Advanced search Help
Publisher is Naval Postgraduate School (U.S.)
Clear all search criteria
Only 2/3! You are seeing results from the Public Collection, not the complete Full Collection. Sign in to search everything (see eligibility).
-
Proposal for a Standing Mediterranean Amphibious Force for the North Atlantic Treaty Organization
"This thesis examines the need for a Standing Amphibious Force in the Mediterranean (STAPHIBFORMED) and proposes a distinct European maritime force, under NATO auspices, to compliment US presence in the Mediterranean and, when necessary, to act as a substitute. The United States looks to simultaneously share some of the European regional security responsibility with its allies while still maintaining its influence with security matters. Concurrently, European nations have reduced their defense budgets and, in the spirit of Maastricht, look to rely on multinational defense organizations for both economic and political reasons. The STAPHIBFORMED concept is a mechanism for crisis response and peacekeeping operations that facilitates resource-sharing and permits Europeans to undertake some missions without direct US involvement. Such a force promotes a distinct European Security and Defense Identity, reflects the new NATO Strategic Concept, and helps to satisfy the American desire to share more of the European regional security burden with Europe."
Naval Postgraduate School (U.S.)
Weiss, Aaron
1998-12
-
Success of Terrorism in War: The Case of Chechnya
From the thesis abstract: "Russia militarily invaded Chechnya in December 1994 expecting to easily suppress the separatist uprising in the region. The Russian Army was unprepared and had greatly underestimated the Chechen forces under the command of former Soviet Air Force General Jokhar Dudayev and his motivated field commanders with recent war experience in Afghanistan, Abkhazia, and Azerbaijan. When Russian forces began to gain a decided advantage (due to overwhelming firepower and numeric superiority) between February and June of 1995 and began to attack the last Chechen strongholds deep in the southern mountains, Chechen tactics changed. The June hostage raid, led by Chechen Commander Shamil Basayev, against Russian civilians in the town of Budennovsk marked the beginning of a successful campaign of terrorism by Chechen combatants that had a decisive impact on the outcome of the war. The Budennovsk episode, which resulted in a short- lived cease-fire, was followed by a series of more varied terrorist attacks between June 1995 and January 1996. These attacks were successful in swaying public opinion against the war effort, in creating widespread fear among the Russian population well beyond the borders of Chechnya, and ultimately led to Chechnya's victory over Russia."
Naval Postgraduate School (U.S.)
Sumner, Dianne L.
1998-09
-
Protocol for Building a Network Access Controller (NAC) for 'IP over ATM'
From the thesis abstract: "The implementation of label swapping packet-forwarding technology increases the vulnerability to insider attacks. These attacks refer to unauthorized access from within an enclave to the outside network. In this thesis we propose a protocol to counter this category of attacks. The proposed protocol provides a means for fast packet authentication. High speed is achieved by the use of a trailer, which allows packet filtering at Layer 2, and the use of cheap and fast message digest algorithms. To overcome the weaknesses of a 128-bit message digest algorithm, each key is designed to have a very short cryptoperiod. Such fast rekeying is implemeted [sic] by key caching (the host has a table of keys). Initial performance measurements indicated that it is possible to use our protocol while maintaining very high data throughput. Specifically, our protocol implements an authentication module, called Network Access Controller (NAC). The NAC's modular nature allows it to be easily integrated with a variety of routing technologies and other security mechanisms while remaining totally independent of them."
Naval Postgraduate School (U.S.)
Kondoulis, Ioannis
1998-09
-
Implementation of Secure Flow Type Interference for a Subset of Java
From the thesis abstract: "Smart cards play an important role in a digital society. A smart card contains memory or an embedded microprocessor with the capability of enabling a wide variety of services, such as electronic cash in the case of memory cards and digital signature computation in the case of processor cards. A processor card can require a cardholder to authenticate herself in order to prevent others from using the card's services, from forging the cardholder's signature, for example. Authentication can be done by storing a personal identification number (PIN) or digitized fingerprint of the cardholder on the card itself. The PIN or fingerprint must always remain confidential no matter how the card is (ab)used. This thesis addresses the problem of preserving the privacy of information stored on smart cards. Volpano and Smith have developed a static analysis for analyzing source code for information flow violations. This technique is developed further here for a language called Java Card, in which smart card applications are written. A prototype analyzer is presented for a subset of Java Card and applied to a sample card application to demonstrate its utility in protecting private information stored on smart cards."
