The Risk Management Process for Federal Facilities: An Interagency Security Committee Standard

The Risk Management Process for Federal Facilities: An Interagency Security Committee Standard

Author: Interagency Security Committee

Publisher:

Published: 2017-07-28

Total Pages: 96

ISBN-13: 9781387131471

DOWNLOAD EBOOK

One of the Department of Homeland Security's (DHS) priorities is the protection of Federal employees and private citizens who work within and visit U.S. Government-owned or leased facilities. The Interagency Security Committee (ISC), chaired by DHS, consists of 53 Federal departments and agencies, has as its mission the development of security standards and best practices for nonmilitary Federal facilities in the United States. As Chair of the ISC, I am pleased to introduce the new ISC document titled The Risk Management Process: An Interagency Security Committee Standard (Standard). This ISC Standard defines the criteria and processes that those responsible for the security of a facility should use to determine its facility security level and provides an integrated, single source of physical security countermeasures for all nonmilitary Federal facilities. The Standard also provides guidance for customization of the countermeasures for Federal facilities.


Biotechnology Research in an Age of Terrorism

Biotechnology Research in an Age of Terrorism

Author: National Research Council

Publisher: National Academies Press

Published: 2004-03-02

Total Pages: 164

ISBN-13: 0309089778

DOWNLOAD EBOOK

In recent years much has happened to justify an examination of biological research in light of national security concerns. The destructive application of biotechnology research includes activities such as spreading common pathogens or transforming them into even more lethal forms. Policymakers and the scientific community at large must put forth a vigorous and immediate response to this challenge. This new book by the National Research Council recommends that the government expand existing regulations and rely on self-governance by scientists rather than adopt intrusive new policies. One key recommendation of the report is that the government should not attempt to regulate scientific publishing but should trust scientists and journals to screen their papers for security risks, a task some journals have already taken up. With biological information and tools widely distributed, regulating only U.S. researchers would have little effect. A new International Forum on Biosecurity should encourage the adoption of similar measures around the world. Seven types of risky studies would require approval by the Institutional Biosafety Committees that already oversee recombinant DNA research at some 400 U.S. institutions. These "experiments of concern" include making an infectious agent more lethal and rendering vaccines powerless.


Protecting Individual Privacy in the Struggle Against Terrorists

Protecting Individual Privacy in the Struggle Against Terrorists

Author: National Research Council

Publisher: National Academies Press

Published: 2008-09-26

Total Pages: 376

ISBN-13: 0309134447

DOWNLOAD EBOOK

All U.S. agencies with counterterrorism programs that collect or "mine" personal data-such as phone records or Web sites visited-should be required to evaluate the programs' effectiveness, lawfulness, and impacts on privacy. A framework is offered that agencies can use to evaluate such information-based programs, both classified and unclassified. The book urges Congress to re-examine existing privacy law to assess how privacy can be protected in current and future programs and recommends that any individuals harmed by violations of privacy be given a meaningful form of redress. Two specific technologies are examined: data mining and behavioral surveillance. Regarding data mining, the book concludes that although these methods have been useful in the private sector for spotting consumer fraud, they are less helpful for counterterrorism because so little is known about what patterns indicate terrorist activity. Regarding behavioral surveillance in a counterterrorist context, the book concludes that although research and development on certain aspects of this topic are warranted, there is no scientific consensus on whether these techniques are ready for operational use at all in counterterrorism.


Federal Advisory Committees (FAC)

Federal Advisory Committees (FAC)

Author: Wendy R. Ginsberg

Publisher: DIANE Publishing

Published: 2011-08

Total Pages: 25

ISBN-13: 143798309X

DOWNLOAD EBOOK

FAC, which may also be designated as commissions, councils, or task forces ¿ are created as provisional advisory bodies that can circumvent bureaucratic constraints to collect a variety of viewpoints on specific policy issues. FAC have been created to address a host of issues, ranging from policies on organ donation to the design and implementation of the Dept. of Homeland Security. These FAC are often created to help the gov¿t. manage and solve complex or divisive issues. Contents of this report: (1) Intro.: History; The Dept. of Justice; Congress. Action; The Pres. and the Exec. Branch; Congress. Reaction; (2) The Fed. Advisory Committee Act (FACA); (3) Creating a FACA Committee; (4) Analysis. This is a print on demand report.