Anthony Lawing | Nova Southeastern University (original) (raw)

Papers by Anthony Lawing

Research paper thumbnail of The Threat of Argoterrorism

This all hazards project will explore “The Threat of Argoterrorism.” The project will define arg... more This all hazards project will explore “The Threat of Argoterrorism.” The project will define argoterrorism as an operational term for all levels of government services and the practical term relevant to the general population. The project will explore how real the threat of argoterrorism may be and the likelihood of such an attack taking place. The project will breakdown the nexus of argoterrorism and in what capacity it will affect its intended targets, directly, secondarily, and indirectly.
The project will discuss the roles of the government and private sectors and their perspective emergency management cycles of preparation, mitigation, preparedness, response and recovery, in terms of how they each will execute their plan of action through strategic partnerships, interoperability, and incident management. The project will analyze a command structure for an incident involving argoterrorism and discuss lessons learned from previous successful or failed attempts, or practical exercises of argoterrorism.
The project will examine the actual threat of argoterrorism, the likely or expected perpetrators of this threat, and their methods and resources to execute this threat successfully, and what would need to be implemented to thwart an argoterrorism critical incident from materializing, and if the United States is ultimately prepared to endure an argoterrorism attack.

Research paper thumbnail of The Media’s Role in the Politicization of Intelligence

The basis of this thought paper is to identify and define the media’s role in the politicization ... more The basis of this thought paper is to identify and define the media’s role in the politicization of intelligence as it pertains to national security, specifically in the United States. The work will delve into the complex problem of politicization and how the media influences it through its innumerable formats and persistent presence, guiding public opinion and the pressure it places on policymakers. The thought paper examines this issue through the research of respected scholarly articles and repeatable publications. The work offer’s a scant solution, but the nature of the problem makes it a complicated issue with systemic ambiguity, well beyond the scope of this work, explicitly germane to the intelligence cycle and its triumvirate of the collector, analysis, and policymaker relationships.

Research paper thumbnail of The Correlation of Adults of Childhood Abuse and their Inclination of Abusing their own Children: An Approach for New Policy Adaptations.

This research proposal will explore and attempt to answer the correlation between adults that wer... more This research proposal will explore and attempt to answer the correlation between adults that were abused as children and their propensity to abuse their own children. The problem statement will produce three research questions that will generate a predictive hypothesis that will be aided by secondary research in determining the causal link between the problem. The goal of this proposal is to obtain funding for this critical research.

Research paper thumbnail of Hurricane Sandy (2012): Critical Incident Response

The forthcoming case study will detail the October 2012 critical incident response of Hurricane... more The forthcoming case study will detail the October 2012 critical incident response of Hurricane Sandy that made landfall on the 29th of October in the southern portion of New Jersey and directly affected the New Jersey, New York, and Connecticut region. The storm also impacted secondary victims of over 20 other states that experienced the remnants from the storms path.
The case study will provide an overview of hurricane Sandy’s track including a timeline of its manifestation and the ramifications it had on the areas in its trajectory. The study will review the Emergency Management Cycle (EMC) of mitigation, preparation, response , and recovery, and overview the community effected by the storm and the responding organizations in regards to the EMC which includes but not limited to infrastructure, coordinated response efforts, public assistance, citizen preparedness, and support functions.
The study will span Incident Management structure and the implementation and set up of the Incident Command System (ICS), given hurricane Sandy was a large area incident. The effectiveness of the ICS command and its operations and personnel will also be explored. The responding entities will be discussed and assessed with a concentrated focus on the Federal Emergency Management Agency (FEMA), the roles of the state, local, and tribal groups, and the vitality of the nongovernmental organizations as well. The National Incident Management (NIMS) and the National Response Framework (NRF) will be included in the examination of the incident management and its effectiveness. The study will also probe the equipment and personnel used to respond to the incident.
The study will analyze the strategies of lessons learned from the storm and what management protocols to consider in future situations which incorporates the EMC and a major emphasis on the recovery element both in the short and long term. The study will address critical incident policies and plans which coincides with lessons learned, as well as examine the financial impact of the incident overall.
In evaluating command and control the study will examine structural conflict and the distinctions between the conflict and crises management. Risk assessment of the operations in the aftermath of the hurricane and how it may have affected the response and what risk were present and what was done to alleviate those risk.

