Search

You searched for: Publishing Institution Center for Strategic and International Studies Remove constraint Publishing Institution: Center for Strategic and International Studies Publication Year within 10 Years Remove constraint Publication Year: within 10 Years Publication Year within 25 Years Remove constraint Publication Year: within 25 Years Topic Security Remove constraint Topic: Security
Number of results to display per page

Search Results

  • Author: James Andrew Lewis
  • Publication Date: 01-2019
  • Content Type: Working Paper
  • Institution: Center for Strategic and International Studies
  • Abstract: Recent legislative changes call for enhanced scrutiny on potential transfers of “emerging and foundational technologies.” These are broadly defined as technologies essential to U.S. national security. The Congressional intent is for agencies to develop a more specific list, with robotics and artificial intelligence as primary concerns. Developing this list raises several issues. These include how to determine the military utility of an emerging technology, how to control the diffusion of the technology, and how to manage the risks of increased control for American innovation. Enhancing controls on the transfer of emerging technologies is necessary for several reasons. First, the U.S. finds itself in a contest with China. China intends to eventually displace the U.S as a global leader in technology, part of its larger effort to expands its influence and power. China is a technological rival of a kind the U.S. has never had before, given the deep interconnections between the two economies. China is still dependent on the West for advanced technology and uses a combination of techniques to acquire it. The 2015 Obama-Xi agreement on commercial cyber espionage attempted to address the problem, but China now ignores that agreement. In this environment, strengthening oversight of technology transfers from the U.S. and its allies to China is essential. In particular, new rules are needed to review technology transfers through co-production, joint ventures, or intangible exports, as these have been a major source of China’s access to technology. Second, current controls on technology transfers do not adequately protect emerging and foundational technologies. The current technology transfer control system is too close to its Cold War roots. Thresholds were set by asking what was the state of the art, how close our Soviet competitor was to this, and whether a technology was “controllable” or if it had become a commodity or was widely available from foreign sources. These are no longer the right questions to ask. The approach needed now is whether we want to transfer a technology to China and whether an effort to prevent this would do more harm than good to America’s own technological capabilities. This calls the whole complex structure of precise control thresholds into question. Modernizing export controls will be difficult, but the proposed rulemaking offers an opportunity to begin the process of revision. Export controls have their background in the 20th Century, when two bifurcated economic blocs were in competition and where thresholds for controls could be set with a degree of precision. This is no longer the case. Attempting to layer a 20th century export control regime over the new dynamics of global trade and innovation will not adequately protect emerging technologies. Reform will necessarily be an iterative process, part of a larger restructuring of export controls for a new international environment. A key point to bear in mind is that since China is still dependent on advanced Western technology (and this is an unlikely change in the near future), access to western technology should be used to gain leverage in talks to change China’s aggressively mercantilist policies. This will be difficult, and it will take time, but a failure to confront China and bring about change will lead to the outcomes that technology controls seek to avoid. The goal is not to defeat or contain China, but to bring its practices in line with international expectations in ways that allow commercial relationships to continue without risk to national security.
  • Topic: Security, Industry, Emerging Technology
  • Political Geography: North America, United States of America
  • Author: Anthony H. Cordesman
  • Publication Date: 01-2019
  • Content Type: Working Paper
  • Institution: Center for Strategic and International Studies
  • Abstract: The United States has now been continuously at war for more than seventeen years. It is still fighting an active war in Afghanistan, has yet to fully defeat ISIS in Syria and Iraq – much less establish a state of lasting security in either country – and is playing a role in low level conflicts against extremist and terrorists in many other parts of the world. The U.S. government, however, has never developed a convincing method of reporting on the cost of the wars, and its estimates are a confusing morass of different and conflicting Departmental, Agency, and other government reporting that leave major gaps in key areas during FY2001-FY2019. It has never provided useful forecasts of future cost, instead providing empty "placeholder" numbers or none. It has failed to find any useful way to tie the cost estimates it does release to its level of military and civil activity in each conflict or found any way to measure the effectiveness of its expenditures or tie them to a credible strategy to achieve some form of victory. The result is a national embarrassment and a fundamental failure by the Executive Branch and Congress to produce the transparency and public debate and review that are key elements of a responsible government and democracy.
  • Topic: Security, Military Strategy, Budget, Military Spending
  • Political Geography: North America, United States of America
  • Author: James Andrew Lewis, William Crumpler
  • Publication Date: 01-2019
  • Content Type: Working Paper
  • Institution: Center for Strategic and International Studies
  • Abstract: As cyber threats continue to grow in sophistication, organizations face a persistent challenge in recruiting skilled cybersecurity professionals capable of protecting their systems against the threat of malicious actors. With cybercriminals now responsible for billions in losses per year and state-sponsored hacking groups posing an ever-greater threat, the need for individuals capable of securing networks against attackers has never been greater. However, education and training institutions in the United States have so far found it difficult to keep pace with the growing need for cyber talent. This paper highlights the gaps that exist in the nation’s current cybersecurity education and training landscape and identifies several examples of successful programs that hold promise as models for addressing the skills gap. It then highlights recommendations for policymakers, educators, and employers. A recent CSIS survey of IT decisionmakers across eight countries found that 82 percent of employers report a shortage of cybersecurity skills, and 71 percent believe this talent gap causes direct and measurable damage to their organizations.1 According to CyberSeek, an initiative funded by the National Initiative for Cybersecurity Education (NICE), the United States faced a shortfall of almost 314,000 cybersecurity professionals as of January 2019.2 To put this in context, the country’s total employed cybersecurity workforce is just 716,000. According to data derived from job postings, the number of unfilled cybersecurity jobs has grown by more than 50 percent since 2015.3 By 2022, the global cybersecurity workforce shortage has been projected to reach upwards of 1.8 million unfilled positions.4 Workforce shortages exist for almost every position within cybersecurity, but the most acute needs are for highly-skilled technical staff. In 2010, the CSIS report A Human Capital Crisis in Cybersecurity found that the United States “not only [has] a shortage of the highly technically skilled people required to operate and support systems already deployed, but also an even more desperate shortage of people who can design secure systems, write safe computer code, and create the ever more sophisticated tools needed to prevent, detect, mitigate and reconstitute from damage due to system failures and malicious acts.”5 At the time, interviews indicated that the United States only had about 1,000 security specialists with skills and abilities to take on these roles, compared to a need for 10,000 to 30,000 personnel. In the nine years since that report, these challenges have persisted. In 2016, CSIS found that IT professionals still considered technical skills like intrusion detection, secure software development, and attack mitigation to be the most difficult to find skills among cybersecurity operators.6 A 2018 survey of California businesses revealed that a lack of required technology skills was one of the greatest challenges facing organizations when hiring cybersecurity candidates.7 These challenges were particularly acute for mission critical job roles, with over a third of organizations reporting a lack of technology skills in candidates for vulnerability assessment analyst positions and half of employers reporting deficiencies for cyber defense infrastructure support candidates. Employers today are in critical need for more cybersecurity professionals, but they do not want more compliance officers or cybersecurity policy planners. What organizations are truly desperate for are graduates who can design secure systems, create new tools for defense, and hunt down hidden vulnerabilities in software and networks.8
  • Topic: Security, Science and Technology, Cybersecurity, Information Technology
  • Political Geography: Global Focus
  • Author: Sarah Minot Asrar
  • Publication Date: 02-2019
  • Content Type: Working Paper
  • Institution: Center for Strategic and International Studies
  • Abstract: Meeting the security challenges of the future will require a sustained effort over the long-term by a multidisciplinary cadre of nuclear experts who are equipped with critical knowledge and skills. The Project on Nuclear Issues (PONI) runs two signature programs – the Nuclear Scholars Initiative and the Annual Conference Series – to engage emerging nuclear experts in thoughtful and informed debate over how to best address the nuclear community’s most pressing problems. The papers included in this volume comprise research from participants in the 2018 Nuclear Scholars Initiative and the PONI Conference Series. These papers explore such topics as the impacts of emerging technologies and capabilities, deep-diving on nuclear strategy and national policies, proposing paths forward for addressing proliferation challenges, and enhancing arms control in contentious environments.
  • Topic: Security, Arms Control and Proliferation, Energy Policy, Environment, Nuclear Weapons
  • Political Geography: Global Focus
  • Publication Date: 04-2019
  • Content Type: Working Paper
  • Institution: Center for Strategic and International Studies
  • Abstract: The economic consequences of large-scale disease outbreaks can be enormous: pandemics could cause $570 billion per year in average economic losses over the coming decades. Health security threats have an especially destructive impact on development investments and GDP in low-income and lower-middle-income countries (LICs and LMICs): the 2014-2015 Ebola outbreak in West Africa wiped out nearly five years of existing investments in the region, gravely setting back the region’s future development prospects. By contrast, upgrading countries’ preparedness is relatively inexpensive and affordable; recent data demonstrates most countries would need to spend approximately $0.50-$1.50 per person per year to get an acceptable level of epidemic preparedness. The financing gap for preparedness is one of the starkest problems in health security, especially among LICs and LMICs. That gap is estimated at $4.5 billion per year. Investments in preparedness are cost-effective and affordable, but low-income and lower-middle-income country governments continue to underinvest at dangerously low levels. These governments bear lead responsibility for addressing financing gaps, but external funding can be catalytic. At present, there is no financing mechanism and no adequate incentive structure to motivate governments in high-risk countries to invest in preparedness, particularly when those investments compete with more visible priorities such as education, housing, transport infrastructure, and other pressing health needs. As a consequence, countries remain ill-prepared and vulnerable to the persistent threat of pandemics and large-scale disease outbreaks. The World Bank Group’s International Development Association (IDA) replenishment takes place every three years and presents a choice opportunity to make adjustments that reflect important emerging priorities. In the current IDA19 replenishment, stakeholders can take a major step towards closing the preparedness financing gap by incentivizing $1 billion or more per year in preparedness investments in LICs and LMICs.
