Shima D. Keene Dr.
Corruption increases the level of instability and the risk of conflict by undermining the legitimacy and credibility of state institutions. It can be both a cause and effect of poor leadership and governance. States emerging from conflict are particularly vulnerable to corruption, due to the lack of good governance infrastructures; but Western interventions can exacerbate the problem through the unintended consequences of good intentions. For peacekeeping and state-building interventions to be effective, careful consideration must be given as to the reason the problem occurs, and to its broader impact, as well as ways to manage it. This Letort Paper suggests ways in which these unintended consequences may be mitigated in future peace and stability operations.
Anna Simons Dr.
Leadership receives a tremendous amount of attention, but what about the day-to-day command challenges that confront O-4s, O-5s, and O-6s in today’s war zones? What has command entailed over the past decade and a half for special operations force (SOF) commanders who have deployed to Afghanistan (and Iraq) either to lead or to work under Special Operations Task Forces (SOTFs) or Combined Joint Special Operations Task Forces (CJSOTFs)? In both theaters, officers have had to contend with various competing hierarchies and significant churn. What then might the Army and military do to obviate or mitigate these and other problems? The contours of a potential solution are described and its benefits discussed.
Gregory Aftandilian Mr.
This monograph examines the possibility of Egypt leading the Arab world again, and how that effort, if successful, will present opportunities and challenges for U.S. policy. At the present time, Egypt is not in a position to do so given its many domestic problems stemming from its turbulent politics since 2011 and the challenges facing its economy, which is currently experiencing high unemployment, weak tourism revenues because of terrorist incidents, and high rates of inflation as it implements an International Monetary Fund (IMF) economic reform package. However, Egypt has faced similar problems in the past and has recovered from them, enabling it to pursue an Arab leadership role. Hence, the United States should be prepared to deal with Egypt’s longstanding leadership quest, which this monograph argues will generally be a positive development for the United States in the region, though there will be some issues where the United States and Egypt will not see eye-to-eye. Given the intense Sunni-Shia conflicts in the region that are fed in large part by the rivalry between Saudi Arabia and Iran, having Egypt (a moderate Sunni Muslim country not pushing a religious agenda) in a leadership role in the region will help to dampen this sectarian strife. Moreover, because of its large and competent military, Egypt can be a source of stability and reassurance when other Arab states, particularly the Gulf states such as Saudi Arabia, are feeling vulnerable because of outside threats. Furthermore, Egypt can play a moderating influence in the region by being a bulwark against the radical extremist ideologies of the Islamic State of Iraq and Syria (ISIS), al-Qaeda, and like-minded groups. The United States can help Egypt succeed by continuing military assistance, offering counterterrorism training of whole units, and resuming military exercises like Bright Star. This monograph also argues for a boost in U.S. economic assistance to past levels—given Egypt’s strategic importance—to help it cope with economic reform measures even under U.S. budgetary woes. Although the United States and Egypt will continue to differ on the nature of Egypt’s domestic politics, particularly with regard to human rights and dissent and recognizing that the United States has limited influence in this regard, Washington should use whatever leverage it has to persuade the Egyptian Government to be less repressive, because an easing of authoritarian policies and practices will help Egyptian stability in the long run.
Keir Giles Mr.
This Letort Paper analyzes the drivers of assertive military action by Russia, as exemplified by interventions in Ukraine and Syria. It identifies key turning points in Russia’s perception of external threat, and the roots of Russian responses to this threat making use of a capacity for military, political, and diplomatic leverage that has been greatly enhanced in the current decade. Color revolutions, the Arab Spring, and Western intervention in Libya are all highlighted as key influencers leading to a Russian assessment that the developments in Ukraine and Syria presented direct security challenges to Russia, which needed to be addressed through direct action. This Letort Paper concludes with a range of policy recommendations intended to mitigate the risk of confrontation with Russia through an imperfect understanding of Russian security perspectives.
Ian Tunnicliffe and Steve Tatham Dr.
