Advanced search Help
Resource Type or Special Collection is Theses & Research Reports
Clear all search criteria
Only 2/3! You are seeing results from the Public Collection, not the complete Full Collection. Sign in to search everything (see eligibility).
-
Insider Threat to Cybersecurity: How Group Process and Ignorance Affect Analyst Accuracy and Promptitude
From the dissertation abstract: "The recent increase in high-profile insider cyber exploits indicates that current insider threat analysis (ITA) is insufficient to handle the growing insider threat problem. Well-established academic literature agrees that information overload is a problem ITA must overcome because ITA remains a human-intensive task. Two conceptual strategies to overcome information overload include reducing information and distributing information among additional people to accommodate the load. This dissertation applies attribution theory and process loss theory to test two ITA factors: ignorance and teamwork. A laboratory experiment with a convenience sample of 48 ITA-trained, top secret-cleared participants supported the research. Participants performed ITA with National Insider Threat Task Force training scenarios and applied the adjudicative guidelines for access to classified information. Teamwork conditions resulted in slightly higher accuracy at a significant cost of time, indicating that ITA analysts are best organized in different structures per informational and temporal constraints. However, ignorance level had little effect on ITA analyst accuracy. ITA analysts were substantially more accurate at implication scenarios but slightly better than chance at exoneration scenarios. Lower decision confidence associated with exoneration scenarios indicated that ITA analysts are more likely to guess when presented with an exoneration scenario. Further research involving larger independent samples and temporal constraints is necessary to verify these findings."
Naval Postgraduate School (U.S.)
Kelly, Ryan F.
2017-09
-
Recruiting the Cyber Leader: An Evaluation of the Human Resource Model Used for Recruiting the Army's 'Cyber Operations Officer'
From the thesis abstract: "For the first time since the creation of the Special Forces branch in 1987, the Army authorized the creation of a new branch, the Cyber branch. With this, the Army joined the ranks of other organizations in this rapidly expanding arena. The Army found itself in a situation where it needed to quickly fill the positions required of this new branch. To accomplish this goal the Army developed a recruitment strategy based on the Army human resource management model. The purpose of our research is to evaluate the effectiveness of that model to recruit Cyber Operations Officers and to examine the effects of its continued use. To perform this evaluation we conduct an operational assessment that included identifying and assessing measures of performance (MOPs) and measures of effectiveness (MOEs) based on data collected from: Army institutions; a survey of the Cyber Branch population; and the Person-Event Data Environment database. Our research also examined recruitment strategies and practices in other selected organizations to identify practical recommendations for improvements to current Army practices. The results of this research suggest that while the Army was generally successful in accomplishing the identified tasks of its recruitment strategy, there were inconsistencies in its application. Additionally, through analysis of the survey data we were able to identify attributes that had the most impact on achieving desired effects. Finally, we found that the Army did not recruit in accordance with best practices for the cyber workforce and that it did not use available tools to measure aptitude in its recruitment and the selection process. We identify some practical implications and provide recommendations for further research in this fast-paced operational environment." Supplemental statistical information for this thesis may be found at the following link: [https://www.hsdl.org/?abstract&did= 805986]
Naval Postgraduate School (U.S.)
Nicholson, Wallace C.; Gibbs, Sean A.
2017-09
-
Engineered Resupply System for Humanitarian Assistance and Disaster Relief Operations
From the thesis abstract: "This research examines the effectiveness of resupply systems in humanitarian assistance and disaster relief (HADR) operations by exploring different permutations of operational energy (OE)-focused assets and policies that a Marine Expeditionary Unit (MEU) employs to improve its throughput of resources to disaster victims. The basis for the modeled scenario is the support provided by the 31st MEU to the city of Hachinohe as part of Operation TOMODACHI. This thesis focuses on OE and only considers the medium tactical vehicle replacement (MTVR) as the baseline capability. An agent-based simulation is then used to model the effectiveness of OE-focused resupply strategies and capabilities. These options include (1) efficient driving techniques, (2) reducing idling time, (3) hybrid technologies, and (4) follower vehicles. To investigate their effectiveness, this research uses a design of experiments approach to efficiently examine a set of design factors for specified operational plans. Statistical results indicate that the operational plans employing shorter and quicker vehicle convoys that communicate with one another are most effective in resupplying isolated victims. This research also confirms that the employment of OEfocused assets and policies is effective in increasing timeliness of resupply. Taken together, these factors contribute toward increasing the operational reach of a MEU conducting HADR resupply."
