This certificate acknowledges that JAMES M ATKINSON completed an independent study course on decision making and problem solving through the Emergency Management Institute. The course was issued on July 3rd, 2008 and was worth 0.8 continuing education units. The certificate was signed by Cortez Lawrence, the Superintendent of the Emergency Management Institute.
This certificate from Harvard Medical School awards 2 credits toward continuing medical education to an individual for participating in an online educational activity on venous thrombosis. The activity took place from July 26, 2008 to December 1, 2007 and was designated for 1 credit. It was taught by James Atkinson and certified by Sanjiv Chopra, the Faculty Dean for Continuing Education and Professor of Medicine at Harvard Medical School in Boston, Massachusetts.
This certificate from Harvard Medical School awards 2 credits in Category 1 toward continuing medical education to Name for participating in an online educational activity titled "CME Online: Management of Atrial Fibrillation" held on July 19, 2008. The activity was designated for 2 credits and certified by Sanjiv Chopra, Faculty Dean for Continuing Education and Professor of Medicine at Harvard Medical School in Boston, Massachusetts.
Yale Medical School - Dots and Deitzels on the LungsJames Atkinson
James Atkinson completed an online continuing medical education activity called "Spots, Ditzels, Dots and Lung Cancer" on August 9, 2008 and was awarded 1 AMA PRA Category 1 Credit. The Yale University School of Medicine, which is accredited by the Accreditation Council for Continuing Medical Education, certified that Dr. Atkinson participated in and successfully completed the educational activity.
This document discusses techniques for sweeping vehicles to detect hidden tracking devices, audio/video surveillance equipment, and other security risks. It provides an overview of common exploits like GPS trackers and OnStar modules. Detection methods are covered like analyzing RF signals and current draw. Essential tools are recommended like shop manuals, flashlights, and spectrum analyzers. Specific cases are described like hidden police dash cams and parental video monitors. Details are given on technical aspects of various tracking systems and audio bugs.
History of the HEXAGON series of spy satellites whereby the satellite exposed massive rolls of the file, and ejected cartridges by parachute, with the parachute being plucked out of the sky and pull in the back of a special plane. Dr. Land and Dr. Edgerton where the driving force behind this project.
The document provides an overview of the US government agencies responsible for defense trade controls and the Directorate of Defense Trade Controls (DDTC) within the State Department. It discusses DDTC's mission to advance national security through licensing and enforcement of defense trade export laws. It also outlines the various license types issued by DDTC including DSP-5, DSP-73, and DSP-61 licenses as well as amendments and scenarios for when each license type would be used.
This certificate acknowledges that JAMES M ATKINSON completed an independent study course on decision making and problem solving through the Emergency Management Institute. The course was issued on July 3rd, 2008 and was worth 0.8 continuing education units. The certificate was signed by Cortez Lawrence, the Superintendent of the Emergency Management Institute.
This certificate from Harvard Medical School awards 2 credits toward continuing medical education to an individual for participating in an online educational activity on venous thrombosis. The activity took place from July 26, 2008 to December 1, 2007 and was designated for 1 credit. It was taught by James Atkinson and certified by Sanjiv Chopra, the Faculty Dean for Continuing Education and Professor of Medicine at Harvard Medical School in Boston, Massachusetts.
This certificate from Harvard Medical School awards 2 credits in Category 1 toward continuing medical education to Name for participating in an online educational activity titled "CME Online: Management of Atrial Fibrillation" held on July 19, 2008. The activity was designated for 2 credits and certified by Sanjiv Chopra, Faculty Dean for Continuing Education and Professor of Medicine at Harvard Medical School in Boston, Massachusetts.
Yale Medical School - Dots and Deitzels on the LungsJames Atkinson
James Atkinson completed an online continuing medical education activity called "Spots, Ditzels, Dots and Lung Cancer" on August 9, 2008 and was awarded 1 AMA PRA Category 1 Credit. The Yale University School of Medicine, which is accredited by the Accreditation Council for Continuing Medical Education, certified that Dr. Atkinson participated in and successfully completed the educational activity.
