WHO ARE COMPUTER CRIMINALS? by Kevin W. Jennings, M.S.C.J. A

Total Page:16

File Type:pdf, Size:1020Kb

WHO ARE COMPUTER CRIMINALS? by Kevin W. Jennings, M.S.C.J. A WHO ARE COMPUTER CRIMINALS? by Kevin W. Jennings, M.S.C.J. A dissertation submitted to the Graduate Council of Texas State University in partial fulfillment of the requirements for the degree of Doctor of Philosophy with a Major in Criminal Justice August 2014 Committee Members: Brian L. Withrow, Chair Bob Edward Vásquez Jay D. Jamieson Matthew Draper Jose R. Agustina COPYRIGHT by Kevin W. Jennings 2014 FAIR USE AND AUTHOR’S PERMISSION STATEMENT Fair Use This work is protected by the Copyright Laws of the United States (Public Law 94-553, section 107). Consistent with fair use as defined in the Copyright Laws, brief quotations from this material are allowed with proper acknowledgment. Use of this material for financial gain without the author’s express written permission is not allowed. Duplication Permission As the copyright holder of this work I, Kevin Jennings, authorize duplication of this work, in whole or in part, for educational or scholarly purposes only. DEDICATION To Hal Jennings, Judy Jennings, and Matthew Draper, for showing me the path. To Sara Jennings, for joining me on the journey. ACKNOWLEDGEMENTS This dissertation never would have been possible without the support of many people who have guided me and cheered me on throughout this process. Dr. Brian Withrow was an excellent chair, and Doctors Vasquez, Jamieson, Draper, and Agustina all did their part in making this paper possible. Thank you for helping me, but even more important, thank you for putting up with me. I also need to give a big thank you to my mentor Dr. Tomas Mijares, who could not be on my committee but helped and guided me throughout the process of learning, teaching, and growing at Texas State University. Thank you. For my friends, colleagues, and confidants like Dr. Jackie Schildkraut, David Prosser, Michael Polansky, Dr. James Grace, Marcus Carey, Dustin Melbardis, Dr. Kim Yong Suk, Dr. Jennifer Rowland, Andrew Galloway, Aaron Knodel, Jamie Staebell, Barbara Viruet, and Kathy Harding. You have all done way more than your fair share helping me in this whole process, and putting up with me through the stress and the grind. Thank you. My parents, Hal and Judy, helped me through every step in my education process, from learning to walk to formatting this very paper. I would not be here today without your love and guidance. You were both amazing examples, and I live every day trying to be like you. Thank you. Most importantly, I want to thank my wife Sara Jennings. For the late night feedings, the hugs, the ability to cry on your shoulder, and for basically running all v aspects of my life outside of school for the last four years. I literally could not have done this without your constant support in all aspects of my life. You are everything I’ve ever wanted in a wife, a friend, and a partner. I love you. vi TABLE OF CONTENTS Page ACKNOWLEDGEMENTS ................................................................................................ v LIST OF TABLES ........................................................................................................... ixx ABSTRACT ........................................................................................................................ x CHAPTER I. INTRODUCTION .................................................................................................. 1 II. A REVIEW OF THE LITERATURE ................................................................... 8 History......................................................................................................... 8 Techniques ................................................................................................ 22 Phreaking .................................................................................................. 23 War Dialing and War Driving................................................................... 26 Malware .................................................................................................... 27 Vandals ..................................................................................................... 30 Bot Masters ............................................................................................... 31 Script Kiddies............................................................................................ 32 Social Engineering .................................................................................... 33 Gambling................................................................................................... 38 Crackers .................................................................................................... 39 Piracy ........................................................................................................ 42 Bullies and Stalkers................................................................................... 47 Cyber Fraud .............................................................................................. 49 Child Pornographers and Child Predators................................................. 51 Cyber Terrorism and Cyber Warfare ........................................................ 53 Hacker Groups .......................................................................................... 55 vii Hackers ..................................................................................................... 61 III. METHODS ........................................................................................................ 71 Sample....................................................................................................... 71 Variables and Hypotheses ......................................................................... 73 Age ................................................................................................ 73 Gender ........................................................................................... 73 Race and Ethnicity ........................................................................ 74 Education ...................................................................................... 74 Analysis Plan ............................................................................................ 75 IV. RESULTS .......................................................................................................... 78 Descriptive Statistics ................................................................................. 78 Main Regression Analysis ........................................................................ 