Due to a lapse in federal funding, this website is not being actively updated or monitored. See OPM status.

April 1, 2013

Convergence: Illicit Networks and National Security in the Age of Globalization

Acceleration. Magnification. Diffusion. Entropy. Empowerment. The global environment and the international system are evolving at hypervelocity. A consensus is emerging among policymakers, scholars, and practitioners that recent sweeping developments in information technology, communication, transportation, demographics, and conflict are making global governance more challenging. Some argue these developments have transformed our international system, making it more vulnerable than ever to the predations of terrorists and criminals. Others argue that despite this significant evolution, organized crime, transnational terrorism, and nonstate networks have been endemic if unpleasant features of human society throughout history, that they represent nothing new, and that our traditional means of countering them—primarily conventional law enforcement—are adequate. Even among those who perceive substantial differences in the contemporary manifestations of these persistent maladies, they are viewed as major nuisances not adding up to a significant national or international security threat, much less an existential threat.

April 1, 2013

China’s Forbearance Has Limits: Chinese Threat and Retaliation Signaling and Its Implications for a Sino-American Military Confrontation

Since its founding in 1949, the People’s Republic of China (PRC) has employed military force in defense of China’s security and territorial integrity. In many such instances, Beijing implemented a calculus of threat and retaliation signals intended first to deter an adversary from taking actions contrary to Chinese interests by threatening the use of military force and, if deterrence failed, to explain and justify Beijing’s resort to military force.

March 1, 2013

Russia Still Matters: Strategic Challenges and Opportunities for the Obama Administration

Russia’s institution of a ban on American adoptions of Russian orphans, an appalling response by the Duma to U.S. sanctions against officials involved in the Sergei Magnitsky case, was a clear indicator that bilateral relations will assume a lower priority in the next 4 years for both capitals. Russian President Vladimir Putin signed the measure despite open misgivings by some of his own key aides and against the opposition of most of Russia’s civil society. The Russian Internet response was scathing, producing an instant winner for best sick joke of 2012: “An educated American family has decided to adopt a developmentally disabled Duma deputy.”

Feb. 1, 2013

The New NATO Policy Guidelines on Counterterrorism: Analysis, Assessments, and Actions

DOWNLOAD PDFExecutive Summary The history of the North Atlantic Treaty Organization (NATO) will say that the first, and so far only, time NATO has called upon its Article 5 collective defense clause was on September 12, 2001, following a terrorist attack on one of its members. Yet, until the agreement by NATO Heads of State and Government on the

Feb. 1, 2013

DTP-100: Some Recent Sensor – Related Army Critical Technology Events

Some Recent Sensor-Related Army Critical Technology Events, James A. Ratches, Richard Chait, and John W. Lyons examined current Critical Technology Events (CTEs) that are new or ongoing in US Army Science and Technology (S&T) community.

Jan. 1, 2013

DTP-099: Suggestions for Evaluating the Quality of the Army’s Science and Technology Program: The Portfolio and Its Execution

This paper presents a methodology discussing the goal of establishing the strongest possible technology program appropriately aligned to the needs of its customers and the expectations of its stakeholders. The first chapter presents the essential elements of the Army S&T portfolio followed by discussions of the Army S&T portfolio and the evaluation of it.

Dec. 1, 2012

The International Atomic Energy Agency's Decision to Find Iran in Non-Compliance, 2002-2006

On August 14, 2002, at a press conference in Washington, DC, the National Council of Resistance of Iran (NCRI), an exiled Iranian opposition group, drew worldwide attention when it publicly accused Iran of clandestinely developing nuclear weapons. Alireza Jafarzadeh, then-U.S. media spokesperson for the NCRI, described two “top secret” nuclear facilities being constructed in Iran at Natanz and Arak under the guise of front companies involved in the procurement of nuclear material and equipment. Noting that media attention had focused on Iran’s publicly declared civilian facilities, Jafarzadeh claimed that “in reality, there are many secret nuclear programs at work in Iran without knowledge of the International Atomic Energy Agency (IAEA),” the international body responsible for verifying and assuring compliance with safeguards obligations under the 1968 Nuclear Non-Proliferation Treaty (NPT).

Nov. 1, 2012

Strategic Reflections: Operation Iraqi Freedom, July 2004 - February 2007

Operations Enduring Freedom and Iraqi Freedom were the first major wars of the 21st century. They will not be the last. They have significantly impacted how the U.S. Government and military think about prosecuting wars. They will have a generational impact on the U.S. military, as its future leaders, particularly those in the ground forces, will for decades be men and women who served in Iraq and Afghanistan. It is imperative that leaders at all levels, both military and civilian, share their experiences to ensure that we, as a military and as a country, gain appropriate insights for the future.

Oct. 1, 2012

Japan-China Relations 2005–2010: Managing Between a Rock and a Hard Place An Interpretative Essay

Between China and Japan, the past is ever-present. Notwithstanding shared cultural and historic ties, throughout the past century and going back to the Sino-Japanese war at the end of the 19th century, a bitter legacy of history—the Boxer Rebellion; the Mukden Incident and Japan’s occupation of South Manchuria (1931); the Marco Polo Bridge Incident, Japan’s subsequent invasion of China, and the Nanjing Massacre (1937); and the Sino-Japanese War (1937– 1945)—has left an indelible mark on this relationship.

Oct. 1, 2012

Public-Private Cooperation in the Department of Defense: A Framework for Analysis and Recommendations for Action

In 2010, a National Defense University (NDU) research project called TIDES (Transformative Innovation for Development and Emergency Support) was invited to partner with a company to produce a tradeshow about humanitarian assistance and disaster relief missions and related capabilities. Despite senior-level Department of Defense (DOD) guidance to pursue public-private partnerships, DOD attorneys told TIDES managers to reject the agreement. Differing legal interpretations of the word partner generated concern that the proposed partnership could create an impermissible perception of government endorsement of a private company. Even though it would have advanced the government’s mission and promoted efficiency, a variety of obstacles scuttled the proposed cooperation.

Oct. 1, 2012

Anticipatory Governance Practical Upgrades: Equipping the Executive Branch to Cope with Increasing Speed and Complexity of Major Challenges

The report suggests: (a) four concrete initiatives and eighteen specific proposals for organizing foresight as an input into the policy process; (b) eight initiatives and thirty-eight specific proposals for improving the capacity of existing systems to mesh their activities for coherent effect (i.e., networked governance); and (c)five specific, sequential initiatives to detect and respond to error and unintended consequences in mid-stream, before calamities occur (i.e., feedback).

Sept. 1, 2012

Managing Sino-U.S. Air and Naval Interactions: Cold War Lessons and New Avenues of Approach

The United States and China have a complex, multifaceted, and ambiguous relationship where substantial areas of cooperation coexist with ongoing strategic tensions and suspicions. One manifestation involves disputes and incidents when U.S. and Chinese military forces interact within China’s Exclusive Economic Zone (EEZ). Three high-profile incidents over the last decade have involved aggressive maneuvers by Chinese military and/or paramilitary forces operating in close proximity to deter U.S. surveillance and military survey platforms from conducting their missions. Why do these incidents continue to occur despite mechanisms designed to prevent such dangerous encounters? Could new or different procedures or policies help avoid future incidents?

