Advanced search Help
Publisher is Naval Postgraduate School (U.S.)
Clear all search criteria
Only 2/3! You are seeing results from the Public Collection, not the complete Full Collection. Sign in to search everything (see eligibility).
-
Polish Land Forces of the XXI Century -- Reforms in Accordance with Current RMA Trends
"The end of the Cold War and the September 11th 2001 attacks changed the strategic environment of the world. New socio- political realities increased the use of armed forces. The War on Terror brought the necessity of expeditionary warfare even to countries, whose security doctrine had been so far exclusively focused on territorial defense. Poland is one such country. Throughout Polish history, there have been no expeditionary operations. New requirements after 1999 generated the necessity for reforms in Armed Forces of Poland. Since expeditionary warfare has never been practiced by Polish Army before, the reform process needs to be strongly coordinated with such military forerunners as the US Army. The thesis presents a study of contemporary war and its effects on force structure. It also shows how the US Army has reacted to the changing character of warfare. Such reforms as the Stryker Brigades, Army XXI and 'Army After Next' program are analyzed in order to asses which of these solutions can be used in Polish Army reforms. The current capabilities of the Polish Army are also assessed in order to judge the background for military reforms in Poland. Finally a recommendation for reforms in Polish Army is made."
Naval Postgraduate School (U.S.)
Szymanski, Marcin
2004-12
-
Advanced Security Operations Corporation Special Weapons and Tactics Initiative
"The purpose of this MBA Project is to investigate and provide a comprehensive overview of the current state of affairs with regard to the privatized security industry. The project focuses on a business plan that will cover three phases for a start-up company to enter the private security market. The purpose of Advanced Security Operations Corporation (ASOC) is to enter and profit from the growing Privatized Military Industry (PMI) trend. This proposal looks at establishing a network of centralized SWAT teams whose sole mission is to train and conduct SWAT operations. These teams will greatly increase the chance of success and minimize casualties, while greatly reducing cost. ASOC will use collaborative efforts with local, state and national law enforcement agencies in order to maximize this innovative and value-added plan. The goal of government should be to drastically reduce the cost of redundant and inefficient services. By following the trend to outsource services and create a privately run and centrally located SWAT Team, the local, state, and federal government can create a long term capability that is less expensive, yet has a greater capability for mission success. The cost-effectiveness and problems/solutions that would face such an endeavor are the focus of this project."
Naval Postgraduate School (U.S.)
Denton, William F.; Byrom, Jonathan C.; Ainsworth, Lyle P.
2004-12
-
Architecture for Network Centric Operations in Unconventional Crisis: Lessons Learnt from Singapore's SARS Experience
"Singapore and many parts of Asia were hit with Severe Acute Respiratory Syndrome (SARS) in March 2003. The spread of SARS lead to a rapidly deteriorating and chaotic situation. Because SARS was a new infection, there was no prior knowledge that could be referenced to tackle such a complex, unknown and rapidly changing problem. Fortunately, through sound measures coupled with good leadership, quick action and inter-agency cooperation, the situation was quickly brought under control. This thesis uses the SARS incident as a case study to identify a set of network centric warfare methodologies and technologies that can be leveraged to facilitate the understanding and management of complex and rapidly changing situations. The same set of methodologies and technologies can also be selectively reused and extended to handle other situations in asymmetric and unconventional warfare."
Naval Postgraduate School (U.S.)
Chee Bin, Tay; Whye Kee, Mui
2004-12
-
Building Collaborative Capacity for Homeland Security
"The purpose of this project was to build a foundation of relevant knowledge about interorganizational collaboration that would assist local, state and federal officials in their management of activities related to Homeland Security. Academics and practitioners stress the criticality of coordinating the efforts of federal, state, local and private sectors. Some barriers to interorganizational collaboration include: missions that are at odds with one another, unclear roles and responsibilities lack of accountability. Managers of homeland security will need to find ways to overcome these barriers and work together more effectively. This project is meant to discover the factors that contribute to and inhibit collaboration. The first phase of the research focused on the development of a conceptual model of interagency collaboration. Phase II was an action-based workshop to gather data from a group of 30 senior homeland security managers. Nine major topics that were central to interagency collaboration were identified in Phase III. We anticipate that these deliverables will be used for future workshops, seminars, short class modules or longer graduate-level courses. Future plans include developing a diagnostic survey. This diagnostic tool could be used by HLS organizations to evaluate their current collaborative capacity and, based on this assessment, establish action plans to improve their collaborative capacity."
