Advanced search Help
Resource Type or Special Collection is Theses & Research Reports
Clear all search criteria
Only 2/3! You are seeing results from the Public Collection, not the complete Full Collection. Sign in to search everything (see eligibility).
-
Study of Applying the Atmospheric Release Advisory Capability to Nuclear Power Plants
From the thesis project proposal: "Each utility licensee for a nuclear power reactor is required to minimize the adverse effects from an accidental radionuclide release into the atmosphere. In the past the ability to forecast quantitatively the extent of the hazard from such a release has been limited. Now powerful atmospheric modeling techniques are available to assist nuclear reactor site officials with greatly improved assessments. [...] The purpose of this project is to examine the ways and means of adapting ARAC [Atmospheric Release Advisory Capability] for application to many nuclear power reactors widely dispersed across the nation. The project will emphasise the management aspects, including government-industry relationships, technology transfer, organizational structure, staffing, implementing procedures and costs. Benefits and costs for several alternative systems will be compared. The following questions will be addressed: 1. Can ARAC technology developed at LLL [Lawrence Livermore Laboratory] be successfully transferred for broad application to the nuclear power industry? 2. Who should operate the ARAC central facility? ?. 3. What organization and staffing is needed for a fully operating central facility? 4. What is required to establish ARAC at a utility site? 5. What are the costs and benefits associated with the several ARAC options to service a large number of nuclear power plants?"
Lawrence Livermore National Laboratory
Orphan, Richard C.
1978-06-05
-
Tactical Nuclear Planning Considerations: Recent Perspectives
From the thesis abstract: "Approval to use nuclear weapons in some future war may require careful planning. One of the National Command Authority's concerns in the event of another war in Europe is collateral damage resulting from nuclear weapons use. The United States Army policy for the constrained use of nuclear weapons emphasizes this national concern. This study attempts to determine the planning factors which should be considered by a corps commander before he requests approval to make the initial use of nuclear weapons in Europe. The investigation is focused on an analysis of current United States and NATO [North Atlantic Treaty Organization] policies, doctrine, and procedures. Investigation reveals that peacetime planning for the use of tactical nuclear weapons should be done and that current procedures may require modification if adequate plans are to be prepared. Further examination discloses that peacetime plans based on national and NATO command authorities' policy guidance may provide the principal information from which to prepare a justification for the use of nuclear weapons."
U.S. Army Command and General Staff College
McWhirter, Julian H.
1976-06-11
-
Military Contingency Operations: The Lessons of Political-Military Coordination
From the thesis abstract: "This thesis investigates the utility of conventional military intervention by Western powers in achieving their short-term foreign policy aims. Through a survey of the literature of political-military coordination, case studies of contingency force interventions, and comparative analysis of the interventions, factors fundamental to successful contingency operations are developed."
U.S. Army Command and General Staff College
Clark, Wesley K.
1975-06-06
-
Theft and Diversion of Special Nuclear Materials and Military Nuclear Weapons
From the thesis abstract: "Theft and diversion of nuclear materials suitable for construction of nuclear explosives or dispersal weapons has received considerable recent attention in the public domain. A design study was undertaken to improve the security systems for nuclear materials and weaponry. In addition to an analysis of the threat, calculations are presented to quantify the amount of material necessary to produce a significant nuclear yield, as well as models to deduce a probability of diversion and hazards associated with plutonium dispersion. These methods were closely patterned after a similar analysis contained in the recently released Reactor Safety Study (WASH 1400). Several event trees were considered with different initiating events representing theft or diversion at different stages of nuclear materials processing or utilization. Unlike the Reactor Safety Report, fault trees were of limited use in assigning probabilities-- especially for the initiating event itself. Instead, probabilities were estimated based on models which were constructed from available data on similar terrorist activities such as airline hijackings, mass murders, and other equivalent antisocial acts. These techniques had only limited success and predicted only a gross upper bound for final probabilities. Relative risk levels are shown to be approximately an order of magnitude less than the risk posed by most common accidents."
