Skip to main content


Oct 28, 2015

Radicalization: Social Media and the Rise of Terrorism

PURPOSE: • To address the scope of radicalization, and assess what steps can be taken in order to mitigate the rise of terror via social media. BACKGROUND: • In recent years, terrorist organizations have attempted to control their image, attract new recruits, and inspire “lone wolf” attacks through the use of social media, including disseminating images of graphic violence. • Terrorists’ use of social media is resonating ...

Oct 27, 2015

VA and DoD IT: Electronic Health Records Interoperability

PURPOSE: • To examine the Departments of Defense (DOD) and Veterans Affairs (VA) information technology with an emphasis on the departments’ efforts to develop and implement an interoperable electronic health record (EHR). BACKGROUND: • The 2008 NDAA directed DOD and VA to jointly develop and implement a “fully interoperable” EHR, creating an Interagency Program Office to facilitate and coordinate the Departments’ ...

Oct 21, 2015

Examining Law Enforcement Use of Cell Phone Tracking Devices

PURPOSE: To examine issues related to law enforcement’s use of devices that simulate cell phone towers and allow law enforcement to obtain location information for particular suspects. To examine both the Department of Justice’s (DOJ) and the Department of Homeland Security’s (DHS)new policies governing the use of such ...

Oct 21, 2015

Secure Credentials Issued by the Government Publishing Office

  PURPOSE: To examine the impact of the Government Publishing Office’s (GPO) role in building secure identity documents for federal government agencies, its exemption from Federal Acquisition Regulations (FAR) as a legislative entity, and whether competitive acquisition is necessary to ensure that federal identity documents safeguard national security. To give industry experts an opportunity to provide an overview of radio frequency identification ...