Advanced search Help
Publisher is Naval Postgraduate School (U.S.)
Clear all search criteria
Only 2/3! You are seeing results from the Public Collection, not the complete Full Collection. Sign in to search everything (see eligibility).
-
Is the U.S. Navy Prepared to Counter Biological Warfare Threats?
The biological warfare (BW) threat to U.S. Naval Surface Forces (NSF) is real but not well understood. Greater awareness about the threat is essential for U.S. NSF to establish key competencies to counter its effects. Commanding Officers (COs) and Officers in Tactical Command (OTCs) will be placed in positions where they must combat challenges from adversaries who will seek to use BW. This thesis identifies what can be done to enhance NSF capabilities to counter BW. Having neglected the BW threat, the U.S. Navy seeks to improve its preparedness by exploiting the development of key bio-defense systems. While some of these systems including Joint Portal Shield and the Joint Biological Point Detection System will soon be deployed, the Navy still lacks the doctrine, organizational modifications, training, education, and leadership to take advantage of these new technological systems. This thesis suggests that Local Unit Practices (LPs) prescribed by COs and OTCs should be established to match each unit's capability and sustainability to the threat. To do so, U.S. NSF require an institutional revolution that maximizes doctrine and Tactics, Techniques, and Procedures (TTPs) which tie directly into LPs to provide the means for BW defense and protection.
Naval Postgraduate School (U.S.)
Richardson, Scott Nathan
2001-12
-
New Terrorism? A Case Study of Al-Qaida and the Lebanese Hezbollah
In recent years scholars have argued that the last decade of the 20th Century saw the emergence of a new type of terrorism distinct from that which the world had suffered since 1968. The argument presented in this thesis is that there is no such thing as new terrorism. In spite of a few terrorist 'spectaculars' in the last decade the evidence suggests that in organizational and ideological terms, terrorism has changed little in the last 20 years. The case studies of Al-Qaida and the Lebanese Hezbollah are used to support this argument. This thesis looks at key scholarly conceptualizations of new terrorism and applies these to Al-Qaida and the Lebanese Hezbollah. This study reveals that rather than conform to new terrorism, Al-Qaida can be better described as a traditional terrorist organization. Key similarities between Al-Qaida and the Lebanese Hezbollah show the continuity in international terrorism over the period of the last 20 years. This finding is important as the United States government ponders on the best approach in dealing with the current threat from Al-Qaida following the 11 September 2001 attacks.
Naval Postgraduate School (U.S.)
Rueda, Edwin O.
2001-12
-
Making a U.S.-India Strategic Partnership Work
"A new strategic relationship between the United States and India is inevitable. Even before the 11 September 2001 attacks, the Bush administration was striving to improve relations with India. After the attacks, this action has become a U.S. priority. India, too, is devoting unprecedented energy to improving relations with the United States. This thesis examines the prospects for an enduring U.S.-India strategic partnership. It analyzes the history of U.S.-India relations, and describes the conditions that impeded the development of strong relations between the two countries. It describes the negative impact of Pakistan and Kashmir on U.S.-India relations. It demonstrates that a new reality, based upon capability and cooperation, has replaced the Cold War reality of power and bloc alignment, and why that bodes well for the future of U.S.-India relations. And it recommends that: the U.S.-India Defense Planning Group and its subsidiaries are revived; the Memorandum of Understanding be reviewed and simplified; and the Joint Working Group on Counterterrorism is enhanced."
Naval Postgraduate School (U.S.)
Goldschmidt, Brian P.
