Advanced search Help
Searching for terms: EXACT: "Naval Postgraduate School (U.S.)" in: publisher
Clear all search criteria
Only 2/3! You are seeing results from the Public Collection, not the complete Full Collection. Sign in to search everything (see eligibility).
-
Optimal Transmitter Placement in Wireless Mesh Networks
"Wireless mesh networks are systems of wireless access points interconnected in a mesh to provide digital services to client devices via radio transmission. We consider the challenges of quickly and optimally designing a wireless mesh network. We focus on maximizing client coverage area by choice of access point locations, subject to constraints on network service, quantity and technical capabilities of access points, environmental information, and radio propagation over terrain. We create a nondifferentiable, non-convex, nonlinear optimization problem to quantify the value of a given network, and use a sampling algorithm to quickly find very good solutions. We conduct field tests using commercial equipment in real-world scenarios, and conclude our technique can provide working wireless mesh network topologies. Our techniques and associated decision support tool can be used by humanitarian assistance or disaster relief personnel and combat communications planners to quickly design wireless mesh networks. The decision support tool runs on a laptop computer, accepts map data in a generic file format, creates network topologies for virtually any type of terrain and mesh access point device, and does not require any additional software or solver licenses."
Naval Postgraduate School (U.S.)
Nicholas, Paul J.
2009-06
-
Empirical Evaluation of a Model of Team Collaboration Using Selected Transcripts from September 11, 2001
"The extraordinary events that occurred on the morning of September 11, 2001, left Federal Aviation Administration (FAA) air traffic controllers in New York, Boston, Washington, and Cleveland and their colleagues at the North American Aerospace Defense Command (NORAD), without precedent as to how to respond to the hijacking of four American commercial airliners. Despite the chaos and confusion, the two agencies put forth a joint effort in order to decide when and how to scramble fighter aircraft to escort the airliners. The collaboration that occurred between the agencies was recorded in radio transcripts between NORAD and FAA air traffic controllers. The goal of this thesis is to utilize the September 11, 2001, NORAD/FAA channel three transcripts to offer a real-world example of how a team works together on a one-of-a-kind problem. Further, transcript of recorded audio were coded and analyzed in an effort to empirically validate the Office of Naval Research model of team collaboration. The model focuses on individual and team cognitive processes used during team or agency collaboration with the goal of understanding how individuals and teams work together in order to reach a decision."
Naval Postgraduate School (U.S.)
Place, David S.; Grubbs, Gregory A.
2009-06
-
Criminology to Counterinsurgency Operations: Reducing Insurgency Through Situational Prevention
"This research introduces and adapts the 25 techniques of Situational Crime Prevention for use in counterinsurgency operations. These techniques are based on a set of powerful theories within the fields of Environmental and Situational Criminology. Situational Prevention is a strategy that addresses specific crimes, or insurgent activity, by managing, designing, and manipulating the environment in a manner that seeks to increase the risk to the insurgent, while reducing the insurgent's potential reward for committing the act. The 25 techniques offer a practical means to apply these theories to the reality of counterinsurgency operations. Use of the 25 techniques would expand the repertoire of preventive countermeasures, and enable a security force to intervene in the causal chain events to prevent or reduce the occurrence of insurgent violence and crime. These techniques originate from five core principles: increasing effort, increasing risk, reducing rewards, removing excuses, and reducing provocations."
Naval Postgraduate School (U.S.)
Gibbs, Stephen R.
2010-06
-
Systems Integration of Autonomous Behavior Analysis to Create a 'Maritime Smart Environment' for the Enhancement of Maritime Domain Awareness
"Maritime Domain Awareness (MDA) is a very challenging mission area in an ever increasing net-centric environment, which is inundated with data from many highly advanced, capable sensors and communication suites. With all these technological data collection and dissemination advances, the information available is just too voluminous for humans alone to process and react to manually, sifting the 'wheat from the chaff,' and be expected to accomplish effective operational decision making regarding maritime threats to national security, as well as to international peace and trade on the high seas. This thesis addresses MDA Joint Integrating Concept capability gaps, MDA-003C and MDA-004C, for aggregating, analyzing and displaying maritime information in order to understand the maritime environment to identify threats and predicting activity within the maritime domain. Applying the Systems Engineering process, the concept, requirements analysis, architectures, and system design and validation description for a systems integration solution is presented. The proposed implementation entails integrating autonomous behavior analysis capability that utilizes syntactical grammar based spatial-temporal behavior classifications within existing Net-Centric MDA environments."
