Feb. 1, 2012

Post-Asad Syria: Opportunity or Quagmire?

The government of President Bashar al-Asad in Syria faces strong pressure from its neighbors and the Western powers. In the background is the fall in 2011 of longstanding governments in Tunisia and Egypt to popular protests and, of course, the overthrow of Libyan leader Muammar Qaddafi in a civil war backed by North Atlantic Treaty Organization (NATO) military action. It is not clear if Asad will fall or if he will hold on to power. It is fair to say that because his hold on power is sufficiently in doubt, it is well worth examining what would be the strategic consequences if he fell and what would be the strategic implications if he is able to muddle through Syria’s current difficulties. Moreover, given the many sudden and unpredicted Middle East developments in 2011, such an examination should note which low-probability developments might have major impacts on the region and on U.S. interests.

Feb. 1, 2012

Space and the Joint Fight

The world first saw the power of space to transform warfare in the 1991 Gulf War. In the years since, the U.S. military has come to depend heavily on space throughout its peacetime and combat operations. Satellites acquired by the Department of Defense (DOD) principally provide protected communications; data for position and timing, terrestrial and space weather, missile launch warning and tracking, and space situational awareness; and experiments and other research and development activities. Satellites for reconnaissance and surveillance are the domain of the National Reconnaissance Office (NRO), under the Director of National Intelligence (DNI).

Jan. 1, 2012

Defining "Weapons of Mass Destruction" (Revised)

This revised Occasional Paper explores the issue of defining weapons of mass destruction with a focus on summarizing how the term has been used in disarmament negotiations, U.S. national security policy, Soviet and Russian military doctrine, and American political discourse. The paper identifies alternative definitions for WMD, addresses some of the key policy issues associated with different definitions, and proposes a definition appropriate for the Department of Defense.

Jan. 1, 2012

The Iron Triangle Manifested: U.S. Air Force Tanker Lease 2001–2005 Case Study

The proposed lease of the KC–767 tanker aircraft was one of the most infamous procurement scandals of the post–Cold War era. Interactions within the military-industrial-congressional complex led to legislation permitting the Air Force to lease tankers from Boeing using an operating lease rather than standard procurement. Following the outcry from Congress, industry, the media, and numerous watchdog groups, Congress and the Department of Defense (DOD) launched a wave of investigations and hearings. During the lease debate, participants reached a number of compromises documented in congressional legislation. However, this was not sufficient to continue the lease process. After nearly 4 years, Congress cancelled the tanker lease and directed the Air Force to pursue a traditional procurement approach.

Jan. 1, 2012

Raising Our Sights: Russian- American Strategic Restraint in an Age of Vulnerability

The United States and Russia have sought to reduce the danger of nuclear war by limiting offensive strategic capabilities through negotiated agreements, relying on mutual deterrence based on reciprocal threats and the corresponding fear of retaliation. Although nuclear arsenals have been pared, this is fundamentally the same way the United States and Soviet Union sought to reduce the danger of nuclear war during the Cold War, when both were impelled to do so because they were adversaries and able to do so despite being adversaries. It is ironic—not to say unimaginative—that although the two are no longer adversaries, they stick to a path chosen when they were. This current approach is inadequate given new strategic vulnerabilities brought on by technological change. Both the opportunity and the need now exist for a different, more ambitious approach to avoiding strategic conflict—one designed for new possibilities as well as new vulnerabilities. The United States and Russia can and should raise their sights from linear numerical progress to qualitative transformation of their strategic relationship.

Jan. 1, 2012

Sino-American Strategic Restraint in an Age of Vulnerability

For all their power, both the United States and China are increasingly vulnerable. Each faces a range of strategic dangers, from nuclear weapons to disruption of critical computer networks and space links.1 Because their relationship is at once interdependent and potentially adversarial, the United States and China are especially vulnerable to each other: interdependence exposes each to the other, while the potential for conflict impels each to improve strategic capabilities against which defenses can be futile. Strategic vulnerability cannot be eliminated, only mitigated.

