Advanced search Help
Resource Type or Special Collection is Theses & Research Reports
Format is pdf
Clear all search criteria
Only 2/3! You are seeing results from the Public Collection, not the complete Full Collection. Sign in to search everything (see eligibility).
-
Decisional Dilemma: Structure, Function, and the NSC Staff
From the thesis abstract: "The Iran-Contra Affair, and the subsequent investigations, threw blinding light on the National Security Council [NSC] Staff, an organization that has grown dramatically in bureaucratic power since its inception 40 years ago. Much of the criticism of the Staff, however, has been directed at the personalities involved in this singularly unsuccessful operation and has neglected its more important implications for the national security system as a whole. In reality, this unfortunate episode, like other problems that have surfaced from time to time, had its roots in a mismatch between the national security structure and the essential functions that must be performed by the NSC Staff. These functions include: 1) Administration, 2) Coordination, 3) Supervision, 4) Adjudication, 5) Crisis Management, 6) Policy Formulation, and 7) Policy Advocacy. As can be demonstrated throughout the history of the NSC Staff, the extent to which the national security structure supports these functions will determine the degree of systemic success enjoyed by the administration in national security affairs. For that reason, the structure must command higher visibility and greater attention o the part of the president."
Army War College (U.S.)
Shoemaker, Christopher C.
1989-02-13
-
Political Impact of Islamic Revival in a Plural Society: The Case of Malaysia
From the thesis abstract: "Like many other multiethnic countries, Malaysia has seen a revival in Islamic fundamentalism in her Muslim populace since the seventies. The ongoing revival has led to pressures on the Malaysian government to establish an Islamic state in the country. Since the eighties, this revival is associated with a deterioration in political relations between Muslims and non-Muslims and a heightening of domestic tensions in the country. This study examines the process by which the activities of Islamic revival movements have contributed to the polarization in Malaysia's domestic politics. The study analyzes the characteristics of the revival and the impact on some key areas of Malaysian politics. These areas include Muslim and non-Muslim interests, governmental response to the revival, responses of major political parties, and changes in the alignment of popular support for these political parties. The study shows that the government has adopted conciliatory responses toward the demands of Muslim revivalists because of the pivotal role of the Muslim vote in the electoral process. Such responses have been detrimental to the interests of non-Muslims, resulting in a deterioration in relations between Muslims and non-Muslims at the grassroots level, and a polarization of support for political parties along ethnic lines. If the momentum of the revival continues, interethnic relations are likely to continue deteriorating."
U.S. Army Command and General Staff College
Chung, Yat Ng
1989
-
Desert Guerrillas: Psychological, Social and Economic Characteristics of the Bedouin Which Lend Themselves to Irregular Warfare
From the thesis abstract: "This monograph addresses the suitability of Bedouin tribes for recruitment and employment as irregular forces. The study is motivated by force shortfalls and resource constraints in U.S. contingency planning for Southwest Asia and the Arabian Peninsula. A partial solution to these shortfalls and constraints is offered through the employment of Bedouin irregular forces to augment U.S. contingency operations in the area. The study examines the characteristics of Bedouin society and finds that those characteristics support the recruitment and employment of Bedouin irregular forces. Three historical case studies support this conclusion, demonstrating the effectiveness of Bedouin irregulars. The case studies analyze the use of Bedouin irregular forces in the unification of Saudi Arabia prior to the First World War; under T. E. Lawrence during his campaigns in the Hejaz and Palestine from 1916 to 1918; and during the Dhofar Rebellion in Oman from 1971 to 1976. The monograph concludes that the Bedouin population of the Levant and the Arabian Peninsula constitutes a critical resource, which could be exploited to provide irregular forces in support of U.S. operations in Southwest Asia and the Arabian Peninsula. Some suggestions are offered with respect to methods of employment for such forces. The paper closes with a review of issues requiring further study, including the need for a doctrine addressing irregular warfare, and for techniques to implement that doctrine."
U.S. Army Command and General Staff College. School of Advanced Military Studies
Dempsey, Thomas A.
