Advanced search Help
Resource Type or Special Collection is Theses & Research Reports
Format is pdf
Clear all search criteria
Only 2/3! You are seeing results from the Public Collection, not the complete Full Collection. Sign in to search everything (see eligibility).
-
Smart Strategies for Effectively Managing Entertainment Districts
From the Thesis Abtract: "Entertainment districts are--and will continue to be--a significant homeland security concern due to the large numbers of people who gather at these locations. Both the June 12, 2016, mass shooting at the Pulse Nightclub in Orlando, Florida, and the October 2, 2017, mass shooting at the Route 91 Harvest Country Music Festival in Las Vegas, Nevada, are tragic and recent examples of the devastation that continues to occur surrounding large gatherings of people. Entertainment districts share many similarities with traditional special events; however, research indicates that successful management of these areas requires a much more robust and comprehensive strategy to effectively maximize safety while maintaining an enjoyable atmosphere. The concept of place management has received significant attention in research regarding managing entertainment districts. This thesis analyzes how the actions of those controlling the businesses have a direct impact on the crime and disorder within a particular location. This thesis provides a comprehensive overview of the related literature and case studies from several active entertainment districts. The goal of this research is to identify and outline a collection of successful smart practices that jurisdictions should consider adopting based on the particular needs and expectations of their communities."
Naval Postgraduate School (U.S.); Naval Postgraduate School (U.S.). Center for Homeland Defense and Security
Penn, Charles A.
2019-03
-
Reducing the Potential Consequences of Nuclear Power Using Small Modular Reactors
From the Thesis Abstract: "In order for commercial nuclear power to remain successful in the United States, several things need to occur: advancement of newer technologies and replacement of aging infrastructure with a new generation of safe reactors that are reliable, adaptable to the environment, cost-effective, and energy efficient to meet the nation's energy demands into the future. To accomplish this, the United States must be able to identify true risk rather than the perceived risk of civilian nuclear power and have solutions to manage it. Risk management includes reducing the U.S. carbon footprint, which is contributing to global warming. The nation also must find a way to close the loop on nuclear waste through reprocessing and recycling. Furthermore, by reducing their size as compared to existing commercial power plant operations, the United States can locate new plants where energy is most needed. Finally, this thesis demonstrates how the potential consequences of a nuclear plant accident can be reduced to acceptable levels through the use of small modular reactors."
Naval Postgraduate School (U.S.); Naval Postgraduate School (U.S.). Center for Homeland Defense and Security
Corbin, Scott
2019-03
-
You Can't Always Get What You Want: Employee and Organizational Responses to Perceived Workplace Injustices and Their Relationship to Insider Attacks
From the Thesis Abstract: "Insider threats are a 'wicked' problem. This thesis investigates three questions: how do employees respond to perceived workplace injustice, what is the relationship between employee responses to perceived workplace injustices and insider attacks, and how can organizations prevent disgruntled employees from committing attacks? These questions were answered using a thorough literature review and case studies. Employees respond in one, or a combination, of four ways: exit, loyalty, voice, and counterproductive work behaviors, as illustrated by the researcher's grievance response model. The researcher was unable to identify specific employee responses that led to attacks due to a lack of data and multiple, contradictory, and missing narratives. Organizations may be able to prevent employees from committing attacks by applying the grievance response model, ensuring grievance procedures are consistent and transparent, and offering alternative dispute resolution programs."
Naval Postgraduate School (U.S.); Naval Postgraduate School (U.S.). Center for Homeland Defense and Security
Reed, Tracey
2019-03
-
U.S. Citizenship and Immigration Services' Effort to Identify Terrorism Threats: Is Social Media Intelligence (SOCMINT) the Next Tool?
From the Thesis Abstract: "Terrorists use the internet to facilitate every aspect of their nefarious activity. This use creates a novel research question. To what degree can an open-source social media intelligence (SOCMINT) gathering and analysis capability assist U.S. Citizenship and Immigration Services (USCIS) in accomplishing its homeland security mission? The critics of SOCMINT argue it is an unnecessary, problematic, and ill-advised effort based on efficacy, data management, and constitutional grounds. Therefore, the thesis explores the past efforts, necessity, and efficacy of open-source SOCMINT in identifying potential fraud, public safety, and/or national security concerns (threats) from immigrants seeking immigration benefits. The research consists of qualitatively examining issue rhetoric--the debate and discussion--between the critics and supporters of SOCMINT. The Profiles of Individual Radicalization in the United States dataset provides a quantitative, evidence-grounded means to gain insight on radicalized immigrants' use of the internet and social media in plotting attacks and the potential for threat detection. The research demonstrates threats among immigration benefit seekers exist, and that SOCMINT is a viable means to identify and mitigate the threats. The thesis concludes the propositions for SOCMINT are valid and the critics' objections should not impede the effort. The thesis recommends USCIS continue SOCMINT, ensuring the endeavor observes a balance between security and liberty."
