Results:
Category: Policy Briefs

Dec. 1, 2011

The Emergence of China in the Middle East

During the 9th century, Arab traders regularly plied lucrative maritime routes that connected the Persian Gulf to southern China by way of the Indian Ocean. This commercial activity, which mostly involved jade, silk, and other luxury goods, went on for centuries and became part of what is now known as the Silk Road. In some ways, the world is now witnessing a restoration of that ancient trading relationship between two civilizations—except that oil and consumer goods have replaced jade and silk.

July 1, 2011

Countering the Lord’s Resistance Army in Central Africa

The Lord’s Resistance Army (LRA) is one of Africa’s most brutal militia forces. It has plagued Central Africa, particularly northern Uganda, for over two decades. The group’s tactics provide textbook examples of war crimes and crimes against humanity. When attacking civilians, the LRA instills fear by selecting random individuals for brutal executions. Children are abducted to serve as porters, sex slaves, and new militia. In order to indoctrinate child soldiers, young abductees are routinely forced to kill their own family members and other children, or be murdered themselves. Anyone caught trying to escape from the LRA is summarily executed. By contrast with other African rebel groups, which occasionally adopt such brutal tactics, the LRA has conducted such atrocities on a systematic and prolonged basis.

July 1, 2011

Chinese Military Transparency: Evaluating the 2010 Defense White Paper

The People’s Republic of China (PRC) State Council Information Office released the seventh edition of its biennial defense white paper, “China’s National Defense in 2010,” on March 31, 2011. This document aims to communicate the latest information on China’s military development, strategy, capabilities, and intentions. China began publishing defense white papers in 1998, partly as a means of increasing transparency in response to regional concerns about the growing capabilities and actions of the People’s Liberation Army (PLA). Despite the systematic release of these documents, many of China’s neighbors and other regional powers continue to express concerns about China’s lack of military transparency. The Chinese maintain that they are becoming more open over time and highlight the importance of transparency about strategic intentions rather than capabilities.

July 1, 2011

The Evolving Threat of al Qaeda in the Islamic Maghreb

The United States faces an important strategic question in northwest Africa: what level of activity by al Qaeda in the Islamic Maghreb (AQIM) would constitute a sufficient threat to U.S. national security interests to warrant a more aggressive political, intelligence, military, and law enforcement response? AQIM already poses the greatest immediate threat of transnational terrorism in the region, and its operational range and sophistication continue to expand. Since 2007, the group has professed its loyalty to Osama bin Laden and al Qaeda’s senior leadership and claimed responsibility for dozens of attacks in the subregion. These attacks have included the use of suicide bombers, improvised explosive devices, kidnapping operations, and assassinations.

April 1, 2011

Iran’s Islamic Revolution: Lessons for the Arab Spring of 2011?

The Islamic Revolution surprised senior U.S. policymakers as well as the Shah of Iran, Mohammad Reza Pahlavi. On the eve of revolution, Iran—a key U.S. ally—seemed relatively stable despite bouts of urban terrorism in the early and mid-1970s. At the first signs of escalating unrest in early 1978, neither Iranian nor U.S. officials considered the possibility that Iran’s armed forces, the largest and most modern in the region (next to those of Israel), would prove unable to deal with whatever trouble lay ahead. The fall of the Shah a year later, therefore, raised searching questions regarding the role of the armed forces during the crisis and its failure to quash the revolution. The recent emergence of popular protest movements that have overthrown authoritarian regimes in Tunisia and Egypt—and that are challenging similar regimes in Libya, Yemen, Bahrain, and Syria—has revived memories of the Shah and his fall. These developments have again raised questions regarding the role of armed forces during revolutions and whether Iran’s experience during the Islamic Revolution and after holds relevant lessons for current developments in the Middle East.

March 1, 2011

Brazil and the United States: The Need for Strategic Engagement

Washington’s identification of Brazil with Latin America and the Third World hampers its appreciation of Brazil’s power and importance to the United States. It is true that Brazil is geographically part of Latin America, and it is also true that Brazil, a founder of the Group of 77, was, with India, among the original leaders of the “Third World.”

