Walden University ScholarWorks Walden Dissertations and Doctoral Studies Walden Dissertations and Doctoral Studies Collection 2015 Port Security: The eT rrorist Naval Mine/ Underwater Improvised Explosive Device Threat Peter von Bleichert Walden University Follow this and additional works at: https://scholarworks.waldenu.edu/dissertations Part of the Public Policy Commons This Dissertation is brought to you for free and open access by the Walden Dissertations and Doctoral Studies Collection at ScholarWorks. It has been accepted for inclusion in Walden Dissertations and Doctoral Studies by an authorized administrator of ScholarWorks. For more information, please contact [email protected]. Walden University College of Social and Behavioral Sciences This is to certify that the doctoral dissertation by Peter von Bleichert has been found to be complete and satisfactory in all respects, and that any and all revisions required by the review committee have been made. Review Committee Dr. Karen Shafer, Committee Chairperson, Public Policy and Administration Faculty Dr. Gregory Dixon, Committee Member, Public Policy and Administration Faculty Dr. Anne Fetter, University Reviewer, Public Policy and Administration Faculty Chief Academic Officer Eric Riedel, Ph.D. Walden University 2015 Abstract Port Security: The Terrorist Naval Mine/Underwater Improvised Explosive Device Threat by Peter A. von Bleichert MA, Schiller International University (London), 1992 BA, American College of Greece, 1991 Dissertation Submitted in Partial Fulfillment of the Requirements for the Degree of Doctor of Philosophy Public Policy and Administration Walden University June 2015 Abstract Terrorist naval mines/underwater improvised explosive devices (M/UWIEDs) are a threat to U.S. maritime ports, and could cause economic damage, panic, and mass casualties. The purpose of this case study was to examine this threat and propose reforms that improve port security management. The study aligned with the mission area analysis objective of identifying and assessing potential terrorist threats in order to preempt and prevent attacks. Von Bertalanffy's general systems theory was the framework for research questions, which focused on improvements in port security management to mitigate the threat of terrorist M/UWIEDs. Data collection included a document content analysis of open source/nonclassified crime reports, government threat assessments, and legislation; physical artifacts (port infrastructure) information; policy papers; maps, satellite imagery, and navigational charts; peer-reviewed academic literature; and direct observation of 2 California-based maritime ports and an inspection of their physical artifacts. Data were organized by general themes; coded axially and selectively; and analyzed by phrases, topics, and words associated with minelaying, mine countermeasures, and port security. Key findings were that, since 9/11, overall port security has improved, although there has been little progress in countering the threat presented by M/UWIEDs. Further, vulnerabilities exist that terrorists who seek to commit an M/UWIED attack or campaign could misuse. The findings from this study contribute to positive social change by providing data to key stakeholders responsible for counterterrorism, mine warfare, and port security, thereby contributing to overall U.S. homeland security. Port Security: The Terrorist Naval Mine/Underwater Improvised Explosive Device Threat by Peter A. von Bleichert MA, Schiller International University (London), 1992 BA, American College of Greece, 1991 Dissertation Submitted in Partial Fulfillment of the Requirements for the Degree of Doctor of Philosophy Public Policy and Administration Walden University June 2015 Dedication For my daughter, Elizabeth Anne: The countless hours are for you. I pray for you to have a long, happy, healthy, peaceful, and prosperous life, and can only hope I impart one lesson with this work: You can do anything if you never give up! Acknowledgments To my dissertation committee chair, Dr. Karen Shafer: Thank you for stepping up and sticking with me, and for guidance, patience, and professionalism. I could not have done this without you. I am forever grateful. To my dissertation committee members, Dr. Gregory Dixon and Dr. Anne Fetter: Thank you for joining my team. It was a pleasure to work with you both. Table of Contents List of Tables ..................................................................................................................... iv List of Figures ......................................................................................................................v Chapter 1: Introduction to the Study ....................................................................................1 Background ....................................................................................................................5 Problem Statement .......................................................................................................10 Purpose of the Study ....................................................................................................11 Research Questions ......................................................................................................12 Theoretical Framework ................................................................................................12 Nature of the Study ......................................................................................................14 Definitions....................................................................................................................15 Assumptions .................................................................................................................19 Scope and Delimitations ..............................................................................................20 Limitations ...................................................................................................................21 Significance..................................................................................................................21 Summary ......................................................................................................................23 Chapter 2: Literature Review .............................................................................................24 Introduction ..................................................................................................................24 Literature Search Strategy............................................................................................26 Theoretical Framework ................................................................................................27 Literature Review Related to Key Concepts ................................................................34 Terrorism............................................................................................................... 34 i Mine Warfare ........................................................................................................ 39 Port Security.......................................................................................................... 64 Summary and Conclusions ..........................................................................................74 Chapter 3: Research Method ..............................................................................................76 Introduction ..................................................................................................................76 Research Design and Rationale ...................................................................................76 Role of the Researcher .................................................................................................79 Methodology ................................................................................................................80 Population ............................................................................................................. 80 Sampling ............................................................................................................... 80 Instrumentation ..................................................................................................... 85 Data Collection ..................................................................................................... 88 Data Analysis ........................................................................................................ 89 Issues of Trustworthiness ...................................................................................... 90 Ethical Procedures ................................................................................................ 90 Summary ......................................................................................................................91 Chapter 4: Results ..............................................................................................................92 Introduction ..................................................................................................................92 Data Collection ............................................................................................................93 Document Content Analysis ................................................................................. 93 Direct Observation ...............................................................................................
Details
-
File Typepdf
-
Upload Time-
-
Content LanguagesEnglish
-
Upload UserAnonymous/Not logged-in
-
File Pages210 Page
-
File Size-