Advanced search Help
Publisher is Naval Postgraduate School (U.S.)
Clear all search criteria
Only 2/3! You are seeing results from the Public Collection, not the complete Full Collection. Sign in to search everything (see eligibility).
-
Hazardous Material Transportation Policy and the Threat of Terrorist Attack
"This thesis analyzes the framework criteria constructed from policies followed
by manufacturers, suppliers, and Department of Defense (DOD) on the transportation of hazardous material. Field interviews were conducted with base civilian and military personnel involved in the support of hazardous material operations. Overall policies on transportation of hazardous material do provide adequate security for naval bases but some inefficiency do exist. There is a lack of designated hazardous material transportation routes on base; hazardous material instructions lacks specifics on transporting hazardous material before it becomes waste; and gate security lacks procedures or systems for to check incoming carriers licenses for authorization to transport hazardous material. Recommendations include the establishment of hazardous material routes; incorporate specifics on transporting incoming hazardous material; establish communications with law enforcement systems to check carrier's licenses for authorization to transport hazardous material; and base security plans should incorporate exercises and training plans pertaining to possible terrorists attacks with hazardous material."
Naval Postgraduate School (U.S.)
Matthews, James R.
2002-06
-
MYSEA Security Architecture
This document describes an innovative architecture consisting of trusted security services and integrated operating system mechanisms for the protection of distributed multi-domain computing environments from malicious code and other attacks. These security services and mechanisms extend and interoperate with existing workstations, applications and open source operating systems, providing new capabilities for composing secure distributed systems using commercial off-the-shelf (COTS) components. The latter construct results from the realization that unless a secure system offers users comfortable and familiar interfaces for handling routine information, the secure system will fail due to lack of user acceptability.
Naval Postgraduate School (U.S.)
Irvine, Cynthia E.; Levin, Timothy E.; Shifflett, David J.
2002-05
-
National Trusted Computing Strategy
Through neglect, the national capability to design and construct trusted computers and networks has begun to atrophy. Not only has the information infrastructure been built weakly, but also our capability to strengthen it continues to decline. The Nation is now lacking in both the research and development talent to produce trusted computing systems and the educational infrastructure to create this talent. In this document, the Center for INFOSEC Studies and Research (CISR) in Monterey, California, proposes a three-pronged approach to strengthen the national information infrastructure and reinvigorate the national capability to produce trustworthy computing systems. The document describes the Trusted Computing Exemplar project as a worked example of how trusted computing systems and components can be constructed. Second, it defines a national research initiative to advance the theoretical foundations for trusted computing and to produce a set of automated tools to support the development of high assurance systems; and third, it defines an educational initiative based on nascent Information Assurance education programs and the Trusted Computing Exemplar to provide a framework for Trusted Computer Development education. The result of this multi-faceted approach will be to increase the security of the national Information Infrastructure by increasing the availability of: Trusted Computer systems and components, Trusted Computer development tools, and Trusted Computer developers, evaluators and educators.
Naval Postgraduate School (U.S.)
Irvine, Cynthia E.; Dinolt, George W.; Levin, Timothy E.
2002-05
-
Information Security
"Security in information systems is a complex problem. Single solutions to complex problems don't exist, and matching the appropriate solution (or more accurately, a set of solutions) to a requirement is necessary. This paper provides a list of definitions of information security-related terms; reviews ISO 7498-2, the security architecture reference model; presents an organizing matrix; discusses application layer security, enclave protection, link protection, and the Department of Defense's most recent (March 2002) 'Overarching Wireless Policy'; and presents examples of problems that can occur (e.g., credit card transactions over the internet and the Walker insider attack against the Navy' worldwide communications system). The author concludes that the higher up the matrix one can solve a security problem, the better. In particular, if one can solve confidentiality problems at the application layer, one can use the general purpose network. None of the solutions are mutually exclusive. It's entirely possible to solve the confidentiality problem with end-to-end secure e-mail, communicate entirely within a closed enclave (carefully firewalled or air-gapped to keep out outsiders), and use link encryption to frustrate traffic analysis by eavesdroppers. When one considers acquiring information systems, one wants to express the lower layer requirements to the 'plumbers' -- those who build and provision the network -- and the top-layer requirements to the application designers. Mixing these signals (graphically visualized as crossing the matrix diagonally) results in asking the right requirements, but of the wrong providers. Most importantly, the specific security requirements must be properly matched with a solution that directly targets the requirement. In the matrix presented, this is visually illustrated by horizontal lines between problem and solution; diagonal traces indicate a mismatch."
