Advanced search Help
Publisher is Naval Postgraduate School (U.S.)
Clear all search criteria
Only 2/3! You are seeing results from the Public Collection, not the complete Full Collection. Sign in to search everything (see eligibility).
-
Adaptations in NATO and European Naval Command Organizations since 1989
"This thesis analyzes post-1989 organizational and capability adaptations of NATO and European naval command organizations. Specifically, this thesis examines how the adaptations of the Striking and Support Forces Southern Europe (STRIKFORSOUTH), the European Maritime Force (EUROMARFOR), and the Combined Amphibious Forces Mediterranean (CAFMED), as well as the definition of the European Multinational Maritime Force (EMMF) concept, strengthen the European Security and Defense Identity (ESDI) within NATO and endow the European Union (EU) with a naval dimension. These organizational adaptations are intended to help the member nations of NATO and the EU meet evolving international security challenges. However, they have also raised significant questions about whether NATO European allies are willing to fund NATO's Defense Capabilities Initiative (DCI) to address military and naval deficiencies. The capabilities gap between the naval forces of the United States and those of NATO European allies poses noteworthy challenges, including interoperability."
Naval Postgraduate School (U.S.)
Inskeep, Christopher H.
2001-03
-
Stimulating Innovation in Naval Special Warfare by Utilizing Small Working Groups
"Naval Special Warfare has produced successful innovation by using small working groups. Naval Special Warfare deems an innovation successful if it results in a more efficient, less risky, more cost effective method to conduct special operations. The Quantum Leap program is an example of successful innovation in Naval Special Warfare produced by a small working group. How have these small groups been able to produce successful innovations? Michael McCaskey's Theory offers an explanation of how small working groups innovate. His theory is a generally accepted theory on how to produce innovation in the business world by using small working groups. McCaskey identified three variables needed to produce innovation: 1) the small working group must have the support and protection of the leadership, 2) have access to resources, and 3) have autonomy from established structure within an organization. After interviews with senior Naval Special Warfare officers, two additional variables were deemed important. Ownership and the license to fail were added to McCaskey's three variables. This thesis will test which variables were or were not present during three Naval Special Warfare case studies where small working groups attempted to produce innovation. Two of the case studies successfully produced innovation, but the final case study failed to produce an innovation. This thesis will evaluate the five variables in each case study and attempt to explain why the innovation was a success or a failure."
Naval Postgraduate School (U.S.)
Rainville, Thomas A.
2001-03
-
Medium-Weight Brigade Structure and the Transformation of the U.S. Army and the Army of Ukraine
"The U.S. Army has faced many formidable decisions on how best to transform. The fundamental changes in the strategic environment after the Cold War, crucial advances in technology and military doctrine related to the Gulf War and permanent involvement in peacekeeping/peacemaking operations around the world have led to a more flexible and lethal force structure. An army should maintain the capability for conducting various military operations from small- scale contingencies to major theaters of war. Therefore, based on major changes in the strategic environment-a dismantled Warsaw Pact, increasing asymmetrical threats, budget constrains along with frequent involvement in contingency operations-the U.S. Army once more confronts transformation and reorganization. This thesis focuses on the current transformation of the U.S. Army to examine the history of reorganizing the U.S. Army along with the dynamics of reforming the Ukrainian Army. This thesis explores why a 'medium-weight brigade-size' force structure became the key feature of the U.S. Army's transformation strategy for forces of the 21st century namely, the 'Objective Forces'. The main intention of this thesis is to reach conclusions about how the U.S. Army's transformation experience can be applied to the current process of developing the Army of Ukraine."
Naval Postgraduate School (U.S.)
