012-07-01 2012-07-01 false [Reserved] 1906.104-1906.109 Section 1906.104-1906.109 National Defense Other Regulations Relating to National Defense CENTRAL INTELLIGENCE AGENCY... INTELLIGENCE AGENCY §§ 1906.104-1906.109 [Reserved] ...

  5. 32 CFR 1906.131-1906.139 - [Reserved

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 32 National Defense 6 2011-07-01 2011-07-01 false [Reserved] 1906.131-1906.139 Section 1906.131-1906.139 National Defense Other Regulations Relating to National Defense CENTRAL INTELLIGENCE AGENCY... INTELLIGENCE AGENCY §§ 1906.131-1906.139 [Reserved] ...

  6. 32 CFR 1906.141-1906.148 - [Reserved

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 32 National Defense 6 2011-07-01 2011-07-01 false [Reserved] 1906.141-1906.148 Section 1906.141-1906.148 National Defense Other Regulations Relating to National Defense CENTRAL INTELLIGENCE AGENCY... INTELLIGENCE AGENCY §§ 1906.141-1906.148 [Reserved] ...

  7. 32 CFR 1906.131-1906.139 - [Reserved

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 32 National Defense 6 2010-07-01 2010-07-01 false [Reserved] 1906.131-1906.139 Section 1906.131-1906.139 National Defense Other Regulations Relating to National Defense CENTRAL INTELLIGENCE AGENCY... INTELLIGENCE AGENCY §§ 1906.131-1906.139 [Reserved] ...

  8. 32 CFR 1906.161-1906.169 - [Reserved

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 32 National Defense 6 2013-07-01 2013-07-01 false [Reserved] 1906.161-1906.169 Section 1906.161-1906.169 National Defense Other Regulations Relating to National Defense CENTRAL INTELLIGENCE AGENCY... INTELLIGENCE AGENCY §§ 1906.161-1906.169 [Reserved] ...

  9. 32 CFR 1906.141-1906.148 - [Reserved

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 32 National Defense 6 2010-07-01 2010-07-01 false [Reserved] 1906.141-1906.148 Section 1906.141-1906.148 National Defense Other Regulations Relating to National Defense CENTRAL INTELLIGENCE AGENCY... INTELLIGENCE AGENCY §§ 1906.141-1906.148 [Reserved] ...

  10. 32 CFR 1906.152-1906.159 - [Reserved

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 32 National Defense 6 2013-07-01 2013-07-01 false [Reserved] 1906.152-1906.159 Section 1906.152-1906.159 National Defense Other Regulations Relating to National Defense CENTRAL INTELLIGENCE AGENCY... INTELLIGENCE AGENCY §§ 1906.152-1906.159 [Reserved] ...

  11. 32 CFR 1906.161-1906.169 - [Reserved

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 32 National Defense 6 2012-07-01 2012-07-01 false [Reserved] 1906.161-1906.169 Section 1906.161-1906.169 National Defense Other Regulations Relating to National Defense CENTRAL INTELLIGENCE AGENCY... INTELLIGENCE AGENCY §§ 1906.161-1906.169 [Reserved] ...

  12. 32 CFR 1906.152-1906.159 - [Reserved

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 32 National Defense 6 2011-07-01 2011-07-01 false [Reserved] 1906.152-1906.159 Section 1906.152-1906.159 National Defense Other Regulations Relating to National Defense CENTRAL INTELLIGENCE AGENCY... INTELLIGENCE AGENCY §§ 1906.152-1906.159 [Reserved] ...

  13. 32 CFR 1906.112-1906.129 - [Reserved

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 32 National Defense 6 2012-07-01 2012-07-01 false [Reserved] 1906.112-1906.129 Section 1906.112-1906.129 National Defense Other Regulations Relating to National Defense CENTRAL INTELLIGENCE AGENCY... INTELLIGENCE AGENCY §§ 1906.112-1906.129 [Reserved] ...

  14. 32 CFR 1906.141-1906.148 - [Reserved

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 32 National Defense 6 2014-07-01 2014-07-01 false [Reserved] 1906.141-1906.148 Section 1906.141-1906.148 National Defense Other Regulations Relating to National Defense CENTRAL INTELLIGENCE AGENCY... INTELLIGENCE AGENCY §§ 1906.141-1906.148 [Reserved] ...

  15. 32 CFR 1906.104-1906.109 - [Reserved

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 32 National Defense 6 2014-07-01 2014-07-01 false [Reserved] 1906.104-1906.109 Section 1906.104-1906.109 National Defense Other Regulations Relating to National Defense CENTRAL INTELLIGENCE AGENCY... INTELLIGENCE AGENCY §§ 1906.104-1906.109 [Reserved] ...

  16. 32 CFR 1906.112-1906.129 - [Reserved

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 32 National Defense 6 2010-07-01 2010-07-01 false [Reserved] 1906.112-1906.129 Section 1906.112-1906.129 National Defense Other Regulations Relating to National Defense CENTRAL INTELLIGENCE AGENCY... INTELLIGENCE AGENCY §§ 1906.112-1906.129 [Reserved] ...

  17. 32 CFR 1906.104-1906.109 - [Reserved

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 32 National Defense 6 2013-07-01 2013-07-01 false [Reserved] 1906.104-1906.109 Section 1906.104-1906.109 National Defense Other Regulations Relating to National Defense CENTRAL INTELLIGENCE AGENCY... INTELLIGENCE AGENCY §§ 1906.104-1906.109 [Reserved] ...

  18. 32 CFR 1906.131-1906.139 - [Reserved

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 32 National Defense 6 2012-07-01 2012-07-01 false [Reserved] 1906.131-1906.139 Section 1906.131-1906.139 National Defense Other Regulations Relating to National Defense CENTRAL INTELLIGENCE AGENCY... INTELLIGENCE AGENCY §§ 1906.131-1906.139 [Reserved] ...

  19. 32 CFR 1906.112-1906.129 - [Reserved

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 32 National Defense 6 2011-07-01 2011-07-01 false [Reserved] 1906.112-1906.129 Section 1906.112-1906.129 National Defense Other Regulations Relating to National Defense CENTRAL INTELLIGENCE AGENCY... INTELLIGENCE AGENCY §§ 1906.112-1906.129 [Reserved] ...

  20. 32 CFR 1906.141-1906.148 - [Reserved

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 32 National Defense 6 2013-07-01 2013-07-01 false [Reserved] 1906.141-1906.148 Section 1906.141-1906.148 National Defense Other Regulations Relating to National Defense CENTRAL INTELLIGENCE AGENCY... INTELLIGENCE AGENCY §§ 1906.141-1906.148 [Reserved] ...

  1. 32 CFR 1906.161-1906.169 - [Reserved

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 32 National Defense 6 2014-07-01 2014-07-01 false [Reserved] 1906.161-1906.169 Section 1906.161-1906.169 National Defense Other Regulations Relating to National Defense CENTRAL INTELLIGENCE AGENCY... INTELLIGENCE AGENCY §§ 1906.161-1906.169 [Reserved] ...

  2. 32 CFR 1906.161-1906.169 - [Reserved

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 32 National Defense 6 2011-07-01 2011-07-01 false [Reserved] 1906.161-1906.169 Section 1906.161-1906.169 National Defense Other Regulations Relating to National Defense CENTRAL INTELLIGENCE AGENCY... INTELLIGENCE AGENCY §§ 1906.161-1906.169 [Reserved] ...

  3. 32 CFR 1906.104-1906.109 - [Reserved

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 32 National Defense 6 2010-07-01 2010-07-01 false [Reserved] 1906.104-1906.109 Section 1906.104-1906.109 National Defense Other Regulations Relating to National Defense CENTRAL INTELLIGENCE AGENCY... INTELLIGENCE AGENCY §§ 1906.104-1906.109 [Reserved] ...

  4. 32 CFR 1906.141-1906.148 - [Reserved

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 32 National Defense 6 2012-07-01 2012-07-01 false [Reserved] 1906.141-1906.148 Section 1906.141-1906.148 National Defense Other Regulations Relating to National Defense CENTRAL INTELLIGENCE AGENCY... INTELLIGENCE AGENCY §§ 1906.141-1906.148 [Reserved] ...

  5. 32 CFR 1906.152-1906.159 - [Reserved

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 32 National Defense 6 2014-07-01 2014-07-01 false [Reserved] 1906.152-1906.159 Section 1906.152-1906.159 National Defense Other Regulations Relating to National Defense CENTRAL INTELLIGENCE AGENCY... INTELLIGENCE AGENCY §§ 1906.152-1906.159 [Reserved] ...

