• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 1064
  • 241
  • 118
  • 109
  • 105
  • 45
  • 31
  • 12
  • 12
  • 10
  • 9
  • 9
  • 9
  • 9
  • 9
  • Tagged with
  • 2277
  • 383
  • 329
  • 328
  • 316
  • 291
  • 264
  • 249
  • 248
  • 226
  • 215
  • 202
  • 183
  • 163
  • 160
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
701

Islamic insurgency and transnational terrorism in Thailand analysis and recommended solution strategy

Lumbaca, Jeremiah C. 06 1900 (has links)
The Kingdom of Thailand currently faces internal and transnational Islamic insurgent threats that have the potential to disrupt Southeast Asian regional stability. As a Major Non-NATO Ally and the signatory of several bilateral and multilateral security arrangements with the US, Thailand has solidified itself as a security alliance partner whose stability and influence in Southeast Asia has become increasingly more important to the US and its War on Terror. The purpose of this thesis is to provide a history and analysis of the Islamic insurgency and transnational terrorist operations that exist in Thailand today. Secondly, this thesis will highlight current Thai, US, and regional security initiatives and underscore policy deficiencies. Finally, this thesis will recommend a solution strategy necessary for the purge of radical Islamic insurgency and transnational terrorism in Thailand. By accepting current policy deficiencies and implementing the courses of action recommended in this thesis, the US and Thailand will both contribute to a greater Southeast Asian security.
702

Preventing terror attacks in the Homeland : a new mission for state and local police

Lanier, Cathy L. 09 1900 (has links)
CHDS State/Local / As the Department of Homeland Security continues to develop plans and strategies to guide our government agencies towards a safer environment, state, local, and tribal law enforcement agencies are struggling to define their role in the Homeland Security Mission. This paper proposes the creation of a National Law Enforcement Network made up of the state, local and tribal law enforcement agencies throughout the country. The network design will allow local agencies to reach beyond the traditional law enforcement approach by establishing formal networks that facilitate local, regional, national and eventually global coordination of an effective strategy aimed at preventing future terror attacks in the homeland. The creation of this network will ensure that every police officer in the United States understands their role in preventing future terror attacks. Drilling down to the lowest local level to include businesses, industry and the private sector, the formation of the network expands our detection and prevention capabilities well beyond our current level. / Commander - Special Operations Division, Metropolitan Police Department
703

How can we improve information sharing among local law enforcement agencies?

Miller, Patrick E. 09 1900 (has links)
CHDS State/Local / The events of 9/11 and subsequent examination of the intelligence community in the United States have clearly identified several areas that require immediate repair. While we have, on the federal, state and local levels, a complex system of collecting, developing, and analyzing intelligence that can be used to prevent terrorist attacks, we do not have an accompanying system that shares intelligence information throughout the law enforcement community. The purpose of this thesis is to review information sharing between federal, state and local law enforcement agencies and to suggest methods to improve that capability. In the aftermath of the September 11th attacks, authorities uncovered patterns of suspicious activity occurring in places such as Maryland, Florida, and New Jersey. These activities included individuals paying cash for plane tickets, taking flight lessons, inquiring about crop duster planes, and frequenting drug stores. Taken individually, these incidents were not overly suspicious; nor were they seen as serious when reported to authorities. Yet, all together they illustrate at best highly suspicious behavior, and at worst a picture of a master plan of prospective criminal activity. When collecting data on terrorist potential, one isolated incident in a local jurisdiction may not have obvious significance, but the ability to view all incidents together across cities or states might paint a more complete picture. Agencies are now recognizing the benefits of data sharing across institutions and jurisdictions. / Assistant Police Chief, Ventura Police Department
704

Perception or fact : measuring the performance of the Terrorism Early Warning (TEW) group

