Advanced search Help
Resource Type or Special Collection is Theses & Research Reports
Format is pdf
Clear all search criteria
Only 2/3! You are seeing results from the Public Collection, not the complete Full Collection. Sign in to search everything (see eligibility).
-
Air Sampling Sensors, the Open Skies Treaty, and Verifying the Chemical Weapons Convention
This thesis examines a novel proposal to join two separate arms control measures to achieve unique counterproliferation benefits. The Open Skies Treaty (OST) is a confidence-building measure between the states of NATO and the former Warsaw Pact. It allows aircraft equipped with sensors to overfly neighboring countries to monitor security-related activities. The Chemical Weapons Convention (CWC) attempts to eliminate an entire category of weapons of mass destruction. It is verified through reporting procedures and on-site inspections. OST overflights could be used to verify the CWC, aiding CWC inspectors to plan their inspections. This cross-treaty measure could be enhanced further with the addition of air sampling sensors capable of testing for chemical weapons production, creating inter-treaty synergy. Once these two pacts enter into force and prove their efficacy for arms control, this proposal for inter-treaty coordination will receive more attention. Obstacles for this inter-treaty coordination include the lack of formal mechanisms in either treaty for a complementary role and the lack of political impetus to effect it. This coordination is a logical progression for arms control.
Naval Postgraduate School (U.S.)
Rowe, Gregory D.
1995-12
-
FBI and Domestic Counterterrorism: A Comparative Analysis
This thesis is an attempt to analyze the effectiveness of the Federal Bureau of Investigation (FBI) in countering domestic terrorism in comparison to other democracies. in the first chapter, there is an attempt to define terrorism by examining the historical development and early attempts at defining terrorism. The second chapter describes the history of the FBI and its early battles with domestic terrorists, including infringements up constitutional rights. The third chapter relates Israel's problems with domestic terrorism by outlining the professional development and tragic errors of the Shin Bet (Israel's domestic security service). Great Britain's attempts to crush the Irish Republican Army are the subject of the fourth chapter. The fifth chapter concludes by demonstrating that each country has sought to eliminate domestic terrorism but no matter what method is used; eventually, they are forced to negotiate with the terrorists.
Naval Postgraduate School (U.S.)
Fears, Karla P.
1995-12
-
Strategic Plans, Joint Doctrine and Antipodean Insights
From the thesis abstract: "This is the second in an analytical series on joint issues. It follows the authors' U.S. Department of Defense Strategic Planning: The Missing Nexus, in which they articulated the need for more formal joint strategic plans. This essay examines the effect such plans would have on joint doctrine development and illustrates the potential benefits evident in Australian defense planning. Doctrine and planning share an iterative development process. The common view is that doctrine persists over a broader time frame than planning and that the latter draws on the former for context, syntax, even format. In truth the very process of planning shapes new ways of military action. As the environment for that action changes, planners address new challenges, and create the demand for better methods of organizing, employing and supporting forces. Evolutionary, occasionally revolutionary, doctrinal changes result. The authors of this monograph explore the relationship between strategic planning and doctrine at the joint level. They enter the current debate over the scope and authority of joint doctrine from a joint strategic planning perspective. In their view, joint doctrine must have roots, and those roots have to be planted firmly in the strategic concepts and plans developed to carry out the National Military Strategy. Without the fertile groundwork of strategic plans, the body of joint doctrine will struggle for viability."
Army War College (U.S.). Strategic Studies Institute
Lovelace, Douglas C.; Young, Thomas-Durell
1995-10-20
-
Employment of Indications and Warning Intelligence Methods to Forecast a Potentially Hostile Revolution in Military Affairs
From the thesis abstract: "The basic premise of a Revolution in Military Affairs [RMA] is that changes in technology doctrine, and organization have the ability to render existing methods of warfare obsolete. Two distinct visions of a future RMA are beginning to emerge within the defense community. The first involves the integration of precision guided munitions, and superior command, control, communications, computers, and intelligence (C4I) capabilities. The second vision is of information warfare. In this arena, the control and management of bits and bytes becomes more important than bullets. Because of the potential advantages gained from the realization of an RMA, it is imperative that the United States detects, and accurately evaluates, any efforts by a potential adversary to achieve a RMA - whatever form it may take. Indications and Warning (I & W) intelligence is a process used by the intelligence community to detect indicators of potential threats while sufficient time exists to counter those same threats. This thesis examines 'how' and 'why' technology, doctrine, and organizations change in order to develop indicators that can be used to detect an emerging RMA."
