Advanced search Help
Resource Type or Special Collection is Theses & Research Reports
Clear all search criteria
Only 2/3! You are seeing results from the Public Collection, not the complete Full Collection. Sign in to search everything (see eligibility).
-
Models for Transmission and Control of Bioterroristic Epidemics
"A deterministic model for control of a bioterrorist epidemic in a large nonhomogeneous population is presented. Primary considerations in model development are the representation of a large nonhomogeneous population of individuals and the implementation of the model for quick numerical execution. The model represents the effect of mass pre-vaccination and mass vaccination during the epidemic. It is recognized that the vaccination can result in life threatening complications. The model also represents the effect of tracing and quarantining as control options. The model has been implemented in Java for a Web-based educational tool. Numerical examples (pp. 12-15) illustrate possible behavior of populations exposed to such a disease as smallpox. Various disease controls such as vaccination and case tracing are studied."
Naval Postgraduate School (U.S.)
Gaver, Donald P.; Jacobs, Patricia A.; Simons, Robert . . .
2004-07
-
Use of System Dynamics Analysis and Modeling Techniques to Explore Policy Levers in the Fight against Middle Eastern Terrorist Groups
"The objective of this project is to use analysis and modeling techniques of Systems Dynamics to capture the causal relationships of Middle Eastern groups' terrorist activities against the U.S. based on their ideological drivers, as well as the effect of U.S. policies that create dynamics and affect performance and outcomes. The main focus of this analysis is the terrorist groups' human resources. The hypothesis is that Middle Eastern terrorism against the U.S. is affected by the U.S. level of military presence and/or investment in the Middle Eastern nations. A considerable and lasting reduction in fatalities originated by Middle Eastern groups' terrorist attacks against the U.S. can be achieved through a policy that reduces both the human resources available to terrorist groups and their attack capability (level of sophistication). The study covers the implications of this resource reduction policy, which may include incremental military investment, defection motivators, antiterrorism and the use of counter-terrorism operations. These operations will reduce the sophistication as well as the recruitment rate to levels where cells' functionality will be impaired, and thus unable to carry high lethality attacks."
Naval Postgraduate School (U.S.)
Alcantara Gil, Benigno R.; Matsuura, Masahiro; Monzon, Carlos Molina . . .
2005-06
-
Explosive Detection Technologies for Airline Security
"Aviation Safety and Security has become a topic of paramount national concern.
Informed decision making requires an appreciation of trends in technology in response to projected future terrorist activities, In the area of security, explosive detection is made possible by a bewildering array of newly offered equipment from industrial vendors and government and academic laboratories. Techniques such as ion mass spectrometry, gas chromatography, electromagnetic induction, thermal neutron analysis, fast pulsed neutron analysis, infrared cameras, x-ray computer assisted tomography, transmission and back scattered tomography and microwave radar techniques, as well as the use of dogs, for the detection of explosives, drugs and other contraband are offered in a bewildering variety to the airline industry. It is hoped that this document will serve as a primer describing the science and engineering of what is involved in the various technologies. Here, the goal is not so much a scientific engineering text, but a translation of scientific and engineering descriptions into a language which the educated general public can understand. This primer has been written with two levels in mind. There would be one level which could be appreciated by a non-technical person, and a second level which could be appreciated by a technical person who is being introduced into a field not his own."
Naval Postgraduate School (U.S.)
Maruyama, Xavier K.
2001
-
Optimizing Electric Grid Design under Asymmetric Threat (II)
"This research extends our earlier work to improve the security of electric power grids subject to disruptions caused by terrorist attacks. To identify critical system components (e.g., transmission lines, generators, transformers), we devise bilevel optimization models that identify maximally disruptive attack plans for terrorists, who are assumed to have limited offensive resources. A new model captures the dynamics of system operation as a network is repaired after an attack, and we adapt an earlier heuristic for that model's solution. We also develop a new, mixed-integer programming model (MIP) for the problem; a model that can be solved exactly using standard optimization software, at least in theory. Preliminary testing shows that optimal solutions are readily achieved for certain standard test problems, although not for the largest ones, which the heuristic seems to handle well. However, optimal solutions do provide a benchmark to measure the accuracy of the heuristic: The heuristic typically achieves optimality gaps of less than 10%, but occasionally the gap reaches 25%. Research will continue to refine the heuristic algorithm, the MIP formulation, and the algorithms to solve it. We also demonstrate progress made towards a graphical user interface that allows performing our interdiction analysis in a friendly environment."