Sept. 1, 2012

The Presidential Nuclear Initiatives of 1991-1992

On the morning of September 28, 1991, then-Colonel Frank Klotz witnessed an historic moment at Grand Forks Air Force Base, North Dakota. As he and other senior officers from the base bomber and missile units watched, the crews for the B-1 strategic bombers that had been on alert that day climbed into their cockpits, started the planes, and taxied one after another away from the alert aircraft parking area. That scene was repeated at all 11 Strategic Air Command (SAC) bases in the United States. By the end of the day, there were no U.S. bombers on alert for the first time in over 30 years.

Sept. 1, 2012

Toward the Printed World: Additive Manufacturing and Implications for National Security

Additive manufacturing (AM)—commonly referred to as “three-dimensional” or “3D” printing—is a prospective game changer with implications and opportunities that affect not just the Department of Defense (DOD) but the economy as a whole. The technology allows the “art to part” fabrication of complex objects from a computer model without part-specific tooling or human intervention.1 AM has already impacted a variety of industries and has the potential to present legal and economic issues with its strong economic and health-care benefits. Because of its remarkable ability to produce a wide variety of objects, AM also can have significant national security implications. The purpose of this paper is to provide a general introduction to these issues for nontechnical readers through a survey of the recent history and the current state of technology. Included in this paper is a brief review identifying key individuals and organizations shaping developments as well as projected trends.

Sept. 1, 2012

DTP-098: Taking the Battle Upstream: Towards a Benchmarking Role for NATO

The main intuition underlying this paper is that the current (geo) political, technological, and especially financial realities may require NATO to take the battle for capabilities upstream.

Aug. 1, 2012

Preparing the Pipeline: The U.S. Cyber Workforce for the Future

In 2008, the Comprehensive National Cybersecurity Initiative listed “expanded cyber education” as one of its key recommendations. In 2009, the Partnership for Public Service produced a report stating that the current pipeline of cybersecurity workers into the government was inadequate. In the same year, Secretary of Defense Robert Gates stated that the military was “desperately short of people who have the capabilities [to operate in cyberspace].” And in 2011, the Inspector General of the Federal Bureau of Investigation reported that 35 percent of the special agents investigating national security cyber-intrusion cases lacked necessary training and technical skills. Nonetheless, the U.S. Government and private sector still seek to increase their online operations and dependency in spite of these shortcomings. An expert at the Atlantic Council of the United States sums up this problem: “cyber workforce management efforts resemble a Ferris wheel: the wheel turns on and on . . . we move, but around and around, never forward.”

Aug. 1, 2012

DTP-097: Non-Traditional Security Threats and Asia-Pacific Regional Cooperation

The purpose of this paper is for the better understanding of the security challenges and opportunities for expanded cooperation through global regional efforts to manage our planet and govern its inhabitants more responsibly.

Aug. 1, 2012

Trust, Engagement, and Technology Transfer: Underpinnings for U.S.-Brazil Defense Cooperation

On the eve of the January 1, 2011, inauguration of Brazilian President Dilma Rousseff, the State Department noted that the United States “is committed to deepening our relationship on a wide range of bilateral, regional and global issues with Brazil’s government and people.” President Rousseff herself declared shortly thereafter, “We will preserve and deepen the relationship with the United States.” During President Barack Obama’s March 2011 visit to Brazil, both leaders cited “the progress achieved on defense issues in 2010” and stated their commitment to “follow up on the established dialogue in this area, primarily on new opportunities for cooperation.” While these rhetorical commitments are important, will they lead to greater cooperation on defense issues and improve U.S.-Brazil ties?

July 16, 2012

Security Considerations for a Warming Arctic

In the past, extreme conditions deterred maritime exploration throughout much of the Arctic. This left huge frozen reserves of oil, natural gas, and mineral wealth virtually untouched by the world’s five major Arctic States: Canada, Denmark, Norway, Russia, and the United States. Now, global climate changes are altering human accessibility to these untapped resources, creating new possibilities for trade, development, and conflict. In this 2012 Working Paper, Dr. Jim Keagle and Mr. Christopher Mann survey the issues most relevant to Department of Defense policy-makers.

July 1, 2012

DTP-095: Report of an Army Workshop on Convergence Forecasting: Mechanochemical Transduction

This is an assessment of the Mechanochemical Transduction Convergence Workshop sponsored by the Army Research Office which took place in January 2012. The workshop was a test case for identifying convergences of disciplines and their potential impact on science and the Army. The chief objective of the workshop was the identify the most promising research opportunities and interdisciplinary convergences that could lead the field of mechanochemical transduction in new direction with unexpected outcomes that would be relevant to future Army needs.

July 1, 2012

DTP-096: Chemical and Biological Defense Test and Evaluation (T&E) Future Challenges

The objective of this study was to identify emerging technical, methodological, and infrastructure challenges for future Chemical and Biological Defense Test and Evaluation investment, and to serve as a prequel to the development of a full strategic T&E Roadmap.

June 1, 2012

Deception, Disinformation, and Strategic Communications: How One Interagency Group Made a Major Difference

This study explains how one part-time interagency committee established in the 1980s to counter Soviet disinformation effectively accomplished its mission. Interagency committees are commonly criticized as ineffective, but the Active Measures Working Group is a notable exception. The group successfully established and executed U.S. policy on responding to Soviet disinformation. It exposed some Soviet covert operations and raised the political cost of others by sensitizing foreign and domestic audiences to how they were being duped. The group’s work encouraged allies and made the Soviet Union pay a price for disinformation that reverberated all the way to the top of the Soviet political apparatus. It became the U.S. Government’s body of expertise on disinformation and was highly regarded in both Congress and the executive branch.

June 1, 2012

Proliferation Security Initiative: Origins and Evolution

On December 9, 2002, the United States and Spanish navies cooperated to interdict a North Korean vessel, the So San, in the Arabian Sea.1 The operation initially appeared to be an unqualified success, a textbook example of interdiction to prevent proliferation of weapons of mass destruction (WMD), related materials, or delivery systems. According to press reports, the United States began tracking the vessel when it first left North Korea, believing that it was carrying a cargo related to Scud ballistic missiles. The So San flew no flag, making it a stateless vessel under international law, subject to interception and boarding by warships on the high seas.2 The United States asked the Spanish navy to stop and search the So San when the ship reached the patrol area of Combined Task Force (CTF) 150, then under Spanish command. The mission of CTF 150 was “to promote maritime security in order to counter terrorist acts and related illegal activities” in the Gulf of Aden, Gulf of Oman, Red Sea, and Indian Ocean.3 Thus, the United States proposed—and Spain agreed—to use a tool developed to combat global terrorism in a counterproliferation mission.

