Publications for National Bullying Prevention Month

October 16, 2019

According to the National Center for Educational Statistics, more than one out of every five students reports being bullied at school. And according to the Centers for Disease Control and Prevention (CDC), students who experience bullying are at an increased risk for poor school adjustments, sleep difficulties, anxiety, and depression. Even kids who do the bullying are at a higher risk for suicide than the rest of their peers. All around, it’s time to bring bullying to an end. October is National Bullying Prevention Month, which means now is the time that we can all do something about these statistics. The first step in preventing bullying is educating ourselves on why it happens, how to notice it, and what to do to help prevent it. Start with these publications from the GPO Online Bookstore.

Preventing Violent Extremism in Schools from the FBI covers the specific demographic and criteria factors that can draw at-risk students to violent extremism and aggressive forms of behavior, such as bullying, or engagement with gangs. It’s a great guide for school principals, teachers, guidance counselors, administrators, and educational policy makers to learn more about how youth might be susceptible to violent extremist ideologies or possible recruitment. For example, the report explains that violent extremism in mainstream culture can be aligned with technological advances. It notes that youth who feel alienated can be tempted easily via social media, online chatrooms, and even online gaming. Physical contact with extremist organizations has diminished over time. Now, the internet serves as a primary catalyst to sustain radicalized beliefs. The report also covers “leakage,” which refers to a common warning behavior of students advocating violence. According to the report, “leakage occurs when a student intentionally or unintentionally reveals clues to feelings, thoughts, fantasies, attitudes, or intentions that signal an impending act.” They might come in the form of threats, boasts, or ultimatums from a student. Read the entire guide to learn how you can help at-risk youth. You’ll also learn about who you should contact and at what point you should contact them in case you notice students exhibiting at-risk behaviors or communications.

A Comprehensive Technical Package for the Prevention of Youth Violence and Associated Risk Behaviors from the Department of Health and Human Services and the CDC is a helpful publication for parents, students, community youth centers, and first responders. This publication covers research on youth violence and strategies for preventing it. Some of these strategies include early childhood home visitation, parenting skill and family relationship programs, and mentoring programs such as Big Brothers Big Sisters of America. According to the report, mentored youth were 32% less likely to have engaged in a physical fight at an 18 month follow-up. Learn more about preventing youth violence with the important research outlined in this package.

Did you know that both victims and perpetrators of bullying are at higher risk of suicide than their peers? Preventing Suicide: A Toolkit for High Schools, which offers strategies to prevent suicide and promote behavioral health among students, is helpful for both schools and parents. The toolkit notes that suicide is the third leading cause of death amongst teenagers. According to the report, many activities designed to prevent violence, bullying, and the abuse of alcohol and other drugs may also reduce suicide risk among students. The toolkit includes a suicide and bullying information sheet, as well as, an information sheet about the relationship among culture and suicide. According to the toolkit,

“Culture plays a large role in determining who (if anyone) young people turn to for emotional support. Young people from some cultures may prefer to consult family members or religious leaders rather than mental health professionals or other ‘outsiders.’ Other cultures may value self-reliance and regard any help-seeking (even within the family) as a weakness.” Schools should also consult this toolkit for a checklist of suicide prevention activities, including developing a written protocol for helping students at risk, training staff on prevention efforts, and more. Does your school have these plans in place?

As these publications all bring to light, bullying can be prevented. Knowledge is power! Know who is at risk for bullying and being bullied. Know the signs for how to recognize bullying. And know what to do to stop it from happening. Each of us has a part to play in keeping our youth safe in school and our communities!

The GPO Online Bookstore – Easy Access to Federal Publications

HOW DO I OBTAIN THESE RESOURCES?

Sign up to receive promotional bulletin emails from the US Government Online Bookstore.

Shop Online Anytime: You can buy a vast majority of eBooks or print publications —with FREE Standard Shipping worldwide— from the U.S. Government Online Bookstore at https://bookstore.gpo.gov.

Visit our Retail Store: To buy or order a copy of any print editions from this collection at GPO’s retail bookstore at 710 North Capitol Street NW, Washington, DC 20401, open Monday–Friday, 8 a.m. to 4 p.m., except Federal holidays, Call (202) 512-0132 for information or to arrange in-store pick-up(s).

Order by Phone or Email: Call our Customer Contact Center Monday through Friday, 8 am to 4:30 pm Eastern (except US Federal holidays). From US and Canada, call toll-free 1.866.512.1800. DC or International customers call +1.202.512.1800.  Email orders to ContactCenter@gpo.gov

Visit a Federal depository library: Search for U.S. Government publications in a nearby Federal depository library. You can find the records for most titles in GPO’s Catalog of U.S. Government Publications.

Find more than a million official Federal Government publications from all three branches at www.govinfo.gov.

About the author: Blogger contributor Cat Goergen is the PR Specialist in GPO’s Public Relations office.


The FBI Book You’ve Been Waiting For

July 22, 2016

The FBI Story is a 1959 American drama starring Jimmy Stewart. It’s an excellent film, but not the topic of this blog post. The FBI Story is also the title of the Federal Bureau of Investigation’s annual summary of crime fighting operations and investigations.

THE FBI STORY 2015_027-001-00102-1-The FBI was founded on July 26, 1908. Over the course of its long history, a lot has happened under the Bureau’s law enforcement and intelligence purview—plenty to fill pages with. The latest progress report, The FBI Story 2015, is now available through GPO.

Securing America against threats of transnational cyber-crime syndicates, human trafficking operations, violent street gangs, international corruption, and terrorism is the work of the FBI. As director James Comey writes in his introduction, each year “the threats we face are moving faster and becoming harder to anticipate and stop.” Capable bureau employees work hard at adapting to ever evolving dangers. Many of their successes and as Comey notes, “some of the Bureau’s unique capabilities,” are featured in this latest edition.

FBI seal2015 was year full of scheming. The indictment of FIFA (the governing body of international soccer) officials on charges of racketeering, wire fraud, and money laundering was arguably the most high-profile case. FBI agents also played a role in dismantling multimillion-dollar schemes of the Ponzi and foreign corruption variety.