  • Topic: Security, Health, Multilateralism, Public Health
  • Political Geography: North America, United States of America
  • Author: Todd Harrison, Kaitlyn Johnson, Thomas G. Roberts
  • Publication Date: 04-2019
  • Content Type: Working Paper
  • Institution: Center for Strategic and International Studies
  • Abstract: While the vulnerabilities of U.S. national security space systems are often discussed publicly, the progress other nations are making in counterspace systems is not as readily accessible. Space Threat Assessment 2019 reviews the open-source information available on the counterspace capabilities that can threaten U.S. space systems. The report is intended to raise awareness and understanding of the threats, debunk myths and misinformation, and highlight areas in which senior leaders and policymakers should focus their attention. Space Threat Assessment 2019 focuses on four specific countries that pose the greatest risk for the United States: China, Russia, Iran, and North Korea. A fifth section analyzes the counterspace capabilities of select other countries, including some allies and partners of the United States, and some non-state actors. This report is not a comprehensive assessment of all known threats to U.S. space systems because much of the information on what other countries are doing to advance their counterspace systems is not publicly available. Instead, it serves as an unclassified assessment that aggregates and highlights open-source information on counterspace capabilities for policymakers and the general public.
  • Topic: Security, Military Strategy, Space
  • Political Geography: North America, United States of America
  • Author: Melissa Dalton
  • Publication Date: 04-2019
  • Content Type: Working Paper
  • Institution: Center for Strategic and International Studies
  • Abstract: The United States increasingly relies on allies and partners to accomplish shared security objectives around the globe. In recent years, a greater emphasis has been placed from burden sharing to burden shifting—enabling allies and partners to assume responsibility for their own security challenges through security sector assistance. Burden shifting responsibly to allies and partners requires the United States to integrate oversight and accountability measures into the implementation of security sector assistance. Oversight and accountability mechanisms for security sector assistance allow the United States to better direct, track, and calibrate its assistance to partners to ensure the full scope of U.S. policy goals are met. However, amid reforms being undertaken by the U.S. government to adapt security sector assistance policy and processes, greater clarity is needed on how to connect policy goals of oversight and accountability to planning, operations, doctrine, and training across the security assistance enterprise. This study conducted by the CSIS Cooperative Defense Project builds upon its previous initiative, entitled Oversight and Accountability in Security Sector Assistance: Seeking Return on Investment, to assess the levels of progress on implementing reforms throughout the security sector assistance enterprise and developing an action plan that addresses specific issues along planning, operations, policy and doctrine, and training lines of effort.
  • Topic: Security, Defense Policy, Military Strategy, Hegemony
  • Political Geography: North America, United States of America
  • Author: William A. Carter, William Crumpler
  • Publication Date: 04-2019
  • Content Type: Working Paper
  • Institution: Center for Strategic and International Studies
  • Abstract: As the threat of cyberattacks has risen in recent years, financial institutions (FIs) and regulators have taken a range of steps to strengthen the security and resilience of the financial system to cyber threats. In the Asia-Pacific region (APAC), regulators have introduced a raft of new regulations and controls to bolster the resilience of FIs in their jurisdictions. While greater attention to—and engagement on—these issues is important, the development of new regulatory regimes across APAC has created challenges for multinational FIs and regulators, and could hinder the growth of the financial services and fintech industries within the region. We reviewed the cybersecurity requirements impacting the financial industry in five key jurisdictions, including the largest regional financial centers and consumer markets in APAC: Singapore, Hong Kong, Japan, China, and India. Through a combination of open-source research and on-the-ground interviews—with regulators; local, regional, and global FIs; policymakers; technology experts; and academics—we sought to understand the range of requirements and approaches from different regulators across the APAC region, and the ways in which they impact cyber risks to the regional financial system. Harmonizing regulators’ approaches to cybersecurity regulation in the region could help reduce systemic risks, improve regulatory efficiency, and make it easier for FIs across APAC to grow. This will not be easy and will require sustained engagement on multiple levels. Cyber threats are a transnational issue and will require a transnational response, particularly in highly integrated regions like APAC. Strengthening the security and resiliency of financial networks across the region will require looking at FIs from an enterprise perspective and understanding the cyber risks they face from the perspective of defenders, not the narrow lens of national borders. This will require principles-based approaches that allow for the wide range of business models and capacities of FIs and regulators across the region, and consolidated auditing, examination, and testing procedures to ensure that regulators have an accurate picture of the risks and controls at institutions under their care. Ultimately, regulators’ goals must be to ensure that strong security and resilience, not redundant compliance, is the focus for FIs.
  • Topic: Security, Cybersecurity, Financial Markets
  • Political Geography: Global Focus
  • Author: Heather A Conley, Matthew Melino
  • Publication Date: 05-2019
  • Content Type: Working Paper
  • Institution: Center for Strategic and International Studies
  • Abstract: The United States’ strategic position near Russia and neighboring Canada allows the U.S. access to the Beaufort Sea, the Chukchi Sea, and the Bering Sea and requires the United States to manage a lengthy maritime border with Russia that extends through the Bering Strait and Chukchi Sea into the Arctic Ocean as far as permitted under international law. The U.S. government has articulated its fundamental interest in the Arctic for more than 40 years in a series of government strategies: beginning with President Nixon’s 1971 National Security Decision Memorandum (NSDM-144), to Ronald Reagan’s 1983 National Security Decision Directive (NSDD-90), to President George W. Bush’s National Security Presidential Directive 66 and Homeland Security Presidential Directive 25, signed in 2009, and the 2016 Report to Congress from the Department of Defense on Strategy to Protect United States National Security Interests in the Arctic Region.1 Each document established broad guidelines for U.S. policy in the region that aligned with the geostrategic realities at the time.2
  • Topic: Security, Military Strategy, Territorial Disputes, Maritime, Strategic Interests
  • Political Geography: Arctic
  • Author: Tom Cullison, J. Stephen Morrison
  • Publication Date: 06-2019
  • Content Type: Working Paper
  • Institution: Center for Strategic and International Studies
  • Abstract: Protecting the homeland against biological threats begins with preventing those threats from reaching our shores. The Department of Defense (DOD) contributes to overall U.S. health security through programs specifically aimed at countering biological threats from all sources—through public health activities coordinated with civilian counterparts at home and abroad and through research and development of medical countermeasures aimed at protecting U.S. Forces against health risks throughout the world. Civilian and military scientists, public health experts, and disaster planners are somewhat familiar with DOD’s health security capabilities, yet most lack a clear understanding of the breadth, depth, and limitations of DOD’s capacities. A solid and consistent U.S. policy framework has steadily evolved over the past few decades that identifies health as a national security issue and calls for a broad-based, inclusive national response to addressing the issue of health security. Now is the time to more fully integrate DOD’s unique expertise and capabilities in a more cohesive and efficient manner. This paper provides a broad overview of DOD health security activities and capabilities and also offers select concrete recommendations for strengthening the coherence and integration of DOD activities, with a special emphasis on leadership, novel diseases and new dangerous forms of resistance, surveillance, building host country capacities, and expanded exercises.
  • Topic: Security, Defense Policy, Health, Civil-Military Relations
  • Political Geography: North America, United States of America
  • Author: Seth G. Jones, Nicholas Harrington, Joseph S. Bermudez Jr.
  • Publication Date: 07-2019
  • Content Type: Working Paper
  • Institution: Center for Strategic and International Studies
  • Abstract: As tensions escalate between the United States and Iran in the Middle East, Russia is engaged in covert and overt cooperation with Iran in ways that undermine U.S. national security interests. This analysis of commercial satellite imagery at Tiyas Airbase in Syria indicates the scope and proximity of Russian and Iranian military ties. If Washington wants to contain Tehran and prevent further Iranian expansion, U.S. policymakers will need to increase pressure on Moscow to curb Tehran’s activities in countries like Syria.
  • Topic: Security, Diplomacy, Intelligence, International Cooperation
  • Political Geography: Russia, Europe, Iran, Middle East, North America, United States of America
  • Author: Stephanie Segal, Dylan Gerstel
  • Publication Date: 09-2019
  • Content Type: Working Paper
  • Institution: Center for Strategic and International Studies
  • Abstract: There is a growing concern in Washington that certain aspects of international scientific collaboration pose a risk to U.S. economic and national security, making it the latest front in rising U.S.-China competition. At the same time, the U.S. innovation ecosystem depends greatly on foreign scientists and partnerships with foreign research institutions. A well-calibrated strategy to manage these risks will maximize openness while protecting intellectual property, research integrity, and national security. These efforts should preserve the ability of the United States to attract top talent, including by maintaining a welcoming environment for foreign researchers, while improving domestic investment in science, technology, engineering, and math outcomes. This report outlines the vulnerabilities arising from foreign research collaboration, the risks of policy overreach, and recommendations to manage risks while maintaining scientific openness.
  • Topic: Security, Science and Technology, Innovation, Strategic Competition
  • Political Geography: China, Asia, North America, United States of America
  • Publication Date: 09-2019
  • Content Type: Working Paper
  • Institution: Center for Strategic and International Studies
  • Abstract: Principled humanitarian action is under attack around the world. Globally, 70.8 million people are considered forcibly displaced by armed conflict and nearly 132 million people need emergency humanitarian assistance. At the same time, there has been a steep escalation in the deliberate, willful obstruction of humanitarian access, impeding the ability of humanitarian aid to reach the most vulnerable people and vice versa. As humanitarian emergencies become increasingly complex and protracted, blocked humanitarian access will only increase without urgent action. To ensure the ability of aid to reach those who need it most and to uphold the principles of international humanitarian law, the United States should elevate humanitarian access as a foreign policy priority and work to reconcile tensions between critical national security measures and the growing needs of vulnerable populations in fragile, conflict-affected states. This report is the result of the CSIS Task Force on Humanitarian Access.