Naval Postgraduate School (U.S.)
Akdemir, Ismail Okan
1998-09
-
British Intelligence and the IRA: The Secret War in Northern Ireland, 1969-1988
"The British Army was sent to Northern Ireland in 1969 as a peacekeeping force between the Catholic and Protestant communities. Against a backdrop of sectarian violence, emerging paramilitary organizations began to contest British authority throughout the province. The British peace operations then evolved into counter-insurgency and counterterrorism operations. As the mission of the British Security Forces changed, the role of British intelligence became increasingly important. This thesis is a history of British intelligence operations against the Irish Republican Army (IRA) from 1969 to 1988. It critically examines the role of the British intelligence community in Northern Ireland and focuses on the major intelligence agencies that participated in the war against the IRA. The tradecraft of British intelligence is analyzed, particularly the use of informers as the primary vehicle of information about the IRA. Four representative operations conducted by British intelligence are presented as historical case studies and illustrate covert intelligence collection, propaganda operations, clandestine penetration, and the involvement of intelligence in so-called 'shoot-to-kill' incidents. The thesis concludes with an analysis of the uneasy relationship between Britain's aggressive intelligence community and the democracy that it serves."
Naval Postgraduate School (U.S.)
Bowlin, Mark L.
1998-09
-
Software Components for Air Defense Planning
Modern offensive weapon technologies such as stealth and precision-guided munitions have rendered Integrated Air Defense Systems increasingly vulnerable and ineffective. Stealth effectively reduces the performance of radar, but does not have the same impact on passive systems. Sensors have been the most important and vulnerable part of air defense systems throughout the history of air warfare. Research into passive sensors has been encouraging, but before passive sensor systems are produced, procured and deployed, analysis and planning must be conducted to quantify potential benefit and determine feasible system configurations. As this type of analysis encompasses extremely complex system behavior, developing reusable and flexible simulation models becomes important. This thesis develops a prototype software component architecture and component library for building simulation models for air defense analysis. Sensor and airborne weapon simulation components are demonstrated and used in an exploratory analysis of the impact of a network of Infrared Search and Track sensors. The analysis is based on a modern air defense system deployed in a realistic scenario. The component architecture and documentation methodology supports reuse, and provides model configuration flexibility with potential for growth in successive stages of analysis.
Naval Postgraduate School (U.S.)
Amtzen, Arent
1998-09
-
High Degree of Autonomy: The Reversion of Hong Kong to Chinese Sovereignty
"At midnight on June 30,1997, the British colony of Hong Kong reverted to Chinese sovereignty and became Special Administrative Region (SAR) of the People's Republic of China. The Sino-British Joint Declaration on the Question of Hong Kong calls for maintaining Hong Kong's lifestyle and 'high degree of autonomy' for fifty years after its transition to the Hong Kong SAR. The primary research question that this thesis will attempt to answer is: How has the concept of 'high degree of autonomy' been operationalized since its inception in the 'Joint Declaration of the Government of the United Kingdom of Great Britain and Northern Ireland and the Government of the People's Republic of China on the Question of Hong Kong'? This thesis argues that during the period of time from the signing of the Joint Declaration to the actual reversion to Chinese sovereignty the negotiations over the concept of Hong Kong's 'high degree of autonomy' established the framework of the post-reversion way of life in Hong Kong."
Naval Postgraduate School (U.S.)
Choyke, Michele L.
1998-09
-
Kosovo: The Balkan Time Bomb?
