23 results
Search Results
2. Missing papers.
- Author
-
Ervin, Michael
- Subjects
- *
NATIONAL security , *CIVIL disobedience - Abstract
Expresses good-humored disappointment over the fact that the FBI has no file on the author, Michael Ervin.
- Published
- 1990
3. The Task of the Security Officer.
- Author
-
Goudsmit, S. A.
- Subjects
NATIONAL security ,SECURITY personnel ,TASKS ,SECURITY systems ,UNITED States politics & government, 1953-1961 ,CIVIL service ,PUBLIC administration - Abstract
The article discusses the nature of the U.S. security officers and their duties and responsibilities. The author states that some of the U.S. security officers are lawyers who have experience with military intelligence service, with the Federal Bureau of Investigation, or with other law enforcement agencies. He asserts that there are second-rate security officers who use their position for their own advantage. He explains that the security officer is the one responsible for safeguarding the government's military, technical, and other secrets. He stresses that the security officer does not have the power to investigate.
- Published
- 1955
- Full Text
- View/download PDF
4. AEC Majority Decision.
- Subjects
SECURITY clearances ,NUCLEAR physicists ,SCIENTISTS ,INTERNAL security ,NATIONAL security ,MILITARY intelligence - Abstract
The article reports that the U.S. Atomic Energy Commission has denied security clearance for nuclear physicists J. Robert Oppenheimer. It is reported that Oppenheimer has full access including some vital secrets in the possession of the U.S. However, the Personnel Security Board has denied any clearance to the nuclear physicist on the grounds of the Atomic Act of 1946. Some pertinent papers and records from the board, military intelligence and the Federal Bureau of Investigation presented to the Commission have suggested that Oppenheimer should not be reinstated for the concern of national security.
- Published
- 1954
- Full Text
- View/download PDF
5. Increased Immigration Enforcement and the Public Safety of Hispanics.
- Author
-
Vasquez, Leonardo
- Subjects
PUBLIC safety ,CRIME ,IMMIGRATION law ,NATIONAL security ,IMMIGRATION enforcement - Abstract
The article discusses the impact of increased immigration enforcement on the public safety of Hispanics in the United States. The Secure Communities (SC) program, implemented between 2008 and 2013, led to a 30% decrease in crime reporting and a 16% increase in victimization among Hispanics. The program increased collaboration between local police and federal immigration authorities, resulting in a decline in trust in police among immigrant communities. The research also shows that cities with higher shares of college-educated workers were more likely to recover from the loss of manufacturing jobs, while cities that depended more on manufacturing jobs were more vulnerable to deindustrialization. [Extracted from the article]
- Published
- 2024
6. A TEST OF THE ACCURACY OF CRIME STATISTICS.
- Author
-
Price, James E.
- Subjects
CRIME statistics ,NATIONAL security ,INSURANCE rates ,OFFENSES against property - Abstract
There seems to be no reason to suppose that the crime statistics published by the U.S. Federal Bureau of Investigation (F.B.I.) are an accurate measure of crime incidence. First, the crimes must be reported to the police. Whether people report crimes against property must be affected by their expectations that the police will recover their losses. Second, the crimes must be reported to the F.B.I. by the police. The degree of reporting is a convenient device available to a police administration to misrepresent the extent of criminal activity. For crimes against property there is an independent measure of the risk of crime; this is the premium rates on the various sublines of burglary insurance. A test of the accuracy of the statistics for crimes against property can be made by cross-sectional comparisons with the premium rates of insurance coverages. This paper reports the method and results of such a test; it considers some difficulties of the test and attempts to evaluate their importance.
- Published
- 1966
- Full Text
- View/download PDF
7. Ecuador's Early No-foreign Military Bases Movement.
- Author
-
BECKER, MARC
- Subjects
MILITARY readiness ,MILITARY spending ,FOREIGN military bases ,MILITARY base closures ,INTELLIGENCE service -- History ,NATIONAL security ,FOREIGN relations of the United States ,HISTORY ,INTERNATIONAL relations - Abstract
The article explores on the military-financial agreement between the U.S. and Ecuador which allow the U.S. military to use the air and naval bases at Salinas and the Galápagos islands for the defense of the Panama Canal. It highlights the struggle of the U.S. Navy to abandon its bombing range that lead to the closure of the military facilities in the island. It also history of global campaigns against foreign military bases wherein the Federal Bureau of Investigation (FBI) agents were engaged in counterintelligence surveillance in Ecuador.
