Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 2 of 2

Full-Text Articles in Defense and Security Studies

An Analysis Of Second-Tier Arms Producing Country Offset Policies: Technology Transfer And Defense Industrial Base Establishment, Brian S. Confer Mar 2008

An Analysis Of Second-Tier Arms Producing Country Offset Policies: Technology Transfer And Defense Industrial Base Establishment, Brian S. Confer

Theses and Dissertations

The purpose of this thesis is to determine if offsets are an effective means of second-tier countries acquiring technology and if offsets enhance their ability to establish and maintain an industrial base capable of producing high-technology weapons for use indigenously and for export. Included in the research was an analysis of factors that lead to successful or unsuccessful technology transfer through the utilization of offsets. Additionally, the research analyzed the factors that lead to the successful or unsuccessful establishment and maintenance of an indigenous defense industrial base through the utilization of offsets. The author concludes that the utilization of offsets …


Operationalizing Offensive Social Engineering For The Air Force, Bryan E. Skarda Mar 2008

Operationalizing Offensive Social Engineering For The Air Force, Bryan E. Skarda

Theses and Dissertations

Social engineering is the art and science of persuading individuals to bypass in place security mechanisms causing the unintended release of information. It is a low tech solution to a high tech problem and is as much an art as a science. As is true of many such solutions, social engineering is both ill-defined yet extremely effective. Its low cost, high payoff nature makes it an extremely attractive alternative to adversaries that do not have access to all the resources of a nation state. However, with full backing, the weapon can become that much more effective. Social engineering is something …