Kyrylenko, Mykhailo
2001-03
-
Greek-Turkish Dispute in the Aegean Sea: Its Ramifications for NATO and the Prospects for Resolution
"Since 1974 the Aegean Sea has been a topic of much dispute for Greece and Turkey. In spite of many attempts to resolve the problems, the dispute goes on to this day. Over the years it has cost both countries some lives, cost Greece and Turkey politically and economically, and has been a detriment to NATO defense planning and operations. Continued tensions therefore not only hold the potential for disastrous war between two members of the same alliance but also hold the potential to pull other countries into this conflict. Stability in the region and, consequently, Europe is therefore at risk and must be restored through resolution of these disputes between Greece and Turkey. Resolution has not been attained, though, mainly because of each country's intense nationalism and pervasive mistrust of the other country. This nationalism and mistrust of the other country must be overcome if a resolution is to be reached. Fortunately, the current governments of both Greece and Turkey are much more moderate and pro-resolution than their predecessors, and an ironic amelioration of relations thanks to devastating earthquakes in both Greece and Turkey in 1999 indicate that the time is ripe for a push toward resolution. This thesis therefore examines the Aegean dispute in detail, shows its impact on NATO, looks at the attempts at resolution over the past thirty years, and discusses the current prospects for resolution."
Naval Postgraduate School (U.S.)
Mann, Stephen F.
2001-03
-
What's New About the New Terrorism and How Dangerous Is It?
"The 'new terrorism' is said to be more networked, ad hoc, lethal and dangerous than the old. This assessment of these claims concludes that terrorism currently differs little from its previous manifestations, except for the somewhat increased likelihood that a chemical, biological, nuclear or radiological weapon might be used by terrorists. This does not necessarily mean that terrorism is more dangerous than it was. The critical factor in assessing the threat posed by terrorism is whether it is used strategically."
Naval Postgraduate School (U.S.)
Tucker, David
2001
-
Explosive Detection Technologies for Airline Security
"Aviation Safety and Security has become a topic of paramount national concern.
Informed decision making requires an appreciation of trends in technology in response to projected future terrorist activities, In the area of security, explosive detection is made possible by a bewildering array of newly offered equipment from industrial vendors and government and academic laboratories. Techniques such as ion mass spectrometry, gas chromatography, electromagnetic induction, thermal neutron analysis, fast pulsed neutron analysis, infrared cameras, x-ray computer assisted tomography, transmission and back scattered tomography and microwave radar techniques, as well as the use of dogs, for the detection of explosives, drugs and other contraband are offered in a bewildering variety to the airline industry. It is hoped that this document will serve as a primer describing the science and engineering of what is involved in the various technologies. Here, the goal is not so much a scientific engineering text, but a translation of scientific and engineering descriptions into a language which the educated general public can understand. This primer has been written with two levels in mind. There would be one level which could be appreciated by a non-technical person, and a second level which could be appreciated by a technical person who is being introduced into a field not his own."
Naval Postgraduate School (U.S.)
Maruyama, Xavier K.
2001
-
Effectiveness of Class and Ethnicity in Mobilizing Resources for Terrorism
This thesis attempts to determine which of two terrorist groups, an ideologically based group (Red Brigades) and an ethnically based group (ETA or Basque Fatherland and Liberty), is more effective at mobilization. Mobilizing human resources is the method by which terrorist groups sustain their levels of membership. Without sustained or growing levels of membership, the group declines and soon ceases to exist. By determining a group's effectiveness at mobilization, judgments can be made on the likelihood of the group experiencing continued mobilization leading to continued operations or experiencing demobilization leading to decline. The ETA is still a functioning terrorist group whereas the Red Brigades has ceased to exist. A possible explanation is the ETA was more effective than the Red Brigades at mobilizing resources. After explaining the theory of mobilization, this thesis will apply the theory to the two groups. A subsequent comparison of the two groups' effectiveness at mobilizing resources will enable a judgment to be made on which group is more effective at mobilization. By demonstrating that the ETA was more effective than the Red Brigades at mobilizing people, this thesis will give an explanation for the survival of the ETA and the decline of the Red Brigades.
Naval Postgraduate School (U.S.)