  6. 32 CFR 1906.112-1906.129 - [Reserved

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 32 National Defense 6 2013-07-01 2013-07-01 false [Reserved] 1906.112-1906.129 Section 1906.112-1906.129 National Defense Other Regulations Relating to National Defense CENTRAL INTELLIGENCE AGENCY... INTELLIGENCE AGENCY §§ 1906.112-1906.129 [Reserved] ...

  7. 32 CFR 1906.152-1906.159 - [Reserved

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 32 National Defense 6 2010-07-01 2010-07-01 false [Reserved] 1906.152-1906.159 Section 1906.152-1906.159 National Defense Other Regulations Relating to National Defense CENTRAL INTELLIGENCE AGENCY... INTELLIGENCE AGENCY §§ 1906.152-1906.159 [Reserved] ...

  8. 32 CFR 1906.104-1906.109 - [Reserved

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 32 National Defense 6 2011-07-01 2011-07-01 false [Reserved] 1906.104-1906.109 Section 1906.104-1906.109 National Defense Other Regulations Relating to National Defense CENTRAL INTELLIGENCE AGENCY... INTELLIGENCE AGENCY §§ 1906.104-1906.109 [Reserved] ...

  9. 32 CFR 1906.152-1906.159 - [Reserved

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 32 National Defense 6 2012-07-01 2012-07-01 false [Reserved] 1906.152-1906.159 Section 1906.152-1906.159 National Defense Other Regulations Relating to National Defense CENTRAL INTELLIGENCE AGENCY... INTELLIGENCE AGENCY §§ 1906.152-1906.159 [Reserved] ...

  10. 32 CFR 1906.161-1906.169 - [Reserved

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 32 National Defense 6 2010-07-01 2010-07-01 false [Reserved] 1906.161-1906.169 Section 1906.161-1906.169 National Defense Other Regulations Relating to National Defense CENTRAL INTELLIGENCE AGENCY... INTELLIGENCE AGENCY §§ 1906.161-1906.169 [Reserved] ...

  11. 32 CFR 1906.112-1906.129 - [Reserved

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 32 National Defense 6 2014-07-01 2014-07-01 false [Reserved] 1906.112-1906.129 Section 1906.112-1906.129 National Defense Other Regulations Relating to National Defense CENTRAL INTELLIGENCE AGENCY... INTELLIGENCE AGENCY §§ 1906.112-1906.129 [Reserved] ...

  12. Studies in Intelligence. Volume 54, Number 3, September 2010

    DTIC Science & Technology

    2010-09-01

    ADDRESS( ES ) Center for the Study of Intelligence,Central Intelligence Agency,Washington,DC,20505 8. PERFORMING ORGANIZATION REPORT NUMBER 9...SPONSORING/MONITORING AGENCY NAME(S) AND ADDRESS( ES ) 10. SPONSOR/MONITOR’S ACRONYM(S) 11. SPONSOR/MONITOR’S REPORT NUMBER(S) 12. DISTRIBUTION/AVAILABILITY...The Deceivers: Allied Military Deception in the Second World War by Thaddeus Holt •Eyes In The Sky: Eisenhower, The CIA and Cold War Aerial Es

  13. 75 FR 56079 - Privacy Act of 1974; System of Records

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-09-15

    ... to the National Security Agency/Central Security Service, Freedom of Information Act/Privacy Act...; System of Records AGENCY: National Security Agency/Central Security Service, DoD. ACTION: Notice to amend a system of records. SUMMARY: The National Security Agency/Central Security Service is proposing to...

  14. Homeland Security Intelligence: To What End

    DTIC Science & Technology

    2010-09-01

    decision making is generous (Treverton & Gabbard , 2008; Reveron 2007). This literature commonly falls into roughly one of two categories, 1) the...Treverton, G.F. & Gabbard , C.B. (2008). Assessing the tradecraft of intelligence analysis. Arlington VA: RAND. Turner, M. (2005). Why secret intelligence

  15. 76 FR 58786 - Privacy Act of 1974; Systems of Records

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-09-22

    ... National Security Agency/Central Security System systems of records notices subject to the Privacy Act of... inquiries to the National Security Agency/Central Security Service, Freedom of Information Act/Privacy Act...; Systems of Records AGENCY: National Security Agency/Central Security Service, Department of Defense (DoD...

  16. 77 FR 56628 - Privacy Act of 1974; System of Records

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-09-13

    ... to the National Security Agency/Central Security Service, Freedom of Information Act/Privacy Act...; System of Records AGENCY: National Security Agency/Central Security Service, DoD. ACTION: Notice to add a system of records. SUMMARY: The National Security Agency/Central Security Service proposes to add a new...

  17. 78 FR 45913 - Privacy Act of 1974; Systems of Records

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-07-30

    ... National Security Agency/Central Security Service systems of records subject to the Privacy Act of 1974 (5... National Security Agency/Central Security Service, Freedom of Information Act/Privacy Act Office, 9800...; Systems of Records AGENCY: National Security Agency/Central Security Service, DoD. ACTION: Notice to alter...

  18. 32 CFR 1906.160 - Communications.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 32 National Defense 6 2011-07-01 2011-07-01 false Communications. 1906.160 Section 1906.160 National Defense Other Regulations Relating to National Defense CENTRAL INTELLIGENCE AGENCY ENFORCEMENT OF NONDISCRIMINATION ON THE BASIS OF HANDICAP IN PROGRAMS OR ACTIVITIES CONDUCTED BY THE CENTRAL INTELLIGENCE AGENCY...

  19. 32 CFR 1906.140 - Employment.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 32 National Defense 6 2010-07-01 2010-07-01 false Employment. 1906.140 Section 1906.140 National Defense Other Regulations Relating to National Defense CENTRAL INTELLIGENCE AGENCY ENFORCEMENT OF NONDISCRIMINATION ON THE BASIS OF HANDICAP IN PROGRAMS OR ACTIVITIES CONDUCTED BY THE CENTRAL INTELLIGENCE AGENCY...

  20. 32 CFR 1906.101 - Purpose.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 32 National Defense 6 2012-07-01 2012-07-01 false Purpose. 1906.101 Section 1906.101 National Defense Other Regulations Relating to National Defense CENTRAL INTELLIGENCE AGENCY ENFORCEMENT OF NONDISCRIMINATION ON THE BASIS OF HANDICAP IN PROGRAMS OR ACTIVITIES CONDUCTED BY THE CENTRAL INTELLIGENCE AGENCY...

  1. 32 CFR 1906.111 - Notice.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 32 National Defense 6 2014-07-01 2014-07-01 false Notice. 1906.111 Section 1906.111 National Defense Other Regulations Relating to National Defense CENTRAL INTELLIGENCE AGENCY ENFORCEMENT OF NONDISCRIMINATION ON THE BASIS OF HANDICAP IN PROGRAMS OR ACTIVITIES CONDUCTED BY THE CENTRAL INTELLIGENCE AGENCY...

  2. 32 CFR 1906.111 - Notice.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 32 National Defense 6 2010-07-01 2010-07-01 false Notice. 1906.111 Section 1906.111 National Defense Other Regulations Relating to National Defense CENTRAL INTELLIGENCE AGENCY ENFORCEMENT OF NONDISCRIMINATION ON THE BASIS OF HANDICAP IN PROGRAMS OR ACTIVITIES CONDUCTED BY THE CENTRAL INTELLIGENCE AGENCY...

  3. 32 CFR 1906.111 - Notice.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 32 National Defense 6 2013-07-01 2013-07-01 false Notice. 1906.111 Section 1906.111 National Defense Other Regulations Relating to National Defense CENTRAL INTELLIGENCE AGENCY ENFORCEMENT OF NONDISCRIMINATION ON THE BASIS OF HANDICAP IN PROGRAMS OR ACTIVITIES CONDUCTED BY THE CENTRAL INTELLIGENCE AGENCY...

  4. 32 CFR 1906.160 - Communications.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 32 National Defense 6 2010-07-01 2010-07-01 false Communications. 1906.160 Section 1906.160 National Defense Other Regulations Relating to National Defense CENTRAL INTELLIGENCE AGENCY ENFORCEMENT OF NONDISCRIMINATION ON THE BASIS OF HANDICAP IN PROGRAMS OR ACTIVITIES CONDUCTED BY THE CENTRAL INTELLIGENCE AGENCY...

  5. 32 CFR 1906.140 - Employment.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 32 National Defense 6 2011-07-01 2011-07-01 false Employment. 1906.140 Section 1906.140 National Defense Other Regulations Relating to National Defense CENTRAL INTELLIGENCE AGENCY ENFORCEMENT OF NONDISCRIMINATION ON THE BASIS OF HANDICAP IN PROGRAMS OR ACTIVITIES CONDUCTED BY THE CENTRAL INTELLIGENCE AGENCY...

