-
A Typology of Arguments about Drone Ethics
Mary Manjikian Dr.
Many different actors oppose the use of unmanned autonomous weapons (UAV’s) from adversary states, to international governmental organizations to policymakers and academics. However, the basis for their opposition varies, as do the assumptions behind their arguments. This Letort Paper lays out distinctions between arguments about technology, arguments about policy, and arguments about strategy.
-
Toward a NATO of the Gulf? The Challenges of Collective Defense Within the GCC
Jean-Loup Samaan Dr.
Although collective security in the Gulf is the topic of numerous policy publications, most of the available literature focuses on the political environment without considering the operational requirements of this scenario. This monograph offers an evaluation of Gulf defense cooperation programs in order to stir the discussion on the future of the Gulf Cooperation Council (GCC) as the “NATO of the Gulf.”
-
Strategic Landscape, 2050: Preparing the U.S. Military for New Era Dynamics
Roman Muzalevsky Mr.
A series of megatrends will present a major challenge to the United States in the coming decades, exposing it to crises and opportunities on the battlefield and in the market. The U.S. military should stand ready to harness these dynamics to retain its edge in an operational environment marked by increased complexity, speed, and intensity of global developments.
-
The Clash of the Trinities: A New Theoretical Analysis of the General Nature of War
Daniel Maurer Major
This monograph reimagines war’s fundamental nature, extending Clausewitz’s theory of its political origin and “Trinitarian” elements in a way that embraces alternative, sociological explanations like that of John Keegan. Ultimately, it proposes a new way to visualize the complexities of war’s intrinsic elements, operating at any scale, and expresses war with a completely new and universal definition.
-
Building Partner Capacity in Africa: Keys to Success
Frank L. Jones Dr.
The fiscal year (FY) 2017 National Defense Authorization Act, which includes a title to reform the Department of Defense (DoD) security cooperation, has far-reaching implications for U.S. defense interests in Africa. As the Chairman of the House Armed Services Committee notes, “the Department of Defense continues to place greater emphasis on security cooperation, to include building partner capacity.” The term “building partner capacity” (BPC) widens the focus of security cooperation as a whole-of-government effort, and makes clear congressional interest in treating security cooperation as a defense institution building endeavor. In response to the law, this book examines and recommends specific steps the DoD can take to build partner capacity successfully in Africa and meet congressional direction.
-
Rotational Deployments vs. Forward Stationing: How Can the Army Achieve Assurance and Deterrence Efficiently and Effectively?
John R. Deni Dr.
The Army’s force posture is out of balance, with a greater percentage of troops stationed in the United States than at any time since the late 1940s. This has forced an over-reliance on lengthy, continuous rotational deployments to achieve deterrence and assurance in theaters such as northeast Asia and Europe. This finding is based on a 9-month study assessing the costs and benefits of rotational deployments and forward stationing. The analysis reveals that in terms of fiscal cost, training readiness, morale and family readiness, and diplomatic factors, the United States could likely achieve deterrence and assurance objectives more efficiently and more effectively with increased forward stationing. The recommendations address what kinds of units would be best suited for forward stationing, where forward stationing would be most efficacious, and how the Department of Defense should go about rebalancing Army force posture.
-
Rotational Deployments vs. Forward Stationing: How Can the Army Achieve Assurance and Deterrence Efficiently and Effectively?
John R. Deni
The Department of Defense can achieve deterrence and assurance objectives more effectively and efficiently through a rebalancing of its force posture. The Army should reverse the trend of the last 2 decades and forward station additional heavy units in Europe and on the Korean Peninsula, while ending lengthy, heel-to-toe rotational noncombat deployments.
-
What Should the U.S. Army Learn From History? Recovery From a Strategy Deficit
Colin S. Gray Dr.
Does history repeat itself? This monograph clearly answers “no,” firmly. However, it does not argue that an absence of repetition in the sense of analogy means that history can have no utility for the soldier today. This monograph argues for a “historical parallelism,” in place of shaky or false analogy. The past, even the distant and ancient past, provides evidence of the potency of lasting virtues of good conduct. This monograph concludes by offering four recommendations: 1) Behave prudently. 2) Remember the concept of the great stream of time. 3) Do not forget that war nearly always is a gamble. 4) War should only be waged with strategic sense.