Naval Postgraduate School (U.S.)
Morgan, Brent A.
1995-09
-
U.S. Security Assistance to Latin America
From the thesis abstract: "The United States employs security assistance as an instrument of foreign policy. This thesis examines how security assistance was used to achieve U.S. foreign policy objectives in Latin America since the end of World War II. Qualitative analysis was used consisting of historical and archival research of government documents and secondary sources. A literature review was conducted to discover general trends concerning security assistance to include its establishment as an arm of foreign policy, its problems, and its purpose. Presidential policies toward Latin America are analyzed during and after World War II, to include Kennedy's Alliance for Progress, Nixon Doctrine, Carter's human rights policies, and the containment policies of Reagan. The histories of five Latin American countries are examined to specifically discover how the U.S. has used security assistance to achieve its foreign policy objectives. The countries examined are Argentina, Brazil, El Salvador, Guatemala, and Nicaragua. Findings concerning South American countries include a tendency for the U.S. to use security assistance as an incentive to reward democratic and pro-U.S. behaviors. Findings in Central America include the use of security assistance to fight internal subversion in an effort to maintain the status quo and deter communism."
Air Force Institute of Technology (U.S.)
Payne, Valerie S.
1995-09
-
Evaluation of the Appropriateness of the Defence Logistics Agency's Requirements Model
This thesis discusses the appropriateness of the Defense Logistics Agency's (DLA) requirements model in managing consumable support for Air Force specific items. Currently, DLA uses a lot sizing technique referred to as the classic Economic Order Quantity, (EOQ) model. One of the key assumptions of this model is that demand is constant and continuous. Yet with Air Force bases using a lot sizing technique to place their demands for consumable items to DLA, it is apparent that the demand pattern that DLA faces, at least for Air Force specific items, is not constant and continuous. This study looks at the impact of violations of the constant and continuous demand assumption on DLA's ability to support its customers. The findings of this study highlight the fact that the EOQ model does not perform well under the lumpy demand patterns that DLA faces. In addition, the Silver-Meal algorithm was used as a comparison to see if other inventory models could better handle this lumpy demand pattern. The Silver-Meal model required fewer inventories on hand and at a lower total variable cost than the EOQ model DLA is currently using.
Air Force Institute of Technology (U.S.)
Berry, Harry A.; Tatge, Edward E.
1995-09
-
Security Issues in the Telecommunications Plan for CALS Implementation in Korea
"Continuous Acquisition and Life-cycle Support (CALS) is an evolving strategy designed to take defense information from its current paper-intensive form to a totally electronic mode of operation by means of information integration and automation. To take full advantage of CALS, it is essential to accommodate distributed CALS computer networks, and to enable the interconnection of selected heterogeneous components in the networks. However, as CALS telecommunications deals with multi-level security data, it is critical to incorporate adequate security plans into the telecommunication plan. This thesis analyzes the requirements for a secure telecommunications plan that includes telecommunications standards and protocols, data exchange protocols, transmission media, and methods of network security necessary to implement CALS in the Korea defense environment. Literature reviews and expert interviews are used to support findings and conclusions. To accomplish a fully digitized CALS environment, the author concludes that proper data protection standards and methods must be provided and tested as part of the overall CALS telecommunications architecture. Enabling technology and a responsive management infrastructure must be in place to ensure successful implementation of CALS. The decision to select mechanisms should be made based on the comparison between security and integrity, in terms of efficiency, effectiveness, and availability."
Naval Postgraduate School (U.S.)
