Advanced search Help
Resource Type or Special Collection is Theses & Research Reports
Format is pdf
Clear all search criteria
Only 2/3! You are seeing results from the Public Collection, not the complete Full Collection. Sign in to search everything (see eligibility).
-
Problem of Theater Ballistic Missiles: Unresolved Dilemma for the Operational Commander
"This essay analyzes ballistic missiles as warfighting tools that exponentially compound the planning efforts of operational military commanders. Despite an all out effort by the United States military during the war against Iraq, unsophisticated Iraqi mobile SCUDs managed to evade targeting, preemptive strikes, and airborne intercepts. Although no U.S. troops were exposed to nuclear, biological or chemical attack from ballistic missiles during the 1991 war, the growing proliferation of weapons of mass destruction and ballistic missiles combined with the ghastly potential for massive casualties argues for renewed efforts to defend U.S. forces against this potent threat. Ballistic missiles as warfighting tools that compound the planning efforts of operational commanders."
Naval War College (U.S.). Joint Military Operations Department
Carey, John E.
1992-06-19
-
Legal Use of Terror as a Weapon
"This study investigates the legal use of terror as a weapon to accomplish national goals and objectives. This study does not advocate using terrorism. Terrorism, for the purpose of this paper, is illegal. Legal terror, by my criteria, conforms to the standard-is of the laws of land warfare. Specific criteria are established to define what constitutes using legal terror as a weapon. These criteria are used to analyze specific case studies to determine if the United States has used legal terror in the past. There are two major factors in defining legal terror. First, the target must be legally viable as defined by the laws of land warfare. Secondly, the method of engaging that target must also conform to the laws of war. The conclusion of this study is that legal terror is a legitimate weapon. It has been used in the past and will probably be used in the future."
U.S. Army Command and General Staff College
Hogg, David R.
1992-06-05
-
Analysis of the Execution of Counter-Drug Strategy in Bolivia Using the Low Intensity Conflict Imperatives
From the thesis abstract: "This study investigates the actions of U.S. military personnel conducting the counter-drug mission in Bolivia in accordance with the Bolivian/U.S. Counter-Drug Strategy. The analysis determines if U.S. personnel, in executing their mission, are complying with the low intensity conflict (LIC) imperatives. These imperatives are (1) political dominance, (2) adaptability, (3) unity of effort, (4) legitimacy, and (5) perseverance. The study used Operations 'Blast Furnace' and 'Snowcap' conducted in 1986 and 1989 respectively as illustrutative [sic] examples to analyze the execution of the counter-drug mission. The LIC imperatives are the doctrinally approved 'truths' acknowledged as essential to the successful planning and execution of LIC operations which are: insurgency-counterinsurgency, peacekeeping operations, combatting [sic] terrorism, and peacetime contingency operations. The counter-drug mission is a subset of peacetime contingency operations; therefore, the analysis provides a validation of the imperatives as an analytical tool. The study concluded that U.S. personnel did not comply with the LIC imperatives. The failure to comply has a direct correlation to the failure to stop the flow of cocaine from Bolivia."
U.S. Army Command and General Staff College
de la Peña, Sergio
1992-06-05
-
Deterrence and the Impact of Strategic Defense
"This paper examines the role of strategic defense in a deterrence strategy. Deterrence theory, strategic defense, the 1972 Anti-Ballistic Missile (ABM) Treaty, the national military strategy, and Global Protection Against Limited Strikes (GPALS) are reviewed. It is asserted that the roles of nuclear forces and strategic defense are complimentary and stabilizing. The options to counter the threat of future proliferation of weapons of mass destruction and the threat of accidental or unauthorized launch of ballistic missiles are examined with the conclusion that a comprehensive defense is necessary."
Naval War College (U.S.). Joint Military Operations Department
Lunghofer, Dennis M.
