Results:
Category: Defense Horizons

March 1, 2018

Technology and National Security: The United States at a Critical Crossroads

Globalization of science and technology, emerging and unpredictable threats (both manmade and natural), conventional and emerging weapons of mass destruction, and an inversion of technology flow from the private to public sectors all present challenges to our national security.

Feb. 1, 2018

Low-Cost Access to Space: Military Opportunities and Challenges

Space activity is critical to the American way of war. The commercialization of space has potentially radical implications for U.S. national security through its impact on a range of military and intelligence functions and on the ability of the nation to effectively project power around the globe.

Aug. 14, 2017

The Pentagon’s Pivot: How Lead Users Are Transforming Defense Product Development

Historically, the Department of Defense (DOD) has relied on strategic forecasting to determine specifications for new military products. These specifications are codified in formal product requirements that drive new product development (NPD).

May 15, 2017

Developing an Innovation- Based Ecosystem at the U.S. Department of Defense: Challenges and Opportunities

The U.S. Department of Defense (DOD) is looking at new ways to spur entrepreneurship and innovation among its stakeholders and related constituencies.

April 1, 2015

Global Knowledge Networking: Smart Strategies for Promoting Innovative Learning and Leader Development

Smart security builds on actionable knowledge. The North Atlantic Treaty Organization (NATO) Wales Summit in September 2014 highlighted the need to build on partnerships to prepare and operate together better. Building on the successes of past partnership initiatives and capabilities, this paper proposes new ways to embrace and extend techniques and relationships originally developed under successful Secretary of Defense (SECDEF)-level memoranda of understanding (MOUs) within NATO’s Partnership for Peace (PfP) program. The Global Knowledge Networking (GKN) initiative supports smart decisionmaking by educating and training tomorrow’s agile, resilient, and effective leaders. GKN is a network of people, ideas, and processes to make knowledge actionable and is focused on improving on U.S. and coalition interoperability through improvements in existing training and education capabilities. It has begun to convene strategic dialogues around key challenges and collectively owned opportunities. Its initial framing is globally relevant and focused on the Arabian Gulf region through a proposed test bed for collaboration with the member states of the Gulf Cooperation Council (GCC). This will allow new tools for interoperability to be explored and created together as enablers of joint capability. Drawing on the experiences of NATO’s Partnership for Peace, it will promote an innovative systems approach that could help cultivate and sustain more effective security partnerships around the globe.

April 1, 2015

Responding to Russia after the NATO Summit: Unmanned Aerial Systems Overmatch in the Black Sea

The Ukraine conflict poses unique and asymmetric challenges to the international community. Since the earliest days of the Crimean crisis, Russian support of “separatists” within Ukraine has ranged from plainclothes thugs to more traditional uniformed troops, munitions, and other forms of aid. Some of the individuals involved may have had links to the Russian military or its intelligence community. While much of the aid comes through the porous border between Russia and Ukraine, Russia also leverages the opportunity to use Black Sea smugglers as a way to supply ongoing rebellions or to initiate new revolts. Two Black Sea–bordering regions, Odessa and Transnistria, are home to active pro-Russian movements that could potentially evolve into a pro-Russian state. Worries of Russia supplying separatists via illicit movements on the Black Sea and generally advancing its Novorossyia claims should be matched to a general concern over Black Sea smuggling rings, which traffic humans, weapons, and nuclear materials into Europe via Odessa’s port.

March 1, 2015

Defense Partnerships: Documenting Trends and Emerging Topics for Action

Public-public and public-private and partnerships (P4s) are time-proven effective solutions for delivering public services at reasonable costs when deployed and managed properly. Various U.S. agencies and international organizations all have longstanding successful P4 initiatives and projects. Recently, Department of Defense (DOD) leaders have expressed increased interest in implementing P4s throughout their organizations. As DOD is faced with evolving roles and missions in an “unpredictable and complex world amid fiscal constraints, the expertise and involvement of the private sector and other public organizations will be essential.” P4s could be ideal tools intended to “further policy objectives, enhance U.S. operational capabilities, reduce costs, gain access to nonmilitary expertise or assets, or build greater capacity in partners.”