  6. 32 CFR 1906.101 - Purpose.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 32 National Defense 6 2011-07-01 2011-07-01 false Purpose. 1906.101 Section 1906.101 National Defense Other Regulations Relating to National Defense CENTRAL INTELLIGENCE AGENCY ENFORCEMENT OF NONDISCRIMINATION ON THE BASIS OF HANDICAP IN PROGRAMS OR ACTIVITIES CONDUCTED BY THE CENTRAL INTELLIGENCE AGENCY...

  7. 32 CFR 1906.140 - Employment.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 32 National Defense 6 2013-07-01 2013-07-01 false Employment. 1906.140 Section 1906.140 National Defense Other Regulations Relating to National Defense CENTRAL INTELLIGENCE AGENCY ENFORCEMENT OF NONDISCRIMINATION ON THE BASIS OF HANDICAP IN PROGRAMS OR ACTIVITIES CONDUCTED BY THE CENTRAL INTELLIGENCE AGENCY...

  8. 32 CFR 1906.111 - Notice.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 32 National Defense 6 2011-07-01 2011-07-01 false Notice. 1906.111 Section 1906.111 National Defense Other Regulations Relating to National Defense CENTRAL INTELLIGENCE AGENCY ENFORCEMENT OF NONDISCRIMINATION ON THE BASIS OF HANDICAP IN PROGRAMS OR ACTIVITIES CONDUCTED BY THE CENTRAL INTELLIGENCE AGENCY...

  9. 32 CFR 1906.111 - Notice.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 32 National Defense 6 2012-07-01 2012-07-01 false Notice. 1906.111 Section 1906.111 National Defense Other Regulations Relating to National Defense CENTRAL INTELLIGENCE AGENCY ENFORCEMENT OF NONDISCRIMINATION ON THE BASIS OF HANDICAP IN PROGRAMS OR ACTIVITIES CONDUCTED BY THE CENTRAL INTELLIGENCE AGENCY...

  10. 32 CFR 1906.160 - Communications.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 32 National Defense 6 2013-07-01 2013-07-01 false Communications. 1906.160 Section 1906.160 National Defense Other Regulations Relating to National Defense CENTRAL INTELLIGENCE AGENCY ENFORCEMENT OF NONDISCRIMINATION ON THE BASIS OF HANDICAP IN PROGRAMS OR ACTIVITIES CONDUCTED BY THE CENTRAL INTELLIGENCE AGENCY...

  11. 32 CFR 1906.101 - Purpose.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 32 National Defense 6 2010-07-01 2010-07-01 false Purpose. 1906.101 Section 1906.101 National Defense Other Regulations Relating to National Defense CENTRAL INTELLIGENCE AGENCY ENFORCEMENT OF NONDISCRIMINATION ON THE BASIS OF HANDICAP IN PROGRAMS OR ACTIVITIES CONDUCTED BY THE CENTRAL INTELLIGENCE AGENCY...

  12. 32 CFR 1906.140 - Employment.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 32 National Defense 6 2014-07-01 2014-07-01 false Employment. 1906.140 Section 1906.140 National Defense Other Regulations Relating to National Defense CENTRAL INTELLIGENCE AGENCY ENFORCEMENT OF NONDISCRIMINATION ON THE BASIS OF HANDICAP IN PROGRAMS OR ACTIVITIES CONDUCTED BY THE CENTRAL INTELLIGENCE AGENCY...

  13. 32 CFR 1906.101 - Purpose.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 32 National Defense 6 2014-07-01 2014-07-01 false Purpose. 1906.101 Section 1906.101 National Defense Other Regulations Relating to National Defense CENTRAL INTELLIGENCE AGENCY ENFORCEMENT OF NONDISCRIMINATION ON THE BASIS OF HANDICAP IN PROGRAMS OR ACTIVITIES CONDUCTED BY THE CENTRAL INTELLIGENCE AGENCY...

  14. 32 CFR 1906.140 - Employment.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 32 National Defense 6 2012-07-01 2012-07-01 false Employment. 1906.140 Section 1906.140 National Defense Other Regulations Relating to National Defense CENTRAL INTELLIGENCE AGENCY ENFORCEMENT OF NONDISCRIMINATION ON THE BASIS OF HANDICAP IN PROGRAMS OR ACTIVITIES CONDUCTED BY THE CENTRAL INTELLIGENCE AGENCY...

  15. 32 CFR 1906.101 - Purpose.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 32 National Defense 6 2013-07-01 2013-07-01 false Purpose. 1906.101 Section 1906.101 National Defense Other Regulations Relating to National Defense CENTRAL INTELLIGENCE AGENCY ENFORCEMENT OF NONDISCRIMINATION ON THE BASIS OF HANDICAP IN PROGRAMS OR ACTIVITIES CONDUCTED BY THE CENTRAL INTELLIGENCE AGENCY...

  16. 32 CFR 1906.160 - Communications.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 32 National Defense 6 2012-07-01 2012-07-01 false Communications. 1906.160 Section 1906.160 National Defense Other Regulations Relating to National Defense CENTRAL INTELLIGENCE AGENCY ENFORCEMENT OF NONDISCRIMINATION ON THE BASIS OF HANDICAP IN PROGRAMS OR ACTIVITIES CONDUCTED BY THE CENTRAL INTELLIGENCE AGENCY...

  17. 32 CFR 1906.160 - Communications.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 32 National Defense 6 2014-07-01 2014-07-01 false Communications. 1906.160 Section 1906.160 National Defense Other Regulations Relating to National Defense CENTRAL INTELLIGENCE AGENCY ENFORCEMENT OF NONDISCRIMINATION ON THE BASIS OF HANDICAP IN PROGRAMS OR ACTIVITIES CONDUCTED BY THE CENTRAL INTELLIGENCE AGENCY...

  18. Pathfinder. Volume 8, Number 4, July/August 2010

    DTIC Science & Technology

    2010-08-01

    Intelligence Agency,4600 Sangamore Road, Mail Stop D-54,Bethesda,MD, 20816 -5003 8. PERFORMING ORGANIZATION REPORT NUMBER 9. SPONSORING/MONITORING...Intelligence Agency Office of Corporate Communications 4600 Sangamore Road, Mail Stop D-54 Bethesda, MD 20816 -5003 Telephone: (301) 227-7388

  19. Computer-aided Human Centric Cyber Situation Awareness

    DTIC Science & Technology

    2016-03-20

    in Video, IJCAI: International Joint Conf. on Artificial Intelligence . 16-JUL-11, . : , Kun Sun, Sushil Jajodia, Jason Li, Yi Cheng, Wei Tang...Cyber-Security Conference, June 2015. 2. V.S. Subrahmanian, Invited Speaker, Summer School on Business Intelligence and Big Data Analysis, Capri, Italy... Cybersecurity Conference, Yuval Ne’eman Workshop for Science, Technology and Security, Tel Aviv University, the Israeli National Cyber Bureau, Prime

  20. 77 FR 62222 - Federal Advisory Committee; Defense Intelligence Agency (DIA) Advisory Board; Closed Meeting

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-10-12

    ... DEPARTMENT OF DEFENSE Office of the Secretary Federal Advisory Committee; Defense Intelligence.... The meeting necessarily includes discussions of classified information relating to DIA's intelligence... support of current intelligence operations. Agenda October 29, 2012: [[Page 62223

  1. Construction of Military Intelligence Military Occupational Specialty Taxonomy

    DTIC Science & Technology

    1990-11-01

    Ji ARI Research Note 91-10 Construction of Military Intelligence Military Occupational Specialty N Taxonomy IFrederick A. Muckler, Sally Seven, and...11. TITLE (Include Security Classification) Construction of Military Intelligence Military Occupational Specialty Taxonomy 12. PERSONAL AUTHOR(S...Continue on reverse if necessary and identify by block number) FIELD GROUP SUB-GROUP Military intelligence Evaluation taxonomy MOS restructuring

  2. 2017 Cybersecurity Workshop: Readouts from Working Groups - Video Text

    Science.gov Websites

    applicability of artificial intelligence to search for cybersecurity gaps in our existing SKATA networks. Second primarily renewable that all back each other up; that are all highly intelligent, artificial intelligence we have in cyber security, digital technologies, artificial intelligence. We think that that would

  3. Social Media Analytics: A New Approach for Cyberspace Enabled Understanding of Operational Environments

    DTIC Science & Technology

    2013-12-10

    NUMBER 5c. PROGRAM ELEMENT NUMBER 6. AUTHOR(S) 5d. PROJECT NUMBER Major Sean Lyons 5e. TASK NUMBER 5f. WORK...Advance Research Projects Agency DOD Department of Defense FM Field Manual IC Intelligence Community IO Information Operations IP Internet...Utah, Central Intelligence Agency funding of the Recorded Future Company, and Defense Advanced Research Projects Agency, XDATA project . 2

  4. 32 CFR 1906.110 - Self-evaluation.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 32 National Defense 6 2011-07-01 2011-07-01 false Self-evaluation. 1906.110 Section 1906.110 National Defense Other Regulations Relating to National Defense CENTRAL INTELLIGENCE AGENCY ENFORCEMENT OF NONDISCRIMINATION ON THE BASIS OF HANDICAP IN PROGRAMS OR ACTIVITIES CONDUCTED BY THE CENTRAL INTELLIGENCE AGENCY...

