...The Evolution of Intelligence in the United States John Doe Utica University The Evolution of Intelligence in the United States The beginning of intelligence in the United States dates back to the Revolutionary War and America’s first president, George Washington. President Washington requested that Congress set aside a ‘secret service fund’ for clandestine and secret activities (Revolutionary Ideas, 2007). After leading the Continental Army during the war, he knew how important it was to have secret agencies analyze and protect the new country. The use of secret agents, counterintelligence, and the clandestine paramilitary, have been used extensively to set up elaborate deceptions, gather sensitive information, and coordinate operations to cause sabotage towards other adversaries or countries that wished to cause us harm throughout the history of our country (Revolutionary Ideas, 2007). Although President Washington set a growing foundation of creating and fostering the need and use of foreign intelligence, it was President Franklin D. Roosevelt (FDR) that helped combined the efforts of the state and war departments to coordinate efforts on a combined government-wide level (History of the CIA, 2007). The events of Pearl Harbor on December 7, 1941 prompted FDR to make a change to all government intelligence. FDR asked World War I veteran William J. Donovan to draft a new plan for an intelligence service that would combine all those departments’ efforts and make...
Words: 2722 - Pages: 11
...AGENCY BANKING IN KENYA BY JOEL WANJOHI D63/73163/2012 A RESEARCH PROPOSAL SUBMITTED AS ASSIGNMENT FOR DFI 513: MASTER OF SCIENCE IN FINANCE, UNIVERSITY OF NAIROBI NOVEMBER 2012 DECLARATION I hereby declare that this proposal is entirely my own composition. It has not been presented in any University or college for examination purposes. All references made to works of other persons have been duly acknowledged. Permission from the author or examining body should be sought before any part of this work is reproduced. Signed: __________________ …………………………………. Reg. No. D63/73163/2012 Date: 25/11/2012 ABSTRACT Agency banking is a new banking concept introduced in Kenya by the Central Bank (CBK). The main objective is to increase financial services outreach and to promote financial inclusion to the un-banked and under-banked population without risking the safety and soundness of the banking system. The concept is also geared towards encouraging financial institutions to use agents in the provision of banking services so as to reduce the cost of financial services and to foster financial inclusion, reach and depth. Commercial Banks worldwide offer similar kinds of services, but they could provide differences in terms of service quality. This paper analyzes past studies regarding service quality improvement in the agency banking sector. The continuing trend to a model of service quality improvement, from personnel counter services...
Words: 9078 - Pages: 37
...Table of Contents 1.1 INTRODUCTION 2 1.1.2 History 2 1.2 Geographic scope - Areas of operation 3 1.3 Product/market scope 3 1.4 Source of competitive advantage 9 1.5 Significant changes and reasons for this 10 1.6 Growth patters- past strategies, present stategies 10 1.7 Performance record 18 1.8 Challenges facing KCB Group 22 References 22 1.1 INTRODUCTION 1.1.2 History The KCB Group is a significant institution in Kenya's banking and financial sector with an asset base of over KShs 170 billion. The history of KCB dates back to 1896 when its predecessor, the National Bank of India opened an outlet in Mombasa. Eight years later in 1904, the Bank extended its operations to Nairobi, which had become the Headquarters of the expanding railway line to Uganda. The next major change in the Bank’s history came in 1958. Grind lays Bank merged with the National Bank of India to form the National and Grind lays Bank (KCB, 2008). Upon independence the Government of Kenya acquired 60% shareholding in National & Grind lays Bank in an effort to bring banking closer to the majority of Kenyans. In 1970, the Government acquired 100% of the shares to take full control of the largest commercial bank in Kenya. National and Grind lays Bank was renamed Kenya Commercial Bank (KCB, 2008). In 1972, Savings & Loan (K) Ltd was acquired to specialize in mortgage finance. In 1997, another subsidiary, Kenya Commercial Bank (Tanzania) Limited was incorporated in Dar-salaam...
Words: 5596 - Pages: 23
...TABLE OF CONTENTS TABLE OF CONTENTS 2 Introduction: Kenya Economy (Sub-Saharan Africa) 3 Objective of the study 4 Macro Economic Indicator Table 5 GDP Trend 6 Trade and Industrial Policy 9 Exchange rate policy 17 Monetary policy & Fiscal Policy 21 References: 26 Introduction: Kenya Economy (Sub-Saharan Africa) Kenya is considered by many today to be the heartland of East Africa. It has a total area of approximately 580,000 km2, making it slightly smaller than the state of Texas. The country's southeastern border is defined by the Indian Ocean, and its southwestern border includes a small portion of Lake Victoria. Kenya's climate changes from tropical along the coast to arid in the interior. Although Kenya is located on the equator, temperatures of many of its cities are moderate because they were built at high altitudes. The terrain consists of low plains, central highlands, which are separated by the Great Rift Valley, and a fertile plateau. However, as little as 3% of the total land area of the country is arable (able to support a crop). It is the 47th largest country in the world in terms of land area; Major agricultural products in the country are tea, coffee, wheat, sugar cane, dairy products and eggs. Important industries of the country are cement, tourisms, oil refining, and consumer goods. Kenya's economy relies heavily on agriculture and tourism Currency: Kenya shilling. National accounts base year: 2001. SNA...