-
Ends, Means, Ideology, and Pride: Why the Axis Lost and What We Can Learn from Its Defeat
Jeffrey Record Dr.
The author examines the Axis defeat in World War II and concludes that the two main causes were resource inferiority (after 1941) and strategic incompetence—i.e., pursuit of imperial ambitions beyond the reach of its actual power. Until 1941 Axis military fortunes thrived, but the addition in that year of the Soviet Union and the United States to the list of Axis enemies condemned the Axis to ultimate strategic defeat. Germany, Italy, and Japan all attempted to bite off more than they could chew and subsequently choked to death.
-
U.S. Landpower in the South China Sea
Clarence J. Bouchat (USAF, Ret.) Lieutenant Colonel
U.S. landpower is an essential, but often overlooked, element of national power in semi-enclosed maritime environments like the South China Sea. This monograph gives U.S. policymakers a better understanding of the role of the U.S. Army, Marine Corps, and Special Operations Forces (SOF) in the region through potential combat operations employing wide area defense and maneuver; deterrence through forward presence and peacetime operations; and security engagement with landpower-dominant allies, partners, and competitors in the region. Landpower’s capabilities are also essential for direct support of the air and sea services and other government organization’s success when operating in this theater in direct support of U.S. national interests.
-
At Our Own Peril: DoD Risk Assessment in a Post-Primacy World
Nathan P. Freier Mr., Christopher M. Bado Colonel (Ret.), Christopher J. Bolan Dr., and Robert S. Hume Colonel (Ret.)
The U.S. Department of Defense (DoD) faces persistent fundamental change in its strategic and operating environments. This report suggests this reality is the product of the United States entering or being in the midst of a new, more competitive, post-U.S. primacy environment. Post-primacy conditions promise far-reaching impacts on U.S. national security and defense strategy. Consequently, there is an urgent requirement for DoD to examine and adapt how it develops strategy and describes, identifies, assesses, and communicates corporate-level risk. This report takes on the latter risk challenge. It argues for a new post-primacy risk concept and its four governing principles of diversity, dynamism, persistent dialogue, and adaptation. The authors suggest that this approach is critical to maintaining U.S. military advantage into the future. Absent change in current risk convention, the report suggests DoD exposes current and future military performance to potential failure or gross under-performance.
-
Transforming the Force: The 11th Air Assault Division (Test) from 1963 to 1965
Thomas C. Graves Brigadier General
This monograph will answer the question: Can the U.S. Army apply to the current “prototype brigade” the lessons that were learned during the development and experimentation of the 11th Air Assault Division (Test)? Having established that the criteria of DTLOMS is a valuable tool for evaluating change in military systems, the next step is to apply those criteria to evaluate the changes that occurred in the formation of the 11th Air Assault Division (Test) from 1963 to 1965. In order to accomplish this, a study of the separate elements of DTLOMS will be conducted in order to determine how the 11th Air Assault Division reorganized itself and conducted operations during that period. The benchmark for studying the elements of DTLOMS will be the use of air mobility during the Ia Drang campaign of November 1965. Specifically, this monograph will attempt to answer the following six questions: 1. How did the division develop doctrine to support the transition to airmobile warfare? 2. How did the division determine the proper organization to facilitate warfighting with the airmobile division? 3. How did the division train leaders to support the new doctrine and organization? 4. How did the division conduct field training to certify its soldiers and units in the new tactics? 5. Did building a new force require any specific soldier skills; and if so, how were those skills cultivated? 6. How did the division adopt and recommend changes to material and equipment to support the new methods of fighting? Each of these questions addresses one aspect of the DTLOMS and will be used to measure change in the 11th Air Assault (Test) Division from the beginning in 1963 to the redesignation to the 1st Cavalry Division in 1965. Finally, this study will synthesize these changes and determine which lessons learned can be applied to ongoing experimentation in the U.S. Army of the 21st century.
