Advanced search Help
Publisher is Naval Postgraduate School (U.S.)
Clear all search criteria
Only 2/3! You are seeing results from the Public Collection, not the complete Full Collection. Sign in to search everything (see eligibility).
-
Architecture for Network Centric Operations in Unconventional Crisis: Lessons Learnt from Singapore's SARS Experience
"Singapore and many parts of Asia were hit with Severe Acute Respiratory Syndrome (SARS) in March 2003. The spread of SARS lead to a rapidly deteriorating and chaotic situation. Because SARS was a new infection, there was no prior knowledge that could be referenced to tackle such a complex, unknown and rapidly changing problem. Fortunately, through sound measures coupled with good leadership, quick action and inter-agency cooperation, the situation was quickly brought under control. This thesis uses the SARS incident as a case study to identify a set of network centric warfare methodologies and technologies that can be leveraged to facilitate the understanding and management of complex and rapidly changing situations. The same set of methodologies and technologies can also be selectively reused and extended to handle other situations in asymmetric and unconventional warfare."
Naval Postgraduate School (U.S.)
Chee Bin, Tay; Whye Kee, Mui
2004-12
-
U.S. Citizenship and Immigration Services' Effort to Identify Terrorism Threats: Is Social Media Intelligence (SOCMINT) the Next Tool?
From the Thesis Abstract: "Terrorists use the internet to facilitate every aspect of their nefarious activity. This use creates a novel research question. To what degree can an open-source social media intelligence (SOCMINT) gathering and analysis capability assist U.S. Citizenship and Immigration Services (USCIS) in accomplishing its homeland security mission? The critics of SOCMINT argue it is an unnecessary, problematic, and ill-advised effort based on efficacy, data management, and constitutional grounds. Therefore, the thesis explores the past efforts, necessity, and efficacy of open-source SOCMINT in identifying potential fraud, public safety, and/or national security concerns (threats) from immigrants seeking immigration benefits. The research consists of qualitatively examining issue rhetoric--the debate and discussion--between the critics and supporters of SOCMINT. The Profiles of Individual Radicalization in the United States dataset provides a quantitative, evidence-grounded means to gain insight on radicalized immigrants' use of the internet and social media in plotting attacks and the potential for threat detection. The research demonstrates threats among immigration benefit seekers exist, and that SOCMINT is a viable means to identify and mitigate the threats. The thesis concludes the propositions for SOCMINT are valid and the critics' objections should not impede the effort. The thesis recommends USCIS continue SOCMINT, ensuring the endeavor observes a balance between security and liberty."
Naval Postgraduate School (U.S.); Naval Postgraduate School (U.S.). Center for Homeland Defense and Security
Thompson, Erik M.
2019-12
-
You Don't Have to Live Like a Refugee: An Analysis of Selected Refugee Resettlement Programs to Improve Comprehensive Integration Outcomes in 'Free Case' Refugee Resettlement
From the Thesis Abstract: "By law, refugees entering the United States must become self-sufficient as quickly as possible. But successful integration means more than achieving this benchmark. True integration involves social inclusion and ties to community and nation--particularly difficult for 'free case' refugees who have no family in the U.S. and are wholly reliant upon resettlement organizations. This thesis asks the question: How can free case refugee resettlement practices be improved to enhance the likelihood of sociocultural integration and create stronger ties to the United States? A comparative assessment of three resettlement programs was undertaken to identify best practices. Integration success was assessed through statistical measures such as percentage of refugees who self-migrated after initial resettlement, and subjective measures of wellbeing and satisfaction as reported by refugees themselves. The analysis found refugees served by programs that lasted two years, as opposed to one year or less, reported a high degree of wellbeing and satisfaction, and less secondary migration. Moreover, refugees who were required to stay in a location for an extended period were less likely to engage in secondary migration afterward. This thesis recommends national refugee resettlement policy be updated to require local resettlement programs last a minimum of two years and that free case refugees must remain in their original resettlement location in exchange for three years of resettlement assistance."
Naval Postgraduate School (U.S.); Naval Postgraduate School (U.S.). Center for Homeland Defense and Security
Bierman, Wilhelm F.