June 1, 2012

Offshore Control: A Proposed Strategy for an Unlikely Conflict

As America ends its military commitment to Iraq and continues its drawdown in Afghanistan, a lively discussion has emerged on what future challenges the Nation faces. High on every list is the requirement to deal with a rising China. In his remarks to the Australian Parliament on November 17, 2011, President Barack Obama stated, “As we end today’s wars, I have directed my national security team to make our presence and mission in the Asia Pacific a top priority.” As part of this rebalancing to Asia, the administration has stated that it seeks “to identify and expand areas of common interest, to work with China to build mutual trust, and to encourage China’s active efforts in global problem-solving.” Clearly, the United States seeks prudent and coordinated political, economic, and military actions to further integrate China into the international system.

May 1, 2012

DTP-093: Modeling the Combined Terrorist-Narcotics Trafficker Threat to National Security

This modeling study demonstrated that model-generated data closely resembled actual reports about tons of disrupted narcotics substances in three consecutive years. the policy cycle model showed that increased rates of policy cycle activity increased the amount of narcotics disruption, while increased levels of corruption reduced those levels.

May 1, 2012

DTP-094: Combating Transnational Organized Crime: Strategies and Metrics for the Threat

This paper provides an overview of the strategic and policy initiatives that the United States and international community have taken, including an assessment of the TOC threat. The overview is followed by the metrics developed to evaluate the relative magnitude and direction of the threat of a 5-year period.

April 1, 2012

Cross-currents in French Defense and U.S. Interests

France is the only European ally—except for the United Kingdom (UK)—that regards its military capabilities, operational performance, and defense industry as vital levers to exert global influence. While the French believe strongly in their need to preserve “strategic independence,” they see new challenges in the evolving international security environment that will oblige them to accept greater cooperation with others, even in areas once considered too sensitive to discuss. Although some French strategists remain uncomfortable with the notion of closer defense ties with the United States, others ask whether there might be a greater danger ahead: specifically, if Europe’s strength dissipates as America “rebalances” toward the Asia-Pacific region, where does France turn to find capable and willing partners to protect its security interests?

April 1, 2012

Grand Strategy and International Law

Grand strategy is, or should be, the “calculated relationship of means to large ends.” Interrelated strategic and legal dimensions provide a leitmotif to the modern history of relations among powerful states. States employ an array of means to achieve their large ends—military power, as well as diplomatic, informational, economic/financial, and legal tools and influence. They differ in effectiveness and precision. In the web of interactions that shape contemporary international relations, the legal dimension as a framework and guide to choices is more often overlooked than particular legal instruments that might be invoked in the belief, or more often the hope, that they will serve policy and strategic objectives.

March 1, 2012

Russia and the Iranian Nuclear Program: Replay or Breakthrough?

Despite protests across Russia sparked by last December’s fraud-filled Duma (parliament) elections, Vladimir Putin is preparing to return to the presidency this May. Will Putin replay his 2004–2008 approach to Iran, during which Russia negotiated the S–300 air defense system contract with Tehran? Or will he continue Russia’s breakthrough in finding common ground with the United States on Iran seen under President Dmitriy Medvedev, who tore up the S–300 contract?

March 1, 2012

DTP-092: Enhancing Army S&T Vol. II: The Future

Chapter I of this volume is an introduction, and Chapter II offers an updated view of the work discussed in Vol. I with an emphasis on the relative roles played by the Army laboratories that manufactured the systems. The close collaboration between the two groups was judged by the authors to be the key to the successful outcomes. This chapter presents updated findings and recommendations of the previous studies in Vol I.

Feb. 1, 2012

DTP-088: Reflections on Over Fifty Years in Research and Development; Some Lessons Learned

This paper presents some thoughts about research in science and technology gleaned from Dr. Lyons’ more than 50 years working in scientific and engineering research – first in chemical industry, then at two different government laboratories, and later some years in S&T policy. It elaborates on a paper by Richard Chait in which he interviews three former S&T executives in the DoD on how to manage a research laboratory. Its objective is to provide some insights on what it is like to work in a scientific research establishment.

Feb. 1, 2012

DTP-089: Domestic Event Support Operations (DESO)

This paper draws heavily on Australian experience in the last dozen years, during which time the country hosted a Summer Olympics and Paralympics, a Commonworth Games, an Asia-Pacific Economic Cooperation Leaders Meeting, and a number of other events, all of which required DESO to be mounted.

Feb. 1, 2012

DTP-090: Constructive Convergence: Imagery and Humanitarian Assistance

The goal of this paper is to illustrate to the technical community and interested humanitarian users the breadth of tools and techniques now available for imagery collection, analysis and distribution, and to provide brief recommendations with suggestions for next steps.

Feb. 1, 2012

DTP-091: Globalization of S&T: Key Challenges Facing DOD

This paper employs the results of a full economic analysis for the period 2005-2050 to estimate the S&T knowledge production for each of the world’s 17 largest economies. The present work establishes an empirical relationship between an economy’s gross domestic product per capita and its ability to generate S&T knowledge.

Feb. 1, 2012

Post-Asad Syria: Opportunity or Quagmire?

The government of President Bashar al-Asad in Syria faces strong pressure from its neighbors and the Western powers. In the background is the fall in 2011 of longstanding governments in Tunisia and Egypt to popular protests and, of course, the overthrow of Libyan leader Muammar Qaddafi in a civil war backed by North Atlantic Treaty Organization (NATO) military action. It is not clear if Asad will fall or if he will hold on to power. It is fair to say that because his hold on power is sufficiently in doubt, it is well worth examining what would be the strategic consequences if he fell and what would be the strategic implications if he is able to muddle through Syria’s current difficulties. Moreover, given the many sudden and unpredicted Middle East developments in 2011, such an examination should note which low-probability developments might have major impacts on the region and on U.S. interests.

Feb. 1, 2012

Space and the Joint Fight

The world first saw the power of space to transform warfare in the 1991 Gulf War. In the years since, the U.S. military has come to depend heavily on space throughout its peacetime and combat operations. Satellites acquired by the Department of Defense (DOD) principally provide protected communications; data for position and timing, terrestrial and space weather, missile launch warning and tracking, and space situational awareness; and experiments and other research and development activities. Satellites for reconnaissance and surveillance are the domain of the National Reconnaissance Office (NRO), under the Director of National Intelligence (DNI).

Jan. 1, 2012

Defining "Weapons of Mass Destruction" (Revised)

This revised Occasional Paper explores the issue of defining weapons of mass destruction with a focus on summarizing how the term has been used in disarmament negotiations, U.S. national security policy, Soviet and Russian military doctrine, and American political discourse. The paper identifies alternative definitions for WMD, addresses some of the key policy issues associated with different definitions, and proposes a definition appropriate for the Department of Defense.

