«The Security Economy

Total Page:16

File Type:pdf, Size:1020Kb

«The Security Economy The Security Economy « Recent years have seen security take a prominent place on the political and corporate agenda. Organised crime, terrorism, disruption of global supply chains, The Security computer viruses – all have played a role in raising people’s awareness of the risks they face in today’s world. Economy The result has been the emergence of a USD 100 billion market for security goods and services fed by growing demand from governments, businesses and private households. With globalisation and technological progress continuing at a rapid pace, the security economy is expected to expand further in the years ahead. New identification and surveillance technologies such as biometrics and radio frequency ID are coming on stream, and satellite-based monitoring is set to play an ever greater role. How large are the potential economic costs of major disruptions to transport systems and information networks? What is the overall cost of tighter security? Are there trade-offs between higher levels of security and economic efficiency? What are the future implications for society of the growth of surveillance in terms of its impact on privacy and other democratic liberties? This report tackles those and many other questions critical to the security economy of the 21st century. The Security Economy OECD's books, periodicals and statistical databases are now available via www.SourceOECD.org, our online library. This book is available to subscribers to the following SourceOECD themes: Science and Information Technology General Economics and Future Studies Ask your librarian for more details on how to access OECD books on line, or write to us at [email protected] www.oecd.org ISBN 92-64-10772-X 03 2004 03 1 P -:HSTCQE=VU\\WY: 2000 The Security Economy ORGANISATION FOR ECONOMIC CO-OPERATION AND DEVELOPMENT ORGANISATION FOR ECONOMIC CO-OPERATION AND DEVELOPMENT Pursuant to Article 1 of the Convention signed in Paris on 14th December 1960, and which came into force on 30th September 1961, the Organisation for Economic Co-operation and Development (OECD) shall promote policies designed: – to achieve the highest sustainable economic growth and employment and a rising standard of living in member countries, while maintaining financial stability, and thus to contribute to the development of the world economy; – to contribute to sound economic expansion in member as well as non-member countries in the process of economic development; and – to contribute to the expansion of world trade on a multilateral, non-discriminatory basis in accordance with international obligations. The original member countries of the OECD are Austria, Belgium, Canada, Denmark, France, Germany, Greece, Iceland, Ireland, Italy, Luxembourg, the Netherlands, Norway, Portugal, Spain, Sweden, Switzerland, Turkey, the United Kingdom and the United States. The following countries became members subsequently through accession at the dates indicated hereafter: Japan (28th April 1964), Finland (28th January 1969), Australia (7th June 1971), New Zealand (29th May 1973), Mexico (18th May 1994), the Czech Republic (21st December 1995), Hungary (7th May 1996), Poland (22nd November 1996), Korea (12th December 1996) and the Slovak Republic (14th December 2000). The Commission of the European Communities takes part in the work of the OECD (Article 13 of the OECD Convention). Publié en français sous le titre : L’Économie de la sécurité © OECD 2004 Permission to reproduce a portion of this work for non-commercial purposes or classroom use should be obtained through the Centre français d’exploitation du droit de copie (CFC), 20, rue des Grands-Augustins, 75006 Paris, France, tel. (33-1) 44 07 47 70, fax (33-1) 46 34 67 19, for every country except the United States. In the United States permission should be obtained through the Copyright Clearance Center, Customer Service, (508)750-8400, 222 Rosewood Drive, Danvers, MA 01923 USA, or CCC Online: www.copyright.com. All other applications for permission to reproduce or translate all or part of this book should be made to OECD Publications, 2, rue André-Pascal, 75775 Paris Cedex 16, France. FOREWORD Foreword The security industry is a large and expanding area of economic activity. Spurred on by the perception of rising crime, the threat of terrorist attacks and increasingly free movements of goods, capital and people, there