32 resultados para Illinois Local Governmental Law Enforcement Officers Training Board

em Digital Commons at Florida International University


Relevância:

100.00% 100.00%

Publicador:

Resumo:

In the wake of the “9-11” terrorists' attacks, the U.S. Government has turned to information technology (IT) to address a lack of information sharing among law enforcement agencies. This research determined if and how information-sharing technology helps law enforcement by examining the differences in perception of the value of IT between law enforcement officers who have access to automated regional information sharing and those who do not. It also examined the effect of potential intervening variables such as user characteristics, training, and experience, on the officers' evaluation of IT. The sample was limited to 588 officers from two sheriff's offices; one of them (the study group) uses information sharing technology, the other (the comparison group) does not. Triangulated methodologies included surveys, interviews, direct observation, and a review of agency records. Data analysis involved the following statistical methods: descriptive statistics, Chi-Square, factor analysis, principal component analysis, Cronbach's Alpha, Mann-Whitney tests, analysis of variance (ANOVA), and Scheffe' post hoc analysis. ^ Results indicated a significant difference between groups: the study group perceived information sharing technology as being a greater factor in solving crime and in increasing officer productivity. The study group was more satisfied with the data available to it. As to the number of arrests made, information sharing technology did not make a difference. Analysis of the potential intervening variables revealed several remarkable results. The presence of a strong performance management imperative (in the comparison sheriff's office) appeared to be a factor in case clearances and arrests, technology notwithstanding. As to the influence of user characteristics, level of education did not influence a user's satisfaction with technology, but user-satisfaction scores differed significantly among years of experience as a law enforcement officer and the amount of computer training, suggesting a significant but weak relationship. ^ Therefore, this study finds that information sharing technology assists law enforcement officers in doing their jobs. It also suggests that other variables such as computer training, experience, and management climate should be accounted for when assessing the impact of information technology. ^

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This phenomenological study explored Black male law enforcement officers' perspectives of how racial profiling shaped their decisions to explore and commit to a law enforcement career. Criterion and snow ball sampling was used to obtain the 17 participants for this study. Super's (1990) archway model was used as the theoretical framework. The archway model "is designed to bring out the segmented but unified and developmental nature of career development, to highlight the segments, and to make their origin clear" (Super, 1990, p. 201). Interview data were analyzed using inductive, deductive, and comparative analyses. Three themes emerged from the inductive analysis of the data: (a) color and/or race does matter, (b) putting on the badge, and (c) too black to be blue and too blue to be black. The deductive analysis used a priori coding that was based on Super's (1990) archway model. The deductive analysis revealed the participants' career exploration was influenced by their knowledge of racial profiling and how others view them. The comparative analysis between the inductive themes and deductive findings found the theme "color and/or race does matter" was present in the relationships between and within all segments of Super's (1990) model. The comparative analysis also revealed an expanded notion of self-concept for Black males – marginalized and/or oppressed individuals. Self-concepts, "such as self-efficacy, self-esteem, and role self-concepts, being combinations of traits ascribed to oneself" (Super, 1990, p. 202) do not completely address the self-concept of marginalized and/or oppressed individuals. The self-concept of marginalized and/or oppressed individuals is self-efficacy, self-esteem, traits ascribed to oneself expanded by their awareness of how others view them. (DuBois, 1995; Freire, 1970; Sheared, 1990; Super, 1990; Young, 1990). Ultimately, self-concept is utilized to make career and life decisions. Current human resource policies and practices do not take into consideration that negative police contact could be the result of racial profiling. Current human resource hiring guidelines penalize individuals who have had negative police contact. Therefore, racial profiling is a discriminatory act that can effectively circumvent U.S. Equal Employment Opportunities Commission laws and serve as a boundary mechanism to employment (Rocco & Gallagher, 2004).

