Advanced search Help
Publisher is Naval Postgraduate School (U.S.)
Clear all search criteria
Only 2/3! You are seeing results from the Public Collection, not the complete Full Collection. Sign in to search everything (see eligibility).
-
Applying the Multiple Public Good Model for Establishing a Security Policy for Hungary
"This study was written with an aim to suggest a security policy approach for Hungary after becoming a member of NATO. The formulation of the country's security policy started with examination of security threats in general and analysis of Hungary's close security environment in particular. The analysis revealed that the threat of large scale military aggression has disappeared. However, other types of security challenges--economic crises, ethnic hostilities, environmental pollution, proliferation of weapons of mass destruction--prevailed, and the military concerns of security has decreased in importance. The issues of globalization, and diversification of threat perception could be addressed by cultivating a portfolio of security provisions. The multiple public good model suggested by Mark A. Boyer, an associate professor of political science at University of Connecticut, for analyzing defense alliances was an appropriate approach to formulation of Hungary's security policy. Based on the results from the threat assessment and the suggestions of the multiple good model, Hungary's security policy was introduced as a portfolio of defense provisions which in turn was Hungary's contribution to the Alliance. The evidence of contribution to the collective defense was seen through an examination of Hungary's path toward acceptance into NATO and an analysis of domestic stakeholders. The suggested portfolio contained three particularly Important fields: economic cooperation as a means of spreading security eastward, handling the questions of ethnic minorities in neighboring countries, and modernization of the Hungarian Defense Force."
Naval Postgraduate School (U.S.)
Kereki, Laszlo
1998-06
-
Chechnya and Russia: Conflict and Self-Determination
The current Russo-Chechen conflict illustrates the persistent tension between the principles of national self- determination and territorial integrity. Russia and Chechnya remain engaged in a centuries-old struggle with no foreseeable end. Many Chechens assert that they are continuing the struggle to break free of Russian oppression which began over two centuries ago. Indeed, Chechens have compared their struggle for national self-determination to that of the United States in 1776. In contrast, Russians argue that they have the right to protect and preserve their country's territorial integrity. In an effort to gain support from foreign observers, Russia has portrayed its struggle in Chechnya as part of the fight against international terrorism. Reaching an acceptable political solution would require compromises regarding the fundamental principles as well as the security and economic interests at stake.
Naval Postgraduate School (U.S.)
Garvie, Brett A.
2002-12
-
Fox Nuclear, Biological, and Chemical Reconnaissance System: Lessons-Learned from a Foreign Non-Developmental Item Acquisition
Non-developmental Item acquisitions represent a viable approach to meet procurement needs of the Defense Department. The reduced acquisition cycle times and resultant cost savings of this acquisition strategy presents significant potential benefits to DoD. One weapon system program that has successfully used such an NDI strategy is the U.S. Army's Fox Nuclear, Biological, and Chemical Reconnaissance System. This thesis examines the DoD acquisition process and how NDIs are used within the process. The thesis then examines the Fox Program and its NDI Acquisition strategy to determine what factors made the program successful. From this analysis, lessons-learned are identified that can be used by other acquisition managers and their staffs effectively to manage future NDI programs.
Naval Postgraduate School (U.S.)
Norris, James W.
1995-06
-
America's War on Drugs: Who's Winning?
Recently, Congress, the literary community, and the public at large have come to reconsider the war on drugs. There are many opinions regarding alternatives to this pseudo war or new measures to be taken in the war effort, but the ongoing effort itself has escaped evaluation (to determine if the United States is winning this campaign). The intent of this thesis, then, is to explore the objectives of the war on drugs, and to determine if America is winning. This work concludes that the current drug war is failing. The emphasis (supply or demand) and the methodology (interdiction, etc.) need to be reconsidered; and, a new plan which has the support of political and enforcement leadership must be made--its objectives should be made clear, and its goals should be meaningful, measureable and achieveable.
Naval Postgraduate School (U.S.)
Diaz, Mary Lu A.