has been a swell in government, corporate and consumers’ budgets for security goods and services in recent years. This development promises to have far-reaching economic and societal implications over the longer term. The challenge for policy makers is how to meet the apparent need for greater security without unduly impeding economic efficiency and citizens’ rights in liberal societies. In mid-2003, I spoke with a number of senior officials of OECD member countries about exploring the phenomenon of the “new security economy”. It was clear to me that the overall concept was not fully understood, as it was really a convergence of new trends in our societies. Ever higher performance technologies are providing tools for new goods and services in our economies, including the monitoring, storing and instant retrieval of large data and information sets. Larger relational databases linked to computational capacity are creating new possibilities for the tracking and control of information about goods and services – and about people and the global environment itself. Equally clearly, national security issues were likely to prove an important factor in focusing the interest of governments and the private sector. What we wanted to do in the International Futures Programme was to offer a platform to discuss the future of the security economy, its components and its drivers, both in the private and in the public sector. A first step was to develop a framework for the concept itself. To provide the necessary input at an early stage, we produced a scoping document defining and outlining the type of issues that were emerging from this convergence of technologies and new security needs. We then proceeded with the design of the Forum meeting itself, on the basis of which we invited the presentations and papers. We held the Forum on December 8, 2003 in the Paris Headquarters of the OECD. The meeting consisted of four sessions. The first reviewed the social, economic and institutional drivers behind the rising demand for security and sketched out the trends and developments likely to determine its future scale and direction. The second session looked at the supply side, outlining the state of the art in several key technologies in identification, authentication and surveillance and exploring their likely development over the next ten years or so. The third examined the longer-term economic implications of the emerging security economy. It addressed key trade-offs in the coming years between greater security on the one hand and economic efficiency on THE SECURITY ECONOMY – ISBN 92-64-10772-X – © OECD 2004 3 FOREWORD the other, and explored the roles that governments and the private sector might play in helping to resolve these trade-offs. The fourth and final session considered the mid- to long-term implications for society of the growing use of security technologies. More specifically, it was about the future of the “surveillance society” and what can be done to guide the development and utilisation of identification and monitoring technologies along avenues that society regards, on balance, as generally most beneficial. Barrie Stevens designed and organised the meeting, and contributed the report’s first two chapters. Jack Radisch conducted the initial scoping of the concept and issues. Research assistance was provided by Marit Undseth, and logistical support by Concetta Miano. Randall Holden edited this volume. The book is published under the responsibility of the Secretary-General of the OECD. Michael W. Oborne Director, Multi-Disciplinary Issues, OECD International Futures Programme 4 THE SECURITY ECONOMY – ISBN 92-64-10772-X – © OECD 2004 TABLE OF CONTENTS Table of Contents Chapter 1. The Emerging Security Economy: An Introduction by Barrie Stevens ...................................................................... 7 Chapter 2. Factors Shaping Future Demand for Security Goods and Services by Barrie Stevens ...................................................................... 17 Chapter 3. Biometrics by Bernard Didier...................................................................... 35 Chapter 4. RFID: The Concept and the Impact by Steve Hodges and Duncan McFarlane ................................. 55 Chapter 5. Tracking by Satellite: GALILEO by René Oosterlinck................................................................... 