Advanced search Help
Resource Type or Special Collection is Theses & Research Reports
Publisher is Naval Postgraduate School (U.S.)
Clear all search criteria
Only 2/3! You are seeing results from the Public Collection, not the complete Full Collection. Sign in to search everything (see eligibility).
-
Strategic Planning for Counterforce Options
"The first objective of this report is to explore the disparity between United States declaratory policy and actual force capabilities. This report will secondarily pose questions and purpose decision making criteria which are essential to ensure successful future nuclear strategic force employment and planning. This report is primarily concerned with the gap in U.S. declaratory and operational (or action) policy as it applies to current counterforce targeting problems. It is important to distinguish between declaratory policy and actual operational policies to appreciate the complexities of the debate and to resolve questions concerning future force planning."
Naval Postgraduate School (U.S.)
Palumbo, Nancy R.
1987-11-04
-
Combating Terrorism: A Guide for U.S. Naval Forces Afloat
From the thesis abstract: "The United States Navy's forces afloat do not have a single source document that addresses anti-terrorism and counterterrorism. The increase in terrorism world-wide has stimulated the concern that vulnerable maritime vessels will become terrorist targets. U. S. Navy ships in a restricted maneuvering situation, at anchor in a harbor, or moored pier side may offer an attractive target to a terrorist group. To deal with this potential terrorist threat, personnel manning U. S. Navy ships must be educated in the fundamentals of terrorism; the ships' security program must be evaluated and modified accordingly; various watches, sentries, and teams must be trained in new anti- and counterterrorist procedures; and contingency plans must be developed to deal with potential terrorist incidents. This study provides a guide for the development of effective anti-terrorist and counterterrorist programs for any ship type in the U. S. Navy."
Naval Postgraduate School (U.S.)
Broughton, Hubert L.
1985-12
-
Moro Problem: An Historical Perspective
"For over 400 years the Muslim people of the southern Philippines have been at war. They have resisted the Spanish occupation of their ancestral homelands, the American colonial presence, and the current Christian government. To understand what motivates the Moro people to such conflict, it is necessary to study their history, religion, and the ethnic fabric which makes up their various regional groups. The fundamentals of their religion require a homogenous [sic] Islamic government. In the Philippines this would require separation, or at least total autonomy for the Muslim areas. This has never been allowed by the Christian government which has perpetuated the cause of the Moro insurgency. Conflict will surely continue as long as Christian authority is imposed upon the Moro people."
Naval Postgraduate School (U.S.)
Fowler, Dennis B.
1985-06
-
Quantitative and Qualitative Effectiveness Dimensions of the U.S. Coast Guard Recruiting Program
"The United States Coast Guard's increasing employment of advanced technology aboard its cutters, aircraft and shore commands has introduced an evolving demand for the consideration of a quality dimension in manpower planning. During recent years, this demand for quality personnel has out-distanced input. Recognizing the requirement for a long term organizational change to reverse this trend, this thesis identifies the recruiting program as the most effective agent for that change."
Naval Postgraduate School (U.S.)
Johnson, Harvey E.
1983-06
-
Lanchester-Type Models of Warfare, Volume II
This monograph is a comprehensive treatise on Lanchester-type models of warfare, i.e. differential-equation models of attrition in force-on-force combat operations. Its goal is to provide an introduction to and current- state-of-the-art overview of Lanchester-type models of warfare as well as a comprehensive and unified in-depth treatment of them. Both deterministic as well as stochastic models are considered. Such models have been widely used in the United States and elsewhere for the modeling of force-on-force attrition over the complete spectrum of combat operations, from combat between platoon-sized units through theater-level air-ground combat. This material should be of interest primarily to individuals concerned with defense planning, quantitative aspects of military analysis, military OR, war gaming, or combat modeling, although it may also be of interest to the reader concerned with the modeling and analysis of other dynamic systems. It should also be of interest to the concerned citizen who is interested in the foundations for defense analysis and has the appropriate technical background.
Naval Postgraduate School (U.S.)
Taylor, James G.
