Advanced search Help
Searching for terms: EXACT: "Naval Postgraduate School (U.S.). Center for Homeland Defense and Security" in: publisher
Clear all search criteria
Only 2/3! You are seeing results from the Public Collection, not the complete Full Collection. Sign in to search everything (see eligibility).
-
Viewpoints: Developing a Customer-Service Approach to Securing the Port of Long Beach [video]
In this Viewpoints interview, "Detective Candice Wright discusses the challenges of building strong partnerships between local government agencies and the private sector to provide security for the largest port complex in the US by developing relationships of trust that enable more effective asset/resource and information sharing."
Naval Postgraduate School (U.S.). Center for Homeland Defense and Security
Wright, Candice L.
2011-04-05
-
Viewpoints: Modeling Social Networks [video]
In this Viewpoints interview, "Steve Lieberman, Ph.D. candidate from the MOVES [Modeling, Virtual Environments and Simulation] Institute at the Naval Postgraduate School, discusses his use of network science to analyze the change in social networks and interactions over time to try to identify the various factors that cause extremist groups to splinter from a general population."
Naval Postgraduate School (U.S.). Center for Homeland Defense and Security
Lieberman, Steve
2011-04-04
-
Viewpoints: Virtual Alabama [video]
In this Viewpoints interview, "Jim Walker, Homeland Security Director for the state of Alabama gives a detailed view of the groundbreaking 'Virtual Alabama' program. Combining the latest web and mapping technologies with cost-effectiveness, Virtual Alabama has become a new model for expanding communications and interoperability for the Homeland Security community."
Naval Postgraduate School (U.S.). Center for Homeland Defense and Security
Walker, Jim
2010-04-07
-
Viewpoints: Improving Tribal Relations in Homeland Security [video]
In this Viewpoints interview, "Dr. James Tindall discusses tribal relations with federal and state entities regarding homeland security, bringing up issues such as tribal sovereignty, training, funding, and border jurisdiction."
Naval Postgraduate School (U.S.). Center for Homeland Defense and Security
Tindall, James A., 1953-
2011-04-04
-
San Francisco Bay Area Earthquake Plan [video]
From the description on the Center for Homeland Defense and Security (CHDS) website: "CHDS has supported FEMA and Cal OES [Office of Emergency Services] in the development of a video outlining the recently-released 2016 Bay Area Earthquake Plan. This short film is a visual introduction to the updated San Francisco Bay Area Catastrophic Earthquake Plan, which combines the talent, expertise and input from dozens of partners drawn from across the Whole Community to prepare for and recover from a major earthquake." The video is 5 minutes and 41 seconds in length.
Naval Postgraduate School (U.S.). Center for Homeland Defense and Security
2016-07-19
-
Viewpoints in Homeland Defense and Security: Intelligence Reform: Challenging the Conventional Wisdom - Part I and Part II [video]
This is Part I of a two part webcast from the Center for Homeland Defense and Security at the Naval Postgraduate School. "Is the NSA [National Security Agency] becoming so overwhelmed with the high volume of information that its response to threats becomes less effective? Is this massive collection of data actually hurting our ability to identify and disrupt would-be terrorist plots? These, and other questions are raised in this two-part series with Mike German (The Brennan Center for Justice and former FBI special agent in domestic terrorism) and Erik Dahl (Assistant Professor, Naval Postgraduate School and Center for Homeland Defense & Security Instructor) as they discuss topics such as the NSA domestic spying program and possible reforms to ensure the rights of ordinary citizens are not being violated." The total duration of part one is 14:07. The duration of part two is 16:14.
Naval Postgraduate School (U.S.). Center for Homeland Defense and Security
German, Michael; Dahl, Erik J.
2014-07-14
-
Presidential Decision Directive 63: Critical Infrastructure Protection [Audio, Part 2]
This is part two of an audio recording of the text of Presidential Decision Directive 63. This Presidential Directive builds on the recommendations of the President's Commission on Critical Infrastructure Protection. In October 1997 the Commission issued its report, calling for a national effort to assure the security of the United States' increasingly vulnerable and interconnected infrastructures, such as telecommunications, banking and finance, energy, transportation, and essential government services. Presidential Decision Directive 63 is the culmination of an intense, interagency effort to evaluate those recommendations and produce a workable and innovative framework for critical infrastructure protection.