Naval Postgraduate School (U.S.); Naval Postgraduate School (U.S.). Center for Homeland Defense and Security
Thompson, Erik M.
2019-12
-
Wireless Robotic Communications in Urban Environments: Issues for the Fire Service
"Firefighters are tasked with conducting search and rescue operations at incidents ranging from minor smoke conditions to multi-agency disasters. In each instance, a rapid risk assessment must be conducted based on preliminary dispatch information. Small lightweight 'man portable' robots are a natural fit for gaining improved situational awareness, yet few have been employed for this application. The problems encountered in using wireless robots in urban environments are among the primary reasons. This thesis focuses on the wireless link between the robot and the firefighter employing it. The work presented is useful for policy makers in allocating public safety spectrum, firefighters in pre-planning responses, and engineers for designing relevant control systems. While the arguments rest on a technical footing of test data and models, the paper is written primarily for a non-technical audience. A technology acceptance model is developed for employing robots wirelessly. Test data is presented showing the debilitating effects of interference from employing multiple robots concurrently. Models are applied to predict signal loss in tunnels and urban environments, and results indicate an optimal frequency range exists between 500 MHz and 1 GHz. A case is presented to allocate spectrum in this range using a priority access protocol."
Naval Postgraduate School (U.S.). Center for Homeland Defense and Security; Naval Postgraduate School (U.S.)
Hough, George
2008-03
-
Mitigating Information Overload: The Impact of 'Context-Based Approach' to the Design of Tools for Intelligence Analysts
"With the explosion of available data from a variety of sources, it has become increasingly difficult to keep pace with the amount of arriving data, extract actionable information, and integrate it with prior knowledge. Add to that the pressures of today's fusion center climate and it becomes clear that analysts, police officers, and executives' ability to make rapid, sound decisions is severely compromised. The combination of circular reporting and the complexity of data sources are contributing to information overload. Law enforcement agencies realize this cannot be resolved by continuing to hire more intelligence analysts. Instead, they must begin leveraging technology. The Illinois State Police is utilizing a technology artifact in its Statewide Terrorism and Intelligence Center (STIC) which incorporates technology built from the context of these users. This thesis uses a survey instrument to evaluate the effectiveness of this technology on reducing circular reporting and the handling of complex data sources. The findings conclude that intelligence analysts within STIC perceive that information overload exists, and both the complexity of data sources as well as circular reporting minimizes their effectiveness and efficiency. Furthermore, this technology effectively improves these negative effects, and increases the STIC's ability to better serve communities."
Naval Postgraduate School (U.S.). Center for Homeland Defense and Security; Naval Postgraduate School (U.S.)
Brueggemann, Charles E.
2008-03
-
Applying Network Theory to Develop a Dedicated National Intelligence Network
"Adaptive terrorist organizational structure and the lack of intelligence sharing were to blame for terrorist attacks on September 11, 2001. Because terrorist groups are moving toward a less predictable, but more diverse, dynamic, and fluid structure, effective combativeness of terrorism requires fighting terrorists with a network. This network must be capable of collecting and sharing credible, reliable and corroborative information on an unprecedented scale, transcending geographic, agency, and political boundaries. This thesis demonstrates utilization of a network-theory approach for sharing information, which will be argued, can provide insight into the system dynamics of the U.S. IC because it allows a systematic, comparative analysis of the system representation and fundamental problems associated with information sharing. The problems associated with past intelligence failures can be overcome with such a system because the use of a dedicated, nationally networked system will allow completion of three primary tasks: (1) examination of the strength of criminal/terrorist connections, (2) identification of suspects and mapping of networks, and (3) prediction of future behavior and better likelihood of prevention, response, and prosecution. A dedicated national networked intelligence-sharing system called DNIN (Dedicated National Intelligence Network), including geographic areas, regional centers, personnel, computer IT networks, and policy options is discussed."
Naval Postgraduate School (U.S.). Center for Homeland Defense and Security; Naval Postgraduate School (U.S.)