Research paper thumbnail of Terrorism Case Study IV: Italy

This case study of Italy covers the contrasting tactics of terrorism by the neo-fascist and the... more This case study of Italy covers the contrasting tactics of terrorism by the neo-fascist and the Red Brigade (BR) terrorist organizations in a 20 year time span. The study reviews Italy’s struggle post World Wars of a growing industrialized democracies ineptitude of managing the left and right wing extremist groups, vying to unstable the countries political structure by galvanizing the working class as their vigilante representatives. It explicitly discusses the rise and fall of the BR and Italy’s reaction to terrorism moving forward.

Research paper thumbnail of Terrorism Case Study III: Algeria

Case study III assess the gross terrorism plight of Algeria in the early to late 1990s. Algeria i... more Case study III assess the gross terrorism plight of Algeria in the early to late 1990s. Algeria is a very special case because the amount of terrorism it experienced was not only copious, but also by the hands of their own people and at the cost of no lives spared. Algerian counter-measures to combat the terrorism is a remarkable study in itself, to overcome the dire situation and place the country on a better track and step into the forefront as a state that now leads by example on countering domestic and international terrorism.

Research paper thumbnail of A History of Local Responses in International Violence Prevention

This research will examine the history violence and the local responses in the international real... more This research will examine the history violence and the local responses in the international realm of the various regions of Northern Ireland, Republic of Burundi, and Slovakia and Hungary. The research will give a brief overview of the relative conflict within the region, the history of violence, and how the local response prevented or deescalated the conflict, and if applicable the road to recovery.

Research paper thumbnail of Lawless Technology in a Lawful Society

This paper will explore the investigatory technological methods of surveillance. The paper will c... more This paper will explore the investigatory technological methods of surveillance. The paper will cover the twenty-first century types of surveillance utilized for cases such as wiretapping and stakeouts and span the contemporary methods such as cell phone data tapping and drone surveillance.
The paper will discuss in detail the technology behind the surveillance techniques and how it is used in law enforcement investigations. The paper will discuss the law enforcement entities that currently use or have access to the new surveillance technologies and how they are utilized on a routine basis for diurnal law enforcement operations such as criminal intelligence, as well as specific criminal offenses. The paper will cover how the use of technology is determined and what can be admissible in the judicial system, as well as how the law enforcement may use the information gathered from the higher technological surveillance.
The term paper will also discuss landmark cases of surveillance technology and how they apply to constitutional rights of U.S. citizens, such as the United States versus Jones which detailed the unreasonable use of GPS tracking by law enforcement, and the U.S. Patriot Act controversial reform that expressed serious civil liberty violations.

Research paper thumbnail of The Threat of Argoterrorism

This all hazards project will explore “The Threat of Argoterrorism.” The project will define arg... more This all hazards project will explore “The Threat of Argoterrorism.” The project will define argoterrorism as an operational term for all levels of government services and the practical term relevant to the general population. The project will explore how real the threat of argoterrorism may be and the likelihood of such an attack taking place. The project will breakdown the nexus of argoterrorism and in what capacity it will affect its intended targets, directly, secondarily, and indirectly.
The project will discuss the roles of the government and private sectors and their perspective emergency management cycles of preparation, mitigation, preparedness, response and recovery, in terms of how they each will execute their plan of action through strategic partnerships, interoperability, and incident management. The project will analyze a command structure for an incident involving argoterrorism and discuss lessons learned from previous successful or failed attempts, or practical exercises of argoterrorism.
The project will examine the actual threat of argoterrorism, the likely or expected perpetrators of this threat, and their methods and resources to execute this threat successfully, and what would need to be implemented to thwart an argoterrorism critical incident from materializing, and if the United States is ultimately prepared to endure an argoterrorism attack.

Research paper thumbnail of The Media’s Role in the Politicization of Intelligence

The basis of this thought paper is to identify and define the media’s role in the politicization ... more The basis of this thought paper is to identify and define the media’s role in the politicization of intelligence as it pertains to national security, specifically in the United States. The work will delve into the complex problem of politicization and how the media influences it through its innumerable formats and persistent presence, guiding public opinion and the pressure it places on policymakers. The thought paper examines this issue through the research of respected scholarly articles and repeatable publications. The work offer’s a scant solution, but the nature of the problem makes it a complicated issue with systemic ambiguity, well beyond the scope of this work, explicitly germane to the intelligence cycle and its triumvirate of the collector, analysis, and policymaker relationships.

Research paper thumbnail of The Correlation of Adults of Childhood Abuse and their Inclination of Abusing their own Children: An Approach for New Policy Adaptations.

This research proposal will explore and attempt to answer the correlation between adults that wer... more This research proposal will explore and attempt to answer the correlation between adults that were abused as children and their propensity to abuse their own children. The problem statement will produce three research questions that will generate a predictive hypothesis that will be aided by secondary research in determining the causal link between the problem. The goal of this proposal is to obtain funding for this critical research.

