Advanced search Help
Resource Type or Special Collection is Theses & Research Reports
Clear all search criteria
Only 2/3! You are seeing results from the Public Collection, not the complete Full Collection. Sign in to search everything (see eligibility).
-
Financial Criteria Used in Case Adjudication by the Directorate for Industrial Security Clearance Review (DISCR)
"An analysis of financial criteria used in case adjudication by the Directorate for Industrial Security Clearance Review (DISCR) was conducted to determine those financial factors most relevant in granting or denying security clearances to industrial personnel. It was concluded that the underlying cause of debt and subsequent handling thereof by the applicant were more influential than the type, number or dollar amount of debt in determining case outcome. Applicants whose debts were due to circumstances beyond their control and who made good faith efforts to resolve their debts were more likely to be granted clearances than applicants whose debts were due to carelessness or financial mismanagement and who made little or no attempt to resolve their debts. Ten financial factors most highly correlated with case outcome were identified and grouped into four main categories. Adjudicators were found to determine case outcomes in accordance with established adjudication policy."
Naval Postgraduate School (U.S.)
Goldstein, Janet G.
1991-12
-
Power Projection Strategy: New Directions for Forward Defense
From the thesis abstract: "The future of forward defense and the extensive overseas network of bases, as a component of U.S. power projection strategy, are considered in light of a changing international strategic environment. The assertion is made that several factors--among them global political change and domestic fiscal trends-- are creating a vulnerability in national security strategy by causing a retreat from forward defense while limiting improvements to strategic mobility assets. The case is argued that forward defense is a vital component of national security strategy and should remain so. The advantages of U.S. forward defense strategy are examined from historical, geopolitical, and contemporary operational perspectives. The proposed 'new directions' acknowledge that retrenchment and change are likely in the post-Cold War world, yet strategy formulation should not be driven strictly by external forces. Key concepts for the revised policy include: the defense of interests, guarantees of access, and 'local partners.' A specific recommendation for the DoD outlines the need for regional information centers to further support the reduced foreign access envisioned in the post-Cold War clime. A new, well-coordinated, and credible policy for forward defense in the post-Cold War environment is an imperative for future national security planners."
Naval War College (U.S.)
Krisinger, Christopher J.
1991-11-02
-
Baltic: A Sea in Transition
From the thesis abstract: "The objective of this thesis is to analyze naval developments in the countries abutting the Baltic Sea. Major international security events have radically altered the political landscape surrounding the region. Fundamental changes to the regional security environment are affecting naval building and modernization plans. This region should be of primary concern to the United States political and naval leadership because it comprises one of the world's largest concentrations of naval combatants. The navies deployed in the Baltic Sea are highly capable, and the geographic importance of the region has predicated a unique pattern of naval development. As regional threats to international security emerge, littoral naval warfare will become increasingly difficult to manage. Examination of the Baltic naval balance should provide a useful tool for monitoring national intentions in that region as well as forecasting future littoral naval threats elsewhere."
Naval Postgraduate School (U.S.)
Green, John L.
1991-09
-
User Authentication: A State-of-the-Art Review
From the thesis abstract: "Access control of computing systems is considered a key issue among Information Systems managers. There are different methods available to computing systems to ensure a proper authentication of a user. Authentication mechanisms can use simple user-generated passwords to complicated combinations of passwords and physical characteristics of the user (i.e., voice recognition device, retina scanner, signature recognition device, etc.). This thesis looks at the various authentication mechanisms available to a security manager. It describes how different authentication mechanisms operate and the advantages and disadvantages associated with each mechanism. It also reports on several commercially available software products that support the user authentication process. Finally, a discussion of password use in the military environment and the unique requirements of the Department of Defense."
Naval Postgraduate School (U.S.)
Coley, John A.
1991-09
-
Role of Air Force Special Operations in Foreign Internal Defense
From the thesis abstract: "Current trends in the international political arena, combined with fiscal constraints at home, are pointing toward a significant change in US defense policy. With the drawdown of conventional forces and forward deployed units, US defense interests abroad will increasingly rely on the armed forces of other nations. As witnessed in the recent Persian Gulf crisis, maintenance of vital US strategic interests hinges upon the development of social, economic, political, and military institutions favorable tc nur [sic] foreign policy objectives. The overall military role in this effort is termed foreign internal defense (FID). As a primary mission of the US Special Operations Command. FID is also an integral part of future USAF [United States Air Force] special operations endeavors. The USAF plays a significant role in FID by providing analysis and training in operations, maintenance, and logistical support to host-nation forces. This paper focuses on emerging operational requirements and whether or not these requirements necessitate the development and institutionalization of a structure within the Air Force Special Operations Command to develop, execute, and monitor Air Force efforts in foreign internal defense. Because the nature of confrontations most often associated with internal defense fall under the rubric of 'low-intensity conflict,' the question of maintaining an organic capability to train in counterinsurgency and guerrilla warfare is also addressed."