The impact of social media on the media environment has been widely recognized; as has the ability of extremist and adversarial organizations to exploit social media to publicize their cause, spread their propaganda, and recruit vulnerable individuals. Supporting the growth of social media has been the phenomenal global increase in mobile telephone usage, and much of this increase is in areas where there are existing conflicts or conflicts are highly likely. These combined revolutions will increasingly have a direct impact on virtually all aspects of military operations in the 21st century. In doing so, social media will force significant changes to policy, doctrine, and force structures. This Letort Paper explores the implications of social media for the U.S. Army.
W. Andrew Terrill Dr.
The Islamic State of Iraq and al-Sham (ISIS) has embarked on a campaign to destroy or sell priceless world heritage relics throughout the area under its control. While images of the outrageous destruction of priceless artifacts have been seen throughout the world, the strategic and military implications of comprehensive antiquities looting and ISIS propaganda about antiquities are of vital importance and correspondingly are considered throughout this Letort Paper. In particular, ISIS funding from the illicit sales of antiquities (and high quality fakes) is a serious problem and may help ISIS remain functional even after other sources of revenue are increasingly disrupted or eliminated. Should ISIS experience additional defeats and further loss of territory in Iraq and Syria, an ongoing stream of revenue could fund a nucleus of the organization while it searches for opportunities to rebuild itself and prove its continued relevance through spectacular acts of terrorism. Antiquities, if hidden and trafficked later, along with reproductions marketed as original masterpieces, could give the organization the financial lifeline it needs to stay operational and relevant, even if it is forced to transform itself from a “caliphate” controlling territory to a more simplified type of terrorist organization operating out of portions of the areas it once ruled.
R. Evan Ellis Dr.
This monograph comparatively examines the content and country focus of high-level diplomacy for each of the two actors, as well as the volume and patterns of trade, the activities of Indian and Chinese companies in the region, and their relationship to their respective governments in eight sectors: (1) petroleum and mining; (2) agriculture; (3) construction; (4) manufacturing and retail; (5) banking and finance; (6) logistics and port operations; (7) technology such as telecommunications, space, and high technology; and, (8) military sales and activities. This monograph finds that Indian engagement with the region is significantly less than that of the People’s Republic of China (PRC), and concentrated on a more limited subset of countries and sectors. In the commercial and military sector, it finds that the efforts by the Indian government to support their companies in the region are generally more modest and less coordinated than those of the PRC. Nonetheless, despite such limitations, the nature of Indian companies and their engagement with the region create opportunities for significant advances in the future, in a manner that is relatively well received by Latin American governments and societies.
Elizabeth Wishnick Dr.
China has been elaborating its position on the Arctic at the same time as the United States has been refining its own Arctic strategy as Chairman of the Arctic Council through April 2017. This Letort Paper examines the geopolitical implications of China’s growing involvement in the Arctic for U.S. interests. First, the evolution of U.S. Arctic strategy is discussed, including its political and military components. Next, China’s interests and goals in the Arctic are addressed. A third section examines the Arctic in China’s relations with Canada, Russia, and the Nordic states. This Letort Paper then evaluates the consequences of China’s expanding Arctic presence for U.S. security interests and concludes with policy recommendations.
The Al-Qaeda Organization and the Islamic State Organization: History, Doctrine, Modus Operandi, and U.S. Policy to Degrade and Defeat Terrorism Conducted in the Name of Sunni Islam
Paul Kamolnick Dr.
The al-Qaeda Organization (AQO) and the Islamic State Organization (ISO) are transnational adversaries that conduct terrorism in the name of Sunni Islam. It is declared U.S. Government (USG) policy to degrade, defeat, and destroy them. The present book has been written to assist policymakers, military planners, strategists, and professional military educators whose mission demands a deep understanding of strategically-relevant differences between these two transnational terrorist entities. In it, one shall find a careful comparative analysis across three key strategically relevant dimensions: essential doctrine, beliefs, and worldview; strategic concept, including terrorist modus operandi; and specific implications and recommendations for current USG policy and strategy. Key questions that are addressed include: How is each terrorist entity related historically and doctrinally to the broader phenomenon of transnational Sunni “jihadism”? What is the exact nature of the ISO? How, if at all, does ISO differ in strategically relevant ways from AQO? What doctrinal differences essentially define these entities? How does each understand and operationalize strategy? What critical requirements and vulnerabilities characterize each entity? Finally, what implications, recommendations, and proposals are advanced that are of particular interest to USG strategists and professional military educators?