From the thesis abstract: "The conflict between ethnic Albanians and Orthodox Christian Serbs in the Serbian region of Kosovo provides the foundation for a Fourth Balkan War. Kosovo was at the origin of the most recent Balkan conflict and may unravel peace efforts in the future. Serbia revoked Kosovo's autonomous status in 1989 and has instituted a campaign of repression that is currently unrivaled in Europe. The ethnic Albanian majority in Kosovo comprises over ninety percent of the population and seeks recognition as the independent Republic of Kosovo. Initially, ethnic Albanians responded peacefully to Serb antagonism, but impatience with the lack of progress has led to the use of terrorism to achieve political aims. The recent emergence of the Liberation Army of Kosovo (UCK) as the vehicle for the armed opposition has provoked a series of violent Serb crackdowns. Ethnic Albanian leaders of the self-proclaimed Republic of Kosovo understand the need for external support and are working to court the international community. Although outside intervention is a sine qua non of a solution to the Kosovo problem, the international community did not address the issue in the 1995 Dayton Accords."
Naval Postgraduate School (U.S.)
Kelley, Sean P.
1998-06
-
Overcoming the ABM Treaty: Paths to National Missile Defense
Some of the most heated debates taking place on Capitol Hill surround a proposed American national missile defense system. The debate is not new. For twenty years, the Anti-Ballistic Missile (ABM) Treaty and its underlying acceptance of mutual assured destruction (MAD) enjoyed widespread support among U.S. leaders. Events of the early 1990s shook support for America's "no missile defense" posture to its very core. The fall of the Soviet Union, the proliferation of weapons of mass destruction (WMD) and ballistic missile technology, and the Gulf War presented new challenges to existing strategic doctrine. As a result, a renewed push for a U.S. National Missile Defense (NMD) system began in earnest, and a new round of debates began over the utility of the bilateral ABM Treaty in a multilateral post-Cold War international environment This thesis identifies four distinct paths which the United States could follow in addressing the NMD-ABM Treaty debate. Each path is characterized by distinct factors which historically have influenced past ABM system debates. The most likely path to NMD that the United States is following, based on these driving factors, is identified. The potential implications which this prevalent NMD path may have on U.S. Navy force structure and planning is also addressed. Understanding how the current NMD debate is structured and driven enables one to discern which path to NMD deployment the United States is on. This realization can help shape future force planning considerations.
Naval Postgraduate School (U.S.)
Keenan, Joseph M., Jr.
1998-06
-
Terrorism and Organized Crime: The Alliance of Tomorrow? How to Counter a Possible Future Threat
While in the post-Cold War era threats to international security have become less direct and apocalyptic, they are today more diffuse and insidious. With the probability of large scale, high intensity conflicts decreasing during the l990s, terrorism and transnational organized crime --each in itself-- constitute an increasing and serious threat to the national security of affected nations. Any alliance of these two criminal phenomena is likely to cause a disproportional increase of the overall threat. The thesis, while following an analytical/inductive approach, tries to identity the rationale for such alliances. Although aims and objectives of terrorists and organized criminal groups are different by nature, alliances of convenience have already formed in the past. With globalization apparently working in the favor of terrorists and organized crime, it seems to be only a question of time before they begin merging and start working jointly. Since those criminal organizations tend to exploit the weaknesses of international cooperation by increasingly operating in the transnational sphere, any attempt at a successtul counter-strategy has to meet this threat where it originates. Against this background, international cooperation of law enforcement agencies becomes increasingly important - "Internal Security", it seems, acquires a transnational dimension.
Naval Postgraduate School (U.S.)
Morbach, Gernot W.
1998-06
-
Oslo and the Middle East Peace Process: The Negotiating Dilemma
With the increased threat posed by terrorism and the growth of rogue states' the importance of achieving a lasting peace in the Middle East is greater than ever. However, the peace begun in Madrid in 1991 and marked by the historic 1993 Oslo Accord between Israel and the PLO has floundered. This thesis provides a means for understanding the failure of the current peace process by analyzing why Israel and the PLO agreed to the terms of Oslo. While Israel was motivated by the opportunity to solve its security and political dilemmas on acceptable terms, the PLO was motivated primarily by concerns of organizational survival. The Oslo process departs from other successful settlements in two ways. First, Oslo focused on short-term arrangements, without consensus on the nature of the final outcome. An examination of successful settlements shows that the parties agreed to the outlines of a final settlement prior to commencing formal negotiations. Second, the vast imbalance of power between the two parties has made Oslo a hegemonic peace, which itself perpetuates instability in both the weaker and stronger states. Only parties enjoying a relative balance of power have concluded successful peace settlements in the Middle East. Given these structural anomalies, I conclude that the Oslo peace process will not achieve a lasting,peace between Israel and the Palestinians.
