Search

(July 2014,
[field_writer2]

Homeland Security Research Corporation analysts forecast a strong comeback of the X-ray security industry generating a solid 7% CAGR. The growth will be boosted by three main drivers: expansion of the Asia Pacific secured facilities and aviation security markets; the replacement of more than 40,000 outdated X-ray systems; and despite a decade of R&D aiming at new baggage, luggage, cargo and mail screening technologies, there is no modality on the horizon that can competitively challenge the cost-performance of the X-ray based screening technologies.

(2016,
[field_writer2]

House of Commons Standing Committee on National Defence hears from Communications Security Establishment (19 May 2016)
(FrontLine-edited and officially-translated transcript)

(2015,
[field_writer2]

The United Kingdom's National Security Strategy provides a comprehensive basis for planning and delivering the most important responsibility of Government – protecting the country and safeguarding its people and way of life. This 2009 update documents guiding principles and a strategic framework. It outlines the why, who or what, and how these strategies will be implemented.

(2015,
[field_writer2]

(February 2010) W3C has published a report and full minutes of the Workshop on Access Control Application Scenarios, held in Luxembourg on 17th and 18th of November 2009. Participants from 17 organizations examined the current limitations of access control, privacy enhancement, distributed handling of access control, and other challenging use cases.

(2015,
[field_writer2]

(April 2007) This report discusses access control for a site, building or area, as opposed to access control for data or computer networks. Physical access control products include: audio and video entryphones; keypad entry systems; card- and token-based access-control systems (including Wiegand cards, magnetic-stripe cards, barcode cards, proximity systems, long-range/ hands-free systems, systems to control vehicle access, smart-cards and dual-function cards); and biometric systems. Some systems incorporate more than one of these technologies for added security.

(2015,
[field_writer2]

(July 2009) Canada's Northern Strategy focuses on four priority areas: exercising our Arctic sovereignty; promoting social and economic development; protecting the North's environmental heritage; and improving and devolving northern governance, so that Northerners have a greater say in their own destiny.

(2015,
[field_writer2] By Environment Canada

(Ongoing Updates) Environment Canada has prepared numerous reports on the Arctic Ecosystem in relation to Climate Change and Conservation Strategies.

(2015,
[field_writer2]

(June 2009) This document updates the Secure Border Action Plan from 2006 and reviews other important areas of interest that have emerged and which require investigation and action.

(2015,
[field_writer2]

(2009) Marsh's Chemical Practice has produced a 2009 benchmark study that compares the risk management and insurance programs of more than 220 chemical industry buyers in the United States.Marsh's Chemical Practice has produced a 2009 benchmark study that compares the risk management and insurance programs of more than 220 chemical industry buyers in the United States.

(2015,
[field_writer2]

(2013) This is a planning primer for local law enforcement agencies. When law enforcement executives are tasked with managing a large event, they can maximize their efforts by learning from other agencies and adopting proven practices. Too often, however, past lessons learned are not documented in a clear and concise manner. To address this information gap, the U.S.

(2015,
[field_writer2]

(Dec 2008) When it comes to a future cyberwar, the issue is no longer if it'll happen. Instead, the concern is when it'll happen, how bad it'll be, and how many attacks we'll have to withstand.

(2015,
[field_writer2]

(Aug 2009) CDFAI Fellow, Colin Robertson describes how the Canadian banking system and good government initiatives have helped the nation weather the economic recession and garner the rare distinction as the only country in the industrialized world that has not faced a single bank failure, nor called for bailouts or government intervention in financial and mortgage sectors. CDFAI is now called the Canadian Global Affairs Institute.

(2015,
[field_writer2]

(updates daily) This site lists the latest global earthquakes with magnitudes of 2.5 or greater in the United States and Adjacent Areas, and a magnitude of 4.5 or greater in the rest of the world.

(2015,
[field_writer2]

(July 2009) Canada's Northern Strategy focuses on four priority areas: exercising our Arctic sovereignty; promoting social and economic development; protecting the North's environmental heritage; and improving and devolving northern governance, so that Northerners have a greater say in their own destiny.

