The Risk-Mitigation Value of the Transportation Worker Identification Credential a Comprehensive Security Assessment of the TWIC Program

Total Page:16

File Type:pdf, Size:1020Kb

The Risk-Mitigation Value of the Transportation Worker Identification Credential a Comprehensive Security Assessment of the TWIC Program The Risk-Mitigation Value of the Transportation Worker Identification Credential A Comprehensive Security Assessment of the TWIC Program HEATHER J. WILLIAMS, KRISTIN VAN ABEL, DAVID METZ, JAMES V. MARRONE, EDWARD W. CHAN, KATHERINE COSTELLO, RYAN MICHAEL BAUER, DEVON HILL, SIMON VÉRONNEAU, JOSEPH C. CHANG, IAN MITCH, JOSHUA LAWRENCE TRAUB, SARAH SOLIMAN, ZACHARY HALDEMAN, KELLY KLIMA, DOUGLAS C. LIGOR HS AC HOMELAND SECURITY OPERATIONAL ANALYSIS CENTER An FFRDC operated by the RAND Corporation under contract with DHS Published in 2020 Preface This report responds to congressionally mandated requirements to conduct a comprehensive security assessment of the Transportation Worker Identification Credential (TWIC®) program. The U.S. Department of Homeland Security (DHS) commissioned the Homeland Security Operational Analysis Center (HSOAC) to conduct this study to address the requirements laid out in Public Law 114-278, Section 1(b), Comprehensive Security Assessment of the Transportation Security Card Program. The TWIC program includes a security threat assessment to determine whether someone poses a national security, transportation security, or terrorism threat. It also provides for a card credential and requirements for its use at maritime facilities that are regulated by the Maritime Transportation Security Act.1 Anyone with unescorted access to a secure area at a regulated maritime facility or vessel is required to possess a valid TWIC card. For this report, HSOAC researchers sought to address TWIC’s risk-mitigation value in the maritime environment and analyze the costs and benefits of regulation that would require high- risk facilities to use TWIC in conjunction with an electronic biometric reader. Other issues discussed include the use of TWIC at facilities, the appropriateness of vetting standards, whether the fee structure is appropriate for the current costs of vetting, the time required for TWIC’s issuance, and the program’s duplication or redundancy with other federal and state credentialing programs. TWIC’s risk-mitigation value lies in its ability to deter attacks against maritime facilities and reduce facilities’ vulnerabilities by giving them a means of identifying unauthorized people. TWIC’s strength is in preventing people known to be higher risk from gaining persistent access to the maritime environment. However, TWIC is just one component of a multilayered access control solution, so it is not possible to determine the security value of TWIC alone. TWIC can help detect threats other than high-risk people gaining access, but, generally, other components of an access control system prevent those threats. Also complicating the risk-mitigation assessment is that TWIC’s use at ports varies significantly, and many facilities have adopted more-robust access control measures than the bare minimum that regulations require. In terms of the costs and benefits of the pending regulation for high-risk facilities, the study team found that the specifics of those requirements for TWIC readers could affect many more facilities and cost around 50 percent more than initially estimated. Observations from visits to several ports suggest that there are likely more cost-effective methods of reducing the risk to maritime facilities than requiring everyone to use an electronic biometric reader at every entry 1 Public Law 107-56, Uniting and Strengthening America by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism Act of 2001, October 26, 2001. iii into a facility’s secure area. Rather than attempting to isolate the risk-mitigation value of TWIC, taking a system approach could determine how to best mitigate security vulnerabilities and where security benefits will have the best return on investment. This research was sponsored by the Research and Development Partnerships Group in the DHS Science and Technology Directorate and conducted within the Strategy, Policy, and Operations Program of the HSOAC federally funded research and development center (FFRDC). About the Homeland Security Operational Analysis Center The Homeland Security Act of 2002 (Section 305 of Public Law 107-296, as codified at 6 U.S.C. § 185), authorizes the Secretary of Homeland Security, acting through the Under Secretary for Science and Technology, to establish one or more FFRDCs to provide independent analysis of homeland security issues. The RAND Corporation operates HSOAC as an FFRDC for DHS under contract HSHQDC-16-D-00007. The HSOAC FFRDC provides the government with independent and objective analyses and advice in core areas important to the department in support of policy development, decisionmaking, alternative approaches, and new ideas on issues of significance. The HSOAC FFRDC also works with and supports other federal, state, local, tribal, and public- and private- sector organizations that make up the homeland security enterprise. The HSOAC FFRDC’s research is undertaken by mutual consent with DHS and is organized as a set of discrete tasks. This report presents the results of research and analysis conducted under task order 70RSATR0000029, Assessing the Risk-Mitigation Value of TWIC® at Maritime Facilities. The results presented in this report do not necessarily reflect official DHS opinion or policy. For more information on HSOAC, see www.rand.org/hsoac. For more information on this publication, see www.rand.org/t/RR3096. iv Contents Preface .............................................................................................................................................. i Figures.......................................................................................................................................... viii Tables ............................................................................................................................................. ix Summary ........................................................................................................................................ xi Acknowledgments ........................................................................................................................ xix Abbreviations ............................................................................................................................... xxi 1. Introduction ................................................................................................................................. 