Due to a lapse in federal funding, this website is not being actively updated or monitored. See OPM status.

Dec. 1, 2009

Defense Business Transformation

Over the past 20 years, information technology has been rapidly advancing, producing new capabilities that enable organizations to greatly enhance visibility into their business operations. While many private organizations have successfully taken advantage of these new technologies to develop enterprise-wide information systems that reduce costs and improve performance, the federal governments still lags far behind. DoD, one of the largest organization in the world with an annual budget over $500 billion, still relies on several thousand, non-integrated, and noninteroperable information legacy systems, that are error prone and redundant and do not provide the enterprise visibility necessary to make sound management decisions. Moreover, between FY07 and FY 09, DoD has requested from Congress over $47 billion in appropriations to operate, maintain, and modernize these business systems.

Dec. 1, 2009

A Policymaker’s Guide to Bioterrorism and What To Do About It

This paper draws together several years of work in an attempt to suggest the outlines of this thinking about the risk that the author regards as most pernicious: biological terrorism. It is written for those who desire a better understanding of this risk and its implications for policymakers.

Dec. 1, 2009

DTP-071: Forecasting Science and Technology for the Department of Defense

This paper discusses recent trends in S&T, particularly how various disciplines have converged to produce new capabilities, and considers how a new series of studies might be conducted taking into account such convergences.

Nov. 1, 2009

To Build Resilience: Leader Influence on Mental Hardiness

The military profession is inherently stressful and is getting more so for U.S. troops, who are deploying more often and for longer periods of time on missions that are multifaceted, changeable, and ambiguous. Such stressful conditions can lead to a range of health problems and performance decrements even among leaders. But not everyone reacts in negative ways to environmental stress. Most people remain healthy and continue to perform well even in the face of high stress levels. While much attention in recent years has focused on identifying and treating stress-related breakdowns such as post-traumatic stress disorder, scant investment has gone toward the study of healthy, resilient response patterns in people.

Oct. 1, 2009

Countering Weapons of Mass Destruction: Looking Back, Looking Ahead

This Occasional Paper traces the general evolution of the countering WMD enterprise in the Clinton and Bush administrations and anticipates some of the major WMD challenges that lie ahead.

Oct. 1, 2009

President Nixon’s Decision to Renounce the U.S. Offensive Biological Weapons Program

The nuclear arms race between the United States and the Soviet Union was a prominent feature of the Cold War. A lesser known but equally dangerous element of the superpower competition involved biological weapons (BW), living microorganisms that cause fatal or incapacitating diseases in humans, animals, or plants. By the late 1960s, the United States and the Soviet Union had both acquired advanced BW capabilities. The U.S. biological weapons complex, operated by the U.S. Army Chemical Corps, consisted of a research and development laboratory at Fort Detrick in Maryland, an open-air testing site at Dugway Proving Ground in Utah, and a production facility at Pine Bluff Arsenal in Arkansas that manufactured biological warfare agents and loaded them into bomblets, bombs, and spray tanks.

Sept. 15, 2009

DTP-070: Understanding and Leading Porous Network Organizations: An Analysis Based on the 7-S Model

This paper evaluates STAR-TIDES , an organization seeking to develop and share knowledge and technologies to enhance the capacity of disparate groups to respond effectively to disasters and humanitarian crises. Analyzing STAR-TIDES as a porous network organization, it applies an organizational analysis tool known as the “7-S framework” to clarify some of the key issues that must be addressed for such organizations to be effective and adaptive.

Sept. 1, 2009

Cyberspace and the “First Battle” in 21st-century War

Wars often start well before main forces engage. In the 19th and early 20th centuries, combat often began when light cavalry units crossed the border. For most of the 20th century, the “first battle” typically involved dawn surprise attacks, usually delivered by air forces. While a few of these attacks were so shattering that they essentially decided the outcome of the struggle or at least dramatically shaped its course—the Israeli air force’s attack at the opening of the June 1967 Six-Day War comes to mind—in most cases the defender had sufficient strategic space—geographic and/or temporal—to recover and eventually redress the strategic balance to emerge victorious. The opening moments of World War II for Russia and the United States provide two examples.

Sept. 1, 2009

DTP-067: An Extended Deterrence Regime to Counter Iranian Nuclear Weapons: Issues and Options

This paper examines the idea of creating an American-led extended deterrence regime in the Middle East to address potential Iranian acquisition of nuclear weapons and missiles in a setting where the U.S. already possesses these weapons and is trying to employ them to geopolitical advantage.

Sept. 1, 2009

DTP-068: Defending the Military Food Supply: Acquisition, Preparation, and Protection of Food at U.S. Military Installations

This paper examines current measures in place to defend the military food supply and provides a series of recommendations that will enhance food defense and provide ancillary benefits to the military.

Sept. 1, 2009

DTP-069: What Democracy for Afghanistan? An Analysis Utilizing Established Norms and Five Non-Western Case Studies

This paper looks at democratic governance and what might be expected to take root in a society such as Afghanistan, shedding light on what is necessary, as a minimum, for democracy to become established. Suggesting replacements for goals that may be simply unattainable, such as an Afghan democracy held to an unrealistic Jeffersonian standard, it aims to impart a sense of what can be accomplished before international political will expires.