Words: 5761 - Pages: 24
...implementation of regulations 1.1.2 Definition of agent, approval by the regulator & types of entities that can be agents 1.1.3 Rules governing exclusivity/non-exclusivity of agents 1.1.4 Permissible activities 1.1.5 Roles and responsibilities & minimum standards 1.1.6 Typical remuneration structure Brazil 1.2.1 1.2.2 1.2.3 1.2.4 1.2.5 1.2.6 Peru 1.3.1 1.3.2 1.3.3 1.3.4 1.3.5 1.3.6 Kenya 1.4.1 1.4.2 1.4.3 1.4.4 1.4.5 1.4.6 India 1.5.1 i iv vi viii x xi 1 3 3 3 4 4 4 5 6 1.2 6 Background & implementation of regulations 6 Definition of agent, approval by the regulator & types of entities that can be agents 7 Rules governing exclusivity/non-exclusivity of agents 7 Permissible activities 8 Roles and responsibilities & minimum standards 8 Typical remuneration structure 9 9 Background & implementation of regulations 9 Definition of agent, approval by the regulator & types of entities that can be agents10 Rules governing exclusivity/non-exclusivity of agents 10 Permissible activities 11 Roles and responsibilities & minimum standards 11 Typical remuneration structure 12 12 Background & implementation of regulations 12 Definition of agent, approval by the regulator & types of entities that can be agents14 Rules governing exclusivity/non-exclusivity of agents 15 Permissible activities 15 Roles and responsibilities & minimum standards 15 Typical remuneration...
Words: 28143 - Pages: 113
...CBK AT A GLANCE Establishment of the Bank The Central Bank of Kenya was established in 1966 through an Act of Parliament - the Central Bank of Kenya Act of 1966. The establishment of the Bank was a direct result of the desire among the three East African countries to have independent monetary and financial policies. This led to the collapse of the East Africa Currency Board (EACB) in mid 1960s. Structure of the Bank Responsibility for determining the policy of the Central Bank is given by the Central Bank of Kenya Act to the Board of Directors. The Board consists of seven members: - the Governor, who is also its chairman - the Deputy Governor, who is deputy chairman - the Permanent Secretary to the Treasury who is a non-voting member - five other non executive directors All members are appointed by the President to hold office for a term of four years and are eligible for reappointment. In the case of the Governor, appointment is for a maximum of two terms of four years each and can only be terminated by a tribunal appointed by the President to investigate his conduct. The executive management team comprises the Governor, the Deputy Governor and nine heads of department who report to the Governor. The Bank operates from its head office in Nairobi and has branch offices in Mombasa, Kisumu and Eldoret. The Central Bank Act and it's relations with the Government The Central Bank of Kenya Act of 1966 set out objectives and functions and gave the Central...
Words: 1317 - Pages: 6
...available to a rightful user by authenticating the user by the acceptable use policy (AUP). It is also define that the user is the weakest link in an IT infrastructure, but by educating user of the sensitivity of the IT infrastructure in the security awareness, security control shall be enforced. Security control to this domain can also be enforced by defining and implement the user policy of the IT infrastructure. Workstation Domain This is the domain where users first connect to the IT infrastructure. Because of numerous threats, it is necessary to implement a workstation logon for the user to authenticate the user for the security control of this domain. Users will be authenticated in the system by defining its credentials and roles to the system in order to gain permission and access to the IT infrastructure (Tipton and Henry, 2007). LAN Domain This is the domain where all the computers, printers, and servers connect to each other...
Words: 889 - Pages: 4
...| Administrative Controls | | | Administrative controls are basically directives from the senior management that provide the essential framework for the organizations security infrastructure. Administrative controls consist of the procedures that are implemented to define the roles, responsibilities, policies and various administrative functions that are required to manage the control environment as well as necessary to oversee and manage the confidentiality, integrity and availability of the organizations information assets. Administrative controls can range from very specific to very broad and can vary depending on the organizational needs, particular industry, and legal implications. Administrative controls can generally be broken down into six major categories which include operational policies and procedures, personnel security, evaluation, and clearances, security policies, monitoring, user management, and privilege management. Ultimately, the senior management within an organization must decide what role security will play within the organization and define the security goals and directives. Due care by definition is the care that an ordinary and reasonable person would take over their own property or information. An example of this would for a person to place documents that contain sensitive information such as social security cards, passports, etc. in a locked safe within their home. This measure is taken to ensure that only those individuals with authorized...