Air University (U.S.). Press
Moulton, John R.
1991-09
-
DE-CERTS: A Decision Support System For a Comparative Evaluation Method For Risk Management Methodologies and Tools
"A new approach was recently proposed to effectively and objectively evaluate risk management methodologies and tools for their suitability to a given organizational situation. The proposed approach, known as CERTS, is based on defining suitability in terms of criteria which in turn are described in terms of attributes and metrics. Using the Analytic Hierarchy Process, this thesis develops the CERTS approach into a Decision Support System [DSS], that could be used easily and effectively by organizations for selecting a risk management methodology or tool. The thesis also applies the developed DSS to three case studies to gain insights on the applicability of the DSS."
Naval Postgraduate School (U.S.)
Crump, Leonard A.; Pound, James G.
1991-09
-
Security Considerations in Distributed Systems
"This thesis investigates computer security considerations in distributed systems. In particular, it concentrates on assisting managers to gain an appreciation for what distributed systems are, and what are the inherent security issues in these systems. A survey of the literature on computer security was conducted to identify those issues unique to distributed systems. Although many controls are discussed, management must design and support a comprehensive security plan tailored to their unique organization."
Naval Postgraduate School (U.S.)
Rhead, Donovan R.
1991-09
-
Signature Verification for Access Control
"Access control to sensitive information is a vital concern for Department of Defense agencies. Current methods employed to control access are vulnerable to unauthorized users and frequently inadequate. The use of biometric access control devices, such as signature verification systems, may represent a solution to the access control problem. This thesis looked at two dynamic signature verification systems and compared their performance in general as well as under the different operating conditions of lined and unlined paper and morning and afternoon use. The two signature verification systems were the CIC [Communication Intelligence Corporation] system and the Sign/On system. Additionally, the thesis compared the CIC system under both sets of operating conditions using an inking stylus pen and a non-inking stylus pen. The experimental results indicated there was no significant difference between the CIC system using an inking stylus pen and the Sign/On system and that both systems had Type I error rates of less than 3% and Type II error rates of less than 1%. The results also indicated that the operating conditions test did not favor either system."
Naval Postgraduate School (U.S.)
Geshan, Susan Carol
1991-09
-
America's New National Security Strategy: New Scenario for Military Operations Research
This report "[p]rovides an analysis of President Bush's new national security strategy first unveiled in Aspen, Colorado on August 2, 1990, and General Colin Powell's 'base' force. If implemented, the new strategy and force structure would return a significant amount of U.S. ground and air forces to CONUS [Continental United States] where most would be demobilized. In the event of a major crisis, the U.S. would rely on active and reserve forces for a contingency response. The new national security strategy is based upon a revised Soviet threat and new international security environment which allows us to assume two years warning of a major ground war in Europe. During this two year period, the U.S. would reconstitute additional military capability. Outline of new strategy and 'base' force structure, transportation requirements, and whether or not the U.S. will retain a unilateral capability for overseas intervention. Discussion of parallel NATO [North Atlantic Treaty Organization] initiatives. Discussion of major issues, including: defining new goals and objectives in both programming and war planning, the effect of Operations DESERT SHIELD and DESERT STORM, new requirements for intelligence, requirements for decision-making, investment strategy and industrial conversion, reconstitution, and impact on military operations research and analysis."
Naval Postgraduate School (U.S.)
Tritten, James John
1991-06-11
-
PLO: A Victory in Terrorism?
"This study, using the Palestine Liberation Organization (PLO) as an illustrative case, investigates whether terrorism has been used to achieve political goals. The study is important because if terrorism has been used in this manner successfully, it may be emulated by others attempting to achieve similar goals. The study begins with a generic discussion of terrorism and its growth from a national to an international problem. The PLO is then used as a case study to address how successfully terrorism has served as a tool to advance organizational goals from the PLO's formation to the end of the 1980's. The case study discusses the history of the PLO. Then it examines specific terrorist acts aimed at achieving recognition of the organization as the sole representative of the Palestinians by the Palestinians, Arab States, the international community, and -- as a key element of PLO strategy--the United States. Conclusions and implications are drawn from this examination. In light of the recent Gulf War and its impact on the PLO, an epilogue is included."
