31 |
O que a Escola Superior de Guerra (ESG) Ensinava / What Does the Superior School of War (ESG) taughtSebastiÃo Andrà Alves de Lima Filho 28 March 2011 (has links)
Conselho Nacional de Desenvolvimento CientÃfico e TecnolÃgico / A tese investiga os significados dos ensinamentos da Escola Superior de Guerra (ESG) referente ao desenvolvimento, a integraÃÃo nacional e ao progresso da ciÃncia e da tecnologia no Brasil no perÃodo 1949-1976. Para tanto, trata de estabelecer relaÃÃes entre a criaÃÃo da Escola, o perfil de seus âalunosâ e a finalidade de seus cursos, especificamente o Curso Superior de Guerra. O trabalho identifica que os ensinamentos da ESG se caracterizavam por posiÃÃes antidemocrÃticas, anticomunistas e favorÃveis a implantaÃÃo, no paÃs, de um modelo de desenvolvimento capitalista dependente. Indica que a ESG era uma instituiÃÃo militar de formaÃÃo de âelites orgÃnicasâ, posicionadas entre as camadas sociais de grande poder de articulaÃÃo e mobilizaÃÃo polÃtica, favorecendo, principalmente, a politizaÃÃo das ForÃas Armadas dispostas a controlar a direÃÃo do Estado brasileiro. / The thesis investigates the meanings of the teachings of the War College (ESG) for the development, national integration and progress of science and technology in Brazil in the period 1949-1976. For this purpose, is to establish relations between the creation of the School, the profile of his "students" and the purpose of their travels, specifically the Course of War. The paper identifies that the teachings of ESG positions were characterized by undemocratic, anti-communist and favorable the deployment in the country a model of dependent capitalist development. Indicates that the ESG was an institution for training of "elites organic", positioned between the layers of great social networking power and political mobilization, promoting the politicization of the Armed Forces unwilling to control the direction of the Brazilian state.
|
32 |
Development of Local Homeland Security Networks in the State of Florida: A Social Network Analysis ApproachBell, Patrick M 28 April 2012 (has links)
How do local homeland security organizations respond to catastrophic events such as hurricanes and acts of terrorism? Among the most important aspects of this response are these organizations ability to adapt to the uncertain nature of these “focusing events” (Birkland 1997). They are often behind the curve, seeing response as a linear process, when in fact it is a complex, multifaceted process that requires understanding the interactions between the fiscal pressures facing local governments, the institutional pressures of working within a new regulatory framework and the political pressures of bringing together different levels of government with different perspectives and agendas.
This dissertation has focused on tracing the factors affecting the individuals and institutions planning, preparing, responding and recovering from natural and man-made disasters. Using social network analysis, my study analyzes the interactions between the individuals and institutions that respond to these “focusing events.” In practice, it is the combination of budgetary, institutional, and political pressures or constraints interacting with each other which resembles a Complex Adaptive System (CAS).
To investigate this system, my study evaluates the evolution of two separate sets of organizations composed of first responders (Fire Chiefs, Emergency Management Coordinators) and community volunteers organized in the state of Florida over the last fifteen years. Using a social network analysis approach, my dissertation analyzes the interactions between Citizen Corps Councils (CCCs) and Community Emergency Response Teams (CERTs) in the state of Florida from 1996- 2011. It is the pattern of interconnections that occur over time that are the focus of this study.
