U.S. military strategy is undergoing its most serious examination since the end of the Cold War. Led by Secretary of Defense Donald Rumsfeld, this process is designed to assess every dimension of the strategy, including its most basic assumptions and concepts. For the first time in over a decade, everything about U.S. military strategy is subject to question. One of the most important elements of U.S. military strategy for the past ten years has been the belief that a force able to fight two nearly simultaneous major theater wars (MTW) of the DESERT STORM type would be capable of dealing with the full gamut of security challenges that the United States is likely to face. Now nearly every expert on U.S. military strategy agrees that this force shaping paradigm needs a relook.
This volume presents the papers and summarizes the discussions of a workshop held in Goa, India, in January 2004, organized by the Indian National Institute of Advanced Science (NIAS) and the U.S. Committee on International Security and Arms Control (CISAC). During the workshop, Indian and U.S. experts examined the terrorist threat faced in both countries and elsewhere in the world, and explored opportunities for the U.S. and India to work together. Bringing together scientists and experts with common scientific and technical backgrounds from different cultures provided a unique opportunity to explore possible means of preventing or mitigating future terrorist attacks.
The relationship between energy and security has been receiving increasing attention over the last few years. Energy literally drives the global economy. Societies rely on it for everything from advanced medical equipment to heating, cooling, and irrigation. Whether it derives from advanced nuclear reactors in developed nations or simple woodstoves in the developing world, energy is recognized as vital to human welfare. It influences our economic, political, and social policies. Possessing or not possessing sufficient energy determines a state's political and economic power. Competition for energy has been, is, and will be a source of conflict. The choices nation-states make when it comes to energy will have a profound bearing on a wide range of security concerns, from nuclear proliferation to climate change.
As ballistic missile technology proliferates, and as ballistic missile defenses are deployed by both the Russian Federation and the United States, it is increasingly important for these two countries to seek ways to reap the benefits of systems that can protect their own national security interests against limited missile attacks from third countries without undermining the strategic balance that the two governments maintain to ensure stability. Regional Ballistic Missile Defense in the Context of Strategic Stability examines both the technical implications of planned missile defense deployments for Russian and U.S. strategic deterrents and the benefits and disadvantages of a range of options for cooperation on missile defense.
Prevention is the key to effective policies in Africa, whether the issue is equitable resource exploitation, ethnic conflict, infectious diseases, or famine. African Regional Economic Communities (RECs) have moved beyond their initial purpose of a loose confederation of trading partners to become increasingly effective supranational bodies promoting financial, political, and security stabilization in each of their regions. Looking at each of the RECs, their power centers, and areas of weakness, policymakers can gain a more comprehensive understanding of the sometimes symbiotic and often destructive dynamics within and among African states to seek more effective strategic and regional, not national, approaches. This monograph suggests USAFRICOM is uniquely positioned to help design a path to spearhead a pan-African strategy highly likely to have the net long-term effect of attaining considerable competitive advantage for the U.S. economically, militarily, and politically...
The following three papers comprise one of the panels form a conference on U.S.-Russia relations that SSI co-sponsored with the Carnegie Council at Pocantico, NY, from June 1-3, 2011, Carnegie Council's Program on "U.S. Global Engagement: A Two-Year Retrospective." The papers offer three contrasting looks at one of the major issues in today's arms control agenda, namely the future of the Conventional forces in Europe Treaty (CFE). The three papers are by leading experts in the field from the United States, United Kingdom, and Russia and provide a revealing glimpse into the very different assessments that are being made by those three governments and the difficult issues involved in attempting to regenerate the process that led to the original treaty in 1990. They also implicitly contribute to a better understanding of the intractabilities facing the major players in any effort to advance not only arms control but also European stability.
Since 2001, Afghanistan has allowed New Delhi an opportunity to underscore its role as a regional power. India has growing stakes in peace and stability in Afghanistan, and the 2011 India-Afghan strategic partnership agreement underlines India's commitment to ensure that a positive momentum in Delhi-Kabul ties is maintained. The changing trajectory of Indian policy towards Afghanistan since 2001 is examined, and it is argued that New Delhi has been responding to a strategic environment shaped by other actors in the region. U.S.-led North Atlantic Treaty Organization forces are preparing to leave Afghanistan in 2014, and India stands at a crossroads as it remains keen to preserve its interests in Afghanistan. The ever-evolving Indian policy in Afghanistan is examined in three phases before implications of this change for the region and the United States are drawn. There has been a broader maturing of the U.S.-India defense ties, and Afghanistan is likely to be a beneficiary of this trend.