- Published
- 2017
- Full Text
- View/download PDF
8. Evaluating Counterterrorism Spending.
- Subjects
COUNTERTERRORISM ,ECONOMICS ,NATIONAL security ,SEPTEMBER 11 Terrorist Attacks, 2001 & economics ,UNITED States federal budget ,TERRORISM ,ECONOMIC impact ,UNITED States economic policy ,TWENTY-first century - Abstract
In this article, we present a simple back-of-the-envelope approach for evaluating whether counterterrorism security measures reduce risk sufficiently to justify their costs. The approach uses only four variables: the consequences of a successful attack, the likelihood of a successful attack, the degree to which the security measure reduces risk, and the cost of the security measure. After measuring the cost of a counterterrorism measure, we explore a range of outcomes for the costs of terrorist attacks and a range of possible estimates for how much risk might be reduced by the measure. Then working from this mix of information and assumptions, we can calculate how many terrorist attacks (and of what size) would need to be averted to justify the cost of the counterterrorism measure in narrow cost-benefit terms. To illustrate this approach, we first apply it to the overall increases in domestic counterterrorism expenditures that have taken place since the terrorist attacks of September 11, 2001, and alternatively we apply it to just the FBI's counterterrorism efforts. We then evaluate evidence on the number and size of terrorist attacks that have actually been averted or might have been averted since 9/11. [ABSTRACT FROM AUTHOR]
- Published
- 2014
- Full Text
- View/download PDF
9. FILLING THE OVERSIGHT GAP: THE CASE FOR LOCAL INTELLIGENCE OVERSIGHT.
- Author
-
MISHKIN, BENJAMIN S.
- Subjects
DOMESTIC intelligence ,LAW enforcement ,SEPTEMBER 11 Terrorist Attacks, 2001 & society ,COUNTERTERRORISM ,NATIONAL security ,INTELLIGENCE service - Abstract
Since the September 11th attacks, local law enforcement agencies in major metropolitan areas have become increasingly involved in counterterrorism and intelligence activities. Unfortunately, this development has not yet spurred a comparable increase in intelligence oversight. Indeed, at the local level, intelligence activities are conducted largely in a "formal governance vacuum." This situation is unsustainable. Local formal oversight mechanisms are desperately needed. Whether local actors are actually up to the intelligence oversight task is another question. And it is a question that has yet to be answered in a satisfactory manner. Skeptics have written off local overseers with little explanation, while advocates of local intelligence oversight have endorsed local overseers without apparent consideration of their viability. This Note seeks to provide a comprehensive answer. Drawing upon lessons from oversight of the federal intelligence community, this Note demonstrates that the federal intelligence oversight apparatus is a workable model for the local context. [ABSTRACT FROM AUTHOR]
- Published
- 2013
10. Injury rates and injury risk factors among Federal Bureau of Investigation new agent trainees.
- Subjects
NATIONAL security ,INJURY risk factors ,PHYSICAL fitness - Abstract
The article focuses on the study which discusses the U.S. Federal Bureau of Investigation (FBI) new agent training for evaluating injury rates and injury risk factors. It states that the investigation leads to a result that lower fitness and self-reported pain limiting activity were associated with higher injury risk among FBI new agents.
- Published
- 2011
- Full Text
- View/download PDF
11. Pores and Ridges: High-Resolution Fingerprint Matching Using Level 3 Features.
- Author
-
Jain, Anil K., Yi Chen, and Demirkus, Meltem
- Subjects
HUMAN fingerprints ,SCANNING systems ,DETECTORS ,NATIONAL security ,ANTHROPOMETRY ,COMPUTER algorithms ,COMPUTER graphics - Abstract
Fingerprint friction ridge details are generally described in a hierarchical order at three different levels, namely, Level 1 (pattern), Level 2 (minutia points), and Level 3 (pores and ridge contours). Although latent print examiners frequently take advantage of Level 3 features to assist in identification, Automated Fingerprint Identification Systems (AFIS) currently rely only on Level 1 and Level 2 features. In fact, the Federal Bureau of Investigation's (FBI) standard of fingerprint resolution for AFIS is 500 pixels per inch (ppi), which is inadequate for capturing Level 3 features, such as pores. With the advances in fingerprint sensing technology, many sensors are now equipped with dual resolution (500 ppi/1,000 ppi) scanning capability. However, increasing the scan resolution alone does not necessarily provide any performance improvement in fingerprint matching, unless an extended feature set is utilized. As a result, a systematic study to determine how much performance gain one can achieve by introducing Level 3 features in AFIS is highly desired. We propose a hierarchical matching system that utilizes features at all the three levels extracted from 1,000 ppi fingerprint scans. Level 3 features, including pores and ridge contours, are automatically extracted using Gabor filters and wavelet transform and are locally matched using the Iterative Closest Point (ICP) algorithm. Our experiments show that Level 3 features carry significant discriminatory information. There is a relative reduction of 20 percent in the equal error rate (EER) of the matching system when Level 3 features are employed in combination with Level 1 and 2 features. This significant performance gain is consistently observed across various quality fingerprint images. [ABSTRACT FROM AUTHOR]
- Published
- 2007
- Full Text
- View/download PDF
12. A CPA's Skills, an Agent's Badge.
- Author
-
Koreto, Richard J.