1 Background on TWIC .............................................................................................................................. 1 Assessment Questions Raised in Public Law 114-278 ............................................................................. 3 Data Sources and Our Approach to the Research Questions .................................................................... 4 The Structure of This Report .................................................................................................................... 7 2. Background on the TWIC Program and Maritime Facilities ...................................................... 9 The Role of Access Control Programs ..................................................................................................... 9 Background and Purpose of the TWIC Program .................................................................................... 11 Division of Responsibilities for the TWIC Program .............................................................................. 17 Complexities of Characterizing the Port Environment ........................................................................... 24 Summary ................................................................................................................................................. 28 3. Previous GAO and OIG Concerns About the TWIC Program ................................................. 30 Themes from Previous GAO and OIG Reports ...................................................................................... 31 Open GAO and OIG Recommendations ................................................................................................ 36 4. Security Threats to the Maritime Environment ........................................................................ 38 Attacks Specific to the Transportation Sector ........................................................................................ 38 The Threat of Terrorism in the United States Today .............................................................................. 44 Threats of Crime in the Port Environment ............................................................................................. 49 Summary ................................................................................................................................................. 51 5. The Risk-Mitigation Value of the TWIC STA ......................................................................... 52 The Purpose of the STA ......................................................................................................................... 52 The STA’s Use of the Terrorism Watch List ......................................................................................... 57 Prior Criminal History as a Terrorism Risk Factor ................................................................................ 59 The Value of the STA Process to Counterterrorism Efforts ................................................................... 68 Immigration Status as a Risk Factor for
Recommended publications
  • MARITIME TERRORISM THREAT in SOUTHEAST ASIA and ITS CHALLENGES by ME6 Joses Yau Meng Wee
    features 32 MARITIME TERRORISM THREAT IN SOUTHEAST ASIA AND ITS CHALLENGES by ME6 Joses Yau Meng Wee Abstract: The threat of terrorism is always present, but the public was only given a wake-up call to the devastating impacts of terrorism after the September 11 attacks in the United States (US). Since then, many countries have stepped up their counter-terrorism efforts and measures. For example, the Association of Southeast Asian Nations (ASEAN) adopted a comprehensive approach to improve the regional security. In this essay, the author examines the terrorism threat in Southeast Asia, exploring the possible scenarios of a maritime terrorist attack in the region and thoroughly assesses the region’s counter-terrorism efforts that have been put in place. The author also introduces an Opportunity, Capability and Intent (OCI) framework as a form of threat assessment, to affirm his stand that the terrorist threat in Southeast Asia is indeed very real. Keywords: Terrorism; Counter-terrorism; Efforts and Measures; Regional Security; Threat Assessment INTRODUCTION This essay seeks to ascertain a common definition of ‘Maritime Terrorism’ and followed on to affirm The September 11 attacks in the US underscored that the terrorism threat in Southeast Asia is real the devastating effects of terrorism to the world. through the use of the Opportunity, Capability and The attacks on USS Cole in 2000, MV Limburg in Intent (OCI) threat assessment framework. Next, 2002, SuperFerry 14 in 2004 and the M Star in 2010 the essay will discuss eight probable scenarios of a are classified as acts of ‘Maritime Terrorism’, a stark maritime terrorist attack in Southeast Asia and attempt reminder that the world’s waterways continue to be to examine the credibility of each scenario.