Dec. 1, 2011

Buy, Build, or Steal: China’s Quest for Advanced Military Aviation Technologies

Although China continues to lag approximately two decades behind the world’s most sophisticated air forces in terms of its ability to develop and produce fighter aircraft and other complex aerospace systems, it has moved over time from absolute reliance on other countries for military aviation technology to a position where a more diverse array of strategies can be pursued. Steps taken in the late 1990s to reform China’s military aviation sector demonstrated an understanding of the problems inherent in high-technology acquisition, and an effort to move forward. However, a decade later it remains unclear how effective these reforms have been. Where are the People’s Liberation Army Air Force (PLAAF) and China’s military aviation industry headed? What obstacles must be overcome for China to join the exclusive ranks of those nations possessing sophisticated air forces and aviation industries capable of producing world-class aircraft?

Dec. 1, 2011

U.S. Ratification of the Chemical Weapons Convention

On October 1, 1990, two months after Iraq’s surprise invasion and annexation of Kuwait had put the United States and other members of the international community on a collision course with the Saddam Hussein regime, President George H.W. Bush spoke to the United Nations (UN) General Assembly in New York. He described Iraq’s brutal aggression against its neighbor as “a throwback to another era, a dark relic from a dark time.” Noting that Saddam Hussein had waged a “genocidal poison gas war” against Iraq’s restive Kurdish minority during the 1980s, President Bush hinted that if it ultimately proved necessary to liberate Kuwait by force, the United States and its allies could face Iraqi attacks with chemical weapons—highly toxic chemicals designed to incapacitate or kill.

Dec. 1, 2011

Capability Development in Support of Comprehensive Approaches: Transforming International Civil-Military Interactions

This book is the product of the Second International Transformation (ITX2) Conference, held in Rome, Italy, at the NATO Defense College (NDC) in June 2011.

Dec. 1, 2011

Deterrence and Escalation in Cross-domain Operations: Where Do Space and Cyberspace Fit?

Warfare has become even more complicated since Richard Smoke wrote this description of escalation in 1977. The National Security Space Strategy describes space as “congested, contested, and competitive,” yet satellites underpin U.S. military and economic power. Activity in cyberspace has permeated every facet of human activity, including U.S. military operations, yet the prospects for effective cyber defenses are bleak. Many other actors depend on continued access to these domains, but not nearly as much as the United States.

Dec. 1, 2011

The Emergence of China in the Middle East

During the 9th century, Arab traders regularly plied lucrative maritime routes that connected the Persian Gulf to southern China by way of the Indian Ocean. This commercial activity, which mostly involved jade, silk, and other luxury goods, went on for centuries and became part of what is now known as the Silk Road. In some ways, the world is now witnessing a restoration of that ancient trading relationship between two civilizations—except that oil and consumer goods have replaced jade and silk.

Nov. 1, 2011

A Review of the 2001 Bonn Conference and Application to the Road Ahead in Afghanistan

Ten years ago in Bonn, Germany, the United Nations Envoy to Afghanistan, Ambassador Lakhdar Brahimi, and U.S. Envoy to the Afghan Opposition, Ambassador James Dobbins, led a diverse group of international diplomats and warriors to consensus and charted the political course for Afghanistan well into the decade. The process that led to the Bonn Agreement (Bonn 2001, or Bonn I) reflects the best of U.S. and United Nations statesmanship and was the result of the effective application of military and diplomatic power.

Nov. 1, 2011

DTP-087: The Use of High Performance Computing (HPC) to Strengthen the Development of Army Systems

This paper seeks to discuss the growth and trends in High Performance Computing (HPC) and how the Army has utilized HPC in research. It also addresses the possibilities for design and production of new systems and how industry has advanced the use of HPC. One intent of this paper is to re-evaluate the advanced manufacturing area in light of the many recent developments in computational capability and availability. It concludes with comments and recommendations for strengthening Army acquisition using advanced computer technology.

Oct. 1, 2011

Policing and COIN Operations: Lessons Learned, Strategies and Future Directions

A monograph that grasped the need to expand the focus of the role of policing in counterinsurgency, and considering the framework for the desired outcome to influence policymakers on the future directions of the role of policing.

Oct. 1, 2011

DTP-084: Task Force Stryker Network-Centric Operations in Afghanistan

This case study examines the real-world application of the network-centric warfare concept during combat operations in Afghanistan.