2015 was also a time to commemorate anniversaries. The Bureau marked 20 years since of the Oklahoma City bombing when special agents worked “one of the largest and most complex cases the FBI has ever undertaken.”

oklahoma city bombing 20Several task forces get status updates in this edition. The FBI has teams of experts in explosives, cyber action, and even art recovery. Some of their stories read like mystery novels. “The Case of the Stolen Stradivarius,” a brief tale of a rare instrument’s theft and recovery, is one example. So is “The Case of the Corrupt Coin Dealer.”

Fraud takedown. Cold case investigation. Quest for victim justice. Locating perpetrators of smash and grab robberies. Conversation surrounding law enforcement and race. Nationwide appeal to help find missing children. The FBI Story 2015 is all that. It’s a rundown of the important work of FBI agents do on behalf of the American people. And it’s also a reminder that the FBI works best with the full trust and cooperation of the American people.

HOW DO I OBTAIN THIS PUBLICATION?

Shop Online Anytime: You can buy eBooks or print publications —with FREE Standard Shipping worldwide— from the U.S. Government Online Bookstore at http://bookstore.gpo.gov.

 Shop our Retail Store: Buy a copy of any print editions from this collection at GPO’s retail bookstore at 710 North Capitol Street NW, Washington, DC 20401, open Monday–Friday, 9 a.m. to 4 p.m., except Federal holidays, Call (202) 512-0132 for information or to arrange in-store pick-up.

Order by Phone: Call our Customer Contact Center Monday through Friday, 8 am to 5:30 pm Eastern (except US Federal holidays). From US and Canada, call toll-free 1.866.512.1800. DC or International customers call +1.202.512.1800.

Visit a Federal depository library: Search for U.S. Government publications in a nearby Federal depository library. You can find the records for most titles in GPO’s Catalog of U.S. Government Publications.

About the author: Blogger contributor Chelsea Milko is a Public Relations Specialist in GPO’s Public Relations Office.


Fraud Awareness: Fighting cybercrime and other fraud-related issues

August 13, 2015

The hack of the Office of Personnel Management Web site revealed personnel records and security-clearance files of federal employees and contractors that exposed sensitive information. About 22.1 million people were affected by the breach, which included not only federal employees and contractors, but their families and friends as well.

It is timely to note that National Fraud Awareness Week occurs this month. Fraud-fighting professionals from around the world convene to inform people about the threat of phone, internet, and mail fraud for in home and at the workplace. These professionals share tips for employers and employees equally to stay secure and protect their sensitive information.

Ponzimonium_CoverGPO’s online bookstore has several books that can also benefit and educate people on fraud awareness. For instance, “Ponzimonium: How Scam Artists Are Ripping Off America” is an eBook that tells compelling stories about actual U.S. Commodity Futures Trading Commission (CFTC) cases stemming from investigations that began with the economic downturn. These are real cases, real fraudsters, with unfortunately, very real victims.

9780160927492Another useful book that GPO has is the “2014 The FBI Story.” This book features an annual collection of news and feature articles from the FBI website and shows the agency’s most successful 2014 investigations and operations. It also covers an array of cases involving high profile crimes dealing with sex trafficking, serial killers, gangs, scams, frauds, and cybercrime.

With all the scams that are going around, hopefully everyone will take full advantage of these resources. Be mindful of the sites you give your personal information out to. Also remember, if it sounds too good to be true, it probably is.

How do I obtain these resources?

Shop Online Anytime: You can buy eBooks or print publications —with FREE Standard Shipping worldwide— from the U.S. Government Online Bookstore at http://bookstore.gpo.gov.

Shop our Retail Store: Buy a copy of any print editions from this collection at GPO’s retail bookstore at 710 North Capitol Street NW, Washington, DC 20401, open Monday–Friday, 9 a.m. to 4 p.m., except Federal holidays, Call (202) 512-0132 for information or to arrange in-store pick-up.

Order by Phone: Call our Customer Contact Center Monday through Friday, 8 am to 5:30 pm Eastern (except US Federal holidays). From US and Canada, call toll-free 1.866.512.1800. DC or International customers call +1.202.512.1800.

Visit a Federal depository library: Search for U.S. Government publications in a nearby Federal depository library. You can find the records for most titles in GPO’s Catalog of U.S. Government Publications.

About the author: Epiphany Barnes is a Summer Intern in GPO’s  Publication and Information Sales office.


2015 Counterterrorism Calendar Now Available

January 14, 2015

The National Counterterrorism Center (NCTC) has released its annual Counterterrorism Calendar for 2015. This year’s calendar features a few updates, such as the inclusion of ISIS leader Abu Bakr al-Baghdadi and two women.

2015 Counterterrorism CalendarThe goal behind the Counterterrorism Calendar is to educate and inform both professionals– first responders, military, intelligence, law enforcement and other counterterrorism personnel– as well as civilians about the threats of international terrorism and how to prevent, respond or mitigate these threats against the United States both at home and abroad.

Under the Office of the Director of National Intelligence, the National Counterterrorism Center or NCTC serves as the primary organization in the U.S. government for integrating and analyzing all intelligence possessed or acquired by the U.S. government about international terrorism, including data from U.S. Federal agencies like the CIA, NSA, Defense Intelligence Agency, and the FBI as well as other domestic and international sources.

First published in a spiral-bound daily planner format in 2003, just two years after the World Trade Center attacks, the Counterterrorism or CT Calendar from the NCTC is published annually. According to the NCTC, their 2015 Counterterrorism Calendar:

…provides information on known terrorist groups, individual terrorists, and technical information on topics such as biological and chemical threats. This edition, like others since the Calendar was first published in daily planner format in 2003, contains many features across the full range of issues pertaining to international terrorism: terrorist groups, wanted terrorists, and technical pages on various threat-related topics.

Features of the Calendar

In addition to serving as a desk calendar / event planner, the 160-page 2015 Counterterrorism Calendar also serves as a tutorial on international terrorism and a gallery of “most wanted” terrorists.

The right-hand page of the planner has the event planner dates along with key historical events of significance to terrorists that might be used to plan future terrorist activities. For example, on January 8, 1998, terrorist Ramzi Ahmed Yousef was sentenced to life plus 240 years for his role in the 1993 World Trade Center bombings.

