June 1, 2013

DTP-101: Organizational Analysis of the TIDES Project and the STAR-TIDES Network using the 7-S Framework

DTP 101 gives an in-depth organizational analysis of STAR-TIDES, a special project of CTNSP. STAR-TIDES is an open-network, global organization, a form that is increasingly common in the digital age. This report identifies the core “7-S” factors in STAR-TIDES (Strategy, Structure, Systems, Staffing, Skills, Style, and Shared values), with recommendations for improved performance. Results provide a template for how to conduct a 7-S organizational analysis.

April 1, 2013

Convergence: Illicit Networks and National Security in the Age of Globalization

Acceleration. Magnification. Diffusion. Entropy. Empowerment. The global environment and the international system are evolving at hypervelocity. A consensus is emerging among policymakers, scholars, and practitioners that recent sweeping developments in information technology, communication, transportation, demographics, and conflict are making global governance more challenging. Some argue these developments have transformed our international system, making it more vulnerable than ever to the predations of terrorists and criminals. Others argue that despite this significant evolution, organized crime, transnational terrorism, and nonstate networks have been endemic if unpleasant features of human society throughout history, that they represent nothing new, and that our traditional means of countering them—primarily conventional law enforcement—are adequate. Even among those who perceive substantial differences in the contemporary manifestations of these persistent maladies, they are viewed as major nuisances not adding up to a significant national or international security threat, much less an existential threat.

April 1, 2013

China’s Forbearance Has Limits: Chinese Threat and Retaliation Signaling and Its Implications for a Sino-American Military Confrontation

Since its founding in 1949, the People’s Republic of China (PRC) has employed military force in defense of China’s security and territorial integrity. In many such instances, Beijing implemented a calculus of threat and retaliation signals intended first to deter an adversary from taking actions contrary to Chinese interests by threatening the use of military force and, if deterrence failed, to explain and justify Beijing’s resort to military force.

March 1, 2013

Russia Still Matters: Strategic Challenges and Opportunities for the Obama Administration

Russia’s institution of a ban on American adoptions of Russian orphans, an appalling response by the Duma to U.S. sanctions against officials involved in the Sergei Magnitsky case, was a clear indicator that bilateral relations will assume a lower priority in the next 4 years for both capitals. Russian President Vladimir Putin signed the measure despite open misgivings by some of his own key aides and against the opposition of most of Russia’s civil society. The Russian Internet response was scathing, producing an instant winner for best sick joke of 2012: “An educated American family has decided to adopt a developmentally disabled Duma deputy.”

Feb. 1, 2013

The New NATO Policy Guidelines on Counterterrorism: Analysis, Assessments, and Actions

DOWNLOAD PDFExecutive Summary The history of the North Atlantic Treaty Organization (NATO) will say

Feb. 1, 2013

DTP-100: Some Recent Sensor – Related Army Critical Technology Events

Some Recent Sensor-Related Army Critical Technology Events, James A. Ratches, Richard Chait, and John W. Lyons examined current Critical Technology Events (CTEs) that are new or ongoing in US Army Science and Technology (S&T) community.

Jan. 1, 2013

DTP-099: Suggestions for Evaluating the Quality of the Army’s Science and Technology Program: The Portfolio and Its Execution

This paper presents a methodology discussing the goal of establishing the strongest possible technology program appropriately aligned to the needs of its customers and the expectations of its stakeholders. The first chapter presents the essential elements of the Army S&T portfolio followed by discussions of the Army S&T portfolio and the evaluation of it.

Dec. 1, 2012

The International Atomic Energy Agency's Decision to Find Iran in Non-Compliance, 2002-2006

On August 14, 2002, at a press conference in Washington, DC, the National Council of Resistance of Iran (NCRI), an exiled Iranian opposition group, drew worldwide attention when it publicly accused Iran of clandestinely developing nuclear weapons. Alireza Jafarzadeh, then-U.S. media spokesperson for the NCRI, described two “top secret” nuclear facilities being constructed in Iran at Natanz and Arak under the guise of front companies involved in the procurement of nuclear material and equipment. Noting that media attention had focused on Iran’s publicly declared civilian facilities, Jafarzadeh claimed that “in reality, there are many secret nuclear programs at work in Iran without knowledge of the International Atomic Energy Agency (IAEA),” the international body responsible for verifying and assuring compliance with safeguards obligations under the 1968 Nuclear Non-Proliferation Treaty (NPT).

