-
Reforming the Police in Post-Soviet States: Georgia and Kyrgyzstan
Erica Marat Dr.
View the Executive Summary
This report identifies and explains the determinants of police reform in former Soviet states by examining the cases of Georgia and Kyrgyzstan. The two cases were chosen to show two drastically different approaches to reform played out in countries facing arguably similar problems with state-crime links, dysfunctional governments, and corrupt police forces. In Georgia, the government’s reform program has fundamentally transformed the police, but it also reinforced the president Mikhail Saakashvili regime’s reliance on the police. With two political regime changes in one decade, Kyrgyzstan’s failed reform effort led to increasing levels of corruption within law enforcement agencies and the rise of violent nonstate groups. The experiences of Georgia and Kyrgyzstan show that a militarized police force is unlikely to spontaneously reform itself, even if the broader political landscape becomes more democratic. If anything, the Interior Ministry will adapt to new political leadership, both to ensure its own position in society and to continue receiving the state resources needed to sustain itself. Both Georgia and Kyrgyzstan offer important guidelines for conducting successful police reform in a former Soviet state, advice that could be helpful to the Middle Eastern states currently undergoing rapid political transformation. -
State Collapse, Insurgency, and Counterinsurgency: Lessons from Somalia
J. Peter Pham Dr.
View the Executive Summary
For more than 2 decades, Somalia has been the prime example of a collapsed state, resisting multiple attempts to reconstitute a central government, with the current internationally-backed regime of the “Federal Republic of Somalia” struggling just to maintain its hold on the capital and the southeastern littoral—thanks only to the presence of a more than 17,000-strong African Union peacekeeping force. Despite the desultory record, the apparent speedy collapse since late 2011 of the insurgency spearheaded by the Harakat al-Shabaab al-Mujahideen (Movement of Warrior Youth, al-Shabaab)—a militant Islamist movement with al-Qaeda links—has made it fashionable within some political and military circles to cite with little nuance the “Somalia model” as a prescription for other conflicts in Africa, including the fight in Mali against al-Qaeda in the Islamic Maghreb and its allies. This monograph takes a closer look at the situation in order to draw out the real lessons from the failures and successes of the counterinsurgency effort in Somalia. -
What Is Next for Mali? The Roots of Conflict and Challenges to Stability
Dona J. Stewart Dr.
View the Executive Summary
In March 2012, the government of Mali, one of the most touted symbols of Africa’s democratic potential, fell in a military-executed coup. At the same time, a 4-decades old rebellion among Tuaregs seeking autonomy or independence reached new heights fueled by weapons from Libya and the belief that the Arab Spring could extend to northern Mali. Al-Qaeda in the Islamic Maghreb (AQIM) and their allies were quick to capitalize on the increasing chaos in a territory characterized by lack of government control and poverty and seized the major cities in the north. While French-led military intervention restored security to cities in the north, the underlying social, economic and political issues of the crisis remain. -
Changing Minds In The Army: Why It Is So Difficult and What To Do About It
Leonard Wong Dr. and Stephen J. Gerras Dr.
View the Executive Summary
History and organizational studies both demonstrate that changing one’s mind is quite difficult, even in the face of overwhelming evidence that this change needs to occur. This monograph explains how smart, professional, and incredibly performance-oriented Army senior leaders develop frames of reference and then oftentimes cling to their outdated frames in the face of new information. It describes the influence of individual-level concepts—personality, cognitive dissonance reduction, the hardwiring of the brain, the imprints of early career events, and senior leader intuition—along with group level factors to explain how frames of reference are established, exercised, and rewarded. It concludes by offering recommendations to senior leaders on how to structure Army leader development systems to create leaders comfortable with changing their minds when the environment dictates. -
NATO Missile Defense and the European Phased Adaptive Approach: The Implications of Burden-Sharing and the Underappreciated Role of the U.S. Army
Steven J. Whitmore Mr. and John R. Deni Dr.
View the Executive Summary
In 2010, NATO decided to expand its ballistic missile defense program, in part because of the American offer to include its European Phased Adaptive Approach (EPAA) as the centerpiece of an expanded effort. For the Allies' part, few have actually contributed tangible ballistic missile defense assets, in terms of missile interceptors, radars or other sensors, or ballistic missile defense-related platforms. This is likely to have significant implications for the U.S. Army, which has an important but largely underappreciated role in NATO missile defense today. In particular, the Army is likely to face increased manpower demands, materiel requirements, and training needs in order to meet the demand signal created by the NATO ballistic missile defense program. Additionally, Army units involved directly in or in support of ballistic missile defense are likely to face a higher OPTEMPO than currently projected. Ultimately, this will exacerbate the perceived imbalance in transatlantic burden-sharing, particularly if the EPAA provides little, if any, benefit to the defense of U.S. territory, given Washington’s decision to cancel Phase 4 of that framework. -
An Assessment of the DoD Strategy for Operating in Cyberspace
Thomas M. Chen Dr.
