Search

You searched for: Political Geography United States Remove constraint Political Geography: United States Topic Security Remove constraint Topic: Security
Number of results to display per page

Search Results

  • Author: Susan Ariel Aaronson
  • Publication Date: 04-2020
  • Content Type: Working Paper
  • Institution: Centre for International Governance Innovation
  • Abstract: From posting photos and videos to tracking physical activity, apps can do almost anything, but while they may seem like harmless fun, they may also pose a threat to personal data and national security. This paper compares the different responses of the United States, Canada and Germany to data risks posed by popular apps such as FaceApp, Facebook, Strava, TikTok and ToTok. These apps and many others store troves of personal data that can be hacked and misused, putting users (and the countries in which they live) at risk.
  • Topic: Security, Digital Economy, Social Media, Data
  • Political Geography: United States, Europe, Canada, Germany, North America
  • Author: Mieke Eoyang
  • Publication Date: 05-2020
  • Content Type: Working Paper
  • Institution: Third Way
  • Abstract: In 2020, candidates and elected officials will face questions on national security and foreign policy issues. In this memo, we provide short talking points on these issues that acknowledge the concerns of Americans, critique current approaches and policies, and present a vision for the future: 1. Global Health Security, 2. China & COVID-19, 3. China Trade War, 4. Russia, 5. Terrorism, 6. Domestic Extremism, 7. Iran, 8. Election Security, 9. Saudi Arabia & Yemen, 10. Syria, 11. Alliances, 12. North Korea, 13. Cyberthreats, 14. Venezuela, 15. Afghanistan, 16. Forever War, 17. Border Security, 18. Defense Spending, 19. Impeachment, 20. Climate Change, 21. Corruption
  • Topic: Security, Defense Policy, Military Strategy, Elections
  • Political Geography: United States, North America, Global Focus
  • Author: Helena Legarda
  • Publication Date: 02-2020
  • Content Type: Working Paper
  • Institution: International Institute for Strategic Studies
  • Abstract: China hits back after NATO calls it a security challenge, dormant Chinese hacking group resumes attacks, and more.
  • Topic: Security, Defense Policy, NATO, Diplomacy
  • Political Geography: United States, China, Europe, North Atlantic, Beijing, Asia, Vietnam, Sri Lanka
  • Author: Jeannette Greven
  • Publication Date: 09-2019
  • Content Type: Journal Article
  • Journal: Journal of Palestine Studies
  • Institution: Institute for Palestine Studies
  • Abstract: The U.S. Security Coordinator (USSC) mission in Jerusalem was created in 2005 to help implement security sector reform within the Palestinian Authority (PA). With a single-minded focus on “counterterrorism,” Washington considered the USSC an ancillary mechanism to support U.S. diplomatic and political efforts to resolve the Israeli-Palestinian conflict. Despite upending long-standing U.S. policy and cutting all other forms of aid to the Palestinians, the Trump administration has maintained the USSC in the run-up to the “Deal of the Century.” This article draws on original interviews with security personnel responsible for enacting USSC interventions. It uses their insights to highlight how the mission tethered Israeli political aims to its remit, and the distorting ramifications that have ensued for Palestine and the Palestinians. In uncovering the full parameters of Washington’s securitization policy, this history also points to the ways in which the PA has consequently been woven into the U.S.-led “global War on Terror.”
  • Topic: Security, Sovereignty, International Security, Military Affairs, Negotiation, Settler Colonialism
  • Political Geography: United States, Israel, Palestine, Jerusalem
  • Author: Seth Anziska
  • Publication Date: 09-2019
  • Content Type: Journal Article
  • Journal: Journal of Palestine Studies
  • Institution: Institute for Palestine Studies
  • Abstract: A 2019 investigation by the Israeli NGO Akevot and Haaretz newspaper has uncovered official suppression of crucial documents about the Nakba in Israeli archives. The Journal of Palestine Studies is publishing print excerpts and a full online version of the buried “migration report,” which details Israel’s depopulation of Palestinian villages in the first six months of the 1948 war, a document that clearly undermines official Israeli state narratives about the course of events. In methodical fashion, this report provides contemporaneous documentation of Israeli culpability in the expulsion of Palestinians from their homes and the systematic depopulation of so-called Arab villages in the first six months of the war. Alongside a discussion of key revelations in the newly available document, this introduction situates the broader pattern of erasure within historiographical debates over 1948 and questions of archival access. It examines how accounts of Israel’s birth and Palestinian statelessness have been crafted in relation to the underlying question: who has permission to narrate the past?
  • Topic: Security, Migration, Population, Ethnic Cleansing, Settler Colonialism, State Building
  • Political Geography: United States, Israel, Palestine
  • Author: Munir Fakher Eldin
  • Publication Date: 09-2019
  • Content Type: Journal Article
  • Journal: Journal of Palestine Studies
  • Institution: Institute for Palestine Studies
  • Abstract: In 1967, Israel occupied the western section of Syria’s Golan Heights, expelling some 130,000 of its inhabitants and leaving a few thousand people scattered across five villages. Severed from Syria, this residual and mostly Druze community, known as the Jawlanis, has been subjected to systematic policies of ethno-religious identity reformulation and bureaucratic and economic control by the Israeli regime for half a century. This essay offers an account of the transformation of authority, class, and the politics of representation among what is now the near 25,000-strong Jawlani community, detailing the impact of Israeli occupation both politically and economically. During an initial decade and a half of direct military rule, Israel secured the community’s political docility by restoring traditional leaders to power; but following full-on annexation in 1981, new forces emerged from the popular resistance movement that developed in response. Those forces continue to compete for social influence and representation today.
  • Topic: Security, Defense Policy, National Security, Population, Occupation, Ethnic Cleansing, Settler Colonialism
  • Political Geography: United States, Israel, Palestine
  • Author: Elizabeth N. Saunders
  • Publication Date: 10-2019
  • Content Type: Journal Article
  • Journal: International Security
  • Institution: Belfer Center for Science and International Affairs, Harvard University
  • Abstract: When and how do domestic politics influence a state's nuclear choices? Recent scholarship on nuclear security develops many domestic-political explanations for different nuclear decisions. These explanations are partly the result of two welcome trends: first, scholars have expanded the nuclear timeline, examining state behavior before and after nuclear proliferation; and second, scholars have moved beyond blunt distinctions between democracies and autocracies to more fine-grained understandings of domestic constraints. But without linkages between them, new domestic-political findings could be dismissed as a laundry list of factors that do not explain significant variation in nuclear decisions. This review essay assesses recent research on domestic politics and nuclear security, and develops a framework that illuminates when and how domestic-political mechanisms are likely to affect nuclear choices. In contrast to most previous domestic arguments, many of the newer domestic-political mechanisms posited in the literature are in some way top-down; that is, they show leaders deliberately maintaining or loosening control over nuclear choices. Two dimensions govern the extent and nature of domestic-political influence on nuclear choices: the degree of threat uncertainty and the costs and benefits to leaders of expanding the circle of domestic actors involved in a nuclear decision. The framework developed in this review essay helps make sense of several cases explored in the recent nuclear security literature. It also has implications for understanding when and how domestic-political arguments might diverge from the predictions of security-based analyses.
  • Topic: Security, Arms Control and Proliferation, Nuclear Weapons, Treaties and Agreements, International Security, Domestic politics, Nonproliferation
  • Political Geography: Russia, United States, China, Iran, North Korea
  • Author: Marina Henke
  • Publication Date: 04-2019
  • Content Type: Journal Article
  • Journal: International Security
  • Institution: Belfer Center for Science and International Affairs, Harvard University
  • Abstract: Many countries serving in multilateral military coalitions are “paid” to do so, either in cash or in concessions relating to other international issues. An examination of hundreds of declassified archival sources as well as elite interviews relating to the Korean War, the Vietnam War, the Gulf War, the Iraq War, the North Atlantic Treaty Organization operation in Afghanistan, the United Nations–African Union operation in Darfur, and the African Union operation in Somalia reveals that these payment practices follow a systematic pattern: pivotal states provide the means to cover such payments. These states reason that rewarding third parties to serve in multilateral coalitions holds important political benefits. Moreover, two distinct types of payment schemes exist: deployment subsidies and political side deals. Three types of states are most likely to receive such payments: (1) states that are inadequately resourced to deploy; (2) states that are perceived by the pivotal states as critical contributors to the coalition endeavor; and (3) opportunistic states that perceive a coalition deployment as an opportunity to negotiate a quid pro quo. These findings provide a novel perspective on what international burden sharing looks like in practice. Moreover, they raise important questions about the efficiency and effectiveness of such payment practices in multilateral military deployments.
  • Topic: Security, National Security, Regional Cooperation, International Security, Military Strategy, Military Affairs, Alliance
  • Political Geography: United States, Iraq, Kuwait, Vietnam, Korea, Somalia
  • Author: Council on Foreign Relations
  • Publication Date: 06-2019
  • Content Type: Working Paper
  • Institution: Council on Foreign Relations
  • Abstract: As climatic changes continue to make themselves painfully obvious across many geographies, U.S. energy infrastructure is increasingly at risk. The United States is ill prepared for this national security challenge. Climatic disruptions to domestic energy supply could be large, entailing huge economic losses and potentially requiring sizable domestic military mobilizations. Yet, public debate about emergency preparedness is virtually nonexistent. To explore the challenges of climate risk to the U.S. energy system, the Energy Security and Climate Change program at the Council on Foreign Relations convened a group of forty-four experts at the Council’s New York office on March 18–19, 2019, for the workshop “Climate Risk Impacts on the Energy System: Examining the Financial, Security, and Technological Dimensions.” During their deliberations, workshop participants discussed the presenters’ papers and explored how climate-related risks to U.S. energy infrastructure, financial markets, and national security could be measured, managed, and mitigated. Discussions began with assessments of the current state of climate research and the pressing need to improve data on localized effects, which could differ widely from global and regional averages. The workshop also investigated new energy technologies, financial tools, and changes to disclosure regulations that could enable the United States to reduce risks and mitigate consequences of climatic shifts.
  • Topic: Security, Climate Change, Energy Policy, Environment
  • Political Geography: United States, North America
  • Author: Sara Z. Kutchesfahani
  • Publication Date: 09-2019
  • Content Type: Working Paper
  • Institution: Center for International and Security Studies at Maryland (CISSM)
  • Abstract: This paper analyzes China’s words and actions regarding the Nuclear Security Summits to better understand what Chinese leadership on nuclear security could look like in the future. It finds that China accomplished the many things it said it would do during the summit process. The paper also explores how China’s policy and actions in other nuclear arenas could be paired with Chinese nuclear security policy to form a coherent agenda for nuclear risk reduction writ large. Consequently, the paper addresses how China doing as it says and does – per nuclear security – may be used as a way in which to inform its future nuclear security roles and responsibilities. In particular, it assesses China’s opportunities to assume a leadership role within this crucial international security issue area, especially at a time where U.S. leadership has waned.
  • Topic: Security, Diplomacy, Military Strategy, Nuclear Power
  • Political Geography: United States, China, Beijing, Asia
  • Author: Helena Legarda
  • Publication Date: 06-2019
  • Content Type: Working Paper
  • Institution: International Institute for Strategic Studies
  • Abstract: Presenting China as a 'responsible power' – Beijing releases first major defense white paper in four years
  • Topic: Security, Defense Policy, Science and Technology, Military Spending
  • Political Geography: United States, Japan, China, Europe, Canada, Taiwan, France, North America
  • Author: Anthony H. Cordesman
  • Publication Date: 01-2018
  • Content Type: Working Paper
  • Institution: Center for Strategic and International Studies
  • Abstract: The United States, its allies, and international organizations are just beginning to come to grips with the civil dimensions of "failed state" wars in Afghanistan, Iraq, Libya, Somalia, the Sudans, Syria, and Yemen. In each case, it is clear that the civil dimension of the war will ultimately be as important as the military one. Any meaningful form of "victory" requires far more than defeating the current extremist threat in military terms, and reaching some temporary compromise between the major factions that divide the country. The current insurgent and other security threats exist largely because of the deep divisions within the state, the past and current failures of the government to deal with such internal divisions, and the chronic failure to meet the economic, security, and social needs of much of the nation's population. In practical terms, these failures make a given host government, other contending factions, and competing outside powers as much of a threat to each nation’s stability and future as Islamic extremists and other hostile forces. Regardless of the scale of any defeat of extremists, the other internal tensions and divisions with each country also threaten to make any such “victory” a prelude to new forms of civil war, and/or an enduring failure to cope with security, stability, recovery, and development. Any real form of victory requires a different approach to stability operations and civil-military affairs. In each case, the country the U.S. is seeking to aid failed to make the necessary economic progress and reforms to meet the needs of its people – and sharply growing population – long before the fighting began. The growth of these problems over a period of decades helped trigger the sectarian, ethnic, and other divisions that made such states vulnerable to extremism and civil conflict, and made it impossible for the government to respond effectively to crises and wars.
  • Topic: Security, War, Fragile/Failed State, ISIS, Conflict
  • Political Geography: Afghanistan, Africa, United States, Iraq, Middle East, Yemen, Syria, Somalia, South Sudan, Sundan
  • Author: Tom Karako, Wes Rumbaugh
  • Publication Date: 01-2018
  • Content Type: Working Paper
  • Institution: Center for Strategic and International Studies
  • Abstract: Despite the rising salience of missile threats, current air and missile defense forces are far too susceptible to suppression. Today’s U.S. air and missile defense (AMD) force lacks the depth, capacity, and operational flexibility to simultaneously perform both missions. Discussions about improving AMD usually revolve around improvements to the capability and capacity of interceptors or sensors. Rather than simply doing more of the same, the joint integrated air and missile defense (IAMD) efforts might be well served by new or reinvigorated operational concepts, here discussed collectively as “Distributed Defense.” By leveraging networked integration, Distributed Defense envisions a more flexible and more dispersible air and missile defense force capable of imposing costs and dilemmas on an adversary, complicating the suppression of U.S. air and missile defenses. Although capability and capacity improvements remain essential to the high-end threats, the Distributed Defense concept focuses on creating a new architecture for today’s fielded or soon-to-be fielded IAMD force to boost flexibility and resilience.
