Due to a lapse in federal funding, this website is not being actively updated or monitored. See OPM status.
Results:
Category: PRISM

Feb. 26, 2019

Great Expectations and Grim Realities in AMLO’s Mexico

There is no single strategy that can quickly overcome the violence consuming many Mexican communities. Andrés Manuel López Obrador—known simply as AMLO—assumed Mexico’s presidency on Dec. 1, 2018, with a robust mandate. AMLO can no more save Mexico through massive social programs than President Enrique Nieto could by enacting sweeping economic reforms or President Felipe Calderón by deploying tens of thousands of federal forces. Mexico’s criminal groups have proven to be as complex as the country itself, with an uncanny ability to mutate and migrate. Change will come community by community, municipality by municipality, and state by state by initiating effective violence prevention programs, ensuring genuine transparency, strengthening civilian law enforcement, and building a justice system that is both efficient and fair. The United States should instead concentrate on the long-term task of helping Mexico strengthen law enforcement by sharing expertise to create a new generation of professional police, prosecutors, and judges.

Feb. 25, 2019

The Venezuelan Crisis and Salvador Allende's Glasses

The situation in Venezuela is deeply worrisome, and the countries of the hemisphere have an important responsibility to the Venezuelan people. It is also in the national interest of the United States for Venezuela to prosper as a nation, while seeking to pursue policies supported by its people through a stable and fair democratic process. There is a serious lack of meaningful and productive dialogue between the Venezuelan government and its own people at a time when the country’s economy is in crisis. The United States can and should lead, but it should follow the lead of the Venezuelan opposition, and avoid reverting to the Cold War-era unilateral action that until recently defined much of our foreign policy toward the region. Such an approach will not usher Venezuela back to its place as one of the most economically and politically consequential countries in Latin America. At least that is what Allende’s glasses seem to say.

Feb. 19, 2019

The Evolution of the Most Lethal Criminal Organization in Brazil—the PCC

After more than a decade of denying its existence, Brazilian authorities have finally recognized the PCC—referring to Primeiro Comando da Capital, or First Capital Command—as a criminal organization that is a significant threat to public security, whose capacity to threaten democracy and the state can no longer be ignored. Formed in prison, PCC emerged and grew in the dark, ignored by the authorities. Its top leaders are already behind bars yet PCC is the leading criminal organization in Brazil and indeed in South America, benefiting both from the silence of the authorities and from the lack of an approach that acknowledges PCC as a transnational criminal organization that commits crimes from north to south across the length of South America.

Feb. 19, 2019

The U.S. Military in Support of Strategic Objectives in Latin America and the Caribbean

This article examines the role that the U.S. military plays, and can play, in advancing U.S. strategic objectives in Latin America, with a focus on security cooperation and administration of security assistance efforts, as part of coordinated whole-of-government approach. It argues for greater U.S. military attention to the development and application of strategic concepts built around strengthening governance, as the approach that is both appropriate to sensitivities and limitations regarding the employment of U.S. armed forces in Latin America, and as an effective bulwark against the cycle of criminality, corruption, and populism that opens the door for significant strategic threats against the United States. These include authoritarian anti–U.S. governments that serve as enablers for widespread criminality, terrorist threat networks, and collaboration with hostile extra-hemispheric state actors such as Russia and the People's Republic of China.

Feb. 19, 2019

Defending Democracy and Human Rights in the Western Hemisphere

One glimpse at the covers of the main news and political magazines in recent years is often enough to discern a common theme. These publications often display fatalist titles such as “Democracy in Demise,” “Democracy in Crisis,” “Democracy in Peril,” or maybe the alternative favorite, “Authoritarianism on the Rise.” First the 2008 financial crisis, then the results of certain elections worldwide led many to question the future of liberal democracy. In Latin America, an additional series of events such as the “Operacão Lava Jato” (Operation Car Wash) corruption scandal that put many high-level elected and public officials in jail, paved the way for fed-up citizens to rebel against their governments in the streets and in the polls, ousting traditional parties and political elites from power. Despite the bad news, and the serious backsliding in some specific cases and notorious exceptions (e.g. Cuba and Venezuela), I argue that democracy is not dying. For better or worse, it is moving forward. Recent events do not necessarily mean that democracy is on the brink of extinction; rather, they show that there are challenges inherent to democratic life. If anything, the heated public debates confirm that democracy is a living process, which requires constant maintenance and strengthening