Naval Postgraduate School (U.S.)
Salmeron, Javier; Wood, Kevin; Baldick, Ross
2004-03
-
SITREP: The NPS Maritime Domain Protection Newsletter, October 2004
In this issue: "The Naval Postgraduate School Maritime Domain Protection Task Force Threat and Vulnerability Symposium Report was completed 30 September. The report summarizes findings from the 15-17 June Threat and Vulnerability Assessment Symposium held at the Naval Postgraduate School." The article "Library Support of the Maritime Domain Protection Task Force" highlights a number of resources readily available through the Dudley Knox Library.
Naval Postgraduate School (U.S.). Maritime Defense and Security Research Program
2004-10
-
SITREP: The NPS Maritime Domain Protection Newsletter, September 2004
This issue includes the article "NPS and the MDP Task Force Host Inaugural Maritime Domain Protection Symposium". The symposium "brought together over 50 commands, departments, agencies, local law enforcement, and academic institutions involved in maritime security. During the two day event, numerous briefs were delivered on Maritime Domain Protection, the status of MDP Task Force research projects and related efforts, providing a unique opportunity for members of the MDP community to learn about ongoing projects and share ideas."
Naval Postgraduate School (U.S.). Maritime Defense and Security Research Program
2004-09
-
SITREP: The NPS Maritime Domain Protection Newsletter, May 2004
This issue includes the article "Applied At-Sea Technology Research: Estimation of Atmosphere and Ocean Surface Influence on Radar and IR Sensor Performance for MDP". This article addresses research on the "variations on radar and IR surveillance sensor performance caused by lower atmosphere and ocean surface conditions, emphasizing low radar cross section and low thermal cross section targets." This issue also announces that the MDP Task Force is to host two symposia, one on threat and vulnerability assessment and a Mini-MDP Symposium on Maritime Domain Protection.
Naval Postgraduate School (U.S.). Maritime Defense and Security Research Program
2004-04
-
SITREP: The NPS Maritime Domain Protection Newsletter, November 2004
In this issue, the Maritime Domain Protection Task Force announces that it has changed its name and will now be known as the Maritime Domain Protection Research Group (MDP RG). Articles in this issue include: "MDP Research Group Sponsors New Project: MDP Research Group Sponsors New Project: Coalition Operating Area Surveillance and Targeting System Coalition Operating Area Surveillance and Targeting System"; "Systems Engineering and Integration Team Releases 'As Is' MDP Report"; "MDP Graduate Intern Elected President of International Law Enforcement Association"; and "Automating Institutional Knowledge for Maritime Domain Awareness"
Naval Postgraduate School (U.S.). Maritime Defense and Security Research Program
2004-11
-
SITREP: The NPS Maritime Domain Protection Newsletter, April 2004
This issue highlights the Maritime Domain Protection (MDP) System Architecture Design Process. "Preventing terrorists from exploiting the world's oceans to attack the United States, its forces, its force projection capability, and other interests is a very serious concern for national leadership. The Maritime Domain Protection Task Force (MDP-TF) at the Naval Postgraduate School (NPS) is engaged in a campus-wide research effort to address this concern. Systems Engineering Design Integration (SE&I) is one of three primary independent efforts that form the core of this Maritime Domain Protection (MDP) research project. Five full-time NPS faculty members, with many years of systems engineering and project management experience, are committed to conduct SE&I with the collaboration of NPS students from the Navy, Coast Guard, Northern Command, and other MDP project participants. This multi-year SE&I effort will focus on the delivery of a proposed architecture on which to base future process and technical design."
