Results:
Category: PRISM Journal

Jan. 10, 2020

The Future of Leadership: Rise of Automation, Robotics, and Artificial Intelligence

It seems like we are continuously bombarded with prophecies about how Artificial Intelligence (AI) and all of its permutations—from quantum computing and machine learning to RPA and Skynet—will radically change just about everything we do.1 However, much of its potential (whether as promise or pariah) remains prospective, more speculative than real.

Jan. 10, 2020

“Thinking About What Could Be” An Interview with General John M. Murray, Commanding General, Army Futures Command

Army Futures Command is an adaptation to the on-going change in the international order we have seen since the end of World War Two. The rules of the road for international order have changed; Russian destabilization of Ukraine, Chinese assertiveness in the South China Sea, and the inevitable shift from an Atlantic-based global economy to a Pacific-based economy.

Jan. 10, 2020

A Small State Perspective on the Evolving Nature of Cyber Conflict: Lessons from Singapore

Cyber conflicts among states are still largely driven by geopolitical and political considerations and should not be seen as separate from other kinds of conflict or political objectives. Brandon Valeriano, Benjamin Jensen, and Ryan Maness observe that modern cyber strategies are neither new nor revolutionary and that actions in cyberspace fall into “a domain of limited coercive actions designed to alter the balance of information as well as manage escalation risks in long-term competitive interactions.” Cyber operations may offer new ways to test the robustness of networks, control messaging, or degrade a network, but they do not fundamentally change great power competition or the hierarchy of states in the international system.

Jan. 10, 2020

The Challenges Facing 21st Century Military Modernization

When a military organization undertakes a modernization program, it is intuitive to expect that existing capabilities are going to be replaced by superior capabilities. There is an implied suggestion that a necessary (though not sufficient) condition of this superiority is enhanced lethality; lethality surely constitutes a necessary condition of the strategic effectiveness of the military organization in question. At the risk of stating the obvious, military organizations around the world exist to protect the security of their respective countries: in peacetime, by deterring the adversaries of the country from waging war, and in wartime, by defeating these adversaries should they choose the war option. These two missions are not mutually exclusive: “The surest way to prevent war is to be prepared to win one.” Nevertheless, it is possible to question the extent to which lethality subsequently connects to strategic effectiveness, which is understood here as the ability to win wars. In other words, while modernization ought to result in a military organization that is more lethal than before, this enhanced lethality does not guarantee strategic effectiveness.

Jan. 10, 2020

The Ethics of Acquiring Disruptive Technologies: Artificial Intelligence, Autonomous Weapons, and Decision Support Systems

Reluctance to develop AI applications for military purposes is not going to go away as the development, acquisition, and employment of these systems challenge the traditional norms associated with not just war­fighting but morality in general. Meanwhile, as the debate rages, adversaries of the United States who do not have these ethical concerns continue with their development. China, for example, has vowed to be the leader in AI by 2030. No one should have any illusions that the Chinese will not use this dominance for military as well as civilian purposes. So, to maintain parity, if not advantage, DOD has little choice but to proceed with the development and employment of artificially intelligent systems. As it does so, ethical concerns will continue to arise, potentially excluding important expertise for their development. To include this expertise, DOD needs to confront these concerns upfront.

Jan. 10, 2020

Killing Me Softly: Competition in Artificial Intelligence and Unmanned Aerial Vehicles

The conduct of war is being fundamentally altered by the revolutionary impact of artificial intelligence (AI). The competition in AI and unmanned aerial vehicles (UAVs) marks the onset of the “7th Military Revolution” and the states that integrate these advances first will have a prodigious military advantage.” China has seized this moment, increasingly posing a risk to the historical technological advantage of the United States and destabilizing the foundations of modern warfare.