Feb. 19, 2019

China’s Strategic Partnerships in Latin America: Case Studies of China’s Oil Diplomacy in Argentina, Brazil, Mexico, and Venezuela 1991–2015

China’s gains in Latin America achieved through strategic partnerships and oil diplomacy are probably an inevitable result of the country’s unprecedented economic growth and need for commodities. However, the relative reduction in U.S. influence is largely a a result of inattention and the lack of a coherent strategy for the Western Hemisphere within the U.S. official strategic community. Yanran Xu’s book, "China's Strategic Partnerships in Latin America," unsurprisingly demonstrates that the Government of China takes a longer view on these issues showing a willingness to accept short-term difficulties in the name of longer-term objectives.

Nov. 8, 2018

The Fight So Far

Achieving significantly greater strategic success against terrorism remains within America’s grasp, but only if we are willing to be as adaptive and flexible—indeed more so—than our terrorist adversaries have proven to be. Achieving this will require us to make investments, adopt practices, and make choices we previously have not. Although the U.S. Government (USG) has frequently claimed to take a whole-of-government approach in utilizing all elements of national power to fight terrorism, our struggle against the Islamist State of Iraq and Syria (ISIS) has demonstrated that we must strengthen our emphasis and resourcing of non-kinetic counterterrorism (CT) efforts to match the strengths that we and our allies have developed since 9/11 in kinetic efforts.

Nov. 8, 2018

NATO's Adaptation in an Age of Complexity

Successful and lasting organizations must adapt quickly, and militaries are not exempt from that requirement—even less so than their civilian counterparts, because preparing for past wars generally has dire consequences for them, and for their countries. NATO, as the hub for transatlantic and European security it has strived to be for the past 70 years, is undergoing a significant structural upheaval, as it wishes to stay relevant to contemporary threats and challenges, while putting itself in a position to keep an edge on any potential opponent in the foreseeable future.

Nov. 8, 2018

Examining Complex Forms of Conflict: Gray Zone and Hybrid Challenges

The Joint Force, and the national security community as a whole, must be ready and able to respond to numerous challenges across the full spectrum of conflict including complex operations during peacetime and war. However, this presupposes a general acceptance of a well understood taxonomy describing the elements that constitute the “continuum of conflict.” The U.S. security community lacks this taxonomy, despite its engagement in a spate of diverse conflicts around the globe from the South China Sea, to Ukraine, Syria, Iraq, and beyond. Partially as a result of this conceptual challenge, we are falling behind in our readiness for the future. Understanding our future security challenges demands that we reflect and interpret the past, understand the present, and think rigorously about what lies over the horizon in order to adapt to the changing character of conflict. This requires keeping an open and informed mind about the breadth of the various modes of conflict that exist. The wars of the 21st century may take many forms. As conflict reflects a greater degree of convergence and complexity, so must our mental models and frameworks.

Nov. 8, 2018

The Mandate to Innovate

Delivering decision advantage to a policymaker or situational awareness to a warfighter is becoming a more competitive challenge. As geospatial and AAA technologies increase in capability and availability—both within the United States and allied GEOINT enterprise as well as for our adversaries—the complexity of that mission increases. Empowering rapid experimentation and innovation, adapting new business models (particularly those that have proven successful to the business world), and applying the breadth of the means availability to us to acquire new capabilities are ways for us to continuously replenish the nation's GEOINT advantage.

Nov. 8, 2018

Economic and Financial Sanctions in U.S. National Security Strategy

The U.S. Government (USG) has increased the use of economic and financial sanctions against other states and non-state actors in the post–Cold War era, refining their design to improve precision. Achieving desired effects with sanctions, however, requires careful assessment of target vulnerabilities, available U.S. leverage, orchestration with other policy tools, and potential obstacles and risks.

Nov. 8, 2018

Learning and Innovation: Jordan at the "Crossroads of Armageddon"

A recurring feature of the past few decades is the presence of the nation’s three principal national security institutions (the 3Ds)—Department of State (DOS), U.S. Agency for International Development (USAID), and Department of Defense (DOD)—operating in complex environments abroad marked by conflict, crisis, and state fragility. This paradigm, dubbed the “new normal” by many, begs a few questions. What are we learning from these critical missions undertaken in pursuit of national security? Are we adjusting our strategies to maximize the prospects for prevention of conflict based on that learning? Is innovation occurring that enables us to work better together to address challenges in these environments? Of keen interest is what the 3D did to address the unique challenges in Jordan, and how. Understanding both the “what” and the “how” might reveal if we are learning and innovating.