Tindall, James A., 1953-
2006-09
-
From the Battlefield to the Homeland: Building the Case for Network-Centric Response
From the thesis abstract: "Our nation's ability to respond to natural or man-made disasters has remained relatively unchanged since the attacks of 9/11. Current response operations are characterized by the inability to efficiently produce a collaborative and effective response to incidents of national significance and address the challenges of the Information Age. The military has adapted network-centric tenants and principles from business applications to effectively operate in the Information Age and increase mission effectiveness. These tenants and principles can be adapted by responders to address current deficiencies and increase mission effectiveness. Implementation of "network-centric response" is both technologically and organizationally feasible. Network-centric response operations would allow responders to meet the challenges and leverage the opportunities of the Information Age, resulting in increased mission effectiveness."
Naval Postgraduate School (U.S.). Center for Homeland Defense and Security; Naval Postgraduate School (U.S.)
Peterson, Michael C.
2007-03
-
Impact of Contextual Background Fusion on Perceived Value and Quality of Unclassified Terrorism Intelligence
"There are millions of police, fire, public health, emergency medical, emergency management, and public sector homeland security professionals ready and willing to assist in the global war on terror (GWOT) and current strategies to strengthen homeland security include the provision of unclassified intelligence products to these non traditional recipients (NTR). Simply pushing intelligence products to NTR is not enough, NTR must possess adequate contextual background in order to effectively utilize intelligence provided by the Intelligence Community (IC) in implementing strategies in information driven and risk based prevention and response. Given the diversity of NTR, distribution of 'one size fits all' products ensures that the intelligence will fit no one's needs. This thesis researches the impact of intelligence contextual background fusion (CBF) through the use of hyperlink technology and evaluates the likelihood of hyperlink acceptance by NTR. By utilizing DHS and FBI customer satisfaction survey questions in 'quality' and 'value' factors along with previously validated Technology Acceptance Model (TAM) questions in 'ease of use' and 'usefulness' factors, this research finds that CBF significantly improves both perceived value and quality, and finds that NTR overwhelmingly prefer a CBF product. NTR broadly accepted hyperlink technology in this application."
Naval Postgraduate School (U.S.). Center for Homeland Defense and Security; Naval Postgraduate School (U.S.)
Eaneff, Charles
2007-03
-
Cross-Sector Collaboration Among Critical Infrastructure Utilities: A Case Study for Assessing Relational Capacity
From the thesis abstract: "This nation relies on the network of critical infrastructures to maintain economic superiority, public health, and military strength. Under this premise, the federal government established the National Infrastructure Protection Plan (NIPP) to leverage national and regional preparedness. Hurricane Katrina demonstrated that, collectively, the infrastructure sectors are not prepared to respond to local and regional disasters using national strategies and resources. There remains a lack of capability to assess an organization's capacity to collaborate. To better understand the enablers and barriers to collaboration within a region's infrastructure system, this study reports the findings of interviews of 13 middle managers and 10 top managers from the utility organizations in and around Mesa, Arizona. In addition to interviews, the managers in this case study completed a survey on collaborative capacity, which provides a lens for examining the factors that enable and impede cross-sector collaboration in the City of Mesa and the interdependent sectors. Finally, the managers were requested to provide individual interpretations of the survey data and recommendations for improvement on the 'Response Form.' Incorporating this feedback will be critical for starting the momentum for change."
Naval Postgraduate School (U.S.). Center for Homeland Defense and Security; Naval Postgraduate School (U.S.)
Draper, Brian Allen
2007-09
-
Unleashing Our Untapped Domestic Collection is the Key to Prevention
From the thesis abstract: "Human intelligence from informants, criminals, good-Samaritans and cooperative individuals is the key to neutralizing major terrorist plots. The need for domestic intelligence collection in the United States is supported by a review of the national strategies and data collected from statements of Federal Bureau of Investigation and Department of Homeland Security officials. Unfortunately, scholarly articles and commentaries point to an inadequate human intelligence program five years after the events of September 11, 2001. This thesis presents a community based exploitation strategy for the expansion of domestic collection through the leveraging of state and local law enforcement, public and private collection. The strategy would take advantage of the significant untapped resources available to state and local law enforcement, public and private entities by encouraging sharing and discouraging hoarding. The technology would do the heavy lifting by sifting through the vast amounts of available information to find the key piece of data. Technology can assist analysts by allowing them to exploit the semantic process of the Global Justice Extensible Markup Language (XML), a computer language. Together, this exploitation strategy and technology will become part of new homeland security doctrine that could unleash the full potential of domestic collection and provide the missing pieces of the intelligence puzzle."