Air Force Institute of Technology (U.S.)
Bjurstrom, Richard G.; Casady, John T.; Careway, Harold A.
1975-03-12
-
Evaluation of Remotely Piloted Vehicles in the Antiarmor Role
From the document abstract: "There exists a need in the United States Army for a weapons system that is capable of engaging armored vehicles at ranges far exceeding the range of the main armament of the tank. This need is currently being filled by the TV guided bomb and the helicopter mounted TOW [Tube-launched, Optically-tracked, Wire command] missile. However, both of these systems suffer from the drawbacks of high cost and high vulnerability to antiaircraft artillery and missiles. The Remotely Piloted Vehicle (RPV) is a new weapons concept that is examined and compared with the two existing systems. The RPV is found to be far less expensive and much less vulnerable to antiaircraft fire but suffers some possible problems in an electronic countermeasures environment. Some possible solutions to this ECM [Electronic Counter Measures] problem are offered which promise to make the RPV a superior antitank weapon when used as a laser designator for a terminally guided, laser homing weapon."
U.S. Army Command and General Staff College
1974-01-10
-
Tactical Nuclear Weapons: Deterrent or Detriment and Inevitable: A Comprehensive Test Ban Treaty, Two Monographs
"The report discusses the benefits and drawbacks of a tactical nuclear capability and suggests that the judgment of the military, the warfighting experts, should be used in implementing programs to maintain warfighting capability. The report also discusses the nature of an eventual test ban codified in the Limited Test Ban Treaty and Nuclear Non-Proliferation Treaty. The discussion touches on the pressures for the nuclear nations to stop testing, the problems of nuclear proliferation, and agreements to a ban on nuclear testing, as well as the asymmetries between the nuclear programs of the US and USSR."
Army War College (U.S.)
Franklin, Joseph P.
1973-06-05
-
Study of the Need for Arrest Powers by Federal Troops Performing Civil Disturbance Missions
A thesis presented to the Faculty of the U.S. Army Command and General Staff College in fulfillment of the requirements of the Individual Research Elective Program. From the thesis abstract: "The question of employing Federal troops in domestic situations has both political and legal implications. The Constitution gives the President power to use troops in support of controlling domestic disturbances. Title 10, U. S. Code specifies three main prerequisites for Federal intervention in local disorders: at the request of appropriate state authorities; when states are unable to maintain order; or when states are unwilling to enforce the law. The President also has the power to use military force as a result of other specific legislation which permits use of troops to enforce civil rights, protect Indian reservations and maintain order on public lands. Intervention to protect Federal property is an accepted principle."
U.S. Army Command and General Staff College
Stem, David H. (1938-1987)
1970-10
-
Psychological Operations in Vietnam: Indicators of Effectiveness at the U.S. Army Division Level
From the Thesis Abstract: "In this study the research problem was to identify specific psychological operations (PSYOP) feedback indicators of effectiveness applicable at the U.S. Army division level in the Vietnam-type conflict. The purpose of the study was to contribute towards filling what was believed to be a gap in the existing guidance and doctrine available to PSYOP personnel in the field at the tactical unit level. The scope of the study was limited to U.S. Army divisions in Vietnam during the period 1965-69 operating within the political, economic, and military constraints characterized by that time-frame. This study was conducted following the principles and techniques of systems analysis combined with case studies, surveys, and documentary research. Primary and secondary reference material and data were gathered from essentially two general areas: (1) case studies of the U.S. Army divisions in Vietnam, and (2) a survey of selected student officers in the 1968-69 class of the U.S. Army Command and General Staff College (CGSC) at Fort Leavenworth, Kansas."
U.S. Army Command and General Staff College
Morris, R. P.
