Advanced search Help
Resource Type or Special Collection is Theses & Research Reports
Publisher is Naval Postgraduate School (U.S.). Center for Homeland Defense and Security
Clear all search criteria
Only 2/3! You are seeing results from the Public Collection, not the complete Full Collection. Sign in to search everything (see eligibility).
-
Hastily Formed Networks - Chaos to Recovery
From the thesis abstract: "Historically, response to catastrophic events has failed to reestablish communications rapidly, resulting in an extension of the chaotic response phase. Communication is not simply a support service but an independent strategic imperative within the crisis response system. Current domestic crisis management acknowledges that a communications system is indispensable yet continues to prioritize and utilize communications as a support function. This thesis considers the centrality of the communications system binding complex emerging systems. The goal for crisis response is also to stabilize disrupted and interrelated systems that define a modern society. A communications system is the key element that allows systems to self-organize, adapt, and exert control over the chaos. Defining the role of communications requires an understanding of complexity, chaos, systems, and network evolution. There is a need to change crisis response organizations to reflect a modern understanding of the changing technical environment, and the foundational function communications serves in linking dynamic complex systems. This thesis also identifies the forces unleashed in the aftermath of a catastrophic event and illustrates how the rapid restoration of communications is required for successful crisis response."
Naval Postgraduate School (U.S.); Naval Postgraduate School (U.S.). Center for Homeland Defense and Security
Arezzi, Mark
2015-09
-
Groupthink: A Significant Threat to the Homeland Security of the United States
From the thesis abstract: "The groupthink psychological phenomenon prevalent in the homeland security enterprise is a significant threat to the United States. Homeland security is vulnerable to groupthink because its leaders frequently share similar backgrounds, work histories, and world-views. This similarity minimizes the chance of outside perspectives being introduced to the decision-making process, which insulates leadership from external ideas. This research project asks, 'Has groupthink influenced the homeland security enterprise and if so, what are the implications of this phenomenon?' It examines case studies of decisions made by government in-groups to determine if the antecedent conditions and symptoms of groupthink are present and if the resulting fiascos are caused by groupthink. Furthermore, it analyzes Irvin Janis's original remedies, which have successfully alleviated groupthink in the past, and it offers recommendations to mitigate this phenomenon. Leaders who wish to alleviate groupthink should promote a culture in which employees are encouraged to play the role of devil's advocate by offering alternatives to organizational decisions and commonly held assumptions. Homeland security can reduce groupthink by employing Janis's remedies and encouraging critical thinking, innovation, and imagination to bolster the national security of the United States."
Naval Postgraduate School (U.S.). Center for Homeland Defense and Security; Naval Postgraduate School (U.S.)
Ricciuti, James E.
2014-12
-
Security and Prosperity: Reexamining the Connection Between Economic, Homeland and National Security
From the thesis abstract: "What is the relationship between economic, homeland, and national security? This question drove the investigation of journal articles and federal doctrine to determine the answer. Through qualitative and quantitative research, I explored definitions, examined connections, and made observations. From this effort I found that the definitions for these security elements are cloudy; furthermore, the relationships between the elements are primarily described in relation to the elements explored but not in the context of the security environment, which plays a significant role. Key findings include: 1) there is not a balanced relationship between economic security, homeland security, and national security; 2) the security relationship is an uneven overlap of the elements; and 3) metamorphic forces shape the security relationships. All combined, when some security decisions are being made they lead to unintended consequences. To align national security efforts, the focus should be on discussion the nation's health through the lens of security and prosperity. The first steps to accomplishing this goal are: 1) develop a national narrative, 2) integrate Department of Homeland Security and Department of Defense, 3) create a Department of Prosperity, 4) continue combatting violence and extremism and, 5) continue promoting prosperity abroad."
Naval Postgraduate School (U.S.); Naval Postgraduate School (U.S.). Center for Homeland Defense and Security
Karimi, Bijan P.
2015-09
-
Building a Collaborative Governance System: A Comparative Case Analysis
From the thesis abstract: "Governance processes in the public sector establish policies and institutionalize procedures for how organizations work together. Developing and sustaining these governance processes may be difficult. Efforts to develop a regional wireless interoperable communications network in the Phoenix metropolitan area resulted in a series of successes and failures. This thesis uses a classic case study framework to examine the governance development process from 1999 to 2015 among the City of Phoenix, City of Mesa and additional parties. Three distinct phases in the governance development process were identified and used to conduct a comparative analysis. Seven executives involved in the process were interviewed to provide insight and experience related to the governance development process across the three phases. The comparative case analysis illustrates factors that contributed to the success and failure of the network's governance. Recommendations are provided that other agencies may employ in their own governance development to accelerate the process or avoid potential pitfalls and achieve successful outcomes more quickly. While the case study focuses on the establishment of an interoperable communications system, the principles and examples may apply to other technology or homeland security efforts to establish formal cross-jurisdictional governance structures."
