• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 70
  • 28
  • 12
  • 4
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • 1
  • 1
  • 1
  • Tagged with
  • 205
  • 205
  • 102
  • 102
  • 58
  • 45
  • 38
  • 36
  • 28
  • 27
  • 27
  • 22
  • 20
  • 19
  • 18
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
51

Effectiveness of using red-teams to identify maritime security vulnerabilities to terrorist attack

Culpepper, Anna M. 09 1900 (has links)
Approved for public release; distribution is unlimited / As the United States continues to develop plans and policies to counter the threat of terrorism, it becomes increasingly more vital to understand the entire spectrum of the threat. Realistically assessing the capability of possible and probable terrorist groups helps federal and state agencies to establish potential methods and procedures for defense and maritime domain awareness. Yet, the avenues of attack and the varieties of terrorists far outnumber the available resources of most agencies concerned. Moreover, there have been no attacks on homeland U.S. targets since September 11. The red team concept provides an innovative method to examine these vulnerabilities from the terrorist perspective. The effectiveness of a red team can be measured in various ways and is dependent on key organizational and situational elements. In the end, the determination of effectiveness is based on the original intentions of the host enterprise, whether it is training, research, strategy, or analysis or a combination. We conducted a case study to utilize the red team concept as a tool for bringing a fresh awareness to a critical issue within the National Strategy for Combating Terrorism. The red teams identified vulnerabilities of possible targets, raised the awareness on the nature of terrorists, researched potential tactics and tools, and examined existing assumptions about maritime security. In applying the red team concept, the case study used military officers as surrogate terrorists planning a campaign to attack port cities. The case study effectively demonstrated the anticipated functions, while the follow-on actions ensured that the results were distributed to the appropriate agencies. Furthermore, civilian officials and the agencies concerned valued the red team reports as positive insights into the current situation. / Lieutenant, United States Navy
52

Funding for first responders from a threat and prevention approach

Weinlein, Michael C. 06 1900 (has links)
CHDS State/Local / Approved for public release; distribution is unlimited / It has been thirty-three months since the United States was attacked by terrorists on September 11th 2001. Yet, in distributing grants to States and localities to build their capacity for homeland security, the Nation continues to rely on funding formulae that are deeply flawed. Many grants are distributed in ways that ignore need-driven criteria, such as where terrorists are most likely to strike and which targets are most critical. This thesis develops an alternative formula that takes need into account (and therefore is much more likely to send funds where they are required). After reviewing need-driven formulae from a range of fields that might be applied to homeland security, I use the Analytical Hierarchy Process (AHP) to break the objectives of homeland security capacity-building into discreet, measurable components. Then, I analyze the criteria that should be used to build a grant allocation process to accomplish those objectives, including population density, criticality of infrastructure, the threat to a municipality, vulnerability to that threat, and terrorism prevention. The resulting formula is far better structured than the current system to put homeland security grant funds where the Nation most needs them. / Civilian, Assistant Chief Fire Department City of New York
53

"Maintain course and speed..." command and control for maritime homeland security and homeland defense

Breor, Scott F. 06 1900 (has links)
CHDS State/Local / Approved for public release; distribution is unlimited / Since 11 September 2001, a number of authorities have provided definitions for both Homeland Security (HS) and Homeland Defense (HD), however, as the definitions develop, they provide less functional detail. The most often asked question posed to professionals in the field is "what is the distinction between the Homeland Security mission and the Homeland Defense mission." What they are really asking is, in a particular scenario, "who's in charge of the operation?" "When is it law enforcement, or non-military, and when is it a military operation"? Many have argued that the command structure between the two Services needs to be changed to ensure the seam between HS and HD is minimized. This is a natural approach because command and control is possibly the most important of all operational functions. The objective of this thesis is to argue that the Navy and Coast Guard should not establish a joint interagency command structure for the missions of Homeland Security and Homeland Defense. They should continue to coordinate and support one another, when required, but they should not combine the two Services together into a permanent single organization. / Commander, United States Navy
54