(2015,
[field_writer2] by Health Canada

Health Canada has released numerous reports on topics related to Climate Change and Health, including a Heat Alert Guidebook. For a compendium, check this web site.

(2015,
[field_writer2]

(2009) Events have illustrated that both under-developed and developed countries can be overwhelmed by climatic events and that people living in Canada may be vulnerable to climate risks.

(2015,
[field_writer2]

(March 2009) AHRQ has developed more than 60 emergency preparedness-related studies, workshops, and conferences to help hospitals and health care systems prepare for public health emergencies. Many of these projects were made possible through collaboration with ASPR and other federal agencies. For more information, contact AHRQ Public Affairs: 301-427-1859 or 301-427-1855.

(2015,
[field_writer2]

(Feb 2009) High Altitude Aerial Platforms & Payloads: New in-depth report includes detailed analysis of today?s persistent market, its inhibitors, drivers, and opportunities, combined with penetrating technical examination of both flight platforms and payloads. The report covers a wide spectrum of upcoming military and private industry business opportunities in areas as:

(2015,
[field_writer2]

(July 2009) This article presents insight to the realistic possibilities of mass Internet surveillance by refuting the common argument is that there is too much traffic to be able to "listen" to all chatter.

(2015,
[field_writer2]

(May 2009) The new report details the future Technology and market trends of major HLS-HLD market sectors including: Biometrics, Aviation security, Maritime security, Information. Technology and Cyber terror security, CBRN security, Infrastructure security, Counter terror intelligence, the private sector HLS, RFID based systems, Border security, Perimeter security, First responders, HLS-HLD C3I systems, Nuclear-Radiological screening systems, and more.

(2015,
[field_writer2]

(July 22) The American Red Cross has created this Disaster and Safety Library to assist you in preparing your home, school and workplace in the event of a disaster or emergency. Here you will find fact sheets, preparedness checklists, recovery guides and other helpful information to keep you informed and safe.

(2015,
[field_writer2] by Dylan Chalk

(July 22) This article will give you practical tips on how to prepare for The Big One.

(2015,
[field_writer2] By Robin Tierney

(July 22) Being prepared is critical to saving your pets when disaster strikes. The following tips include information from the Humane Society of the United States, the American Red Cross, United Animal Nations and other sources.

(2015,
[field_writer2]

Your guide to understanding insurance coverage of damage from natural catastrophes including hail, flood, storms, wildfires, wind, lightning and earthquakes.

(2015,
[field_writer2]

(July 22) Simple actiities and games designed to increase student knowledge about earthquake science and preparedness.

(2015,
[field_writer2]

(current updates) Coverage of the latest news and comment on natural disasters and extreme weather around the world.

(2015,
[field_writer2]

The need for proper recognition, collection, and preservation of physical evidence is apparent to all who are involved in the criminal justice system. Physical evidence can directly or indirectly lead to the solution of a crime. Charging and prosecution decisions may be affected by the quality of the physical evidence supporting the case. The Wisconsin State Crime Laboratories provide an important link between collection and court presentation of such evidence. This handbook is offered in the belief that increased knowledge leads to understanding and that understanding leads to excellence.

(2015,
[field_writer2]

The need for proper recognition, collection, and preservation of physical evidence is apparent to all who are involved in the criminal justice system. Physical evidence can directly or indirectly lead to the solution of a crime. Charging and prosecution decisions may be affected by the quality of the physical evidence supporting the case. United States and Wisconsin Supreme Court decisions have placed great emphasis upon physical evidence in criminal cases. This handbook is offered in the belief that increased knowledge leads to understanding and that understanding leads to excellence.

(2015,
[field_writer2]

(April 2009) Striking a Balance Between Immigration Enforcement and Civil Liberties. This report presents findings and recommendations from the Police Foundation's year-long national effort that examined the implications of immigration enforcement at the local level. The project brought together law enforcement executives, policy makers, elected officials, scholars, and community representatives in a series of focus groups across the country and at a national conference in Washington.