Nov. 8, 2018

Post–Conflict Stabilization: What Can We Learn from Syria?

Trying to draw lessons, even initial ones, from the U.S. experience in Syria is daunting, but the bottom line is that any conflict setting—and any effort to design a program of stabilization—brings a unique set of peculiarities that may not resemble conflicts in which we have been involved in the past. The Syria experience, where there is no central government with which the United States and others in the international community can partner with and empower, is an excellent example, and suggests a need for careful analysis of the specific circumstances of settings in which the United States may find itself operating in order to develop stabilization doctrine and tools that are suited not only to the last conflict, but to the next one.

Nov. 8, 2018

The Machine Beneath: Implications of Artificial Intelligence in Strategic Decisionmaking

Despite the risks posed by the adaptation of AI to military affairs, the United States must seek to be at the forefront of this technology. It is unthinkable that America will cede this new territory to our competitors, such as China and Russia, who are aggressively pursuing it. Even if the United States decided to opt out of this arms race, it would have little effect, as the technologies described in this paper are inherently dual use, and the private sector around the globe will pursue them with abandon. Ethicists, weapon engineers, and military leaders are already hard at work on the challenges associated with designing and deploying battlefield lethal autonomous weapons systems. With this article, the authors hope to begin a new conversation, highlighting and differentiating the risks posed by employing strategic AI in military decisionmaking, particularly as the pace of warfare accelerates.

Nov. 8, 2018

Wildlife and Drug Trafficking, Terrorism, and Human Security

Analysis of the wildlife-trafficking-militancy-nexus are often shrouded in unproven assumptions and myths. Crucially, they divert attention from several uncomfortable truths with profound policy implications: First is that the nexus of militancy in wildlife trafficking constitutes only a sliver of the global wildlife trade and countering it will not resolve the global poaching crisis. Second, counterterrorism and counterinsurgency forces, even recipients of international assistance, also poach and smuggle wildlife and use anti-poaching and counterterrorism efforts as covers for displacement of local populations and land grabbing. Third, corruption among government officials, agencies, and rangers has far more profound effects on the extent of poaching and wildlife trafficking. And finally, local communities are often willing participants in the global illegal wildlife trade.

Nov. 8, 2018

Sending in the Cavalry: The Growing Militarization of Counterterrorism in Southeast Asia

Philippines, which lasted from May to October 2017, constitutes a watershed moment in the evolution of the terrorist threat in Southeast Asia. Pro–Islamic State of Iraq and the Levant (ISIL) militants threatened to turn Marawi into “the Mosul of Southeast Asia,” with their astounding ability to operate large groups capable of controlling territory and exposing the inadequacy of the region’s security services. Although member countries of the Association of Southeast Asian Nations (ASEAN) had pondered the question of possible participation by their armed forces in counterterrorism well before the Battle, it is undeniable that Marawi has become the catalyst behind the regional drive to militarize counterterrorism efforts in Southeast Asia. Cooperative frameworks furnished by ASEAN have since taken on added significance, especially the defense-oriented arrangements that bring together the defense establishments and armed forces of the ASEAN countries as well as those of external powers including China, India, Japan, and the United States. The growing militarization of counterterrorism efforts will neither be easy nor straightforward, given longstanding regional sensitivities and the potentially diversive ramifications that excessive securitization could have for democratic life within ASEAN countries.