Ernst, Joseph Adrian
2000-12
-
Evaluating Strategies for Countering Nuclear-Armed Terrorist Groups
A number of recent studies have concluded that the United States is vulnerable to attack from terrorists armed with weapons of mass destruction (WMD). Depending on the circumstances, a terrorist attack with nuclear or radiological weapons could cause more destruction and casualties than one with other types of WMD. Four strategies for improving U.S. capabilities to counter nuclear or radiological terrorism are often proposed: (1) to improve intelligence capabilities to gain better knowledge of terrorist intentions and capabilities; (2) to improve security measures in nuclear facilities throughout the former Soviet Union (FSU) and elsewhere, so terrorists will have more difficulty acquiring nuclear materials; (3) to deter terrorists from conducting nuclear or radiological attacks, particularly in the United States; and (4) to improve America's response capabilities to terrorists that have already acquired nuclear or radiological weapons. This thesis evaluates current U.S. capabilities and activities in each of these areas and provides recommendations for improving America's counter-terrorism strategies to defend against terrorists armed with nuclear or radiological weapons.
Naval Postgraduate School (U.S.)
Fogarty, Jeff J.
2000-12
-
United States Policy and Budgeting for the Reserve Component
This study examines the Reserve Component of the United States, focusing on its composition, the Total Force Policy, the funding process and recent funding trends. Because of the increased use of the Reserves, it is important to understand the process of budgeting for the Reserves and how they have fared in the post-Cold War period of constrained resources. Analysis of past and current force policies, interviews with DoD PPBS personnel and research of DoD and congressional actions provided the basis for this study. Since 1989, the output delivered by the Reserve Component to the Total Force has increase by more than 1300 percent. During this period, inflation-adjusted funding for the Reserve Component has decreased by slightly more than 12 percent. Additional missions in peacekeeping, weapons of mass destruction support and space operations are contributing to the use of Reserves in peacetime. The research concludes that changes must occur to the Total Force Policy, assigned missions and funding to ensure that the Reserve Component remains a viable part of the Total Force in the future.
Naval Postgraduate School (U.S.)
Zawislak, Edward L.
2000-12
-
Assessing the U.S. Counter Proliferation Initiative: Considerations For Military Operations Other Than War
The proliferation of weapons of mass destruction (WMD) represents a growing threat to the national security interests of the United States. The United States must retain its ability to project power, while providing its forces adequate protection. Military Operations Other Than War (MOOTW) are becoming a primary responsibility and mission of the U.S. armed forces. Evidence indicates that WMD are proliferating precisely in the same regions where U.S. military forces have been called upon to conduct MOOTW. While the United States has developed various measures to confront this growing challenge, most notably the 1993 DoD Counter Proliferation Initiative, additional considerations must be weighed in assessing the overall effectiveness of the U.S. counterproliferation strategy. The level of preparedness of the U.S. military is of particular concern, in ensuring forces are trained, equipped, and prepared to confront WMD- armed adversaries in a MOOTW environment. This study examines the merging confluence of the proliferation of weapons of mass destruction and U.S. military operations other than war.
Naval Postgraduate School (U.S.)
Valiquette, Matt J.
2000-12
-
How to Defeat Insurgencies: Searching for a Counter-Insurgency Strategy
"Most people say that a hearts and minds campaign is the best strategy for defeating an insurgency. But there may be no one best solution applicable to countering all insurgencies. The opportunities and constraints, which affect both the insurgent and state, dictate the best strategy. I will test this hypothesis against the most difficult form of insurgency. Two Maoist insurgencies will be analyzed to determine the effect of the state's strategy on the insurgent. Conclusions will then be drawn about the relevance of pursuing a universal counter-insurgency strategy. While countering the Shining Path insurgency in Peru, the state employed three different strategies. In the end, the state recognized that the insurgency was elitist based and launched a successful counterleadership targeting campaign to defeat the insurgency. While countering the Malayan Communist Party insurgency in Malaya, the state employed two different strategies. In the end, the state recognized that the insurgency could be limited to the ethnic Chinese community and adopted a successful campaign to separate the insurgents from the population. Analysis of each case study clearly demonstrates the success of two different strategies against similar insurgent organizations. […]. However, the cases demonstrate the need to understand general counter-insurgency principles before applying case specific strategies. Based on these observations it can be concluded that, just as the principles of war guide military operations, there are similar principles which bring success in counterinsurgency operations, with the important caveat that every case must be treated as unique. "
Naval Postgraduate School (U.S.)