View the Executive Summary
In July 2011, the U.S. Department of Defense (DoD) issued the DoD Strategy for Operating in Cyberspace, which outlines five strategic initiatives: 1) Treat cyberspace as another operational domain; 2) Employ new defense operating concepts to protect DoD networks; 3) Partner with other U.S. Government agencies and the private sector; 4) Build relationships with U.S. allies and international partners to strengthen cyber security; and, 5) Leverage national intellect and capabilities through cyber workforce training and rapid technological innovation. First, the monograph explores the evolution of cyberspace strategy through a series of government publications leading up to the DoD Strategy for Operating in Cyberspace. It is seen that, although each strategy has different emphases on ideas, some major themes recur. Second, each strategic initiative is elaborated and critiqued in terms of significance, novelty, and practicality. Third, the monograph critiques the DoD Strategy as a whole. Is it comprehensive and adequate to maintain U.S. superiority in cyberspace against a rapidly changing threat landscape? Shortcomings in the strategy are identified, and recommendations are made for improvement in future versions of the strategy. -
A Transatlantic Bargain for the 21st Century: The United States, Europe, and the Transatlantic Alliance
Ellen Hallams Dr.
In the 21st century, the transatlantic bargain that has framed the relationship between the United States and its NATO allies is under more scrutiny than ever before. In a changed geopolitical environment, one characterized by the complexity of modern military operations, the growing power of China, and a climate of economic austerity in the West, a consensus has emerged on both sides of the Atlantic as to the need for a revised bargain to accommodate the changing dynamics of global politics. Washington is becoming less and less willing to tolerate what it sees as fundamental gaps within the Alliance—in defense spending, capabilities, and military transformation—and is sending clear signals to its European allies, as well as NATO partners, that they must take on a greater share of Alliance burdens, accelerate efforts to generate capabilities and resources, and move away from a deeply-entrenched culture of dependency. European allies are learning they must approach transatlantic relations with a new maturity, and as efforts at multinational defense collaboration accelerate across Europe, there is evidence of a new approach to thinking about transatlantic relations. The transatlantic bargain was a Cold War construct suited to its time; what is required now is a transatlantic bargain that generates a new culture of transatlantic partnership, between the United States, NATO, and the European Union.
-
Closing the Candor Chasm: The Missing Element of Army Professionalism
Paul Paolozzi Colonel
View the Executive Summary
Candor stands as the keystone element in creating the foundation of trust in the Army, yet the topic is muted. Stewards of the Army Profession build trust through authentic communication—in education, training, and modeled in application. Candor was previously included in Army Doctrine, yet nearly no mention of it currently exists in professional military education and dialogue. Through personal experiences and review of literature, two examples—the demands placed on the Army Reserve Components and a review of the Army’s counseling and evaluation environment—serve as illustrations where candor requires revitalization. Candor must be reinforced to be valued or it remains peripheral, serving as a lesson that is equally damaging to individual character as is it institutionally to the Army. -
The Real "Long War": The Illicit Drug Trade and the Role of the Military
Geoffrey Till Professor
View the Executive Summary
The 21st century has seen the growth of a number of nontraditional threats to international stability on which, trade, and thus U.S. peace and security, depends, and for the moment at least a reduced likelihood of continental scale warfighting operations, and something of a de-emphasis on major involvement in counterinsurgency operations. These nontraditional threats are, however, very real and should command a higher priority than they have done in the past, even in a period of budgetary constraint. The military have cost-effective contributions to make in countering the manufacture and distribution of illicit drugs, and in many cases can do so without serious detriment to their main warfighting role. Successfully completing this mission, however, will require the military to rethink their integration with the nonmilitary aspects of a whole-of-government approach, and almost certainly, their institutional preference for speedy victories in short wars. -
AFRICOM at 5 Years: The Maturation of a New U.S. Combatant Command
David E. Brown Mr.