1995-12
-
Precipitating the Decline of Terrorist Groups: A Systems Analysis
This thesis shows how a government actor can use systems theory to hasten the decline of a terrorist group. Tle author assumes terrorist groups are social organizations, therefore terrorist groups come to value organizational survival over ideological or programmatic achievements. The same determinants that cause social organizations to decline will cause terrorist organizations to decline. Using systems theory to model terrorism as a system, it is possible to show how to influence these determinants to increase the terrorist group's rate of decline. T'he systems model allows a government actor to build intervention strategies tailored to counter a specific terrorist organization. The government actor can use the model to identify and then target the terrorist's weak points. It also enables the government actor to determine its own strengths and to use them against the terrorist system weak points. Finally, the analysis tests the model against case studies of the Red Brigades in Italy, and the Front De Liberation du Quebec (FLQ) in Canada. A case study of Abu Nidal tests the proposition that terrorist groups, like other social organizations, eventually come to value organizational survival over ideological or programmatic achievements. Terror as a system, Red brigades, FLQ, Critical error, Delegitimization, Mercurial success, Burnout, Environmental entropy, Government response, Media
Naval Postgraduate School (U.S.)
DeGhetto, Todd H.
1994-03
-
Overcoming Ambivalence: The Case for Japanese Martial Internationalism
This thesis seeks to demonstrate that Japan can best satisfy its international security interests by assuming a combatant role in current and future multinational military coalitions. The thesis labels this alternative military posture "martial internationalism." An understanding of how Japanese military policy serves its overall international security interests is a central concern of this thesis. Japan's international security interests are defined as: (1) shaping a stable international security environment, (2) supporting the United Nations, and (3) upholding the Japan-United States alliance. Factors considered in this argument include trends in Japan's postwar military policy evolution and recent military activities and developments. The nature of Japan's current domestic military policy debate is analyzed in terms of relevant political, social, military, and economic perspectives. Regional and international ramifications of a more militarily assertive Japan are explored. The thesis investigates the potential for martial internationalism to realize Japan's international security interests and to permit a greater Japanese military contribution to the ongoing War on Terrorism. Finally, the thesis offers specific recommendations for both Japan and the United States toward implementing this alternative strategic design.
Naval Postgraduate School (U.S.)
Greig, Alex R.
2002-09
-
Post-Unified Korean Foreign Policy Options: Regional Implications
Following the prospective unification of Korea, presumably under Seoul's guidance, the government would face the choice between policies of alignment and nonalignment with each major Pacific power. This choice will be influenced by historical predispositions, the path of reunification, Korea's domestic situation, and its relations with each power. As long as the present North Korean threat continues to plague the political and security considerations of South Korea, the ROK has no other viable alternative than the U.S.-ROK security alliance. However, after the elimination of the North Korean threat, a unified Korea will be able to redefine its foreign policy options. Currently, given the predominance of the ongoing war on terrorism, the foreign policy options of a unified Korea are not a top consideration for Washington. This permits the People's Republic of China to play a larger role in the reunification process, which could predispose a unified Korea to tilt toward China. In order for the United States to anticipate and prepare for this event, this thesis analyzes foreign policy options of a unified Korea and the possible political, economic, and military ramifications within the realm of international relations that could conceivably occur with the unification of North and South Korea.
Naval Postgraduate School (U.S.)
DeJong, Laura S.
2002-09
-
Assessing the U.S. Counter Proliferation Initiative: Considerations For Military Operations Other Than War
The proliferation of weapons of mass destruction (WMD) represents a growing threat to the national security interests of the United States. The United States must retain its ability to project power, while providing its forces adequate protection. Military Operations Other Than War (MOOTW) are becoming a primary responsibility and mission of the U.S. armed forces. Evidence indicates that WMD are proliferating precisely in the same regions where U.S. military forces have been called upon to conduct MOOTW. While the United States has developed various measures to confront this growing challenge, most notably the 1993 DoD Counter Proliferation Initiative, additional considerations must be weighed in assessing the overall effectiveness of the U.S. counterproliferation strategy. The level of preparedness of the U.S. military is of particular concern, in ensuring forces are trained, equipped, and prepared to confront WMD- armed adversaries in a MOOTW environment. This study examines the merging confluence of the proliferation of weapons of mass destruction and U.S. military operations other than war.