Keir Giles Mr.
The application of international law and legal principles in cyberspace is a topic that has caused confusion, doubt, and interminable discussions between lawyers since the earliest days of the internationalization of the Internet. The still unresolved debate over whether cyberspace constitutes a fundamentally new domain that requires fundamentally new laws to govern it reveals basic ideological divides. On the one hand, the Euro-Atlantic community led by the United States believes, in broad terms, that activities in cyberspace require no new legislation, and existing legal obligations are sufficient. On the other, a large number of other states led by Russia and China believe that new international legal instruments are essential in order to govern information security overall, including those expressed through the evolving domain of cyberspace. Russia in particular argues that the challenges presented by cyberspace are too urgent to wait for customary law to develop as it has done in other domains; instead, urgent action is needed. This Letort Paper will provide an overview of moves toward establishing norms and the rule of law in cyberspace, and the potential for establishing further international norms of behavior.
Deterring Cybertrespass and Securing Cyberspace: Lessons from United States Border Control Strategies
Mary Manjikian Dr.
Perhaps the best starting point for those looking to “borrow” a deterrent strategy for cyberspace from other fields is not the example of nuclear deterrence but instead the example of United States-Mexican border security. The nuclear deterrent analogy is not the best fit for understanding cyber-deterrence—due to the ways in which rewards and payoffs for would-be attackers in cyberspace are different from those in the nuclear analogy—among other factors. The emphasis here is not on deterrent effects provided by specific weapons but rather on the ways in which human actors understand deterrence and risk in making an attempt to violate a border, and the ways in which security architects can manipulate how would-be aggressors think about these border incursions. This Letort Paper thus borrows from the criminology literature rather than the military-security literature in laying out how individuals may be deterred from committing crimes in real space and in cyberspace through manipulating rewards and punishments. Lessons from attempts at deterring illegal immigration along America’s borders are then presented, with lessons derived from those situations, which are helpful in understanding how to deter incursions in cyberspace.
Thomas P. Galvin Dr.
Identity development is touted as an important leader development need, but it often gets short shrift in professional military education (PME) environments, including the Senior Service Colleges (SSC). The inculcation of professional values, resiliency, and critical and reflective thought are essential to properly operationalizing the skills and knowledge learned in an SSC, but they are highly subjective, difficult to measure, and therefore difficult to develop educational activities around. New policies for officer and civilian professional education include provisions for developing leaders, such as the recent inclusion of six Desired Leader Attributes (DLAs) in the Joint officer PME continuum, but it remains unclear how to operationalize those goals. This Letort Paper presents a way ahead using role identities and Bloom’s affective domain to identify developmental objectives to parallel the development of skills and knowledge in SSC programs and shows how this approach can be generalized across PME.
Phil Williams Dr. and Werner Selle Mr.
Urbanization is one of the most important mega-trends of the 21st century. Consequently, the possibility of U.S. military involvement in a megacity or sub-megacity is an eventuality that cannot be ignored. After elucidating the nature of urbanization and developing a typology in terms of smart, fragile, and feral cities, we give consideration to the kinds of contingencies that the U.S. military, especially the Army, needs to think about and prepare for. Understanding the city as a complex system or organism is critical and provides the basis for changes in intelligence, recruitment, training, equipment, operations, and tactics.
One of the key takeaways is the need to understand the urban environment and the need to work with (instead of against) the flows and rhythms of a city. Without such an approach, the results of military involvement in such a formidable environment would likely be disastrous; with it, the prospects for success would at least be enhanced.
Thomas R. Mockaitis Dr.