Naval Postgraduate School (U.S.). Maritime Defense and Security Research Program
2004-04
-
Executive Summary: The National Advisory Council (NAC) Meeting, May 14-15, 2008
This executive summary is from the National Advisory Council (NAC) meeting held on May 14, 2008, at the Four Points by Sheraton Hotel in Chicago, IL. Topics of the meeting include: "Highlights from FEMA Headquarters; NAC Operating Guidelines; RAC-NAC Task Force Paper; Target Capabilities List; National Exercise Program; National Response Framework; National Incident Management System; [and] Subcommittee Report Outs."
Naval Postgraduate School (U.S.)
2008-05-14
-
Identifying Security Problems and Devising Control Solutions in a Local Area Network: A Case Study Approach
"This thesis investigates the requirements for establishing security criteria in designing and developing a local area network (LAN) for an aviation squadron. In particular, it concentrates on the security problems and control issues in the design of a LAN. A survey of the security literature on computer security was conducted to develop a model for identifying security problems in a local area network and devise control solutions. A case study was written based on the literature review and previous experience in the aviation community. Although many controls solutions are discussed, adequate planning, common sense and proper user training all play an integral part in developing an atmosphere of security awareness in networks."
Naval Postgraduate School (U.S.)
Evans, Gary John
1990-09
-
Generating Hypotheses on Fighting the Global War on Terrorism
"The challenges facing our armed forces are fundamentally different than they were just over a decade ago. Consequently, our forces are undertaking an ambitious effort to fundamentally change. As Secretary of Defense Rumsfeld [3] states: 'What's taking place in the conflict [Afghanistan], in the global war on terrorism, and the distinctively new threats we're facing, [provides] the impetus to transformation.' Similarly, we need to transform an analysis infrastructure built to analyze a well studied and stable situation. Specifically, we need agile tools and analysis methods that allow us to quickly gain and effectively communicate insights into dynamic, asymmetric situations. [...]. In this paper, we highlight two methods that we have found particularly helpful in a series of explorations on a variety of models and scenarios-- see Lucas et al. [5] and Sanchez et al. [6]. They are applied in a study of guerrilla combat involving a skirmish that author Ipekci experienced. The first method, dealing with generating inputs, is Latin hypercube designs (see [7]). The second method is classification and regression trees (CART)--which are good at uncovering relationships in large data sets (see [8]). The outline of this paper is as follows. The next section describes the guerrilla infiltration scenario we investigate. This is followed by sections that describe the model (MANA) that we use and the experimental design (a specially constructed Latin hypercube). The subsequent section summarizes the results with CART and multiple additive regression tree (MART) models. A concluding section discusses the main findings."
Naval Postgraduate School (U.S.). Department of Operations Research and Administrative Sciences
Lucas, Thomas W.; Sanchez, Susan M.; Cioppa, Thomas M.
2003
-
Suicide Terrorism: A Brief Bibliography of Scholarly Resources
This bibliography, compiled by Greta E. Marlatt at the Naval Postgraduate School, contains a list of resources related to suicide terrorism. Resources include both books and periodicals. The list is organized alphabetically and links to resources are provided when available electronically. This record was updated and is current as of June 5, 2015.
Naval Postgraduate School (U.S.). Dudley Knox Library
Marlatt, Greta E.
2015-06-05
-
Submarine and Autonomous Vessel Proliferation: Implications for Future Strategic Stability at Sea
"Conventional wisdom from the late Cold War onward suggests that the U.S. submarine force is virtually invulnerable to attack, particularly since the demise of the Soviet Union. U.S. nuclear force planning and a range of other Navy long-range procurement plans assume the safety of future SSBN [Ballistic Missile Submarine] and SSN [Nuclear Attack Submarine] operations and the relative absence of threats. This scoping study tests and challenges these assumptions by examining international trends in the proliferation of submarines and autonomous vessel technology. It begins by observing that undersea strategic stability during the Cold War relied on specific factors that may not be present in the future. The study then surveys the range of new countries and capabilities emerging in the 21st century undersea environment. It concludes by suggesting that undersea warfare is going to pose serious new challenges to the U.S. Navy, possibly putting its sea-based leg of the triad at risk as the number of operational boats declines, while also observing that overseas SSN operations will be complicated by changing conditions and ASW [Anti-Submarine Warfare] developments. Finally, Moltz offers several possible remedies: 1) revision of currently laissez-faire U.S. policies in the area of submarine export controls; 2) revised procurement and basing policies in regard to U.S. SSBNs to reduce emerging vulnerabilities; and 3) reconsideration of diesel/AIP [Air-Independent Propulsion] boats as a supplement to U.S. SSN forces for enhanced ASW and for conducting certain domestic and overseas missions better suited to smaller, less costly, less vulnerable, and more nimble vessels." Note: This document has been added to the Homeland Security Digital Library in agreement with the Project on Advanced Systems and Concepts for Countering WMD (PASCC) as part of the PASCC collection. Permission to download and/or retrieve this resource has been obtained through PASCC.