1992-06-01
-
Investigation into Islamic Fundamentalism and an Assessment of Its Relationship with the Concept of Jihad
"Islamic fundamentalism and Jihad are terms which have become prominent over the last two decades but are frequently misunderstood as concepts. Fundamentalism essentially means reviving Islam with its original pure principles as outlined by Mohammad and as demonstrated by his own example. Jihad means active struggle in the path of Allah both against evil and against enemies who threaten Islam. Fundamentalism is a recurring theme in Islam which is a religion of continual renewal. Frequent attempts have been made to cleanse Islam of the potential impurities of mysticism and the secular influences of nationalism and modernization. Sunni and Shia fundamentalist movements present interesting contrasts as exemplified by the Muslim Brotherhood in Egypt and Khomeini in Iran. The Sunnis have acted as a transnational 'conscience' of Islam without gaining power. The Shia appeal to emotion, through re-enactment of dramatic history, inspired fanatical martyrdom and produced a remarkable revolution."
U.S. Army Command and General Staff College
Campbell, Alastair
1992-06
-
Interagency Cooperation in the War on Drugs: Can Campaign Planning Be the Unifying Factor?
From the thesis abstract: "This monograph analyzes the potential of the military campaign planning process to unify the national interagency counternarcotics effort. Currently, DoD's antinarcotics mission includes the detection and monitoring of the aerial and maritime transit of illegal drugs into the United States, and the integration of command, control, communications, and intelligence, (C3I) into an effective communications network. DoD also provides manpower and equipment resources to support the interdiction efforts of law enforcement agencies both in the United States and overseas. The military campaign planning has been posited as a method to foster interagency unity and to bridge the gap between the national counternarcotics strategy and the tactical level of the drug war. The potential of the campaign planning process to unify interagency counternarcotics efforts is the focus for the monograph. The paper also weighs the merits of DoD assuming a more active role in coordinating interagency campaign planning. The study establishes the context of United States military participation in the drug war by describing examples of previous and evolving military involvement. Current initiatives to improve interagency cooperation and to broaden the scope of military participation are also examined. Two campaign planning models are analyzed to show the adaptability of the campaign planning process to the drug war."
U.S. Army Command and General Staff College. School of Advanced Military Studies
Mason, Bradley J.
1992-05-22
-
Submarine's Role in Future Naval Warfare
"The three basic elements where we traditionally commence strategic planning have changed dramatically in the past two years. A new national security strategy recasts the roles and missions of the armed forces in new terms. The submarine force needs to be justified under the new grammar for warfare as a part of the four new mission areas under the new national military strategy. The submarine force alone can perform the strategic deterrence and defense missions. The submarine's role in presence involves a high/low mix choice. There should be increased emphasis on the submarine force for crisis response: (1) rapid response (2) shore bombardment and strike (3) as the initial leading maritime component for second major regional contingencies, and (4) initial and limited sea control. A European regional war evolving out of a major regional contingency is not the same thing as the old European-centered global war with the USSR. Decreased emphasis should be placed on strategic anti- submarine warfare. Reconstitution goals could be met with at-sea nuclear weapons."
Naval Postgraduate School (U.S.). Department of National Security Affairs
Tritten, James John
1992-05-12
-
Narcoterrorism - A Threat to the United States?
From the thesis abstract: "Today, we see the demise of communism, the hope for a 'new world order,' and the realization of peace in the world. A dark cloud pervades this state of euphoria. It is the result of the War On Drugs. The purpose of this paper is to show that narcoterrorism is a threat to the United States. Colombia is used as a focal point for the study due the significant role it plays in the American drug war. The paper considers the supply and demand side of the drug problem. It looks at the relationship between terrorism and insurgency. The paper defines narcoterrorism to be the use of terror by narcotraffickers to coerce or intimidate a sovereign government to obtain an objective or end result. It examines the interests of the U.S. at stake in the drug war as well as those Colombian interests that the drug war threatens. A part of this examination is to determine which are a vital interest to us and which are threatened."
Army War College (U.S.)
Webb, Patrick F.
1992-04-21
-
Is There a Future Role for Tactical Nuclear Weapon Systems in the National Military Strategy?