Naval Postgraduate School (U.S.)
Valiquette, Matt J.
2000-12
-
Strategic Planning for Counterforce Options
"The first objective of this report is to explore the disparity between United States declaratory policy and actual force capabilities. This report will secondarily pose questions and purpose decision making criteria which are essential to ensure successful future nuclear strategic force employment and planning. This report is primarily concerned with the gap in U.S. declaratory and operational (or action) policy as it applies to current counterforce targeting problems. It is important to distinguish between declaratory policy and actual operational policies to appreciate the complexities of the debate and to resolve questions concerning future force planning."
Naval Postgraduate School (U.S.)
Palumbo, Nancy R.
1987-11-04
-
Turkey as an Emerging Energy Hub
"There is an increasing dependence on Russian, Caspian and Middle Eastern oil and natural gas by Europe and the United States. Turkey is geographically in the middle of these consumer and producer countries and has an important place in its emerging role as an energy hub because of pipelines that exist, are planned, or are already under construction. Turkey has agreements with Russia, Iran, Iraq, Qatar, Syria, and Europe in regards to energy Due to these agreements; Turkey is building a web of energy to diversify its energy supply. Some observers think that Turkey is establishing its own dependence, and some think that Turkey's attempts at an energy web are about interdependence rather than dependence in advantage of its energy security. The objective of this thesis is to analyze how Turkey's energy policy with the aim of becoming an energy hub affects its own and the region's dependence or interdependence in regards to energy security."
Naval Postgraduate School (U.S.)
Tokus, Halil Ibrahim
2010-06
-
Militarization of Energy Security: Turkey as a Case Study
"The United States of America, Great Britain, France, Germany, India, Russian Federation, Turkey, and China have all implemented policies to obtain reliable energy at reasonable prices. Overall, the purpose of this thesis is to identify the situations in which Turkey has encountered usage of energy as a 'weapon' and to analyze Turkey's reaction in these situations from 1945 until the present day. This thesis will then seek to predict the effects of energy issues on Turkey's national security strategy. The thesis finds that Turkey passed through a preparation phase during the 1960s and 1980s to balance her approach to both buyers and sellers. This period paved the way for the 1990s, when Turkey developed prospects for future energy supplies. Three general lessons emerge from examination of Turkey's experience: (1) Turkey managed to balance her energy market by pursuing successful compromise policies, (2) domestic needs, rather than transit fees and international concerns, have an essential role in forming these policies, and (3) even though tanker wars harm Turkey's naval transportation, they are beneficial for Turkey's land transportation as the only outlet for both of her neighbor producer countries."
Naval Postgraduate School (U.S.)
Seker, Ali Osman
2010-06
-
Normative Command and Control Influences: A Study of Cohesion in Terrorist Organizations and Their Effect on Society
"Current Afghanistan operations demonstrate the ability for terrorist organizations to flourish without clear structure. Such organizations likely adopt missionary and/or adhocracy structures, which are underdeveloped theoretically and empirically with organizational theorizing, particularly military command and control concepts. However, terrorist organizations are groups and thus subject to norm processes. From an open systems view of organizations, processes develop according to the operating conditions of the group. As conditions change, internally and externally, groups must adopt norming strategies within the constraints of the group's environment. If a group is unable to maintain a norming structure facilitating group cohesion and clear understanding of the group's mission, then that group will likely fail to meet its objectives or cease to exist. Thus the ability of a terrorist organization to achieve its objectives is partially dependent upon its ability to influence, directly or indirectly, the society in which it operates. Terrorist organizations must entice people to willingly join a group that assumingly does not value less radical societal norms. This work studies norming processes within terrorist organizations. It begins with a review of the norming literature and thus applies reviewed concepts to terrorist organizations. It provides a foundation from which future researchers can test hypotheses related to terrorist groups and their environments from a normative perspective of command and control."
Naval Postgraduate School (U.S.)
Ellenburg, Christine A.