Jan. 9, 2020

Minds at War: China’s Pursuit of Military Advantage through Cognitive Science and Biotechnology

The United States is starting to confront unprecedented challenges to the military and technological superiority that it has enjoyed in recent history. The People’s Republic of China (PRC) is emerging as a powerhouse across a range of emerging technologies, and Chinese leaders recognize today’s technological revolution as a critical, even historic, opportunity to achieve strategic advantage. As Chairman of the Central Military Commission (CMC) and Commander-in-Chief of the CMC Joint Operations Center, Chinese Communist Party (CCP) General Secretary Xi Jinping has highlighted the importance of military innovation to “keep pace with the times” (与时俱进) and adapt to the global revolution in military affairs.

Jan. 9, 2020

Strategic Competition for Emerging Military Technologies: Comparative Paths and Patterns

One of the most pressing issues in contemporary international relations is the expectation of a new era of intensifying strategic competition, characterized by the confluence of political, economic, and military-technological competitions in the context of major shifts in the global security environment.1 At the forefront of this growing strategic rivalry is the contest for future supremacy over global security and economic institutional grids between the world’s major military powers—the United States, China, and to a lesser degree, Russia.

Jan. 9, 2020

Redefining Neuroweapons: Emerging Capabilities in Neuroscience and Neurotechnology

While many types of weaponizable neuroscience and technology (neuroS/T) have been addressed in and by extant forums, treaties, conventions, and laws, other newer techniques and technologies have not. Thus, particular advances in neuroS/T have an increased potential for dual use and direct use in warfare, intelligence, and national security (WINS). In this light, this article (1) presents the WINS utility and possible applicability of gene editing methods, nanoparticles, and other tools that can modify the central nervous system; (2) discusses the value and vulnerabilities of big data and bio-cybersecurity in WINS; (3) posits how such developments bring into stark relief existing gaps in international biological and chemical weapons conventions; and (4) proposes steps toward rectification of current and future oversight and governance.

Jan. 9, 2020

Directed Energy Weapons Are Real . . . And Disruptive

What exactly is a directed energy weapon? Are these weapons still science fiction, lab experiments, or are they real? How can they be used and how disruptive can they be? What are the challenges and next steps? This article will examine answers to these questions.

Jan. 9, 2020

The Worst Possible Day: U.S. Telecommunications and Huawei

As a global power, the United States must be able to sustain military forces and project power anywhere in the world, even in the face of resistance from a sophisticated adversary with the ability to infiltrate or disrupt telecommunications and other critical infrastructure within the United States, in space, under the ocean, and in other regions of the world. Policy must consider the worst possible day, not the routine day.

Jan. 9, 2020

Cyber Physical Systems: The Coming Singularity

At this moment, a subtle but fundamental technological shift is occurring that is uniting our digital and physical worlds at the deepest architectural and operational levels. This technological shift will alter the global business, government, military and intelligence ecosystems. It is nothing less than a technological singularity and this technology will forever change our world—it is called Cyber Physical Systems (CPS).

May 14, 2019

Diplomatic Security: A Comparative Analysis

In In this new book, two adept editors, Eugenio Cusumano and Christopher Kinsey, combine and edit the work of eleven authors’ different looks at diplomatic security as practiced in nine countries—China, France, Germany, Israel, Italy, Russia, Turkey, the United Kingdom, and the United States—as well as some overall themes on the subject. The result is perhaps the most comprehensive public study of the topic released to date, and the work stands as a reminder of the high price nations have paid in pursuit of diplomacy, as well as the difficulties and tradeoffs of balancing diplomatic efforts and the security operations meant to protect them.

Nov. 8, 2018

The Fight So Far

Achieving significantly greater strategic success against terrorism remains within America’s grasp, but only if we are willing to be as adaptive and flexible—indeed more so—than our terrorist adversaries have proven to be. Achieving this will require us to make investments, adopt practices, and make choices we previously have not. Although the U.S. Government (USG) has frequently claimed to take a whole-of-government approach in utilizing all elements of national power to fight terrorism, our struggle against the Islamist State of Iraq and Syria (ISIS) has demonstrated that we must strengthen our emphasis and resourcing of non-kinetic counterterrorism (CT) efforts to match the strengths that we and our allies have developed since 9/11 in kinetic efforts.