Nov. 1, 2012

Strategic Reflections: Operation Iraqi Freedom, July 2004 - February 2007

Operations Enduring Freedom and Iraqi Freedom were the first major wars of the 21st century. They will not be the last. They have significantly impacted how the U.S. Government and military think about prosecuting wars. They will have a generational impact on the U.S. military, as its future leaders, particularly those in the ground forces, will for decades be men and women who served in Iraq and Afghanistan. It is imperative that leaders at all levels, both military and civilian, share their experiences to ensure that we, as a military and as a country, gain appropriate insights for the future.

Oct. 1, 2012

Japan-China Relations 2005–2010: Managing Between a Rock and a Hard Place An Interpretative Essay

Between China and Japan, the past is ever-present. Notwithstanding shared cultural and historic ties, throughout the past century and going back to the Sino-Japanese war at the end of the 19th century, a bitter legacy of history—the Boxer Rebellion; the Mukden Incident and Japan’s occupation of South Manchuria (1931); the Marco Polo Bridge Incident, Japan’s subsequent invasion of China, and the Nanjing Massacre (1937); and the Sino-Japanese War (1937– 1945)—has left an indelible mark on this relationship.

Oct. 1, 2012

Public-Private Cooperation in the Department of Defense: A Framework for Analysis and Recommendations for Action

In 2010, a National Defense University (NDU) research project called TIDES (Transformative Innovation for Development and Emergency Support) was invited to partner with a company to produce a tradeshow about humanitarian assistance and disaster relief missions and related capabilities. Despite senior-level Department of Defense (DOD) guidance to pursue public-private partnerships, DOD attorneys told TIDES managers to reject the agreement. Differing legal interpretations of the word partner generated concern that the proposed partnership could create an impermissible perception of government endorsement of a private company. Even though it would have advanced the government’s mission and promoted efficiency, a variety of obstacles scuttled the proposed cooperation.

Oct. 1, 2012

Anticipatory Governance Practical Upgrades: Equipping the Executive Branch to Cope with Increasing Speed and Complexity of Major Challenges

The report suggests: (a) four concrete initiatives and eighteen specific proposals for organizing foresight as an input into the policy process; (b) eight initiatives and thirty-eight specific proposals for improving the capacity of existing systems to mesh their activities for coherent effect (i.e., networked governance); and (c)five specific, sequential initiatives to detect and respond to error and unintended consequences in mid-stream, before calamities occur (i.e., feedback).

Sept. 1, 2012

Managing Sino-U.S. Air and Naval Interactions: Cold War Lessons and New Avenues of Approach

The United States and China have a complex, multifaceted, and ambiguous relationship where substantial areas of cooperation coexist with ongoing strategic tensions and suspicions. One manifestation involves disputes and incidents when U.S. and Chinese military forces interact within China’s Exclusive Economic Zone (EEZ). Three high-profile incidents over the last decade have involved aggressive maneuvers by Chinese military and/or paramilitary forces operating in close proximity to deter U.S. surveillance and military survey platforms from conducting their missions. Why do these incidents continue to occur despite mechanisms designed to prevent such dangerous encounters? Could new or different procedures or policies help avoid future incidents?

Sept. 1, 2012

The Presidential Nuclear Initiatives of 1991-1992

On the morning of September 28, 1991, then-Colonel Frank Klotz witnessed an historic moment at Grand Forks Air Force Base, North Dakota. As he and other senior officers from the base bomber and missile units watched, the crews for the B-1 strategic bombers that had been on alert that day climbed into their cockpits, started the planes, and taxied one after another away from the alert aircraft parking area. That scene was repeated at all 11 Strategic Air Command (SAC) bases in the United States. By the end of the day, there were no U.S. bombers on alert for the first time in over 30 years.