Naval Postgraduate School (U.S.)
Buddenberg, Rex
2002-04
-
Training for Terror: A Case Study of Al-Qaida
From the thesis abstract: "A recently acquired translated copy of an Al-Qaida training manual is analyzed utilizing the Four Frameworks Model, which states that organizations can be better understood if they are studied from structural, human resources, symbolic, and political perspectives. An overview of Middle Eastern terrorism, a synopsis of the Al-Qaida organization, a review of the contents of the training manual, and an Al-Qaida policy review are also delineated. Of the many conclusions presented, the first states that the Al-Qaida training manual and its precepts are indeed being used to guide terrorist operations. Al-Qaida believe their cause is just based on religious decrees, and that the use of training manuals helps to portray the group in a favorable light, reinforces ideology, and builds support. Al-Qaida have a strong need to rationalize and justify what they do. The success of the World Trade Center and Pentagon bombings may have given Al-Qaida a spiritual boost and hardened their resolve to continue their mission, despite the U.S. War on Terrorism. Recommendations and areas of further research are presented to enhance the intelligence community's understanding of the internal workings of the group."
Naval Postgraduate School (U.S.)
Kreckovsky, Melanie J.
2002-03
-
U.S.-European Relations Pre- and Post September 11, 2001
From the thesis abstract: "Throughout the more than 50 years in which the North Atlantic Treaty Organization (NATO) has secured peace and stability in Europe, relations between the US and its European allies remain a persistent paradox-unified, yet at considerable odds. It is a partnership that is consistent and strong, yet troubled and fragile. This thesis analyzes the emerging European-American relationships based on perceptions of key stakeholders, including pre- and post- September 11 attitudes, and persistent concerns Although history may repeat itself globalization of politics, finance and national security increasingly connect Europeans, Americans and other nations, The complexity of these relationships is studied to reveal common themes relevant to evolving European- American relations, This study reveals the following findings: France, Germany and the United Kingdom represent the overall voice of European policies; The interpersonal relations between prominent European and American stakeholders appear more substantial and influential than publicly acknowledged; European stakeholders perceive the current U.S. administration as generally reflective of a bygone era; The number of European partners are increasing and European voices are moving tentatively closer to a common voice on foreign and security issues; And important European domestic issues appear to dominate European concerns, often overshadowing the American preoccupation on terrorism."
Naval Postgraduate School (U.S.)
Lange, Thomas
2002-03
-
Demonstration of the Subversion Threat: Facing a Critical Responsibility in the Defense of Cyberspace
From the thesis abstract: "This thesis demonstrates that it is reasonably easy to subvert an information system by inserting software artifices that would enable a knowledgeable attacker to obtain total and virtually undetectable control of the system. Recent security incidents are used to show that means, motive, and opportunity exist for an attack of this nature. Subversion is the most attractive option to the professional attacker willing to invest significant time and money to avoid detection and obtain a significant payoff. The objective here is to raise awareness of the risk posed by subversion so that the decision makers responsible for the security of information systems can make informed decisions. To this end, this work provides a complete demonstration of a subverted system. It is shown how a few lines of code can result in a very significant vulnerability. The responsibility to defend information systems cannot adequately be met without considering this threat. Addressing this threat gets to the very nature of the security problem, which requires proving the absence of something - namely, a malicious artifice. Several techniques for demonstrating security are shown to be inadequate in the face of this threat. Finally, a solution is presented with a proposal for future work."
Naval Postgraduate School (U.S.)
Anderson, Emory A.