Nov. 8, 2018

On Grand Strategy (Book Review)

With an historian’s keen eye for detail and nuance, John Lewis Gaddis surveys a variety of case studies from the Peloponnesian War to World War II in his new book On Grand Strategy, identifying in the process several general precepts that may help guide modern-day grand strategists. The book is not, however, a how-to guide for formulating grand strategy or conducting statecraft. It is rather more an examination of select strategic leaders and the ways in which they pursued priority objectives; some successfully, some not so. In focusing on individual leaders and not states, Gaddis’ approach to the topic echoes the view of Machiavelli whom he quotes from The Prince identifying the fundamental importance of the “knowledge of the actions of great men, learned by me from long experience with modern things and continuous reading of ancient ones.”1 The book adds meaningfully to the growing literature on grand strategy, particularly as regards strategic leadership and its historical context.—as reviewed by James MacDougall

Nov. 8, 2018

Building Militaries in Fragile States: Challenges for the United States (Book Review)

Building Militaries in Fragile States, is a superb addition to the literature on security assistance and state transformation. Its value lies in its expert, practitioner-scholar viewpoint, and its focus on results and the critical variables that produce them. It is commonplace for both scholars and policy wonks to bemoan the gap between policy and scholarship. Dr. Karlin has done yeoman’s work to reduce that gap on this important subject.

Nov. 8, 2018

Peace Works: America's Unifying Role in a Turbulent World (Book Review)

Peace Works is two things: an impassioned argument on why the United States should involve itself in conflict prevention, management and peace-making; and an important contribution to the practitioner’s tool box for dealing with conflict situations. Ambassador Barton’s first-person description of efforts in places like Rwanda, Bosnia, Haiti, and Syria merits study for use in responding to future humanitarian tragedies. While Peace Works has two obvious weaknesses—a political partisan bias and a predilection for humanitarian intervention, even when by his own guidelines, we should not—the book should be required reading for conflict management practitioners (diplomats, development experts, NGOs, the military—especially components most likely to be confronted with stabilization tasks) and Congressional staff.

Nov. 8, 2018

High North and High Stakes: The Svalbard Archipelago Could be the Epicenter of Rising Tension in the Arctic

500 nautical miles north of the city of Tromsø, off of the northern cape of Norway, lies the Svalbard Archipelago; a collection of islands nearly one fourth the size of continental Norway with a unique history and an even more unique status under international law. Since its official discovery in the mid-1500s Svalbard has generally been an area of peace and cooperation due in large part to its location on the fringes of civilization. However, Svalbard’s tranquility has been punctuated by periods of competition and conflict when profitable resources are at stake. From whaling in the 1700s, coal in the late 1800s, and fishing in the present, profit from natural resources has been a consistent driver of instability in the area. Outside of resource-driven tension, the island chain spent most of its pre–20th century existence as a de facto “no man’s land” or global commons, ungoverned by any one nation.

Nov. 8, 2018

Interview with General John R. Allen, USMC (ret.)

The mission was not just about al-Qaeda. We had two objectives; to destroy al-Qaeda, and to prevent the resurgence of the Taliban, which would have created the cycle all over again. The day I took command in Afghanistan (on July 18, 2011) I initiated an immediate campaign review which started with my review of the political objectives, which were the elimination and control of the potential for the resurgence of al-Qaeda, and to prevent the Taliban from overthrowing the Afghanistan government.

May 18, 2018

Improving Our CWMD Capabilities: Who Will Lead?

The current DOD CWMD strategy positions the Department to meet national policy objectives for which it is not resourced, reflecting a failure at the national level to scope the challenge as something other than a technical issue and to oversee the execution of WMD-related tasks throughout the whole-of-government. In part, this is because the term “WMD,” which once had specificity in the arms control community, has been reduced to a political buzzword. This further reflects the need to define what DOD sees as important CWMD activities.

May 15, 2018

An Interview with Congressman James R. Langevin

When I first came into Congress, we were still in that transition phase of going from a relatively calm and stable, bipolar world with the United States and the Soviet Union as chief adversaries. We were just entering the multi-polar world in which we live and the world became much more paradoxically unstable and the threats became more involved and grew. I came in around 2000—before 9/11—and none of us could have anticipated how the world would change so dramatically, on that date in particular, and later morph into other threats and challenges.

May 15, 2018

The Darkest Sides of Politics, II: State Terrorism, "Weapons of Mass Destruction," Religious Extremism, and Organized Crime (Book Review)

In this companion to his first volume on Postwar Facism, Covert Operations, and Terrorism, Jeffrey Bale explores the influence of some of the world’s most pressing security concerns through a review of global case studies on weapons of mass destruction (WMD), violent extremism, and organized crime. Bale is thorough in his selection and treatment of the cases, using primary sources whenever available and delivering an “intentionally robust” text to provide an alternative to what he describes in the volume’s preface as often unqualified opinions taking the guise of academic works. Based on decades of research in violent extremism, Bale reviews select works and either updates their findings, or acknowledges their currency. State Terrorism, "Weapons of Mass Destruction," Religious Extremism, and Organized Crime is dense with explanations and structured expositions, but the volume offers a good model for how to convey conclusions that are framed by evidence.