Nov. 8, 2018

NATO's Adaptation in an Age of Complexity

Successful and lasting organizations must adapt quickly, and militaries are not exempt from that requirement—even less so than their civilian counterparts, because preparing for past wars generally has dire consequences for them, and for their countries. NATO, as the hub for transatlantic and European security it has strived to be for the past 70 years, is undergoing a significant structural upheaval, as it wishes to stay relevant to contemporary threats and challenges, while putting itself in a position to keep an edge on any potential opponent in the foreseeable future.

Nov. 8, 2018

Examining Complex Forms of Conflict: Gray Zone and Hybrid Challenges

The Joint Force, and the national security community as a whole, must be ready and able to respond to numerous challenges across the full spectrum of conflict including complex operations during peacetime and war. However, this presupposes a general acceptance of a well understood taxonomy describing the elements that constitute the “continuum of conflict.” The U.S. security community lacks this taxonomy, despite its engagement in a spate of diverse conflicts around the globe from the South China Sea, to Ukraine, Syria, Iraq, and beyond. Partially as a result of this conceptual challenge, we are falling behind in our readiness for the future. Understanding our future security challenges demands that we reflect and interpret the past, understand the present, and think rigorously about what lies over the horizon in order to adapt to the changing character of conflict. This requires keeping an open and informed mind about the breadth of the various modes of conflict that exist. The wars of the 21st century may take many forms. As conflict reflects a greater degree of convergence and complexity, so must our mental models and frameworks.

Nov. 8, 2018

The Mandate to Innovate

Delivering decision advantage to a policymaker or situational awareness to a warfighter is becoming a more competitive challenge. As geospatial and AAA technologies increase in capability and availability—both within the United States and allied GEOINT enterprise as well as for our adversaries—the complexity of that mission increases. Empowering rapid experimentation and innovation, adapting new business models (particularly those that have proven successful to the business world), and applying the breadth of the means availability to us to acquire new capabilities are ways for us to continuously replenish the nation's GEOINT advantage.

Nov. 8, 2018

Economic and Financial Sanctions in U.S. National Security Strategy

The U.S. Government (USG) has increased the use of economic and financial sanctions against other states and non-state actors in the post–Cold War era, refining their design to improve precision. Achieving desired effects with sanctions, however, requires careful assessment of target vulnerabilities, available U.S. leverage, orchestration with other policy tools, and potential obstacles and risks.

Nov. 8, 2018

Learning and Innovation: Jordan at the "Crossroads of Armageddon"

A recurring feature of the past few decades is the presence of the nation’s three principal national security institutions (the 3Ds)—Department of State (DOS), U.S. Agency for International Development (USAID), and Department of Defense (DOD)—operating in complex environments abroad marked by conflict, crisis, and state fragility. This paradigm, dubbed the “new normal” by many, begs a few questions. What are we learning from these critical missions undertaken in pursuit of national security? Are we adjusting our strategies to maximize the prospects for prevention of conflict based on that learning? Is innovation occurring that enables us to work better together to address challenges in these environments? Of keen interest is what the 3D did to address the unique challenges in Jordan, and how. Understanding both the “what” and the “how” might reveal if we are learning and innovating.

Nov. 8, 2018

Post–Conflict Stabilization: What Can We Learn from Syria?

Trying to draw lessons, even initial ones, from the U.S. experience in Syria is daunting, but the bottom line is that any conflict setting—and any effort to design a program of stabilization—brings a unique set of peculiarities that may not resemble conflicts in which we have been involved in the past. The Syria experience, where there is no central government with which the United States and others in the international community can partner with and empower, is an excellent example, and suggests a need for careful analysis of the specific circumstances of settings in which the United States may find itself operating in order to develop stabilization doctrine and tools that are suited not only to the last conflict, but to the next one.