Naval Postgraduate School (U.S.). Center for Homeland Defense and Security; Naval Postgraduate School (U.S.)
Duarte, Nestor
2007-09
-
National Imperative to Establish a Domestic Medical Intelligence Center
"The United States does not have a centralized organization tasked with the oversight or implementation of a domestic medical intelligence program. Organizations throughout the nation have adopted a variety of definitions and operating procedures related to medical intelligence; however, they are inconsistent. Additionally, most jurisdictions limit medical intelligence to epidemiological surveillance. This thesis will propose the structure, governmental organization, data sets, and reporting for a domestic medical intelligence center. This center will require close partnership with other federal agencies and state, local, tribal, and territorial (SLTT) governments. In addition, this thesis will analyze medical intelligence operations within the Armed Forces Medical Intelligence Center, the Department of Homeland Security Office of Health Affairs, the Metropolitan Washington Fusion Center, and the Los Angeles Terrorism Early Warning Group. As this thesis shows, the development of a domestic medical intelligence center, covering a wide range of data sets, will allow for the effective collection, integration, analysis, and dissemination of both tactical and strategic actionable intelligence for federal and SLTT governments and private sector partners. These actions will assist in addressing this significant gap and increasing our nation's level of preparedness thereby improving our nation's response to large scale incidents, both naturally occurring and man-made."
Naval Postgraduate School (U.S.). Center for Homeland Defense and Security; Naval Postgraduate School (U.S.)
Natarajan, Nitin
2007-09
-
Improving the Resiliency of the Natural Gas Supply and Distribution Network
"To accommodate the nation's escalating demand for natural gas, which is expected to increase 700% by 2030, the natural gas industry will likely build several new liquefied natural gas (LNG) import terminals. The location of these new terminals is an important strategic decision that significantly impacts the resiliency of the nation's natural gas supply and distribution network. Due to public opposition in many communities and shortcomings in the current licensing process, any additional LNG import terminals are apt to be concentrated along the Gulf Coast. Unfortunately, this impending concentration will increase the vulnerability and diminish the resiliency of this critical infrastructure. This thesis uses network theory to forecast how the location of new terminals will impact the risk, vulnerability, and resiliency of the natural gas supply and distribution network. To enhance the resiliency and reduce the vulnerability of this critical infrastructure, we argue network analysis methodology should be applied during the terminal siting process. The Federal government must act quickly to facilitate siting of terminals in locations that reduce the vulnerability and improve the resiliency of the natural gas network. Failure to act will squander an unprecedented opportunity to shape and intelligently design this portion of the nation's critical infrastructure."
Naval Postgraduate School (U.S.). Center for Homeland Defense and Security; Naval Postgraduate School (U.S.)
Nadeau, John
2007-03
-
Evolution of Regional Counterterrorism Centers Within a National Counterterrorism Network: Is It Time to Fuse More Than Information?
From the thesis abstract: "There is widespread consensus among both policymakers and intelligence professionals that domestic counterterrorism efforts remain hampered by the lack of an effective national intelligence network that fully integrates the Homeland's entire intelligence assets and other related Homeland Security capabilities into one national counterterrorism system. The failure to unify our domestic counterterrorism efforts inhibits timely and complete information sharing and the evolution of a more robust Homeland Security prevention and response capacity. To achieve counterterrorism synergy we need a holistic approach that removes the intelligence element from its vacuum and fuses it in the counterterrorism crucible, along with the investigations element and related Homeland Security prevention and response operational elements, in Regional All-Hazards, Disaster and Anti-Terrorism Resource (R.A.D.A.R.) centers. These regional and super-regional R.A.D.A.R. centers can then be united into a National Counterterrorism Network under the auspices of the National Counterterrorism Center and the National Operations Center. Fusing this multi-government level, multi-disciplinary collaboration of intelligence, investigative and operational assets, along with the resources of key private sector groups into one unified organism would eliminate information sharing barriers, and will ensure the most efficient and effective use of Homeland Security resources to prevent and respond to terrorist attacks and natural disasters."
Naval Postgraduate School (U.S.). Center for Homeland Defense and Security; Naval Postgraduate School (U.S.)