Naval Postgraduate School (U.S.)
Chatham, Robert L.
1998-06
-
Applying the Multiple Public Good Model for Establishing a Security Policy for Hungary
"This study was written with an aim to suggest a security policy approach for Hungary after becoming a member of NATO. The formulation of the country's security policy started with examination of security threats in general and analysis of Hungary's close security environment in particular. The analysis revealed that the threat of large scale military aggression has disappeared. However, other types of security challenges--economic crises, ethnic hostilities, environmental pollution, proliferation of weapons of mass destruction--prevailed, and the military concerns of security has decreased in importance. The issues of globalization, and diversification of threat perception could be addressed by cultivating a portfolio of security provisions. The multiple public good model suggested by Mark A. Boyer, an associate professor of political science at University of Connecticut, for analyzing defense alliances was an appropriate approach to formulation of Hungary's security policy. Based on the results from the threat assessment and the suggestions of the multiple good model, Hungary's security policy was introduced as a portfolio of defense provisions which in turn was Hungary's contribution to the Alliance. The evidence of contribution to the collective defense was seen through an examination of Hungary's path toward acceptance into NATO and an analysis of domestic stakeholders. The suggested portfolio contained three particularly Important fields: economic cooperation as a means of spreading security eastward, handling the questions of ethnic minorities in neighboring countries, and modernization of the Hungarian Defense Force."
Naval Postgraduate School (U.S.)
Kereki, Laszlo
1998-06
-
Sea Dragon Network: Implications of the International Expansion of China's Maritime Shipping Industry
"This thesis examines motivations and implications of the international expansion of China's maritime shipping industry (MSI). China's economic growth strategy depends on maritime shipping to export foreign exchange earning commodities and import strategic energy, industrial, and food resources. China's MSI is expanding faster than that of any nation and is creating regional shipping networks that increase levels of Sino-foreign trade (SFT) interdependence. The argument herein is that increases in SFT enhance Beijing's regional ability to advance China's economic, political, and security interests."
Naval Postgraduate School (U.S.)
Hugar, Wayne R.
1998-06
-
Roundhouse: A Security Architecture for Active Networks
"We describe a high-assurance framework for networked clients and servers. Called Roundhouse consists of the following elements: (1) Pinkerton, a comprehensive model for the implementation of distributed protection domains that provide for robust protection in a networked environment; (2) Iron Horse: Functional and security design of a kernelized host providing essential ring-based protection, packet authentication, and cryptography services for higher layers. (3) DEPOT: Specification, design, and prototype implementation on a PC base of the framework and initial content of dynamically modifiable servers. The intent is that DEPOT clients and servers would take advantage of platform protected modes where available (e.g., Windows NT, Iron Horse) leading to client-server computing in a network of heterogeneously trusted hosts. As a general facility for installing and managing application 'hooks' DEPOT incorporates the following key new ideas: (1) the division of sets of hooks by module, (2) the partial ordering of modules, (3) binding hooks to network names, and (4) provision of a run-time model of module behavior with a visible state machine model that abstracts and externalizes the dynamic behavior of that module. The architecture is unique as it composes strong and weak systems securely and permits the dynamic retooling of executing software."
Naval Postgraduate School (U.S.)
Irvine, Cynthia E.; Shockley, William R.
