Books by "National Intelligence Council and Office of the Director of National Intelligence"

7 books found

Implications of Artificial Intelligence for Cybersecurity

Implications of Artificial Intelligence for Cybersecurity

by National Academies of Sciences, Engineering, and Medicine, Division on Engineering and Physical Sciences, Intelligence Community Studies Board, Computer Science and Telecommunications Board

2019 · National Academies Press

In recent years, interest and progress in the area of artificial intelligence (AI) and machine learning (ML) have boomed, with new applications vigorously pursued across many sectors. At the same time, the computing and communications technologies on which we have come to rely present serious security concerns: cyberattacks have escalated in number, frequency, and impact, drawing increased attention to the vulnerabilities of cyber systems and the need to increase their security. In the face of this changing landscape, there is significant concern and interest among policymakers, security practitioners, technologists, researchers, and the public about the potential implications of AI and ML for cybersecurity. The National Academies of Sciences, Engineering, and Medicine convened a workshop on March 12-13, 2019 to discuss and explore these concerns. This publication summarizes the presentations and discussions from the workshop.

A Decadal Survey of the Social and Behavioral Sciences

A Decadal Survey of the Social and Behavioral Sciences

by National Academies of Sciences, Engineering, and Medicine, Division of Behavioral and Social Sciences and Education, Board on Behavioral, Cognitive, and Sensory Sciences, Committee on a Decadal Survey of Social and Behavioral Sciences for Applications to National Security

2019 · National Academies Press

The primary function of the intelligence analyst is to make sense of information about the world, but the way analysts do that work will look profoundly different a decade from now. Technological changes will bring both new advances in conducting analysis and new risks related to technologically based activities and communications around the world. Because these changes are virtually inevitable, the Intelligence Community will need to make sustained collaboration with researchers in the social and behavioral sciences (SBS) a key priority if it is to adapt to these changes in the most productive ways. A Decadal Survey Of The Social and Behavioral Sciences provides guidance for a 10-year research agenda. This report identifies key opportunities in SBS research for strengthening intelligence analysis and offers ideas for integrating the knowledge and perspectives of researchers from these fields into the planning and design of efforts to support intelligence analysis.

The United States Government Manual

The United States Government Manual

by National Archives And Records Administration

2011

The complete guide to the U.S. federal government.

The United States Government Manual 2011

The United States Government Manual 2011

by National Archives and Records Administration (U.S.)

2011 · Government Printing Office

As the official handbook of the Federal Government, the United States Government Manual is the best source of information on the activities, functions, organization, and principal officials of the agencies of the Legislative, Judicial, and Executive branches. It also includes information on quasi-official agencies and international organizations in which the United States participates. Particularly helpful for those interested in where to go and whom to contact about a subject of concern is each agency's "Sources of Information" section, which provides addresses and telephone numbers for use in obtaining specifics on consumer activities, contracts and grants, employment, and publications.

9/11 Final Report of the National Commission

9/11 Final Report of the National Commission

by Thomas R. Eldridge, Susan Ginsburg, Walter T. Hempel II, Janice L. Kephart, Kelly Moore, Joanne M. Accolla, The National Commission on Terrorist Attacks Upon the United State

2020 · e-artnow

9/11 Final Report of the National Commission on Terrorist Attacks Upon the United States, is the official report of the events leading up to the September 11, 2001 terrorist attacks. It was prepared by the National Commission on Terrorist Attacks Upon the United States The commission interviewed over 1,200 people in 10 countries and reviewed over two and a half million pages of documents, including some closely guarded classified national security documents. Before it was released by the commission, the final public report was screened for any potentially classified information and edited as necessary. A Factual Overview of the September 11 Border Story The September 11 Travel Operation – a Chronology Terrorist Entry and Embedding Tactics, 1993-2001 The Redbook Terrorist Travel Tactics by Plot Al Qaeda's Organizational Structure for Travel and Travel Tactics Immigration and Border Security Evolve, 1993 to 2001 The Intelligence Community The State Department The Immigration and Naturalization Service Planning and Executing Entry for the 9/11 Plot The State Department The Immigration and Naturalization Service Finding a Fair Verdict Crisis Management and Response Post-September 11 The Intelligence Community The Department of State The Department of Justice Response at the Borders, 9/11-9/20, 2001 The Department of Homeland Security

The 9/11 Commission Report

The 9/11 Commission Report

by Thomas R. Eldridge, Susan Ginsburg, Walter T. Hempel II, Janice L. Kephart, Kelly Moore, Joanne M. Accolla, The National Commission on Terrorist Attacks Upon the United States

2018 · e-artnow

It is perhaps obvious to state that terrorists cannot plan and carry out attacks in the United States if they are unable to enter the country. Yet prior to September 11, while there were efforts to enhance border security, no agency of the U.S. government thought of border security as a tool in the counterterrorism arsenal. Indeed, even after 19 hijackers demonstrated the relative ease of obtaining a U.S. visa and gaining admission into the United States, border security still is not considered a cornerstone of national security policy. We believe, for reasons we discuss in the following pages, that it must be made one. Contents: A Factual Overview of the September 11 Border Story The September 11 Travel Operation – a Chronology Terrorist Entry and Embedding Tactics, 1993-2001 The Redbook Terrorist Travel Tactics by Plot Al Qaeda's Organizational Structure for Travel and Travel Tactics Immigration and Border Security Evolve, 1993 to 2001 The Intelligence Community The State Department The Immigration and Naturalization Service Planning and Executing Entry for the 9/11 Plot The State Department The Immigration and Naturalization Service Finding a Fair Verdict Crisis Management and Response Post-September 11 The Intelligence Community The Department of State The Department of Justice Response at the Borders, 9/11-9/20, 2001 The Department of Homeland Security

Privacy Research and Best Practices

Privacy Research and Best Practices

by National Academies of Sciences, Engineering, and Medicine, Division on Engineering and Physical Sciences, Computer Science and Telecommunications Board, Committee for a Workshop on Privacy for the Intelligence Community: Emerging Technologies, Academic and Industry Research, and Best Practices

2016 · National Academies Press

Recent disclosures about the bulk collection of domestic phone call records and other signals intelligence programs have stimulated widespread debate about the implications of such practices for the civil liberties and privacy of Americans. In the wake of these disclosures, many have identified a need for the intelligence community to engage more deeply with outside privacy experts and stakeholders. At the request of the Office of the Director of National Intelligence, the National Academies of Sciences, Engineering, and Medicine convened a workshop to address the privacy implications of emerging technologies, public and individual preferences and attitudes toward privacy, and ethical approaches to data collection and use. This report summarizes discussions between experts from academia and the private sector and from the intelligence community on private sector best practices and privacy research results.