(2015,
[field_writer2]

(Fall 2009) Public Safety Canada is responsible for coordinating the management of emergencies among federal departments and agencies. This includes establishing policies and programs for the preparation, testing and exercising, and implementing emergency management plans; monitoring and coordinating a common federal approach to emergency response along with the provinces – an "all-hazards" approach incorporating prevention and mitigation, preparedness, response, and recovery; and coordinating the protection of critical infrastructure.

(2015,
[field_writer2]

(March 2008) The UK has published the first annual update of the National Security Strategy which sets out an updated assessment of the national security threats facing the UK and includes proposals for combating threats to cyber security.

(2015,
[field_writer2]

(February 2009) The Canadian Society for Senior Engineers (CSSE) ranks the various Canadian Aerospace program areas, and makes strong recommendations to the Government of Canada. Included among them is a call to increase R&D funding in these areas.

(2015,
[field_writer2]

(April 28, 2009) In this address to the Canadian Airports Council, Derek Burney, former Ambassador to the US and CDFAI Senior Research Fellow, argues that in the midst of this global recession and time of uncertainty for geopolitical institutions such as NATO and the G8, Canada must reinvigorate its relationship with the United States if it is to have meaningful global influence).

(2015,
[field_writer2]

(Jan 2010) There are a number of reasons why France has not suffered a terrorist attack in more than a decade. One reason is due to the successes of the country's experienced and well-established counterterrorism apparatus.

(2015,
[field_writer2]

(July 2009) A review of terrorism trends, incidents, and landmark court cases. (Foundation for the Defense of Democracy, Center for Terrorism Research)

(2015,
[field_writer2]

(Feb 2009) This paper addresses sources of societal tensions and violent conflict involving minority groups of Muslim culture in contemporary Europe. Six country studies are presented: Belgium, France, the Netherlands, Spain, Russia and the United Kingdom.

(2015,
[field_writer2] By the Terrorism Research Initiative

(Vol 9, No 5, 2015) This open access journal in the field of terrorism- and counter-terrorism studies offers numerous peer-reviewed articles on the topic of terrorism.

(2015,
[field_writer2]

(April 2009) This paper by Luis de la Corte and Andrea Gim?nez-Salinas offers a short review of the recent scientific literature about three main issues related to suicide violence.

(2015,
[field_writer2]

(February 2009) Petter Nesser (FFI) ? After the invasion of Iraq, European nations that joined the Bush Administration?s War on Terror became targets for terrorist cells composed of people with varying ties to al-Qaida, many of whom were Europeans by citizenship, or ethnicity. What were the ideological influences and patterns of jihadi terrorism in Europe?

(2015,
[field_writer2]

(March 2009) Norwegian Defense Research Establishment Research Fellow, Petter Nesser, presented this paper at the conference ?Understanding Jihadism: Origins, Evolution and Future Perspectives? Oslo, 19-21 March 2009.

(2015,
[field_writer2]

(July 2015) The European Union Terrorism Situation and Trend Report, better known as the TE-SAT, aims to provide law enforcement officials, policy makers and the general public with a fact-based understanding with regard to terrorism in the European Union (EU). In addition to the presentation of facts, it seeks to identify trends in the development of this phenomenon.

(2015,
[field_writer2]

(April 2009) In an annual report on terrorism, the State Department says "Al-Qaeda remained the greatest terrorist threat to the United States and its partners" even though its structures have weakened and public support has waned. And it warns that Al-Qaeda "has reconstituted some of its pre-9/11 operational capabilities" by using the Pakistan border areas, replacing key leaders, and restoring some "central control" by its top leadership.

(2015,
[field_writer2]

(March 2006) On the morning of 7 July 2005, three explosions rocked the London transit system. This Report examines intelligence and security matters relevant to those terrorist attacks, and focuses in particular on: whether any intelligence which may have helped prevent the attacks was missed or overlooked; why the threat level to the UK was lowered prior to the attacks (and what impact this had); what lessons were learned on the back of the attacks; and how these are being applied.

