The FBI's Counterterrorism Program

Total Page:16

File Type:pdf, Size:1020Kb

The FBI's Counterterrorism Program U.S. Department of Justice Federal Bureau of Investigation Report to the National Commission on Terrorist Attacks upon the United States: The FBI’s Counterterrorism Program Since September 2001 April 14, 2004 Report to The National Commission on Terrorist Attacks upon the United States The FBI’s Counterterrorism Program Since September 2001 TABLETABLE OF OFCONTENTS CONTENTS I EXECUTIVE SUMMARY....................................................................11 II FBI ORGANIZATIONAL CHART................................................. 3 III TIMELINE OF SIGNIFICANT REFORMS AND INITIATIVES SINCE 9/11/01.......................................................... 4 IV INTRODUCTION......................................................................................66 V PRIORITIZATION....................................................................................77 The New Priorities.........................................................................................77 1 Protect the United States from Terrorist Attack..........................................77 2 Protect the United States Against Foreign Intelligence Operations and Espionage........................................................................................77 3 Protect the United States Against Cyber-based Attacks and High-Technology Crimes..................................................................88 4 Combat Public Corruption at all Levels.......................................................88 5 Protect Civil Rights......................................................................................88 6 Combat Transnational/National Criminal Organizations and Enterprises...88 7 Combat Major White-Collar Crime..............................................................88 8 Combat Significant Violent Crime...............................................................88 9 Support Federal, State, Municipal, and International Partners...................99 10 Upgrade Technology to Successfully Perform the FBI's Mission...............99 Implementing the New Priorities.............................................................99 1 Communication of Priorities........................................................................99 2 Priorities in the Budgetary Process...........................................................1010 3 Enforcement of Priorities...........................................................................1111 VI MOBILIZATION.......................................................................................1212 Personnel Mobilized.....................................................................................12 Expanded Operational Capabilities.......................................................13 1 Counterterrorism Watch............................................................................1313 2 National Joint Terrorism Task Force...........................................................14 3 Terrorism Financing Operations Section.......................................................15 4 Evidence Exploitation..................................................................................16 5 Fly-Away/Rapid Deployment Teams............................................................ 16 6 Foreign Terrorist Tracking Task Force.........................................................16 7 Bioterrorism Risk Assessment Group..........................................................17 8 Foreign Intelligence Surveillance Act Unit...................................................17 9 Language Translation.................................................................................17 10 Special Technologies and Applications Section..........................................18 11 Investigative Technology Division................................................................19 VII CENTRALIZATION............................................................................2020 Investigative Operations Branch.......................................................................2121 Operational Support Branch...............................................................................2222 Counterterrorism Analysis Branch....................................................................2222 VIII INTELLIGENCE INTEGRATION..............................................2323 Integrating Criminal and Intelligence Operations.......................................2323 Integrating Intelligence Processes in our Operations...............................2424 1 Initial Deployment of Analysts....................................................................2525 2 Office of Intelligence..................................................................................2525 3 Intelligence Program..................................................................................2525 EAD Intelligence...............................................................................2626 Concepts of Operations....................................................................2626 Field Office Intelligence Operations.....................................................28 Requirements Process.....................................................................2828 Baselining of Sources.......................................................................2929 Analytical Assets................................................................................29 Intelligence Production Board...........................................................3030 4 Intelligence Workforce................................................................................3131 Recruitment.......................................................................................3131 Special Agents Career Track............................................................3131 Training.............................................................................................3232 Program Evaluations........................................................................3434 Special Agent Evaluations................................................................3535 Evaluation of Special Agents in Charge...........................................3636 IX COORDINATION.................................................................................3737 State and Municipal Law Enforcement.....................................................3737 1 Task