Counterterrorism Strategies Used by Local Law Enforcement Agencies and Emergency Management Departments
Total Page:16
File Type:pdf, Size:1020Kb
Walden University ScholarWorks Walden Dissertations and Doctoral Studies Walden Dissertations and Doctoral Studies Collection 2020 Counterterrorism Strategies Used by Local Law Enforcement Agencies and Emergency Management Departments Todd Andrew Schneeberger Walden University Follow this and additional works at: https://scholarworks.waldenu.edu/dissertations This Dissertation is brought to you for free and open access by the Walden Dissertations and Doctoral Studies Collection at ScholarWorks. It has been accepted for inclusion in Walden Dissertations and Doctoral Studies by an authorized administrator of ScholarWorks. For more information, please contact [email protected]. Walden University College of Social and Behavioral Sciences This is to certify that the doctoral dissertation by Todd A. Schneeberger has been found to be complete and satisfactory in all respects, and that any and all revisions required by the review committee have been made. Review Committee Dr. Melanye Smith, Committee Chairperson, Criminal Justice Faculty Dr. Sean Grier, Committee Member, Criminal Justice Faculty Dr. Carolyn Dennis, University Reviewer, Criminal Justice Faculty Chief Academic Officer and Provost Sue Subocz, Ph.D. Walden University 2020 Abstract Counterterrorism Strategies Used by Local Law Enforcement Agencies and Emergency Management Departments by Todd A. Schneeberger MA, University of Colorado, Denver, 2014 BS, Ferris State University, 1980 Dissertation Submitted in Partial Fulfillment of the Requirements for the Degree of Doctor of Philosophy Public Policy and Administration Walden University November 2020 Abstract For local law enforcement and local emergency managers, the threat of terrorist attacks in their communities is real. There are no anti-terrorism/counterterrorism strategies that are taught and used by local agencies. The purpose of this qualitative grounded theory study was to explore how small and midsize local law enforcement and emergency management departments prevent and interdict terrorism before it happens in their communities. Multiple streams theory and routine activities theory were used to guide the study. Data were collected from semi-structured interviews with 10 participants from small and midsize agencies in the Rocky Mountain region of the United States. Findings from constant comparative data analysis indicated that these agencies used a combination of intelligence gathering, information sharing, vulnerable target protection, and deterrence strategies to prevent terrorist incidents in their jurisdictions. Findings may be used law enforcement to prevent terrorist attacks, saves lives, and make communities safer resulting in positive social change. Counterterrorism Strategies Used by Local Law Enforcement Agencies and Emergency Management Departments by Todd A. Schneeberger MA, University of Colorado, Denver, 2014 BS, Ferris State University, 1980 Dissertation Submitted in Partial Fulfillment of the Requirements for the Degree of Doctor of Philosophy Public Policy and Administration Walden University November, 2020 Table of Contents List of Tables ..................................................................................................................... iv Chapter 1: Introduction to the Study ....................................................................................1 Problem Statement .........................................................................................................7 Purpose of the Study ......................................................................................................8 Research Questions ........................................................................................................8 Theoretical Framework ..................................................................................................9 Nature of the Study ......................................................................................................11 Definitions....................................................................................................................12 Assumptions .................................................................................................................13 Scope and Delimitations ..............................................................................................14 Limitations ...................................................................................................................15 Significance..................................................................................................................16 Summary ......................................................................................................................17 Chapter 2: Literature Review .............................................................................................18 Literature Search Strategy............................................................................................21 Grounded Theory .........................................................................................................22 Historical Overview .....................................................................................................23 A Local Problem ..........................................................................................................30 Terrorism and Crime Prevention .................................................................................33 Current Approach.........................................................................................................35 An Examination of Recent Terrorist Attacks in the United States ..............................37 i Boston Marathon Bombing ................................................................................... 37 San Bernardino, California Shooting .................................................................... 40 Orlando Shooting .................................................................................................. 43 Anti-Terrorism Funding ...............................................................................................47 Anti-Terrorism Approaches .........................................................................................48 Risk Assessment Model ........................................................................................ 49 Anti-Ecoterrorism Legislation .............................................................................. 50 Summary ......................................................................................................................52 Chapter 3: Research Method ..............................................................................................54 Research Design...........................................................................................................55 Methodology ................................................................................................................57 Instrumentation ............................................................................................................61 Trustworthiness ............................................................................................................63 Summary ......................................................................................................................64 Chapter 4: Results ..............................................................................................................65 Research Setting...........................................................................................................66 Demographics ..............................................................................................................67 Data Collection ............................................................................................................69 Data Analysis ...............................................................................................................72 Evidence of Trustworthiness........................................................................................76 Results ..........................................................................................................................77 Research Question 1 ............................................................................................. 78 ii Research Question 2 ............................................................................................. 84 Research Question 3 ............................................................................................. 86 Summary ......................................................................................................................88 Chapter 5: Discussion, Conclusions, and Recommendations ............................................89 Interpretation of the Findings.......................................................................................90 Limitations of the Study...............................................................................................97 Recommendations ........................................................................................................98 Implications................................................................................................................101 Conclusion .................................................................................................................102 References ........................................................................................................................104