Naval Postgraduate School (U.S.)
Kang, Wei Sheng Jeremy
2017-09
-
Threshold Shortest Path Interdiction Problem for Critical Infrastructure Resilience Analysis
From the thesis abstract: "We formulate and solve the threshold shortest path interdiction problem, which we define as follows: Find a finite set of arcs to attack within a network such that the resulting shortest path from a given source node to a given destination is longer than a specified threshold. Ultimately we are concerned with determining the number of such attacks and using it as a measure of resilience or lack thereof, in an instance of the shortest-path interdiction problem. We develop and implement algorithms to reduce the required computational effort to solve this counting problem exactly.We illustrate via test cases the impact of different interdiction combinations with regards to the threshold value. Whether these interdictions are random occurrences or intentional, this analysis provides decision makers a tool with which to more completely characterize the resilience of a system of interest."
Naval Postgraduate School (U.S.)
Clark, Charles R.
2017-09
-
Drone Defense System Architecture for U.S. Navy Strategic Facilities
From the thesis abstract: "Small, commercially available unmanned aerial systems (UAS) are an emergent threat to Navy continental U.S. (CONUS) military facilities. There are many counter unmanned aerial system (C-UAS) tools focused on neutralization, and many sensors in place. A system-of-systems, defense-in-depth approach to C-UAS requires a central system to connect these new and existing systems. The central system uses data fusion and threat evaluation and weapons assignment (TEWA) to properly address threats. This report follows a systems engineering process to develop a software architecture for that central system, beginning with a requirements analysis, a functional baseline, and the resulting module allocation. A series of simulations in ExtendSim derives the performance requirements by examining the overall C-UAS scenario with currently available technology. Through a sensitivity analysis, the simulation shows that effective engagement range (combination of initial target range, detection range and neutralization range) is the dominant factor driving response time. The architecture modeled in Innoslate provides a discrete event simulation for system performance expectations."
Naval Postgraduate School (U.S.)
Arteche, David; Chivers, Kenneth; Howard, Bryce . . .
2017-09
-
Mission Planning for Heterogeneous Uxvs Operating in a Post-Disaster Urban Environment
From the thesis abstract: "Time is critical during search and rescue operations, as human survival diminishes exponentially if survivors are not located and recovered efficiently. This thesis sought to integrate technologies into a solution that helps rescuers plan for a mission utilizing multiple autonomous unmanned systems (UxV) for search operations. It exploits methods of image analysis to fuse data into a common map and identify key areas of search interest. The key mission areas were developed by comparing edge detection techniques on images obtained from remote sensing platforms in the DigitalGlobe database. Together with close-up snapshots of the environment obtained from drones, three-dimensional maps were developed by stitching the images together into a comprehensive model for a mission commander's use. With the mission bubbles developed, a probabilistic road map was used to develop an optimal trajectory to the search area. It was found that by connecting to the 20 nearest neighboring points in the K-dimensional graph instead of all the points, and using the weighted heuristic method for the A* search, formed the most optimal means to obtain a solution. Together with a tool to generate search patterns for multiple drones, an experiment at Camp Roberts was conducted successfully. Technology was effectively used in the development of a mission-planning tool utilizing a set of heterogeneous unmanned systems for a search mission, which can be expanded for various types of military applications."
Naval Postgraduate School (U.S.)
Tan, Choon Seng Leon Mark
2017-09
-
Decision Model for U.S.-Mexico Border Security Measures
From the thesis abstract: "The Department of Homeland Security (DHS) has invested billions of dollars to prevent illegal drugs, immigration, weapons, and currency from transiting across the U.S.-Mexico border. DHS has not created a sufficient standardized method to measure whether an investment in a security measure is cost-effective when combining assets. To take it one step further, DHS has not created a model that combines cost-effectiveness of a security asset while simultaneously determining how it will contribute to achieving operational control of the border. This study provides an in-depth look into the current risk-based model DHS uses, the administrative and physical infrastructure of U.S.-Mexico border security, and a critical view of DHS' annual budget. A decision model is presented that will give policymakers a process to choose a combination of border security investments that will achieve operational control of the border while remaining within budgeting constraints. A lot of work needs to be done for DHS to determine the correct security assets to be placed at the U.S.-Mexico Border to maintain operational control and cost-effectiveness. This study does not determine which security assets need to be put into place, but it provides a decision process that will be an asset for policymakers to save federal time and money assigned to border security investments."