2001-12
-
Asymmetric Warfare and the Will to Win
This thesis explores the will to win in asymmetric war. Asymmetric war, in which one side has an overwhelming advantage over its opponent, will likely be the war of the future for the United States in the post-Cold War uni-polar world. To win an asymmetric war, the individual and then the masses must be motivated to fight and, ultimately, the will to win must be cultivated and sustained for victory. Religion is a highly effective motivator for both the individual and the masses. This motivation, when properly directed, can provide the will to win in the face of overwhelming odds. This thesis focuses on religion as the primary motivator in an asymmetric war. Religion is a strong motivator for the individual because of four factors: appropriateness, identity, rationality, and religion's strength as an internally consistent logic. With a highly motivated individual, an organization gains specific advantages by focusing on the religious aspects of the conflict. These advantages are: commitment, legitimacy, membership, and longevity. These are the measurable elements that create a strong will to win. Three case studies - Iran and Iraq, Hezbollah and Israel, and the Islamic Salvation Front (FIS) and Algeria - are explored as examples of contemporary asymmetric conflict. These case studies are used to examine the asymmetries between the countries in conflict and test the validity of our theory about the significance of the will to win.
Naval Postgraduate School (U.S.)
Quinn, Matthew D.; Herrera, Cary A.
2001-12
-
Macroeconomic Scenario Building for Strategic National Defense Planning
From the thesis abstract: "A variety of uncertainties make defense planning a difficult task even under the best of circumstances. The more varied threat environment in the post-Cold War era, the high price of replacing aging weapon systems and other uncertainties make contemporary planning even more problematic. There is a clear need for more and better tools to address the uncertain variables in the planning equation. This study explores such tools, It deals explicitly with two levels of uncertainty. The first level is captured with the method of scenarios (from Peter Schwartz). The second level is the 'usual' variability of economic affairs within each scenario. This second level is captured using standard econometric and simulation methods. The benefit of this approach is mainly insights for planners - primarily into the sources of uncertainty and their effects (as opposed to point estimates). The People's Republic of China (2001- 2021) is offered as an illustrative exercise. Within that case, we address uncertainty among three scenarios for China's economic future, as well as sources of variance within those scenarios."
Naval Postgraduate School (U.S.)
McMurray, Gerald
2001-12
-
Clandestine Communication Systems
"Subversive elements, whether insurgent, terrorist, or criminal, all require a communication system to coordinate and control operations. The development of a clandestine communication system requires special considerations in the development of the nodes and links that are responsible for the transmission of information. A closure analysis of these processes, professionally referred to tradecraft, assists in the planning and development of a communication system to support or counter subversive operations. This thesis analyzes tradecraft as a communication system to identify the constraints and opportunities to which different technologies have proven useful and the strengths and weaknesses of the same."
Naval Postgraduate School (U.S.)
Corley, John T.
2001-12
-
Development of a Comprehensive Process for the Department of the Navy to Capture Reimbursable Costs as It Related to the Use of Aircraft Platforms in Support of Global Contingencies from the Overseas Contingency Operations Transfer Fund
"This thesis examines the processes used by the Navy and the Air Force for identifying incremental costs associated with the aircraft platforms used in support of the Noble Anvil campaign, which highlighted the bombing of Kosovo. Examination of these methods was done to determine if the Navy was able to properly and completely capture incremental costs to receive full reimbursement from the Overseas Contingency Operations Transfer Fund (OCOTF). The thesis begins with an overview of the OCOTF and its intended purpose, and continues with an in depth analysis of the processes implemented by both services to identify and report incremental costs for aircraft platforms to OSD. It further compares the methodologies, highlighting the advantages and pitfalls of each, and assesses the possibility of lost funding to the Navy based on the processes employed. This research concludes that the Navy did not suffer any loss of funds based on inequity in disbursements from the OCOTF based on the methodologies it exercised. However, key factors which potentially prevented greater reimbursement were identified to be: (1) The interpretation of vague guidance for determining incremental costs, (2) Poor record-keeping and accountability of operational missions flown, (3) The use of different methodologies for capturing incremental costs by both services and within the Navy, and (4) The impact of the Navy's forward deployed status on incremental costs."
Naval Postgraduate School (U.S.)
Frazer, Orie D.