U.S. Army Command and General Staff College
Blevins, Leonard C.
1991-06-07
-
U.S. Maritime Strategy in the North Atlantic and the Norwegian Sea: An Evolving Strategy in Need of Reassessment
"This thesis examines the evolution, and theoretical basis of the United States' maritime strategy in the North Atlantic and what is referred to as 'NATO's [North Atlantic Treaty Organization] Northern Flank.' The strategy associated with past Secretary of the Navy, John Lehman, is no longer considered applicable in the context of today's East-West relationship and is in need of reassessment. The paper then assesses the current, post Cold War situation and looks at future security interests the United States may have in the region. Additionally, the security and defense capabilities of our allies in the region are examined. Given the United States will remain closely linked with European security issues, by examining the successes and failures of past strategies and the strengths and weaknesses of our allies, one will be better able to develop a new strategy."
Naval Postgraduate School (U.S.)
Woodard, Jimmy C.
1991-06
-
Economics of War Planning: An Addition to the Clausewitzian Trinity
From the thesis abstract: "The attached monograph seeks to analyze in general terms the economic dimension in war planning. It focuses on the causes and implications of the often inescapable incompatibility between political/economic objectives and military aims. Much of what the monograph argues has only recently been discerned from Operations Desert Shield and Desert Storm. It was a modern war of the kind whose effects we anticipated in AirLand Battle, but resulted in compressing the doctrine into ways never before visualized. One preliminary use of this monograph is to help CINCs [Commander in Chief] and senior staff planners gain insight about economics as a vital element in military strategy and campaign plan formulation. Principally, the monograph seeks to analyze the economic domain through Clausewitz's framework of war. The author examines Clausewitz's trinity and suggests a modified version to his theory. Although the spectrum of the economic domain encompasses political, psychological, and military elements, the paper emphasizes the latter. This can be seen in the utility of finding economic features which may lead a planner to economic decisive points. The economic dimension is discussed to some degree, but only as a vehicle for continuity or for demonstrating the economic impact on military activities. The result of this research led the author to conclude that one cannot limit himself to the destruction of the enemy's forces as the main effort. Without considering other possible centers of gravity such as their economic capacity to wage war. Jean de Bloch once wrote that 'military writers look upon future war only from the point of view of attaining certain objects by destroying the armies of the enemy.' Switch his word writers for planners and you sense the issue before us. Bloch probably had Karl von Clausewitz or Henri de Jomini in mind when he wrote these words. It is time modern practitioners expand their thinking about the art of war to include economics."
U.S. Army Command and General Staff College
Karhohs, Jeffrey W.
1991-05-15
-
No More Vietnams: CORDS as a Model for Counterinsurgency Campaign Design
From the thesis abstract: "This monograph examines the Civil Operations and Revolutionary Development Support (CORDS) program in Vietnam as a potential model for the design of modern campaigns targeted against revolutionary guerrilla insurgencies. The Vietnam War ended in failure; yet it represents America's most recent major effort against a guerrilla insurgency. Because U.S. vital strategic interests are likely to be threatened by insurgent movements in the future, an analysis of our record in countering the Vietcong insurgency demands attention. Although the U.S. failed to develop a viable counterstrategy to the Maoist revolutionary guerrilla strategy of North Vietnam ('dau tranh'), CORDS was a step in the right direction, albeit too late. CORDS effectively tied together the myriad of existing political, informational, economic, and military pacification programs into a synergistic whole. Based on a high degree of bureaucratic and organizational flexibility, CORDS enjoyed a respectable degree of success in countering the Vietcong insurgency. In this regard, CORDS provides us with a good model for the design of counterinsurgency campaigns. It also demonstrates that counter insurgency efforts are more than just a military undertaking. Therefore, this paper recommends that the United States develop a national counterinsurgency policy on the CORDS model. DOD would be the lead agent in its development, with DOS being a primary contributor[.]"
U.S. Army Command and General Staff College. School of Advanced Military Studies
Wells, Gordon M.