"The disintegration of the Former Soviet Union and the demise of the Warsaw Pact as significant threats to national security allowed President Bush to promulgate new defense policy initiatives impacting nuclear force capabilities and roles. Because of this threat reduction and domestic challenges, the United States' armed services will undergo significant downsizing in the next several years. This will affect the force structure needed in the National Military Strategy (NMS) to insure attainment of national security policy objectives while minimizing risk. Planning the size and capabilities of the future force structure is complicated because of uncertainties in discerning new emerging nuclear-capable threats. This paper reviews die purpose and role that tactical nuclear weapon systems can provide in supporting the NMS, and recommends requirements be determined using a strategy based upon political, economic and military national interests versus the current target-based strategy. To draw implication for the NMS, the analysis reviews current strategic policy guidance, summarizes the current definition of deterrence theory, and provides rationales for maintaining tactical nuclear weapon systems for deterrence and warfighting in regional contingency operations again nuclear-capable forces. Based upon this analysis, recommendations are provided for joint planning, doctrine, and training initiatives needed to enhance the efficacy of the armed services in achieving national security policy objectives."
Army War College (U.S.)
Stobbs, Emmett E. Jr.
1992-04-03
-
Unleashing 'High-Tech' Weaponry in the Drug War: Posse Comitatus, the Fourth Amendment and Enhanced Sensing
Thesis, 40th Judge Advocate Officer Graduate Course
From the abstract:
"Congress created a sketchy exception to the Posse Comitatus Act's prohibition on military law enforcement for drug interdiction. The resulting legislative patchwork broadly authorizes use of military equipment and personnel for law enforcement, but unnecessarily restricts the most beneficial uses of sophisticated remote sensing hardware by forbidding direct participation in a search. The war on drugs will not succeed unless Congress, the Department of Defense, and the courts replace the statute, its regulations and the Fourth Amendment law it incorporates."
Judge Advocate General's Legal Center and School (United States. Army)
Rishel, Eric C.
1992-04-01
-
Theater Strategic Appraisal for South America
"U.S. National Security Strategy supports the accomplishment of the following objectives in South America (SA): (1) Deter aggression against our allies and friends in SA in terms of the Rio Treaty; (2) Counter terrorist threats to U.S. citizens and commercial interests in SA short of armed conflict; (3) Prevent, or at least limit, the transfer of militarily critical technologies by Brazil and Argentina, particularly the spread of missile and/or nuclear technology; (4) Reduce the growth and export to the United States of illegal drugs, most notably cocaine, and work with SA governments to combat drug traffickers; (5) maintain access to SA markets and energy/mineral resources; (6) Continue to encourage the development of free-market economies in SA; (7) Achieve cooperative solutions to the environmental challenges of the Amazon Rain Forest, industrial pollution, and exploitation of Antarctica; (8) Establish a more balanced partnership with South American allies, while providing leadership and ensuring hemispheric stability during the transition period; (9) Strengthen the Organization of American States (OAS) to promote diplomatic solutions to regional disputes; (10) Deter regional military powers, such as Brazil, from seeking regional dominance or initiating internecine warfare; (11) Aid in warding off threats to democratic institutions in SA from subversion, insurgencies, military takeover, or lawlessness; and (12) Promote economic development and social/political progress in SA."
Air University (U.S.). Air War College
Gay, Mark P.
1992-04
-
Comparative Evaluation of Computer Access Controls
From the thesis abstract: "This thesis reports the results of a study which tested participants' abilities to recall five different types of computer passwords. Each participant was assigned in a randomized procedure to one of six response intervals. Recall testing of computer-generated passwords, user-created passwords, passphrases, associative passwords and cognitive passwords was conducted using a computer program which simulated system log-on procedures. This study indicates the relative merits of these five password types are more difficult to distinguish when data are collected in the realistic setting of a log-on simulation instead of via paper surveys, as was done in previous research."
Naval Postgraduate School (U.S.)
Pence, Timothy B.