  • Topic: Security, Displacement, Humanitarian Crisis, Armed Conflict
  • Political Geography: Global Focus
  • Author: Daniel F. Runde
  • Publication Date: 09-2019
  • Content Type: Working Paper
  • Institution: Center for Strategic and International Studies
  • Abstract: The United States International Development Finance Corporation (DFC) will merge the staff, assets, and liabilities of the Overseas Private Investment Corporation (OPIC) and the U.S. Agency for International Development’s (USAID) Development Credit Authority (DCA). It will seek to catalyze vitally needed private sector investments in low- and lower-middle-income countries through new development finance tools such as local currency loans, first-loss guarantees, and equity investments. However, the DFC is not designed to be simply another development finance institution—in addition to a greater proposed focus on development impact, it is an agency also embedded in the U.S. foreign policy and national security architecture. This report offers concrete and independent ideas on how the DFC can better support U.S. national security interests while also examining the new agency’s limitations. Within this context, the three key U.S. national security challenges that CSIS highlights include a) China’s rising influence in the developing world, b) actions the United States and others can do to further mitigate violent extremism, and c) addressing the root causes of migration.
  • Topic: Security, Development, Finance
  • Political Geography: North America, United States of America
  • Author: Anthony H. Cordesman
  • Publication Date: 01-2018
  • Content Type: Working Paper
  • Institution: Center for Strategic and International Studies
  • Abstract: The United States, its allies, and international organizations are just beginning to come to grips with the civil dimensions of "failed state" wars in Afghanistan, Iraq, Libya, Somalia, the Sudans, Syria, and Yemen. In each case, it is clear that the civil dimension of the war will ultimately be as important as the military one. Any meaningful form of "victory" requires far more than defeating the current extremist threat in military terms, and reaching some temporary compromise between the major factions that divide the country. The current insurgent and other security threats exist largely because of the deep divisions within the state, the past and current failures of the government to deal with such internal divisions, and the chronic failure to meet the economic, security, and social needs of much of the nation's population. In practical terms, these failures make a given host government, other contending factions, and competing outside powers as much of a threat to each nation’s stability and future as Islamic extremists and other hostile forces. Regardless of the scale of any defeat of extremists, the other internal tensions and divisions with each country also threaten to make any such “victory” a prelude to new forms of civil war, and/or an enduring failure to cope with security, stability, recovery, and development. Any real form of victory requires a different approach to stability operations and civil-military affairs. In each case, the country the U.S. is seeking to aid failed to make the necessary economic progress and reforms to meet the needs of its people – and sharply growing population – long before the fighting began. The growth of these problems over a period of decades helped trigger the sectarian, ethnic, and other divisions that made such states vulnerable to extremism and civil conflict, and made it impossible for the government to respond effectively to crises and wars.
  • Topic: Security, War, Fragile/Failed State, ISIS, Conflict
  • Political Geography: Afghanistan, Africa, United States, Iraq, Middle East, Yemen, Syria, Somalia, South Sudan, Sundan
  • Author: Tom Karako, Wes Rumbaugh
  • Publication Date: 01-2018
  • Content Type: Working Paper
  • Institution: Center for Strategic and International Studies
  • Abstract: Despite the rising salience of missile threats, current air and missile defense forces are far too susceptible to suppression. Today’s U.S. air and missile defense (AMD) force lacks the depth, capacity, and operational flexibility to simultaneously perform both missions. Discussions about improving AMD usually revolve around improvements to the capability and capacity of interceptors or sensors. Rather than simply doing more of the same, the joint integrated air and missile defense (IAMD) efforts might be well served by new or reinvigorated operational concepts, here discussed collectively as “Distributed Defense.” By leveraging networked integration, Distributed Defense envisions a more flexible and more dispersible air and missile defense force capable of imposing costs and dilemmas on an adversary, complicating the suppression of U.S. air and missile defenses. Although capability and capacity improvements remain essential to the high-end threats, the Distributed Defense concept focuses on creating a new architecture for today’s fielded or soon-to-be fielded IAMD force to boost flexibility and resilience.
  • Topic: Security, Defense Policy, Military Strategy, Missile Defense
  • Political Geography: United States
  • Author: Seth G. Jones
  • Publication Date: 02-2018
  • Content Type: Working Paper
  • Institution: Center for Strategic and International Studies
  • Abstract: The Trump administration’s National Security Strategy and National Defense Strategy outline a U.S. shift from counterterrorism to inter-state competition with China, Russia, Iran, and North Korea. However, U.S. policymakers need to be prepared for much of this competition to occur at the unconventional level, since the costs of conventional and nuclear war would likely be catastrophic. U.S. strategy is evolving from a post-9/11 focus on counterterrorism against groups like al Qaeda and the Islamic State to competition between state adversaries. As the National Defense Strategy notes, “Inter-state strategic competition, not terrorism, is now the primary concern in U.S. national security.”1 This shift has significant implications for the U.S. military, since it indicates a need to improve U.S. capabilities to fight—and win—possible wars against China, Russia, Iran, and North Korea if deterrence fails. Though it is prudent to prepare for conventional—and even nuclear—war, the risks of conflict are likely to be staggering. Numerous war games and analyses of U.S. conflicts with Russia in the Baltics, China in the Taiwan Strait and South China Sea, and North Korea on the Korean peninsula suggest the possibility of at least tens of thousands of dead and billions of dollars in economic damages. In addition, these conflicts could escalate to nuclear war, which might raise the number of dead to hundreds of thousands or even millions. According to one analysis, for example, a U.S. war with China could reduce China’s gross domestic product (GDP) by between 25 and 35 percent and the United States’ GDP by between 5 and 10 percent. The study also assessed that both countries could suffer substantial military losses to bases, air forces, surface naval forces, and submarines; significant political upheaval at home and abroad; and huge numbers of civilian deaths.2 These costs and risks will likely give Washington, Moscow, Beijing, Tehran, and even Pyongyang pause, raising several questions. Will these high costs deter the possibility of conventional and nuclear war? If so, what are the implications for the United States as it plans for a rise in inter-state competition? The Cold War offers a useful historical lens. NATO planners prepared for a possible Soviet and Warsaw Pact invasion of Western Europe. The U.S. military, for example, deployed forces to the Fulda Gap, roughly 60 miles outside of Frankfurt, Germany, as one of several possible invasion routes by Soviet and other Warsaw Pact forces. NATO also planned for nuclear war. The United States built up its nuclear arsenal and adopted strategies like mutually assured destruction (MAD). The concept of MAD assumed that a full-scale use of nuclear weapons by two or more opposing sides would cause the annihilation of both the attacker and the defender. The threat of such heavy costs deterred conflict, despite some close calls. During the 1962 Cuban Missile Crisis, the two superpowers nearly went to war after a U.S. U-2 aircraft took pictures of Soviet medium-range and intermediate-range ballistic nuclear missiles (MRBMs and IRBMs) under construction in Cuba. But Washington and Moscow ultimately assessed that direct conflict was too costly. Deterrence held. Instead, the United States and Soviet Union engaged in intense security competition at the unconventional level across Latin America, Africa, Asia, and Europe. Both countries backed substate groups and states to expand their power and influence. Under the Reagan Doctrine, for example, the United States provided overt and covert assistance to anticommunist governments and resistance movements to roll back communist supporters. The Soviets did the same and supported states and substate actors across the globe. In addition, the Soviets adopted an aggressive, unconventional approach best captured in the phrase “active measures” or aktivnyye meropriatia. As used by the KGB, active measures included a wide range of activities designed to influence populations across the globe. The KGB established front groups, covertly broadcast radio and other programs, orchestrated disinformation campaigns, and conducted targeted assassinations. The Soviets used active measures as an offensive instrument of Soviet foreign policy to extend Moscow’s influence and power throughout the world, including in Europe. Unlike the Cold War, the United States confronts multiple state adversaries today—not one. As the National Defense Strategy argues, the United States is situated in “a security environment more complex and volatile than any we have experienced in recent memory” where “the central challenges to U.S. prosperity and security is the reemergence of long-term, strategic competition by what the National Security Strategy classifies as revisionist powers.” But based on the likely costs and risks of conventional and nuclear war with China, Russia, Iran, and North Korea, much of the competition will likely be unconventional—and include what former U.S. State Department diplomat George Kennan referred to as “political warfare.” The term political warfare refers to the employment of military, intelligence, diplomatic, financial, and other means—short of conventional war—to achieve national objectives. It can include overt operations like public broadcasting and covert operations like psychological warfare and support to underground resistance groups.3 The United States’ adversaries today are already engaged in political warfare. Russia, for instance, utilizes a range of means to pursue its interests, such as technologically sophisticated offensive cyber programs, covert action, and psychological operations. Moscow has conducted overt operations like the use of RT and Sputnik, as well as semitransparent and covert efforts. It has also become increasingly active in supporting state and substate actors in countries like Ukraine, Syria, Afghanistan, and Libya to expand its influence in the Middle East, Asia, Europe, and even North Africa. Finally, Russia is attempting to exploit European and transatlantic fissures and support populist movements to undermine European Union and NATO cohesion, thwart economic sanctions, justify or obscure Russian actions, and weaken the attraction of Western institutions for countries on Russia’s periphery. Iran is using political warfare tools like propaganda, cyber attacks, and aid to substate proxies to support its security priorities, influence events and foreign perceptions, and counter threats. Tehran is also assisting state and substate actors in Yemen, Lebanon, Syria, Iraq, Bahrain, and Afghanistan. Iran supports Shia militia groups in Iraq, Hezbollah in Lebanon, the Bashar al-Assad regime in Syria, and Houthi rebels in Yemen. In the South China Sea, China is pouring millions of tons of sand and concrete onto reefs, creating artificial islands. It is also conducting a sophisticated propaganda campaign, utilizing economic coercion, and using fleets of fishing vessels to solidify its assertion of territorial and resource rights throughout the Pacific. Finally, Beijing is targeting the U.S. government, its allies, and U.S. companies as part of a cyber-espionage campaign. With political warfare already alive and well with the United States’ state adversaries, there are several implications for U.S. defense strategy. First, U.S. policymakers need to be prepared for significant inter-state competition to occur at the unconventional level, since the costs and risks of conventional and nuclear war may be prohibitively high. This should involve thinking through trade-offs regarding force posture, procurement, acquisition, and modernization. A U.S. military that predominantly focuses on preparing for conventional or nuclear war with state competitors—by modernizing the nuclear triad, building more resilient space capabilities, acquiring more effective counter-space systems, equipping U.S. forces with high-technology weapons, and emphasizing professional military education (PME) to fight conventional wars—may undermine U.S. unconventional readiness and capabilities. Second, even organizations that already engage in some types of political warfare—such as U.S. Special Operations Command and the U.S. intelligence community—will need to continue shifting some of their focus from counterterrorism to political warfare against state adversaries. This might include, for example, providing more aid to the Baltic States to conduct an effective resistance campaign against unconventional action by Moscow. Or it might involve aiding proxies in countries like Syria and Yemen to counter Iranian-backed organizations. It could also include improving the border security capabilities and effectiveness of Ukrainian military and police units against Russian-backed rebels. Third, the United States should invest in resources and capabilities that allow the military and other U.S. government agencies to more effectively engage in political warfare—and to provide agencies with sufficient authorities to conduct political warfare. One example is improving capabilities to conduct aggressive, offensive cyber operations. Other examples might include advanced electronic attack capabilities, psychological warfare units, security force assistance brigades, and precision munitions. Recognizing that other powers routinely conduct political warfare, George Kennan encouraged U.S. leaders to disabuse themselves of the “handicap” of the “concept of a basic difference between peace and war” and to wake up to “the realities of international relations—the perpetual rhythm of struggle, in and out of war.” Kennan’s advice may be even more relevant today in such a competitive world.