Bae, Kichan
1995-09
-
Facing a Nuclear Armed Adversary in a Regional Contingency: Implications for the Joint Commander
From the thesis abstract: "Among the many challenges facing the United States military in the post-Cold War world, none would be more difficult or complex than facing a nuclear armed adversary in a regional contingency. One need only read today's headlines to acknowledge the validity of this threat and to contemplate the awesome responsibilities and risks that would be borne by a joint commander tasked to engage such an adversary. Despite years of experience conducting conventional operations and planning for Cold War nuclear contingencies, the nature of the new threat coupled with the unique destructive power and political implications of nuclear weapons will pose problems whose synergistic affect on the campaign is not yet clearly understood, and for which the commander is unprepared. The possibility of nuclear use will complicate campaign planning, affect course of action development and selection, and alter conventional war fighting doctrine and operations. The time is now for joint commanders to seriously consider and prepare for the nasty business of engaging a nuclear-armed regional adversary. Presidential tasking and deterrence credibility demand it."
Naval War College (U.S.). Joint Military Operations Department
Kehler, C. Robert (Claude Robert), 1952-
1995-06-16
-
Special Forces Missions: A Return to the Roots for a Vision of the Future
From the thesis abstract: "This study traces the development of Special Forces (SF) missions from the OSS [Office of Strategic Services] in 1944 to the present to determine how the doctrinal missions evolved. Five specific operations/events are examined; including the Jedburghs and Operational Groups in France, Unconventional Warfare during the Korean War, Operation White Star in Laos, Special Forces conduct of the CIDG [Civilian Irregular Defense Group] program and its participation in MACV-SOG [Military Assistance Command, Vietnam - Studies and Observations Group] during the Vietnam War, and SF operations in the Dominican Republic. The possible characteristics of conflict in the Post Cold War World are established. These characteristics are compared with the five specific operations examined to determine the likenesses and differences among them, as well as lessons learned that will have application for future Special Forces training. The study concludes that because the Post Cold War World will be characterized by chaos and uncertainty, SF requires the broadest training possible. It should focus on two missions and all others should become collateral activities. The wartime mission should be Unconventional Warfare and the peacetime mission should be Unconventional Operations. Training for these missions provides flexible, language capable, culturally aware, highly skilled, and disciplined soldiers that will meet the requirements across the spectrum of conflict."
U.S. Army Command and General Staff College
Maxwell, David S.
1995-06-02
-
Effect on Operational and Tactical Surprise by U.S. Military Forces Due to the Proliferation of Unclassified Satellite Imaging Systems
From the thesis abstract: "This study investigates the ability of U.S. military forces to maintain surprise over the next five years, in view of the highly capable unclassified satellite imaging systems available soon. These systems, developed for a broad range of scientific, commercial, civil, and media applications, will have the potential to provide space-based imagery of ongoing U.S. military operations. The U.S. may no longer maintain the element of surprise that is held so dearly in its doctrine. The study uses three types of research methodology to analyze the problem: case studies, measurement research, and relationship research. The study examines the importance of surprise during three operations: El Dorado Canyon, Just Cause, and Desert Storm. This study systematically and speculatively determines if several programmed and proposed commercial satellite imaging systems have the quality, timeliness, and accessibility to defeat military surprise and examines the potential countereffects of policy, diplomacy, and passive and active countermeasures. The study's conclusion is that the U.S. can defeat these electro-optic imaging systems during mostly military operations using unilateral methods, such as deception, concealment, and night operations."
U.S. Army Command and General Staff College
Swedberg, Edwin C.
1995-06-02
-
Cuba After Castro: What Military Forces Will be Necessary to Execute U.S. Policy?
From the thesis abstract: "This thesis analyzes the current situation and scenarios for future events in Cuba. It looks at current U.S. diplomatic and economic policies and their effects on future developments within Cuba. The thesis investigates possible U.S. objectives in Cuba, after the current regime departs, and derives possible U.S Armed Forces missions to support U.S. objectives. Finally, it proposes potential U.S. forces' composition and organization to execute U.S. policy. The thesis concludes that there are two possible scenarios for U.S. Armed Forces involvement in Cuba. One is an 'intrusive humanitarian relief and nation assistance operation,' and the other a permissive involvement based on an arrangement or agreement with a Cuban Transitional Unity Government or faction involvement in a Cuban civil war. To truly be successful in Cuba any intervention must be combined, interagency, and joint. In both scenarios a combination of Special Operations Forces and Conventional Forces under a Joint Task Force including civil agencies for interagency and intergovernmental coordination should be deployed."