1992-03
-
Design and Implementation of ZTRAX: A Training, Readiness and Flight Hour Relational Database Management Tracking System
"In an era of diminishing budgets, information technology must help direct operational commanders in the maximum utilization of their available resources. The institution of a relational database management system to identify and exploit an organization's strengths will aid in keeping forces combat ready at all times. The design and implementation of ZTRAX; a training, readiness and flight hour relational database management system. ZTRAX is expected to provide historical information of home and deployed, operational and training flight evolutions which will aid in the process of training and readiness planning. The ZTRAX application was implemented in November, 1991 and is a menu driven program which permits the addition, editing and querying of data contained on two source documents; the Monthly Training and Readiness Report and the Monthly Flight Hour Report. Ztrax is run concurrently from within the Paradox program to permit a vast array of ad hoc queries, reports and the importation of graphical display mechanisms. [...] Chapter II will detail the design of the RDBMS. Chapter III discusses implementation of the RDBMS [relational database
software application] and its interaction with other commercial software applications for graphical representation purposes. The users manual is contained in Appendix E. Chapter IV discusses the issue of computer security and its relevance to all microcomputer operations. Chapter V provides recommendations and conclusions for the use of a relational database management system to provide accurate and timely readiness and training information. Appendix A-E will provide the data input documents, object diagrams, object definitions, domain definitions and the users manual, respectfully."
Naval Postgraduate School (U.S.)
Hodgkins, Richard E.
1992-03
-
Conflict with Libya: Operational Art in the War on Terrorism
From the thesis abstract: "The relevance of operational art in the low intensity conflict (LIC) environment must not be overlooked. A study of the series of U.S. military operations against Libya in 1986, and the events leading up to them, provides insights into how operational level thinking drove the military element of the long-term campaign against Qaddafi. This case study approach to the conflict examines how operational art was used in planning the operations, and the degree to which it supported achievement of strategic and operational objectives. It also addresses unique challenges faced by cognizant operational commanders in politically-dominated LIC scenarios. The paper is not a critique of actions at the tactical level, nor does it suggest alternatives to original operational plans. Rather, it asserts the overall validity of operational level thinking in the LIC environment, and concludes that the applicability of operational art in LIC should be formally recognized in relevant joint warfare publications."
Naval War College (U.S.)
Arnold, David R.
1992-02-22
-
Theater Applications of the Future Bomber Force
From the thesis abstract: "The author examines the advantages and disadvantages for the operational commander of using the future bomber force in conventional and contingency scenarios. The inherent strategic bomber capabilities of range, payload, and flexibility are discussed. The technological advances in stealth and advanced munitions are examined, as are USAF [United States Air Force] plans for the future bomber force incorporating these technologies. The author contends the combination of inherent bomber characteristics with the technologies of stealth and advanced munitions creates a revolution in the commander's power projection capabilities. The author examines the application of force in three conventional scenarios: counter-terrorism, peacetime contingency, and major regional conflict. One finding is the improved capabilities facilitates the use of the military option for decision makers; this may preclude adequate consideration of diplomatic, economic, and political options. The author concludes that the commander can apply the bomber force across the spectrum of conflict; that the force's ability to provide rapid initial response, precision, mass, and sustained firepower are useful in all three scenarios. The author contends the bomber force can free the commander of some forward basing constraints, allows the commander to retain the option of unilateral action, and provides the commander with a rapid response force option to show resolve or disrupt an adversary's plans. Recommendations for the theater commander include integration of bomber units into the planning process, ensuring targets are of sufficient value, and providing the intelligence network to exploit the rapid response capability."
Naval War College (U.S.)
Kowalski, James M.
1992-02-22
-
Triad - A Relook - Should the United States Retain Its Land Based ICBM Force?
From the thesis abstract: "The United States has maintained a Triad of strategic nuclear delivery systems since the early 1960's. This Triad includes strategic bombers, intercontinental ballistic missiles (ICBM), and submarine launched ballistic missiles (SLBM). The redundancy and mutual support provided by the Triad provided the United States with a credible nuclear deterrent during the Cold War confrontation with the Soviet Union. Each element of the Triad has distinct attributes for deterrent and warfighting roles. In the emerging aftermath of the Cold War it is appropriate to determine if the United States needs to retain its ICBM force of 1,000 missiles. This study reviews the evolution of the Triad and U.S. nuclear strategy, and examines the continuing need for the ICBM force against the following criteria: threat, alternatives to the ICBM, the advantages and disadvantages to retaining the ICBM capability, and the impact of the Strategic Arms Reduction Treaty (START) on the ICBM force? This study determines that the threat issue is the dominant criteria and concludes that the United States can sometime in the not too distant future retire most of its ICBM force, but first must negotiate with the former Soviet republics to achieve a significant reduction or total elimination of their strategic nuclear forces. Although those fledgling new republics should have no desire to threaten the United States, the existence of their vast nuclear capabilities, particularly ICBMs, must be seriously considered by U.S. defense planners."