1988-11-14
-
Light Fighter Communication - On Today's Chemical Battlefield
From the thesis abstract: "The thesis problem is, 'How well does communication within the 'Light Fighter' force function on today's chemical battlefield.' Chapter 2 reviews the history of chemical warfare and the evolution of the Chemical Warfare Service (CWS). First, this study presents the significance of the thesis problem. Second, the Soviet offensive use of chemicals is reviewed. Third, documented uses of chemicals in today's Third World Countries is presented. Fourth, a baseline communication model is established as a basis for comparison. Fifth, a fictional scenario is presented to illustrate light forces conducting combat operations in a tropical climate. The lessons learned are mentioned on the basis of studies conducted by governmental agencies and as illustrated in the scenario."
U.S. Army Command and General Staff College
Hale, Thomas J.
1988-06-03
-
Implementation of a Parallel Multilevel Secure Process
From the thesis abstract: "This thesis demonstrates an implementation of a parallel multilevel secure process. This is done within the framework of an electronic mail system. Security is implemented by GEMSOS [Gemini Standard Operating Systems], the operating system of the Gemini Trusted Computer Base. A brief history of computer secrecy is followed by a discussion of security kernels. Eventcounts and sequences are used to provide concurrency control and are covered in detail. The specifications for the system are based upon the requirements for a Headquarters of a hypothetical Marine Battalion in garrison."
Naval Postgraduate School (U.S.)
Pratt, David R.
1988-06
-
Government Actions to Control Terrorist Violence; A Case Study on Northern Ireland
From the thesis abstract: "Using the historical method, this study of terrorism in Northern Ireland examines the variables of conflict, the existing violence and government endeavors to eradicate the violence. This study does so within the framework of the United States' interests. Irish terrorism has been a problem for the British government for centuries. The current round since 1969 has produced , vast improvements in the security forces and enforcement techniques, yet the I.R.A. [Irish Republican Army] and its political wing, Sinn Fein, survive. Government actions must include measures aimed at the root causes of terrorist movements. The relative degradation of the Catholic community within Northern Ireland has received international attention and has been the focus of much of the British government's efforts to legislate improvements in Northern Ireland. It appears that only through this process can peace and reconciliation in Northern Ireland take place."
Naval Postgraduate School (U.S.)
Naughton, Maura Katherine
1988-03
-
Chemical Warfare Module for the Airland Advanced Research Model (ALARM)
"This thesis incorporates an explicit depiction of chemical warfare (CW) in the AirLand Advanced Research Mode1 (ALARM), being developed at the Naval Postgraduate School based on the Amy's AirLand Battle doctrine. The CW module centers on a planning algorithm using the generalized value system (GVS) for future state decision making. The planning algorithm comprises the Commander's Estimate of the Situation. The GVS quantifies capabilities and importance of all battlefield entities. The CW module represents key chemical staff functions. The algorithm's decision rule is extended, adding aspects of utility theory. The basic concepts of the module are demonstrated in an application computer program running a combat scenario. The program generalizes previous development work on the GVS and the planning algorithm producing a plan consisting of the courses."
Naval Postgraduate School (U.S.)
Van Arsdale, Layne A.
1987-12
-
Strategic Planning for Counterforce Options
"The first objective of this report is to explore the disparity between United States declaratory policy and actual force capabilities. This report will secondarily pose questions and purpose decision making criteria which are essential to ensure successful future nuclear strategic force employment and planning. This report is primarily concerned with the gap in U.S. declaratory and operational (or action) policy as it applies to current counterforce targeting problems. It is important to distinguish between declaratory policy and actual operational policies to appreciate the complexities of the debate and to resolve questions concerning future force planning."
Naval Postgraduate School (U.S.)
Palumbo, Nancy R.
1987-11-04
-
NATO's Theater Nuclear Weapons and the Defense of Europe: Past Patterns and Future Prospects
From the thesis abstract: "The goal of this research was to analyze and order the controversy and ambiguity surrounding the TNW [Theater Nuclear Weapons] modernization started by NATO [North Atlantic Treaty Organization] in 1979. To place the GLCM [Ground Launched Cruise Missile]/Pershing II deployment within its historical context, this thesis reviews significant events pertaining to NATO since its inception. Three basic questions guided this study: Why did the NATO allies agree in 1979 to modernize their theater nuclear force? Why did the United States actually begin this TNW deployment in 1983? Is the TNW program accomplishing its goals? The first period reviewed (1948-59) is considered in terms of the United States' initial deployment of TNWs into Europe, the Soviet force buildup following World War II, and the creation of NATO in 1949. Section two traces NATO's changing attitudes towards TNWs from 1960-1974. The third section (1975-present) discusses the conventional and nuclear force balance, NATO's growing divisions during this period, and the role of the GLCM/Pershing II deployment within this environment of change for NATO. An examination of NATO's patterns of response over the last 38 years reveals that NATO has failed to develop formal organizational goals, choosing instead to react to each Soviet provocation on a case-by-case basis."