Naval Postgraduate School (U.S.)
Jansen, Erik; Thomas, Gail Fann; Hocevar, Susan Page
2004-11-01
-
Social Structure Model for Evaluating the Effect of Response Measures on the Spread of Smallpox
"Homogeneous mixing, where all instances of contacts between any two members of the population are equally likely, is a common assumption in modeling biodefense policies against smallpox. Such a mixing pattern is rather unlikely to represent population interaction in a modern urban setting, which typically is separated into households on one hand, and into daily meeting sites such as school and offices, on the other hand. In this paper we develop a dynamic two-level social interaction model where individuals move back and forth between home and daily meeting sites, possibly passing through a general meeting site such as a mass transit system or other crowded areas. Based on this difference-equations model, we evaluate the effect of situational awareness and response measures, such as vaccination, quarantining and movement restrictions, on the spread of smallpox in the population."
Naval Postgraduate School (U.S.)
Kress, Moshe
2004-11
-
Human Systems Integration and Automation Issues in Small Unmanned Aerial Vehicles
From the Thesis Abstract: "The goal of this report is to identify Human System Integration (HSI) and automation issues that contribute to improved effectiveness and efficiency in the operation of U.S. military Small Unmanned Aerial Vehicles (SUAVs). HSI issues relevant to SUAV operations are reviewed and observations from field trials are summarized. Short-term improvements are suggested, research issues are identified, and an overview is provided of automation technologies applicable to future SUAV design."
Naval Postgraduate School (U.S.)
McCauley, Michael E.; Matsangas, Panagiotis G.
2004-10
-
CyberCIEGE Scenario Illustrating Integrity Risks to a Military-Like Facility
From the thesis abstract: "As the number of computer users continues to grow, attacks on assets stored on computer devices have increased. Despite an increase in computer security awareness, many users and policy makers still do not implement security principles in their daily lives. Ineffective education and the lack of personal experience and tacit understanding might be a main cause. The CyberCIEGE game can be used to convey requisite facts and to generate tacit understanding of general computer security concepts to a broad audience. This thesis asked if a Scenario Definition File (SDF) for the CyberCIEGE game could be developed to educate and train players in Information Assurance on matters related to information integrity in a networking environment. The primary educational concern is the protection of stored data. Another goal was to test whether the game engine properly simulates real world behavior. The research concluded that it is possible to create SDFs for the CyberCIEGE game engine to teach specifically about integrity issues. Three specific SDFs were developed for teaching purposes. Several SDFs were developed to demonstrate the game engine's ability to simulate real world behavior for specific, isolated educational goals. These tests led to recommendations to improve the game engine."
Naval Postgraduate School (U.S.)
Fielk, Klaus W.
2004-09
-
Thumping the Hive: Russian Neocortical Warfare in Chechnya
From the thesis abstract: "Since the 1994 Chechen war, analysts have written volumes about the evolution of--and lessons learned from--this ongoing conflict. Why has success eluded this Cold War superpower in subduing the small Caucasian republic? Russia has since hiccupped back and forth across the spectrum of conflict in the region and the years have provided much speculation as to why. For a decade, researchers have described Chechen terror, erosion of the Russian military, and the inconsistent resolve of the Russian population to support the Kremlin's actions. These are significant independent variables that might explain Russian failure in 1994. However, another less tangible factor--Richard Szafranski's paradigm of Neocortical Warfare--may explain Russia's poor performance in the initial invasion and the improved performance in 1999. To evaluate this concept, the author examines the influences of Intelligence Preparation of the Battlespace, Public Affairs, Psychological Operations, and battlefield communications--prime factors in influencing combatants' perceptions--to gauge these factors' effects on the relative Russian performances in the separate invasions. He then holds the results up to the Neocortical lens to evaluate whether the concept is pertinent to the ongoing conflict in Chechnya."
Naval Postgraduate School (U.S.)
McIntosh, Scott E.