77 Chapter 6. Security Products: Inside the Italian Electronic Identity Card by Alfio Torrisi and Luigi Mezzanotte ...................................... 91 Chapter 7. Assessing the Economic Trade-offs of the Security Economy by Tilman Brück........................................................................ 101 Chapter 8. Surveillance Technologies: Trends and Social Implications by David Lyon ........................................................................... 127 Annex: List of Participants.................................................................. 149 THE SECURITY ECONOMY – ISBN 92-64-10772-X – © OECD 2004 5 ISBN 92-64-10772-X The Security Economy OECD 2004 Chapter 1 The Emerging Security Economy: An Introduction by Barrie Stevens OECD Secretariat, Advisory Unit to the Secretary-General
Recommended publications
  • Sagaponack Common School District Board of Trustees Meeting PRESENT: Cathy Hatgistavrou, President Brian Villante, Vice Presi
    Sagaponack Common School District October 18, 2018 Board of Trustees Meeting PRESENT: Cathy Hatgistavrou, President Brian Villante, Vice President Lauren Thayer, Member ALSO PRESENT: Alan Van Cott, Superintendent Eileen Tuohy, District Treasurer Jeanette Krempler, District Clerk The meeting was called to order by Cathy Hatgistavrou at 7:05 p.m. Brian Villante seconded the motion. The Pledge of Call to Order Allegiance was conducted. A motion was made by Brian Villante to approve the Approval of Meeting Minutes September 20, 2018 meeting minutes with amendments. Lauren Thayer seconded the motion. Passed 3-0. A motion was made by Brian Villante to approve the September Treasurer's Report. Lauren Thayer seconded the Approval of the September motion. Passed 3-0. Treasurer's Report Checking account total: $127,516.38 Money Market account total: $1,611,820.93 A motion was made by Lauren Thayer to approve the Approval of Budget Transfers October 2018 budget transfers in the amount of $5,917.00. Brian Villante seconded the motion. Passed 3-0. A motion was made by Cathy Hatgistavrou to approve Check Approval of Check Warrant #08- Warrant #08-201819 in the amount of $38,305.61. Brian 201819 Villante seconded the motion. Passed 3-0. A motion was made by Cathy Hatgistavrou to approve Check Warrant #09-201819 in the amount of $74,638.57. Brian Approval of Check Warrant #09- 201819 Villante seconded the motion. Passed 3-0. A motion was made by Brian Villante to set the tax rate for Approval Tax Rate the 2018-2019 school year at .2229/$1,000.00 of assessed value.
    [Show full text]
  • Biometric Cardholder Authentication Pioneering the Way with Security Why Digital Ids Won't Replace Physical Identity Cards
    The Offi cial Publication of the International Card Manufacturers Association August 2021 Volume 31 • No. 4 Biometric Cardholder Authentication Pioneering the Way with Security Why Digital IDs Won’t Replace Physical Identity Cards Any Time Soon Selecting the Right Ink Technology for ID Card Printing Bringing Security to Contactless Biometric Payment Cards founder /executive director is published by CMA for ICMA. Please Enter the 2021 Élan Awards of Excellence! submit all articles, news releases and advertising to: | By Jeffrey E. Barnhart CARD MANUFACTURING™ C/O: CMA With hundreds of entries from around the globe each year, the Élan 191 Clarksville Road Awards of Excellence celebrate the world’s most impressive cards and Princeton Junction, New Jersey 08550 USA card technologies. The competition, which was designed to drive innovation within the card industry, recognizes Founder/Executive Director winners in three categories—card manufacturing, personalization & fulfillment and card Jeffrey E. Barnhart [email protected] suppliers. Judging is based on a quantifi able scoring system with criteria in nine categories. Winners will be announced during a special ceremony at the 2021 ICMA Card Manufacturing Operations and Member Experience Manager and Personalization EXPO from November 7-10 in Orlando, Florida. Michael Canino [email protected] Open to ICMA members only, entries for the 2021 Élan Awards of Excellence are due by Association Manager September 1. The competition honors world-class achievements in the following categories: Lynn McCullough [email protected] Secure Payments Cards; Loyalty, Promotional and Gift Cards; ID and Access Control Cards; Personalization & Fulfillment Product, Service or Project; Unique Innovation and Best Managing Editor Jennifer Kohlhepp Supplier/Vendor New Product, Service or Innovation.