Oct. 1, 2011

DTP-085: Elevating the Role of Socioeconomic Strategy in Afghanistan Transition

This paper reviews the System Analysis and Studies Panel of the NATO Research and Technology Organization which created a Specialist Team in June 2010 in response to an International Security Assistance Force request to help develop, define, and implement a strategy for data collection and management. The goal of the initiative was to provide direct assistance to NATO, ISAF, and the Government of the Islamic Republic of Afghanistan.

Oct. 1, 2011

DTP-086: Challenges to Leadership: Responding to Biological Threats

This paper seeks to identify certain gaps and overlaps in existing structure and mechanisms and to advance potential solutions that can be implemented. It examines two issues of concern: Federal Coordination Structure and Federal/State Coordination and recommends that a more comprehensive set of planning and response exercises be developed in order to better understand and develop a doctrine of incident leadership suitable for a biological crisis.

Sept. 1, 2011

The Ongoing Insurgency in Southern Thailand: Trends in Violence, Counterinsurgency Operations, and the Impact of National Politics

Since January 2004, a Malay-Muslim–based insurgency has engulfed the three southernmost provinces in Thailand. More than 4,500 people have been killed and over 9,000 wounded, making it the most lethal conflict in Southeast Asia. Now in its 8th year, the insurgency has settled into a low-level stalemate. Violence is down significantly from its mid-2007 peak, but it has been steadily climbing since 2008. On average, 32 people are being killed and 58 wounded every month. Most casualties are from drive-by shootings, but there are also about 12 improvised explosive device (IED) attacks a month.

Sept. 1, 2011

Korean Futures: Challenges to U.S. Diplomacy of North Korean Regime Collapse

There is no shortage of plausible scenarios describing North Korean regime collapse or how the United States and North Korea’s neighbors might respond to such a challenge. Yet comparatively little attention has been paid to the strategic considerations that may shape the responses of the United States, the Republic of Korea (ROK), Japan, China, and Russia to a North Korean crisis. These states are most likely to take action of some kind in the event the North Korean regime collapses. For the ROK (South Korea), North Korean regime collapse presents the opportunity for Korean reunification. For the other states, the outcome in North Korea will affect their influence on the peninsula and their relative weight in Asia. This study identifies the interests and objectives of these principal state actors with respect to the Korean Peninsula. Applying their interests and objectives to a generic scenario of North Korean regime collapse, the study considers possible policies that the principal state actors might use to cope with such a crisis.

Aug. 1, 2011

New Directions in U.S. National Security Strategy, Defense Plans, and Diplomacy: A Review of Official Strategic Documents

Where are U.S. national security strategy, defense plans, and diplomacy headed in the coming years? An answer to this important question comes from seven official studies that have been issued during 2010.

July 1, 2011

DTP-083: Strengthening Government Laboratory Science and Technology Programs: Some Thoughts for the Department of Homeland Security

This paper summarizes the second phase of a research and analysis project that stemmed from the initial work which provided DHS Science and Technology leadership with examples of practical approaches to risk-informed decisionmaking and metrics for program and project selection. The second phase was undertaken to provide additional relevant information to DHS as it seeks to strengthen its laboratory programs.

July 1, 2011

Countering the Lord’s Resistance Army in Central Africa

The Lord’s Resistance Army (LRA) is one of Africa’s most brutal militia forces. It has plagued Central Africa, particularly northern Uganda, for over two decades. The group’s tactics provide textbook examples of war crimes and crimes against humanity. When attacking civilians, the LRA instills fear by selecting random individuals for brutal executions. Children are abducted to serve as porters, sex slaves, and new militia. In order to indoctrinate child soldiers, young abductees are routinely forced to kill their own family members and other children, or be murdered themselves. Anyone caught trying to escape from the LRA is summarily executed. By contrast with other African rebel groups, which occasionally adopt such brutal tactics, the LRA has conducted such atrocities on a systematic and prolonged basis.

July 1, 2011

Chinese Military Transparency: Evaluating the 2010 Defense White Paper

The People’s Republic of China (PRC) State Council Information Office released the seventh edition of its biennial defense white paper, “China’s National Defense in 2010,” on March 31, 2011. This document aims to communicate the latest information on China’s military development, strategy, capabilities, and intentions. China began publishing defense white papers in 1998, partly as a means of increasing transparency in response to regional concerns about the growing capabilities and actions of the People’s Liberation Army (PLA). Despite the systematic release of these documents, many of China’s neighbors and other regional powers continue to express concerns about China’s lack of military transparency. The Chinese maintain that they are becoming more open over time and highlight the importance of transparency about strategic intentions rather than capabilities.