1969
-
Cyberspace as a Complex Adaptive System and the Policy and Opertional Implications for Cyber Warfare
From the thesis abstract: "The overall implication of depicting cyberspace as a complex, adaptive ecosystem is that it provides an avenue for further insight and understanding of the complexities associated with operating in cyberspace. This renewed reality highlights a source of vulnerability, a potential threat to national security, due to the intermixing of public and private infrastructure and the reliance of the United States Government (USG) on infrastructure owned and operated by the private sector. The fact that most, if not all, of the underlying infrastructure for seamless cyber interactions are controlled and managed by non-state entities means that the USG most recognize the power of the private sector in cyberspace. This represents a disturber of the familiar international order because the major actor that constitutes and defines international relations (the state) is not able to control cyberspace or to insulate itself from the implications of the new cyber realities. This recognition suggests that adopting a policy position that is primarily offensive in nature better serves the US, especially in regards to the protection of the cyber ecosystems of the private sector. Specifically it proposes that offensive cyber attacks should not be limited to only the authorized entities of the United States military, but should be expanded to include authorized entities in the private sector. Central to this proposition is the introduction of a new element of operational art specific to the cyber realm to guard against unintended consequences--the operational art element of precision."
U.S. Army Command and General Staff College. School of Advanced Military Studies
Olagbemiro, Albert O.
-
MOVES Institute [website]
"The Modeling, Virtual Environments and Simulation Institute was founded in 2000, but MOVES as an academic program was founded in 1996 with the launch of the Master of Science program, followed by the Doctoral program in 1999. The Institute is intended to be a mix of the strong analysis tradition of the Operations Research Department and the simulation, training, and software development expertise of the Computer Science Department. The Institute has its roots in the NPSNET Research Group founded in 1986. NPSNET was the original low-cost, government owned, SIMNET and DIS compatible visual simulator. It was widely used around the world and was integrated into many government programs over its lifetime. The Institute was also the birthplace of America's Army. Sponsored by the Office of the Assistant Secretary of the Army: Manpower and Reserve Affairs, America's Army was our first venture into the use of video game technology for defense applications. Development has since left the Institute, but many millions of players have downloaded and played America's Army since 2000. Recent initiatives include the Extensible Modeling and Simulation Framework (XMSF) that uses web services for interoperability of M&S systems, and also the Delta3D Open Source Game-Based Simulation Engine."
Naval Postgraduate School (U.S.)
-
Center for Homeland Defense and Security [website]
"The Naval Postgraduate School Center for Homeland Defense & Security (CHDS) has been the nation's premier provider of homeland security graduate and executive level education since 2002. NPS and the U.S. Department of Homeland Security are partnering to pioneer the development and delivery of homeland security education programs for governors, mayors and senior homeland security leaders from across a wide spectrum of disciplines in local, tribal, state and federal government, and the military."
Naval Postgraduate School (U.S.). Center for Homeland Defense and Security
-
Dealing with Terrorist Sanctuary in Pakistan's Federally Administered Tribal Areas
"We must use all elements of our national power to support the development and execution of an appropriate Pakistani counterinsurgency strategy that is attenuated by social, state, and global realities to eliminate Taliban and al Qaeda sanctuary in the Federally Administered Tribal Areas. This paper describes the problem of terrorist sanctuary in the FATA in context of the forces that shapes the area: The Pashtun society, the state and counter-states, and globalization. After analyzing the problem with established counterinsurgency models I am able to develop an appropriate strategy for success, and conclude with some specific recommendations. Pakistan's counterinsurgency strategy must simultaneously provide security and targeted development at the village level, using and reinforcing existing Pashtun tribal structure. The American Ambassador, supported by a robust country team, USCENTCOM, and other agency experts must develop an appropriate supporting counterinsurgency plan, based on this strategy. This plan must be expeditiously approved, resourced, and supported by the interagency, the President, and Congress, then implemented by, through, and with the Pakistani government to be effective."
Army War College (U.S.)
Nilsson, Kirk H.