    [Show full text]
  • Strategic Insights No 10 DRAFT
    Towards a European maritime security policy Wengelin, Mattias Published in: Strategic Insights 2008 Link to publication Citation for published version (APA): Wengelin, M. (2008). Towards a European maritime security policy. Strategic Insights, 6-13. Total number of authors: 1 General rights Unless other specific re-use rights are stated the following general rights apply: Copyright and moral rights for the publications made accessible in the public portal are retained by the authors and/or other copyright owners and it is a condition of accessing publications that users recognise and abide by the legal requirements associated with these rights. • Users may download and print one copy of any publication from the public portal for the purpose of private study or research. • You may not further distribute the material or use it for any profit-making activity or commercial gain • You may freely distribute the URL identifying the publication in the public portal Read more about Creative commons licenses: https://creativecommons.org/licenses/ Take down policy If you believe that this document breaches copyright please contact us providing details, and we will remove access to the work immediately and investigate your claim. LUND UNIVERSITY PO Box 117 221 00 Lund +46 46-222 00 00 Risk Intelligence Strategic Insights Global Maritime Security Analysis No 10 - 2008 USCGC Bertholf during sea trials 8 February 2008 (USCG) Content § US Maritime Security Policy Revisited § Towards a European Maritime Security Policy? § The Maritime Operations of the Liberation Tigers of Tamil Eelam (LTTE): The Sea Tigers and Sea Pigeons § Marine Insurance for Piracy or Terrorism – Drawing a line in Water Strategic Insights No.
    [Show full text]
  • Maritime Terrorism in the Indian Ocean Rim
    Maritime Terrorism in the Indian Ocean Rim: Peering into the Darkness Keegan B. Steele California State University Maritime Academy April, 2017 Via CIMSEC™ MARITIME TERRORISM IN THE INDIAN OCEAN RIM Steele 1 Abstract The Indian Ocean Rim (IOR) has become a major geopolitical and security interest in the 21st century. One of the biggest issues that faces the Indian Ocean today is the swift growth of maritime related security threats. This is a major concern to not only first world nations like the United States, but also to developing states in the region. Due to the lack of stability in the region, the Horn of Africa and the Arabian Peninsula have been a breeding ground for violent non-state actors. Piracy, illicit trade, and terrorism are just a few of the non traditional maritime security threats. With instability in an already pirate-infested area, the threat of a growing maritime terrorism domain is a looming and haunting notion. This thesis will look into the history of maritime based terrorist attacks, and the potential for up and coming non-state actors, terrorist organizations, and organized crime in a region of instability. MARITIME TERRORISM IN THE INDIAN OCEAN RIM Steele 2 Introduction Maritime terrorism is a real and current threat to the world’s maritime industry. Acts of terrorism have been committed in the past, that have not only been devastating to infrastructure, but also have caused loss of life. According to (Nincic, 2012), maritime terrorism represents a very small percentage of all terrorist attacks. “A similar analysis of the RAND terrorism database supports these figures; of the 40,126 terrorist incidents recorded between 1968 and 2007, only 136 (0.34%) were against the maritime domain” (Nincic, 2012, para.