Naval Postgraduate School (U.S.); Naval Postgraduate School (U.S.). Center for Homeland Defense and Security
Cooper, Jesse W.
2015-06
-
Analysis of C3 Counterinsurgency Inspired Policing, and the Flip Side of the COIN
From the thesis abstract: "The Massachusetts State Police Special Projects Team instituted a new strategy named 'Counter Criminal Continuum (C3) Policing' late in 2009 in an attempt to address the escalation of gang-related violence in the North End of Springfield. The perceived success of this initiative has prompted calls for its expansion into other high-crime areas of the city. However, there is an undercurrent of concern among critics of the military nexus in social science research and application; they warn that applying a counterinsurgency approach in domestic law enforcement, regardless of how it is labeled, risks casting local communities as hostile populations. Therefore, a current and objective analysis of the true effect of the C3 counterinsurgency inspired policing strategy is needed before its planned expansion. Research for this thesis utilized a single case study limited to quality-of-life indicators before and after the implementation of C3 for the gang-related problem. The advantage of this control is that the data spanned from 2007-- 2014 as C3 commenced in the fall of 2009. The review of quantitative data collected from various police and city sources revealed a neighborhood trending in a positive direction since the implementation of C3, but that not all indicators across the board were able to support this conclusion."
Naval Postgraduate School (U.S.). Center for Homeland Defense and Security; Naval Postgraduate School (U.S.)
Hiorns, Bruce
2014-12
-
What's In a Name: A Comparative Analysis of the United States' REAL ID Act and The United Kingdom's National Identity Scheme
From the thesis abstract: "Since September 11, 2001, many governments have considered developing national identity management systems. Beyond identification, politicians and proponents of these systems have touted such system benefits as combating terrorism, preventing identity theft, facilitating travel, and combating illegal work and benefit fraud. For these reasons, the United States and United Kingdom both considered variations of these systems. While the United Kingdom passed the Identity Cards Act of 2006 and spent several years developing a national identity management system before ultimately scrapping the scheme in 2010, the United States sought to secure further the existing means of identification--driver's licenses and identity cards--through the passage of the REAL ID Act. Both measures met with widespread resistance. What does an examination of resistance to nationwide identity management schemes in the United States and United Kingdom reveal about the nature of national identity management systems and identity cards, and what does this resistance tell policymakers and security officials who promote such schemes? Through a comparative analysis of the REAL ID Act implementation and the National Identity Scheme, this thesis shows that Anglophone, common-law nations experience the same inhibiting factors, whether or not they attempt to implement a national identity management system or an identity card on a national scale."
Naval Postgraduate School (U.S.); Naval Postgraduate School (U.S.). Center for Homeland Defense and Security
Jefferson, Karrie Ann
2015-12
-
What Can History Teach Us? A Comparative Historical Analysis on the Reserve Officer Training Corps and the Department of Homeland Security
From the thesis abstract: "This thesis examines an institution that has been educating, providing leadership training and commissioning the vast majority of U.S. military officers for nearly 100 years, the Reserve Officer Training Corps (ROTC). This program was formed and shaped over nearly a century through conflict, military necessity, and political maneuvering. Through the incorporation of a historical comparative lens, this program's mechanistic and temporal conditions are captured to provide lessons learned for other entities searching for an educational identity. One such organization that is struggling to establish a preparatory program and identity is the Department of Homeland Security (DHS). When looking at the two case studies side by side, it is easy to see that they do indeed share commonalities in organizational structure, need, and mission. The findings from this thesis offer evidence that the DHS is growing in educational parallel to ROTC, while suffering from many of the same growing pains the Department of Defense did while trying to establish its educational roots. This thesis tracks conditions that shaped the ROTC we know today, while simultaneously highlighting the deficiencies the DHS is facing. It also lays the path for future work that could call for a similar analog as the ROTC for the DHS."
Naval Postgraduate School (U.S.); Naval Postgraduate School (U.S.). Center for Homeland Defense and Security
Banker, Thomas A.