U.S. Army Command and General Staff College
Rose, Michael S.
1995-06-02
-
U.S. National Security Strategy in Southeast Asia: A Reappraisal
From the thesis abstract: "The United States found itself at the end of the Cold War with a predominately military national security strategy that has been less relevant in coping with the residue of the bi-polar world. Furthermore, the general diffusion of power in the international system from military capability towards economic might highlights the need for a general reappraisal of U.S. interests, objectives, and strategy. This thesis begins with a definition of global U.S. national interests and then defines the specific objectives of the national strategy as applied to the Asia-Pacific region and Southeast Asia. In following chapters, it analyzes the security environment of Southeast Asia, the enduring and developing conflicts within the region and with external powers, as well as mechanisms for conflict resolution. Finally, it asks whether official U.S. strategy adequately promotes and protects the national interests of the United States. It concludes that the current U.S. national security strategy of 'engagement and enlargement' is flawed and must not confuse the national interests, such as the survival of the United States and its prosperity, or put international relationships at risk for the sake of national values, such as the promotion of democracy and human rights abroad. It supports continued 'engagement' as a basic strategy without the emphasis on 'enlargement' of a particular system of values as perceived by the Americans."
Naval Postgraduate School (U.S.)
Freeseman, Douglas D.
1995-06
-
Muslim Secessionist Movement in the Philippines: Issues and Prospects
From the thesis abstract: "The Muslim Secessionist Movement in Southern Philippines was for a time the most serious threat to the stability of the country. It had its beginnings in the late 1960s with the formation of the Muslim Independence Movement In the 1970s, the Moro National Liberation Front emerged as the lead secessionist organization. Through its military arm, the Bangsa Moro Army, the MNLF [Moro National Liberation Front] waged a furious war against central authority. The objective of the MNLF is to establish a separate state comprising the islands of Mindanao, Basilan, Sulu, Tawi-Tawi and Palawan. The hostilities reached its peak in the mid 70s when the MNLF received foreign support from Libya and Sabah. The Marcos administration used a combination of military, socioeconomic development and diplomatic means to try to resolve the Muslim problem. Through the intercession of the Organization of Islamic Conference, peace negotiations between the government and the MNLF resulted in the signing of the Tripoli Agreement in 1976. A divergent interpretation of the autonomy issue caused a breakdown in negotiations and a resumption of hostilities. Corazon Aquino assumed the presidency after the February 1986 revolution. Her meeting with Nur Misuari, the MNLF Chairman, resulted in a ceasefire agreement in 1986. The peace negotiations however broke down because of rigid stand on both sides on the autonomy issue. The secessionist issue continues to be a daunting problem of the government in the 1990s. The government of President Ramos renewed peace negotiations with the MNLF. Spearheading the government reconciliation effort is the National Unification Commission. This thesis will examine the issues and prospects of the Secessionist Movement in Southern Philippines in light of the developments in the country and in the international scene."
Naval Postgraduate School (U.S.)
Domingo, Ruben G.
1995-06
-
Effects of Digital Avionics Systems on the Survivability of Modern Tactical Aircraft
From the thesis abstract: "Many modern tactical aircraft incorporate digital avonics systems with federated, centralized or distributed avionics architectures that share data via interconnecting data buses. The design of a digital avionics architecture has an impact on the combat survivability of the aircraft. Survivability in combat is defined as 'the capability of the aircraft to avoid and/or withstand a man-made hostile environment.' Survivability is made up of two elements; 1) susceptibility, the inability of the aircraft to avoid being damaged by the various elements of the man-made hostile environment, and 2) vulnerability, the ability of the aircraft to withstand the damage caused by the hostile environment. Thus, a tactical aircraft should be designed to avoid being hit and to survive if hit. This thesis explores the survivability advantages and disadvantages inherent in the design of digital avionics system architectures."