Bottiglieri, Michael A.
2000-12
-
Organizational Design Principles for Countering Terrorism in the United States
Recent terrorist activities (the World Trade Center bombing, the Oklahoma Federal Building bombing, the release of Sarin Gas in the Tokyo subway, etc.) have focused the national leadership on the topic of terrorism inside the borders of the United States. In response, two Presidential Decision Directives (PDD-62 and PDD-63) were issued to help define the terrorist threat and recommend a counter- terrorism organization in the federal government. However, the directives do not determine how the Federal government works with state and local authorities. The directives also do not focus on local, state, and federal capabilities to preempt a possible terrorist attack. This thesis builds a organizational framework of the U. S. counter-terrorism environment; explains the current U. S. counter-terrorism structure from a local perspective; develops a set of principles that could be used by any local or federal agency to develop a new or more efficient counter-terrorism organization; assesses two domestic counter-terrorism organizations; and proffers specific recommendations on how U. S. counter-terrorism organizations and programs could be more efficient.
Naval Postgraduate School (U.S.)
Mingus, Matthew C.; Orman, Richard D.
2000-12
-
Continued Transition of the South African National Defense Force: Reserve Force Integration and Utilization
In the past decade, South Africa has undergone radical transitions in government, social integration, and direction. The most remarkable is the restructuring of the military, which included integration of former homeland defense units, the South African Defense Force (SADF), Azanian People's Liberation Army (APLA - a military arm of the PAC), and the incorporation of Urn Khonto we Sizwe (MK - militant wing of the ANC) members into the new South African National Defense Force (SANDF). The new democratic government implemented civilian control measures and added transparency to all military operations. The integration and transition led to drastic downsizing of the active component, new involvement of the reserves, drastic cuts in military spending and complete reorganization of the Ministry of Defense. Today, success of the young democracy depends on the state's ability to address plaguing social crisis of education, housing, unemployment, and AIDS. Simply put, South Africans face limitless challenges with severe economic and financial constraints. Already the benchmarks highlighted in the 1998 Defence and Review and 1996 white Paper on Defence are no longer viable due to budget constraints. This thesis argues that given the prominence of severe budget limitations, significant social issues, and increasing economic concerns, the Reserve Force can play a crucial role in South Africa's future in terms of regional stability and democratic stability within its borders. The thesis also asserts that a well- structured reserve facilitates a smaller active force while improving countrywide social conditions and minimizing Minis of Defense budget requirements.
Naval Postgraduate School (U.S.)
Englet, Lance E.
2000-12
-
U.S. Assistance in the Destruction of Russia's Chemical Weapons
"The thesis examines the present status of Russia's chemical weapons destruction program, which is to be implemented according to the 1993 Chemical Weapons Convention (CWC). It assesses the magnitude of the challenges in destroying the world's largest chemical weapons stockpile, which is located at seven sites in western Russia. It also evaluates the environmental and international security concerns posed by the conditions at these sites and the disastrous implications of a failure of this chemical demilitarization program. The thesis then investigates the development of the pilot nerve agent destruction facility at Shchuchye, Russia, which has been the primary focus of U.S. Cooperative Threat Reduction program support to the destruction of Russia's chemical weapons. In view of the decisions by the U.S. Congress to eliminate finding for this destruction facility in FY2OO0 and FY2001, the thesis examines the apparent causes of these decisions, including concerns about Russian commitment to fill implementation of the CWC. The thesis concludes with a review of arguments for continued U.S. and allied support for the destruction of Russia's chemical weapons."
Naval Postgraduate School (U.S.)