Forces...............................................................................................3838 2 Office of Law Enforcement Coordination...................................................3939 3 Terrorist Screening Center........................................................................3939 4 Law Enforcement Online...........................................................................4040 5 Alert Notification System............................................................................4141 6 Intelligence Bulletins..................................................................................4141 7 Information Sharing Pilot Projects..............................................................4141 8 Security Clearances...................................................................................4141 9 New Counterterrorism Training Initiatives..................................................4242 10 Behavior Analysis Unit...............................................................................4343 11 Regional Computer Forensic Laboratory Program....................................4343 Intelligence Community...............................................................................………..4343 1 Terrorist Threat Integration Center.......................................................………4343 2 Exchange of Personnel......................................................................................4444 3 Joint Briefings................................................................................................…..4444 4 Secure Networks............................................................................................….4444 5 Compatability of Information Technology Systems..............................4444 6 Terrorist Explosive Device Analytical Center....................................45 Department of Homeland Security...................................................................4545 Foreign Governments.....................................................................................................4646 1 International Investigations........................................................................4646 2 Expansion of Legal Attaché Offices...........................................................4646 3 Joint Task Forces and Operations.............................................................4747 4 Fingerprint/Identification Initiatives............................................................4747 5 International Training Initiatives.................................................................4848 Private Sector ..................................................................................................................4949 1 Community Outreach.................................................................................4949 2 Infragard....................................................................................................4949 3 Financial Sector Outreach.........................................................................5050 4 Railroad Initiative.......................................................................................5050
Recommended publications
  • FBI Academy Training Facility A&E Study………………………………
    Table of Contents Page No. I. Overview ………………………………………………………………….............. 1-1 II. Summary of Program Changes…………………………………………….. 2-1 III. Appropriations Language and Analysis of Appropriations Language….......... 3-1 IV. Decision Unit Justification…………………………………………………... 4-1 A. Intelligence………………………………………………………………… . 4-1 1. Program Description 2. Performance Tables 3. Performance, Resources, and Strategies a. Performance Plan and Report for Outcomes b. Strategies to Accomplish Outcomes B. Counterterrorism/Counterintelligence ……………………………………… 4-14 1. Program Description 2. Performance Tables 3. Performance, Resources, and Strategies a. Performance Plan and Report for Outcomes b. Strategies to Accomplish Outcomes C. Criminal Enterprises and Federal Crimes…………………………………… 4-36 1. Program Description 2. Performance Tables 3. Performance, Resources, and Strategies a. Performance Plan and Report for Outcomes b. Strategies to Accomplish Outcomes D. Criminal Justice Services…………………………………………………….. 4-59 1. Program Description 2. Performance Tables 3. Performance, Resources, and Strategies a. Performance Plan and Report for Outcomes b. Strategies to Accomplish Outcomes V. Program Increases by Item………………………………………………… 5-1 Domain and Operations Increases Comprehensive National Cybersecurity Initiative………………………... 5-1 Intelligence Program………………………………………………….…... 5-6 National Security Field Investigations……….………………………….... 5-13 Mortgage Fraud and White Collar Crime………………………………… 5-15 WMD Response………………………………………………………..…. 5-19 Infrastructure Increases
    [Show full text]
  • A Review of FBI Security Programs, March 2002
    U.S. Department of Justice A Review of FBI Security Programs Commission for Review of FBI Security Programs March 2002 Commission for the Review of FBI Security Programs United States Department of Justice 950 Pennsylvania Avenue, NW, Room 1521 Washington, DC 20530 (202) 616-1327 Main (202) 616-3591 Facsimile March 31, 2002 The Honorable John Ashcroft Attorney General United States Department of Justice 950 Pennsylvania Avenue, N.W. Washington, D.C. 20530 Dear Mr. Attorney General: In March 2001, you asked me to lead a Commission to study security programs within the Federal Bureau of Investigation. Your request came at the urging of FBI Director Louis Freeh, who had concluded that an outside review was critical in light of the then recently discovered espionage by a senior Bureau official. In discharging my duties, I turned to six distinguished citizens as fellow Commissioners and to a staff of highly qualified professionals. I want to acknowledge the diligence with which my colleagues pursued the complex matters within our mandate. The Commission took its responsibilities seriously. It was meticulous in its investigation, vigorous in its discussions, candid in sharing views, and unanimous in its recommendations. When I agreed to chair the Commission, you promised the full cooperation and support of the Department of Justice and the FBI. That promise has been fulfilled. I would like to thank the Department’s Security and Emergency Planning Staff for the expert help they gave us, and I especially commend the cooperation of Director Mueller and FBI personnel at every level, who have all been chastened by treachery from within.