1998-05
-
Joint Strategy and Strategic Sealift for the Next Century
From the thesis abstract: "The President's National Security Strategy calls for the U.S. military to 'shape-respond-prepare' for a strategic environment that continues to advance U.S. interests. It also prescribes the necessity to move toward a more joint way of life. With increased emphasis on jointness, the Navy has made significant strides in becoming a partner with the other services. Not only are the serves more joint, but so are the organizations participating in contractual agreements. One area where DoD and industry have increased their joint relationship is in the area of strategic sealift. As the world's shipping industries have grown the U.S. industry has reduced by one third. This has presented DoD with a major dilemma. The current NSS calls for strategic sealift to support two simultaneous Major Regional Conflicts. The MSA of 1996 was passed by Congress to ensure supportability of U.S. forces overseas. The VISA is an agreement to make intermodal shipping services and capacity available to DoD as required to support the emergency deployment and sustainment of U.S. military forces. It is accomplished by cooperation between DoD, DoT, and Industry. This research presents analysis of current policies and sealift capabilities in support of the two MRC scenario."
Naval Postgraduate School (U.S.)
Johnson, Ernest E.; Gopffarth, Bobby L.
1998-03
-
Analysis of Federal Airport and Air Carrier Employee Access Control, Screening and Training Regulations
Current Federal Aviation Regulations concerning civil aviation security are focused on countering the threat of a passenger hijacking a commercial airplane. Current media and government emphasis is focused on a passenger breaching security at an airport in the U.S. and not an employee breaching security. The security of the U.S. air travel industry from terrorist attacks hinges on an effective civil aviation security program. Government and aviation industry officials would greatly benefit from the revision of the current Federal Aviation Regulations concerning civil aviation security to address the issue of terrorism initiated by an employee. This thesis provides a thorough examination of current Federal Aviation Regulations parts 107 and 108 sections concerning airport and air carrier employee access control, screening, and training. Based upon field research of five U.S. airports, the work furthermore analyzes related issues and problems associated with these regulations and generates recommendations that serve to enhance security for the traveling public, air carriers, and persons employed by or conducting business at public airports.
Naval Postgraduate School (U.S.)
Miller, Edward G.; Dover, Mark W.
1998-03
-
Study of Navy and Marine Corps Prison Inmates Affiliated with Gangs and Extremist Groups: Trends and Issues for Enlistment Screening
"This thesis examines self-identified gang members and extremists incarcerated in Navy and Marine Corps brigs and disciplinary barracks. Information was gathered from interviews conducted with inmates. The interviews focused on several key issues, including reasons for enlisting in the Navy and Marine Corps; truthfulness with recruiters concerning certain illegal activities prior to enlistment, including juvenile arrests and convictions; the nature and severity of crimes for which members were convicted, including links with gangs or extremist groups; and reasons for lack of assimilation and acculturation into military service. This thesis also provides background information on present enlistment screening procedures, current Department of Defense policies concerning gangs and extremist groups, and demographic data on the characteristics of self-admitted gang members who are incarcerated in a Navy brig. Common themes that emerged from the interviews are presented, and selected summaries are included in an appendix. In addition, the study examines enlistment screening procedures for identifying applicants who have gang or extremist group affiliations, and recommends a number of areas for further research."
Naval Postgraduate School (U.S.)
Tierney, Kathryn E.
1998-03
-
Security Issues for the Software Evolution Model
"This thesis examines the security requirements of the software evolution model and identifies possible security mechanisms called control classes that are applicable to the model. Then, based on combinations of control classes, proposes a suitable security level for each of the model's databases. Furthermore this thesis deals with the possibility of using Pretty Good Privacy as a method for protection of software data stored in databases. The software evolution model captures all the necessary changes in requirements early during the development process in order to help in minimization of project cancellation, delivery delays and extra costs for fixing errors. The protection of software data against unauthorized accesses and modifications is a primary consideration for the software evolution process. In this way, we can develop a secure environment on which the software evolution can rely for accomplishing its goal."
Naval Postgraduate School (U.S.)
Rambidis, Anastasios X.