Jan. 1, 2012

The Iron Triangle Manifested: U.S. Air Force Tanker Lease 2001–2005 Case Study

The proposed lease of the KC–767 tanker aircraft was one of the most infamous procurement scandals of the post–Cold War era. Interactions within the military-industrial-congressional complex led to legislation permitting the Air Force to lease tankers from Boeing using an operating lease rather than standard procurement. Following the outcry from Congress, industry, the media, and numerous watchdog groups, Congress and the Department of Defense (DOD) launched a wave of investigations and hearings. During the lease debate, participants reached a number of compromises documented in congressional legislation. However, this was not sufficient to continue the lease process. After nearly 4 years, Congress cancelled the tanker lease and directed the Air Force to pursue a traditional procurement approach.

Jan. 1, 2012

Raising Our Sights: Russian- American Strategic Restraint in an Age of Vulnerability

The United States and Russia have sought to reduce the danger of nuclear war by limiting offensive strategic capabilities through negotiated agreements, relying on mutual deterrence based on reciprocal threats and the corresponding fear of retaliation. Although nuclear arsenals have been pared, this is fundamentally the same way the United States and Soviet Union sought to reduce the danger of nuclear war during the Cold War, when both were impelled to do so because they were adversaries and able to do so despite being adversaries. It is ironic—not to say unimaginative—that although the two are no longer adversaries, they stick to a path chosen when they were. This current approach is inadequate given new strategic vulnerabilities brought on by technological change. Both the opportunity and the need now exist for a different, more ambitious approach to avoiding strategic conflict—one designed for new possibilities as well as new vulnerabilities. The United States and Russia can and should raise their sights from linear numerical progress to qualitative transformation of their strategic relationship.

Jan. 1, 2012

Sino-American Strategic Restraint in an Age of Vulnerability

For all their power, both the United States and China are increasingly vulnerable. Each faces a range of strategic dangers, from nuclear weapons to disruption of critical computer networks and space links.1 Because their relationship is at once interdependent and potentially adversarial, the United States and China are especially vulnerable to each other: interdependence exposes each to the other, while the potential for conflict impels each to improve strategic capabilities against which defenses can be futile. Strategic vulnerability cannot be eliminated, only mitigated.

Dec. 1, 2011

Buy, Build, or Steal: China’s Quest for Advanced Military Aviation Technologies

Although China continues to lag approximately two decades behind the world’s most sophisticated air forces in terms of its ability to develop and produce fighter aircraft and other complex aerospace systems, it has moved over time from absolute reliance on other countries for military aviation technology to a position where a more diverse array of strategies can be pursued. Steps taken in the late 1990s to reform China’s military aviation sector demonstrated an understanding of the problems inherent in high-technology acquisition, and an effort to move forward. However, a decade later it remains unclear how effective these reforms have been. Where are the People’s Liberation Army Air Force (PLAAF) and China’s military aviation industry headed? What obstacles must be overcome for China to join the exclusive ranks of those nations possessing sophisticated air forces and aviation industries capable of producing world-class aircraft?

Dec. 1, 2011

U.S. Ratification of the Chemical Weapons Convention

On October 1, 1990, two months after Iraq’s surprise invasion and annexation of Kuwait had put the United States and other members of the international community on a collision course with the Saddam Hussein regime, President George H.W. Bush spoke to the United Nations (UN) General Assembly in New York. He described Iraq’s brutal aggression against its neighbor as “a throwback to another era, a dark relic from a dark time.” Noting that Saddam Hussein had waged a “genocidal poison gas war” against Iraq’s restive Kurdish minority during the 1980s, President Bush hinted that if it ultimately proved necessary to liberate Kuwait by force, the United States and its allies could face Iraqi attacks with chemical weapons—highly toxic chemicals designed to incapacitate or kill.

Dec. 1, 2011

Capability Development in Support of Comprehensive Approaches: Transforming International Civil-Military Interactions

This book is the product of the Second International Transformation (ITX2) Conference, held in Rome, Italy, at the NATO Defense College (NDC) in June 2011.

Dec. 1, 2011

Deterrence and Escalation in Cross-domain Operations: Where Do Space and Cyberspace Fit?

Warfare has become even more complicated since Richard Smoke wrote this description of escalation in 1977. The National Security Space Strategy describes space as “congested, contested, and competitive,” yet satellites underpin U.S. military and economic power. Activity in cyberspace has permeated every facet of human activity, including U.S. military operations, yet the prospects for effective cyber defenses are bleak. Many other actors depend on continued access to these domains, but not nearly as much as the United States.

Dec. 1, 2011

The Emergence of China in the Middle East

During the 9th century, Arab traders regularly plied lucrative maritime routes that connected the Persian Gulf to southern China by way of the Indian Ocean. This commercial activity, which mostly involved jade, silk, and other luxury goods, went on for centuries and became part of what is now known as the Silk Road. In some ways, the world is now witnessing a restoration of that ancient trading relationship between two civilizations—except that oil and consumer goods have replaced jade and silk.

Nov. 1, 2011

A Review of the 2001 Bonn Conference and Application to the Road Ahead in Afghanistan

Ten years ago in Bonn, Germany, the United Nations Envoy to Afghanistan, Ambassador Lakhdar Brahimi, and U.S. Envoy to the Afghan Opposition, Ambassador James Dobbins, led a diverse group of international diplomats and warriors to consensus and charted the political course for Afghanistan well into the decade. The process that led to the Bonn Agreement (Bonn 2001, or Bonn I) reflects the best of U.S. and United Nations statesmanship and was the result of the effective application of military and diplomatic power.

Nov. 1, 2011

DTP-087: The Use of High Performance Computing (HPC) to Strengthen the Development of Army Systems

This paper seeks to discuss the growth and trends in High Performance Computing (HPC) and how the Army has utilized HPC in research. It also addresses the possibilities for design and production of new systems and how industry has advanced the use of HPC. One intent of this paper is to re-evaluate the advanced manufacturing area in light of the many recent developments in computational capability and availability. It concludes with comments and recommendations for strengthening Army acquisition using advanced computer technology.

Oct. 1, 2011

Policing and COIN Operations: Lessons Learned, Strategies and Future Directions

A monograph that grasped the need to expand the focus of the role of policing in counterinsurgency, and considering the framework for the desired outcome to influence policymakers on the future directions of the role of policing.

Oct. 1, 2011

DTP-084: Task Force Stryker Network-Centric Operations in Afghanistan

This case study examines the real-world application of the network-centric warfare concept during combat operations in Afghanistan.

Oct. 1, 2011

DTP-085: Elevating the Role of Socioeconomic Strategy in Afghanistan Transition

This paper reviews the System Analysis and Studies Panel of the NATO Research and Technology Organization which created a Specialist Team in June 2010 in response to an International Security Assistance Force request to help develop, define, and implement a strategy for data collection and management. The goal of the initiative was to provide direct assistance to NATO, ISAF, and the Government of the Islamic Republic of Afghanistan.

