20 research outputs found

    Compilation of thesis abstracts, September 2009

    Get PDF
    NPS Class of September 2009This quarter’s Compilation of Abstracts summarizes cutting-edge, security-related research conducted by NPS students and presented as theses, dissertations, and capstone reports. Each expands knowledge in its field.http://archive.org/details/compilationofsis109452751

    Integrated geophysical approach using electrical resistivity tomography and multichannel analysis of surface wave in assessing Wilson Spring development

    Get PDF
    This research investigated fractured zones leading to preferential flow paths of Wilson Spring. In this context, electrical resistivity tomography (ERT) data and multi-channel analyses of surface waves (MASW) data were acquired at studied site with the purpose of mapping a variable depth to top of bedrock and geological structures. Interpretation of the boreholes, MASW, and ERT data indicated that a depth to top of rock does vary significantly at the studied site due to many solution-widened fractures. Multiple near-vertical solution-widened fractures were mapped in the studied site based on the interpretation of the ERT data. The mapped solution-widened fractures appear to be trending north-south, almost perpendicular to the ERT traverses (west-east), and however it is possible they extend at oblique angle to the ERT traverses. The conducted geophysical survey is the first attempt to map geological structures and karst features that might be possible access of underground water. The underground water expose on land surface through fractures to develop Wilson Spring. Thus the seepage pathway near or beneath Wilson Creek is interpreted as through a solution-widened fractures. ERT method has proven to be effective in mapping variable depth to bedrock and solution-widened fractures. The MASW method and boreholes data were able to map variable depth to top of bedrock --Abstract, page iii

    Cyber Law and Espionage Law as Communicating Vessels

    Get PDF
    Professor Lubin\u27s contribution is Cyber Law and Espionage Law as Communicating Vessels, pp. 203-225. Existing legal literature would have us assume that espionage operations and “below-the-threshold” cyber operations are doctrinally distinct. Whereas one is subject to the scant, amorphous, and under-developed legal framework of espionage law, the other is subject to an emerging, ever-evolving body of legal rules, known cumulatively as cyber law. This dichotomy, however, is erroneous and misleading. In practice, espionage and cyber law function as communicating vessels, and so are better conceived as two elements of a complex system, Information Warfare (IW). This paper therefore first draws attention to the similarities between the practices – the fact that the actors, technologies, and targets are interchangeable, as are the knee-jerk legal reactions of the international community. In light of the convergence between peacetime Low-Intensity Cyber Operations (LICOs) and peacetime Espionage Operations (EOs) the two should be subjected to a single regulatory framework, one which recognizes the role intelligence plays in our public world order and which adopts a contextual and consequential method of inquiry. The paper proceeds in the following order: Part 2 provides a descriptive account of the unique symbiotic relationship between espionage and cyber law, and further explains the reasons for this dynamic. Part 3 places the discussion surrounding this relationship within the broader discourse on IW, making the claim that the convergence between EOs and LICOs, as described in Part 2, could further be explained by an even larger convergence across all the various elements of the informational environment. Parts 2 and 3 then serve as the backdrop for Part 4, which details the attempt of the drafters of the Tallinn Manual 2.0 to compartmentalize espionage law and cyber law, and the deficits of their approach. The paper concludes by proposing an alternative holistic understanding of espionage law, grounded in general principles of law, which is more practically transferable to the cyber realmhttps://www.repository.law.indiana.edu/facbooks/1220/thumbnail.jp