Naval Postgraduate School (U.S.)
Lavender, Matthew L.
2017-09
-
Use of VR Technology and Passive Haptics for MANPADS Training System
From the thesis abstract: "Man portable air defense systems (MANPADS) are point-defense weapons that typically form the penultimate layer of defense against aerial threats. Deployed at close ranges to the installation being defended, MANPADS operators get little reaction time to engage attacking aircraft. The situation becomes more complex in a multi-threat scenario such as an airfield under attack. Dealing with such situations requires high proficiency and the capability to make tactical decisions quickly. Live training opportunities allow few operators to fire during live exercises. Simulation training is effective, but customized high-fidelity immersive training facilities are limited. Moreover, low trainee throughput from such high-end facilities is an ongoing obstacle. The main focus of this thesis research is a feasibility study for building a low-cost MANPADS training solution that uses commercial off-the-shelf components. The developed prototype leverages a fully immersive virtual reality system with head-mounted display, game engine, and passive haptics. It provides MANPADS operators with alternative training opportunities in target acquisition, tactical decision making, and situational awareness in a multi-threat scenario, and has the potential of addressing the current training gap. This development experience will provide valuable insights that can be employed to design and create a new generation of low-cost training solutions in other domains as well"
Naval Postgraduate School (U.S.)
Rashid, Faisal
2017-09
-
Less is More: North American Case Studies on the Amalgamation of Policing
From the thesis abstract: "American policing is mired in a stratified model of inefficiency involving nearly 12,500 standalone municipal police agencies. The future of policing requires increased participation in cybercrime, transnational crime, terrorism, and infrastructure protection that cannot be accommodated by small standalone police agencies. Canada shares similar experiences in the origins, maturation, social conditions, and opportunities in policing with success in amalgamating police service. This thesis uses comparative case-study research of successful and failed attempts at amalgamating police services in Canada and America. Analysis and recommendations show that amalgamation can best be achieved through large agency contracting, sheriff services, and state policing. Amalgamation to state policing is recommended based on Canadian case studies and American case studies."
Naval Postgraduate School (U.S.); Naval Postgraduate School (U.S.). Center for Homeland Defense and Security
Johnstone, George Stephen
2017-09
-
Recruiting the Cyber Leader: An Evaluation of the Human Resource Model Used for Recruiting the Army's 'Cyber Operations Officer' [supplemental material]
This record contains supplemental material for the thesis of the same title. The supplemental material contained in this includes a survey, survey function, survey analysis support, and various charts and graphs in support of the human resources applications discussed in the thesis. The associated thesis may be found at following link: [https://www.hsdl.org/?abstract&did=805969]
Naval Postgraduate School (U.S.)
Nicholson, Wallace C.; Gibbs, Sean A.
2017-09
-
Police Self-Deployment at Critical Incidents: A Wicked Problem or a Part of the Solution?
From the thesis abstract: "incidents, is alternately condemned or hailed as heroism. Confined to response narratives in after-action reports, existing literature provides no comprehensive definition. Without clear principles, it is challenging to prevent the problems produced by self-deployment such as traffic congestion and diminished command and control; nevertheless, encouraging the ingenuity and initiative leading to heroic and lifesaving acts is equally difficult. Many of the descriptions of police self-deployment match characteristics of wicked problems, as proposed by Horst Rittel and Melvin Webber. Using a case study analysis of police responses to the 2013 Christopher Dorner manhunt and 2013 Boston Marathon bombings, this thesis explored police self-deployment through the lens of wicked problems. A better understanding of the definition resulted in policy and training recommendations, including the suggestions that law enforcement embrace, rather than prohibit, self-deployment and that federally mandated incident command policies incorporate the early minutes of a critical event known as the 'edge of chaos.'"
Naval Postgraduate School (U.S.); Naval Postgraduate School (U.S.). Center for Homeland Defense and Security
Brookes, Anna C.