2004-09
-
Wargaming and Simulation as Tools for CONOPS Development
From the thesis abstract: "The purpose of this thesis is to use wargaming and simulation to gain insight into the effective employment of a new Command, Control, Communications, Computers, Intelligence, Surveillance, and Reconnaissance (C4ISR) system, the Adaptive Joint C4ISR Node (AJCN). The AJCN provides the supported commander with several capabilities, to include: range extension, waveform bridging, signal intelligence, electronic warfare, and information operations. Two methods are used to gain insight to the support generation of the concept of operations for the AJCN's employment. The first method is wargaming. The wargaming method utilized a class of NPS students and the JCATS combat simulation model. The wargaming generated insights concerning the AJCN's employment. The second method is the use of a constructive simulation model, POA 2. Insights gained from the two methods include: the need for commanders to differentiate the AJCN and its supporting platform; the need for effective information processing techniques; the importance of maintaining at least two-tiers of AJCN coverage to enhance situational awareness of the supported units."
Naval Postgraduate School (U.S.)
Rhoads, Russell A.; Gilman, Scott D.
2004-09
-
Path Dependence and Foreign Policy: A Case Study of United States Policy Toward Lebanon
From the thesis abstract: "Currently, the US seems to be solely focused on achieving success in the liberation of Iraq and the establishment of a working democracy there. What has been often overlooked is the historical legacy of a tiny nation in the Levant, Lebanon. Many studies show Lebanon as a viable democracy prior to the start of the civil war in 1975. Today, the infrastructure and the institutions for successfully transitioning back to democracy are still present and are already further enforced. Among the Arab states, Lebanon is the most likely to succeed in transitioning to democracy. Considering US national security strategy of propagating democracy and free enterprise, it would be vital to US national security interests to consider Lebanon. Successfully supporting a return to democracy there would not only lessen its appeal as a haven for terrorism, but would also provide the US with a democratic Arab ally in the Middle East. This case study identifies path dependence as a significant factor behind the US policy of disengagement toward Lebanon since 1983. It argues that instead of the vicious cycle of disengagement wrought by the 1980s policy, a new path of engaged political activism could bring a more positive future for Lebanon."
Naval Postgraduate School (U.S.)
Reyes, Raymond L.
2004-09
-
Reducing the Time and Expenditure: From Prototype to Production in Information Technology Application Development
"The Department of Defense (DoD) environment is continuously changing to keep up with highly sophisticated technology that is increasingly creating a global environment and to combat recent international terrorism threats. DoD technology must continue to evolve with modern demands in order to remain effective in today's dynamic and unpredictable environment. Therefore, new demands in software development are constantly increasing to fulfill the needs of rapidly changing business processes. The DoD is slowly becoming more automated and innovative to meet these new demands; however, current software development methodologies provide only limited support and their use often results in increased costs, changes in project scope/duration, and a reduction in system reliability and interoperability. Significant budget constraints and decreasing software development lead times present the need for higher levels of system reliability and interoperability. Our goal is to make DoD software development more efficient by decreasing the necessary time and expense for development by adopting an approach that will go straight from prototype to production."
Naval Postgraduate School (U.S.)
Abdullah, Aaron D.; Campbell, Robert A.; Ruble, Samuel
2004-09
-
CyberCIEGE Scenario Illustrating Secrecy Issues in an Internal Corporate Network Connected to the Internet: Appendices of Thesis
This document contains the appendices to the thesis entitled "A CyberCIEGE Scenario Illustrating Secrecy Issues in an Internal Corporate Network Connected to the Internet" The following is a summary of the thesis: "The CyberCIEGE project seeks to create an alternative to traditional Information Assurance (IA) training and education approaches by developing an interactive, entertaining commercial-grade PC-based computer game that teaches IA concepts while simultaneously entertaining the player. The game provides a robust, flexible and extensible gaming environment where each game instance is based on a fully customizable scenario. These customized scenarios produce game simulations that are tailored to meet a player's specific IA training needs, thus providing personalized, focused IA training at a minimum cost in both dollars and time. Additionally, the interactive game simulations, provided by the CyberCIEGE game, create an entertaining and realistic training environment for the player. Finally, the ability to load the game onto, and execute it from a PC allows IA training to be conducted practically anywhere, i.e. at home, or while traveling. To demonstrate this capability, this thesis developed a customized scenario designed to educate players in secrecy issues concerning the connection of an internal corporate network with the Internet. Additionally, this thesis produced Scenario Definition Files (SDFs) designed to test the game engine to determine if it would produce results that met the SDF developer's expectations and that the simulated game environment was realistic."
Naval Postgraduate School (U.S.)