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This phenomenological study explored Black male law enforcement officers’ perspectives of how racial profiling shaped their decisions to explore and commit to a law enforcement career. Criterion and snow ball sampling was used to obtain the 17 participants for this study. Super’s (1990) archway model was used as the theoretical framework. The archway model “is designed to bring out the segmented but unified and developmental nature of career development, to highlight the segments, and to make their origin clear” (Super, 1990, p. 201). Interview data were analyzed using inductive, deductive, and comparative analyses. Three themes emerged from the inductive analysis of the data: (a) color and/or race does matter, (b) putting on the badge, and (c) too black to be blue and too blue to be black. The deductive analysis used a priori coding that was based on Super’s (1990) archway model. The deductive analysis revealed the participants’ career exploration was influenced by their knowledge of racial profiling and how others view them. The comparative analysis between the inductive themes and deductive findings found the theme “color and/or race does matter” was present in the relationships between and within all segments of Super’s (1990) model. The comparative analysis also revealed an expanded notion of self-concept for Black males – marginalized and/or oppressed individuals. Self-concepts, “such as self-efficacy, self-esteem, and role self-concepts, being combinations of traits ascribed to oneself” (Super, 1990, p. 202) do not completely address the self-concept of marginalized and/or oppressed individuals. The self-concept of marginalized and/or oppressed individuals is self-efficacy, self-esteem, traits ascribed to oneself expanded by their awareness of how others view them. (DuBois, 1995; Freire, 1970; Sheared, 1990; Super, 1990; Young, 1990). Ultimately, self-concept is utilized to make career and life decisions. Current human resource policies and practices do not take into consideration that negative police contact could be the result of racial profiling. Current human resource hiring guidelines penalize individuals who have had negative police contact. Therefore, racial profiling is a discriminatory act that can effectively circumvent U.S. Equal Employment Opportunities Commission laws and serve as a boundary mechanism to employment (Rocco & Gallagher, 2004).

Relevância:

100.00% 100.00%

Publicador:

Resumo:

In response to a crime epidemic afflicting Latin America since the early 1990s, several countries in the region have resorted to using heavy-force police or military units to physically retake territories de facto controlled by non-State criminal or insurgent groups. After a period of territory control, the heavy forces hand law enforcement functions in the retaken territories to regular police officers, with the hope that the territories and their populations will remain under the control of the state. To a varying degree, intensity, and consistency, Brazil, Colombia, Mexico, and Jamaica have adopted such policies since the mid-1990s. During such operations, governments need to pursue two interrelated objectives: to better establish the state’s physical presence and to realign the allegiance of the population in those areas toward the state and away from the non-State criminal entities. From the perspective of law enforcement, such operations entail several critical decisions and junctions, such as: Whether or not to announce the force insertion in advance. The decision trades off the element of surprise and the ability to capture key leaders of the criminal organizations against the ability to minimize civilian casualties and force levels. The latter, however, may allow criminals to go to ground and escape capture. Governments thus must decide whether they merely seek to displace criminal groups to other areas or maximize their decapitation capacity. Intelligence flows rarely come from the population. Often, rival criminal groups are the best source of intelligence. However, cooperation between the State and such groups that goes beyond using vetted intelligence provided by the groups, such as a State tolerance for militias, compromises the rule-of-law integrity of the State and ultimately can eviscerate even public safety gains. Sustaining security after initial clearing operations is at times even more challenging than conducting the initial operations. Although unlike the heavy forces, traditional police forces, especially if designed as community police, have the capacity to develop trust of the community and ultimately focus on crime prevention, developing such trust often takes a long time. To develop the community’s trust, regular police forces need to conduct frequent on-foot patrols with intensive nonthreatening interactions with the population and minimize the use of force. Moreover, sufficiently robust patrol units need to be placed in designated beats for substantial amount of time, often at least over a year. Establishing oversight mechanisms, including joint police-citizens’ boards, further facilities building trust in the police among the community. After disruption of the established criminal order, street crime often significantly rises and both the heavy-force and community-police units often struggle to contain it. The increase in street crime alienates the population of the retaken territory from the State. Thus developing a capacity to address street crime is critical. Moreover, the community police units tend to be vulnerable (especially initially) to efforts by displaced criminals to reoccupy the cleared territories. Losing a cleared territory back to criminal groups is extremely costly in terms of losing any established trust and being able to recover it. Rather than operating on a priori determined handover schedule, a careful assessment of the relative strength of regular police and criminal groups post-clearing operations is likely to be a better guide for timing the handover from heavy forces to regular police units. Cleared territories often experience not only a peace dividend, but also a peace deficit – in the rise new serious crime (in addition to street crime). Newly – valuable land and other previously-inaccessible resources can lead to land speculation and forced displacement; various other forms of new crime can also significantly rise. Community police forces often struggle to cope with such crime, especially as it is frequently linked to legal business. Such new crime often receives little to no attention in the design of the operations to retake territories from criminal groups. But without developing an effective response to such new crime, the public safety gains of the clearing operations can be altogether lost.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Valuing Polyrhythmic Realities and Critical Theories, specifically Critical Race Theory, is facilitated by Interdisciplinary inquiry. Racial Profiling will be utilized to demonstrate how acknowledging the lived experiences of individuals and viewing situations from the oppressed viewpoint will positively impact the number of Blacks in law enforcement.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Faced with the violence, criminality and insecurity now threatening peace and democratic governance in Central America, the region’s governments have decided to use the Armed Forces to carry out actions in response to criminal actions, looking to improve their performance. Although public demand for including the Armed Forces in these functions takes place within a legally legitimate framework, it is motivated by tangible circumstances such as increased levels of violence, delinquency and crime. Despite being coupled with the perception of institutional weakness within the security and judicial system (particularly police) and the recognition of prestige, efficiency, discipline and severity in fulfilling the Armed Forces’ missions, these arguments are insufficient to legitimize the use of the military as a police force. Within this context, this paper reflects on the implications or consequences of the use of the Armed Forces in duties traditionally assigned to the police in the Central American region with the goal of contributing to the debate on this topic taking place in the Americas. To achieve this end, first we will focus on understanding the actual context in which a decision is made to involve the Armed Forces in security duties in the region. Second, we will examine the effects and implications of this decision on the Armed Forces’ relations within their respective societies. Third and finally, considering this is already a reality in the region, this paper will provide recommendations. The main findings of this research, resulting from the application of an analyticaldescriptive and historically based study, are organized in three dimensions: the political dimension, by implication referring to the relationship between the ultimate political authority and the Armed Forces; the social dimension, by implication the opinion of citizens; and other implications not only affecting the structural and cultural organization of armies and police but also the complementary operational framework within a context of comprehensive response by the State. As a main conclusion, it poses there is an environment conducive to the use of the Armed Forces in citizen’s security, in view of the impact of threats provoked by criminal structures of a military nature currently operating in Central America. However, this participation creates an inevitable social and political impact if implemented in isolation or given a political leading role and/or operational autonomy. This participation poses risks to the institutions of the Armed Forces and the police as well. Finally, this paper identifies an urgent need for the Armed Forces’ role to be more clearly defined with regard to security matters, limiting it to threats that impact States’ governability and existence. Nonetheless, Central American States should seek a COMPREHENSIVE response to current crime and violence, using all necessary institutions to confront these challenges, but with defined roles and responsibilities for each and dynamic coordination to complement their actions.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The purpose of this research was to study the nutritional status of United States Coast Guard Law Enforcement Detachment (USCG/ LEDET) personnel before and after prolonged travel at sea. To date there is no information available regarding the nutritional status of Coast Guard personnel. Forty-seven subjects were studied in total, each served as their own control. Demographic and health history data was collected at baseline. Dietary and exercise data was collected before and during the deployment. Body composition was determined before and after a deployment. The results of this study revealed that the USCG/LEDET personnel had high cholesterol and decreased fiber intakes. Cholesterol intake during deployment (516.8±239.7 mg/day) was significantly higher (p= 0. 047) than pre-deployment (448.2 ± 144.3 mg/day). Fiber intake was significantly lower than recommended (p The results of this study indicate that LEDET personnel are put at higher nutritional risk while deployed and also have increased negative health behaviors associated with risk for Cardiovascular Disease (CVD) and other related diseases. This is crucial information for the USCG so that action can be taken to improve the physical well being of their personnel.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This study examined the construct validity of the Choices questionnaire that purported to support the theory of Learning Agility. Specifically, Learning Agility attempts to predict an individual's potential performance in new tasks. The construct validity will be measured by examining the convergent/discriminant validity of the Choices Questionnaire against a cognitive ability measure and two personality measures. The Choices Questionnaire did tap a construct that is unique to the cognitive ability and the personality measures, thus suggesting that this measure may have considerable value in personnel selection. This study also examined the relationship of this pew measure to job performance and job promotability. Results of this study found that the Choices Questionnaire predicted job performance and job promotability above and beyond cognitive ability and personality. Data from 107 law enforcement officers, along with two of their co-workers and a supervisor resulted in a correlation of .08 between Learning Agility and cognitive ability. Learning Agility correlated .07 with Learning Goal Orientation and. 17 with Performance Goal Orientation. Correlations with the Big Five Personality factors ranged from −.06 to. 13 with Conscientiousness and Openness to Experience, respectively. Learning Agility correlated .40 with supervisory ratings of job promotability and correlated .3 7 with supervisory ratings of overall job performance. Hierarchical regression analysis found incremental validity for Learning Agility over cognitive ability and the Big Five factors of personality for supervisory ratings of both promotability and overall job performance. A literature review was completed to integrate the Learning Agility construct into a nomological net of personnel selection research. Additionally, practical applications and future research directions are discussed. ^