Feb. 1, 2011

Finland, Sweden, and NATO: From “Virtual” to Formal Allies?

The “Open Door” policy of the North Atlantic Treaty Organization (NATO) has been an article of faith for Allies and aspirants alike for more than a decade. Its most recent formulation, approved at the November 2010 Lisbon Summit, states: “The door to NATO membership remains fully open to all European democracies which share the values of our Alliance, which are willing and able to assume the responsibilities and obligations of membership, and whose inclusion can contribute to common security and stability.”

Feb. 1, 2011

European Energy Security: Reducing Volatility of Ukraine-Russia Natural Gas Pricing Disputes

On January 7, 2009, the existing energy relationship among Europe, Russia, and Ukraine broke down over a natural gas dispute, just as it had done 3 years earlier. Amid subzero temperatures in many parts of Europe, Russia turned off its gas supply to Ukraine, causing shortages in more than 20 European countries. Thousands across the continent were left in the dark, and government services were closed.1 While the flow of gas was eventually restored, Russian gas disputes with Ukraine continue, and the prospect of another Gazprom shutoff has become an annual event for European consumers. Despite earlier indications that another breakdown in negotiations would lead to blackouts in Europe early in 2010, the potential crisis was averted via a Russia-Ukraine deal that restructured earlier payment and pricing arrangements.2 However, it is doubtful that Ukraine can continue timely payments for its domestic gas consumption and maintain its own pipeline infrastructure. Fundamental changes to Russia-Ukraine energy transport agreements are coming.

Feb. 1, 2011

Conventional Prompt Global Strike: Strategic Asset or Unusable Liability?

The Conventional Prompt Global Strike (CPGS) concept calls for a U.S. capability to deliver conventional strikes anywhere in the world in approximately an hour. The logic of the CPGS concept is straightforward. The United States has global security commitments to deter and respond to a diverse spectrum of threats, ranging from terrorist organizations to near-peer competitors. The United States might need to strike a time-sensitive target protected by formidable air defenses or located deep inside enemy territory. Small, high-value targets might pop up without warning in remote or sensitive areas, potentially precluding the United States from responding to the situation by employing other conventional weapons systems, deploying Special Operations Forces (SOF), or relying on the host country.

Feb. 1, 2011

Small Nuclear Reactors for Military Installations: Capabilities, Costs, and Technological Implications

In recent years, the U.S. Department of Defense (DOD) has become increasingly interested in the potential of small (less than 300 megawatts electric [MWe]) nuclear reactors for military use.1 DOD’s attention to small reactors stems mainly from two critical vulnerabilities it has identified in its infrastructure and operations: the dependence of U.S. military bases on the fragile civilian electrical grid, and the challenge of safely and reliably supplying energy to troops in forward operating locations. DOD has responded to these challenges with an array of initiatives on energy efficiency and renewable and alternative fuels. Unfortunately, even with massive investment and ingenuity, these initiatives will be insufficient to solve DOD’s reliance on the civilian grid or its need for convoys in forward areas. The purpose of this paper is to explore the prospects for addressing these critical vulnerabilities through small-scale nuclear plants.

Jan. 1, 2011

Maximizing the Returns of Government Venture Capital Programs

The stories of Google and Segway certainly end differently. With a market capitalization of over $180 billion, Google is arguably the biggest success in the information technology (IT) industry in the last decade. The phrase google it has worked its way into everyday language and dictionaries. On the other hand, Segway remains a privately held company whose products are largely relegated to use by tourists in major cities and security personnel at airports. We certainly do not hear people say that they “segwayed” to work this morning.

