The Puppet Masters

The Puppet Masters

Author: Emile van der Does de Willebois

Publisher: World Bank Publications

Published: 2011-11-01

Total Pages: 230

ISBN-13: 0821388967

DOWNLOAD EBOOK

This report examines the use of these entities in nearly all cases of corruption. It builds upon case law, interviews with investigators, corporate registries and financial institutions and a 'mystery shopping' exercise to provide evidence of this criminal practice.


Doing Business 2020

Doing Business 2020

Author: World Bank

Publisher: World Bank Publications

Published: 2019-11-21

Total Pages: 254

ISBN-13: 1464814414

DOWNLOAD EBOOK

Seventeen in a series of annual reports comparing business regulation in 190 economies, Doing Business 2020 measures aspects of regulation affecting 10 areas of everyday business activity.


The War Powers Resolution

The War Powers Resolution

Author: Congressional Research Service

Publisher: Createspace Independent Publishing Platform

Published: 2017-04-03

Total Pages: 98

ISBN-13: 9781545111680

DOWNLOAD EBOOK

This report discusses and assesses the War Powers Resolution and its application since enactment in 1973, providing detailed background on various cases in which it was used, as well as cases in which issues of its applicability were raised. It will be revised biannually. In the post-Cold War world, Presidents have continued to commit U.S. Armed Forces into potential hostilities, sometimes without a specific authorization from Congress. Thus the War Powers Resolution and its purposes continue to be a potential subject of controversy. On June 7, 1995, the House defeated, by a vote of 217-201, an amendment to repeal the central features of the War Powers Resolution that have been deemed unconstitutional by every President since the law's enactment in 1973. In 1999, after the President committed U.S. military forces to action in Yugoslavia without congressional authorization, Representative Tom Campbell used expedited procedures under the Resolution to force a debate and votes on U.S. military action in Yugoslavia, and later sought, unsuccessfully, through a federal court suit to enforce presidential compliance with the terms of the War Powers Resolution. The War Powers Resolution P.L. 93-148 was passed over the veto of President Nixon on November 7, 1973, to provide procedures for Congress and the President to participate in decisions to send U.S. Armed Forces into hostilities. Section 4(a)(1) requires the President to report to Congress any introduction of U.S. forces into hostilities or imminent hostilities. When such a report is submitted, or is required to be submitted, Section 5(b) requires that the use of forces must be terminated within 60 to 90 days unless Congress authorizes such use or extends the time period. Section 3 requires that the "President in every possible instance shall consult with Congress before introducing" U.S. Armed Forces into hostilities or imminent hostilities. From 1975 through March 2017, Presidents have submitted 168 reports as the result of the War Powers Resolution, but only one, the 1975 Mayaguez seizure, cited Section 4(a)(1), which triggers the 60-day withdrawal requirement, and in this case the military action was completed and U.S. armed forces had disengaged from the area of conflict when the report was made. The reports submitted by the President since enactment of the War Powers Resolution cover a range of military activities, from embassy evacuations to full-scale combat military operations, such as the Persian Gulf conflict, and the 2003 war with Iraq, the intervention in Kosovo, and the anti-terrorism actions in Afghanistan. In some instances, U.S. Armed Forces have been used in hostile situations without formal reports to Congress under the War Powers Resolution. On one occasion, Congress exercised its authority to determine that the requirements of Section 4(a)(1) became operative on August 29, 1983, through passage of the Multinational Force in Lebanon Resolution (P.L. 98-119). In 1991 and 2002, Congress authorized, by law, the use of military force against Iraq. In several instances none of the President, Congress, or the courts has been willing to initiate the procedures of or enforce the directives in the War Powers Resolution.


High-performance Government

High-performance Government

Author: Robert E. Klitgaard

Publisher: Rand Corporation

Published: 2005

Total Pages: 512

ISBN-13: 9780833036629

DOWNLOAD EBOOK

Improving how our government works is urgent business for America. In this book experts from the RAND corporation provide practical ways for government to reorganize and restructure, enhance leadership, and create flexible, performance-driven agencies.