2007-06
-
Combatting Terrorism through Study of the Genetic Psychology of Terrorist Leader--the Early Development of the Terrorist Mind
"The purpose of this thesis is to demonstrate the necessity for law enforcement, intelligence, and other organizations responsible for collecting information on 'proponents of terror,' to include in target dossiers, data regarding genetic inheritance and childhood environmental influences. The author argues that without this type of information, agencies are hindered in really knowing the 'proponent of terror,' and thus limited in the possibilities for neutralizing the subject. The study analyzes genetic inheritance and childhood environment and presents case studies on Adolf Hitler, Benito Mussolini, and Ilich Ramirez Sanchez ('Carlos'). The study concludes that genetic and childhood environmental data should be included in target dossiers of terrorists. Collection categories in genetic inheritance and environment are recommended and include, for example, material on terrorists' biological grandparents, parents, and as appropriate, on their brothers and sisters, and children."
Naval Postgraduate School (U.S.)
Martinez, Peter, Jr.
1989-12
-
Taming the Frontier: A Myth of Impossibility
"Since the establishment of the Durand Line in 1893 as the international border between Afghanistan and British India, the frontier areas on the eastern side of the border have not been integrated into the social fabric or political framework of the government. Conventional wisdom views integrating the tribes of the FATA as extremely difficult, if not impossible. The real reason is that neither the British nor subsequent Pakistani administrations committed the appropriate resources or attention to accomplish the task due to a lack of political will. Geopolitical influences and Islamist militants drove the resistance that deemed the effort to integrate the Federally Administered Tribal Areas, an area void of significant natural resources, not worth the cost. The terrorist organizations that Pakistan supported both covertly and overtly in the frontier areas are now uncontrollable and the very instruments intended to promote the national interests of a nuclear armed yet power deficient state pose an existential threat to the government they were intended to serve. Contemporary rhetoric now supports complete integration of the FATA into the writ of the Pakistani government. The good news for those policy makers who see this as a daunting task is that no government has really tried."
Naval Postgraduate School (U.S.)
Readinger, Charles C.
2010-03
-
Explaining Variation in the Apprehension of Mexican Drug Trafficking Cartel Leaders
"Successive Mexican administrations have turned to the deployment of military and federal law enforcement agencies to respond to crises, recently focusing in particular on targeting the leaders of major drug cartels in their counternarcotics efforts. However, since 2000, Mexico's government's efforts to control criminal activities in these cities have met with varying success. During that period, the Mexican federal government has apprehended ten leading members of the Arellano-Felix Organization (AFO), one of the most prolific drug trafficking organizations. In contrast, only three major cartel leaders have been apprehended from the Carrillo Fuentes Organization, (CFO), another enduring drug trafficking organization. This thesis draws upon theories of organization and path dependence to explain variation in the Mexican government's success in arresting major cartel leaders. It argues that variation between the AFO and CFO in their internal structures--in particular, the AFO's low level of professionalism relative to that of the CFO--has facilitated the apprehension of the AFO leadership. In terms of path dependence, the thesis finds that the U.S. Drug Enforcement Administration's focus on the AFO is due to the legacy of a random event, the AFO predecessor's role in the 1985 kidnapping and murder of DEA Special Agent Enrique Camarena. The DEA has clung to this case across twenty-five years and therefore has remained focused on the AFO, in order to justify U.S. counterdrug efforts in Mexico. Changing U.S.-Mexico relations have facilitated the DEA's focus on the AFO, particularly since 2000."
Naval Postgraduate School (U.S.)
Bjerke, Maxwell E.