Jan. 1, 2011

Getting Beyond Taiwan? Chinese Foreign Policy and PLA Modernization

Since the mid-1990s, China’s military modernization has focused on deterring Taiwan independence and preparing for a military response if deterrence fails. Given China’s assumption of U.S. intervention in a Taiwan conflict, the People’s Liberation Army (PLA) has been developing military capabilities to deter, delay, and disrupt U.S. military support operations. The 2008 election of Taiwan President Ma Ying-jeou, however, has contributed to improved cross-strait economic and political cooperation and dramatically reduced the threat of Taiwan independence and war across the Taiwan Strait. Cooperation has included full restoration of direct shipping, flights, and mail across the strait, Taiwan’s participation in the World Health Assembly, regularized cross-strait negotiation mechanisms that have already reached several agreements, and the recent signing of the Economic Cooperation Framework Agreement.

Oct. 1, 2010

Private Contractors in Conflict Zones: The Good, the Bad, and the Strategic Impact

In Iraq and Afghanistan, the use of contractors reached a level unprecedented in U.S. military operations. As of March 31, 2010, the United States deployed 175,000 troops and 207,000 contractors in the war zones. Contractors represented 50 percent of the Department of Defense (DOD) workforce in Iraq and 59 percent in Afghanistan. These numbers include both armed and unarmed contractors. Thus, for the purposes of this paper, the term contractor includes both armed and unarmed personnel unless otherwise specified. The presence of contractors on the battlefield is obviously not a new phenomenon but has dramatically increased from the ratio of 1 contractor to 55 military personnel in Vietnam to 1:1 in the Iraq and 1.43:1 in Afghanistan.

Dec. 1, 2009

STAR–TIDES and Starfish Networks: Supporting Stressed Populations with Distributed Talent

The Department of Defense increasingly is involved in postwar stabilization and reconstruction, humanitarian assistance and disaster relief missions, capacity-building of partner nations at home and abroad, and other such complex operations. To provide sustainable support to stressed populations in these environments, an international, networked, knowledge-sharing research project called Sustainable Technologies, Accelerated Research–Transformative Innovation for Development and Emergency Support (STAR–TIDES) encourages innovative approaches to public-private collaboration, whole-of-government solutions, and transnational engagement. It leverages a distributed network of people and organizations to conduct research, support real world contingencies, and bridge gaps among disparate communities.

Nov. 1, 2009

To Build Resilience: Leader Influence on Mental Hardiness

The military profession is inherently stressful and is getting more so for U.S. troops, who are deploying more often and for longer periods of time on missions that are multifaceted, changeable, and ambiguous. Such stressful conditions can lead to a range of health problems and performance decrements even among leaders. But not everyone reacts in negative ways to environmental stress. Most people remain healthy and continue to perform well even in the face of high stress levels. While much attention in recent years has focused on identifying and treating stress-related breakdowns such as post-traumatic stress disorder, scant investment has gone toward the study of healthy, resilient response patterns in people.

Sept. 1, 2009

Cyberspace and the “First Battle” in 21st-century War

Wars often start well before main forces engage. In the 19th and early 20th centuries, combat often began when light cavalry units crossed the border. For most of the 20th century, the “first battle” typically involved dawn surprise attacks, usually delivered by air forces. While a few of these attacks were so shattering that they essentially decided the outcome of the struggle or at least dramatically shaped its course—the Israeli air force’s attack at the opening of the June 1967 Six-Day War comes to mind—in most cases the defender had sufficient strategic space—geographic and/or temporal—to recover and eventually redress the strategic balance to emerge victorious. The opening moments of World War II for Russia and the United States provide two examples.

May 1, 2009

Breaking the Yardstick: The Dangers of Market-based Governance

In the middle of the last century, America became a superpower. It happened, in part, because of a well-balanced technological partnership between the Federal Government and commercial sector. After winning a world war against fascism, this public-private alliance went on to cure infectious diseases, create instant global communications, land humans on the Moon, and prevail in a long Cold War against communism. This, and more, was accomplished without bankrupting the Nation’s economy. The partnership’s record of service to the American people and the world has been remarkable.