2019-12
-
How Does the Democratic Party of Japan Affect Security Policy? High-Profile Stumbles and Quiet Progress
"When the Democratic Party of Japan (DPJ) took power in Japan in 2009, both Japanese and American observers feared sea changes in Japanese security policy. Compared to the longgoverning and familiar Liberal Democratic Party (LDP), the DPJ seemed young and inexperienced, farther left and less ideologically coherent, and eager to make policy change for change's sake. The DPJ has appeared to earn this reputation over the last three years, as exemplified by its early mishandling of reorganization plans for U.S. military installations in Okinawa, which prompted widespread criticism both within Japan and from U.S. alliance managers and observers. This notion of a hapless DPJ is only partly correct. The DPJ government has indeed begun to popularize and politicize Japanese security policy, leaving security decisions more exposed to political and public leverage. This reflects the party's anti-bureaucratic policymaking instincts, its top-heavy structure, and its promotion of two-party competition. In some ways, though, the party has been a victim of its own success. It has stumbled most badly over the most high-profile, politically salient issues: military base politics, incidents surrounding territorial disputes, North Korea crisis management. This has reflected poor coordination more than misguided or unpopular policy stances. But at the same time, on many substantively important but less politically salient issues -- arms non-export policies, military-military relations with South Korea, the updating of National Defense Program Guidelines -- the DPJ is quietly progressing along a security policy trajectory that is familiar, constructive, and not particularly worrying for either the U.S. or the Japanese public. This pattern may be somewhat reassuring for American alliance managers, but it suggests the need to watch for gradual politicization of previously under-the-radar security matters. It also suggests that the handling of security policy has new potential to vex all incumbent Japanese governments, DPJ-led or otherwise, and thereby to contribute to governance destabilization across the board in Japan." Note: This document has been added to the Homeland Security Digital Library in agreement with the Project on Advanced Systems and Concepts for Countering WMD (PASCC) as part of the PASCC collection. Permission to download and/or retrieve this resource has been obtained through PASCC.
Henry L. Stimson Center; Naval Postgraduate School (U.S.); United States. Defense Threat Reduction Agency
Tatsumi, Yuki; Weiner, Robert
2012-07
-
Applying the Three C's of Sustainable Development to Defense Department Planning
"This exposition reviews the extant literature on sustainable development and interviews from senior executives from multinational enterprises to develop a framework for understanding the conditions which generate high shared value initiatives for global enterprises and for the broader system. We consider how the lessons from private industry may be applied in the defense department acquisition process. In general, our analysis indicates that both types of enterprises (private and military) are most likely to generate high shared value when they have the capability to do so, there is consistency between the creation of primary stakeholder value and system value, and that the system value can be cultivated beyond the enterprise that created the original initiative. From a military acquisition perspective, our analysis suggests that additional factors may need to be considered in the evaluation of partners in light of the revised energy policy currently being implemented."
Naval Postgraduate School (U.S.)
Maltz, Elliot
2012-04-30
-
European Navy: Can it Complete European Political and Economic Integration?
From the thesis abstract: "With the euro-crisis of the year 2011 threatening to fracture the European Union, the timing may seem wrong for makers of policy and sailors to imagine a unitary European Navy within a comprehensive European defense policy. But as Europeans explore the limits of economic and financial harmony in the EU and NATO amid financial distress, they may embrace European integration in the defense sector, especially in its maritime dimension. The ongoing global and regional budget crises demand that responsible governments seek cost savings where they can; a unified European security and defense structure certainly would eliminate redundancies and spread the burden of regional defense more evenly among member states. In addition, though, the European Union and NATO could leverage the incremental, but steady progress toward a unified defense structure to bolster the European project at this sensitive moment. If the European Union puts in place the few remaining policy commitments that would create a single European Navy--hardly the stuff of fantasy fiction these days, in light of several recent initiatives--its internal and external unity would be stronger."
Naval Postgraduate School (U.S.)
Tranbarger, Paul R., III
2012-06
-
'Someone to Watch over Me?' Privacy and Governance Strategies for CCTV and Emerging Surveillance Technologies
From the thesis abstract: "Responding to concerns of terror around the world, law enforcement agencies are rapidly moving to utilize a range of surveillance technologies to address the threat. While the lead technology in this area is closed circuit television (CCTV), other technologies like radio frequency identification (RFID), global positioning satellite (GPS) technology and biometrics are also being expanded for use in monitoring human activity. These systems share common features and can be interrelated and controlled with developing computer technologies. They can also be used by government for a range of other purposes. However, use of these technologies has implications for individual privacy. This research examines the nature of privacy and existing legal protections. It also investigates a range of approaches to govern the use of these developing technologies. It is a critical governmental function to administer the use of that technology to ensure that it is related to appropriate government purposes and that individual civil rights are protected. To be successful, that governance scheme will have to address key privacy concerns while remaining flexible enough to adapt to changing technology. Informed by this research policymakers will be better able to develop effective governance strategies."
Naval Postgraduate School (U.S.). Center for Homeland Defense and Security; Naval Postgraduate School (U.S.)
Zoufal, Donald R.