July 1, 2009

Military Perspectives on Cyber Power

CTNSP convened several workshops to address challenges in cyberspace, cyberpower, cyberstrategy, and institutional factors. Several representatives from the military Services participated extensively in those workshops. During those workshops, a variety of cyber issues emerged about the roles of the Services in the areas of roles and missions and the creation of needed intellectual capital. Subsequently, each of the Services identified volunteers who graciously generated white papers to illuminate the cyber debate.

July 1, 2009

Civilian Surge: Key to Complex Operations

The United States today manifestly lacks adequate civilian capacity to conduct complex operations—those operations that require close civil-military planning and cooperation in the field. This book is intended to fill that gap. Its main conclusion is that current efforts to build a civilian response capacity for complex operations are unfinished and that the Obama administration needs to dedicate additional attention and resources to complete the task.

July 1, 2009

DTP-066: Pandemic Flu Planning in Africa: Thoughts from a Nigerian Case Study

This paper discusses the Avian Influenza/Pandemic Influenza Policy Planning workshop held in Nigeria in June 2007, the objective of which was assisting selected Nigerian officials in evaluating their nation’s pandemic response plan.

June 1, 2009

DTP-063: Improving the Interface between Industry and Army Science and Technology: Some Thoughts on the Army’s Independent Research and Development Program

This paper presents the various ways that the Army laboratories link their work with external laboratories and looks for ways to improve these interfaces, with special emphasis on the IR&D (Independent Research & Development) program.

June 1, 2009

DTP-064: Computer Science Research Funding: How much is too little?

This papers summarizes and analyzes the findings of a study of the historical and planned level of Department of Defense (DOD) funding in computer science (CS) research from the 2001–2011 DOD records, and formulates key findings and recommendations.

June 1, 2009

DTP-065: The Active Denial System: A Revolutionary, Non-lethal Weapon for Today’s Battlefield

This paper explains and describes the advantages to ADS (Active Denial Systems) and how they can provide troops a capability they currently do not have, the ability to reach out and engage potential adversaries at distances well beyond small arms range, and in a safe, effective, and non-lethal manner.

May 1, 2009

Breaking the Yardstick: The Dangers of Market-based Governance

In the middle of the last century, America became a superpower. It happened, in part, because of a well-balanced technological partnership between the Federal Government and commercial sector. After winning a world war against fascism, this public-private alliance went on to cure infectious diseases, create instant global communications, land humans on the Moon, and prevail in a long Cold War against communism. This, and more, was accomplished without bankrupting the Nation’s economy. The partnership’s record of service to the American people and the world has been remarkable.

May 1, 2009

DTP-062: Directed Energy Weapons – Are We There Yet?

The purpose of this paper is to examine the barriers to deployment of directed energy weapons and suggest a strategy for an initial deployment that addresses these issues. This strategy will focus on current high-priority threats against which DEW would provide the best alternative for the military.

April 1, 2009

Cyberpower and National Security

Cyberpower and National Security frames the key issues concerned and identifies the important questions involved in building the human capacity to address cyber issues, balancing civil liberties with national security considerations, and developing the international partnerships needed to address cyber challenges. With more than two dozen contributors, Cyberpower and National Security covers it all.

April 1, 2009

DTP-061: Social Software and National Security: An Initial ‘Net Assessment’ by Mark Drapeau and Linton Wells II

This research paper as an initial net assessment of how social software interacts with government and security in the broadest sense.1 The analysis looks at both sides of what once might have been called a “blue-red” balance to investigate how social software is being used (or could be used) by not only the United States and its allies, but also by adversaries and other counterparties.

March 1, 2009

A 21st-century Concept of Air and Military Operations

The evolution of 21st-century air operations is unfolding under the impact of a new generation of fighter aircraft and a significant shift in the role of air operations in support of ground and maritime forces. So-called fifth-generation aircraft often are mistakenly viewed as simply the next iteration of airframes: fast, stealthy replacements of obsolescent legacy platforms. In fact, the capabilities of fifth-generation aircraft, and their integration into a network-centric joint force, will change the roles of manned fighter aircraft in air, ground, and maritime operations. These changes are so far-reaching that the Services face the challenge of crafting a new concept of 21st-century air operations, indeed, of all combat operations.

March 1, 2009

DTP-059: Perspectives from Former Executives of the DOD Corporate Research Laboratories

It is the purpose of this paper to document the thoughts and opinions of individuals who have led research activities at each of the following CRLs (Army, Navy, and Air Force corporate research laboratories): the Army Research Laboratory (ARL) in Adelphi, MD; the Naval Research Laboratory (NRL) in Washington, DC; and the Air Force Research Laboratory (AFRL) in Dayton, Ohio respectively. These individuals are: John Lyons (ARL), Timothy Coffey (NRL), and Vincent Russo (AFRL).

March 1, 2009

DTP-060: Operation Anaconda: Lessons for Joint Operations

This study is not an official history of Anaconda but an analysis of lessons that can be learned from that battle and applied to future joint operations. This study’s intent is not to criticize, but instead to offer observations for joint operations, multinational operations, and expeditionary warfare in austere settings.

