National Terrorist Financing Risk Assessment

After the September 11, 2001 terrorist attacks, the United States adopted a preventive approach to combating all forms of terrorist activity. Efforts to combat the financing of terrorism (CFT) are a central pillar of this approach. Cutting off financial support to terrorists and terrorist organizations is essential to disrupting their operations and preventing attacks. To that end, the U.S. government has sought to identify and disrupt ongoing terrorist financing (TF) and to prevent future TF. The law enforcement community, including various components of the U.S. Departments of Justice, Homeland Security, and the Treasury, along with the intelligence community and the federal functional regulators, applies robust authorities to identify, investigate, and combat specific TF threats, enforce compliance with applicable laws and regulations, and prosecute supporters in order to deter would-be terrorist financiers. The U.S. Department of the Treasury (Treasury), which leads financial and regulatory CFT efforts for the U.S. government, employs targeted financial sanctions, formulates systemic safeguards, and seeks to increase financial transparency to make accessing the U.S. financial system more difficult and risky for terrorists and their facilitators. All of these efforts involve extensive international engagement to try to prevent any form of TF, particularly financing that does not necessarily originate in the United States, from accessing the U.S. financial system.

Spotlight

State of Maryland

Maryland is on the path to becoming the best state in the nation. Referred to as “America in Miniature”, Maryland embodies the very spirit of the United States. Maryland is home to ethnic groups of every origin, just about every natural feature, and much like our country, opportunity!

OTHER WHITEPAPERS
news image

Government Enters the Metaverse

whitePaper | September 12, 2022

Four trends reshaping government for the metaverse continuum.

Read More
news image

Augmented government Transforming government services through augmented reality

whitePaper | January 27, 2020

On September 27, 1998, football fans who tuned in to watch the game between the Baltimore Ravens and the Cincinnati Bengals witnessed much more than a 31-24 Bengal win. That Sunday, ESPN introduced a technological inno-vation that would forever change the way fans watch sports: a thin yellow line overlaid onto live video representing the distance required for a first down.

Read More
news image

Atlassian success for Western Australian Government Agencies

whitePaper | October 5, 2022

Insights into how Atlassian's Jira and Confluence can support government agencies to work more collaboratively and deliver more results and services - effectively - to stakeholders and communities.

Read More
news image

Security Clearances for Contractors and Government Employees

whitePaper | January 29, 2020

Individual government contractors face more rigorous scrutiny, as private companies can monitor employee’s social media as part of their continuous vetting and insider threat protocols. However, despite the existence of a directive permitting them to do so, government agencies do not monitor their employees’ social media. Our interviews found this is due to a lack of clear guidance on how to implement the existing directives and security policies. This shortcoming can be remedied by government agencies agreeing upon a single common standard regarding the use of publicly available electronic information, specifically social media, for personnel security and insider threat purposes. The DNI, as Security Executive Agent for the government, must then develop guidelines for the implementation of this standard throughout the sector.

Read More
news image

Addressing the Department of Defense’s Zero Trust Framework with the CyberArk Identity Security Platform

whitePaper | April 30, 2022

In the spring of 2021, the White House issued an executive order putting into place guidelines on how to improve the nation’s cybersecurity stance. This requires federal agencies to modernize their approach to cybersecurity by becoming more transparent about cyber threats for protection. Government agencies are required to move toward a Zero Trust architecture, which calls for an “assume-breach” mindset and secures all cloud services. Federal agency heads must develop a plan for implementing the ZT Architecture and incorporate guidelines from the National Institute of Standards and Technology (NIST) as appropriate.

Read More
news image

Core Security Principles for Edge Computing in Government

whitePaper | June 27, 2022

As government agencies become digitally transformed, they are incorporating more edge technology into their operations to help improve application performance and meet mission outcomes. An IDC survey indicates that 37% of U.S. federal agency decision makers have workloads deployed at the edge and 50% have firm plans to deploy workloads at the edge within this year. Edge is fast becoming the new frontier of innovation and responsiveness, making edge data management, processing, and protection central to any agency's digital processes and customer engagements.

Read More

Spotlight

State of Maryland

Maryland is on the path to becoming the best state in the nation. Referred to as “America in Miniature”, Maryland embodies the very spirit of the United States. Maryland is home to ethnic groups of every origin, just about every natural feature, and much like our country, opportunity!

Events