At the request of the Financial Crimes Enforcement Network (FinCEN), an agency of the U.S. Department of the Treasury, RAND conducted and analyzed a strategic decisionmaking exercise to examine money laundering concerns raised by the deployment of cyberpayment systems. Participants in the exercise represented the Executive Branch, the cyberpayment and banking industries, Congress, and academia. The tasks of the exercise were to (1) describe current cyberpayment concepts and systems; (2) identify an initial set of cyberpayment characteristics of particular concern to law enforcement and payment system regulators; (3) identify major issues cyberpayment policies will need to address; and (4) array appropriate recommendations to address potential system abuse in a set of proposed action plans. While it is premature to draft a comprehensive regulatory regime for cyberpayment products, participants agreed that prompt collaborative action by industry and government--and among governments--is needed. Dialogue on standards, regulatory transparency, and vigorous surveillance can prevent the criminal exploitation of cyberpayment system vulnerabilities.
Advances in information technology have led us to rely on easy communication and readily available information--both in our personal lives and in the life of our nation. For the most part, we have rightly welcomed these changes. But information that is readily available is available to friend and foe alike; a system that relies on communication can become useless if its ability to communicate is interfered with or destroyed. Because this reliance is so general, attacks on the information infrastructure can have widespread effects, both for the military and for society. And such attacks can come from a variety of sources, some difficult or impossible to identify. This, the third volume in the Strategic Appraisal series, draws on the expertise of researchers from across RAND to explore the opportunities and vulnerabilities inherent in the increasing reliance on information technology, looking both at its usefulness to the warrior and the need to protect its usefulness for everyone. The Strategic Appraisal series is intended to review, for a broad audience, issues bearing on national security and defense planning.
The proliferation of all kinds of weapons is a focal point for international security. This work shows how both the language used to talk about weapons proliferation and the practices adopted to respond to it serve to define the problem in ways that promote policy responses doomed to failure.
Every human possesses more than one virtually infallible form of identification. Known as biometrics, examples include fingerprints, iris and retinal scans, hand geometry, and other measures of physical characteristics and personal traits. Advances in computers and related technologies have made this a highly automated process through which recognition occurs almost instantaneously. With concern about its information assurance systems and physical access control increasing, the Army has undertaken an assessment of how it can use biometrics to improve security, efficiency, and convenience. This report examines the sociocultural concerns that arise among soldiers, civilian employees, and the general public when the military mandates widespread use of biometrics. The authors see no significant legal obstacles to Army use of biometrics but recommend that the Army go beyond the provisions of the Privacy Act of 1974 to allay concerns related to this emerging technology. This report should be of interest to those responsible for access control as well as anyone concerned about privacy and technology issues.
Traces the recent evolution of international terrorism against civilian and U.S. military targets, looks ahead to where terrorism is going, and assesses how it might be contained. The authors consider the threat of information-based terrorism and of weapons of mass destruction, with an emphasis on how changes in the sources and nature of terrorism may affect the use of unconventional terror. The authors propose counterterrorism strategies that address the growing problem of homeland defense.
Few international issues have aroused as much passionate interest and political activity among Canadians. The contest on "the domestic battleground" has been decisive in determining Canada's policies in the Middle East. The Domestic Battleground provides the history and background needed to understand Canadian attitudes toward both the explosive unrest occurring in the West Bank and Gaza Strip and the participants in the conflict - Israel, the Palestinians, and the rest of the Arab world. Taras and Goldberg analyse the struggles over the levers of decision making in Ottawa and the battle between moral stances and convictions that has taken place among concerned Canadians. The Domestic Battleground is the first book devoted to analysing the study of Canada's Middle Eastern policy. David Taras and David H. Goldberg take readers inside the Canadian decision-making process on key issues regarding the Middle East over the last forty years. Bringing together articles by scholars with differing perspectives, this volume brings to light the positions and actions of Canadian political leaders - Mackenzie King, Lester B. Pearson, Joe Clark, Pierre Trudeau, and Brian Mulroney - and assess the impact of media coverage, corporate and governmental interests, and Arab and Jewish lobby groups. The Domestic Battleground addresses the narrowing of the emotional distance separating Canada from the conflicts and disputes indigenous to the Middle East and responds to the presence of the Arab-Israeli conflict in the mainstream of daily life and politics in Canada.
The information revolution--which is as much an organizational as a technological revolution--is transforming the nature of conflict across the spectrum: from open warfare, to terrorism, crime, and even radical social activism. The era of massed field armies is passing, because the new information and communications systems are increasing the lethality of quite small units that can call in deadly, precise missile fire almost anywhere, anytime. In social conflicts, the Internet and other media are greatly empowering individuals and small groups to influence the behavior of states. Whether in military or social conflicts, all protagonists will soon be developing new doctrines, strategies, and tactics for swarming their opponents--with weapons or words, as circumstances require. Preparing for conflict in such a world will require shifting to new forms of organization, particularly the versatile, hardy, all-channel network. This shift will prove difficult for states and professional militaries that remain bastions of hierarchy, bound to resist institutional redesign. They will make the shift as they realize that information and knowledge are becoming the key elements of power. This implies, among other things, that Mars, the old brute-force god of war, must give way to Athena, the well-armed goddess of wisdom. Accepting Athena as the patroness of this information age represents a first step not only for preparing for future conflicts, but also for preventing them.
The Big House Anthology is a celebration of the last decade of work and plays by a unique theatre company, featuring five original plays that offer a chance for stories with diverse casts to contribute to the canon of theatre's literature. As a UK-based theatre company, The Big House empowers care leavers and other disadvantaged young people through performance and long-term support. Their plays are born from the hearts and minds of the young people they engage, with this anthology offering five very different plays: a runner struck down by MS; a rapper who spits and snarls and tries to find it in herself to forgive; a teenager who fights for wealth, status and respect in the underworld of county lines; a cackling cowboy they call Corona; and a dog that has been tracked, murdered and stuck in a stew. This anthology celebrates the explosive creativity that comes from mobilising and platforming diverse voices, and its importance in generating social change. Framed and introduced by directors and writers discussing their practice, along with an introduction by Jez Butterworth, this is a book for students, educators, artists, theatre-practitioners, social workers and storytellers to tell stories that are rarely told, let alone with such fierce authenticity.
At the request of the Financial Crimes Enforcement Network (FinCEN), an agency of the U.S. Department of the Treasury, RAND conducted and analyzed a strategic decisionmaking exercise to examine money laundering concerns raised by the deployment of cyberpayment systems. Participants in the exercise represented the Executive Branch, the cyberpayment and banking industries, Congress, and academia. The tasks of the exercise were to (1) describe current cyberpayment concepts and systems; (2) identify an initial set of cyberpayment characteristics of particular concern to law enforcement and payment system regulators; (3) identify major issues cyberpayment policies will need to address; and (4) array appropriate recommendations to address potential system abuse in a set of proposed action plans. While it is premature to draft a comprehensive regulatory regime for cyberpayment products, participants agreed that prompt collaborative action by industry and government--and among governments--is needed. Dialogue on standards, regulatory transparency, and vigorous surveillance can prevent the criminal exploitation of cyberpayment system vulnerabilities.
This will help us customize your experience to showcase the most relevant content to your age group
Please select from below
Login
Not registered?
Sign up
Already registered?
Success – Your message will goes here
We'd love to hear from you!
Thank you for visiting our website. Would you like to provide feedback on how we could improve your experience?
This site does not use any third party cookies with one exception — it uses cookies from Google to deliver its services and to analyze traffic.Learn More.