2002-03
-
Testing the Statutory Coherence Hypothesis:The Implementation of the Maritime Security Act of 1996
Federal maritime policy has evolved as an accumulation of statutes and
administrative programs intended to respond to global and domestic issues and trends within the maritime industry. The Maritime Security Act of 1996 (MSA) amended the Merchant Marine Act of 1936 in an attempt to revitalize the U.S.-flag merchant marine. The cornerstone of the MSA is the Maritime Security Program, which replaced the legacy Operating Differential Subsidy by compensating U.S. carriers for the higher costs of operating ships under a U.S.-flag compared to those of foreign-flag competitors. This thesis analyzes the MSA using a policy analysis framework developed by Sabatier and Mazmanian. The analysis identifies and evaluates critical variables affecting the achievement of statutory objectives. The absence of clearly defined objectives gives rise
to inherent difficulty when attempting to measure what specifically constitutes attainment of MSA statutory success. The principle causal linkage between government intervention and the attainment of the legislative objective is through the provision of monetary subsidies. The study concludes that the MSA is a short-term policy that represents the continuation of a "bandage" solution to the hemorrhaging of U.S.-flag vessels to more profitable foreign registries and is not achieving its objective of revitalizing the U.S. merchant marine.
Naval Postgraduate School (U.S.)
Dibble, Mark P.
2002-03
-
Aerosol Optical Depth Retrieval by NPS Model Modified for SEAWIFS Input
Using visible wavelength radiance data obtained from the spaceborne Sea-viewing Wide Field of-view Sensor (SeaWiFS), during the Aerosol Characterization Experiment-Asia (ACE-Asia), an analysis of aerosol optical depth (AOD) was completed by modification to the NPS AOD Model previously compiled for NOAA geosynchronous- and polar-orbiting satellites. The objective of the analysis was to calibrate the linearized, single-scatter algorithm, estimated bi-directional surface reflectance, and phase function parameters. The intent of the study was to provide enhanced temporal AOD coverage with the addition of the orbiting SeaWiFS eight-channel radiometer to the established NOAA constellation of five-channel AVHRR-equipped satellites. The work has operational significance in providing timely, accurate remote information to military operators of identification and targeting systems. Possible applications include detection and warning of international treaty violation of reducing the adverse public health effects by weapons of mass destruction of pollution advection on global weather patterns.
Naval Postgraduate School (U.S.)
Brown, Brady A.
2002-03
-
Analysis on the Impact of the 1972 ABM Treaty and Its Affect on the Procurement of a National Missile Defense System
"For the last thirty years, many strategists have considered the 1972 Anti-ballistic Missile (ABM) Treaty as the foundation for arms control. Others have insisted that its existence perpetuates American vulnerability to a ballistic missile attack. Since its inception, the ABM Treaty has been amended only once, but the geopolitical structure of the world has changed dramatically. The Cold War has ended and many new threats have emerged. The once bipolar world, which is reflected in the treaty, has transformed into a multithreat domain of instability. In response to these new threats, President George W. Bush has indicated that he strongly desires to procure a national missile defense (NMD) system. The terrorist attacks on the Pentagon and World Trade Center indicated that the United States has indeed become a target to extremists who are willing to use weapons of mass destruction (WMD) to harm American citizens. These events also strengthened President Bush's resolve to deploy a NMD system. However, the ABM Treaty acts as a roadblock. This thesis examines the impact of the ABM Treaty on the procurement of a NMD system and investigates the treaty's current utility."
Naval Postgraduate School (U.S.)
McDaniel, Donald B.
2002-03
-
Toward an Internet Service Provider (ISP) Centric Security Approach
"Individual users, businesses, and governments have become functionally dependent on the Internet's connectivity to interact at the most basic levels of social and economic intercourse. Yet self-propagating worms and distributed denial of service attacks have demonstrated that disruption of the Internet infrastructure can be quickly achieved despite the vast knowledge of vulnerabilities and readily available subscriber-based countermeasures. In part, this condition is made possible because networks continue to operate under an obsolete subscriber-centric security paradigm that is based on all end users being trusted to act appropriately. This thesis develops the idea of an Internet Service Provider (ISP)- centric security approach by examining the types, roles, security mechanisms, and operational precepts of ISP's to illustrate their functional control within the infrastructure. Denial of service and worm attacks are detailed to provide the context for an emerging set of conditions that forms the basis of the requirement for the ISP approach. This paper concludes by examining four enabling technologies currently available that, used uniformly, provide ISPs with the framework to implement Internet based security that can serve to enhance the layered defense model and invoke the tenants of best practices."