July 1, 2013

Valued Sustainable Services: Building Partnership Capacity Through Collaborating Approaches

The Valued Sustainable Services (ValSServ) concept is an approach to building the capacity of local populations. It emphasizes the interdependency among telecommunications, reliable power, and information-sharing support, and encourages projects to be developed in integrated packages rather than in stove-piped lines of effort. ValSServ focuses on bottom-up projects in complex civil-military operations that can be funded, planned, and executed at local levels, while being consistent with top-down national and theater strategies. It takes a system-of-systems approach, recognizing that successful projects can generate positive ripple effects in local environments and throughout extended networks. This paper focuses on ValSServ within the wide range of U.S. Department of Defense operating environments, such as capacity-building to help shape peacetime conditions in partner nations, post-disaster recovery, and helping to move from the “hold” to the “build” phases in counterinsurgency operations.

July 1, 2013

Sharing to Succeed: Lessons from Open Information-sharing Projects in Afghanistan

The sharing of information in complex civil-military operations is important, yet actors rarely do it well. U.S. and allied military forces must be able to communicate, collaborate, and exchange information effectively with the local populations they seek to influence, or they cannot achieve the goals for which they have been committed. Nonetheless, experience from stability operations in Afghanistan and Iraq, numerous humanitarian assistance/disaster relief missions, and efforts to build the capacity of foreign partners suggest that effective information-sharing is much harder than might be expected. This paper sheds light on the difficulties of setting up and sustaining projects to share information in such situations and suggests ways to do better in the future.

July 1, 2013

Valued Sustainable Services: Building Partnership Capacity Through Collaborating Approaches

The Valued Sustainable Services (ValSServ) concept is an approach to building the capacity of local populations. It emphasizes the interdependency among telecommunications, reliable power, and information-sharing support, and encourages projects to be developed in integrated packages rather than in stovepiped lines of effort. ValSServ focuses on bottom-up projects in complex civil-military operations2 that can be funded, planned, and executed at local levels, while being consistent with top-down national and theater strategies. It takes a system-of-systems approach, recognizing that successful projects can generate positive ripple effects in local environments and throughout extended networks. This paper focuses on ValSServ within the wide range of U.S. Department of Defense operating environments, such as capacity-building to help shape peacetime conditions in partner nations, post-disaster recovery, and helping to move from the “hold” to the “build” phases in counterinsurgency operations.

Oct. 1, 2012

Public-Private Cooperation in the Department of Defense: A Framework for Analysis and Recommendations for Action

In 2010, a National Defense University (NDU) research project called TIDES (Transformative Innovation for Development and Emergency Support) was invited to partner with a company to produce a tradeshow about humanitarian assistance and disaster relief missions and related capabilities. Despite senior-level Department of Defense (DOD) guidance to pursue public-private partnerships, DOD attorneys told TIDES managers to reject the agreement. Differing legal interpretations of the word partner generated concern that the proposed partnership could create an impermissible perception of government endorsement of a private company. Even though it would have advanced the government’s mission and promoted efficiency, a variety of obstacles scuttled the proposed cooperation.

Sept. 1, 2012

Toward the Printed World: Additive Manufacturing and Implications for National Security

Additive manufacturing (AM)—commonly referred to as “three-dimensional” or “3D” printing—is a prospective game changer with implications and opportunities that affect not just the Department of Defense (DOD) but the economy as a whole. The technology allows the “art to part” fabrication of complex objects from a computer model without part-specific tooling or human intervention.1 AM has already impacted a variety of industries and has the potential to present legal and economic issues with its strong economic and health-care benefits. Because of its remarkable ability to produce a wide variety of objects, AM also can have significant national security implications. The purpose of this paper is to provide a general introduction to these issues for nontechnical readers through a survey of the recent history and the current state of technology. Included in this paper is a brief review identifying key individuals and organizations shaping developments as well as projected trends.