Research paper thumbnail of Hurricane Sandy (2012): Critical Incident Response

The forthcoming case study will detail the October 2012 critical incident response of Hurricane... more The forthcoming case study will detail the October 2012 critical incident response of Hurricane Sandy that made landfall on the 29th of October in the southern portion of New Jersey and directly affected the New Jersey, New York, and Connecticut region. The storm also impacted secondary victims of over 20 other states that experienced the remnants from the storms path.
The case study will provide an overview of hurricane Sandy’s track including a timeline of its manifestation and the ramifications it had on the areas in its trajectory. The study will review the Emergency Management Cycle (EMC) of mitigation, preparation, response , and recovery, and overview the community effected by the storm and the responding organizations in regards to the EMC which includes but not limited to infrastructure, coordinated response efforts, public assistance, citizen preparedness, and support functions.
The study will span Incident Management structure and the implementation and set up of the Incident Command System (ICS), given hurricane Sandy was a large area incident. The effectiveness of the ICS command and its operations and personnel will also be explored. The responding entities will be discussed and assessed with a concentrated focus on the Federal Emergency Management Agency (FEMA), the roles of the state, local, and tribal groups, and the vitality of the nongovernmental organizations as well. The National Incident Management (NIMS) and the National Response Framework (NRF) will be included in the examination of the incident management and its effectiveness. The study will also probe the equipment and personnel used to respond to the incident.
The study will analyze the strategies of lessons learned from the storm and what management protocols to consider in future situations which incorporates the EMC and a major emphasis on the recovery element both in the short and long term. The study will address critical incident policies and plans which coincides with lessons learned, as well as examine the financial impact of the incident overall.
In evaluating command and control the study will examine structural conflict and the distinctions between the conflict and crises management. Risk assessment of the operations in the aftermath of the hurricane and how it may have affected the response and what risk were present and what was done to alleviate those risk.

Research paper thumbnail of Terrorism Case Study IV: Italy

This case study of Italy covers the contrasting tactics of terrorism by the neo-fascist and the... more This case study of Italy covers the contrasting tactics of terrorism by the neo-fascist and the Red Brigade (BR) terrorist organizations in a 20 year time span. The study reviews Italy’s struggle post World Wars of a growing industrialized democracies ineptitude of managing the left and right wing extremist groups, vying to unstable the countries political structure by galvanizing the working class as their vigilante representatives. It explicitly discusses the rise and fall of the BR and Italy’s reaction to terrorism moving forward.

Research paper thumbnail of Terrorism Case Study III: Algeria

Case study III assess the gross terrorism plight of Algeria in the early to late 1990s. Algeria i... more Case study III assess the gross terrorism plight of Algeria in the early to late 1990s. Algeria is a very special case because the amount of terrorism it experienced was not only copious, but also by the hands of their own people and at the cost of no lives spared. Algerian counter-measures to combat the terrorism is a remarkable study in itself, to overcome the dire situation and place the country on a better track and step into the forefront as a state that now leads by example on countering domestic and international terrorism.

Research paper thumbnail of A History of Local Responses in International Violence Prevention

This research will examine the history violence and the local responses in the international real... more This research will examine the history violence and the local responses in the international realm of the various regions of Northern Ireland, Republic of Burundi, and Slovakia and Hungary. The research will give a brief overview of the relative conflict within the region, the history of violence, and how the local response prevented or deescalated the conflict, and if applicable the road to recovery.

Research paper thumbnail of Lawless Technology in a Lawful Society

This paper will explore the investigatory technological methods of surveillance. The paper will c... more This paper will explore the investigatory technological methods of surveillance. The paper will cover the twenty-first century types of surveillance utilized for cases such as wiretapping and stakeouts and span the contemporary methods such as cell phone data tapping and drone surveillance.
The paper will discuss in detail the technology behind the surveillance techniques and how it is used in law enforcement investigations. The paper will discuss the law enforcement entities that currently use or have access to the new surveillance technologies and how they are utilized on a routine basis for diurnal law enforcement operations such as criminal intelligence, as well as specific criminal offenses. The paper will cover how the use of technology is determined and what can be admissible in the judicial system, as well as how the law enforcement may use the information gathered from the higher technological surveillance.
The term paper will also discuss landmark cases of surveillance technology and how they apply to constitutional rights of U.S. citizens, such as the United States versus Jones which detailed the unreasonable use of GPS tracking by law enforcement, and the U.S. Patriot Act controversial reform that expressed serious civil liberty violations.