80 Additional Analyses .................................................................................. 82 V. DISCUSSION ..................................................................................................... 91 Limitations ................................................................................................ 96 VI. CONCLUSION.................................................................................................. 98 REFERENCES ............................................................................................................... 100 viii LIST OF TABLES Table Page 1. Descriptive Statistics ............................................................................................. 78 2. Main analysis ........................................................................................................ 80 3. Unauthorized Access to Financial Information .................................................... 84 4. Identity Theft ........................................................................................................ 85 5. Cyber Trespassing ................................................................................................. 86 6. Obscene Communication ...................................................................................... 87 7. Copyright Infringement ........................................................................................ 88 8. Forgery .................................................................................................................. 89 9. Vandalism ............................................................................................................. 90 10. Intellectual Property Theft .................................................................................... 90 ix ABSTRACT .Computer criminals are compared to non-computer criminals in a 2004 sample of state and Federal prison inmates. Offenders are compared on their age, race, gender, and education. Computer criminals are found to be younger, more white, more female, and more educated than their non-criminal counterparts. Subsets of computer criminals are then compared to each other using the same four demographic variables. x I. INTRODUCTION Computer crime is a relatively new and misunderstood phenomenon in the field of criminal justice. As computers have become increasingly prevalent, crimes utilizing those computers has grown accordingly. While it was very rare to be the victim of computer crime as recently as a few decades ago, it is now quite common. This increase in cybercrime and cybercrime victimology also corresponds to an increase in cyber criminals, but little is known about who they are, how they think, or what makes them different from criminals who commit more traditional types of crime. One of the reasons that computer criminals are hard to identify and study is because there is very little agreement as to what the term “computer crime” actually means. Moon,
Recommended publications
  • A Study of Android Application Security
    A Study of Android Application Security William Enck, Damien Octeau, Patrick McDaniel, and Swarat Chaudhuri Systems and Internet Infrastructure Security Laboratory Department of Computer Science and Engineering The Pennsylvania State University enck, octeau, mcdaniel, swarat @cse.psu.edu { } Abstract ingly desire it, markets are not in a position to provide security in more than a superficial way [30]. The lack of The fluidity of application markets complicate smart- a common definition for security and the volume of ap- phone security. Although recent efforts have shed light plications ensures that some malicious, questionable, and on particular security issues, there remains little insight vulnerable applications will find their way to market. into broader security characteristics of smartphone ap- In this paper, we broadly characterize the security of plications. This paper seeks to better understand smart- applications in the Android Market. In contrast to past phone application security by studying 1,100 popular studies with narrower foci, e.g., [14, 12], we consider a free Android applications. We introduce the ded decom- breadth of concerns including both dangerous functional- piler, which recovers Android application source code ity and vulnerabilities, and apply a wide range of analysis directly from its installation image. We design and exe- techniques. In this, we make two primary contributions: cute a horizontal study of smartphone applications based on static analysis of 21 million lines of recovered code. We design and implement a Dalvik decompilier, • Our analysis uncovered pervasive use/misuse of person- ded. ded recovers an application’s Java source al/phone identifiers, and deep penetration of advertising solely from its installation image by inferring lost and analytics networks.
    [Show full text]
  • Kevin Jennings Born: Winston-Salem, N.C
    \ POSITION: ASSISTANT DEPUTY SECRETARY FOR THE OFFICE OF SAFE AND DRUG FREE SCHOOLS NOMINEE: Kevin Jennings Born: Winston-Salem, N.C. Occupation: Executive Director, and founder, of GLSEN, the Gay, Lesbian and Straight Education Network. Education: graduated magna cum laude from Harvard College View of Christians Addressing a church audience on March 20, 2000 in New York City — just days before "Fistgate" — GLSEN Executive Director Kevin Jennings offered a stinging (and quite intolerant) assessment of how to deal with religious conservatives: Twenty percent of people are hard-core fair-minded [pro-homosexual] people. Twenty percent are hard-core [anti-homosexual] bigots. We need to ignore the hard-core bigots, get more of the hard-core fair-minded people to speak up, and we'll pull that 60 percent [of people in the middle] … over to our side. That's really what I think our strategy has to be. We have to quit being afraid of the religious right. We also have to quit — … I'm trying to find a way to say this. I'm trying not to say, '[F---] 'em!' which is what I want to say, because I don't care what they think! [audience laughter] Drop dead! It should be noted that GLSEN and Jennings make heavy use of the words "respect" and "tolerance" in their public rhetoric and in descriptions of their programs. [ Source ] GLSEN and “Fistgate” GLSEN, which promotes homosexual clubs and the homosexual lifestyle in high schools, middle schools and grade schools and is the driving force behind the annual "Day of Silence" celebration of homosexuality “The most notorious education scandal involving homosexual activists is a GLSEN- sponsored conference that occurred on March 25, 2000, dubbed ‘Fistgate’ by conservatives.