Naval Postgraduate School (U.S.)
Price, Patrick D.
2002-03
-
Interpretations of Article 5 of the North Atlantic Treaty, 1949-2002
"This thesis analyzes various interpretations of Article 5 of the North Atlantic Treaty since 1949. These variations reflect the evolving conceptions of the national security interests of the NATO Allies. Three historical periods are studied: the Cold War, 1949 to 1989; the post-Cold War, 1989 to 10 September 2001; and since 11 September 2001. The collective defense commitment in Article 5 was the foundation principle of the Alliance. During the Cold War, however, interpretations of collective defense necessarily required adaptation to remain relevant. The adaptability constructed during the Cold War yielded to broader concepts of threats and risks in the post-Cold War period. Following the first invocation of Article 5 due to the 11 September 2001 terrorist attacks on the United States, the actions taken by NATO and the individual Allies demonstrate the value of NATO's collective defense principles. The adaptability of Article 5 throughout NATO's history thus far suggests that in the future it will remain a highly valued and integral component of the Alliance's approach to security."
Naval Postgraduate School (U.S.)
Klima, Kenneth T.
2002-03
-
Satellite Communications for Coast Guard Homeland Defense
The Coast Guard has developed a C4ISR infrastructure ashore to aid personnel in decision making, job performance, and information exchange, but in doing so they have neglected their most important asset; the afloat community. In an effort to explore and find a wireless connectivity solution for CG cutters, the authors examined the requirements for solutions in the area of commercial satellite connectivity. This connection is necessary for USCG afloat assets to access vital maritime, law enforcement, and Fisheries databases maintained ashore, as well as to keep those ashore informed of mission status. This connection also allows cutters to connect to CGDN+ and the Internet, improving both morale and personnel administration issues (leave, medical records, training, assignment process, etc.) With the technologies now available, the USCG must identify which solutions can best be utilized with respect to bandwidth, security, cost, equipment installation requirements, durability, and range. Primarily our research dissects Qualcomm's Globalstar satellite options, INMARSAT and capacity expander (ICE) technology, and current Navy INMARSAT technology solutions. The authors have identified technological limitations and proper requirement analysis techniques that will aid in future Coast Guard evaluations of these extremely high cost wireless networks. Finally, the authors make recommendations for near and long-term solutions to the Coast Guard's connectivity requirements.
Naval Postgraduate School (U.S.)
Campen, Andrew; Clarke, Kurt
2002-03
-
Information Management and the Biological Warfare Threat
This thesis explores the implications of information management of government-funded projects on national security objectives. A case study of the Human Genome Project is used to illustrate the risk of information transfer between government sources and private industry and the implications posed to the proliferation of Weapons of Mass Destruction. The issue of risk in information management is approached by developing three theoretical paradigms: the scientific paradigm, the business paradigm and the security paradigm. The findings of this thesis demonstrate an information sharing paradigm favoring full and open access to scientific data currently being practiced by the U.S. Human Genome Project. The information gathered was acquired via open source information pertaining to the Human Genome Project and related initiatives. The purpose of this thesis was to raise awareness of the dangers in distributing information, funded and supplied by the United States. In addition, recommendations were made to increase the involvement of medical professionals and scientists in the non-proliferation efforts the U.S. is currently involved in.
Naval Postgraduate School (U.S.)