Sept. 1, 2012

Toward the Printed World: Additive Manufacturing and Implications for National Security

Additive manufacturing (AM)—commonly referred to as “three-dimensional” or “3D” printing—is a prospective game changer with implications and opportunities that affect not just the Department of Defense (DOD) but the economy as a whole. The technology allows the “art to part” fabrication of complex objects from a computer model without part-specific tooling or human intervention.1 AM has already impacted a variety of industries and has the potential to present legal and economic issues with its strong economic and health-care benefits. Because of its remarkable ability to produce a wide variety of objects, AM also can have significant national security implications. The purpose of this paper is to provide a general introduction to these issues for nontechnical readers through a survey of the recent history and the current state of technology. Included in this paper is a brief review identifying key individuals and organizations shaping developments as well as projected trends.

Sept. 1, 2012

DTP-098: Taking the Battle Upstream: Towards a Benchmarking Role for NATO

The main intuition underlying this paper is that the current (geo) political, technological, and especially financial realities may require NATO to take the battle for capabilities upstream.

Aug. 1, 2012

Preparing the Pipeline: The U.S. Cyber Workforce for the Future

In 2008, the Comprehensive National Cybersecurity Initiative listed “expanded cyber education” as one of its key recommendations. In 2009, the Partnership for Public Service produced a report stating that the current pipeline of cybersecurity workers into the government was inadequate. In the same year, Secretary of Defense Robert Gates stated that the military was “desperately short of people who have the capabilities [to operate in cyberspace].” And in 2011, the Inspector General of the Federal Bureau of Investigation reported that 35 percent of the special agents investigating national security cyber-intrusion cases lacked necessary training and technical skills. Nonetheless, the U.S. Government and private sector still seek to increase their online operations and dependency in spite of these shortcomings. An expert at the Atlantic Council of the United States sums up this problem: “cyber workforce management efforts resemble a Ferris wheel: the wheel turns on and on . . . we move, but around and around, never forward.”

Aug. 1, 2012

DTP-097: Non-Traditional Security Threats and Asia-Pacific Regional Cooperation

The purpose of this paper is for the better understanding of the security challenges and opportunities for expanded cooperation through global regional efforts to manage our planet and govern its inhabitants more responsibly.

Aug. 1, 2012

Trust, Engagement, and Technology Transfer: Underpinnings for U.S.-Brazil Defense Cooperation

On the eve of the January 1, 2011, inauguration of Brazilian President Dilma Rousseff, the State Department noted that the United States “is committed to deepening our relationship on a wide range of bilateral, regional and global issues with Brazil’s government and people.” President Rousseff herself declared shortly thereafter, “We will preserve and deepen the relationship with the United States.” During President Barack Obama’s March 2011 visit to Brazil, both leaders cited “the progress achieved on defense issues in 2010” and stated their commitment to “follow up on the established dialogue in this area, primarily on new opportunities for cooperation.” While these rhetorical commitments are important, will they lead to greater cooperation on defense issues and improve U.S.-Brazil ties?

July 16, 2012

Security Considerations for a Warming Arctic

In the past, extreme conditions deterred maritime exploration throughout much of the Arctic. This left huge frozen reserves of oil, natural gas, and mineral wealth virtually untouched by the world’s five major Arctic States: Canada, Denmark, Norway, Russia, and the United States. Now, global climate changes are altering human accessibility to these untapped resources, creating new possibilities for trade, development, and conflict. In this 2012 Working Paper, Dr. Jim Keagle and Mr. Christopher Mann survey the issues most relevant to Department of Defense policy-makers.