  • Topic: Security, Defense Policy, Military Strategy, Missile Defense
  • Political Geography: United States
  • Author: Seth G. Jones
  • Publication Date: 02-2018
  • Content Type: Working Paper
  • Institution: Center for Strategic and International Studies
  • Abstract: The Trump administration’s National Security Strategy and National Defense Strategy outline a U.S. shift from counterterrorism to inter-state competition with China, Russia, Iran, and North Korea. However, U.S. policymakers need to be prepared for much of this competition to occur at the unconventional level, since the costs of conventional and nuclear war would likely be catastrophic. U.S. strategy is evolving from a post-9/11 focus on counterterrorism against groups like al Qaeda and the Islamic State to competition between state adversaries. As the National Defense Strategy notes, “Inter-state strategic competition, not terrorism, is now the primary concern in U.S. national security.”1 This shift has significant implications for the U.S. military, since it indicates a need to improve U.S. capabilities to fight—and win—possible wars against China, Russia, Iran, and North Korea if deterrence fails. Though it is prudent to prepare for conventional—and even nuclear—war, the risks of conflict are likely to be staggering. Numerous war games and analyses of U.S. conflicts with Russia in the Baltics, China in the Taiwan Strait and South China Sea, and North Korea on the Korean peninsula suggest the possibility of at least tens of thousands of dead and billions of dollars in economic damages. In addition, these conflicts could escalate to nuclear war, which might raise the number of dead to hundreds of thousands or even millions. According to one analysis, for example, a U.S. war with China could reduce China’s gross domestic product (GDP) by between 25 and 35 percent and the United States’ GDP by between 5 and 10 percent. The study also assessed that both countries could suffer substantial military losses to bases, air forces, surface naval forces, and submarines; significant political upheaval at home and abroad; and huge numbers of civilian deaths.2 These costs and risks will likely give Washington, Moscow, Beijing, Tehran, and even Pyongyang pause, raising several questions. Will these high costs deter the possibility of conventional and nuclear war? If so, what are the implications for the United States as it plans for a rise in inter-state competition? The Cold War offers a useful historical lens. NATO planners prepared for a possible Soviet and Warsaw Pact invasion of Western Europe. The U.S. military, for example, deployed forces to the Fulda Gap, roughly 60 miles outside of Frankfurt, Germany, as one of several possible invasion routes by Soviet and other Warsaw Pact forces. NATO also planned for nuclear war. The United States built up its nuclear arsenal and adopted strategies like mutually assured destruction (MAD). The concept of MAD assumed that a full-scale use of nuclear weapons by two or more opposing sides would cause the annihilation of both the attacker and the defender. The threat of such heavy costs deterred conflict, despite some close calls. During the 1962 Cuban Missile Crisis, the two superpowers nearly went to war after a U.S. U-2 aircraft took pictures of Soviet medium-range and intermediate-range ballistic nuclear missiles (MRBMs and IRBMs) under construction in Cuba. But Washington and Moscow ultimately assessed that direct conflict was too costly. Deterrence held. Instead, the United States and Soviet Union engaged in intense security competition at the unconventional level across Latin America, Africa, Asia, and Europe. Both countries backed substate groups and states to expand their power and influence. Under the Reagan Doctrine, for example, the United States provided overt and covert assistance to anticommunist governments and resistance movements to roll back communist supporters. The Soviets did the same and supported states and substate actors across the globe. In addition, the Soviets adopted an aggressive, unconventional approach best captured in the phrase “active measures” or aktivnyye meropriatia. As used by the KGB, active measures included a wide range of activities designed to influence populations across the globe. The KGB established front groups, covertly broadcast radio and other programs, orchestrated disinformation campaigns, and conducted targeted assassinations. The Soviets used active measures as an offensive instrument of Soviet foreign policy to extend Moscow’s influence and power throughout the world, including in Europe. Unlike the Cold War, the United States confronts multiple state adversaries today—not one. As the National Defense Strategy argues, the United States is situated in “a security environment more complex and volatile than any we have experienced in recent memory” where “the central challenges to U.S. prosperity and security is the reemergence of long-term, strategic competition by what the National Security Strategy classifies as revisionist powers.” But based on the likely costs and risks of conventional and nuclear war with China, Russia, Iran, and North Korea, much of the competition will likely be unconventional—and include what former U.S. State Department diplomat George Kennan referred to as “political warfare.” The term political warfare refers to the employment of military, intelligence, diplomatic, financial, and other means—short of conventional war—to achieve national objectives. It can include overt operations like public broadcasting and covert operations like psychological warfare and support to underground resistance groups.3 The United States’ adversaries today are already engaged in political warfare. Russia, for instance, utilizes a range of means to pursue its interests, such as technologically sophisticated offensive cyber programs, covert action, and psychological operations. Moscow has conducted overt operations like the use of RT and Sputnik, as well as semitransparent and covert efforts. It has also become increasingly active in supporting state and substate actors in countries like Ukraine, Syria, Afghanistan, and Libya to expand its influence in the Middle East, Asia, Europe, and even North Africa. Finally, Russia is attempting to exploit European and transatlantic fissures and support populist movements to undermine European Union and NATO cohesion, thwart economic sanctions, justify or obscure Russian actions, and weaken the attraction of Western institutions for countries on Russia’s periphery. Iran is using political warfare tools like propaganda, cyber attacks, and aid to substate proxies to support its security priorities, influence events and foreign perceptions, and counter threats. Tehran is also assisting state and substate actors in Yemen, Lebanon, Syria, Iraq, Bahrain, and Afghanistan. Iran supports Shia militia groups in Iraq, Hezbollah in Lebanon, the Bashar al-Assad regime in Syria, and Houthi rebels in Yemen. In the South China Sea, China is pouring millions of tons of sand and concrete onto reefs, creating artificial islands. It is also conducting a sophisticated propaganda campaign, utilizing economic coercion, and using fleets of fishing vessels to solidify its assertion of territorial and resource rights throughout the Pacific. Finally, Beijing is targeting the U.S. government, its allies, and U.S. companies as part of a cyber-espionage campaign. With political warfare already alive and well with the United States’ state adversaries, there are several implications for U.S. defense strategy. First, U.S. policymakers need to be prepared for significant inter-state competition to occur at the unconventional level, since the costs and risks of conventional and nuclear war may be prohibitively high. This should involve thinking through trade-offs regarding force posture, procurement, acquisition, and modernization. A U.S. military that predominantly focuses on preparing for conventional or nuclear war with state competitors—by modernizing the nuclear triad, building more resilient space capabilities, acquiring more effective counter-space systems, equipping U.S. forces with high-technology weapons, and emphasizing professional military education (PME) to fight conventional wars—may undermine U.S. unconventional readiness and capabilities. Second, even organizations that already engage in some types of political warfare—such as U.S. Special Operations Command and the U.S. intelligence community—will need to continue shifting some of their focus from counterterrorism to political warfare against state adversaries. This might include, for example, providing more aid to the Baltic States to conduct an effective resistance campaign against unconventional action by Moscow. Or it might involve aiding proxies in countries like Syria and Yemen to counter Iranian-backed organizations. It could also include improving the border security capabilities and effectiveness of Ukrainian military and police units against Russian-backed rebels. Third, the United States should invest in resources and capabilities that allow the military and other U.S. government agencies to more effectively engage in political warfare—and to provide agencies with sufficient authorities to conduct political warfare. One example is improving capabilities to conduct aggressive, offensive cyber operations. Other examples might include advanced electronic attack capabilities, psychological warfare units, security force assistance brigades, and precision munitions. Recognizing that other powers routinely conduct political warfare, George Kennan encouraged U.S. leaders to disabuse themselves of the “handicap” of the “concept of a basic difference between peace and war” and to wake up to “the realities of international relations—the perpetual rhythm of struggle, in and out of war.” Kennan’s advice may be even more relevant today in such a competitive world.
  • Topic: Security, Defense Policy, Nuclear Weapons, Military Strategy, Counter-terrorism
  • Political Geography: Russia, United States, China, Europe, Asia, North Korea
  • Author: Heather A Conley
  • Publication Date: 02-2018
  • Content Type: Working Paper
  • Institution: Center for Strategic and International Studies
  • Abstract: Twenty-five years of relative calm and predictability in relations between Russia and the West enabled European governments largely to neglect their military capabilities for territorial defense and dramatically redraw Northern Europe’s multilateral, regional, and bilateral boundaries, stimulating new institutional and cooperative developments and arrangements. These cooperative patterns of behavior occurred amid a benign security environment, a situation that no longer obtains. Following Russia’s annexation of Crimea, its military incursion into eastern Ukraine, its substantial military modernization efforts, heightened undersea activity in the North Atlantic and Baltic Sea, and its repeated air violations, the region’s security environment has dramatically worsened. The Baltic Sea and North Atlantic region have returned as a geostrategic focal point. It is vital, therefore, that the United States rethink its security approach to the region—what the authors describe as Enhanced Deterrence in the North.
  • Topic: Security, Regional Cooperation, Military Strategy, Modernization
  • Political Geography: Russia, United States, Europe, North Atlantic, Northern Europe, Crimea, Baltic Sea
  • Author: Melissa Dalton, Hijab Shah
  • Publication Date: 02-2018
  • Content Type: Working Paper
  • Institution: Center for Strategic and International Studies
  • Abstract: With the range of security challenges confronting the United States in the 21st century, characterized by competition by both state and nonstate actors, the importance of working with allies and partners to address common challenges is paramount. Deeper examination of the relative effectiveness of U.S. security sector assistance and how it must nest in a broader foreign policy strategy, including good governance, human rights, and rule of law principles, is required. Improving oversight and accountability in U.S. security sector assistance with partners are at the core of ongoing security assistance reform efforts to ensure that U.S. foreign policy objectives are met and in accordance with U.S. interests and values. This report examines key areas in security sector programming and oversight where the U.S. Departments of Defense and State employ accountability mechanisms, with the goal of identifying ways to sharpen and knit together mechanisms for improving accountability and professionalism into a coherent approach for partner countries.
  • Topic: Security, Foreign Policy, Defense Policy, Diplomacy, Human Rights
  • Political Geography: United States, North America
  • Author: Tom Karako, Wes Rumbaugh
  • Publication Date: 02-2018
  • Content Type: Working Paper
  • Institution: Center for Strategic and International Studies
  • Abstract: President Trump’s 2019 budget request includes $12.9 billion for missile defense programs, including $9.9 billion for the Missile Defense Agency and about $3 billion in modernization in the military services, building upon the acceleration initiated in the $323 million FY 2017 Above Threshold Reprogramming and the FY 2018 Budget Amendment of $2.0 billion. The proposed budget continues the recent trend of procurement consuming a greater portion of overall missile defense spending, reflecting a choice for prioritizing near-term capacity over longer-term capability. With the exception of two new Pacific radars and a modest effort for tracking hypersonic threats, the request includes strikingly few changes to the program of record. The submission fails to address past shortfalls for more research and development of new missile defense technologies and capabilities, most significantly with its lack of real movement toward a space-based sensor layer for tracking and discrimination, as opposed to merely missile warning. Pursuit of more advanced capabilities will require substantial programmatic changes in the 2020 budget, or with a budget amendment later this year, if such capabilities are recommended by the forthcoming Missile Defense Review. On February 12, the Department of Defense (DoD) released its budget request for FY 2019, which included a total of $12.9 billion for missile defense-related activities. The proposed topline for the Missile Defense Agency comes in at $9.9 billion, comprising $2.4 billion for procurement, $6.8 billion for research, development, test, and evaluation (RDT&E), $500 million for operations and maintenance (O&M), and $206 million for military construction (MILCON). The $9.9 billion request is a 26 percent increase from the FY 2018 budget request of $7.9 billion. Funding for ballistic missile defense within the services includes about $3 billion, largely for the procurement of Patriot Advanced Capability-3 Missile Segment Enhancement (PAC-3 MSE) and Standard Missile-6 (SM-6) interceptors. Overall, the budget reflects a near-term focus on capacity of existing programs, even at the expense of capability improvements. In its current form, the request boosts funding for all four families of interceptors. For homeland missile defense, this includes the continued improvements to the capacity and reliability of the Ground-based Midcourse Defense (GMD) system by continuing to deploy an additional 20 interceptors, several testing spares, and a new missile field at Fort Greely, Alaska. The request also deepens the magazines for Terminal High Altitude Area Defense (THAAD), Aegis, and Patriot interceptors, continuing a procurement-heavy trend from last year.1 The focus on capacity does not answer the question, however, how missile defense efforts will be adapted to the new reality of great power competition described by the National Security Strategy and the National Defense Strategy.2 One of the few new muscle movements in the entire budget is the addition of two radars in the Pacific for discriminating long-range missile threats to the homeland. The idea of a discrimination radar for Hawaii had been publicly floated over the past two years, and had previously been part of the yet-unpassed appropriations marks from the House and Senate appropriations committees. The Hawaii radar is scheduled for a 2023 deployment, with an additional radar deployed by 2024 at a yet-undisclosed location. The two radars will cost approximately $2.5 billion over the course of the Future Years Defense Program (FYDP). The inadequacy of the request lies not with the top line, but rather with the capabilities and strategy that the top line fails to prioritize. Although these radars would be useful to close the near-term Pacific midcourse gap against limited ballistic missile threats to the homeland, such funds must be weighed against the opportunity cost for larger improvements in capability provided by a space-based sensor layer that could provide substantially more capable birth-to-death tracking and discrimination on a more global scale and against a wider diversity of threats. The choice for capacity over capability reflects a near-term time horizon, but further delay in more advanced technologies will carry costs at a later time. In sum, the administration’s budget request for FY 2019 prioritizes near-term readiness against limited but growing ballistic missile threats from sources such as North Korea. This choice, however, falls short of connecting missile defense efforts to the reality of renewed great power competition as articulated in the National Defense Strategy. The inadequacy of the request lies not with the top line, but rather with the capabilities and strategy that the top line fails to prioritize. The 2019 request’s modesty of ambition is manifested by low funding for more advanced programs, such as boost-phase intercept, space-based sensors, and volume kill. Should the forthcoming Missile Defense Review address some of these issues and recommend programmatic changes, their implementation may have to wait until the 2020 budget, unless a budget amendment of some kind prioritizes them for the coming fiscal year.
  • Topic: Security, Defense Policy, Military Strategy, Budget, Missile Defense
  • Political Geography: United States, Europe, Asia, North America
  • Author: Anthony H. Cordesman
  • Publication Date: 03-2018
  • Content Type: Working Paper
  • Institution: Center for Strategic and International Studies
  • Abstract: The United States, South Korea, Japan—and every other state affected by the stability and security of Northeast Asia—has a strong incentive to find a way to end North Korea's nuclear threat and its development and deployment of ICBMs. At the same time, no one can afford to forget that North Korea poses a much wider range of threats from its conventional forces and shorter-range missiles—particularly as it develops ballistic and cruise missiles with precision strike capabilities. U.S. diplomacy and strategy cannot afford to focus solely on nuclear weapons, particularly when North Korea has the option of developing biological weapons with the same lethality as nuclear weapons. The U.S. cannot afford to ignore the conventional threat that North Korea poses to South Korea—a threat that could inflict massive casualties on South Korean civilians as well as create a level of conventional war that could devastate the South Korean economy.
  • Topic: Security, Nuclear Weapons, Political stability, Biological Weapons
  • Political Geography: United States, Japan, China, Asia, South Korea, North Korea, Asia-Pacific
  • Author: Gurmeet Kanwai
  • Publication Date: 04-2018
  • Content Type: Working Paper
  • Institution: Center for Strategic and International Studies
  • Abstract: The Issue The development of Gwadar Port is a key element of the greater China-Pakistan Economic Corridor (CPEC). It speaks to both the strength of the China-Pakistan relationship and the reach of China’s grand strategy. With Pakistan’s two other major ports operating near capacity with no room for expansion, projects in Gwadar promise to eventually handle one million tons of cargo annually, while also providing significant industrial, oil, and transportation infrastructure. Though a “monument of Pakistan-China friendship,” there are misgivings on both sides about CPEC, including the safety of Chinese workers, the resentment of Baloch nationalists, and the growing debt trap created by the project. The prospect of the PLA Navy in Gwadar poses greater security questions, as it forms another link in China’s efforts to expand its maritime presence in the Indo-Pacific region. The members of the Quadrilateral Security Dialogue, or “Quad,” comprised of India, Japan, Australia, and the United States, should counter China’s strategic outreach by networking with other like-minded countries on cooperative security frameworks to ensure a free, open, prosperous, and inclusive Indo-Pacific region.
  • Topic: Security, Oil, Regional Cooperation, Global Political Economy, Trade
  • Political Geography: Pakistan, United States, Japan, China, Middle East, India, Asia, Australia
  • Author: Christopher K Johnson
  • Publication Date: 05-2018
  • Content Type: Working Paper
  • Institution: Center for Strategic and International Studies
  • Abstract: Nearly two weeks after the U.S. “Trade Avengers” unleashed during their visit to Beijing what one reasonably could call “trade shock and awe” with a very aggressive—if thoroughly researched and well-crafted—set of demands targeting the yawning U.S. trade deficit with China and the core of that country’s throaty industrial policy, China this week is taking its turn with the visit of Chinese Communist Party (CCP) Politburo member and Vice Premier Liu He, President Xi Jinping’s economic point man who is almost universally described as a thoughtful, pragmatic, and mild-mannered policy academic. In the interim, voices from a wide swath of official Washington have sounded the alarm about the dangers of Chinese influence operations and the presence of alleged subversives, while President Trump himself seemed to cast aside these growing concerns by suggesting via Twitter that he would ask the Commerce Department to overturn its action against the Chinese telecommunications firm ZTE—long a focus of the U.S. security community for suspected cyber espionage activity and irrefutable violations of U.S. law—in response to protests that reportedly emanated directly from President Xi. With such frenetically sustained action in such a short period of time, the fog of war seems particularly thick at the moment. As such, it seems like a good time to slow down and have a think about how we got here, what actually is going on, and, with a little bit of luck, perhaps think about some ways to craft a viable way forward. Just like milestone birthdays in one’s personal life, important political anniversaries also can incline the mind toward reflection. Next year, of course, marks the fortieth anniversary of the reestablishment of diplomatic ties between the United States and China. As such, much breath and a lot of ink have been devoted to analyzing the course of the bilateral relationship over that nearly half-century. Although certainly not a universal opinion, it seems fair, if perhaps overly reductionist, to suggest that the general conclusion among a substantial number of U.S. officials, policy analysts, and journalists has been that the consistent U.S. policy emphasis on engagement with China during those forty years was, at the end of the day, a sham. In this rendering, naïve groups of senior policymakers in succeeding U.S. administrations and in most of the U.S. China-watching community were hoodwinked by wily CCP leaders who talked the talk of integrating into the so-called U.S.-led rules-based international order, but all the while they had a secret master plan to instead subvert that order and challenge U.S. primacy throughout the globe. In a slightly less menacing (if no less absurd) version of this narrative, China was, indeed, headed generally toward this hoped for integration under the stewardship of deceased paramount leader Deng Xiaoping and his handpicked successors Jiang Zemin and Hu Jintao until Xi Jinping arrived and, through a ruthless consolidation of power, decided instead to change course in what now regularly is referred to in shorthand as Xi’s “authoritarian turn.” But this conclusion seems utterly wrongheaded when examined in the light of hard facts. On the Chinese side of the equation, for example, Deng Xiaoping may have appeared warm and cuddly when donning his cowboy hat during his famous 1979 visit to the United States, but he could be just as ruthless and grasping as any other authoritarian leader. Deng’s exceptionally courageous and dogged pursuit of the policies of reform and opening certainly are worthy of praise, but they cannot, and therefore should not, be separated from the fact that he was content to sit idly by as Chairman Mao’s loyal lieutenant as Mao decimated his political rivals during the Anti-Rightist Campaign (1957-59) and the Great Leap Forward (1958-62). Nor should we forget that Deng used every ounce of his massive personal prestige with the People’s Liberation Army to, with steely determination, rally his many reluctant commanders to execute the brutal Tiananmen crackdown of June 4, 1989. Similarly, Xi Jinping is no Jack-in-the-Box-like figure who has pulled a fast one with a sharp directional turn in the last couple of years made all the more stark after his sweeping consolidation of power at last fall’s 19th Party Congress. In fact, it is this author’s contention, as supported by a large body of written work and public commentary, that everything Xi has done over the last five years was abundantly clear, whether explicitly or in embryonic form—from the moment he was introduced to the world as China’s new top leader in the fall of 2012, as encapsulated in his call for his country to pursue the “China Dream” set on a foundation of “the great rejuvenation of the Chinese nation.” This by no means suggests the United States should express support for, or even acquiescence in, Xi’s policies, but only that it should not be reacting with the borderline hysteria that now seems to be gripping Washington.