2015-12
-
Considerations for Domestic Law Enforcement Implementation of a UAS Program in the Proposed FAA Regulatory Environment of Integration into the National Airspace System
From the thesis abstract: "This thesis identifies the potential future mission profile of an unmanned aircraft systems (UAS) program within a domestic law enforcement agency after implementation of UAS regulations, a task currently in progress by the Federal Aviation Administration (FAA). First, the author reviews current academic literature and provides analysis on key policy issues of safety, the transfer of risk, and constitutional rights. Then, the author consults the knowledge and experience of individuals responsible for the integration architecture of UAS through an IRB [Institutional Review Board]-approved online survey. The survey of these subject matter experts using the Delphi method resulted in the following recommendations: (1) early public engagement and transparency for intended UAS use by law enforcement; (2) a policy framework that addresses safe operation and privacy; (3) further investment in 'sense and avoid' technology; (4) the development of a comprehensive UAS training program. This academically rigorous consultation provides law enforcement executives and elected officials the policy implications of initiating a new UAS program and the groundwork to assess existing UAS programs."
Naval Postgraduate School (U.S.). Center for Homeland Defense and Security; Naval Postgraduate School (U.S.)
McMinn, Keith Andrew
2015-12
-
Advance of the Black Flags: Symbolism, Social Identity, and Psychological Operations in Violent Conflict
From the thesis abstract: "The United States is in an ideological war with violent extremists in the realm of mass communication, but the nature of this conflict is not well understood. This thesis reviewed literature concerning communication principles and the psychology of symbolism, then used qualitative analysis to investigate strategic communication samples to understand how media was used to construct group identity, influence attitudes, and challenge adversaries. Themes critical to narrative construction were identified, as were communication techniques that place emphasis on key ideas in music and film. The roles of symbolism, rituals, and music in human behavior were further researched. This research was then applied to the Islamic State's use of media to influence attitudes and inspire behavior. The ultimate recommendation suggests that the United States approach this conflict as a true war by asserting a communication strategy designed to disrupt violent, exclusionary ideologies."
Naval Postgraduate School (U.S.); Naval Postgraduate School (U.S.). Center for Homeland Defense and Security
Milburn, Christopher D.
2015-12
-
Tactical Firefighter Teams: Pivoting Toward the Fire Service's Evolving Homeland Security Mission
From the thesis abstract: "Firefighters and police officers are increasingly called upon to work in each other's spaces but are neither trained nor equipped to do so; consequently, they are limited in their ability to enter one another's high threat areas. Fire complicates the police's ability to respond to hostile incidents by creating visibility issues and thermal injuries as the burning building deteriorates. Firefighters are equally ill-prepared to enter an environment in which fire and firearms are present while victims are trapped within the hazard zone. As a result, first responders consistently lack the capability to accomplish combined missions when multiple threats are present. This thesis investigates the best way to fill this operational gap, first by examining the merits and limitations of several models related to the role of firefighters during hostile events. It then documents and analyzes the field tests of a fourth model piloted by the Houston Fire Department that would deploy cross-trained firefighting strike teams into hot zones with both incendiary and ballistic hazards."
Naval Postgraduate School (U.S.); Naval Postgraduate School (U.S.). Center for Homeland Defense and Security
Vargas, Cynthia M.
2016-09
-
Cybersecurity: Utilizing Fusion Centers to Protect State, Local, Tribal, and Territorial Entities Against Cyber Threats
From the thesis abstract: "Many areas of the cyber domain of American citizens are under attack: critical infrastructure, electrical grids, banks, businesses, government, and personally identifiable information (identity theft, medical records, child exploitation, etc.). Although the focus of recent cybersecurity legislation has provided additional authorities to federal agencies, a key concern for state, local, tribal and territorial (SLTT) government entities is this: What is the best way to protect computer networks at the state and local level? State and local governments have the responsibility to protect dams, freeway systems, power and water plants, emergency communications, personal identifiable information, health care records, educational institutions, and banking systems. The array of responsibilities and the cybersecurity threat landscape make state- and local-level computer networks fertile ground for the cyber adversary. This research focuses on the threat to SLTT computer networks and how to leverage information-sharing initiatives, cybersecurity policies and state and local fusion centers to prevent, mitigate, and deter cyber threats targeted at SLTT computer networks."
Naval Postgraduate School (U.S.); Naval Postgraduate School (U.S.). Center for Homeland Defense and Security
Flynn, Payton A., Sr.