2008-03
-
Introducing the Future Now: Using Memetics and Popular Culture to Identify the Post 9/11 Homeland Security Zeitgeist
"What effect did the terrorist attacks on September 11, 2001 have on American culture? One outcome was the emergence of 'homeland security' as a new institution, concept, and method. But what does this mean as part of a broader historical narrative of cultural change following 9/11? This thesis uses a combination of both classic and contemporary theories to gain perspective on how the public perceives homeland security--Zeitgeist theory and memetics. By examining small clues found within American popular culture, called memes, the reader is able to see how ideas related to homeland security have been transmitted, varied, or faded away. What may appear to be random events found in American popular culture can be considered part of a larger dynamic at work called the 'Zeitgeist' and may provide the first glimpse into a future that 'currently exists, but is just not widely distributed yet.' The themes found within the homeland security Zeitgeist--patriotism, victimization, fear, and absurdity--provide insight into how Americans perceive homeland security and awareness of emerging cultural patterns that affect their lives. Opportunities for further research are suggested related to cultural evolution, memetics, popular culture analysis, strategic communications, and homeland security." A short video interview on this thesis is also available at the following link: [https://www.hsdl.org/?abstract&did=36642]
Naval Postgraduate School (U.S.). Center for Homeland Defense and Security; Naval Postgraduate School (U.S.)
Boyd, Judith K.
2008-03
-
Wireless Robotic Communications in Urban Environments: Issues for the Fire Service
"Firefighters are tasked with conducting search and rescue operations at incidents ranging from minor smoke conditions to multi-agency disasters. In each instance, a rapid risk assessment must be conducted based on preliminary dispatch information. Small lightweight 'man portable' robots are a natural fit for gaining improved situational awareness, yet few have been employed for this application. The problems encountered in using wireless robots in urban environments are among the primary reasons. This thesis focuses on the wireless link between the robot and the firefighter employing it. The work presented is useful for policy makers in allocating public safety spectrum, firefighters in pre-planning responses, and engineers for designing relevant control systems. While the arguments rest on a technical footing of test data and models, the paper is written primarily for a non-technical audience. A technology acceptance model is developed for employing robots wirelessly. Test data is presented showing the debilitating effects of interference from employing multiple robots concurrently. Models are applied to predict signal loss in tunnels and urban environments, and results indicate an optimal frequency range exists between 500 MHz and 1 GHz. A case is presented to allocate spectrum in this range using a priority access protocol."
Naval Postgraduate School (U.S.). Center for Homeland Defense and Security; Naval Postgraduate School (U.S.)
Hough, George
2008-03
-
Integration of Virtual Public-Private Partnerships into Local Enforcement to Achieve Enhanced Intelligence-Led Policing
"In light of the recent emergence of fusion centers and centralized intelligence units, and the move to develop intelligence capacity within local law enforcement agencies in the United States, intelligence-led policing (ILP) is well-positioned to be on the nation's law enforcement agenda for the next decade. ILP relies on robust data collection from a wide range of sources to create intelligence products that can influence decision makers, and ultimately, impact the criminal environment. Virtual public-private partnerships (VP3s) offer local law enforcement agencies an effective and efficient way to leverage a vast and resourceful private sector for the purpose of enhancing ILP. A VP3 can exponentially enhance data collection capacity, facilitate the utilization of the private sector as a force multiplier, and provide the means by which local policing agencies can begin to instill a culture of preparedness in the citizens they serve. This thesis includes case studies of three VP3s -- Citizen Observer, NYPD Shield, and the Nassau County Security/Police Information Network (SPIN). In addition, virtual communities and social capital are examined with an eye towards the potential impact on crime, homeland security, and ILP. The findings of this thesis form the framework for a VP3-enhanced model of intelligence-led policing."
Naval Postgraduate School (U.S.). Center for Homeland Defense and Security; Naval Postgraduate School (U.S.)
Simeone, Matthew J., Jr.
2007-09
-
Mitigating Information Overload: The Impact of 'Context-Based Approach' to the Design of Tools for Intelligence Analysts
"With the explosion of available data from a variety of sources, it has become increasingly difficult to keep pace with the amount of arriving data, extract actionable information, and integrate it with prior knowledge. Add to that the pressures of today's fusion center climate and it becomes clear that analysts, police officers, and executives' ability to make rapid, sound decisions is severely compromised. The combination of circular reporting and the complexity of data sources are contributing to information overload. Law enforcement agencies realize this cannot be resolved by continuing to hire more intelligence analysts. Instead, they must begin leveraging technology. The Illinois State Police is utilizing a technology artifact in its Statewide Terrorism and Intelligence Center (STIC) which incorporates technology built from the context of these users. This thesis uses a survey instrument to evaluate the effectiveness of this technology on reducing circular reporting and the handling of complex data sources. The findings conclude that intelligence analysts within STIC perceive that information overload exists, and both the complexity of data sources as well as circular reporting minimizes their effectiveness and efficiency. Furthermore, this technology effectively improves these negative effects, and increases the STIC's ability to better serve communities."