  • Topic: Security, Diplomacy, Global Political Economy, Trade Wars
  • Political Geography: United States, China, Asia, North America
  • Author: Amy Searight, Michael J. Green
  • Publication Date: 05-2018
  • Content Type: Working Paper
  • Institution: Center for Strategic and International Studies
  • Abstract: On August 21–22, 2017, the Center for Strategic and International Studies (CSIS) organized a conference in Sydney, Australia—Australia and the United States: An Alliance for the 21st Century—in cooperation with the United States Studies Centre (USSC) at the University of Sydney and the Perth USAsia Centre at the University of Western Australia. The conference was generously supported by a grant from the U.S. Department of State. This conference gathered together key thinkers from both countries at an important time for the Australia-U.S. alliance. The scope of cooperation between Australia and the United States has never been greater—extending well beyond traditional defense, intelligence, and diplomatic engagement—and the alliance enjoys healthy support among policymakers and the wider public in both countries. Bilateral economic, social, and cultural ties are broad and deep. The two countries are working closely together to defeat the threat posed by ISIL and other terrorist networks in the Middle East and globally, and to ensure the Asia-Pacific region remains stable and prosperous. Yet the Australia-U.S. alliance faces growing external and internal challenges. The United States, Australia, and other allies confront rising threats in Asia, Europe, and the Middle East, and globally from terrorism, financial instability, pandemic diseases, and other transnational challenges. Revisionist powers are seeking to reshape regional security dynamics and carve out spheres of influence, jeopardizing the liberal rules-based order that has supported American and Australian security and prosperity for more than half a century. The risks of miscalculation and conflict are growing, as is the prospect of proliferation of weapons of mass destruction. At the same time, allied resources available to meet these problems are constrained by slow economic growth across the developed world and the cost of supporting aging populations. Now, economic dislocation and stagnant wages are generating a wave of populist and protectionist sentiment in many parts of the world that risks undermining governance and a return to zero-sum, mercantilist economic policies—while U.S. political divisions and some policy choices are exacerbating allies’ concerns about the future of American global leadership. Many of these issues are playing out in the contemporary Australian debate, with a range of senior political figures and commentators calling for Australia to distance itself from the United States and recent opinion polls suggesting doubts about U.S. staying power as well as growing affinity for China. This is broadly consistent with polling from the region that suggests that China’s growing economic clout and military capabilities are driving expectations that China will supplant the United States as the predominant power in the Asia Pacific. These trends raise new questions about the future of the alliance in domestic, bilateral, and international contexts that we must address. They also highlight: the increasingly complex challenges facing U.S. and Australian alliance managers; the importance of not taking the alliance for granted; a requirement for fresh ideas about the alliance; and the need to engage a broader range of stakeholders, including a new generation of strategic thinkers in Australia and the United States. The Sydney conference brought together a group of about 40 participants—including 10 young next-generation leaders from Australia—for a two-day discussion on the opportunities and challenges facing the Australia-U.S. alliance across geopolitical, security, and economic issues. It focused on identifying key takeaways and formulating practical recommendations to improve the Australia-U.S. alliance’s capacity to adapt to changing dynamics, both globally and in the Indo-Pacific region, and to ensure support for the alliance well into the twenty-first century. Participation was by invitation and the discussions were off the record.
  • Topic: Security, Foreign Policy, Regional Cooperation, Counter-terrorism, Global Political Economy
  • Political Geography: United States, Australia, Asia-Pacific
  • Author: Michael Wallace, Amy Roma, Sachin Desai
  • Publication Date: 07-2018
  • Content Type: Working Paper
  • Institution: Center for Strategic and International Studies
  • Abstract: The U.S. commercial nuclear energy industry helps the U.S. government meet several key national security objectives. But the industry is struggling to survive. We are not the first to say this and we will not be the last. We are also not the first to call for U.S. government support for this struggling industry—but this call to action is different. We are urging U.S. government action—not with the focus of protecting the commercial sector, but with a focus to protect U.S. government interests impacted by the decline in the commercial nuclear energy sector. This is a key distinction and warrants attention at the highest level of government. This paper is not intended for those in the nuclear energy industry. They know the issues. It is intended for the U.S. government and the U.S. public—to explain the reasons why U.S. government action is critical at this moment, and to explain how we can move forward in a manner that best protects our country’s national security. But what are these national security objectives and how are U.S. government and national security interests undermined by a decline in the commercial nuclear energy sector? In this paper we explain the critical importance of the U.S. commercial nuclear energy industry in support of U.S. defense, research, economics, geopolitics, and international nonproliferation. We walk through how the U.S. commercial nuclear energy industry arose out of and with the support of the U.S. government—and how President Eisenhower’s reasons for bringing nuclear energy to the world in the 1950s are the very same reasons that the United States needs to continue to do so today. We unravel the web of interconnections between the commercial nuclear energy industry and achieving U.S. government and national security goals. And we explain the impact that a declining commercial nuclear energy sector has on achieving those crucial goals. Moreover, we set forth a recommended path forward to come “back from the brink” and preserve critical commercial nuclear energy sector assets—including technology, knowhow, people, and influence—before they are lost forever, and U.S. national security is damaged as a result. This industry must survive—and it can if the U.S. government and private industry work together, recognizing the government and civilian integrated nuclear infrastructure moving forward. Notably, the response must be U.S. government led to take the approach that is best for the country, rather than any particular company or technology. We recommend five core U.S.-government-led actions to move forward that focus.
  • Topic: Security, Energy Policy, National Security, Nuclear Power
  • Political Geography: United States, North America
  • Author: David P. Fidler
  • Publication Date: 04-2018
  • Content Type: Working Paper
  • Institution: Council on Foreign Relations
  • Abstract: The tasks of securing outer space and cyberspace are converging. The internet increasingly depends on space-enabled communication and information services. Likewise, the operation of satellites and other space assets relies on internet-based networks, which makes these assets, like cars and medical equipment, devices on the internet of things. New government actors, companies, goals, and technologies are expanding and transforming space activities. However, neither space policy nor cybersecurity policy is prepared for the challenges created by the meshing of space and cyberspace, which could increase national security risks. To meet these challenges, government, industry, and international action is needed. The Donald J. Trump administration’s National Space Council should develop cybersecurity recommendations for space activities, and federal agencies should prioritize these within the government and in cooperation with the private sector. In crafting needed legislation for commercial space activities, Congress should bolster industry efforts to strengthen cybersecurity. Private-sector actors should strengthen their adoption of cybersecurity best practices and collaborate with one another on improving implementation of cybersecurity strategies. Internationally, the United States should pursue collaboration on space cybersecurity through the North Atlantic Treaty Organization (NATO), plurilateral space cooperation mechanisms, and bilateral forums.
  • Topic: Security, Science and Technology, Cybersecurity, Space
  • Political Geography: United States, North America
  • Author: Robert K. Knake
  • Publication Date: 05-2018
  • Content Type: Working Paper
  • Institution: Council on Foreign Relations
  • Abstract: The U.S. government and private industry have been stuck at an impasse concerning cybersecurity information sharing for over a decade. While the Barack Obama administration rolled out executive and legislative efforts to increase information sharing, many U.S. companies still argue that the federal government should do more to provide them with useful intelligence on cyber threats. But the U.S. intelligence community argues that greater declassification and sharing of information with private companies could put technical sources and methods at risk. Fixes to this problem exist. The Department of Defense already provides a classified network for cleared defense contractors to receive intelligence on threats to their companies. Replicating this network for cyber threats has long been discussed as a way to share more information with the financial sector, electricity suppliers, and other private-sector entities critical to the U.S. economy. Expanding this network requires increasing the number of cleared personnel and of facilities that can hold classified information, as well as changing intelligence collection priorities. These hurdles can be addressed by cooperative efforts between the public and private sectors. As a crucial first step, the U.S. government should begin the targeted collection of intelligence on cyber threats to critical infrastructure. To disseminate this information, the government should establish security standards different from those applicable to defense contractors to determine who may hold clearances.
  • Topic: Security, Cybersecurity, Information Age, Private Sector
  • Political Geography: United States, North America
  • Author: Sebastian Engles
  • Publication Date: 03-2018
  • Content Type: Working Paper
  • Institution: George C. Marshall European Center for Security Studies
  • Abstract: The U.S. should remain committed to Central Asian security cooperation, but must carefully evaluate each program for merit and value added to U.S. security goals in the region. Military professionalization of the Kazakh armed forces will have the most significant impact towards accomplishing these goals and help Kazakhstan attain a more capable military. U.S. security cooperation efforts in assisting Kazakhstan to improve non-commissioned officer development serve as an excellent example of effective professionalization and a way to further our strategic relationships with non-NATO countries. Training programs that professionalize the Kazakh military can offer a cost-effective way for the United States to further a lasting partnership with Central Asia’s most stable country.
  • Topic: Security, NATO, Imperialism, Military Strategy
  • Political Geography: United States, Central Asia, Kazakhstan, Asia
  • Author: Eleanor Acer
  • Publication Date: 09-2018
  • Content Type: Working Paper
  • Institution: Human Rights First
  • Abstract: Historically, the United States has been a global leader in protecting vulnerable refugees fleeing persecution. Both Republican and Democratic administrations have recognized the moral and strategic importance of a strong commitment to refugee protection. But the Trump Administration has adopted policies that diverge from this historic leadership, to the detriment of U.S. national security interests. Under PresidentTrump’s directives, the United States has banned refugees from Muslim-majority countries, decimated the U.S. refugee resettlement program, curtailed access to asylum, taken children from the arms of asylum- seeking parents, refused to release refugees from U.S. immigration jails, and undermined due process in asylum adjudications. Thus far this fiscal year, the United States resettled only 60 Syrian refugees, a 99% drop from 2016. The president and administration officials have repeatedly employed rhetoric that paints refugees and asylum seekers as threats, frauds and criminals. Even though unauthorized border crossings are at historically low levels, the president directed that the National Guard bedeployed to the U.S. southern border “until” Congress strips away legal protections and authorizes the long-term detention of children and families seeking refugee protection. This race to the bottom has global consequences. Not only have thousands of refugees had their lives irreparably impacted, but the global humanitarian and human rights systems themselves are threatened by the Trump Administration’s statements and actions. In addition to relieving human suffering, these systems foster global stability and security. The United States should change course immediately, before the damage is irreversible. Though the global refugee crisis lacks easy solutions, there are many steps the United States could take to alleviate suffering and increase regional and global security—if the U.S. government were invested in tackling the problem. Unfortunately, the Trump Administration’s political strategy seems to reston fomenting public anxiety around questions of migration. Until this changes, Congress must use its legislative and oversight authorities to restore U.S. global leadership on refugee protection, the courts must stand firm behind U.S. legal obligations, and American citizens must demand an end to politicized fearmongering. The government has policy tools that would allow it to lead a comprehensive initiative to address the global refugee and displacement crisis. By working with the international community to effectively address these challenges, the United States could safeguard the stability of strategically-important countries and regions, bolster allies, enhance the ability of front-line countries to host refugees, uphold the rule of law internationally, and restore its tarnished global leadership. As the world leader in humanitarian assistance and resettlement, the United States has a unique role to play, both in leading by example and in encouraging other states to increase their aid, development investment, and resettlement contributions. Most critically, the United States should champion adherence to human rights and refugee protection conventions, promoting the rule of law globally and supporting the ability of many refugees to live safely in countries near their homes. This paper lays out key steps that the United States should take to lead a comprehensive initiative to address the global refugee crisis. Though the Trump Administration is unlikely to put these measures into effect any time soon, it is important that those interested in fixing the global refugee crisis understand that the U.S. government has many tools at its disposal should it choose to use them.
  • Topic: Security, Humanitarian Aid, Refugees, Asylum
  • Political Geography: United States, North America
  • Author: Eleanor Acer
  • Publication Date: 11-2018
  • Content Type: Working Paper
  • Institution: Human Rights First
  • Abstract: Instead, the Trump Administration and Congress should focus on effective solutions that safeguard both American ideals and interests—including: Address the Actual Causes of Displacement. Instead of threats to cut aid to programs in Central America, the United States should increase targeted support for effective programs that decrease gang and other violence in these countries, promote the rule of law, and build accountability for human rights abuses. A task force co-chaired by former Department of Homeland Security (DHS) Secretary Tom Ridge and former USAID Administrator Gayle Smith warned that cuts to foreign assistance “risk creating greater problems and greater flows of people later,” ultimately “weakening our security.” They recommended the United States increase development aid to address root causes, encourage other countries, institutions, and the private sector to invest in fragile states, and focus foreign assistance on governance and other reforms that enable private sector growth. Strengthen Refugee Protection in Other Countries in the Region. As the UN Refugee Agency has reported, Central American refugees are seeking asylum in Mexico, Costa Rica, Panama, and Belize, as well as the United States. The United States should increase support for the UN Refugee Agency and the development of strong refugee protection systems in Mexico and other countries. These asylum systems must actually grant protection to refugees, conduct fair and timely adjudications, and eliminate barriers that block refugees from asylum. In Mexico for instance, many are blocked from asylum by a counterproductive filing deadline, low recognition rates, lack of effective appeal procedures, and migration officers who deport asylum seekers rather than refer them for asylum processing. In addition to encouraging Mexico and other countries to uphold human rights standards by providing protection to refugees, the United States should provide a strong example by upholding its own refugee protection obligations. If Mexico and other countries build strong and rights-respecting systems, more refugees will be able to choose to seek protection in those countries. Follow U.S. and International Law at Borders. The Trump Administration and Customs and Border Protection (CBP) must stop blocking, turning away, or threatening to bar from asylum people seeking refuge at U.S. border posts or after crossing the U.S. border. Instead, the Trump Administration and U.S. agencies must uphold U.S. law, end the orchestrated blockade and slow-down on processing at ports of entry, and ensure timely CBP processing of asylum seekers. Refugees turned away from U.S. ports face deadly dangers from traffickers, smugglers, and other criminals in Mexico, and the country is far from meeting the legal standards for a “safe third country.” By blocking or turning away people seeking protection, U.S. officials are violating and attempting to evade both U.S laws and treaty obligations. Given its historic role as a global leader, the United States’ failure to protect refugees at home reverberates around the world, discouraging other nations from providing refuge at their borders. This practice is also counterproductive from a border protection perspective. DHS’s own Office of the Inspector General recently reported evidence that CBP’s practice of turning away and limiting entry of asylum seekers at official border posts “leads some aliens who would otherwise seek legal entry into the United States to cross the border illegally.” A supervisor confirmed that the agency “sees an increase in illegal entries when aliens are metered at ports of entry.” Receive and Manage Refugee Arrivals While Upholding American Ideals. The United States must stop responding to the increase in refugee protection requests with punitive and threatening actions like family separation, family detention, bans on asylum, criminal prosecutions, and military deployments. These actions conflict with American ideals (confirmed by recent polling), violate U.S. law, and harm children—as the American Academy of Pediatrics has repeatedly warned. They also don’t address the real problem. As former DHS Secretary Jeh Johnson explained in 2018, “[i]t is basic human instinct to save yourself and your family by fleeing a burning building.” He concluded that attempts to deter people from fleeing have ultimately proven ineffective because the “push” factors of violence and poverty persist in Guatemala, Honduras, and El Salvador. In addition to taking the steps outlined above to address root causes, the United States should launch effective, humane, and fiscally prudent strategies for receiving and managing people seeking U.S. protection—including: A Comprehensive Case Management Program. Instead of wasting more money on immigration jails and trying to overturn safeguards on detaining children, ICE should launch a community-based case management program using specially trained case managers to oversee asylum seeker cases. The Family Case Management Program operated by Immigration and Customs Enforcement (ICE) resulted in 99% attendance for ICE check-ins and appointments, and 100% attendance at court. DHS’s own advisory committee recommended expansion of community-based programs rather than detention. This approach is cost effective and enjoys strong support from Americans according to 2018 polling. Support Access and Funding for Legal Representation. Congress should support increased funding for legal information and funds for legal counsel. Statistical studies have repeatedly confirmed that asylum seekers represented by counsel overwhelmingly appear for their hearings, making legal representation a more fiscally prudent expenditure than detention. Assure Fair, Timely, and Adequately Staffed Asylum Adjudications. Congress and the administration must ensure necessary staff levels to reduce backlogs and ensure fairness of asylum and immigration court adjudications. Reforms should include: rolling back use of expedited removal for high protection populations, a fast-track process for urgent humanitarian cases delayed by USCIS’s use of the “last in first out” approach, and removal of “cancellation” cases from the asylum system by creating a process for such applications. Critically, political appointees leading agencies conducting these adjudications must stop painting asylum claims as false or lacking in merit and altogether halt the politicization of immigration judge hiring.