    [Show full text]
  • 2017 National History Bowl National Championships Playoff Round 7
    2017 National History Bowl National Championships Playoff Round 7 Round: Playoffs 7 Supergroup Group Room: Reader: Scorekeep: Team Names, including letter designation if needed, go in the large boxes to the right. TU# Bonus Bonus Points Cumulative Score Bonus Points Cumulative Score 1 Quarter 1 2 Tossups Only 3 4 Put a "10" in the 5 column of the team 6 that answers correctly. 7 Otherwise leave box 8 blank. 9 10 1 Quarter 2 2 Tossups and bonuses 3 Put "10" in the team's 4 column. Otherwise, 5 leave box blank. 6 For bonuses, put "0" or 7 Substitutions allowed between Qtrs all "10" in the bonus 8 column. 9 10 Quarter 3 points points 60 sec. rds - trailing team Lightning Lightning goes first. 10 pts each. Bounceback Bounceback 20 pt bonus for sweep! Total Total 1 Quarter 4 2 Tossups worth 30, 20, or 3 10 points each 4 Put the appropriate 5 number in the column of 6 the team that answers 7 correctly. Otherwise leave 8 box blank. 9 10 Tiebreakers 1 Tiebreak questions Tie Breaker (Sudden are only used 2 have no point value Victory) to determine winner! 3 at all! Final Score NHBB Nationals Bowl 2016-2017 Bowl Playoff Packet 7 Bowl Playoff Packet 7 First Quarter (1) Description acceptable. This event was thought to have occurred in retaliation for the bombing of the perpetrator's Tunisian headquarters in Operation Wooden Leg. Muhammad Zaidan organized this event, which involved the redirection of a vessel to Tartus, Syria. A John Adams opera focusing on this event opens with two choruses of exiles and is named after its only casualty, the 69-year old Leon Klinghoffer.
    [Show full text]
  • Cruising with Terrorists: Qualitative Study of Consumer Perspectives
    International Journal of Safety and Security in Tourism/Hospitality Cruising with terrorists: Qualitative study of consumer perspectives Cyril Peter Facultad de Ciencias Económicas The purpose of this exploratory study on cruise ship security was to understand cruise ship passenger’s security perception; what level of security they expect as consumers and what minimum level of security they would be willing to accept. There were a total ten participants in this qualitative study using an interpretivist approach. Tourism is a major revenue generator for New Zealand and protecting this industry is of paramount importance. Once the industry understands their consumers’ security expectations, they can perhaps ‘manage’ any unexpected events accordingly and ensure minimal disruption to business. Terrorists are constantly searching for easier, more accessible, low-investment/high-return targets. They want new, fresh, high-yield targets. Terrorism is not necessarily about killing a huge number of people all at once; it is about creating fear and uncertainty amongst the audience and witnesses, and disrupting everyday life and commerce. Terrorism is about causing chaos, fear and uncertainty. Understanding the expectations of terrorists and also understanding the security needs of the cruise consumers will help the industry to provide the right balance of security without impinging on consumer’s enjoyment and hospitality experience. Hospitality security, unlike security in many other industries, is delicate, in that while it is imperative, it should be invisible. Hospitality needs to appear inviting and welcoming, while at the same time implicitly promising safety and security. Findings: 1) Participants have a laissez-faire attitudes towards security. 2) Passengers believed that security screenings at seaports were less stringent than at airports.