    [Show full text]
  • 1704 Optaglio Brožura Polygrafie 210X210.Indd
    CREATING ABSOLUTE TRUST TOWARDS DOCUMENTS AND VALUABLES OPTAGLIO WAS FOUNDED BY EXPERTS ABOUT FROM CZECH ACADEMY OF OPTAGLIO SCIENCES. OPTAGLIO is a leading global provider of advanced ABOUT OUR DURING optical security devices and the market leader in e-beam lithography. During 25 years of our ALL OF ITS TECHNOLOGY history, we have delivered hundreds of millions of 20-YEAR holograms to governments, financial institutions e-beam lithography is the most advanced technology HISTORY and other organizations in more than 50 countries for creating optical security elements. Optical around the world. Our unique technology has holographic structures are generated through HAS HEAVILY been broadly recognized as the industry standard sophisticated mathematic algorithms which can be ANTI-COUNTERFEIT PROTECTION BASED ON INVESTED INTO WE DELIVER for optical security. brought together neither through reverse engineering SCIENTIFIC OPTAGLIO, certified to relevant international nor any other method. Therefore no unauthorized FULL PROTECTION SURGICAL PRECISION standards, operates under strict 24/7 security person can produce the same hologram. RESEARCH. AT A PROPORTION Our technologies are often preferred for a protection of most supervision. Our comprehensive security system Thanks to the unrivaled mastering of e-beam OF COSTS valuable assets such as personal identity because we can ensure covers people, processes, data, and facilities. lithography, we produce holograms with visual effects higher security level than anybody else. Therefore we are a partner
    [Show full text]
  • Bureau of Western Hemisphere Affairs (WHA)
    U.S. DEPARTMENT OF STATE Bureau of Western Hemisphere Affairs (WHA) The Bureau of Western Hemisphere Affairs is headed by Assistant Secretary of State Thomas A. Shannon. The Bureau is responsible for managing and promoting U.S. interests in the region by supporting democracy, trade, and sustainable economic development, and fostering cooperation on issues such as drug trafficking and crime, poverty reduction, and environmental protection. Interns in the Bureau of Western Hemisphere Affairs (WHA) may serve in any of the Bureau's eleven offices. Offices consist of a Director, Deputy Director, multi-functional officers, and support staff. FUNCTIONAL RESPONSIBILITIES MAY CONSIST OF: • Drafting and editing reports, including the Assistant Secretary's Daily Activity Report • Assisting in sorting incoming cables for the Office Director and Deputy Director • Drafting letters for the President and replies to Congressional correspondence • Responding to WHA Front Office requests for input on mega talkers (large documents containing the Department policy on a given issue) • Reviewing daily newspapers and electronic databases for pertinent articles on a specific country • Becoming familiar with officer portfolios in order to sort telegram traffic and fill in behind when they are out • Providing assistance to officers as needed to include researching, analyzing, and translating existing material on a specific country and maintaining databases on monitoring and visa issuance • Responding to public inquiries regarding a specific country's policy • Compiling comprehensive briefing books on a specific country The following are examples of duties that have been performed by interns in the Bureau of Western Hemisphere Affairs: • Compiling comprehensive briefing books on Bolivia, Colombia, Peru and Ecuador to be used by transferring FSOs and desk officers.
    [Show full text]
  • Pandemic Marks 1St PDA Asia Pacific's Anniversary
    Volume 1 • Issue 2 July 2020 www.pda.org/pdaletter Pandemic Marks 1st PDA Asia Pacific’s Anniversary Having just passed the milestone of our first-year initiation as the PDA Asia Pacific lead- ership, we find ourselves in a totally unpredictable situation. Thankfully, we belong to a network of association industry professionals who followed the situation in China starting in January. This enabled us to adapt to the situation quickly. Aside from the operational precautionary measures by operating our team in Singapore under the business continuity plan protocol early on, we had yet to see the impact in the region and the duration of it. Without giving away my age, I recall the days of SARS and applied what I learned from that time. Still, as we now all know, not much could have prepared us for this. Following the launch of PDA Asia Pacific last year, we reached out to PDA’s chapters in Japan, Korea, Taiwan and Singapore. We listened and we learned, adding three new events in these markets. We recognized that PDA members in several countries had a wonderful process in place, providing a good quantity of education for members. PDA’s Japan Chapter already has a strong framework. We also learned regulatory agencies and Marcel Ewals, PDA Asia Pacific Office other organizations in the region PDA was well known but its presence not felt. With this in mind, we drafted an ambitious plan to be represented at events, industry meetings and digital offerings. Of course, digital resources have become more critical as of late and we hope that you have encountered more PDA activities whilst browsing the internet feedback is always welcome.