- Subjects
ACCOUNTANTS ,CRIMINAL investigation ,NATIONAL security - Abstract
This article profiles Thomas J. Pickard, a United States certified public accountant (CPA) and special agent of the U.S. Federal Bureau of Investigation (FBI). Pickard has used both tools in his 23 years with the FBI. Licensed as a CPA in New York, with an undergraduate degree in accounting and an MBA in taxation, he worked for two and a half years at Touche Ross & Co. before joining the bureau, in the FBI's New York office, he was assistant special agent in charge (ASAC) for all white collar crime investigations and was later ASAC for violent crimes matters. He supervised the trials of the World Trade Center defendants and played a key role in the investigation of the TWA 800 explosion. In February 1998 Pickard moved from the Washington field office to FBI headquarters as assistant director in charge of its criminal investigative division, the bureau's third-highest position. The CPA's role in the FBI has grown as well; nearly 1,400 of the bureau's 12,000 special agents are "agent accountants."
- Published
- 1998
13. Insider Threats.
- Author
-
BRUST, RICHARD
- Subjects
TERRORISM ,LAW enforcement ,WIRETAPPING ,BUSINESS records ,NATIONAL security ,INFILTRATION (Military science) - Abstract
The article presents information on terrorism, the impact of Muslim terrorist activities and the need of law enforcement. The role of the U.S. Federal Bureau of Investigation in gathering information through wiretapping and business record collection and the need of balancing between security and liberty is discussed. The activities including the use of intrusive techniques, use of confidential informants and infiltration into organization are also discussed.
- Published
- 2012
14. Surveillance among the library stacks.
- Subjects
- *
ACTIONS & defenses (Administrative law) , *NATIONAL security - Abstract
Reports the lawsuit filed by National Security Archive against the Federal Bureau of Investigation in District Court in the U.S. Background paper on the FBI's library program; Request for information on the FBI's library Awareness Program; Effect of surveillance on library use.
- Published
- 1988
15. F.B.I. MAY SCRAP VITAL OVERHAUL FOR COMPUTERS.
- Author
-
Lichtblau, Eric
- Subjects
- *
COMPUTER systems , *INFORMATION technology , *NATIONAL security , *COUNTERTERRORISM - Abstract
Reports that the Federal Bureau of Investigation is on the verge of scrapping a $170 million computer overhaul that is considered critical to the campaign against terrorism but has been riddled with technical and planning problems. Last-ditch efforts to evaluate the mounting problems in creating a "paperless" work system and to determine whether any parts of the project can be salvaged; Possibility of using off-the-shelf software instead of the expensive customized features it has unsuccessfully sought to develop; Setback for the F.B.I. in a decade-long struggle to escape a paper-driven culture and replace antiquated computer systems that have hobbled counterterrorism and criminal investigations; Suggestion that the success of the effort is critical to domestic security.
- Published
- 2005
16. New Light on Old F.B.I. Fight.
- Author
-
Navarro, Mireya
- Subjects
- *
NATIONAL liberation movements , *SUBVERSIVE activities , *NATIONALISM , *ACTIVISTS , *SECESSION , *NATIONAL security , *SEPARATISTS ,PUERTO Rican history ,PUERTO Rican politics & government - Abstract
Focuses on the U.S. Federal Bureau of Investigation and its surveillance of Puerto Rican groups. Effort of Ramón Bosque-Pérez to preserve the FBI records on the independence movement in Puerto Rico; Details of the secret files, which have been declassified; Inventory of the files at Hunter College in New York by the researcher and students working for the Center for Puerto Rican Studies; History of the political movements in Puerto Rico; Assassination attempt on President Harry S. Truman; Directives from FBI director J. Edgar Hoover concerning the surveillance of activists; How the existence of the FBI papers was discovered; Indication that there were informants on the island; Role of Pedro Albizu Campos in Puerto Rico's Nationalist Party and the struggle for independence.