    Military Logistics Network Design Via Axiomatic Design Principles

    Get PDF
    Tez (Yüksek Lisans) -- İstanbul Teknik Üniversitesi, Fen Bilimleri Enstitüsü, 2011Thesis (M.Sc.) -- İstanbul Technical University, Institute of Science and Technology, 2011İnsanoğlu çıkarlarını devam ettirebilmek, korumak ya da yeni kazanımlar elde etmek adına, sürekli savaşmıştır. Teknoloji en çok savaş zamanlarında gelişmiştir. Teknoloji geliştikçe, değiştikçe, kendisiyle beraber savaşma yöntemlerini şekillerini de değiştirdi. Fakat bu değişimlerin nasıl kullanıldığı savaşı kazananı belirlemektedir. Özellikle sahip olunan kaynakları nasıl, nerede, ne miktarda ve ne zaman kullanılacağı başarıyı getirmektedir. Askeri lojistik kuvvetlerin ve silahların temini, sevkıyatı, koşullandırılması, bakımı ve geri çekilmesini ifade etmektedir. Bu çalışmada aksiyomatik tasarım ilkeleri ile askeri lojistik ağı tasarımı yapılmıştır. Aksiyomatik tasarım, müşteri ihtiyaçlarının fonksiyonel gereklilikler şeklinde ifade edilmesini, fonskiyonel gerekliliklerin gerçekleşmesi için gereken tasarım parametrelerini ve bunlar arasındaki matematiksel ifadeyi göstermektedir. Askeri lojistik insan ve ekipman lojistiğini içermesine rağmen bu çalışmada sadece ekipman lojistiği tasarımı yapılmıştır. Ayrıca savaş meydanındaki lojistik yerine, ulusal lojistik olarak da tanımlanan, savaş alanına kadar olan lojistik üzerinde durulmuştur. Tasarım dört alt baslıkta yapılmıştır: temin etme, depolama, dağıtım ve bakım-onarım. Satın almada önemli olan müşterinin gereksinim duyduğu ürünü doğru zamanda, doğru miktarda uygun fiyata ve istenilen özelliklerde satın almaktır. Maliyet kalemi değişken ürün maliyeti, taşıma maliyeti ve sabit maliyetten oluşmaktadır. Maliyeti düşürmek için, konsolidasyon, dış kaynak kullanımı ya da talepleri azaltma yollarına başvurulabilir. Fiyat analizleri yapılarak ürün değişken fiyatı optimize edilmeye çalışılmalıdır. Ayrıca stoktaki ürünlerin özellikleri tam bilinmelidir. Ürün özellikleri derken miktar ve kalite kastedilmektedir. Yeni alımlardan önce depodaki ürünler kullanılmalı, üründe modifikasyonlar yapılarak istenilen kalite standartlarına getirmeye çalışılmalıdır. İstenilen kalite standartları ise olası düşmanın ekipmanlarının kalitesine ve miktarına bağlıdır. Bu bilgilerin elde edilmesi için casusluk yapılmalı ve elde edilen bilgilerin doğru kullanımı için de çok hassas biçimde tahmin etme metodlari geliştirilmelidir. Askeri lojistikte en önemli sorunlardan bir tanesi depolama standartlarının sağlanamamasıdır. Depolamada maliyetleri düsürmek ve envanter kullanımını arttırmak amaçlanmaktadır. Maliyeti azaltmak için dış kaynak kullanımı ya da konsolidasyon yöntemleriyle sabit maliyetler ve yönetim maliyetleri düşürülmeli; envanter seviyesi ve envanter hareketleri azaltılmalıdır. Envanter seviyesi sadece depoda bulunan envanteri değil, taşıma halindeki envanteri, tadilattaki envanteri ve savaş alanındaki envanteri de içermektedir. Askeri sistemlerde savaş olasılıklarına karşı bazı ekipmanlar tehlike bölgelerine yakın yerlere konumlandırılırlar. Önemli olan ne miktarda hangi üründen nerede depolanacağı, bu ürünlerin ne sıklıkta bakıma tabi tutulacağı, saklama koşullarının neler olacağıdır. üçüncü basamağı ulaştırma tasarımı oluşturmaktadır. Askeri dağıtım; savaş alanı dağıtım ve savaş alanına kadar dağıtım olmak üzere iki kısımdan oluşmaktadır. Dağıtımda önemli olan zamanında ve düşük maliyette olmasıdır. Ölçek ekonomisi ve mesafe ekonomisi dikkate alınarak maliyet azaltılabilir. Rota optimizasyonu ve taşıma yönteminde esneklikler arttırılarak zamanında ulaştırma sağlanabilir. En son tasarım basamağı bakım onarım faaliyetleridir. Askerler tarafından sahada bakımı yapılamayan ürünler belirli bakım merkezlerine gönderilmektedirler. Bakımda önemli olan maliyetlerin düşürülmesi ve riskin azaltılmasıdır. Riskin azaltılması için ürünler kısa surede bakımdan geçirilmeli ve tamir edilmeli, tamir prosesleri oluşturulmalı ve kontroller sıkı yapılmalıdır. Maliyetleri azaltmak için önleyici ve tahmin edici bakim yöntemleri ile ekipmanlardaki bozulmalar azaltılabilir. Dış kaynak kullanımı ile yönetim maliyetleri ve personel maliyetleri sıfırlanabilir. Çalışmada örnek askeri sistem olarak Amerika Birleşik devletleri savunma bakanlığının yayımlamış olduğu kaynaklardan faydalanılmıştır.As long as there is a conflict of any kind, and weapons are being used by the parties, the military is the only organization that can secure interests. In war, the victory does not always go to those having the largest army or the most sophisticated equipment. It goes to who has more efficient strategic plan. Everything depends on strategic plan: when, where and with what forces a battle is to be delivered; in other words on logistics how and where to locate. In