    [Show full text]
  • APA MAGAZINE the Magazine for the Polygraph Professional
    APA MAGAZINE The Magazine for the Polygraph Professional Dr. Tim Weber, Editor In this Issue May/June 2008 Volume 41,3 2008 APA Annual Seminar Schedule, p. 16 APA President reports on the results of the first mail-in ballot election, p. 34 APA Magazine 2008, 41(3) 1 AMERICAN International INSTITUTE OF POLYGRAPH Accredited by the American Polygraph Association Recognized by the American Association of Police Polygraphists WHEN QUALITY COUNTS! Professional Polygraph Examiner Training. Curriculum and training methods based on Federal training and experience with the US Army Criminal Investigations Command and the Department of Defense Polygraph Institute. Training programs have an overall objective of providing the knowledge, skills and ability to professionally administer polygraph exams. Schedule 1: TRADITIONAL TEN (10) WEEKS IN RESIDENCE Schedule 2: EIGHT (8) WEEKS IN RESIDENCE & 2 WEEKS INTERNSHIP ● We provide polygraph equipment for training. Try it before you buy it. Lafayette LX4000 Axciton Stoelting CPS II Limestone Polygraph Professional Suite ● Experienced faculty using effective training methods. Less talk, more action. ● Video recorded laboratory exercises. Learn by doing. 2008 Class Start Dates January 7 March 17 April 21 September 8 Lafayette, IN 8 weeks Director & Primary Instructor– Charles (Chuck) E. Slupski Army CID Examiner (1983 – 1996) / DOD Polygraph Institute Instructor (1992 – 1996) Primary Instructor – Allan E. Stein Army CID Examiner & Polygraph Instructor at US Army Polygraph School NEW FACILITY. Great location
    [Show full text]
  • Institutionen För Systemteknik 581 83 LINKÖPING
    Avdelning, Institution Datum Division, Department Date 2004-06-04 Institutionen för systemteknik 581 83 LINKÖPING Språk ISBN Language Rapporttyp Report category Svenska/Swedish Licentiatavhandling ISRN LITH-ISY-EX-3533-2004 X Engelska/English X Examensarbete C-uppsats Serietitel och serienummer D-uppsats Title of series, numbering ISSN Övrig rapport ____ URL för elektronisk version http://www.ep.liu.se/exjobb/isy/2004/3533/ Titel Plastkortsystem och brottsmöjligheter, en genomgång av egenskaper hos kort och läsare Title Plastic card frauds, a survey of current relevant card and system properties Författare Natalia Savostyanova and Valeriya Velichko Author Sammanfattning Abstract Recently the society has been turning from the use of paper-based technologies to plastic cards in certain spheres of our life. With the emergence and proliferation of high technologies we cannot content with the security provided by paper only. Therefore the society has chosen plastic to protect its information because it offers far more security based not only on human perception but also on machine-readable elements. The number of plastic cards in circulation in different spheres of our everyday life increases constantly. They replace money, documents and allow easy and safe access to some services. In spite of its security the plastic card however is subjected to fraud. Plastic card fraud results in significant losses for the various industries. Since the first appearance of plastic cards methods of committing fraud have changed dramatically. Now there is a wide range of high technologies at the disposal of criminals as well as card manufacturers. Therefore we have put the great emphasize of this work on the analysis of the most common card technologies in the Plastic Card World, the magnetic stripe and the chip, existing crimes and main means of their committing.