Aug. 1, 2012

Preparing the Pipeline: The U.S. Cyber Workforce for the Future

In 2008, the Comprehensive National Cybersecurity Initiative listed “expanded cyber education” as one of its key recommendations. In 2009, the Partnership for Public Service produced a report stating that the current pipeline of cybersecurity workers into the government was inadequate. In the same year, Secretary of Defense Robert Gates stated that the military was “desperately short of people who have the capabilities [to operate in cyberspace].” And in 2011, the Inspector General of the Federal Bureau of Investigation reported that 35 percent of the special agents investigating national security cyber-intrusion cases lacked necessary training and technical skills. Nonetheless, the U.S. Government and private sector still seek to increase their online operations and dependency in spite of these shortcomings. An expert at the Atlantic Council of the United States sums up this problem: “cyber workforce management efforts resemble a Ferris wheel: the wheel turns on and on . . . we move, but around and around, never forward.”

Jan. 1, 2011

Maximizing the Returns of Government Venture Capital Programs

The stories of Google and Segway certainly end differently. With a market capitalization of over $180 billion, Google is arguably the biggest success in the information technology (IT) industry in the last decade. The phrase google it has worked its way into everyday language and dictionaries. On the other hand, Segway remains a privately held company whose products are largely relegated to use by tourists in major cities and security personnel at airports. We certainly do not hear people say that they “segwayed” to work this morning.

Dec. 1, 2009

STAR–TIDES and Starfish Networks: Supporting Stressed Populations with Distributed Talent

The Department of Defense increasingly is involved in postwar stabilization and reconstruction, humanitarian assistance and disaster relief missions, capacity-building of partner nations at home and abroad, and other such complex operations. To provide sustainable support to stressed populations in these environments, an international, networked, knowledge-sharing research project called Sustainable Technologies, Accelerated Research–Transformative Innovation for Development and Emergency Support (STAR–TIDES) encourages innovative approaches to public-private collaboration, whole-of-government solutions, and transnational engagement. It leverages a distributed network of people and organizations to conduct research, support real world contingencies, and bridge gaps among disparate communities.

Nov. 1, 2009

To Build Resilience: Leader Influence on Mental Hardiness

The military profession is inherently stressful and is getting more so for U.S. troops, who are deploying more often and for longer periods of time on missions that are multifaceted, changeable, and ambiguous. Such stressful conditions can lead to a range of health problems and performance decrements even among leaders. But not everyone reacts in negative ways to environmental stress. Most people remain healthy and continue to perform well even in the face of high stress levels. While much attention in recent years has focused on identifying and treating stress-related breakdowns such as post-traumatic stress disorder, scant investment has gone toward the study of healthy, resilient response patterns in people.

Sept. 1, 2009

Cyberspace and the “First Battle” in 21st-century War

Wars often start well before main forces engage. In the 19th and early 20th centuries, combat often began when light cavalry units crossed the border. For most of the 20th century, the “first battle” typically involved dawn surprise attacks, usually delivered by air forces. While a few of these attacks were so shattering that they essentially decided the outcome of the struggle or at least dramatically shaped its course—the Israeli air force’s attack at the opening of the June 1967 Six-Day War comes to mind—in most cases the defender had sufficient strategic space—geographic and/or temporal—to recover and eventually redress the strategic balance to emerge victorious. The opening moments of World War II for Russia and the United States provide two examples.

May 1, 2009

Breaking the Yardstick: The Dangers of Market-based Governance

In the middle of the last century, America became a superpower. It happened, in part, because of a well-balanced technological partnership between the Federal Government and commercial sector. After winning a world war against fascism, this public-private alliance went on to cure infectious diseases, create instant global communications, land humans on the Moon, and prevail in a long Cold War against communism. This, and more, was accomplished without bankrupting the Nation’s economy. The partnership’s record of service to the American people and the world has been remarkable.