Oct. 1, 2011

DTP-086: Challenges to Leadership: Responding to Biological Threats

This paper seeks to identify certain gaps and overlaps in existing structure and mechanisms and to advance potential solutions that can be implemented. It examines two issues of concern: Federal Coordination Structure and Federal/State Coordination and recommends that a more comprehensive set of planning and response exercises be developed in order to better understand and develop a doctrine of incident leadership suitable for a biological crisis.

Sept. 1, 2011

The Ongoing Insurgency in Southern Thailand: Trends in Violence, Counterinsurgency Operations, and the Impact of National Politics

Since January 2004, a Malay-Muslim–based insurgency has engulfed the three southernmost provinces in Thailand. More than 4,500 people have been killed and over 9,000 wounded, making it the most lethal conflict in Southeast Asia. Now in its 8th year, the insurgency has settled into a low-level stalemate. Violence is down significantly from its mid-2007 peak, but it has been steadily climbing since 2008. On average, 32 people are being killed and 58 wounded every month. Most casualties are from drive-by shootings, but there are also about 12 improvised explosive device (IED) attacks a month.

Sept. 1, 2011

Korean Futures: Challenges to U.S. Diplomacy of North Korean Regime Collapse

There is no shortage of plausible scenarios describing North Korean regime collapse or how the United States and North Korea’s neighbors might respond to such a challenge. Yet comparatively little attention has been paid to the strategic considerations that may shape the responses of the United States, the Republic of Korea (ROK), Japan, China, and Russia to a North Korean crisis. These states are most likely to take action of some kind in the event the North Korean regime collapses. For the ROK (South Korea), North Korean regime collapse presents the opportunity for Korean reunification. For the other states, the outcome in North Korea will affect their influence on the peninsula and their relative weight in Asia. This study identifies the interests and objectives of these principal state actors with respect to the Korean Peninsula. Applying their interests and objectives to a generic scenario of North Korean regime collapse, the study considers possible policies that the principal state actors might use to cope with such a crisis.

Aug. 1, 2011

New Directions in U.S. National Security Strategy, Defense Plans, and Diplomacy: A Review of Official Strategic Documents

Where are U.S. national security strategy, defense plans, and diplomacy headed in the coming years? An answer to this important question comes from seven official studies that have been issued during 2010.

July 1, 2011

DTP-083: Strengthening Government Laboratory Science and Technology Programs: Some Thoughts for the Department of Homeland Security

This paper summarizes the second phase of a research and analysis project that stemmed from the initial work which provided DHS Science and Technology leadership with examples of practical approaches to risk-informed decisionmaking and metrics for program and project selection. The second phase was undertaken to provide additional relevant information to DHS as it seeks to strengthen its laboratory programs.

July 1, 2011

Countering the Lord’s Resistance Army in Central Africa

The Lord’s Resistance Army (LRA) is one of Africa’s most brutal militia forces. It has plagued Central Africa, particularly northern Uganda, for over two decades. The group’s tactics provide textbook examples of war crimes and crimes against humanity. When attacking civilians, the LRA instills fear by selecting random individuals for brutal executions. Children are abducted to serve as porters, sex slaves, and new militia. In order to indoctrinate child soldiers, young abductees are routinely forced to kill their own family members and other children, or be murdered themselves. Anyone caught trying to escape from the LRA is summarily executed. By contrast with other African rebel groups, which occasionally adopt such brutal tactics, the LRA has conducted such atrocities on a systematic and prolonged basis.

July 1, 2011

Chinese Military Transparency: Evaluating the 2010 Defense White Paper

The People’s Republic of China (PRC) State Council Information Office released the seventh edition of its biennial defense white paper, “China’s National Defense in 2010,” on March 31, 2011. This document aims to communicate the latest information on China’s military development, strategy, capabilities, and intentions. China began publishing defense white papers in 1998, partly as a means of increasing transparency in response to regional concerns about the growing capabilities and actions of the People’s Liberation Army (PLA). Despite the systematic release of these documents, many of China’s neighbors and other regional powers continue to express concerns about China’s lack of military transparency. The Chinese maintain that they are becoming more open over time and highlight the importance of transparency about strategic intentions rather than capabilities.

July 1, 2011

The Evolving Threat of al Qaeda in the Islamic Maghreb

The United States faces an important strategic question in northwest Africa: what level of activity by al Qaeda in the Islamic Maghreb (AQIM) would constitute a sufficient threat to U.S. national security interests to warrant a more aggressive political, intelligence, military, and law enforcement response? AQIM already poses the greatest immediate threat of transnational terrorism in the region, and its operational range and sophistication continue to expand. Since 2007, the group has professed its loyalty to Osama bin Laden and al Qaeda’s senior leadership and claimed responsibility for dozens of attacks in the subregion. These attacks have included the use of suicide bombers, improvised explosive devices, kidnapping operations, and assassinations.

June 1, 2011

Joint Interagency Task Force–South: The Best Known, Least Understood Interagency Success

Joint Interagency Task Force–South (JIATF–South) is well known within the U.S. Government as the “gold standard” for interagency cooperation and intelligence fusion, despite its preference for keeping a low profile and giving other agencies the credit for its successes. It is often cited as a model for whole-of-government problem-solving in the literature on interagency collaboration, and other national security organizations have tried to copy its approach and successes. Despite the plaudits and attention, the way that JIATF–South actually operates has only received superficial analysis. In fact, few people actually understand why JIATF–South works as well as it does or how its success might be replicated.

May 1, 2011

DTP-082: Analysis of the Threat of Genetically Modified Organisms for Biological Warfare

This study seeks to better understand the evaluation of the potential threats posed by advances in biotechnology, especially genetically modified organisms and synthetic biology. It narrows the scope of consideration into two parts: defining a catastrophic biological attack focused on bioterrorism and that this attack would be restricted to the United States.

April 1, 2011

Iran’s Islamic Revolution: Lessons for the Arab Spring of 2011?

The Islamic Revolution surprised senior U.S. policymakers as well as the Shah of Iran, Mohammad Reza Pahlavi. On the eve of revolution, Iran—a key U.S. ally—seemed relatively stable despite bouts of urban terrorism in the early and mid-1970s. At the first signs of escalating unrest in early 1978, neither Iranian nor U.S. officials considered the possibility that Iran’s armed forces, the largest and most modern in the region (next to those of Israel), would prove unable to deal with whatever trouble lay ahead. The fall of the Shah a year later, therefore, raised searching questions regarding the role of the armed forces during the crisis and its failure to quash the revolution. The recent emergence of popular protest movements that have overthrown authoritarian regimes in Tunisia and Egypt—and that are challenging similar regimes in Libya, Yemen, Bahrain, and Syria—has revived memories of the Shah and his fall. These developments have again raised questions regarding the role of armed forces during revolutions and whether Iran’s experience during the Islamic Revolution and after holds relevant lessons for current developments in the Middle East.