Counterinsurgency (COIN) continues to be a controversial subject among military leaders. Critics argue that the wars in Iraq and Afghanistan have made the U.S. military, particularly the Army, "COIN-centric." They maintain that equipping U.S. forces to combat insurgency has eroded their conventional war fighting capabilities. Those committed to preserving and even enhancing COIN capabilities, on the other hand, insist that doing so need not compromise the ability of the military to perform other tasks. They also point out that the likelihood of even a mid-level conventional war remains low while the probability of unconventional engagements is high. This monograph reviews the COIN debate, analyzes current force structure, and concludes that contrary to the more extreme positions taken by critics and proponents, the U.S. military has achieved a healthy balance between COIN and other capabilities.
Diane E. Chido Ms.
The U.S. military recognizes that it will be required to engage in dense urban areas in the near future, whether under combat, stabilization, or disaster response conditions. The military also recognizes that it is not prepared to effectively operate within such complex terrain and populations. Alternative governance structures, which can be ethnic- or religious-based civil society groups or even organized criminal networks, emerge to provide basic services when the state fails to govern effectively. Leaders of these groups maintain control through various means including violence, coercion, and service provision or through tribal, religious, or other cultural ties and structures.
Developing a flexible toolkit of currently available and vetted resources to understand the alternative governance structures existing or emerging in that environment would provide crucial foreknowledge, which will serve as a force multiplier for planning and operating in an urban environment, particularly one as dense as a megacity.
Henry D. Sokolski Mr.
Nuclear deterrence and nonproliferation no longer enjoy the broad support they once did during the Cold War. Academics and security experts now question the ability of either to cope or check nuclear rogue states or terrorists. On the one hand, America’s closest allies—e.g., Japan and South Korea—believe American nuclear security guarantees are critical to their survival. If the United States is unwilling to provide Tokyo or Seoul with the assurance they believe they need, would it then not make sense for them to acquire nuclear forces of their own? On the other hand, with more nuclear-armed states and an increased willingness to use them, how likely is it that nuclear deterrence will work?
This volume investigates these questions. In it, six experts offer a variety of perspectives to catalyze debate. The result is a rich debate that goes well beyond current scholarship to challenge the very basis of prevailing nonproliferation and security policies.
Mohammed El-Katiri Dr.
North Africa's security landscape has worsened in the aftermath of the political events of the Arab Spring. Libya's dire state of affairs has had significant repercussions not only on its internal security and stability, but also on that of its neighboring countries, particularly the ones with long and exposed land borders. The worsening of the security situation has led North African countries to cooperate on strengthening their military and security collaboration. However, while rapid progress has been made in establishing bilateral cooperation between Algeria and its neighbors, Tunisia and Libya, there has been a grave failure to launch a regional security initiative that is effectively capable of dealing with the range of cross-border and internal security threats that face all of these countries.
The failure to construct a regional-security structure in North Africa is due primarily to decades-long differences between Algeria and Morocco over a variety of pending issues, including the disputed Western Sahara territory. In addition, the fluid political and security situation in Libya has impeded engagement in any bilateral or regional security cooperation framework.
Florence Gaub Dr.
Arab military cooperation has been, over the past century, mostly a history of failures. Whether the Arab League’s Defence Pact or the Middle East Command, ideas for collective security in the region all failed to move beyond the state of declarations. Most of the time, Arab states were either at open war or in cold peace. Since the Arab Spring has toppled not only regimes but also brought insecurity, new momentum has come into regional security. From joint exercises to the announcement of first an Arab and more recently an Islamic military alliance, states begin to move further into cooperation. As this Letort Paper shows, several obstacles will have to be overcome before collective security in the Middle East and North Africa can become a reality.
Phil Williams Dr. and Dighton Fiddner Dr.
This volume has three parts: the first focuses on cyberspace itself; the second on some of the major forms of malevolence or threats that have become one of its defining characteristics; and the third on possible responses to these threats. One of the most significant features of cyberspace, however, is that it is becoming a risky place for the entire spectrum of users: nation-states, nongovernmental and transnational organizations, commercial enterprises, and individuals. Yet it is a space of opportunities—for benevolent, neutral, and malevolent actors. Moreover, the authors identify and assess the challenges and threats to security that can arise in cyberspace because of its unique nature. In the final section, the authors discuss a variety of responses, with some suggesting that the most favored options being pursued by the United States are poorly conceived and ill-suited to the tasks at hand.