Naval Postgraduate School (U.S.)
Davis, Cledo L.
2010-06
-
Decreasing Variance in Response Time to Singular Incidents of Piracy in the Horn of Africa Area of Operation
"Instances of piracy have been increasing since 2006, and the international community can ignore this problem no more. Legal, socio-economic, and technological issues hinder multi-national efforts to combat piracy effectively. Response to events of piracy are oftentimes late, as reporting of incidents is also mired in legal issues; however, technology does exist that can notify companies that a ship is being attacked by pirates as the attack occurs or possibly prior to the attack if the attackers display intent. This technology is the Ship Security Alert System (SSAS), and The International Maritime Organization (IMO) has mandated that all ships greater than 500 gross tons (United States Coast Guard, 2004) shall be equipped with an SSAS. The problem lies in who should receive the SSAS attack alert notification. Currently, these distress signals only go to the company that owns the ship. This thesis will investigate the implications of SSAS reports directly fed to existing Navy networks, and show that small changes to existing Navy Maritime Operations C2 structure could result in an optimization in force employment and timeliness of response."
Naval Postgraduate School (U.S.)
O'Connell, Ryan; Descovich, Christopher
2010-06
-
Design and Implementation of the Memory Manager for a Secure Archival Storage System
"This thesis presents a detailed design and implementation of a memory manger for a kernel technology based secure archival storage system (SASS). The memory manger is a part of the non-distributed portion of the Security Kernel, and is solely responsible for proper management of both the main memory (random access) and the secondary storage (direct access) of the system. The memory manager is designed for implementation on the ZILOG Z8000 microprocessor in a multi-processor environment. The loop free design structure, based upon levels of abstraction, and a segment aliasing scheme for information confinement are essential elements of the overall system security provided by the SASS."
Naval Postgraduate School (U.S.)
Gary, Alan V.; Moore, Edmund E.
1980-06
-
Model-based Communication Networks and VIRT: Filtering Information by Value to Improve Collaborative Decision-Making
"Command-control and other distributed, collaborative systems should achieve the best possible results with resources available. We should measure these systems in terms of the quality of decisions made. Better decisions lead to better outcomes, because superior choices are made about what to do, with what assets, where and when. Just as we measure manufacturing processes in terms of value added at each stage, we want each processing step in distributed collaborative operations to maximize the ratio of added value to cost. Both computerized agents and human personnel receive information from others, process it, and then produce additional information for others downstream in the operational processes. This paper shows that current architectures do not promote high productivity. Specifically, most current approaches encourage an increase in information supply and exchange per se, producing glut rather than value. This paper explains how we can significantly increase the productivity of each operator and the success of overall missions. The approach, called VIRT, treats collaborators as participants with shared models. These models determine which information is high value and for whom. The architecture gives priority to conveying high value information. Similarly, low value bits are filtered out, saving resources and optimizing value attained."
Naval Postgraduate School (U.S.)
Hayes-Roth, Rick
2005-04
-
Forensic Analysis of Windows Virtual Memory Incorporating the System's Page-File
"Computer Forensics is concerned with the use of computer investigation and analysis techniques in order to collect evidence suitable for presentation in court. The examination of volatile memory is a relatively new but important area in computer forensics. More recently criminals are becoming more forensically aware and are now able to compromise computers without accessing the hard disk of the target computer. This means that traditional incident response practice of pulling the plug will destroy the only evidence of the crime. While some techniques are available for acquiring the contents of main memory, few exist which can analyze these data in a meaningful way. One reason for this is how memory is managed by the operating system. Data belonging to one process can be distributed arbitrarily across physical memory or the hard disk, making it very difficult to recover useful information. This report will focus on how these disparate sources of information can be combined to give a single, contiguous address space for each process. Using address translation a tool is developed to reconstruct the virtual address space of a process by combining a physical memory dump with the page-file on the hard disk."
Naval Postgraduate School (U.S.)
Stimson, Jared M.