U.S. Army Command and General Staff College. School of Advanced Military Studies
Skelton, John D.
1992-02-10
-
Responding to a Changing World
"The changes in the world since the demise of the Soviet Union have significantly altered the environment in which the United states seeks to achieve its national objectives. While the threat to the survival of the U.S. has diminished, new and less predictable threats to other of the U.S.'s national interests have emerged. Airpower is uniquely suited to deal with the changing world; an examination of objectives, strategy, doctrine, force structure, and constraints and opportunities shows how airpower, and the Air Force, can contribute to safeguarding national interests in a changing world."
Air University (U.S.). Air War College
Campbell, John H.
1992
-
Expanding Chinese Naval Power and Maritime Security in Southeast Asia
"The collapse of East-West competition for global preeminence is unleashing powerful forces for strategic change in the Asia-Pacific region. A reconfiguration of the regional security balance is taking place, especially a resurging naval rivalry, as aspiring hegemons--notably China, Japan and India--jostle for leadership roles. This report examines the central role being played by China in the unfolding security changes in Asia. Chinese naval modernization is analyzed within the context of China's Southeast Asian maritime interests, its new maritime strategy, and its evolving naval capabilities. The report recommends: maintaining a significant U.S. naval presence in Asia to protect American economic and political interests in the region; creating a loose yet textured and inclusive multilateral set of security relations in the Asia-Pacific region; initiating a Sino-American naval rapprochement as a prelude to enhanced regional naval cooperation; and, reassuring America's friends in the region through a continuing American naval deterrence."
Naval Postgraduate School (U.S.)
Winterford, David, 1949-
1992-01
-
United States Warship Transfers to Argentina, Brazil, and Chile: Options for U.S. Policy
From the thesis abstract: "The United States Navy plans to decommission several classes of warships in the next decade. Each of the major Southern Cone countries of Latin America (Argentina. Brazil. and Chile) perceives a geopolitically-driven need for a blue-water navy. Each of these navies needs frigates and destroyers to achieve blue-water status. This thesis examines U.S. ship transfer policy to the Southern Cone. It concludes that the Adams-. Coontz-. and Knox-class ships that the U.S. navy is beginning to decommission should be leased to the Southern Cone navies in order to bolster their naval forces and to support mutual maritime security interests. The poor economic status of these countries mandates that the lease terms be made as favorable as possible and that the annual number of ship leases be kept to a few."
Naval Postgraduate School (U.S.)
Jenkins, Brent P.
1991-12
-
Financial Criteria Used in Case Adjudication by the Directorate for Industrial Security Clearance Review (DISCR)
"An analysis of financial criteria used in case adjudication by the Directorate for Industrial Security Clearance Review (DISCR) was conducted to determine those financial factors most relevant in granting or denying security clearances to industrial personnel. It was concluded that the underlying cause of debt and subsequent handling thereof by the applicant were more influential than the type, number or dollar amount of debt in determining case outcome. Applicants whose debts were due to circumstances beyond their control and who made good faith efforts to resolve their debts were more likely to be granted clearances than applicants whose debts were due to carelessness or financial mismanagement and who made little or no attempt to resolve their debts. Ten financial factors most highly correlated with case outcome were identified and grouped into four main categories. Adjudicators were found to determine case outcomes in accordance with established adjudication policy."
Naval Postgraduate School (U.S.)
Goldstein, Janet G.
1991-12
-
Power Projection Strategy: New Directions for Forward Defense
From the thesis abstract: "The future of forward defense and the extensive overseas network of bases, as a component of U.S. power projection strategy, are considered in light of a changing international strategic environment. The assertion is made that several factors--among them global political change and domestic fiscal trends-- are creating a vulnerability in national security strategy by causing a retreat from forward defense while limiting improvements to strategic mobility assets. The case is argued that forward defense is a vital component of national security strategy and should remain so. The advantages of U.S. forward defense strategy are examined from historical, geopolitical, and contemporary operational perspectives. The proposed 'new directions' acknowledge that retrenchment and change are likely in the post-Cold War world, yet strategy formulation should not be driven strictly by external forces. Key concepts for the revised policy include: the defense of interests, guarantees of access, and 'local partners.' A specific recommendation for the DoD outlines the need for regional information centers to further support the reduced foreign access envisioned in the post-Cold War clime. A new, well-coordinated, and credible policy for forward defense in the post-Cold War environment is an imperative for future national security planners."