Martinez, II, Antonio
2002-03
-
Analysis of Improvisational Budgeting from Calendar Year 1990 to 1999
Improvisational budgeting represents an interruption to the normal budgeting process, resulting in costly delays to the defense Planning Programming and Budgeting Process (PPBS). A normal congressional budget process was characterized by Congress' ability to follow established procedures, complete their budget in a timely manner and fulfill their expected roles for applying incremental adjustments to the budget. The latent pro-spending bias and intrinsic political behavior within the budgetary process, in conjunction with a U.S. economy bitten by stagflation in the 1970's, was a recipe for the creation of enormous debt and political breakdowns in the 1980's. The result of these factors was a breakdown of the normal budgeting process, subsequently circumvented by improvisational budgeting. Ramifications include continuing resolution appropriations, appropriations passed before authorizations, delayed bills or even government shutdowns. These ramifications impact DoD's ability to issue accurate Budget Estimate Submissions during budget formulation, increasing the level of uncertainty in the PPBS process. This can negatively impact defense programs requiring accurate forecasting to remain executable. It is important to further explore the decade of the 1990's to ascertain whether harmony could be restored in a budgetary process defined by a surplus rather than the deficit spending-driven improvisational budgeting of the 1980's.
Naval Postgraduate School (U.S.)
Buell, Richard C.
2002-03
-
Sub-Regional Cooperation in East Central Europe
This thesis analyses the sub-regional cooperation in East Central Europe. It argues that the changed security environment after the fall of the Iron Curtain made the states of the region realize the need for close cooperation in order to meet the requirements of membership of the larger security institutions. It draws upon the example of the Hungarian-Pomanian joint Peacekeeping Battalion as an example of military cooperation at the sub- regional level. Sub-regional cooperation and organizations are perfect tools for EU candidate countries in preparing for the enlargement. The mutual interest of the involved states and the criteria of the expansion itself in this phase already brought stability to the region. Sub regionalism develops and prepares the economies, the infrastructure of the aspirant countries and helps consolidates their democracies. Since good-neighboring relations is one of the requirements for membership, sub-regional cooperation with the cross-border contracts that include every level of society promote tolerance between ethnic groups and helps overcome the historical real or fictitious injustices and promotes good relations between nations.
Naval Postgraduate School (U.S.)
Terek, Ksalman
2002-03
-
Estonian Road to Effective Defense: Civil-Military Dimension
"Today's world is characterized by rapid changes in international relations. Most of Europe is engaged in transatlantic cooperation founded upon common democratic values, For Estonia, the most significant development in the international environment is the process of Euro-Atlantic integration: the continued enlargement of the European Union (EU) and North Atlantic Treaty Organization (NATO). From the time they were formed, these structures have guaranteed peace, stable social development and economic growth for the member nations. For Estonia, membership offers a realistic and historically unique opportunity to secure its democracy and sovereignty. This thesis addresses how participation in the NATO MAP process has contributed to Estonia's national security goals, specifically the construction of a civilian consensus on defense matters and the setting of realistic goals. Moreover, the thesis shows how Estonia will reach two main goals of defense policy: First, to develop and maintain an indigenous and credible national defense capable of defending the nation's vital interests, which requires a national security planning process that contributes to a civilian consensus on defense matters; Second, to develop the Estonian Defense Forces (EDF) in a way that ensures their interoperability with the armed forces of NATO and EU member states and their capability to participate in Peace Support Operations."
Naval Postgraduate School (U.S.)
Lahtein, Harry
2002-03
-
Exploratory Analysis of Waterfront Force Protection Measures Using Simulation
"Since the USS Cole incident in October 2000, and particularly since the terrorist attacks of September 2001, Force Protection has become a fundamental issue. Of particular concern to the Navy is waterfront Force Protection: the protection of in-port High Value Units from attacks from the sea. The unpredictability of when or how a terrorist attack might be executed makes simulation an excellent tool for analyzing the waterfront force protection issue quantitatively. This thesis develops and implements a simulation model of Patrol Boats at the Naval Submarine Base in Bangor, Washington using Java and Simkit, both of which are platform independent, and therefore universally usable. The simulation is run pitting eight different notional Patrol Boat configurations (varying the number of patrol boats used, their intercepting and patrolling speeds, and their patrolling patterns) against eight notional terrorist attacks. The results of the simulation runs are analyzed, and general conclusions are drawn. The results indicate that the number of patrol boats used in an area and the speed they use to intercept threats are the most important factors of the four analyzed. Patrolling speed and patrolling patterns are found to be insignificant."