Lamorie, Justin D.
2004-09
-
CyberCIEGEScenario Illustrating Integrity Risks to a Military-Like Facility
"As the number of computer users continues to grow, attacks on assets stored on computer devices have increased. Despite an increase in computer security awareness, many users and policy makers still do not implement security principles in their daily lives. Ineffective education and the lack of personal experience and tacit understanding might be a main cause. The CyberCIEGE game can be used to convey requisite facts and to generate tacit understanding of general computer security concepts to a broad audience. This thesis asked if a Scenario Definition File (SDF) for the CyberCIEGE game could be developed to educate and train players in Information Assurance on matters related to information integrity in a networking environment. The primary educational concern is the protection of stored data. Another goal was to test whether the game engine properly simulates real world behavior. The research concluded that it is possible to create SDFs for the CyberCIEGE game engine to teach specifically about integrity issues. Three specific SDFs were developed for teaching purposes. Several SDFs were developed to demonstrate the game engine's ability to simulate real world behavior for specific, isolated educational goals. These tests led to recommendations to improve the game engine."
Naval Postgraduate School (U.S.)
Fielk, Klaus W.
2004-09
-
CyberCIEGE Scenario Illustrating Secrecy Issues in an Internal Corporate Network Connected to the Internet
"The CyberCIEGE project seeks to create an alternative to traditional Information Assurance (IA) training and education approaches by developing an interactive, entertaining commercial-grade PC-based computer game that teaches IA concepts while simultaneously entertaining the player. The game provides a robust, flexible and extensible gaming environment where each game instance is based on a fully customizable scenario. These customized scenarios produce game simulations that are tailored to meet a player's specific IA training needs, thus providing personalized, focused IA training at a minimum cost in both dollars and time. Additionally, the interactive game simulations, provided by the CyberCIEGE game, create an entertaining and realistic training environment for the player. Finally, the ability to load the game onto, and execute it from a PC allows IA training to be conducted practically anywhere, i.e. at home, or while traveling. To demonstrate this capability, this thesis developed a customized scenario designed to educate players in secrecy issues concerning the connection of an internal corporate network with the Internet. Additionally, this thesis produced Scenario Definition Files (SDFs) designed to test the game engine to determine if it would produce results that met the SDF developer's expectations and that the simulated game environment was realistic."
Naval Postgraduate School (U.S.)
Lamorie, Justin D.
2004-09
-
Analysis of VPN Solutions and Best Practices for Use in Conjunction with Cyber Attack and Defend Exercises
"An effective method of practicing cyber attack and defend techniques is through cyber-exercises, coordinated over the Internet. The Virtual Private Network (VPN) is an effective way to link cyber attack and defend teams, providing for the encryption of exercise traffic that transits the public network infrastructure. However, VPNs and the technologies and devices behind them are not yet widely understood. Research and evaluation of VPN solutions will identify those most conducive to supporting a cyber-exercise. Users demand a solution that is secure, reliable, and easy to employ. The research in this thesis applies directly to the selection and implementation of an optimal VPN solution to support cyber-exercises."
Naval Postgraduate School (U.S.)
Sherman, Michael A.
2004-09
-
Advent of the NATO Response Force and Its Potential Effect on the United States Air Force
"The advent of the NATO [North Atlantic Treaty Organization] Response Force (NRF) is the result of the call for NATO [North Atlantic Treaty Organization] to create a warfighting capability to meet the security threats of the 21st Century. The NRF is a joint force comprised of air, land and maritime assets designed to conduct operations across the full spectrum of conflict. Missions include opposed entry scenarios, counter-terrorism, crisis response and peace enforcement, embargo operations, interdiction, and human relief and non-combatant evacuations, meeting the need called for in the U.S. National Security Strategy as well as the European Union Security Strategy. The NRF will also serve as a catalyst for transformation, encouraging European nations to downsize and retool their legacy forces in order to participate in the NRF. Political influences and operational constraints threaten to limit the NRF. The tangible effect the NRF will have on the Air Force will be its disproportionate need for Air Force assets to meet its required operational mandate. The result of the EU's inability to readily address their capability shortfalls will be the NRF's dependence upon Air Force to provide strategic airlift, air refueling, Intelligence, Surveillance and Reconnaissance (ISR), and the procurement and use of Precision Guided Munitions (PGMs) for the foreseeable future."