2010-06
-
Regulating Nation-State Cyber Attacks in Counterterrorism Operations
"In August 2008, a military conflict between Georgia and Russia occurred in South Ossetia and Abkhazia. Russian military action in this conflict was immediately preceded by a number of cyber attacks against a variety of Georgian Government Web sites, and while the perpetrator(s) was never conclusively identified, Russia denied involvement. Importantly, however, the Georgian cyber attacks seem to be the first instance of cyber attacks used in combination with conventional attacks. In combating each other through the kinetic attacks used to date, nation-states have been required to comply with the long-standing law of armed conflict. Yet, modern warfare now challenges this accepted regulation in two ways. First, as was just demonstrated, cyber attacks now may complement traditional kinetic attacks. And second, it is not fellow states that nations now commonly face in combat as people suspected was the case during the Georgian attacks, but rather nonstate actors, a fact made evident by the ongoing Global War on Terror. This thesis will therefore seek to answer two questions: (1) Are existing international laws governing cyber attacks conducted by nation-states against terrorists sufficient? (2) If existing law is insufficient, how should international law be amended to better regulate the use of such cyber attacks in counterterrorism operations? To test the idea of sufficiency, the thesis will first examine potential nation-state cyber-attack scenarios that may be seen in future counterterrorism operations, and whether those possible attack scenarios are in keeping with international law principles. This assessment ultimately demonstrates that problems of evaluation and enforcement stymie attempts at regulation of nation-state cyber attacks in counterterrorism operations, creating new areas of concern for international law, which can only be resolved through the creation of cyber attack-specific legal principles and enhanced enforcement mechanisms."
Naval Postgraduate School (U.S.)
Garcia, Colleen E.
2010-06
-
Empathetic Leadership in Critical Situations: How Can Leaders Lead with Empathy in Times of Trauma?
"Junior officers and senior enlisted leaders face intense crises and duress during deployments. They operate in high reliability organizations (HROs) where planning for failure is the norm and individuals' expectation of loss is high. Still, when units experience IEDs (improvised explosive devices) or suicide bomb attacks, unit integrity and ability to stay together and focused are called into question. This thesis first explores and develops the concept of empathetic leadership; it is differentiated from similar concepts of leadership in the context of a critical military incident. The research then analyzes leadership behavior described in detail in a Ground Combat Element (GCE) after an unexpected suicide bomb attack at an entry control point in a combat zone where a well-respected Senior Enlisted Leader (SEL) lost his life. His positive effect on his men made his loss difficult for the unit, making it hard for the unit to recover and heal. The central aim of this thesis is to analyze the incident of the loss of the SEL and uncover key leadership behaviors under traumatic and life-threatening situations necessary for managers of high reliability organizations. More than any other characteristic of leadership, empathy plays a vital and effective role in the leading as long as it ensures communication and generates mutual trust between the leader and the follower. Lessons derived from this case provide useful perspectives of managing and leading in critical situations where major trauma is a vital concern."
Naval Postgraduate School (U.S.)
Polymilis, Charalampos
2010-03
-
Autonomous Vehicle Systems: Implications for Maritime Operations, Warfare Capabilities, and Command and Control
"Military operations within the last decade have seen enormous growth in the fielding and utilization of unmanned tele-operated vehicles in the air, ground, and maritime domains. With advances in computing and processing technology, these vehicles and systems are becoming increasingly autonomous in nature and will continue to evolve in the future, significantly impacting the warfighter and the battlespace. A great deal of research and development (R&D) is currently underway by the Department of Defense (DoD), as well as in industry and academia, in the field of autonomous systems. As the technology in this area rapidly advances, comparatively little is known about how these systems will affect our future organizational and Command and Control (C2) architectures, or their implications for the future of warfare in general. This thesis catalogues the current and emerging technologies associated with these systems, within the context of the capabilities they bring to the warfighter. From this baseline, an analysis of future capabilities is conducted against selected maritime operations as identified in the Navy Tactical Task List (NTTL). Impact to organizational performance is analyzed using the Congruence Model, and possible implications are drawn about the near-term future of naval operations and organizational change."
Naval Postgraduate School (U.S.)
Ireland, Robert D.
2010-06
-
Terrorist Networks, Money Laundering Schemes, and Nation Stability
"The purpose of this thesis is to provide the audience with a point of view perspective regarding the evolution of circumstances that lead to the formation of terrorist networks, organized crime, illicit activities, (etc.), and to present how these criminals utilize money laundering schemes to further their respective positions in society from a socioeconomic perspective. Subsequently, this paper discusses how terrorists and/or organized crime members utilize weak nation-state infrastructures to capitalize on money-laundering schemes; thereby, using the debilitating effects of financial crimes to keep nation-state institutions in a perpetual condition of instability. The ultimate aim of the criminal/illicit behavior and activities is to create, refine and execute more efficient ways to further their respective cause placing themselves in positions that yield even greater power over the systems they continually exploit. Ultimately, these criminals continue to exploit the weaknesses of the nation-state infrastructures to gain and maintain a decisive advantage over society at large if left unchallenged."