1998-03
-
Organizational Innovation and Redesign in the Information Age: The Drug War, Netwar, and Other Lower-End Conflict
"The end of the Cold War and the rise of the Information Age have fostered an uncertain security environment which the United States is struggling to master. The purpose of this thesis is to explore the factors that lead complex organizations to initiate large-scale structural change in the face of environmental uncertainty; and more specifically to determine how the rise of the Information Age may change the organizational requirements of the U.S. national security structure. This thesis creates a unique framework for analysis, blending principles of organization and innovation theory with the theory of information-based 'netwar.' This study analyzes the organizational structures adopted by several transnational drug cartels, and compares them to that of U.S. counternarcotics forces. Next, this thesis reviews a series of recent occurrences pertaining to national security to test whether there are manifestations of netwar threats emerging, and whether new and old organizational actors are learning to adapt their structures to gain an advantage over the United States. Finally, this thesis is both predictive and prescriptive with regard to the issues of organizational redesign. It argues that structural changes are necessary for the United States to ensure the national security in an Information Age. Then it makes recommendations that would help the U.S. security structure redesign itself to become more agile in the face of Information Age threats."
Naval Postgraduate School (U.S.)
Berger, Alexander
1998-03
-
Information Security Education Initiative for Engineering and Computer Science
"This paper puts forward a case for an educational initiative in information security at both the undergraduate and graduate levels. Its focus is on the need for such education, the desired educational outcomes, and how the outcomes may be assessed. A basic thesis of this paper is that the goals, methods, and evaluation techniques of information and computer security are consistent with and supportive of the stated goals of engineering education and the growing movement for outcomes-based assessment in higher education."
Naval Postgraduate School (U.S.)
Irvine, Cynthia E.; Chin, Shiu-Kai; Frincke, D. A. (Deborah A.)
1997-12
-
Assessment of the Fiscal Year 1997 Department of Defense Budget and Program Activities for Domestic Defense Against Weapons of Mass Destruction
This thesis examines Department of Defense involvement in U.S. preparedness to manage the consequences of a nuclear, radiological, biological, or chemical terrorist attack against its cities. It analyzes the establishment and implementation of the Defense Against Weapons of Mass Destruction Act of 1996 which directed the Department of Defense to assist in the training of state and local emergency response agencies involved in consequence management activities. The historical analysis focuses on the proliferation of weapons of mass destruction since the dissolution of the Soviet Union, major terrorist incidents since 1993, international standards, and legislative and executive efforts undertaken to combat terrorism up to 1996. The $150 million Nunn Lugar Domenici amendment to the FY-97 National Defense Authorization Bill is examined in detail from introduction on the Senate floor to eventual passage and enactment. Problems and policy issues associated with resourcing and implementing the resulting Domestic Preparedness Program are treated. Although the DoD was given responsibility for implementing city training, an interagency effort ensued involving the Public Health Service, Environmental Protection Agency, Federal Bureau of Investigation, Federal Emergency Management Agency, Department of Energy, and others. Potential weaknesses may materialize due to several characteristics of the Domestic Preparedness Program, including its novelty and uniqueness, the unorthodox legislative process by which it was established, and its complex organizational structure and temporary nature.
Naval Postgraduate School (U.S.)
Guenther, Glenn R.
1997-12
-
Marine Ground Intelligence Reform: How to Redesign Ground Intelligence for the Threats of the 21st Century
Present-day Marine ground intelligence is configured for attrition warfighting and the predictable conventional adversaries of the past. Designed during WWII, it has undergone little change; what has changed is the threat environment. Modern-day threats are less centralized and regimented. They think on their own and they adapt quickly. This thesis analyzes the current configuration of Marine ground intelligence and compares it with two major threats of the next century: asymmetric military threats and non-conventional threats. To counter these smart adversaries, Marine ground intelligence will need to be configured differently. Sophisticated sensors and rote intelligence work are no longer enough to identify and track these powerful threats. The performance of Marine intelligence during the Gulf War demonstrates that having failed against the Iraqi army, intelligence is very likely to fail again. Indeed, Marine intelligence faces a serious dilemma: it can either reform or face ever-decreasing relevance and effectiveness. Having presented the rationale for urgent reform, this work recommends an intelligence enterprise centered around the leveraging of human intellect. It suggests the network as the design change that best leverages intellect and optimally configures ground intelligence for operating successfully against the threats of the next century.
Naval Postgraduate School (U.S.)
Cukor, Draw E.