Naval Postgraduate School (U.S.). Center for Contemporary Conflict
Moltz, James Clay
2012-12
-
Border Cracks: Approaching Border Security from a Complexity Theory and Systems Perspective
From the thesis abstract: "Presently, U.S. border security endeavors are compartmentalized, fragmented, and poorly coordinated. Moreover, international collaborations are extremely limited; success hinges on effective international cooperation. This thesis addresses U.S. border security management using complexity theory and a systems approach, incorporating both borders and all associated border security institutions simultaneously. Border security research has rarely viewed all stakeholders as a holistic unit up to this point, nor has border security been thoroughly examined using a systems approach. This research scrutinizes the current U.S. border security paradigm in an attempt to determine the systemic reasons why the system is ineffective in securing U.S. borders. Additionally, the research investigates the current level of international cooperation between the United States, Canada, and Mexico. This thesis increases awareness and will possibly create dissent among established agencies, which is the first step in instituting needed changes that will ultimately increase North American security. The thesis contends that the establishment of a tri-national--United States, Canadian, and Mexican--border security agency, in addition to legalizing drugs and reestablishing a guest worker program, will be more effective and cost-efficient in securing North American borders."
Naval Postgraduate School (U.S.)
Schwan, Michael J.
2012-12
-
Biometric Challenges for Future Deployments: A Study of the Impact of Geography, Climate, Culture, and Social Conditions on the Effective Collection of Biometrics
"This report consists of two parts, which summarize the conditions under which biometric collection may occur in future Army deployments. Factors affecting biometric collection include geography, climatic conditions, ethnic populations, and relationships with host countries. The attitudes of members of ethnic populations were considered to be a particularly challenging factor affecting biometric collection. In early work on this project a group of experts gathered for round-table discussions of the problem of biometric collection in diverse environments. [...] These discussions lead to several observations. First, the environmental context should be considered in the selection of an appropriate biometric modality. Part I of this report addresses technical considerations regarding the selection of modalities. Second, social and anthropological considerations cannot be generalized even in relatively small regions. [...] Third, technological change will affect biometric collection. [...] Overall recommendations for current and future biometric collection complete Part I. Part II is an examination of factors that lead to effective biometric collection. Interviews were conducted with many individuals involved in the operational use of biometrics, many of whom had collected biometrics in theater, primarily in Iraq and Afghanistan. A surprising finding was that culture is not likely to be a major factor in biometric collection. The analysis led to several recommendations regarding the use of biometrics and provides a list of questions the answers to which can significantly affect the nature of a biometrics collection effort and its ultimate success."
Naval Postgraduate School (U.S.). Center for Information Systems Security Studies and Research
Clark, Paul C.; Gregg, Heather S.; Irvine, Cynthia E.
2011-04
-
Quality of Security Service: Adaptive Security [preprint version]
The premise of Quality of Security Service is that system and network management functions can be more effective if variable levels of security services and requirements can be presented to users or network tasks. In this approach, the "level of service" must be within an acceptable range, and can indicate degrees of security with respect to various aspects of assurance, mechanistic strength, administrative diligence, etc. These ranges result in additional latitude for management functions to meet overall user and system demands, as well as to balance costs and projected benefits to specific users/clients. With a broader solution space to work within the security realm, the underlying system and network management functions can adapt more gracefully to resource shortages, and thereby do a better job at maintaining requested or required levels of service in all dimensions, transforming security from a performance obstacle into an adaptive, constructive network management tool.