Naval Postgraduate School (U.S.)
Mott, Bryan
2010-06
-
Development of a Decision Support Tool to Inform Resource Allocation for Critical Infrastructure Protection in Homeland Security
"Analysis of risk in critical infrastructure is one of the major problems facing Homeland Security today. Defining risk and applying it to systems, as opposed to individual assets, is a relatively new idea in Homeland Security policy. Thus, there is a need for a decision support tool to inform decision makers in Homeland Security of resource allocation strategies to harden assets that reduce overall network risk. Model Based Risk Assessment (MBRA) is a quantitative method designed to (1) identify the most critical assets of the network in such a way as to reduce expected loss over the entire network, (2) quantify allocation strategies that strategic planners and risk managers can apply across multi-sector systems, and (3) compute vulnerability and total risk reduction of the network. We formalized the definition of network risk in terms of the connectivity of the network as an extension to the accepted risk equation R=f(T,V,C). We use node degree as a heuristic for criticality of an asset to the overall function of the network. We then modeled the relationship between budget and vulnerability reduction and show how an exponential reduction model compares to a linear or random model. Using the stated definition of network risk, all models rank order assets exactly the same but they reduce risk differently. Lastly, we introduce a twoparty model that combines both the defender's and attacker's points of view using a game theory approach. We show the results of this model and compare them to a similar model we refer to as the 'arms race model' where we allow both attacker and defender to know each other's budget. Results show that the techniques developed here
are useful in conducting a systematic and repeatable analysis of an infrastructure network of assets for risk and then informing resource allocations that serve to reduce risk on the entire network, not just the selected assets."
Naval Postgraduate School (U.S.)
Al Mannai, Waleed I.
2008-06
-
What Are the Security Threats to Further Development of Nuclear Power Plants in the U.S.?
"What are the security threats to further development of nuclear power plants in the U.S.? The U.S. stands alone today in terms of the vast nuclear armory at its disposal. It is clear we know something about how to build nuclear weapons, and yet, we are not world leaders in the field of nuclear power. Nuclear energy has the potential to be an alternative fuel source that would be sustainable and economical. Nuclear power is controversial in the U.S. because it raises issues of domestic energy policy, funding, regulation, safety, and especially security. In turn it can affect U.S. investments, foreign policy, economy, and jobs. As America struggles with its dependence on foreign oil, we must seek alternative fuel sources. The President has made energy a priority and is pushing for a 'clean energy economy.' Not to pursue alternative fuel sources will directly impact our ability to be economically competitive, as other countries will have cheaper electricity for manufacturing and services. We need to protect the U.S. from economic and strategic risks associated with our reliance on foreign oil. We also need to address the destabilizing effects of a changing climate, Internet is heavily impacted by our energy use."
Naval Postgraduate School (U.S.)
Nottestad, Tammie L.
2010-03
-
Blood Versus Land: The Comparative Foundations for Citizenship and Voting Rights in Germany And Sweden
"The current process of immigration and integration of foreign-born residents into European society could potentially cause significant shifts in the demographics, politics, and national identities of many European nations. The influence of immigration has stretched beyond the guest worker programs of the postwar era into long-term residence by foreign-born workers and peoples, accelerating after the end of the Cold War. Globalization further enables immigration, and these people have developed greater stakes in the economies and cultures they live within. The incorporation of these immigrants into the democratic process, specifically through their access to the ballot box, portends several important effects on European politics. The first and most obvious is through the expression of different political preferences by these immigrants and the degree to which they are assimilated, integrated, or incorporated into the political process. This thesis will examine how two major immigrant destination states within the European Union extend voting rights to immigrants from outside the EU. These will be Germany and Sweden. The thesis concludes that the historical path to democratic franchise, and migration controls establish legal precedents that shape the path to inclusion for each of these countries despite their contrasting outcomes."