2017-09
-
Leveraging Gamification Techniques and Strategies as a Means of Improving Border Security Data Collection
From the thesis abstract: "Gamification has served as an emerging trend toward engagement and data collection. This thesis seeks to apply the methods and procedures of gamification systems toward the data gathering processes utilized by U.S. Customs and Border Protection (CBP) as part of its maritime border security strategy. It focuses on what makes gamification work, as well as how it can be applied in the e-government sphere toward improving the interaction between the trade and shipping communities with CBP. A review of existing CBP data collection systems and requirements, as well as a study of the organizational strategies, psychologies, and application techniques, point to the feasibility of gamification features toward solutions to concerns regarding motivation, accuracy, and efficiency of persons providing cargo and supply-chain data to CBP. It recommends the implementation of these features into existing CBP maritime data collection programs used by trade entities."
Naval Postgraduate School (U.S.); Naval Postgraduate School (U.S.). Center for Homeland Defense and Security
Coulter, Joseph Paul
2017-09
-
Fortress America: The Aesthetics of Homeland Security in the Public Realm
From the thesis abstract: "Architecture communicates a message about the purpose of a space, the prestige of those who use or own the space, and the values associated with both users and owners. The aesthetics of this architecture elicit specific emotions, communicate histories, and inform worldviews. In the United States, homeland security architecture is largely a physical representation of a perceived threat of a terrorist attack in public spaces. Architecture has sociological, psychological, and cultural effects, as well as security impacts, but there is little research or discourse on the physical manifestation of homeland security in the United States. What are the consequences--intended and unintended--of homeland security architecture? How does a democratic government protect itself and design buildings and public spaces that are open, attractive, and promote both physical and psychological security? This thesis is a starting point for broader awareness and discussion within the emerging discipline of security design about the importance of aesthetics in homeland security."
Naval Postgraduate School (U.S.); Naval Postgraduate School (U.S.). Center for Homeland Defense and Security
Quirk, Tricia (Patti)
2017-09
-
Inclusion of Disaster Resiliency in City/Neighborhood Comprehensive Plans
From the thesis abstract: "Once hazard mitigation is included in a city's comprehensive plan, the region and its citizens are more prepared to respond to a potential natural disaster. The purpose of this thesis was to illuminate factors that encourage cities to include hazard mitigation within their comprehensive plans. The research used geographic information system (GIS) and census data to locate urban, suburban, and rural areas at risk of flooding and analyzed these regions' comprehensive plans. The research results suggest that previous major flooding events often lead to the inclusion of flood-related hazard mitigation into cities' comprehensive plans. This finding suggests that policy alone does not influence hazard mitigation; other methods should be practiced to ensure hazard mitigation is included within neighborhood/city comprehensive plans."
Naval Postgraduate School (U.S.); Naval Postgraduate School (U.S.). Center for Homeland Defense and Security
Gavin, Douglas J.
2017-09
-
Preventing Firefighter Exposure Hazards
From the thesis abstract: "This thesis examines detrimental health exposures for firefighters and recommends fire service policy and equipment upgrades designed to slow or eliminate these harmful exposures. Because firefighters are exposed to numerous environmental dangers during their careers, this thesis focuses on eliminating three occupational exposures contributing to health issues: chemical flame retardants, diesel exhaust, and toxins in synthetic furniture. Existing studies written by scholars, consumer advocacy groups, and government agencies identify several exposure hazards and recommend preventive measures to address them. In addition to examining these studies, this thesis reviews a well-intentioned California state law--which allowed chemical flame retardants in home furniture and electronic products--that has caused an exposure hazard for both firefighters and the general public. The thesis also exposes necessary upgrades for firefighters' portable air-supply units to reduce respiratory exposures. Finally, because diesel exhaust emissions have adverse health effects and are abundant in fire stations, the thesis recommends making changes to fire stations to better contain the diesel by-products of the fire trucks, including the possibility of purchasing electric-powered fire trucks to eliminate the diesel engine. Rather than providing a clinical study, this thesis offers an examination of occupational health hazards and recommends mitigative equipment and policy upgrades."
Naval Postgraduate School (U.S.); Naval Postgraduate School (U.S.). Center for Homeland Defense and Security
Burke, Paul F.
