You are a SPECIAL Librarian! You are a Military Librarian!

Tag Archive | "business and economics"

DoD Press Briefing on Navy Yard Shooting investigations

Defense Department Press Briefing on Implementation Plans as a Result of the Washington Navy Yard Shooting Investigations and Reviews by Secretary Hagel and Navy Secretary Mabus in the Pentagon Briefing Room
Source: U.S. Department of Defense

Okay. Six months ago, the Department of Defense lost 12 members of its family in a senseless act of violence at the Washington Navy Yard. I said at the time that where there are gaps or inadequacies in the department’s security, we’ll find them and we’ll correct them.

And accordingly today, I’m announcing steps DoD is taking to enhance physical security at our installations and improve security clearance procedures responding to lessons learned from this terrible, terrible tragedy. These new measures are based on the recommendations of two reviews that I ordered in the aftermath of the shooting, including an internal review, led by Undersecretary of Defense for Intelligence Michael Vickers, and an outside review, led by former Assistant Secretary of Defense Paul Stockton, who is with us today, and retired Admiral Eric Olson.

Secretary Mabus, who joins me here this morning, also directed the Department of the Navy to conduct its own reviews of security standards, which complemented our work. I appreciate the hard work and the thorough analysis that went into all of these efforts by all of these people.

The reviews identified troubling gaps in DoD’s ability to detect, prevent, and respond to instances where someone working for us, a government employee, member of our military, or a contractor, decides to inflict harm on this institution and its people.

Posted in Current Events, LinksComments Off

RAND: Markets for Cybercrime Tools and Stolen Data: Hackers’ Bazaar

Markets for Cybercrime Tools and Stolen Data: Hackers’ Bazaar
Source: RAND Corporation

Criminal activities in cyberspace are increasingly facilitated by burgeoning black markets for both tools (e.g., exploit kits) and take (e.g., credit card information). This report, part of a multiphase study on the future security environment, describes the fundamental characteristics of these markets and how they have grown into their current state to explain how their existence can harm the information security environment. Understanding the current and predicted landscape for these markets lays the groundwork for follow-on exploration of options to minimize the potentially harmful influence these markets impart. Experts agree that the coming years will bring more activity in darknets, more use of crypto-currencies, greater anonymity capabilities in malware, and more attention to encrypting and protecting communications and transactions; that the ability to stage cyberattacks will likely outpace the ability to defend against them; that crime will increasingly have a networked or cyber component, creating a wider range of opportunities for black markets; and that there will be more hacking for hire, as-a-service offerings, and brokers. Experts disagree, however, on who will be most affected by the growth of the black market (e.g., small or large businesses, individuals), what products will be on the rise (e.g., fungible goods, such as data records and credit card information; non-fungible goods, such as intellectual property), or which types of attacks will be most prevalent (e.g., persistent, targeted attacks; opportunistic, mass “smash-and-grab” attacks).

Posted in Current Events, LinksComments Off

RAND: Markets for Cybercrime Tools and Stolen Data: Hackers’ Bazaar

Markets for Cybercrime Tools and Stolen Data: Hackers’ Bazaar
Source: RAND Corporation

Criminal activities in cyberspace are increasingly facilitated by burgeoning black markets for both tools (e.g., exploit kits) and take (e.g., credit card information). This report, part of a multiphase study on the future security environment, describes the fundamental characteristics of these markets and how they have grown into their current state to explain how their existence can harm the information security environment. Understanding the current and predicted landscape for these markets lays the groundwork for follow-on exploration of options to minimize the potentially harmful influence these markets impart. Experts agree that the coming years will bring more activity in darknets, more use of crypto-currencies, greater anonymity capabilities in malware, and more attention to encrypting and protecting communications and transactions; that the ability to stage cyberattacks will likely outpace the ability to defend against them; that crime will increasingly have a networked or cyber component, creating a wider range of opportunities for black markets; and that there will be more hacking for hire, as-a-service offerings, and brokers. Experts disagree, however, on who will be most affected by the growth of the black market (e.g., small or large businesses, individuals), what products will be on the rise (e.g., fungible goods, such as data records and credit card information; non-fungible goods, such as intellectual property), or which types of attacks will be most prevalent (e.g., persistent, targeted attacks; opportunistic, mass “smash-and-grab” attacks).