Leavell, Ron
2007-03
-
Regional Mass Fatality Management in Pandemic Surge
"National and state planning documents designate public health as the lead for mass fatality management (MFM). MFM planning, however, demands multiagency participation and full public-business-government leverage. This thesis explores pathways to reach operational regional MFM capability in Ohio, but also has implications for MFM planning across the nation. Survey research was conducted with three key MFM stakeholder groups: county coroners, emergency management directors, and health commissioners. The survey addressed realistic and actionable MFM planning by: 1) identifying state guidance gaps; 2) identifying local/regional operational gaps; 3) assessing regional resource capabilities; 4) categorizing proposed solutions to address identified gaps; and 5) listing legal, financial, and organizational barriers to the solutions. Findings show that the key stakeholder communities are confused, with a willingness to build MFM capacity that is accompanied by worries about who should lead and how to coordinate efforts. Research recommendations include a three-sector collaboration (government-business-citizens) operating at the regional level and public engagement. Another recommendation calls for alignment of state guidance and regional operations with The Joint Task Force Civil Support Working Group MFM areas: command and control; body identification; medico-legal investigation; morgue operations; funeral services; final disposition; and family assistance and behavioral health services."
Naval Postgraduate School (U.S.). Center for Homeland Defense and Security; Naval Postgraduate School (U.S.)
Stanley, Sharon A. R.
2008-12
-
On Strategy: The War on Terror in Context
"The War on Terror, as the outcome of the al Qaeda attacks on the World Trade Center and the Pentagon on September 11, 2001, promises to be the effort of a generation. If it is to win, the United States must approach it in a manner reminiscent of successes in past wars: with clearly defined and obtainable national objectives, and a unified national strategy to obtain those objectives. In addition, it must establish a clear long-term vision for transforming its efforts and its institutions from the industrial age to the information age as the new domain for waging war. This thesis examines the War on Terror from several perspectives. First, is the strategic context in which the war is being conducted, particularly the issues involved in its prosecution. Second, the Vietnam War and the War on Terror are examined in historical context to determine if the United States is repeating the strategic mistakes that led to its defeat in Vietnam. Third, transformation imperatives are identified which require the Nation to consider what it must do to win the War on Terror while simultaneously preparing for the emergence of greater forms of information age warfare. Finally, an adaptive capabilities-based approach is suggested for the United States to deal with the new strategic reality it faces."
Naval Postgraduate School (U.S.). Center for Homeland Defense and Security; Naval Postgraduate School (U.S.)
Reed, Donald J.
2006-03
-
Radio Interoperability: Addressing the Real Reasons We Don't Communicate Well During Emergencies
"Concerns about inadequate radio communications at the scene of disasters predate 9/11, and have been a focal point of homeland security funding since 2001. Under the umbrella term 'interoperability,' grant funding is facilitating the recent deployment of equipment to allow field personnel to patch radio systems together, with the expectation of immediate improvement of emergency scene communications dysfunction. This thesis argues that there are numerous causal factors for inadequate disaster communications. Communications impediments include insufficient radio infrastructure, behavioral reactions by people in stressful situations, intergovernmental relations, inadequate procedures and training, and general lethargy over the need to institute special operating policies differing from routine practices. The sole reliance upon technological solutions, without proportionate training and practice greatly reduces the effectiveness of radio patching equipment. Quite opposite from the intended effect, patching equipment, in the hands of those only minimally acclimated to radio system architecture, is likely to trigger unintended consequences of chaotic system overload (by combining two or more busy channels) and sector vulnerability (by combining unsecured general public systems with previously isolated public safety systems). Our goal is to provide a thought-provoking examination of the entire realm of emergency scene communications issues and practical recommendations beyond superficial technological solutions."
Naval Postgraduate School (U.S.). Center for Homeland Defense and Security; Naval Postgraduate School (U.S.)
Timmons, Ronald P.
2006-03
-
Essential Elements for Preparedness Planning
"The author of this thesis asserts that the unique nature of the modern threat environment removes all justifiable options for the providers and users of threat information to operate at arm's length from one another. If the two communities are not integrated to the point that collaboration can proceed unhindered, the flow of information between them will likely be sluggish, unidirectional and largely irrelevant. Collaboration involves more than just the flow of new information, however. It requires the exchanging of ideas, the challenging of assumptions and biases, and leads to the formation of a networked environment that is needed to defeat our networked adversaries. An organization that fails to accomplish this level of integration and collaboration runs the risk of finding itself preparing for yesterday's attack, and failing to prevent, prepare for or adequately respond to tomorrow's threat. The 9/11 Commission's synthesized protocol for scenario development and intelligence tasking is presented as a means of fixing this problem."