1997-12
-
Great Powers, Weak States and Asymmetric Strategies
On the verge of the twenty-first century, America finds itself in the position of a great power with dominant military technology. This thesis examines the possibility that weaker states may be able to strategically innovate and defeat us in war despite our technological advantages. The purpose of the thesis is to survey what type of strategic innovations, also known as asymmetric strategies, are possible and to examine the conditions under which they may be successful. This thesis begins by defining asymmetric strategies using a comprehensive model of strategy developed by Rear Admiral J.C. Wylie. The thesis also examines four variables which may explain the success or failure of asymmetric strategies. To illustrate possible asymmetric strategies and examine the contextual conditions under which they work, the thesis considers the cases of the Italo-Ethiopian war of 1935-36, the Russo-Finnish War of 1939-40, and the American-North Vietnamese War of 1965-73. The thesis finds that the four variables have significant explanatory power for the success or failure of these strategies. The thesis concludes by examining strategic implications for the United States, both as a possible opponent of weak states and as a supporter of a weak state faced by a great power threat.
Naval Postgraduate School (U.S.)
Lwin, Michael R.
1997-12
-
Civil-Military Relations in Domestic Support Operations: The California National Guard in Los Angeles 1992 Riots and Northridge Earthquake of 1994
The main argument of the thesis is that the use of the California National Guard (CNG) in response to major emergencies has both advantages and disadvantages as a model for countries in transition, such as Ukraine. Furthermore, it argues that civil- military relations in domestic support operations (DSO) are a very important factor to consider when new democracies try to build an effective system of emergency management. The author attempts to explain why the civil authorities, specifically in the United States, request military involvement in domestic emergencies while remaining suspicious about military involvement in domestic affairs. He discusses the reasons for military involvement in disaster relief and law enforcement operations, and the considerations and constraints by which the US federal legislation authorizes and limits it. The study is based on two cases of DSO in which the CNG participated as one of the leading agencies: the 1992 Los Angeles Riots as an example of military assistance in a civil disturbance operation and the 1994 Northridge Earthquake as an example of a disaster assistance operation. In the conclusion, the thesis provides recommendations about the applicability of the CNG's experience and organizational features for the emergency management systems in new democracies, particularly Ukraine.
Naval Postgraduate School (U.S.)
Khomchenko, Sergey
1997-12
-
Malaysia, Singapore, and Indonesia - Controlling the Malacca Straits
"This thesis analyzes the military capabilities of Malaysia, Singapore, and Indonesia and assesses their collective ability to control the use of the Straits of Malacca and the Singapore Straits. With steadily growing economies as a source of funding, Malaysia, Singapore, and Indonesia have made significant improvements in their military stature. Collectively, they can control this vital passage, preventing both military and commercial shipping from using these straits. These three littoral nations' key interests that might lead them to restrict and deny the use of the Malacca Straits are identified. Their military force composition and capability also is reviewed."
Naval Postgraduate School (U.S.)
Bandy, Way, Jr.
1997-12
-
Management in the Japan Maritime Self Defense Force: The Effects of Japanese Values and Beliefs
"This thesis examines the organization and management of Japan Maritime Self-Defense Force (JMSDF) and its similarities and common features with Japanese corporate management, a common style grounded in culture and more specifically in the Japanese educational system. In nearly one hundred years organizational theory, practices, and systems were mostly transplanted from the United States and European countries. However, these systems evolved to fit the environment and culture of the Japanese people. This study investigates features and relationships among the Japanese environment, culture, educational systems, and management style. Japanese society and culture deeply affect the education system, and this system in turn socializes people in basic beliefs and values (e.g., harmony and loyalty) foundational to Japanese corporate practices (e.g., group decision making and lifetime employment). This study seeks to advance our understanding of how JMSDF participates in the same culture, is grounded in the same beliefs, and engages in similar practices as other Japanese organizations."
Naval Postgraduate School (U.S.)