2016-09
-
Social Networks and High Healthcare Utilization: Building Resilience Through Analysis
From the thesis abstract: "This thesis explores the links that exist between human beings and how the presence, or absence, of connectivity within a person's social network impacts one's health and well-being. Through the analysis of both the social and clinical sciences, this research explores the question: What role do social relationships, and their associated networks, play in the lives of high healthcare utilizers? This thesis studies the origins of human connection and presents the science of social network analysis to demonstrate how interconnected relationships influence the well-being of networked individuals. The findings indicate that the quality of an individual's social network can have a positive or negative effect on the individual's health. Those who are socially isolated in their community often have difficulty managing complex health conditions and navigating the fractured national healthcare system. Deficits in community healthcare and social support networks cause these individuals to frequently utilize expensive and finite public safety and hospital emergency department resources for primary healthcare services. This research presents four recommendations to promote improved healthcare system navigation for high healthcare utilizers by not only understanding the patients' social networks, but also the healthcare provider network."
Naval Postgraduate School (U.S.); Naval Postgraduate School (U.S.). Center for Homeland Defense and Security
Baker, Michael D.
2016-09
-
Combining Facial Recognition, Automatic License Plate Readers and Closed-Circuit Television to Create an Interstate Identification System for Wanted Subjects
From the thesis abstract: "Advancing technology in the field of facial recognition systems (FRS), closed-circuit television (CCTV) and automatic license plate readers (ALPRs) could make it possible to create a system capable of identifying suspected terrorists, current terrorist watch list suspects, other wanted criminals, and missing persons. This research examines the convergence of these technologies to design an efficient system and improve the speed and accuracy of potential suspect identification. To do so, the thesis examines all systems' basic capabilities, privacy issues or concerns, best practices, possible areas for improvement, and policy considerations. Since the tragedies of September 11, 2001, a large volume of literature related to FRS, ALPR, and CCTV systems has been created. The intent of this thesis is to serve as catalyst for a new security system designed to locate, identify, and apprehend known terrorist watch list suspects and other wanted persons who are traversing the interstate systems in the United States. The goal is to provide another layer of protection and create a deterrent to both criminal and terrorist activity, providing a safer environment for all U.S. citizens. Furthermore, this capability can help locate Amber Alert and Silver Alert subjects."
Naval Postgraduate School (U.S.); Naval Postgraduate School (U.S.). Center for Homeland Defense and Security
Thomas, Michael J.
2015-12
-
Ethics on the Fly: Toward a Drone-Specific Code of Conduct for Law Enforcement
From the thesis abstract: "This thesis examines the issue of law enforcement's use of unmanned aerial systems (UAS) from an ethical perspective. As UAS have only recently been introduced into the National Airspace System (NAS), legislation regarding their use in America's skies is lacking. This dearth of statutory guidelines creates a circumstance wherein self-imposed limits on UAS use by law enforcement take on greater importance. The primary research question posed by this thesis is whether a prevailing ethical framework exists to govern the use of UAS by domestic law enforcement functions. It concluded no consensus exists. Using the case study method, this thesis considered documentary evidence of ethical frameworks for UAS currently in use by law enforcement. A comparative policy analysis is then performed to identify overlapping areas of concern, in order to arrive at a template that recommends seven dimensions that law enforcement executives should consider in creating a drone-specific code of conduct for policing. A case is made for publicly declaring an agency's code of conduct in the interest of strengthening the relationship between police and the public vis-à-vis the social contract."
Naval Postgraduate School (U.S.); Naval Postgraduate School (U.S.). Center for Homeland Defense and Security
Smith, Brian T.
2016-03
-
Establishing the Intelligence Required by the Fire Department City of New York for Tactical and Strategic Decision Making
From the thesis abstract: "Following the tragic events of September 11, 2001, numerous reports came to the same conclusion: there was an urgent need to enhance information sharing throughout the homeland security community (HSC). The report of the National Commission of the Terrorist Attacks upon the United States set forth numerous failures of information sharing that occurred throughout the HSC involving events leading up to 9/11, the attacks, and the response. The necessity of information to enable the fire service (FS) to make proper decisions is clear. Groups working on how to best provide the FS with intelligence believe that in order to assist the Intelligence Community (IC) in providing the intelligence, a specific list should be developed. This has become the goal of this thesis. In analyzing what intelligence is required by the FS, it has become apparent that there are a vast number of variables. Taking into account these variables and the dynamic environment has revealed that compiling a list of specific requirements is not practical. In lieu of a specific list, a better option would be to make available to the IC an understanding of the operations of the FS. By providing an explanation of the information that the FS utilizes to respond to emergencies, an understanding, as opposed to a stagnant list, of the intelligence needs of the FS could be established. To accomplish this, a guide for the IC could be established-a guide similar to those available to the FS explaining the IC. This guide could explain the intelligence needs of the FS at a level that is understandable and pertinent to those tasked with fulfilling them. A draft guide is included in the appendix of this thesis."