Feb. 1, 2009

Alliance Reborn: An Atlantic Compact for the 21st Century

Alliance Reborn: An Atlantic Compact for the 21st Century is a major policy report with fresh, independent ideas and analysis on the future roles and missions of the NATO Alliance. It calls for a reinvigorated Atlantic partnership to tackle global challenges and a new structure for NATO that rebalances its “home and away missions,” forges a fuller partnership with the European Union and other institutions, reorients Alliance military capabilities, reforms command arrangements, and changes decision-making, spending, and management practices. It also proposes urgent shifts in NATO strategy in Afghanistan and relations with Russia In fall 2008, four U.S. think tanks – the Atlantic Council of the United States; the Center for Strategic and International Studies (CSIS); the Center for Technology and National Security Policy (CTNSP) at the National Defense University (NDU); and the Center for Transatlantic Relations (CTR) at the Johns Hopkins University’s Paul H. Nitze School of Advanced International Studies (SAIS) – launched the Washington NATO Project to spark debate before and after NATO’s 60th anniversary summit in April, 2009. The Washington NATO Project seeks to generate new ideas and thinking about the transatlantic community’s role in a changing global security environment.

Feb. 1, 2009

DTP-058: Strengthening Technical Peer Review at the Army S&T Laboratories

The paper recommends that the Army require peer review of the technical quality of its laboratories and proposes a set of norms that must be met. The principal recommendation is that reviews be performed by independent experts who visit the laboratory for two or more days, looking at the technical projects and the strength of the technical staff, equipment, and facilities.

Jan. 1, 2009

From Sputnik to Minerva: Education and American National Security

This paper examines how external challenges have prompted national investments in education to enhance American national security. Rather than focusing primarily on traditional professional military education, this analysis examines how education has been used as a tool of American power. Four major moments of transformation in the international system are surveyed to illustrate a link between strategic educational capacity, defined as the application of attained knowledge and skills, and national power. The study then assesses how education is used as a power asset in the contemporary security environment. Today, an important educational capacity is emerging in the new Minerva program in the Department of Defense and other transformational educational concepts with security applications. Education is gaining an increasing interest among American decisionmakers as a strategic component of American power and an essential asset for successful military operations in the new global security environment.

Jan. 1, 2009

DTP-057: Army Science and Technology Investment In Interoperability

This paper discusses the elements of assessing ‘bang for bucks’ with regard to S&T investment in interoperability. It intends to point to where interoperability investment offers the greatest return and to open our thinking to the possibility that universal interoperability of all systems is not a desirable or attainable goal, especially when allocating investments and accepting reasonable risk.

Dec. 1, 2008

Transforming NATO: An NDU Anthology

Since September 11, 2001, the National Defense University has undertaken a series of studies on the Transformation of NATO for 21st Century missions. These studies focused on needed military capabilities, political transformation, new operational requirements, new missions, and NATO science and technology. Some of these studies made recommendations that were adopted as NATO policy while others may be ahead of their time. The purpose of this volume is to collect these studies under one cover and to stimulate further transformation.

Nov. 1, 2008

Lessons of Abu Ghraib: Understanding and Preventing Prisoner Abuse in Military Operations

The abuse of prisoners by U.S. Soldiers at Abu Ghraib had broad strategic consequences, leading many people around the world to question the legitimacy of U.S. goals and activities in Iraq. This paper draws on extensive unclassified reports from multiple investigations that followed Abu Ghraib, and applies key psychological as well as social-situational perspectives to develop a better grasp of the causative factors. From a psychological standpoint, most young adults are powerfully inclined to behave in accord with the social conventions and pressures around them. Especially in ambiguous circumstances, then, it is important that standards of behavior be clear and explicit throughout all phases of an operation and that leaders at all levels represent and reinforce those standards.

Oct. 1, 2008

DTP-056: Reform of the National Security Science and Technology Enterprise

This paper addresses three major topics requiring new thinking in the National Security Science and Technology Enterprise. The first topic is how overarching priorities can be better determined and implemented to direct the vast national security enterprise toward conducting S&T that will address both traditional and new national security challenges. The second deals with the integration of the Congressional committees that oversee and fund S&T. And the third focuses on the competence, role, and impact of the Government’s national security S&E workforce.

Sept. 1, 2008

DTP-054: Good Bugs, Bad Bugs: A Modern Approach for Detecting Offensive Biological Weapons Research

This report outlines a new framework to monitor countries in terms of their potential to engage in covert biological weapons research. This is an effort to develop an indirect approach to measuring a nation’s capability to conduct offensive weapons research in both civilian and government or military settings.

Sept. 1, 2008

DTP-055: A Methodology for Assessing the Military Benefits of Science and Technology Investments

This paper discusses approaches developed at CTNSP, at the request of the Deputy Assistant Secretary of the Army for Research and Technology, for measuring the benefits of today’s science and technology (S&T) investments on the future military.

Aug. 15, 2008

DTP-053: Programming Development Funds to Support a Counterinsurgency: Nangarhar, Afghanistan

This paper describes one method of programming development funds at a sub-national level to positively affect a counterinsurgency, in this case, in Eastern Afghanistan. It explores how one interagency group, the Jalalabad Provincial Reconstruction Team (PRT), developed and implemented a strategy for increasing stability in its area of operations by maximizing the resources each agency brought to the table and creating “unity of effort.”

Aug. 1, 2008

DTP-052: Toward a New Transatlantic Compact

This paper calls for a new NATO strategic concept and a new transatlantic compact, and envisions crafting them in tandem.

July 7, 2008

Bird Flu & You: A Quick Guide to Protecting Yourself and Your Family from Pandemic Flu

In anticipation of a possible flu pandemic, the Life Sciences group at CTNSP has started a number of initiatives to address both civilian and military implications. This poster is based on the November 2006 Defense & Technology Paper, “Weathering the Storm: Leading Your Organization Through a Pandemic”.