2001-12
-
Interagency Management of Complex Contingency Operations: the Impact of Presidential Decision Directive 56
The central question of this thesis is: What was the impact of Presidential Decision Directive 56? The U.S. government recognized the need for a more systemized method for managing the interagency response to complex contingency operations, after their experiences in Somalia, Haiti, and Bosnia. In 1997, President Clinton signed PDD 56: The Clinton Administration's Policy on Managing Complex Contingency Operations. To determine the impact of this directive, this thesis uses a pre-PDD 56 and post-PDD 56 case study comparison methodology treating PDD 56 as the intervention. U.S. participation in Bosnia from 1995 until 1996 is the pre-PDD 56 case study, and U.S. participation in Kosovo from 1998 until 1999 is the post-PDD 56 case study. The Bosnia and Kosovo case studies are compared using six variables (type, depth, and timing of planning, decision process, funding, and monitoring and modification). Subsequent improvements to PDD 56 illustrate the positive impact that PDD 56 has had on improving U.S. government civil-military unity of effort in complex contingency operations.
Naval Postgraduate School (U.S.)
Poole, Michele A.
2001-09
-
Comparison of Department of Defense Information Technology Acquisition Processes: A Case Study
"This thesis presents a comparison and analysis of two Department of Defense (DoD) acquisition methods: the formal acquisition process and the Advanced Concept Technology Demonstration (ACTD). Both processes can be, and are, used by DoD to acquire information technology (IT), but while DoD has utilized the formal acquisition process for 30 years, the ACTD process is only 6 years old, and was specifically designed to improve upon the standard acquisition process (when applied to IT). By describing and studying the events surrounding, actors participating in, and results of one ACTD, this thesis will determine what lessons-learned can be applied to the standard acquisition process. While the ACTD and acquisition processes share some similarities in their management and funding, there are also significant differences. For example, ACTDs gain approval through a completely different process than acquisitions, and are subjected to less bureaucratic oversight. The recommendations provided in this thesis indicate that, based upon the experiences of the real-life ACTD sampled, the ACTD process does represent an improvement upon the standard acquisition process, specifically when the standard process is utilized to acquire IT."
Naval Postgraduate School (U.S.)
Dehlinger, Sean P.
2001-09
-
Submarine in the Andes: Rise of a Non-State Navy
"On Sept 7, 2000, Colombian National Police entered a bodega in Facatativa, a small village near Bogota. Acting on tips from members of the village, they expected to find drugs, weapons or other various tools used to proliferate the violence that has torn Colombia's social fabric for decades. What they found instead astounded experts from various Colombian and U.S. agencies: Three modules of a double-hulled submarine approximately 30% -40% completed. Obviously unable to abscond with their property, the 'owners' vacated the premises leaving behind a $25 million dollar piece of hardware with a variety of potential uses. Unfortunately, they left behind few clues as to what they planned to use the vehicle for, let alone why they were building it in the middle of the Andes, far from any coast. This mystery demands serious scrutiny, as the purpose (or purposes) behind the submarine's procurement may hold grave implications for the United States and Colombia."
Naval Postgraduate School (U.S.)
Moore, Tyler K.
2001-07
-
Palestinian Refugees and the Regional Security Implications of the Peace Process
This thesis focuses on the status of Palestinian refugees following final peace negotiations. The major conclusions of the thesis are that basic Palestinian refugee rights are not likely to be honored given the immense imbalance of power between Israel and the PLO; that the Palestinian refugee community will likely become a permanently marginalized outcast group in the Middle East; and that the probable result of this condition will be an increase in Palestinian political violence and terrorism against Israeli, American, and allied Arab interests. This is likely to be achieved through mobilization of former refugees by Islamic fundamentalist groups, capitalizing on the failure of the nationalist peace effort. These conclusions are reached through a close examination of the specific Palestinian refugee question and applying a general model of ethnonationalist collective action to the Palestinian question. The major policy conclusion for the United States is that to protect its own interests in the Middle East and reduce violence, the United States must treat seriously the rights of Palestinian refugees during regional peace negotiations. American and Israeli interests on this key issue are clearly divergent; they should be recognized as such and treated accordingly.
Naval Postgraduate School (U.S.)
Sullivan, Edward R.