View the Executive Summary
The U.S. Africa Command (AFRICOM), newest of the six U.S. Department of Defense geographic combatant commands (CCMDs), was created in 2007 amid great controversy in both Africa and the United States over its location and mission. Over the last 5 years, AFRICOM has matured greatly, overcoming much of the initial resistance from African stakeholders through careful public messaging, and by addressing most of the U.S. interagency concerns about the Command’s size and proper role within the U.S. national security/foreign policy community. This Letort Paper describes the geostrategic, operational, and intellectual changes that explain why AFRICOM was created, and debunks three myths about AFRICOM: that it was created to “exploit” Africa's oil and gas riches, “blocks” China’s rise in Africa, and that France “opposes” AFRICOM. The author concludes by raising five issues that are important to AFRICOM’s future: 1) allocated forces to carry out short-term training engagements in Africa; 2) preference to emerging democracies in the selection of the Command’s partner-nations; 3) the desirability of regional approaches in Africa, including helping the African Union and its Regional Economic Communities to establish standby brigades; 4) the location of the Command’s headquarters, which should remain in Stuttgart, Germany, for operational efficiency; and, 5) the need to carry out a top-down “right-sizing” exercise at AFRICOM during a time of severe budget constraints and a real risk for the United States of “strategic insolvency.” -
Cartel Car Bombings in Mexico
John P. Sullivan Mr. and Robert J. Bunker Dr.
View the Executive Summary
Contemporary Mexican cartel use of car bombs began in mid-July 2010 and has since escalated. Given the proximity to the United States, some literally within miles of the border, the car bombings, with about 20 incidents identified over the last 2 1/2 years, should be of interest to local, state, and federal U.S. law enforcement, the U.S. Army, and other governmental institutions which are providing increasing support to Mexican federal agencies. An historical overview and analysis of cartel car bomb use in Mexico provides context, insights, and lessons learned stemming from the Medellin and Cali cartel car bombing campaigns. In order to generate insights into future cartel car bombings in Mexico, the identification of such potentials offers a glimpse into cartel “enemy intent,” a possible form of actionable strategic intelligence. For Mexico, steady and both slowly and quickly increasing car bomb use trajectories may exist. The prognosis for decreasing car bomb deployment appears unlikely. If cartel car bombs were to be deployed on U.S. soil or against U.S. personnel and facilities in Mexico, such as our consulates, we could expect that a pattern of indications and warnings (I&W) would be evident prior to such an attack(s). In that case, I&W would be drawn from precursor events such as grenade and improvised explosive device (IED) attacks (or attempted attacks) on our personnel and facilities and on evolving cartel car bomb deployment patterns in Mexico. The authors conclude with initial recommendations for U.S. Army and defense community support to the military and the federal, state, and local police agencies of the Mexican state, and the various U.S. federal, state, and local police agencies operating near the U.S.-Mexican border. The extent of support in intelligence, organization, training, and equipment is highlighted, as well as the extent that these forms of support should be implemented to counter cartel vehicle-borne IEDs and overall cartel threats. -
Development of the Baltic Armed Forces in Light of Multinational Deployments
James S. Corum Dr.
View the Executive Summary
Developing coalition security strategies within NATO has never been easy. However, it does help to have a thorough understanding of one’s allies and their concerns and perspectives. This monograph provides an in-depth view of how three Baltic nations (Estonia, Latvia, and Lithuania) view current and future security threats and likely problems. It also recommends some ways in which the United States might respond to these issues. -
The Causes of Instability in Nigeria and Implications for the United States
Clarence J. Bouchat (USAF, Ret.) Lieutenant Colonel
View the Executive Summary
An understanding the political economy of Nigeria is needed to reveal the root causes of its many ethnic, religious, economic, and political problems and to address them for the long term. The pressures now weighing on Nigeria could literally fracture the state along deep fault lines if rampant corruption and partisanship continues. As mutually important partners for both of our interests in Africa, the United States should assist in specific but indirect ways to help Nigerians overcome their political economic problems. Within such assistance, the role of the U.S. military is particularly delicate but needed through focused aid to specific programs and sharing of expertise, all best managed through employing units that are regionally aligned to Nigeria or West Africa. -
The Effectiveness of Drone Strikes in Counterinsurgency and Counterterrorism Campaigns
James Igoe Walsh Dr.
View the Executive Summary
The United States increasingly relies on unmanned aerial vehicles to target insurgent and terrorist groups around the world. This monograph analyzes the available research and evidence that assesses the political and military consequences of drone strikes. It is not clear if drone strikes have degraded their targets, or that they kill enough civilians to create sizable public backlashes against the United States. Drones are a politically and militarily attractive way to counter insurgents and terrorists, but, paradoxically, this may lead to their use in situations where they are less likely to be effective and where they are difficult to predict consequences. -
The Security Concerns of the Baltic States as NATO Allies
James S. Corum Dr.