  5. 32 CFR 1906.110 - Self-evaluation.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 32 National Defense 6 2010-07-01 2010-07-01 false Self-evaluation. 1906.110 Section 1906.110 National Defense Other Regulations Relating to National Defense CENTRAL INTELLIGENCE AGENCY ENFORCEMENT OF NONDISCRIMINATION ON THE BASIS OF HANDICAP IN PROGRAMS OR ACTIVITIES CONDUCTED BY THE CENTRAL INTELLIGENCE AGENCY...

  6. 32 CFR 1906.110 - Self-evaluation.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 32 National Defense 6 2012-07-01 2012-07-01 false Self-evaluation. 1906.110 Section 1906.110 National Defense Other Regulations Relating to National Defense CENTRAL INTELLIGENCE AGENCY ENFORCEMENT OF NONDISCRIMINATION ON THE BASIS OF HANDICAP IN PROGRAMS OR ACTIVITIES CONDUCTED BY THE CENTRAL INTELLIGENCE AGENCY...

  7. 32 CFR 1904.3 - Procedures governing acceptance of service of process.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... INTELLIGENCE AGENCY PROCEDURES GOVERNING ACCEPTANCE OF SERVICE OF PROCESS § 1904.3 Procedures governing... addressed as follows: Litigation Division, Office of General Counsel, Central Intelligence Agency... Director and Deputy Director of Central Intelligence—in his or her individual capacity. (3) Mail Service...

  8. 32 CFR 1903.2 - Applicability.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 32 National Defense 6 2014-07-01 2014-07-01 false Applicability. 1903.2 Section 1903.2 National Defense Other Regulations Relating to National Defense CENTRAL INTELLIGENCE AGENCY CONDUCT ON AGENCY... Central Intelligence, at his discretion, may suspend the applicability of this part, or a portion thereof...

  9. 32 CFR 1906.110 - Self-evaluation.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 32 National Defense 6 2014-07-01 2014-07-01 false Self-evaluation. 1906.110 Section 1906.110 National Defense Other Regulations Relating to National Defense CENTRAL INTELLIGENCE AGENCY ENFORCEMENT OF NONDISCRIMINATION ON THE BASIS OF HANDICAP IN PROGRAMS OR ACTIVITIES CONDUCTED BY THE CENTRAL INTELLIGENCE AGENCY...

  10. 32 CFR 1904.3 - Procedures governing acceptance of service of process.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... INTELLIGENCE AGENCY PROCEDURES GOVERNING ACCEPTANCE OF SERVICE OF PROCESS § 1904.3 Procedures governing... addressed as follows: Litigation Division, Office of General Counsel, Central Intelligence Agency... Director and Deputy Director of Central Intelligence—in his or her individual capacity. (3) Mail Service...

  11. 32 CFR 1903.2 - Applicability.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 32 National Defense 6 2012-07-01 2012-07-01 false Applicability. 1903.2 Section 1903.2 National Defense Other Regulations Relating to National Defense CENTRAL INTELLIGENCE AGENCY CONDUCT ON AGENCY... Central Intelligence, at his discretion, may suspend the applicability of this part, or a portion thereof...

  12. 32 CFR 1903.2 - Applicability.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 32 National Defense 6 2013-07-01 2013-07-01 false Applicability. 1903.2 Section 1903.2 National Defense Other Regulations Relating to National Defense CENTRAL INTELLIGENCE AGENCY CONDUCT ON AGENCY... Central Intelligence, at his discretion, may suspend the applicability of this part, or a portion thereof...

  13. 32 CFR 1904.3 - Procedures governing acceptance of service of process.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... INTELLIGENCE AGENCY PROCEDURES GOVERNING ACCEPTANCE OF SERVICE OF PROCESS § 1904.3 Procedures governing... addressed as follows: Litigation Division, Office of General Counsel, Central Intelligence Agency... Director and Deputy Director of Central Intelligence—in his or her individual capacity. (3) Mail Service...

  14. 32 CFR 1903.2 - Applicability.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 32 National Defense 6 2010-07-01 2010-07-01 false Applicability. 1903.2 Section 1903.2 National Defense Other Regulations Relating to National Defense CENTRAL INTELLIGENCE AGENCY CONDUCT ON AGENCY... Central Intelligence, at his discretion, may suspend the applicability of this part, or a portion thereof...

  15. 32 CFR 1903.2 - Applicability.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 32 National Defense 6 2011-07-01 2011-07-01 false Applicability. 1903.2 Section 1903.2 National Defense Other Regulations Relating to National Defense CENTRAL INTELLIGENCE AGENCY CONDUCT ON AGENCY... Central Intelligence, at his discretion, may suspend the applicability of this part, or a portion thereof...

  16. 32 CFR 1904.3 - Procedures governing acceptance of service of process.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... INTELLIGENCE AGENCY PROCEDURES GOVERNING ACCEPTANCE OF SERVICE OF PROCESS § 1904.3 Procedures governing... addressed as follows: Litigation Division, Office of General Counsel, Central Intelligence Agency... Director and Deputy Director of Central Intelligence—in his or her individual capacity. (3) Mail Service...

  17. 32 CFR 1904.3 - Procedures governing acceptance of service of process.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... INTELLIGENCE AGENCY PROCEDURES GOVERNING ACCEPTANCE OF SERVICE OF PROCESS § 1904.3 Procedures governing... addressed as follows: Litigation Division, Office of General Counsel, Central Intelligence Agency... Director and Deputy Director of Central Intelligence—in his or her individual capacity. (3) Mail Service...

  18. 32 CFR 1906.110 - Self-evaluation.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 32 National Defense 6 2013-07-01 2013-07-01 false Self-evaluation. 1906.110 Section 1906.110 National Defense Other Regulations Relating to National Defense CENTRAL INTELLIGENCE AGENCY ENFORCEMENT OF NONDISCRIMINATION ON THE BASIS OF HANDICAP IN PROGRAMS OR ACTIVITIES CONDUCTED BY THE CENTRAL INTELLIGENCE AGENCY...

  19. Cyber Intelligence: Challenges and Best Practices

    DTIC Science & Technology

    2015-01-15

    2015 2 . REPORT TYPE N/A 3. DATES COVERED 4. TITLE AND SUBTITLE Cyber Intelligence Challenges and Best Practices 5a. CONTRACT NUMBER 5b...ANSI Std Z39-18 2 Cyber Intel – Challenges and Best Practices January 2015 © 2015 Carnegie Mellon University Copyright 2015 Carnegie Mellon University...University Reporting timelines Gov’t Agency 1 Gov’t Agency 2 Gov’t Agency 3 Gov’t Agency 4 Urgent Normal Strategic 2 -4 Hours 1 Day 1 Month 1 Day 2

  20. 32 CFR 1901.61 - Purpose and authority.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... National Defense Other Regulations Relating to National Defense CENTRAL INTELLIGENCE AGENCY PUBLIC RIGHTS... Central Intelligence has determined to exempt from the procedures established by this regulation and from... intelligence and related organizations and thus reveal or jeopardize intelligence sources and methods or risk...

  1. 77 FR 56192 - Federal Advisory Committee; Defense Intelligence Agency (DIA) Advisory Board; Closed Meeting

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-09-12

    ... DEPARTMENT OF DEFENSE Office of the Secretary Federal Advisory Committee; Defense Intelligence.... The meeting necessarily includes discussions of classified information relating to DIA's intelligence... capabilities in support of current intelligence operations. Agenda September 26, 2012: [[Page 56193

  2. 32 CFR 1901.61 - Purpose and authority.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... National Defense Other Regulations Relating to National Defense CENTRAL INTELLIGENCE AGENCY PUBLIC RIGHTS... Central Intelligence has determined to exempt from the procedures established by this regulation and from... intelligence and related organizations and thus reveal or jeopardize intelligence sources and methods or risk...

  3. 75 FR 16853 - Office of the Director of National Intelligence; Privacy Act of 1974; System of Records

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-04-02

    ... OFFICE OF THE DIRECTOR OF NATIONAL INTELLIGENCE Office of the Director of National Intelligence; Privacy Act of 1974; System of Records AGENCY: Office of the Director of National Intelligence. ACTION: Notice to establish systems of records. SUMMARY: The Office of the Director of National Intelligence...