Naval Postgraduate School (U.S.); Naval Postgraduate School (U.S.). Center for Homeland Defense and Security
Kiesling, James W.
2016-03
-
Fluid Leadership: Inviting Diverse Inputs to Address Complex Problems
From the thesis abstract: "History is replete with examples of misapplied leadership strategies. When singular methods are used to solve multifaceted problems, negative results are often the consequence. Complex issues in a complex environment require complex perspectives; the homeland security enterprise (HSE) needs leaders who can adapt their leadership styles according to emerging environments. Furthermore, the diverse agencies within the HSE must work together more frequently and dependably to make coordinated decisions that impact their broad community. This thesis proposes integrating multiple leadership models to generate innovative, diverse solutions that will strengthen the HSE. By examining dozens of models, the research developed a conceptual synthetic leadership model. It is recommended that this proposed model be implemented within HSE components and studied organizationally."
Naval Postgraduate School (U.S.); Naval Postgraduate School (U.S.). Center for Homeland Defense and Security
Moir, Sylvia
2016-03
-
Leveraging State and Local Law Enforcement Maritime Homeland Security Practices
From the thesis abstract: "This thesis explores the practices of six state or local law enforcement agencies in the field of maritime homeland security. Using the Delphi Survey Method on a sample of the highest-risk, most strategically located, and most commercially important ports in the United States, this thesis looks at the successes and challenges of grant funding, training practices, recovery efforts, and state government role in maritime homeland security. The resounding and underlying theme of the best practices cited by these port areas is centered on collaborative efforts across federal, state, local, and tribal agencies. Respondent agencies noted that the most successful practices in their respective ports were the result of coordination across information sharing, exercises and drills, task forces, and centers (fusion centers, operations centers, coordination centers, and training centers)."
Naval Postgraduate School (U.S.); Naval Postgraduate School (U.S.). Center for Homeland Defense and Security
Nichols, Kirk L.
2016-03
-
Redirected Radicals: Understanding the Risk of Altered Targeting Trajectories Among ISIL's Aspiring Foreign Fighters
From the thesis abstract: "Since the formation of the Islamic State of Iraq and the Levant (ISIL) and its so-called 'Caliphate,' the terrorist organization has demonstrated its capability and willingness to project force beyond its immediate area of operations in the Middle East, extending to Western countries. Rather than solely dispatching trained foreign fighters, in the United States, ISIL's strategy has involved homegrown violent extremists (HVEs) with a limited range of connectivity to the group. This thesis explores the threat posed by a subgroup of HVEs identified as 'redirected radicals,' aspiring foreign fighters who, when prevented by counterterrorism actions from traveling overseas, decided instead to alter their targeting trajectory and commit violence in their home countries. Through an extensive comparative case study analysis of recent ISIL-related violent incidents and plots in the United States, Canada, and Australia, common trends identified the prevalence of redirected radicals. This thesis found that policy responses to this phenomenon differed significantly across these three nations, using an array of legal authorities including undercover investigations, passport revocation, and preventative detention with varying degrees of effectiveness. Ultimately, this thesis determined that investigations involving potential redirected radicals offer unique opportunities for counterterrorism authorities to effectively decrease the likelihood of a domestic attack."
Naval Postgraduate School (U.S.); Naval Postgraduate School (U.S.). Center for Homeland Defense and Security
Gordon, John Tully
2016-09
-
Application of the Intelligence Cycle to Prevent Impacts of Disastrous Wildland Fires
From the thesis abstract: "Wildland fires are an enduring homeland security threat that destroys lives, property, and the environment annually. This thesis explores the concept that the application of the intelligence cycle is a practical approach to addressing threats and minimizing wildland fire impacts. To determine how effective the intelligence cycle can be in decreasing the impacts of disastrous wildland fires, the research examined the wildland fire problem, fire service intelligence, and the intelligence cycle. Research affirmed there is no current application of a wildland fire intelligence cycle. A case study analysis concluded that components of the intelligence cycle currently take place in wildland fire incidents, but not in a formalized process. This thesis argues that the intelligence cycle is a valuable framework for re-evaluating how the fire service collects, analyzes, and disseminates information about wildland fire threats. As a result of research and analysis, several recommendations were identified that include policy adoption at the national level and enhanced wildland-fire intelligence integration. The intelligence cycle adoption will ultimately help the fire service better communicate with the communities it services, and the resulting enhanced communication will help the fire service be more successful in mitigating the effects of those fires that do occur."