    [Show full text]
  • The Importance of the SUA Convention in the Fight Against Violence at Sea
    MASTER OF SCIENCE IN MARITIME SCIENCE MASTER DISSERTATION Academic year 2017 – 2018 The importance of the SUA Convention in the fight against violence at sea Student: Jan Van Hauwaert Submitted in partial fulfillment of the requirements for Supervisor: Prof. Dr. Frank Maes the degree of: Master of Science in Maritime Science Assessor: Klaas Willaert Master of Science in Maritime Science 2 Word of thanks Before moving on to the content of this master’s dissertation, I would like to express some words of gratitude. In the first place, I would like to thank my promotor, Prof. Dr. Frank Maes, for granting me the opportunity and the privilege to write a thesis on such an interesting topic. Also, I would like to thank him for sharing his knowledge with me and for discussing with me the best way to approach this task. I would like to express thanks to my assessor, Mr. Klaas Willaert, as well, for observing my progress and for reaching out new ideas. Finally, a word of gratitude for my family and the people around me, especially my parents, for the many support throughout the difficult process of writing a thesis. 3 List of abbreviations BCN weapons Biological, chemical and nuclear weapons ICAO International Civil Aviation Organization ICFTU International Confederation of Free Trade Unions ICS International Chamber of Shipping ISF International Shipping Federation ISPS International Ship and Port Facility Code IMO International Maritime Organization Interpol International Criminal Police Organization LNG Liquified Natural Gas MARPOL International Convention for the Prevention of Pollution from Ships NATO North-Atlantic Treaty Organization PLF Palestine Liberation Front PLO Palestine Liberation Organization SOLAS International Convention for the Safety of Life at Sea SUA Convention Convention for the Suppression of Unlawful Acts of violence at Sea against the Safety of Maritime Navigation UN United Nations UK United Kingdom USA United States of America WMD Weapons of mass destruction 4 Table of contents I.
    [Show full text]
  • ABSOLUTE FINAL ONEIL Dissertation
    UCLA UCLA Electronic Theses and Dissertations Title Dealing with the Devil? Explaining the Onset of Strategic State-Terrorist Negotiations Permalink https://escholarship.org/uc/item/5td7j61f Author O'Neil, Siobhan Publication Date 2014 Peer reviewed|Thesis/dissertation eScholarship.org Powered by the California Digital Library University of California UNIVERSITY OF CALIFORNIA Los Angeles Dealing with the Devil? Explaining the Onset of Strategic State-Terrorist Negotiations A dissertation submitted in partial satisfaction of the requirements for the degree Doctor of Philosophy in Political Science by Siobhan O’Neil 2014 ABSTRACT OF THE DISSERTATION Dealing with the Devil? Explaining the Onset of Strategic State-Terrorist Negotiations by Siobhan O’Neil Doctor of Philosophy in Political Science University of California, Los Angeles, 2014 Professor Arthur Stein, Chair Statesmen are quick to declare that they will not negotiate with terrorists. Yet, the empirical record demonstrates that, despite statements to the contrary, many states do eventually negotiate with their terrorist challengers. My dissertation examines the circumstances under which states employ strategic negotiations with terrorist groups to resolve violent conflict. I argue that only when faced with a credible and capable adversary and afforded relative freedom of action domestically will states negotiate with terrorists. To test this theory, I use a multi-method approach that incorporates a cross- national study of all known strategic negotiations from 1968-2006 and three within-case studies (Israel, Northern Ireland, and the Philippines). Initial results suggest that negotiations are employed in about 13% of terrorist campaigns, certain types of groups are privileged, and negotiations only occur when statesmen can overcome domestic ii obstacles, namely public and veto player opposition.
    [Show full text]
  • The Guitarist and Sinking Ships
    Volume 2011-2012, Issue 5 Whiting Lane School Newspaper April ~ May 2012 “Weird But True” Edition Weird but True Story: The Guitarist and Sinking Ships By Joshua Sirman Here is a weird but true story. In 1991 a musician named Moss Hills was playing on a cruise ship, the MTS Oceanos, when the boat starting tipping over in high waves near South Africa. The captain gave the order to abandon ship and then he and the crew left without helping the passengers. Moss went to the bridge of the sinking ship and radioed the South African Navy for help. The Navy asked “What rank are you?” Moss said, “I’m the guitarist, and the crew is gone.” The Navy told Moss how to organize the passengers to be rescued by helicopters. Moss and his wife, Tracey, worked to help all the passengers get off the ship using rescue lines from the helicop- ters. Moss was one of the last five people off the ship. The Oceanos sank a short time later. The captain of the Oceanos was convicted of neglecting his duty and went to jail. Moss was a hero. Now for the really weird part. Three years later, in 1994, Moss was playing guitar on another cruise ship, MS Achille Lauro. During the cruise, the ship caught fire and started to sink in the Indian Ocean. Moss used what he learned on the Oceanos and again helped passengers to safety. Moss Hills survived two major cruise ship disasters in three years, but he still plays guitar on cruise ships and says he won’t leave the sea.