2008-12
-
Network-Centric Maritime Radiation Awareness and Interdiction Experiments: C2 Experimentation
"The paper addresses technological and operational challenges of developing a global plug-and-play Maritime Domain Security testbed for the Global War on Terrorism mission. This joint NPS-LLNL project is based on the NPS Tactical Network Topology (TNT) comprised of long-haul OFDM networks combined with self-forming wireless mesh links to air, surface, ground, and underwater unmanned vehicles. This long-haul network is combined with ultra-wideband (UWB) communications systems for wireless communications in harsh radio propagation channels. LLNL's UWB communication prototypes are designed to overcome shortcomings of the present narrowband communications systems in heavy metallic and constricted corridors inside ships. In the center of our discussion are networking solutions for the Maritime Interdiction Operation (MIO) Experiments in which geographically distributed command centers and subject matter experts collaborate with the Boarding Party in real time to facilitate situational understanding and course of action selection. The most recent experiment conducted via the testbed extension to the Alameda Island exercised several key technologies aimed at improving MIO. These technologies included UWB communications from within the ship to Boarding Party leader sending data files and pictures, advanced radiation detection equipment for search and identification, biometric equipment to record and send fingerprint files to facilitate rapid positive identification of crew members, and the latest updates of the NPS Tactical Network Topology facilitating reachback to LLNL, Biometric Fusion Center, USCG, and DTRA experts."
Naval Postgraduate School (U.S.)
Bordetsky, Alex; Dougan, Arden D.; Nekoogar, Faranak
2006
-
Personal Computer Local Area Network Security in an Academic Environment
"This thesis explores the unique security requirements of the Local Area Networks (LAN)s within the Administrative Sciences Department Instructional Laboratories at the Naval Postgraduate School, Monterey, California. Current operating procedures, direction from the Department of Defense and Navy sources, views of computer professionals and case studies of microcomputer labs at other educational institutions, are examined to identify areas where security improvements can be made. Security topics covered include; physical security, equipment tamper-proofing, software protection and damage caused maliciously or unintentionally by users. The threat imposed on the various LANs by users, viruses, and the operating environment are evaluated to determine a suggested security response."
Naval Postgraduate School (U.S.)
1989-12
-
Game Theory: Toolkit and Workbook for Defense Analysis Students
"The purpose of this thesis is to provide a workbook of the game theory topics covered in the course SO4410 Models of Conflict. The thesis also provides a software toolkit, which enables students to solve the problems easier and faster, therefore focusing more on analyses of the situation than on the actual mathematical side of the problem. The workbook gives a basic review of the fundamental concepts and a detailed explanation for solving 'simple' game theory problems by pen and paper. Topics cover two and three person games. Two person games include (1) zero-sum games and their solutions in the pure or mixed strategy, (2) partial-sum games without communication between the players, and (3) communication among players and its effect on the game. Three person games focus on likely coalitions among the players. The toolkit covers two person zero-sum games, the Nash arbitration scheme, strategic moves, prudential and equalizing strategies in partial-sum games, 3-person games, and a supplemental template for linear programming problems with up to 10 variables and 30 constraints."
Naval Postgraduate School (U.S.)
Feix, Miroslav
2007-06
-
Analysis of Disaster Preparedness Planning Measures in DOD Computer Facilities
"This thesis will analyze a disaster recovery plan currently in use at a selected DOD [Department of Defense] computer facility, as well as investigate facility contingency planning documents actually tested during recent natural disasters."
Naval Postgraduate School (U.S.)
Harrigan, John D.
1993-09
-
Predicting the Impact of Full Body Scanners on Air Travel and Passenger Safety
"Good decisions can be made only by looking at the full picture and accounting for what is seen and what is not seen. Air travel security measures aim to create more safety for the passenger; this is what is seen. What is not seen is the impact increased security measures create when passengers decide to substitute driving for flying. Traveling on a short-haul flight (under 500 miles) is significantly safer than driving that same distance in a vehicle. However, air travel security measures have led to more passengers choosing to substitute driving for flying due to longer wait times, greater inconvenience, and, in particular, the invasion of privacy. This study forecasts the impact full body scanners will have on air travel and passenger safety. Full body scanners invade one's privacy and, as a result, will negatively affect those passengers who place a high value on securing and maintaining their privacy. Passengers who substitute driving for flying will increase their risk level and increase the number of highway driving fatalities. The findings are that full body scanner usage at airports will increase annual highway driving fatalities from as few as 11 additional deaths to as many as 275."