  • Topic: Security, Defense Policy, Nuclear Weapons, Military Strategy, Counter-terrorism
  • Political Geography: Russia, United States, China, Europe, Asia, North Korea
  • Author: Heather A Conley
  • Publication Date: 02-2018
  • Content Type: Working Paper
  • Institution: Center for Strategic and International Studies
  • Abstract: Twenty-five years of relative calm and predictability in relations between Russia and the West enabled European governments largely to neglect their military capabilities for territorial defense and dramatically redraw Northern Europe’s multilateral, regional, and bilateral boundaries, stimulating new institutional and cooperative developments and arrangements. These cooperative patterns of behavior occurred amid a benign security environment, a situation that no longer obtains. Following Russia’s annexation of Crimea, its military incursion into eastern Ukraine, its substantial military modernization efforts, heightened undersea activity in the North Atlantic and Baltic Sea, and its repeated air violations, the region’s security environment has dramatically worsened. The Baltic Sea and North Atlantic region have returned as a geostrategic focal point. It is vital, therefore, that the United States rethink its security approach to the region—what the authors describe as Enhanced Deterrence in the North.
  • Topic: Security, Regional Cooperation, Military Strategy, Modernization
  • Political Geography: Russia, United States, Europe, North Atlantic, Northern Europe, Crimea, Baltic Sea
  • Author: Melissa Dalton, Hijab Shah
  • Publication Date: 02-2018
  • Content Type: Working Paper
  • Institution: Center for Strategic and International Studies
  • Abstract: With the range of security challenges confronting the United States in the 21st century, characterized by competition by both state and nonstate actors, the importance of working with allies and partners to address common challenges is paramount. Deeper examination of the relative effectiveness of U.S. security sector assistance and how it must nest in a broader foreign policy strategy, including good governance, human rights, and rule of law principles, is required. Improving oversight and accountability in U.S. security sector assistance with partners are at the core of ongoing security assistance reform efforts to ensure that U.S. foreign policy objectives are met and in accordance with U.S. interests and values. This report examines key areas in security sector programming and oversight where the U.S. Departments of Defense and State employ accountability mechanisms, with the goal of identifying ways to sharpen and knit together mechanisms for improving accountability and professionalism into a coherent approach for partner countries.
  • Topic: Security, Foreign Policy, Defense Policy, Diplomacy, Human Rights
  • Political Geography: United States, North America
  • Author: Mark F. Cancian
  • Publication Date: 02-2018
  • Content Type: Working Paper
  • Institution: Center for Strategic and International Studies
  • Abstract: The role that nuclear weapons play in international security has changed since the end of the Cold War, but the need to maintain and replenish the human infrastructure for supporting nuclear capabilities and dealing with the multitude of nuclear challenges remains essential. Recognizing this challenge, CSIS launched the Project on Nuclear Issues (PONI) in 2003 to develop the next generation of policy, technical, and operational nuclear professionals through outreach, mentorship, research, and debate. PONI runs two signature programs—the Nuclear Scholars Initiative and the Annual Conference Series—to engage emerging nuclear experts in debate and research over how to best address the nuclear community’s most pressing problems. The papers in this volume include research from participants in the 2017 Nuclear Scholars Initiative and PONI Conference Series. PONI sponsors this research to provide a forum for facilitating new and innovative thinking and a platform for emerging thought leaders across the nuclear enterprise. Spanning a wide range of technical and policy issues, these selected papers further discussion in their respective areas.
  • Topic: Security, Nuclear Weapons, Military Strategy, Nuclear Power
  • Political Geography: Global Focus
  • Author: Tom Karako, Wes Rumbaugh
  • Publication Date: 02-2018
  • Content Type: Working Paper
  • Institution: Center for Strategic and International Studies
  • Abstract: President Trump’s 2019 budget request includes $12.9 billion for missile defense programs, including $9.9 billion for the Missile Defense Agency and about $3 billion in modernization in the military services, building upon the acceleration initiated in the $323 million FY 2017 Above Threshold Reprogramming and the FY 2018 Budget Amendment of $2.0 billion. The proposed budget continues the recent trend of procurement consuming a greater portion of overall missile defense spending, reflecting a choice for prioritizing near-term capacity over longer-term capability. With the exception of two new Pacific radars and a modest effort for tracking hypersonic threats, the request includes strikingly few changes to the program of record. The submission fails to address past shortfalls for more research and development of new missile defense technologies and capabilities, most significantly with its lack of real movement toward a space-based sensor layer for tracking and discrimination, as opposed to merely missile warning. Pursuit of more advanced capabilities will require substantial programmatic changes in the 2020 budget, or with a budget amendment later this year, if such capabilities are recommended by the forthcoming Missile Defense Review. On February 12, the Department of Defense (DoD) released its budget request for FY 2019, which included a total of $12.9 billion for missile defense-related activities. The proposed topline for the Missile Defense Agency comes in at $9.9 billion, comprising $2.4 billion for procurement, $6.8 billion for research, development, test, and evaluation (RDT&E), $500 million for operations and maintenance (O&M), and $206 million for military construction (MILCON). The $9.9 billion request is a 26 percent increase from the FY 2018 budget request of $7.9 billion. Funding for ballistic missile defense within the services includes about $3 billion, largely for the procurement of Patriot Advanced Capability-3 Missile Segment Enhancement (PAC-3 MSE) and Standard Missile-6 (SM-6) interceptors. Overall, the budget reflects a near-term focus on capacity of existing programs, even at the expense of capability improvements. In its current form, the request boosts funding for all four families of interceptors. For homeland missile defense, this includes the continued improvements to the capacity and reliability of the Ground-based Midcourse Defense (GMD) system by continuing to deploy an additional 20 interceptors, several testing spares, and a new missile field at Fort Greely, Alaska. The request also deepens the magazines for Terminal High Altitude Area Defense (THAAD), Aegis, and Patriot interceptors, continuing a procurement-heavy trend from last year.1 The focus on capacity does not answer the question, however, how missile defense efforts will be adapted to the new reality of great power competition described by the National Security Strategy and the National Defense Strategy.2 One of the few new muscle movements in the entire budget is the addition of two radars in the Pacific for discriminating long-range missile threats to the homeland. The idea of a discrimination radar for Hawaii had been publicly floated over the past two years, and had previously been part of the yet-unpassed appropriations marks from the House and Senate appropriations committees. The Hawaii radar is scheduled for a 2023 deployment, with an additional radar deployed by 2024 at a yet-undisclosed location. The two radars will cost approximately $2.5 billion over the course of the Future Years Defense Program (FYDP). The inadequacy of the request lies not with the top line, but rather with the capabilities and strategy that the top line fails to prioritize. Although these radars would be useful to close the near-term Pacific midcourse gap against limited ballistic missile threats to the homeland, such funds must be weighed against the opportunity cost for larger improvements in capability provided by a space-based sensor layer that could provide substantially more capable birth-to-death tracking and discrimination on a more global scale and against a wider diversity of threats. The choice for capacity over capability reflects a near-term time horizon, but further delay in more advanced technologies will carry costs at a later time. In sum, the administration’s budget request for FY 2019 prioritizes near-term readiness against limited but growing ballistic missile threats from sources such as North Korea. This choice, however, falls short of connecting missile defense efforts to the reality of renewed great power competition as articulated in the National Defense Strategy. The inadequacy of the request lies not with the top line, but rather with the capabilities and strategy that the top line fails to prioritize. The 2019 request’s modesty of ambition is manifested by low funding for more advanced programs, such as boost-phase intercept, space-based sensors, and volume kill. Should the forthcoming Missile Defense Review address some of these issues and recommend programmatic changes, their implementation may have to wait until the 2020 budget, unless a budget amendment of some kind prioritizes them for the coming fiscal year.