  4. 75 FR 40716 - Defense Federal Acquisition Regulation Supplement; Notification Requirements for Awards of Single...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-07-13

    ... delivery order concerns intelligence activities of the Department of Defense, the agency head also is... Intelligence of the House of Representatives if the order relates to tactical intelligence and intelligence-related activities, and to the Select Committee on Intelligence of the Senate and the Permanent Select...

  5. Exploring the Lack of Interoperability of Databases within Department of Homeland Security Interagency Environment Concerning Maritime Port Security

    DTIC Science & Technology

    2009-03-01

    37 Figure 8 New Information Sharing Model from United States Intelligence Community Information Sharing...PRIDE while the Coast Guard has MISSLE and the newly constructed WATCHKEEPER. All these databases contain intelligence on incoming vessels...decisions making. Experts rely heavily on future projections as hallmarks of skilled performance." (Endsley et al. 2006) The SA model above

  6. 32 CFR 1903.5 - Enforcement of parking regulations.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 32 National Defense 6 2013-07-01 2013-07-01 false Enforcement of parking regulations. 1903.5 Section 1903.5 National Defense Other Regulations Relating to National Defense CENTRAL INTELLIGENCE AGENCY... expense. The Central Intelligence Agency assumes no responsibility for the payment of any fees or costs...

  7. 32 CFR 1903.5 - Enforcement of parking regulations.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 32 National Defense 6 2010-07-01 2010-07-01 false Enforcement of parking regulations. 1903.5 Section 1903.5 National Defense Other Regulations Relating to National Defense CENTRAL INTELLIGENCE AGENCY... expense. The Central Intelligence Agency assumes no responsibility for the payment of any fees or costs...

  8. 32 CFR 1903.5 - Enforcement of parking regulations.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 32 National Defense 6 2014-07-01 2014-07-01 false Enforcement of parking regulations. 1903.5 Section 1903.5 National Defense Other Regulations Relating to National Defense CENTRAL INTELLIGENCE AGENCY... expense. The Central Intelligence Agency assumes no responsibility for the payment of any fees or costs...

  9. 32 CFR 1903.5 - Enforcement of parking regulations.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 32 National Defense 6 2011-07-01 2011-07-01 false Enforcement of parking regulations. 1903.5 Section 1903.5 National Defense Other Regulations Relating to National Defense CENTRAL INTELLIGENCE AGENCY... expense. The Central Intelligence Agency assumes no responsibility for the payment of any fees or costs...

  10. 32 CFR 1903.5 - Enforcement of parking regulations.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 32 National Defense 6 2012-07-01 2012-07-01 false Enforcement of parking regulations. 1903.5 Section 1903.5 National Defense Other Regulations Relating to National Defense CENTRAL INTELLIGENCE AGENCY... expense. The Central Intelligence Agency assumes no responsibility for the payment of any fees or costs...

  11. 32 CFR 320.1 - Purpose and scope.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... NATIONAL GEOSPATIAL-INTELLIGENCE AGENCY (NGA) PRIVACY § 320.1 Purpose and scope. (a) This part is published... whether the National Geospatial-Intelligence Agency (NGA) maintains or has disclosed a record pertaining..., Headquarters NGA has determined to be exempt from the procedures established by this regulation and from...

  12. 32 CFR 320.1 - Purpose and scope.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... NATIONAL GEOSPATIAL-INTELLIGENCE AGENCY (NGA) PRIVACY § 320.1 Purpose and scope. (a) This part is published... whether the National Geospatial-Intelligence Agency (NGA) maintains or has disclosed a record pertaining..., Headquarters NGA has determined to be exempt from the procedures established by this regulation and from...

  13. 77 FR 26259 - Privacy Act of 1974; System of Records

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-05-03

    .... SUPPLEMENTARY INFORMATION: The National Security Agency systems of records notice subject to the Privacy Act of... of Records AGENCY: National Security Agency/Central Security Service. ACTION: Notice to Delete a System of Records. SUMMARY: The National Security Agency/Central Security Service is deleting a system of...

  14. 75 FR 67697 - Privacy Act of 1974; Systems of Records

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-11-03

    ... National Security Agency's record system notices for records systems subject to the Privacy Act of 1974 (5... National Security Agency/Central Security Service, Freedom of Information Act (FOIA)/Privacy Act Office...; Systems of Records AGENCY: National Security Agency/Central Security Service, DoD. ACTION: Notice to add a...

  15. 75 FR 43494 - Privacy Act of 1974; System of Records

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-07-26

    ... National Security Agency's record system notices for records systems subject to the Privacy Act of 1974 (5... National Security Agency/Central Security Service, Freedom of Information Act and Privacy Act Office, 9800...; System of Records AGENCY: National Security Agency/Central Security Service, DoD. ACTION: Notice to...

  16. Considering the Creation of a Domestic Intelligence Agency in the United States: Lessons from the Experiences of Australia, Canada, France, Germany, and the United Kingdom

    DTIC Science & Technology

    2009-01-01

    Police AG Attorney-General AIC Australian intelligence community ANAO Australian National Audit Office AQMI Al-Qaida pour le Maghreb Islamique [al...Democratic Republic GIA Groupe Islamique Armé [Armed Islamic Group] xviii Considering the Creation of a Domestic Intelligence Agency in the United...health, energy, utilities, transport, manufacturing, communications, banking and finance , government services and icons, and public gatherings. 17

  17. Intelligent community management system based on the devicenet fieldbus

    NASA Astrophysics Data System (ADS)

    Wang, Yulan; Wang, Jianxiong; Liu, Jiwen

    2013-03-01

    With the rapid development of the national economy and the improvement of people's living standards, people are making higher demands on the living environment. And the estate management content, management efficiency and service quality have been higher required. This paper in-depth analyzes about the intelligent community of the structure and composition. According to the users' requirements and related specifications, it achieves the district management systems, which includes Basic Information Management: the management level of housing, household information management, administrator-level management, password management, etc. Service Management: standard property costs, property charges collecting, the history of arrears and other property expenses. Security Management: household gas, water, electricity and security and other security management, security management district and other public places. Systems Management: backup database, restore database, log management. This article also carries out on the Intelligent Community System analysis, proposes an architecture which is based on B / S technology system. And it has achieved a global network device management with friendly, easy to use, unified human - machine interface.

  18. A data mining approach to intelligence operations

    NASA Astrophysics Data System (ADS)

    Memon, Nasrullah; Hicks, David L.; Harkiolakis, Nicholas

    2008-03-01

    In this paper we examine the latest thinking, approaches and methodologies in use for finding the nuggets of information and subliminal (and perhaps intentionally hidden) patterns and associations that are critical to identify criminal activity and suspects to private and government security agencies. An emphasis in the paper is placed on Social Network Analysis and Investigative Data Mining, and the use of these technologies in the counterterrorism domain. Tools and techniques from both areas are described, along with the important tasks for which they can be used to assist with the investigation and analysis of terrorist organizations. The process of collecting data about these organizations is also considered along with the inherent difficulties that are involved.

  19. The Next Big Thing - Eric Haseltine

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Eric Haseltine

    2009-09-16

    Eric Haseltine, Haseltine Partners president and former chief of Walt Disney Imagineering, presented "The Next Big Thing," on Sept. 11, at the ORNL. He described the four "early warning signs" that a scientific breakthrough is imminent, and then suggested practical ways to turn these insights into breakthrough innovations. Haseltine is former director of research at the National Security Agency and associate director for science and technology for the director of National Intelligence, former executive vice president of Walt Disney Imagineering and director of engineering for Hughes Aircraft. He has 15 patents in optics, special effects and electronic media, and moremore » than 100 publications in science and technical journals, the web and Discover Magazine.« less

  20. 78 FR 295 - Federal Advisory Committee; Defense Intelligence Agency (DIA) Advisory Board; Closed Meeting

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-01-03

    ... DEPARTMENT OF DEFENSE Office of the Secretary Federal Advisory Committee; Defense Intelligence.... The meeting necessarily includes discussions of classified information relating to DIA's intelligence... support of current intelligence operations. Agenda January 22, 2013: Ms. Ellen M. Ardrey, Designated Call...

  1. 75 FR 43943 - Defense Science Board; Task Force on Counter Insurgency (COIN) Intelligence, Surveillance and...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-07-27

    ... Insurgency (COIN) Intelligence, Surveillance and Reconnaissance (ISR) Operations AGENCY: Department of... Force on Counter Insurgency (COIN) Intelligence, Surveillance and Reconnaissance (ISR) Operations will... Defense. These meetings will identify how DoD intelligence can most effectively support COIN operations...