May 15, 2018

The Politics of Weapons Inspections: Assessing WMD Monitoring and Verification Regimes (Book Review)

Nathan E. Busch and Joseph F. Pilat in their book The Politics of Weapons Inspections: Assessing WMD Monitoring and Verification Regimes draw attention to the important role that politics can play within weapons of mass destruction (WMD) verification, but the title promises more than the authors deliver. The authors analyze three cases of disarmament using inspections (South Africa, Iraq, and Libya); examine how the verification of global nuclear disarmament might or might not work; and apply the book’s lessons to what they term difficult cases, which may be subject to future inspections (North Korea, Iran, and Syria). The studies provide a useful survey and side-by-side comparison of the successes, pitfalls, and likely future challenges of efforts to verify individual state compliance with WMD agreements. The authors on occasion fail to place the case studies within a broader geopolitical context, leaving important gaps in their analysis, which makes for an uneven read. As an example, the authors point to shortfalls in multilateral verification regimes without fully assessing how these regimes are limited and sometimes hamstrung by the external and internal politics of sovereign states.

May 15, 2018

The CWMD Strategy Gap

During the past 15 years, countering–WMD (CWMD) has been a top priority as expressed throughout multiple national and department-level strategy and policy documents, to include the National Security Strategy (NSS); the National Military Strategy (NMS); the National Defense Strategy (NDS); the Defense Strategic Guidance (DSG); and Quadrennial Defense Review (QDR). While a prevention strategy is laudable and important, the disparity between strategy and the required operational capabilities and capacities needed for securing, interdicting, and eliminating WMD reveals potential gaps that must be recognized and accounted for to ensure a credible deterrent posture. Future threats, especially biological, are likely to be more complicated than current or past conceptions.

May 15, 2018

North Korea's CBW Program: How to Contend with Imperfectly Understood Capabilities

Biological weapons programs tend to be among the most closely guarded weapons programs in a country’s arsenal. By contrast, extensive documentation and histories of nuclear weapons programs exist for virtually all the known weapons states as well as those that abandoned such programs. In recent years, while North Korea (formally the Democratic People’s Republic of Korea or DPRK) has gone to great lengths to demonstrate to the world its nuclear and missile programs, the country has hidden whatever CBW it may possess. As the international community grapples with how to reduce tension on the Peninsula, re-assessing what is known about North Korea’s CBW program and considering options to minimize their role in the regime’s security calculous is an important addition to the complex set of issues that U.S. civilian and military leaders must consider. This article attempts to put in context what little is known about North Korea’s capabilities and offer some measures that might be taken to help curtail those capabilities.

May 15, 2018

"The Irreducible Minimum" An Evaluation of Counterterrorism Operations in Iraq

Surprise is a constant in war. But the surprise experienced by TF–714 in Iraq proved to be a major challenge even for an organization comprised of units that excelled at tactical adaptation. Consequently, TF–714’s initial response was to do more of what it already did extremely well. “The initial response,” explained General McChrystal in a 2014 interview, was that “we will just do more of what we are already very good at and then we would have done our part.” What became evident to the task force leadership, however, was that a “more of the same” response was not going to have a meaningful impact on AQI. To be sure, those operations that TF–714 executed were highly successful. The problem was there were not enough of them. They had, at best, only a limited impact on AQI’s operational tempo. The Task Force was facing an enemy it had never envisaged and could not degrade through its existing ways of operating.

May 15, 2018

The State of the Art in Contemporary CWMD Thinking

To effectively counter-WMD networks, the USG must bring to bear its full arsenal of capabilities, authorities, and permissions in a coordinated manner. As A.Q. Khan's story and September 11 demonstrate, exclusive use of the old tools—analysis, planning, functionally-organized sector-based agencies—in a complex environment has proven not only inadequate, but dangerous.