Naval Postgraduate School (U.S.). Center for Homeland Defense and Security; Naval Postgraduate School (U.S.)
Brueggemann, Charles E.
2008-03
-
Applying Network Theory to Develop a Dedicated National Intelligence Network
"Adaptive terrorist organizational structure and the lack of intelligence sharing were to blame for terrorist attacks on September 11, 2001. Because terrorist groups are moving toward a less predictable, but more diverse, dynamic, and fluid structure, effective combativeness of terrorism requires fighting terrorists with a network. This network must be capable of collecting and sharing credible, reliable and corroborative information on an unprecedented scale, transcending geographic, agency, and political boundaries. This thesis demonstrates utilization of a network-theory approach for sharing information, which will be argued, can provide insight into the system dynamics of the U.S. IC because it allows a systematic, comparative analysis of the system representation and fundamental problems associated with information sharing. The problems associated with past intelligence failures can be overcome with such a system because the use of a dedicated, nationally networked system will allow completion of three primary tasks: (1) examination of the strength of criminal/terrorist connections, (2) identification of suspects and mapping of networks, and (3) prediction of future behavior and better likelihood of prevention, response, and prosecution. A dedicated national networked intelligence-sharing system called DNIN (Dedicated National Intelligence Network), including geographic areas, regional centers, personnel, computer IT networks, and policy options is discussed."
Naval Postgraduate School (U.S.). Center for Homeland Defense and Security; Naval Postgraduate School (U.S.)
Tindall, James A., 1953-
2006-09
-
From the Battlefield to the Homeland: Building the Case for Network-Centric Response
From the thesis abstract: "Our nation's ability to respond to natural or man-made disasters has remained relatively unchanged since the attacks of 9/11. Current response operations are characterized by the inability to efficiently produce a collaborative and effective response to incidents of national significance and address the challenges of the Information Age. The military has adapted network-centric tenants and principles from business applications to effectively operate in the Information Age and increase mission effectiveness. These tenants and principles can be adapted by responders to address current deficiencies and increase mission effectiveness. Implementation of "network-centric response" is both technologically and organizationally feasible. Network-centric response operations would allow responders to meet the challenges and leverage the opportunities of the Information Age, resulting in increased mission effectiveness."
Naval Postgraduate School (U.S.). Center for Homeland Defense and Security; Naval Postgraduate School (U.S.)
Peterson, Michael C.
2007-03
-
Impact of Contextual Background Fusion on Perceived Value and Quality of Unclassified Terrorism Intelligence
"There are millions of police, fire, public health, emergency medical, emergency management, and public sector homeland security professionals ready and willing to assist in the global war on terror (GWOT) and current strategies to strengthen homeland security include the provision of unclassified intelligence products to these non traditional recipients (NTR). Simply pushing intelligence products to NTR is not enough, NTR must possess adequate contextual background in order to effectively utilize intelligence provided by the Intelligence Community (IC) in implementing strategies in information driven and risk based prevention and response. Given the diversity of NTR, distribution of 'one size fits all' products ensures that the intelligence will fit no one's needs. This thesis researches the impact of intelligence contextual background fusion (CBF) through the use of hyperlink technology and evaluates the likelihood of hyperlink acceptance by NTR. By utilizing DHS and FBI customer satisfaction survey questions in 'quality' and 'value' factors along with previously validated Technology Acceptance Model (TAM) questions in 'ease of use' and 'usefulness' factors, this research finds that CBF significantly improves both perceived value and quality, and finds that NTR overwhelmingly prefer a CBF product. NTR broadly accepted hyperlink technology in this application."
Naval Postgraduate School (U.S.). Center for Homeland Defense and Security; Naval Postgraduate School (U.S.)
Eaneff, Charles
2007-03
-
Cross-Sector Collaboration Among Critical Infrastructure Utilities: A Case Study for Assessing Relational Capacity
From the thesis abstract: "This nation relies on the network of critical infrastructures to maintain economic superiority, public health, and military strength. Under this premise, the federal government established the National Infrastructure Protection Plan (NIPP) to leverage national and regional preparedness. Hurricane Katrina demonstrated that, collectively, the infrastructure sectors are not prepared to respond to local and regional disasters using national strategies and resources. There remains a lack of capability to assess an organization's capacity to collaborate. To better understand the enablers and barriers to collaboration within a region's infrastructure system, this study reports the findings of interviews of 13 middle managers and 10 top managers from the utility organizations in and around Mesa, Arizona. In addition to interviews, the managers in this case study completed a survey on collaborative capacity, which provides a lens for examining the factors that enable and impede cross-sector collaboration in the City of Mesa and the interdependent sectors. Finally, the managers were requested to provide individual interpretations of the survey data and recommendations for improvement on the 'Response Form.' Incorporating this feedback will be critical for starting the momentum for change."