Nov. 8, 2018

The Machine Beneath: Implications of Artificial Intelligence in Strategic Decisionmaking

Despite the risks posed by the adaptation of AI to military affairs, the United States must seek to be at the forefront of this technology. It is unthinkable that America will cede this new territory to our competitors, such as China and Russia, who are aggressively pursuing it. Even if the United States decided to opt out of this arms race, it would have little effect, as the technologies described in this paper are inherently dual use, and the private sector around the globe will pursue them with abandon. Ethicists, weapon engineers, and military leaders are already hard at work on the challenges associated with designing and deploying battlefield lethal autonomous weapons systems. With this article, the authors hope to begin a new conversation, highlighting and differentiating the risks posed by employing strategic AI in military decisionmaking, particularly as the pace of warfare accelerates.

Nov. 8, 2018

Wildlife and Drug Trafficking, Terrorism, and Human Security

Analysis of the wildlife-trafficking-militancy-nexus are often shrouded in unproven assumptions and myths. Crucially, they divert attention from several uncomfortable truths with profound policy implications: First is that the nexus of militancy in wildlife trafficking constitutes only a sliver of the global wildlife trade and countering it will not resolve the global poaching crisis. Second, counterterrorism and counterinsurgency forces, even recipients of international assistance, also poach and smuggle wildlife and use anti-poaching and counterterrorism efforts as covers for displacement of local populations and land grabbing. Third, corruption among government officials, agencies, and rangers has far more profound effects on the extent of poaching and wildlife trafficking. And finally, local communities are often willing participants in the global illegal wildlife trade.

Nov. 8, 2018

Sending in the Cavalry: The Growing Militarization of Counterterrorism in Southeast Asia

Philippines, which lasted from May to October 2017, constitutes a watershed moment in the evolution of the terrorist threat in Southeast Asia. Pro–Islamic State of Iraq and the Levant (ISIL) militants threatened to turn Marawi into “the Mosul of Southeast Asia,” with their astounding ability to operate large groups capable of controlling territory and exposing the inadequacy of the region’s security services. Although member countries of the Association of Southeast Asian Nations (ASEAN) had pondered the question of possible participation by their armed forces in counterterrorism well before the Battle, it is undeniable that Marawi has become the catalyst behind the regional drive to militarize counterterrorism efforts in Southeast Asia. Cooperative frameworks furnished by ASEAN have since taken on added significance, especially the defense-oriented arrangements that bring together the defense establishments and armed forces of the ASEAN countries as well as those of external powers including China, India, Japan, and the United States. The growing militarization of counterterrorism efforts will neither be easy nor straightforward, given longstanding regional sensitivities and the potentially diversive ramifications that excessive securitization could have for democratic life within ASEAN countries.

Nov. 8, 2018

On Grand Strategy (Book Review)

With an historian’s keen eye for detail and nuance, John Lewis Gaddis surveys a variety of case studies from the Peloponnesian War to World War II in his new book On Grand Strategy, identifying in the process several general precepts that may help guide modern-day grand strategists. The book is not, however, a how-to guide for formulating grand strategy or conducting statecraft. It is rather more an examination of select strategic leaders and the ways in which they pursued priority objectives; some successfully, some not so. In focusing on individual leaders and not states, Gaddis’ approach to the topic echoes the view of Machiavelli whom he quotes from The Prince identifying the fundamental importance of the “knowledge of the actions of great men, learned by me from long experience with modern things and continuous reading of ancient ones.”1 The book adds meaningfully to the growing literature on grand strategy, particularly as regards strategic leadership and its historical context.—as reviewed by James MacDougall

Nov. 8, 2018

Building Militaries in Fragile States: Challenges for the United States (Book Review)

Building Militaries in Fragile States, is a superb addition to the literature on security assistance and state transformation. Its value lies in its expert, practitioner-scholar viewpoint, and its focus on results and the critical variables that produce them. It is commonplace for both scholars and policy wonks to bemoan the gap between policy and scholarship. Dr. Karlin has done yeoman’s work to reduce that gap on this important subject.

Nov. 8, 2018

Peace Works: America's Unifying Role in a Turbulent World (Book Review)

Peace Works is two things: an impassioned argument on why the United States should involve itself in conflict prevention, management and peace-making; and an important contribution to the practitioner’s tool box for dealing with conflict situations. Ambassador Barton’s first-person description of efforts in places like Rwanda, Bosnia, Haiti, and Syria merits study for use in responding to future humanitarian tragedies. While Peace Works has two obvious weaknesses—a political partisan bias and a predilection for humanitarian intervention, even when by his own guidelines, we should not—the book should be required reading for conflict management practitioners (diplomats, development experts, NGOs, the military—especially components most likely to be confronted with stabilization tasks) and Congressional staff.