    [Show full text]
  • Download DECEMBER 1964.Pdf
    Vol. 33, No. 12 December 1964 Federal Bureau of Investigation United States Department of Justice J. Edgar Hoover, Director Index to l'olume 33, 1964 (p. 27) Contents 1 Message from Director J. Edgar Hoover Feature Article: 3 Recruiting and Training of Police Personnel, by Joseph T. Carroll, Chief of Police, Lincoln, Nebr. FBI National Academy: 9 Marine Commandant, Noted Editor Address Graduates Scientific Aids:· 13 Building­Material Evidence in Burglary Cases Nationwide Crimescope: 17 A 2 ­Gauge Cane 17 From "Pen" to "Sword" Vol. 33, No. 12 Crime Prevention: 18 A Mess<'to­e for Young People, by Edward K. Dabrowski, Sheriff of Bri tol County, New Bedford, Mass. Other Topics: 26 Wanted by the FBI 27 Index to Articles Published During 1964 Publi.hed by the FEDERAL BUREAU Identification: OF INVESTIGATION, Questionable Pattern (back cover) UNITED STATES DEPARTMENT OF JUSTICE Wa.hlngton, D.C. 20535 MESSAGE FROM THE DIRECTOR TO ALL LAW E FORCEMENT OFFICIALS ATHEISTIC COMMUNISM and the lawless underworld are not the only threats to the safety and welfare of our great Nation. Enemies of freedom come under many guises. Our society today is in a great state of unrest. Many citizens are confused and troubled. For the first time, some are confronted with issues and decisions relating to the rights and dignity of their fellow countrymen, problems which heretofore they had skirted or ignored. We have in our midst hatemongers, bigots, and riotous agitators, many of whom are at opposite poles philosophically but who spew similar doctrines of prejudice and intolerance. They exploit hate and fear for personal gain and self­aggrandizement.
    [Show full text]
  • JTF-GTMO Detainee Assessment
    S E C R E T //NOFORN I I 20320619 DEPARTMENTOF DEFENSE HEADQUARTERS,JOINT TASK FORCEGUANTANAMO U.S. NAVAL STATION,GUANTANAMO BAY, CUBA APO AE 09350 JTF-GTMO-CDR 19June 2007 MEMORANDUM FOR Commander,United StatesSouthem Command. 3511 NW 9lst Avenue. Miami,FL33172. SUBJECT: Recommendationfor ContinuedDetention Under DoD Control (CD) for GuantanamoDetainee, ISN: US9SA-000079DP(S) JTF-GTMO DetaineeAssessment 1. (S//NF) Personal Information: o JDIMSAIDRC ReferenceName: FahedA al-Harasi o Aliases and Current/True Name: Fahd Atiyah Hamza Hamid al-Harazi" Hassanal-Makki. FahedFahad" Khalid. Abu Hassan. al-Sharif. Abu Barak o Placeof Birth: Mecca. SaudiArabia (SA) o Date of Birth: 18 November 1978 o Citizenship: SaudiArabia o InternmentSerial Number (ISN): US9SA-000079DP 2. (U//T'OUO) Health: Detaineeis in good health. 3. (S//NF) JTF-GTMO Assessment: a. (S) Recommendation: JTF-GTMO recommendsthis detaineefor ContinuedDetention Under DoD Control (CD). JTF-GTMO previouslyassessed detainee for Continued Detentionwith TransferLanguage on 26May 2006. b. (S//NF) Executive Summary: Detaineeis reportedto be a memberof al-Qaida. He was identified as having attendedmilitant training and was an instructor at the al-Qaida al- Faruq Training Camp. Detaineewas in Afghanistan (AF) since 1999 during which he is assessedto have participated in hostilities againstUS and Coalition forces as a member of Classifiedby: MultipleSources REASON:E.O. 12958, AS AMENDED,Section 1.4(C) Declassi$on:20320619 S E C R E T //NOFORN I I 20320619 S E C R E T // NOFORN I I 20320619 JTF-GTMO.CDR SUBJECT: Recommendationfor ContinuedDetention Under DoD Control (CD) for GuantanamoDetainee, ISN: US9SA-000079DP(S) UsamaBin Laden's (UBL) 55th Arab Brigade.l Detainee'sname and aliaswere listed in recovereddocuments associated with al-Qaida, and the Saudi Ministry of Interior General Directorate of Investigations(Mabahith) identified him as a high priority detainee.