The social network analysis revealed an increase in the amount and density of connections between these organizations over the last fifteen years. The analysis also exposed the underlying patterns in these connections; that as the networks became more complex they also became more decentralized though not in any uniform manner. The present study brings to light a story of how communities have adapted to the ever changing circumstances that are sine qua non of natural and man-made disasters
|
33 |
Le renseignement et la gendarmerie nationale : enjeux et perspectives / Intelligence and the national gendarmerie : issues and perspectivesHamoir, Clement 13 November 2019 (has links)
Alors que la gendarmerie nationale exerce ses missions sur l’ensemble du spectre de la sécurité nationale, celle du renseignement est longtemps demeurée en retrait. La reconnaissance de cette compétence, enfin acquise en 2009 après d’âpres débats, lui a permis de revendiquer un nouveau positionnement dans l’organisation administrative des services. Dans un contexte marqué par la nécessaire prise en compte de la menace terroriste, elle est parvenue à créer son propre service de renseignement en 2013, la SDAO. Bien qu’intégrée depuis toujours à son organisation dans le cadre d’une approche généraliste de la sécurité, la fonction de renseignement de la gendarmerie est désormais incarnée dans sa structure. Sa reconnaissance par la loi de 2015 relative au renseignement permet de consacrer la gendarmerie nationale comme un acteur à part entière du renseignement. Dès lors, l’institution a progressivement adapté son organisation pour répondre aux enjeux posés par ce nouveau droit du renseignement et prendre en compte ses nouvelles prérogatives. Cependant, ces évolutions bouleversent les équilibres. En interne, le centre de gravité du renseignement de sécurité intérieure s’est détaché de la fonction de police judiciaire pour être repositionné au niveau de la SDAO. A l’extérieur, la création de cette nouvelle entité, en parallèle des problématiques posées par l’intégration de la gendarmerie au ministère de l’Intérieur, met en lumière le caractère à la fois central mais sensible de la coordination avec les autres services. Par les enjeux qu’il soulève, le renseignement questionne ainsi le modèle français de police autour de deux logiques opposées, celle du maintien de l’autonomie de chaque institution ou le renforcement de la complémentarité entre elles. Les choix qui seront pris feront en évoluer une au détriment de l’autre. / While the national gendarmerie carries out its missions on the whole spectrum of the national security, that of the intelligence for a long time remained in withdrawal. The recognition of this competence, finally acquired in 2009 after bitter debates, allowed him to claim a new position in the administrative organization of services. In a context marked by the need to take into account the terrorist threat, it managed to create its own intelligence service in 2013, the SDAO. Although it has always been part of its organization as part of a global approach to security, the intelligence function of the gendarmerie is now embodied in its structure. Its recognition by the law of 2015 on the intelligence makes it possible to devote the national gendarmerie as a full actor of intelligence. Since then, the institution has gradually adapted its organization to respond to the challenges posed by this new intelligence law and to take into account its new prerogatives. However, these developments upset the equilibrium. Internally, the center of gravity of internal security intelligence broke away from the judicial police function to be repositioned at the level of the SDAO. Outside, the creation of this new entity, in parallel with the problems posed by the integration of the gendarmerie at the Ministry of the Interior, highlights the central but sensitive nature of coordination with other services. By the issues it raises, intelligence questions the French police model around two logics that currently oppose, that of maintaining the autonomy of each institution or reinforcing the complementarity between them.
|
34 |
The Question of Homeland Security in Rural AmericaGonzalez, Manuel 01 January 2016 (has links)
Following the issuance of the National Preparedness Guidelines in 2009 by the Department of Homeland Security, it remains unknown whether homeland security programs have been consistently implemented in the nation's rural areas. Research findings have been inconsistent and inconclusive on the degree of implementation. Two problems may result from inadequate implementation of these programs: weakened national security from the failure to protect critical infrastructure in remote areas and a threat to public safety in rural towns. The purpose of this qualitative case study was to explore and describe the reasons for possible noncompliance through purposeful interviews with 10 law enforcement officials and emergency managers in selected Midwestern rural towns. The study's theoretical foundation was based on Putnam's theory of social capital, which holds that community cohesion develops in direct relation to the adaptation of social networks that promote mutual cooperation during times of need. The research centered on the question of how rural emergency managers and law enforcement officials justified noncompliance with the National Preparedness Guidelines of 2009. The interviews and materials were transcribed and analyzed with qualitative analytic software using open, axial, and selective coding to identify themes and patterns. The study's key findings disconfirmed conclusions reported in previous studies and confirmed compliance with the Guidelines in the studied rural towns. Implications for positive social change include informing policymakers, emergency managers, law enforcement officials, and researchers. Application of social capital principles in all the nation's remote areas may enhance national security and improve rural public safety.