Nov. 8, 2018

High North and High Stakes: The Svalbard Archipelago Could be the Epicenter of Rising Tension in the Arctic

500 nautical miles north of the city of Tromsø, off of the northern cape of Norway, lies the Svalbard Archipelago; a collection of islands nearly one fourth the size of continental Norway with a unique history and an even more unique status under international law. Since its official discovery in the mid-1500s Svalbard has generally been an area of peace and cooperation due in large part to its location on the fringes of civilization. However, Svalbard’s tranquility has been punctuated by periods of competition and conflict when profitable resources are at stake. From whaling in the 1700s, coal in the late 1800s, and fishing in the present, profit from natural resources has been a consistent driver of instability in the area. Outside of resource-driven tension, the island chain spent most of its pre–20th century existence as a de facto “no man’s land” or global commons, ungoverned by any one nation.

Nov. 8, 2018

Interview with General John R. Allen, USMC (ret.)

The mission was not just about al-Qaeda. We had two objectives; to destroy al-Qaeda, and to prevent the resurgence of the Taliban, which would have created the cycle all over again. The day I took command in Afghanistan (on July 18, 2011) I initiated an immediate campaign review which started with my review of the political objectives, which were the elimination and control of the potential for the resurgence of al-Qaeda, and to prevent the Taliban from overthrowing the Afghanistan government.

May 18, 2018

Improving Our CWMD Capabilities: Who Will Lead?

The current DOD CWMD strategy positions the Department to meet national policy objectives for which it is not resourced, reflecting a failure at the national level to scope the challenge as something other than a technical issue and to oversee the execution of WMD-related tasks throughout the whole-of-government. In part, this is because the term “WMD,” which once had specificity in the arms control community, has been reduced to a political buzzword. This further reflects the need to define what DOD sees as important CWMD activities.

May 15, 2018

An Interview with Congressman James R. Langevin

When I first came into Congress, we were still in that transition phase of going from a relatively calm and stable, bipolar world with the United States and the Soviet Union as chief adversaries. We were just entering the multi-polar world in which we live and the world became much more paradoxically unstable and the threats became more involved and grew. I came in around 2000—before 9/11—and none of us could have anticipated how the world would change so dramatically, on that date in particular, and later morph into other threats and challenges.

May 15, 2018

The Darkest Sides of Politics, II: State Terrorism, "Weapons of Mass Destruction," Religious Extremism, and Organized Crime (Book Review)

In this companion to his first volume on Postwar Facism, Covert Operations, and Terrorism, Jeffrey Bale explores the influence of some of the world’s most pressing security concerns through a review of global case studies on weapons of mass destruction (WMD), violent extremism, and organized crime. Bale is thorough in his selection and treatment of the cases, using primary sources whenever available and delivering an “intentionally robust” text to provide an alternative to what he describes in the volume’s preface as often unqualified opinions taking the guise of academic works. Based on decades of research in violent extremism, Bale reviews select works and either updates their findings, or acknowledges their currency. State Terrorism, "Weapons of Mass Destruction," Religious Extremism, and Organized Crime is dense with explanations and structured expositions, but the volume offers a good model for how to convey conclusions that are framed by evidence.

May 15, 2018

The Politics of Weapons Inspections: Assessing WMD Monitoring and Verification Regimes (Book Review)

Nathan E. Busch and Joseph F. Pilat in their book The Politics of Weapons Inspections: Assessing WMD Monitoring and Verification Regimes draw attention to the important role that politics can play within weapons of mass destruction (WMD) verification, but the title promises more than the authors deliver. The authors analyze three cases of disarmament using inspections (South Africa, Iraq, and Libya); examine how the verification of global nuclear disarmament might or might not work; and apply the book’s lessons to what they term difficult cases, which may be subject to future inspections (North Korea, Iran, and Syria). The studies provide a useful survey and side-by-side comparison of the successes, pitfalls, and likely future challenges of efforts to verify individual state compliance with WMD agreements. The authors on occasion fail to place the case studies within a broader geopolitical context, leaving important gaps in their analysis, which makes for an uneven read. As an example, the authors point to shortfalls in multilateral verification regimes without fully assessing how these regimes are limited and sometimes hamstrung by the external and internal politics of sovereign states.