View the Executive Summary
If the United States is likely to fight in a coalition with small allies in the future, then it is useful to understand the experience, capabilities, and perspectives of those allies. Since regaining independence in 1991, the countries of Latvia, Estonia, and Lithuania have been very active in supporting NATO and U.S. military operations abroad. It is notable that the three Baltic countries have also used the deployment of a significant part of their forces in the last decade as a major part of their program to carry out a major force transformation. -
A Framework for Restructuring the Military Retirement System
John Z. Smith Dr., Roy A. Wallace Mr., and David S. Lyle Colonel
View the Executive Summary
The current military retirement system has been integral to sustaining the All Volunteer Force (AVF). Mounting federal budget challenges, however, have raised concern that the program may become fiscally unsustainable. While several restructuring proposals have emerged, none have considered the implications of these changes to the broader issue of manning an AVF. Changes to the existing system could create military personnel shortfalls, adversely affect servicemember and retiree well-being, and reduce public confidence in the Armed Forces. With the right analytical framework in place, however, a more holistic system restructuring is possible, one that avoids these negative effects while significantly reducing costs. A comprehensive framework is provided, as well as a proposal that stands to benefit both servicemembers in terms of value and the military in terms of overall cost savings. -
Russian Interests in Sub-Saharan Africa
Keir Giles Mr.
View the Executive Summary
An apparent lack of interest by Russia in Sub-Saharan Africa over recent years masks persistent key strategic drivers for Moscow to re-establish lost influence in the region. A preoccupation with more immediate foreign policy concerns has temporarily interrupted a process of Russia reclaiming relationships that were well-developed in the Soviet period in order to secure access to mineral and energy resources which are crucial to Russia’s economic and industrial interests, as well as both existing and new markets for military arms contracts. Russian policy priorities in Africa provide both challenges and opportunities for the U.S. in fields such as nuclear nonproliferation, as well as energy security for the United States and its European allies. Russian development of key resources in southern Africa should be observed closely. Russian trade with the region is significantly underdeveloped, with the exception of the arms trade, which Russia can be expected to defend vigorously if its markets are challenged, including by the prospect of regime change or international sanctions. At the same time, Russia and the United States have a shared interest in restricting the freedom of movement of terrorist organizations in ungoverned or lightly governed spaces in Africa, which opens potential for cooperation between AFRICOM initiatives and Russian presence in the region. Russian diplomatic and economic activity in southern Africa should receive continuing attention from U.S. policymakers due to its direct relevance to a number of U.S. strategic concerns. -
The North Atlantic Treaty Organization and Libya: Reviewing Operation UNIFIED PROTECTOR
Florence Gaub Dr.
View the Executive Summary
On March 17, 2011, a month after the beginning of the Libyan revolution, with up to 2,000 civilians dead, the United Nations Security Council (UNSC) decided on backing a no-fly zone over Libya and authorized “all necessary measures” to protect civilians. While France, Great Britain, and the United States took immediate military action using air and missile strikes, considerations to hand over military actions to the North Atlantic Treaty Organization (NATO) emerged within days of the operation. On March 22, 2012, NATO agreed to enforce the arms embargo against Libya; 2 days later, it announced to take over all military aspects of the UNSC 1973. On March 31, 2012, Operation UNIFIED PROTECTOR (OUP) began. OUP turned out to be one of NATO’s shorter, and seemingly also less controversial, missions. Mandated by both the League of Arab States and the UN as the regime of Colonel Qaddafi was launching assaults on peacefully demonstrating citizens, its aim was to protect civilians from the air and sea. Described as a “war of choice” rather than a “war of necessity,” NATO achieved its goals more by accident than by design, according to some critics. The lessons which can be drawn from OUP are both military and political in nature. The overestimation of air power as a result of “no boots on the ground” might be a dangerous conclusion for future cases; the lack of cultural advice very likely prolonged the mission, while the shortcomings in strategic communication gave input to improve an area that is still new to NATO. The operation also highlighted a strategic dimension the Alliance was not ready to perceive—that the Mediterranean, and its Southern states, is likely to continue being a source of instability for NATO, particularly after the Arab Spring. In legal terms, the Alliance faced an important communication gap between its legal, and therefore military, mandate—the legal interpretations of UNSCR 1973 made clear that the operation did not seek to topple Colonel Gaddafi’s regime, let alone assassinate him. Its aim was solely the protection of civilians in a situation of internal conflict, and, therefore, it conformed to the norm of “Responsibility to Protect.” On the political level, heads of NATO member states made contradictory remarks calling for Gaddafi’s departure, thereby compromising the clarity of the mission. Last but not least, the aftermath of NATO’s Libya operation was not planned at all as the Libyan National Transitional Council firmly rejected any military personnel on the ground, even UN observers. As the regime’s security forces had virtually imploded, Libya’s security therefore fell into the hands of the multiple militias which continued to proliferate after the conflict had ended. -
Avoiding the Slippery Slope: Conducting Effective Interventions
Thomas R. Mockaitis Dr.