July 1, 2008

DTP-049: Building the S and E Workforce for 2040: Challenges Facing the Department of Defense

This paper examines some of the trends that have led to the government’s inability to maintain adequate technical competence and/or is not making proper use of the competence that it has maintained. It focuses on the government component of the model and it is expected that many of the same considerations will apply to the quasi-government component, also.

July 1, 2008

DTP-050: An Assessment of the Science and Technology Predictions in the Army’s STAR21 Report

This paper reviews the technology forecast assessments of the Strategic Technologies for the Army of the Twenty-First Century (STAR21) study conducted for the Army by the National Research Council in the early 1990s.

July 1, 2008

DTP-051: Army Research and Development Collaboration and The Role of Globalization in Research

This paper considers a number of approaches to international collaboration in military research, discussing the challenges inherent in collaboration and considering recommendations for the future.

May 1, 2008

International Partnerships to Combat Weapons of Mass Destruction

This Occasional Paper examines the role, manifestations, and challenges of international cooperation to combat the weapons of mass destruction threat and poses important questions for future leaders to address in moving international cooperation forward in this area.

May 1, 2008

The Role of Medical Diplomacy in Stabilizing Afghanistan

Comprehensive stabilization and reconstruction of Afghanistan are not possible given the current fragmentation of responsibilities, narrow lines of authorities, and archaic funding mechanisms. Afghans are supportive of U.S. and international efforts, and there are occasional signs of progress, but the insurgent threat grows as U.S. military and civilian agencies and the international community struggle to bring stability to this volatile region. Integrated security, stabilization, and reconstruction activities must be implemented quickly and efficiently if failure is to be averted. Much more than a course correction is needed to provide tangible benefits to the population, develop effective leadership capacity in the government, and invest wisely in reconstruction that leads to sustainable economic growth. A proactive, comprehensive reconstruction and stabilization plan for Afghanistan is crucial to counter the regional terrorist insurgency, much as the Marshall Plan was necessary to combat the communist threat from the Soviet Union.1 This paper examines the health sector as a microcosm of the larger problems facing the United States and its allies in efforts to stabilize Afghanistan.

May 1, 2008

Preparing for Catastrophic Bioterrorism: Toward a Long-Term Strategy for Limiting the Risk

This paper, circulated within government early in 2006, outlines an approach to these requirements and provides several examples of how the application of this approach can create a strategy. As described below, several of the recommendations offered here have recently been acted upon, some of them encouraged by this work, others as a consequence of independent, parallel initiatives. Nonetheless, more than 6 years—a period longer than World War II—after the 2001 anthrax letters catalyzed greater government efforts to counter bioterrorism, our homeland security officials are still struggling to define a biodefense strategy. This paper is being published in the hope that a broader discussion will yield further progress.

May 1, 2008

DTP-048: Homegrown Terrorism: The Threat Within

This paper attempts to illustrate how difficult, if not impossible, it is to find root causes of domestic terrorism that are of general applicability. It is likely to be more important to focus on the unique cultural stamp of the individual nation to assess the reason for violence-prone disquietude among its citizens and residents.

March 1, 2008

DTP-047: China’s Science and Technology Emergence: A Proposal for U.S. DOD-China Collaboration in Fundamental Research

This report proposes the establishment of a constructive, phased strategy for engaging in collaborative fundamental research with Chinese academic institutions. Recent evaluations of top S&T universities and their specific capabilities suggest appropriate scientific areas where beneficial collaborations between DoD and China should be fostered.

Feb. 1, 2008

So Many Zebras, So Little Time: Ecological Models and Counterinsurgency Operations

Force ratios are an important variable in warfare and in nature. On the Serengeti, large zebra herds are constantly hunted by small prides of lions. But with their overwhelming majority, why don’t the zebras unite and attack the lions? Hooves can be as deadly as claws when used correctly. And conversely, if the lions are such effective predators, why are there so many zebras?

Jan. 1, 2008

Cyber Influence and International Security

Cyber influence is an ongoing source of power in the international security arena. Although the United States has an enormous cyber information capacity, its cyber influence is not proportional to that capacity. Impediments to American cyber influence include the vastness and complexity of the international information environment, multiplicity of cultures and differing audiences to which communications must be addressed, extensiveness and significance of contending or alternative messages, and complexity and importance of using appropriate influential messengers and message mechanisms.

Jan. 1, 2008

Strategic Fragility: Infrastructure Protection and National Security in the Information Age

Modern societies have reached unprecedented levels of prosperity, yet they remain vulnerable to a wide range of possible disruptions. One significant reason for this growing vulnerability is the developed world’s reliance on an array of interlinked, interdependent critical infrastructures that span nations and even continents. The advent of these infrastructures over the past few decades has resulted in a tradeoff: the United States has gained greater productivity and prosperity at the risk of greater exposure to widespread systemic collapse. The trends that have led to this growing strategic fragility show no sign of slowing. As a result, the United States faces a new and different kind of threat to national security.

Jan. 1, 2008

From Reform to Reduction: Reports on the Management of Navy and Department of Defense Laboratories in the Post-Cold War Era

This book reviews approximately 65 of the significant reports issued on Department of Defense (DOD) and Department of the Navy (DON) management of research, development, test, and evaluation (RDT&E) from the end of the Cold War through the late 1990s.