May 15, 2018

The Forensic Challenge

The suspected use of chemical, biological, radiological, and nuclear (CBRN) weapons or materials adds complexity to any international or internal conflict. It is critical that responses to such use are based on good information. The relatively new field of CBRN forensics, which is emerging out of domestic terrorism investigations, seeks to establish scientific facts through analysis of rigorously collected evidence. CBRN forensics are important to establishing actual facts, but are inherently difficult for a variety of reasons. The question of whether military forces, particularly Special Operations Forces (SOF), can conduct CBRN forensics in an adequate fashion is debatable; however, there are numerous pathways to improve the status quo.

May 15, 2018

WMD Terrorism: The Once and Future Threat

The specter of terrorists and other violent non-state actors acquiring weapons of mass destruction is perhaps an even greater concern than acquisition of weapons of mass destruction (WMD) by states. This over-magnification, however, ignores the hurdles inherent in such malignant enterprises. Despite clear interest on the part of some non-state adversaries, a true WMD is at present likely out of their reach in all but a select set of scenarios. Changes in technology, however, could augur a dramatic shift in the WMD terrorism threat picture.

May 15, 2018

Nuclear Terrorism: Did We Beat the Odds or Change Them?

Preventive actions taken since 2004, both in counterterrorism and in counterproliferation, have been extraordinary. From the decimation of al-Qaeda to the Iran Deal and the Nuclear Security Summits, difficult actions taken by courageous and hard-working Americans and others have prevented the future we feared. For all of these successes, however, there have been a matching number of failures and structural shifts that are increasing the risk of successful mega-terrorist attacks. To put it metaphorically, while there can be no doubt that we have been running faster, we have also been falling further behind. I still believe that the chance of an attack during the next decade is slightly greater than even. But there is a lengthy agenda of actions that the United States and other nations could take today to reduce this risk and even reverse trend lines moving in the wrong direction.

May 14, 2018

Dirty War: Rhodesia and Chemical Biological Warfare 1975-1980 (Book Review)

Glenn Cross’s Dirty War: Rhodesia and Chemical Biological Warfare 1975–1980 is a welcome addition to the small, but growing scholarly literature on the history of chemical and biological warfare. In 1965, the minority white community in the British territory of Rhodesia (officially Southern Rhodesia) rejected demands that it transfer political power to the majority black population. By the mid-1970s, white Rhodesians found it increasingly difficult to counter the growing power of native African nationalists fighting the government. As with many insurgencies, the guerrillas lacked the resources to defeat government security forces in direct combat, but Rhodesian forces were stretched too thin to suppress the insurgents, especially once they had established base camps in neighboring countries. Amidst the conflict, Rhodesian military and intelligence services employed what would now be considered chemical and biological agents against the guerillas with unknown results.

May 14, 2018

The Age of Lone Wolf Terrorism (Book Review)

The Age of Lone Wolf Terrorism by Mark S. Hamm and Ramon Spaaij provides the national security professional with an exceptional overview and appreciation of this growing problem facing the United States and its partners. Detailed in their compilation of the 123 incidents of lone wolf terrorism from 1940–2016, the authors examine the incidents against 20 variables to help identify trends in backgrounds, modus operandi, and motivations. Hamm and Spaaij, a professor of criminology and a sociologist respectfully, then devise a radicalization model that provides an evidence-based explanation for select case studies of lone wolf terror incidents.

May 9, 2018

Perils of the Gray Zone: Paradigms Lost, Paradoxes Regained

There is a world war under way, waged in hot, cold, and cool modes. The aggressors see no gray zone “between war and peace.” They see all as war. So must we.

Dec. 21, 2017

Battlefield Geometry in our Digital Age: From Flash to Bang in 22 Milliseconds

This year has been tough for cybersecurity programs. Every month in the first six months of 2017, the world experienced a major cyber event. Open-source attacks included attacks on critical infrastructure, banks, intelligence services, and significant commercial and government entities. Indeed, reflecting on the scope and depth of most publically acknowledged compromises, uncovers the reality of the tremendous and growing risks the country faces nearly two decades into the 21st century. Everything seems to have changed. Virtually every organization within the Department of Defense (DOD) has, sometimes reluctantly, come to embrace digital age technology, to the point that they are completely dependent on it. The result is a shocking degree of paralysis when our access to the services we now rely upon is disrupted.