Words: 1204 - Pages: 5
...FACTORS AFFECTING PERFORMANCE OF COMMERCIAL BANKS IN KENYA BY MAURICE MUIRURI KAARIUKI A RESEARCH PROPOSAL SUBMITTED TO THE SCHOOL OF BUSINESS IN PARTIAL FULFILLMENT OF THE REQUIREMENTS FOR THE AWARD OF MASTERS IN BUSINESS ADMINISTRATION, DEGREE OF KENYATTA UNIVERSITY. JULY, 2014 DECLARATION Declaration by the Researcher This research is my original work and has not been presented for a degree in any other University. No part of this study may be reproduced without prior authority of the author and/or Kenyatta University. Signature……………………………………………………… Date………………………. Maurice Muiruri Kariuki Declaration by the Supervisor This research proposal has been submitted for examination with my approval as the university supervisor. Signature……………………………………………………… Date………………………. Name (PhD.) School of Business ACKNOWLEDGEMENT I take this opportunity to express my gratitude and regards to Professor name (PhD.) for his guidance. I am indebted to all the persons and institutions that offered support, encouragement and prayers to me during the entire research. Lastly, I thank almighty, my parents, brother, sisters and friends for their constant encouragement without which this assignment would not be possible. ABSTRACT The study seeks to investigate the factors affecting performance of commercial banks in Kenya. The Background of the study reveals that there has been continued globalization and economic cooperation among the...
Words: 10187 - Pages: 41
...com/en-us/security/advisory Mitigate vulnerabilities Threats are things you have to respond to effectively. Threats are controllable Risks are manageable Vulnerabilities can be mitigated All affect the CIA triad Not all threats are intentional Confidentiality, integrity, accessibility = CIA Starting on pg 161 DAC- only as secure as the individuals understanding. Access determined by owner. MAC- access determined by data classification itself. data itself has a classification. Need to be cleared to the level of the data security. Also has a “need to know” aspect to it. Non DAC- third party determines the permissions. Role based- pg 166. Access determined on the job of the user. Rule based- variation of DAC. Rules are created and access is based on the rules created. Week of 4/17/13 Starts on pg 146 Project- search SSCP CBK on the library under 24/7 Each of the 7 domains, vulnerabilities in each, security used in each to control, For lab 5--- Make 4 types of connections. 2 secure 2 not secure. telnet, securenet, ssh, and ftp. Will need 3 machines. Student, Target, ubuntu 1 Wireshark setting to capture a file in promiscuous mode on student. Do an FTP to target windows. Command prompt from student to ubuntu. Try to log in. Do questions. Question 9, focus on SSH and what traffic you are getting. Assignments— Week of 5/1/13 Acronyms- Pg263 BCP- Business Continuity Plan DRP- Disaster Recovery Plan Pg266 BIA- Business Impact analysis Pg256 ...
Words: 907 - Pages: 4
...CISSP: The Domains Table of Contents INTRODUCTION 4 DOMAIN 1: ACCESS CONTROL WHAT’S NEW IN ACCESS CONTROL? AN OVERVIEW 5 5 7 DOMAIN 2: SOFTWARE DEVELOPMENT SECURITY WHAT’S NEW IN APPLICATIONS SECURITY (NOW SOFTWARE DEVELOPMENT SECURITY)? AN OVERVIEW 9 9 10 DOMAIN 3: BUSINESS CONTINUITY & DISASTER RECOVERY WHAT’S NEW? AN OVERVIEW 12 12 13 DOMAIN 4: CRYPTOGRAPHY WHAT’S NEW? AN OVERVIEW 17 17 18 DOMAIN 5: INFORMATION SECURITY GOVERNANCE & RISK MANAGEMENT WHAT’S NEW? AN OVERVIEW 21 21 22 DOMAIN 6: LEGAL, REGULATIONS, INVESTIGATIONS, AND COMPLIANCE WHAT’S NEW? AN OVERVIEW 24 24 26 DOMAIN 7: SECURITY OPERATIONS WHAT’S NEW? AN OVERVIEW 28 28 29 DOMAIN 8: PHYSICAL & ENVIRONMENTAL SECURITY WHAT’S NEW? AN OVERVIEW 32 32 33 DOMAIN 9: SECURITY ARCHITECTURE & DESIGN WHAT’S NEW? AN OVERVIEW 36 36 38 DOMAIN 10: TELECOMMUNICATIONS & NETWORK SECURITY WHAT’S NEW? AN OVERVIEW 40 40 41 INFOSEC INSTITUTE’S CISSP BOOT CAMP COURSE OVERVIEW COURSE SCHEDULE 44 44 45 INTRODUCTION (ISC)²’s CISSP Exam covers ten domains which are: Access Control Application Development Security Business Continuity and Disaster Recovery Planning Cryptography Information Security Governance and Risk Management Legal regulations, investigations, and compliance Operations Security Physical and Environmental Security Security Architecture and Design Telecommunications...