Naval Postgraduate School (U.S.). Center for Homeland Defense and Security; Naval Postgraduate School (U.S.)
Draper, Brian Allen
2007-09
-
Unleashing Our Untapped Domestic Collection is the Key to Prevention
From the thesis abstract: "Human intelligence from informants, criminals, good-Samaritans and cooperative individuals is the key to neutralizing major terrorist plots. The need for domestic intelligence collection in the United States is supported by a review of the national strategies and data collected from statements of Federal Bureau of Investigation and Department of Homeland Security officials. Unfortunately, scholarly articles and commentaries point to an inadequate human intelligence program five years after the events of September 11, 2001. This thesis presents a community based exploitation strategy for the expansion of domestic collection through the leveraging of state and local law enforcement, public and private collection. The strategy would take advantage of the significant untapped resources available to state and local law enforcement, public and private entities by encouraging sharing and discouraging hoarding. The technology would do the heavy lifting by sifting through the vast amounts of available information to find the key piece of data. Technology can assist analysts by allowing them to exploit the semantic process of the Global Justice Extensible Markup Language (XML), a computer language. Together, this exploitation strategy and technology will become part of new homeland security doctrine that could unleash the full potential of domestic collection and provide the missing pieces of the intelligence puzzle."
Naval Postgraduate School (U.S.). Center for Homeland Defense and Security; Naval Postgraduate School (U.S.)
Duarte, Nestor
2007-09
-
National Imperative to Establish a Domestic Medical Intelligence Center
"The United States does not have a centralized organization tasked with the oversight or implementation of a domestic medical intelligence program. Organizations throughout the nation have adopted a variety of definitions and operating procedures related to medical intelligence; however, they are inconsistent. Additionally, most jurisdictions limit medical intelligence to epidemiological surveillance. This thesis will propose the structure, governmental organization, data sets, and reporting for a domestic medical intelligence center. This center will require close partnership with other federal agencies and state, local, tribal, and territorial (SLTT) governments. In addition, this thesis will analyze medical intelligence operations within the Armed Forces Medical Intelligence Center, the Department of Homeland Security Office of Health Affairs, the Metropolitan Washington Fusion Center, and the Los Angeles Terrorism Early Warning Group. As this thesis shows, the development of a domestic medical intelligence center, covering a wide range of data sets, will allow for the effective collection, integration, analysis, and dissemination of both tactical and strategic actionable intelligence for federal and SLTT governments and private sector partners. These actions will assist in addressing this significant gap and increasing our nation's level of preparedness thereby improving our nation's response to large scale incidents, both naturally occurring and man-made."
Naval Postgraduate School (U.S.). Center for Homeland Defense and Security; Naval Postgraduate School (U.S.)
Natarajan, Nitin
2007-09
-
Improving the Resiliency of the Natural Gas Supply and Distribution Network
"To accommodate the nation's escalating demand for natural gas, which is expected to increase 700% by 2030, the natural gas industry will likely build several new liquefied natural gas (LNG) import terminals. The location of these new terminals is an important strategic decision that significantly impacts the resiliency of the nation's natural gas supply and distribution network. Due to public opposition in many communities and shortcomings in the current licensing process, any additional LNG import terminals are apt to be concentrated along the Gulf Coast. Unfortunately, this impending concentration will increase the vulnerability and diminish the resiliency of this critical infrastructure. This thesis uses network theory to forecast how the location of new terminals will impact the risk, vulnerability, and resiliency of the natural gas supply and distribution network. To enhance the resiliency and reduce the vulnerability of this critical infrastructure, we argue network analysis methodology should be applied during the terminal siting process. The Federal government must act quickly to facilitate siting of terminals in locations that reduce the vulnerability and improve the resiliency of the natural gas network. Failure to act will squander an unprecedented opportunity to shape and intelligently design this portion of the nation's critical infrastructure."
Naval Postgraduate School (U.S.). Center for Homeland Defense and Security; Naval Postgraduate School (U.S.)
Nadeau, John
2007-03
-
Evolution of Regional Counterterrorism Centers Within a National Counterterrorism Network: Is It Time to Fuse More Than Information?