    [Show full text]
  • Downloaded from the Internet and Distributed Inflammatory Speeches and Images Including Beheadings Carried out by Iraqi Insurgents
    HUMAN RIGHTS WATCH WORLD REPORT 2006 EVENTS OF 2005 Copyright © 2006 Human Rights Watch All rights reserved. Co-published by Human Rights Watch and Seven Stories Press Printed in the United States of America ISBN-10: 1-58322-715-6 · ISBN-13: 978-1-58322-715-2 Front cover photo: Oiparcha Mirzamatova and her daughter-in-law hold photographs of family members imprisoned on religion-related charges. Fergana Valley, Uzbekistan. © 2003 Jason Eskenazi Back cover photo: A child soldier rides back to his base in Ituri Province, northeastern Congo. © 2003 Marcus Bleasdale Cover design by Rafael Jiménez Human Rights Watch 350 Fifth Avenue, 34th floor New York, NY 10118-3299 USA Tel: +1 212 290 4700, Fax: +1 212 736 1300 [email protected] 1630 Connecticut Avenue, N.W., Suite 500 Washington, DC 20009 USA Tel: +1 202 612 4321, Fax: +1 202 612 4333 [email protected] 2-12 Pentonville Road, 2nd Floor London N1 9HF, UK Tel: +44 20 7713 1995, Fax: +44 20 7713 1800 [email protected] Rue Van Campenhout 15, 1000 Brussels, Belgium Tel: +32 2 732 2009, Fax: +32 2 732 0471 [email protected] 9 rue Cornavin 1201 Geneva Tel: +41 22 738 0481, Fax: +41 22 738 1791 [email protected] Markgrafenstrasse 15 D-10969 Berlin, Germany Tel.:+49 30 259 3060, Fax: +49 30 259 30629 [email protected] www.hrw.org Human Rights Watch is dedicated to protecting the human rights of people around the world. We stand with victims and activists to prevent discrimination, to uphold political freedom, to protect people from inhumane conduct in wartime, and to bring offenders to justice.
    [Show full text]
  • Long-Term Missing Child Guide for Law Enforcement
    Long-term missing child guide for law enforcement: Strategies for finding long-term missing children Long-term missing child guide for law enforcement: Strategies for finding long-term missing children 2016 Edited by Robert G. Lowery, Jr., and Robert Hoever National Center for Missing & Exploited Children® www.missingkids.org 1-800-THE-LOST® or 1-800-843-5678 ORI VA007019W Copyright © 2016 National Center for Missing & Exploited Children. All rights reserved. This project was supported by Grant No. 2015-MC-CX-K001 awarded by the Office of Juvenile Justice and Delinquency Prevention, Office of Justice Programs, U.S. Department of Justice. This document is provided for informational purposes only and does not constitute legal advice or professional opinion about specific facts. Information provided in this document may not remain current or accurate, so recipients should use this document only as a starting point for their own independent research and analysis. If legal advice or other expert assistance is required, the services of a competent professional should be sought. Points of view or opinions in this document are those of the author and do not necessarily represent the official position or policies of the U.S. Department of Justice. CyberTipline®, National Center for Missing & Exploited Children®, 1-800-THE-LOST® and Project ALERT® are registered trademarks of the National Center for Missing & Exploited Children. LONG-TERM MISSING CHILD GUIDE FOR LAW ENFORCEMENT - 2 Contents Acknowledgments.....10 Letter from John Walsh.....15 Foreword by Patty Wetterling.....16 Chapter 1: Introduction by Robert G. Lowery, Jr......18 Quick reference.....18 We are finding more long-term missing children now.....19 Are we doing enough?.....21 Chapter 2: Overview of missing children cases by Robert G.
    [Show full text]
  • Works’ (Just Not in Moderation)
    Repression ‘Works’ (just not in moderation) Yuri M. Zhukov University of Michigan Abstract Why does government violence deter political challengers in one con- text, but inflame them in the next? This paper argues that repression increases opposition activity at low and moderate levels, but decreases it in the extreme. There is a threshold level of violence, where the op- position becomes unable to recruit new members, and the rebellion unravels – even if the government kills more innocents. We show this result logically, with a mathematical model of coercion, and empir- ically, with micro-level data from Chechnya and a meta-analysis of sub-national conflict dynamics in 156 countries. The data suggest that a threshold exists, but the level of violence needed to reach it varies. Many governments, thankfully, are unable or unwilling to go that far. We explore conditions under which this threshold may be higher or lower, and highlight a fundamental trade-off between reducing gov- ernment violence and preserving civil liberties. Keywords: repression, political violence, mass killing, conflict, meta-analysis, threshold effect Word count: 11,869 DRAFT This version: November, 2018 1 Repression is violence that governments use to stay in power. When confronting behavioral challenges to their authority, governments often respond by threatening, detaining and killing suspected dissidents and rebels. The coercive purpose of these actions is to compel challengers to stop their fight, and to deter others from joining it. The intensity of repres- sion can vary greatly. To reestablish control in Chechnya after 1999, for example, the Russian government used a range of methods, from targeted killings to shelling and indiscriminate sweeps.