The subject of U.S. grand strategy has been getting increasing attention from the policy and academic communities. But too often the debate suffers from being too reductionist, limiting America's choices to worldwide hegemony or narrow isolation. There is a wide spectrum of choices before Washington that lie "somewhere in the middle." Too often not enough thought is given to how such alternative strategies should be designed and implemented. The future cannot be known, and earlier predictions of American decline have proven to be premature. However, there is a shift in wealth and power to the extent that America may not be able to hold on to its position as an unrivalled unipolar superpower. Therefore, it is worth thinking about how the United States could shape and adjust to the changing landscape around it. What is more, there are a number of interlocking factors that mean such a shift would make sense: transnational problems needing collaborative efforts...
Increased reliance on the Internet and other networked systems raise the risks of cyber attacks that could harm our nation's cyber infrastructure. The cyber infrastructure encompasses a number of sectors including the nation's mass transit and other transportation systems, banking and financial systems, factories, energy systems and the electric power grid, and telecommunications, which increasingly rely on a complex array of computer networks, including the public Internet. However, many of these systems and networks were not built and designed with security in mind. Therefore, our cyber infrastructure contains many holes, risks, and vulnerabilities that may enable an attacker to cause damage or disrupt cyber infrastructure operations. Threats to cyber infrastructure safety and security come from hackers, terrorists, criminal groups, and sophisticated organized crime groups; even nation-states and foreign intelligence services conduct cyber warfare.
Cyber Attacks at State Level, Legislation of Cyber Conflicts, Opposite Views by Different Countries on Cyber Security Control & Report on the Latest Case of Russian Hacking of Government Sectors
Cyber Attacks at State Level, Legislation of Cyber Conflicts, Opposite Views by Different Countries on Cyber Security Control & Report on the Latest Case of Russian Hacking of Government Sectors
Conflict in cyberspace is not a new phenomenon, but the legality of hostile cyber activity at a state level remains imperfectly defined. While the United States and its allies are in general agreement on the legal status of conflict in cyberspace, China, Russia, and a number of like-minded nations have an entirely different concept of the applicability of international law to cyberspace. This e-book presents the opposed views of USA and Russia on cyber security. Ultimately, you can find out from the official report how cyber-attack can jeopardize national security in the latest attack performed by the Russian hackers in order to interfere with the 2016 U.S. elections.
Hacking Techniques Used to Interfere the U.S. Election and to Exploit Government & Private Sectors, Recommended Mitigation Strategies and International Cyber-Conflict Law
Hacking Techniques Used to Interfere the U.S. Election and to Exploit Government & Private Sectors, Recommended Mitigation Strategies and International Cyber-Conflict Law
Cyber attacks are a real threat to our country. This report presents the opposed views of USA and Russia on cyber security and gives insight into the activities of the Russian civilian and military intelligence Services (RIS) conducted during the 2016 U.S. presidential election campaign. The Grizzly Steppe Report provides details regarding the tools and hacking techniques used by the Russian hackers in order to interfere the 2016 U.S. elections. This activity by RIS is just part of an ongoing campaign of cyber-enabled operations directed at the U.S. government and its citizens. These cyber operations have included spearphishing campaigns targeting government organizations, critical infrastructure entities, think tanks, universities, political organizations, and corporations leading to the theft of information. In foreign countries, RIS actors conducted damaging and/or disruptive cyber-attacks, including attacks on critical infrastructure networks. In some cases, RIS actors masqueraded as third parties, hiding behind false online personas designed to cause the victim to misattribute the source of the attack. This report provides technical indicators related to many of these operations, recommended mitigations, suggested actions to take in response to the indicators provided, and information on how to report such incidents to the U.S. Government. The edition also provides crucial information on the legality of hostile cyber activity at state level. While the United States and its allies are in general agreement on the legal status of conflict in cyberspace, China, Russia, and a number of like-minded nations have an entirely different concept of the applicability of international law to cyberspace.