Naval Postgraduate School (U.S.)
Duym, Wade D.
1995-06
-
Fox Nuclear, Biological, and Chemical Reconnaissance System: Lessons-Learned from a Foreign Non-Developmental Item Acquisition
Non-developmental Item acquisitions represent a viable approach to meet procurement needs of the Defense Department. The reduced acquisition cycle times and resultant cost savings of this acquisition strategy presents significant potential benefits to DoD. One weapon system program that has successfully used such an NDI strategy is the U.S. Army's Fox Nuclear, Biological, and Chemical Reconnaissance System. This thesis examines the DoD acquisition process and how NDIs are used within the process. The thesis then examines the Fox Program and its NDI Acquisition strategy to determine what factors made the program successful. From this analysis, lessons-learned are identified that can be used by other acquisition managers and their staffs effectively to manage future NDI programs.
Naval Postgraduate School (U.S.)
Norris, James W.
1995-06
-
Motivations for Nuclear Terrorism in the United States
The demise of bipolarity created new security concerns for the United States. Terrorism now thrives in the new world environment. While much has been written on terrorism, the specter of nuclear terrorism in the United States has received little attention. Nuclear terrorism cannot be looked at through the traditional nuclear weapons paradigm nor can it be viewed within the confines
of traditional terrorism paradigm. There are currently two perspectives of nuclear terrorism: the optimists, who do not see it as a threat, and the pessimists, who see it as inevitable. Each view has its merits but neither alone can explain this security concern. Merging of the two views is required
to understand the motivational considerations behind this potentially horrific problem. A brief history of U.S. policies on nuclear weapons and terrorism is offered to explain why there has not been a U.S. policy on nuclear terrorism. A better understanding of the nuclear terrorist mindset is required if effective policies are to be developed.
Naval Postgraduate School (U.S.)
DiPaolo, Peter Joseph
1995-06
-
Japanese Maritime Defense Capability in the Post Cold War Era
"This thesis analyzes the defense capability of Japan Maritime Self-Defense Force (JMSDF) in the post-Cold War era. The primary research question is: 'What changes will and should be expected for JMSDF after the collapse of the former Soviet Union?' To answer this question, I reviewed the defense capability buildup program during Cold-War, and made briefly analyzed the relationships among the Asian- Pacific countries, including U.S. Pacific forces and Russia. I also conducted a cost/benefit and personnel analysis of the current fleet configuration and a proposed new configuration. These alternatives may require drastic changes in public attitudes based on serious discussions among the Japanese people and politicians, and a tighter Japan-U.S. relationship on both economic issues and national security burden sharing."
Naval Postgraduate School (U.S.)
Sakagami, Syojiro
1995-06
-
Competition and Conflict: Water Management in the Jordan River Basin
With the end of the Cold War, and the predictability of bi-polar power arrangements, the shape of global security will be required to change to face the emerging threats of the future. Changes to the global environment, through pollution, unrestrained population growth, and over-exploitation of existing resources, will be among these future threats. Regional security arrangements will be essential to controlling these threats, which know no territorial boundaries. It is the threat of conflict over water, in areas of scarce supply and surging populations, that forms the framework of analysis for this paper. One area in particular, the Jordan River basin, on the western Arabian Peninsula, is one of the most arid, populated regions on earth. Since the partitioning of the Arabian Peninsula, and the inclusion of a Jewish homeland in Palestine, this region has experienced conflict over water. This paper examines the situation in the region in terms of historical conflict over water, past attempts to manage supplies on a regional basis, and possible solutions to mitigate the potential for future conflict.
Naval Postgraduate School (U.S.)
Hill, Mary P.
1995-06
-
Examination of the Stabilized Rate Setting Process Within the Defense Business Operations Fund
"The Defense Business Operations Fund (DBOF) utilizes a system to stabilized rates in order to facilitate orderly budget planning and execution by DBOF customers. This thesis examines the process of rate setting. Data from a number of budget years is examined in order to analyze the fluctuation pattern of the rates from year to year. The extent of the fluctuation and their underlying causes will be addressed. Background information includes an explanation of DBOF, how it operates, the activities that it encompasses, as well as its strengths and weaknesses."