-
Scholarship for Service: IA Tutorials and Workshops for Educators
"In 2003 and 2004 the Center for Information Systems Security Studies and Research (CISR) at the Naval Postgraduate School organized tutorials and workshops with the intent of increasing the capacity of the United States higher education enterprise to produce professionals in the fields of Information Assurance (IA) and computer security by hosting a series of workshops for education in Information Assurance. The target audience of the workshops has been 2-year, 4- year college, and university-level educators who have responsibility for teaching curricula that are, or could be, related to Information Assurance issues. Participation by instructors from institutions serving under-represented groups was high. Attendance at the tutorials was maximized both years. The participants indicated that they benefited substantially from both the tutorials and the subsequent gathering of IA educators at the Workshop on Education in Computer Security (WECS)."
Naval Postgraduate School (U.S.)
Irvine, Cynthia E.; Falby, Naomi B.
-
Winning the War of Perceptions: A Regional Approach to Implementing Interagency Strategic Communications
"The U.S. faces three primary strategic communication challenges. They include the lack of a viable national-level interagency communications strategy; domestic political polarization and its negative effects on the unity of a national message; and the global dynamics of the information environment. Compounding these challenges is the fundamental shift in the very nature of the strategic environment in which the U.S. operates as it seeks to support its allies, check its strategic competitors and defeat its enemies. Many scholars refer to this shift in contemporary conflict and the associated change in operating environments as Fourth Generation Warfare (4GW), or the blurring of lines between war and politics, peace and conflict, and battlefield and safety."
Army War College (U.S.)
Beevers, Matthew P.
-
Intelligence and Law Enforcement: Bridging the Cultural Divide
Dahlstrom looks at the mission of the Department of Homeland Security to analyze and promulgate information on terrorist threats to the government and people of the United States. From the thesis abstract: "To be successful, the DHS must fuse information provided by national-level intelligence organizations with that from federal, state, and local law enforcement agencies (LEAs)." Dahlstrom looks to the military's entrance into the war on drugs for insights into information sharing and cooperation efforts across federal, state and local law enforcement agencies. He explains that "despite numerous setbacks, the war on drugs did produce cases where cooperation between national-level intelligence and law enforcement organizations led to success," and asks whether the the Department of Homeland Security will learn the right lessons from the war on drugs or be destined to make the same mistakes?
National Defense University
Dahlstrom, Eric L.
-
Stemming the Flow of Improvised Explosive Device Making Materials Through Global Export Control Regimes
From the thesis abstract: "The effects of Improvised Explosive Devices (IEDs) continue to be felt throughout the world, and especially in battlefields, such as Afghanistan. The United States currently leads the counter-IED effort through various demand side efforts, such as those led by JIEDDO [Joint Improvised Explosive Device Defeat Organization] and Project Global Shield. The purpose of this thesis was to determine the feasibility of a new supply-side effort to counter IEDs through global export control similar to the multilateral export control regimes of Weapons of Mass Destruction (WMD) and missile technologies. A comparative method was used that utilized the existing regime literature for success and effectiveness, and then measured those regimes against six variables that focused on technology, as well as the organizations, which provided the framework to determine the success and feasibility of a new regime that focuses on lower technology items. The results show that although IEDs continue to be a presence throughout the world, it lacks the grander threat similar to that of WMD technology to make a new regime successful. Further, the results show that IED technology and material are difficult to classify and track, which makes global export control efforts extremely difficult."
Naval Postgraduate School (U.S.)
Quihuis, Nicholas R.
