934 resultados para Security classification (Government documents)


Relevância:

30.00% 30.00%

Publicador:

Resumo:

Iowa Department of Homeland Security and Emergency Management Annul Report

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The Iowa Department of Homeland Security and Emergency Management (HSEMD) submits this enhanced 911 (E911) annual report to the Iowa General Assembly’s standing committees on government oversight pursuant to Iowa Code § 34A.7A (3) (a). This section of the Code requires the E911 program manager to advise the General Assembly of the status of E911 wireline and wireless implementation and operations, the distribution of surcharge receipts, and an accounting of revenue and expenses of the E911 program.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

the purpose of the Introduction to Homeland Security and Emergency Management for Local Officials is to provide information regarding the system. You will learn about local and state emergency management; hazards that affect the state; comprehensive planning requirements; emergency declarations; available state and federal assistance and other important topics that will help you become more versed in homeland security and emergency management in Iowa.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

False identity documents represent a serious threat through their production and use in organized crime and by terrorist organizations. The present-day fight against this criminal problem and threats to national security does not appropriately address the organized nature of this criminal activity, treating each fraudulent document on its own during investigation and the judicial process, which causes linkage blindness and restrains the analysis capacity. Given the drawbacks of this case-by-case approach, this article proposes an original model in which false identity documents are used to inform a systematic forensic intelligence process. The process aims to detect links, patterns, and tendencies among false identity documents in order to support strategic and tactical decision making, thus sustaining a proactive intelligence-led approach to fighting identity document fraud and the associated organized criminality. This article formalizes both the model and the process, using practical applications to illustrate its powerful capabilities. This model has a general application and can be transposed to other fields of forensic science facing similar difficulties.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

El treball de recerca del Màster en Arxivística i Gestió de Documents de l’ESAGED (Escola Superior d’Arxivística i Gestió de Documents) ha consistit en l’estudi i l’avaluació del registre general d’entrades i sortides de documents de l’Ajuntament de Santa Perpètua de Mogoda, en fase de producció. A més d’estudiar-ne el context extern i intern s’han auditat les funcionalitats de l’eina tecnològica que gestiona el Registre General. S’explica el desenvolupament de la recerca i els resultats obtinguts. Finalment, es presenten les propostes de millora en fase de producció a fi d’augmentar l’autenticitat i la integritats de les dades, i també unes propostes de conservació del Registre General actual. Paraules clau: Registre General, preservació, base de dades, assentaments, ajuntament, classificació, gestió de documents, dades, informació, fiabilitat, integritat, autenticitat.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