Naval Postgraduate School (U.S.)
Friend, Gregory C.
1995-06
-
Is Counterproliferation Compatible with Nonproliferation? Rethinking the Defense Counterproliferation Initiative
"This thesis examines the compatibility of the Defense Counterproliferation Initiative (CPI) with the nuclear nonproliferation regime. The idea of using military means to combat the acquisition and use of weapons of mass destruction by regional adversaries has created controversy from its inception. Skeptics worried that counterproliferation would undermine nonproliferation, rather than enhance it as the Defense Department claimed. This research examines how counterproliferation affects the various treaties and policies that make up the nonproliferation regime. Then, it examines each element of the CPI, considering its purpose, progress made to date, and the operational limitations which are already coming to light. Finally, and most importantly, it examines the tensions which counterproliferation has created, not only with nonproliferation, but for U.S. foreign policy as a whole. It concludes that counterproliferation is compatible with nonproliferation and provides recommendations to help provide the United States with the military means to combat proliferation, while ensuring a strong and enduring nonproliferation regime."
Naval Postgraduate School (U.S.)
McColl, Angus A.
1995-06
-
Humanitarian Assistance Response Ready Forces
From the abstract: "This monograph explores the need to identify humanitarian assistance response ready groups. The increasing number of humanitarian assistance missions performed by the US military indicates the need to identify response ready groups. Response ready groups form the initial reaction forces responding to humanitarian assistance missions. The planning factors impacting on the decision to determine response ready groups include the Crisis Action Planning system, joint task force organizational dynamics, and assessments of the operational environment. Additionally, the monograph addresses the impact of SOPs [Standard Operating Procedures], TPFDDL [Time Phased Force Deployment Data Lists] validation procedures, and deployment priorities. Four recent humanitarian assistance operations form the basis for identifying the core response forces. The impact of identifying forces early is presented. The monograph concludes that the benefits of early identification outweigh any costs. The monograph also addresses the validity of using historical examples to determine core capabilities or units. It also addresses the need to periodically update the response force ready group list to account for force modernization improvements in unit capabilities."
U.S. Army Command and General Staff College
Algermissen, Robert M.
1995-05-19
-
Operational Logistics, War, and Operations Other than War: What Applies?
From the thesis abstract: "This study assesses the role of operational logistics in a war environment and in an operations other than war (OOTW) environment by way of conducting a historical analysis of Desert Storm and humanitarian assistance operations in Somalia. A framework of campaign design elements is used to examine how operational logistics was integrated into each operation, and to what degree the design elements influenced the logistic support in the particular environment. Three conclusions stem from the research. One, the warfighting concept of operational logistics is transferrable when supporting certain operations other than war missions. The operational logistics functions apply, regardless of the environment in which it is executed. Therefore, from a functional approach, this study supports the idea that the operational level of war is applicable to the OOTW environment. The second conclusion is the construct of applying campaign design elements as criteria for measuring the integration and application of operational logistics was tested and found to be useful. It appears this use of criteria elements can serve as a template for operational logistics efforts both in war and peace, provided the functional aspect of the design element, vice the doctrinal 'pure' definition, be considered when applying it to the different environments. The final implication of this study is it reaffirms that as one progresses up the levels of war, the distinction between strategy and logistics erodes. Additionally, the peculiarities of the OOTW environment, especially as noted in the humanitarian relief efforts conducted in Somalia, are such that logistics may become the principal means of policy. This in turn, offers implications regarding the subordination of logistics to warfighting, whereby warfighting capability support logistics."
U.S. Army Command and General Staff College. School of Advanced Military Studies
Currie, James G.