Words: 11687 - Pages: 47
...on the web site at: http://www.unicc.org/unctad/en/pressref/prdis.htm * Tel. 022-907.5733; Fax 907.0274; E.mail: nicole.winch@ unctad.org JEL classification: G280 - iii - CONTENTS Chapter Page INTRODUCTION I. II. III. GROWTH AND CHARACTERISTICS OF LOCAL BANKS IN AFRICA MORAL HAZARD, ADVERSE SELECTION AND FINANCIAL FRAGILITY THE CAUSES OF FINANCIAL DISTRESS AMONG LOCAL BANKS A. B. C. D. IV. V. VI. Insider lending Lending to high-risk borrowers Macroeconomic instability Liquidity support and prudential regulation 1 2 7 9 11 13 15 15 16 18 21 23 WHAT BENEFITS CAN LOCAL BANKS PROVIDE AFRICAN ECONOMIES? IMPLICATIONS FOR BANK REGULATION AND SUPERVISION CONCLUSIONS REFERENCES ***** ABBREVIATIONS BOU BOZ CBK CBN FI K KSh MNC N NBFI...
Words: 11598 - Pages: 47
...social and economic development in both developed and developing countries. Kenya with an estimated population of 29.6 million people and a per capita income of US $260 is categorized by the World Bank to be among the poorest countries in the world (world development report 1992). Kenya’s development challenge therefore remains in finding sustainable poverty eradication strategies. Micro and small enterprises have been seen as one of the strategies that can bring faster development. MFI does therefore play a big role in financing the micro and small enterprises for faster development. MFI’s enterprises are also highly rated for employment creation. They are therefore important in Kenya where unemployment and underemployment are estimated at between 25% and 35% respectively. MFI s’ through the provision of credit influence the type of technology adopted by entrepreneurs and even the rate of technology adoption. Small scale enterprises in the agricultural sector play a big role in providing food, income generation and employment creation. The application of technology is vital in enhancing growth and development of these enterprises. Inflation is vital in the growth and development of any MFI. Both large scale and small scale MFI depend on financial organizations for credit in order to raise capital and also finance any development projects. The large scale organizations have found it much easier to access credit from commercial banks and other financial institutions. The micro and...
Words: 13682 - Pages: 55
...regulates the money supply, and controls the interest rates in a country. The central bank often also oversees the commercial Banking system within its country. A central Bank is distinguished from a normal commercial bank because it has a monopoly and creating the currency of that nation, which is usually that Nations legal tender. Central Bank of Kenya is the highest Banking institution in the country and responsible for ensuring the smooth working of banking sector and other financial institutions. Central Bank differs from commercial banks in that it does not engage in ordinary banking activities e.g. accepting deposits from the general public. It is owned by the government while commercial banks are owned by shareholders. CBK usually implements certain government policies. OBJECTIVES OF CENTRAL BANK OF KENYA i. To formulate and implement monetary policy directed to achieving and maintaining stability in the general level of prices. ii. The Bank fosters the liquidity, solvency and proper functions of a stable market based financial system. iii. Support the economic policy of the government including its objectives for growth and employment. iv. Formulate and implement foreign exchange policy v. Hold and manage its foreign exchange reserves. vi. License and supervise authorized dealers vii. Formulate and implement such policies as best promote the establishment, regulations and supervisions of efficient and effective payment, clearing and settlement systems...
Words: 1459 - Pages: 6
...additional steps needed to implement and maintain this plan. Use of the ISO 27000 series certification process will provide a framework for the ISMS. The Plan-Do-Check-Act (PDCA) model provides a step-by-step process for planning, implementing, and management of the ISMS plan. The ISMS outline, network drawing, and additional recommended steps will be discussed below. A1. Business Objectives The first step of any ISMS is the identification of the business objects that need to be included in the planning and maintenance of an organization. Listed below are HBWC’s major objects to be considered when developing ISMS. (Arnason, S, & Willett, K.D, 2008) Staff: Basic users, RAS users, Administrators, Executives, and Database Administrators roles, access levels, and responsibility should be defined. Facilities: HBWC headquarters in room 1234 & OGG offices in room 5678 (Location of servers and network devices) physical security must be examined. Technology: Microsoft Windows 95/NT Server environment, Access 97 database, and network devices and configuration of said equipment (Patches & Updates). Discussion of vulnerabilities associated with unsupported Operating Systems (OS) and Applications...
Words: 1741 - Pages: 7