Naval Postgraduate School (U.S.)
Branin, John A.
2004-09
-
National Security to Nationalist Myth: Why Iran Wants Nuclear Weapons
"Throughout twenty-five years of strained relations, U.S. policy efforts have delayed but not thwarted Iran's clandestine nuclear weapons program, largely because Washington has failed to influence Iran's motivations for acquiring nuclear weapons. There are three main motivations behind Iran's nuclear program. First, at the systemic level, external threats drive Iran's perceived need for a nuclear deterrent. Second, at the individual level, well placed governmental elites propel the nuclear security myth to spur nationalistic support for nuclear weapons. Third, at the state level, institutional bureaucracies, created to build Iran's nuclear infrastructure, now compete against other organizations for their own self interests, which are closely associated with the continued development of nuclear weapons. The thesis recommends three policy tracks, addressing causal factors at each level. First, the United States should try to create a new Gulf Security organization, including Iran and the new Iraqi government, to build a collective security environment without nuclear weapons. Second, Washington should build a multilateral coalition to contain Iranian proliferation activities while offering economic incentives for Iranian disarmament. Third, the United States should work to discredit Iran's nuclear security myth by fostering a public debate within Iran on the costs of nuclear weapons, using U.S.-run media."
Naval Postgraduate School (U.S.)
Mayer, Charles C.
2004-09
-
Army before Last: Military Transformation and the Impact of Nuclear Weapons on the US Army during the Early Cold War
"This thesis analyzes the impact of nuclear weapon on the doctrine and force structure of the US Army during the Early Cold War (1947-1957). It compares these impacts with those that occurred on the US Air Force and Navy during that time. Nuclear weapons brought a new aspect to warfare. Their unprecedented economy of destructive power changed the way nations viewed warfare. For the Army, nuclear weapons presented a dual challenge. The Army faced a US security policy centered on the massive use of these weapons; the Army also struggled to understand how these weapons would be utilized on the battlefield. The nation's security policy of large scale strategic nuclear bombardment of the Soviet Union favored the Air Force and to a lesser degree the Navy. The Army viewed this policy as single minded and purposely limiting the nations options to all out nuclear war or deference to another national will. In all the Army faced an internal struggle to incorporate these weapons and an external struggle to retain a useful position within the US Defense establishment during this period."
Naval Postgraduate School (U.S.)
Kinman, Bret C.
2004-09
-
Return with Honor: Code of Conduct Training in the National Military Strategy Security Environment
"As the United States transforms from threat-based to capabilities-based combat operations, one must examine the ability of existing international laws, domestic directives, and Service regulations and training programs to protect American military and civilian prisoners of war, detainees, and hostages while under enemy control. This thesis explores the impact of 'The National Military Strategy of the United States of America 2004' (NMS) security environment on existing Code of Conduct (CoC) training. A thorough examination and comparison of the existing legal framework to the future components of warfare provides a new context through which to evaluate existing CoC training programs and determine the overall applicability of the course content to the expanded spectrum of captivity. The Department of Defense must compensate for the lack of effective international protection by designing a conduct-after capture program that addresses the rapidly changing conditions of different captivity situations. This thesis reveals that the existing CoC training programs and SERE skill sets lack the flexibility to enable the isolated person to rapidly adjust to changes in the future captivity environment and proposes a core captivity curriculum that provides an adaptable set of skills designed to enable the captive to survive and return with honor regardless of the captor or location of captivity."
Naval Postgraduate School (U.S.)
Ryan, Laura M.
2004-09
-
Anatomy of a Hostage Rescue: What Makes Hostage Rescue Operations Successful?