    [Show full text]
  • Rallying Around the Flag
    UNIVERSITY OF CALIFORNIA Los Angeles Rallying around the Flag: Nationalist Emotions in American Mass Politics A dissertation submitted in partial satisfaction of the requirements for the degree Doctor of Philosophy in Sociology by Yuval Feinstein 2012 © Copyright by Yuval Feinstein 2012 ABSTRACT OF THE DISSERTATION Rallying around the Flag: Nationalist Emotions in American Mass Politics by Yuval Feinstein Doctor of Philosophy in Sociology University of California, Los Angeles, 2012 Professor Andreas Wimmer, Chair This dissertation revisits the “rally-round-the-flag” (RRTF) phenomenon in which the popularity of sitting U.S. presidents increases abruptly and sharply after major war events and during security crises. Chapter 1 opens with a review of the existing approaches to the RRTF phenomenon. Based on this review, I claim that despite four decades of scholarship, the RRTF phenomenon is still not well understood for at least four reasons. First, existing explanations are often overly rationalistic, ignoring the crucial role of emotions in the formation of political attitudes. Second, when scholars do consider the role of emotions, they tend to focus on negative ones, such as fear and anger, and overlook the role of positive emotions. Third, none of the existing approaches focuses on the nationalist framing of the situation or the nationalist emotions of pride, confidence, and hope, which are essential components of the RRTF effect. Fourth, approaches that focus solely on the role of elite rhetoric, which steers public opinion in war time, miss the fact that the RRTF effect is co-produced through an interaction between official rhetoric and the perceptions and diffused nationalist sentiment of the general population.
    [Show full text]
  • Soleimani Is Dead: the Road Ahead for Iranian- Backed Militias in Iraq
    OBJECTIVE · RELEVANT · RIGOROUS | JANUARY 2020 · VOLUME 13, ISSUE 1 FEATURE ARTICLE FEATURE ARTICLE Soleimani Is Dead: The Lessons from the Islamic Road Ahead for Iranian- State's 'Milestone' Texts Backed Militias in Iraq and Speeches Haroro J. Ingram, Craig Whiteside, Michael Knights and Charlie Winter FEATURE ARTICLES Editor in Chief 1 Soleimani Is Dead: The Road Ahead for Iranian-Backed Militias in Iraq Michael Knights Paul Cruickshank 11 Lessons from the Islamic State's 'Milestone' Texts and Speeches Managing Editor Haroro J. Ingram, Craig Whiteside, and Charlie Winter Kristina Hummel INTERVIEW EDITORIAL BOARD Colonel Suzanne Nielsen, Ph.D. 22 A View from the CT Foxhole: Rob Saale, Former Director, U.S. Hostage Department Head Recovery Fusion Cell Seth Loertscher Dept. of Social Sciences (West Point) Brian Dodwell ANALYSIS Director, CTC 28 After Soleimani: What's Next for Iran's Quds Force? Don Rassler Ariane M. Tabatabai Director of Strategic Initiatives, CTC 34 Piety Is in the Eye of the Bureaucrat: The Islamic State's Strategy of Civilian Control CONTACT Gina Vale Combating Terrorism Center U.S. Military Academy The January 3, 2020, U.S. drone strike that killed Islamic Revolutionary 607 Cullum Road, Lincoln Hall Guard Corps-Quds Force commander Qassem Soleimani and Kata’ib Hez- West Point, NY 10996 bollah leader Abu Mahdi al-Muhandis at Baghdad International Airport Phone: (845) 938-8495 will likely have consequences that reverberate across the region and beyond for years. In our first feature article, Michael Knights focuses
    [Show full text]
  • Re-Assessment of Acts of Piracy Under Contemporary International