(2015,
[field_writer2]

(June 2008) Securing America's mass transit systems presents a real challenge for federal, state, and local agencies and for the transit systems themselves. Long routes and open facilities make the systems vulnerable and very limited financial resources make it difficult for systems to reduce those vulnerabilities.

(2015,
[field_writer2]

(Executive Summary) In addition to outlining the results of an investigation into the Toronto Transit Commission?s plans for the expansion of its video surveillance system, the report provides a review of the literature into the effectiveness of video surveillance, as well as an assessment of the role that Privacy-Enhancing Technologies play in protecting privacy.

(2015,
[field_writer2] By Verizon
(2014,
[field_writer2]

(Feb 2009) This report describes existing and upcoming technologies, markets, business and funding opportunities related to producing, using, and/or stockpiling Chemical, Biological, Nuclear and Radiological (CBRN) decontamination equipment and materials for the purpose of decontaminating people, as well as indoor and outdoor environments. The need to decontaminate people, buildings and infrastructures after CBRN incidences will lead to an $8.3 billion market by 2020 for CBRN Decontamination equipment sales & maintenance.

(2014,
[field_writer2] By Homeland Security Research Corporation

(July 2014) Analysts forecast a strong comeback of the X-ray security industry generating a solid 7% CAGR. The growth will be boosted by three main drivers: expansion of the Asia Pacific secured facilities and aviation security markets; the replacement of more than 40,000 outdated X-ray systems; and despite a decade of R&D aiming at new baggage, luggage, cargo and mail screening technologies, there is no modality on the horizon that can competitively challenge the cost-performance of the X-ray based screening technologies.

(2014,
[field_writer2]

(July 2014) WASHINGTON – The Council of Governors, the Department of Defense (DoD), and the Department of Homeland Security (DHS) together approved a joint action plan for cybersecurity.

(2014,
[field_writer2] By Natural Resources Canada

Our understanding of climate change impacts and adaptation in Canada has increased, both as a result of new research and through practical experience. Led by Natural Resources Canada, the development of this report involved over 90 authors and 115 expert reviewers, and synthesized over 1500 recent publications.

(2014,
[field_writer2]

(2014) This year, the World Disasters Report from the International Federation of Red Cross and Red Crescent Society, takes on a challenging theme that looks at different aspects of how culture affects disaster risk reduction (DRR) and how disasters and risk influence culture.

(2014,
[field_writer2]

(updated) The NCTC compiles observations on types of attacks and attackers, numbers of victims and targets, and assesses trends.

(2014,
[field_writer2] By the World Economic Forum
(2013,
[field_writer2]

(May 2013) Will your organization, or one you work with, suffer a security breach this year? Nobody’s immune, no target is too small, or too large. The methods used by hackers to gain access to data are numerous, wide-reaching and ever-growing. This isn’t a threat you can afford to ignore.

(2013,
[field_writer2]

(2013) This is a planning primer was created by the US Bureau of Justice Assistance for law enforcement agencies at the local level. When law enforcement executives are tasked with managing a large event, they can maximize their efforts by learning from other agencies and adopting proven practices. Too often, however, past lessons learned are not documented in a clear and concise manner. To address this information gap, the U.S.

(2012,
[field_writer2]

(2011) Health care facilities need to develop an Emergency Water Supply Plan (EWSP) to prepare for, respond to, and recover from a total or partial interruption of the facilities' normal water supply because water supplies can, and do, fail. The objective of this Planning Guide is to help health care facilities develop a robust EWSP as part of its overall facility EOP and to meet the published standards set forth by the Joint Commission and the CMS. The guide is intended for use by any health care facility, regardless of size or patient capacity.

(2011,
[field_writer2] Published by by the Henry Jackson Society and tThe Centre for Social Cohesion

(July 2011) Islamic extremism is not the only terrorist threat to the United Kingdom, but it remains far and away the greatest, and the least predictable. This report provides insight into the background and history of Islamism-related terrorism in the UK over the past 20 years. Its research means that even more can be understood about the dangers Islamic terrorism and extremism have brought and still threaten British citizens and UK government assets, at home and abroad.