July 1, 2012

DTP-095: Report of an Army Workshop on Convergence Forecasting: Mechanochemical Transduction

This is an assessment of the Mechanochemical Transduction Convergence Workshop sponsored by the Army Research Office which took place in January 2012. The workshop was a test case for identifying convergences of disciplines and their potential impact on science and the Army. The chief objective of the workshop was the identify the most promising research opportunities and interdisciplinary convergences that could lead the field of mechanochemical transduction in new direction with unexpected outcomes that would be relevant to future Army needs.

July 1, 2012

DTP-096: Chemical and Biological Defense Test and Evaluation (T&E) Future Challenges

The objective of this study was to identify emerging technical, methodological, and infrastructure challenges for future Chemical and Biological Defense Test and Evaluation investment, and to serve as a prequel to the development of a full strategic T&E Roadmap.

June 1, 2012

Deception, Disinformation, and Strategic Communications: How One Interagency Group Made a Major Difference

This study explains how one part-time interagency committee established in the 1980s to counter Soviet disinformation effectively accomplished its mission. Interagency committees are commonly criticized as ineffective, but the Active Measures Working Group is a notable exception. The group successfully established and executed U.S. policy on responding to Soviet disinformation. It exposed some Soviet covert operations and raised the political cost of others by sensitizing foreign and domestic audiences to how they were being duped. The group’s work encouraged allies and made the Soviet Union pay a price for disinformation that reverberated all the way to the top of the Soviet political apparatus. It became the U.S. Government’s body of expertise on disinformation and was highly regarded in both Congress and the executive branch.

June 1, 2012

Proliferation Security Initiative: Origins and Evolution

On December 9, 2002, the United States and Spanish navies cooperated to interdict a North Korean vessel, the So San, in the Arabian Sea.1 The operation initially appeared to be an unqualified success, a textbook example of interdiction to prevent proliferation of weapons of mass destruction (WMD), related materials, or delivery systems. According to press reports, the United States began tracking the vessel when it first left North Korea, believing that it was carrying a cargo related to Scud ballistic missiles. The So San flew no flag, making it a stateless vessel under international law, subject to interception and boarding by warships on the high seas.2 The United States asked the Spanish navy to stop and search the So San when the ship reached the patrol area of Combined Task Force (CTF) 150, then under Spanish command. The mission of CTF 150 was “to promote maritime security in order to counter terrorist acts and related illegal activities” in the Gulf of Aden, Gulf of Oman, Red Sea, and Indian Ocean.3 Thus, the United States proposed—and Spain agreed—to use a tool developed to combat global terrorism in a counterproliferation mission.

June 1, 2012

Offshore Control: A Proposed Strategy for an Unlikely Conflict

As America ends its military commitment to Iraq and continues its drawdown in Afghanistan, a lively discussion has emerged on what future challenges the Nation faces. High on every list is the requirement to deal with a rising China. In his remarks to the Australian Parliament on November 17, 2011, President Barack Obama stated, “As we end today’s wars, I have directed my national security team to make our presence and mission in the Asia Pacific a top priority.” As part of this rebalancing to Asia, the administration has stated that it seeks “to identify and expand areas of common interest, to work with China to build mutual trust, and to encourage China’s active efforts in global problem-solving.” Clearly, the United States seeks prudent and coordinated political, economic, and military actions to further integrate China into the international system.

May 1, 2012

DTP-093: Modeling the Combined Terrorist-Narcotics Trafficker Threat to National Security

This modeling study demonstrated that model-generated data closely resembled actual reports about tons of disrupted narcotics substances in three consecutive years. the policy cycle model showed that increased rates of policy cycle activity increased the amount of narcotics disruption, while increased levels of corruption reduced those levels.

May 1, 2012

DTP-094: Combating Transnational Organized Crime: Strategies and Metrics for the Threat

This paper provides an overview of the strategic and policy initiatives that the United States and international community have taken, including an assessment of the TOC threat. The overview is followed by the metrics developed to evaluate the relative magnitude and direction of the threat of a 5-year period.