Jan. 1, 2008

DTP-046: Winning the Invisible War: An Agricultural Pilot Plan for Afghanistan

The purpose of this paper is to propose efforts to integrate a comprehensive campaign plan that brings together security and reconstruction efforts and the plethora of governmental and nongovernmental organizations working in Afghanistan.

Dec. 1, 2007

Organizing for National Security: Unification or Coordination?

Experience gained from the 9/11 attacks, combat in Iraq and Afghanistan, disaster assistance during and after Hurricane Katrina, and the ongoing war on terror provides the basis for amending our anachronistic national security structures and practices. Many analysts and officials have called for a second-generation version of the Goldwater-Nichols Department of Defense Reorganization Act of 1986 to address the array of organizational and management challenges that we face. Some argue that the new security environment requires even more fundamental change, similar to what was enacted after World War II. The principal legislation that emerged from that era was the National Security Act of 1947. Goldwater-Nichols aimed to fix inter-Service problems by streamlining the chain of command and promoting “jointness” but did not fundamentally alter the structure of the U.S. military.

Dec. 1, 2007

Coping with the Dragon: Essays on PLA Transformation

Should the independence movement in Taiwan regain political momentum, however, the potential for U.S. military intervention in the Taiwan Strait would increase.

Oct. 1, 2007

DTP-044: Implications of an Independent Kosovo for Russia’s Near Abroad

This paper evaluates the argument that Kosovo’s situation represents a precedent for separatists elsewhere by comparing it to the four regions in the Former Soviet Union most often cited in relation to it and is intended to highlight the similarities and differences between these cases, to facilitate negotiations on the resolution of the final status of Kosovo.

Sept. 1, 2007

The Comprehensive Approach Initiative: Future Options for NATO

Experience has shown that conflict resolution requires the application of all elements of national and international power— political, diplomatic, economic, financial, informational, social, and commercial, as well as military. To resolve conflicts or crises, the North Atlantic Treaty Organization (NATO) should adopt a Comprehensive Approach that would enable the collaborative engagement of all requisite civil and military elements of international power to end hostilities, restore order, commence reconstruction, and begin to address a conflict’s root causes. NATO can provide the military element for a comprehensive approach. Many other national, international, and nongovernmental actors can provide the civilian elements.

Sept. 1, 2007

DTP-042: U.S. Support for UN Peacekeeping: Areas for Additional DOD Assistance

This report addresses primarily those areas in which limited DoD involvement will provide multiplier benefits to U.S. Security. While beyond the scope of this study, a government-wide, comprehensive review of possible assistance should be conducted.

Sept. 1, 2007

DTP-043: A Further Look at Technologies and Capabilities for Stabilization and Reconstruction Operations

This present study resumes where the first study left off, expanding on identifying capability needs and possible technology solutions to the S&R problems facing the force today and in the future.

July 1, 2007

Privatizing While Transforming

The Armed Forces of the United States are designed to be supported by capabilities provided by civilians. The Army, for example, depends not only on Reserve and National Guard components for warfighting elements, but also on private contractors for numerous roles no longer performed by military personnel. Originally working in small contingents focused on logistical functions, private contractors now rival military personnel in number in the battlespace. In addition to providing direct logistical support to the military, contractors perform equipment maintenance and reconstruction work, train military and police, and work as civil affairs staff, interpreters, and even interrogators. They also provide private armed security services. The issues arising from new roles are exacerbated by the growth of the contractor population in conflict zones at a pace that defies effective recordkeeping.

July 1, 2007

Enhancing Army Science and Technology: Lessons from Project Hindsight Revisited

This book draws on a series of studies known as Project Hindsight Revisited conducted by the authors at the National Defense University from 2004–2006.

July 1, 2007

DTP-041: Deploying Nuclear Detection Systems: A Proposed Strategy for Combating Nuclear Terrorism

This report provides an overview of the threat from nuclear terrorism; discusses the role of intelligence and risk assessments in countering this threat; provides a brief overview of nuclear detection technologies and issues; briefly summarizes key U.S. Government programs involved in nuclear detection; summarizes domestic legislation; and discusses the need for a global approach to nuclear nonproliferation.

June 1, 2007

Responding in the Homeland: A Snapshot of NATO’s Readiness for CBRN Attacks

The possibility of North Atlantic Treaty Organization (NATO) members having to respond to a chemical, biological, radiological, or nuclear (CBRN) incident is not a hypothetical scenario reserved for training exercises. Indeed, a number of countries worldwide have considerable experience in dealing with a variety of naturally occurring, accidental, and deliberate CBRN incidents. NATO itself, however, has no clear conceptual vision of its role in civil emergencies because preparedness of this sort remains a national responsibility.

May 1, 2007

DTP-040: Future Directions For U.S. Foreign Policy: Balancing Status Quo and Reform

This paper offers a framework for how to analyze and blend together the viability of returning to a set of policies and with that of a greater emphasis on the status quo. It also offers a direction of where these analyses can lead in the future. It is a global perspective but provides insights along the way on the Middle East.

April 1, 2007

The Future Nuclear Landscape

This Occasional Paper examines aspects of the contemporary and emerging international security environment that the authors believe will define the future nuclear landscape and identifies some associated priorities for policymakers.

April 1, 2007

DTP-039: Breakthrough Air Force Capabilities Spawned by Basic Research

This paper will focus on scientific discoveries that have already lead to new capabilities for the Air Force, as well as those discoveries that will lead to the new capabilities envisioned in the 2004 Flight plan and 2006 Posture Statement and those yet to be envisioned.