Naval Postgraduate School (U.S.)
Childs, Matthew D.
2002-03
-
Impact of Increased Antiterrorism/Force Protection Requirements on Ships Operations Funding
"Since the terrorist attack on USS COLE (DDG 67) and more recently the attacks on New York City and the Pentagon, Antiterrorism/Force Protection (AT/FP) requirements have increased dramatically throughout the Department of Defense (DOD). As these requirements escalate in scope and number, so do the costs of meeting them. In the Navy, ships are bearing a portion of these costs out of their operations funding. Type Commanders (TYCOMs) fund the operations of all ships and squadrons under their command. In order to have a firm grasp on how these new AT/FP requirements will affect them financially, they must be able to forecast the costs related to them and make appropriate adjustments to their existing ships operations funding model. Acquiring a better grasp on the fiscal impacts of these new requirements will allow Type Commanders to more effectively budget for them in the future. This thesis provides a shipboard AT/FP cost estimation model to aid in forecasting costs associated with these activities."
Naval Postgraduate School (U.S.)
Anderson, Tim J.
2002-03
-
PLA Navy Looks to the Indian Ocean
"This thesis examines the implications of China's security needs for the modernization and role of the People's Liberation Army Navy (PLAN). The main argument is that the expansion of China into a new maritime area of operation is likely to solidify Beijing's current regional relationships and possibly lead to a naval arms buildup in the Indian Ocean region. Although the 2001 Quadrennial Defense Review does not explicitly name China, its conclusion that a 'military competitor with a formidable resource base will emerge' in Asia clearly implies that the United States will have to take into account China's aspirations to become a regional and potentially global maritime power in the 21st century."
Naval Postgraduate School (U.S.)
Good, Jonathan T.
2002-03
-
Modeling Man-Made Epidemics
"This thesis develops a mathematical model to explore epidemic spread through the Ground Combat Element (GCE) of the Marine Expeditionary Unit (MEU). The model will simulate an epidemic caused by a biological attack using an agent that has the ability to spread through person-to-person contact (small pox, hemorrhagic fever, etc.) A stochastic modeling process will be used along with widely accepted mathematical formulas for an SEIR (Susceptible-Exposed-Infectious-Removed) epidemic model. A heterogeneous population composed of numerous homogenous subgroups with varying interaction rates simulates the unique structure of military combat units. The model will be evaluated to determine which units facilitate the most rapid spread of the epidemic. The model will then test a number of different scenarios to determine the effects of varying quarantine techniques, vaccination strategies and protective postures on the spread of the disease."
Naval Postgraduate School (U.S.)
Paterson, Ryan W.
2002-03
-
Cautionary Note Regarding the Data Integrity Capacity of Certain Secure Systems
"The need to provide standard commercial-grade productivity applications as the general purpose user interface to high-assurance data processing environments is compelling, and has resulted in proposals for several different types of trusted systems. We characterize some of these systems as a class of architecture. We discuss the general integrity property that systems can only be trusted to manage modifiable data whose integrity is at or below that of their interface components. One effect of this property is that in terms of integrity these hybrid-security systems are only applicable to processing environments where the integrity of data is consistent with that of low-assurance software. Several examples are provided of hybrid-security systems subject to these limitations."
Naval Postgraduate School (U.S.)
Irvine, Cynthia E.; Levin, Timothy E.
2002
-
Approach to Security Requirements Engineering for a High Assurance System
"Requirements specifications for high assurance secure systems are rare in the open literature. This paper examines the development of a requirements document for a multilevel secure system that must meet stringent assurance and evaluation requirements. The system is designed to be secure, yet combines popular commercial components with specialized high assurance ones. Functional and non-functional requirements pertinent to security are discussed. A multi-dimensional threat model is presented. The threat model accounts for the developmental and operational phases of system evolution and for each phase accounts for both physical and non-physical threats. We describe our team-based method for developing a requirements document and relate that process to techniques in requirements engineering. The system requirements document presented provides a calibration point for future security requirements engineering techniques intended to meet both functional and assurance goals."
Naval Postgraduate School (U.S.)