Big Data a Tool for Inclusion Or Exclusion? Understanding the Issues

Big Data a Tool for Inclusion Or Exclusion? Understanding the Issues

Author: Federal Trade Federal Trade Commission

Publisher: Createspace Independent Publishing Platform

Published: 2016-07-18

Total Pages: 48

ISBN-13: 9781535337441

DOWNLOAD EBOOK

We are in the era of big data. With a smartphone now in nearly every pocket, a computer in nearly every household, and an ever-increasing number of Internet-connected devices in the marketplace, the amount of consumer data flowing throughout the economy continues to increase rapidly. The analysis of this data is often valuable to companies and to consumers, as it can guide the development of new products and services, predict the preferences of individuals, help tailor services and opportunities, and guide individualized marketing. At the same time, advocates, academics, and others have raised concerns about whether certain uses of big data analytics may harm consumers, particularly lowincome and underserved populations. To explore these issues, the Federal Trade Commission ("FTC" or "the Commission") held a public workshop, Big Data: A Tool for Inclusion or Exclusion?, on September 15, 2014. The workshop brought together stakeholders to discuss both the potential of big data to create opportunities for consumers and to exclude them from such opportunities. The Commission has synthesized the information from the workshop, a prior FTC seminar on alternative scoring products, and recent research to create this report. Though "big data" encompasses a wide range of analytics, this report addresses only the commercial use of big data consisting of consumer information and focuses on the impact of big data on low-income and underserved populations. Of course, big data also raises a host of other important policy issues, such as notice, choice, and security, among others. Those, however, are not the primary focus of this report. As "little" data becomes "big" data, it goes through several phases. The life cycle of big data can be divided into four phases: (1) collection; (2) compilation and consolidation; (3) analysis; and (4) use. This report focuses on the fourth phase and discusses the benefits and risks created by the use of big data analytics; the consumer protection and equal opportunity laws that currently apply to big data; research in the field of big data; and lessons that companies should take from the research. Ultimately, this report is intended to educate businesses on important laws and research that are relevant to big data analytics and provide suggestions aimed at maximizing the benefits and minimizing its risks.


Law Enforcement Intelligence

Law Enforcement Intelligence

Author: David L. Carter

Publisher: Createspace Independent Pub

Published: 2012-06-19

Total Pages: 318

ISBN-13: 9781477694633

DOWNLOAD EBOOK

This intelligence guide was prepared in response to requests from law enforcement executives for guidance in intelligence functions in a post-September 11 world. It will help law enforcement agencies develop or enhance their intelligence capacity and enable them to fight terrorism and other crimes while preserving community policing relationships. The world of law enforcement intelligence has changed dramatically since September 11, 2001. State, local, and tribal law enforcement agencies have been tasked with a variety of new responsibilities; intelligence is just one. In addition, the intelligence discipline has evolved significantly in recent years. As these various trends have merged, increasing numbers of American law enforcement agencies have begun to explore, and sometimes embrace, the intelligence function. This guide is intended to help them in this process. The guide is directed primarily toward state, local, and tribal law enforcement agencies of all sizes that need to develop or reinvigorate their intelligence function. Rather than being a manual to teach a person how to be an intelligence analyst, it is directed toward that manager, supervisor, or officer who is assigned to create an intelligence function. It is intended to provide ideas, definitions, concepts, policies, and resources. It is a primera place to start on a new managerial journey. Every law enforcement agency in the United States, regardless of agency size, must have the capacity to understand the implications of information collection, analysis, and intelligence sharing. Each agency must have an organized mechanism to receive and manage intelligence as well as a mechanism to report and share critical information with other law enforcement agencies. In addition, it is essential that law enforcement agencies develop lines of communication and information-sharing protocols with the private sector, particularly those related to the critical infrastructure, as well as with those private entities that are potential targets of terrorists and criminal enterprises. Not every agency has the staff or resources to create a formal intelligence unit, nor is it necessary in smaller agencies. This document will provide common language and processes to develop and employ an intelligence capacity in SLTLE agencies across the United States as well as articulate a uniform understanding of concepts, issues, and terminology for law enforcement intelligence (LEI). While terrorism issues are currently most pervasive in the current discussion of LEI, the principles of intelligence discussed in this document apply beyond terrorism and include organized crime and entrepreneurial crime of all forms. Drug trafficking and the associated crime of money laundering, for example, continue to be a significant challenge for law enforcement. Transnational computer crime, particularly Internet fraud, identity theft cartels, and global black marketeering of stolen and counterfeit goods, are entrepreneurial crime problems that are increasingly being relegated to SLTLE agencies to investigate simply because of the volume of criminal incidents. Similarly, local law enforcement is being increasingly drawn into human trafficking and illegal immigration enterprises and the often associated crimes related to counterfeiting of official documents, such as passports, visas, driver's licenses, Social Security cards, and credit cards. All require an intelligence capacity for SLTLE, as does the continuation of historical organized crime activities such as auto theft, cargo theft, and virtually any other scheme that can produce profit for an organized criminal entity. To be effective, the law enforcement community must interpret intelligence-related language in a consistent manner. In addition, common standards, policies, and practices will help expedite intelligence sharing while at the same time protecting the privacy of citizens and preserving hard-won community policing relationships.~