Air Force Institute of Technology (U.S.)
Stephenson, Gregory L.
1987-09
-
Assessment of Potential Soviet Responses to Evolving Theater Nuclear Systems
This thesis was presented to the faculty of the U.S. Army Command and General Staff College in partial fulfillment of the requirements for the degree of Master of Military Art and Science. From the thesis abstract: "This study focuses on the Soviet perceptions and decision malting processes which influence Soviet reaction to US initiatives in modernizing or developing theater nuclear systems. Beginning with a discussion about the consequences of previous U.S. misperceptions of Soviet intentions, the study supports the need for ongoing analysis of Soviet actions from the Soviet perspect.ive. The Soviet view of the world is examined in terms of Marxist-Leninist ideology, Soviet fears of encirclement and invasion, and the Soviet perception of world power relationships or 'correlation of forces'. The effect of Soviet military theory on reactions and responses to the subject of U.S. military developments is assessed, specifically in the areas of military doctrine and military science. The influence of military art is discussed with emphasis on strategy and operational art. The Party political controls on Soviet military matters are described, including a breakdown of the military decision making process. Soviet responses to U.S. nuclear weapons initiatives, including the Pershing 11, Ground Launched Cruise Missile and Enhanced Radiation Weapons, are discussed in terms of military and political reactions. Soviet use of propaganda is highlighted. The importance of superiority and technology as an integral part of that superiority are examined, as is the Soviet use of 'technology transfer'. This study hypothesizes that any Soviet reaction to U.S. action is based upon unique Soviet perceptions which are strongly influenced by Marxist-Leninist ideology, insecurity, military theory, Party bureaucracy, and world correlation of forces. The findings of this thesis indicate that any US/NATO force modernization initiative which alters the Soviet perception of the correlation of forces in Europe will evoke some form of response. There is no indication, however, that this response will be a mirror image of the U.S. initiative. 'The thesis concludes with a discussion of the political and military responses the Soviets may undertake."
U.S. Army Command and General Staff College
Wightman, Richard O. Jr.
1987-06-05
-
Interoperability: A Necessary Means Towards Operational Success in NATO
From the thesis abstract: "Interoperability is the ability of services and allies to commingle systems, units, or forces which will enable them to operate effectively together. Interoperability should provide NATO [North Atlantic Treaty Organization] commanders the necessary flexibility to concentrate sufficient combat forces at decisive points on the battlefield to deceive and surprise the THREAT while seizing the initiative. The corps seems to be the unit best organized to plan and execute an interoperable operation in NATO because the corps links tactical operations and strategic aims and is flexible enough to performs missions at the tactical and operational levels. This study uses a historical analysis of German Army operations in North Africa and on the eastern front during World War II. These operations are indicative of the successes and failures of interoperable operations amongst Germany and her allies. NATO operational commanders must seek certain imperatives of interoperability at the operational level to be successful. These imperatives are: (1) harmonious unit organization, (2) standardized equipment and training, (3) compatible tactical doctrine, (4) unified command, control, communications, and information systems, (5) coordinated liaison and staff planning, (6) mutual understanding /simplicity, (7) cooperation, and (8) adequate sustainment and logistics. The study also examines the characteristics and capabilities of US and German modernized heavy corps to assess the feasibility of establishing an ad hoc US/German corps. The conclusion of this study indicates the need to practice interoperability at the operational level. Without interoperability, the practice of operational art is inhibited. Escalation across the nuclear threshold because of the inability of NATO operational commanders to achieve the conventional initiative is a dilemma that NATO policy makers must address if national interests continue to impede efforts towards more effective interoperability."
U.S. Army Command and General Staff College. School of Advanced Military Studies
Everett, Michael W.