-
Cyber Infrastructure Protection: Vol. III
Tarek N. Saadawi Dr. and John D. Colwell LTC
Despite leaps in technological advancements made in computing system hardware and software areas, we still hear about massive cyberattacks that result in enormous data losses. Cyberattacks in 2015 included: sophisticated attacks that targeted Ashley Madison, the U.S. Office of Personnel Management (OPM), the White House, and Anthem; and in 2014, cyberattacks were directed at Sony Pictures Entertainment, Home Depot, J.P. Morgan Chase, a German steel factory, a South Korean nuclear plant, eBay, and others. These attacks and many others highlight the continued vulnerability of various cyber infrastructures and the critical need for strong cyber infrastructure protection (CIP). This book addresses critical issues in cybersecurity. Topics discussed include: a cooperative international deterrence capability as an essential tool in cybersecurity; an estimation of the costs of cybercrime; the impact of prosecuting spammers on fraud and malware contained in email spam; cybersecurity and privacy in smart cities; smart cities demand smart security; and, a smart grid vulnerability assessment using national testbed networks.
-
Promoting U.S.-Indian Defense Cooperation: Opportunities and Obstacles
Richard Weitz Dr.
The U.S.-Indian security relationship has markedly improved since the Cold War with increased cooperation in a range of areas. The two countries have established stronger military, economic, and political ties based on mutual interests in combating terrorism, promoting democracy, preventing weapons of mass destruction (WMD) proliferation, and addressing China’s rise. Their bilateral defense engagements now include a range of dialogues, exercises, educational exchanges, and joint training opportunities. The partnership benefits both countries, enabling them to realize their core security goals. Yet, U.S. and Indian national security leaders must take new steps to ensure that the relationship realizes its potential.
-
Corruption, Legitimacy, and Stability: Implications for the U.S. Army
Shima D. Keene Dr.
Corruption increases the level of instability and the risk of conflict by undermining the legitimacy and credibility of state institutions. It can be both a cause and effect of poor leadership and governance. States emerging from conflict are particularly vulnerable to corruption, due to the lack of good governance infrastructures; but Western interventions can exacerbate the problem through the unintended consequences of good intentions. For peacekeeping and state-building interventions to be effective, careful consideration must be given as to the reason the problem occurs, and to its broader impact, as well as ways to manage it. This Letort Paper suggests ways in which these unintended consequences may be mitigated in future peace and stability operations.
-
21st-Century Challenges of Command: A View from the Field
Anna Simons Dr.
Leadership receives a tremendous amount of attention, but what about the day-to-day command challenges that confront O-4s, O-5s, and O-6s in today’s war zones? What has command entailed over the past decade and a half for special operations force (SOF) commanders who have deployed to Afghanistan (and Iraq) either to lead or to work under Special Operations Task Forces (SOTFs) or Combined Joint Special Operations Task Forces (CJSOTFs)? In both theaters, officers have had to contend with various competing hierarchies and significant churn. What then might the Army and military do to obviate or mitigate these and other problems? The contours of a potential solution are described and its benefits discussed.
-
Can Egypt Lead the Arab World Again? Assessing Opportunities and Challenges for U.S. Policy
Gregory Aftandilian Mr.
This monograph examines the possibility of Egypt leading the Arab world again, and how that effort, if successful, will present opportunities and challenges for U.S. policy. At the present time, Egypt is not in a position to do so given its many domestic problems stemming from its turbulent politics since 2011 and the challenges facing its economy, which is currently experiencing high unemployment, weak tourism revenues because of terrorist incidents, and high rates of inflation as it implements an International Monetary Fund (IMF) economic reform package. However, Egypt has faced similar problems in the past and has recovered from them, enabling it to pursue an Arab leadership role. Hence, the United States should be prepared to deal with Egypt’s longstanding leadership quest, which this monograph argues will generally be a positive development for the United States in the region, though there will be some issues where the United States and Egypt will not see eye-to-eye. Given the intense Sunni-Shia conflicts in the region that are fed in large part by the rivalry between Saudi Arabia and Iran, having Egypt (a moderate Sunni Muslim country not pushing a religious agenda) in a leadership role in the region will help to dampen this sectarian strife. Moreover, because of its large and competent military, Egypt can be a source of stability and reassurance when other Arab states, particularly the Gulf states such as Saudi Arabia, are feeling vulnerable because of outside threats. Furthermore, Egypt can play a moderating influence in the region by being a bulwark against the radical extremist ideologies of the Islamic State of Iraq and Syria (ISIS), al-Qaeda, and like-minded groups. The United States can help Egypt succeed by continuing military assistance, offering counterterrorism training of whole units, and resuming military exercises like Bright Star. This monograph also argues for a boost in U.S. economic assistance to past levels—given Egypt’s strategic importance—to help it cope with economic reform measures even under U.S. budgetary woes. Although the United States and Egypt will continue to differ on the nature of Egypt’s domestic politics, particularly with regard to human rights and dissent and recognizing that the United States has limited influence in this regard, Washington should use whatever leverage it has to persuade the Egyptian Government to be less repressive, because an easing of authoritarian policies and practices will help Egyptian stability in the long run.