Naval Postgraduate School (U.S.)
Kessler, Mary Elaine; Seeley, Brett R.
2010-06
-
Current Federal Identity Management and the Dynamic Signature Biometrics Option
"Although Identity Management (IdM) and biometrics have been engrained in the business practices of private and commercial organizations for decades, the United States Government (USG) and the Department of Defense (DoD) have only truly started to institute a holistic IdM Enterprise within the last decade. More specifically, the DoD has really sharpened the focus on leveraging biometrics since the beginning of the War on Terror. The operational capability to distinguish Red Forces or Gray Forces from Blue Forces is now a common daily occurrence. Regardless of the theater or Area of Operations, U.S. forces are utilizing biometrics to identify our enemies. In the next phase of implementing a comprehensive IdM Enterprise, the DoD is crafting new IdM policies, procedures, and systems that will distinguish between various levels of access and security controls among Blue Forces. Blue Force IdM architectures are required by specific USG and DoD policies to enforce standardization in policy and application across all federal agencies to improve and synchronize their business practices. And with many agencies crafting their own version of the future, a basic understanding of current IdM and biometrics requirements, as well as potential biometric resources, is necessary to move forward."
Naval Postgraduate School (U.S.)
Zanger, Michael S.
2009-03
-
MDA Development: By Design or by Policy?
"Maritime Domain Awareness may require reach across Federal, State, local and private agency maritime security systems to create an accurate, timely, and reliable common operating view. The view will provide the user with an in-depth, multi layer linkage of situational awareness and threat assessment developed from many databases, to support different needs at different levels of the national maritime security system. Implementing new and emerging technologies into the U.S. Navy system may enhance the Maritime Commander's ability to achieve situational awareness in a more timely, efficient, and accurate manner than what occurs now. Recognizing the advantage of new and emerging technologies, the SECNAV and CNO have tasked PEO C4I to develop a system, which will aid the U.S. Navy in meeting the MDA mission; this system is known as MDA Spiral-1. This thesis examines the effects of placing new and emerging technologies developed in Spiral-1 onto legacy systems and how the U.S. Navy as an organization will either absorb these technologies or make multi-dimensional changes to enhance the process of achieving MDA."
Naval Postgraduate School (U.S.)
Wagenborg, David
2008-03
-
Security Considerations for Network-Centric Weapon Systems
"This thesis describes the security risks for network-centric weapon systems as a combination of different aspects of security, each with its own threats and mitigation strategies. Computer and network security deals with cryptography, authentication, and attacks on software. Information security deals with the ability of the system to process information of different classifications but prevent disclosure to unauthorized users. Physical security ranges from hardware destruction to reverse engineering of captured hardware. Operational security covers the inability of covert units to transmit to the network without compromising their positions. Personnel security discusses the ways that people can intentionally or accidentally weaken the system during development or operations. Security of network-centric weapon systems is now a System of Systems (SoS) engineering problem and system developers must therefore embrace a systems engineering approach to security and consider all the threats and vulnerabilities facing the system. This examination must include not only the technical characteristics of the components but also the people who operate and maintain the system and the requirements of the mission. Only by mitigating the most efficient attacks on the system, regardless of the type of attack, can developers maximize the overall security of the system."
Naval Postgraduate School (U.S.)
Nesteruk, Erik A.
2009-09
-
Integrated Command and Control Architecture Concept for Unmanned Systems in the Year of 2030
"U.S. Forces require an integrated Command and Control Architecture that enables operations of a dynamic mix of manned and unmanned systems. The level of autonomous behavior correlates to: 1) the amount of trust with the reporting vehicles, and 2) the multi-spectral perspective of the observations. The intent to illuminate the architectural issues for force protection in 2030 was based on a multi-phased analytical model of High Value Unit (HVU) defense. The results showed that autonomous unmanned aerial vehicles are required to defeat highspeed incoming missiles. To evaluate the level of autonomous behavior required for an integrated combat architecture, geometric distributions were modeled to determine force positioning, based on a scenario driven Detect-to-Engage timeline. Discrete event simulation was used to schedule operations, and a datalink budget assessment of communications to determine the critical failure paths in the integrated combat architecture."
Naval Postgraduate School (U.S.)
Quincy, Keith E.