1980-10
-
Lanchester-Type Models of Warfare, Volume I
This monograph is a comprehensive treatise on Lanchester-type models of warfare, i.e. differential-equation models of attrition in force-on-force combat operations. Its goal is to provide an introduction to and current- state-of-the-art overview of Lanchester-type models of warfare as well as a comprehensive and unified in-depth treatment of them. Both deterministic as well as stochastic models are considered. Such models have been widely used in the United States and elsewhere for the modeling of force-on-force attrition over the complete spectrum of combat operations, from combat between platoon-sized units through theater-level air-ground combat. This material should be of interest primarily to individuals concerned with defense planning, quantitative aspects of military analysis, military OR, war gaming, or combat modeling, although it may also be of interest to the reader concerned with the modeling and analysis of other dynamic systems. It should also be of interest to the concerned citizen who is interested in the foundations for defense analysis and has the appropriate technical background.
Naval Postgraduate School (U.S.)
Taylor, James G.
1980-10
-
Design and Implementation of the Memory Manager for a Secure Archival Storage System
"This thesis presents a detailed design and implementation of a memory manger for a kernel technology based secure archival storage system (SASS). The memory manger is a part of the non-distributed portion of the Security Kernel, and is solely responsible for proper management of both the main memory (random access) and the secondary storage (direct access) of the system. The memory manager is designed for implementation on the ZILOG Z8000 microprocessor in a multi-processor environment. The loop free design structure, based upon levels of abstraction, and a segment aliasing scheme for information confinement are essential elements of the overall system security provided by the SASS."
Naval Postgraduate School (U.S.)
Gary, Alan V.; Moore, Edmund E.
1980-06
-
Subversion: The Neglected Aspect of Computer Security
This thesis distinguishes three methods of attacking internal protection mechanisms of computers: inadvertent disclosure, penetration, and subversion. Subversion is shown to be the most attractive to the serious attacker. Subversion is characterized by three phases of operations: the inserting of trap doors and Trojan horses, the exercising of them, and the retrieval of the resultant unauthorized information. Insertion occurs over the entire life cycle of the system from the system design phase to the production phase. This thesis clarifies the high risk of using computer stems, particularly so-called 'trusted' subsystems for the protection of sensitive information. This leads to a basis for countermeasures based on the lifetime protection of security related system components combined with the application of adequate technology as exemplified in the security kernel concept.
Naval Postgraduate School (U.S.)
Myers, Philip A.
1980-06
-
Design of a Secure File Storage System
From the thesis abstract: "A design for a secure, multi-user, File Storage System is developed. This design, incorporating a concurrently developed Security Kernel, provides a multilevel secure f1exib1e file storage serving a distributed system of dissimilar computers. The Security Kernel is responsible for non-discretionary (e.g., classification and clearance) security and the File Storage System Supervisor is responsible for discretionary (e.g., 'need to know') security. Multilevel security is achieved by the controlled access to consolidated file storage by Host computer systems. Multiprogramming of surrogate Supervisor processes operating on behalf of the Host computer systems provides for system efficiency. A segmented memory at the Supervisor level allows controlled data sharing among authorized users. . System integrity is independent of the internal security controls (or lack of them) in the distributed systems; the File Storage System prevents system-wide security side effects. A loop free structure along with system simplicity and robustness are design characteristics."
Naval Postgraduate School (U.S.)
Parks, Edward James
1979-12
-
Zionism and Southern Lebanon: A Historical Perspective on Six Decades of Controversy
From the thesis abstract: "Current events in southern Lebanon are connected to a territorial dispute that emerged over sixty years ago, when leading Zionists claimed the region. That claim, which was based upon the projected economic and security needs of the Jewish national home in Palestine, did not prevail in the course of post-World War I Anglo-French diplomacy. Since then the Zionist leaders of Palestine and Israel have tried to overcome the negative economic and security implications of the boundary settlement. Yet Zionist access to southern Lebanese water has been consistently blocked, and the frontier has proven vulnerable to raids and rocket attacks by hostile forces. It appears however that Israel has recently converted the border region from a long-standing liability into a current geopolitical asset. Recent Israeli policies in southern Lebanon have (1) aggravated sectarian tensions in Lebanon; (2) kept Syria tied down in a difficult stability operation; and (3) made Israel's northern settlements less vulnerable to land attacks by Palestinian commandos."