Irvine, Cynthia E.; Levin, Timothy E.; Wilson, Jeffery D.
2002
-
Swift Trust in Hastily Formed Networks
"Social, cultural and organizational differences between U.S. military forces (USMs), multinational forces (MNFs), other U.S. and foreign government agencies (OGAs) and nongovernment organizations (NGOs) make interactions between members of these organizations engaged in stability, security, transition and reconstruction operations (SSTR) less effective. There is a wide diversity of organizations and cultures among the community engaged in SSTR. The organizations typically include USMs, MNFs, other OGAs and NGOs. The events of 911, the Indonesian Tsunami and Hurricane Katrina each revealed fundamental problems with communication, coordination and collaboration between first responders from different organizations, be they military units from different services, different levels of government, nonprofit aid organizations or other agencies. These problems are intensified during post combat SSTR operations conducted in the midst of insurgency, terrorism, and criminality. Although differences in national and organizational culture contribute to difficulties, cultural diversity is not the only problem. Increasingly, research is revealing the difficulties of communicating and collaborating across organizational boundaries. Differences in organizational missions, structures and processes, human resources policies, reward systems and cultures create problems that make communication, coordination, cooperation and ultimately collaboration less effective."
Naval Postgraduate School (U.S.)
Zolin, Roxanne
2002
-
KeyNote Policy Files and Conversion to Disjunctive Normal Form for Use in IPsec
This technical report describes the utility developed for converting a KeyNote policy file to Disjunctive Normal Form, so that it can be further utilized in research on Quality of Security Service for IPsec. Some background information on KeyNote and IPsec, on the Disjunctive Normal Form of logical expressions, as well as on lex and yacc tools, can be found in the introductory paragraphs of this document.
Naval Postgraduate School (U.S.)
Irvine, Cynthia E.; Levin, Timothy E.; Spyropoulou, Evdoxia
2002-01
-
Contribution of Symmetrization to the Intensification of Tropical Cyclones
From the thesis abstract: "Operational ability to forecast tropical cyclone motion is much better than the ability to forecast intensity change. Several recent works have studied the mechanisms that bring about the symmetrization of various types of asymmetries in tropical cyclones. This study was conducted to add to that knowledge by examining the transfers of kinetic energy between scales and how those energy transfers alter the wind structure of the cyclone. Adding to the understanding of how this process can alter winds is a step toward increasing ability to forecast these changes. A non-divergent barotropic spectral model was used to integrate annular bands of enhanced potential vorticity, simulating hurricane eyes, with varying degrees of offset from the center of the vortex. Offset monopoles of vorticity, simulating asymmetric convection in tropical storms, were also integrated. As discovered by previous researchers, these unstable eyes broke down into a series of mesovortices, which merged and eventually relaxed to monopolar or tripolar final states. The offset monopoles formed spiral bands and became symmetric as well. Kinetic energy was transferred from the mean flow to the asymmetries as mesovortices formed and then transferred back to the mean flow as symmetrization occurred. These energy transfers occurred very quickly. As energy was transferred from asymmetry to mean flow, the azimuthally averaged wind increased in a band of about 70 km from the center of the vortex, even though the maximum wind decreased. Azimuthally averaged wind in the monopole cases also increased, but the change was confined to a smaller radial band near the radius of maximum wind."
Naval Postgraduate School (U.S.)
Miller, Henry A.
2001-12
-
MAGMA: A Liquid Software Approach to Fault Tolerance, Computer Network Security, and Survivable
From the thesis abstract: "The Next Generation Internet (NGI) will address increased multi-media Internet service demands, requiring consistent Quality of Service (QoS), similar to the legacy phone system. Server Agent-based Active network Management (SAAM) acts like a rush-hour traffic reporting helicopter. Upon routing request arrivals, SAAM server determines the best, least traffic/resistance route and assembles the routing path, freeing up 'light-weight' routers to provide faster, more reliable, forwarding services. The SAAM server is a critical network node; therefore, it is imperative to make it extremely robust. With Margulis Agent-Based Mobile Application (MAGMA) liquid software, a SAAM server agent will remain inactive in resident memory of each router until it is stimulated by a message from the departing server. Then the agent will begin running a new server at a starting point determined from the prior server's recent state information or a pre-determined point if that state information is not available. MAGMA will provide SAAM an increased fault tolerance and security against malicious attacks."