This document discusses techniques for sweeping vehicles to detect hidden tracking devices, audio/video surveillance equipment, and other security risks. It provides an overview of common exploits like GPS trackers and OnStar modules. Detection methods are covered like analyzing RF signals and current draw. Essential tools are recommended like shop manuals, flashlights, and spectrum analyzers. Specific cases are described like hidden police dash cams and parental video monitors. Details are given on technical aspects of various tracking systems and audio bugs.
History of the HEXAGON series of spy satellites whereby the satellite exposed massive rolls of the file, and ejected cartridges by parachute, with the parachute being plucked out of the sky and pull in the back of a special plane. Dr. Land and Dr. Edgerton where the driving force behind this project.
The document provides an overview of the US government agencies responsible for defense trade controls and the Directorate of Defense Trade Controls (DDTC) within the State Department. It discusses DDTC's mission to advance national security through licensing and enforcement of defense trade export laws. It also outlines the various license types issued by DDTC including DSP-5, DSP-73, and DSP-61 licenses as well as amendments and scenarios for when each license type would be used.
The document provides information about an upcoming Adult CPR & AED Certification course. It introduces the instructor, Jim Atkinson, and reviews logistics like facility locations, breaks, and certification requirements. Key facts about CPR are also summarized, such as how early intervention with CPR can double survival rates for cardiac arrest victims. The course outline reviews topics that will be covered like breathing emergencies, CPR, AED use, and certification testing.
FBI Vulnerability report on the counter CISCO issues, and the ECI level working relationship the U.S. Intelligencies have with CISCO for backdoor access.
James M. Atkinson will present "Telephone Defenses Against the Dark Arts" on May 18th from 12:00-1:00 PM in the BBN Cafeteria. The presentation will explore modern eavesdropping threats posed by telephone equipment, common penetration points exploited by eavesdroppers, and methods to detect penetrations and secure telephone communications. It will also cover securing voice over internet protocol systems and include examples of prior hacks and attacks.
This document discusses steps to take after discovering a bug during a technical surveillance countermeasures sweep. It advises notifying an attorney if there are any legal questions, as the author is not providing legal counsel. It also discusses determining if a discovered bug is legally authorized or not, and the different approaches of notifying authorities or clients depending on that determination. Overall, the key responsibilities are finding and documenting any bug, assisting with notifications, and potentially testifying in court.
This document provides guidance on conducting vehicle sweeps to detect potential threats such as tracking devices, video devices, audio devices, and other risks. It outlines essential resources like original shop manuals and test equipment. A vehicle sweep follows a plan, documents findings, and looks for any threats or risks, which could include GPS receivers, video cameras, microphones, telemetry systems, or security system exploits. Careful inspection of wires and hidden areas is recommended to maintain client privacy.
This document discusses the importance of thorough documentation when conducting technical surveillance countermeasures (TSCM) sweeps. It recommends developing a procedural guide or plan to follow during sweeps to ensure all details are captured and the work can be reproduced. All aspects of the sweep should be documented in laboratory notebooks, including sketches of the site, test results, receipts, and hardcopy printouts from instrumentation. Proper documentation preserves the "discovery path" and is important from a liability perspective.
This document summarizes a presentation by Allen French and James M. Atkinson on Chapter 2 of Stephen Shore's book "The Nature of Photographs". The presentation discusses the physical nature of photographs, how the author defines this, and how Allen and James define it. They provide visual examples to support their argument that the author focuses too much on meaning and feelings rather than the actual physical attributes. The class is left with considering what question should be discussed further.
A man from Rockport, Jim Atkinson, tied over 1,200 yards of yellow ribbon around trees and bushes along a street to show support for American troops engaged in the war in Iraq and wish for their safe return. Atkinson, a veteran, had previously displayed American flags after 9/11. Though he dislikes violence, he believes deposing Saddam Hussein is necessary. As he tied each ribbon, he said a prayer for the safety of servicemen. Some drivers honked in support, while one man threatened to remove the ribbons.
The Committee on Transportation and Infrastructure will hold an oversight hearing on the failures of the US Coast Guard's Deepwater Program to comply with contract requirements. The $24 billion, 25-year Deepwater Program is modernizing Coast Guard cutters, patrol boats, airplanes and helicopters. The hearing will focus on an investigation that found the conversion of 110-foot patrol boats to 123-foot patrol boats left eight legacy cutters unseaworthy, in non-compliance with contract requirements. Numerous witnesses from the Coast Guard and contracting companies will testify.