March 1, 2011

Secret Weapon: High-value Target Teams as an Organizational Innovation

This study argues that interagency teams were a major catalyst in turning around the Iraq War, and that they will disappear from America’s arsenal unless the knowledge base supporting the innovation can be secured. Most explanations credit the dramatic reduction in violence in Iraq between 2007 and 2008 to new U.S. leadership, the surge in U.S. forces, and/or U.S. financial support to Sunni tribal leaders. In contrast, we argue that the United States employed an underappreciated organizational innovation—interagency teams—to put insurgent clandestine organizations on the defensive and give population security measures a chance to take effect.

March 1, 2011

DTP-081: Assessing Army Power and Energy for the Warfighter

This paper reviews some of the landscape of research and development on power and energy as it pertains to the needs of the Army warfighter. It focuses on the battlefield and considers questions related to vehicles, dismounted soldiers, and forward operating bases. The context of the study is twofold: the National need to reduce the use of petroleum-based fuels and the Army’s need to reduce the logistical burden and hazards moving said fuels on the battlefield.

March 1, 2011

DTP-081: Assessing Army Power and Energy for the Warfighter

This paper reviews some of the landscape of research and development on power and energy as it pertains to the needs of the Army warfighter. It focuses on the battlefield and considers questions related to vehicles, dismounted soldiers, and forward operating bases. The context of the study is twofold: the National need to reduce the use of petroleum-based fuels and the Army’s need to reduce the logistical burden and hazards moving said fuels on the battlefield.

March 1, 2011

Brazil and the United States: The Need for Strategic Engagement

Washington’s identification of Brazil with Latin America and the Third World hampers its appreciation of Brazil’s power and importance to the United States. It is true that Brazil is geographically part of Latin America, and it is also true that Brazil, a founder of the Group of 77, was, with India, among the original leaders of the “Third World.”

Feb. 1, 2011

Finland, Sweden, and NATO: From “Virtual” to Formal Allies?

The “Open Door” policy of the North Atlantic Treaty Organization (NATO) has been an article of faith for Allies and aspirants alike for more than a decade. Its most recent formulation, approved at the November 2010 Lisbon Summit, states: “The door to NATO membership remains fully open to all European democracies which share the values of our Alliance, which are willing and able to assume the responsibilities and obligations of membership, and whose inclusion can contribute to common security and stability.”

Feb. 1, 2011

European Energy Security: Reducing Volatility of Ukraine-Russia Natural Gas Pricing Disputes

On January 7, 2009, the existing energy relationship among Europe, Russia, and Ukraine broke down over a natural gas dispute, just as it had done 3 years earlier. Amid subzero temperatures in many parts of Europe, Russia turned off its gas supply to Ukraine, causing shortages in more than 20 European countries. Thousands across the continent were left in the dark, and government services were closed.1 While the flow of gas was eventually restored, Russian gas disputes with Ukraine continue, and the prospect of another Gazprom shutoff has become an annual event for European consumers. Despite earlier indications that another breakdown in negotiations would lead to blackouts in Europe early in 2010, the potential crisis was averted via a Russia-Ukraine deal that restructured earlier payment and pricing arrangements.2 However, it is doubtful that Ukraine can continue timely payments for its domestic gas consumption and maintain its own pipeline infrastructure. Fundamental changes to Russia-Ukraine energy transport agreements are coming.

Feb. 1, 2011

Conventional Prompt Global Strike: Strategic Asset or Unusable Liability?

The Conventional Prompt Global Strike (CPGS) concept calls for a U.S. capability to deliver conventional strikes anywhere in the world in approximately an hour. The logic of the CPGS concept is straightforward. The United States has global security commitments to deter and respond to a diverse spectrum of threats, ranging from terrorist organizations to near-peer competitors. The United States might need to strike a time-sensitive target protected by formidable air defenses or located deep inside enemy territory. Small, high-value targets might pop up without warning in remote or sensitive areas, potentially precluding the United States from responding to the situation by employing other conventional weapons systems, deploying Special Operations Forces (SOF), or relying on the host country.

Feb. 1, 2011

Small Nuclear Reactors for Military Installations: Capabilities, Costs, and Technological Implications

In recent years, the U.S. Department of Defense (DOD) has become increasingly interested in the potential of small (less than 300 megawatts electric [MWe]) nuclear reactors for military use.1 DOD’s attention to small reactors stems mainly from two critical vulnerabilities it has identified in its infrastructure and operations: the dependence of U.S. military bases on the fragile civilian electrical grid, and the challenge of safely and reliably supplying energy to troops in forward operating locations. DOD has responded to these challenges with an array of initiatives on energy efficiency and renewable and alternative fuels. Unfortunately, even with massive investment and ingenuity, these initiatives will be insufficient to solve DOD’s reliance on the civilian grid or its need for convoys in forward areas. The purpose of this paper is to explore the prospects for addressing these critical vulnerabilities through small-scale nuclear plants.

Feb. 1, 2011

Toward a Theory of Spacepower: Selected Essays

This volume is a product of the efforts of the Institute for National Strategic Studies Spacepower Theory Project Team, which was tasked by the Department of Defense to create a theoretical framework for examining spacepower and its relationship to the achievement of national objectives. The team was charged with considering the space domain in a broad and holistic way, incorporating a wide range of perspectives from U.S. and international space actors engaged in scientific, commercial, intelligence, and military enterprises.

Jan. 1, 2011

China’s Out of Area Naval Operations: Case Studies, Trajectories, Obstacles, and Potential Solutions

This study seeks to understand the future direction of the People’s Liberation Army Navy (PLAN) with regard to out of area deployments and power projection. The assessment is based on the history of past PLAN out of area deployments and an analysis of out of area operations of other military forces. Both short- and long-term lenses are employed to understand the scope and direction of China’s defense planning and strategic decisions.

Jan. 1, 2011

Russia’s Revival: Ambitions, Limitations, and Opportunities for the United States

Independent Russia is approaching the start of its third decade of post-Soviet existence. After the economic chaos of the Boris Yeltsin decade and the recovery and stabilization of the Vladimir Putin decade, Russia’s leaders have high ambitions for a return to great power status in the years ahead. Their aspirations are tempered, however, by the realities of Russia’s social, economic, and military shortcomings and vulnerabilities, laid painfully bare by the stress test of the recent global financial crisis. Looking ahead, some also calculate that Russia will be increasingly challenged in the Far East by a rising China and in the Middle East by an Iran that aspires to regional hegemony.

Jan. 1, 2011

Maximizing the Returns of Government Venture Capital Programs

The stories of Google and Segway certainly end differently. With a market capitalization of over $180 billion, Google is arguably the biggest success in the information technology (IT) industry in the last decade. The phrase google it has worked its way into everyday language and dictionaries. On the other hand, Segway remains a privately held company whose products are largely relegated to use by tourists in major cities and security personnel at airports. We certainly do not hear people say that they “segwayed” to work this morning.

