Browse by

Publications

Results:
Category: PRISM

Dec. 21, 2017

International Conflict and Cyberspace Superiority: Theory and Practice

Cyberspace Superiority is a compelling mix of advanced technological know-how and easy-to-understand writing. Bryant, a Lieutenant Colonel who is a career fighter pilot and earned his Ph.D. in military strategy, first examines whether cyberspace is a “global common”—i.e. a shared resource like the oceans, atmosphere, space, and Antarctica. The answer may well determine the future nature of cyber hostilities but, with the issue as yet unsettled, Bryant posits a far more pressing question—is superiority in cyberspace “a useful construct for thinking about and planning for nation-state conflict in cyberspace?”

Dec. 21, 2017

Cyberspace in Peace and War

Martin Libicki has been a prolific writer in the field of information warfare since the mid-1990s. In this newer work, published by the Naval Institute Press, he aggregates his thinking during the past several decades into a single book. Cyberspace in Peace and War draws from work performed at RAND, both solely and with colleagues, and from lecture interactions with his students at various universities, to present a streamlined and consolidated overview of activities within and enabled by information technologies.

Dec. 21, 2017

Prologue

Nearly a half century ago in October 1969, computer programmers at the University of California, Los Angeles used a primitive Department of Defense computer network called ARPANET to send the first messages to computers at Stanford Research Institute. This quiet event, considered by some to be the birth of the internet, ignited a technological movement within the computer and information industries that eventually transformed the world into a globally connected society utterly dependent on instant access to information, yet increasingly vulnerable to network intrusions by those who seek to steal sensitive data or disrupt cyber infrastructure.

Dec. 21, 2017

Cognitive-Emotional Conflict - Adversary Will and Social Resilience

Today’s information sharing tools let adversaries interfere more directly than ever with a targeted nation’s political processes and the minds of its citizens. Operating effectively in such “cognitive-emotional conflict” requires that information-based capabilities be employed and countered in agile, integrated ways across the military, government, and society. Coherent narratives tied to strategy and backed by actions are important. Technical cyberspace activities need to be well-coordinated with content-based approaches like military information operations, government-wide messaging, and intelligence gathering (including all forms of security). Even more important is to build a society’s resilience against persistent, disruptive, or disinformation campaigns that aim to undermine citizen confidence and core beliefs.

Sept. 15, 2017

The Curse of the Shiny Object

Human beings have a strong tendency to fight problems where they are visible. This intuitive and usually well-intended response to visible cues often produces inefficiencies and can result in spreading greater harm. This is the curse of the “shiny object”—when the attention-grabbing aspect of a problem distracts from identifying and countering the core drivers. The curse impacts many aspects of life. It can cause the U.S. Government (USG) and other organizations to overcommit resources to fight visible symptoms of security problems, while initiatives to counter the structural or systemic drivers of those problems are under-resourced if not entirely ignored. In the worst cases, initiatives to restore order have ended up spreading greater harm by targeting people or entire communities that are victims, not drivers, of the original security problem.

Sept. 14, 2017

The Evolution of MS 13 in El Salvador and Honduras

Mara Salvatrucha (MS 13) is rapidly evolving into a criminal-economic-military-political power that poses an existential threat to the states of El Salvador and Honduras.1 In Guatemala, the gang remains a tier two threat—dangerous, but with far less influence and fewer capabilities than in the other two nations of the Northern Triangle. With growing ties to Mexican drug cartels, while assuming an ever-greater role in the transportation of cocaine transportista networks across the Isthmus, the gang is acquiring financial resources, advanced weaponry, and the ability and sophistication to wield increasing political power. Factions that once relied exclusively on violence and threats for control are now trying to win the hearts and minds of the communities in which they operate; taking concrete steps to consolidate themselves in the cocaine trade; and becoming credible alternatives to the state. MS 13 in many ways now better resembles a criminal business enterprise rooted in brutal violence than a traditional gang.

Sept. 14, 2017

ISIL Radicalization, Recruitment, and Social Media Operations in Indonesia, Malaysia, and the Philippines

In a 2014 video posted to YouTube, the Islamic State in Iraq and Levant (ISIL) announced the end of Sykes-Picot.1 While Sykes-Picot may be unfamiliar among many in the West, ISIL’s appeal in 2014 centered on promoting its ability and vision, as a caliphate, to invalidate the boundary between Iraq and Syria. That border, a result of World War I neocolonial competition, stemmed from the 1916 Sykes-Picot Agreement that divided the region into mandates governed by and reflecting the interests of France and Britain. Where was the Wahhabbi doctrine in this YouTube message? Nowhere. Rather, the message suggested that administrative control of territory, an opportunity provided by the Syrian Civil War, distinguished ISIL from other terrorist organizations and that expansion of a caliphate did not rely on the legitimacy of radical Wahhabism ideology alone. While ideology remains central to this process, ISIL radicalization depends on exploitation of networks including familial ties, friendship, religious institutions and especially expansion of these connections. With the potential end of its attempted caliphate in Iraq and Syria, what other regional networks will ISIL target for exploitation?

May 16, 2017

A Letters to the Editor A Critique of 'Special Operations Doctrine: is it Needed

Regarding the PRISM Vol 6. No.3 article “Special Operations Doctrine: Is it Needed?” by Charles T. Cleveland, James B. Linder, and Ronald Dempsey, I am struck by the curious absence of reference to the long established and mature body of Joint Special Operations doctrine. The authors write as if there was no special operations doctrine until Army Doctrine Publication (ADP) 3–05 came along in 2012. They opine as to the various reasons for this, including accusing “...the general military doctrine community (of holding) a myopic view of U.S. Special Operations Capabilities.” In truth, their contention is not factually correct.

May 16, 2017

BR: The Great Surge: The Ascent of the Developing World

In 1990, with the Cold War having just concluded, I delighted in reviewing analyses written during the previous decade, which confidently assumed that the bipolar world order was a permanent description of the global landscape. 2016 may represent another threshold year. The Brexit vote and Donald Trump’s election require re-examination of critical assumptions that gained traction between the end of the Cold War and 2015 regarding the inevitability of economic and political progress in the developing world, including Africa.

May 16, 2017

Islam in from the Cold: A Muslim Brother’s Reflections on the Past, Present, and Future of the Islamic Movement in the Sudan

Ahmed found himself in Khartoum’s notorious Kober prison with Sheikh Hassan al-Turabi, éminence grise of political Islam, shortly after the 1989 coup d’état in the Republic of the Sudan.1 He and the coup leader al-Turabi, who infamously welcomed Osama bin Laden into the country in 1991, were close friends for years before he served as one of the leading members of the Sudanese Islamic Movement’s shura.2 Thus prison began the saga of the second Islamist rule in the Sudan with all of its twists and turns, and a watershed moment in Ahmed’s long journey as a Muslim Brother.3