March 1, 2009

A 21st-century Concept of Air and Military Operations

The evolution of 21st-century air operations is unfolding under the impact of a new generation of fighter aircraft and a significant shift in the role of air operations in support of ground and maritime forces. So-called fifth-generation aircraft often are mistakenly viewed as simply the next iteration of airframes: fast, stealthy replacements of obsolescent legacy platforms. In fact, the capabilities of fifth-generation aircraft, and their integration into a network-centric joint force, will change the roles of manned fighter aircraft in air, ground, and maritime operations. These changes are so far-reaching that the Services face the challenge of crafting a new concept of 21st-century air operations, indeed, of all combat operations.

Jan. 1, 2009

From Sputnik to Minerva: Education and American National Security

This paper examines how external challenges have prompted national investments in education to enhance American national security. Rather than focusing primarily on traditional professional military education, this analysis examines how education has been used as a tool of American power. Four major moments of transformation in the international system are surveyed to illustrate a link between strategic educational capacity, defined as the application of attained knowledge and skills, and national power. The study then assesses how education is used as a power asset in the contemporary security environment. Today, an important educational capacity is emerging in the new Minerva program in the Department of Defense and other transformational educational concepts with security applications. Education is gaining an increasing interest among American decisionmakers as a strategic component of American power and an essential asset for successful military operations in the new global security environment.

Nov. 1, 2008

Lessons of Abu Ghraib: Understanding and Preventing Prisoner Abuse in Military Operations

The abuse of prisoners by U.S. Soldiers at Abu Ghraib had broad strategic consequences, leading many people around the world to question the legitimacy of U.S. goals and activities in Iraq. This paper draws on extensive unclassified reports from multiple investigations that followed Abu Ghraib, and applies key psychological as well as social-situational perspectives to develop a better grasp of the causative factors. From a psychological standpoint, most young adults are powerfully inclined to behave in accord with the social conventions and pressures around them. Especially in ambiguous circumstances, then, it is important that standards of behavior be clear and explicit throughout all phases of an operation and that leaders at all levels represent and reinforce those standards.

May 1, 2008

The Role of Medical Diplomacy in Stabilizing Afghanistan

Comprehensive stabilization and reconstruction of Afghanistan are not possible given the current fragmentation of responsibilities, narrow lines of authorities, and archaic funding mechanisms. Afghans are supportive of U.S. and international efforts, and there are occasional signs of progress, but the insurgent threat grows as U.S. military and civilian agencies and the international community struggle to bring stability to this volatile region. Integrated security, stabilization, and reconstruction activities must be implemented quickly and efficiently if failure is to be averted. Much more than a course correction is needed to provide tangible benefits to the population, develop effective leadership capacity in the government, and invest wisely in reconstruction that leads to sustainable economic growth. A proactive, comprehensive reconstruction and stabilization plan for Afghanistan is crucial to counter the regional terrorist insurgency, much as the Marshall Plan was necessary to combat the communist threat from the Soviet Union.1 This paper examines the health sector as a microcosm of the larger problems facing the United States and its allies in efforts to stabilize Afghanistan.

Feb. 1, 2008

So Many Zebras, So Little Time: Ecological Models and Counterinsurgency Operations

Force ratios are an important variable in warfare and in nature. On the Serengeti, large zebra herds are constantly hunted by small prides of lions. But with their overwhelming majority, why don’t the zebras unite and attack the lions? Hooves can be as deadly as claws when used correctly. And conversely, if the lions are such effective predators, why are there so many zebras?

Jan. 1, 2008

Cyber Influence and International Security

Cyber influence is an ongoing source of power in the international security arena. Although the United States has an enormous cyber information capacity, its cyber influence is not proportional to that capacity. Impediments to American cyber influence include the vastness and complexity of the international information environment, multiplicity of cultures and differing audiences to which communications must be addressed, extensiveness and significance of contending or alternative messages, and complexity and importance of using appropriate influential messengers and message mechanisms.