1991-04-28
-
Impact of Terrorism on Air Force Logistics Command's Overseas Activities
"The incidence of international terrorism has been, increasing over time. Mary of these terrorist attacks have been directed against U.S. interests, personnel, and facilities abroad. The threat of future terrorist attacks has an impact on the work and quality of life of U.S. government personnel assigned overseas. To better understand the nature and scope of this issue, the authors first explore terrorism defining it, highlighting its principle causes, describing sample of active terrorist groups, and reviewing terrorist tactics and targets."
Air University (U.S.). Air War College; United States. Air Force
Callahan, Timothy P.; Mitchell, Robert N.
1991-04-23
-
Threat Assessment: The Role of Vulnerabilities
From the thesis abstract: "Threat assessment is crucial in each step of thinking about military strategy. Identifying political and military objectives, deterring or fighting, taking the offensive or the defensive, pursuing annihilation or attrition, using the direct or the indirect approach -- each of these basic choices in military strategy depends primarily on the threat. Indeed, without an actual or potential threat, it would be impossible and pointless to construct a military strategy. A fundamental difficulty in threat assessment is that, paradoxically, it is not just the enemy situation that defines the threat. The 'friendly situation' also defines the threat. People naturally tend to focus on the adversary's capabilities and intentions in gauging the threat. But an adversary can be a threat only in relation to one's own situation. An accurate and complete threat assessment requires an accurate and complete assessment of both the enemy and friendly situation. To show the critical but elusive role of friendly vulnerabilities in threat assessment, the author first describes a framework for thinking about threats. He then applies this framework to the origins of the Korean War. The outbreak of the Korean War is relevant because it involved, and may even have resulted from, a threat assessment based on mistakes about friendly capabilities and intentions. Finally, the author use the Korean War example to say that self-awareness of vulnerabilities plays a dual role in threat assessment: people use vulnerabilities not only to calculate the threat level and prescribe a response to the threat, but also to describe the threat in the first place."
National War College (U.S.)
Myers, Col
1991-04-11
-
International Terrorism Threats and How to Combat It
"International terrorism in recent decades has become a phenomenon which, although it cannot threaten the survival of states, can disrupt their national, political, economic and social process. International terrorism has attacked virtually every democracy, it threatens international travel, international commerce, international agreements, and it can threaten much more tomorrow. International terrorism has thrived on an atmosphere of weakness and disunity of the West. Terrorists and their supporters, sponsoring states, view the Western countries as uniquely vulnerable to their attacks. They know that the openness of Western societies affords them many possibilities for attack, and they assume that the West's humaneness and its emphasis on rule of law will inhibit a powerful response. This study provides main features of international terrorism in the last decade, a description of the major role of state-sponsored terrorism and the failure of Western nations to respond. Finally, the study concludes with set of recommendations to counterterrorism more efficiently."
Army War College (U.S.)
Bar-Maoz, Danny, 1948-
1991-04-03
-
Media's Role in Combatting Terrorism
"The media's coverage of terrorist events has been, for some time, the source of a great deal of discussion, controversy and debate. What the media's proper role should be surfaces after each and every terrorist incident as if it were a new phenomenon. The issues are continually written about, discussed and debated but never solved. Technology, with its capability for on the scene instantaneous coverage, has only served to heighten this controversy. This study project reviews the issues surrounding the media's profit motives, first amendment rights, the public's right to know and the authorities/counterterrorist organization's requirement for secrecy. It also briefly reviews the hostages' families' right to privacy throughout the terrorist incident. Finally this study makes several recommendations which could help to bring this aging problem to closure."
Army War College (U.S.)
Drugley, Gary P.
1991-04-01
-
U.S.- Japan Security Alliance: Will it Survive in the New World Order?
From the thesis abstract: "When George Bush took office in January 1989, he spoke of a new world order. The characteristics of this new world order may be more physical than the ideological Cold War. Some characteristics are emerging--resurfacing of old rivalries, greater interdependence between major powers, more weapons of mass destruction, information revolution, and the ascendancy of economic power over military power to name a few. These changes mandate a review of old alliances designed to implement a national security strategy or containment. One candidate is the Treaty of Mutual Cooperation and Security between the United States and Japan commonly referred to as the U.S.-Japan Security Alliance. Now that the Cold War is over, is this treaty still relevant? Given Japan's economic miracle, should the United States continue to provide Japan's national security and protect Japan's vital interests? This paper examines the treaty from three perspectives: -Is the U.S.-Japan Security Alliance still relevant in the emerging world order from a military perspective?"