On the left-hand pages are photos, maps and/or data on terrorists and terrorist organizations around the world, from Africa and the Middle East to Europe and the Americas.

“Terrorism tutorial” information ranges from cultural—details about the Islamic Calendar; the spelling of Arabic names and terms; lists of Foreign Terrorist Organizations (FTOs), and logos used— to technical –  information about Chemical-Biological-Radiological-Nuclear-Explosive (CBRNE) weapons commonly used by terrorists, from suicide bombs to sarin gas, and how to detect and mitigate them.  For example, who among us would recognize the terrorist threat from these innocent-looking beans?

Castor-beans-used-to-make-ricin

Image: Photo of castor beans from which the deadly toxin ricin is extracted. Ricin is poisonous if inhaled, injected, or ingested. Source: NCTC 2015 Counterterrorism Calendar

“Wanted” Terrorists

Providing the real drama of the calendar are the full-page “Wanted” poster-style pages of an individual terrorist, complete with photo (if available), aliases, his terrorist activities, the reward offered, and how to report information about him.

One of the largest rewards, $25 Million, is offered for information leading to the capture of Ayman al-Zawahiri, also known as “The Teacher” or “The Doctor” who is a physician and the founder of the Egyptian Islamic Jihad. According to the CT Calendar:

“This organization opposes the secular Egyptian Government and seeks its overthrow through violent means. Al-Zawahiri is believed to have served as an advisor and doctor to Usama Bin Ladin. He has been indicted for his alleged role in the August 7, 1998, bombings of the US embassies in Dar es Salaam, Tanzania, and Nairobi, Kenya. The embassy bombings killed 224 civilians and wounded over 5,000 others.”

Image: Extract from the “wanted” page of Ayman al-Zawahiri, Al-Qaida leader and founder of Egyptian Islamic Jihad. Source: NCTC 2015 Counterterrorism Calendar

Image: Extract from the “wanted” page of Ayman al-Zawahiri, Al-Qaida leader and founder of Egyptian Islamic Jihad. Source: NCTC 2015 Counterterrorism Calendar

Civilian Involvement

Finally, the NCTC carries on the civilian involvement tradition by including instructions for citizens of the U.S. and other countries on how they can help fight terrorism. Pages on “Indicators of False Travel Documents” and how U.S. residents can report suspicions are provided. Additionally, the  Rewards for Justice (RFJ) Program is described in detail, wherein the U.S. Secretary of State may offer rewards for information that prevents or favorably resolves acts of international terrorism against US persons or property worldwide.

On the last page is a Bomb Threat Call Procedures form with valuable details of questions to ask and information to note about the caller, such as his or her voice (accent, age, tone, language) and background sounds. Did you note if the caller was clearing his throat or had an accent? Were there sounds of machinery in the background? What kind? Any and all details could help law enforcement.

Image: Table from the Bomb Threat Call Procedures form. Source: Page 160 of the 2014 Counterterrorism Calendar.

Image: Table from the Bomb Threat Call Procedures form. Source: Page 160 of the 2015 Counterterrorism Calendar.

Forewarned is Forearmed

Like the tradition of the best Government civilian campaigns since the founding of the Nation, the National Counterterrorism Center’s annual Counterterrorism Calendar is simultaneously meant to alert and inform us, making both civilians and professionals alike aware of the very real dangers around us and educating us on what—and whom—to look for.

How can I get a copy of the National Counterterrorism Center’s 2015 Counterterrorism Calendar?

  • Shop Online: You can purchase this calendar from the U.S. Government Online Bookstore at http://bookstore.gpo.gov by:
  • Order by Phone: Call our Customer Contact Center Monday through Friday, 8 am to 5:30 pm Eastern (except US Federal holidays). From US and Canada, call toll-free 1.866.512.1800. DC or International customers call +1.202.512.1800.
  • Shop our Retail Store: Buy a copy of any print editions from this collection at GPO’s retail bookstore at 710 North Capitol Street NW, Washington, DC 20401, open Monday–Friday, 9 a.m. to 4 p.m., except Federal holidays, Call (202) 512-0132 for information or to arrange in-store pick-up.
  • Visit a Federal Depository Library: Search for it in a nearby Federal depository library.

About the Author: Adapted by Trudy Hawkins, Senior Marketing and Promotions Specialist in GPO’s Publication & Information Sales Division in Washington, DC, from an original post by Michele Bartram, former Government Book Talk Editor in support of the U.S. Government Online Bookstore (http://bookstore.gpo.gov).


Federal Favorites: Our Best Selling Books of 2013

January 16, 2014

Ahhh…. It’s that time of the year again: Awards season! From the Golden Globes to the Academy Awards, red carpets abound with interviews of movie stars and other celebrities boasting about their best work during the past year.

We at the US Government Bookstore want to make sure our star publications and Federal agency publishers get their moment in the limelight, too. So, we are pleased to announce the winning publications that you, our readers, chose through your purchases over the past year: The US Government Bookstore Best Sellers of 2013!

Top-Government Books and Best-Sellers-of-2013 from the GPO US Government Online BookstoreHere are some of the more notable books, eBooks, posters and more that were winners in your eyes over the past year:

ART & TRAVEL

National Park System (Wall Map Poster)Americans love our national parks, so it’s no surprise the National Park System Wall Map Poster was a big hit.

Humanities-Magazine-2014-01Humanities is a bimonthly magazine published by the National Endowment for the Humanities (NEH) which covers NEH sponsored research in the humanities and NEH programs and projects, as well as information on recent and upcoming NEH grants.

HISTORY

With the 150th anniversary and reenactment of the Battle of Gettysburg last summer, The Gettysburg Campaign, June-July 1863 was a smash success (Read our post “Gettysburg, America’s Bloodiest Battle” for more information).

Perennial favorite Underground Railroad: Official Map and Guide (Read our post “The Underground Railroad Leaves its Tracks in History”) was joined by two publications commemorating 50th anniversaries:

Book Cover Image for Statistical Abstract of the United States 2012 (Paperback)Finally, the Statistical Abstract of the United States, the last official edition published in 2012 by the U.S. Census Bureau, contains a standardized summary of all official key statistics on the social, political, and economic organization of the United States (Read our post: “Statistical Abstract and Print Mashups in a Digital Age”).