Naval Postgraduate School (U.S.). Center for Homeland Defense and Security; Naval Postgraduate School (U.S.)
O'Brien, John E.
2006-03
-
21st Century National Public Health System
This thesis from the Center for Homeland Defense and Security discusses the role that public health systems can play in the even of a national health emergency, using the Canadian cases of SARS as a case study. "The attention that SARS created in 2003 has influenced public and political perceptions about the risks associated with infectious diseases and the role the public health system should play in national security. This comparative case study was conducted to examine the Canadian public health's system response to SARS in order to formulate recommendations for the U.S. public health system. This analysis demonstrated that the governmental organizational structure of the U.S. public health system does not support its current mission or its new responsibilities for public health security. A national public health system is needed to support dual missions: the traditional mission of tailoring public health programs specific to the social and demographic needs of the citizens; and the new mission of public health security. In order to transform the current U.S. public health system into a national public health system two critical components must be addressed at the federal, state, and local level: 1) organizational capacity and 2) service delivery. Recommendations are provided regarding the way forward at the federal level and work needing to be done at the state and local level towards building a national system capable of meeting the public health threats of the 21st century."
Naval Postgraduate School (U.S.). Center for Homeland Defense and Security; Naval Postgraduate School (U.S.)
Jones, Mary J.
2008-09
-
Dynamic Personal Identity and the Dynamic Identity Grid: How Theory and Concept Can Transform Information into Knowledge and Secure the American Homeland
From the thesis abstract: "Personal identification systems and processes; including those used for transliteration, travel visas and driver licenses; have failed to adequately adapt to the nation's new asymmetric threat. After September 11th, personal identification information about the attackers began to emerge and it became clear that it could have been used to identify the attackers prior to their terrorist acts. This study used qualitative research methods to construct meaning from previously uncorrelated issues and employed a three-stage analytical approach that grounded the research. The tertiary stage identified themes that had theoretical relevance and, in turn, a direct impact on the proposed solutions. The study borrowed concepts from a handful of formal qualitative methods; including grounded theory, content/document analysis, interviewing, triangulation and conceptual modeling. It found that ambiguity and ethnocentricity is inherent in American name-based identity collection practices, systems and processes; that consistently collecting specific name-based characteristics could be highly beneficial to combating terrorism; and that by leveraging the knowledge created by consistent collection practices, systems and processes we can transform name-based identity into a dynamic and leveragable commodity. To effectively do so, this project presents a substantive theory, Dynamic Personal Identity, and a conceptual technological system, the Dynamic Identity Grid, as potential solutions."
Naval Postgraduate School (U.S.). Center for Homeland Defense and Security; Naval Postgraduate School (U.S.)
Burchnell, Ryan
2008-09
-
Public-Private Sector Passenger Rail Intelligence and Terrorism Information Sharing
What is an effective methodology for intelligence and terrorism information sharing within a private passenger rail organization and with their external public partners? This thesis uses three distinct research methodologies that collectively lead to an effective strategy for intelligence and terrorism information sharing within a private passenger railroad, and with its external public partners. First, key Amtrak personnel were interviewed to establish and confirm how intelligence information currently flows within Amtrak and with its external intelligence community and law enforcement partners. Second, a survey of key Amtrak operations personnel was conducted to establish Amtrak's intelligence priorities and requirements. Finally, this study examined two case studies on potential models for intelligence and terrorism information sharing. The two main outcomes of this research were that by leveraging the power of informal networks in the context of the abstract megacommunity framework, an effective strategy for intelligence and terrorism information sharing was developed. Also, based on the needs of front line railroad operating personnel, an intelligence product that helps to protect the public and the nation's critical railroad infrastructure was developed.
Naval Postgraduate School (U.S.). Center for Homeland Defense and Security; Naval Postgraduate School (U.S.)
Crosbie, William L.
2008-09
-
Managing the Reputation of DHS and Its Components
"The Department of Homeland Security and some of its components have gained less than favorable reputations since DHS was stood up in 2003. Based upon the available literature on reputation and upon data collected from a Delphi survey of public affairs officers within DHS and its components, this thesis addresses the value, measurement, and management of reputation for DHS and its components. It also looks at the relationship between the reputation of DHS and that of its components. This thesis shows that reputation has a strong impact on such areas as public trust, Congressional funding, and employee morale. It offers several recommendations for how DHS and its components can manage their reputations more effectively. These recommendations include understanding the value of reputation, identifying key stakeholders, measuring stakeholders' perceptions, and addressing 'reputation spillover.' It also adds to the available literature on reputation, which comes primarily from the private sector."