Naval Postgraduate School (U.S.)
Lilya, C. Everett
2010-03
-
Industry and Public Sector Cooperation for Information Sharing: Delaware Bay
The Maritime Information Sharing Taskforce (MIST) is a two-way process for understanding and communicating the information sharing needs of local, private sector communities. This MIST Highlight is about information sharing in the port of Delaware Bay. "Delaware Bay participants stressed operational and financial incentives for information sharing. These incentives include quicker resumption of business after an event, the protection of assets, and fewer costs incurred. In addition, this port values strategic benefits such as improved customer satisfaction and positive public opinion resulting from being seen as environmental stewards."
Naval Postgraduate School (U.S.)
2011-02
-
IP Services Design and Implementation in a Prototype Device for Transient Tactical Access to Sensitive Information
"In network-centric warfare, access to critical information can result in a strategic advantage. During critical situations, a soldier using tactical devices may need transient access to information beyond their normal clearances. The Least Privilege Separation Kernel (LPSK) being developed at the Naval Postgraduate School, can be the basis of an extended multilevel security (MLS) system that can support and control such access. A Trusted Services Layer (TSL), which depends on the LPSK, provides support for various multilevel security services. Currently, the LPSK lacks a software network stack for networking communications. Without networking functionality, tactical devices cannot share vital situational updates and information superiority is unattainable. An Internet Protocol (IP) stack was proposed for the LPSK-based system. The IP stack is to be implemented in the context of the LPSK architecture, which uses modularity and layering to organize its software. Open source implementations of the IP stack were evaluated to leverage the common functionality required by all IP stacks. Lightweight Internet Protocol (LWIP) was selected as a starting point for use with the LPSK. LWIP required modifications for use with the LPSK. The IP stack and a proof of concept networking demonstration were successfully implemented in this project."
Naval Postgraduate School (U.S.)
Yoong, Ho Liang
2010-12
-
Via Dialogue or Messaging: How Air Force Public Affairs Is Leveraging Social Media
"U.S. military public affairs (PA) policy has witnessed a comprehensive evolution in trust and transparency since the Vietnam War. This evolution continues to this day as Internet-based social media have drastically changed the way information is shared between individuals, groups and organizations. As a result of this huge paradigm shift, the military PA professional must grapple with these emerging communication platforms not only to advise military commanders, but also to build trust and maintain relationships with key stakeholders. More than traditional PA practices and procedures, social media offer an interactive approach that encourages dialogue and two-way communication. This study found that most of the Air Force PA professionals who participated in this survey (n=126) reported that although they frequently use social media, very few report that they use social media to build relationships, engage in conversations, participate in discussions or to monitor the needs and interests of stakeholders. Based on theoretical concepts of public relations, the survey respondents are not fully leveraging the interactive and dialogic nature of social media."
Naval Postgraduate School (U.S.)
Westover, David S.
2010-12
-
Exploring the Financial Benefits of U.S. Arms Export Production
"This research examines the role of arms export production in achieving financial cost savings to the U.S. Department of Defense (DoD). A review of three theoretical benefits, identified by arms trade scholars, that DoD enjoys as a result of arms export production shows that there is some merit to the claim that unit costs may be lowered as a result of exports. Using the F-16 fighter aircraft as a case study, this research employs financial cost analysis using cost improvement curves to estimate the extent to which DoD benefitted in terms of reduced per-unit costs through concurrent export production. This research makes a significant contribution to the cost analysis and arms exports literature by quantifying commonly purported financial benefits attributable to arms export production."
Naval Postgraduate School (U.S.)
Yeung, Andrew A.