Mostoller, Eric Charles
2000-12
-
China and India: The Struggle for Regional Maritime Supremacy in the Asia-Pacific and Indian Ocean
"The expanding economic and political power of China and India have led each country to extend its naval operations into the other's region of influence in order to safeguard economic/national interests. This expansion has led to suspicion and increased tension between the two countries. The thesis postulates that the continued operational expansion of China and India's naval forces into each other's claimed maritime domain is likely to trigger alliance formations and a naval arms buildup between the two countries which could lead to confrontation and conflict in the near future. This thesis is supported by evidence of active naval modernization programs initiated by China and India as well as the pursuit of security relations with countries in each other's respective regions. Conflicting strategic cultures, a history of antagonistic relations and differences in long-term strategic objectives warn of the possibility of a coming confrontation, which may now have a maritime dimension. The volatility of the situation could have an effect on not only the maritime security climate, but on the security of mainland Asia itself and has implications for future U.S. security policy in the region."
Naval Postgraduate School (U.S.)
Zientek, James B.
2000-12
-
Colombia's War on Drugs: Can Peru Provide the Recipe for Success?
"This thesis examines counternarcotics strategies of interdiction, eradication, and alternative development used in Peru during the 1990s to determine if Peru's success can provide the recipe for success in Colombia. It will show that Peru's sequential approach to eliminating its economic crisis and threat posed by the Sendero Luminoso guerrillas was key to its counternarcotics success. It will show that Colombia faces a similar situation but has failed to realize success because of policy decisions regarding how to deal with guerrillas and certain peculiarities of the drug trade in Colombia that render ineffective policies that worked in Peru. It will argue that Plan Colombia will escalate the civil conflict as FARC guerrillas linked to the drug trade battle to protect this source of revenue. It will suggest that the elimination of the guerrillas either simultaneously with the elimination of the drug trade as Plan Colombia promotes, or sequentially before fully engaging the drug trade, is key to counternarcotics success."
Naval Postgraduate School (U.S.)
Hobaugh, Michael Eric
2000-12
-
Trust and Its Ramifications for the DOD Public Key Infrastructure (PKI)
From the thesis abstract: "In order to incorporate trust into e-commerce, public key cryptography, and basic communication, one must understand and effectively manage trust. Various Internet security protocols have attempted to address this lack of trust. However, these protocols do not incorporate the user's trust into these protocols. Computational models of trust have been developed in an attempt to automate the logic, variables, and thought processes that a human performs when making a trust-decision. Due to the fact that trust is based on a subjective belief, the models require the assignment of metrics to belief variables or attributes that will have value when evaluating trust. These models address the notion of trust in many different ways and both their definitions and metrics vary significantly. This thesis evaluates the various trust models. It is necessary to understand how trust is defined in each model in order to evaluate how well the operation of a system based on the model satisfies the requirements of the users. Trust models are evaluated based on their characteristics, environmental references, metrics, variables used, and outputs. This thesis concludes with the assessment of a practical application of a trust model to the DoD's PKI [Public Key Infrastructure] system."
Naval Postgraduate School (U.S.)
Gaines, Leonard T.
2000-09
-
Warfighters' Counterspace Threat Analysis (WCTA): A Framework for Evaluating Counterspace Threats
"The authors present an evolutionary approach to evaluating the counterspace threat in support of Department of Defense (DoD) decision-makers. The goal is to present a process that decision-makers can readily utilize to accurately assess the level of the counterspace threat originating within their Area of Responsibility (AOR). It is particularly useful as the state of affairs change within the AOR. The authors examine the necessity to utilize space to achieve information dominance, strengths and weaknesses of present Counterspace Threat Models, DoD's increasing dependence on space assets, DoD's reliance on commercial space systems to meet future requirements, and potential adversaries' awareness of the dependence of U.S. forces on space systems. Conclusions stress that the threat is comprised of two essential elements an opponent's willingness to employ a counterspace tactic (their intent) and the opponent's ability to develop the necessary tools to employ a counterspace tactic (their capability). The authors believe that the "intent" component of the threat changes more rapidly than the present models can easily accommodate. Therefore, a process, such as the one presented in this thesis, will enable DoD decision-makers that experience many of the changes of 'intent' first hand to rapidly and accurately assess the threat as the condition changes within the AOR."
Naval Postgraduate School (U.S.)
Douglas, Michael L.; Gray, Arlene J.