Naval Postgraduate School (U.S.). Center for Homeland Defense and Security; Naval Postgraduate School (U.S.)
Johnson, Bobbie L.
2009-06
-
Closing the Gap: Measuring the Social Identity of Terrorists
"Studies of terrorism today focus on psychological and behavioral aspects of individuals. Most research shows that using a single model in an attempt to profile terrorists psychologically is problematic, if not impossible. However, using two well-established theories from social psychology, Social Identity Theory and Social Distance Theory, allows the development of a practical model to develop a social profile of a terrorist group. From that, it is further possible to use the resulting social profile to compare terrorist groups against each other in order to develop predictive models as to the propensity of violence of a particular group. To test this, the research within this thesis uses open source interviews of the terrorist group HAMAS and the Popular Front for the Liberation of Palestine (PFLP), taken from on-line magazines, on-line journals, on-line newspapers, and official web sites, to serve as respondents to a survey instrument developed from other social identity studies. The results of this research shows that a social profile of a terrorist group can be developed from standard social identity measurement survey instruments, and it is possible to develop practical methods for comparing groups, based on their social identities, to predict their propensity to violence."
Naval Postgraduate School (U.S.). Center for Homeland Defense and Security; Naval Postgraduate School (U.S.)
Ludwick, Keith W.
2008-09
-
Strategy for Local Law Enforcement Agencies to Improve Collection Analysis and Dissemination of Terrorist Information
From the thesis abstract: "Local law enforcement agencies play a significant role in domestic counter-terrorism and homeland security. The intelligence function of law enforcement agencies enhances their ability to detect criminal activity related to terror groups, as well as the ability to prevent, or respond to a terrorist attack. This research project identifies policies and procedures that could be implemented by local law enforcement agencies to enhance cooperation and collaboration with other public sector agencies, private sector security providers, and the general public. The policies and procedures are based on intelligence-led policing and public-private partnerships, and will generate the ability to increase the flow of information disseminated from, and collected by, law enforcement intelligence entities. The resulting intelligence developed by law enforcement intelligence can be pushed up to the state and national level to improve the nation's ability to detect potential terrorist activity, protect citizens, and safeguard critical infrastructure."
Naval Postgraduate School (U.S.). Center for Homeland Defense and Security; Naval Postgraduate School (U.S.)
Cleary, Christopher
2006-03
-
Measuring Preparedness: Assessing the Impact of the Homeland Security Grant Program
"Since the creation of the U.S. Department of Homeland Security (DHS) in 2003, DHS has awarded over 28.7 billion dollars in grant funds to states, locals, territories and tribal entities to enhance prevention, protection, response, and recovery efforts. Yet, the homeland security community continues to struggle with measuring the impact these investments have made toward improving preparedness. The 2009 Federal Preparedness Report highlighted that the nation lacks risk-based performance metrics, accurate data, and analytical tools to measure how these investments have improved preparedness. This thesis outlines the challenges of measuring preparedness across the numerous federal funding streams, assesses the prevalence of these factors, and proposes five recommendations for improving the capacity to answer how prepared we are; how prepared we need to be; and how we close the gap between the two."
Naval Postgraduate School (U.S.). Center for Homeland Defense and Security; Naval Postgraduate School (U.S.)
Broughton, Pamela N.; Haverkos, Pam
2009-03
-
Cyber Federalism: Defining Cyber's Jurisdictional Boundaries
From the thesis abstract: "Cybersecurity was once a federal government responsibility because cyber had limited impact on state and local entities, but today's cyber risks to critical infrastructure and public services affect all levels of government. This thesis explores the current state of cybersecurity in the United States and examines what role each level of government--federal, state, and local--should play in protecting against and responding to a significant cyber incident. It evaluates current state and local cyber capabilities and outlines the capabilities these governments must develop to play a larger role in this growing homeland security mission. The research concludes that state and local governments should have an important role in cyber preparedness and cyber incident response, but many of these entities lack the capabilities necessary to play a meaningful role. Furthermore, current policies fail to provide clear jurisdictional boundaries between levels of government. Therefore, this thesis recommends that the nation develop a legal framework to improve jurisdictional boundaries, prioritize cyber investments at the state and local level, and improve cyber education. These steps will strengthen state sovereignty and improve the nation's cyber posture."
