Preparing the U.S. Army for Homeland Security

Preparing the U.S. Army for Homeland Security PDF

Author: Eric Victor Larson

Publisher: Rand Corporation

Published: 2001

Total Pages: 144

ISBN-13: 9780833029195

DOWNLOAD EBOOK →

Although military policy seems focused on overseas threats, defending the homeland is, of course, the ultimate objective. This guide examines emergent threats to the USA homeland such as speciality weapons, cyber attacks and ballistic missiles and delineates the army's responsibilities.

To Err Is Human

To Err Is Human PDF

Author: Institute of Medicine

Publisher: National Academies Press

Published: 2000-03-01

Total Pages: 312

ISBN-13: 0309068371

DOWNLOAD EBOOK →

Experts estimate that as many as 98,000 people die in any given year from medical errors that occur in hospitals. That's more than die from motor vehicle accidents, breast cancer, or AIDSâ€"three causes that receive far more public attention. Indeed, more people die annually from medication errors than from workplace injuries. Add the financial cost to the human tragedy, and medical error easily rises to the top ranks of urgent, widespread public problems. To Err Is Human breaks the silence that has surrounded medical errors and their consequenceâ€"but not by pointing fingers at caring health care professionals who make honest mistakes. After all, to err is human. Instead, this book sets forth a national agendaâ€"with state and local implicationsâ€"for reducing medical errors and improving patient safety through the design of a safer health system. This volume reveals the often startling statistics of medical error and the disparity between the incidence of error and public perception of it, given many patients' expectations that the medical profession always performs perfectly. A careful examination is made of how the surrounding forces of legislation, regulation, and market activity influence the quality of care provided by health care organizations and then looks at their handling of medical mistakes. Using a detailed case study, the book reviews the current understanding of why these mistakes happen. A key theme is that legitimate liability concerns discourage reporting of errorsâ€"which begs the question, "How can we learn from our mistakes?" Balancing regulatory versus market-based initiatives and public versus private efforts, the Institute of Medicine presents wide-ranging recommendations for improving patient safety, in the areas of leadership, improved data collection and analysis, and development of effective systems at the level of direct patient care. To Err Is Human asserts that the problem is not bad people in health careâ€"it is that good people are working in bad systems that need to be made safer. Comprehensive and straightforward, this book offers a clear prescription for raising the level of patient safety in American health care. It also explains how patients themselves can influence the quality of care that they receive once they check into the hospital. This book will be vitally important to federal, state, and local health policy makers and regulators, health professional licensing officials, hospital administrators, medical educators and students, health caregivers, health journalists, patient advocatesâ€"as well as patients themselves. First in a series of publications from the Quality of Health Care in America, a project initiated by the Institute of Medicine

Critical Infrastructure Protection and the Endangerment of Civil Liberties

Critical Infrastructure Protection and the Endangerment of Civil Liberties PDF

Author: Electronic Privacy Information Center

Publisher: EPIC (DC)

Published: 1998

Total Pages: 70

ISBN-13:

DOWNLOAD EBOOK →

The Privacy Law Sourcebook is the leading resource for students, attorneys, researchers, and journalists interested in privacy law in the United States and around the world. It includes major US privacy laws such as the Fair Credit Reporting Act, the Communications Act, the Privacy Act, the Family Educational Rights and Privacy Act, the Electronic Communications Act, the Video Privacy Protection Act, and the Foreign Intelligence Surveillance Act. The Sourcebook also includes key international privacy directives including the OECD Privacy Guidelines, the OECD Cryptography Guidelines, and European Union Directives for both Data Protection and Privacy and Electronic Communications. The Privacy Law Sourcebook 2016 has been updated and expanded to include recent developments such as the United Nations Resolution on Right to Privacy, the European Union General Data Protection Regulation, the USA Freedom Act, and the US Cybersecurity Act. The Sourcebook also includes an extensive resources section with useful websites and contact information for privacy agencies, organizations, and publications.

United States Military Space: Into the Twenty-First Century

United States Military Space: Into the Twenty-First Century PDF

Author:

Publisher: DIANE Publishing

Published: 2002

Total Pages: 168

ISBN-13: 1428961240

DOWNLOAD EBOOK →

This is the 42nd volume in the Occasional Paper series of the U.S. Air Force Institute for National Security Studies (INSS). This volume presents two important papers on United States military space. The first paper, "What is Spacepower and Does It Constitute a Revolution in Military Affairs?", examines the concept of "spacepower" as it is emerging within the U.S. military and business sectors to establish the basis for military space roles and implications. It also posits military-commercial sector linkages as the best near-term road map for future development. As commercial activities expand the importance of United States space, and as technological advances enable military missions, Hays sees expanded military roles, including space weaponization, on the horizon. He concludes that military space has already had a significant impact on the American way of war. That trend will only continue as the promise of a true space-led revolution in military affairs awaits eventual space weaponization. Given an increasingly important U.S. commercial and military presence in space, the second paper, "Space-Related Arms Control and Regulation to 2015: Precedents and Prospects," presents a detailed analysis of existing regulations and controls that constrain and shape military space use and development. It also presents a comprehensive examination of current and future issues that will define likely arenas of international efforts to further control military space. The United States must be very aware of the possible consequences for its overall commercial and military space efforts in addressing these issues. Finally, the paper suggests areas where some current regulatory emphasis could benefit the United States, indicating areas for current policy emphasis. Together, the two papers provide a timely and important examination of the current state and the likely future of United States military space.

Computer Attack and Cyberterrorism

Computer Attack and Cyberterrorism PDF

Author: Clay Wilson

Publisher:

Published: 2009

Total Pages: 0

ISBN-13: 9781606923375

DOWNLOAD EBOOK →

Many international terrorist groups now actively use computers and the Internet to communicate, and several may develop or acquire the necessary technical skills to direct a co-ordinated attack against computers in the United States. A cyberattack intended to harm the U.S. economy would likely target computers that operate the civilian critical infrastructure and government agencies. However, there is disagreement among some observers about whether a co-ordinated cyberattack against the U.S. critical infrastructure could be extremely harmful, or even whether computers operating the civilian critical infrastructure actually offer an effective target for furthering terrorists' goals. While there is no published evidence that terrorist organisations are currently planning a co-ordinated attack against computers, computer system vulnerabilities persist world-wide, and initiators of the random cyberattacks that plague computers on the Internet remain largely unknown. Reports from security organisations show that random attacks are now increasingly implemented through use of automated tools, called "bots", that direct large numbers of compromised computers to launch attacks through the Internet as swarms. The growing trend toward the use of more automated attack tools has also overwhelmed some of the current methodologies used for tracking Internet cyberattacks. This book provides background information for three types of attacks against computers (cyberattack, physical attack, and electromagnetic attack), and discusses related vulnerabilities for each type of attack. The book also describes the possible effects of a co-ordinated cyberattack, or computer network attack (CNA), against U.S. infrastructure computers, along with possible technical capabilities of international terrorists. Issues for Congress may include how could trends in cyberattacks be measured more effectively; what is appropriate guidance for DOD use of cyberweapons; should cybersecurity be combined with, or remain separate from, the physical security organization within DHS; how can commercial vendors be encouraged to improve the security of their products; and what are options to encourage U.S. citizens to follow better cybersecurity practices? Appendices to this book describe computer viruses, spyware, and "bot networks", and how malicious programs are used to enable cybercrime and cyberespionage. Also, similarities are drawn between planning tactics currently used by computer hackers and those used by terrorists groups for conventional attacks.