Feb. 1, 2007

I-Power: The Information Revolution and Stability Operations

Information and information technology (I/IT) can significantly increase the likelihood of success in stability operations— if they are engaged as part of an overall strategy that coordinates the actions of outside intervenors and focuses on generating effective results for the host nation. Properly utilized, I/IT can help create a knowledgeable intervention, organize complex activities, and integrate stability operations with the host nation, making stability operations more effective.

Dec. 1, 2006

Case Studies – Archive

As a resource for civilian and military classroom instruction, the Center for Technology and National Security Policy—with sponsorship by the [former] Office of the Deputy Assistant Secretary of Defense, Force Transformation and Resources— developed a series of case studies to examine issues of national security transformation. These case studies are considered “living” documents, continually evolving as developments occur in national security transformation and new information becomes available. All of the case studies include an instructors guide at the end of the study for use in classroom settings.

Nov. 1, 2006

DTP-038: Weathering the Storm: Leading Your Organization Through a Pandemic

This document is a guide to help prepare your organization for survival during a pandemic. All organizations have their own culture and character, so no one easy-to-follow guide will provide all the answers for your specific group. Rather, this is designed to provide you with resource materials from which you may pick and choose to tailor a plan that is best suited to your circumstances.

Oct. 1, 2006

DTP-037: Army Science and Technology Analysis for Stabilization and Reconstruction Operations

This study assesses the technology capability gaps in the U.S. Army’s ability to conduct S&R operations. The purpose of this study is to identify the technological shortfalls, identify capability gaps and needs, and highlight technology opportunities for consideration by Army S&T leadership.

Sept. 1, 2006

DTP-035: Critical Technology Events in the Development of Selected Army Weapons Systems: A Summary of ‘Project Hindsight Revisited’

This report collects and summarizes the findings from prior studies regarding the effectiveness of the Abrams tank, Apache helicopter, and two-man portable missile system. This report compares these findings to the findings from the original Project Hindsight and then offers recommendations based on the four systems for managing today’s Army science and technology work.

Sept. 1, 2006

DTP-036: Overcoming the S&T Assessment Uncertainty Principle: An Approach to Enterprise-Wide Assessment of the DOD S&T Program

This study examines why the sum of all the reviews of the relevance, viability, and productivity of the S&T program of the DoD does not constitute an assessment of the entire DoD S&T enterprise and examines the prospects for rectifying this situation.

Aug. 1, 2006

Lee’s Mistake: Learning from the Decision to Order Pickett’s Charge

At the Battle of Gettysburg, Robert E. Lee made a mistake that doomed the hopes of the Confederate States of America to compel the United States to sue for peace. Why one of the great generals of his time made such a blunder continues to be a topic of research and intense debate. Lee said little at the time or afterward to justify his decision to launch what has become known as Pickett’s Charge, so analysis must be inferential and inconclusive. Our aim is to explain Lee’s fateful decision not with new facts but with new analytical methods to illuminate decisionmaking in combat.

Aug. 1, 2006

DTP-034: Solutions for Northern Kosovo: Lessons Learned in Mostar, Eastern Slavonia, and Brcko

This paper examines three similar cases to the issues in Kososvo that were managed by the international community. By looking at the results of these three cases a decade or more after they began, this paper attempts to shed light on the options for Mitrovica, Kosovo. In order to do this, members of the CTNSP staff traveled to these areas to gather firsthand information relating to this problem.

July 1, 2006

Countering Terrorism Across the Atlantic?

Differences in strategic vision and concepts of security are central to the U.S. and European Union (EU) approaches to counterterrorism. While the United States conceives of a war against terrorism, Europe does not. As a result of different perceptions of the threat, both sides of the Atlantic take divergent approaches to homeland security. Europeans tend to favor the use of a law enforcement strategy over a warfighting approach. Meanwhile, the U.S. administration believes that a quasi-militaristic, overtly proactive, and highly vigilant stance will serve as the best deterrent to future attacks. By their own standards, Europeans are doing more to counter terrorism since September 11 and even more since the attacks in Madrid (March 11, 2004) and in London (July 7, 2005); by U.S. standards, these measures sometimes appear inadequate. As a result, there are significant transatlantic divergences on the best methods for halting the spread of terrorism.

July 1, 2006

BATTLE WISE: Seeking Time-Information Superiority in Networked Warfare

This book is an inquiry into the possibility of improving the operational thinking and decisionmaking of U.S. military individuals, teams, and forces who fight for their nation.

July 1, 2006

Policy Analysis in National Security Affairs: New Methods for a New Era

Most books on national security affairs focus on substantive issues, such as nuclear proliferation, arguing in favor of one policy or another. This book addresses something more basic: how to conduct policy analysis in the field of national security, including foreign policy and defense strategy. It illuminates how key methods of analysis can be employed, by experts and nonexperts, to focus widely, address small details, or do both at the same time. It provides an appraisal of methods that can be employed to analyze issues ranging from the lofty abstractions of national security policy and strategy to the concrete specifics of plans, programs, and budgets.

July 1, 2006

DTP-030: A New Conceptual Framework for Net-Centric, Enterprise-Wide, System-of-Systems Engineering

This paper presents a theoretical framework for thinking about system-of-systems (SOS) on a large scale, a net-centric approach to SOS engineering, and a way ahead for DoD. The theoretical framework defines the general characteristics of SOSs, and describes how these lead to underlying problems which address problems from integrated social, organizational, and technical perspectives.