April 1, 2012

Cross-currents in French Defense and U.S. Interests

France is the only European ally—except for the United Kingdom (UK)—that regards its military capabilities, operational performance, and defense industry as vital levers to exert global influence. While the French believe strongly in their need to preserve “strategic independence,” they see new challenges in the evolving international security environment that will oblige them to accept greater cooperation with others, even in areas once considered too sensitive to discuss. Although some French strategists remain uncomfortable with the notion of closer defense ties with the United States, others ask whether there might be a greater danger ahead: specifically, if Europe’s strength dissipates as America “rebalances” toward the Asia-Pacific region, where does France turn to find capable and willing partners to protect its security interests?

April 1, 2012

Grand Strategy and International Law

Grand strategy is, or should be, the “calculated relationship of means to large ends.” Interrelated strategic and legal dimensions provide a leitmotif to the modern history of relations among powerful states. States employ an array of means to achieve their large ends—military power, as well as diplomatic, informational, economic/financial, and legal tools and influence. They differ in effectiveness and precision. In the web of interactions that shape contemporary international relations, the legal dimension as a framework and guide to choices is more often overlooked than particular legal instruments that might be invoked in the belief, or more often the hope, that they will serve policy and strategic objectives.

March 1, 2012

Russia and the Iranian Nuclear Program: Replay or Breakthrough?

Despite protests across Russia sparked by last December’s fraud-filled Duma (parliament) elections, Vladimir Putin is preparing to return to the presidency this May. Will Putin replay his 2004–2008 approach to Iran, during which Russia negotiated the S–300 air defense system contract with Tehran? Or will he continue Russia’s breakthrough in finding common ground with the United States on Iran seen under President Dmitriy Medvedev, who tore up the S–300 contract?

March 1, 2012

DTP-092: Enhancing Army S&T Vol. II: The Future

Chapter I of this volume is an introduction, and Chapter II offers an updated view of the work discussed in Vol. I with an emphasis on the relative roles played by the Army laboratories that manufactured the systems. The close collaboration between the two groups was judged by the authors to be the key to the successful outcomes. This chapter presents updated findings and recommendations of the previous studies in Vol I.

Feb. 1, 2012

DTP-088: Reflections on Over Fifty Years in Research and Development; Some Lessons Learned

This paper presents some thoughts about research in science and technology gleaned from Dr. Lyons’ more than 50 years working in scientific and engineering research – first in chemical industry, then at two different government laboratories, and later some years in S&T policy. It elaborates on a paper by Richard Chait in which he interviews three former S&T executives in the DoD on how to manage a research laboratory. Its objective is to provide some insights on what it is like to work in a scientific research establishment.

Feb. 1, 2012

DTP-089: Domestic Event Support Operations (DESO)

This paper draws heavily on Australian experience in the last dozen years, during which time the country hosted a Summer Olympics and Paralympics, a Commonworth Games, an Asia-Pacific Economic Cooperation Leaders Meeting, and a number of other events, all of which required DESO to be mounted.

Feb. 1, 2012

DTP-090: Constructive Convergence: Imagery and Humanitarian Assistance

The goal of this paper is to illustrate to the technical community and interested humanitarian users the breadth of tools and techniques now available for imagery collection, analysis and distribution, and to provide brief recommendations with suggestions for next steps.

Feb. 1, 2012

DTP-091: Globalization of S&T: Key Challenges Facing DOD

This paper employs the results of a full economic analysis for the period 2005-2050 to estimate the S&T knowledge production for each of the world’s 17 largest economies. The present work establishes an empirical relationship between an economy’s gross domestic product per capita and its ability to generate S&T knowledge.

Feb. 1, 2012

Post-Asad Syria: Opportunity or Quagmire?