    Golden Gate University School of Law GGU Law Digital Commons Theses and Dissertations Student Scholarship 11-30-2017 Re-assessment of Acts of Piracy Under Contemporary International Law With Particular Reference to Activities of Somali Pirates Nutcha Sukhawattanakun Golden Gate University School of Law, [email protected] Follow this and additional works at: https://digitalcommons.law.ggu.edu/theses Part of the International Law Commons, and the Law of the Sea Commons Recommended Citation Sukhawattanakun, Nutcha, "Re-assessment of Acts of Piracy Under Contemporary International Law With Particular Reference to Activities of Somali Pirates" (2017). Theses and Dissertations. 79. https://digitalcommons.law.ggu.edu/theses/79 This Dissertation is brought to you for free and open access by the Student Scholarship at GGU Law Digital Commons. It has been accepted for inclusion in Theses and Dissertations by an authorized administrator of GGU Law Digital Commons. For more information, please contact [email protected]. Re-assessment ofActs ofPiracy Under Contemporary International Law with Particular Reference to Activities ofSomali Pirates A Dissertation Submitted To The Committee of International Legal Studies In Candidacy for the Degree Of Scientiae Juridicae Doctor Department oflnternational Legal Studies GOLDEN GATE UNIVERSITY By Nutcha Sukhawattanakun San Francisco, California November 30, 2017 Copyright by Nutcha Sukhawattanakun 2017 i Golden Gate University The Dissertation Committee for Ms. Nutcha Sukhawattanakun Certifies that this
    [Show full text]
  • A Cross-Disciplinary Approach to the Maritime Security Risk of Piracy and Lessons Learned from Agent-Based Modeling
    Old Dominion University ODU Digital Commons Graduate Program in International Studies Theses & Dissertations Graduate Program in International Studies Fall 2017 A Cross-Disciplinary Approach to the Maritime Security Risk of Piracy and Lessons Learned From Agent-Based Modeling Joanne Marie Fish Old Dominion University, [email protected] Follow this and additional works at: https://digitalcommons.odu.edu/gpis_etds Part of the Defense and Security Studies Commons, and the International Relations Commons Recommended Citation Fish, Joanne M.. "A Cross-Disciplinary Approach to the Maritime Security Risk of Piracy and Lessons Learned From Agent-Based Modeling" (2017). Doctor of Philosophy (PhD), Dissertation, International Studies, Old Dominion University, DOI: 10.25777/spk1-5d03 https://digitalcommons.odu.edu/gpis_etds/19 This Dissertation is brought to you for free and open access by the Graduate Program in International Studies at ODU Digital Commons. It has been accepted for inclusion in Graduate Program in International Studies Theses & Dissertations by an authorized administrator of ODU Digital Commons. For more information, please contact [email protected]. A CROSS-DISCIPLINARY APPROACH TO THE MARITIME SECURITY RISK OF PIRACY AND LESSONS LEARNED FROM AGENT-BASED MODELING by Joanne Marie Fish B.S. May 1982, United States Naval Academy M.A. June 1993, Naval Postgraduate School A Dissertation Submitted to the Faculty of Old Dominion University in Partial Fulfillment of the Requirements for the Degree of DOCTOR OF PHILOSOPHY INTERNATIONAL STUDIES OLD DOMINION UNIVERSITY December 2017 Approved by: Jesse T. Richman (Director) Kurt Taylor Gaubatz (Member) David C. Earnest (Member) C. Ariel Pinto (Member) ABSTRACT A CROSS-DISCIPLINARY APPROACH TO THE MARITIME SECURITY RISK OF PIRACY AND LESSONS LEARNED FROM AGENT-BASED MODELING Joanne Marie Fish Old Dominion University, 2017 Director: Dr.
    [Show full text]