Keywords: security ; quality of service ; performance ; adaptive security
Naval Postgraduate School (U.S.). Center for Information Systems Security Studies and Research
Irvine, Cynthia E.; Levin, Timothy E.; Spyropoulou, Evdoxia
2005-12-01
-
Survey of XOR as a Digital Obfuscation Technique in a Corpus of Real Data
From the Abstract: "To determine the usage of XOR [Exclusive Or] and the need to adapt additional tools, we analyzed 2,411 drive images from devices acquired around the world for the use of bytewise XOR as an obfuscation technique. Using a modified version of the open source digital forensics tool bulk_extractor, evidence of XOR obfuscation was found on 698 drive images, with a maximum of 21,031 XOR-obfuscated features on a single drive. XOR usage in our corpus was observed in files with timestamps between the years 1995 and 2009, but the majority use was found in unallocated space. On the corpus tested, XOR obfuscation was used to circumvent malware detection and reverse engineering, to hide information that was apparently being exfiltrated, and by malware detection tools for their quarantine directory and to distribute malware signatures. We conclude that XOR obfuscation is important to consider when performing malware investigations."
Naval Postgraduate School (U.S.)
Zarate, Carolina; Garfinkel, Simson; Heffernan, Aubin . . .
2014-01-17
-
Maritime Defense and Security Research Program Final Report, 2004-2011
From the abstract: "The Maritime Defense and Security Research Program (MDSRP) was part of the National Security Institute (NSI) -- a cooperative research institute whose members include the Naval Postgraduate School (NPS), University of California at Santa Barbara (UCSB), and Lawrence Livermore National Laboratory (LLNL). The purpose of the MDSRP was to conduct, coordinate and foster collaboration in maritime defense and security research, experimentation, and information exchange between partnership universities; federal, state, and local agencies; national laboratories; maritime industry, and international partners through the NSI. This report summarizes the program goals, activities and accomplishments from its creation in 2004 to the close of the funding line at the end of fiscal year 2011."
Naval Postgraduate School (U.S.)
Englehorn, Lyla; Kline, Jeffrey E.
2011-11-25
-
Optimizing Department of Homeland Security Defense Investments: Applying Defender-Attacker (-Defender) Optimization To Terror Risk Assessment and Mitigation
"The U.S. Department of Homeland Security (DHS) is investing billions of dollars to protect us from terrorist attacks and their expected damage (i.e., risk). We present prescriptive optimization models to guide these investments. Our primary goal is to recommend investments in a set of available defense options; each of these options can reduce our vulnerability to terrorist attack, or enable future mitigation actions for particular types of attack. Our models prescribe investments that minimize the maximum risk (i.e., expected damage) to which we are exposed. Our 'Defend-Attack-Mitigate risk-minimization model' assumes that terrorist attackers will observe, and react to, any strategic defense investment on the scale required to protect our entire country. We also develop a more general tri-level 'Defender-Attacker- Defender risk-minimization model' in which (a) the defender invests strategically in interdiction and/or mitigation options (for example, by inoculating health-care workers, or stockpiling a mix of emergency vaccines) (b) the attacker observes those investments and attacks as effectively as possible, and (c) the defender then optimally deploys the mitigation options that his investments have enabled. We show with simple numerical examples some of the important insights offered by such analysis. As a byproduct of our analysis we elicit the optimal attacker behavior that would follow our chosen defensive investment, and therefore we can focus intelligence collection on telltales of the most-likely and most-lethal attacks."
Naval Postgraduate School (U.S.). Department of Operations Research and Administrative Sciences
Brown, Gerald; Carlyle, Matthew; Wood, Kevin
2008
-
Impact of Economic Austerity on U.S. and European Defense Industrial Bases
From the abstract: "The defense industry, both in the U.S. and Europe, has witnessed significant consolidation since the end of the Cold War. The question is whether defense industry consolidation has led to greater efficiencies, lower prices, and more innovation, or whether it has led to greater abuse of market power is a crucial issue. A second issue which is becoming more important in an increasingly globalized economy is whether joint ventures and alliances between U.S. companies and foreign companies are likely to be successful because the military forces of nationstates around the globe have been coalescing in the new millennium against a variety of global security threats, including the threat of terrorism. A third issue relates to whether the consolidation of defense contractors in Europe has led to more innovative products and lower costs. The purpose of this research is to examine the patterns in joint ventures, alliances, and mergers in Europe, in the U.S., and between U.S. companies and European companies."