  • Topic: Security, Defense Policy, Military Strategy, Budget, Missile Defense
  • Political Geography: United States, Europe, Asia, North America
  • Author: Anthony H. Cordesman
  • Publication Date: 03-2018
  • Content Type: Working Paper
  • Institution: Center for Strategic and International Studies
  • Abstract: The United States, South Korea, Japan—and every other state affected by the stability and security of Northeast Asia—has a strong incentive to find a way to end North Korea's nuclear threat and its development and deployment of ICBMs. At the same time, no one can afford to forget that North Korea poses a much wider range of threats from its conventional forces and shorter-range missiles—particularly as it develops ballistic and cruise missiles with precision strike capabilities. U.S. diplomacy and strategy cannot afford to focus solely on nuclear weapons, particularly when North Korea has the option of developing biological weapons with the same lethality as nuclear weapons. The U.S. cannot afford to ignore the conventional threat that North Korea poses to South Korea—a threat that could inflict massive casualties on South Korean civilians as well as create a level of conventional war that could devastate the South Korean economy.
  • Topic: Security, Nuclear Weapons, Political stability, Biological Weapons
  • Political Geography: United States, Japan, China, Asia, South Korea, North Korea, Asia-Pacific
  • Author: Lana Baydas, Shannon Green
  • Publication Date: 03-2018
  • Content Type: Working Paper
  • Institution: Center for Strategic and International Studies
  • Abstract: To combat the global threat of terrorism, countries have passed and implemented numerous laws that inadvertently or intentionally diminished the space for civil society. States conflate terrorism with broader issues of national security, which is then used as a convenient justification to stifle dissent, including civil society actors that aim to hold governments accountable. As the global terror landscape becomes more complex and dire, attacks on the rights to the freedom of expression, association, and peaceful assembly only increase. This report analyzes the impact of counterterrorism efforts on civic space, examines its manifestations in various socioeconomic and political contexts, and explores various approaches to disentangle and reconcile security and civil society. It features case studies on Australia, Bahrain, Burkina Faso, Hungary, and India. This report was published under the sponsorship of the International Consortium on Closing Civic Space (iCon), a coalition of scholars and experts from around the world that is developing concrete, evidence-based recommendations on how best to address and push back on closing space around civil society.
  • Topic: Security, Civil Society, Terrorism, Counter-terrorism
  • Political Geography: India, Hungary, Australia, Bahrain, Burkina Faso
  • Author: Gurmeet Kanwai
  • Publication Date: 04-2018
  • Content Type: Working Paper
  • Institution: Center for Strategic and International Studies
  • Abstract: The Issue The development of Gwadar Port is a key element of the greater China-Pakistan Economic Corridor (CPEC). It speaks to both the strength of the China-Pakistan relationship and the reach of China’s grand strategy. With Pakistan’s two other major ports operating near capacity with no room for expansion, projects in Gwadar promise to eventually handle one million tons of cargo annually, while also providing significant industrial, oil, and transportation infrastructure. Though a “monument of Pakistan-China friendship,” there are misgivings on both sides about CPEC, including the safety of Chinese workers, the resentment of Baloch nationalists, and the growing debt trap created by the project. The prospect of the PLA Navy in Gwadar poses greater security questions, as it forms another link in China’s efforts to expand its maritime presence in the Indo-Pacific region. The members of the Quadrilateral Security Dialogue, or “Quad,” comprised of India, Japan, Australia, and the United States, should counter China’s strategic outreach by networking with other like-minded countries on cooperative security frameworks to ensure a free, open, prosperous, and inclusive Indo-Pacific region.
  • Topic: Security, Oil, Regional Cooperation, Global Political Economy, Trade
  • Political Geography: Pakistan, United States, Japan, China, Middle East, India, Asia, Australia
  • Author: Christopher K Johnson
  • Publication Date: 05-2018
  • Content Type: Working Paper
  • Institution: Center for Strategic and International Studies
  • Abstract: Nearly two weeks after the U.S. “Trade Avengers” unleashed during their visit to Beijing what one reasonably could call “trade shock and awe” with a very aggressive—if thoroughly researched and well-crafted—set of demands targeting the yawning U.S. trade deficit with China and the core of that country’s throaty industrial policy, China this week is taking its turn with the visit of Chinese Communist Party (CCP) Politburo member and Vice Premier Liu He, President Xi Jinping’s economic point man who is almost universally described as a thoughtful, pragmatic, and mild-mannered policy academic. In the interim, voices from a wide swath of official Washington have sounded the alarm about the dangers of Chinese influence operations and the presence of alleged subversives, while President Trump himself seemed to cast aside these growing concerns by suggesting via Twitter that he would ask the Commerce Department to overturn its action against the Chinese telecommunications firm ZTE—long a focus of the U.S. security community for suspected cyber espionage activity and irrefutable violations of U.S. law—in response to protests that reportedly emanated directly from President Xi. With such frenetically sustained action in such a short period of time, the fog of war seems particularly thick at the moment. As such, it seems like a good time to slow down and have a think about how we got here, what actually is going on, and, with a little bit of luck, perhaps think about some ways to craft a viable way forward. Just like milestone birthdays in one’s personal life, important political anniversaries also can incline the mind toward reflection. Next year, of course, marks the fortieth anniversary of the reestablishment of diplomatic ties between the United States and China. As such, much breath and a lot of ink have been devoted to analyzing the course of the bilateral relationship over that nearly half-century. Although certainly not a universal opinion, it seems fair, if perhaps overly reductionist, to suggest that the general conclusion among a substantial number of U.S. officials, policy analysts, and journalists has been that the consistent U.S. policy emphasis on engagement with China during those forty years was, at the end of the day, a sham. In this rendering, naïve groups of senior policymakers in succeeding U.S. administrations and in most of the U.S. China-watching community were hoodwinked by wily CCP leaders who talked the talk of integrating into the so-called U.S.-led rules-based international order, but all the while they had a secret master plan to instead subvert that order and challenge U.S. primacy throughout the globe. In a slightly less menacing (if no less absurd) version of this narrative, China was, indeed, headed generally toward this hoped for integration under the stewardship of deceased paramount leader Deng Xiaoping and his handpicked successors Jiang Zemin and Hu Jintao until Xi Jinping arrived and, through a ruthless consolidation of power, decided instead to change course in what now regularly is referred to in shorthand as Xi’s “authoritarian turn.” But this conclusion seems utterly wrongheaded when examined in the light of hard facts. On the Chinese side of the equation, for example, Deng Xiaoping may have appeared warm and cuddly when donning his cowboy hat during his famous 1979 visit to the United States, but he could be just as ruthless and grasping as any other authoritarian leader. Deng’s exceptionally courageous and dogged pursuit of the policies of reform and opening certainly are worthy of praise, but they cannot, and therefore should not, be separated from the fact that he was content to sit idly by as Chairman Mao’s loyal lieutenant as Mao decimated his political rivals during the Anti-Rightist Campaign (1957-59) and the Great Leap Forward (1958-62). Nor should we forget that Deng used every ounce of his massive personal prestige with the People’s Liberation Army to, with steely determination, rally his many reluctant commanders to execute the brutal Tiananmen crackdown of June 4, 1989. Similarly, Xi Jinping is no Jack-in-the-Box-like figure who has pulled a fast one with a sharp directional turn in the last couple of years made all the more stark after his sweeping consolidation of power at last fall’s 19th Party Congress. In fact, it is this author’s contention, as supported by a large body of written work and public commentary, that everything Xi has done over the last five years was abundantly clear, whether explicitly or in embryonic form—from the moment he was introduced to the world as China’s new top leader in the fall of 2012, as encapsulated in his call for his country to pursue the “China Dream” set on a foundation of “the great rejuvenation of the Chinese nation.” This by no means suggests the United States should express support for, or even acquiescence in, Xi’s policies, but only that it should not be reacting with the borderline hysteria that now seems to be gripping Washington.