1987-05-05
-
Iranian Hostage Rescue Attempt
From the thesis abstract: "On 24 April 1980 the United States Military's attempt to rescue the fifty-three American hostages held in Tehran suffered ignominious defeat in the Iranian desert. A combination of some training defects, command and control problems, adverse weather conditions and bad luck caused early cancellation of the mission. Eight men died in the effort, and the hostages remained in captivity for a total of 444 days. It was a good idea -- American pride and honor had been badly injured and this was an opportunity to show the world Americans were capable of dealing with international terrorism in a carefully calculated and measured way. But flawed planning and execution spelled doom for the endeavor and made an already bad political situation even worse. This paper examines what led up to the raid, what was planned, what went wrong, and what lessons can be drawn from the experience."
Army War College (U.S.)
Thomas, Charles S.
1987-03-23
-
Applicability of the Code of Conduct in a Terrorist Hostage Situation
From the thesis abstract: "The Code of Conduct was written and adopted to provide the American soldier with an ethical guide by which to formulate behavior while being held prisoner of war. Its development was based on experiences gained from large scale wars: Civil War, World Wars I and II, and the Korean War. Today American soldiers are involved in a new form of war--terrorism. An undeclared war in which military personnel face the same possible misfortune of capture and exploitation by the enemy as they have in previous wars. This paper will present the background of events which led to the formulation and adoption of our present Code and will examine its intended purpose. We will then determine why U.S. service personnel are taken hostage and how they may expect to be exploited. Finally, the Code of Conduct will be analyzed to determine if it provides adequate guidance by which U.S. military personnel can model their conduct if taken hostage."
U.S. Army Command and General Staff College
Gore, Robert L.; Reaney, David W.
1987-02
-
Conspiracy Theory of Terrorism: Analysis and Application
"The conspiracy theory of terrorism is one of many theories which attempt to explain terrorism. The literature relating to conspiracy theory is fragmented and opinionated, causing problems in understanding the positions of those who attest to conspiracy theory. This thesis consolidates much of the literature and relates the impact of conspiracy theory ideology to the political decision-making process. This study analyzes literature from the two opposing viewpoints of the conspiracy theory of terrorism. The data is obtained primarily through books, journals, magazines, newspaper articles, and government documents. The opposing viewpoints of conspiracy theory are both supported in the literature. Terrorism has become a source of power in politics. There are many similarities in the decision-making processes used by the two sides. The conspiracy theory of terrorism may or may not be valid, but it has contributed to the beliefs and actions of many governments and people in powerful decision-making roles."
Air Force Institute of Technology (U.S.)
Beecroft, David Raymond
1986-06-30
-
Attitude Survey: Police and Fire Service Integration
"The purpose of this study is to further the existing research into the area of consolidation of some or all of the emergency services on an Air Force installation. In the context of this work, these 'emergency services' will generally include the fire department (fire protection branch), security police, disaster preparedness, and ground safety. A 1983 research project completed by a student of the Air Command and Staff College indicated certain organizational changes would result in a more efficient use of manpower with an associated reduction in costs. The research question now under examination is whether or not there is sufficient support within the affected career fields to suggest that a pilot program of the consolidation concept be implemented."
Air University (U.S.). Air Command and Staff College
Hoffmaster, Jan C.
1986-04
-
Combating Terrorism: A Guide for U.S. Naval Forces Afloat
From the thesis abstract: "The United States Navy's forces afloat do not have a single source document that addresses anti-terrorism and counterterrorism. The increase in terrorism world-wide has stimulated the concern that vulnerable maritime vessels will become terrorist targets. U. S. Navy ships in a restricted maneuvering situation, at anchor in a harbor, or moored pier side may offer an attractive target to a terrorist group. To deal with this potential terrorist threat, personnel manning U. S. Navy ships must be educated in the fundamentals of terrorism; the ships' security program must be evaluated and modified accordingly; various watches, sentries, and teams must be trained in new anti- and counterterrorist procedures; and contingency plans must be developed to deal with potential terrorist incidents. This study provides a guide for the development of effective anti-terrorist and counterterrorist programs for any ship type in the U. S. Navy."
Naval Postgraduate School (U.S.)
Broughton, Hubert L.
1985-12
-
Moro Problem: An Historical Perspective
"For over 400 years the Muslim people of the southern Philippines have been at war. They have resisted the Spanish occupation of their ancestral homelands, the American colonial presence, and the current Christian government. To understand what motivates the Moro people to such conflict, it is necessary to study their history, religion, and the ethnic fabric which makes up their various regional groups. The fundamentals of their religion require a homogenous [sic] Islamic government. In the Philippines this would require separation, or at least total autonomy for the Muslim areas. This has never been allowed by the Christian government which has perpetuated the cause of the Moro insurgency. Conflict will surely continue as long as Christian authority is imposed upon the Moro people."
