-
Preparing the Pipeline: The U.S. Cyber Workforce for the Future
David J. Kay, Terry J. Pudas, and Brett Young
In 2008, the Comprehensive National Cybersecurity Initiative listed “expanded cyber education” as one of its key recommendations. In 2009, the Partnership for Public Service produced a report stating that the current pipeline of cybersecurity workers into the government was inadequate.1 In the same year, Secretary of Defense Robert Gates stated that the military was “desperately short of people who have the capabilities [to operate in cyberspace].”2 And in 2011, the Inspector General of the Federal Bureau of Investigation reported that 35 percent of the special agents investigating national security cyber-intrusion cases lacked necessary training and technical skills.3 Nonetheless, the U.S. Government and private sector still seek to increase their online operations and dependency in spite of these shortcomings. An expert at the Atlantic Council of the United States sums up this problem: “cyber workforce management efforts resemble a Ferris wheel: the wheel turns on and on . . . we move, but around and around, never forward.”4
-
Toward the Printed World: Additive Manufacturing and Implications for National Security
Connor M. McNulty, Neyla Arnas, and Thomas A. Campbell
Additive manufacturing (AM)—commonly referred to as “three-dimensional” or “3D” printing—is a prospective game changer with implications and opportunities that affect not just the Department of Defense (DOD) but the economy as a whole. The technology allows the “art to part” fabrication of complex objects from a computer model without part-specific tooling or human intervention.1 AM has already impacted a variety of industries and has the potential to present legal and economic issues with its strong economic and health-care benefits. Because of its remarkable ability to produce a wide variety of objects, AM also can have significant national security implications. The purpose of this paper is to provide a general introduction to these issues for nontechnical readers through a survey of the recent history and the current state of technology. Included in this paper is a brief review identifying key individuals and organizations shaping developments as well as projected trends.
-
Grand Strategy and International Law
Nicholas Rostow
Grand strategy is, or should be, the “calculated relationship of means to large ends.” Interrelated strategic and legal dimensions provide a leitmotif to the modern history of relations among powerful states. States employ an array of means to achieve their large ends—military power, as well as diplomatic, informational, economic/financial, and legal tools and influence. They differ in effectiveness and precision. In the web of interactions that shape contemporary international relations, the legal dimension as a framework and guide to choices is more often overlooked than particular legal instruments that might be invoked in the belief, or more often the hope, that they will serve policy and strategic objectives.
-
Public-Private Cooperation in the Department of Defense: A Framework for Analysis and Recommendations for Action
Linton Wells II and Samuel Bendett
In 2010, a National Defense University (NDU) research project called TIDES1 (Transformative Innovation for Development and Emergency Support) was invited to partner with a company to produce a tradeshow about humanitarian assistance and disaster relief missions and related capabilities. Despite senior-level Department of Defense (DOD) guidance to pursue public-private partnerships, DOD attorneys told TIDES managers to reject the agreement. Differing legal interpretations of the word partner generated concern that the proposed partnership could create an impermissible perception of government endorsement of a private company. Even though it would have advanced the government’s mission and promoted efficiency, a variety of obstacles scuttled the proposed cooperation.
-
Small Nuclear Reactors for Military Installations: Capabilities, Costs, and Technological Implications
Richard B. Andres and Hanna L. Brett
In recent years, the U.S. Department of Defense (DOD) has become increasingly interested in the potential of small (less than 300 megawatts electric [MWe]) nuclear reactors for military use. DOD’s attention to small reactors stems mainly from two critical vulnerabilities it has identified in its infrastructure and operations: the dependence of U.S. military bases on the fragile civilian electrical grid, and the challenge of safely and reliably supplying energy to troops in forward operating locations. DOD has responded to these challenges with an array of initiatives on energy efficiency and renewable and alternative fuels. Unfortunately, even with massive investment and ingenuity, these initiatives will be insufficient to solve DOD’s reliance on the civilian grid or its need for convoys in forward areas. The purpose of this paper is to explore the prospects for addressing these critical vulnerabilities through small-scale nuclear plants.
-
European Energy Security: Reducing Volatility of Ukraine-Russia Natural Gas Pricing Disputes
Richard B. Andres and Michael Kofman
On January 7, 2009, the existing energy relationship among Europe, Russia, and Ukraine broke down over a natural gas dispute, just as it had done 3 years earlier. Amid subzero temperatures in many parts of Europe, Russia turned off its gas supply to Ukraine, causing shortages in more than 20 European countries. Thousands across the continent were left in the dark, and government services were closed. While the flow of gas was eventually restored, Russian gas disputes with Ukraine continue, and the prospect of another Gazprom shutoff has become an annual event for European consumers. Despite earlier indications that another breakdown in negotiations would lead to blackouts in Europe early in 2010, the potential crisis was averted via a Russia-Ukraine deal that restructured earlier payment and pricing arrangements. However, it is doubtful that Ukraine can continue timely payments for its domestic gas consumption and maintain its own pipeline infrastructure. Fundamental changes to Russia-Ukraine energy transport agreements are coming.
-
Conventional Prompt Global Strike: Strategic Asset or Unusable Liability?
M. Elaine Bunn and Vincent Manzo
The Conventional Prompt Global Strike (CPGS) concept calls for a U.S. capability to deliver conventional strikes anywhere in the world in approximately an hour. The logic of the CPGS concept is straightforward. The United States has global security commitments to deter and respond to a diverse spectrum of threats, ranging from terrorist organizations to near-peer competitors. The United States might need to strike a time-sensitive target protected by formidable air defenses or located deep inside enemy territory. Small, high-value targets might pop up without warning in remote or sensitive areas, potentially precluding the United States from responding to the situation by employing other conventional weapons systems, deploying Special Operations Forces (SOF), or relying on the host country.
-
The Emergence of China in the Middle East
James Chen
During the 9th century, Arab traders regularly plied lucrative maritime routes that connected the Persian Gulf to southern China by way of the Indian Ocean. This commercial activity, which mostly involved jade, silk, and other luxury goods, went on for centuries and became part of what is now known as the Silk Road. In some ways, the world is now witnessing a restoration of that ancient trading relationship between two civilizations—except that oil and consumer goods have replaced jade and silk.
-
Brazil and the United States: The Need for Strategic Engagement
Luigi R. Einaudi
Washington’s identification of Brazil with Latin America and the Third World hampers its appreciation of Brazil’s power and importance to the United States. It is true that Brazil is geographically part of Latin America, and it is also true that Brazil, a founder of the Group of 77, was, with India, among the original leaders of the “Third World.”
-
Iran’s Islamic Revolution: Lessons for the Arab Spring of 2011?
Michael Eisenstadt
The Islamic Revolution surprised senior U.S. policymakers as well as the Shah of Iran, Mohammad Reza Pahlavi. On the eve of revolution, Iran—a key U.S. ally—seemed relatively stable despite bouts of urban terrorism in the early and mid-1970s. At the first signs of escalating unrest in early 1978, neither Iranian nor U.S. officials considered the possibility that Iran’s armed forces, the largest and most modern in the region (next to those of Israel), would prove unable to deal with whatever trouble lay ahead. The fall of the Shah a year later, therefore, raised searching questions regarding the role of the armed forces during the crisis and its failure to quash the revolution. The recent emergence of popular protest movements that have overthrown authoritarian regimes in Tunisia and Egypt—and that are challenging similar regimes in Libya, Yemen, Bahrain, and Syria—has revived memories of the Shah and his fall. These developments have again raised questions regarding the role of armed forces during revolutions and whether Iran’s experience during the Islamic Revolution and after holds relevant lessons for current developments in the Middle East.
-
Getting Beyond Taiwan? Chinese Foreign Policy and PLA Modernization
Michael A. Glosny
Since the mid-1990s, China’s military modernization has focused on deterring Taiwan independence and preparing for a military response if deterrence fails. Given China’s assumption of U.S. intervention in a Taiwan conflict, the People’s Liberation Army (PLA) has been developing military capabilities to deter, delay, and disrupt U.S. military support operations. The 2008 election of Taiwan President Ma Ying-jeou, however, has contributed to improved cross-strait economic and political cooperation and dramatically reduced the threat of Taiwan independence and war across the Taiwan Strait. Cooperation has included full restoration of direct shipping, flights, and mail across the strait, Taiwan’s participation in the World Health Assembly, regularized cross-strait negotiation mechanisms that have already reached several agreements, and the recent signing of the Economic Cooperation Framework Agreement.
-
Countering the Lord’s Resistance Army in Central Africa
Andre Le Sage
The Lord’s Resistance Army (LRA) is one of Africa’s most brutal militia forces.1 It has plagued Central Africa, particularly northern Uganda, for over two decades. The group’s tactics provide textbook of war crimes and crimes against humanity. When attacking civil- LRA instills fear by selecting random individuals for brutal executions. Children are abducted to serve as porters, sex slaves, and new militia. In order to indoctrinate child soldiers, young abductees are routinely forced to kill their own family members and other children, or be murdered them- selves. Anyone caught trying to escape from the LRA is summarily executed. By contrast with other African rebel groups, which occasionally adopt such brutal tactics, the LRA has conducted such atrocities on a systematic and prolonged basis.
-
The Evolving Threat of al Qaeda in the Islamic Maghreb
Andre LeSage
The United States faces an important strategic question in northwest Af- rica: what level of activity by al Qaeda in the Islamic Maghreb (AQIM) would constitute a sufficient threat to U.S. national security interests a more aggressive political, intelligence, military, and law enforcement AQIM already poses the greatest immediate threat of transnational terrorism in the region, and its operational range and sophistication continue to expand. Since 2007, the group has professed its loyalty to Osama bin Laden and al Qaeda’s senior leadership and claimed responsibility for dozens of attacks in the subregion. These attacks have included the use of suicide bombers, improvised explosive devices, kidnapping operations, and assassinations.
-
Deterrence and Escalation in Cross-domain Operations: Where Do Space and Cyberspace Fit?
Vincent Manzo
Warfare has become even more complicated since Richard Smoke wrote this description of escalation in 1977. The National Security Space Strategy describes space as “congested, contested, and competitive,” yet satellites underpin U.S. military and economic power. Activity in cyberspace has permeated every facet of human activity, including U.S. military operations, yet the prospects for effective cyber defenses are bleak. Many other actors depend on continued access to these domains, but not nearly as much as the United States.
-
Maximizing the Returns of Government Venture Capital Programs
Andrew S. Mara
The stories of Google and Segway certainly end differently. With a market capitalization of over $180 billion, Google is arguably the biggest success in the information technology (IT) industry in the last decade. The phrase google it has worked its way into everyday language and dictionaries. On the other hand, Segway remains a privately held company whose products are largely relegated to use by tourists in major cities and security personnel at airports. We certainly do not hear people say that they “segwayed” to work this morning.
-
Finland, Sweden, and NATO: From “Virtual” to Formal Allies?
Leo G. Michel
The “Open Door” policy of the North Atlantic Treaty Organization (NATO) has been an article of faith for Allies and aspirants alike for more than a decade. Its most recent formulation, approved at the November 2010 Lisbon Summit, states: “The door to NATO membership remains fully open to all European democracies which share the values of our Alliance, which are willing and able to assume the responsibilities and obligations of membership, and whose inclusion can contribute to common security and stability.”
-
Chinese Military Transparency: Evaluating the 2010 Defense White Paper
Phillip C. Saunders and Ross Rustici
The People’s Republic of China (PRC) State Council Information Office released the seventh edition of its biennial defense white paper, “China’s National Defense in 2010,” on March 31, 2011. This document aims to communicate the latest information on China’s military development, strategy, capabilities, and intentions. China began publishing defense white papers in 1998, partly as a means of increasing transparency in response to regional concerns about the growing capabilities and actions of the People’s Liberation Army (PLA). Despite the systematic release of these documents, many of China’s neighbors and other regional powers continue to express concerns about China’s lack of military transparency. The Chinese maintain that they are becoming more open over time and highlight the importance of transparency about strategic intentions rather than capabilities.
-
Avoiding a Crisis of Confidence in the U.S. Nuclear Deterrent
John P. Caves Jr.
The United States needs to modernize and ensure the long-term reliability and responsiveness of its aging nuclear deterrent force and nuclear weapons infrastructure. It cannot otherwise safely reduce its nuclear weapons, responsibly ratify the Comprehensive Test Ban Treaty, confidently deter and contain challenges from rising or resurgent nuclear-armed near peers, and effectively dissuade allies and partners from acquiring their own nuclear weapons. Modernization is fundamental to avoiding a future crisis of confidence in the U.S. nuclear deterrent.
-
Reforming the Inter-American Defense Board
John A. Cope
Does the Inter-American Defense Board (IADB) have a future in an era of multidimensional security? Burdened by a mid-20th-century military structure and a tradition of U.S. leadership, lingering deep antimilitary discomfort within the Organization of American States (OAS), and severely shrinking financial and human resources, the Board, with its secretariat and 27-member council of delegates,1 has not been functionally useful to the OAS or its own membership and is ripe for disestablishment. Perceived to be out of touch, inflexible, and difficult to control, the IADB would cease to exist if funding were denied or markedly reduced.2
-
Private Contractors in Conflict Zones: The Good, the Bad, and the Strategic Impact
T.X. Hammes
In Iraq and Afghanistan, the use of contractors reached a level unprecedented in U.S. military operations. As of March 31, 2010, the United States deployed 175,000 troops and 207,000 contractors in the war zones. Contractors represented 50 percent of the Department of Defense (DOD) workforce in Iraq and 59 percent in Afghanistan. These numbers include both armed and unarmed contractors. Thus, for the purposes of this paper, the term contractor includes both armed and unarmed personnel unless otherwise specified. The presence of contractors on the battlefield is obviously not a new phenomenon but has dramatically increased from the ratio of 1 contractor to 55 military personnel in Vietnam to 1:1 in the Iraq and 1.43:1 in Afghanistan.
-
Africa’s Irregular Security Threats: Challenges for U.S. Engagement
Andre Le Sage
This paper provides an overview of Africa’s irregular, nonstate threats, followed by an analysis of their strategic implications for regional peace and stability, as well as the national security interests of the United States. After reviewing the elements of the emerging international consensus on how best to address these threats, the conclusion highlights a number of new and innovative tools that can be used to build political will on the continent to confront these security challenges. This paper is intended as a background analysis for those who are new to the African continent, as well as a source of detailed information on emerging threats that receive too little public or policy-level attention.
-
Somalia’s Endless Transition: Breaking the Deadlock
Andre Le Sage
In January 2009, Sheikh Sharif Sheikh Ahmed succeeded Abdullahi Yusuf as pres- ident of Somalia’s Transitional Federal Government (TFG). Sheikh Sharif took office following the conclusion of United Nations (UN)–brokered peace negotiations in Djibouti between a warlord-dominated TFG and moderate opposition forces that led the Union of Islamic Courts (UIC) in 2006. It was hoped that Sheikh Sharif would move forward with the long list of transitional tasks required to establish a permanent government for the country and extend control over areas seized by al Shabab.1 To his credit, Sheikh Sharif’s appointment led to the withdrawal of Ethiopian forces from the country, and eliminated al Shabab’s ability to use Ethiopian occupation as a rallying cry. TFG supporters also point to ongoing efforts to reinvigorate the constitutional process, draft a citizenship law, make senior-level appointments in a revived judicial system, establish an independent central bank, utilize port revenues for public service delivery, and craft political cooperation deals with the regional administration in Puntland (northeast Somalia) and other militias opposed to the insurgency.
-
Prioritizing Strategic Interests in South Asia
Robert B. Oakley and T.X. Hammes
For the last 8 years, the United States has focused its South Asia efforts primarily on Afghanistan. Despite repeated calls in U.S. strategic documents for a regional approach, the public debate has consistently returned to Afghanistan. During the Obama administration’s lengthy 2009 policy review, public discussion narrowed even further to the single issue of troop strength. With the President’s speech on December 1, the debate over the number of troops faded, only to be replaced by discussions about the proposed withdrawal start date of July 2011 and the time necessary to deploy an additional 30,000 troops into Afghanistan. Obviously, the administration has just begun to implement its new plan, and the outcome remains uncertain. It will be years before we can determine if the new policy is successful.
-
Global Commons and Domain Interrelationships: Time for a New Conceptual Framework?
Mark E. Redden and Michael P. Hughes
Over the last several years, examination of U.S. national security interests within the context of the global commons has emerged as a major policy issue in the defense community.2 At the highest levels of the Department of Defense (DOD), there is now an awareness that the U.S. military will be confronted by a host of challenges “to stability throughout the global commons.”3 Furthermore, the Nation can “expect to be increasingly challenged in securing and maintaining access to the global commons and must also be prepared for operations in unfamiliar conditions and environments.”4 In response, the 2010 Quadrennial Defense Review Report has now assigned “assured access” to the commons as a top priority for U.S. military forces.5
-
U.S.-Mexico Homeland Defense: A Compatible Interface
Victor E. Renuart Jr. and Biff Baker
This paper responds to a previous Strategic Forum (no. 243, July 2009) entitled U.S.-Mexico Defense Relations: An Incompatible Interface by Craig Deare. Some of the assertions and conclusions within Dr. Deare’s paper were flawed due to an outdated U.S.-Mexico paradigm that preceded the 9/11 attacks and recent counter-drug operations in Mexico. If his work had been published prior to the establishment of U.S. Northern Command (USNORTHCOM), it would have been well received, but times have changed. Because of our collective experiences over the past 6 years, we find implausible the notion that USNORTHCOM is not staffed or experienced enough to support Mexico’s security cooperation needs. Hence, U.S.-Mexico Homeland Defense: A Compatible Interface is intended to set the record straight by pointing out the numerous areas of cooperation between Mexico and the United States since the establishment of USNORTHCOM.
Printing is not supported at the primary Gallery Thumbnail page. Please first navigate to a specific Image before printing.