La fabrication, la distribution et l'usage de fausses pièces d'identité constituent une menace pour la sécurité autant publique que privée. Ces faux documents représentent en effet un catalyseur pour une multitude de formes de criminalité, des plus anodines aux formes les plus graves et organisées. La dimension, la complexité, la faible visibilité, ainsi que les caractères répétitif et évolutif de la fraude aux documents d'identité appellent des réponses nouvelles qui vont au-delà d'une approche traditionnelle au cas par cas ou de la stratégie du tout technologique dont la perspective historique révèle l'échec. Ces nouvelles réponses passent par un renforcement de la capacité de comprendre les problèmes criminels que posent la fraude aux documents d'identité et les phénomènes qui l'animent. Cette compréhension est tout bonnement nécessaire pour permettre d'imaginer, d'évaluer et de décider les solutions et mesures les plus appropriées. Elle requière de développer les capacités d'analyse et la fonction de renseignement criminel qui fondent en particulier les modèles d'action de sécurité les plus récents, tels que l'intelligence-led policing ou le problem-oriented policing par exemple. Dans ce contexte, le travail doctoral adopte une position originale en postulant que les fausses pièces d'identité se conçoivent utilement comme la trace matérielle ou le vestige résultant de l'activité de fabrication ou d'altération d'un document d'identité menée par les faussaires. Sur la base de ce postulat fondamental, il est avancé que l'exploitation scientifique, méthodique et systématique de ces traces au travers d'un processus de renseignement forensique permet de générer des connaissances phénoménologiques sur les formes de criminalité qui fabriquent, diffusent ou utilisent les fausses pièces d'identité, connaissances qui s'intègrent et se mettent avantageusement au service du renseignement criminel. A l'appui de l'épreuve de cette thèse de départ et de l'étude plus générale du renseignement forensique, le travail doctoral propose des définitions et des modèles. Il décrit des nouvelles méthodes de profilage et initie la constitution d'un catalogue de formes d'analyses. Il recourt également à des expérimentations et des études de cas. Les résultats obtenus démontrent que le traitement systématique de la donnée forensique apporte une contribution utile et pertinente pour le renseignement criminel stratégique, opérationnel et tactique, ou encore la criminologie. Combiné aux informations disponibles par ailleurs, le renseignement forensique produit est susceptible de soutenir l'action de sécurité dans ses dimensions répressive, proactive, préventive et de contrôle. En particulier, les méthodes de profilage des fausses pièces d'identité proposées permettent de révéler des tendances au travers de jeux de données étendus, d'analyser des modus operandi ou d'inférer une communauté ou différence de source. Ces méthodes appuient des moyens de détection et de suivi des séries, des problèmes et des phénomènes criminels qui s'intègrent dans le cadre de la veille opérationnelle. Ils permettent de regrouper par problèmes les cas isolés, de mettre en évidence les formes organisées de criminalité qui méritent le plus d'attention, ou de produire des connaissances robustes et inédites qui offrent une perception plus profonde de la criminalité. Le travail discute également les difficultés associées à la gestion de données et d'informations propres à différents niveaux de généralité, ou les difficultés relatives à l'implémentation du processus de renseignement forensique dans la pratique. Ce travail doctoral porte en premier lieu sur les fausses pièces d'identité et leur traitement par les protagonistes de l'action de sécurité. Au travers d'une démarche inductive, il procède également à une généralisation qui souligne que les observations ci-dessus ne valent pas uniquement pour le traitement systématique des fausses pièces d'identité, mais pour celui de tout type de trace dès lors qu'un profil en est extrait. Il ressort de ces travaux une définition et une compréhension plus transversales de la notion et de la fonction de renseignement forensique. The production, distribution and use of false identity documents constitute a threat to both public and private security. Fraudulent documents are a catalyser for a multitude of crimes, from the most trivial to the most serious and organised forms. The dimension, complexity, low visibility as well as the repetitive and evolving character of the production and use of false identity documents call for new solutions that go beyond the traditional case-by-case approach, or the technology-focused strategy whose failure is revealed by the historic perspective. These new solutions require to strengthen the ability to understand crime phenomena and crime problems posed by false identity documents. Such an understanding is pivotal in order to be able to imagine, evaluate and decide on the most appropriate measures and responses. Therefore, analysis capacities and crime intelligence functions, which found the most recent policing models such as intelligence-led policing or problem-oriented policing for instance, have to be developed. In this context, the doctoral research work adopts an original position by postulating that false identity documents can be usefully perceived as the material remnant resulting from the criminal activity undertook by forgers, namely the manufacture or the modification of identity documents. Based on this fundamental postulate, it is proposed that a scientific, methodical and systematic processing of these traces through a forensic intelligence approach can generate phenomenological knowledge on the forms of crime that produce, distribute and use false identity documents. Such knowledge should integrate and serve advantageously crime intelligence efforts. In support of this original thesis and of a more general study of forensic intelligence, the doctoral work proposes definitions and models. It describes new profiling methods and initiates the construction of a catalogue of analysis forms. It also leverages experimentations and case studies. Results demonstrate that the systematic processing of forensic data usefully and relevantly contributes to strategic, tactical and operational crime intelligence, and also to criminology. Combined with alternative information available, forensic intelligence may support policing in its repressive, proactive, preventive and control activities. In particular, the proposed profiling methods enable to reveal trends among extended datasets, to analyse modus operandi, or to infer that false identity documents have a common or different source. These methods support the detection and follow-up of crime series, crime problems and phenomena and therefore contribute to crime monitoring efforts. They enable to link and regroup by problems cases that were previously viewed as isolated, to highlight organised forms of crime which deserve greatest attention, and to elicit robust and novel knowledge offering a deeper perception of crime. The doctoral research work discusses also difficulties associated with the management of data and information relating to different levels of generality, or difficulties associated with the implementation in practice of the forensic intelligence process. The doctoral work focuses primarily on false identity documents and their treatment by policing stakeholders. However, through an inductive process, it makes a generalisation which underlines that observations do not only apply to false identity documents but to any kind of trace as soon as a profile is extracted. A more transversal definition and understanding of the concept and function of forensic intelligence therefore derives from the doctoral work.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Internet on elektronisen postin perusrakenne ja ollut tärkeä tiedonlähde akateemisille käyttäjille jo pitkään. Siitä on tullut merkittävä tietolähde kaupallisille yrityksille niiden pyrkiessä pitämään yhteyttä asiakkaisiinsa ja seuraamaan kilpailijoitansa. WWW:n kasvu sekä määrällisesti että sen moninaisuus on luonut kasvavan kysynnän kehittyneille tiedonhallintapalveluille. Tällaisia palveluja ovet ryhmittely ja luokittelu, tiedon löytäminen ja suodattaminen sekä lähteiden käytön personointi ja seuranta. Vaikka WWW:stä saatavan tieteellisen ja kaupallisesti arvokkaan tiedon määrä on huomattavasti kasvanut viime vuosina sen etsiminen ja löytyminen on edelleen tavanomaisen Internet hakukoneen varassa. Tietojen hakuun kohdistuvien kasvavien ja muuttuvien tarpeiden tyydyttämisestä on tullut monimutkainen tehtävä Internet hakukoneille. Luokittelu ja indeksointi ovat merkittävä osa luotettavan ja täsmällisen tiedon etsimisessä ja löytämisessä. Tämä diplomityö esittelee luokittelussa ja indeksoinnissa käytettävät yleisimmät menetelmät ja niitä käyttäviä sovelluksia ja projekteja, joissa tiedon hakuun liittyvät ongelmat on pyritty ratkaisemaan.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