July 1, 2006

DTP-031: An ICT Primer: Information and Communication Technologies for Civil-Military Coordination in Disaster Relief and Stabilization and Reconstruction

This primer presents current knowledge and best practices in creating a collaborative, civil-military, information environment to support data collection, communications, collaboration, and information-sharing needs in disaster situations and complex emergencies.

July 1, 2006

DTP-032: Senturion: A Predictive Political Simulation Model

This paper summarizes work utilizing the Senturion predictive analysis software at the National Defense University. The paper describes the methodology underlying the software, and then provides an overview of three case studies that used the software.

July 1, 2006

DTP-033: Critical Technology Events in the Development of the Stinger and Javelin Missile Systems: Project Hindsight Revisited

This paper seeks to identify the Critical Technological Events (CTEs) in the development of the Stinger and Javelin missiles. It is the third paper in a series that, driven by importance of understanding past military technological successes to today’s defense science and technology (S&T) investment and management, examines some of the key factors that have led to meaningful technology generation and ultimate incorporation into current U.S. Army weapon systems.

May 1, 2006

Transatlantic Homeland Defense

CTNSP/INSS Special Report NATO plays an essential role in defense of the transatlantic homeland from terrorism and other transnational threats, but it could do more, including in support of national, European Union, and Partner efforts to enhance societal security. This paper proposes an initiative to enhance NATO’s planning and capabilities in this area at the Alliance’s November 2006 Riga Summit. This back-to-basics approach is designed to ensure that NATO can deal effectively with new threats to the transatlantic homeland. it would also enhance NATO’s relevance in the eyes of the public on both sides of the Atlantic.

March 1, 2006

Creating a NATO Special Operations Force

In the post-9/11 security environment, special operations forces (SOF) have proven indispensable. SOF units are light, lethal, mobile, and easily networked with other forces. While the United States and its North Atlantic Treaty Organization (NATO) allies have extensive SOF capabilities, these forces are not formally organized to collaborate with one another. There would be much to gain if U.S. and allied SOF trained to work together: national SOF assets would be improved, obstacles to effective combined operations would be removed, and a coherent Alliance capability would be readily available for NATO. The Alliance can focus and grow its SOF capabilities by providing a selective and small combined “inner core” of NATO special operations forces for operations, while using an outer network to expand and improve SOF cooperation with interested allies.

March 1, 2006

DTP-028: Bringing Defense into the Information Economy

This is an exploratory essay aimed at injecting new perspective and questions into the study of the fundamentals of defense economics. It is meant to start a “productive conversation” about the affordability of defense and the alignment of technology, economics, and grand strategy.

March 1, 2006

DTP-029: Cooperative Crisis Management and Avian Influenza: A Risk Assessment Guide for International Contagious Disease Prevention and Risk Mitigation

This paper proposes a risk assessment and mitigation strategy designed to give both national authorities and international organizations the diagnostic took needed to evaluate preparedness, identify country-level weaknesses, and prioritize scarce resources to combat avian influenza.

Feb. 1, 2006

Custer in Cyberspace

The combination of abundant networked information and fluid, unfamiliar situations in the current era makes it at once possible and imperative to improve decisionmaking in combat. The key to improvement is to integrate faster reasoning and more reliable intuition into a cognitive whole to achieve battle-wisdom. Although the technologies that both demand and facilitate battle- wisdom are new, military history holds lessons on combining reasoning and intuition in conditions of urgency, danger, and uncertainty.

Feb. 1, 2006

DTP-024: Extending the User’s Reach: Responsive Networking for Integrated Military Operations

The aim of this study is to identify a path for the U.S. DoD to improve the responsiveness of military information networks for joint warfighters. This is not a technical treatise about bits and bandwidth; it proposes no architecture or standards. Rather, it looks at how military-operational information requirements relate to national strategy and at how those requirements are set and met.

Feb. 1, 2006

DTP-025: Issues in Air Force Science and Technology Funding

This paper looks at several issues surrounding future Air Force S&T and offers some suggestions for the future. It also looks at the framework of Air Force science and technology and a long-term history of Air Force S&T funding.

Feb. 1, 2006

DTP-026: Critical Technology Events in the Development of the Apache Helicopter: Project Hindsight Revisited

This study is the second in a series that examines some of the key factors that have led to meaningful technology generation and ultimate incorporation into the U.S. Army weapons systems we see in the field today. The purpose of this report is to examine the development of select Army systems, and in particular those signal technology events that propelled these systems to success, and to shed light on the factors that lead defense science and technology research to fruition.

Feb. 1, 2006

DTP-027: Implementing DOD’s International Science and Technology Strategy

As can be seen from the recently released “International Science and Technology Strategy for the United States Department of Defense,” the network for worldwide sharing of defense S&T information is vast, and the new strategy provides an excellent framework to maximize this potential. This paper provides some specific thoughts on implementation and how certain steps might benefit all involved.

Jan. 1, 2006

Report to the Congress: Information Technology Program

In the National Defense Authorization Act for Fiscal Year 2002, the Report of the Committee on Armed Services, House of Representatives, stated that the “Department of Defense can no longer depend on a dedicated defense industrial base, but will need to find ways to link advanced commercial technologies to improved military capabilities.” Congress asked CTNSP to implement a program “to find practical ways in which the defense information technology (IT) community can gain a mutual understanding of defense needs and industry capabilities and identify opportunities to integrate technology innovation in the U.S. military strategy.”