  • Topic: Security, Border Control, Refugees, Asylum
  • Political Geography: United States, North America
  • Author: Charles Harry, Nancy Gallagher
  • Publication Date: 02-2018
  • Content Type: Working Paper
  • Institution: Center for International and Security Studies at Maryland (CISSM)
  • Abstract: Publicity surrounding the threat of cyber-attacks continues to grow, yet immature classification methods for these events prevent technical staff, organizational leaders, and policy makers from engaging in meaningful and nuanced conversations about the risk to their organizations or critical infrastructure. This paper provides a taxonomy of cyber events that is used to analyze over 2,431 publicized cyber events from 2014-2016 by industrial sector. Industrial sectors vary in the scale of events they are subjected to, the distribution between exploitive and disruptive event types, and the method by which data is stolen or organizational operations are disrupted. The number, distribution, and mix of cyber event types highlight significant differences by sector, demonstrating that strategies may vary based on deeper understandings of the threat environment faced across industries. EXPLORE:
  • Topic: Security, Science and Technology, Cybersecurity
  • Political Geography: United States, Washington, D.C.
  • Author: Sandro Knezović
  • Publication Date: 02-2018
  • Content Type: Working Paper
  • Institution: Institute for Development and International Relations (IRMO)
  • Abstract: The European strategic landscape has changed dramatically over the course of the last decade. The post-Cold War mantra about the obsolescence of conventional threats in the wider European space proved to be short-sighted with developments at its eastern �lanks, while security dysfunctions in the MENA region and their immanent consequences for the safety of European citizens have loaded a heavy burden on compromise-building and decision-making in the �ield of the Common Security and Defence Policy (CSDP) of the EU. Furthermore, the approach of the new US administration to European security and the strategic consequences of Brexit have changed the wider framework in which security of 'the Old Continent' is to be determined, hence stimulating European leaders to rethink European security in a strive for strategic autonomy of their own. The very ambitiously phrased EU Global Strategy that came out in June 2016, served as both catalyst and umbrella document for such an endeavour. However, in order to achieve measurable progress in responding to contemporary security challenges, it was clear that the EU needs to develop a structural way for member states to do jointly what they were not capable of doing at the national level. This is so especially in the environment in which China, Russia and Saudi Arabia are championing the defence spending, right after the US, while European states are signi�icantly trailing behind. The fact that the EU collectively is the second largest military investor and yet far from being among the dominant military powers only emphasises the burning issue of ef�iciency of military spending and the level of interoperability among member states’ armies. High-level fragmentation of the European defence market and the fact that defence industries are kept in national clusters is clearly contributing to that. The reality on the ground is obviously challenging traditional methods of co-operation that operate mainly in ‘national boxes’ and calling for a paradigm change in the wider policy context of CSDP. However, it remains to be seen to which extent will this new security environment actually be able to push the European defence policy context over the strict national boundaries.
  • Topic: Security, Economics, Military Strategy, European Union
  • Political Geography: United States, China, Europe, Middle East, Asia, Saudi Arabia
  • Author: Council on Foreign Relations
  • Publication Date: 10-2017
  • Content Type: Working Paper
  • Institution: Council on Foreign Relations
  • Abstract: Chinese firms, both private and state-owned, have in recent years invested billions of dollars in the U.S. technology industry, raising concerns that a powerful rival has gained or could soon gain access to sensitive and, in some cases, critical technologies that underpin American military superiority and economic might. At the workshop entitled “Chinese Investment in Critical U.S. Technology: Risks to U.S. Security Interests,” held in San Francisco, on July 18, 2017, CFR convened nearly thirty current and former government officials, academics, bankers, investors, and corporate executives to explore whether the large and growing early-stage Chinese investment in critical U.S. technology poses a threat to U.S. national security, and, if so, to outline policies that mitigate the risks of unbridled Chinese investment and to bolster U.S. competitiveness.
  • Topic: Security, Science and Technology, Foreign Direct Investment, Cybersecurity
  • Political Geography: United States, China, Asia, North America
  • Author: Jaehyon Lee
  • Publication Date: 12-2017
  • Content Type: Working Paper
  • Institution: Council on Foreign Relations
  • Abstract: Traditional security issues in the Asia-Pacific, such as tensions on the Korean Peninsula or disputes over the South China Sea, consistently attract the attention of policymakers within the region and abroad. But their consequences for ordinary people are often dwarfed by the fallout from nontraditional security (NTS) events, such as climate change, resource scarcity, infectious diseases, natural disasters, irregular migration, famine, people smuggling, drug trafficking, and transnational crime. For countries in the Association of Southeast Asian Nations (ASEAN), the human and economic losses from NTS threats can be staggering. Moreover, economic and social costs from NTS threats consume resources that otherwise could be channeled toward economic growth and social welfare. Historically, there have been bilateral and multilateral attempts at cooperation on NTS in the Asia-Pacific, but they have not been enough. Trilateral cooperation among the United States, ASEAN, and South Korea would benefit not just the participating parties, but also the region as a whole. Such cooperation would allow South Korea to contribute to the region and is consistent with the Moon Jae-in government’s desire to play a greater foreign policy role beyond the Korean Peninsula. It would also advance the U.S.-South Korean alliance and give South Korea experience that could be used in future NTS crises in North Korea such as famines, natural disasters, or pandemics.
  • Topic: Security, Climate Change, Natural Disasters, Natural Resources, Drugs
  • Political Geography: United States, Asia, South Korea, Southeast Asia
  • Author: Monica Salmon Gómez
  • Publication Date: 05-2017
  • Content Type: Working Paper
  • Institution: The New School Graduate Program in International Affairs
  • Abstract: The human rights crisis in Mexico and particularly the one with migrants in transit through Mexico is not coincidental. The increased securitization of migration has transformed it into a security issue, causing it to be a threat to the national security. The mechanisms and strategies to fight against this crisis has led to terrible consequences to the thousand of migrants that pass through Mexico every year. As stated by David Harvey, the conceptualization of the irregular migration as a threat to the Nation-States has occurred as a consequence of the “global unequal capitalist integration”. This is a structural process that promotes global inequality in a parallel way, creating the undocumented as the others unwanted (Álvarez and Guillot, 2012:24). We then have migration as a phenomenon characterized by the economic globalization and the predominance of the logic of social exclusion, that it reveals itself as a feature for nations and families in their need to seek, among other things, improved living conditions in places that are different from their place of origin
  • Topic: Security, Human Rights, Migration, United Nations, Inequality
  • Political Geography: United States, South America, Latin America, North America, Mexico
  • Author: Justin Key Canfil
  • Publication Date: 07-2017
  • Content Type: Journal Article
  • Journal: Journal of International Affairs
  • Institution: School of International and Public Affairs, Columbia University
  • Abstract: Concerns about state-directed cyber intrusions have grown increasingly prevalent in recent years. The idea that state principals can obfuscate their involvement in such attacks by delegating operational tasks to non-state agents poses a particularly significant challenge to international enforcement and remedies. Gaps in international law, coupled with obstacles to detection in such cases, may make it more difficult to bring sponsoring states to justice. This paper offers a roadmap for assessing the propensity of states to delegate to non-state actors and correct for false positives in standard (typically more technical) cyber attack attribution methods. I conclude that the conditions under which attacks are likely to have been backed by sponsoring states occupy a much narrower window than conventional wisdom suggests, and that the universe of transgressors can be identified when standard indicators overlap with specific conditions.
  • Topic: Security, Elections, Cybersecurity, Election Interference
  • Political Geography: Russia, United States, Europe, North Am
  • Author: Petra Dolata
  • Publication Date: 01-2017
  • Content Type: Journal Article
  • Journal: Journal of Military and Strategic Studies
  • Institution: Centre for Military, Security and Strategic Studies
  • Abstract: While some of the announcements and approaches to energy by Donald Trump may sound like familiar stories of energy security, they are significantly different. Any discussion on energy security is driven by an inward-looking perspective, which highlights the economic dimension of creating jobs while tapping into a discourse that emphasizes America’s greatness.
  • Topic: Security, Economics, Energy Policy, Job Creation
  • Political Geography: United States, North America
  • Author: Mieke Eoyang, Evelyn Farkas, Ben Freeman, Gary Ashcroft
  • Publication Date: 06-2017
  • Content Type: Working Paper
  • Institution: Third Way
  • Abstract: In this paper, we argue that Russia’s interference in the 2016 presidential election is just one part of a wide-ranging effort by Moscow to undermine confidence in democracy and the rule of law throughout countries in the West. Russia has engaged in this effort because, in both economic and demographic terms, it is a declining power – the only way it can “enhance” its power is by weakening its perceived adversaries. Because Russia’s aim is to erode the health of Western nations, we argue it is time for America and its allies to employ a comprehensive, non-kinetic response to contain Russia.
  • Topic: Security, Elections, Cybersecurity, Democracy, Foreign Interference, Election Interference
  • Political Geography: Russia, United States, Europe, North America
  • Author: Gary Ashcroft, Roger Huddle
  • Publication Date: 07-2017
  • Content Type: Working Paper
  • Institution: Third Way
  • Abstract: Before the end of the year, Congress must revisit the FISA Amendments Act (FAA), a law which, together with its provision known as Section 702, is one of the U.S.'s most valuable and controversial tools to combat threats to the nation. Lawmakers are considering a number of reform proposals as they decide how to reauthorize the law. While we believe it is an important tool, it has some serious flaws when it comes to Americans’ privacy. We would ask members of Congress to ensure that any reform address two problem areas in Section 702: (1) domestic law enforcement access to foreign intelligence records and (2) the international distrust of U.S. tech companies that comply with Section 702. This paper is a primer on Section 702 and reforms for that law. Part I explains how government surveillance works generally. Part II explains Section 702 specifically. Part III details reasons to reform the law to address civil liberties and economic concerns. And Part IV examines potential reforms that have been under discussion.
  • Topic: Security, Privacy, Surveillance, Civil Liberties
  • Political Geography: United States, North America
  • Publication Date: 01-2017
  • Content Type: Working Paper
  • Institution: Center for International and Regional Studies: CIRS
  • Abstract: Academic interest in Gulf security has continued to focus on traditional notions of zero-sum security threats emanating from Iran or Iraq, or the role of the United States. There has been limited exploration of the deeper, structural issues that threaten the region. In line with this, in the 2014-2015 academic year, CIRS launched a research initiative on “The Changing Security Dynamics of the Persian Gulf.” The purpose of this project is to scrutinize the ways in which domestic security threats in the region are evolving, and how newer challenges related to human security are being reinforced by—and in some ways actually replacing—military threats emanating from regional and outside actors. This project brings together a number of distinguished scholars to examine a variety of relevant topics, which resulted in original research chapters published in an edited volume titled, The Changing Security Dynamics of the Persian Gulf (Oxford University Press/Hurst, 2017), edited by Kristian Coates Ulrichsen.
  • Topic: Security, Military Strategy, Political structure
  • Political Geography: United States, Iraq, Iran, Middle East
  • Author: Dylan O'Driscoll, Dave Van Zoonen
  • Publication Date: 03-2017
  • Content Type: Working Paper
  • Institution: Middle East Research Institute (MERI)
  • Abstract: This report views the Hashd al-Shaabi (Popular Mobilisation Forces, PMF) as having played an intrinsic role in the provision of security in Iraq since the dramatic rise of the Islamic State (IS). However, through the lens of nationalism it analyses the negative role the PMF may play once IS is defeated. The report therefore presents suggestions to deal with the perceived threat of the PMF in the short to medium term. The various groups within the PMF essentially represent a number of subnationalisms, which to a different extent act as competition to the state. The leaders of the various militias use their own particular brand of nationalism in their attempts to gain and maintain power and in doing so they dilute any prospect of national unity or loyalty to the state. Through providing security they act as competition to the Iraqi army which directly impacts on the perception of the state and is used by members of the PMF for political gain. The multiple competing subnationalisms in Iraq do little for the fostering of Iraqi unity or the functioning of Iraq as a state, and are likely to result in the continuation of violent conflict. Therefore, dealing with the challenges surrounding the PMF will be one of the most pressing issues in Iraq following the defeat of IS. The ultimate solution to this problem would be the incorporation of these forces through demobilisation and integration into the conventional ISF. Having one inclusive army, police force and border patrol operating under unified command structures and accountable to civil bodies of oversight is not only an important symbol in aiding national reconciliation and promoting cooperation between different communities, it is also a primary prerequisite for the effectiveness of the security sector as a whole. However, the current situation on the ground, in terms of security, reconciliation, and political will, precludes an aggressive, straight-forward pursuit of this objective. This necessitates an initial phase in which significant progress in these areas is made before incorporation of most PMF units can realistically take place. The government of Prime Minister Abadi needs to use its time following IS’ defeat to build a solid political platform based on shared citizenship, unity and reform. This platform has to include serious reforms in the areas of security and national reconciliation. At the same time, an assistance programme will have to be set up for individual militia members wishing to either integrate into the ISF or make the transition from fighter to civilian immediately following IS’ defeat. This joint process will allow for the gradual dissolution of the PMF as the functioning of the Iraqi state improves, cooperation and unity is advanced, and the army grows in strength. During this time the government can stop colluding with the PMF and begin incorporating, containing, and eventually suppressing the various groups within the PMF based on the level of loyalty to the state that the group holds. Only then can a comprehensive demobilisation and reintegration programme based on formal agreements with all militias be launched as an ultimate solution to Iraq’s problem with militias and subnationalisms. It is crucial that this programme is adapted to fit the local context and that the government of Iraq can exert primary control over it. Accordingly, some conventional standards of DDR programming may have to be deviated from in order for this programme to be successful.
  • Topic: Security, Nationalism, Military Strategy, Islamic State
  • Political Geography: United States, Iraq, Middle East, Baghdad
  • Author: Jaganath Sankaran
  • Publication Date: 01-2017
  • Content Type: Working Paper
  • Institution: Center for International and Security Studies at Maryland (CISSM)
  • Abstract: The United States and Japan are jointly developing and deploying an integrated advanced regional missile defense system meant to counter threats from North Korea. North Korea possesses a large and diversified arsenal of short- and medium-range missiles that could strike Japanese cities and military bases in the event of a crisis and cause measurable damage. The missile defense system currently in place provides strong kinematic defensive coverage over Japanese territory. However, in general, the offense enjoys a strong cost advantage. It is impractical to deploy as many defensive interceptors as there are offensive missiles, which, in turn, limits the efficiency of missile defenses. It should be understood that regional missile defenses in the Asia-Pacific are neither capable nor expected to provide 100% defense. Rather, their goal is to provide sufficient capability to bolster deterrence and, should deterrence fail, to provide enough defense in the initial stages of a crisis to protect vital military assets. Additionally, U.S. and Japanese forces apparently also need to develop a better command and control architecture to operate the Asia-Pacific regional missile defense system. Finally, while the system is meant to defend only against regional threats, China has argued that the system might in the future be able to intercept Chinese ICBMs, thereby diluting its strategic deterrent against the United States. Maintaining effective defenses against North Korea while reassuring China will be one of the major challenges the U.S. and Japan face in their missile defense endeavor.