2010-12
-
Robust Defense against Small Boat Attacks
"Nearly a decade after the small boat attacks against the USS Cole (in 2000) and M/V Limburg (in 2002) in Yemen, small vessels continue to pose a security threat. In part, this is due to the ease of camouflage and the high frequency of small vessels operating in proximity to important maritime infrastructure, such as bridges and petrochemical plants, and to passenger and military ships. In this study, small boat effectiveness in the interception of attacking speedboats is analyzed using the stochastic, time-stepped, agent-based simulation tool MANA [Map Aware Non-uniform Automata]. Three alternative defender tactics of scramble from base, barrier patrol, and random patrol are explored against two possible attacker modus operandi of saturation attack and diversionary attack. The probability of at least one attacker reaching the defended asset is the primary measure of effectiveness. A full factorial experiment was designed and executed for defenders tasked to protect the Port of Los Angeles and the Port of Hong Kong. The findings indicate that the defenders are highly susceptible to diversionary attacks regardless of tactics employed, but their effectiveness can be improved by retaining sufficient defensive assets in preparation for a potential follow on attack. The study highlights the limits on patrol boat effectiveness to intercept small high speed vessels which lead to the nullification of any numerical advantage the defender may have when faced with a saturation attack. Anticipating the heading of the attacker is a critical factor for a successful engagement."
Naval Postgraduate School (U.S.)
Wong, Ka-Yoon
2010-12
-
Information Infrastructure and Social Adaptation in Rural Afghanistan
"This thesis explores whether the expansion of cellular phone networks and community-based radio broadcasting into rural Pashtun communities could create operational vulnerabilities for the Taliban. Divergence is observed between the population's adaptive behavior in response to the Taliban's rural information strategy and the expansion of the information infrastructure. This study shows that this variance in the population's responses could create an operational vulnerability for the Taliban. The success of any expansive information strategy, however, may ultimately be limited by the population's fear of Taliban reprisals and other inhibitors, such as illiteracy and inexperience in operating advanced technologies. To counter this condition, information strategists should implement cellular phone and community radio-based programs in areas where an embedded security apparatus, such as the Village Stability Platform (VSP), can enhance local security conditions. By reducing the Taliban's capacity for using violence to intimidate the population, developmental advisors embedded within the VSP can implement tailored cellular phone and community radio programs that exploit local incentive structures more effectively. With persistence, the benefits of these information systems will become increasingly apparent to the population, weakening Taliban influence."
Naval Postgraduate School (U.S.)
Wilson, John Mark
2010-12
-
Scientists Urge DHS to Improve Bioterrorism Risk Assessment
"In 2006, the Department of Homeland Security (DHS) completed its first Bioterrorism Risk Assessment (BTRA), intended to be the foundation for DHS's subsequent biennial risk assessments mandated by Homeland Security Presidential Directive 10 (HSPD-10). At the request of DHS, the National Research Council established the Committee on Methodological Improvements to the Department of Homeland Security's Biological Agent Risk Analysis to provide an independent, scientific peer review of the BTRA. The Committee found a number of shortcomings in the BTRA, including a failure to consider terrorists as intelligent adversaries in their models, unnecessary complexity in threat and consequence modeling and simulations, and a lack of focus on risk management. The Committee unanimously concluded that an improved BTRA is needed to provide a more credible foundation for risk-informed decision making."
Naval Postgraduate School (U.S.)
Parnell, Gregory S.; Borio, Luciana; Brown, Gerald . . .
2008
-
Jemaah Islamiyah: Reevaluating the Most Dangerous Terrorist Threat in Southeast Asia
"This thesis examines Jemaah Islamiyah (JI), Southeast Asia's most dangerous terrorist threat. Since the group manifested its presence with its suicide bombings in Bali, Indonesia on October 12, 2002, considerable efforts have been devoted to describing the group responsible for the most damaging terrorist attacks in Southeast Asia and interpreting how it has changed over time. Over the course of the last decade, two competing interpretations of JI emerged. One view held that JI was divided between a large group of traditionalists and a smaller group of pro-violence militants. This became the conventional wisdom and served as the foundation for most countries' counterterrorism policies. The other held that the two factions worked closely together. By reconsidering JI's evolution in light of recently available evidence, this thesis shows that the second view more accurately describes JI. In particular, this thesis suggests that the two factions should be viewed as mutually supportive 'administrative' and 'operational' components of a single, adaptable terrorist group. To be successful over the long term, counterterrorism policies will need to pay greater attention to the administrative faction and its relationship to the operational wing, which conducts actual terrorist attacks."
Naval Postgraduate School (U.S.)
Kippe, Gregory R.
2010-12