Climate change is one of the most important global environmental problems facing the world today. Policy decisions are already being made to limit or adapt to climate change and its impacts, but there is a need for greater integration between science and decision making. This book proposes six priorities for restructuring the United States' climate change research program to develop a more robust knowledge base and support informed responses: Reorganize the Program Around Integrated Scientific-Societal Issues Establish a U.S. Climate Observing System Support a New Generation of Coupled Earth System Models Strengthen Research on Adaptation, Mitigation, and Vulnerability Initiate a National Assessment of the Risks and Costs of Climate Change Impacts and Options to Respond Coordinate Federal Efforts to Provide Climate Information, Tools, and Forecasts Routinely to Decision Makers
North Korea is a country of paradoxes and contradictions. Although it remains an economic basket case that cannot feed and clothe its own people, it nevertheless possesses one of the world's largest armed forces. Whether measured in terms of the total number of personnel in uniform, numbers of special operations soldiers, the size of its submarine fleet, quantity of ballistic missiles in its arsenal, or its substantial weapons of mass destruction programs, Pyongyang is a major military power. Content: North Korea's Military Threat Conventional Forces Unconventional Forces Overall Conclusions The North Korean Ballistic Missile Program DPRK National Strategy and Motivations Historical Background of DPRK Missile Development Institutional Setting Conclusion U.S. Government Policy Toward North Korea Countering the North Korean Threat (New Steps in U.S. Policy) Pressuring North Korea (Evaluating Options) President Donald Trump on Current Crisis on the Korean Peninsula A Message to the Congress of the United States on the Continuation of the National Emergency with Respect to North Korea Continuation of the National Emergency with Respect to North Korea Statement from the President on North Korea's Second ICBM Launch Statement by President Donald J. Trump on North Korea About the Authors
Tells the story of the growing Chinese Navy - The People's Liberation Army Navy (PLAN) - and its expanding capabilities, evolving roles and military implications for the USA. Divided into four thematic sections, this special collection of essays surveys and analyzes the most important aspects of China's navel modernization.
Cyber is now recognized as an operational domain, but the theory that should explain it strategically is, for the most part, missing. It is one thing to know how to digitize; it is quite another to understand what digitization means strategically. The author maintains that, although the technical and tactical literature on cyber is abundant, strategic theoretical treatment is poor. He offers four conclusions: (1) cyber power will prove useful as an enabler of joint military operationsl; (2) cyber offense is likely to achieve some success, and the harm we suffer is most unlikely to be close to lethally damaging; (3) cyber power is only information and only one way in which we collect, store, and transmit information; and (4) it is clear enough today that the sky is not falling because of cyber peril. As a constructed environment, cyberspace is very much what we choose to make it.
This monograph examines the strategic importance of Egypt for the United States by exploring Egypt's role in the Arab-Israeli peace process, its geographical role (providing air and naval access) for U.S. military assets heading to the Persian Gulf, and joint training programs. With so much at stake in the Middle East, the idea of "losing" Egypt as a strategic ally would be a significant setback for the United States. The Egyptian revolution of early 2011 was welcomed by U.S. officials because the protestors wanted democratic government which conformed to U.S. ideals, and the institution that would shepherd the transition, the Egyptian military, had close ties with the United States. To bolster the U.S.-Egyptian relationship and help keep Egypt on the democratic path, the monograph recommends that U.S. military aid should not be cut, economic aid should be increased, and U.S. administration officials should not oppose congressional conditions tying aid to democratic norms because...
Today, America faces security challenges that are exceedingly dynamic and complex, in part because of the ever changing mix and number of actors involved and the pace with which the strategic and operational environments change. To meet these new challenges more effectively, the Obama administration advocated strengthening civilian instruments of national power and enhancing America's whole-of-government (WOG) capabilities. Although the need for comprehensive integration and coordination of civilian and military, governmental and nongovernmental, national and international capabilities to improve efficiency and effectiveness of post-conflict stabilization and peacebuilding efforts is widely recognized, Washington has been criticized for its attempts at creating WOG responses to international crises and conflicts for overcommitment of resources, lack of sufficient funding and personnel, competition between agencies, ambiguous mission objectives, ..