  2. After Globalization Future Security in a Technology Rich World

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Gilmartin,T J

    2001-08-17

    Over the course of the year 2000, five workshops were conducted by the Center for Global Security Research at the Lawrence Livermore National Laboratory on threats to international security in the 2015 to 2020 timeframe due to the global availability of advanced technology. These workshops focused on threats that are enabled by nuclear, missile, and space technology; military technology; information technology; bio technology; and geo systems technology. The participants included US national leaders and experts from the Department of Energy National Laboratories; the Department of Defense: Army, Navy, Air Force, Office of the Secretary of Defense, Defense Threat Reduction Agency,more » and Defense Advanced Research Projects Agency; the Department of State, NASA, Congressional technical staff, the intelligence community, universities and university study centers, think tanks, consultants on security issues, and private industry. For each workshop the process of analysis involved identification and prioritization of the participants' perceived most severe threat scenarios (worst nightmares), discussion of the technologies which enabled those threats, and ranking of the technologies' threat potentials. The threats ranged from local/regional to global, from intentional to unintended to natural, from merely economic to massively destructive, and from individual and group to state actions. We were not concerned in this exercise with defining responses to the threats, although our assessment of each threat's severity included consideration of the ease or difficulty with which it might be executed or countered. At the concluding review, we brought the various workshops' participants together, added senior participant/reviewers with broad experience and national responsibility, and discussed the workshop findings to determine what is most certain or uncertain, and what might be needed to resolve our uncertainties. This paper summarizes the consenses and important variations of both the reviewers and the participants.« less

  3. 75 FR 33792 - Privacy Act of 1974; System of Records

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-06-15

    ... instructions for submitting comments. Mail: Federal Docket Management System Office, 1160 Defense Pentagon...; System of Records AGENCY: Defense Intelligence Agency, DoD. ACTION: Notice to add a system of records. SUMMARY: The Defense Intelligence proposes to add a system of records notice to its inventory of record...

  4. 75 FR 34634 - Privacy Act; Implementation

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-06-18

    ... DEPARTMENT OF DEFENSE National Geospatial-Intelligence Agency 32 CFR Part 320 Privacy Act; Implementation CFR Correction In Title 32 of the Code of Federal Regulations, Parts 191 to 399, revised as of...-INTELLIGENCE AGENCY (NGA) PRIVACY [FR Doc. 2010-14884 Filed 6-17-10; 8:45 am] BILLING CODE 1505-01-D ...

  5. 77 FR 38041 - Federal Advisory Committee; Defense Intelligence Agency (DIA) Advisory Board; Closed Meeting

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-06-26

    ... DEPARTMENT OF DEFENSE Office of the Secretary Federal Advisory Committee; Defense Intelligence... meeting necessarily includes discussions of classified information relating to DIA's intelligence... capabilities in support of current intelligence operations. Agenda July 23, 2012 1 p.m.--Call to Order Mr...

  6. 77 FR 18797 - Federal Advisory Committee; Defense Intelligence Agency (DIA) Advisory Board; Closed Meeting

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-03-28

    ... DEPARTMENT OF DEFENSE Office of the Secretary Federal Advisory Committee; Defense Intelligence... meeting necessarily includes discussions of classified information relating to DIA's intelligence... capabilities in support of current intelligence operations. Agenda May 2, 2012 S 8:30 a.m Convene Advisory...

  7. 76 FR 70425 - Federal Advisory Committee; Defense Intelligence Agency (DIA) Advisory Board; Closed Meeting

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-11-14

    ... DEPARTMENT OF DEFENSE Office of the Secretary Federal Advisory Committee; Defense Intelligence.... The meetings necessarily include discussions of classified information relating to DIA's intelligence... current intelligence operations. Agenda December 2, 2011 8:30 a.m Convene Advisory Mr. William Caniano...

  8. 77 FR 2277 - Federal Advisory Committee; Defense Intelligence Agency (DIA) Advisory Board; Closed Meeting

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-01-17

    ... DEPARTMENT OF DEFENSE Office of the Secretary Federal Advisory Committee; Defense Intelligence.... The meetings necessarily include discussions of classified information relating to DIA's intelligence... intelligence operations. Agenda February 24, 2012 8:30 a.m Convene Advisory Mr. William Caniano, Board Meeting...

  9. Firearm microstamping technology: counterinsurgency intelligence gathering tool

    NASA Astrophysics Data System (ADS)

    Lizotte, Todd E.; Ohar, Orest P.

    2009-05-01

    Warfare relies on effective, accurate and timely intelligence an especially critical task when conducting a counterinsurgency operation [1]. Simply stated counterinsurgency is an intelligence war. Both insurgents and counterinsurgents need effective intelligence capabilities to be successful. Insurgents and counterinsurgents therefore attempt to create and maintain intelligence networks and fight continuously to neutralize each other's intelligence capabilities [1][2]. In such an environment it is obviously an advantage to target or proactively create opportunities to track and map an insurgent movement. Quickly identifying insurgency intelligence assets (Infiltrators) within a host government's infrastructure is the goal. Infiltrators can occupy various areas of government such as security personnel, national police force, government offices or military units. Intentional Firearm Microstamping offers such opportunities when implemented into firearms. Outfitted within firearms purchased and distributed to the host nation's security forces (civilian and military), Intentional Firearm Microstamping (IFM) marks bullet cartridge casings with codes as they are fired from the firearm. IFM is incorporated onto optimum surfaces with the firearm mechanism. The intentional microstamp tooling marks can take the form of alphanumeric codes or encoded geometric codes that identify the firearm. As the firearm is discharged the intentional tooling marks transfer a code to the cartridge casing which is ejected out of the firearm. When recovered at the scene of a firefight or engagement, the technology will provide forensic intelligence allowing the mapping and tracking of small arms traffic patterns within the host nation or identify insurgency force strength and pinpoint firearm sources, such as corrupt/rogue military units or police force. Intentional Firearm Microstamping is a passive mechanical trace technology that can be outfitted or retrofitted to semiautomatic handguns and military rifles to assist in developing real time intelligence providing a greater level of situational awareness. Proactively Microstamping firearms that are introduced and distributed to the host nation's security forces, it will become easier to track the firearms if they go missing or end up on the black market in the hands of an insurgency. This paper will explain the technology and key attributes of microstamping technology, test data showing its ability to identifying a specific firearm, examples of implementation strategies and to what extent data could be utilized in war zone security and counterinsurgency intelligence operations.

  10. Laser formed intentional firearm microstamping technology: counterinsurgency intelligence gathering tool

    NASA Astrophysics Data System (ADS)

    Lizotte, Todd E.; Ohar, Orest P.

    2009-09-01

    Warfare relies on effective, accurate and timely intelligence an especially critical task when conducting a counterinsurgency operation [1]. Simply stated counterinsurgency is an intelligence war. Both insurgents and counterinsurgents need effective intelligence capabilities to be successful. Insurgents and counterinsurgents therefore attempt to create and maintain intelligence networks and fight continuously to neutralize each other's intelligence capabilities [1][2]. In such an environment it is obviously an advantage to target or proactively create opportunities to track and map an insurgent movement. Quickly identifying insurgency intelligence assets (Infiltrators) within a host government's infrastructure is the goal. Infiltrators can occupy various areas of government such as security personnel, national police force, government offices or military units. Intentional Firearm Microstamping offers such opportunities when implemented into firearms. Outfitted within firearms purchased and distributed to the host nation's security forces (civilian and military), Intentional Firearm Microstamping (IFM) marks bullet cartridge casings with codes as they are fired from the firearm. IFM is incorporated onto optimum surfaces with the firearm mechanism. The intentional microstamp tooling marks can take the form of alphanumeric codes or encoded geometric codes that identify the firearm. As the firearm is discharged the intentional tooling marks transfer a code to the cartridge casing which is ejected out of the firearm. When recovered at the scene of a firefight or engagement, the technology will provide forensic intelligence allowing the mapping and tracking of small arms traffic patterns within the host nation or identify insurgency force strength and pinpoint firearm sources, such as corrupt/rogue military units or police force. Intentional Firearm Microstamping is a passive mechanical trace technology that can be outfitted or retrofitted to semiautomatic handguns and military rifles to assist in developing real time intelligence providing a greater level of situational awareness. Proactively Microstamping firearms that are introduced and distributed to the host nation's security forces, it will become easier to track the firearms if they go missing or end up on the black market in the hands of an insurgency. This paper will explain the technology and key attributes of microstamping technology, test data showing its ability to identifying a specific firearm, examples of implementation strategies and to what extent data could be utilized in war zone security and counterinsurgency intelligence operations.