this study military logistics network is designed via axiomatic design principles. In axiomatic design, functional requirements, technical side of customer expectations, design parameters to achieve functional requirements and mathematical relation between two are studied. During logistics network design, it is divided to 4 steps: acquisition, storage, distribution and maintenance. In acquisition it is important to buy products in required amount and desired features to minimum cost at the right time. Cost includes variable product costs, shipping cost and fixed costs. In order to decrease cost, consolidation, outsourcing or any step that will decrease demand can be used. Price analysis should be made and inventory visibility should be maintained. In acquisition, besides cost, it is important to buy products in desired features- desired quantity and quality. Demand quantity depends on safety stock in peace time and probability of war. Quality not only depends on what is available in the market but also depends on enemy’s’ quality standards. Forecasting, spying and updating product information are necessities. In order to buy products at the right time order-management procedures should be developed and lead time should be decreased. Second design step is storage. For strategic mobility framework, some equipment should be prepositioned. Instead of long movement of needed equipment, by prepositioning it allows combat-ready forces. Managing inventory is one of the key features of logistics. Inventory management includes minimization of costs and maximization of usage of inventory. Profit maximization and risk minimization strategies should be developed to better management. In order to minimize costs, fixed costs including fixed assets, administration and selling costs should be decreased; inventory levels and movement of inventory in depots should be minimized by eliminating non-value added functions as much as possible, inventory accuracy and developing inventory allocation strategy. Inventory level minimization means minimization in depot inventory, minimization of non-stable inventory (under maintenance and in-transit), clarification of pre-positioned equipment quantity and minimization of in-theater inventory. Another concern in storage design is to keep assets in safe and good conditions. Third design step is distribution design. The military distribution system has two distinct segments: strategic-national and theater. The strategic-national segment consists of moving supplies from points outside a theater of military operations into the theater. The theater segment consists of distribution that occurs within a theater of military operations. In distribution it is aimed to increase efficiency and decrease risk of failure. Performance indicators for transportation are throughput maximization, time definite delivery, cost minimization and flexibility. Fundamental economic principles impacting transportation economy are economy of scale and economy of distance. Transportation costs are driven by distance, volume, density, stowability -how product case dimensions fit into transportation equipment-, handling, and liability. By flexibility, it is aimed to define a transportation mode having high maneuverability, large freight volume, can be used in all weather and climatic condition. In order to increase efficiency transportation methods should be optimized. Transportation optimization methods are consolidation, outsourcing, route optimization and selecting right transportation mode based on product features, quantity and critique. Another important point in distribution is to decide shipping priorities: which one, in which order, what quantity, in which conditions, what frequency. To solve the problem shipping procedures should be developed based on defined criteria. The last design step is maintenance design. Maintenance is an important aspect of military logistics and includes those activities needed to keep weapons, vehicles, and other materiel in an operable condition; to restore them to a serviceable condition when necessary; or to improve their usefulness through modifications. The Army calls maintenance as reset as the repair, recapitalization and replacement of equipment to equip units preparing for deployment and improve next-to-deploy unit’s equipment on hand levels. In order to have a customer satisfied maintenance function, total cost, risk and required time should be decreased. Cost for repairing are shipping, material and personnel costs. Outsourcing, consolidation and decrease breakdown-frequency can reduce costs. Speed and the accuracy of repair are other issues. In the study as an example to military system design, documents published by USA Department of Defense are used.Yüksek LisansM.Sc