1995-05-19
-
Revolution in Military Affairs and Operational Maneuver from the Sea
From the thesis abstract: "A Revolution in Military Affairs [RMA] consists of technological advances, operational innovation, and organizational adaptation, all of which combine to transition to a new form of warfare. While there is debate on whether we are experience an RMA, there is no doubt that there are dramatic changes taking place that we need look at new ways of coping with. Operational Maneuver from the Sea [OMFTS] is a new concept which applies the principles of maneuver warfare to maritime power projection. With a few changes, OMFTS is an appropriate concept for leveraging new technologies and employing new organizations like Naval Expeditionary Forces in what may be new forms of warfare emerging from a RMA. While embedded in police statements at the highest levels of the Department of the Navy, OMFTS has yet to be implemented. The concepts of Composite Warfare Commander and Battlespace Dominance should be folded into OMFTS to provide a compelling vision for the future employment of Naval forces."
Naval War College (U.S.)
Huston, James V.
1995-05-16
-
RMA and the Post Goldwater-Nichols World: More Tinkering Ahead for the JCS?
From the thesis abstract: "Defense organization reform is a recurrent issue linked to tradeoffs between civilian control and military efficiency. The 'myth of reorganization' complicates efforts at defense reform. This myth springs from a belief in the applicability of quantification to all defense issues, leading to the idea that reorganization is the solution to all of our military problems. An opposing belief holds that inadequacies in our defense system are due to the personalities of the stake holders, and that we should concentrate our efforts on identifying the ablest leaders, rather than tinkering with organizational structures. The 'Revolution in Military Affairs' [RMA] and the end of the Cold War have changed the nature of our national interests, calling our bipolar defense orientation into question. The evolution of the Joint Chiefs of Staff [JCS] System responded to our assumption of international responsibilities and eventually superpower status in a bipolar world. The Goldwater-Nichols Act culminated the cycle of Cold War changes to our defense establishment by addressing the issues of Service Parochialism, Jointness, and the Quality of Military Advice. Our national interests in the post-Cold War would involve new challenges that will inevitably call for adjustments in our National Defense System. More flexibility and adaptation of our planning and analysis organizations to joint and combined operations will be the prime factors in continuing efforts at defense reform."
Naval War College (U.S.)
Jenks, Darrell
1995-05-15
-
Reengineering Defense Acquisition: A Concept of Operations for Waging the Acquisition Campaigns of the 21st Century
The defense acquisition system has earned a reputation of being unable to provide the weapons the warfighters need at a value the Congress and American taxpayers deserve. At the macro level, acquisition is the convergence of five processes--requirements, technology, budgeting, management and operations and support. Micro-management of acquisition execution, when coupled with unstable requirements, technology and budgeting processes, results in a system that is not responsive to the customers' needs. It is time to implement dramatic changes based on a process-oriented reengineering of the entire system and radically improve its performance. To generate recommendations for system improvement, we assessed and restructured the top-level, macro processes associated with defense acquisition--relying on the time-proven tenet of centralized control with decentralized execution. To address current system shortfalls, we propose greatly expanding the role of the joint staff in preparing, planning and executing joint acquisition campaigns. The authors suggest the Department of Defense (DoD) execute acquisition campaigns by mirroring the way military forces plan and execute joint battle campaigns. They suggest process improvements which will strengthen the link between requirements definition and technology insertion. They also suggest altering the budgeting process to enable the DoD to submit a more unified budget position each fiscal year. They then developed a phased, methodical approach for implementing the proposed changes. The recommendations are controversial. The authors are challenging dogmatically accepted paradigms regarding the way the DoD bureaucracy functions and the roles of the joint staff. Before any of the proposed changes can be implemented, dramatic changes in current laws will have to occur. The recommendations are not consistent with either the current interpretations of Title 10 or the law governing the size of the Joint Staff. However, only by changing the current bureaucratic organizations and culture will the acquisition community have a chance at providing the capabilities US warfighters need in the resource constrained environment in which the DoD will continue to find itself.
Air University (U.S.). Air Command and Staff College
Martin, Laura; Starkey, Loretta; Wandrey, Jeffrey
1995-05
-
Defense Transportation Control: Focus for Power Projection
From the thesis abstract: "Joint doctrine stresses the importance of controlling the defense transportation system. The doctrinal publication on system control states that movements control coordinates transportation resources to enhance combat readiness and the priorities of the supported commander. Doctrine further stipulates that efficient transportation in a theater involves establishing effective organization and movement control procedures. Doctrine does not address what these control elements are, or how they are applied to the defense transportation system. This paper develops a concept for controlling the transportation function. This concept is based on generally accepted principles of joint and multinational operations and support to the military element of national power. The paper then analyzes the defense transportation system to determine where and how this control can be applied."