    [Show full text]
  • In “The Tenement Windows”
    Contact: Jas Chana, Media & Communications Manager, [email protected], 646-518-3063 October 25, 2018, New York, NY— Kevin Jennings, the President of the Tenement Museum, has been named no.2 on OUTstanding’s 2018 global list of top 30 LGBT+ Public Sector Executives. Jennings was chosen by OUTStanding, a membership organization dedicated to promoting diversity & inclusion in the workplace, for his three decades of leadership in the global LGBT+ movement, which continues now in his role as Tenement Museum President. Launched in 2013, the annual list is one of several that comprise OUTstanding’s #OUTRoleModels18 campaign, which celebrates executives and leaders across the public and private sectors who are helping to make their workplace more welcoming, and who are making a significant contribution to LGBT+ inclusion outside of their workplace. The campaign is sponsored by the Financial Times. Jennings contributions to the LGBT+ movements began in 1988 when he created the first school-based Gay-Straight Alliance club, leading him to found and lead the Gay, Lesbian and Straight Education Network (GLSEN) for 18 years. He then served as an Assistant Secretary of Education for President Obama, after which he ran the Arcus Foundation, the world’s largest funder of LGBT rights organizations, for 5 years. In July 2017 Jennings joined the Tenement Museum, one of New York’s premier educational and cultural institutions dedicated to telling the uniquely American stories of immigrants, migrants and refuges in the ongoing creation of the United States. Since then, Jennings has launched an ambitious strategic plan aimed at dramatically increasing the institution’s reach and impact over the next five years with the goal of reshaping the national narrative about immigration at a time when the issue is front page news.
    [Show full text]
  • Herlandvoice-2007-09-V25-No08 Ocr
    • Herlan a bullying prevention conference imarron Alliance Foundation and other community partners september are sponsoring Stop Hate In The Hallways- A Bullying PFLAG OKC Ti JPS Sept 4 Church of Prevention Conference to address the Open Arms 7 pm bullying based on race, religion, sex­ OGLPC Meeting Monday Sept 1 O ual orientation, and gender identity. Neighborhood Alliance 1236 NW Training will be provided for the inter­ 36th 7:30 pm vention and prevention of bullying and harassment in a variety of break-out General Voting for OK County sessions. Keynote speaker will be Commissioner Iues_Sfptembe.r__il Kevin Jennings, Founder & Executive PFLAG Norman Thi Jrsday Sept 1 3 Director of GLSEN. The one-day con­ St Stephen's Church 7 pm ference will be held: Her/and Supper Club Sat Sept 8 October 1 1, 2007 rather benign in Superbad, in reality TG I Fridays 4239 NW Expressway Metro Tech Springlake Campus almost all LGBT students report hav­ 5:30 pm 1 900 Springlake Drive ing been harassed or assaulted at Her/and Scrabble Sati Jrday Sept 1 5 Oklahoma City, Oklahoma school for their perceived or actual orientation. Two-thirds of those stu­ 2 pm Why is this conference needed? dents never report it and LGBT stu­ Her/and Board Meeting Si mday dents are much more likely than Harassment and assault in high Sept 1 6 4 pm everyone welcome straight students to say that they do schools is still a big problem for les­ not feel safe at school. Her/and Craft Day SatULday_Sep_t_ll bian, gay, bisexual, and transgender 2-5 pm teens.