    [Show full text]
  • Holographic Interfermetry for Security and Forensic Applications. in Burgess, D., Owen, G., Bouma, H., Carlysle-Davies, F., Stokes, R.J
    AMBADIYIL, S., SREELEKSHMI, R.C., PILLAI, V.P.M. and PRABHU, R. 2016. Holographic interfermetry for security and forensic applications. In Burgess, D., Owen, G., Bouma, H., Carlysle-Davies, F., Stokes, R.J. and Yitzhaky, Y. (eds.) Proceedings of the 12th Optics and photonics for counterterrorism, crime fighting and defence conference 2016: co- located with Society of Photographic Instrumentation Engineers (SPIE) security and defence conference, 26-27 September 2016, Edinburgh, UK. Proceedings of SPIE, 9995. Bellingham: SPIE [online], article ID 999502. Available from: https://doi.org/10.1117/12.2242153 Holographic interfermetry for security and forensic applications. AMBADIYIL, S., SREELEKSHMI, R.C., PILLAI, V.P.M., PRABHU, R. 2016 © 2016 Society of Photo Optical Instrumentation Engineers. One print or electronic copy may be made for personal use only. Systematic reproduction and distribution, duplication of any material in this paper for a fee or for commercial purposes, or modification of the content of the paper are prohibited. This document was downloaded from https://openair.rgu.ac.uk Holographic interferometry for security and forensic applications Sajan Ambadiyil,a Sreelekshmi R. C,b V. P. Mahadevan Pillai,c* Radhakrishna Prabhud aCenter for Development of Imaging Technology, Thiruvananthapuram-695027, Kerala, India bSarabhai Institute of Science and Technology, Thiruvananthapuram, Kerala, India cDepartment of Optoelectronics, University of Kerala, Thiruvananthapuram-695581, Kerala, India dRobert Gordon University, School of Engineering, Aberdeen, United Kingdom ABSTRACT Security holograms having unique 3D images are one of the tools for enhancing the security for product and personnel authentication and anti-counterfeiting. Apart from the high technology that is required, the uniqueness of a 3D object presents a significant additional threshold for the counterfeiting of such security holograms.
    [Show full text]
  • ED041428.Pdf
    DOCUMENT RESUME ED 041 428 EC 006 107 TITLE Exceptional Children Media Reviews Reprint. INSTITUTION Council for Exceptional Children, Arlington, Va. PUB DATE 68 NOTE 59p. JOURNAL CIT Reprinted from Exceptional Children, September 1968 - April 1970 EDRS PRICE EDRS Price MF-$0.50 HC Not Available from EDRS. DESCRIPTORS Annotated Bibliographies, Audiovisual Aids, Bibliographies, Educational Methods, *Exceptional Child Education, Films, *Handicapped Children, Instructional Materials, *Instructional Media, *Literature Reviews ABSTRACT Forty-nine books, films, and tapes are reviewed in various areas of special education. Authors' comments on the reviews are frequently included. (JD) .-es. Exceptional Children 2Media Reviews Reprint September 1968-Apri11970 Reprinted from EXCEPTIONAL CHILDREN September 1968- April 1970 Media Reviews VOLUME 35 September 1968 The Modification of Stuttering. Eugene J. Brut- to the two process theory. Chapter IV, "A ten and Donald J. Shoemaker. Englewood Cliffs, Theory for the Modification of Stuttering," New Jersey: Prentice-Hall, 1967. 148 pp. $5.50. deals with extinction of classically conditioned responses and of instrumental responses. Chap- This book is intended to acquaint both the ter V, "Clinical Procedures for the Modifica- college student and the professional speech pathologist with the learning theories around tion of Stuttering," is 49 pages long or about which current thinking about stuttering has one-third of the book. One of the first pro- been structured, with the data important to cedures described is the obtaining of critical the fundamental predictions of these the- factors; which evoke negative emotion in the ories, and with a two-process theory of learn- patient. The techniques of therapy are in terms ing that seems promising for both the the- oretical integration of the data on stuttering of inhibition of negative emotional responses, and the therapeutic modification of it.