"This thesis develops a theory to determine the best execution time to conduct a hostage rescue attempt. It does so by explaining the phenomenon of a hostage crisis biorhythm and proposing four principles essential for success. The principles of hostage rescue operations presented in this thesis and used in the biorhythm model--surprise, intelligence, operator's skill, and deception--are derived from looking at numerous planning models from special operations, from personal experience, and the thorough analysis of six historical cases. The historical cases show that in every instance any one of these four principles was overlooked, the operation was doomed. These principles have been determined to be the most critical factors that change as the crisis develops throughout the hostage ordeal. A thorough understanding of this biorhythm will provide planning guidelines to assess the best windows of opportunity for a proposed rescue attempt. One main focus of this work will be an in-depth case study of the hostage rescue operation 'CHAVIN DE HUANTAR'. This case study will present compelling evidence to reinforce my hypothesis, and serves as a template model for successful rescue operations. The analysis of this single case will provide a wealth of information on the success of this remarkable operation. Another main focus of this thesis will be strategic thinking of a hostage crisis using game theory analysis. The findings of this thesis will enable decision-makers to plan and organize hostage rescue forces to act at the appropriate time (window of opportunity), maximizing their chances of success. Additionally, it will provide a useful planning model that can be implemented effectively and accurately, presenting a clear picture of possible outcomes throughout a hostage crisis. Furthermore, this thesis will help the reader become a better strategist during the planning, preparation, and execution of a hostage rescue operation. It will provide a thorough understanding of how these operations work, how to solve them successfully, and how to predict possible outcomes at different stages of the operation applying the principles of game theory."
Naval Postgraduate School (U.S.)
Pérez, Carlos M.
2004-09
-
Theater Nuclear Weapons in Europe: The Contemporary Debate
"Are U.S. nuclear weapons still needed in Europe now that the threat that brought them there is gone? This thesis examines whether basing theater nuclear weapons in Europe is useful, irrelevant or counterproductive for maintaining European security. U.S. and NATO policymakers adhere to political and military utility arguments, while others argue TNWs in Europe are irrelevant--their utility has been supplanted by political, cultural and economic interdependence, modern conventional capabilities and the existential deterrent of U.S. strategic nuclear weapons. Nonproliferation and arms control advocates argue TNWs are counterproductive because they enhance, rather than deter proliferation, undermine the Nuclear Nonproliferation Treaty (NPT), and impede cooperation in the NATO-Russia security relationship. This thesis demonstrates how economic and political ties, including widespread participation in nuclear planning, the increasing importance of the nuclear taboo, prospects for conventional deterrence and the U.S. strategic nuclear umbrella render TNWs in Europe irrelevant. Emphasizing their utility provides incentive for others to join the 'nuclear club,' degrades the nonproliferation regime, and creates a roadblock for NATO-Russian arms control and counterproliferation efforts. This thesis recommends withdrawing U.S. theater nuclear weapons from Europe, relying instead on a strategy of conventional deterrence and reassurance while maintaining general nuclear deterrence via strategic forces."
Naval Postgraduate School (U.S.)
Polser, Brian G.
2004-09
-
National Guard Ballistic Missile Defense Mission: Minutemen at the Orbital Plane
"This thesis examines the decision to assign the Ballistic Missile Defense mission to units of the Colorado and Alaska National Guard. The history of the Nike Ajax, Nike Hercules, Sentinel and Safeguard programs are examined to identify the origins of support for this decision. First-hand sources provide evidence that the National Guard performance in the Nike air defense program is a record of parity and some superiority to equivalent active Army units. Previously documented records of Nike unit inspections and evaluations are included. Perhaps for the first time, the results of a declassified U.S. Army study accepting National Guard participation in the Sentinel/Safeguard missions is reported. Pressures, competing interests and election politics within the context of the American governmental institutions provide insights into the difficult path followed to reach President George W. Bush's 2004 operational declaration, and the uncertainties lying ahead for the Missile-Age Minutemen. The international relations area includes an over-view of the sources of the missile threat to the United States, its friends and allies. With the demise of the Anti-Ballistic Missile Treaty, this thesis gauges the impacts on diplomacy, and shifting priorities and resources within the U.S. Defense structure. The author concludes with personal observations and recommendations."
Naval Postgraduate School (U.S.)
Trenary, Ralph Hiram, III
2004-09
-
Justice of Preventive War
"In response to the 9/11 attacks and continuing threats of mass-casualty terrorism, the United States has adopted a new security strategy that emphasizes anticipatory actions including preventive war. Prevention, undertaken in the absence of an act of aggression or an imminent threat, is prohibited by modern conceptions of just of war and international law. Many critics of the strategy fear that any legitimization of preventive war would endanger international stability. But an examination of the relevant ethical issues from the perspective of just war doctrine reveals contradictions within a blanket prohibition of preventive war. Preventive 'strategic interventions' against illiberal regimes--states that correlate with the threats of terrorism and weapons of mass destruction--parallel humanitarian interventions in that they have an ethical basis in the relationship between human rights and the right of state sovereignty. A widely-accepted minimum standard of human rights, incorporated into new international institutions and/or an explicit revision of the definition of just war, could serve as an ethical boundary for both preventive wars and humanitarian interventions. The formal qualification of prevention and its merger with humanitarian goals could bring enhanced international legitimacy and support to preventive actions by the United States and its allies."