|
35 |
Patterns Within Nine Preattack Phases That Emerged in Israel Suicide Bombing CasesRichman, Aaron 01 January 2018 (has links)
From 2000 to 2013, Israel had the second highest number of deaths from suicide attacks and was on the list of countries that may experience increases in terrorism due to ongoing conflicts. Suicide bombings present highly complex situations for counterterrorism and counterinsurgency professionals. Using Freeman, Tucker, and Merton's framework of 9 preattack phases as the primary theoretical constuct, the purpose of this multiple case study was to explore specific patterns that consistently emerged in the adversary planning process for 6 successful or failed suicide bombing cases in Israel. Secondary, archival data were acquired through a data use agreement with a private security organization in Israel and a maximum variation sampling procedure was used to identify cases. These data were subjected to Straus and Corbin's open and axial coding procedures. Coded data were analyzed using Merriam's cross case analysis procedure. Findings indicated that although the nine preattack phases emerged in both the successful and unsuccessful attacks, they were more consistently present in the successful bombing cases. For the successful attacks, general planning, financing, and operational preparation received the most occurrences. The implications for positive social change are directed at counterterrorist decision makers and operators as focusing on the early planning phases of a terrorist attack will help them to better identify essential opportunities to prevent suicide attacks from occurring.
|
36 |
A Duty to Share: The Opportunities and Obstacles of Federal Counterterrorism Intelligence Sharing with Nonfederal Fusion CentersGardner, Jeffrey V. 01 January 2017 (has links)
Little is known about how effectively federal agencies share terrorism intelligence with state and local governments through fusion centers. As a result, there is a risk that local governments do not receive critical intelligence that would allow them to collaboratively prevent catastrophic terrorist attacks. Using Dawes' interagency information sharing model, the purpose of this exploratory case study was to evaluate how effectively federal agencies share terrorism intelligence with fusion centers. Data were collected through interviews with 25 senior leaders, federal agents deployed to fusion centers, and intelligence analysts in 5 fusion centers on the East Coast. These data were inductively coded and then subjected to a thematic analysis procedure. Findings indicated that, among these leaders, information sharing was hindered by both technology and inter-organizational relationships between the fusion centers and federal agencies. Participants also noted that obstacles to information sharing regarding classified data has not been sufficiently mitigated. Dawes' interagency information-sharing theory was found to be explanatory regarding intelligence sharing activities. Implications for positive social change include recommendations to the Department of Homeland Security to utilize Dawes' work on information sharing in order to alleviate the tension between federal and local agencies and remove obstacles, particularly related to classified intelligence related to counterterrorism. Doing so can be useful in developing policy recommendations to improve the dynamics between federal and local agencies, thereby allowing critical information to be shared with state and local governments in a proactive manner that may better protect communities.
|
37 |
An Assessment of Intergovernmental Relationships between Native American Tribes, the States, and the Federal Government in Homeland Security and Emergency Management PolicyAnderson, Leigh R. 12 November 2014 (has links)
No description available.