(2010,
[field_writer2] By FinTrac

(Dec 2010) This report Summarizes relevant group-based, activity-based and country-based money laundering and terrorist activity financing issues. It alerts readers to new developments that could possibly be exploited for money laundering or terrorist activity financing purposes in Canada.

(2010,
[field_writer2]

(Jan 2010) As crude oil prices climbed back over US$80.00 per barrel during 2009 (after the dramatic spike to $147 and subsequent collapse to $35) U.S. politicians and regulators knew who to blame.

(2010,
[field_writer2]

(Feb 2010) This report provides policymakers, law enforcement executives, resource planners, and counterdrug program coordinators with strategic intelligence regarding the threat posed to the United States by the trafficking and abuse of illicit drugs. The assessment highlights strategic trends in the production, transportation, distribution, and abuse of illegal and controlled prescription drugs.

(2010,
[field_writer2]

(Sept 2010) This report, authored by Carl Ungerer, highlights the major changes to Australia?s national security institutions since 2008. The paper argues that despite several years of reform, the institutional design for national security policy-making as a whole remains dominated by centralisation and limited coordination.

(2010,
[field_writer2]

This Special Report, authored by Athol Yates and Anthony Bergin argues that it's time for Defence to more fully incorporate domestic disaster assistance tasks as part of its core business. Defence is likely to be used more frequently in the future to assist in domestic disaster management. There will be larger and more frequent extreme weather events with a growing community and political expectation to use military resources to support whole-of-government counter-disaster efforts.
Three key actions should be taken:

(2010,
[field_writer2]
(2009,
[field_writer2] By the Government of Canada

(July 2009) Canada's Northern Strategy focuses on four priority areas: exercising our Arctic sovereignty; promoting social and economic development; protecting the North's environmental heritage; and improving and devolving northern governance, so that Northerners have a greater say in their own destiny.

(2009,
[field_writer2] By the Standing Senate Committee on Fisheries and Oceans

(June 2009) Fourth Report from the Standing Senate Committee on Fisheries and Oceans calls for more attention to the future role and capability of the Coast Guard.

(2009,
[field_writer2]

(January 2009) This report provides a qualitative analysis of risk factors for five potential marine incidents likely to happen as shipping, tourism, exploration and development of natural resources (e.g., oil, gas, minerals) occur with the retreating Arctic ice cover.

(2009,
[field_writer2] By the Senate Standing Committee

(May 2009) Senate Standing Committee on Fisheries and Oceans calls for a stronger Coast Guard to assert Canada?s presence in the North.

(2009,
[field_writer2]

(May 2009) The report covers in detail existing and evolving markets and products in the following segments: Weapons detection; Explosives detection; Multi-Threat detection including portals and standoff solutions); Biometrics; Profiling; and Behavior Tracking.

(2009,
[field_writer2]

(June 2009) Conducted by the Centers for Disease Control and Prevention, this report summarizes the relative importance of identified releases in terms of potential health risks at Los Alamos. The Los Alamos facility had a single mission – perfection of the design and manufacture of the first atomic bombs.

(2009,
[field_writer2]

(February 2009) Although the consequences of a radiologic dispersal device are substantial, and the detonation of a modest-sized (10 kiloton) improvised nuclear device is catastrophic, it is both possible and imperative that a medical response be planned.

(2009,
[field_writer2] By the World Economic Forum

(Sept 2009) Issued by the Geneva-based World Economic Forum, this year's Report profiles a total of 133 economies, providing the most comprehensive assessment of its kind, with an extensive section of data tables and global rankings covering over 100 indicators.

(2009,
[field_writer2] By the Centre for Contemporary Conflict

(Dec 2009) The capability for global resource competition to serve as a driver for conflict has established the need to more fully examine the relationship between energy resources and conflict. In particular, oil resources have emerged as a potential driver for both internal and external conflict. By James E. McGinley.