    [Show full text]
  • Student Life | December 7, 2007
    STAFF EDITORIAL | PROFESSOR SMITH’S LAST LECTURE TODAY | SEE FORUM, PAGE 4 TUDENT IFE THE SINDEPENDENT NEWSPAPER OF WASHINGTON UNIVERSITY L IN ST. LOUIS SINCE 1878 VOLUME 129, NO. 41 FRIDAY, DECEMBER 7, 2007 WWW.STUDLIFE.COM Fewer appeals leave SU with Administration discusses money to burn tuition at annual forum part of the money set aside for BY TEDDY WHITE BY PERRY STEIN CONTRIBUTING REPORTER appeals because there has been such low demand. CONTRIBUTING REPORTER Student Union (SU) is encour- “The treasurers wanted to After meeting with students aging student groups on campus see the funding percentage [for at the annual Tuition Forum on to appeal for more funding after category I groups] higher,” said Tuesday to explain, and receive spending from the appeals fund Marius Johnson, SU treasurer. feedback on, the breakdown of lagged considerably in compari- “Because they could safely do it, tuition, the Washington Univer- son to previous years. they moved $15,000 so the fund- sity administration will meet As of Thursday afternoon, ing percentage would be higher.” with the Board of Trustees to- there was about $115,000 avail- The student activities fee, night to set the offi cial tuition able in the appeals fund for which is set at one percent of the for the 2008-09 academic year. Washington University student annual tuition paid by each stu- The Executive Board will of- organizations. dent, determines the SU budget; fi cially announce the tuition This amount is signifi cantly because tuition rates are rising price to the student body on greater than it has been in past faster than infl ation, the budget January 7, 2008.
    [Show full text]
  • Jeeps, Communists, and Quonset Huts: World War II Surplus Disposal in the Territory of Hawai‘I Gwen Sinclair
    Jeeps, Communists, and Quonset Huts: World War II Surplus Disposal in the Territory of Hawai‘i gwen sinclair In the waning days of World War II, the Honolulu Advertiser pub- lished a prescient article by a reporter named Gerry Burtnett about military surplus disposal: The disposal of surplus property in Hawaii is going to be one of the big- gest stories of the last days of the war and the postwar period. It may be a rather unpleasant story, from present indications.1 Disposal of war surplus in Hawai‘i was a big story, judging from the hundreds of newspaper articles about it published between 1945 and 1950. As soldiers, sailors, and marines returned home and life in the Territory began to be shaped by peacetime concerns, surplus disposal became an important industry in the Territory of Hawai‘i and in the nation as a whole. The disposal of surplus property captured the attention not only of the surplus-consuming public, but also of Congressional investigating committees. This paper will examine the effects of surplus disposal, why surplus held people’s attention for so long, and the major events and key people involved with surplus dis- posal in the Territory of Hawai‘i. Gwen Sinclair is a librarian and Head of the Government Documents & Maps Department at the University of Hawai‘i at Mānoa Library. Her publications and research interests range from government secrecy to presidential executive orders and proclamations relating to federal property in Hawai‘i. The Hawaiian Journal of History, vol. 50 (2016) 121 122 the hawaiian journal of history Long before the end of World War II, officials in Washington, D.C.
    [Show full text]
  • Good Practice in Whistleblowing Protection Legislation (WPL)
    www.transparency.org www.cmi.no Good Practice in Whistleblowing Protection Legislation (WPL) Query: “I am interested in good practices in law and practice for the protection of whistleblowers as provided for in UNCAC Art. 8.4, 32 and 33. Could you give some indications regarding model legislation or aspects to be considered for the development of whistle blower protection legislation? Further, do you know about good practices to implement such legislation especially from developing countries?” Purpose: An increasing number of countries is adopting I am working in Bangladesh on UNCAC Whistleblowing Protection Legislation (WPL), to protect implementation. One national priority is to develop whistleblowers from both the private and public sector from occupational detriment such as dismissal, sound legislation and mechanisms for whistle- suspension, demotion, forced or refused transfers, blower protection. So far, they are non existent ostracism, reprisals, threats, or petty harassment. apart from money laundering offences. Good practice WPL includes adopting comprehensive free standing laws that have a broad scope and Content: coverage, provide adequate alternative channels of reporting both internally and externally, protect as far as Part 1: Best Practice Whistleblowing possible the whistleblower’s confidentiality and provide for legal remedies and compensation. As WPL is still in Protection Legislation its infancy, little is known yet on its impact and the Part 2: Good Practice in Implementing conditions of effective implementation. Whistleblowing
    [Show full text]