Homeland Security advisory system

Behunin, Scott A. 06 1900 (has links)
CHDS State/Local / In March of 2002, through the Homeland Security Presidential Directive 3, the Homeland Security Advisory System (HSAS) was developed. The original intent of the HSAS was to provide a warning mechanism for the federal government; other state and local agency responses were voluntary. However, the intent expanded to include a warning system for local, state, federal agencies, the private sector and the general public. Five orange alerts later, the confusion continues with a mix of complacency and misunderstanding. State and local officials complain about the general nature of the intelligence and the lack of specificity directed at regions or targets. The cost of orange protective measures is adding up into the billions of dollars. Warnings specific to New York City have a different value in Utah. Solutions require a new federal intelligence culture with a new name and location under the direction of the Department of Homeland Security distributing specific intelligence. We need highly trained intelligence analysts working with multi-agency state or metropolitan fusion centers. The media should help in educating the public on the HSAS and promoting volunteer organizations, encouraging participation to assist in Homeland Security and to reduce the fear of a catastrophic event. Customized HSAS should be developed for each community, state and private sector business to better utilize protective resources. Protective measures should be implemented with specific intelligence to support the elevation of the HSAS. / Civilian-Utah Department of Public Safety
55

Safety risk management for Homeland Defense and Security responders

Meyers, Tommey H. 09 1900 (has links)
CHDS State/Local / Responders at the Federal, state, and local level are critical to Homeland Defense and Security (HLDS). Building from the recently published RAND and National Institute of Occupational Safety and Health (NIOSH) report on responder safety, this thesis explores the issues associated with creating a safety risk management capability that will enable HLDS responders to better protect themselves from harm and enhance their readiness. Risk management experiences within the military were benchmarked with emphasis upon lessons learned from the U.S. Coast Guard and the U.S. Navy. This revealed that Operational Risk Management (ORM), a risk-based decision-making tool that systematically balances risk and mission completion, and Crew Resource Management (CRM), a human factors-based team coordination training, should be the primary components focused upon to build the safety risk management capability. Development of ORM and CRM capabilities for HLDS responders will require strong national and local leadership, innovative measurement tools, clear accountability, and should be implemented via the national preparedness model outlined in Homeland Security Presidential Directive 5 (HSPD- 5) and HSPD-8. ORM and CRM, if successfully established, can provide HLDS responders with the safety risk management capability that enables them to safely and effectively provide their vital services to the Nation. / Chief - Afloat & Marine Safety, US Coast Guard (USCG)
56

Preventing terror attacks in the Homeland : a new mission for state and local police

Lanier, Cathy L. 09 1900 (has links)
CHDS State/Local / As the Department of Homeland Security continues to develop plans and strategies to guide our government agencies towards a safer environment, state, local, and tribal law enforcement agencies are struggling to define their role in the Homeland Security Mission. This paper proposes the creation of a National Law Enforcement Network made up of the state, local and tribal law enforcement agencies throughout the country. The network design will allow local agencies to reach beyond the traditional law enforcement approach by establishing formal networks that facilitate local, regional, national and eventually global coordination of an effective strategy aimed at preventing future terror attacks in the homeland. The creation of this network will ensure that every police officer in the United States understands their role in preventing future terror attacks. Drilling down to the lowest local level to include businesses, industry and the private sector, the formation of the network expands our detection and prevention capabilities well beyond our current level. / Commander - Special Operations Division, Metropolitan Police Department
57

How can we improve information sharing among local law enforcement agencies?