Naval Postgraduate School (U.S.)
Fowler, Dennis B.
1985-06
-
Potentially Destabilizing Effects of Islamic Fundamentalism on U.S. Aid to Jordan
"The 1979 Islamic fundamentalist revolution in Iran resulted in the replacement of the pro-U.S. monarchy of the Shah with the theocracy of the Ayatollah Khomeini, which repudiated all Iranian/U.S. security agreements radically changing the equations of influence in the Mid-East. The Iranian revolution was an expression of a resurgence of Islamic religious zeal throughout the area, a fundamentalist revival which threatens all Arab nations which support U.S. policy, especially vis-a-vis Israel. Fundamentalists, encouraged by the success of Khomeini, have pledged to support their religious brothers by all means available to them, including terrorism, assassination, and war. Jordon, absolutely essential to any possible Arab/Israeli accommodation because of its geopolitical position and historic association with the Palestinian people, is militarily extremely weak and financially dependent upon aid from nations themselves threatened by fundamentalism. Jordon's financial and military vulnerability coupled with its political fragility make it a prime target for radical Islamic destabilization. At present, Jordon, incapable of independent foreign policy, will continue under anti-U.S. pressures unless the U.S. develops a clearer understanding of the religious/political situation in the Mid-East and devises a security assistance program for Jordon which recognizes the value and vulnerability of that nation. This will require an increase of $400-700 million a year in FMS [Foreign Military Sales] credits and economic aid for ten years, as well as the re-assessment of the traditional unconditional U.S. support of Israeli-perceived military requirements."
Air Force Institute of Technology (U.S.)
Strobbe, Connie L.
1984-03
-
Modeling Security in Local Area Networks
From the thesis abstract: "The Department of Defense needs to process data at various levels of security in Local Area Networks (LAN) of computer systems. A formal computer network security model is a necessary first step in certifying a computer system to process classified data. Several computer security models have been developed to identify what is required to enable multilevel certification of a computer system, and a similar model is needed for LANs. The primary objective of this research project is to analyze the requirements of a LAN security model. Conceptual design issues of LAN security modeling are presented in this thesis to identify what must be achieved to ensure security is not violated when data of various levels of security are processed in a local area network. Due to their distributed nature, LANs involve several security issues not addressed in security models (such as the Bell-LaPadula security model) developed for single computer systems. Therefore, modeling of security in LANs and computer networks must be complemented with LAN application and implementation considerations, primarily associated with secure communications channels between LAN subscribers. This thesis analyzes the security requirements of a local area computer network, highlighting the need for a security architecture approach to modeling security in LANs. A textural definition of a prototype LAN security model is presented, and the model's application to hypothetical LAN configurations is discussed."
Air Force Institute of Technology (U.S.). School of Engineering
Ballenger, Wesley A., Jr.
1983-12
-
Honduras: Will the Revolution Come?
From the thesis abstract: "The purpose of this thesis is the examination of Honduras today from a socio-economic and politico-military perspective to determine what internal conditions exist which make Honduras prone or vulnerable to insurgency. The research concentrates on the internal factors for insurgency in Honduras. It surveys the internal conditions of the neighboring countries of El Salvador, Guatemala, and Nicaragua and the Soviet-Cuban strategies in Latin America as a contributing factor in nurturing revolution outside their own borders. The research is based on historical records and comparative studies of revolutions. The analysis reveals that because of the present socio-economic and political conditions, Honduras does not present a target for insurgency from within. The author does not discount, however, the possibility that if the government abandons or reduces the intensity of its aggressive improvement programs, the insurgencies in neighboring countries may subsequently be the catalyst to allow or cause them to 'spill over' into Honduras."
U.S. Army Command and General Staff College
Fonseca L., Hector Rene
1983-06-03
-
National Security and Language Competence: US Armed Forces and Transnational Communication
From the thesis abstract: "Language competence has long been recognized as a required skill in the collection and analysis of intelligence. Previous experience in coalition warfare and current efforts at multilateral defense reveal the need for facility in other languages in operating with allies. Command and control may be affected significantly by the ability to communicate successfully between units of various nations. As operations in foreign areas also entail dealing with a population whose cultural background may differ from ours, language skill may be of command interest for its contribution to civil-military cooperation. This study looks at the historical use by the armed forces of languages other than English and at the means by which these skills were acquired. As multinational experiences are well documented for World War II and Korea, the study concentrates on these two conflicts."