The document summarizes issues with TEMPEST compliance on US Coast Guard cutters. It states that the original contract did not specify TEMPEST standards beyond Military Handbook 232A. The cutters did not comply with Handbook 232A requirements for equipment, racks, cables, or power supplies. Certificates falsely claimed compliance. Additionally, the Coast Guard lacked a qualified person to inspect and certify the cutters, so they turned to the Navy for measurements, though the Navy could not certify. Waivers were issued for problems by an acting CTTA who was not fully qualified. The cutters remain a risk to national security, and the Coast Guard has been evasive in responding to questions about TEMPEST issues.
This motion requests a court order allowing the defendant, Kaushal Niroula, to use a "babble tape" and speaker during visits with his attorneys and investigators at the Indio Jail. The babble tape is an audio file containing over 576 voices designed to mask conversations from any hidden recording devices. It is played through an external speaker to avoid damaging the computer's internal speakers. The motion argues that privileged conversations have been improperly recorded before, so the babble tape is necessary to protect attorney-client privilege during visits.
The House Committee on Transportation and Infrastructure held a hearing on the Coast Guard's Deepwater program. The committee heard testimony from current and former Coast Guard employees and contractors who raised serious concerns about management failures within the Coast Guard that have led to cost overruns, compromised assets and mission capabilities, and rejected early warnings about issues. The chairman commended witnesses who risked their careers to ensure the truth was revealed and hopes this hearing will help improve Coast Guard culture and management of the Deepwater program.
- James Atkinson, president of Granite Island Group, testified before the House Committee on Transportation and Infrastructure about issues with the Coast Guard's Deepwater program.
- Atkinson discovered that ships delivered to the Coast Guard by ICGS, the Deepwater contractor, did not meet TEMPEST standards for protecting classified information and could not be used for classified missions.
- Atkinson provided background on TEMPEST standards and how electromagnetic signals from electronic devices can unintentionally transmit sensitive information if not properly shielded.
Completion and certification by i-Safe, in regards to computer security, online privacy and security, and edge between the online and off-line world, protection of intellectual property, dealing with anti-social online incident. Primary a certification on TEACHING other people how to handle these sort of problems or concerns.
James M Atkinson is educating students during the school year about appropriate online behavior such as interacting with others on social media and in chat rooms as well as cyber bullying awareness and response. The school/district certifies that this education is part of its Internet safety policy.
The document provides information about an upcoming Adult CPR & AED Certification course. It introduces the instructor, Jim Atkinson, and reviews logistics like facility locations, breaks, and certification requirements. Key facts about CPR are also summarized, such as how early intervention with CPR can double survival rates for cardiac arrest victims. The course outline reviews topics that will be covered like breathing emergencies, CPR, AED use, and certification testing.
FBI Vulnerability report on the counter CISCO issues, and the ECI level working relationship the U.S. Intelligencies have with CISCO for backdoor access.
James M. Atkinson will present "Telephone Defenses Against the Dark Arts" on May 18th from 12:00-1:00 PM in the BBN Cafeteria. The presentation will explore modern eavesdropping threats posed by telephone equipment, common penetration points exploited by eavesdroppers, and methods to detect penetrations and secure telephone communications. It will also cover securing voice over internet protocol systems and include examples of prior hacks and attacks.
This document discusses steps to take after discovering a bug during a technical surveillance countermeasures sweep. It advises notifying an attorney if there are any legal questions, as the author is not providing legal counsel. It also discusses determining if a discovered bug is legally authorized or not, and the different approaches of notifying authorities or clients depending on that determination. Overall, the key responsibilities are finding and documenting any bug, assisting with notifications, and potentially testifying in court.
This document provides guidance on conducting vehicle sweeps to detect potential threats such as tracking devices, video devices, audio devices, and other risks. It outlines essential resources like original shop manuals and test equipment. A vehicle sweep follows a plan, documents findings, and looks for any threats or risks, which could include GPS receivers, video cameras, microphones, telemetry systems, or security system exploits. Careful inspection of wires and hidden areas is recommended to maintain client privacy.