-
The Turning Point for Russian Foreign Policy
Keir Giles Mr.
This Letort Paper analyzes the drivers of assertive military action by Russia, as exemplified by interventions in Ukraine and Syria. It identifies key turning points in Russia’s perception of external threat, and the roots of Russian responses to this threat making use of a capacity for military, political, and diplomatic leverage that has been greatly enhanced in the current decade. Color revolutions, the Arab Spring, and Western intervention in Libya are all highlighted as key influencers leading to a Russian assessment that the developments in Ukraine and Syria presented direct security challenges to Russia, which needed to be addressed through direct action. This Letort Paper concludes with a range of policy recommendations intended to mitigate the risk of confrontation with Russia through an imperfect understanding of Russian security perspectives.
-
Social Media—The Vital Ground: Can We Hold It?
Ian Tunnicliffe and Steve Tatham Dr.
The impact of social media on the media environment has been widely recognized; as has the ability of extremist and adversarial organizations to exploit social media to publicize their cause, spread their propaganda, and recruit vulnerable individuals. Supporting the growth of social media has been the phenomenal global increase in mobile telephone usage, and much of this increase is in areas where there are existing conflicts or conflicts are highly likely. These combined revolutions will increasingly have a direct impact on virtually all aspects of military operations in the 21st century. In doing so, social media will force significant changes to policy, doctrine, and force structures. This Letort Paper explores the implications of social media for the U.S. Army.
-
Antiquities Destruction and Illicit Sales as Sources of ISIS Funding and Propaganda
W. Andrew Terrill Dr.
The Islamic State of Iraq and al-Sham (ISIS) has embarked on a campaign to destroy or sell priceless world heritage relics throughout the area under its control. While images of the outrageous destruction of priceless artifacts have been seen throughout the world, the strategic and military implications of comprehensive antiquities looting and ISIS propaganda about antiquities are of vital importance and correspondingly are considered throughout this Letort Paper. In particular, ISIS funding from the illicit sales of antiquities (and high quality fakes) is a serious problem and may help ISIS remain functional even after other sources of revenue are increasingly disrupted or eliminated. Should ISIS experience additional defeats and further loss of territory in Iraq and Syria, an ongoing stream of revenue could fund a nucleus of the organization while it searches for opportunities to rebuild itself and prove its continued relevance through spectacular acts of terrorism. Antiquities, if hidden and trafficked later, along with reproductions marketed as original masterpieces, could give the organization the financial lifeline it needs to stay operational and relevant, even if it is forced to transform itself from a “caliphate” controlling territory to a more simplified type of terrorist organization operating out of portions of the areas it once ruled.
-
Indian and Chinese Engagement in Latin America and the Caribbean: A Comparative Assessment
R. Evan Ellis Dr.
This monograph comparatively examines the content and country focus of high-level diplomacy for each of the two actors, as well as the volume and patterns of trade, the activities of Indian and Chinese companies in the region, and their relationship to their respective governments in eight sectors: (1) petroleum and mining; (2) agriculture; (3) construction; (4) manufacturing and retail; (5) banking and finance; (6) logistics and port operations; (7) technology such as telecommunications, space, and high technology; and, (8) military sales and activities. This monograph finds that Indian engagement with the region is significantly less than that of the People’s Republic of China (PRC), and concentrated on a more limited subset of countries and sectors. In the commercial and military sector, it finds that the efforts by the Indian government to support their companies in the region are generally more modest and less coordinated than those of the PRC. Nonetheless, despite such limitations, the nature of Indian companies and their engagement with the region create opportunities for significant advances in the future, in a manner that is relatively well received by Latin American governments and societies.