    Disruptive Technologies with Applications in Airline & Marine and Defense Industries

    Get PDF
    Disruptive Technologies With Applications in Airline, Marine, Defense Industries is our fifth textbook in a series covering the world of Unmanned Vehicle Systems Applications & Operations On Air, Sea, and Land. The authors have expanded their purview beyond UAS / CUAS / UUV systems that we have written extensively about in our previous four textbooks. Our new title shows our concern for the emergence of Disruptive Technologies and how they apply to the Airline, Marine and Defense industries. Emerging technologies are technologies whose development, practical applications, or both are still largely unrealized, such that they are figuratively emerging into prominence from a background of nonexistence or obscurity. A Disruptive technology is one that displaces an established technology and shakes up the industry or a ground-breaking product that creates a completely new industry.That is what our book is about. The authors think we have found technology trends that will replace the status quo or disrupt the conventional technology paradigms.The authors have collaborated to write some explosive chapters in Book 5:Advances in Automation & Human Machine Interface; Social Media as a Battleground in Information Warfare (IW); Robust cyber-security alterative / replacement for the popular Blockchain Algorithm and a clean solution for Ransomware; Advanced sensor technologies that are used by UUVs for munitions characterization, assessment, and classification and counter hostile use of UUVs against U.S. capital assets in the South China Seas. Challenged the status quo and debunked the climate change fraud with verifiable facts; Explodes our minds with nightmare technologies that if they come to fruition may do more harm than good; Propulsion and Fuels: Disruptive Technologies for Submersible Craft Including UUVs; Challenge the ammunition industry by grassroots use of recycled metals; Changing landscape of UAS regulations and drone privacy; and finally, Detailing Bioterrorism Risks, Biodefense, Biological Threat Agents, and the need for advanced sensors to detect these attacks.https://newprairiepress.org/ebooks/1038/thumbnail.jp

    Defence White Paper (2016)

    Get PDF

    Unmanned Aircraft Systems in the Cyber Domain

    Get PDF
    Unmanned Aircraft Systems are an integral part of the US national critical infrastructure. The authors have endeavored to bring a breadth and quality of information to the reader that is unparalleled in the unclassified sphere. This textbook will fully immerse and engage the reader / student in the cyber-security considerations of this rapidly emerging technology that we know as unmanned aircraft systems (UAS). The first edition topics covered National Airspace (NAS) policy issues, information security (INFOSEC), UAS vulnerabilities in key systems (Sense and Avoid / SCADA), navigation and collision avoidance systems, stealth design, intelligence, surveillance and reconnaissance (ISR) platforms; weapons systems security; electronic warfare considerations; data-links, jamming, operational vulnerabilities and still-emerging political scenarios that affect US military / commercial decisions. This second edition discusses state-of-the-art technology issues facing US UAS designers. It focuses on counter unmanned aircraft systems (C-UAS) – especially research designed to mitigate and terminate threats by SWARMS. Topics include high-altitude platforms (HAPS) for wireless communications; C-UAS and large scale threats; acoustic countermeasures against SWARMS and building an Identify Friend or Foe (IFF) acoustic library; updates to the legal / regulatory landscape; UAS proliferation along the Chinese New Silk Road Sea / Land routes; and ethics in this new age of autonomous systems and artificial intelligence (AI).https://newprairiepress.org/ebooks/1027/thumbnail.jp

    Cyber Security of Critical Infrastructures

    Get PDF
    Critical infrastructures are vital assets for public safety, economic welfare, and the national security of countries. The vulnerabilities of critical infrastructures have increased with the widespread use of information technologies. As Critical National Infrastructures are becoming more vulnerable to cyber-attacks, their protection becomes a significant issue for organizations as well as nations. The risks to continued operations, from failing to upgrade aging infrastructure or not meeting mandated regulatory regimes, are considered highly significant, given the demonstrable impact of such circumstances. Due to the rapid increase of sophisticated cyber threats targeting critical infrastructures with significant destructive effects, the cybersecurity of critical infrastructures has become an agenda item for academics, practitioners, and policy makers. A holistic view which covers technical, policy, human, and behavioural aspects is essential to handle cyber security of critical infrastructures effectively. Moreover, the ability to attribute crimes to criminals is a vital element of avoiding impunity in cyberspace. In this book, both research and practical aspects of cyber security considerations in critical infrastructures are presented. Aligned with the interdisciplinary nature of cyber security, authors from academia, government, and industry have contributed 13 chapters. The issues that are discussed and analysed include cybersecurity training, maturity assessment frameworks, malware analysis techniques, ransomware attacks, security solutions for industrial control systems, and privacy preservation methods