2001-06
-
Turkey and the Middle East: Threats and Opportunities
The end of the Cold War and the Second Gulf War affected the Middle East prodoundly. The role of regional countries changed when the end of the superpower competition transformed frozen animosities into new conflict areas. In this context, Turkey extremely involved in regional politics. During the 1989-2000 period Turkey's policy toward the Middle East in general centered on security issues while Turkey encouraged regional cooperation simultaneously. PKK terrorism and the prospect of a Kurdish state in northern Iraq have been the forefront issues in Ankara's agenda. Ankara followed an active policy in the region to counter the regional threats to Turkey, to recover its declining image in the West and to improve its economy through regional opportunities.
Naval Postgraduate School (U.S.)
Yilmaz, Hasan
2001-06
-
Experimentation Methodology for Evaluating Operational INFOCON Implementations
"Information Operation Condition (INFOCON) implementations and specifically the impact these implementations can have on warfighting command and control processes are not yet widely understood or appreciated by the majority of the operating forces. INFOCON actions are designed to heighten or reduce defensive posture uniformly, to defend against computer network attacks, and to mitigate sustained damage to the DoD infrastructure. Experimentation is required to explore the effects on certain command and control processes under various INFOCON conditions. This thesis explored requirements for conducting these INFOCON experiments and resulted in the development of an INFOCON experimental design methodology that can be used as a framework for designing and conducting INFOCON experiments in the field. INFOCON experimentation will provide insights and a better understanding of the effects that these implementations will have on the ability of a commander to command and control his or her forces."
Naval Postgraduate School (U.S.)
Kimmel, Richard A.
2001-06
-
Innovation from Below: the Role of Subordinate Feedback in Irregular Warfare Operations
Of the numerous variables that impact the outcome of irregular warfare operations, leadership is one of me most critical. Irregular operations require decentralization and the freedom of the local commander to create local solutions to the situations that he faces. These local solutions can have a dramatic and positive effect on the outcome of irregular military operations. A review of cases that span a century of US irregular warfare operations provides evidence that, at times, the military hierarchy did allow subordinates to innovate and did listen to their recommendations, with positive outcomes as a result. This evidence also illustrates, however, that the military has failed to institutionalize these lessons and is prone to have to re-learn them from conflict to conflict, and at times this relearning process has resulted in the failure of an operation. Leaders must ensure that innovation and feedback are a part of the conduct of irregular warfare operations. This thesis will illustrate that the doctrine and culture of the United States military does not provide for the systematic analysis and exploitation of subordinate innovation. The purpose of this thesis is to clearly articulate the important role that innovation and feedback from subordinates can have on the outcome of operations. The cases put forth to illustrate these points are the Philippines (1898-1902), Vietnam, and El Salvador. The goal is to draw conclusions and make recommendations on how the US military might better capture and utilize subordinate feedback and innovation in future operations.
Naval Postgraduate School (U.S.)
Karres, Matthew G.; Richardson, Michael
2001-06
-
Human Factors in Coast Guard Computer Security - an Analysis of Current Awareness and Potential Techniques to Improve Security Program Viability
The Coast Guard is becoming increasingly reliant upon our nation's information infrastructure. As such, our ability to ensure the security of those systems is also increasing in import. Traditional information security measures tend to be system-oriented and often fail to address the human element that is critical to system success. In order to ensure information system security, both system and human factors requirements must be addressed. This thesis attempts to identify both the susceptibility of Coast Guard information systems to human factors-based security risks and possible means for increasing user awareness of those risks. This research is meant to aid the Coast Guard in continuing to capitalize on emerging technologies while simultaneously providing a secure information systems environment.
Naval Postgraduate School (U.S.)
Whalen, Timothy J.