-
Indicators of Terrorism Vulnerability in Africa
From the thesis abstract: "Terrorism in Africa has increased more than six-fold since 1997, with an increase in lethality as well. The U.S. government has spent billions of dollars to counter this increase in terrorism; however, terrorism in Africa has increased seemingly unabated. Furthermore, these methods used to counter-terrorism have been reactionary as opposed to preventative. To address the terrorism threat to a country, we must first understand which characteristics make a country vulnerable to such a threat. A confirmatory analysis bridges the inter-discipline gap between quantitative and qualitative fields through as assessment of observational findings about the causes of terrorism. An exploratory analysis evaluates additional variables to find indicators with predictive ability. Lastly, a classification analysis further analyzes these indicator relationships in order identify break points where vulnerabilities are most detected. Ultimately, these indicators should aid in providing key strategic options to reduce the terror threat and vulnerabilities across Africa."
Air Force Institute of Technology (U.S.)
Hill, Raymond J.
-
Towards Quantifying Programmable Logic Controller Resilience Against Intentional Exploits
From the thesis abstract: "Supervisory Control and Data Acquisition (SCADA) systems control and monitor services for the nation's critical infrastructure. Recent cyber induced events (e.g., Stuxnet) provide an example of a targeted, covert cyber attack against a SCADA system that resulted in physical effects. Of particular note is how Stuxnet exploited the trust relationship between the human machine interface (HMI) and programmable logic controllers (PLCs). Current methods for validating system operating parameters rely on message exchange and network communications protocols, generally observed at the HMI. Although sufficient at the macro level, this method does not provide detection of malware that exhibits physical effects via covert manipulation of the PLC, as demonstrated by Stuxnet. In this research, an alternative method that leverages direct analysis of PLC input and output to derive the true state of SCADA end-devices is introduced. The behavioral input-output characteristics are modeled using Petri nets to derive metrics for quantifying resilient properties of systems against malicious exploits. The results yield metrics that are applicable towards quantifying resilience in PLCs and implementing real-time security solutions. These findings enable detecting programming changes that affect input and output relationships, identifying the degree of deviation from a baseline program, and minimizing performance losses against disruptive events."
Air Force Institute of Technology (U.S.)
Bushey, Henry W.
-
Information Warfare & Information Operations (IW/IO): A Bibliography
This bibliography, maintained by the Dudley Knox Library at Naval Postgraduate School, contains a compilation of links to books, periodicals, and documents, theses and technical reports on a variety of information warfare and operations topics. Also included are links to doctrinal publications, bibliographies, and internet sites.
Naval Postgraduate School (U.S.). Dudley Knox Library
Marlatt, Greta E.
-
Best Practices in User Needs/ Requirements Generation
"A process framework for the front-end of product development was developed. The framework covers the process space from an initial need (or recognition of need) to the decision for a product/development program launch. The framework focuses on the activities required for the development of requirements needed for an investment decision. The framework was developed through a thorough examination of the literature relating to product development and addresses not only the activities required to traverse the front-end, but also metrics and a process maturity matrix by which an organization can be evaluated. Using case studies of the front-end processes of eight commercial organizations and eight military organizations in addition to the US Air Force, the framework was tested. All of the organizations demonstrated the existence of the four fundamental activities contained in the framework but an examination of the existing process enablers revealed various interpretations of required features. The maturity matrix was used to evaluate each of the organizations (commercial and military) relative to the front-end process in the framework. The analysis revealed a significant gap between commercial and military process performance. The existence and application of the process enablers was significantly correlated with the organization's performance in the four process activities of the framework. The implications of the research indicate that military organizations need to reevaluate their current practices in the front-end and the application of process enablers within their organizations. Further, military organizations should reexamine if the current process structure for system development in the front-end need significant changes."
United States Air Force Academy
Wirthlin, Joseph R.
-
Unmanned Ground Vehicles in Support of Irregular War: A Non-Lethal Approach
From the Document: "Due to the unique demands of Irregular Warfare (IW), a variety of technological shortfalls, and the legal, moral, and ethical issues surrounding armed unmanned system capabilities, Unmanned Ground Vehicle development should be focused at meeting the challenges associated with future warfare as a Reconnaissance, Surveillance, and Target Acquisition (RSTA) platforms, not as systems capable of employing lethal force on the battlefields of tomorrow."