Naval Postgraduate School (U.S.). Center for Homeland Defense and Security
1998-05-22
-
Global Jihadi Threat [Self-Study Course]
This self-study course was developed by the Naval Postgraduate School Center for Homeland Defense and Security. "Islam is a faith of richness and complexity that has manifested itself over time in a broad variety of ways. Unfortunately, it is also used as the basis for the violent ideologies of the Global Jihad. Understanding the fundamentals behind the religion (as well as concepts such as Jihad), the background with respect to the Islamic community's relationship to the West, the position of Muslims in modern-day Western societies and the various permutations of extremist Islamic ideologies is critical in helping policy makers, law enforcement personnel and governmental administrators at various levels relate to Islam and Muslims in an informed manner while also being able to effectively counteract extremist activities and ideas." The course includes the following modules: Module 1: Islam - Basic Principles, Origins and Divisions; Module 2: The Role of Jihad in Islam; Module 3: Islamic Civilization and the Western Challenge; Module 4: The Development of Islamic Extremism; and Module 5: Islam in the West: Integration, Isolation, Radicalization.
Naval Postgraduate School (U.S.). Center for Homeland Defense and Security
Morag, Nadav, 1965-
-
Intelligence for Homeland Security: Organizational and Policy Challenges [Self-Study Course]
This self-study course was developed by the Naval Postgraduate School Center for Homeland Defense and Security. "This course examines key questions and issues facing the U.S. intelligence community and its role in homeland security and homeland defense. Course reference materials will provide an overview of diverse intelligence disciplines and how the intelligence community operates. Course emphasis will be on issues affecting policy, oversight, and intelligence support to homeland defense/security and national decision-making. The Intelligence Reform and Terrorism Prevention Act of 2004 is presented and the course is shaped to focus on homeland intelligence support issues at the State / Local / Tribal levels." The course includes the following modules: Module 1: Introduction to the U.S. Intelligence Community; Module 2: Interagency Processes and Intelligence Reform; Module 3: Homeland Security Intelligence for State, Local & Tribal; Module 4: Homeland Defense Intelligence; and Module 5: Intelligence Analysis.
Naval Postgraduate School (U.S.). Center for Homeland Defense and Security
-
Lockdown Terminology in K-12 Schools: Why It Is Okay to Use Codes and Which Codes Are Best
From the Abstract: "In this paper, school leaders and their law enforcement partners will learn that using codes for lockdown terms does not violate the plain-language requirement of the National Incident Management System (NIMS). They will discover which lockdown codes are best at reducing
confusion to help school students and staff members respond quickly and effectively during
emergency situations. Finally, the reader will learn that the most flexible and intuitive lockdown
terms are Code Yellow Lockdown and Code Red Lockdown."
Naval Postgraduate School (U.S.). Center for Homeland Defense and Security
Graves, Susan M.
2017-01-19
-
Online Human Behaviors on Social Media During Disaster Responses
"Social media plays a critical role in natural disasters as an information propagator that can be leveraged for disaster responses. This study analyzed the online user engagement on social media during the 2016 Louisiana Flood through the lens of Social Network Analysis (SNA). Our findings revealed temporal and spatial characteristics of online social engagement as well as a trend of online users' interests during the flood. We also identified how social capital/infrastructure and community leaders were engaged in improving a flood inundation map. The results will assist emergency agencies and organizations to understand characteristics of social media and the user behaviors during disasters."
Naval Postgraduate School (U.S.). Center for Homeland Defense and Security
Kim, Jooho; Hastak, Makarand
2017-10
-
Preparing for the Next Mass Migration: Lessons from the Past and Recommendations for the Future
"In 1995 over 60,000 migrants from both Haiti and Cuba attempted to reach the United States through maritime means, primarily vastly overcrowded sailboats and rafts. While it is unclear how many died in the attempt to reach the United States, the vast number were rescued via a huge inter-agency effort led by the Coast Guard and Navy. In 2006, it was feared that a migration on this scale was imminent due to failing health of President Castro. But much had changed since the 1990s; the strategic migration plan--Operation Vigilant Sentry--did not reflect the formation of DHS or the massive organizational and interagency shift that had occurred since 9/11. After an extensive inter-agency planning effort, the strategy was updated to reflect the new operational reality; fortunately, the threat of a new mass migration subsided. Ten years later, the problem of maritime migration not only remains likely in our hemisphere due to political and economic unrest in South and Central America, but is also becoming a global phenomenon."
Naval Postgraduate School (U.S.). Center for Homeland Defense and Security
Watts, R.B.