July 1, 2011

The Evolving Threat of al Qaeda in the Islamic Maghreb

The United States faces an important strategic question in northwest Africa: what level of activity by al Qaeda in the Islamic Maghreb (AQIM) would constitute a sufficient threat to U.S. national security interests to warrant a more aggressive political, intelligence, military, and law enforcement response? AQIM already poses the greatest immediate threat of transnational terrorism in the region, and its operational range and sophistication continue to expand. Since 2007, the group has professed its loyalty to Osama bin Laden and al Qaeda’s senior leadership and claimed responsibility for dozens of attacks in the subregion. These attacks have included the use of suicide bombers, improvised explosive devices, kidnapping operations, and assassinations.

June 1, 2011

Joint Interagency Task Force–South: The Best Known, Least Understood Interagency Success

Joint Interagency Task Force–South (JIATF–South) is well known within the U.S. Government as the “gold standard” for interagency cooperation and intelligence fusion, despite its preference for keeping a low profile and giving other agencies the credit for its successes. It is often cited as a model for whole-of-government problem-solving in the literature on interagency collaboration, and other national security organizations have tried to copy its approach and successes. Despite the plaudits and attention, the way that JIATF–South actually operates has only received superficial analysis. In fact, few people actually understand why JIATF–South works as well as it does or how its success might be replicated.

May 1, 2011

DTP-082: Analysis of the Threat of Genetically Modified Organisms for Biological Warfare

This study seeks to better understand the evaluation of the potential threats posed by advances in biotechnology, especially genetically modified organisms and synthetic biology. It narrows the scope of consideration into two parts: defining a catastrophic biological attack focused on bioterrorism and that this attack would be restricted to the United States.

April 1, 2011

Iran’s Islamic Revolution: Lessons for the Arab Spring of 2011?

The Islamic Revolution surprised senior U.S. policymakers as well as the Shah of Iran, Mohammad Reza Pahlavi. On the eve of revolution, Iran—a key U.S. ally—seemed relatively stable despite bouts of urban terrorism in the early and mid-1970s. At the first signs of escalating unrest in early 1978, neither Iranian nor U.S. officials considered the possibility that Iran’s armed forces, the largest and most modern in the region (next to those of Israel), would prove unable to deal with whatever trouble lay ahead. The fall of the Shah a year later, therefore, raised searching questions regarding the role of the armed forces during the crisis and its failure to quash the revolution. The recent emergence of popular protest movements that have overthrown authoritarian regimes in Tunisia and Egypt—and that are challenging similar regimes in Libya, Yemen, Bahrain, and Syria—has revived memories of the Shah and his fall. These developments have again raised questions regarding the role of armed forces during revolutions and whether Iran’s experience during the Islamic Revolution and after holds relevant lessons for current developments in the Middle East.

March 1, 2011

Secret Weapon: High-value Target Teams as an Organizational Innovation

This study argues that interagency teams were a major catalyst in turning around the Iraq War, and that they will disappear from America’s arsenal unless the knowledge base supporting the innovation can be secured. Most explanations credit the dramatic reduction in violence in Iraq between 2007 and 2008 to new U.S. leadership, the surge in U.S. forces, and/or U.S. financial support to Sunni tribal leaders. In contrast, we argue that the United States employed an underappreciated organizational innovation—interagency teams—to put insurgent clandestine organizations on the defensive and give population security measures a chance to take effect.

March 1, 2011

DTP-081: Assessing Army Power and Energy for the Warfighter

This paper reviews some of the landscape of research and development on power and energy as it pertains to the needs of the Army warfighter. It focuses on the battlefield and considers questions related to vehicles, dismounted soldiers, and forward operating bases. The context of the study is twofold: the National need to reduce the use of petroleum-based fuels and the Army’s need to reduce the logistical burden and hazards moving said fuels on the battlefield.

