Browse by

March 1, 2008

DTP-047: China’s Science and Technology Emergence: A Proposal for U.S. DOD-China Collaboration in Fundamental Research

This report proposes the establishment of a constructive, phased strategy for engaging in collaborative fundamental research with Chinese academic institutions. Recent evaluations of top S&T universities and their specific capabilities suggest appropriate scientific areas where beneficial collaborations between DoD and China should be fostered.

Feb. 1, 2008

So Many Zebras, So Little Time: Ecological Models and Counterinsurgency Operations

Force ratios are an important variable in warfare and in nature. On the Serengeti, large zebra herds are constantly hunted by small prides of lions. But with their overwhelming majority, why don’t the zebras unite and attack the lions? Hooves can be as deadly as claws when used correctly. And conversely, if the lions are such effective predators, why are there so many zebras?

Jan. 1, 2008

Cyber Influence and International Security

Cyber influence is an ongoing source of power in the international security arena. Although the United States has an enormous cyber information capacity, its cyber influence is not proportional to that capacity. Impediments to American cyber influence include the vastness and complexity of the international information environment, multiplicity of cultures and differing audiences to which communications must be addressed, extensiveness and significance of contending or alternative messages, and complexity and importance of using appropriate influential messengers and message mechanisms.

Jan. 1, 2008

Strategic Fragility: Infrastructure Protection and National Security in the Information Age

Modern societies have reached unprecedented levels of prosperity, yet they remain vulnerable to a wide range of possible disruptions. One significant reason for this growing vulnerability is the developed world’s reliance on an array of interlinked, interdependent critical infrastructures that span nations and even continents. The advent of these infrastructures over the past few decades has resulted in a tradeoff: the United States has gained greater productivity and prosperity at the risk of greater exposure to widespread systemic collapse. The trends that have led to this growing strategic fragility show no sign of slowing. As a result, the United States faces a new and different kind of threat to national security.

Jan. 1, 2008

From Reform to Reduction: Reports on the Management of Navy and Department of Defense Laboratories in the Post-Cold War Era

This book reviews approximately 65 of the significant reports issued on Department of Defense (DOD) and Department of the Navy (DON) management of research, development, test, and evaluation (RDT&E) from the end of the Cold War through the late 1990s.

Jan. 1, 2008

DTP-046: Winning the Invisible War: An Agricultural Pilot Plan for Afghanistan

The purpose of this paper is to propose efforts to integrate a comprehensive campaign plan that brings together security and reconstruction efforts and the plethora of governmental and nongovernmental organizations working in Afghanistan.

Dec. 1, 2007

Organizing for National Security: Unification or Coordination?

Experience gained from the 9/11 attacks, combat in Iraq and Afghanistan, disaster assistance during and after Hurricane Katrina, and the ongoing war on terror provides the basis for amending our anachronistic national security structures and practices. Many analysts and officials have called for a second-generation version of the Goldwater-Nichols Department of Defense Reorganization Act of 1986 to address the array of organizational and management challenges that we face. Some argue that the new security environment requires even more fundamental change, similar to what was enacted after World War II. The principal legislation that emerged from that era was the National Security Act of 1947. Goldwater-Nichols aimed to fix inter-Service problems by streamlining the chain of command and promoting “jointness” but did not fundamentally alter the structure of the U.S. military.

Dec. 1, 2007

Coping with the Dragon: Essays on PLA Transformation

Should the independence movement in Taiwan regain political momentum, however, the potential for U.S. military intervention in the Taiwan Strait would increase.

Oct. 1, 2007

DTP-044: Implications of an Independent Kosovo for Russia’s Near Abroad

This paper evaluates the argument that Kosovo’s situation represents a precedent for separatists elsewhere by comparing it to the four regions in the Former Soviet Union most often cited in relation to it and is intended to highlight the similarities and differences between these cases, to facilitate negotiations on the resolution of the final status of Kosovo.

Sept. 1, 2007

The Comprehensive Approach Initiative: Future Options for NATO

Experience has shown that conflict resolution requires the application of all elements of national and international power— political, diplomatic, economic, financial, informational, social, and commercial, as well as military. To resolve conflicts or crises, the North Atlantic Treaty Organization (NATO) should adopt a Comprehensive Approach that would enable the collaborative engagement of all requisite civil and military elements of international power to end hostilities, restore order, commence reconstruction, and begin to address a conflict’s root causes. NATO can provide the military element for a comprehensive approach. Many other national, international, and nongovernmental actors can provide the civilian elements.