2000-09
-
Information Operation/Information Warfare Modeling and Simulation
"Information Operations have always been a part of warfare. However, this aspect of warfare is having ever-greater importance as forces rely more and more on information as an enabler. Modem information systems make possible very rapid creation, distribution, and utilization of information. These same systems nave vulnerabilities that can be exploited by enemy forces. Information force-on-force is important and complex. New tools and procedures are needed for this warfare arena. As these tools are developed, it will be necessary to provide education and training into their use. This project combines research to develop capabilities combined with concurrent development of instruction materials."
Naval Postgraduate School (U.S.)
Buettner, Raymond R.
2000-06
-
Palestinian Political Violence and Israel
This thesis examines political violence by Palestinian groups against Israel and endeavors to determine if this political violence was a necessary component of Israel's decision to agree to the Oslo Accords and subsequent peace process initiative. Through the analysis of four separate time periods in Palestinian history (1948 to The Six Day War, The Six Day War to the Intifada, the Intifada to the Oslo Accords, and post-Oslo Accords) it was shown that three separate forms of political violence were used (guerrilla warfare, terrorism, and civil unrest). When one form of political violence was ended another formed. . Being a democracy, Israel required strong internal support for peace to bring about the peace process. This internal support was created by a demand for personal security and is seen in the creation of new political parties and movements. In short: this thesis demonstrates through argument and evidence that Israelis engaged in a land for security peace deal with the Palestinians primarily because the Palestinians had engaged in political violence.
Naval Postgraduate School (U.S.)
Levy, David A.
2000-06
-
Responding to Saddam: U.S. Policy Toward Iraq Since the Gulf War
This thesis is an analysis of U.S. policy toward Iraq since the Gulf War. UN Security Council Resolution 687 was the formal cease-fire agreement ending the Gulf War, the resolution requiring the elimination of Iraqi weapons of mass destruction and created the UN Special Commission (UNSCOM). Attempts to gain Iraqi compliance with Resolution 687 consumed U.S. Iraq policy for nine years. In 1999, UNSCOM was disestablished without fulfilling its mandate. The Security Council then adopted Resolution 1284 in attempt to introduce a new inspection regime into Iraq. This thesis examines the factors required to successfully compel Iraqi compliance with Resolution 687 and now Resolution 1284. The findings of this research conclude that current U.S. policy toward Iraq does not contain elements needed to successfully compel Iraqi compliance. The thesis then offers three policy options to deal with Iraq. The advantages and disadvantages of each are discussed. The thesis concludes that although current policy does not support the re-entry of a viable inspection regime, current policy does support the overall U.S. objective of containing Iraq. It is argued that this policy should be maintained in the near-term while the United States fully develops regime change as a long-term strategy.
Naval Postgraduate School (U.S.)
Murphy, Daniel E.
2000-06
-
War in Bosnia, 1992-1995: Analyzing Military Asymmetries and Failures
"This thesis analyzes the three key failures by the leading external powers in their efforts in 1992-1995 to manage the crisis in Bosnia and impose a settlement. Except for Russia, these leading powers were the so-called NATO quad: Britain, France, Germany, and the United States. When these powers initially intervened, they failed to comprehend the origins and dynamics of the Yugoslav crisis. These powers successively failed to prevent the outbreak of the fighting, then to properly contain it, and finally to achieve a stable and enduring settlement when the chance presented itself in 1995. The thesis concludes that the failures stemmed from incorrect assessments, a lack of political will, and organizational shortcomings. Because of these failures, the Bosnian conflict remains unsettled, and the current stalemate hinges on continuing political-military commitments by the external powers."
Naval Postgraduate School (U.S.)