From the thesis abstract: "There is widespread consensus among both policymakers and intelligence professionals that domestic counterterrorism efforts remain hampered by the lack of an effective national intelligence network that fully integrates the Homeland's entire intelligence assets and other related Homeland Security capabilities into one national counterterrorism system. The failure to unify our domestic counterterrorism efforts inhibits timely and complete information sharing and the evolution of a more robust Homeland Security prevention and response capacity. To achieve counterterrorism synergy we need a holistic approach that removes the intelligence element from its vacuum and fuses it in the counterterrorism crucible, along with the investigations element and related Homeland Security prevention and response operational elements, in Regional All-Hazards, Disaster and Anti-Terrorism Resource (R.A.D.A.R.) centers. These regional and super-regional R.A.D.A.R. centers can then be united into a National Counterterrorism Network under the auspices of the National Counterterrorism Center and the National Operations Center. Fusing this multi-government level, multi-disciplinary collaboration of intelligence, investigative and operational assets, along with the resources of key private sector groups into one unified organism would eliminate information sharing barriers, and will ensure the most efficient and effective use of Homeland Security resources to prevent and respond to terrorist attacks and natural disasters."
Naval Postgraduate School (U.S.). Center for Homeland Defense and Security; Naval Postgraduate School (U.S.)
Leavell, Ron
2007-03
-
Regional Mass Fatality Management in Pandemic Surge
"National and state planning documents designate public health as the lead for mass fatality management (MFM). MFM planning, however, demands multiagency participation and full public-business-government leverage. This thesis explores pathways to reach operational regional MFM capability in Ohio, but also has implications for MFM planning across the nation. Survey research was conducted with three key MFM stakeholder groups: county coroners, emergency management directors, and health commissioners. The survey addressed realistic and actionable MFM planning by: 1) identifying state guidance gaps; 2) identifying local/regional operational gaps; 3) assessing regional resource capabilities; 4) categorizing proposed solutions to address identified gaps; and 5) listing legal, financial, and organizational barriers to the solutions. Findings show that the key stakeholder communities are confused, with a willingness to build MFM capacity that is accompanied by worries about who should lead and how to coordinate efforts. Research recommendations include a three-sector collaboration (government-business-citizens) operating at the regional level and public engagement. Another recommendation calls for alignment of state guidance and regional operations with The Joint Task Force Civil Support Working Group MFM areas: command and control; body identification; medico-legal investigation; morgue operations; funeral services; final disposition; and family assistance and behavioral health services."
Naval Postgraduate School (U.S.). Center for Homeland Defense and Security; Naval Postgraduate School (U.S.)
Stanley, Sharon A. R.
2008-12
-
On Strategy: The War on Terror in Context
"The War on Terror, as the outcome of the al Qaeda attacks on the World Trade Center and the Pentagon on September 11, 2001, promises to be the effort of a generation. If it is to win, the United States must approach it in a manner reminiscent of successes in past wars: with clearly defined and obtainable national objectives, and a unified national strategy to obtain those objectives. In addition, it must establish a clear long-term vision for transforming its efforts and its institutions from the industrial age to the information age as the new domain for waging war. This thesis examines the War on Terror from several perspectives. First, is the strategic context in which the war is being conducted, particularly the issues involved in its prosecution. Second, the Vietnam War and the War on Terror are examined in historical context to determine if the United States is repeating the strategic mistakes that led to its defeat in Vietnam. Third, transformation imperatives are identified which require the Nation to consider what it must do to win the War on Terror while simultaneously preparing for the emergence of greater forms of information age warfare. Finally, an adaptive capabilities-based approach is suggested for the United States to deal with the new strategic reality it faces."
Naval Postgraduate School (U.S.). Center for Homeland Defense and Security; Naval Postgraduate School (U.S.)
Reed, Donald J.
2006-03
-
Radio Interoperability: Addressing the Real Reasons We Don't Communicate Well During Emergencies
"Concerns about inadequate radio communications at the scene of disasters predate 9/11, and have been a focal point of homeland security funding since 2001. Under the umbrella term 'interoperability,' grant funding is facilitating the recent deployment of equipment to allow field personnel to patch radio systems together, with the expectation of immediate improvement of emergency scene communications dysfunction. This thesis argues that there are numerous causal factors for inadequate disaster communications. Communications impediments include insufficient radio infrastructure, behavioral reactions by people in stressful situations, intergovernmental relations, inadequate procedures and training, and general lethargy over the need to institute special operating policies differing from routine practices. The sole reliance upon technological solutions, without proportionate training and practice greatly reduces the effectiveness of radio patching equipment. Quite opposite from the intended effect, patching equipment, in the hands of those only minimally acclimated to radio system architecture, is likely to trigger unintended consequences of chaotic system overload (by combining two or more busy channels) and sector vulnerability (by combining unsecured general public systems with previously isolated public safety systems). Our goal is to provide a thought-provoking examination of the entire realm of emergency scene communications issues and practical recommendations beyond superficial technological solutions."