Naval War College (U.S.)
Krisinger, Christopher J.
1991-11-02
-
Baltic: A Sea in Transition
From the thesis abstract: "The objective of this thesis is to analyze naval developments in the countries abutting the Baltic Sea. Major international security events have radically altered the political landscape surrounding the region. Fundamental changes to the regional security environment are affecting naval building and modernization plans. This region should be of primary concern to the United States political and naval leadership because it comprises one of the world's largest concentrations of naval combatants. The navies deployed in the Baltic Sea are highly capable, and the geographic importance of the region has predicated a unique pattern of naval development. As regional threats to international security emerge, littoral naval warfare will become increasingly difficult to manage. Examination of the Baltic naval balance should provide a useful tool for monitoring national intentions in that region as well as forecasting future littoral naval threats elsewhere."
Naval Postgraduate School (U.S.)
Green, John L.
1991-09
-
User Authentication: A State-of-the-Art Review
From the thesis abstract: "Access control of computing systems is considered a key issue among Information Systems managers. There are different methods available to computing systems to ensure a proper authentication of a user. Authentication mechanisms can use simple user-generated passwords to complicated combinations of passwords and physical characteristics of the user (i.e., voice recognition device, retina scanner, signature recognition device, etc.). This thesis looks at the various authentication mechanisms available to a security manager. It describes how different authentication mechanisms operate and the advantages and disadvantages associated with each mechanism. It also reports on several commercially available software products that support the user authentication process. Finally, a discussion of password use in the military environment and the unique requirements of the Department of Defense."
Naval Postgraduate School (U.S.)
Coley, John A.
1991-09
-
Role of Air Force Special Operations in Foreign Internal Defense
From the thesis abstract: "Current trends in the international political arena, combined with fiscal constraints at home, are pointing toward a significant change in US defense policy. With the drawdown of conventional forces and forward deployed units, US defense interests abroad will increasingly rely on the armed forces of other nations. As witnessed in the recent Persian Gulf crisis, maintenance of vital US strategic interests hinges upon the development of social, economic, political, and military institutions favorable tc nur [sic] foreign policy objectives. The overall military role in this effort is termed foreign internal defense (FID). As a primary mission of the US Special Operations Command. FID is also an integral part of future USAF [United States Air Force] special operations endeavors. The USAF plays a significant role in FID by providing analysis and training in operations, maintenance, and logistical support to host-nation forces. This paper focuses on emerging operational requirements and whether or not these requirements necessitate the development and institutionalization of a structure within the Air Force Special Operations Command to develop, execute, and monitor Air Force efforts in foreign internal defense. Because the nature of confrontations most often associated with internal defense fall under the rubric of 'low-intensity conflict,' the question of maintaining an organic capability to train in counterinsurgency and guerrilla warfare is also addressed."
Air University (U.S.). Press
Moulton, John R.
1991-09
-
DE-CERTS: A Decision Support System For a Comparative Evaluation Method For Risk Management Methodologies and Tools
"A new approach was recently proposed to effectively and objectively evaluate risk management methodologies and tools for their suitability to a given organizational situation. The proposed approach, known as CERTS, is based on defining suitability in terms of criteria which in turn are described in terms of attributes and metrics. Using the Analytic Hierarchy Process, this thesis develops the CERTS approach into a Decision Support System [DSS], that could be used easily and effectively by organizations for selecting a risk management methodology or tool. The thesis also applies the developed DSS to three case studies to gain insights on the applicability of the DSS."
Naval Postgraduate School (U.S.)
Crump, Leonard A.; Pound, James G.