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Human scent and human remains detection canines are used to locate living or deceased humans under many circumstances. Human scent canines locate individual humans on the basis of their unique scent profile, while human remains detection canines locate the general scent of decomposing human remains. Scent evidence is often collected by law enforcement agencies using a Scent Transfer Unit, a dynamic headspace concentration device. The goals of this research were to evaluate the STU-100 for the collection of human scent samples, and to apply this method to the collection of living and deceased human samples, and to the creation of canine training aids. The airflow rate and collection material used with the STU-100 were evaluated using a novel scent delivery method. Controlled Odor Mimic Permeation Systems were created containing representative standard compounds delivered at known rates, improving the reproducibility of optimization experiments. Flow rates and collection materials were compared. Higher air flow rates usually yielded significantly less total volatile compounds due to compound breakthrough through the collection material. Collection from polymer and cellulose-based materials demonstrated that the molecular backbone of the material is a factor in the trapping and releasing of compounds. The weave of the material also affects compound collection, as those materials with a tighter weave demonstrated enhanced collection efficiencies. Using the optimized method, volatiles were efficiently collected from living and deceased humans. Replicates of the living human samples showed good reproducibility; however, the odor profiles from individuals were not always distinguishable from one another. Analysis of the human remains samples revealed similarity in the type and ratio of compounds. Two types of prototype training aids were developed utilizing combinations of pure compounds as well as volatiles from actual human samples concentrated onto sorbents, which were subsequently used in field tests. The pseudo scent aids had moderate success in field tests, and the Odor pad aids had significant success. This research demonstrates that the STU-100 is a valuable tool for dog handlers and as a field instrument; however, modifications are warranted in order to improve its performance as a method for instrumental detection.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The use of canines as a method of detection of explosives is well established worldwide and those applying this technology range from police forces and law enforcement to humanitarian agencies in the developing world. Despite the recent surge in publication of novel instrumental sensors for explosives detection, canines are still regarded by many to be the most effective real-time field method of explosives detection. However, unlike instrumental methods, currently it is difficult to determine detection levels, perform calibration of the canines' ability or produce scientifically valid quality control checks. Accordingly, amongst increasingly strict requirements regarding forensic evidence admission such as Frye and Daubert, there is a need for better scientific understanding of the process of canine detection. ^ When translated to the field of canine detection, just like any instrumental technique, peer reviewed publication of the reliability, success and error rates, is required for admissibility. Commonly training is focussed towards high explosives such as TNT and Composition 4, and the low explosives such as Black and Smokeless Powders are added often only for completeness. ^ Headspace analyses of explosive samples, performed by Solid Phase Microextraction (SPME) paired with Gas Chromatography - Mass Spectrometry (GC-MS), and Gas Chromatography - Electron Capture Detection (GC-ECD) was conducted, highlighting common odour chemicals. The odour chemicals detected were then presented to previously trained and certified explosives detection canines, and the activity/inactivity of the odour determined through field trials and experiments. ^ It was demonstrated that TNT and cast explosives share a common odour signature, and the same may be said for plasticized explosives such as Composition C-4 and Deta Sheet. Conversely, smokeless powders were demonstrated not to share common odours. An evaluation of the effectiveness of commercially available pseudo aids reported limited success. The implications of the explosive odour studies upon canine training then led to the development of novel inert training aids based upon the active odours determined. ^