Naval Postgraduate School (U.S.); Naval Postgraduate School (U.S.). Center for Homeland Defense and Security
Young, Brian
2018-06
-
Iran's Social Media Message and Its Connection to Conspiracy Theories
From the thesis abstract: "This research explored the strategy behind Iran's English-language media campaigns on the Internet, particularly with regard to Iran's use of social media, to determine its possible impact on homeland security in the United States. A qualitative analysis of data from the Facebook pages of Iran's PressTV and the Young Journalists Club was conducted, and the author determined that the best method to determine Iran's messaging strategy would be to closely follow the statements made by Iran's Supreme Leader. The study also found rumors and conspiracy theories contributed to a large part of the Iranian social media message, and there was a significant connection to Western websites that featured conspiracy theory content. Although the Iranian Facebook message has only achieved modest inroads, its connection to conspiracy theories is troubling. As Daniel Jolley and Karen M. Douglas point out in their 2014 article, 'The Social Consequences of Conspiracism,' conspiracy theories increase distrust in the government and inhibit future political involvement. Conspiracy theories and rumors can also be used in disinformation campaigns, and the 1968 'Report of the National Advisory Commission on Civil Disorders' linked the spread of rumors to civil unrest. Rather than ceding a portion of the Internet to Iran's messengers, this study recommends an American counter-messaging strategy and the use of technological advances to defeat Iran's Internet censorship in order to give all Iranians unfettered access to Western media sources."
Naval Postgraduate School (U.S.); Naval Postgraduate School (U.S.). Center for Homeland Defense and Security
Runnels, Robert C.
2015-03
-
In Bad Faith: The Link Between Religious Conversion and Violent Extremism
From the thesis abstract: "Recent studies found a disproportionate number of converts to Islam taking part in radical activities as opposed to those born into the faith. While research linking conversion to radicalization is available, a gap exists in research examining what in the conversion process is causing this phenomenon. This thesis asks, what is the relationship between religious conversion and violent extremism? This study explores 38 individuals who converted to Islam and subsequently committed a radical act. The thesis investigates four hypotheses concerning sociological and psychological factors driving religious conversion. These driving factors are a lack of secure attachments, interpersonal connections, significant personal problems, and individuals with perceived grievances being targeted by recruiters. The most significant driving factor in radicalization was individuals who had significant personal problems in their lives leading up to conversion, especially if a previous connection to a radical milieu existed. Recruiters seeking targets of opportunity among aggrieved individuals to convert was not a significant driving factor. Religious conversion by itself should not raise red flags, but conversion with other underlying factors indicates a greater risk for radicalization. The underlying factors are the drivers of radicalization, and the conversion gives individuals a reason to manifest their radical tendencies."
Naval Postgraduate School (U.S.); Naval Postgraduate School (U.S.). Center for Homeland Defense and Security
Gibson, Brian J.
2018-03
-
Westerner Radicalization: Rethinking the Psychology of Terrorism
From the thesis abstract: "The U.S. strategy to counter violent extremism relies heavily on the expert consensus that terrorists are engaging in political 'group speak' and are by nature psychologically 'normal.' Thus, anyone is susceptible to radicalization. To counter radicalization, finding answers is like finding a needle in a haystack. However, in the psychologically similar phenomenon of arson by firefighter--when a firefighter deliberately sets and then extinguishes a fire to appear heroic--the needle was found in an objective detailed analysis of offenders. This thesis takes the known root causes of arson by firefighter and applies them to the unknown root causes of Westerner radicalization. The small percentage of firefighters who commit this type of arson do so to establish an identity and sense of belonging. Similarly, disconnected Westerners radicalize to pursue a narrative of belonging and significance. This thesis argues that while captured and former terrorists may appear 'normal' and motivated by grievances, the reality may not be that simple; the human mind is not a light switch that flips evenly between normal and abnormal. The consensus view on countering violent extremism, which dismisses psychoanalytical or psychological approaches, must be reevaluated."
Naval Postgraduate School (U.S.); Naval Postgraduate School (U.S.). Center for Homeland Defense and Security
Pierson, Vernon
2017-03
-
Domestic Embedded Reporter Program: Saving Lives and Securing Tactical Operations
From the thesis abstract: "Advances in technology have provided journalists the tools to obtain and share real-time information during domestic-terrorist and mass-shooting incidents. This real-time information-sharing compromises the safety of first responders, victims, and reporters. Real-time sharing of tactical operations, including the positioning of law enforcement, firefighters, and their equipment, impacts the security and effectiveness of emergency responders in mitigating the public threat. The Department of Defense (DOD) fought a similar battle with members of the media more than a decade ago with the creation of its embedded reporter program. This thesis explores the following question: Can first response agencies and journalists in the United States adopt an embedded journalist program for domestic terrorist or mass-shooting events? The research reviewed the DOD's embedded reporter program and explored potential modifications for use within the United States. The thesis finds that although it is possible to create a collaborative embedded reporter program for use within the United States, it may be more feasible to adopt portions of the program such as placing an embargo on all tactical operations, creating a formal media training program, and implementing media credentials."