-
China's Interests and Goals in the Arctic: Implications for the United States
Elizabeth Wishnick Dr.
China has been elaborating its position on the Arctic at the same time as the United States has been refining its own Arctic strategy as Chairman of the Arctic Council through April 2017. This Letort Paper examines the geopolitical implications of China’s growing involvement in the Arctic for U.S. interests. First, the evolution of U.S. Arctic strategy is discussed, including its political and military components. Next, China’s interests and goals in the Arctic are addressed. A third section examines the Arctic in China’s relations with Canada, Russia, and the Nordic states. This Letort Paper then evaluates the consequences of China’s expanding Arctic presence for U.S. security interests and concludes with policy recommendations.
-
The Al-Qaeda Organization and the Islamic State Organization: History, Doctrine, Modus Operandi, and U.S. Policy to Degrade and Defeat Terrorism Conducted in the Name of Sunni Islam
Paul Kamolnick Dr.
The al-Qaeda Organization (AQO) and the Islamic State Organization (ISO) are transnational adversaries that conduct terrorism in the name of Sunni Islam. It is declared U.S. Government (USG) policy to degrade, defeat, and destroy them. The present book has been written to assist policymakers, military planners, strategists, and professional military educators whose mission demands a deep understanding of strategically-relevant differences between these two transnational terrorist entities. In it, one shall find a careful comparative analysis across three key strategically relevant dimensions: essential doctrine, beliefs, and worldview; strategic concept, including terrorist modus operandi; and specific implications and recommendations for current USG policy and strategy. Key questions that are addressed include: How is each terrorist entity related historically and doctrinally to the broader phenomenon of transnational Sunni “jihadism”? What is the exact nature of the ISO? How, if at all, does ISO differ in strategically relevant ways from AQO? What doctrinal differences essentially define these entities? How does each understand and operationalize strategy? What critical requirements and vulnerabilities characterize each entity? Finally, what implications, recommendations, and proposals are advanced that are of particular interest to USG strategists and professional military educators?
-
Prospects for the Rule of Law in Cyberspace
Keir Giles Mr.
The application of international law and legal principles in cyberspace is a topic that has caused confusion, doubt, and interminable discussions between lawyers since the earliest days of the internationalization of the Internet. The still unresolved debate over whether cyberspace constitutes a fundamentally new domain that requires fundamentally new laws to govern it reveals basic ideological divides. On the one hand, the Euro-Atlantic community led by the United States believes, in broad terms, that activities in cyberspace require no new legislation, and existing legal obligations are sufficient. On the other, a large number of other states led by Russia and China believe that new international legal instruments are essential in order to govern information security overall, including those expressed through the evolving domain of cyberspace. Russia in particular argues that the challenges presented by cyberspace are too urgent to wait for customary law to develop as it has done in other domains; instead, urgent action is needed. This Letort Paper will provide an overview of moves toward establishing norms and the rule of law in cyberspace, and the potential for establishing further international norms of behavior.
-
Deterring Cybertrespass and Securing Cyberspace: Lessons from United States Border Control Strategies
Mary Manjikian Dr.
Perhaps the best starting point for those looking to “borrow” a deterrent strategy for cyberspace from other fields is not the example of nuclear deterrence but instead the example of United States-Mexican border security. The nuclear deterrent analogy is not the best fit for understanding cyber-deterrence—due to the ways in which rewards and payoffs for would-be attackers in cyberspace are different from those in the nuclear analogy—among other factors. The emphasis here is not on deterrent effects provided by specific weapons but rather on the ways in which human actors understand deterrence and risk in making an attempt to violate a border, and the ways in which security architects can manipulate how would-be aggressors think about these border incursions. This Letort Paper thus borrows from the criminology literature rather than the military-security literature in laying out how individuals may be deterred from committing crimes in real space and in cyberspace through manipulating rewards and punishments. Lessons from attempts at deterring illegal immigration along America’s borders are then presented, with lessons derived from those situations, which are helpful in understanding how to deter incursions in cyberspace.
Printing is not supported at the primary Gallery Thumbnail page. Please first navigate to a specific Image before printing.