Anghel, Gheorghe
2000-06
-
Dismantling Russia's Northern Fleet Nuclear Submarines: Environmental and Proliferation Risks
"This thesis examines the 1986 Chernobyl accident and its consequences as the basis for an analysis of the possible dimensions of the nuclear catastrophes that could occur during the dismantlement process of Russia's Northern Fleet nuclear submarines. It assesses the potential demographic, ecological, and economic consequences of a nuclear accident. Given the systemic problems at Russian nuclear facilities, the risks of a catastrophic event in the poorly maintained and operated submarine yards housing over 100 operating nuclear reactors are significant. A major nuclear accident at these facilities could cause damage to the environment of global proportions. This thesis considers the potential environmental impact of a nuclear accident during the nuclear submarine dismantlement process and discusses the environmental damage that has already occurred as a result of Soviet and Russian practices. This thesis also evaluates the risk of diversion of nuclear materials to proliferators or terrorists. Lastly, this thesis examines how the United States, the European Union, and perhaps others could assist Russia in reducing the environmental and proliferation risks in this dismantlement process."
Naval Postgraduate School (U.S.)
Snell, Benjamin A.
2000-06
-
Devrimci Sol: A Study of Turkey's Revolutionary Left and Its Impact on United States Interests, 1968-1999
Using the evolution of Devrimci Sol, this thesis analyses leftist terrorism against U.S. interests in Turkey between 1968 and 1999. During this period, leftists committed 81 percent of the terrorism-related murders of U.S. citizens. In the 1970s, leftists began targeting U.S. interests, including military personnel. By 1980, the left had killed ten Americans. Although severely crippled following Turkey's 1980 coup, Devrimci Sol-the most prominent group-re-emerged in 1990 and dramatically increased attacks against U.S. interests during the Gulf War, perpetrating 75 percent of all terrorist-related U.S. deaths in 1991. Although devastating Turkish security operations and an internal group schism following the Gulf War drastically reduced the organization's violent activities, the late 1990s witnessed Devrimci Sol's renewed interest in targeting the U.S. The thesis explains leftist development and violence against U.S. interests, suggesting Turkey's rapid modernization and the resulting instability provided fertile ground for the extreme left's emergence. By the 1970s, following periods of increased political liberalization, the rise of Marxist-Leninist ideology coupled with government intolerance to opposition groups elevated terrorism to the sole perceived avenue of change. External support, political amnesties, and reports of government oppression in Turkey support Devrimci Sol's continued survival. It remains a threat.
Naval Postgraduate School (U.S.)
Kenville, Michael J.
2000-06
-
Investigation and Assessment of Linux IPChains and its Vulnerabilities with Respect To Network Security
This research thesis formulates a survey of network security and IPChains, the Linux firewall. It provides a detailed description of prominent network security procedures in use today. This paper falls directly in line with the goals of Executive Order 13010, the President's Critical Infrastructure Protection Plan, supports the goals of the National Security Agency's SIGINT business Plan and the goals of both the Unified and Maritime Cryptologic Architecture. It will aid in the development of the problem solving efforts of the national cryptologic organization and be used to provide critical intelligence support to the Operational command and the national intelligence community.
Naval Postgraduate School (U.S.)
Lopez, Bryan S.
2000-06
-
Analyzing Asymmetric Operations
Current mathematical combat models and simulations have limited usefulness in analyzing asymmetrical operations, which exploit differences between friendly and enemy forces. The tools required to analyze these operations quantitatively are sparse and the underlying assumptions governing their application cannot be taken for granted. Conventional attrition models fail when applied to asymmetric activities such as Special Operations Forces (SOP) operations because SOP does not employ symmetric or attrition strategies. Successful SOP engagements achieve disproportionately large effects upon the enemy by creating and exploiting enemy weaknesses at decisive points. Some of these effects are: paralysis of enemy C3 networks, reduction of enemy morale, and suppression or even nullification of enemy combat effectiveness. This thesis will first identify the factors that differentiate SOP from conventional force operations to show that these factors cannot be accounted for in existing models. The thesis will then propose a direction for analysts to take for those who wish to investigate the nature of asymmetrical warfare, emphasizing its nature as a miniature campaign, introducing suppression of the enemy quantitatively, and incorporating the role of relative superiority at every step in the operation.
Naval Postgraduate School (U.S.)
Bustamante, George, Jr.