Naval Postgraduate School (U.S.). Acquisition Research Program
Hensel, Nayantara
2011-04-30
-
Unmanned Vehicles Systems; Unmanned Vehicle Tactical Memorandum (TM 3-22-5-SW): Report of Findings and Recommendation
"In response to a request by NWDC [Navy Warfare Development Command], the Naval Postgraduate School agreed to research and revise the current Maritime Tactical Memorandum (TACMEMO) TM 3- 22-5-SW for unmanned vehicles systems (UVS). The CRUDES [cruiser and destroyer] fleet would immediately benefit by the removal of Captain's gigs/second RHIB [rigid-hulled inflatable boat] in favor of a unmanned surface vehicle (USV) in order to increase warfighting capabilities. An analysis of N86 CRUDES ROC/POEs [Required Operational Capability/Projected Operational Environments] revealed no impact to primary or secondary warfighting missions by removing the gig/second RHIB. In today's capabilities-based warfighting, this replacement better supports the global concept of operations."
Naval Postgraduate School (U.S.). Acquisition Research Program
Hatch, William D., II; Miller, Gregory
2007-01-31
-
Traveling the Terror Highway: Infiltration of Terror Operatives Across the U.S.-Mexico Border
From the thesis abstract: "Following the attacks of September 11, 2001, border security and immigration have received increased attention. Public and political scrutiny have elevated and changed the priority of border security and immigration enforcement; from migrant workers seeking employment to counter-terrorism. However, the question remains: if United States law enforcement and security agencies are unable to stop the smuggling of drugs and illegal migrants across the southwestern border between the U.S. and Mexico, is it possible to prevent terrorists from gaining unauthorized and unaccountable entry into the heartland of the U.S.? A corollary question is: given attempts to restructure the immigration enforcement policy and infrastructure to deter illegal entry of terrorists, will it still be possible and lucrative for terrorists to attempt to illegally cross the U.S.-Mexico border? This research seeks to explore existing conditions that may facilitate or increase the likelihood that terrorists would seek to infiltrate personnel across the U.S.-Mexico border."
Naval Postgraduate School (U.S.)
Whitfield, Nathan S.
2011-12
-
Economic Costs of Reserve Forces Utilization: An Analysis of Their Employment in Fighting the Global War on Terrorism
From the thesis abstract: "This project offers a model useful for estimating the social cost of U.S. Reserve Forces and National Guard employment alternatives in support of the Global War on Terrorism (GWOT). We consider two specific alternatives in this report: (1) the operational force (status quo) and (2) increasing Active Duty Force end strength and keeping Reserve Forces as a 'strategic' reserve. We assume both alternatives are equal in effectiveness. Each alternative provides certain benefits and costs to American society. We also accept a budgetary cost estimate of $533 billion from the Congressional Budget Office's (CBO) Assistant Director for Budget Analysis. We then focus on the social costs of these alternatives. We conclude that the social cost of Alternative 1 exceeded Alternative 2 by nearly $50 billion from 2001 to 2006."
Naval Postgraduate School (U.S.)
Ryan, Charles W.; Harvey, Craig L.
2007-12
-
Fatal Gas Explosion of a Residential Building: Three Levels of 'Lessons Learned'
"The hazardous potential of natural gas concerns production as well as transport and the environment of end users. The following presentation is the report of a case study of a very severe gas-explosion in the enduser's environment and deals with an explosion in a brick-stone residential building in Wilhelmsburg, a community in Lower Austria, on December 2, 1999, which resulted in total collapse of the building. The incident caused ten fatalities (nine within the building, one passing by). Only one inhabitant, a 17-year old girl, survived in a small hollow sphere of the rubble of ruins. The investigation was carried out by a team of experts with expertise in explosion effects, ballistics, metallurgy, polymer chemistry, building engineering, ground mechanics and fluid dynamics, forensic pathology, gas-analysis, and management of gas-supply infrastructure. The investigation included also 1:1-scale trials of gas-explosions within structures as a tool for interpretation and verification of the evidences of the explosion. The very comprehensive investigation and analysis was the key to successful understanding of what had happened and to draw conclusions for management of emergency situations concerning accidental releases of natural gas in the end user's environment."