2010-06
-
Teaching Security Engineering Principles
"The design and construction of secure systems cannot be entirely captured in textbooks or class notes, but must be taught as an art which is learned through apprenticeship and practice. This paper describes a course in Secure Systems that uses the Flaw Hypothesis Methodology for penetration testing as a vehicle for motivating and teaching students fundamental principles of security engineering."
Naval Postgraduate School (U.S.)
Irvine, Cynthia E.; Levin, Timothy E.
2001-04
-
Coaxing the Peace: Reassurance Strategy in the Twenty-First Century
"The international system of the twenty-first century calls for new ways to resolve conflicts. Traditional influence strategies, such as deterrence and compellence, have undergone new revisions to conform to new challenges. A third strategy, reassurance, has demonstrated its potential in recent interstate conflicts after rarely being used during the Cold War. A strategy of reassurance involves one state's actions to increase the security of an adversary by helping the adversary in an issue that the adversary deems important. If the actions convince the adversary that the reassurer seeks peace, and the adversary also seeks peace, then the adversary reciprocates by sending an equally reassuring signal, completing an exchange that may lead to cooperation. This thesis analyzes the process of reassurance, using four modern case studies. In two of these case studies, one state's signal of reassurance was reciprocated, leading to a reduction in tensions. In the other two, the signal of reassurance was not reciprocated, leading to further tensions. This thesis seeks to find which conditions surrounded the successful cases. It will reveal that when benign intentions are made transparent through rhetoric, and when signals are perceived as costly, an adversary is more likely to reciprocate signals of reassurance."
Naval Postgraduate School (U.S.)
Lopez, Dave A.
2010-03
-
Social Movement Theory Typology of Gang Violence
"This thesis uses social movement theory to describe the formation of street gangs and account for their high levels of violence. By understanding street gangs as a social movement contributing to the gang cycle, my hope is that communities and law enforcement will be able to adopt better strategies for breaking the cycle. Likewise, the study of street gangs serves as a laboratory for counterinsurgency operations overseas. By understanding the potential effects of repression on a population, future counterinsurgent operators will better understand the complex environment in which they serve. As demonstrated by the case studies of Salinas and Oakland, continued coercive repression and negative channeling are recipes for creating isolation within a community that leads to fragmentation and increased violence."
Naval Postgraduate School (U.S.)
Long, Joseph E.
2010-06
-
Collapsing Insurgent Organizations through Leadership Decapitation: A Comparison of Targeted Killing and Targeted Incarceration in Insurgent Organizations
"Killing or capturing an insurgent leader provides a means of eliminating the knowledge, charismatic power, and direction that the leader instills within the organization. Technological breakthroughs in signal intelligence (SIGINT), an increase in the collection of human intelligence (HUMINT), and the beginning of the global war on terror have brought the employment of leadership decapitation as a means of collapsing insurgent organizations back into the consciousness of western society. While the goal of government forces is to separate the insurgent leader from the organization, the techniques of killing or capturing insurgent leadership provide distinct advantages and drawbacks. This thesis asks the research question: under what conditions is the targeted killing of an enemy leader preferable to the targeted incarceration of an enemy leader during counterinsurgency operations? The analysis of four case studies provides the insight required to determine whether an insurgent organization is susceptible to collapse as a result of leadership decapitation. This thesis finds that killing versus incarcerating a terrorist leader seems to make little difference. Instead, insurgent organizations are most likely to collapse when they fail to name a successor, regardless of whether the leader is killed or captured. Through careful study of an insurgent organization's structure, military leaders can operationalize this thesis and develop a strategy to collapse an insurgent organization through leadership decapitation."
Naval Postgraduate School (U.S.)
Staeheli, Paul W.
2010-03
-
Dragon's Claws: the Improvised Explosive Device (IED) as a Weapon of Strategic Influence
From the thesis abstract: "A maritime threat scenario, analytical models, and simulations are used to measure risk to a port given various levels of resource and intelligence. The scenario starts with intelligence that a large commercial ship arriving to a Pacific Coast Port within a 96-hour window poses a security risk. Intelligence further limits the set of threat ships to a subset of all traffic entering a specific port. A limited number of Maritime Operational Threat Response (MOTR) forces are available to detect, classify, and intercept the threat ship before it reaches port. In the first scenario, all ships are boarded before entering port, and impact is measured by delay of ships into port. In the other scenarios, intercept ships are routed to suspect ships and risk measured by the fraction of suspect ships that proceed to port unboarded because of lack of MOTR and surveillance assets. The results show current Coast Guard force structure is not sufficient to protect the Pacific Coast Ports against unspecific security threats without additional assets from the MOTR stakeholders or increased intelligence to limit the target set."
