Global governance—the collective management of common problems at the international level—is at a critical juncture. Although global governance institutions have racked up many successes since their development after the Second World War, the growing number of issues on the international agenda, and their complexity, is outpacing the ability of international organizations and national governments to cope.
The attempted bombing in Times Square on 1 May 2010 highlights the need to identify Homegrown Violent Extremists before they carry out a terrorist act. The ability of the bomber to operate under the radar demonstrates the difficulties associated with identifying terrorist activity and reinforces the need for law enforcement, at all levels, to be vigilant and identify individuals who are planning violence or other illegal activities in support of terrorism.
FOUO Open Source Center South African 2010 Soccer World Cup Media Highlights, June 7, 2010.
Open Source Center brief on Advanced Googling for Senior Executives, Open Source Academy, September 2009.
Open Source Center Walking Time to Medical Facilities and Food Distribution Centers in Port-au-Prince, Haiti
This analysis shows the average walking time from medical facilities and primary food distribution centers in Port-au-Prince. Results of the analysis show locations of extreme road obstruction and the relationship between camps to medical facilities and food distribution centers. The analysis was conducted by creating a road network in a GIS, outlined in the methodology below. This road network can be used in future analysis to describe walking or driving distance from specific location, or to find best route information.
Open Source Center Digital Audio Video Enterprise Brochure, December 3, 2008.
Elements of the U. S. government hosted an interdisciplinary, unclassified workshop to better understand the potential threat from independently acting terrorists with biological expertise. Such lone-actor terrorists have the potential to carry out high-impact biological attacks while generating few signatures, making detection or disruption of their efforts challenging. The one-day workshop explored the possible motivations, intents, and objectives of lone-actor terrorists who might consider conducting biological attacks; examined scientific infrastructure vulnerabilities that these individuals could exploit; and identified strategies to mitigate this potential threat.
The Intelligence Community’s (IC) Accounting Standards Working Group requests the Accounting and Auditing Policy Committee (AAPC) review the National Security Agency (NSA)’s interpretation of internally developed software (IDS) as it relates to the internal use software definitions outlined in Financial Accounting Standards Advisory Board Statement of Federal Financial Accounting Standard (SFFAS) No. 10, Accounting for Internal Use Software.
# Smart Collection: dramatically improve the value of collected data
* Innovative modeling and analysis approaches to identify where to look and what to collect
* Novel approaches to access
# Incisive Analysis: maximizing insight from the information we collect, in a timely fashion
This product may contain copyrighted material; authorized use is for national security purposes of the United States Government only. Any reproduction, dissemination, or use is subject to the OSC usage policy and the original copyright.
Sweeping social and economic changes triggered by more than two decades of reform in China have led to equally sweeping changes in China’s vast, state-controlled media environment, particularly in the quantity and diversity of media sources and the development of the Internet. The Communist Party of China (CPC) not only tolerates much greater diversity in the media, but has strongly encouraged greater efforts to provide media content that resonates with the lives and interests of the population. Despite these changes, however, all pertinent information continues to be filtered through party censors to ensure that it is consistent with official policy. The party exercises especially tight control over the core mainstream media which deliver domestic and international news along with politically sensitive information. These media constitute the main vehicle for conveying the policy preferences and decisions of the central leadership.
The Office of the Director of National Intelligence (ODNI) is pleased to provide to Congress its second report pursuant to the Data Mining Reporting Act. The Data Mining Reporting Act requires “the head of each departrnent or agency of the Federal Government” that is engaged in an activity to use or develop “data mining,” as defined by the Act, to report annually on such activities to the Congress.
On behalf of the Director of National Intelligence, I am pleased to make available the Fall 2007 Intelligence Community Legal Reference Book. The Intelligence Community draws much of its authority and guidance from the body of law in this collection. As the Director of National Intelligence seeks to better integrate the Intelligence Community, we hope this proves to be a useful resource to intelligence professionals across the Community. This document is the result of many hours of hard work. I would like to extend my thanks to those across the Community who assisted the Office of General Counsel in recommending and preparing the authorities contained herein.
The Open Source Information System was an unclassified network of computer systems that provides the intelligence community with open source intelligence. As of 2006, the OSIS name was retired and the network and content portions of the system were decoupled. The network portion of the system is now called DNI-U and the content portion is known as Intelink-U. According to the Army Foreign Military Studies Office, “Intelink-U is a virtual private network — a government intranet. It provides a protected environment to exchange unclassified and FOUO/SBU US Government and other open source data among Intelligence Community and other selected organizations. The Intelink-U firewalls safeguard government information resources and allow customers access to both the Intelink-U network and the public Internet. This gives Intelink-U users a single point of access to an unprecedented amount of unclassified open source information. “
This Intelligence Community (IC) Directive (ICD) establishes Director of National Intelligence (DNI) policy and specifies responsibilities for the oversight, management, and implementation of IC open source activities . This ICD recognizes and establishes the roles and responsibilities of the Assistant Deputy DNI for Open Source (ADDNI/OS), the DNI Open Source Center (the Center). and the IC to ensure efficient and effective use of open source information and analysis.
The structure of this chart is primarily taken from a reference pamphlet published by the South Korean Ministry of Unification in January 2009, which appears to be based on the DPRK constitution. As such, this chart is a representation of the formal relationships between the various entities and does not necessarily reflect the actual hierarchy and power relationships in the North Korean system. Other sources include: DPRK, ROK, PRC, and Japanese media; the ROK National Intelligence Service website; the Ministry of Unification’s Key Figures of North Korea 2009; and Japan’s Radiopress North Korea Directory 2008.