(2009,
[field_writer2]

(May 2009) The global LNG (Liquefied Natural Gas) shipping, handling and storage infrastructure is extremely vulnerable to a terrorist attack which, if successful, could have catastrophic results – both in terms of lives lost and economic impact. Securing this infrastructure is quickly becoming a top national security priority.

(2009,
[field_writer2] By the College of Marine and Earth Studies

(Nov 2009) To predict the path and landfall of a hurricane or other coastal storm and assess the damage, emergency managers and scientists need continuous information on the storm?s path, strength, predicted landfall, and expected damage over large areas. Satellite and airborne remote sensors can provide the required information in a timely and reliable way. The lessons learned from hurricane Katrina are helping optimize future approaches for tracking hurricanes and predicting their impact on coastal ecosystems and developed areas.

(2009,
[field_writer2]

(April 2009) A Chatham House Briefing Paper by Cleo Paskal on environment-related disruptions to hydroelectric installations, offshore oil and gas production, pipelines, electrical transmission and nuclear power generation.

(2009,
[field_writer2] By Canadian Institutes of Health Research

As part of the Government of Canada's Avian Influenza and Pandemic Influenza Preparedness Strategy, the Canadian Institutes of Health Research Institute of Infection and Immunity was charged with developing and supporting pandemic influenza preparedness research programs. The CIHR supports research intended to improve Canada's ability to prevent and/or respond to an influenza pandemic. This document presents the findings of a formative, midterm evaluation of the research initiative.

(2009,
[field_writer2] By the National Association of State EMS Officials

(July 2009) This Gap Analysis Template is intended for use by governments, educators and others as they begin to define the specific differences at the state and local level between current and future EMS education delivery. It is useful to consider gaps between an existing scope of practice compared to what may be implemented under the new SOP model and the Education Standards. This document can be used to begin identifying educational content that will need to be accounted for in the transition of existing EMS personnel as well as the delivery of future programs.

(2009,
[field_writer2]

(2009) The World Health Organization has retained the use of a six-phased approach for easy incorporation of new recommendations and approaches into existing national preparedness and response plans.

(2009,
[field_writer2] Research Institute for European and American Studies

(May 2009) Recent conflicts have featured innovative approaches to communications intelligence, which include utilizing civilian telephone networks to achieve tactical and psychological objectives. The 'cell war' between the IDF and Hamas is indicative of an ongoing global struggle between asymmetrical insurgents and state actors to control large-scale telecommunications structures.

(2009,
[field_writer2] The World Bank

(Jan 2009) Grim descriptions of the long‐term consequences of climate change have given the impression that the climate impacts from greenhouse gases threaten long‐ term economic growth. However, the impact of climate change on the global economy is likely to be quite small over the next 50 years. Severe impacts even by the end of the century are unlikely. The greatest threat that climate change poses to long‐term economic growth is from potentially excessive near‐term mitigation efforts.

(2009,
[field_writer2]

(June 2009) The security of the UK and its citizens remains the highest priority for the Government. Since publication of last year?s National Security Strategy, substantial work to strengthen our national security framework has been driven forward. This report updates an assessment of the threats faced in the UK and the underlying drivers of insecurity. It also announces plans for addressing changing security threats in long-established environments and tackling challenges in new and evolving domains such as cyberspace.

(2009,
[field_writer2]

(June 2009) In the preparation of the new Australian white paper on counter-terrorism, this policy analysis, authored by Anthony Bergin, recommends a wide array of policy measures.

(2009,
[field_writer2]

(Nov 2009) This audit report by the Privacy Commissioner of Canada examined whether the Department of Transport Canada has adequate controls and safeguards to collect, use, disclose, retain, dispose, protect and ensure the accuracy of personal information under the Passenger Protect Program. The core of the Passenger Protect Program is the Specified Persons List, otherwise known as Canada's "No-fly list."

(2008,
[field_writer2]

(January 2008) This phrase summarizes the goal of the U.S. federal government charged with interviewing, assessing, processing, analyzing, and welcoming hundreds of millions of international visitors while finding the small numbers of people (the needles in the haystack) intent on using our openness against us. This Committee was tasked with advising the Departments of Homeland Security and State in their mission to protect not only America's security but also U.S. economic livelihood, ideals, image, and strategic relationships with the world.