2017-10
-
Defensibility and Risk Management
"A common problem in risk management is to characterize the overall security of a system of valuable assets (e.g., government buildings or communication hubs), and to suggest measures to mitigate any security threats. Currently, analysts rely on a combination of security indices, such as resilience (the ability of a system to return to normal rapidly); robustness (the ability to function despite damage); redundancy (spare capacity); security (barriers to limit access); and vulnerability (susceptibility to hazards and/or intentional threats). However, these indices are not always actionable; i.e., they are not themselves sufficient to indicate whether policy makers should invest in improving a given system. Indeed, it has been observed that some vulnerable systems cannot be improved cost-effectively [1]. Motivated by this gap, we recently proposed an index, defensibility [2], which characterizes how easily the damage to a system can be reduced. A system is highly defensible if a modest investment of resources can significantly reduce the damage from an attack or disruption (Fig. 1). Defensibility is defined in such a way that incommensurable systems can be compared to each other using a single measure. The most defensible system would then receive the highest priority for defensive resources. […] To summarize, security analysis to date has been focused on existing notions such as vulnerability and resilience. Our analysis here is based on the observation that some at-risk systems may be much easier to improve than others. We argue that risk analysts and managers would benefit by considering defensibility in their risk management plans."
Naval Postgraduate School (U.S.). Center for Homeland Defense and Security
Bier, Vicki M.; Gutfraind, Alex; Lu, Ziyang
2017-10
-
Improving Citizen Threat Preparedness & Recovery
"Within the homeland security context, this paper examines obstacles to effective mass participation, ways to enhance citizen accountability and vigilance in the face of threat, and value controversies embedded in this thrust. The goal is to expand and refine existing techniques so as to improve citizen preparation and recovery regarding ominous human security dangers. Although the quest to improve mass public involvement in its protection from internal and external threat is not new, there is considerable room for improvement."
Naval Postgraduate School (U.S.). Center for Homeland Defense and Security
Mandel, Robert
2017-10
-
Tiered Response Pyramid: A System-Wide Approach to Build Response Capability and Surge Capacity
"Today's expanding disaster landscape demands crisis managers to configure their organizations to handle a wider range of extreme events. This requires more varied capabilities, capacity and delivery of services. The article proposes that crisis managers must move away from organization-centered planning to a system-wide approach for preparedness. We lay out the limitations of using the current tiered response triangle for planning and argue for implementing a system-wide approach by using a Tiered Response Pyramid to increase response capabilities and surge capacity for large scale disasters. The tiered response pyramid offers crisis managers a way to visualize multiple response options that leverage each other's resources and create a more resilient response system for complex events."
Naval Postgraduate School (U.S.). Center for Homeland Defense and Security
Pfeifer, Joseph W.; Roman, Ophelia
2016-12
-
How Proverbs Damage Homeland Security
"Christopher Bellavita discusses twelve proverbs -- accepted truths -- that have characterized the homeland security narrative. He contends that in the haste to establish a homeland security enterprise and create new policies and strategies, many homeland security proverbs may be inaccurate; they 'distort the homeland security narrative in a way that inhibits the search for more effective ideas to protect the nation.' Bellavita sees an opportunity over the next ten years for academics and strategists 'to take another look at the basic assumptions underpinning our homeland security narrative, and identify evidence that supports or refutes the proverbs used to guide strategic direction.'"
Naval Postgraduate School (U.S.). Center for Homeland Defense and Security
Bellavita, Christopher
2011-09
-
Post-Tragedy 'Opportunity-bubble' and the Prospect of Citizen Engagement
From the journal's abstract for this article: "Fathali Moghaddam and James Breckenridge examine the 'opportunity-bubble' that allows leaders to mobilize the public immediately following a tragic event. 'Although great crisis will inevitably invite consideration of many alternatives, leadership must pay special attention to opportunities to engage the public as capable partners in their country's response to the crisis -- calling upon them as citizens with civic duties, as well as rights.'"
Naval Postgraduate School (U.S.). Center for Homeland Defense and Security
Moghaddam, Fathali M.; Breckenridge, James N.
2011-09
-
Does Homeland Security Exist Outside the United States?
From the journal's abstract for this article: "Nadav Morag contends, 'Homeland security is a uniquely American concept. It is a product of American geographic isolation and the strong tendency throughout American history to believe that there was a clear divide between events, issues and problems outside US borders and those inside US borders.' In answering the question, 'Does Homeland Security Exist Outside the United States?' he examines how other countries have organized their security policies, strategies, and plans."