  • Topic: Security, Diplomacy, International Cooperation, Military Strategy
  • Political Geography: United States, Japan, China, Asia, South Korea, North Korea
  • Author: Nilsu Gören
  • Publication Date: 01-2017
  • Content Type: Working Paper
  • Institution: Center for International and Security Studies at Maryland (CISSM)
  • Abstract: This paper provides an overview of the European Phased Adaptive Approach (EPAA) missile defense debate from a Turkish perspective. While Turkey participates in the EPAA by hosting a U.S. early-warning radar in Kurecik, Malatya, its political and military concerns with NATO guarantees have led to the AKP government's quest for a national long-range air and missile defense system. However, Turkish decision makers' insistence on technology transfer shows that the Turkish debate is not adequately informed by the lessons learned from the EPAA, particularly the technical and financial challenges of missile defense.
  • Topic: Security, Defense Policy, Military Strategy, Missile Defense
  • Political Geography: United States, Europe, Turkey, Asia
  • Author: Catherine Kelleher
  • Publication Date: 01-2017
  • Content Type: Working Paper
  • Institution: Center for International and Security Studies at Maryland (CISSM)
  • Abstract: The following papers were commissioned as part of the Missile Defense, Extended Deterrence, and Nonproliferation in the 21st Century project supported by the Project on Advanced Systems and Concepts for Countering Weapons of Mass Destruction (PASCC). The papers have two general purposes: 1) to create a body of work that provides an overview of the missile defense developments in major regions of the world; and 2) to provide emerging scholars the opportunity to conduct research, publish, and connect with each other. We believe we have succeeded on both counts. The papers written for this project will be valuable for academics and policymakers alike, and will be published and disseminated by the Center for International and Security Studies at Maryland. This element of the project has also been successful in further bringing together a new cadre of experts in the field and developing the next generation of academics and public servants who will benefit from their participation in this project.
  • Topic: Security, Nuclear Weapons, Missile Defense
  • Political Geography: United States, Europe, Global Focus
  • Author: Naoko Aoki
  • Publication Date: 01-2017
  • Content Type: Working Paper
  • Institution: Center for International and Security Studies at Maryland (CISSM)
  • Abstract: North Korea’s nuclear and missile programs have spurred Japan and South Korea to develop their own ballistic missile defense (BMD) systems and to regenerate their interest in regional missile defense cooperation with the United States. Has North Korea reacted to such developments, and if so, how? This paper looks at North Korea’s missile capacity development as well as its official proclamations and concludes that while Pyongyang likely does not believe that it is the region’s sole target for U.S. and allied BMD, it feels deeply threatened by its deployment. Existing and potential BMD systems have not discouraged Pyongyang from building its own missiles. Rather, North Korea is accelerating its efforts to improve and expand its missile arsenal to develop a survivable force, likely perceiving BMD systems as part of an overall U.S. strategy that is hostile to Pyongyang.
  • Topic: Security, Diplomacy, Nuclear Weapons, Regional Cooperation, Nonproliferation
  • Political Geography: United States, Japan, China, Asia, South Korea, North Korea
  • Author: Joshua Pollack
  • Publication Date: 01-2017
  • Content Type: Working Paper
  • Institution: Center for International and Security Studies at Maryland (CISSM)
  • Abstract: Some of the most enduring disagreements in the alliance between the United States and the Republic of Korea (ROK) concern ballistic missile defenses (BMD). At the same time that South Korea has expanded its conventional offensive missile program, it has declined American proposals for a regionally integrated BMD architecture, insisting on developing its own national system in parallel to the defenses operated by U.S. Forces Korea (USFK). American appeals for interoperability between U.S. and ROK systems have been received cautiously, as were proposals to enhance its own BMD in Korea by introducing the Terminal High-Altitude Area Defense (THAAD) to the Peninsula for several years. A desire for expanded autonomy in national security appears to underpin Seoul’s attitudes on BMD. Rather than rely passively on American protection against North Korea’s nuclear and missile threats, South Korea’s military leaders have focused on developing precision-strike capabilities to intimidate Pyongyang, and resisted simply accepting an American BMD umbrella. Even more than they desire greater independence from their American patron-ally, South Koreans are suspicious of entanglements with Japan, their former colonial master, whose own defensive systems are already integrated with the American regional BMD architecture. This outlook encourages the pursuit of independent defense capabilities and discourages institutionalizing trilateral security arrangements.
  • Topic: Security, Nuclear Weapons, Regional Cooperation, Nonproliferation, Deterrence
  • Political Geography: United States, Japan, China, Asia, South Korea, North Korea
  • Author: anya Loukianova fink
  • Publication Date: 12-2017
  • Content Type: Working Paper
  • Institution: Center for International and Security Studies at Maryland (CISSM)
  • Abstract: This discussion paper analyzes a sample of 2014-2016 Russian-language publications focused on Russia’s security relations with the United States. It characterizes the Russian expert debate at that time as dichotomous in nature, where security policy analysts proposed either coercive or restrained policy approaches in dealing with perceived threats. It assesses similarities and differences of these two perspectives with regard to the nature of Russia’s political-military relationship with the West, as well as past challenges and then-future opportunities in nuclear arms control and strategic stability.
  • Topic: Security, Diplomacy, Nuclear Weapons
  • Political Geography: Russia, United States, Europe
  • Author: Paolo Cotta-Ramusino
  • Publication Date: 01-2016
  • Content Type: Working Paper
  • Institution: Pugwash Conferences on Science and World Affairs
  • Abstract: On 23-24 January 2016, approximately 55 senior participants from a wide range of backgrounds gathered in Doha to discuss the shared goal of peace and reconciliation in Afghanistan. The meeting was a non-official (“academic”) exploration of current issues and not an official negotiation. It was held in the spirit of mutual respect and non-discrimination. All participants recognized the importance of dialogue, and many had traveled very far to participate in these discussions. The hope is that the points discussed in these non-official meetings be considered by all official negotiations. All expressed appreciation to the government of Qatar for allowing this meeting to take place and for the relevant support. There is a unanimous consensus that these meetings should be continued on a regular basis. The goal of the meeting was to explore the options for a ladder or steps toward a stable peace in an independent, unified Afghanistan that would reflect the values, including Islamic values, of the people of Afghanistan, while recognizing the diversity of the Afghans. Discussions showed that there were many shared concerns. These areas of commonality create opportunities for progress. Dialogue is needed to determine the steps forward to addressing these concerns. 1. Peace is an urgent need. Decades of war that have been imposed on Afghanistan, have had a devastating impact on all Afghans. People are waiting impatiently for peace. If progress is not made soon, many fear the country may face other threats that might further complicate the process. 2. Military confrontation must end. The sovereignty of Afghanistan and the desired peace and stability will ultimately be achieved via political cooperation within a framework of legitimacy established by an appropriate constitution. Foreign troops must eventually leave Afghanistan. 3. Some participants believe that the Constitution should be amended, while others believe that the constitution should be substantially rewritten. Concrete proposals should be discussed in detail in future meetings. 4. Outside forces should not control the politics of Afghanistan. Instead, international technical, economic and cultural cooperation should be promoted. 5. The freedom for all parties to discuss the path to peace needs to be ensured from now on. The highest priority in this regard is enabling all sides to sit together. Blacklists should be eliminated and freedom of movement should be guaranteed. Visas should be facilitated for those to attend such discussions. All agreed that the Taliban should have an office and an address. 6. To foster dialogue among all parties, some participants invoked Afghanistan’s long-established tradition of the Jirga. A peace Jirga of credible, impartial Afghans could be convened, perhaps drawn from participants at this conference. Other institutions, such as Pugwash, could also provide a forum, but Afghans must lead. It was pointed out that the Doha dialogue and its follow-ups do not interfere with the current quadrilateral talks. 7. A ceasefire should be part of negotiations. 8. The protection of civilians and an end to civilian casualties are shared goals and high priorities. The recent increase in civilian casualty rates, including the heavy toll on children and women, was noted. All sides should ensure accountability and the prosecution of abuses. 9. Constitutional issues are of primary concern and need to be discussed in specific detail. Afghanistan should have an Islamic government. According to some participants, the present constitution needs to be changed, provided that it be based on Islam and enforce national sovereignty. A fundamental concern is that any constitution should ensure there will be no monopoly of power and no discrimination against people with different religions and backgrounds. 10. It was noted that peace can create a better environment for economic development, which will benefit all the people of Afghanistan. The role of civil society, freedom of expression, and education according to Islamic principles in achieving these goals was agreed. 11. The activities that are performed under the name of Daesh in Afghanistan are a foreign phenomenon and are rejected by the Afghan people. 12. All emphasize the need to uphold the rights of women, and to end violence against women. Some believe these points need to be very clearly defined, and in particular to provide guarantees regarding women’s rights. There should be increased accountability for human rights abuses. 13. Health and education issues are a priority independent of the various political positions. 14. Protection of public properties such as schools, medical facilities, and the country’s infrastructure is essential. People who commit crimes against them should be prosecuted. 15. There is the need to address the devastation to society from past decades. Drugs, high unemployment and corruption have all taken a high toll on Afghan society. Gains that have been made in terms of increased life expectancy, increased access to health and education, and improvements to the economic structures should be maintained. 16. Threats to society from remnants of war, including unexploded ordnance, must be addressed. 17. All sides share the desire for future engagement with the outside world, and welcome friendship and cooperation with the international community based on mutual respect. Support from the international community in helping to build up Afghanistan, including its roads and schools, will be welcomed by all sides. 18. Participants expressed the strong desire of continuing the series of meetings like the two recent Pugwash meetings in Doha.
  • Topic: Security, Diplomacy, Regional Cooperation, Reconciliation
  • Political Geography: Afghanistan, United States, Middle East
  • Publication Date: 07-2016
  • Content Type: Working Paper
  • Institution: Pugwash Conferences on Science and World Affairs
  • Abstract: Building on the sustained engagement of previous years, Pugwash continues to hold meetings seeking a way forward on the future of Afghanistan. In recent months, rounds of meetings have been held in Afghanistan and in Doha, with over one hundred people drawn from Afghani tribal and civic life having participated. Kabul meeting, May 2016 Under discussion were ideas for a possible peace agreement with the Taliban movement that could bring about a ceasefire (without entering into details). Pugwash has worked on a document for some points that could be considered in a possible agreement between the Taliban movement and the Government of Afghanistan. In his preface to this, Secretary-General Paolo Cotta-Ramusino notes: “After 37 years of war (and foreign invasions), the people of Afghanistan are strongly looking for the restoration of peace. Everybody is tired of war. The continuing military confrontation between the forces of the Government and of the Taliban will not give any meaningful “victory” to either side. So there is an urgent need of a compromise and an agreement in order for weapons to be finally laid down over the entire territory of Afghanistan.”
  • Topic: Security, Diplomacy, Regional Cooperation
  • Political Geography: Afghanistan, United States, Middle East
  • Publication Date: 11-2016
  • Content Type: Working Paper
  • Institution: Pugwash Conferences on Science and World Affairs
  • Abstract: In the second half of 2016, Pugwash maintained its efforts to bring together different elements of Afghan society to discuss ways to build a peaceful future in the country. Consultations were held in Kabul and Jalalabad, convening many hundreds of individuals from across the political spectrum in the country. There was also a meeting held in Islamabad to discuss the relations between Pakistan and Afghanistan moving forward. Following from meetings earlier in the year, there was continued focus on developing a set of substantive items for inclusion in a draft peace agreement. An earlier version of the document was expanded and clarified in consultation with all relevant parties.
  • Topic: Security, Diplomacy, Regional Cooperation, Peace
  • Political Geography: Pakistan, Afghanistan, United States, Middle East
  • Author: Marshall Kuypers, Elizabeth Pate-Cornell
  • Publication Date: 02-2016
  • Content Type: Working Paper
  • Institution: Center for International Security and Cooperation
  • Abstract: Despite significant interest in cybersecurity, data on cyber security incidents remains scarce. On April 16, 2015, the US Department of Energy released data on 1,131 cybersecurity incidents through a Freedom of Information Act Request. While only containing the date, location, and type of incident, several interesting insights can be kneaded from the data. In this paper, we analyze the DOE security incident data and perform a statistical analysis on the rate of incidents. We find that the rate of cybersecurity incidents is decreasing over time and that incidents can be modeled stochastically. We believe that this is further evidence that cyber risk can be accurately evaluated with data-driven models.
  • Topic: Security, Cybersecurity
  • Political Geography: United States
  • Publication Date: 01-2016
  • Content Type: Working Paper
  • Institution: Centre for International Governance Innovation
  • Abstract: This special report is prepared for the North American Forum (NAF). In 2015, CIGI’s Global Security & Politics Program became the Secretariat for the Canadian leadership within the NAF. CIGI will be undertaking a program of research to support the Canadian contribution to the NAF in cooperation with our American and Mexican partners. In the coming months, CIGI will publish additional reports to support the work of the NAF. Since the 1994 North American Free Trade Agreement, trade, investment and migration flows among Canada, Mexico and the United States have helped turn North America into one of the most dynamic and prosperous trade blocs on the planet. With a new government in Ottawa, it is an ideal time for Canada to make a stronger, deeper relationship with Mexico a crucial plank of a plan to secure a prosperous future for North America. Better relations between Mexico and Canada not only means more opportunities to take advantage of the two countries’ economic and social complementarities, it also gives the two countries the opportunity to closely work together to get the United States on board with an ambitious North American agenda to secure the continent’s economic future.
  • Topic: Security, Economics, International Trade and Finance, Politics, Regional Cooperation
  • Political Geography: United States
  • Author: Saul P. Limaye, Tsutomu Kikuchi
  • Publication Date: 01-2016
  • Content Type: Working Paper
  • Institution: East-West Center
  • Abstract: Until recently, Southeast Asia had not been a region of sustained focus for the US-Japan relationship. But the situation is changing. The international relations of the Asia-Pacific is becoming more "multipolarized." This requires the US and Japan to think about the future of the region beyond the issue of US-China relations, which has preoccupied past discussions. A number of nations and institutions in the Asia-Pacific region will substantially affect the region's future. Southeast Asian nations and the Association of Southeast Asian Nations (ASEAN) are among them. A new era of more coordinated, sustained, and combined commercial and security involvement by the US and Japan in Southeast Asia may be at hand. In light of these changes, the East-West Center in Washington (EWCW), in collaboration with the Japan Institute of International Affairs (JIIA), and through the support of the Sasakawa Peace Foundation (SPF), initiated a dialogue with Southeast Asians about their perspectives on how the US-Japan relationship and alliance could or should approach cooperation with the region.
  • Topic: Security, Economics, Markets, Peacekeeping
  • Political Geography: United States, Japan, China, Asia-Pacific
  • Author: Cordella Buchanan Ponczek
  • Publication Date: 03-2016
  • Content Type: Policy Brief
  • Institution: The Polish Institute of International Affairs
  • Abstract: Traditionally, there is a partisan split on foreign policy in the United States: Republican candidates and voters worry more about terrorism, defense and national security than Democratic candidates and voters, thereby putting more stock in foreign policy issues, which manifests itself in the aggressiveness—of lack thereof—of each party’s foreign policy platform. But the candidates in the 2016 U.S. presidential election can be categorised by more than just party: a line can also be drawn between conventional candidates—Hillary Clinton, a Democrat, and Ted Cruz and Marco Rubio, Republicans—and unconventional candidates—Donald Trump, a Republican, and Bernie Sanders, a Democrat. Should a conventional candidate be elected president, U.S. foreign policy would be based on predictable adaptation to the changing international environment. An unconventional candidate, however, would be a wild card, whose actions would be difficult to predict.