Jan. 1, 2008

Strategic Fragility: Infrastructure Protection and National Security in the Information Age

Modern societies have reached unprecedented levels of prosperity, yet they remain vulnerable to a wide range of possible disruptions. One significant reason for this growing vulnerability is the developed world’s reliance on an array of interlinked, interdependent critical infrastructures that span nations and even continents. The advent of these infrastructures over the past few decades has resulted in a tradeoff: the United States has gained greater productivity and prosperity at the risk of greater exposure to widespread systemic collapse. The trends that have led to this growing strategic fragility show no sign of slowing. As a result, the United States faces a new and different kind of threat to national security.

Dec. 1, 2007

Organizing for National Security: Unification or Coordination?

Experience gained from the 9/11 attacks, combat in Iraq and Afghanistan, disaster assistance during and after Hurricane Katrina, and the ongoing war on terror provides the basis for amending our anachronistic national security structures and practices. Many analysts and officials have called for a second-generation version of the Goldwater-Nichols Department of Defense Reorganization Act of 1986 to address the array of organizational and management challenges that we face. Some argue that the new security environment requires even more fundamental change, similar to what was enacted after World War II. The principal legislation that emerged from that era was the National Security Act of 1947. Goldwater-Nichols aimed to fix inter-Service problems by streamlining the chain of command and promoting “jointness” but did not fundamentally alter the structure of the U.S. military.

Sept. 1, 2007

The Comprehensive Approach Initiative: Future Options for NATO

Experience has shown that conflict resolution requires the application of all elements of national and international power— political, diplomatic, economic, financial, informational, social, and commercial, as well as military. To resolve conflicts or crises, the North Atlantic Treaty Organization (NATO) should adopt a Comprehensive Approach that would enable the collaborative engagement of all requisite civil and military elements of international power to end hostilities, restore order, commence reconstruction, and begin to address a conflict’s root causes. NATO can provide the military element for a comprehensive approach. Many other national, international, and nongovernmental actors can provide the civilian elements.

July 1, 2007

Privatizing While Transforming

The Armed Forces of the United States are designed to be supported by capabilities provided by civilians. The Army, for example, depends not only on Reserve and National Guard components for warfighting elements, but also on private contractors for numerous roles no longer performed by military personnel. Originally working in small contingents focused on logistical functions, private contractors now rival military personnel in number in the battlespace. In addition to providing direct logistical support to the military, contractors perform equipment maintenance and reconstruction work, train military and police, and work as civil affairs staff, interpreters, and even interrogators. They also provide private armed security services. The issues arising from new roles are exacerbated by the growth of the contractor population in conflict zones at a pace that defies effective recordkeeping.

June 1, 2007

Responding in the Homeland: A Snapshot of NATO’s Readiness for CBRN Attacks

The possibility of North Atlantic Treaty Organization (NATO) members having to respond to a chemical, biological, radiological, or nuclear (CBRN) incident is not a hypothetical scenario reserved for training exercises. Indeed, a number of countries worldwide have considerable experience in dealing with a variety of naturally occurring, accidental, and deliberate CBRN incidents. NATO itself, however, has no clear conceptual vision of its role in civil emergencies because preparedness of this sort remains a national responsibility.

Feb. 1, 2007

I-Power: The Information Revolution and Stability Operations

Information and information technology (I/IT) can significantly increase the likelihood of success in stability operations— if they are engaged as part of an overall strategy that coordinates the actions of outside intervenors and focuses on generating effective results for the host nation. Properly utilized, I/IT can help create a knowledgeable intervention, organize complex activities, and integrate stability operations with the host nation, making stability operations more effective.

Aug. 1, 2006

Lee’s Mistake: Learning from the Decision to Order Pickett’s Charge

At the Battle of Gettysburg, Robert E. Lee made a mistake that doomed the hopes of the Confederate States of America to compel the United States to sue for peace. Why one of the great generals of his time made such a blunder continues to be a topic of research and intense debate. Lee said little at the time or afterward to justify his decision to launch what has become known as Pickett’s Charge, so analysis must be inferential and inconclusive. Our aim is to explain Lee’s fateful decision not with new facts but with new analytical methods to illuminate decisionmaking in combat.