Jan. 1, 2011

DTP-080: Assessing Military Benefits of S&T Investments in Micro Autonomous Systems Utilizing a Gedanken Experiment

This paper address The Army Research Laboratory’s Micro-Autonomous Systems and Technology Collaborative Technology Alliance program which was chosen to demonstrate the utility of the methodology in the evaluation of an actual Army S&T effort. It was chosen because it offers significant future capabilities for our Army, provides a set of very robust present-day technical challenges, and offers a significant assessment challenge since it is focused on basic research.

Jan. 1, 2011

Getting Beyond Taiwan? Chinese Foreign Policy and PLA Modernization

Since the mid-1990s, China’s military modernization has focused on deterring Taiwan independence and preparing for a military response if deterrence fails. Given China’s assumption of U.S. intervention in a Taiwan conflict, the People’s Liberation Army (PLA) has been developing military capabilities to deter, delay, and disrupt U.S. military support operations. The 2008 election of Taiwan President Ma Ying-jeou, however, has contributed to improved cross-strait economic and political cooperation and dramatically reduced the threat of Taiwan independence and war across the Taiwan Strait. Cooperation has included full restoration of direct shipping, flights, and mail across the strait, Taiwan’s participation in the World Health Assembly, regularized cross-strait negotiation mechanisms that have already reached several agreements, and the recent signing of the Economic Cooperation Framework Agreement.

Dec. 1, 2010

Chief of Mission Authority as a Model for National Security Integration

The inability of the President of the United States to delegate executive authority for integrating the efforts of departments and agencies on priority missions is a major shortcoming in the way the national security system of the U.S. Government functions. Statutorily assigned missions combined with organizational cultures create “stovepipes” that militate against integrated operations. This obstacle to “unity of effort” has received great attention since 9/11 but continues to adversely affect government operations in an era of increasingly multidisciplinary challenges, from counterproliferation to counterinsurgency in Afghanistan. Presidents have tried various approaches to solving the problem: National Security Council committees, “lead agencies,” and “czars,” but none have proven effective.

Dec. 1, 2010

The Surge: General Petraeus and the Turnaround in Iraq

When General David H. Petraeus, USA, took command of Multi-National Force–Iraq (MNF–I) on February 10, 2007, beginning his 3d tour and 28th month in Iraq, the situation was grim. Increasing sectarian violence had led to an escalation of killings of civilians in Iraq, with up to 150 corpses being found daily in Baghdad.1 The government of Prime Minister Nouri alMaliki was viewed by almost everyone as ineffective at best, and the U.S. military strategy was not well defined and clearly not working. Iraq appeared to be sliding out of control toward civil war or disintegration, and the United States appeared to be headed inexorably toward defeat— another Vietnam. Popular sentiment held that the best course of action was to cut our losses and disengage from a fight we were losing. General George Casey, USA, the outgoing commander of MNF–I, had supported a gradual drawdown of U.S. forces and a handoff of security tasks to Iraqi forces even as the situation got worse

Nov. 4, 2010

Letter to the Editor

As a technologist who advises major mining companies, wrote two books on metal-mining and a 445-page text on efficient drivesystems, did rare-earth (RE) physics research at MIT Lincoln Lab, and consulted for the MIT National Magnet Lab, I welcome Cindy Hurst's JFQ 59 article on China's RE resources, activities, and expertise. However, like many such supply-side stories, her article's relative neglect of demand-side alternatives could stimulate already-widespread but exaggerated concern about REs.

Nov. 1, 2010

DTP-079: Bio-Inspired Materials and Devices for Chemical and Biological Defense

This report addresses materials for synthetic matrices of chemical and biological defense using a conceptual platform known as the abiotic networked threat system (ANTS). This system is based on lessons learned from biology, incorporating abiotic homologues to biological recognition events and metabolic pathways to provide programmable capabilities to sense and respond to environmental threats.

Oct. 1, 2010

Bio-inspired Innovation and National Security

Despite various treaties and protocols, offensive biological weapons use has continued to this day, with the anthrax attacks of 2001 being the most recent incident. Such activity has led to a strong defensive program, with medical science developing numerous countermeasures that have benefited both civilian and military populations.

Oct. 1, 2010

DTP-078: Hours of Boredom, Moments of Terror: Temporal Desynchrony in Military and Security Force Operations

The authors examine resultant psychological and behavioral implications for combatant and security personnel performance as viewed through application of a traditional human psychological stress model. Inadequate recognition of the implications resulting from long lull periods, combat pulses, and the need to recover from stress can lead to dysfunctional soldiering as well as poor individual and small unit performance.

Oct. 1, 2010

Private Contractors in Conflict Zones: The Good, the Bad, and the Strategic Impact

In Iraq and Afghanistan, the use of contractors reached a level unprecedented in U.S. military operations. As of March 31, 2010, the United States deployed 175,000 troops and 207,000 contractors in the war zones. Contractors represented 50 percent of the Department of Defense (DOD) workforce in Iraq and 59 percent in Afghanistan. These numbers include both armed and unarmed contractors. Thus, for the purposes of this paper, the term contractor includes both armed and unarmed personnel unless otherwise specified. The presence of contractors on the battlefield is obviously not a new phenomenon but has dramatically increased from the ratio of 1 contractor to 55 military personnel in Vietnam to 1:1 in the Iraq and 1.43:1 in Afghanistan.

Sept. 1, 2010

Nuclear Politics in Iran

This collection of analyses on the unintended consequences of Iran’s nuclear policy for its domestic and international relations is the first in a series of papers that will examine the impact of critical issues and developments on key countries in the Greater Middle East and on U.S. security interests. Succeeding papers will identify similar emerging issues in Turkey, Iraq, Yemen, and the Persian Gulf region. For the most part, the papers will represent the independent research and opinions of academic scholars and regional experts prepared for and presented at the National Defense University.

Sept. 1, 2010

Redefining Success: Applying Lessons in Nuclear Diplomacy from North Korea to Iran

The United States has no good options for resolving the North Korean and Iranian nuclear challenges. Incentives, pressures, and threats have not succeeded. A military strike would temporarily set back these programs, but at unacceptable human and diplomatic costs, and with a high risk of their reconstitution and acceleration. For some policymakers, therefore, the best option is to isolate these regimes until they collapse or pressures build to compel negotiations on U.S. terms. This option has the veneer of toughness sufficient to make it politically defensible in Washington. On closer scrutiny, however, it actually allows North Korea and Iran to continue their nuclear programs unrestrained. It also sacrifices more achievable short-term goals of improving transparency and securing vulnerable nuclear materials to the uncertain long-term goal of denuclearization. Yet these short-term goals are deemed critical to U.S. national security in the 2010 Nuclear Posture Review (NPR) and Quadrennial Defense Review (QDR).

Sept. 1, 2010

The 71F Advantage: Applying Army Research Psychology for Health and Performance Gains

This book grew out of paper presentations and discussions at the Army Research Psychology Biennial Conference held April 24–25, 2008, in Bethesda, Maryland. It provides a snapshot of groundbreaking research currently being done by Army research psychologists around the globe. The book illuminates the many contributions of Army research psychologists to supporting Soldiers and their families, as well as enhancing their performance and wellbeing.