2001-06
-
Methods for Determining Object Correspondence During System Integration
Object correlation is a semantic comparison of exported entities from one system to imported entities of another. Current research in search algorithms and artificial intelligence methods for pattern matching can aid integrators in finding these matches. This thesis proposes a two-stage correlation process for resolving various kinds of heterogeneity found in legacy DoD systems to facilitate interoperability. A prototype built using these methods is explained, results compared to current correlation methods, and recommendations made for further improvements. The end of the Cold War and the Defense Reorganization Act of 1986 began a new era of unprecedented cooperation among the U.S. military services and our allies. Increasingly dynamic missions have required warfighters to share information quickly and seamlessly while a decreasing defense budget has left few resources to build the infrastructure needed to implement this information exchange in legacy heterogeneous data systems. One possible solution to achieving interoperability of information systems is Young's Federated Interoperability Model. This model allows system designers to advertise the kinds of information they produce and consume and then automatically provides translation services. Before data and services can be shared, however, integrators must resolve exactly what kinds of data they are providing so that other systems in the network can decide if that data is appropriate for their use. That is the purpose of the proposed correlation algorithm.
Naval Postgraduate School (U.S.)
Pugh, Randolph G.
2001-06
-
Taliban and Islamic Fundamentalism in Central Asia
This study examines the relationship between Afghanistan's Taliban regime and Islamic opposition movements in the neighboring Central Asian republics. Despite alarming rhetoric to the contrary from Central Asian political leaders, Taliban ideology is unlikely to spread beyond Afghanistan's borders. The Taliban are an idiosyncratic phenomenon whose anachronistic ideology and violent behavior are more attributable to an obscure tribal code and the sociological repercussions of warfare than to any conventional expression of Islam. Islamic culture in the Central Asian republics was somewhat secularized by 70 years of Soviet domination. The small but growing Islamic opposition is attributable not to the appeal of Taliban-style fundamentalism, but to distinctly domestic factors such as political oppression and economic stagnation. Central Asia's authoritarian regimes are essentially causing the Islamic insurgency they seek to suppress; the Taliban are only significant to the extent that Afghanistan's instability exacerbates ongoing economic and political problems throughout the region. These findings have significant policy implications for the United States and other interested powers, which must deal more urgently with Afghanistan's instability, and should augment military support to Central Asian governments with an equal or greater emphasis on political and economic reform.
Naval Postgraduate School (U.S.)
Ebert, Todd B.
2001-06
-
Street Smarts: Unconventional Warriors in Contemporary Joint Urban Operations
U.S. Army Special Forces (SF) has historically conducted Unconventional Warfare (UW) in the remote, rural, under-developed regions of the world. This thesis analyzes the relevance of UW to contemporary joint urban operations (JUO) during Military Operations Other Than War (MOOTW) and Stability and Support Operations (SASO). America's pre-eminence on the conventional battlefield, and the asymmetric advantages cities offer, should compel adversaries to engage us on urban terrain. Despite this observation, current doctrine inadequately prepares our forces for MOOTW or SASO in cities. Modernization efforts focus predominantly on improving high-intensity combat skills, and developing technological combat-multipliers. During MOOTW and SASO casualties, collateral damage, and political consequences can rapidly erode public support; conventional combat operations may entail excessive political risk. Forces trained for unit maneuver warfare are not sufficient for stabilizing politically charged conflicts short of war. Unique capabilities, training, and experience conducting UW makes SF ideally suited for conducting JUO in this arena. A case study of U.S. involvement in Bosnia-Herzegovina demonstrates the unique capabilities SF provides commanders, not otherwise available in the extant force structure. This thesis advocates using UW to counter urban, asymmetric threats, and concludes with a recommendation for developing amplifying doctrine for conducting UW in urban areas.
Naval Postgraduate School (U.S.)
Amato, Edward J.
2001-06
-
Required Restructuring Process for the Romanian Armed Forces: Major Step toward NATO Membership
"The transformation of the political relations in Europe at the dawn of the 21st Century resulted in deep changes in the concept of security and collective defense. In the context of NATO enlargement, Romania, like other Central and Eastern European countries, reconsidered its political and strategic position in this new environment, started profound reforms in its security institutions and continues to consolidate the democratic statecraft. This thesis examines the steps Romania, as an aspiring country, has to complete for the admission into the Alliance. The analysis mainly focuses on the process of defense resource allocation and reorganization of the Armed Forces as requirements imposed by NATO through the concept of the Membership Action Plan. A detailed description of the defense resource allocation process is presented and analyzed against relevant theory on policy analysis and contemporary budgeting systems, in particular PPBS. The analysis concludes that through the implementation of the new defense resource management system and reorganization of the Armed Forces, Romania can meet its defense needs and become an important military contributor to NATO."