In the past few decades, the rise of criminal, civil and asylum cases involving young people lacking valid identification documents has generated an increase in the demand of age estimation. The chronological age or the probability that an individual is older or younger than a given age threshold are generally estimated by means of some statistical methods based on observations performed on specific physical attributes. Among these statistical methods, those developed in the Bayesian framework allow users to provide coherent and transparent assignments which fulfill forensic and medico-legal purposes. The application of the Bayesian approach is facilitated by using probabilistic graphical tools, such as Bayesian networks. The aim of this work is to test the performances of the Bayesian network for age estimation recently presented in scientific literature in classifying individuals as older or younger than 18 years of age. For these exploratory analyses, a sample related to the ossification status of the medial clavicular epiphysis available in scientific literature was used. Results obtained in the classification are promising: in the criminal context, the Bayesian network achieved, on the average, a rate of correct classifications of approximatively 97%, whilst in the civil context, the rate is, on the average, close to the 88%. These results encourage the continuation of the development and the testing of the method in order to support its practical application in casework.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Based on four different public R&D calls from the Catalan government, this article evaluates the propensity of entrants and young firms to apply for R&D public grants and, as compared to their counterparts, their capacity for obtaining subsides. This analysis is particularly relevant since entrants and young firms encounter greater market difficulties. Our sample contains 22,139 firms and corresponds to a merge of two databases: one from the Catalan agency responsible for promoting private innovation (ACC1Ó) and the other from the Mercantile Register. Merging these databases has two advantages. Firstly, participants and non-participants in the public R&D call (“InnoEmpresa”) are included and, secondly, it provides us with information at firm and project level. The period of observation is between 2006 and 2010, since some explanatory variables are lagged by one period. We apply a two-step methodology. Our results show that entrants and young firms show a lower propensity to apply for R&D subsidies and to obtain R&D public grants. Firm size, exports and participation in a previous call show a positive impact on the likelihood of applying, and firms located in the Barcelona metropolitan area have a greater propensity to apply. Additionally, project quality and R&D cooperative reports presented jointly with other partners have a positive impact on the likelihood of obtaining the R&D subsidy. Finally, firms that have previously obtained an R&D subsidy do not exhibit a greater propensity for obtaining subsequent grants. Keywords: R&D subsidies, entrants and young firms Classification JEL: L53, L25, O38