July 1, 2006

Countering Terrorism Across the Atlantic?

Differences in strategic vision and concepts of security are central to the U.S. and European Union (EU) approaches to counterterrorism. While the United States conceives of a war against terrorism, Europe does not. As a result of different perceptions of the threat, both sides of the Atlantic take divergent approaches to homeland security. Europeans tend to favor the use of a law enforcement strategy over a warfighting approach. Meanwhile, the U.S. administration believes that a quasi-militaristic, overtly proactive, and highly vigilant stance will serve as the best deterrent to future attacks. By their own standards, Europeans are doing more to counter terrorism since September 11 and even more since the attacks in Madrid (March 11, 2004) and in London (July 7, 2005); by U.S. standards, these measures sometimes appear inadequate. As a result, there are significant transatlantic divergences on the best methods for halting the spread of terrorism.

March 1, 2006

Creating a NATO Special Operations Force

In the post-9/11 security environment, special operations forces (SOF) have proven indispensable. SOF units are light, lethal, mobile, and easily networked with other forces. While the United States and its North Atlantic Treaty Organization (NATO) allies have extensive SOF capabilities, these forces are not formally organized to collaborate with one another. There would be much to gain if U.S. and allied SOF trained to work together: national SOF assets would be improved, obstacles to effective combined operations would be removed, and a coherent Alliance capability would be readily available for NATO. The Alliance can focus and grow its SOF capabilities by providing a selective and small combined “inner core” of NATO special operations forces for operations, while using an outer network to expand and improve SOF cooperation with interested allies.

Feb. 1, 2006

Custer in Cyberspace

The combination of abundant networked information and fluid, unfamiliar situations in the current era makes it at once possible and imperative to improve decisionmaking in combat. The key to improvement is to integrate faster reasoning and more reliable intuition into a cognitive whole to achieve battle-wisdom. Although the technologies that both demand and facilitate battle- wisdom are new, military history holds lessons on combining reasoning and intuition in conditions of urgency, danger, and uncertainty.

Oct. 1, 2005

Sweden’s Use of Commercial Information Technology for Military Applications

Sweden, a nation of only 9 million people with a political climate that has fostered a posture of nonalignment for over half a century, has nevertheless maintained highly credible, modern, and high-technology military forces. Sweden has expanded the mission of forces originally designed for the Cold War to include international peacekeeping. The focus of this study is the Swedish formula for achieving the high-technology military capabilities that successfully compensate for a small standing force. What policies and processes enabled the Swedish military to take advantage of leading-edge producers of commercial information technology (CIT)? What lessons does the Swedish model hold for the U.S. Department of Defense?

Oct. 1, 2005

Russia and NATO: Increased Interaction in Defense Research and Technology

As a member of both the Partnership for Peace and the North Atlantic Treaty Organization (NATO)–Russia Council (NRC), Russia enjoys remarkable status in an alliance formed principally to counter Soviet aggression. Active participation in one additional element of NATO—the Research and Technology Organization (RTO)—would offer unique opportunities to enhance relationships and mutual security. The RTO is the largest organization of its type in the world, has an extremely active program of work, and is eager to work with Russia.

July 1, 2005

The Changing Landscape of Defense Innovation

In a rapidly evolving business environment, many successful companies have transformed themselves by reexamining their core missions and competencies and exploiting innovation in nontraditional ways. General Electric still manufactures products but now identifies itself as a services company. Wal-Mart has become the premier retailer by capitalizing on its logistics and support systems. These two giants and other companies have realized that they can become more profitable by exploiting new regions of the business landscape.

May 1, 2005

A New Military Framework for NATO

Although Americans and Europeans do not always agree on political strategies in the Middle East, they have a compelling reason to reach an accord on the need to strengthen North Atlantic Treaty Organization (NATO) military forces for future operations in that region and elsewhere. If adequate military capabilities are lacking, the Alliance will not be able to act even when its political leaders agree on the need to do so. But if it creates such capabilities, it will be able to act either ad hoc or across the board if a common political strategy eventually were to emerge.