With the last departure of U.S. combat forces from Iraq in 2011 and a drawdown in Afghanistan already underway, the current era of American counterinsurgency may be coming to a close. At the same time, irregular threats to U.S. national interests remain, and the future may hold yet more encounters with insurgents for the U.S. military. Accordingly, the latest Defense strategic guidance has called on the Department of Defense (DoD) to "retain and continue to reine the lessons learned, expertise, and specialized capabilities" from the wars in Iraq and Afghanistan. This monograph is a contribution to this ongoing effort to institutionalize the military's understanding of counterinsurgency, building on its hard-won recent experience. Michael Fitzsimmons examines two case studies drawn from some of the darkest months of conlict in Iraq...
The utility of U.S. forward presence in Europe, placing the recent decisions-and in particular the arguments against forward presence-in the context of a decades' long tradition on the part of many political leaders, scholars, and others, mistakenly tie forward basing of U.S. forces to more equal defense burden sharing across the entire North Atlantic alliance. In assessing whether and how forward presence still matters in terms of protecting U.S. interests and achieving U.S. objectives, the author bridges the gap between academics and practitioners by grounding his analysis in political science theory while illuminating how forward basing yields direct, tangible benefits in terms of military operational interoperability. This monograph forms a critical datapoint in the ongoing dialogue regarding the future of American landpower, particular in this age of austerity.
Since the end of World War II, there have been four times as many civil wars as interstate wars. For a small subset of nations civil war is a chronic condition: about half of the civil war nations have had at least two and as many as six conflicts. This book presents an analytical framework that has been used to identify a set of factors that make civil war more or less likely to recur in a nation where a civil war has recently terminated. The outcome of the previous civil war--whether it ended in a government victory, a rebel victory or a negotiated settlement--as well as the duration and deadliness of the conflict affect the durability of the peace after civil war. The introduction of peacekeeping forces, investment in economic development and reconstruction, and the establishment of democratic political institutions tailored to the configuration of ethnic and religious cleavages in the society also affect the durability of peace after civil war.
Chapter Introduction: Strategic history -- chapter 1 Themes and contexts of strategic history -- chapter 2 Carl von Clausewitz and the theory of war -- chapter 3 From limited war to national war: The French Revolution and the Napoleonic way of war -- chapter 4 The nineteenth century, I: A strategic view -- chapter 5 The nineteenth century, II: Technology, warfare and international order -- chapter 6 World War I, I: Controversies -- chapter 7 World War I, II: Modern warfare -- chapter 8 The twenty-year armistice, 1919-39 -- chapter 9 The mechanization of war -- chapter 10 World War II in Europe, I: The structure and course of total war -- chapter 11 World War II in Europe, II: Understanding the war -- chapter 12 World War II in Asia-Pacific, I: Japan and the politics of empire -- chapter 13 World War II in Asia-Pacific, II: Strategy and warfare -- chapter 14 The Cold War, I: Politics and ideology -- chapter 15 The Cold War, II: The nuclear revolution -- chapter 16 War and peace after the Cold War: An interwar decade -- chapter 17 9/11 and the age of terror -- chapter 18 Irregular warfare: Guerrillas, insurgents and terrorists -- chapter 19 War, peace and international order -- chapter 20 Conclusion: Must future strategic history resemble the past?.
What is strategic stability and why is it important? This edited collection offers the most current authoritative survey of this topic, which is central to U.S. strategy in the field of nuclear weapons and great power relations. A variety of authors and leading experts in the field of strategic issues and regional studies offer both theoretical and practical insights into the basic concepts associated with strategic stability, what implications these have for the United States, as well as key regions such as the Middle East, and perspectives on strategic stability in Russia and China. Readers will develop a deeper and more developed understanding of this concept from this engaging and informative work.
Because of rising popular expectations regarding currently nonexistent rights in Latin America, it appears to be a revolutionary, insurgent, criminal, and populist dream. Thus, the Americas appear to be particularly susceptible to state (and their proxies) and nonstate actors that promise the security, stability, and prosperity national governments have generally failed to provide. Accordingly, Venezuela and President Hugo Chavez have become exporters of asymmetric, unconventional, and undeclared war. If left ignored and unchecked, these wars compel radical, unwanted, and epochal political-economic-social system change. Even though prudent governments must prepare for high-risk, low probability conventional interstate war, there is a high probability that the U.S. President and Congress and leaders of other powers around the world will continue to require civil-military participation in unconventional conflicts.