May 15, 2018

The CWMD Strategy Gap

During the past 15 years, countering–WMD (CWMD) has been a top priority as expressed throughout multiple national and department-level strategy and policy documents, to include the National Security Strategy (NSS); the National Military Strategy (NMS); the National Defense Strategy (NDS); the Defense Strategic Guidance (DSG); and Quadrennial Defense Review (QDR). While a prevention strategy is laudable and important, the disparity between strategy and the required operational capabilities and capacities needed for securing, interdicting, and eliminating WMD reveals potential gaps that must be recognized and accounted for to ensure a credible deterrent posture. Future threats, especially biological, are likely to be more complicated than current or past conceptions.

May 15, 2018

North Korea's CBW Program: How to Contend with Imperfectly Understood Capabilities

Biological weapons programs tend to be among the most closely guarded weapons programs in a country’s arsenal. By contrast, extensive documentation and histories of nuclear weapons programs exist for virtually all the known weapons states as well as those that abandoned such programs. In recent years, while North Korea (formally the Democratic People’s Republic of Korea or DPRK) has gone to great lengths to demonstrate to the world its nuclear and missile programs, the country has hidden whatever CBW it may possess. As the international community grapples with how to reduce tension on the Peninsula, re-assessing what is known about North Korea’s CBW program and considering options to minimize their role in the regime’s security calculous is an important addition to the complex set of issues that U.S. civilian and military leaders must consider. This article attempts to put in context what little is known about North Korea’s capabilities and offer some measures that might be taken to help curtail those capabilities.

May 15, 2018

"The Irreducible Minimum" An Evaluation of Counterterrorism Operations in Iraq

Surprise is a constant in war. But the surprise experienced by TF–714 in Iraq proved to be a major challenge even for an organization comprised of units that excelled at tactical adaptation. Consequently, TF–714’s initial response was to do more of what it already did extremely well. “The initial response,” explained General McChrystal in a 2014 interview, was that “we will just do more of what we are already very good at and then we would have done our part.” What became evident to the task force leadership, however, was that a “more of the same” response was not going to have a meaningful impact on AQI. To be sure, those operations that TF–714 executed were highly successful. The problem was there were not enough of them. They had, at best, only a limited impact on AQI’s operational tempo. The Task Force was facing an enemy it had never envisaged and could not degrade through its existing ways of operating.

May 15, 2018

The State of the Art in Contemporary CWMD Thinking

To effectively counter-WMD networks, the USG must bring to bear its full arsenal of capabilities, authorities, and permissions in a coordinated manner. As A.Q. Khan's story and September 11 demonstrate, exclusive use of the old tools—analysis, planning, functionally-organized sector-based agencies—in a complex environment has proven not only inadequate, but dangerous.

May 15, 2018

The Forensic Challenge

The suspected use of chemical, biological, radiological, and nuclear (CBRN) weapons or materials adds complexity to any international or internal conflict. It is critical that responses to such use are based on good information. The relatively new field of CBRN forensics, which is emerging out of domestic terrorism investigations, seeks to establish scientific facts through analysis of rigorously collected evidence. CBRN forensics are important to establishing actual facts, but are inherently difficult for a variety of reasons. The question of whether military forces, particularly Special Operations Forces (SOF), can conduct CBRN forensics in an adequate fashion is debatable; however, there are numerous pathways to improve the status quo.