Naval Postgraduate School (U.S.)
Hof, Frederic C.
1979-06
-
Process of Determining Manpower Requirements and Its Relationship to PPBS
From the thesis abstract: "The purpose of this thesis is to describe the Navy's manpower requirements determination process and to demonstrate how these requirements are used by the Department of Defense Planning, Programming and Budgeting System (PPBS), the Navy's Program Objective Memoranda (POM) development, the Navy's three manpower requirements determination programs (ships, aircraft squadrons and shore establishments), and a classroom simulation of the Navy's POM development process. The existing system key players, major roles, chronology of events and organizational inter-relationships are described as they currently function."
Naval Postgraduate School (U.S.)
Martel, Reginald Timothy
1979-06
-
MOVES Institute [website]
"The Modeling, Virtual Environments and Simulation Institute was founded in 2000, but MOVES as an academic program was founded in 1996 with the launch of the Master of Science program, followed by the Doctoral program in 1999. The Institute is intended to be a mix of the strong analysis tradition of the Operations Research Department and the simulation, training, and software development expertise of the Computer Science Department. The Institute has its roots in the NPSNET Research Group founded in 1986. NPSNET was the original low-cost, government owned, SIMNET and DIS compatible visual simulator. It was widely used around the world and was integrated into many government programs over its lifetime. The Institute was also the birthplace of America's Army. Sponsored by the Office of the Assistant Secretary of the Army: Manpower and Reserve Affairs, America's Army was our first venture into the use of video game technology for defense applications. Development has since left the Institute, but many millions of players have downloaded and played America's Army since 2000. Recent initiatives include the Extensible Modeling and Simulation Framework (XMSF) that uses web services for interoperability of M&S systems, and also the Delta3D Open Source Game-Based Simulation Engine."
Naval Postgraduate School (U.S.)
-
Scholarship for Service: IA Tutorials and Workshops for Educators
"In 2003 and 2004 the Center for Information Systems Security Studies and Research (CISR) at the Naval Postgraduate School organized tutorials and workshops with the intent of increasing the capacity of the United States higher education enterprise to produce professionals in the fields of Information Assurance (IA) and computer security by hosting a series of workshops for education in Information Assurance. The target audience of the workshops has been 2-year, 4- year college, and university-level educators who have responsibility for teaching curricula that are, or could be, related to Information Assurance issues. Participation by instructors from institutions serving under-represented groups was high. Attendance at the tutorials was maximized both years. The participants indicated that they benefited substantially from both the tutorials and the subsequent gathering of IA educators at the Workshop on Education in Computer Security (WECS)."
Naval Postgraduate School (U.S.)
Irvine, Cynthia E.; Falby, Naomi B.
-
Stemming the Flow of Improvised Explosive Device Making Materials Through Global Export Control Regimes
From the thesis abstract: "The effects of Improvised Explosive Devices (IEDs) continue to be felt throughout the world, and especially in battlefields, such as Afghanistan. The United States currently leads the counter-IED effort through various demand side efforts, such as those led by JIEDDO [Joint Improvised Explosive Device Defeat Organization] and Project Global Shield. The purpose of this thesis was to determine the feasibility of a new supply-side effort to counter IEDs through global export control similar to the multilateral export control regimes of Weapons of Mass Destruction (WMD) and missile technologies. A comparative method was used that utilized the existing regime literature for success and effectiveness, and then measured those regimes against six variables that focused on technology, as well as the organizations, which provided the framework to determine the success and feasibility of a new regime that focuses on lower technology items. The results show that although IEDs continue to be a presence throughout the world, it lacks the grander threat similar to that of WMD technology to make a new regime successful. Further, the results show that IED technology and material are difficult to classify and track, which makes global export control efforts extremely difficult."
Naval Postgraduate School (U.S.)
Quihuis, Nicholas R.