    [Show full text]
  • Behavioral Science Unit
    Behavioral Science Unit Behavioral Science Unit (BSU) was one of the original instructional components of the FBI's Training Division at Quantico, Virginia. Its mission was to develop and provide programs of training, research, and consultation in the behavioral andsocial sciences for the Federal Bureau of Investigation and law enforcement community that would improve or enhance their administration, operational effectiveness, and understanding of violent crime. The BSU was established in 1972 at the FBI Academy, and was disbanded in 2014. Through its legacy of training, research, and consultation activities, the BSU developed techniques, tactics, and procedures that have become a staple of behavioral-based programs that support the law enforcement, intelligence, and military communities. It is here where the term "serial killer" was coined and where criminal investigative analysis and "profiling" were developed. Many of these programs eventually developed into stand-alone programs, units, and centers such as the National Center for the Analysis of Violent Crime (NCAVC), Behavioral Analysis Unit (BAU), Undercover Safeguard Unit, Crisis Negotiation Unit, Hostage Rescue Team, and Employee Assistance Unit. The mission of the BSU was to be the premier unit for developing and facilitating relevant programs of training, research, and consultation in the behavioral sciences for the FBI workforce, including the law enforcement, intelligence, and military communities that will improve their effectiveness in furtherance of the strategic priorities of the FBI. This is accomplished through the creation of innovative bodies of knowledge in specialty areas and applied research on significant behavioral science issues for use in training and consultation in support of academic, program, and operational matters.
    [Show full text]
  • Waterfall Vs Agile Projects
    PROJECT COST MANAGEMENT A study of Waterfall Model vs Agile Model In submission for CI6204 SOFTWARE PROJECT MANAGEMENT AY 17/18 Sem 1 Submitted by: CHENG Shuyun (G1701268F) NAH Zheng Xiang, Philson (G1701513D) XUE Fei (G1701182G) Abstract In today’s competitive business environment, organizations require IT systems that constantly evolve to meet their ever-changing requirements. This has led many organizations to favor Agile Models over traditional Waterfall Models for software development. However, there appears to be a lack of understanding of how conventional PMBOK processes apply to these Agile Models. In this paper, we have analyzed the differences in Project Cost Management processes between Waterfall and Agile models, and found them to have fundamentally different priorities. The Waterfall Model aims to complete all the specified functionalities, while the Agile Model works on a ROI maximization approach. We then used the FBI Sentinel case study to examine the practical implications of the different approaches. In practice, the Waterfall Model’s sequential approach to development lead to greater project rigidity and inflexible timelines, while the Agile Model allowed for re-prioritization of requirements to deliver the features that matter most to users. Further analysis of the case study allowed us to tease out 3 major benefits of the Agile Model for Project Cost Management, namely – allowance for change, focus on business value, and predictable costs. 1. Introduction Software development methodologies are constantly evolving due to changing technologies and new demands from users. Today’s dynamic business environment has given rise to emergent organizations that continuously adapt their structures, strategies, and policies to suit new environments (Truex, Baskerville, & Klein, 1999).
    [Show full text]
  • CBEST Threat Intelligence-Led Assessments
    Implementation guide CBEST Threat Intelligence-Led Assessments January 2021 CBEST Threat Intelligence-Led Assessments 1 Forward Operational disruption can impact financial stability, threaten the viability of individual firms and financial market infrastructures (FMIs), or cause harm to consumers and other market participants in the financial system. Firms and FMIs need to consider all of these risks when assessing the appropriate levels of resilience within their respective businesses. Dealing with cyber risk is an important element of operational resilience and the CBEST framework is intelligence-led penetration testing which aims to address this risk. CBEST is part of the Bank of England and Prudential Regulation Authority’s (PRA’s) supervisory toolkit to assess the cyber resilience of firms’ important business services. This prioritised and focused assessment allows us and firms to better understand weaknesses and vulnerabilities and take remedial actions, thereby improving the resilience of systemically important firms and by extension, the wider financial system. Continued use of CBEST has confirmed its use as a highly effective regulatory assessment tool, which can now also be conducted on a cross-jurisdictional basis, in collaboration with other international regulators and frameworks. This latest version of the CBEST Implementation Guide builds upon the previous framework and contains improvements learned from the extensive testing which has taken place. In particular, we have analysed and implemented changes with the aim of clarifying CBEST roles and responsibilities as well as regulatory expectations for different CBEST activities. While the underlying intelligence-led penetration testing approach remains the same, we have reviewed and updated the technical guidance for most activities, prepared new templates (eg Penetration Testing Report) and incorporated important references to cross-jurisdictional assessments.