Naval Postgraduate School (U.S.); Naval Postgraduate School (U.S.). Center for Homeland Defense and Security
Trost, Michelle
2017-03
-
Problem-Solving in Homeland Security and Creating Policy Conditions for Enhanced Civic Engagement: An Examination of Crowdsourcing Models
"This thesis examines crowdsourcing experiments and engagement models, the leveraging of technology in these pursuits, and their potential utility for solving problems in the homeland security enterprise. Rather than identifying a gap or seeking to fix something that is 'broken,' the research evaluates the potential benefits of employing crowdsourcing models in homeland security and its related disciplines. It uses appreciative inquiry to evaluate how existing successful models might open new pathways between government and citizens for the generation of knowledge, the exchange of information, or for innovation in approaches to problem solving. This thesis advances the hypothesis that, within the body of crowdsourcing and engagement models, a combination of ideas, examples, approaches, and successes exists that demonstrates potential utility for the homeland security field. The research findings exhibited this potential, manifesting in new partnerships and the creation of new knowledge. Participants, aided only by personal technology, self-organized some initiatives; in other cases, participants simply needed a platform to enable their motivation to contribute. These platforms for engagement and pathways to them were a consistent part of the narrative across the literature. Contributions by the non-professional was also a consistent theme, as was a need for a balanced approach that provides a safe framework within which to operate."
Naval Postgraduate School (U.S.); Naval Postgraduate School (U.S.). Center for Homeland Defense and Security
Bisogno, Raymond
2017-06
-
Efficiency v. Security: Information Technology Consolidations - Resilience, Complexity, and Monoculture
From the thesis abstract: "Governmental organizations commonly seek to cut costs and increase efficiency through consolidation and standardization of information technology (IT) infrastructure. This may result in vulnerabilities not typically considered by policymakers, due to concentration and homogenization of critical assets, elimination of redundancy and surge capacity, and tightly coupled systems. This thesis reviewed the potential vulnerabilities that may exist in consolidated IT systems due to the effects of complexity, selforganized criticality, and monoculture, and shows that efficient systems carry inherent vulnerabilities. Because we cannot mitigate every possible threat, hazard, or vulnerability, IT professionals should focus on system resilience. Resilience of a system is counter-proportional to the product of vulnerability and spectral radius; therefore, any increase in vulnerability, spectral radius, or both decreases resilience. A reduction in overall vulnerability can compensate for increased self-organization and other losses of resilience through a variety of recommended actions. Many of those actions come with a cost-- organizations will have to determine the tradeoffs they are willing to make between efficiency and security."
Naval Postgraduate School (U.S.); Naval Postgraduate School (U.S.). Center for Homeland Defense and Security
Ricker, Jennifer L.
2018-03
-
New Model for Understanding Incident Management
From the thesis abstract: "The various sources of doctrine that practitioners use to conceptualize incident management result in inefficiencies, conflict, and misinterpretation. They can hinder or reduce operational success for incident management agencies and practitioners. Existing difficulties were validated through practitioner interviews and an in-depth literature review. Taking a more comprehensive and unified approach, a new incident management conceptual model is proposed and applied to several case examples. Conclusions, findings, and possible corrective measures are proposed to improve incident management doctrine."
Naval Postgraduate School (U.S.); Naval Postgraduate School (U.S.). Center for Homeland Defense and Security
Flamm, David S.
2016-12
-
Ideological Radicalization: A Conceptual Framework for Understanding Why Youth in Major U.S. Metropolitan Areas are More Likely to Become Radicalized
From the thesis abstract: "The number of disconnected youth, those ages 16 to 24 who are not in school and are not employed, has reached significant levels in the United States and Western Europe. This trend is coupled with the fact that more and more foreign fighters are joining Islamic State in Iraq and Syria (ISIS) in Iraq and Syria. In particular, Western youth have been the target of radicalization by ISIS and other terrorist groups, and the appeal and lure of such groups seem unlikely to subside. A similar trend is also evident among youth in Muslim countries where the number of foreign fighters to terrorist groups seems unlikely to decrease. According to recent estimates, over 28,000 foreign fighters have joined ISIS in Syria and Iraq since 2011. The fact that so many youth have been radicalized to join terrorist groups is a cause for concern that requires closer scrutiny, understanding, and action by Western and other governments. The explanations and motivations as to why youth join terrorist groups abound; these include lack of education, poverty, religion discrimination, family background, and political and economic marginalization, among others. This research seeks to answer the question, are the youth in the United States, who are disconnected, more likely to become radicalized to terrorism? To answer this, various theoretical frameworks were researched and examined, such as relative deprivation, social movement theory, and psychological perspectives, to shed light on understanding this issue."