TREES & FORESTS

Book Cover Image for The Little AcornI won’t be going out on a limb to say that our customers definitely wanted to hug trees this year, as books about Trees & Forests topped the lists. Why Would Anyone Cut a Tree Down? and The Little Acorn are extremely popular books for children explaining about the uses and life cycle of trees.

Image for Timber Management Field BookHow to Prune Trees and How To Recognize Hazardous Defects in Trees for amateur and professional gardeners, landscapers and foresters alike, and the Timber Management Field Book serves as the most popular reference handbook for forestry professionals.

(Read our posts “Oh, say, can you tree? American Christmas tree traditions,” “Pruning Trees” and “Dr. Seuss’ The Lorax Inspires Kids to Hug a Tree” for more information on these titles.)

BUSINESS AND LAW

A Basic Guide to Exporting for Small & Medium-Sized Businesses (10th Revised)International business entrepreneurs and would-be exporters have made A Basic Guide to Exporting: The Official Government Resource for Small and Medium-Sized Businesses a best-seller every year (Read our posts: “Exporting Made Simple and “Government eBooks Made Easy– and Sometimes Free” for more information).

Copyright Law of the United States in U.S. Code as of 12/2011Protecting intellectual property and privacy were extremely hot topics in 2013, making the Copyright Law of the United States and Related Laws and the Overview of the Privacy Act of 1974, 2012 Edition (extremely popular last year (Read our post: “The Privacy Act: What the Government Can Collect and Disclose about Youfor more information).

TRANSPORTATION AND NAVIGATION

TAstronomical Almanac for the Year 2014 and Its Companion the Astronomical Almanahe latest versions of the annual best-selling Astronomical Almanac for the Year 2014 (Combined Print plus Online Edition) and The Nautical Almanac for the Year 2014 are critical tools to aid commercial and private navigation by both air or water (Read our post: “Navigating by the Moon, Planets, and Starsfor more information).

Specifically for maritime navigation, Navigation Rules, International-Inland contains the latest international regulations for preventing Book Cover Image for FAA Safety Briefingcollisions at sea as well as the U.S. Inland Navigation Rules which have been in effect for all inland waters, including the Great Lakes.

The FAA Safety Briefing magazine provides updates on major Federal Aviation Administration rule changes and proposed changes, as well as refresher information on flight rules, maintenance air worthiness, avionics, accident analysis, and other aviation topics.

CITIZENSHIP AND CIVICS

Preparing to become a United States citizen and reaffirming knowledge of the American system of Government is extremely popular with our customers, and this year was no exception. Top civics and citizenship publications for 2013 included the Constitution of the United States and the Declaration of Independence (Pocket Edition) and materials for preparing for the U.S. Naturalization Test to become a United States citizen—

(Read our posts: “Quiz and History for Bill of Rights Day December 15”, “Quiz: Are you smarter than an 8th grade Civics student?”, and “Notable Documents 2009: Civics Flash Cardsfor more information on these products.)

Another patriotic publication that proved popular (Do you like the alliteration?:-) was Our Flag, which briefly describes the history of the American flag and sets forth the practices and observances appropriate to the display of Old Glory, was a top-seller.Book Cover Image for How Our Laws Are Made

The Congressional book, How Our Laws Are Made, provides citizens with a basic outline of the numerous steps of our Federal law-making process from the source of an idea for a legislative proposal through to its publication as a statute and becoming the “law of the land”.

HEALTH

Watching our weight and eating better were definitely on the minds of Americans this year as Diet & Nutrition books and posters were best sellers, including:

Book Cover Image for Special Operations Forces Medical HandbookHealthcare professionals turned often to the U.S. Government Bookstore for Physician References & Medical Handbooks, Medical & Health Research, and Military & Emergency Medicine publications in 2013. Top on the list were copies of the new Healthcare Law, as well as the Special Operations Forces Medical Handbook.

But also important were publications used to improve the quality of healthcare research and patient care and safety. These included the ORI: Introduction to the Responsible Conduct of Research  (also available in Packages of 50) which provides guidelines for Public Health Service-funded researchers, as well as the TeamSTEPPS patient care and safety training materials for healthcare personnel, such as the TeamSTEPPS Instructor Guide (Binder Kit) and TeamSTEPPS Pocket Guide that should be handed out to all healthcare personnel who attend TeamSTEPPS training.

SECURITY AND EMERGENCY MANAGEMENT

Emergency management personnel and first responders responded strongly to the many great safety and emergency response publications on the U.S. Government Bookstore.  These books and pocket guides topped their “must have” list in 2013:

Specifically for dealing with Hazardous Materials (HAZMAT) and Chemical-Biological-Radiological-Nuclear-Explosive (CBRNE) incidents, clean-up and response were these best-selling guides:

The importance of radio communications was underscored by the popularity of the United States Frequency Allocations: The Radio Spectrum Chart (Poster) of all assigned frequencies and the National Interoperability Field Operations Guide which contains radio guidelines for establishing or repairing emergency communications in a disaster area.

GOVERNMENT

Every year, the publications containing the President’s proposed Federal Budget for the upcoming fiscal year are on our best sellers list, and the Fiscal Year 2014 Budget publications followed this tradition. (Note: Stay tuned! The new Fiscal Year 2015 Budget publications will be coming out soon from the White House).

United States Government Manual 2013 lists all federal agenciesThe U.S. Government Manual, the ultimate handbook of all Federal agencies, was a hit as it is every year. Now you can get the new edition: United States Government Manual 2013 (Read about it on our Blog post:  “Understand How the U.S. Government is Organized”).

Other “Best of the Best” Government titles include:

How can I get these “Best-selling Books of 2013”?