  • Topic: Security, Diplomacy, Global Political Economy, Trade Wars
  • Political Geography: United States, China, Asia, North America
  • Author: Amy Searight, Michael J. Green
  • Publication Date: 05-2018
  • Content Type: Working Paper
  • Institution: Center for Strategic and International Studies
  • Abstract: On August 21–22, 2017, the Center for Strategic and International Studies (CSIS) organized a conference in Sydney, Australia—Australia and the United States: An Alliance for the 21st Century—in cooperation with the United States Studies Centre (USSC) at the University of Sydney and the Perth USAsia Centre at the University of Western Australia. The conference was generously supported by a grant from the U.S. Department of State. This conference gathered together key thinkers from both countries at an important time for the Australia-U.S. alliance. The scope of cooperation between Australia and the United States has never been greater—extending well beyond traditional defense, intelligence, and diplomatic engagement—and the alliance enjoys healthy support among policymakers and the wider public in both countries. Bilateral economic, social, and cultural ties are broad and deep. The two countries are working closely together to defeat the threat posed by ISIL and other terrorist networks in the Middle East and globally, and to ensure the Asia-Pacific region remains stable and prosperous. Yet the Australia-U.S. alliance faces growing external and internal challenges. The United States, Australia, and other allies confront rising threats in Asia, Europe, and the Middle East, and globally from terrorism, financial instability, pandemic diseases, and other transnational challenges. Revisionist powers are seeking to reshape regional security dynamics and carve out spheres of influence, jeopardizing the liberal rules-based order that has supported American and Australian security and prosperity for more than half a century. The risks of miscalculation and conflict are growing, as is the prospect of proliferation of weapons of mass destruction. At the same time, allied resources available to meet these problems are constrained by slow economic growth across the developed world and the cost of supporting aging populations. Now, economic dislocation and stagnant wages are generating a wave of populist and protectionist sentiment in many parts of the world that risks undermining governance and a return to zero-sum, mercantilist economic policies—while U.S. political divisions and some policy choices are exacerbating allies’ concerns about the future of American global leadership. Many of these issues are playing out in the contemporary Australian debate, with a range of senior political figures and commentators calling for Australia to distance itself from the United States and recent opinion polls suggesting doubts about U.S. staying power as well as growing affinity for China. This is broadly consistent with polling from the region that suggests that China’s growing economic clout and military capabilities are driving expectations that China will supplant the United States as the predominant power in the Asia Pacific. These trends raise new questions about the future of the alliance in domestic, bilateral, and international contexts that we must address. They also highlight: the increasingly complex challenges facing U.S. and Australian alliance managers; the importance of not taking the alliance for granted; a requirement for fresh ideas about the alliance; and the need to engage a broader range of stakeholders, including a new generation of strategic thinkers in Australia and the United States. The Sydney conference brought together a group of about 40 participants—including 10 young next-generation leaders from Australia—for a two-day discussion on the opportunities and challenges facing the Australia-U.S. alliance across geopolitical, security, and economic issues. It focused on identifying key takeaways and formulating practical recommendations to improve the Australia-U.S. alliance’s capacity to adapt to changing dynamics, both globally and in the Indo-Pacific region, and to ensure support for the alliance well into the twenty-first century. Participation was by invitation and the discussions were off the record.
  • Topic: Security, Foreign Policy, Regional Cooperation, Counter-terrorism, Global Political Economy
  • Political Geography: United States, Australia, Asia-Pacific
  • Author: Stephen Naimoli, Jane Nakano
  • Publication Date: 06-2018
  • Content Type: Working Paper
  • Institution: Center for Strategic and International Studies
  • Abstract: This report provides a summary of the discussion from a CSIS roundtable held on April 13, 2018, as part of the CSIS-Pertamina Energy Initiative. The discussion brought together government, industry, and policy experts to explore the outlook for the region’s energy mix out to 2040, the state of renewable energy in Southeast Asia, and its role in the region’s energy priorities. This was the first in a series of events that will be convened this year to examine the role of renewable energy in Southeast Asia and its security, economic, and political importance in the Indo-Pacific. Southeast Asia is one of the fastest-growing regions in the world. The region’s gross domestic product (GDP) grew 66 percent from 2006 to 2015, and if all 10 countries were one economy, it would be the seventh-largest in the world. This growth is projected to increase, averaging just over 5 percent annually from 2018 to 2022. With economic growth comes demand for energy. From 2000 to 2016, economic growth in Southeast Asia drove a 70 percent increase in primary energy demand. Governments in Southeast Asia have implemented a range of policies and incentives to ensure they meet their energy demand. Renewable energy (wind, solar, geothermal, and sometimes hydro and biomass) is capturing an increasing, although not dominant, amount of attention from policymakers, investors, and the private sector as an important part of meeting this demand. Renewable energy’s share of the electric power mix is driven by a range of factors—the economics of power generation, efforts to reduce greenhouse gas emissions, energy security concerns, and concerns over local air pollution. While renewable energy is set to grow as a share of the region’s energy mix, there are indications that its potential contribution is much higher than is currently on track to be realized. Renewable energy increasingly competes on an economic basis in many countries against all fuels except coal, but sometimes political and socioeconomic factors stand in the way of improving their competitiveness in specific markets. The region is also attracting a great deal of outside investor interest. Countries from around the region and ever farther afield are investing in Southeast Asia’s energy sector because of the rapid growth experienced over the last decade and half, and their investment priorities, along with economics, shape their investment decisions in Southeast Asia. Energy policy and investment decisions are also being driven by the shifting nature of supply-and-demand balances in each country and the shifting domestic realities that come from becoming a net importer of specific fuels, such as in Indonesia. Many Southeast Asian countries have integrated low- or zero-carbon renewable energy into their energy planning efforts, and this report examines the dynamics of the power sector in Southeast Asia and how renewable energy competes with fossil fuel sources of electricity.
  • Topic: Security, Energy Policy, Oil, Governance, Gas, Electricity, Renewable Energy, Industry
  • Political Geography: Indonesia, Asia, Southeast Asia, Indo-Pacific
  • Author: Michael Wallace, Amy Roma, Sachin Desai
  • Publication Date: 07-2018
  • Content Type: Working Paper
  • Institution: Center for Strategic and International Studies
  • Abstract: The U.S. commercial nuclear energy industry helps the U.S. government meet several key national security objectives. But the industry is struggling to survive. We are not the first to say this and we will not be the last. We are also not the first to call for U.S. government support for this struggling industry—but this call to action is different. We are urging U.S. government action—not with the focus of protecting the commercial sector, but with a focus to protect U.S. government interests impacted by the decline in the commercial nuclear energy sector. This is a key distinction and warrants attention at the highest level of government. This paper is not intended for those in the nuclear energy industry. They know the issues. It is intended for the U.S. government and the U.S. public—to explain the reasons why U.S. government action is critical at this moment, and to explain how we can move forward in a manner that best protects our country’s national security. But what are these national security objectives and how are U.S. government and national security interests undermined by a decline in the commercial nuclear energy sector? In this paper we explain the critical importance of the U.S. commercial nuclear energy industry in support of U.S. defense, research, economics, geopolitics, and international nonproliferation. We walk through how the U.S. commercial nuclear energy industry arose out of and with the support of the U.S. government—and how President Eisenhower’s reasons for bringing nuclear energy to the world in the 1950s are the very same reasons that the United States needs to continue to do so today. We unravel the web of interconnections between the commercial nuclear energy industry and achieving U.S. government and national security goals. And we explain the impact that a declining commercial nuclear energy sector has on achieving those crucial goals. Moreover, we set forth a recommended path forward to come “back from the brink” and preserve critical commercial nuclear energy sector assets—including technology, knowhow, people, and influence—before they are lost forever, and U.S. national security is damaged as a result. This industry must survive—and it can if the U.S. government and private industry work together, recognizing the government and civilian integrated nuclear infrastructure moving forward. Notably, the response must be U.S. government led to take the approach that is best for the country, rather than any particular company or technology. We recommend five core U.S.-government-led actions to move forward that focus.
  • Topic: Security, Energy Policy, National Security, Nuclear Power
  • Political Geography: United States, North America
  • Author: Seth G. Jones, Boris Toucas, Maxwell B. Markusen
  • Publication Date: 12-2018
  • Content Type: Working Paper
  • Institution: Center for Strategic and International Studies
  • Abstract: Europe faces a significant threat from terrorism, particularly from Islamic extremists and far-right groups. Europe’s challenges with terrorism have largely gone unnoticed in the United States, whose strategy documents like the U.S. Department of Defense’s National Defense Strategy have shifted away from counterterrorism and toward competition with state competitors like China, Russia, Iran, and North Korea. In addition, Europe’s increasingly aggressive approach to terrorists—including prosecuting individuals for planning to travel abroad to join terrorist groups, censoring extremist Internet material, punishing Internet companies that fail to remove extremist material, and improving intelligence cooperation—have also largely gone unnoticed in the United States. This report takes a renewed look at Europe and compiles new data on the threat to Europe. It also examines the counterterrorism response by European governments, especially the United Kingdom and France.
  • Topic: Security, Terrorism, Violent Extremism, Counter-terrorism
  • Political Geography: Europe
  • Author: David J. Berteau, Gregory Sanders, T.J. Cipoletti, Meaghan Doherty, Abby Fanlo
  • Publication Date: 01-2015
  • Content Type: Working Paper
  • Institution: Center for Strategic and International Studies
  • Abstract: The European defense market, though impacted by lethargic economic growth and painful fiscal austerity measures, continues to be a driver in global defense. Five of the fifteen biggest military spenders worldwide in 2013 were European countries, and Europe remains a major market for international arms production and sales. Surges in military spending by Russia, China, and various Middle Eastern countries in recent years has augmented the defense landscape, especially as European countries in aggregate continue to spend less on defense and the United States embarks on a series of deep-striking budget cuts. This report analyzes overall trends in defense spending, troop numbers, collaboration, and the European defense and security industrial base across 37 countries. To remain consistent with previous reports, this briefing utilizes functional NATO categories (Equipment, Personnel, Operations and Maintenance, Infrastructure, and Research and Development) and reports figures in constant 2013 euros unless otherwise noted. Many of the trends identified within the 2012 CSIS European Defense Trends report continued into 2013, namely reductions in topline defense spending, further cuts to R spending, and steadily declining troop numbers. Though total European defense spending decreased from 2001-2013, with an accelerated decline between 2008 and 2010, select countries increased spending2 between 2011 and 2013. Collaboration among European countries has decreased in the R category; however, it has increased in the equipment category – indicating increased investment in collaborative procurement. Defense expenditure as a percentage of total government expenditure has decreased across Europe from 2001-2013 with the exceptions of Albania and Estonia. An updated CSIS European Security, Defense, and Space (ESDS) Index is included within this report and exhibits a shift in geographic revenue origin for leading European defense firms away from North America and Europe and towards other major markets between 2008 and 2013. Finally, a brief analysis of Russian defense spending is included in the final section of this report in order to comprehend more fully the size and scope of the European defense market within the global framework. In 2013, Russia replaced the United Kingdom as the third largest global defense spender, devoting 11.2 percent of total government expenditures to defense. This briefing report concludes with summarized observations concerning trends in European defense from 2001 to 2013. CSIS will continue to follow and evaluate themes in European defense, which will appear in subsequent briefings.