Dec. 21, 2017

How is NATO Meeting the Challenge of Cyberspace

Historians of international relations are familiar with the hinge-year concept when trends that previously had been largely subterranean suddenly crystallize into a clear and immediate danger, forcing policymakers to wake up and take action. When it comes to cyberspace, the past year has certainly smashed any complacency about our ability to anticipate and counter the growing sophistication of cyberattacks. As fast as we have tried to catch up, the speed and global impact of these attacks continue to outrun us. 2016 witnessed the first major attack via the Internet of Things when a DynCorp server in the United States was hacked through video surveillance cameras. We also saw the first attacks driven by artificial intelligence, and increasing evidence of collusion between state intelligence services and organized crime networks.

Dec. 21, 2017

Power Projection in the Digital Age

Logistics is the lifeblood of the Joint Force. It requires an effective distribution network as its heart, moving and sustaining the force at the right place and at the right time—all the time. U.S. Transportation Command (USTRANSCOM) delivers that decisive force, projecting American power globally through the robust Joint Deployment and Distribution Enterprise (JDDE) and leveraging the expertise of more than 140,000 professionals. No other nation in the world can compete with the United States in conventional warfare because we plan, secure, and distribute combat capability so well. As a result, many military planners are now value-programmed to believe that a soldier or bullet will always be where it needs to be, when it needs to be there—on demand.

Dec. 21, 2017

A National Security Enterprise Response - Digital Dimension Disruption

The digital dimension is simultaneously enhancing and disrupting the fabric of life in every society where modern, informatized technology is present. The slow-motion collapse of parts of the 20th century’s legacy is now accelerating in ways that likely will usher in a monumental realignment of societal institutions, methods of business, and fundamental ideas about national security. This realignment will, of necessity, change the frameworks within which America provides for its security, including how it acquires the goods and services it uses in that effort.

Dec. 21, 2017

A Cyber Federal Deposit Insurance Corporation: Achieving Enhanced National Security

Of the emerging man-made risks affecting U.S. national security, cyber threats have enjoyed the most attention and resources from national security leaders and policymakers. And yet, cyber threats remain one of the most complex risks to address given their amorphous, highly fluid, and extra-territorial nature. This makes it difficult if not impossible to quantify the national state of readiness and, in these fiscally constrained times, the return on investment from the billions spent each year on cybersecurity. Five gaps conspire to make achieving a state of enhanced cyber resilience complex if not impossible. These include a yawning talent gap to the tune of millions of people; a technological gap predicated on managing a risk that evolves according to Moore’s law; a financial and economic gap leaving trillions in value at risk with no generally accepted way to measure this value; an alignment gap in terms of policy harmonization and cooperation inside the United States and around the world; and, finally, a gap in patience and the speed of markets. This article delves into the evolving cyber threat landscape and outlines ways of understanding and bridging these critical gaps.

Dec. 21, 2017

Bridging the Cyberspace Gap - Washington and Silicon Valley

One of the defining characteristics of the cyber domain is the dominance of the private sector. The majority of critical networks are privately owned and operated; more than 90 percent of American military and intelligence communications travel over privately owned backbone telecommunications networks. Many of the most talented hackers are in the private sector, and private security firms such as CrowdStrike, FireEye, and Cylance have taken an increasingly large public role in tracing cyberattacks to nation-states and other perpetrators. In addition, Alphabet, Amazon, Apple, Cisco, Facebook, IBM, Intel, and other companies drive innovation and the deployment of new technologies, especially in cutting-edge areas like artificial intelligence. For these reasons, strong ties to the technology sector are central to the U.S. Government’s (USG) pursuit of its economic, diplomatic, and military strategic interests in cyberspace.

Dec. 21, 2017

Cyber Gray Space Deterrence

During the past few years, adversaries of the United States have begun to use their militaries to test U.S. resolve through innovative methods designed to bypass deterrent threats and avoid direct challenges. These “gray space campaigns” are specifically designed to allow adversaries to achieve their goals without triggering escalation by making retaliation difficult. China demonstrated this with its attempt to seize control of the South China Sea through its island building program, as did Russia with its effort to foment insurgency in eastern Ukraine through the use of “little green men.”

Dec. 21, 2017

Cyberdeterrence by Engagement and Surprise

The conventional deterrence strategies of denial and punishment do not factor in the unique characteristics of the man-made cyber domain. This domain needs a new and holistic deterrence strategy that involves prompt and direct cyber responses that are sudden, dynamic, stealthy, and random so that adversaries can be defeated mentally and virtually. This article offers such an approach that I refer to as “deterrence by engagement and surprise.”