Naval Postgraduate School (U.S.). Center for Homeland Defense and Security; Naval Postgraduate School (U.S.)
Timmons, Ronald P.
2006-03
-
Essential Elements for Preparedness Planning
"The author of this thesis asserts that the unique nature of the modern threat environment removes all justifiable options for the providers and users of threat information to operate at arm's length from one another. If the two communities are not integrated to the point that collaboration can proceed unhindered, the flow of information between them will likely be sluggish, unidirectional and largely irrelevant. Collaboration involves more than just the flow of new information, however. It requires the exchanging of ideas, the challenging of assumptions and biases, and leads to the formation of a networked environment that is needed to defeat our networked adversaries. An organization that fails to accomplish this level of integration and collaboration runs the risk of finding itself preparing for yesterday's attack, and failing to prevent, prepare for or adequately respond to tomorrow's threat. The 9/11 Commission's synthesized protocol for scenario development and intelligence tasking is presented as a means of fixing this problem."
Naval Postgraduate School (U.S.). Center for Homeland Defense and Security; Naval Postgraduate School (U.S.)
O'Brien, John E.
2006-03
-
21st Century National Public Health System
This thesis from the Center for Homeland Defense and Security discusses the role that public health systems can play in the even of a national health emergency, using the Canadian cases of SARS as a case study. "The attention that SARS created in 2003 has influenced public and political perceptions about the risks associated with infectious diseases and the role the public health system should play in national security. This comparative case study was conducted to examine the Canadian public health's system response to SARS in order to formulate recommendations for the U.S. public health system. This analysis demonstrated that the governmental organizational structure of the U.S. public health system does not support its current mission or its new responsibilities for public health security. A national public health system is needed to support dual missions: the traditional mission of tailoring public health programs specific to the social and demographic needs of the citizens; and the new mission of public health security. In order to transform the current U.S. public health system into a national public health system two critical components must be addressed at the federal, state, and local level: 1) organizational capacity and 2) service delivery. Recommendations are provided regarding the way forward at the federal level and work needing to be done at the state and local level towards building a national system capable of meeting the public health threats of the 21st century."
Naval Postgraduate School (U.S.). Center for Homeland Defense and Security; Naval Postgraduate School (U.S.)
Jones, Mary J.
2008-09
-
Dynamic Personal Identity and the Dynamic Identity Grid: How Theory and Concept Can Transform Information into Knowledge and Secure the American Homeland
From the thesis abstract: "Personal identification systems and processes; including those used for transliteration, travel visas and driver licenses; have failed to adequately adapt to the nation's new asymmetric threat. After September 11th, personal identification information about the attackers began to emerge and it became clear that it could have been used to identify the attackers prior to their terrorist acts. This study used qualitative research methods to construct meaning from previously uncorrelated issues and employed a three-stage analytical approach that grounded the research. The tertiary stage identified themes that had theoretical relevance and, in turn, a direct impact on the proposed solutions. The study borrowed concepts from a handful of formal qualitative methods; including grounded theory, content/document analysis, interviewing, triangulation and conceptual modeling. It found that ambiguity and ethnocentricity is inherent in American name-based identity collection practices, systems and processes; that consistently collecting specific name-based characteristics could be highly beneficial to combating terrorism; and that by leveraging the knowledge created by consistent collection practices, systems and processes we can transform name-based identity into a dynamic and leveragable commodity. To effectively do so, this project presents a substantive theory, Dynamic Personal Identity, and a conceptual technological system, the Dynamic Identity Grid, as potential solutions."
Naval Postgraduate School (U.S.). Center for Homeland Defense and Security; Naval Postgraduate School (U.S.)
Burchnell, Ryan
2008-09
-
Tell Me What I Need To Know: What Mayors and Governors Want from Their Fusion Center
"Mayors and governors who represent high threat, high population density urban areas need strategic, decision-making advantages and, as such, should be significant users of fusion centers. These chief executives desire to understand the operating environment for their jurisdictions where daily risks and threats emerge from the complexities of an integrated world. Paradoxically, as will be outlined through this thesis, there is a lack of robust engagement between fusion centers and mayors and governors. While this thesis does not suggest executives know nothing about their fusion centers, the lack of direct and regular engagement is problematic given that top elected officials are responsible for leadership and funding decisions that prevent, mitigate, and respond to threats to their jurisdictions. Without engagement, fusion centers struggle to meet executive expectations, and mayors and governors miss critical opportunities to leverage their fusion centers. By addressing this engagement and expectations gap, fusion centers will be better situated to help these busy chief executives develop adaptive long-term strategic approaches for preventing, preparing, responding to and mitigating threats and all hazards in their jurisdictions, where they ultimately are held accountable by their constituency."