Jan. 1, 2006

DTP-023: The New Reality of International Telecommunications Strategy

This paper considers the relative decline of American Telecommunications leadership from geopolitical and technical perspectives. This decline is important to recognize and understand because it is masked by the achievements of the American economy and U.S. military successes since the end of the Cold War.

Dec. 1, 2005

DTP-022: Critical Technology Events in the Development of the Abrams Tank: Project Hindsight Revisited

This paper consists of a series of studies focusing on Army weapons systems, beginning with the mainstay of the Army’s armor force, the Abrams tank. Analysis of other Army systems, such as the Apache helicopter and the Javelin and Stinger missiles will follow. The results of all studies are complied in a wrap-up report that will focus on the implications of the findings for today’s S&T environment.

Nov. 1, 2005

DTP-021: The Bug Stops Here: Force Protection and Emerging Infectious Diseases

The purpose of this paper is to review important lessons that have been learned in the past, and to revisit the older but proven principles of force protection that are in danger of being forgotten in today’s technology-focused military environment. It provides a series of case studies that analyze health threats to each regional combatant command and presents both tactical and strategic recommendations that will better prepare the entire DoD for future outbreaks.

Oct. 1, 2005

Sweden’s Use of Commercial Information Technology for Military Applications

Sweden, a nation of only 9 million people with a political climate that has fostered a posture of nonalignment for over half a century, has nevertheless maintained highly credible, modern, and high-technology military forces. Sweden has expanded the mission of forces originally designed for the Cold War to include international peacekeeping. The focus of this study is the Swedish formula for achieving the high-technology military capabilities that successfully compensate for a small standing force. What policies and processes enabled the Swedish military to take advantage of leading-edge producers of commercial information technology (CIT)? What lessons does the Swedish model hold for the U.S. Department of Defense?

Oct. 1, 2005

Russia and NATO: Increased Interaction in Defense Research and Technology

As a member of both the Partnership for Peace and the North Atlantic Treaty Organization (NATO)–Russia Council (NRC), Russia enjoys remarkable status in an alliance formed principally to counter Soviet aggression. Active participation in one additional element of NATO—the Research and Technology Organization (RTO)—would offer unique opportunities to enhance relationships and mutual security. The RTO is the largest organization of its type in the world, has an extremely active program of work, and is eager to work with Russia.

Sept. 15, 2005

DTP-020: Making IT Happen: Transforming Military Information Technology, edited by Joseph N. Mait

This report is a primer for commercial providers to gain some understanding of the military’s thinking about military information technology and some of the programs it foresees for the future. The intent is to introduce those not presently involved in the development of military information technology to some of the things and programs being developed by the DoD for deployment in the next five to ten years.

Sept. 5, 2005

DTP-019: Alternative Fleet Architecture Design

This report calls into question the viability of the longstanding logic of naval force building. It provides a description of the opportunities that rapid advances in technology and organizational effectiveness offer the U.S. Navy as it looks to the demanding future. Most important, it provides an alternative fleet architecture design that incorporates the three broad elements of the DoD’s transformation strategy.

Sept. 1, 2005

DTP-018: The NATO Response Force: Facilitating Coalition Warfare Through Technology Transfer and Information Sharing

This study is an examination of the issues associated with transferring U.S. technology and information needed for standing up such an advanced force for early entry into high-intensity conflicts. It also makes a number of additional observations about the nature of 21st century coalition warfighting, the centrality of network-centric warfare to coalition operations, and the importance and complexity of improving force interoperability in an increasingly network-centric environment.

Aug. 15, 2005

DTP-017: The Science and Technology Innovation Conundrum

This study is motivated by the observation that the state of health of the United States S&T enterprise seems to be simultaneously characterized by opposite assessments. The purpose of this study is to shed light on how this conundrum has come about, and from this perspective to evaluate potential impacts of the underlying drivers of the conundrum on the technological positioning and ultimate national security of the U.S.

Aug. 1, 2005

DTP-016: Harnessing the Interagency for Complex Operations

This paper attempts to catalogue and describe the known models for interagency cooperation for stabilization and reconstruction (S&R) operations. The models in existence and under discussion can be grouped in terms of their focus on different aspects of the interagency process, as well as on different aspects of S&R.

July 15, 2005

DTP-015: Learning from Darfur: Building a Net-Capable African Force to Stop Mass Killing

The purpose of this report is to explore one particularly promising model of combat force to intervene in Africa to stop mass killings and other atrocities. Its conclusion is that networking concepts and technologies that were effective in Afghanistan and Iraq can be used by Africans with intensive external help to field a capability for forcible humanitarian intervention.

July 1, 2005

Can al Qaeda Be Deterred from Using Nuclear Weapons?

This occasional paper pursues four different but complementary approaches to dissect the issue of whether acquisition of NBC/R weapons will mean employment for Osama bin Laden and al Qaeda.

July 1, 2005

The Changing Landscape of Defense Innovation

In a rapidly evolving business environment, many successful companies have transformed themselves by reexamining their core missions and competencies and exploiting innovation in nontraditional ways. General Electric still manufactures products but now identifies itself as a services company. Wal-Mart has become the premier retailer by capitalizing on its logistics and support systems. These two giants and other companies have realized that they can become more profitable by exploiting new regions of the business landscape.