Homeland Security Research

The HSEC program, in partnership with key community, academic, public and private-sector partners, is engaged in several collaborative efforts including projects in Humanitarian Assistance Disaster Relief, civilian-military interactions, data fusion, visualization, bioterrorism defense, port and border security, critical infrastructure, information security and communications, and many other relevant issues. We try to involve Homeland Security students in real (and virtual world) events such as the response to natural disasters globally.  Many of these efforts are done through the Viz Center that also serves as an unofficial locus of activity for the Homeland Security program.

Research is lead by our remarkable faculty members in the topics of their individual and collective interests.  Below is a sample of our students' published works in the form of Masters Theses:

  • #MeToo: Social News Media and The New Politics of Influence
  • A Future Model for Capacity Building and Partnership Integration Leveraging gis and Knowledge Discovery
  • Abdul Rasul Sayyaf: his Path to Radical Islam, Rise to Power, and Significance in Current and Future Afghan Politics
  • Achieving Logistical Efficiencies in Power Restoral Through Decision Making Systems
  • Al Taqwa Bank
  • An Analysis of Modern Russian Rhetoric
  • An Analysis of the Diversity Lottery
  • An Examination of Available Literature on the Crime-terror Nexus: Trends and Opportunities
  • An Exploratory Study of the Indicators of Trafficking in Online Female Escort Ads
  • Analysis of Cultural Influences of Southest Europe: Macedonia and Sandzak
  • Anti-corruption, the Missing Piece of U.S. Counter Narcotics Strategy in Afghanistan
  • Assessing the Impact of Corruption on the Efficacy of Counterproliferation Efforts: the Case of Oil-for-food and Iraq's Sanctioned Weapons Programs
  • Aviation as a Counterinsurgent: Assessing the Effectiveness of Tactical Airpower in low Intensity Conflict
  • Balancing Civil Rights and Protecting the Homeland: can it be Done?
  • Bncivilian/Military Collaboration in Humanitarian Asistance and Disaster Response: the U.S.N.S. Mercy's Pacific Partnership 2008-a Case History
  • Bureaucracy 2.0: the Collaborative Revolution
  • Business Continuity Practices and Pandemic Influenza: Shortfalls and Gaps in Current Practice
  • Collaborative gis Environment for Disaster Management: Tools and Analysis
  • Combating Human Trafficking in the Aftermath of a Natural Disaster Through the DoD: the Case of the 2004 Indonesian Earthquake and Tsunami
  • Counterinsurgency in Southern Thailand
  • Creating University-led Private and Public Partnerships to Assist Nation-building Efforts in South Sudan
  • Creative Homeland Security: Imagining the Next big Solar Storm
  • Cyber Hygiene & Social Engineering within SCADA & Industrial Control Systems
  • Cybersecurity: Challenging Rhetoric to Identify the Future of Defensive and Offensive Measures Against Defined Threat Actors
  • Czech Resistance to German Occupation, 1939-1945: a Case Study of Decentralized Networks Engaged in Irregular Warfare
  • Data Fusion and Pattern Recognition for Homeland Security
  • Development of a Comprehensive Emergency Preparedness and Disaster Response Program for the City of Monterey Park: Challenges and Opportunities to Serve as a Template for Others
  • Development of the Book Entitled: the Yogyakarta Earthquake of May 27, 2006
  • Domestic Preparedness Through Ongoing Planning, Training and Exerices
  • Emergency Management and the Evacuation of Large Animals
  • Enhancing Open-source Intelligence (OSINT) Through web Services
  • Evaluation for Hsec of the Multi-linguistic and Cultural Capabilities of Google Search; Global Talk and Similar Internet Tools With a Focus on French-arabic-english in Mashrebi Counter-terrorism Analysis
  • Extraterritorial Abduction and Targeted Killing as Tools of National Security
  • Falun Gong and Homeland Security: how can This new Faith Group Assist the Nation in Homeland Security Including Disaster Preparedness and Response?
  • Fear of Deportation, the Effects of Legal Status at Home and Work, and Psychological Distress among Unauthorized U.S. Migrants
  • Fourth & Fifth Generation Warfare: Implications on Information Security
  • Habeas Corpus: Empowerment of the Supreme Court and National Security Implications
  • Homeland Security and Rhetoric: a Guide to Understanding Adam Gadahn's Domestic Terrorist Recruitment Machine
  • Homeland Security Education: are we Educating Professionals Sufficiently?
  • How a Cloud Computing Environment can Support Social Networks During Catastrophic Crisis and Disaster Management in Logistics