  • Topic: Security, Politics, Elections
  • Political Geography: United States
  • Author: James M Dorsey
  • Publication Date: 03-2016
  • Content Type: Working Paper
  • Institution: Centre for Non-Traditional Security Studies (NTS)
  • Abstract: China’s increasingly significant economic and security interests in the Middle East have several impacts. It affects not only its energy security but also its regional posture, relations with regional powers as well as the United States, and efforts to pacify nationalist and Islamist Uighurs in its north-western province of Xinjiang. Those interests are considerably enhanced by China’s One Belt, One Road initiative that seeks to patch together a Eurasian land mass through inter-linked infrastructure, investment and expanded trade relations. Protecting its mushrooming interests is forcing China to realign its policies and relationships in the region. As it takes stock of the Middle East and North Africa’s volatility and tumultuous, often violent political transitions, China feels the pressure to acknowledge that it no longer can remain aloof to the Middle East and North Africa’s multiple conflicts. China’s long-standing insistence on non-interference in the domestic affairs of others, refusal to envision a foreign military presence and its perseverance that its primary focus is the development of mutually beneficial economic and commercial relations, increasingly falls short of what it needs to do to safeguard its vital interests. Increasingly, China will have to become a regional player in competitive cooperation with the United States, the dominant external actor in the region for the foreseeable future. The pressure to revisit long-standing foreign and defence policy principles is also driven by the fact that China’s key interests in the Middle East and North Africa have expanded significantly beyond the narrow focus of energy despite its dependence on the region for half 1 China has signalled its gradual recognition of these new realities with the publication in January 2016 of an Arab Policy Paper, the country’s first articulation of a policy towards the Middle East and North Africa. But, rather than spelling out specific policies, the paper reiterated the generalities of China’s core focus in its relations with the Arab world: economics, energy, counter-terrorism, security, technical cooperation and its One Belt, One Road initiative. Ultimately however, China will have to develop a strategic vision that outlines foreign and defence policies it needs to put in place to protect its expanding strategic, geopolitical, economic, and commercial interests in the Middle East and North Africa; its role and place in the region as a rising superpower in the region; and its relationship and cooperation with the United States in managing, if not resolving conflict.
  • Topic: Security, Diplomacy, Economics, Imperialism, Infrastructure
  • Political Geography: Africa, United States, China, Middle East, Asia, North Africa
  • Author: Nilsu Gören
  • Publication Date: 09-2016
  • Content Type: Working Paper
  • Institution: Center for International and Security Studies at Maryland (CISSM)
  • Abstract: Beyond its history of military coups and incomplete civilian oversight of its armed forces, Turkey has struggled with defining an independent international security policy. Its perception of U.S./NATO security guarantees has historically shaped its decision to either prioritize collective defense or seek solutions in indigenous or regional security arrangements. As part its domestic political transformation during the past decade, Turkey has decreased its reliance on NATO, leading to questions among observers about Turkey’s future strategic orientation away from the West. This brief argues that Turkey’s strategic objectives have indeed evolved in the recent past and that this is apparent in the mismatch between the country’s general security policy objectives and the outcomes of its policies on nuclear issues. At present, nuclear weapons do not serve a compelling function in Turkish policymakers’ thinking, beyond the country’s commitment to the status quo in NATO nuclear policy. Since nuclear deterrence is secondary to conventional deterrence, Turkey’s policies on nuclear issues are predominantly shaped by non-nuclear considerations. These decisions, in the absence of careful consideration of nuclear weapons, increase nuclear risks. This brief explores how Turkey could formulate more effective and lower risk nuclear policies than it currently does by employing cooperative security measures and how such a reorientation could strengthen to its overall security policy in the process.
  • Topic: Security, NATO, Nuclear Weapons, Military Strategy
  • Political Geography: United States, Europe, Turkey, Asia
  • Author: Richard Sokolsky, Frederic M. Wehrey
  • Publication Date: 10-2015
  • Content Type: Working Paper
  • Institution: Carnegie Endowment for International Peace
  • Abstract: For over three decades, the question of who controls the Persian Gulf has formed the basis for America’s massive military buildup in the region. At the heart of the region’s security dilemma is a clash of visions: Iran seeks the departure of U.S. forces so it can exert what it sees as its rightful authority over the region, while the Gulf Arab states want the United States to balance Iranian power. Resolving this impasse will not be easy. But the Iranian nuclear agreement presents an opportunity to take a first step toward creating a new security order in the Gulf, one that could improve relations between Iran and the Gulf Arab states and facilitate a lessening of the U.S. military commitment. Read more at: http://carnegieendowment.org/2015/10/14/imagining-new-security-order-in-persian-gulf/ij3p
  • Topic: Security, Politics, Treaties and Agreements, Nuclear Power
  • Political Geography: United States, Persian Gulf
  • Author: Mark Zachary Taylor
  • Publication Date: 01-2015
  • Content Type: Journal Article
  • Journal: Political Science Quarterly
  • Institution: Academy of Political Science
  • Abstract: This dense, powerful volume offers profound insights into the U.S. innovation system and its driving forces. The driving forces are Americans' twin desires for technology-based military supremacy (which demands government action) and small government (which militates against it). These twin forces have produced a highly successful, ever-evolving, and unique set of federal institutions and policies, which Linda Weiss calls the “national security state” (NSS). The NSS is the secret to American innovation. Since World War II, it has dominated high-risk innovation, revolutionary technological change, and the formation of new S industries. Weiss's book also reveals that the NSS is not static, but changes in response to changes in perceived geopolitical threats and to shifts in popular anti-statist sentiments. The book explains why the NSS came about, how it works, and glimpses its future. - See more at: http://www.psqonline.org/article.cfm?IDArticle=19346#sthash.kIPIPtW6.dpuf
  • Topic: Security, Government
  • Political Geography: United States, America
  • Author: Todd S. Sechser
  • Publication Date: 01-2015
  • Content Type: Journal Article
  • Journal: Political Science Quarterly
  • Institution: Academy of Political Science
  • Abstract: At around 5,000 total warheads, the U.S. nuclear stockpile today is a fraction of its former self. One therefore might presume that U.S. nuclear doctrine has undergone an equally significant transformation since the end of the Cold War. Thomas M. Nichols disabuses readers of this notion, showing how the machinery of “mutual assured destruction” remains predominant even though the world that spawned this doctrine disappeared with the Soviet Union. But this doctrine is now obsolete, Nichols argues. Deterrence no longer requires—if it ever did—an expansive nuclear inventory with diverse delivery platforms, a launch-on-warning alert posture, and convoluted targeting plans. In Nichols's view, a pocket-sized nuclear deterrent would be adequate. Yet U.S. strategy remains saddled with the costly baggage of an arms competition that ended a quarter-century ago. - See more at: http://www.psqonline.org/article.cfm?IDArticle=19347#sthash.Giq99dtz.dpuf
  • Topic: Security, Cold War, Nuclear Weapons
  • Political Geography: United States, Soviet Union
  • Author: Stephanie Sanok Kostro, Rhys McCormick
  • Publication Date: 01-2015
  • Content Type: Working Paper
  • Institution: Center for Strategic and International Studies
  • Abstract: While the united states has long acknowledged the value of working with partner nations to address shared security concerns, drawdowns in defense spending have underscored the importance of bilateral and multilateral cooperation to leverage capabilities and investments. the Center for strategic and International studies' multiyear Federated Defense Project aims to inform policymakers about global and regional security architectures and defense capabilities that support the achievement of common security goals, as well as ways to improve defense cooperation among nations to address those goals together. This report on institutional foundations of federated defense recognizes that successful cooperation in a budget-constrained environment often rests on the u.s. ability and willing-ness to provide assistance and/or equipment to partner nations. CSIS project staff drew on a literature review, workshops, and a public event (“the Future of the security Cooperation Enterprise”) to identify key findings in five areas: Priorities/Strategic Guidance: Proponents of federated defense should better articulate priorities. A proactive, interagency component that includes, at a minimum, officials from the Defense Department, State Department, and White House is necessary to effect a cultural shift and combat potential backsliding into unilateral approaches. Foreign Military Sales: In a federated approach, officials should identify capabilities that could most effectively support partner nations' contributions to federated defense. Toward that end, officials should also emphasize the establishment and maintenance of high-demand capabilities over time. other key issues related to potential difficulties in foreign sales include surcharges, overhead costs, and transparency in offsets. Export Controls: study participants noted that recent export control reform efforts have not yet resulted in significant change and have inadequately addressed industry concerns. Moreover, there appears to be a lack of appetite for these reforms in Congress. Technology Security and Foreign Disclosure: Improvements are needed to coordinate and speed technology transfer and foreign disclosure decisions. transparency across stovepipes within the executive branch is critical to create a common vision and objectives for federated defense, which is especially important when working with industry and foreign government partners. Acquisition and Requirements Processes: Within the Department of Defense, there is insufficient consideration of the export value and challenges of systems in early stages of the acquisition and requirements processes. Modifications during late stages of development are often far more expensive than building in exportability earlier. Having examined these key areas, the study team identified and analyzed three over-arching institutional challenges to and opportunities for federated defense. First, study participants remarked upon the lack of sufficient advocacy for federated defense among senior U.S. government officials. A second challenge was the cultural resistance to federated defense; experts noted that significant cultural change, such as that brought about by the Goldwater-Nichols Department of Defense Reorganization Act of 1986 (Pub.L. 99-433), may require top-down direction, years to implement, and decades to be accepted. A third challenge was the need for a perceived or actual budget crisis to drive change. The study team's recommendations resulting from this examination were five-fold. First, U.S. national strategies should address the grand strategy questions that could imperil implementation of a federated approach. Implementation of the u.s. National security strategy could impel a new effort to focus on partner capabilities and areas for sharing the common global security burden, as well as to prioritize interests and activities related to U.S. security cooperation, export controls, and technology security/foreign disclosure. Second, proactive U.S. leaders should articulate a vision, objectives, and priorities for a federated approach to defense. third, the Administration and Congress should work together to ensure completion of legal and regulatory reforms already under way (e.g., on export controls). Fourth, executive and legislative officials—perhaps through an interagency task force that works with committee staffs—should identify additional reforms to streamline or create authorities and to eliminate unhelpful directed spending on capabilities and systems that do not contribute to federated defense. Finally, the Department of Defense should start with incremental steps to create a culture that values federated defense; for example, the Defense Acquisition University and Defense Institute of Security Assistance Management could update coursework to institutionalize knowledge regarding federated approaches. This study made it clear that enduring changes in these five areas—from strategy to culture—are necessary to ensure the success of a federated approach to defense.
  • Topic: Security, Science and Technology, Budget
  • Political Geography: United States
  • Author: Nuno P. Monteiro, Alexandre Debs
  • Publication Date: 01-2015
  • Content Type: Journal Article
  • Journal: International Security
  • Institution: Belfer Center for Science and International Affairs, Harvard University
  • Abstract: What causes nuclear proliferation? What role do security threats play in driving states to acquire nuclear weapons? Intuitively, security is the most important factor driving nuclear acquisition. Yet existing security theories of proliferation, while accounting for why some states with grave security concerns have developed nuclear weapons, are unable to explain why others have not. Today only nine states have the bomb, a number much lower than the pessimistic predictions made by early security-based arguments on the causes of proliferation. Clearly, the view that "security is the only necessary and sufficient cause of nuclear proliferation" is not borne out by the history of the nuclear age. This limitation of existing security theories has exposed them to criticism on several fronts. Initially, a burgeoning scholarship emerged focusing on the nonsecurity "sources of the political demand for nuclear weapons." More recently, "supply-side" arguments on proliferation view states' demand for nuclear weapons (for security or other reasons) as largely irrelevant, claiming instead that the odds of nuclear acquisition depend on the availability of international nuclear assistance.
  • Topic: Security
  • Political Geography: United States
  • Author: Sebastian Rosato
  • Publication Date: 02-2015
  • Content Type: Journal Article
  • Journal: International Security
  • Institution: Belfer Center for Science and International Affairs, Harvard University
  • Abstract: Can great powers reach confident conclusions about the intentions of their peers? The answer to this question has important implications for U.S. national security policy. According to one popular view, the United States and China are destined to compete unless they can figure out each other's designs. A recent Brookings Institution report warns that although “Beijing and Washington seek to build a constructive partnership for the long run,” they may be headed for trouble given their “mutual distrust of [the other's] long-term intentions.” Similarly, foreign policy experts James Steinberg and Michael O'Hanlon argue that “trust in both capitals...remains scarce, and the possibility of an accidental or even intentional conflict between the United States and China seems to be growing.” Reversing this logic, many analysts believe that U.S.-China relations may improve if the two sides clarify their intentions. Thus the Pentagon's latest strategic guidance document declares that if China wants to “avoid causing friction” in East Asia, then its military growth must be “accompanied by greater clarity of its strategic intentions.” Meanwhile China scholars Andrew Nathan and Andrew Scobell recommend that even as the United States builds up its capabilities and alliances, it should “reassure Beijing that these moves are intended to create a balance of common interests rather than to threaten China.”
  • Topic: Security, Foreign Policy
  • Political Geography: United States, China, Beijing
  • Author: David Matsaberidze
  • Publication Date: 03-2015
  • Content Type: Journal Article
  • Journal: Connections
  • Institution: Partnership for Peace Consortium of Defense Academies and Security Studies Institutes
  • Abstract: This paper aims to analyze the construction and transformation of the post-Soviet security perspectives of Georgia and Ukraine in the context of the post-Soviet Russian foreign policy in the “near abroad,” quite often termed the “legitimate sphere” of Russian influence by high-ranking Russian officials. This inquiry covers the panorama of the foreign policy in post-Soviet Russia across the FSU, from the early 1990s through to the present, where Georgia and Ukraine’s independent and pro-Western orientation are the main issues securitized for the Russian Federation. Accordingly, the maintenance of territorial integrity has become a security priority for Georgia since the early 1990s and will most likely be Ukraine’s top concern after the Crimean occupation by the Russian Federation in March 2014 and the subsequent developments in Eastern Ukraine. Therefore, it could be claimed that post-Soviet Russian and Georgian/Ukrainian security strategy (following peaceful revolutions) represent a zero-sum game.
  • Topic: Security, Foreign Policy, Diplomacy, Imperialism, Military Strategy, European Union
  • Political Geography: Russia, United States, Europe, Ukraine, Eastern Europe, Georgia
  • Publication Date: 05-2015
  • Content Type: Working Paper
  • Institution: Pugwash Conferences on Science and World Affairs
  • Abstract: Pugwash held a non-official meeting on Security in Afghanistan in Doha on 2-3 May 2015. The meeting involved more than 40 participants, all of whom represented only him/herself and not any Institution or group
  • Topic: Security, Civil Society, Regional Cooperation, United Nations
  • Political Geography: Afghanistan, United States, Middle East
  • Author: Dr. Mary Manjikian
  • Publication Date: 04-2015
  • Content Type: Working Paper
  • Institution: The Strategic Studies Institute of the U.S. Army War College
  • Abstract: An analysis of weapons-based confidence-building measures shows how academics can work together to self-police their research for national security implications, socialize new members of the academic community into the importance of considering security issues, and develop and disseminate norms regarding what is and is not a moral and ethical use of these technologies. It may be possible for academics and policymakers to come together to work for a ban or build-down on cyber weapons patterned on international efforts to ban chemical and biological weapons and implement export regimes to control the export of code which may form the components of cyber weapons. If we conceptualize cyberspace as territory, we can also learn from the example of territorially-based confidence-building measures such as those implemented along the Indo-Pakistan border. This approach stresses the importance of developing notification procedures to prevent misperceptions and the escalation spiral, as well as communicating regularly to establish trust between all parties. The case studies presented here illustrate the promises and pitfalls of each approach and offer valuable warnings to policymakers seeking to implement such measures in cyberspace. They show what happens when not everyone in a regime is equally committed to a specific outcome by illustrating the difficulties of monitoring compliance in confidence-building regimes, and show the ways in which doctrines and confidence-building measures may not be perfectly aligned.
  • Topic: Security, National Security, Science and Technology, War, Weapons of Mass Destruction, Cybersecurity
  • Political Geography: United States, Global Focus
  • Author: Dr. Larry D. Miller
  • Publication Date: 03-2015
  • Content Type: Working Paper
  • Institution: The Strategic Studies Institute of the U.S. Army War College
  • Abstract: The Army War College Review, a refereed publication of student work, is produced under the purview of the Strategic Studies Institute and the United States Army War College. An electronic quarterly, The AWC Review connects student intellectual work with professionals invested in U.S. national security, Landpower, strategic leadership, global security studies, and the advancement of the profession of arms.
  • Topic: Security, National Security, War, Global Security
  • Political Geography: United States
  • Author: Vickie Choltz, Maureen Conway
  • Publication Date: 12-2015
  • Content Type: Policy Brief
  • Institution: Aspen Institute
  • Abstract: The Future of Work for Low-Income Workers and Families is a policy brief aimed at state policy advocates and policymakers seeking to help low-income workers and their families secure healthy economic livelihoods as the nature of work evolves in the United States. Published by the Working Poor Families Project in December 2015, the brief was written by Vickie Choitz, associate director of the Economic Opportunities Program, with Maureen Conway, vice president at the Aspen Institute and executive director of the Economic Opportunities Program. This brief reviews the major forces shaping the future of work, including changes in labor and employment practices, business models, access to income and benefits, worker rights and voice, education and training, and technology. Across these areas, we are seeing disruptive change in our economy and society resulting in increasing risk and challenges for low-income workers, in particular.