Dec. 1, 2004

Military Transformation and Joint Experimentation: Two Views from Above

Military transformation— “a process that shapes the changing nature of military competition and cooperation through new combinations of concepts, capabilities, people and organizations”— is on the minds and agendas of everyone dealing with the military. Many people talk about transformation; the two authors of this Defense Horizons have done something about it. In fact, they are among the few who have been responsible for shaping and implementing the concept. To get a better idea of what goes into this process, particularly the element of joint experimentation that is helping to identify and define the nature of change, Defense Horizons presents the views of two of America’s leading military officers who have been involved in the process.

Sept. 1, 2004

Needed—A NATO Stabilization and Reconstruction Force

At the Istanbul Summit in June 2004 , NATO endorsed the further transformation of military capabilities to make them “more modern, more usable, and more deployable to carry out the full range of Alliance missions.” The Istanbul Communiqué especially called for continuing progress on the NATO Response Force and the Prague Capabilities Commitments.

July 1, 2004

Defense Laboratories and Military Capability: Headed for a BRACdown?

For 150 years, military laboratories have made vital contributions to national defense. In recent years, they have been significantly reduced in number by several rounds of base realignment and closure (BRAC). Even so, they remain the primary source of internal technical competence within the Department of Defense (DOD). Their capability in that role will depend on how DOD answers two questions. Is there excess laboratory capacity - too many laboratories relative to forecasts of future force structure? What is their military value - their likely contribution to the future operational needs of warfighters.

July 1, 2004

Global Networks: Emerging Constraints on Strategy

If current trends in communications technologies and services persist, the United States will be hard pressed to keep a strategic advantage in network capability. The international telecommunications system is rebalancing into four major centers of influence and innovation. Within ten years, Europe, India, and China will have the same technological and innovative capabilities in telecommunications as the United States. This shift is problematic for U.S. national security, because the global telecommunications infrastructure is becoming an important strategic battlespace—the physical battlefield of information warfare. Understanding the dynamic of regional balancing is critical to shaping U.S. responses.

July 1, 2004

NATO Technology: from Gap to Divergence?

A widening technology gap between the United States and other NATO members will challenge the ability of NATO to function as a cohesive, multinational force. Over several decades, great disparities in the funding of defense research and technology by NATO members has produced a widening technological gap that threatens to become a divergence - a condition from which the Alliance may not be able to recover. The technology gap, in turn, is creating a capabilities gap that undercuts the operational effectiveness of NATO forces, including the new NATO Response Force.

July 1, 2004

Alternative Approaches to Army Transformation

Army transformation is an attempt to provide future forces with enhanced capabilities in lethality, survivability, and mobility, both strategic and tactical. Alternatives to achieving these goals differ in emphasis on weight and reliance on technology. That is, transformation plans differ if the objective is weight reduction as opposed to weight redistribution. In one approach, platform weight is reduced to meet mobility goals. However, shedding weight has implications for platform survivability and lethality; previous attempts to design a single platform that is simultaneously lethal, mobile, and survivable have not done so satisfactorily. Thus, advances in materials are required to insure the survivability of a lightweight platform. Advances in network technology are also required to make the platform more aware of its environment. The immaturity of these technologies increases the risks inherent in transformation based strictly on platform characteristics.

April 1, 2004

Responsive Space and Strategic Information

American strategists face a daunting challenge; they must assure and defend American and allied interests, induce and encourage international security cooperation, and deter, dissuade, and defeat a diverse range of potential adversaries. This challenge has been addressed by senior political leadership in recent policy statements, such as the Nuclear Posture Review of 2002, and in the formation of an expanded U.S. Strategic Command, but this vision has not yet taken root in the Department of Defense components responsible for providing operational capability.