Investigating the Benefits and Drawbacks of Realigning the National Guard Under the Department of Homeland Security
Sue McNeil Dr. and Ryan Burke Dr.
Part I of the 2014-2015 Army War College’s Key Strategic Issues List (KSIL)—Army Priorities for Strategic Analysis—asks: “Given the growing importance of homeland defense, what would be the benefits and drawbacks of realigning the [National] Guard under the department of Homeland Security to enhance domestic security and disaster response, while retaining utility for overseas missions in support of the Department of Defense?” (pg. 10). This monograph details our efforts to research and evaluate the perceived benefits and drawbacks of realigning the National Guard under the Department of Homeland Security (DHS). We begin with a brief review of the relevant literature shaping the current policy and doctrinal approach to military civil support (CS) operations, including a summary of laws and strategic guidance relevant to the discussion. We then note the important distinctions between homeland security (HS) and homeland defense (HD) and the military role in each context. The seam between HS and HD provides a conceptual basis for discussing the roles and responsibilities of the National Guard, the DHS, and the Department of Defense (DoD) within domestic security and disaster response operations. After evaluating the National Guard’s role in each of the above contexts, we briefly discuss the realignment of the United States Coast Guard (USCG) within the DHS as a proxy for comparison of a similar realignment of a military-style entity under the DHS. The study concludes by listing and discussing the potential benefits and drawbacks of a National Guard realignment under the DHS and then makes five short recommendations in summary of the research effort.
Douglas Stuart Dr.
Deciding when, where, and how to prioritize is the essence of strategy. U.S. President Barack Obama’s decision to designate the Indo-Asia-Pacific (IAP) as his top regional priority made good sense, in light of the ongoing shift in economic power from West to East and the rise of China as a potential global and regional peer competitor. The Obama Administration has attempted to use all available instruments of American power—diplomatic, information, military, and economic—to gain the support of regional friends and allies for its “pivot to Asia.” Rather than a “one size fits all” approach, Washington has attempted to adapt its recruitment efforts to the specific interests and concerns of each regional actor. The U.S. campaign has benefitted from the fact that most IAP governments recognize the value of an active American presence in the region at a time of growing Chinese assertiveness. If Obama, and his successor, can sustain the pivot, it can serve as the foundation for U.S. grand strategy in the 21st century.
Larry M. Wortzel Dr.
According to many analysts of China’s military, when an officer of the Chinese People’s Liberation Army (PLA) suggests new forms of operations, expanded domains of warfare, or new weapons systems, American security planners can dismiss these projections as merely “aspirational” thinking. This assessment of the PLA Academy of Military Science publication Long Distance Operations and other military publications of this genre propose that suggestions for forms of future warfare capture currents of thinking among mid-grade officers and also reflect how the senior political and military leaders in China want the PLA to evolve. Among the trends identified in this Letort Paper is the requirement for a capacity to more effectively attack a distant adversary, such as the United States, and to hold that adversary’s population at risk. This analysis also shows that a number of military analysts in China perceive that the populace is at risk from attacks by stronger, distant states. In the past 5 years, the PLA has exercised to develop force projection and expeditionary capabilities. As described in brief in this analysis, in the past 6 months, the PLA has changed its own force structure and posture in ways that will facilitate expeditionary operations.