  • Topic: Security, Defense Policy, Military Affairs, Budget
  • Political Geography: Russia, China, United Kingdom, America, Europe
  • Author: Stephanie Sanok Kostro, Rhys McCormick
  • Publication Date: 01-2015
  • Content Type: Working Paper
  • Institution: Center for Strategic and International Studies
  • Abstract: While the united states has long acknowledged the value of working with partner nations to address shared security concerns, drawdowns in defense spending have underscored the importance of bilateral and multilateral cooperation to leverage capabilities and investments. the Center for strategic and International studies' multiyear Federated Defense Project aims to inform policymakers about global and regional security architectures and defense capabilities that support the achievement of common security goals, as well as ways to improve defense cooperation among nations to address those goals together. This report on institutional foundations of federated defense recognizes that successful cooperation in a budget-constrained environment often rests on the u.s. ability and willing-ness to provide assistance and/or equipment to partner nations. CSIS project staff drew on a literature review, workshops, and a public event (“the Future of the security Cooperation Enterprise”) to identify key findings in five areas: Priorities/Strategic Guidance: Proponents of federated defense should better articulate priorities. A proactive, interagency component that includes, at a minimum, officials from the Defense Department, State Department, and White House is necessary to effect a cultural shift and combat potential backsliding into unilateral approaches. Foreign Military Sales: In a federated approach, officials should identify capabilities that could most effectively support partner nations' contributions to federated defense. Toward that end, officials should also emphasize the establishment and maintenance of high-demand capabilities over time. other key issues related to potential difficulties in foreign sales include surcharges, overhead costs, and transparency in offsets. Export Controls: study participants noted that recent export control reform efforts have not yet resulted in significant change and have inadequately addressed industry concerns. Moreover, there appears to be a lack of appetite for these reforms in Congress. Technology Security and Foreign Disclosure: Improvements are needed to coordinate and speed technology transfer and foreign disclosure decisions. transparency across stovepipes within the executive branch is critical to create a common vision and objectives for federated defense, which is especially important when working with industry and foreign government partners. Acquisition and Requirements Processes: Within the Department of Defense, there is insufficient consideration of the export value and challenges of systems in early stages of the acquisition and requirements processes. Modifications during late stages of development are often far more expensive than building in exportability earlier. Having examined these key areas, the study team identified and analyzed three over-arching institutional challenges to and opportunities for federated defense. First, study participants remarked upon the lack of sufficient advocacy for federated defense among senior U.S. government officials. A second challenge was the cultural resistance to federated defense; experts noted that significant cultural change, such as that brought about by the Goldwater-Nichols Department of Defense Reorganization Act of 1986 (Pub.L. 99-433), may require top-down direction, years to implement, and decades to be accepted. A third challenge was the need for a perceived or actual budget crisis to drive change. The study team's recommendations resulting from this examination were five-fold. First, U.S. national strategies should address the grand strategy questions that could imperil implementation of a federated approach. Implementation of the u.s. National security strategy could impel a new effort to focus on partner capabilities and areas for sharing the common global security burden, as well as to prioritize interests and activities related to U.S. security cooperation, export controls, and technology security/foreign disclosure. Second, proactive U.S. leaders should articulate a vision, objectives, and priorities for a federated approach to defense. third, the Administration and Congress should work together to ensure completion of legal and regulatory reforms already under way (e.g., on export controls). Fourth, executive and legislative officials—perhaps through an interagency task force that works with committee staffs—should identify additional reforms to streamline or create authorities and to eliminate unhelpful directed spending on capabilities and systems that do not contribute to federated defense. Finally, the Department of Defense should start with incremental steps to create a culture that values federated defense; for example, the Defense Acquisition University and Defense Institute of Security Assistance Management could update coursework to institutionalize knowledge regarding federated approaches. This study made it clear that enduring changes in these five areas—from strategy to culture—are necessary to ensure the success of a federated approach to defense.
  • Topic: Security, Science and Technology, Budget
  • Political Geography: United States
  • Author: Robert D. Lamb, Sadika Hameed, Kathryn Mixon
  • Publication Date: 01-2014
  • Content Type: Working Paper
  • Institution: Center for Strategic and International Studies
  • Abstract: The United States has a number of interests and values at stake in India, Pakistan, and Afghanistan, or "South Asia" for the purposes of this analysis. But it also has a broader set of such concerns at stake regionally (in the greater Middle East, Eurasia, East Asia, and Southeast Asia)—and, of course, globally as well. Any long- term policy or strategy frame- work for South Asia needs to be built around the global and regional concerns that are most likely to persist across multiple changes in U.S. political leadership regardless of political party.
  • Topic: Conflict Resolution, Security, Foreign Policy, Islam, War, Insurgency
  • Political Geography: Pakistan, South Asia, Middle East, India
  • Author: Sarah Weiner
  • Publication Date: 01-2014
  • Content Type: Working Paper
  • Institution: Center for Strategic and International Studies
  • Abstract: This paper will examine the pressures, incentives, and restraints that form the politics of multilateral nuclear export control arrangements by examining the evolution of nuclear supplier arrangements from the 1950s to the 1990s. Focusing on the Nuclear Suppliers Group (NSG), this paper identifies six key pressures that shape the form and behavior of multilateral nuclear export control regimes. A deeper understanding of these pressures and how they resulted in the NSG offers a more nuanced backdrop against which to consider future policies for nuclear export control.
  • Topic: Security, Defense Policy, Arms Control and Proliferation, Nuclear Weapons, Weapons of Mass Destruction
  • Political Geography: Europe, Washington
  • Author: James Andrew Lewis
  • Publication Date: 01-2014
  • Content Type: Policy Brief
  • Institution: Center for Strategic and International Studies
  • Abstract: The Gulf has become a flashpoint for cyber conflict. Cyberspace has become an arena for covert struggle, with the United States, Israel and other nations on one side, and Iran and Russia on the other. Iran has far outpaced the GCC states in developing its cyber capabilities, both for monitoring internal dissent and deploying hackers to disrupt or attack foreign targets. Several such attacks over the past two years were likely either directed or permitted by Iranian state authorities. Even if Iran holds back from offensive actions as nuclear talks progress, the growth in Iranian capabilities remains a potential security threat for other Gulf states. The GCC countries have begun to develop their defensive capabilities, but they will need to expand their defenses and collaborate more effectively to deter future threats.
  • Topic: Conflict Resolution, Security, Defense Policy, Development, Science and Technology
  • Political Geography: Russia, United States, Iran, Middle East, Israel, Arabia
  • Author: Robert M. Shelala II
  • Publication Date: 02-2014
  • Content Type: Working Paper
  • Institution: Center for Strategic and International Studies
  • Abstract: The waterways of the Middle East and North Africa (MENA region) are among the most important in the world. They facilitate the export of large volumes of oil and natural gas from the region, while also bridging traders in the Eastern and Western worlds through the Red Sea and Suez Canal. While political tensions in the region have at times played out in these waterways since the mid-20th century, their vulnerability has been exasperated in recent years by the failure of bordering governments to promote internal stability, the lack of adequate maritime security capabilities of nearby states, and the potential naval threats posed by the government of Iran.
  • Topic: Security, Terrorism, International Security, Military Strategy, Maritime Commerce
  • Political Geography: Iran, Middle East, North Africa
  • Author: Matt Bryden
  • Publication Date: 02-2014
  • Content Type: Working Paper
  • Institution: Center for Strategic and International Studies
  • Abstract: The September 2013 attack on Nairobi's Westgate Shopping Center, which left more than 70 people dead, has positioned the Somali extremist group, Al-Shabaab, firmly in the global spotlight. While some observers have interpreted the attack as a sign of "desperation," others perceive it as an indication of Al-Shabaab's reformation and resurgence under the leadership of the movement's Amir, Ahmed Abdi aw Mohamud Godane. The reality is, as usual, more complex. Westgate provided a glimpse of a movement in the throes of a protracted, fitful, and often-violent transition: Al-shabaab is in the process of reinventing itself.
  • Topic: Security, Islam, Terrorism, Armed Struggle, Counterinsurgency
  • Political Geography: Africa
  • Author: Aram Nerguizian
  • Publication Date: 02-2014
  • Content Type: Working Paper
  • Institution: Center for Strategic and International Studies
  • Abstract: Lebanon has been a chronic US foreign policy challenge in the Levant since the Eisenhower Administration. However, given the country's centrality to regional security politics and Iran's support for the Shi'a militant group Hezbollah, the US cannot avoid looking at Lebanon as yet another arena of competition with Iran in the broader Levant.
  • Topic: Security, Islam, Religion, Terrorism, Armed Struggle, Power Politics
  • Political Geography: Lebanon, Syria
  • Author: Sharon Squassoni, Robert Kim, Stephanie Cooke, Jacob Greenberg
  • Publication Date: 03-2014
  • Content Type: Working Paper
  • Institution: Center for Strategic and International Studies
  • Abstract: The Proliferation Prevention Program at the Center for Strategic and International Studies (CSIS) participated in a global project on uranium governance led by the Danish Institute for International Studies that looks at uranium accountability and control in 17 uranium- producing countries. The project seeks to identify governance gaps and provide policy recommendations for improving front- end transparency, security, and regulation. The impetus for the project is the concern that monitoring activities at the front end—uranium mining, milling, and conversion—could be strengthened.