  11. 32 CFR 216.2 - Applicability.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... with the Department of Homeland Security (DHS), to the Coast Guard at all times, including when it is a service in the Department of Homeland Security. The policies herein also affect the Departments of Transportation, Homeland Security, Energy (National Nuclear Security Administration), the Central Intelligence...

  12. 32 CFR 216.2 - Applicability.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... with the Department of Homeland Security (DHS), to the Coast Guard at all times, including when it is a service in the Department of Homeland Security. The policies herein also affect the Departments of Transportation, Homeland Security, Energy (National Nuclear Security Administration), the Central Intelligence...

  13. 32 CFR 216.2 - Applicability.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... with the Department of Homeland Security (DHS), to the Coast Guard at all times, including when it is a service in the Department of Homeland Security. The policies herein also affect the Departments of Transportation, Homeland Security, Energy (National Nuclear Security Administration), the Central Intelligence...

  14. 49 CFR 1.27 - Delegations to the General Counsel.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ...) (Security and research and development activities), as implemented by 49 CFR part 15 (Protection of Sensitive Security Information), relating to the determination that information is Sensitive Security Information, in consultation and coordination with the Office of Intelligence, Security and Emergency Response...

  15. 49 CFR 1.27 - Delegations to the General Counsel.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ...) (Security and research and development activities), as implemented by 49 CFR part 15 (Protection of Sensitive Security Information), relating to the determination that information is Sensitive Security Information, in consultation and coordination with the Office of Intelligence, Security and Emergency Response...

  16. 49 CFR 1.27 - Delegations to the General Counsel.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ...) (Security and research and development activities), as implemented by 49 CFR part 15 (Protection of Sensitive Security Information), relating to the determination that information is Sensitive Security Information, in consultation and coordination with the Office of Intelligence, Security and Emergency Response...

  17. 28 CFR 16.74 - Exemption of National Security Division Systems-limited access.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... Privacy Act pursuant to 5 U.S.C. 552a(j)(2), (k)(1), (2) and (5): Foreign Intelligence and... concerning him or her would hinder authorized United States intelligence activities by informing that...) Subsection (d)(1). Disclosure of foreign intelligence and counterintelligence information would interfere...

  18. 28 CFR 16.74 - Exemption of National Security Division Systems-limited access.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... Privacy Act pursuant to 5 U.S.C. 552a(j)(2), (k)(1), (2) and (5): Foreign Intelligence and... concerning him or her would hinder authorized United States intelligence activities by informing that...) Subsection (d)(1). Disclosure of foreign intelligence and counterintelligence information would interfere...

  19. 28 CFR 16.74 - Exemption of National Security Division Systems-limited access.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... Privacy Act pursuant to 5 U.S.C. 552a(j)(2), (k)(1), (2) and (5): Foreign Intelligence and... concerning him or her would hinder authorized United States intelligence activities by informing that...) Subsection (d)(1). Disclosure of foreign intelligence and counterintelligence information would interfere...

  20. 28 CFR 16.74 - Exemption of National Security Division Systems-limited access.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... Privacy Act pursuant to 5 U.S.C. 552a(j)(2), (k)(1), (2) and (5): Foreign Intelligence and... concerning him or her would hinder authorized United States intelligence activities by informing that...) Subsection (d)(1). Disclosure of foreign intelligence and counterintelligence information would interfere...

  1. The Homeland Security Ecosystem: An Analysis of Hierarchical and Ecosystem Models and Their Influence on Decision Makers

    DTIC Science & Technology

    2012-12-01

    flows, diversity, emergence, networks, fusion, strategic planning, information sharing, ecosystem, hierarchy, NJ Regional Operations Intelligence ...Related Information...........................................................................79 viii 3. Production of Disaster Intelligence for... Intelligence for Field Personnel .................80 5. Focused Collection Efforts to Support FEMA and NJ OEM Operations

  2. From the Little Red Book to the Purple Book: Transforming Intelligence into a Profession one Page at a Time

    DTIC Science & Technology

    2010-05-21

    Treverton and C. Bryan Gabbard , "Assessing the Tradecraft of Intelligence Analysis," RAND, National Security Research Division, 2008, http...establish Intelligence School broad accreditation guidelines as has the ABA for accredited law schools. Treverton and Gabbard observe...60 Treverton and Gabbard , 38. 61 Huntington, 9. 62 ICD 203. 22 intelligence organization. The third social

  3. 78 FR 77484 - Extension of Agency Information Collection Activity Under OMB Review: Pipeline System Operator...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-12-23

    ... Federal agency for pipeline security, it is important for TSA to have contact information for company... DEPARTMENT OF HOMELAND SECURITY Transportation Security Administration Extension of Agency Information Collection Activity Under OMB Review: Pipeline System Operator Security Information AGENCY...

  4. The vulnerable do-gooders: security strategies of German aid agencies.

    PubMed

    Schneiker, Andrea

    2013-04-01

    Humanitarian and development agencies have confronted growing insecurity in some of the regions in which they work over the course of the past decade. Consequently, aid agencies are changing their approach to security issues. Compared to aid agencies from other countries, especially the United Kingdom and the United States, German aid agencies have been relatively slow to adopt security measures. In addition, the security measures they have selected differ from one agency to another, even in comparable security contexts. The literature on organisational learning helps to explain these differences. The findings show that external and internal organisational factors influence an aid agency's choice of a particular security measure. The different responses of German aid agencies to the changing security environment demonstrate that security measures are not only influenced by an organisation's identity but also can be a way for them to demonstrate their identity and thereby distinguish themselves from other actors that deliver aid. © 2013 The Author(s). Journal compilation © Overseas Development Institute, 2013.

  5. Secure data exchange between intelligent devices and computing centers

    NASA Astrophysics Data System (ADS)

    Naqvi, Syed; Riguidel, Michel

    2005-03-01

    The advent of reliable spontaneous networking technologies (commonly known as wireless ad-hoc networks) has ostensibly raised stakes for the conception of computing intensive environments using intelligent devices as their interface with the external world. These smart devices are used as data gateways for the computing units. These devices are employed in highly volatile environments where the secure exchange of data between these devices and their computing centers is of paramount importance. Moreover, their mission critical applications require dependable measures against the attacks like denial of service (DoS), eavesdropping, masquerading, etc. In this paper, we propose a mechanism to assure reliable data exchange between an intelligent environment composed of smart devices and distributed computing units collectively called 'computational grid'. The notion of infosphere is used to define a digital space made up of a persistent and a volatile asset in an often indefinite geographical space. We study different infospheres and present general evolutions and issues in the security of such technology-rich and intelligent environments. It is beyond any doubt that these environments will likely face a proliferation of users, applications, networked devices, and their interactions on a scale never experienced before. It would be better to build in the ability to uniformly deal with these systems. As a solution, we propose a concept of virtualization of security services. We try to solve the difficult problems of implementation and maintenance of trust on the one hand, and those of security management in heterogeneous infrastructure on the other hand.

  6. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Begoli, Edmon; Boehmann, Brant; DeNap, Frank A

    In 2003 a joint effort between the U.S. Department of Homeland Security (DHS) and the U.S. Department of Justice created state and metropolitan intelligence fusion centers. These fusion centers were an effort to share law enforcement, disaster, and terrorism related information and intelligence between state and local jurisdictions and to share terrorism related intelligence between state and local law enforcement agencies and various federal entities. In 2006, DHS commissioned the Oak Ridge National Laboratory to establish and manage a groundbreaking program to assist local, state, and tribal leaders in developing the tools and methods required to anticipate and forestall terroristmore » events and to enhance disaster response. This program, called the Southeast Region Research Initiative (SERRI), combines science and technology with validated operational approaches to address regionally unique requirements and suggest regional solutions with the potential for national application. In 2009, SERRI sponsored the Multistate Sharing Initiative (MSSI) to assist state and metropolitan intelligence fusion centers with sharing information related to a wider variety of state interests than just terrorism. While these fusion centers have been effective at sharing data across organizations within their respective jurisdictions, their organizational structure makes bilateral communication with federal entities convenient and also allows information to be further disbursed to other local entities when appropriate. The MSSI-developed Suspicious Activity Report (SAR) sharing system allows state-to-state sharing of non-terrorism-related law enforcement and disaster information. Currently, the MSSI SAR system is deployed in Alabama, Kentucky, Tennessee, and South Carolina. About 1 year after implementation, cognizant fusion center personnel from each state were contacted to ascertain the status of their MSSI SAR systems. The overwhelming response from these individuals was that the MSSI SAR system was an outstanding success and contributed greatly to the security and resiliency of their states. At least one state commented that SERRI's implementation of the MSSI SAR actually 'jump started' and accelerated deployment and acceptance of the Nationwide Suspicious Activity Reporting Initiative (NSI). While all states were enthusiastic about their systems, South Carolina and Tennessee appeared to be the heaviest users of their respective systems. With NSI taking the load of sharing SARs with other states, Tennessee has redeployed the MSSI SAR system within Tennessee to allow SAR sharing between state and local organizations including Tennessee's three Homeland Security Regions, eleven Homeland Security Districts, and more than 500 police and sheriff offices, as well as with other states. In one success story from South Carolina, the Economy SAR System was used to compile similar SARs from throughout the state which were then forwarded to field liaison officers, emergency management personnel, and law enforcement officers for action.« less

  7. 5 CFR 353.110 - OPM placement assistance.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ..., NW., Washington, DC 20415.) (i) Executive branch employees (other than an employee of an intelligence... control; and (iv) Employees of the intelligence agencies (defined in 5 U.S.C. 2302(a)(2)(C)(ii)) when... competitive status or is eligible to acquire it under 5 U.S.C. 3304(C). If the employee's agency is abolished...