Army War College (U.S.)
Gilbert, Russell L.
1991-04-01
-
Terrorism Effects on Turkey
"The purpose of this study is to add to the understanding of the dangers of international terrorism as those affect Turkey. Turkey has been the unique target of international terrorism since 1965. Taking into consideration her geographical location, social and economic potential, Turkey has always attracted the Soviet Union's attention. It will be probably the same in the future. Turkey is the only Islamic nation in NATO [North Atlantic Treaty Organization]. It is however, totally secular, democratic and based on free market principles. On the other hand, Turkey is a major obstacle for the ideological and military expansion of the Soviet Union towards the Middle East. This is the main reason why Turkey has been the main target of international terrorism. Turkey has been accumulating a very costly social experience in the last three decades. There is no shortage of circumstantial evidence of outside involvement in Turkish terrorism. International terrorism has been threatening not only Turkey, but also all democratic societies in the world. On account of this fact, the core of the solution, depends on an effective measure which will be taken by all democratic societies, governments and institutions."
Army War College (U.S.)
Olcay, Turan
1991-03-05
-
United States and Brazil: A Naval Partnership for the Twenty-First Century?
"This thesis explores the prospects for a U.S./Brazilian naval partnership for the twenty-first century. It examines the viability of existing multilateral agreements between the United States and Latin American countries for maritime defense of the South Atlantic. It argues that the existing agreements are outdated and ineffective, primarily due to a reduction in cold war threat. With a naval capability ranked among the highest in the third world, and historical naval ties to the United States from both World Wars, the Brazilian navy offers the possibility to assume a greater role in western defense. As a possible means to cultivate this beneficial relationship, a shift in emphasis from the current posture of U.S./Latin American multilateral hemispheric defense, to a focused bilateral U.S./Brazilian naval partnership is suggested. The thesis also suggests that national security threats to the hemisphere have changed to terrorism, narco-trafficking, the spread of high technology weapons, and the rise of ethnic tensions. These threats affect both the United States and Brazil, and could lead to closer cooperation in U.S./Brazilian naval relations."
Naval Postgraduate School (U.S.)
Collins, Harold H.
1991-03
-
U.S. Navy's Role in Joint Task Force (JTF) Counternarcotics Operations: 'Mission Impossible' or 'A Recipe for Success'
From the thesis abstract: "Title XI of the National Defense Authorization Act for 1989 assigned the Department of Defense responsibility to coordinate the detection and monitoring tenants of U.S. counternarcotics operations. After 18 months of joint detection, monitoring , and interdiction, coordinated through DoD's Joint Task Force (JTF), the results have been dispiriting at best. The U.S. Navy as the principle maritime/air detection and monitoring tenant has experienced problems with interoperability (technical equipment and operational methodology), intelligence hoarding, training, and parochialism amongst the various counternarcotics agencies. This paper highlights DoD's initial concerns about counternarcotics missions, limitations imposed by the Posse Comitatus Act, and discusses the U.S. Navy's role in JTF detection and monitoring operations."
Naval War College (U.S.)
Hagy, Richard E., II
1991-02-11
-
Special Forces Doctrine for Counternarcotics Operations
From the thesis abstract: "This monograph addresses the suitability of Special Forces doctrine for their primary wartime missions of Special Reconnaissance, Direct Action, and Foreign Internal Defense when considered for application in counternarcotics operations. This study is motivated by the continuing threat to national security presented by illegal drug trafficking and the increased role of the United States military requested by the people of the United States through their congressional representatives. A significant part of the military contribution to the so-called 'war on drugs' is being provided by U. S. Army Special Forces. This study begins with an analysis of the National Drug Control Strategy to derive what the tactical counternarcotics missions for Special Forces could be. The missions are related in terms of the primary wartime mission described by current U. S. Army doctrine for Special Forces Operations. The Army Counternarcotics Plan is analyzed to determine the constraints and restraints imposed on the mission by public laws and DoD resources. The capabilities for each mission are analyzed and then compared to an application in counternarcotics operations. The analysis of each mission evaluates how each mission recognizes political and diplomatic sensitivities, facilitates interagency activities in an affected country, and balances 'security of operations' with the operational tenet of synchronization. The study concludes that the doctrine for each mission is suitable when applied to counternarcotics operations only if law enforcement is not the purpose for interdiction. The study finds that each mission can accomplishes the tasks required for counternarcotics operations, except when called upon to perform law enforcement duties. The study finds the application of Special Forces in a Foreign Internal Defense mission to be most suitable for defeating drug trafficking when it is viewed as an insurgency."