    [Show full text]
  • Albertmohler.Com – Psychologists Join the Gay Marriage Bandwagon
    http://www.albertmohler.com/2004/08/03/psychologists-join-the-gay-marriage-bandwagon/ 1/4 AlbertMohler.com Psychologists Join the Gay Marriage Bandwagon Signaling total capitulation to the homosexual agenda, the American Psychological Association has endorsed same-sex marriage and now calls for the complete acceptance of homosexual partnerships and homosexual adoption. In a sweeping resolution, the professional organization for psychologists provided ample evidence that the group is now practicing politics rather than psychology. Tuesday, August 3, 2004 Signaling total capitulation to the homosexual agenda, the American Psychological Association has endorsed same-sex marriage and now calls for the complete acceptance of homosexual partnerships and homosexual adoption. In a sweeping resolution, the professional organization for psychologists provided ample evidence that the group is now practicing politics rather than psychology. Meeting in Honolulu, the APA Council of Representatives adopted the recommendation of its Working Group on Same-Sex Families and Relationships. The resolution adopted by the organization reiterates the APA’s decision in 1975 to declare that “homosexuality is neither a form of mental illness nor a symptom of mental illness.” Further, “taken together, the evidence clearly supports the position that the social stigma, prejudice, discrimination, and violence associated with not having a heterosexual orientation and the hostile and stressful social environments created thereby, adversely affect the psychological, physical,
    [Show full text]
  • Coleman-Coding-Freedom.Pdf
    Coding Freedom !" Coding Freedom THE ETHICS AND AESTHETICS OF HACKING !" E. GABRIELLA COLEMAN PRINCETON UNIVERSITY PRESS PRINCETON AND OXFORD Copyright © 2013 by Princeton University Press Creative Commons Attribution- NonCommercial- NoDerivs CC BY- NC- ND Requests for permission to modify material from this work should be sent to Permissions, Princeton University Press Published by Princeton University Press, 41 William Street, Princeton, New Jersey 08540 In the United Kingdom: Princeton University Press, 6 Oxford Street, Woodstock, Oxfordshire OX20 1TW press.princeton.edu All Rights Reserved At the time of writing of this book, the references to Internet Web sites (URLs) were accurate. Neither the author nor Princeton University Press is responsible for URLs that may have expired or changed since the manuscript was prepared. Library of Congress Cataloging-in-Publication Data Coleman, E. Gabriella, 1973– Coding freedom : the ethics and aesthetics of hacking / E. Gabriella Coleman. p. cm. Includes bibliographical references and index. ISBN 978-0-691-14460-3 (hbk. : alk. paper)—ISBN 978-0-691-14461-0 (pbk. : alk. paper) 1. Computer hackers. 2. Computer programmers. 3. Computer programming—Moral and ethical aspects. 4. Computer programming—Social aspects. 5. Intellectual freedom. I. Title. HD8039.D37C65 2012 174’.90051--dc23 2012031422 British Library Cataloging- in- Publication Data is available This book has been composed in Sabon Printed on acid- free paper. ∞ Printed in the United States of America 1 3 5 7 9 10 8 6 4 2 This book is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE !" We must be free not because we claim freedom, but because we practice it.
    [Show full text]
  • The United States Government Manual 2009/2010
    The United States Government Manual 2009/2010 Office of the Federal Register National Archives and Records Administration The artwork used in creating this cover are derivatives of two pieces of original artwork created by and copyrighted 2003 by Coordination/Art Director: Errol M. Beard, Artwork by: Craig S. Holmes specifically to commemorate the National Archives Building Rededication celebration held September 15-19, 2003. See Archives Store for prints of these images. VerDate Nov 24 2008 15:39 Oct 26, 2009 Jkt 217558 PO 00000 Frm 00001 Fmt 6996 Sfmt 6996 M:\GOVMAN\217558\217558.000 APPS06 PsN: 217558 dkrause on GSDDPC29 with $$_JOB Revised September 15, 2009 Raymond A. Mosley, Director of the Federal Register. Adrienne C. Thomas, Acting Archivist of the United States. On the cover: This edition of The United States Government Manual marks the 75th anniversary of the National Archives and celebrates its important mission to ensure access to the essential documentation of Americans’ rights and the actions of their Government. The cover displays an image of the Rotunda and the Declaration Mural, one of the 1936 Faulkner Murals in the Rotunda at the National Archives and Records Administration (NARA) Building in Washington, DC. The National Archives Rotunda is the permanent home of the Declaration of Independence, the Constitution of the United States, and the Bill of Rights. These three documents, known collectively as the Charters of Freeedom, have secured the the rights of the American people for more than two and a quarter centuries. In 2003, the National Archives completed a massive restoration effort that included conserving the parchment of the Declaration of Independence, the Constitution, and the Bill of Rights, and re-encasing the documents in state-of-the-art containers.