View the Executive Summary
This Letort Paper covers U.S. military interventions in civil conflicts since the end of the Cold War. It defines intervention as the use of military force to achieve a specific objective (i.e., deliver humanitarian aid, support revolutionaries or insurgents, protect a threatened population, etc.) and focuses on the phase of the intervention in which kinetic operations occurred. The analysis considers five conflicts in which the United States intervened: Somalia (1992-93), Haiti (1994), Bosnia (1995), Kosovo (1999), and Libya(2011). It also reviews two crises in which Washington might have intervened but chose not to: Rwanda (1994) and Syria (2011-12). The author examines each case using five broad analytical questions: 1. Could the intervention have achieved its objective at an acceptable cost in blood and treasure? 2. What policy considerations prompted the intervention? 3. How did the United States intervene 4. Was the intervention followed by a Phase 4 stability operation? and, 5. Did Washington have a viable exit strategy? From analysis of these cases, the author derives lessons that may guide policy makers in deciding when, where, and how to intervene in the future. -
Joint Strategic Planning System Insights: Chairmen Joint Chiefs of Staff 1990 to 2012
Richard M. Meinhart Dr.
View the Executive Summary
Military leaders at many levels have used strategic planning in various ways to position their organizations to respond to the demands of the current situation while simultaneously preparing to meet future challenges. This Paper will first describe the Chairman’s statutory responsibilities and strategic challenges, because this affects leaders and the focus of the strategic planning system. The Paper then briefly examines how the Joint Strategic Planning System (JSPS)changed in five major ways during the time period of 1990 to 2012 before describing in greater detail the key products and processes of the current system. The Paper then goes on to summarize the more significant ways each Chairman used this system during the past 2 decades to produce specific planning products, which is part of their formal leadership legacy. During this time the Chairman were Generals Powell (1989-93), Shalikashvili (1993-97), Shelton (1997-2001), Myers (2001-05), Pace (2005-07), and Admiral Mullen (2007-11). General Dempsey’s current strategic planning focus, since he became Chairman in October 2011, is also summarized. This leadership focus and concluding thoughts provide broad insights into how senior leaders have used the strategic planning system to respond to internal and external challenges. These leadership and management insights are related to the importance of strategic vision, planning system and process characteristics, decisionmaking styles, and organizational change. -
Nigerian Unity: In the Balance
Gerald McLoughlin Mr. and Clarence J. Bouchat (USAF, Ret.) Lieutenant Colonel
View the Executive Summary
Nigeria’s future as a unified state is in jeopardy. Those who make or execute U.S. policy will find it difficult to advance U.S. interests in Africa without an understanding of the pressures that tear and bind Nigeria. Despite this, the centrifugal forces that tear at the country and the centripetal forces that have kept it whole are not well understood and rarely examined. After establishing Nigeria’s importance to the United State as a cohesive and functioning state, this monograph examines the historic, religious, cultural, political, physical, demographic, and economic factors that will determine Nigeria’s fate. It identifies the specific fault lines along which Nigeria may divide. It concludes with practical policy recommendations for the United States to support Nigerians in their efforts to maintain a functioning and integrated state, and, by so doing, advance U.S. interests. -
The Future of the Arab Gulf Monarchies in the Age of Uncertainties
Mohammed El-Katiri Dr.