Grossman, Michael. 09 1900 (has links)
CHDS State/Local / This thesis examines the structure and intelligence process of the Los Angeles Terrorism Early Warning (TEW) Group to assess its effectiveness as measured through the application of a Program Logic Model. This model verifies the links between the assumptions on which the program is based and actual program activities. It further assesses its status as a â smart practiceâ based on measurable criteria that are beyond perception or peer approval alone. The TEW is a regional, multi-agency and multi-disciplinary network that functions as a focal point for analyzing the strategic and operational information needed to prevent, mitigate, disrupt and respond to threats and acts of terrorism. Although efforts toward prevention are difficult to measure in any program, input and outcome are assessable. This method provides an effective means to evaluate a program while documenting what works and why. Effectiveness should not be based solely on outputs; a structure that produces them is also an indicator. The objective of this thesis is to establish a benchmark of practical standards for collaborative intelligence sharing operations that can be replicated by other regions and that will establish a common nationwide homeland security intelligence network. Based on these criteria, it is reasonable to conclude that the TEW is in fact a â smart practice.â It meets its intended goals and objectives when measured according to the parameters of the Program Logic Model, and has a structured process and system that leads to preferred outcomes. / Commander, Los Angeles County (California) Sheriff's Department
705

The race against nuclear terror

Gomez, Jaime 09 1900 (has links)
Approved for public release; distribution is unlimited / In the wake of the September 11, 2001 attacks, the issue of political violence expressed via mass destruction has raised security concerns to an unprecedented degree not seen since the end of the Cold War. As a principal adversary, the Soviet Union has been replaced by terror networks applying asymmetric warfare to achieve politically charged or ideologically driven objectives. A scenario whereby non-state actors would acquire a nuclear capability not only threatens the security of the United States, but would destabilize the Westphalian notion of the primacy of nation-states within the international system. Despite U.S. expenditures of over $86 million to help nearly 30 countries worldwide in preventing the smuggling of weapons-useable radiological materials, over 20 known cases of such activity were reported between 1992 and 2001. Previous research has concentrated on a singularly defined threat: The Rogue State. Today's challenges are characterized by more defused, decentralized networks, to include transnational actors with the potential to proliferate and supply terrorists with a nuclear weapon or weapons-grade radiological material. This thesis examines the applicability of traditional Cold War strategies such as deterrence, pre-emption, prevention, and coercive diplomacy in the present context, to deny extremist groups and associated networks the means to buy, steal, or make nuclear and radiological weapons. This thesis proposes a multi-dimensional approach in support of mixed-strategies for winning the race against nuclear terror. The author contends that terrorist groups cannot acquire nuclear or radiological technology without the witting or unwitting support of state actors.
706

State and local intelligence fusion centers : an evaluative approach in modeling a state fusion center

Forsyth, William A. 09 1900 (has links)
CHDS State/Local / In the final report on the attacks of September 11, 2001, the National Commission on Terrorist Attacks Upon the United States (9/11 Commission) found that the attacks were successful in part because information was not shared and analysis not pooled among the different agencies across all levels of government. Since that time, there have been significant strides to improve cooperation and close the intelligence gaps among the different intelligence and law enforcement services. Effective terrorism prevention, however, requires information and intelligence fusion as a cooperative process at all levels of government so that the flow of intelligence can be managed to support the identification of emerging threats to the homeland. This thesis explains the value of a state/regional fusion center by examining three successful fusion centers in Arizona, Georgia, and Los Angeles. Recommendations from each agency on lessons learned, as well as independent research, have been provided to help state and local agencies develop their own fusion centers. / Supervisory Special Agent (SSA), Federal Bureau of Investigation (FBI)
707

Tactical wireless networking in coalition environments implementing an IEEE 802.20 wireless end-user network utilizing FLASH-OFDM to provide a secure mobile extension to existing WAN

Tovar, Daniel R. 09 1900 (has links)
This thesis will focus on the area of 802.20 wireless networking as a feasible "last mile" solution to wireless access in a tactical coalition environment and will be implemented into a series of experiments. Implementation will primarily utilize Flarion's FLASH OFDM (Fast, Low-Latency Access with Seamless Handoff Orthogonal Frequency Division Multiplexing). Current and future military and homeland security forces, conducting operations in a tactical environment, require instant access to data. Wireless data requires a reliable air-link resource anchored to a viable service platform. Flarion's FLASH-OFDM wireless air-link mimics the performance of a high-speed wireline environment. Through Flarion's Radio Router base station and mobile data terminal, a Radio Access Network is created. It connects directly to a standard IP Packet Data Network forming a wireless data network. Utilizing this network environment, this thesis intends to document the implementation of a limited objective experiment (LOE) in support of homeland security and the War on Terrorism (WOT), specifically, the testing of an IEEE 802.20 network enabling US and key foreign partners to integrate mobile wireless local area network (WLAN) technologies into a surveillance and target acquisition network program.
708