  • Shop Online: You can purchase these publications from the U.S. Government Online Bookstore at http://bookstore.gpo.gov by clicking on the individual links above in this blog post. You may also click here to shop our entire “Best Sellers of 2013” collection.
  • Order by Phone: Call our Customer Contact Center Monday through Friday, 8 am to 5:30 pm Eastern (except US Federal holidays). From US and Canada, call toll-free 1.866.512.1800. DC or International customers call +1.202.512.1800.
  • Shop our Retail Store: Buy a copy of any print editions from this collection at GPO’s retail bookstore at 710 North Capitol Street NW, Washington, DC 20401, open Monday–Friday, 9 a.m. to 4 p.m., except Federal holidays, Call (202) 512-0132 for information or to arrange in-store pick-up.
  • Visit a Federal Depository Library: Search for one of these publications in a nearby Federal depository library.

About the Author: Government Book Talk Editor Michele Bartram is also Promotions and Ecommerce Manager for GPO’s Publication and Information Sales Division in Washington, DC, and is responsible for online and offline marketing of the US Government Online Bookstore (http://bookstore.gpo.gov) and promoting Federal government content to the public. Assistance provided by Stephanie Jaeger, Sales & Marketing Coordinator for GPO’s Sales & Marketing Division that markets GPO’s publishing services to the Federal sector.


Take Notice: The 2014 Counterterrorism Calendar

January 9, 2014

2014-NCTC-Counterterrorism-Calendar-spiral-boundIf you didn’t catch the Washington Post “In the Loop” article by Al Kamen this week entitled “Counter terror calendar 2014 is out!,” you’ll be pleased to know that yes, the 2014 edition of the National Counterterrorism Center’s annual Counterterrorism Desk Calendar is now available for ordering on the U.S. Government Bookstore.

Image: Cover of the 164-page 2014 Counterterrorism Calendar from the National Counterterrorism Center depicts the 2013 bombings at the Boston Marathon. Photo Credit: David L. Ryan / Boston Globe.

The goal behind the Counterterrorism Calendar is to educate and inform both professionals– first responders, military, intelligence, law enforcement and other counterterrorism personnel– as well as civilians about the threats of international terrorism and how to prevent, respond or mitigate these threats against the United States both at home and abroad.

History of U.S. Government Inviting Citizen Involvement in Domestic Security

Since its founding, America has had a history of inviting its citizens to participate in its own defense. Even with the danger of British sympathizers turning them in, brave revolutionaries posted recruiting posters on behalf of the Continental Congress such as the one below that invited Americans to “Take Notice” and help General Washington and the Continental Army defend against “the hostile designs of foreign enemies.”

revolutionary-war-take-notice-recruiting-posterImage: This Revolutionary War recruiting poster urged brave and able-bodied young men to “take notice” and join forces with General Washington and the Continental Army in the fight against “foreign enemies,” in this case, the British. Photo Credit: Bettmann/CORBIS

In World War 2, the Federal Government issued numerous similar domestic campaigns reminding citizens that it was their civic duty to “defend America” and inviting citizens to help support the war industry and to be vigilant against spies, saboteurs and other actions by the enemy both at home and abroad.

Defend-American-Freedom It's Everybody's-Job- World War II 2 propaganda poster for civilian workersImage: U.S. Government World War II propaganda poster urging civilians to participate in the war effort. Source: University of North Texas Digital Library

Today, the war is a War on Terror, and the U.S. Government still needs involvement and vigilance of its citizens and allies, whether in the United States or abroad, to identify and protect against terrorists.

The 2014 Counterterrorism Calendar

Under the Office of the Director of National Intelligence, the National Counterterrorism Center or NCTC serves as the primary organization in the U.S. government for integrating and analyzing all intelligence possessed or acquired by the U.S. government about international terrorism, including data from U.S. Federal agencies like the CIA, NSA, Defense Intelligence Agency, and the FBI as well as other domestic and international sources.

First published in a spiral-bound daily planner format in 2003, just two years after the World Trade Center attacks, the Counterterrorism or CT Calendar from the NCTC is published annually. According to the NCTC, their 2014 Counterterrorism Calendar:

…provides information on known terrorist groups, individual terrorists, and technical information on topics such as biological and chemical threats.This edition, like others since the Calendar was first published in daily planner format in 2003, contains many features across the full range of issues pertaining to international terrorism: terrorist groups, wanted terrorists, and technical pages on various threat-related topics.

Features of the Calendar

In addition to serving as a desk calendar / event planner, the 164-page 2014 Counterterrorism Calendar also serves as a tutorial on international terrorism and a gallery of “most wanted” terrorists.

The right-hand page of the planner has the event planner dates along with key historical events of significance to terrorists that might be used to plan future terrorist activities. For example, on January 8, 1998, terrorist Ramzi Ahmed Yousef was sentenced to life plus 240 years for his role in the 1993 World Trade Center bombings.

On the left-hand pages are photos, maps and/or data on terrorists and terrorist organizations around the world, from Africa and the Middle East to Europe and the Americas.

Map-Somalia-based-al-Shabaab-terror-attacksImage: Map denoting locations of major terrorist incidents likely committed by the Harakat Shabaab al-Mujahidin—commonly known as al-Shabaab, a “clan-based insurgent and terrorist group” operating in and around Somalia. Source: NCTC 2014 Counterterrorism Calendar

“Terrorism tutorial” information ranges from cultural—details about the Islamic Calendar; the spelling of Arabic names and terms; lists of Foreign Terrorist Organizations (FTOs), and logos used— to technical –  information about Chemical-Biological-Radiological-Nuclear-Explosive (CBRNE) weapons commonly used by terrorists, from suicide bombs to sarin gas, and how to detect and mitigate them.  For example, who among us would recognize the terrorist threat from these innocent-looking beans?

Castor-beans-used-to-make-ricinImage: Photo of castor beans from which the deadly toxin ricin is extracted. Ricin is poisonous if inhaled, injected, or ingested. Source: NCTC 2014 Counterterrorism Calendar

“Wanted” Terrorists

Providing the real drama of the calendar are the full-page “Wanted” poster-style pages of an individual terrorist, complete with photo (if available), aliases, his terrorist activities, the reward offered, and how to report information about him.

