Follow the Silk Road: How Internet Affordances Influence and Transform Crime and Law Enforcement

Ryan Jerde EXECUTIVE SUMMARY This thesis studies the changing typology of border-related crime being driven by Internet technologies. Internet technologies are moving elements of crime, understood to be physical, to the digital realm. Drug trafficking, human trafficking and sexual exploitation, and money laundering are some of the crimes being facilitated by Internet technologies. The evolution

An Arizona Border Wall Case Study

Justin Bristow EXECUTIVE SUMMARY A recurring question regarding U.S. border security is how effective a wall is in terms of investment and utility. The comments are many, from the wall providing a deterrent and preventing illegal border crossings to resourceful smugglers finding ways to circumvent the wall completely. The purpose of the wall is to

Pre-Incident Planning for the Los Alamos National Laboratory

Troy Hughes EXECUTIVE SUMMARY The Department of Energy (DOE) operates seventeen national laboratories across the United States. These laboratories conduct scientific research across a wide spectrum of topics, including the environment, health, computing, and national security. Los Alamos National Laboratory (LANL) focuses on national security. LANL was established in 1943, and its staff work to

Prospective Vigilance: Assessing Complex Coordinated Attack Preparedness Programs

Jared Goff EXECUTIVE SUMMARY State and local first responders in the United States lack a common strategic approach to preparing for complex coordinated attacks (CCAs).[1] Scholarly research, analysis, and shared best practices are important pillars to help first responders become better prepared and resilient, yet these components are mostly absent from the CCA narrative. Inconsistent

A Proposed Cosmology of Identity in The Sociotechnical Ecosystem of Homeland Security

Gerard Sevan EXECUTIVE SUMMARY The thesis explores how technology and social identity interact in the context of homeland security. Emerging ideas on technologically dependent and enhanced humans raise important ontological questions about current theories of identity, culture, and society and how a new identity paradigm creates security threats.[1] There is currently no agreement on the

The Black Flags of Their Fathers: The Islamic State’s Returning Foreign Fighter Youths and the Implications for U.S. Domestic Security

John Tani Jr. EXECUTIVE SUMMARY The Islamic State has sent young children to their deaths on the battlefield and in suicide attacks. For the most part, the carnage inflicted by these youth terrorist fighters has been contained to the areas where the Islamic State has held territory. Fortunately, this phenomenon has not yet manifested in

Countering Violent Extremism Policy in The United States: Are CVE Programs in America Effectively Mitigating The Threat of Homegrown Violent Extremism?

Craig Stewart EXECUTIVE SUMMARY In 2014, the United States initiated formal programming to counter violent extremism in three test cities, pursuant to the White House’s countering violent extremism (CVE) strategy outlined in 2011’s Empowering Local Partners to Prevent Violent Extremism in the United States. Since the creation of the pilot program, the Department of Homeland

Untitled

  Adrian Sheppard EXECUTIVE SUMMARY Pyro-terrorism, the purposeful ignition of fire with the intention of causing harm, can make firefighting so complex that it eventually stretches the resources of a firefighting department to the limit. The need to preempt terrorist attacks on buildings has forced fire departments to create counter-terrorism units on an unprecedented scale.

Big Brother or Trusted Allies? How the Police Can Earn Community Support for Using Unmanned Aircraft

Craig Schwartz EXECUTIVE SUMMARY The police have long recognized the critical observation and decision-making advantages provided by the use of aircraft to give an aerial view. They have used manned aircraft for decades in their public safety missions, but fixed-wing aircraft and helicopters are prohibitively expensive and very few departments can afford their high purchase