March 1, 2009

A 21st-century Concept of Air and Military Operations

The evolution of 21st-century air operations is unfolding under the impact of a new generation of fighter aircraft and a significant shift in the role of air operations in support of ground and maritime forces. So-called fifth-generation aircraft often are mistakenly viewed as simply the next iteration of airframes: fast, stealthy replacements of obsolescent legacy platforms. In fact, the capabilities of fifth-generation aircraft, and their integration into a network-centric joint force, will change the roles of manned fighter aircraft in air, ground, and maritime operations. These changes are so far-reaching that the Services face the challenge of crafting a new concept of 21st-century air operations, indeed, of all combat operations.

Jan. 1, 2009

From Sputnik to Minerva: Education and American National Security

This paper examines how external challenges have prompted national investments in education to enhance American national security. Rather than focusing primarily on traditional professional military education, this analysis examines how education has been used as a tool of American power. Four major moments of transformation in the international system are surveyed to illustrate a link between strategic educational capacity, defined as the application of attained knowledge and skills, and national power. The study then assesses how education is used as a power asset in the contemporary security environment. Today, an important educational capacity is emerging in the new Minerva program in the Department of Defense and other transformational educational concepts with security applications. Education is gaining an increasing interest among American decisionmakers as a strategic component of American power and an essential asset for successful military operations in the new global security environment.

Nov. 1, 2008

Lessons of Abu Ghraib: Understanding and Preventing Prisoner Abuse in Military Operations

The abuse of prisoners by U.S. Soldiers at Abu Ghraib had broad strategic consequences, leading many people around the world to question the legitimacy of U.S. goals and activities in Iraq. This paper draws on extensive unclassified reports from multiple investigations that followed Abu Ghraib, and applies key psychological as well as social-situational perspectives to develop a better grasp of the causative factors. From a psychological standpoint, most young adults are powerfully inclined to behave in accord with the social conventions and pressures around them. Especially in ambiguous circumstances, then, it is important that standards of behavior be clear and explicit throughout all phases of an operation and that leaders at all levels represent and reinforce those standards.

May 1, 2008

The Role of Medical Diplomacy in Stabilizing Afghanistan

Comprehensive stabilization and reconstruction of Afghanistan are not possible given the current fragmentation of responsibilities, narrow lines of authorities, and archaic funding mechanisms. Afghans are supportive of U.S. and international efforts, and there are occasional signs of progress, but the insurgent threat grows as U.S. military and civilian agencies and the international community struggle to bring stability to this volatile region. Integrated security, stabilization, and reconstruction activities must be implemented quickly and efficiently if failure is to be averted. Much more than a course correction is needed to provide tangible benefits to the population, develop effective leadership capacity in the government, and invest wisely in reconstruction that leads to sustainable economic growth. A proactive, comprehensive reconstruction and stabilization plan for Afghanistan is crucial to counter the regional terrorist insurgency, much as the Marshall Plan was necessary to combat the communist threat from the Soviet Union.1 This paper examines the health sector as a microcosm of the larger problems facing the United States and its allies in efforts to stabilize Afghanistan.

Feb. 1, 2008

So Many Zebras, So Little Time: Ecological Models and Counterinsurgency Operations

Force ratios are an important variable in warfare and in nature. On the Serengeti, large zebra herds are constantly hunted by small prides of lions. But with their overwhelming majority, why don’t the zebras unite and attack the lions? Hooves can be as deadly as claws when used correctly. And conversely, if the lions are such effective predators, why are there so many zebras?

Jan. 1, 2008

Cyber Influence and International Security

Cyber influence is an ongoing source of power in the international security arena. Although the United States has an enormous cyber information capacity, its cyber influence is not proportional to that capacity. Impediments to American cyber influence include the vastness and complexity of the international information environment, multiplicity of cultures and differing audiences to which communications must be addressed, extensiveness and significance of contending or alternative messages, and complexity and importance of using appropriate influential messengers and message mechanisms.