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Forensic intelligence has recently gathered increasing attention as a potential expansion of forensic science that may contribute in a wider policing and security context. Whilst the new avenue is certainly promising, relatively few attempts to incorporate models, methods and techniques into practical projects are reported. This work reports a practical application of a generalised and transversal framework for developing forensic intelligence processes referred to here as the Transversal model adapted from previous work. Visual features present in the images of four datasets of false identity documents were systematically profiled and compared using image processing for the detection of a series of modus operandi (M.O.) actions. The nature of these series and their relation to the notion of common source was evaluated with respect to alternative known information and inferences drawn regarding respective crime systems. 439 documents seized by police and border guard authorities across 10 jurisdictions in Switzerland with known and unknown source level links formed the datasets for this study. Training sets were developed based on both known source level data, and visually supported relationships. Performance was evaluated through the use of intra-variability and inter-variability scores drawn from over 48,000 comparisons. The optimised method exhibited significant sensitivity combined with strong specificity and demonstrates its ability to support forensic intelligence efforts.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Phase encoded nano structures such as Quick Response (QR) codes made of metallic nanoparticles are suggested to be used in security and authentication applications. We present a polarimetric optical method able to authenticate random phase encoded QR codes. The system is illuminated using polarized light and the QR code is encoded using a phase-only random mask. Using classification algorithms it is possible to validate the QR code from the examination of the polarimetric signature of the speckle pattern. We used Kolmogorov-Smirnov statistical test and Support Vector Machine algorithms to authenticate the phase encoded QR codes using polarimetric signatures.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Uusi patoturvallisuuslaki (494/2009) tuli voimaan 1.10.2009 ja valtioneuvoston asetus patoturvallisuudesta (319/2010) 5.5.2010. Tämä patoturvallisuusopas korvaa patoturvallisuusohjeet (MMM:n julkaisuja 7/1997), jotka poistuivat käytöstä 1.10.2009. Patoturvallisuusoppaassa esitetty ei ole padon omistajaa sitovaa, vaan oppaan tarkoitus on täydentää ja selventää esimerkein ja selostuksin laissa ja asetuksessa esitettyä. Oppaassa käsitellään padon suunnittelua kuten hydrologista mitoitusta ja padon teknisiä turvallisuusvaatimuksia, padon rakentamista ja käyttöönottoa sekä vahingonvaaraselvitystä, padon omistajan turvallisuussuunnitelmaa sekä padon kunnossapitoa, käyttöä, tarkkailua, vuosi- ja määräaikaistarkastuksia. Padot luokitellaan vahingonvaaran perusteella luokkiin 1, 2 ja 3. Luokittelua ei tarvitse kuitenkaan tehdä, jos patoturvallisuusviranomainen katsoo, että padosta ei aiheudu vaaraa. Jokaiselle luokitellulle padolle on padon omistajan laadittava tarkkailuohjelma, jonka patoturvallisuusviranomainen hyväksyy päätöksellään. Padosta aiheutuvan vahingonvaaran selvittämiseksi 1-luokan padon omistajan on laadittava vahingonvaaraselvitys padosta ihmisille, omaisuudelle ja ympäristölle aihetuvasta vahingonvaarasta. Myös muusta kuin 1-luokan padosta voi patoturvallisuusviranomainen määrätä tehtäväksi vahingonvaaraselvityksen luokittelua varten. Padon omistajan on laadittava 1-luokan padolle turvallisuussuunnitelma onnettomuus- ja häiriötilanteiden varalle. Suunnitelmassa esitetään padon omistajan omatoiminen varautuminen em. tilanteiden varalle. Pelastusviranomainen arvioi tapauskohtaisesti pelastuslain mukaisen suunnitelman laatimistarpeen. Padon omistajan on toimitettava patoturvallisuusviranomaiselle tietojärjestelmään vietäväksi patoturvallisuusasetuksessa mainitut tiedot. Patoturvallisuusviranomaisen ja padon omistajan on säilytettävä kustakin luokitellusta padosta ajantasaiset tulosteet tietojärjestelmästä sekä muut padon turvallisuuden kannalta tärkeät asiakirjat patoturvallisuuskansiossa siten, että ne ovat mahdollisissa häiriötilanteissa nopeasti saatavilla.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Ever since Siad Barre’s regime was toppled in the beginning of the 1990’s Somalia has been without an effective central government. As a result Somalia has remained in an anarchic condition of state collapse for nearly two decades. This anarchy has often been put forward as a potential breeding ground for terrorism. As a response to this threat the United States has undertaken several policies, initiatives, and operations in the Horn of Africa generally and in Somalia specifically. In this descriptive study a twofold analysis has been undertaken. First, conditions in present day Somalia as well as Somali history have been analyzed to evaluate the potential Somalia holds as a terrorist base of operations or a recruiting- or staging area. Second, US strategies and actions have been analyzed to evaluate the adequacy of the US response to the threat Somalia poses in terms of terrorism. Material for the analyses have been derived from anthropological, political, and security studies dealing with Somalia. This material has been augmented by a wide range of news coverage, western and non-western. Certain different US policy documents from different levels have been chosen to represent US strategies for the Global War on Terrorism. Because Somali social institutions, such as the clan system, hold great weight in Somali society, Somalia is a difficult area of operations for terrorist networks. In addition the changing nature of Somali alliances and the tangled webs of conflict that characterize present day Somalia aggravate the difficulties that foreign terrorist networks would encounter in Somalia, would they choose to try to utilize it in any great extent. The US has taken potential terrorism threats in Africa and specifically Somalia very seriously. US actions in Somalia have mainly focused on apprehending or neutralizing terror suspects. Such policies, coupled with backing the Ethiopian invasion of Somalia may have actually turned out increasing Somalia’s terror potential.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