Naval Postgraduate School (U.S.)
Stephenson, Henry Alan
2004-09
-
Russia's Interests in the Global War on Terrorism: Implications for a Continuing US-Russian Partnership
"The September 11th terrorist attacks triggered an unexpected rapprochement between the United States and the Russian Federation. Russia joined the US-led coalition and supported Operation Enduring Freedom. US-Russian collaboration in Afghanistan surpassed most previous efforts in terms of the level of cooperation attained, especially in traditionally inviolable areas such as intelligence-sharing; however, disagreements over the invasion of Iraq confirmed that the US and Russia have not yet achieved a strategic partnership. This study uses Russia's decisions during the war on terrorism to discover the motives driving Russian foreign policy. Analysts offer three dominant rationales regarding Russia's behavior: 1) the desire to balance US unilateralism, 2) to gain support for 'anti-terrorist' action in Chechnya, or 3) to advance the nation's economic interests. Each variable is individually assessed to see if expected gains in that sphere covary with Russia's decision to support and potential losses correlate with Russia's decision to oppose the war on terrorism. The study also reveals the true nature of the US-Russian relationship and exposes challenges and future possibilities for US-Russian relations. The last section makes policy recommendations and suggests how to build a stronger USRussian partnership."
Naval Postgraduate School (U.S.)
Petykowski, Jennifer L.
2004-09
-
Leveraging the National Guard's Existing Information Technology Infrastructure to Bridge the Incident Response Digital Divide
"One of the greatest challenges facing the United States after a concerted terrorist attack is that of coordinating response from the myriad of resources available to the incident commander. During this crisis, the daunting task facing the Information Technology (IT) community is to bring a myriad of disparate systems and their relevant traffic together to provide the incident commander a picture of what is happening on the ground, a common operating picture, and then to push that picture up to the decision makers at the state and federal levels. This thesis will examine current organizational structures, missions and IT architectures within the United States Department of Homeland Security, United States Northern Command and the United States National Guard. In addition, this thesis will propose that one solution to bridge the divide between the disparate agencies that may respond to an emergency such as a natural disaster or a terrorist Weapon of Mass Destruction (WMD) may lie within the National Guard. With its unique role as a state militia and a federal warfighter, the National Guard is particularly well positioned to bridge this divide by augmenting its existing networks and incident response communications capabilities."
Naval Postgraduate School (U.S.)
Picard, Stephan
2004-09
-
U.S. and Russian Cooperation against Nuclear Proliferation
"Iran may have a nuclear weapon soon if Washington and Moscow do not unite to slow its efforts. The collapse of the Soviet Union created new complications in a long tradition of nonproliferation cooperation between the United States and Russia, and Iran is just one example. In the 1960s, faced with a common nuclear threat of China, Washington and Moscow united to negotiate the Limited Test Ban Treaty and Nuclear Nonproliferation Treaty to prevent China and other nuclear aspirants from proliferating nuclear weapons. They shepherded their allies to the nonproliferation table and made them sign the treaties. Their efforts retarded nuclear proliferation but failed to prevent China, India, and Pakistan, from gaining nuclear weapons. Following the Cold War their cooperative relationship changed as Washington began treating Moscow as an unequal partner and their nonproliferation efforts broke down into a cooperative and uncooperative mix. This mix has reduced the effectiveness of their efforts and may accelerate proliferation. The September 11th terrorist attacks put more attention on the nuclear proliferation threat to the international community. If this threat is to be minimized, Washington and Moscow need to work together, as they did against China, to prevent new nuclear powers from emerging."
Naval Postgraduate School (U.S.)
Shearer, Samuel R.