Jan. 1, 2008

Strategic Fragility: Infrastructure Protection and National Security in the Information Age

Modern societies have reached unprecedented levels of prosperity, yet they remain vulnerable to a wide range of possible disruptions. One significant reason for this growing vulnerability is the developed world’s reliance on an array of interlinked, interdependent critical infrastructures that span nations and even continents. The advent of these infrastructures over the past few decades has resulted in a tradeoff: the United States has gained greater productivity and prosperity at the risk of greater exposure to widespread systemic collapse. The trends that have led to this growing strategic fragility show no sign of slowing. As a result, the United States faces a new and different kind of threat to national security.

Dec. 1, 2007

Organizing for National Security: Unification or Coordination?

Experience gained from the 9/11 attacks, combat in Iraq and Afghanistan, disaster assistance during and after Hurricane Katrina, and the ongoing war on terror provides the basis for amending our anachronistic national security structures and practices. Many analysts and officials have called for a second-generation version of the Goldwater-Nichols Department of Defense Reorganization Act of 1986 to address the array of organizational and management challenges that we face. Some argue that the new security environment requires even more fundamental change, similar to what was enacted after World War II. The principal legislation that emerged from that era was the National Security Act of 1947. Goldwater-Nichols aimed to fix inter-Service problems by streamlining the chain of command and promoting “jointness” but did not fundamentally alter the structure of the U.S. military.

Sept. 1, 2007

The Comprehensive Approach Initiative: Future Options for NATO

Experience has shown that conflict resolution requires the application of all elements of national and international power— political, diplomatic, economic, financial, informational, social, and commercial, as well as military. To resolve conflicts or crises, the North Atlantic Treaty Organization (NATO) should adopt a Comprehensive Approach that would enable the collaborative engagement of all requisite civil and military elements of international power to end hostilities, restore order, commence reconstruction, and begin to address a conflict’s root causes. NATO can provide the military element for a comprehensive approach. Many other national, international, and nongovernmental actors can provide the civilian elements.

July 1, 2007

Privatizing While Transforming

The Armed Forces of the United States are designed to be supported by capabilities provided by civilians. The Army, for example, depends not only on Reserve and National Guard components for warfighting elements, but also on private contractors for numerous roles no longer performed by military personnel. Originally working in small contingents focused on logistical functions, private contractors now rival military personnel in number in the battlespace. In addition to providing direct logistical support to the military, contractors perform equipment maintenance and reconstruction work, train military and police, and work as civil affairs staff, interpreters, and even interrogators. They also provide private armed security services. The issues arising from new roles are exacerbated by the growth of the contractor population in conflict zones at a pace that defies effective recordkeeping.

June 1, 2007

Responding in the Homeland: A Snapshot of NATO’s Readiness for CBRN Attacks

The possibility of North Atlantic Treaty Organization (NATO) members having to respond to a chemical, biological, radiological, or nuclear (CBRN) incident is not a hypothetical scenario reserved for training exercises. Indeed, a number of countries worldwide have considerable experience in dealing with a variety of naturally occurring, accidental, and deliberate CBRN incidents. NATO itself, however, has no clear conceptual vision of its role in civil emergencies because preparedness of this sort remains a national responsibility.

Feb. 1, 2007

I-Power: The Information Revolution and Stability Operations

Information and information technology (I/IT) can significantly increase the likelihood of success in stability operations— if they are engaged as part of an overall strategy that coordinates the actions of outside intervenors and focuses on generating effective results for the host nation. Properly utilized, I/IT can help create a knowledgeable intervention, organize complex activities, and integrate stability operations with the host nation, making stability operations more effective.