Naval Postgraduate School (U.S.). Center for Homeland Defense and Security
Morag, Nadav, 1965-
2011-09
-
Roots of Community Resilience: A Comparative Analysis of Structural Change in Four Gulf Coast Hurricane Response Networks
"Despite the emphasis on resilience, disasters continue to challenge the response capacities of communities around the United States. These challenges are generated by the complexities and uncertainties present in the post-disaster environment. This article presents the findings of an exploratory investigation into the development and evolution of four disaster response networks that formed along the Gulf Coast, Hurricane Katrina and Hurricane Rita in 2005, and Hurricane Gustav and Hurricane Ike in 2008. Using data collected from newspaper articles that referenced each hurricane during a period that spanned six days prior to landfall to twenty-two days after landfall, we identified the organizations that participated in each response network. We then used UCINET 6 to calculate network density and degree centralization, plotted longitudinally by date, and evaluated whether each network underwent structural change. The findings demonstrate that all four response networks underwent structural change, as a large heterogeneous collection of response organizations came together, collected and disseminated information, and sought to identify and implement solutions that would address the needs of those affected by the disaster event. While additional research is necessary to reveal the causal factors behind these structural changes, the findings presented in this article suggest that investments in information communication technologies, such as those made by the state of Louisiana after Hurricane Katrina, can help to facilitate the resilience of disaster response networks."
Naval Postgraduate School (U.S.). Center for Homeland Defense and Security
Haase, Thomas W.; Ertan, Gunes; Comfort, Louise K. (Louise Kloos), 1935-
2017-10
-
Cyber Border Security - Defining and Defending a National Cyber Border
"Concerns stemming from the convergence of border and cyber security threats are nothing new to those involved in both disciplines. Criminals and foreign actors have been exploiting computers and cyber methods to circumvent physical border security for decades. Today nearly every crime or homeland security threat that once required some physical nexus with the nation's traditional borders (land, sea, and air) is being committed, or at least facilitated, by some cyber component. In many ways vulnerabilities in cyber security render some aspects of traditional border security irrelevant, or at the very least, much less secure. The article explores this convergence of traditional border and cyber security and proposes a policy that would seek to evolve the concept of border security to include the cyber domain. Based on policy work begun over a decade ago by the author while the national cybercrime program manager for the U.S. Customs Service, the article details how a national cyber border can be defined and enforced. Relying on a methodology that adapts existing authorities, the article provides logical justifications and arguments for the need and legal authority to define a national cyber border. The strengths and shortcomings of this adaptive methodology are explored along with issues which may require new legislation. The article addresses some of the privacy concerns which are certain to arise from the cyber border concept using the same adaptive methodology of existing protections and expectations of privacy. The ultimate goal of the article is to stimulate thought- provoking discussion and spur further academic research into the convergence of cyber and border security; issues which are interdependent and clearly in the forefront of homeland and national security."
Naval Postgraduate School (U.S.). Center for Homeland Defense and Security
Osborn, Phillip
2017-10
-
Incorporating Prioritization in Critical Infrastructure Security and Resilience Programs
"Protecting critical infrastructure, especially in a complex urban area or region, should focus on identifying and prioritizing potential failure points that would have the most severe consequences. Such prioritization can inform targeted planning and investment decisions, such as what infrastructure should be hardened or relocated first or what infrastructure should receive priority restoration following a disaster, among other uses. Without a prioritization process, assessment and protection programs are typically guided by intuition or expert judgement, and they often do not consider system-level resilience. While understanding how to prioritize high-consequence failure points for assessments and, for protection is essential, the complexity of infrastructure systems can quickly overwhelm. For example, in a notional region with 1,000 electric power assets, almost one million failure scenarios are associated with an N-2 contingency and nearly one billion failure scenarios are associated with an N-3 contingency. As a result, it is simply not feasible technically nor financially for system operators and government agencies to assess and prepare for all possible disruptions. Therefore, a primary goal of critical infrastructure protection and resilience programs should be to identify and prioritize the most critical contingencies affecting infrastructure systems. Achieving this goal will allow decision makers to identify high-impact isolated failures as well as cascading events, and to prioritize protection investments and restoration planning accordingly. To solve this problem, Argonne National Laboratory developed an optimization framework capable of modeling and prioritizing high-consequence failure points across critical infrastructure systems. The optimization framework can model at the system level or the interdependent 'system-of-systems' level and is applicable to any infrastructure."