One of the largest rewards, $25 Million, is offered for information leading to the capture of Ayman al-Zawahiri, also known as “The Teacher” or “The Doctor” who is a physician and the founder of the Egyptian Islamic Jihad. According to the CT Calendar:

“This organization opposes the secular Egyptian Government and seeks its overthrow through violent means. Al-Zawahiri is believed to have served as an advisor and doctor to Usama Bin Ladin. He has been indicted for his alleged role in the August 7, 1998, bombings of the US embassies in Dar es Salaam, Tanzania, and Nairobi, Kenya. The embassy bombings killed 224 civilians and wounded over 5,000 others.”

Wanted-page-of-terrorist-Ayman-al-Zawahiri-of-Egyptian-Islamic-JihadImage: Extract from the “wanted” page of Ayman al-Zawahiri, Al-Qaida leader and founder of Egyptian Islamic Jihad. Source: NCTC 2014 Counterterrorism Calendar

Civilian Involvement

Finally, the NCTC carries on the civilian involvement tradition by including instructions for citizens of the U.S. and other countries on how they can help fight terrorism. Pages on” Indicators of False Travel Documents”, “Radicalization”, and how U.S. residents can report suspicions are provided. Additionally, the  Rewards for Justice (RFJ) Program is described in detail, wherein the U.S. Secretary of State may offer rewards for information that prevents or favorably resolves acts of international terrorism against US persons or property worldwide.

On the last page is a Bomb Threat Call Procedures form with valuable details of questions to ask and information to note about the caller, such as his or her voice (accent, age, tone, language) and background sounds. Did you note if the caller was clearing his throat or had an accent? Were there sounds of machinery in the background? What kind? Any and all details could help law enforcement.

Aspects-to-note-about-Bomb-Threat-CallerImage: Table from the Bomb Threat Call Procedures form. Source: Page 160 of the 2014 Counterterrorism Calendar.

Forewarned is Forearmed

Like the tradition of the best Government civilian campaigns since the founding of the Nation, the National Counterterrorism Center’s annual Counterterrorism Calendar is simultaneously meant to alert and inform us, making both civilians and professionals alike aware of the very real dangers around us and educating us on what—and whom—to look for. With the cover photo depicting the 2013 bombings at the Boston Marathon– where ordinary citizens were instrumental in identifying and locating the terrorists responsible– the importance of having an informed and involved citizenry has never been clearer.

How can I get a copy of the National Counterterrorism Center’s 2014 Counterterrorism Calendar?

About the Author: Government Book Talk Editor Michele Bartram is Promotions Manager for GPO’s Publication and Information Sales Division in Washington, DC, and is responsible for online and offline marketing of the US Government Online Bookstore (http://bookstore.gpo.gov) and promoting Federal government content to the public.


The Privacy Act: What the Government Can Collect and Disclose about You

June 28, 2013

Privacy is the watchword in the news these days. With the revelations in recent weeks about far-reaching domestic surveillance programs by the National Security Agency (NSA) and other Federal agencies that were expanded under the Patriot Act, Americans are scrambling to determine what privacy rights they have to information collected by the Federal Government.

Overview-of-the-Privacy-Act-of-1974-2012-Edition-9780160914461Thus, the timing is ideal to review a biennial publication, Overview of the Privacy Act of 1974 (2012 Edition), available in print from the U.S. Government Online Bookstore.

The Overview of the Privacy Act of 1974 provides a valuable function to consumers, the media, Government and members of the legal profession by not only providing the current text of the Privacy Act and all its subsequent amendments, but also by consolidating the current regulations and updates, interpreting the Act’s provisions and giving detailed legal analysis of the latest court decisions that have decided challenges to how the Privacy Act has been enacted by various White House Administrations and Federal Agencies since the Act was passed.

What is covered by the Privacy Act?

The Privacy Act of 1974 established a “Code of Fair Information Practice that governs the collection, maintenance, use, and dissemination of personally identifiable information about individuals that is maintained in systems of records by federal agencies.”

The Privacy Act protects certain federal government records pertaining to individuals. In particular, the Act covers “systems of records” that an agency maintains and retrieves by an individual’s name or other personal identifier, such as your social security number.  (For clarification, a “system of records” refers to a group of records or a file under the control of a particular Federal agency from which information is retrieved by the name of the individual or by some identifier assigned to the individual.)

With the advent of wide-spread use of computers and databases by the Federal Government, the Privacy Act was amended through the Computer Matching and Privacy Protection Act of 1988, which added certain protections for the subjects of Privacy Act records whose records are used in automated matching programs, such as the establishment of Data Integrity Boards at each agency.

Privacy Act Requirements

But what rights do individuals have under the Privacy Act? According to the Overview of the Privacy Act of 1974 (2012 Edition), it gives individuals the right to review records about themselves, to find out if these records have been disclosed, and to request corrections or amendments of these records, unless the records are legally exempt.

From reading the publication, it seems the Act also requires that a Federal Government agency must:

  • give the public notice of their systems of records by publishing them in the Federal Register (also available as a subscription from GPO);
  • follow strict record-keeping requirements;
  • request the written consent of the subject individual for disclosure of their personal information– “unless the disclosure is pursuant to one of twelve statutory exceptions;” and
  • provide individuals with a means  by which they can access and amend (review and correct) records stored about them.

Your-Right-to-Federal-Records-2011-coverYour Right to Federal Records

For information about your rights to “discover, access and amend” Government records about you and frequently asked questions and answers about the Privacy Act and the Freedom of Information Act (FOIA), you might want to check out the free publication, “Your Right to Federal Records available from the GSA’s Federal Citizen Information Center (FCIC).

You may also be interested in learning more about the Freedom of Information Act by reading the Guide to the Freedom of Information Act, also published by the Justice Department and available in print from GPO.

Scope Issues

The Privacy Act does NOT apply to data collected about persons outside the United States, nor does it protect the privacy of your records that are maintained by the private sector, such as your credit report, bank account and medical records or even local or state government records like your driver’s license. Since many Americans today assumed that the battle to keep this non-Federal data private was already lost, it was comforting to discover that there is still a measure of privacy in data kept about you by the Federal Government.

And finally, while The Privacy Act does apply to the records of every “individual,” it nevertheless only applies to records held by an “agency.” Thus, any records ”held by courts, executive components, or non-agency government entities are not subject to the provisions in the Privacy Act and there is no right to these records.”  The Overview covers many questions about scope.