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This study examines some concerns that derive from Suriname‘s May-July 2010 elections, which resulted in the re-emergence of erstwhile military ruler and convicted drug trafficker, Désiré (Desi) Bouterse, as President of the Republic. The victory reflects Bouterse‘s political acumen in aggregating disparate political interests and in establishing a viable coalition government. But because of his history and profile, this triumph has generated anxiety in some places internationally. In this respect, the study examines anxieties related to three matters: (a) relations with Guyana, where there is an existing territorial dispute and a recently resolved maritime dispute, (b) illegal drug trafficking operations, and (c) foreign policy engagement with Venezuela. There has been a flurry of bilateral activities—including several presidential summits—with Guyana since President Bouterse‘s inauguration, albeit seemingly more about symbolism than substance. Although the maritime dispute was settled by a Tribunal of the United Nations Convention of the Law of the Sea in 2007, the 15,000 km2 New River Triangle is still unresolved. Indeed, in June 2011 President Bouterse reasserted Suriname‘s claim to the Triangle. Suriname has upped the ante in that dispute by portraying internationally the map of Suriname as inclusive of the disputed area. In all likelihood that self-redefinition slowly will become the country‘s cartographic definition in the eyes of the world if Guyana does not successfully rebuff that move or pursue the definitive settlement of the dispute. A geonarcotics assessment shows Suriname to be still heavily implicated in trafficking, because of geography, law enforcement limitations, corruption, and other factors. But despite Bouterse‘s drug-related history and that of former senior military officers, several reasons suggest the inexpediency of a narco-state being created by Bouterse. As well, as part of Suriname‘s pursuit of increased Caribbean and South American engagement, it has boosted relations with Venezuela, which has included it in PetroCaribe and provided housing and agricultural aid. However, the engagement appears to be driven more by pragmatism and less by any ideological affinity with Hugo Chavez.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Small states that lack capacity and act on their own may fall victim to international and domestic terrorism, transnational organized crime or criminal gangs. The critical issue is not whether small Caribbean states should cooperate in meeting security challenges, but it is rather in what manner, and by which mechanisms can they overcome obstacles in the way of cooperation. The remit of the Regional Security System (RSS) has expanded dramatically, but its capabilities have improved very slowly. The member governments of the RSS are reluctant to develop military capacity beyond current levels since they see economic and social development and disaster relief as priorities, requiring little investment in military hardware. The RSS depends on international donors such as the USA, Canada, Great Britain, and increasingly China to fund training programs, maintain equipment and acquire material. In the view of most analysts, an expanded regional arrangement based on an RSS nucleus is not likely in the foreseeable future. Regional political consensus remains elusive and the predominance of national interests over regional considerations continues to serve as an obstacle to any CARICOM wide regional defense mechanism. Countries in the Caribbean, including the members of the RSS, have to become more responsible for their own security from their own resources. While larger CARICOM economies can do this, it would be difficult for most OECS members of the RSS to do the same. The CARICOM region including the RSS member countries, have undertaken direct regional initiatives in security collaboration. Implementation of the recommendations of the Regional Task Force on Crime and Security (RTFCS) and the structure and mechanisms created for the staging of the Cricket World Cup (CWC 2007) resulted in unprecedented levels of cooperation and permanent legacy institutions for the regional security toolbox. The most important tier of security relationships for the region is the United States and particularly USSOUTHCOM. The Caribbean Basin Security Initiative [CBSI] in which the countries of the RSS participate is a useful U.S. sponsored tool to strengthen the capabilities of the Caribbean countries and promote regional ownership of security initiatives. Future developments under discussion by policy makers in the Caribbean security environment include the granting of law enforcement authority to the military, the formation of a single OECS Police Force, and the creation of a single judicial and law enforcement space. The RSS must continue to work with its CARICOM partners, as well as with the traditional “Atlantic Powers” particularly Canada, the United States and the United Kingdom to implement a general framework for regional security collaboration. Regional security cooperation should embrace wider traditional and non-traditional elements of security appropriate to the 21st century. Security cooperation must utilize to the maximum the best available institutions, mechanisms, techniques and procedures already available in the region. The objective should not be the creation of new agencies but rather the generation of new resources to take effective operations to higher cumulative levels. Security and non-security tools should be combined for both strategic and operational purposes. Regional, hemispheric, and global implications of tactical and operational actions must be understood and appreciated by the forces of the RSS member states. The structure and mechanisms, created for the staging of Cricket World Cup 2007 should remain as legacy institutions and a toolbox for improving regional security cooperation in the Caribbean. RSS collaboration should build on the process of operational level synergies with traditional military partners. In this context, the United States must be a true partner with shared interests, and with the ability to work unobtrusively in a nationalistic environment. Withdrawal of U.S. support for the RSS is not an option.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Individual cues to deception are subtle and often missed by lay people and law enforcement alike. Linguistic statement analysis remains a potentially useful way of overcoming individual diagnostic limitations (e.g. Criteria based Content Analysis; Steller & Köhnken, 1989; Reality monitoring; Johnson & Raye, 1981; Scientific Content Analysis; Sapir, 1996). Unfortunately many of these procedures are time-consuming, require in-depth training, as well as lack empirical support and/or external validity. The current dissertation develops a novel approach to statement veracity analysis that is simple to learn, easy to administer, theoretically sound, and empirically validated. Two strategies were proposed for detecting differences between liars' and truth-tellers' statements. Liars were hypothesized to strategically write statements with the goal of self-exoneration. Liars' statements were predicted to contain more first person pronouns and fewer third person pronouns. Truth-tellers were hypothesized to be motivated toward being informative and thus produce statements with fewer first person pronouns and more third person pronouns. Three studies were conducted to test this hypothesis. The first study explored the verbal patterns of exoneration and informativeness focused statements. The second study used a traditional theft paradigm to examine these verbal patterns in guilty liars and innocent truth tellers. In the third study to better match the context of a criminal investigation a cheating paradigm was used in which spontaneous lying was induced and written statements were taken. Support for the first person pronoun hypothesis was found. Limited support was found for the third person pronoun hypothesis. Results, implications, and future directions for the current research are discussed.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Individual cues to deception are subtle and often missed by lay people and law enforcement alike. Linguistic statement analysis remains a potentially useful way of overcoming individual diagnostic limitations (e.g. Criteria based Content Analysis; Steller & Köhnken, 1989; Reality monitoring; Johnson & Raye, 1981; Scientific Content Analysis; Sapir, 1996). Unfortunately many of these procedures are time-consuming, require in-depth training, as well as lack empirical support and/or external validity. The current dissertation develops a novel approach to statement veracity analysis that is simple to learn, easy to administer, theoretically sound, and empirically validated. ^ Two strategies were proposed for detecting differences between liars' and truth-tellers' statements. Liars were hypothesized to strategically write statements with the goal of self-exoneration. Liars' statements were predicted to contain more first person pronouns and fewer third person pronouns. Truth-tellers were hypothesized to be motivated toward being informative and thus produce statements with fewer first person pronouns and more third person pronouns. Three studies were conducted to test this hypothesis. The first study explored the verbal patterns of exoneration and informativeness focused statements. The second study used a traditional theft paradigm to examine these verbal patterns in guilty liars and innocent truth tellers. In the third study to better match the context of a criminal investigation a cheating paradigm was used in which spontaneous lying was induced and written statements were taken. Support for the first person pronoun hypothesis was found. Limited support was found for the third person pronoun hypothesis. Results, implications, and future directions for the current research are discussed.^