Naval Postgraduate School (U.S.)
Martin, James Kennedy
2009-03
-
Highlighting Effects of Current Globalization Tenets, Namely Democracy, Capitalism, and Cultural Transformation, on the Arab Islamic Middle East
"This thesis examines the shape of globalization in the Middle East, specifically with respect to three major elements of globalization, those of politics, economics, and culture. This thesis attempts to shed light on the importance and difficulties of fostering positive conditions, which could facilitate favorable terms for Islamic Arabs in the Middle East to fully embrace current globalization, thus increasing the region's and inevitably the world's prosperity and stability. Moreover, this thesis also addresses and analyzes the compatibility of Islamic Arabs in the Middle East with current globalization trends. Acknowledging that Middle Eastern globalization is a fairly large subject to cover, the scope of this research has been narrowed to answer the question of whether or not the acceptance of democracy, capitalism and cultural changes by Arab Islamic Middle Eastern societies, specifically the secular authoritarian regimes and the opposing Islamists organizations, could increase the prosperity and stability within the region, and if so, bring to light the obstacles which stand in the way of such progress."
Naval Postgraduate School (U.S.)
Richardson, David L.
2009-06
-
Options for Meeting U.S. Navy Foreign Language and Cultural Awareness Requirements in the Post 9/11 Security Environment
"This thesis examines foreign language and cultural awareness skills vital to the U.S. Navy, analyzes the stock of such skills already resident in the Navy and explores options for meeting current and future requirements for these skills. Information sources include a comprehensive review of literature. This thesis also reviews Defense-and Navy-identified, mission-critical, foreign language proficiency and cultural awareness skills and the Manpower requirements and billets requiring such skills. Navy linguists, concentrated in the Cryptologic Technician Interpretive (CTI) rating, require up to two years of foreign language and technical training, a Top Secret security clearance and eligibility for Sensitive Compartmented Information. CTIs increasingly perform foreign language duties outside of their core intelligence analyst competencies, such as translator or interpreter, which could be filled by Sailors who are native speakers. However, security clearance requirements of the CTI rating typically exclude Sailors who possess the native foreign language skills and cultural background. This thesis investigates how to optimize resident naval foreign language and cultural diversity and proposes alternative recruitment, training, employment, and retention methods. It recommends that the Navy develop a Translator/Interpreter rating for those ineligible for security clearances, reinstitute the Warrant Officer-1 rank, and pay ad hoc linguists."
Naval Postgraduate School (U.S.)
D'Angelo, Michael F.
2009-06
-
Sequential Pattern Detection and Time Series Models for Predicting IED Attacks
"Improvised explosive device (IED) attacks are a significant threat to coalition forces. Defeating IEDs as weapons of strategic influence has become a major objective of Combatant Commanders and their respective Joint Task Forces. This thesis attempts to identify new approaches that can help operational forces mitigate the risk of IED attacks by identifying common sequences of events that occur before an IED attack and forecasting the number of attacks in the immediate future. Using the CARMA association rules algorithm on historical data of religious, political, and IED attack events, a model is developed to explore commonly occurring sequences of events leading to an insurgency IED attack and to predict events that are likely to occur given the sequence observed to date. Time series models are also generated to identify trends and relationships that can be helpful in forecasting future monthly IED attacks based upon previous actual historical attacks. The identified sequences and forecasts could be used to help plan troop movements, rotations, force levels, as well as allocating limited resources to address imminent threats."
Naval Postgraduate School (U.S.)
Stafford, William B.
2009-03
-
Aerosol Optical Depth Retrieval by NPS Model Modified for SEAWIFS Input
Using visible wavelength radiance data obtained from the spaceborne Sea-viewing Wide Field of-view Sensor (SeaWiFS), during the Aerosol Characterization Experiment-Asia (ACE-Asia), an analysis of aerosol optical depth (AOD) was completed by modification to the NPS AOD Model previously compiled for NOAA geosynchronous- and polar-orbiting satellites. The objective of the analysis was to calibrate the linearized, single-scatter algorithm, estimated bi-directional surface reflectance, and phase function parameters. The intent of the study was to provide enhanced temporal AOD coverage with the addition of the orbiting SeaWiFS eight-channel radiometer to the established NOAA constellation of five-channel AVHRR-equipped satellites. The work has operational significance in providing timely, accurate remote information to military operators of identification and targeting systems. Possible applications include detection and warning of international treaty violation of reducing the adverse public health effects by weapons of mass destruction of pollution advection on global weather patterns.