- Published
- 2003
17. DEPARTMENT OF JUSTICE.
- Subjects
NATIONAL security ,GRADUATES - Abstract
The article presents federal notices issued by the Department of Justice in the U.S. The notices are related with various subjects including 2014 Census of Adult Probation Supervising Agencies, Federal Bureau of Investigation (FBI) National Academy Post-Graduate Questionnaires, and FBI National Academy Post-Grdauate Questionnaire for Supervisors of Graduates.
- Published
- 2014
18. Symbolic Pardon.
- Subjects
PARDON ,CRIMINAL justice system ,EXECUTIVE power ,NATIONAL security - Abstract
The article focuses on the executive pardon given to Federal Bureau of Investigation officials W. Mark Felt and Edward S. Miller by U.S. President Ronald Reagan. The move implies that the government is on the side of its central law-enforcement agencies. The officials had been convicted of authorizing searches without warrants in order to gather leads on Weather Underground terrorists. They believed that their actions were covered by the authority of the Executive to act in defense of the nation. However, the key national-security institutions of the country came under assault. The liberal thesis that the country was the real enemy of humanitarian values became reflected in public policy. The officials were indicted and convicted. All these are as Reagan said with his pardon.
- Published
- 1981
19. Faceless Snoopers Have the Upper Hand.
- Author
-
Black, Jane
- Subjects
ELECTRONIC surveillance ,SEPTEMBER 11 Terrorist Attacks, 2001 ,NATIONAL security ,PRIVACY - Abstract
Reports on the impact of post-September 11, 2001 terrorist attack in the U.S. surveillance upgrades on the security of citizens in the U.S. Overview of the 1997 film entitled "Conspiracy Theory"; Reinstatement of the surveillance authority of the Federal Bureau of Investigation on May 29, 2002; Views of Richard Hunter, an analyst at technology consultant Gartner Group, on privacy.
- Published
- 2002
20. Library Group Tells the Story of a Gag Order by the FBI.
- Author
-
Foster, Andrea L.
- Subjects
LIBRARY laws ,ACTIONS & defenses (Law) ,LIBRARY users ,PUBLIC library services for universities & colleges ,NATIONAL security ,ACADEMIC libraries ,EDUCATIONAL law & legislation - Abstract
The article reports on a secret order issued by the U.S. Federal Bureau of Investigation to Library Connection Inc. for turning over its library patrons' records secretly. The U.S. government issued the order under the USA Patriot Act. Library Connection provides a central computer system used by 36 libraries in the Hartford area, including one academic library, at Saint Joseph College, in West Hartford. Unlike standard search warrants, national-security letters are issued without a judge's approval and bar the recipients from discussing the letters' contents with anyone except their lawyers. The American Civil Liberties Union is representing Library Connection in a lawsuit it has brought against the Justice Department over the case. In the suit, a library-group employee identified only as John Doe contends that the national-security letter violated his rights to speak freely and challenge the order in court. The provision on national-security letters was revised to say that a library would no longer be subject to receiving the order as long as the library refrained from operating as an electronic communication service.
- Published
- 2006
21. On My Mind.
- Author
-
Mueller III, Robert S.
- Subjects
PUBLIC libraries ,LIBRARY associations ,TERRORISM ,ESPIONAGE ,NATIONAL security - Abstract
Addresses the concern of the American Library Association regarding the possibility that the FBI may use the powers it obtained in the USA Patriot Act in ways that will affect libraries' traditional roles in the U.S. Significance of libraries in U.S. society; Principle of the Patriot Act's Section 215 and its impact on public libraries; Examples of criminal conduct such as terrorism and espionage, through the use of libraries.
- Published
- 2004
22. Honey pot--or not? Patricia Sexton explores the link between trans-national crime in the Pacific and crypto-currency
- Author
-
Sexton, Patricia
- Subjects
United States. Federal Bureau of Investigation ,National security ,Crypto-currencies ,Money supply ,Online assets ,Crime -- New Zealand -- Pacific Islands ,International relations ,Regional focus/area studies ,RAND Corp. - Abstract
Ever since the 2009 launch of the world's first crypto-currency, supporters and detractors have been at odds over the implications of this new digital asset class. While supporters hail crypto [...]
- Published
- 2021
23. Privacy Act of 1974; Department of Homeland Security/U.S. Citizenship and Immigration Services-016 Electronic Immigration System-3 Automated Background Functions System of Records
- Subjects
United States. Customs Service ,United States. Federal Bureau of Investigation ,United States. Department of Justice ,National security ,Privacy ,Fraud ,Emigration and immigration ,Citizenship ,Privacy issue ,Government - Abstract
SUMMARY: In accordance with the Privacy Act of 1974, the Department of Homeland Security proposes to update and reissue the Department of Homeland Security system of records titled, 'Department of [...]
- Published
- 2011
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.