R. Evan Ellis Dr.
Since his election in 2013, Honduran President Juan Orlando Hernandez has made significant changes in the strategy and institutions of the country in combating the interrelated scourges of organized crime and violent gangs, which have prejudiced Honduras as well as its neighbors. Principal among these are the creation of a new inter-agency structure, de la Fuerza de Seguridad Interinstitucional Nacional (the National Inter-Agency Security Force [FUSINA]), integrating the military, police, prosecutors, special judges, and other state resources to combat organized crime and delinquency in the country. More controversially, he has created a new police force within the military, the Policía Militar del Orden Público (Military Police of Public Order [PMOP]), which has been deployed both to provide security to the nation’s principal urban areas, Tegucigalpa, Comayagüela and San Pedro Sula, and to participate in operations against organized crime groups. In the fight against narcotrafficking, he has advanced a concept of three interdependent “shields”:
1). An air shield to better control Honduran airspace, enabled by January 2014 enabling the shoot-down of suspected drug flights and the acquisition of three radars from Israel to support intercepts by the Honduran air force;
2). A maritime shield, with new naval bases on the country’s eastern coast, and new shallow-water and riverine assets for intercepting smugglers; and,
3). A land shield, including enhanced control of the border with Guatemala through the Task Force “Maya Chorti.”
Beyond FUSINA, the Hernandez administration has also sought to reform the nation’s national police, albeit with slow progress. It is also reforming the penitentiary system, dominated by the criminal gangs MS-13 and B-18.
The new security policies of the Hernandez administration against transnational organized crime and the gang threat, set forth in its Inter-Agency Security Plan and “OPERATION MORAZÁN,” have produced notable successes. With U.S. assistance, FUSINA and the Honduran government dismantled the leadership of the nation’s two principal family-based drug smuggling organizations, the Cachiros and the Los Valles, and significantly reduced the use of the national territory as a drug transit zone, particularly narco flights. Murders in the country have fallen from 86.5 per 100,000 in 2011, to 64 per 100,000 in 2014.
This monograph focuses on the evolution of the transnational organized crime and gang challenges in Honduras, the strategy and structures of the Hernandez administration in combating them, associated challenges, and provides recommendations for the U.S. military and policymakers to support the country in such efforts.
Yogesh Joshi Mr., Frank O'Donnell Dr., and Harsh V. Pant Dr.
Since India declared itself a nuclear weapon state in May 1998, its nuclear capabilities have grown significantly. India is now on the verge of acquiring a triad of nuclear delivery systems. Its increasing nuclear profile has also stirred a debate on its stated nuclear doctrine involving principles of no-first use and massive retaliation. This Letort Paper examines changes in India’s nuclear trajectory, the accompanying doctrinal debate, and its nonproliferation policies in the backdrop of the current regional and international context. The implications of this for the United States and its policy in the Asia-Pacific region are also discussed.
Jeffrey L. Caton Mr.
The development of cyberspace defense capabilities for the North Atlantic Treaty Organization (NATO) has been making steady progress since its formal introduction at the North Atlantic Council Prague Summit in 2002. Bolstered by numerous cyber attacks, such as those in Estonia (2007), Alliance priorities were formalized in subsequent NATO cyber defense policies adopted in 2008, 2011, and 2014.
This monograph examines the past and current state of cyberspace defense efforts in NATO to assess the appropriateness and sufficiency to address anticipated threats to member countries, including the United States. The analysis focuses on the recent history of cyberspace defense efforts in NATO and how changes in strategy and policy of NATO writ large embrace the emerging nature of cyberspace for military forces as well as other elements of power. It first examines the recent evolution of strategic foundations of NATO cyber activities, policies, and governance as they evolved over the past 13 years. Next, it outlines the major NATO cyber defense mission areas, which include NATO network protection, shared situational awareness in cyberspace, critical infrastructure protection, counter-terrorism, support to member country cyber capability development, and response to crises related to cyberspace. Finally, it discusses several key issues for the new Enhanced Cyber Defence Policy that affirms the role that NATO cyber defense contributes to the mission of collective defense and embraces the notion that a cyber attack may lead to the invocation of Article 5 actions for the Alliance.
This monograph concludes with a summary of the main findings from the discussion of NATO cyberspace capabilities and a brief examination of the implications for Department of Defense and Army forces in Europe. Topics include the roles and evolution of doctrine, deterrence, training, and exercise programs, cooperation with industry, and legal standards.
Printing is not supported at the primary Gallery Thumbnail page. Please first navigate to a specific Image before printing.