Miller, Patrick E. 09 1900 (has links)
CHDS State/Local / The events of 9/11 and subsequent examination of the intelligence community in the United States have clearly identified several areas that require immediate repair. While we have, on the federal, state and local levels, a complex system of collecting, developing, and analyzing intelligence that can be used to prevent terrorist attacks, we do not have an accompanying system that shares intelligence information throughout the law enforcement community. The purpose of this thesis is to review information sharing between federal, state and local law enforcement agencies and to suggest methods to improve that capability. In the aftermath of the September 11th attacks, authorities uncovered patterns of suspicious activity occurring in places such as Maryland, Florida, and New Jersey. These activities included individuals paying cash for plane tickets, taking flight lessons, inquiring about crop duster planes, and frequenting drug stores. Taken individually, these incidents were not overly suspicious; nor were they seen as serious when reported to authorities. Yet, all together they illustrate at best highly suspicious behavior, and at worst a picture of a master plan of prospective criminal activity. When collecting data on terrorist potential, one isolated incident in a local jurisdiction may not have obvious significance, but the ability to view all incidents together across cities or states might paint a more complete picture. Agencies are now recognizing the benefits of data sharing across institutions and jurisdictions. / Assistant Police Chief, Ventura Police Department
58

First responder readiness : a systems approach to readiness assessment using model based vulnerability analysis techniques

Mayer, Harry A. 09 1900 (has links)
CHDS State/Local / This thesis reviews various readiness assessment tools used by military units and the civilian First Responder community. Most civilian readiness assessment tools have fallen short of adequately predicting a response team's probability of mission success or failure. This thesis will explore the use of model-based vulnerability analysis techniques and FT++ software as potential tools that could be adopted by first response organizations to predict a unit's operational performance. / National Disaster Medical System Emergency Coordinator, DHS / FEMA
59

Perception or fact : measuring the performance of the Terrorism Early Warning (TEW) group

Grossman, Michael. 09 1900 (has links)
CHDS State/Local / This thesis examines the structure and intelligence process of the Los Angeles Terrorism Early Warning (TEW) Group to assess its effectiveness as measured through the application of a Program Logic Model. This model verifies the links between the assumptions on which the program is based and actual program activities. It further assesses its status as a â smart practiceâ based on measurable criteria that are beyond perception or peer approval alone. The TEW is a regional, multi-agency and multi-disciplinary network that functions as a focal point for analyzing the strategic and operational information needed to prevent, mitigate, disrupt and respond to threats and acts of terrorism. Although efforts toward prevention are difficult to measure in any program, input and outcome are assessable. This method provides an effective means to evaluate a program while documenting what works and why. Effectiveness should not be based solely on outputs; a structure that produces them is also an indicator. The objective of this thesis is to establish a benchmark of practical standards for collaborative intelligence sharing operations that can be replicated by other regions and that will establish a common nationwide homeland security intelligence network. Based on these criteria, it is reasonable to conclude that the TEW is in fact a â smart practice.â It meets its intended goals and objectives when measured according to the parameters of the Program Logic Model, and has a structured process and system that leads to preferred outcomes. / Commander, Los Angeles County (California) Sheriff's Department
60

State and local intelligence fusion centers : an evaluative approach in modeling a state fusion center

Forsyth, William A. 09 1900 (has links)
CHDS State/Local / In the final report on the attacks of September 11, 2001, the National Commission on Terrorist Attacks Upon the United States (9/11 Commission) found that the attacks were successful in part because information was not shared and analysis not pooled among the different agencies across all levels of government. Since that time, there have been significant strides to improve cooperation and close the intelligence gaps among the different intelligence and law enforcement services. Effective terrorism prevention, however, requires information and intelligence fusion as a cooperative process at all levels of government so that the flow of intelligence can be managed to support the identification of emerging threats to the homeland. This thesis explains the value of a state/regional fusion center by examining three successful fusion centers in Arizona, Georgia, and Los Angeles. Recommendations from each agency on lessons learned, as well as independent research, have been provided to help state and local agencies develop their own fusion centers. / Supervisory Special Agent (SSA), Federal Bureau of Investigation (FBI)

Page generated in 0.063 seconds