March 1, 2011

DTP-081: Assessing Army Power and Energy for the Warfighter

This paper reviews some of the landscape of research and development on power and energy as it pertains to the needs of the Army warfighter. It focuses on the battlefield and considers questions related to vehicles, dismounted soldiers, and forward operating bases. The context of the study is twofold: the National need to reduce the use of petroleum-based fuels and the Army’s need to reduce the logistical burden and hazards moving said fuels on the battlefield.

March 1, 2011

Brazil and the United States: The Need for Strategic Engagement

Washington’s identification of Brazil with Latin America and the Third World hampers its appreciation of Brazil’s power and importance to the United States. It is true that Brazil is geographically part of Latin America, and it is also true that Brazil, a founder of the Group of 77, was, with India, among the original leaders of the “Third World.”

Feb. 1, 2011

Finland, Sweden, and NATO: From “Virtual” to Formal Allies?

The “Open Door” policy of the North Atlantic Treaty Organization (NATO) has been an article of faith for Allies and aspirants alike for more than a decade. Its most recent formulation, approved at the November 2010 Lisbon Summit, states: “The door to NATO membership remains fully open to all European democracies which share the values of our Alliance, which are willing and able to assume the responsibilities and obligations of membership, and whose inclusion can contribute to common security and stability.”

Feb. 1, 2011

European Energy Security: Reducing Volatility of Ukraine-Russia Natural Gas Pricing Disputes

On January 7, 2009, the existing energy relationship among Europe, Russia, and Ukraine broke down over a natural gas dispute, just as it had done 3 years earlier. Amid subzero temperatures in many parts of Europe, Russia turned off its gas supply to Ukraine, causing shortages in more than 20 European countries. Thousands across the continent were left in the dark, and government services were closed.1 While the flow of gas was eventually restored, Russian gas disputes with Ukraine continue, and the prospect of another Gazprom shutoff has become an annual event for European consumers. Despite earlier indications that another breakdown in negotiations would lead to blackouts in Europe early in 2010, the potential crisis was averted via a Russia-Ukraine deal that restructured earlier payment and pricing arrangements.2 However, it is doubtful that Ukraine can continue timely payments for its domestic gas consumption and maintain its own pipeline infrastructure. Fundamental changes to Russia-Ukraine energy transport agreements are coming.

Feb. 1, 2011

Conventional Prompt Global Strike: Strategic Asset or Unusable Liability?

The Conventional Prompt Global Strike (CPGS) concept calls for a U.S. capability to deliver conventional strikes anywhere in the world in approximately an hour. The logic of the CPGS concept is straightforward. The United States has global security commitments to deter and respond to a diverse spectrum of threats, ranging from terrorist organizations to near-peer competitors. The United States might need to strike a time-sensitive target protected by formidable air defenses or located deep inside enemy territory. Small, high-value targets might pop up without warning in remote or sensitive areas, potentially precluding the United States from responding to the situation by employing other conventional weapons systems, deploying Special Operations Forces (SOF), or relying on the host country.

Feb. 1, 2011

Small Nuclear Reactors for Military Installations: Capabilities, Costs, and Technological Implications

In recent years, the U.S. Department of Defense (DOD) has become increasingly interested in the potential of small (less than 300 megawatts electric [MWe]) nuclear reactors for military use.1 DOD’s attention to small reactors stems mainly from two critical vulnerabilities it has identified in its infrastructure and operations: the dependence of U.S. military bases on the fragile civilian electrical grid, and the challenge of safely and reliably supplying energy to troops in forward operating locations. DOD has responded to these challenges with an array of initiatives on energy efficiency and renewable and alternative fuels. Unfortunately, even with massive investment and ingenuity, these initiatives will be insufficient to solve DOD’s reliance on the civilian grid or its need for convoys in forward areas. The purpose of this paper is to explore the prospects for addressing these critical vulnerabilities through small-scale nuclear plants.

Feb. 1, 2011

Toward a Theory of Spacepower: Selected Essays

This volume is a product of the efforts of the Institute for National Strategic Studies Spacepower Theory Project Team, which was tasked by the Department of Defense to create a theoretical framework for examining spacepower and its relationship to the achievement of national objectives. The team was charged with considering the space domain in a broad and holistic way, incorporating a wide range of perspectives from U.S. and international space actors engaged in scientific, commercial, intelligence, and military enterprises.