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Adaptability and invisibility are hallmarks of modern terrorism, and keeping pace with its dynamic nature presents a serious challenge for societies throughout the world. Innovations in computer science have incorporated applied mathematics to develop a wide array of predictive models to support the variety of approaches to counterterrorism. Predictive models are usually designed to forecast the location of attacks. Although this may protect individual structures or locations, it does not reduce the threat—it merely changes the target. While predictive models dedicated to events or social relationships receive much attention where the mathematical and social science communities intersect, models dedicated to terrorist locations such as safe-houses (rather than their targets or training sites) are rare and possibly nonexistent. At the time of this research, there were no publically available models designed to predict locations where violent extremists are likely to reside. This research uses France as a case study to present a complex systems model that incorporates multiple quantitative, qualitative and geospatial variables that differ in terms of scale, weight, and type. Though many of these variables are recognized by specialists in security studies, there remains controversy with respect to their relative importance, degree of interaction, and interdependence. Additionally, some of the variables proposed in this research are not generally recognized as drivers, yet they warrant examination based on their potential role within a complex system. This research tested multiple regression models and determined that geographically-weighted regression analysis produced the most accurate result to accommodate non-stationary coefficient behavior, demonstrating that geographic variables are critical to understanding and predicting the phenomenon of terrorism. This dissertation presents a flexible prototypical model that can be refined and applied to other regions to inform stakeholders such as policy-makers and law enforcement in their efforts to improve national security and enhance quality-of-life.