2004-09
-
Requirements and Limitations of Boost-Phase Ballistic Missile Intercept Systems
"The objective of this thesis is to investigate the requirements and limitations of boost phase ballistic missile intercept systems that contain an interceptor and its guidance sensors (both radar and infrared). A three-dimensional computer model is developed for a multi-stage target with a boost phase acceleration profile that depends on total mass, propellant mass and the specific impulse in the gravity field. The radar cross-section and infrared radiation of the target structure is estimated as a function of the flight profile. The interceptor is a multi-stage missile that uses fused target location data provided by two ground-based radar sensors and two low earth orbit infrared sensors. Interceptor requirements and limitations are derived as a function of its initial position from the target launch point and the launch delay. Sensor requirements are also examined as a function of the signal-to-noise ratio during the target flight. Electronic attack considerations within the boost phase are also addressed including the use of decoys and noise jamming techniques. The significance of this investigation is that the system components within a complex boost phase intercept scenario can be quantified and requirements for the sensors can be numerically derived."
Naval Postgraduate School (U.S.)
Uzun, Kubilay
2004-09
-
Overcoming Challenges to the Proliferation Security Initiative
"A U.S.-led naval operation in October 2003 interdicted a shipment of uranium-enrichment components on-board a German cargo ship traveling from Dubai to Libya. In December 2003, Libya announced it would halt its weapons of mass destruction (WMD) programs and eliminate its existing stockpiles under international verification and supervision. The George W. Bush Administration proclaimed the interdiction a triumph for the newly created Proliferation Security Initiative (PSI), an activity which was announced five months earlier to interdict, through the threat or actual use of force, land, sea, and air trafficking of WMD at the earliest possible point. Despite increasing international support, numerous joint exercises, and the successful Libyan intercept, the PSI faces serious legal, intelligence, and operational challenges to sustained effectiveness. This thesis takes a close look at these challenges and considers how they can be overcome. I conclude that overcoming these challenges will require a multilateral trusted information network to augment secretive bilateral intelligence sharing, a PSI-specific legal umbrella to replace current reliance on only partially applicable international laws and resolutions, and an interoperable, team approach to operations that takes advantage of industry's technological improvements in detection technology and is conscious of air-intercept restrictions."
Naval Postgraduate School (U.S.)
Warden, Herbert N., IV
2004-09
-
Analyzing the Design of Terrorist Organizations: Using the Organizational Consultant
"With the events of September 11, 2001, terrorist organizations have moved to the forefront of threats to U.S. national security. These organizations utilize unconventional forms of warfare and new organizational structures to survive. However, they must still perform all the functions of traditional organizations: fundraising, internal and external communications, command and coordination, creation of a product, etc. Using an expert system to evaluate the structure of a terrorist organization could increase the amount of knowledge and understanding of it and provide critical insights into the organization's strengths and vulnerabilities. This research will focus on the utility of the expert system Organizational Consultant to evaluate the Hamas terrorist organization as a case study to determine its utility in discerning the organization's structure and suitability to its environment. In order to combat terrorism effectively, the U.S. must gather as much knowledge about various terrorist organizations as possible. Using fit criteria and certainty factors to analyze an organization by means of the expert system Organizational Consultant, the Department of Defense could potentially gain a powerful understanding of the organization's strengths and weaknesses and utilize that knowledge to bring about the terrorist organization's demise efficiently and effectively."
Naval Postgraduate School (U.S.)
Lowe, Harrison T.
2004-09
-
Navy and Marine Corps Intelligence Integration
"This thesis contends that Navy and Marine Corps Intelligence would be more effective in the Global War on Terrorism if they were more integrated. Navy and Marine Corps Intelligence integration should bring Sailors and Marines together in all aspects of warfare to conduct coordinated intelligence. This does not imply that Sailors and Marines should be unified into one force. In fact, it is the unique skills of each service that make them indispensable to the other. Naval Intelligence provides the large scale team of professionals, the robust onboard systems, and communications, and the air intelligence/targeteering expertise. The Marine Corps provides detailed human intelligence in austere, anti-access environments. Designed for highly accurate targeting and raids ashore, Marine Corps intelligence can provide the timely, accurate, and relevant intelligence needed to fight the global war on terrorism for Expeditionary Strike Groups, Carrier Strike Groups, and even Surface Action Groups. The Naval Operating Concept for Joint Operations calls for further integration from both the Navy and the Marine Corps. As Sea Power 21 and Marine Corps Strategy 21 merge into Naval Power 21, the need for further Navy and Marine Corps integration becomes clear. This will challenge current organizational mindsets. Nevertheless, sea based Sailors and Marines will have to be able to operate side by side seamlessly in order to be victorious in the Global War on Terrorism."
Naval Postgraduate School (U.S.)
O'Connor, Jon Anthony
2004-09