Jan. 1, 2011

China’s Out of Area Naval Operations: Case Studies, Trajectories, Obstacles, and Potential Solutions

This study seeks to understand the future direction of the People’s Liberation Army Navy (PLAN) with regard to out of area deployments and power projection. The assessment is based on the history of past PLAN out of area deployments and an analysis of out of area operations of other military forces. Both short- and long-term lenses are employed to understand the scope and direction of China’s defense planning and strategic decisions.

Jan. 1, 2011

Russia’s Revival: Ambitions, Limitations, and Opportunities for the United States

Independent Russia is approaching the start of its third decade of post-Soviet existence. After the economic chaos of the Boris Yeltsin decade and the recovery and stabilization of the Vladimir Putin decade, Russia’s leaders have high ambitions for a return to great power status in the years ahead. Their aspirations are tempered, however, by the realities of Russia’s social, economic, and military shortcomings and vulnerabilities, laid painfully bare by the stress test of the recent global financial crisis. Looking ahead, some also calculate that Russia will be increasingly challenged in the Far East by a rising China and in the Middle East by an Iran that aspires to regional hegemony.

Jan. 1, 2011

Maximizing the Returns of Government Venture Capital Programs

The stories of Google and Segway certainly end differently. With a market capitalization of over $180 billion, Google is arguably the biggest success in the information technology (IT) industry in the last decade. The phrase google it has worked its way into everyday language and dictionaries. On the other hand, Segway remains a privately held company whose products are largely relegated to use by tourists in major cities and security personnel at airports. We certainly do not hear people say that they “segwayed” to work this morning.

Jan. 1, 2011

DTP-080: Assessing Military Benefits of S&T Investments in Micro Autonomous Systems Utilizing a Gedanken Experiment

This paper address The Army Research Laboratory’s Micro-Autonomous Systems and Technology Collaborative Technology Alliance program which was chosen to demonstrate the utility of the methodology in the evaluation of an actual Army S&T effort. It was chosen because it offers significant future capabilities for our Army, provides a set of very robust present-day technical challenges, and offers a significant assessment challenge since it is focused on basic research.

Jan. 1, 2011

Getting Beyond Taiwan? Chinese Foreign Policy and PLA Modernization

Since the mid-1990s, China’s military modernization has focused on deterring Taiwan independence and preparing for a military response if deterrence fails. Given China’s assumption of U.S. intervention in a Taiwan conflict, the People’s Liberation Army (PLA) has been developing military capabilities to deter, delay, and disrupt U.S. military support operations. The 2008 election of Taiwan President Ma Ying-jeou, however, has contributed to improved cross-strait economic and political cooperation and dramatically reduced the threat of Taiwan independence and war across the Taiwan Strait. Cooperation has included full restoration of direct shipping, flights, and mail across the strait, Taiwan’s participation in the World Health Assembly, regularized cross-strait negotiation mechanisms that have already reached several agreements, and the recent signing of the Economic Cooperation Framework Agreement.

Dec. 1, 2010

Chief of Mission Authority as a Model for National Security Integration

The inability of the President of the United States to delegate executive authority for integrating the efforts of departments and agencies on priority missions is a major shortcoming in the way the national security system of the U.S. Government functions. Statutorily assigned missions combined with organizational cultures create “stovepipes” that militate against integrated operations. This obstacle to “unity of effort” has received great attention since 9/11 but continues to adversely affect government operations in an era of increasingly multidisciplinary challenges, from counterproliferation to counterinsurgency in Afghanistan. Presidents have tried various approaches to solving the problem: National Security Council committees, “lead agencies,” and “czars,” but none have proven effective.