Naval Postgraduate School (U.S.)
Margulis, Scott
2001-12
-
Potential Role of the Philippines in U.S. Naval Forward Presence
This thesis argues that the U.S. Navy should attempt to re-establish a presence in Subic Bay, Republic of the Philippines, because Subic Bay offers the best base from which to support U.S. Naval forward presence in the Asia-Pacific region. With the shift of defense focus from the European to the Asia-Pacific region, and the current "War on Terrorism," the problem of finding more secure bases for U.S. Naval forward presence has increasingly become a problem. Four main arguments are used to support this thesis: The Philippines served as the linchpin of U.S. Naval forward presence for almost a century. Second, the Philippines, especially Subic Bay, offers the best basing arrangements in the Asia-Pacific region potentially available to the U.S. Navy. Alternative options, such as U.S. territory of Guam, the countries of Australia, Singapore, Thailand, Malaysia, Vietnam, and the Mobile Offshore Base, present problem of a geographic, political, security, or technical nature. Third, it will suggest that the strategic and political considerations that led to a U.S. departure from the Philippines in 1992 have changed with the increasing assertiveness of the People's Republic of China (PRC), the destabilization of Indonesia, and the Islamic insurgency that affects several southern islands of the Philippines. Finally, the benefits of a U.S./Philippine rapprochement far outweigh the disadvantages.
Naval Postgraduate School (U.S.)
Garcia, Thomas J.
2001-12
-
On Deceiving Terrorists
This thesis addresses the use of deception as one means available to states for dealing with terrorists. It begins by exploring the body of theoretical literature to establish the foundation necessary for a thorough discussion of deception. Next, the thesis examines the reasons for state use of deception in interstate conflict. From this list, three potential uses of deception against terrorists are suggested. Specifically, the thesis proposes that states use deception to create and exploit organizational inefficiencies and weaknesses in terrorist organizations, facilitate counter-terrorist operations, and conceal counter-terrorist capabilities and intentions. Subsequently, the cases presented herein reveal that states have in fact successfully used deception in the past with all three purposes in mind. Finally, this thesis also explores the often-overlooked subject of costs and risks, demonstrating that the use of deception is almost never without expense. Even when deception succeeds, its use inevitably incurs costs and opens the door to certain risks. Moreover, the study shows that deception-while both legal and ethical in the larger sense-might be illegal or unethical in certain applications. In the end, though, this thesis shows that deception is, indeed, a valuable tool against terrorists.
Naval Postgraduate School (U.S.)
Higginbotham, Benjamin I.
2001-12
-
Turkey's Response to Threats of Weapons of Mass Destruction
Unlike most of its NATO allies, Turkey did not emerge from the Cold War with enhanced security. The acquisition of weapons of mass destruction (WMD) and ballistic missiles by its neighbors in the Middle East Iran, Iraq and Syria creates a serious security concern for Turkey. This thesis analyzes the numerous threats posed to Turkey by its neighbors' nuclear, chemical and biological weapons programs and their ballistic missiles. It evaluates Turkey's defense options to counter these threats and examines the credibility of NATO's security guarantees, including the nuclear guarantees the United States provides under NATO auspices. The thesis concludes that Turkey must acquire the capabilities to deny adversaries the benefits of these weapons. These capabilities including passive and active defenses as well as improved counterforce means will enable Ankara to strengthen deterrence and provide an effective defense should deterrence fail. Improving its preparedness for WMD contingencies should be an urgent, new priority for Turkey. The Turkish Armed Forces should have the necessary capabilities to fight, survive and prevail in NBC environments. In addition, NATO's security guarantees, which hinge ultimately on the U.S. nuclear presence and U.S. extended deterrence commitments in Europe, and Turkey's own national defense and deterrence posture, must remain convincing to Turkey as well as to the WMD-armed states that threaten Turkey.
Naval Postgraduate School (U.S.)
Al, Guray
2001-12