Exemptions and Exceptions

The most fascinating part of reading the publication to me– and timely considering the current news cycle– was to learn that there are situations where the Government is not legally required to follow the Privacy Act . According to the Overview, there are currently Twelve Exceptions to the “No Disclosure Without Consent” Rule of the Act and Ten Exemptions to the Privacy Act altogether where Federal agencies are not required to disclose records. 

Two of the ten exemptions outlined by the Overview are the “General Exemptions,” which apply to records about individuals maintained by

1)      the Central Intelligence Agency (CIA) and

2)      law enforcement agencies— or a component thereof— that primarily perform criminal law enforcement duties, “including police efforts to prevent, control, or reduce crime or to apprehend criminals.”

New proposed exemptions are offered all the time by subsequent Congresses and Administrations, such as the George W. Bush Administration’s agreement signed with the European Union in 2007 to share an airline’s Passenger Name Record as well as the utilize the Automated Targeting System.

Protecting-your-privacy

The questions about what constitute personally identifying data; what legal exemptions and exceptions apply; and how the Privacy Act has been interpreted over time by Federal Agencies, the Office of Management and Budget (OMB) and the Federal courts make up a good part of the Overview.

With post-9/11 security concerns driving Agencies’ desire for more information coupled with rapidly evolving technologies that enable greater collection and analysis of data, the publishers of the Overview of the Privacy Act of 1974 will certainly be kept very busy in upcoming years reporting on and analyzing new privacy regulations and court decisions that will follow.

How Can I Obtain These Privacy Publications?

Anyone concerned with the laws governing what the Federal Government is collecting and disclosing about individuals in the United States—and how much individuals can learn about it—should read this important publication.

  • Overview of the Privacy Act of 1974 (2012 Edition) in Print
    • Shop Online: Buy a print edition on the GPO U.S. Government Online Bookstore NOW ON SALE!!
    • Order by Phone: Call our Customer Contact Center Monday through Friday, 8 am to 5:30 pm Eastern (except US Federal holidays). From US and Canada, call toll-free 1.866.512.1800. DC or International customers call +1.202.512.1800.
    • Visit our Retail Store: Buy it at GPO’s retail bookstore at 710 North Capitol Street NW, Washington, DC 20401, open Monday–Friday, 9 a.m. to 4 p.m., except Federal holidays, (202) 512-0132.
    • Find it in a Library: Search for it in a Federal Depository Library.

About the Author: Government Book Talk Editor Michele Bartram is Promotions Manager for GPO’s Publication and Information Sales Division in Washington, DC, and is responsible for online and offline marketing of the US Government Online Bookstore (http://bookstore.gpo.gov) and promoting Federal government content to the public.


National Police Week: Exploring Law Enforcement Lives and Leadership

May 13, 2013

Being a police officer is a dangerous job. The officer’s family members worry every day that she or he will be safe while on duty. A police officer’s retirement party is a happier occasion than any other professional retirement: not only has the officer concluded a successful career, but the officer has also survived—it is a lucky day, since police officers do put their lives on the line every day.

Today as I took the Metro (Washington, DC’s subway), I saw dozens of law enforcement officials, friends and family all heading to the National Law Enforcement Officers Memorial for the 25th annual candlelight vigil tonight for the many fallen Federal, state and local law enforcement personnel, just as we were putting the finishing touches on our own collection of Law Enforcement books for the occasion.

National-Police-Week_Law-Enforcement-Books-at-GPO-BookstoreThus, we are reminded that it is National Police Week, an annual commemoration held every May to honor the work of law enforcement officers and to honor the sacrifices of officers who have fallen in the line of duty in the previous year and add their names to the memorial. GPO would like to honor the day as well, by discussing two recent titles that deal with the dangerous careers of law enforcement officials.

Two recent Federal publications that highlight the dangerous lives and leadership challenges of law enforcement officers include Police Leadership Challenges in a Changing World and 2011 The FBI Story.

Police Leadership Challenges in a Changing World

Police-Leadership-Challenges_Report-coverPolice Leadership Challenges in a Changing World is a report in PDF format that discusses the difficult issues relating to integrating a new generation of recruits into the force of established officers. Traditionally, police organizations foster a “paramilitary culture and industrial-type bureaucracy”. Younger officers come from a generation used to a more dynamic environment, in part due to their experiences of growing up in the Web generation. Police management staff will need to learn to adjust to these different experiences of the younger recruits and learn how to exploit their skill set as strengths for the organization. At the same time, management needs to work with older staff to grow them into the idea of utilizing the different dynamics of the younger recruits. Communication and a tight-knit team are key requirements for successful police work. Police leaders will have considerable issues that they can turn into significant resources with some thoughtful adaptation of older and younger officers’ working styles.

Police leaders—especially if they come from the “paramilitary culture” are going to have to struggle against their own habits if they want to make the organizational culture more open to change and accountability. According to the report, the paramilitary culture does not allow for change and accountability much—it’s designed to provide routine—and today’s citizens are going to have different expectations of the force that is supposed to protect them.

The FBI Story

2011-The-FBI-Story-ISBN 9780160902574

In the report 2011 The FBI Story, the writers cover the stories of major events that happened during the report year. Each page covers a different story.

Some of the stories are historical pieces, such as page 13, subtitled “A Byte Out of History: Early African-American Agents”, which gives brief but fascinating vignettes of early agents, including the probable first African-American agent of the FBI, James Wormley Jones, and a father and son team working in Los Angeles from the 1940s through the 1970s, Special Agents Jesse and Robert Strider.

Other interesting stories include the capture of James “Whitey” Bulger, the takedown of a casino cheating ring, the indictment of a human trafficking ring which involved 600 Thai victims, the Bureau’s ongoing search for the I-35 bank robber bandit in Texas, reviews of cutting edge forensic techniques and investigative technologies, and a quick look at some of the major cases of the report year. It’s a fascinating review of one of the more exciting government agencies, and the report is easily accessible for any adult audience to read.

If you’re curious to know what your police force is doing in their day-to-day service, reading one of these reports will give you a good idea of the challenges of being a police officer. The reports are also of high interest for criminal justice students, scholars, and law enforcement professionals from the uniformed service all the way to supervisory criminal investigators and chiefs.