Naval Postgraduate School (U.S.)
Cotoara-Nicolae, Alexandru
2001-06
-
Expanding the ROK Navy: Implications for the U.S.-ROK Alliance
"Stability on the Korean peninsula is a goal for several countries. The Republic of Korea (ROK) has depended on the United States to maintain stability on the Korean peninsula, but realizes its greater independence from a long time ally may be inevitable, especially after reunification. Measures now required afford the ROK every opportunity to provide for its own security and stability, including the need for modernizing the ROK Navy (ROKN). Present and future South Korean naval commitments to regional and international maritime environments support the transition from a brown water navy to a blue water navy capable of meeting future challenges. The ROK intends to achieve a naval force capable of projecting power, carrying out its strategic objectives, and ultimately guaranteeing vital defense for ROK sea lanes of communications. South Korea borders on the East Sea and the West Sea, dictating the need for a maritime force, to protect the lifeblood of the South .Korean economy. Currently, the ROKN cannot compete against large modem navies, capable of conducting sustained naval operations while concurrently maintaining various platforms assigned numerous tasks. The ROKN's opportunity is ripe to expand its existing force into a modern blue water navy."
Naval Postgraduate School (U.S.)
Pethel, John M.
2001-06
-
Program Budgeting to Improve Decision Making and Resource Planning in Estonian Defense
"This thesis examines the linkage between budgeting, budget structure and decision making, discusses different functions a budget must fulfill and identifies criteria a budget structure should meet to support rational decision making. An examination of the most common budgeting approaches and the budget formats they use follow. As a result of this examination a mission-based program budget format emerges as the most suitable format for rational decision making at the top of organizations. After identifying missions of the current military strategy, goals of the Estonian defense, and the structure of the current defense budget, the thesis analyzes the strengths and weaknesses of the current defense budget structure and concludes that although it scores high on one major budgeting function: control; it does not support rational decision making at the top of Estonian defense establishment. To improve the situation the thesis identifies several alternative ways to structure and present budgetary information and assesses their strengths and weaknesses. And finally, some suggestions for further research conclude the study."
Naval Postgraduate School (U.S.)
Kask, Aldo
2001-06
-
Changing European Security and Defense Architecture and Its Impact on Turkey
"Since the 1991 Maastricht Treaty, the European Union countries have been trying to form a common security and defense identity as one facet of the European Union unification process. The efforts to create 'separable but not separate' European forces within NATO have accelerated in the last three years and changed direction toward creating an autonomous 'European Security and Defense Policy (ESDP)' within the framework of the EU. This policy concerns some non-EU European NATO allies, such as Turkey, and Norway, as well as non-European NATO allies, such as the United States and Canada. The developments in the European security structure in the aftermath of the French-British St. Malo Declaration (1991) have profoundly changed the discussion of an all-European force. The ESDP is an evolving process. The impact of the latest developments on Turkey's position in the European security system and Turkey's security policies is significant. Turkish national security interests compel it to be part of a new European security system and of security arrangements in the post-Cold War era. Turkey should have some institutional links to European Security and Defense Policy that would enable it to influence the decisions of its European counterparts on the matters that could affect Turkey's interests. European security cannot be provided without Turkey. How Turkey will fit into the new European security system will depend on its European membership process, its unique geostrategic position and its special relationship with the United States."
Naval Postgraduate School (U.S.)