Leveraging emerging technologies in Southern Thailand

Valentine, Albert R. 09 1900 (has links)
Since 2001, the Kingdom of Thailand has seen a resurgence of ethno-religious (Malay-Muslim) violence that has killed approximately 800 people, causing obvious disruption within the nation and instability in the region. As one of the US' staunchest allies in Southeast Asia and with the potential for this violence to intensify further, it behooves the US government to offer solutions to help mitigate or reduce the violence in southern Thailand. This thesis examines the history of southern Thailand, analyzing the political factors behind the Malay-Muslim rebellions of the past, tracing the roots of their rebellion back to the era of Patani Raya and the "Siamization" of the south. It explores the various trends and actors and other antecedent conditions (external influences) during the recent violence. Information on the various separatist groups operating in southern Thailand is provided along with an analysis of the porous Thai-Malay border and the role of PAS in southern Thailand. Lastly, this thesis examines an NPS field experimentation program entitled "Coalition Operation Area Surveillance and Targeting System" (COASTS). COASTS provides tactical, actionable information to remote and local decision-makers by integrating commercial-off-the-shelf (COTS) technologies such as unmanned aerial vehicles (UAVs), lighter than air vehicles (LTA), and unattended air and ground sensors, and wireless meshed networks technologies. If deployed to problematic areas, systems like COASTS can assist the Royal Thai government in reducing the violence in the south.
709

The Effectiveness of Israel's counter-terrorism strategy / Israel's counter-terrorism strategy and its effectiveness

Smith, Jerry D. 03 1900 (has links)
This thesis analyzes Israeli counter-terrorism strategy and its effectiveness. Because of ongoing suicide attacks from Palestinian and other terrorist organizations, Israel will continue to have an aggressive counter-terrorism strategy. It will study how the impact of past wars, campaigns, and deadly terrorist attacks influenced the thinking of past and current leaders. By gauging the actions, and sometimes nonactions, of the international community, the Israeli government declined to become paralyzed by U.N. and world-wide condemnation of its aggressive counter-terrorism strategies. The Israelis vehemently believe the security of the nation relies on what the Israeli Defense Force (IDF), the Israeli Security Agency (ISA), and Shin Bet do to counter terrorism, not outside governments. The IDF, ISA, and Shin Bet employ three different measures in an attempt to thwart terrorist attacks both in Israel and the Occupied Territories. Defensive, operative, and punitive measures are used in different phases of terrorist attacks in an attempt to protect the lives of Israeli citizens. Of all the three measures used by the IDF and other security agencies, defensive actions have by far been the most effective to date is included.
710

An end to the troubles unionism, nationalism, and the path to peace

Rooney, Michael J. 12 1900 (has links)
Understanding the roles played by the constituents to the Northern Ireland conflict is important and relevant for three reasons. First, an analysis of the factors contributing to a cessation of hostilities in Northern Ireland provides vital insights into the manner in which armed insurrections can be brought to an end. Secondly, as the US finds itself increasingly involved in the quagmire of sectarian conflict and attempts to put together governments representative of all major elements of indigenous proportions in both Afghanistan and Iraq, a study of past attempts by a liberal democratic government to create a representative power-sharing government which crossed the sectarian divide is particularly apt. Finally, the success of the Good Friday Agreement (GFA) seems predicated on the acceptance of democratic principles by the IRA via its political wing, Sinn Fein and the acquiescence of the Unionist population to a power-sharing arrangement which includes representation from the Republican constituency. Neither position appears to have been sufficiently present in previous attempts at power-sharing. While the long-term viability of power-sharing in the province remains in question, a return to violence has not occurred. Such factors may be critical elements in bridging the sectarian divide not only within the context of Northern Ireland, but when resolving terrorist/insurgent campaigns throughout the world.

Page generated in 0.0518 seconds