Norimatsu, Takeshi
1997-12
-
Fiscal, Maritime, and National Security Factors Influencing the Development of the Maritime Security Act of 1996 (MSA)
"The Merchant Marine Act of 1936 established the federal government's policy of developing and maintaining a commercial merchant marine capable of carrying a substantial portion of the nation's waterborne commerce and performing as a military auxiliary in time of war. Today the merchant marine continues to serve the nation in commerce and provides sustainment sealift assets and skilled seafaring crews to help meet DOD strategic mobility requirements. To maintain such a fleet, a highly regulated system of subsidy payments was provided to shipowners to offset the higher costs associated with the U.S. registry. Despite the outlay of over $14 billion in aid, the U.S. merchant marine has continually declined both in numbers of ships and the percentage of U. S. trade carried. This study examines the development of the Maritime Security Act of 1996 (MSA), and the policy decision to continue financial assistance in support of maintaining the merchant marine. To analyze the implications of this policy a comprehensive examination of congressional documents and industry publications was conducted. DOD and DON mobility planners can benefit from this study, as the condition of the merchant marine impacts both national security and mobility readiness. The study concluded that the MSA was a compromise reflecting many interests, reducing federal investment in the program and requiring recipients of payments to make available their entire transportation infrastructures to support DOD mobility requirements in times of crisis."
Naval Postgraduate School (U.S.)
Kott, Timothy J.
1997-12
-
Gold, Not Purple: Lessons from USAID-USMILGP Cooperation in El Salvador, 1980-1992
"The United States faces a continuing need to conduct interagency operations, especially between the military and USAID. Surprisingly, however, this field has been treated much too casually in light of its merits as a potential force multiplier-and as a source of serious operational problems. US leaders will continue to choose the interagency approach (over unilateral options) to solve the sorts of complex problems that demand action and systematic intervention, yet allow room for political maneuver. By studying the activities of two inherently adversarial bureaucracies (USAID and the USMILGP) which needed to work together to solve a complex counterinsurgency problem in El Salvador, I have been able to determine which factors are most important for unity of effort in future interagency operations. In El Salvador the mission was to combat insurgents, but the principles and many of the tasks required to succeed then and there, apply today and elsewhere in waging the wars against drugs, terror, and other post-Cold War security threats."
Naval Postgraduate School (U.S.)
Moore, Scott W.
1997-12
-
Design of a High Assurance, Multilevel Secure Mail Server (HAMMS)
From the thesis abstract: "Computer systems employed in the Department of Defense (DoD) for processing classified electronic mail (email) generally operate at the highest classification level of the data being processed. These system high implementations cause two significant problems: all users must be granted unnecessarily high security clearances, and separate, incompatible workstations and networks exist for users to process classified data at different security levels. To solve these problems a System/Subsystem Specification (SSS) and a System Security Engineering (SSE) approach has been used to design a High Assurance, Multilevel Secure Mail Server (HAMMS). This thesis presents the architecture, mailing capabilities, and required design characteristics necessary to develop a high assurance mail server. Existing high assurance and information security systems are analyzed to identify related design advantages and disadvantages for a high assurance mail sever. Also included is the initialization, adaptation, and employment of a media encryption device and associated software that will be adapted to extend secure mail operations to a Commercial-Off-The-Shelf (COTS) workstation. The result of the research is a system design that can be employed to provide a high assurance multilevel email server and a reduction in the number of workstations, incompatible networks, and user clearances required in secure environments. In the future, the HAMMS design can be used as the basis for other high assurance server applications."
Naval Postgraduate School (U.S.)
Downey, James P.; Robb, Dion A.
1997-09
-
Squaring the Circle: Attempting Peace in Northern Ireland
"Finding a political framework for self-government in Northern Ireland that will be supported by both nationalists and unionists is referred to as a modern day attempt to do the impossible-to 'square the circle.' During the latest phase of the Troubles, from 1968 to 1996, there have been many attempts to bring peace to Northern Ireland by creating a negotiated settlement, but none has worked. This thesis compares two of the most significant attempts, the first in 1973 and the second in 1993, to evaluate prospects for peace in the future. Although the goals of both attempts were the same (a devolved government, economic recovery, and the cessation of terrorist violence), a comparison shows important differences in the political atmosphere and style of the peace process, effected especially by the changing role of the Irish Republican Army's political wing, Sinn Fein, and the intervention of third party mediators."
Naval Postgraduate School (U.S.)
Marchi, Gina A.
1997-09