Sort Alphabetically

Infrastructure is a topic that is not commonly addressed in a manner which the reader can determine exactly what it is, how it works, how it is designed, implemented and maintained.

We hear the term used as a “buzz word”, but in reality it is a mechanism that is design to run a specific set of operations within a government operation. Agencies can be assigned to maintain a specific section of the “government” infrastructure, and that can range from power and utilities, to communications and transportation. It is a vast area of numerous disciplines that comprise what is an infrastructure, but it can relate to many, many functions that keep and maintain the heartbeat of a countries day-to-day operations. It is also an area of focus since it is a target for disruption, destabilization and terrorism. Therefore it is not only important to understand how infrastructures work and operate, but their vulnerabilities as well. An infrastructure is also not limited just to government forums, but that of corporations and companies as well. Internally, each company has its own infrastructure that, combined, runs the day-to-day operations as well. Therefore, this section is designed to educate and produce examples of infrastructures, their methodologies, protocols, systems and procedures as well as the auditing mechanisms to properly examine the “condition” of its operations and to improve or correct issues that constantly arise.

“Identity Theft, Business Identity Theft and Ghost Writing Identity Theft – What’s it All About?”

Over the past two decades there has been a serious growth of businesses and “alleged” institutions that offer a plethora of specialized “certifications”. We see so many abbreviations surfacing that are not identified. As an example, there is the “NARSMONISS” (a ten (10) letter abbreviation!) that was used. I couldn’t More >

“Law Enforcement – Time to Educate the Public and other Agencies”

“Law Enforcement – Time to Educate the Public and other Agencies” The responsibilities and roles of law enforcement today has become a nightmare to implement, let alone understand the limitations which are in a constant state of flux. On one end, law enforcement is considered a first responder, but then More >

“Monitoring the On-going Stability of Foreign Countries and Their Policies toward the United States – Part 1, an Overview”

“Monitoring the On-going Stability of Foreign Countries and Their Policies toward the United States – Part 1, an Overview” Published ©2014 RSI/Dr. Mark D. Lurie (all rights reserved) Examination of threats to the United States has always been treated as analysis and policy formation based the “primary” prospective (potential or More >

“Research – What it really takes to Hunt for Valid Information”

In a formal court video closed-door hearing, an Assistant Prosecutor (AP) is performing a direct examination and challenge of a Forensic Expert Witness (EW), whose expertise is in evidence reconstruction. The issue is regarding a potential conflict of interest as well as information supplied to the court by the EW. More >

Threat, Fraud and Risk Management – What does it Really Mean?

  Threat, Fraud and Risk Management – What does it Really Mean? I. Risk Management – The “definition” of Risk Management has been slowly, but steadily compromised over the past two decades. Most don’t even understand what it means and uses the phrase improperly to define other disciplines which have More >