2017-09
-
Searching for Effective Training Solutions for Firefighting: The Analysis of Emergency Responses and Line of Duty Death Reports for Low Frequency, High Risk Events
From the thesis abstract: "Since 9/11, the fire service has experienced a shift and an expansion in the nature of threats and hazards that it faces. Despite advances in the field, firefighters are still losing their lives inside of burning buildings, and they must find new ways of identifying training gaps and improving current training practices. This thesis explores whether emergency incidents connected to low frequency and high risk events contain sufficient warning signs or indicators of imminent catastrophic events, if firefighters could identify them, and if there was a potential of changing decision making and averting a tragedy. In order to create a firm basis for this discovery, this research effort included a detailed analysis of the National Institute for Occupational Safety and Health's line of duty death reports from the years 2013- 2015. The work provided an opportunity to learn from past events and practices and identify successes and failures in the firefighting domain without the bias of being closely involved with the cases or having a specific agenda. Quantitative analysis performed on this data set and the knowledge gleaned from looking at the events after the fact provide a foundation for advising novel training approaches and scenarios that can be used to train both individuals and teams of fire fighters."
Naval Postgraduate School (U.S.); Naval Postgraduate School (U.S.). Center for Homeland Defense and Security
McDevitt, Deanna M.
2017-09
-
Department of Homeland Security's Role in Protecting the National Economy
From the thesis abstract: "The national economy and the vital commercial flows that feed it are the sine quibus non of national influence, power, and security. However, new characteristics of the modern trade environment have the potential to undermine U.S. economic prosperity. The Department of Homeland Security (DHS) claims that homeland security is inseparable from economic security and, as such, that the department has a role to play in supporting national economic security goals. However, DHS has yet to fully reconcile the tension between its trade enforcement and facilitation missions and clarify its role in supporting national economic competitiveness goals. After identifying and assessing several policy alternatives, this paper concludes that DHS should aggressively leverage its unique border authorities to influence a shift toward a more centralized model of government controls of imports, one informed by economy-wide strategic objectives and reliant upon standard performance measures, shared funding schemes, common information technology infrastructures, and delegated decision making on the admissibility of goods. Such an effort could provide commercially meaningful benefits to public and private stakeholders alike while maintaining security and safety requirements."
Naval Postgraduate School (U.S.); Naval Postgraduate School (U.S.). Center for Homeland Defense and Security
Brzozowski, Christa M.
2017-09
-
Human and Algorithm Facial Recognition Performance: Face in a Crowd
"Developing a method of identifying persons of interest (POIs) in uncontrolled environments, accurately and rapidly, is paramount in the 21st century. One such technique to do this is by using automated facial recognition systems (FRS). To date, FRS have mainly been tested in laboratory conditions (controlled) however there is little publically available research to indicate the performance levels, and therefore the feasibility of using FRS in public, uncontrolled environments, known as face-in-a-crowd (FIAC). This research project was hence directed at determining the feasibility of FIAC technology in uncontrolled, operational environments with the aim of being able to identify POIs. [...] Key findings from this research revealed that although facial recognition algorithms for FIAC applications have shown improvement over the past decade, the feasibility of its deployment into uncontrolled environments remains unclear. The results support previous literature regarding the quality of the imagery being processed largely affecting the FRS performance, as imagery produced from high resolution cameras produced better performance results than imagery produced from CCTV cameras. The results suggest the current FR technology can potentially be viable in a FIAC scenario, if the operational environment can be modified to become better suited for optimal image acquisition. However, in areas where the environmental constraints were less controlled, the performance levels are seen to decrease significantly. The essential conclusion is that the data be processed with new versions of the algorithms that can track subjects through the environment, which is expected to vastly increase the performance, as well as potentially run an additional trial in alternate locations to gain a greater understanding of the feasibility of FIAC generically."