Naval Postgraduate School (U.S.). Center for Contemporary Conflict
Wieser, I.
2008-02
-
America's New National Security Strategy: New Scenario for Military Operations Research
This report "[p]rovides an analysis of President Bush's new national security strategy first unveiled in Aspen, Colorado on August 2, 1990, and General Colin Powell's 'base' force. If implemented, the new strategy and force structure would return a significant amount of U.S. ground and air forces to CONUS [Continental United States] where most would be demobilized. In the event of a major crisis, the U.S. would rely on active and reserve forces for a contingency response. The new national security strategy is based upon a revised Soviet threat and new international security environment which allows us to assume two years warning of a major ground war in Europe. During this two year period, the U.S. would reconstitute additional military capability. Outline of new strategy and 'base' force structure, transportation requirements, and whether or not the U.S. will retain a unilateral capability for overseas intervention. Discussion of parallel NATO [North Atlantic Treaty Organization] initiatives. Discussion of major issues, including: defining new goals and objectives in both programming and war planning, the effect of Operations DESERT SHIELD and DESERT STORM, new requirements for intelligence, requirements for decision-making, investment strategy and industrial conversion, reconstitution, and impact on military operations research and analysis."
Naval Postgraduate School (U.S.)
Tritten, James John
1991-06-11
-
Information Security Education Initiative for Engineering and Computer Science
"This paper puts forward a case for an educational initiative in information security at both the undergraduate and graduate levels. Its focus is on the need for such education, the desired educational outcomes, and how the outcomes may be assessed. A basic thesis of this paper is that the goals, methods, and evaluation techniques of information and computer security are consistent with and supportive of the stated goals of engineering education and the growing movement for outcomes-based assessment in higher education."
Naval Postgraduate School (U.S.)
Irvine, Cynthia E.; Chin, Shiu-Kai; Frincke, D. A. (Deborah A.)
1997-12
-
Evolving Private Military Sector: A Survey
"The purpose of this research is to help the US Department of Defense and other government security communities better understand the evolving private military sector. The body of the report consists of three main parts. These describe the organizational demographics of the sector, the capabilities and activities of firms in the sector, and the public firms in the sector, respectively. In the final section, we discuss some possible interpretations of the data for the evolution of the sector."
Naval Postgraduate School (U.S.)
Dew, Nicholas; Hudgens, Bryan J.
2008-08-11
-
Role of Trans-Atlantic Defense Alliances in a Globalizing World
"The purpose of this analysis is to discuss the importance of linkages between US and European defense manufacturers with the emergence of the common global threat of terrorism, the greater price sensitivity of governments concerning weapons systems costs, and the shrinkage of defense budgets. The article discusses the reasons behind the formation of alliances between US and European defense contractors, examines several case studies of alliances, assesses some of the patterns in alliance formation, and analyzes the potential for trans-Atlantic alliances between defense contractors in the future."
Naval Postgraduate School (U.S.)
Hensel, Nayantara
2009-04-22
-
Diamond High Assurance Security Program: Trusted Computing Exemplar
"Over the past decade, the US Government has not been significantly involved in high assurance Trusted Computing acquisitions and research. During this time, the Government's focus on commercial off the shelf procurements helped to fuel explosive advances in commercial technology, but it also contributed to the lack of progress in the ability of commercial systems to appropriately protect themselves and the data with which they are entrusted. While industry has been driven to supply the latest technology at the fastest pace, it has not been motivated, either internally or externally via customer demand, to produce highly trustworthy computing systems. As a result, the National Information Infrastructure is weak; there are no high security, high assurance, off-the-shelf products available that can be used to strengthen it; and the National capability to design and construct such trusted computer systems and networks has atrophied."
Naval Postgraduate School (U.S.)
Irvine, Cynthia E.; Levin, Timothy E.; Dinolt, George W.
2002-09