U.S. Army Command and General Staff College
Müller, Kurt E.
1983-06-03
-
Quantitative and Qualitative Effectiveness Dimensions of the U.S. Coast Guard Recruiting Program
"The United States Coast Guard's increasing employment of advanced technology aboard its cutters, aircraft and shore commands has introduced an evolving demand for the consideration of a quality dimension in manpower planning. During recent years, this demand for quality personnel has out-distanced input. Recognizing the requirement for a long term organizational change to reverse this trend, this thesis identifies the recruiting program as the most effective agent for that change."
Naval Postgraduate School (U.S.)
Johnson, Harvey E.
1983-06
-
Rescue Assault Forces: Integrated Strategic Role in National Security
From the thesis abstract: "This study examines the adequacy of present U.S. counterterrorist strategy and force development as an integral part of U.S. National Security policies. Emphasis is placed on countering the hostage and kidnapping duration event forms of terrorism and their destabilizing effect on U.S.--Third World relationships. The study includes a historical review of force development as a function of national security objective since the end of World War II. The historical aspect identifies those major weapons system programs which will likely dominate defense expenditures in the decade(s) ahead. The concept of an inadequate counterterrorist strategy will focus on the threat to U.S. National Security posed by changes taking place in the Third World. The increased U.S. dependence on foreign Third World natural resources and Soviet geostrategic gains are presented as a basis for challenging the current force development emphasis on nuclear and conventional forces. To meet the challenge of the possible inadequacy of current counterterrorist priority, a corollary to this thesis examines the potential contribution to National Security which could be made by a permanently organized rescue assault force equipped with the best available strategic transport technology."
U.S. Army Command and General Staff College
Prichard, Joe Douglas
1982-06-04
-
Security of the South Atlantic: Is It a Case for 'SATO' - South Atlantic Treaty Organization?
From the thesis abstract provided by the Combined Arms Research Library: "The growing dependence of the industrialized nations on the South Atlantic area, whose value was sufficiently proved during both world wars, increased considerably the importance of this strategic region to the security of the West, since through its sea-lanes flows a large amount of the raw materials desperately needed by the US, Europe and Japan to feed their industries. The South Atlantic has become an area of intense East-West confrontation and in recent years it has witnessed a large Soviet influence particularly on the west coast of Africa, giving the USSR [Union of Soviet Socialist Republics] the capability to disrupt the vital shipping lanes in the area. This thesis attempts to analyze the strategic importance of the South Atlantic area to the western world and to ascertain whether the countries located within the boundaries of that area are prone to build a new alliance to cope with the Soviet influence. Analysis reveals that the South Atlantic countries do not possess either the military power or the political will to create a valid and efficient security pact, due to the lack of a clear-cut consensus on the importance of a potential SATO [South Atlantic Treaty Organization] to protect West interests in the region. Analysis also points out the existence of some valid alternatives that if carefully implemented would considerably upgrade the security of the South Atlantic area, without creating insurmountable political obstacles. However, a more comprehensive approach toward the creation of a formal security alliance is still not ripe, and for the time being the South Atlantic Treaty Organization will remain a challenge to be met by both South American and African countries."
U.S. Army Command and General Staff College
Lessa, Luiz G. S.
1982-04-06
-
Lanchester-Type Models of Warfare, Volume II
This monograph is a comprehensive treatise on Lanchester-type models of warfare, i.e. differential-equation models of attrition in force-on-force combat operations. Its goal is to provide an introduction to and current- state-of-the-art overview of Lanchester-type models of warfare as well as a comprehensive and unified in-depth treatment of them. Both deterministic as well as stochastic models are considered. Such models have been widely used in the United States and elsewhere for the modeling of force-on-force attrition over the complete spectrum of combat operations, from combat between platoon-sized units through theater-level air-ground combat. This material should be of interest primarily to individuals concerned with defense planning, quantitative aspects of military analysis, military OR, war gaming, or combat modeling, although it may also be of interest to the reader concerned with the modeling and analysis of other dynamic systems. It should also be of interest to the concerned citizen who is interested in the foundations for defense analysis and has the appropriate technical background.