View the Executive Summary
Seismic cultural and political shifts are under way in the Arab Gulf monarchies. The political upheavals and transitions that have swept through the Arab world over the last 2 years have not toppled the Arab Gulf rulers, but did not leave them untouched, either. Rulers of Gulf Cooperation Council (GCC) states face heightened internal and external challenges and uncertainties. Pro-democracy protests and calls are extending from Bahrain to other oil-rich countries of the Arabian Peninsula. The expectations of GCC citizens, particularly the educated youth, are increasingly moving from socio-economic demands to political ones. They are now not only asking for jobs or wage increases, but also for more political participation and accountability. Chief among internal challenges is the resurgence in several GCC countries, particularly Bahrain and Saudi Arabia, of a decades-long sectarian rift between the Sunni regimes and their Shia subjects. The Gulf regimes’ already tense relations with Iran have worsened on the basis of alleged Iranian interference inflaming sectarian tensions in Bahrain and across the broader region. -
The Struggle for Yemen and the Challenge of Al-Qaeda in the Arabian Peninsula
W. Andrew Terrill Dr.
View the Executive Summary
In recent years, al-Qaeda in the Arabian Peninsula (AQAP) has been widely recognized as a more dangerous regional and international terrorist organization than the original al-Qaeda led by Osama bin Laden until his death in 2011. In 2010-11, AQAP was able to present a strong challenge to Yemen's government by capturing and retaining large areas in the southern part of the country. Yemen's new reform President defeated AQAP and recaptured areas under their control in 2012, but the terrorists remain an extremely dangerous force seeking to reassert themselves at this time of transition in Yemen. -
Asia-Pacific: A Strategic Assessment
David Lai Dr.
View the Executive Summary
Dr. David Lai provides a timely assessment of the geostrategic significance of Asia-Pacific. His monograph is also a thought-provoking analysis of the U.S. strategic shift toward the region and its implications. Dr. Lai judiciously offers the following key points. First, Asia-Pacific, which covers China, Northeast Asia, and Southeast Asia, is a region with complex currents. On the one hand, there is an unabated region-wide drive for economic development that has been pushing Asia-Pacific forward for decades. On the other, this region is troubled with, aside from many other conflicts, unsettled maritime disputes that have the potential to trigger wars between and among Asia-Pacific nations. Second, on top of these mixed currents, China and the United States compete intensely over a wide range of vital interests in this region. For better or for worse, the U.S.-China relationship is becoming a defining factor in the relations among the Asia-Pacific nations. Third, the U.S. strategic shift toward Asia-Pacific is, as President Obama puts it, not a choice but a necessity. Although conflicts elsewhere, especially the ones in the Middle East, continue to draw U.S. attention and consume U.S. foreign policy resources, the United States is turning its focus toward China and Asia-Pacific. Fourth, in the mid-2000s, the United States and China made an unprecedented strategic goodwill exchange and agreed to blaze a new path out of the tragedy that often attends great power transition. Fifth, at this time of U.S. strategic reorientation and military rebalancing toward Asia-Pacific, the most dangerous consideration is that Asia-Pacific nations having disputes with China can misread U.S. strategic intentions and overplay the “U.S. card” to pursue their territorial interests and challenge China. Finally, territorial dispute is becoming an urgent issue in the Asia-Pacific. -
Cyber Infrastructure Protection: Vol. II
Tarek N. Saadawi Dr., Louis H. Jordan COL, and Vincent Boudreau Dr.
View the Executive Summary
Increased reliance on the Internet and other networked systems raise the risks of cyber attacks that could harm our nation’s cyber infrastructure. The cyber infrastructure encompasses a number of sectors including: the nation’s mass transit and other transportation systems; banking and financial systems; factories; energy systems and the electric power grid; and telecommunications, which increasingly rely on a complex array of computer networks, including the public Internet. However, many of these systems and networks were not built and designed with security in mind. Therefore, our cyber infrastructure contains many holes, risks, and vulnerabilities that may enable an attacker to cause damage or disrupt cyber infrastructure operations. Threats to cyber infrastructure safety and security come from hackers, terrorists, criminal groups, and sophisticated organized crime groups; even nation-states and foreign intelligence services conduct cyber warfare. Cyber attackers can introduce new viruses, worms, and bots capable of defeating many of our efforts. Costs to the economy from these threats are huge and increasing. Government, business, and academia must therefore work together to understand the threat and develop various modes of fighting cyber attacks, and to establish and enhance a framework to assess the vulnerability of our cyber infrastructure and provide strategic policy directions for the protection of such an infrastructure. This book addresses such questions as: How serious is the cyber threat? What technical and policy-based approaches are best suited to securing telecommunications networks and information systems infrastructure security? What role will government and the private sector play in homeland defense against cyber attacks on critical civilian infrastructure, financial, and logistical systems? What legal impediments exist concerning efforts to defend the nation against cyber attacks, especially in preventive, preemptive, and retaliatory actions?
Printing is not supported at the primary Gallery Thumbnail page. Please first navigate to a specific Image before printing.