  • Topic: Security, Economics, Human Welfare, Social Stratification, Employment
  • Political Geography: United States
  • Author: Annie Kim
  • Publication Date: 12-2015
  • Content Type: Policy Brief
  • Institution: Aspen Institute
  • Abstract: The 2015 Financial Security Summit, titled Reimagining Financial Security: Managing Risk and Building Wealth in an Era of Inequality, took place July 15–17 in Aspen, Colorado. The Summit agenda built on FSP's core themes of expanding retirement security and children’s savings accounts for low- and moderate-income families, and began to explore a broader vision of how to improve short- and long-term dimensions of financial wellbeing in a rapidly changing economy. Participant contributions helped shape new areas of focus for FSP going forward. This report incorporates those insights and provides an outline for future policy dialogue and directions.
  • Topic: Security, Economics, Human Welfare, Social Stratification, Employment
  • Political Geography: United States
  • Author: Stefano Recchia
  • Publication Date: 06-2015
  • Content Type: Journal Article
  • Journal: Security Studies
  • Institution: Security Studies
  • Abstract: Approval from the United Nations or NATO appears to have become a necessary condition for US humanitarian military intervention. Conventional explanations emphasizing the pull of legitimacy can- not fully account for this given that US policymakers vary consider- ably in their attachment to multilateralism. This article argues that America’s military leaders, who are consistently skeptical about humanitarian intervention and tend to emphasize its costs, play a central role in making multilateral approval necessary. As long as top-ranking generals express strong reservations about intervention and no clear threat to US national security exists, they can veto the use of force. In such circumstances, even heavyweight “humani- tarian hawks” among the civilian leadership, who initially may have wanted to bypass multilateral bodies to maximize US freedom of action, can be expected to recognize the need for UN or NATO approval—if only as a means of mollifying the generals by reas- suring them about the prospect of sustained multilateral burden sharing. Two case studies drawing on interviews with senior civil- ian and military officials illustrate and probe the plausibility of the argument.
  • Topic: Security, NATO, Humanitarian Intervention, Multilateralism, Civil-Military Relations
  • Political Geography: United States, Europe, North America
  • Author: Alvin Almendrala Camba
  • Publication Date: 02-2015
  • Content Type: Journal Article
  • Journal: Central European University Political Science Journal
  • Institution: Central European University
  • Abstract: Nazrin Mehdiyeva's work is elegantly argued and timely volume on small states and energy politics; however, in looking to contribute to both of these literatures, she opens up questionable points in her book. Her main aim was to understand the conditions that allowed Azerbaijan to pursue an autonomous foreign policy after the Cold War while focusing on energy's role in the context of global energy insecurity. Mehdiyeva's structure relies on a simple and clear deductive narrative. Chapters 2 and 3 focus on small state literature and its application in Azerbaijan's institutional context; 4 focuses on Russia, the main 'antagonist' in the narrative, and 5 on the Caspian sea issue; while 6 and 7 deal with alternative allies in the form of Turkey and the United States. The last chapter concludes with the author's projection of future foreign policy.
  • Topic: Security, Foreign Policy, Cold War, Politics
  • Political Geography: Russia, United States, Turkey, Middle East, Azerbaijan
  • Author: Phillip Carter, Katherine Kidder
  • Publication Date: 01-2015
  • Content Type: Working Paper
  • Institution: Center for a New American Security
  • Abstract: Military, Veterans, and Society Program Director Phillip Carter and Research Associate Katherine Kidder examine the growth of military compensation in the post-Cold War era, from 1990 to 2015, as well as the social contract America has with its All-Volunteer Force, and the ways in which monetary compensation should be considered as part of a broader talent management strategy for the armed forces. The policy brief presents an opportunity for the nation to assess its social contract with the All-Volunteer Force and adjust (if necessary) to meet the national interest and sustain its most critical national security asset.
  • Topic: Security, Economics, Labor Issues, Military Affairs
  • Political Geography: United States
  • Author: Marianna M. Yamamoto
  • Publication Date: 08-2015
  • Content Type: Working Paper
  • Institution: Center for International and Security Studies at Maryland (CISSM)
  • Abstract: The OSCE security concept is a theoretical and operational framework based on the idea that international and domestic security depend on principles guiding three areas: how States deal with each other and resolve problems; the protection and promotion of individual rights within States; and the processes to develop, implement, and advance agreements regarding the principles. The OSCE security concept is based on principles that OSCE States began to develop in 1975 with the Helsinki Final Act, and continued to develop over the next decades and into the 21st century. This brief identifies and articulates the OSCE security principles by analyzing a series of official documents adopted by the OSCE States from 1975 to 2001. The concept was described in greater length in the CISSM monograph, OSCE Principles in Practice, which also tested the practical application of the principles in three case studies. The monograph then extended the research on OSCE principles to express an OSCE security concept. As a concept based on principles developed by democratic States, the OSCE security concept has significant policy implications. One highlighted in this brief is that international security cannot be achieved without the protection and promotion of individual rights and freedoms.
  • Topic: Security, Human Rights, International Cooperation
  • Political Geography: United States, Europe
  • Author: Zachary K. Goldman, Mira Rapp-Hooper
  • Publication Date: 02-2014
  • Content Type: Journal Article
  • Journal: Political Science Quarterly
  • Institution: Academy of Political Science
  • Abstract: ZACHARY K. GOLDMAN and MIRA RAPP-HOOPER discuss American security interests in the Persian Gulf region and the prospects for effective cooperation among Gulf states to contain Iran. They find that it is unlikely that the United States will be able to establish a containment regime that relies upon the Gulf Cooperation Council and that informal, bilateral ties to states in the region are a preferable policy recourse. - See more at: http://www.psqonline.org/article.cfm?IDArticle=19163#sthash.yMWmTk6Q.dpuf
  • Topic: Security
  • Political Geography: United States, Iran
  • Author: James Andrew Lewis
  • Publication Date: 01-2014
  • Content Type: Policy Brief
  • Institution: Center for Strategic and International Studies
  • Abstract: The Gulf has become a flashpoint for cyber conflict. Cyberspace has become an arena for covert struggle, with the United States, Israel and other nations on one side, and Iran and Russia on the other. Iran has far outpaced the GCC states in developing its cyber capabilities, both for monitoring internal dissent and deploying hackers to disrupt or attack foreign targets. Several such attacks over the past two years were likely either directed or permitted by Iranian state authorities. Even if Iran holds back from offensive actions as nuclear talks progress, the growth in Iranian capabilities remains a potential security threat for other Gulf states. The GCC countries have begun to develop their defensive capabilities, but they will need to expand their defenses and collaborate more effectively to deter future threats.
  • Topic: Conflict Resolution, Security, Defense Policy, Development, Science and Technology
  • Political Geography: Russia, United States, Iran, Middle East, Israel, Arabia
  • Author: Sharon Squassoni, Robert Kim, Stephanie Cooke, Jacob Greenberg
  • Publication Date: 03-2014
  • Content Type: Working Paper
  • Institution: Center for Strategic and International Studies
  • Abstract: The Proliferation Prevention Program at the Center for Strategic and International Studies (CSIS) participated in a global project on uranium governance led by the Danish Institute for International Studies that looks at uranium accountability and control in 17 uranium- producing countries. The project seeks to identify governance gaps and provide policy recommendations for improving front- end transparency, security, and regulation. The impetus for the project is the concern that monitoring activities at the front end—uranium mining, milling, and conversion—could be strengthened.
  • Topic: Security, Arms Control and Proliferation, Nuclear Weapons, Science and Technology, International Security, Nuclear Power
  • Political Geography: United States
  • Author: Anthony H. Cordesman
  • Publication Date: 04-2014
  • Content Type: Working Paper
  • Institution: Center for Strategic and International Studies
  • Abstract: Over the years since the formation of the Gulf Cooperation Council (GCC), the Southern Gulf states and the US have developed a de facto strategic partnership based on a common need to deter and defend against any threat from Iran, deal with regional instability in countries like Iraq and Yemen, counter the threat of terrorism and extremism, and deal with the other threats to the flow of Gulf petroleum exports.
  • Topic: International Relations, Security, Defense Policy, Military Strategy
  • Political Geography: United States, Iraq, Iran, Middle East, Yemen, Arabia, North America
  • Author: Gerald F. Hyman
  • Publication Date: 04-2014
  • Content Type: Working Paper
  • Institution: Center for Strategic and International Studies
  • Abstract: In his 2013 State of the Union speech, President Barack Obama announced that by the end of 2014 "our war in Afghanistan will be over" and, a month earlier, that "by the end of next year, 2014, the transition will be complete—Afghans will have full responsibility for their security, and this war will come to a responsible end." The military transition, successful or not, is in full swing. Of course the war will not come to an end in 2014, responsible or otherwise. Even if the military drawdown goes as planned, "America's commitment to a unified and sovereign Afghanistan will endure, but the nature of our commitment will change," the president said. On the military side, our enduring commitment will focus on training, equipping, and funding the Afghan National Security Forces (ANSF) and "some counterterrorism efforts that allow us to pursue remnants of al Qaeda and their affiliates," presumably the Taliban. As the United States draws down, so too will the remaining coalition countries of the International Security Assistance Force (ISAF) under North Atlantic Treaty Organization (NATO) command.
  • Topic: Security, Development, Economics, Governance
  • Political Geography: Afghanistan, United States, South Asia
  • Author: Sadika Hameed
  • Publication Date: 09-2014
  • Content Type: Working Paper
  • Institution: Center for Strategic and International Studies
  • Abstract: Relations between the United States and Pakistan have begun to improve after several years of heightened tensions. Yet many challenges remain. Among them is how to improve Pakistan's economy. Its economic crisis is one of the main sources of its internal tensions, but multiple opportunities exist to improve its economic performance. The policy debate in the United States, however, is still dominated by a focus on terrorism and extremism. While Pakistan's stability is a natural concern for the United States, focusing primarily on security issues limits the options for improving stability.
  • Topic: International Relations, Security, Economics
  • Political Geography: Pakistan, United States
  • Author: Anthony H. Cordesman
  • Publication Date: 09-2014
  • Content Type: Working Paper
  • Institution: Center for Strategic and International Studies
  • Abstract: Creating an effective transition for the ANSF is only one of the major challenges that Afghanistan, the US, and Afghanistan's other allies face during 2014-2015 and beyond.
  • Topic: Security, Defense Policy
  • Political Geography: Afghanistan, United States, Middle East
  • Author: Anthony H. Cordesman, Michael Peacock, Aaron Lin
  • Publication Date: 11-2014
  • Content Type: Working Paper
  • Institution: Center for Strategic and International Studies
  • Abstract: Data on Afghan Surge show had little or no lasting impact. NATO/ISAF stopped all meaningful reporting on security trends after EIA fiasco. No maps or assessments of insurgent control or influence versus limited dataf 10 worst areas of tactical encounters. No maps or assessments of areas of effective government control and support and areas where government is not present or lacks support. Shift from direct clashes to high profile and political attacks makes it impossible to assess situation using past metrics, but HPAs sharply up. UN casualty data and State Department START data on terrorism highly negative. No reason for insurgents to engage NATO/ISAF or ANSF on unfavorable terms before combat NATO/ISAF forces are gone.
  • Topic: Conflict Prevention, Security, Bilateral Relations
  • Political Geography: Afghanistan, United States
  • Author: Michael J. Green, Kathleen H. Hicks, Zack Cooper
  • Publication Date: 12-2014
  • Content Type: Working Paper
  • Institution: Center for Strategic and International Studies
  • Abstract: The United States has long emphasized the desirability of working with allies and partners to meet pressing security challenges. Indeed, many of our most vexing security concerns—from terrorism to cyber attacks—are best met with concerted multilateral responses. At a time when the United States and many of its allies and partners are reluctant to increase defense and security spending, working together is paramount. This is perhaps most evident in Asia, where present and potential future threats to security and prosperity are high and shared interests are substantial.
  • Topic: Security, Defense Policy, Diplomacy, Disaster Relief, Humanitarian Aid, Intelligence
  • Political Geography: United States, Asia
  • Author: Erik Gartzke
  • Publication Date: 01-2014
  • Content Type: Policy Brief
  • Institution: Belfer Center for Science and International Affairs, Harvard University
  • Abstract: U.S. Defense Secretary Leon Panetta's warning that “the next Pearl Harbor” might arrive via the internet has captured considerable attention. The internet is said to be revolutionary because it is a leveler— reducing Western military advantages—and because dependence on the internet makes developed countries more vulnerable to attack. The conviction that the internet is an Achilles' heel for the existing world order is based on narrow conceptions of the potential for harm. The internet cannot perform functions traditionally assigned to military force. To the contrary, cyberwar creates another advantage for powerful status quo nations and interests.
  • Topic: Security, Defense Policy, Science and Technology, Terrorism, War
  • Political Geography: United States
  • Author: Todd H. Hall, Jia Ian Chong
  • Publication Date: 04-2014
  • Content Type: Journal Article
  • Journal: International Security
  • Institution: Belfer Center for Science and International Affairs, Harvard University
  • Abstract: A century has passed since the assassination of Archduke Franz Ferdinand in Sarajevo set in motion a chain of events that would eventually convulse Europe in war. Possibly no conflict has been the focus of more scholarly attention. The questions of how and why European states came to abandon peaceful coexistence for four years of armed hostilities—ending tens of millions of lives and several imperial dynasties—have captivated historians and international relations scholars alike.
  • Topic: International Relations, Security, War
  • Political Geography: United States, Europe, Middle East, East Asia
  • Author: Tanisha M. Fazel
  • Publication Date: 04-2014
  • Content Type: Journal Article
  • Journal: International Security
  • Institution: Belfer Center for Science and International Affairs, Harvard University
  • Abstract: Several recent books argue that war is on the decline. In Winning the War on War, for example, Joshua Goldstein lauds the recent successes of the peacemaking community in countries such as Sierra Leone, Liberia, and Ivory Coast. In The Better Angels of Our Nature, Steven Pinker writes that not only war but violence in general has become much less common, as the civilizing forces of literacy and modern government have tempered our baser instincts and allowed our "better angels" to prevail.
  • Topic: International Relations, Security, War
  • Political Geography: United States, Middle East, East Asia
  • Author: Jerry Mark Long, Alex S. WIlner
  • Publication Date: 04-2014
  • Content Type: Journal Article
  • Journal: International Security
  • Institution: Belfer Center for Science and International Affairs, Harvard University
  • Abstract: Al-Qaida has established a metanarrative that enables it to recruit militants and supporters. The United States and its allies can challenge its ability to do so by delegitimizing the ideological motivations that inform that metanarrative.
  • Topic: International Relations, Security, War
  • Political Geography: United States, Middle East, East Asia
  • Author: Liam Anderson
  • Publication Date: 04-2014
  • Content Type: Journal Article
  • Journal: International Security
  • Institution: Belfer Center for Science and International Affairs, Harvard University
  • Abstract: Critics of ethnofederalism— a political system in which federal subunits reflect ethnic groups' territorial distribution—argue that it facilitates secession and state collapse. An examination of post-1945 ethnofederal states, however, shows that ethnofederalism has succeeded more often than not.
  • Topic: International Relations, Security, War
  • Political Geography: United States, Middle East, East Asia
  • Author: Shannon K. O'Neil
  • Publication Date: 10-2014
  • Content Type: Working Paper
  • Institution: Council on Foreign Relations
  • Abstract: North America was once called the New World. The people, their ideas, and the resources of the continent shaped the histories of the Old World—East and West. Today, North America is home to almost five hundred million people living in three vibrant democracies. If the three North American countries deepen their integration and cooperation, they have the potential to again shape world affairs for gen-erations to come.
  • Topic: Security, Economics, Energy Policy, International Trade and Finance
  • Political Geography: United States, America
  • Author: Peter Van Ness
  • Publication Date: 01-2014
  • Content Type: Working Paper
  • Institution: Australian National University Department of International Relations
  • Abstract: In 2012, the University of Chicago Press published a special fiftieth anniversary edition of Thomas Kuhn?s influential book, The Structure of Scientific Revolutions. Kuhn, who died of lung cancer in 1996, was a physicist trained at Harvard University and is best known for his work on the history and philosophy of science. His interpretation of the evolution of science and the concept of "paradigm change? have had a major impact on our understanding of intellectual life, both in the physical sciences and in the social sciences. This paper briefly reviews Kuhn?s approach, and then applies it to an analysis of the current state of International Relations theory in a critique of Realism. My argument is that Realism, as what Kuhn would call "normal science? in International Relations theory, is in crisis because of its inability to explain a growing number of anomalies, which in turn can be better explained by a different paradigm, Cooperative Security.