  • Topic: Security, Arms Control and Proliferation, Nuclear Weapons, Science and Technology, International Security, Nuclear Power
  • Political Geography: United States
  • Author: Nicole Goldin
  • Publication Date: 04-2014
  • Content Type: Working Paper
  • Institution: Center for Strategic and International Studies
  • Abstract: Youth comprise a quarter of the world's population, but remain an underutilized source of innovation, energy, and enthusiasm in global efforts to achieve and promote the increased wellbeing of all. As children grow and mature into adults, they make choices that affect not only their own wellbeing, but that of their families, communities, and countries. Youth-inclusive societies are more likely to grow and prosper, while the risks of exclusion include stinted growth, crime, and unrest. Therefore, it is imperative that education and health systems, labor markets, and governments serve their interests and provide the policies, investments, tools, technology, and avenues for participation they need to thrive and succeed. Yet, at a time when policy and investment decisions are increasingly data driven, data on youth development and wellbeing is often fragmented, inconsistent, or nonexistent. Thus, our understanding of how young people are doing in their own right and vis-à-vis their peers elsewhere is limited. As a result, the needs of young people often remain unexposed and marginalized by their complexity.
  • Topic: Security, Development, Economics, Education, Health, Human Rights, Youth Culture
  • Author: Anthony H. Cordesman
  • Publication Date: 04-2014
  • Content Type: Working Paper
  • Institution: Center for Strategic and International Studies
  • Abstract: Over the years since the formation of the Gulf Cooperation Council (GCC), the Southern Gulf states and the US have developed a de facto strategic partnership based on a common need to deter and defend against any threat from Iran, deal with regional instability in countries like Iraq and Yemen, counter the threat of terrorism and extremism, and deal with the other threats to the flow of Gulf petroleum exports.
  • Topic: International Relations, Security, Defense Policy, Military Strategy
  • Political Geography: United States, Iraq, Iran, Middle East, Yemen, Arabia, North America
  • Author: Maren Leed, Ariel Robinson
  • Publication Date: 04-2014
  • Content Type: Working Paper
  • Institution: Center for Strategic and International Studies
  • Abstract: The U.S. Army is facing a time of great change. The security environment is becoming increasingly complex and uncertain, with defense challenges multiplying. At the same time, the Army is adjusting to rapidly diminishing operational demands, falling end strength, reorganization, and tightening budgets. Despite this churn, the Army has continued its long-standing emphasis on the centrality of the soldier and squad as the cornerstone of future operations. Chiefs of staff going back decades or more have reiterated the theme that soldiers (and more recently, squads) remain the fundamental essence of the institution. Given these new realities, the CSIS Harold Brown Chair in Defense Policy Studies examined the current state of the soldier/squad system and how it might be best advanced in the face of constrained budgets. The effort was conducted under the rubric of the Ground Forces Dialogue, a Brown Chair effort aimed at facilitating a broad, sustained, web-based conversation about the future of U.S. ground forces.
  • Topic: Security, Defense Policy
  • Political Geography: North America
  • Author: Gerald F. Hyman
  • Publication Date: 04-2014
  • Content Type: Working Paper
  • Institution: Center for Strategic and International Studies
  • Abstract: In his 2013 State of the Union speech, President Barack Obama announced that by the end of 2014 "our war in Afghanistan will be over" and, a month earlier, that "by the end of next year, 2014, the transition will be complete—Afghans will have full responsibility for their security, and this war will come to a responsible end." The military transition, successful or not, is in full swing. Of course the war will not come to an end in 2014, responsible or otherwise. Even if the military drawdown goes as planned, "America's commitment to a unified and sovereign Afghanistan will endure, but the nature of our commitment will change," the president said. On the military side, our enduring commitment will focus on training, equipping, and funding the Afghan National Security Forces (ANSF) and "some counterterrorism efforts that allow us to pursue remnants of al Qaeda and their affiliates," presumably the Taliban. As the United States draws down, so too will the remaining coalition countries of the International Security Assistance Force (ISAF) under North Atlantic Treaty Organization (NATO) command.
  • Topic: Security, Development, Economics, Governance
  • Political Geography: Afghanistan, United States, South Asia
  • Author: Anthony H. Cordesman
  • Publication Date: 04-2014
  • Content Type: Working Paper
  • Institution: Center for Strategic and International Studies
  • Abstract: Creating political unity and reasons to be loyal to government. Creating a new structure of governance and balance between factions. Effective revenue collection, budget planning and expenditure, and limits to corruption. Fully replacing NATO/ISAF with the ANSF and "layered defense". Creating a new structure of security forces, advisors, and aid funds, to include addressing the presence of US and other nations' personnel. Acting on the Tokyo Conference: Creating effective flow and use of aid, economic reform, and limits to corruption and waste Stabilizing a market economy driven by military spending and moving towards development: Brain drain and capital flight. Coping with weather and other challenges to agricultural structure and with pressures to increase the narco - economy. Dealing with neighbors: Pakistan, I ran, Central Asian nations, India, China, and Russia.
  • Topic: International Relations, Security, Military Strategy, Foreign Aid
  • Political Geography: Pakistan, Afghanistan, Russia, China, South Asia, India, North America
  • Author: Stephen Biddle
  • Publication Date: 06-2014
  • Content Type: Journal Article
  • Journal: The Washington Quarterly
  • Institution: Center for Strategic and International Studies
  • Abstract: In an important sense, emerging debates on the war's lessons are premature. The war in Afghanistan is not over; nor is it ending anytime soon. Nevertheless, before conventional wisdom consolidates, two observations on counterinsurgency are worth considering now: whether it can work and how to approach governance reform.
  • Topic: Security, War, Governance, Reform
  • Political Geography: Afghanistan, America
  • Author: Shashank Joshi
  • Publication Date: 06-2014
  • Content Type: Journal Article
  • Journal: The Washington Quarterly
  • Institution: Center for Strategic and International Studies
  • Abstract: For India, the Western drawdown of forces in Afghanistan will represent the greatest adverse structural shift in its security environment for over a decade. Yet, a fundamental congruity of interests between Washington and New Delhi, and opportunities for cooperation, remain.
  • Topic: Security, NATO, Environment
  • Political Geography: Afghanistan, Washington, India
  • Author: Sandra Destradi
  • Publication Date: 06-2014
  • Content Type: Journal Article
  • Journal: The Washington Quarterly
  • Institution: Center for Strategic and International Studies
  • Abstract: If the West wants to harness the potential of cooperating with India in Afghanistan, it needs a better appreciation of India's engagement and motivations, as well as of New Delhi's assets and concerns about Afghanistan's future.
  • Topic: Security, Government
  • Political Geography: Afghanistan, India, New Delhi
  • Author: Maren Leed
  • Publication Date: 09-2014
  • Content Type: Working Paper
  • Institution: Center for Strategic and International Studies
  • Abstract: For those in the amphibious operations business, these are tough times. Amphibious ships—the "work horse of the fleet" — are in short supply, and demand for the capabilities they bring to the table shows no sign of abating. Navy and Marine leaders, the Department of Defense, and the Congress are actively engaged in managing the risks that result from this gap in capability, though they are by no means unique to amphibious ships, the Navy, or the joint force more broadly.
  • Topic: Security, Defense Policy, Cold War, Science and Technology
  • Author: Sadika Hameed
  • Publication Date: 09-2014
  • Content Type: Working Paper
  • Institution: Center for Strategic and International Studies
  • Abstract: Relations between the United States and Pakistan have begun to improve after several years of heightened tensions. Yet many challenges remain. Among them is how to improve Pakistan's economy. Its economic crisis is one of the main sources of its internal tensions, but multiple opportunities exist to improve its economic performance. The policy debate in the United States, however, is still dominated by a focus on terrorism and extremism. While Pakistan's stability is a natural concern for the United States, focusing primarily on security issues limits the options for improving stability.
  • Topic: International Relations, Security, Economics
  • Political Geography: Pakistan, United States
  • Author: Anthony H. Cordesman
  • Publication Date: 09-2014
  • Content Type: Working Paper
  • Institution: Center for Strategic and International Studies
  • Abstract: Creating an effective transition for the ANSF is only one of the major challenges that Afghanistan, the US, and Afghanistan's other allies face during 2014-2015 and beyond.
  • Topic: Security, Defense Policy
  • Political Geography: Afghanistan, United States, Middle East
  • Author: Victor D. Cha
  • Publication Date: 12-2014
  • Content Type: Working Paper
  • Institution: Center for Strategic and International Studies
  • Abstract: As a result of a speech delivered by Republic of Korea (ROK) president Park Geun- hye in Dresden, Germany, on March 28, 2014, the topic of unification of the Korean peninsula has been on the minds of many. This is, of course, not the first time that unification has been in the news. During the Cold War era, unification was defined as the absolute military victory of one side over the other. In Korean, this was known as “songgong t'ongil” or “p'ukch'in t'ongil” (“march north” or “unification by force”). In political science literature influenced by the European experience, it was defined as the perfect integration of the two countries. After the reunification of Germany on October 3, 1990, unification was seen as the economic and political absorption of one side by the other. And yet at other times, it was defined, by both North and South Korea, as the imperfect operation of one country, two systems. For a decade during the period of “sunshine” policy, 1997–2007, unification was defined as something to be avoided for generations. It was framed as an outcome that was too difficult to contemplate, too dangerous to suggest, and too expensive to afford.
  • Topic: Security, Economics, Bilateral Relations
  • Political Geography: South Korea, North Korea, Germany