Aug. 1, 2006

Lee’s Mistake: Learning from the Decision to Order Pickett’s Charge

At the Battle of Gettysburg, Robert E. Lee made a mistake that doomed the hopes of the Confederate States of America to compel the United States to sue for peace. Why one of the great generals of his time made such a blunder continues to be a topic of research and intense debate. Lee said little at the time or afterward to justify his decision to launch what has become known as Pickett’s Charge, so analysis must be inferential and inconclusive. Our aim is to explain Lee’s fateful decision not with new facts but with new analytical methods to illuminate decisionmaking in combat.

July 1, 2006

Countering Terrorism Across the Atlantic?

Differences in strategic vision and concepts of security are central to the U.S. and European Union (EU) approaches to counterterrorism. While the United States conceives of a war against terrorism, Europe does not. As a result of different perceptions of the threat, both sides of the Atlantic take divergent approaches to homeland security. Europeans tend to favor the use of a law enforcement strategy over a warfighting approach. Meanwhile, the U.S. administration believes that a quasi-militaristic, overtly proactive, and highly vigilant stance will serve as the best deterrent to future attacks. By their own standards, Europeans are doing more to counter terrorism since September 11 and even more since the attacks in Madrid (March 11, 2004) and in London (July 7, 2005); by U.S. standards, these measures sometimes appear inadequate. As a result, there are significant transatlantic divergences on the best methods for halting the spread of terrorism.

March 1, 2006

Creating a NATO Special Operations Force

In the post-9/11 security environment, special operations forces (SOF) have proven indispensable. SOF units are light, lethal, mobile, and easily networked with other forces. While the United States and its North Atlantic Treaty Organization (NATO) allies have extensive SOF capabilities, these forces are not formally organized to collaborate with one another. There would be much to gain if U.S. and allied SOF trained to work together: national SOF assets would be improved, obstacles to effective combined operations would be removed, and a coherent Alliance capability would be readily available for NATO. The Alliance can focus and grow its SOF capabilities by providing a selective and small combined “inner core” of NATO special operations forces for operations, while using an outer network to expand and improve SOF cooperation with interested allies.

Feb. 1, 2006

Custer in Cyberspace

The combination of abundant networked information and fluid, unfamiliar situations in the current era makes it at once possible and imperative to improve decisionmaking in combat. The key to improvement is to integrate faster reasoning and more reliable intuition into a cognitive whole to achieve battle-wisdom. Although the technologies that both demand and facilitate battle- wisdom are new, military history holds lessons on combining reasoning and intuition in conditions of urgency, danger, and uncertainty.

Oct. 1, 2005

Sweden’s Use of Commercial Information Technology for Military Applications

Sweden, a nation of only 9 million people with a political climate that has fostered a posture of nonalignment for over half a century, has nevertheless maintained highly credible, modern, and high-technology military forces. Sweden has expanded the mission of forces originally designed for the Cold War to include international peacekeeping. The focus of this study is the Swedish formula for achieving the high-technology military capabilities that successfully compensate for a small standing force. What policies and processes enabled the Swedish military to take advantage of leading-edge producers of commercial information technology (CIT)? What lessons does the Swedish model hold for the U.S. Department of Defense?

Oct. 1, 2005

Russia and NATO: Increased Interaction in Defense Research and Technology

As a member of both the Partnership for Peace and the North Atlantic Treaty Organization (NATO)–Russia Council (NRC), Russia enjoys remarkable status in an alliance formed principally to counter Soviet aggression. Active participation in one additional element of NATO—the Research and Technology Organization (RTO)—would offer unique opportunities to enhance relationships and mutual security. The RTO is the largest organization of its type in the world, has an extremely active program of work, and is eager to work with Russia.

July 1, 2005

The Changing Landscape of Defense Innovation

In a rapidly evolving business environment, many successful companies have transformed themselves by reexamining their core missions and competencies and exploiting innovation in nontraditional ways. General Electric still manufactures products but now identifies itself as a services company. Wal-Mart has become the premier retailer by capitalizing on its logistics and support systems. These two giants and other companies have realized that they can become more profitable by exploiting new regions of the business landscape.