  • Topic: International Relations, Security, International Cooperation, Politics, Science and Technology, Political Theory, History
  • Political Geography: United States, United Nations
  • Author: Nicolo Sartori
  • Publication Date: 06-2014
  • Content Type: Journal Article
  • Journal: The International Spectator
  • Institution: Istituto Affari Internazionali
  • Abstract: The unconventional oil and gas revolution is certainly a game changer in the current international political setting, since it will bring the United States close to energy self-sufficiency. However, it seems unlikely that this new energy status will dramatically redefine US foreign policy and security priorities. In strategic regions such as the Middle East, US interests are expected to remain unchanged, while the new energy status will contribute only in part to modifying the US approach towards the EU's energy posture vis-à-vis Russia. What the new American energy condition is likely to change are the tools and policy options available to Washington to cope with the strategic challenges - China's power in primis - emerging in the multipolar international relations system.
  • Topic: Security, Foreign Policy
  • Political Geography: Russia, United States, Washington
  • Author: Derek M. Scissors
  • Publication Date: 01-2014
  • Content Type: Policy Brief
  • Institution: American Enterprise Institute for Public Policy Research
  • Abstract: New data published in the American Enterprise Institute-Heritage Foundation China Global Investment Tracker show that China continues to invest heavily around the world. Outward investment excluding bonds stood at $85 billion in 2013 and is likely to reach $100 billion annually by 2015. Energy, metals, and real estate are the prime targets. The United States in particular received a record of more than $14 billion in Chinese investment in 2013. Although China has shown a pattern of focusing on one region for a time then moving on to the next, the United States could prove to be a viable long-term investment location. The economic benefits of this investment flow are notable, but US policymakers (and those in other countries) should consider national security, the treatment of state-owned enterprises, and reciprocity when deciding to encourage or limit future Chinese investment.
  • Topic: Security, Foreign Policy, Development, Economics, Emerging Markets, International Trade and Finance, Foreign Direct Investment, Sovereign Wealth Funds
  • Political Geography: United States, China, Asia
  • Author: Bruce Jones, David Steven, Emily O'Brien
  • Publication Date: 04-2014
  • Content Type: Working Paper
  • Institution: Center on International Cooperation
  • Abstract: On December 16, 2013, Prince Turki bin Faisal Al Saud, Saudi Arabia's powerful former intelligence chief, gave an interview to the Wall Street Journal. He was speaking out after a turbulent four months in Middle East and Persian Gulf diplomacy, diplomacy that culminated in an interim nuclear deal between Iran and the major powers. Prince Turki, long a close friend to the United States, used the interview to blast American policy. He was critical of U.S. strategy in the region as a whole, but particularly vehement about leaving Saudi Arabia out of the loop as the United States engaged in secret bilateral diplomacy with Iran. "How can you build trust when you keep secrets from what are supposed to be your closest allies?" he fumed.
  • Topic: International Relations, Security, Economics, Energy Policy, International Trade and Finance, Oil
  • Political Geography: United States, Middle East, Asia
  • Author: Andrew Monaghan, Keir Giles
  • Publication Date: 03-2014
  • Content Type: Working Paper
  • Institution: The Strategic Studies Institute of the U.S. Army War College
  • Abstract: The United States and its allies are in general agreement on the legal status of conflict in cyberspace. Although key principles remain unresolved, such as what precisely constitutes an armed attack or use of force in cyberspace, overall there is a broad legal consensus among Euro-Atlantic nations that existing international law and international commitments are sufficient to regulate cyber conflict.
  • Topic: International Relations, Security, Science and Technology
  • Political Geography: Russia, United States, North America
  • Author: Jeffery L. Caton
  • Publication Date: 10-2014
  • Content Type: Working Paper
  • Institution: The Strategic Studies Institute of the U.S. Army War College
  • Abstract: The monograph is comprised of four main sections: Characterization. This section provides the notional foundation necessary to avoid any devolution of the analysis to mere semantic arguments. It presents how cyberspace is defined and characterized for this discussion, as well as how this compares to existing concepts of the traditional domains of land, sea, air, and space. Also, it identifies some of the unique technical challenges that the cyberspace domain may introduce into the process of distinguishing acts of war. Assessment Criteria. This section explores the de jure and the de facto issues involved with assaying cyber incidents to determine if they represent aggression and possible use of force; and, if so, to what degree? It reviews the traditional legal frameworks surrounding military action to include the United Nations (UN) Charter and the Law of Armed Conflict. It also examines how these compare to the recently published Tallinn Manual on the International Law Applicable to Cyber Warfare. From these sources, it proposes a cyberspace incident assessment methodology. Policy Considerations. Having identified viable criteria to aid with the assessment of cyber-space incidents, this section looks at the policy considerations associated with applying such principles. First, it examines the relevant U.S. strategies; next, it investigates the strategies of other key countries and international organizations and how they compare to U.S. tenets; and finally, it evaluates how nonstate actors may affect U.S. deliberations. Courses of Action. This section examines the influences that course of action development and implementation may have on the assessment of cyberspace incidents. It first looks at the President's role as the primary decisionmaker in U.S. national matters regarding cyber-space. It then surveys key influences affecting subordinate decisionmakers and their staffs that may be advising the Commander-in-Chief: reliable situational awareness, global and domestic environment considerations, and options and their related risks and potential consequences.
  • Topic: Security, Defense Policy, Intelligence, Science and Technology, War
  • Political Geography: United States, United Nations
  • Author: Mohammed El-Katiri
  • Publication Date: 10-2014
  • Content Type: Working Paper
  • Institution: The Strategic Studies Institute of the U.S. Army War College
  • Abstract: For the United States, the Arabian Gulf region remains one of the most geostrategically important locations in the world. Home to over half of the world's oil reserves and nearly a third of its natural gas, the Gulf states continue to supply world markets with an important share of their energy supplies. Continuing to be one of the world's largest regional suppliers of energy and holding much of the world's spare capacity in crude oil production makes the region central to the stability of the global oil market.
  • Topic: Security, Foreign Policy, Diplomacy, Treaties and Agreements, Bilateral Relations
  • Political Geography: United States, Middle East, Arabia
  • Author: Arthur T. Coumbe
  • Publication Date: 10-2014
  • Content Type: Book
  • Institution: The Strategic Studies Institute of the U.S. Army War College
  • Abstract: With the assistance of the Strategic Studies Institute of the U.S. Army War College, the Army's Office of Economic and Manpower Analysis published a series of monographs that were intended to provide a theoretical and conceptual framework for the development of an Army Officer Corps Strategy. These monographs consider the creation and maintenance of a highly skilled Officer Corps in the context of the nation's continuing commitment to an all-volunteer military, its far flung international interests, and ongoing changes in its domestic labor market. The authors of the various monographs believe that the confluence of these factors demands a comprehensive Officer Corps strategy that recognizes the interdependency of accessing, developing, retaining, and employing talent. In their view, building a talent-focused strategy around this four-activity human capital model would best enable the Army to match individual officer competencies to specific competency requirements.
  • Topic: Security, Defense Policy, War, International Affairs, History
  • Political Geography: United States
  • Author: Richard Weitz
  • Publication Date: 09-2014
  • Content Type: Working Paper
  • Institution: The Strategic Studies Institute of the U.S. Army War College
  • Abstract: Until a few years ago, the relationship between Washington, DC, and Ankara, Turkey, was perennially troubled and occasionally terrible. Turks strongly opposed the U.S. 2003 invasion of Iraq and have subsequently complained that the Pentagon was allowing Iraqi Kurds too much autonomy, leading to deteriorating security along the Iraq-Turkey border. Disagreements over how to respond to Iran's nuclear program, U.S. suspicions regarding Turkey's outreach efforts to Iran and Syria, and differences over Armenia, Palestinians, and the Black Sea further strained ties and contributed to further anti Americanism in Turkey. Now Turkey is seen as responding to its local challenges by moving closer to the West, leading to the advent of a “Golden Era” in Turkish U.S. relations. Barack Obama has called the U.S.-Turkish relationship a “model partnership” and Turkey “a critical ally.” Explanations abound as to why U.S.-Turkey ties have improved during the last few years. The U.S. military withdrawal from Iraq removed a source of tension and gave Turkey a greater incentive to cooperate with Washington to influence developments in Iraq. Furthermore, the Arab Awakening led both countries to partner in support of the positive agenda of promoting democracy and security in the Middle East. Americans and Turks both want to see democratic secular governments in the region rather than religiously sanctioned authoritarian ones. Setbacks in Turkey's reconciliation efforts with Syria, Iran, and other countries led Ankara to realize that having good relations with the United States helps it achieve core goals in the Middle East and beyond. Even though Turkey's role as a provider of security and stability in the region is weakened as a result of the recent developments in Syria and the ensuing negative consequences in its relations to other countries, Turkey has the capacity to recover and resume its position. Partnering with the United States is not always ideal, but recent setbacks have persuaded Turkey's leaders that they need to backstop their new economic strength and cultural attractiveness with the kind of hard power that is most readily available to the United States. For a partnership between Turkey and the United States to endure, however, Turkey must adopt more of a collective transatlantic perspective, crack down harder on terrorist activities, and resolve a domestic democratic deficit. At the same time, Europeans should show more flexibility meeting Turkey's security concerns regarding the European Union, while the United States should adopt a more proactive policy toward resolving potential sources of tensions between Ankara and Washington that could significantly worsen at any time.
  • Topic: Security, Foreign Policy, Defense Policy, Ethnic Conflict, Islam, Power Politics
  • Political Geography: United States, Turkey, Middle East
  • Author: John R. Deni
  • Publication Date: 09-2014
  • Content Type: Book
  • Institution: The Strategic Studies Institute of the U.S. Army War College
  • Abstract: The revolutions of the Arab Spring have had profound implications for global security generally and for U.S. security specifically. In most cases, these implications are only beginning to reveal themselves in the various countries affected across the region. Most obviously, the future of Syria—indeed, whether it remains a unified political entity—remains an open question. Whether and how the Syrian civil war is resolved is bound to impact significantly U.S. efforts to help Israel maintain its security. Meanwhile, in Libya, weak governmental institutions and rival power centers have made it difficult for the authorities in Tripoli to gain full control over the entire country. Particularly along Libya's borders, this has magnified the risk of transnational terrorists and traffickers exploiting the poorly governed spaces of the Pan Sahel. Elsewhere, the unfinished revolution in Egypt holds implications for Israel and the Palestinian Authority, for the balance of regional power vis-à-vis Turkey, Saudi Arabia, and Iran, and for the global trade—especially energy resources—that passes through the Suez Canal every day.
  • Topic: Security, Foreign Policy, Defense Policy, Arms Control and Proliferation, International Affairs
  • Political Geography: United States, Iran, Arabia, Syria, Egypt
  • Author: Geoffrey Till
  • Publication Date: 09-2014
  • Content Type: Working Paper
  • Institution: The Strategic Studies Institute of the U.S. Army War College
  • Abstract: The relative rise of China is likely to lead a major shift in the world's strategic architecture, which the United States will need to accommodate. For the outcome to be generally beneficial, China needs to be dissuaded from hegemonic aspirations and retained as a cooperative partner in the world system. This will require a range of potentially conflicting thrusts in U.S. policy.
  • Topic: Security, Foreign Policy, Arms Control and Proliferation, Emerging Markets, International Cooperation, Bilateral Relations
  • Political Geography: United States, China, East Asia
  • Author: Andrew Monaghan, Henry Plater-Zyberk
  • Publication Date: 08-2014
  • Content Type: Working Paper
  • Institution: The Strategic Studies Institute of the U.S. Army War College
  • Abstract: The views expressed in this report are those of the authors and do not necessarily reflect the official policy or position of the Department of the Army, the Department of Defense, or the U.S. Government. Authors of Strategic Studies Institute (SSI) and U.S. Army War College (USAWC) Press publications enjoy full academic freedom, provided they do not disclose classified information, jeopardize operations security, or misrepresent official U.S. policy. Such academic freedom empowers them to offer new and sometimes controversial perspectives in the interest of furthering debate on key issues. This report is cleared for public release; distribution is unlimited.
  • Topic: Security, Defense Policy, International Cooperation, Terrorism
  • Political Geography: United States, China, East Asia
  • Author: Andrew Monaghan, Keir Giles
  • Publication Date: 07-2014
  • Content Type: Working Paper
  • Institution: The Strategic Studies Institute of the U.S. Army War College
  • Abstract: When U.S. President Barack Obama cancelled a scheduled September 2013 summit meeting with his Russian counterpart, Vladimir Putin, “lack of progress on issues such as missile defense” was cited as the primary justification. Despite widespread and well founded assumption that the real trigger for the cancellation was the Russian decision to offer temporary asylum to Edward Snowden, the citing of missile defense was indicative. The comment marked one of the periodic plateaus of mutual frustration between the United States and Russia over U.S. attitudes to missile defense capability, stemming from a continued failure to achieve meaningful dialogue over U.S. plans and Russian fears.
  • Topic: Security, Defense Policy, NATO, Arms Control and Proliferation
  • Political Geography: Russia, United States, Europe
  • Author: John R. Deni
  • Publication Date: 05-2014
  • Content Type: Working Paper
  • Institution: The Strategic Studies Institute of the U.S. Army War College
  • Abstract: The time has come for a reappraisal of the U.S. Army's forward presence in East Asia, given the significantly changed strategic context and the extraordinarily high, recurring costs of deploying U.S. Army forces from the 50 states for increasingly important security cooperation activities across the Indo-Asia-Pacific theater. For economic, political, diplomatic, and military reasons, the Indo-Asia-Pacific theater continues to grow in importance to the United States. As part of a broad, interagency, multifaceted approach, the U.S. military plays a critical role in the rebalancing effort now underway. The U.S. Army in particular has a special role to play in bolstering the defense of allies and the deterrence of aggression, promoting regional security and stability, and ameliorating the growing U.S.-China security dilemma.
  • Topic: Security, Defense Policy, Arms Control and Proliferation
  • Political Geography: United States, East Asia, Asia, Australia
  • Author: Vish Sakthivel
  • Publication Date: 03-2014
  • Content Type: Working Paper
  • Institution: The Washington Institute for Near East Policy
  • Abstract: Secretary Kerry's visit comes amid Morocco's efforts to expand its regional influence and an upcoming vote in Algeria. Next week, Secretary of State John Kerry will head to Rabat and Algiers to reconvene the Strategic Dialogues that were postponed in November when he had to travel to Geneva for urgent Iran negotiations. While the broader themes to be discussed remain the same, certain developments in the two countries' diplomatic positioning will likewise inform the talks.
  • Topic: Security, Foreign Policy, Diplomacy
  • Political Geography: United States, Middle East, Morocco
  • Author: Bruce "Ossie" Oswald
  • Publication Date: 07-2014
  • Content Type: Working Paper
  • Institution: United States Institute of Peace
  • Abstract: Between 1981 and 2007, governments in eighty-eight countries established or supported more than three hundred armed militias to provide security to local communities. Such militias often directly engage in armed conflict and law-and-order activities. A number of state-supported civil defense groups make local communities less secure by refusing to respond to state direction, setting up security apparatuses in competition with state authorities, committing human rights violations, and engaging in criminal behavior. The doctrine of state responsibility and the application of international humanitarian law, international human rights law, and international criminal law obligate the state or states that establish or support civil defense groups to investigate, prosecute, punish, and provide reparations or compensate victims. In many cases, the domestic laws of states are ineffective at holding members of govern¬ments or civil defense groups accountable. Local law enforcement authorities also often fail to investigate or prosecute members of civil defense groups. At present there is no specific international legal instrument to guide the responsible management of relationships between states and civil defense groups. Thus, the international community should develop a legal instrument that specifies the rules and principles that apply to states and civil defense groups and that includes a due diligence framework that focuses on accountability and governance of both states and civil defense groups. Such a framework would enhance the protection and security of communities by setting accountability and governance standards, assisting in security sector reform by establishing benchmarks and evaluation processes, and contributing to the reinforcement of legal rules and principles that apply in armed conflicts. For fragile states or those in a post conflict phase of development, the better management of such forces is likely to build state legitimacy as a provider of security to vulnerable communities.
  • Topic: Conflict Resolution, Security, Defense Policy, Reform
  • Political Geography: United States