University of Technology, Sydney
Stacy, Emily
2017-07
-
Application of Operational Art to the Korean War
From the thesis abstract: "The purpose of this research paper is to provide lessons from the Korean War on operational art, which is the pursuit of strategic objectives, in whole or in part, through the arrangement of tactical actions in time, space, and purpose. Future operations, strategic contexts, and history-theory-doctrine integration comprise the three main points concerning the application of operational art. This research uses a comparison method for war planning by North Korea, the United Nations, and China, from the perspectives of a political aim, theory, and doctrine. The three findings are as follows. First, the operational artist must focus on future operations and should not intercede in current tactical operations. Second, the operational artist must pay attention to the ever-changing international and domestic environment to understand the strategic context of operational art from both enemy and ally. Lastly, the operational artist must integrate history-theory-doctrine into planning. Regardless of time, these three findings could apply to other war applications of operational art analysis."
U.S. Army Command and General Staff College. School of Advanced Military Studies
Lee, Dong Pil
2017-06-27
-
European Deterrence for European Assurance: The United States and Russian Adventurism in Crimea
From the thesis abstract: "This monograph is a security strategy analysis of conventional deterrence, assurance, and coercion in Europe leading up to and beyond the Russian annexation of Crimea in 2014. The purpose of this monograph is to examine historical concepts of deterrence, assurance, and coercion to determine whether the United States' European Reassurance Initiative, later relabeled the European Deterrence Initiative, was effective and sustainable in assuring allies and partners and deterring Russia. Deterrence of adversaries did not remain a centerpiece of US national defense policy as the threat of nuclear enabled assured destruction faded with the end of the Cold War in the late 1980s. Strategic assurance measures through extended deterrence gave way to an opportunity for the evolution of conventional assurance to partners and allies of the United States as global terror networks threatened them at the onset of the twenty-first century. However, as the Global War on Terrorism began to fade, a resurgent Russia began to seek a renewed regional hegemony in Eastern Europe. Russian actions in southeastern Europe forced the United States to reassure allies and rediscover a conventional deterrence theory to stabilize European fears. The seizure of Crimea required swift action by the United States to reassure allies and partners of its commitment to the security of Europe, but the assurances and deterrence of Russian adventurism came at a cost. The price America paid between 2014 and 2017 in terms of fiscal costs, military readiness, US Congressional support, and global influence was significant and unsustainable."
U.S. Army Command and General Staff College. School of Advanced Military Studies
Geddings, Larry V., Jr.
2017-06-19
-
Battlespace Awareness: Heterogeneous Sensor Maps of Large Scale, Complex Environments
From the thesis abstract: "Robots require high-quality maps-internal representations of their operating workspace-to localize, path plan, and perceive their environment. Until recently, these maps were restricted to sparse, 2D representations due to computational, memory, and sensor limitations. With the widespread adoption of high-quality sensors and graphics processors for parallel processing, these restrictions no longer apply: dense 3D maps are feasible to compute in real time (i.e., at the input sensor's frame rate). This thesis presents the theory and system to create large-scale dense 3D maps (i.e., reconstruct continuous surface models) using only sensors found on modern autonomous automobiles: 2D laser, 3D laser, and cameras. We demonstrate our system fusing data from both laser and camera sensors to reconstruct 7.3 km of urban environments. We evaluate the quantitative performance of our proposed method through the use of synthetic and real-world datasets. With only stereo camera inputs, our regularizer reduces the 3D reconstruction metric error between 27% to 36% with a final median accuracy ranging between 4 cm to 8 cm."
Air Force Institute of Technology (U.S.)
Tanner, Michael A.
2017-06-13
-
IED Campaign in the U.S. Homeland: Are U.S. Military EOD Units Prepared to Respond?
From the thesis abstract: "The United States faces an increasing threat from a variety of terror groups. These groups have shown intent to utilize improvised explosive devices (IED) in their attacks. Advancements in information technology give terrorists access to encrypted communications and information on IED device construction and methods. The threat of an organized IED campaign in the Continental United States is credible. U.S. military explosive ordnance disposal (EOD) units regularly support civil authorities for isolated incidents in the United States as part of a defense support to civil authorities mission. However, EOD units have not had to integrate into a civil authority task force for a widespread, protracted response like an IED campaign. This study examines threat analysis, law, doctrine, policy and strategy, and common practice through an analytical framework of DOTMLPF (Doctrine, Organization, Training, Materiel, Leadership, Personnel, and Facilities) to assess the readiness of military EOD units to integrate into a civil task force to command and control military EOD teams. Research showed units are mostly prepared for this scenario. Minor improvements in the doctrine, training, and leadership and education could improve readiness."