Marine Corps Command and Staff College (U.S.)
Moreau, David M.
-
Countering State-Sponsored Cyber Attacks: Who Should Lead?
"The threat of a state-sponsored or organized-group (e.g., terrorist) cyber attack is a growing concern for many government and private strategists. Many historians and military experts believe that in future wars, seizing and dominating information operations (including cyberspace) will be critical to winning the war. Indeed, the domination of information could be as important as dominating the air, sea and land battles today. Understanding the role of cyberspace is critical to an effective national defense. We are quickly approaching an era when information systems will be being controlled, managed, and protected as weapon systems. If the United States is attacked, it is a foregone conclusion that the United States will retaliate and make every attempt to seize the offense with an active defense."
Army War College (U.S.)
Anderson, Levon (Rick)
-
Stealth, Precision, and the Making of American Foreign Policy
From the thesis abstract: "The end of the Cold War greatly reduced the risk that a limited, peripheral conflict would escalate to a major war between the great powers. It would seem, with this constraint removed, that the United States should be freer to intervene militarily in the affairs of other peoples. Indeed, in the last decade of the twentieth century, the United States intervened militarily as many times as it had during the full forty years of the Cold War. Alternatively, the decision to intervene had always been based on the best interest of America. With the fall of the Soviet Union, America's most vital national interest, its security, was assured. Logic would dictate a less-interventionist foreign policy, as the need to intervene was drastically reduced. This study examines the paradox by investigating the presidential decision making process that leads to military intervention, determining the relative weight for intervention before and after the Cold War, and assessing the importance of technology - in this case the maturity of the combination of stealth aircraft and precision guided weapons - that made the president's decision to intervene after 1990 easier."
Air University (U.S.). School of Advanced Airpower Studies
O'Mara, Raymond P.
-
Homeland Security Affairs Journal [website]
"Homeland Security Affairs is the online journal of the Center for Homeland Defense and Security (CHDS) at the Naval Postgraduate School and is the nation's preeminent peer-reviewed journal providing a forum to propose and debate strategies, policies, and organizational arrangements to strengthen U.S. Homeland Security. The instructors, participants, alumni, and partners of CHDS represent the leading subject matter experts and practitioners in the field of Homeland Security. E-published by issue, Homeland Security Affairs captures the best of their collective work, as well as that of scholars and practitioners throughout the nation, through peer-reviewed articles on new strategies, policies, concepts and data relating to every aspect of Homeland Security. These articles constitute not only the 'smart practices' but also the evolution of Homeland Security as an emerging academic and professional discipline."
Naval Postgraduate School (U.S.). Center for Homeland Defense and Security
-
Officer Safety: A Strategy for Local Law Enforcement Encountering the Sovereign Citizen Movement
"The 9/11 Commission's Report observed that 'imagination is not a gift usually associated with bureaucracies, yet, imagination is precisely what is needed to address emerging threats'. The Sovereign Citizen Movement is an example of an emerging threat within the broader framework of homeland security strategies. We must consistently revisit our priorities and ensure our domestic approach can address multiple types of violent extremism. Addressing this emerging threat can create a preventive strategic plan built upon existing federal, state, and local partnerships and regional collaboration. This threat 'requires the expertise and resources from all relevant agencies' , including, the Federal Bureau of Investigations, the Joint Counterterrorism Task Force, the Fusion Centers, the State Police, and local law enforcement. We must be vigilant in identifying, predicting, and preempting emerging threats; we must work together supporting local capabilities and programs on the frontlines to address problems of national concern."