Army War College (U.S.)
Bergeron, Scott M.
1995-04-18
-
Counterproliferation: The Emperor Has No Clothes
From the thesis abstract: "The proliferation of Weapons of Mass Destruction and their means of delivery is a National Emergency. The National Security Strategy and National Military Strategy admirably highlight counterproliferation as urgent national priorities. Despite these well intentioned efforts, counterproliferation initiatives, begun in 1993, have to date only yielded grand policies and little progress. Lack of national leadership, multiplicitous and overlapping programs, interagency friction, and misplaced priorities could doom the laudable efforts to failure. As the National Command Authority seeks to dress themselves in a cloak of protection against the threats of weapons of mass destruction, who is brave enough to tell them the Emperor has no clothes? This assessment covers counterproliferation strategies via an ends, ways, and means methodology, analyzes the complexity of current initiatives, and provides benefits and challenges to the eight areas of the Counterproliferation Support Program. After conclusions about the illusionary success of these efforts, the assessment offers recommendations to enhance meaningful progress."
Army War College (U.S.)
Newing, Edward W.
1995-04-03
-
Countering Terrorism: The Israeli Response to the 1972 Munich Olympic Massacre and the Development of Independent Covert Action Teams
The purpose of this study is to examine the methodology of the covert action teams authorized by Prime Minister Golda Meir to find and assassinate those individuals responsible for the attack on the Israeli athletes at the Munich Olympic games in September 1972. Specifically, the study addresses whether the operational and tactical methods utilized in this counterterrorist effort were successful relative to the original operational objectives.
Marine Corps Command and Staff College (U.S.)
Calahan, Alexander B.
1995-04
-
Analysis of the Des, Loki, and Idea Algorithms for Use in an Encrypted Voice PC Network
From the thesis abstract: "The protection of information is of vital importance to the successful operation of both the Federal Government and the Department of the Navy. Attention is usually given to the protection of classified information. The Computer Security Act mandates that not only classified, but sensitive information be protected in accordance with the Privacy Act. The increasing reliance on networks makes this a challenging problem to overcome. The focus of this thesis is to examine the capabilities, effectiveness, and limitations of the DES, LOKI, and IDEA cryptosystems for use in the PC environment. It analyzes the use of these cryptosystems for network voice encryption. Further, this thesis examines the function and security of these cryptosystems and on possibilities for implementation in a Naval Postgraduate School PC network. Experimental results on the speed and efficiency of two of the cryptosystems are presented to show their relative strengths and weaknesses. A recommendation is made as to the appropriate cryptosystems to be used in a network implementation. Further recommendations are given on the type of computer networking architecture and the type of network encryption to use."
Naval Postgraduate School (U.S.)
McClenny, Walter O.
1995-03
-
North Korean Special Purpose Forces an Assessment of the Threat
"The purpose of this thesis is to assess the threat that the North Korean Special Forces pose, and to explore how this threat might be deterred or countered. This thesis will answer three questions. First, in the event of a second Korean War, what will the special forces campaign look like? Second, how could one deter North Korea's use of this capability and, if that fails, can the threat be countered? Finally, what conclusions can be drawn from the North Korean case about the future use of special operations forces in general. This study provides an empirical assessment of the capabilities of the North Korean Special Purpose Forces and the threat they pose to the interests of both South Korea and the United States. It develops two possible campaign models, based on two prominent schools of thought on the use of special operations forces (SOF), autonomous use, or integration with general purpose forces. This thesis then compares the capabilities of the North Korean Special Purpose Forces to the alternate campaign models to predict their possible uses in the event of a second Korean War. Finally, the study addresses how the Republic of Korea and the United States may deter or counter the threat these forces pose. It also discusses what conclusions may be drawn from this study about the future use of special operations forces in general."
Naval Postgraduate School (U.S.)
Durtschi, Michael S.
1995-03