A new Dam Safety Act (494/2009) came into force on 1st October 2009 and a Government Decree on Dam Safety (319/2010) on 5th May 2010. This Dam Safety Guide replaces the Dam Safety Code of Practice (Publication of the Ministry of Agriculture and Forestry 7/1997), removed from circulation on 1st October 2009. The Dam Safety Guide is not binding on the dam owner; the purpose is to complement and elucidate the relevant law and and decree through examples and descriptions. The Guide takes up questions concerning dam design, for instance hydrological dimensioning and technical safety requirements, dam construction and use, the dam break hazard analysis and the dam owner’s emergency action plan, maintenance, use, monitoring as well as the annual and periodic inspections. Dams are classified according to the hazard they pose into class 1, 2 or 3 dams. The classification is not needed, if, according to the dam safety authority, the dam poses no danger. The owner of a classified dam must prepare a monitoring programme, to be approved by decision of the dam safety authority. To establish the hazard caused by a dam, the owner of a class 1 dam must prepare an analysis of the dam hazard to humans and property as well as to the environment. The dam safety authority may also require a dam break hazard analysis for a dam other than class 1 dam if deemed necessary for classification. The owner of a class 1 dam must prepare a plan of measures in case of emergency or operational failure. The plan shall present the dam owner’s state of preparedness to act on their own initiative in the situations described above. In each case, the rescue authorities make a separate assessment for the need to prepare a plan as set out in the Rescue Act. The dam owner must provide the information specified in the Dam Safety Decree to be entered into the dam safety information system. The dam safety authority and the owner of the dam must keep up-to-date printouts in their own dam safety files from the information system for each dam as well as other important documents connected with dam safety to ensure that these are readily available in case of disturbance.