Yikilkan, Orhan
2001-06
-
Life Cycle Management of Bahraini Amiri Air Force F-16 Aircraft
"This thesis presents a general scheme for implementing Life Cycle Management (LCM) in the Bahrain Defense Force (BDF) and Bahrain Amiri Air Force (BAAF), with special attention paid to LCM issues for the F16 weapon system. The current situation of Bahrain - as well as the history and current challenges facing the BAAF in managing its F16's - is presented. Those challenges are to reduce the Total Ownership Cost (TOC) of the F16 fleet to the bare minimum without disturbing the defensive posture of the BDF and BAAF. The related concepts of LCM, TOC, and Reduction in Total Ownership (R-TOC) are discussed in general, and also in the context of the BAAF F16 force. A feasible method of applying these methods to the BAAF's current situation is then presented in the form of recommended policies, procedures, roles, and responsibilities. Processes and procedures for use by both the BAAF and its suppliers in the management of resources are also recommended. These address all phases of the F16 life cycle (development, deployment operation, maintenance, management and retirement). The advantages associated with developing data and management systems for identification and tracking of the Total Ownership Cost (TOC) of the BAAF F16 are likewise emphasized. They allow management to make effective trade-off decisions regarding the acceptance or rejection of modifications and upgrades. To demonstrate the method, an assessment of BAAF F16 Operations and Support (O&S) costs are also provided, with some of the data being generic and unclassified."
Naval Postgraduate School (U.S.)
Alqetami, Isa Mohamed
2001-06
-
Teaching Security Engineering Principles
"The design and construction of secure systems cannot be entirely captured in textbooks or class notes, but must be taught as an art which is learned through apprenticeship and practice. This paper describes a course in Secure Systems that uses the Flaw Hypothesis Methodology for penetration testing as a vehicle for motivating and teaching students fundamental principles of security engineering."
Naval Postgraduate School (U.S.)
Irvine, Cynthia E.; Levin, Timothy E.
2001-04
-
Analysis of the United States Maritime Industry and Its Ability to Meet National Security Strategy Requirements
From the thesis abstract: "The mariner pool was not an issue of concern until Operations Desert Shield/Desert Storm brought about the largest fleet activation since the Vietnam Conflict. To meet Ready Reserve Force crewing requirements during the Gulf War, mariners from the Great Lakes and retired mariners ranging up to eighty years of age were mobilized. Additionally, Military Sealift Command had to hire as many as 162 foreign-flag ships to supplement its sealift capabilities. This raised concerns over the mariner pool and its effects on national sealift capabilities in terms of the national defense strategy. However, there is no organization that can state and validate the number of United States merchant mariners. The objective of this study is to determine if there are enough qualified merchant mariners to meet the crewing requirements brought on by two nearly simultaneous major theater wars without sacrificing manning levels in the commercial fleet. Part of this project also analyzed the maritime industry to determine the causes of the mariner shortage. Although research did not yield the data necessary to determine actual size of the mariner pool. estimates suggest that the number of mariners available is not sufficient to fulfill surge requirements in support of national sealift strategy."
Naval Postgraduate School (U.S.)
Oropeza, Antonio; DeLaney, Brian E.
2001-03
-
Case Study in Security Requirements Engineering for a High Assurance System
"Requirements specifications for high assurance secure systems are rare in the open literature. This paper presents a case study in the development of a requirements document for a multilevel secure system that must meet stringent assurance and evaluation requirements. The system is secure, yet combines popular commercial components with specialized high assurance ones. Functional and non-functional requirements pertinent to security are discussed. A multi-dimensional threat model is presented. The threat model accounts for the developmental and operational phases of system evolution and for each phase accounts for both physical and non-physical threats. We describe our team-based method for developing a requirements document and relate that process to techniques in requirements engineering. The system requirements document presents a calibration point for future security requirements engineering techniques intended to meet both functional and assurance goals."
Naval Postgraduate School (U.S.)
Irvine, Cynthia E.; Levin, Timothy E.; Wilson, Jeffery D.