    [Show full text]
  • Zerohack Zer0pwn Youranonnews Yevgeniy Anikin Yes Men
    Zerohack Zer0Pwn YourAnonNews Yevgeniy Anikin Yes Men YamaTough Xtreme x-Leader xenu xen0nymous www.oem.com.mx www.nytimes.com/pages/world/asia/index.html www.informador.com.mx www.futuregov.asia www.cronica.com.mx www.asiapacificsecuritymagazine.com Worm Wolfy Withdrawal* WillyFoReal Wikileaks IRC 88.80.16.13/9999 IRC Channel WikiLeaks WiiSpellWhy whitekidney Wells Fargo weed WallRoad w0rmware Vulnerability Vladislav Khorokhorin Visa Inc. Virus Virgin Islands "Viewpointe Archive Services, LLC" Versability Verizon Venezuela Vegas Vatican City USB US Trust US Bankcorp Uruguay Uran0n unusedcrayon United Kingdom UnicormCr3w unfittoprint unelected.org UndisclosedAnon Ukraine UGNazi ua_musti_1905 U.S. Bankcorp TYLER Turkey trosec113 Trojan Horse Trojan Trivette TriCk Tribalzer0 Transnistria transaction Traitor traffic court Tradecraft Trade Secrets "Total System Services, Inc." Topiary Top Secret Tom Stracener TibitXimer Thumb Drive Thomson Reuters TheWikiBoat thepeoplescause the_infecti0n The Unknowns The UnderTaker The Syrian electronic army The Jokerhack Thailand ThaCosmo th3j35t3r testeux1 TEST Telecomix TehWongZ Teddy Bigglesworth TeaMp0isoN TeamHav0k Team Ghost Shell Team Digi7al tdl4 taxes TARP tango down Tampa Tammy Shapiro Taiwan Tabu T0x1c t0wN T.A.R.P. Syrian Electronic Army syndiv Symantec Corporation Switzerland Swingers Club SWIFT Sweden Swan SwaggSec Swagg Security "SunGard Data Systems, Inc." Stuxnet Stringer Streamroller Stole* Sterlok SteelAnne st0rm SQLi Spyware Spying Spydevilz Spy Camera Sposed Spook Spoofing Splendide
    [Show full text]
  • Introduction
    Introduction Toward a Radical Criminology of Hackers In the expansive Rio Hotel and Casino in Las Vegas, I stood in line for around an hour and a half to pay for my badge for admittance into DEF CON 21, one of the largest hacker conventions in the world. The wad of cash in my hand felt heavier than it should have as I approached the badge vendor. DEF CON is an extravagant affair and attendees pay for it (though, from my own readings, the conference administrators work to keep the costs reduced). The line slowly trickled down the ramp into the hotel con- vention area where the badge booths were arranged. As I laid eyes on the convention, my jaw dropped. It was packed. Attendees were already mov- ing hurriedly throughout the place, engaged in energetic conversations. Black t- shirts— a kind of hacker uniform— were everywhere. Las Vegas- and gambling- themed décor lined the walls and floors. Already, I could see a line forming at the DEF CON merchandise booth. Miles, a hacker I had gotten to know throughout my research, mentioned that if I wanted some of the “swag” or “loot” (the conference merchandise), I should go ahead and get in line, a potential three- to four-hour wait. Seemingly, everyone wanted to purchase merchandise to provide some evidence they were in attendance. Wait too long and the loot runs out. After winding through the serpentine line of conference attendees wait- ing for admittance, I approached the badge vendors and (dearly) departed with almost $200. Stepping into the convention area, I felt that loss in the pit of my stomach.