Sept. 1, 2010

DTP-072: Assessing the Health of Army Laboratories: Funding for Basic Research and Laboratory Capital Equipment

In this paper, the authors respond to requests from the office of the Army S&T Executive to address the adequacy of the funding provided to equipment and basic research in an effective S&T laboratory.

Sept. 1, 2010

DTP-073: Improving the Army’s Next Effort in Technology Forecasting

This paper makes the case for approaches to be pursued when the Army conducts its next comprehensive S&T forecasting effort.

Sept. 1, 2010

DTP-074: A Primer on Alternative Transportation Fuels

This paper reviews several approaches to producing alternative transportation fuels using feedstocks that are under the control of the United States. The purpose is to provide the non-specialist reader with a general understanding of the several approaches, how they compare regarding process energy efficiency, their individual abilities to provide for national transportation fuel needs, and their associated capital costs.

Sept. 1, 2010

DTP-075: NATO Command Structure: Considerations for the Future

This paper explores potential future reforms of the NATO command structure. The intent is to stimulate thought on the current structure’s fit to oversee the forces and operations of a growing array of NATO missions.

Sept. 1, 2010

DTP-076: Risk-Informed Decisionmaking for Science and Technology

This paper discusses risks and impact areas in relation to decisionmaking and the development of metrics or a figure of merit for decisionmaking. The metrics are then applied to three examples of interest to the Army, Air Force, and DHS.

Sept. 1, 2010

DTP-077: Islamic Radicalization in the United States: New Trends and a Proposed Methodology for Disruption

This paper addresses the growing and evolving threat of domestic terrorism that is advocated and perpetrated by radical Islamic ideologues. Specifically it will review terrorist attempts on American soil and against the American population in order to offer recommendations.

Aug. 26, 2010

Partnership for the Americas: Western Hemisphere Strategy and U.S. Southern Command

Since its creation in 1963, United States Southern Command has been led by 30 senior officers representing all four of the armed forces. None has undertaken his leadership responsibilities with the cultural sensitivity and creativity demonstrated by Admiral Jim Stavridis during his tenure in command.

Aug. 1, 2010

Civil-Military Relations in China: Assessing the PLA’s Role in Elite Politics

This study reviews the last 20 years of academic literature on the role of the People’s Liberation Army (PLA) in Chinese elite politics. It examines the PLA’s willingness to support the continued rule of the Chinese Communist Party (CCP) and to obey directives from top party leaders, the PLA’s influence on the selection of China’s top civilian leaders, and the PLA’s ability to shape the domestic political environment. Over the last two decades the discussion of these three issues has largely been shaped by five trends identified in the literature: increasing PLA professionalism, bifurcation of civil and military elites, a reduced PLA role in political institutions, reduced emphasis on political work within the PLA, and increased military budgets. Together, these trends are largely responsible for the markedly reduced role of the PLA in Chinese elite politics.

June 1, 2010

Assessing Chinese Military Transparency

The United States and other countries in the Asia-Pacific region have expressed concerns about China’s expanding military capabilities and called on Beijing to increase transparency on military issues. Chinese officials and military officers argue that Chinese transparency has increased over time and that weaker countries should not be expected to meet U.S. standards of transparency. Lack of an objective method for assessing military transparency has made it difficult to assess these Chinese claims and has inhibited productive dialogues about transparency.

April 1, 2010

The Origins of Nunn-Lugar and Cooperative Threat Reduction

In a 1999 interview, Ashton Carter, a key figure in helping to create and implement the threat reduction program initiated by Senators Sam Nunn (D–GA) and Richard Lugar (R–IN), recalled four visits between 1994 and 1996 to an intercontinental ballistic missile (ICBM) base in Pervomaysk, Ukraine. Planted in the soil of this base were the most powerful rockets mankind has ever made, armed with hundreds of hydrogen bombs and aimed at the United States. In turn, Pervomaysk was itself the target of similar American missiles and weapons. Under the Nunn-Lugar program, the missiles deployed at Pervomaysk by the Soviet Strategic Rocket Forces and the silos that housed them were destroyed.

April 1, 2010

Ballistic Missile Defense: Past and Future

To help put the potential value of a national missile defense system in perspective, consider three scenarios, one modeled on a historical event, the other two hypothetical. These three scenarios make a point argued by proponents of continued exploration and deployment of ballistic missile defense systems: that it is essential to give future Presidents of the United States options for defending the homeland against missile attack.

Feb. 1, 2010

Affordable Defense Capabilities for Future NATO Missions

This Special Report was produced by CTNSP to support the NATO Strategic Concept process. The new NATO Strategic Concept offers an important opportunity to strengthen efforts to reform and modernize NATO institutionally, and develop new defense capabilities for the Alliance. To achieve these aims, NATO muse begin a separate transformational process to assess current military capabilities and pursue future requirements over a 5-10 year period. The goal should be to develop specific sets of initiatives and reforms for approval by Heads of State and Government at the Lisbon Summit in 2010. This process should be informed by the development of the new Strategic Concept and run parallel to it. In a rapidly changing security environment, postponing such a process until after the Strategic Concept is completed would increase risks for the Alliance. This report is designed to stimulate that parallel process.

Jan. 1, 2010

U.S. Withdrawal from the Antiballistic Missile Treaty

As President George W. Bush made these remarks in a speech at the National Defense University (NDU) on May 1, 2001, National Security Council (NSC) Senior Director for Proliferation Strategy, Counterproliferation, and Homeland Defense Robert Joseph listened attentively. Within just 4 months of taking office, President Bush was articulating one of his key national security priorities: setting the conditions for the United States to move full steam ahead on developing, testing, and eventually deploying a wide range of missile defense technologies and systems—a priority that in all likelihood would mean U.S. withdrawal from the 1972 Antiballistic Missile (ABM) Treaty.

Dec. 1, 2009

STAR–TIDES and Starfish Networks: Supporting Stressed Populations with Distributed Talent

The Department of Defense increasingly is involved in postwar stabilization and reconstruction, humanitarian assistance and disaster relief missions, capacity-building of partner nations at home and abroad, and other such complex operations. To provide sustainable support to stressed populations in these environments, an international, networked, knowledge-sharing research project called Sustainable Technologies, Accelerated Research–Transformative Innovation for Development and Emergency Support (STAR–TIDES) encourages innovative approaches to public-private collaboration, whole-of-government solutions, and transnational engagement. It leverages a distributed network of people and organizations to conduct research, support real world contingencies, and bridge gaps among disparate communities.

Dec. 1, 2009

Crosscutting Issues in International Transformation: Interactions and Innovations among People, Organizations, Processes, and Technology

This book is a compilation of papers presented at the International Transformation Conference in Stockholm, Sweden on June 2-3, 2009. The conference was hosted by the Swedish Defence Research Agency, FOI. The papers are organized according to the categories of culture, interagency, transformation initiatives, leadership, and adaptive organizations.