U.S. Navy bloodhounds: establishing a new maritime security combatant

Download
Author
Donohue, Ryan P.
Date
2016-06Advisor
Dahl, Erik
Nieto-Gomez, Rodrigo
Metadata
Show full item recordAbstract
To protect the United States' 4.5 million miles of Economic Exclusion Zone, maritime forces are directed to conduct homeland defense missions and support civil authorities as far from U.S. shorelines as possible to protect the country from transnational threats. In order to protect the United States from transnational organized crime regimes and their continued maritime narcotics trafficking, the U.S. Navy requires a surface combatant to fulfill these interdiction missions. Therefore, with the Navy's decommissioning of its patrol frigates, should the Navy plan development of a new vessel, rebuild the Oliver Hazard Perry class frigates, or refocus the LCS program to replace the current frigate's capabilities in combating narcotic trafficking? In turn, the Oliver Hazard Perry class was a sound platform that performed well, the LCS is a troubled program facing severe financial, stability, and lethality issues, while the design and construction of a new frigate is entirely too costly and time consuming. With these considerations in mind, this thesis proposes the reconstruction of the Oliver Hazard Perry class frigate for maritime security operations, as a result of its illustrious multirole career, survivability, and relatively cheaper price point than the increasingly expensive and unproven LCS ship class.
Rights
This publication is a work of the U.S. Government as defined in Title 17, United States Code, Section 101. Copyright protection is not available for this work in the United States.Collections
Related items
Showing items related by title, author, creator and subject.
-
Can we defend the defense supply chain? lessons learned from industry leaders in supply chain management
Menz, Ronald H. (Monterey, California: Naval Postgraduate School, 2018-03);To protect the defense supply chain from counterfeit electronic parts, this thesis suggests that the Department of Defense (DOD) should adopt supply chain management methodologies used by Apple and the United Kingdom’s ... -
Cyber System Assurance through Improved Network Anomaly Modeling and Detection
Bollmann, Chad A. (Monterey, California: Naval Postgraduate SchoolMonterey, California. Naval Postgraduate School, 2019-12); NPS-19-N039-AThe objectives of this work were to investigate the source of the dual natures of network traffic (i.e., Gaussian and alpha-stable) in order prove the merit of further development, improvement, and application of non-parametric ... -
Cyber System Assurance through Improved Network Anomaly Modeling and Detection
Bollmann, Chad A. (Monterey, California: Naval Postgraduate SchoolMonterey, California. Naval Postgraduate School, 2019-12); NPS-19-N039-AThe objectives of this work were to investigate the source of the dual natures of network traffic (i.e., Gaussian and alpha-stable) in order prove the merit of further development, improvement, and application of non-parametric ...