(2008,
[field_writer2] By the Transportation Research Board, Washington

(2008) Transportation and evacuation professionals are part of emergency management teams in some urban areas, but the potential for transportation in general and transit in particular to play a more significant role in emergency response and evacuation is far from being realized.

(2008,
[field_writer2]

(May 2009) This report lists significant programming errors that can lead to serious software vulnerabilities. They occur frequently, are often easy to find and easy to exploit. They are dangerous because they will frequently allow attackers to completely take over the software, steal data, or prevent the software from operating.

(2008,
[field_writer2] Agency for Healthcare Research and Quality

(2009) Home Health Care During an Influenza Pandemic: Issues and Resources, a report identifying home health care as a critical component in providing care during a pandemic influenza event and offering resources to home health care providers and community planners to prepare for such an event, was released today by the U.S. Department of Health and Human Services' (HHS) Agency for Healthcare Research and Quality (AHRQ) in collaboration with the Office of the Assistant Secretary for Preparedness and Response (ASPR).

(2008,
[field_writer2]

The Transportation Research Board of the National Academies just published this study on transit and its role in emergency evacuation. "The purpose of this study, which was requested by Congress and funded by the Federal Transit Administration (FTA) and the Transit Cooperative Research Program, is to evaluate the potential role of transit systems in accommodating the evacuation, egress, and ingress of people from or to critical locations in times of emergency.

(2007,
[field_writer2] U.S. and Canadian Government Report

(2007) This report, published jointly by the U.S. and Canadian governments, examines the current state of illicit drug smuggling across the United States-Canadian border. The report identifies the principal substances which are smuggled in both directions across the border. The authors place special emphasis on the cooperative efforts which law enforcement agencies on both sides of the border engage in and how this has influenced the movement of these illegal substances. (Note: be patient, this link takes a LONG time to load)

(2006,
[field_writer2]

(December 2006) This report uses the National Identity Scheme to strengthen borders of the United Kingdom and enforce compliance within the UK.

(2006,
[field_writer2]

(November 2006) This primer is intended to serve as a quick reference in the event of a radiation disaster. It summarizes information on preparing for a radiation emergency, handling contaminated persons, dose assessment and radiation exposure health effects. It also includes information on radiological findings related to agents of biological and chemical terrorism because radiologists may be involved in the diagnosis of conditions associated with such exposures.

(2005,
[field_writer2] By the Library of Congress

(2005) Marine shipments of hazardous chemical cargo may be attractive terrorist targets because of their large volume and inherent toxicity or flammability. The Maritime Transportation Security Act and the International Ship and Port Facility Security Code give the U.S. Coast Guard far-ranging authority over the security of hazardous marine shipping. The agency has developed port security plans addressing how to deploy federal, state, and local resources to prevent terrorist attacks.

(2001,
[field_writer2]

(March 2001) The MHMI series is a three volume set of pdfs (with a video) comprised of recommendations for on-scene (prehospital), and hospital medical management of patients exposed during a hazardous materials incident. Vol I: Emergency Medical Services; Vol II: Hospital Emergency Departments; Vol III: Medical Management Guidelines.The MHMI series is a three volume set of pdfs (with a video) comprised of recommendations for on-scene (prehospital), and hospital medical management of patients exposed during a hazardous materials incident.

(2001,
[field_writer2] by June Isaacson Kailes

(July 22) Tip sheets that focus on earthquake safety that is also applicable for all types of disaster preparedness for people with disabilities, including information that is helpful in preparing for emergencies such as power outages, fires, floods, hurricanes, nuclear power plant accidents, tornados, tsunamis, volcanoes, winter storms and very cold or very hot weather.

[field_writer2] By the International Labour Organization

Economic security promotes happiness, and is beneficial for growth and social stability. This is a central finding of a new ILO report, which attempts for the first time to measure social and economic security of individuals and countries around the world.