Naval Postgraduate School (U.S.). Center for Homeland Defense and Security; Naval Postgraduate School (U.S.)
Chen, Yi-Ru
2009-09
-
Public-Private Sector Passenger Rail Intelligence and Terrorism Information Sharing
What is an effective methodology for intelligence and terrorism information sharing within a private passenger rail organization and with their external public partners? This thesis uses three distinct research methodologies that collectively lead to an effective strategy for intelligence and terrorism information sharing within a private passenger railroad, and with its external public partners. First, key Amtrak personnel were interviewed to establish and confirm how intelligence information currently flows within Amtrak and with its external intelligence community and law enforcement partners. Second, a survey of key Amtrak operations personnel was conducted to establish Amtrak's intelligence priorities and requirements. Finally, this study examined two case studies on potential models for intelligence and terrorism information sharing. The two main outcomes of this research were that by leveraging the power of informal networks in the context of the abstract megacommunity framework, an effective strategy for intelligence and terrorism information sharing was developed. Also, based on the needs of front line railroad operating personnel, an intelligence product that helps to protect the public and the nation's critical railroad infrastructure was developed.
Naval Postgraduate School (U.S.). Center for Homeland Defense and Security; Naval Postgraduate School (U.S.)
Crosbie, William L.
2008-09
-
Managing the Reputation of DHS and Its Components
"The Department of Homeland Security and some of its components have gained less than favorable reputations since DHS was stood up in 2003. Based upon the available literature on reputation and upon data collected from a Delphi survey of public affairs officers within DHS and its components, this thesis addresses the value, measurement, and management of reputation for DHS and its components. It also looks at the relationship between the reputation of DHS and that of its components. This thesis shows that reputation has a strong impact on such areas as public trust, Congressional funding, and employee morale. It offers several recommendations for how DHS and its components can manage their reputations more effectively. These recommendations include understanding the value of reputation, identifying key stakeholders, measuring stakeholders' perceptions, and addressing 'reputation spillover.' It also adds to the available literature on reputation, which comes primarily from the private sector."
Naval Postgraduate School (U.S.). Center for Homeland Defense and Security; Naval Postgraduate School (U.S.)
Johnson, Bobbie L.
2009-06
-
Closing the Gap: Measuring the Social Identity of Terrorists
"Studies of terrorism today focus on psychological and behavioral aspects of individuals. Most research shows that using a single model in an attempt to profile terrorists psychologically is problematic, if not impossible. However, using two well-established theories from social psychology, Social Identity Theory and Social Distance Theory, allows the development of a practical model to develop a social profile of a terrorist group. From that, it is further possible to use the resulting social profile to compare terrorist groups against each other in order to develop predictive models as to the propensity of violence of a particular group. To test this, the research within this thesis uses open source interviews of the terrorist group HAMAS and the Popular Front for the Liberation of Palestine (PFLP), taken from on-line magazines, on-line journals, on-line newspapers, and official web sites, to serve as respondents to a survey instrument developed from other social identity studies. The results of this research shows that a social profile of a terrorist group can be developed from standard social identity measurement survey instruments, and it is possible to develop practical methods for comparing groups, based on their social identities, to predict their propensity to violence."
Naval Postgraduate School (U.S.). Center for Homeland Defense and Security; Naval Postgraduate School (U.S.)
Ludwick, Keith W.
2008-09
-
Strategy for Local Law Enforcement Agencies to Improve Collection Analysis and Dissemination of Terrorist Information
From the thesis abstract: "Local law enforcement agencies play a significant role in domestic counter-terrorism and homeland security. The intelligence function of law enforcement agencies enhances their ability to detect criminal activity related to terror groups, as well as the ability to prevent, or respond to a terrorist attack. This research project identifies policies and procedures that could be implemented by local law enforcement agencies to enhance cooperation and collaboration with other public sector agencies, private sector security providers, and the general public. The policies and procedures are based on intelligence-led policing and public-private partnerships, and will generate the ability to increase the flow of information disseminated from, and collected by, law enforcement intelligence entities. The resulting intelligence developed by law enforcement intelligence can be pushed up to the state and national level to improve the nation's ability to detect potential terrorist activity, protect citizens, and safeguard critical infrastructure."
Naval Postgraduate School (U.S.). Center for Homeland Defense and Security; Naval Postgraduate School (U.S.)
Cleary, Christopher
2006-03