Naval Postgraduate School (U.S.)
Brown, Brady A.
2002-03
-
Analysis of Federal Airport and Air Carrier Employee Access Control, Screening and Training Regulations
Current Federal Aviation Regulations concerning civil aviation security are focused on countering the threat of a passenger hijacking a commercial airplane. Current media and government emphasis is focused on a passenger breaching security at an airport in the U.S. and not an employee breaching security. The security of the U.S. air travel industry from terrorist attacks hinges on an effective civil aviation security program. Government and aviation industry officials would greatly benefit from the revision of the current Federal Aviation Regulations concerning civil aviation security to address the issue of terrorism initiated by an employee. This thesis provides a thorough examination of current Federal Aviation Regulations parts 107 and 108 sections concerning airport and air carrier employee access control, screening, and training. Based upon field research of five U.S. airports, the work furthermore analyzes related issues and problems associated with these regulations and generates recommendations that serve to enhance security for the traveling public, air carriers, and persons employed by or conducting business at public airports.
Naval Postgraduate School (U.S.)
Miller, Edward G.; Dover, Mark W.
1998-03
-
Naval Theater Ballistic Missile Defense (TBMD): Development of the Information Exchange Requirements
As the United States moves into the next century one of the biggest threats facing her national interests is the proliferation of Theater Ballistic Missile (TBM) Systems, with their potential for carrying Weapons of Mass Destruction(WMD). In order for the United States to 'project power', the Navy must play a large role in the protection of friendly assets from TBM attacks. Thus, the Navy is continuing to develop new systems and technologies as it attempts to migrate older weapons systems to fulfill this mission into its initial ballistic missile defense concept, Navy Area Defense (NAD). This thesis looks at the differences between the current 'as is' physical/information architectures for the Anti-Air Warfare Commander and the future 'to be' physical/information architectures for Theater Ballistic Missile Defense Commander. The conventional anti-air warfare and TBM defense information requirements, on an Aegis, are developed using IDEF O Diagrams. These information requirement differences must be used as drivers for future system acquisition and development. Also, the potential problem areas associated with adding TBMD as an additional responsibility for the Air Warfare Commander (AWC) onboard and AEGIS platform, are covered. The results of this thesis represent the initial plan (roadmap) for changes needed to support the evolving mission (Navy Area Defense) in the fleet.
Naval Postgraduate School (U.S.)
Brintzinghoffer, Daniel M.
1996-06
-
On the Types of Balancing Behavior
From the thesis abstract: "The structure of the international system underwent a fundamental change with the end of the Cold War. The shift from bipolarity to multipolarity has loosened many of the constraints on the balancing behavior of the states that make up that system. Using neorealist theory, this paper examines the balancing choices of states in a multipolar world. Neorealism is clear in suggesting that under bipolarity, the great powers' balancing choice was inclined toward internal balancing-the development of one's own economic or military power. In a multipolar system, however, great powers will have greater opportunities for external balancing--allying with other powers. Additionally, the presence of nuclear weapons provides small states with the ability to balance against great powers. This may lead them to abandon their traditional reliance on alliances with great powers as the primary means for providing for their security. The European states system during the period 1856-1878 is presented as a case study. Findings suggest that those states with the capability to balance internally will do so. Using that knowledge, it is predicted that, in the current era, internal balancing will also be apparent with the proliferation of weapons of mass destruction as a consequence."
Naval Postgraduate School (U.S.)
Bendel, Thomas R.
1994-12
-
Military Role in Internal Defense and Security: Some Problems
This Center for Civil-Military Relations paper analyzes some of the difficulties that emerge when the military is employed in domestic law enforcement, citing examples from history. Lessons drawn on the behavior of civilians during crises and options for those interested in establishing a sound and democratic public order policy are included.
Naval Postgraduate School (U.S.)
Moyano Rasmussen, Maria Jose
1999-10