Dec. 21, 2017

A Three-Perspective Theory of Cyber Sovereignty

The cybercrime and cyber terrorism raging today are the most visible symptoms of a more pervasive problem concerning cyber security. How to establish a fair and just governance regime in cyberspace and establish international rules spark a storm of controversy. The controversy reflects the competing interests and demands of three distinct cyberspace actors: the state, the citizen, and the international community. By focusing only on one’s own interests, each actor ignores the interests of the other two, resulting in the current situation in which each sticks to its own argument and refuses to reconcile. The establishment of a new order in cyberspace requires a comprehensive review from the perspective of all three major actors. This article proposes a “three-perspectives” theory based on the three actors. It divides cyberspace into three levels; the base level, the application level, and the core level. Treating each level differently, it seeks to identify the largest common ground, and transcends the single perspective vulnerability of interpreting everything in terms of binary opposition. Three-perspective thinking makes it possible to deal with the binary opposition of exclusivity and transferability with respect to state sovereignty.

Dec. 21, 2017

An Interview with Marina Kaljurand, former Minister of Foreign Affairs of Estonia

Those were the first explicitly political cyberattacks against an independent, sovereign state in history. If put into today’s context, the attacks were not very sophisticated—even primitive. But back then, they were very disturbing. By that time, Estonia already had widely established internet and e-services, and an e-lifestyle; when those services were interrupted—mainly in the banking sector—it was highly disruptive. As to the effects of the attacks? They did not kill anybody, they were not destructive. They were highly disruptive to our lives though.

Dec. 21, 2017

Warnings Finding Cassandras to Stop Catastrophes

Every day we hear warnings—from parents concerned about the personal safety and good health of their children, to government officials worried about protecting the citizenry from external adversaries and the forces of nature. Distinguishing serious warnings of impending catastrophe from those that are frivolous may mean the difference between life and death, success and failure, freedom and oppression.

Dec. 21, 2017

International Conflict and Cyberspace Superiority: Theory and Practice

Cyberspace Superiority is a compelling mix of advanced technological know-how and easy-to-understand writing. Bryant, a Lieutenant Colonel who is a career fighter pilot and earned his Ph.D. in military strategy, first examines whether cyberspace is a “global common”—i.e. a shared resource like the oceans, atmosphere, space, and Antarctica. The answer may well determine the future nature of cyber hostilities but, with the issue as yet unsettled, Bryant posits a far more pressing question—is superiority in cyberspace “a useful construct for thinking about and planning for nation-state conflict in cyberspace?”

Dec. 21, 2017

Cyberspace in Peace and War

Martin Libicki has been a prolific writer in the field of information warfare since the mid-1990s. In this newer work, published by the Naval Institute Press, he aggregates his thinking during the past several decades into a single book. Cyberspace in Peace and War draws from work performed at RAND, both solely and with colleagues, and from lecture interactions with his students at various universities, to present a streamlined and consolidated overview of activities within and enabled by information technologies.

Dec. 21, 2017

Prologue

Nearly a half century ago in October 1969, computer programmers at the University of California, Los Angeles used a primitive Department of Defense computer network called ARPANET to send the first messages to computers at Stanford Research Institute. This quiet event, considered by some to be the birth of the internet, ignited a technological movement within the computer and information industries that eventually transformed the world into a globally connected society utterly dependent on instant access to information, yet increasingly vulnerable to network intrusions by those who seek to steal sensitive data or disrupt cyber infrastructure.

Sept. 15, 2017

The Curse of the Shiny Object

Human beings have a strong tendency to fight problems where they are visible. This intuitive and usually well-intended response to visible cues often produces inefficiencies and can result in spreading greater harm. This is the curse of the “shiny object”—when the attention-grabbing aspect of a problem distracts from identifying and countering the core drivers. The curse impacts many aspects of life. It can cause the U.S. Government (USG) and other organizations to overcommit resources to fight visible symptoms of security problems, while initiatives to counter the structural or systemic drivers of those problems are under-resourced if not entirely ignored. In the worst cases, initiatives to restore order have ended up spreading greater harm by targeting people or entire communities that are victims, not drivers, of the original security problem.