BLOG
The “Big Picture” of Insider IT Sabotage Across U.S. Critical Infrastructures
Abstract
A study conducted by the U.S. Secret Service and the Carnegie Mellon University Software Engineering Institute CERT Program analyzed 150 insider cyber crimes across U.S. critical infrastructure sectors. Follow-up work by CERT involved detailed group modeling and analysis of 30 cases of insider IT sabotage out of the 150
Are Suicide Terrorists Suicidal? A Critical Assessment of the Evidence
ABSTRACT
Objective: Most of the research on suicide terrorism is conducted in the political science and international relations fields. The prevailing wisdom within this literature is that suicide terrorists are not suicidal. But how good is the evidence for this assumption? Knowing whether suicide terrorists are suicidal has implications for prevention,
Developments In The Law Of Vertical Restraints: 2012
I. Standards
A. Are Vertical Resale Price Restraints Still Illegal?
As a result of two U.S. Supreme Court decisions handed down only during the last 15 years, the legality of vertical restraints on maximum and minimum levels of resale prices known otherwise as resale price maintenance (RPM) —under Section 1 of the
Railroad Dispatcher Communications Training Materials
Background
By law, the Federal Railroad Administration (FRA) has the responsibility of ensuring railroad safety throughout the country. The U.S. rail system includes almost 300,000 miles of track, 20,000 locomotives, 1.2 million freight cars, 6,500 passenger cars, and over 250,000 employees. In an effort to improve
An Introduction to Computer-Assisted Train Dispatch
Introduction
Train dispatchers on a centralized traffic controlled (CTC) line control the movement of trains over a line, including the planning of where meets and overtakes are to occur and the aligning of the switches to control each train movement. Increasingly, computers are being used to assist the dispatchers in performing
Time-Space Analysis of Terrorist Planning Cycles
Abstract
Terrorism is among the largest threats to national and international security in today’s global community. Acts of terrorism have resulted economic and societal impacts throughout the world. Improvements in technology have increased the capacity of terrorists to maximize the impact of their actions. The increasing influence
Protecting Surface Transportation Systems And Patrons From Terrorist Activities
Contemporary terrorists have made public transportation a new theater of operations. Algerian extremists set off bombs on the subways of Paris in 1995 and 1996; the Irish Republican Army has waged a long running terrorist campaign against Britain’s passenger trains and London’s subways; Palestinian terrorists have carried out suicide
Steganography: A New Age of Terrorism
“Steganography is the art and science of communicating in a way which hides the existence of the communication’ (Johnson). According to nameless “U.S. officials and experts” and “U.S. and foreign officials,” terrorist groups are “hiding maps and photographs of terrorist targets and posting instructions for terrorist activities on sports chat
Antisemitism As An Underlying Precursor To Violent Extremism In American Far-right And Islamist Contexts
Introduction
Antisemitism is highly intertwined with extremist ideology in the United States. For several decades, a wide array of extremist groups in the United States from violent Islamist extremists to neo-Nazis, white supremacists, and skinheads to far-left extremists—have each incorporated antisemitic ideology as components of their worldviews. Using Jews and the
A Schema of Right-Wing Extremism in the United States
Introduction
Since the public emergence of the so-called “alt-right” in the United States seen most dramatically at the “Unite the Right” rally in Charlottesville, Virginia, in August 2017 there has been increasing attention paid to right-wing extremism (RWE) in the United States, particularly racist right-wing extremism. Violent incidents like Robert Bowers’
A Game of Hide and Seek in Networks
1 Introduction
This paper studies the design of a network in order to hide an object or a person.This question has a very long standing. According to Greek mythology, Daedalus invented the Labyrinth in order to hide the monstrous Minotaur. Tunnels and underground chambers in Medieval castles and fortresses were built
Global Covid-19 And Sports; Threats And Responses Exposure Claims And Liability Mitigation Considerations
I. Introduction
The COVID-19 pandemic has devastated organized sports across the globe. Major sporting events have been cancelled or postponed, beginning with the Tokyo Olympics, now rescheduled for 2021. In Britain, sponsors of the Open Championship, the world’s oldest professional golf tournament, cancelled the
event for only the fourth time in
Why Do Passenger Trains Run through Switches in the Rail Yard?
1. Introduction
This report is the first study sponsored by the Federal Railroad Administration (FRA) to identify the factors that contribute to run-through switches (RTS) in yard operations. Run-through switch events occur when rolling stock (e.g., passenger car, locomotive) makes a “trailing-point” move a movement from one of
Understanding How Train Dispatchers Manage and Control Trains
Study Results: What Makes Railroad Dispatching Difficult?
The results reveal that dispatching is a complex, cognitively demanding task. Successful performance depends on the abilityof dispatchers to monitor train movement beyond their territory, anticipate delays, balance multiple demands placed on track use, and make rapid decisions. This requires keeping track of where