Naval Postgraduate School (U.S.). Center for Homeland Defense and Security
Welch, Michael
-
Illegal, Unreported, and Unregulated Fishing in Oceania
From the thesis Abstract: "Illegal, unreported, and unregulated fishing (IUUF) is a prevalent issue in Oceania, a vital region to the United States from a military, economic, and diplomatic perspective. IUUF activity is threatening to erode U.S. influence and poses significant homeland defense and security challenges. This thesis addresses the question of how the United States and its partnering nations can better address the IUUF threat in Oceania. A variety of academic research, journal articles, scientific studies, laws and treaties, domestic and international government documents, and non-government reports were analyzed to answer this question. The analysis explored counter-IUUF mitigation efforts underway in Oceania and, in doing so, outlined the region's counter-IUUF strategy. A six-step strategic analysis tool was applied to evaluate Oceania's counter-IUUF strategy and identify actions that the United States and its partnering nations can take to strengthen its effectiveness."
Naval Postgraduate School (U.S.)
Leahey, Mark
-
Cuban Subversion: Shadow Over Latin America
From the thesis abstract: "Latin America is currently undergoing a great social upheaval, and the resulting internal disorder, political instability, and seething discontent make it ripe for Communist exploitation. The establishment of a Communist regime in Cuba, with a dictator who is determined to spread his revolution throughout Latin America, presents a menace to the security of the United States and the entire Western Hemisphere. This thesis examines the nature and extent of the threat of Cuban subversion and the effectiveness of United States policy in countering it. As a result of a massive program of economic and military assistance by the Soviet Union, as well as acceptance of Fidel Castro's leadership by the Moscow-oriented Communist Party leaders of Latin America, Cuba is today recognized as the headquarters and base for subversive activity throughout the Western Hemisphere. The techniques utilized include an extensive propaganda campaign; training of young Latin American Communists in subversive activities; infiltration of political, social, and economic movements within Latin American governments; and calculated acts of violence and terrorism, ranging from strikes, demonstrations, and riots to arson, bombings, kidnappings, assassinations, and executions. At first, the attitude of the United States toward Castro was one of guarded friendship and good will. As the true nature of his activities began to manifest themselves, however, the United States began to take measures to counter the threat. Initially, there was some fumbling, evidenced in particular by the debacle of the Bay of Pigs invasion."
Army War College (U.S.)
Piehl, Robert H.
1966-04-08
-
Irregular Warfare in a Nutshell
From the thesis abstract: "This is a critical, yet brief, analysis of combat in the current environment. It is not a study of 'war' in its well known mold, rather it is a study of combat as it is being fought. It has been prepared by two professional soldiers of different nations. It does not relate specifically to the problems of any country, but it aims to provide a few guideposts that any professional soldier of the Free World could use in his search for a solution to his specific problems. While recent historical examples have been used to illustrate; none are covered completely - for that there are many detailed accounts available. Bringing the whole together in an understandable arrangement was the aim of this study."
U.S. Army Command and General Staff College
Holliday, Sam C.; Dabezies, Pierre C.
1962-06-13
-
Psychological Warfare: Objects and Channels of Attack in a War of Nerves
From the thesis abstract: "Psychological warfare has many definitions. For this discussion the broad definition is used wherein psychological warfare may take any form serving to reduce the enemy's military and civilian will to resist. [...] Present and future concepts of a psychological war of nerves may find this type of warfare the major operation in itself with a few military operations and battles superimposed to accomplish aims and objectives. A psychological war will be waged aggressively long before and continue long after the shooting phase. [...] Psychological warfare as a national weapon can, unless proper defense against it is developed, be the most potent form of a destructive weapon a nation could possess against an enemy. Psychological warfare properly waged could produce such unrest and revolt in a country as to render it militarily useless."
U.S. Army Command and General Staff College
Sommers, Lawrence E.
1949-05-31
-
National Defense: Its Place in Our Political System
From the Combined Arms Research Library Digital Library webpage abstract: "Looks at the Constitution of the United States, its prominence, and importance, and its relationship to the armed forces, war power and the president's power to direct national strategy. Also explores economic factors in defense and security in addition to the American outlook on security and its relation to nationalism, national unity and national prestige."
U.S. Army Command and General Staff College
Skeldon, James H.
1949-05-31