April 1, 2004

The Science and Engineering Workforce and National Security

Trends in the American science and engineering (S&E) workforce and national research and development (R&D) funding patterns and priorities have troubling implications for the economic and national security of our nation.

Jan. 1, 2004

Dirty Bombs: The Threat Revisited

Nuclear radiation, invisible and detectable only with special instruments, has the power to terrify—in part because of its association with nuclear weapons—and to become an instrument of terrorists. Radioactive isotopes can be spread widely with or without high explosives by a radiological dispersion device (RDD) or so-called dirty bomb. This paper provides a general overview of the nature of RDDs and sources of material for them and estimates the effects of an assault, including casualties and economic consequences. Many experts believe that an RDD is an economic weapon capable of inflicting devastating damage on the United States. This paper is in full agreement with that assessment and makes some quantitative estimates of the magnitude of economic disruption that can be produced by various levels of attack. It is also generally believed that even a very large RDD is unlikely to cause many human casualties, either immediately or over the long term. A careful examination of the consequences of the tragic accident in Goiânia, Brazil, however, shows that some forms of radiological attack could kill tens or hundreds of people and sicken hundreds or thousands. Nevertheless, contrary to popular belief, RDDs are not weapons of mass destruction.

Jan. 1, 2004

XVIII Airborne Corps: Spearhead of Military Transformation

War transforms armies. Combat accelerates transformation by moving it out of the realm of academic debate and endless speculation about the future to a pragmatic approach focused on fielding new capabilities within new combat formations as soon as possible. In war, transformation means conserving equipment and operational methods that are still relevant while incorporating new technologies, tactics, and organizations that enable victory. It is nearly impossible to replicate in peacetime training the true conditions of land warfare—ambiguity, uncertainty, and above all terror, killing, and exhaustion. For the Army, the best opportunity to transform involves parallel evolution, a method that moves new technologies into combat formations today and explores what the troops will actually do with them in action. With a conflict in progress, this approach is better than trying to predict future uses in an inflexible operational requirements document developed in isolation from the field environment.

Nov. 1, 2003

Hydrogen as a Fuel for DOD

Energy issues have been at the center of the national security debate for some time, and the current situation in the Persian Gulf underscores the strategic importance of sound energy policy. Activities or developments—geopolitical, environmental, technological, or regulatory—that materially change the energy security equation are, naturally, of great interest to the Department of Defense (DOD). The announcement by President George Bush in his State of the Union address that he intends to accelerate research and development (R&D) for hydrogen-powered vehicles toward the objective of total U.S. energy independence has great potential impact on DOD. This paper examines a number of technical issues connected with energy independence through hydrogen and how they might affect DOD. We conclude that the move to a hydrogen economy will be a massive undertaking, requiring large investments and decades to accomplish. We will show that, with few exceptions, pure hydrogen is not a viable fuel for DOD missions, primarily because of the DOD requirement for compact, high-volumetric energy density power sources. As a result, to meet its unique needs, DOD likely will have to increase its dependence on nuclear power and support R&D that investigates ways to use hydrogen to synthesize hydrocarbon fuels in an environmentally compliant fashion. Several suggestions and recommendations will be made in this regard.

Nov. 1, 2003

Alternative Governance: A Tool forMilitary Laboratory Reform

Throughout the Cold War, the United States maintained an edge over adversaries by fielding technologically superior warfighting systems. This strategy depended on a strong research and development (R&D) effort in both the public and private sectors, and the community of military laboratories in the Department of Defense played an essential role in the overall effort. Because of the importance of these labs during the Cold War, defense planners continually focused on ways to improve and strengthen them.

Oct. 1, 2003

Dual-Track Transformation for NATO

Recent strains between the United States and some European allies have raised concerns that NATO is becoming irrelevant or even headed toward extinction. A breakup of NATO would severely damage the United States and Europe as well as prospects for global peace. As an urgent priority, NATO must restore its unity and strengthen its capacity for common action in the Greater Middle East. But how can this goal be achieved in today’s climate?