May 15, 2018

WMD Terrorism: The Once and Future Threat

The specter of terrorists and other violent non-state actors acquiring weapons of mass destruction is perhaps an even greater concern than acquisition of weapons of mass destruction (WMD) by states. This over-magnification, however, ignores the hurdles inherent in such malignant enterprises. Despite clear interest on the part of some non-state adversaries, a true WMD is at present likely out of their reach in all but a select set of scenarios. Changes in technology, however, could augur a dramatic shift in the WMD terrorism threat picture.

May 15, 2018

Nuclear Terrorism: Did We Beat the Odds or Change Them?

Preventive actions taken since 2004, both in counterterrorism and in counterproliferation, have been extraordinary. From the decimation of al-Qaeda to the Iran Deal and the Nuclear Security Summits, difficult actions taken by courageous and hard-working Americans and others have prevented the future we feared. For all of these successes, however, there have been a matching number of failures and structural shifts that are increasing the risk of successful mega-terrorist attacks. To put it metaphorically, while there can be no doubt that we have been running faster, we have also been falling further behind. I still believe that the chance of an attack during the next decade is slightly greater than even. But there is a lengthy agenda of actions that the United States and other nations could take today to reduce this risk and even reverse trend lines moving in the wrong direction.

May 14, 2018

Dirty War: Rhodesia and Chemical Biological Warfare 1975-1980 (Book Review)

Glenn Cross’s Dirty War: Rhodesia and Chemical Biological Warfare 1975–1980 is a welcome addition to the small, but growing scholarly literature on the history of chemical and biological warfare. In 1965, the minority white community in the British territory of Rhodesia (officially Southern Rhodesia) rejected demands that it transfer political power to the majority black population. By the mid-1970s, white Rhodesians found it increasingly difficult to counter the growing power of native African nationalists fighting the government. As with many insurgencies, the guerrillas lacked the resources to defeat government security forces in direct combat, but Rhodesian forces were stretched too thin to suppress the insurgents, especially once they had established base camps in neighboring countries. Amidst the conflict, Rhodesian military and intelligence services employed what would now be considered chemical and biological agents against the guerillas with unknown results.

May 14, 2018

The Age of Lone Wolf Terrorism (Book Review)

The Age of Lone Wolf Terrorism by Mark S. Hamm and Ramon Spaaij provides the national security professional with an exceptional overview and appreciation of this growing problem facing the United States and its partners. Detailed in their compilation of the 123 incidents of lone wolf terrorism from 1940–2016, the authors examine the incidents against 20 variables to help identify trends in backgrounds, modus operandi, and motivations. Hamm and Spaaij, a professor of criminology and a sociologist respectfully, then devise a radicalization model that provides an evidence-based explanation for select case studies of lone wolf terror incidents.

May 9, 2018

Perils of the Gray Zone: Paradigms Lost, Paradoxes Regained

There is a world war under way, waged in hot, cold, and cool modes. The aggressors see no gray zone “between war and peace.” They see all as war. So must we.

Dec. 21, 2017

Battlefield Geometry in our Digital Age: From Flash to Bang in 22 Milliseconds

This year has been tough for cybersecurity programs. Every month in the first six months of 2017, the world experienced a major cyber event. Open-source attacks included attacks on critical infrastructure, banks, intelligence services, and significant commercial and government entities. Indeed, reflecting on the scope and depth of most publically acknowledged compromises, uncovers the reality of the tremendous and growing risks the country faces nearly two decades into the 21st century. Everything seems to have changed. Virtually every organization within the Department of Defense (DOD) has, sometimes reluctantly, come to embrace digital age technology, to the point that they are completely dependent on it. The result is a shocking degree of paralysis when our access to the services we now rely upon is disrupted.

Dec. 21, 2017

How is NATO Meeting the Challenge of Cyberspace

Historians of international relations are familiar with the hinge-year concept when trends that previously had been largely subterranean suddenly crystallize into a clear and immediate danger, forcing policymakers to wake up and take action. When it comes to cyberspace, the past year has certainly smashed any complacency about our ability to anticipate and counter the growing sophistication of cyberattacks. As fast as we have tried to catch up, the speed and global impact of these attacks continue to outrun us. 2016 witnessed the first major attack via the Internet of Things when a DynCorp server in the United States was hacked through video surveillance cameras. We also saw the first attacks driven by artificial intelligence, and increasing evidence of collusion between state intelligence services and organized crime networks.