Naval Postgraduate School (U.S.); Naval Postgraduate School (U.S.). Center for Homeland Defense and Security
Rosner, Eric
2017-12
-
E Pluribus Analysis: Applying a 'Superforecasting' Methodology to the Detection of Homegrown Violence
From the thesis abstract: "This thesis examines investigative decision making, cognitive biases, talent sharing, and the relationship between the random nature of lone-actor violence and a set of predefined decision-making protocols. This research included running four simulations using the Monte Carlo technique, which illustrated that with the dedication of additional resources came a concomitant effect of diminishing returns, opportunity cost, and exposure to liability. The simulations also suggested that regardless of an investigative agency's decision-making processes, the outcome relies on the randomness of the event. To demonstrate a prototype for a new method of threat analysis, a 'superforecasting' team of analysts participated in an experimental survey. Nine participants reviewed five threat scenarios and assigned a score based on factors including the potential for violence and immediacy of the threat. Analysis in the survey was accurate for four out of five scenarios. Survey participants also answered six prospect theory questions, set in a homeland security context, to assess their decision making under uncertainty. Considered together, the results from the simulations and the two-part survey explain the relative strength of certain threat assessments. They distinguish what may be detectable from what is statistically unpredictable through the use of a collaborative and multidisciplinary method of analysis."
Naval Postgraduate School (U.S.); Naval Postgraduate School (U.S.). Center for Homeland Defense and Security
Huse, James G.
2018-03
-
Innovation Increase: How Technology Can Create Open, Decentralized, and Trackable Data Sharing
From the thesis abstract: "University research must be widely shared to increase innovation; however, regulated and sensitive information must be secured to prevent theft and malicious misuse. The ideal sharing environment will allow universities to openly and, with trust, share verified unique data that is both immutable and ultimately traceable. Many technologies today facilitate pieces of the ideal sharing environment, but are unable to provide all required capabilities. My proposed technology solution capitalizes on the benefits of existing technologies and also proposes new technologies to achieve the ideal sharing environment. If this technology proves successful for university research"
Naval Postgraduate School (U.S.); Naval Postgraduate School (U.S.). Center for Homeland Defense and Security
Hupka, Erica
2018-03
-
Obsessive-Compulsive Homeland Security: Insights from the Neurobiological Security Motivation System
From the thesis abstract: "This thesis explores the impact of human neurobiology on the securitization process within the homeland security field. It proposes a model for how activation of the neurobiological security-motivation system can lead to securitization in response to a security speech act. It explores the model by qualitatively analyzing three examples of securitization processes in the homeland security field for security motivation markers: the 9/11 terrorist attacks, Russian social media propaganda, and the 2016 U.S. presidential election. This thesis found evidence that security motivation may be having an impact on security-related decisions within the homeland security field through its bias toward compulsive precautionary behavior rather than cognitive reassessment. It recommends 1) further study of security motivation triggers and duration of activation; 2) changes in the communication of potential threats by security practitioners; and 3) exploration of how trauma-informed practices can protect cognitive capacity and reduce compulsive security-related behavior."
Naval Postgraduate School (U.S.); Naval Postgraduate School (U.S.). Center for Homeland Defense and Security
Madrigal, Marissa D.
2018-03
-
Technological Solution for the Reduction of Police Pursuits: Implications for Increased Investment
From the Thesis Abstract: "The Department of Justice (DOJ) is the primary federal funding source for state, local, and tribal law enforcement departments throughout the United States. In recent years, there has been a call to address the risks associated with traditional vehicle pursuit methods. The adoption of pursuit management technology has been identified as an effective and beneficial alternative to established kinetic methods. The established methods are defined by contact with the pursued vehicle that does result in a greater risk for collateral damage. By acting in its role as a major funding source, the DOJ can provide the necessary framework for the acquisition of pursuit management technology by state, local, and tribal departments. This thesis evaluates the sources relating to pursuit management technology, DOJ funding activities, departmental pursuit policy, and DOJ policy reform efforts. Policy prescriptions are provided based on the information presented in the evaluation. It is recommended that the DOJ redirect more funds toward the acquisition of pursuit management technology to improve departmental efficiency and strategic efficacy."
Naval Postgraduate School (U.S.); Naval Postgraduate School (U.S.). Center for Homeland Defense and Security
Troxell, Ian
2019-09