Posted in Current Events, LinksComments Off

More Full Text Reports from CRS, Lexis-Nexis, and other sources

CRS — Terrorism Risk Insurance: Issue Analysis and Overview of Current Program

Posted: 10 Mar 2014 08:30 AM PDT

Terrorism Risk Insurance: Issue Analysis and Overview of Current Program (PDF) Source: Congressional Research Service (via Federation of American Scientists) Prior to the September 11, 2001, terrorist attacks, insurance coverage for losses from such attacks was normally included in general insurance policies without specific cost to the policyholders. Following the attacks, such coverage became very […]

 

 

CRS — Army Drawdown and Restructuring: Background and Issues for Congress

Posted: 10 Mar 2014 08:00 AM PDT

Army Drawdown and Restructuring: Background and Issues for Congress (PDF) Source: Congressional Research Service (via Federation of American Scientists) On January 26, 2012, senior DOD leadership unveiled a new defense strategy based on a review of potential future security challenges, current defense strategy, and budgetary constraints. This new strategy envisions a smaller, leaner Army that […]

 

 

CRS — Israel: Background and U.S. Relations (updated)

Posted: 10 Mar 2014 07:30 AM PDT

Israel: Background and U.S. Relations (PDF) Source: Congressional Research Service (via Federation of American Scientists) Since Israel’s founding in 1948, successive U.S. Presidents and many Members of Congress have demonstrated a commitment to Israel’s security and to maintaining close U.S.-Israel defense, diplomatic, and economic cooperation. U.S. and Israeli leaders have developed close relations based on […]

 

 

CRS — Venezuela: Background and U.S. Relations

Posted: 10 Mar 2014 07:00 AM PDT

Venezuela: Background and U.S. Relations Source: Congressional Research Service (via Federation of American Scientists) While historically the United States has had close relations with Venezuela, a major oil supplier, friction in bilateral relations rose over the past decade under the leftist populist government of President Hugo Chávez, who died in March 2013 after battling cancer […]

 

 

CRS — Direct Overt U.S. Aid Appropriations for and Military Reimbursements to Pakistan, FY2002-FY2015

Posted: 10 Mar 2014 06:30 AM PDT

Direct Overt U.S. Aid Appropriations for and Military Reimbursements to Pakistan, FY2002-FY2015 (PDF) Source: Congressional Research Service (via Federation of American Scientists) ChartFiled under: business and economics, Congressional Research Service, international relations, military and defense, Pakistan

 

 

2013 Military Parent Custody and Visitation Legislation

Posted: 10 Mar 2014 06:00 AM PDT

2013 Military Parent Custody and Visitation Legislation Source: National Conference of State Legislatures Over the last decade, legislation addressing issues facing military parents has become a national trend. With the number of custody and visitation issues among military families growing, the National Conference of Commissioners on Uniform State Laws drafted the Uniform Deployed Parents Custody […]

 

 

CRS — China Naval Modernization: Implications for U.S. Navy Capabilities — Background and Issues for Congress

Posted: 10 Mar 2014 05:30 AM PDT

China Naval Modernization: Implications for U.S. Navy Capabilities — Background and Issues for Congress (PDF) Source: Congressional Research Service (via Federation of American Scientists) China is building a modern and regionally powerful Navy with a modest but growing capability for conducting operations beyond China’s near-seas region. The question of how the United States should respond […]

 

 

LexisNexis — 2013 Best Practices for Government Libraries

Posted: 10 Mar 2014 05:00 AM PDT

2013 Best Practices for Government Libraries Source: LexisNexis From blog post: The 2013 Best Practices for Government Libraries: Managing Evolving Resources: Strategies, Capabilities, and Alternatives is now available in PDF. 2012 and prior years of Best Practices for Government Libraries are all available from the right sidebar here on the Government Info Pro. The e-book […]

 

 

Posted in Current Events, LinksComments Off

Who Are the Customers for Intelligence?

Who Are the Customers for Intelligence?

Source: Association of Former Intelligence Officers

Who uses intelligence and why? The short answer is almost everyone and to gain an advantage. While nation-states are most closely identified with intelligence, private corporations and criminal entities also invest in gathering and analyzing information to advance their goals. … There are four communities that use intelligence: the national security community, the homeland security community, the law enforcement community, and the private sector.

Posted in Current Events, LinksComments Off

Blog Archives