    Counter Unmanned Aircraft Systems Technologies and Operations

    Get PDF
    As the quarter-century mark in the 21st Century nears, new aviation-related equipment has come to the forefront, both to help us and to haunt us. (Coutu, 2020) This is particularly the case with unmanned aerial vehicles (UAVs). These vehicles have grown in popularity and accessible to everyone. Of different shapes and sizes, they are widely available for purchase at relatively low prices. They have moved from the backyard recreation status to important tools for the military, intelligence agencies, and corporate organizations. New practical applications such as military equipment and weaponry are announced on a regular basis – globally. (Coutu, 2020) Every country seems to be announcing steps forward in this bludgeoning field. In our successful 2nd edition of Unmanned Aircraft Systems in the Cyber Domain: Protecting USA’s Advanced Air Assets (Nichols, et al., 2019), the authors addressed three factors influencing UAS phenomena. First, unmanned aircraft technology has seen an economic explosion in production, sales, testing, specialized designs, and friendly / hostile usages of deployed UAS / UAVs / Drones. There is a huge global growing market and entrepreneurs know it. Second, hostile use of UAS is on the forefront of DoD defense and offensive planners. They are especially concerned with SWARM behavior. Movies like “Angel has Fallen,” where drones in a SWARM use facial recognition technology to kill USSS agents protecting POTUS, have built the lore of UAS and brought the problem forefront to DHS. Third, UAS technology was exploding. UAS and Counter- UAS developments in navigation, weapons, surveillance, data transfer, fuel cells, stealth, weight distribution, tactics, GPS / GNSS elements, SCADA protections, privacy invasions, terrorist uses, specialized software, and security protocols has exploded. (Nichols, et al., 2019) Our team has followed / tracked joint ventures between military and corporate entities and specialized labs to build UAS countermeasures. As authors, we felt compelled to address at least the edge of some of the new C-UAS developments. It was clear that we would be lucky if we could cover a few of – the more interesting and priority technology updates – all in the UNCLASSIFIED and OPEN sphere. Counter Unmanned Aircraft Systems: Technologies and Operations is the companion textbook to our 2nd edition. The civilian market is interesting and entrepreneurial, but the military and intelligence markets are of concern because the US does NOT lead the pack in C-UAS technologies. China does. China continues to execute its UAS proliferation along the New Silk Road Sea / Land routes (NSRL). It has maintained a 7% growth in military spending each year to support its buildup. (Nichols, et al., 2019) [Chapter 21]. They continue to innovate and have recently improved a solution for UAS flight endurance issues with the development of advanced hydrogen fuel cell. (Nichols, et al., 2019) Reed and Trubetskoy presented a terrifying map of countries in the Middle East with armed drones and their manufacturing origin. Guess who? China. (A.B. Tabriski & Justin, 2018, December) Our C-UAS textbook has as its primary mission to educate and train resources who will enter the UAS / C-UAS field and trust it will act as a call to arms for military and DHS planners.https://newprairiepress.org/ebooks/1031/thumbnail.jp

    A technique for determining viable military logistics support alternatives

    Get PDF
    A look at today's US military will see them operating much beyond the scope of protecting and defending the United States. These operations now consist of, but are not limited to humanitarian aid, disaster relief, and conflict resolution. This broad spectrum of operational environments has necessitated a transformation of the individual military services into a hybrid force that can leverage the inherent and emerging capabilities from the strengths of those under the umbrella of the Department of Defense (DOD), this concept has been coined Joint Operations. Supporting Joint Operations requires a new approach to determining a viable military logistics support system. The logistics architecture for these operations has to accommodate scale, time, varied mission objectives, and imperfect information. Compounding the problem is the human in the loop (HITL) decision maker (DM) who is a necessary component for quickly assessing and planning logistics support activities. Past outcomes are not necessarily good indicators of future results, but they can provide a reasonable starting point for planning and prediction of specific needs for future requirements. Adequately forecasting the necessary logistical support structure and commodities needed for any resource intensive environment has progressed well beyond stable demand assumptions to one in which dynamic and nonlinear environments can be captured with some degree of fidelity and accuracy. While these advances are important, a holistic approach that allows exploration of the operational environment or design space does not exist to guide the military logistician in a methodical way to support military forecasting activities. To bridge this capability gap, a method called A Technique for Logistics Architecture Selection (ATLAS) has been developed. This thesis describes and applies the ATLAS method to a notional military scenario that involves the Navy concept of Seabasing and the Marine Corps concept of Distributed Operations applied to a platoon sized element. This work uses modeling and simulation to incorporate expert opinion and knowledge of military operations, dynamic reasoning methods, and certainty analysis to create a decisions support system (DSS) that can be used to provide the DM an enhanced view of the logistics environment and variables that impact specific measures of effectiveness.Ph.D.Committee Chair: Mavris, Dimitri; Committee Member: Fahringer, Philip; Committee Member: Nixon, Janel; Committee Member: Schrage, Daniel; Committee Member: Soban, Danielle; Committee Member: Vachtsevanos, Georg
    corecore