May 1, 2008

International Partnerships to Combat Weapons of Mass Destruction

This Occasional Paper examines the role, manifestations, and challenges of international cooperation to combat the weapons of mass destruction threat and poses important questions for future leaders to address in moving international cooperation forward in this area.

May 1, 2008

The Role of Medical Diplomacy in Stabilizing Afghanistan

Comprehensive stabilization and reconstruction of Afghanistan are not possible given the current fragmentation of responsibilities, narrow lines of authorities, and archaic funding mechanisms. Afghans are supportive of U.S. and international efforts, and there are occasional signs of progress, but the insurgent threat grows as U.S. military and civilian agencies and the international community struggle to bring stability to this volatile region. Integrated security, stabilization, and reconstruction activities must be implemented quickly and efficiently if failure is to be averted. Much more than a course correction is needed to provide tangible benefits to the population, develop effective leadership capacity in the government, and invest wisely in reconstruction that leads to sustainable economic growth. A proactive, comprehensive reconstruction and stabilization plan for Afghanistan is crucial to counter the regional terrorist insurgency, much as the Marshall Plan was necessary to combat the communist threat from the Soviet Union.1 This paper examines the health sector as a microcosm of the larger problems facing the United States and its allies in efforts to stabilize Afghanistan.

May 1, 2008

Preparing for Catastrophic Bioterrorism: Toward a Long-Term Strategy for Limiting the Risk

This paper, circulated within government early in 2006, outlines an approach to these requirements and provides several examples of how the application of this approach can create a strategy. As described below, several of the recommendations offered here have recently been acted upon, some of them encouraged by this work, others as a consequence of independent, parallel initiatives. Nonetheless, more than 6 years—a period longer than World War II—after the 2001 anthrax letters catalyzed greater government efforts to counter bioterrorism, our homeland security officials are still struggling to define a biodefense strategy. This paper is being published in the hope that a broader discussion will yield further progress.

May 1, 2008

DTP-048: Homegrown Terrorism: The Threat Within

This paper attempts to illustrate how difficult, if not impossible, it is to find root causes of domestic terrorism that are of general applicability. It is likely to be more important to focus on the unique cultural stamp of the individual nation to assess the reason for violence-prone disquietude among its citizens and residents.

March 1, 2008

DTP-047: China’s Science and Technology Emergence: A Proposal for U.S. DOD-China Collaboration in Fundamental Research

This report proposes the establishment of a constructive, phased strategy for engaging in collaborative fundamental research with Chinese academic institutions. Recent evaluations of top S&T universities and their specific capabilities suggest appropriate scientific areas where beneficial collaborations between DoD and China should be fostered.

Feb. 1, 2008

So Many Zebras, So Little Time: Ecological Models and Counterinsurgency Operations

Force ratios are an important variable in warfare and in nature. On the Serengeti, large zebra herds are constantly hunted by small prides of lions. But with their overwhelming majority, why don’t the zebras unite and attack the lions? Hooves can be as deadly as claws when used correctly. And conversely, if the lions are such effective predators, why are there so many zebras?

Jan. 1, 2008

Cyber Influence and International Security

Cyber influence is an ongoing source of power in the international security arena. Although the United States has an enormous cyber information capacity, its cyber influence is not proportional to that capacity. Impediments to American cyber influence include the vastness and complexity of the international information environment, multiplicity of cultures and differing audiences to which communications must be addressed, extensiveness and significance of contending or alternative messages, and complexity and importance of using appropriate influential messengers and message mechanisms.

Jan. 1, 2008

Strategic Fragility: Infrastructure Protection and National Security in the Information Age

Modern societies have reached unprecedented levels of prosperity, yet they remain vulnerable to a wide range of possible disruptions. One significant reason for this growing vulnerability is the developed world’s reliance on an array of interlinked, interdependent critical infrastructures that span nations and even continents. The advent of these infrastructures over the past few decades has resulted in a tradeoff: the United States has gained greater productivity and prosperity at the risk of greater exposure to widespread systemic collapse. The trends that have led to this growing strategic fragility show no sign of slowing. As a result, the United States faces a new and different kind of threat to national security.

Jan. 1, 2008

From Reform to Reduction: Reports on the Management of Navy and Department of Defense Laboratories in the Post-Cold War Era

This book reviews approximately 65 of the significant reports issued on Department of Defense (DOD) and Department of the Navy (DON) management of research, development, test, and evaluation (RDT&E) from the end of the Cold War through the late 1990s.

Jan. 1, 2008

DTP-046: Winning the Invisible War: An Agricultural Pilot Plan for Afghanistan

The purpose of this paper is to propose efforts to integrate a comprehensive campaign plan that brings together security and reconstruction efforts and the plethora of governmental and nongovernmental organizations working in Afghanistan.