Dec. 1, 2010

The Surge: General Petraeus and the Turnaround in Iraq

When General David H. Petraeus, USA, took command of Multi-National Force–Iraq (MNF–I) on February 10, 2007, beginning his 3d tour and 28th month in Iraq, the situation was grim. Increasing sectarian violence had led to an escalation of killings of civilians in Iraq, with up to 150 corpses being found daily in Baghdad.1 The government of Prime Minister Nouri alMaliki was viewed by almost everyone as ineffective at best, and the U.S. military strategy was not well defined and clearly not working. Iraq appeared to be sliding out of control toward civil war or disintegration, and the United States appeared to be headed inexorably toward defeat— another Vietnam. Popular sentiment held that the best course of action was to cut our losses and disengage from a fight we were losing. General George Casey, USA, the outgoing commander of MNF–I, had supported a gradual drawdown of U.S. forces and a handoff of security tasks to Iraqi forces even as the situation got worse

Nov. 4, 2010

Letter to the Editor

As a technologist who advises major mining companies, wrote two books on metal-mining and a 445-page text on efficient drivesystems, did rare-earth (RE) physics research at MIT Lincoln Lab, and consulted for the MIT National Magnet Lab, I welcome Cindy Hurst's JFQ 59 article on China's RE resources, activities, and expertise. However, like many such supply-side stories, her article's relative neglect of demand-side alternatives could stimulate already-widespread but exaggerated concern about REs.

Nov. 1, 2010

DTP-079: Bio-Inspired Materials and Devices for Chemical and Biological Defense

This report addresses materials for synthetic matrices of chemical and biological defense using a conceptual platform known as the abiotic networked threat system (ANTS). This system is based on lessons learned from biology, incorporating abiotic homologues to biological recognition events and metabolic pathways to provide programmable capabilities to sense and respond to environmental threats.

Oct. 1, 2010

Bio-inspired Innovation and National Security

Despite various treaties and protocols, offensive biological weapons use has continued to this day, with the anthrax attacks of 2001 being the most recent incident. Such activity has led to a strong defensive program, with medical science developing numerous countermeasures that have benefited both civilian and military populations.

Oct. 1, 2010

DTP-078: Hours of Boredom, Moments of Terror: Temporal Desynchrony in Military and Security Force Operations

The authors examine resultant psychological and behavioral implications for combatant and security personnel performance as viewed through application of a traditional human psychological stress model. Inadequate recognition of the implications resulting from long lull periods, combat pulses, and the need to recover from stress can lead to dysfunctional soldiering as well as poor individual and small unit performance.

Oct. 1, 2010

Private Contractors in Conflict Zones: The Good, the Bad, and the Strategic Impact

In Iraq and Afghanistan, the use of contractors reached a level unprecedented in U.S. military operations. As of March 31, 2010, the United States deployed 175,000 troops and 207,000 contractors in the war zones. Contractors represented 50 percent of the Department of Defense (DOD) workforce in Iraq and 59 percent in Afghanistan. These numbers include both armed and unarmed contractors. Thus, for the purposes of this paper, the term contractor includes both armed and unarmed personnel unless otherwise specified. The presence of contractors on the battlefield is obviously not a new phenomenon but has dramatically increased from the ratio of 1 contractor to 55 military personnel in Vietnam to 1:1 in the Iraq and 1.43:1 in Afghanistan.

Sept. 1, 2010

Nuclear Politics in Iran

This collection of analyses on the unintended consequences of Iran’s nuclear policy for its domestic and international relations is the first in a series of papers that will examine the impact of critical issues and developments on key countries in the Greater Middle East and on U.S. security interests. Succeeding papers will identify similar emerging issues in Turkey, Iraq, Yemen, and the Persian Gulf region. For the most part, the papers will represent the independent research and opinions of academic scholars and regional experts prepared for and presented at the National Defense University.

Sept. 1, 2010

Redefining Success: Applying Lessons in Nuclear Diplomacy from North Korea to Iran

The United States has no good options for resolving the North Korean and Iranian nuclear challenges. Incentives, pressures, and threats have not succeeded. A military strike would temporarily set back these programs, but at unacceptable human and diplomatic costs, and with a high risk of their reconstitution and acceleration. For some policymakers, therefore, the best option is to isolate these regimes until they collapse or pressures build to compel negotiations on U.S. terms. This option has the veneer of toughness sufficient to make it politically defensible in Washington. On closer scrutiny, however, it actually allows North Korea and Iran to continue their nuclear programs unrestrained. It also sacrifices more achievable short-term goals of improving transparency and securing vulnerable nuclear materials to the uncertain long-term goal of denuclearization. Yet these short-term goals are deemed critical to U.S. national security in the 2010 Nuclear Posture Review (NPR) and Quadrennial Defense Review (QDR).