The government of President Bashar al-Asad in Syria faces strong pressure from its neighbors and the Western powers. In the background is the fall in 2011 of longstanding governments in Tunisia and Egypt to popular protests and, of course, the overthrow of Libyan leader Muammar Qaddafi in a civil war backed by North Atlantic Treaty Organization (NATO) military action. It is not clear if Asad will fall or if he will hold on to power. It is fair to say that because his hold on power is sufficiently in doubt, it is well worth examining what would be the strategic consequences if he fell and what would be the strategic implications if he is able to muddle through Syria’s current difficulties. Moreover, given the many sudden and unpredicted Middle East developments in 2011, such an examination should note which low-probability developments might have major impacts on the region and on U.S. interests.

Feb. 1, 2012

Space and the Joint Fight

The world first saw the power of space to transform warfare in the 1991 Gulf War. In the years since, the U.S. military has come to depend heavily on space throughout its peacetime and combat operations. Satellites acquired by the Department of Defense (DOD) principally provide protected communications; data for position and timing, terrestrial and space weather, missile launch warning and tracking, and space situational awareness; and experiments and other research and development activities. Satellites for reconnaissance and surveillance are the domain of the National Reconnaissance Office (NRO), under the Director of National Intelligence (DNI).

Jan. 1, 2012

Defining "Weapons of Mass Destruction" (Revised)

This revised Occasional Paper explores the issue of defining weapons of mass destruction with a focus on summarizing how the term has been used in disarmament negotiations, U.S. national security policy, Soviet and Russian military doctrine, and American political discourse. The paper identifies alternative definitions for WMD, addresses some of the key policy issues associated with different definitions, and proposes a definition appropriate for the Department of Defense.

Jan. 1, 2012

The Iron Triangle Manifested: U.S. Air Force Tanker Lease 2001–2005 Case Study

The proposed lease of the KC–767 tanker aircraft was one of the most infamous procurement scandals of the post–Cold War era. Interactions within the military-industrial-congressional complex led to legislation permitting the Air Force to lease tankers from Boeing using an operating lease rather than standard procurement. Following the outcry from Congress, industry, the media, and numerous watchdog groups, Congress and the Department of Defense (DOD) launched a wave of investigations and hearings. During the lease debate, participants reached a number of compromises documented in congressional legislation. However, this was not sufficient to continue the lease process. After nearly 4 years, Congress cancelled the tanker lease and directed the Air Force to pursue a traditional procurement approach.

Jan. 1, 2012

Raising Our Sights: Russian- American Strategic Restraint in an Age of Vulnerability

The United States and Russia have sought to reduce the danger of nuclear war by limiting offensive strategic capabilities through negotiated agreements, relying on mutual deterrence based on reciprocal threats and the corresponding fear of retaliation. Although nuclear arsenals have been pared, this is fundamentally the same way the United States and Soviet Union sought to reduce the danger of nuclear war during the Cold War, when both were impelled to do so because they were adversaries and able to do so despite being adversaries. It is ironic—not to say unimaginative—that although the two are no longer adversaries, they stick to a path chosen when they were. This current approach is inadequate given new strategic vulnerabilities brought on by technological change. Both the opportunity and the need now exist for a different, more ambitious approach to avoiding strategic conflict—one designed for new possibilities as well as new vulnerabilities. The United States and Russia can and should raise their sights from linear numerical progress to qualitative transformation of their strategic relationship.

Jan. 1, 2012

Sino-American Strategic Restraint in an Age of Vulnerability

For all their power, both the United States and China are increasingly vulnerable. Each faces a range of strategic dangers, from nuclear weapons to disruption of critical computer networks and space links.1 Because their relationship is at once interdependent and potentially adversarial, the United States and China are especially vulnerable to each other: interdependence exposes each to the other, while the potential for conflict impels each to improve strategic capabilities against which defenses can be futile. Strategic vulnerability cannot be eliminated, only mitigated.

