· 2018
This report examines the technical challenges associated with incorporating bulk, automated analysis of social media information into procedures for vetting people seeking entry into the United States. The authors identify functional requirements and a framework for operational metrics for the proposed social media screening capabilities and provide recommendations on how to implement those capabilities.
No image available
No author available
Features a collection of resources on war, war games, and related subjects. Offers access to quotations, war games, and search engines. Provides information on war-related art, poetry, and history. Discusses military science, political theory, weapons, and war makers.
Researchers reviewed metrics for evaluating research portfolios used by medical research organizations and appraised their characteristics. Organizations can use their results to help select, develop, and revise metrics for research portfolios.
· 2025
In support of the establishment of the Office of Homeland Security Statistics, a new federal statistical agency for the U.S. Department of Homeland Security, researchers developed a detailed logic model and an organizational design framework.
· 2022
In the past 20 years, the U.S. government, championed by the U.S. Department of Homeland Security (DHS) and in collaboration with other public and private entities, has made considerable progress enumerating the country's critical infrastructure components and National Critical Functions (NCFs). However, these efforts have not enabled specific identification of the most-critical computing systems within networks. To help fill that gap, researchers from the Homeland Security Operational Analysis Center sought to examine and enumerate the businesses that provide the most-critical information technology (IT) products and services and lay the groundwork for DHS and other federal and private-sector elements to better apply a risk-based approach to protecting the country's most-important assets and systems. They sought to (1) create a prioritized list of software and businesses that provide IT products and services and (2) develop a framework that could continue and extend this analysis into the future to accommodate emerging technologies and the evolution of the technology market. The work featured four workstreams: (1) identifying and integrating disparate data sources to identify the most-critical vulnerabilities and software applications in the U.S. internet protocol space; (2) collecting original data to map the software dependency and ownership structure of the most-referenced libraries; (3) leveraging existing work to identify specific IT and communication companies that were most interconnected and could suffer the greatest economic loss; and (4) developing a way to link NCFs to actual software companies supporting those functions.
No image available
This report helps the Cybersecurity and Infrastructure Security Agency codify the concept of systemically important critical infrastructure by documenting the work surrounding systemic risks and cyber risks in software supply chains.
No image available
No image available