Naval Postgraduate School (U.S.)
Taylor, James G.
1980-10
-
Lanchester-Type Models of Warfare, Volume I
This monograph is a comprehensive treatise on Lanchester-type models of warfare, i.e. differential-equation models of attrition in force-on-force combat operations. Its goal is to provide an introduction to and current- state-of-the-art overview of Lanchester-type models of warfare as well as a comprehensive and unified in-depth treatment of them. Both deterministic as well as stochastic models are considered. Such models have been widely used in the United States and elsewhere for the modeling of force-on-force attrition over the complete spectrum of combat operations, from combat between platoon-sized units through theater-level air-ground combat. This material should be of interest primarily to individuals concerned with defense planning, quantitative aspects of military analysis, military OR, war gaming, or combat modeling, although it may also be of interest to the reader concerned with the modeling and analysis of other dynamic systems. It should also be of interest to the concerned citizen who is interested in the foundations for defense analysis and has the appropriate technical background.
Naval Postgraduate School (U.S.)
Taylor, James G.
1980-10
-
Countermeasures to an Initial Surprise Attack Through the Analysis of Historical Examples
From the theses abstract: "This study attempts to deduce the countermeasures to an initial surprise attack through the analysis of historical examples. The research reveals that the defender must eliminate vulnerable timing in his reaction capabilities and develop his own doctrine, organization, and material based on his national character, terrain, climate, and the enemy's doctrine. To cope with the attacker's main attack directed toward an unexpected place, the defender capabilities must secure flexibility which could cope with any enemy Once the attacker has attacked, the defender's command structure should exactly identify the attacker's attempt as early as possible. To respond quickly to enemy's attempt, the defender should possess quick reaction capabilities and to respond effectively to the attacker's overpowering concentration of force and his speed of maneuver, the defender's maximum efforts must be focused on absorbing the attacker's attack momentum. Any countermeasure could not be accomplished without the soldiers' high morale. Those deduced countermeasures could be considered conceptual guidance in preparing for a surprise attack. The actual, substantial, and precise countermeasures should be researched, developed, and actualized nationally within the specific environments involved."
U.S. Army Command and General Staff College
Yoo, Je Hyun
1980-06-06
-
Design and Implementation of the Memory Manager for a Secure Archival Storage System
"This thesis presents a detailed design and implementation of a memory manger for a kernel technology based secure archival storage system (SASS). The memory manger is a part of the non-distributed portion of the Security Kernel, and is solely responsible for proper management of both the main memory (random access) and the secondary storage (direct access) of the system. The memory manager is designed for implementation on the ZILOG Z8000 microprocessor in a multi-processor environment. The loop free design structure, based upon levels of abstraction, and a segment aliasing scheme for information confinement are essential elements of the overall system security provided by the SASS."
Naval Postgraduate School (U.S.)
Gary, Alan V.; Moore, Edmund E.
1980-06
-
Subversion: The Neglected Aspect of Computer Security
This thesis distinguishes three methods of attacking internal protection mechanisms of computers: inadvertent disclosure, penetration, and subversion. Subversion is shown to be the most attractive to the serious attacker. Subversion is characterized by three phases of operations: the inserting of trap doors and Trojan horses, the exercising of them, and the retrieval of the resultant unauthorized information. Insertion occurs over the entire life cycle of the system from the system design phase to the production phase. This thesis clarifies the high risk of using computer stems, particularly so-called 'trusted' subsystems for the protection of sensitive information. This leads to a basis for countermeasures based on the lifetime protection of security related system components combined with the application of adequate technology as exemplified in the security kernel concept.
Naval Postgraduate School (U.S.)
Myers, Philip A.
1980-06
-
American Civil Defense 1945-1975: The Evolution of Programs and Policies
"This is a study of the evolution of civil defense policies and programs in the United States for the period 1945-1974. Written as a doctoral dissertation at the University of Virginia over a 3-year period (1978-1980), this study draws heavily on a large selection of executive and legislative branch hearings, reports, studies and government-sponsored research. It is reproduced in the belief that the information it contains will be of use to those conducting research in civil defense-related fields and to those responsible for the administration of civil defense programs."
United States. Federal Emergency Management Agency
Blanchard, B. Wayne
1980-05