2000-06
-
Visible Hand: The Government-Industrial Relationship and Its Effects on Transatlantic Arms Cooperation
The economic realities of declining defense budgets and a smaller global arms market have, in recent years, forced governments to look beyond their own national borders when purchasing new armaments. This new global approach by governments in both the United States and Western Europe has resulted in an unprecedented consolidation of defense industries on both sides of the Atlantic. The key to understanding these events and what the future will hold is found in an examination of the government-industrial relationship, national corporate governance systems, the direction of the consolidation process in Western Europe, obstacles to future consolidation, and the prospects for transatlantic cooperation. An analysis of corporate profit data from British, French, and German defense companies was completed to study the effects of government involvement in industry and ownership concentration. While no direct connection between corporate performance and these issues is possible, both government involvement and ownership concentration are shown to play a significant role in determining the national composition of mergers and investments. Cross-border mergers of defense firms are currently obstructed, however, by a state focus on employment issues, foreign investment restrictions, industrial security regulations, and arms export controls. An understanding of these issues and the will to enact reforms is necessary for the future of transatlantic cooperation.
Naval Postgraduate School (U.S.)
McNichols, Jeffrey R.
2000-06
-
Is Electronic Privacy Achievable?
"While secrecy and integrity policies are most often crafted for protection of corporate (e.g., commercial, educational and government) information, we understand privacy policies to be targeted toward the protection of information for and about individuals. The purpose of this panel is to focus on how new technologies are affecting privacy. [...] Despite the historical lack of support for privacy research on the part of government, military and industry, it is encouraging to see recent developments in theory, techniques and products to support the 'Privacy' part of 'Security & Privacy' (e.g., see 'proponent' panelists, below). However, it seems clear that the science of privacy is in its infancy, and there are more questions on the table than answers."
Naval Postgraduate School (U.S.)
Irvine, Cynthia E.; Levin, Timothy E.
2000-05
-
Analysis for a Trusted Computing Base Extension Prototype Board
From the thesis abstract: "Agencies, institutions, individuals are demanding the use of commercial-off-the-shelf systems and cannot enforce mandatory security policies with these systems, which are equipped only with discretionary access controls. An inexpensive implementation of a multilevel secure local area network utilizing commercial-off-theshelf hardware and software does not exist. The The Naval Postgraduate School (NPS) is developing a Multilevel Secure Local Area Network (MLS LAN) to provide secure information sharing, classified at different security levels. The MLS LAN extends the high assurance of an evaluated multilevel secure system to a LAN that is formed by commercial personal computers (PCs) running commercial operating systems and office productivity software. The MLS LAN accomplishes the defined functionality by using custom boards which are designed to be plugged into personal computers. The boards are named the Trusted Computing Base Extension (TCBE). The TCBE is intended to provide trusted path and object reuse supporting services to the network TCB. This thesis describes the hardware and software components, structures, interfaces required for the TCBE to complete a trusted path and control the client PC. Potential implementations are suggested and analyzed for security implications. A preliminary TCBE prototype has been constructed and tested for selected TCBE functions. It is shown that the TCBE prototype can be made both non-by-passable and tamper resistant."
Naval Postgraduate School (U.S.)
Turan, Bora
2000-03
-
Role Of U.S. Maritime Policy In Strategic Sealift
Strategic sealift is essential to the Department of Defense for it to carry out its national security mission. Surge sealift is provided primarily by DoD's organic fleet. Sustainment sealift is accomplished through chartering commercial ships. U.S. maritime policy places the primary requirement for sustainment sealift on the U.S. maritime industry. Policies dating to the 1920s attempt to ensure an adequate number of ships by providing operating subsidies and cargo preference. Despite these policies, the size of the U.S. commercial fleet has decline& DoD uses foreign flag ships to meet its needs when U.S.- flagged vessels are not available. Foreign flag ship use is significant and presents risk to the conduct of military operations. The world maritime industry has undergone significant change. The rise of flags of convenience and open registries has altered the industry. This thesis reviews U.S. maritime policy, DoD's requirement for sealift and options for obtaining sealift. It identifies and explores the nature of the risk related to strategic sealift facing the DoD as it enters the 21st century and suggests that the risk associated with the use of foreign flag vessels is low.
Naval Postgraduate School (U.S.)
Williams, Stephen J.
2000-03