    [Show full text]
  • 3 Dollar Bill Winter Issue
    University of Rhode Island DigitalCommons@URI Newspapers and Publications (Misc) Newspapers and Publications 1996 3 Dollar Bill Winter Issue Follow this and additional works at: https://digitalcommons.uri.edu/gsc-pubs-files Recommended Citation "3 Dollar Bill Winter Issue" (1996). Newspapers and Publications (Misc). Paper 8. https://digitalcommons.uri.edu/gsc-pubs-files/8https://digitalcommons.uri.edu/gsc-pubs-files/8 This Newspaper is brought to you for free and open access by the Newspapers and Publications at DigitalCommons@URI. It has been accepted for inclusion in Newspapers and Publications (Misc) by an authorized administrator of DigitalCommons@URI. For more information, please contact [email protected]. The 3 Dollar Bill Winter 1996 Ihe 3 Dollar Bill is a publication of the differences and identities as gay, lesbian, URI Gay, Lesbian, Bisexual Association It is and bisexual people. I am anxious to published as often as time allows. Everyone is move on to new and brighter things after invited to submit letters, poetry, fiction and/or URI. I would also like to thank my non-fiction for consideration for publication GLBA colleagues who helped to make Articles can be sent to the GLBA c/o Student this semester happen and work smoothly, Senate, Room 130, Memorial Union namely MelissaLovering and Carolina Tejera. Their hard work and dedication was greatly appreciated. Welcome and Gay, Lesbian, Bisexual good luck to incoming co-facilitator, Association (GLBA) Jessica Grejdus .. She is already planning The GLBA is open to all events and workshops for next semester. undergraduate and graduate students at We all hope to see more of you in the URI (including CCE).
    [Show full text]
  • Jennings, Kevin (B
    Jennings, Kevin (b. 1963) by Victoria Shannon Encyclopedia Copyright © 2015, glbtq, Inc. Entry Copyright © 2008 glbtq, Inc. Reprinted from http://www.glbtq.com Kevin Jennings. Image courtesy Kevin It has been said that one person can start a revolution and, in the case of Kevin Jennings. Jennings, founder of the Gay, Lesbian, and Straight Education Network (GLSEN), that has never been more profoundly true. With courage born of anger, Jennings drew on his own experience with bullying and gay bashing throughout his school years, and transformed his passion for justice into founding the first national organization to address the lesson gay, lesbian, bisexual, and transgender young people were hearing in schools: Hate yourself. For nearly twenty years, Jennings has campaigned all over the country to educate glbtq and straight teachers, parents, students, and community members about ending bias in the nation's K-12 schools. Although Jennings resigned as executive director of GLSEN in August 2008, his legacy will live as the chapters of GLSEN flourish throughout the United States. Kevin Brett Jennings was born on May 8, 1963 in Fort Lauderdale, Florida. He is the son of Chester Henry, a Baptist preacher, and Alice Verna (Johnson) Jennings. He is the youngest of five children; he has three brothers and a sister. Jennings was born seven years after his nearest sibling, at a time when his mother, at 38, was not anticipating another child. When he was three years old, Jennings nearly died of whooping cough. Frightened of losing her youngest son, his mother became fiercely protective of him, and he acquired the name "Mama's Boy." As Jennings says, "I can't remember a time when that wasn't my name.
    [Show full text]
  • How Hackers Think: a Mixed Method Study of Mental Models and Cognitive Patterns of High-Tech Wizards
    HOW HACKERS THINK: A MIXED METHOD STUDY OF MENTAL MODELS AND COGNITIVE PATTERNS OF HIGH-TECH WIZARDS by TIMOTHY C. SUMMERS Submitted in partial fulfillment of the requirements For the degree of Doctor of Philosophy Dissertation Committee: Kalle Lyytinen, Ph.D., Case Western Reserve University (chair) Mark Turner, Ph.D., Case Western Reserve University Mikko Siponen, Ph.D., University of Jyväskylä James Gaskin, Ph.D., Brigham Young University Weatherhead School of Management Designing Sustainable Systems CASE WESTERN RESERVE UNIVESITY May, 2015 CASE WESTERN RESERVE UNIVERSITY SCHOOL OF GRADUATE STUDIES We hereby approve the thesis/dissertation of Timothy C. Summers candidate for the Doctor of Philosophy degree*. (signed) Kalle Lyytinen (chair of the committee) Mark Turner Mikko Siponen James Gaskin (date) February 17, 2015 *We also certify that written approval has been obtained for any proprietary material contained therein. © Copyright by Timothy C. Summers, 2014 All Rights Reserved Dedication I am honored to dedicate this thesis to my parents, Dr. Gloria D. Frelix and Dr. Timothy Summers, who introduced me to excellence by example and practice. I am especially thankful to my mother for all of her relentless support. Thanks Mom. DISCLAIMER The views expressed in this dissertation are those of the author and do not reflect the official policy or position of the Department of Defense, the United States Government, or Booz Allen Hamilton. Table of Contents List of Tables ....................................................................................................................
    [Show full text]