· 2010
This project developed and tested an analytic method for extracting useful info. from suspicious behavior reports that were voluntarily given by concerned citizens using 911. The objectives were to: (1) Apply data mining approaches to a commonly available data source in order to produce operationally relevant findings; (2) Develop and document an analytic process that identifies, analyzes, prioritizes, and visualizes suspicious activity data that law enforcement agencies or fusion centers can incorporate into their standard operating procedures; (3) Identify successful processes that allow state and local agencies to integrate and analyze multiple data sources related to potential terrorist threats. Charts and tables.
"The Naval Research Laboratory (NRL) set out to develop ways to predict what determines the targets of suicide attacks. While the ultimate goal is to create a list of areas at risk for the U.S. environment, the first phase of development employed a data set from Israel. Initially, NRL focused on spatial attributes, creating its own risk index, but realized that this focus on the where ignored the broader social context, the why. The lab asked RAND to test, as a proof of principle, the ability of sociocultural, political, economic, and demographic factors to enhance the predictive ability of NRL's methodology. Again using Israel as a sample, RAND created a database that coded for these factors, then conducted both quantitative and qualitative analyses with an eye to determining what puts a given area at greater risk. The quantitative analysis established that these factors are related to the odds of attack within specific neighborhoods and that the relationships held even when controlling for geospatial factors, so they seem to confer risk for reasons beyond their association with geospatial features of neighborhoods. The specifics of the research are limited to the preferences of Palestinian suicide bombers in Israel; however, the methods used to assess target preferences in Israel could be transferred to the United States or other countries. Any results, if proven to be robust, could be used to develop recommendations for heightened public awareness in certain areas."--Page 4 of cover.
· 2000
Stan Smith is head of the 419 organization, a secret code of death and destruction. Convicted of drug possession and distribution he is sent to jail and placed on house arrest. So the jury thinks. However, he bears a grudge against the people whom he is convinced have messed up his life and family. The suspect has killed three jurors and is bent on killing nine others. What Special FBI Agents Joseph Kowalski and Amy Davidson discover is that the killer will stop at nothing to accomplish his mission. The killer casts fear over New York City. Agents Kowalski and Davidson must uncover the facts and people involved in the brutal, murderous conspiracy.
Presents a unique approach to selecting and assembling disparate pieces of information to produce a general understanding of a threat. The Atypical Signal Analysis and Processing schema identifies atypical behavior potentially related to terror activity; puts it into context; generates and tests hypotheses; and focuses analysts' attention on the most significant findings. A supporting conceptual architecture and specific techniques for identifying and analyzing out-of-the-ordinary information are also described.
No image available
· 2020
This PDF document was made available from rand.org as a public service of the RAND Corporation. Set out to develop ways to predict what determines the targets of suicide attacks, using Israel as a sample, we created a database that coded for sociocultural, political, economic, and demographic factors, then conducted both quantitative and qualitative analyses with an eye to determining what puts a given area at greater risk. The quantitative analysis established that these factors are related to the odds of attack within specific neighborhoods and that the relationships held even when controlling for geospatial factors, so they seem to confer risk for reasons beyond their association with geospatial features of neighborhoods.
No image available
· 2025
The Scripture Doctrine Of Atonement, John Hollywood's 1872 Bishop Jeune Memorial Prize Essay, delves into the theological complexities of atonement as presented in Scripture. This work offers a detailed examination of the Christian doctrine of atonement, exploring its historical interpretations and scriptural foundations. Hollywood's essay provides valuable insights into the theological debates surrounding atonement, making it a significant contribution to the field of Christian theology. Scholars and students of theology will find this work a compelling resource for understanding the historical development and contemporary relevance of the doctrine of atonement. This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work. This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work. As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
No image available
No author available
· 2012
The National Institute of Justice strives to assist criminal justice practitioners on behalf of the Department of Justice through the scientific research, development, and evaluation of technologies and methods. Given that there are nearly 18,000 state and local law enforcement agencies in the United States, this is a challenge of great complexity, breadth, and depth. Thus, it is crucial to be aware of agencies' technology needs, as well as how they might learn about promising technologies and applications. To this end, RAND researchers conducted interviews with an extensive sample group to determine criminal justice technology priorities at the state and local levels, as well as the means by which these agencies commonly receive information on technology and the effectiveness of outreach efforts by the National Law Enforcement and Corrections Technology Center. Interview results indicated a strong across-the-board desire for knowledge management systems and low-cost, easily maintained surveillance systems, and further indicated that the Center needs to expand its outreach efforts to professional associations.
· 2022
They say orphans don't have families, but I never felt that way. I had the best brothers anyone could hope for, and more than one inspirational father. We didn't have homes in the traditional sense (some years we didn't even have shoes), but that didn't matter. We had everything we wanted. We built empires in the currencies that mattered to us. We had adventures - real adventures, where life and death were sometimes at stake. By the age of 16 we had learned more about the outback than most people learn in a lifetime. Orphans' lives always contain heartache. But mine was filled with so much more. This is the story of the life I was lucky to lead.
No image available
· 2009
State and local law enforcement agencies are important partners in preventing terrorism, with responsibilities that include identifying and investigating local terrorist threats and protecting potential targets from attack. To meet these responsibilities, law enforcement must develop better ways to find and analyze pieces of information that could spotlight potential terrorist activity. This research brief focuses on describing methods for finding and analyzing information indicating potential terrorist activity. This research brief will focus on describing methods for finding and analyzing information indicating potential terrorist activity. Within this context, we address two central challenges: how to find initial 'clues' or 'cues' -- information indicative of potential terrorist activity, especially if these pieces of information are obscured within large volumes of data across disparate data sources and formats, and as part of a follow-up investigation, how to collect additional information to determine whether an attack really is being planned, and if so, how to characterize the plot. While our focus is on the role of state and local law enforcement agencies in terrorism prevention, the information presented is also relevant to federal agencies tasked with protecting U.S. citizens and infrastructure.