This document discusses the importance of thorough documentation when conducting technical surveillance countermeasures (TSCM) sweeps. It recommends developing a procedural guide or plan to follow during sweeps to ensure all details are captured and the work can be reproduced. All aspects of the sweep should be documented in laboratory notebooks, including sketches of the site, test results, receipts, and hardcopy printouts from instrumentation. Proper documentation preserves the "discovery path" and is important from a liability perspective.
This document summarizes a presentation by Allen French and James M. Atkinson on Chapter 2 of Stephen Shore's book "The Nature of Photographs". The presentation discusses the physical nature of photographs, how the author defines this, and how Allen and James define it. They provide visual examples to support their argument that the author focuses too much on meaning and feelings rather than the actual physical attributes. The class is left with considering what question should be discussed further.
A man from Rockport, Jim Atkinson, tied over 1,200 yards of yellow ribbon around trees and bushes along a street to show support for American troops engaged in the war in Iraq and wish for their safe return. Atkinson, a veteran, had previously displayed American flags after 9/11. Though he dislikes violence, he believes deposing Saddam Hussein is necessary. As he tied each ribbon, he said a prayer for the safety of servicemen. Some drivers honked in support, while one man threatened to remove the ribbons.
The Committee on Transportation and Infrastructure will hold an oversight hearing on the failures of the US Coast Guard's Deepwater Program to comply with contract requirements. The $24 billion, 25-year Deepwater Program is modernizing Coast Guard cutters, patrol boats, airplanes and helicopters. The hearing will focus on an investigation that found the conversion of 110-foot patrol boats to 123-foot patrol boats left eight legacy cutters unseaworthy, in non-compliance with contract requirements. Numerous witnesses from the Coast Guard and contracting companies will testify.
The document summarizes issues with TEMPEST compliance on US Coast Guard cutters. It states that the original contract did not specify TEMPEST standards beyond Military Handbook 232A. The cutters did not comply with Handbook 232A requirements for equipment, racks, cables, or power supplies. Certificates falsely claimed compliance. Additionally, the Coast Guard lacked a qualified person to inspect and certify the cutters, so they turned to the Navy for measurements, though the Navy could not certify. Waivers were issued for problems by an acting CTTA who was not fully qualified. The cutters remain a risk to national security, and the Coast Guard has been evasive in responding to questions about TEMPEST issues.
This motion requests a court order allowing the defendant, Kaushal Niroula, to use a "babble tape" and speaker during visits with his attorneys and investigators at the Indio Jail. The babble tape is an audio file containing over 576 voices designed to mask conversations from any hidden recording devices. It is played through an external speaker to avoid damaging the computer's internal speakers. The motion argues that privileged conversations have been improperly recorded before, so the babble tape is necessary to protect attorney-client privilege during visits.
The House Committee on Transportation and Infrastructure held a hearing on the Coast Guard's Deepwater program. The committee heard testimony from current and former Coast Guard employees and contractors who raised serious concerns about management failures within the Coast Guard that have led to cost overruns, compromised assets and mission capabilities, and rejected early warnings about issues. The chairman commended witnesses who risked their careers to ensure the truth was revealed and hopes this hearing will help improve Coast Guard culture and management of the Deepwater program.
- James Atkinson, president of Granite Island Group, testified before the House Committee on Transportation and Infrastructure about issues with the Coast Guard's Deepwater program.
- Atkinson discovered that ships delivered to the Coast Guard by ICGS, the Deepwater contractor, did not meet TEMPEST standards for protecting classified information and could not be used for classified missions.
- Atkinson provided background on TEMPEST standards and how electromagnetic signals from electronic devices can unintentionally transmit sensitive information if not properly shielded.
Completion and certification by i-Safe, in regards to computer security, online privacy and security, and edge between the online and off-line world, protection of intellectual property, dealing with anti-social online incident. Primary a certification on TEACHING other people how to handle these sort of problems or concerns.
James M Atkinson is educating students during the school year about appropriate online behavior such as interacting with others on social media and in chat rooms as well as cyber bullying awareness and response. The school/district certifies that this education is part of its Internet safety policy.