2001-03
-
Using Operational Risk Management (ORM) to Improve Computer Network Defense (CND) Performance in the Department of the Navy (DON)
"Operational Risk Management (ORM) has been credited with reducing the Navy's mishap rate to all time lows, especially in Naval Aviation. Through the use of a five-step process, ORM has been able to change the decision makers' paradigm of day-to-day operations in naval fleet units, making safety the paramount factor that would allow fleet commanding officers to conserve their assets, yet meet the requirement to train in high-risk environments. ORM is a process that mitigates the risk associated with the high-risk environment that naval fleet units operate in. Not unlike naval fleet units, our computer networks operate in a high-risk environment-the Internet Crackers are able to penetrate what were thought to be secure networks, and copy, modify, disrupt or destroy valuable information. The risk posed to the Navy's computer network systems is very great. Given the Navy's adoption of Network-Centric Warfare and the Navy-Marine Corps Intranet (NMCI), the hazards faced by the possible compromise of these computer network systems are as great as any a fleet unit would encounter in its normal operating environment. The objective of this thesis is to translate ORM practices into Information Assurance Risk Management (IARM) practices, and demonstrate IARM's utility in identifying, quantifying, and mitigating the security risks associated with computer networks."
Naval Postgraduate School (U.S.)
Hernandez, Ernest D.
2001-03
-
Organizational Structure for Inter-Agency Information Operations
The purpose of this thesis is to stimulate a discussion toward developing an all-encompassing Inter-agency Information Operations organization. The authors define an environment and identify theories that point toward the necessity of integrating Information Operations (10) throughout the U.S. Government (USG). The authors explore the feasibility of establishing and empowering an inter-agency organization that will monitor, evaluate and enforce all aspects of IO. Early forms of IO and their deployment are depicted in the historical backdrop of World War II. Concepts of renown futurists identify the importance of the information Age and the essential process to maximize its' full potential. A correlation between the current national security strategy and the IO environment strongly suggests the need for innovation. An overview of the current IO environment and USG organizations reveals a technological move toward inter-agency IO. Both the art and science sides of IO are incorporated into a new organization. OrgCon 7.0 is used to analyze the proposed IO organizational structure, which provides specific recommendations and defines misfits that must be addressed. The authors conclude that further work is required in modeling the organization via alternate software and a more in depth look is required in the area of National Security IO. The authors provide the essential goundwork for further research.
Naval Postgraduate School (U.S.)
Dougherty, Richard K.
2001-03
-
NATO and Conflict Resolution
Since the end of the Cold War, the Balkan Peninsula has been witnessing various conflicts. The Former Republic of Yugoslavia has become a theater of atrocious confrontations between people with common history and traditions. The wars in Bosnia-Herzegovina and Kosovo, two components of the Former Republic of Yugoslavia, have entailed the involvement of the North Atlantic Treaty Organization in the multinational efforts to stop violence in this region. Since 1990, NATO's new objectives are reducing the risk of conflict, building increased mutual understanding and confidence among all European states, helping to manage crises affecting the security of the Allies, and expanding the opportunities for a genuine partnership among all European countries in dealing with common security problems. This thesis describes the characteristics of conflict and conflict resolution, with an emphasis on the factors that make a third party intervention in conflict "ideal." It will elaborate on NATO's diplomatic efforts to resolve conflict situations, providing an overview, analysis and evaluation of NATO's intervention as a third party in the conflicts in Bosnia-Herzegovina and Kosovo. Emphasis will be placed on whether or not NATO meets the factors/criteria for an "ideal third party."
Naval Postgraduate School (U.S.)
Matei, Florina-Cristiana
2001-03
-
European Security and Defense Identity: A Challenge for NATO and the United States
"The development of the EU's European Security and Defense Policy (ESDP) since 1998 has strongly affected the EU-NATO relationship. Starting with the Franco-British bilateral declaration at Saint-Malo in December 1998, the EU recognized the need for autonomous military capacities for actions outside NATO's framework. This policy challenged NATO's agreement to enhance the European Security and Defense Identity (ESDI) as a European pillar within NATO, as agreed at NATO's Ministerial Meeting in Berlin in June 1996. As the development of the EU's ESDP between December 1998 and December 2000 indicated, the members of the EU have put more emphasis on developing ESDP within the EU rather than developing ESDI within NATO. Developing the ESDP inside the EU, however, tends to undermine NATO's concept of strengthening the European pillar under the authority of the North Atlantic Council."
Naval Postgraduate School (U.S.)
Polli, Gert R.
2001-03