Contributors
A Victim-Centered Approach to the Human Trafficking Challenge

A Victim-Centered Approach to the Human Trafficking Challenge

Human trafficking is often difficult to identify due to the skilled practices of human traffickers and the challenge of defining a victim.Victims are often hidden, threatened with abuse, torture, and death. As a result, victims are unlikely to run away or speak for fear of reprisal from their captors. In this modern system of slavery, victims do not have a voice, so citizens and trained professionals must know what to do when encountering a potential victim.

Does LPTA Really Cost More?

“It’s unwise to pay too much, but it’s worse to pay too little. When you pay too much you lose a little money, that is all. When you pay too little, you sometimes lose everything, because the thing you bought was incapable of doing the thing it was bought to do. The common law of business balance prohibits paying a little and getting a lot – it can’t be done. If you deal with the lowest bidder, it is well to add something for the risk you run. And if you do that, you will have enough to pay for something better.” – John Ruskin, 1819-1900

Cyber Criminals Collaborate To Counteract Threats; So Should We

Cyber Criminals Collaborate To Counteract Threats; So Should We

Every month, a new cyber attack makes headlines, startles consumers, and spurs calls for action and new legislation to mitigate emerging cyber threats. By almost any statistic you choose, the risk to Government agencies, corporations, and consumers is escalating. In 2013, MacAfee catalogued more than 100,000 new pieces of malware a day. The Washington Post reported the likely annual cost of cybercrime to the world economy at $445 billion dollars in 2013, and the number of detected cyber attacks in 2014 increased a staggering 48% over the previous year.

Roadmaps for IT Modernization

Roadmaps for IT Modernization

The risk associated with legacy information technology (IT) systems not meeting the Federal Government’s evolving needs is substantial and unacceptable. The costs are also significant with 78% of the $80 billion spent annually on Federal IT going toward maintaining existing systems, crowding out funding for modernization. 

Enhancing Communications to Protect Against Domestic Terrorism

Enhancing Communications to Protect Against Domestic Terrorism

As the United States faces the growing threat of homegrown violent extremism, the need to fuel widespread neighborhood vigilance and uphold a concerted local effort remains a focal point in preventing terrorism. Successful homeland security efforts require well-informed and proactive communities. Since publishing its first National Strategy in 2002, the Department of Homeland Security (DHS) has engaged citizens by promoting an observant culture throughout American society. 

Arc Aspicio Named One of 2016 Seven to Watch by Consulting Magazine

Arc Aspicio Named One of 2016 Seven to Watch by Consulting Magazine

Arlington, VA, February 12, 2016 – Arc Aspicio announced that Consulting Magazine named the company to the list of the Seven Small Jewels to Watch for the upcoming year.

Consulting Magazine is a leading publication for consulting, offering insights on consulting careers, thought leadership, and corporate strategies. Consulting Magazine annually recognizes growing companies, strong leadership, and accomplished consultants.

Remaining Mission-Ready During Transition

Remaining Mission-Ready During Transition

Maintaining organizational stability so the Department of Homeland Security (DHS) can continue its mission during an administration change is critical to keep our nation safe. New agency leaders need access to the basics – organizational information like key policies, organizational charts, mission priorities, current strategy, and dashboards. It is critical, though, to also have access to the current mission status, key issues and risks, and a playbook that allows them to act immediately in the event of a crisis.