U.S. Army Command and General Staff College. School of Advanced Military Studies
Realini, James P.
1991-01
-
Framework for Counterguerrilla Tactical Doctrine: A Theoretical Approach
"As the face of modern warfare changes, the threat of the appearance of guerrilla forces on the battlefield increases. Whether in the form of insurgent forces or partisan forces employing guerrilla tactics in support of conventional forces. their actions on the battlefield must be understood to be countered. Current operations in the Middle East lend special significance to an understanding of counterguerrilla operations. Guerrilla doctrine and tactics spring from an enormous body of theoretical works, not the least of which are the writings of Mao Tse-tung. On the other hand, our current counterguerrilla doctrine and tactics are not based in theory. They represent the 'how' without the 'why' of counterguerrilla warfare. Through the critical analysis of guerrilla and counter- guerrilla tactical operations encompassing guerrillas in support of both insurgent and conventional forces I have identified theoretical concepts that can be used in the construction of a framework for counterguerrilla operations. These concepts were evaluated against the criteria that determine the adequacy of theory, namely that they explain and describe this type of warfare, and that they are succinct, supportable, and retrodictive."
U.S. Army Command and General Staff College. School of Advanced Military Studies
Jordan, Stephen T.
1990-12-31?
-
NATO Burden-Sharing: Redefinition for a Changing European Threat
From the thesis abstract: "This thesis develops a model of burden-sharing that includes both operational and non-operational contributions to the common defense. Based on the 'Atlanticist' perspective of recognizing contribution, the model includes categories for standing forces, reserve forces, defense industrial capacity, reserve defense industrial capacity, and related defense factors that historically have not been recognized. This work addresses the availability of information suitable for the comparative evaluation of defense share within the model framework and identifies deficiencies in current data bases relative to the defense industrial capacities of participating nations. Recommendations for providing defense industrial base information center around tailoring OECD [Organisation for Economic Co-operation and Development] capacity utilization equations to defense industry parameters and reporting capacity and reserve capacity via the NATO [North Atlantic Treaty Organization] Defense Planning Questionnaire."
Naval Postgraduate School (U.S.)
Martello, Charles P.
1990-12
-
Strategy and Logistics for the New World Order
"An interdisciplinary analysis of the post-Cold War world to determine the optimal strategy to attain the national interests of the United States, and the requisite logistic structure to support that strategy. The optimal solution is found to be a strategy based on multinational defense centered on a permanent force of United Nations garrison port complexes. This multilateral force would be augmented by as small a national defense force as necessary to ensure national security. The thesis endeavors to reconnect the cultural and philosophical past of the United States with its immediate future. National interests are identified through examination of American Pragmatism and the philosophies of John Locke and Jean-Jacques Rousseau. To determine the current status of common defense, based upon the Foreign Military Sales system, an analysis of current data is accomplished. Future threats to the United States are examined with special emphasis on nuclear terrorism. The ability of Islamic nations in North Africa and the Middle East to produce significant quantities of uranium is demonstrated. The grave political as well as ongoing environmental consequences of this recent capability are discussed in detail."
Naval Postgraduate School (U.S.)
Gildersleeve, Cory W.
1990-12
-
NATO's Out-of-Area Dilemma
"NATO has a legitimate right to project force beyond the geographical boundaries of the NATO alliance. That NATO has been unwilling or unable to do so since 1949 results from a combination of factors relating to disagreements between the members over the geographical scope of the alliance, shifts in allied foreign policies and inter-allied tensions brought on by the Cold War. Iraq's invasion of Kuwait moved NATO's out-of-area problem from a subordinate position to the primarily threat facing the alliance. Historically, the Alliance felt that responses to out-of-area security threats should be dealt with on a unilateral basis, even when the Alliance has agreed that their collective vital interests are threatened. The dilemma for NATO is the lack of a unified approach to the out-of-area problem. NATO's boundaries are boundaries of obligation and not boundaries of confinement. Through a review of the language of the treaty and problems inherent in alliance relationships, this thesis will explore the differing perceptions of alliance members regarding the scope of the alliance and why NATO has survived for 40 years yet been unable to deal with the out-of-area problem."
Naval Postgraduate School (U.S.)