Naval Postgraduate School (U.S.); Naval Postgraduate School (U.S.). Center for Homeland Defense and Security
Abrahams, John A.
2017-03
-
Connections Among Communities: Preventing Radicalization and Violent Extremism Through Social Network Analysis (SNA) in the Threat and Hazard Identification and Risk Assessment (THIRA) Framework
From the thesis abstract: "The evolution of socially connected networks of influence has created new ideological dimensions that motivate an individual to radicalize and to commit acts of violent extremism and terrorism. This thesis explored the viability of using social network analysis (SNA) as a tool in the nation's Threat and Hazard Identification Risk Assessment (THIRA) framework to determine whether factors (such as relationships and motivations) can be used to reduce the vulnerability of a community at risk of radicalization and violent extremism and to build resilience. Using literature that described core SNA principles and related fields of study, a theoretical framework was developed to illustrate how extremist ideologies and motivations are socialized within a particular network. This theoretical framework is assessed through a multi-case study analysis, examining an individual's radicalization process and programs to counter violent extremism in Australia and Scotland. This analysis ultimately suggested that incorporating the SNA methodology could be beneficial if included in the THIRA process. This thesis illustrates how a community could be provided the opportunity to mitigate against the process of radicalization by developing and targeting core capabilities that may help them build social capital and trust and to increase efficiency and availability of information sharing and social support intended to improve individual and community resilience."
Naval Postgraduate School (U.S.); Naval Postgraduate School (U.S.). Center for Homeland Defense and Security
Woodhams, Katrina Marie
2016-12
-
Lawful Hacking: Toward a Middle Ground Solution to the Going Dark Problem
From the thesis abstract: "This thesis examines the ongoing debate between law enforcement and the intelligence communities on one side, and the technology industry and privacy rights groups on the other, over the 'going dark' problem. Going dark is a phenomenon created by ubiquitous use of end-to-end encryption over communication devices and Internet platforms, rendering those communications warrant-proof. End-to-end encryption means that only the sender and receiver of the message can read it, and no one in between. Even with a properly executed warrant or subpoena, law enforcement and intelligence agencies are unable to access the data they need because that data was encrypted. This thesis explores the historical, political and legislative developments that contributed to the rise of encryption in recent years, as well as constitutional doctrines that may be relevant to the public debate over possible policy solutions. Through the policy options analysis method, this thesis identifies lawful hacking as a middle-ground solution that policymakers should adopt in the short term. It also recommends that the U.S. government initiate a public education campaign to gain public support for some form of regulation concerning encryption in the future. The fundamental issue here is not only about the tension between privacy and security. The issue is also about who should make decisions with broad implications for the collective security: elected officials or the technology industry."
Naval Postgraduate School (U.S.); Naval Postgraduate School (U.S.). Center for Homeland Defense and Security
Nguyen, Hoaithi Y.T.
2017-03
-
Deterring Violent Extremism in America by Utilizing Good Counter Radicalization Practices from Abroad: A Policy Perspective
From the thesis abstract: "The problem of violent extremism is approaching a critical point in America. American government and community leaders must find an effective approach to deterring violent extremism immediately. A national and comprehensive approach to deter violent extremism in America is currently lacking. This comparative policy perspective seeks to determine whether the United Kingdom and Australia have good practices to deter violent extremism that can be useful in America. Secondly, this thesis also seeks to determine whether the United States can implement potential good practices to deter violent extremism. After a thorough review of the issue of violent extremism in America, this thesis studies similar background, research, and violent extremism issues in the United Kingdom and Australia. This thesis concludes that a variety of good practices in the United Kingdom and Australia can counter radicalize and deter violent extremists in America. The findings and recommendations from this research include challenges and a way forward to implement certain potential best practices for the United States. The arguments offer viable options and alternatives that the United States should consider when creating a national deterring-violent-extremism strategy. The details and information regarding understanding and implementing good practices to deter violent extremism in America are contained in this thesis."
Naval Postgraduate School (U.S.); Naval Postgraduate School (U.S.). Center for Homeland Defense and Security
Bonanno, Amy Fires
2017-03