Dec. 1, 2011

Buy, Build, or Steal: China’s Quest for Advanced Military Aviation Technologies

Although China continues to lag approximately two decades behind the world’s most sophisticated air forces in terms of its ability to develop and produce fighter aircraft and other complex aerospace systems, it has moved over time from absolute reliance on other countries for military aviation technology to a position where a more diverse array of strategies can be pursued. Steps taken in the late 1990s to reform China’s military aviation sector demonstrated an understanding of the problems inherent in high-technology acquisition, and an effort to move forward. However, a decade later it remains unclear how effective these reforms have been. Where are the People’s Liberation Army Air Force (PLAAF) and China’s military aviation industry headed? What obstacles must be overcome for China to join the exclusive ranks of those nations possessing sophisticated air forces and aviation industries capable of producing world-class aircraft?

Dec. 1, 2011

U.S. Ratification of the Chemical Weapons Convention

On October 1, 1990, two months after Iraq’s surprise invasion and annexation of Kuwait had put the United States and other members of the international community on a collision course with the Saddam Hussein regime, President George H.W. Bush spoke to the United Nations (UN) General Assembly in New York. He described Iraq’s brutal aggression against its neighbor as “a throwback to another era, a dark relic from a dark time.” Noting that Saddam Hussein had waged a “genocidal poison gas war” against Iraq’s restive Kurdish minority during the 1980s, President Bush hinted that if it ultimately proved necessary to liberate Kuwait by force, the United States and its allies could face Iraqi attacks with chemical weapons—highly toxic chemicals designed to incapacitate or kill.

Dec. 1, 2011

Capability Development in Support of Comprehensive Approaches: Transforming International Civil-Military Interactions

This book is the product of the Second International Transformation (ITX2) Conference, held in Rome, Italy, at the NATO Defense College (NDC) in June 2011.

Dec. 1, 2011

Deterrence and Escalation in Cross-domain Operations: Where Do Space and Cyberspace Fit?

Warfare has become even more complicated since Richard Smoke wrote this description of escalation in 1977. The National Security Space Strategy describes space as “congested, contested, and competitive,” yet satellites underpin U.S. military and economic power. Activity in cyberspace has permeated every facet of human activity, including U.S. military operations, yet the prospects for effective cyber defenses are bleak. Many other actors depend on continued access to these domains, but not nearly as much as the United States.

Dec. 1, 2011

The Emergence of China in the Middle East

During the 9th century, Arab traders regularly plied lucrative maritime routes that connected the Persian Gulf to southern China by way of the Indian Ocean. This commercial activity, which mostly involved jade, silk, and other luxury goods, went on for centuries and became part of what is now known as the Silk Road. In some ways, the world is now witnessing a restoration of that ancient trading relationship between two civilizations—except that oil and consumer goods have replaced jade and silk.

Nov. 1, 2011

A Review of the 2001 Bonn Conference and Application to the Road Ahead in Afghanistan

Ten years ago in Bonn, Germany, the United Nations Envoy to Afghanistan, Ambassador Lakhdar Brahimi, and U.S. Envoy to the Afghan Opposition, Ambassador James Dobbins, led a diverse group of international diplomats and warriors to consensus and charted the political course for Afghanistan well into the decade. The process that led to the Bonn Agreement (Bonn 2001, or Bonn I) reflects the best of U.S. and United Nations statesmanship and was the result of the effective application of military and diplomatic power.

Nov. 1, 2011

DTP-087: The Use of High Performance Computing (HPC) to Strengthen the Development of Army Systems

This paper seeks to discuss the growth and trends in High Performance Computing (HPC) and how the Army has utilized HPC in research. It also addresses the possibilities for design and production of new systems and how industry has advanced the use of HPC. One intent of this paper is to re-evaluate the advanced manufacturing area in light of the many recent developments in computational capability and availability. It concludes with comments and recommendations for strengthening Army acquisition using advanced computer technology.

Oct. 1, 2011

Policing and COIN Operations: Lessons Learned, Strategies and Future Directions

A monograph that grasped the need to expand the focus of the role of policing in counterinsurgency, and considering the framework for the desired outcome to influence policymakers on the future directions of the role of policing.

Oct. 1, 2011

DTP-084: Task Force Stryker Network-Centric Operations in Afghanistan

This case study examines the real-world application of the network-centric warfare concept during combat operations in Afghanistan.