May 1, 2005

A New Military Framework for NATO

Although Americans and Europeans do not always agree on political strategies in the Middle East, they have a compelling reason to reach an accord on the need to strengthen North Atlantic Treaty Organization (NATO) military forces for future operations in that region and elsewhere. If adequate military capabilities are lacking, the Alliance will not be able to act even when its political leaders agree on the need to do so. But if it creates such capabilities, it will be able to act either ad hoc or across the board if a common political strategy eventually were to emerge.

Dec. 1, 2004

Military Transformation and Joint Experimentation: Two Views from Above

Military transformation— “a process that shapes the changing nature of military competition and cooperation through new combinations of concepts, capabilities, people and organizations”— is on the minds and agendas of everyone dealing with the military. Many people talk about transformation; the two authors of this Defense Horizons have done something about it. In fact, they are among the few who have been responsible for shaping and implementing the concept. To get a better idea of what goes into this process, particularly the element of joint experimentation that is helping to identify and define the nature of change, Defense Horizons presents the views of two of America’s leading military officers who have been involved in the process.

Sept. 1, 2004

Needed—A NATO Stabilization and Reconstruction Force

At the Istanbul Summit in June 2004 , NATO endorsed the further transformation of military capabilities to make them “more modern, more usable, and more deployable to carry out the full range of Alliance missions.” The Istanbul Communiqué especially called for continuing progress on the NATO Response Force and the Prague Capabilities Commitments.

July 1, 2004

Defense Laboratories and Military Capability: Headed for a BRACdown?

For 150 years, military laboratories have made vital contributions to national defense. In recent years, they have been significantly reduced in number by several rounds of base realignment and closure (BRAC). Even so, they remain the primary source of internal technical competence within the Department of Defense (DOD). Their capability in that role will depend on how DOD answers two questions. Is there excess laboratory capacity - too many laboratories relative to forecasts of future force structure? What is their military value - their likely contribution to the future operational needs of warfighters.

July 1, 2004

Global Networks: Emerging Constraints on Strategy

If current trends in communications technologies and services persist, the United States will be hard pressed to keep a strategic advantage in network capability. The international telecommunications system is rebalancing into four major centers of influence and innovation. Within ten years, Europe, India, and China will have the same technological and innovative capabilities in telecommunications as the United States. This shift is problematic for U.S. national security, because the global telecommunications infrastructure is becoming an important strategic battlespace—the physical battlefield of information warfare. Understanding the dynamic of regional balancing is critical to shaping U.S. responses.

July 1, 2004

NATO Technology: from Gap to Divergence?

A widening technology gap between the United States and other NATO members will challenge the ability of NATO to function as a cohesive, multinational force. Over several decades, great disparities in the funding of defense research and technology by NATO members has produced a widening technological gap that threatens to become a divergence - a condition from which the Alliance may not be able to recover. The technology gap, in turn, is creating a capabilities gap that undercuts the operational effectiveness of NATO forces, including the new NATO Response Force.

July 1, 2004

Alternative Approaches to Army Transformation

Army transformation is an attempt to provide future forces with enhanced capabilities in lethality, survivability, and mobility, both strategic and tactical. Alternatives to achieving these goals differ in emphasis on weight and reliance on technology. That is, transformation plans differ if the objective is weight reduction as opposed to weight redistribution. In one approach, platform weight is reduced to meet mobility goals. However, shedding weight has implications for platform survivability and lethality; previous attempts to design a single platform that is simultaneously lethal, mobile, and survivable have not done so satisfactorily. Thus, advances in materials are required to insure the survivability of a lightweight platform. Advances in network technology are also required to make the platform more aware of its environment. The immaturity of these technologies increases the risks inherent in transformation based strictly on platform characteristics.