U.S. Army Command and General Staff College
Vaughan, Jon B.
2017-06-09
-
Millennial Warfare
From the thesis abstract: "The Global Millennial Generation has changed Irregular Warfare through their digital nativity, opportunity for mobilization, and global networking capacity. Millennials across the globe are being mobilized in support of the global ISIL [Islamic State of Iraq and the Levant] cause. The millennials within ISILs global insurgency are the drivers of these changes. The current Irregular Warfare literature does not account for these adaptations. Although the fundamentals are not changed, the global Millennial Generation has expanded them. They are traveling to Syria, Iraq, Afghanistan, and North Africa in support, as well as remaining a significant threat in their home nation. They are acting in roles from fighters to technical experts in social media and cyber warfare. Millennials are the first 'Global Generation', the internet and social media have removed barriers that separate the world and have given them access to the world, as well as all the good and bad that comes with that access."
U.S. Army Command and General Staff College
Gilstrap, Samuel S.
2017-06-09
-
Employment of Personnel at the Tucson Border Patrol Station
From the thesis abstract: "The Tucson Border Patrol Station runs its daily operations on the U.S. and Mexico border over a span of 20 miles between Nogales, Arizona and Sells, Arizona. Tucson Station Border Patrol Agents (BPAs) drive to the border to perform their duties each day and night in different forms of personnel employment once arriving at the border. There are small teams at the Tucson Station that have been successful at performing the duties of the Border Patrol. Examples of small teams are the Tucson Station Horse Patrol Unit (HPU), all-terrain vehicle (ATV) unit, disrupt unit, and a Tucson Station mountain team. Drug Trafficking Organizations (DTOs), and Alien Smuggling Organizations (ASOs) have made the border more complex providing guides with deterrence equipment, like carpet booties and camouflage gear. Combatting the DTO/ASO complexity, while working within both a rural environment and an urban one with the heightened scrutiny of small teams is an effective method of personnel employment in the Tucson Station's area of responsibility (AOR)."
U.S. Army Command and General Staff College
Edwards, Robert W.
2017-06-09
-
Refugee Status Required for Resettlement in the United States
"Immigration is a predominant topic in the United States (US) today. There are more refugees in need of humanitarian assistance than at any other time in history. The US has been admitting thousands of refugees in numbers equivalent to mass migrations. Many of the refugees originate from the nations with terrorist extremist known for making terrorist threats against Western nations, and many Americans believe this increases the probability of a terrorist attack. The US has experienced mass migrations throughout history. The most overwhelming was the 1980 Cuban-Haitian mass migration. This thesis evaluates the criteria from the Cuban Haitian migration that is applicable or no longer applicable today, with criteria applicable today for the approval of refugee status. This thesis will determine what can be learned from the criteria applied in 1980 and the changes enacted for the approval of refugee status today. US refugee laws mandate the procedures for Customs and Immigrations on the criteria for refugee status and entry into the US. Recommendations are based on refugee criteria"
U.S. Army Command and General Staff College
Cunningham, Linda C.
2017-06-09
-
Special Warfare in and Through Cyberspace: Shaping the Operational Environment in the Human Domain
"United States Special Operations Command's contribution to unified land operations is through United States Army Special Operations Command's critical capabilities of special warfare and surgical strike. Special warfare is unique in its reliance on indigenous war fighting capacity to stabilize or destabilize operational environments. Special warfare, as a critical capability, and the conceptual application of special warfare in and through cyberspace must address special warfare's contribution to operational art in the human domain. This study uses a qualitative content analysis to explore the linkages between special warfare operations and cyberspace operations to support joint force commanders and U.S. embassy country teams in shaping the human domain. Further, cyber-enabled special warfare is explored through a typology of human action as a framework of analysis to develop methods of integrating cyberspace operations and special warfare. A thesis presented to the Faculty of the U.S. Army Command and General Staff College in partial fulfillment of the requirements for the degree MASTER OF MILITARY ART AND SCIENCE General Studies"
U.S. Army Command and General Staff College
Barnes, Chad A.