  8. 75 FR 28034 - National Protection and Programs Directorate; Agency Information Collection Activities: United...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-05-19

    ... enforcement agencies; and the Federal intelligence community to assist in the decisions they make related to... the collection of fingerprints from two prints to 10. The new collection time of 35 seconds, an... overseas posts; other DHS officers; and appropriate officers of the United States intelligence and law...

  9. 75 FR 49943 - New Agency Information Collection Activity Under OMB Review: Pipeline System Operator Security...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-08-16

    ... DEPARTMENT OF HOMELAND SECURITY Transportation Security Administration New Agency Information Collection Activity Under OMB Review: Pipeline System Operator Security Information AGENCY: Transportation... INFORMATION CONTACT: Joanna Johnson, Office of Information Technology, TSA-11, Transportation Security...

  10. Alexa, Can I Trust You?

    PubMed Central

    Chung, Hyunji; Iorga, Michaela; Voas, Jeffrey; Lee, Sangjin

    2017-01-01

    Security diagnostics expose vulnerabilities and privacy threats that exist in commercial Intelligent Virtual Assistants (IVA) – diagnostics offer the possibility of securer IVA ecosystems. PMID:29213147

  11. Expanding the Role of Emergency Medical Services in Homeland Security

    DTIC Science & Technology

    2013-03-01

    1 A. BACKGROUND AND OVERVIEW .............................................................2 B ... B . DATA ANALYSIS .........................................................................................20 III. ANALYSIS AND EVALUATION—EMS AS...INTELLIGENCE SENSORS ......21 A. ACTING AS INTELLIGENCE SENSORS ................................................21 B . PREVENTION MODELS

  12. Visiting Scholars Program

    DTIC Science & Technology

    2016-09-01

    other associated grants. 15. SUBJECT TERMS SUNY Poly, STEM, Artificial Intelligence , Command and Control 16. SECURITY CLASSIFICATION OF: 17...neuromorphic system has the potential to be widely used in a high-efficiency artificial intelligence system. Simulation results have indicated that the...novel multiresolution fusion and advanced fusion performance evaluation tool for an Artificial Intelligence based natural language annotation engine for

  13. 76 FR 19174 - In the Matter of Centrack International, Inc., Alternafuels, Inc., Intelligent Medical Imaging...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-04-06

    ...., Alternafuels, Inc., Intelligent Medical Imaging, Inc., and Optimark Data Systems, Inc.; Order of Suspension of... accurate information concerning the securities of Intelligent Medical Imaging, Inc. because it has not..., 1999. The Commission is of the opinion that the public interest and the protection of investors require...

  14. Personal Electronic Devices and the ISR Data Explosion: The Impact of Cyber Cameras on the Intelligence Community

    DTIC Science & Technology

    2015-06-01

    ground.aspx?p=1 Texas Tech Security Group, “Automated Open Source Intelligence ( OSINT ) Using APIs.” RaiderSec, Sunday 30 December 2012, http...Open Source Intelligence ( OSINT ) Using APIs,” RaiderSec, Sunday 30 December 2012, http://raidersec.blogspot.com/2012/12/automated-open- source

  15. Expanding the Targeting Process into the Space Domain

    DTIC Science & Technology

    2008-06-01

    planning and operations. The process is a continuous method by which information is converted into intelligence and made available to users...Targeting personnel and organizations consume intelligence produced by various agencies and organizations. Actionable and predictive intelligence applies to... intelligence and operations communities (Figure 1). 1 United States Department of Defense Joint

  16. NOAA Marine and Arctic Monitoring Using UASs

    NASA Astrophysics Data System (ADS)

    Jacobs, T.; Coffey, J. J.; Hood, R. E.; Hall, P.; Adler, J.

    2014-12-01

    Unmanned systems have the potential to efficiently, effectively, economically and safely bridging critical observation requirements in an environmentally friendly manner. As the United States' Marine and Arctic areas of interest expand and include hard-to-reach regions of the Earth (such as the Arctic and remote oceanic areas) optimizing unmanned capabilities will be needed to advance the United States' science, technology and security efforts. Through increased multi-mission and multi-agency operations using improved inter-operable and autonomous unmanned systems, the research and operations communities will better collect environmental intelligence and better protect our Country against hazardous weather, environmental, marine and polar hazards. This presentation will examine NOAA's Marine and Arctic Monitoring UAS strategies which includes developing a coordinated effort to maximize the efficiency and capabilities of unmanned systems across the federal government and research partners. Numerous intra- and inter-agency operational demonstrations and assessments have been made to verify and validated these strategies. The presentation will also discuss the requisite sUAS capabilities and our experience in using them.

  17. The Relative Ineffectiveness of Criminal Network Disruption

    PubMed Central

    Duijn, Paul A. C.; Kashirin, Victor; Sloot, Peter M. A.

    2014-01-01

    Researchers, policymakers and law enforcement agencies across the globe struggle to find effective strategies to control criminal networks. The effectiveness of disruption strategies is known to depend on both network topology and network resilience. However, as these criminal networks operate in secrecy, data-driven knowledge concerning the effectiveness of different criminal network disruption strategies is very limited. By combining computational modeling and social network analysis with unique criminal network intelligence data from the Dutch Police, we discovered, in contrast to common belief, that criminal networks might even become ‘stronger’, after targeted attacks. On the other hand increased efficiency within criminal networks decreases its internal security, thus offering opportunities for law enforcement agencies to target these networks more deliberately. Our results emphasize the importance of criminal network interventions at an early stage, before the network gets a chance to (re-)organize to maximum resilience. In the end disruption strategies force criminal networks to become more exposed, which causes successful network disruption to become a long-term effort. PMID:24577374

  18. The relative ineffectiveness of criminal network disruption.

    PubMed

    Duijn, Paul A C; Kashirin, Victor; Sloot, Peter M A

    2014-02-28

    Researchers, policymakers and law enforcement agencies across the globe struggle to find effective strategies to control criminal networks. The effectiveness of disruption strategies is known to depend on both network topology and network resilience. However, as these criminal networks operate in secrecy, data-driven knowledge concerning the effectiveness of different criminal network disruption strategies is very limited. By combining computational modeling and social network analysis with unique criminal network intelligence data from the Dutch Police, we discovered, in contrast to common belief, that criminal networks might even become 'stronger', after targeted attacks. On the other hand increased efficiency within criminal networks decreases its internal security, thus offering opportunities for law enforcement agencies to target these networks more deliberately. Our results emphasize the importance of criminal network interventions at an early stage, before the network gets a chance to (re-)organize to maximum resilience. In the end disruption strategies force criminal networks to become more exposed, which causes successful network disruption to become a long-term effort.

  19. French Forces for the 21st Century

    DTIC Science & Technology

    2000-01-01

    With their role in dis- suasion, prevention, projection , and protection, the French armed forces are global, nuclear, conventional, and un... projection and support ■ rebuilding additional forces should a major threat reappear. Army France is currently downsizing, restructuring, and...darmerie and the French counterparts to the Defense Intelligence Agency and Central Intelligence Agency. France and America are bound by common

  20. The U.S. Marine Corps Leadership Model: Can the Central Intelligence Agency Model After It?

    DTIC Science & Technology

    2010-04-26

    Daft , Richard L . Leadership Theory and Practice. The Dryden Press. Fort Worth, TX, 1999. Faddis, Charles S. Beyond Repair,· The Decline and Fall...Ora~ns~e Co aiftee :tyiember: (ck,uc:w--d ::r · Gr ~· d<Sm.-. \\f h l > Approved: t..lli~ Date: . . l c. rrr4t 0.01/: l Oral Defens r: 7J~P (tg/..’iJ...2009: 41 BffiLIOGRAPHY: Best, Jr., Richard A. Intelligence Community Reorganization: Potential Effects on DoD Intelligence Agencies. Washington, DC

Top