  • Human Trafficking: from a Global Health Perspective
  • Improve Temporary Visa Travel: Adoption of a Biometric Exit Matching and Tracking Plan
  • Improving Cross-border Disaster Response by Enhancing Collaboration and Cooperation Between the United States and Mexico Through Universities
  • Improving Multi-agency Collaboration/Coordination by Augmenting Effective Practices and Means Within Emergency Management
  • In Their Eyes: a Rhetorical Analysis of the Most Quoted Contemporary Islamist Ideologues
  • Inciting Violence: a Statistical Review of Violent Rhetoric
  • Indonesia: Educating Internet & Mobile Literacy in Social Media Platforms with Significance to U.S. Interests
  • Information Warfare on an Evolving Battlefield
  • Institutionalizing Extremism: Ideological Warfare at the Crossroads of Soviet Revolutionary Theory and Islamic Feudalism
  • Integrating Non-verbal Behavior Into Threat Assessment
  • Iran: Circumvention of Sanctions, Latin American Ties and Argentina as its Next Supplier of Enriched Uranium
  • Islamist Radicalization in the United States and the Influence of Western Jihadist Ideologues
  • Managing the Risk of Labor Smuggling & Trafficking in the san Diego Area
  • MARA 18: a Threat Assessment for Homeland Security
  • Maritime Piracy: Utilizing Historical Examples to Combat Modern-Day Occurences
  • Material Representation: Narco Religiosity in new American Conception
  • Mexico's oil Problems, u.s. Energy Security, and Five Mitigation Strategies for Both Countries
  • North Korean Nuclear Proliferation and Organized Criminal Activity: a Social Network Approach
  • Ongoing Training of Homeland Security Personnel Through the use of Open-source, Geospatial Tools Such as Openstreetmap and Walking Papers
  • Potential Applications of Airborne Synthetic Aperture Radar (sar) Remote Sensing Sensors, Techniques, and Platforms in Support of Disaster and Emergency Response Operations
  • Privacy Laws: the Impact on California Fusion Centers
  • Protecting United States Seaports: the Twic Program's Effect in the Maritime Sector
  • Resilience Reboot: Rethinking the Cyber Strategy
  • Sex Trafficking: a National Perspective
  • Social Cloud Media and Crowdsourcing in Emergency Management: an Analytical Review of Exercise24
  • Spies Like us: a Comparison of Infiltrating Networked Terrorist Organizations Versus Foreign Intelligence Services
  • Strategies to Prepare Emergency Management Personnel to Integrate Geospatial Tools in the Form of Geographic Information Systems (gis), Geovisualization, and Cartography Into Emergency Management
  • Symbolic Warfare: Isil Visual Thetoric in "Flames of War"
  • The Balance of Power in the Middle East: When Nations, Borders, and Identities Collide
  • The Case for Modernizing the US Cyber Policy: Confronting Cyberterrorism through Social Media
  • The Chaldeans Between Religion and Politics: the Struggle of Iraq's Ethnic Minority and us National Security
  • The Demon Wind: Adressing the Threat a Highly Pathogenic Avian Influenza Pandemic Poses to the Economy and Population of the United States
  • The Effect of Fear on Civilian Populations: a Historical Case Study of the Aerial Bombardment of London During the Great War
  • The Effects of Enforcement on the Flow of Illegal Immigration
  • The Effects of Terrorism on the Global Theme Park Industry
  • The Exploitation of Social Media by Clandestine Groups, how law Enforcement and Intelligence can Better Utilize Social Media, and Legal Concerns to Ensure its Appropriate use of Social Media by Government
  • The Fall of the ku Klux Clan in the Postbellum South
  • The Global Underworld of Drugs: the Distribution of Khat in Underground Marketing in the United States Amongst East African Immigrants
  • The Graphic Language of American Radicalism: a Visual Rhetoric Analysis of Modern Domestic Extremist Organizations
  • The King is Dead; Long Live the King: how the Army's Field Artillery can Reassert its Full Spectrum Relevance
  • The Secret Ingredient: the Importance of Informants in National Security
  • The Spice Trade: Challenges With Addressing the Rise of Synthetic Drugs in the era of Homeland Security
  • The Virtue of Human Smuggling: the Underground Railroad in Criminological Perspective
  • Trade, Security, and the Modern State: an Analysis on the Reemrgence of Mercantilism
  • Training For Sideways: Forging Tomorrow's Security Risk Managers
  • University Smart Power: How Universities Can Leverage Academia to Bridge Hard and Soft Power Divides
  • X24 Mexico: Description of a Multi-national Natural Disaster Exercise and Analysis of the Participants' Experience