Theodorelos, Susan Lynn
1990-12
-
Potential Threats to Spanish Security: Implications for the United States and NATO
"Thirteen years ago, Spain held its first democratic elections since 1936. Prior to those elections, held in June 1977, Spain spent almost forty years under the dictatorship of Generalissimo Francisco Franco, who established an authoritarian regime in Spain following the Spanish Civil War (1936- 1939). Upon Franco's death in November 1975, Prince Juan Carlos de Borbon was crowned as King of Spain in accordance with Franco's 1957 announcement that the monarchy (abolished in 1931) would be restored after his death. Amidst problems ranging from inflation and unemployment to internal friction and, often, opposition from rightist elements, King Juan Carlos eased the Spanish nation-state through the transition into a democracy and, undaunted by an attempted coup by military rightists in 1981, supported what might then have been considered a fragile democracy. Now, nine years later, the entire region of Eastern Europe is in a state of transition, not totally unlike the transition Spain undertook over a decade ago. Thus, it seems particularly appropriate to examine the Spanish experience. The purpose of this study is to examine the security aspects of that experience. As such, it will address both internal security issues such as separatist movements, especially the Basque terrorist organization (ETA), and external security issues such as those posed by Gibraltar, Ceuta, Melilla, and, in spite of the tendency to dismiss it as irrelevant to Spanish security, the Soviet Union. In addition, as the title suggests, this study will address how Spain's security posture can be expected to affect the United States and NATO [North Atlantic Treaty Organization], particularly as Spain finds a place within the context of a rapidly changing New Europe."
Naval Postgraduate School (U.S.)
Adams, Tamara K.
1990-12
-
Identifying Security Problems and Devising Control Solutions in a Local Area Network: A Case Study Approach
"This thesis investigates the requirements for establishing security criteria in designing and developing a local area network (LAN) for an aviation squadron. In particular, it concentrates on the security problems and control issues in the design of a LAN. A survey of the security literature on computer security was conducted to develop a model for identifying security problems in a local area network and devise control solutions. A case study was written based on the literature review and previous experience in the aviation community. Although many controls solutions are discussed, adequate planning, common sense and proper user training all play an integral part in developing an atmosphere of security awareness in networks."
Naval Postgraduate School (U.S.)
Evans, Gary John
1990-09
-
Sheltering the Genie: The LIC Threat to Nuclear Systems
"The decreasing tension between the United States and the Soviet Union obscures a harsh reality, in a world where the probability of a nuclear exchange between the two superpowers is at its lowest point since the early 1950s, [American nuclear] weapons are more [vulnerable] than ever to 'low intensity' threats. Some terrorist organizations have become sophisticated enough to actually steal or destroy a warhead, while the Special Purpose Forces of the Soviet Union retain the [ability] to curtail the reliability of American strategic systems from within the United States or Europe. These two very real threats are derived from the same factors - the openness of American society, and the enormous difficulty of providing security for these weapons. Because it is difficult to separate terrorism issues, the analysis of possible outcomes goes beyond the weapons themselves to include nuclear materials and power plants."
Naval Postgraduate School (U.S.)
Shemella, Paul
1990-08
-
Amphibious Operations: The Operational Response to a Third World Crisis
From the thesis abstract: "With the current changes in world structure, alliances and the reduction in the size of the armed forces of the U.S., operational art and AirLand Battle become increasingly important as concepts. FM 100-5, Operations, published in 1986, establishes what operational art is, yet this concept is usually associated with a European scenario and mature theater of war. With the current changes taking place in the world, it becomes increasingly possible that future crises and commitment of forces will be in the Third World region. Even with this change in focus, an understanding of the operational level of war is important. The purpose of this study is to determine if amphibious operations could be utilized in the Third World to exercise operational art and execute the operational level of war. Given that the majority of conflicts in the Third World will be in an immature theater, this suggests conditions that will require flexibility, self-sustainment, and a force capable to meet multiple threats. The study draws on the main concepts of operational art from FM 100-5, historical examples of amphibious operations as operational art, and how these operations may be utilized in the future in conjunction with the military options available to the NCA [National Command Authority]. The conclusions show that amphibious forces and amphibious operations offer a potent operational response in a Third World theater of operations. However, this type of response may not be the total answer. Force ratios, time-distance relationships, and response time are key issues that must always be considered."
U.S. Army Command and General Staff College. School of Advanced Military Studies
Driest, Charles W.
1990-06-07