And if you’re in Washington, DC, tonight, drop by the National Law Enforcement Officers Memorial, stop by the Candlelight Vigil and leave a rose in honor of those who sacrificed all to keep the rest of us safe. If not, click below to watch the live webcast online, United By Light, and to dedicate a candle to a special law enforcement officer:

2013-National-Police-Week-DC-United-by-Light-Candlelight-Vigil-Simulcast

How can I obtain a copy of these publications: Police Leadership Challenges in a Changing World and 2011 The FBI Story?

Or explore our entire collection of Law Enforcement print and electronic publications on the U.S. Government Online Bookstore.

Adapted by Government Book Talk Editor and U.S. Government Online Bookstore Manager Michele Bartram from a post written for the FDLP Community Blog by guest blogger Jennifer Davis from GPO’s Library Services & Content Management Division that supports the Federal Depository Libraries Program (FDLP).


Ponzimonium: How Scam Artists Are Ripping Off America

November 18, 2011

Every single day, someone somewhere makes a gigantic mistake by giving his or her money to a fraudster,” says Bart Chilton, one of the commissioners of the Commodity Futures Trading Commission (CFTC). Chilton is the author of Ponzimonium: How Scam Artists are Ripping Off America, a shocking new book available from GPO about some of the worst perpetrators of investment fraud in recent U.S. history.

Figure 1: Ponzimonium: How Scam Artists Are Ripping Off America available from GPO.

Ponzimonium looks to the CFTC’s own recent public case files stemming from fraud investigations that began with the recent economic downturn- talk about hitting people when they’re down! Because of the this, the book is generating a lot of positive buzz in The New York Times, TheStreet, and other media outlets.

The CFTC is an independent Federal agency with the mandate to regulate commodity futures and options markets in the United States. After the financial crisis of 2008, their authority was expanded under the 2010 Dodd-Frank Wall Street Reform and Consumer Protection Act to include over-the-counter derivatives markets and hopefully prevent and uncover more of these frauds.

What is a Ponzi scheme, you ask?

The world really learned about Ponzi schemes in December of 2008 when, as Chilton writes in his introduction, “legendary investment guru Bernard Madoff ‘made off’ with an estimated US$50 billion in what was called the ‘Mother of all Ponzi Schemes’.” (By the way, an interesting related read is the report about the Investigation of Failure of the Securities and Exchange Commission To Uncover Bernard Madoff’s Ponzi Scheme, also available from GPO.)

Unlike pure pyramid schemes in which it is mandatory that a new investor recruit others into the deal in order to receive payments, Ponzi schemes purport to offer investors a “too good to be true” deal by simply handing over their money. However, no real investment is made by the criminal.

Instead, Ponzi schemes, named after 1920’s postage stamp speculator-fraudster Charles Ponzi, are scams in which early “investors’—often friends, colleagues, and family members—are asked to invest in a this great “no risk” deal offering unbelievable returns.

Typically, the investor makes an initial investment and then some purported “phantom profits” are paid out by the con artist (really just money from other investors), prompting that investor to assume that his or her money has increased in value—and inspiring the investor to turn over more money to invest and tell others about it. In actuality, the perpetrators pocket the money for themselves.

This splendid infographic from the New York Times explains the concept visually:

Figure 2. Ponzi scheme infographic. Image source: The New York Times 12/21/2008 Week in Review.

Made in Madoff’s Image

Ponzimonium introduces some of the lesser known, but equally  despicable fraudsters that have been uncovered since 2008 by the CFTC and SEC (Securities and Exchange Commission).

The book lays out the fascinating and dramatic details behind the fraudulent schemes, their smooth-talking masterminds, and their many honest, hard-working victims, who often lose the money they’ve saved for their kids’ college funds, needed health care expenses, or their own retirement as a result of misplaced trust in these criminals.

These stories are so engrossing— at times it felt like I was taking in a marathon of America’s Most Wanted or I Almost Got Away with It episodes— I found it hard to decide which of these criminals is the most despicable. Was it Beau Diamond of Diamond Ventures who wiped out his parents’ savings along with 200 other clients who invested US$37 million? Or how about Marvin R. Cooper of Billion Coupons, who created a combination Ponzi and pyramid scheme called an affinity fraud, to target and recruit fellow deaf community members in the U.S. and Japan? And there’s James Ossie of CRE Capital Corporation (CRE) who bilked investors out of US$25 million, including a desperate father’s US$200,000 he invested to fund his young daughter’s cancer treatments.

Figure 3. Fraudster Marvin R. Cooper and deaf client. Image source: BusinessInsider.com

The human side behind these frauds makes them all the more compelling… and contemptible.

The best way to avoid getting swindled, advises Chilton, is to “remember what your parents told you when you were little: ‘Don’t take candy from strangers’”, and my personal favorite, “Just because it is on the TV, Internet, etc. doesn’t mean it’s real!” That’s advice you can take to the bank.

Some “don’t miss” features of this book

Ponzimonium: How Scam Artists are Ripping Off America includes some very useful features for its readers that make this a valuable resource for any investor.

  • Red Flags of Fraud: Includes 20 red flags to look out for when considering an investment.
  • Investor Checklist: Detailed list of questions to ask before investing.
  • Investors’ Bill of Rights: Common sense advice and legal rights for any investor.
  • Resources: Useful contact information for victims or witnesses of a fraud.
  • Glossary of Fraud Terms: Definitions of legal and financial terms within each story.
  • The Loot: Color photos of the criminals’ misbegotten gains and lavish lifestyle.
  • The Numbers: Calculations of the staggering amounts collected, paid, lost, or stolen, and prison sentences and restitution.

How can you get this Ponzimonium eBook?

About the Author:  Michele Bartram is Promotions Manager for GPO’s Publication and Information Sales Division and is responsible for online and offline marketing of the US Government Online Bookstore (Bookstore.gpo.gov) and promoting Federal government content to the public. She has been researching identity theft and privacy issues for years, both on the web and in the real world, and is a big fan of more fraud protection for citizens.


%d bloggers like this: