-
Crisis Stability and Nuclear Exchange Risks on the Subcontinent: Major Trends and the Iran Factor
Thomas F. Lynch III
Crisis stability—the probability that political tensions and low-level conflict will not erupt into a major war between India and Pakistan—is less certain in 2013 than at any time since their sequential nuclear weapons tests of 1998. India’s vast and growing spending on large conventional military forces, at least in part as a means to dissuade Pakistan’s tolerance of (or support for) insurgent and terrorist activity against India, coupled with Pakistan’s post-2006 accelerated pursuit of tactical nuclear weapons as a means to offset this Indian initiative, have greatly increased the risk of a future Indo-Pakistani military clash or terrorist incident escalating to nuclear exchange.1 America’s limited abilities to prevent the escalation of an Indo-Pakistani crisis toward major war are best served by continuing a significant military and political presence in Afghanistan and diplomatic and military-to-military dialogue with Pakistan well beyond 2014.
-
Suggestions for Evaluating the Quality of the Army’s Science and Technology Program: The Portfolio and Its Execution
John W. Lyons, Richard Chait, and James A. Ratches
This paper presents a methodology discussing the goal of establishing the strongest possible technology program appropriately aligned to the needs of its customers and the expectations of its stakeholders. The first chapter presents the essential elements of the Army S&T portfolio followed by discussions of the Army S&T portfolio and the evaluation of it.
-
External Collaboration in Army Science and Technology: The Army’s Research Alliances
John W. Lyons and James A. Ratches
In this study, the authors examine the decision for Army Research Laboratories to engage in external, formal collaborations such as collaborative alliances. They go on to assess ARL Collaborative Technology Alliances (CTAs), Collaborative Research Alliances (CRAs), and Information Technology Alliance (ITAs). The report concludes by examining the effectiveness of the examples given above, and a recommendation for formulating a set of assessment questions for Army managers considering collaboration in the future.
-
Some Recent Sensor – Related Army Critical Technology Events
James A. Ratches, Richard Chait, and John W. Lyons
Some Recent Sensor-Related Army Critical Technology Events, James A. Ratches, Richard Chait, and John W. Lyons examined current Critical Technology Events (CTEs) that are new or ongoing in US Army Science and Technology (S&T) community. CTEs are ideas, concepts, models and analyses, including key technical and managerial decisions, which have had a major impact on the development of a specific weapons system. The five on-going projects within the Army S&T portfolio selected for inclusion in the report are the Global Positioning System (GPS)-guided munitions, Excalibur; the persistent surveillance platform, Global Hawk; Unattended Transient Acoustic/Artillery MASINT System (UTAMS); the thermal imaging night sight technology; and 5V Li-ion batteries for battlefield power sources. The authors identified 42 CTEs in the development of the Army sensors; 24 of the 42 reported were uniquely contributed by the in-house Army laboratories; 57 percent of all the CTEs originated in the Army S&T laboratories. Further, the authors draw the following conclusions: that Army laboratories make significant technical and enabling contributions to Army platforms and capabilities; Army S&T laboratories are uniquely suited to represent, defend, and guide the satisfaction of Army requirements; Army laboratories have the people, infrastructure, and determination to satisfy evolving and established needs; and the Army S&T community is the singular force in collaboration with industry and academia that ensures Army needs are optimally met in an effective, efficient, and affordable manner. The report attempts to show that the S&T resources and processes in place continue to generate CTEs in the sensor and power area for the next generation of Army systems. It concludes that it is critical to the Army’s mission to foster and nurture the Army’s in-house S&T tech base.
-
Critical Technology Events (CTEs) that Support the Rationale for Army Laboratories Based on Science and Technology Functions Performed
James A. Ratches and John W. Lyons
This report, part of the “Project Hindsight Revisited” series of DTP publications, provides a retrospective look at 58 Critical Technology Events (CTEs) in DoD R&D investment, logically divided across 10 separate categories. The authors demonstrate the continuing relevance of Army laboratories in the development of critical weapons systems. Using specific examples, the study articulates the importance of maintaining quality staff and managers, ensuring the relevance of S&T program investments, and integrating servicemen and women with the larger scientific community to forecast technology trends.
-
The New NATO Policy Guidelines on Counterterrorism: Analysis, Assessments, and Actions
Stefano Santamato
The history of the North Atlantic Treaty Organization (NATO) will say that the first, and so far only, time NATO has called upon its Article 5 collective defense clause was on September 12, 2001, following a terrorist attack on one of its members. Yet, until the agreement by NATO Heads of State and Government on the new policy guidelines on counterterrorism on May 20, 2012, NATO did not have an agreed policy to define its role and mandate in countering terrorism.
-
Defining "Weapons of Mass Destruction"
W. Seth Carus
In January 2005, Secretary of Defense Donald Rumsfeld directed that U.S. Strategic Command become “the lead combatant commander for integrating and synchronizing DOD [Department of Defense] in combating WMD [weapons of mass destruction].” This assignment was in response to the White House’s December 2002 National Strategy to Combat Weapons of Mass Destruction.
The Secretary’s memorandum, however, raised a thorny definitional problem with clear bureaucratic implications: what are weapons of mass destruction? Unfortunately, that is not an easily answered question. There are numerous definitions of WMD with some official or semi-official standing (more than 40 are identified in this paper), although most are variations of 1 of 5 basic definitions. In fact, even DOD has adopted alternative and fundamentally inconsistent definitions, including some different from the one used by the White House in its strategy and policy documents. -
Globalization of S&T: Key Challenges Facing DOD
Timothy Coffey and Steven Ramberg
This paper employs the results of a full economic analysis for the period 2005-2050 to estimate the S&T knowledge production for each of the world’s 17 largest economies. The present work establishes an empirical relationship between an economy’s gross domestic product per capita and its ability to generate S&T knowledge.
-
Taking the Battle Upstream: Towards a Benchmarking Role for NATO
Stephan De Spiegeleire
The main intuition underlying this paper is that the current (geo) political, technological, and especially financial realities may require NATO to take the battle for capabilities upstream.
-
Constructive Convergence: Imagery and Humanitarian Assistance
Doug Hanchard
The goal of this paper is to illustrate to the technical community and interested humanitarian users the breadth of tools and techniques now available for imagery collection, analysis and distribution, and to provide brief recommendations with suggestions for next steps.
-
Non-Traditional Security Threats and Asia-Pacific Regional Cooperation
James M. Keagle
The purpose of this paper is for the better understanding of the security challenges and opportunities for expanded cooperation through global regional efforts to manage our planet and govern its inhabitants more responsibly.
-
Report of an Army Workshop on Convergence Forecasting: Mechanochemical Transduction
Douglas Kiserow, David Stepp, Stephen Lee, and Peter Reynolds
This is an assessment of the Mechanochemical Transduction Convergence Workshop sponsored by the Army Research Office which took place in January 2012. The workshop was a test case for identifying convergences of disciplines and their potential impact on science and the Army. The chief objective of the workshop was the identify the most promising research opportunities and interdisciplinary convergences that could lead the field of mechanochemical transduction in new direction with unexpected outcomes that would be relevant to future Army needs.
-
Proliferation Security Initiative: Origins and Evolution
Susan J, Koch
On December 9, 2002, the United States and Spanish navies cooperated to interdict a North Korean vessel, the So San, in the Arabian Sea.1 The operation initially appeared to be an unqualified success, a textbook example of interdiction to prevent proliferation of weapons of mass destruction (WMD), related materials, or delivery systems. According to press reports, the United States began tracking the vessel when it first left North Korea, believing that it was carrying a cargo related to Scud ballistic missiles. The So San flew no flag, making it a stateless vessel under international law, subject to interception and boarding by warships on the high seas.2 The United States asked the Spanish navy to stop and search the So San when the ship reached the patrol area of Combined Task Force (CTF) 150, then under Spanish command. The mission of CTF 150 was “to promote maritime security in order to counter terrorist acts and related illegal activities” in the Gulf of Aden, Gulf of Oman, Red Sea, and Indian Ocean.3 Thus, the United States proposed—and Spain agreed—to use a tool developed to combat global terrorism in a counterproliferation mission.
-
Reflections on Over Fifty Years in Research and Development; Some Lessons Learned
John W. Lyons
This paper presents some thoughts about research in science and technology gleaned from Dr. Lyons’ more than 50 years working in scientific and engineering research – first in chemical industry, then at two different government laboratories, and later some years in S&T policy. It elaborates on a paper by Richard Chait in which he interviews three former S&T executives in the DoD on how to manage a research laboratory. Its objective is to provide some insights on what it is like to work in a scientific research establishment.
-
Enhancing Army S&T Vol. II: The Future
John W. Lyons and Richard Chait
Chapter I of this volume is an introduction, and Chapter II offers an updated view of the work discussed in Vol. I with an emphasis on the relative roles played by the Army laboratories that manufactured the systems. The close collaboration between the two groups was judged by the authors to be the key to the successful outcomes. This chapter presents updated findings and recommendations of the previous studies in Vol I.
-
Cross-currents in French Defense and U.S. Interests
Leo G. Michel
France is the only European ally—except for the United Kingdom (UK)—that regards its military capabilities, operational performance, and defense industry as vital levers to exert global influence. While the French believe strongly in their need to preserve “strategic independence,” they see new challenges in the evolving international security environment that will oblige them to accept greater cooperation with others, even in areas once considered too sensitive to discuss. Although some French strategists remain uncomfortable with the notion of closer defense ties with the United States, others ask whether there might be a greater danger ahead: specifically, if Europe’s strength dissipates as America “rebalances” toward the Asia-Pacific region, where does France turn to find capable and willing partners to protect its security interests?
-
Combating Transnational Organized Crime: Strategies and Metrics for the Threat
Samuel Musa
This paper provides an overview of the strategic and policy initiatives that the United States and international community have taken, including an assessment of the TOC threat. The overview is followed by the metrics developed to evaluate the relative magnitude and direction of the threat of a 5-year period.
-
Russia and the Iranian Nuclear Program: Replay or Breakthrough?
John W. Parker
Despite protests across Russia sparked by last December’s fraud-filled Duma (parliament) elections, Vladimir Putin is preparing to return to the presidency this May. Will Putin replay his 2004–2008 approach to Iran, during which Russia negotiated the S–300 air defense system contract with Tehran? Or will he continue Russia’s breakthrough in finding common ground with the United States on Iran seen under President Dmitriy Medvedev, who tore up the S–300 contract?
-
Japan-China Relations 2005–2010: Managing Between a Rock and a Hard Place An Interpretative Essay
James J. Przystup
Between China and Japan, the past is ever-present. Notwithstanding shared cultural and historic ties, throughout the past century and going back to the Sino-Japanese war at the end of the 19th century, a bitter legacy of history—the Boxer Rebellion; the Mukden Incident and Japan’s occupation of South Manchuria (1931); the Marco Polo Bridge Incident, Japan’s subsequent invasion of China, and the Nanjing Massacre (1937); and the Sino-Japanese War (1937– 1945)—has left an indelible mark on this relationship.
-
Managing Sino-U.S. Air and Naval Interactions: Cold War Lessons and New Avenues of Approach
Mark E. Redden and Phillip C. Saunders
The United States and China have a complex, multifaceted, and ambiguous relationship where substantial areas of cooperation coexist with ongoing strategic tensions and suspicions. One manifestation involves disputes and incidents when U.S. and Chinese military forces interact within China’s Exclusive Economic Zone (EEZ). Three high-profile incidents over the last decade have involved aggressive maneuvers by Chinese military and/or paramilitary forces operating in close proximity to deter U.S. surveillance and military survey platforms from conducting their missions. Why do these incidents continue to occur despite mechanisms designed to prevent such dangerous encounters? Could new or different procedures or policies help avoid future incidents?
The problem in the U.S.-China case lies not with inadequate rules (for maritime operations) or history of practice (for air operations), but rather in the motivations that sometimes drive the Chinese to selective noncompliance with their provisions. China regards military surveillance and survey operations in its EEZ as hostile, threatening, illegal, and inappropriate. China’s harassment of U.S. naval vessels and aircraft conducting surveillance and survey operations is intended to produce a change in U.S. behavior by raising the costs and risks of these operations.
The U.S. military has confronted this problem before. U.S. doctrine and operational practice in conducting and responding to surveillance operations derives primarily from Cold War interactions with the Soviet military. The two countries were eventually able to develop a mutually beneficial protocol, known as the Incidents at Sea Agreement (INCSEA), for managing air and naval interactions, thereby reducing the potential for an incident to occur or escalate. Given the success of INCSEA and tactical parallels between U.S.-Soviet and U.S.-China interactions, the factors that led the Soviet Union to seek an agreement provide a useful prism for evaluating the current situation.
Three primary factors motivated the U.S.-Soviet agreement: concern over the escalation potential of future incidents, a growing parallelism in the nature and scope of surveillance operations, and a burgeoning period of détente. These factors do not presently exist in the U.S.- China relationship to the degree necessary to induce mutual restraint in maritime and air interactions within China’s EEZ. This situation may change over the next 10 to 15 years as Chinese global economic interests expand and naval modernization produces a more capable and active Chinese navy, but waiting for change is not an attractive solution given continuing operational risks and the potential for an incident to badly damage bilateral relations.
If U.S. policymakers seek a faster change in Chinese behavior, they need to understand the underlying Chinese policy calculus, how it may change over time, and potential means of influencing that calculus. Based on Chinese policy objectives, official statements, patterns of behavior, and logical inferences, we identify seven decisionmaking variables:
- Sovereignty/security concerns: These reflect China’s historical concerns about sovereignty and the economic importance of defending China’s coastal provinces.
- Intelligence/counter-intelligence: China needs to gather strategic and tactical intelligence and also seeks to limit intelligence collection by potential adversaries.
- Geostrategic considerations: China has concerns about the U.S. role in Asia, needs a stable external environment that supports development, desires to shape international rules and norms, and seeks to project a positive international image.
- Chinese domestic context: Aggressive efforts by Chinese naval and maritime forces to defend sovereignty bolster their relative importance and justify increased resources. However, the Chinese navy also seeks to show that it can protect China’s interests and safeguard China’s economic development, missions that require cooperation with foreign militaries.
- Global commons access: Assured access to the global economy for resources and to reach markets is essential for continued Chinese economic growth and development.
- Escalation control: China shares an interest in preventing interactions with U.S. military assets from escalating into a broader conflict, but Chinese leaders and officers tend to regard the risk of such escalation as limited and manageable.
- Relations with the United States: A constructive relationship with the United States is important for China’s continued economic development and ability to achieve its national objectives, but Chinese leaders downplay the likelihood of a military incident causing irreparable damage to bilateral relations.
U.S. policymakers have several broad avenues of approach to alter the Chinese policy calculus and thereby influence Chinese behavior:
- Intelligence/counter-intelligence approaches: These approaches link China’s own ability to gather intelligence with its tolerance of U.S. intelligence-collection activities. Options include creating direct parallels between U.S. operations in China’s EEZ and Chinese operations in Japan’s EEZ; linking Chinese tolerance of U.S. surveillance operations in its EEZ with U.S. tolerance of select Chinese intelligence-collection activities in other areas or using other means; and linking the frequency of U.S. surveillance operations to Chinese concessions or cooperation in other areas.
- Maritime cooperation/coercion: These approaches play on the distinction between contentious U.S.-Chinese interactions within China’s EEZ and more cooperative interactions in distant waters. Cooperative options include highlighting the value of agreed operational norms and expanding U.S.-China maritime cooperation, including via surveillance cooperation in support of counterpiracy operations; coercive options include responding to Chinese harassment with “tit for tat” actions against Chinese navy ships or commercial shipping outside China’s EEZ.
- Geostrategic and bilateral considerations: These approaches play on Chinese geostrategic interests in maintaining a stable regional environment and a U.S.-China relationship conducive to economic and social development. Options include a more structured, consistent, and sustained U.S. strategic communication plan that highlights international norms of airmanship and seamanship; drawing parallels between the rights of military units to conduct operations in EEZs under the freedom of navigation principle and the more general issue of commercial access to the global commons; and challenging the Chinese assumption that military incidents inside China’s EEZ are unlikely to escalate into broader conflict or seriously threaten bilateral relations.
Given the importance that China places on sovereignty, no single option is likely to be sufficient. A mixed approach, particularly one that influences more Chinese decisionmakers, may maximize the probability of success. Cooperative approaches require time for benefits to accrue and for normative arguments to be heard and heeded. Some potential coercive approaches require violating preferred U.S. norms of freedom of navigation and U.S. military standard practice of safe airmanship and seamanship to generate the leverage necessary to alter Chinese behavior. This risks shifting international norms in undesired directions and would create greater tension and friction in military-military relations and bilateral relations generally.
This study does not attempt to weigh the intelligence value of U.S. operations in China’s EEZ against their negative impact on U.S.-China relations or the costs of the coercive options identified above. U.S. policymakers will need to carefully consider whether the status quo is tolerable, the costs and risks of various approaches, and what mix of policies might move China in desired directions at an acceptable cost.
-
Deception, Disinformation, and Strategic Communications: How One Interagency Group Made a Major Difference
Fletcher Schoen and Christopher J. Lamb
This study explains how one part-time interagency committee established in the 1980s to counter Soviet disinformation effectively accomplished its mission. Interagency committees are commonly criticized as ineffective, but the Active Measures Working Group is a notable exception. The group successfully established and executed U.S. policy on responding to Soviet disinformation. It exposed some Soviet covert operations and raised the political cost of others by sensitizing foreign and domestic audiences to how they were being duped. The group’s work encouraged allies and made the Soviet Union pay a price for disinformation that reverberated all the way to the top of the Soviet political apparatus. It became the U.S. Government’s body of expertise on disinformation and was highly regarded in both Congress and the executive branch.
-
Domestic Event Support Operations (DESO)
Andrew Smith
This paper draws heavily on Australian experience in the last dozen years, during which time the country hosted a Summer Olympics and Paralympics, a Commonworth Games, an Asia-Pacific Economic Cooperation Leaders Meeting, and a number of other events, all of which required DESO to be mounted.
-
Chemical and Biological Defense Test and Evaluation (T&E) Future Challenges
James J. Valdes and Ewelina Tunia
The objective of this study was to identify emerging technical, methodological, and infrastructure challenges for future Chemical and Biological Defense Test and Evaluation investment, and to serve as a prequel to the development of a full strategic T&E Roadmap.
-
Modeling the Combined Terrorist-Narcotics Trafficker Threat to National Security
Alexander Woodcock and Samuel Musa
This modeling study demonstrated that model-generated data closely resembled actual reports about tons of disrupted narcotics substances in three consecutive years. the policy cycle model showed that increased rates of policy cycle activity increased the amount of narcotics disruption, while increased levels of corruption reduced those levels.
-
The Ongoing Insurgency in Southern Thailand: Trends in Violence, Counterinsurgency Operations, and the Impact of National Politics
Zachary Abuza
Since January 2004, a Malay-Muslim–based insurgency has engulfed the three southernmost provinces in Thailand. More than 4,500 people have been killed and over 9,000 wounded, making it the most lethal conflict in Southeast Asia. Now in its 8th year, the insurgency has settled into a low-level stalemate. Violence is down significantly from its mid-2007 peak, but it has been steadily climbing since 2008. On average, 32 people are being killed and 58 wounded every month. Most casualties are from drive-by shootings, but there are also about 12 improvised explosive device (IED) attacks a month.
Printing is not supported at the primary Gallery Thumbnail page. Please first navigate to a specific Image before printing.