|
38 |
'Securing' the Homeland? A Comparison of Canadian and American Homeland Security Policy in the Post-9/11 PeriodMcGuire, Sara K. 10 1900 (has links)
<p>In the post-9/11 period, the United States can be seen to have securitized its approach to homeland security policy. Canada did not follow suit. Instead, the Canadian state sought to respond to American securitization initiatives in order to protect its own state interests. An in-depth examination of securitization theory demonstrates that this theoretical construct has been re-interpreted by scholars and adapted to various research agendas. This dissertation differentiates amongst three variants of securitization theory: philosophical, sociological, and post-structural. Common to these competing variants of securitization theory was the finding that the role of the audience had remained vague, hindering the use of this theoretical model for examining the policy creation process. Focusing on the philosophical variant of securitization theory, as originally articulated by the Copenhagen School, this dissertation re-evaluates the role of the audience while examining the ways in which the American approach to homeland security was securitized in the new security environment that emerged following 9/11, as well as Canada’s response to this securitization.</p> <p>This project divides the audience into two separate groups, made up of three components. The elite audience, which is comprised of members of the state policy elite, and the media first determine whether or not an issue poses an existential threat to the security of the state. The populist audience - the state’s public - then determines for itself whether or not it accepts the existential nature of the threat. This division of the audience into two separate groups allows for a clearer understanding of whether or not a given issue has been successfully securitized.</p> <p>In the post-9/11 period, the American audience groups willingly accepted that the threat of terrorism posed an existential threat to the state. The Canadian audience groups, prompted by their own authorized speakers of security, did not recognize terrorism as posing an existential threat to the Canadian states. Ultimately, an examination of the audience groups in these two states demonstrates the utility of the philosophical variant of securitization theory for evaluating states’ responses to security threats.</p> / Doctor of Philosophy (PhD)
|
39 |
Local Emergency Planning Committees: Collaboration, Risk Communication, Information Technology and Homeland SecurityBlackwood, Matthew Joseph 12 March 2003 (has links)
Local emergency planning committees (LEPCs) were designed to develop emergency response plans and provide information through community right-to-know programs. A literature review identified operational effectiveness, collaboration, risk communication, information technology (IT), and homeland security as important issues for LEPCs. However, a lack of research on the interaction of these fields raises several questions that were addressed in this study:
1. How is the operational effectiveness of LEPCs related to their organizational characteristics?
2. To what extent does collaboration exist between LEPCs and other groups?
3. What types of risk communication strategies are used by LEPCs? How are these initiatives mediated through technology?
4. To what degree and to what purposes are LEPCs utilizing information technologies?
5. How will homeland security initiatives influence emergency planning and community right-to-know programs? How will potential opportunities and constraints posed by homeland security affect the future role of LEPCs?
The sample for this study was randomly selected from LEPCs in US EPA's Region III, including the states of Delaware, Maryland, Pennsylvania, Virginia, and West Virginia. Phase one involved mailing out 156 surveys; 66 were returned for a response rate of 42%. Phase two involved case studies of LEPCs in Greenbrier County, WV; Tazewell County, VA; and Elk County, PA.
Findings indicate that LEPC activity level is lower than previously reported. This research shows that IT is considered important, but its use is limited. Respondents reported using computers for word processing and, on a limited basis, for planning. The level of IT use for data management, emergency response activities, and risk communication was unexpectedly low. The research did not find a significant relationship between LEPC characteristics and the level of IT use. Barriers to IT use and operational status related to lack of funding and training. Data from surveys, interviews, and physical evidence were used to triangulate these findings.
This research is significant in its identification of the current operation of LEPCs. It provides an assessment of collaborative initiatives being used within LEPCs and highlights methods employed to develop and implement risk communication programs. These findings can be used to evaluate the potential role of LEPCs in homeland security initiatives, which will likely focus on emergency planning with a decreased emphasis on risk communication. / Ph. D.
|
40 |
Measuring Effectiveness in the Domestic Intelligence Community: Taking a Configurational Approach to Explain Organizational Outcomes in the National Network of Fusion CentersCoffey, Andrew Francis 10 June 2015 (has links)
This dissertation examines organizational level outcomes within a whole network--the national network of fusion centers. Fusion centers are state and local organizations that fuse threat-related intelligence and information by working with federal, state, and local law enforcement as well as other security partners in the public and private sectors. This research will ask why outcomes at the fusion center level vary within the network by exploring unique configurations of conditions at multiple levels of analysis. The results of the research will present evidence that suggests whole network effectiveness cannot be fully comprehended without first examining sub-network level impacts, such as the training or experience of analysts, organizational capacities, and the roles of relationships between network actors. This line of inquiry has ramifications for inter-organizational network theory building because it will demonstrate the individual importance of these factors, and how they interact with other factors at multiple levels within a network to influence outcomes. For practitioners in the domestic intelligence community this research will provide important insights and present paths taken by organizations in a national network to achieve a desired or undesired outcome. / Ph. D.
|
Page generated in 0.0786 seconds