    [Show full text]
  • The Department of Justice and the Limits of the New Deal State, 1933-1945
    THE DEPARTMENT OF JUSTICE AND THE LIMITS OF THE NEW DEAL STATE, 1933-1945 A DISSERTATION SUBMITTED TO THE DEPARTMENT OF HISTORY AND THE COMMITTEE ON GRADUATE STUDIES OF STANFORD UNIVERSITY IN PARTIAL FULFILLMENT OF THE REQUIREMENTS FOR THE DEGREE OF DOCTOR OF PHILOSOPHY Maria Ponomarenko December 2010 © 2011 by Maria Ponomarenko. All Rights Reserved. Re-distributed by Stanford University under license with the author. This work is licensed under a Creative Commons Attribution- Noncommercial 3.0 United States License. http://creativecommons.org/licenses/by-nc/3.0/us/ This dissertation is online at: http://purl.stanford.edu/ms252by4094 ii I certify that I have read this dissertation and that, in my opinion, it is fully adequate in scope and quality as a dissertation for the degree of Doctor of Philosophy. David Kennedy, Primary Adviser I certify that I have read this dissertation and that, in my opinion, it is fully adequate in scope and quality as a dissertation for the degree of Doctor of Philosophy. Richard White, Co-Adviser I certify that I have read this dissertation and that, in my opinion, it is fully adequate in scope and quality as a dissertation for the degree of Doctor of Philosophy. Mariano-Florentino Cuellar Approved for the Stanford University Committee on Graduate Studies. Patricia J. Gumport, Vice Provost Graduate Education This signature page was generated electronically upon submission of this dissertation in electronic format. An original signed hard copy of the signature page is on file in University Archives. iii Acknowledgements My principal thanks go to my adviser, David M.
    [Show full text]
  • Characteristics of Residential Adult Learning in the Fbi National Academy Learning Environment and the Impact on Participant's
    CHARACTERISTICS OF RESIDENTIAL ADULT LEARNING IN THE FBI NATIONAL ACADEMY LEARNING ENVIRONMENT AND THE IMPACT ON PARTICIPANT’S ATTITUDE OF SATISFACTION By Thomas Catron Christenberry Dissertation Proposal submitted to the Faculty of the Virginia Polytechnic Institute and State University In partial fulfillment of the requirements for the degree of DOCTOR OF PHILOSOPHY In Human Development (Adult Learning and Human Resource Development) Committee: Dr. Marcie Boucouvalas, Chair Dr. John P. Jarvis Dr. Stephen R. Parson Dr. Letitia A. Combs September 15, 2004 Falls Church, Virginia Key Words: Residential Adult Learning, Adult Education CHARACTERISTICS OF RESIDENTIAL ADULT LEARNING IN THE FBI NATIONAL ACADEMY LEARNING ENVIRONMENT AND THE IMPACT ON PARTICIPANT’S ATTITUDE OF SATISFACTION By Thomas Catron Christenberry Dr. Marcie Boucouvalas, Chair Human Development (Adult Learning and Human Resource Development) (ABSTRACT) Using the Federal Bureau of Investigation’s (FBI) 212th session of the National Academy, a residential adult learning environment, as a case study and the 1996 research on participant’s perception of residential adult learning environments by Dr. Jean Anderson Fleming, this study examined the relationship among the characteristics (overarching themes: detachment and continuity and descriptive themes: building relationships in residence, learning in residence, and individual change in residence) and how this relationship impacts the participant’s attitude of satisfaction with the program. A 33-item Likert scale, developed by the researcher, was used to collect the data from 244 police officers and the Kropp-Verner Attitude Scale was used for measuring the overall participant attitude of satisfaction with the residential learning environment. Demographic data were also collected from the participants to provide an overall profile of the respondents and each police officer had the opportunity to respond to an open-ended question at the end of the survey.
    [Show full text]