Featured

Notes from the Editor Volume XIV

The April 2018 issue features an essay examining cyber vulnerabilities in U.S. nuclear power plants and an essay reviewing an important book in the counterterrorism field. In “SCADA Fusion and Commercial Fission“, Matthew Horner analyzes the vulnerability of supervisory control and data acquisition (SCADA) systems at U.S. nuclear power plants to cyber-attack and examines ways

Featured

SCADA Fusion With Commercial Fission

by Matthew Horner Abstract Nuclear power plants rely on digital components, like supervisory control and data acquisition (SCADA) devices, to perform daily operations. These devices can contain software vulnerabilities. To address SCADA and other cyber threats, the U.S. Nuclear Regulatory Commission (NRC) has issued directives for licensed operators to submit cybersecurity plans for their facilities.

Featured

Book Review: Illusions of Terrorism & Counter-Terrorism by Richard English

reviewed by Scott Romaniuk Suggested Citation Romaniuk, Scott. “Book Review: Illusions of Terrorism and Counter-Terrorism by Richard English (Ed.). Oxford: (Oxford University Press, 2015). 174pp., £40.00 (h/b), ISBN 9780197265901.” Homeland Security Affairs 14, Article 5 (April 2018). https://www.hsaj.org/articles/14313   Terrorism, counter-terrorism, and their intersection have produced painful experiences for peoples and communities in many societies.

Featured

Defected from ISIS or Simply Returned, and for How Long?– Challenges for the West in Dealing with Returning Foreign Fighters

by Anne Speckhard, PhD., Ardian Shajkovci, PhD., & Ahmet S. Yayla, PhD. Abstract Many of the 38,000 foreign fighters ISIS has managed to attract to Syria and Iraq will return home. As increasing numbers of ISIS cadres flee the battlefield, some as defectors and others as returnees still aligned with ISIS’ goals and ideology, the challenges

Featured

Improving Maritime Transportation Security in Response to Industry Consolidation

by Nick Monacelli   Abstract Containerized cargo is the single largest security vulnerability in maritime shipping. Recent consolidation in the maritime shipping industry, along with freefalling shipping rates and increased vessel sizes, combine to cause concern for the future of containerized shipping security. Maintaining security in the maritime shipping industry is critical. Programs including the

Featured

Book Review: Preventing and Countering Extremism and Terrorist Recruitment: A Best Practice Guide by Hanif Qadir

reviewed by Caitlin Ambrozik   Suggested Citation Ambrozik, Caitlin. “Book Review: Preventing and Countering Extremism and Terrorist Recruitment: A Best Practice Guide by Hanif Qadir (Melton, Woodbridge: John Catt Educational Ltd, 2016).” Homeland Security Affairs 14, Article 3 (January 2018). https://www.hsaj.org/articles/14267         A parent logs into a child’s computer and a chat

Featured

Director’s Introduction to the UAPI Summit Special Issue

The University and Agency Partnership Initiative (UAPI) is a cornerstone element of the CHDS mission of serving as “the Nation’s Homeland Security Educator.” Its mission: facilitate educational collaboration among institutions and agencies to support development of academic programs that enable a professional workforce and promote critical thinking in homeland security. The Initiative’s primary outcome is

Featured

Cyber Border Security – Defining and Defending a National Cyber Border

by Phillip Osborn Abstract Concerns stemming from the convergence of border and cyber security threats are nothing new to those involved in both disciplines. Criminals and foreign actors have been exploiting computers and cyber methods to circumvent physical border security for decades. Today nearly every crime or homeland security threat that once required some physical

Featured

Applying an Organizational Framework to Examine Jihadi Organizations as an Industry

by Michael Logan, Gina Ligon, and Douglas Derrick Abstract The Leadership of the Extreme and Dangerous for Innovative Results (LEADIR) project, funded by The Department of Homeland Security, Science and Technology Directorate, Office of University Programs (DHS S&T OUP) since 2010, uses an industrial and organizational psychology approach to assess the characteristics of violent extremist

Featured

Incorporating Prioritization in Critical Infrastructure Security and Resilience Programs

by Duane Verner, Frederic Petit, and Kibaek Kim Abstract Protecting critical infrastructure, especially in a complex urban area or region, should focus on identifying and prioritizing potential failure points that would have the most severe consequences. Such prioritization can inform targeted planning and investment decisions, such as what infrastructure should be hardened or relocated first

Featured

A Right-Brained Approach to Critical Infrastructure Protection Theory in support of Strategy and Education: Deterrence, Networks, Resilience, and “Antifragility”

By Eric F. Taquechel and Ted G. Lewis Abstract How is the theory behind critical infrastructure/key resources (CIKR) protection evolving? Practitioners who implement strategies should be confident their strategies are based on sound theory, but theory evolves just as strategy evolves. Many theories, techniques, and models/simulations for CIKR protection have been proposed and developed over

Featured

The Roots of Community Resilience: A Comparative Analysis of Structural Change in Four Gulf Coast Hurricane Response Networks

by Thomas W. Haase, Gunes Ertan, and Louise K. Comfort Abstract Despite the emphasis on resilience, disasters continue to challenge the response capacities of communities around the United States. These challenges are generated by the complexities and uncertainties present in the post-disaster environment. This article presents the findings of an exploratory investigation into the development

Born of The Troubles: Lessons in Trust and Legitimacy from the Police Service of Northern Ireland

John Murray EXECUTIVE SUMMARY Trust and the establishment of legitimacy are essential to building strong relationships between law enforcement and the communities they serve. Distrust of the police can lead to a lack of community involvement, an unwillingness to assist law enforcement with investigations, and in some cases, a perception of the police not as

U.S. Refugee Policy in the Era of Homeland Security: A Comparative Government Analysis

Reiss Kuczera EXECUTIVE SUMMARY Since the 20th century, America has seized opportunities to lead the international community and subsequently claim global power status and influence. It proved its military might in both world wars, and for decades, it has championed human rights around the world. Although humanitarian policies often serve the country’s self-interests politically, humanitarian

Dashboards for the Fire Service

Alan Butsch EXECUTIVE SUMMARY The purpose of this thesis project was to examine how to best to use principles of modern Business Intelligence (BI) and dashboards to support real-time decision making and performance improvement in a modern fire service agency. The problem that this project attempted to solve is the disconnect between personnel and organizational

The Reality of the DHS Enterprise Field Intelligence Information Sharing Environment

Michael Brown EXECUTIVE SUMMARY Terrorist attacks such as those between 2014 and early 2017 in Garland, San Bernardino, Orlando, Fort Lauderdale, Seaside, and Chelsea highlight the increased challenge of preventing terrorist and homegrown violent extremists in the Homeland. At its core, the challenge for information sharing involves how federal, state, local, territorial, and tribal counterterrorism