The essays gathered here represent a panel at SSI's annual Russia conference in 2011. They focus on the analysis of Russian foreign policy both on its material side or actual conduct as well as on the cognitive bases of Russian thinking about international affairs and Russian national security. They span much of the gamut of that foreign policy and also show its strong linkages to the Russian historical tradition and to the imperatives of Russian domestic development.
Disrupting, dismantling, and ultimately defeating al-Qaeda based and inspired terrorism is a declared policy of the U.S. Government. Three key strategic objectives have been identified for accomplishing this: attacking al-Qaeda's terror network, undermining radicalization and recruitment, and hardening homeland defense. The present monograph proposes a distinct "jihad realist" approach for undermining radicalization and recruitment to al Qaeda. First, a brief discussion of six means for ending terrorist organizations is provided. Second, the premises of a jihad realist approach are described. Third, a jihad realist shari'a case against al Qaeda's terrorism is presented. In conclusion, key assertions are summarized, and several specific policy recommendations offered for national security personnel charged with formulating and executing counterterrorist messaging strategy.
What is "grand strategy," and why is it seemingly so important and so difficult? This monograph explores the concept of grand strategy as it has developed over the past several decades. It explains why the concept is so ubiquitous in discussions of present-day foreign policy, examines why American officials often find the formulation of a successful grand strategy to be such an exacting task, and explores the ways in which having a grand strategy can be both useful and problematic. It illustrates these points via an analysis of two key periods in modern American grand strategy--the Truman years at the outset of the Cold War, and the Nixon-Kissinger years in the late 1960s and 1970s--and provides several suggestions for how U.S. officials might approach the challenges of grand strategy in the 21st century.
In this collection the leading authorities address the complexity of present day NATO, its inherent contradictions, and its current direction. The authors reflect on the significance of these issues for the alliance's future prospects, for Russia, and for European security generally. The Future of NATO looks at the conceptual and theoretical approaches that underlie the question of enlarging NATO's membership and the consequences of enlargement on international relations. It examines the policies of some of NATO's leading member states - including Canada, which has recently begun a two-year term on the security council - and deals with the issue of enlargement from the point of view of the East European candidates, focusing on Russia and its opposition to the current process. Contributors include Andràs Balogh (Loràn Eötvös University), Martin Bourgeois, Charles-Philippe David (UQAM), André P. Donneur (UQAM), David G. Haglund (Queen's), Philippe Hébert (Montréal), Stanislav J. Kirschbaum (Glendon College), Richard L. Kugler (RAND, National Defence University), David Law (Queen's), Paul Létourneau (Montréal), Jacques Lévesque (UQAM), Gale Mattox (U.S. Naval Academy), Marie-Claude Plantin (Lumière Lyon 2), Sergei Plekhanov (York), Jane M.O. Sharp (Kings College, London).
Today, America faces security challenges that are exceedingly dynamic and complex, in part because of the ever changing mix and number of actors involved and the pace with which the strategic and operational environments change. To meet these new challenges more effectively, the Obama administration advocated strengthening civilian instruments of national power and enhancing America's whole-of-government (WOG) capabilities. Although the need for comprehensive integration and coordination of civilian and military, governmental and nongovernmental, national and international capabilities to improve efficiency and effectiveness of post-conflict stabilization and peacebuilding efforts is widely recognized, Washington has been criticized for its attempts at creating WOG responses to international crises and conflicts for overcommitment of resources, lack of sufficient funding and personnel, competition between agencies, ambiguous mission objectives, ..
This will help us customize your experience to showcase the most relevant content to your age group
Please select from below
Login
Not registered?
Sign up
Already registered?
Success – Your message will goes here
We'd love to hear from you!
Thank you for visiting our website. Would you like to provide feedback on how we could improve your experience?
This site does not use any third party cookies with one exception — it uses cookies from Google to deliver its services and to analyze traffic.Learn More.