April 1, 2004

Responsive Space and Strategic Information

American strategists face a daunting challenge; they must assure and defend American and allied interests, induce and encourage international security cooperation, and deter, dissuade, and defeat a diverse range of potential adversaries. This challenge has been addressed by senior political leadership in recent policy statements, such as the Nuclear Posture Review of 2002, and in the formation of an expanded U.S. Strategic Command, but this vision has not yet taken root in the Department of Defense components responsible for providing operational capability.

April 1, 2004

The Science and Engineering Workforce and National Security

Trends in the American science and engineering (S&E) workforce and national research and development (R&D) funding patterns and priorities have troubling implications for the economic and national security of our nation.

Jan. 1, 2004

Dirty Bombs: The Threat Revisited

Nuclear radiation, invisible and detectable only with special instruments, has the power to terrify—in part because of its association with nuclear weapons—and to become an instrument of terrorists. Radioactive isotopes can be spread widely with or without high explosives by a radiological dispersion device (RDD) or so-called dirty bomb. This paper provides a general overview of the nature of RDDs and sources of material for them and estimates the effects of an assault, including casualties and economic consequences. Many experts believe that an RDD is an economic weapon capable of inflicting devastating damage on the United States. This paper is in full agreement with that assessment and makes some quantitative estimates of the magnitude of economic disruption that can be produced by various levels of attack. It is also generally believed that even a very large RDD is unlikely to cause many human casualties, either immediately or over the long term. A careful examination of the consequences of the tragic accident in Goiânia, Brazil, however, shows that some forms of radiological attack could kill tens or hundreds of people and sicken hundreds or thousands. Nevertheless, contrary to popular belief, RDDs are not weapons of mass destruction.

Jan. 1, 2004

XVIII Airborne Corps: Spearhead of Military Transformation

War transforms armies. Combat accelerates transformation by moving it out of the realm of academic debate and endless speculation about the future to a pragmatic approach focused on fielding new capabilities within new combat formations as soon as possible. In war, transformation means conserving equipment and operational methods that are still relevant while incorporating new technologies, tactics, and organizations that enable victory. It is nearly impossible to replicate in peacetime training the true conditions of land warfare—ambiguity, uncertainty, and above all terror, killing, and exhaustion. For the Army, the best opportunity to transform involves parallel evolution, a method that moves new technologies into combat formations today and explores what the troops will actually do with them in action. With a conflict in progress, this approach is better than trying to predict future uses in an inflexible operational requirements document developed in isolation from the field environment.

Nov. 1, 2003

Hydrogen as a Fuel for DOD

Energy issues have been at the center of the national security debate for some time, and the current situation in the Persian Gulf underscores the strategic importance of sound energy policy. Activities or developments—geopolitical, environmental, technological, or regulatory—that materially change the energy security equation are, naturally, of great interest to the Department of Defense (DOD). The announcement by President George Bush in his State of the Union address that he intends to accelerate research and development (R&D) for hydrogen-powered vehicles toward the objective of total U.S. energy independence has great potential impact on DOD. This paper examines a number of technical issues connected with energy independence through hydrogen and how they might affect DOD. We conclude that the move to a hydrogen economy will be a massive undertaking, requiring large investments and decades to accomplish. We will show that, with few exceptions, pure hydrogen is not a viable fuel for DOD missions, primarily because of the DOD requirement for compact, high-volumetric energy density power sources. As a result, to meet its unique needs, DOD likely will have to increase its dependence on nuclear power and support R&D that investigates ways to use hydrogen to synthesize hydrocarbon fuels in an environmentally compliant fashion. Several suggestions and recommendations will be made in this regard.

Nov. 1, 2003

Alternative Governance: A Tool forMilitary Laboratory Reform

Throughout the Cold War, the United States maintained an edge over adversaries by fielding technologically superior warfighting systems. This strategy depended on a strong research and development (R&D) effort in both the public and private sectors, and the community of military laboratories in the Department of Defense played an essential role in the overall effort. Because of the importance of these labs during the Cold War, defense planners continually focused on ways to improve and strengthen them.