Naval Postgraduate School (U.S.). Center for Homeland Defense and Security
Verner, Duane; Petit, Frederic D.; Kim, Kibaek
2017-10
-
Ultra-Marathoners of Human Smuggling: How to Combat the Dark Networks that Can Move Terrorists Over American Land Borders
"National legislation requires America's homeland security agencies to disrupt transnational human smuggling organizations capable of transporting terrorist travelers to all U.S. borders. Federal agencies have responded with programs targeting extreme-distance human smuggling networks that transport higher-risk immigrants known as special interest aliens (SIAs) from some 35 'countries of interest' in the Middle East, North Africa, and Asia where terrorist organizations operate. Yet ineffectiveness and episodic targeting are indicated, in part by continued migration from those countries to the U.S. southwestern border since 9/11. Should an attack linked to SIA smuggling networks occur, homeland security leaders likely will be required to improve counter-SIA interdiction, or do so preemptively. With a better understanding of how SIA smuggling networks persist in foreign geopolitical eco-systems, despite U.S. disruption efforts to date, could their most vulnerable fail points be identified for better intervention targeting? This essay presents the key findings of a systematic analysis of U.S. court records about SIA smuggling, as derived from 19 known prosecutions and a variety of other data between 2001 and 2015. It will discuss suggested leverage points and conclude with a list of strategy options for a more effective disruption campaign against them."
Naval Postgraduate School (U.S.). Center for Homeland Defense and Security
Bensman, Todd
2016-05
-
Fortress Problem
"Fortresses do not usually fail well. When they rely on robustness or complication, positions of strength are only tolerant of stress up to a defined point or of a certain character. For a fortification that fails to adapt, centralization--even of strength--presents a surprising liability. Fortresses concentrate risk. This paper considers the way in which uncertain and unthinkable events undermine security practices that presume a greater degree of knowledge, uniformity, and control than is available. When facing worst cases and ambiguous threats, current security doctrine, theory, and practice promise more than they can deliver. Threat and catastrophe highlight a mismatch between reality and approach. Threat may be defined as official danger--governmental certification of possibility. Catastrophe implies rupture and exhaustion of capacity. Two problematic tendencies dominate the security response to threat and catastrophe: applying risk management when the information necessary to support such calculation is not available, and boundless precaution. In the first case the homeland security enterprise lives with a false assumption that it controls the risk; in the second it has little measure of success and surrenders decisions to threat politics. This paper suggests that security agencies need to renovate their fortresses, favoring adaptability over robustness in the face of threat and catastrophe."
Naval Postgraduate School (U.S.). Center for Homeland Defense and Security
Anderson, Jack
2016-05
-
To Save Lives and Property: High Threat Response
From the abstract: "The emergency services community must recognize that the world is constantly changing and adjust accordingly. It will have to be more nimble and proactive with its capabilities if it wants to prepare effectively for future threats and respond to atypical emergencies. Over the past several years, fire, law enforcement and emergency medical services communities have not adapted their missions or capabilities to prepare, train, and respond effectively in a joint capacity to perhaps the two most imminent, nonconforming threats facing communities across America -- the active shooter and fire as a weapon. These are incidents that necessitate an integrated response; traditional single agency 'stove piped' responses will not be effective in saving lives and property. If we do not integrate Fire/EMS and law enforcement capabilities for these imminent threats, not only will civilian lives be lost, but those of first responders will be as well."
Naval Postgraduate School (U.S.). Center for Homeland Defense and Security
Delaney, John; Atwater, Paul A.; Marino, Michael . . .
2015-06
-
When Guns and Drugs are Democratized: Potential Technical Solutions to Counter the Negative Consequences of Three Dimensional Printing
"3-D printer technology will have negative consequences in the form of weapons that cannot be traced, illicit drug manufacture, sabotage, and intellectual property theft. This article poses the following questions. How will society be affected by these changes? How will border security organizations accomplish their missions when illicit guns and drugs no longer have to be transferred across borders? How might terrorists use their ability to hack design files to sabotage components built by 3-D printers? This article will focus on what can be done to limit, through the use of technology, the sinister uses of the 3-D printer while still allowing for the positive benefits that this new technology will bring to humanity. The article is structured to describe briefly how 3-D printing technology functions, how the technology can be used to print objects with negative consequences to society, and how those consequences may be remediated."