1991-09
-
Security Considerations in Distributed Systems
"This thesis investigates computer security considerations in distributed systems. In particular, it concentrates on assisting managers to gain an appreciation for what distributed systems are, and what are the inherent security issues in these systems. A survey of the literature on computer security was conducted to identify those issues unique to distributed systems. Although many controls are discussed, management must design and support a comprehensive security plan tailored to their unique organization."
Naval Postgraduate School (U.S.)
Rhead, Donovan R.
1991-09
-
Signature Verification for Access Control
"Access control to sensitive information is a vital concern for Department of Defense agencies. Current methods employed to control access are vulnerable to unauthorized users and frequently inadequate. The use of biometric access control devices, such as signature verification systems, may represent a solution to the access control problem. This thesis looked at two dynamic signature verification systems and compared their performance in general as well as under the different operating conditions of lined and unlined paper and morning and afternoon use. The two signature verification systems were the CIC [Communication Intelligence Corporation] system and the Sign/On system. Additionally, the thesis compared the CIC system under both sets of operating conditions using an inking stylus pen and a non-inking stylus pen. The experimental results indicated there was no significant difference between the CIC system using an inking stylus pen and the Sign/On system and that both systems had Type I error rates of less than 3% and Type II error rates of less than 1%. The results also indicated that the operating conditions test did not favor either system."
Naval Postgraduate School (U.S.)
Geshan, Susan Carol
1991-09
-
America's New National Security Strategy: New Scenario for Military Operations Research
This report "[p]rovides an analysis of President Bush's new national security strategy first unveiled in Aspen, Colorado on August 2, 1990, and General Colin Powell's 'base' force. If implemented, the new strategy and force structure would return a significant amount of U.S. ground and air forces to CONUS [Continental United States] where most would be demobilized. In the event of a major crisis, the U.S. would rely on active and reserve forces for a contingency response. The new national security strategy is based upon a revised Soviet threat and new international security environment which allows us to assume two years warning of a major ground war in Europe. During this two year period, the U.S. would reconstitute additional military capability. Outline of new strategy and 'base' force structure, transportation requirements, and whether or not the U.S. will retain a unilateral capability for overseas intervention. Discussion of parallel NATO [North Atlantic Treaty Organization] initiatives. Discussion of major issues, including: defining new goals and objectives in both programming and war planning, the effect of Operations DESERT SHIELD and DESERT STORM, new requirements for intelligence, requirements for decision-making, investment strategy and industrial conversion, reconstitution, and impact on military operations research and analysis."
Naval Postgraduate School (U.S.)
Tritten, James John
1991-06-11
-
PLO: A Victory in Terrorism?
"This study, using the Palestine Liberation Organization (PLO) as an illustrative case, investigates whether terrorism has been used to achieve political goals. The study is important because if terrorism has been used in this manner successfully, it may be emulated by others attempting to achieve similar goals. The study begins with a generic discussion of terrorism and its growth from a national to an international problem. The PLO is then used as a case study to address how successfully terrorism has served as a tool to advance organizational goals from the PLO's formation to the end of the 1980's. The case study discusses the history of the PLO. Then it examines specific terrorist acts aimed at achieving recognition of the organization as the sole representative of the Palestinians by the Palestinians, Arab States, the international community, and -- as a key element of PLO strategy--the United States. Conclusions and implications are drawn from this examination. In light of the recent Gulf War and its impact on the PLO, an epilogue is included."
U.S. Army Command and General Staff College
Blevins, Leonard C.
1991-06-07
-
U.S. Maritime Strategy in the North Atlantic and the Norwegian Sea: An Evolving Strategy in Need of Reassessment
"This thesis examines the evolution, and theoretical basis of the United States' maritime strategy in the North Atlantic and what is referred to as 'NATO's [North Atlantic Treaty Organization] Northern Flank.' The strategy associated with past Secretary of the Navy, John Lehman, is no longer considered applicable in the context of today's East-West relationship and is in need of reassessment. The paper then assesses the current, post Cold War situation and looks at future security interests the United States may have in the region. Additionally, the security and defense capabilities of our allies in the region are examined. Given the United States will remain closely linked with European security issues, by examining the successes and failures of past strategies and the strengths and weaknesses of our allies, one will be better able to develop a new strategy."
Naval Postgraduate School (U.S.)
Woodard, Jimmy C.
1991-06