Dec. 21, 2017

Power Projection in the Digital Age

Logistics is the lifeblood of the Joint Force. It requires an effective distribution network as its heart, moving and sustaining the force at the right place and at the right time—all the time. U.S. Transportation Command (USTRANSCOM) delivers that decisive force, projecting American power globally through the robust Joint Deployment and Distribution Enterprise (JDDE) and leveraging the expertise of more than 140,000 professionals. No other nation in the world can compete with the United States in conventional warfare because we plan, secure, and distribute combat capability so well. As a result, many military planners are now value-programmed to believe that a soldier or bullet will always be where it needs to be, when it needs to be there—on demand.

Dec. 21, 2017

A National Security Enterprise Response - Digital Dimension Disruption

The digital dimension is simultaneously enhancing and disrupting the fabric of life in every society where modern, informatized technology is present. The slow-motion collapse of parts of the 20th century’s legacy is now accelerating in ways that likely will usher in a monumental realignment of societal institutions, methods of business, and fundamental ideas about national security. This realignment will, of necessity, change the frameworks within which America provides for its security, including how it acquires the goods and services it uses in that effort.

Dec. 21, 2017

A Cyber Federal Deposit Insurance Corporation: Achieving Enhanced National Security

Of the emerging man-made risks affecting U.S. national security, cyber threats have enjoyed the most attention and resources from national security leaders and policymakers. And yet, cyber threats remain one of the most complex risks to address given their amorphous, highly fluid, and extra-territorial nature. This makes it difficult if not impossible to quantify the national state of readiness and, in these fiscally constrained times, the return on investment from the billions spent each year on cybersecurity. Five gaps conspire to make achieving a state of enhanced cyber resilience complex if not impossible. These include a yawning talent gap to the tune of millions of people; a technological gap predicated on managing a risk that evolves according to Moore’s law; a financial and economic gap leaving trillions in value at risk with no generally accepted way to measure this value; an alignment gap in terms of policy harmonization and cooperation inside the United States and around the world; and, finally, a gap in patience and the speed of markets. This article delves into the evolving cyber threat landscape and outlines ways of understanding and bridging these critical gaps.

Dec. 21, 2017

Bridging the Cyberspace Gap - Washington and Silicon Valley

One of the defining characteristics of the cyber domain is the dominance of the private sector. The majority of critical networks are privately owned and operated; more than 90 percent of American military and intelligence communications travel over privately owned backbone telecommunications networks. Many of the most talented hackers are in the private sector, and private security firms such as CrowdStrike, FireEye, and Cylance have taken an increasingly large public role in tracing cyberattacks to nation-states and other perpetrators. In addition, Alphabet, Amazon, Apple, Cisco, Facebook, IBM, Intel, and other companies drive innovation and the deployment of new technologies, especially in cutting-edge areas like artificial intelligence. For these reasons, strong ties to the technology sector are central to the U.S. Government’s (USG) pursuit of its economic, diplomatic, and military strategic interests in cyberspace.

Dec. 21, 2017

Cyber Gray Space Deterrence

During the past few years, adversaries of the United States have begun to use their militaries to test U.S. resolve through innovative methods designed to bypass deterrent threats and avoid direct challenges. These “gray space campaigns” are specifically designed to allow adversaries to achieve their goals without triggering escalation by making retaliation difficult. China demonstrated this with its attempt to seize control of the South China Sea through its island building program, as did Russia with its effort to foment insurgency in eastern Ukraine through the use of “little green men.”

Dec. 21, 2017

Cyberdeterrence by Engagement and Surprise

The conventional deterrence strategies of denial and punishment do not factor in the unique characteristics of the man-made cyber domain. This domain needs a new and holistic deterrence strategy that involves prompt and direct cyber responses that are sudden, dynamic, stealthy, and random so that adversaries can be defeated mentally and virtually. This article offers such an approach that I refer to as “deterrence by engagement and surprise.”