Naval Postgraduate School (U.S.). Center for Homeland Defense and Security
Percy, Jonathan
2016-12
-
Assessing Homeland Security Risks: A Comparative Risk Assessment of 10 Hazards
"The National Academy of Sciences recommended that the Department of Homeland Security use methods of qualitative comparative risk assessment as part of its approach to strategic planning. To provide insight into how this can be done, this paper examines a set of ten homeland security risks-- including natural disasters, terrorist events, and major accidents-- in a systematic fashion. These hazards were described in terms of the annualized risk to the United States as a whole using open-source data and a standardized set of attributes. This assessment can be useful on its own, providing a baseline of knowledge about these homeland security risks and a source of data for subsequent risk management and comparative risk assessment studies. Additionally, this assessment can help identify what is known about the homeland security risk generally-- the availability of data on homeland security risks and the uncertainty of the risks as they vary by hazard and attribute."
Naval Postgraduate School (U.S.). Center for Homeland Defense and Security
Lundberg, Russell; Willis, Henry H.
2015-12
-
What Comes Around, Goes Around (and Around and Around): Reviving the Lost History of FEMA and its Importance to Future Disasters
"In January 2014, government officials and citizens began to reflect on two emergency programs the Federal Emergency Management Agency (FEMA) put into place after Hurricane Sandy in New York. The Rapid Repairs and the Sheltering and Temporary Essential Power (STEP) programs were an innovative way for FEMA to use its authorities, normally limited to providing temporary housing, to make minor repairs to the homes of disaster survivors. Instead of spending millions more to place these families in hotel rooms, rental resources or other temporary housing, FEMA could allow survivors to stay in their homes, saving millions of dollars and reducing the angst of those forced to leave their communities behind. However, like any government program created from scratch in the midst of a disaster, it
suffered from significant problems, inefficiencies, and poor implementation. If only the Federal Coordinating Officer for FEMA and his state and local government counterparts did not have to create and deliver these programs on the fly. It turns out they did not. These programs had already been delivered to the public almost exactly 40 years earlier."
Naval Postgraduate School (U.S.). Center for Homeland Defense and Security
Lucie, H. Quinton
2016-12
-
Surviving the 'Storm': Expanding Public Health's Capabilities in Response to the Increasing Threats Posed by Novel, Pandemic Strain Viruses
"The recent emergence of two separate outbreaks of two new viruses has generated renewed interest in the threat of pandemics. For a significant portion of the total fatalities associated with these infections the cause of death was due to an over-reaction of an infected body's immune system. This research explores possible pharmaceutical interventions that would help expand the list of options public health could employ in a response. For inclusion in state stockpiles, medications must meet three specific criteria: medical efficacy, cost, and logistical considerations. We identified four medications that could be employed (three statins - atorvastatin, simvastatin, and gemfibrozil and an antiviral - ribavirin) and present options for their inclusion into state stockpiles. Through this research we have attempted to open a dialogue with other federal and state planners as they wrestle with the same challenges within their home agencies."
Naval Postgraduate School (U.S.). Center for Homeland Defense and Security
Mackie, Daniel P.; Richter, Anke
2015-09
-
Opportunities in Crisis and Catastrophe: The Issue-Attention Cycle and Political Reality
"Emerging problems often surprise lawmakers and agency officials and result in rapid, reactive governance. The political attention an issue does receive may or may not be sufficient to resolve the emergent problem, and in many cases may be an overreactive auto-response dictated by public opinion and issue salience. This study examines the emergence of congressional attention post-crisis; demonstrates that black swans, wicked problems, and complex domestic and social issues each trigger episodic attention differently; and finally, establishes a multi-dimensional model of emerging crises, laying the bedrock to define new theoretical models of episodic attention in Congress."
Naval Postgraduate School (U.S.). Center for Homeland Defense and Security
Kimrey, Christopher M.
2016-05
-
Identifying Security Checkpoint Locations to Protect the Major US Urban Areas
"Transit networks are integral to the economy and to society, but at the same time they could allow terrorists to transport weapons of mass destruction into any city. Road networks are especially vulnerable, because they lack natural checkpoints unlike air networks that have security measures in place at all major airports. One approach to mitigate this risk is ensuring that every road route passes through at least one security checkpoint. Using the Ford-Fulkerson maximum-flow algorithm, we generate a minimum set of checkpoint locations within a ring-shaped buffer area surrounding the 50 largest US urban areas. We study how the number of checkpoints changes as we increase the buffer width to perform a cost-benefit analysis and to identify groups of cities that behave similarly. The set of required checkpoints is surprisingly small (10-124) despite the hundreds of thousands of road arcs in those areas, making it feasible to protect all major cities."
Naval Postgraduate School (U.S.). Center for Homeland Defense and Security
Watkins, Daniel M.; Cuéllar, Leticia; Kubicek, Deborah . . .
2015-09