2017-06-09
-
Forging the 10th Mountain Division for War, 1940-1945: How Innovation Created a Highly Adaptive Formation
From the thesis abstract: "As the U.S. Army faces new and uncertain challenges across the globe, the need to create new capabilities in organizations, doctrine, and equipment is critical. As new threats in the sea, air, land and cyber domains appear, it is vital for the Army to produce capable and well-equipped formations that are prepared to adapt and meet any challenges. This thesis examines the relationship between how peace-time innovation influences combat adaptation. It uses the history of the 10th Mountain Division as a historical example of how the Army faced threats in multiple areas of the world. In response, it innovated to create a new capability to fight in the mountains. Using new techniques, it recruited highly experienced volunteers, developed new training and equipment to build a new capability for the U.S. Army. As a result of this innovation, the 10th Mountain exemplified a highly adaptive and successful formation in combat. The War Department's ability to leverage innovation to create an adaptive organization is relevant to the contemporary Army and how it looks at the challenges of multi-domain battle and the Army War Fighting Challenges."
U.S. Army Command and General Staff College
Chabalko, Justin J.
2017-06-09
-
How the Success of the CSS 'Hunley' Inspired the Development of the United States Naval Submarine Force
From the thesis abstract: "The entire nation took notice the moment the news broke of the CSS Hunley's historic sinking of the slope of war Housatonic. More to the point, the hearts and minds of inventors and engineers the world over were captured, and an era of development and innovation had begun. The evening of February 17, 1864, shaped the naval policies and government viewpoints regarding submarine warfare over the course of the next three decades. Extraordinary individuals such as Simon Lake, John Holland, and Thorsten Nordenfeldt were inspired by the events of the American Civil War and developed some of the most technologically advanced machines of the time. These innovators, along with many others, sought to motivate the naval powers of the time to implement this new and unique form of warfare. However, misguided engineers and tragic accidents led to skepticism and delays to innovation. Undaunted, these engineers continued to gain momentum and notoriety for their designs, resulting in the United States Naval Department commissioning the nation's first submarine, the USS Holland."
U.S. Army Command and General Staff College
Petty, Jesse P.
2017-06-09
-
Achilles' Heel of Daesh Propaganda
From the Thesis Abstract: "In this master's thesis, the researcher, representing the Kazakhstan Armed Forces at CGSC [Command and General Staff College], offers a set of recommendations to the military decision makers with possible solutions to counter the radical religious propaganda of Daesh. By exploring the relevance and importance of propaganda for this terrorist group strategy. This research states the problem and analyzes solutions using the Applied Professional Case Study Model with embedded Army Design Methodology, SCAME [source, content, audience, media, and effects] (Propaganda Analysis) Technique by determining the Operational Approach, the Stakeholder Analysis as well as Short and Middle-Term Plan. Additionally, the research analyzes Daesh's information campaign as a case study built on information collected from unclassified documents and interviews of a subject matter expert. This research also pursues an understanding about Daesh propaganda apparatus, mastered platforms, and examines Daesh propaganda products using the SCAME Technique, an analytical tool widely practiced in the U.S. Army. Finally, this research used primarily CARL [Combined Arms Research Library] resources as well as available open-source data. Unclassified collected data includes recent studies conducted in the Institute for the Study of War, the NATO Strategic Communication Center of Excellence, and other think tank organizations providing in-depth multidisciplinary analysis of Daesh propaganda. This operational approach is based on newly developed Theory of the Maneuver in the Narrative Space."
U.S. Army Command and General Staff College
Tainov, Aidar
2017-06-09
-
Romania and The New Cold War Security Challenges
From the abstract: "The 'New Cold War' refers to a revival of the political and military unrest, magnified by the modern era domains such as informational, cyber and social media with deep economic repercussions. The continuous changes in the Eastern Europe have a great influence on the Romanian security environment, raising many challenges for the decision makers. This study tried to decipher this security paradigm, unfolding the Russian economic, political and military capabilities, analyzing the Russian objectives, methods and resources allocated to implement its strategies and describing the Kremlin foreign affairs policies, reveling, in the end, the challenges answered by the most recent Romanian National Security Strategy. Whatever history will decide to name it, this emerging 'New Cold War' will definitely affect the entire international community. Therefore, young and vulnerable democracies must acknowledge the fact they represent significant opportunities for the Russian leadership to create unrest and instability, challenging both the nation and the organization that is part of."
U.S. Army Command and General Staff College
Oancea, Lucian
2017-06-09